source
stringlengths 31
227
| text
stringlengths 9
2k
|
|---|---|
https://en.wikipedia.org/wiki/105%20%28number%29
|
105 (one hundred [and] five) is the natural number following 104 and preceding 106.
In mathematics
105 is a triangular number, a dodecagonal number, and the first Zeisel number. It is the first odd sphenic number and is the product of three consecutive prime numbers. 105 is the double factorial of 7. It is also the sum of the first five square pyramidal numbers.
105 comes in the middle of the prime quadruplet (101, 103, 107, 109). The only other such numbers less than a thousand are 9, 15, 195, and 825.
105 is also the middle of the only prime sextuplet (97, 101, 103, 107, 109, 113) between the ones occurring at 7-23 and at 16057–16073. As the product of the first three odd primes () and less than the square of the next prime (11) by > 8, for , n ± 2, ± 4, and ± 8 must be prime, and n ± 6, ± 10, ± 12, and ± 14 must be composite (prime gap).
105 is also a pseudoprime to the prime bases 13, 29, 41, 43, 71, 83, and 97. The distinct prime factors of 105 add up to 15, and so do those of 104; hence, the two numbers form a Ruth-Aaron pair under the first definition.
105 is also a number n for which is prime, for . (This even works up to , ignoring the negative sign.)
105 is the smallest integer such that the factorization of over Q includes non-zero coefficients other than . In other words, the 105th cyclotomic polynomial, Φ105, is the first with coefficients other than .
105 is the number of parallelogram polyominoes with 7 cells.
In science
The atomic number of dubnium.
In other fields
105 is also:
A Shimano Road groupset since 1984
See also
List of highways numbered 105
|
https://en.wikipedia.org/wiki/Input%20queue
|
In computer science, an input queue is a collection of processes in storage that are waiting to be brought into memory to run a program. Input queues are mainly used in Operating System Scheduling which is a technique for distributing resources among processes. Input queues not only apply to operating systems (OS), but may also be applied to scheduling inside networking devices. The purpose of scheduling is to ensure resources are being distributed fairly and effectively; therefore, it improves the performance of the system.
Essentially, a queue is a collection which has data added in the rear position and removed from the front position. There are many different types of queues, and the ways they operate may be totally different.
Operating systems use First-Come, First-Served queues, Shortest remaining time, Fixed priority pre-emptive scheduling, round-robin scheduling and multilevel queue scheduling.
Network devices use First-In-First-Out queue, Weighted fair queue, Priority queue and Custom queue.
Operating system
In operating systems, processes are loaded into memory, and wait for their turn to be executed by the central processing unit (CPU). CPU scheduling manages process states and decides when a process will be executed next by using the input queue.
First-Come, First-out
First-Come, First-out processes are taken out from the queue in consecutive order that they are put into the queue. With this method, every process is treated equally. If there are two processes of different priority and the lower priority process enters the queue first, it will be executed first. This approach may not be ideal if different processes have different priorities, especially if the processes are long running.
Shortest remaining time
The shortest remaining time method tries to predict the processing time of developments and places them into the queue from the smallest to largest processing time. This method estimates and predicts based on prior history records. In ter
|
https://en.wikipedia.org/wiki/Aortic%20bifurcation
|
The aortic bifurcation is the point at which the abdominal aorta bifurcates (forks) into the left and right common iliac arteries. The aortic bifurcation is usually seen at the level of L4, just above the junction of the left and right common iliac veins.
The right common iliac artery passes in front of the left common iliac vein. In some individual, mainly women with lumbar lordosis this vein can be compressed between the vertebra and the artery. This is the so-called Cockett syndrome or May–Thurner syndrome can cause a slower venous flow and the possibility of deep venous thrombosis in the left leg mainly in pregnancy.
In surface anatomy, the bifurcation approximately corresponds to the umbilicus.
Additional images
|
https://en.wikipedia.org/wiki/Racah%20W-coefficient
|
Racah's W-coefficients were introduced by Giulio Racah in 1942. These coefficients have a purely mathematical definition. In physics they are used in calculations involving the quantum mechanical description of angular momentum, for example in atomic theory.
The coefficients appear when there are three sources of angular momentum in the problem. For example, consider an atom with one electron in an s orbital and one electron in a p orbital. Each electron has electron spin angular momentum and in addition
the p orbital has orbital angular momentum (an s orbital has zero orbital angular momentum). The atom may be described by LS coupling or by jj coupling as explained in the article on angular momentum coupling. The transformation between the wave functions that correspond to these two couplings involves a Racah W-coefficient.
Apart from a phase factor, Racah's W-coefficients are equal to Wigner's 6-j symbols, so any equation involving Racah's W-coefficients may be rewritten using 6-j symbols. This is often advantageous because the symmetry properties of 6-j symbols are easier to remember.
Racah coefficients are related to recoupling coefficients by
Recoupling coefficients are elements of a unitary transformation and their definition is given in the next section. Racah coefficients have more convenient symmetry properties than the recoupling coefficients (but less convenient than the 6-j symbols).
Recoupling coefficients
Coupling of two angular momenta and is the construction of simultaneous eigenfunctions of and , where , as explained in the article on Clebsch–Gordan coefficients. The result is
where and .
Coupling of three angular momenta , , and , may be done by first coupling and to and next coupling and to total angular momentum :
Alternatively, one may first couple and to and next couple and to :
Both coupling schemes result in complete orthonormal bases for the dimensional space spanned by
Hence, the two total angular momentum bases
|
https://en.wikipedia.org/wiki/Brutus%20cluster
|
Brutus is the central high-performance cluster of ETH Zurich. It was introduced to the public in May 2008. A new computing cluster called EULER has been announced and opened to the public in May 2014.
Processors
Brutus is a heterogeneous system containing 11 different kinds of compute nodes:
Standard nodes
120 nodes with four 12-core AMD Opteron 6174 CPUs and 64 GB of RAM (5760 cores)
24 nodes with two 12-core AMD Opteron 6174 CPUs and 32 GB of RAM (576 cores)
410 nodes with four quad-core AMD Opteron 8380 CPUs and 32 GB of RAM (6560 cores)
80 nodes with four quad-core AMD Opteron 8384 CPUs and 32 GB of RAM (1280 cores)
Large-memory (fat) nodes
6 nodes with four 8-core Intel Xeon E7-8837 CPUs and 1024 GB of RAM (192 cores) — NEW!
80 nodes with four 12-core AMD Opteron 6174 CPUs and 256 GB of RAM (3840 cores) 10 nodes with four quad-core AMD Opteron 8380 CPUs and 128 GB of RAM (160 cores)GPU nodes
18 nodes with two 12-core AMD Opteron 6174 CPUs, 32 GB of RAM and 2 Nvidia Fermi C2050 GPUs (432 cores + 36 GPUs) 2 nodes with two 6-core AMD Opteron 2435 CPUs, 32 GB of RAM and 6 Nvidia Tesla C1060 GPUs (24 cores + 12 GPUs) 2 nodes with two 6-core AMD Opteron 2435 CPUs, 32 GB of RAM and various Nvidia and AMD GPUs (24 cores + 2 GPUs)Legacy nodes
256 nodes with two dual-core AMD Opteron 2220 CPUs and 16 GB of RAM (1024 cores)''
In total Brutus contains 19,872 cores, plus a few hundreds in the cluster's file servers, login nodes and management nodes.
The peak performance of Brutus is slightly over 200 teraflops (200 × 1012 floating-point operations per second).
Networking
All nodes are connected to the cluster's Gigabit Ethernet backbone
All nodes (except those with Opteron 2220 CPUs) are connected to a high-speed InfiniBand QDR network
Applications
Thanks to its heterogeneous nature, Brutus can tackle a wide range of applications:
Serial and embarrassingly parallel computations
Distributed-memory computations (MPI using MVAPICH2)
Shared-memory, mu
|
https://en.wikipedia.org/wiki/Ammonium%20polyphosphate
|
Ammonium polyphosphate is an inorganic salt of polyphosphoric acid and ammonia containing both chains and possibly branching. Its chemical formula is H(NH4PO3)nOH showing that each monomer consists of an orthophosphate radical of a phosphorus atom with three oxygens and one negative charge neutralized by an ammonium cation leaving two bonds free to polymerize. In the branched cases some monomers are missing the ammonium anion and instead link to three other monomers.
The properties of ammonium polyphosphate depend on the number of monomers in each molecule and to a degree on how often it branches. Shorter chains (n < 100) are more water sensitive and less thermally stable than longer chains (n > 1000), but short polymer chains (e.g. pyro-, tripoly-, and tetrapoly-) are more soluble and show increasing solubility with increasing chain length.
Ammonium polyphosphate can be prepared by reacting concentrated phosphoric acid with ammonia. However, iron and aluminum impurities, soluble in concentrated phosphoric acid, form gelatinous precipitates or "sludges" in ammonium polyphosphate at pH between 5 and 7. Other metal impurities such as copper, chromium, magnesium, and zinc form granular precipitates. However, depending on the degree of polymerization, ammonium polyphosphate can act as a chelating agent to keep certain metal ions dissolved in solution.
Ammonium polyphosphate is used as a food additive, emulsifier, (E number: E545) and as a fertilizer.
Ammonium polyphosphate (APP) is also used as a flame retardant in many applications such as paints and coatings, and in a variety of polymers: the most important ones are polyolefins, and particularly polypropylene, where APP is part of intumescent systems. Compounding with APP-based flame retardants in polypropylene is described in. Further applications are thermosets, where APP is used in unsaturated polyesters and gel coats (APP blends with synergists), epoxies and polyurethane castings (intumescent systems). APP
|
https://en.wikipedia.org/wiki/Luzin%20N%20property
|
In mathematics, a function f on the interval [a, b] has the Luzin N property, named after Nikolai Luzin (also called Luzin property or N property) if for all such that , there holds: , where stands for the Lebesgue measure.
Note that the image of such a set N is not necessarily measurable, but since the Lebesgue measure is complete, it follows that if the Lebesgue outer measure of that set is zero, then it is measurable and its Lebesgue measure is zero as well.
Properties
Any differentiable function has the Luzin N property. This extends to functions that are differentiable on a cocountable set, as the image of a countable set is countable and thus a null set, but not to functions differentiable on a conull set:
The Cantor function does not have the Luzin N property, as the Lebesgue measure of the Cantor set is zero, but its image is the complete [0,1] interval.
A function f on the interval [a,b] is absolutely continuous if and only if it is continuous, is of bounded variation and has the Luzin N property.
|
https://en.wikipedia.org/wiki/Radiation%20hormesis
|
Radiation hormesis is the hypothesis that low doses of ionizing radiation (within the region of and just above natural background levels) are beneficial, stimulating the activation of repair mechanisms that protect against disease, that are not activated in absence of ionizing radiation. The reserve repair mechanisms are hypothesized to be sufficiently effective when stimulated as to not only cancel the detrimental effects of ionizing radiation but also inhibit disease not related to radiation exposure (see hormesis). It has been a mainstream concept since at least 2009.
While the effects of high and acute doses of ionising radiation are easily observed and understood in humans (e.g. Japanese atomic bomb survivors), the effects of low-level radiation are very difficult to observe and highly controversial. This is because the baseline cancer rate is already very high and the risk of developing cancer fluctuates 40% because of individual life style and environmental effects, obscuring the subtle effects of low-level radiation. An acute effective dose of 100 millisieverts may increase cancer risk by ~0.8%. However, children are particularly sensitive to radioactivity, with childhood leukemias and other cancers increasing even within natural and man-made background radiation levels (under 4 mSv cumulative with 1 mSv being an average annual dose from terrestrial and cosmic radiation, excluding radon which primarily doses the lung). There is limited evidence that exposures around this dose level will cause negative subclinical health impacts to neural development. Students born in regions of higher Chernobyl fallout performed worse in secondary school, particularly in mathematics. "Damage is accentuated within families (i.e., siblings comparison) and among children born to parents with low education..." who often don't have the resources to overcome this additional health challenge.
Hormesis remains largely unknown to the public. Government and regulatory bodies disagre
|
https://en.wikipedia.org/wiki/Lindel%C3%B6f%27s%20lemma
|
In mathematics, Lindelöf's lemma is a simple but useful lemma in topology on the real line, named for the Finnish mathematician Ernst Leonard Lindelöf.
Statement of the lemma
Let the real line have its standard topology. Then every open subset of the real line is a countable union of open intervals.
Generalized Statement
Lindelöf's lemma is also known as the statement that every open cover in a second-countable space has a countable subcover (Kelley 1955:49). This means that every second-countable space is also a Lindelöf space.
Proof of the generalized statement
Let be a countable basis of . Consider an open cover, . To get prepared for the following deduction, we define two sets for convenience, , .
A straight-forward but essential observation is that, which is from the definition of base. Therefore, we can get that,
where , and is therefore at most countable. Next, by construction, for each there is some such that . We can therefore write
completing the proof.
|
https://en.wikipedia.org/wiki/Gland%20%28botany%29
|
In plants, a gland is defined functionally as a plant structure which secretes one or more products. This may be located on or near the plant surface and secrete externally, or be internal to the plant and secrete into a canal or reservoir. Examples include glandular hairs, nectaries, hydathodes, and the resin canals in Pinus.
Notable examples
Salt glands of the mangrove
The salt glands of mangroves such as Acanthus, Aegiceras, Aegialitis and Avicennia are a distinctive multicellular trichome, a glandular hair found on the upper leaf surface and much more densely in the abaxial indumentum. On the upper leaf surface they are sunken in shallow pits, and on the lower surface they occur scattered among long nonglandular hairs composed of three or four cells. Development of the glands resembles that of the nonglandular hairs until the three-celled stage, when the short middle stalk cell appears. The salt gland continues to develop to produce two to four vacuolated cells at the level of the epidermis, the stalk cell with an almost completely cutinized wall, and at least eight terminal cells. The terminal cells have a thin, perforated cuticle which separates from the cell walls apically, leaving an enclosed cavity between them. The secreted salt evaporates and forms visible crystals.
Cannabinoid-secreting glands of Cannabis
Cannabis plants are broadly covered with sessile glands, and other hairs throughout above-ground portions of the plant. There is a particularly high concentration of glands on the bracts of the female plant. After flower formation begins, some of the glands, especially on bracts near the flowers, develop stalks projecting them outward from the plant surface. The glands consist of a layer of disk cells, whose outer surface splits to create a large secretory cavity lined by cell wall and cuticle components. Together the disk cells and secretory cavity form a round head atop the narrow stalk. These cavities come to contain large amounts of
|
https://en.wikipedia.org/wiki/Exploded-view%20drawing
|
An exploded-view drawing is a diagram, picture, schematic or technical drawing of an object, that shows the relationship or order of assembly of various parts.
It shows the components of an object slightly separated by distance, or suspended in surrounding space in the case of a three-dimensional exploded diagram. An object is represented as if there had been a small controlled explosion emanating from the middle of the object, causing the object's parts to be separated an equal distance away from their original locations.
The exploded-view drawing is used in parts catalogs, assembly and maintenance manuals and other instructional material.
The projection of an exploded view is usually shown from above and slightly in diagonal from the left or right side of the drawing. (See exploded-view drawing of a gear pump to the right: it is slightly from above and shown from the left side of the drawing in diagonal.)
Overview
An exploded-view drawing is a type of drawing, that shows the intended assembly of mechanical or other parts. It shows all parts of the assembly and how they fit together. In mechanical systems usually the component closest to the center are assembled first, or is the main part in which the other parts get assembled. This drawing can also help to represent the disassembly of parts, where the parts on the outside normally get removed first.
Exploded diagrams are common in descriptive manuals showing parts placement, or parts contained in an assembly or sub-assembly. Usually such diagrams have the part identification number and a label indicating which part fills the particular position in the diagram. Many spreadsheet applications can automatically create exploded diagrams, such as exploded pie charts.
In patent drawings in an exploded views the separated parts should be embraced by a bracket, to show the relationship or order of assembly of various parts are permissible, see image. When an exploded view is shown in a figure that is on the sam
|
https://en.wikipedia.org/wiki/Direct%20photon
|
Produced in hadronic collisions, a direct photon is any real photon which originates directly from an electromagnetic vertex in a quark-quark, quark-gluon or gluon-gluon scattering subprocess (as opposed to "indirect" photons which arise from the decays of fragmentation products).
Because the QCD calculations for direct photon production are considerably easier to perform than for other processes studies of direct photons have been used to test predictions made by perturbative QCD.
Direct photons were predicted to exist by C.O. Escobar in 1975 and were first observed by the R412 group at the Intersecting Storage Rings at CERN in 1976, and were subsequently studied by various experiments, including E705 and E706 at Fermilab, NA3, NA24, WA70 and UA6 at the CERN SPS as well as UA1 and UA2 at the CERN SPPS collider.
|
https://en.wikipedia.org/wiki/Kenny%20Dies
|
"Kenny Dies" is the thirteenth episode of the fifth season of the animated television series South Park, and the 78th episode of the series overall. "Kenny Dies" originally aired in the United States on December 5, 2001 on Comedy Central and in the United Kingdom on April 20, 2002 on Sky One. In the episode, Cartman comes across a truckload of fetuses he cannot sell thanks to a recent government ruling on stem cell research. When Kenny is diagnosed with a terminal illness, Cartman uses it to lobby Congress to restore stem cell research.
