source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Photosynthate%20partitioning
Photosynthate partitioning is the deferential distribution of photosynthates to plant tissues. A photosynthate is the resulting product of photosynthesis, these products are generally sugars. These sugars that are created from photosynthesis are broken down to create energy for use by the plant. Sugar and other compounds move via the phloem to tissues that have an energy demand. These areas of demand are called sinks. While areas with an excess of sugars and a low energy demand are called sources. Many times sinks are the actively growing tissues of the plant while the sources are where sugars are produced by photosynthesis—the leaves of plants. Sugars are actively loaded into the phloem and moved by a positive pressure flow created by solute concentrations and turgor pressure between xylem and phloem vessel elements (specialized plant cells). This movement of sugars is referred to as translocation. When sugars arrive at the sink they are unloaded for storage or broken down/metabolized. The partitioning of these sugars depends on multiple factors such as the vascular connections that exist, the location of the sink to source, the developmental stage, and the strength of that sink. Vascular connections exist between sources and sinks and those that are the most direct have been shown to receive more photosynthates than those that must travel through extensive connections. This also goes for proximity: those closer to the source are easier to translocate sugars to. Developmental stage plays a large role in partitioning, organs that are young such as meristems and new leaves have a higher demand, as well as those that are entering reproductive maturity—creating fruits, flowers, and seeds. Many of these developing organs have a higher sink strength. Those with higher sink strengths receive more photosynthates than lower strength sinks. Sinks compete to receive these compounds and combination of factors playing in determining how much and how fast sinks rece
https://en.wikipedia.org/wiki/William%20Hamilton%20Meeks%2C%20III
William Hamilton Meeks III (born 8 August 1947 in Washington, DC) is an American mathematician, specializing in differential geometry and minimal surfaces. Meeks studied at the University of California, Berkeley, with bachelor's degree in 1971, master's degree in 1974, and Ph.D. in 1975 with supervisor H. Blaine Lawson and thesis The Conformal Structure and Geometry of Triply Periodic Minimal Surfaces in . He was an assistant professor in 1975–1977 at the University of California, Los Angeles (UCLA), in 1977–1978 at the Instituto de Matemática Pura e Aplicada (IMPA), and in 1978–1979 at Stanford University. From 1979 to 1983 he was a professor at IMPA. He was from 1983 to 1984 a visiting member of the Institute for Advanced Study and from 1984 to 1986 a professor at Rice University with the academic year 1985–1986 spent as a visiting professor at the University of California, Santa Barbara. From 1986 to 2018 he has been the George David Birkhoff Professor of Mathematics at the University of Massachusetts, Amherst. He currently is at the Institute for Advanced Study after assuming professor emeritus status at UMass Amherst. He is known as an expert on minimal surfaces and their computer graphics visualization; on the latter subject he has collaborated with David Allen Hoffman. For the academic year 2006/07 Meeks was a Guggenheim Fellow. In 1986 at the International Congress of Mathematicians in Berkeley, he was Invited Speaker with talk Recent progress on the geometry of surfaces in and on the use of computer graphics as a research tool. Selected publications with Shing-Tung Yau: with Leon Simon and S.-T. Yau: with S.-T. Yau: with L. P. Jorge: with G. Peter Scott: with David Allen Hoffman: with D. Hoffman: with Harold Rosenberg: with Joaquín Pérez: with J. Pérez and Giuseppe Tinaglia:
https://en.wikipedia.org/wiki/Tritium%20%28programming%20language%29
Tritium is a simple scripting language for efficiently transforming structured data like HTML, XML, and JSON. It is similar in purpose to XSLT but has a syntax influenced by jQuery, Sass, and CSS versus XSLT's XML based syntax. History Tritium was designed by Hampton Catlin, the creator of languages Sass and Haml and is currently bundled with the Moovweb mobile platform. As with Sass (created to address deficiencies in CSS) and Haml (created to address deficiencies in coding HTML templates), Catlin designed Tritium to address issues he saw with XSLT while preserving the core benefits of a transformation language. Much of this was based on his prior experience porting Wikipedia's desktop website to the mobile web. Open Tritium is the open source implementation of the Tritium language. It was presented at O'Reilly Open Source Convention 2014 and the compiler is implemented in Go. Concept Tritium takes as input HTML, XML, or JSON documents and outputs HTML, XML, or JSON data that has been transformed according to the rules defined in the Tritium script. Like jQuery, idiomatic Tritium code is structured around selecting a collection of elements via a CSS or XPath selector and then chaining a series of operations on them. For example, the following script will select all the HTML table elements with id of foo and change their width attributes to 100%. # Select all HTML nodes that are table elements with ID foo. # The $$() function takes a regular CSS selector $$(“table#foo”) { # change the width attributes to “100%” attribute(“width”, “100%”) } While Tritium supports both XPath and CSS selectors via the $() and $$() functions (respectively), the preferred usage is XPath. For example, the above code rewritten to use the equivalent XPath selector would be: # Select all HTML nodes that are table elements with ID foo. # The $() uses XPath $(“//table[@id=’foo’]”) { # change the width attributes to “100%” attribute(“width”, “100%”) } Comparison to XSLT Bot
https://en.wikipedia.org/wiki/RFIC
RFIC is an abbreviation of radio-frequency integrated circuit. Applications for RFICs include radar and communications, although the term RFIC might be applied to any electrical integrated circuit operating in a frequency range suitable for wireless transmission. There is considerable interest in RFIC research due to the cost benefit of shifting as much of the wireless transceiver as possible to a single technology, which in turn would allow for a system on a chip solution as opposed to the more common system-on-package. This interest is bolstered by the pervasiveness of wireless capabilities in electronics. Current research focuses on integrating the RF power amplifier (PA) with CMOS technology, either by using MOSFETs or SiGe HBTs, on RF CMOS mixed-signal integrated circuit chips. RFIC-related research conferences RFIC is also used to refer to the annual RFIC Symposium, a research conference held as part of Microwave Week, which is headlined by the International Microwave Symposium. Other peer-reviewed research conferences are listed in the table below. Publications featuring RFIC research IEEE Journal of Solid-State Circuits IEEE Transactions on Microwave Theory and Techniques See also RF module Radio-frequency identification
https://en.wikipedia.org/wiki/FTOS
FTOS or Force10 Operating System is the firmware family used on Force10 Ethernet switches. It has a similar functionality as Cisco's NX-OS or Juniper's Junos. FTOS 10 is running on Debian. As part of a re-branding strategy of Dell FTOS will be renamed to Dell Networking Operating System (DNOS) 9.x or above, while the legacy PowerConnect switches will use DNOS 6.x: see the separate article on DNOS. Hardware Abstraction Layer Three of the four product families from Dell Force10 are using the Broadcom Trident+ ASIC's, but the company doesn't use the API's from Broadcom: the developers at Force10 have written their own Hardware Abstraction Layer so that FTOS can run on different hardware platforms with minimal impact for the firmware. Currently three of the four F10 switch families are based on the Broadcom Trident+ (while the fourth—the E-series—run on self-developed ASIC's); and if the product developers want or need to use different hardware for new products they only need to develop a HAL for that new hardware and the same firmware can run on it. This keeps the company flexible and not dependent on a specific hardware-vendor and can use both 3rd party or self designed ASIC's and chipsets. The human interface in FTOS, that is the way network-administrators can configure and monitor their switches, is based on NetBSD, an implementation which often used in embedded networking-systems. NetBSD is a very stable, open source, OS running on many different hardware platforms. By choosing for a proven technology with extended TCP functionality built into the core of the OS it reduces time during development of new products or extending the FTOS with new features. Modular setup FTOS is also modular where different parts of the OS run independently from each other within one switch: if one process would fail the impact on other processes on the switch are limited. This modular setup is also taken to the hardware level in some product-lines where a routing-module has three se
https://en.wikipedia.org/wiki/Imperator%20torosus
Imperator torosus, commonly known as the brawny bolete, is a species of bolete fungus in the family Boletaceae. It is native to southern Europe east to the Caucasus and Israel. It is generally associated with deciduous trees such as hornbeam, oak and beech in warm, dry locales. Although generally rare in Europe, it appears to be relatively common in Hungary. Appearing in summer and autumn on chalky soils, the stocky fruit bodies have an ochre cap up to 20 cm (8 in) across, yellow pores on the cap underside, and a wine-red to brown or blackish stipe up to long by wide. The pale yellow flesh changes to different colours when broken or bruised depending on age; younger mushrooms become reddish, and older ones additionally take on bluish tones. Elias Magnus Fries and Christopher Theodor Hök first described this species as Boletus torosus in 1835, a name by which it came to be known for many years. Modern molecular phylogenetics shows that it is only distantly related to Boletus edulis—the type species of Boletus—and it was duly placed in the new genus Imperator in 2015. Eating raw mushrooms of this species leads to vomiting and diarrhea. Gastrointestinal symptoms have also occurred after eating cooked specimens, though some people have eaten it without ill effects. Taxonomy Swiss mycologist Louis Secretan described the brawny bolete as Boletus pachypus in his 1833 work Mycographie Suisse. Many of his names have been rejected for nomenclatural purposes because Secretan had a narrow species concept, dividing many taxa into multiple species that were not supported by other authorities, and his works did not use binomial nomenclature consistently. Swedish mycologists Elias Magnus Fries and Christopher Theodor Hök described Boletus torosus in 1835 based on Secretan's B. pachypus—distinct from the B. pachypus described by Fries himself. Fries reported in his 1838 book Epicrisis Systematis Mycologici seu Synopsis Hymenomycetum that he had not actually observed the species,
https://en.wikipedia.org/wiki/Pfam
Pfam is a database of protein families that includes their annotations and multiple sequence alignments generated using hidden Markov models. The most recent version, Pfam 35.0, was released in November 2021 and contains 19,632 families. Uses The general purpose of the Pfam database is to provide a complete and accurate classification of protein families and domains. Originally, the rationale behind creating the database was to have a semi-automated method of curating information on known protein families to improve the efficiency of annotating genomes. The Pfam classification of protein families has been widely adopted by biologists because of its wide coverage of proteins and sensible naming conventions. It is used by experimental biologists researching specific proteins, by structural biologists to identify new targets for structure determination, by computational biologists to organise sequences and by evolutionary biologists tracing the origins of proteins. Early genome projects, such as human and fly used Pfam extensively for functional annotation of genomic data. The Pfam website allows users to submit protein or DNA sequences to search for matches to families in the database. If DNA is submitted, a six-frame translation is performed, then each frame is searched. Rather than performing a typical BLAST search, Pfam uses profile hidden Markov models, which give greater weight to matches at conserved sites, allowing better remote homology detection, making them more suitable for annotating genomes of organisms with no well-annotated close relatives. Pfam has also been used in the creation of other resources such as iPfam, which catalogs domain-domain interactions within and between proteins, based on information in structure databases and mapping of Pfam domains onto these structures. Features For each family in Pfam one can: View a description of the family Look at multiple alignments View protein domain architectures Examine species distribution
https://en.wikipedia.org/wiki/Von%20Neumann%20universal%20constructor
John von Neumann's universal constructor is a self-replicating machine in a cellular automaton (CA) environment. It was designed in the 1940s, without the use of a computer. The fundamental details of the machine were published in von Neumann's book Theory of Self-Reproducing Automata, completed in 1966 by Arthur W. Burks after von Neumann's death. While typically not as well known as von Neumann's other work, it is regarded as foundational for automata theory, complex systems, and artificial life. Indeed, Nobel Laureate Sydney Brenner considered Von Neumann's work on self-reproducing automata (together with Turing's work on computing machines) central to biological theory as well, allowing us to "discipline our thoughts about machines, both natural and artificial." Von Neumann's goal, as specified in his lectures at the University of Illinois in 1949, was to design a machine whose complexity could grow automatically akin to biological organisms under natural selection. He asked what is the threshold of complexity that must be crossed for machines to be able to evolve. His answer was to specify an abstract machine which, when run, would replicate itself. In his design, the self-replicating machine consists of three parts: a "description" of ('blueprint' or program for) itself, a universal constructor mechanism that can read any description and construct the machine (sans description) encoded in that description, and a universal copy machine that can make copies of any description. After the universal constructor has been used to construct a new machine encoded in the description, the copy machine is used to create a copy of that description, and this copy is passed on to the new machine, resulting in a working replication of the original machine that can keep on reproducing. Some machines will do this backwards, copying the description and then building a machine. Crucially, the self-reproducing machine can evolve by accumulating mutations of the description, not t
https://en.wikipedia.org/wiki/Ohio%20Supercomputer%20Center
The Ohio Supercomputer Center (OSC) is a supercomputer facility located on the western end of the Ohio State University campus, just north of Columbus. Established in 1987, the OSC partners with Ohio universities, labs and industries, providing students and researchers with high performance computing, advanced cyberinfrastructure, research and computational science education services. OSC is member-organization of the Ohio Technology Consortium, the technology and information division of the Ohio Department of Higher Education. OSC works with an array of statewide/regional/national communities, including education, academic research, industry, and state government. The Center's research programs are primarily aligned with three of several key areas of research identified by the state to be well positioned for growth and success, such as the biosciences, advanced materials and energy/environment. OSC is funded through the Ohio Department of Higher Education by the state operating and capital budgets of the Ohio General Assembly. History OSC was established by the Ohio Board of Regents (now the Ohio Department of Higher Education) in 1987 as a statewide resource designated to place Ohio's research universities and private industry in the forefront of computational research. Also in 1987, the OSC networking initiative — known today as OARnet — provided the first network access to the Center’s first Cray supercomputer. In 1988, OSC launched the Center’s Industrial Interface Program to serve businesses interested in accessing the supercomputer. Battelle Memorial Institute, located just south of Ohio State, became OSC’s first industrial user. Today, the Center continues to offer HPC services to researcher in industry, primarily through its AweSim industrial engagement program. In the summer of 1989, 20 talented high school students attended the first Governor’s Summer Institute. Today, OSC offers summer STEM education programs through Summer Institute and Young Wome
https://en.wikipedia.org/wiki/Archive.today
archive.today (or archive.is) is a web archiving site, founded in 2012, that saves snapshots on demand, and has support for JavaScript-heavy sites such as Google Maps and progressive web apps such as Twitter. archive.today records two snapshots: one replicates the original webpage including any functional live links; the other is a screenshot of the page. History Archive.today was founded in 2012. The site originally branded itself as archive.today, but in May 2015, changed the primary mirror to archive.is. In January 2019, it began to deprecate the archive.is domain in favor of other mirrors. Features Functionality Archive.today can capture individual pages in response to explicit user requests. Since its beginning, it has supported crawling pages with URLs containing the now-deprecated hash-bang fragment (). Archive.today records only text and images, excluding XML, RTF, spreadsheet (xls or ods) and other non-static content. However, videos for certain sites, like Twitter, are saved. It keeps track of the history of snapshots saved, requesting confirmation before adding a new snapshot of an already saved page. Pages are captured at a browser width of 1,024 pixels. CSS is converted to inline CSS, removing responsive web design and selectors such as :hover and :active. Content generated using JavaScript during the crawling process appears in a frozen state. HTML class names are preserved inside the old-class attribute. When text is selected, a JavaScript applet generates a URL fragment seen in the browser's address bar that automatically highlights that portion of the text when visited again. Web pages cannot be duplicated from archive.today to web.archive.org as second-level backup, as archive.today places an exclusion for Wayback Machine and does not save its snapshots in WARC format. The reverse—from web.archive.org to archive.today—is possible, but the copy usually takes more time than a direct capture. Some web sites get deleted from Internet Archive's
https://en.wikipedia.org/wiki/Higher-order%20differential%20cryptanalysis
In cryptography, higher-order differential cryptanalysis is a generalization of differential cryptanalysis, an attack used against block ciphers. While in standard differential cryptanalysis the difference between only two texts is used, higher-order differential cryptanalysis studies the propagation of a set of differences between a larger set of texts. Xuejia Lai, in 1994, laid the groundwork by showing that differentials are a special case of the more general case of higher order derivates. Lars Knudsen, in the same year, was able to show how the concept of higher order derivatives can be used to mount attacks on block ciphers. These attacks can be superior to standard differential cryptanalysis. Higher-order differential cryptanalysis has notably been used to break the KN-Cipher, a cipher which had previously been proved to be immune against standard differential cryptanalysis. Higher-order derivatives A block cipher which maps -bit strings to -bit strings can, for a fixed key, be thought of as a function . In standard differential cryptanalysis, one is interested in finding a pair of an input difference and an output difference such that two input texts with difference are likely to result in output texts with a difference i.e., that is true for many . Note that the difference used here is the XOR which is the usual case, though other definitions of difference are possible. This motivates defining the derivative of a function at a point as Using this definition, the -th derivative at can recursively be defined as Thus for example . Higher order derivatives as defined here have many properties in common with ordinary derivative such as the sum rule and the product rule. Importantly also, taking the derivative reduces the algebraic degree of the function. Higher-order differential attacks To implement an attack using higher order derivatives, knowledge about the probability distribution of the derivative of the cipher is needed. Calculating or est
https://en.wikipedia.org/wiki/Video%20game%20clone
A video game clone is either a video game or a video game console very similar to, or heavily inspired by, a previous popular game or console. Clones are typically made to take financial advantage of the popularity of the cloned game or system, but clones may also result from earnest attempts to create homages or expand on game mechanics from the original game. An additional motivation unique to the medium of games as software with limited compatibility, is the desire to port a simulacrum of a game to platforms that the original is unavailable for or unsatisfactorily implemented on. The legality of video game clones is governed by copyright and patent law. In the 1970s, Magnavox controlled several patents to the hardware for Pong, and pursued action against unlicensed Pong clones that led to court rulings in their favor, as well as legal settlements for compensation. As game production shifted to software on discs and cartridges, Atari sued Philips under copyright law, allowing them to shut down several clones of Pac-Man. By the end of the 1980s, courts had ruled in favor of a few alleged clones, and the high costs of a lawsuit meant that most disputes with alleged clones were ignored or settled through to the mid-2000s. In 2012, courts ruled against alleged clones in both Tetris Holding, LLC v. Xio Interactive, Inc. and Spry Fox, LLC v. Lolapps, Inc., due to explicit similarities between the games' expressive elements. Legal scholars agree that these cases establish that general game ideas, game mechanics, and stock scenes cannot be protected by copyright – only the unique expression of those ideas. However, the high cost of a lawsuit combined with the fact-specific nature of each dispute has made it difficult to predict which game developers can protect their games' look and feel from clones. Other methods like patents, trademarks, and industry regulation have played a role in shaping the prevalence of clones. Overview Cloning a game in digital marketplaces is
https://en.wikipedia.org/wiki/Working%20landscape
Working landscapes are landscapes used for farming, ranching and/or forestry. Recently, these have become the focus of efforts to conserve biodiversity, as these now cover more than 80% of Earth's land, and therefore offer increasing opportunities for conservation and restoration. Though some parts of these landscapes may be used so intensively that they may be unable to sustain native species, working landscapes generally also include significant areas of habitats suitable for native species within their diverse and multifunctional mosaics of intensively used, fallow, and regenerating areas. Working landscapes are critical to sustain biodiversity Conventional protected areas can offer high quality habitats with strong protections for native species, but their total global extent will always be limited. As landscapes without human inhabitation and use are already rare and only getting rarer, conservation in working landscapes has become increasingly critical to the future of biodiversity. For example, the conservation of 20% of working landscape area for native habitats has been proposed as a global conservation target, and is only one among many strategies for conservation beyond protected areas that falls under the rubric of Other effective area-based conservation measures. Satellite mapping has been increasingly deployed to monitor how human activities modify working landscapes over time across extensive regions. See also Landscape Ecology Land use Landscape-scale conservation Multifunctional landscape Anthropogenic biome
https://en.wikipedia.org/wiki/Targeted%20analysis%20sequencing
Targeted analysis sequencing (sometimes called target amplicon sequencing) (TAS) is a next-generation DNA sequencing technique focusing on amplicons and specific genes. It is useful in population genetics since it can target a large diversity of organisms. The TAS approach incorporates bioinformatics techniques to produce a large amount of data at a fraction of the cost involved in Sanger sequencing. TAS is also useful in DNA studies because it allows for amplification of the needed gene area via PCR, which is followed by next-gen sequencing platforms. Next-gen sequencing use shorter reads 50–400 base pairs which allow for quicker sequencing of multiple specimens. Thus TAS allows for a cheaper sequencing approach for that is easily scalable and offers both reliability and speed.
