source
stringlengths 31
227
| text
stringlengths 9
2k
|
|---|---|
https://en.wikipedia.org/wiki/Expected%20transmission%20count
|
The ETX metric, or expected transmission count, is a measure of the quality of a path between two nodes in a wireless packet data network. It is widely utilized in mesh networking algorithms.
History
Douglas S.J. De Couto was the first to describe ETX in his 2004 doctoral dissertation at MIT. Subsequently, it has been implemented in RoofNet/Meraki and OLSR mesh networking protocols, among others.
In the context of the OLSR protocol, a bidirectional link ETX was defined.
Details
ETX is the number of expected transmissions of a packet necessary for it to be received without error at its destination. This number varies from one to infinity. An ETX of one indicates a perfect transmission medium, where an ETX of infinity represents a completely non-functional link. Note that ETX is an expected transmission count for a future event, as opposed to an actual count of a past event. It is hence a real number, and not an integer. For example, if it took 1898 transmissions to transfer 1024 packets without error, the ETX on the link is 1898/1024, or approximately 1.85. Due to varying characteristics of the transmission medium, the number may vary widely.
It is often useful to convert between ETX and the packet error probability :
An equivalent relation is used for bidirectional links in the context of the OLSR protocol: where NLQ is the Neighbor Link Quality of the link and LQ is its link quality. Thus, .
|
https://en.wikipedia.org/wiki/Journal%20of%20Computational%20and%20Applied%20Mathematics
|
The Journal of Computational and Applied Mathematics is a peer-reviewed scientific journal covering computational and applied mathematics. It was established in 1975 and is published biweekly by Elsevier. The editors-in-chief are Yalchin Efendiev (Texas A&M University), Taketomo Mitsui (Nagoya University), Michael Kwok-Po Ng (Hong Kong Baptist University) and Fatih Tank (Ankara University). According to the Journal Citation Reports, the journal has a 2021 impact factor of 2.872.
|
https://en.wikipedia.org/wiki/Nanodot
|
Nanodot can refer to several technologies which use nanometer-scale localized structures. Nanodots generally exploit properties of quantum dots to localize magnetic or electrical fields at very small scales. Applications for nanodots could include high-density information storage, energy storage, and light-emitting devices.
Information storage
Magnetic nanodots are being developed for future information storage.
Nanodot technology could potentially store over one hundred times more data than today's hard drives. The nanodots can be thought of as tiny magnets which can switch polarity to represent a binary digit. Hard drives typically magnetize areas 200-250 nm long to store individual bits (as of 2006), while nanodots can be 50 nm in diameter or smaller. Thus nanodot-based storage could offer considerably higher information density than existing hard drives. Nanodots could also lead to ultrafast memory.
Battery
In 2014 self-assembled, chemically-synthesized bio-organic peptide nanodots were proposed to reduce charging times in batteries. They are claimed to improve energy density and electrolyte performance. The new battery is said to operate like a (fast-charging) supercapacitor for charging and a (slow-discharge) battery for providing power.
Lithium-ion battery
Applications with nanodot technology have been testing in lithium-ion batteries. It has been shown that binder-free three-dimensional (3D) macro-mesoporous electrode architecture yields a high-performance supercapacitor-like lithium battery. It is about ten times more efficient compared to the current model of state-of-the-art graphite anode. This electrode architecture simultaneously allows for rapid ion transfer and ultra-short solid-phase ion diffusion resulting in an efficient new binder-free electrode technique towards the development of high-performance supercapacitor-like Li-ion batteries.
Lithium-sulfur battery
Incorporation of nanodot technology into lithium-sulfur batteries is crucial beca
|
https://en.wikipedia.org/wiki/Reconstruction%20of%20attosecond%20beating%20by%20interference%20of%20two-photon%20transitions
|
Reconstruction of attosecond beating by interference of two-photon transitions, more commonly known as RABBITT or RABBIT for short, is a widely used technique for obtaining the relative phase and amplitude of attosecond pulses. This technique involves the interference of two-photon interband transitions in solids. It is especially suited for diagnostics on the temporal structure of XUV pulses. The reconstruction of attosecond beating by interference of two-photon transitions is a valuable tool for studying ultrafast processes in materials and can provide insight into the dynamics of electrons in solids.
History
RABBITT was invented by Pierre Agostini, Harm Geert Muller and colleagues in 2001.
|
https://en.wikipedia.org/wiki/Stochastic%20partial%20differential%20equation
|
Stochastic partial differential equations (SPDEs) generalize partial differential equations via random force terms and coefficients, in the same way ordinary stochastic differential equations generalize ordinary differential equations.
They have relevance to quantum field theory, statistical mechanics, and spatial modeling.
Examples
One of the most studied SPDEs is the stochastic heat equation, which may formally be written as
where is the Laplacian and denotes space-time white noise. Other examples also include stochastic versions of famous linear equations, such as the wave equation and the Schrödinger equation.
Discussion
One difficulty is their lack of regularity. In one dimensional space, solutions to the stochastic heat equation are only almost 1/2-Hölder continuous in space and 1/4-Hölder continuous in time. For dimensions two and higher, solutions are not even function-valued, but can be made sense of as random distributions.
For linear equations, one can usually find a mild solution via semigroup techniques.
However, problems start to appear when considering non-linear equations. For example
where is a polynomial. In this case it is not even clear how one should make sense of the equation. Such an equation will also not have a function-valued solution in dimension larger than one, and hence no pointwise meaning. It is well known that the space of distributions has no product structure. This is the core problem of such a theory. This leads to the need of some form of renormalization.
An early attempt to circumvent such problems for some specific equations was the so called da Prato–Debussche trick which involved studying such non-linear equations as perturbations of linear ones. However, this can only be used in very restrictive settings, as it depends on both the non-linear factor and on the regularity of the driving noise term. In recent years, the field has drastically expanded, and now there exists a large machinery to guarantee local existe
|
https://en.wikipedia.org/wiki/Clebsch%E2%80%93Gordan%20coefficients%20for%20SU%283%29
|
In mathematical physics, Clebsch–Gordan coefficients are the expansion coefficients of total angular momentum eigenstates in an uncoupled tensor product basis. Mathematically, they specify the decomposition of the tensor product of two irreducible representations into a direct sum of irreducible representations, where the type and the multiplicities of these irreducible representations are known abstractly. The name derives from the German mathematicians Alfred Clebsch (1833–1872) and Paul Gordan (1837–1912), who encountered an equivalent problem in invariant theory.
Generalization to SU(3) of Clebsch–Gordan coefficients is useful because of their utility in characterizing hadronic decays, where a flavor-SU(3) symmetry exists (the eightfold way) that connects the three light quarks: up, down, and strange.
The SU(3) group
The special unitary group SU is the group of unitary matrices whose determinant is equal to 1. This set is closed under matrix multiplication. All transformations characterized by the special unitary group leave norms unchanged. The symmetry appears in the light quark flavour symmetry (among up, down, and strange quarks) dubbed the Eightfold Way (physics). The same group acts in quantum chromodynamics on the colour quantum numbers of the quarks that form the fundamental (triplet) representation of the group.
The group is a subgroup of group , the group of all 3×3 unitary matrices. The unitarity condition imposes nine constraint relations on the total 18 degrees of freedom of a 3×3 complex matrix. Thus, the dimension of the group is 9. Furthermore, multiplying a U by a phase, leaves the norm invariant. Thus can be decomposed into a direct product . Because of this additional constraint, has dimension 8.
Generators of the Lie algebra
Every unitary matrix can be written in the form
where H is hermitian. The elements of can be expressed as
where are the 8 linearly independent matrices forming the basis of the Lie algebra of ,
|
https://en.wikipedia.org/wiki/Executive%20dysfunction
|
In psychology and neuroscience, executive dysfunction, or executive function deficit, is a disruption to the efficacy of the executive functions, which is a group of cognitive processes that regulate, control, and manage other cognitive processes. Executive dysfunction can refer to both neurocognitive deficits and behavioural symptoms. It is implicated in numerous psychopathologies and mental disorders, as well as short-term and long-term changes in non-clinical executive control.
Overview
Executive functioning is a theoretical construct representing a domain of cognitive processes that regulate, control, and manage other cognitive processes. Executive functioning is not a unitary concept; it is a broad description of the set of processes involved in certain areas of cognitive and behavioural control. Executive processes are integral to higher brain function, particularly in the areas of goal formation, planning, goal-directed action, self-monitoring, attention, response inhibition, and coordination of complex cognition and motor control for effective performance. Deficits of the executive functions are observed in all populations to varying degrees, but severe executive dysfunction can have devastating effects on cognition and behaviour in both individual and social contexts on a day-to-day basis.
Executive dysfunction does occur to a minor degree in all individuals on both short-term and long-term scales. In non-clinical populations, the activation of executive processes appears to inhibit further activation of the same processes, suggesting a mechanism for normal fluctuations in executive control. Decline in executive functioning is also associated with both normal and clinical aging. The decline of memory processes as people age appears to affect executive functions, which also points to the general role of memory in executive functioning.
Executive dysfunction appears to consistently involve disruptions in task-oriented behavior, which requires executive co
|
https://en.wikipedia.org/wiki/Falls%20in%20older%20adults
|
Falls in older adults are a significant cause of morbidity and mortality and are a major class of preventable injuries. Falling is one of the most common accidents that cause a loss in the quality of life for older adults, and is usually precipitated by a loss of balance and weakness in the legs. The cause of falling in old age is often multifactorial and may require a multidisciplinary approach both to treat any injuries sustained and to prevent future falls. Falls include dropping from a standing position or from exposed positions such as those on ladders or stepladders. The severity of injury is generally related to the height of the fall. The state of the ground surface onto which the victim falls is also important, harder surfaces causing more severe injury. Falls can be prevented by ensuring that carpets are tacked down, that objects like electric cords are not in one's path, that hearing and vision are optimized, dizziness is minimized, alcohol intake is moderated and that shoes have low heels or rubber soles.
A review of clinical trial evidence by the European Food Safety Authority led to a recommendation that people over the age of 60 years should supplement the diet with vitamin D to reduce the risk of falling and bone fractures. Falls are an important aspect of geriatric medicine.
Definition
Other definitions are more inclusive and do not exclude "major intrinsic events" as a fall. Falls are of concern within medical treatment facilities. Fall prevention is usually a priority in healthcare settings.
A 2006 review of literature identified the need for standardization of falls taxonomy due to the variation within research. The Prevention of Falls Network Europe (ProFane) taxonomy for the definition and reporting of falls aimed at mitigating this problem. ProFane recommended that a fall be defined as "an unexpected event in which the participants come to rest on the ground, floor, or lower level." The ProFane taxonomy is currently used as a framework to
|
https://en.wikipedia.org/wiki/Vacuum%20coffee%20maker
|
A vacuum coffee maker brews coffee using two chambers where vapor pressure and gravity produce coffee. This type of coffee maker is also known as vac pot, siphon or syphon coffee maker, and was invented by Loeff of Berlin in the 1830s. These devices have since been used for more than a century in many parts of the world. Design and composition of the vacuum coffee maker varies. The chamber material is borosilicate glass, metal, or plastic, and the filter can be either a glass rod or a screen made of metal, cloth, paper, or nylon. The Napier Vacuum Machine by James Robert Napier, presented in 1840, was an early example of this technique. While vacuum coffee makers generally were excessively complex for everyday use, they were prized for producing a clear brew, and were quite popular until the middle of the twentieth century. Vacuum coffee makers remain popular in some parts of Asia, including Japan and Taiwan. The Bauhaus interpretation of this device can be seen in Gerhard Marcks' coffee maker of 1925.
Workings
A vacuum coffee maker operates as a siphon, where heating and cooling the lower vessel changes the vapor pressure of water in the lower, first pushing the water up into the upper vessel, then allowing the water to fall back down into the lower vessel.
Specifically, once the water in lower chamber is hot enough that its vapor pressure (the pressure exerted by the vapour component of a liquid) exceeds the pressure of a standard atmosphere, some of it begins to boil, turning into water vapor. Since the density of water vapor is about 1/2000 that of liquid water, the mixture of the air and water vapor in the lower chamber quickly expands, and, when the new pressure exceeds atmospheric pressure, pushes the remaining water up the siphon tube into the upper chamber, where it remains so long as the pressure difference between the upper and lower chambers is sufficient to support it (about 1.5 kPa or 0.015 atm). This pressure difference is maintained during brew
|
https://en.wikipedia.org/wiki/Electric%20Power%20Systems%20Research
|
Electric Power Systems Research is a peer-reviewed scientific journal covering research on new applications of transmission, generation, distribution and uses of electric power. Its current editor-in-chief is Maria Teresa Correia de Barros. According to the Journal Citation Reports, the journal has a 2010 impact factor of 1.396.
|
https://en.wikipedia.org/wiki/Appalachian%20balds
|
In the Appalachian Mountains of the eastern United States, balds are mountain summits or crests covered primarily by thick vegetation of native grasses or shrubs occurring in areas where heavy forest growth would be expected.
Balds are found primarily in the Southern Appalachians, where, even at the highest elevations, the climate is too warm to support an alpine zone, areas where trees fail to grow due to short or non-existent growing seasons. The difference between an alpine summit, such as Mount Washington in New Hampshire, and a bald, such as Gregory Bald in the Great Smoky Mountains, is that a lack of trees is normal for the colder climate of the former but abnormal for the warmer climate of the latter. One example of southern balds' abnormality can be found at Roan Mountain, where Roan High Knob (el. 6,285 ft/1,915 m) is coated with a dense stand of spruce-fir forest, whereas an adjacent summit, Round Bald (el. 5,826 ft/1,776 m), is almost entirely devoid of trees. Why some summits are bald and some are not is a mystery, though there are several hypotheses.
Types
Two types of balds are found in the Appalachians:
Grassy balds
Grassy balds are relatively blunt summits covered by a dense sward of native grasses. Two types have been identified: those completely covered by grasses and those with a scattered overstory of mixed hardwoods with a grassy herbaceous layer. Grassy balds are normally found at the summit of hills, but can also be found on broad upper slopes.
Species found here include mountain oat-grass (Danthonia compressa), sedges (Carex brunnescens ssp. sphaerostachya, Carex debilis var. rudgei, Carex pensylvanica), and forbs such as three-toothed cinquefoil (Sibbaldiopsis tridentata) and Blue Ridge St. Johns-wort (Hypericum mitchellianum).
Heath balds
Heath balds are typically found along narrow ridges and mountain crests, and consist of dense evergreen shrubs. While the formation of grassy balds is a mystery, heath balds are often located in area
|
https://en.wikipedia.org/wiki/Drosophila%20embryogenesis
|
Drosophila embryogenesis, the process by which Drosophila (fruit fly) embryos form, is a favorite model system for genetics and developmental biology. The study of its embryogenesis unlocked the century-long puzzle of how development was controlled, creating the field of evolutionary developmental biology. The small size, short generation time, and large brood size make it ideal for genetic studies. Transparent embryos facilitate developmental studies. Drosophila melanogaster was introduced into the field of genetic experiments by Thomas Hunt Morgan in 1909.
Life cycle
Drosophila display a holometabolous method of development, meaning that they have three distinct stages of their post-embryonic life cycle, each with a radically different body plan: larva, pupa and finally, adult. The machinery necessary for the function and smooth transition between these three phases develops during embryogenesis. During embryogenesis, the larval stage fly will develop and hatch at a stage of its life known as the first larval instar. Cells that will produce adult structures are put aside in imaginal discs. During the pupal stage, the larval body breaks down as the imaginal disks grow and produce the adult body. This process is called complete metamorphosis. About 24 hours after fertilization, an egg hatches into a larva, which undergoes three molts taking about 5.5 to 6 days, after which it is called a pupa. The pupa metamorphoses into an adult fly, which takes about 3.5 to 4.5 days. The entire growth process from egg to adult fly takes an estimated 10 to 12 days to complete at 25 °C.
The mother fly produces oocytes that already have anterior-posterior and dorsal-ventral axes defined by maternal activities.
Embryogenesis in Drosophila is unique among model organisms in that cleavage occurs in a multinucleate syncytium (strictly a coenocyte). Early on, 256 nuclei migrate to the perimeter of the egg, creating the syncytial blastoderm. The germ line segregates from the somatic ce
|
https://en.wikipedia.org/wiki/Pythia%20%28machine%20learning%29
|
Pythia is an ancient text restoration model that recovers missing characters from a damaged text input using deep neural networks. It was created by Yannis Assael, Thea Sommerschield, and Jonathan Prag, researchers from Google DeepMind and the University of Oxford.
