source
stringlengths 31
227
| text
stringlengths 9
2k
|
|---|---|
https://en.wikipedia.org/wiki/China%20Brain%20Project
|
The China Brain Project is a 15-year project, approved by the Chinese National People's Congress in March 2016 as part of the 13th Five-Year Plan (2016–2020); it is one of four pilot programs of the Innovation of Science and Technology Forward 2030 program, targeted at research into the neural basis of cognitive function. Additional goals include improving diagnosis and prevention of brain diseases and driving information technology and artificial intelligence projects that are inspired by the brain.
The China Brain Project prioritizes brain-inspired AI over other approaches. The project is addressing legal, ethical, and social issues related to brain emulation (neuroethics) according to international standards and Chinese values. The project is supported by the Chinese Academy of Sciences' (CAS) Centre for Excellence in Brain Science and Intelligence, a consortium of laboratories at over twenty CAS institutes and universities, and the Chinese Institute for Brain Research, launched in March 2018.
See also
Artificial brain
BRAIN Initiative
Brain/MINDS
Human Brain Project
|
https://en.wikipedia.org/wiki/Via%20%28electronics%29
|
A via (Latin, 'path' or 'way') is an electrical connection between two or more metal layers, and are commonly used in printed circuit boards (PCB). Essentially a via is a small drilled hole that goes through two or more adjacent layers; the hole is plated with metal (often copper) that forms an electrical connection through the insulating layers.
Vias are important for PCB manufacturing. This is because the vias are drilled with certain tolerances and may be fabricated off their designated locations, so some allowance for errors in drill position must be made prior to manufacturing or else the manufacturing yield can decrease due to non-conforming boards (according to some reference standard) or even due to failing boards. In addition, regular through hole vias are considered fragile structures as they are long and narrow; the manufacturer must ensure that the vias are plated properly throughout the barrel and this in turn causes several processing steps.
In printed circuit boards
In printed circuit board (PCB) design, a via consists of two pads in corresponding positions on different copper layers of the board, that are electrically connected by a hole through the board. The hole is made conductive by electroplating, or is lined with a tube or a rivet. High-density multilayer PCBs may have microvias: blind vias are exposed only on one side of the board, while buried vias connect internal layers without being exposed on either surface. Thermal vias carry heat away from power devices and are typically used in arrays of about a dozen.
A via consists of:
Barrel — conductive tube filling the drilled hole
Pad — connects each end of the barrel to the component, plane, or trace
Antipad — clearance hole between barrel and metal layer to which it is not connected
A via, sometimes called PTV or plated-through-via, should not be confused with a plated through hole (PTH). Via is used as an interconnection between copper layers on a PCB while the PTH is generally made l
|
https://en.wikipedia.org/wiki/Critical%20field%20resistance
|
Critical field resistance is a term that is associated with a shunt DC generator. In a DC shunt generator, the voltage induced across the armature, Va, is directly proportional to the flux acting across it, The flux in a DC generator is directly proportional to the field current, If. The critical field resistance is defined as the maximum field circuit resistance (for a given speed) with which the shunt generator would just excite. The shunt generator will build up voltage only if field circuit resistance is less than critical field resistance.
It is a tangent to the open-circuit characteristics of the generator (at a given speed).
|
https://en.wikipedia.org/wiki/Potentilla%20simplex
|
Potentilla simplex, also known as common cinquefoil or old-field five-fingers or oldfield cinquefoil, is a perennial herb in the Rosaceae (rose) family native to eastern North America from Ontario, Quebec, and Labrador south to Texas, Alabama, and panhandle Florida.
Potentilla simplex is a familiar plant with prostrate stems that root at nodes, with yellow flowers and 5-parted palmately pinnate leaves arising from stolons (runners) on separate stalks. Complete flowers bearing 5 yellow petals (about 4-10 mm long) bloom from March to June. It bears seed from April to July. It is commonly found in woodlands, fields, and disturbed areas. Along with Potentilla canadensis, the plant is an indicator of impoverished soil as well as the host species for the cinquefoil bud gall wasp Diastrophus potentillae.
Pollinators include mason bees, small carpenter bees, cuckoo bees, halictid bees, syrphid flies, tachinid flies, blow flies, and others. Less common pollinators are wasps and butterflies. Rabbits and groundhogs eat the foliage.
Young shoots and leaves are edible as a salad or pot herb.
|
https://en.wikipedia.org/wiki/LogSumExp
|
The LogSumExp (LSE) (also called RealSoftMax or multivariable softplus) function is a smooth maximum – a smooth approximation to the maximum function, mainly used by machine learning algorithms. It is defined as the logarithm of the sum of the exponentials of the arguments:
Properties
The LogSumExp function domain is , the real coordinate space, and its codomain is , the real line.
It is an approximation to the maximum with the following bounds
The first inequality is strict unless . The second inequality is strict unless all arguments are equal.
(Proof: Let . Then . Applying the logarithm to the inequality gives the result.)
In addition, we can scale the function to make the bounds tighter. Consider the function . Then
(Proof: Replace each with for some in the inequalities above, to give
and, since
finally, dividing by gives the result.)
Also, if we multiply by a negative number instead, we of course find a comparison to the function:
The LogSumExp function is convex, and is strictly increasing everywhere in its domain (but not strictly convex everywhere).
Writing the partial derivatives are:
which means the gradient of LogSumExp is the softmax function.
The convex conjugate of LogSumExp is the negative entropy.
log-sum-exp trick for log-domain calculations
The LSE function is often encountered when the usual arithmetic computations are performed on a logarithmic scale, as in log probability.
Similar to multiplication operations in linear-scale becoming simple additions in log-scale, an addition operation in
linear-scale becomes the LSE in log-scale:
A common purpose of using log-domain computations is to increase accuracy and avoid underflow and overflow problems
when very small or very large numbers are represented directly (i.e. in a linear domain) using limited-precision
floating point numbers.
Unfortunately, the use of LSE directly in this case can again cause overflow/underflow problems. Therefore, the
following equivalent must
|
https://en.wikipedia.org/wiki/Light%20cone%20gauge
|
In theoretical physics, light cone gauge is an approach to remove the ambiguities arising from a gauge symmetry. While the term refers to several situations, a null component of a field A is set to zero (or a simple function of other variables) in all cases.
The advantage of light-cone gauge is that fields, e.g. gluons in the QCD case, are transverse. Consequently, all ghosts and other unphysical degrees of freedom are eliminated. The disadvantage is that some symmetries such as Lorentz symmetry become obscured (they become non-manifest, i.e. hard to prove).
Gauge theory
In gauge theory, light-cone gauge refers to the condition where
It is a method to get rid of the redundancies implied by Yang–Mills symmetry.
String theory
In string theory, light-cone gauge fixes the reparameterization invariance on the world sheet by
where is a constant and is the worldsheet time.
See also
light cone coordinates
|
https://en.wikipedia.org/wiki/Herbert%20Winful
|
Herbert Graves Winful (born 3 December 1952) is a Ghanaian-American engineering professor, whose honours include in 2020 the Quantum Electronics Award. He is the Joseph E. and Anne P. Rowe Professor of Electrical Engineering, Arthur F. Thurnau Professor of Electrical Engineering and Computer Science, and a Professor of Physics at the University of Michigan.
Early years and education
Winful was born in London, England, to Margaret Ferguson Graves, a teacher, and Herbert Francis, an engineer. Winful grew up in Cape Coast, Ghana, where he attended Catholic Jubilee School and St Augustine's College. In 1975 he earned a BS in electrical engineering from the Massachusetts Institute of Technology (MIT) (where he was mentored by Hermann A. Haus), followed by an M.S. in Electrical Engineering (1977) and a PhD in 1981 from the University of Southern California. His thesis was titled "Optical bistability in periodic structures and in four-wave mixing processes" and his doctoral advisor was John Marburger.
From 1980 to 1986, Winful was a Principal Member of Technical Staff at GTE Laboratories in Waltham, Massachusetts, conducting research in fiber optics and semiconductor laser physics.
Career
In 1987 Winful took up the post of associate professor in the Electrical Engineering and Computer Sciences (EECS) department at the University of Michigan, and was promoted to become a full professor in 1992, then a year later promoted to an endowed professorship as Thurnau Professor.
As noted by Anis Haffar: "His many contributions to photonics and quantum electronics include pioneering work on nonlinear optical periodic structures; the nonlinear dynamics of coherently coupled laser arrays; the physics of quantum tunneling time; polarization instabilities and distributed-feedback fiber Raman lasers."
A close colleague at the University of Michigan was Gérard Mourou, who in 2018 was co-winner of the Nobel Prize in Physics for the invention of a technique known as Chirped Pulse Amplif
|
https://en.wikipedia.org/wiki/Finite%20volume%20method%20for%20one-dimensional%20steady%20state%20diffusion
|
The Finite volume method in computational fluid dynamics is a discretization technique for partial differential equations that arise from physical conservation laws. These equations can be different in nature, e.g. elliptic, parabolic, or hyperbolic. The first well-documented
use of this method was by Evans and Harlow (1957) at Los Alamos. The general equation for steady diffusion can be easily be derived from the general transport equation for property Φ by deleting transient and convective terms.
General Transport equation can be defined as
,
where
is density and is the conserved quantity,
is the Diffusion coefficient and is the Source term.
is the Net rate of flow of out of fluid element (convection),
is Rate of increase of due to diffusion,
is Rate of increase of due to sources.
is Rate of increase of of fluid element(transient),
Conditions under which the transient and convective terms goes to zero:
Steady State
Low Reynolds Number
For one-dimensional, steady-state diffusion, General Transport equation reduces to:
,
or,
.
The following steps comprise the finite volume method for one-dimensional steady state diffusion -
STEP 1
Grid Generation
Divide the domain into equal parts of small domain.
Place nodal points at the center of each small domain.
Create control volumes using these nodal points.
Create control volumes near the edges in such a way that the physical boundaries coincide with control volume boundaries (Figure 1).
Assume a general nodal point 'P' for a general control volume. Adjacent nodal points to the East and West are identified by E and W respectively. The West-side face of the control volume is referred to by 'w' and the East-side control volume face by 'e' (Figure 2).
The distance between WP, wP, Pe and PE are identified by ,, and respectively (Figure 4).
STEP 2
Discretization
The crux of Finite volume method is to integrate the governing equation over each control volume.
Nodal points are used to
|
https://en.wikipedia.org/wiki/Iometer
|
Iometer is an I/O subsystem measurement and characterization tool for single and clustered systems. It is used as a benchmark and troubleshooting tool and is easily configured to replicate the behaviour of many popular applications. One commonly quoted measurement provided by the tool is IOPS.
History
Created by Intel Corporation (Sean Hefty, David Levine and Fab Tillier are listed by the Iometer About dialog as the developers), the tool was officially announced at the Intel Developer Forum (IDF) on 17 February 1998. In 2001 Intel discontinued development and subsequently handed the sources to the Open Source Development Lab for release under the Intel Open Source License. On 15 November 2001 the Iometer project was registered at SourceForge.net and an initial version was made available. Experiencing no further development, the project was relaunched by Daniel Scheibli in February 2003. Since then it has been driven by an international group of individuals who have been improving and porting the product to additional platforms.
Functionality
Iometer is based on a client–server model, where one instance of the Iometer graphical user interface is managing one or more 'managers' (each one representing a separate Dynamo.exe process) which are doing the I/O with one or more worker threads. Iometer performs Asynchronous I/O - accessing files or block devices (later one allowing to bypass the file system buffers).
Iometer allows the configuration of disk parameters such as the 'Maximum Disk Size', 'Starting Disk Sector' and '# of Outstanding I/Os'. This allows a user to configure a test file upon which the 'Access Specifications' configure the I/O types to the file.
Configurable items within the Access Specifications are:
Transfer Request Size
Percent Random/Sequential distribution.
Percent Read/Write Distribution
Aligned I/O's.
Reply Size
TCP/IP status
Burstiness.
In conjunction with the Access Specifications, Iometer allows the specifications to be cycled with
|
https://en.wikipedia.org/wiki/Atomic%20clock
|
An atomic clock is a clock that measures time by monitoring the resonant frequency of atoms. It is based on atoms having different energy levels. Electron states in an atom are associated with different energy levels, and in transitions between such states they interact with a very specific frequency of electromagnetic radiation. This phenomenon serves as the basis for the International System of Units' (SI) definition of a second:The second, symbol s, is the SI unit of time. It is defined by taking the fixed numerical value of the caesium frequency, , the unperturbed ground-state hyperfine transition frequency of the caesium 133 atom, to be when expressed in the unit Hz, which is equal to s−1. This definition is the basis for the system of International Atomic Time (TAI), which is maintained by an ensemble of atomic clocks around the world. The system of Coordinated Universal Time (UTC) that is the basis of civil time implements leap seconds to allow clock time to track changes in Earth's rotation to within one second while being based on clocks that are based on the definition of the second.
The accurate timekeeping capabilities of atomic clocks are also used for navigation by satellite networks such as the European Union's Galileo Programme and the United States' GPS. The timekeeping accuracy of the involved atomic clocks is important because the smaller the error in time measurement, the smaller the error in distance obtained by multiplying the time by the speed of light is (a timing error of a nanosecond or 1 billionth of a second (10 or second) translates into an almost distance and hence positional error).
The main variety of atomic clock uses caesium atoms cooled to temperatures that approach absolute zero. The primary standard for the United States, the National Institute of Standards and Technology (NIST)'s caesium fountain clock named NIST-F2, measures time with an uncertainty of 1 second in 300 million years (relative uncertainty ). NIST-F2 was bro
|
https://en.wikipedia.org/wiki/CC%20system
|
In computational geometry, a CC system or counterclockwise system is a ternary relation introduced by Donald Knuth to model the clockwise ordering of triples of points in general position in the Euclidean plane.
Axioms
A CC system is required to satisfy the following axioms, for all distinct points p, q, r, s, and t:
Cyclic symmetry: If then .
Antisymmetry: If then not .
Nondegeneracy: Either or .
Interiority: If and and , then .
Transitivity: If and and , and and , then .
Triples of points that are not distinct are not considered as part of the relation.
Construction from planar point sets
A CC system may be defined from any set of points in the Euclidean plane, with no three of the points collinear, by including in the relation a triple of distinct points whenever the triple lists these three points in counterclockwise order around the triangle that they form. Using the Cartesian coordinates of the points, the triple pqr is included in the relation exactly when
The condition that the points are in general position is equivalent to the requirement that this matrix determinant is never zero for distinct points p, q, and r.
However, not every CC system comes from a Euclidean point set in this way.
Equivalent notions
CC systems can also be defined from pseudoline arrangements, or from sorting networks in which the compare-exchange operations only compare adjacent pairs of elements (as in for instance bubble sort), and every CC system can be defined in this way. This relation is not one-to-one, but the numbers of nonisomorphic CC systems on n points, of pseudoline arrangements with n lines, and of sorting networks on n values, are within polynomial factors of each other.
There exists a two-to-one correspondence between CC systems and uniform acyclic oriented matroids of rank 3. These matroids in turn have a 1-1 correspondence to topological equivalence classes of pseudoline arrangements with one marked cell.
Algorithmic applications
The informat
|
https://en.wikipedia.org/wiki/DYSEAC
|
DYSEAC was the second Standards Electronic Automatic Computer. (See SEAC.)
DYSEAC was a first-generation computer built by the National Bureau of Standards for the U.S. Army Signal Corps. It was housed in a truck, making it one of the first movable computers (perhaps the first). It went into operation in April 1954.
DYSEAC used 900 vacuum tubes and 24,500 crystal diodes. It had a memory of 512 words of 45 bits each (plus 1 parity bit), using mercury delay-line memory. Memory access time was 48–384 microseconds. The addition time was 48 microseconds, and the multiplication/division time was 2112 microseconds. These times are excluding the memory-access time, which added up to approximately 1500 microseconds to those times.
DYSEAC weighed about .
See also
SEAC
List of vacuum-tube computers
|
https://en.wikipedia.org/wiki/TOSS%20%28operating%20system%29
|
The Tri-Lab Operating System Stack (TOSS) is a Linux distribution based on Red Hat Enterprise Linux (RHEL) that was created to provide a software stack for high performance computing (HPC) clusters for laboratories within the National Nuclear Security Administration (NNSA). The operating system allows multiple smaller systems to emulate a high-performance computing (HPC) platform.
Linux distribution
The name "tri-lab" refers to the three major NNSA labs, the Lawrence Livermore National Laboratory, the Los Alamos National Laboratory, and the Sandia National Laboratories.
The OS is used by NNSA computers including the El Capitan supercomputer and systems using ARM architecture including the ThunderX2 system on a chip (SoC). In addition to being used by the National Nuclear Security Administration (NNSA), most of the systems in NASA's High-End Computing Capabiity Project, part of the NASA Advanced Supercomputing Division, were all migrated to TOSS in March 2022.