https://en.wikipedia.org/wiki/Universal%20Test%20Specification%20Language
Universal Test Specification Language (UTSL) is a programming language used to describe ASIC tests in a format that leads to an automated translation of the test specification into an executable test code. UTSL is platform independent and provided a code generation interface for a specific platform is available, UTSL code can be translated into the programming language of a specific Automatic Test Equipment (ATE). History Increased complexity of ASICs leads to requirements of more complex test programs with longer development times. An automated test program generation could simplify and speed up this process. Teradyne Inc. together with Robert Bosch GmbH agreed to develop a concept and a tool chain for an automated test-program generation. To achieve this a tester independent programming language was required. Hence, UTSL, a programming language that enables detailed description of tests that can be translated into the ATE specific programming language was developed. The ATE manufacturers need to provide a Test Program Generator that uses the UTSL test description as inputs and generates the ATE-specific test code with optimal resource mapping and better practice program code. As long as the ATE manufacturer provides with the test program generator that can use UTSL as an input the cumbersome task of translating a test program from one platform to another can be significantly simplified. In other words, the task of rewriting of the test programs for a specific platform can be replaced by the automatically generating the code from the UTSL based test specification. Prerequisite for this is that the UTSL description of tests is sufficiently detailed with definition of the test technique as well as the description of all the necessary inputs and outputs. Being a platform independent programming language, UTSL allows the engineers to read, analyse and modify the tests in the test specification regardless of the ATE at which the testing of the ASIC will be done. UTS
https://en.wikipedia.org/wiki/Rotary%20feeder
Rotary feeders, also known as rotary airlocks or rotary valves, are commonly used in industrial and agricultural applications as a component in a bulk or specialty material handling system. Rotary feeders are primarily used for discharge of bulk solid material from hoppers/bins, receivers, and cyclones into a pressure or vacuum-driven pneumatic conveying system. Components of a rotary feeder include a rotor shaft, housing, head plates, and packing seals and bearings. Rotors have large vanes cast or welded on and are typically driven by small internal combustion engines or electric motors. Use Rotary airlock feeders have wide application in industry wherever dry free-flowing powders, granules, crystals, or pellets are used. Typical materials include: cement, ore, sugar, minerals, grains, plastics, dust, fly ash, flour, gypsum, lime, coffee, cereals, pharmaceuticals, etc. Industries requiring this type include cement, asphalt, chemical, mining, plastics, food, etc. Rotary feeders are ideal for pollution control applications in wood, grain, food, textile, paper, tobacco, rubber, and paint industries, the Standard Series works beneath dust collectors and cyclone separators even with high temperatures and different pressure differentials. Rotary valves are available with square or round inlet and outlet flanges. Housing can be fabricated out of sheet material or cast. Common materials are cast iron, carbon steel, 304 SS, 316 SS, and other materials. Rotary airlock feeders are often available in standard and heavy duty models, the difference being the head plate and bearing configuration. Heavy duty models use an outboard bearing in which the bearings are moved out away from the head plate. Housing inlet and discharge configurations are termed drop-thru or side entry. Different wear protections are available such as hard chrome or ceramic plating on the inner housing surfaces. Grease and air purge fittings are often provided to prevent contaminants from entering th
https://en.wikipedia.org/wiki/Quality%20function%20deployment
Quality function deployment (QFD) is a method developed in Japan beginning in 1966 to help transform the voice of the customer into engineering characteristics for a product. Yoji Akao, the original developer, described QFD as a "method to transform qualitative user demands into quantitative parameters, to deploy the functions forming quality, and to deploy methods for achieving the design quality into subsystems and component parts, and ultimately to specific elements of the manufacturing process." The author combined his work in quality assurance and quality control points with function deployment used in value engineering. House of quality The house of quality, a part of QFD, is the basic design tool of quality function deployment. It identifies and classifies customer desires (What's), identifies the importance of those desires, identifies engineering characteristics which may be relevant to those desires (How's), correlates the two, allows for verification of those correlations, and then assigns objectives and priorities for the system requirements. This process can be applied at any system composition level (e.g. system, subsystem, or component) in the design of a product, and can allow for assessment of different abstractions of a system. It is intensely progressed through a number of hierarchical levels of What’s and How’s and analyse each stage of product growth (service enhancement), and production (service delivery). The house of quality appeared in 1972 in the design of an oil tanker by Mitsubishi Heavy Industries. The output of the house of quality is generally a matrix with customer desires on one dimension and correlated nonfunctional requirements on the other dimension. The cells of matrix table are filled with the weights assigned to the stakeholder characteristics where those characteristics are affected by the system parameters across the top of the matrix. At the bottom of the matrix, the column is summed, which allows for the system charac
https://en.wikipedia.org/wiki/Linear%20optical%20quantum%20computing
Linear optical quantum computing or linear optics quantum computation (LOQC) is a paradigm of quantum computation, allowing (under certain conditions, described below) universal quantum computation. LOQC uses photons as information carriers, mainly uses linear optical elements, or optical instruments (including reciprocal mirrors and waveplates) to process quantum information, and uses photon detectors and quantum memories to detect and store quantum information. Overview Although there are many other implementations for quantum information processing (QIP) and quantum computation, optical quantum systems are prominent candidates, since they link quantum computation and quantum communication in the same framework. In optical systems for quantum information processing, the unit of light in a given mode—or photon—is used to represent a qubit. Superpositions of quantum states can be easily represented, encrypted, transmitted and detected using photons. Besides, linear optical elements of optical systems may be the simplest building blocks to realize quantum operations and quantum gates. Each linear optical element equivalently applies a unitary transformation on a finite number of qubits. The system of finite linear optical elements constructs a network of linear optics, which can realize any quantum circuit diagram or quantum network based on the quantum circuit model. Quantum computing with continuous variables is also possible under the linear optics scheme. The universality of 1- and 2-bit gates to implement arbitrary quantum computation has been proven. Up to unitary matrix operations () can be realized by only using mirrors, beam splitters and phase shifters (this is also a starting point of boson sampling and of computational complexity analysis for LOQC). It points out that each operator with inputs and outputs can be constructed via linear optical elements. Based on the reason of universality and complexity, LOQC usually only uses mirrors, beam split
https://en.wikipedia.org/wiki/Kuratowski%20closure%20axioms
In topology and related branches of mathematics, the Kuratowski closure axioms are a set of axioms that can be used to define a topological structure on a set. They are equivalent to the more commonly used open set definition. They were first formalized by Kazimierz Kuratowski, and the idea was further studied by mathematicians such as Wacław Sierpiński and António Monteiro, among others. A similar set of axioms can be used to define a topological structure using only the dual notion of interior operator. Definition Kuratowski closure operators and weakenings Let be an arbitrary set and its power set. A Kuratowski closure operator is a unary operation with the following properties: A consequence of preserving binary unions is the following condition: In fact if we rewrite the equality in [K4] as an inclusion, giving the weaker axiom [K4''] (subadditivity): then it is easy to see that axioms [K4'] and [K4''] together are equivalent to [K4] (see the next-to-last paragraph of Proof 2 below). includes a fifth (optional) axiom requiring that singleton sets should be stable under closure: for all , . He refers to topological spaces which satisfy all five axioms as T1-spaces in contrast to the more general spaces which only satisfy the four listed axioms. Indeed, these spaces correspond exactly to the topological T1-spaces via the usual correspondence (see below). If requirement [K3] is omitted, then the axioms define a Čech closure operator. If [K1] is omitted instead, then an operator satisfying [K2], [K3] and [K4'] is said to be a Moore closure operator. A pair is called Kuratowski, Čech or Moore closure space depending on the axioms satisfied by . Alternative axiomatizations The four Kuratowski closure axioms can be replaced by a single condition, given by Pervin: Axioms [K1]–[K4] can be derived as a consequence of this requirement: Choose . Then , or . This immediately implies [K1]. Choose an arbitrary and . Then, applying axiom [K1], , implying [
https://en.wikipedia.org/wiki/Sperm
Sperm (: sperm or sperms) is the male reproductive cell, or gamete, in anisogamous forms of sexual reproduction (forms in which there is a larger, female reproductive cell and a smaller, male one). Animals produce motile sperm with a tail known as a flagellum, which are known as spermatozoa, while some red algae and fungi produce non-motile sperm cells, known as spermatia. Flowering plants contain non-motile sperm inside pollen, while some more basal plants like ferns and some gymnosperms have motile sperm. Sperm cells form during the process known as spermatogenesis, which in amniotes (reptiles and mammals) takes place in the seminiferous tubules of the testes. This process involves the production of several successive sperm cell precursors, starting with spermatogonia, which differentiate into spermatocytes. The spermatocytes then undergo meiosis, reducing their chromosome number by half, which produces spermatids. The spermatids then mature and, in animals, construct a tail, or flagellum, which gives rise to the mature, motile sperm cell. This whole process occurs constantly and takes around 3 months from start to finish. Sperm cells cannot divide and have a limited lifespan, but after fusion with egg cells during fertilization, a new organism begins developing, starting as a totipotent zygote. The human sperm cell is haploid, so that its 23 chromosomes can join the 23 chromosomes of the female egg to form a diploid cell with 46 paired chromosomes. In mammals, sperm is stored in the epididymis and is released from the penis during ejaculation in a fluid known as semen. The word sperm is derived from the Greek word σπέρμα, sperma, meaning "seed". Evolution It is generally accepted that isogamy is the ancestor to sperm and eggs. However, there are no fossil records for the evolution of sperm and eggs from isogamy leading there to be a strong emphasis on mathematical models to understand the evolution of sperm. A widespread hypothesis states that sperm evolve
https://en.wikipedia.org/wiki/Island%20syndrome
Island syndrome describes the differences in morphology, ecology, physiology and behaviour of insular species compared to their continental counterparts. These differences evolve due to the different ecological pressures affecting insular species, including a paucity of large predators and herbivores as well as a consistently mild climate. Ecological driving factors Reduced predation. Island ecosystems cannot support a sufficient biomass of prey in order to accommodate large predators. This largely relieves prey species of the risk of predation, which mostly removes the selection pressure for morphologies, ecologies and behaviours that help to evade large predators. Reduced biodiversity. Insular ecosystems tend to comprise large populations of a limited number of species (a state termed density compensation), therefore, they exhibit low biodiversity. This results in reduced interspecific competition and increased intraspecific competition. Reduced sexual selection. There is also reduced sexual selection in insular species, which is especially prominent in birds which lose their sexually dimorphic plumage used in sexual displays. Reduced parasite diversity. Finally, there is reduced parasite diversity in insular ecosystems which reduces the level of selection acting on immune-related genes. Features of island syndrome in animals Body size Interspecific competition between continental species drives divergence of body size so that species may avoid high levels of competition by occupying distinct niches. Reduced interspecific competition between insular species reduces this selection pressure for species to occupy distinct niches. As a result, there is less diversity in the body size of insular species. Typically small mammals increase in size (for example fossa are a larger insular relative of the mongoose) while typically large mammals decrease in size (for example the Malagasy hippopotamuses are smaller insular relatives of continental hippopotamuses). These ar
https://en.wikipedia.org/wiki/Perpetual%20access
Perpetual access is the stated continuous access of licensed electronic material after is it no longer accessible through an active paid subscription either through the library or publisher action. In many cases, the two parties involved in the license agree that it is necessary for the license to retain access to these materials after the license has lapsed. Other terms for perpetual access or similar trains of thought are ‘post-cancellation access’ and ‘continuing access.' In the licensing of software products, a perpetual license means that a software application is sold on a one-time basis and the licensee can then use a copy of the software forever. The license holder has indefinite access to a specific version of a software program by paying for it only once. Perpetual access is a term that is used within the library community to describe the ability to retain access to electronic journals after the contractual agreement for these materials has passed. Typically when a library licenses access to an electronic journal, the journal's content remains in the possession of the licensor. The library often purchases the rights to all back issues as well as new issues. When the license expires, access to all the journal's contents is lost. In a typical print model, the library purchases the journals and retains them for the duration of the contract but also after the contract expires. In order to retain access to journals that were released during the term of a license for digital electronic journals, the library must obtain perpetual access rights. The ability to maintain perpetual access can be seen in the shift from print to electronic material, as apparent in both user demand and advantages of non-print material. Electronic materials rely on a relationship between library and publisher, with a distinct dynamic over the publisher's control of the licensed material. This in turn causes issues when the paid for subscription with a publisher ends and the use of
https://en.wikipedia.org/wiki/Homodyne%20detection
In electrical engineering, homodyne detection is a method of extracting information encoded as modulation of the phase and/or frequency of an oscillating signal, by comparing that signal with a standard oscillation that would be identical to the signal if it carried null information. "Homodyne" signifies a single frequency, in contrast to the dual frequencies employed in heterodyne detection. When applied to processing of the reflected signal in remote sensing for topography, homodyne detection lacks the ability of heterodyne detection to determine the size of a static discontinuity in elevation between two locations. (If there is a path between the two locations with smoothly changing elevation, then homodyne detection may in principle be able to track the signal phase along the path if sampling is dense enough). Homodyne detection is more readily applicable to velocity sensing. In optics In optical interferometry, homodyne signifies that the reference radiation (i.e. the local oscillator) is derived from the same source as the signal before the modulating process. For example, in a laser scattering measurement, the laser beam is split into two parts. One is the local oscillator and the other is sent to the system to be probed. The scattered light is then mixed with the local oscillator on the detector. This arrangement has the advantage of being insensitive to fluctuations in the frequency of the laser. Usually the scattered beam will be weak, in which case the (nearly) steady component of the detector output is a good measure of the instantaneous local oscillator intensity and therefore can be used to compensate for any fluctuations in the intensity of the laser. Radio technology In radio technology, the distinction is not the source of the local oscillator, but the frequency used. In heterodyne detection, the local oscillator is frequency-shifted, while in homodyne detection it has the same frequency as the radiation to be detected. See direct conversion re
https://en.wikipedia.org/wiki/Indexer%20%28programming%29
In object-oriented programming, an indexer allows instances of a particular class or struct to be indexed just like arrays. It is a form of operator overloading. Implementation Indexers are implemented through the get and set accessors for the . They are similar to properties, but differ by not being static, and the fact that indexers' accessors take parameters. The get and set accessors are called as methods using the parameter list of the indexer declaration, but the set accessor still has the implicit parameter. Example Here is a C# example of the usage of an indexer in a class: class Family { private List<string> _familyMembers = new List<string>(); public Family(params string[] members) { _familyMembers.AddRange(members); } public string this[int index] { // The get accessor get => _familyMembers[index]; // The set accessor with set => _familyMembers[index] = value; } public int this[string val] { // Getting index by value (first element found) get => _familyMembers.FindIndex(m => m == val); } public int Length => _familyMembers.Count; } Usage example: void Main() { var doeFamily = new Family("John", "Jane"); for (int i = 0; i < doeFamily.Length; i++) { var member = doeFamily[i]; var index = doeFamily[member]; // same as i in this case, but it demonstrates indexer overloading allowing to search doeFamily by value. Console.WriteLine($"{member} is the member number {index} of the {nameof(doeFamily)}"); } } In this example, the indexer is used to get the value at the nth position, and then to get the position in the list referenced by its value. The output of the code is: John is the member number 0 of the doeFamily Jane is the member number 1 of the doeFamily See also Mutator method
