source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Eugenio%20Berr%C3%ADos | Eugenio Berríos Sagredo (November 14, 1947 – November 15, 1992) was a Chilean biochemist who worked for the Dirección de Inteligencia Nacional (DINA).
Berríos was charged with carrying out Proyecto Andrea in which Pinochet ordered the production of sarin, a nerve agent used by the DINA. Sarin gas leaves no trace and victims' deaths closely mimic heart attacks. Other biochemical weapons produced by Berríos included anthrax and botulism. Berríos also allegedly produced cocaine for Pinochet, who then sold it to Europe and the United States. In the late 1970s, at the height of the Beagle Crisis between Chile and Argentina, Berríos is reported to have worked on a plan to poison the water supply of Buenos Aires. Wanted by the Chilean authorities for involvement in the Letelier case, he escaped to Uruguay in 1991, at the beginning of the Chilean transition to democracy, and what has been identified as his corpse was found in 1995 near Montevideo.
DINA agent
Known in the DINA under his alias "Hermes", for which he began to work in 1974, Berríos was connected to the creation of the explosive used for Orlando Letelier's car-bombing assassination in Washington, D.C. in 1976. In April 1976, Berríos synthesized sarin. He was also suspected, along with DINA agent Michael Townley, of the torture and assassination of the Spanish citizen Carmelo Soria.
In 1978, Townley, in a sworn but confidential declaration, stated that sarin gas was produced by the DINA under Berríos' direction. He added that it was used to assassinate the real state archives custodian Renato León Zenteno and the Chilean Army Corporal Manuel Leyton.
Former head of DINA Manuel Contreras declared to Chilean justice officials in 2005 that the CNI, successor of DINA, handed out monthly payments between 1978 and 1990 to the persons who had worked with Townley in Chile, all members of the far-right group Patria y Libertad: Mariana Callejas (Townley's wife), Francisco Oyarzún, Gustavo Etchepare and Berríos. Accordi |
https://en.wikipedia.org/wiki/Possible%20Worlds%20%28play%29 | Possible Worlds is a play written in 1990 by John Mighton. The author, Mighton, is a mathematician and philosopher. His plays tend to meld science, drama and math into one cohesive piece. It is part murder mystery, part science-fiction, and part mathematical philosophy and follows the multiple parallel lives of the main character George Barber. Mighton, a mathematician from University of Toronto's Fields Institute, brought his considerable professional experience to bear on the writing of the play.
At the play's beginning, George is found dead, with his brain missing. Two detectives set out to uncover the truth behind his grisly death, and stumble upon several strange characters. This play may be classified as a sci-fi tragic drama The play itself does not have any music.
Possible Worlds won a Governor General's Literary Award for Drama in 1992 alongside Short History of Night.
A film adaptation of the same name was released in 2000. Directed by Robert Lepage and starring Tom McCamus and Tilda Swinton, it garnered wide critical acclaim, won two Genie Awards, and was nominated for a further four. The theatre book was published in 1997 by Playwrights Canada Press.
The play bears many conceptual similarities to Tom Stoppard's Hapgood, a play about spies and secret agents that takes place primarily in the men's changingroom of a municipal swimming baths.
Production history (selected)
Canadian Stage Company, Toronto, Ontario, Canada – Premiere 1990
Dionysus and Apollo Stage company, Dallas, Texas – 1997
Dr. Betty Mitchell Theatre, Calgary, Alberta, Canada –1999
Chicago Cultural Center Studio Theater, Chicago, Illinois – 1999
Company of the Silvershield, Toronto, Ontario, Canada - 2000
The group at Strasberg, Lee Strasberg Creative Center, Hollywood, California – 2001
Tron Theatre, Glasgow, Scotland – 2002
Hart House Theatre, Toronto, Canada – 2004
Sullivan Mahoney Court House Theatre, Ontario, Canada – 2008
Wakefield Players Theater Company, Wakefield, |
https://en.wikipedia.org/wiki/Fibrillarin | rRNA 2'-O-methyltransferase fibrillarin is an enzyme that in humans is encoded by the FBL gene.
Function
This gene product is a component of a nucleolar small nuclear ribonucleoprotein (snRNP) particle thought to participate in the first step in processing pre-ribosomal (r)RNA. It is associated with the U3, U8, and U13 small nucleolar RNAs and is located in the dense fibrillar component (DFC) of the nucleolus. The encoded protein contains an N-terminal repetitive domain that is rich in glycine and arginine residues, like fibrillarins in other species. Its central region resembles an RNA-binding domain and contains an RNP consensus sequence. Antisera from approximately 8% of humans with the autoimmune disease scleroderma recognize fibrillarin.
Fibrillarin is a component of several ribonucleoproteins including a nucleolar small nuclear ribonucleoprotein (SnRNP) and one of the two classes of small nucleolar ribonucleoproteins (snoRNPs). SnRNAs function in RNA splicing while snoRNPs function in ribosomal RNA processing.
Fibrillarin is associated with U3, U8 and U13 small nuclear RNAs in mammals and is similar to the yeast NOP1 protein. Fibrillarin has a well conserved sequence of around 320 amino acids, and contains 3 domains, an N-terminal Gly/Arg-rich region; a central domain resembling other RNA-binding proteins and containing an RNP-2-like consensus sequence; and a C-terminal alpha-helical domain. An evolutionarily related pre-rRNA processing protein, which lacks the Gly/Arg-rich domain, has been found in various archaea.
A study by Schultz et al. indicated that the K-turn binding 15.5-kDa protein (called Snu13 in yeast) interacts with spliceosome proteins hPRP31, hPRP3, hPRP4, CYPH and the small nucleolar ribonucleoproteins NOP56, NOP58, and fibrillarin. The 15.5-kDa protein has sequence similarity to other RNA-binding proteins such as ribosomal proteins S12, L7a, and L30 and the snoRNP protein NHP2. The U4/U6 snRNP contains 15.5-kDa protein. The 15.5-kDa pr |
https://en.wikipedia.org/wiki/Fake%20news%20website | Fake news websites (also referred to as hoax news websites) are websites on the Internet that deliberately publish fake news—hoaxes, propaganda, and disinformation purporting to be real news—often using social media to drive web traffic and amplify their effect. Unlike news satire, fake news websites deliberately seek to be perceived as legitimate and taken at face value, often for financial or political gain. Such sites have promoted political falsehoods in India, Germany, Indonesia and the Philippines, Sweden, Mexico, Myanmar, and the United States. Many sites originate in, or are promoted by, Russia, North Macedonia, and Romania, among others. Some media analysts have seen them as a threat to democracy. In 2016, the European Parliament's Committee on Foreign Affairs passed a resolution warning that the Russian government was using "pseudo-news agencies" and Internet trolls as disinformation propaganda to weaken confidence in democratic values.
In 2015, the Swedish Security Service, Sweden's national security agency, issued a report concluding Russia was using fake news to inflame "splits in society" through the proliferation of propaganda. Sweden's Ministry of Defence tasked its Civil Contingencies Agency with combating fake news from Russia. Fraudulent news affected politics in Indonesia and the Philippines, where there was simultaneously widespread usage of social media and limited resources to check the veracity of political claims. German Chancellor Angela Merkel warned of the societal impact of "fake sites, bots, trolls".
Fraudulent articles spread through social media during the 2016 U.S. presidential election, and several officials within the U.S. Intelligence Community said that Russia was engaged in spreading fake news. Computer security company FireEye concluded that Russia used social media to spread fake news stories as part of a cyberwarfare campaign. Google and Facebook banned fake sites from using online advertising. Facebook launched a partners |
https://en.wikipedia.org/wiki/Single-core | A single-core processor is a microprocessor with a single core on its die. It performs the fetch-decode-execute cycle once per clock-cycle, as it only runs on one thread. A computer using a single core CPU is generally slower than a multi-core system.
Single core processors used to be widespread in desktop computers, but as applications demanded more processing power, the slower speed of single core systems became a detriment to performance. Windows supported single-core processors up until the release of Windows 11, where a dual-core processor is required.
Single core processors are still in use in some niche circumstances. Some older legacy systems like those running antiquated operating systems (e.g. Windows 98) cannot gain any benefit from multi-core processors. Single core processors are also used in hobbyist computers like the Raspberry Pi and Single-board microcontrollers. The production of single-core desktop processors ended in 2013 with the Celeron G470.
Development
The first single core processor was the Intel 4004, which was commercially released on November 15, 1971 by Intel. Since then many improvements have been made to single core processors, going from the 740 KHz of the Intel 4004 to the 2 GHz Celeron G470.
Advantages
Single core processors draw less power than larger, multi-core processors.
Single core processors can be made a lot more cheaply than multi core systems, meaning they can be used in embedded systems.
Disadvantages
Single core processors are generally outperformed by multi-core processors.
Single core processors are more likely to bottleneck with faster peripheral components, as these components have to wait for the CPU to finish its cycle.
Single core processors lack parallelisation, meaning only one application can run at once. This reduces performance as other processes have to wait for processor time, leading to process starvation.
Increasing parallel trend
Single-core one processor on a die. Since about 2012, e |
https://en.wikipedia.org/wiki/Condensed%20matter%20physics | Condensed matter physics is the field of physics that deals with the macroscopic and microscopic physical properties of matter, especially the solid and liquid phases which arise from electromagnetic forces between atoms. More generally, the subject deals with condensed phases of matter: systems of many constituents with strong interactions among them. More exotic condensed phases include the superconducting phase exhibited by certain materials at extremely low cryogenic temperature, the ferromagnetic and antiferromagnetic phases of spins on crystal lattices of atoms, and the Bose–Einstein condensate found in ultracold atomic systems. Condensed matter physicists seek to understand the behavior of these phases by experiments to measure various material properties, and by applying the physical laws of quantum mechanics, electromagnetism, statistical mechanics, and other physics theories to develop mathematical models.
The diversity of systems and phenomena available for study makes condensed matter physics the most active field of contemporary physics: one third of all American physicists self-identify as condensed matter physicists, and the Division of Condensed Matter Physics is the largest division at the American Physical Society. The field overlaps with chemistry, materials science, engineering and nanotechnology, and relates closely to atomic physics and biophysics. The theoretical physics of condensed matter shares important concepts and methods with that of particle physics and nuclear physics.
A variety of topics in physics such as crystallography, metallurgy, elasticity, magnetism, etc., were treated as distinct areas until the 1940s, when they were grouped together as solid-state physics. Around the 1960s, the study of physical properties of liquids was added to this list, forming the basis for the more comprehensive specialty of condensed matter physics. The Bell Telephone Laboratories was one of the first institutes to conduct a research program in con |
https://en.wikipedia.org/wiki/Massive%20gravity | In theoretical physics, massive gravity is a theory of gravity that modifies general relativity by endowing the graviton with a nonzero mass. In the classical theory, this means that gravitational waves obey a massive wave equation and hence travel at speeds below the speed of light.
Background
Massive gravity has a long and winding history, dating back to the 1930s when Wolfgang Pauli and Markus Fierz first developed a theory of a massive spin-2 field propagating on a flat spacetime background. It was later realized in the 1970s that theories of a massive graviton suffered from dangerous pathologies, including a ghost mode and a discontinuity with general relativity in the limit where the graviton mass goes to zero. While solutions to these problems had existed for some time in three spacetime dimensions, they were not solved in four dimensions and higher until the work of Claudia de Rham, Gregory Gabadadze, and Andrew Tolley (dRGT model) in 2010.
One of the very early massive gravity theories was constructed in 1965 by Ogievetsky and Polubarinov (OP). Despite the fact that the OP model coincides with the ghost-free massive gravity models rediscovered in dRGT, the OP model has been almost unknown among contemporary physicists who work on massive gravity, perhaps because the strategy followed in that model was quite different from what is generally adopted at present. Massive dual gravity to the OP model can be obtained by coupling the dual graviton field to the curl of its own energy-momentum tensor. Since the mixed symmetric field strength of dual gravity is comparable to the totally symmetric extrinsic curvature tensor of the Galileons theory, the effective Lagrangian of the dual model in 4-D can be obtained from the Faddeev–LeVerrier recursion, which is similar to that of Galileon theory up to the terms containing polynomials of the trace of the field strength. This is also manifested in the dual formulation of Galileon theory.
The fact that general relativi |
https://en.wikipedia.org/wiki/MRC%20Human%20Genetics%20Unit | The Medical Research Council (UK) Human Genetics Unit is situated at the Western General Hospital in Edinburgh. It is one of the largest MRC research establishments, housing over two hundred scientists, support staff, research fellows, PhD students, and visiting workers.
Staff
current and former staff at the MRC HGU include:
Directors
1956–1969 Dr Michael Court Brown
1969–1994 Professor John Evans
1994–2015 Professor Nicholas Hastie
2015– Professor Wendy Bickmore
Group leaders
Pleasantine Mill
Chris Ponting
Sections
The Human Genetics Unit is divided into three sections:
Biomedical Genomics
-Research harnesses the power of large genome-size and population data to reveal the complex nature of disease processes.
Section Head: Professor Chris Ponting
Genome Regulation
-Research focuses on mechanisms that maintain the stability of the genome between cells and between generations, regulate the expression of genes and how changes to these contribute to disease.
Section Head: Professor Javier Caceres
Disease Mechanisms
-Research aims to understand how changes in our genomes cause disease by studying patients and families as well as model organisms.
Joint Section Heads: Professor David FitzPatrick and Professor Ian Jackson
Institute of Genetics and Molecular Medicine (IGMM)
In 2007 the Human Genetics Unit formed a partnership with two neighbouring research centres on the Western General Hospital campus, the Centre for Genomic and Experimental Medicine (University of Edinburgh) and the Edinburgh Cancer Research Centre (Cancer Research UK), to create the Institute of Genetics and Molecular Medicine. The Human Genetics Unit officially became part of the University of Edinburgh in 2011. The three partner centres comprising the Institute of Genetics and Molecular Medicine were linked with a new building in 2015. |
https://en.wikipedia.org/wiki/Polychotomous%20key | Polychotomous key refers to the number of alternatives which a decision point may have in a non-temporal hierarchy of independent variables. The number of alternatives are equivalent to the root or nth root of a mathematical or logical variable. Decision points or independent variables with two states have a binary root that is referred to as a dichotomous key whereas, the term polychotomous key refers to roots which are greater than one or unitary and usually greater than two or binary. Polychotomous keys are used in troubleshooting to build troubleshooting charts and in classification/identification schemes with characteristics that have more than one attribute and the order of characteristics is not inherently based on the progression of time.
See also
Number prefix
Polychotomy
External links
Examples of usage
Another Approach to Polychotomous Classification
Polyclass: polychotomous regression and multiple classification
The Development of a Hierarchical Polychotomous ADL-IADL Scale for Noninstitutionalized Elders
Probabilistic Forecasting - A Primer
Structured polychotomous machine diagnosis of multiple cancer types using gene expression
Concepts in logic
Decision theory
Trees (data structures) |
https://en.wikipedia.org/wiki/Tasman%20Outflow | The Tasman Outflow is a water pathway connecting water from the Pacific Ocean and the Indian Ocean. The existence of the outflow was published by scientists of the Australian CSIRO's Division of Marine and Atmospheric Research team in August 2007, interpreting salinity and temperature data captured from 1950 to 2002. The Tasman Outflow is seen as the missing link in the supergyre of the Southern Hemisphere and an important part of the thermohaline circulation.
Features
The source of the water of the Tasman Outflow is the East Australian Current. Until 2007, it was assumed that the water of this current moved in a southeastern direction towards New Zealand. However, this eastward turn toward New Zealand only occurred close to the surface, as was confirmed by the use of Argo floats at the sea surface and at a depth of 1000 dbar. At intermediate depth -around 300 to 1000 meter- the water actually turns south and westward, moving around the south of Tasmania. This water, which escapes from the East Australian Current and moves past Tasmania, is called the Tasman Outflow. The current moves further westward past the Great Australian Bight and into the Indian Ocean. In this way, the Tasman Outflow links the South Pacific Ocean to the Indian Ocean. Due to its depth, the current mainly transports Subantarctic Mode Water and Antarctic Intermediate Water with a volume transport of 4.2 ± 4.3 Sv. Here Sv stands for Sverdrup, a measure for volumetransport in the ocean. The current is limited to a narrow path between Tasmania and the Antarctic circumpolar current, due to the strong eastward Antarctic Circumpolar Current to the south of Tasmania.
Role in the thermohaline circulation
Before the discovery of the Tasman Outflow, research on the thermohaline circulation in the Southern Hemisphere was mainly focused on two other routes. One of them is known as the cold route, which moves through the Drake Passage and transports cold water deep in the ocean around Antarctica into the |
https://en.wikipedia.org/wiki/Posterior%20commissure | The posterior commissure (also known as the epithalamic commissure) is a rounded band of white fibers crossing the middle line on the dorsal aspect of the rostral end of the cerebral aqueduct. It is important in the bilateral pupillary light reflex. It constitutes part of the epithalamus.
Its fibers acquire their medullary sheaths early, but their connections have not been definitively determined. Most of them have their origin in a nucleus, the nucleus of the posterior commissure (nucleus of Darkschewitsch), which lies in the periaqueductal grey at rostral end of the cerebral aqueduct, in front of the oculomotor nucleus. Some are thought to be derived from the posterior part of the thalamus and from the superior colliculus, whereas others are believed to be continued downward into the medial longitudinal fasciculus.