Many of the software packages included in TOSS are from the RHEL repository. Additional packages are built using Fedora's Koji build system to create RPM packages. The system also uses SLURM and Flux scheduling and resource management software.
|
https://en.wikipedia.org/wiki/Range%20condition%20scoring
|
Range Condition Scoring was developed as a way to quantify biodiversity in a given rangeland system. This practice is widely used in the Sand Hills region of Nebraska, as well as the tallgrass prairie regions, as evidenced by the authoritative book on the subject, "Range Judging Handbook and Contest Guide for Nebraska." This book outlines the steps required to evaluate, or score, a particular region of rangeland; and it serves as a baseline for the understanding of this method of judging rangeland health.
Completing a survey
A certain area of land is chosen for a survey and random selections are made to determine where species composition measurements must be taken. Once these areas are selected, plant species composition measurements are taken by clipping the plants in a cordoned off area and measuring the mass of each type of plant species. This can then be compared to the entire plant mass in the area to determine the percent of each species located within the area.
Once these percentages are determined, they can be compared with the "Guides for determining range condition" located in the Range Judging Handbook. These tables show the amount of each species that is allowed in each area of rangeland. The tables differ depending upon average rainfall as well as soil type. These differences occur because the climax plant community would differ as the variables of rainfall and soil type change.
The score that is computed will fall in the range of 0-25% if the range is in "Poor" Condition, 26-50% if the range is in "Fair" Condition, 51-75% if the range is in "Good" Condition, and 76-100% if the range is in "Excellent" Condition.
By taking the range condition score that is determined, the researcher then can use Table 4 in the Nebraska Cooperative Extension Circular EC 86-113-C to determine an "Adjustment Factor for Initial Stocking Rate." This adjustment factor is then multiplied with the correct number found in Table 3 of the same Extension Circular to determine an
|
https://en.wikipedia.org/wiki/River%20ecosystem
|
River ecosystems are flowing waters that drain the landscape, and include the biotic (living) interactions amongst plants, animals and micro-organisms, as well as abiotic (nonliving) physical and chemical interactions of its many parts. River ecosystems are part of larger watershed networks or catchments, where smaller headwater streams drain into mid-size streams, which progressively drain into larger river networks. The major zones in river ecosystems are determined by the river bed's gradient or by the velocity of the current. Faster moving turbulent water typically contains greater concentrations of dissolved oxygen, which supports greater biodiversity than the slow-moving water of pools. These distinctions form the basis for the division of rivers into upland and lowland rivers.
The food base of streams within riparian forests is mostly derived from the trees, but wider streams and those that lack a canopy derive the majority of their food base from algae. Anadromous fish are also an important source of nutrients. Environmental threats to rivers include loss of water, dams, chemical pollution and introduced species. A dam produces negative effects that continue down the watershed. The most important negative effects are the reduction of spring flooding, which damages wetlands, and the retention of sediment, which leads to the loss of deltaic wetlands.
River ecosystems are prime examples of lotic ecosystems. Lotic refers to flowing water, from the Latin , meaning washed. Lotic waters range from springs only a few centimeters wide to major rivers kilometers in width. Much of this article applies to lotic ecosystems in general, including related lotic systems such as streams and springs. Lotic ecosystems can be contrasted with lentic ecosystems, which involve relatively still terrestrial waters such as lakes, ponds, and wetlands. Together, these two ecosystems form the more general study area of freshwater or aquatic ecology.
The following unifying characterist
|
https://en.wikipedia.org/wiki/Inner%20nuclear%20layer
|
In the anatomy of the eye, the inner nuclear layer or layer of inner granules, of the retina, is made up of a number of closely packed cells, of which there are three varieties: bipolar cells, horizontal cells, and amacrine cells.
Bipolar cells
The bipolar cells, by far the most numerous, are round or oval in shape, and each is prolonged into an inner and an outer process.
They are divisible into rod bipolars and cone bipolars.
The inner processes of the rod bipolars run through the inner plexiform layer and arborize around the bodies of the cells of the ganglionic layer; their outer processes end in the outer plexiform layer in tufts of fibrils around the button-like ends of the inner processes of the rod granules.
The inner processes of the cone bipolars ramify in the inner plexiform layer in contact with the dendrites of the ganglionic cells.
Connection types
Midget bipolars are linked to one cone while diffuse bipolars take groups of receptors. Diffuse bipolars can take signals from up to 50 rods or can be a flat cone form and take signals from seven cones. The bipolar cells corresponds to the intermediary cells between the touch and heat receptors on the skin and the medulla or spinal cord.
Horizontal cells
The horizontal cells lie in the outer part of the inner nuclear layer and possess somewhat flattened cell bodies.
Their dendrites divide into numerous branches in the outer plexiform layer, while their axons run horizontally for some distance and finally ramify in the same layer.
Amacrine cells
The amacrine cells are placed in the inner part of the inner nuclear layer, and are so named because they have not yet been shown to possess axis-cylinder processes.
Their dendrites undergo extensive ramification in the inner plexiform layer.
|
https://en.wikipedia.org/wiki/Mass%20excess
|
The mass excess of a nuclide is the difference between its actual mass and its mass number in daltons. It is one of the predominant methods for tabulating nuclear mass. The mass of an atomic nucleus is well approximated (less than 0.1% difference for most nuclides) by its mass number, which indicates that most of the mass of a nucleus arises from mass of its constituent protons and neutrons. Thus, the mass excess is an expression of the nuclear binding energy, relative to the binding energy per nucleon of carbon-12 (which defines the dalton). If the mass excess is negative, the nucleus has more binding energy than 12C, and vice versa. If a nucleus has a large excess of mass compared to a nearby nuclear species, it can radioactively decay, releasing energy.
Energy scale of nuclear reactions
The 12C standard provides a convenient unit (the dalton) in which to express nuclear mass for defining the mass excess. However, its usefulness arises in the calculation of nuclear reaction kinematics or decay. Only a small fraction of the total energy that is associated with an atomic nucleus by mass–energy equivalence, on the order of 0.01% to 0.1% of the total mass, may be absorbed or liberated as radiation. By working in terms of the mass excess, much of the mass changes which arise from the transfer or release of nucleons is effectively removed, highlighting the net energy difference.
Nuclear reaction kinematics are customarily performed in units involving the electronvolt, which derives from accelerator technology. The combination of this practical point with the theoretical relation makes the unit megaelectronvolt over the speed of light squared (MeV/c2) a convenient form in which to express nuclear mass. However, the numerical values of nuclear masses in MeV/c2 are quite large (even the proton mass is ~938.27 MeV/c2), while mass excesses range in the tens of MeV/c2. This makes tabulated mass excess less cumbersome for use in calculations. The 1/c2 factor is typically om
|
https://en.wikipedia.org/wiki/Ortrud%20Oellermann
|
Ortrud R. Oellermann is a South African mathematician specializing in graph theory. She is a professor of mathematics at the University of Winnipeg.
Education and career
Oellermann was born in Vryheid.
She earned a bachelor's degree, cum laude honours, and a master's degree at the University of Natal in 1981, 1982, and 1983 respectively,
as a student of Henda Swart.
She completed her Ph.D. in 1986 at Western Michigan University.
Her dissertation was Generalized Connectivity in Graphs and was supervised by Gary Chartrand.
Oellermann taught at the University of Durban-Westville, Western Michigan University, University of Natal, and Brandon University, before moving to Winnipeg in 1996. At Winnipeg, she was co-chair of mathematics and statistics for 2011–2013.
Contributions
With Gary Chartrand, Oellermann is the author of the book Applied and Algorithmic Graph Theory (McGraw Hill, 1993).
She is also the author of well-cited research publications on metric dimension of graphs, on distance-based notions of convex hulls in graphs, and on highly irregular graphs in which every vertex has a neighborhood in which all degrees are distinct. The phrase "highly irregular" was a catchphrase of her co-author Yousef Alavi; because of this, Ronald Graham suggested that there should be a concept of highly irregular graphs, by analogy to the regular graphs, and Oellermann came up with the definition of these graphs.
Recognition
In 1991, Oellermann was the winner of the annual Silver British Association Medal of the Southern Africa Association for the Advancement of Science.
She won the Meiring Naude Medal of the Royal Society of South Africa in 1994.
She was also one of three winners of the Hall Medal of the Institute of Combinatorics and its Applications in 1994, the first year the medal was awarded.
Selected publications
Book
Research articles
|
https://en.wikipedia.org/wiki/Osgood%E2%80%93Schlatter%20disease
|
Osgood–Schlatter disease (OSD) is inflammation of the patellar ligament at the tibial tuberosity (apophysitis). It is characterized by a painful bump just below the knee that is worse with activity and better with rest. Episodes of pain typically last a few weeks to months. One or both knees may be affected and flares may recur.
Risk factors include overuse, especially sports which involve frequent running or jumping. The underlying mechanism is repeated tension on the growth plate of the upper tibia. Diagnosis is typically based on the symptoms. A plain X-ray may be either normal or show fragmentation in the attachment area.
Pain typically resolves with time. Applying cold to the affected area, rest, stretching, and strengthening exercises may help. NSAIDs such as ibuprofen may be used. Slightly less stressful activities such as swimming or walking may be recommended. Casting the leg for a period of time may help. After growth slows, typically age 16 in boys and 14 in girls, the pain will no longer occur despite a bump potentially remaining.
About 4% of people are affected at some point in time. Males between the ages of 10 and 15 are most often affected. The condition is named after Robert Bayley Osgood (18731956), an American orthopedic surgeon, and Carl B. Schlatter (18641934), a Swiss surgeon, who described the condition independently in 1903.
Signs and symptoms
Osgood–Schlatter disease causes pain in the front lower part of the knee. This is usually at the ligament-bone junction of the patellar ligament and the tibial tuberosity. The tibial tuberosity is a slight elevation of bone on the anterior and proximal portion of the tibia. The patellar tendon attaches the anterior quadriceps muscles to the tibia via the knee cap.
Intense knee pain is usually the presenting symptom that occurs during activities such as running, jumping, lifting things, squatting, and especially ascending or descending stairs and during kneeling. The pain is worse with acute knee i
|
https://en.wikipedia.org/wiki/Generalised%20circle
|
In geometry, a generalized circle, sometimes called a cline or circline, is a straight line or a circle.
The natural setting for generalized circles is the extended plane, a plane along with one point at infinity through which every straight line is considered to pass. Given any three distinct points in the extended plane, there exists precisely one generalized circle passing through all three.
Generalized circles sometimes appear in Euclidean geometry, which has a well-defined notion of distance between points, and where every circle has a center and radius: the point at infinity can be considered infinitely distant from any other point, and a line can be considered as a degenerate circle without a well-defined center and with infinite radius (zero curvature). A reflection across a line is a Euclidean isometry (distance-preserving transformation) which maps lines to lines and circles to circles; but an inversion in a circle is not, distorting distances and mapping any line to a circle passing through the reference circles's center, and vice-versa.
However, generalized circles are fundamental to inversive geometry, in which circles and lines are considered indistinguishable, the point at infinity is not distinguished from any other point, and the notions of curvature and distance between points are ignored. In inversive geometry, reflections, inversions, and more generally their compositions, called Möbius transformations, map generalized circles to generalized circles, and preserve the inversive relationships between objects.
The extended plane can be identified with the sphere using a stereographic projection. The point at infinity then becomes an ordinary point on the sphere, and all generalized circles become circles on the sphere.
Extended complex plane
The extended Euclidean plane can be identified with the extended complex plane, so that equations of complex numbers can be used to describe lines, circles and inversions.
Bivariate linear equation
A c
|
https://en.wikipedia.org/wiki/Holon%20%28physics%29
|
Holons are one of three quasiparticles, along with spinons and orbitons, that electrons in solids are able to split into during the process of spin–charge separation, when extremely tightly confined at temperatures close to absolute zero. The electron can always be theoretically considered as a bound state of the three, with the spinon carrying the spin of the electron, the orbiton carrying the orbital location and the holon carrying the charge, but in certain conditions they can become deconfined and behave as independent particles.
Overview
Electrons, being fermions, repel each other due to the Pauli exclusion principle. As a result, in order to move past each other in an extremely crowded environment, they are forced to modify their behavior. Research published in July 2009 by the University of Cambridge and the University of Birmingham in England showed that electrons could jump past each other by quantum tunneling, and in order to do so will separate into two particles, named spinons and holons by the researchers.
Notes
General References
See also
Condensed matter physics
Tomonaga–Luttinger liquid
Quasiparticles
|
https://en.wikipedia.org/wiki/Dannie%20Heineman%20Prize%20for%20Astrophysics
|
The Dannie Heineman Prize for Astrophysics is jointly awarded each year by the American Astronomical Society and American Institute of Physics for outstanding work in astrophysics. It is funded by the Heineman Foundation in honour of Dannie Heineman.
Recipients
Source: AAS
See also
Dannie Heineman Prize for Mathematical Physics
List of astronomy awards
List of physics awards
Prizes named after people
|
https://en.wikipedia.org/wiki/List%20of%20Belizean%20flags
|
The following is a list of flags used in Belize. For more information about the national flag, see the Flag of Belize.
National flag
Government flag
Ethnic group flags
City flags
Historical flags
Political flags
See also
Flag of Belize
Coat of arms of Belize
|
https://en.wikipedia.org/wiki/Drishti%20bommai
|
A drishti bommai (Tamil), drishti gombe (Kannada) or drishti bomma (Telugu) is a talisman represented as a doll, predominantly found in South India. Regarded to possess apotropaic properties, these dolls are prominently hung at construction sites, houses, residential buildings, and trucks, intended to ward off evil. They are regarded to be benevolent asuras, featured as intimidating in appearance to frighten malicious forces. Similar to the Gorgoneion heads of ancient Greece, the decorative wide-eyed, often red, yellow, or green moustached masks and can be seen in the Indian states of Tamil Nadu, Karnataka, Telangana, and Andhra Pradesh, and the union territory of Puducherry.
|
https://en.wikipedia.org/wiki/28th%20meridian%20east
|
The meridian 28° east of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, Europe, Africa, the Indian Ocean, the Southern Ocean, and Antarctica to the South Pole.
The 28th meridian east forms a great circle with the 152nd meridian west.
From Pole to Pole
Starting at the North Pole and heading south to the South Pole, the 28th meridian east passes through:
{| class="wikitable plainrowheaders"
! scope="col" width="125" | Co-ordinates
! scope="col" | Country, territory or sea
! scope="col" | Notes
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Arctic Ocean
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Island of Storøya, Svalbard
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Barents Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Island of Kongsøya, Svalbard
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Barents Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
| Leningrad Oblast
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Baltic Sea
| style="background:#b0e0e6;" | Gulf of Finland
|-
|
! scope="row" |
|
|-valign="top"
|
! scope="row" |
| Leningrad Oblast Pskov Oblast — from , passing through Lake Peipus
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Black Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| For about 8 km
|-
|
! scope="row" |
| 109 km Thrace
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Sea of Marmara
| style="background:#b0e0e6;" | 61 km.
|-
|
! scope="row" |
| 385 km. Anatolia
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Mediterra
|
https://en.wikipedia.org/wiki/Tilomisole
|
Tilomisole (WY-18,251) is an experimental drug which acts as an immunomodulator and has been studied for the treatment of some forms of cancer.
It can also be seen to contain the arylacetic acid moiety that is endemic to many NSAIDs, e.g. ibufenac.
|
https://en.wikipedia.org/wiki/Sign%20Post%20Forest
|
Sign Post Forest is a collection of signs at Watson Lake, Yukon, Canada, and is one of the most famous of the landmarks along the Alaska Highway. It was started by a homesick GI in 1942. He was assigned light duty while recovering from an injury and erected the signpost for his hometown: Danville, Ill. 2835 miles. Visitors may add their own signs to the more than 100,000 already present.
Origin
In 1942, a simple sign post pointing out the distances to various points along the tote road being built was damaged by a bulldozer. Private Carl K. Lindley, serving with the 341st Engineers, was ordered to repair the sign, and decided to personalize the job by adding a sign pointing towards his home town, Danville, Illinois, and giving the distance to it. Several other people added directions to their home towns, and the idea has been snowballing ever since.
The forest today
The Sign Post Forest takes up a couple of acres, with huge new panels being constantly added, snaking through the trees. There are street signs, welcome signs, signatures on dinner plates, and license plates from around the world.
In June 2012, the stage in the centre of the forest was the site of an impromptu performance of the play Two Women on a Precipice. The playwright Karin Fazio Littlefield was delayed in attending the Last Frontier Theatre Conference in Valdez, Alaska, by mudslides on the Alaska Highway. Littlefield and her fellow actors performed the piece for travellers who were likewise stranded in Watson Lake by the mudslides.
|
https://en.wikipedia.org/wiki/Time%20Gal
|
is an interactive movie video game developed and published by Taito and Toei Company, and originally released as a laserdisc game in Japan for the arcades in 1985. It is an action game which uses full motion video (FMV) to display the on-screen action. The player must correctly choose the on-screen character's actions to progress the story. The pre-recorded animation for the game was produced by Toei Company.
The game is set in a fictional future where time travel is possible. The protagonist, Reika, travels to different time periods in search of a criminal, Luda, from her time. After successfully tracking down Luda, Reika prevents his plans to alter the past. Time Gal was inspired by the success of earlier laserdisc video games that used pre-recorded animation, including Dragon's Lair (1983) and the previous Taito/Toei collaboration Ninja Hayate (1984), while Reika's character design bears similarities to the anime characters Lum (from Urusei Yatsura) and Yuri (from Dirty Pair).