https://en.wikipedia.org/wiki/Westerdijk%20Institute
The Westerdijk Institute, or Westerdijk Fungal Biodiversity Institute, is part of the Royal Netherlands Academy of Arts and Sciences. The institute was renamed on 10 February 2017, after Johanna Westerdijk, the first female professor in the Netherlands and director of the institute from 1907 to 1958. The former name of the institute was CBS-KNAW Fungal Biodiversity Centre or Centraalbureau voor Schimmelcultures (Central Bureau of Fungal Cultures in English). Despite the name change the collection maintained by the institute remains the CBS collections and the use of CBS numbers for the strains continues. The institute is located in Utrecht Science Park, a suburb of Utrecht. Before it had been located between offices at the university in Delft and in Baarn. CBS was established in 1904 as a collection of living fungi and algae at the Eleventh International Botanical Congress in Vienna. Since 2002 Pedro Willem Crous has been director of CBS as the successor of Dirk van der Mei. Since its inception the institute has built one of the world's largest collections of fungi, yeasts and bacteria. The collection serves as an International standard for microbiologists, ecologists and geneticists. The institute is roughly divided into two parts: Collection Management and Research. Researchers carry out investigations in taxonomy (biology) and evolutionary biology of fungi, ecological and genomic issues are often involved. The institute also acts as a centre of expertise for questions related to fungi, yeasts and bacteria from scientists, business, government and the public. The institute also organises courses in general mycology, medical mycology, mycology relating to food and to the built environment. The CBS collection has been recognised as a repository of proprietary molds, yeasts and bacteria. The Institute carries out identifications of microorganisms for third parties and advises on problems caused by fungi and yeasts. Presently there are eight research groups: Ap
https://en.wikipedia.org/wiki/Aeon
The word aeon , also spelled eon (in American and Australian English), originally meant "life", "vital force" or "being", "generation" or "a period of time", though it tended to be translated as "age" in the sense of "ages", "forever", "timeless" or "for eternity". It is a Latin transliteration from the ancient Greek word (), from the archaic () meaning "century". In Greek, it literally refers to the timespan of one hundred years. A cognate Latin word or (cf. ) for "age" is present in words such as longevity and mediaeval. Although the term aeon may be used in reference to a period of a billion years (especially in geology, cosmology and astronomy), its more common usage is for any long, indefinite period. Aeon can also refer to the four aeons on the geologic time scale that make up the Earth's history, the Hadean, Archean, Proterozoic, and the current aeon, Phanerozoic. Astronomy and cosmology In astronomy, an aeon is defined as a billion years (109 years, abbreviated AE). Roger Penrose uses the word aeon to describe the period between successive and cyclic Big Bangs within the context of conformal cyclic cosmology. Philosophy and mysticism In Buddhism, an "aeon" or (Sanskrit: ) is often said to be 1,334,240,000 years, the life cycle of the world. Christianity's idea of "eternal life" comes from the word for life, (), and a form of (), which could mean life in the next aeon, the Kingdom of God, or Heaven, just as much as immortality, as in . According to Christian universalism, the Greek New Testament scriptures use the word () to mean a long period and the word () to mean "during a long period"; thus, there was a time before the aeons, and the aeonian period is finite. After each person's mortal life ends, they are judged worthy of aeonian life or aeonian punishment. That is, after the period of the aeons, all punishment will cease and death is overcome and then God becomes the all in each one (). This contrasts with the conventional Christian b
https://en.wikipedia.org/wiki/Ovulatory%20shift%20hypothesis
The ovulatory shift hypothesis holds that women experience evolutionarily adaptive changes in subconscious thoughts and behaviors related to mating during different parts of the ovulatory cycle. It suggests that what women want, in terms of men, changes throughout the menstrual cycle. Two meta-analyses published in 2014 reached opposing conclusions on whether the existing evidence was robust enough to support the prediction that women's mate preferences change across the cycle. A newer 2018 review does not show women changing the type of men they desire at different times in their fertility cycle. Overview The theory proposes that women's behavior may change during the most fertile time in their ovulatory cycle. At high fertility, the theory holds that women may become more physically active and avoid male relatives. The hypothesis separately proposes that hormonal changes across the cycle cause women, when they are most likely to get pregnant, to be more attracted to traits in potential short-term male sexual partners that indicate high genetic quality, leading to greater reproductive success. It has been proposed that genetic traits like compatible major histocompatibility complex gene profiles are considered more attractive. Newer studies do not support female changes in desired reproductive partners when more fertile. Estrus in humans Most female mammals experience reproductive fertility cycles. They typically consist of a long period of low fertility, and a brief period of high fertility just prior to and including ovulation. In humans, this is called the ovulatory cycle, or menstrual cycle. The period of high fertility is also called the fertile window, and is the only time during the cycle when sex can result in conception. Females of most mammalian species display hormonally-induced physical and behavioral signals of their fertility during the fertile window, such as sexual swellings and increased motivation to mate. Some species will not—or cannot
https://en.wikipedia.org/wiki/Rhopalosiphum%20padi%20virus
Rhopalosiphum padi virus (RhPV) is a member of Dicistroviridae family, which includes cricket paralysis virus (CrPV), Plautia stali intestine virus and Drosophila C virus. Its 5'UTR region contains an internal ribosome entry site (IRES) element with a cross-kingdom activity. It can function efficiently in mammalian, plant and insect translation systems. Testing of R. padi aphids collected from different sites in Sweden revealed the presence of RhPV in wild aphid populations for the first time in Europe. Virus could be detected in several life stages of R. padi, including sexual individuals and eggs, establishing an over-wintering route for the virus.
https://en.wikipedia.org/wiki/Weyl%27s%20postulate
In relativistic cosmology, Weyl's postulate stipulates that in the Friedmann model of the universe (a fluid cosmological model), the wordlines of fluid particles (modeling galaxies) should be hypersurface orthogonal. Meaning, they should form a 3-bundle of non-intersecting geodesics orthogonal to a series of spacelike hypersurfaces (hyperslices). Sometimes, the additional hypothesis is added that the world lines form timelike geodesics. Intuitive significance The ADM formalism introduced a family of spatial hyperslices. This allows us to think of the geometry of "space" as evolving over "time". This is an attractive viewpoint, but in general no such family of hyperslices will be physically preferred. The Weyl hypothesis can be understood as the assumption that we should consider only cosmological models in which there is such a preferred slicing, namely the one given by taking the unique hyperslices orthogonal to the world lines of the fluid particles. One consequence of this hypothesis is that if it holds true, we can introduce a comoving chart such that the metric tensor contains no terms of form dt dx, dt dy, or dt dz. The additional hypothesis that the world lines of the fluid particles be geodesics is equivalent to assuming that no body forces act within the fluid. In other words, the fluid has zero pressure, so that we are considering a dust solution. Relation to vorticity The condition that the congruence corresponding to the fluid particles should be hypersurface orthogonal is by no means assured. A generic congruence does not possess this property, which is in fact mathematically equivalent to stipulating that the congruence of world lines should be vorticity-free. That is, they should not be twisting about one another, or in other words, the fluid elements should not be swirling about their neighbors in the manner of the fluid particles in a stirred cup of some liquid. (Nonzero vorticity model is presented in https://arxiv.org/ftp/arxiv/papers
https://en.wikipedia.org/wiki/Skolem%20arithmetic
In mathematical logic, Skolem arithmetic is the first-order theory of the natural numbers with multiplication, named in honor of Thoralf Skolem. The signature of Skolem arithmetic contains only the multiplication operation and equality, omitting the addition operation entirely. Skolem arithmetic is weaker than Peano arithmetic, which includes both addition and multiplication operations. Unlike Peano arithmetic, Skolem arithmetic is a decidable theory. This means it is possible to effectively determine, for any sentence in the language of Skolem arithmetic, whether that sentence is provable from the axioms of Skolem arithmetic. The asymptotic running-time computational complexity of this decision problem is triply exponential. Expressive power First-order logic with equality and multiplication of positive integers can express the relation . Using this relation and equality, we can define the following relations on positive integers: Divisibility: Greatest common divisor: Least common multiple: the constant : Prime number: Number is a product of primes (for a fixed ): Number is a power of some prime: Number is a product of exactly prime powers: Idea of decidability The truth value of formulas of Skolem arithmetic can be reduced to the truth value of sequences of non-negative integers constituting their prime factor decomposition, with multiplication becoming point-wise addition of sequences. The decidability then follows from the Feferman–Vaught theorem that can be shown using Quantifier elimination. Another way of stating this is that first-order theory of positive integers is isomorphic to the first-order theory of finite multisets of non-negative integers with the multiset sum operation, whose decidability reduces to the decidability of the theory of elements. In more detail, according to the fundamental theorem of arithmetic, a positive integer can be represented as a product of prime powers: If a prime number does not appear as a fact
https://en.wikipedia.org/wiki/Peptide%20amphiphile
Peptide amphiphiles (PAs) are peptide-based molecules that self-assemble into supramolecular nanostructures including; spherical micelles, twisted ribbons, and high-aspect-ratio nanofibers. A peptide amphiphile typically comprises a hydrophilic peptide sequence attached to a lipid tail, i.e. a hydrophobic alkyl chain with 10 to 16 carbons. Therefore, they can be considered a type of lipopeptide. A special type of PA, is constituted by alternating charged and neutral residues, in a repeated pattern, such as RADA16-I. The PAs were developed in the 1990s and the early 2000s and could be used in various medical areas including: nanocarriers, nanodrugs, and imaging agents. However, perhaps their main potential is in regenerative medicine to culture and deliver cells and growth factors. History Peptide amphiphiles were developed in the 1990s. They were first described by the group of Matthew Tirrell in 1995. These first reported PA molecules were composed of two domains: one of lipophilic character and another of hydrophilic properties, which allowed self-assembly into sphere-like supramolecular structures as a result of the association of the lipophilic domains away from the solvent (hydrophobic effect), which resulted in the core of the nanostructure. The hydrophilic residues become exposed to the water, giving rise to a soluble nanostructure. Work in the laboratory of Samuel I. Stupp by Hartgerink et al., in the early 2000s, reported a new type of PA that are able to self-assemble into elongated nanostructures. These novel PAs contain three regions: a hydrophobic tail, a region of beta-sheet-forming amino acids, and a charged peptide epitope designed to allow solubility of the molecule in water. In addition, the PAs may contain a targeting or signaling epitope that allows the formed nanostructures to perform a biological function, either targeting or signaling, by interacting with living systems. The self-assembly mechanism of these PAs is a combination of hydrogen
https://en.wikipedia.org/wiki/Quasideterminant
In mathematics, the quasideterminant is a replacement for the determinant for matrices with noncommutative entries. Example 2 × 2 quasideterminants are as follows: In general, there are n2 quasideterminants defined for an n × n matrix (one for each position in the matrix), but the presence of the inverted terms above should give the reader pause: they are not always defined, and even when they are defined, they do not reduce to determinants when the entries commute. Rather, where means delete the ith row and jth column from A. The examples above were introduced between 1926 and 1928 by Richardson and Heyting, but they were marginalized at the time because they were not polynomials in the entries of . These examples were rediscovered and given new life in 1991 by Israel Gelfand and Vladimir Retakh. There, they develop quasideterminantal versions of many familiar determinantal properties. For example, if is built from by rescaling its -th row (on the left) by , then . Similarly, if is built from by adding a (left) multiple of the -th row to another row, then . They even develop a quasideterminantal version of Cramer's rule. Definition Let be an matrix over a (not necessarily commutative) ring and fix . Let denote the ()-entry of , let denote the -th row of with column deleted, and let denote the -th column of with row deleted. The ()-quasideterminant of is defined if the submatrix is invertible over . In this case, Recall the formula (for commutative rings) relating to the determinant, namely . The above definition is a generalization in that (even for noncommutative rings) one has whenever the two sides makes sense. Identities One of the most important properties of the quasideterminant is what Gelfand and Retakh call the "heredity principle". It allows one to take a quasideterminant in stages (and has no commutative counterpart). To illustrate, suppose is a block matrix decomposition of an matrix with a matrix. If the ()-
https://en.wikipedia.org/wiki/DNase%20footprinting%20assay
A DNase footprinting assay is a DNA footprinting technique from molecular biology/biochemistry that detects DNA-protein interaction using the fact that a protein bound to DNA will often protect that DNA from enzymatic cleavage. This makes it possible to locate a protein binding site on a particular DNA molecule. The method uses an enzyme, deoxyribonuclease (DNase, for short), to cut the radioactively end-labeled DNA, followed by gel electrophoresis to detect the resulting cleavage pattern. For example, the DNA fragment of interest may be PCR amplified using a 32P 5' labeled primer, with the result being many DNA molecules with a radioactive label on one end of one strand of each double stranded molecule. Cleavage by DNase will produce fragments. The fragments which are smaller with respect to the 32P-labelled end will appear further on the gel than the longer fragments. The gel is then used to expose a special photographic film. The cleavage pattern of the DNA in the absence of a DNA binding protein, typically referred to as free DNA, is compared to the cleavage pattern of DNA in the presence of a DNA binding protein. If the protein binds DNA, the binding site is protected from enzymatic cleavage. This protection will result in a clear area on the gel which is referred to as the "footprint". By varying the concentration of the DNA-binding protein, the binding affinity of the protein can be estimated according to the minimum concentration of protein at which a footprint is observed. This technique was developed by David J. Galas and Albert Schmitz at Geneva in 1977 See also DNA footprinting DNase I Toeprinting assay
https://en.wikipedia.org/wiki/Line%20bundle
In mathematics, a line bundle expresses the concept of a line that varies from point to point of a space. For example, a curve in the plane having a tangent line at each point determines a varying line: the tangent bundle is a way of organising these. More formally, in algebraic topology and differential topology, a line bundle is defined as a vector bundle of rank 1. Line bundles are specified by choosing a one-dimensional vector space for each point of the space in a continuous manner. In topological applications, this vector space is usually real or complex. The two cases display fundamentally different behavior because of the different topological properties of real and complex vector spaces: If the origin is removed from the real line, then the result is the set of 1×1 invertible real matrices, which is homotopy-equivalent to a discrete two-point space by contracting the positive and negative reals each to a point; whereas removing the origin from the complex plane yields the 1×1 invertible complex matrices, which have the homotopy type of a circle. From the perspective of homotopy theory, a real line bundle therefore behaves much the same as a fiber bundle with a two-point fiber, that is, like a double cover. A special case of this is the orientable double cover of a differentiable manifold, where the corresponding line bundle is the determinant bundle of the tangent bundle (see below). The Möbius strip corresponds to a double cover of the circle (the θ → 2θ mapping) and by changing the fiber, can also be viewed as having a two-point fiber, the unit interval as a fiber, or the real line. Complex line bundles are closely related to circle bundles. There are some celebrated ones, for example the Hopf fibrations of spheres to spheres. In algebraic geometry, an invertible sheaf (i.e., locally free sheaf of rank one) is often called a line bundle. Every line bundle arises from a divisor with the following conditions (I) If X is reduced and irreducible sc
https://en.wikipedia.org/wiki/Kharitonov%20region
A Kharitonov region is a concept in mathematics. It arises in the study of the stability of polynomials. Let be a simply-connected set in the complex plane and let be the polynomial family. is said to be a Kharitonov region if is a subset of Here, denotes the set of all vertex polynomials of complex interval polynomials and denotes the set of all vertex polynomials of real interval polynomials See also Kharitonov's theorem
https://en.wikipedia.org/wiki/Intramolecular%20vibrational%20energy%20redistribution
Intramolecular vibrational energy redistribution (IVR) is a process in which energy is redistributed between different quantum states of a vibrationally excited molecule, which is required by successful theories explaining unimolecular reaction rates such as RRKM theory. Such theories assume a full statistical redistribution between all vibrational modes, but restricted redistribution could enable bond selective chemistry for which deposited energy must remain in a particular mode for as long as it takes for the required reaction to take place.
