source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/IFFO1
Intermediate filament family orphan 1 is a protein that in humans is encoded by the IFFO1 gene. IFFO1 has uncharacterized function and a weight of 61.98 kDa. IFFO1 proteins play an important role in the cytoskeleton and the nuclear envelope of most eukaryotic cell types. Gene IFFO in human is located on the minus strand at Chromosome 12p13.3. The protein contains 17,709 nucleotide bases that encodes for 570 amino acids. The basal isoelectric point is 4.83. IFFO1 contains a highly conserved filament domain that spans 299 amino acids from amino residue 230 to 529. This region has been identified as pfam00038 conserved protein domain family. Due to alternative splicing, there are 7 isoforms of IFFO1 in humans with 10 typical coding exons. Aliases IFFO1 is also called Intermediate Filament Family Orphan Isoform X1, Intermediate Filament Family Orphan, HOM-TES-103, Intermediate Filament-Like MGC: 2625, and Tumor Antigen HOM-TES-10. Homology Orthologs The gene is found to be highly conserved. The most distant orthologs are found in fish and sharks (cartilaginous fishes) such as Callorhinchus milii. Very low percentages of sequence coverage and identity of the gene's orthologs in fungi and invertebrates suggest that the gene was lost in those organisms. Therefore, it is highly probable that IFFO1 originated in vertebrates. Paralogs One paralog named IFFO2 has been found in humans. The paralog is found to have 99% similarity and 99% coverage when compared to IFFO1. The paralogous sequence is highly conserved, all the way back to fish and amphibians. Evolution Multiple sequence alignments indicated that the Proline-Rich region from amino residues 39 to 61 near the 5' end of the sequence is highly conserved in both close and distant orthologs. In addition, the filament region near the 3' end of the sequence is also highly conserved. Of the 42 conserved amino acid residues found within the IFFO1 sequence, 33 of them are found in the filament region. When compa
https://en.wikipedia.org/wiki/Radio%20access%20technology
A radio access technology (RAT) is the underlying physical connection method for a radio communication network. Many modern mobile phones support several RATs in one device such as Bluetooth, Wi-Fi, and GSM, UMTS, LTE or 5G NR. The term RAT was traditionally used in mobile communication network interoperability. More recently, the term RAT is used in discussions of heterogeneous wireless networks. The term is used when a user device selects between the type of RAT being used to connect to the Internet. This is often performed similar to access point selection in IEEE 802.11 (Wi-Fi) based networks. Inter-RAT (IRAT) handover A mobile terminal, while connected using a RAT, performs neighbour cell measurements and sends measurement report to the network. Based on this measurement report provided by the mobile terminal, the network can initiate handover from one RAT to another, e.g. from WCDMA to GSM or vice versa. Once the handover with the new RAT is completed, the channels used by the previous RAT are released. See also Radio access network (RAN)
https://en.wikipedia.org/wiki/Livoniana
Livoniana is a genus of prehistoric lobe-finned fish which lived during the Devonian period (Givetian - Frasnian stages, about 374 - 391 million years ago). This species is a transitional form between fish and the earliest tetrapods, like Tiktaalik, Ichthyostega and Acanthostega. Before Livoniana there was Elginerpeton and Obruchevichthys. Four legs developed in water, not on land, to better escape waterliving predatory creatures like Hyneria. There were very lush forests, and particularly swamps, where four limbs became very useful to avoid predators.
https://en.wikipedia.org/wiki/Incas%20%28parakeet%29
Incas (before 1885 – February 21, 1918) was a male Carolina parakeet and the last member of his species known with certainty. Though probable sightings of wild Carolina parakeets continued into the 1930s, and the American Ornithologists Union accepted a sighting in 1920, no specimens were collected after 1904 and he is often cited as the last individual in existence. Incas died in the Cincinnati Zoo in 1918, in the same enclosure as Martha, the last passenger pigeon, who died in 1914. He died within one year of his mate, Lady Jane. Background The Carolina parakeet was the only parrot species historically native to eastern North America and was documented to be plentiful in early accounts. Over the centuries following European colonization of the Americas a combination of factors including collection for hat feathers, the pet trade, and eradication by farmers due to their reputation as crop predators, led the Carolina parakeet to become increasingly rare by the mid 19th century. As numbers declined, conservationists and bird interest groups became increasingly concerned about the species's trajectory. By 1900, multiple breeding programs had been established for the Carolina parakeet with limited success but there was allegedly no coordination between zoos with captive birds. As the number of individual wild birds dwindled, the only certain locations of the Carolina parakeet were in captivity. Life Incas was brought to the Cincinnati Zoo in 1885 in an attempt to establish a captive breeding population there. He was purchased along with 15 other birds for a sum of $40 (equivalent to $1200 in 2022). Around that time, captive birds were often sold to Europe and the majority of Carolina parakeets in the pet trade were sourced in Florida with dozens at a time captured into the 1890s. At the zoo, Incas was housed in an aviary in the style of a Japanese pagoda that was built in 1875. Incas was eventually paired with a female bird named Lady Jane who arrived in the same
https://en.wikipedia.org/wiki/Terminus%20%281986%20video%20game%29
Terminus, also known as Terminus: The Prison Planet or Terminus: Prison Planet, is a platform game by Mastertronic released in 1986 for the ZX Spectrum, MSX, and Amstrad CPC. The game is set inside a futuristic prison consisting of 512 screens. The purpose is to release Brain, the leader of a teenage gang called The Wanglers. Gameplay The player controls one of four characters: Mobod and Xann who move by flying, Spex who moves around by bouncing, and Magno who uses "reverse gravity" to cling to roofs. The player can change characters by using one of the transports hidden around the prison and must unlock sections of the prison by using teleports. The player must also avoid traps which include lava pools, needle beams, creatures, compressor rooms (activated by touching wall sensors) as well as the numerous guards. Energy can be restored by using recharge units located around the prison complex.
https://en.wikipedia.org/wiki/Jasmati
Jasmati Rice is a conventionally bred, inbred line (variety) of long grain of rice whose name is derived from jasmine rice and basmati. Jasmati is neither "genetically engineered" (as in transgenic) nor is it an F1 hybrid. It is said to possess the traits of both grains – namely the softness (when cooked) of basmati, and the nutty aroma of jasmine – the latter in muted tones so as to be more subtle. It appears to have been first created in the United States. To what degree Jasmati is derived from its etymological parent grains is unknown and disputed. The patent for Jasmati, registered in 1993 by the Texas-based corporation, RiceTec, had legal implications for Thai and Indian farmers who rely heavily on the exports of the parent crops, and caused controversy. Presently the debate seems to have cooled down. As the degree to which Jasmati draws from Jasmine cannot be ascertained, the informed consumer should be aware that it is therefore a different grain and may or may not be a complete substitute for either Jasmine or basmati. This suggests that Jasmati may have its own unique merits as a cooking ingredient.
https://en.wikipedia.org/wiki/Wesley%20Updike
Wesley Russell Updike (1900-1972) was an American educator, soldier, and father of author John Updike, husband of writer Linda Grace Hoyer Updike, and grandfather of David Updike. Wesley Updike served as a prominent model for many main characters his son's works, including as the central character in The Centaur (1963), which won the National Book Award for Fiction, and Updike's family history is broadly paralleled in In the Beauty of the Lilies (1996). Early life and education Wesley Russell Updike was born on February 22, 1900, in Trenton, New Jersey, to Virginia (Blackwood) Updike, a Missouri native, and Rev. Hartley Titus Updike, a Princeton educated Presbyterian minister, who suffered employment difficulties due to a throat ailment. Updike had an older brother, Archibald. and sister, Mary. As a child Updike had to wear braces due to malnutrition-related developmental issues. In high school he suffered an injury while hauling newspapers and had to leave school, but a donor allowed him to return and attend St. Stephen's Episcopal Boarding School (later known as Bard College). During World War I Wesley Updike served as a private in the Student Army Training Corps from October 30, 1918, until December 13, 1918. Wesley Updike enrolled at Ursinus College in Pennsylvania in 1919 on a football scholarship and was a chemical-biological major. Marriage, Birth of John, and Career in Shillington Updike met his future wife, Linda Hoyer, on his first day of college, and married her in 1925. After graduation Updike worked various jobs including teaching at schools in Florida and Delaware, superintending a small oil and gas field in Ohio, and working as a hotel desk clerk in Reading, Pennsylvania. From 1927 to 1932 Updike worked as a lineman for AT&T. Updike's only child, John, was born in 1932. After being laid off during the Great Depression in 1932, Wesley Updike became certified as a teacher after studying at Albright College, and then in 1934 he obtained a job as a ma
https://en.wikipedia.org/wiki/Loop%20gain
In electronics and control system theory, loop gain is the sum of the gain, expressed as a ratio or in decibels, around a feedback loop. Feedback loops are widely used in electronics in amplifiers and oscillators, and more generally in both electronic and nonelectronic industrial control systems to control industrial plant and equipment. The concept is also used in biology. In a feedback loop, the output of a device, process or plant is sampled and applied to alter the input, to better control the output. The loop gain, along with the related concept of loop phase shift, determines the behavior of the device, and particularly whether the output is stable, or unstable, which can result in oscillation. The importance of loop gain as a parameter for characterizing electronic feedback amplifiers was first recognized by Heinrich Barkhausen in 1921, and was developed further by Hendrik Wade Bode and Harry Nyquist at Bell Labs in the 1930s. A block diagram of an electronic amplifier with negative feedback is shown at right. The input signal is applied to the amplifier with open-loop gain A and amplified. The output of the amplifier is applied to a feedback network with gain β, and subtracted from the input to the amplifier. The loop gain is calculated by imagining the feedback loop is broken at some point, and calculating the net gain if a signal is applied. In the diagram shown, the loop gain is the product of the gains of the amplifier and the feedback network, −Aβ. The minus sign is because the feedback signal is subtracted from the input. The gains A and β, and therefore the loop gain, generally vary with the frequency of the input signal, and so are usually expressed as functions of the angular frequency ω in radians per second. It is often displayed as a graph with the horizontal axis frequency ω and the vertical axis gain. In amplifiers, the loop gain is the difference between the open-loop gain curve and the closed-loop gain curve (actually, the
https://en.wikipedia.org/wiki/A.E.%20%28video%20game%29
A.E. (sometimes shown unpunctuated as AE) is a fixed shooter written by Jun Wada and Makoto Horai for the Apple II and Atari 8-bit family and published by Broderbund in 1982. Versions for the VIC-20 (1983) and MSX (1984) followed. Unlike most earlier shooters which have a solid color or starfield as a background, the action in A.E. takes place in front of science fiction scenes. Attacking creatures emerge from points in the image, often appearing to come from behind objects. Combined with a slight scaling as they advance, there is the impression of depth. According to the back of the box, "A.E. is the Japanese word for 'ray' as in Manta Ray or Sting Ray", robotic versions of which are enemies in the game. Gameplay The player's ship can be moved left and right along the bottom of the screen. The fire button launches a missile upward which detonates when the button is released. Development Broderbund partnered with Japanese developer Programmers-3 for several games, and A.E. was the first of these. According to Broderbund co-founder Doug Carlston, the Atari 8-bit version of A.E. was the first Atari computer game written in Japan. Reception Arnie Katz wrote for Arcade Express: "The swirling flightpaths of the attackers as they zoom hither and yon around the eight playscreens is the principal feature that distinguishes 'A.E.' from the usual run of invasion games." He pointed out that the images the game is played over have little bearing on gameplay. Citing a satisfying difficulty balance, Katz concluded with a score of 8/10. Computer Games magazine gave the Atari and Apple versions an "A" in its "1985 Software Buyers Guide." Writing for Videogaming and Computer Gaming Illustrated, Susan Levitan concluded: "A.E. is a highly recommended, very challenging and rewarding game. The 3-D graphics are stunning and the serpentine movement of the A.E. is mesmerizing."
https://en.wikipedia.org/wiki/Combinatorial%20Geometry%20in%20the%20Plane
Combinatorial Geometry in the Plane is a book in discrete geometry. It was translated from a German-language book, Kombinatorische Geometrie in der Ebene, which its authors Hugo Hadwiger and Hans Debrunner published through the University of Geneva in 1960, expanding a 1955 survey paper that Hadwiger had published in L'Enseignement mathématique. Victor Klee translated it into English, and added a chapter of new material. It was published in 1964 by Holt, Rinehart and Winston, and republished in 1966 by Dover Publications. A Russian-language edition, , translated by I. M. Jaglom and including a summary of the new material by Klee, was published by Nauka in 1965. The Basic Library List Committee of the Mathematical Association of America has recommended its inclusion in undergraduate mathematics libraries. Topics The first half of the book provides the statements of nearly 100 propositions in the discrete geometry of the Euclidean plane, and the second half sketches their proofs. Klee's added chapter, lying between the two halves, provides another 10 propositions, including some generalizations to higher dimensions, and the book concludes with a detailed bibliography of its topics. Results in discrete geometry covered by this book include: Carathéodory's theorem that every point in the convex hull of a planar set belongs to a triangle determined by three points of the set, and Steinitz's theorem that every point interior to the convex hull is interior to the convex hull of four points of the set. The Erdős–Anning theorem, that if an infinite set of points in the plane has an integer distance between every two points, then the given points must all lie on a single line. Helly's theorem, that if a family of compact convex sets has a non-empty intersection for every triple of sets, then the whole family has a non-empty intersection. A Helly-like property of visibility related to the art gallery theorem: if every three points of a polygon are visible from some common po
https://en.wikipedia.org/wiki/Bonding%20in%20solids
Solids can be classified according to the nature of the bonding between their atomic or molecular components. The traditional classification distinguishes four kinds of bonding: Covalent bonding, which forms network covalent solids (sometimes called simply "covalent solids") Ionic bonding, which forms ionic solids Metallic bonding, which forms metallic solids Weak inter molecular bonding, which forms molecular solids (sometimes anomalously called "covalent solids") Typical members of these classes have distinctive electron distributions, thermodynamic, electronic, and mechanical properties. In particular, the binding energies of these interactions vary widely. Bonding in solids can be of mixed or intermediate kinds, however, hence not all solids have the typical properties of a particular class, and some can be described as intermediate forms. Paper Basic classes of solids Network covalent solids A network covalent solid consists of atoms held together by a network of covalent bonds (pairs of electrons shared between atoms of similar electronegativity), and hence can be regarded as a single, large molecule. The classic example is diamond; other examples include silicon, quartz and graphite. Properties High strength (with the exception of graphite) High elastic modulus High melting point Brittle Their strength, stiffness, and high melting points are consequences of the strength and stiffness of the covalent bonds that hold them together. They are also characteristically brittle because the directional nature of covalent bonds strongly resists the shearing motions associated with plastic flow, and are, in effect, broken when shear occurs. This property results in brittleness for reasons studied in the field of fracture mechanics. Network covalent solids vary from insulating to semiconducting in their behavior, depending on the band gap of the material. Ionic solids A standard ionic solid consists of atoms held together by ionic bonds, that is by
https://en.wikipedia.org/wiki/Silicon%E2%80%93oxygen%20bond
A silicon–oxygen bond ( bond) is a chemical bond between silicon and oxygen atoms that can be found in many inorganic and organic compounds. In a silicon–oxygen bond, electrons are shared unequally between the two atoms, with oxygen taking the larger share due to its greater electronegativity. This polarisation means Si–O bonds show characteristics of both covalent and ionic bonds. Compounds containing silicon–oxygen bonds include materials of major geological and industrial significance such as silica, silicate minerals and silicone polymers like polydimethylsiloxane. Bond polarity, length and strength On the Pauling electronegativity scale, silicon has an electronegativity of 1.90 and oxygen 3.44. The electronegativity difference between the elements is therefore 1.54. Because of this moderately large difference in electronegativities, the bond is polar but not fully ionic. Carbon has an electronegativity of 2.55 so carbon–oxygen bonds have an electronegativity difference of 0.89 and are less polar than silicon–oxygen bonds. Silicon–oxygen bonds are therefore covalent and polar, with a partial positive charge on silicon and a partial negative charge on oxygen: Siδ+—Oδ−. Silicon–oxygen single bonds are longer (1.6 vs 1.4 Å) but stronger (452 vs. about 360 kJ mol−1) than carbon–oxygen single bonds. However, silicon–oxygen double bonds are weaker than carbon–oxygen double bonds (590 vs. 715 kJ mol−1) due to a better overlap of p orbitals forming a stronger pi bond in the latter. This is an example of the double bond rule. For these reasons, carbon dioxide is a molecular gas containing two C=O double bonds per carbon atom whereas silicon dioxide is a polymeric solid containing four Si–O single bonds per silicon atom; molecular SiO2 containing two Si=O double bonds would polymerise. Other compounds containing Si=O double bonds are normally very reactive and unstable with respect to polymerisation or oligomerization. Silanones oligomerise to siloxanes unless they ar
https://en.wikipedia.org/wiki/Synchronizer%20%28algorithm%29
In computer science, a synchronizer is an algorithm that can be used to run a synchronous algorithm on top of an asynchronous processor network, so enabling the asynchronous system to run as a synchronous network. The concept was originally proposed in (Awerbuch, 1985) along with three synchronizer algorithms named alpha, beta and gamma which provided different tradeoffs in terms of time and message complexity. Essentially, they are a solution to the problem of asynchronous algorithms (which operate in a network with no global clock) being harder to design and often less efficient than the equivalent synchronous algorithms. By using a synchronizer, algorithm designers can deal with the simplified "ideal network" and then later mechanically produce a version that operates in more realistic asynchronous cases. Available synchronizer algorithms The three algorithms that Awerbuch provided in his original paper are as follows: Alpha synchronizer: This has low time complexity but high message complexity. Beta synchronizer: This has high time complexity but low message complexity. Gamma synchronizer: This provides a reasonable tradeoff between alpha and beta by providing fairly low time and message complexity. Since the original paper, other synchronizer algorithms have been proposed in the literature.