The episode was written and directed by series co-creator Trey Parker and is rated TV-MA in the United States, except on syndicated broadcasts and post-2017 reruns on Comedy Central, where the episode is instead rated TV-14. The gag of Kenny dying in almost every episode was dropped after this episode, and he did not reappear bodily until "Red Sleigh Down", due to fans being upset over his absence all throughout season 6 in 2002. This was the final appearance of the "4th Grade" title sequence, which was first seen in "4th Grade." On the DVD commentary for the episode, Parker and Matt Stone state that they had originally planned to kill Kyle off for a year, but decided to kill Kenny instead as they were running out of original ways to kill him.
Plot
The episode begins in an abortion clinic with a woman giving her permission for doctors to use her aborted fetus for stem cell research. However, the truck transporting the fetuses to a medical research facility is destroyed in an accident. Its cargo is noticed and subsequently stolen by Cartman (riding his bike and singing Sheena Easton's "Morning Train"), who intends to resell the fetuses for a tremendous profit. This goal leads him to call various institutions in the style of a fast-talking agent, with the famous recurring line, "you're breaking my balls here", finally landing a deal with a government organization. To his dismay, the government puts a ban on stem cell research immedia
|
https://en.wikipedia.org/wiki/Rangasami%20L.%20Kashyap
|
Rangasami Lakshminarayan Kashyap (28 March 1938 - 11 November 2022) was an Indian applied mathematician and a Professor of Electrical Engineering at Purdue University.
He developed (with Harvard professor Yu-Chi Ho) the Ho-Kashyap rule, an important result (algorithm) in pattern recognition.
In 1982, he presented the Kashyap information criterion (KIC) to select the best model from a set of mathematical candidate models with different numbers of unknown parameters. These parameters are adjusted to adapt the models to data (observations) that have trends and statistical variation in the measured values.
He is a Fellow of the Institute of Electrical and Electronics Engineers, the International Association for Pattern Recognition, and the Indian Institute of Electronic and Telecommunication Engineers.
In the field of Vedic studies, he has made contribution including the complete translation into English all the four major and most ancient collection of verses in Sanskrit namely Rigveda Samhita, Krishna Yajurveda Samhita, and Samaveda, and Atharvaveda, consisting together of about 25000 metrical verses in the Sanskrit of Vedas (different from classical Sanskrit).
Kashyap is the only person in the world to translate all the 4 vedas recognizing his achievement he was honored by the Govt. of India with the Padma Shri award in 2021 under the Literature and Education field.
Biography
Education
Prof. Rangasami L. Kashyap received his early education from the National College, Bangalore, Central College, and at the Indian Institute of Science (the degrees of ME and DIISc). He was awarded the distinguished alumni award from IISc in 2010. Prof. Kashyap received his Ph.D from Harvard in 1966.
Career
Prof. Kashyap served as a Professor Emeritus of Electrical and Computer Engineering, at Purdue University, USA and was also the director of the Sri Aurobindo Kapali Sastry Institute of Vedic Culture. While at Purdue, he has published more than 200 research papers in advanced s
|
https://en.wikipedia.org/wiki/Linear%20network%20coding
|
In computer networking, linear network coding is a program in which intermediate nodes transmit data from source nodes to sink nodes by means of linear combinations.
Linear network coding may be used to improve a network's throughput, efficiency, and scalability, as well as reducing attacks and eavesdropping. The nodes of a network take several packets and combine for transmission. This process may be used to attain the maximum possible information flow in a network.
It has been proven that, theoretically, linear coding is enough to achieve the upper bound in multicast problems with one source. However linear coding is not sufficient in general; even for more general versions of linearity such as convolutional coding and filter-bank coding. Finding optimal coding solutions for general network problems with arbitrary demands is a hard problem, which can be NP-hard
and even undecidable.
Encoding and decoding
In a linear network coding problem, a group of nodes are involved in moving the data from source nodes to sink nodes. Each node generates new packets which are linear combinations of past received packets by multiplying them by coefficients chosen from a finite field, typically of size .
More formally, each node, with indegree, , generates a message from the linear combination of received messages by the formula:
Where the values are coefficients selected from . Since operations are computed in a finite field, the generated message is of the same length as the original messages. Each node forwards the computed value along with the coefficients, , used in the level, .
Sink nodes receive these network coded messages, and collect them in a matrix. The original messages can be recovered by performing Gaussian elimination on the matrix. In reduced row echelon form, decoded packets correspond to the rows of the form
Background
A network is represented by a directed graph . is the set of nodes or vertices, is the set of directed links (or edges), and
|
https://en.wikipedia.org/wiki/Sea%20urchin%20skeletogenesis
|
Skeletogenesis is a key morphogenetic event in the embryonic development of vertebrates and is of equal, although transient, importance in the development of the sea urchin, a marine invertebrate. The larval sea urchin does not resemble its adult form, because the sea urchin is an indirect developer, meaning its larva form must undergo metamorphosis to form the juvenile adult. Here, the focus is on skeletogenesis in the sea urchin species Strongylocentrotus purpuratus, as this species has been most thoroughly studied and characterized.
Morphological changes
Skeletogenesis begins in the early sea urchin blastula (9–10 hours post fertilization) when the primary mesenchyme cells (PMCs), the sole descendants of the large micromere daughter cells, undergo an epithelial–mesenchymal transition (EMT) and break away from the apical layer, thus entering the blastocoel, forming a cell cluster at the vegetal pole. It is a key interaction between the two principal populations of mesodermal cells in the sea urchin embryo, PMCs and secondary mesenchyme cells (SMCs), that regulates SMC fates and the process of skeletogenesis. In a wild type embryo, skeletal elements are exclusively produced by PMCs. Due to their nature in giving rise to the larval skeleton, they are sometimes called the skeletogenic mesenchyme. Certain SMCs have a skeletogenic potential, however, signals transmitted by the PMCs suppress this potential in the SMCs and direct these cells into alternative developmental pathways.
Once in the blastocoel, the mesenchyme cells extend and contract long, thin processes called filopodia. The filopodia are 250 nm in diameter and 25 um long. At this point, the filopodia appear to move randomly along the surface of the inner blastocoel, making and breaking filopodial connections to the blastocoel wall. During the gastrula stage, once the blastopore has formed, the PMCs are localized within the prospective ventrolateral (from front to side) region of the blastocoel. I
|
https://en.wikipedia.org/wiki/Right%20to%20privacy
|
The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 150 national constitutions mention the right to privacy. On 10 December 1948, the United Nations General Assembly adopted the Universal Declaration of Human Rights (UDHR), originally written to guarantee individual rights of everyone everywhere; while right to privacy does not appear in the document, many interpret this through Article 12, which states: "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks."
Since the global surveillance disclosures of 2013, initiated by ex-NSA employee Edward Snowden, the right to privacy has been a subject of international debate. Government agencies, such as the NSA, FBI, CIA, R&AW and GCHQ, have engaged in mass, global surveillance. Some current debates around the right to privacy include whether privacy can co-exist with the current capabilities of intelligence agencies to access and analyze many details of an individual's life; whether or not the right to privacy is forfeited as part of the social contract to bolster defense against supposed terrorist threats; and whether threats of terrorism are a valid excuse to spy on the general population. Private sector actors can also threaten the right to privacyparticularly technology companies, such as Amazon, Apple, Meta, Google, Microsoft, and Yahoo that use and collect personal data. These concerns have been strengthened by scandals, including the Facebook–Cambridge Analytica data scandal, which focused on psychographic company Cambridge Analytica which used personal data from Facebook to influence large groups of people.
History
The concept of a human "right to privacy" begins when the Latin word ius expanded from meaning "what is
|
https://en.wikipedia.org/wiki/Overchoice
|
Overchoice or choice overload is the paradoxical phenomenon that choosing between a large variety of options can be detrimental to decision making processes. The term was first introduced by Alvin Toffler in his 1970 book, Future Shock.
Psychological process
The phenomenon of overchoice occurs when many equivalent choices are available. Making a decision becomes overwhelming due to the many potential outcomes and risks that may result from making the wrong choice. Having too many approximately equally good options is mentally draining because each option must be weighed against alternatives to select the best one. The satisfaction of choices by number of options available can be described by an inverted "U" model. In this model, having no choice results in very low satisfaction. Initially more choices lead to more satisfaction, but as the number of choices increases it then peaks and people tend to feel more pressure, confusion, and potentially dissatisfaction with their choice. Although larger choice sets can be initially appealing, smaller choice sets lead to increased satisfaction and reduced regret. Another component of overchoice is the perception of time. Extensive choice sets can seem even more difficult with a limited time constraint.
Preconditions
Choice overload is not a problem in all cases, there are some preconditions that must be met before the effect can take place. First, people making the choice must not have a clear prior preference for an item type or category. When the choice-maker has a preference, the number of options has little impact on the final decision and satisfaction. Second, there must not be a clearly dominant option in the choice set, meaning that all options must be perceived of equivalent quality. One option cannot stand out as being better from the rest. The presence of a superior option and many less desirable options will result in a more satisfied decision. Third, there is a negative relationship between choice assortment (qu
|
https://en.wikipedia.org/wiki/Commensurability%20%28astronomy%29
|
Commensurability is the property of two orbiting objects, such as planets, satellites, or asteroids, whose orbital periods are in a rational proportion.
Examples include the 2:3 commensurability between the orbital periods of Neptune and Pluto, the 3:4 commensurability between the orbital periods of the Saturnian satellites Titan and Hyperion, the orbital periods associated with the Kirkwood gaps in the asteroid belt relative to that of Jupiter, and the 2:1 commensurability between Gliese 876 b and Gliese 876 c.
Commensurabilities are normally the result of an orbital resonance, rather than being due to coincidence.
See also
Harmonic
Ratio
|
https://en.wikipedia.org/wiki/Video4Linux
|
Video4Linux (V4L for short) is a collection of device drivers and an API for supporting realtime video capture on Linux systems. It supports many USB webcams, TV tuners, and related devices, standardizing their output, so programmers can easily add video support to their applications.
Video4Linux is responsible for creating V4L2 device nodes aka a device file (/dev/videoX, /dev/vbiX and /dev/radioX) and tracking data from these nodes. The device node creation is handled by V4L device drivers using the video_device struct (v4l2-dev.h) and it can either be allocated dynamically or embedded in another larger struct.
Video4Linux was named after Video for Windows (which is sometimes abbreviated "V4W"), but is not technically related to it.
While Video4Linux is only available on Linux, there is a compatibility layer available for FreeBSD called Video4BSD. This provides a way for many programs that depend on V4L to also compile and run on the FreeBSD operating system.
History
V4L had been introduced late into the 2.1.X development cycle of the Linux kernel. V4L1 support was dropped in kernel 2.6.38.
V4L2 is the second version of V4L. Video4Linux2 fixed some design bugs and started appearing in the 2.5.x kernels. Video4Linux2 drivers include a compatibility mode for Video4Linux1 applications, though the support can be incomplete and it is recommended to use Video4Linux1 devices in V4L2 mode. The project DVB-Wiki is now hosted on LinuxTV web site.
Some programs support V4L2 through the media resource locator v4l2://.
Software support
aMSN
Cheese (software)
Cinelerra
CloudApp
Ekiga
FFmpeg
FreeJ
GStreamer
Guvcview
kdetv
Kopete
Libav
Linphone
LiVES
MPlayer
mpv
MythTV
Open Broadcaster Software
OpenCV
Peek
PyGame
Skype
Tvheadend
VLC media player
xawtv
Xine
ZoneMinder
Criticism
Video4Linux has a complex negotiation process, which caused not all applications having support for all cameras.
See also
Direct Rendering Manager – defines a kerne
|
https://en.wikipedia.org/wiki/Nick%20Wormald
|
Nicholas Charles Wormald (born 1953) is an Australian mathematician and professor of mathematics at Monash University. He specializes in probabilistic combinatorics, graph theory, graph algorithms, Steiner trees, web graphs, mine optimization, and other areas in combinatorics.
In 1979, Wormald earned a Ph.D. in mathematics from the University of Newcastle with a dissertation titled Some problems in the enumeration of labelled graphs.
In 2006, he won the Euler Medal from the Institute of Combinatorics and its Applications. He has held the Canada Research Chair in Combinatorics and Optimization at the University of Waterloo. In 2012, he was recognized with an Australian Laureate Fellowship for his achievements. In 2017, he was elected as a Fellow of the Australian Academy of Science.
In 2018, Wormald was an invited speaker at the International Congress of Mathematicians in Rio de Janeiro.
Selected publications
|
https://en.wikipedia.org/wiki/Numerical%20sight-singing
|
Numerical sight-singing, an alternative to the solfege system of sight-singing, is a musical notation system that numbers the diatonic scale with the numbers one through eight (or, alternately, one to seven, with the octave again being one).
In this system, 1 is always the root or origin, but the scale being represented may be major, minor, or any of the diatonic mode. Accidentals (sharps and flats outside the key signature) are noted with a + or - when the numbers are written, but are often skipped when they are spoken or sung.
In some pedagogies involving numerical sight-singing notation students are not taught to modify vowels to represent sharp or flat notes. In these cases the students usually name the note and whether it is flat or sharp. For example, an augmented unison ("ouey") might be called "one sharp," and in some other pedagogies this same pitch may also simply be called "one."
Comparison with other systems
There is a continual debate about the merits of this system as compared to solfege: it holds the advantage that when dealing with abstract concepts such as interval distance a student may easily recognize that the distance between 1 and 5 is larger than the distance between 1 and 4 because of the numerical values assigned (as compared to Solfege, where comparing Do to Sol and Do to Fa remain completely abstract until sung or played). A drawback often pointed out is that numerical numbers are not always "singable," for example, scale degree 7 (ti, in solfege) contains vowels that are hard to tune.
Numerical sight singing is not the same as integer notation derived from musical set theory and used primarily for sight singing atonal music. Nor is it the same as "count singing", a technique popularized by Robert Shaw in which the numbers sung represent the rhythms of a piece in accordance with the beat of a measure.
|
https://en.wikipedia.org/wiki/Acetylated%20distarch%20phosphate
|
Acetylated distarch phosphate, E1414 in the E number scheme of food additives, is a modified starch. These are not absorbed intact by the gut, but are significantly hydrolysed by intestinal enzymes and then fermented by intestinal microbiota.
|
https://en.wikipedia.org/wiki/Pruning%20%28artificial%20neural%20network%29
|
In the context of artificial neural network, pruning is the practice of removing parameters (which may entail removing individual parameters, or parameters in groups such as by neurons) from an existing network. The goal of this process is to maintain accuracy of the network while increasing its efficiency. This can be done to reduce the computational resources required to run the neural network. A biological process of synaptic pruning takes place in the brain of mammals during development (see also Neural Darwinism).
Node (neuron) pruning
A basic algorithm for pruning is as follows:
Evaluate the importance of each neuron.
Rank the neurons according to their importance (assuming there is a clearly defined measure for "importance").
Remove the least important neuron.
Check a termination condition (to be determined by the user) to see whether to continue pruning.
Edge (weight) pruning
Most work on neural network pruning focuses on removing weights, namely, setting their values to zero.
Early work suggested to also change the values of non-pruned weights.
|
https://en.wikipedia.org/wiki/Oak%20forest
|
An oak forest is a plant community with a tree canopy dominated by oaks (Quercus spp.). In terms of canopy closure, oak forests contain the most closed canopy, compared to oak savannas and oak woodlands.
Setting
Oak forests are categorized as deciduous forests which commonly have dense canopy cover (~70%) on dry soils with large amounts of undecomposed oak leaves over the ground. The forests are commonly found around the Appalachian Mountains and neighboring areas in the Midwest United States. Soils within the forests are highly acidic and dry with habitats existing in low elevation areas as well as large mountainsides, providing resources and an ecosystem for large amounts of common plant and animal species in those regions. Indicated by the large presence of oaks (Quercus spp.), the community is also dominated by inflammable shrubs and different vegetation commonly seen in oak savannas and oak woodlands. This plant life is often credited with assisting in maintaining air, soil, and water quality as well as playing a major role in biodiversity of different state regions.
Conservation and Threats
Oak forests are susceptible to a shift in the tree demography, with greater abundances of shade-tolerant and fire-sensitive species, such as red maple (Acer rubrum), sugar maple (A. saccharum), American beech (Fagus grandifolia) and hickory (Carya spp.). This leads to a lack of oak seedings and saplings to grow and replace mature oaks (Quercus spp.) once they die and growth in abundance of new species. Deer browse is also a large threat to the plant community as white-tailed deer (Odocoileus virginianus) use oak seedlings for consumption at growing rates with increasing population sizes.
To combat this, the New River Gorge National Park and Preserve attempted controlled fires to burn off leaf litter of competing non-oaks without harming mature trees to encourage oak seed growth. Only the site of Backus Mountain showed positive effects of the controlled burns as oak se
|
https://en.wikipedia.org/wiki/Hyoglossus
|
The hyoglossus is a thin and quadrilateral extrinsic muscle of the tongue. It originates from the hyoid bone; it inserts onto the side of the tongue. It is innervated by the hypoglossal nerve (cranial nerve XII). It acts to depress and retract the tongue.
