source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Software%20walkthrough
In software engineering, a walkthrough or walk-through is a form of software peer review "in which a designer or programmer leads members of the development team and other interested parties through a software product, and the participants ask questions and make comments about possible errors, violation of development standards, and other problems". The reviews are also performed by assessors, specialists, etc. and are suggested or mandatory as required by norms and standards. "Software product" normally refers to some kind of technical document. As indicated by the IEEE definition, this might be a software design document or program source code, but use cases, business process definitions, test case specifications, and a variety of other technical documentation may also be walked through. A walkthrough differs from software technical reviews in its openness of structure and its objective of familiarization. It differs from software inspection in its ability to suggest direct alterations to the product reviewed. It lacks of direct focus on training and process improvement, process and product measurement. Process A walkthrough may be quite informal, or may follow the process detailed in IEEE 1028 and outlined in the article on software reviews. Objectives and participants In general, a walkthrough has one or two broad objectives: to gain feedback about the technical quality or content of the document; and/or to familiarize the audience with the content. A walkthrough is normally organized and directed by the author of the technical document. Any combination of interested or technically qualified personnel (from within or outside the project) may be included as seems appropriate. IEEE 1028 recommends three specialist roles in a walkthrough: The author, who presents the software product in step-by-step manner at the walk-through meeting, and is probably responsible for completing most action items; The walkthrough leader, who conducts the walkthrough, handle
https://en.wikipedia.org/wiki/Fixed-satellite%20service
Fixed-satellite service (short: FSS | also: fixed-satellite radiocommunication service) is – according to article 1.21 of the International Telecommunication Union's (ITU) Radio Regulations (RR) – defined as A radiocommunication service between earth stations at given positions, when one or more satellites are used; the given position may be a specified fixed point or any fixed point within specified areas; in some cases this service includes satellite-to-satellite links, which may also be operated in the inter-satellite service; the fixed-satellite service may also include feeder links for other space radiocommunication services. Classification This radiocommunication service is classified in accordance with ITU Radio Regulations (article 1) as follows: Fixed service (article 1.20) Fixed-satellite service (article 1.21) Inter-satellite service (article 1.22) Earth exploration-satellite service (article 1.51) Meteorological-satellite service (article 1.52) Frequency allocation The allocation of radio frequencies is provided according to Article 5 of the ITU Radio Regulations (most recent version, Edition of 2020). In order to improve harmonisation in spectrum utilisation, the majority of service-allocations stipulated in this document were incorporated in national Tables of Frequency Allocations and Utilisations which is within the responsibility of the appropriate national administration. The allocation might be primary, secondary, exclusive, and shared. primary allocation: is indicated by writing in capital letters (see example below) secondary allocation: is indicated by small letters exclusive or shared utilization: is within the responsibility of administrations Example of frequency allocation Use in North America FSS – is as well the official classification (used chiefly in North America) for geostationary communications satellites that provide broadcast feeds to television stations, radio stations and broadcast networks. FSSs also transmit informatio
https://en.wikipedia.org/wiki/Blastmycin
Blastmycin is an antibiotic with the molecular formula C26H36N2O9 which is produced by the bacterium Streptomyces blastmyceticus.
https://en.wikipedia.org/wiki/Lotus%20Multi-Byte%20Character%20Set
The Lotus Multi-Byte Character Set (LMBCS) is a proprietary multi-byte character encoding originally conceived in 1988 at Lotus Development Corporation with input from Bob Balaban and others. Created around the same time and addressing some of the same problems, LMBCS could be viewed as parallel development and possible alternative to Unicode. For maximum compatibility, later issues of LMBCS incorporate UTF-16 as a subset. Commercially, LMBCS was first introduced as the default character set of Lotus 1-2-3 Release 3 for DOS in March 1989 and Lotus 1-2-3/G Release 1 for OS/2 in 1990 replacing the 8-bit Lotus International Character Set (LICS) and ASCII used in earlier DOS-only versions of Lotus 1-2-3 and Symphony. LMBCS is also used in IBM/Lotus SmartSuite, Notes and Domino, as well as in a number of third-party products. LMBCS encodes the characters required for languages using the Latin, Arabic, Hebrew, Greek and Cyrillic scripts, the Thai, Chinese, Japanese and Korean writing systems, and technical symbols. Encodings Technically, LMBCS is a lead-byte encoding where code point 00hex as well as code points 20hex (32) to 7Fhex (127) are identical to ASCII (as well as to LICS). Code point 00hex is always treated as NUL character to ensure maximum code compatibility with existing software libraries dealing with null-terminated strings in many programming languages such as C. This applies even to the UTF-16be codes, where code words with the form xx00hex are mapped to private-use codes with the form F6xxhex during encoding in order to avoid the use of NUL bytes, and to escaped control characters, where 20hex is added to the C0 (but not C1) control characters following the 0Fhex lead byte. Code points 01hex to 1Fhex, which serve as control codes in ASCII, are used as lead bytes to switch the definition of code points above 7Fhex between several code groups (similar to code pages) and at the same time determine either a single- or multi-byte nature for the correspon
https://en.wikipedia.org/wiki/Comparison%20of%20software%20and%20protocols%20for%20distributed%20social%20networking
Distributed social network projects generally develop software, protocols, or both. Projects Dead or stalled projects Other federated communication or storage solutions See also Comparison of instant messaging protocols
https://en.wikipedia.org/wiki/Biochemical%20Society
The Biochemical Society is a learned society in the United Kingdom in the field of biochemistry, including all the cellular and molecular biosciences. Structure It currently has around 7000 members, two-thirds in the UK. It is affiliated with the European body, Federation of European Biochemical Societies (FEBS). The Society's current President (2016) is Sir David Baulcombe. The Society's headquarters are in London. History The society was founded in 1911 by Benjamin Moore, W.D. Halliburton and others, under the name of the Biochemical Club. It acquired the existing Biochemical Journal in 1912. The society name changed to the Biochemical Society in 1913. In 2005, the headquarters of the society moved from Portland Place to purpose-built offices in Holborn. In 2009, the headquarters moved again to Charles Darwin House, near Gray's Inn Road. Past presidents include Professor Ron Laskey, Sir Philip Cohen, and Sir Tom Blundell. Awards The society makes a number of merit awards, four annually and others either biennially or triennially, to acknowledge excellence and achievement in both specific and general fields of science. The annual awards comprise the Morton Lecture, the Colworth Medal, the Centenary Award and the Novartis Medal and Prize. Publishing The Society's wholly owned publishing subsidiary, Portland Press, publishes books, a magazine, The Biochemist, and several print and online academic journals: Biochemical Journal Biochemical Society Symposium (online only) Biochemical Society Transactions Cell Signalling Biology Clinical Science Essays in Biochemistry Bioscience Reports The Society's flagship publication, the Biochemical Journal, celebrated its centenary in 2006 with the launch of a free online archive back to its first issue in 1906. Further reading
https://en.wikipedia.org/wiki/Jeanette%20McLeod
Jeanette Claire McLeod is a New Zealand mathematician specialising in combinatorics, including the theories of Latin squares and random graphs. She is a senior lecturer in the School of Mathematics and Statistics at the University of Canterbury, a principal investigator for Te Pūnaha Matatini, a Centre of Research Excellence associated with the University of Auckland, an honorary senior lecturer at the Australian National University, and the president for three terms from 2018 to 2020 of the Combinatorial Mathematics Society of Australasia. McLeod earned her Ph.D. in 2007 from Australian National University. Her dissertation, Methods in Asymptotic Combinatorics, was supervised by Brendan McKay. She is one of the cofounders of Maths Craft New Zealand, a project to popularise mathematics using crafts such as crochet and origami. In 2019, McLeod and fellow Canterbury mathematician Phil Wilson won the Cranwell Medal for Science Communication from the New Zealand Association of Scientists for their work on Maths Craft. McLeod's advocacy for creative practice within science and research saw her profiled in a Nature careers article in 2021.
https://en.wikipedia.org/wiki/Nonblocking%20minimal%20spanning%20switch
A nonblocking minimal spanning switch is a device that can connect N inputs to N outputs in any combination. The most familiar use of switches of this type is in a telephone exchange. The term "non-blocking" means that if it is not defective, it can always make the connection. The term "minimal" means that it has the fewest possible components, and therefore the minimal expense. Historically, in telephone switches, connections between callers were arranged with large, expensive banks of electromechanical relays, Strowger switches. The basic mathematical property of Strowger switches is that for each input to the switch, there is exactly one output. Much of the mathematical switching circuit theory attempts to use this property to reduce the total number of switches needed to connect a combination of inputs to a combination of outputs. In the 1940s and 1950s, engineers in Bell Lab began an extended series of mathematical investigations into methods for reducing the size and expense of the "switched fabric" needed to implement a telephone exchange. One early, successful mathematical analysis was performed by Charles Clos (), and a switched fabric constructed of smaller switches is called a Clos network. Background: switching topologies The crossbar switch The crossbar switch has the property of being able to connect N inputs to N outputs in any one-to-one combination, so it can connect any caller to any non-busy receiver, a property given the technical term "nonblocking". Being nonblocking it could always complete a call (to a non-busy receiver), which would maximize service availability. However, the crossbar switch does so at the expense of using N2 (N squared) simple SPST switches. For large N (and the practical requirements of a phone switch are considered large) this growth was too expensive. Further, large crossbar switches had physical problems. Not only did the switch require too much space, but the metal bars containing the switch contacts would
https://en.wikipedia.org/wiki/Boo%20%28programming%20language%29
Boo is an object-oriented, statically typed, general-purpose programming language that seeks to make use of the Common Language Infrastructure's support for Unicode, internationalization, and web applications, while using a Python-inspired syntax and a special focus on language and compiler extensibility. Some features of note include type inference, generators, multimethods, optional duck typing, macros, true closures, currying, and first-class functions. Boo was one of the three scripting languages for the Unity game engine (Unity Technologies employed De Oliveira, its designer), until official support was dropped in 2014 due to the small userbase. The Boo Compiler was removed from the engine in 2017. Boo has since been abandoned by De Oliveira, with development being taken over by Mason Wheeler. Boo is free software released under the BSD 3-Clause license. It is compatible with the Microsoft .NET and Mono frameworks. Syntax print ("Hello World") def fib(): a, b = 0L, 1L h # The 'L's make the numbers double word length (typically 64 bits) while true: yield b a, b = b, a + b # Print the first 5 numbers in the series: for index as int, element in zip(range(5), fib()): print("${index+1}: ${element}") See also Fantom Apache Groovy IronPython IronRuby Nemerle REBOL StaDyn
https://en.wikipedia.org/wiki/M82%20X-2
M82 X-2 is an X-ray pulsar located in the galaxy Messier 82, approximately 12 million light-years from Earth. It is exceptionally luminous, radiating energy equivalent to approximately ten million Suns. This object is part of a binary system: If the pulsar is of an average size, , then its companion is at least . On average, the pulsar rotates every 1.37 seconds, and revolves around its more massive companion every 2.5 days. M82 X-2 is an ultraluminous X-ray source (ULX), shining about 100 times brighter than theory suggests something of its mass should be able to. Its brightness is many times higher than the Eddington limit, a basic physics guideline that sets an upper limit on the brightness that an object of a given mass should be able to achieve. Possible explanations for violations of the Eddington limit include geometrical effects arising from the funneling of in-falling material along magnetic field lines. While M82 X-2 was previously known as an X-ray source, it was not until an observation campaign to study the newly discovered supernova SN 2014J in January 2014 that X-2's true nature was uncovered. Scientists looking at data from the NuSTAR spacecraft noticed a pulsing in the X-ray spectrum coming from near the supernova in Messier 82. Data from the Chandra and Swift spacecraft was used to verify the NuSTAR findings and provide the necessary spatial resolution to determine the exact source. After combining the NuSTAR and Chandra data, scientists were able to discern that M82 X-2 emitted both an X-ray beam and continuous broad X-ray radiation. LXs). In 2023 new NuSTAR data confirmed that it exceeded the Eddington limit. See also M82 X-1
https://en.wikipedia.org/wiki/Francis%20Hitching
John Francis Hitching (1933–2018) was a British author, dowser, journalist and filmmaker. Biography John Francis Hitching was the son of Luise Hitching. He grew up in Stratford-upon-Avon and attended Warwick School. He worked as a journalist in Birmingham. In 1958, he married Judith Anne Wellstood at St. Nicholas Church, Loxley. Hitching has written on Earth mysteries, dowsing, paranormal and ley lines. In his book Pendulum: The Psi Connection (1977), he came to the conclusion that dowsing is genuine, listing a number of alternative explanations such as electromagnetism and psychic ability that he thought were associated with dowsing. Stuart Fleming in the New Scientist gave Hitching's book Earth Magic (1978) a positive review; the book linked many of the megaliths around Europe to groups of men whom he called "megalithic mathematicians". Hitching also wrote The World Atlas of Mysteries (1981); an atlas which listed many of Earth mysteries. The book was criticized in the New Scientist for some of his conclusions such as linking animal extinctions to reversals in the Earth's magnetic field. Hitching died in 2018. Evolution Hitching was the author of the book The Neck of the Giraffe or Where Darwin Went Wrong (1983), which advocates non-darwinian evolution. A review on talk.origins stated that Hitching believes that "evolution is directed by some sort of cosmic force, but does not like Darwinism." Science writer Richard Dawkins wrote that The Neck of the Giraffe "is one of the silliest and most ignorant I have read for years." The book has been widely cited by creationists. Books published Pendulum: The Psi connection (1977) Earth Magic The Astounding Mystery of the Greatest of All Lost Civilizations (1977) Earth Magic (1976) Dowsing: The psi connection (1978) The Mysterious World: An Atlas of the Unexplained (1979) The World Atlas of Mysteries (1981) The Neck of the Giraffe or Where Darwin Went Wrong (1982) Boom Business of the 90s: Essential Start-Up Gui
https://en.wikipedia.org/wiki/Puffed%20rice
Puffed rice and popped rice (or pop rice) are types of puffed grain made from rice commonly eaten in the traditional cuisines of Southeast Asia, East Asia, and South Asia. It has also been produced commercially in the West since 1904 and is popular in breakfast cereals and other snack foods. Traditional methods to puff or pop rice include frying in oil or salt. Western commercial puffed rice is usually made by heating rice kernels under high pressure in the presence of steam, though the method of manufacture varies widely. They are either eaten as loose grains or made into puffed rice cakes. Description While the terms "puffed rice" and "popped rice" are used interchangeably, they are properly different processes. Puffed rice refers to pre-gelatinized rice grains (either by being parboiled, boiled, or soaked) that are puffed by the rapid expansion of steam upon cooking. Puffed rice retains the shape of the rice grain, but is much larger. Popped rice, on the other hand, refers to rice grains where the hull or the bran is intact. When cooked, the kernel explodes through the hard outer covering due to heating. Popped rice has an irregular shape similar to popcorn. There are various methods, both modern and traditional, for making puffed and popped rice. Traditional versions by region East Asia Puffed rice or other grains are occasionally found as street food in China (called "mixiang" 米香), Taiwan (called "bí-phang" 米芳), Korea (called "ppeong twigi" 뻥튀기), and Japan (called "pon gashi" ポン菓子), where hawkers implement the puffing process using an integrated pushcart/puffer featuring a rotating steel pressure chamber heated over an open flame. The great booming sound produced by the release of pressure serves as advertising. Mainland China The earliest mention of puffed rice in Mainland China is in Zhejiang Province, from a book by Fan Chengda written in the Song Dynasty (c. 1100). It was part of the rituals of the Spring Festival and was made in large cooking pots kn
https://en.wikipedia.org/wiki/Grammar%20systems%20theory