For the pupillary light reflex, the olivary pretectal nucleus innervates both Edinger-Westphal nuclei. To reach the contralateral Edinger-Westphal nucleus, the axons cross in the posterior commissure. |
https://en.wikipedia.org/wiki/Cricetid%20gammaherpesvirus%202 | Cricetid gammaherpesvirus 2 (CrHV-2) is a species of virus in the genus Rhadinovirus, subfamily Gammaherpesvirinae, family Herpesviridae, and order Herpesvirales. |
https://en.wikipedia.org/wiki/Neanderthal%20behavior | Almost everything about Neanderthal behaviour remains controversial. From their physiology, Neanderthals are presumed to have been omnivores, but animal protein formed the majority of their dietary protein, showing them to have been carnivorous apex predators and not scavengers. Although very little is known of their social organization, it appears patrilines would make up the nucleus of the tribe, and women would seek out partners in neighbouring tribes once reaching adolescence, presumably to avoid inbreeding. The men would pass knowledge and customs down from fathers to sons. An analysis based on finger-length ratios suggests that Neanderthals were more sexually competitive and promiscuous than modern-day humans.
The quality of stone tools at archaeological sites suggests Neanderthals were good at "expert" cognition, a form of observational learning and practice – acquired through apprenticeship – that relies heavily on long-term procedural memory. Neanderthal toolmaking changed little over hundreds of thousands of years. The lack of innovation may imply a reduced capacity for thinking by analogy and less working memory. Researchers have speculated that Neanderthal behaviour would probably seem neophobic, dogmatic and xenophobic to modern humans, and of a degree of rationality. There is genetic evidence that supports interbreeding with Homo sapiens, language capability (including the FOXP2 gene), archaeological signs of cultural development and potential for cumulative cultural evolution. Few Neanderthals lived past the age of 35.
Language
It is not known whether Neanderthals were anatomically capable of speech and whether they spoke. The only bone in the vocal tract is the hyoid, but it is so fragile that no Neanderthal hyoid was found until 1983, when excavators discovered a well-preserved one on Neanderthal Kebara 2, Israel. It was largely similar to that of living humans. Although the original excavators claimed that the similarity of this bone with that |
https://en.wikipedia.org/wiki/Trilinear%20coordinates | In geometry, the trilinear coordinates of a point relative to a given triangle describe the relative directed distances from the three sidelines of the triangle. Trilinear coordinates are an example of homogeneous coordinates. The ratio is the ratio of the perpendicular distances from the point to the sides (extended if necessary) opposite vertices and respectively; the ratio is the ratio of the perpendicular distances from the point to the sidelines opposite vertices and respectively; and likewise for and vertices and .
In the diagram at right, the trilinear coordinates of the indicated interior point are the actual distances (, , ), or equivalently in ratio form, for any positive constant . If a point is on a sideline of the reference triangle, its corresponding trilinear coordinate is 0. If an exterior point is on the opposite side of a sideline from the interior of the triangle, its trilinear coordinate associated with that sideline is negative. It is impossible for all three trilinear coordinates to be non-positive.
Notation
The ratio notation for trilinear coordinates is often used in preference to the ordered triple notation with the latter reserved for triples of directed distances relative to a specific triangle. The trilinear coordinates can be rescaled by any arbitrary value without affecting their ratio. The bracketed, comma-separated triple notation can cause confusion because conventionally this represents a different triple than e.g. but these equivalent ratios represent the same point.
Examples
The trilinear coordinates of the incenter of a triangle are ; that is, the (directed) distances from the incenter to the sidelines are proportional to the actual distances denoted by , where is the inradius of . Given side lengths we have:
Note that, in general, the incenter is not the same as the centroid; the centroid has barycentric coordinates (these being proportional to actual signed areas of the triangles , where = centroi |
https://en.wikipedia.org/wiki/Teliospore | Teliospore (sometimes called teleutospore) is the thick-walled resting spore of some fungi (rusts and smuts), from which the basidium arises.
Development
They develop in telia (sing. telium or teliosorus).
The telial host is the primary host in heteroecious rusts. The aecial host is the alternate host (look for pycnia and aecia).
These terms apply when two hosts are required by a heteroecious rust fungus to complete its life cycle.
Morphology
Teliospores consist of one, two or more dikaryote cells.
Teliospores are often dark-coloured and thick-walled, especially in species where they overwinter (acting as chlamydospores).
Two-celled teliospores formerly defined the genus Puccinia. Here the wall is particularly thick at the tip of the terminal cell which extends into a beak in some species.
Teliospores consist of dikaryote cells. As the teliospore cells germinate, the nuclei undergo karyogamy and thereafter meiosis, giving rise to a four-celled basidium with haploid basidiospores.
See also
Chlamydospore
Urediniomycetes
Pycniospore
Aeciospore
Urediniospore
Ustilaginomycetes
Rust fungus: Spores |
https://en.wikipedia.org/wiki/VA%20conduction | VA conduction, also named Ventriculoatrial conduction and sometimes referred to as Retrograde conduction, is the conduction backward phenomena in the heart, where the conduction comes from the ventricles or from the AV node into and through the atria.
Retrograde VA conduction results in many different symptoms, primarily those symptoms result from the delayed, nonphysiologic timing of atrial contraction in relation to ventricular contraction. |
https://en.wikipedia.org/wiki/Prototype%20filter | Prototype filters are electronic filter designs that are used as a template to produce a modified filter design for a particular application. They are an example of a nondimensionalised design from which the desired filter can be scaled or transformed. They are most often seen in regard to electronic filters and especially linear analogue passive filters. However, in principle, the method can be applied to any kind of linear filter or signal processing, including mechanical, acoustic and optical filters.
Filters are required to operate at many different frequencies, impedances and bandwidths. The utility of a prototype filter comes from the property that all these other filters can be derived from it by applying a scaling factor to the components of the prototype. The filter design need thus only be carried out once in full, with other filters being obtained by simply applying a scaling factor.
Especially useful is the ability to transform from one bandform to another. In this case, the transform is more than a simple scale factor. Bandform here is meant to indicate the category of passband that the filter possesses. The usual bandforms are lowpass, highpass, bandpass and bandstop, but others are possible. In particular, it is possible for a filter to have multiple passbands. In fact, in some treatments, the bandstop filter is considered to be a type of multiple passband filter having two passbands. Most commonly, the prototype filter is expressed as a lowpass filter, but other techniques are possible.
Low-pass prototype
The prototype is most often a low-pass filter with a 3 dB corner frequency of angular frequency ωc′ = 1 rad/s. Occasionally, frequency f = 1 Hz is used instead of ωc′ = 1. Likewise, the nominal or characteristic impedance of the filter is set to R = 1 Ω.
In principle, any non-zero frequency point on the filter response could be used as a reference for the prototype design. For example, for filters with ripple in the passband, the corne |
https://en.wikipedia.org/wiki/Marionette%20lines | Marionette lines (melomental folds) are long vertical lines that laterally circumscribe the chin. They are important landmarks for the general impression of the face. Marionette lines appear with advancing age, but some people never get them, depending on facial structure and anatomy. They tend to appear as the ligaments around the mouth and chin relax and begin to loosen and sag, and fatty tissues of the cheek deflate and descend during the aging process. It can be difficult to get rid of them, but they can be minimized with facelifts that lift cheek tissue away from the area of the mouth combined with synthetic facial fillers, or with facial fillers alone. Facial exercises and proper facial posture are the most effective ways to remove and prevent the lines due to reduced tension in the chin and the muscles lifting the cheeks. |
https://en.wikipedia.org/wiki/Leaf%20sensor | A leaf sensor is a phytometric device (measurement of plant physiological processes) that measures water loss or the water deficit stress (WDS) in plants by real-time monitoring the moisture level in plant leaves. The first leaf sensor was developed by LeafSens, an Israeli company granted a US patent for a mechanical leaf thickness sensing device in 2001. LeafSen has made strides incorporating their leaf sensory technology into citrus orchards in Israel. A solid state smart leaf sensor technology was developed by the University of Colorado at Boulder for NASA in 2007. It was designed to help monitor and control agricultural water demand. AgriHouse received a National Science Foundation (NSF) STTR grant in conjunction with the University of Colorado to further develop the solid state leaf sensor technology for precision irrigation control in 2007.
Precision monitoring
Water deficit stress measurements
A Phase I research grant from the National Science Foundation in 2007 showed that the leaf sensor technology has the potential to save between 30% and 50% of irrigation water by reducing irrigation from once every 24 hours to about every 2 to 2.5 days by sensing impending water deficit stress. Leaf sensor technology developed by AgriHouse indicates water deficit stress by measuring the turgor pressure of a leaf, which decreases dramatically at the onset of leaf dehydration. Early detection of impending water deficit stress in plants can be used as an input parameter for precision irrigation control by allowing plants to communicate water requirements directly to humans and/or electronic interfaces. For example, a base system utilizing the wirelessly transmitted information of several sensors appropriately distributed over various sectors of a round field irrigated by a center-pivot irrigation system could tell the irrigation lever exactly when and what field sector needs to be irrigated.
Irrigation control
In a 2008 USDA sponsored field study AgriHouse's SG-1000 |
https://en.wikipedia.org/wiki/Compuverde | Compuverde AB is an information technology company that specializes in computer data storage and cloud computing.
Description
Compuverde was founded by Stefan Bernbo, Christian Melander, and Roger Persson in 2008. It is headquartered in Karlskrona; in the southeastern part of Sweden.
It markets software-defined storage, converged storage, and unified storage platform, using computer clusters of standardized servers to store petabytes of data and billions of files.
The executive chairman of Compuverde is Swedish entrepreneur Mikael Blomqvist, also a board member of Blekinge Institute of Technology.
In 1990, Blomqvist founded the cable insulation producer Roxtec.
Compuverde is a member of the Storage Networking Industry Association trade group.
In January 2012, Compuverde, Blekinge Institute of Technology and Ericsson received recognition from the Development of Knowledge and Competence (KK-stiftelsen) in Sweden for a joint venture project on big data storage and cloud computing.
In 2016 a product called Metro Cluster was announced for data centers.
In April 2019, Compuverde entered into a definitive agreement to be acquired by Pure Storage for an undisclosed amount of money. |
https://en.wikipedia.org/wiki/Vocal%20tract | The vocal tract is the cavity in human bodies and in animals where the sound produced at the sound source (larynx in mammals; syrinx in birds) is filtered.
In birds it consists of the trachea, the syrinx, the oral cavity, the upper part of the esophagus, and the beak. In mammals it consists of the laryngeal cavity, the pharynx, the oral cavity, and the nasal cavity.
The estimated average length of the vocal tract in men is 16.9 cm and 14.1 cm in women.
See also
Language
Talking birds – species of birds capable of imitating human sounds, but without known comprehension
Speech organ
Speech synthesis
Manner of articulation |
https://en.wikipedia.org/wiki/Butyl%20acetate | n-Butyl acetate is an organic compound with the formula . A colorless, flammable liquid, it is the ester derived from n-butanol and acetic acid. It is found in many types of fruit, where it imparts characteristic flavors and has a sweet smell of banana or apple. It is used as an industrial solvent.
The other three isomers (four, including stereoisomers) of butyl acetate are isobutyl acetate, tert-butyl acetate, and sec-butyl acetate (two enantiomers).
Production and use
Butyl acetate is commonly manufactured by the Fischer esterification of butanol (or its isomer to make an isomer of butyl acetate) and acetic acid with the presence of sulfuric acid:
Butyl acetate is mainly used as a solvent for coatings and inks. It is a component of fingernail polish.
Occurrence in nature
Apples, especially of the 'Red Delicious' variety, are flavored in part by this chemical. The alarm pheromones emitted by the Koschevnikov gland of honey bees contain butyl acetate. |
https://en.wikipedia.org/wiki/Homomorphic%20secret%20sharing | In cryptography, homomorphic secret sharing is a type of secret sharing algorithm in which the secret is encrypted via homomorphic encryption. A homomorphism is a transformation from one algebraic structure into another of the same type so that the structure is preserved. Importantly, this means that for every kind of manipulation of the original data, there is a corresponding manipulation of the transformed data.
Technique
Homomorphic secret sharing is used to transmit a secret to several recipients as follows:
Transform the "secret" using a homomorphism. This often puts the secret into a form which is easy to manipulate or store. In particular, there may be a natural way to 'split' the new form as required by step (2).
Split the transformed secret into several parts, one for each recipient. The secret must be split in such a way that it can only be recovered when all or most of the parts are combined. (See Secret sharing.)
Distribute the parts of the secret to each of the recipients.
Combine each of the recipients' parts to recover the transformed secret, perhaps at a specified time.
Reverse the homomorphism to recover the original secret.
Examples
Suppose a community wants to perform an election, using a decentralized voting protocol, but they want to ensure that the vote-counters won't lie about the results. Using a type of homomorphic secret sharing known as Shamir's secret sharing, each member of the community can add their vote to a form that is split into pieces, each piece is then submitted to a different vote-counter. The pieces are designed so that the vote-counters can't predict how any alterations to each piece will affect the whole, thus, discouraging vote-counters from tampering with their pieces. When all votes have been received, the vote-counters combine them, allowing them to recover the aggregate election results.
In detail, suppose we have an election with:
Two possible outcomes, either yes or no. We'll represent those outcomes nume |
https://en.wikipedia.org/wiki/Colm%20Mulcahy | Colm Mulcahy (born September 1958) is an Irish mathematician, academic, columnist, book author, public outreach speaker, and amateur magician. He is Professor Emeritus at Spelman College, where he was on the faculty from 1988 to 2020. In addition to algebra, number theory, and geometry, his interests include mathemagical card magic and the culture of mathematics–particularly the contributions of Irish mathematicians and also the works of iconic mathematics writer Martin Gardner. He has blogged for the Mathematical Association of America, The Huffington Post, Scientific American, and (aperiodically) for The Aperiodical; his puzzles have been featured in The New York Times. Mulcahy serves on the Advisory Council of the Museum of Mathematics in New York City. As of January 2021, he is Chair of Gathering 4 Gardner, Inc. He is the creator and curator of the Annals of Irish Mathematics and Mathematicians.
Education and career
Mulcahy got his BSc and MSc in mathematical science at University College Dublin in 1978 and 1979, and a PhD from Cornell University in 1985 where his advisor was Alex F. T. W. Rosenberg. From 1988 to 2020, he taught mathematics at Spelman College, in Atlanta, Georgia, and is now Professor Emeritus. He served as chair of the department there from 2003 to 2006 and recently created the Archive of Spelman Mathematicians. In 1997 he received the MAA's Allendoerfer Award for excellence in expository writing for a paper on the basics of wavelet image compression. In 2014 he was one of the organizers of Mathematics Awareness Month. An article he co-authored, on the centennial of Martin Gardner, was featured in the book, The Best Writing on Mathematics 2015.
Mulcahy has an Erdös number is 2 as a result of a collaboration with Neil Calkin.
Card magic
Mulcahy is recognised as an authority on the mathematical principles and effects underlying cards tricks. From 2004 to 2014 he authored Card Colm, a column about mathematics and magic–especially card magic–fo |
https://en.wikipedia.org/wiki/Clausena%20lansium | Clausena lansium, also known as wampee or wampi (from Cantonese ), is a species of strongly scented evergreen trees 3–8 m tall, in the family Rutaceae, native to southeast Asia.
Its leaves are smooth and dark green. White flowers in late March are white, with four or five petals, about 3–4 mm in diameter. The fruit is oval, about 3 cm long and 2 cm in diameter, and contains two to five seeds that occupy ~40-50% of the fruit volume. The tree reaches a maximum height of 20 meters. It grows well in tropical or subtropical conditions, and is susceptible to cold. Wampee trees grow well in a wide range of soil, but will grow best in rich loam.
The wampee is cultivated for its fruit, which is a grape-sized, fragrant citrus. Its skin and seeds are often eaten alongside the pulp, much like kumquat. The tree is popular in China, Vietnam, the Philippines, Malaysia, and Indonesia. Less frequently, it is grown in India, Sri Lanka, and Queensland; occasionally, it is cultivated even in Florida and Hawaii.
It is grown extensively in the New Territories of Hong Kong, and is a popular fruit among the indigenous Hakka villagers.
Gallery |
https://en.wikipedia.org/wiki/Chicken%20shit | "Chicken shit", or more commonly "chickenshit", is a slang term, usually regarded as vulgar. The online Merriam-Webster dictionary defines chickenshit (one word) as a vulgar adjective with two possible meanings: "petty, insignificant" or "lacking courage, manliness, or effectiveness".
Coward
The term has been used figuratively since 1929 to allege cowardice. It can be used as either a noun or an adjective; it is always an insult. In October 2014, an unnamed senior official in the Obama administration was reported to have called Israeli prime minister Benjamin Netanyahu a "chickenshit", adding that he "has got no guts". Secretary of State John Kerry apologized to the prime minister, while Israeli media scrambled to understand or translate the idiom.