Structure
It forms a part of the floor of submandibular triangle.
Origin
from the side of the body and from the whole length of the greater cornu of the hyoid bone. The fibers arising from the body of the hyoid bone overlap those from the greater cornu.
Insertion
Its fibres pass almost vertically upward to enter the side of the tongue, inserting between the styloglossus and the inferior longitudinal muscle of the tongue.
Relations
Structures that are medial/deep to the hyoglossus are the glossopharyngeal nerve (CN IX), the stylohyoid ligament and the lingual artery and lingual vein.
The lingual vein passes medial to the hyoglossus. The lingual artery passes deep to the hyoglossus.
Laterally, in between the hyoglossus muscle and the mylohyoid muscle, lay several important structures (from upper to lower): sublingual gland, submandibular duct, lingual nerve, vena comitans of hypoglossal nerve, and the hypoglossal nerve. Note, posteriorly, the lingual nerve is superior to the submandibular duct and a portion of the submandibular salivary gland protrudes into the space between the hyoglossus and mylohyoid muscles.
Function
The hyoglossus depresses and retracts the tongue and makes the dorsum more convex.
Additional images
|
https://en.wikipedia.org/wiki/Non-Euclidean%20surface%20growth
|
A number of processes of surface growth in areas ranging from mechanics of growing gravitational bodies through propagating fronts of phase transitions, epitaxial growth of nanostructures and 3D printing, growth of plants, and cell mobility require non-Euclidean description because of incompatibility of boundary conditions and different mechanisms of developing stresses at interfaces. Indeed, these mechanisms result in the curving of initially flat elements of the body and changing separation between different elements of it (especially in the soft matter). Gradual accumulation of deformations under the influx of accumulating mass results in the memory-conscious grows of the body and makes strains the subject of long-range forces. As a result of all above factors, generic non-Euclidean growth is described in terms of Riemannian geometry with a space- and time-dependent curvature.
|
https://en.wikipedia.org/wiki/Nuclebr%C3%A1s%20Equipamentos%20Pesados
|
The Nuclebrás Equipamentos Pesados S.A. (NUCLEP) is a Brazilian state-owned nuclear company specialized in nuclear engineering and heavy equipment for nuclear, defense, oil and gas industries, founded on 12 April 1975.
See also
Goiânia accident (Nuclebrás aided in response effort)
National Nuclear Energy Commission
|
https://en.wikipedia.org/wiki/Mirror%20matter
|
In physics, mirror matter, also called shadow matter or Alice matter, is a hypothetical counterpart to ordinary matter.
Overview
Modern physics deals with three basic types of spatial symmetry: reflection, rotation, and translation. The known elementary particles respect rotation and translation symmetry but do not respect mirror reflection symmetry (also called P-symmetry or parity). Of the four fundamental interactions—electromagnetism, the strong interaction, the weak interaction, and gravity—only the weak interaction breaks parity.
Parity violation in weak interactions was first postulated by Tsung Dao Lee and Chen Ning Yang in 1956 as a solution to the τ-θ puzzle. In consultation with the experimental physicist Chien-Shiung Wu a number of possibilities were proposed to test whether the weak interaction was in fact invariant under parity. One of the group's suggestions involved monitoring the decay of Cobalt-60, to determine whether the electrons it emitted were radiated isotopically, like the two gamma rays. Wu performed this experiment in at the National Bureau of Standards in Washington, D.C. after nine months of work. Contrary to most expectations, in December of 1956 she and her team observed anisotropic electron radiation, proving that the weak interactions of the known particles violate parity.
However, parity symmetry can be restored as a fundamental symmetry of nature if the particle content is enlarged so that every particle has a mirror partner. The theory in its modern form was described in 1991, although the basic idea dates back further. Mirror particles interact amongst themselves in the same way as ordinary particles, except where ordinary particles have left-handed interactions, mirror particles have right-handed interactions. In this way, it turns out that mirror reflection symmetry can exist as an exact symmetry of nature, provided that a "mirror" particle exists for every ordinary particle. Parity can also be spontaneously broken depending
|
https://en.wikipedia.org/wiki/Source%20of%20activation%20confusion%20model
|
SAC (source of activation confusion) is a computational model of memory encoding and retrieval. It has been developed by Lynne M. Reder at Carnegie Mellon University. It shares many commonalities with ACT-R.Ilyes le bosse
Structure
SAC specifies a memory representation consisting of a network of both semantic (concept) and perceptual nodes (such as font) and associated episodic (context) nodes. Similar to her husband's (John Anderson) model, ACT-R, the node activations are governed by a set of common computational principles such as spreading activation and the strengthening and decay of activation. However, a unique feature of the SAC model are episode nodes, which are newly formed memory traces that binds the concepts involved with the current experiential context. A recent addition to SAC are assumptions governing the probability of forming an association during encoding. These bindings are affected by working memory resources available.
SAC is considered among a class of dual-process models of memory, since recognition involves two processes: a general familiarity process based on the activation of semantic (concept) nodes and a more specific recollection process based on the activation of episodic (context) nodes. This feature has allowed SAC to model a variety of memory phenomena, such as meta-cognitive (rapid) feeling of knowing judgments, remember-know judgments, the word frequency mirror effect, age-related memory loss perceptual fluency, paired associate recognition and cued recall, as well as account for implicit and explicit memory tasks without positing an unconscious memory system for priming.
Notes
Cognitive architecture
|
https://en.wikipedia.org/wiki/Proactive%20maintenance
|
Proactive maintenance is the maintenance philosophy that supplants “failure reactive” with “failure proactive” by activities that avoid the underlying conditions that lead to machine faults and degradation. Unlike predictive or preventive maintenance, proactive maintenance commissions corrective actions aimed at failure root causes, not failure symptoms. Its central theme is to extend the life of machinery as opposed to
making repairs when often nothing is wrong,
accommodating failure as routine or normal, or
detecting impending failure conditions followed by remediation.
Proactive maintenance depends on rigorous machine inspection and condition monitoring. In mechanical machinery it seeks to detect and eradicate failure root causes such as wrong lubricant, degraded lubricant, contaminated lubricant, botched repair, misalignment, unbalance and operator error.
See also
Predictive maintenance
|
https://en.wikipedia.org/wiki/Institute%20for%20Biodiversity%20and%20Ecosystem%20Dynamics
|
The Institute for Biodiversity and Ecosystem Dynamics (IBED) is one of the ten research institutes of the Faculty of Science of the Universiteit van Amsterdam. IBED employs more than 100 researchers, with PhD students and Postdocs forming a majority, and 30 supporting staff. The total annual budget is around 10 m€, of which more than 40 per cent comes from external grants and contracts. The main output consist of publications in peer reviewed journals and books (on average 220 per year). Each year around 15 PhD students defend their thesis and obtain their degree from the Universiteit van Amsterdam. The institute is managed by a general director appointed by the Dean of the Faculty for a period of five years, assisted by a business manager.
Mission statement
The mission of the Institute for Biodiversity and Ecosystem Dynamics is to increase our insights in the functioning and biodiversity of ecosystems in all their complexity. Knowledge of the interactions between living organisms and processes in their physical and chemical environment is essential for a better understanding of the dynamics of ecosystems at different temporal and spatial scales.
Organization of IBED Research
IBED research is organized in the following three themes:
Theme I: Biodiversity and Evolution
The main question of Theme I research is how patterns in biodiversity can be explained from underlying processes: speciation and extinction, dispersal and the (dis)appearance of geographical barriers, reproductive isolation and hybridisation of taxa. Modern reconstructions of the history of life on earth rely heavily on analyses of DNA data that contain the footprints of the past. Research related to human-made effects on biodiversity includes the identification of endangered biodiversity hotspots affected by global change, potential risks of an escape of transgenes from crops to wild species, and the consequences of habitat fragmentation for the viability and genetic diversity of populations and
|
https://en.wikipedia.org/wiki/APL%20%28programming%20language%29
|
APL (named after the book A Programming Language) is a programming language developed in the 1960s by Kenneth E. Iverson. Its central datatype is the multidimensional array. It uses a large range of special graphic symbols to represent most functions and operators, leading to very concise code. It has been an important influence on the development of concept modeling, spreadsheets, functional programming, and computer math packages. It has also inspired several other programming languages.
History
Mathematical notation
A mathematical notation for manipulating arrays was developed by Kenneth E. Iverson, starting in 1957 at Harvard University. In 1960, he began work for IBM where he developed this notation with Adin Falkoff and published it in his book A Programming Language in 1962. The preface states its premise:
This notation was used inside IBM for short research reports on computer systems, such as the Burroughs B5000 and its stack mechanism when stack machines versus register machines were being evaluated by IBM for upcoming computers.
Iverson also used his notation in a draft of the chapter A Programming Language, written for a book he was writing with Fred Brooks, Automatic Data Processing, which would be published in 1963.
In 1979, Iverson received the Turing Award for his work on APL.
Development into a computer programming language
As early as 1962, the first attempt to use the notation to describe a complete computer system happened after Falkoff discussed with William C. Carter his work to standardize the instruction set for the machines that later became the IBM System/360 family.
In 1963, Herbert Hellerman, working at the IBM Systems Research Institute, implemented a part of the notation on an IBM 1620 computer, and it was used by students in a special high school course on calculating transcendental functions by series summation. Students tested their code in Hellerman's lab. This implementation of a part of the notation was called Personalized
|
https://en.wikipedia.org/wiki/Cofree%20coalgebra
|
In algebra, the cofree coalgebra of a vector space or module is a coalgebra analog of the free algebra of a vector space. The cofree coalgebra of any vector space over a field exists, though it is more complicated than one might expect by analogy with the free algebra.
Definition
If V is a vector space over a field F, then the cofree coalgebra C (V), of V, is a coalgebra together with a linear map C (V) → V, such that any linear map from a coalgebra X to V factors through a coalgebra homomorphism from X to C (V). In other words, the functor C is right adjoint to the forgetful functor from coalgebras to vector spaces.
The cofree coalgebra of a vector space always exists, and is unique up to canonical isomorphism.
Cofree cocommutative coalgebras are defined in a similar way, and can be constructed as the largest cocommutative coalgebra in the cofree coalgebra.
Construction
C (V) may be constructed as a completion of the tensor coalgebra T(V) of V. For k ∈ N = {0, 1, 2, ...}, let TkV denote the k-fold tensor power of V:
with T0V = F, and T1V = V. Then T(V) is the direct sum of all TkV:
In addition to the graded algebra structure given by the tensor product isomorphisms TjV ⊗ TkV → Tj+kV for j, k ∈ N, T(V) has a graded coalgebra structure Δ : T(V) → T(V) ⊠ T(V) defined by extending
by linearity to all of T(V).
Here, the tensor product symbol ⊠ is used to indicate the tensor product used to define a coalgebra; it must not be confused with the tensor product ⊗, which is used to define the bilinear multiplication operator of the tensor algebra. The two act in different spaces, on different objects. Additional discussion of this point can be found in the tensor algebra article.
The sum above makes use of a short-hand trick, defining to be the unit in the field . For example, this short-hand trick gives, for the case of in the above sum, the result that
for . Similarly, for and , one gets
Note that there is no need to ever write as this is just plain-old
|
https://en.wikipedia.org/wiki/Cloud%20Master
|
Cloud Master is a horizontally scrolling shooter released as an arcade video game by Taito in 1988. Home versions were released for the Master System, PC Engine, and Famicom, with all save the Master System version released only in Japan. The PC Engine version of the game is titled . The Famicom version is titled Chuuka Taisen.
Gameplay
The player controls Mike Chen floating on a cloud, maneuvering around the screen and shooting balls of energy at flying enemies. Powerups can be collected for stronger and faster firepower. Some parts of the game stage have doors that give the player the opportunity to buy special bomb types with collectible credits. Each stage has its own mini-boss and big boss. The player restarts at certain checkpoints after losing a life.
Reception
In Japan, Game Machine listed Cloud Master on their August 15, 1988 issue as being the sixteenth most-successful table arcade unit of the month.
Legacy
In 2008, Starfish SD, a company founded by former Hot-B employees, bought the rights from Taito and developed a remake for the Nintendo Wii. It was released under the title The Monkey King: The Legend Begins, dubbed Shin Chuuka Taisen: Michael to Meimei no Bouken in Japan. A Nintendo Switch port, titled Chuka Taisen, was released on September 6, 2018.
|
https://en.wikipedia.org/wiki/Gauss%E2%80%93Bonnet%20gravity
|
In general relativity, Gauss–Bonnet gravity, also referred to as Einstein–Gauss–Bonnet gravity, is a modification of the Einstein–Hilbert action to include the Gauss–Bonnet term (named after Carl Friedrich Gauss and Pierre Ossian Bonnet)
,
where
.
This term is only nontrivial in 4+1D or greater, and as such, only applies to extra dimensional models. In 3+1D, it reduces to a topological surface term. This follows from the generalized Gauss–Bonnet theorem on a 4D manifold
.
In lower dimensions, it identically vanishes.
Despite being quadratic in the Riemann tensor (and Ricci tensor), terms containing more than 2 partial derivatives of the metric cancel out, making the Euler–Lagrange equations second order quasilinear partial differential equations in the metric. Consequently, there are no additional dynamical degrees of freedom, as in say f(R) gravity.
Gauss–Bonnet gravity has also been shown to be connected to classical electrodynamics by means of complete gauge invariance with respect to Noether's theorem.
More generally, we may consider a
term for some function f. Nonlinearities in f render this coupling nontrivial even in 3+1D. Therefore, fourth order terms reappear with the nonlinearities.
See also
Einstein–Hilbert action
f(R, G, T) or f(R, T, G) gravity
f(R) gravity
Lovelock gravity
|
https://en.wikipedia.org/wiki/Mikhail%20Atallah
|
Mikhail Jibrayil (Mike) Atallah is a Lebanese American computer scientist, a distinguished professor of computer science at Purdue University.
Biography
Atallah received his bachelor's degree from the American University of Beirut in 1975. He then moved to Johns Hopkins University for his graduate studies, earning a master's degree in 1980 and a Ph.D. in 1982 under the supervision of S. Rao Kosaraju. Since that time he has been a member of the Purdue University faculty.
In 2001, Atallah co-founded Arxan Technologies, Inc., a provider of internet anti-piracy and anti-tampering software, and in 2007, he became its chief technology officer.
Research
Atallah has published over 200 papers on topics in algorithms and computer security.
Atallah's thesis work was on the subject of parallel algorithms, and he continued working in that area as a faculty member.
Algorithmic research by Atallah includes papers on parallel and dynamic computational geometry, finding the symmetries of geometric figures, divide and conquer algorithms, and efficient parallel computations of the Levenshtein distance between pairs of strings. With his student Marina Blanton, Atallah is the editor of the Algorithms and Theory of Computation Handbook (CRC Press, 2nd ed., 2009, ).
Atallah's more recent research has been in the area of computer security. His work in this area has included techniques for text-based digital watermarking. and the addition of multiple guard points within software as an anti-piracy measure.
Awards and honors
In 2006, Atallah was elected as a fellow of the Association for Computing Machinery for his "contributions to parallel and distributed computation". He has also been a fellow of the IEEE since 1997.
|
https://en.wikipedia.org/wiki/AIDGAP%20series
|
AIDGAP is an acronym for Aid to Identification in Difficult Groups of Animals and Plants.
The AIDGAP series is a set of books published by the Field Studies Council. They are intended to enable students and interested non-specialists to identify groups of taxa in Britain which are not covered by standard field guides. In general, they are less demanding in level than the Synopses of the British Fauna.
All AIDGAP guides are initially produced as test versions, which are circulated widely to students, teaching staff and environmental professionals, with the feedback incorporated into the final published versions. In many cases the AIDGAP volume is the only non-technical work covering the group of taxa in question.
History of the series
The Field Studies Council recognised the widespread need for identification guides soon after its inception, and has since established a long tradition of publishing such material. Many of these were written by teaching staff writing their own keys to fill obvious gaps in the available literature (see for example A key to the land snails of the Flatford area, Suffolk (1959)). However, it became increasingly apparent that a change in approach was needed. Too few guides were available which were usable by those with little previous experience. Many groups of plants and animals appeared to be neglected.
The FSC initiated the AIDGAP project in 1976, with input from an advisory panel which included a range of organisations such as the Linnean Society, teachers in secondary education and professional illustrators. The two main objectives adopted by the panel were first to identify those groups of organisms regarded as 'difficult' due to a lack of a suitable key, and second to investigate ways of alleviating the difficulties of identification for each group. The panel also decided to incorporate a 'testing' stage during which the identification guides could be revised and improved.
In practice today, AIDGAP guides are produced as 'test
|
https://en.wikipedia.org/wiki/Pericardial%20sinus
|
The pericardial sinuses are impressions in the pericardial sac formed between the points where great vessels enter it.
Structure
There are three pericardial sinuses: superior, transverse and oblique.
The superior sinus is anterior to the ascending aorta and the pulmonary trunk. It cannot be assessed in electrophysiology procedures.