Grammar systems theory is a field of theoretical computer science that studies systems of finite collections of formal grammars generating a formal language. Each grammar works on a string, a so-called sequential form that represents an environment. Grammar systems can thus be used as a formalization of decentralized or distributed systems of agents in artificial intelligence. Let be a simple reactive agent moving on the table and trying not to fall down from the table with two reactions, t for turning and ƒ for moving forward. The set of possible behaviors of can then be described as formal language where ƒ can be done maximally k times and t can be done maximally ℓ times considering the dimensions of the table. Let be a which generates language . The behavior of is then described by this grammar. Suppose the has a subsumption architecture; each component of this architecture can be then represented as a formal grammar, too, and the final behavior of the agent is then described by this system of grammars. The schema on the right describes such a system of grammars which shares a common string representing an environment. The shared sequential form is sequentially rewritten by each grammar, which can represent either a component or generally an agent. If grammars communicate together and work on a shared sequential form, it is called a Cooperating Distributed (DC) grammar system. Shared sequential form is a similar concept to the blackboard approach in AI, which is inspired by an idea of experts solving some problem together while they share their proposals and ideas on a shared blackboard. Each grammar in a grammar system can also work on its own string and communicate with other grammars in a system by sending their sequential forms on request. Such a grammar system is then called a Parallel Communicating (PC) grammar system. PC and DC are inspired by distributed AI. If there is no communication between grammars, the system is close to the decent
https://en.wikipedia.org/wiki/Heteroclinic%20cycle
In mathematics, a heteroclinic cycle is an invariant set in the phase space of a dynamical system. It is a topological circle of equilibrium points and connecting heteroclinic orbits. If a heteroclinic cycle is asymptotically stable, approaching trajectories spend longer and longer periods of time in a neighbourhood of successive equilibria. In generic dynamical systems heteroclinic connections are of high co-dimension, that is, they will not persist if parameters are varied. Robust heteroclinic cycles A robust heteroclinic cycle is one which persists under small changes in the underlying dynamical system. Robust cycles often arise in the presence of symmetry or other constraints which force the existence of invariant hyperplanes. A prototypical example of a robust heteroclinic cycle is the Guckenheimer–Holmes cycle. This cycle has also been studied in the context of rotating convection, and as three competing species in population dynamics. See also Heteroclinic bifurcation Heteroclinic network
https://en.wikipedia.org/wiki/Static%20induction%20transistor
The static induction transistor (SIT) is a type of field-effect transistor (FET) capable of high-speed and high-power operation, with low distortion and low noise. It is a vertical structure device with short multichannel. The device was originally known as a VFET, with V being short for vertical. Being a vertical device, the SIT structure offers advantages in obtaining higher breakdown voltages than a conventional FET. For the SIT, the breakdown voltage is not limited by the surface breakdown between gate and drain, allowing it to operate at a very high current and voltage. The SIT has a current-voltage characteristic similar to a vacuum tube triode and it was therefore used in high-end audio products, including power amplifiers from Sony in the second half of the 1970s and Yamaha from 1973-1980. The Sony n-channel SIT had the model number 2SK82 with its p-channel complement named 2SJ28. Characteristics A SIT has: short channel length low gate series resistance low gate-source capacitance small thermal resistance low noise low distortion high audio frequency power capability short turn-on and turn-off time, typically 0.25 μs History The SIT was invented by Japanese engineers Jun-ichi Nishizawa and Y. Watanabe in 1950. See also SIT-based Audio devices Static induction thyristor JFET
https://en.wikipedia.org/wiki/Frailty%20syndrome
Frailty is a common geriatric syndrome that embodies an elevated risk of catastrophic declines in health and function among older adults. Frailty is a condition associated with ageing, and it has been recognized for centuries. It is a marker of a more widespread syndrome of frailty, with associated weakness, slowing, decreased energy, lower activity, and, when severe, unintended weight loss. As a frequent clinical syndrome in the elderly, various health risks are linked to health deterioration and frailty in older age, such as falls, disability, hospitalization, and mortality. Generally, frailty refers to older adults who lose independence. It also links to the experiences of losing dignity due to social and emotional isolation risk. Frailty has been identified as a risk factor for the development of dementia. As a population ages, a central focus of geriatricians and public health practitioners is to understand, and then beneficially intervene on, the factors and processes that put elders at such risk, especially the increased vulnerability to stressors (e.g. extremes of heat and cold, infection, injury, or even changes in medication) that characterizes many older adults. Geriatric syndromes related to frailty Sarcopenia Sarcopenia is the degenerative loss of skeletal muscle mass, quality, and strength associated with aging. The rate of muscle loss is dependent on exercise level, co-morbidities, nutrition and other factors. Sarcopenia can lead to reduction in functional status and cause significant disability from increased weakness. The muscle loss is related to changes in muscle synthesis signalling pathways although is incompletely understood. The cellular mechanisms are distinct from other types of muscle atrophy such as cachexia, in which muscle is degraded through cytokine-mediated degradation although both conditions may co-exist. Osteoporosis Osteoporosis is an age-related disease of bone that leads to an increased risk of fracture. In osteoporosis th
https://en.wikipedia.org/wiki/Automotive%20Network%20Exchange
The Automotive Network Exchange (ANX), a large private extranet that connects automotive suppliers to automotive manufacturers. Founded in 1995 by Automotive Industry Action Group (a consortium of major US auto companies), ANX since 1999 has been owned and operated by ANXeBusiness Corp., formerly a division of Leidos/SAIC but acquired in 2006 by One Equity Partners. Since 2006, ANX has expanded into other markets and now provides managed security, compliance assurance, and connectivity services to businesses in the healthcare and retail as well as automotive sectors. Overview The Automotive Network Exchange is the private extranet initially set up and maintained by the Automotive Industry Action Group, Telcordia, General Motors, Ford, and Chrysler. It was built as a private network for the auto industry in 1995 to provide consistent, reliable speed and guaranteed security for data transmissions between the automakers and their suppliers. The ANX Network allows trading partners to collaborate electronically on product design and development; solicit and process orders; and facilitate just-in-time manufacturing and post shipping schedules. In 1999 the Automotive Industry Action Group sold the ANX Network to the Science Applications International Corporation (SAIC), at that time the corporation now operating as Leidos before it spun off SAIC as a separate entity in 2013. The division overseeing the ANX Network became ANXeBusiness. During the next six years, over 4,000 companies joined the ANX Network, making it one of the largest extranets in the world. In 2006, the private equity firm One Equity Partners acquired ANXeBusiness from Leidos/SAIC. Business drivers The automotive industry is heavily dependent on collaboration between manufacturers and suppliers. These entities act as federated virtual companies for critical materials, parts, components, and services. High velocity supply chains are imperative to the success of these virtual companies. They must
https://en.wikipedia.org/wiki/Proxify
Proxify is a partly free, single-serving website that enables users to communicate more anonymously on the Internet. An example of this is to have Proxify use an SSH tunnel, already created and listening in on the localhost. This can be done using PuTTy to dynamically listen in to the host and redirecting traffic through the tunnel. Proxify is then used to hook applications into using the tunnel without configuring the different applications itself. Proxify matches its registration information with a WHOIS database, as reassurance. There are three general pre-configured options (max speed, max security, or compatibility) with users able to tweak the settings otherwise. Although free searches are offered, a message may appear: "Proxify is experiencing higher than normal traffic volume. We must restrict access to our free service during peak usage times to ensure the best possible experience for paid subscribers. Please login to your account or signup for immediate access." Because it uses the HTTPS protocol, it can be considered to be secure to eavesdropping and man-in-the-middle attacks, but it has the disadvantage of requiring the users to connect to particular IP addresses, making it fairly easy to block by almost any firewall. See also Internet censorship circumvention
https://en.wikipedia.org/wiki/Hydrological%20optimization
Hydrological optimization applies mathematical optimization techniques (such as dynamic programming, linear programming, integer programming, or quadratic programming) to water-related problems. These problems may be for surface water, groundwater, or the combination. The work is interdisciplinary, and may be done by hydrologists, civil engineers, environmental engineers, and operations researchers. Simulation versus optimization Groundwater and surface water flows can be studied with hydrologic simulation. A typical program used for this work is MODFLOW. However, simulation models cannot easily help make management decisions, as simulation is descriptive. Simulation shows what would happen given a certain set of conditions. Optimization, by contrast, finds the best solution for a set of conditions. Optimization models have three parts: An objective, such as "Minimize cost" Decision variables, which correspond to the options available to management Constraints, which describe the technical or physical requirements imposed on the options To use hydrological optimization, a simulation is run to find constraint coefficients for the optimization. An engineer or manager can then add costs or benefits associated with a set of possible decisions, and solve the optimization model to find the best solution. Examples of problems solved with hydrological optimization Contaminant remediation in aquifers. The decision problem is where to locate wells, and choose a pumping rate, to minimize the cost to prevent spread of a contaminant. The constraints are associated with the hydrogeological flows. Water allocation to improve wetlands. This optimization model recommends water allocation and invasive vegetation control to improve wetland habitat of priority bird species. These recommendations are subject to constraints like water availability, spatial connectivity, hydraulic infrastructure capacities, vegetation responses, and available financial resources. Maximizin
https://en.wikipedia.org/wiki/Beniamino%20Segre
Beniamino Segre (16 February 1903 – 2 October 1977) was an Italian mathematician who is remembered today as a major contributor to algebraic geometry and one of the founders of finite geometry. Life and career He was born and studied in Turin. Corrado Segre, his uncle, also served as his doctoral advisor. Among his main contributions to algebraic geometry are studies of birational invariants of algebraic varieties, singularities and algebraic surfaces. His work was in the style of the old Italian School, although he also appreciated the greater rigour of modern algebraic geometry. Segre was a pioneer in finite geometry, in particular projective geometry based on vector spaces over a finite field. In a well-known paper he proved the following theorem: In a Desarguesian plane of odd order, the ovals are exactly the irreducible conics. In 1959 he authored a survey "Le geometrie di Galois" on Galois geometry. According to J. W. P. Hirschfeld, it "gave a comprehensive list of results and methods, and is to my mind the seminal paper in the subject." Some critics felt that his work was no longer geometry, but today it is recognized as a separate sub-discipline: finite geometry or combinatorial geometry. According to Hirschfeld, "He published the most as well as the deepest papers in the subject. His enormous knowledge of classical algebraic geometry enabled him to identify those results which could be applied to finite spaces. His theorem on the characterization of conics (Segre's theorem) not only stimulated a great deal of research but also made many mathematicians realize that finite spaces were worth studying." In 1938 he lost his professorship at the University of Bologna, as a result of the anti-Jewish laws enacted under Benito Mussolini's government. He spent the next 8 years in Great Britain (mostly at the University of Manchester), then returned to Italy to resume his academic career. Selected publications . . The second volume was never published: howeve
https://en.wikipedia.org/wiki/Mother%20Armenia%2C%20Gyumri
The Mother Armenia ( Mayr Hayastan) monumental statue is a female personification of Armenia, located in the city of Gyumri. It resembles the monumental complex of Mother Armenia in the capital Yerevan. It was erected in 1975 on a hill west of Gyumri city. It was composed by sculptors Ara Sargsian, Gaspar Gasparyan and Yerem Vartanyan. The architect is Rafik Yeghoyan.
https://en.wikipedia.org/wiki/TCP%20tuning
TCP tuning techniques adjust the network congestion avoidance parameters of Transmission Control Protocol (TCP) connections over high-bandwidth, high-latency networks. Well-tuned networks can perform up to 10 times faster in some cases. However, blindly following instructions without understanding their real consequences can hurt performance as well. Network and system characteristics Bandwidth-delay product (BDP) Bandwidth-delay product (BDP) is a term primarily used in conjunction with TCP to refer to the number of bytes necessary to fill a TCP "path", i.e. it is equal to the maximum number of simultaneous bits in transit between the transmitter and the receiver. High performance networks have very large BDPs. To give a practical example, two nodes communicating over a geostationary satellite link with a round-trip delay time (or round-trip time, RTT) of 0.5 seconds and a bandwidth of 10 Gbit/s can have up to 0.5×1010 bits, i.e., 5 Gbit = 625 MB of unacknowledged data in flight. Despite having much lower latencies than satellite links, even terrestrial fiber links can have very high BDPs because their link capacity is so large. Operating systems and protocols designed as recently as a few years ago when networks were slower were tuned for BDPs of orders of magnitude smaller, with implications for limited achievable performance. Buffers The original TCP configurations supported TCP receive window size buffers of up to 65,535 (64 KiB - 1) bytes, which was adequate for slow links or links with small RTTs. Larger buffers are required by the high performance options described below. Buffering is used throughout high performance network systems to handle delays in the system. In general, buffer size will need to be scaled proportionally to the amount of data "in flight" at any time. For very high performance applications that are not sensitive to network delays, it is possible to interpose large end to end buffering delays by putting in intermediate data storage
https://en.wikipedia.org/wiki/Thermodesulfobacterium%20hydrogeniphilum
Thermodesulfobacterium hydrogeniphilum is a species of Sulfate-reducing bacteria. It is thermophilic, chemolithoautotrophic, non-spore-forming, marine species, with type strain SL6T (=DSM 14290T =JCM 11239T).
https://en.wikipedia.org/wiki/Pituitary-specific%20positive%20transcription%20factor%201
POU domain, class 1, transcription factor 1 (Pit1, growth hormone factor 1), also known as POU1F1, is a transcription factor for growth hormone. Function PIT1 is a pituitary-specific transcription factor responsible for pituitary development and hormone expression in mammals and is a member of the POU family of transcription factors that regulate mammalian development. The POU family is so named because the first 3 members identified were PIT1 and OCT1 (MIM 164175) of mammals, and Unc-86 of C. elegans (Herr et al., 1988). PIT1 contains 2 protein domains, termed POU-specific and POU-homeo, which are both necessary for high affinity DNA binding on genes encoding growth hormone (GH; MIM 139250) and prolactin (PRL; MIM 176760). PIT1 is also important for regulation of the genes encoding prolactin and thyroid-stimulating hormone beta subunit (TSHB; MIM 188540) by thyrotropin-releasing hormone (TRH; MIM 257120) and cyclic AMP.[supplied by OMIM] Interactions Pituitary-specific positive transcription factor 1 has been shown to interact with GATA2 and PITX1.
https://en.wikipedia.org/wiki/Ashcroft%20and%20Mermin
Solid State Physics, better known by its colloquial name Ashcroft and Mermin, is an introductory condensed matter physics textbook written by Neil Ashcroft and N. David Mermin. Published in 1976 by Saunders College Publishing and designed by Scott Olelius, the book has been translated into over half a dozen languages and it and its competitor, Introduction to Solid State Physics (often shortened to Kittel), are considered the standard introductory textbooks of condensed matter physics. Content The Drude Theory of Metals The Sommerfeld Theory of Metals Failures of the Free Electron Model Crystal Lattices The Reciprocal lattice Determination of Crystal Structures by X-Ray Diffraction Classification of Bravais Lattices and Crystal Structures Electron Levels in a Periodic Potential: General Properties Electrons in a Weak Periodic Potential The Tight-Binding Method Other Methods for Calculating Band Structure The Semiclassical Model of Electron Dynamics The Semiclassical Theory of Conduction in Metals Measuring the Fermi Surface Band Structure of Selected Metals Beyond the Relaxation-Time Approximation Beyond the Independent Electron Approximation Surface Effects Classification of Solids Cohesive Energy Failures of the Static Lattice Model Classical Theory of the Harmonic Crystal Quantum Theory of the Harmonic Crystal Measuring Phonon Dispersion Relations Anharmonic Effects in Crystals Phonons in Metals Dielectric Properties of Insulators Homogeneous Semiconductors Inhomogeneous Semiconductors Defects in Crystals Diamagnetism and Paramagnetism Electron Interactions and Magnetic Structure Magnetic Ordering Superconductivity Reception The book has been reviewed several times and has been recommended in many other works. In a review of another work by the MRS Bulletin in 2011, the book was said to be "the indispensable work on electronic systems for experimental condensed matter physicists", due largely to the book's "lucidity and pana
https://en.wikipedia.org/wiki/DC-Community%20Access%20Network
The DC Community Access Network (District of Columbia Community Access Network) (DC-CAN) is a planned 100 gigabit network funded by the city of Washington, D.C. which will make broadband internet access available to universities, businesses, and resellers. It bypasses the monopoly held by telecommunications companies over the middle mile.