https://en.wikipedia.org/wiki/Double%20grave%20accent
The double grave accent () is a diacritic used in scholarly discussions of the Serbo-Croatian and sometimes Slovene languages. It is also used in the International Phonetic Alphabet. In Serbo-Croatian and Slovenian, double grave accent is used to indicate a short falling tone, though in discussion of Slovenian, a single grave accent is also often used for this purpose. The double grave accent is found in both Latin and Cyrillic; however, it is not used in the everyday orthography of any language, only in discussions of phonology. In the International Phonetic Alphabet, the double grave accent is used to indicate extra-low tone. The letters a e i o r u and their Cyrillic equivalents а е и о р у can all be found with the double grave accent. Unicode provides precomposed characters for the uppercase and the lowercase Latin letters but not the Cyrillic letters. The Cyrillic letters can be formed using the combining character for the double grave, which is located at U+030F. The combining character can also be used with IPA vowel symbols, if necessary. Letters with double grave Unicode See also Grave accent Double acute accent Inverted breve Izhitsa, a Cyrillic letter with a form that visually resembles a double grave accent IPA
https://en.wikipedia.org/wiki/Swedish%20Brewery%20Industry%20Workers%27%20Union
The Swedish Brewery Industry Workers' Union (, SBiaf) was a trade union representing workers in breweries in Sweden. The union was founded in Stockholm on 22 January 1899, with 1,121 members. In 1905, it affiliated to the Swedish Trade Union Confederation. In 1909, the Swedish Cork Workers' Union merged into SBiaf, and membership peaked in 1940 at 7,539. It then declined, falling to 5,533 by 1964. The following year, it merged into the Swedish Food Workers' Union.
https://en.wikipedia.org/wiki/Restoring%20force
In physics, the restoring force is a force that acts to bring a body to its equilibrium position. The restoring force is a function only of position of the mass or particle, and it is always directed back toward the equilibrium position of the system. The restoring force is often referred to in simple harmonic motion. The force responsible for restoring original size and shape is called the restoring force. An example is the action of a spring. An idealized spring exerts a force proportional to the amount of deformation of the spring from its equilibrium length, exerted in a direction oppose the deformation. Pulling the spring to a greater length causes it to exert a force that brings the spring back toward its equilibrium length. The amount of force can be determined by multiplying the spring constant, characteristic of the spring, by the amount of stretch, also known as Hooke's Law. Another example is of a pendulum. When a pendulum is not swinging all the forces acting on it are in equilibrium. The force due to gravity and the mass of the object at the end of the pendulum is equal to the tension in the string holding the object up. When a pendulum is put in motion, the place of equilibrium is at the bottom of the swing, the location where the pendulum rests. When the pendulum is at the top of its swing the force returning the pendulum to this midpoint is gravity. As a result, gravity may be seen as a restoring force. See also Response amplitude operator
https://en.wikipedia.org/wiki/Bovine%20papillomavirus
Bovine papillomaviruses (BPV) are a paraphyletic group of DNA viruses of the subfamily Firstpapillomavirinae of Papillomaviridae that are common in cattle. All BPVs have a circular double-stranded DNA genome. Infection causes warts (papillomas and fibropapillomas) of the skin and alimentary tract, and more rarely cancers of the alimentary tract and urinary bladder. They are also thought to cause the skin tumour equine sarcoid in horses and donkeys. BPVs have been used as a model for studying papillomavirus molecular biology and for dissecting the mechanisms by which this group of viruses cause cancer. Structure and genetic organisation Like other papillomaviruses, BPVs are small non-enveloped viruses with an icosahedral capsid around 50–60 nm in diameter. The capsid is formed of the L1 and L2 structural proteins, with the L1 C-terminus exposed. All BPVs have a circular double-stranded DNA genome of 7.3–8.0 kb. The genetic organisation of those BPVs which have been sequenced is broadly similar to other papillomaviruses. The open reading frames (ORFs) are all located on one strand, and are divided into early and late regions. The early region encodes nonstructural proteins E1 to E7. There are three viral oncoproteins, E5, E6 and E7; BPVs of the Xipapillomavirus group lack E6. The late region encodes structural proteins L1 and L2. There is also a non-coding long control region (LCR). Types Six types of BPV have been characterised, BPV-1 to BPV-6, which are divided into three broad subgroups. Deltapapillomavirus or fibropapillomaviruses (formerly known as subgroup A), including types 1 and 2, have a genome of around 7.9 kb. Similar papillomaviruses of ungulates (e.g. deer papillomavirus, European elk papillomavirus, ovine papillomavirus 1,2) are also found in this group. Like all members of the papillomavirus class, these viruses infect only keratinocytes (epithelial cells); however, unlike other papillomaviruses, they cause proliferation of both keratinocytes and
https://en.wikipedia.org/wiki/German%20Operations%20Research%20Society
The Gesellschaft für Operations Research (GOR) is the professional non-profit society for the scientific field of Operations Research in Germany. The society is a member of the European umbrella organization, the Association of European Operational Research Societies (EURO), and of the International Federation of Operational Research Societies (IFORS). History The history of the present-day society began in 1956 with the foundation of the Working Group Operations Research (Arbeitskreis Operations Research, AKOR) which was fairly practically orientated. In 1961, the German Society for Operations Research (Deutsche Gesellschaft für Unternehmensforschung, DGU) with a rather academic background was founded. Both societies merged in 1972 and became the German Operations Research Society (Deutsche Gesellschaft für Operations Research, DGOR). By the end of the 1970s some members with a theoretical focus did not find anymore their interests enough represented by the rather practical DGOR. Hence, they founded the Society for Mathematics, Economics and Operations Research (Gesellschaft für Mathematik, Ökonomie und Operations Research, GMÖOR) in 1979. From 1995 on, they again realized common conferences. On January 1, 1998, both societies joined for today's Society for Operations Research (Gesellschaft für Operations Research, GOR). Governance The society's affairs are managed by an executive board of four members, including the president. Its affairs are overseen by an advisory board consisting of fifteen members. Both institutions are elected every second year. For administrative work the society maintains a secretary. Membership Currently (2014), the society has about 1200 members including both individuals and institutions. Publications Beside their member journal "OR News" the German OR Society publishes with Springer two scientific journals: Operations Research Spectrum (OR Spectrum) and Mathematical Methods of Operations Research (MMOR). Additionally, a monthl
https://en.wikipedia.org/wiki/Michael%20Aizenman
Michael Aizenman (born 28 August 1945 in Nizhny Tagil, Russia) is an American-Israeli mathematician and a physicist at Princeton University, working in the fields of mathematical physics, statistical mechanics, functional analysis and probability theory. The highlights of his work include: the triviality of a class of scalar quantum field theories in more than four dimensions; a description of the phase transition in the Ising model in three and more dimensions; the sharpness of the phase transition in percolation theory; a method for the study of spectral and dynamical localization for random Schrödinger operators; and insights concerning conformal invariance in two-dimensional percolation. Biography Aizenman is a Jewish American - Israeli who was born in Russia. He was an undergraduate at the Hebrew University of Jerusalem. He was awarded his PhD in 1975 at Yeshiva University (Belfer Graduate School of Science), New York City, with advisor Joel Lebowitz. After postdoctoral appointments at the Courant Institute of Mathematical Sciences of New York University (1974–75), and Princeton University (1975–1977), with Elliott H. Lieb, he was appointed assistant professor at Princeton. In 1982 he moved to Rutgers University as associate professor and then full professor. In 1987 he moved to the Courant Institute and in 1990 returned to Princeton as professor of mathematics and physics. He was several times a visiting scholar at the Institute for Advanced Study, in 1984-85, 1991–92, and 1997–98, and is a regular visiting scholar at the Weizmann Institute of Science. Honors and awards Norbert Wiener Prize (1990) of the Amer. Math. Soc. and SIAM for "his outstanding contribution of original and non-perturbative mathematical methods in statistical mechanics by means of which he was able to solve several long open important problems concerning critical phenomena, phase transitions, and quantum field theory." Brouwer Medal (2002) of the Dutch Math. Soc. and the Royal Dutch
https://en.wikipedia.org/wiki/Phrap
Phrap is a widely used program for DNA sequence assembly. It is part of the Phred-Phrap-Consed package. History Phrap was originally developed by Prof. Phil Green for the assembly of cosmids in large-scale cosmid shotgun sequencing within the Human Genome Project. Phrap has been widely used for many different sequence assembly projects, including bacterial genome assemblies and EST assemblies. Phrap was written as a command line program for easy integration into automated data workflows in genome sequencing centers. For users who want to use Phrap from a graphical interface, the commercial programs MacVector (for Mac OS X only) and CodonCode Aligner (for Mac OS X and Microsoft Windows) are available. Methods A detailed (albeit partially outdated) description of the Phrap algorithms can be found in the Phrap documentation. A recurring thread within the Phrap algorithms is the use of Phred quality scores. Phrap used quality scores to mitigate a problem that other assembly programs had struggled with at the beginning of the Human Genome Project: correctly assembling frequent imperfect repeats, in particular Alu sequences. Phrap uses quality scores to tell if any observed differences in repeated regions are likely to be due to random ambiguities in the sequencing process, or more likely to be due to the sequences being from different copies of the Alu repeat. Typically, Phrap had no problems differentiating between the different Alu copies in a cosmid, and to correctly assemble the cosmids (or, later, BACs). The logic is simple: a base call with a high probability of being correct should never be aligned with another high quality but different base. However, Phrap does not rule out such alignments entirely, and the cross_match alignment gap and alignment penalties used while looking for local alignments are not always optimal for typical sequencing errors and a search for overlapping (contiguous) sequences. (Affine gaps are helpful for homology searches but not u
https://en.wikipedia.org/wiki/Patchy%20particles
Patchy particles are micron- or nanoscale colloidal particles that are anisotropically patterned, either by modification of the particle surface chemistry ("enthalpic patches"), through particle shape ("entropic patches"), or both. The particles have a repulsive core and highly interactive surfaces that allow for this assembly. The placement of these patches on the surface of a particle promotes bonding with patches on other particles. Patchy particles are used as a shorthand for modelling anisotropic colloids, proteins and water and for designing approaches to nanoparticle synthesis. Patchy particles range in valency from two (Janus particles) or higher. Patchy particles of valency three or more experience liquid-liquid phase separation. Some phase diagrams of patchy particles do not follow the law of rectilinear diameters. Assembly of patchy particles Simulations The interaction between patchy particles can be described by a combination of two discontinuous potentials. A hard sphere potential accounting for the repulsion between the cores of the particles and an attractive square potential for the attraction between the patches. With the interaction potential in hand one can use different methods to compute thermodynamic properties. Molecular dynamics Using a continuous representation of the discontinuous potential described above enables the simulation of patchy particles using molecular dynamics. Monte Carlo One simulation done involves a Monte Carlo method, where the best “move” ensures equilibrium in the particle. One type of move is rototranslation. This is carried out by choosing a random particle, random angular and radial displacements, and a random axis of rotation. Rotational degrees of freedom need to be determined prior to the simulation. The particle is then rotated/moved according to these values. Also, the integration time step needs to be controlled because it will affect the resulting shape/size of the particle. Another simulation done is
https://en.wikipedia.org/wiki/Animal%20attack
Animal attacks are violent attacks caused by non-human animals against humans, one of the most common being bites. These attacks are a cause of human injuries and fatalities worldwide. According to the 2012 U.S. Pet Ownership & Demographics Sourcebook, 56% of United States citizens owned a pet. In the United States in 1994, approximately 4.7 million people were bitten by dogs. The frequency of animal attacks varies with geographical location, as well as hormonal secretion. Gonad glands found on the anterior side of the pituitary gland secrete androgens and estrogens hormones. Animals with high levels of these hormones, which depending on the species can be a seasonal occurrence, such as during rutting season, tend to be more aggressive, which leads to a higher frequency of attacks not only to humans but among themselves. In the United States, a person is more likely to be killed by a domesticated dog than they are to die from being hit by lightning according to the National Safety Council. Animal attacks have been identified as a major public health problem. In 1997, it was estimated that up to 2 million animal bites occur each year in the United States. Injuries caused by animal attacks result in thousands of fatalities worldwide every year. "Unprovoked attacks occur when the animal approaches and attacks a person(s) who is the principal attractant, for example, predation on humans ..." All causes of death are reported to the Centers for Disease Control and Prevention each year. Medical injury codes are used to identify specific cases. The World Health Organization uses identical coding, though it is unclear whether all countries keep track of animal-related fatalities. Though animals, excluding some tigers, do not regularly hunt humans, there is concern that these incidents are "bad for many species 'public image'." Epidemiology and injuries Animal bites are the most common form of injury from animal attacks. The U.S. estimated annual count of animal bites is
https://en.wikipedia.org/wiki/Great%20North%20Bog
The Great North Bog is a large restoration initiative covering over 90% of the upland peatland in the North of England. It is a £200m project and aims to restore nearly 7,000 square kilometres of upland over 20 years. It is a partnership between the North Pennines Area of Outstanding Natural Beauty Partnership, Yorkshire Peat Partnership and the Moors for the Future Partnership. The area covers five national parks — the Peak District, Yorkshire Dales, North York Moors, Lake District and Northumberland. Ecosystem recovery Some of the peat is 8000 years old, and it is thought that about half the peatland needs restoring, by work in the winter. Much of these blanket bogs had been drained to graze sheep, this draining was subsidized in the 1950s and 1960s, and raise grouse for shooting. The land is currently managed by sheep farmers and landowners, and is thought to be losing peat depth at 2.5 cm a year while regrowing at 1 cm per year. Flood control Peat is now being washed away down deep channels and during storms the town of Otley is often flooded via the River Wharfe. Studies indicate that restoring part of the peatland with stone, wood or coir dams greatly slowed peak water flow. Carbon capture The peatlands currently store 400 million tonnes of carbon. The project say that damaged peat in the area releases 3.7 million tonnes of carbon annually, about 1% of UK greenhouse gas emissions. The programme includes a restoration and conservation plan which will make a significant contribution to the UK’s carbon sequestration targets.
