source
stringlengths 31
227
| text
stringlengths 9
2k
|
|---|---|
https://en.wikipedia.org/wiki/Brooks%E2%80%93Iyengar%20algorithm
|
The Brooks–Iyengar algorithm or FuseCPA Algorithm or Brooks–Iyengar hybrid algorithm is a distributed algorithm that improves both the precision and accuracy of the interval measurements taken by a distributed sensor network, even in the presence of faulty sensors. The sensor network does this by exchanging the measured value and accuracy value at every node with every other node, and computes the accuracy range and a measured value for the whole network from all of the values collected. Even if some of the data from some of the sensors is faulty, the sensor network will not malfunction. The algorithm is fault-tolerant and distributed. It could also be used as a sensor fusion method. The precision and accuracy bound of this algorithm have been proved in 2016.
Background
The Brooks–Iyengar hybrid algorithm for distributed control in the presence of noisy data combines Byzantine agreement with sensor fusion. It bridges the gap between sensor fusion and Byzantine fault tolerance. This seminal algorithm unified these disparate fields for the first time. Essentially, it combines Dolev's algorithm for approximate agreement with Mahaney and Schneider's fast convergence algorithm (FCA). The algorithm assumes N processing elements (PEs), t of which are faulty and can behave maliciously. It takes as input either real values with inherent inaccuracy or noise (which can be unknown), or a real value with apriori defined uncertainty, or an interval. The output of the algorithm is a real value with an explicitly specified accuracy. The algorithm runs in O(NlogN) where N is the number of PEs. It is possible to modify this algorithm to correspond to Crusader's Convergence Algorithm (CCA), however, the bandwidth requirement will also increase. The algorithm has applications in distributed control, software reliability, High-performance computing, etc.
Algorithm
The Brooks–Iyengar algorithm is executed in every processing element (PE) of a distributed sensor network. Each PE
|
https://en.wikipedia.org/wiki/Positive-definite%20kernel
|
In operator theory, a branch of mathematics, a positive-definite kernel is a generalization of a positive-definite function or a positive-definite matrix. It was first introduced by James Mercer in the early 20th century, in the context of solving integral operator equations. Since then, positive-definite functions and their various analogues and generalizations have arisen in diverse parts of mathematics. They occur naturally in Fourier analysis, probability theory, operator theory, complex function-theory, moment problems, integral equations, boundary-value problems for partial differential equations, machine learning, embedding problem, information theory, and other areas.
Definition
Let be a nonempty set, sometimes referred to as the index set. A symmetric function is called a positive-definite (p.d.) kernel on if
holds for any , given .
In probability theory, a distinction is sometimes made between positive-definite kernels, for which equality in (1.1) implies , and positive semi-definite (p.s.d.) kernels, which do not impose this condition. Note that this is equivalent to requiring that any finite matrix constructed by pairwise evaluation, , has either entirely positive (p.d.) or nonnegative (p.s.d.) eigenvalues.
In mathematical literature, kernels are usually complex valued functions, but in this article we assume real-valued functions, which is the common practice in applications of p.d. kernels.
Some general properties
For a family of p.d. kernels
The conical sum is p.d., given
The product is p.d., given
The limit is p.d. if the limit exists.
If is a sequence of sets, and a sequence of p.d. kernels, then both and are p.d. kernels on .
Let . Then the restriction of to is also a p.d. kernel.
Examples of p.d. kernels
Common examples of p.d. kernels defined on Euclidean space include:
Linear kernel: .
Polynomial kernel: .
Gaussian kernel (RBF kernel): .
Laplacian kernel: .
Abel kernel: .
Kernel generating Sobolev spa
|
https://en.wikipedia.org/wiki/Chromatin%20remodeling
|
Chromatin remodeling is the dynamic modification of chromatin architecture to allow access of condensed genomic DNA to the regulatory transcription machinery proteins, and thereby control gene expression. Such remodeling is principally carried out by 1) covalent histone modifications by specific enzymes, e.g., histone acetyltransferases (HATs), deacetylases, methyltransferases, and kinases, and 2) ATP-dependent chromatin remodeling complexes which either move, eject or restructure nucleosomes. Besides actively regulating gene expression, dynamic remodeling of chromatin imparts an epigenetic regulatory role in several key biological processes, egg cells DNA replication and repair; apoptosis; chromosome segregation as well as development and pluripotency. Aberrations in chromatin remodeling proteins are found to be associated with human diseases, including cancer. Targeting chromatin remodeling pathways is currently evolving as a major therapeutic strategy in the treatment of several cancers.
Overview
The transcriptional regulation of the genome is controlled primarily at the preinitiation stage by binding of the core transcriptional machinery proteins (namely, RNA polymerase, transcription factors, and activators and repressors) to the core promoter sequence on the coding region of the DNA. However, DNA is tightly packaged in the nucleus with the help of packaging proteins, chiefly histone proteins to form repeating units of nucleosomes which further bundle together to form condensed chromatin structure. Such condensed structure occludes many DNA regulatory regions, not allowing them to interact with transcriptional machinery proteins and regulate gene expression. To overcome this issue and allow dynamic access to condensed DNA, a process known as chromatin remodeling alters nucleosome architecture to expose or hide regions of DNA for transcriptional regulation.
By definition, chromatin remodeling is the enzyme-assisted process to facilitate access of nucleosoma
|
https://en.wikipedia.org/wiki/Throughfall
|
In hydrology, throughfall is the process which describes how wet leaves shed excess water onto the ground surface. These drops have greater erosive power because they are heavier than rain drops. Furthermore, where there is a high canopy, falling drops may reach terminal velocity, about , thus maximizing the drop's erosive potential.
Rates of throughfall are higher in areas of forest where the leaves are broad-leaved. This is because the flat leaves allow water to collect. Drip-tips also facilitate throughfall. Rates of throughfall are lower in coniferous forests as conifers can only hold individual droplets of water on their needles.
Throughfall is a crucial process when designing pesticides for foliar application since it will condition their washing and the fate of potential pollutants in the environment.
See also
Stemflow
Canopy interception
Forest floor interception
Tree shape
Notes
Hydrology
Forest ecology
|
https://en.wikipedia.org/wiki/Model-driven%20application
|
A model-driven application is a software application that the functions or behaviors are based on, or in control of, some evolutionary applied models of the target things to the application. The applied models are served as a part of the application system in which it can be changed at runtime. The target things are what the application deals with, such as the objects and affairs in business for a business application. Follows the definition of application in TOGAF, a model-driven business application could be described as an IT system that supports business functions and services running on the models of the (things in) business.
History
The ideal of the architecture for a model-driven application was first put forward by Tong-Ying Yu on the Enterprise Engineering Forum in 1999, which have been studied and spread through some internet media for a long time. It had influence on the field of enterprise application development in China; there were successful cases of commercial development of enterprise/business applications in the architectural style of a model-driven application. Gartner Group carried out some studies into the subject in 2008; they defined the model-driven packaged applications as "enterprise applications that have explicit metadata-driven models of the supported processes, data and relationships, and that generate runtime components through metadata models, either dynamically interpreted or compiled, rather than hardcoded." The model-driven application architecture is one of few technology trends to driven the next generation of application modernization, that claimed by some industrial researchers in 2012.
Instance
Business process management (BPM) is the significant practice to the model-driven application. According to the definition, a BPM system is model-driven if the functions are operated based on the business process models which are built and changed at the operational time but not the design or implementation time; the biggest advantage
|
https://en.wikipedia.org/wiki/QCDPAX
|
The QCDPAX was a processor array designed and built jointly by the University of Tsukuba and Anritsu Corporation for the simulation of the lattice QCD.
PAX (Processor Array eXperiment) was the name of the series of the parallel computers since 1977 for the study of parallel high-speed computation
in scientific and engineering applications. The first and second machines were made at Kyoto University in 1978 and 1980 respectively, and the project was moved to the University of Tsukuba in 1981.It utilized the MIMD processor array architecture with the two-dimensional nearest-neighbor connection and the broadcasting bus.
QCDPAX was the fifth model in the PAX series. A prototype with four processing units was constructed in the April 1988, and a practical
system with 288 processing units was built in the April 1989. In the spring of 1990, it was increased with PU number to 480 and achieved a peak speed of 14GFLOPS.
Each processing unit was an independent one-board microcomputer. Motorola's microprocessor MC68020 (25 MHz) was used as the CPU.
The local memory was 4MBytes with 100ns 1Mbit DRAM. The QCDPAX utilized LSI Logic's floating-point processing unit L64133 on
the market. L64133 had peak performance of the 33MFLOPS. The floating-point processing unit controller, newly developed by the gate array, was also utilized to derive the performance from the FPU by controlling the direct memory access between the data memory and floating-point processing unit.
The QCDPAX was followed by the 2048 processor CP-PACS with a speed of 614.4 GFlops
which itself has been succeeded by a range of successively faster computers dedicated to computational physics. From the CP-PACS onwards all were located at and operated by the dedicated Center for Computational Physics of the University of Tsukuba.
|
https://en.wikipedia.org/wiki/La%20Quadrature%20du%20Net
|
La Quadrature du Net (Squaring the Net in French) is a French advocacy group that promotes digital rights and freedoms for its citizens. It advocates for French and European legislation to respect the founding principles of the Internet, most notably the free circulation of knowledge. La Quadrature du Net engages in public-policy debates concerning, for instance, freedom of speech, copyright, regulation of telecommunications and online privacy.
Etymology
The name of the group is based on squaring the circle (), an unsolvable mathematical problem. According to the collective, it is "impossible to effectively control the flow of information in the digital age by law and technology without harming public freedoms and damaging economic and social development". The collective makes an analogy with the squaring of the circle as a problem that could take ages for people to realize is impossible to solve, as initially intended.
Creation and structure
The group was founded in 2008 by free software promoters and activists.
In 2013, the collective re-organized from a de facto association to a formal (French law) association. This association was founded by 9 long-time participants or helpers of the initial collective.
Leadership
Philippe Aigrain, author of two books on information commons, is one of the co-founders of the collective and the association. Jérémie Zimmermann, also co-founder of both collective and association, is frequently invited to television programs and interviews, defending and raising awareness about the association's positions and opposition to the many projects they consider threaten fundamental liberties and the Internet (French HADOPI law, European Telecoms Package, ACTA, Net Neutrality, etc.
Actions
La Quadarature du Net gained notoriety by fighting the HADOPI law, a controversial project to establish a graduated response in France. Its action against Internet censorship and supporting Net neutrality led the Quadrature to work on subjects such as
|
https://en.wikipedia.org/wiki/Tricholoma%20equestre
|
Tricholoma equestre or Tricholoma flavovirens, commonly known as the man on horseback or yellow knight is a widely eaten but arguably toxic fungus of the genus Tricholoma that forms ectomycorrhiza with pine trees.
Known as Grünling in German, gąska zielonka in Polish, míscaro in Portuguese and canari in French, it has been treasured as an edible mushroom worldwide and is especially abundant in France and Central Portugal. Although it is regarded as quite tasty, cases of poisoning from eating T. equestre have been reported. Research has revealed it to have poisonous properties, but these claims are disputed.
Taxonomy and naming
Tricholoma equestre was known to Linnaeus who officially described it in Volume Two of his Species Plantarum in 1753, giving it the name Agaricus equestris, predating a description of Agaricus flavovirens by Persoon in 1793. Thus this specific name meaning "of or pertaining to horses" in Latin takes precedence over Tricholoma flavovirens, the other scientific name by which this mushroom has been known. It was placed in the genus Tricholoma by German Paul Kummer in his 1871 work Der Führer in die Pilzkunde. The generic name derives from the Greek trichos/τριχος 'hair' and loma/λωμα 'hem', 'fringe' or 'border'.
Common names include the man-on-horseback, yellow knight, and saddle-shaped tricholoma.
Description
The cap ranges from in width and is usually yellow with brownish areas, particularly at the centre. The stem is 4–10 cm long and 1–4 wide, is yellow, and brownish at the base. The gills are also yellow colour and the spores are white. The skin layer covering the cap is sticky and can be peeled off.
Toxicity
This species was for a long time highly regarded as one of the tastier edible species (and in some guides still is), and sold in European markets; medieval French knights allegedly reserved this species for themselves, leaving the lowly bovine bolete (Suillus bovinus) for the peasants.
Concern was first raised in southwestern Fr
|
https://en.wikipedia.org/wiki/Myelokathexis
|
Myelokathexis is a congenital disorder of the white blood cells that causes severe, chronic leukopenia (a reduction of circulating white blood cells) and neutropenia (a reduction of neutrophil granulocytes). The disorder is believed to be inherited in an autosomal dominant manner. Myelokathexis refers to retention (kathexis) of neutrophils in the bone marrow (myelo). The disorder shows prominent neutrophil morphologic abnormalities.
Myelokathexis is amongst the diseases treated with bone marrow transplantation and cord blood stem cells.
WHIM syndrome is a very rare variant of severe congenital neutropenia that presents with warts, hypogammaglobunemia, infections, and myelokathexis. A gain-of-function mutation resulting in a truncated form of CXCR4 is believed to be its cause. The truncated form of the receptor has a 2-fold increase in G-protein coupled intracellular signalling, and this mutation of the receptor can be identified by DNA sequencing.
See also
WHIM syndrome
|
https://en.wikipedia.org/wiki/Debugging
|
In computer programming and software development, debugging is the process of finding and resolving bugs (defects or problems that prevent correct operation) within computer programs, software, or systems.
Debugging tactics can involve interactive debugging, control flow analysis, unit testing, integration testing, log file analysis, monitoring at the application or system level, memory dumps, and profiling. Many programming languages and software development tools also offer programs to aid in debugging, known as debuggers.
Etymology
The terms "bug" and "debugging" are popularly attributed to Admiral Grace Hopper in the 1940s. While she was working on a Mark II computer at Harvard University, her associates discovered a moth stuck in a relay and thereby impeding operation, whereupon she remarked that they were "debugging" the system. However, the term "bug", in the sense of "technical error", dates back at least to 1878 and Thomas Edison who describes the "little faults and difficulties" of mechanical engineering as "Bugs".
Similarly, the term "debugging" seems to have been used as a term in aeronautics before entering the world of computers. In an interview Grace Hopper remarked that she was not coining the term. The moth fit the already existing terminology, so it was saved. A letter from J. Robert Oppenheimer (director of the WWII atomic bomb Manhattan Project at Los Alamos, New Mexico) used the term in a letter to Dr. Ernest Lawrence at UC Berkeley, dated October 27, 1944, regarding the recruitment of additional technical staff.
The Oxford English Dictionary entry for "debug" quotes the term "debugging" used in reference to airplane engine testing in a 1945 article in the Journal of the Royal Aeronautical Society. An article in "Airforce" (June 1945 p. 50) also refers to debugging, this time of aircraft cameras. Hopper's bug was found on September 9, 1947. Computer programmers did not adopt the term until the early 1950s.
The seminal article by Gill in 195
|
https://en.wikipedia.org/wiki/Current%20Contents
|
Current Contents is a rapid alerting service database from Clarivate, formerly the Institute for Scientific Information and Thomson Reuters. It is published online and in several different printed subject sections.
History
Current Contents was first published in paper format, in a single edition devoted only to biology and medicine. Other subject editions were added later. Initially, it consisted simply of a reproduction of the title pages from several hundred major peer-reviewed scientific journals, and was published weekly, with the issues containing title pages from journal issues only a few weeks previously, a shorter time lag than any service then available. There was an author index and a crude keyword subject index only. Author addresses were provided so readers could send reprint requests for copies of the actual articles.