https://en.wikipedia.org/wiki/Heterostyly
Heterostyly is a unique form of polymorphism and herkogamy in flowers. In a heterostylous species, two or three morphological types of flowers, termed "morphs", exist in the population. On each individual plant, all flowers share the same morph. The flower morphs differ in the lengths of the pistil and stamens, and these traits are not continuous. The morph phenotype is genetically linked to genes responsible for a unique system of self-incompatibility, termed heteromorphic self-incompatibility, that is, the pollen from a flower on one morph cannot fertilize another flower of the same morph. Heterostylous plants having two flower morphs are termed "distylous". In one morph (termed "pin", "longistylous", or "long-styled" flower) the stamens are short and the pistils are long; in the second morph (termed "thrum", "brevistylous", or "short-styled" flower) the stamens are long and the pistils are short; the length of the pistil in one morph equals the length of the stamens in the second morph, and vice versa. Examples of distylous plants are the primrose and many other Primula species, buckwheat, flax and other Linum species, some Lythrum species, and many species of Cryptantha. Heterostylous plants having three flower morphs are termed "tristylous". Each morph has two types of stamens. In one morph, the pistil is short, and the stamens are long and intermediate; in the second morph, the pistil is intermediate, and the stamens are short and long; in the third morph, the pistil is long, and the stamens are short and intermediate. Oxalis pes-caprae, purple loosestrife (Lythrum salicaria) and some other species of Lythrum are trimorphic. The lengths of stamens and pistils in heterostylous flowers are adapted for pollination by different pollinators, or different body parts of the same pollinator. Thus, pollen originating in a long stamen will reach primarily long rather than short pistils, and vice versa. When pollen is transferred between two flowers of the same morph
https://en.wikipedia.org/wiki/Lists%20of%20statistics%20topics
This article itemizes the various lists of statistics topics. Statistics Outline of statistics Outline of regression analysis Index of statistics articles List of scientific method topics List of analyses of categorical data List of fields of application of statistics List of graphical methods List of statistical software Comparison of statistical packages List of graphing software Comparison of Gaussian process software List of stochastic processes topics List of matrices used in statistics Timeline of probability and statistics List of unsolved problems in statistics Probability Topic outline of probability List of probability topics Catalog of articles in probability theory List of probability distributions List of convolutions of probability distributions Glossaries and notations Glossary of experimental design Glossary of probability and statistics Notation in probability and statistics People List of actuaries List of statisticians List of mathematical probabilists Founders of statistics Publications List of important publications in statistics List of scientific journals in probability List of scientific journals in statistics Comparison of statistics journals Organizations List of academic statistical associations List of national and international statistical services See also Lists of mathematics topics
https://en.wikipedia.org/wiki/Haldane%27s%20rule
Haldane's rule is an observation about the early stage of speciation, formulated in 1922 by the British evolutionary biologist J. B. S. Haldane, that states that if — in a species hybrid — only one sex is inviable or sterile, that sex is more likely to be the heterogametic sex. The heterogametic sex is the one with two different sex chromosomes; in therian mammals, for example, this is the male. Overview Haldane himself described the rule as: Haldane's rule applies to the vast majority of heterogametic organisms. This includes the case where two species make secondary contact in an area of sympatry and form hybrids after allopatric speciation has occurred. The rule includes both male heterogametic (XY or XO-type sex determination, such as found in mammals and Drosophila fruit flies) and female heterogametic (ZW or Z0-type sex determination, as found in birds and butterflies), and some dioecious plants such as campions. Hybrid dysfunction (sterility and inviability) is a major form of post-zygotic reproductive isolation, which occurs in early stages of speciation. Evolution can produce a similar pattern of isolation in a vast array of different organisms. However, the actual mechanisms leading to Haldane's rule in different taxa remain largely undefined. Hypotheses Many different hypotheses have been advanced to address the evolutionary mechanisms to produce Haldane's rule. Currently, the most popular explanation for Haldane's rule is the composite hypothesis, which divides Haldane's rule into multiple subdivisions, including sterility, inviability, male heterogamety, and female heterogamety. The composite hypothesis states that Haldane's rule in different subdivisions has different causes. Individual genetic mechanisms may not be mutually exclusive, and these mechanisms may act together to cause Haldane's rule in any given subdivision. In contrast to these views that emphasize genetic mechanisms, another view hypothesizes that population dynamics during populat
https://en.wikipedia.org/wiki/Jihadist%20flag
The jihadist flag is a flag commonly used by various Islamist and fundamentalist movements as a symbol of jihad. It usually consists of the Black Standard with a white text of the Shahada (Islamic declaration of faith) emblazoned across it in calligraphy style writing. Its usage was widely adopted by Islamist groups and jihadists during the 1990s and early 2000s. Aside from Islamism, the flag has also been used by various terrorist organizations. Organizations which have used such a flag include: al-Qaeda Islamic State (ISIS/ISIL/IS/Daesh) al-Shabaab Chechen Mujahideen Hizbul Islam the Taliban, which is a black-on-white variant Palestinian Islamic Jihad In the last decade of the South Thailand insurgency, the al-Raya' flag has largely replaced the colourful secessionist flags formerly used by different rebel groups. Islamic State variant The variant used by the Islamic State, and before that by the Islamic State of Iraq (since 2006) depicts the second phrase of the shahada in the form of a depiction of the supposedly historical seal of Muhammad. In August 2014, British Prime Minister David Cameron suggested that anybody displaying "the Islamic State flag" in the United Kingdom should be arrested. Citing the Terrorism Act 2000, section 13 (1b) of the act states "[a] person in a public place commits an offence if he wears, carries or displays an article in such a way or in such circumstances as to arouse reasonable suspicion that he is a member or supporter of a proscribed organisation" and can face six months in prison or a statutory fine. It has also been banned from public demonstration in the Netherlands since August 2014. The use of the image of the IS flag (but not other versions of the black standard) for non-educational purposes has been forbidden in Germany by the Federal Ministry of the Interior since September 2014. Neighbouring Austria proposed a ban in the same month. See also Black Banner Organization Islamic flags List of black fla
https://en.wikipedia.org/wiki/Information%20Technology%20Rules%2C%202021
The Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 is secondary or subordinate legislation that suppresses India's Intermediary Guidelines Rules 2011. The 2021 rules have stemmed from section 87 of the Information Technology Act, 2000 and are a combination of the draft Intermediaries Rules, 2018 and the OTT Regulation and Code of Ethics for Digital Media. The Central Government of India along with the Ministry of Electronics and Information Technology (MeitY) and the Ministry of Information and Broadcasting (MIB) have coordinated in the development of the rules. Intermediaries had until 25 May 2021 to comply with the rules. History During Monsoon session of the Parliament in 2018 a motion on “Misuse of social media platforms and spreading of fake news” was admitted. The Minister of Electronics and Information Technology accordingly made a detailed statement of the "resolve of the Government to strengthen the legal framework and make the social media platforms accountable under the law". MeitY then prepared the draft Information Technology (Intermediary Guidelines) Rules 2018 to replace the 2011 rules. The Information Technology Act, 2000 provided that intermediaries are protected liabilities in some cases. The draft 2018 Rules sought to elaborate the liabilities and responsibilities of the intermediaries in a better way. Further the draft Rules have been made "in order to prevent spreading of fake news, curb obscene information on the internet, prevent misuse of social-media platforms and to provide security to the users." The move followed a notice issued to WhatsApp in July 2018, warning it against helping to spread fake news and look on as a "mute spectator". In relation to the Prajawala case, on 11 December 2018, the Supreme Court of India observed that "the Government of India may frame the necessary Guidelines / SOP and implement them within two weeks so as to eliminate child pornography, rape and gang rape imag
https://en.wikipedia.org/wiki/GSM%2003.38
In mobile telephony GSM 03.38 or 3GPP 23.038 is a character encoding used in GSM networks for SMS (Short Message Service), CB (Cell Broadcast) and USSD (Unstructured Supplementary Service Data). The 3GPP TS 23.038 standard (originally GSM recommendation 03.38) defines GSM 7-bit default alphabet which is mandatory for GSM handsets and network elements, but the character set is suitable only for English and a number of Western-European languages. Languages such as Chinese, Korean or Japanese must be transferred using the 16-bit UCS-2 character encoding. A limited number of languages, like Portuguese, Spanish, Turkish and a number of languages used in India written with a Brahmic scripts may use 7-bit encoding with national language shift table defined in 3GPP 23.038. For binary messages, 8-bit encoding is used. GSM 7-bit default alphabet and extension table of 3GPP TS 23.038 / GSM 03.38 The standard encoding for GSM messages is the 7-bit default alphabet as defined in the 23.038 recommendation. Seven-bit characters must be encoded into octets following one of three packing modes: CBS: using this encoding, it is possible to send up to 93 characters (packed in up to 82 octets) in one SMS message in a Cell Broadcast Service. SMS: using this encoding, it is possible to send up to 160 characters (packed in up to 140 octets) in one SMS message in the GSM network. USSD: using this encoding, it is possible to send up to 182 characters (packed in up to 160 octets) in one SMS message of Unstructured Supplementary Service Data. It is important (especially when a message is to be segmented using concatenated SMS mechanism) that characters from the Basic Character Set table take one septet, characters from the Basic Character Set Extension table take two septets. Note that the second part of the table is only accessible if the GSM device supports the 7-bit extension mechanism, using the ESC character prefix. Otherwise, the ESC code itself is interpreted as a space, and th
https://en.wikipedia.org/wiki/Saint%20Croix%20racer
The Saint Croix racer (Borikenophis sanctaecrucis) is a possibly extinct species of snake in the family Colubridae that is endemic to the island of Saint Croix in the United States Virgin Islands. Etymology The specific name, sanctaecrucis, refers to the island of Saint Croix, on which the holotype was collected. Description B. sanctaecrucis may attain a snout-to-vent length (SVL) of . It has smooth dorsal scales, which are arranged in 17 rows at midbody. The holotype has a total length of , which includes a tail long. B. sanctaecrucis is oviparous. Habitat The preferred natural habitat of B. sanctaerucis is xeric forest. Conservation B. sanctaecrucis is feared extinct, as it has not been recorded in over 100 years since the holotype was collected. St. Croix is a densely-populated island, and the species is a fairy large snake. If it is extinct, the most probable causes were due to predation from introduced mongooses and deforestation of its habitat. However, recent rediscoveries of other Caribbean reptiles that were also thought extinct brings hope that a small population (probably less than 50 individuals) of B. sanctaecrucis survives somewhere in St. Croix.
https://en.wikipedia.org/wiki/International%20Conference%20on%20Mobile%20Computing%20and%20Networking
MobiCom, the International Conference on Mobile Computing and Networking, is a series of annual conferences sponsored by ACM SIGMOBILE dedicated to addressing the challenges in the areas of mobile computing and wireless and mobile networking. Although no rating system for computer networking conferences exists, MobiCom is generally considered to be the best conference in these areas, and it is the fifth highest-impact venue in all of Computer Science. The quality of papers published in this conference is very high. The acceptance rate of MobiCom typically around 10%, meaning that only one tenth of all submitted papers make it through the tough peer review filter. According to SIGMOBILE, "the MobiCom conference series serves as the premier international forum addressing networks, systems, algorithms, and applications that support the symbiosis of mobile computers and wireless networks. MobiCom is a highly selective conference focusing on all issues in mobile computing and wireless and mobile networking at the link layer and above." MobiCom Conferences have been held at the following locations: MobiCom 2020, London, UK, 14-18 September 2020 MobiCom 2019, Los Cabos, Mexico, 21-25 October 2019 MobiCom 2018, New Delhi, India, 29 October-2 November 2018 MobiCom 2017, Snowbird, United States, 16-20 October 2017 MobiCom 2016, New York City, United States, 3–7 October 2016 MobiCom 2015, Paris, France, 7–11 September 2015 MobiCom 2014, Maui, Hawaii, United States, 7–11 September 2014 MobiCom 2013, Miami, Florida, United States, 30 September-4 October 2013 MobiCom 2012, Istanbul, Turkey, 22–26 August 2012 MobiCom 2011, Las Vegas, Nevada, United States, 19–23 September 2011 MobiCom 2010, Chicago, Illinois, United States, 20–24 September 2010 MobiCom 2009, Beijing, China, 20–25 September 2009 MobiCom 2008, San Francisco, California, United States, 13–19 September 2008 MobiCom 2007, Montreal, Quebec, Canada, 9–14 September 2007 MobiCom 2006, Los Angeles, Califo
https://en.wikipedia.org/wiki/Go%20and%20mathematics
The game of Go is one of the most popular games in the world. As a result of its elegant and simple rules, the game has long been an inspiration for mathematical research. Shen Kuo, an 11th century Chinese scholar, estimated in his Dream Pool Essays that the number of possible board positions is around 10172. In more recent years, research of the game by John H. Conway led to the development of the surreal numbers and contributed to development of combinatorial game theory (with Go Infinitesimals being a specific example of its use in Go). Computational complexity Generalized Go is played on n × n boards, and the computational complexity of determining the winner in a given position of generalized Go depends crucially on the ko rules. Go is “almost” in PSPACE, since in normal play, moves are not reversible, and it is only through capture that there is the possibility of the repeating patterns necessary for a harder complexity. Without ko Without ko, Go is PSPACE-hard. This is proved by reducing True Quantified Boolean Formula, which is known to be PSPACE-complete, to generalized geography, to planar generalized geography, to planar generalized geography with maximum degree 3, finally to Go positions. Go with superko is not known to be in PSPACE. Though actual games seem never to last longer than moves, in general it is not known if there were a polynomial bound on the length of Go games. If there were, Go would be PSPACE-complete. As it currently stands, it might be PSPACE-complete, EXPTIME-complete, or even EXPSPACE-complete. Japanese ko rule Japanese ko rules state that only the basic ko, that is, a move that reverts the board to the situation one move previously, is forbidden. Longer repetitive situations are allowed, thus potentially allowing a game to loop forever, such as the triple ko, where there are three kos at the same time, allowing a cycle of 12 moves. With Japanese ko rules, Go is EXPTIME-complete. Superko rule The superko rule (also called
https://en.wikipedia.org/wiki/Argonaute
The Argonaute protein family, first discovered for its evolutionarily conserved stem cell function, plays a central role in RNA silencing processes as essential components of the RNA-induced silencing complex (RISC). RISC is responsible for the gene silencing phenomenon known as RNA interference (RNAi). Argonaute proteins bind different classes of small non-coding RNAs, including microRNAs (miRNAs), small interfering RNAs (siRNAs) and Piwi-interacting RNAs (piRNAs). Small RNAs guide Argonaute proteins to their specific targets through sequence complementarity (base pairing), which then leads to mRNA cleavage, translation inhibition, and/or the initiation of mRNA decay. The name of this protein family is derived from a mutant phenotype resulting from mutation of AGO1 in Arabidopsis thaliana, which was likened by Bohmert et al. to the appearance of the pelagic octopus Argonauta argo. {{Infobox protein family | Symbol = Piwi | Name = Argonaute Piwi domain | image = 1u04-argonaute.png | width = | caption = An argonaute protein from Pyrococcus furiosus. PDB . PIWI domain is on the right, PAZ domain to the left. | Pfam = PF02171 | Pfam_clan = | InterPro = IPR003165 | SMART = | PROSITE = PS50822 | MEROPS = | SCOP = | TCDB = | OPM family = | OPM protein = | CDD = cd02826 | PDB = }} RNA interference RNA interference (RNAi) is a biological process in which the RNA molecules inhibit gene expression. The method of inhibition is via the destruction of specific mRNA molecules or by simply suppressing the protein translation. The RNA interference has a significant role in defending cells against parasitic nucleotide sequences. In many eukaryotes, including animals, the RNA interference pathway is found, and it is initiated by the enzyme Dicer. Dicer cleaves long double-stranded RNA (dsRNA, often found in viruses and small interfering RNA) molecules into short double stranded fragments of around 20 nucleotide siRNAs. The dsRNA is then separated into two single-stranded RNAs (ss
https://en.wikipedia.org/wiki/Project%20Sidekick
Sidekick is a project developed by NASA and Microsoft, started in December 2015 on the International Space Station, which provides virtual assistance to astronauts using Microsoft HoloLens augmented reality glasses. Functionality Sidekick has two modes of operation. Remote Expert Mode uses the functionality of the Holographic Skype application—voice and video chat, real-time virtual annotation—to allow a ground operator and space crew member to collaborate directly over what the astronaut sees, with the ground operator able to see the crew member's view in 3D, provide interactive guidance, and draw annotations into the crew member's environment. In Procedure Mode, animated virtual illustrations display on top of objects as a crew member interacts with them. This mode can be used for guidance and instructional purposes in standalone scenarios. Applications include inventory management, in which the system recognizes an inventory item, and can display a path to where the item should be stored. Previously, crew members would rely primarily on printed instructions and voice-based communication when performing complex tasks. The capabilities provided by Sidekick have been promoted as potential enabling features allowing for reduced crew training requirements and increased efficiency in deep space missions in which communication delays can complicate difficult operations. History After having performed simulated reduced-gravity testing in its Weightless Wonder C9 aircraft, NASA attempted to launch a pair of HoloLens units aboard the SpaceX CRS-7 launch to the International Space Station on June 28, 2015, but the Falcon 9 rocket carrying the payload exploded at 2 minutes and 19 seconds into the flight. Sidekick was tested at the Aquarius laboratory from late July to early August 2015 as part of the two-week long NASA Extreme Environment Missions Operations 20 expedition, demonstrating its operation in tasks such as equipment checks and setup. HoloLens' hardware was succe
https://en.wikipedia.org/wiki/Letters%20in%20Mathematical%20Physics
Letters in Mathematical Physics is a peer-reviewed scientific journal in mathematical physics published by Springer Science+Business Media. It publishes letters and longer research articles, occasionally also articles containing topical reviews. It is essentially a platform for the rapid dissemination of short contributions in the field of mathematical physics. In addition, the journal publishes contributions to modern mathematics in fields which have a potential physical application, and developments in theoretical physics which have potential mathematical impact. The editors are Volker Bach, Edward Frenkel, Maxim Kontsevich, Dirk Kreimer, Nikita Nekrasov, Massimo Porrati, and Daniel Sternheimer. Abstracting and indexing The following services abstract or index Letters in Mathematical Physics: Academic OneFile, Academic Search, Astrophysics Data System, Chemical Abstracts Service, Current Contents/Physical, Chemical and Earth Sciences, Current Index to Statistics, EBSCO, EI-Compendex, INIS Atomindex, Inspec, Mathematical Reviews, ProQuest, Science Citation Index, Scopus, Summon by Serial Solutions, and Zentralblatt MATH. According to the Journal Citation Reports, its 2021 impact factor is 1.520. External links Physics journals Mathematics journals Springer Science+Business Media academic journals Monthly journals Academic journals established in 1975 English-language journals
https://en.wikipedia.org/wiki/Altair%20Engineering
Altair Engineering Inc. is an American multinational information technology company headquartered in Troy, Michigan. It provides software and cloud solutions for simulation, IoT, high performance computing (HPC), data analytics, and artificial intelligence (AI). Altair Engineering is the creator of the HyperWorks CAE software product, among numerous other software packages and suites. The company was founded in 1985 and went public in 2017. It is traded on the Nasdaq stock exchange under the stock ticker symbol ALTR. History Founding Altair Engineering was founded in 1985 by James R. Scapa, George Christ, and Mark Kistner in Troy, Michigan. Since the company's outset, Scapa has served as its CEO (and now chairman). Initially, Altair started as an engineering consulting firm, but branched out into product development and computer-aided engineering (CAE) software. In the 1990s, it became known for its software products like HyperWorks, OptiStruct, and HyperMesh, which were often used for product development by the automotive industry. Some of Altair's early clients included the Ford Motor Company, General Motors, and Chrysler. Its software also aided in the development of the Young America and AmericaOne racing yachts, the former of which was used to compete in the 1995 America's Cup. Its software also found uses in other sectors, including aerospace (NASA), aviation (Airbus), consumer electronics (Nokia), and toy manufacturing (Mattel), among others. In 2002, Altair software aided in the design of the Airbus A380 by weight optimizing the aircraft wing ribs. Also in 2002, Altair opened offices in Seongnam, South Korea and Shanghai, China, adding those locales to its international footprint alongside India where it had begun investment in 1992. Early 2000's and 2017 IPO In addition to its software production, Altair hires out engineering consultants to its corporate clientele. Its consultancy services accounted for the majority of the company's revenue until 2004
https://en.wikipedia.org/wiki/NATO%20Software%20Engineering%20Conferences
The NATO Software Engineering Conferences were held in 1968 and 1969. The conferences were attended by international experts on computer software who agreed on defining best practices for software grounded in the application of engineering. The result of the conferences were two reports, one for the 1968 conference and the other for the 1969 conference, that defined how software should be developed. The conferences played a major role in gaining general acceptance for the term software engineering.