https://en.wikipedia.org/wiki/Models%20of%20neural%20computation
Models of neural computation are attempts to elucidate, in an abstract and mathematical fashion, the core principles that underlie information processing in biological nervous systems, or functional components thereof. This article aims to provide an overview of the most definitive models of neuro-biological computation as well as the tools commonly used to construct and analyze them. Introduction Due to the complexity of nervous system behavior, the associated experimental error bounds are ill-defined, but the relative merit of the different models of a particular subsystem can be compared according to how closely they reproduce real-world behaviors or respond to specific input signals. In the closely related field of computational neuroethology, the practice is to include the environment in the model in such a way that the loop is closed. In the cases where competing models are unavailable, or where only gross responses have been measured or quantified, a clearly formulated model can guide the scientist in designing experiments to probe biochemical mechanisms or network connectivity. In all but the simplest cases, the mathematical equations that form the basis of a model cannot be solved exactly. Nevertheless, computer technology, sometimes in the form of specialized software or hardware architectures, allow scientists to perform iterative calculations and search for plausible solutions. A computer chip or a robot that can interact with the natural environment in ways akin to the original organism is one embodiment of a useful model. The ultimate measure of success is however the ability to make testable predictions. General criteria for evaluating models Speed of information processing The rate of information processing in biological neural systems are constrained by the speed at which an action potential can propagate down a nerve fibre. This conduction velocity ranges from 1 m/s to over 100 m/s, and generally increases with the diameter of the neuronal proc
https://en.wikipedia.org/wiki/Static%20dispatch
In computing, static dispatch is a form of polymorphism fully resolved during compile time. It is a form of method dispatch, which describes how a language or environment will select which implementation of a method or function to use. Examples are templates in C++, and generic programming in Fortran and other languages, in conjunction with function overloading (including operator overloading). Code is said to be monomorphised, with specific data types deduced and traced through the call graph, in order to instantiate specific versions of generic functions, and select specific function calls based on the supplied definitions. This contrasts with dynamic dispatch, which is based on runtime information (such as vtable pointers and other forms of run time type information). Static dispatch is possible because there is a guarantee of there only ever being a single implementation of the method in question. Static dispatch is typically faster than dynamic dispatch which by nature has higher overhead. Example in Rust In Rust. trait Speak { fn speak(&self); } struct Cat; impl Speak for Cat { fn speak(&self) { println!("Meow!"); } } fn talk<T: Speak>(pet: T) { pet.speak(); } fn main() { let pet = Cat; talk(pet); } Rust will monomorphize this when compiled into: fn talk_cat(pet: Cat) { pet.speak(); } See also Dynamic dispatch
https://en.wikipedia.org/wiki/Statistics%20of%20the%20Hebrew%20Bible
Statistics of the Hebrew Bible is the counting of verses, words, and letters in the Bible which has been known since the days of the Talmud (around the 3rd century). Later in the Masora period (between the 5th and 10th centuries), counting words and letters was one of the basic acts that were done to create a uniform version of the Bible and to safeguard it from disruptions. In the Babylonian Talmud, it is said that the families of the dead "scribes" in the Bible were named after a male working in counting the letters and words in the Torah. In Judaism, some regard the practice of counting letters and words as a mitzvah and a virtue. According to the current version, the Hebrew Bible has approximately 22,864 verses, 306,757 Hebrew words, and 1,202,972 Hebrew letters. Out of these, there are 5,845 verses, 79,980 Hebrew words, and 304,805 letters in five Torah pentagrams. Various statistics of the Hebrew Bible have been published in Jewish literature over the generations.
https://en.wikipedia.org/wiki/Indicator%20function
In mathematics, an indicator function or a characteristic function of a subset of a set is a function that maps elements of the subset to one, and all other elements to zero. That is, if is a subset of some set , then if and otherwise, where is a common notation for the indicator function. Other common notations are and The indicator function of is the Iverson bracket of the property of belonging to ; that is, For example, the Dirichlet function is the indicator function of the rational numbers as a subset of the real numbers. Definition The indicator function of a subset of a set is a function defined as The Iverson bracket provides the equivalent notation, or to be used instead of The function is sometimes denoted , , , or even just . Notation and terminology The notation is also used to denote the characteristic function in convex analysis, which is defined as if using the reciprocal of the standard definition of the indicator function. A related concept in statistics is that of a dummy variable. (This must not be confused with "dummy variables" as that term is usually used in mathematics, also called a bound variable.) The term "characteristic function" has an unrelated meaning in classic probability theory. For this reason, traditional probabilists use the term indicator function for the function defined here almost exclusively, while mathematicians in other fields are more likely to use the term characteristic function to describe the function that indicates membership in a set. In fuzzy logic and modern many-valued logic, predicates are the characteristic functions of a probability distribution. That is, the strict true/false valuation of the predicate is replaced by a quantity interpreted as the degree of truth. Basic properties The indicator or characteristic function of a subset of some set maps elements of to the range . This mapping is surjective only when is a non-empty proper subset of . If then By a similar argument,
https://en.wikipedia.org/wiki/Timeline%20of%20the%20history%20of%20genetics
The history of genetics can be represented on a timeline of events from the earliest work in the 1850s, to the DNA era starting in the 1940s, and the genomics era beginning in the 1970s. Early timeline 1856–1863: Mendel studied the inheritance of traits between generations based on experiments involving garden pea plants. He deduced that there is a certain tangible essence that is passed on between generations from both parents. Mendel established the basic principles of inheritance, namely, the principles of dominance, independent assortment, and segregation. 1866: Austrian Augustinian friar Gregor Mendel's paper, Experiments on Plant Hybridization, published. 1869: Friedrich Miescher discovers a weak acid in the nuclei of white blood cells that today we call DNA. In 1871 he isolated cell nuclei, separated the nucleic cells from bandages and then treated them with pepsin (an enzyme which breaks down proteins). From this, he recovered an acidic substance which he called "nuclein". 1880–1890: Walther Flemming, Eduard Strasburger, and Edouard Van Beneden elucidate chromosome distribution during cell division. 1889: Richard Altmann purified protein free DNA. However, the nucleic acid was not as pure as he had assumed. It was determined later to contain a large amount of protein. 1889: Hugo de Vries postulates that "inheritance of specific traits in organisms comes in particles", naming such particles "(pan)genes". 1902: Archibald Garrod discovered inborn errors of metabolism. An explanation for epistasis is an important manifestation of Garrod's research, albeit indirectly. When Garrod studied alkaptonuria, a disorder that makes urine quickly turn black due to the presence of gentisate, he noticed that it was prevalent among populations whose parents were closely related. 1903: Walter Sutton and Theodor Boveri independently hypothesizes that chromosomes, which segregate in a Mendelian fashion, are hereditary units; see the chromosome theory. Boveri was studyi
https://en.wikipedia.org/wiki/Rational%20consequence%20relation
In logic, a rational consequence relation is a non-monotonic consequence relation satisfying certain properties listed below. Properties A rational consequence relation satisfies: REF Reflexivity and the so-called Gabbay–Makinson rules: LLE Left logical equivalence RWE Right-hand weakening CMO Cautious monotonicity DIS Logical or (i.e. disjunction) on left hand side AND Logical and on right hand side RMO Rational monotonicity Uses The rational consequence relation is non-monotonic, and the relation is intended to carry the meaning theta usually implies phi or phi usually follows from theta. In this sense it is more useful for modeling some everyday situations than a monotone consequence relation because the latter relation models facts in a more strict boolean fashion—something either follows under all circumstances or it does not. Example: cake The statement "If a cake contains sugar then it tastes good" implies under a monotone consequence relation the statement "If a cake contains sugar and soap then it tastes good." Clearly this doesn't match our own understanding of cakes. By asserting "If a cake contains sugar then it usually tastes good" a rational consequence relation allows for a more realistic model of the real world, and certainly it does not automatically follow that "If a cake contains sugar and soap then it usually tastes good." Note that if we also have the information "If a cake contains sugar then it usually contains butter" then we may legally conclude (under CMO) that "If a cake contains sugar and butter then it usually tastes good.". Equally in the absence of a statement such as "If a cake contains sugar then usually it contains no soap" then we may legally conclude from RMO that "If the cake contains sugar and soap then it usually tastes good." If this latter conclusion seems ridiculous to you then it is likely that you are subconsciously asserting your own preconceived knowledge about cakes when evaluating the vali
https://en.wikipedia.org/wiki/Propositional%20variable
In mathematical logic, a propositional variable (also called a sentential variable or sentential letter) is an input variable (that can either be true or false) of a truth function. Propositional variables are the basic building-blocks of propositional formulas, used in propositional logic and higher-order logics. Uses Formulas in logic are typically built up recursively from some propositional variables, some number of logical connectives, and some logical quantifiers. Propositional variables are the atomic formulas of propositional logic, and are often denoted using capital roman letters such as , and . Example In a given propositional logic, a formula can be defined as follows: Every propositional variable is a formula. Given a formula X, the negation ¬X is a formula. Given two formulas X and Y, and a binary connective b (such as the logical conjunction ∧),the expression (X b Y) is a formula. (Note the parentheses.) Through this construction, all of the formulas of propositional logic can be built up from propositional variables as a basic unit. Propositional variables should not be confused with the metavariables, which appear in the typical axioms of propositional calculus; the latter effectively range over well-formed formulae, and are often denoted using lower-case greek letters such as , and . Predicate logic Propositional variables with no object variables such as x and y attached to predicate letters such as Px and xRy, having instead individual constants a, b, ..attached to predicate letters are propositional constants Pa, aRb. These propositional constants are atomic propositions, not containing propositional operators. The internal structure of propositional variables contains predicate letters such as P and Q, in association with bound individual variables (e.g., x, y), individual constants such as a and b (singular terms from a domain of discourse D), ultimately taking a form such as Pa, aRb.(or with parenthesis, and ). Propositional l
https://en.wikipedia.org/wiki/Heliotron%20J
Heliotron J is a fusion research device in Japan, specifically a helical-axis heliotron designed to study plasma confinement in this type of device. It is located at the Institute of Advanced Energy of Kyoto University.
https://en.wikipedia.org/wiki/Succubous
Succubous is a manner in which the leaves of a liverwort overlap. If one were to look down from above (dorsal side) on a plant where the leaf attachment is succubous, the upper edge of each leaf would be covered by the next leaf along the stem. The lower edge of each leaf is visible from above, but the edge of the leaf closer to the tip of the stem is obscured by a neighboring leaf. The opposite of succubous is incubous.
https://en.wikipedia.org/wiki/Lentinula%20ixodes
Lentinula ixodes is a species of edible agaric fungus in the family Marasmiaceae that is found in Amazon rainforest. Originally described as Agaricus ixodes from Guyana by Camille Montagne in 1854, it was then considered a synonym of Lentinula boryana and reestablished as an independent species by J.S. Oliveira, Tiara S. Cabral, Ruby Vargas-Isla & Noemia K. Ishikawa in 2022. It grows on wood such as Bertholletia excelsa. Phylogenetic research shows it is closely related (but still intersterile) to another Amazon species, Lentinula raphanica, but it can be visually distinguished by the deep orange-brown pileus eventually having fine scales and general similarity to L. boryana complex.
https://en.wikipedia.org/wiki/Quaestiones%20quaedam%20philosophicae
Quaestiones quaedam philosophicae (Certain philosophical questions) is the name given to a set of notes that Isaac Newton kept for himself during his earlier years in Cambridge. They concern questions in the natural philosophy of the day that interested him. Apart from the light it throws on the formation of his own agenda for research, the major interest in these notes is the documentation of the unaided development of the scientific method in the mind of Newton, whereby every question is put to experimental test. Introduction The Quaestiones are contained in an octavo notebook, currently in the Cambridge University Library, which was Newton's basic notebook in which he set down in 1661 his readings in the required curriculum in Cambridge and his later readings in mechanical philosophy. He entered notes from both ends. The initial notes, in Greek, were on Aristotle's logic at one end and his ethics, at the other. But following this, he drew a line across the page, below which appears his first notes on the new natural philosophy of his day— a compendium of limits on the radii of stars as determined by Galileo and Auzout. At the other end of the book, he interrupted his notes on Aristotle with two pages of notes on Descartes' metaphysics. Following this, the central approximately hundred pages of this notebook is entitled Questiones quadem Philosophcae [sic], and a later motto over the title Amicus Plato amicus Aristotle magis amica veritas (Plato is my friend, Aristotle is my friend, but my best friend is truth). Dating The start of Quaestiones is definitely after 8 July 1661, the date on which Newton arrived at Trinity College. It is also definitely before 9 December 1664, on which day (and the following) he made notes of his observations of a comet. Other datings of the first entries are based on his handwriting—which changed drastically between the early notes of 1661 and later notes which can be dated independently to 1665. The transitional handwriting whi
https://en.wikipedia.org/wiki/Authenticated%20encryption
Authenticated Encryption (AE) is an encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message is impossible to understand without the knowledge of a secret key) and authenticity (in other words, it is unforgeable: the encrypted message includes an authentication tag that the sender can calculate only while possessing the secret key). Examples of encryption modes that provide AE are GCM, CCM. Many (but not all) AE schemes allow the message to contain "associated data" (AD) which is not made confidential, but its integrity is protected (i.e., it is readable, but tampering with it will be detected). A typical example is the header of a network packet that contains its destination address. To properly route the packet, all intermediate nodes in the message path need to know the destination, but for security reasons they cannot possess the secret key. Schemes that allow associated data provide authenticated encryption with associated data, or AEAD. Programming interface A typical programming interface for an AE implementation provides the following functions: Encryption Input: plaintext, key, and optionally a header (also known as additional authenticated data, AAD or associated data, AD) in plaintext that will not be encrypted, but will be covered by authenticity protection. Output: ciphertext and authentication tag (message authentication code or MAC). Decryption Input: ciphertext, key, authentication tag, and optionally a header (if used during the encryption). Output: plaintext, or an error if the authentication tag does not match the supplied ciphertext or header. The header part is intended to provide authenticity and integrity protection for networking or storage metadata for which confidentiality is unnecessary, but authenticity is desired. History The need for authenticated encryption emerged from the observation that securely combining separate confidentiality and authentication block ciph
https://en.wikipedia.org/wiki/Tipalti
Tipalti is an accounting software financial technology business that provides accounts payable, procurement and global payments automation software for businesses. Tipalti is headquartered in Foster City, CA , with offices in London UK, Vancouver Canada, Toronto Canada, Amsterdam Netherlands, Plano Texas, and R&D in Glil-Yam Israel. History Tipalti was founded in 2010 by Chen Amit and Oren Zeev and launched its first payment product in 2011. The company is a licensed money transmitter in every state that requires it in the United States, including California, New York, and Texas. Tipalti also has an FCA-approved electronic money (E-money) license to provide payment services for companies based in the United Kingdom. In 2014, the company released a supplier portal component to enable Accounts Payable departments to automate payments to suppliers, vendors, and independent contractors. In October 2014, Tipalti's CEO Chen Amit stated that the company was processing payments to approximately 300,000 payees and between $1 billion to $1.5 billion annually in payments. In February 2018, the company announced support for multi-subsidiary AP management and purchase order matching as part of its invoice processing functionality. In August 2018, Tipalti announced that its platform processed $5 billion in payments annually and served over 3,000,000 payees. In October 2018, the company announced an integration with QuickBooks Online. In February 2019, Tipalti announced that they now process over $6.5 billion in annual transactions for more than 4 million suppliers, the hiring of 2 additional executives, and that they doubled new business growth between July 1 and December 31, 2018, relative to the same period in 2017. On February 26, 2019, Tipalti announced the launch of the Tipalti Multi-FX service, to help finance teams manage FX currency conversion across over 30 currencies. In August 2019, Tipalti announced that they had surpassed $8 billion in annual transactions
https://en.wikipedia.org/wiki/Nickel%20aluminide
Nickel aluminide typically refers to one of the two most widely used compounds, Ni3Al or NiAl, but can refer to most aluminides from the Ni-Al system. These alloys are widely used due to their corrosion resistance, low-density and easy production. Ni3Al is of specific interest as the strengthening γ' phase precipitate in nickel-based superalloys allowing for high temperature strength up to 0.7-0.8 of its melting temperature. Meanwhile, NiAl displays excellent properties such as low-density (lower than that of Ni3Al), good thermal conductivity, oxidation resistance and high melting temperature. These properties, make it ideal for special high temperature applications like coatings on blades in gas turbines and jet engines. However, both these alloys do have the disadvantage of being quite brittle at room temperature while Ni3Al remains brittle at high temperatures as well. Although, it has been shown that Ni3Al can be made ductile when manufactured as a single crystal as opposed to polycrystalline. Another application was demonstrated in 2005, when the most abrasion-resistant material was reportedly created by embedding diamonds in a matrix of nickel aluminide. Ni3Al The chief issue with polycrystalline Ni3Al-based alloys is its room-temperature and high-temperature brittleness. This brittleness is generally attributed to the inability for dislocations to move in the highly ordered lattices. Researchers worked hard to address this brittleness as it greatly reduced the potential structural applications these Ni3Al-based alloys could be used for. However, in 1990, it was shown that the introduction of small amount of boron can drastically increase the ductility by suppressing intergranular fracture. Once this was addressed focus turned to maximizing the structural properties of the alloy. As mentioned, NiAl3-based alloys derive their strength from the formation of γ' precipitates in the γ which strength the alloys through precipitate strengthening. In these NiAl3-ba
https://en.wikipedia.org/wiki/Fear%20of%20missing%20out
Fear of missing out (FOMO) is the feeling of apprehension that one is either not in the know about or missing out on information, events, experiences, or life decisions that could make one's life better. FOMO is also associated with a fear of regret, which may lead to concerns that one might miss an opportunity for social interaction, a novel experience, a memorable event, or a profitable investment. It is characterized by a desire to stay continually connected with what others are doing, and can be described as the fear that deciding not to participate is the wrong choice. FOMO could result from not knowing about a conversation, missing a TV show, not attending a wedding or party, or hearing that others have discovered a new restaurant. FOMO in recent years has been attributed to a number of negative psychological and behavioral symptoms. FOMO has increased in recent times due to advancements in technology. Social networking sites create many opportunities for FOMO. While it provides opportunities for social engagement, it offers a view into an endless stream of activities in which a person is not involved. Psychological dependence on social media can lead to FOMO or even pathological internet use. FOMO is also present in video games, investing, and business marketing. The increasing popularity of the phrase has led to related linguistic and cultural variants. FOMO is associated with worsening depression and anxiety, and a lowered quality of life. FOMO can also affect businesses. Hype and trends can lead business leaders to invest based on perceptions of what others are doing, rather than their own business strategy. This is also the idea of the bandwagon effect, where one individual may see another person (s) do something and they begin to think it must be important because everyone is doing it. They might not even understand the meaning behind it, and they may not totally agree with it. Nevertheless, they are still going to participate because they don't want t
https://en.wikipedia.org/wiki/C20orf202
C20orf202 (chromosome 20 open reading frame 202) is a protein that in humans is encoded by the C20orf202 gene. In humans, this gene encodes for a nuclear protein that is primarily expressed in the lung and placenta. Gene C20orf202 is located on the plus strand of chromosome 20 at 20p13. The gene is 4,826 base pairs long. It spans from chr20:1,184,098-1,188,918, and contains 2 exons. Transcript There is one transcript of C20orf202. The mRNA sequence is 1,609 base pairs long. Protein The protein encoded by C20orf202 is 122 amino acids in length with a predicted molecular mass of 13591 Da and a predicted isoelectric point of 9.13 pl/MW. C20orf202 contains PFAM domain DUF3461 at amino acids 3-67. This domain codes for a protein of unknown function. The structure of C20orf202 consists of 46.72% random coils, 42.62% alpha helixes, and 10.66% extended strands. Regulation Gene level regulation The C20orf202 promoter has many transcription factor binding sites, most notably at the beginning and end of the promoter. These sites are shown in the figure to the right and are listed below with their respective functions. Transcript level regulation MicroRNA binding sites are only found in the 3' UTR of C20orf202. Most of these sites are found in the beginning or end of the 3' UTR, with many located in close proximity to each other. These 3' UTR microRNA binding sites can be seen in the figure to the right. Protein level regulation C20orf202 has many phosphorylation and glycosylation sites throughout the protein. A few of the phosphorylation sites are located in highly conserved regions of the protein. Expression In humans, C20orf202 has moderate mRNA abundance across cells types, though higher than average expression in the kidney and heart, it is not significantly so. Additionally C20orf202 expression increases during fetal development of kidney, lung, and intestinal tissues. Homology Paralogs C20orf202 has three known paralogs- FAM167a, FAM167b, and AARD.