To study the society and the history of ancient civilisations, ancient history relies on disciplines such as epigraphy, the study of ancient inscribed texts. Hundreds of thousands of these texts, known as inscriptions, have survived to our day, but are often damaged over the centuries. Illegible parts of the text must then be restored by specialists, called epigraphists, in order to extract meaningful information from the text and use it to expand our knowledge of the context in which the text was written. Pythia takes as input the damaged text, and is trained to return hypothesised restorations of ancient Greek inscriptions, working as an assistive aid for ancient historians. Its neural network architecture works at both the character- and word-level, thereby effectively handling long-term context information, and dealing efficiently with incomplete word representations. Pythia is applicable to any discipline dealing with ancient texts (philology, papyrology, codicology) and can work in any language (ancient or modern).
|
https://en.wikipedia.org/wiki/Private%20Disk
|
Private Disk is a disk encryption application for the Microsoft Windows operating system, developed by Dekart SRL. It works by creating a virtual drive, the contents of which is encrypted on-the-fly; other software can use the drive as if it were a usual one.
One of Private Disk's key selling points is in its ease of use, which is achieved by hiding complexity from the end user (e.g. data wiping is applied transparently when an encrypted image is deleted.) This simplicity does however reduce its flexibility in some respects (e.g. it only allows the use of AES-256 encryption.)
Although Private Disk uses a NIST certified implementation of the AES and SHA-256/384/512 algorithms, this certification is restricted to a single component of Private Disk; the encryption/hash library used and not to Private Disk as a complete system.
Feature highlights
NIST-certified implementation of AES-256-bit, and SHA-2. Private Disk complies with FIPS 197 and FIPS 180-2
CBC mode with secret IVs is used to encrypt the sectors of the storage volume
Disk Firewall, an application-level filter, which allows only trusted programs to access the virtual drive
Ability to run directly from a removable drive, requiring no local installation
Offers access to encrypted data on any system, even if administrative privileges are not available
Encrypted images can be accessed on Windows Mobile and Windows CE handhelds; this is achieved by making the encrypted container format compatible with containers used by SecuBox (disk encryption software by Aiko Solutions)
File wiping is applied when deleting an encrypted image
PD File Move, a file migration tool, which will locate the specified files on the system and securely move them to an encrypted disk
Compatibility with Windows 9x and Windows NT operating systems
Autorun and Autofinish automatically start a program or a script when a virtual disk is mounted or dismounted
Encrypted backup of an encrypted image
Password quality meter
Automatic
|
https://en.wikipedia.org/wiki/Clock%20skew
|
Clock skew (sometimes called timing skew) is a phenomenon in synchronous digital circuit systems (such as computer systems) in which the same sourced clock signal arrives at different components at different times due to gate or, in more advanced semiconductor technology, wire signal propagation delay. The instantaneous difference between the readings of any two clocks is called their skew.
The operation of most digital circuits is synchronized by a periodic signal known as a "clock" that dictates the sequence and pacing of the devices on the circuit. This clock is distributed from a single source to all the memory elements of the circuit, which for example could be registers or flip-flops. In a circuit using edge-triggered registers, when the clock edge or tick arrives at a register, the register transfers the register input to the register output, and these new output values flow through combinational logic to provide the values at register inputs for the next clock tick.
Ideally, the input to each memory element reaches its final value in time for the next clock tick so that the behavior of the whole circuit can be predicted exactly. The maximum speed at which a system can run must account for the variance that occurs between the various elements of a circuit due to differences in physical composition, temperature, and path length.
In a synchronous circuit, two registers, or flip-flops, are said to be "sequentially adjacent" if a logic path connects them. Given two sequentially adjacent registers Ri and Rj with clock arrival times at the source and destination register clock pins equal to TCi and TCj respectively, clock skew can be defined as: .
In circuit design
Clock skew can be caused by many different things, such as wire-interconnect length, temperature variations, variation in intermediate devices, capacitive coupling, material imperfections, and differences in input capacitance on the clock inputs of devices using the clock. As the clock rate of a ci
|
https://en.wikipedia.org/wiki/Legion%20%28taxonomy%29
|
The legion, in biological classification, is a non-obligatory taxonomic rank within the Linnaean hierarchy sometimes used in zoology.
Taxonomic rank
In zoological taxonomy, the legion is:
subordinate to the class
superordinate to the cohort.
consists of a group of related orders
Legions may be grouped into superlegions or subdivided into sublegions, and these again into infralegions.
Use in zoology
Legions and their super/sub/infra groups have been employed in some classifications of birds and mammals. Full use is made of all of these (along with cohorts and supercohorts) in, for example, McKenna and Bell's classification of mammals.
See also
Linnaean taxonomy
Mammal classification
|
https://en.wikipedia.org/wiki/Egon%20Schulte
|
Egon Schulte (born January 7, 1955 in Heggen (Kreis Olpe), Germany) is a mathematician and a professor of Mathematics at Northeastern University in Boston. He received his Ph.D. in 1980 from the Technical University of Dortmund; his doctoral dissertation was on Regular Incidence Complexes (abstract regular polytopes).
Selected publications
External links
Egon Schulte, Professor, Northeastern University, Department of Mathematics
Egon Schulte Chair and Professor Mathematics
Schulte Publications 1984 - 2010
Living people
1955 births
Northeastern University faculty
Combinatorialists
Technical University of Dortmund alumni
People from Olpe (district)
|
https://en.wikipedia.org/wiki/Adaptxt
|
Adaptxt is a predictive text application for mobile phones, developed by KeyPoint Technologies, a UK-based software company. The application is designed to improve text entry on mobile devices by making it faster and error-free. It achieves this by predicting the next word as well as the word being typed, continuously adapting to the user's writing-style and vocabulary.
History and product features
Launched in 2006, Adaptxt supported Windows Mobile smartphones only. Adaptxt provides features such as context-based next-word suggestions, word completion, personal dictionary, dynamic language detection, conversion from SMS language to standard English and vice versa, multilingual text entry and a feature that learns new words and context while typing.
The application stores the new words in the user’s personal dictionary, where they can be edited. KeyPoint also claims that Adaptxt users can type in any of the installed languages without changing their keyboard language or dictionary, thanks to an engine capable of recognizing the language in use. This feature is supposed to be an added value for users who are bi-lingual or occasionally type in a foreign language.
A version for Symbian S60 smartphones was released in 2008, with improved support for third-party applications.
In April 2009, KeyPoint introduced a feature to scan personal data, including calendar entries, phonebook contacts, SMS and email inbox and sent items. The “Scan Facebook” feature learns words from the user’s Facebook profile. The new words learnt are added to the personal dictionary and offered as suggestions during text entry.
Later that year, KeyPoint also launched a new version of Adaptxt with error correction. This feature provides alternative suggestions for incorrect spellings. Automated correction of spelling mistakes were also made available, with an option to revert to the exact word entered by the user in case of unwanted corrections. All these features can now be found in the Symbian
|
https://en.wikipedia.org/wiki/Egli%20model
|
The Egli model is a terrain model for radio frequency propagation. This model, which was first introduced by John Egli in his 1957 paper, was derived from real-world data on UHF and VHF television transmissions in several large cities. It predicts the total path loss for a point-to-point link. Typically used for outdoor line-of-sight transmission, this model provides the path loss as a single quantity.
Applicable to/under conditions
The Egli model is typically suitable for cellular communication scenarios where one antenna is fixed and another is mobile. The model is applicable to scenarios where the transmission has to go over an irregular terrain. However, the model does not take into account travel through some vegetative obstruction, such as trees or shrubbery.
Coverage
Frequency: The model is typically applied to VHF and UHF spectrum transmissions.
Mathematical formulation
The Egli model is formally expressed as:
Where,
= Receive power [W]
= Transmit power [W]
= Absolute gain of the base station antenna.
= Absolute gain of the mobile station antenna.
= Height of the base station antenna. [m]
= Height of the mobile station antenna. [m]
= Distance from base station antenna. [m]
= Frequency of transmission. [MHz]
Limitations
This model predicts the path loss as a whole and does not subdivide the loss into free space loss and other losses.
See also
Longley–Rice model
ITU terrain model
International Telecommunication Union
|
https://en.wikipedia.org/wiki/Backward%20masking
|
The concept of backward masking originated in psychoacoustics, referring to temporal masking of quiet sounds that occur moments before a louder sound.
In cognitive psychology, visual backward masking involves presenting one visual stimulus (a "mask" or "masking stimulus") immediately after a brief (usually 30 ms) "target" visual stimulus resulting in a failure to consciously perceive the first stimulus. It is widely used in psychophysiological studies on fear and phobias that investigate the preattentive nonconscious reactions to fear-relevant stimuli.
It is unknown how a later stimulus is able to block an earlier one. However, one theory for this phenomenon, known as the dual channel interaction theory, proposes that a fast signal created by the second stimulus is able to catch up to and overcome a slower signal sent from the first impulse. A similar phenomenon can occur when a masking stimulus precedes a target stimulus rather than follows it: this is known as forward masking, or visual forward masking when the stimulus is visual. While not consciously perceived, the masked stimulus can nevertheless still have an effect on cognitive processes such as context interpretation. It has been shown that visually masked stimuli can elicit motor responses in simple reaction-time tasks (e.g. response priming) independent of their conscious visibility.
It is a widespread belief that masked stimuli can be used for psychological manipulation (see subliminal messages, psychorama). However, the empirical evidence for subliminal persuasion is limited.
|
https://en.wikipedia.org/wiki/Automatic%20volume%20limiter%20system
|
An automatic volume limiter system (AVLS) is an option that limits the maximum volume level and is enabled through software or hardware in stationary or portable media player devices used with headphones such as the Walkman or Sony PSP. The aim of this feature is to stop the headphones drowning out all other noise, and to limit the noise from the headphones being heard by other people. It can also prevent listeners from damaging their hearing. This volume limit can be set by the manufacturer or customized by the user.
|
https://en.wikipedia.org/wiki/Joint%20precision%20approach%20and%20landing%20system
|
The joint precision approach and landing system (JPALS) is a ship's system (CVN and LH type), all-weather landing system based on real-time differential correction of the Global Positioning System (GPS) signal, augmented with a local area correction message, and transmitted to the user via secure means. The onboard receiver compares the current GPS-derived position with the local correction signal, deriving a highly accurate three-dimensional position capable of being used for all-weather approaches via an Instrument Landing System-style display. While JPALS is similar to Local Area Augmentation System, but intended primarily for use by the military, some elements of JPALS may eventually see their way into civilian use to help protect high-value civilian operations against unauthorized signal alteration.
History
The development of JPALS was the result of two main military requirements. First, the military needs an all-service, highly mobile all-weather precision approach system, tailorable to a wide range of environments, from shipboard use to rapid installation at makeshift airfields. Second, they need a robust system that can maintain a high level of reliability in combat operations, particularly in its ability to effectively resist jamming.
Operation
JPALS encompasses two main categories: SRGPS (shipboard relative GPS) and LDGPS (land/local differential GPS). SRGPS provides highly accurate approach positioning for operations aboard ship, including aircraft carriers, helo and STO/VL carriers, and other shipboard operations, primarily helicopter operations.
LDGPS is further divided into three sub-categories: fixed base, tactical, and special missions. Fixed base is used for ongoing operations at military airfields around the world, while the tactical system is portable, designed for relatively short-term, austere airfield operations. The special missions system is a highly portable system capable of rapid installation and use by special forces.
Accuracy
The
|
https://en.wikipedia.org/wiki/MicroEmpix
|
MicroEmpix is the microkernel (much nearer to an exokernel) version of Empix, an operating system (OS) developed at the Computing Systems Laboratory (CSLab) of the Electrical & Computer Engineering department at the National Technical University of Athens.
Empix began in the late 1980's as the laboratory's effort to write a small Unix-like modern multitasking OS, intended for educational use. Borrowing most of its basic characteristics (file system, binary format, shell) from other popular OSes of the time (Xinu, Minix, DOS). Empix is quite small (about 10,000 lines of code) and supports Intel x86 processors, in the IBM Personal Computers (PC) XT (8088), and AT (80286) architectures, floppy disks and hard disk drives (with the File Allocation Table (FAT) 16 limits), and Enhanced Graphics Adapter (EGA) graphics (80x25 color terminal) and the serial ports. It has a shell with some basic commands, and the ability to execute multiple processes.
MicroEmpix is far different. It's about 1,600 lines of code (over which about 1,000 devoted to serial port control), and it's a microkernel, meaning that it creates and runs processes in kernel-space, with no distinction between process-space and kernel space. What the kernel sees, the process sees and vice versa. No system calls occur to require a system call dispatcher or a similar mechanism. Kernel functions are inherent to the processes created, and there is but one user.
|
https://en.wikipedia.org/wiki/Journal%20of%20Bioscience%20and%20Bioengineering
|
The Journal of Bioscience and Bioengineering is a monthly peer-reviewed scientific journal. The editor-in-chief is Noriho Kamiya (Kyushu University). It is published by The Society for Biotechnology, Japan and distributed outside Japan by Elsevier. It was founded in 1923 as a Japanese-language journal and took its current title in 1999.
Abstracting and indexing
The journal is abstracted and indexed in:
According to the Journal Citation Reports, the journal has a 2017 impact factor of 2.0.15.
|
https://en.wikipedia.org/wiki/Kitchen
|
A kitchen is a room or part of a room used for cooking and food preparation in a dwelling or in a commercial establishment. A modern middle-class residential kitchen is typically equipped with a stove, a sink with hot and cold running water, a refrigerator, and worktops and kitchen cabinets arranged according to a modular design. Many households have a microwave oven, a dishwasher, and other electric appliances. The main functions of a kitchen are to store, prepare and cook food (and to complete related tasks such as dishwashing). The room or area may also be used for dining (or small meals such as breakfast), entertaining and laundry. The design and construction of kitchens is a huge market all over the world.
Commercial kitchens are found in restaurants, cafeterias, hotels, hospitals, educational and workplace facilities, army barracks, and similar establishments. These kitchens are generally larger and equipped with bigger and more heavy-duty equipment than a residential kitchen. For example, a large restaurant may have a huge walk-in refrigerator and a large commercial dishwasher machine. In some instances, commercial kitchen equipment such as commercial sinks is used in household settings as it offers ease of use for food preparation and high durability.
In developed countries, commercial kitchens are generally subject to public health laws. They are inspected periodically by public-health officials, and forced to close if they do not meet hygienic requirements mandated by law.
History
Middle Ages
Early medieval European longhouses had an open fire under the highest point of the building. The "kitchen area" was between the entrance and the fireplace. In wealthy homes, there was typically more than one kitchen. In some homes, there were upwards of three kitchens. The kitchens were divided based on the types of food prepared in them.
The kitchen might be separate from the great hall due to the smoke from cooking fires and the chance the fires may get out of
|
https://en.wikipedia.org/wiki/Family-based%20QTL%20mapping
|
Quantitative trait loci mapping or QTL mapping is the process of identifying genomic regions that potentially contain genes responsible for important economic, health or environmental characters. Mapping QTLs is an important activity that plant breeders and geneticists routinely use to associate potential causal genes with phenotypes of interest. Family-based QTL mapping is a variant of QTL mapping where multiple-families are used.
Pedigree in humans and wheat
Pedigree information include information about ancestry. Keeping pedigree records is a centuries-old tradition. Pedigrees can also be verified using gene-marker data.
In plants
The method has been discussed in the context of plant breeding populations. Pedigree records are kept by plants breeders and pedigree-based selection is popular in several plant species. Plant pedigrees are different from that of humans, particularly as plant are hermaphroditic – an individual can be male or female and mating can be performed in random combinations, with inbreeding loops. Also plant pedigrees may contain of "selfs", i.e. offspring resulting from self-pollination of a plant.
Pedigree denotation
SIMPLE CROSS SYMBOL Example
/ first order cross SON 64/KLRE
//, second order cross IR 64/KLRE // CIAN0
/3/, third order cross TOBS /3/ SON 64/KLRE // CIAN0
/4/, fourth order cross TOBS /3/ SON 64/KLRE // CIAN0 /4/ SEE
/n/, nth order cross
BACK CROSS SYMBOL
*n n number of times the back cross parent used
left side simple cross symbol,
back cross parent is the female,
right side – male,
|
https://en.wikipedia.org/wiki/Commit%20%28version%20control%29
|
In version control systems, a commit is an operation which sends the latest changes of the source code to the repository, making these changes part of the head revision of the repository. Unlike commits in data management, commits in version control systems are kept in the repository indefinitely. Thus, when other users do an update or a checkout from the repository, they will receive the latest committed version, unless they specify that they wish to retrieve a previous version of the source code in the repository. Version control systems allow rolling back to previous versions easily. In this context, a commit within a version control system is protected as it is easily rolled back, even after the commit has been applied.
Usage
Git
To commit a change in git on the command line, assuming git is installed, the following command is run:
git commit -m 'commit message'
This is also assuming that the files within the current directory have been staged as such:
git add .