https://en.wikipedia.org/wiki/Tissue%20typing
Tissue typing is a procedure in which the tissues of a prospective donor and recipient are tested for compatibility prior to transplantation. Mismatched donor and recipient tissues can lead to rejection of the tissues. There are multiple methods of tissue typing. Overview During tissue typing, an individual's human leukocyte antigens (HLA) are identified. HLA molecules are presented on the surface of cells and facilitate interactions between immune cells (such as dendritic cells and T cells) that lead to adaptive immune responses. If HLA from the donor is recognized by the recipient's immune system as different from the recipient's own HLA, an immune response against the donor tissues can be triggered. More specifically, HLA mismatches between organ donors and recipients can lead to the development of anti-HLA donor-specific antibodies (DSAs). DSAs are strongly associated with the rejection of donor tissues in the recipient, and their presence is considered an indicator of antibody-mediated rejection. When donor and recipient HLA are matched, donor tissues are significantly more likely to be accepted by the recipient's immune system. During tissue typing, a number of HLA genes should be typed in both the donor and recipient, including HLA Class I A, B, and C genes, as well as HLA Class II DRB1, DRB3, DRB4, DRB5, DQA1, DQB1, DPA1, and DPB1 genes. HLA typing is made more difficult by the fact that the HLA region is the most genetically variable region in the human genome. Methods of tissue typing One of the first methods of tissue typing was through serological typing. In this technique, a donor's blood cells are HLA typed by mixing them with serum containing anti-HLA antibodies. If the antibodies recognize their epitope on the donor's HLA then complement activation occurs leads to cell lysis and death, allowing the cells to take up a dye (trypan blue). This allows for identification of the cells' HLA based indirectly on the specificity of the known antibodies i
https://en.wikipedia.org/wiki/Suillus%20salmonicolor
Suillus salmonicolor, commonly known as the Slippery Jill, is a fungus in the family Suillaceae of the order Boletales. First described as a member of the genus Boletus in 1874, the species acquired several synonyms, including Suillus pinorigidus and Suillus subluteus, before it was assigned its current binomial name in 1983. It has not been determined with certainty whether S. salmonicolor is distinct from the species S. cothurnatus, described by Rolf Singer in 1945. S. salmonicolor is a mycorrhizal fungus—meaning it forms a symbiotic association with the roots of plants such that both organisms benefit from the exchange of nutrients. This symbiosis occurs with various species of pine, and the fruit bodies (or mushrooms) of the fungus appear scattered or in groups on the ground near the trees. The fungus is found in North America, Hawaii, Asia, the Caribbean, South Africa, Australia and Central America. It has been introduced to several of those locations via transplanted trees. The mushroom's dingy yellow to brownish cap is rounded to flattened in shape, slimy when wet, and grows up to wide. The small pores on the underside of the cap are yellow before becoming olive-brown. The stem is up to long and thick and is covered with reddish-brown glandular dots. Young specimens are covered with a grayish, slimy partial veil that later ruptures and leaves a sheathlike ring on the stem. Although the mushroom is generally considered edible—especially if the slimy cap cuticle and partial veil are first peeled off—opinions about flavor vary. Other similar Suillus species include S. acidus, S. subalutaceus, and S. intermedius. Taxonomy and phylogeny The species was first described scientifically by American mycologist Charles Christopher Frost in 1874 as Boletus salmonicolor, based on specimens he collected in the New England area of the United States. In a 1983 publication, mycologist Roy Halling declared Boletus subluteus (described by Charles Horton Peck in 1887; Ixoco
https://en.wikipedia.org/wiki/Continuous-time%20quantum%20Monte%20Carlo
In computational solid state physics, Continuous-time quantum Monte Carlo (CT-QMC) is a family of stochastic algorithms for solving the Anderson impurity model at finite temperature. These methods first expand the full partition function as a series of Feynman diagrams, employ Wick's theorem to group diagrams into determinants, and finally use Markov chain Monte Carlo to stochastically sum up the resulting series. The attribute continuous-time was introduced to distinguish the method from the then-predominant Hirsch–Fye quantum Monte Carlo method, which relies on a Suzuki–Trotter discretisation of the imaginary time axis. If the sign problem is absent, the method can also be used to solve lattice models such as the Hubbard model at half filling. To distinguish it from other Monte Carlo methods for such systems that also work in continuous time, the method is then usually referred to as Diagrammatic determinantal quantum Monte Carlo (DDQMC or DDMC). Partition function expansion In second quantisation, the Hamiltonian of the Anderson impurity model reads: , where and are the creation and annihilation operators, respectively, of a fermion on the impurity. The index collects the spin index and possibly other quantum numbers such as orbital (in the case of a multi-orbital impurity) and cluster site (in the case of multi-site impurity). and are the corresponding fermion operators on the non-interacting bath, where the bath quantum number will typically be continuous. Step 1 of CT-QMC is to split the Hamiltonian into an exactly solvable term, , and the rest, . Different choices correspond to different expansions and thus different algorithmic descriptions. Common choices are: Interaction expansion (CT-INT): Hybridization expansion (CT-HYB): Auxiliary field expansion (CT-AUX): like CT-INT, but the interaction term is first decoupled using a discrete Hubbard-Stratonovich transformation Step 2 is to switch to the interaction picture and expand the partit
https://en.wikipedia.org/wiki/Glass%20microsphere
Glass microspheres are microscopic spheres of glass manufactured for a wide variety of uses in research, medicine, consumer goods and various industries. Glass microspheres are usually between 1 and 1000 micrometers in diameter, although the sizes can range from 100 nanometers to 5 millimeters in diameter. Hollow glass microspheres, sometimes termed microballoons or glass bubbles, have diameters ranging from 10 to 300 micrometers. Hollow spheres are used as a lightweight filler in composite materials such as syntactic foam and lightweight concrete. Microballoons give syntactic foam its light weight, low thermal conductivity, and a resistance to compressive stress that far exceeds that of other foams. These properties are exploited in the hulls of submersibles and deep-sea oil drilling equipment, where other types of foam would implode. Hollow spheres of other materials create syntactic foams with different properties: ceramic balloons e.g. can make a light syntactic aluminium foam. Hollow spheres also have uses ranging from storage and slow release of pharmaceuticals and radioactive tracers to research in controlled storage and release of hydrogen. Microspheres are also used in composites to fill polymer resins for specific characteristics such as weight, sandability and sealing surfaces. When making surfboards for example, shapers seal the EPS foam blanks with epoxy and microballoons to create an impermeable and easily sanded surface upon which fiberglass laminates are applied. Glass microspheres can be made by heating tiny droplets of dissolved water glass in a process known as ultrasonic spray pyrolysis (USP), and properties can be improved somewhat by using a chemical treatment to remove some of the sodium. Sodium depletion has also allowed hollow glass microspheres to be used in chemically sensitive resin systems, such as long pot life epoxies or non-blown polyurethane composites Additional functionalities, such as silane coatings, are commonly added to
https://en.wikipedia.org/wiki/Algae%20DNA%20barcoding
DNA barcoding of algae is commonly used for species identification and phylogenetic studies. Algae form a phylogenetically heterogeneous group, meaning that the application of a single universal barcode/marker for species delimitation is unfeasible, thus different markers/barcodes are applied for this aim in different algal groups. Diatoms Diatom DNA barcoding is a method for taxonomical identification of diatoms even to species level. It is conducted using DNA or RNA followed by amplification and sequencing of specific, conserved regions in the diatom genome followed by taxonomic assignment. One of the main challenges of identifying diatoms is that it is often collected as a mixture of diatoms from several species. DNA metabarcoding is the process of identifying the individual species from a mixed sample of environmental DNA (also called eDNA) which is DNA extracted straight from the environment such as in soil or water samples. A newly applied method is diatom DNA metabarcoding which is used for ecological quality assessment of rivers and streams because of the specific response of diatoms to particular ecologic conditions. As species identification via morphology is relatively difficult and requires a lot of time and expertise, high-throughput sequencing (HTS) DNA metabarcoding enables taxonomic assignment and therefore identification for the complete sample regarding the group specific primers chosen for the previous DNA amplification. Until now, several DNA markers have already been developed, mainly targeting the 18S rRNA. Using the V4 hypervariable region of the ribosomal small subunit DNA (SSU rDNA), DNA-based identification was found to be more efficient then the classical morphology based approach. Other conserved regions in the genomes which are frequently used as marker genes are ribulose-1-5-bisphosphate carboxylase (rbcL), cytochrome oxidase I (cox1, COI), ITS and 28S. It has been shown repeatedly that the molecular data gained by diatom eDNA meta
https://en.wikipedia.org/wiki/National%20Registry%20of%20Evidence-Based%20Programs%20and%20Practices
The National Registry of Evidence-based Programs and Practices (NREPP) was a searchable online database of interventions designed to promote mental health or to prevent or treat substance abuse and mental disorders. The registry was funded and administered by the Substance Abuse and Mental Health Services Administration (SAMHSA), part of the U.S. Department of Health and Human Services. The goal of the Registry was to encourage wider adoption of evidence-based interventions and to help those interested in implementing an evidence-based intervention to select one that best meets their needs. The NREPP website was phased out in 2018. See the section below about the phase out for more information. Overview In the behavioral health field, there is an ongoing need for researchers, developers, evaluators, and practitioners to share information about what works to improve outcomes among individuals coping with, or at risk for, mental disorders and substance abuse. Discussing how this need led to the development of NREPP, Brounstein, Gardner, and Backer (2006) write: The focus of NREPP is on delivering an array of standardized, comparable information on interventions that are evidence based, as opposed to identifying programs that are "effective" or ranking them in effectiveness. Its peer reviewers use specific criteria to rate the quality of an intervention's evidence base as well as the intervention's suitability for broad adoption. In addition, NREPP provides contextual information about the intervention, such as the population served, implementation history, and cost data to encourage a realistic and holistic approach to selecting prevention interventions. As of 2010, the interventions reviewed by NREPP have been implemented successfully in more than 229,000 sites, in all 50 States and more than 70 countries, and with more than 107 million clients. Versions of ura review process and rating criteria have been adopted by the National Cancer Institute and the Adminis
https://en.wikipedia.org/wiki/GSSHA
GSSHA (Gridded Surface/Subsurface Hydrologic Analysis) is a two-dimensional, physically based watershed model developed by the Engineer Research and Development Center of the United States Army Corps of Engineers. It simulates surface water and groundwater hydrology, erosion and sediment transport. The GSSHA model is used for hydraulic engineering and research, and is on the Federal Emergency Management Agency (FEMA) list of hydrologic models accepted for use in the national flood insurance program for flood hydrograph estimation. Input is best prepared by the Watershed Modeling System interface, which effectively links the model with geographic information systems (GIS). GSSHA uses a square-grid, constant grid-size representation of watershed topography and characteristics, similar to a digital elevation model representation. Relevant model parameters are assigned to the model grids using index maps. Index maps are often derived from soils, landuse/land cover, vegetation, or other physiographic maps. History The GSSHA model was derived from the CASC2D hydrologic model. GSSHA represents a significant improvement on CASC2D in terms of capabilities, options, and numerical procedures. GSSHA includes dynamic time-stepping depending on stability criteria, different time steps for different numerical processes, and the ability to run on multi-processor computers. Processes included in GSSHA include surface and ground water flow, channel hydraulics, evapotranspiration, erosion and sedimentation, storm drainage networks, tile drains, a variety of hydraulic structures, and contaminant/nutrient fate and transport. Formulation GSSHA uses a regular square grid computational discretization of the watershed. Elevation data are taken from a digital elevation model. GSSHA uses a vector channel representation. This allows feature allows channels to flow in any direction and meander, independent from the grid resolution; this feature accurately preserves channel length
https://en.wikipedia.org/wiki/Epitranscriptome
Within the field of molecular biology, the epitranscriptome includes all the biochemical modifications of the RNA (the transcriptome) within a cell. In analogy to epigenetics that describes "functionally relevant changes to the genome that do not involve a change in the nucleotide sequence", epitranscriptomics involves all functionally relevant changes to the transcriptome that do not involve a change in the ribonucleotide sequence. Thus, the epitranscriptome can be defined as the ensemble of such functionally relevant changes. There are several types of RNA modifications that impact gene expression. These modifications happen to many types of cellular RNA including, but not limited to, ribosomal RNA (rRNA), transfer RNA (tRNA), messenger RNA (mRNA), and small nuclear RNA (snRNA). The most common and well-understood mRNA modification at present is N6-Methyladenosine (m6A), which has been observed to occur an average of three times in every mRNA molecule. Currently, work is focused on determining the types of and location of RNA modifications, determining if these modification have function, and if so, what is their mechanism of action. Similar to the epigenome, the epitranscriptome has "writers" and "erasers" that mark RNA and "readers" that translate those marks into function. One function that has been elucidated involves the enzyme adenosine deaminase (ADAR), which acts on RNA. ADAR affects a series of cellular processes, including alternative splicing, microRNAs, the innate immune system, and leads to protein recoding especially for important receptors in the central nervous system. Chemical Modifications of RNA N6-Methyladenosine (m6A) m6A describes the methylation of the nitrogen at position 6 in the adenosine base within mRNA. Discovered in 1974, m6A is the most abundant eukaryotic mRNA modification; most mRNAs contain approximately three m6A residues. However, some mRNA transcripts do not contain any m6A at all, while others may have 10 or more. The ter
https://en.wikipedia.org/wiki/Papovaviricetes
Papovaviricetes is a class of viruses. The class shares the name of an abolished family, Papovaviridae, which was split in 1999 into the two families Papillomaviridae and Polyomaviridae. The class was established in 2019 and takes its name from the former family. Orders The following orders are recognized: Sepolyvirales Zurhausenvirales See also Bandicoot papillomatosis carcinomatosis virus
https://en.wikipedia.org/wiki/Variance%20risk%20premium
Variance risk premium is a phenomenon on the variance swap market, of the variance swap strike being greater than the realized variance on average. For most trades, the buyer of variance ends up with a loss on the trade, while the seller profits. The amount that the buyer of variance typically loses in entering into the variance swap, is known as the variance risk premium. The variance risk premium can be naively justified by taking into account the large negative convexity of a short variance position; variance during rare times of crisis can be 50-100 times that of normal market conditions. Using insurance as an analogy, the variance buyer typically pays a premium to be able to receive the large positive payoff of a variance swap in times of market turmoil, to "insure" against this. Analysis The variance risk premium can also be analysed from the perspective of asset allocation. Carr and Wu (2009) examines whether the excess returns of selling or buying variance swaps can be explained using common factor models such as the CAPM model and the Fama-French factors, which include returns of different segments of stocks on the market. Despite the intuitive connection between stock price volatility and stock price, none of these models are able to strongly explain the excess returns on variance swaps. This implies that there is another factor that is unrelated to stock prices that affects how much, on average, one will pay to enter into a variance swap contract. This suggests that investors are willing to pay extra money to enter into variance because they dislike variance, not just because it is anti-correlated with stock prices, but on its own right. This leads to many considering variance as an asset class in and of itself. In the years before the 2008 financial crisis, selling variance on a rolling basis was a popular trade among hedge funds and other institutional investors.