Status
Still published in print, it is available as one of the databases included in Clarivate Analytics' Web of Science with daily updates, and also through other database aggregators.
Editions
The following editions are published:
Current Contents Agricultural, Biological, and Environmental Sciences
Current Contents Arts and Humanities
Current Contents Clinical Practice
Current Contents Engineering, Technology, and Applied Sciences
Current Contents Life Sciences
Current Contents Physical Chemical and Earth Sciences
Current Contents Social & Behavioral Sciences
See also
Google Scholar
List of academic databases and search engines
External links
Bibliographic databases and indexes
Clarivate
Online databases
|
https://en.wikipedia.org/wiki/Reel%20Top%2040%20Radio%20Repository
|
The Reel Top 40 Radio Repository, sometimes called REELRADIO, is a virtual museum of radio broadcasts, primarily airchecks from the "Top 40" era of radio in North America. The archives are available by streaming. Established in 1996 as the first online airchecks archive, it was transferred to a dedicated not-for-profit organization, REELRADIO, Inc., in 2000. The site was organized as a series of "collections"; most collections represent the archives of a single contributor. As of April 2018, the repository featured more than 3,568 exhibits.
Two collections are tribute sites to famed Los Angeles disc jockeys Robert W. Morgan and The Real Don Steele, and the organization also hosts other sites about the Top 40 eras at WPGC in Washington and WIXY 1260 in Cleveland.
, the board of directors includes founder Richard "Uncle Ricky" Irwin, news reporter Michael Burgess (known as Mike Scott) of KGPE (TV), and Bob Shannon (former vice president of TM Century).
History
The repository site was started as Uncle Ricky's Reel Top 40 Radio Repository on by Richard "Uncle Ricky" Irwin, who had been in the radio business for 30 years before becoming a webmaster for Sacramento Network Access. The repository was started using SNA's servers, including a RealAudio streaming media server.
Articles about the site were published in Radio World magazine on March 20, 1996 and Radio & Records on September 13, 1996. Uncle Ricky's Reel Top 40 Radio Repository was one of five Radio category nominees for the 1998 Webby Awards, and an article titled "Radio Patter From The Past: Vintage D.J's Rock On" was published in The New York Times on May 9, 2002.
After SNA was sold to PSINet, the not-for-profit corporation REELRADIO, Inc. was formed on March 23, 2000, with assistance from the Media Preservation Foundation, to collect donations for funding the site; once under the new organization, the site was moved to new hosting facilities in July.
For the first 10 years, the site was supported
|
https://en.wikipedia.org/wiki/SaferSurf
|
SaferSurf is a software product for anonymous internet surfing. Aside from offering web anonymity, it has several other features, such as a geolocation proxy service bypassing country restrictions. SaferSurf runs centrally on a server and doesn't need a local installation.
SaferSurf was created and developed by a team from Nutzwerk, a German software company headquartered in Leipzig developing internet technologies.
It obtained the TÜV certification in 2005, 2006, 2007, 2008 and 2009. It was tested for a wide range of viruses and false alarms.
Features
SaferSurf provides various features:
Malware checking: Potentially dangerous online enquiries are rooted via the SaferSurf proxy server that examines all data for malware before they reach the computer. If dangerous or undesirable data are detected, they are removed from the data stream on the internet.
Protection of anonymity: SaferSurf calls up the websites on the user's behalf, making it impossible to store the user's IP address. Also, whenever the user goes from one website to another, SaferSurf deletes the referrer information from the data stream. Finally, it provides a list of known "eavesdroppers".
Spam and phishing e-mail protection
Faster internet access: High-speed servers with 1 Gbit connections.
Access to blocked websites: the Unblock Stick lets the user bypass firewalls and other net restrictions without needing administrative rights on the machine. When private mode is set, the internet browser will not store traces of the user's activity.
Setting the maximum lifespan of cookies
Unblocking videos on YouTube and other media portals: SaferSurf's different proxy locations bypass country restrictions, while the websites maintain their full functionality because of special SSL-Proxy-Server that loads the website directly using an encrypted connection. The geolocation function allows the user to adopt the IP of a specific country.
Not storing the user's IP address: That way, even SaferSurf can't
|
https://en.wikipedia.org/wiki/Quack%20Miranda%20warning
|
The quack Miranda warning is a term used by skeptics to describe the text which the Dietary Supplement Health and Education Act of 1994 (DSHEA) requires that all labels and marketing materials for products sold as dietary supplements carry, in boldface type:
These statements have not been evaluated by the Food and Drug Administration. This product is not intended to diagnose, treat, cure or prevent any disease.
The name is a reference to the Miranda warning used by law enforcement agencies. It is also used by websites selling a variety of alternative medicine products and unproven devices.
See also
Safe harbor (law)
Nutrition facts label
|
https://en.wikipedia.org/wiki/Higher%20local%20field
|
In mathematics, a higher (-dimensional) local field is an important example of a complete discrete valuation field. Such fields are also sometimes called multi-dimensional local fields.
On the usual local fields (typically completions of number fields or the quotient fields of local rings of algebraic curves) there is a unique surjective discrete valuation (of rank 1) associated to a choice of a local parameter of the fields, unless they are archimedean local fields such as the real numbers and complex numbers. Similarly, there is a discrete valuation of rank n on almost all n-dimensional local fields, associated to a choice of n local parameters of the field. In contrast to one-dimensional local fields, higher local fields have a sequence of residue fields. There are different integral structures on higher local fields, depending how many residue fields information one wants to take into account.
Geometrically, higher local fields appear via a process of localization and completion of local rings of higher dimensional schemes. Higher local fields are an important part of the subject of higher dimensional number theory, forming the appropriate collection of objects for local considerations.
Definition
Finite fields have dimension 0 and complete discrete valuation fields with finite residue field have dimension one (it is natural to also define archimedean local fields such as R or C to have dimension 1), then we say a complete discrete valuation field has dimension n if its residue field has dimension n−1. Higher local fields are those of dimension greater than one, while one-dimensional local fields are the traditional local fields. We call the residue field of a finite-dimensional higher local field the 'first' residue field, its residue field is then the second residue field, and the pattern continues until we reach a finite field.
Examples
Two-dimensional local fields are divided into the following classes:
Fields of positive characteristic, they are forma
|
https://en.wikipedia.org/wiki/PipeRench
|
The PipeRench Reconfigurable Computing Project is a project from the Carnegie Mellon University intended to improve reconfigurable computing systems. It aims to allow hardware virtualization through high-speed reconfiguration, in order to minimize resource constraints in FPGAs and similar systems.
The project has already succeeded in manufacturing a chip and testing it. PipeRench has been licensed by a start-up—Rapport and is the basis of their Kilocore chip.
External links
PipeRench official site
Reconfigurable computing
|
https://en.wikipedia.org/wiki/Social%20earnings%20ratio
|
The social earnings ratio, sometimes abbreviated to S/E, is a single-number metric, used to measure the social impact of various organisations. The non-financial metric is similar to the price earnings ratio, but instead focuses on valuation against social impact, rather than projected earnings.
The ratio was founded in 2011 by Olinga Ta'eed and a team of financial experts, in order to find a way of measuring financial investment against real social impact. It began as a university collaboration in the United Kingdom, before becoming an internationally recognized form of measurement, when the CCEG was founded.
In 2013, it was identified in a news article as "the most rapidly adopted metric in the world".
History
The Social Earnings Ratio (S/E) is a form of measuring sentiment and converting it into financial value. The ratio began as an idea to develop a single number metric to measure social value. In November 2011, a university collaboration was formed to manage this development. Around 18 months later, the Centre for Citizenship, Enterprise and Governance (CCEG) was formed in April 2013, to act as the standards body to curate the ratio globally. The standards body would also be run as a non-profit. The Board for the CCEG was to include Professor Nick Petford, who was also the Vice-Chancellor at the University of Northampton.
Following the establishment of the CCEG, Olinga Ta'eed was the keynote speaker at the Global Citizen Forum. In early 2015, it was announced that Seratio would be launched as a spin-off organization to control the licensing of the Social Earnings Ratio platform. Barbara Mellish would be the CEO of Seratio.
By late 2015, the CCEG had over 37,500 members, including a number of key sustainability leaders. The UK Intellectual Property Office accepted the terms "Social Earnings Ratio", "S/E Ratio" and "Seratio" as having "acquired a distinctive character as a result of the use made of it." Full Registration rights have been granted. This is an
|
https://en.wikipedia.org/wiki/Bimbo%20%28comics%29
|
Bimbo was a British comic book magazine aimed at children in nursery school. It ran from 1961 until 1972 and was published by D.C. Thomson & Co. The magazine was named after its main feature Bimbo, which was a comic strip about a little boy.
The magazine was comparable to the magazine Little Star. Bimbo annuals continued to be published until the 1980s.
Characters
Bimbo drawn by Bob Dewar
Tom Thumb drawn by Dudley D. Watkins from early issues of The Beano
Patsy The Panda from the little girl's comic Twinkle.
Beezer star Baby Crockett drawn by Bill Ritchie
|
https://en.wikipedia.org/wiki/Huawei
|
Huawei Technologies Co., Ltd. ( ; ) is a Chinese multinational technology corporation headquartered in Shenzhen, Guangdong. It designs, develops, manufactures and sells telecommunications equipment, consumer electronics, smart devices and various rooftop solar products. The corporation was founded in 1987 by Ren Zhengfei, a former officer in the People's Liberation Army (PLA).
Initially focused on manufacturing phone switches, Huawei has expanded to more than 170 countries to include building telecommunications networks, providing operational and consulting services and equipment, and manufacturing communications devices for the consumer market. It overtook Ericsson in 2012 as the largest telecommunications equipment manufacturer in the world. Huawei surpassed Apple and Samsung, in 2018 and 2020, respectively, to become the largest smartphone manufacturer worldwide. Amidst its rise, Huawei has been accused of intellectual property infringement, for which it has settled with companies like Cisco.
Questions regarding the extent of state influence on Huawei have revolved around its national champions role in China, subsidies and financing support from state entities, and reactions of the Chinese government in light of oppositions in certain countries to Huawei's participation in 5G. Its software and equipment have been linked to the mass surveillance of Uyghurs and Xinjiang internment camps, drawing sanctions from the US.
The company has faced difficulties in some countries arising from concerns that its equipment may enable surveillance by the Chinese government due to perceived connections with the country's military and intelligence agencies. Huawei has argued that critics such as the US government have not shown evidence of espionage. Experts say that China's 2014 Counter-Espionage Law and 2017 National Intelligence Law can compel Huawei and other companies to cooperate with state intelligence. In 2012, Australian and US intelligence agencies concluded that a ha
|
https://en.wikipedia.org/wiki/Bal%C3%A1zs%20Szegedy
|
Balázs Szegedy is a Hungarian mathematician whose research concerns combinatorics and graph theory.
Szegedy earned a master's degree in 1998 and a PhD in 2003 from Eötvös Loránd University in Budapest. His dissertation, supervised by Péter Pál Pálfy, was about group theory and was entitled "On the Sylow and Borel subgroups of classical groups". After temporary positions at the Alfréd Rényi Institute of Mathematics, Microsoft Research, and the Institute for Advanced Study, he joined the faculty of the University of Toronto Scarborough in 2006. He returned to the Rényi Institute in 2013.
Szegedy won the Géza Grünwald Commemorative Prize for young researchers of the János Bolyai Mathematical Society in 2002. He was one of two winners of the 2009 European Prize in Combinatorics, and in 2010 he became a Sloan Fellow. With László Lovász, he was one of the winners of the 2012 Fulkerson Prize, for their joint work on graph limits. He was the 2013 winner of the Coxeter–James Prize of the Canadian Mathematical Society.
In 2018, Szegedy was an invited speaker at the International Congress of Mathematicians in Rio de Janeiro.
|
https://en.wikipedia.org/wiki/Adjoint%20state%20method
|
The adjoint state method is a numerical method for efficiently computing the gradient of a function or operator in a numerical optimization problem. It has applications in geophysics, seismic imaging, photonics and more recently in neural networks.
The adjoint state space is chosen to simplify the physical interpretation of equation constraints.
Adjoint state techniques allow the use of integration by parts, resulting in a form which explicitly contains the physically interesting quantity. An adjoint state equation is introduced, including a new unknown variable.
The adjoint method formulates the gradient of a function towards its parameters in a constraint optimization form. By using the dual form of this constraint optimization problem, it can be used to calculate the gradient very fast. A nice property is that the number of computations is independent of the number of parameters for which you want the gradient.
The adjoint method is derived from the dual problem and is used e.g. in the Landweber iteration method.
The name adjoint state method refers to the dual form of the problem, where the adjoint matrix is used.
When the initial problem consists of calculating the product and must satisfy , the dual problem can be realized as calculating the product , where must satisfy .
And
is called the adjoint state vector.
General case
The original adjoint calculation method goes back to Jean Cea, with the use of the lagrangian of the optimization problem to compute the derivative of a functional with respect to a shape parameter.
For a state variable , an optimization variable , an objective functional is defined. The state variable is often implicitly dependant on through the (direct) state equation (usually the weak form of a partial differential equation), thus the considered objective is . Usually, one would be interested in calculating using the chain rule:
Unfortunately, the term is often very hard to differentiate analytically since the de
|
https://en.wikipedia.org/wiki/The%20Annals%20of%20Applied%20Statistics
|
The Annals of Applied Statistics is a peer-reviewed scientific journal published by the Institute of Mathematical Statistics, covering all areas of statistics, featuring papers in the applied half of this range. It was established in 2007, with Bradley Efron as founding editor-in-chief. According to the Journal Citation Reports, the journal has a 2022 impact factor of 1.8.
|
https://en.wikipedia.org/wiki/Medication%20therapy%20management
|
Medication therapy management, generally called medicine use review in the United Kingdom, is a service provided typically by pharmacists, medical affairs, and RWE scientists that aims to improve outcomes by helping people to better understand their health conditions and the medications used to manage them. This includes providing education on the disease state and medications used to treat the disease state, ensuring that medicines are taken correctly, reducing waste due to unused medicines, looking for any side effects, and providing education on how to manage any side effects. The process that can be broken down into five steps: medication therapy review, personal medication record, medication-related action plan, intervention and or referral, and documentation and follow-up.
The medication therapy review has the pharmacist review all of the prescribed medications, any over the counter medications, and all dietary supplements an individual is taking. This allows the pharmacist to look for any duplications or dangerous drug interactions. This service can be especially valuable for people who are older, have several chronic conditions, take multiple medications, or are seen by multiple doctors.
United States
In 2014, the US Centers for Medicare and Medicaid Services required Part D plans to include an MTM program, which led to an expansion of services offered. MTM services are provided free to eligible patients enrolled in a plan. As of 2019, to be eligible a patient must have at least two (or three, for some plans) chronic conditions, take multiple drugs covered by Part D, and are predicted to exceed a preset amount in annual out of pocket costs for their covered Part D drugs (set at $3,967 in 2018 and $4,044 in 2019). Plans are permitted to expand MTM eligibility to patients not meeting the minimum required criteria if they so choose.