The oblique sinus is an inverted J-shaped reflection of the venae cavae and pulmonary veins. It lies behind the atria (particularly the left atrium), and in between left and right pulmonary veins.
The transverse sinus is the tunnel-shaped passage posterior to the aorta and pulmonary trunk , and anterior to the superior vena cava. This sinus is clinically important because passing one end of clamp through the sinus, and the other end anterior to the aorta/pulmonary trunk will allow complete blockage of blood output. This is performed during some heart surgeries.
Clinical significance
During pericardial effusion, fluid may build up in the pericardial sinuses. This may be diagnosed with transoesophageal echocardiography.
|
https://en.wikipedia.org/wiki/Extended%20Display%20Identification%20Data
|
Extended Display Identification Data (EDID) and Enhanced EDID (E-EDID) are metadata formats for display devices to describe their capabilities to a video source (e.g., graphics card or set-top box). The data format is defined by a standard published by the Video Electronics Standards Association (VESA).
The EDID data structure includes manufacturer name and serial number, product type, phosphor or filter type (as chromaticity data), timings supported by the display, display size, luminance data and (for digital displays only) pixel mapping data.
DisplayID is a VESA standard targeted to replace EDID and E-EDID extensions with a uniform format suited for both PC monitor and consumer electronics devices.
Background
EDID structure (base block) versions range from v1.0 to v1.4; all these define upwards-compatible 128-byte structures. Version 2.0 defined a new 256-byte structure but it has been deprecated and replaced by E-EDID which supports multiple extension blocks. HDMI versions 1.0–1.3c use E-EDID v1.3.
Before Display Data Channel (DDC) and EDID were defined, there was no standard way for a graphics card to know what kind of display device it was connected to. Some VGA connectors in personal computers provided a basic form of identification by connecting one, two or three pins to ground, but this coding was not standardized.
This problem is solved by EDID and DDC, as it enables the display to send information to the graphics card it is connected to. The transmission of EDID information usually uses the Display Data Channel protocol, specifically DDC2B, which is based on I²C-bus (DDC1 used a different serial format which never gained popularity). The data is transmitted via the cable connecting the display and the graphics card; VGA, DVI, DisplayPort and HDMI are supported.
The EDID is often stored in the monitor in the firmware chip called serial EEPROM (electrically erasable programmable read-only memory) and is accessible via the I²C-bus at address . The EDI
|
https://en.wikipedia.org/wiki/Simplified%20music%20notation
|
Simplified music notation is an alternative form of music notation designed to make sight-reading easier. It was proposed by Peter Hayes George (1927–2012). It is based on classical staff notation, but sharps and flats are incorporated into the shape of the note heads. Notes such as double sharps and double flats are written at the pitch at which they are actually played, but preceded by symbols called "history signs" to show that they have been transposed. The key signature and all other information in the original score is retained, but the player does not need to remember the key signature and accidentals while playing.
The notation was designed to help players who struggle with sight-reading, including those who suffer from working memory impairments, dyslexia and other learning difficulties.
History
Peter Hayes George (1927–2012) was born in Quebec, Canada, the son of a diplomat. He attended RADA and began his career as an actor playing roles such as the lead in Malachi's Cove directed by Charles Frank and the juvenile lead in Peter Brook's London West End production Dark of the Moon. In the 1960s he gave up acting as shortcomings with his working memory made it difficult for him to accept major roles with long speeches.
After studying music for teachers at Los Angeles City College in 1962, George took up the piano. He thought that since musicians can keep the music in front of them while playing, his memory problems would present no difficulty. However, he discovered that musicians must remember to modulate each musical note according to the key signature, to continue any accidentals through the bar, and to cancel them at the end of the bar. He also found difficulty in transposing notes such as double sharps and double flats.
His simplified music notation was designed in response to this. The original concept was formed in 1977 and the notation was developed over the next 30 years. The first series of music books in his simplified music notation was
|
https://en.wikipedia.org/wiki/Pool%20chlorine%20hypothesis
|
The pool chlorine hypothesis is the hypothesis that long-term attendance at indoor chlorinated swimming pools by children up to the age of about 6–7 years is a major factor in the rise of asthma in rich countries since the late twentieth century. A narrower version of the hypothesis, i.e. that asthma may be induced by chlorine related compounds from swimming pools, has been stated based on a small numbers of cases at least as early as 1995. An empirically motivated statement of the wider form of the hypothesis is first known to have been published on the basis of tests of the effects of nitrogen trichloride above chlorinated water on the lung as well as epidemiological evidence by a group of medical researchers led by Alfred Bernard of the Department of Public Health in the Catholic University of Louvain in Brussels, Belgium in 2003. In the epidemiological studies, the association between chlorinated swimming pools and asthma was found to be more significant than factors such as age, sex, ethnic origin, socioeconomic status, exposure to domestic animals and passive smoking (in a study in Brussels), and independent of altitude, climate, and GDP per capita (in a Europe-wide study of 21 countries).
Effects of nitrogen trichloride (trichloramine) on the human lung
Nitrogen trichloride has been directly linked as a factor causing asthma in two lifeguards and a swimming teacher. A study of 624 swimming pool workers found a significant correlation between upper respiratory symptoms and their total exposure to nitrogen trichloride. The study also found an excess risk in the workers for the specific symptoms indicative of asthma. In a study by Alfred Bernard's group, two hours exposure to an average concentration of 0.490 mg/m3 of nitrogen trichloride above a swimming pool was found in both children and adults to significantly increase the levels of the alveolar surfactant associated proteins A and B, which indicate hyperpermeability of lung epithelium. In other words, ex
|
https://en.wikipedia.org/wiki/Eigenform
|
In mathematics, an eigenform (meaning simultaneous Hecke eigenform with modular group SL(2,Z)) is a modular form which is an eigenvector for all Hecke operators Tm, m = 1, 2, 3, ....
Eigenforms fall into the realm of number theory, but can be found in other areas of math and science such as analysis, combinatorics, and physics. A common example of an eigenform, and the only non-cuspidal eigenforms, are the Eisenstein series. Another example is the Δ Function.
Normalization
There are two different normalizations for an eigenform (or for a modular form in general).
Algebraic normalization
An eigenform is said to be normalized when scaled so that the q-coefficient in its Fourier series is one:
where q = e2πiz. As the function f is also an eigenvector under each Hecke operator Ti, it has a corresponding eigenvalue. More specifically ai, i ≥ 1 turns out to be the eigenvalue of f corresponding to the Hecke operator Ti. In the case when f is not a cusp form, the eigenvalues can be given explicitly.
Analytic normalization
An eigenform which is cuspidal can be normalized with respect to its inner product:
Existence
The existence of eigenforms is a nontrivial result, but does come directly from the fact that the Hecke algebra is commutative.
Higher levels
In the case that the modular group is not the full SL(2,Z), there is not a Hecke operator for each n ∈ Z, and as such the definition of an eigenform is changed accordingly: an eigenform is a modular form which is a simultaneous eigenvector for all Hecke operators that act on the space.
In cybernetics
In cybernetics, the notion of an eigenform is understood as an example of a reflexive system. It plays an important role in the work of Heinz von Foerster, and is "inextricably linked with second order cybernetics".
|
https://en.wikipedia.org/wiki/Bombyx%20hybrid
|
The Bombyx hybrid is a hybrid between a male Bombyx mandarina moth and a female Bombyx mori moth. They produce larvae called silkworms, like all species of Bombyx. The larvae look a lot like the other variations. They are brown in the first half and gray at the bottom half, but they get larger black spots than other variations. Generally, they look like a normal Bombyx moth, but a bit darker. Hybrids are not used for silk, but for research. Because Bombyx mori males lost their ability to fly, their females are much more likely to mate with a male Bombyx mandarina. The reverse is possible, but both species have to be kept in the same container. Since Bombyx hybrids are much more common than the other variation, more is known about them.
B. mori is a domesticated version of the wild B. mandarina. This domestication occurred over 5,000 years ago.
See also
Bombyx second hybrid
|
https://en.wikipedia.org/wiki/Muscarinic%20toxin%207
|
Muscarinic toxin 7 (MT7) is one member of a family of small peptides of 65 amino acid residues
derived from the venom of African mamba snakes (Dendroaspis angusticeps), which mainly target M1-subtype of muscarinic receptor. Muscarinic toxins like the nicotinic toxins have the three-finger fold structure, characteristic of the large superfamily of toxins that act at cholinergic synapses.
MT7 is likely to bind to the human M1 receptor in its dimer form with the tips of MT7 loops II and III contacting one hM1 protomer and the tip of loop I binds to the other protomer.
|
https://en.wikipedia.org/wiki/Kokoshnik%20architecture
|
Kokoshnik is a semicircular or keel-like exterior decorative element in the Old Russian architecture, a type of corbel zakomara (that is an arch-like semicircular top of the church wall). Unlike zakomara that continues the curvature of the vault behind and carries a part of the vault's weight, kokoshnik is pure decoration and doesn't carry any weight. Kokoshnik shares its name with the traditional Russian headdress worn by women and girls. The word itself derives from the Old Slavic word kokosh, which refers to a hen or a cockerel.
Kokoshniks were used in the Russian church architecture from the 16th century, and they were especially popular in the 17th century. They were placed on walls, at the basement of tented roofs or tholobates, over the window frames, or in rows above the vaults.
Examples
External links
Kokoshnik (architecture) in the Great Soviet Encyclopedia
|
https://en.wikipedia.org/wiki/Spin%20diffusion
|
Spin diffusion describes a situation wherein the individual nuclear spins undergo continuous exchange of energy. This permits polarization differences within the sample to be reduced on a timescale much shorter than relaxation effects.
Spin diffusion is a process by which magnetization can be exchanged spontaneously between spins. The process is driven by dipolar coupling, and is therefore related to internuclear distances. Spin diffusion has been used to study many structural problems in the past, ranging from domain sizes in polymers and disorder in glassy materials to high-resolution crystal structure determination of small molecules and proteins.
In solid-state nuclear magnetic resonance, spin diffusion plays a major role in Cross Polarization (CP) experiments. As mentioned before, by transferring the magnetization (and thus the population) from nuclei with different values for the spin-lattice relaxation (T1), the overall time for the experiment is reduced. Is a very common practice when the sample contains hydrogen. Another desirable effect is that the signal to noise ratio (S/N) is increased until a theoretical factor γA/γB, being γ the gyromagnetic ratio.
Notes
Quantum field theory
Nuclear magnetic resonance
|
https://en.wikipedia.org/wiki/Center%20manifold
|
In the mathematics of evolving systems, the concept of a center manifold was originally developed to determine stability of degenerate equilibria. Subsequently, the concept of center manifolds was realised to be fundamental to mathematical modelling.
Center manifolds play an important role in bifurcation theory because interesting behavior takes place on the center manifold and in multiscale mathematics because the long time dynamics of the micro-scale often are attracted to a relatively simple center manifold involving the coarse scale variables.
Informal description
Saturn's rings capture much center-manifold geometry. Dust particles in the rings are subject to tidal forces, which act characteristically to "compress and stretch". The forces compress particle orbits into the rings, stretch particles along the rings, and ignore small shifts in ring radius. The compressing direction defines the stable manifold, the stretching direction defining the unstable manifold, and the neutral direction is the center manifold.
While geometrically accurate, one major difference distinguishes Saturn's rings from a physical center manifold. Like most dynamical systems, particles in the rings are governed by second-order laws. Understanding trajectories requires modeling position and a velocity/momentum variable, to give a tangent manifold structure called phase space. Physically speaking, the stable, unstable and neutral manifolds of Saturn's ring system do not divide up the coordinate space for a particle's position; they analogously divide up phase space instead.
The center manifold typically behaves as an extended collection of saddle points. Some position-velocity pairs are driven towards the center manifold, while others are flung away from it. Small perturbations that generally push them about randomly, and often push them out of the center manifold. There are, however, dramatic counterexamples to instability at the center manifold, called Lagrangian coheren
|
https://en.wikipedia.org/wiki/Position%20sensitive%20device
|
A position sensitive device and/or position sensitive detector (PSD) is an optical position sensor (OPS) that can measure a position of a light spot in one or two-dimensions on a sensor surface.
Principles
PSDs can be divided into two classes which work according to different principles: In the first class, the sensors have an isotropic sensor surface that supplies continuous position data. The second class has discrete sensors in an raster-like structure on the sensor surface that supply local discrete data.
Isotropic Sensors
The technical term PSD was first used in a 1957 publication by J.T. Wallmark for lateral photoelectric effect used for local measurements. On a laminar semiconductor, a so-called PIN diode is exposed to a tiny spot of light. This exposure causes a change in local resistance and thus electron flow in four electrodes. From the currents , , and in the electrodes, the location of the light spot is computed using the following equations.
and
The and are simple scaling factors, which permit transformation into coordinates.
An advantage of this process is the continuous measurement of the light spot position with measuring rates up to over 100 kHz. The dependence of local measurement on form and size of the light spot as well as the nonlinear connection are a disadvantage that can be partly compensated by special electrode shapes.
2-D tetra-lateral Position Sensitive Device (PSD)
A 2-D tetra-lateral PSD is capable of providing continuous
position measurement of the incident light spot in 2-D. It consists of a single square PIN diode with a resistive layer. When there is an incident light on the active area of the sensor, photocurrents are generated and collected from four electrodes placed along each side of the square near the boundary. The incident light position can be estimated based on currents collected from the electrodes:
and
The 2-D tetra-lateral PSD has the advantages of fast response, much lower dark current, easy bi
|
https://en.wikipedia.org/wiki/NIST%20SP%20800-90B
|
NIST SP 800-90B ("SP" stands for "special publication") is a publication by the National Institute of Standards and Technology with the title Recommendation for the Entropy Sources Used for Random Bit Generation. The publication specifies the design principles and requirements for the entropy sources used by random-bit generators, and the tests for the validation of entropy sources. These entropy sources are intended to be combined with deterministic random-bit generator mechanisms that are specified in NIST SP 800-90A to construct random-bit generators, as specified in NIST SP 800-90C.
As a work of the US Federal Government, NIST SP 800-90B is in the public domain and freely available.
NIST SP 800-90B version history
|
https://en.wikipedia.org/wiki/Entrance%20pupil
|
In an optical system, the entrance pupil is the optical image of the physical aperture stop, as 'seen' through the front (the object side) of the lens system. The corresponding image of the aperture as seen through the back of the lens system is called the exit pupil. If there is no lens in front of the aperture (as in a pinhole camera), the entrance pupil's location and size are identical to those of the aperture. Optical elements in front of the aperture will produce a magnified or diminished image that is displaced from the location of the physical aperture. The entrance pupil is usually a virtual image: it lies behind the first optical surface of the system.
The entrance pupil is a useful concept for determining the size of the cone of rays that an optical system will accept. Once the size and the location of the entrance pupil of an optical system is determined, the maximum cone of rays that the system will accept from a given object plane is determined solely by the size of the entrance pupil and its distance from the object plane, without any need to consider ray refraction by the optics.
In photography, the size of the entrance pupil (rather than the size of the physical aperture stop) is used to calibrate the opening and closing of the diaphragm aperture. The f-number ("relative aperture"), N, is defined by N = f / EN, where f is the focal length and EN is the diameter of the entrance pupil. Increasing the focal length of a lens (i.e., zooming in) will usually cause the f-number to increase, and the entrance pupil location to move further back along the optical axis.
The center of the entrance pupil is the vertex of a camera's angle of view and consequently its center of perspective, perspective point, view point, projection center or no-parallax point. This point is important in panoramic photography without digital image processing, because the camera must be rotated around the center of the entrance pupil to avoid parallax errors in the final, stitch
|
https://en.wikipedia.org/wiki/Hidradenitis%20suppurativa
|
Hidradenitis suppurativa (HS), sometimes known as acne inversa or Verneuil's disease, is a long-term dermatological condition characterized by the occurrence of inflamed and swollen lumps. These are typically painful and break open, releasing fluid or pus. The areas most commonly affected are the underarms, under the breasts, and the groin. Scar tissue remains after healing. HS may significantly limit many everyday activities, for instance, walking, hugging, moving, and sitting down. Sitting disability may occur in patients with lesions in sacral, gluteal, perineal, femoral, groin or genital regions; and prolonged periods of sitting down itself can also worsen the condition of the skin of these patients.
The exact cause is usually unclear, but believed to involve a combination of genetic and environmental factors. About a third of people with the disease have an affected family member. Other risk factors include obesity and smoking. The condition is caused by an infection, poor hygiene, or the use of deodorant. Instead, it is believed to be caused by hair follicles being obstructed, with the nearby apocrine sweat glands being strongly implicated in this obstruction. The sweat glands themselves may or may not be inflamed. Diagnosis is based on the symptoms.
No cure is known. Warm baths may be tried in those with mild disease. Cutting open the lesions to allow them to drain does not result in significant benefit. While antibiotics are commonly used, evidence for their use is poor. Immunosuppressive medication may also be tried. In those with more severe disease, laser therapy or surgery to remove the affected skin may be viable. Rarely, a skin lesion may develop into skin cancer.