Petty
The alternate meaning of "petty, insignificant nonsense" may be used as either a noun or an adjective. According to Paul Fussell in his book Wartime, chickenshit in this sense has military roots: "Chickenshit refers to behavior that makes military life worse than it need be: petty harassment of the weak by the strong; open scrimmage for power and authority and prestige; sadism thinly disguised as necessary discipline; a constant 'paying off of old scores'; and insistence on the letter rather than the spirit of the ordinances ... Chickenshit is so called—instead of horse—or bull—or elephant shit—because it is small-minded and ignoble and takes the trivial seriously."
Other uses
The phrase "You can't make chicken salad out of chicken shit" is sometimes used as a variant of "you can't make a silk purse out of a sow's ear". The expression dates back to at least the 1920s, when "chicken feathers" was sometimes used as a euphemism for chicken shit.
U.S. President Lyndon B. Johnson once said, "I may not know much, but I do know the difference between chicken shit and chicken salad."
See also
Bullshit
On Bullshit
Chicken manure
Shit
Shit happens |
https://en.wikipedia.org/wiki/Zoophily | Zoophily, or zoogamy, is a form of pollination whereby pollen is transferred by animals, usually by invertebrates but in some cases vertebrates, particularly birds and bats, but also by other animals. Zoophilous species frequently have evolved mechanisms to make themselves more appealing to the particular type of pollinator, e.g. brightly colored or scented flowers, nectar, and appealing shapes and patterns. These plant-animal relationships are often mutually beneficial because of the food source provided in exchange for pollination.
Pollination is defined as the transfer of pollen from the anther to the stigma. There are many vectors for pollination, including abiotic (wind and water) and biotic (animal). There are benefits and costs associated with any vector. For instance, using animal pollination is beneficial because the process is more directed and often results in pollination. At the same time it is costly for the plant to produce rewards, such as nectar, to attract animal pollinators. Not producing such rewards is one benefit of using abiotic pollinators, but a cost associated with this approach is that the pollen may be distributed more randomly. In general, pollination by animals occurs after they reach inside the flowers for nectar. While feeding on the nectar, the animal rubs or touches the stamens and is covered in pollen. Some of this pollen will be deposited on the stigma of the next flower it visits, pollinating the flower.
Insect pollination
This is known as entomophily. There are many different subtypes.
Bee pollination (melittophily)
There are diverse types of bees (such as honeybees, bumblebees, and orchid bees), forming large groups that are quite distinctive in size, tongue length and behaviour (some solitary, some colonial); thus generalization about bee pollination is difficult. Some plants can only be pollinated by bees because their anthers release pollen internally, and it must be shaken out by buzz pollination (also known as "sonicati |
https://en.wikipedia.org/wiki/Animality%20studies | Animality studies is an emerging interdisciplinary academic field focused on the cultural study of animals and animality. It can be distinguished from animal studies and critical animal studies by its resistance to animal rights or animal welfare as an explicit justification for work in this field. According to Michael Lundblad, "If animal studies can be seen as work that explores representations of animality and related discourses with an emphasis on advocacy for nonhuman animals, animality studies becomes work that emphasizes the history of animality in relation to human cultural studies, without an explicit call for nonhuman advocacy."
See also
Anthrozoology |
https://en.wikipedia.org/wiki/State%20of%20Denial%20%28film%29 | State of Denial is a 2003 documentary film about AIDS in Africa, produced and directed by Elaine Epstein. The film highlights the errors of President Mbeki's government, which insists that there isn't enough evidence to show that HIV causes AIDS and refuses vital life-saving drugs to their people because of unknown long-term risks. The film follows the stories of HIV positive Africans and activists as well as their careers, interspersed with the harrowing statistics of the AIDS epidemic in Africa. It features various HIV positive patients coping with the disease in times when the use of ARV medicine was strongly discouraged by the South African government.
The film captures the desperation and growing discontent of average South Africans infected and affected by the disease. Some of the subjects interviewed make heartbreaking but inspirational statements about AIDS and how living with it is like. After the death of his brother who also succumbed to the disease, a young man is filmed saying the following:
For me, it was the most traumatic time in my life because I could see myself in him. You know, he didn’t really have to die as helplessly as he did. And not only him, but thousands and thousands of people are dying unnecessarily. It makes me sick.
The film also features Zackie Achmat, an HIV positive AIDS activist and co-founder of Treatment Action Campaign (TAC), who refused to take ARVs until they were made available to the general public.
State of Denial was first shown at the 2003 Sundance Film Festival. It later aired on TV as part of the Acclaimed Point of View Documentary Film Series. Four of the subjects interviewed died before the film was released.
See also
AIDS denialism, a movement challenging the scientific consensus that HIV causes AIDS. |
https://en.wikipedia.org/wiki/Role-taking%20theory | Role-taking theory (or social perspective taking) is the social-psychological concept that one of the most important factors in facilitating social cognition in children is the growing ability to understand others’ feelings and perspectives, an ability that emerges as a result of general cognitive growth. Part of this process requires that children come to realize that others’ views may differ from their own. Role-taking ability involves understanding the cognitive and affective (i.e. relating to moods, emotions, and attitudes) aspects of another person's point of view, and differs from perceptual perspective taking, which is the ability to recognize another person's visual point of view of the environment. Furthermore, albeit some mixed evidence on the issue, role taking and perceptual perspective taking seem to be functionally and developmentally independent of each other.
Robert Selman is noted for emphasizing the importance of this theory within the field of cognitive development. He argues that a matured role-taking ability allows us to better appreciate how our actions will affect others, and if we fail to develop the ability to role take, we will be forced to erroneously judge that others are behaving solely as a result of external factors. One of Selman's principal additions to the theory has been an empirically supported developmental theory of role-taking ability.
Social cognitive research on children's thoughts about others’ perspectives, feelings, and behaviors has emerged as one of the largest areas of research in the field. Role-taking theory can provide a theoretical foundation upon which this research can rest and be guided by and has relations and applications to numerous other theories and topics.
Selman's developmental theory
Robert Selman developed his developmental theory of role-taking ability based on four sources. The first is the work of M. H. Feffer (1959, 1971), and Feffer and Gourevitch (1960), which related role-taking ability to Piag |
https://en.wikipedia.org/wiki/Check%20Point | Check Point is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management.
, the company has approximately 6,000 employees worldwide. Headquartered in Tel Aviv, Israel and San Carlos, California, the company has development centers in Israel and Belarus and previously held in the United States (ZoneAlarm), Sweden (former Protect Data development centre) following acquisitions of companies who owned these centers. The company has offices in over 70 locations worldwide including main offices in North America, 10 in the United States (including in San Carlos, California and Dallas, Texas), 4 in Canada (including Ottawa, Ontario) as well as in Europe (London, Paris, Munich, Madrid) and in Asia Pacific (Singapore, Japan, Bengaluru, Sydney).
History
Check Point was established in Ramat Gan, Israel in 1993, by Gil Shwed (CEO ), Marius Nacht (Chairman ) and Shlomo Kramer (who left Check Point in 2003). Shwed had the initial idea for the company's core technology known as stateful inspection, which became the foundation for the company's first product, FireWall-1; soon afterwards they also developed one of the world's first VPN products, VPN-1. Shwed developed the idea while serving in the Unit 8200 of the Israel Defense Forces, where he worked on securing classified networks.
Initial funding of US$250,000 was provided by venture capital fund BRM Group.
In 1994 Check Point signed an OEM agreement with Sun Microsystems, followed by a distribution agreement with HP in 1995. The same year, the U.S. head office was established in Redwood City, California.
By February 1996, the company was named worldwide firewall market leader by IDC, with a market share of 40 percent.
In June 1996 Check Point raised $67 million from its initial public offering on NASDAQ.
In 1998, Check Point established a partnership |
https://en.wikipedia.org/wiki/Non-orientable%20wormhole | In wormhole theory, a non-orientable wormhole is a wormhole connection that appears to reverse the chirality of anything passed through it. It is related to the "twisted" connections normally used to construct a Möbius strip or Klein bottle.
In topology, this sort of connection is referred to as an Alice handle.
Theory
"Normal" wormhole connection
Matt Visser has described a way of visualising wormhole geometry:
Take a "normal" region of space
"Surgically remove" spherical volumes from two regions ("spacetime surgery")
Associate the two spherical bleeding edges, so that a line attempting to enter one "missing" spherical volume encounters one bounding surface and then continues outward from the other.
Although these instructions seem straightforward, there are two topologically distinct ways the two surfaces can be mapped to one another. If we draw a map of the Earth's surface onto one wormhole mouth, how does this map appear at the second mouth?
For a "conventional" wormhole, the network of points will be seen at the second surface to be inverted, as if one surface was the mirror image of the other – countries will appear back-to-front, as will any text written on the map. This is as it should be, because in a sense, the second mouth is showing us the view of the same map seen "from the other side".
"Reversed" wormhole connection
The alternative way of connecting the surfaces makes the "connection map" appear the same at both mouths.
This configuration reverses the "handedness" or "chirality" of any objects passing through. If a spaceship pilot writes the word "IOTA" on the inside of their forward window, then, as the ship's nose passes through the wormhole and the ship's window intersects the surface, an observer at the other mouth looking in through the glass should see the same word, "IOTA", written on the window of the emerging spaceship. Once the spaceship has passed through, the curious onlooker may peek inside the spaceship cockpit and find tha |
https://en.wikipedia.org/wiki/Application%20permissions | Permissions are a means of controlling and regulating access to specific system- and device-level functions by software. Typically, types of permissions cover functions that may have privacy implications, such as the ability to access a device's hardware features (including the camera and microphone), and personal data (such as device storage, the contacts list, and the user's present geographical location). Permissions are typically declared in an application's manifest, and certain permissions must be specifically granted at runtime by the user—who may revoke the permission at any time.
Permission systems are common on mobile operating systems, where permissions needed by specific apps must be disclosed via the platform's app store.
Mobile devices
On mobile operating systems for smartphones and tablets, typical types of permissions regulate:
Access to storage and personal information, such as contacts, calendar appointments, etc.
Location tracking.
Access to the device's internal camera and/or microphone.
Access to biometric sensors, including fingerprint readers and other health sensors..
Internet access.
Access to communications interfaces (including their hardware identifiers and signal strength where applicable, and requests to enable them), such as Bluetooth, Wi-Fi, Near-field communication (NFC), and others.
Making and receiving phone calls.
Sending and reading text messages
The ability to perform in-app purchases.
The ability to "overlay" themselves within other apps.
Installing, deleting and otherwise managing applications.
Authentication tokens (i.e. OAuth ones) of web services stored in system storage for sharing between apps.
Prior to Android 6.0 "Marshmallow", permissions were automatically granted to apps at runtime, and they were presented upon installation in Google Play Store. Since Marshmallow, certain permissions now require the app to request permission at runtime by the user. These permissions may also be revoked at any time via |
https://en.wikipedia.org/wiki/Superposition%20calculus | The superposition calculus is a calculus for reasoning in equational logic. It was developed in the early 1990s and combines concepts from first-order resolution with ordering-based equality handling as developed in the context of (unfailing) Knuth–Bendix completion. It can be seen as a generalization of either resolution (to equational logic) or unfailing completion (to full clausal logic). Like most first-order calculi, superposition tries to show the unsatisfiability of a set of first-order clauses, i.e. it performs proofs by refutation. Superposition is refutation complete—given unlimited resources and a fair derivation strategy, from any unsatisfiable clause set a contradiction will eventually be derived.
, most of the (state-of-the-art) theorem provers for first-order logic are based on superposition (e.g. the E equational theorem prover), although only a few implement the pure calculus.
Implementations
E
SPASS
Vampire
Waldmeister (official web page) |
https://en.wikipedia.org/wiki/Geomagnetic%20pole | The geomagnetic poles are antipodal points where the axis of a best-fitting dipole intersects the surface of Earth. This theoretical dipole is equivalent to a powerful bar magnet at the center of Earth, and comes closer than any other point dipole model to describing the magnetic field observed at Earth's surface. In contrast, the magnetic poles of the actual Earth are not antipodal; that is, the line on which they lie does not pass through Earth's center.
Owing to motion of fluid in the Earth's outer core, the actual magnetic poles are constantly moving (secular variation). However, over thousands of years, their direction averages to the Earth's rotation axis. On the order of once every half a million years, the poles reverse (i.e., north switches place with south) although the time frame of this switching can be anywhere from every 10 thousand years to every 50 million years. The poles also swing in an oval of around in diameter daily due to solar wind deflecting the magnetic field.
Although the geomagnetic pole is only theoretical and cannot be located directly, it arguably is of more practical relevance than the magnetic (dip) pole. This is because the poles describe a great deal about the Earth's magnetic field, determining for example where auroras can be observed. The dipole model of the Earth's magnetic field consists of the location of geomagnetic poles and the dipole moment, which describes the strength of the field.
Definition
As a first-order approximation, the Earth's magnetic field can be modeled as a simple dipole (like a bar magnet), tilted about 9.6° with respect to the Earth's rotation axis (which defines the Geographic North and Geographic South Poles) and centered at the Earth's center. The North and South Geomagnetic Poles are the antipodal points where the axis of this theoretical dipole intersects the Earth's surface. Thus, unlike the actual magnetic poles, the geomagnetic poles always have an equal degree of latitude and supplementary de |
https://en.wikipedia.org/wiki/Active%20networking | Active networking is a communication pattern that allows packets flowing through a telecommunications network to dynamically modify the operation of the network.
Active network architecture is composed of execution environments (similar to a unix shell that can execute active packets), a node operating system capable of supporting one or more execution environments.
It also consists of active hardware, capable of routing or switching as well as executing code within active packets.
This differs from the traditional network architecture which seeks robustness and stability by attempting to remove complexity and the ability to change its fundamental operation from underlying network components. Network processors are one means of implementing active networking concepts. Active networks have also been implemented as overlay networks.
What does it offer?
Active networking allows the possibility of highly tailored and rapid "real-time" changes to the underlying network operation.
This enables such ideas as sending code along with packets of information allowing the data to change its form (code) to match the channel characteristics.
The smallest program that can generate a sequence of data can be found in the definition of Kolmogorov complexity.
The use of real-time genetic algorithms within the network to compose network services is also enabled by active networking.
How it relates to other networking paradigms
Active networking relates to other networking paradigms primarily based upon how computing and communication are partitioned in the architecture.
Active networking and software-defined networking
Active networking is an approach to network architecture with in-network programmability. The name derives from a comparison with network approaches advocating minimization of in-network processing, based on design advice such as the "end-to-end argument". Two major approaches were conceived: programmable network elements ("switches") and capsules, a programmabi |
https://en.wikipedia.org/wiki/Constant-weight%20code | In coding theory, a constant-weight code, also called an m-of-n code, is an error detection and correction code where all codewords share the same Hamming weight.
The one-hot code and the balanced code are two widely used kinds of constant-weight code.
The theory is closely connected to that of designs (such as t-designs and Steiner systems). Most of the work on this field of discrete mathematics is concerned with binary constant-weight codes.
Binary constant-weight codes have several applications, including frequency hopping in GSM networks.
Most barcodes use a binary constant-weight code to simplify automatically setting the brightness threshold that distinguishes black and white stripes.
Most line codes use either a constant-weight code, or a nearly-constant-weight paired disparity code.
In addition to use as error correction codes, the large space between code words can also be used in the design of asynchronous circuits such as delay insensitive circuits.
Constant-weight codes, like Berger codes, can detect all unidirectional errors.
A(n, d, w)
The central problem regarding constant-weight codes is the following: what is the maximum number of codewords in a binary constant-weight code with length , Hamming distance , and weight ? This number is called .
Apart from some trivial observations, it is generally impossible to compute these numbers in a straightforward way. Upper bounds are given by several important theorems such as the first and second Johnson bounds, and better upper bounds can sometimes be found in other ways. Lower bounds are most often found by exhibiting specific codes, either with use of a variety of methods from discrete mathematics, or through heavy computer searching. A large table of such record-breaking codes was published in 1990, and an extension to longer codes (but only for those values of and which are relevant for the GSM application) was published in 2006.
1-of-N codes
A special case of constant weight codes are the on |
https://en.wikipedia.org/wiki/Electronic%20Communications%20Act%202000 | The Electronic Communications Act 2000 (c.7) is an Act of the Parliament of the United Kingdom that:
Had provisions to regulate the provision of cryptographic services in the UK (ss.1-6); and
Confirms the legal status of electronic signatures (ss.7-10).
The United Kingdom government had come to the conclusion that encryption, encryption services and electronic signatures would be important to e-commerce in the UK.
By 1999, however, only the security services still hankered after key escrow. So a "sunset clause" was put in the bill. The Electronic Communications Act 2000 gave the Home Office the power to create a registration regime for encryption services. This was given a five-year period before it would automatically lapse, which eventually happened in May 2006. |
https://en.wikipedia.org/wiki/Meta-IV%20%28specification%20language%29 | The Meta-IV (pronounced like "metaphor") was an early version of the specification language of the Vienna Development Method formal method for the development of computer-based systems.
History
One of the first occurrences of Meta-IV in print appears to be
"Programming in the Meta-language: A Tutorial".