The game was later ported to the Sega CD for a worldwide release, and also to the LaserActive in Japan. The Sega CD version received a generally favorable reception from critics.
Gameplay
Time Gal is an interactive movie game that uses pre-recorded animation rather than sprites to display the on-screen action. Gameplay is divided into levels, referred to as time periods. The game begins in 3001 AD with the theft of a time travel device. The thief, Luda, steals the device to take over the world by changing history. Reika, the protagonist also known as Time Gal, uses her own time travel device to pursue him; she travels to different time periods, such as 70,000,000 BC, 44 BC, 1588 AD, and 2010 AD, in search of Luda. Each time period is a scenario that presents a series of threats that must be avoided or confronted. Successfully navigating the sequences allows the player to progress to another period.
The player uses a joystick and button to input commands, though home versions use a game
|
https://en.wikipedia.org/wiki/MyTV%20%28Arabic%29
|
myTV is an Arab American provider of Arabic live channels and video on demand in North and South America, Australia and New Zealand, using over-the-top technology.
History
myTV, an over-the-top content service provider with offices in Lebanon and the U.S., was founded on the June 15, 2011 by Lebanese expatriates living in the US. The concept was originally developed by SNA Corp. a leading provider of Digital Online Content services for multinational media companies. MyTV provides Arabic-language Live TV Channels and Video on Demand (VOD) everywhere in the Americas as well as Europe, Australia and New Zealand.
The myTV service helps expatriates and people-on-the-move feel closer to their homeland, by giving them access to the channels they love, and the TV shows, movies or music videos they miss, straight to their living room television set or mobile device. In response to the demand for quality television in Arabic, myTV secured exclusive deals with the most popular channels such as LBC America and Rotana.
Launch
myTV launched its services through an online campaign themed "Messages from Home" that began on January 30, 2012. The videos, composed of genuine messages gathered from Lebanese people across the country to their relatives abroad, were posted on Facebook, YouTube, Twitter and Pinterest; these social platforms made up the bulk of online tools used during the campaign.
Recognition
In March 2013, Communicate Levant, the Beirut-based sibling of market-leading Communicate magazine, one of the region's leading advertising, marketing and media resource, voted myTV as the number one startup for 2013.
Features
Live Channels
Channels currently available on myTV include
LBC America
LBC America Drama
LBC America News
Al Sumaria
Rotana Khalijiah
Rotana Masriya
Al Jadeed
Fann
Safwa
Roya TV
Arab Woman TV
Al-Resalah
Iqraa
Taha TV
Iqraa Europe
Iqraa America
Iqraa Asia and Australia
Rotana Cinema
Cinema 1
Cinema 2
Rotana Aflam
Rotana Classic
Al Y
|
https://en.wikipedia.org/wiki/Cristian%20Dumitru%20Popescu
|
Cristian Dumitru Popescu (born 1964) is a Romanian-American mathematician at the University of California, San Diego. His research interests are in algebraic number theory, and in particular, in special values of L-functions.
Education and career
The son of historian Dumitru Micu Popescu and biologist Rodica Jerișteanu,
Popescu was born in 1964 in Novaci, Gorj County. After completing his undergraduate studies at the Faculty of Mathematics of the University of Bucharest, he obtained his Ph.D. from the Ohio State University in 1996, with thesis "On a refined Stark conjecture for function fields" written under the direction of Karl Rubin. He became a professor at Johns Hopkins University, after which he moved to his current position as a professor at UC San Diego.
Research contributions
Popescu formulated and proved function field versions of the Gras conjectures and Rubin's integral refinement of the abelian Stark conjectures. He has also made important contributions to the Stark conjectures over number fields, formulating an alternative to Rubin's refinement, known as Popescu's conjecture. Although slightly weaker than Rubin's conjecture, it has the advantage that it can presently be shown to remain true under raising the base field or lowering the top field of the extension. Popescu and Cornelius Greither formulated equivariant versions of Iwasawa's main conjecture over function fields and number fields, proving unconditionally the function field version and conditionally the number field version. These conjectures have important implications for the Brumer–Stark conjecture, the Coates-Sinnott conjecture and Gross' conjecture on special values of L-functions.
Recognition
Popescu was awarded the Simion Stoilow Prize by the Romanian Academy in 2002. In 2015-2016, he was a Simons Fellow at Harvard University. He was elected to the 2021 class of fellows of the American Mathematical Society "for contributions to number theory and arithmetic geometry". He is an ho
|
https://en.wikipedia.org/wiki/Megakaryocyte%E2%80%93erythroid%20progenitor%20cell
|
Megakaryocyte–erythroid progenitor cells, among other blood cells, are generated as a result of hematopoiesis, which occurs in the bone marrow. Hematopoietic stem cells can differentiate into one of two progenitor cells: the common lymphoid progenitor and the common myeloid progenitor. MEPs derive from the common myeloid progenitor lineage. Megakaryocyte/erythrocyte progenitor cells must commit to becoming either platelet-producing megakaryocytes via megakaryopoiesis or erythrocyte-producing erythroblasts via erythropoiesis. Most of the blood cells produced in the bone marrow during hematopoiesis come from megakaryocyte/erythrocyte progenitor cells.
|
https://en.wikipedia.org/wiki/Berry%20mechanism
|
The Berry mechanism, or Berry pseudorotation mechanism, is a type of vibration causing molecules of certain geometries to isomerize by exchanging the two axial ligands (see Figure at right) for two of the equatorial ones. It is the most widely accepted mechanism for pseudorotation and most commonly occurs in trigonal bipyramidal molecules such as PF5, though it can also occur in molecules with a square pyramidal geometry. The Berry mechanism is named after R. Stephen Berry, who first described this mechanism in 1960.
Berry mechanism in trigonal bipyramidal structure
The process of pseudorotation occurs when the two axial ligands close like a pair of scissors pushing their way in between two of the equatorial groups which scissor out to accommodate them. Both the axial and equatorial constituents move at the same rate of increasing the angle between the other axial or equatorial constituent. This forms a square based pyramid where the base is the four interchanging ligands and the tip is the pivot ligand, which has not moved. The two originally equatorial ligands then open out until they are 180 degrees apart, becoming axial groups perpendicular to where the axial groups were before the pseudorotation. This requires about 3.6 kcal/mol in PF5.
This rapid exchange of axial and equatorial ligands renders complexes with this geometry unresolvable (unlike carbon atoms with four distinct substituents), except at low temperatures or when one or more of the ligands is bi- or poly-dentate.
Berry mechanism in square pyramidal structure
The Berry mechanism in square pyramidal molecules (such as IF5) is somewhat like the inverse of the mechanism in bipyramidal molecules. Starting at the "transition phase" of bipyramidal pseudorotation, one pair of fluorines scissors back and forth with a third fluorine, causing the molecule to vibrate. Unlike with pseudorotation in bipyramidal molecules, the atoms and ligands which are not actively vibrating in the "scissor" motion are still
|
https://en.wikipedia.org/wiki/Red%20Hand%20of%20Ulster
|
The Red Hand of Ulster () is a symbol used in heraldry to denote the Irish province of Ulster and the Northern Uí Néill in particular. It has also been used however by other Irish clans across the island, including the ruling families of western Connacht (i.e. the O'Flahertys and McHughs) and the chiefs of the Midlands (e.g. O'Daly, Kearney, etc.).
It is an open hand coloured red, with the fingers pointing upwards, the thumb held parallel to the fingers, and the palm facing forward. It is usually shown as a right hand, but is sometimes a left hand, such as in the coats of arms of baronets.
Historical background
The Red Hand is rooted in Gaelic culture as the sign of a great warrior. It is believed to date back to pagan times.
The Red Hand is first documented in surviving records in the 13th century, where it was used by the Hiberno-Norman de Burgh earls of Ulster. It was Walter de Burgh who became first Earl of Ulster in 1243 who combined the de Burgh cross with the Red Hand to create a flag that represented the Earldom of Ulster and later became the modern Flag of Ulster.
It was afterwards adopted by the O'Neills when they assumed the ancient kingship of Ulster, inventing the title Rex Ultonie (king of Ulster) for themselves in 1317 and then claiming it unopposed from 1345 onwards. An early Irish heraldic use in Ireland of the open right hand can be seen in the seal of Aodh Reamhar Ó Néill, king of the Irish of Ulster, 1344–1364.
An early-15th-century poem by Mael Ó hÚigínn is named , the first line of which is a variation of the title: "", translated as "The Úí Eachach are the 'red hand' of Ireland". The Uí Eachach were one of the Cruthin tribes (known as the Dál nAraidi after 773) that made up the ancient kingdom of Ulaid.
The Red Hand symbol is believed to have been used by the O'Neills during its Nine Years' War (1594–1603) against English rule in Ireland, and the war cry ! ("the Red Hand of Ireland to victory") was also associated with them. An English
|
https://en.wikipedia.org/wiki/Caldanaerovirga
|
Caldanaerovirga is a xylanolytic, anaerobic and alkalithermophilic genus of bacteria from the family of Thermosediminibacterales with one known species (Caldanaerovirga acetigignens).
|
https://en.wikipedia.org/wiki/History%20of%20botany
|
The history of botany examines the human effort to understand life on Earth by tracing the historical development of the discipline of botany—that part of natural science dealing with organisms traditionally treated as plants.
Rudimentary botanical science began with empirically based plant lore passed from generation to generation in the oral traditions of paleolithic hunter-gatherers. The first writings that show human curiosity about plants themselves, rather than the uses that could be made of them, appear in ancient Greece and ancient India. In Ancient Greece, the teachings of Aristotle's student Theophrastus at the Lyceum in ancient Athens in about 350 BC are considered the starting point for Western botany. In ancient India, the Vṛkṣāyurveda, attributed to Parāśara, is also considered one of the earliest texts to describe various branches of botany.
In Europe, botanical science was soon overshadowed by a medieval preoccupation with the medicinal properties of plants that lasted more than 1000 years. During this time, the medicinal works of classical antiquity were reproduced in manuscripts and books called herbals. In China and the Arab world, the Greco-Roman work on medicinal plants was preserved and extended.
In Europe the Renaissance of the 14th–17th centuries heralded a scientific revival during which botany gradually emerged from natural history as an independent science, distinct from medicine and agriculture. Herbals were replaced by floras: books that described the native plants of local regions. The invention of the microscope stimulated the study of plant anatomy, and the first carefully designed experiments in plant physiology were performed. With the expansion of trade and exploration beyond Europe, the many new plants being discovered were subjected to an increasingly rigorous process of naming, description, and classification.
Progressively more sophisticated scientific technology has aided the development of contemporary botanical offshoot
|
https://en.wikipedia.org/wiki/Z-Trim
|
Z-Trim was originally developed as a fat substitute by the U.S. Department of Agriculture made of natural dietary fibers. It is currently licensed for manufacture to Z-Trim Holdings.
This product was created as a health and diet aid; it has no calories since it consists of dietary fiber which cannot be digested by the human body, is natural, and can greatly reduce the fat in foods "with little or no change in flavor or texture," according to a review by Consumer Reports. Some schools have begun to use the product in their cafeterias, where it has been popular with students.
|
https://en.wikipedia.org/wiki/Separator%20%28electricity%29
|
A separator is a permeable membrane placed between a battery's anode and cathode. The main function of a separator is to keep the two electrodes apart to prevent electrical short circuits while also allowing the transport of ionic charge carriers that are needed to close the circuit during the passage of current in an electrochemical cell.
Separators are critical components in liquid electrolyte batteries. A separator generally consists of a polymeric membrane forming a microporous layer. It must be chemically and electrochemically stable with regard to the electrolyte and electrode materials and mechanically strong enough to withstand the high tension during battery construction. They are important to batteries because their structure and properties considerably affect the battery performance, including the batteries energy and power densities, cycle life, and safety.
History
Unlike many forms of technology, polymer separators were not developed specifically for batteries. They were instead spin-offs of existing technologies, which is why most are not optimized for the systems they are used in. Even though this may seem unfavorable, most polymer separators can be mass-produced at a low cost, because they are based on existing forms of technologies. Yoshino and co-workers at Asahi Kasei first developed them for a prototype of secondary lithium-ion batteries (LIBs) in 1983.
Initially, lithium cobalt oxide was used as the cathode and polyacetylene as the anode. Later in 1985, it was found that using lithium cobalt oxide as the cathode and graphite as the anode produced an excellent secondary battery with enhanced stability, employing the frontier electron theory of Kenichi Fukui. This enabled the development of portable devices, such as cell phones and laptops. However, before lithium ion batteries could be mass-produced, safety concerns needed to be addressed such as overheating and over potential. One key to ensuring safety was the separator between the catho
|
https://en.wikipedia.org/wiki/KCNA6
|
Potassium voltage-gated channel subfamily A member 6 also known as Kv1.6 is a protein that in humans is encoded by the KCNA6 gene. The protein encoded by this gene is a voltage-gated potassium channel subunit.
|
https://en.wikipedia.org/wiki/Triiron%20ditin%20intermetallic
|
The compound with empirical formula Fe3Sn2 is the first known kagome magnet. It is an intermetallic compound composed of iron (Fe) and tin (Sn), with alternating planes of Fe3Sn and Sn.
Preparation
The iron-tin intermetallic forms at around and naturally assumes a kagome structure. Quenching in an ice bath then cools the material to room temperature without disrupting the atomic structure.
Electronic structure
The compound's band structure exhibits a double Dirac cone, enabling Dirac fermions. A 30 meV gap separates the cones, which indicates the quantum Hall effect and massive Dirac fermions. Close measurement of the Fermi surface via the de Haas-van Alphen effect suggests that the massive fermions also exhibit Kane-Mele-type spin-orbit coupling.
Fe3Sn2 can also host magnetic skyrmions, but these typically require high magnetic fields to nucleate. For samples with a small (but nonzero) thickness gradient, only a small-amplitude (5-10 mT), direction-variant magnetic field suffices to nucleate the quasiparticles.
|
https://en.wikipedia.org/wiki/Chirplet%20transform
|
In signal processing, the chirplet transform is an inner product of an input signal with a family of analysis primitives called chirplets.
Similar to the wavelet transform, chirplets are usually generated from (or can be expressed as being from) a single mother chirplet (analogous to the so-called mother wavelet of wavelet theory).
Definitions
The term chirplet transform was coined by Steve Mann, as the title of the first published paper on chirplets. The term chirplet itself (apart from chirplet transform) was also used by Steve Mann, Domingo Mihovilovic, and Ronald Bracewell to describe a windowed portion of a chirp function. In Mann's words:
The chirplet transform thus represents a rotated, sheared, or otherwise transformed tiling of the time–frequency plane. Although chirp signals have been known for many years in radar, pulse compression, and the like, the first published reference to the chirplet transform described specific signal representations based on families of functions related to one another by time–varying frequency modulation or frequency varying time modulation, in addition to time and frequency shifting, and scale changes. In that paper, the Gaussian chirplet transform was presented as one such example, together with a successful application to ice fragment detection in radar (improving target detection results over previous approaches). The term chirplet (but not the term chirplet transform) was also proposed for a similar transform, apparently independently, by Mihovilovic and Bracewell later that same year.
Applications
The first practical application of the chirplet transform was in water-human-computer interaction (WaterHCI) for marine safety, to assist vessels in navigating through ice-infested waters, using marine radar to detect growlers (small iceberg fragments too small to be visible on conventional radar, yet large enough to damage a vessel).
Other applications of the chirplet transform in WaterHCI include the SWIM (Sequential Wav
|
https://en.wikipedia.org/wiki/Babington%20Plot
|
The Babington Plot was a plan in 1586 to assassinate Queen Elizabeth I, a Protestant, and put Mary, Queen of Scots, her Catholic cousin, on the English throne. It led to Mary's execution, a result of a letter sent by Mary (who had been imprisoned for 19 years since 1568 in England at the behest of Elizabeth) in which she consented to the assassination of Elizabeth.
The long-term goal of the plot was the invasion of England by the Spanish forces of King Philip II and the Catholic League in France, leading to the restoration of the old religion. The plot was discovered by Elizabeth's spymaster Sir Francis Walsingham and used to entrap Mary for the purpose of removing her as a claimant to the English throne.
The chief conspirators were Anthony Babington and John Ballard. Babington, a young recusant, was recruited by Ballard, a Jesuit priest who hoped to rescue the Scottish Queen. Working for Walsingham were double agents Robert Poley and Gilbert Gifford, as well as Thomas Phelippes, a spy agent and cryptanalyst, and the puritan spy Maliverey Catilyn. The turbulent Catholic deacon Gifford had been in Walsingham's service since the end of 1585 or the beginning of 1586. Gifford obtained a letter of introduction to Queen Mary from a confidant and spy for her, Thomas Morgan. Walsingham then placed double agent Gifford and spy decipherer Phelippes inside Chartley Castle, where Queen Mary was imprisoned. Gifford organised the Walsingham plan to place Babington's and Queen Mary's encrypted communications into a beer barrel cork which were then intercepted by Phelippes, decoded and sent to Walsingham.