Comprehensive medication review
As part of the minimum required services, plans must provide for a comprehensive medication
|
https://en.wikipedia.org/wiki/Lola.com
|
Lola.com is a software as a service (SaaS) company based in Boston, Massachusetts. It is best known for developing corporate travel management and expense software for web browsers, the App Store and Google Play. The company was founded in 2015 by former Kayak.com executives, Paul M. English and Bill O'Donnell.
The website operates under a travel agency model for hotel and flight search information as well as booking services for businesses. It also has administrative analytics on employee travel and associated costs. Lola has received more than $80 million in funding since its foundation.
History
In July 2015, Blade, a Boston-based incubator, began focusing on a single startup. By December, English announced that Lola had emerged from stealth mode. The company's name was derived from a combination of the words "latitude" and "longitude".
It acquired HopOn, a travel booking company, in 2015 and Room77, a hotel metasearch website, in 2016. The company launched an iOS application in April 2016 where users chatted with human travel agents. That same month, it completed a $20 million Series A funding round led by General Catalyst and Accel.
The company had more than $44 million in total funding after a December 2016 Series B round led by Charles River Ventures. GV and Tenaya Capital each invested $5 million in the round, while previous investors General Catalyst and Accel also participated. In July 2017, Lola had its second major release on iOS and the Android operating system. This iteration of the application focused on business travel by adding self-service hotel and flight booking and personalized travel recommendations.
In July 2018, English announced he would assume the role of chief technology officer at Lola, with Mike Volpe, the chief marketing officer at Cybereason, becoming the company's chief executive officer. Lola announced a five-year exclusive partnership with American Express Global Business Travel in November 2018 to sell its travel management sof
|
https://en.wikipedia.org/wiki/Jacobi%20operator
|
A Jacobi operator, also known as Jacobi matrix, is a symmetric linear operator acting on sequences which is given by an infinite tridiagonal matrix. It is commonly used to specify systems of orthonormal polynomials over a finite, positive Borel measure. This operator is named after Carl Gustav Jacob Jacobi.
The name derives from a theorem from Jacobi, dating to 1848, stating that every symmetric matrix over a principal ideal domain is congruent to a tridiagonal matrix.
Self-adjoint Jacobi operators
The most important case is the one of self-adjoint Jacobi operators acting on the Hilbert space of square summable sequences over the positive integers . In this case it is given by
where the coefficients are assumed to satisfy
The operator will be bounded if and only if the coefficients are bounded.
There are close connections with the theory of orthogonal polynomials. In fact, the solution of the recurrence relation
is a polynomial of degree n and these polynomials are orthonormal with respect to the spectral measure corresponding to the first basis vector .
This recurrence relation is also commonly written as
Applications
It arises in many areas of mathematics and physics. The case a(n) = 1 is known as the discrete one-dimensional Schrödinger operator. It also arises in:
The Lax pair of the Toda lattice.
The three-term recurrence relationship of orthogonal polynomials, orthogonal over a positive and finite Borel measure.
Algorithms devised to calculate Gaussian quadrature rules, derived from systems of orthogonal polynomials.
Generalizations
When one considers Bergman space, namely the space of square-integrable holomorphic functions over some domain, then, under general circumstances, one can give that space a basis of orthogonal polynomials, the Bergman polynomials. In this case, the analog of the tridiagonal Jacobi operator is a Hessenberg operator – an infinite-dimensional Hessenberg matrix. The system of orthogonal polynomials is given by
and . H
|
https://en.wikipedia.org/wiki/High%20memory
|
High memory is the part of physical memory in a computer which is not directly mapped by the page tables of its operating system kernel. The phrase is also sometimes used as shorthand for the High Memory Area, which is a different concept entirely.
Some operating system kernels, such as Linux, divide their virtual address space into two regions, devoting the larger to user space and the smaller to the kernel. In current 32-bit x86 computers, this commonly (although does not have to, as this is a configurable option) takes the form of a 3GB/1GB split of the 4 GB address space, so kernel virtual addresses start at 0xC0000000 and go to 0xFFFFFFFF. The lower 896 MB, from 0xC0000000 to 0xF7FFFFFF, is directly mapped to the kernel physical address space, and the remaining 128 MB, from 0xF8000000 to 0xFFFFFFFF, is used on demand by the kernel to be mapped to high memory. When in user mode, translations are only effective for the first region, thus protecting the kernel from user programs, but when in kernel mode, translations are effective for both regions, thus giving the kernel an easy way to refer to the buffers of processes—it just uses the process' own mappings.
However, if the kernel needs to refer to physical memory for which a userspace translation has not already been provided, it has only 1 GB (for example) of virtual memory to use. On computers with a lot of physical memory, this can mean that there exists memory that the kernel cannot refer to directly—this is called high memory. When the kernel wishes to address high memory, it creates a mapping on the fly and destroys the mapping when done, which incurs a performance penalty.
See also
Physical Address Extension (PAE)
|
https://en.wikipedia.org/wiki/Roderick%20Melnik
|
Roderick Melnik is a Canadian-Australian mathematician and scientist, internationally known for his research in applied mathematics, numerical analysis, and mathematical modeling for scientific and engineering applications.
Biography
Melnik is a Tier I Canada Research Chair in Mathematical Modeling and Professor at Wilfrid Laurier University in Waterloo, Canada. His other affiliations include the University of Waterloo and University of Guelph.
Education and career
He earned his Ph.D. at Kiev State University in the late 1980s. According to the Mathematics Genealogy Project, his scientific ancestors include A. Tikhonov and other outstanding mathematicians and scientists.
Before moving to Canada as a Tier I Canada Research Chair, Melnik gained a worldwide reputation in mathematical modelling and applied mathematics, while working in Europe, Australia, and the United States.
Awards and honors
Melnik is a recipient of many fellowships and awards, including the Andersen fellowship at Syddansk Universitet in Denmark, the Isaac Newton Institute visiting fellowship at the University of Cambridge in England, the Ikerbasque Fellowship in Spain, the fellowship of the Institute of Advanced Studies at the University of Bologna in Italy, and others. He is a life member of the Canadian Applied and Industrial Mathematics Society. Melnik is the director of the Laboratory of Mathematical Modeling for New Technologies (M2NeT Lab) in Waterloo, Ontario, Canada.
Research
In his early works Melnik studied fully coupled hyperbolic-elliptic models applied in dynamic piezoelectricity theory. Such models, originally proposed by W. Voigt in 1910, have found many applications, and Melnik was the first to rigorously prove well-posedness of a large class of such models in the dynamic case. The piezoelectric effect itself, captured by such models, was discovered in 1880 by Pierre and Jacques Curie. Mathematical models describing this effect in time-dependent situations are based on i
|
https://en.wikipedia.org/wiki/HipChat
|
HipChat was a web service for internal private online chat and instant messaging. As well as one-on-one and group/topic chat, it also featured cloud-based file storage, video calling, searchable message-history and inline-image viewing. The software was available to download onto computers running Windows, Mac or Linux, as well as Android and iOS smartphones and tablets. Since 2014, HipChat used a freemium model, as much of the service was free with some additional features requiring organizations to pay per month. HipChat was launched in 2010 and acquired by Atlassian in 2012. In September 2017, Atlassian replaced the cloud-based HipChat with a new cloud product called Stride, with HipChat continuing on as the client-hosted HipChat Data Center.
In July 2018, Atlassian announced a partnership with Slack under which Slack would acquire the codebase and related IP assets of HipChat and Stride from Atlassian. Following this, HipChat and Stride customers were migrated to the Slack group collaboration platform in a transition that was completed by February 2019.
History
HipChat was founded by Chris Rivers, Garret Heaton, and Pete Curley, who studied together at Rensselaer Polytechnic Institute (RPI) and also created HipCal and Plaxo Pulse. They launched the first HipChat beta on December 13, 2009.
HipChat was made available to the public starting January 25, 2010.
On March 22, 2010, HipChat launched a web chat beta which allowed users to chat via the browser in addition to the existing Windows, Mac and Linux client. HipChat's web client came out of beta and SMS chat support was added on April 16, 2010. On May 12, 2010, HipChat unveiled its official API. HipChat is mainly written in PHP and Python using the Twisted software framework, but uses other third-party services.
On July 19, 2010, the team moved into an office in Sunnyvale, California. Co-founder Pete Curley announced that HipChat had secured $100,000 in funding on August 10, 2010. This round of seed fundin
|
https://en.wikipedia.org/wiki/Adonit
|
Adonit is a privately owned multinational corporation based in Austin, Texas and Taipei, Taiwan. Founded in 2010 with a Kickstarter campaign, the company provides consumer electronics and software, including capacitive styluses, mobile apps and SDKs primarily for the Apple iPad.
In 2012, Adonit launched Jot Touch, its first connected bluetooth stylus with pressure sensitivity. It was regarded as the most precise pressure-sensitive stylus for the iPad. In 2013, Adonit developed Pixelpoint technology to build the first 1.9 mm tip, making it the smallest iOS stylus tip on the market. Jot Script, the first stylus with Pixelpoint technology, was designed to provide a natural handwriting experience for notetakers.
|
https://en.wikipedia.org/wiki/Briefings%20in%20Bioinformatics
|
Briefings in Bioinformatics is a peer-reviewed scientific journal covering bioinformatics, including reviews of databases and analytical tools for genetics and molecular biology. It also publishes primary research papers on novel bioinformatic models and tools. It is published by Oxford University Press. The EMBnet community was initially involved in the creation of the journal. BiB was also supported by an educational grant from EMBnet.
Abstracting and indexing
The journal is abstracted and indexed in:
According to the Journal Citation Reports, the journal had a 2021 impact factor of 13.994.
|
https://en.wikipedia.org/wiki/Mean%20of%20a%20function
|
In calculus, and especially multivariable calculus, the mean of a function is loosely defined as the average value of the function over its domain. In one variable, the mean of a function f(x) over the interval (a,b) is defined by:
Recall that a defining property of the average value of finitely many numbers
is that . In other words, is the constant value which when
added to itself times equals the result of adding the terms . By analogy, a
defining property of the average value of a function over the interval is that
In other words, is the constant value which when integrated over equals the result of
integrating over . But the integral of a constant is just
See also the first mean value theorem for integration, which guarantees
that if is continuous then there exists a point such that
The point is called the mean value of on . So we write
and rearrange the preceding equation to get the above definition.
In several variables, the mean over a relatively compact domain U in a Euclidean space is defined by
This generalizes the arithmetic mean. On the other hand, it is also possible to generalize the geometric mean to functions by defining the geometric mean of f to be
More generally, in measure theory and probability theory, either sort of mean plays an important role. In this context, Jensen's inequality places sharp estimates on the relationship between these two different notions of the mean of a function.
There is also a harmonic average of functions and a quadratic average (or root mean square) of functions.
See also
Mean
Means
Calculus
|
https://en.wikipedia.org/wiki/OpenEdge
|
Global Payments Integrated (formerly OpenEdge Payments, LLC) is an American company providing financial technology services via payment processing integration. Headquartered in Lindon, Utah, Global Payments Integrated is a subsidiary of Global Payments whose stock is a component of the S&P 500 stock market index.
Business
Global Payments Integrated provides payment processing services to merchants, allowing them to accept credit and debit cards, along with other payment types (this role is known as a merchant acquirer). In return, they receive a percentage of the transaction value (usually about 1-2% for credit cards). They provide these services both directly to merchants, and indirectly through other financial organizations. Global Payments Integrated also develops new software for clients to better integrate with existing systems.
Global Payments Integrated's parent organization is a Fortune 1000 company.
History
In October 2012, Global Payments acquired the smaller Accelerated Payment Technologies for $413 million.
In January 2015, it bought Payment Processing (also known as PayPros), a California company, for $420 million. Accelerated Payment Technologies and PayPros operated under the new name of OpenEdge.
In 2018, Global Payments completed acquisition of AdvancedMD - a partner of OpenEdge Payments.
On May 28, 2019, Global Payments announced a $21.5 billion merger with TSYS. The merger is expected to trigger a Federal Trade Commission investigation. OpenEdge Payments's role in the merger is unclear at this time.
|
https://en.wikipedia.org/wiki/Negative%20frequency
|
In mathematics, signed frequency (negative and positive frequency) expands upon the concept of frequency, from just an absolute value representing how often some repeating event occurs, to also have a positive or negative sign representing one of two opposing orientations for occurrences of those events. The following examples help illustrate the concept:
For a rotating object, the absolute value of its frequency of rotation indicates how many rotations the object completes per unit of time, while the sign could indicate whether it is rotating clockwise or counterclockwise.
Mathematically speaking, the vector has a positive frequency of +1 radian per unit of time and rotates counterclockwise around the unit circle, while the vector has a negative frequency of -1 radian per unit of time, which rotates clockwise instead.
For a harmonic oscillator such as a pendulum, the absolute value of its frequency indicates how many times it swings back and forth per unit of time, while the sign could indicate in which of the two opposite directions it started moving.
For a periodic function represented in a Cartesian coordinate system, the absolute value of its frequency indicates how often in its domain it repeats its values, while changing the sign of its frequency could represent a reflection around its y-axis.
Sinusoids
Let be a nonnegative angular frequency with units of radians per unit of time and let be a phase in radians. A function has slope When used as the argument of a sinusoid, can represent a negative frequency.
Because cosine is an even function, the negative frequency sinusoid is indistinguishable from the positive frequency sinusoid
Similarly, because sine is an odd function, the negative frequency sinusoid is indistinguishable from the positive frequency sinusoid or
Thus any sinusoid can be represented in terms of positive frequencies only.
The sign of the underlying phase slope is ambiguous. Because leads by radians (or cycle) for posi
|
https://en.wikipedia.org/wiki/Binomial%20%28polynomial%29
|
In algebra, a binomial is a polynomial that is the sum of two terms, each of which is a monomial. It is the simplest kind of a sparse polynomial after the monomials.
Definition
A binomial is a polynomial which is the sum of two monomials. A binomial in a single indeterminate (also known as a univariate binomial) can be written in the form
where and are numbers, and and are distinct non-negative integers and is a symbol which is called an indeterminate or, for historical reasons, a variable. In the context of Laurent polynomials, a Laurent binomial, often simply called a binomial, is similarly defined, but the exponents and may be negative.
More generally, a binomial may be written as:
Examples
Operations on simple binomials
The binomial can be factored as the product of two other binomials:
This is a special case of the more general formula:
When working over the complex numbers, this can also be extended to:
The product of a pair of linear binomials and is a trinomial:
A binomial raised to the th power, represented as can be expanded by means of the binomial theorem or, equivalently, using Pascal's triangle. For example, the square of the binomial is equal to the sum of the squares of the two terms and twice the product of the terms, that is:
The numbers (1, 2, 1) appearing as multipliers for the terms in this expansion are the binomial coefficients two rows down from the top of Pascal's triangle. The expansion of the th power uses the numbers rows down from the top of the triangle.
An application of the above formula for the square of a binomial is the "-formula" for generating Pythagorean triples:
For , let , , and ; then .
Binomials that are sums or differences of cubes can be factored into smaller-degree polynomials as follows:
See also
Completing the square
Binomial distribution
List of factorial and binomial topics (which contains a large number of related links)
Notes
|
https://en.wikipedia.org/wiki/Bor%C5%AFvka%27s%20algorithm
|
Borůvka's algorithm is a greedy algorithm for finding a minimum spanning tree in a graph,
or a minimum spanning forest in the case of a graph that is not connected.