https://en.wikipedia.org/wiki/Quickprop
Quickprop is an iterative method for determining the minimum of the loss function of an artificial neural network, following an algorithm inspired by the Newton's method. Sometimes, the algorithm is classified to the group of the second order learning methods. It follows a quadratic approximation of the previous gradient step and the current gradient, which is expected to be close to the minimum of the loss function, under the assumption that the loss function is locally approximately square, trying to describe it by means of an upwardly open parabola. The minimum is sought in the vertex of the parabola. The procedure requires only local information of the artificial neuron to which it is applied. The -th approximation step is given by: Where is the weight of input of neuron , and is the loss function. The Quickprop algorithm is an implementation of the error backpropagation algorithm, but the network can behave chaotically during the learning phase due to large step sizes.
https://en.wikipedia.org/wiki/Nodal%20analysis
In electric circuits analysis, nodal analysis, node-voltage analysis, or the branch current method is a method of determining the voltage (potential difference) between "nodes" (points where elements or branches connect) in an electrical circuit in terms of the branch currents. In analyzing a circuit using Kirchhoff's circuit laws, one can either do nodal analysis using Kirchhoff's current law (KCL) or mesh analysis using Kirchhoff's voltage law (KVL). Nodal analysis writes an equation at each electrical node, requiring that the branch currents incident at a node must sum to zero. The branch currents are written in terms of the circuit node voltages. As a consequence, each branch constitutive relation must give current as a function of voltage; an admittance representation. For instance, for a resistor, Ibranch = Vbranch * G, where G (=1/R) is the admittance (conductance) of the resistor. Nodal analysis is possible when all the circuit elements' branch constitutive relations have an admittance representation. Nodal analysis produces a compact set of equations for the network, which can be solved by hand if small, or can be quickly solved using linear algebra by computer. Because of the compact system of equations, many circuit simulation programs (e.g., SPICE) use nodal analysis as a basis. When elements do not have admittance representations, a more general extension of nodal analysis, modified nodal analysis, can be used. Procedure Note all connected wire segments in the circuit. These are the nodes of nodal analysis. Select one node as the ground reference. The choice does not affect the element voltages (but it does affect the nodal voltages) and is just a matter of convention. Choosing the node with the most connections can simplify the analysis. For a circuit of N nodes the number of nodal equations is N−1. Assign a variable for each node whose voltage is unknown. If the voltage is already known, it is not necessary to assign a variable. For each unk
https://en.wikipedia.org/wiki/Integrated%20fluidic%20circuit
Integrated fluidic circuit (IFC) is a type of integrated circuit based on fluidics. See also Microfluidics Biotechnology Fluid mechanics Integrated circuits
https://en.wikipedia.org/wiki/Nifurtimox
Nifurtimox, sold under the brand name Lampit, is a medication used to treat Chagas disease and sleeping sickness. For sleeping sickness it is used together with eflornithine in nifurtimox-eflornithine combination treatment. In Chagas disease it is a second-line option to benznidazole. It is given by mouth. Common side effects include abdominal pain, headache, nausea, and weight loss. There are concerns from animal studies that it may increase the risk of cancer but these concerns have not been found in human trials. Nifurtimox is not recommended in pregnancy or in those with significant kidney or liver problems. It is a type of nitrofuran. Nifurtimox came into medication use in 1965. It is on the World Health Organization's List of Essential Medicines. It is not available commercially in Canada. It was approved for medical use in the United States in August 2020. In regions of the world where the disease is common nifurtimox is provided for free by the World Health Organization (WHO). Medical uses Nifurtimox has been used to treat Chagas disease, when it is given for 30 to 60 days. However, long-term use of nifurtimox does increase chances of adverse events like gastrointestinal and neurological side effects. Due to the low tolerance and completion rate of nifurtimox, benznidazole is now being more considered for those who have Chagas disease and require long-term treatment. In the United States nifurtimox is indicated in children and adolescents (birth to less than 18 years of age and weighing at least for the treatment of Chagas disease (American Trypanosomiasis), caused by Trypanosoma cruzi. Nifurtimox has also been used to treat African trypanosomiasis (sleeping sickness), and is active in the second stage of the disease (central nervous system involvement). When nifurtimox is given on its own, about half of all patients will relapse, but the combination of melarsoprol with nifurtimox appears to be efficacious. Trials are awaited comparing melarsoprol/nifu
https://en.wikipedia.org/wiki/Digital%20paper
Digital paper, also known as interactive paper, is patterned paper used in conjunction with a digital pen to create handwritten digital documents. The printed dot pattern uniquely identifies the position coordinates on the paper. The digital pen uses this pattern to store handwriting and upload it to a computer. The paper The dot pattern is a two-dimensional barcode; the most common is the proprietary Anoto dot pattern. In the Anoto dot pattern, the paper is divided into a grid with a spacing of about 0.3 mm, a dot is printed near each intersection offset slightly in one of four directions, a camera in the pen typically records a 6 x 6 groups of dots. The full pattern is claimed to consist of 669,845,157,115,773,458,169 dots, and to encompass an area exceeding 4.6 million km² (this corresponds to 73 trillion unique sheets of letter-size paper). The complete pattern space is divided into various domains. These domains can be used to define paper types, or to indicate the paper's purpose (for example, memo formatting, personal planners, notebook paper, Post-it notes, et cetera). The Anoto dot pattern can be printed onto almost any paper, using a standard printing process of at least 600 dpi resolution (some claim a required resolution of 1,000 dpi), and carbon-based black ink. The paper can be any shape or size greater than 2 mm to a side. The ink absorbs infrared light transmitted from the digital pen; the pen contains a receiver that interprets the pattern of light reflected from the paper. Other colors of ink, including non-carbon-based black, can be used to print information that will be visible to the user, and invisible to the pen. Standard black and white laser printers or color laser printers with a resolution of 600 dpi can be used to print the Anoto dot pattern. With a typical CMYK color laser printer, it's possible use full-color text and graphics that cover the entire page by avoiding using black (i.e., under color removal is turned off) and instead u
https://en.wikipedia.org/wiki/Skull%20and%20crossbones
A skull and crossbones is a symbol consisting of a human skull and two long bones crossed together under or behind the skull. The design originated in the Late Middle Ages as a symbol of death and especially as a memento mori on tombstones. In modern contexts, it is generally used as a hazard symbol, usually in regard to poisonous substances, such as deadly chemicals. It is also associated with piracy and software piracy, due to its historical use in some Jolly Roger flags. Military use The skull and bones are often used in military insignia, such as the coats of arms of regiments. Symbol for poisonous substances The skull and crossbones has long been a standard symbol for poison. In 1829, New York State required the labeling of all containers of poisonous substances. The skull and crossbones symbol appears to have been used for that purpose since the 1850s. Previously a variety of motifs had been used, including the Danish "+ + +" and drawings of skeletons. In the 1870s poison manufacturers around the world began using bright cobalt bottles with a variety of raised bumps and designs (to enable easy recognition in the dark) to indicate poison, but by the 1880s the skull and cross bones had become ubiquitous, and the brightly coloured bottles lost their association. In the United States, due to concerns that the skull-and-crossbones symbol's association with pirates might encourage children to play with toxic materials, the Mr. Yuk symbol was created to denote poison. However, in 2001, the American Association of Poison Control Center voted to continue to require the skull and crossbones symbol. Gallery See also
https://en.wikipedia.org/wiki/Songfacts
Songfacts is a music-oriented website that has articles about songs, detailing the meaning behind the lyrics, how and when they were recorded, and any other info that can be found. The journalists who work for the site have interviewed thousands of artists and songwriters to get the facts behind the songs, including Peter Murphy, Gene Simmons, Mick Jones, Ian Anderson, Brad Arnold (3 Doors Down), Billy Steinberg, Matt Thiessen, Tomas Haake, Jo Dee Messina, Marc Roberge, Bill Withers, Janis Ian and Emily Saliers. The site was started by WHCN DJ Carl Wiser in Hartford, Connecticut, in August 1999. Wiser originally created the list as a database to prepare for his radio programs but then he posted it online. It was initially used mainly by DJs, but in 2002 it was chosen as a "Yahoo! Pick". The August 2004 issue of Men's Journal listed Songfacts as one of the "100 Best Websites for Guys". USA Weekend has praised it as "a virtual Behind the Music".