Dines Bjørner used it in the very beginning of his tutorial as a footnote
This paper provides an informal introduction to the "art" of abstractly specifying software architectures using the VDM meta-language*. A formal treatment of the semantics, as well as a BNF-like concrete syntax, of a large subset of the meta-language is given in [Jones 78a] following this paper.
The spirit of the Meta-IV specification language is well captured by the following passage
We stress here... that the meta-language is to be used, not for solving algorithmic problems (on a computer), but for specifying, in an implementation-independent way, the architecture (or models) of software. Instead of using informal English mixed with technical jargon, we offer you a very-high-level 'programming' language. We do not offer an interpreter or compiler for this meta-language. And we have absolutely no intention of ever wasting our time trying to mechanize this meta-language. We wish, as we have done in the past, and as we intend to continue doing in the future, to further develop the notation and to express notions in ways for which no mechanical interpreter system can ever be provided.
VDM is a Method. The Meta-IV was the Specification language that accompanied the method, and the VDM-SL is the current standardized form of that language.
Since the VDM-SL has become standardized, then one may use Meta-IV to denote the three specific Schools of
the VDM which existed (and to some extent still do) from the 1970s onwards:
The Danish School — founded by Dines Bjørner
The English School — founded by Cliff Jones
The Irish School — founded by Mícheál Mac an Airchinnigh
A brief account of these diff |
https://en.wikipedia.org/wiki/SIMPLE%20%28military%20communications%20protocol%29 | The Standard Interface for Multiple Platform Link Evaluation (SIMPLE) is a military communications protocol defined in NATO's Standardization Agreement STANAG 5602.
Purpose
SIMPLE defines a communications protocol to provide the means for geographically (national and international) separated Tactical Data Link (TDL) equipment (C4ISR, C2 and non-C2 test facilities) to exchange environment data and TDL messages in order to conduct detailed TDL Interoperability (IO) testing. It is intended to provide specifications for a common standard to interconnect ground rigs of all types, such as simulation and integration facilities. The SIMPLE allows transmission of M-Series and J-Series messages over IP-based protocols. Previously J-Series messages could be sent using the Link 16 protocol. However, Link 16 is a radio protocol with a frequency range that limits the exchange of information to within line-of-sight. Use of flexible bearer protocols, such as IP, makes it easier to exchange such J-Series data, particularly for simulations and integration. However, the SIMPLE is not limited to use for simulation and integration, and is finding applications beyond its original purpose wherever transmission of J-Series data is not amenable over radio protocols such as Link 16.
Distributed Interactive Simulation (DIS) protocols
The SIMPLE standard specifies the distributed transfer of a simulated scenario/synthetic environment using the IEEE Distributed Interactive Simulation (DIS) protocols. DIS is a government/industry initiative to define an infrastructure for linking simulations of various types at multiple locations to create realistic, complex, virtual worlds for the simulation of highly interactive activities. A new protocol data unit (PDU) definition, the DIS PDU was added to the baseline protocol to support the exchange of DIS PDUs for simulated entities. The content of the SIMPLE DIS PDU packet is related to the DIS PDUs defined in the IEEE 1278.1 standard. As such, |
https://en.wikipedia.org/wiki/SAP1a | SAP1A is one of a family of proteins that contains a unique DNA binding domain termed the ETS domain.
Transcription
The transcriptional activation domain of SAP1a resides within the C-terminal region, the function of which may be impeded by the N-terminus. Several potential ERK consensus sites within the C-terminal region of SAP1a can modulate its transactivation efficacy, implicating that SAP1a is a direct target of ERKs.
Interactions
SAP1a has been shown to interact with the c-fos serum response element upon recruitment by the serum response factor.
SAP1a is a nuclear protein stimulating transcription via the c-fos serum response element, and additionally via an Ets binding site independently of the serum response factor.
Insulin activated the human INSIG2 promoter in a process mediated by phosphorylated SAP1a.
Sap1a is phosphorylated efficiently by ERKs but not by SAPK/JNKs. Serum response factor-dependent ternary complex formation by Sap1a is stimulated by ERK phosphorylation but not by SAPK/JNKs. Moreover, Sap1a-mediated transcription is activated by mitogenic signals but not by cell stress.
ELK1 and SAP1a have been shown to form ternary complexes with SRF on the serum response elements (SRE) located in the c-fos promoter. ELK1, SAPla, FLI1 and EWS-FLI1 are able to form ternary complexes with SRF on EGR1 SREs. In addition, ELK1 and SAP1a can also form quaternary complexes on the Egr1 SREI.
Clinical significance
SAP1a activation by ERK may play an important role in the transformation of extracellular stimuli into a nuclear response. |
https://en.wikipedia.org/wiki/Confidentiality | Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits the access or places restrictions on certain types of information.
Legal confidentiality
By law, lawyers are often required to keep confidential anything pertaining to the representation of a client. The duty of confidentiality is much broader than the attorney–client evidentiary privilege, which only covers communications between the attorney and the client.
Both the privilege and the duty serve the purpose of encouraging clients to speak frankly about their cases. This way, lawyers can carry out their duty to provide clients with zealous representation. Otherwise, the opposing side may be able to surprise the lawyer in court with something he did not know about his client, which may weaken the client's position. Also, a distrustful client might hide a relevant fact he thinks is incriminating, but that a skilled lawyer could turn to the client's advantage (for example, by raising affirmative defenses like self-defense) However, most jurisdictions have exceptions for situations where the lawyer has reason to believe that the client may kill or seriously injure someone, may cause substantial injury to the financial interest or property of another, or is using (or seeking to use) the lawyer's services to perpetrate a crime or fraud. In such situations the lawyer has the discretion, but not the obligation, to disclose information designed to prevent the planned action. Most states have a version of this discretionary disclosure rule under Rules of Professional Conduct, Rule 1.6 (or its equivalent). A few jurisdictions have made this traditionally discretionary duty mandatory. For example, see the New Jersey and Virginia Rules of Professional Conduct, Rule 1.6.
In some jurisdictions, the lawyer must try to convince the client to conform his or her conduct to the boundaries of the law before disclosing any otherwise confidential information. These exce |
https://en.wikipedia.org/wiki/Lekkerbekje | Lekkerbekje is a Dutch fish dish. It is sometimes called the Dutch version of fish and chips.
.
Etymology
Lekkerbekje is a diminuitive of Lekkerbek meaning Gourmand.
Origin
Lekkerbekje originated in IJmuiden.
Composition
Lekkerbekje consists of a fish fried in batter and deep fried similar to Fish and chips.
Originally Lekkerbekje only used Whiting, however now it includes a variety of white fish such as cod, Hake, and Pollock.
Lekkerbekje is often served with fried potatoes and Tartar sauce.
See also
Kibbeling |
https://en.wikipedia.org/wiki/E2open | e2open, LLC is a business-to-business provider of cloud-based, on-demand software for supply chains for computer, telecom and electronics systems, components and services. The company was founded in 2000 as a joint project of 8 major companies: Hitachi, IBM, LG Electronics, Matsushita, Nortel, Seagate, Solectron, and Toshiba.
E2open offers its products across a variety of industries, including high technology, industrial manufacturing, telecommunications, life sciences, oil and gas, consumer electronics, aerospace and defense, and consumer goods.
Company
E2open is headquartered in Austin, Texas, with offices in Parsippany, NJ, Atlanta, Germany, United Kingdom, Denmark, The Netherlands, Belgium, China, Australia, New Zealand, Malaysia, India and Perú.
According to the company's estimate, more than 60,000 trading partners and 200,000 unique registered users currently participate in the E2open Business Network.
In July 2012, E2open went public on the NASDAQ.
In March 2015, Insight Venture Partners announced that it had completed its acquisition of E2open.
In February 2021, E2open went public via SPAC (special purpose acquisition company) merger and began trading under the ticker ETWO.
Acquisitions by E2open
July 2013: acquired supply chain vendor ICON-SCM.
June 2014: acquisition of SERUS Corporation, a "cloud-based manufacturing and product management provider".
March 2016: acquisition of Terra Technology.
June 2016: acquired Orchestro.
February 2017: acquired Steelwedge.
Late 2017: acquired Channel Data Management provider Zyme.
Early 2018: acquired Entomo and Birch Worldwide.
October 2018: bought the shipping platform INTTRA.
October 2018: bought Cloud Logistics.
July 2, 2019: E2open completes acquisition of global trade management software company Amber Road.
May 2021: acquired logistics execution platform BluJay Solutions for $1.7B.
March 2022: acquisition of Logistyx Technologies for .
See also
Supply-chain management
Electronic commerce
Ente |
https://en.wikipedia.org/wiki/Ernst%20Stueckelberg | Ernst Carl Gerlach Stueckelberg (baptised as Johann Melchior Ernst Karl Gerlach Stückelberg, full name after 1911: Baron Ernst Carl Gerlach Stueckelberg von Breidenbach zu Breidenstein und Melsbach; 1 February 1905 – 4 September 1984) was a Swiss mathematician and physicist, regarded as one of the most eminent physicists of the 20th century. Despite making key advances in theoretical physics, including the exchange particle model of fundamental forces, causal S-matrix theory, and the renormalization group, his idiosyncratic style and publication in minor journals led to his work not being widely recognized until the mid-1990s.
Early life
Born into a semi-aristocratic family in Basel in 1905, Stueckelberg's father was a lawyer, and his paternal grandfather a distinguished Swiss artist. A highly gifted school student, Stueckelberg initially began a physics degree at the University of Basel in 1923.
Career
While still a student, Stueckelberg was invited by the distinguished quantum theorist Arnold Sommerfeld, to attend his lectures at the University of Munich. He went on to gain a Ph.D. on cathode physics in 1927. Later that year he went to Princeton University, becoming an assistant professor in 1930. He was elected a Fellow of the American Physical Society in 1931.
He returned to Switzerland in 1932, working first at the University of Basel before switching the following year to the University of Zurich. In 1934 he moved again to the University of Geneva, which together with the University of Lausanne became his principal bases for the rest of his career.
Stueckelberg's sojourn in Zurich led to contact with leading quantum theorists Wolfgang Pauli and Gregor Wentzel, which in turn led him to focus on the emerging theory of elementary particles.
In 1934 he devised a fully Lorentz-covariant perturbation theory for quantum fields. The approach proposed by Stueckelberg was very powerful, but was not adopted by others at the time, and has now been all but forgotten. |
https://en.wikipedia.org/wiki/Protein%20adsorption%20in%20the%20food%20industry | Protein adsorption refers to the adhesion of proteins to solid surfaces. This phenomenon is an important issue in the food processing industry, particularly in milk processing and wine and beer making. Excessive adsorption, or protein fouling, can lead to health and sanitation issues, as the adsorbed protein is very difficult to clean and can harbor bacteria, as is the case in biofilms. Product quality can be adversely affected if the adsorbed material interferes with processing steps, like pasteurization. However, in some cases protein adsorption is used to improve food quality, as is the case in fining of wines.
Protein adsorption
Protein adsorption and protein fouling can cause major problems in the food industry (particularly the dairy industry) when proteins from food adsorb to processing surfaces, such as stainless steel or plastic (e.g. polypropylene). Protein fouling is the gathering of protein aggregates on a surface. This is most common in heating processes that create a temperature gradient between the equipment and the bulk substance being heated. In protein-fouled heating equipment, adsorbed proteins can create an insulating layer between the heater and the bulk material, reducing heating efficiency. This leads to inefficient sterilization and pasteurization. Also, proteins stuck to the heater may cause a burned taste or color in the bulk material. Additionally, in processes that employ filtration, protein aggregates that gather on the surface of the filter can block the flow of the bulk material and greatly reduce filter efficiency.
Examples of adsorption
Beer stone
Beerstone is a buildup that forms when oxalate, proteins, and calcium or magnesium salts from the grains and water in the beer brewing process precipitate and form scale on kegs, barrels and tap lines. The minerals adsorb to the surface of the container first, driven by charge attractions. Proteins are often coordinated to these minerals in the solution and can bind with them t |
https://en.wikipedia.org/wiki/SMCHD1 | Structural Maintenance of Chromosomes flexible Hinge Domain Containing 1 (SMCHD1) is a protein that in humans is encoded by the SMCHD1 gene. Mutations in SMCHD1 are causative for development of facioscapulohumeral muscular dystrophy type 2 (FSHD2) and Bosma arhinia microphthalmia syndrome (BAMS).
Without maternal SMCHD1 in the egg cell, children bear with altered skeletal structures. |
https://en.wikipedia.org/wiki/Jacques%20Monod | Jacques Lucien Monod (February 9, 1910 – May 31, 1976) was a French biochemist who won the Nobel Prize in Physiology or Medicine in 1965, sharing it with François Jacob and André Lwoff "for their discoveries concerning genetic control of enzyme and virus synthesis".
Monod and Jacob became famous for their work on the E. coli lac operon, which encodes proteins necessary for the transport and breakdown of the sugar lactose (lac). From their own work and the work of others, they came up with a model for how the levels of some proteins in a cell are controlled. In their model, the manufacture of proteins, such as the ones encoded within the lac (lactose) operon, is prevented when a repressor, encoded by a regulatory gene, binds to its operator, a specific site in the DNA sequence that is close to the genes encoding the proteins. (It is now known that a repressor bound to an operator physically blocks RNA polymerase from binding to the promoter, the site where transcription of the adjacent genes begins.)
Study of the control of expression of genes in the lac operon provided the first example of a system for the regulation of transcription. Monod also suggested the existence of messenger RNA molecules that link the information encoded in DNA and proteins. For these contributions he is widely regarded as one of the founders of molecular biology.
Career and research
In Monod's studies he discovered that the course work was decades behind the current biological science. He learned from other students a little older than himself, rather than from the faculty. "To George Teissier he owes a preference for quantitative descriptions; André Lwoff initiated him into the potentials of microbiology; to Boris Ephrussi he owes the discovery of physiological genetics, and to Louis Rapkine the concept that only chemical and molecular descriptions could provide a complete interpretation of the function of living organisms."
Before his doctoral work, Monod spent a year in the laborato |
https://en.wikipedia.org/wiki/Cuckoo%20clock | A cuckoo clock is a type of clock, typically pendulum driven, that strikes the hours with a sound like a common cuckoo call and has an automated cuckoo bird that moves with each note. Some move their wings and open and close their beaks while leaning forwards, whereas others have only the bird's body leaning forward. The mechanism to produce the cuckoo call has been in use since the middle of the 18th century and has remained almost without variation.
It is unknown who invented the cuckoo clock and where the first one was made. It is thought that much of its development and evolution was made in the Black Forest area in southwestern Germany (in the modern state of Baden-Württemberg), the region where the cuckoo clock was popularized and from where it was exported to the rest of the world, becoming world-famous from the mid-1850s on. Today, the cuckoo clock is one of the favourite souvenirs of travellers in Germany, Switzerland and Austria. It has become a cultural icon of Germany.
Characteristics
The design of a cuckoo clock is now conventional. Many are made in the "traditional style", which are made to hang on a wall. The classical or traditional type includes two subgroups; the carved ones, whose wooden cases are decorated with leaves, animals, etc., and a second one with cases in the shape of a chalet. They have an automaton of a bird that appears through a small trap door when the clock strikes. The cuckoo bird is activated by the clock movement as the clock strikes by means of an arm that is triggered on the hour and half hour.
There are two kinds of movements: one-day (30-hour) and eight-day clockworks. Some have musical devices, and play a tune on a Swiss music box after striking the hours and half-hours. Usually the melody sounds only at full hours in eight-day clocks and both at full and half hours in the one-day timepieces. Musical cuckoo clocks frequently have other automata which move when the music box plays. Today's cuckoo clocks are almost always |
https://en.wikipedia.org/wiki/Biology%20of%20the%20Cell | Biology of the Cell is a peer-reviewed scientific journal in the field of cell biology, cell physiology, and molecular biology of animal and plant cells, microorganisms and protists. Topics covered include development, neurobiology, and immunology, as well as theoretical or biophysical modelling.
The journal is currently published monthly by Wiley-Blackwell on behalf of the Société Française des Microscopies and the Société de Biologie Cellulaire de France.
History
The journal first appeared in 1962 and was originally titled Journal de Microscopie (1962–1974). In 1975 the journal was retitled Journal de Microscopie et de Biologie Cellulaire (; 1975–1976). It was later retitled Biologie Cellulaire (; 1977–1980), becoming Biology of the Cell in 1981.
Articles were originally published in either English or French, with summaries in both languages.
Modern journal
Content from 1988 is available online in PDF format, with papers from 2005 also being available in HTML, and from 2006 in an enhanced full-text format.
The journal's 2014 impact factor was 3.506. Biology of the Cell is indexed by BIOBASE, BIOSIS, CAB International, Cambridge Scientific Abstracts, Chemical Abstracts Service, Current Contents/Life Sciences, EMBASE/Excerpta Medica, MEDLINE/Index Medicus, and ProQuest Information and Learning
Articles are primarily research and reviews. Themed series on specific topics are scheduled. They were: Stem Cells (2005), RNA localization (2005), Aquaporins (2005), Synapses (2007), Cell Cycle and Cancer (2008), Microtubules, RNA regulation (2008), Microbiology and Cell Biology (2010), Cilia (2011), Endoplasmic Reticulum (2012), Epigenetics (2012), Post-Translational Modification and Virus Intracellular Trafficking (2012), Optogenetics (2014), Microvesicles and Exosomes (2015), Systems Cell Biology (2015), Translating Canceromics into function (2015).