It was first published in 1926 by Otakar Borůvka as a method of constructing an efficient electricity network for Moravia.
The algorithm was rediscovered by Choquet in 1938; again by Florek, Łukasiewicz, Perkal, Steinhaus, and Zubrzycki in 1951; and again by Georges Sollin in 1965. This algorithm is frequently called Sollin's algorithm, especially in the parallel computing literature.
The algorithm begins by finding the minimum-weight edge incident to each vertex of the graph, and adding all of those edges to the forest.
Then, it repeats a similar process of finding the minimum-weight edge from each tree constructed so far to a different tree, and adding all of those edges to the forest.
Each repetition of this process reduces the number of trees, within each connected component of the graph, to at most half of this former value,
so after logarithmically many repetitions the process finishes. When it does, the set of edges it has added forms the minimum spanning forest.
Pseudocode
The following pseudocode illustrates a basic implementation of Borůvka's algorithm.
In the conditional clauses, every edge uv is considered cheaper than "None". The purpose of the completed variable is to determine whether the forest F is yet a spanning forest.
If edges do not have distinct weights, then a consistent tie-breaking rule must be used, e.g. based on some total order on vertices or edges.
This can be achieved by representing vertices as integers and comparing them directly; comparing their memory addresses; etc.
A tie-breaking rule is necessary to ensure that the created graph is indeed a forest, that is, it does not contain cycles. For example, consider a triangle graph with nodes {a,b,c} and all edges of weight 1. Then a cycle could be created if we select ab as the minimal weight edge for {a}, bc for {b},
|
https://en.wikipedia.org/wiki/Elastic%20collision
|
In physics, an elastic collision is an encounter (collision) between two bodies in which the total kinetic energy of the two bodies remains the same. In an ideal, perfectly elastic collision, there is no net conversion of kinetic energy into other forms such as heat, noise, or potential energy.
During the collision of small objects, kinetic energy is first converted to potential energy associated with a repulsive or attractive force between the particles (when the particles move against this force, i.e. the angle between the force and the relative velocity is obtuse), then this potential energy is converted back to kinetic energy (when the particles move with this force, i.e. the angle between the force and the relative velocity is acute).
Collisions of atoms are elastic, for example Rutherford backscattering.
A useful special case of elastic collision is when the two bodies have equal mass, in which case they will simply exchange their momenta.
The molecules—as distinct from atoms—of a gas or liquid rarely experience perfectly elastic collisions because kinetic energy is exchanged between the molecules’ translational motion and their internal degrees of freedom with each collision. At any instant, half the collisions are, to a varying extent, inelastic collisions (the pair possesses less kinetic energy in their translational motions after the collision than before), and half could be described as “super-elastic” (possessing more kinetic energy after the collision than before). Averaged across the entire sample, molecular collisions can be regarded as essentially elastic as long as Planck's law forbids energy from being carried away by black-body photons.
In the case of macroscopic bodies, perfectly elastic collisions are an ideal never fully realized, but approximated by the interactions of objects such as billiard balls.
When considering energies, possible rotational energy before and/or after a collision may also play a role.
Equations
One-dimensional Ne
|
https://en.wikipedia.org/wiki/Internet%20outage
|
An Internet outage or Internet blackout or Internet shutdown is the complete or partial failure of the internet services. It can occur due to censorship, cyberattacks, disasters, police or security services actions or errors.
Disruptions of submarine communications cables may cause blackouts or slowdowns to large areas. Countries with a less developed Internet infrastructure are more vulnerable due to small numbers of high-capacity links.
A line of research finds that the Internet with it having a "hub-like" core structure that makes it robust to random losses of nodes but also fragile to targeted attacks on key components − the highly connected nodes or "hubs".
Types
Government blackout
A government internet blackout is the deliberate shut down of civilian internet access by a government for a small area or many large areas of its country. Such a shut down is typically used as a means of information control in a brief period of upheaval or transition. In autocracies, internet shutdowns have appeared especially in the context of contested elections and post-electoral violence. It can impede the ability of protesters or insurgent forces to mobilize and organize. It also serves to prevent real-time information access for foreign people or entities. Reactions from leaders, journalists, observers and others in foreign countries can be delayed.
Military blackout
The temporary disconnection of civilian internet access by military forces is an important aspect of information warfare. This tactic is common today, and is often used in concert with a ground invasion by conventional forces. It could also be used in advance of an airstrike campaign.
Weather or natural disaster
Extreme weather events and natural disasters can lead to internet outages by either directly destroying local ICT infrastructure or indirectly damaging the local electricity grid. The Monash IP Observatory and KASPR Datahaus have tracked the impact of Hurricane Florence 2018, Cyclone Fani 2018,
|
https://en.wikipedia.org/wiki/Industrial%20Internet%20Consortium
|
The Industrial Internet Consortium rebranded as the Industry IoT Consortium in August 2021. The Industry IoT Consortium is a program of the Object Management Group (OMG).
The Industry IoT Consortium (IIC) is an open membership organization, with 159 members as of 27 September 2021. The IIC was formed to accelerate the development, adoption and widespread use of interconnected machines and devices and intelligent analytics. Founded by AT&T, Cisco, General Electric, IBM, and Intel in March 2014, the IIC catalyzes and coordinates the priorities and key technologies of the Industrial Internet. In August 2021, the organization changed its mission to deliver transformative business value to industry, organizations, and society by accelerating adoption of a trustworthy internet of things. No products or services are sold.
Its current executive director is Richard Soley. Stephen J. Mellor serves as Chief Technical Officer for the Industry IoT Consortium.
History
The Industrial Internet Consortium (IIC) was founded on 27 March 2014 by AT&T, Cisco, General Electric, IBM, and Intel. Though its parent company is the Object Management Group, the IIC is not a standards organization. Rather, the consortium was formed to bring together industry players — from multinational corporations, small and large technology innovators to academia and governments — to accelerate the development, adoption and widespread use of Industrial Internet technologies.
The mission has changed over the years from a focus on growing an industrial internet market to one more focussed on connectivity and trustworthiness to one focused on digital transformation and deployments. The mission, from August 2020, was "To deliver transformative business value to organizations, industry and society by accelerating adoption of a trustworthy internet of things".
Specifically, the IIC members are concerned with creating an ecosystem for insight and thought leadership, interoperability and security via reference
|
https://en.wikipedia.org/wiki/Gold%20leaf
|
Gold leaf is gold that has been hammered into thin sheets (usually around 0.1 µm thick) by a process known as goldbeating, for use in gilding.
Gold leaf is a type of metal leaf, but the term is rarely used when referring to gold leaf. The term metal leaf is normally used for thin sheets of metal of any color that do not contain any real gold. Gold leaf is available in a wide variety of karats and shades. The most commonly used gold is 22-karat yellow gold. Pure gold is 24 karat. Real, yellow gold leaf is approximately 91.7% pure (i.e. 22-karat) gold.
Traditional water gilding is the most difficult and highly regarded form of gold leafing. It has remained virtually unchanged for hundreds of years and is still done by hand.
History
5,000 years ago, Egyptian artisans recognized the extraordinary durability and malleability of gold and became the first goldbeaters and gilders. They pounded gold using a round stone to create the thinnest leaf possible. Except for the introduction of a cast-iron hammer and a few other innovations, the tools and techniques have remained virtually unchanged for thousands of years.
Gold-leaf forging is a traditional handicraft in Nanjing (China), produced as early as the Three Kingdoms (220 – 280 AD) and Two Jins (266 – 420) dynasties; it was used in Buddha-statue manufacturing and construction. It was widely used in the gilding of Buddha statues and idols and in the construction industry during the Eastern Wu (222-280) and Eastern Jin (266–420) dynasties. During the Qing dynasty (1640-1912), the technology developed, and Nanjing gold leaf was sold overseas. It retains traditional smelting, hand-beating and other techniques, and the gold leaf is pure, uniform and soft. On May 20, 2006, it was included in the first batch of national intangible cultural heritage representative items. Modern gold-leaf artists combine ancient traditional crafts with modern technology to make traditional gold leaf. Forging skills are more sophisticated.
|
https://en.wikipedia.org/wiki/ISO/IEC%2027019
|
ISO/IEC TR 27019 is a security standard, part of the ISO/IEC 27000 family of standards. It was published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) under the joint ISO and IEC subcommittee, ISO/IEC JTC 1/SC 27.
It is based on ISO/IEC 27002, but it is applied for energy management (to control generation, transmission, storage and distribution of electric power) and for the control of associated supporting processes. It is not applied to the process control of nuclear facilities and it is not applied to telecommunication systems and components used in the process control environment. ISO/IEC TR 27019 first version was published on July 2013. and its latest version was published on November 27 of 2017.
Versions
That standard has two versions:
ISO/IEC 27019:2013
ISO/IEC 27019:2017
|
https://en.wikipedia.org/wiki/Comparison%20of%20Business%20Process%20Model%20and%20Notation%20modeling%20tools
|
This article provides a comparison of Business Process Model and Notation (BPMN) tools.
General
|
https://en.wikipedia.org/wiki/Restoration%20economy
|
The restoration economy is the economic activity associated with regenerative land use, such as ecological restoration activities. It stands in contrast to economic activity premised on sprawl, or on the extraction or depletion of natural resources. The term is meant to convey that activities meant to repair past damage to natural and human communities are often economically beneficial at local, regional, and national scales.
Overview
The "restoration economy" refers to economic growth that's based on repurposing, renewing and reconnecting the natural, built and socioeconomic environments. The phrase gained popularity with the publication in 2002 of The Restoration Economy by Storm Cunningham. That book created an eight-sector taxonomy for "restorative development", with a chapter on each. Four professional / technical / scientific sectors primarily focused on the built environment: brownfields remediation, infrastructure renewal, heritage restoration and catastrophe reconstruction. The other four sectors primarily focused on the natural environment: ecological restoration, watershed restoration, fishery restoration and regenerative agriculture. All eight sectors help to revitalize the socioeconomic environment.
On the natural resources side of the equation, the “restoration economy” refers to the employment, capital, resources, and economic activity that emerge from investments in ecological restoration, or “the process of assisting the recovery of an ecosystem that has been degraded, damaged, or destroyed.” Restoration projects can include habitat enhancement, water quality improvement, invasive species removal, forest thinning for canopy diversification, or any other activity that aims to improve the natural function of an ecosystem. While investments in restoration benefit the environment, restoration projects also require workers, materials, and services to implement. The marketplace for these goods and services can create employment, spur business and wo
|
https://en.wikipedia.org/wiki/Laser%20TV
|
Laser color television (laser TV), or laser color video display, is a type of television that utilizes two or more individually modulated optical (laser) rays of different colors to produce a combined spot that is scanned and projected across the image plane by a polygon-mirror system or less effectively by optoelectronic means to produce a color-television display. The systems work either by scanning the entire picture a dot at a time and modulating the laser directly at high frequency, much like the electron beams in a cathode ray tube, or by optically spreading and then modulating the laser and scanning a line at a time, the line itself being modulated in much the same way as with digital light processing (DLP).
The special case of one ray reduces the system to a monochrome display as, for example, in black and white television. This principle applies to a direct view display as well as to a (front or rear) laser projector system.
Laser TV technology began to appear in the 1990s. In the 21st century, the rapid development and maturity of semiconductor lasers and other technologies gave it new advantages.
History
The laser source for television or video display was originally proposed by Helmut K.V. Lotsch in the German Patent 1 193 844. In December 1977 H.K.V. Lotsch and F. Schroeter explained laser color television for conventional as well as projection-type systems and gave examples of potential applications. 18 years later the German-based company Schneider AG presented a functional laser-TV prototype at IFA'95 in Berlin/Germany. Due to the bankruptcy of Schneider AG, however, the prototype was never developed further to a market-ready product.
Proposed in 1966, laser illumination technology remained too costly to be used in commercially viable consumer products.
At the Las Vegas Consumer Electronics Show in 2006, Novalux Inc., developer of Necsel semiconductor laser technology, demonstrated their laser illumination source for projection displays and a
|
https://en.wikipedia.org/wiki/Dry%20milling%20and%20fractionation%20of%20grain
|
Dry milling of grain is mainly utilized to manufacture feedstock into consumer and industrial based products. This process is widely associated with the development of new bio-based associated by-products. The milling process separates the grain into four distinct physical components: the germ, flour, fine grits, and coarse grits. The separated materials are then reduced into food products utilized for human and animal consumption.
It is estimated that 165 million bushels of corn are dry-milled per year. Currently, dry milling is mainly focused on corn-based products for human and animal consumption, or utilized during fuel ethanol production. The main objective of the dry-milling process is to separate the endosperm, which is mainly composed of starch, from the germ and pericarp fibers as much as possible.
Features
The dry milling process includes a number of unique features:
Physical separation (size/density) based on mass
No use of chemicals
Maximizing surface area of solids for processing
Resource pulping
Minimal water use, if any (short tempering)
Note: Water is not used as a separation agent
Low capital cost
Lower separation compared to wet milling
Lower concentration of starch, protein, fiber, and oil relative to wet milling
The most utilized grinding mills include pin, hammer, and disk mills, but many machines are utilized for more specific processes. To maintain a high starch extraction, the grains will go through a degermination process. This process removes the germ and fiber (pericarp) first, and the endosperm is recovered in several sizes: grits, cones, meal, and flow. It is important to note that the gluten protein matrix is not separated from the starch.
Yields
The table below is a compilation of particle size and yield of milled maize products.
Uses
Currently, products of dry milled corn products are used mostly in animal food, brewing and breakfast cereals industries.
Grits/Cones
Breakfast cereals
Snack foods
Pet foods
Corn b
|
https://en.wikipedia.org/wiki/Hydraulic%20calculation
|
Water transportation and distribution networks require hydraulic calculations to determination the flowrate and pressure characteristics at one or several consumption points and the water supply flowrate and pressures needed to meet the design requirements.
In the context of fire safety, hydraulic calculations are used to determine the flow of an extinguishing medium through a piping network and through discharge devices (e.g., nozzles, sprinklers) to control, suppress, or extinguish fires.
Fire safety calculations
Hydraulic calculations verify that the water flowrate (or water mixed with additives like firefighting foam concentrate) through piping networks for the purpose of suppressing or extinguishing a fire will be sufficient to meet design objectives. The hydraulic calculation procedure is defined in the applicable reference model codes such as that published by the US-based National Fire Protection Association (NFPA), or the EN 12845 standard, Fixed firefighting system – Automatic sprinkler systems – Design, installation and maintenance.
Hydraulic calculations indicate that the combination of the two primary components of a water based fire protection system will meet the design objectives to control, suppress, or extinguish a fire:
The available water supply is sufficient in flowrate and pressure.
The pipe sizes and piping network arrangement that deliver the water to the outlets (e.g., sprinklers) are sized and arranged adequately.
Water delivery requirements
Requirements for the quantity of water discharge are specified by an applicable model code such as NFPA 13, NFPA 15, EN 12845, BS 9251, NFPA 750 CP 52, ASIB, and AS2118.1. Property insurance design standards may also apply.
The probable intensity and extent of a fire inside the building are indicated by factors including the building use, the building height, the items contained inside the building and their arrangement. These variables are compared to tables and values expressed in the model c
|
https://en.wikipedia.org/wiki/Murray%20Batchelor
|
Murray Thomas Batchelor (born 27 August 1961) is an Australian mathematical physicist. He is best known for his work in mathematical physics and theoretical physics.