The above command adds all of the files in the working directory to be staged for the git commit. After the commit has been applied, the last step is to push the commit to the given software repository, in the case below named origin, to the branch master:
git push origin master
Also, a shortcut to add all the unstaged files and make a commit at the same time is:
git commit -a -m 'commit message'
Mercurial (hg)
To commit a change in Mercurial on the command line, assuming hg is installed, the following command is used:
hg commit --message 'Commit Message'
This is also assuming that the files within the current directory have been staged as such:
hg add
The above command adds all of the files in the working directory to be staged for the Mercurial commit. After the commit has been applied, the last step is to push the commit to the given software repository, to the default branch:
hg push
See also
Commit (data management)
|
https://en.wikipedia.org/wiki/FICO%20Xpress
|
The FICO Xpress optimizer is a commercial optimization solver for linear programming (LP), mixed integer linear programming (MILP), convex quadratic programming (QP), convex quadratically constrained quadratic programming (QCQP), second-order cone programming (SOCP) and their mixed integer counterparts. Xpress includes a general purpose non-linear solver, Xpress NonLinear, including a successive linear programming algorithm (SLP, first-order method), and Artelys Knitro (second-order methods).
Xpress was originally developed by Dash Optimization, and was acquired by FICO in 2008.
Its initial authors were Bob Daniel and Robert Ashford. The first version of Xpress could only solve LPs; support for MIPs was added in 1986.
Being released in 1983, Xpress was the first commercial LP and MIP solver running on PCs.
In 1992, an Xpress version for parallel computing was published, which was extended to distributed computing five years later.
Xpress was the first MIP solver to cross the billion matrix non-zero threshold by introducing 64-bit indexing in 2010.
Since 2014, Xpress features the first commercial implementation of a parallel dual simplex method.
Technology
Linear and quadratic programs can be solved via the primal simplex method, the dual simplex method or the barrier interior point method. All mixed integer programming variants are solved by a combination of the branch and bound method and the cutting-plane method. Infeasible problems can be analyzed via the IIS (irreducible infeasible subset) method. Xpress provides a built-in tuner for automatic tuning of control settings.
Xpress includes its modelling language Xpress Mosel and the integrated development environment Xpress Workbench.
Mosel includes distributed computing features to solve multiple scenarios of an optimization problem in parallel. Uncertainty in the input data can be handled via robust optimization methods.
Xpress has a modeling module called BCL (Builder Component Library) that interfaces to t
|
https://en.wikipedia.org/wiki/Lambda%20%28anatomy%29
|
The lambda is the meeting point of the sagittal suture and the lambdoid suture. This is also the point of the occipital angle. It is named after the Greek letter lambda.
Structure
The lambda is the meeting point of the sagittal suture and the lambdoid suture. It may be the exact midpoint of the lambdoid suture, but often deviates slightly from the midline. This is also the point of the occipital angle.
Development
In the foetus, the lambda is membranous, and is called the posterior fontanelle.
Etymology
The lambda is named after the Greek letter lambda, whose lowercase form (λ) resembles the junction formed by the sutures.
|
https://en.wikipedia.org/wiki/European%20Centre%20for%20Nature%20Conservation
|
The European Centre for Nature Conservation (ECNC) was a Dutch non-profit foundation which was active in the field of European nature and biodiversity policy between 1993 and 2017. It was set up as a network of university departments, expert centres and government agencies and operated as a European biodiversity expertise centre. The organization promoted sustainable management of natural resources and biodiversity, and aimed to stimulate interaction between science, society and policy.
Main areas of work were ecological networks, biodiversity assessment and monitoring, and stakeholder involvement. ECNC worked with and for the Council of Europe, UNEP and the European Environment Agency.
Establishment and mission
The European Centre for Nature Conservation was officially launched in 1993 by the then State Secretary for Agriculture, Nature and Food Quality of the Netherlands, J. Dzsingisz Gabor, at the conference ‘Conserving Europe’s Natural Heritage – towards a European Ecological Network’ in Maastricht. ECNC aimed to promote an integrated approach to management of natural resources and biodiversity, and stimulated interaction between science, society and policy. It was set up as a network of university departments, expert centres and government agencies.
ECNC projects focussed on:
relationship between nature and people;
business and biodiversity;
green infrastructure and ecological connectivity
monitoring biodiversity and ecosystem services;
international and European policies
regional and local approaches;
natural processes and the role that species play at the landscape scale.
ECNC developed projects throughout Europe, with a focus on Central and Eastern Europe. It worked for, or in partnership with, a number of intergovernmental and international organisations, including the Council of Europe, UNEP, European Commission, European Environment Agency, and the European Bank for Reconstruction and Development. ECNC ceased operations in October 2017.
Key
|
https://en.wikipedia.org/wiki/Journal%20of%20Machine%20Learning%20Research
|
The Journal of Machine Learning Research is a peer-reviewed open access scientific journal covering machine learning. It was established in 2000 and the first editor-in-chief was Leslie Kaelbling. The current editors-in-chief are Francis Bach (Inria) and David Blei (Columbia University).
History
The journal was established as an open-access alternative to the journal Machine Learning. In 2001, forty editorial board members of Machine Learning resigned, saying that in the era of the Internet, it was detrimental for researchers to continue publishing their papers in expensive journals with pay-access archives. The open access model employed by the Journal of Machine Learning Research allows authors to publish articles for free and retain copyright, while archives are freely available online.
Print editions of the journal were published by MIT Press until 2004 and by Microtome Publishing thereafter. From its inception, the journal received no revenue from the print edition and paid no subvention to MIT Press or Microtome Publishing.
In response to the prohibitive costs of arranging workshop and conference proceedings publication with traditional academic publishing companies, the journal launched a proceedings publication arm in 2007 and now publishes proceedings for several leading machine learning conferences, including the International Conference on Machine Learning, COLT, AISTATS, and workshops held at the Conference on Neural Information Processing Systems.
Further reading
|
https://en.wikipedia.org/wiki/Wiener%27s%20Tauberian%20theorem
|
In mathematical analysis, Wiener's tauberian theorem is any of several related results proved by Norbert Wiener in 1932. They provide a necessary and sufficient condition under which any function in or
can be approximated by linear combinations of translations of a given function.
Informally, if the Fourier transform of a function vanishes on a certain set , the Fourier transform of any linear combination of translations of also vanishes on . Therefore, the linear combinations of translations of cannot approximate a function whose Fourier transform does not vanish
on .
Wiener's theorems make this precise, stating that linear combinations of translations of are dense if and only if the zero set of the Fourier
transform of is empty (in the case of ) or of Lebesgue measure zero (in the case of ).
Gelfand reformulated Wiener's theorem in terms of commutative C*-algebras, when it states that the spectrum of the group ring
of the group of real numbers is the dual group of . A similar result is true when
is replaced by any locally compact abelian group.
The condition in
Let be an integrable function. The span of translations
is dense in if and only if the Fourier transform of has no real zeros.
Tauberian reformulation
The following statement is equivalent to the previous result, and explains why Wiener's result is a Tauberian theorem:
Suppose the Fourier transform of has no real zeros, and suppose the convolution
tends to zero at infinity for some . Then the convolution tends to zero at infinity for any
.
More generally, if
for some the Fourier transform of which has no real zeros, then also
for any .
Discrete version
Wiener's theorem has a counterpart in
: the span of the translations of is dense if and only if the Fourier series
has no real zeros. The following statements are equivalent version of this result:
Suppose the Fourier series of has no real zeros, and for some bounded sequence the convolution
tends to zero a
|
https://en.wikipedia.org/wiki/Quasitrace
|
In mathematics, especially functional analysis, a quasitrace is a not necessarily additive tracial functional on a C*-algebra. An additive quasitrace is called a trace. It is a major open problem if every quasitrace is a trace.
Definition
A quasitrace on a C*-algebra A is a map such that:
is homogeneous:
for every and .
is tracial:
for every .
is additive on commuting elements:
for every that satisfy .
and such that for each the induced map
has the same properties.
A quasitrace is:
bounded if
normalized if
lower semicontinuous if
is closed for each .
Variants
A 1-quasitrace is a map that is just homogeneous, tracial and additive on commuting elements, but does not necessarily extend to such a map on matrix algebras over A. If a 1-quasitrace extends to the matrix algebra , then it is called a n-quasitrace. There are examples of 1-quasitraces that are not 2-quasitraces. One can show that every 2-quasitrace is automatically a n-quasitrace for every . Sometimes in the literature, a quasitrace means a 1-quasitrace and a 2-quasitrace means a quasitrace.
Properties
A quasitrace that is additive on all elements is called a trace.
Uffe Haagerup showed that every quasitrace on a unital, exact C*-algebra is additive and thus a trace. The article of Haagerup was circulated as handwritten notes in 1991 and remained unpublished until 2014. Blanchard and Kirchberg removed the assumption of unitality in Haagerup's result. As of today (August 2020) it remains an open problem if every quasitrace is additive.
Joachim Cuntz showed that a simple, unital C*-algebra is stably finite if and only if it admits a dimension function. A simple, unital C*-algebra is stably finite if and only if it admits a normalized quasitrace. An important consequence is that every simple, unital, stably finite, exact C*-algebra admits a tracial state.
Every quasitrace on a von Neumann algebra is a trace.
Notes
|
https://en.wikipedia.org/wiki/Gershgorin%20circle%20theorem
|
In mathematics, the Gershgorin circle theorem may be used to bound the spectrum of a square matrix. It was first published by the Soviet mathematician Semyon Aronovich Gershgorin in 1931. Gershgorin's name has been transliterated in several different ways, including Geršgorin, Gerschgorin, Gershgorin, Hershhorn, and Hirschhorn.
Statement and proof
Let be a complex matrix, with entries . For let be the sum of the absolute values of the non-diagonal entries in the -th row:
Let be a closed disc centered at with radius . Such a disc is called a Gershgorin disc.
Theorem. Every eigenvalue of lies within at least one of the Gershgorin discs
Proof. Let be an eigenvalue of with corresponding eigenvector . Find i such that the element of x with the largest absolute value is . Since , in particular we take the ith component of that equation to get:
Taking to the other side:
Therefore, applying the triangle inequality and recalling that based on how we picked i,
Corollary. The eigenvalues of A must also lie within the Gershgorin discs Cj corresponding to the columns of A.
Proof. Apply the Theorem to AT while recognizing that the eigenvalues of the transpose are the same as those of the original matrix.
Example. For a diagonal matrix, the Gershgorin discs coincide with the spectrum. Conversely, if the Gershgorin discs coincide with the spectrum, the matrix is diagonal.
Discussion
One way to interpret this theorem is that if the off-diagonal entries of a square matrix over the complex numbers have small norms, the eigenvalues of the matrix cannot be "far from" the diagonal entries of the matrix. Therefore, by reducing the norms of off-diagonal entries one can attempt to approximate the eigenvalues of the matrix. Of course, diagonal entries may change in the process of minimizing off-diagonal entries.
The theorem does not claim that there is one disc for each eigenvalue; if anything, the discs rather correspond to the axes in , and each expresse
|
https://en.wikipedia.org/wiki/Brain%20abscess
|
Brain abscess (or cerebral abscess) is an abscess within the brain tissue caused by inflammation and collection of infected material coming from local (ear infection, dental abscess, infection of paranasal sinuses, infection of the mastoid air cells of the temporal bone, epidural abscess) or remote (lung, heart, kidney etc.) infectious sources. The infection may also be introduced through a skull fracture following a head trauma or surgical procedures. Brain abscess is usually associated with congenital heart disease in young children. It may occur at any age but is most frequent in the third decade of life.
Signs and symptoms
Fever, headache, and neurological problems, while classic, only occur in 20% of people with brain abscess.
The famous triad of fever, headache and focal neurologic findings are highly suggestive of brain abscess. These symptoms are caused by a combination of increased intracranial pressure due to a space-occupying lesion (headache, vomiting, confusion, coma), infection (fever, fatigue etc.) and focal neurologic brain tissue damage (hemiparesis, aphasia etc.).
The most frequent presenting symptoms are headache, drowsiness, confusion, seizures, hemiparesis or speech difficulties together with fever with a rapidly progressive course. Headache is characteristically worse at night and in the morning, as the intracranial pressure naturally increases when in the supine position. This elevation similarly stimulates the medullary vomiting center and area postrema, leading to morning vomiting.
Other symptoms and findings depend largely on the specific location of the abscess in the brain. An abscess in the cerebellum, for instance, may cause additional complaints as a result of brain stem compression and hydrocephalus. Neurological examination may reveal a stiff neck in occasional cases (erroneously suggesting meningitis).
Pathophysiology
Bacterial
Anaerobic and microaerophilic cocci and gram-negative and gram-positive anaerobic bacilli are the p
|
https://en.wikipedia.org/wiki/Sheaf%20of%20Paddy%20%28politics%29
|
The Sheaf of Paddy () is the political symbol of the Bangladesh Nationalist Party (BNP).
After the establishment of Pakistan, the National Awami Party (NAP) chose this symbol and participated in the elections. The Sheaf of Paddy was finalized as the symbol of NAP after the party was founded by Abdul Hamid Khan Bhashani after he quit the Awami Muslim League. After the split in the party in 1967, National Awami Party (Wali) chose the hut as its symbol and National Awami Party (Bhashani) chose the Sheaf of Paddy as its symbol and participated in 1973 Bangladeshi general election. When Bangladesh Nationalist Party (BNP) was formed 7 years after the independence of Bangladesh, most of Bhasani's NAP workers joined the party. Bhasani's symbol started to be used by BNP after the formation of the party.
Ahead of the 2018 Bangladeshi general election, the BNP had sent a letter to the Bangladesh Election Commission saying that the seven parties of the 20 Party Alliance, other than the party, could use the symbol. On 19 November, 2018, a lawyer filed a writ in the court to change the name of BNP symbol. As the reason for the writ, he cited that although the party's symbol is "Bunch of Paddy", the party authority call it "Sheaf of Paddy". In 2018, Abdul Kader Siddique claimed at an election rally that the Sheaf of Paddy was originally the symbol of Abdul Hamid Khan Bhasani's party and he later gave the symbol to Ziaur Rahman for BNP. He was criticized by BNP workers for this statement.
|
https://en.wikipedia.org/wiki/Physical%20neural%20network
|
A physical neural network is a type of artificial neural network in which an electrically adjustable material is used to emulate the function of a neural synapse or a higher-order (dendritic) neuron model. "Physical" neural network is used to emphasize the reliance on physical hardware used to emulate neurons as opposed to software-based approaches. More generally the term is applicable to other artificial neural networks in which a memristor or other electrically adjustable resistance material is used to emulate a neural synapse.
Types of physical neural networks
ADALINE
In the 1960s Bernard Widrow and Ted Hoff developed ADALINE (Adaptive Linear Neuron) which used electrochemical cells called memistors (memory resistors) to emulate synapses of an artificial neuron. The memistors were implemented as 3-terminal devices operating based on the reversible electroplating of copper such that the resistance between two of the terminals is controlled by the integral of the current applied via the third terminal. The ADALINE circuitry was briefly commercialized by the Memistor Corporation in the 1960s enabling some applications in pattern recognition. However, since the memistors were not fabricated using integrated circuit fabrication techniques the technology was not scalable and was eventually abandoned as solid-state electronics became mature.
Analog VLSI
In 1989 Carver Mead published his book Analog VLSI and Neural Systems, which spun off perhaps the most common variant of analog neural networks. The physical realization is implemented in analog VLSI. This is often implemented as field effect transistors in low inversion. Such devices can be modelled as translinear circuits. This is a technique described by Barrie Gilbert in several papers around mid 1970th, and in particular his Translinear Circuits from 1981. With this method circuits can be analyzed as a set of well-defined functions in steady-state, and such circuits assembled into complex networks.
Physical Ne
|
https://en.wikipedia.org/wiki/Media-independent%20handover
|
Media Independent Handover (MIH) is a standard being developed by IEEE 802.21 to enable the handover of IP sessions from one layer 2 access technology to another, to achieve mobility of end user devices (MIH).
Importance
The importance of MIH derives from the fact that a diverse range of broadband wireless access technologies is available and in course of development, including GSM, UMTS, CDMA2000, WiMAX, Mobile-Fi and WPANs. Multimode wireless devices that incorporate more than one of these wireless interfaces require the ability to switch among them during the course of an IP session, and devices such as laptops with Ethernet and wireless interfaces need to switch similarly between wired and wireless access.
Handover may be required, e.g. because a mobile device experiences a degradation in the radio signal, or because an access point experiences a heavy traffic load.
Functionality
The key functionality provided by MIH is communication among the various wireless layers and between them and the IP layer. The required messages are relayed by the Media Independent Handover Function, MIHF, that is located in the protocol stack between the layer 2 wireless technologies and IP at layer 3. MIH may communicate with various IP protocols including Session Initiation Protocol (SIP) for signaling, Mobile IP for mobility management, and DiffServ and IntServ for quality of service (QoS).