If mild cases of HS are included, then the estimate of its frequency is from 1–4% of the population. Women are three times more likely to be diagnosed with it than men. Onset is typically in young adulthood and may become less common after 50 years old. It was first described between 1833
|
https://en.wikipedia.org/wiki/Emil%20J.%20Straube
|
Emil Josef Straube is a Swiss and American mathematician.
Education and career
He received from ETH Zurich in 1977 his diploma in mathematics and in 1983 his doctorate in mathematics. For the academic year 1983–1984 Straube was a visiting research scholar at the University of North Carolina at Chapel Hill. He was a visiting assistant professor from 1984 to 1986 at Indiana University Bloomington and from 1986 to 1987 at the University of Pittsburgh. From 1996 to the present, he is a full professor at Texas A&M University, where he was an assistant professor from 1987 to 1991 and an associate professor from 1991 to 1996; from 2011 to the present, he is the head of the mathematics department there. He has held visiting research positions in Switzerland, Germany, the US, and Austria.
In 1995 he was a co-winner, with Harold P. Boas, of the Stefan Bergman Prize of the American Mathematical Society. In 2006 Straube was an invited speaker at the International Congress of Mathematicians in Madrid. In 2012 he was elected a fellow of the American Mathematical Society.
Selected publications
Articles
with H. P. Boas:
with H. P. Boas:
with H. P. Boas:
with Siqi Fu:
with Marcel K. Sucheston:
Books
|
https://en.wikipedia.org/wiki/Air-to-cloth%20ratio
|
The air-to-cloth ratio is the volumetric flow rate of air (m3/minute; SI m3/second) flowing through a dust collector's inlet duct divided by the total cloth area (m2) in the filters. The result is expressed in units of velocity.
The air-to-cloth ratio is typically between 1.5 and 3.5 metres per minute, mainly depending on the concentration of dust loading.
External links
Details on how to calculate air-to-cloth ratio
Filters
Engineering ratios
|
https://en.wikipedia.org/wiki/PDE%20surface
|
PDE surfaces are used in geometric modelling and computer graphics for creating smooth surfaces conforming to a given boundary configuration. PDE surfaces use partial differential equations to generate a surface which usually satisfy a mathematical boundary value problem.
PDE surfaces were first introduced into the area of geometric modelling and computer graphics by two British mathematicians, Malcolm Bloor and Michael Wilson.
Technical details
The PDE method involves generating a surface for some boundary by means of solving an elliptic partial differential equation of the form
Here is a function parameterised by the two parameters and such that where , and are the usual cartesian coordinate space. The boundary conditions on the function and its
normal derivatives
are imposed at the edges of the surface patch.
With the above formulation it is notable that the elliptic partial differential operator in the above PDE represents a smoothing process in which the value of the function at any point on the surface is, in some sense, a weighted average of the surrounding
values. In this way, a surface is obtained as a smooth transition between
the chosen set of boundary conditions. The parameter is a special design parameter which controls the relative smoothing of the surface in the and directions.
When , the PDE is the biharmonic equation: . The biharmonic equation is the equation produced by applying the Euler-Lagrange equation to the simplified thin plate energy functional . So solving the PDE with is equivalent to minimizing the thin plate energy functional subject to the same boundary conditions.
Applications
PDE surfaces can be used in many application areas. These include computer-aided design, interactive design, parametric design, computer animation, computer-aided physical analysis and design optimisation.
Related publications
M.I.G. Bloor and M.J. Wilson, Generating Blend Surfaces using Partial Differential Equations, Computer Aided Desig
|
https://en.wikipedia.org/wiki/Carotid%20groove
|
The carotid groove is an anatomical groove in the sphenoid bone located above the attachment of each great wing of the sphenoid bone. The groove is curved like the italic letter f, and lodges the internal carotid artery and the cavernous sinus.
|
https://en.wikipedia.org/wiki/Exotic%20Zoology
|
Exotic Zoology is a 1959 cryptozoological book by Willy Ley, a science writer and space advocate. The illustrator of the book is Olga Ley.
Content
Ley had written a number of books containing scientific oddities; Exotic Zoology collects the cryptozoological matter from those books. Throughout the book he shows examples of organisms that were rumored to exist, or were thought to be impossible, that were shown to be real; and others that were accepted as fact, that were discovered to have never existed: "He speculates about dragons and sea serpents, wingless birds and Abominable Snowmen." The book, in its description of (fictional) peoples and creatures, has been compared to John Mandeville's Travels. Some of the claims have been criticized or ridiculed, for instance the statement that giant squids had left scars on whales of two feet in diameter.
Exotic Zoology was not reviewed in many academic journals. An exception was a review in the Science journal, in 1959.
|
https://en.wikipedia.org/wiki/UCIe
|
Universal Chiplet Interconnect Express (UCIe) is an open specification for a die-to-die interconnect and serial bus between chiplets. It is co-developed by AMD, Arm, ASE Group, Google Cloud, Intel, Meta, Microsoft, Qualcomm, Samsung, and TSMC.
In August 2022, Alibaba Group and Nvidia joined as board members.
Overview
A common chiplet interconnect specification enables construction of large System-on-Chip (SoC) packages that exceed maximum reticle size. It allows intermixing components from different silicon vendors within the same package and improves manufacturing yields by using smaller dies. Each chiplet can use a different silicon manufacturing process, suitable for a specific device type, or computing performance and power draw requirements.
Specifications
The UCIe 1.0 specification was released on March 2, 2022. It defines physical layer, protocol stack and software model, as well as procedures for compliance testing. The physical layer supports up to 32 GT/s with 16 to 64 lanes and uses a 256 byte Flow Control Unit (FLIT) for data, similar to PCIe 6.0; the protocol layer is based on Compute Express Link with CXL.io (PCIe), CXL.mem and CXL.cache protocols.
Various on-die interconnect technologies are defined, like organic substrate for a 'standard' 2D package, or embedded silicon bridge (EMIB), silicon interposer, and fanout embedded bridge for 'advanced' 2.5D/3D packages. Physical specifications are based on Intel's Advanced Interface Bus (AIB).
Shorter signal paths allow the links to have 20× better I/O performance and power consumption (~0.5 pJ per bit) comparing to typical PCIe SerDes, with bandwidth density up to 1.35 TByte/s per mm2 for a common bump pitch of 45 μm, and 3.24× higher density with a bump pitch of 25 μm.
Future versions may include additional protocols, wider data links, and higher density connections.
The UCIe 1.1 specification was released on August 8, 2023.
|
https://en.wikipedia.org/wiki/Paleobiota%20of%20the%20Chinle%20Formation
|
The Chinle Formation is an extensive geological unit in the southwestern United States, preserving a very diverse fauna of Late Triassic (primarily Norian-age) animals and plants. This is a list of fossilized organisms recovered from the formation.
Amniotes
Archosauromorphs
Crurotarsans
Other Archosauromorphs
Other amniotes
Amphibians
Cartilaginous fish
Lobe-finned fish
Coelacanths
Lungfish
Ray-finned fish
Plants
The Chinle Formation has a diverse flora of plant megafossils, though they are concentrated in only a few sites with suitable conditions. One of the most diverse floral communities is found near Fort Wingate, New Mexico. Paleobotanists have traditionally placed the Fort Wingate plant beds into the Monitor Butte Member, though more recently they are placed within the Bluewater Creek Formation, a subunit of the Chinle Formation first defined in 1989. Some Fort Wingate plant fossils belong to the "Lake Ciniza beds", a localized patch of grey mudstone corresponding to an ancient lake.
Another productive areas for plant fossils is Petrified Forest National Park in Arizona. Though petrified wood could be found through the entire stratigraphy of the park, most other plant fossils are exclusive to greenish mudstone layers adjacent to the Newspaper Rock sandstone bed in the Blue Mesa Member (formerly known as the "Lower Petrified Forest").
Conifers are the most common and diverse plants, including petrified wood and leafy branches from massive trees (Araucarioxylon, Pagiophyllum) as well as smaller shrubby forms (Pelourdea). Cycad and bennettitalean leaves and other remains make up a significant portion of the flora (Zamites, Nilssoniopteris, Williamsonia, etc.). Ferns (Cladophlebis, Phlebopteris, Clathropteris, Cynepteris, etc.) are abundant, with a range of growth habits including low shrubs, tree ferns, and palm-like fronds comparable to their modern relatives. Sphenophytes (horsetails: Neocalamites, Equistetites, Schizoneura, etc.) have low diversi
|
https://en.wikipedia.org/wiki/Oxygen%20evolution
|
Oxygen evolution is the process of generating molecular oxygen (O2) by a chemical reaction, usually from water. Oxygen evolution from water is effected by oxygenic photosynthesis, electrolysis of water, and thermal decomposition of various oxides. The biological process supports aerobic life. When relatively pure oxygen is required industrially, it is isolated by distilling liquefied air.
Oxygen evolution in nature
Photosynthetic oxygen evolution is the fundamental process by which oxygen is generated in the earth's biosphere. The reaction is part of the light-dependent reactions of photosynthesis in cyanobacteria and the chloroplasts of green algae and plants. It utilizes the energy of light to split a water molecule into its protons and electrons for photosynthesis. Free oxygen, generated as a by-product of this reaction, is released into the atmosphere.
Water oxidation is catalyzed by a manganese-containing cofactor contained in photosystem II, known as the oxygen-evolving complex (OEC) or the water-splitting complex. Manganese is an important cofactor, and calcium and chloride are also required for the reaction to occur. The stoichiometry of this reaction is as follows:
2H2O ⟶ 4e− + 4H+ + O2
The protons are released into the thylakoid lumen, thus contributing to the generation of a proton gradient across the thylakoid membrane. This proton gradient is the driving force for adenosine triphosphate (ATP) synthesis via photophosphorylation and the coupling of the absorption of light energy and the oxidation of water for the creation of chemical energy during photosynthesis.
History of discovery
It was not until the end of the 18th century that Joseph Priestley accidentally discovered the ability of plants to "restore" air that had been "injured" by the burning of a candle. He followed up on the experiment by showing that air "restored" by vegetation was "not at all inconvenient to a mouse." He was later awarded a medal for his discoveries that "...no vegetabl
|
https://en.wikipedia.org/wiki/Rotational%E2%80%93vibrational%20coupling
|
In physics, rotational–vibrational coupling occurs when the rotation frequency of a system is close to or identical to a natural internal vibration frequency. The animation on the right shows ideal motion, with the force exerted by the spring and the distance from the center of rotation increasing together linearly with no friction.
In rotational-vibrational coupling, angular velocity oscillates. By pulling the circling masses closer together, the spring transfers its stored strain energy into the kinetic energy of the circling masses, increasing their angular velocity. The spring cannot bring the circling masses together, since the spring's pull weakens as the circling masses approach. At some point, the increasing angular velocity of the circling masses overcomes the pull of the spring, causing the circling masses to increasingly distance themselves. This increasingly strains the spring, strengthening its pull and causing the circling masses to transfer their kinetic energy into the spring's strain energy, thereby decreasing the circling masses' angular velocity. At some point, the pull of the spring overcomes the angular velocity of the circling masses, restarting the cycle.
In helicopter design, helicopters must incorporate damping devices, because at specific angular velocities, the rotorblade vibrations can reinforced themselves by rotational-vibrational coupling, and build up catastrophically. Without damping, these vibrations would cause the rotorblades to break loose.
Energy conversions
The animation on the right provides a clearer view on the oscillation of the angular velocity. There is a close analogy with harmonic oscillation.
When a harmonic oscillation is at its midpoint then all the energy of the system is kinetic energy. When the harmonic oscillation is at the points furthest away from the midpoint all the energy of the system is potential energy. The energy of the system is oscillating back and forth between kinetic energy and potential ener
|
https://en.wikipedia.org/wiki/Interferon%20gamma%20receptor%20%28IFNGR1%29%20family
|
In molecular biology, the interferon gamma receptor (IFNGR1) family is a family of proteins which includes several eukaryotic and viral interferon gamma receptor proteins.
Members of this family include:
The human interferon gamma receptor 1, which is a member of the hematopoietic cytokine receptor superfamily. It is expressed in a membrane-bound form in many cell types, and is over-expressed in tumour cells. It comprises an extracellular portion of 229 amino acid residues, a single transmembrane region, and a cytoplasmic domain of 221 amino acid residues. As with other members of its superfamily, the cytokine-binding sites are formed by a small set of closely spaced surface loops that extend from a beta-sheet core, much like antigen-binding sites on antibodies.
The vaccinia virus interferon (IFN)-gamma receptor (IFN-gammaR), which is a 43 kDa soluble glycoprotein that is secreted from infected cells early during infection. IFN-gammaR from vaccinia virus, cowpox virus and camelpox virus exist naturally as homodimers, whereas the cellular IFN-gammaR dimerises only upon binding the homodimeric IFN-gamma. The existence of the virus protein as a dimer in the absence of ligand may provide an advantage to the virus in efficient binding and inhibition of IFN-gamma in solution.
|
https://en.wikipedia.org/wiki/Law%20of%20cosines
|
In trigonometry, the law of cosines (also known as the cosine formula or cosine rule) relates the lengths of the sides of a triangle to the cosine of one of its angles. For a triangle with sides and opposite respective angles and (see Fig. 1), the law of cosines states:
The law of cosines generalizes the Pythagorean theorem, which holds only for right triangles: if is a right angle then and the law of cosines reduces to
The law of cosines is useful for solving a triangle when all three sides or two sides and their included angle are given.
Use in solving triangles
The theorem is used in solution of triangles, i.e., to find (see Figure 3):
the third side of a triangle if one knows two sides and the angle between them:
the angles of a triangle if one knows the three sides:
the third side of a triangle if one knows two sides and an angle opposite to one of them (this side can also be found by two applications of the law of sines):
These formulas produce high round-off errors in floating point calculations if the triangle is very acute, i.e., if is small relative to and or is small compared to 1. It is even possible to obtain a result slightly greater than one for the cosine of an angle.
The third formula shown is the result of solving for a in the quadratic equation . This equation can have 2, 1, or 0 positive solutions corresponding to the number of possible triangles given the data. It will have two positive solutions if , only one positive solution if , and no solution if . These different cases are also explained by the side-side-angle congruence ambiguity.
History
Book II of Euclid's Elements, compiled c. 300 BC from material up to a century or two older, contains a geometric theorem corresponding to the law of cosines but expressed in the contemporary language of rectangle areas; Hellenistic trigonometry developed later, and sine and cosine per se first appeared centuries afterward in India.
The cases of obtuse triangles and acute triangle
|
https://en.wikipedia.org/wiki/Huntington%20Society%20of%20Canada
|
The Huntington Society of Canada (HSC) (French: Société Huntington du Canada, SHC) is a non-profit organisation that supports people in Canada affected by the genetic neurodegenerative brain condition Huntington's disease (HD).
The HSC was founded in 1973 and is based in Waterloo, Ontario. It delivers support services to patients and carers, provides educational resources and funds research into the development of Huntington's disease treatments.
The HSC's logo depicts a stylized amaryllis flower, an internationally used symbol of the movement to combat HD.
|
https://en.wikipedia.org/wiki/Lawrence%20Zalcman
|
Lawrence Allen Zalcman (June 9, 1943 – May 31, 2022) was a professor (and later a professor emeritus) of Mathematics at Bar-Ilan University in Israel. His research primarily concerned Complex analysis, potential theory, and the relations of these ideas to approximation theory, harmonic analysis, integral geometry and partial differential equations. On top of his scientific achievements, Zalcman received numerous awards for mathematical exposition, including the Chauvenet Prize in 1976, the Lester R. Ford Award in 1975 and 1981, and the Paul R. Halmos – Lester R. Ford Award in 2017. In addition to Bar-Ilan University, Zalcman taught at the University of Maryland and Stanford University in the United States.
Life and career
Zalcman was born in Kansas City, Missouri on June 9, 1943. In 1961, he graduated from Southwest High School in Kansas City, Missouri before continuing his education at Dartmouth College, where he would graduate in 1964. Zalcman went on to receive his Ph.D. from the Massachusetts Institute of Technology in 1968 under the supervision of Kenneth Myron Hoffman. In 2012, Zalcman became a fellow of the American Mathematical Society.
In the theory of normal families, Zalcman's Lemma, which he used as part of his treatment of Bloch's principle, is named after him. Other eponymous honors are Zalcman domains, which play a role in the classification of Riemann surfaces, and Zalcman functions in complex dynamics. In the theory of partial differential equations, the Pizzetti-Zalcman formula is partially named after him.
Lawrence Zalcman died in Jerusalem on May 31, 2022.
Selected publications
with Peter Lax: Complex proofs of real theorems, American Mathematical Society 2012
|
https://en.wikipedia.org/wiki/Lysimeter
|
A lysimeter (from Greek λύσις (loosening) and the suffix -meter) is a measuring device which can be used to measure the amount of actual evapotranspiration which is released by plants (usually crops or trees). By recording the amount of precipitation that an area receives and the amount lost through the soil, the amount of water lost to evapotranspiration can be calculated.
Lysimeters are of two types: weighing and non-weighing.