Academic career
Batchelor was educated at Chatham Public School and Chatham High School (Taree, New South Wales). He completed an Honours degree in Theoretical Physics at the University of New South Wales in 1983, graduating with 1st class honours and a University Medal. Batchelor completed a PhD in Mathematics at the Australian National University in 1987.
His first postdoctoral research position was at the Lorentz Institute in Leiden. After a time as a postdoctoral research fellow in mathematics at the University of Melbourne he took up an Australian Research Council QEII Fellowship at the Australian National University. He then was awarded two successive ARC Senior Research Fellowships, followed by an ARC Professorial Fellowship in 2003.
Batchelor served as Head of the Department of Theoretical Physics from mid-2005 to March 2013. He has held visiting positions at a number of universities, including the University of Oxford, the University of Tokyo and Institut Henri Poincaré. He held a Visiting Fellowship at All Souls College, Oxford during Michaelmas Term 2013.
During his career, Batchelor has published over 150 peer-reviewed papers. He is a Fellow of the Australian Mathematical Society, the Australian Institute of Physics and the Institute of Physics (UK).
Batchelor was Editor-in-Chief of Journal of Physics A: Mathematical and Theoretical. Prior to this he served as Mathematical Physics Section Editor (2007–2008) and as a member of the Editorial Board (2005–2006). He is currently Topical Reviews Editor (2014-).
In 2008 Batchelor was awarded an Honorary Professorship at Chongqing University, China. He took up a full-time position there in 2013 under the 1000 Talents Plan. He is a General Council Member of the Asia-Pacific Center for Theoretical Physics.
He holds a part-time position at the A
|
https://en.wikipedia.org/wiki/Type-I%20superconductor
|
The interior of a bulk superconductor cannot be penetrated by a weak magnetic field, a phenomenon known as the Meissner effect. When the applied magnetic field becomes too large, superconductivity breaks down. Superconductors can be divided into two types according to how this breakdown occurs. In type-I superconductors, superconductivity is abruptly destroyed via a first order phase transition when the strength of the applied field rises above a critical value Hc. This type of superconductivity is normally exhibited by pure metals, e.g. aluminium, lead, and mercury. The only alloy known up to now which exhibits type I superconductivity is tantalum silicide (TaSi2).
The covalent superconductor SiC:B, silicon carbide heavily doped with boron, is also type-I.
Depending on the demagnetization factor, one may obtain an intermediate state. This state, first described by Lev Landau, is a phase separation into macroscopic non-superconducting and superconducting domains forming a Husimi Q representation.
This behavior is different from type-II superconductors which exhibit two critical magnetic fields. The first, lower critical field occurs when magnetic flux vortices penetrate the material but the material remains superconducting outside of these microscopic vortices. When the vortex density becomes too large, the entire material becomes non-superconducting; this corresponds to the second, higher critical field.
The ratio of the London penetration depth λ to the superconducting coherence length ξ determines whether a superconductor is type-I or type-II. Type-I superconductors are those with , and type-II superconductors are those with .
|
https://en.wikipedia.org/wiki/Sterling%20ratio
|
The Sterling ratio (SR) is a measure of the risk-adjusted return of an investment portfolio.
While multiple definitions of the Sterling ratio exist, it measures return over average drawdown, versus the more commonly used max drawdown. While the max drawdown looks back over the entire period and takes the worst point along that equity curve, a quick change of the look back allows one to see what the worst peak to valley loss was for each calendar year as well. From there, the drawdowns of each year are averaged to come up with an average annual drawdown. The original definition was most likely suggested by Deane Sterling Jones (a company no longer in existence):
If the drawdown is put in as a negative number, then subtract the 10%, and then multiply the whole thing by a negative to result in a positive ratio. If the drawdown is put in as a positive number, then add 10% and the result is the same positive ratio.
To clarify the reason he (Deane Sterling Jones) used 10% in the denominator was to compare any investment with a return stream to a risk-free investment (T-bills). He invented the ratio in 1981 when t-bills were yielding 10%. Since bills did not experience drawdowns (and a ratio of 1.0 at that time), he felt that any investment with a ratio greater than 1.0 had a better risk/reward tradeoff. The average drawdown was always averaged and entered as a positive number and then 10% was added to that value.
This version of the Sterling ratio may be adjusted to something more like a Sharpe ratio as follows:
See also
Risk return ratio
Sortino ratio
|
https://en.wikipedia.org/wiki/Stuart%20Turner%20%28engineer%29
|
Sidney Marmaduke Stuart Turner (1869 – April 1938) was an English engineer. He was the founder of the company Stuart Turner Ltd.
Biography
Turner was born in Shepherd's Bush, London in 1869. Little is known about his childhood or adolescence although it is known that his family's ambitions for him did not include becoming an engineer.
Career
After a series of other jobs including an apprenticeship on the Clyde building marine engines, a period at sea and working as an engineer in Jersey (where he installed electricity generating plant), Turner gained employment in 1897 looking after the steam generating plant at Shiplake Court near Henley-on-Thames, England. In those days mains electricity was rare and therefore most large houses had their own electricity generating plants.
It was while working at Shiplake that Turner designed his No.1 Model Steam Engine. He drew up the patterns which he then sent away to be cast. On their return he machined and assembled them and soon showed the finished model at a local exhibition. He then approached Percival Marshall the editor of Model Engineer magazine who wrote an article about the engine. This coverage brought an immediate response and orders for sets of castings flooded in, and a business was established in 1898. He was joined in the business by Alexander Frederick (Alec) Plint in 1903, who he had worked with in Jersey and was trained in electrical engineering. This business produced an unusual mixture of small mainly two-stroke engines used in boats, generators, as well as model engines and castings aimed at the model engineering market. They also briefly made a motorcycle and the Stuart lathe, and latterly a range of centrifugal pumps. The name Stuart Turner is eponymous with small quality models, and many of the steam models and rarer internal combustion models are much sought after by collectors.
The Stuart Turner Ltd company was established in 1906 in Henley-on-Thames.
Death
Stuart Turner left the firm in 1920 and
|
https://en.wikipedia.org/wiki/Deferribacteraceae
|
The Deferribacteraceae are a family of gram-negative bacteria which make energy by anaerobic respiration.
Description
Deferribacteraceae are rod-shaped, although the rods may be straight or bent. They are gram-negative. Deferribacteraceae perform anaerobic respiration using iron, manganese, or nitrate. They can also produce energy by fermentation. The type genus of the family is Deferribacter.
Phylogeny
Taxonomy
The currently accepted taxonomy is based on the List of Prokaryotic names with Standing in Nomenclature (LSPN)
Phylum Deferribacterota Garrity and Holt 2021
Class Deferribacteres Huber & Stetter 2002
Order Deferribacterales Huber & Stetter 2002
Genus ?Petrothermobacter Tamazawa et al. 2017
Family "Calditerrivibrionaceae" Spring et al. 2022
Genus Calditerrivibrio Iino et al. 2008
Family Deferribacteraceae Huber & Stetter 2002
Genus Deferribacter Greene et al. 1997
Family "Deferrivibrionaceae" Zavarzina et al. 2022
Genus "Deferrivibrio" Zavarzina et al. 2022
Family "Flexistipitaceae" Spring et al. 2022
Genus Flexistipes Fiala et al. 2000
Family "Geovibrionaceae" Cavalier-Smith 2020
Genus Denitrovibrio Myhr & Torsvik 2000
Genus Geovibrio Caccavo et al. 2000
Genus "Limisalsivibrio" Spring et al. 2022
Genus Seleniivibrio Rauschenbach et al. 2013
Family "Mucispirillaceae" Spring et al. 2022
Genus Mucispirillum Robertson et al. 2005
History
The family was first described in 2001 in order to hold the genera Deferribacter, Flexistipes, and Geovibrio.
See also
List of bacterial orders
List of bacteria genera
|
https://en.wikipedia.org/wiki/Faulhaber%27s%20formula
|
In mathematics, Faulhaber's formula, named after the early 17th century mathematician Johann Faulhaber, expresses the sum of the p-th powers of the first n positive integers
as a polynomial in n. In modern notation, Faulhaber's formula is
Here, is the binomial coefficient "p + 1 choose k", and the Bj are the Bernoulli numbers with the convention that .
The result: Faulhaber's formula
Faulhaber's formula concerns expressing the sum of the p-th powers of the first n positive integers
as a (p + 1)th-degree polynomial function of n.
The first few examples are well known. For p = 0, we have
For p = 1, we have the triangular numbers
For p = 2, we have the square pyramidal numbers
The coefficients of Faulhaber's formula in its general form involve the Bernoulli numbers Bj. The Bernoulli numbers begin
where here we use the convention that . The Bernoulli numbers have various definitions (see Bernoulli_number#Definitions), such as that they are the coefficients of the exponential generating function
Then Faulhaber's formula is that
Here, the Bj are the Bernoulli numbers as above, and
is the binomial coefficient "p + 1 choose k".
Examples
So, for example, one has for ,
The first seven examples of Faulhaber's formula are
History
Faulhaber's formula is also called Bernoulli's formula. Faulhaber did not know the properties of the coefficients later discovered by Bernoulli. Rather, he knew at least the first 17 cases, as well as the existence of the Faulhaber polynomials for odd powers described below.
In 1713, Jacob Bernoulli published under the title Summae Potestatum an expression of the sum of the powers of the first integers as a ()th-degree polynomial function of , with coefficients involving numbers , now called Bernoulli numbers:
Introducing also the first two Bernoulli numbers (which Bernoulli did not), the previous formula becomes
using the Bernoulli number of the second kind for which , or
using the Bernoulli number of the first kind for wh
|
https://en.wikipedia.org/wiki/Primary%20interventricular%20foramen
|
In human embryology, the primary interventricular foramen is a temporary opening between the developing ventricles of the heart. The ventricles arise as a single cavity that is divided by the developing interventricular septum. Before the septum closes completely, the remaining opening between the two ventricles is termed the interventricular foramen.
In some individuals, the foramen fails to close, leading to an interventricular septal defect known as a patent interventricular foramen.
|
https://en.wikipedia.org/wiki/XAM
|
XAM, or the eXtensible Access Method, is a computer-storage standard developed and maintained by the Storage Networking Industry Association (SNIA). It is in the process of being ratified as an ANSI standard. XAM is an API for fixed content aware storage devices. XAM replaces the various proprietary interfaces that have been used for this purpose in the past. Content generating applications now have a standard means of saving and finding their content across a broad array of storage devices.
XAM is similar in function to a file system API such as the POSIX file and directory operations, in that it allows applications to store and retrieve their data. XAM stores application data in XSet objects that also contain metadata.
See also
Content-addressable storage
External links
XAM Initiative – Provides good material both at the overview and detail level
XAM SDK download – An open source reference implementation of the API
XAM Developers Group – Provides information to assist developers working with XAM
Computer standards
Computer storage technologies
|
https://en.wikipedia.org/wiki/General%20game%20playing
|
General game playing (GGP) is the design of artificial intelligence programs to be able to play more than one game successfully. For many games like chess, computers are programmed to play these games using a specially designed algorithm, which cannot be transferred to another context. For instance, a chess-playing computer program cannot play checkers. General game playing is considered as a necessary milestone on the way to artificial general intelligence.
General video game playing (GVGP) is the concept of GGP adjusted to the purpose of playing video games. For video games, game rules have to be either learnt over multiple iterations by artificial players like TD-Gammon, or are predefined manually in a domain-specific language and sent in advance to artificial players like in traditional GGP. Starting in 2013, significant progress was made following the deep reinforcement learning approach, including the development of programs that can learn to play Atari 2600 games as well as a program that can learn to play Nintendo Entertainment System games.
The first commercial usage of general game playing technology was Zillions of Games in 1998. General game playing was also proposed for trading agents in supply chain management thereunder price negotiation in online auctions from 2003 on.
History
In 1992, Barney Pell defined the concept of Meta-Game Playing, and developed the "MetaGame" system. This was the first program to automatically generate game rules of chess-like games, and one of the earliest programs to use automated game generation. Pell then developed the system Metagamer. This system was able to play a number of chess-like games, given game rules definition in a special language called Game Description Language (GDL), without any human interaction once the games were generated.
In 1998, the commercial system Zillions of Games was developed by Jeff Mallett and Mark Lefler. The system used a LISP-like language to define the game rules. Zillions of Game
|
https://en.wikipedia.org/wiki/Seinosuke%20Toda
|
is a computer scientist working at the Nihon University in Tokyo. Toda earned his Ph.D. from the Tokyo Institute of Technology in 1992, under the supervision of Kojiro Kobayashi. He was a recipient of the 1998 Gödel Prize for proving Toda's theorem in computational complexity theory, which states that every problem in the polynomial hierarchy has a polynomial-time Turing reduction to a counting problem.
Notes
Japanese computer scientists
20th-century Japanese mathematicians
21st-century Japanese mathematicians
Theoretical computer scientists
Gödel Prize laureates
1959 births
Living people
Academic staff of Nihon University
|
https://en.wikipedia.org/wiki/Conservation%20of%20fungi
|
Fungi are considered to be in urgent need of conservation by the British Mycological Society on the grounds that it is a traditionally neglected taxon which has legal protection in few countries. Current threats to fungi include destruction of forests worldwide, habitat fragmentation, changes in land use, pollution, anthropogenic climate change, and over-exploitation of commercially attractive species. Fungi population status has never been recorded until 2018 by the Royal Botanic Gardens. These surveys relay species information, threats, and current protective policies. Expertise of 210 contributors from 97 institutions in 42 countries contributes to these reports.
The Species Survival Commission of the IUCN has five specialist groups dealing with the conservation of fungi.
Chytrid, Zygomycete, Downy Mildew and Slime Mold Specialist Group
Cup-fungus, Truffle and Ally Specialist Group
Lichen Specialist Group
Mushroom, Bracket and Puffball Specialist Group
Rust and Smut Specialist Group
These groups are overseen by Cátia Canteiro, a plant and fungi specialist at the Indianapolis Zoo’s Global Center for Species Survival (GCSS). Under her leadership, these groups are focusing on Red Listing fungi species in order to build the foundation for conservation efforts.
Lack of knowledge is considered a major concern with a general paucity of comprehensive checklists, even for developed nations. In addition, the criteria for "red-listing" is not specifically designed for fungi and the kinds of data required, viz. population size, lifespan, spatial distribution and population dynamics are poorly known for most fungi. As a result, in practice, indicator species are identified as target foci for the conservation of threatened fungi. The term conservation mycology was coined in a 2018 publication.
Ecosystem Services
Fungi provide numerous ecosystem services that are essential in maintaining ecological environments and reducing the effects of climate change. Fungi help f
|
https://en.wikipedia.org/wiki/Mating%20disruption
|
Mating disruption (MD) is a pest management technique designed to control certain insect pests by introducing artificial stimuli that confuse the individuals and disrupt mate localization and/or courtship, thus preventing mating and blocking the reproductive cycle. It usually involves the use of synthetic sex pheromones, although other approaches, such as interfering with vibrational communication, are also being developed.
History
La confusion sexuelle or mating disruption, was first discussed by the Institut national de la recherche agronomique in 1974 in Bordeaux, France.
Winemakers in France, Switzerland, Spain, Germany, and Italy were the first to use the method to treat vines against the larvae of the moth genus Cochylis.