https://en.wikipedia.org/wiki/Knowledge%20Interchange%20Format
Knowledge Interchange Format (KIF) is a computer language designed to enable systems to share and re-use information from knowledge-based systems. KIF is similar to frame languages such as KL-One and LOOM but unlike such language its primary role is not intended as a framework for the expression or use of knowledge but rather for the interchange of knowledge between systems. The designers of KIF likened it to PostScript. PostScript was not designed primarily as a language to store and manipulate documents but rather as an interchange format for systems and devices to share documents. In the same way KIF is meant to facilitate sharing of knowledge across different systems that use different languages, formalisms, platforms, etc. KIF has a declarative semantics. It is meant to describe facts about the world rather than processes or procedures. Knowledge can be described as objects, functions, relations, and rules. It is a formal language, i.e., it can express arbitrary statements in first order logic and can support reasoners that can prove the consistency of a set of KIF statements. KIF also supports non-monotonic reasoning. KIF was created by Michael Genesereth, Richard Fikes and others participating in the DARPA knowledge sharing Effort. Although the original KIF group intended to submit to a formal standards body, that did not occur. A later version called Common Logic has since been developed for submission to ISO and has been approved and published. A variant called SUO-KIF is the language in which the Suggested Upper Merged Ontology is written. A practical application of the Knowledge interchange format is an agent communication language in a multi-agent system. See also Knowledge Query and Manipulation Language
https://en.wikipedia.org/wiki/Infoveillance
Infoveillance is a type of syndromic surveillance that specifically utilizes information found online. The term, along with the term infodemiology, was coined by Gunther Eysenbach to describe research that uses online information to gather information about human behavior. Eysenbach's work using Google Search queries led to the birth of Google Flu Trends, and other search engines have also been used. Other researchers have utilized social media sites such as Twitter to observe disease outbreak patterns. Infoveillance can detect disease outbreaks faster than traditional public health surveillance systems with minimal costs involved. Types Infoveillance methods may be either passive or active. Traditional infoveillance data like search engine queries and website navigation behavior are considered passive, as they attempt to recognize trends automatically, without action (or often even awareness) on the part of the internet users who are generating the data for analysis. Active infoveillance occurs when users choose to respond to a survey, enter symptoms into a website or app, or otherwise participate directly in surveillance efforts by contributing additional information. Examples Google Health Trends Beginning in 2008, Google used aggregated search query data to detect influenza trends and compared the results to countries' official surveillance data with the goal of predicting the spread of the flu. In light of evidence that emerged in 2013 showing that Google Flu Trends sometimes substantially overestimated actual flu rates, researchers proposed a series of more advanced and better-performing approaches to flu modeling from Google search queries. Google Flu Trends stopped publishing reports in 2015. Google also used aggregated search query data to detect dengue fever trends. Research has also cast doubt on the accuracy of some of these predictions. Google has continued this work to track and predict the COVID-19 pandemic, creating an open dataset on COVID-
https://en.wikipedia.org/wiki/Bob%20Adams%20%28electrical%20engineer%29
Robert Whitlock Adams is a Technical Fellow at Analog Devices, Inc. (ADI) in Wilmington, Massachusetts. His focus is on signal processing and analog-to-digital conversion for professional audio. He is a leader in the development of sigma-delta converters, introducing architectural advances including mismatch shaping, multi-bit quantization, and continuous-time architectures. Adams graduated with a Bachelor of Science in Electrical Engineering from Tufts University in 1976. From 1977 to 1988 he worked for DBX, a professional audio recording company. There, he helped develop the industry's first audio converter with greater than 16-bit resolution, as well as one of the earliest digital audio recorders. In 1988, he joined the Converter Group of Analog Devices as a Senior Staff Designer, and went on to develop ADI's first sigma-delta converters in partnership with Paul Ferguson. He produced the world's first monolithic asynchronous sample rate converters (the AD1890 family), and he created ADI's sigmaDSP line of audio-specific digital signal processing cores. As of 1998, Adams had received 15 patents related to audio signal processing. Awards and honors Elected Fellow of the Audio Engineering Society (AES), 1991 Received AES Silver Medal Award, 1995 Included in Electronic Design magazine's Engineering Hall of Fame, 2011 Became a Fellow of the Institute of Electrical and Electronics Engineers (IEEE), 2012 "for contributions to analog and digital signal processing" Received the IEEE Donald O. Pederson Award, 2015 "for contributions to noise-shaping data converter circuits, digital signal processing, and log-domain analog filters" Elected as a member into the National Academy of Engineering in 2018 for contributions to digital storage and reproduction of high-fidelity audio.
https://en.wikipedia.org/wiki/Macrometer
A macrometer is an instrument for measuring the size and distance of distant objects. Distant in this sense means a length that can not be readily measured by a calibrated length. The optical version of this instrument used two mirrors on a common sextant. By aligning the object on the mirrors using a precise vernier, the position of the mirrors could be used to compute the range to the object. The distance and the angular size of the object would then yield the actual size. See also Rangefinder Theodolite
https://en.wikipedia.org/wiki/Firefly%20luciferase
Firefly luciferase is the light-emitting enzyme responsible for the bioluminescence of fireflies and click beetles. The enzyme catalyses the oxidation of firefly luciferin, requiring oxygen and ATP. Because of the requirement of ATP, firefly luciferases have been used extensively in biotechnology. Mechanism of reaction The chemical reaction catalyzed by firefly luciferase takes place in two steps: luciferin + ATP → luciferyl adenylate + PPi luciferyl adenylate + O2 → oxyluciferin + AMP + light Light is produced because the reaction forms oxyluciferin in an electronically excited state. The reaction releases a photon of light as oxyluciferin goes back to the ground state. Luciferyl adenylate can additionally participate in a side reaction with O2 to form hydrogen peroxide and dehydroluciferyl-AMP. About 20% of the luciferyl adenylate intermediate is oxidized in this pathway. Firefly luciferase generates light from luciferin in a multistep process. First, D-luciferin is adenylated by MgATP to form luciferyl adenylate and pyrophosphate. After activation by ATP, luciferyl adenylate is oxidized by molecular oxygen to form a dioxetanone ring. A decarboxylation reaction forms an excited state of oxyluciferin, which tautomerizes between the keto-enol form. The reaction finally emits light as oxyluciferin returns to the ground state. Bifunctionality Luciferase can function in two different pathways: a bioluminescence pathway and a CoA-ligase pathway. In both pathways, luciferase initially catalyzes an adenylation reaction with MgATP. However, in the CoA-ligase pathway, CoA can displace AMP to form luciferyl CoA. Fatty acyl-CoA synthetase similarly activates fatty acids with ATP, followed by displacement of AMP with CoA. Because of their similar activities, luciferase is able to replace fatty acyl-CoA synthetase and convert long-chain fatty acids into fatty-acyl CoA for beta oxidation. Structure The protein structure of firefly luciferase consists of two comp
https://en.wikipedia.org/wiki/SocketCAN
SocketCAN is a set of open source CAN drivers and a networking stack contributed by Volkswagen Research to the Linux kernel. SocketCAN was formerly known as Low Level CAN Framework (LLCF). Traditional CAN drivers for Linux are based on the model of character devices. Typically they only allow sending to and receiving from the CAN controller. Conventional implementations of this class of device driver only allow a single process to access the device, which means that all other processes are blocked in the meantime. In addition, these drivers typically all differ slightly in the interface presented to the application, stifling portability. The SocketCAN concept on the other hand uses the model of network devices, which allows multiple applications to access one CAN device simultaneously. Also, a single application is able to access multiple CAN networks in parallel. The SocketCAN concept extends the Berkeley sockets API in Linux by introducing a new protocol family, PF_CAN, that coexists with other protocol families, such as PF_INET for the Internet Protocol. The communication with the CAN bus is therefore done analogously to the use of the Internet Protocol via sockets. Fundamental components of SocketCAN are the network device drivers for different CAN controllers and the implementation of the CAN protocol family. The protocol family, PF_CAN, provides the structures to enable different protocols on the bus: Raw sockets for direct CAN communication and transport protocols for point-to-point connections. Moreover the broadcast manager which is part of the CAN protocol family provides functions e.g. for sending CAN messages periodically or realize complex message filters. Since Linux kernel Version 5.10 the protocol family also includes an ISO-TP implementation, CAN_ISOTP. Patches for CAN were added in the 2.6.25 Linux kernel. Meanwhile some controller drivers were added and work is going on to add drivers for a variety of controllers. Usage The application firs
https://en.wikipedia.org/wiki/Averaging%20argument
In computational complexity theory and cryptography, averaging argument is a standard argument for proving theorems. It usually allows us to convert probabilistic polynomial-time algorithms into non-uniform polynomial-size circuits. Example Example: If every person likes at least 1/3 of the books in a library, then the library has a book, which at least 1/3 of people like. Proof: Suppose there are people and books. Each person likes at least of the books. Let people leave a mark on the book they like. Then, there will be at least marks. The averaging argument claims that there exists a book with at least marks on it. Assume, to the contradiction, that no such book exists. Then, every book has fewer than marks. However, since there are books, the total number of marks will be fewer than , contradicting the fact that there are at least marks. Formalized definition of averaging argument Let X and Y be sets, let p be a predicate on X × Y and let f be a real number in the interval [0, 1]. If for each x in X and at least f |Y| of the elements y in Y satisfy p(x, y), then there exists a y in Y such that there exist at least f |X| elements x in X that satisfy p(x, y). There is another definition, defined using the terminology of probability theory. Let be some function. The averaging argument is the following claim: if we have a circuit such that with probability at least , where is chosen at random and is chosen independently from some distribution over (which might not even be efficiently sampleable) then there exists a single string such that . Indeed, for every define to be then and then this reduces to the claim that for every random variable , if then (this holds since is the weighted average of and clearly if the average of some values is at least then one of the values must be at least ). Application This argument has wide use in complexity theory (e.g. proving ) and cryptography (e.g. proving that indistinguishable encryption
https://en.wikipedia.org/wiki/Narutaka%20Ozawa
(born 1974) is a Japanese mathematician, known for his work in operator algebras and discrete groups. He has been a professor at Kyoto University since 2013. He earned a bachelor's degree in mathematics in 1997 from the University of Tokyo and a Ph.D. in mathematics in 2000 from the same institution. One year later he received a Ph.D. in mathematics from Texas A&M University. He was selected for one of the prestigious Sloan Research Fellowships in 2005 and was an invited speaker at the 2006 ICM in Madrid where he gave a talk on "Amenable actions and Applications". He has won numerous prizes including the Mathematical Society of Japan (MSJ) Spring Prize and the Japan Society for the Promotion of Science (JSPS) Prize. Before becoming a full professor at Kyoto University in 2013, he was an associate professor at the University of Tokyo and at University of California, Los Angeles. Notes
https://en.wikipedia.org/wiki/List%20of%20Vocaloid%20products
The following is a list of products released for the Vocaloid software in order of release date. Products Vocaloid Vocaloid 2 VocaloWitter iVocaloid eVocaloid Vocaloid 3 Vocaloid 4 Vocaloid 5 Vocaloid 6 Mobile Vocaloid Editor Vocaloid Neo Commercially unreleased Notes
https://en.wikipedia.org/wiki/Philips%20Nino
The Philips Nino is a so-called Palm-size PC, a predecessor to the Pocket PC platform. It was a PDA-style device with a stylus-operated touch screen. The Nino 200 and Nino 300 models had a monochrome screen while the Nino 500 had a color display. The Nino featured a Voice Control Software and Tegic T9. See also Philips Velo
https://en.wikipedia.org/wiki/Mermaid%27s%20glove
Mermaid's glove is a common name referring to two different organisms: Dictyota binghamiae, a seaweed Haliclona oculata, a sponge
https://en.wikipedia.org/wiki/Morchella%20rufobrunnea
Morchella rufobrunnea, commonly known as the blushing morel, is a species of ascomycete fungus in the family Morchellaceae. A choice edible species, the fungus was described as new to science in 1998 by mycologists Gastón Guzmán and Fidel Tapia from collections made in Veracruz, Mexico. Its distribution was later revealed to be far more widespread after several DNA studies suggested that it is also present in the West Coast of the United States, Israel, Australia, Cyprus, Malta and Switzerland. M. rufobrunnea grows in disturbed soil or in woodchips used in landscaping as a saprotroph. Reports from the Mediterranean under olive trees (Olea europaea), however, suggest the fungus may also be able to form facultative tree associations. Young fruit bodies have conical caps with pale ridges and dark grayish pits; mature specimens are yellowish to ochraceous-buff. The surface of the fruit body often bruises brownish orange to pinkish where it has been touched or injured, a characteristic for which the fungus is named, the New Latin rufobrunnea signifying "rufus brown". Mature fruit bodies can grow to a height of . M. rufobrunnea differs from other Morchella species by its urban or suburban habitat preferences, in the color and form of the fruit body, the lack of a sinus at the attachment of the cap with the stipe, the length of the pits on the surface, and the bruising reaction. A process to cultivate morels now known to be M. rufobrunnea was described and patented in the 1980s. Taxonomy and phylogeny The first scientifically described specimens of Morchella rufobrunnea were collected in June 1996 from the Ecological Institute of Xalapa and other regions in the southern Mexican municipality of Xalapa, Veracruz, which are characterized by a subtropical climate. The type locality is a mesophytic forest containing oak, sweetgum, Clethra and alder at an altitude of . In a 2008 study, Michael Kuo determined that the "winter fruiting yellow morel"—erroneously referred to as M
https://en.wikipedia.org/wiki/Association%20of%20European%20Operational%20Research%20Societies
The Association of European Operational Research Societies (EURO) is a regional grouping within the International Federation of Operational Research Societies (IFORS) whose aim is to promote Operational Research throughout Europe. It was established in 1975. Overview EURO is a nonprofit organization domiciled in Switzerland. It aims at the advancement of knowledge, interest and education in Operational Research by appropriate means, particularly by the exchange of information, the holding of meetings and conferences, the publication of books, papers, and journals, the awarding of prizes, and the promotion of early stage talents. The members of EURO are national Operational Research Societies which are full members of International Federation of Operational Research Societies (IFORS) and originate from Europe, the Middle East and Africa. Its affairs are regulated by a Council consisting of one representatives of all its members and an executive committee which constitutes its board of directors. The current EURO member societies are: Austria Belarus Belgium Croatia Czech Republic Denmark Estonia Finland France Germany Greece Hungary Iceland Ireland Israel Italy Lithuania Netherlands Norway Poland Portugal Serbia Slovakia Slovenia South Africa Spain Sweden Switzerland Turkey Tunisia United Kingdom Activities EURO publishes scholarly journals and books about operational research, and organizes international conferences. It also bestows Awards, supports working groups, and organizes educational meetings. Publications EURO publishes 4 scholarly journals: European Journal of Operational Research EURO Journal on Computational Optimization EURO Journal on Decision Processes EURO Journal on Transportation and Logistics and the book series EURO Advanced Tutorials in Operational Research. Awards EURO bestows a number of prizes: EURO Gold Medal. The highest distinction within OR in Europe is conferred for an outstanding contributio
https://en.wikipedia.org/wiki/Software%20quality%20assurance
Software quality assurance (SQA) is a means and practice of monitoring all software engineering processes, methods, and work products to ensure compliance against defined standards. It may include ensuring conformance to standards or models, such as ISO/IEC 9126 (now superseded by ISO 25010), SPICE or CMMI. It includes standards and procedures that managers, administrators or developers may use to review and audit software products and activities to verify that the software meets quality criteria which link to standards. SQA encompasses the entire software development process, including requirements engineering, software design, coding, code reviews, source code control, software configuration management, testing, release management and software integration. It is organized into goals, commitments, abilities, activities, measurements, verification and validation. Purpose SQA involves a three-pronged approach: Organization-wide policies, procedures and standards Project-specific policies, procedures and standards Compliance to appropriate procedures Guidelines for the application of ISO 9001:2015 to computer software are described in ISO/IEC/IEEE 90003:2018. External entities can be contracted as part of process assessments to verify that projects are standard-compliant. More specifically in case of software, ISO/IEC 9126 (now superseded by ISO 25010) should be considered and applied for software quality. Activities Quality assurance activities take place at each phase of development. Analysts use application technology and techniques to achieve high-quality specifications and designs, such as model-driven design. Engineers and technicians find bugs and problems with related software quality through testing activities. Standards and process deviations are identified and addressed throughout development by project managers or quality managers, who also ensure that changes to functionality, performance, features, architecture and component (in general: cha
https://en.wikipedia.org/wiki/Ramtil%20oil
Ramtil oil, also known as Niger seed oil, is used mainly in cooking but also for lighting. In India it is pressed from the seed of Guizotia oleifera of the family Asteraceae. A very similar oil is made in Africa from G. abyssinica. The oil is used as an extender for sesame oil, which it resembles, as well as for making soap, in addition to its role as an illuminant. Countries The plant was originally cultivated in the Ethiopian highlands but is also cultivated in Mexico, Germany, Brazil, Nepal, India as well as other parts of Southeast Asia. The seeds are sold and grown in the United States as a niche crop. Composition The oil is rich in linoleic acid (75-80%) and other essential nutrients, with a fatty acid composition comparable to safflower and sunflower. The oil contains palmitic and stearic acids (7-8%) and oleic acid (5-8%). Indian Niger oil is reportedly higher in oleic acid (25%) and lower in linoleic acid (55%). Ethiopia revival There was an extended declining period of Niger seed oil production, due to the import of cheap palm oils, but an apparent waning appetite for these, and a government ban on oil imports, there has been a marked revival and several manufacturers produce one, two, three and five liters of oil.