The editor-in-chief of this journal is René-Marc Mège, a team leader at the Institut Jacques Monod. He was preceded |
https://en.wikipedia.org/wiki/Numbers%20in%20Egyptian%20mythology | Certain numbers were considered sacred, holy, or magical by the ancient Egyptians, particularly 2, 3, 4, 7, and their multiples and sums.
Three: symbol of plurality
The basic symbol for plurality among the ancient Egyptians was the number three: even the way they wrote the word for "plurality" in hieroglyphics consisted of three vertical marks (𓏼). Triads of deities were also used in Egyptian religion to signify a complete system. Examples include references to the god Atum "when he was one and became three" when he gave birth to Shu and Tefnut, and the triad of Horus, Osiris, and Isis.
Examples
The beer used to trick Sekhmet soaked three hands into the ground.
The second god, Re, named three times to define the sun: dawn, noon, and evening.
Thoth is described as the “thrice-great god of wisdom”.
A doomed prince was doomed to three fates: to die by a crocodile, a serpent, or a dog.
Three groups of three attempts each (nine attempts) were required for a legendary peasant to recover his stolen goods.
A boasting mage claimed to be able to cast a great darkness to last three days.
After asking Thoth for help, a King of Ethiopia was brought to Thebes and publicly beaten three further times.
An Ethiopian mage tried—and failed—three times to defeat the greatest mage of Egypt.
An Egyptian mage, in an attempt to enter the land of the dead, threw a certain powder on a fire three times.
There are twelve (three times four) sections of the Egyptian land of the dead. The dead disembark at the third.
The Knot of Isis, representing life, has three loops.
Five
Examples
The second god, Rê, named five gods and goddesses.
Thoth added five days to the year by winning the light from the Moon in a game of gambling.
It took five days for the five children of Nut and Geb to be born. These are Osiris, Nephthys, Isis, Set and Haroeris (Horus the Elder) - not be mistaken with Harpocrates (Horus the Younger), who defeated Set in battle.
A boasting mage claimed to be able to bring the Ph |
https://en.wikipedia.org/wiki/Ascorbyl%20palmitate | Ascorbyl palmitate is an ester formed from ascorbic acid and palmitic acid creating a fat-soluble form of vitamin C. In addition to its use as a source of vitamin C, it is also used as an antioxidant food additive (E number E304). It is approved for use as a food additive in the EU, the U.S., Canada, Australia, and New Zealand.
Ascorbyl palmitate is also marketed as "vitamin C ester". It is synthesized by acylation of vitamin C using different acyl donors.
See also
Ascorbyl stearate
Vitamin C
Mineral ascorbates |
https://en.wikipedia.org/wiki/HyperTransport%20Consortium | The HyperTransport Consortium is an industry consortium responsible for specifying and promoting the computer bus technology called HyperTransport.
Organizational form
The Technical Working Group along with several Task Forces manage the HyperTransport specification and drive new developments. A Marketing Working Group promotes the use of the technology and the consortium.
History
It was founded in 2001 by Advanced Micro Devices, Alliance Semiconductor, Apple Computer, Broadcom Corporation, Cisco Systems, NVIDIA, PMC-Sierra, Sun Microsystems, and Transmeta. As of 2009 it has over 50 members.
Executives
As of 2009, Mike Uhler of AMD is the President of the Consortium, Mario Cavalli is the General Manager, Brian Holden of PMC-Sierra is both the Vice President and the Chair of the Technical Working Group, Deepika Sarai is the Treasurer.
External links
HyperTransport Consortium web site
Technology Page
Link Technical Specifications
HTX and DUT Connector Specifications
White Papers
Technology consortia
Computer buses |
https://en.wikipedia.org/wiki/Client-side%20encryption | Client-side encryption is the cryptographic technique of encrypting data on the sender's side, before it is transmitted to a server such as a cloud storage service. Client-side encryption features an encryption key that is not available to the service provider, making it difficult or impossible for service providers to decrypt hosted data. Client-side encryption allows for the creation of applications whose providers cannot access the data its users have stored, thus offering a high level of privacy. Those applications are sometimes marketed under the misleading term "zero-knowledge".
Details
Client-side encryption seeks to eliminate the potential for data to be viewed by service providers (or third parties that compel service providers to deliver access to data), client-side encryption ensures that data and files that are stored in the cloud can only be viewed on the client-side of the exchange. By remaining encrypted through each intermediary server, client-side encryption ensures that data retains privacy from the origin to the destination server. This prevents data loss and the unauthorized disclosure of private or personal files, providing increased peace of mind for its users.
Current academic scholarship as well as recommendations by industry professionals provide much support for developers to include client-side encryption to protect the confidentiality and integrity of information.
Examples of cloud storage services that provide client-side encryption are Tresorit, MEGA and SpiderOak. As of February 2016, neither Apple iCloud, or Dropbox provide client-side encryption. Google Drive and Google Docs released client-side encryption in 2021 thereby becoming the first cloud productivity suite ever and the first major cloud storage platform to productionize client-side encryption. Google followed up by releasing client-side encrypted versions of Google Meet, Google Calendar, and Gmail. As of January 2023, Google Workspace Client-side encryption is not yet ava |
https://en.wikipedia.org/wiki/Cladonia%20botrytes | Cladonia botrytes or the wooden soldiers cup lichen is a species of cup lichen in the family Cladoniaceae. Its habitat includes secondary xylem. |
https://en.wikipedia.org/wiki/Magnesium%20transporter | Magnesium transporters are proteins that transport magnesium across the cell membrane. All forms of life require magnesium, yet the molecular mechanisms of Mg2+ uptake from the environment and the distribution of this vital element within the organism are only slowly being elucidated.
The ATPase function of MgtA is highly cardiolipin dependent and has been shown to detect free magnesium in the μM range
In bacteria, Mg2+ is probably mainly supplied by the CorA protein and, where the CorA protein is absent, by the MgtE protein. In yeast the initial uptake is via the Alr1p and Alr2p proteins, but at this stage the only internal Mg2+ distributing protein identified is Mrs2p. Within the protozoa only one Mg2+ transporter (XntAp) has been identified. In metazoa, Mrs2p and MgtE homologues have been identified, along with two novel Mg2+ transport systems TRPM6/TRPM7 and PCLN-1. Finally, in plants, a family of Mrs2p homologues has been identified along with another novel protein, AtMHX.
Evolution
The evolution of Mg2+ transport appears to have been rather complicated. Proteins apparently based on MgtE are present in bacteria and metazoa, but are missing in fungi and plants, whilst proteins apparently related to CorA are present in all of these groups. The two active transport transporters present in bacteria, MgtA and MgtB, do not appear to have any homologies in higher organisms. There are also Mg2+ transport systems that are found only in the higher organisms.
Types
There are a large number of proteins yet to be identified that transport Mg2+. Even in the best studied eukaryote, yeast, Borrelly has reported a Mg2+/H+ exchanger without an associated protein, which is probably localised to the Golgi. At least one other major Mg2+ transporter in yeast is still unaccounted for, the one affecting Mg2+ transport in and out of the yeast vacuole. In higher, multicellular organisms, it seems that many Mg2+ transporting proteins await discovery.
The CorA-domain-containing |
https://en.wikipedia.org/wiki/BOSH%20%28software%29 | BOSH is an open-source software project that offers a toolchain for release engineering, software deployment and application lifecycle management of large-scale distributed services. The toolchain is made up of a server (the BOSH Director) and a command line tool. BOSH is typically used to package, deploy and manage cloud software. While BOSH was initially developed by VMware in 2010 to deploy Cloud Foundry PaaS, it can be used to deploy other software (such as Hadoop, RabbitMQ, or MySQL for instance). BOSH is designed to manage the whole lifecycle of large distributed systems.
Since March 2016, BOSH can manage deployments on both Microsoft Windows and Linux servers.
A BOSH Director communicates with a single Infrastructure as a service (IaaS) provider to manage the underlying networking and virtual machines (VMs) (or containers). Several IaaS providers are supported: Amazon Web Services EC2, Apache CloudStack, Google Compute Engine, Microsoft Azure, OpenStack, and VMware vSphere.
To help support more underlying IaaS providers, BOSH uses the concept of a Cloud Provider Interface (CPI). There is an implementation of the CPI for each of the IaaS providers listed above. Typically the CPI is used to deploy VMs, but it can be used to deploy containers as well.
Few CPIs exist for deploying containers with BOSH and only one is actively supported. For this one, BOSH uses a CPI that deploys Pivotal Software's Garden containers (Garden is very similar to Docker) on a single virtual machine, run by VirtualBox or VMware Workstation. In theory, any other container engine could be supported, if the necessary CPIs were developed.
Due to BOSH indifferently supporting deployments on VMs or containers, BOSH uses the generic term “instances” to designate those. It is up to the CPI to choose whether a BOSH “instance” is actually a VM or a container.
Workflow
Once installed, a BOSH server accepts uploading root filesystems (called “stemcells”) and packages (called “releases”) to |
https://en.wikipedia.org/wiki/Heavy-tailed%20distribution | In probability theory, heavy-tailed distributions are probability distributions whose tails are not exponentially bounded: that is, they have heavier tails than the exponential distribution. In many applications it is the right tail of the distribution that is of interest, but a distribution may have a heavy left tail, or both tails may be heavy.
There are three important subclasses of heavy-tailed distributions: the fat-tailed distributions, the long-tailed distributions, and the subexponential distributions. In practice, all commonly used heavy-tailed distributions belong to the subexponential class, introduced by Jozef Teugels.
There is still some discrepancy over the use of the term heavy-tailed. There are two other definitions in use. Some authors use the term to refer to those distributions which do not have all their power moments finite; and some others to those distributions that do not have a finite variance. The definition given in this article is the most general in use, and includes all distributions encompassed by the alternative definitions, as well as those distributions such as log-normal that possess all their power moments, yet which are generally considered to be heavy-tailed. (Occasionally, heavy-tailed is used for any distribution that has heavier tails than the normal distribution.)
Definitions
Definition of heavy-tailed distribution
The distribution of a random variable X with distribution function F is said to have a heavy (right) tail if the moment generating function of X, MX(t), is infinite for all t > 0.
That means
This is also written in terms of the tail distribution function
as
Definition of long-tailed distribution
The distribution of a random variable X with distribution function F is said to have a long right tail if for all t > 0,
or equivalently
This has the intuitive interpretation for a right-tailed long-tailed distributed quantity that if the long-tailed quantity exceeds some high level, the probability |
https://en.wikipedia.org/wiki/Phosphoroscope | A phosphoroscope is piece of experimental equipment devised in 1857 by physicist A. E. Becquerel to measure how long it takes a phosphorescent material to stop glowing after it has been excited.
It consists of two rotating disks with holes in them. The holes are arranged on each disk at equal angular intervals and a constant distance from the centre, but the holes in one disk do not align with the holes in the other. A sample of phosphorescent material is placed in between the two disks. Light coming in through a hole in one of the discs excites the phosphorescent material which then emits light for a short amount of time. The disks are then rotated and by changing their speed, the length of time the material glows can be determined. |
https://en.wikipedia.org/wiki/Communication%20source | A source or sender is one of the basic concepts of communication and information processing. Sources are objects which encode message data and transmit the information, via a channel, to one or more observers (or receivers).
In the strictest sense of the word, particularly in information theory, a source is a process that generates message data that one would like to communicate, or reproduce as exactly as possible elsewhere in space or time. A source may be modelled as memoryless, ergodic, stationary, or stochastic, in order of increasing generality.
Communication Source combines Communication and Mass Media Complete and Communication Abstracts to provide full-text access to more than 700 journals, and indexing and abstracting for more than 1,000 core journals. Coverage dating goes back to 1900.
Content is derived from academic journals, conference papers, conference proceedings, trade publications, magazines and periodicals.
A transmitter can be either a device, for example, an antenna, or a human transmitter, for example, a speaker. The word "transmitter" derives from an emitter, that is to say, that emits using the Hertzian waves.
In sending mail it also refers to the person or organization that sends a letter and whose address is written on the envelope of the letter.
In finance, an issuer can be, for example, the bank system of elements.
In education, an issuer is any person or thing that gives knowledge to the student, for example, the professor.
For communication to be effective, the sender and receiver must share the same code. In ordinary communication, the sender and receiver roles are usually interchangeable.
Depending on the language's functions, the issuer fulfills the expressive or emotional function, in which feelings, emotions, and opinions are manifested, such as The way is dangerous.
In economy
In the economy, the issuer is a legal entity, foundation, company, individual firm, national or foreign governments, investment companies o |
https://en.wikipedia.org/wiki/Short%20gastric%20veins | The short gastric veins, four or five in number, drain the fundus and left part of the greater curvature of the stomach, and pass between the two layers of the gastrolienal ligament to end in the splenic vein or in one of its large tributaries. |
https://en.wikipedia.org/wiki/Conservation-induced%20extinction | Efforts to save endangered species may, paradoxically, lead to conservation-induced extinction of other species. This mostly threatens the parasite and pathogen species that are highly host-specific to critically endangered hosts. When the last individuals of a host species are captured for the purpose of captive breeding and reintroduction programs, they typically undergo anti-parasitic treatments to increase survival and reproductive success. This practice may unintentionally result in the extinction of the species antagonistic to the target species, such as certain parasites. It has been proposed that the parasites should be reintroduced to the endangered population. A few cases of conservation-induced extinction have occurred in parasitic lice.
Examples
Parasite: Colpocephalum californici – host: California condorThe parasite most probably became extinct when the last individuals of its only host species were captured for a captive-breeding program; all parasites found were deliberately killed in an attempt to assist the host's survival.
Parasite: Felicola isidoroi – host: Iberian lynx.As with Colpocephalum californici, likely became extinct when the last individuals of its host species were taken into captivity and deloused to assist survival.
Parasite: Linognathus petasmatus – host: scimitar-horned oryxThe host specificity of this parasite is uncertain. Either it was specific to the scimitar-horned oryx and became extinct during captive breeding of the host, or – alternatively – it may be specific to the addax and possibly still surviving in the wild.
Parasite: Rallicola guami – host: Guam railThe only known host species of this parasite exists exclusively in captivity and kept under veterinary control. Little information about the fate of the parasite, likely extinct.
Parasite: Rallicola pilgrimi – host: little spotted kiwiThe parasite most probably became extinct when the last individuals of its only host species were captured and, after routine veter |
https://en.wikipedia.org/wiki/Flat%20network | A flat network is a computer network design approach that aims to reduce cost, maintenance and administration. Flat networks are designed to reduce the number of routers and switches on a computer network by connecting the devices to a single switch instead of separate switches. Unlike a hierarchical network design, the network is not physically separated using different switches.
The topology of a flat network is not segmented or separated into different broadcast areas by using routers. Some such networks may use network hubs or a mixture of hubs and switches, rather than switches and routers, to connect devices to each other. Generally, all devices on the network are a part of the same broadcast area.
Uses
Flat networks are typically used in homes or small businesses where network requirements are low. Home networks usually do not require intensive security, or separation, because the network is often used to provide multiple computers access to the Internet. In such cases, a complex network with many switches is not required. Flat networks are also generally easier to administer and maintain because less complex switches or routers are being used. Purchasing switches can be costly, so flat networks can be implemented to help reduce the amount of switches that need to be purchased.
Drawbacks
Flat networks provide some drawbacks, including:
Poor security – Because traffic travels through one switch, it is not possible to segment the networks into sections and prevent users from accessing certain parts of the network. It is easier for hackers to intercept data on the network.
No redundancy – Since there is usually one switch, or a few devices, it is possible for the switch to fail. Since there is no alternative path, the network will become inaccessible and computers may lose connectivity.
Scalability and speed – Connecting all the devices to one central switch, either directly or through hubs, increases the potential for collisions (due to hubs), reduced |
https://en.wikipedia.org/wiki/Spore%20Hero | Spore Hero is the Nintendo Wii spin-off of Spore, developed by Maxis, in which the players focus on creativity and evolution using the unique controls of the Wii. The game was released on October 6, 2009.
Development
A Wii spinoff of the game had been mentioned by Will Wright several times, such as in his October 26, 2007, interview with The Guardian. Eventually, a spin-off under the title "Spore Hero", an adventure game built ground up for the Wii with a heavier focus on evolution, was announced as part of the 2009 lineup along with "Spore Hero Arena" and "Spore Galactic Adventures"" Concept art for the game was created by Mathieu Latour-Duhaime
The first details of Spore Hero began to emerge when MTV's Totilo had an interview with designer Lucy Bradshaw. In it she said that the team was taking a look at Wii Motion Plus for better motion sensitivity. On May 12, EA sent out their official press release for Spore Hero and Spore Hero Arena. Several previews began to emerge later. At an event in Los Angeles, GameSpot got another look at Spore Hero. IGN and Gamezone also posted previews as part of their pre-E3 lineup. Spore Hero was on show at E3 2009 and at Comic-Con. In late July, Maxis conducted an interview with several of the major fansites. During it they revealed that one of the choices they made during development was to focus on the story-line of the game. This focus meant that they had to detract from the game's online capabilities.