https://en.wikipedia.org/wiki/IONIS-GCCRRx
{{DISPLAYTITLE:IONIS-GCCRRx}} IONIS-GCCRRx, also known as ISIS-426115, is an antiglucocorticoid which is under development by Ionis Pharmaceuticals (formerly Isis Pharmaceuticals) for the treatment of diabetes mellitus type 2. It has also been under investigation for the treatment of Cushing's syndrome, but no development has been reported. The drug is an antisense oligonucleotide against the glucocorticoid receptor. As of December 2017, it is in phase II clinical trials for diabetes mellitus type 2.
https://en.wikipedia.org/wiki/SVI-728
The SVI-728 is the first home computer from Spectravideo that complied fully with the MSX home computer specification. It was introduced in 1984. The design is virtually identical to that of the earlier SV-328, which did not comply fully with the MSX standard. The SVI-738 is a portable version of this computer. Technical specifications Microprocessor Zilog Z80A with a clockspeed of 3.56 MHz. Memory ROM: 32 KB RAM: 64 KB (expandable to 256 KB) VRAM: 16 KB Video Graphical processor: Texas Instruments TMS9918A/TMS9929 (NTSC/PAL) Graphical resolution: 256 x 192 pixels text modes: 40 characters x 24 lines and 32 characters x 24 lines colors: 16 sprites: 32 Sound General Instrument AY-3-8910-soundchip 3 sound channels 1 noise channels 1 envelope controller Connectors 1 data recorder/Cassette deck 2 joysticks 1 cartridge 1 Super Expander 1 disk station
https://en.wikipedia.org/wiki/Embodied%20energy
Embodied energy is the sum of all the energy required to produce any goods or services, considered as if that energy was incorporated or 'embodied' in the product itself. The concept can be useful in determining the effectiveness of energy-producing or energy saving devices, or the "real" replacement cost of a building, and, because energy-inputs usually entail greenhouse gas emissions, in deciding whether a product contributes to or mitigates global warming. One fundamental purpose for measuring this quantity is to compare the amount of energy produced or saved by the product in question to the amount of energy consumed in producing it. Embodied energy is an accounting method which aims to find the sum total of the energy necessary for an entire product lifecycle. Determining what constitutes this lifecycle includes assessing the relevance and extent of energy into raw material extraction, transport, manufacture, assembly, installation, disassembly, deconstruction and/or decomposition as well as human and secondary resources. History The history of constructing a system of accounts which records the energy flows through an environment can be traced back to the origins of accounting itself. As a distinct method, it is often associated with the Physiocrat's "substance" theory of value, and later the agricultural energetics of Sergei Podolinsky, a Russian physician, and the ecological energetics of Vladmir Stanchinsky. The main methods of embodied energy accounting as they are used today grew out of Wassily Leontief's input-output model and are called Input-Output Embodied Energy analysis. Leontief's input-output model was in turn an adaptation of the neo-classical theory of general equilibrium with application to "the empirical study of the quantitative interdependence between interrelated economic activities". According to Tennenbaum Leontief's Input-Output method was adapted to embodied energy analysis by Hannon to describe ecosystem energy flows. Hannon's adapt
https://en.wikipedia.org/wiki/Network%20Bootable%20Image
Network Bootable Image (NBI) is a legacy format that wraps operating system images to makes it possible for Etherboot to load the images directly. NBI format is able to combine kernel, file system and various boot parameters, such as location of remote file system or server IP address, into one bootable file.
https://en.wikipedia.org/wiki/Michael%20Friendly
Michael Louis Friendly (born 1945) is an American-Canadian psychologist, Professor of Psychology at York University in Ontario, Canada, and director of its Statistical Consulting Service, especially known for his contributions to graphical methods for categorical and multivariate data, and on the history of data and information visualisation. Biography Born in New York City, Friendly obtained his BS in 1966 from the Rensselaer Polytechnic Institute, and his MS in 1969 from Princeton University. In 1971/2 he also obtained his PhD in psychology at Princeton under supervision of Harold Gulliksen and Peter Ornstein, with the thesis titled "Proximity Analysis and the Structure of Organization in Free Recall." Friendly's first research project in the field of psychometrics and cognitive psychology had started at the Educational Testing Service and Princeton University, and was made possible by a Psychometric Fellowship awarded by the Educational Testing Service. After graduation Friendly jointed the Department of Psychology at the York University in Ontario, Canada, where he continued his research. At the York University he was appointed Associate Professor and later on Professor of Psychology, and since 1985 also director of its Statistical Consulting Service. Friendly is Associate Editor of the Journal of Computational and Graphical Statistics and an Editor of Statistical Science. In 2018 he became a Fellow of the American Statistical Association. Work Friendly's research interests have developed over years. It started in the 1970s with the application of quantitative and computer methods to problems in cognitive psychology, including the cognitive aspects of extracting information from graphical displays. In the 1990s Friendly started focussing on the history of statistics and data visualization, and furthermore graphical methods for data and information visualization. Publications Books Support web site Selected articles and reports 1991. "Interpr
https://en.wikipedia.org/wiki/Schlieren%20imaging
Schlieren imaging is a method to visualize density variations in transparent media. The term "schlieren imaging" is commonly used as a synonym for schlieren photography, though this article particularly treats visualization of the pressure field produced by ultrasonic transducers, generally in water or tissue-mimicking media. The method provides a two-dimensional (2D) projection image of the acoustic beam in real-time ("live video"). The unique properties of the method enable the investigation of specific features of the acoustic field (e.g. focal point in HIFU transducers), detection of acoustic beam-profile irregularities (e.g. due to defects in transducer) and on-line identification of time-dependent phenomena (e.g. in phased array transducers). Some researchers say that schlieren imaging is equivalent to an X-ray radiograph of the acoustic field. Setup The optical setup of a schlieren imaging system may comprise the following main sections: Parallel beam, focusing element, stop (sharp edge) and a camera. The parallel beam may be achieved by a point-like light source (a laser focused into a pinhole is sometimes used) placed in the focal point of a collimating optical element (lens or mirror). The focusing element may be a lens or a mirror. The optical stop may be realized by a razor placed horizontally or vertically in the focal point of the focusing element, carefully positioned to block the light spot image on its edge. The camera is positioned behind the stop and may be equipped with a suitable lens. Physics Ray optics description A parallel beam is described as a group of straight and parallel 'rays'. The rays cross through the transparent medium while potentially interacting with the contained acoustic field, and finally reach the focusing element. Note that the principle of a focusing element is directing (i.e. focusing) rays that are parallel - into a single point on the focal plane of the element. Thus, the population of rays crossing the focal
https://en.wikipedia.org/wiki/Species%20sorting
Species sorting is a mechanism in the metacommunity framework of ecology whereby species distributions and abundances can be related to the environmental or biotic conditions in a particular habitat. The species sorting paradigm describes a system of habitat patches with different environmental conditions that organisms can move between. Species are able to disperse to patches with suitable environmental conditions, resulting in patterns where environmental conditions can predict the species found in a particular habitat.
https://en.wikipedia.org/wiki/Frontier%20Organic%20Research%20Farm%20Botanical%20Garden
The Frontier Organic Research Farm Botanical Garden 1 acre (4,000 m2) is a botanical garden operated by the Frontier Co-op corporation, and located with the research farm at company headquarters in Norway, Iowa, in the United States. The garden contains 200 botanical species in 17 medicinal herb beds, with an elderberry grove as a windbreak. The cooperative also manages a 15-acre (61,000 m2) native prairie at the site, as well as 68 acres (275,000 m2) in Meigs County, Ohio operated as the National Center for the Preservation of Medicinal Herbs. See also List of botanical gardens in the United States Botanical gardens in Iowa Botanical research institutes Research institutes in Iowa Protected areas of Benton County, Iowa
https://en.wikipedia.org/wiki/Maxilla
The maxilla (: maxillae ) in vertebrates is the upper fixed (not fixed in Neopterygii) bone of the jaw formed from the fusion of two maxillary bones. In humans, the upper jaw includes the hard palate in the front of the mouth.<ref>Merriam-Webster Online Dictionary.</ref> The two maxillary bones are fused at the intermaxillary suture, forming the anterior nasal spine. This is similar to the mandible (lower jaw), which is also a fusion of two mandibular bones at the mandibular symphysis. The mandible is the movable part of the jaw. Anatomy Structure The maxilla is a paired bone - the two maxillae unite with each other at the intermaxillary suture. The maxilla consists of: The body of the maxilla: pyramid-shaped; has an orbital, a nasal, an infratemporal, and a facial surface; contains the maxillary sinus. Four processes: the zygomatic process the frontal process the alveolar process the palatine process It has three surfaces: the anterior, posterior, medial Features of the maxilla include: the infraorbital sulcus, canal, and foramen the maxillary sinus the incisive foramen Articulations Each maxilla articulates with nine bones: frontal, ethmoid, nasal, zygomatic, lacrimal, and palatine bones, the vomer, the inferior nasal concha, as well as the maxilla of the other side. Sometimes it articulates with the orbital surface, and sometimes with the lateral pterygoid plate of the sphenoid. Development The maxilla is ossified in membrane. Mall and Fawcett maintain that it is ossified from two centers only, one for the maxilla proper and one for the premaxilla. These centers appear during the sixth week of prenatal development and unite in the beginning of the third month, but the suture between the two portions persists on the palate until nearly middle life. Mall states that the frontal process is developed from both centers. The maxillary sinus appears as a shallow groove on the nasal surface of the bone about the fourth month of development, but does
https://en.wikipedia.org/wiki/Symbols%20of%20Manitoba
There are several symbols of Manitoba, one of the ten provinces of Canada. These symbols are designated by The Coat of Arms, Emblems and the Manitoba Tartan Act, which came into force on Feb 1, 1988. Symbols
https://en.wikipedia.org/wiki/Rafael%20Artzy
Rafael Artzy (23 July 1912 – 22 August 2006) was an Israeli mathematician specializing in geometry. Education and emigration Artzy was born July 23, 1912, in Königsberg, Germany. His father was Edward I. Deutschlander and his mother Ida Freudenheim. Rafael studied at Königsberg University from 1930 to 1933. He transferred to Hebrew University and obtained a master’s degree in 1934. He married Elly Iwiansky on October 12, 1934. Rafael continued his studies at Hebrew University under Theodore Motzkin, obtaining a Ph.D. in 1945. Elly and Rafael raised three children: Ehud, Michal, and Barak. Ehud and Barak died before their father. Michal Artzy is emeritus professor in Marine Civilization at the University of Haifa. Rafael served as both teacher and principal of Israel High School from 1934 to 1951. He was an instructor and assistant professor at the Israel Institute of Technology from 1951 to 1956. American tour Rafael Artzy took up a position as research associate and lecturer at University of Wisconsin, Madison in 1956. That year he also made his first of many contributions to Mathematical Reviews. Artzy became associate professor at University of North Carolina, Chapel Hill in 1960. The following year Rutgers University made him a full professor. In 1964 he was a visitor at the Institute for Advanced Study. He wrote Linear Geometry (1965) which was favorably reviewed by H. S. M. Coxeter In 1965 Artzy was at State University of New York in Buffalo. In 1967 he joined Temple University where he was for five years. Return In 1972 Rafael Artzy returned to Israel and participated in mathematics at Technion in Haifa. He helped organize a quadrennial conference on geometry at Haifa. For instance, in March 1979 such a conference was held and the proceedings Geometry and Differential Geometry was edited by Artzy and I. Vaisman and published in Springer Lecture Notes as #792. In 1992 he published Geometry. An Algebraic Approach Artzy had made 224 contributions to Mathema
https://en.wikipedia.org/wiki/Nonidet%20P-40
Nonidet P-40 is a nonionic, non-denaturing detergent. Its official IUPAC name is octylphenoxypolyethoxyethanol. Nonidet P-40 is sometimes abbreviated as NP-40, but should not be confused with a different detergent by the same name NP-40, nonylphenoxypolyethoxyethanol of the Tergitol NP series of Dow Chemicals. Nonidet was a trademark of Shell Chemical Co. from 1956 to the early 2000s, but they no longer make it. Nonidet P-40 is no longer sold by the chemical company Sigma-Aldrich. Sigma-Aldrich has replaced Nonidet P-40 with IGEPAL CA-630, which is described as a "nonionic, non-denaturing detergent". Sigma-Aldrich claims that IGEPAL CA-630 is "chemically indistinguishable from Nonidet P-40". IGEPAL consists of octyl-phenoxy(polyoxyethylene)ethanol. Tergitol and the Sigma and BioChemica Nonidet P40 substitute detergents consist of nonyl-phenyl-polyethylene glycol. The original Shell Nonidet P-40 consisted of octyl-phenoxy(polyoxyethylene)ethanol, making IGEPAL the most comparable of the four substitutes.
https://en.wikipedia.org/wiki/Coprinopsis%20atramentaria
Coprinopsis atramentaria, commonly known as the common ink cap, tippler's bane, or inky cap, is an edible (although poisonous when combined with alcohol) mushroom found in Europe and North America. Previously known as Coprinus atramentarius, it is the second best known ink cap and previous member of the genus Coprinus after C. comatus. It is a widespread and common fungus found throughout the northern hemisphere. Clumps of mushrooms arise after rain from spring to autumn, commonly in urban and disturbed habitats such as vacant lots and lawns, as well as grassy areas. The grey-brown cap is initially bell-shaped before opening, after which it flattens and disintegrates. The flesh is thin and the taste mild. It can be eaten, but due to the presence of coprine within the mushroom, it is poisonous when consumed with alcohol, as it heightens the body's sensitivity to ethanol in a similar manner to the anti-alcoholism drug disulfiram. Taxonomy The common ink cap was first described by French naturalist Pierre Bulliard in 1786 as Agaricus atramentarius before being placed in the large genus Coprinus in 1838 by Elias Magnus Fries. The specific epithet is derived from the Latin word atramentum "ink". The genus was formerly considered to be a large one with well over 100 species. However, molecular analysis of DNA sequences showed that most species belonged in the family Psathyrellaceae, distinct from the type species that belonged to the Agaricaceae. It was given its current binomial name in 2001 as a result, as this and other species were moved to the new genus Coprinopsis. The term "tippler's bane" is derived from its ability to create acute sensitivity to alcohol, similar to disulfiram (Antabuse). Other common names include common ink cap and inky cap. The black liquid that this mushroom releases after being picked was once used as ink. Description Measuring in diameter, the greyish or brownish-grey cap is initially bell-shaped, is furrowed, and later splits. The co
https://en.wikipedia.org/wiki/Per%20cent%20mille
A per cent mille or pcm is one one-thousandth of a percent. It can be thought of as a "milli-percent". It is commonly used in epidemiology, and in nuclear reactor engineering as a unit of reactivity. Epidemiology Statistics of crime rates, mortality and disease prevalence in a population are often given in Nuclear Reactivity In nuclear reactor engineering, a per cent mille is equal to one-thousandth of a percent of the reactivity, denoted by Greek lowercase letter rho. Reactivity is a dimensionless unit representing a departure from criticality, calculated by: where keff denotes the effective multiplication factor for the reaction. Therefore, one pcm is equal to: This unit is commonly used in the operation of light-water reactor sites because reactivity values tend to be small, so measuring in pcm allows reactivity to be expressed using whole numbers. Related units Percentage point difference of 1 part in 100 Percentage (%) 1 part in 100 Per mille (‰) 1 part in 1,000 Basis point (bp) difference of 1 part in 10,000 Permyriad (‱) 1 part in 10,000 Parts-per notation including parts-per million, parts-per billion etc See also InHour (another unit of reactivity) Dollar (reactivity) Parts-per notation Per-unit system Percent point function Notes Units of measurement
https://en.wikipedia.org/wiki/Primeval%20number
In recreational number theory, a primeval number is a natural number n for which the number of prime numbers which can be obtained by permuting some or all of its digits (in base 10) is larger than the number of primes obtainable in the same way for any smaller natural number. Primeval numbers were first described by Mike Keith. The first few primeval numbers are 1, 2, 13, 37, 107, 113, 137, 1013, 1037, 1079, 1237, 1367, 1379, 10079, 10123, 10136, 10139, 10237, 10279, 10367, 10379, 12379, 13679, ... The number of primes that can be obtained from the primeval numbers is 0, 1, 3, 4, 5, 7, 11, 14, 19, 21, 26, 29, 31, 33, 35, 41, 53, 55, 60, 64, 89, 96, 106, ... The largest number of primes that can be obtained from a primeval number with n digits is 1, 4, 11, 31, 106, 402, 1953, 10542, 64905, 362451, 2970505, ... The smallest n-digit number to achieve this number of primes is 2, 37, 137, 1379, 13679, 123479, 1234679, 12345679, 102345679, 1123456789, 10123456789, ... Primeval numbers can be composite. The first is 1037 = 17×61. A Primeval prime is a primeval number which is also a prime number: 2, 13, 37, 107, 113, 137, 1013, 1237, 1367, 10079, 10139, 12379, 13679, 100279, 100379, 123479, 1001237, 1002347, 1003679, 1012379, ... The following table shows the first seven primeval numbers with the obtainable primes and the number of them. Base 12 In base 12, the primeval numbers are: (using inverted two and three for ten and eleven, respectively) 1, 2, 13, 15, 57, 115, 117, 125, 135, 157, 1017, 1057, 1157, 1257, 125Ɛ, 157Ɛ, 167Ɛ, ... The number of primes that can be obtained from the primeval numbers is: (written in base 10) 0, 1, 2, 3, 4, 5, 6, 7, 8, 11, 12, 20, 23, 27, 29, 33, 35, ... Note that 13, 115 and 135 are composite: 13 = 3×5, 115 = 7×1Ɛ, and 135 = 5×31. See also Permutable prime Truncatable prime External links Chris Caldwell, The Prime Glossary: Primeval number at The Prime Pages Mike Keith, Integers Containing Many Embedded Primes Base-depen
https://en.wikipedia.org/wiki/Magnapinna%20sp.%20C
Magnapinna'' sp. C is an undescribed species of bigfin squid known only from a single specimen of mantle length (ML) collected in the southern Atlantic Ocean and held in the Natural History Museum. Description It is characterised by several morphological features: the proximal tentacles are more slender than arm pair IV, pigmentation is contained in the chromatophores, and "white nodules" are absent from the fins and glandular regions of the proximal tentacles. TaxonomyMagnapinna sp. C was originally illustrated in The Open Sea in 1956 and identified as Octopodoteuthopsis.