https://en.wikipedia.org/wiki/Roshd%20Biological%20Education
Roshd Biological Education is a quarterly science educational magazine covering recent developments in biology and biology education for a biology teacher Persian -speaking audience. Founded in 1985, it is published by The Teaching Aids Publication Bureau, Organization for Educational Planning and Research, Ministry of Education, Iran. Roshd Biological Education has an editorial board composed of Iranian biologists, experts in biology education, science journalists and biology teachers. It is read by both biology teachers and students, as a way of launching innovations and new trends in biology education, and helping biology teachers to teach biology in better and more effective ways. Magazine layout As of Autumn 2012, the magazine is laid out as follows: Editorial—often offering a view of point from editor in chief on an educational and/or biological topics. Explore— New research methods and results on biology and/or education. World— Reports and explores on biological education worldwide. In Brief—Summaries of research news and discoveries. Trends—showing how new technology is altering the way we live our lives. Point of View—Offering personal commentaries on contemporary topics. Essay or Interview—often with a pioneer of a biological and/or educational researcher or an influential scientific educational leader. Muslim Biologists—Short histories of Muslim Biologists. Environment—An article on Iranian environment and its problems. News and Reports—Offering short news and reports events on biology education. In Brief—Short articles explaining interesting facts. Questions and Answers—Questions about biology concepts and their answers. Book and periodical Reviews—About new publication on biology and/or education. Reactions—Letter to the editors. Editorial staff Mohammad Karamudini, editor in chief History Roshd Biological Education started in 1985 together with many other magazines in other science and art. The first editor was Dr. Nouri-Dalooi, th
https://en.wikipedia.org/wiki/Up%20to
Two mathematical objects and are called "equal up to an equivalence relation " if and are related by , that is, if holds, that is, if the equivalence classes of and with respect to are equal. This figure of speech is mostly used in connection with expressions derived from equality, such as uniqueness or count. For example, " is unique up to " means that all objects under consideration are in the same equivalence class with respect to the relation . Moreover, the equivalence relation is often designated rather implicitly by a generating condition or transformation. For example, the statement "an integer's prime factorization is unique up to ordering" is a concise way to say that any two lists of prime factors of a given integer are equivalent with respect to the relation that relates two lists if one can be obtained by reordering (permuting) the other. As another example, the statement "the solution to an indefinite integral is , up to addition of a constant" tacitly employs the equivalence relation between functions, defined by if the difference is a constant function, and means that the solution and the function are equal up to this . In the picture, "there are 4 partitions up to rotation" means that the set has 4 equivalence classes with respect to defined by if can be obtained from by rotation; one representative from each class is shown in the bottom left picture part. Equivalence relations are often used to disregard possible differences of objects, so "up to " can be understood informally as "ignoring the same subtleties as ignores". In the factorization example, "up to ordering" means "ignoring the particular ordering". Further examples include "up to isomorphism", "up to permutations", and "up to rotations", which are described in the Examples section. In informal contexts, mathematicians often use the word modulo (or simply mod) for similar purposes, as in "modulo isomorphism". Examples Tetris Consider the seven Tetris pieces
https://en.wikipedia.org/wiki/SpyCatcher
The SpyTag/SpyCatcher system is a technology for irreversible conjugation of recombinant proteins. The peptide SpyTag (13 amino acids) spontaneously reacts with the protein SpyCatcher (12.3 kDa) to form an intermolecular isopeptide bond between the pair. DNA sequence encoding either SpyTag or SpyCatcher can be recombinantly introduced into the DNA sequence encoding a protein of interest, forming a fusion protein. These fusion proteins can be covalently linked when mixed in a reaction through the SpyTag/SpyCatcher system. Using the Tag/Catcher pair, bioconjugation can be achieved between two recombinant proteins that would otherwise be restrictive or impossible with traditional direct genetic fusion between the two proteins. For example, issues regarding protein folding, suboptimal expression host, and specialized post-translational modifications can be alleviated by separating the production of the proteins with the modularity of the Tag/Catcher system. Development and reaction mechanism SpyTag and SpyCatcher were formed from the splitting and engineering of the CnaB2 domain of the FbaB protein from Streptococcus pyogenes, which naturally forms an intramolecular isopeptide bond to assist colonization of the host cell. With the formation of the isopeptide bond, the CnaB2 domain becomes more tolerant to conformational, thermal and pH changes. Building upon this, SpyTag was obtained from CnaB2 by extracting the C-terminal beta strand containing the reactive aspartic acid at D556 and leaving the rest of the beta strands containing the reactive lysine K470 and the catalytic glutamic acid at E516 to become SpyCatcher, after further engineering to remove some hydrophobic surface residues. The resulting SpyTag/SpyCatcher can react to form the isopeptide bond with a second-order rate constant of 1.4 ± 0.4 × 103 M−1 s−1. It is postulated that the reaction mechanism proceeds by a nucleophilic attack of D556 from K470, mediated by E516. By reconstituting SpyTag:SpyCatcher,
https://en.wikipedia.org/wiki/Musculoskeletal%20injury
Musculoskeletal injury refers to damage of muscular or skeletal systems, which is usually due to a strenuous activity and includes damage to skeletal muscles, bones, tendons, joints, ligaments, and other affected soft tissues. In one study, roughly 25% of approximately 6300 adults received a musculoskeletal injury of some sort within 12 months—of which 83% were activity-related. Musculoskeletal injury spans into a large variety of medical specialties including orthopedic surgery (with diseases such as arthritis requiring surgery), sports medicine, emergency medicine (acute presentations of joint and muscular pain) and rheumatology (in rheumatological diseases that affect joints such as rheumatoid arthritis). Musculoskeletal injuries can affect any part of the human body including; bones, joints, cartilages, ligaments, tendons, muscles, and other soft tissues. Symptoms include mild to severe aches, low back pain, numbness, tingling, atrophy and weakness. These injuries are a result of repetitive motions and actions over a period of time. Tendons connect muscle to bone whereas ligaments connect bone to bone. Tendons and ligaments play an active role in maintain joint stability and controls the limits of joint movements, once injured tendons and ligaments detrimentally impact motor functions. Continuous exercise or movement of a musculoskeletal injury can result in chronic inflammation with progression to permanent damage or disability. In many cases, during the healing period after a musculoskeletal injury, a period in which the healing area will be completely immobile, a cast-induced muscle atrophy can occur. Routine sessions of physiotherapy after the cast is removed can help return strength in limp muscles or tendons. Alternately, there exist different methods of electrical stimulation of the immobile muscles which can be induced by a device placed underneath a cast, helping prevent atrophies Preventative measures include correcting or modifying one's postures a
https://en.wikipedia.org/wiki/BLUF%20domain
In molecular biology, the BLUF domain (sensors of blue-light using FAD) is a FAD-binding protein domain. They are present in various proteins, primarily from bacteria, for example a BLUF domain is found at the N-terminus of the AppA protein from Rhodobacter sphaeroides. The BLUF domain is involved in sensing blue-light (and possibly redox) using FAD and is similar to the flavin-binding PAS domains and cryptochromes. The predicted secondary structure reveals that the BLUF domain has a novel FAD-binding fold.
https://en.wikipedia.org/wiki/Organ%20perforation
Organ perforation is a complete penetration of the wall of a hollow organ in the body, such as the gastrointestinal tract in the case of gastrointestinal perforation. It mainly refers to accidental or pathologic perforation, rather than intentional penetration during surgery. It can lead to peritonitis if untreated. Types include gastrointestinal perforation and uterine perforation.
https://en.wikipedia.org/wiki/Chosen-ciphertext%20attack
A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis where the cryptanalyst can gather information by obtaining the decryptions of chosen ciphertexts. From these pieces of information the adversary can attempt to recover the hidden secret key used for decryption. For formal definitions of security against chosen-ciphertext attacks, see for example: Michael Luby and Mihir Bellare et al. Introduction A number of otherwise secure schemes can be defeated under chosen-ciphertext attack. For example, the El Gamal cryptosystem is semantically secure under chosen-plaintext attack, but this semantic security can be trivially defeated under a chosen-ciphertext attack. Early versions of RSA padding used in the SSL protocol were vulnerable to a sophisticated adaptive chosen-ciphertext attack which revealed SSL session keys. Chosen-ciphertext attacks have implications for some self-synchronizing stream ciphers as well. Designers of tamper-resistant cryptographic smart cards must be particularly cognizant of these attacks, as these devices may be completely under the control of an adversary, who can issue a large number of chosen-ciphertexts in an attempt to recover the hidden secret key. It was not clear at all whether public key cryptosystems could withstand the chosen ciphertext attack until the initial breakthrough work of Moni Naor and Moti Yung in 1990, which suggested a mode of dual encryption with integrity proof (now known as the "Naor-Yung" encryption paradigm). This work made understanding of the notion of security against chosen ciphertext attack much clearer than before and open the research direction of constructing systems with various protections against variants of the attack. When a cryptosystem is vulnerable to chosen-ciphertext attack, implementers must be careful to avoid situations in which an adversary might be able to decrypt chosen-ciphertexts (i.e., avoid providing a decryption oracle). This can be more difficult than it appear
https://en.wikipedia.org/wiki/Gibbs%20phenomenon
In mathematics, the Gibbs phenomenon is the oscillatory behavior of the Fourier series of a piecewise continuously differentiable periodic function around a jump discontinuity. The th partial Fourier series of the function (formed by summing the lowest constituent sinusoids of the Fourier series of the function) produces large peaks around the jump which overshoot and undershoot the function values. As more sinusoids are used, this approximation error approaches a limit of about 9% of the jump, though the infinite Fourier series sum does eventually converge almost everywhere (pointwise convergence on continuous points) except points of discontinuity. The Gibbs phenomenon was observed by experimental physicists and was believed to be due to imperfections in the measuring apparatus, but it is in fact a mathematical result. It is one cause of ringing artifacts in signal processing. Description The Gibbs phenomenon is a behavior of the Fourier series of a function with a jump discontinuity and is described as the following:As more Fourier series constituents or components are taken, the Fourier series shows the first overshoot in the oscillatory behavior around the jump point approaching ~ 9% of the (full) jump and this oscillation does not disappear but gets closer to the point so that the integral of the oscillation approaches to zero (i.e., zero energy in the oscillation).At the jump point, the Fourier series gives the average of the function's both side limits toward the point. Square wave example The three pictures on the right demonstrate the Gibbs phenomenon for a square wave (with peak-to-peak amplitude of from to and the periodicity ) whose th partial Fourier series is where . More precisely, this square wave is the function which equals between and and between and for every integer ; thus, this square wave has a jump discontinuity of peak-to-peak height at every integer multiple of . As more sinusoidal terms are added (i.e., increasing ), th
https://en.wikipedia.org/wiki/Continuous%20function%20%28set%20theory%29
In set theory, a continuous function is a sequence of ordinals such that the values assumed at limit stages are the limits (limit suprema and limit infima) of all values at previous stages. More formally, let γ be an ordinal, and be a γ-sequence of ordinals. Then s is continuous if at every limit ordinal β < γ, and Alternatively, if s is an increasing function then s is continuous if s: γ → range(s) is a continuous function when the sets are each equipped with the order topology. These continuous functions are often used in cofinalities and cardinal numbers. A normal function is a function that is both continuous and increasing.
https://en.wikipedia.org/wiki/Expressome
Expressome may refer to: A supramolecular complex consisting of RNA polymerase and a trailing ribosome linked by a shared mRNA. The expressome complex mediates a mechanism of gene expression regulation termed transcription-translation coupling. The whole set of gene expression in a cell, tissue, organ, organisms, and species. Expressome is a slightly larger concept than transcriptome. The transcriptome is the set of transcripts, while expressome includes transcripts, proteins and other ligands (abundance or concentration). See also Bioinformatics DNA microarray Gel electrophoresis Mass spectrometry Protein sequencing Systems biology Expressomics List of omics topics in biology External links Bioinformatics Journal Gene expression
https://en.wikipedia.org/wiki/Background%20radiation
Background radiation is a measure of the level of ionizing radiation present in the environment at a particular location which is not due to deliberate introduction of radiation sources. Background radiation originates from a variety of sources, both natural and artificial. These include both cosmic radiation and environmental radioactivity from naturally occurring radioactive materials (such as radon and radium), as well as man-made medical X-rays, fallout from nuclear weapons testing and nuclear accidents. Definition Background radiation is defined by the International Atomic Energy Agency as "Dose or the dose rate (or an observed measure related to the dose or dose rate) attributable to all sources other than the one(s) specified. So a distinction is made between the dose which is already in a location, which is defined here as being "background", and the dose due to a deliberately introduced and specified source. This is important where radiation measurements are taken of a specified radiation source, where the existing background may affect this measurement. An example would be measurement of radioactive contamination in a gamma radiation background, which could increase the total reading above that expected from the contamination alone. However, if no radiation source is specified as being of concern, then the total radiation dose measurement at a location is generally called the background radiation, and this is usually the case where an ambient dose rate is measured for environmental purposes. Background dose rate examples Background radiation varies with location and time, and the following table gives examples: Natural background radiation Radioactive material is found throughout nature. Detectable amounts occur naturally in soil, rocks, water, air, and vegetation, from which it is inhaled and ingested into the body. In addition to this internal exposure, humans also receive external exposure from radioactive materials that remain outside the body a
https://en.wikipedia.org/wiki/Soak%20testing
Soak testing involves testing a system with a typical production load, over a continuous availability period, to validate system behavior under production use. It may be required to extrapolate the results, if not possible to conduct such an extended test. For example, if the system is required to process 10,000 transactions over 100 hours, it may be possible to complete processing the same 10,000 transactions in a shorter duration (say 50 hours) as representative (and conservative estimate) of the actual production use. A good soak test would also include the ability to simulate peak loads as opposed to just average loads. If manipulating the load over specific periods of time is not possible, alternatively (and conservatively) allow the system to run at peak production loads for the duration of the test. For example, in software testing, a system may behave exactly as expected when tested for one hour. However, when it is tested for three hours, problems such as memory leaks cause the system to fail or behave unexpectedly. Soak tests are used primarily to check the reaction of a subject under test under a possible simulated environment for a given duration and for a given threshold. Observations made during the soak test are used to improve the characteristics of the subject under further tests. In electronics, soak testing may involve testing a system up to or above its maximum ratings for a long period of time. Some companies may soak test a product for a period of many months, while also applying external stresses such as elevated temperatures. This falls under load testing.