When a session is handed off from one access point to another access point using the same technology, the handover can usually be performed within that wireless technology itself without involving MIHF or IP. For instance a VoIP call from a Wi-Fi handset to a Wi-Fi access point can be handed over to another Wi-Fi access point within the same network, e.g. a corporate network, using Wi-Fi standards such as 802.11f and 802.11r. However, if the handover is from a Wi-Fi access point in a corporate network to a public Wi-Fi hotspot, then MIH is required, since the two access points cannot comm
|
https://en.wikipedia.org/wiki/Distortion%20problem
|
In functional analysis, a branch of mathematics, the distortion problem is to determine by how much one can distort the unit sphere in a given Banach space using an equivalent norm. Specifically, a Banach space X is called λ-distortable if there exists an equivalent norm |x| on X such that, for all infinite-dimensional subspaces Y in X,
(see distortion (mathematics)). Note that every Banach space is trivially 1-distortable. A Banach space is called distortable if it is λ-distortable for some λ > 1 and it is called arbitrarily distortable if it is λ-distortable for any λ. Distortability first emerged as an important property of Banach spaces in the 1960s, where it was studied by and .
James proved that c0 and ℓ1 are not distortable. Milman showed that if X is a Banach space that does not contain an isomorphic copy of c0 or ℓp for some (see sequence space), then some infinite-dimensional subspace of X is distortable. So the distortion problem is now primarily of interest on the spaces ℓp, all of which are separable and uniform convex, for .
In separable and uniform convex spaces, distortability is easily seen to be equivalent to the ostensibly more general question of whether or not every real-valued Lipschitz function ƒ defined on the sphere in X stabilizes on the sphere of an infinite dimensional subspace, i.e., whether there is a real number a ∈ R so that for every δ > 0 there is an infinite dimensional subspace Y of X, so that |a − ƒ(y)| < δ, for all y ∈ Y, with ||y|| = 1. But it follows from the result of that on ℓ1 there are Lipschitz functions which do not stabilize, although this space is not distortable by . In a separable Hilbert space, the distortion problem is equivalent to the question of whether there exist subsets of the unit sphere separated by a positive distance and yet intersect every infinite-dimensional closed subspace. Unlike many properties of Banach spaces, the distortion problem seems to be as difficult on Hilbert spaces as o
|
https://en.wikipedia.org/wiki/Median%20sacral%20artery
|
The median sacral artery (or middle sacral artery) is a small artery that arises posterior to the abdominal aorta and superior to its bifurcation.
Structure
The median sacral artery arises from the abdominal aorta at the level of the bottom quarter of the third lumbar vertebra. It descends in the middle line in front of the fourth and fifth lumbar vertebrae, the sacrum and coccyx, ending in the glomus coccygeum (coccygeal gland).
Minute branches pass from it, to the posterior surface of the rectum.
On the last lumbar vertebra it anastomoses with the lumbar branch of the iliolumbar artery; in front of the sacrum it anastomoses with the lateral sacral arteries, sending offshoots into the anterior sacral foramina.
It is crossed by the left common iliac vein and accompanied by a pair of venae comitantes; these unite to form a single vessel that opens into the left common iliac vein.
Development
The median sacral artery is morphologically the direct continuation of the abdominal aorta. It is vestigial in humans, but large in animals with tails, such as the crocodile.
See also
Lateral sacral artery
Additional images
|
https://en.wikipedia.org/wiki/Denjoy%E2%80%93Young%E2%80%93Saks%20theorem
|
In mathematics, the Denjoy–Young–Saks theorem gives some possibilities for the Dini derivatives of a function that hold almost everywhere.
proved the theorem for continuous functions, extended it to measurable functions, and extended it to arbitrary functions.
and give historical accounts of the theorem.
Statement
If f is a real valued function defined on an interval, then with the possible exception of a set of measure 0 on the interval, the Dini derivatives of f satisfy one of the following four conditions at each point:
f has a finite derivative
D+f = D–f is finite, D−f = ∞, D+f = –∞.
D−f = D+f is finite, D+f = ∞, D–f = –∞.
D−f = D+f = ∞, D–f = D+f = –∞.
|
https://en.wikipedia.org/wiki/Higher-order%20sinusoidal%20input%20describing%20function
|
Definition
The higher-order sinusoidal input describing functions (HOSIDF) were first introduced by dr. ir. P.W.J.M. Nuij. The HOSIDFs are an extension of the sinusoidal input describing function which describe the response (gain and phase) of a system at harmonics of the base frequency of a sinusoidal input signal. The HOSIDFs bear an intuitive resemblance to the classical frequency response function and define the periodic output of a stable, causal, time invariant nonlinear system to a sinusoidal input signal:
This output is denoted by and consists of harmonics of the input frequency:
Defining the single sided spectra of the input and output as and , such that yields the definition of the k-th order HOSIDF:
Advantages and applications
The application and analysis of the HOSIDFs is advantageous both when a nonlinear model is already identified and when no model is known yet. In the latter case the HOSIDFs require little model assumptions and can easily be identified while requiring no advanced mathematical tools. Moreover, even when a model is already identified, the analysis of the HOSIDFs often yields significant advantages over the use of the identified nonlinear model. First of all, the HOSIDFs are intuitive in their identification and interpretation while other nonlinear model structures often yield limited direct information about the behavior of the system in practice. Furthermore, the HOSIDFs provide a natural extension of the widely used sinusoidal describing functions in case nonlinearities cannot be neglected. In practice the HOSIDFs have two distinct applications: Due to their ease of identification, HOSIDFs provide a tool to provide on-site testing during system design. Finally, the application of HOSIDFs to (nonlinear) controller design for nonlinear systems is shown to yield significant advantages over conventional time domain based tuning.
Electrical engineering
Control theory
Signal processing
|
https://en.wikipedia.org/wiki/Orange%20GGN
|
Orange GGN, also known as alpha-naphthol orange, is an azo dye formerly used as a food dye. It is the disodium salt of 1-(m-sulfophenylazo)-2-naphthol-6-sulfonic acid. In Europe, it was denoted by the E Number E111, but has been forbidden for use in foods since 1 January 1978. It has never been included in the food additives list of the Codex Alimentarius. As such, it is forbidden for food use in general, because toxicological data has shown it is harmful.
The absorption spectrum of Orange GGN and Sunset Yellow is nearly identical in visible and ultraviolet range, but they can be distinguished by their IR spectra.
|
https://en.wikipedia.org/wiki/Psammoma%20body
|
A psammoma body is a round collection of calcium, seen microscopically. The term is derived from the Greek word ψάμμος (psámmos), meaning "sand".
Cause
Psammoma bodies are associated with the papillary (nipple-like) histomorphology and are thought to arise from,
Infarction and calcification of papillae tips.
Calcification of intralymphatic tumor thrombi.
Association with lesions
Psammoma bodies are commonly seen in certain tumors such as:
Papillary thyroid carcinoma
Papillary renal cell carcinoma
Ovarian papillary serous cystadenoma and cystadenocarcinoma
Endometrial adenocarcinomas (Papillary serous carcinoma ~3%-4%)
Meningiomas, in the central nervous system
Peritoneal and Pleural Mesothelioma
Somatostatinoma (pancreas)
Prolactinoma of the pituitary
Glucagonoma
Micropapillary subtype of Lung Adenocarcinoma
Benign lesions
Psammoma bodies may be seen in:
Endosalpingiosis
Psammomatous melanotic schwannoma
Melanocytic nevus
Appearance
Psammoma bodies usually have a laminar appearance, are circular, acellular and basophilic.
|
https://en.wikipedia.org/wiki/DOS%20Plus
|
DOS Plus (erroneously also known as DOS+) was the first operating system developed by Digital Research's OEM Support Group in Newbury, Berkshire, UK, first released in 1985. DOS Plus 1.0 was based on CP/M-86 Plus combined with the PCMODE emulator from Concurrent PC DOS 4.11. While CP/M-86 Plus and Concurrent DOS 4.1 still had been developed in the United States, Concurrent PC DOS 4.11 was an internationalized and bug-fixed version brought forward by Digital Research UK. Later DOS Plus 2.x issues were based on Concurrent PC DOS 5.0 instead. In the broader picture, DOS Plus can be seen as an intermediate step between Concurrent CP/M-86 and DR DOS.
DOS Plus is able to run programs written for either CP/M-86 or MS-DOS 2.11, and can read and write the floppy formats used by both of these systems. Up to four CP/M-86 programs can be multitasked, but only one DOS program can be run at a time.
User interface
DOS Plus attempts to present the same command-line interface as MS-DOS. Like MS-DOS, it has a command-line interpreter called COMMAND.COM (alternative name DOSPLUS.COM). There is an AUTOEXEC.BAT file, but no CONFIG.SYS (except for FIDDLOAD, an extension to load some field-installable device drivers (FIDD) in some versions of DOS Plus 2.1). The major difference the user will notice is that the bottom line of the screen contains status information similar to:
DDT86 ALARM UK8 PRN=LPT1 Num 10:17:30
The left-hand side of the status bar shows running processes. The leftmost one will be visible on the screen; the others (if any) are running in the background. The right-hand side shows the keyboard layout in use (UK8 in the above example), the printer port assignment, the keyboard Caps Lock and Num Lock status, and the current time. If a DOS program is running, the status line is not shown. DOS programs cannot be run in the background.
The keyboard layout in use can be changed by pressing , and one of the function keys –.
Commands
DOS Plus con
|
https://en.wikipedia.org/wiki/Thomas%20Nagel
|
Thomas Nagel (; born July 4, 1937) is an American philosopher. He is the University Professor of Philosophy and Law Emeritus at New York University, where he taught from 1980 to 2016. His main areas of philosophical interest are legal philosophy, political philosophy, and ethics.
Nagel is known for his critique of material reductionist accounts of the mind, particularly in his essay "What Is It Like to Be a Bat?" (1974), and for his contributions to liberal moral and political theory in The Possibility of Altruism (1970) and subsequent writings. He continued the critique of reductionism in Mind and Cosmos (2012), in which he argues against the neo-Darwinian view of the emergence of consciousness.
Life and career
Nagel was born on July 4, 1937, in Belgrade, Yugoslavia (now Serbia), to German Jewish refugees Carolyn (Baer) and Walter Nagel. He arrived in the US in 1939, and was raised in and around New York. He had no religious upbringing, but regards himself as a Jew.
Nagel received a Bachelor of Arts degree in philosophy from Cornell University in 1958, where he was a member of the Telluride House and was introduced to the philosophy of Ludwig Wittgenstein. He then attended the University of Oxford on a Fulbright Scholarship and received a Bachelor of Philosophy degree in 1960; there, he studied with J. L. Austin and Paul Grice. He received his Doctor of Philosophy degree in philosophy from Harvard University in 1963. At Harvard, Nagel studied under John Rawls, whom Nagel later called "the most important political philosopher of the twentieth century."
Nagel taught at the University of California, Berkeley (from 1963 to 1966) and at Princeton University (from 1966 to 1980), where he trained many well-known philosophers, including Susan Wolf, Shelly Kagan, and Samuel Scheffler, the last of whom is now his colleague at New York University.
Nagel is a fellow of the American Academy of Arts and Sciences and a corresponding fellow of the British Academy, and in 200
|
https://en.wikipedia.org/wiki/Rectus%20capitis%20anterior%20muscle
|
The rectus capitis anterior (rectus capitis anticus minor) is a short, flat muscle, situated immediately behind the upper part of the Longus capitis.
It arises from the anterior surface of the lateral mass of the atlas, and from the root of its transverse process, and passing obliquely upward and medialward, is inserted into the inferior surface of the basilar part of the occipital bone immediately in front of the foramen magnum.
action: aids in flexion of the head and the neck;
nerve supply: C1, C2.
Additional images
|
https://en.wikipedia.org/wiki/Made%20in%20NY
|
Made in NY is an incentive program and marketing campaign of the City of New York Mayor's Office of Film, Theatre & Broadcasting. Under the program, television and film productions which complete at least 75% of their shooting and rehearsal work in New York City are eligible for marketing incentives and tax credits, and can display the Made in NY logo in their closing credits. The logo was created in 2005 by graphic designer Rafael Esquer.
Made In NY also has a training program called the Made in NY Production Assistant Training Program. This trains New York City residents as production assistants and a graduate of the training program is named PA of the Month by the Mayor's Office of Film. The New York Daily News profiled James Adames, the June 2011 PA of the Month. Adames started as a Production assistant and is now working as a TV/Film Producer & Location Manager.
Made in NY is also commissioning a gut renovation of two buildings in Bush Terminal, Brooklyn. The buildings are being designed by Brooklyn architecture firm, nARCHITECTS and are intended to become a garment production hub for New York City's garment industry formerly centered in Manhattan's garment district.
See also
Media of New York City
Mayor's Office of Film, Theatre & Broadcasting
NYC Media
WNYE (FM)
WNYE-TV
|
https://en.wikipedia.org/wiki/Proof%20complexity
|
In logic and theoretical computer science, and specifically proof theory and computational complexity theory, proof complexity is the field aiming to understand and analyse the computational resources that are required to prove or refute statements. Research in proof complexity is predominantly concerned with proving proof-length lower and upper bounds in various propositional proof systems. For example, among the major challenges of proof complexity is showing that the Frege system, the usual propositional calculus, does not admit polynomial-size proofs of all tautologies. Here the size of the proof is simply the number of symbols in it, and a proof is said to be of polynomial size if it is polynomial in the size of the tautology it proves.
Systematic study of proof complexity began with the work of Stephen Cook and Robert Reckhow (1979) who provided the basic definition of a propositional proof system from the perspective of computational complexity. Specifically Cook and Reckhow observed that proving proof size lower bounds on stronger and stronger propositional proof systems can be viewed as a step towards separating NP from coNP (and thus P from NP), since the existence of a propositional proof system that admits polynomial size proofs for all tautologies is equivalent to NP=coNP.
Contemporary proof complexity research draws ideas and methods from many areas in computational complexity, algorithms and mathematics. Since many important algorithms and algorithmic techniques can be cast as proof search algorithms for certain proof systems, proving lower bounds on proof sizes in these systems implies run-time lower bounds on the corresponding algorithms. This connects proof complexity to more applied areas such as SAT solving.
Mathematical logic can also serve as a framework to study propositional proof sizes. First-order theories and, in particular, weak fragments of Peano arithmetic, which come under the name of bounded arithmetic, serve as uniform versions of
|
https://en.wikipedia.org/wiki/HostLink%20Protocol
|
HostLink is communication protocol for use with or between PLC's made by Omron. It is an ASCII-based protocol generally used for communication over RS-232 or RS-422. The protocol enables communication between various pieces of equipment in an industrial environment for programming or controlling those pieces of equipment.
The maximum allowed message size is 30 words per message. Larger messages can be sent by 'fragmentation' process, where the same slave returns a series of messages to build up the entire response. PLC host computers can transfer procedures, and monitor PLC data area, and control the PLC using the HostLink protocol.
External links
Hostlink Command Format
|
https://en.wikipedia.org/wiki/Lipokine
|
A lipokine is a lipid-controlling hormone. The term was coined by Hotamisligil Lab in 2008 to classify fatty acids which modulate lipid metabolism by what he called a "chaperone effect".
The lipokine palmitoleic acid (C16:1n7-palmitoleate) travels to the muscles and liver, where it improves cell sensitivity to insulin and blocks fat accumulation in the liver. In addition, researchers observed that palmitoleate suppresses inflammation, which is considered by many to be a primary factor leading to metabolic disease.
Palmitoleic acid also serves as a biomarker for metabolic status. More specifically, a low concentration in the free acid component of the serum indicates a risk of metabolic disease, and that de novo lipogenesis should be stimulated. Additionally, administering palmitoleic acid to a subject (via nutraceutical or other means), positively impacts lipid metabolism.
FAHFAs (fatty acid esters of hydroxy fatty acids) are lipokines formed in adipose tissue. FAHFAs improve glucose tolerance and also reduce adipose tissue inflammation. Palmitic acid esters of hydroxy-stearic acids (PAHSAs) are among the most bioactive members able to activate G-protein coupled receptors 120. Docosahexaenoic acid ester of hydroxy-linoleic acid (DHAHLA) exert anti-inflammatory and pro-resolving properties.
|
https://en.wikipedia.org/wiki/Curses%20%27N%20Chaos
|
Curses 'N Chaos is a 2D, wave-based, arena-brawler video game with a focus on 2-player co-op by independent developer Tribute Games. The game was released on August 18, 2015 for Windows, OS X, PlayStation 4, and PlayStation Vita.
Gameplay
The game is a single screen arena brawler where you fight waves of enemies. Players have the ability to craft new items and power ups, as well play alongside a friend, locally or online. The PlayStation platforms support cross-buy, cross-save and cross-play features. Players can choose between one of two heroes, Lea and Leo, to fight in melee combat against progressively more difficult waves of AI enemies.
|
https://en.wikipedia.org/wiki/Opetope
|
In category theory, a branch of mathematics, an opetope, a portmanteau of "operation" and "polytope", is a shape that captures higher-dimensional substitutions. It was introduced by John C. Baez and James Dolan so that they could define a weak n-category as a certain presheaf on the category of opetopes.