Gameplay
The protagonist of the game is the player, a blue creature from an egg inside a blue crystal meteor that crashed on the planet, along with other blue meteors that the player can destroy in order to gain DNA points for evolving the player's character. The antagonist is a red creature named Zarkhathor, whose egg was inside a red crystal meteor. The player must do quests, fight, sing, dance, and pose with other creatures that are in "tribes" in order to earn creature parts, as well as dig creature parts up from dead creatu |
https://en.wikipedia.org/wiki/Nucleoprotein | Nucleoproteins are proteins conjugated with nucleic acids (either DNA or RNA). Typical nucleoproteins include ribosomes, nucleosomes and viral nucleocapsid proteins.
Structures
Nucleoproteins tend to be positively charged, facilitating interaction with the negatively charged nucleic acid chains. The tertiary structures and biological functions of many nucleoproteins are understood. Important techniques for determining the structures of nucleoproteins include X-ray diffraction, nuclear magnetic resonance and cryo-electron microscopy.
Viruses
Virus genomes (either DNA or RNA) are extremely tightly packed into the viral capsid. Many viruses are therefore little more than an organised collection of nucleoproteins with their binding sites pointing inwards. Structurally characterised viral nucleoproteins include influenza, rabies, Ebola, Bunyamwera, Schmallenberg, Hazara, Crimean-Congo hemorrhagic fever, and Lassa.
Deoxyribonucleoproteins
A deoxyribonucleoprotein (DNP) is a complex of DNA and protein. The prototypical examples are nucleosomes, complexes in which genomic DNA is wrapped around clusters of eight histone proteins in eukaryotic cell nuclei to form chromatin. Protamines replace histones during spermatogenesis.
Functions
The most widespread deoxyribonucleoproteins are nucleosomes, in which the component is nuclear DNA. The proteins combined with DNA are histones and protamines; the resulting nucleoproteins are located in chromosomes. Thus, the entire chromosome, i.e. chromatin in eukaryotes consists of such nucleoproteins.
In eukaryotic cells, DNA is associated with about an equal mass of histone proteins in a highly condensed nucleoprotein complex called chromatin. Deoxyribonucleoproteins in this kind of complex interact to generate a multiprotein regulatory complex in which the intervening DNA is looped or wound. The deoxyribonucleoproteins participate in regulating DNA replication and transcription.
Deoxyribonucleoproteins are also involved in hom |
https://en.wikipedia.org/wiki/Microtron | A microtron is a type of particle accelerator concept originating from the cyclotron in which the accelerating field is not applied through large D-shaped electrodes, but through a linear accelerator structure. The classic microtron was invented by Vladimir Veksler around 1944.
The kinetic energy of the particles is increased by a constant amount per field change (one half or a whole revolution). Microtrons are designed to operate at constant field frequency and magnetic field in the ultrarelativistic limit. Thus they are especially suited for very light elementary particles, namely electrons.
In a microtron, due to the electrons' increasing momentum, the particle paths are different for each pass. The time needed for that is proportional to the pass number. The slow electrons need one electric field oscillation, the faster electrons need an integer multiple of this oscillation.
Racetrack microtron
A racetrack microtron is a larger-scale microtron which uses two electromagnets instead of one. Both electromagnets supply a homogeneous magnetic field in a half-circle formed region, and the particles path between both magnets is thus straight. One advantage of this is that the accelerator cavity can be larger, enabling the use of different linear accelerator (linac) forms, and is not installed in a region with large magnetic fields.
The linac is placed near the edge of the gap between the dee-shaped magnets. The remainder of the gap is used for focusing devices. The electron is readmitted to the linac after each revolution. This procedure can be repeated until the increasing radius of the particle's path makes further acceleration impossible. The particle beam is then deflected into an experiment area or a further accelerator stage.
The world's largest racetrack-microtron is the Mainz Microtron.
Applications
Microtrons provide high-energy electron beams with a low beam emittance (no radiation equilibrium) and a high repetition rate (equal to the operation frequen |
https://en.wikipedia.org/wiki/Hyperbolic%20absolute%20risk%20aversion | In finance, economics, and decision theory, hyperbolic absolute risk aversion (HARA) refers to a type of risk aversion that is particularly convenient to model mathematically and to obtain empirical predictions from. It refers specifically to a property of von Neumann–Morgenstern utility functions, which are typically functions of final wealth (or some related variable), and which describe a decision-maker's degree of satisfaction with the outcome for wealth. The final outcome for wealth is affected both by random variables and by decisions. Decision-makers are assumed to make their decisions (such as, for example, portfolio allocations) so as to maximize the expected value of the utility function.
Notable special cases of HARA utility functions include the quadratic utility function, the exponential utility function, and the isoelastic utility function.
Definition
A utility function is said to exhibit hyperbolic absolute risk aversion if and only if the level of risk tolerance —the reciprocal of absolute risk aversion —is a linear function of wealth W:
where A(W) is defined as –U "(W) / U '(W). A utility function U(W) has this property, and thus is a HARA utility function, if and only if it has the form
with restrictions on wealth and the parameters such that and For a given parametrization, this restriction puts a lower bound on W if and an upper bound on W if . For the limiting case as → 1, L'Hôpital's rule shows that the utility function becomes linear in wealth; and for the limiting case as goes to 0, the utility function becomes logarithmic: .
Decreasing, constant, and increasing absolute risk aversion
Absolute risk aversion is decreasing if (equivalently T '(W) > 0), which occurs if and only if is finite and less than 1; this is considered the empirically plausible case, since it implies that an investor will put more funds into risky assets the more funds are available to invest. Constant absolute risk aversion occurs as goes to positiv |
https://en.wikipedia.org/wiki/Carbon%20Copy%20%28software%29 | Carbon Copy was "a remote control/communications program" with for-its-day advanced features for remote screen sharing, background file transfer, and "movable chat windows".
Overview
The New York Times described it thus: "you can sit at the console of either machine and call up
the programs and files stored on the other". Computerworld called it "a package that mirrors every action a user takes on two connected PCs".
Part of its user base was acquired via inclusion as bonus software for a modem that could communicate at "300, 1200 and 2400 baud."
Carbon Copy's vendor, Meridian Technology, was acquired by Microcom in early 1988, and accepted tax credits to move software duplication and
packaging of Carbon Copy to Puerto Rico. Meridian had a British subsidiary, also acquired by Microcom.
History
Computerworld covered the flow of features and newer releases: 3.0 (1986), 1987, 1989. By 1991, although Version 5.2.2 was still actively marketed, Version 6.0 was released to coincide with the release of MS/DOS 5.0.
By 1994, DOS versions topped out at 6.0, and the 2.0 version of Carbon Copy Plus for Windows was available.
See also
BLAST (protocol)
Kermit (protocol) |
https://en.wikipedia.org/wiki/Certificate%20signing%20request | In public key infrastructure (PKI) systems, a certificate signing request (CSR or certification request) is a message sent from an applicant to a certificate authority of the public key infrastructure (PKI) in order to apply for a digital identity certificate. The CSR usually contains the public key for which the certificate should be issued, identifying information (such as a domain name) and a proof of authenticity including integrity protection (e.g., a digital signature). The most common format for CSRs is the PKCS #10 specification; others include the more capable Certificate Request Message Format (CRMF) and the SPKAC (Signed Public Key and Challenge) format generated by some web browsers.
Procedure
Before creating a CSR for an X.509 certificate, the applicant first generates a key pair, keeping the private key of that pair secret. The CSR contains information identifying the applicant (such as a distinguished name), the public key chosen by the applicant, and possibly further information. When using the PKCS #10 format, the request must be self-signed using the applicant's private key, which provides proof-of-possession of the private key but limits the use of this format to keys that can be used for signing. The CSR should be accompanied by a proof of origin (i.e., proof of identity of the applicant) that is required by the certificate authority, and the certificate authority may contact the applicant for further information.
Typical information required in a CSR (sample column from sample X.509 certificate). Note that there are often alternatives for the Distinguished Names (DN), the preferred value is listed.
If the request is successful, the certificate authority will send back an identity certificate that has been digitally signed using the private key of the certificate authority.
Structure of a PKCS #10 CSR
A certification request in PKCS #10 format consists of three main parts: the certification request information, a signature algorithm identif |
https://en.wikipedia.org/wiki/Architectural%20state | Architectural state is the collection of information in a computer system that defines the state of a program during execution. Architectural state includes main memory, architectural registers, and the program counter. Architectural state is defined by the instruction set architecture and can be manipulated by the programmer using instructions. A core dump is a file recording the architectural state of a computer program at some point in time, such as when it has crashed.
Examples of architectural state include:
Main Memory (Primary storage)
Control registers
Instruction flag registers (such as EFLAGS in x86)
Interrupt mask registers
Memory management unit registers
Status registers
General purpose registers (such as AX, BX, CX, DX, etc. in x86)
Address registers
Counter registers
Index registers
Stack registers
String registers
Architectural state is not microarchitectural state. Microarchitectural state is hidden machine state used for implementing the microarchitecture. Examples of microarchitectural state include pipeline registers, cache tags, and branch predictor state. While microarchitectural state can change to suit the needs of each processor implementation in a processor family, binary compatibility among processors in a processor family requires a common architectural state.
Architectural state naturally does not include state-less elements of a computer such as busses and computation units (e.g., the ALU). |
https://en.wikipedia.org/wiki/Lar1 | LAR1 ('Lichen-Associated Rhizobiales 1') refers to a specific bacterial lineage in the order Hyphomicrobiales (formerly Rhizobiales) that has most frequently been found directly in association with lichens.
This lineage is currently known to associate with lichens that have a green-algal photosynthetic partner (as opposed to a cyanobacterial partner) and a fungal partner in the Lecanoromycetes (though other groups of fungi have not yet been examined). This lineage has been documented in association with all green-algal lichens specifically tested (all from North America), and was also found in a sequence library derived from Antarctic lichens. The specific ecological niche occupied by this lineage indicates that it may rely on certain nutrients that are abundant in green-algal lichen thalli but are rarer in other environments.
Nitrogen fixing
The LAR1 lineage is currently defined based on sequences of the 16S rRNA gene alone, since it remains uncultured in the laboratory. In spite of its resistance to being cultured, at least one potentially significant metabolic function can be inferred through circumstantial evidence: nitrogen fixation. Since nitrogen is required for growth by all biological systems, but is generally biologically inaccessible due to its high activation energy, many eukaryotes have established relationships with specialized bacteria that are capable of nitrogen fixation (converting dinitrogen gas into a molecular form which is easily assimilated).
Many lichens grow in extremely nutrient-poor environments and may rely on nitrogen-fixing bacteria to provide them with enough molecular nitrogen to survive. It has been documented by numerous researchers that microbes associated with green-algal lichens have the potential to fix nitrogen in abundance.
However, nearly all of these studies have relied solely on culture-based methods, which may provide an inaccurate picture of what the most abundant or important nitrogen-fixers are. Independent s |
https://en.wikipedia.org/wiki/Subcostal%20plane | The subcostal plane is a transverse plane which bisects the body at the level of the 10th costal margin and the vertebra body L3. |
https://en.wikipedia.org/wiki/145th%20meridian%20east | The meridian 145° east of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, Asia, the Pacific Ocean, Australasia, the Indian Ocean, the Southern Ocean, and Antarctica to the South Pole.
The 145th meridian east forms a great circle with the 35th meridian west.
From Pole to Pole
Starting at the North Pole and heading south to the South Pole, the 145th meridian east passes through:
{| class="wikitable plainrowheaders"
! scope="col" width="130" | Co-ordinates
! scope="col" width="140" | Country, territory or sea
! scope="col" | Notes
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Arctic Ocean
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Sakha Republic — Kotelny Island, New Siberian Islands
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | East Siberian Sea
| style="background:#b0e0e6;" |
|-valign="top"
|
! scope="row" |
| Sakha Republic Magadan Oblast — from Khabarovsk Krai — from
|-valign="top"
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Sea of Okhotsk
| style="background:#b0e0e6;" | Passing just east of the island of Sakhalin, Sakhalin Oblast, (at )
|-
|
! scope="row" |
| Hokkaidō Prefecture — island of Hokkaidō
|-valign="top"
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Pacific Ocean
| style="background:#b0e0e6;" | Passing just east of Farallon de Pajaros island, (at ) Passing just west of Rota island, (at ) Passing just east of (at ) Passing just west of the Hermit Islands, (at ) and into the Bismarck Sea
|-valign="top"
|
! scope="row" |
| Island of Manam
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Pacific Ocean
| style="background:#b0e0e6;" | Bismarck Sea
|-valign="top"
|
! scope="row" |
|
|-valign="top"
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Coral Sea
| style="background:#b0e0e6;" | Passing just |
https://en.wikipedia.org/wiki/Elater | An elater is a cell (or structure attached to a cell) that is hygroscopic, and therefore will change shape in response to changes in moisture in the environment. Elaters come in a variety of forms, but are always associated with plant spores. In many plants that do not have seeds, they function in dispersing the spores to a new location. Mosses do not have elaters, but peristomes which change shape with changes in humidity or moisture to allow for a gradual release of spores.
Horsetail elaters
In the horsetails, elaters are four ribbon-like appendages attached to the spores. These appendages develop from an outer spiral layer of the spore wall. At maturity, the four strips peel away from the inner wall, except at a single point on the spore where all four strips are attached.
Under moist conditions, the elaters curl tightly around the spore. The wet spores tend to stick to each other and to nearby surfaces because of surface tension. When conditions are dry, the spores no longer stick to each other and are more easily dispersed. At that time, the elaters uncoil to extend out from the spore and will catch air currents. The fact that they are extended only when conditions are dry means that successful spore dispersal is more likely.
Liverwort elaters
In the liverworts also known as hepaticopsida [example Riccia,Marchantia], elaters are cells that develop in the sporophyte alongside the spores. They are complete cells, usually with helical thickenings at maturity that respond to moisture content.
In most liverworts, the elaters are unattached, but in some leafy species (such as Frullania) a few elaters will remain attached to the inside of the sporangium (spore capsule).
Hornwort pseudo-elaters
In the hornworts, elaters are branched clusters of cells that develop in the sporophyte alongside the spores. They are complete cells, usually without helical thickenings (except in the Dendrocerotaceae). |
https://en.wikipedia.org/wiki/Lemon%20%28geometry%29 | In geometry, a lemon is a geometric shape that is constructed as the surface of revolution of a circular arc of angle less than half of a full circle rotated about an axis passing through the endpoints of the lens (or arc). The surface of revolution of the complementary arc of the same circle, through the same axis, is called an apple.
The apple and lemon together make up a spindle torus (or self-crossing torus or self-intersecting torus). The lemon forms the boundary of a convex set, while its surrounding apple is non-convex.
The ball in North American football has a shape resembling a geometric lemon. However, although used with a related meaning in geometry, the term "football" is more commonly used to refer to a surface of revolution whose Gaussian curvature is positive and constant, formed from a more complicated curve than a circular arc. Alternatively, a football may refer to a more abstract orbifold, a surface modeled locally on a sphere except at two points.
Area and volume
The lemon is generated by rotating an arc of radius and half-angle less than about its chord. Note that denotes latitude, as used in geophysics. The surface area is given by
The volume is given by
These integrals can be evaluated analytically, giving
The apple is generated by rotating an arc of half-angle greater than about its chord. The above equations are valid for both the lemon and apple.
See also
Sears–Haack body
List of shapes |
https://en.wikipedia.org/wiki/Rhizome | In botany and dendrology, a rhizome (; , ) is a modified subterranean plant stem that sends out roots and shoots from its nodes. Rhizomes are also called creeping rootstalks or just rootstalks. Rhizomes develop from axillary buds and grow horizontally. The rhizome also retains the ability to allow new shoots to grow upwards.
A rhizome is the main stem of the plant that runs underground horizontally. A stolon is similar to a rhizome, but a stolon sprouts from an existing stem, has long internodes, and generates new shoots at the end, such as in the strawberry plant. In general, rhizomes have short internodes, send out roots from the bottom of the nodes, and generate new upward-growing shoots from the top of the nodes.
A stem tuber is a thickened part of a rhizome or stolon that has been enlarged for use as a storage organ. In general, a tuber is high in starch, e.g. the potato, which is a modified stolon. The term "tuber" is often used imprecisely and is sometimes applied to plants with rhizomes.
The plant uses the rhizome to store starches, proteins, and other nutrients. These nutrients become useful for the plant when new shoots must be formed or when the plant dies back for the winter. If a rhizome is separated, each piece may be able to give rise to a new plant. This is a process known as vegetative reproduction and is used by farmers and gardeners to propagate certain plants. This also allows for lateral spread of grasses like bamboo and bunch grasses. Examples of plants that are propagated this way include hops, asparagus, ginger, irises, lily of the valley, cannas, and sympodial orchids.
Stored rhizomes are subject to bacterial and fungal infections, making them unsuitable for replanting and greatly diminishing stocks. However, rhizomes can also be produced artificially from tissue cultures. The ability to easily grow rhizomes from tissue cultures leads to better stocks for replanting and greater yields. The plant hormones ethylene and jasmonic acid have b |
https://en.wikipedia.org/wiki/Food%20coating | Coating is a process that consists of applying a liquid or a powder into the surface of an edible product to convey new (usually sensory) properties. Coating designates an operation as much as the result of it: the application of a layer and the layer itself. Coating takes different meanings depending on the industry concerned.