https://en.wikipedia.org/wiki/Inferior%20anal%20nerves
The Inferior rectal nerves (inferior anal nerves, inferior hemorrhoidal nerve) usually branch from the pudendal nerve but occasionally arises directly from the sacral plexus; they cross the ischiorectal fossa along with the inferior rectal artery and veins, toward the anal canal and the lower end of the rectum, and is distributed to the Sphincter ani externus (external anal sphincter, EAS) and to the integument (skin) around the anus. Branches of this nerve communicate with the perineal branch of the posterior femoral cutaneous and with the posterior scrotal nerves at the forepart of the perineum. Supplies Cutaneous innervation below the pectinate line and external anal sphincter. See also Inferior rectal artery Additional images
https://en.wikipedia.org/wiki/Induced-self%20antigen
Induced-self antigen is a marker of abnormal self, which can be recognized upon infected (in particular, virus-infected) and transformed cells. Therefore, the recognition of "induced self" is an important strategy for surveillance of infection or tumor transformation - it results in elimination of the affected cells by activated NK cells or other immunological mechanisms. Similarly γδ T cells can recognize induced-self antigens expressed on cells under stress conditions. Receptors Probably the most studied receptor involved in recognition of induced-self antigens is NKG2D. It is an activating receptor which is expressed on NK cells and subsets of T and NKT cells. NKG2D can bind proteins at the surface of most cells that are not normally expressed, but that are expressed during a stress response of the cells (e.g. induction of the DNA damage pathway). Moreover, other recognition targets exist, for example ligands induced on human macrophages by TLR stimulation. Ligands that bind to NKG2D receptor can be divided into two families of MHC class I-related proteins: MICs (MICA, MICB) and ULBPs (ULBP1, ULBP2, ULBP3, ULBP4, RAET1G, RAET1L). Other receptors able to bind induced-self antigens are NKG2C, NKG2E, NKG2F (CD94) or some NCRs (e.g. NKp 46 ). Tumor targeting Practical use of the knowledge of induced-self antigens is in targeting tumors for immune response. As tumors are very often capable of escaping the immune system by many ways, upregulation of specific ligands on the tumor cells could mount effective immune mechanisms able to eliminate these cells. For example, upregulation of NKG2D ligands can stimulate the NK cells triggering cell-mediated cytotoxicity.
https://en.wikipedia.org/wiki/Noise%20curve
Noise curves are a common way to characterise background noise in unoccupied buildings and spaces. Their purpose is to produce a single-value representation of a complete sound spectrum. International standards organizations (ISO, ANSI and ASA) recognize the need to objectify judgements on the amount of ambient noise in enclosed spaces, and provide us with definitions for various noise curves. The ANSI/ASA S12.2-2008 standard, for example, recommends an NC value of 25-35 for schools and 15-18 for concert halls. Background noise may have several undesirable effects. Noise can be an annoyance that creates fatigue and negatively affects productivity, safety and the ability to communicate. Therefore, standard methodologies for quantifying noise have been developed. Noise curves reflect different standardized means of creating a single number rating for the background noise spectrum in a space. Different rooms, locations, regulations, and applications may allow different acceptable noise ratings. In most cases, the goal is that background noise should not interfere with the purpose of the room, e.g. the noise of an office air-conditioning system and consistent noise of traffic outside the building should not interfere with telephone calls or conversations. In other cases, special noise may also be tolerated or even introduced at higher levels, for example to create acoustic "privacy", or to help mask other more irritating noise sources. The process of determining the single value for a particular room is first to measure the sound frequency spectrum created by the background noise in the room while the room is unoccupied. This spectrum is then superimposed onto a template graph containing the noise curves. The result is determined by the lowest curve which is not touched by the measured spectrum at any position in the audio frequency range. Noise curves serve as uniform measuring standards and are referred to by many noise regulations covering a variety of locations
https://en.wikipedia.org/wiki/Dunathan%20stereoelectronic%20hypothesis
Dunathan stereoelectronic hypothesis is a concept in chemistry to explain the stereospecefic cleavage of bonds using pyridoxal phosphate. This occurs because stereoelectronic effects controls the actions of the enzyme. History Before the correlation between fold type and reaction correlation of proteins were understood, Harmon C. Dunathan, a chemist at Haverford College proposed that the bond that is cleaved using pyridoxal is perpendicular to the system. Though an important concept in bioorganic chemistry, it is now known that enzyme conformations play a critical role in the final chemical reaction. Mode of action The transition state is stabilized by the extended pi bond network (formation of anion). Furthermore hyperconjugation caused by the extended network draws electrons from the bond to be cleaved, thus weakening the chemical bond and making it labile The sigma bond that is parallel to the pi bond network will break. The bond that has the highest chance of being cleaved is one with the largest HOMO-LUMO overlap. This effect might be effected by electrostatic effects within the enzyme. Applications This was seen in transferase and future interests lie in decarboxylation in various catalytic cycles.
https://en.wikipedia.org/wiki/Coulomb%20explosion
A Coulombic explosion is a condensed-matter physics process in which a molecule or crystal lattice is destroyed by the Coulombic repulsion between its constituent atoms. Coulombic explosions are a prominent technique in laser-based machining, and appear naturally in certain high-energy reactions. Mechanism A Coulombic explosion begins when an intense electric field (often from a laser) excites the valence electrons in a solid, ejecting them from the system and leaving behind positively charged ions. The chemical bonds holding the solid together are weakened by the loss of the electrons, enabling the Coulombic repulsion between the ions to overcome them. The result is an explosion of ions and electrons – a plasma. The laser must be very intense to produce a Coulomb explosion. If it is too weak, the energy given to the electrons will be transferred to the ions via electron-phonon coupling. This will cause the entire material to heat up, melt, and thermally ablate away as a plasma. The end result is similar to Coulomb explosion, except that any fine structure in the material will be damaged by thermal melting. It may be shown that the Coulomb explosion occurs in the same parameter regime as the superradiant phase transition i.e. when the destabilizing interactions become overwhelming and dominate over the oscillatory phonon-solid binding motions. Technological use A Coulomb explosion is a "cold" alternative to the dominant laser etching technique of thermal ablation, which depends on local heating, melting, and vaporization of molecules and atoms using less-intense beams. Pulse brevity down only to the nanosecond regime is sufficient to localize thermal ablation – before the heat is conducted far, the energy input (pulse) has ended. Nevertheless, thermally ablated materials may seal pores important in catalysis or battery operation, and recrystallize or even burn the substrate, thus changing the physical and chemical properties at the etch site. In contrast, even
https://en.wikipedia.org/wiki/Ulas%20family
The Ulas family of 19 is from rural southern Turkey. Five of the family members (except for another, who has died) walk on all fours with their feet and the palms of their hands in what is called a "bear crawl". Their quadrupedal gait has never been reported in anatomically intact adult humans. The gait is different from the knuckle-walking quadrupedal gait of apes. In 2006, the family was the subject of a documentary: The Family That Walks On All Fours. The affected siblings have a form of non-progressive congenital cerebellar ataxia. The brain impairments include cerebellar hypoplasia, mild cerebral cortex atrophy and a reduced corpus callosum. They are also mildly intellectually disabled and have problems in balancing on two legs. However, they do not show the poor coordination of hands, speech, and eye movements often found in cerebellar ataxia. The four sisters can do needlework. They all share a recessive mutation on chromosome 17p. Sources Üner Tan of Çukurova University Medical School in Adana, Turkey, has said that they show characteristics of the primate ancestors of Homo sapiens, before the move to bipedalism. He calls the process "backward evolution" and he named the condition Uner Tan syndrome. However, Nicholas Humphrey, John Skoyles, and Roger Keynes have argued that their gait is due to two rare phenomena coming together. First, instead of initially crawling as infants on their knees, they started off learning to move around with a "bear crawl" on their feet. Second, due to their congenital brain impairment, they found balancing on two legs difficult. Because of this, their motor development was channeled into turning their bear crawl into a substitute for bipedality. Defne Aruoba is a Turkish psychologist who was involved with the care and research of the Ulas family. Because of her experience working with the Ulas family, she planned to establish the Ulas Foundation, which will bridge the gap between social inequalities and reach out to other
https://en.wikipedia.org/wiki/95th%20meridian%20west
The meridian 95° west of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, North America, the Gulf of Mexico, Central America, the Pacific Ocean, the Southern Ocean, and Antarctica to the South Pole. The 95th meridian west forms a great circle with the 85th meridian east. From Pole to Pole Starting at the North Pole and heading south to the South Pole, the 95th meridian west passes through: {| class="wikitable plainrowheaders" ! scope="col" width="120" | Co-ordinates ! scope="col" | Country, territory or sea ! scope="col" | Notes |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Arctic Ocean | style="background:#b0e0e6;" | |-valign="top" | ! scope="row" | | Nunavut — Axel Heiberg Island, Bjarnason Island and Axel Heiberg Island again |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Massey Sound | style="background:#b0e0e6;" | |- | ! scope="row" | | Nunavut — Amund Ringnes Island |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Hendriksen Strait | style="background:#b0e0e6;" | |- | ! scope="row" | | Nunavut — Cornwall Island |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Belcher Channel | style="background:#b0e0e6;" | |- | ! scope="row" | | Nunavut — Devon Island |-valign="top" | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Queens Channel | style="background:#b0e0e6;" | |- | ! scope="row" | | Nunavut — Dundas Island |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Queens Channel | style="background:#b0e0e6;" | Passing just west of Baillie-Hamilton Island, Nunavut, (at ) |- | ! scope="row" | | Nunavut — Cornwallis Island |-valign="top" | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Parry Channel | style="background:#b0e0e6;" | Barrow Strait — passing just west of Griffith Island, Nunavut, (at ) |-v
https://en.wikipedia.org/wiki/Hinny
A hinny is a domestic equine hybrid, the offspring of a male horse (a stallion) and a female donkey (a jenny). It is the reciprocal cross to the more common mule, which is the product of a male donkey (a jack) and a female horse (a mare). The hinny is distinct from the mule both in physiology and temperament as a consequence of genomic imprinting and is also less common. Description The hinny is the offspring of a stallion and a jenny or female donkey, and is thus the reciprocal cross to the more common mule foaled by a jack (male donkey) out of a mare. Like the mule, the hinny displays hybrid vigour (heterosis). In general terms, in both these hybrids the foreparts and head of the animal are similar to those of the sire, while the hindparts and tail are more similar to those of the dam. A hinny is generally smaller than a mule, with shorter ears and a lighter head; the tail is tasselled like that of its donkey mother. The distinct phenotypes of the hinny and the mule are partly attributable to genomic imprinting – an element of epigenetic inheritance. Hinnies and mules differ in temperament despite sharing nuclear genomes; this too is believed to be attributable to the action of imprinted genes. Fertility, sterility and rarity According to most reports, hinnies are sterile and are not capable of reproduction. The male hinny can mate, but the emission is not fertile. Many have no sperm in the emission, others have sperm that is not motile. The dam of a foal carried to term in Henan Province of China in 1981 is variously reported to have been a mule or a hinny. See also Zebroid
https://en.wikipedia.org/wiki/Spyro%20%28character%29
Spyro is the titular main character and protagonist of the Spyro video game series, including The Legend of Spyro, and a guest character in the Skylanders series, first appearing in Spyro the Dragon in 1998. Spyro is an energetic, young, male, purple dragon. He is known for his ability to defeat enemies by breathing fire and charging at them, and his ability to glide to otherwise unreachable areas in the game world. Spyro is often accompanied by his best friend Sparx, who is a dragonfly. Spyro was created by Craig Stitt and designed by Charles Zembillas for Insomniac Games, the developers of the first three games in the series. The character has endured in popular culture as a mascot of the PlayStation video game console alongside Crash Bandicoot, having appeared in several games together with him. Both characters were owned by Universal Studios, under the former video game division Universal Interactive and have since become an intellectual property of Activision, through the merger between Vivendi Universal Games and Activision to create Activision Blizzard. Development After developing Disruptor, Insomniac president, Ted Price, contacted Zembillas to design a playable dragon character for a video game. Zembillas had previously designed Crash for Naughty Dog, whose offices were just across the hall from Insomniac's at Universal Interactive Studios. Spyro was originally named "Pete" and colored green during development, but the name was dropped to avoid infringing on the trademark Pete's Dragon, which was owned by The Walt Disney Company. His color was changed to purple so as to avoid blending in with any grassy areas. He was made younger to appeal to children, needing "to be cute, but at the same time, mischievous, bratty, unpredictable, and something of an upstart." Spyro was given the ability to glide infinitely to give him "something he could do that no other platformer could", making the game's worlds significantly larger and providing more incentive for
https://en.wikipedia.org/wiki/Orca%20Welfare%20and%20Safety%20Act
The Orca Welfare and Safety Act is a bill passed in the U.S. state of California in 2016. The bill phases out the holding of killer whales in captivity and establishes standards for treatment of all remaining captive orcas in zoos. The bill has been interpreted as being particularly targeted at the wildlife parks chains that hold Marine mammals such as SeaWorld and a response to the film Blackfish. Since the beginning of Orca captivity in 1961 there have been 156 Orcas held in captivity. As of March 2017, there are 61 Orcas held in captivity around the world and SeaWorld owns 26 of them. Legislative Process In 2014 California Assembly member Richard Bloom introduced the assembly bill 2140 known as the Orca Welfare and Safety Act. In April 2014 there was a live hearing in the Committee of Water, Parks, and Wildlife where there was no initial decision and the bill was set aside for an interim study. The bill sat for two years until March 2016 when it was reintroduced as AB 2305 and put to a vote. In April the bill passed the California Assembly with no opposition and moved onto the senate renamed as AB 1453. After the bill passed the senate, the Governor of California, Jerry Brown, signed the Orca Welfare and Safety Act in September 2016 and the bill went into effect January 2017. Bill This law makes it illegal for any person, institute, or corporation to breed captive Orcas, illegal to move or receive captive Orcas or Orca embryos from a captive orca from any state or country, and illegal to use captive orcas as a mean of entertainment/performance. A violation of this law from any person, institute, or corporation is a $100,000 fine and/or 6 months in jail as a misdemeanor. The law also establishes that the remaining captive Orcas in California are to be used for educational purposes and will exhibit natural behavior with a live science-based narration to the public. Response In 2014 with the introduction of AB 2140 SeaWorld responded by releasing plans of a
https://en.wikipedia.org/wiki/Crop%20weed
Crop weeds are weeds that grow amongst crops. Despite the potential for some crop weeds to be used as a food source, many can also prove harmful to crops, both directly and indirectly. Crop weeds can inhibit the growth of crops, contaminate harvested crops and often spread rapidly. They can also host crop pests such as aphids, fungal rots and viruses. Cost increases and yield losses occur as a result. Striga, one of the main cereal crop weeds in Sub-Saharan Africa, commonly causes yield losses of 40–100% and accounts for around $7 billion in losses annually. Around 100 million hectares of land in Sub-Saharan Africa are affected by striga. Barnyard grass has been identified as a culprit in global rice yield losses and certain species have been known to mimic rice. Examples of crop weeds include chickweed, barnyard grass, dandelion, striga and Japanese knotweed. See also Weed of cultivation
https://en.wikipedia.org/wiki/Lena%20broom
Cytisus 'Lena' (or Broom 'Lena') is a hybrid broom of two species of Cytisus, Cytisus scoparius × Cytisus dallimorei, and is known as 'Lena' after the German hybridizer, Herr Lena. He is credited with a handful of other classic broom cultivars. It is a small deciduous shrub with slender green shoots and small trifoliate leaves. It has fragrant flowers of brown-red edged with gold, or deep crimson with a light yellow keel. In 1993, Cytisus 'Lena' was a recipient of the Award of Garden Merit from the Royal Horticultural Society. It can fairly easily be mistaken for its wild parent Cytisus scoparius which is an invasive pest in many parts of the West Coast of the United States and Canada. 'Lena' is a well-behaved (meaning compact,) desirable shrub. It flowers between Spring and early Summer, likes full sun and is very hardy. It just needs pruning occasionally to keep in shape. As a legume, this shrub can fix nitrogen in the soil through a symbiotic relationship with Rhizobium bacteria. It is hardy to USDA zones 5-8. Known as 'Lena Broom', Lena's broom, Cytisus 'lena', Cytisus ×lena, & Lena Cytisus.