https://en.wikipedia.org/wiki/List%20of%20probability%20journals
This is a list of peer-reviewed scientific journals published in the field of probability. Advances in Applied Probability ALEA - Latin American Journal of Probability and Mathematical Statistics Annales de l’Institut Henri Poincaré Annals of Applied Probability Annals of Probability Bernoulli Brazilian Journal of Probability and Statistics Combinatorics, Probability and Computing Communications on Stochastic Analysis Electronic Communications in Probability Electronic Journal of Probability ESAIM: Probability and Statistics Finance and Stochastics Journal of Applied Probability Journal of Theoretical Probability Markov Processes and Related Fields Methodology and Computing in Applied Probability Modern Stochastics: Theory and Applications Probability and Mathematical Statistics Probability in the Engineering and Informational Sciences Probability Surveys Probability Theory and Related Fields Queueing Systems Random Matrices: Theory and Applications Random Operators and Stochastic Equations Random Structures & Algorithms Stochastics: An International Journal of Probability and Stochastic Processes Statistics & Probability Letters Stochastic Analysis and Applications Stochastics and Dynamics Stochastic Models Stochastic Processes and their Applications Stochastic Systems Theory of Probability and Its Applications Theory of Probability and Mathematical Statistics Theory of Stochastic Processes See also List of scientific journals List of statistics journals List of mathematics journals Journals Probability
https://en.wikipedia.org/wiki/Trilobite%20larva
Trilobite larva may refer to juvenile forms (larvae) of multiple unrelated groups of animals: Trilobites, extinct arthropods Xiphosura (horseshoe crabs), including living and fossil species Platerodrilus or trilobite beetles, a genus of living insects
https://en.wikipedia.org/wiki/Adhesion%20%28medicine%29
Adhesions are fibrous bands that form between tissues and organs, often as a result of injury during surgery. They may be thought of as internal scar tissue that connects tissues not normally connected. Pathophysiology Adhesions form as a natural part of the body's healing process after surgery in a similar way that a scar forms. The term "adhesion" is applied when the scar extends from within one tissue across to another, usually across a virtual space such as the peritoneal cavity. Adhesion formation post-surgery typically occurs when two injured surfaces are close to one another. According to the "classical paradigm" of adhesion formation, the pathogenesis starts with inflammation and activation of the coagulation system which causes fibrin deposits onto the damaged tissues. The fibrin then connects the two adjacent structures where damage of the tissues occurred. The fibrin acts like a glue to seal the injury and builds the fledgling adhesion, said at this point to be "fibrinous." In body cavities such as the peritoneal, pericardial, and synovial cavities, a family of fibrinolytic enzymes may act to limit the extent of the initial fibrinous adhesion, and may even dissolve it. In many cases, the production or activity of these enzymes are compromised because of inflammation following injury or infection, however, and the fibrinous adhesion persists. A more recent study suggested that the formation of "fibrinous" adhesions is preceded by the aggregation of cavity macrophages, that can act like extravascular platelets in the abdominal cavity. If this is allowed to happen, tissue repair cells such as macrophages, fibroblasts, and blood vessel cells penetrate into the fibrinous adhesion and lay down collagen and other matrix substances to form a permanent fibrous adhesion. In 2002, Giuseppe Martucciello's research group showed a possible role could be played by microscopic foreign bodies (FB) inadvertently contaminating the operative field during surgery. These dat
https://en.wikipedia.org/wiki/Multiple%20buffering
In computer science, multiple buffering is the use of more than one buffer to hold a block of data, so that a "reader" will see a complete (though perhaps old) version of the data, rather than a partially updated version of the data being created by a "writer". It is very commonly used for computer display images. It is also used to avoid the need to use dual-ported RAM (DPRAM) when the readers and writers are different devices. Description An easy way to explain how multiple buffering works is to take a real-world example. It is a nice sunny day and you have decided to get the paddling pool out, only you can not find your garden hose. You'll have to fill the pool with buckets. So you fill one bucket (or buffer) from the tap, turn the tap off, walk over to the pool, pour the water in, walk back to the tap to repeat the exercise. This is analogous to single buffering. The tap has to be turned off while you "process" the bucket of water. Now consider how you would do it if you had two buckets. You would fill the first bucket and then swap the second in under the running tap. You then have the length of time it takes for the second bucket to fill in order to empty the first into the paddling pool. When you return you can simply swap the buckets so that the first is now filling again, during which time you can empty the second into the pool. This can be repeated until the pool is full. It is clear to see that this technique will fill the pool far faster as there is much less time spent waiting, doing nothing, while buckets fill. This is analogous to double buffering. The tap can be on all the time and does not have to wait while the processing is done. If you employed another person to carry a bucket to the pool while one is being filled and another emptied, then this would be analogous to triple buffering. If this step took long enough you could employ even more buckets, so that the tap is continuously running filling buckets. In computer science the situation of
https://en.wikipedia.org/wiki/Netduino
Netduino was an open-source electronics prototyping platform based on the .NET Micro Framework. It uses the ARM Cortex-M 32-bit RISC ARM processor core as a 32-bit ARM-microcontroller. The Netduino boards (except the discontinued Mini and Go models) are designed to be pin-compatible with most Arduino shields. Applications can be built on Windows (with Visual Studio), or on Mac OS (with Xamarin Studio). The platform is similar in concept to the Arduino platform, but is generally more powerful and instead of writing applications in C/C++ or Wiring (essentially, C++ without header files), applications are written in C#, which brings powerful, high-level language constructs to the toolbox such as threading, event handling, automatic garbage collection, and more. Development Netduino was invented by Chris Walker, founder of Secret Labs. The platform was actively supported by Wilderness Labs and had an active open source community. Some time in 2020 Wilderness Labs discontinued Netduino and completely superseded it by Meadow, an STM32F7-based microcontroller board with .NET Standard. Hardware The Netduino family is based on the Cortex-M Micro Processor running the .NET Micro Framework (NETMF) v4.3. Development can be done on both Windows, with Visual Studio, or with Xamarin Studio on Mac OS X. IO includes 22 General Purpose Input/Output (GPIO) ports, 6 of which support hardware Pulse Width Modulation (PWM) generation, 4 UARTs (serial communication), I2C, and SPI (Serial Peripheral Interface Bus). The Netduino family consists of the Netduino 3, Netduino 2, and the original Netduino 1 lines. The original Netduino (1st generation) and Netduino Mini (also 1st generation), have been replaced by the much more powerful Netduino 2 and 3 lines. Netduino 3 The Netduino 3 is based on a Cortex-M4 microcontroller running at 168 MHz with 384 KB of flash storage and 164 KB of RAM. Netduino 3 is offered in 3 different models, the N3 base model, N3 Ethernet model, and the N3 Wi
https://en.wikipedia.org/wiki/Return%20on%20capital
Return on capital (ROC), or return on invested capital (ROIC), is a ratio used in finance, valuation and accounting, as a measure of the profitability and value-creating potential of companies relative to the amount of capital invested by shareholders and other debtholders. It indicates how effective a company is at turning capital into profits. The ratio is calculated by dividing the after tax operating income (NOPAT) by the average book-value of the invested capital (IC). Return on invested capital formula There are three main components of this measurement that are worth noting: While ratios such as return on equity and return on assets use net income as the numerator, ROIC uses net operating income after tax (NOPAT), which means that after-tax expenses (income) from financing activities are added back to (deducted from) net income. While many financial computations use market value instead of book value (for instance, calculating debt-to-equity ratios or calculating the weights for the weighted average cost of capital (WACC)), ROIC uses book values of the invested capital as the denominator. This procedure is done because, unlike market values which reflect future expectations in efficient markets, book values more closely reflect the amount of initial capital invested to generate a return. The denominator represents the average value of the invested capital rather than the value of the end of the year. This is because the NOPAT represents a sum of money flows, while the value of the invested capital changes every day (e.g., the invested capital on December 31 could be 30% lower than the invested capital on December 30). Because the exact average is difficult to calculate, it is often estimated by taking the average between the IC at the beginning of the year and the IC at the end of the year. Some practitioners make an additional adjustment to the formula to add depreciation, amortization, and depletion charges back to the numerator. These charges a
https://en.wikipedia.org/wiki/Package%20development%20process
A software package development process is a system for developing software packages. Packages are used to reuse and share code, e.g., via a software repository, a formal system for package checking that usually expose bugs, thereby potentially making it easier to produce trustworthy software (Chambers' prime directive). Discussion In this context, a package is a collection of functions written for use in a single language such as Python or R, bundled with documentation. For many programming languages, there are software repositories where people share such packages. For example, a Python package combines documentation, code and initial set up and possibly examples that could be used as unit tests in a single file with a "py" extension. By contrast, an R package has documentation with examples in files separate from the code, possibly bundled with other material such as sample data sets and introductory vignettes. The source code for an R package is contained in a directory with a master "description" file and separate subdirectories for documentation, code, optional data sets suits for unit or regression testing, and perhaps others. A formal package compilation process checks for errors of various types. This includes checking for syntax errors on both the documentation markup language and the code as well as comparing the arguments between documentation and code. Examples in the documentation are tested and produce error messages if they fail. This can be used as a primitive form of unit testing; more formal unit tests and regression testing can be included. This can improve software development productivity by making it easier to find bugs as the code is being developed. In addition, the documentation makes it easier to share code with others. It also makes it easier for a developer to use code written months or even years earlier. Routine checks are made of packages contributed to the Comprehensive R Archive Network (CRAN) and under development in the compani
https://en.wikipedia.org/wiki/Milnor%27s%20sphere
In mathematics, specifically differential and algebraic topology, during the mid 1950's John Milnorpg 14 was trying to understand the structure of -connected manifolds of dimension (since -connected -manifolds are homeomorphic to spheres, this is the first non-trivial case after) and found an example of a space which is homotopy equivalent to a sphere, but was not explicitly diffeomorphic. He did this through looking at real vector bundles over a sphere and studied the properties of the associated disk bundle. It turns out, the boundary of this bundle is homotopically equivalent to a sphere , but in certain cases it is not diffeomorphic. This lack of diffeomorphism comes from studying a hypothetical cobordism between this boundary and a sphere, and showing this hypothetical cobordism invalidates certain properties of the Hirzebruch signature theorem. See also Exotic sphere Oriented cobordism
https://en.wikipedia.org/wiki/Khaja
Khaja is an Indian deep-fried pastry, commonly filled with fruit or soaked with sugar syrup. History Khaja, plain or sweet mentioned in Silao, was a wheat flour preparation fried in ghee. Khaja is believed to have originated from the eastern parts of the former state of Magadh and the former United Provinces and Magadh. Silao , Nalanda districts of Bihar. and is also native to state of Magadh as well as regions like Kutch and Andhra Pradesh and Karnataka. Refined wheat flour with sugar is made into layered dough, with or without dry fruit or other stuffing, and lightly fried in oil to make khaja. It is one of the famous sweets of Silao and is related to emotions of all Magadh people. It is also offered as an offering Magadh. International sweets of Magadh. Khajas from Silao and Rajgir in Bihar are almost entirely similar to baklava, whereas the ones from Odisha and Andhra Pradesh are made with thicker pastry sheets, and are generally hard. The batter is prepared from wheat flour, mawa and oil. It is then deep fried until crisp, before being soaked in a sugar syrup known as Paga, the pastry absorbing the syrup. Khaja served in of Kakinada, a coastal town of Andhra Pradesh, are served dry on the outside and soaked with sugar syrup on the inside. Khaja sweet is popular in Magahia and Bihari in Magadha. This sweet is a part of Chhath Puja, given as a gift at the daughter's wedding in Magadh Bihar. See also Kakinada Kaaja Indian sweets
https://en.wikipedia.org/wiki/Bernard%20Bolzano
Bernard Bolzano (, ; ; ; born Bernardus Placidus Johann Nepomuk Bolzano; 5 October 1781 – 18 December 1848) was a Bohemian mathematician, logician, philosopher, theologian and Catholic priest of Italian extraction, also known for his liberal views. Bolzano wrote in German, his native language. For the most part, his work came to prominence posthumously. Family Bolzano was the son of two pious Catholics. His father, Bernard Pompeius Bolzano, was an Italian who had moved to Prague, where he married Maria Cecilia Maurer who came from Prague's German-speaking family Maurer. Only two of their twelve children lived to adulthood. Career Bolzano entered the University of Prague in 1796 and studied mathematics, philosophy and physics. Starting in 1800, he also began studying theology, becoming a Catholic priest in 1804. He was appointed to the new chair of philosophy of religion at Prague University in 1805. He proved to be a popular lecturer not only in religion but also in philosophy, and he was elected Dean of the Philosophical Faculty in 1818. Bolzano alienated many faculty and church leaders with his teachings of the social waste of militarism and the needlessness of war. He urged a total reform of the educational, social and economic systems that would direct the nation's interests toward peace rather than toward armed conflict between nations. His political convictions, which he was inclined to share with others with some frequency, eventually proved to be too liberal for the Austrian authorities. On December 24, 1819, he was removed from his professorship (upon his refusal to recant his beliefs) and was exiled to the countryside and then devoted his energies to his writings on social, religious, philosophical, and mathematical matters. Although forbidden to publish in mainstream journals as a condition of his exile, Bolzano continued to develop his ideas and publish them either on his own or in obscure Eastern European journals. In 1842 he moved back to Prague,
https://en.wikipedia.org/wiki/Speech%20production
Speech production is the process by which thoughts are translated into speech. This includes the selection of words, the organization of relevant grammatical forms, and then the articulation of the resulting sounds by the motor system using the vocal apparatus. Speech production can be spontaneous such as when a person creates the words of a conversation, reactive such as when they name a picture or read aloud a written word, or imitative, such as in speech repetition. Speech production is not the same as language production since language can also be produced manually by signs. In ordinary fluent conversation people pronounce roughly four syllables, ten or twelve phonemes and two to three words out of their vocabulary (that can contain 10 to 100 thousand words) each second. Errors in speech production are relatively rare occurring at a rate of about once in every 900 words in spontaneous speech. Words that are commonly spoken or learned early in life or easily imagined are quicker to say than ones that are rarely said, learnt later in life, or are abstract. Normally speech is created with pulmonary pressure provided by the lungs that generates sound by phonation through the glottis in the larynx that then is modified by the vocal tract into different vowels and consonants. However speech production can occur without the use of the lungs and glottis in alaryngeal speech by using the upper parts of the vocal tract. An example of such alaryngeal speech is Donald Duck talk. The vocal production of speech may be associated with the production of hand gestures that act to enhance the comprehensibility of what is being said. The development of speech production throughout an individual's life starts from an infant's first babble and is transformed into fully developed speech by the age of five. The first stage of speech doesn't occur until around age one (holophrastic phase). Between the ages of one and a half and two and a half the infant can produce short sentences
https://en.wikipedia.org/wiki/Autoroll
Autoroll (also Key Autoroll) refers to TV-signal decryption software that automatically updates a video receiver's or DVR/receiver's IDEA keys when the transmitting signal provider changes its block cipher algorithm. Mention of autoroll software often figures in discussions of free-to-air satellite TV receivers, for which it is a vital component. Some form of autoroll software is also a standard component in pay-TV providers' smart cards, which allow subscription TV services to guard against signal piracy. However, the term is most prevalently used by illegal TV pirates who attempt to use free-to-air hardware to view pay-only programming. Often TV pirates will hack a TV subscription-service provider's smart cards and reprogram them with an autoroll for all the subscription service's channels. Though providers like DIRECTV and DISH Network have attempted to use weekly ECMs, or "electronic countermeasures," to disrupt these illegal cards, many websites provide updated autoroll codes impervious to ECMs and offer this software for a monthly subscription fee less than the service provider's monthly fees. Because subscription TV providers tend not to discuss the methods by which they encrypt and decrypt their signals, mention of "autoroll" software and "autorolling" on a website usually indicates that the website's owners are engaged in illegal TV piracy. Normally such sites claim they are not legally bound to reveal customers' identities; often enough too, such sites will claim their activities are completely legal. Yet according to both U.S. and Canadian laws neither claim is true. In fact, the U.S.'s Digital Millennium Copyright Act of 1998 compels equipment and coding providers to turn over their customers' records to subscription-service providers if the former is found to have engaged in or aided in stealing the latter's services. See also Television broadcasting
https://en.wikipedia.org/wiki/Food%20Workers%27%20Union
The Food Workers' Union (, VB) was a general union for agricultural and food production workers, in the Netherlands. The union was founded in 1980, with the merger of the Industrial Union of Agriculture and Food and the Catholic Union of Agriculture, Food and Tobacco. These unions had previously been affiliated to the Dutch Confederation of Trade Unions (NVV) and Dutch Catholic Trade Union Federation (NKV), respectively, but the two federations were in the process of merging to form the Dutch Federation of Trade Unions (FNV), to which the new union affiliated. The Food Workers' Union was the first to be formed in this way, with others following over the next two years. In 1989, the union's members in the hospitality sector transferred to the Catering Union. By 1997, the union had 64,014 members, of whom 74% worked in food production, 21% in agriculture, and the remainder in hospitality. In 1998, the union merged with the Industrial Workers' Union, the Services Union, and the Transport Workers' Union, to form the Allied Union. Presidents 1980: Cees Schelling 1984: Greetje Lubbi 1992: Paul Andela
https://en.wikipedia.org/wiki/Regional%20lockout
A regional lockout (or region coding) is a class of digital rights management preventing the use of a certain product or service, such as multimedia or a hardware device, outside a certain region or territory. A regional lockout may be enforced through physical means, through technological means such as detecting the user's IP address or using an identifying code, or through unintentional means introduced by devices only supporting certain regional technologies (such as video formats, i.e., NTSC and PAL). A regional lockout may be enforced for several reasons, such as to stagger the release of a certain product, to avoid losing sales to the product's foreign publisher, to maximize the product's impact in a certain region through localization, to hinder grey market imports by enforcing price discrimination, or to prevent users from accessing certain content in their territory because of legal reasons (either due to censorship laws, or because a distributor does not have the rights to certain intellectual property outside their specified region). Multimedia Disc regions The DVD, Blu-ray Disc, and UMD media formats all support the use of region coding; DVDs use eight region codes (Region 7 is reserved for future use; Region 8 is used for "international venues", such as airplanes and cruise ships), and Blu-ray Discs use three region codes corresponding to different areas of the world. Most Blu-rays, however, are region-free. Ultra HD Blu-ray discs are also region-free. On computers, the DVD region can usually be changed five times. Windows uses three region counters: its own one, the one of the DVD drive, and the one of the player software (occasionally, the player software has no region counter of its own, but uses that of Windows). After the fifth region change, the system is locked to that region. In modern DVD drives (type RPC-2), the region lock is saved to its hardware, so that even reinstalling Windows or using the drive with a different computer will not u
https://en.wikipedia.org/wiki/X86%20instruction%20listings