Definitions
This article concerns coating applications in the food industry. There are many similarities between coating processes and numerous examples of technology transfer to and from the food industry.
Coating in the food industry is the application of a layer of liquids or solids onto a product. The operation essentially relies on mechanical energy. It consists mostly in setting the product particles in motion and simultaneously applying the coating ingredient in a certain pattern to expose one to the other. It involves such phenomena as adhesion, friction, viscosity, surface tension and crystallisation. Food coating is not a “hard” science such as drying or cooling, which can be described by equations and are predictable. Food coating is rather a “soft” knowledge derived from the accumulation of know-how. One reason is that the product and the ingredients considered have complex characteristics, variations and interactions.
Encapsulation is the application of a liquid layer to very small particles. It relies on an array of principles: entrapping a molecule inside a matrix, chemical bonding, and polymerisation. Encapsulation aims at the protection and controlled release of active molecules when immersed in an environment. As a rule of thumb, particle size can discriminate between “encapsulation” (below 300 µm to 1000 µm) and “food coating” (above this limit). Mere mechanical movement is not adequate and sufficient to fulfill the proper coating of minute particles.
Objectives of coating
Coatings can be added for the enhancement of organoleptic properties of a food product.
Appearance and palatability can be improved by adding |
https://en.wikipedia.org/wiki/Calcium%20tartrate | Calcium tartrate, exactly calcium L-tartrate, is a byproduct of the wine industry, prepared from wine fermentation dregs. It is the calcium salt of L-tartaric acid, an acid most commonly found in grapes. Its solubility decreases with lower temperature, which results in the forming of whitish (in red wine often reddish) crystalline clusters as it precipitates. As E number E354, it finds use as a food preservative and acidity regulator. Like tartaric acid, calcium tartrate has two asymmetric carbons, hence it has two chiral isomers and a non-chiral isomer (meso-form). Most calcium tartrate of biological origin is the chiral levorotatory (–) isomer. |
https://en.wikipedia.org/wiki/Association%20of%20Biomolecular%20Resource%20Facilities | The Association of Biomolecular Resource Facilities (ABRF) is dedicated to advancing core and research biotechnology laboratories through research, communication, and education. ABRF members include over 2000 scientists representing 340 different core laboratories in 41 countries, including those in industry, government, academic and research institutions.
History
In 1986 a Research Resource Facility Satellite Meeting was held in conjunction with the Sixth International Conference on Methods in Protein Sequence Analysis. The next year protein sequencing and amino acid samples were sent to survey 103 core facilities. By 1989 the ABRF was formally organized and incorporated. Each year an annual meeting was held as a satellite meeting of the Protein Society until 1996 when separate meetings began.
ABRF Research Groups
Research Groups are established to fulfill two of the purposes of the Association of Biomolecular Resource Facilities. First, to provide mechanisms for the self-evaluation and improvement of procedural and operational accuracy, precision and efficiency in resource facilities and research laboratories. Second, to contribute to the education of resource facility and research laboratory staff, users, administrators, and interested members of the scientific community. The results of ABRF Research Group studies have been published in scientific papers. Results from ABRF Research Group studies have seen reuse in other research.
ABRF Next Generation Sequencing Group (ABRF-NGS)
Antibody Technology Research Group (ARG)
Biomedical 'Omics Research Group (BORG)
DNA Sequencing Research Group (DSRG)
Flow Cytometry Research Group (FCRG)
Genomics Research Group (GVRG)
Glycoprotein Research Group (gPRG)
Light Microscopy Research Group (LMRG)
Metabolomics Research Group (MRG)
Metagenomics Research Group (MGRG)
Molecular Interactions Research Group (MIRG)
Nucleic Acids Research Group (NARG)
Protein Expression Research Group (PERG)
Protein Sequencing Research |
https://en.wikipedia.org/wiki/Period%20%28algebraic%20geometry%29 | In algebraic geometry, a period is a number that can be expressed as an integral of an algebraic function over an algebraic domain. Sums and products of periods remain periods, such that the periods form a ring.
Maxim Kontsevich and Don Zagier gave a survey of periods and introduced some conjectures about them. Periods also arise in computing the integrals that arise from Feynman diagrams, and there has been intensive work trying to understand the connections.
Definition
A real number is a period if it is of the form
where is a polynomial and a rational function on with rational coefficients. A complex number is a period if its real and imaginary parts are periods.
An alternative definition allows and to be algebraic functions; this looks more general, but is equivalent. The coefficients of the rational functions and polynomials can also be generalised to algebraic numbers because irrational algebraic numbers are expressible in terms of areas of suitable domains.
In the other direction, can be restricted to be the constant function or , by replacing the integrand with an integral of over a region defined by a polynomial in additional variables. In other words, a (nonnegative) period is the volume of a region in defined by a polynomial inequality.
Examples
Besides the algebraic numbers, the following numbers are known to be periods:
The natural logarithm of any positive algebraic number a, which is
Elliptic integrals with rational arguments
All zeta constants (the Riemann zeta function of an integer) and multiple zeta values
Special values of hypergeometric functions at algebraic arguments
Γ(p/q)q for natural numbers p and q.
An example of a real number that is not a period is given by Chaitin's constant Ω. Any other non-computable number also gives an example of a real number that is not a period. Currently there are no natural examples of computable numbers that have been proved not to be periods, however it is possible to construct artif |
https://en.wikipedia.org/wiki/Petro%20Chernyaha | Petro Hervaziyovych Chernyaha (24 October 1946 – 12 May 2014) was a Ukrainian scientist and public figure, professor, PhD (Technical Sciences), a member of the Construction Academy of Ukraine and the Academy of Higher Education Sciences of Ukraine, the Honoured Educator of Ukraine and the Honoured Land Surveyor of Ukraine.
Biography
Petro Hervaziyovych Chernyaha was born in the village of Kuhayivtsi, Chemerovetskyi district (rayon), Khmelnytskyi Oblast, Ukraine. In 1964 he finished high school with honours (gold medal) and entered the Lviv Polytechnical Institute (now university), where he studied Astronomic Geodesy. He received a special scholarship (named after Lenin) and was awarded a medal by the Ministry of Higher and Special Education of the USSR for best student scientific paper, titled "Design of Geodetic Connection between Asia and America". He graduated, with honours, in 1969 and continued his studies at the Polytechnical Institute as a post-graduate student.
In November 1973, Chernyaha began to work at the National University of Water Economy and Management of Natural Recourses (which was at the time called the Ukrainian Institute of Water Economy Engineers), first as a teaching assistant, then as a senior lecturer and associate professor in the Department of Engineering Geodesy. For seven years, from 1980 to 1987, he was Deputy Dean of the Faculty of Design and Construction of Hydro Reclamation Systems.
In 1987, Chernyaha became Chair of the Department of Engineering Geodesy. In view of the reforms of land relations and a pressing need for experts in the sphere, in 1992, Chernyaha initiated opening a new specialization, Land Utilization and Land Cadastre, and in 1995 the Department of Engineering Geodesy was renamed the Department of Land Utilization and Geodesy. Another specialization, Geo-information Systems and Technologies, was introduced at the university in 2002 under his leadership. This period saw a rapid development of the Department: its t |
https://en.wikipedia.org/wiki/Lists%20of%20microcomputers | For an overview of microcomputers of different kinds, see the following lists of microcomputers:
List of early microcomputers
List of home computers
List of home computers by video hardware
Lists of computer hardware |
https://en.wikipedia.org/wiki/Dynode | A dynode is an electrode in a vacuum tube that serves as an electron multiplier through secondary emission. The first tube to incorporate a dynode was the dynatron, an ancestor of the magnetron, which used a single dynode. Photomultiplier and video camera tubes generally include a series of dynodes, each at a more positive electrical potential than its predecessor. Secondary emission occurs at the surface of each dynode. Such an arrangement is able to amplify the tiny current emitted by the photocathode, typically by a factor of one million.
Operation
The electrons emitted from the cathode are accelerated toward the first dynode, which is maintained 90 to 100 V positive concerning the cathode. Each accelerated photoelectron that strikes the dynode surface produces several electrons. These electrons are then accelerated toward the second dynode, held 90 to 100 V more positive than the first dynode. Each electron that strikes the surface of the second dynode produces several more electrons, which are then accelerated toward the third dynode, and so on. By the time this process has been repeated at each of the dynodes, 105 to 107 electrons have been produced for each incident photon, dependent on the number of dynodes. For conventional dynode materials, such as BeO and MgO, a multiplication factor of 10 can normally be achieved by each dynode stage.
Naming
The dynode takes its name from the dynatron. Albert Hull did not use the term dynode in his 1918 paper on the dynatron, but used the term extensively in his 1922 paper. In the latter paper, he defined a dynode as a "plate that emits impact electrons ... when it is part of a dynatron."
See also
Microchannel plate detector
Photoelectric effect
Particle detector
Photodetector |
https://en.wikipedia.org/wiki/Text%20mode | Text mode is a computer display mode in which content is internally represented on a computer screen in terms of characters rather than individual pixels. Typically, the screen consists of a uniform rectangular grid of character cells, each of which contains one of the characters of a character set; at the same time, contrasted to graphics mode or other kinds of computer graphics modes.
Text mode applications communicate with the user by using command-line interfaces and text user interfaces. Many character sets used in text mode applications also contain a limited set of predefined semi-graphical characters usable for drawing boxes and other rudimentary graphics, which can be used to highlight the content or to simulate widget or control interface objects found in GUI programs. A typical example is the IBM code page 437 character set.
An important characteristic of text mode programs is that they assume monospaced fonts, where every character has the same width on screen, which allows them to easily maintain the vertical alignment when displaying semi-graphical characters. This was an analogy of early mechanical printers which had fixed pitch. This way, the output seen on the screen could be sent directly to the printer maintaining the same format.
Depending on the environment, the screen buffer can be directly addressable. Programs that display output on remote video terminals must issue special control sequences to manipulate the screen buffer. The most popular standards for such control sequences are ANSI and VT100.
Programs accessing the screen buffer through control sequences may lose synchronization with the actual display so that many text mode programs have a redisplay everything command, often associated with the key combination.
History
Text mode video rendering came to prominence in the early 1970s, when video-oriented text terminals started to replace teleprinters in the interactive use of computers.
Benefits
The advantages of text modes as co |
https://en.wikipedia.org/wiki/500%20kHz | From early in the 20th century, the radio frequency of 500 kilohertz (500 kHz) was an international calling and distress frequency for Morse code maritime communication. For much of its early history, this frequency was referred to by its equivalent wavelength, 600 meters, or, using the earlier frequency unit name, 500 kilocycles (per second) or 500 kc.
Maritime authorities of many nations, including the Maritime and Coastguard Agency and the United States Coast Guard, once maintained 24 hour watches on this frequency, staffed by skilled radio operators. Many SOS calls and medical emergencies at sea were handled via this frequency. However, as the use of Morse code over radio is now obsolete in commercial shipping, 500 kHz is obsolete as a Morse distress frequency. Beginning in the late 1990s, most nations ended monitoring of transmissions on 500 kHz and emergency traffic on 500 kHz has been replaced by the Global Maritime Distress Safety System (GMDSS).
Current status
The 500 kHz frequency has now been allocated to the maritime Navigational Data or NAVDAT broadcast system.
The nearby frequencies of 518 kHz and 490 kHz are used for the NAVTEX component of GMDSS. Proposals to allocate frequencies at or near 500 kHz to amateur radio use resulted in the international allocation of 472–479 kHz to the 630-meter amateur radio band, now implemented in many countries.
Initial adoption
International standards for the use of 500 kHz first appeared in the first International Radiotelegraph Convention in Berlin, which was signed 3 November 1906, and became effective 1 July 1908.
The second service regulation affixed to this Convention designated 500 kHz as one of the standard frequencies to be employed by shore stations, specifying that
"Two wave lengths, one of 300 meters [1 MHz] and the other of 600 meters, are authorized for general public service. Every coastal station opened to such service shall use one or the other of these two wave lengths."
These regulations |
https://en.wikipedia.org/wiki/Cuisenaire%20rods | Cuisenaire rods are mathematics learning aids for students that provide an interactive, hands-on way to explore mathematics and learn mathematical concepts, such as the four basic arithmetical operations, working with fractions and finding divisors. In the early 1950s, Caleb Gattegno popularised this set of coloured number rods created by Georges Cuisenaire (1891–1975), a Belgian primary school teacher, who called the rods réglettes.
According to Gattegno, "Georges Cuisenaire showed in the early 1950s that students who had been taught traditionally, and were rated 'weak', took huge strides when they shifted to using the material. They became 'very good' at traditional arithmetic when they were allowed to manipulate the rods."
History
The educationalists Maria Montessori and Friedrich Fröbel had used rods to represent numbers, but it was Georges Cuisenaire who introduced the rods that were to be used across the world from the 1950s onwards. In 1952 he published Les nombres en couleurs, Numbers in Color, which outlined their use. Cuisenaire, a violin player, taught music as well as arithmetic in the primary school in Thuin. He wondered why children found it easy and enjoyable to pick up a tune and yet found mathematics neither easy nor enjoyable. These comparisons with music and its representation led Cuisenaire to experiment in 1931 with a set of ten rods sawn out of wood, with lengths from 1 cm to 10 cm. He painted each length of rod a different colour and began to use these in his teaching of arithmetic. The invention remained almost unknown outside the village of Thuin for about 23 years until, in April 1953, British mathematician and mathematics education specialist Caleb Gattegno was invited to see students using the rods in Thuin. At this point he had already founded the International Commission for the Study and Improvement of Mathematics Education (CIEAEM) and the Association of Teachers of Mathematics, but this marked a turning point in his understanding:
|
https://en.wikipedia.org/wiki/Graded%20vector%20space | In mathematics, a graded vector space is a vector space that has the extra structure of a grading or gradation, which is a decomposition of the vector space into a direct sum of vector subspaces, generally indexed by the integers.
For "pure" vector spaces, the concept has been introduced in homological algebra, and it is widely used for graded algebras, which are graded vector spaces with additional structures.
Integer gradation
Let be the set of non-negative integers. An -graded vector space, often called simply a graded vector space without the prefix , is a vector space together with a decomposition into a direct sum of the form
where each is a vector space. For a given n the elements of are then called homogeneous elements of degree n.
Graded vector spaces are common. For example the set of all polynomials in one or several variables forms a graded vector space, where the homogeneous elements of degree n are exactly the linear combinations of monomials of degree n.
General gradation
The subspaces of a graded vector space need not be indexed by the set of natural numbers, and may be indexed by the elements of any set I. An I-graded vector space V is a vector space together with a decomposition into a direct sum of subspaces indexed by elements i of the set I:
Therefore, an -graded vector space, as defined above, is just an I-graded vector space where the set I is (the set of natural numbers).
The case where I is the ring (the elements 0 and 1) is particularly important in physics. A -graded vector space is also known as a supervector space.
Homomorphisms
For general index sets I, a linear map between two I-graded vector spaces is called a graded linear map if it preserves the grading of homogeneous elements. A graded linear map is also called a homomorphism (or morphism) of graded vector spaces, or homogeneous linear map:
for all i in I.
For a fixed field and a fixed index set, the graded vector spaces form a category whose morphisms |
https://en.wikipedia.org/wiki/Cis%20%28mathematics%29 | is a mathematical notation defined by , where is the cosine function, is the imaginary unit and is the sine function. is the argument of the complex number (angle between line to point and x-axis in polar form). The notation is less commonly used in mathematics than Euler's formula, which offers an even shorter notation for but cis(x) is widely used as a name for this function in software libraries.
Overview
The notation is a shorthand for the combination of functions on the right-hand side of Euler's formula:
where . So,
i.e. "" is an acronym for "".
It connects trigonometric functions with exponential functions in the complex plane via Euler's formula. While the domain of definition is usually , complex values are possible as well:
so the function can be used to extend Euler's formula to a more general complex version.
The function is mostly used as a convenient shorthand notation to simplify some expressions, for example in conjunction with Fourier and Hartley transforms, or when exponential functions shouldn't be used for some reason in math education.
In information technology, the function sees dedicated support in various high-performance math libraries (such as Intel's Math Kernel Library (MKL) or MathCW), available for many compilers, programming languages (including C, C++, Common Lisp, D, Fortran, Haskell, Julia, and Rust), and operating systems (including Windows, Linux, macOS and HP-UX). Depending on the platform the fused operation is about twice as fast as calling the sine and cosine functions individually.
Mathematical identities
Derivative
Integral
Other properties
These follow directly from Euler's formula.
The identities above hold if and are any complex numbers. If and are real, then
History
The notation was first coined by William Rowan Hamilton in Elements of Quaternions (1866) and subsequently used by Irving Stringham (who also called it "sector of x") in works such as Uniplanar Algebra (1893), James Harkness and F |
https://en.wikipedia.org/wiki/Isograft | An Isograft is a graft of tissue between two individuals who are genetically identical (i.e. monozygotic twins). Transplant rejection between two such individuals virtually never occurs, making isografts particularly relevant to organ transplanations; patients with organs from their identical twins are incredibly likely to receive the organs favorably and survive. Monozygotic twins have the same major histocompatibility complex, leading to the low instances of tissue rejection by the adaptive immune system. Furthermore, there is virtually no incidence of graft-versus-host disease.