See also
higher-order operad
|
https://en.wikipedia.org/wiki/Mir-672%20microRNA%20precursor%20family
|
In molecular biology mir-672 microRNA is a short RNA molecule. MicroRNAs function to regulate the expression levels of other genes by several mechanisms.
miR-672 is underexpressed in neuroblastoma cells and has been associated with cancer pathways. It has further been identified as one of six miRNAs significantly downregulated in dorsal root ganglia following sciatic nerve entrapment. Additionally, miR-672 has been found to be X-linked and to show preferential expression in testes and ovaries.
See also
MicroRNA
|
https://en.wikipedia.org/wiki/C2orf16
|
C2orf16 is a protein that in humans is encoded by the C2orf16 gene. Isoform 2 of this protein (NCBI ID: CAH18189.1 henceforth referred to as C2orf16) is 1,984 amino acids long. The gene contains 1 exon and is located at 2p23.3. Aliases for C2orf16 include Open Reading Frame 16 on Chromosome 2 and P-S-E-R-S-H-H-S Repeats Containing Sequence.
68 orthologs are known for this gene, including in mice and sheep, but no paralogs have been found.
Gene
The C2orf16 isoform 2 is a 6.2 kb, 1 exon gene at locus 2p23.3, and contains P-S-E-R-S-H-H-S repeats on the C-terminal side of the gene from amino acid 1,559 to 1,903. These repeats appear to have arisen from a transposable element. Primates show more P-S-E-R-S-H-H-S repeats than other mammalian orthologs do.
Expression
C2orf16 is found to be highly expressed in the testes and a retinoic acid and mitogen-treated human embryonic stem cell line, but is not known to be expressed differently in age or disease phenotypes. C2orf16 is also seen to have high expression in the pre-implantation embryo from the 4-cell embryo stage to the blastocyst stage.
C2orf16 is not seen to have rapamycin sensitive expression. C2orf16 is also seen to significantly increase expression in c-MYC knockdown breast cancer cells.
mRNA
Isoforms
Two isoforms exist of C2orf16. Isoform 1 is 5,388 amino acids long encoded in 5 exons over 16,401 base pairs. Isoform 2 uses an alternate start site of transcription and is considerably shorter at 1,984 amino acids long encoded in 1 exon over 6,200 base pairs.
Expression Regulation
One miRNA is predicted to bind to the 3'UTR of C2orf16, accession number MI0005564.
Protein
C2orf16 has a predicted molecular weight of 224kD and a predicted isoelectric point of 10.08, values that are relatively constant between orthologs. The protein includes higher than average composition of serine, histidine, and arginine and a lower than average composition of alanine.
Compositional Features
A positive charge cluster is
|
https://en.wikipedia.org/wiki/FogBugz
|
FogBugz is an integrated web-based project management system featuring bug and issue tracking, discussion forums, wikis, customer relationship management, and evidence-based scheduling originally developed by Fog Creek Software.
History
FogBugz was re-branded as Manuscript at the end of 2017.
On August 3, 2018 Manuscript was acquired by DevFactory. They renamed it back to FogBugz.
|
https://en.wikipedia.org/wiki/Dreaming%20%28journal%29
|
Dreaming is a peer-reviewed academic journal published by the American Psychological Association on behalf of the International Association for the Study of Dreams. IASD's other peer-reviewed publication, the International Journal of Dream Research (IJoDR) is published on Heidelberg University Library servers.
The Dreaming journal covers research on dreaming, as well as on dreaming from the viewpoint of any of the arts and humanities. The current editor-in-chief is Deirdre Barrett (Harvard Medical School).
Abstracting and indexing
According to the Journal Citation Reports, the journal has a 2020 impact factor of 0.76.
See also
Dreams in analytical psychology
International Association for the Study of Dreams (IASD)
Oneirology
|
https://en.wikipedia.org/wiki/Archaerhodopsin
|
Archaerhodopsin proteins are a family of retinal-containing photoreceptors found in the archaea genera Halobacterium and Halorubrum. Like the homologous bacteriorhodopsin (bR) protein, archaerhodopsins harvest energy from sunlight to pump H+ ions out of the cell, establishing a proton motive force that is used for ATP synthesis. They have some structural similarities to the mammalian GPCR protein rhodopsin, but are not true homologs.
Archaerhodopsins differ from bR in that the claret membrane, in which they are expressed, includes bacterioruberin, a second chromophore thought to protect against photobleaching. bR also lacks the omega loop structure that has been observed at the N-terminus of the structures of several archaerhodopsins.
Mutants of Archaerhodopsin-3 (AR3) are widely used as tools in optogenetics for neuroscience research.
Etymology
The term archaerhodopsin is a portmanteau of archaea (the domain in which the proteins are found) and rhodopsin (a photoreceptor responsible for vision in the mammalian eye).
archaea from Ancient Greek ἀρχαῖα (arkhaîa, "ancient"), the plural and neuter form of ἀρχαῖος (arkhaîos, "ancient").
rhodopsin from Ancient Greek ῥόδον (rhódon, "rose"), because of its pinkish color, and ὄψις (ópsis, "sight").
History
In the 1960s, a light driven proton pump was discovered in Halobacterium salinarum, and called Bacteriorhodopsin. Over the following years, there were various studies of the membrane of H. salinarum to determine the mechanism of these light-driven proton pumps.
In 1988, another Manabu Yoshida's group at Osaka University reported a novel light-sensitive proton pump from a strain of Halobacterium which they termed Archaerhodopsin. A year later, the same group reported isolating the gene that encodes Archaerhodopsin.
Members of the archaerhodopsin family
Seven members of the archaerhodopsin family have been identified to date.
Archaerhodopsins-1 and -2 (AR1 and AR2)
Archaerhodopsin 1 and 2 (AR1 and AR2) were the fi
|
https://en.wikipedia.org/wiki/Magda%20Wierzycka
|
Magdalena Franciszka Wierzycka (born 1969 in Gliwice, Poland) is a Polish-South African billionaire businesswoman. She is the co-founder and CEO of Sygnia Ltd, a financial services company. She is the richest woman in South Africa, and is also known for her anti-corruption activism. In 2020, the magazine Forbes listed her among "Africa's 50 Most Powerful Women".
Early life and education
Wierzycka grew up in Jastrzębie-Zdrój, Poland where she shared a 2 bedroom flat with her sister, brother, grandmother and parents who were medical doctors. Wierzycka’s Jewish grandmother was a Holocaust survivor. With the gradual economic collapse of Poland due to political sanctions and the subsequent imposition of martial law, Wierzycka moved with her family in 1982 to Austria where they lived for a year in the Polish refugee camp at Traiskirchen. Her parents were forced to dig ditches to earn a living. Her family moved to South Africa in 1983 when she was just thirteen years old, with only USD500 in their bank account. The family settled in Sunnyside, Pretoria, where she attended Pretoria High School for Girls. Wierzycka had to learn English and Afrikaans swiftly because they are the primary media of instruction in South African schools and she spoke neither of the languages. She then attended the University of Cape Town where she graduated with a Bachelor of Business Science and a Postgraduate diploma in actuarial science in 1993 because it was the only degree for which she could receive a bursary.
Career
While in high school Wierzycka worked at a supermarket selling cheese and cold meats. Wierzycka’s career in the financial services industry began in 1993 when she became a product development and investment actuary at the Southern Life Association for Mutual Life and Accident Insurance (now part of MMI Holdings Limited). While at Southern Life, she paid back her bursary then spent two years building an asset consulting division as an investment consultant for the retirement f
|
https://en.wikipedia.org/wiki/Hut%208
|
Hut 8 was a section in the Government Code and Cypher School (GC&CS) at Bletchley Park (the British World War II codebreaking station, located in Buckinghamshire) tasked with solving German naval (Kriegsmarine) Enigma messages. The section was led initially by Alan Turing. He was succeeded in November 1942 by his deputy, Hugh Alexander. Patrick Mahon succeeded Alexander in September 1944.
Hut 8 was partnered with Hut 4, which handled the translation and intelligence analysis of the raw decrypts provided by Hut 8.
Located initially in one of the original single-story wooden huts, the name "Hut 8" was retained when Huts 3, 6 & 8 moved to a new brick building, Block D, in February 1943.
After 2005, the first Hut 8 was restored to its wartime condition, and it now houses the "HMS Petard Exhibition".
Operation
In 1940, a few breaks were made into the naval "Dolphin" code, but Luftwaffe messages were the first to be read in quantity. The German navy had much tighter procedures, and the capture of code books was needed (see ) before they could be broken. In February 1942, the German navy introduced "Triton", a version of Enigma with a fourth rotor for messages to and from Atlantic U-boats; these became unreadable for a period of ten months during a crucial period (see Enigma in 1942).
Britain produced modified bombes, but it was the success of the US Navy bombe that was the main source of reading messages from this version of Enigma for the rest of the war. Messages were sent to and from across the Atlantic by enciphered teleprinter links.
Personnel
In addition to the cryptanalysts, around 130 women worked in Hut 8 and provided essential clerical support including punching holes into the Banbury sheets. Hut 8 relied on Wrens to run the bombes housed elsewhere at Bletchley.
Code breakers
Alan Turing
Conel Hugh O'Donel Alexander
Michael Arbuthnot Ashcroft
Joan Clarke
Joseph Gillis
Harry Golombek
I. J. Good
Peter Hilton, January 1942 to late 1942
Rosalind
|
https://en.wikipedia.org/wiki/Nonimaging%20optics
|
Nonimaging optics (also called anidolic optics) is the branch of optics concerned with the optimal transfer of light radiation between a source and a target. Unlike traditional imaging optics, the techniques involved do not attempt to form an image of the source; instead an optimized optical system for optimal radiative transfer from a source to a target is desired.
Applications
The two design problems that nonimaging optics solves better than imaging optics are:
solar energy concentration: maximizing the amount of energy applied to a receiver, typically a solar cell or a thermal receiver
illumination: controlling the distribution of light, typically so it is "evenly" spread over some areas and completely blocked from other areas
Typical variables to be optimized at the target include the total radiant flux, the angular distribution of optical radiation, and the spatial distribution of optical radiation. These variables on the target side of the optical system often must be optimized while simultaneously considering the collection efficiency of the optical system at the source.
Solar energy concentration
For a given concentration, nonimaging optics provide the widest possible acceptance angles and, therefore, are the most appropriate for use in solar concentration as, for example, in concentrated photovoltaics. When compared to "traditional" imaging optics (such as parabolic reflectors or fresnel lenses), the main advantages of nonimaging optics for concentrating solar energy are:
wider acceptance angles resulting in higher tolerances (and therefore higher efficiencies) for:
less precise tracking
imperfectly manufactured optics
imperfectly assembled components
movements of the system due to wind
finite stiffness of the supporting structure
deformation due to aging
capture of circumsolar radiation
other imperfections in the system
higher solar concentrations
smaller solar cells (in concentrated photovoltaics)
higher temperatures (in concentrated solar thermal)
|
https://en.wikipedia.org/wiki/Modularity%20theorem
|
The modularity theorem (formerly called the Taniyama–Shimura conjecture, Taniyama-Weil conjecture or modularity conjecture for elliptic curves) states that elliptic curves over the field of rational numbers are related to modular forms. Andrew Wiles proved the modularity theorem for semistable elliptic curves, which was enough to imply Fermat's Last Theorem. Later, a series of papers by Wiles's former students Brian Conrad, Fred Diamond and Richard Taylor, culminating in a joint paper with Christophe Breuil, extended Wiles's techniques to prove the full modularity theorem in 2001.
Statement
The theorem states that any elliptic curve over can be obtained via a rational map with integer coefficients from the classical modular curve for some integer ; this is a curve with integer coefficients with an explicit definition. This mapping is called a modular parametrization of level . If is the smallest integer for which such a parametrization can be found (which by the modularity theorem itself is now known to be a number called the conductor), then the parametrization may be defined in terms of a mapping generated by a particular kind of modular form of weight two and level , a normalized newform with integer -expansion, followed if need be by an isogeny.
Related statements
The modularity theorem implies a closely related analytic statement:
To each elliptic curve E over we may attach a corresponding L-series. The -series is a Dirichlet series, commonly written
The generating function of the coefficients is then
If we make the substitution
we see that we have written the Fourier expansion of a function of the complex variable , so the coefficients of the -series are also thought of as the Fourier coefficients of . The function obtained in this way is, remarkably, a cusp form of weight two and level and is also an eigenform (an eigenvector of all Hecke operators); this is the Hasse–Weil conjecture, which follows from the modularity theorem.
Some modular
|
https://en.wikipedia.org/wiki/Conjunctival%20squamous%20cell%20carcinoma
|
Conjunctival squamous cell carcinoma (conjunctival SCC) and corneal intraepithelial neoplasia comprise ocular surface squamous neoplasia (OSSN). SCC is the most common malignancy of the conjunctiva in the US, with a yearly incidence of 1–2.8 per 100,000. Risk factors for the disease are exposure to sun (specifically occupational), exposure to UVB, and light-colored skin. Other risk factors include radiation, smoking, HPV, arsenic, and exposure to polycyclic hydrocarbons.
Conjunctival SCC is often asymptomatic at first, but it can present with the presence of a growth, red eye, pain, itching, burning, tearing, sensitivity to light, double vision, and decreased vision.
Spread of conjunctival SCC can occur in 1–21% of cases, with the first site of spread being the regional lymph nodes. Mortality for conjunctival SCC ranges from 0–8%.
Diagnosis is often made by biopsy, as well as CT (in the case of invasive SCC).
Treatment of conjunctival SCC is usually surgical excision followed by cryotherapy. After this procedure, Conjunctival SCC can recur 8–40% of the time. Radiation treatment, topical Mitomycin C, and removal of the contents of the orbit, or exenteration, are other methods of treatment. Close follow-up is recommended, because the average time to recurrence is 8–22 months.
Classification
Cancer can be considered a very large and exceptionally heterogeneous family of malignant diseases, with squamous cell carcinomas comprising one of the largest subsets.
Terminology
All squamous cell carcinoma lesions are thought to begin via the repeated, uncontrolled division of cancer stem cells of epithelial lineage or characteristics. Accumulation of these cancer cells causes a microscopic focus of abnormal cells that are, at least initially, locally confined within the specific tissue in which the progenitor cell resided. This condition is called squamous cell carcinoma in situ, and it is diagnosed when the tumor has not yet penetrated the basement membrane or other delim
|
https://en.wikipedia.org/wiki/Woods%E2%80%93Saxon%20potential
|
The Woods–Saxon potential is a mean field potential for the nucleons (protons and neutrons) inside the atomic nucleus, which is used to describe approximately the forces applied on each nucleon, in the nuclear shell model for the structure of the nucleus. The potential is named after Roger D. Woods and David S. Saxon.
The form of the potential, in terms of the distance r from the center of nucleus, is:
where V0 (having dimension of energy) represents the potential well depth,
a is a length representing the "surface thickness" of the nucleus, and is the nuclear radius where and A is the mass number.
Typical values for the parameters are: , .
For large atomic number A this potential is similar to a potential well. It has the following desired properties
It is monotonically increasing with distance, i.e. attracting.
For large A, it is approximately flat in the center.
Nucleons near the surface of the nucleus (i.e. having within a distance of order a) experience a large force towards the center.
It rapidly approaches zero as r goes to infinity (), reflecting the short-distance nature of the strong nuclear force.
The Schrödinger equation of this potential can be solved analytically, by transforming it into a hypergeometric differential equation. The radial part of the wavefunction solution is given by
where , , , and . Here is the hypergeometric function.
See also
Finite potential well
Quantum harmonic oscillator
Particle in a box
Yukawa potential
Nuclear force
Nuclear structure
Shell model
|
https://en.wikipedia.org/wiki/Dixon%20elliptic%20functions
|
In mathematics, the Dixon elliptic functions sm and cm are two elliptic functions (doubly periodic meromorphic functions on the complex plane) that map from each regular hexagon in a hexagonal tiling to the whole complex plane. Because these functions satisfy the identity , as real functions they parametrize the cubic Fermat curve , just as the trigonometric functions sine and cosine parametrize the unit circle .
They were named sm and cm by Alfred Dixon in 1890, by analogy to the trigonometric functions sine and cosine and the Jacobi elliptic functions sn and cn; Göran Dillner described them earlier in 1873.
Definition
The functions sm and cm can be defined as the solutions to the initial value problem:
Or as the inverse of the Schwarz–Christoffel mapping from the complex unit disk to an equilateral triangle, the Abelian integral:
which can also be expressed using the hypergeometric function:
Parametrization of the cubic Fermat curve
Both sm and cm have a period along the real axis of with the beta function and the gamma function:
They satisfy the identity . The parametric function parametrizes the cubic Fermat curve with representing the signed area lying between the segment from the origin to , the segment from the origin to , and the Fermat curve, analogous to the relationship between the argument of the trigonometric functions and the area of a sector of the unit circle. To see why, apply Green's theorem:
Notice that the area between the and can be broken into three pieces, each of area :
Symmetries
The function has zeros at the complex-valued points for any integers and , where is a cube root of unity, (that is, is an Eisenstein integer). The function has zeros at the complex-valued points . Both functions have poles at the complex-valued points .