The x86 instruction set refers to the set of instructions that x86-compatible microprocessors support. The instructions are usually part of an executable program, often stored as a computer file and executed on the processor. The x86 instruction set has been extended several times, introducing wider registers and datatypes as well as new functionality. x86 integer instructions Below is the full 8086/8088 instruction set of Intel (81 instructions total). Most if not all of these instructions are available in 32-bit mode; they just operate on 32-bit registers (eax, ebx, etc.) and values instead of their 16-bit (ax, bx, etc.) counterparts. The updated instruction set is also grouped according to architecture (i386, i486, i686) and more generally is referred to as (32-bit) x86 and (64-bit) x86-64 (also known as AMD64). Original 8086/8088 instructions Added in specific processors Added with 80186/80188 Added with 80286 The new instructions added in 80286 add support for x86 protected mode. Some but not all of the instructions are available in real mode as well. Added with 80386 The 80386 added support for 32-bit operation to the x86 instruction set. This was done by widening the general-purpose registers to 32 bits and introducing the concepts of OperandSize and AddressSize – most instruction forms that would previously take 16-bit data arguments were given the ability to take 32-bit arguments by setting their OperandSize to 32 bits, and instructions that could take 16-bit address arguments were given the ability to take 32-bit address arguments by setting their AddressSize to 32 bits. (Instruction forms that work on 8-bit data continue to be 8-bit regardless of OperandSize. Using a data size of 16 bits will cause only the bottom 16 bits of the 32-bit general-purpose registers to be modified – the top 16 bits are left unchanged.) The default OperandSize and AddressSize to use for each instruction is given by the D bit of the segment descriptor of the current
https://en.wikipedia.org/wiki/KSAT-TV
KSAT-TV (channel 12) is a television station in San Antonio, Texas, United States, affiliated with ABC. Owned by Graham Media Group, the station maintains studios on North St. Mary's Street on the northern edge of downtown, and its transmitter is located off Route 181 in northwest Wilson County (northeast of Elmendorf). History KONO-TV Channel 12 was the last commercial VHF allocation in San Antonio to be awarded. The first applicant for the allocation came in June 1952, from Bexar County Television Corporation, a subsidiary of Alamo Broadcasting Company, owners of radio station KABC. Bexar County Television planned to operate channel 12 as an ABC Television affiliate, owing to the radio station's affiliation with the ABC radio network. Shortly thereafter, Mission Broadcasting Company, owners of KONO radio (860 AM and 92.9 FM), also applied for a channel 12 license. By 1953, both Bexar County Television and Mission Broadcasting proper had dropped out of the running for channel 12. However, two new applicants filed applications: Sunshine Broadcasting Company, then-owners of KTSA radio, and Mission Telecasting Company. Mission was majority (50%) owned by Eugene J. Roth, principal owner of Mission Broadcasting Company, with the other half of the company split among seven individuals. Sunshine would later withdraw its application, although another player would throw their hat into the ring in January 1954: the Walmac Corporation, owners of KMAC radio. In an attempt to avoid long, drawn-out hearings for a license, Walmac and Mission met in May 1954 to work out an agreement between the two parties. On March 12, 1956, the FCC heard final oral arguments between Walmac and Mission, with an FCC examiner having already favored Mission's application the previous year. In May 1956, the FCC granted a license to Mission and denied Walmac's bid. Mission officials proceeded to construct a new, studio building and tower on North St. Mary's Street, adjacent to the studios for K
https://en.wikipedia.org/wiki/Kepler%20%28microarchitecture%29
Kepler is the codename for a GPU microarchitecture developed by Nvidia, first introduced at retail in April 2012, as the successor to the Fermi microarchitecture. Kepler was Nvidia's first microarchitecture to focus on energy efficiency. Most GeForce 600 series, most GeForce 700 series, and some GeForce 800M series GPUs were based on Kepler, all manufactured in 28 nm. Kepler also found use in the GK20A, the GPU component of the Tegra K1 SoC, as well as in the Quadro Kxxx series, the Quadro NVS 510, and Nvidia Tesla computing modules. Kepler was followed by the Maxwell microarchitecture and used alongside Maxwell in the GeForce 700 series and GeForce 800M series. The architecture is named after Johannes Kepler, a German mathematician and key figure in the 17th century scientific revolution. Overview Where the goal of Nvidia's previous architecture was design focused on increasing performance on compute and tessellation, with Kepler architecture Nvidia targeted their focus on efficiency, programmability and performance. The efficiency aim was achieved through the use of a unified GPU clock, simplified static scheduling of instruction and higher emphasis on performance per watt. By abandoning the shader clock found in their previous GPU designs, efficiency is increased, even though it requires additional cores to achieve higher levels of performance. This is not only because the cores are more power-friendly (two Kepler cores using 90% power of one Fermi core, according to Nvidia's numbers), but also the change to a unified GPU clock scheme delivers a 50% reduction in power consumption in that area. Programmability aim was achieved with Kepler's Hyper-Q, Dynamic Parallelism and multiple new Compute Capabilities 3.x functionality. With it, higher GPU utilization and simplified code management was achievable with GK GPUs thus enabling more flexibility in programming for Kepler GPUs. Finally with the performance aim, additional execution resources (more CUDA cores,
https://en.wikipedia.org/wiki/Email%20disclaimer
An email disclaimer is a disclaimer, notice or warning which is added to an outgoing email and forms a distinct section which is separate from the main message. The reasons for adding such a disclaimer include confidentiality, copyright, contract formation, defamation, discrimination, harassment, privilege and viruses. Issues frequently dealt with in email disclaimers Confidentiality A disclaimer may be added to mitigate the risk that a confidential email may be forwarded to a third-party recipient. Organizations may use the disclaimer to warn such recipients that they are not authorised recipients and to ask that they delete the email. The legal force and standing of such warnings is not well-established. Contract A disclaimer may state that the email does not form a contract. This may not be effective as the substantive body of the email may contradict and override this. In the case of Baillie Estates Limited against Du Pont (UK) Limited, which was heard in the Outer House of Scotland, it was found that a contract was in effect, as attached to the relevant email, even though there was a standard disclaimer. Copyright Republication of emails may be protected by copyright law and a disclaimer may warn that such rights to copy the text of the email are reserved by the originator. Viruses Computer viruses may be spread by email. To mitigate the risk that a recipient might sue the sender of an infected email, a disclaimer might warn of the possibility of infection and advise the recipient to conduct their own scan. The disclaimer might provide details of the outgoing scanning which has already been performed to provide some guidance about the level of risk. Effectiveness of disclaimers The Economist published an article asserting that disclaimers are presented largely as a result of imitation and habit, that people have long stopped paying attention to disclaimers, and suggested that they may not be legally enforceable. In the United States, the overuse o
https://en.wikipedia.org/wiki/Symbols%20of%20death
Symbols of death are the motifs, images and concepts associated with death throughout different cultures, religions and societies. Images Various images are used traditionally to symbolize death; these rank from blunt depictions of cadavers and their parts to more allusive suggestions that time is fleeting and all men are mortals. The human skull is an obvious and frequent symbol of death, found in many cultures and religious traditions. Human skeletons and sometimes non-human animal skeletons and skulls can also be used as blunt images of death; the traditional figures of the Grim Reaper – a black-hooded skeleton with a scythe – is one use of such symbolism. Within the Grim Reaper itself, the skeleton represents the decayed body whereas the robe symbolizes those worn by religious people conducting funeral services. The skull and crossbones motif (☠) has been used among Europeans as a symbol of both piracy and poison. The skull is also important as it remains the only "recognizable" aspect of a person once they have died. Decayed cadavers can also be used to depict death; in medieval Europe, they were often featured in artistic depictions of the danse macabre, or in cadaver tombs which depicted the living and decomposed body of the person entombed. Coffins also serve as blunt reminders of mortality. Europeans were also seen to use coffins and cemeteries to symbolize the wealth and status of the person who has died, serving as a reminder to the living and the deceased as well. Less blunt symbols of death frequently allude to the passage of time and the fragility of life, and can be described as memento mori; that is, an artistic or symbolic reminder of the inevitability of death. Clocks, hourglasses, sundials, and other timepieces both call to mind that time is passing. Similarly, a candle both marks the passage of time, and bears witness that it will eventually burn itself out as well as a symbol of hope of salvation. These sorts of symbols were often incorpora
https://en.wikipedia.org/wiki/Cambridge%20Distributed%20Computing%20System
The Cambridge Distributed Computing System is an early discontinued distributed operating system, developed in the 1980s at Cambridge University. It grew out of the Cambridge Ring local area network, which it used to interconnect computers. The Cambridge system connected terminals to "processor banks". At login, a user would request from the bank a machine with a given architecture and amount of memory. The system then assigned to the user a machine that served, for the duration of the login session, as their "personal" computer. The machines in the processor bank ran the TRIPOS operating system. Additional special-purpose servers provided file and other services. At its height, the Cambridge system consisted of some 90 machines.
https://en.wikipedia.org/wiki/Steven%20G%20Arless
Steven G Arless is a Canadian entrepreneur in the biomedical technology industry. He directed and developed several medical device companies treating cardiovascular disease from inception through major financing and public stock offering, advancing new medical devices from R&D to commercialization and global sales, including CryoCath Technologies, CardioInsight and Resonant Medical. He has served as CEO for a number of companies, most notably CryoCath Technologies (sold to Medtronic Inc. for $400 million CAD), Resonant Medical (sold to Elekta AB for $30 million), and CardioInsight (also sold to Medtronic for $100 million USD). Early life and education Arless was born in Montreal, Quebec on July 23, 1949. His father, an accountant, and his mother were immigrants to Canada from Lebanon. Arless studied Chemistry and Engineering at McGill University, graduating with a BSc. in 1971. Arless also completed his MBA at the John Molson School of Business at Concordia University in Montréal in 2008. Career Arless is an angel investor in medical technology and is involved in mentorship and teaching of graduate students at McGill University and Concordia University and McGill University where he is a Professor of Practice. In 1971, Arless worked with Smith & Nephew, a British medical equipment company for 17 years and served as president for five years. He was CEO of the North American operations from 1986 to 1990. In 1996, Arless became CEO of CryoSurge founded in 1995 and changed the name to CryoCath Technologies inc., in 1997, a company specializing in a cryoablation treatment for heart arrhythmia. Arless served as president and CEO of CryoCath from its inception until 2006, when he resigned. Arless relocated to Cleveland, Ohio in 2009 to become CEO of CardioInsight, a company marketing and advancing research in cardiovascular technology. Arless stepped down from his position at CardioInsight in 2012. Arless co-founded medical device company, Soundbite Medical Soluti
https://en.wikipedia.org/wiki/Toilet%20paper%20orientation
Some toilet roll holders or dispensers allow the toilet paper to hang in front of (over) or behind (under) the roll when it is placed parallel to the wall. This divides opinions about which orientation is better. Arguments range from aesthetics, hospitality, ease of access, and cleanliness, to paper conservation, ease of detaching sheets, and compatibility with pets. The US advice column Ask Ann Landers reported that the subject was the most controversial issue in the column's history and, at 15,000 letters in 1986, provoked the highest number of responses. The case study of "toilet paper orientation" has been used as a teaching tool in instructing sociology students in the practice of social constructionism. Arguments The main reasons given by people to explain why they hang their toilet paper a given way are ease of grabbing and habit. The over position reduces the risk of accidentally brushing the wall or cabinet with one's knuckles, potentially transferring grime and germs; makes it easier to visually locate and to grasp the loose end; gives the option to fold over the last sheet to show that the room has been cleaned; and is generally the intended direction of viewing for the manufacturer's branding, so patterned toilet paper looks better this way. The under position provides a tidier appearance, in that the loose end can be more hidden from view; reduces the risk of a toddler or a house pet such as a cat unrolling the toilet paper when batting at the roll; and in a recreational vehicle may reduce unrolling during driving. Partisans have claimed that each method makes it easier to tear the toilet paper on a perforated sheet boundary. The over position is shown in illustrations with the first patents for a free-hanging toilet-roll holders, issued in 1891. Various toilet paper dispensers are available which avoid the question of over or under orientation; for example, single sheet dispensers, jumbo roll dispensers in which the toilet roll is perpendicu
https://en.wikipedia.org/wiki/Drought%20refuge
A drought refuge is a site that provides permanent fresh water or moist conditions for plants and animals, acting as a refuge habitat when surrounding areas are affected by drought and allowing ecosystems and core species populations to survive until the drought breaks. Drought refuges are important for conserving ecosystems in places where the effects of climatic variability are exacerbated by human activities. Description Reliable drought refuges are characterised by the ability to retain sufficient water throughout the drought, having water quality good enough to maintain the life of the ecosystem that are not subject to physical disturbance and that have access to surrounding habitat, so that refugees can recolonise the main habitat when the drought ends. For fish and aquatic invertebrates a drought refuge may be an isolated permanent pool in a stream that ceases to flow and mostly dries up during a period of drought. Permanent wetlands may serve as non-breeding drought refuges for a range of waterbirds that nest at ephemeral lakes when these are inundated. "Drought refuge is a secure place persisting through a disturbance with the critical criterion being that after the disturbance the refuge provides colonist to allow populations to recover." For some species the refuge is their only water source and is necessary for survival. For birds and invertebrate taxa, the drought refuge is not only necessary for survival but contributes to their reproductive success. Some organisms are able to adapt to the environment when there is a drought, but adapting traits that will be beneficial for survival in a prolonged drought is extremely difficult to accomplish. Terms refuge and drought The term refugium (plural: refugia) was originally used by evolutionary biologists for refuges that protected entire species from disturbance events of large temporal and spatial scales, such as glaciation or the long-term effects of climate change. A disturbance involves a temporary
https://en.wikipedia.org/wiki/Wallace%20Clement%20Sabine%20Medal
The Wallace Clement Sabine Medal of the Acoustical Society of America is presented to an individual of any nationality who has advanced the science of architectural acoustics, either by being published in professional journals or periodicals, or by another accomplishment in architectural acoustics at the discretion of the awarding body. The award was named for pioneering acoustician Wallace Clement Sabine. Founded in 1957 by the Acoustical Society of America, the award is given when an outstanding candidate is recognized. Award recipients Vern Oliver Knudsen (1957) Floyd R. Watson (1959) Leo Beranek (1961) Erwin Meyer (1964) Hale J. Sabine (1968) Lothar Cremer (1974) Cyril M. Harris (1979) Thomas D. Northwood (1982) Richard V. Waterhouse (1990) Harold Marshall (1995) Russell Johnson (1997) Alfred C. C. Warnock (2002) William J. Cavanaugh (2006) John S. Bradley (2008) Christopher Jaffe (2011) Ning Xiang (2014) David H. Griesinger (2017) Michael Vorländer (2018) Gary W. Siebein (2020) See also Wallace Clement Sabine Architectural acoustics Acoustical Society of America List of physics awards
https://en.wikipedia.org/wiki/Theorem%20of%20Bertini
In mathematics, the theorem of Bertini is an existence and genericity theorem for smooth connected hyperplane sections for smooth projective varieties over algebraically closed fields, introduced by Eugenio Bertini. This is the simplest and broadest of the "Bertini theorems" applying to a linear system of divisors; simplest because there is no restriction on the characteristic of the underlying field, while the extensions require characteristic 0. Statement for hyperplane sections of smooth varieties Let X be a smooth quasi-projective variety over an algebraically closed field, embedded in a projective space . Let denote the complete system of hyperplane divisors in . Recall that it is the dual space of and is isomorphic to . The theorem of Bertini states that the set of hyperplanes not containing X and with smooth intersection with X contains an open dense subset of the total system of divisors . The set itself is open if X is projective. If , then these intersections (called hyperplane sections of X) are connected, hence irreducible. The theorem hence asserts that a general hyperplane section not equal to X is smooth, that is: the property of smoothness is generic. Over an arbitrary field k, there is a dense open subset of the dual space whose rational points define hyperplanes smooth hyperplane sections of X. When k is infinite, this open subset then has infinitely many rational points and there are infinitely many smooth hyperplane sections in X. Over a finite field, the above open subset may not contain rational points and in general there is no hyperplanes with smooth intersection with X. However, if we take hypersurfaces of sufficiently big degrees, then the theorem of Bertini holds. Outline of a proof We consider the subfibration of the product variety with fiber above the linear system of hyperplanes that intersect X non-transversally at x. The rank of the fibration in the product is one less than the codimension of , so that the total space
https://en.wikipedia.org/wiki/Mir-5%20microRNA%20precursor%20family
In molecular biology mir-5 microRNA is a short RNA molecule. MicroRNAs function to regulate the expression levels of other genes by several mechanisms. mir-5 has been implicated in regulation of VEGF in an experiment where a plasmid containing a cluster of mir-5, mir-10 and mir-7 was shown to down-regulate VEGF by 75%. mir-5 in chicken has been implicated in targeting genes involved in metabolism. See also MicroRNA External links External links MicroRNA MicroRNA precursor families
https://en.wikipedia.org/wiki/Controlled%20NOT%20gate
In computer science, the controlled NOT gate (also C-NOT or CNOT), controlled-X gate, controlled-bit-flip gate, Feynman gate or controlled Pauli-X is a quantum logic gate that is an essential component in the construction of a gate-based quantum computer. It can be used to entangle and disentangle Bell states. Any quantum circuit can be simulated to an arbitrary degree of accuracy using a combination of CNOT gates and single qubit rotations. The gate is sometimes named after Richard Feynman who developed an early notation for quantum gate diagrams in 1986. The CNOT can be expressed in the Pauli basis as: Being both unitary and Hermitian, CNOT has the property and , and is involutory. The CNOT gate can be further decomposed as products of rotation operator gates and exactly one two qubit interaction gate, for example In general, any single qubit unitary gate can be expressed as , where H is a Hermitian matrix, and then the controlled U is . The CNOT gate is also used in classical reversible computing. Operation The CNOT gate operates on a quantum register consisting of 2 qubits. The CNOT gate flips the second qubit (the target qubit) if and only if the first qubit (the control qubit) is . If are the only allowed input values for both qubits, then the TARGET output of the CNOT gate corresponds to the result of a classical XOR gate. Fixing CONTROL as , the TARGET output of the CNOT gate yields the result of a classical NOT gate. More generally, the inputs are allowed to be a linear superposition of . The CNOT gate transforms the quantum state: into: The action of the CNOT gate can be represented by the matrix (permutation matrix form): The first experimental realization of a CNOT gate was accomplished in 1995. Here, a single Beryllium ion in a trap was used. The two qubits were encoded into an optical state and into the vibrational state of the ion within the trap. At the time of the experiment, the reliability of the CNOT-operation was measured to b
https://en.wikipedia.org/wiki/ASCI%20White
ASCI White was a supercomputer at the Lawrence Livermore National Laboratory in California, which was briefly the fastest supercomputer in the world. It was a computer cluster based on IBM's commercial RS/6000 SP computer. 512 nodes were interconnected for ASCI White, with each node containing sixteen 375MHz IBM POWER3-II processors. In total, the ASCI White had 8,192 processors, 6terabytes (TB) of memory, and 160TB of disk storage. It was almost exclusively used for large-scale computations requiring dozens, hundreds, or thousands of processors. The computer weighed 106tons and consumed 3MW of electricity with a further 3MW needed for cooling. It had a theoretical processing speed of 12.3teraFLOPS (TFLOPS). A single modern 4U rackmount server could match these specifications while weighing under 50 kg and consuming under 2 kW of power. The system ran IBM's AIX operating system. ASCI White was made up of three individual systems, the 512-node White, the 28-node Ice and the 68-node Frost. The system was built in Poughkeepsie, New York. Completed in June 2000 it was transported to specially built facilities in California and officially dedicated on August 15, 2001. Its peak performance of 12.3TFLOPS was not achieved in the widely accepted LINPACK tests. The system cost US$110 million (equivalent to $ million in ). It was built as stage three of the Accelerated Strategic Computing Initiative (ASCI) started by the U.S. Department of Energy and the National Nuclear Security Administration to build a simulator to replace live WMD testing following the moratorium on testing started by President George H. W. Bush in 1992 and extended by Bill Clinton in 1993. The machine was decommissioned beginning July 27, 2006.