Mechanism
In many insect species of interest to agriculture, such as those in the order Lepidoptera, females emit an airborne trail of a specific chemical blend constituting that species' sex pheromone. This aerial trail is referred to as a pheromone plume.
Males of that species use the information contained in the pheromone plume to locate the emitting female (known as a “calling” female). Mating disruption exploits the male insects' natural response to follow the plume by introducing a synthetic pheromone into the insects’ habitat. The synthetic pheromone is a volatile organic chemical designed to mimic the species-specific sex pheromone produced by the female insect. The general effect of mating disruption is to confuse the male insects by masking the natural pheromone plumes, causing the males to follow “false pheromone trails” at the expense of finding mates, and affecting the males’ ability to respond to “calling" females. Consequently, the male population experiences a reduced probability of successfully locating and mating with females, which leads to the eventual cessation of breeding and collapse of the insect infestation. The California Department of Pesticide Regulation, the California Department of Food and Agriculture, and
|
https://en.wikipedia.org/wiki/Hornet%20%28app%29
|
Hornet is a location-based social networking and online dating application for gay, bisexual, and non-heterosexual men, as well as other men who have sex with men (MSM). In 2018, it was seen as "Grindr's chief competitor in the gay app market". As well as featuring other men, the app contains city guide books and LGBT-specific news.
The app is intended to be used in countries where coming out as LGBT is problematic (see LGBT rights by country or territory), but can be used in most countries in the world. Many users of Hornet also use another similar MSM apps, with Grindr, Scruff and Jack'd being the most popular in the United States.
|
https://en.wikipedia.org/wiki/34%CE%B2E12
|
34βE12, often written as 34betaE12 and also known as CK34βE12 and keratin 903 (CK903), is an antibody specific for high molecular weight cytokeratins 1, 5, 10 and 14.
It is sometimes, less precisely, referred to as high-molecular weight keratin (HMWK) and high-molecular weight cytokeratin (HMWCK).
Utility
It is used to stain basal cells in prostatic glands; loss of basal cells is seen in prostate adenocarcinoma (the most common form of prostate cancer).
It can be used to differentiate in situ cancers of the breast; lobular carcinoma in situ (LCIS) exhibits perinuclear staining with 34βE12. Ductal carcinoma in situ (DCIS) does not stain for 34βE12.
See also
Immunohistochemistry
|
https://en.wikipedia.org/wiki/Accelerator%20mass%20spectrometry
|
Accelerator mass spectrometry (AMS) is a form of mass spectrometry that accelerates ions to extraordinarily high kinetic energies before mass analysis. The special strength of AMS among the different methods of mass spectrometry is its ability to separate a rare isotope from an abundant neighboring mass ("abundance sensitivity", e.g. 14C from 12C). The method suppresses molecular isobars completely and in many cases can also separate atomic isobars (e.g. 14N from 14C). This makes possible the detection of naturally occurring, long-lived radio-isotopes such as 10Be, 36Cl, 26Al and 14C. (Their typical isotopic abundance ranges from 10−12 to 10−18.)
AMS can outperform the competing technique of decay counting for all isotopes where the half-life is long enough. Other advantages of AMS include its short measuring time as well as its ability to detect atoms in extremely small samples.
The method
Generally, negative ions are created (atoms are ionized) in an ion source. In fortunate cases, this already allows the suppression of an unwanted isobar, which does not form negative ions (as 14N in the case of 14C measurements). The pre-accelerated ions are usually separated by a first mass spectrometer of sector-field type and enter an electrostatic "tandem accelerator". This is a large nuclear particle accelerator based on the principle of a Tandem van de Graaff Accelerator operating at 0.2 to many million volts with two stages operating in tandem to accelerate the particles. At the connecting point between the two stages, the ions change charge from negative to positive by passing through a thin layer of matter ("stripping", either gas or a thin carbon foil). Molecules will break apart in this stripping stage. The complete suppression of molecular isobars (e.g. 13CH− in the case of 14C measurements) is one reason for the exceptional abundance sensitivity of AMS. Additionally, the impact strips off several of the ion's electrons, converting it into a positively charged ion.
|
https://en.wikipedia.org/wiki/Nymwars
|
Nymwars is a name given to series of conflicts over policies that mandate all users of certain internet communications platforms identify themselves using their legal names. The term is mostly associated with Google's name policies on Google+ and YouTube. Nymwars is a blend word composed from (pseudo)nym and wars. The name appears to have gained prominence as the hashtag "#nymwars" on Twitter.
Conflicts regarding Google+ began in July 2011 when the social networking site began enforcing its real name only policy by suspending the accounts of users it felt were not following the policy. Pseudonyms, nicknames, and non-standard real names (for example, mononyms or names that include scripts from multiple languages) were suspended. The issue was settled in July 2014 when Google announced that it was ending its real-name policy.
A predecessor to the Google+ conflict was Blizzard's RealID, which starting in July 2010, exposes the name on the player's credit card, and is mandatory to use some game features (cross-game chat) and was nearly made mandatory to post on discussion forums.
These issues have existed since the beginning of online identity, and are related to the alleged online disinhibition effect. The resulting discussions have raised many issues regarding naming, cultural sensitivity, public and private identity, privacy, and the role of social media in modern discourse. The debate has been covered widely in the press including Wired, The Atlantic, and The New York Times.
Google
Google Plus was launched in late June 2011. At the time of launch, the site's user content and conduct policy stated, "To help fight spam and prevent fake profiles, use the name your friends, family or co-workers usually call you." Many users signed up using nicknames, handles, stage names, or other names by which they were commonly known, but which did not necessarily match the name on their government-issued ID.
The first suspensions for name-related reasons occurred in July 20
|
https://en.wikipedia.org/wiki/Harmonic%20balance
|
Harmonic balance is a method used to calculate the steady-state response of nonlinear differential equations, and is mostly applied to nonlinear electrical circuits.
It is a frequency domain method for calculating the steady state, as opposed to the various time-domain steady-state methods. The name "harmonic balance" is descriptive of the method, which starts with Kirchhoff's Current Law written in the frequency domain and a chosen number of harmonics. A sinusoidal signal applied to a nonlinear component in a system will generate harmonics of the fundamental frequency. Effectively the method assumes a linear combination of sinusoids can represent the solution, then balances current and voltage sinusoids to satisfy Kirchhoff's law. The method is commonly used to simulate circuits which include nonlinear elements, and is most applicable to systems with feedback in which limit cycles occur.
Microwave circuits were the original application for harmonic balance methods in electrical engineering. Microwave circuits were well-suited because, historically, microwave circuits consist of many linear components which can be directly represented in the frequency domain, plus a few nonlinear components. System sizes were typically small. For more general circuits, the method was considered impractical for all but these very small circuits until the mid-1990s, when Krylov subspace methods were applied to the problem.
The application of preconditioned Krylov subspace methods allowed much larger systems to be solved, both in the size of the circuit and in the number of harmonics. This made practical the present-day use of harmonic balance methods to analyze radio-frequency integrated circuits (RFICs).
Example
Consider the differential equation . We use the ansatz solution , and plugging in, we obtain
Then by matching the terms, we have
,
which yields approximate period .
For a more exact approximation, we use ansatz solution . Plugging these in and matching the , ter
|
https://en.wikipedia.org/wiki/Subversive%20Proposal
|
The "Subversive Proposal" was an Internet posting by Stevan Harnad on June 27, 1994 (presented at the 1994 Network Services Conference in London) calling on all authors of "esoteric" research writings to archive their articles for free for everyone online (in anonymous FTP archives or websites). It initiated a series of online exchanges, many of which were collected and published as a book in 1995: Scholarly Journals at the Crossroads: A Subversive Proposal for Electronic Publishing. This led to the creation in 1997 of Cogprints, an open access archive for self-archived articles in the cognitive sciences and in 1998 to the creation of the American Scientist Open Access Forum (initially called the "September98 Forum" until the founding of the Budapest Open Access Initiative which first coined the term "open access"). The Subversive Proposal also led to the development of the GNU EPrints software used for creating OAI-compliant open access institutional repositories, and inspired CiteSeer, a tool to locate and index the resulting eprints.
The proposal was updated gradually across the years, as summarized in the American Scientist Open Access Forum on its 10th anniversary.
A retrospective was written by Richard Poynder.
A self-critique
was posted on its 15th anniversary in 2009. An online interview of Stevan Harnad was conducted by Richard Poynder on the occasion of the 20th anniversary of the subversive proposal.
|
https://en.wikipedia.org/wiki/Gyula%20Strommer
|
Gyula Strommer (8 May 1920 – 28 August 1995) was a Hungarian mathematician and astronomer.
He discovered an asteroid, 1537 Transylvania, on 27 August 1940. This was his first scientific success. From 1942, he was a teaching assistant at the Descriptive Geometry Department of the Technical University of Budapest. In 1952, he became the head of the Descriptive Geometry Department. In 1972, he was appointed a university professor. Between 1981 and 1987, he was the dean of the Faculty of Mechanical Engineering.
His research topics: the foundations of geometry, Bolyai-Lobachevsky geometry.
|
https://en.wikipedia.org/wiki/Radio%20spectrum%20pollution
|
Radio spectrum pollution is the straying of waves in the radio and electromagnetic spectrums outside their allocations that cause problems for some activities. It is of particular concern to radio astronomers.
Radio spectrum pollution is mitigated by effective spectrum management. Within the United States, the Communications Act of 1934 grants authority for spectrum management to the President for all federal use (47 U.S.C. 305). The National Telecommunications and Information Administration (NTIA) manages the spectrum for the Federal Government. Its rules are found in the "NTIA Manual of Regulations and Procedures for Federal Radio Frequency Management". The Federal Communications Commission (FCC) manages and regulates all domestic non-federal spectrum use (47 U.S.C. 301). Each country typically has its own spectrum regulatory organization. Internationally, the International Telecommunication Union (ITU) coordinates spectrum policy.
See also
Spectrum management
Electromagnetic radiation and health
Frequency allocation
Radio quiet zone
|
https://en.wikipedia.org/wiki/Calcium%20caseinate
|
Calcium caseinate is one of several milk proteins derived from casein in skim and 1% milk. Calcium caseinate has a papery, sweet and overall bland flavor, and is primarily used in meal preparation and fat breakdown. Caseinates are produced by adding an alkali to another derivative of casein, acid casein. The type of caseinate is determined by the cation added alongside the acid casein. Other cations used to form caseinates besides calcium include ammonium, potassium, and sodium.
Calcium caseinate contains about 17% glutamic acid. This provides many health benefits such as treating low blood sugar, improving memory and focus, boosting the immune system and treating intellectual disorders. Calcium caseinate is also soluble and does not clot in the stomach.
Calcium caseinate is mostly composed of 3.5% moisture, 1.0% fat, 90.9% protein, 0.1% lactose, 4.5% ash, although this may vary slightly by manufacturer. Calcium caseinate is semi-soluble in water, contrary to acid casein and rennet casein which are not soluble in water. Sodium caseinate is more water soluble than calcium caseinate, due to its polarity.
Physical properties
Caseins are found in milk which is held together by colloidal calcium phosphate. Calcium caseinate is generally stable at a pH above 5.7, and appears as a milky liquid. This is unlike ammonium, potassium, and sodium caseinates, which are practically clear. At a neutral or acidic pH, casein is relatively insoluble in water, and is easily separated from other milk proteins, sugars, and minerals. Casein can be resuspended by alternating the pH levels with NaOH or , resulting in aqueous solutions of sodium caseinate or calcium caseinate. Most caseinates are capable of withstanding temperatures of up to 140°C (284°F), however calcium caseinate is influenced by heat with temperatures as low as 50°C (122°F). Calcium is a divalent cation, allowing it to form bonds with several caseinate anions. The binding of a calcium ion is able to reduce the elect
|
https://en.wikipedia.org/wiki/Power%20density
|
Power density is the amount of power (time rate of energy transfer) per unit volume.
In energy transformers including batteries, fuel cells, motors, power supply units etc., power density refers to a volume, where it is often called volume power density, expressed as W/m3.
In reciprocating internal combustion engines, power density (power per swept volume or brake horsepower per cubic centimeter) is an important metric, based on the internal capacity of the engine, not its external size.
Examples
See also
Surface power density, energy per unit of area
Energy density, energy per unit volume
Specific energy, energy per unit mass
Power-to-weight ratio/specific power, power per unit mass
Specific absorption rate (SAR)
|
https://en.wikipedia.org/wiki/Interdecadal%20Pacific%20oscillation
|
The Interdecadal Pacific oscillation (IPO) is an oceanographic/meteorological phenomenon similar to the Pacific decadal oscillation (PDO), but occurring in a wider area of the Pacific. While the PDO occurs in mid-latitudes of the Pacific Ocean in the northern hemisphere, the IPO stretches from the southern hemisphere into the northern hemisphere.
The period of oscillation is roughly 15–30 years. Positive phases of the IPO are characterized by a warmer than average tropical Pacific and cooler than average northern Pacific. Negative phases are characterized by an inversion of this pattern, with cool tropics and warm northern regions.
The IPO had positive phases (southeastern tropical Pacific warm) from 1922 to 1946 and 1978 to 1998, and a negative phase between 1947 and 1976.
|
https://en.wikipedia.org/wiki/Snake%20River%20sucker
|
The Snake River sucker (Chasmistes muriei) is an extinct species of ray-finned fish in the family Catostomidae.
It was endemic to the Snake River below Jackson Lake Dam in Wyoming. It is now presumed to be an extinct species.
See also
|
https://en.wikipedia.org/wiki/Histology%20and%20Histopathology
|
Histology and Histopathology is a monthly peer-reviewed medical journal publishing original and review articles in the fields of histology and histopathology. It was established in 1986 and is published by the University of Murcia in Spain. The editors-in-chief are Francisco Hernández and Juan F. Madrid (University of Murcia). According to the Journal Citation Reports, the journal has a 2016 impact factor of 2.025.
|
https://en.wikipedia.org/wiki/Collectin%20of%2043%20kDa
|
Collectin of 43 kDa (CL-43) is a collectin protein that acts as an antigen recognition protein. When an agent, zymosan, was injected into the tunicate Styela plicata (causing inflammation), secretion of this collectin was tripled within 96 hours.
|
https://en.wikipedia.org/wiki/National%20symbols%20of%20the%20United%20States
|
National symbols of the United States are the symbols used to represent the United States of America.
List of symbols
See also
Lists of United States state symbols
|
https://en.wikipedia.org/wiki/Nano-scaffold
|
Nano-scaffolding or nanoscaffolding is a medical process used to regrow tissue and bone, including limbs and organs. The nano-scaffold is a three-dimensional structure composed of polymer fibers very small that are scaled from a Nanometer (10−9 m) scale. Developed by the American military, the medical technology uses a microscopic apparatus made of fine polymer fibers called a scaffold. Damaged cells grip to the scaffold and begin to rebuild missing bone and tissue through tiny holes in the scaffold. As tissue grows, the scaffold is absorbed into the body and disappears completely.
Nano-scaffolding has also been used to regrow burned skin. The process cannot grow complex organs like hearts.
Historically, research on nano-scaffolds dates back to at least the late 1980s when Simon showed that electrospinning could be used to produced nano- and submicron-scale polymeric fibrous scaffolds specifically intended for use as in vitro cell and tissue substrates. This early use of electrospun fibrous lattices for cell culture and tissue engineering showed that various cell types would adhere to and proliferate upon polycarbonate fibers. It was noted that as opposed to the flattened morphology typically seen in 2D culture, cells grown on the electrospun fibers exhibited a more rounded 3-dimensional morphology generally observed of tissues in vivo.