General Usage
A lysimeter is most accurate when vegetation is grown in a large soil tank which allows the rainfall input and water lost through the soil to be easily calculated. The amount of water lost by evapotranspiration can be worked out by calculating the difference between the weight before and after the precipitation input.
For trees, lysimeters can be expensive and are a poor representation of conditions outside of a laboratory or orchard, as it would be impossible to use a lysimeter to calculate the water balance for a whole forest. But for farm crops, a lysimeter can represent field conditions well since the device is installed and used outside the laboratory. A weighing lysimeter, for example, reveals the amount of water crops use by constantly weighing a huge block of soil in a field to detect losses of soil moisture (as well as any gains from precipitation). An example of their use is in the development of new xerophytic apple tree cultivars in order to adapt to changing climate patterns of reduced rainfall in traditional apple growing regions.
The University of Arizona's Biosphere 2 built the world's largest weighing lysimeters using a mixture of thirty 220,000 and 333,000 lb-capacity column load cells from Honeywell, Inc. as part of its Landscape Evolution Observatory project.
Use in whole plant physiological phenotyping systems
To date, physiology-based, high-throughput phenotyping systems (also known as plant functional phenotyping systems), which, used in combination with soil–plant–atmosphere continuum (SPAC) meas
|
https://en.wikipedia.org/wiki/Polish%20z%C5%82oty
|
The Polish złoty (alternative spelling: zloty; Polish: polski złoty, ; abbreviation: zł; code: PLN) is the official currency and legal tender of Poland. It is subdivided into 100 grosz (gr). It is the most traded currency in Central and Eastern Europe and ranks 21st most-traded in the foreign exchange market.
The word złoty is a masculine form of the Polish adjective 'golden', which closely relates with its name to the guilder whereas the grosz subunit was based on the groschen, cognate to the English word groat. It was officially introduced to replace its predecessor, the Polish marka, on 28 February 1919 and began circulation in 1924. The only bodies permitted to manufacture or mint złoty coins and banknotes are Polish Security Printing Works (PWPW), founded in Warsaw on 25 January 1919, and Mennica Polska, founded in Warsaw on 10 February 1766.
As a result of inflation in the early 1990s, the currency underwent redenomination. Thus, on 1 January 1995, 10,000 old złoty (PLZ) became one new złoty (PLN). As a member of the European Union, Poland is obligated to adopt the euro when all specific conditions are met, however there is no time limit for fulfilling all of them.
Name and plural forms
The term "złoty" is an adjective derived from the noun "złoto", which in the Polish language denotes gold. A literal translation of the currency's name would be "golden" or "the golden one". The closest English pronunciation of the word is . There are two plural forms – złote as well as złotych , and their correct usage is as follows:
1 – złoty or grosz /
2...4; 22...24; 32...34 (...), 102...104, 122...124, 132...134, (...) – złote or grosze /
0, 5...21; 25...31; 35...41 (...); 95...101; 105...121; 125...131; (...) – złotych or groszy /
Fractions should be rendered with złotego and grosza , for example 0.1 złotego; 2.5 złotego and so on.
Native English speakers or English-language sources tend to avoid the complexity of plural forms and in turn use "złoty" for
|
https://en.wikipedia.org/wiki/Condensing%20osteitis
|
Condensing osteitis is a periapical inflammatory disease that results from a reaction to a dental related infection. This causes more bone production rather than bone destruction in the area (most common site is near the root apices of premolars and molars). The lesion appears as a radiopacity in the periapical area hence the sclerotic reaction. The sclerotic reaction results from good patient immunity and a low degree of virulence of the offending bacteria. The associated tooth may be carious or contains a large restoration, and is usually associated with a non-vital tooth. It was described by Dr. Carl Garré in 1893.
Cause
Infection of periapical tissues of a high immunity host by organisms of low virulence which leads to a localized bony reaction to a low grade inflammatory stimulus.
Diagnosis
1- TENDERNESS ON VERTICAL PERCUSSION.
Differential diagnosis
1- Idiopathic osteosclerosis.
2- cementoblastoma.
NOTE: An abnormal result with pulp testing strongly suggests condensing osteitis and tends to rule out osteosclerosis and cementoblastoma.
Treatment
The process is usually asymptomatic and benign, in most cases the tooth will require root canal treatment. endodontic treatment.
The offending tooth should be tested for vitality of the pulp, if inflamed or necrotic, then endodontic treatment is required as soon as possible, while hopeless teeth should be extracted.
Prognosis
The prognosis is excellent, once root canal treatment is completed.
If the offending tooth is extracted, the area of condensing osteitis may remain in the jaws indefinitely, which is termed osteosclerosis or bone scar.
|
https://en.wikipedia.org/wiki/MED29
|
Mediator of RNA polymerase II transcription subunit 29 (Med29) is a transcription suppressor that in humans is encoded by the MED29 gene. It represents subunit MED29 of the Mediator complex.
Med29, along with Med11 and Med28 in mammals, is part of the core head-region of the Mediator complex. Med29 is the apparent orthologue of the Drosophila melanogaster Intersex protein (IXL), which interacts directly with, and functions as a transcriptional coactivator for, the DNA-binding transcription factor Doublesex, so it is likely that mammalian Med29 serves as a target for one or more DNA-binding transcriptional activators.
See also
Mediator
|
https://en.wikipedia.org/wiki/Photography%20and%20the%20law
|
The intellectual property rights on photographs are protected in different jurisdictions by the laws governing copyright and moral rights. In some cases photography may be restricted by civil or criminal law. Publishing certain photographs can be restricted by privacy or other laws. Photography can be generally restricted in the interests of public morality and the protection of children.
Reactions to photography differ between societies, and even where there are no official restrictions there may be objections to photographing people or places. Reactions may range from complaints to violence for photography which is not illegal.
Australia
General
Australia's laws in relation to this matter are similar to that of the United States. In Australia you can generally photograph anything or anyone in a public place without permission assuming that it isn't being used in an otherwise illegal way such as defamation and does not contain copyrighted material. Furthermore photographing in a place where people would reasonably expect to be afforded privacy such as in a public restroom may also be illegal.
Private property
While one can generally photograph private property and the people within it if the photographer is not within the bounds of the private property and cannot be asked to stop or delete the images, the owner can restrict recording whilst the photographer is on the private property. Failure to comply with orders to stop recording on the private property is not a criminal offence although it may be against the terms or policy of entrance and the photographer may be asked to leave; if they refuse to leave, they may be liable for trespassing.
Publishing and rights
The photographer generally has full rights of the images meaning they can publish it to places such as social media without permission from the people in the image. However, there are exceptions in the following scenarios:
A breach of the Privacy Act 1988
Was taken while trespassing on private pr
|
https://en.wikipedia.org/wiki/Battery%20tester
|
A battery tester is an electronic device intended for testing the state of an electric battery, going from a simple device for testing the charge actually present in the cells and/or its voltage output, to a more comprehensive testing of the battery's condition, namely its capacity for accumulating charge and any possible flaws affecting the battery's performance and security.
Simple battery testers
The most simple battery tester is a DC ammeter, that indicates the battery's charge rate.
DC voltmeters can be used to estimate the charge rate of a battery, provided that its nominal voltage is known.
Integrated battery testers
There are many types of integrated battery testers, each one corresponding to a specific condition testing procedure, according to the type of battery being tested, such as the “421” test for lead-acid vehicle batteries. Their common principle is based on the empirical fact that after having applied a given current for a given number of seconds to the battery, the resulting voltage output is related to the battery's overall condition, when compared to a healthy battery's output.
|
https://en.wikipedia.org/wiki/Spiez%20Laboratory
|
The Spiez Laboratory (German: Labor Spiez, French: Laboratoire de Spiez, Italian: Laboratorio Spiez) is the Swiss institute for the protection of the population against nuclear, biological and chemical threats and dangers. It is part of the Federal Department of Defence, Civil Protection and Sports (DDPS) and is located in Spiez. The Spiez Laboratory is one of the five labs in the world permanently certified by the Organisation for the Prohibition of Chemical Weapons.
Tasks
NBC Protection
Development of fundamentals of NBC protective materials and coordination of national NBC-protection.
Operation of testing laboratories for the authorization and supervision of NBC protective materials.
Biology
Analysis and diagnosis of biological agents and toxins.
Chemistry
Analysis of samples of Chemical warfare agents and related compounds (Accredited laboratory of the OPCW).
Evaluation of detection and detoxification agents of chemical warfare agents.
Production of chemical warfare agents as reference substances.
Physics
Radioactivity measurements. Environmental testing. Member of the ALMERA network of the IAEA.
Arms control
Technical advice of the Swiss Confederation with International negotiations on Disarmament and arms control.
International activities
Spiez Laboratory is an internationally recognized center of excellence and works with the United Nations (UN), the Organisation for the Prohibition of Chemical Weapons (OPCW), the United Nations Environment Programme (UNEP), the International Atomic Energy Agency (IAEA) the World Trade Organization (WTO) and the International Committee of the Red Cross (ICRC). Also, Spiez Laboratory provides various posts in the NATO program "Partnership for Peace". It is led by Marc Cadisch and appr. 100 civil employees. It can request at any time personnel and equipment of the NBC Troops of the Swiss Armed Forces, if needed. This includes special hardware like the Mowag DuroIIIP based NBC
verification Laboratory, Or Swiss Air Force
|
https://en.wikipedia.org/wiki/Huainan%20biota
|
The Huainan biota is a collection of macroscopic skeletal organisms discovered in the early 1980s by Wang and Sun Weiguo in the Precambrian deposits of China (Huainan City, Anhui Province) with an age of 840-740 Ma (Tonian). A similar biota was also found by M. B. Gnilovskaya in Russia, on the Timan Ridge; its age is about 1 billion years.
So far, it has been poorly studied. It is only known that its constituent organisms (Protoarenicola, Pararenicola, Sinosabellidites) reached several centimeters in size (which is significantly inferior to the Ediacaran ones) and, apparently, had the shape of segmented tubes, often goblet-shaped, with extensions at the end. Assumptions have been made about both the animal (worm-like) and algal nature of these organisms.
Huainan biota do not contain jellyfish-like "discs" (as does the Ediacaran biota), nor any forms close to sponges (the most primitive of modern animal groups, with the exception of Trichoplax); apparently, the Huainan biota cannot be considered ancestral either to the Ediacaran, or even more so to the modern (Phanerozoic).
See also
Otavia
|
https://en.wikipedia.org/wiki/Multiple%20subset%20sum
|
The multiple subset sum problem is an optimization problem in computer science and operations research. It is a generalization of the subset sum problem. The input to the problem is a multiset of n integers and a positive integer m representing the number of subsets. The goal is to construct, from the input integers, some m subsets. The problem has several variants:
Max-sum MSSP: for each subset j in 1,...,m, there is a capacity Cj. The goal is to make the sum of all subsets as large as possible, such that the sum in each subset j is at most Cj.
Max-min MSSP (also called bottleneck MSSP or BMSSP): again each subset has a capacity, but now the goal is to make the smallest subset sum as large as possible.
Fair SSP: the subsets have no fixed capacities, but each subset belongs to a different person. The utility of each person is the sum of items in his/her subsets. The goal is to construct subsets that satisfy a given criterion of fairness, such as max-min item allocation.
Max-sum and max-min MSSP
When m is variable (a part of the input), both problems are strongly NP-hard, by reduction from 3-partition. This means that they have no fully polynomial-time approximation scheme (FPTAS) unless P=NP.
Even when m=2, the problems do not have an FPTAS unless P=NP. This can be shown by a reduction from the equal-cardinality partition problem (EPART):
Given an instance a1,...,an of EPART with target sum T, construct an instance 2T+a1, ..., 2T+an of MSSP with target sum (n+1)T for both subsets.
A solution to EPART consists of two parts, each of which has n/2 elements with a sum of T. It corresponds to an optimal solution of both MSSP variants: two subsets with a sum of (n+1)T, which is the largest possible. Similarly, each optimal solution of MSSP corresponds to a solution to EPART.
Any non-optimal solution to MSSP leaves at least one item unallocated, so its sum is at most 2nT and its minimum is at most nT. In both variants, the approximation ratio is at most .
Ther
|
https://en.wikipedia.org/wiki/Relative%20likelihood
|
In statistics, when selecting a statistical model for given data, the relative likelihood compares the relative plausibilities of different candidate models or of different values of a parameter of a single model.
Relative likelihood of parameter values
Assume that we are given some data for which we have a statistical model with parameter . Suppose that the maximum likelihood estimate for is . Relative plausibilities of other values may be found by comparing the likelihoods of those other values with the likelihood of . The relative likelihood of is defined to be
where denotes the likelihood function. Thus, the relative likelihood is the likelihood ratio with fixed denominator .
The function
is the relative likelihood function.
Likelihood region
A likelihood region is the set of all values of whose relative likelihood is greater than or equal to a given threshold. In terms of percentages, a % likelihood region for is defined to be.
If is a single real parameter, a % likelihood region will usually comprise an interval of real values. If the region does comprise an interval, then it is called a likelihood interval.
Likelihood intervals, and more generally likelihood regions, are used for interval estimation within likelihood-based statistics ("likelihoodist" statistics): They are similar to confidence intervals in frequentist statistics and credible intervals in Bayesian statistics. Likelihood intervals are interpreted directly in terms of relative likelihood, not in terms of coverage probability (frequentism) or posterior probability (Bayesianism).
Given a model, likelihood intervals can be compared to confidence intervals. If is a single real parameter, then under certain conditions, a 14.65% likelihood interval (about 1:7 likelihood) for will be the same as a 95% confidence interval (19/20 coverage probability). In a slightly different formulation suited to the use of log-likelihoods (see Wilks' theorem), the test statistic is twice the differenc
|
https://en.wikipedia.org/wiki/TPS%20report
|
A TPS report ("test procedure specification") is a document used by a quality assurance group or individual, particularly in software engineering, that describes the testing procedures and the testing process.
Definition
The official definition and creation is provided by the Institute of Electrical and Electronics Engineers (IEEE) as follows:
In popular culture
Office Space
Its use in popular culture increased after the comedic 1999 film Office Space. In the movie, multiple managers and coworkers inquire about an error that protagonist Peter Gibbons (played by Ron Livingston) makes in omitting a cover sheet to send with his "TPS reports". It is used by Gibbons as an example that he has eight different bosses to whom he directly reports. According to the film's writer and director Mike Judge, the abbreviation stood for "Test Program Set" in the movie.
After Office Space, "TPS report" has come to connote pointless, mindless paperwork, and an example of "literacy practices" in the work environment that are "meaningless exercises imposed upon employees by an inept and uncaring management" and "relentlessly mundane and enervating".
Other references and allusions
In King of the Hill (also produced by Mike Judge), Kahn is being chewed out, then remarks to his boss "No sir, I filed my TPS report yesterday."
The 2015 puzzle video game Please, Don't Touch Anything featured the question "What is a TPS Report?" as one of many hidden clues that lead to a unique ending.
In Lost season 1, episode 4, John Locke's boss says "Locke, I told you I need those TPS reports done by noon today."
In Ralph Breaks the Internet, a TPS report is visibly hanging in one of the cubicles seen during Ralph's viral video montage. However, it was incorrectly placed in a cubicle in the accounting department, where TPS reports are not functionally relevant.
In Borderlands 2, a legendary weapon is named the "Actualizer" with a flavor text description of "We need to talk about your DPS reports",
|
https://en.wikipedia.org/wiki/Eyes%20%28cheese%29
|
Eyes are the round holes that are a characteristic feature of Swiss-type cheese (e.g. Emmentaler cheese) and some Dutch-type cheeses. The eyes are bubbles of carbon dioxide gas. The gas is produced by various species of bacteria in the cheese.
Swiss cheese
In Swiss-type cheeses, the eyes form as a result of the activity of propionic acid bacteria (propionibacteria), notably Propionibacterium freudenreichii subsp. shermanii. These bacteria transform lactic acid into propionic acid and carbon dioxide, according to the formula:
3 Lactate → 2 Propionate + Acetate + CO2 + H2O
The CO2 so produced accumulates at weak points in the curd, where it forms the bubbles that become the cheese's eyes. Not all CO2 is so trapped: in an cheese, about 20 L CO2 remain in the eyes, while 60 L remain dissolved in the cheese mass and 40 L are lost from the cheese.
Dutch cheese
In Dutch-type cheeses, the CO2 that forms the eyes results from the metabolisation of citrate by citrate-positive ("Cit+") strains of lactococci.
Bibliography
Polychroniadou, A. (2001). Eyes in cheese: a concise review. Milchwissenschaft 56, 74–77.
|
https://en.wikipedia.org/wiki/Scottish%20National%20Dictionary
|
The Scottish National Dictionary (SND) was published by the Scottish National Dictionary Association (SNDA) from 1931 to 1976 and documents the Modern (Lowland) Scots language. The original editor, William Grant, was the driving force behind the collection of Scots vocabulary. A wide range of sources were used by the editorial team in order to represent the full spectrum of Scottish vocabulary and cultural life.
Literary sources of words and phrases up to the mid-twentieth century were thoroughly investigated, as were historical records, both published and unpublished, of Parliament, Town Councils, Kirk Sessions and Presbyteries and Law Courts. More ephemeral sources such as domestic memoirs, household account books, diaries, letters and the like were also read for the dictionary, as well as a wide range of local and national newspapers and magazines, which often shed light on regional vocabulary and culture.