On the real line, , which is analogous to .
Fundamental reflections, rotations, and translations
Both and commute with complex conjugation,
Analogous to the parity of trigonom
|
https://en.wikipedia.org/wiki/Mouse%20Genetics%20Project
|
The Mouse Genetics Project (MGP) is a large-scale mutant mouse production and phenotyping programme aimed at identifying new model organisms of disease.
Based at the Wellcome Trust Sanger Institute, the project uses knockout mice most of which were generated by the International Knockout Mouse Consortium. For each mutant line, groups of seven male and seven female mice move through a standard analysis pipeline aimed at detecting traits that differ from healthy C57BL/6 mice. The pipeline collects many measurements of viability, fertility, body weight, infection, hearing, morphology, haematology, behaviour, blood chemistry and immunity and compares them to wild type controls using a statistical mixed model. These data are immediately shared among the scientific and medical research community through a bespoke open access database, and summaries are displayed in other online resources, including the Mouse Genome Informatics database and the Wikipedia-based Gene Wiki.
As of July 2013, the MGP reports having over 900 mutant lines openly available to the international research community, and have "substantively complete" analysis for over 650 mutant lines, of which over 75 per cent have at least one abnormal phenotype. Among these are new discoveries of genes implicated in disease, including finding:
Mutation of SLX4 causes a new type of Fanconi anemia.
Nine new genes that influence bone strength.
Mutation of CENPJ models Seckel syndrome.
SPNS2 is important in mammalian immune system function.
MYSM1 is important for hematopoiesis and lymphocyte differentiation.
See also
International Mouse Phenotyping Consortium
SHIRPA
|
https://en.wikipedia.org/wiki/Audio-visual%20speech%20recognition
|
Audio visual speech recognition (AVSR) is a technique that uses image processing capabilities in lip reading to aid speech recognition systems in recognizing undeterministic phones or giving preponderance among near probability decisions.
Each system of lip reading and speech recognition works separately, then their results are mixed at the stage of feature fusion. As the name suggests, it has two parts. First one is the audio part and second one is the visual part. In audio part we use features like log mel spectrogram, mfcc etc. from the raw audio samples and we build a model to get feature vector out of it . For visual part generally we use some variant of convolutional neural network to compress the image to a feature vector after that we concatenate these two vectors (audio and visual ) and try to predict the target object.
External links
IBM Research - Audio Visual Speech Technologies
Looking to listen at cocktail party
Google AI blog
Computational linguistics
Speech recognition
Applications of computer vision
Multimodal interaction
|
https://en.wikipedia.org/wiki/Boolean%20differential%20calculus
|
Boolean differential calculus (BDC) (German: (BDK)) is a subject field of Boolean algebra discussing changes of Boolean variables and Boolean functions.
Boolean differential calculus concepts are analogous to those of classical differential calculus, notably studying the changes in functions and variables with respect to another/others.
The Boolean differential calculus allows various aspects of dynamical systems theory such as
automata theory on finite automata
Petri net theory
supervisory control theory (SCT)
to be discussed in a united and closed form, with their individual advantages combined.
History and applications
Originally inspired by the design and testing of switching circuits and the utilization of error-correcting codes in electrical engineering, the roots for the development of what later would evolve into the Boolean differential calculus were initiated by works of Irving S. Reed, David E. Muller, David A. Huffman, Sheldon B. Akers Jr. and (, ) between 1954 and 1959, and of Frederick F. Sellers Jr., Mu-Yue Hsiao and Leroy W. Bearnson in 1968.
Since then, significant advances were accomplished in both, the theory and in the application of the BDC in switching circuit design and logic synthesis.
Works of , Marc Davio and in the 1970s formed the basics of BDC on which , and further developed BDC into a self-contained mathematical theory later on.
A complementary theory of Boolean integral calculus (German: ) has been developed as well.
BDC has also found uses in discrete event dynamic systems (DEDS) in digital network communication protocols.
Meanwhile, BDC has seen extensions to multi-valued variables and functions as well as to lattices of Boolean functions.
Overview
Boolean differential operators play a significant role in BDC. They allow the application of differentials as known from classical analysis to be extended to logical functions.
The differentials of a Boolean variable models the relation:
There are no constraint
|
https://en.wikipedia.org/wiki/Rankine%E2%80%93Hugoniot%20conditions
|
The Rankine–Hugoniot conditions, also referred to as Rankine–Hugoniot jump conditions or Rankine–Hugoniot relations, describe the relationship between the states on both sides of a shock wave or a combustion wave (deflagration or detonation) in a one-dimensional flow in fluids or a one-dimensional deformation in solids. They are named in recognition of the work carried out by Scottish engineer and physicist William John Macquorn Rankine and French engineer Pierre Henri Hugoniot.
The basic idea of the jump conditions is to consider what happens to a fluid when it undergoes a rapid change. Consider, for example, driving a piston into a tube filled with non-reacting gas. A disturbance is propagated through the fluid somewhat faster than the speed of sound. Because the disturbance propagates supersonically, it is a shock wave, and the fluid downstream of the shock has no advance information of it. In a frame of reference moving with the wave, atoms or molecules in front of the wave slam into the wave supersonically. On a microscopic level, they undergo collisions on the scale of the mean free path length until they come to rest in the post-shock flow (but moving in the frame of reference of the wave or of the tube). The bulk transfer of kinetic energy heats the post-shock flow. Because the mean free path length is assumed to be negligible in comparison to all other length scales in a hydrodynamic treatment, the shock front is essentially a hydrodynamic discontinuity. The jump conditions then establish the transition between the pre- and post-shock flow, based solely upon the conservation of mass, momentum, and energy. The conditions are correct even though the shock actually has a positive thickness. This non-reacting example of a shock wave also generalizes to reacting flows, where a combustion front (either a detonation or a deflagration) can be modeled as a discontinuity in a first approximation.
Governing Equations
In a coordinate system that is moving with t
|
https://en.wikipedia.org/wiki/Gram%E2%80%93Euler%20theorem
|
In geometry, the Gram–Euler theorem, Gram-Sommerville, Brianchon-Gram or Gram relation (named after Jørgen Pedersen Gram, Leonhard Euler, Duncan Sommerville and Charles Julien Brianchon) is a generalization of the internal angle sum formula of polygons to higher-dimensional polytopes. The equation constrains the sums of the interior angles of a polytope in a manner analogous to the Euler relation on the number of d-dimensional faces.
Statement
Let be an -dimensional convex polytope. For each k-face , with its dimension (0 for vertices, 1 for edges, 2 for faces, etc., up to n for P itself), its interior (higher-dimensional) solid angle is defined by choosing a small enough -sphere centered at some point in the interior of and finding the surface area contained inside . Then the Gram–Euler theorem states: In non-Euclidean geometry of constant curvature (i.e. spherical, , and hyperbolic, , geometry) the relation gains a volume term, but only if the dimension n is even:Here, is the normalized (hyper)volume of the polytope (i.e, the fraction of the n-dimensional spherical or hyperbolic space); the angles also have to be expressed as fractions (of the (n-1)-sphere).
When the polytope is simplicial additional angle restrictions known as Perles relations hold, analogous to the Dehn-Sommerville equations for the number of faces.
Examples
For a two-dimensional polygon, the statement expands into:where the first term is the sum of the internal vertex angles, the second sum is over the edges, each of which has internal angle , and the final term corresponds to the entire polygon, which has a full internal angle . For a polygon with faces, the theorem tells us that , or equivalently, . For a polygon on a sphere, the relation gives the spherical surface area or solid angle as the spherical excess: .
For a three-dimensional polyhedron the theorem reads:where is the solid angle at a vertex, the dihedral angle at an edge (the solid angle of the corresponding lune is
|
https://en.wikipedia.org/wiki/EF1%20guanine%20nucleotide%20exchange%20domain
|
In molecular biology, the EF1 guanine nucleotide exchange domain is a protein domain found in the beta and delta chains of elongation factors from eukaryotes and archaea.
Elongation factor EF1B (also known as EF-Ts or EF-1beta/gamma/delta) is a nucleotide exchange factor that is required to regenerate EF1A from its inactive form (EF1A-GDP) to its active form (EF1A-GTP). EF1A is then ready to interact with a new aminoacyl-tRNA to begin the cycle again. EF1B is more complex in eukaryotes than in bacteria, and can consist of three subunits: EF1B-alpha (or EF-1beta), EF1B-gamma (or EF-1gamma) and EF1B-beta (or EF-1delta).
The EF1 guanine nucleotide exchange domain is found in the beta (EF-1beta, also known as EF1B-alpha) and delta (EF-1delta, also known as EF1B-beta) chains of EF1B proteins from eukaryotes and archaea. The beta and delta chains have exchange activity, which mainly resides in their homologous guanine nucleotide exchange domains, found in the C-terminal region of the peptides. Their N-terminal regions may be involved in interactions with the gamma chain (EF-1gamma).
|
https://en.wikipedia.org/wiki/Low-noise%20amplifier
|
A low-noise amplifier (LNA) is an electronic component that amplifies a very low-power signal without significantly degrading its signal-to-noise ratio (SNR). Any electronic amplifier will increase the power of both the signal and the noise present at its input, but the amplifier will also introduce some additional noise. LNAs are designed to minimize that additional noise, by choosing special components, operating points, and circuit topologies. Minimizing additional noise must balance with other design goals such as power gain and impedance matching.
LNAs are found in radio communications systems, medical instruments and electronic test equipment. A typical LNA may supply a power gain of 100 (20 decibels (dB)) while decreasing the SNR by less than a factor of two (a 3 dB noise figure (NF)). Although LNAs are primarily concerned with weak signals that are just above the noise floor, they must also consider the presence of larger signals that cause intermodulation distortion.
Communications
Antennas are a common source of weak signals. An outdoor antenna is often connected to its receiver by a transmission line called a feed line. Losses in the feed line lower the received signal-to-noise ratio: a feed line loss of degrades the receiver signal-to-noise ratio (SNR) by .
An example is a feed line made from of RG-174 coaxial cable and used with a global positioning system (GPS) receiver. The loss in that feed line is at ; approximately at the GPS frequency (). This feed line loss can be avoided by placing an LNA at the antenna, which supplies enough gain to offset the loss.
An LNA is a key component at the front-end of a radio receiver circuit to help reduce unwanted noise in particular. Friis' formulas for noise models the noise in a multi-stage signal collection circuit. In most receivers, the overall NF is dominated by the first few stages of the RF front end.
By using an LNA close to the signal source, the effect of noise from subsequent stages of the re
|
https://en.wikipedia.org/wiki/Industrial%20ecology
|
Industrial ecology (IE) is the study of material and energy flows through industrial systems. The global industrial economy can be modelled as a network of industrial processes that extract resources from the Earth and transform those resources into by-products, products and services which can be bought and sold to meet the needs of humanity. Industrial ecology seeks to quantify the material flows and document the industrial processes that make modern society function. Industrial ecologists are often concerned with the impacts that industrial activities have on the environment, with use of the planet's supply of natural resources, and with problems of waste disposal. Industrial ecology is a young but growing multidisciplinary field of research which combines aspects of engineering, economics, sociology, toxicology and the natural sciences.
Industrial ecology has been defined as a "systems-based, multidisciplinary discourse that seeks to understand emergent behavior of complex integrated human/natural systems". The field approaches issues of sustainability by examining problems from multiple perspectives, usually involving aspects of sociology, the environment, economy and technology. The name comes from the idea that the analogy of natural systems should be used as an aid in understanding how to design sustainable industrial systems.
Overview
Industrial ecology is concerned with the shifting of industrial process from linear (open loop) systems, in which resource and capital investments move through the system to become waste, to a closed loop system where wastes can become inputs for new processes.
Much of the research focuses on the following areas:
material and energy flow studies ("industrial metabolism")
dematerialization and decarbonization
technological change and the environment
life-cycle planning, design and assessment
design for the environment ("eco-design")
extended producer responsibility ("product stewardship")
eco-industrial parks
|
https://en.wikipedia.org/wiki/Epiphany%20Eyewear
|
Epiphany Eyewear are smartglasses developed by Vergence Labs. The glasses record video stored within the glasses' hardware for live-stream upload to a computer or social media. The glasses use smartphone technology. The head mounted display is a mobile computer and a high-definition camera. The glasses take photographic images, record or stream video to a smartphone or computer tablet.
The style of the eyewear frames is similar to the basic designer-like frames made famous and worn by Buddy Holly. The multifunction plastic titanium framed glasses are controlled by pressing tactile buttons on the sidebar of the frame to activate the camera or determine the darkness of the sun glass lens. If a prescription eye glass lens is needed, a prescription lens with a Nominal Base Curve of 2 diopters can be installed by an optometrist.
Hardware
The eyewear are point of view shot (POV) video glasses with a computer inside the frames with multi-core processing, Wi-Fi and USB connectivity. The computer inside powers a high-definition camera to either take photographs or record motion picture video with sound. The eyewear software and apps allow integration with mobile devices to live-stream recordings and sound to social networks and YouGen.tv. The YouGen.tv website is an app platform provided and developed by Vergence Labs for Epiphany Eyewear users.
The built-in physical computer memory can store 8 GB, 16 GB or up to 32 GB of data. The power is supplied by a rechargeable lithium ion battery. Operations are powered by a tiny USB connection from the eyewear frames to a power source.
Vergence Labs acquisition
Snap Inc. acquired Vergence Labs, Inc. and its subsidiary Epiphany Eyewear in order to develop a product called Spectacles (product). Vergence Labs, Inc., the stockholders and Vergence Labs’ CEO Erick Miller as the stockholders’ agent, approved the stock purchase agreement and Vergence Labs, Inc. became a wholly owned subsidiary of Snapchat in early 2014.
Epiphany Eyewe
|
https://en.wikipedia.org/wiki/Coronary%20ligament%20of%20the%20knee
|
The coronary ligaments of the knee (also known as meniscotibial ligaments) are portions of the joint capsule which connect the inferior edges of the fibrocartilaginous menisci to the periphery of the tibial plateaus.
Structure
The coronary ligaments of the knee are continuous with the joint capsule and the menisci.
Function
The coronary ligaments function to connect parts of the outside, inferior edges of the medial and lateral menisci to the joint capsule of the knee.
The medial meniscus also has firm attachments laterally to the intercondylar area of the tibia and medially to the tibial collateral ligament.
The lateral meniscus has firm attachments medially to the intercondylar area via the ends of the meniscus, and posteromedially via the posterior meniscofemoral ligament, which attaches the posterior limb of the meniscus to the posterior cruciate ligament and medial femoral condyle. The lateral meniscus is not directly connected to the fibular collateral ligament, and is thus more movable than the medial meniscus.
Additional images
|
https://en.wikipedia.org/wiki/Yuegong-1
|
Lunar Palace 1, Moon Palace 1 or Yuegong-1 (Chinese: 月宫1号 or 月宫1 or 月宫一号 or 月宫一 ; pinyin: Yuègōng 1 hào or Yuègōng 1 or Yuègōng Yī hào or Yuègōng Yī) is a Chinese research facility for developing a moon base. It is an environmentally closed facility where occupants can simulate a long-duration self-contained mission with no outside inputs other than power/energy.
Facilities
Lunar Palace 1 occupies a 160m2 500m3 self-contained laboratory in Beijing composed of a 58m2 vegetation area of two cabins, a 42m2 living area with three bedrooms, dining room, bathroom and waste disposal chamber. The lab was designed by Liu Hong of the Beijing University of Aeronautics and Astronautics (BUAA). The lab is a type of bioregenerative life support system (BLSS), the third built in the world and the first in China.
With a crew of three, 55% of the food consumed is to be produced internally, balanced by reserves. The oxygen would be regenerated through the vegetation compartment, and the water is to be recycled internally. The crew's waste was composted.
Construction on the facility began in March 2013. The facility was unveiled on the Chinese New Year (31 January 2014). It was commissioned prior to the first mission starting in February 2014.
Missions
2014 - first research mission
The first research mission was the Permanent Astrobase Life-support Artificial Closed Ecosystem (PALACE) Research (aka "Lunar Palace-1"), a 105-day mission of three researchers. The one man, Dong Chen, and two women, Xie Beizhen and Wang Minjuan, volunteers from the BUAA, conducted the first long-duration research project of this kind in China, 3 February to 20 May 2014.