https://en.wikipedia.org/wiki/L-type%20calcium%20channel
The L-type calcium channel (also known as the dihydropyridine channel, or DHP channel) is part of the high-voltage activated family of voltage-dependent calcium channel. "L" stands for long-lasting referring to the length of activation. This channel has four isoforms: Cav1.1, Cav1.2, Cav1.3, and Cav1.4. L-type calcium channels are responsible for the excitation-contraction coupling of skeletal, smooth, cardiac muscle, and for aldosterone secretion in endocrine cells of the adrenal cortex. They are also found in neurons, and with the help of L-type calcium channels in endocrine cells, they regulate neurohormones and neurotransmitters. They have also been seen to play a role in gene expression, mRNA stability, neuronal survival, ischemic-induced axonal injury, synaptic efficacy, and both activation and deactivation of other ion channels. In cardiac myocytes, the L-type calcium channel passes inward Ca2+ current (ICaL) and triggers calcium release from the sarcoplasmic reticulum by activating ryanodine receptor 2 (RyR2) (calcium-induced-calcium-release). Phosphorylation of these channels increases their permeability to calcium and increases the contractility of their respective cardiac myocytes. L-type calcium channel blocker drugs are used as cardiac antiarrhythmics or antihypertensives, depending on whether the drugs have higher affinity for the heart (the phenylalkylamines, like verapamil), or for the blood vessels (the dihydropyridines, like nifedipine). In skeletal muscle, there is a very high concentration of L-type calcium channels, situated in the T-tubules. Muscle depolarization results in large gating currents, but anomalously low calcium flux, which is now explained by the very slow activation of the ionic currents. For this reason, little or no Ca2+ passes across the T-tubule membrane during a single action potential. History In 1953, Paul Fatt and Bernard Katz discovered voltage gated calcium channels in crustacean muscle. The channels exhibited diff
https://en.wikipedia.org/wiki/Additron%20tube
The Additron was an electron tube designed by Dr. Josef Kates, circa 1950, to replace the several individual electron tubes and support components required to perform the function of a single bit digital full adder. Dr. Kates developed the Additron with the intention of increasing the likelihood of success and reliability while reducing the size, power consumption and complexity of the University of Toronto Electronic Computer, (UTEC) The Additron neither went into production at the Canadian Rogers Vacuum Tube Company, where the prototypes were built, nor was it used in the UTEC machine. It did make a widely publicized appearance at the 1950 Canadian National Exhibition operating an electronic game of Tic-Tac-Toe, dubbed Bertie the Brain, to show the marvels of electronic computing. The tube was registered with the Radio Television Manufacturing Association on 20 March 1951 as type 6047. Patents
https://en.wikipedia.org/wiki/E%27Lite
The E'Lite is a small-form-factor microcomputer based on the Zilog Z80B microprocessor released by Barrington International Corporation in 1982. It served as the market introduction of Irwin Magnetic Systems's long-awaited 510 Winchester tape drives. Development and specifications William M. Cassell formed Barrington International in Ann Arbor, Michigan, in 1980, after leaving the Candor Computer Corporation located in the same city, where he was employed as its executive vice president. The E'Lite was the product of nearly two years of development and was delivered to customers in September 1982, two months after its announcement and projected release date. Cassell designed the computer around the 8-bit Zilog Z80B microprocessor, at a time when the industry was shifting en masse to 16-bit processors for microcomputers. He explained that the immediate dearth of prepackaged 16-bit software would have hindered sales of his computer, had he designed it around a 16-bit processor. He planned on releasing such a computer in the spring of 1983, although this never came to fruition. The E'Lite served as the market introduction of Irwin Magnetic Systems's long-anticipated 510 Winchester tape drives. Irwin was a computer storage manufacturer out of Ann Arbor founded by several former executives of Sycor Inc.; Cassell himself had worked at Sycor before his employment at Candor. The 510 Winchester drives were co-developed by Olivetti S.p.A. of Italy. The tapes for the drive can hold up to 10 MB of data, while its seek time was rated for 33 ms. Random writes reportedly took one-fifth the time to complete as compared to 5.25-inch floppy disks. The 510 Winchester fits in the E'Lite's sole 5.25 drive bay. An external 5.25-inch floppy drive, which plugs into the computer's built-in floppy controller, was also included. The E'Lite came with 2 KB of page cache for the disk drives, while its RAM was maxed out to 64 KB. The computer came shipped with CP/M or, optionally, MP/M—single-
https://en.wikipedia.org/wiki/Dejan%20Ristanovi%C4%87
Dejan Ristanović (, Belgrade, 16 April 1963), is a well known Serbian writer and computer publicist. In January 1981 he wrote the first article on personal computers for the popular science magazine Galaksija (Galaxy). During the following years he wrote many articles about programmable calculators and home computers. In December 1983 he wrote a special edition of Galaksija called "Computers in Your Home" (Računari u vašoj kući), the first computer magazine in former Yugoslavia. This issue featured entire schematic diagrams guides on how to build computer Galaksija, created by Voja Antonić. The series of special editions was eventually developed into computer magazine Računari (Computers). Ristanović was a contributor of Računari for 11 years. After that, in 1995 Ristanović founded the PC Press publishing company and magazine PC, the first privately owned computer magazine in Serbia. Ristanović has been the editor-in-chief of PC for more than 10 years. In 1989 he co-founded Sezam BBS, which eventually become a major BBS system and evolved to Internet provider Sezam Pro, which in 2009 merged in Orion Telecom. Dejan Ristanović is the author of about 20 books and more than 500 magazine articles about computers, written in the Serbian and English languages. He also operates the www.ti59.com nostalgia home page of TI-59 programmable calculators. Dejan Ristanović is alumnus of Mathematical Gymnasium Belgrade, graduated in 1981 (search term in the list: "Ристановић Дејан").
https://en.wikipedia.org/wiki/Limnoforming
Limnoforming (from Greek: , "lake"; Latin: , "to shape", as in shaping, fashioning, molding, modeling) is the process of manipulating the physical or chemical properties of a body of water by introducing organisms which facilitate higher level biological activity, thus impacting the overall ecology of a given body of water, and eventually adjacent ecosystems. Limnoforming is a process using living organisms to enhance a habitat's abiotic component, ultimately rendering it more conducive to a higher ecological quality. This could be accomplished by introducing a population of organisms, e.g., invertebrates or microbes, en masse to the substrate of a body of water. These organisms would then physically and/or chemically alter the underwater environment to furnish a more suitable substrate for a wider range of biological activity; the result being an increased ecological function (e.g., in trophic dynamics), and thus a higher quality ecological state. Ultimately, limnoforming aims to accelerate the rate of ecological succession in distressed aquatic systems (e.g., lower Green Bay, Lake Michigan), so as to produce a biologically complex climax community in a comparatively short amount of time. The concept of limnoforming originated from the benthic ecology laboratory of Dr. Jerry L. Kaster, School of Freshwater Sciences, University of Wisconsin – Milwaukee. Limnoforming was partially inspired by, and is similar in several aspects to, the concept of terraforming. The two concepts' main similarity is that both aim to accelerate the rate of change occurring in a given environment, in terms of its habitability for a given species or for a number of species, and furthermore, the overall function of its ecology. Instead of creating a habitable ecosystem or biosphere from scratch, limnoforming simply aims to amend degraded earthly aqueous environments less apt to harboring a high quality ecological community into an environment which does support an ecologically flouris
https://en.wikipedia.org/wiki/Hemiola
In music, hemiola (also hemiolia) is the ratio 3:2. The equivalent Latin term is sesquialtera. In rhythm, hemiola refers to three beats of equal value in the time normally occupied by two beats. In pitch, hemiola refers to the interval of a perfect fifth. Etymology The word hemiola comes from the Greek adjective ἡμιόλιος, hemiolios, meaning "containing one and a half," "half as much again," "in the ratio of one and a half to one (3:2), as in musical sounds." The words "hemiola" and "sesquialtera" both signify the ratio 3:2, and in music were first used to describe relations of pitch. Dividing the string of a monochord in this ratio produces the interval of a perfect fifth. Beginning in the 15th century, both words were also used to describe rhythmic relationships, specifically the substitution (usually through the use of coloration—red notes in place of black ones, or black in place of "white", hollow noteheads) of three imperfect notes (divided into two parts) for two perfect ones (divided into three parts) in tempus perfectum or in prolatio maior. Rhythm In rhythm, hemiola refers to three beats of equal value in the time normally occupied by two beats. Vertical hemiola: sesquialtera The Oxford Dictionary of Music illustrates hemiola with a superimposition of three notes in the time of two and vice versa. One textbook states that, although the word "hemiola" is commonly used for both simultaneous and successive durational values, describing a simultaneous combination of three against two is less accurate than for successive values and the "preferred term for a vertical two against three … is sesquialtera." The New Harvard Dictionary of Music states that in some contexts, a sesquialtera is equivalent to a hemiola. Grove's Dictionary, on the other hand, has maintained from the first edition of 1880 down to the most recent edition of 2001 that the Greek and Latin terms are equivalent and interchangeable, both in the realms of pitch and rhythm, although David Hi
https://en.wikipedia.org/wiki/Bitumen
Bitumen (, ) is an immensely viscous constituent of petroleum. Depending on its exact composition it can be a sticky, black liquid or an apparently solid mass that behaves as a liquid over very large time scales. In the U.S., the material is commonly referred to as asphalt. Whether found in natural deposits or refined from petroleum, the substance is classed as a pitch. Prior to the 20th century the term asphaltum was in general use. The word derives from the ancient Greek ἄσφαλτος ásphaltos, which referred to natural bitumen or pitch. The largest natural deposit of bitumen in the world, estimated to contain 10 million tons, is the Pitch Lake of southwest Trinidad. 70% of annual bitumen production destined for road construction, its primary use. In this application bitumen is used to bind aggregate particles like gravel and forms a substance referred to as asphalt concrete, which is colloquially termed asphalt. Its other main uses lie in bituminous waterproofing products, such as roofing felt and roof sealant. In material sciences and engineering the terms "asphalt" and "bitumen" are often used interchangeably and refer both to natural and manufactured forms of the substance, although there is regional variation as to which term is most common. Worldwide, geologists tend to favor the term "bitumen" for the naturally occurring material. For the manufactured material, which is a refined residue from the distillation process of selected crude oils, "bitumen" is the prevalent term in much of the world; however, in American English, "asphalt" is more commonly used. To help avoid confusion, the phrases "liquid asphalt", "asphalt binder", or "asphalt cement" are used in the U.S. Colloquially, various forms of asphalt are sometimes referred to as "tar", as in the name of the La Brea Tar Pits. Naturally occurring bitumen is sometimes specified by the term "crude bitumen". Its viscosity is similar to that of cold molasses while the material obtained from the fractional di
https://en.wikipedia.org/wiki/Pseudorandom%20noise
In cryptography, pseudorandom noise (PRN) is a signal similar to noise which satisfies one or more of the standard tests for statistical randomness. Although it seems to lack any definite pattern, pseudorandom noise consists of a deterministic sequence of pulses that will repeat itself after its period. In cryptographic devices, the pseudorandom noise pattern is determined by a key and the repetition period can be very long, even millions of digits. Pseudorandom noise is used in some electronic musical instruments, either by itself or as an input to subtractive synthesis, and in many white noise machines. In spread-spectrum systems, the receiver correlates a locally generated signal with the received signal. Such spread-spectrum systems require a set of one or more "codes" or "sequences" such that Like random noise, the local sequence has a very low correlation with any other sequence in the set, or with the same sequence at a significantly different time offset, or with narrow band interference, or with thermal noise. Unlike random noise, it must be easy to generate exactly the same sequence at both the transmitter and the receiver, so the receiver's locally generated sequence has a very high correlation with the transmitted sequence. In a direct-sequence spread spectrum system, each bit in the pseudorandom binary sequence is known as a chip and the inverse of its period as chip rate; compare bit rate and symbol rate. In a frequency-hopping spread spectrum sequence, each value in the pseudorandom sequence is known as a channel number and the inverse of its period as the hop rate. FCC Part 15 mandates at least 50 different channels and at least a 2.5 Hz hop rate for narrow band frequency-hopping systems. GPS satellites broadcast data at a rate of 50 data bits per second – each satellite modulates its data with one PN bit stream at 1.023 million chips per second and the same data with another PN bit stream at 10.23 million chips per second. GPS receivers corr
https://en.wikipedia.org/wiki/International%20Conference%20on%20Software%20Engineering%20and%20Formal%20Methods
The International Conference on Software Engineering and Formal Methods (SEFM) is an international academic conference in the field of software engineering. History Until 2002, SEFM was a workshop; it then became a full international conference. It is sponsored by the IEEE Computer Society. The 1st IEEE International Conferences on Software Engineering and Formal Methods (SEFM 2003) was held at Brisbane, Australia in September 2003. Submissions originated from 22 different countries. As well as IEEE-CS, supporters for SEFM 2003 included the Australian Computer Society (ACS), Boeing Australia, and the Italian Embassy in Canberra. The proceedings for the conference are published by the Springer Science+Business Media in LNCS since 2011. Previously, the proceedings were published by IEEE. Aims SEFM aims to bring together practitioners and researchers from academia, industry, and government, to advance the state of the art in formal methods, to help in their large-scale application in the software industry, and to encourage their integration with other practical software engineering methods. The conferences are often held in the Asia and Pacific regions and specifically in developing countries. An important aim of the SEFM conferences is to encourage research cooperation between developing countries and industrialized countries. SEFM 2010 was in Pisa, Italy. SEFM 2013 was in Madrid, Spain. SEFM 2014 takes place in Grenoble, France The SEFM conference series is included on the DBLP online publications database. Revised selected papers sometimes appear as special journal issues.
https://en.wikipedia.org/wiki/Homayoun%20Seraji
Homâyun Serâji ( 1947 – 16 April 2007) was an Iranian scientist, engineer, a JPL senior researcher and former professor of Sharif University of Technology who published extensively in the field of multivariable control systems, focusing on optimal control, pole placement, multivariable PID controllers, and output regulation. Also he has significant publications in the field of Robotics, and space exploration. Education Seraji was born and grew up in Tehran. He ranked first in the Iranian national high-school diploma examinations in 1965. He then moved to the United Kingdom and studied at Sussex University and majored in Electrical Engineering. Seraji earned his Ph.D. in Control Systems at the University of Cambridge in 1972. Career In 1974, he joined Aryamehr University of Technology (now Sharif University of Technology), as a Professor of Electrical Engineering and was involved in teaching and research in control systems for ten years. He was also selected as a United Nations Distinguished Scientist in 1984. In 1985, Seraji joined NASA's Jet Propulsion Laboratory (JPL) and Caltech. During his tenure at JPL, he conducted extensive research that has led to major contributions in the field of robot control systems, particularly in: adaptive robot control, control of dexterous robots, contact control, real-time collision avoidance, rule-based robot navigation, and safe spacecraft landing. The outcome of his research in controls and robotics has been published in 98 peer-reviewed journal papers, 119 refereed conference publications, 5 contributed chapters, and has led to 10 patents. In 2003, he was recognized as the most-published author in the 20-year history of the Journal of Robotic Systems. Awards JPL Edward Stone Award for Outstanding Research Publication in 2003 NASA Group Achievement Award in 1991 and 2002 Fellow of IEEE in 1997 NASA Exceptional Engineering Achievement Award in 1992 NASA Major Space Act Award See also Science and technology in Iran Notes
https://en.wikipedia.org/wiki/Honorary%20Diploma%20of%20the%20Cabinet%20of%20Ministers%20of%20Ukraine
The Honorary Diploma of the Cabinet of Ministers of Ukraine is a government award for many years of hard work, exemplary performance of official duties, personal contribution to economic, scientific, technical, socio-cultural, military, public and other spheres of activity, service to the Ukrainian people in promoting the rule of law and implementation of measures to ensure the protection of the rights and freedoms of citizens, the development of democracy, and the effective operation of executive bodies and local governments. Recipients See also Honorary Diploma of the Verkhovna Rada of Ukraine Diploma of the Verkhovna Rada of Ukraine Awards of Ukraine Orders, decorations, and medals of Ukraine
https://en.wikipedia.org/wiki/TRPC7
Transient receptor potential cation channel, subfamily C, member 7, also known as TRPC7, is a human gene encoding a protein of the same name. See also TRPC Further reading External links Ion channels
https://en.wikipedia.org/wiki/RTL8710
The RTL8710 is a low-cost Wi-Fi chip with full TCP/IP stack and MCU (Micro Controller Unit) capability produced by Taiwanese manufacturer, Realtek.