https://en.wikipedia.org/wiki/Semantic%20triple
A semantic triple, or RDF triple or simply triple, is the atomic data entity in the Resource Description Framework (RDF) data model. As its name indicates, a triple is a sequence of three entities that codifies a statement about semantic data in the form of subject–predicate–object expressions (e.g., "Bob is 35", or "Bob knows John"). Subject, predicate and object This format enables knowledge to be represented in a machine-readable way. Particularly, every part of an RDF triple is individually addressable via unique URIs—for example, the statement "Bob knows John" might be represented in RDF as: http://example.name#BobSmith12 http://xmlns.com/foaf/0.1/knows http://example.name#JohnDoe34. Given this precise representation, semantic data can be unambiguously queried and reasoned about. The components of a triple, such as the statement "The sky has the color blue", consist of a subject ("the sky"), a predicate ("has the color"), and an object ("blue"). This is similar to the classical notation of an entity–attribute–value model within object-oriented design, where this example would be expressed as an entity (sky), an attribute (color) and a value (blue). From this basic structure, triples can be composed into more complex models, by using triples as objects or subjects of other triples—for example, Mike → said → (triples → can be → objects). Given their particular, consistent structure, a collection of triples is often stored in purpose-built databases called triplestores. Difference to relational databases A relational database is the classical form for information storage, working with different tables, which consist of rows. The query language SQL is able to retrieve information from such a database. In contrast, RDF triple storage works with logical predicates. No tables nor rows are needed, but the information is stored in a text file. A RDF-triple storage can be converted into an SQL database and the other way around. If the knowledge is highly unstruc
https://en.wikipedia.org/wiki/Project%20Monterey
Project Monterey was an attempt to build a single Unix operating system that ran across a variety of 32-bit and 64-bit platforms, as well as supporting multi-processing. Announced in October 1998, several Unix vendors were involved; IBM provided POWER and PowerPC support from AIX, Santa Cruz Operation (SCO) provided IA-32 support, and Sequent added multi-processing (MP) support from their DYNIX/ptx system. Intel Corporation provided expertise and ISV development funding for porting to their upcoming IA-64 (Itanium Architecture) CPU platform, which was yet to be released at that time. The focus of the project was to create an enterprise-class UNIX for IA-64, which at the time was expected to eventually dominate the UNIX server market. By March 2001, however, "the explosion in popularity of Linux ... prompted IBM to quietly ditch" this; all involved attempted to find a niche in the rapidly developing Linux market and moved their focus away from Monterey. Sequent was acquired by IBM in 1999. In 2000, SCO's UNIX business was purchased by Caldera Systems, a Linux distributor, who later renamed themselves the SCO Group. In the same year, IBM eventually declared Monterey dead. Intel, IBM, Caldera Systems, and others had also been running a parallel effort to port Linux to IA-64, Project Trillian, which delivered workable code in February 2000. In late 2000, IBM announced a major effort to support Linux. In May 2001, the project announced the availability of a beta test version AIX-5L for IA-64, basically meeting its original primary goal. However, Intel had missed its delivery date for its first Itanium processor by two years, and the Monterey software had no market. With the exception of the IA-64 port and Dynix MP improvements, much of the Monterey effort was an attempt to standardize existing versions of Unix into a single compatible system. Such efforts had been undertaken in the past (e.g., 3DA) and had generally failed, as the companies involved were too relia
https://en.wikipedia.org/wiki/Meigu%20Guan
Meigu Guan (, also Romanized as Mei-Ko Kwan or Mei-ku Kuan, born 1934 in Shanghai) is a Chinese mathematician and one of the country's leading experts on mathematical programming. He is known for his research on the route inspection problem, and served as president of Shandong Normal University. Research contributions Guan is known for formulating the route inspection problem. This problem is a generalization of the Euler tour problem, in which the input is an edge-weighted graph and the goal is to find a closed walk of minimum total weight that visits every graph edge at least once. Its applications include transportation planning problems such as planning routes for a fleet of snowplows to plow all the streets of a city, in minimum total time. Guan worked as a lecturer at Shandong Normal University during the Great Leap Forward of 1958–1960, during which Chinese mathematicians were encouraged to work on practical problems. He published his work on the route inspection problem in 1960, and his paper was translated into English in 1962. It attracted the attention of Jack Edmonds, who gave the problem its alternative name, the "Chinese postman problem", in honor of Guan, and proved that this problem can be solved optimally in polynomial time. One of Guan's later contributions was to prove that, in contrast, the windy postman problem is NP-complete; this is a generalized version of the route inspection problem in which the cost of traversing an edge depends on the direction in which it is traversed. Academic career Guan finished his studies in 1957 at the East China Normal University in Shanghai, and in the same year joined the faculty at Shandong Normal University. He served as president of Shandong Normal University from 1984 to 1990. He then became director of the department of operations research at Fudan University from 1990 to 1995, after which he moved to the business school of the Royal Melbourne Institute of Technology in Australia. Selected publication
https://en.wikipedia.org/wiki/Grace%E2%80%93Walsh%E2%80%93Szeg%C5%91%20theorem
In mathematics, the Grace–Walsh–Szegő coincidence theorem is a result named after John Hilton Grace, Joseph L. Walsh, and Gábor Szegő. Statement Suppose ƒ(z1, ..., zn) is a polynomial with complex coefficients, and that it is symmetric, i.e. invariant under permutations of the variables, and multi-affine, i.e. affine in each variable separately. Let A be a circular region in the complex plane. If either A is convex or the degree of ƒ is n, then for every there exists such that Notes and references Theorems in complex analysis Theorems about polynomials
https://en.wikipedia.org/wiki/Lecithinase
Lecithinase is a type of phospholipase that acts upon lecithin. It can be produced by Clostridium perfringens, Staphylococcus aureus, Pseudomonas aeruginosa or Listeria monocytogenes. C. perfringens alpha toxin (lecithinase) causes myonecrosis and hemolysis. The lecithinase of S. aureus is used in detection of coagulase-positive strains, because of high link between lecithinase activity and coagulase activity.
https://en.wikipedia.org/wiki/Oscillon
In physics, an oscillon is a soliton-like phenomenon that occurs in granular and other dissipative media. Oscillons in granular media result from vertically vibrating a plate with a layer of uniform particles placed freely on top. When the sinusoidal vibrations are of the correct amplitude and frequency and the layer of sufficient thickness, a localized wave, referred to as an oscillon, can be formed by locally disturbing the particles. This meta-stable state will remain for a long time (many hundreds of thousands of oscillations) in the absence of further perturbation. An oscillon changes form with each collision of the grain layer and the plate, switching between a peak that projects above the grain layer to a crater like depression with a small rim. This self-sustaining state was named by analogy with the soliton, which is a localized wave that maintains its integrity as it moves. Whereas solitons occur as travelling waves in a fluid or as electromagnetic waves in a waveguide, oscillons may be stationary. Oscillons of opposite phase will attract over short distances and form 'bonded' pairs. Oscillons of like phase repel. Oscillons have been observed forming 'molecule' like structures and long chains. In comparison, solitons do not form bound states. Stable interacting localized waves with subharmonic response were discovered and named oscillons at The University of Texas at Austin. Solitary bursts had been reported earlier in a quasi-two-dimensional grain layer at the University of Paris, but these transient events were unstable and no bonding interaction or subharmonic response was reported. The cause of this phenomenon is currently under debate; the most likely connection is with the mathematical theory of chaos and may give insights into the way patterns in sand form. The experimental procedure is similar to that used to form Chladni figures of sand on a vibrating plate. Researchers realized that these figures say more about the vibrational modes of the
https://en.wikipedia.org/wiki/HIS-selective%20medium
HIS-selective medium is a type cell culture medium that lacks the amino acid histidine. It can be used with bacteria reliant on the expression of a gene encoding proteins involved in histidine expression in order to survive. Only bacteria expressing such genes (such as hisB in Escherichia coli and HIS3 in Saccharomyces cerevisiae) will survive on these media.
https://en.wikipedia.org/wiki/Welsh%20units
Welsh units of measurement are those in use in Wales between the Sub-Roman period (prior to which the Britons used Roman units) and the 13th-century Edwardian conquest (after which English units were imposed). Modern Wales no longer employs these units even for customary purposes but instead follows the custom as elsewhere in Britain of using a mixture of metric and Imperial units. Length In the Venedotian Code used in Gwynedd, the units of length were said to have been codified by Dyfnwal Moelmud but retained unchanged by Hywel Dda. The code provided for computing the units variously, as well as deriving them from grains of barley. In measuring milk and its legal worth (), disputes over the length of the inch used in the container were to be resolved by the width of the judge's thumb. The code notes that in some areas of Wales, the rod used to compute the Welsh acre () was not reckoned from feet but taken to be "as long as the tallest man in the [tref], with his hand above his head". 3 barleycorns ( ,  ) = 1 inch 3 inches ( ,  ) = 1 palm 3 palms ( ,  ) = 1 foot 3 feet ( ,  ,  "footlength") = 1 pace 4 feet = 1 short yoke (  or ,  ) 8 feet = 1 field yoke ( ) or second yoke ( ) 3 paces () = 1 leap 12 feet = 4 paces = 1 lateral yoke (  or ) 16 feet = 1 long yoke ( ,  ) = rod ( ,  ) 3 leaps ( ,  ) = 1 land 1000 lands ( ,  ) = 1 mile ( ,  ) Area In the Venedotian Code used in Gwynedd, the basic field unit was the Welsh acre or erw, whose legal description—its breadth as far as a man can reach in either direction with an ox-goad as long as the long yoke (16 Welsh feet) and its length "thirty times that measure"—is noted by Owen as ambiguous. He finds it more likely, however, that the "measure" to be multiplied thirty times is the width of the acre (that is, two long yokes) rather than a single long yoke. Thus, at least in theory, 2 rods × 30 rods = 1 acre ≈ 1,440 square imperial yards, or2 rods × 60 rods = 1 acre ≈ 4,320 square imperial yards 4 acres
https://en.wikipedia.org/wiki/Coastal%20Wetlands%20Planning%2C%20Protection%20and%20Restoration%20Act
The Coastal Wetlands Planning, Protection and Restoration Act (CWPPRA) was passed by Congress in 1990 to fund wetland enhancement. In cooperation with multiple government agencies, CWPPRA is moving forward to restore the lost wetlands of the Gulf Coast, as well as protecting the wetlands from future deterioration. The scope of the mission is not simply for the restoration of Louisiana's Wetlands, but also the research and implementation of preventative measures for wetlands preservation. CWPPRA is a partnership between the U.S. Army Corps of Engineers, the NOAA- National Marine Fisheries Service, the U.S. Fish and Wildlife Service, USDA Natural Resources Conservation Services, the Environmental Protection Agency, and the State of Louisiana. Introduction Like most deltaic systems, the Louisiana coast is sinking. The natural occurrence of subsidence was historically offset by new sediment from the annual overflow of the Mississippi River. With construction of the river levees, this overflow was cut off, leaving the wetlands to continue sinking with no source of renourishment. Since the early 1900s, storms and anthropogenic impacts have compounded with subsidence to cause drastic land loss in coastal Louisiana. In the 20th century, Louisiana has lost more than 1 million acres from its coast, 24 square miles annually, because of both human and natural factors that have disrupted ecological and economic stability. Billions of dollars in seafood production, oil and gas revenue, and commercial shipping will be lost without Louisiana's coastal wetlands, which provide the basis and support for these industries. In terms of human life, the value of these wetlands is beyond estimation. Healthy marsh provides a buffer against storms, and its ability to absorb high water and slow wind is key to survival for coastal communities. As land is lost, hurricanes and tropical storms hit shore ever closer to the two million people who live near the coast. Every year as wetlands lo
https://en.wikipedia.org/wiki/Barbara%20Keeley
Barbara Mary Keeley (born 26 March 1952) is a British Labour Party politician who has served as the Member of Parliament (MP) for Worsley and Eccles South, previously Worsley, since 2005. A member of the Labour Party, she has served as Shadow Minister for Music and Tourism since 2023. She previously served as Deputy Leader of the House of Commons from 2009 to 2010 and served in Jeremy Corbyn’s Shadow Cabinet as Shadow Minister for Mental Health and Social Care from 2016 to 2020. Early life Keeley was educated at Mount St Mary's College in Leeds and the University of Salford, gaining a BA in Politics and Contemporary History. Her early career was with IBM, first as a Systems Engineer and then as a Field Systems Engineering Manager. Later she became an independent consultant, working on community regeneration issues across North West England. She was elected as a Labour councillor on Trafford Council in 1995 on which Keeley served as a member for Priory ward until 2004. She was Cabinet member for Children and Young People, Early Years and Childcare and Health and Wellbeing. From 2002 to 2004, she was Cabinet member for Education, Children's Social Services and all services for children and young people and Director of a Pathfinder Children's Trust. She is a member of the GMB Union, the Co-operative Party and the Fabian Society. From 2002 to 2005, she worked as a consultant to the charity, the Princess Royal Trust for Carers, researching carers' issues — particularly those related to primary health care. She is co-author of the reports Carers Speak Out and Primary Carers. Parliamentary career In the House of Commons, Keeley served as a member of the Constitutional Affairs Select committee and from February 2006, the Finance and Services Committee. On 8 February 2006, she was appointed as Parliamentary Private Secretary (PPS) to the Cabinet Office, working with the Cabinet Office Minister, Jim Murphy MP. In June 2006, she moved to be PPS to Jim Murphy as Minister o
https://en.wikipedia.org/wiki/MacVector
MacVector is a commercial sequence analysis application for Apple Macintosh computers running Mac OS X. It is intended to be used by molecular biologists to help analyze, design, research and document their experiments in the laboratory. MacVector 18.1 is a Universal Binary capable of running on Intel and Apple Silicon Macs. Features MacVector is a collection of sequence analysis algorithms linked to various sequence editors, including a single sequence editor, a multiple sequence alignment editor and a contig editor. MacVector tries to use a minimum of windows and steps to access all the functionality. Functions include: Sequence alignment (ClustalW, Muscle and T-Coffee) and editing. Subsequence search and open reading frames (ORFs) analysis. Phylogenetic tree construction UPGMA, Neighbour joining with bootstrapping and consensus trees Online Database searching - Search public databases at the NCBI such as Genbank, PubMed, and UniProt. Perform online BLAST searches. Protein analysis. Contig assembly and chromatogram editing Aligning cDNA against genomic templates Creating dot plots of DNA to DNA, Protein to Protein and DNA to protein. Restriction analysis - find and view restriction cut sites. Uses digested fragments to clone genes into vectors. Stores a history of digested fragments allowing multi fragment ligations. PCR Primer design - easy primer design and testing. Also uses primer3 Agarose Gel simulation. CRISPR INDEL analysis. MacVector has a contig assembly plugin called Assembler that uses phred, phrap, Bowtie, SPAdes, Velvet and cross match. As of version 13.0.1 MacVector uses Sparkle for updating between releases. History MacVector was originally developed by IBI in 1994. It was acquired by Kodak, and subsequently Oxford Molecular in 1996. Oxford Molecular was merged into Accelrys in 2001. It was acquired by MacVector, Inc on 1 January 2007.