On 7 July 1586, the only Babington letter that was sent to Mary was decoded by Phelippes. Mary responded in code on 17 July 1586 ordering the would-be rescuers to assassinate Queen Elizabeth. The response letter also included deciphered phrases indicating her desire to be rescued: "The affairs being thus prepared" and "I may suddenly be transported out of this place". At the Fo
|
https://en.wikipedia.org/wiki/Contraves%20Cora
|
The Cora was a digital fire-control system designed by Hungarian-Swiss Peter Tóth and produced by the Swiss company Contraves.
Development
Peter Tóth started the design of Cora-1 in 1957. The system was intended for anti-aircraft fire direction with the Swiss Army. However, Cora-1 turned out to be too slow and too bulky for this application. It was programmed for other applications by programmers including Heinz Lienhard. One copy of the system was used at the École Polytechnique Fédérale de Lausanne (EPFL) for cartography, and was put on display during Expo 64. The unit was rediscovered in storage in 2011, and is now on display at the Musée Bolo, in the Computer Science department of the EPFL. Cora-1-was one of the first fully transistorized digital computers built in Switzerland according to the Von Neumann architecture.
An improved version of this computer was developed subsequently by a team led by Swiss engineer Peter Blum. Cora-2 was successfully used for anti-aircraft fire direction being compact enough to fit into the corresponding mobile control unit.
The Musée Bolo met with Peter Tóth and released several videos around his work on the Cora.
|
https://en.wikipedia.org/wiki/A%20Dictionary%20of%20Musical%20Themes
|
A Dictionary of Musical Themes (New York: Crown, 1949) is a music reference book by Sam Morgenstern and Harold Barlow.
Contents
The book collects 10,000 musical themes (mostly classical works) and indexes them using a notation index based on transposing the pitches to C major or C minor (so that God Save the Queen/America, for instance, would come out as CCDBCDEEFE). It was followed a year later by A Dictionary of Vocal Themes (1950), including themes from songs and opera.
Authors
Sam Morgenstern (1906-1989) was a teacher at Mannes College of Music in Greenwich Village, New York, and the conductor of Lower Manhattan's Lemonade Opera Company, which gave the US premiere of Prokofiev’s Duenna in 1948. He composed two short operas, along with Warsaw Ghetto (setting a spoken word poem by Harry Granick to background music), which premiered at Carnegie Hall on February 10, 1946. He composed a choral cantata The Common Man, and the Latin-tinged piano piece Toccata Guatemala. Although no recordings of his work exist, a radio disk transcription of the second performance of Warsaw Ghetto exists, made in the studio a week after the premiere. Morgenstern’s other books included the anthology Composers on Music (1956).
Harold Barlow (1915-93) devised the notation scheme. He was a popular song composer who studied violin at Boston University and became a bandleader during World War II. He wrote the comedy song I’ve Got Tears in My Ears in 1949 (recorded by Homer and Jethro), and the lyrics to the 1960 Connie Francis hit Mama. Barlow became better known later in his career as a consultant on plagiarism, most famously defending George Harrison’s "My Sweet Lord" against accusations that it was copied from the Chiffons’ hit He’s So Fine. (Harrison lost the case). Barlow also worked on cases involving Bob Dylan, Elvis Presley, Elton John, Dolly Parton, and Billy Joel.
Alternative classification
A new attempt at classifying tunes was published in 1975 by Denys Parsons. The Director
|
https://en.wikipedia.org/wiki/Gunslinger%20effect
|
The gunslinger effect, also sometimes called Bohr's law or the gunfighter's dilemma, is a psychophysical theory which says that an intentional or willed movement is slower than an automatic or reaction movement. The concept is named after physicist Niels Bohr, who first deduced that the person who draws second in a gunfight will actually win the shoot-out.
Bohr's experiment
Danish physicist Niels Henrik David Bohr came up with the hypothesis after watching Western films, which frequently depicted the protagonist drawing after his opponent in a gunfight and winning. He hypothesized that a person reacting might move faster than their opponent, who moved deliberately. Bohr and his students staged mock gunfights using toy guns to test this hypothesis, with apparently uncertain results. Bohr suggested that, to the extent the hypothesis is true, the logical alternative to a gunfight would be a peaceful settlement, since neither gunslinger would want to draw first knowing that they would lose.
Experimental evidence
Later research confirmed the basic hypothesis, showing that intentional movements and reaction movements were controlled by two separate systems, and that it was not confined merely to hand or arm movements. The gunslinger effect applies to the initial reaction, not later limb control, but there is no trade-off between that early reaction and later targeting accuracy.
One study conducted at the University of Birmingham found that subjects moved 10% faster when reacting rather than acting with intention. However, the study also found that reactive movements were less accurate than intentional ones, and that the increased movement speed did not make up for the initial delay. Because of this, the authors of the study felt that the increased speed would not confer much advantage in a gunfight, although it may be advantageous in other situations.
Some later studies found that although volunteers' reactions were faster than deliberate actions during simple one-s
|
https://en.wikipedia.org/wiki/Table%20of%20costs%20of%20operations%20in%20elliptic%20curves
|
Elliptic curve cryptography is a popular form of public key encryption that is based on the mathematical theory of elliptic curves. Points on an elliptic curve can be added and form a group under this addition operation. This article describes the computational costs for this group addition and certain related operations that are used in elliptic curve cryptography algorithms.
Abbreviations for the operations
The next section presents a table of all the time-costs of some of the possible operations in elliptic curves. The columns of the table are labelled by various computational operations. The rows of the table are for different models of elliptic curves. These are the operations considered :
DBL - Doubling
ADD - Addition
mADD - Mixed addition: addition of an input that has been scaled to have Z-coordinate 1.
mDBL - Mixed doubling: doubling of an input that has been scaled to have Z coordinate 1.
TPL - Tripling.
DBL+ADD - Combined double and add step
To see how adding (ADD) and doubling (DBL) points on elliptic curves are defined, see The group law. The importance of doubling to speed scaler multiplication is discussed after the table. For information about other possible operations on elliptic curves see http://hyperelliptic.org/EFD/g1p/index.html.
Tabulation
Under different assumptions on the multiplication, addition, inversion for the elements in some fixed field, the time-cost of these operations varies.
In this table it is assumed that:
I = 100M, S = 1M, *param = 0M, add = 0M, *const = 0M
This means that 100 multiplications (M) are required to invert (I) an element; one multiplication is required to compute the square (S) of an element; no multiplication is needed to multiply an element by a parameter (*param), by a constant (*const), or to add two elements.
For more information about other results obtained with different assumptions, see http://hyperelliptic.org/EFD/g1p/index.html
Importance of doubling
In some applications of elliptic curve crypt
|
https://en.wikipedia.org/wiki/Podokesaurus
|
Podokesaurus is a genus of coelophysoid dinosaur that lived in what is now the eastern United States during the Early Jurassic Period. The first fossil was discovered by the geologist Mignon Talbot near Mount Holyoke, Massachusetts, in 1910. The specimen was fragmentary, preserving much of the body, limbs, and tail. In 1911, Talbot described and named the new genus and species Podokesaurus holyokensis based on it. The full name can be translated as "swift-footed lizard of Holyoke". This discovery made Talbot the first woman to find and describe a non-bird dinosaur. The holotype fossil was recognized as significant and was studied by other researchers, but was lost when the building it was kept in burned down in 1917; no unequivocal Podokesaurus specimens have since been discovered. It was made state dinosaur of Massachusetts in 2022.
Estimated to have been about in length and in weight, Podokesaurus was lightly constructed with hollow bones, and would have been similar to Coelophysis, being slender, long-necked, and with sharp, recurved teeth. The were very light and hollow, and some were slightly concave at each end. The (neck) vertebrae were relatively large in length and diameter compared to the (back) vertebrae, and the (tail) vertebrae were long and slender. The (upper-arm bone) was small and delicate, less than half the length of the (thigh-bone). The pubis (pubic bone) was very long, expanding both at the front and hind ends. The femur was slender, nearly straight, had thin walls, and was expanded at the back side of its lower end. The three of the lower leg were closely appressed together forming a compact structure.
Since it was one of the few small theropods known at the time it was described, the affinities of Podokesaurus were long unclear. It was placed in the family Podokesauridae along with other small theropods, and was speculated to have been similar to a proto-bird. It was suggested it was a synonym of Coelophysis and a natural cast spec
|
https://en.wikipedia.org/wiki/Triploid%20block
|
Triploid block is a phenomenon describing the formation of nonviable progeny after hybridization of flowering plants that differ in ploidy. The barrier is established in the endosperm, a nutritive tissue supporting embryo growth. This phenomenon usually happens when autopolyploidy occurs in diploid plants. Triploid blocks lead to reproductive isolation. The triploid block effects have been explained as possibly due to genomic imprinting in the endosperm. Triploid block can be partially ovecome by chemical treatment with 5-Azacytidine.
|
https://en.wikipedia.org/wiki/Crunchfish
|
Crunchfish is a deep tech company developing a Digital Cash platform for Banks, Payment Services and CBDC implementations and Gesture Interaction technology for AR/VR and automotive industry. Crunchfish is listed on Nasdaq First North Growth Market since 2016, with headquarters in Malmö, Sweden and with subsidiary in India.
External links
Kinect-style motion tracking for smartphones & tablets promises Crunchfish
Look Ma! More Gesture Control Tech For Phones
Active 3D Technology by Crunchfish Demonstrated on a Samsung Nexus S
CRUNCHFISH RAISES €2.3M IN FUNDING
Investor Forum:Crunchfish
Investor Forum
20 ınnovatıons for tomorrow´s world
Crunchfish boot at GDC 2013
Crunchfish at GDC
New innovations to Innovative Sweden
Malmö-based @crunchfish receives €2.4M investment Via @OresundStartups
JOAKIM NYDEMARK NEW CEO AT CRUNCHFISH AB
Company Overview of Crunchfish AB
Setterwalls has assisted investors with investment in Crunchfish
Crunchfish Raises €2.4 Million For Touchless Device Interaction
List of mobile phones with HD display List of full HD display enabled smartphones
Gionee Elife E6 and the birth of a mobile phone
Gionee Elife E6 Hands On: First Look
Gionee Elife E6 Price in India is Rs 26,366
Shejk och Helsingborgsprofiler satsar på mobilteknik
Teknik för att interagera med mobiler genom gester från Qualcomm och svenska Crunchfish
Så skapar du ett innovativt företag
Snabba ryck hos Crunchfish
Här är svenskarna som ska charma MWC
De är nominerade till årets Guldmobiler
Svensk innovationskraft på Mobile World Congress i Barcelona
Mobile World Congress 2013
Veckan på GDC: Möten, spelgränssnitt och lättklädda kvinnor
Kineser köpte rörelseteknik av Crunchfish
Octoshape and Crunchfish Solidify Mobile Partnership
Crunchfish raises 20m SEK to accelerate the roll-out of its mobile touchless technology
Crunchfish.com
Crunchfish Touchless Generation
Crunchfish Twitter Channel
Crunchfish Youtube Channel
Crunchfish Facebook Channel
Demo of Crunchfish A3D™ technology at Youtub
|
https://en.wikipedia.org/wiki/Accretion%20%28coastal%20management%29
|
Accretion is the process of coastal sediment returning to the visible portion of a beach or foreshore after a submersion event. A sustainable beach or foreshore often goes through a cycle of submersion during rough weather and later accretion during calmer periods.
If a coastline is not in a healthy sustainable state, erosion can be more serious, and accretion does not fully restore the original volume of the visible beach or foreshore, which leads to permanent beach loss.
Coastal geography
Deposition (geology)
Physical oceanography
|
https://en.wikipedia.org/wiki/User%20identifier
|
Unix-like operating systems identify a user by a value called a user identifier, often abbreviated to user ID or UID. The UID, along with the group identifier (GID) and other access control criteria, is used to determine which system resources a user can access. The password file maps textual user names to UIDs. UIDs are stored in the inodes of the Unix file system, running processes, tar archives, and the now-obsolete Network Information Service. In POSIX-compliant environments, the shell command id gives the current user's UID, as well as more information such as the user name, primary user group and group identifier (GID).
Process attributes
The POSIX standard introduced three different UID fields into the process descriptor table, to allow privileged processes to take on different roles dynamically:
Effective user ID
The effective UID (euid) of a process is used for most access checks. It is also used as the owner for files created by that process. The effective GID (egid) of a process also affects access control and may also affect file creation, depending on the semantics of the specific kernel implementation in use and possibly the mount options used. According to BSD Unix semantics, the group ownership given to a newly created file is unconditionally inherited from the group ownership of the directory in which it is created. According to AT&T UNIX System V semantics (also adopted by Linux variants), a newly created file is normally given the group ownership specified by the egid of the process that creates the file. Most filesystems implement a method to select whether BSD or AT&T semantics should be used regarding group ownership of a newly created file; BSD semantics are selected for specific directories when the S_ISGID (s-gid) permission is set.
File system user ID
Linux also has a file system user ID (fsuid) which is used explicitly for access control to the file system. It matches the euid unless explicitly set otherwise. It may be root's user ID o
|
https://en.wikipedia.org/wiki/Boston%20CitiNet
|
Started in 1983, Boston CitiNet was a local online service developed by Applied Videotex Systems, Inc. of Belmont, Massachusetts. The service allowed modem-equipped personal computer users to dial-in and access a range of information and messaging services including chat, forums, email and a variety of content. There were several other companies offering paid/subscription services as the time like The Source, CompuServe and Boston-based Delphi. Boston Citinet was unique since it was free to access and was supported by advertising. Messaging services such as email and chat required registration and a monthly fee of $9.95 - an early example of the now popular freemium business model.
History
Originally launched in 1982 under the name YellowData ("let your modem do the walking"), the service was renamed Boston CitiNet in 1985. The software platform for the service was developed by Considine Computing Services (CCS), a DEC system integrator. It initially ran on a DEC micro-PDP/11 computer with over 100 dial-up phone lines coming into the basement of a former A&P store on Trapelo Road in Belmont. In 1985, it was upgraded to run on a DEC Micro-Vax II. The founders of AVS were Thomas Considine and Richard Koch who were joined by Myron Kassaraba and John Pollock.
One of the sources of CitiNet's success was that it was "FREE, EASY and ASCII". This compared to some of the more graphically based systems that required special hardware to access. Viewtron, an early videotex service offered by Knight-Ridder and AT&T required a special $900 terminal called a Sceptre for access.
CitiNet was a prototype of the future Internet portals, with daily content, online shopping, and social activities. Some of the early advertisers were several local employment agencies, auto leasing agencies, magazine publishers such as Byte Magazine and a large movie theater chain (Sack Theaters). Online vendors sold cheese, cookies, music disks, VCRs, fax machines, and groceries. One of the more
|
https://en.wikipedia.org/wiki/OS/7
|
OS/7 is a discontinued operating system from Sperry Univac for its 90/60 and 90/70 computer systems. The system was first announced in November 1971 for Univac's 9700 system and was originally scheduled for delivery in March 1973. However, the delivery slipped by nearly a year, which impacted the 9700 marketing effort. It was first demonstrated by Univac on the new 90/60 system in October 1973. The official release was then planned for January 1974. OS/7 was abruptly discontinued in 1975 in favor of VS/9, Univac's name for RCA's VMOS operating system.
"OS/7 is a multi-tasking, multi-programming system that utilizes a roll-in, roll-out capability to keep the CPU optimally busy."
|
https://en.wikipedia.org/wiki/Mac%20OS%20Croatian%20encoding
|
Mac OS Croatian is a character encoding used on Apple Macintosh computers to represent Gaj's Latin alphabet. It is a derivative of Mac OS Roman. The three digraphs, Dž, Lj, and Nj, are not encoded.
IBM uses code page 1284 (CCSID 1284) for Mac OS Croatian, while Microsoft uses code page 10082.
The Croatian letters are added at the same positions as in ISO 8859-2. Despite having several added letters in common with Mac OS Central European, these are not encoded in the same positions.
Layout
Each character is shown with its equivalent Unicode code point and its decimal code point. Only the second half of the table (code points 128–255) is shown, the first half (code points 0–127) being the same as ASCII.
|
https://en.wikipedia.org/wiki/Magnet-assisted%20transfection
|
Magnet-assisted transfection is a transfection method which uses magnetic interactions to deliver DNA into target cells. Nucleic acids are associated with magnetic nanoparticles, and magnetic fields drive the nucleic acid-particle complexes into target cells, where the nucleic acids are released.
Magnetic Nanoparticles
Nanoparticles used as carriers for nucleic acids are mostly iron oxides. These iron oxides can be generated by precipitation from acidic iron-salt solutions upon addition of appropriate bases. The magnetic nanoparticles have an approximate size of 100 nm and are additionally coated with biological polymers to allow loading of nucleic acids. Particles and nucleic acids form complexes by ionic interaction of the negatively charged nucleic acid and the positively charged surface of the magnetic nanoparticle.