In 1993 a research article demonstrated that islet isografts were being transplanted into young diabetic mice [STZ induced diabetic NOD mice] and the mice survived at least about 22 days post transplantation. |
https://en.wikipedia.org/wiki/Soundwalk | A soundwalk is a walk with a focus on listening to the environment. The term was first used by members of the World Soundscape Project under the leadership of composer R. Murray Schafer in Vancouver in the 1970s. Hildegard Westerkamp, from the same group of artists and founder of the World Forum of Acoustic Ecology, defines soundwalking as "... any excursion whose main purpose is listening to the environment. It is exposing our ears to every sound around us no matter where we are."
Schafer was particularly interested in the implications of the changes in soundscapes in industrial societies in children, and children's relationship to the world through sound. He was a proponent of ear-cleaning (cleaning one's ears cognitively), and he saw soundwalking as an important part of this process of re-engaging our aural senses in finding our place in the world.
Westerkamp used soundwalks to create multiple soundart pieces. "Cricket Voice", "A Walk Through the City", and "Beneath the Forest Floor" are all soundwalk inspired works.
Soundwalking has also been used as artistic medium by visual artists and documentary makers, such as Janet Cardiff.
In 2018 the sound artist Francesco Giomi introduced for the first time the term "soundride" as a direct derivation from a soundwalk but driven by bicycle, used to reach more far points, interesting from their sound point of view.
Other Terms
Other terms closely related to soundwalking and used by Schafer include:
Keynote: typically ambient sounds which are not perceived, not because they are inaudible but because they are filtered out cognitively, such as a highway or air-condition hum
Soundmark: a sonic landmark; a sound which is characteristic of a place
Sound signal: a foreground sound; e.g. a dog, an alarm clock; messages/meaning is usually carried through sound signals.
Sound object: the smallest possible recognizable sonic entity (recognizable by its amplitude envelope)
Acousmatic: a description for sounds whose source |
https://en.wikipedia.org/wiki/Hymenium | The hymenium is the tissue layer on the hymenophore of a fungal fruiting body where the cells develop into basidia or asci, which produce spores. In some species all of the cells of the hymenium develop into basidia or asci, while in others some cells develop into sterile cells called cystidia (basidiomycetes) or paraphyses (ascomycetes). Cystidia are often important for microscopic identification. The subhymenium consists of the supportive hyphae from which the cells of the hymenium grow, beneath which is the hymenophoral trama, the hyphae that make up the mass of the hymenophore.
The position of the hymenium is traditionally the first characteristic used in the classification and identification of mushrooms. Below are some examples of the diverse types which exist among the macroscopic Basidiomycota and Ascomycota.
In agarics, the hymenium is on the vertical faces of the gills.
In boletes and polypores, it is in a spongy mass of downward-pointing tubes.
In puffballs, it is internal.
In stinkhorns, it develops internally and then is exposed in the form of a foul-smelling gel.
In cup fungi, it is on the concave surface of the cup.
In teeth fungi, it grows on the outside of tooth-like spines.
Gallery |
https://en.wikipedia.org/wiki/Chirp%20mass | In astrophysics the chirp mass of a compact binary system determines the leading-order orbital evolution of the system as a result of energy loss from emitting gravitational waves. Because the gravitational wave frequency is determined by orbital frequency, the chirp mass also determines the frequency evolution of the gravitational wave signal emitted during a binary's inspiral phase. In gravitational wave data analysis it is easier to measure the chirp mass than the two component masses alone.
Definition from component masses
A two-body system with component masses and has a chirp mass of
The chirp mass may also be expressed in terms of the total mass of the system and other common mass parameters:
the reduced mass :
the mass ratio :
or
the symmetric mass ratio :
The symmetric mass ratio reaches its maximum value when , and thus
the geometric mean of the component masses :
If the two component masses are roughly similar, then the latter factor is close to so . This multiplier decreases for unequal component masses but quite slowly. E.g. for a 3:1 mass ratio it becomes , while for a 10:1 mass ratio it is
Orbital evolution
In general relativity, the phase evolution of a binary orbit can be computed using a post-Newtonian expansion, a perturbative expansion in powers of the orbital velocity . The first order gravitational wave frequency, , evolution is described by the differential equation
,
where and are the speed of light and Newton's gravitational constant, respectively.
If one is able to measure both the frequency and frequency derivative of a gravitational wave signal, the chirp mass can be determined.
To disentangle the individual component masses in the system one must additionally measure higher order terms in the post-Newtonian expansion.
Mass-redshift degeneracy
One limitation of the chirp mass is that it is affected by redshift; what is actually derived from the observed gravitational waveform is the product
where |
https://en.wikipedia.org/wiki/Exponential%20type | In complex analysis, a branch of mathematics, a holomorphic function is said to be of exponential type C if its growth is bounded by the exponential function for some real-valued constant as . When a function is bounded in this way, it is then possible to express it as certain kinds of convergent summations over a series of other complex functions, as well as understanding when it is possible to apply techniques such as Borel summation, or, for example, to apply the Mellin transform, or to perform approximations using the Euler–Maclaurin formula. The general case is handled by Nachbin's theorem, which defines the analogous notion of -type for a general function as opposed to .
Basic idea
A function defined on the complex plane is said to be of exponential type if there exist real-valued constants and such that
in the limit of . Here, the complex variable was written as to emphasize that the limit must hold in all directions . Letting stand for the infimum of all such , one then says that the function is of exponential type .
For example, let . Then one says that is of exponential type , since is the smallest number that bounds the growth of along the imaginary axis. So, for this example, Carlson's theorem cannot apply, as it requires functions of exponential type less than . Similarly, the Euler–Maclaurin formula cannot be applied either, as it, too, expresses a theorem ultimately anchored in the theory of finite differences.
Formal definition
A holomorphic function is said to be of exponential type if for every there exists a real-valued constant such that
for where .
We say is of exponential type if is of exponential type for some . The number
is the exponential type of . The limit superior here means the limit of the supremum of the ratio outside a given radius as the radius goes to infinity. This is also the limit superior of the maximum of the ratio at a given radius as the radius goes to infinity. The limit superior may exist even |
https://en.wikipedia.org/wiki/HostGator | HostGator is a Houston-based provider of shared, reseller, virtual private server, and dedicated web hosting with an additional presence in Austin, Texas.
History
HostGator was founded in October 2002 by Brent Oxley, who was then a student at Florida Atlantic University. In 2006, the company moved from the original office in Boca Raton, Florida to a new 20,000 square foot building in Houston, Texas. In June 2006, the company opened its first international office in Canada.
In 2008, Inc. Magazine ranked HostGator in its list of fastest growing companies at 21st in the United States, and 1st in the Houston-Sugar Land-Baytown, Texas area. The same year, HostGator decided to make their hosting service green by working with Integrated Ecosystem Market Services.
In 2008, HostGator prepared for competition with companies touting themselves as providing "unlimited" hosting services. Founder Brent Oxley was adamant about being able to back up an "unlimited" option prior to offering service named as such and increased staffing. He suggested that this move increased sales by at least 30%.
In 2010, an office was added in Austin, Texas. In May 2011, HostGator started operations in India with an office in Nashik, Maharashtra and a data center.
On July 13, 2012, HostGator was sold to Endurance International Group (EIG) for an aggregate purchase price of $299.8 million, of which $227.3 million was paid in cash at the closing. On 21 June 2012, CEO and founder Brent Oxley announced the sale of HostGator, and advised employees and users not to worry in part because Oxley would still own the buildings HostGator used. He said he wanted to travel the world before he had children. He was also candid about the failures in creating stable billing and register portions of HostGator, and hoped that Endurance might fix those.
In 2015, HostGator launched Optimized WP, a set of tools for building and maintaining WordPress websites. By the end of 2015, EIG launched local HostGator sites in |
https://en.wikipedia.org/wiki/Double-ended%20priority%20queue | In computer science, a double-ended priority queue (DEPQ) or double-ended heap is a data structure similar to a priority queue or heap, but allows for efficient removal of both the maximum and minimum, according to some ordering on the keys (items) stored in the structure. Every element in a DEPQ has a priority or value. In a DEPQ, it is possible to remove the elements in both ascending as well as descending order.
Operations
A double-ended priority queue features the following operations:
isEmpty() Checks if DEPQ is empty and returns true if empty.
size() Returns the total number of elements present in the DEPQ.
getMin() Returns the element having least priority.
getMax() Returns the element having highest priority.
put(x) Inserts the element x in the DEPQ.
removeMin() Removes an element with minimum priority and returns this element.
removeMax() Removes an element with maximum priority and returns this element.
If an operation is to be performed on two elements having the same priority, then the element inserted first is chosen. Also, the priority of any element can be changed once it has been inserted in the DEPQ.
Implementation
Double-ended priority queues can be built from balanced binary search trees (where the minimum and maximum elements are the leftmost and rightmost leaves, respectively), or using specialized data structures like min-max heap and pairing heap.
Generic methods of arriving at double-ended priority queues from normal priority queues are:
Dual structure method
In this method two different priority queues for min and max are maintained. The same elements in both the PQs are shown with the help of correspondence pointers.
Here, the minimum and maximum elements are values contained in the root nodes of min heap and max heap respectively.
Removing the min element: Perform removemin() on the min heap and remove(node value) on the max heap, where node value is the value in the corresponding node in the max heap.
Removing the max element: Pe |
https://en.wikipedia.org/wiki/ENaira | eNaira is a Central bank digital currency issued and regulated by the Central Bank of Nigeria. Denominated in naira, the eNaira serves as both a medium of exchange and a store of value and claims to offer better payment prospects in retail transactions when compared to cash.
The eNaira was launched and activated on 25 October, 2021 by President Muhammad Buhari, under the slogan: "Same Naira, More Possibilities".
See also
Central bank digital currency
Digital currency
Digital renminbi
Digital rupee |
https://en.wikipedia.org/wiki/HLA-B27 | Human leukocyte antigen (HLA) B27 (subtypes B*2701-2759) is a class I surface antigen encoded by the B locus in the major histocompatibility complex (MHC) on chromosome 6 and presents antigenic peptides (derived from self and non-self antigens) to T cells. HLA-B27 is strongly associated with ankylosing spondylitis and other associated inflammatory diseases, such as psoriatic arthritis, inflammatory bowel disease, and reactive arthritis.
Prevalence
The prevalence of HLA-B27 varies markedly in the global population. For example, about 8% of Caucasians, 4% of North Africans, 2–9% of Chinese, and 0.1–0.5% of persons of Japanese descent possess the gene that codes for this antigen. Among the Sami in Northern Scandinavia (Sápmi), 24% of people are HLA-B27 positive, while 1.8% have associated ankylosing spondylitis, compared to 14-16% of Northern Scandinavians in general. In Finland, an estimated 14% of the population is positive for HLA-B27, while over 95% of patients with ankylosing spondylitis and approximately 70–80% of patients with Reiter's disease or reactive arthritis have the genetic marker.
Disease associations
The relationship between HLA-B27 and many diseases has not yet been fully elucidated. Though HLA-B27 is associated with a wide range of pathology, it does not appear to be the sole mediator in development of disease. In particular, 90% of people with ankylosing spondylitis (AS) are HLA-B27 positive, though only a small fraction of people with HLA-B27 ever develop AS. People who are HLA-B27 positive are also more likely to experience early onset AS than HLA-B27 negative individuals. There are additional genes being discovered that also predispose to AS and associated diseases, and additionally there are potential environmental factors (triggers) that may also play a role in susceptible individuals.
In addition to its association with ankylosing spondylitis, HLA-B27 is implicated in other types of seronegative spondyloarthropathy as well, such as reactive |
https://en.wikipedia.org/wiki/Teva%20Pharmaceuticals | Teva Pharmaceutical Industries Ltd. (also known as Teva Pharmaceuticals) is an Israeli multinational pharmaceutical company with headquarters in Tel Aviv, Israel. It specializes primarily in generic drugs, but other business interests include active pharmaceutical ingredients and, to a lesser extent, proprietary pharmaceuticals. Teva Pharmaceuticals was the largest generic drug manufacturer, when it was surpassed briefly by US-based Pfizer. Teva regained its market leader position once Pfizer spun off its generic drug division in a merger with Mylan, forming the new company Viatris at the end of 2020. Overall, Teva is the 18th largest pharmaceutical company in the world.
Teva's facilities are located in Israel, North America, Europe, Australia, and South America. Teva shares are listed on the Tel Aviv Stock Exchange. The company is a member of the Pharmaceutical Research and Manufacturers of America (PhRMA).
History
Salomon, Levin, and Elstein
Teva's earliest predecessor was SLE, Ltd., a wholesale drug business founded in 1901 in Jerusalem, which at that time was part of the Ottoman Empire's Mutasarrifate of Jerusalem. SLE Ltd. took its name from the initials of its three cofounders: Chaim Salomon, Moshe Levin and Yitschak Elstein, and used camels to make deliveries. During the 1930s, new immigrants from Europe founded several pharmaceutical companies including Teva (טבע, "nature" in Hebrew) and Zori (צרי, "medicine" in biblical Hebrew). In the 1930s, Salomon, Levin, and Elstein Ltd. also founded Assia (אסיא, "medicine, cure" in Aramaic), a pharmaceutical company.
Teva Pharmaceutical Industries
1935–1949
Teva Pharmaceutical Industries took its present form through the efforts of Günther Friedländer and his aunt Else Kober on May 1, 1935. The original registration was under the name Teva Middle East Pharmaceutical & Chemical Works Co. Ltd. in Jerusalem, then part of Mandatory Palestine. Friedländer was a German pharmacist, botanist and pharmacognosist, who im |
https://en.wikipedia.org/wiki/Photosynthetic%20picoplankton | Photosynthetic picoplankton or picophytoplankton is the fraction of the phytoplankton performing photosynthesis composed of cells between 0.2 and 2 µm in size (picoplankton). It is especially important in the central oligotrophic regions of the world oceans that have very low concentration of nutrients.
History
1952: Description of the first truly picoplanktonic species, Chromulina pusilla, by Butcher. This species was renamed in 1960 to Micromonas pusilla and a few studies have found it to be abundant in temperate oceanic waters, although very little such quantification data exists for eukaryotic picophytoplankton.
1979: Discovery of marine Synechococcus by Waterbury and confirmation with electron microscopy by Johnson and Sieburth.
1982: The same Johnson and Sieburth demonstrate the importance of small eukaryotes by electron microscopy.
1983: W.K.W Li and colleagues, including Trevor Platt show that a large fraction of marine primary production is due to organisms smaller than 2 µm.
1986: Discovery of "prochlorophytes" by Chisholm and Olson in the Sargasso Sea, named in 1992 as Prochlorococcus marinus.
1994: Discovery in the Thau lagoon in France of the smallest photosynthetic eukaryote known to date, Ostreococcus tauri, by Courties.
2001: Through sequencing of the ribosomal RNA gene extracted from marine samples, several European teams discover that eukaryotic picoplankton are highly diverse. This finding followed on the first discovery of such eukaryotic diversity in 1998 by Rappe and colleagues at Oregon State University, who were the first to apply rRNA sequencing to eukaryotic plankton in the open-ocean, where they discovered sequences that seemed distant from known phytoplankton The cells containing DNA matching one of these novel sequences were recently visualized and further analyzed using specific probes and found to be broadly distributed.
Methods of study
Because of its very small size, picoplankton is difficult to study by classic methods |
https://en.wikipedia.org/wiki/93rd%20meridian%20west | The meridian 93° west of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, North America, the Gulf of Mexico, Central America, the Pacific Ocean, the Southern Ocean, and Antarctica to the South Pole.
The 93rd meridian west forms a great circle with the 87th meridian east.
From Pole to Pole
Starting at the North Pole and heading south to the South Pole, the 93rd meridian west passes through:
{| class="wikitable plainrowheaders"
! scope="col" width="120" | Co-ordinates
! scope="col" | Country, territory or sea
! scope="col" | Notes
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Arctic Ocean
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Nunavut — Axel Heiberg Island
|-valign="top"
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Norwegian Bay
| style="background:#b0e0e6;" | Passing just east of Cornwall Island, Nunavut, (at )
|-
|
! scope="row" |
| Nunavut — Devon Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Wellington Channel
| style="background:#b0e0e6;" |
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Parry Channel
| style="background:#b0e0e6;" | Barrow Strait
|-
|
! scope="row" |
| Nunavut — Somerset Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Gulf of Boothia
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Nunavut — mainland
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Hudson Bay
| style="background:#b0e0e6;" |
|-valign="top"
|
! scope="row" |
| Manitoba Ontario — from
|-valign="top"
|
! scope="row" |
| Minnesota, passing through Saint Paul (at ) Iowa — from Missouri — from Arkansas — from Louisiana — from
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Gulf of Mexico
| style="background:#b0e0e6;" |
|-valign="top"
|
! scope="row" |
| Tabasco Chi |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.