The crew grew five cereals, including wheat, corn, soybeans, peanuts and lentils; 15 vegetables, including carrots, cucumbers and water spinach; and one fruit, strawberries. The wheat provided the main source of calories and the primary source of oxygen. Meat was the primary foodstock; however, meat was grown, in the form of yellow
|
https://en.wikipedia.org/wiki/Enthalpy%20of%20neutralization
|
In chemistry and thermodynamics, the enthalpy of neutralization () is the change in enthalpy that occurs when one equivalent of an acid and a base undergo a neutralization reaction to form water and a salt. It is a special case of the enthalpy of reaction. It is defined as the energy released with the formation of 1 mole of water.
When a reaction is carried out under standard conditions at the temperature of 298 K (25 degrees Celsius) and 1 atm of pressure and one mole of water is formed, the heat released by the reaction is called the standard enthalpy of neutralization ().
The heat () released during a reaction is
where is the mass of the solution, is the specific heat capacity of the solution, and is the temperature change observed during the reaction. From this, the standard enthalpy change () is obtained by division with the amount of substance (in moles) involved.
When a strong acid, HA, reacts with a strong base, BOH, the reaction that occurs is
H+ + OH^- -> H2O
as the acid and the base are fully dissociated and neither the cation nor the anion are involved in the neutralization reaction. The enthalpy change for this reaction is -57.62 kJ/mol at 25 °C.
For weak acids or bases, the heat of neutralization is pH-dependent. In the absence of any added mineral acid or alkali, some heat is required for complete dissociation. The total heat evolved during neutralization will be smaller.
e.g. at 25°C
The heat of ionization for this reaction is equal to (–12 + 57.3) = 45.3 kJ/mol at 25 °C.
|
https://en.wikipedia.org/wiki/I3C%20%28bus%29
|
I3C is a specification to enable communication between computer chips by defining the electrical connection between the chips and signaling patterns to be used. Short for "Improved Inter Integrated Circuit", the standard defines the electrical connection between the chips to be a two wire, shared (multidrop), serial data bus, one wire (SCL) being used as a clock to define the sampling times, the other wire (SDA) being used as a data line whose voltage can be sampled. The standard defines a signalling protocol in which multiple chips can control communication and thereby act as the bus controller.
The I3C specification takes its name from, uses the same electrical connections as, and allows some backward compatibility with, the I²C bus, a de facto standard for inter-chip communication, widely used for low-speed peripherals and sensors in computer systems. The I3C standard is designed to retain some backward compatibility with the I²C system, notably allowing designs where existing I²C devices can be connected to an I3C bus but still have the bus able to switch to a higher data rate for communication at higher speeds between compliant I3C devices. The I3C standard thereby combines the advantage of the simple, two wire I²C architecture with the higher communication speeds common to more complicated buses such as the Serial Peripheral Interface (SPI).
The I3C standard was developed as a collaborative effort between electronics and computer related companies under auspices of the Mobile Industry Processor Interface Alliance (MIPI Alliance). The I3C standard was first released to the public at the end of 2017, although access requires the disclosure of private information. Google and Intel have backed I3C as a sensor interface standard for Internet of things (IoT) devices.
History
Goals of the MIPI Sensor Working Group effort were first announced in November 2014 at the MEMS Executive Congress in Scottsdale AZ.
Electronic design automation tool vendors including Caden
|
https://en.wikipedia.org/wiki/Dichroic%20glass
|
Dichroic glass is glass which can display multiple different colors depending on lighting conditions.
One dichroic material is a modern composite non-translucent glass that is produced by stacking layers of metal oxides which give the glass shifting colors depending on the angle of view, causing an array of colors to be displayed as an example of thin-film optics. The resulting glass is used for decorative purposes such as stained glass, jewelry and other forms of glass art. The commercial title of "dichroic" can also display three or more colors (trichroic or pleochroic) and even iridescence in some cases. The term dichroic is used more precisely when labelling interference filters for laboratory use.
Another dichroic glass material first appeared in a few pieces of Roman glass from the 4th century and consists of a translucent glass containing colloidal gold and silver particles dispersed in the glass matrix in certain proportions so that the glass has the property of displaying a particular transmitted color and a completely different reflected color, as certain wavelengths of light either pass through or are reflected. In ancient dichroic glass, as seen in the most famous piece, the 4th-century Lycurgus cup in the British Museum, the glass has a green color when lit from in front in reflected light, and another, purple-ish red, when lit from inside or behind the cup so that the light passes through the glass. This is not due to alternating thin metal films but colloidal silver and gold particles dispersed throughout the glass, in an effect similar to that seen in gold ruby glass, though that has only one color whatever the lighting.
Invention
Modern dichroic glass is available as a result of materials research carried out by NASA and its contractors, who developed it for use in dichroic filters. However, color changing glass dates back to at least the 4th century AD, though only very few pieces, mostly fragments, survive. It was also made in the Renaissanc
|
https://en.wikipedia.org/wiki/Muscle%20atrophy
|
Muscle atrophy is the loss of skeletal muscle mass. It can be caused by immobility, aging, malnutrition, medications, or a wide range of injuries or diseases that impact the musculoskeletal or nervous system. Muscle atrophy leads to muscle weakness and causes disability.
Disuse causes rapid muscle atrophy and often occurs during injury or illness that requires immobilization of a limb or bed rest. Depending on the duration of disuse and the health of the individual, this may be fully reversed with activity. Malnutrition first causes fat loss but may progress to muscle atrophy in prolonged starvation and can be reversed with nutritional therapy. In contrast, cachexia is a wasting syndrome caused by an underlying disease such as cancer that causes dramatic muscle atrophy and cannot be completely reversed with nutritional therapy. Sarcopenia is age-related muscle atrophy and can be slowed by exercise. Finally, diseases of the muscles such as muscular dystrophy or myopathies can cause atrophy, as well as damage to the nervous system such as in spinal cord injury or stroke. Thus, muscle atrophy is usually a finding (sign or symptom) in a disease rather than being a disease by itself. However, some syndromes of muscular atrophy are classified as disease spectrums or disease entities rather than as clinical syndromes alone, such as the various spinal muscular atrophies.
Muscle atrophy results from an imbalance between protein synthesis and protein degradation, although the mechanisms are incompletely understood and are variable depending on the cause. Muscle loss can be quantified with advanced imaging studies but this is not frequently pursued. Treatment depends on the underlying cause but will often include exercise and adequate nutrition. Anabolic agents may have some efficacy but are not often used due to side effects. There are multiple treatments and supplements under investigation but there are currently limited treatment options in clinical practice. Given the im
|
https://en.wikipedia.org/wiki/Irresistible%20force%20paradox
|
The irresistible force paradox (also unstoppable force paradox or shield and spear paradox), is a classic paradox formulated as "What happens when an unstoppable force meets an immovable object?" The immovable object and the unstoppable force are both implicitly assumed to be indestructible, or else the question would have a trivial resolution. Furthermore, it is assumed that they are two entities.
The paradox arises because it rests on two incompatible premises—that there can exist simultaneously such things as unstoppable forces and immovable objects.
Origins
An example of this paradox in eastern thought can be found in the origin of the Chinese word for contradiction (). This term originates from a story (see ) in the 3rd century BC philosophical book Han Feizi. In the story, a man trying to sell a spear and a shield claimed that his spear could pierce any shield, and then claimed that his shield was unpierceable. Then, asked about what would happen if he were to take his spear to strike his shield, the seller could not answer. This led to the idiom of "zìxīang máodùn" (自相矛盾, "from each-other spear shield"), or "self-contradictory".
Another ancient and mythological example illustrating this theme can be found in the story of the Teumessian fox, which can never be caught, and the hound Laelaps, which never misses what it hunts. Realizing the paradox, Zeus, Lord of the Sky, turns both creatures into static constellations.
Applications
The problems associated with this paradox can be applied to any other conflict between two abstractly defined extremes that are opposite.
One of the answers generated by seeming paradoxes like these is that there is no contradiction – that there is not a false dilemma. Christopher Kaczor suggested that the need to change indicates a lack of power rather than the possession thereof, and as such a person who was omniscient would never need to change their mind – not changing the future would be consistent with omniscience rather
|
https://en.wikipedia.org/wiki/Baby%20powder
|
Baby powder is an astringent powder used for preventing diaper rash and for cosmetic uses. It may be composed of talc (in which case it is also called talcum powder) or corn starch. It may also contain additional ingredients like fragrances. Baby powder can also be used as a dry shampoo, cleaning agent (to remove grease stains), and freshener.
Health risks
Talcum powder, if inhaled, may cause aspiration pneumonia and granuloma. Severe cases may lead to chronic respiratory problems and death. The particles in corn starch powder are larger and less likely to be inhaled.
Some studies have found a statistical relationship between talcum powder applied to the perineal area by women and the incidence of ovarian cancer, but there is not a consensus that the two are linked. In 2016, more than 1,000 women in the United States sued Johnson & Johnson for covering up the possible cancer risk associated with its baby powder. The company stopped selling talc-based baby powder in the United States and Canada in 2020 and has said it will stop all talc sales worldwide by 2023, switching to a corn starch-based formula. However, Johnson & Johnson says that its talc-based baby powder is safe to use and does not contain asbestos.
See also
|
https://en.wikipedia.org/wiki/Lemur%20%28input%20device%29
|
The Lemur was a highly customizable multi-touch device from French company JazzMutant founded by Yoann Gantch, Pascal Joguet, Guillaume Largillier and Julien Olivier in 2002, which served as a controller for musical devices such as synthesizers and mixing consoles, as well as for other media applications such as video performances. As an audio tool, the Lemur's role was equivalent to that of a MIDI controller in a MIDI studio setup, except that the Lemur used the Open Sound Control (OSC) protocol, a high-speed networking replacement for MIDI. The controller was especially well-suited for use with Reaktor and Max/MSP, tools for building custom software synthesizers.
Creating an interface
The Lemur came with its own proprietary software called the JazzEditor to create interfaces. Users could build interfaces using a selection of 15 different objects (including fader, knobs, pads, sliders...), group them as modules and arrange them using as many pages as needed. Each object could then receive any MIDI or OSC attribute. A particularity of the Lemur was the ability to modify the physical behavior of each object (for instance adding or removing friction on faders).
The internal memory of the Lemur enabled the storage of many interfaces, each one controlling a specific software for instance.
Discontinuation
JazzMutant discontinued production of the Lemur in 2010, citing competition from more mainstream multi-touch capable computers and tablets. The multi-touch interface was recreated as an iOS, macOS and Android app by the software company Liine (founded by Richie Hawtin).
In September 2022, Liine announced the discontinuation of the Lemur app.
Users
The Lemur had been used by several famous artists.
Alexander Hacke
Richie Hawtin
Matthew Herbert
Kraftwerk
Modeselektor
Emilie Simon
Daft Punk
See also
Haptic technology
|
https://en.wikipedia.org/wiki/FIDYST
|
FIDYST is a proprietary simulation tool developed by the Fraunhofer Institute for Industrial Mathematics that simulates fibers in turbulent flows. The name FIDYST is an acronym and means Fiber Dynamics Simulation Tool.
History
In 1995 the Fraunhofer Institute for Industrial Mathematics started a research project in order to simulate the paper transport in a printing machine. The transport of papers in printing machines can be modelled as two-dimensional fluid-structure interaction problem. The equations describing the dynamics of the paper transport are derived from shell models based on continuum mechanics that are equivalent to rod models for fiber dynamics. In order to simulate nonwoven production processes the Fraunhofer Institute for Industrial Mathematics extended the Cosserat rod models by a stochastic drag model for fibers in turbulent flows. FIDYST demonstrated its proof of concept 2007. At the EDANA Symposium 2007 the industrial company Oerlikon Neumag presented a new pilot plant where FIDYST had successfully been applied to increase the tenacity of the produced nonwoven. In 2012 the software code was ported from C to C++. 2014 the interaction of fibers with machinery parts was introduced in FIDYST. The latest release of FIDYST can simulate staple fibers.
Application
FIDYST simulates the dynamics of elastic, line shaped objects in a very general way. Hence, there is a broad spectrum of different applications for FIDYST. Of particular importance are production processes of technical textiles
.
With FIDYST engineers simulate
spunbond processes,
meltblown processes, and
airlay processes.
The simulations of the fiber dynamics are used to optimize the geometry of the production plant and the operating conditions. Goal of the optimization is an improved quality of the final product and reduced energy and raw material consumption at the same time.
FIDYST runs under Linux and Windows.
|
https://en.wikipedia.org/wiki/Marine%20resources
|
Marine resources are resources (physical and biological entities) that are found in oceans and are useful for humans. The term was popularized through Sustainable Development Goal 14 which is about "Life below water" and is one of the 17 Sustainable Development Goals established by the United Nations in 2015. The official wording of the goal is to "Conserve and sustainably use the oceans, seas and marine resources for sustainable development".
Marine resources include:
biological diversity (marine biodiversity)
ecosystem services from marine ecosystems, such as marine coastal ecosystems and coral reefs
fish and seafood
minerals (for example deep sea mining)
oil and gas
renewable energy resources, such as marine energy
sand and gravel
tourism potential
Global goals
The text of Target 14.7 of Sustainable Development Goal 14 states: "By 2030, increase the economic benefits to small island developing states and least developed countries from the sustainable use of marine resources, including through sustainable management of fisheries, aquaculture and tourism".
Fisheries and aquaculture can contribute to alleviating poverty, hunger, malnutrition and economic growth. The contribution of sustainable fisheries to the global GDP was around 0.1% per year.
See also
Effects of climate change on oceans
Human impact on marine life
Marine conservation
|
https://en.wikipedia.org/wiki/Colm%20O%27Donnell
|
Colm P. O'Donnell is an Irish chemist and engineer; he is a professor of biosystems and food engineering at the University College Dublin who is active in the field of process analytical technology (PAT); he is also a head of university School of biosystems and food engineering — as well as a chairperson of the Dairy processing technical committee of International Federation for Process Analysis and Control (IFPAC).
|
https://en.wikipedia.org/wiki/Stepper
|
A stepper is a device used in the manufacture of integrated circuits (ICs) that is similar in operation to a slide projector or a photographic enlarger. Stepper is short for step-and-repeat camera. Steppers are an essential part of the complex process, called photolithography, which creates millions of microscopic circuit elements on the surface of silicon wafers out of which chips are made. These chips form the heart of ICs such as computer processors, memory chips, and many other devices.
The stepper emerged in the late 1970s but did not become widespread until the 1980s. This was because it was replacing an earlier technology, the mask aligner. Aligners imaged the entire surface of a wafer at the same time, producing many chips in a single operation. In contrast, the stepper imaged only one chip at a time, and was thus much slower to operate. The stepper eventually displaced the aligner when the relentless forces of Moore's Law demanded that smaller feature sizes be used. Because the stepper imaged only one chip at a time it offered higher resolution and was the first technology to exceed the 1 micron limit. The addition of auto-alignment systems reduced the setup time needed to image multiple ICs, and by the late 1980s, the stepper had almost entirely replaced the aligner in the high-end market.
The stepper was itself replaced by the step-and-scan systems (scanners) which offered an additional order of magnitude resolution advance, and work by scanning only a small portion of the mask for an individual IC, and thus require much longer operation times than the original steppers. These became widespread during the 1990s and essentially universal by the 2000s. Today, step-and-scan systems are so widespread that they are often simply referred to as steppers.
History
1957: Attempts to miniaturize electronic circuits started back in 1957 when Jay Lathrop and James Nall of the U.S. Army's Diamond Ordnance Fuse Laboratories were granted a US2890395A patent for a ph
|
https://en.wikipedia.org/wiki/Teamwire
|
Teamwire is a technology start-up based in Munich, Germany, that was originally called grouptime GmbH. The company focuses on mobile messaging apps and secure communications for regulated industries. The core product is Teamwire, an encrypted instant messaging app for enterprises and the public sector. In addition to text messaging, users can send photos, videos, locations, voice messages and files with Teamwire.
History
The company was founded in August 2010 in Munich (Germany) by Tobias Stepan. In September 2011 the grouptime app was officially launched for devices with Apple`s iOS. In 2012 several updates of the app were released to improve group messaging and sharing of digital content.
In March 2014 grouptime launched a secure enterprise messaging app called Teamwire to simplify and improve the internal communication. The idea was to provide a messenger for businesses, to replace the email as the dominant channel for team communication. By mid of 2014 grouptime abandoned its consumer product and completely focused on the enterprise messaging market. In January 2015 in addition to the German cloud Teamwire became also available as an on-premise and private cloud deployment in order to fulfill the strong data protection requirements of enterprises, large corporations and the public sector. In March 2016 Teamwire became a cross-platform enterprise messaging app with the release of apps for desktop devices like Windows, Mac and Linux in addition to the existing iOS and Android apps.