Mechanism of tissue regeneration using nanoscaffolds
Nano-scaffolding is very small, 100 times smaller than the human hair and is built out of biodegradable fibers. The use of this scaffolding allows more effective use of stem cells and quicker regeneration. Electrospun nanofibers are prepared using microscopic tubes that range between 100 and 200 nanometers in diameter. These entangle with each other in the form of a web as they're produced. Electrospinning allows the construction of these webs to be controlled in the sense of the tube's diameter, thickness, and the material being used. Nano-scaffolding is placed into the body at
|
https://en.wikipedia.org/wiki/Femarelle
|
Femarelle is a dietary supplement that is a mixture of DT56a (a tofu extract) and flaxseed powder, that may act as a selective estrogen receptor modulator (SERM). In 2008 an application was submitted to the European Food Safety Authority to market Femarelle with a health claim, namely that it can reduce the risk for osteoporosis and other bone disorders; the EFSA found that "the food/constituent for which the claim is made, i.e. Femarelle, has not been sufficiently characterised" and that " a cause and effect relationship has not been established between the consumption of Femarelle and increased BMD, increased bone formation, or decreased risk of osteoporosis or other bone disorders in post-menopausal women."
Femarelle has been tested in small clinical trials. One studied its effect on the tissue lining the vagina, another on relief of hot flashes in menopause, and another on the risk of causing blood clots, which is a risk of hormone replacement therapy. While results were promising, the studies were too small and too short in duration from which to draw conclusions.
See also
Menerba
Rimostil
|
https://en.wikipedia.org/wiki/HORMA%20domain
|
In molecular biology, the HORMA domain (named after the Hop1p, Rev7p and MAD2 proteins) is a protein domain that has been suggested to recognise chromatin states resulting from DNA adducts, double stranded breaks or non-attachment to the spindle and act as an adaptor that recruits other proteins. Hop1 is a meiosis-specific protein, Rev7 is required for DNA damage induced mutagenesis, and MAD2 is a spindle checkpoint protein which prevents progression of the cell cycle upon detection of a defect in mitotic spindle integrity.
Examples
Humans proteins containing this domain include:
HORMAD1, HORMAD2, MAD2L1, MAD2L2
|
https://en.wikipedia.org/wiki/Sea%20surface%20microlayer
|
The sea surface microlayer (SML) is the boundary interface between the atmosphere and ocean, covering about 70% of Earth's surface. With an operationally defined thickness between 1 and , the SML has physicochemical and biological properties that are measurably distinct from underlying waters. Recent studies now indicate that the SML covers the ocean to a significant extent, and evidence shows that it is an aggregate-enriched biofilm environment with distinct microbial communities. Because of its unique position at the air-sea interface, the SML is central to a range of global marine biogeochemical and climate-related processes.
The sea surface microlayer is the boundary layer where all exchange occurs between the atmosphere and the ocean. The chemical, physical, and biological properties of the SML differ greatly from the sub-surface water just a few centimeters beneath.
Despite the huge extent of the ocean's surface, until now relatively little attention has been paid to the sea surface microlayer (SML) as the ultimate interface where heat, momentum and mass exchange between the ocean and the atmosphere takes place. Via the SML, large-scale environmental changes in the ocean such as warming, acidification, deoxygenation, and eutrophication potentially influence cloud formation, precipitation, and the global radiation balance. Due to the deep connectivity between biological, chemical, and physical processes, studies of the SML may reveal multiple sensitivities to global and regional changes.
Understanding the processes at the ocean's surface, in particular involving the SML as an important and determinant interface, could provide an essential contribution to the reduction of uncertainties regarding ocean-climate feedbacks. As of 2017, processes occurring within the SML, as well as the associated rates of material exchange through the SML, remained poorly understood and were rarely represented in marine and atmospheric numerical models.
Overview
The sea surface
|
https://en.wikipedia.org/wiki/Clozapine%20N-oxide
|
Clozapine N-oxide (CNO) is a synthetic drug used mainly in biomedical research as a ligand to activate DREADD receptors. Although CNO was initially believed to be biologically inert. However, it has been shown not to enter the brain after administration and to reverse metabolise in peripheral tissues to form clozapine. Clozapine can bind to a number of different serotonergic, dopaminergic and adrenergic receptors within the brain. Therefore, behavioural data using the CNO-DREADD system in neuroscience experiments have to be interpreted with caution.
Alternatives to CNO with more affinity, more inert character, and faster kinetics include Compound 21 (C21) and deschloroclozapine (DCZ).
|
https://en.wikipedia.org/wiki/Kamerlingh%20Onnes%20Prize
|
The Heike Kamerlingh Onnes Prize was established in 2000, under the sponsorship of Elsevier, by the organizers of the International Conference on the Materials and Mechanisms of Superconductivity (M2S). The prize is named in honor of Heike Kamerlingh Onnes, who discovered superconductivity in 1911. At each conference, the prize, which consists of 7500 € and a certificate, is presented to one or more physicists. If there are two or more recipients they share the money. The prize "recognizes outstanding experiments which illuminate the nature of superconductivity other than materials". The winners are selected by the members of the Kamerlingh Onnes Prize Committee, appointed by the conference organizers.
The prize was first awarded in 2000 at the 6th International Conference on Materials and Mechanisms of Superconductivity and High Temperature Superconductors:
The prize is "one of the leading awards for experimental research in superconductivity."
Recipients
The following are recipients:
See also
List of physics awards
|
https://en.wikipedia.org/wiki/Parvibacter
|
Parvibacter is a genus in the phylum Actinomycetota containing a single species, Parvibacter caecicola.
Taxonomy
In 2018, Nouioui et al. proposed merging the genus Parvibacter along with the genera Asaccharobacter and Enterorhabdus within the genus Aldercreutzia based on observed clustering of these genera within phylogenetic trees. However, subsequent phylogenetic analyses observed that Parvibacter caecicola exhibited much deeper branching compared to other Aldercreutzia species. Its phylogenetic distinctness was further demonstrated by the presence of five conserved signature indels (CSIs) that are exclusively shared by all Aldercreutzia species except for P. caecicola. Thus, P. caecicola was transferred back into the genus Parvibacter, which continues to be a validly published genus.
|
https://en.wikipedia.org/wiki/NhaD%20family
|
The NhaD family (TC# 2.A.62) belongs to the Ion Transporter (IT) Superfamily. A representative list of proteins belonging to the NhaD family can be found in the Transporter Classification Database.
The NhaD Na+/H+ antiporter has been characterized from two Vibrio species: V. parahaemolyticus and V. cholerae and in the haloalkaliphile, Alkalimonas amylolytica. These proteins and their homologues are 400-500 aas long and exhibit 10-13 TMSs. They catalyze Na+/H+ and Li+/H+ antiport. They exhibit activity at basic pH (8-10) with no activity at pH 7.5. The Amylolytica antiporter has low Na+ affinity and has optimal activity at 600 mM Na+. Homologues are found in Pseudomonadota of all groups, Flavobacteriia, and Chlamydia. Distant homologues of the IT superfamily are ubiquitous.
The generalized reaction catalyzed by NhaD is:nH+ (in) + mNa+ (out) ⇌ nH+ (out) + mNa+ (in).
See also
Sodium-Proton antiporter
Antiporter
Transporter Classification Database
Further reading
Barrero-Gil, Javier; Rodríguez-Navarro, Alonso; Benito, Begoña (2007-01-01). "Cloning of the PpNHAD1 transporter of Physcomitrella patens, a chloroplast transporter highly conserved in photosynthetic eukaryotic organisms". Journal of Experimental Botany 58(11): 2839–2849. doi:10.1093/jxb/erm094. ISSN 0022-0957. PMID 17617660.
Kurz, Matthias; Brünig, Anika N. S.; Galinski, Erwin A. (2006-01-01). "NhaD type sodium/proton-antiporter of Halomonas elongata: a salt stress response mechanism in marine habitats?". Saline Systems 2: 10.doi:10.1186/1746-1448-2-10. ISSN 1746-1448.PMC 1552076. PMID 16872527.
Liu, Jun; Xue, Yanfen; Wang, Quanhui; Wei, Yi; Swartz, Talia H.; Hicks, David B.; Ito, Masahiro; Ma, Yanhe; Krulwich, Terry A. (2005-11-01). "The activity profile of the NhaD-type Na+(Li+)/H+ antiporter from the soda Lake Haloalkaliphile Alkalimonas amylolytica is adaptive for the extreme environment". Journal of Bacteriology 187 (22): 7589–7595.doi:10.1128/JB.187.22.7589-7595.2005. ISSN 0021-9193.
Melo, A
|
https://en.wikipedia.org/wiki/Free%20induction%20decay
|
In Fourier transform nuclear magnetic resonance spectroscopy, free induction decay (FID) is the observable NMR signal generated by non-equilibrium nuclear spin magnetization precessing about the magnetic field (conventionally along z). This non-equilibrium magnetization can be created generally by applying a pulse of radio-frequency close to the Larmor frequency of the nuclear spins.
If the magnetization vector has a non-zero component in the xy plane, then the precessing magnetisation will induce a corresponding oscillating voltage in a detection coil surrounding the sample. This time-domain signal (a sinusoid) is typically digitised and then Fourier transformed in order to obtain a frequency spectrum of the NMR signal i.e. the NMR spectrum.
The duration of the NMR signal is ultimately limited by T2 relaxation, but mutual interference of the different NMR frequencies present also causes the signal to be damped more quickly.
When NMR frequencies are well-resolved, as is typically the case in the NMR of samples in solution, the overall decay of the FID is relaxation-limited and the FID is approximately exponential (with the time constant T2 changed, indicated by T2*). FID durations will then be of the order of seconds for nuclei such as 1H.
Particularly if a limited number of frequency components are present, the FID may be analysed directly for quantitative determinations of physical properties, such as hydrogen content in aviation fuel, solid and liquid ratio in dairy products (time-domain NMR).
Advances in the development of quantum-scale sensors, particularly NV centres, have enabled the observation of the FID of single nuclei. When measuring the precession of a single nucleus, quantum mechanical measurement back action has to be considered. In this special case, also the measurement itself contributes to the decay as predicted by quantum mechanics.
|
https://en.wikipedia.org/wiki/Sauerbrey%20equation
|
The Sauerbrey equation was developed by the German Günter Sauerbrey in 1959, while working on his doctoral thesis at the Technical University of Berlin, Germany. It is a method for correlating changes in the oscillation frequency of a piezoelectric crystal with the mass deposited on it. He simultaneously developed a method for measuring the characteristic frequency and its changes by using the crystal as the frequency determining component of an oscillator circuit. His method continues to be used as the primary tool in quartz crystal microbalance (QCM) experiments for conversion of frequency to mass and is valid in nearly all applications.
The equation is derived by treating the deposited mass as though it were an extension of the thickness of the underlying quartz. Because of this, the mass to frequency correlation (as determined by Sauerbrey’s equation) is largely independent of electrode geometry. This has the benefit of allowing mass determination without calibration, making the set-up desirable from a cost and time investment standpoint.
The Sauerbrey equation is defined as:
where:
– Resonant frequency of the fundamental mode (Hz)
– normalized frequency change (Hz)
– Mass change (g)
– Piezoelectrically active crystal area (Area between electrodes, cm2)
– Density of quartz ( = 2.648 g/cm3)
– Shear modulus of quartz for AT-cut crystal ( = 2.947x1011 g·cm−1·s−2)
The normalized frequency is the nominal frequency shift of that mode divided by its mode number (most software outputs normalized frequency shift by default). Because the film is treated as an extension of thickness, Sauerbrey’s equation only applies to systems in which the following three conditions are met: the deposited mass must be rigid, the deposited mass must be distributed evenly and the frequency change < 0.05.
If the change in frequency is greater than 5%, that is, > 0.05, the Z-match method must be used to determine the change in mass.
The formula for the Z-match method is:
Equa
|
https://en.wikipedia.org/wiki/Blood%20compatibility%20testing
|
Blood compatibility testing is conducted in a medical laboratory to identify potential incompatibilities between blood group systems in blood transfusion. It is also used to diagnose and prevent some complications of pregnancy that can occur when the baby has a different blood group from the mother. Blood compatibility testing includes blood typing, which detects the antigens on red blood cells that determine a person's blood type; testing for unexpected antibodies against blood group antigens (antibody screening and identification); and, in the case of blood transfusions, mixing the recipient's plasma with the donor's red blood cells to detect incompatibilities (crossmatching). Routine blood typing involves determining the ABO and RhD (Rh factor) type, and involves both identification of ABO antigens on red blood cells (forward grouping) and identification of ABO antibodies in the plasma (reverse grouping). Other blood group antigens may be tested for in specific clinical situations.
Blood compatibility testing makes use of reactions between blood group antigens and antibodies—specifically the ability of antibodies to cause red blood cells to clump together when they bind to antigens on the cell surface, a phenomenon called agglutination. Techniques that rely on antigen-antibody reactions are termed serologic methods, and several such methods are available, ranging from manual testing using test tubes or slides to fully automated systems. Blood types can also be determined through genetic testing, which is used when conditions that interfere with serologic testing are present or when a high degree of accuracy in antigen identification is required.
Several conditions can cause false or inconclusive results in blood compatibility testing. When these issues affect ABO typing, they are called ABO discrepancies. ABO discrepancies must be investigated and resolved before the person's blood type is reported. Other sources of error include the "weak D" phenomenon, in whi
|
https://en.wikipedia.org/wiki/Sampson%20%28horse%29
|
Sampson (later renamed Mammoth) was a Shire horse gelding born in 1846 and bred by Thomas Cleaver at Toddington Mills, Bedfordshire, England. According to Guinness World Records (1986) he was the tallest horse ever recorded, by 1850 measuring or 21.25 hands in height. His peak weight was estimated at
See also
List of historical horses
|
https://en.wikipedia.org/wiki/Aortic%20orifice
|
The aortic orifice, (aortic opening) is a circular opening, in front and to the right of the left atrioventricular orifice, from which it is separated by the anterior cusp of the bicuspid valve.
It is guarded by the aortic semilunar valve.
The portion of the ventricle immediately below the aortic orifice is termed the aortic vestibule, and has fibrous instead of muscular walls.
|
https://en.wikipedia.org/wiki/Engineering%20technician
|
An engineering technician is a professional trained in skills and techniques related to a specific branch of technology, with a practical understanding of the relevant engineering concepts. Engineering technicians often assist in projects relating to research and development, or focus on post-development activities like implementation or operation.
The Dublin Accord was signed in 2002 as an international agreement recognizing engineering technician qualifications. The Dublin Accord is analogous to the Washington Accord for engineers and the Sydney Accord for engineering technologists.
Nature of work
Engineering technicians help solve technical problems in many ways. They build or set up equipment, conduct experiments, collect data, and calculate results. They might also help to make a model of new equipment. Some technicians work in quality control, checking products, tests, and collecting data. In manufacturing, they help to design and develop products. They also find ways to produce things efficiently. There are multiple fields in this job such as; software design, repair, etc.
They may also be people who produce technical drawings or engineering drawings.