DNA delivery to the target cells
The binding of the negatively charged nucleic acids to the positively charged iron particles occurs relatively fast. After complex formation, the loaded particles are incubated together with the target cells on a magnetic plate. The magnetic field causes the iron particles to be rapidly drawn towards the surface of the cell membrane. Cellular uptake occurs by either endocytosis or pinocytosis. Once delivered to the target cells, the DNA is released into the cytoplasm. The magnetic particles are accumulated in endosomes and/or vacuoles. Over time, the nanoparticles are degraded and the iron enters the normal iron metabolism. Influence of cellular functions by iron particles has not been reported yet. In most cases the increased iron concentration in culture media does not lead to cytotoxic effects.
Advantages and prospects
Magnet-assisted transfection is a relatively new and time-saving method to introduce nucleic acids into a target cell with increased efficiency. In particular, adherent mammalian cell lines and primary cell cultures show very high transfection rates. Suspension cells and cells from other org
|
https://en.wikipedia.org/wiki/Nucleation
|
In thermodynamics, nucleation is the first step in the formation of either a new thermodynamic phase or structure via self-assembly or self-organization within a substance or mixture. Nucleation is typically defined to be the process that determines how long an observer has to wait before the new phase or self-organized structure appears. For example, if a volume of water is cooled (at atmospheric pressure) below 0°C, it will tend to freeze into ice, but volumes of water cooled only a few degrees below 0°C often stay completely free of ice for long periods (supercooling). At these conditions, nucleation of ice is either slow or does not occur at all. However, at lower temperatures nucleation is fast, and ice crystals appear after little or no delay.
Nucleation is a common mechanism which generates first-order phase transitions, and it is the start of the process of forming a new thermodynamic phase. In contrast, new phases at continuous phase transitions start to form immediately.
Nucleation is often very sensitive to impurities in the system. These impurities may be too small to be seen by the naked eye, but still can control the rate of nucleation. Because of this, it is often important to distinguish between heterogeneous nucleation and homogeneous nucleation. Heterogeneous nucleation occurs at nucleation sites on surfaces in the system. Homogeneous nucleation occurs away from a surface.
Characteristics
Nucleation is usually a stochastic (random) process, so even in two identical systems nucleation will occur at different times. A common mechanism is illustrated in the animation to the right. This shows nucleation of a new phase (shown in red) in an existing phase (white). In the existing phase microscopic fluctuations of the red phase appear and decay continuously, until an unusually large fluctuation of the new red phase is so large it is more favourable for it to grow than to shrink back to nothing. This nucleus of the red phase then grows and converts th
|
https://en.wikipedia.org/wiki/Ethnoprimatology
|
Ethnoprimatology is the study of human and non-human primate interactions. Ethnoprimatology is a discourse aimed at an anthropological holistic understanding of non-human primates. Human cultures worldwide have deep-rooted, primordial connections with non-human primates. Non-human primates play key roles in creation stories of many societies and often depict the direct relationship between non-human primates and humans.
In primatology the interface between humans and other primates is generally described as competition for space and resources, a contest between humans and other primates. While
competition does occur, it is a very incomplete description of the interface, and the co-ecologies, of humans and other primates. The emerging approach, termed ethnoprimatology, is explicit in its acknowledgment of the multifarious nature of the human–other primate interface (Fuentes and Wolfe 2002, Fuentes and Hockings 2010).
Case studies
South America
In the creation myths of Matsigenka mythology, humans were the first to inhabit the Earth and they were slowly transformed into different animal species, starting with primates. At a party, Yavireri, the first shaman, transformed two groups of people into woolly monkeys and spider monkeys.
Another myth describing the origins of primate species is that of Yari and Osheto. Yari was a lazy shaman who imbibed hallucinogens and sang songs all day. He would borrow beans from his brother-in-law Osheto, a spider monkey, and eat them rather than harvest. Then he would return to Osheto requesting more, claiming his harvest failed to grow. When Osheto discovered this deceit, he punched Yari in the throat, causing it to become swollen, like that of a howler monkey. Yaniri was then transformed into a howler monkey as punishment.
In a similar story, two shamans on a failed quest to steal fire-making technology from an all-female group were transformed into primates. One of the shamans burned the hair off his face and in turn was trans
|
https://en.wikipedia.org/wiki/Kalanchoe
|
Kalanchoe ( ), also written Kalanchöe or Kalanchoë, is a genus of about 125 species of tropical, succulent plants in the stonecrop family Crassulaceae, mainly native to Madagascar and tropical Africa. A Kalanchoe species was one of the first plants to be sent into space, sent on a resupply to the Soviet Salyut 1 space station in 1979. The majority of kalanchoes require around 6–8 hours of sunlight a day; a few cannot tolerate this, and survive with bright, indirect sunlight to bright shade.
Description
Most are shrubs or perennial herbaceous plants, but a few are annual or biennial. The largest, Kalanchoe beharensis from Madagascar, can reach tall, but most species are less than tall.
Kalanchoes open their flowers by growing new cells on the inner surface of the petals to force them outwards, and on the outside of the petals to close them. Kalanchoe flowers are divided into 4 sections with 8 stamens. The petals are fused into a tube, in a similar way to some related genera such as Cotyledon.
Taxonomy
The genus Kalanchoe was first described by the French botanist Michel Adanson in 1763.
The genus Bryophyllum was described by Salisbury in 1806 and the genus Kitchingia was created by Baker in 1881. Kitchingia is now regarded as a synonym for Kalanchoe, while Bryophyllum has also been treated as a separate genus, since species of Bryophyllum appear to be nested within Kalanchoe on molecular phylogenetic analysis, Bryophyllum is considered as a section of the former, dividing the genus into three sections, Kitchingia, Bryophyllum, and Eukalanchoe. these were formalised as subgenera by Smith and Figueiredo (2018).
Etymology
Adanson cited Georg Joseph Kamel (Camellus) as his source for the name. The name came from the Cantonese name 伽藍菜 (Jyutping: gaa1 laam4 coi3).
Kalanchoe ceratophylla and Kalanchoe laciniata are both called (apparently "Buddhist monastery [samghārāma] herb") in China. In Mandarin Chinese, it does not seem very close in pronunciation (qiélán
|
https://en.wikipedia.org/wiki/Windows%20Server%202022
|
Windows Server 2022 is the 10th and current major long term servicing channel (LTSC) release of the Windows Server operating system by Microsoft Corporation, as part of the Windows NT family of operating systems. It was announced at Microsoft's Ignite event from March 2-4, 2021. It was released on August 18, 2021, almost 3 years after Windows Server 2019, and a few months before the Windows 11 operating system.
Windows Server 2022 is based on the "Iron" codebase. Its updates are incompatible with the Windows 10 operating system, as the "Iron" codebase was not used for it. Like its predecessor, Windows Server 2019, it requires x64 processors.
History
On February 22, 2021, Microsoft announced Windows Server 2022 would release on March 2.
On March 3, 2021, Microsoft announced Windows Server 2022 would release as a preview build on Windows Update. Windows Server 2022 was launched for customer availability on August 18, 2021.
In September 2021, Microsoft announced the release of SQL Server 2022, which would later be released in March 2022.
In June 2022, Microsoft released optional "C" updates for users to test upcoming fixes for Windows Server 2022 (KB5014665). While these optional "C" updates address connectivity issues when using Wi-Fi hotspots from the Wi-Fi Alliance after installing Windows NT updates, there have also been reported issues with LLTP/SSTP VPN clients and RDP failing to connect after deploying these optional "C" updates.
Features
Windows Server 2022 has the following features:
Security
TPM 2.0
Secured-core server; Credential Guard and Hypervisor-protected Code Integrity (HVCI).
UEFI Secure Boot
Boot DMA Protection
DNS-over-HTTPS
AES-256 encryption on SMB
Storage
Storage Migration Service (SMS)
Server Message Block (SMB) compression
Storage security and performance
Cloud
Azure hybrid capabilities
Editions
Essentials
Only available through Microsoft OEM partners.
Intended for small businesses
Supports a maximum of 25 users
|
https://en.wikipedia.org/wiki/Mathematical%20Olympiads%20for%20Elementary%20and%20Middle%20Schools
|
Mathematical Olympiads for Elementary and Middle Schools (MOEMS) is a worldwide math competition, organized by a not for profit foundation with the same name. It is held yearly from November through March with one test administered each month. Tests are given at individual schools and results are sent to MOEMS for scoring. Schools, home schools and institutions may participate in the contest. Two dozen other nations also participate in the competition. There are two divisions, Elementary and Middle School. Elementary level problems are for grades 4-6 and Middle School level problems are for grades 7-8, though 4-6 graders may participate in Middle School problems. Hundreds of thousands of students participate annually in MOEMS events.
MOEMS plans soon to develop an online teacher training program.
History
First set up in 1977 by founder George Lenchner (1917–2006), MOEMS became a public competition in 1979. Lenchner, who died after decades in service to the math education community, wrote several books on elementary problem solving used by many MOEMS teachers and students. His obituary was featured in the Sunday New York Times on May 14, 2006.
The current MOEMS Director is Richard Kalman who also worked with the American Regions Mathematics League for many years.
|
https://en.wikipedia.org/wiki/Herbchronology
|
Herbchronology is the analysis of annual growth rings (or simply annual rings) in the secondary root xylem of perennial herbaceous plants. While leaves and stems of perennial herbs die down at the end of the growing season the root often persists for many years or even the entire life. Perennial herb species belonging to the dicotyledon group (also known as perennial forbs) are characterized by secondary growth, which shows as a new growth ring added each year to persistent roots. About two thirds of all perennial dicotyledonous herb species with a persistent root that grow in the strongly seasonal zone of the northern hemisphere show at least fairly clear annual growth rings.
Counting of annual growth rings can be used to determine the age of a perennial herb similarly as it is done in trees using dendrochronology. This way it was found that some perennial herbs live up to 50 years and more.
History
The term herb-chronology is referring to dendrochronology because of the similarity of the structures investigated. The term was introduced in the late 1990s, however, the existence of annual rings in perennial herbs was already observed in earlier times by several researchers.
Annual growth rings
Like trees and woody plants, perennial herbs have a growth zone called vascular cambium between the root bark and the root xylem. The vascular cambium ring is active during growing season and produces a new layer of xylem tissue or growth ring every year. This addition of a new lateral layer each year is called secondary growth and is exactly the same as in woody plants. Each individual growth ring consists of earlywood tissue that is formed at the beginning of the growing season and latewood tissue formed in summer and fall. Earlywood tissue is characterized by wide vessels or denser arrangement of vessels, whereas latewood tissue shows narrower vessels and/or lower vessel density.
Annual growth rings in herbs are usually only visible by means of a microscope and a speci
|
https://en.wikipedia.org/wiki/Anochetus%20dubius
|
Anochetus dubius is an extinct species of ant in the subfamily Ponerinae known from two possibly Miocene fossils found on Hispaniola. A. dubius is one of eight species in the ant genus Anochetus to have been described from fossils found in Dominican amber and is one of a number of Anochetus species found in the Greater Antillies.
History and classification
Anochetus dubius is known from the solitary fossil insect which, along with two soil particles, is an inclusion in a transparent yellow chunk of Dominican amber. The amber was produced by the extinct Hymenaea protera, which formerly grew on Hispaniola, across northern South America, and up to southern Mexico. The specimen was collected from an undetermined amber mine in fossil-bearing rocks of the Cordillera Septentrional mountains of northern Dominican Republic. The amber dates from at least the Burdigalian stage of the Miocene, based on studying the associated fossil foraminifera, and may be as old as the Middle Eocene, based on the associated fossil coccoliths. This age range is due to the host rock being secondary deposits for the amber, and the Miocene as the age range is only the youngest that it might be.
At the time of description, the holotype specimen, number "Do-4192", was preserved in the State Museum of Natural History Stuttgart amber collections in Baden-Württemberg, Germany. The holotype fossil was first studied by entomologist Maria L. De Andrade of the University of Basle with her 1991 type description of the new species being published in the journal Stuttgarter Beiträge zur Naturkunde. Serie B (Geologie und Paläontologie). The specific epithet dubius is derived from the Latin dubius meaning "doubtful", a reference to the uncertain affinities to any specific modern Anochetus species group.
The species is one of eight Anochetus which have been described from Dominican amber. Two species were described prior to A. dubius: A. corayi in 1980 and A. brevidentatus in 1991. The remaining five spec
|
https://en.wikipedia.org/wiki/Tidal%20tensor
|
In Newton's theory of gravitation and in various relativistic classical theories of gravitation, such as general relativity, the tidal tensor represents
tidal accelerations of a cloud of (electrically neutral, nonspinning) test particles,
tidal stresses in a small object immersed in an ambient gravitational field.
The tidal tensor represents the relative acceleration due to gravity of two test masses separated by an infinitesimal distance. The component represents the relative acceleration in the direction produced by a displacement in the direction.
Tidal tensor for a spherical body
The most common example of tides is the tidal force around a spherical body (e.g., a planet or a moon).
Here we compute the tidal tensor for the gravitational field outside an isolated spherically symmetric massive object. According to Newton's gravitational law, the acceleration a at a distance r from a central mass m is
(to simplify the math, in the following derivations we use the convention of setting the gravitational constant G to one. To calculate the differential accelerations, the results are to be multiplied by G.)
Let us adopt the frame in polar coordinates for our three-dimensional Euclidean space, and consider infinitesimal displacements in the radial and azimuthal directions, and , which are given the subscripts 1, 2, and 3 respectively.
We will directly compute each component of the tidal tensor, expressed in this frame.
First, compare the gravitational forces on two nearby objects lying on the same radial line at distances from the central body differing by a distance h:
Because in discussing tensors we are dealing with multilinear algebra, we retain only first order terms, so . Since there is no acceleration in the or direction due to a displacement in the radial direction, the other radial terms are zero: .
Similarly, we can compare the gravitational force on two nearby observers lying at the same radius but displaced by an (infinitesimal) distance h
|
https://en.wikipedia.org/wiki/Diffuse%20myelinoclastic%20sclerosis
|
Diffuse myelinoclastic sclerosis, sometimes referred to as Schilder's disease, is a very infrequent neurodegenerative disease that presents clinically as pseudotumoural demyelinating lesions, making its diagnosis difficult. It usually begins in childhood, affecting children between 5 and 14 years old, but cases in adults are also possible.
This disease is considered one of the borderline forms of multiple sclerosis because some authors consider them different diseases and others MS variants. Other diseases in this group are neuromyelitis optica (NMO), Balo concentric sclerosis and Marburg multiple sclerosis.
Symptoms and signs
Symptoms are similar to those in multiple sclerosis and may include dementia, aphasia, seizures, personality changes, poor attention, tremors, balance instability, incontinence, muscle weakness, headache, vomiting, and vision and speech impairment. Other symptoms include weakness on one side of the body, muscle stiffness, hearing problems, and loss of bowel control.
Diagnostic
The Poser criteria for diagnosis are:
One or two roughly symmetrical large plaques. Plaques are greater than 2 cm diameter.
No other lesions are present and there are no abnormalities of the peripheral nervous system.
Results of adrenal function studies and serum very long chain fatty acids are normal.
Pathological analysis is consistent with subacute or chronic myelinoclastic diffuse sclerosis.
Neuropathological examination
The typical demyelinating plaques in Schilder's sclerosis are usually found bilaterally in the centrum semiovale. Both hemispheres are almost completely occupied by large, well defined lesions. Although plaques of this kind are largely prevalent in Schilder's sclerosis, smaller lesions can also be observed.
Immunology
It has been reported that DMS cases show no oligoclonal bands, being therefore distinct from standard MS.
Treatments
Management: Corticosteroids may be effective in some patients. Additional treatment options are beta-interfe
|
https://en.wikipedia.org/wiki/American%20Women%27s%20Hospitals%20Service
|
The American Women's Hospitals Service (AWHS) is a charitable organization that promotes the relief of suffering worldwide by supporting independent clinics to provide care to high risk populations and by providing travel grants to medical students and residents to perform clinical projects abroad in under-served areas. They are partnered with the American Medical Women's Association (AMWA) - an organization of women physicians, medical students and others seeking the advancement of women in medicine.
Early history
In 1917 the Medical Women's National Association (which was later renamed AMWA) established a war service committee in order to create a census of the medical women in the country and to plan how to apply their resources to the war effort. World War I had already entered into its third year, women at that time were not accepted by military branches of the government, and the government had no plan to organize them for war service. The war service committee, adopting the name American Women's Hospitals, decided that they wanted to provide individual medical service abroad and also establish military hospitals overseas.
In its first year, AWH partnered with the Red Cross and civilian medical organizations to send abroad 62 AWH volunteer doctors as well as 30 technicians and lay workers to France, Serbia, Palestine and Greece. AWH also established its first hospital in Neufmoutiers-en-Brie, France, in July 1918. This hospital, financed entirely by AWH, had 25 beds and a staff of 15 women. In the US, AWH arranged for hospitals for convalescent soldiers, for care for soldiers' dependents, and for laboratory training courses in order to address the critical shortage at that time of skilled lab workers.
Although the armistice was signed a year later, the ensuing local wars, revolutions, earthquakes, famine and millions of destitute refugees meant that medical assistance remained urgently needed around the world. AWH expanded its service at home and multiple
|
https://en.wikipedia.org/wiki/Dysgenics
|
Dysgenics (also known as cacogenics) is the decrease in prevalence of traits deemed to be either socially desirable or well adapted to their environment due to selective pressure disfavoring the reproduction of those traits.