https://en.wikipedia.org/wiki/Harry%20Huskey
Harry Douglas Huskey (January 19, 1916 – April 9, 2017) was an American computer design pioneer. Early life and career Huskey was born in Whittier, in the Smoky Mountains region of North Carolina and grew up in Idaho. He received his bachelor's degree in mathematics and physics at the University of Idaho. He was the first member of his family to attend college. He gained his Master's and then his PhD in 1943 from the Ohio State University on Contributions to the Problem of Geöcze. Huskey taught mathematics to U.S. Navy students at the University of Pennsylvania and then worked part-time on the early ENIAC and EDVAC computers in 1945. This work represented his first formal introduction to computers, according to his obituary in The New York Times. He visited the National Physical Laboratory (NPL) in the United Kingdom for a year and worked on the Pilot ACE computer with Alan Turing and others. He was also involved with the EDVAC and SEAC computer projects. Huskey designed and managed the construction of the Standards Western Automatic Computer (SWAC) at the National Bureau of Standards in Los Angeles (1949–1953). He also designed the G-15 computer for Bendix Aviation Corporation, a machine, operable by one person. He had one at his home that is now in the Smithsonian Institution in Washington, D.C. After five years at the National Bureau of Standards, Huskey joined the faculty of the University of California, Berkeley in 1954 and then University of California, Santa Cruz from 1966. He cofounded the computer and information science program at UC Santa Cruz in 1967. He became director of its computer center. In 1986, UC Santa Cruz named him professor emeritus. While at Berkeley, he supervised the research of pioneering programming language designer Niklaus Wirth, who gained his PhD in 1963. During 1963-1964 Prof. Huskey participated in establishing the Computer Center at IIT Kanpur and convened a meeting there with many pioneers of computing technology. Parti
https://en.wikipedia.org/wiki/NASA%20Space%20Science%20Data%20Coordinated%20Archive
The NASA Space Science Data Coordinated Archive (NSSDCA) serves as the permanent archive for NASA space science mission data. "Space science" includes astronomy and astrophysics, solar and space plasma physics, and planetary and lunar science. As the permanent archive, NSSDCA teams with NASA's discipline-specific space science "active archives" which provide access to data to researchers and, in some cases, to the general public. NSSDCA also serves as NASA's permanent archive for space physics mission data. It provides access to several geophysical models and to data from some non-NASA mission data. NSSDCA was called the National Space Science Data Center (NSSDC) prior to March 2015. NSSDCA supports active space physics and astrophysics researchers. Web-based services allow the NSSDCA to support the general public. This support is in the form of information about spacecraft and access to digital versions of selected imagery. NSSDCA also provides access to portions of their database contains information about data archived at NSSDCA (and, in some cases, other facilities), the spacecraft which generate space science data and experiments which generate space science data. NSSDCA services also included are data management standards and technologies. NSSDCA is part of the Solar System Exploration Data Services Office (SSEDSO) in the Solar System Exploration Division at NASA's Goddard Space Flight Center. NSSDCA is sponsored by the Heliophysics Division of NASA's Science Mission Directorate. NSSDCA acts in concert with various NASA discipline data systems in providing certain data and services. Overview NSSDCA was first established (as NSSDC) at Goddard Space Flight Center in 1966. NSSDCA's staff consists largely of physical scientists, computer scientists, analysts, programmers, and data technicians. Staffing level, including civil service and onsite contractors, has ranged between 15 and 100 over the life of NSSDCA. Early in its life, NSSDCA accumulated data primari
https://en.wikipedia.org/wiki/Biological%20integrity
Biological integrity is associated with how "pristine" an environment is and its function relative to the potential or original state of an ecosystem before human alterations were imposed. Biological integrity is built on the assumption that a decline in the values of an ecosystem's functions are primarily caused by human activity or alterations. The more an environment and its original processes are altered, the less biological integrity it holds for the community as a whole. If these processes were to change over time naturally, without human influence, the integrity of the ecosystem would remain intact. The integrity of the ecosystem relies heavily on the processes that occur within it because those determine what organisms can inhabit an area and the complexities of their interactions. Most of the applications of the notion of biological integrity have addressed aquatic environments, but there have been efforts to apply the concept to terrestrial environments. Determining the pristine condition of the ecosystem is in theory scientifically derived, but deciding which of the many possible states or conditions of an ecosystem is the appropriate or desirable goal is a political or policy decision and is typically the focus of policy and political disagreements. Ecosystem health is a related concept but differs from biological integrity in that the "desired condition" of the ecosystem or environment is explicitly based on the values or priorities of society. History The concept of biological integrity first appeared in the 1972 amendments to the U.S. Federal Water Pollution Control Act, also known as the Clean Water Act. The United States Environmental Protection Agency (EPA) had used the term as a way to gauge the standards to which water should be maintained, but the vocabulary instigated years of debate about the implications of not only the meaning of biological integrity, but also how it can be measured. EPA sponsored the first conference about the term in Ma
https://en.wikipedia.org/wiki/Hemolin
Hemolin is an immunoglobulin-like protein exclusively found in Lepidoptera (moths and butterflies). It was first discovered in immune-challenged pupae of Hyalophora cecropia and Manduca sexta. Hemolin has a horseshoe crystal structure with four domains and resembles the developmental protein neuroglian. Hemolin increases 18-fold up to 7 mg/ml following injection of bacteria in H. cecropia. Induction of Hemolin in moths after bacterial injection have been shown in several species including Antheraea pernyi, Bombyx mori, Helicoverpa zea, Heliothis virescens, Hyphantria cunea, and Samia cynthia. Hemolin has also been suggested to participate in the immune response to virus infection and shown to bind to virus particles. It is expressed in response to dsRNA in a dose-dependent manner. Galleria melonella responds to caffeine intake by increased Hemolin protein expression. Hemolin is thought to be a gene duplication of the developmental protein neuroglian, but has lost two of the protein domains that neuroglian contains. In the potential function as a developmental protein, Hemolin has been shown to increase close to pupation in Manduca sexta, and is induced during diapause and by 20-Hydroxyecdysone in Lymantria dispar. RNAi of Hemolin causes malformation in H. cecropia. See also Host defense in invertebrates
https://en.wikipedia.org/wiki/Limit%20set
In mathematics, especially in the study of dynamical systems, a limit set is the state a dynamical system reaches after an infinite amount of time has passed, by either going forward or backwards in time. Limit sets are important because they can be used to understand the long term behavior of a dynamical system. A system that has reached its limiting set is said to be at equilibrium. Types fixed points periodic orbits limit cycles attractors In general, limits sets can be very complicated as in the case of strange attractors, but for 2-dimensional dynamical systems the Poincaré–Bendixson theorem provides a simple characterization of all nonempty, compact -limit sets that contain at most finitely many fixed points as a fixed point, a periodic orbit, or a union of fixed points and homoclinic or heteroclinic orbits connecting those fixed points. Definition for iterated functions Let be a metric space, and let be a continuous function. The -limit set of , denoted by , is the set of cluster points of the forward orbit of the iterated function . Hence, if and only if there is a strictly increasing sequence of natural numbers such that as . Another way to express this is where denotes the closure of set . The points in the limit set are non-wandering (but may not be recurrent points). This may also be formulated as the outer limit (limsup) of a sequence of sets, such that If is a homeomorphism (that is, a bicontinuous bijection), then the -limit set is defined in a similar fashion, but for the backward orbit; i.e. . Both sets are -invariant, and if is compact, they are compact and nonempty. Definition for flows Given a real dynamical system with flow , a point , we call a point y an -limit point of if there exists a sequence in so that . For an orbit of , we say that is an -limit point of , if it is an -limit point of some point on the orbit. Analogously we call an -limit point of if there exists a sequence in so that . For a
https://en.wikipedia.org/wiki/Perpetual%20futures
In finance, a perpetual futures contract, also known as a perpetual swap, is an agreement to non-optionally buy or sell an asset at an unspecified point in the future. Perpetual futures are cash-settled, and differ from regular futures in that they lack a pre-specified delivery date, and can thus be held indefinitely without the need to roll over contracts as they approach expiration. Payments are periodically exchanged between holders of the two sides of the contracts, long and short, with the direction and magnitude of the settlement based on the difference between the contract price and that of the underlying asset, as well as, if applicable, the difference in leverage between the two sides. Perpetual futures were first proposed by economist Robert Shiller in 1992, to enable derivatives markets for illiquid assets. However, perpetual futures markets have only developed for cryptocurrencies, with specific "inverse perpetual" type being invented by Alexey Bragin in 2011 for ICBIT exchange first, following their wider adoption in 2016 by other derivatives exchanges like BitMEX., Kraken Cryptocurrency perpetuals are characterised by the availability of high leverage, sometimes over 100 times the margin, and by the use of auto-deleveraging, which compels high-leverage, profitable traders to forfeit a portion of their profits to cover the losses of the other side during periods of high market volatility, as well as insurance funds, pools of assets intended to prevent the need for auto-deleveraging. Prior to spread of stablecoins in cryptomarkets all perpetual futures traded on unlicensed crypto exchanges were inverse (non-linear) futures contract, with asset being US dollar, and the price being quoted in US dollars for 1 Bitcoin. The contract is called non-linear inverse bitcoin futures because of the added non-linearity in the calculation. This makes the contract useful as a financial instrument and enables to do all accounting in Bitcoin at the same time, unlike qu
https://en.wikipedia.org/wiki/Anatomical%20theatre
An anatomical theatre (Latin: ) was a specialised building or room, resembling a theatre, used in teaching anatomy at early modern universities. They were typically constructed with a tiered structure surrounding a central table, allowing a larger audience to see the dissection of cadavers more closely than would have been possible in a non-specialized setting. Description An anatomical theatre was usually a room of roughly amphitheatrical shape, in the centre of which would stand a table on which the dissection of human or animal bodies took place. Around this table were several circular, elliptic or octagonal tiers with railings, steeply tiered so that observers (typically students) could stand and observe the dissection below, without spectators in the front-most rows blocking their view. It was common to display skeletons in some location within the theatre. The first anatomical theatre, the Anatomical Theatre of Padua, was built at the University of Padua in 1594, and has been preserved into the modern day. Other early examples include the Theatrum Anatomicum of Leiden University, built in 1596 and reconstructed in 1988, and the Anatomical Theatre of the Archiginnasio in Bologna (whose building dates from 1563 and the anatomical theatre from 1637). The anatomical theatre of the University of Uppsala is well-known, having been completed in 1663 by medical profession and amateur architect Olaus Rudbeck (1630-1702). The theatre is housed in the idiosyncratic cupola constructed on the top of the Gustavianum building, one of the older buildings of the university. Rudbeck had spent time in the Dutch city of Leiden, and the construction of both the anatomical theatre and the botanical garden he founded in Uppsala in 1655 were influenced by his experiences there. The anatomical theatre is now preserved as part of the Gustavianum, now preserved as a museum for the general public under the name Museum Gustavianum. Thomas Jefferson built an anatomical theatre for the
https://en.wikipedia.org/wiki/Orders%20of%20magnitude%20%28voltage%29
To help compare different orders of magnitude, the following list describes various voltage levels. SI multiple Notes External links Voltage Voltage
https://en.wikipedia.org/wiki/Cavitation%20%28embryology%29
Cavitation is a process in early embryonic development that follows cleavage. Cavitation is the formation of the blastocoel, a fluid-filled cavity that defines the blastula, or in mammals the blastocyst. After fertilization, cell division of the zygote occurs which results in the formation of a solid ball of cells (blastomeres) called the morula. Further division of cells increases their number in the morula, and the morula differentiates them into two groups. The internal cells become the inner cell mass, and the outer cells become the trophoblast. Before cell differentiation takes place there are two transcription factors, Oct-4 and nanog that are uniformly expressed on all of the cells, but both of these transcription factors are turned off in the trophoblast once it has formed. The trophoblast cells form tight junctions between them making the structure leakproof. Trophoblast cells have sodium pumps on their membranes, and pump sodium into the centre of the morula. This draws fluid in through osmosis causing a cavity to form inside the morula, and to increase in size. The cavity is the blastocoel. Following the formation of the blastocoel, the inner cell mass positions itself in one portion of the cavity, while the rest of the cavity is filled with fluid, and lined with trophoblasts. See also Lung cavity
https://en.wikipedia.org/wiki/DNA%20Research
DNA Research is an international, peer-reviewed journal of genomics and DNA research. The journal was established in 1994, and is published by Oxford University Press on behalf of the Kazusa DNA Research Institute. The journal is edited by Michio Oishi. Indexing and abstracting In 2014, the journal's impact factor was 5.477, ranking 22nd out of 167 in the category 'Genetics & Heredity'. The journal is indexed and abstracted in the following databases: External links Genetics journals Genetics literature Academic journals established in 1994 Bimonthly journals
https://en.wikipedia.org/wiki/Sergeant%20Bill
Sergeant Bill was a Canadian goat from Saskatchewan who served as the mascot of the 5th Infantry Battalion of the Canadian Expeditionary Force during the First World War. Bill was able to hear and warn soldiers of incoming shell explosions, pushing 3 soldiers into a trench within seconds of an incoming shell. In another instance, he cornered 3 enemy guardsmen. He also assisted in guarding prisoners. Bill survived being wounded and gassed on multiple occasions. For his actions, he was awarded the 1914 Star, the General Service Medal, and the Victory Medal. He faced courts martial on two occasions, once for eating his battalion's personnel roll and the other time for an altercation with another sergeant. He lived the remainder of his life in Winnipeg. Sgt. Bill can currently be found at Broadview Historical Museum in Saskatchewan. The children's book "Sergeant Billy - the true story of the goat who went to war" by Mireille Messier (illustrated by Kass Reich) is based on the life of Sergeant Bill.
https://en.wikipedia.org/wiki/IEEE%201667
IEEE 1667 ("Standard Protocol for Authentication in Host Attachments of Transient Storage Devices") is a standard published and maintained by the IEEE that describes various methods for authenticating removable storage devices such as USB flash drives when they are inserted into a computer. The protocol is universal, and thus operating-system independent. It is currently part of Windows Vista (SP2) and Windows 7, Server 2008, Server 2012, Windows 8, Windows 8.1 and Windows 10.
https://en.wikipedia.org/wiki/Erodium%20cicutarium
Erodium cicutarium, also known as common stork's-bill, redstem filaree, redstem stork's bill or pinweed, is a herbaceous annual – or in warm climates, biennial – member of the family Geraniaceae of flowering plants. It is native to Macaronesia, temperate Eurasia and north and northeast Africa, and was introduced to North America in the eighteenth century, where it has since become naturalized, particularly of the deserts and arid grasslands of the southwestern United States. Description It is a hairy, sticky annual, resembling herb Robert but lacking the unpleasant odor. The stems are reddish and bear bright pink flowers, which often have dark spots on the bases. The flowers are arranged in a loose cluster and have ten filaments – five of which are fertile – and five styles. The leaves are pinnate to pinnate-pinnatifid, with hairy stems. The long seed-pod, shaped like the bill of a stork, bursts open in a spiral when ripe, sending the seeds (which have long tails called awns) into the air. Seed dispersal behavior Erodium cicutarium seed uses self-dispersal mechanisms to spread away from the maternal plant and also reach a good germination site to increase fitness. Two abilities that E. cicutarium has are explosive dispersal, which launches seeds by storing elastic energy, and self-burial dispersal, where the seeds move themselves across the soil using hygroscopically powered shape change. Explosive dispersal After flowering, the five pericarps on the fruits of E. cicutarium, and the awns, which are appendages of the pericarps, join together and grow into a spine shape. As the fruits dry, dehydration creates tension, and elastic energy develops within the awns. With sufficient elastic energy the shape of the awns changes from straight to helical, causing them to burst away from the maternal plants, bringing the seeds with them. During dispersal, mechanical energy stored in specialized tissues is transferred to the seeds to increase their kinetic and potential e