https://en.wikipedia.org/wiki/LAIM%20Working%20Group
The LAIM (Log Anonymization and Information Management) Working Group is a NSF and ONR funded research group at the National Center for Supercomputing Applications under the direction of Adam Slagell . Work from this group focuses upon log anonymization and Internet privacy. The LAIM group, established in 2005, has released 3 different log anonymization tools: CANINE, Scrub-PA, and FLAIM. FLAIM is their only tool still under active development. External links LAIM Working Group Official Home CANINE Home Page Scrub-PA Home Page Official FLAIM Home Page CRAWDAD entry on FLAIM at Dartmouth Anonymity Computer security organizations Internet privacy organizations Privacy organizations Organizations established in 2005
https://en.wikipedia.org/wiki/Airborne%20Internet%20Consortium
The Airborne Internet Consortium (AIC) was a working group of small companies that formed a non-profit corporation in 2004 to foster research and development and advocacy of IP networked enabled communications for aviation. The AIC's purpose was to define, develop and promote common systems elements necessary to deploy comprehensive aviation based digital datalink capabilities throughout the United States using evolving internet capabilities. The adoption of commercially available, common internet based systems is discussed as an enabling concept within the US Department of Transportation's Next Generation (NextGen) Aviation Operations Concept of Operations. Expansion of internet based providers is called for in the US Department of Transportation's 2022 update of the National Airspace System (NAS)". History The idea of an Airborne Internet began as a supporting technology for NASA's Small Aircraft Transportation System (SATS). Program planners identified the need to establish robust communications between aircraft, operations centers and ground facilities. Based on this recognized need, Ralph Yost proposed the idea of networking aircraft, in the same way we network computers - and thus the Airborne Internet was born. <ref>U.S. Department of Transportation, Federal Aviation Administration (FAA), [https://www.tc.faa.gov/act4/insidethefence/2006/0102_03_airborne.htm Inside the Fence, ''The Future is Now: The World of the 'Airborne Internet"], by Pete Castellano, Open-file report, January 2, 2006, (FAA Technical Center, Atlantic City, New Jersey)</ref>  A working team within the NASA SATS program was formed to compile the initial definitions and concepts for an Airborne Internet. The team was funded by NASA and the FAA to undertake preliminary steps. The working team continued as an information exchange group called the Airborne Internet Collaboration Group (AICG).  The private sector members of the team formed the Airborne Internet Consortium (AIC) to further devel
https://en.wikipedia.org/wiki/Difetarsone
Difetarsone is an antiprotozoal agent. Various studies have shown it to be particularly effective against Trichuris trichiura, commonly known as the whipworm. Prior to the drugs use in the early 1970s, there were few effective treatments for this infection. It has also been used to treat Entamoeba histolytica infections. Difetarsone often has minor side effects, which include rashes, nausea and vomiting. It has also resulted in angioedema in at least one known case.
https://en.wikipedia.org/wiki/Sudden%20arrhythmic%20death%20syndrome
Sudden arrhythmic death syndrome (SADS) is a sudden unexpected death of adolescents and adults, mainly during sleep. One relatively common type is known as Brugada syndrome. The syndrome is rare in most areas around the world but occurs in populations that are culturally and genetically distinct. It was first noted in 1977 among southeast Asian Hmong refugees in the United States and Canada. The syndrome was again noted in Singapore when a retrospective review of records showed that 230 otherwise healthy Thai foreign workers living in Singapore died suddenly of unexplained causes between 1982 and 1990. Causes Sudden death of a young person can be caused by heart disease (including cardiomyopathy, congenital heart disease, myocarditis, genetic connective tissue disorders) or conduction disease (WPW syndrome, etc.), medication-related causes or other causes. Rare diseases called ion channelopathies may play a role such as long QT syndrome (LQTS), Brugada syndrome (BrS), CPVT (catecholaminergic polymorphic ventricular tachycardia), progressive cardiac conduction defect (PCCD), early repolarization syndrome, mixed sodium channel disease, and short QT syndrome. In 20% of cases, no cause of death can be found, even after extensive examination. In young people with type 1 diabetes, unexplained deaths could be due to nighttime hypoglycemia triggering abnormal heart rhythms or cardiac autonomic neuropathy, damage to nerves that control the function of the heart. Medical examiners have taken into account various factors, such as nutrition, toxicology, heart disease, metabolism, and genetics. Although there is no real known definite cause, extensive research showed victims aged 18 or older were found to have had a hypertrophic cardiomyopathy, a condition in which the heart muscle becomes oddly thickened without any obvious cause. This was the most commonly identified abnormality in sudden death of young adults. Where people have died suddenly, it is most commonly found th
https://en.wikipedia.org/wiki/Resource%20intensity
Resource intensity is a measure of the resources (e.g. water, energy, materials) needed for the production, processing and disposal of a unit of good or service, or for the completion of a process or activity; it is therefore a measure of the efficiency of resource use. It is often expressed as the quantity of resource embodied in unit cost e.g. litres of water per $1 spent on product. In national economic and sustainability accounting it can be calculated as units of resource expended per unit of GDP. When applied to a single person it is expressed as the resource use of that person per unit of consumption. Relatively high resource intensities indicate a high price or environmental cost of converting resource into GDP; low resource intensity indicates a lower price or environmental cost of converting resource into GDP. Resource productivity and resource intensity are key concepts used in sustainability measurement as they measure attempts to decouple the connection between resource use and environmental degradation. Their strength is that they can be used as a metric for both economic and environmental cost. Although these concepts are two sides of the same coin, in practice they involve very different approaches and can be viewed as reflecting, on the one hand, the efficiency of resource production as outcome per unit of resource use (resource productivity) and, on the other hand, the efficiency of resource consumption as resource use per unit outcome (resource intensity). The sustainability objective is to maximize resource productivity while minimizing resource intensity. See also Bioeconomics Econophysics Energy and Environment Energy intensity Environmental economics Energy Accounting Ecodynamics Ecological Economics Industrial ecology Population dynamics Resource productivity Sustainability accounting Sustainable development Systems ecology Thermoeconomics
https://en.wikipedia.org/wiki/Strongly%20correlated%20material
Strongly correlated materials are a wide class of compounds that include insulators and electronic materials, and show unusual (often technologically useful) electronic and magnetic properties, such as metal-insulator transitions, heavy fermion behavior, half-metallicity, and spin-charge separation. The essential feature that defines these materials is that the behavior of their electrons or spinons cannot be described effectively in terms of non-interacting entities. Theoretical models of the electronic (fermionic) structure of strongly correlated materials must include electronic (fermionic) correlation to be accurate. As of recently, the label quantum materials is also used to refer to strongly correlated materials, among others. Transition metal oxides Many transition metal oxides belong to this class which may be subdivided according to their behavior, e.g. high-Tc, spintronic materials, multiferroics, Mott insulators, spin Peierls materials, heavy fermion materials, quasi-low-dimensional materials, etc. The single most intensively studied effect is probably high-temperature superconductivity in doped cuprates, e.g. La2−xSrxCuO4. Other ordering or magnetic phenomena and temperature-induced phase transitions in many transition-metal oxides are also gathered under the term "strongly correlated materials." Electronic structures Typically, strongly correlated materials have incompletely filled d- or f-electron shells with narrow energy bands. One can no longer consider any electron in the material as being in a "sea" of the averaged motion of the others (also known as mean field theory). Each single electron has a complex influence on its neighbors. The term strong correlation refers to behavior of electrons in solids that is not well-described (often not even in a qualitatively correct manner) by simple one-electron theories such as the local-density approximation (LDA) of density-functional theory or Hartree–Fock theory. For instance, the seemingly simple ma
https://en.wikipedia.org/wiki/Fungus
A fungus (: fungi or funguses) is any member of the group of eukaryotic organisms that includes microorganisms such as yeasts and molds, as well as the more familiar mushrooms. These organisms are classified as one of the traditional eukaryotic kingdoms, along with Animalia, Plantae and either Protista or Protozoa and Chromista. A characteristic that places fungi in a different kingdom from plants, bacteria, and some protists is chitin in their cell walls. Fungi, like animals, are heterotrophs; they acquire their food by absorbing dissolved molecules, typically by secreting digestive enzymes into their environment. Fungi do not photosynthesize. Growth is their means of mobility, except for spores (a few of which are flagellated), which may travel through the air or water. Fungi are the principal decomposers in ecological systems. These and other differences place fungi in a single group of related organisms, named the Eumycota (true fungi or Eumycetes), that share a common ancestor (i.e. they form a monophyletic group), an interpretation that is also strongly supported by molecular phylogenetics. This fungal group is distinct from the structurally similar myxomycetes (slime molds) and oomycetes (water molds). The discipline of biology devoted to the study of fungi is known as mycology (from the Greek , mushroom). In the past mycology was regarded as a branch of botany, although it is now known that fungi are genetically more closely related to animals than to plants. Abundant worldwide, most fungi are inconspicuous because of the small size of their structures, and their cryptic lifestyles in soil or on dead matter. Fungi include symbionts of plants, animals, or other fungi and also parasites. They may become noticeable when fruiting, either as mushrooms or as molds. Fungi perform an essential role in the decomposition of organic matter and have fundamental roles in nutrient cycling and exchange in the environment. They have long been used as a direct source of h
https://en.wikipedia.org/wiki/Cylinder%20set%20measure
In mathematics, cylinder set measure (or promeasure, or premeasure, or quasi-measure, or CSM) is a kind of prototype for a measure on an infinite-dimensional vector space. An example is the Gaussian cylinder set measure on Hilbert space. Cylinder set measures are in general not measures (and in particular need not be countably additive but only finitely additive), but can be used to define measures, such as classical Wiener measure on the set of continuous paths starting at the origin in Euclidean space. Definition Let be a separable real topological vector space. Let denote the collection of all surjective continuous linear maps defined on whose image is some finite-dimensional real vector space : A cylinder set measure on is a collection of probability measures where is a probability measure on These measures are required to satisfy the following consistency condition: if is a surjective projection, then the push forward of the measure is as follows: Remarks The consistency condition is modelled on the way that true measures push forward (see the section cylinder set measures versus true measures). However, it is important to understand that in the case of cylinder set measures, this is a requirement that is part of the definition, not a result. A cylinder set measure can be intuitively understood as defining a finitely additive function on the cylinder sets of the topological vector space The cylinder sets are the pre-images in of measurable sets in : if denotes the -algebra on on which is defined, then In practice, one often takes to be the Borel -algebra on In this case, one can show that when is a separable Banach space, the σ-algebra generated by the cylinder sets is precisely the Borel -algebra of : Cylinder set measures versus measures A cylinder set measure on is not actually a measure on : it is a collection of measures defined on all finite-dimensional images of If has a probability measure already defined on it, then g
https://en.wikipedia.org/wiki/VoxForge
VoxForge is a free speech corpus and acoustic model repository for open source speech recognition engines. VoxForge was set up to collect transcribed speech to create a free GPL speech corpus in order to be uses with open source speech recognition engines. The speech audio files will be 'compiled' into acoustic models for use with open source speech recognition engines such as Julius, ISIP, and Sphinx and HTK (note: HTK has distribution restrictions). VoxForge has used LibriVox as a source of audio data since 2007. See also Speech recognition in Linux List of speech recognition software
https://en.wikipedia.org/wiki/Phantasy%20Star%20Universe
(PSU) is an action role-playing video game developed by Sega's Sonic Team for the Microsoft Windows, PlayStation 2 and Xbox 360 platforms. It was released in Japan for the PC and PlayStation 2 on August 31, 2006; the Xbox 360 version was released there on December 14, 2006. Its North American release was in October 2006, in all formats. The European release date was November 24 the same year, while the Australian release date was November 30. Phantasy Star Universe is similar to the Phantasy Star Online (PSO) games, but takes place in a different time period and location, and has many new features. Like most of the PSO titles, PSU was playable in both a persistent online network mode and a fully featured, single-player story mode. Plot Ethan Waber, the main character, and his younger sister, Lumia Waber, are at the celebration of the 100th anniversary of the Alliance Space Fleet on the GUARDIANS Space station. The celebration is interrupted when a mysterious meteor shower almost destroys the entire fleet. During an evacuation, Ethan and Lumia divert from the main evacuation route; collapsing rubble separates Lumia from Ethan. Ethan then meets up with a GUARDIAN named Leo, but they are attacked by a strange creature that paralyzes Leo. Ethan kills the creature. After killing multiple creatures and saving people, Ethan finds Lumia and they leave the station. Ethan reveals that he dislikes the GUARDIANS organization because his father died on a mission. Leo, impressed with Ethan's abilities, persuades Ethan to join the GUARDIANS. Ethan and his classmate Hyuga Ryght are trained by a GUARDIAN named Karen Erra, who leads them against the S.E.E.D, the monsters that came from the meteors. After being hired to accompany a scientist to a RELICS site of an ancient, long-dead civilization, they find out that the SEED are attracted to a power source called A-Photons, which the ancients used and that the solar system has just rediscovered. Karen discovers she is the sister of
https://en.wikipedia.org/wiki/Semicomputable%20function
In computability theory, a semicomputable function is a partial function that can be approximated either from above or from below by a computable function. More precisely a partial function is upper semicomputable, meaning it can be approximated from above, if there exists a computable function , where is the desired parameter for and is the level of approximation, such that: Completely analogous a partial function is lower semicomputable if and only if is upper semicomputable or equivalently if there exists a computable function such that: If a partial function is both upper and lower semicomputable it is called computable. See also Computability theory
https://en.wikipedia.org/wiki/StrataFlash
StrataFlash is a NOR flash memory technology first developed by Intel. It stores two or more bits of information per cell rather than just one, in an architecture called multi-level cell (MLC). This is accomplished by storing intermediate voltage levels instead of using only the two levels (discharged = "0" and charged = "1") of traditional binary memories. The StrataFlash technology evolved out of Intel's ETOX flash memory products. Two bits per cell are achieved with four levels of voltage, while three bits per cell can be achieved with eight levels. Research of this technology began in 1992 and the first commercial products were released in 1997. Further developments allowed faster read speeds by offering synchronous burst mode and asynchronous page mode read operations.