The adjective "dysgenic" is the antonym of "eugenic". In 1915 the term was used by David Starr Jordan to describe the supposed deleterious effects of modern warfare on group-level genetic fitness because of its tendency to kill physically healthy men while preserving the disabled at home. Similar concerns had been raised by early eugenicists and social Darwinists during the 19th century, and continued to play a role in scientific and public policy debates throughout the 20th century. More recent concerns about supposed dysgenic effects in human populations have been advanced by the controversial psychologist Richard Lynn, notably in his 1996 book Dysgenics: Genetic Deterioration in Modern Populations, which argued that a reduction in selection pressures and decreased infant mortality since the Industrial Revolution have resulted in an increased propagation of deleterious traits and genetic disorders.
Despite these concerns, genetic studies have shown no evidence for dysgenic effects in human populations.
In fiction
Cyril M. Kornbluth's 1951 short story "The Marching Morons" is an example of dysgenic fiction, describing a man who accidentally ends up in the distant future and discovers that dysgenics has resulted in mass stupidity. Mike Judge's 2006 film Idiocracy has the same premise, with the main character the subject of a military hibernation experiment that goes awry, taking him 500 years into the future. While in "The Marching Morons", civilization is kept afloat by a small group of dedicated geniuses, in Idiocracy, voluntary childlessness among high-IQ couples leaves only automated systems to fill that role.
See also
Devolution (biology)
Flynn effect
Heritability of IQ
List of congenital disorders
List of biological development diso
|
https://en.wikipedia.org/wiki/Covector%20mapping%20principle
|
The covector mapping principle is a special case of Riesz' representation theorem, which is a fundamental theorem in functional analysis. The name was coined by Ross and coauthors, It provides conditions under which dualization can be commuted with discretization in the case of computational optimal control.
Description
An application of Pontryagin's minimum principle to Problem , a given optimal control problem generates a boundary value problem. According to Ross, this boundary value problem is a Pontryagin lift and is represented as Problem . Now suppose one discretizes Problem . This generates Problem where represents the number of discrete points. For convergence, it is necessary to prove that as
In the 1960s Kalman and others showed that solving Problem is extremely difficult. This difficulty, known as the curse of complexity, is complementary to the curse of dimensionality.
In a series of papers starting in the late 1990s, Ross and Fahroo showed that one could arrive at a solution to Problem (and hence Problem ) more easily by discretizing first (Problem ) and dualizing afterwards (Problem ). The sequence of operations must be done carefully to ensure consistency and convergence. The covector mapping principle asserts that a covector mapping theorem can be discovered to map the solutions of Problem to Problem thus completing the circuit.
See also
Legendre pseudospectral method
Ross–Fahroo pseudospectral methods
Ross–Fahroo lemma
|
https://en.wikipedia.org/wiki/North%20Carolina%20State%20University%20College%20of%20Agriculture%20and%20Life%20Sciences
|
North Carolina State University's College of Agriculture and Life Sciences (CALS) is the fourth largest college in the university and one of the largest colleges of its kind in the nation, with nearly 3,400 students pursuing associate, bachelor's, master's and doctoral degrees and 1,300 on-campus and 700 off-campus faculty and staff members.
With headquarters in Raleigh, North Carolina, the college includes 12 academic departments, the North Carolina Agricultural Research Service and the North Carolina Cooperative Extension Service. The college dean is Dr. Garey Fox.
The research service is the state's principal agency of agricultural and life sciences research, with close to 600 projects related to more than 70 agricultural commodities, related agribusinesses and life science industries. Scientists work not only on the college campus in Raleigh but also at 18 agricultural research stations and 10 field laboratories across the state.
The extension service is the largest outreach effort at North Carolina State University, with local centers serving all 100 of North Carolina's counties as well as the Eastern Band of the Cherokee Indians. Cooperative Extension's educational programs, carried out by state specialists and county agents, focus on agriculture, food and 4-H youth development. About 43,000 volunteers and advisory leaders also contribute to Extension's efforts.
The college staffs the Plants for Human Health Institute at the N.C. Research Campus in Kannapolis with faculty from the departments of horticultural science; food, bioprocessing and nutrition sciences; plant biology; genetics; and agricultural and resource economics.
The college's Department of Plant Pathology helps sponsor the Bailey Memorial Tour each year. This tour is offered to prospective agriculture students and gives them a broad based taste of the work of agricultural pathology, and is named after Dr. Jack Bailey, late pioneering Professor of Plant Pathology.
Departments
The college ha
|
https://en.wikipedia.org/wiki/Carl%20Gombrich
|
Carl Gombrich is a British interdisciplinary educator, academic, former opera singer and co-founder of the London Interdisciplinary School.
Early life and education
Carl Gombrich was born in 1965, to Dorothea Amanda Friedrich and to renown British Indologist and scholar, Richard Gombrich. He is the grandson of Austrian-born art historian Ernst Gombrich.
Gombrich has degrees in mathematics, physics and philosophy.
Career
Opera
From 2000 to 2001, Gombrich was the Royal Opera House Scholar at the National Opera Studio, where he sang bass. He has performed in various operatic roles, such as Masetto in Don Giovanni with the Garsington Opera, as Gianettino in Fiesque, and as Macduff in Ernest Bloch's Macbeth at the University College Opera.
Academic & Program director at University College London
Gombrich joined University College London (UCL) in 2002 as a lecturer. The following year, he became a Teaching Fellow in Physics. He then became Principal of the University Preparatory Certificates, directing UCL's international foundation courses, which aid students coming from abroad to gain the skills to study at UK universities.
In 2010, Gombrich was appointed Programme Director of UCL Arts and Sciences, leading the design, development and implementation of the degree, which began accepting students in 2012. This program was one of the first of its kind in the United Kingdom to offer a liberal arts degree. He directed the program until 2019.
He was a member of the British Academy Working Group on Interdisciplinarity, led by David Soskice, which in 2016 published a report titled 'Crossing paths: interdisciplinary institutions, careers, education and applications', alongside other notable academics such as Colette Fagan, Tom McLeish, Professor Georgina Born, Julia Black, Barry C. Smith and Graeme Reid. Gombrich was also a core member of the NVAO accreditation panel for the Liberal Arts and Sciences Colleges of the Netherlands.
Gombrich is a regular speaker at events
|
https://en.wikipedia.org/wiki/Emma%20Lehmer
|
Emma Markovna Lehmer (née Trotskaia) (November 6, 1906 – May 7, 2007) was a mathematician known for her work on reciprocity laws in algebraic number theory. She preferred to deal with complex number fields and integers, rather than the more abstract aspects of the theory.
Biography
She was born in Samara, Russian Empire, but her father's job as a representative with a Russian sugar company moved the family to Harbin, China in 1910. Emma was tutored at home until the age of 14, when a school was opened locally. She managed to make her way to the US for her higher education.
At UC Berkeley, she started out in engineering in 1924, but found her niche in mathematics. One of her professors was Derrick N. Lehmer, the number theorist well known for his work on prime number tables and factorizations. While working for him at Berkeley finding pseudosquares, she met his son, her future husband Derrick H. Lehmer. Upon her graduation summa cum laude with a B.A. in Mathematics (1928), Emma married the younger Lehmer. They moved to Brown University, where Emma received her M.Sc., and Derrick his Ph.D., both in 1930. Emma did not obtain a Ph.D. herself; she claimed there were many advantages to not holding a doctorate.
The Lehmers had two children, Laura (1932) and Donald (1934).
Contributions
Lehmer did independent mathematical work, including a translation from Russian to English of Pontryagin's book Topological Groups. She worked closely with her husband on many projects; 21 of her 56 publications were joint work with him. Her publications were mainly in number theory and computation, with emphasis on reciprocity laws, special primes, and congruences.
She proved that there were infinitely many Fibonacci pseudoprimes.
Paul Halmos, in his book I want to be a mathematician: An automathography, wrote about Lehmer's translation of Pontryagin's Topological Groups: "I read the English translation by Mrs. Lehmer (usually referred to as Emma Lemma)...". Several later publicat
|
https://en.wikipedia.org/wiki/Jonathan%20Bowen
|
Jonathan P. Bowen FBCS FRSA (born 1956) is a British computer scientist and an Emeritus Professor at London South Bank University, where he headed the Centre for Applied Formal Methods. Prof. Bowen is also the Chairman of Museophile Limited and has been a Professor of Computer Science at Birmingham City University, Visiting Professor at the Pratt Institute (New York City), University of Westminster and King's College London, and a visiting academic at University College London.
Early life and education
Bowen was born in Oxford, the son of Humphry Bowen, and was educated at the Dragon School, Bryanston School, prior to his matriculation at University College, Oxford (Oxford University) where he received the MA degree in Engineering Science.
Career
Bowen later worked at Imperial College, London, the Oxford University Computing Laboratory (now the Oxford University Department of Computer Science), the University of Reading, and London South Bank University. His early work was on formal methods in general, and later the Z notation in particular. He was Chair of the Z User Group from the early 1990s until 2011. In 2002, Bowen was elected Chair of the British Computer Society FACS Specialist Group on Formal Aspects of Computing Science. Since 2005, Bowen has been an Associate Editor-in-Chief of the journal Innovations in Systems and Software Engineering. He is also an associate editor on the editorial board for the ACM Computing Surveys journal, covering software engineering and formal methods. From 2008–9, he was an Associate at Praxis High Integrity Systems, working on a large industrial project using the Z notation.
Bowen's other major interest is the area of online museums. In 1994, he founded the Virtual Library museums pages (VLmp), an online museums directory that was soon adopted by the International Council of Museums (ICOM). In the same year he also started the Virtual Museum of Computing. In 2002, he founded Museophile Limited to help museums, especially onl
|
https://en.wikipedia.org/wiki/Malachite%20green
|
Malachite green is an organic compound that is used as a dyestuff and controversially as an antimicrobial in aquaculture. Malachite green is traditionally used as a dye for materials such as silk, leather, and paper. Despite its name the dye is not prepared from the mineral malachite; the name just comes from the similarity of color.
Structures and properties
Malachite green is classified in the dyestuff industry as a triarylmethane dye and also using in pigment industry. Formally, malachite green refers to the chloride salt [C6H5C(C6H4N(CH3)2)2]Cl, although the term malachite green is used loosely and often just refers to the colored cation. The oxalate salt is also marketed. The anions have no effect on the color. The intense green color of the cation results from a strong absorption band at 621 nm (extinction coefficient of ).
Malachite green is prepared by the condensation of benzaldehyde and dimethylaniline to give leuco malachite green (LMG):
C6H5CHO + C6H5N(CH3)2 -> (C6H5N(CH3)2)2C6H5 + H2O
Second, this colorless leuco compound, a relative of triphenylmethane, is oxidized to the cation that is MG:
C6H5CH(C6H4N(CH3)2)2 + HCl + O2 → [C6H5C(C6H4N(CH3)2)2]Cl + H2O
A typical oxidizing agent is manganese dioxide.
Hydrolysis of MG gives an alcohol:
[C6H5C(C6H4N(CH3)2)2]Cl + H2O → C6H5C(OH)(C6H4N(CH3)2)2 + HCl
This alcohol is important because it, not MG, traverses cell membranes. Once inside the cell, it is metabolized into LMG. Only the cation MG is deeply colored, whereas the leuco and alcohol derivatives are not. This difference arises because only the cationic form has extended pi-delocalization, which allows the molecule to absorb visible light.
Preparation
The leuco form of malachite green was first prepared by Hermann Fischer in 1877 by condensing benzaldehyde and dimethylaniline in the molecular ratio 1:2 in the presence of sulfuric acid.
Uses
Malachite green is traditionally used as a dye. Kilotonnes of MG and related triarylmethane dyes are produced
|
https://en.wikipedia.org/wiki/Meter%20serial%20number
|
A meter serial number (MSN, or 'meter ID') is an alphanumeric reference used in Great Britain to identify an electricity meter. Although meter serial numbers are intended to be unique, this can not be assured and duplicate serial numbers do exist. There are a variety of formats used over many years, but many meter serial numbers take the form A##AA###### (e.g. S06DS123456). The first letter indicates the manufacturer, the first two digits indicate the year the meter was calibrated and certified, and the second letter (or pair of letters) indicates the company that purchased the meter. The five/six digit sequence is a serial batch number. There may be a space separating the groups of numbers and letters.
Electricity meters in other countries besides Great Britain do not necessarily follow this standard.
See also
Electricity billing in the UK
Meter Point Administration Number (MPAN)
|
https://en.wikipedia.org/wiki/Heatwork
|
Heatwork is the combined effect of temperature and time. It is important to several industries:
Ceramics
Glass and metal annealing
Metal heat treating
Pyrometric devices can be used to gauge heat work as they deform or contract due to heatwork to produce temperature equivalents. Within tolerances, firing can be undertaken at lower temperatures for a longer period to achieve comparable results. When the amount of heatwork of two firings is the same, the pieces may look identical, but there may be differences not visible, such as mechanical strength and microstructure. Heatwork is taught in material science courses, but is not a precise measurement or a valid scientific concept.
External links
Temperature equivalents table & description of Bullers Rings.
Temperature equivalents table & description of Nimra Cerglass pyrometric cones.
Temperature equivalents table & description of Orton pyrometric cones.
Temperature equivalents table of Seger pyrometric cones.
Temperature Equivalents, °F & °C for Bullers Ring.
Glass physics
Pottery
Metallurgy
Ceramic engineering
|
https://en.wikipedia.org/wiki/HumHot
|
HUMHOT is a database of human meiotic recombination hot spot DNA sequences.
See also
meiotic recombination
|
https://en.wikipedia.org/wiki/127th%20meridian%20east
|
The meridian 127° east of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, Asia, Australia, the Indian Ocean, the Southern Ocean, and Antarctica to the South Pole.
The 127th meridian east forms a great circle with the 53rd meridian west.
From Pole to Pole
Starting at the North Pole and heading south to the South Pole, the 127th meridian east passes through:
{| class="wikitable plainrowheaders"
! scope="col" width="130" | Co-ordinates
! scope="col" | Country, territory or sea
! scope="col" | Notes
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Arctic Ocean
| style="background:#b0e0e6;" |
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Laptev Sea
| style="background:#b0e0e6;" |
|-valign="top"
|
! scope="row" |
| Sakha Republic — islands of the Lena Delta and the mainland Amur Oblast — from
|-valign="top"
|
! scope="row" |
| Heilongjiang Jilin — from Heilongjiang — for about 10 km from Jilin — from
|-
|
! scope="row" |
|Jagang ProvinceYanggang ProvinceSouth Hamgyeong ProvinceSouth Pyeongan ProvinceSouth Hamgyeong ProvinceGangwon Province
|-
|
! scope="row" |
|
Gyeonggi Province Passing through Seoul Gyeonggi Province - Passing through of Suwon South Chungcheong Province North Jeolla Province - Passing just west of Jeonju South Jeolla Province Passing just east of Gwangju South Jeolla Province
|-valign="top"
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | East China Sea
| style="background:#b0e0e6;" | Passing just east of the island of Jeju-do, (at ) Passing just west of the island of Tonakijima, Okinawa Prefecture, (at ) Passing just east of the island of Kumejima, Okinawa Prefecture, (at )
|-valign="top"
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Pacific Ocean
| style="background:#b0e0e6;" | Philippine Sea — passing just east of the Talaud Islands, (at )
|-valign="top"
| style
|
https://en.wikipedia.org/wiki/Alpine%20plant
|
Alpine plants are plants that grow in an alpine climate, which occurs at high elevation and above the tree line. There are many different plant species and taxa that grow as a plant community in these alpine tundra. These include perennial grasses, sedges, forbs, cushion plants, mosses, and lichens. Alpine plants are adapted to the harsh conditions of the alpine environment, which include low temperatures, dryness, ultraviolet radiation, wind, drought, poor nutritional soil, and a short growing season.
Some alpine plants serve as medicinal plants.
Ecology
Alpine plants occur in a tundra: a type of natural region or biome that does not contain trees. Alpine tundra occurs in mountains worldwide. It transitions to subalpine forests below the tree line; stunted forests occurring at the forest-tundra ecotone are known as Krummholz. With increasing elevation, it ends at the snow line where snow and ice persist through summer, also known as the Nival Zone.
Alpine plants are not limited to higher elevations. However, high-elevation areas have different ecology than those growing at higher latitudes. One of the biggest distinctions is that the lower bound of a tropical alpine area is difficult to define due to a mixture of human disturbances, dry climates, and a naturally lacking tree line. The other major difference between tropical and arctic-alpine ecology is the temperature differences. The tropics have a summer/winter cycle every day, whereas the higher latitudes stay cold both day and night.