Perhaps because Scots has often been perceived as inappropriate for formal situations (including formal written text) during the period from 1700 to the present day, many words and expressions that were in regular everyday use did not appear in print. In order to redress this imbalance and fully appreciate the linguistic oral heritage of Scots, field-workers for the dictionary collected personal quotations across the country.
David Murison became editor of the dictionary in 1946, after William Grant's death. He greatly increased the number and range of written sources and expanded the coverage of oral material. He improved the layout and clarity of the entries, revealing the healthy position of modern Scots usage in spite of centuries of neglect. Murison was therefore instrumental in encouraging the study of modern Scots and fostering respect for it as a language. He was responsible for the completion of Volume III, and for overall control of Volumes IV to X.
In 1985, the one-volume Concise Scots Dictionary based on the SND and DOST was published (editor-in
|
https://en.wikipedia.org/wiki/Channel%20capacity
|
Channel capacity, in electrical engineering, computer science, and information theory, is the tight upper bound on the rate at which information can be reliably transmitted over a communication channel.
Following the terms of the noisy-channel coding theorem, the channel capacity of a given channel is the highest information rate (in units of information per unit time) that can be achieved with arbitrarily small error probability.
Information theory, developed by Claude E. Shannon in 1948, defines the notion of channel capacity and provides a mathematical model by which it may be computed. The key result states that the capacity of the channel, as defined above, is given by the maximum of the mutual information between the input and output of the channel, where the maximization is with respect to the input distribution.
The notion of channel capacity has been central to the development of modern wireline and wireless communication systems, with the advent of novel error correction coding mechanisms that have resulted in achieving performance very close to the limits promised by channel capacity.
Formal definition
The basic mathematical model for a communication system is the following:
where:
is the message to be transmitted;
is the channel input symbol ( is a sequence of symbols) taken in an alphabet ;
is the channel output symbol ( is a sequence of symbols) taken in an alphabet ;
is the estimate of the transmitted message;
is the encoding function for a block of length ;
is the noisy channel, which is modeled by a conditional probability distribution; and,
is the decoding function for a block of length .
Let and be modeled as random variables. Furthermore, let be the conditional probability distribution function of given , which is an inherent fixed property of the communication channel. Then the choice of the marginal distribution completely determines the joint distribution due to the identity
which, in turn, induces a mutual infor
|
https://en.wikipedia.org/wiki/Sign%20war
|
A sign war is a competition between two or more organizations to gain the best visibility, or simply to engage in friendly "one-upmanship". The goal may be to put up more signs than one's competitors, or it may be to put up wittier signs.
Business sign wars
Sign wars between local businesses may consist of good spirited jabs at one another. For example, a sign war in Christiansburg, Virginia in 2021 started when a local music store challenged their neighboring shoe store to a sign war. The good-hearted "war" spread across town and attracted national attention.
Political campaigns
In politics, sign wars are competitions between opposing political campaigns at events and/or locations where campaign visibility is paramount to each side. During a sign war, campaign workers, both staffers and volunteers, seek to have a greater sign presence than their opposition. Sign wars may consist of tens of thousands of signs in standard sizes ranging from placards to 4'x8's and may include a wide variety of signs that have been improvised by campaigns and their volunteers.
Sign wars as a campaign tactic
Journalists frequently report on sign wars during the campaign season. Particularly for campaigns that aren't large enough to have a regular stream of polling data for the local news media to report on, journalists will use other numbers based metrics such as the number of yard signs for each candidate in the district to help gauge support for individual candidates.
Candidates and campaign staff often stoke the fires of election sign wars to claim that their candidate has popular support among the voters in the district.
Notable political sign wars
A notable sign war occurs during the popular Shad Planking in Wakefield, Virginia. Every April, locals and politicians from all around the Commonwealth gather for some politicking, beer drinking, and fish eating.
Nationally, in August 2007, Democrat presidential hopefuls John Edwards and Barack Obama each claimed victory fo
|
https://en.wikipedia.org/wiki/Ezili%20Dantor
|
Ezilí Dantor or Erzulie Dantò is the main loa (or lwa) or senior spirit of the Petro family in Haitian Vodou. Ezili Danto, or Ezili Dantò, is the "manifestation of Erzulie, the divinity of love,". It is said that Ezili Danto has a dark complexion and is maternal in nature. The Ezili are feminine spirits in Haitian vodou culture that personify womanhood. The Erzulie is a goddess, spirit, or loa of love in Haitian voudou. She has several manifestations or incarnations, but most prominent and well-known manifestations are Lasirenn (the mermaid), Erzulie Freda, and Erzulie Dantor. There are spelling variations of Erzulie, the other being Ezili. They are English interpretations of a Creole word, but do not differ in meaning.
Worship
Tuesdays are the days reserved to worship Ezili Dantor. Worship is normally done in solitary in front of an altar identified by the colours blue, green and red. The most recurrent sacrifices consist of créme de cacáo, jewels, golden rings and Agua de Florida. For her birthday a wild pig is normally the main sacrifice.
Haitian Mythology
In Haitian mythology, there are multiple spiritual entities, or lwa, that work between this world (the mortal world) and the divine world. Ezili are feminine spirits that personify different aspects of womanhood. Ezili Freda is a Rada Lwa who represents romantic love and erotic sexuality, while Ezili Dantor is Petro and represents the hardworking and sometimes angry mother, although she is also known to take on lovers of her own. Ezili Dantor is believed to have children of her own in some stories, such as Ti-Jean Petwo, and is a fervid protector of the youth and the marginalized.
Ezilí Freda is Dantor's rival and is said to be responsible for leaving scars on Dantor's cheek -known as twa màk- during a fight over the love of Ogou, according to some legends. Another distinction between them is that Freda is light-skinned and relatively wealthy, indicative of her status as an upper-class woman. Thus, Ezili D
|
https://en.wikipedia.org/wiki/Sleep%20efficiency
|
Sleep efficiency (SE) is the ratio between the time a person spends asleep, and the total time dedicated to sleep (i.e. both sleeping and attempting to fall asleep or fall back asleep). It is given as a percentage. SE of 80% or more is considered normal/healthy with most young healthy adults displaying SE above 90%. SE can be determined with a polysomnograph and is an important parameter of a sleep study.
Sleep efficiency is often described as the ratio between time spent asleep ("total sleep time (TST)"), and time spent "in bed" ("time in bed (TIB)"), however, TIB does not encompass "non-sleep-related activities" performed in bed (e.g. reading, watching television, etc.) as the phrase may seem to suggest.
Clinical significance
Apparently long sleep duration may in fact be a sign of low sleep efficiency. SE is significantly reduced in insomnia; SE is therefore an important clinical parameter in clinical investigations of insomnia. SE declines with age and low SE is common in the elderly. Furthermore, lower values of SE are often observed in sleep studies on pregnant populations and are mostly explained by the increased awakening periods after sleep onset (''wake after sleep onset (WASO)'').
Research
Reduced SE was found to be associated with increased frequency of nightmares in one study.
Some studies have reported a beneficial effect of exercise on SE in participants affected by insomnia. However, a meta-analysis of four studies (with a total of 186 participants) did not find exercise to significantly affect SE in people with insomnia.
A study on subjects from contemporary African and South American hunter-gatherer ethnic groups found that their SE was comparable to SE in industrial societies.
|
https://en.wikipedia.org/wiki/RCA%201600
|
The RCA 1600 is a discontinued 16-bit minicomputer designed and built by RCA in West Palm Beach, Florida and Marlboro, Massachusetts. It was developed to meet the needs of several RCA divisions, including the Graphics Systems Division (GSD), Instructional Systems, and Global Communications. It was introduced in 1968, and at the time of UNIVAC's purchase of the RCA Computer Division in 1972 the 1600 was estimated to be in use by 40 customers. The 1600 was intended for use in embedded systems, and was retained by UNIVAC and used in products such as the Accuscan supermarket checkout system in the 1970s.
Description
The 1600 uses magnetic-core memory with a cycle time on 1.6μsec, structured as words of 18 bits—16 data bits, one parity bit, and one memory protection bit. Four configurations offered memory sizes of 8 K, 16 K, 32 K, and 64 K bytes (4,8,16,and 32 KW). Individual words of memory can be protected by setting the associated protection bit. Attempts to store into protected memory are trapped if memory protection is enabled by a console switch.
The processor has sixteen 16-bit "standard" registers, eight for each program state. Program state one is used for normal execution, program state two is used for interrupt service routines. Because each state has an independent set of registers, switching states can be done "essentially instantaneously." Register 8 is the instruction counter in both states. If high-speed I/O (cycle stealing) is used, registers 6 and 7 in program state two are used for I/O address and byte count respectively. The architecture defines 29 instructions in three groups. All instructions are 16 bits, must be located on a word boundary, and therefore can be accessed in one machine cycle of 1.6μsec. There are also seven "special" registers serving particular functions which can also be read and written programmatically.
|
https://en.wikipedia.org/wiki/Panda%20Security
|
Panda Security is a Spanish cybersecurity software company. Panda Security's core offering is antivirus software and more recently has expanded into providing and developing cybersecurity software. This includes security products and services for both businesses and home users, as well as protection tools for systems, networks, emails, and other private information. Panda Security employs around 458 people.
Overview
In 2005, Panda Security was the fourth largest antivirus vendor worldwide, with 3.2% of the marketplace. In November 2015 OPSWAT measured Panda Security's market share to be 3.6%. The company, whose shares were previously 100% held by Mikel Urizarbarrena, announced on April 24, 2007, the sale of 75% of its shares to Southern European investment group Investindustrial and private equity firm Gala Capital. On 30 July 2007, the company changed its name from Panda Software to Panda Security and Urizarbarrena was replaced by Jorge Dinares. Almost one year later, on 3 June 2008, amidst flagging sales, the board of directors voted to replace Dinares with Juan Santana, the CEO. Santana resigned in September 2011 and was replaced by José Sancho as acting CEO.
Panda Security was rated in Jan 2018 by Gartner analysts as an Endpoint Protection Visionary. Technological milestones include its launch of security systems, such as the SaaS concept (Security as a Service) or antivirus solutions that provide protection from the cloud (cloud computing) and are based on what Panda calls Collective Intelligence, a security model Panda introduced on the market in 2007. According to its CEO, the main benefit this security model provides is that it allows automatic scanning of threats instead of the manual scans carried out by other companies.
The firm has subsidiaries in the US, Italy, Switzerland, Germany, Austria, Belgium, the Netherlands, France, the UK, Sweden, Finland, Spain, and Japan. Additionally, it has franchises in another 44 countries. The US subsidiary moved its
|
https://en.wikipedia.org/wiki/Magnesium%20in%20biology
|
Magnesium is an essential element in biological systems. Magnesium occurs typically as the Mg2+ ion. It is an essential mineral nutrient (i.e., element) for life and is present in every cell type in every organism. For example, adenosine triphosphate (ATP), the main source of energy in cells, must bind to a magnesium ion in order to be biologically active. What is called ATP is often actually Mg-ATP. As such, magnesium plays a role in the stability of all polyphosphate compounds in the cells, including those associated with the synthesis of DNA and RNA.
Over 300 enzymes require the presence of magnesium ions for their catalytic action, including all enzymes utilizing or synthesizing ATP, or those that use other nucleotides to synthesize DNA and RNA.
In plants, magnesium is necessary for synthesis of chlorophyll and photosynthesis.
Function
A balance of magnesium is vital to the well-being of all organisms. Magnesium is a relatively abundant ion in Earth's crust and mantle and is highly bioavailable in the hydrosphere. This availability, in combination with a useful and very unusual chemistry, may have led to its utilization in evolution as an ion for signaling, enzyme activation, and catalysis. However, the unusual nature of ionic magnesium has also led to a major challenge in the use of the ion in biological systems. Biological membranes are impermeable to magnesium (and other ions), so transport proteins must facilitate the flow of magnesium, both into and out of cells and intracellular compartments.
Human health
Inadequate magnesium intake frequently causes muscle spasms, and has been associated with cardiovascular disease, diabetes, high blood pressure, anxiety disorders, migraines, osteoporosis, and cerebral infarction. Acute deficiency (see hypomagnesemia) is rare, and is more common as a drug side-effect (such as chronic alcohol or diuretic use) than from low food intake per se, but it can occur in people fed intravenously for extended periods of time.
|
https://en.wikipedia.org/wiki/Marble%20Madness
|
Marble Madness is an arcade video game designed by Mark Cerny and published by Atari Games Inc. in 1984. It is a platform game in which the player must guide a marble through six courses, populated with obstacles and enemies, within a time limit. The player controls the marble by using a trackball. Marble Madness is known for using innovative game technologies: it was Atari's first to use the Atari System 1 hardware, the first to be programmed in the C programming language, and one of the first to use true stereo sound (previous games used either monaural sound or simulated stereo).
In designing the game, Cerny drew inspiration from miniature golf, racing games, and artwork by M. C. Escher. He aimed to create a game that offered a distinct experience with a unique control system. Cerny applied a minimalist approach in designing the appearance of the game's courses and enemies. Throughout development, he was frequently impeded by limitations in technology and had to forgo several design ideas.
Upon its release to arcades, Marble Madness was commercially successful and profitable. Critics praised the game's difficulty, unique visual design, and stereo soundtrack. The game was ported to numerous platforms and inspired the development of other games. A sequel was developed and planned for release in 1991, but canceled when location testing showed the game could not succeed in competition with other titles.
Gameplay
Marble Madness is an isometric platform game in which the player manipulates an onscreen marble from a third-person perspective. In the arcade version, a player controls the marble's movements with a trackball; most home versions use game controllers with directional pads. The player's goal is to complete six maze-like isometric race courses before a set amount of time expires. With the exception of the first race, any time left on the clock at the end of a race is carried over to the next one, and the player is granted a set amount of additional time as
|
https://en.wikipedia.org/wiki/Flag%20desecration
|
Flag desecration is the desecration of a flag, violation of flag protocol, or various acts that intentionally destroy, damage, or mutilate a flag in public. In the case of a national flag, such action is often intended to make a political point against a country or its policies. Some countries have laws forbidding methods of destruction (such as burning in public) or forbidding particular uses (such as for commercial purposes); such laws may distinguish between the desecration of the country's own national flag and the desecration of flags of other countries. Some countries have also banned the desecration of all types of flags from inside the country to other country flags.
Background
Actions that may be treated as the desecration of a flag include burning it, urinating or defecating on it, defacing it with slogans, stepping upon it, damaging it with stones; bullets; or any other missile, cutting or ripping it, improperly flying it, verbally insulting it, dragging it on the ground, or eating it, among other things.
Flag desecration may be undertaken for a variety of reasons. It may be a protest against a country's foreign policy, including one's own, or the nature of the government in power there. It may be a protest against nationalism or a deliberate and symbolic insult to the people of the country represented by the flag. It may also be a protest at the very laws prohibiting the act of desecrating a flag.
Flag desecration laws
In some countries, desecrating a flag is a crime and may result in punishment, such as a prison sentence or a fine. In countries where it is not, the act may still be prosecuted as disorderly conduct, arson or, if conducted on someone else's property, as theft or vandalism.
By jurisdiction
Algeria
In Algeria, flag desecration is a crime. According to article 160 bis of the Algerian penal code, the intentional and public shredding, distortion, or desecration of the national flag results in five to ten years of imprisonment as punishm
|
https://en.wikipedia.org/wiki/FinisTerrae
|
Finisterrae was the 100th supercomputer in Top500 ranking in November 2007. Running at 12.97 teraFLOPS, it would rank at position 258 on the list as of June 2008. It is also the third most powerful supercomputer in Spain (after MareNostrum and Magerit). It is located in Galicia.
This project is promoted by the Xunta de Galicia (regional government of Galicia) and the Spanish National Research Council (CSIC). It was founded in 1993 to serve as a platform to foster scientific innovation and invest in Research and Development.
It is estimated that the base project will be completed in 2010. It is expected to reach the TOP10 of the most powerful supercomputers in the world when it reaches full capacity. The supercomputer is physically hosted at CESGA.
Overview
The main Finisterrae characteristics are depicted on the following table:
One of the special characteristics about FinisTerrae I supercomputer is the ratio between cores and RAM. This was one reason that it received the denomination of "singular technical and scientific installation" from the Spanish government, a denomination given to some installations which have some value that makes them singular in some way. Some of those installations include the Canary Island grand telescope, or the Alba synchrotron.
Even if this is the third fastest supercomputer in Spain, some projects that require special amounts of memory cannot be held by the first or second supercomputer, and therefore must be executed on the Finisterrae.
Architecture
FinisTerrae I
FinisTerrae supercomputer, located in CESGA is an integrated system by shared-memory nodes with and SMP NUMA architecture.