https://en.wikipedia.org/wiki/Computer-mediated%20communication
Computer-mediated communication (CMC) is defined as any human communication that occurs through the use of two or more electronic devices. While the term has traditionally referred to those communications that occur via computer-mediated formats (e.g., instant messaging, email, chat rooms, online forums, social network services), it has also been applied to other forms of text-based interaction such as text messaging. Research on CMC focuses largely on the social effects of different computer-supported communication technologies. Many recent studies involve Internet-based social networking supported by social software. Forms Computer-mediated communication can be broken down into two forms: synchronous and asynchronous. Synchronous computer-mediated communication refers to communication that occurs in real-time. All parties are engaged in the communication simultaneously; however, they are not necessarily all in the same location. Examples of synchronous communication are video chats and FaceTime audio calls. On the contrary, asynchronous computer-mediated communication refers to communication that takes place when the parties engaged are not communicating in unison. In other words, the sender does not receive an immediate response from the receiver. Most forms of computer-mediated technology are asynchronous. Examples of asynchronous communication are text messages and emails. Scope Scholars from a variety of fields study phenomena that can be described under the umbrella term of computer-mediated communication (CMC) (see also Internet studies). For example, many take a sociopsychological approach to CMC by examining how humans use "computers" (or digital media) to manage interpersonal interaction, form impressions and maintain relationships. These studies have often focused on the differences between online and offline interactions, though contemporary research is moving towards the view that CMC should be studied as embedded in everyday life. Another branc
https://en.wikipedia.org/wiki/Combinatorial%20ablation%20and%20immunotherapy
Combinatorial ablation and immunotherapy is an oncological treatment that combines various tumor-ablation techniques with immunotherapy treatment. Combining ablation therapy of tumors with immunotherapy enhances the immunostimulating response and has synergistic effects for curative metastatic cancer treatment. Various ablative techniques are utilized including cryoablation, radiofrequency ablation, laser ablation, photodynamic ablation, stereotactic radiation therapy, alpha-emitting radiation therapy, hyperthermia therapy, HIFU. Thus, combinatorial ablation of tumors and immunotherapy is a way of achieving an autologous, in-vivo tumor lysate vaccine and treating metastatic disease. Mechanism of action Take magnetic hyperthermia for example. By applying magnetic nanoparticle-mediated hyperthermia with a threshold of 43 °C in order not to damage surrounding normal tissues, a significant quantity of heat-shock proteins (HSP) is expressed within and around the tumor tissues, inducing tumor-specific immune responses. In vivo experiments have indicated that magnetic nanoparticle-mediated hyperthermia can induce the regression of not only a local tumor tissue exposed to heat, but also distant metastatic tumors unexposed to heat. Partially or entirely ablating primary or secondary metastatic tumors induces necrosis of tumor cells, resulting in the release of antigens and presentation of antigens to the immune system. The released tumor antigens help activate anti-tumor T cells, which can destroy remaining malignant cells in local and distant tumors. Combining immunotherapy (ie: checkpoint inhibitors, CAR-T cell therapy) and vaccine adjuvants (ie: interferon, saponin) with ablation synergizes the immune reaction, and can treat metastatic disease with curative intent. Ablation therapies Various local ablation therapies exist to induce necrosis of tumor cells and release tumor antigens to stimulate an immunological response. These ablation therapies can be combined with a
https://en.wikipedia.org/wiki/Acoustic%20foam
Acoustic foam is an open celled foam used for acoustic treatment. It attenuates airbone sound waves, reducing their amplitude, for the purposes of noise reduction or noise control. The energy is dissipated as heat. Acoustic foam can be made in several different colors, sizes and thickness. Acoustic foam can be attached to walls, ceilings, doors, and other features of a room to control noise levels, vibration, and echoes. Many acoustic foam products are treated with dyes and/or fire retardants. Uses The objective of acoustic foam is to improve or change a room's sound qualities by controlling residual sound through absorption. This purpose requires strategic placement of acoustic foam panels on walls, ceilings, floors and other surfaces. Proper placement can help effectively manage resonance within the room and help give the room the desired sonic qualities. Acoustic enhancement The objective of acoustic foam is to enhance the sonic properties of a room by effectively managing unwanted reverberations. For this reason, acoustic foam is often used in restaurants, performance spaces, and recording studios. Acoustic foam is also often installed in large rooms with large, reverberative surfaces like gymnasiums, churches, synagogues, theaters, and concert halls where excess reverberation is prone to arise. The purpose is to reduce, but not entirely eliminate, resonance within the room. In unmanaged spaces without acoustic foam or similar sound absorbing materials, sound waves reflect off of surfaces and continue to bounce around in the room. When a wave encounters a change in acoustic impedance, such as hitting a solid surface, acoustic reflections transpire. These reflections will occur many times before the wave becomes inaudible. Reflections can cause acoustic problems such as phase summation and phase cancellation. A new complex wave originates when the direct source wave coincides with the reflected waves. This complex wave will change the frequency response of
https://en.wikipedia.org/wiki/Internet%20real-name%20system%20in%20China
The Internet real-name system in China is a real-name system in which Internet service providers and Internet content providers (especially user-generated content sites) in the People's Republic of China are required to collect users' real names, ID numbers, and other information when providing services. Since the implementation of the real-name system on the Internet may lead to the infringement and narrowing of the constitutionally protected speech space of Internet users, it has attracted concerns from all sides and generated much controversy in Chinese society. Only a few countries in the world, such as South Korea, have implemented a real-name system on the Internet. History Proposal to ban anonymity in civil society The origin of the proposed ban on anonymity in mainland China is generally believed to be the proposal made by Li Xiguang, a journalism professor at Tsinghua University, in 2002, when he talked about journalism reform in the South, that "the Chinese National People's Congress should ban anyone from being anonymous online". He argued that the Internet should be strictly protected by copyright and intellectual property rights, and that "at the same time, online writing should be legally responsible," and that "including traditional media, we should promote the use of real names, not pseudonyms... publishing under pseudonyms is irresponsible to the public. ". His remarks caused an uproar on the Internet and became known as the "Li Xiguang incident". Although there was a period of heated debate, no corresponding measures were subsequently introduced and the matter was left unresolved. Afterwards, Li Xiguang himself said that he had lost interest in the topic of real names on the Internet, and that "banning online anonymity is very unrealistic and not legally or technically feasible." The Chinese government's implementation of an online real-name system In 2012, the Standing Committee of the National People's Congress (NPC) of China adopted the Deci
https://en.wikipedia.org/wiki/PC-1%20%28computer%29
The Parametron Computer 1 (PC-1) was a binary, single-address computer developed at Professor Hidetosi Takahasi's Laboratory at the Department of Physics, University of Tokyo, and was one of the first general purpose computers that used parametron components and dual frequency magnetic-core memory. Construction started in September 1957 and was completed on March 26, 1958. The PC-1 was used at Takahasi's Laboratory for research related both to hardware and software and the researchers in the Faculty of Science also used it for scientific computing. The PC-1 was retired in May 1964. The arithmetic and control circuits of the PC–1 consisted of 4200 parametrons. Binary numbers were coded using the two's complement representation; a short number was coded using 18 bits and a long one using 36. The single-address instructions were 18 bits long and there were about 20 of them. The memory consisted of 512 short words. The clock frequency was 15 kHz. One addition or subtraction required 4 clock cycles; one multiplication 26 cycles for a short multiplier, or 44 cycles for a long multiplier. Division consumed 161 cycles and a store operation 8. The power consumption was 3 kW and the floor area required was 8 square meters. The input was done using a photoelectric paper tape reader; the output was provided by a teletype.
https://en.wikipedia.org/wiki/Illegitimate%20receiver
An illegitimate receiver is an organism that intercepts another organism's signal, despite not being the signaler's intended target. In animal communication, a signal is any transfer of information from one organism to another, including visual, olfactory (e.g. pheromones), and auditory signals. If the illegitimate receiver's interception of the signal is a means of finding prey, the interception is typically a fitness detriment (meaning that it reduces survival or reproductive ability) to either the signaler or the organism meant to legitimately receive the signal, but it is a fitness advantage to the illegitimate receiver because it provides energy in the form of food. Illegitimate receivers can have important effects on the evolution of communication behaviors. Fitness Benefits and Costs Fitness Benefits Illegitimate receivers can benefit by intercepting signals to locate prey, or, if they are parasites or parasitoids, by intercepting signals to locate host organisms. In addition to locating prey by intercepting signals given by the prey organism, some animals use the signals of other predators to find carcasses that they can scavenge off of. Other organisms benefit by illegitimately receiving the signals of rivals and using this information to improve their own chances of winning in competition for resources, including mates. Fitness Costs Illegitimate receivers can experience fitness costs if they respond to signals given off by illegitimate signalers, which are organisms that utilize deceptive signals to reduce receiver fitness, typically by preying on or parasitizing the organism that responds. Illegitimate receivers may also experience fitness costs if intercepting signals not intended for them reduces their likelihood of receiving signals that are directed at them, such as the mating calls of members of their own species or the warning calls of rivals. Examples Redeye bass (Micropterus coosae) and midland water snakes (Nerodia sipedon pleuralis) r
https://en.wikipedia.org/wiki/Marjorie%20Guthrie
Marjorie Guthrie ( Greenblatt; October 6, 1917 – March 13, 1983), who used Marjorie Mazia as her professional name, was a dancer, dance teacher, and health science activist. She was married to folk musician Woody Guthrie. Her children with him include folk musician Arlo Guthrie and Woody Guthrie Publications president Nora Guthrie. She was a principal dancer with the Martha Graham Company. With Graham's permission, she started her own dance studio where she taught Graham methods and style. Due to her husband's affliction with Huntington's disease, she became an activist, founding a predecessor of the Huntington's Disease Society of America. Life and work Marjorie Greenblatt () was born in Atlantic City, New Jersey, United States, on October 6, 1917 to Aliza Waitzman and Izadore Greenblatt. Her parents were Jewish immigrants from Ukraine. She had three brothers - David, Herbert and Bernard - and one sister, Gertrude. In 1935, after graduation from the Overbrook High School in Philadelphia, Pennsylvania, Marjorie moved to New York City on scholarship and joined the Martha Graham Dance Company. As a core company member, Marjorie appeared in such iconic pieces as "Primitive Mysteries", "American Document", "Every Soul is a Circus", and "Appalachian Spring". She grew to become Graham's assistant for fifteen years and was the first company member invited to teach the Graham technique independently of Martha's own school. Two of Marjorie's early students were Erick Hawkins and Merce Cunningham. Woody Guthrie Mazia was introduced to Guthrie in 1940 through her activity as a Martha Graham dancer. According to the Marjorie Guthrie Project: Mazia and Guthrie wed on November 13, 1945. Together they had four children; Cathy Guthrie (1943-1947), Arlo Guthrie (b. 1947), Joady Guthrie (b. 1948), and Nora Guthrie (1950). Cathy tragically died at age four in a fire. Majorie Mazia School of Dance Mazia founded the Marjorie Mazia School of Dance, located at 1618 Sheepshea
https://en.wikipedia.org/wiki/Botanical%20nomenclature
Botanical nomenclature is the formal, scientific naming of plants. It is related to, but distinct from taxonomy. Plant taxonomy is concerned with grouping and classifying plants; botanical nomenclature then provides names for the results of this process. The starting point for modern botanical nomenclature is Linnaeus' Species Plantarum of 1753. Botanical nomenclature is governed by the International Code of Nomenclature for algae, fungi, and plants (ICN), which replaces the International Code of Botanical Nomenclature (ICBN). Fossil plants are also covered by the code of nomenclature. Within the limits set by that code there is another set of rules, the International Code of Nomenclature for Cultivated Plants (ICNCP) which applies to plant cultivars that have been deliberately altered or selected by humans (see cultigen). Botanical nomenclature is independent of other systems of nomenclature, for example zoological nomenclature. This implies that animals can have the same generic names as plants (e.g. there is a genus Iris in plants and a genus Iris in animals). History and scope Botanical nomenclature has a long history, going back beyond the period when Latin was the scientific language throughout Europe, to Theophrastus (c. 370–287 BC), Dioscorides (c. 40 – 90 AD) and other Greek writers. Many of these works have come down to us in Latin translations. The principal Latin writer on botany was Pliny the Elder (23–79 AD). From Mediaeval times, Latin became the universal scientific language (lingua franca) in Europe. Most written plant knowledge was the property of monks, particularly Benedictine, and the purpose of those early herbals was primarily medicinal rather than plant science per se. It would require the invention of the printing press (1450) to make such information more widely available. Leonhart Fuchs, a German physician and botanist, is often considered the originator of Latin names for the rapidly increasing number of plants known to science. For
https://en.wikipedia.org/wiki/Desulfovibrio%20alkalitolerans
Desulfovibrio alkalitolerans is an alkalitolerant and sulphate-reducing bacterium from the genus of Desulfovibrio which has been isolated from a district heating plant in Skanderborg in Denmark.
https://en.wikipedia.org/wiki/HspQ%20protein%20domain
In molecular biology, YccV protein domain is also, alternatively named, Heat shock protein HspQ. This entry describes the small protein from Escherichia coli YccV and its homologs in other Pseudomonadota. YccV is now described as a hemimethylated DNA binding protein. The model entry describes a protein domain in longer eukaryotic proteins. Function HspQ is involved in the degradation of certain denaturated proteins, including DnaA, during Heat shock stress. HspQ (YccV like protein domain) is a hemimethylated DNA-binding protein. It has been thought to negatively regulate dnaA gene expression when its promoter region is either methylated or hemimethylated. This could occurs through binding of YccV itself to fully or hemimethylated DNA. In addition, studies have identified the yccV gene as one of three insertion sites in mini-Tn10 which suppress dnaA46 thermosensitivity. Structure This protein domain is thought to have a SH3-like barrel structure. Additionally, the structure of a hypothetical protein in this family has been solved and it forms a beta sheet structure with a terminating alpha helix. HspQ forms a stable homodimer in solution and can form homomultimers consisting of about four monomers. The theoretical molecular mass of the HspQ protein were calculated to be 11.8 kDa. It is putatively thought that HspQ requires a cofactor to form a functional hetero-oligomeric complex.