In the northern latitudes, the main factor to overcome is the cold. Intense frost action processes have a profound effect on what little soil there is and the vegetation of arctic-alpine regions. Tropical alpine regions are subject to these conditions as well, but they seldom happen. Because northern alpine areas cover a massive area it can be difficult to generalize the characteristics that define the ecology. One factor in alpine ecology is wind in an area. Wind pruning is a
|
https://en.wikipedia.org/wiki/DRAKON
|
DRAKON () is a free and open source algorithmic visual programming and modeling language developed as part of the defunct Soviet Union Buran space program in 1986 following the need in increase of software development productivity. The visual language provides a uniform way to represent processes in flowcharts.
There are various implementation of the language specification that may be used to draw and export actual flowcharts. Notable examples include free and open source DRAKON Editor (September 2011).
History
The development of DRAKON started in 1986 to address the emerging risk of misunderstandings - and subsequent errors - between users of different programming languages in the Russian space program. Its development was directed by Vladimir Parondzhanov with the participation of the Russian Federal Space Agency (Academician Pilyugin Center, Moscow) and Russian Academy of Sciences (Keldysh Institute of Applied Mathematics).
The language was constructed by formalization, ergonomization and nonclassical structurization of flowcharts described in the ISO 5807-85 standard and Russian standard «Гост 19.701-90».
The goal was to replace specialized languages used in the Buran project with one universal programming language. Namely PROL2 (ПРОЛ2), used for developing inflight systems software for the computer system Biser-4 (Бисер-4), DIPOL (ДИПОЛЬ), used for developing software for the ground maintenance computer systems) and LAKS (ЛАКС), used for modelling.
The work was finished in 1996 (3 years after the Buran project was officially closed), when an automated CASE programming system called "Grafit-Floks" was developed.
This CASE is used since 1996 in: an international project Sea Launch, Russian orbit insertion upper stage Fregat (Russian: Фрегат, frigate) for onboard control systems and tests, upgraded heavy launch vehicle (carrier rocket) Proton-M.
Overview
The name DRAKON is the Russian acronym for "Дружелюбный Русский Алгоритмический [язык], Который Обеспе
|
https://en.wikipedia.org/wiki/Proof%20%28truth%29
|
A proof is sufficient evidence or a sufficient argument for the truth of a proposition.
The concept applies in a variety of disciplines,
with both the nature of the evidence or justification and the criteria for sufficiency being area-dependent. In the area of oral and written communication such as conversation, dialog, rhetoric, etc., a proof is a persuasive perlocutionary speech act, which demonstrates the truth of a proposition. In any area of mathematics defined by its assumptions or axioms, a proof is an argument establishing a theorem of that area via accepted rules of inference starting from those axioms and from other previously established theorems. The subject of logic, in particular proof theory, formalizes and studies the notion of formal proof. In some areas of epistemology and theology, the notion of justification plays approximately the role of proof, while in jurisprudence the corresponding term is evidence,
with "burden of proof" as a concept common to both philosophy and law.
In most disciplines, evidence is required to prove something. Evidence is drawn from the experience of the world around us, with science obtaining its evidence from nature, law obtaining its evidence from witnesses and forensic investigation, and so on. A notable exception is mathematics, whose proofs are drawn from a mathematical world begun with axioms and further developed and enriched by theorems proved earlier.
Exactly what evidence is sufficient to prove something is also strongly area-dependent, usually with no absolute threshold of sufficiency at which evidence becomes proof. In law, the same evidence that may convince one jury may not persuade another. Formal proof provides the main exception, where the criteria for proofhood are ironclad and it is impermissible to defend any step in the reasoning as "obvious" (except for the necessary ability of the one proving and the one being proven to, to correctly identify any symbol used in the proof.); for a well-form
|
https://en.wikipedia.org/wiki/Local%20coordinates
|
Local coordinates are the ones used in a local coordinate system or a local coordinate space. Simple examples:
Houses. In order to work in a house construction, the measurements are referred to a control arbitrary point that will allow to check it: stick/sticks on the ground, steel bar, nails...
Addresses. Using house numbers to locate a house on a street; the street is a local coordinate system within a larger system composed of city townships, states, countries, postal codes, etc.
Local systems exist for convenience. On ancient times, every work was made on relative bases as there was no conception of global systems. Practically, it is better to use local systems for small works as houses, buildings... For most of the applications, it is desired the position of one element relative to one building or location, and in a more local way, relative to one furniture or person. In a regular way, you will not give your position by geographical coordinates rather than "I am 15 meters away of the entry to the building". So it is a pretty common way to locate things.
It is possible to bring latitude and longitude for all terrestrial locations, but unless one has a highly precise GPS device or you make astronomical observations, this is impractical. It is much simple to use a tape, a rope, a chain... The position information (global) should be transformed into a location. Position refers to a numeric or symbolic description within a spatial reference system, where as location refers to information about surrounding objects and their interrelationships. (Topological space)
Use
In computer graphics and computer animation, local coordinate spaces are also useful for their ability to model independently transformable aspects of geometrical scene graphs. When modeling a car, for example, it is desirable to describe the center of each wheel with respect to the car's coordinate system, but then specify the shape of each wheel in separate local spaces centered about these poi
|
https://en.wikipedia.org/wiki/Commensurate%20line%20circuit
|
Commensurate line circuits are electrical circuits composed of transmission lines that are all the same length; commonly one-eighth of a wavelength. Lumped element circuits can be directly converted to distributed-element circuits of this form by the use of Richards' transformation. This transformation has a particularly simple result; inductors are replaced with transmission lines terminated in short-circuits and capacitors are replaced with lines terminated in open-circuits. Commensurate line theory is particularly useful for designing distributed-element filters for use at microwave frequencies.
It is usually necessary to carry out a further transformation of the circuit using Kuroda's identities. There are several reasons for applying one of the Kuroda transformations; the principal reason is usually to eliminate series connected components. In some technologies, including the widely used microstrip, series connections are difficult or impossible to implement.
The frequency response of commensurate line circuits, like all distributed-element circuits, will periodically repeat, limiting the frequency range over which they are effective. Circuits designed by the methods of Richards and Kuroda are not the most compact. Refinements to the methods of coupling elements together can produce more compact designs. Nevertheless, the commensurate line theory remains the basis for many of these more advanced filter designs.
Commensurate lines
Commensurate lines are transmission lines that are all the same electrical length, but not necessarily the same characteristic impedance (Z0). A commensurate line circuit is an electrical circuit composed only of commensurate lines terminated with resistors or short- and open-circuits. In 1948, Paul I. Richards published a theory of commensurate line circuits by which a passive lumped element circuit could be transformed into a distributed element circuit with precisely the same characteristics over a certain frequency ran
|
https://en.wikipedia.org/wiki/Cellulite
|
Cellulite or gynoid lipodystrophy (GLD) is the herniation of subcutaneous fat within fibrous connective tissue that manifests as skin dimpling and nodularity, often on the pelvic region (specifically the buttocks), lower limbs, and abdomen. Cellulite occurs in most postpubescent females. A review gives a prevalence of 85–98% of women of European descent, but it is considerably less common in women of East Asian descent. It is believed to be physiological rather than pathological. It can result from a complex combination of factors, including diet, sedentary lifestyle, hormonal imbalance or heredity, among others.
Causes
The causes of cellulite include changes in metabolism, physiology, diet and exercise habits, obesity, alteration of connective tissue structure, hormonal factors, genetic factors, the microcirculatory system, the extracellular matrix, and subtle inflammatory alterations.
Hormonal factors
Hormones play a dominant role in the formation of cellulite. Estrogen is thought to be an important hormone in the development of cellulite, and it has been proposed that an imbalance of estrogen relative to progesterone may be associated with cellulite. However, there has been no reliable clinical evidence to support the claim that estrogen levels are linked to cellulite, and many women with elevated estrogen levels do not get cellulite. Other hormones—including insulin, the catecholamines adrenaline, cortisol and noradrenaline, thyroid hormones, and prolactin—are believed to participate in the development of cellulite.
Genetic factors
There is a genetic element in individual susceptibility to cellulite. Researchers have traced the genetic component of cellulite to particular polymorphisms in the angiotensin converting enzyme (ACE) and hypoxia-inducible factor 1A (HIF1a) genes. Evidence for the heredity of cellulite is supported from studies showing that both the presence and degree of cellulite is similar between females within the same family.
Predisposing fac
|
https://en.wikipedia.org/wiki/Nakajo%20syndrome
|
Nakajo syndrome, also called nodular erythema with digital changes, is a rare autosomal recessive congenital disorder first reported in 1939 by A. Nakajo in the offspring of consanguineous (blood relative) parents. The syndrome can be characterized by erythema (reddened skin), loss of body fat in the upper part of the body, and disproportionately large eyes, ears, nose, lips, and fingers.
Signs and symptoms
Signs of the disease begins during early childhood with individuals developing red, swollen lumps (nodular erythema) on the skin especially during colder weather, frequent fevers, and elongated fingers and toes with widened and rounded tips (clubbing).
Later in childhood, individuals with the disease develop join pain, and joint deformities (contractures) that limit movement predominantly in the hands, wrists, and elbows. They additional have weakness and wasting of muscle and fat loss that worsens over time. This leads to an extremely thin (emaciated) appearance in the face, chest, and arms.
Other symptoms of Nakajo-Nishimura syndrome are enlarged liver and spleen (hepatosplenomegaly), shortage of red blood cells (anemia), reduced levels of platelet blood cells (thrombocytopenia), and calcification in the basal ganglia area of the brain. There have been cases of intellectual disability in affected individuals.
Nakajo-Nishimura syndrome has overlapping symptoms with joint contractures, muscular atrophy, microcytic anemia, and panniculitis-induced lipodystrophy (JMP) syndrome and chronic atypical neutrophilic dermatosis with lipodystrophy and elevated temperature (CANDLE) syndrome. These conditions are all caused by mutations in the PSMB8 and characterized by skin abnormalities and lipodystrophy. Although these conditions are considered different diseases, some researchers believe they represent different forms of a single condition.
Genetics
Nakajo syndrome is inherited in an autosomal recessive manner. This means the defective gene responsible for the
|
https://en.wikipedia.org/wiki/LINA%20%28software%29
|
LINA was a piece of open-source software that enabled users to run applications compiled for Linux under Windows and Mac OS X with a native look and feel. Version 1.00 beta1 was released in October 2009 and was available at the Open Lina web site. However, that domain is now up for sale.
Release
The latest binary version, still a beta, was released on October 15, 2009.
As the tool was open sourced under the terms of the GNU General Public License v2, its source code had been made available since July 19, 2007.
See also
Compatibility layer
|
https://en.wikipedia.org/wiki/Crime%20prevention%20through%20environmental%20design
|
Crime prevention through environmental design (CPTED) is an agenda for manipulating the built environment to create safer neighborhoods.
It originated in the contiguous United States around 1960, when urban renewal strategies were felt to be destroying the social framework needed for self-policing. Architect Oscar Newman created the concept of "defensible space", developed further by criminologist C. Ray Jeffery, who coined the term CPTED. Growing interest in environmental criminology led to detailed study of specific topics such as natural surveillance, access control and territoriality. The "broken window" principle, that neglected zones invite crime, reinforced the need for good property maintenance to assert visible ownership of space. Appropriate environmental design can also increase the perceived likelihood of detection and apprehension, known to be the biggest single deterrent to crime. There has also been new interest in the interior design of prisons as an environment that significantly affects decisions to offend.
Wide-ranging recommendations to architects include the planting of trees and shrubs, the elimination of escape routes, the correct use of lighting, and the encouragement of pedestrian and bicycle traffic in streets. Tests show that the application of CPTED measures overwhelmingly reduces criminal activity.
History
CPTED was originally coined and formulated by criminologist C. Ray Jeffery. A more limited approach, termed defensible space, was developed concurrently by architect Oscar Newman. Both men built on the previous work of Elizabeth Wood, Jane Jacobs and Schlomo Angel. Jeffery's book, "Crime Prevention Through Environmental Design" came out in 1971, but his work was ignored throughout the 1970s. Newman's book, "Defensible Space: – Crime Prevention through Urban Design" came out in 1972. His principles were widely adopted but with mixed success. The defensible space approach was subsequently revised with additional built environment a
|
https://en.wikipedia.org/wiki/List%20of%20Solar%20System%20objects
|
The following is a list of Solar System objects by orbit, ordered by increasing distance from the Sun. Most named objects in this list have a diameter of 500 km or more.
The Sun, a spectral class G2V main-sequence star
The inner Solar System and the terrestrial planets
Mercury
Mercury-crossing minor planets
Venus
Venus-crossing minor planets
, Venus's quasi-satellite
Earth
Moon
Near-Earth asteroids (including 99942 Apophis)
Earth trojan ()
Earth-crosser asteroids
Earth's quasi-satellites
Mars
Deimos
Phobos
Mars trojans
Mars-crossing minor planets
Asteroids in the asteroid belt, between the orbits of Mars and Jupiter
Ceres, a dwarf planet
Pallas
Vesta
Hygiea
Asteroids number in the hundreds of thousands. For longer lists, see list of exceptional asteroids, list of asteroids, or list of Solar System objects by size.
Asteroid moons
A number of smaller groups distinct from the asteroid belt
The outer Solar System with the giant planets, their satellites, trojan asteroids and some minor planets
Jupiter
Rings of Jupiter
Complete list of Jupiter's natural satellites
Io
Europa
Ganymede
Callisto
Jupiter trojans
Jupiter-crossing minor planets
Saturn
Rings of Saturn
Complete list of Saturn's natural satellites
Mimas
Enceladus
Tethys (trojans: Telesto and Calypso)
Dione (trojans: Helene and Polydeuces)
Rhea
Rings of Rhea
Titan
Hyperion
Iapetus
Phoebe
Shepherd moons
Saturn-crossing minor planets
Uranus
Rings of Uranus
Complete list of Uranus's natural satellites
Miranda
Ariel
Umbriel
Titania
Oberon
Uranus trojan ()
Uranus-crossing minor planets
Neptune
Rings of Neptune
Complete list of Neptune's natural satellites
Proteus
Triton
Nereid
Neptune trojans
Neptune-crossing minor planets
Non-trojan minor planets
Centaurs
Damocloids
Trans-Neptunian objects (beyond the orbit of Neptune)
Kuiper-belt objects (KBOs)
Plutinos
Pluto, a dwarf planet
Complete list of Pluto's natural satellites
Charon
90482 Orcus
Vanth
Twotinos
Cubewanos (classical objects)
, a dwarf planet
Namaka
Hiʻiaka
, a
|
https://en.wikipedia.org/wiki/Hitsuzend%C5%8D
|
is believed by Zen Buddhists to be a method of achieving samādhi (Japanese: 三昧 sanmai), which is a unification with the highest reality. Hitsuzendo refers specifically to a school of Japanese Zen calligraphy to which the rating system of modern calligraphy (well-proportioned and pleasing to the eye) is foreign. Instead, the calligraphy of Hitsuzendo must breathe with the vitality of eternal experience.
Origins
Yokoyama Tenkei (1885–1966), inspired by the teachings of Yamaoka Tesshu (1836–1888), founded the Hitsuzendo line of thought as a "practice to uncover one's original self through the brush." This was then further developed by Omori Sogen Roshi as a way of Zen practice. Hitsuzendo is practised standing, using a large brush and ink, usually on newspaper roll. In this way, the whole body is used to guide the brush, in contrast to writing at a table.
History
Calligraphy was brought to Japan from China and Chinese masters such as Wang Xizhi 王羲之 (Jp: Ou Gishi; 303-361) have had a profound influence, especially on the karayō style which is still practiced today. The indigenous Japanese wayō tradition (和様書道, wayō-shodō) only appeared towards the end of the Heian era. However, the calligraphy of Zen scholars was often more concerned with spiritual qualities and individual expression and shunned technicalities which led to unique and distinctly personal styles. Japanese calligraphy has three basic styles: Kaisho 楷書, Gyōsho 行書, and Sōsho 草書, adopted from China.
Philosophical background
True creativity is not the product of consciousness but rather the "phenomenon of life itself." True creation must arise from mu-shin 無心, the state of "no-mind," in which thought, emotions, and expectations do not matter. Truly skillful Zen calligraphy is not the product of intense "practice;" rather, it is best achieved as the product of the "no-mind" state, a high level of spirituality, and a heart free of disturbances.
To write Zen calligraphic characters that convey truly deep me
|
https://en.wikipedia.org/wiki/Institute%20of%20Physics%20Michael%20Faraday%20Medal%20and%20Prize
|
The Michael Faraday Medal and Prize is a gold medal awarded annually by the Institute of Physics in experimental physics. The award is made "for outstanding and sustained contributions to experimental physics." The medal is accompanied by a prize of £1000 and a certificate.
Historical development
1914-1965 Guthrie Lecture initiated to remember Frederick Guthrie, founder of the Physical Society (which merged with the Institute of Physics in 1960).
1966-2007 Guthrie Medal and Prize (in response to changed conditions from when the lecture was first established). From 1992, it became one of the Institute's Premier Awards.
2008–present Michael Faraday Medal and Prize
Medalists and lecturers
Faraday medalists
2022 Nikolay Zheludev, "For international leadership, discoveries and in-depth studies of new phenomena and functionalities in photonic nanostructures and nanostructured matter."
2021 Bucker Dangor, "For outstanding contributions to experimental plasma physics, and in particular for his role in the development of the field of laser-plasma acceleration."