https://en.wikipedia.org/wiki/Software-defined%20infrastructure
Software-defined infrastructure (SDI) is the definition of technical infrastructure controlled by computer hardware, that is entirely under the control of software. It operates independent of any hardware-specific dependencies and is programmatically extensible. Drive for innovation boosts demand for software-defined equipment. In the SDI approach, an application's infrastructure requirements are defined declaratively (both functional and non-functional requirements). The hardware features enough versatility to control the infrastructure, and the software defines the functionalities, than can be changed by simply replacing the software. Another approach to Software Defined systems are Software Defined Equipment (SDE) or Software Defined Apparatus (SDA) Typical uses of Software Defined Equipment are: Software Defined Radio Software Defined Network Software Defined Television In Embedded design, the role of Software Defined Equipment or Apparatus (SDE/SDA) can be defined by using Direct Firmware Update (DFU) by Over The Air (OTA) action. OTA/DFU is a process where the firmware of an embedded system can be replaced wirelessly and remotely. This feature provides a powerful tool to redefine the use of versatile hardware by simply replacing the firmware (or embedded software). A possible embodiment of a software defined apparatus is a hardware "black box" with multiple inputs and outputs, whose functionality can be adapted to very different tasks just by replacing the software or firmware without any modification to the hardware. The benefits of SDI/SDA/SDE is that it lowers/eliminates effort towards infrastructure maintenance, allows companies to move focus to other parts of the software, ensures consistence while also allowing for extensibility, remote deployment through configuration without downtime, and allows you to leverage the power of versioning such as git. Advanced capabilities enable the transition from one configuration to another without down
https://en.wikipedia.org/wiki/Spectra%20Logic
Spectra Logic Corporation is a computer data storage company based in Boulder, Colorado in the United States. The company builds backup and archive technology for secondary storage to protect data after it migrates from primary disk. Spectra Logic's primary product is tape libraries. The company was founded in 1979, and is a privately held company. History Nathan C. Thompson founded Spectra Logic in his apartment in 1979 while he was an engineering student at the University of Colorado at Boulder. Thompson is the chairman and CEO of the company. The company became the first to automate Advanced Intelligent Tape (AIT) magnetic tape in a robotic autoloader (tape library), and was also the first tape-library vendor to implement the iSCSI networking protocol in its products. Spectra Logic produced another first when it released a tape library with integrated hardware-based data encryption. Spectra introduced its TFinity tape library in November 2009, offering 99.9% reliability and scaling to 180 petabytes of storage capacity in an LTO-5 configuration. In December 2010 Spectra's tape-library product line won first place in all 14 categories of Storage magazine/SearchStorage.com's 2010 Quality Awards for enterprise and midrange tape libraries. Spectra Logic again earned top honors in the 2012 Storage magazine/SearchStorage.com's Quality Awards, winning both the enterprise and midrange tape library categories. In May 2012, DCIG, LLC released a "Tape Library Buyer's Guide", which evaluated over 60 tape libraries from 8 storage vendors. Only the Spectra Logic TFinity and T950 received the highest "Best-in-Class" ranking. Also that month, Spectra Logic announced that it would provide Spectra TFinity tape libraries to the National Center for Supercomputing Applications (NCSA) for their Blue Waters supercomputing system. The TFinity tape libraries will be able to store hundreds of petabytes of data and will be one of the world's largest active file repositories. Spectra L
https://en.wikipedia.org/wiki/RC%20circuit
A resistor–capacitor circuit (RC circuit), or RC filter or RC network, is an electric circuit composed of resistors and capacitors. It may be driven by a voltage or current source and these will produce different responses. A first order RC circuit is composed of one resistor and one capacitor and is the simplest type of RC circuit. RC circuits can be used to filter a signal by blocking certain frequencies and passing others. The two most common RC filters are the high-pass filters and low-pass filters; band-pass filters and band-stop filters usually require RLC filters, though crude ones can be made with RC filters. Introduction There are three basic, linear passive lumped analog circuit components: the resistor (R), the capacitor (C), and the inductor (L). These may be combined in the RC circuit, the RL circuit, the LC circuit, and the RLC circuit, with the acronyms indicating which components are used. These circuits, among them, exhibit a large number of important types of behaviour that are fundamental to much of analog electronics. In particular, they are able to act as passive filters. This article considers the RC circuit, in both series and parallel forms, as shown in the diagrams below. Natural response The simplest RC circuit consists of a resistor and a charged capacitor connected to one another in a single loop, without an external voltage source. Once the circuit is closed, the capacitor begins to discharge its stored energy through the resistor. The voltage across the capacitor, which is time-dependent, can be found by using Kirchhoff's current law. The current through the resistor must be equal in magnitude (but opposite in sign) to the time derivative of the accumulated charge on the capacitor. This results in the linear differential equation where is the capacitance of the capacitor. Solving this equation for yields the formula for exponential decay: where is the capacitor voltage at time . The time required for the voltage to fall
https://en.wikipedia.org/wiki/Brevibacterium%20iodinum
Brevibacterium iodinum is a Gram-positive soil bacterium. It can often be found among the normal cutaneous flora of healthy people, particularly in humid environments, and is only very rarely involved in opportunistic infections. It is also suspected to be a cause of foot odor.
https://en.wikipedia.org/wiki/Central%20lymph%20nodes
A central or intermediate group of three or four large glands is imbedded in the adipose tissue near the base of the axilla. Its afferent lymphatic vessels are the efferent vessels of all the preceding groups of axillary glands; its efferents pass to the subclavicular group. Additional images
https://en.wikipedia.org/wiki/Solar%20Physics%20%28journal%29
Solar Physics is a peer-reviewed scientific journal published monthly by Springer Science+Business Media. The editors-in-chief are Lidia van Driel-Gesztelyi (various affiliations), John Leibacher (National Solar Observatory, and Institut d'Astrophysique Spatiale), Cristina Mandrini (Universidad de Buenos Aires), and Iñigo Arregui (Instituto de Astrofísica de Canarias). Scope and history The focus of this journal is fundamental research on the Sun and it covers all aspects of solar physics. Topical coverage includes solar-terrestrial physics and stellar research if it pertains to the focus of this journal. Publishing formats include regular manuscripts, invited reviews, invited memoirs, and topical collections. Solar Physics was established in 1967 by solar physicists Cornelis de Jager and Zdeněk Švestka, and publisher D. Reidel. Abstracting and indexing This journal is indexed by the following services: Science Citation Index Scopus INSPEC Chemical Abstracts Service Current Contents/Physical, Chemical & Earth Sciences GeoRef Journal Citation Reports SIMBAD
https://en.wikipedia.org/wiki/Indentation%20style
In computer programming, an indentation style is a convention governing the indentation of blocks of code to convey program structure. This article largely addresses the free-form languages, such as C and its descendants, but can be (and often is) applied to most other programming languages (especially those in the curly bracket family), where whitespace is otherwise insignificant. Indentation style is only one aspect of programming style. Indentation is not a requirement of most programming languages, where it is used as secondary notation. Rather, indenting helps better convey the structure of a program to human readers. Especially, it is used to clarify the link between control flow constructs such as conditions or loops, and code contained within and outside of them. However, some languages (such as Python and occam) use indentation to determine the structure instead of using braces or keywords; this is termed the off-side rule. In such languages, indentation is meaningful to the compiler or interpreter; it is more than only a clarity or style issue. This article uses the term brackets to refer to parentheses, and the term braces to refer to curly brackets. Brace placement in compound statements The main difference between indentation styles lies in the placing of the braces of the compound statement ({...}) that often follows a control statement (if, while, for...). The table below shows this placement for the style of statements discussed in this article; function declaration style is another case. The style for brace placement in statements may differ from the style for brace placement of a function definition. For consistency, the indentation depth has been kept constant at 4 spaces, regardless of the preferred indentation depth of each style. Tabs, spaces, and size of indentations The displayed width for tabs can be set to arbitrary values in most programming editors, including Notepad++ (MS-Windows), TextEdit (MacOS/X), Emacs (Unix), vi (Unix), and nan
https://en.wikipedia.org/wiki/Viral%20replication
Viral replication is the formation of biological viruses during the infection process in the target host cells. Viruses must first get into the cell before viral replication can occur. Through the generation of abundant copies of its genome and packaging these copies, the virus continues infecting new hosts. Replication between viruses is greatly varied and depends on the type of genes involved in them. Most DNA viruses assemble in the nucleus while most RNA viruses develop solely in cytoplasm. Viral production / replication Viruses multiply only in living cells. The host cell must provide the energy and synthetic machinery and the low- molecular-weight precursors for the synthesis of viral proteins and nucleic acids. The virus replication occurs in seven stages, namely; Attachment Entry, Uncoating, Transcription / mRNA production, Synthesis of virus components, Virion assembly and Release (Liberation Stage). Attachment It is the first step of viral replication. The virus attaches to the cell membrane of the host cell. It then injects its DNA or RNA into the host to initiate infection. In animal cells these viruses get into the cell through the process of endocytosis which works through fusing of the virus and fusing of the viral envelope with the cell membrane of the animal cell and in plant cells it enters through the process of pinocytosis which works on pinching of the viruses. Entry The cell membrane of the host cell invaginates the virus particle, enclosing it in a pinocytotic vacuole. This protects the cell from antibodies like in the case of the HIV virus. Uncoating Cell enzymes (from lysosomes) strip off the virus protein coat. This releases or renders accessible the virus nucleic acid or genome. Transcription / mRNA production For some RNA viruses, the infecting RNA produces messenger RNA (mRNA), which can translate the genome into protein products. For viruses with negative stranded RNA, or DNA, viruses are produced by transcription then t
https://en.wikipedia.org/wiki/Complex%20multiplication
In mathematics, complex multiplication (CM) is the theory of elliptic curves E that have an endomorphism ring larger than the integers. Put another way, it contains the theory of elliptic functions with extra symmetries, such as are visible when the period lattice is the Gaussian integer lattice or Eisenstein integer lattice. It has an aspect belonging to the theory of special functions, because such elliptic functions, or abelian functions of several complex variables, are then 'very special' functions satisfying extra identities and taking explicitly calculable special values at particular points. It has also turned out to be a central theme in algebraic number theory, allowing some features of the theory of cyclotomic fields to be carried over to wider areas of application. David Hilbert is said to have remarked that the theory of complex multiplication of elliptic curves was not only the most beautiful part of mathematics but of all science. There is also the higher-dimensional complex multiplication theory of abelian varieties A having enough endomorphisms in a certain precise sense, roughly that the action on the tangent space at the identity element of A is a direct sum of one-dimensional modules. Example of the imaginary quadratic field extension Consider an imaginary quadratic field . An elliptic function is said to have complex multiplication if there is an algebraic relation between and for all in . Conversely, Kronecker conjectured – in what became known as the Kronecker Jugendtraum – that every abelian extension of could be obtained by the (roots of the) equation of a suitable elliptic curve with complex multiplication. To this day this remains one of the few cases of Hilbert's twelfth problem which has actually been solved. An example of an elliptic curve with complex multiplication is where Z[i] is the Gaussian integer ring, and θ is any non-zero complex number. Any such complex torus has the Gaussian integers as endomorphism ring. It is
https://en.wikipedia.org/wiki/Sentence%20spacing
Sentence spacing concerns how spaces are inserted between sentences in typeset text and is a matter of typographical convention. Since the introduction of movable-type printing in Europe, various sentence spacing conventions have been used in languages with a Latin alphabet. These include a normal word space (as between the words in a sentence), a single enlarged space, and two full spaces. Until the 20th century, publishing houses and printers in many countries used additional space between sentences. There were exceptions to this traditional spacing method—some printers used spacing between sentences that was no wider than word spacing. This was French spacing—a term synonymous with single-space sentence spacing until the late 20th century. With the introduction of the typewriter in the late 19th century, typists used two spaces between sentences to mimic the style used by traditional typesetters. While wide sentence spacing was phased out in the printing industry in the mid-20th century, the practice continued on typewriters and later on computers. Perhaps because of this, many modern sources now incorrectly claim that wide spacing was created for the typewriter. The desired or correct sentence spacing is often debated, but most sources now state that an additional space is not necessary or desirable. From around 1950, single sentence spacing became standard in books, magazines, and newspapers, and the majority of style guides that use a Latin-derived alphabet as a language base now prescribe or recommend the use of a single space after the concluding punctuation of a sentence. However, some sources still state that additional spacing is correct or acceptable. Some people preferred double sentence spacing because that was how they were taught to type. The few direct studies conducted since 2002 have produced inconclusive results as to which convention is more readable. History Traditional typesetting Shortly after the invention of movable type, highly variab
https://en.wikipedia.org/wiki/Derivations%20of%20the%20Lorentz%20transformations
There are many ways to derive the Lorentz transformations utilizing a variety of physical principles, ranging from Maxwell's equations to Einstein's postulates of special relativity, and mathematical tools, spanning from elementary algebra and hyperbolic functions, to linear algebra and group theory. This article provides a few of the easier ones to follow in the context of special relativity, for the simplest case of a Lorentz boost in standard configuration, i.e. two inertial frames moving relative to each other at constant (uniform) relative velocity less than the speed of light, and using Cartesian coordinates so that the x and x′ axes are collinear. Lorentz transformation In the fundamental branches of modern physics, namely general relativity and its widely applicable subset special relativity, as well as relativistic quantum mechanics and relativistic quantum field theory, the Lorentz transformation is the transformation rule under which all four-vectors and tensors containing physical quantities transform from one frame of reference to another. The prime examples of such four-vectors are the four-position and four-momentum of a particle, and for fields the electromagnetic tensor and stress–energy tensor. The fact that these objects transform according to the Lorentz transformation is what mathematically defines them as vectors and tensors; see tensor for a definition. Given the components of the four-vectors or tensors in some frame, the "transformation rule" allows one to determine the altered components of the same four-vectors or tensors in another frame, which could be boosted or accelerated, relative to the original frame. A "boost" should not be conflated with spatial translation, rather it's characterized by the relative velocity between frames. The transformation rule itself depends on the relative motion of the frames. In the simplest case of two inertial frames the relative velocity between enters the transformation rule. For rotating referenc
https://en.wikipedia.org/wiki/Megahertz%20myth
The megahertz myth, or in more recent cases the gigahertz myth, refers to the misconception of only using clock rate (for example measured in megahertz or gigahertz) to compare the performance of different microprocessors. While clock rates are a valid way of comparing the performance of different speeds of the same model and type of processor, other factors such as an amount of execution units, pipeline depth, cache hierarchy, branch prediction, and instruction sets can greatly affect the performance when considering different processors. For example, one processor may take two clock cycles to add two numbers and another clock cycle to multiply by a third number, whereas another processor may do the same calculation in two clock cycles. Comparisons between different types of processors are difficult because performance varies depending on the type of task. A benchmark is a more thorough way of measuring and comparing computer performance. The myth started around 1984 when comparing the Apple II with the IBM PC. The argument was that the IBM computer was five times faster than the Apple II, as its Intel 8088 processor had a clock speed roughly 4.7 times the clock speed of the MOS Technology 6502 used in the latter. However, what really matters is not how finely divided a machine's instructions are, but how long it takes to complete a given task. Consider the LDA # (Load Accumulator Immediate) instruction. On a 6502 that instruction requires two clock cycles, or 2 μs at 1 MHz. Although the 4.77 MHz 8088's clock cycles are shorter, the LDA # needs at least 4 of them, so it takes 4 / 4.77 MHz = 0.84 μs at least. So, at best, that instruction runs only a little more than 2 times as fast on the original IBM PC than on the Apple II. History Background The x86 CISC based CPU architecture which Intel introduced in 1978 was used as the standard for the DOS based IBM PC, and developments of it still continue to dominate the Microsoft Windows market. An IBM RISC based arch
https://en.wikipedia.org/wiki/Consumer%20choice
The theory of consumer choice is the branch of microeconomics that relates preferences to consumption expenditures and to consumer demand curves. It analyzes how consumers maximize the desirability of their consumption (as measured by their preferences subject to limitations on their expenditures), by maximizing utility subject to a consumer budget constraint. Factors influencing consumers' evaluation of the utility of goods include: income level, cultural factors, product information and physio-psychological factors. Consumption is separated from production, logically, because two different economic agents are involved. In the first case, consumption is determined by the individual. Their specific tastes or preferences determine the amount of utility they derive from goods and services they consume. In the second case, a producer has different motives to the consumer in that they are focussed on the profit they make. This is explained further by producer theory. The models that make up consumer theory are used to represent prospectively observable demand patterns for an individual buyer on the hypothesis of constrained optimization. Prominent variables used to explain the rate at which the good is purchased (demanded) are the price per unit of that good, prices of related goods, and wealth of the consumer. The law of demand states that the rate of consumption falls as the price of the good rises, even when the consumer is monetarily compensated for the effect of the higher price; this is called the substitution effect. As the price of a good rises, consumers will substitute away from that good, choosing more of other alternatives. If no compensation for the price rise occurs, as is usual, then the decline in overall purchasing power due to the price rise leads, for most goods, to a further decline in the quantity demanded; this is called the income effect. As the wealth of the individual rises, demand for most products increases, shifting the demand curve higher