In January 2017 the largest German financial services group deployed Teamwire as a secure messenger for the bank. In May 2017 it became public that the police in the state of Bavaria in Germany uses Teamwire as a secure alternative to WhatsApp.
|
https://en.wikipedia.org/wiki/Enterobacterial%20common%20antigen
|
The enterobacterial common antigen (ECA) is a carbohydrate antigen found in the outer membrane of many Enterobacterales species. The antigen is unanimously absent from other gram-negative and gram-positive bacteria. Aeromonas hydrophila 209A is the only organism outside of Enterobacterales that expresses the ECA. More studies are needed to explain the presence of the antigen in this species as no other strains of this species express the antigen. The ECA is a polysaccharide made of repeating units of trisaccharides. The functions of these units have very few proven functions. Some evidence indicates role in pathogenicity in the bacteria that present the ECA. There are three separate types of ECA these include ECAPG, ECALPS, and ECACYC, each have different lengths. The synthesis of the ECA is controlled by the wec operon and has a 12-step synthesis which is described below. Due to the lack of proven function of the ECA, any clinical significance is hard to define however, some evidence suggests that human serum has antibodies against ECA.
History
The ECA was first described in 1962 in a paper written by Calvin M. Kunin and colleagues. When documenting strains of E. coli responsible for urinary tract infections, Kunin exposed these E. coli strains to rabbit antisera and various other E. coli strains (102 homologous and heterologous strains). Using passive agglutination, Kunin detected the O-antigen found in the lipopolysaccharide (LPS) of E. coli. During the experiments, Kunin noticed that there was cross-reactivity between the rabbit antisera and many of the E. coli strains. One of the sera, O14, reacted to an antigen found in a large range of E. coli strains. Notably, the antigen was not attached to the O-antigen of the LPS. The team noted that this antigen was observed in several other enteric (gram negative) bacteria strains and absent in many gram-positive strains. Kunin wanted to name the antigen the Common Antigen (CA) but his team convinced him to reconside
|
https://en.wikipedia.org/wiki/E%20%28programming%20language%29
|
E is an object-oriented programming language for secure distributed computing, created by Mark S. Miller, Dan Bornstein, Douglas Crockford, Chip Morningstar and others at Electric Communities in 1997. E is mainly descended from the concurrent language Joule and from Original-E, a set of extensions to Java for secure distributed programming. E combines message-based computation with Java-like syntax. A concurrency model based on event loops and promises ensures that deadlock can never occur.
Philosophy
The E language is designed for computer security and secure computing. This is performed mainly by strict adherence to the object-oriented computing model, which in its pure form, has properties that support secure computing. The E language and its standard library employ a capability-based design philosophy throughout in order to help programmers build secure software and to enable software components to co-operate even if they don't fully trust each other. In E, object references serve as capabilities, hence capabilities add no computational or conceptual overhead costs. The language syntax is designed to be easy for people to audit for security flaws. For example, lexical scoping limits the amount of code that must be examined for its effects on a given variable. As another example, the language uses the == operator for comparison and the := operator for assignment; to avoid the possibility of confusion, there is no = operator.
Computational model
In E, all values are objects and computation is performed by sending messages to objects. Each object belongs to a vat (analogous to a process). Each vat has a single thread of execution, a stack frame, and an event queue. Distributed programming is just a matter of sending messages to remote objects (objects in other vats). All communication with remote parties is encrypted by the E runtime. Arriving messages are placed into the vat's event queue; the vat's event loop processes the incoming messages one by one in order
|
https://en.wikipedia.org/wiki/Gaisberg%20Transmitter
|
Gaisberg Transmitter is a facility for FM and TV-transmission on the Gaisberg mountain near Salzburg, Austria. It was the first large transmitter in Austria finished after the war and started its work on 22 August 1956 (however, a provisional transmitter already broadcast a VHF radio signal since 1953 with 1kW). It used a lattice tower and broadcast Austria's first radio station on 99.0MHz and third radio station on 94.8 MHz, each with 50 kW, as well as a TV station on channel 8 with 60/12 kW (picture/sound). During the 1980s an UHF antenna was put on top of the tower, bringing its height to 100 meters.
The ALDIS (Austrian Lightning Detection & Information System) maintains the Austrian Lightning Research Station Gaisberg next to the transmitter .
Towers in Austria
Broadcast transmitters
1956 establishments in Austria
Towers completed in 1956
20th-century architecture in Austria
|
https://en.wikipedia.org/wiki/Cubic%20field
|
In mathematics, specifically the area of algebraic number theory, a cubic field is an algebraic number field of degree three.
Definition
If K is a field extension of the rational numbers Q of degree [K:Q] = 3, then K is called a cubic field. Any such field is isomorphic to a field of the form
where f is an irreducible cubic polynomial with coefficients in Q. If f has three real roots, then K is called a totally real cubic field and it is an example of a totally real field. If, on the other hand, f has a non-real root, then K is called a complex cubic field.
A cubic field K is called a cyclic cubic field if it contains all three roots of its generating polynomial f. Equivalently, K is a cyclic cubic field if it is a Galois extension of Q, in which case its Galois group over Q is cyclic of order three. This can only happen if K is totally real. It is a rare occurrence in the sense that if the set of cubic fields is ordered by discriminant, then the proportion of cubic fields which are cyclic approaches zero as the bound on the discriminant approaches infinity.
A cubic field is called a pure cubic field if it can be obtained by adjoining the real cube root of a cube-free positive integer n to the rational number field Q. Such fields are always complex cubic fields since each positive number has two complex non-real cube roots.
Examples
Adjoining the real cube root of 2 to the rational numbers gives the cubic field . This is an example of a pure cubic field, and hence of a complex cubic field. In fact, of all pure cubic fields, it has the smallest discriminant (in absolute value), namely −108.
The complex cubic field obtained by adjoining to Q a root of is not pure. It has the smallest discriminant (in absolute value) of all cubic fields, namely −23.
Adjoining a root of to Q yields a cyclic cubic field, and hence a totally real cubic field. It has the smallest discriminant of all totally real cubic fields, namely 49.
The field obtained by adjoining to Q a root
|
https://en.wikipedia.org/wiki/Zinc%20finger%20protein%2026
|
Zinc finger protein 26 is a protein that in humans is encoded by the ZNF26 gene.
|
https://en.wikipedia.org/wiki/PowerEdge%20VRTX
|
Dell PowerEdge VRTX is a computer hardware product line from Dell.
It is a mini-blade chassis with built-in storage system. The VRTX comes in two models: a 19" rack version that is 5 rack units high or as a stand-alone tower system.
Specifications
The VRTX system is partially based on the Dell M1000e blade-enclosure and shares some technologies and components. There are also some differences with that system. The M1000e can support an EqualLogic storage area network that connects the servers to the storage via iSCSI, while the VRTX uses a shared PowerEdge RAID Controller (6Gbit PERC8). A second difference is the option to add certain PCIe cards (Gen2 support) and assign them to any of the four servers.
Servers: The VRTX chassis has 4 half-height slots available for Ivy-Bridge based PowerEdge blade servers. At launch the PE-M520 (Xeon E5-2400v2) and the PE-M620 (Xeon E5-2600v2) were the only two supported server blades, however the M520 was since discontinued. The same blades are used in the M1000e but for use in the VRTX they need to run specific configuration, using two PCIe 2.0 mezzanine cards per server. A conversion kit is available from Dell to allow moving a blade from a M1000e to VRTX chassis.
Storage: The VRTX chassis includes shared storage slots that connect to a single or dual PERC 8 controller(s) via switched 6Gbit SAS. This controller which is managed through the CMC allows RAID groups to be configured and then allows for those RAID groups to be subdivided into individual virtual disks that can be presented out to either single or multiple blades. The shared storage slots are either 12 x 3.5" HDD slots or 24 x 2.5" HDD slots depending on the VRTX chassis purchased. Dell offers 12Gbit SAS disks for the VRTX, but these will operate at the slower 6Gbit rate for compatibility with the older PERC8 and SAS switches.
Networking: The VRTX chassis has a built in IOM for supporting ethernet traffic to the server blades. At present the options for this IOM ar
|
https://en.wikipedia.org/wiki/Blight
|
Blight refers to a specific symptom affecting plants in response to infection by a pathogenic organism.
Description
Blight is a rapid and complete chlorosis, browning, then death of plant tissues such as leaves, branches, twigs, or floral organs. Accordingly, many diseases that primarily exhibit this symptom are called blights. Several notable examples are:
Late blight of potato, caused by the water mold Phytophthora infestans (Mont.) de Bary, the disease which led to the Great Irish Famine
Southern corn leaf blight, caused by the fungus Cochliobolus heterostrophus (Drechs.) Drechs, anamorph Bipolaris maydis (Nisikado & Miyake) Shoemaker, incited a severe loss of corn in the United States in 1970.
Chestnut blight, caused by the fungus Cryphonectria parasitica (Murrill) Barr, has nearly completely eradicated mature American chestnuts in North America.
Citrus blight, caused by an unknown agent, infects all citrus scions.
Fire blight of pome fruits, caused by the bacterium Erwinia amylovora (Burrill) Winslow et al., is the most severe disease of pear and also is found in apple and raspberry, among others.
Bacterial leaf blight of rice, caused by the bacterium Xanthomonas oryzae (Uyeda & Ishiyama) Dowson.
Bacterial seedling blight of rice (Oryza sativa), caused by pathogen Burkholderia plantarii
Early blight of potato and tomato, caused by species of the ubiquitous fungal genus Alternaria
Leaf blight of the grasses e.g. Ascochyta species and Alternaria triticina that causes blight in wheat
Bur oak blight, caused by the fungal pathogen Tubakia iowensis.
South American leaf blight, caused by the ascomycete Pseudocercospora ulei, also called Microcyclus ulei, ended the cultivation of the rubber tree (Hevea brasiliensis) in South America.
On leaf tissue, symptoms of blight are the initial appearance of lesions which rapidly engulf surrounding tissue. However, leaf spots may, in advanced stages, expand to kill entire areas of leaf tissue and thus exhibit blight
|
https://en.wikipedia.org/wiki/String%20theory%20landscape
|
In string theory, the string theory landscape (or landscape of vacua) is the collection of possible false vacua, together comprising a collective "landscape" of choices of parameters governing compactifications.
The term "landscape" comes from the notion of a fitness landscape in evolutionary biology. It was first applied to cosmology by Lee Smolin in his book The Life of the Cosmos (1997), and was first used in the context of string theory by Leonard Susskind.
Compactified Calabi–Yau manifolds
In string theory the number of flux vacua is commonly thought to be roughly , but could be or higher. The large number of possibilities arises from choices of Calabi–Yau manifolds and choices of generalized magnetic fluxes over various homology cycles, found in F-theory.
If there is no structure in the space of vacua, the problem of finding one with a sufficiently small cosmological constant is NP complete. This is a version of the subset sum problem.
A possible mechanism of string theory vacuum stabilization, now known as the KKLT mechanism, was proposed in 2003 by Shamit Kachru, Renata Kallosh, Andrei Linde, and Sandip Trivedi.
Fine-tuning by the anthropic principle
Fine-tuning of constants like the cosmological constant or the Higgs boson mass are usually assumed to occur for precise physical reasons as opposed to taking their particular values at random. That is, these values should be uniquely consistent with underlying physical laws.
The number of theoretically allowed configurations has prompted suggestions that this is not the case, and that many different vacua are physically realized. The anthropic principle proposes that fundamental constants may have the values they have because such values are necessary for life (and therefore intelligent observers to measure the constants). The anthropic landscape thus refers to the collection of those portions of the landscape that are suitable for supporting intelligent life.
In order to implement this idea in a con
|
https://en.wikipedia.org/wiki/Insects%20in%20Japanese%20culture
|
Within Japanese culture, insects have occupied an important role as aesthetic, allegorical, and symbolic objects. In addition, insects have had a historical importance within the context of the culture and art of Japan.
Kenta Takada, longhorn beetle collector and author, noted that the Japanese appreciation for insects lies within the Shinto religion. Shinto, a form of animism, places emphasis that every facet of the natural world is worthy of reverence as they are the creation of the spiritual dimension. Takada additionally noted the importance of mono no aware, Zen awareness of the transience of all things, as an important factor within the perception of insects in a Japanese context. Lafcadio Hearn remarked that "[the] belief in a mysterious relation between ghosts and insects, or rather between spirits and insects, is a very ancient belief in the East".
Historical context
Insects have occupied a place within Japanese culture for centuries. The Lady who Loved Insects, is a classic tale of a woman who collected caterpillars during the 12th century. The Tamamushi Shrine, a miniature temple from the 7th century was formerly adorned with beetlewing from the jewel beetle Chrysochroa fulgidissima.
Lafcadio Hearn, a European-American scholar who became a Japanese citizen in the 19th century remarked: "In old Japanese literature, poems upon insects are to be found by thousands". Hearn's body of work while he was a citizen of Japan and as he analyzed Japanese literary works particularly focused on the comparative state of Western perceptions of insects compared to the Japanese ways of "[finding] delight, century after century, in watching the ways of insects". Twelve of the eleven books that Hearn had written included passages devoted to insects. In particular, Hearn wrote about Japanese tales regarding silkworms, cicadas, dragonflies, flies, kusa-hibari (a cricket known under the scientific name Svistella bifasciata), ants, fireflies, butterflies, and mosquitoes.
Ent
|
https://en.wikipedia.org/wiki/XOL-1%20Switch%20protein%20N-terminal%20domain
|
In molecular biology, Xol-1 is a protein domain, also named the Switch protein, is essentially a sex-determining protein. This entry focuses on the N-terminal domain of Xol-1.
Xol-1, the master switch gene controlling sex-determination system and dosage
compensation. This protein is normally expressed in males, where it promotes male development and prevents dosage compensation.
Function
The function of the Xol-1 protein is to act as a primary sex-determining factor that promotes sexual differentiation. It is required for proper sexual differentiation and male viability. High expression during gastrulation triggers male development, while low expression at that time triggers hermaphrodite development. Although related to GHMP kinase, its mode of action remains unclear.
Structure
The protein adopts a secondary structure consisting of five alpha helices and six antiparallel beta sheets. The fold of this family is similar to that found in ribosomal protein S5 domain 2-like. The active site of the enzyme is found at the interface between this domain and the C-terminal GHMP-like domain.
|
https://en.wikipedia.org/wiki/41st%20meridian%20east
|
The meridian 41° east of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, Europe, Asia, Africa, the Indian Ocean, the Southern Ocean, and Antarctica to the South Pole.
Part of the border between Kenya and Somalia runs about 1 km west of the meridian, parallel to it.
The 41st meridian east forms a great circle with the 139th meridian west.
From Pole to Pole
Starting at the North Pole and heading south to the South Pole, the 41st meridian east passes through:
{| class="wikitable plainrowheaders"
! scope="col" width="115" | Co-ordinates
! scope="col" width="195" | Country, territory or sea
! scope="col" | Notes
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Arctic Ocean
| style="background:#b0e0e6;" |
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Barents Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Kola Peninsula
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | White Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
|
|-valign="top"
|
! scope="row" | or
| Abkhazia is a partially recognised state. Most nations consider its territory to be part of Georgia.
Passing through Sukhumi.
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Black Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Red Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Dahlak Archipelago
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Red Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-valign="top"
|
! scope="row" |
| The meridian runs parallel to the border with Kenya, which is about 1 km to the west
|-
|
! scope="row" |
| Mainlan
|
https://en.wikipedia.org/wiki/Cysteine
|
Cysteine (symbol Cys or C; ) is a semiessential proteinogenic amino acid with the formula . The thiol side chain in cysteine often participates in enzymatic reactions as a nucleophile. Cysteine is chiral, with only L-cysteine being found in nature.
The thiol is susceptible to oxidation to give the disulfide derivative cystine, which serves an important structural role in many proteins. In this case, the symbol Cyx is sometimes used. The deprotonated form can generally be described by the symbol Cym as well.
When used as a food additive, cysteine has the E number E920.
Cysteine is encoded by the codons UGU and UGC.
Structure
Like other amino acids (not as a residue of a protein), cysteine exists as a zwitterion. Cysteine has chirality in the older / notation based on homology to - and -glyceraldehyde. In the newer R/S system of designating chirality, based on the atomic numbers of atoms near the asymmetric carbon, cysteine (and selenocysteine) have R chirality, because of the presence of sulfur (or selenium) as a second neighbor to the asymmetric carbon atom. The remaining chiral amino acids, having lighter atoms in that position, have S chirality. Replacing sulfur with selenium gives selenocysteine.
Dietary sources
Cysteinyl is a residue in high-protein foods. Some foods considered rich in cysteine include poultry, eggs, beef, and whole grains. In high-protein diets, cysteine may be partially responsible for reduced blood pressure and stroke risk. Although classified as a nonessential amino acid, in rare cases, cysteine may be essential for infants, the elderly, and individuals with certain metabolic diseases or who suffer from malabsorption syndromes. Cysteine can usually be synthesized by the human body under normal physiological conditions if a sufficient quantity of methionine is available.
Industrial sources
The majority of -cysteine is obtained industrially by hydrolysis of animal materials, such as poultry feathers or hog hair. Despite widespread bel
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.