https://en.wikipedia.org/wiki/Minimal%20ideal
In the branch of abstract algebra known as ring theory, a minimal right ideal of a ring R is a non-zero right ideal which contains no other non-zero right ideal. Likewise, a minimal left ideal is a non-zero left ideal of R containing no other non-zero left ideals of R, and a minimal ideal of R is a non-zero ideal containing no other non-zero two-sided ideal of R . In other words, minimal right ideals are minimal elements of the partially ordered set (poset) of non-zero right ideals of R ordered by inclusion. The reader is cautioned that outside of this context, some posets of ideals may admit the zero ideal, and so the zero ideal could potentially be a minimal element in that poset. This is the case for the poset of prime ideals of a ring, which may include the zero ideal as a minimal prime ideal. Definition The definition of a minimal right ideal N of a ring R is equivalent to the following conditions: N is non-zero and if K is a right ideal of R with , then either or . N is a simple right R-module. Minimal ideals are the dual notion to maximal ideals. Properties Many standard facts on minimal ideals can be found in standard texts such as , , , and . In a ring with unity, maximal right ideals always exist. In contrast, minimal right, left, or two-sided ideals in a ring with unity need not exist. The right socle of a ring is an important structure defined in terms of the minimal right ideals of R. Rings for which every right ideal contains a minimal right ideal are exactly the rings with an essential right socle. Any right Artinian ring or right Kasch ring has a minimal right ideal. Domains that are not division rings have no minimal right ideals. In rings with unity, minimal right ideals are necessarily principal right ideals, because for any nonzero x in a minimal right ideal N, the set xR is a nonzero right ideal of R inside N, and so . Brauer's lemma: Any minimal right ideal N in a ring R satisfies or for some idempotent element e of R . If N1
https://en.wikipedia.org/wiki/Milnacipran
Milnacipran (trade names Ixel, Savella, Dalcipran, Toledomin) is a serotonin–norepinephrine reuptake inhibitor (SNRI) used in the clinical treatment of fibromyalgia. It is not approved for the clinical treatment of major depressive disorder in the US, but it is in other countries. Medical uses Depression In a pooled analysis of 7 comparative trials with imipramine, milnacipran and imipramine were shown to have comparable efficacy while milnacipran was significantly better tolerated. A pooled analysis of studies comparing milnacipran and SSRIs concluded a superior efficacy for milnacipran with similar tolerability for milnacipran and SSRIs. A more recent meta-analysis of 6 studies involving more than 1,000 patients showed no distinction between milnacipran and SSRIs in efficacy or discontinuation rates, including discontinuation for side effects or lack of efficacy. A meta-analysis of a total of 16 randomized controlled trials with more than 2200 patients concluded that there were no statistically significant differences in efficacy, acceptability and tolerability when comparing milnacipran with other antidepressant agents. However, compared with TCAs, significantly fewer patients taking milnacipran dropped out due to adverse events. As with other antidepressants, 1 to 3 weeks may elapse before significant antidepressant action becomes clinically evident. Fibromyalgia During its development for fibromyalgia, milnacipran was evaluated utilizing a composite responder approach. To be considered as a responder for the composite ‘treatment of fibromyalgia’ endpoint, each patient had to show concurrent and clinically meaningful improvements in pain, physical function, and global impression of disease status. A systematic review in 2015 showed moderate relief for a minority of people with fibromyalgia. Milnacipran was associated with increased adverse events when discontinuing use of the drug. Social anxiety There is some evidence that milnacipran may be effective for
https://en.wikipedia.org/wiki/Goldschmidt%20classification
The Goldschmidt classification, developed by Victor Goldschmidt (1888–1947), is a geochemical classification which groups the chemical elements within the Earth according to their preferred host phases into lithophile (rock-loving), siderophile (iron-loving), chalcophile (sulfide ore-loving or chalcogen-loving), and atmophile (gas-loving) or volatile (the element, or a compound in which it occurs, is liquid or gaseous at ambient surface conditions). Some elements have affinities to more than one phase. The main affinity is given in the table below and a discussion of each group follows that table. Lithophile elements Lithophile elements are those that remain on or close to the surface because they combine readily with oxygen, forming compounds that do not sink into the Earth's core. The lithophile elements include: Al, B, Ba, Be, Br, Ca, Cl, Cr, Cs, F, I, Hf, K, Li, Mg, Na, Nb, O, P, Rb, Sc, Si, Sr, Ta, Th, Ti, U, V, Y, Zr, W and the lanthanides or rare earth elements (REE). Lithophile elements mainly consist of the highly reactive metals of the s- and f-blocks. They also include a small number of reactive nonmetals, and the more reactive metals of the d-block such as titanium, zirconium and vanadium. Lithophile derives from "lithos" which means "rock", and "phileo" which means "love". Most lithophile elements form very stable ions with an electron configuration of a noble gas (sometimes with additional f-electrons). The few that do not, such as silicon, phosphorus and boron, form extremely strong covalent bonds with oxygen – often involving pi bonding. Their strong affinity for oxygen causes lithophile elements to associate very strongly with silica, forming relatively low-density minerals that thus float to the Earth's crust. The more soluble minerals formed by the alkali metals tend to concentrate in seawater or extremely arid regions where they can crystallise. The less soluble lithophile elements are concentrated on ancient continental shields where all so
https://en.wikipedia.org/wiki/Hardware%20keylogger
Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords. They can be implemented via BIOS-level firmware, or alternatively, via a device plugged inline between a computer keyboard and a computer. They log all keyboard activity to their internal memory. Description Hardware keyloggers have an advantage over software keyloggers as they can begin logging from the moment a computer is turned on (and are therefore able to intercept passwords for the BIOS or disk encryption software). All hardware keylogger devices have to have the following: A microcontroller - this interprets the datastream between the keyboard and computer, processes it, and passes it to the non-volatile memory A non-volatile memory device, such as flash memory - this stores the recorded data, retaining it even when power is lost Generally, recorded data is retrieved by typing a special password into a computer text editor. The hardware keylogger plugged in between the keyboard and computer detects that the password has been typed and then presents the computer with "typed" data to produce a menu. Beyond text menu some keyloggers offer a high-speed download to speed up retrieval of stored data; this can be via USB mass-storage enumeration or with a USB or serial download adapter. Typically the memory capacity of a hardware keylogger may range from a few kilobytes to several gigabytes, with each keystroke recorded typically consuming a byte of memory. Types of hardware keyloggers A regular hardware keylogger is used for keystroke logging by means of a hardware circuit that is attached somewhere in between the computer keyboard and the computer. It logs all keyboard activity to its internal memory which can be accessed by typing in a series of pre-defined characters. A hardware keylogger has an advantage over a software solution; because it is not dependent on the computer's operating system it will not i
https://en.wikipedia.org/wiki/Fexinidazole
Fexinidazole is a medication used to treat African trypanosomiasis (sleeping sickness) caused by Trypanosoma brucei gambiense. It is effective against both first and second stage disease. Also a potential new treatment for Chagas disease, a neglected tropical disease that affects millions of people worldwide. It is taken by mouth. Common side effects include nausea, vomiting, headache, and trouble sleeping. Other side effects may include QT prolongation, psychosis, and low white blood cells. It is unclear if use during pregnancy or breast feeding is safe. Fexinidazole is in the antiparasitic and the nitroimidazole family of medications. It is believed to work by turning on certain enzymes within the parasites that result in their death. Fexinidazole was first described in 1978. It was given a positive opinion by the European Medicines Agency in 2018. It is on the World Health Organization's List of Essential Medicines. Development for sleeping sickness was funded by the Drugs for Neglected Diseases initiative in collaboration with Sanofi. Fexinidazole was approved for medical use in the United States in July 2021. Medical use Sleeping sickness A trial in Africa found fexinidazole to be 91% effective at treating sleeping sickness. Though less effective than nifurtimox with eflornithine in severe disease, fexinidazole has the benefit that it can be taken by mouth. Fexinidazole is the first drug candidate for the treatment of advanced-stage sleeping sickness in thirty years. Efficacy and safety In cell culture, fexinidazole has an IC50 of around 1–4μM against Trypanosoma brucei. In the mouse model, fexinidazole cures both the first, haemolymphatic, and the second, meningoencephalitic stage of the infection, the latter at 100 mg/kg twice daily for 5 days. In patients, the clinical trials managed by DNDi and supported by Swiss TPH mainly conducted in the Democratic Republic of the Congo demonstrated that oral fexinidazole is safe and effective for use against first
https://en.wikipedia.org/wiki/Green%20fluorescent%20protein
The green fluorescent protein (GFP) is a protein that exhibits bright green fluorescence when exposed to light in the blue to ultraviolet range. The label GFP traditionally refers to the protein first isolated from the jellyfish Aequorea victoria and is sometimes called avGFP. However, GFPs have been found in other organisms including corals, sea anemones, zoanithids, copepods and lancelets. The GFP from A. victoria has a major excitation peak at a wavelength of 395 nm and a minor one at 475 nm. Its emission peak is at 509 nm, which is in the lower green portion of the visible spectrum. The fluorescence quantum yield (QY) of GFP is 0.79. The GFP from the sea pansy (Renilla reniformis) has a single major excitation peak at 498 nm. GFP makes for an excellent tool in many forms of biology due to its ability to form an internal chromophore without requiring any accessory cofactors, gene products, or enzymes / substrates other than molecular oxygen. In cell and molecular biology, the GFP gene is frequently used as a reporter of expression. It has been used in modified forms to make biosensors, and many animals have been created that express GFP, which demonstrates a proof of concept that a gene can be expressed throughout a given organism, in selected organs, or in cells of interest. GFP can be introduced into animals or other species through transgenic techniques, and maintained in their genome and that of their offspring. To date, GFP has been expressed in many species, including bacteria, yeasts, fungi, fish and mammals, including in human cells. Scientists Roger Y. Tsien, Osamu Shimomura, and Martin Chalfie were awarded the 2008 Nobel Prize in Chemistry on 10 October 2008 for their discovery and development of the green fluorescent protein. Most commercially available genes for GFP and similar fluorescent proteins are around 730 base-pairs long. The natural protein has 238 amino acids. Its molecular mass is 27 kD. Therefore, fusing the GFP gene to the gene of a
https://en.wikipedia.org/wiki/SQL%20Server%20Notification%20Services
SQL Server Notification Services is a platform developed by Microsoft for the development and deployment of notification applications based on SQL Server technology and the Microsoft .NET Framework. Notification Services offers a scalable server engine on which to run notification applications, with multi-server capability-providing flexibility and scalability for deploying applications. Notification Services was designed to ease the pain of developing and deploying notification applications that generate personalized, timely information to subscribers. To design, code and test all of the components that make up a robust Notification Services Application-such as notification scheduling, failure detection, retry logic, time zone management, notification grouping, and queue management, adding Notification Services to software applications can be a daunting task. Background Over the years the term Notification applications has been superseded with the term Complex Event Processing (CEP). The idea is that the user defines a set of Rules (or Queries) in advance, and then push data through those rules. Should the data fit any of the criteria of the Rules then some action is fired. For example: A rule may state "If car speed through sensor is above 100 km/h, take photo and record" otherwise all other data is discarded. This approach is much faster than the traditional OLTP design of; Insert the row(s) into the database while constantly polling the data to see if something relevant has happened. It is especially suited to situations where you have high speed inputs, a fixed set of fairly simple queries and may not need to keep all the data. e.g.: Some industries measure the voltage, current and other attributes of hundreds of electric motors in their conveyor belts, 100 times each second. Then compare each measurement to its average, plant operators are alerted should a sudden change occur. Release history SQL Server Notification Services was one of the many component
https://en.wikipedia.org/wiki/Charge%20pump
A charge pump is a kind of DC-to-DC converter that uses capacitors for energetic charge storage to raise or lower voltage. Charge-pump circuits are capable of high efficiencies, sometimes as high as 90–95%, while being electrically simple circuits. Description Charge pumps use some form of switching device to control the connection of a supply voltage across a load through a capacitor. In a two stage cycle, in the first stage a capacitor is connected across the supply, charging it to that same voltage. In the second stage the circuit is reconfigured so that the capacitor is in series with the supply and the load. This doubles the voltage across the load - the sum of the original supply and the capacitor voltages. The pulsing nature of the higher voltage switched output is often smoothed by the use of an output capacitor. An external or secondary circuit drives the switching, typically at tens of kilohertz up to several megahertz. The high frequency minimizes the amount of capacitance required, as less charge needs to be stored and dumped in a shorter cycle. Charge pumps can double voltages, triple voltages, halve voltages, invert voltages, fractionally multiply or scale voltages (such as ×, ×, ×, etc.) and generate arbitrary voltages by quickly alternating between modes, depending on the controller and circuit topology. They are commonly used in low-power electronics (such as mobile phones) to raise and lower voltages for different parts of the circuitry - minimizing power consumption by controlling supply voltages carefully. Terminology for PLL The term charge pump is also commonly used in phase-locked loop (PLL) circuits even though there is no pumping action involved unlike in the circuit discussed above. A PLL charge pump is merely a bipolar switched current source. This means that it can output positive and negative current pulses into the loop filter of the PLL. It cannot produce higher or lower voltages than its power and ground supply levels. Applica
https://en.wikipedia.org/wiki/Blind%20bill%20folding
In the United States, some blind or otherwise visually-impaired people fold dollar bills in specific ways so that they can identify the denominations of the bills by feel. Though some people have their own idiosyncratic systems, there is a method recommended by the American Foundation for the Blind: Leave $1 bills unfolded. Fold $5 bills lengthwise. Fold $10 bills by width. Fold $20 bills lengthwise and then by width. Or you can fold them just lengthwise and put them in a separate section of your wallet. Unlike the banknotes of most countries, all denominations of United States paper money are the same size, preventing the visually impaired from identifying bills by feel. This alleged lack of access for the blind led to a 2002 court case, American Council of the Blind v. Paulson. In 2006, U.S. District Judge James Robertson ruled that the American bills gave an undue burden to the blind and denied them "meaningful access" to the U.S. currency system. Robertson accepted the plaintiff's argument that current practice violates Section 504 of the 1973 Rehabilitation Act. As a result of the court's injunction, the Bureau of Engraving and Printing is planning to implement a raised tactile feature in the next redesign of each note, except the $1 (which it is by law not allowed to redesign).
https://en.wikipedia.org/wiki/Data%20literacy
Data literacy is the ability to read, understand, create, and communicate data as information. Much like literacy as a general concept, data literacy focuses on the competencies involved in working with data. It is, however, not similar to the ability to read text since it requires certain skills involving reading and understanding data. Background As data collection and data sharing become routine and data analysis and big data become common ideas in the news, business, government and society, it becomes more and more important for students, citizens, and readers to have some data literacy. The concept is associated with data science, which is concerned with data analysis, usually through automated means, and the interpretation and application of the results. Data literacy is distinguished from statistical literacy since it involves understanding what data means, including the ability to read graphs and charts as well as draw conclusions from data. Statistical literacy, on the other hand, refers to the "ability to read and interpret summary statistics in everyday media" such as graphs, tables, statements, surveys, and studies. Role of libraries and librarians As guides for finding and using information, librarians lead workshops on data literacy for students and researchers, and also work on developing their own data literacy skills. A set of core competencies and contents that can be used as an adaptable common framework of reference in library instructional programs across institutions and disciplines has been proposed. Resources created by librarians include MIT's Data Management and Publishing tutorial, the EDINA Research Data Management Training (MANTRA), the University of Edinburgh's Data Library and the University of Minnesota libraries' Data Management Course for Structural Engineers. See also Information literacies Information literacy Media literacy Numeracy Statistical literacy Transliteracy
https://en.wikipedia.org/wiki/Trevor%20Philips
Trevor Philips is a character and one of the three playable protagonists, alongside Michael De Santa and Franklin Clinton, of Grand Theft Auto V, the seventh main title in the Grand Theft Auto series developed by Rockstar North and published by Rockstar Games. He also appears in the game's multiplayer component, Grand Theft Auto Online. A career criminal and former bank robber, Trevor leads his own organisation, Trevor Philips Enterprises, and comes into conflict with various rival gangs and criminal syndicates as he attempts to secure control of the drugs and weapons trade in the fictional Blaine County, San Andreas. He is portrayed by Canadian actor Steven Ogg, who provided the voice and motion capture for the character. Rockstar based Trevor's appearance on Ogg's physical appearance, while his personality was inspired by Charles Bronson. Grand Theft Auto V co-writer Dan Houser described Trevor as purely driven by desire and resentment. To make players care for the character, the designers gave the character more emotions. Trevor is shown to care about people very close to him, despite his antisocial behavior and psychotic derangement. Trevor is considered one of the most controversial characters in video game history. The general attention given to Trevor by critics was mostly very positive, although some reviewers felt that his violent personality and actions negatively affected the game's narrative. His design and personality have drawn comparisons to other influential video game and film characters. Many reviewers have called Trevor a likeable and believable character, and felt that he is one of the few protagonists in the Grand Theft Auto series that would willingly execute popular player actions, such as murder and violence. Character design Grand Theft Auto V co-writer Dan Houser explained that Trevor "appeared to pretty much out of nowhere as the embodiment of another side of criminality [...] If Michael was meant to be the idea of some version of cr
https://en.wikipedia.org/wiki/3-j%20symbol
In quantum mechanics, the Wigner 3-j symbols, also called 3-jm symbols, are an alternative to Clebsch–Gordan coefficients for the purpose of adding angular momenta. While the two approaches address exactly the same physical problem, the 3-j symbols do so more symmetrically. Mathematical relation to Clebsch–Gordan coefficients The 3-j symbols are given in terms of the Clebsch–Gordan coefficients by The j and m components are angular-momentum quantum numbers, i.e., every (and every corresponding ) is either a nonnegative integer or half-odd-integer. The exponent of the sign factor is always an integer, so it remains the same when transposed to the left, and the inverse relation follows upon making the substitution : Explicit expression where is the Kronecker delta. The summation is performed over those integer values for which the argument of each factorial in the denominator is non-negative, i.e. summation limits and are taken equal: the lower one the upper one Factorials of negative numbers are conventionally taken equal to zero, so that the values of the 3j symbol at, for example, or are automatically set to zero. Definitional relation to Clebsch–Gordan coefficients The CG coefficients are defined so as to express the addition of two angular momenta in terms of a third: The 3-j symbols, on the other hand, are the coefficients with which three angular momenta must be added so that the resultant is zero: Here is the zero-angular-momentum state (). It is apparent that the 3-j symbol treats all three angular momenta involved in the addition problem on an equal footing and is therefore more symmetrical than the CG coefficient. Since the state is unchanged by rotation, one also says that the contraction of the product of three rotational states with a 3-j symbol is invariant under rotations. Selection rules The Wigner 3-j symbol is zero unless all these conditions are satisfied: Symmetry properties A 3-j symbol is invariant under an even pe
https://en.wikipedia.org/wiki/Peroxide%20value
Detection of peroxide gives the initial evidence of rancidity in unsaturated fats and oils. Other methods are available, but peroxide value is the most widely used. It gives a measure of the extent to which an oil sample has undergone primary oxidation; extent of secondary oxidation may be determined from p-anisidine test. The double bonds found in fats and oils play a role in autoxidation. Oils with a high degree of unsaturation are most susceptible to autoxidation. The best test for autoxidation (oxidative rancidity) is determination of the peroxide value. Peroxides are intermediates in the autoxidation reaction. Autoxidation is a free radical reaction involving oxygen that leads to deterioration of fats and oils which form off-flavours and off-odours. Peroxide value, concentration of peroxide in an oil or fat, is useful for assessing the extent to which spoilage has advanced. Definition The peroxide value is defined as the amount of peroxide oxygen per 1 kilogram of fat or oil. Traditionally this was expressed in units of milliequivalents, although in SI units the appropriate option would be in millimoles per kilogram (N.B. 1 milliequivalents = 0.5 millimole; because 1 mEq of O2 =1 mmol/2=0.5 mmol of O2, where 2 is valence). The unit of milliequivalent has been commonly abbreviated as mequiv or even as meq. Method The peroxide value is determined by measuring the amount of iodine which is formed by the reaction of peroxides (formed in fat or oil) with iodide ion. 2 I- + H2O + R-OOH -> R-OH + 2 OH- + I2 The base produced in this reaction is taken up by the excess of acetic acid present. The iodine liberated is titrated with sodium thiosulphate. 2S2O3^2- + I2 -> S4O6^2- + 2 I- The acidic conditions (excess acetic acid) prevents formation of hypoiodite (analogous to hypochlorite), which would interfere with the reaction. The indicator used in this reaction is a starch solution where amylose forms a blue to black solution with iodine and is colourless