FinisTerrae is composed of 144 computational nodes:
HP Integrity rx7640 nodes with 16 Itanium Montvale cores and 128 GB memory each one
Integrity Superdome node, with 128 Itanium Montvale cores and 1024 GB memory
Integrity Superdome node, with 128 Itanium 2 cores and 384 GB memory
A hierarchic storing system with:
22 nodes for stori
|
https://en.wikipedia.org/wiki/Carbon%20dioxide
|
Carbon dioxide is a chemical compound with the chemical formula . It is made up of molecules that each have one carbon atom covalently double bonded to two oxygen atoms. It is found in the gas state at room temperature, and as the source of available carbon in the carbon cycle, atmospheric is the primary carbon source for life on Earth. In the air, carbon dioxide is transparent to visible light but absorbs infrared radiation, acting as a greenhouse gas. Carbon dioxide is soluble in water and is found in groundwater, lakes, ice caps, and seawater. When carbon dioxide dissolves in water, it forms carbonate and mainly bicarbonate (), which causes ocean acidification as atmospheric levels increase.
It is a trace gas in Earth's atmosphere at 421 parts per million (ppm), or about 0.04% (as of May 2022) having risen from pre-industrial levels of 280 ppm or about 0.025%. Burning fossil fuels is the primary cause of these increased concentrations and also the primary cause of climate change.
Its concentration in Earth's pre-industrial atmosphere since late in the Precambrian was regulated by organisms and geological phenomena. Plants, algae and cyanobacteria use energy from sunlight to synthesize carbohydrates from carbon dioxide and water in a process called photosynthesis, which produces oxygen as a waste product. In turn, oxygen is consumed and is released as waste by all aerobic organisms when they metabolize organic compounds to produce energy by respiration. is released from organic materials when they decay or combust, such as in forest fires. Since plants require for photosynthesis, and humans and animals depend on plants for food, is necessary for the survival of life on earth.
Carbon dioxide is 53% more dense than dry air, but is long lived and thoroughly mixes in the atmosphere. About half of excess emissions to the atmosphere are absorbed by land and ocean carbon sinks. These sinks can become saturated and are volatile, as decay and wildfires result i
|
https://en.wikipedia.org/wiki/Bolivian%20hemorrhagic%20fever
|
Bolivian hemorrhagic fever (BHF), also known as black typhus or Ordog Fever, is a hemorrhagic fever and zoonotic infectious disease originating in Bolivia after infection by Machupo mammarenavirus.
BHF was first identified in 1963 as an ambisense RNA virus of the Arenaviridae family, by a research group led by Karl Johnson. The mortality rate is estimated at 5 to 30 percent. Due to its pathogenicity, Machupo virus requires Biosafety Level Four conditions, the highest level.
During the period between February and March 2007, some 20 suspected BHF cases (3 fatal) were reported to the Servicio Departamental de Salud (SEDES) in Beni Department, Bolivia. In February 2008, at least 200 suspected new cases (12 fatal) were reported to SEDES. In November 2011, a second case was confirmed near the departmental capital of Trinidad, and a serosurvey was conducted to determine the extent of Machupo virus infections in the department. A SEDES expert involved in the survey expressed his concerns about the expansion of the virus to other provinces outside the endemic regions of Mamoré and Iténez provinces.
Epidemiology
History
The disease was first encountered in 1962, in the Bolivian village of San Joaquín, hence the name "Bolivian" Hemorrhagic Fever. When initial investigations failed to find an arthropod carrier, other sources were sought before finally determining that the disease was carried by infected mice. Although mosquitoes were not the cause as originally suspected, the extermination of mosquitoes using DDT to prevent malaria proved to be indirectly responsible for the outbreak in that the accumulation of DDT in various animals along the food chain led to a shortage of cats in the village; subsequently, a mouse plague erupted in the village, leading to an epidemic.
Vectors
The vector is the large vesper mouse (Calomys callosus), a rodent indigenous to northern Bolivia. Infected animals are asymptomatic and shed the virus in excreta, thereby infecting humans. Evid
|
https://en.wikipedia.org/wiki/Aptamer
|
Aptamers are short sequences of artificial DNA, RNA, XNA, or peptide that bind a specific target molecule, or family of target molecules. They exhibit a range of affinities (KD in the pM to μM range), with variable levels of off-target binding and are sometimes classified as chemical antibodies. Aptamers and antibodies can be used in many of the same applications, but the nucleic acid-based structure of aptamers, which are mostly oligonucleotides, is very different from the amino acid-based structure of antibodies, which are proteins. This difference can make aptamers a better choice than antibodies for some purposes (see antibody replacement).
Aptamers are used in biological lab research and medical tests. If multiple aptamers are combined into a single assay, they can measure large numbers of different proteins in a sample. They can be used to identify molecular markers of disease, or can function as drugs, drug delivery systems and controlled drug release systems. They also find use in other molecular engineering tasks.
Most aptamers originate from SELEX, a family of test-tube experiments for finding useful aptamers in a massive pool of different DNA sequences. This process is much like natural selection, directed evolution or artificial selection. In SELEX, the researcher repeatedly selects for the best aptamers from a starting DNA library made of about a quadrillion different randomly generated pieces of DNA or RNA. After SELEX, the researcher might mutate or change the chemistry of the aptamers and do another selection, or might use rational design processes to engineer improvements. Non-SELEX methods for discovering aptamers also exist.
Researchers optimize aptamers to achieve a variety of beneficial features. The most important feature is specific and sensitive binding to the chosen target. When aptamers are exposed to bodily fluids, as in serum tests or aptamer therapeutics, it is often important for them to resist digestion by DNA- and RNA-destroying pr
|
https://en.wikipedia.org/wiki/Windows%20Remote%20Management
|
WinRM (Windows Remote Management) is Microsoft's implementation of WS-Management in Windows which allows systems to access or exchange management information across a common network. Utilizing scripting objects or the built-in command-line tool, WinRM can be used with any remote computers that may have baseboard management controllers (BMCs) to acquire data. On Windows-based computers including WinRM, certain data supplied by Windows Management Instrumentation (WMI) can also be obtained.
Components
WinRM Scripting API
Provides an Application programming interface enabling scripts to remotely acquire data from computers that perform WS-Management operations.
winrm.cmd
Built-in systems management command line tool allowing a machine operator to configure WinRM. Implementation consists of a Visual Basic Scripting (VBS) Edition file (Winrm.vbs) which is written using the aforementioned WinRM scripting API.
winrs.exe
Another command line tool allowing the remote execution of most Cmd.exe commands. This tool utilizes the WS-Management protocol.
Intelligent Platform Management Interface (IPMI) driver
Provides hardware management and facilitates control of remote server hardware through BMCs. IPMI is most useful when the operating system is not running or deployed as it allows for continued remote operations of the bare metal hardware/software.
WMI plug-in
Allows WMI data to be made available to WinRM clients.
WMI service
Leverages the WMI plug-in to provide requested data or control and can also be used to acquire data from most WMI classes. Examples include the Win32_Process, in addition to any IPMI-supplied data.
WS-Management protocol
Web Services Management is a DMTF open standard defining a SOAP-based protocol for the management of servers, devices, applications and various Web services. WS-Management provides a common way for systems to access and exchange management information across the IT infrastructure.
Ports
By default WinRM HTTPS used 598
|
https://en.wikipedia.org/wiki/Cool%20S
|
The Cool S is a graffiti sign in popular culture that is typically doodled on children's notebooks or graffitied on walls. The exact origin of the Cool S is unknown, but it became prevalent around the early 1970s as a part of graffiti culture.
Shape
The Cool S consists of 14 line segments, forming a stylized, pointed S-shape. It has also been compared to the infinity symbol. The tails (pointy ends) of the S appear to link underneath so that it loops around on itself in the same way as the infinity symbol does. The Cool S has no reflection symmetry, but has 2-fold rotational symmetry.
History
The exact origin of the symbol is unclear.
Jon Naar's photographs of graffiti in New York City, which were taken in 1973 and published in The Faith of Graffiti in 1974, feature the symbol numerous times, identical to its modern form. Jean-Michel Basquiat's artworks also occasionally have the symbol hidden somewhere, such as in Charles the First, and in the one titled Olive Oil from 1982 it is labelled as the "classic S of graff".
The name "Superman S" comes from a belief that it was a symbol for Superman, whose costume features a stylized S in a diamond shape, but that shape is quite different. Although frequently referred to as the Stüssy S, Emmy Coats (who has worked alongside Shawn Stussy since 1985) has stated that it was never a symbol of the Californian surf company. In 2010 the company uploaded a video to Vimeo and later to YouTube in which one of Jon Naar's 1973 photographs of the symbol can be seen.
The symbol has been trademarked in the United States.
See also
Henohenomoheji
Emoticon
Twin mountain drawing
Kilroy was here
Sator Square
|
https://en.wikipedia.org/wiki/Inverse%20consequences
|
The term "inverse consequences" or the "Law of Inverse Consequences" refers to results that are the opposite of the expected results as initially intended or planned.
One consequence is in the "reverse predicament" of the other.
History
The term "inverse consequences" has been in use for over 175 years (since at least 1835).
The term was also used by Auguste Comte (1798–1857) in his book System of Positive Polity (published 1875), stating, "Inevitable increase in Complication, in proportion with the decrease of Generality, gives rise to two inverse consequences."
Documented examples
The term "inverse consequences" has been applied in numerous situations, for example:
In treatment of drug addiction, medications intended to reduce one type of addiction might trigger another addiction: long-term treatment with opiate medications (such as morphine) has inverse consequences.
In management of work tasks, a total sequential execution, of work tasks, has inverse consequences, such as a decrease of the workload with an increase of the lead time.
In asset management, plans for portfolio management might have inverse consequences to the potential benefits.
Related phrases
The concept of "inverse consequences" has a corollary in other phrases, as well:
"the plan backfired" - meaning the opposite result occurred, as in a gun firing backward, rather than forward.
See also
Invasive species
Regression testing
Notes
|
https://en.wikipedia.org/wiki/Cascading%20gauge%20theory
|
In theoretical physics, a cascading gauge theory is a gauge theory whose coupling rapidly changes with the scale in such a way that Seiberg duality must be applied many times.
Igor Klebanov and Matthew Strassler studied this kind of N=1 gauge theory in the context of the AdS-CFT correspondence, which is dual to the warped deformed conifold.
See also
Ultraviolet fixed point
|
https://en.wikipedia.org/wiki/Sarcoplasmic%20reticulum
|
The sarcoplasmic reticulum (SR) is a membrane-bound structure found within muscle cells that is similar to the smooth endoplasmic reticulum in other cells. The main function of the SR is to store calcium ions (Ca2+). Calcium ion levels are kept relatively constant, with the concentration of calcium ions within a cell being 10,000 times smaller than the concentration of calcium ions outside the cell. This means that small increases in calcium ions within the cell are easily detected and can bring about important cellular changes (the calcium is said to be a second messenger). Calcium is used to make calcium carbonate (found in chalk) and calcium phosphate, two compounds that the body uses to make teeth and bones. This means that too much calcium within the cells can lead to hardening (calcification) of certain intracellular structures, including the mitochondria, leading to cell death. Therefore, it is vital that calcium ion levels are controlled tightly, and can be released into the cell when necessary and then removed from the cell.
Structure
The sarcoplasmic reticulum is a network of tubules that extend throughout muscle cells, wrapping around (but not in direct contact with) the myofibrils (contractile units of the cell). Cardiac and skeletal muscle cells contain structures called transverse tubules (T-tubules), which are extensions of the cell membrane that travel into the centre of the cell. T-tubules are closely associated with a specific region of the SR, known as the terminal cisternae in skeletal muscle, with a distance of roughly 12 nanometers, separating them. This is the primary site of calcium release. The longitudinal SR are thinner projects, that run between the terminal cisternae/junctional SR, and are the location where ion channels necessary for calcium ion absorption are most abundant. These processes are explained in more detail below and are fundamental for the process of excitation-contraction coupling in skeletal, cardiac and smooth muscle.
|
https://en.wikipedia.org/wiki/Emergent%20evolution
|
Emergent evolution is the hypothesis that, in the course of evolution, some entirely new properties, such as mind and consciousness, appear at certain critical points, usually because of an unpredictable rearrangement of the already existing entities. The term was originated by the psychologist C. Lloyd Morgan in 1922 in his Gifford Lectures at St. Andrews, which would later be published as the 1923 book Emergent Evolution.
The hypothesis has been widely criticized for providing no mechanism to how entirely new properties emerge, and for its historical roots in teleology. Historically, emergent evolution has been described as an alternative to materialism and vitalism.
Emergent evolution is distinct from the hypothesis of Emergent Evolutionary Potential (EEP) which was introduced in 2019 by Gene Levinson. In EEP, the scientific mechanism of Darwinian natural selection tends to preserve new, more complex entities that arise from interactions between previously existing entities, when those interactions prove useful, by trial-and error, in the struggle for existence. Biological organization arising via EEP is complementary to organization arising via gradual accumulation of incremental variation.
Historical context
The term emergent was first used to describe the concept by George Lewes in volume two of his 1875 book Problems of Life and Mind (p. 412). Henri Bergson covered similar themes in his popular 1907 book Creative Evolution on the Élan vital. Emergence was further developed by Samuel Alexander in his Gifford Lectures at Glasgow during 1916–18 and published as Space, Time, and Deity (1920). The related term emergent evolution was coined by C. Lloyd Morgan in his own Gifford lectures of 1921–22 at St. Andrews and published as Emergent Evolution (1923). In an appendix to a lecture in his book, Morgan acknowledged the contributions of Roy Wood Sellars's Evolutionary Naturalism (1922).
Origins
Response to Darwin's Origin of Species
Charles Darwin and Alfr
|
https://en.wikipedia.org/wiki/Max%20Caulfield
|
Maxine Caulfield is a fictional character from the Life Is Strange video game series published by Square Enix. Created by French developer Dontnod Entertainment, she first appears in the 2015 video game Life Is Strange as the main protagonist. She is voiced by American actress Hannah Telle.
The character received a generally positive reception by video game publications, although some labeled her characterization as generic and inauthentic.
Concept and creation
In 2015's Life Is Strange, Max Caulfield is portrayed with the ability to rewind time to supplement the game's core gameplay mechanism. While the lead character rewinds time, visual effects such as post-processing, double exposure, and overlapping screen space particles were employed as an artistic approach to be portrayed.
The characters were created using well-known archetypes, initially to establish a player access point and subsequently to subvert them. The supernatural elements were developed as a metaphor for the character's inner turmoil in order to serve the realism.
Name
Max's surname references Holden Caulfield from The Catcher in the Rye by J. D. Salinger, and his personality as an "iconic rebel" is echoed by Max's spirit of defiance and characterization as an outsider in her community. Max is "always looking to the past. She has this old camera, she's reluctant to make decisions.
Character design
Christian Divine has been writing her [in a way that] sometimes she's using some older expressions," according to Michel Koch in a June 2015 interview with Polygon. Max was the second female protagonist in a Dontnod Entertainment title. Most prospective publishers were unwilling to publish a game unless it had a male protagonist, according to a developer journal provided by Dontnod. Most publishers objected to Dontnod's first project, a female protagonist in Remember Me. Oskar Guilbert, CEO of Dontnod, was similarly skeptical at first. Square Enix was the only publisher with no intention to chang
|
https://en.wikipedia.org/wiki/HyperCloud%20Memory
|
HyperCloud Memory (HCDIMM) is a DDR3 SDRAM dual in-line memory module (DIMM) used in server applications requiring a great deal of memory. It was initially launched in 2009 at the International Supercomputing Conference by Irvine, California, based company, Netlist Inc. It was never a JEDEC standard, and the main server vendors supporting it were IBM and Hewlett Packard Enterprise.
Technical
HCDIMM is a 240-pin, 72 bit-wide, load reduced, DDR3 SDRAM dual in-line memory module (DIMM). According to Cirrascale, "while LRDIMM requires a special BIOS configuration, HyperCloud provides seamless plug-and-play operation with past, current and future generations of Intel processors."
The logic function embedded into the register device and the isolation devices used on the HCDIMM performs rank multiplication and load reduction functions which allows the system to increase its performance and access high capacity memory modules. The register device "re-drives the command, address and clock signals" from the host memory controller to the DRAM chips and presents four physical ranks of memory as two virtual ranks to the memory controller on the processor.
Rank multiplication allows maximum memory densities on each server memory channel while the isolation device makes four DRAM appear as one to the memory controller. This reduces the electrical load all while allowing high density DIMMs to run at high speeds. HCDIMM has a lower bit-to-bit data skew and latency due to its distributed architecture by having multiple isolation devices between the DRAM and data bus.
|
https://en.wikipedia.org/wiki/Micom
|
Micom was a manufacturer of telecommunications equipment, best known for their line of concentrators. The company was founded by serial entrepreneur Stephen Bernard Dorsey in 1975 and sold to Philips NV in 1984. Micom acquired Spectrum Digital Corporation in 1987.
Micom concentrators
Micom became known for its ads, often run on the back pages of popular-in-their-day computer industry publications, with the slogan "Concentrate. Because it's cheaper!" The initial ads showed oranges and what resembled a can of frozen orange juice, with a "brand name" of Micom. After adding variations, they began advertising on television. The focus of the ads, within their telecommunications products, was their line of concentrators.
Their print ads included the trademarked phrase "MICOM: MicroComputers for DataCommunications(tm)"
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.