2020 Richard Ellis, "For over 35 years of pioneering contributions in faint-object astronomy, often with instruments he funded and constructed, which have opened up the early universe to direct observations."
2019 Roy Taylor, "For his extensive, internationally leading contributions to the development of spectrally diverse, ultrafast-laser sources and pioneering fundamental studies of nonlinear fibre optics that have translated to scientific and commercial application."
2018 Jennifer Thomas, "For her outstanding investigations into the physics of neutrino oscillations, in particular her leadership of the MINOS/MINOS+ long-baseline neutrino oscillation experiment."
2017 Jeremy Baumberg, "For his investigations of many ingenious nanostructures supporting novel and precisely engineered plasmonic phenomena relevant to single molecule and atom dynamics, Raman spectroscopies and metamaterials applications."
2
|
https://en.wikipedia.org/wiki/Alan%20B.%20Tayler
|
Alan Breach Tayler (1931–1995) was a British applied mathematician and pioneer of "industrial mathematics". He was a Founding Fellow of St Catherine's College, Oxford (1959-1995), the initiator of the Oxford Study Groups with Industry in 1968 (which developed into the European Study Groups with Industry), a driving force behind the foundation of the European Consortium for Mathematics in Industry (ECMI) in 1985 and President of ECMI (1989), and the first Director of the Oxford Centre for Industrial and Applied Mathematics (OCIAM) (1989–1994).
Personal life
Alan Tayler was born in Mitcham, Surrey on 5 September 1931 and died in Ducklington, Oxfordshire on 29 January 1995. In 1955 he married June Earp and they had four daughters, one of whom pre-deceased him.
Education
Alan Tayler was a scholar at King's College School, Wimbledon, London. Then we went up to Brasenose College, Oxford in 1951 where he gained a First in Mathematics and then, after a brief period in industry, a DPhil on "Problems in Compressible Flow" under the supervision of Professor George Temple in 1959.
Career
Alan Tayler was a distinguished applied mathematician who made important contributions in a wide range of areas (notably lubrication theory, surface gravity waves and viscous dissipation), but his key contribution to science was as the driving force behind the establishment of what is often called "mathematics-in-industry" or "industrial mathematics" (i.e. the application of mathematical approaches to the modeling and analysis of a wide range of real-world problems) as a recognized scientific discipline in its own right. His philosophy is perfectly exemplified by the Oxford (now European) Study Groups with Industry which he and Professor Leslie Fox created in 1968 and are still going strong today. His approach to mathematical modelling is described in his seminal monograph "Mathematical Models in Applied Mechanics" (Oxford University Press, 1986), and is commemorated by the annual Ala
|
https://en.wikipedia.org/wiki/Warrant%20canary
|
A warrant canary is a method by which a communications service provider aims to implicitly inform its users that the provider has been served with a government subpoena despite legal prohibitions on revealing the existence of the subpoena. The warrant canary typically informs users that there has been a court-issued subpoena as of a particular date. If the canary is not updated for the period specified by the host or if the warning is removed, users might assume the host has been served with such a subpoena. The intention is for a provider passively to warn users of the existence of a subpoena, albeit violating the spirit of a court order not to do so, while not violating the letter of the order.
Some subpoenas, such as those covered under 18 U.S.C. §2709(c) (enacted as part of the USA Patriot Act), provide criminal penalties for disclosing the existence of the subpoena to any third party, including the service provider's users.
National Security Letters (NSL) originated in the 1986 Electronic Communications Privacy Act and originally targeted those suspected of being agents of a foreign power. Targeting agents of a foreign power was revised in the Patriot Act in 2001 to allow NSLs to target those who may have information thought to be relevant to either counterintelligence activities or terrorists activities directed against the United States. The idea of using negative pronouncements to thwart the nondisclosure requirements of court orders and served secret warrants was first proposed by Steven Schear on the cypherpunks mailing list, mainly to uncover targeted individuals at ISPs. It was also suggested for and used by public libraries in 2002 in response to the USA Patriot Act, which could have forced librarians to disclose the circulation history of library patrons.
Etymology
The term is an allusion to the practice of coal miners bringing canaries into mines to use as an early-warning signal for toxic gases, primarily carbon monoxide and methane. The birds
|
https://en.wikipedia.org/wiki/Epostmailer
|
ePostMailer is a Microsoft Windows based email marketing application created in CodeGear Delphi by Khurram Zaveri of Spryka Incorporated. It was formerly known as Sprika LiteMail. The first version was released in 1997.
Description
The first version of LiteMail was created in Visual Basic 6. Subsequent versions have since been written in Object Pascal. LiteMail 3.1 was reviewed by Heinz Tschabitscher, the About.com guide to email. ePostMailer 4.1 has been reviewed by James Fagbire of FreeDownloadsCenter.com and Kathy Yakal of PC Magazine.
LiteMail was renamed as ePostMailer after conflicts with an application developed by CMF Perception
|
https://en.wikipedia.org/wiki/Delsarte%E2%80%93Goethals%20code
|
The Delsarte–Goethals code is a type of error-correcting code.
History
The concept was introduced by mathematicians Ph. Delsarte and J.-M. Goethals in their published paper.
A new proof of the properties of the Delsarte–Goethals code was published in 1970.
Function
The Delsarte–Goethals code DG(m,r) for even m ≥ 4 and 0 ≤ r ≤ m/2 − 1 is a binary, non-linear code of length , size and minimum distance
The code sits between the Kerdock code and the second-order Reed–Muller codes. More precisely, we have
When r = 0, we have DG(m,r) = K(m) and when r = m/2 − 1 we have DG(m,r) = RM(2,m).
For r = m/2 − 1 the Delsarte–Goethals code has strength 7 and is therefore an orthogonal array OA(.
|
https://en.wikipedia.org/wiki/Digital%20textbook
|
A digital textbook is a digital book or e-book intended to serve as the text for a class. Digital textbooks may also be known as e-textbooks or e-texts. Digital textbooks are a major component of technology-based education reform. They may serve as the texts for a traditional face-to-face class, an online course or degree, or massive open online courses (MOOCs). As with physical textbooks, digital textbooks can be either rented for a term or purchased for lifetime access. While accessible, digital textbooks can be downloaded, printed, or accessed online via a compatible device. To access content online, users must often use a 3rd party hosting provider or "digital bookshelf" through which digital textbooks can be served.
Implementation
There are many potential advantages to digital textbooks. They may offer lower costs, make it easier to monitor student progress, and are easier and cheaper to update when needed. Open source e-textbooks may offer the opportunity to create free, modifiable textbooks for basic subjects, or give individual teachers the opportunity to create e-texts for their own classrooms. They may offer better access to quality texts in the developing world. For this reason, many schools and colleges around the world have made the implementation of digital textbooks a central component of education policy. For example, in South Korea, reading materials in all public schools will be digitized by 2015. In the United States, the Federal Communications Commission aims for every student to be able to access e-texts by 2017.
However, the transition to e-textbooks is costly, complex and controversial. Students express a strong preference for printed materials in many surveys and across cultures. Many interconnected factors, from device access, to digital literacy, to teaching methods affect the implementation of digital textbooks in the classroom. Issues of overall value, book quality, privacy, and intellectual property have yet to be resolved. An early 20
|
https://en.wikipedia.org/wiki/Chung%20Kai-lai
|
Kai Lai Chung (traditional Chinese: 鍾開萊; simplified Chinese: 钟开莱; September 19, 1917 – June 2, 2009) was a Chinese-American mathematician known for his significant contributions to modern probability theory.
Biography
Chung was a native of Hangzhou, the capital city of Zhejiang Province. Chung entered Tsinghua University in 1936, and initially studied physics at its Department of Physics. In 1940, Chung graduated from the Department of Mathematics of the National Southwestern Associated University, where he later worked as a teaching assistant. During this period, he first studied number theory with Lo-Keng Hua and then probability theory with Pao-Lu Hsu.
In 1944, Chung was chosen to be one of the recipients of the 6th Boxer Indemnity Scholarship Program for study in the United States. He arrived at Princeton University in December 1945 and obtained his PhD in 1947. Chung's dissertation was titled “On the maximum partial sum of sequences of independent random variables” and was under the supervision of John Wilder Tukey and Harald Cramér.
In 1950s, Chung taught at the University of Chicago, Columbia University, UC-Berkeley, Cornell University and Syracuse University. He then transferred to Stanford University in 1961, where he made fundamental contributions to the study of Brownian motion and laid the framework for the general mathematical theory of Markov chains. Chung would later be appointed Professor Emeritus of Mathematics of the Department of Mathematics at Stanford.
Chung was regarded as one of the leading probabilists after World War II. He was an Invited Speaker at the ICM in 1958 in Edinburgh and in 1970 in Nice. Some of his most influential contributions have been in the form of his expositions in his textbooks on elementary probability and Markov chains. In addition, Chung also explored other branches of mathematics, such as probabilistic potential theory and gauge theorems for the Schrödinger equation.
Chung's visit to China in 1979 (together with
|
https://en.wikipedia.org/wiki/Completely%20regular%20semigroup
|
In mathematics, a completely regular semigroup is a semigroup in which every element is in some subgroup of the semigroup. The class of completely regular semigroups forms an important subclass of the class of regular semigroups, the class of inverse semigroups being another such subclass. Alfred H. Clifford was the first to publish a major paper on completely regular semigroups though he used the terminology "semigroups admitting relative inverses" to refer to such semigroups. The name "completely regular semigroup" stems from Lyapin's book on semigroups. In the Russian literature, completely regular semigroups are often called "Clifford semigroups".
In the English literature, the name "Clifford semigroup" is used synonymously to "inverse Clifford semigroup", and refers to a completely regular inverse semigroup.
In a completely regular semigroup, each Green H-class is a group and the semigroup is the union of these groups. Hence completely regular semigroups are also referred to as "unions of groups". Epigroups generalize this notion and their class includes all completely regular semigroups.
Examples
"While there is an abundance of natural examples of inverse semigroups, for completely regular semigroups the examples (beyond completely simple semigroups) are mostly artificially constructed: the minimum ideal of a
finite semigroup is completely simple, and the various relatively free completely regular semigroups are the other more or less natural examples."
See also
Special classes of semigroups
|
https://en.wikipedia.org/wiki/Superreal%20number
|
In abstract algebra, the superreal numbers are a class of extensions of the real numbers, introduced by H. Garth Dales and W. Hugh Woodin as a generalization of the hyperreal numbers and primarily of interest in non-standard analysis, model theory, and the study of Banach algebras. The field of superreals is itself a subfield of the surreal numbers.
Dales and Woodin's superreals are distinct from the super-real numbers of David O. Tall, which are lexicographically ordered fractions of formal power series over the reals.
Formal definition
Suppose X is a Tychonoff space and C(X) is the algebra of continuous real-valued functions on X. Suppose P is a prime ideal in C(X). Then the factor algebra A = C(X)/P is by definition an integral domain that is a real algebra and that can be seen to be totally ordered. The field of fractions F of A is a superreal field if F strictly contains the real numbers , so that F is not order isomorphic to .
If the prime ideal P is a maximal ideal, then F is a field of hyperreal numbers (Robinson's hyperreals being a very special case).
|
https://en.wikipedia.org/wiki/Milliken%27s%20tree%20theorem
|
In mathematics, Milliken's tree theorem in combinatorics is a partition theorem generalizing Ramsey's theorem to infinite trees, objects with more structure than sets.
Let T be a finitely splitting rooted tree of height ω, n a positive integer, and the collection of all strongly embedded subtrees of T of height n. In one of its simple forms, Milliken's tree theorem states that if then for some strongly embedded infinite subtree R of T, for some i ≤ r.
This immediately implies Ramsey's theorem; take the tree T to be a linear ordering on ω vertices.
Define where T ranges over finitely splitting rooted trees of height ω. Milliken's tree theorem says that not only is partition regular for each n < ω, but that the homogeneous subtree R guaranteed by the theorem is strongly embedded in T.
Strong embedding
Call T an α-tree if each branch of T has cardinality α. Define Succ(p, P)= , and to be the set of immediate successors of p in P. Suppose S is an α-tree and T is a β-tree, with 0 ≤ α ≤ β ≤ ω. S is strongly embedded in T if:
, and the partial order on S is induced from T,
if is nonmaximal in S and , then ,
there exists a strictly increasing function from to , such that
Intuitively, for S to be strongly embedded in T,
S must be a subset of T with the induced partial order
S must preserve the branching structure of T; i.e., if a nonmaximal node in S has n immediate successors in T, then it has n immediate successors in S
S preserves the level structure of T; all nodes on a common level of S must be on a common level in T.
|
https://en.wikipedia.org/wiki/Romanticism%20in%20evolution%20theory
|
Romanticism was an intellectual movement that arose in the late eighteenth century and continued through the nineteenth century. The movement had roots in the arts, literature, and science. Largely conceived as a reaction towards the extreme rationalism of the Enlightenment, it championed expressing emotions through aesthetic and emphasizing the transcendent allure of the natural world.
There has been significant work done by historians about how romanticism played a significant role in the development of modern theories of evolution. Most notable is the work done by Robert J. Richards, a professor at the University of Chicago. Richards, and others, have contributed significantly to the conversation about how Romanticism plays a significant role in evolution theory, especially regarding German Romanticism.
Alexander von Humboldt
Romantic contributions to Darwin's theory of evolution
Charles Darwin became acquainted with Humboldt's exploration and science during while studying at Cambridge. Here, Darwin was taken under the direction of John Stevens Henslow (1796–1861), Professor of Botany, who strongly encouraged Darwin to travel and study nature. Henslow also encouraged Darwin to read Alexander von Humboldt's manuscripts on exploring nature, and it was, at least in part, Humboldt's work that inspired Darwin's romantic notion of travel and discovery.
Prior to Darwin's departure on the H.M.S. Beagle, Henslow bestowed to Darwin the English translation of Humboldt's Relation historique du voyage aux regions equinoxiales du nouveau continent, which the translator (Helen Maria Williams) called Personal Narrative of Travels to the Equinoctial Regions of America. Darwin read Humboldt's Personal Narrative thoroughly while on his own journey of scientific exploration on board the Beagle.
Interactions through letters
Darwin and Humboldt spent their later years exchanging letters and manuscripts. After reading Darwin's writings from the Beagle, Humboldt wrote to Darwin:
|
https://en.wikipedia.org/wiki/Computer-based%20mathematics%20education
|
Computer-based mathematics education (CBME) is an approach to teaching mathematics that emphasizes the use of computers.
Computers in math education
Computers are used in education in a number of ways, such as interactive tutorials, hypermedia, simulations and educational games. Tutorials are types of software that present information, check learning by question/answer method, judge responses, and provide feedback. Educational games are more like simulations and are used from the elementary to college level. E learning systems can deliver math lessons and exercises and manage homework assignments.
See also
ALEKS, a computer-based education system that includes mathematics among its curricula
Computer-Based Math, a project aimed at using computers for computational tasks and spending more classroom time on applications
Mathletics (educational software), a popular K-12 mathematics learning program from 3P Learning
Mathspace, a similar program for students aged 7-18, founded in Australia in 2010
Sokikom, a team-based math learning game
|
https://en.wikipedia.org/wiki/Stable%20matching%20polytope
|
In mathematics, economics, and computer science, the stable matching polytope or stable marriage polytope is a convex polytope derived from the solutions to an instance of the stable matching problem.
Description
The stable matching polytope is the convex hull of the indicator vectors of the stable matchings of the given problem. It has a dimension for each pair of elements that can be matched, and a vertex for each stable matchings. For each vertex, the Cartesian coordinates are one for pairs that are matched in the corresponding matching, and zero for pairs that are not matched.
The stable matching polytope has a polynomial number of facets. These include the conventional inequalities describing matchings without the requirement of stability (each coordinate must be between 0 and 1, and for each element to be matched the sum of coordinates for the pairs involving that element must be exactly one), together with inequalities constraining the resulting matching to be stable (for each potential matched pair elements, the sum of coordinates for matches that are at least as good for one of the two elements must be at least one). The points satisfying all of these constraints can be thought of as the fractional solutions of a linear programming relaxation of the stable matching problem.
Integrality
It is a theorem of that the polytope described by the facet constraints listed above has only the vertices described above. In particular it is an integral polytope. This can be seen as an analogue of the theorem of Garrett Birkhoff that an analogous polytope, the Birkhoff polytope describing the set of all fractional matchings between two sets, is integral.
An equivalent way of stating the same theorem is that every fractional matching can be expressed as a convex combination of integral matchings. prove this by constructing a probability distribution on integral matchings whose expected value can be set equal to any given fractional matching. To do so, they perform th
|
https://en.wikipedia.org/wiki/Amphibia%20%28taxon%29
|
There are several taxons named amphibia. These include:
Amphibia (class), classis Amphibia, the amphibians
Species
Species with the specific epithet 'amphibia'
Rorippa amphibia (R. amphibia), a plant
Persicaria amphibia (P. amphibia), a plant
Neritina amphibia (N. amphibia), a snail
Aranea amphibia (A. amphibia), a spider
See also
Amphibian (disambiguation)
Amphibia (disambiguation)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.