Engineering technicians are responsible for using the theories and principles of science, engineering, and mathematics to solve problems and come up with solutions in the research, design, development, manufacturing, sales, construction, inspection, and maintenance of systems and products. Engineering technicians help engineers and scientists in researching and developing, while some other engineering technicians may be responsible for inspections, quality control, and processes which may include conducting tests and data collection.
Education
Engineering technician diplomas and two-year degrees are generally offered by technical schools and non-university higher education institutions like colleges of further education, vocational schools, and community colleges. Many four-year colleges and universities off
|
https://en.wikipedia.org/wiki/Active%20State%20Power%20Management
|
Active-state power management (ASPM) is a power management mechanism for PCI Express devices to garner power savings while otherwise in a fully active state. Predominantly, this is achieved through active-state link power management; i.e., the PCI Express serial link is powered down when there is no traffic across it. It is normally used on laptops and other mobile Internet devices to extend battery life.
As serial-based PCI Express devices become less active, it is possible for the computer's power management system to take the opportunity to reduce overall power consumption by placing the link PHY into a low-power mode and instructing other devices on the link to follow suit. This is usually managed by the operating system's power management software or through the BIOS, thus different settings can be configured for laptop battery mode versus running from the battery charger. Low power mode is often achieved by reducing or even stopping the serial bus clock as well as possibly powering down the PHY device itself.
While ASPM brings a reduction in power consumption, it can also result in increased latency as the serial bus needs to be 'woken up' from low-power mode, possibly reconfigured and the host-to-device link re-established. This is known as ASPM exit latency and takes up valuable time which can be annoying to the end user if it is too obvious when it occurs. This may be acceptable for mobile computing, however, when battery life is critical.
Currently, two low power modes are specified by the PCI Express 2.0 specification; L0s and L1 mode. L0s concerns setting low power mode for one direction of the serial link only, usually downstream of the PHY controller. L1 shuts off PCI Express link completely, including the reference clock signal, until a dedicated signal (CLKREQ#) is asserted, and results in greater power reductions though with the penalty of greater exit latency.
See also
Energy Star
Green computing
System Management Mode
Aggressive Link Powe
|
https://en.wikipedia.org/wiki/Larrabee%20%28microarchitecture%29
|
Larrabee is the codename for a cancelled GPGPU chip that Intel was developing separately from its current line of integrated graphics accelerators. It is named after either Mount Larrabee or Larrabee State Park in Whatcom County, Washington, near the town of Bellingham. The chip was to be released in 2010 as the core of a consumer 3D graphics card, but these plans were cancelled due to delays and disappointing early performance figures. The project to produce a GPU retail product directly from the Larrabee research project was terminated in May 2010 and its technology was passed on to the Xeon Phi. The Intel MIC multiprocessor architecture announced in 2010 inherited many design elements from the Larrabee project, but does not function as a graphics processing unit; the product is intended as a co-processor for high performance computing.
Almost a decade later, on June 12, 2018; the idea of an Intel dedicated GPU was revived again with Intel's desire to create a discrete GPU by 2020. This project would eventually become the Intel Xe and Intel Arc series, released in September 2020 and March 2022, respectively - but both were unconnected to the work on the Larrabee project.
Project status
On December 4, 2009, Intel officially announced that the first-generation Larrabee would not be released as a consumer GPU product. Instead, it was to be released as a development platform for graphics and high-performance computing. The official reason for the strategic reset was attributed to delays in hardware and software development. On May 25, 2010, the Technology@Intel blog announced that Larrabee would not be released as a GPU, but instead would be released as a product for high-performance computing competing with the Nvidia Tesla.
The project to produce a GPU retail product directly from the Larrabee research project was terminated in May 2010. The Intel MIC multiprocessor architecture announced in 2010 inherited many design elements from the Larrabee project, but does
|
https://en.wikipedia.org/wiki/Olimp%C3%ADada%20Brasileira%20de%20Matem%C3%A1tica%20das%20Escolas%20P%C3%BAblicas
|
The Brazilian Mathematical Olympiad of Public Schools () (OBMEP) is an annual Mathematics contest created in 2005 by the Brazilian Ministério da Ciência e Tecnologia (MCT) and Ministério da Educação (MEC), in collaboration with Instituto Nacional de Matemática Pura e Aplicada (IMPA) and Sociedade Brasileira de Matemática (SBM), to stimulate the mathematics education in Brazil. It is open to public school students from fifth grade to high school. In 2014 more than 18 million students were enrolled for its first round.
|
https://en.wikipedia.org/wiki/Die%20Another%20Day
|
Die Another Day is a 2002 spy film and the twentieth film in the James Bond series produced by Eon Productions. It was produced by Michael G. Wilson and Barbara Broccoli, and directed by Lee Tamahori. The fourth and final film starring Pierce Brosnan as the fictional MI6 agent James Bond, it was also the only film to feature John Cleese as Q, and the last with Samantha Bond as Miss Moneypenny. It is also the first film since Live and Let Die (1973) not to feature Desmond Llewelyn as Q as he died three years earlier. Halle Berry co-stars as NSA agent Giacinta "Jinx" Johnson, the Bond girl. It follows Bond as he attempts to locate a mole in British intelligence who betrayed him and a British billionaire who is later revealed to be connected to a North Korean operative whom Bond seemingly killed. It is an original story, although it takes influence from Bond creator Ian Fleming's novels Moonraker (1955) and The Man with the Golden Gun (1965), as well as Kingsley Amis's novel, Colonel Sun.
Die Another Day marked the James Bond franchise's 40th anniversary. The film includes references to each of the preceding films. It received mixed reviews; some critics praised Tamahori's direction, but others criticized its reliance on CGI, product placement and its unoriginal plot, as well as the villain. Nevertheless, it was the highest-grossing James Bond film up to that time.
Plot
MI6 agent James Bond infiltrates a North Korean military base where Colonel Tan-Sun Moon is trading weapons for African conflict diamonds. After Moon's right-hand man Zao receives notification of Bond's real identity, Moon attempts to kill Bond and a hovercraft chase ensues, ending with Moon's craft tumbling over a waterfall. Bond is captured by North Korean soldiers and imprisoned by the Colonel's father, General Moon. After fourteen months of captivity and torture at the hands of the Korean People's Army, Bond is traded for Zao in a prisoner exchange across the Bridge of No Return. He is sedated an
|
https://en.wikipedia.org/wiki/Bandwidth%20allocation%20protocol
|
The Bandwidth Allocation Protocol, along with its control protocol, the Bandwidth Allocation Control Protocol, is used to add and remove links in a multilink bundle over PPP, and specifying which peer is responsible for making decisions regarding bandwidth management. The protocol was originally conceived by Craig Richards and Kevin Smith of Shiva Corporation and Ascend Communications respectively in 1997 and has since been implemented on a number of routers, including in Cisco IOS.
|
https://en.wikipedia.org/wiki/Miraculin
|
Miraculin is a taste modifier, a glycoprotein extracted from the fruit of Synsepalum dulcificum. The berry, also known as the miracle fruit, was documented by explorer Chevalier des Marchais, who searched for many different fruits during a 1725 excursion to its native West Africa.
Miraculin itself does not taste sweet. When taste buds are exposed to miraculin, the protein binds to the sweetness receptors. This causes normally sour-tasting acidic foods, such as citrus, to be perceived as sweet. The effect can last for one or two hours.
History
The sweetening properties of Synsepalum dulcificum berries were first noted by des Marchais during expeditions to West Africa in the 18th century. The term miraculin derived from experiments to isolate and purify the active glycoprotein that gave the berries their sweetening effects, results that were published simultaneously by Japanese and Dutch scientists working independently in the 1960s (the Dutch team called the glycoprotein mieraculin). The word miraculin was in common use by the mid-1970s.
Glycoprotein structure
Miraculin was first sequenced in 1989 and was found to be a 24.6 kilodalton glycoprotein consisting of 191 amino acids and 13.9% by weight of various sugars.
The sugars consist of a total of 3.4 kDa, composed of a molar ratio of glucosamine (31%), mannose (30%), fucose (22%), xylose (10%), and galactose (7%).
The native state of miraculin is a tetramer consisting of two dimers, each held together by a disulfide bridge. Both tetramer miraculin and native dimer miraculin in its crude state have the taste-modifying activity of turning sour tastes into sweet tastes. Miraculin belongs to the Kunitz STI protease inhibitor family.
Sweetness properties
Miraculin, unlike curculin (another taste-modifying agent), is not sweet by itself, but it can change the perception of sourness to sweetness, even for a long period after consumption. The duration and intensity of the sweetness-modifying effect depends on vari
|
https://en.wikipedia.org/wiki/Generating%20set%20of%20a%20module
|
In mathematics, a generating set Γ of a module M over a ring R is a subset of M such that the smallest submodule of M containing Γ is M itself (the smallest submodule containing a subset is the intersection of all submodules containing the set). The set Γ is then said to generate M. For example, the ring R is generated by the identity element 1 as a left R-module over itself. If there is a finite generating set, then a module is said to be finitely generated.
This applies to ideals, which are the submodules of the ring itself. In particular, a principal ideal is an ideal that has a generating set consisting of a single element.
Explicitly, if Γ is a generating set of a module M, then every element of M is a (finite) R-linear combination of some elements of Γ; i.e., for each x in M, there are r1, ..., rm in R and g1, ..., gm in Γ such that
Put in another way, there is a surjection
where we wrote rg for an element in the g-th component of the direct sum. (Coincidentally, since a generating set always exists, e.g. M itself, this shows that a module is a quotient of a free module, a useful fact.)
A generating set of a module is said to be minimal if no proper subset of the set generates the module. If R is a field, then a minimal generating set is the same thing as a basis. Unless the module is finitely generated, there may exist no minimal generating set.
The cardinality of a minimal generating set need not be an invariant of the module; Z is generated as a principal ideal by 1, but it is also generated by, say, a minimal generating set }. What is uniquely determined by a module is the infimum of the numbers of the generators of the module.
Let R be a local ring with maximal ideal m and residue field k and M finitely generated module. Then Nakayama's lemma says that M has a minimal generating set whose cardinality is . If M is flat, then this minimal generating set is linearly independent (so M is free). See also: Minimal resolution.
A more refined inform
|
https://en.wikipedia.org/wiki/Development%20%28differential%20geometry%29
|
In classical differential geometry, development refers to the simple idea of rolling one smooth surface over another in Euclidean space. For example, the tangent plane to a surface (such as the sphere or the cylinder) at a point can be rolled around the surface to obtain the tangent plane at other points.
Properties
The tangential contact between the surfaces being rolled over one another provides a relation between points on the two surfaces. If this relation is (perhaps only in a local sense) a bijection between the surfaces, then the two surfaces are said to be developable on each other or developments of each other. Differently put, the correspondence provides an isometry, locally, between the two surfaces.
In particular, if one of the surfaces is a plane, then the other is called a developable surface: thus a developable surface is one which is locally isometric to a plane. The cylinder is developable, but the sphere is not.
Flat connections
Development can be generalized further using flat connections. From this point of view, rolling the tangent plane over a surface defines an affine connection on the surface (it provides an example of parallel transport along a curve), and a developable surface is one for which this connection is flat.
More generally any flat Cartan connection on a manifold defines a development of that manifold onto the model space. Perhaps the most famous example is the development of conformally flat n-manifolds, in which the model-space is the n-sphere. The development of a conformally flat manifold is a conformal local diffeomorphism from the universal cover of the manifold to the n-sphere.
Undevelopable surfaces
The class of double-curved surfaces (undevelopable surfaces) contains objects that cannot be simply unfolded (developed). Such surfaces can be developed only approximately with some distortions of linear surface elements (see the Stretched grid method)
See also
Developable surface
Ruled surface
|
https://en.wikipedia.org/wiki/Triphosphorus%20pentanitride
|
Triphosphorus pentanitride is an inorganic compound with the chemical formula . Containing only phosphorus and nitrogen, this material is classified as a binary nitride. While it has been investigated for various applications this has not led to any significant industrial uses. It is a white solid, although samples often appear colored owing to impurities.
Synthesis
Triphosphorus pentanitride can be produced by reactions between various phosphorus(V) and nitrogen anions (such as ammonia and sodium azide):
The reaction of the elements is claimed to produce a related material. Similar methods are used to prepared boron nitride (BN) and silicon nitride (); however the products are generally impure and amorphous.
Crystalline samples have been produced by the reaction of ammonium chloride and hexachlorocyclotriphosphazene or phosphorus pentachloride.
has also been prepared at room temperature, by a reaction between phosphorus trichloride and sodium amide.
Reactions
is thermally less stable than either BN or , with decomposition to the elements occurring at temperatures above 850 °C:
It is resistant to weak acids and bases, and insoluble in water at room temperature, however it hydrolyzes upon heating to form the ammonium phosphate salts and .
Triphosphorus pentanitride reacts with lithium nitride and calcium nitride to form the corresponding salts of and . Heterogenous ammonolyses of triphosphorus pentanitride gives imides such as and . It has been suggested that these compounds may have applications as solid electrolytes and pigments.
Structure and properties
Several polymorphs are known for triphosphorus pentanitride. The alpha‑form of triphosphorus pentanitride (α‑) is encountered at atmospheric pressure and exists at pressures up to 11 GPa, at which point it converts to the gamma‑variety (γ‑) of the compound. Upon heating γ‑ to temperatures above 2000 K at pressures between 67 and 70 GPa, it transforms into δ-. The release of pressure on the δ- polym
|
https://en.wikipedia.org/wiki/Empress%20%28cracker%29
|
Empress (sometimes stylized EMPRESS) is a video game cracker who specializes in breaking anti-piracy software. While the identity of Empress is unknown, she refers to herself as a woman and Russian. She has iris heterochromia according to her statement. Empress has also released cracked games under the moniker C000005.
Empress is known as one of the few crackers who can crack Denuvo. Also according to her statement, she was the one who cracked for Codex all of their releases of Denuvo-protected games. Her motivation is to remove the software license aspect of digital games in an effort to preserve them after developers drop support. Empress also claims that removing digital rights management (DRM) decreases performance issues in a game.
Career
Empress became interested in the DRM-cracking scene in 2014. Her followers can participate in polls to select which game they want cracked next, and her work is funded through crowdsourced donations. Empress uses the money to cover the living costs, upgrade hardware, and purchase games that they intend to crack. She acknowledges that accepting payment for piracy is against the etiquette of the warez scene.
Empress rose to prominence after releasing a cracked version of Red Dead Redemption 2. Other high-profile games cracked by Empress include Mortal Kombat 11 and Anno 1800. In February 2021, Empress stated that she would soon be arrested after being allegedly caught red handed working on the crack for Immortals Fenyx Rising. Empress blamed FitGirl Repacks, with whom she had a feud. However, that March, Empress was available to publish a workaround for the online check-in system of Battle.net. Empress's arrest announcement was met with general skepticism by the cracking community.
In 2023, Empress was banned from Reddit by reddit admins. She released a cracked version of Hogwarts Legacy that February.
Controversies
Empress is known around the P2P scene for the "personal note" section in the NFOs of her releases, often co
|
https://en.wikipedia.org/wiki/Crystallographic%20restriction%20theorem
|
The crystallographic restriction theorem in its basic form was based on the observation that the rotational symmetries of a crystal are usually limited to 2-fold, 3-fold, 4-fold, and 6-fold. However, quasicrystals can occur with other diffraction pattern symmetries, such as 5-fold; these were not discovered until 1982 by Dan Shechtman.
Crystals are modeled as discrete lattices, generated by a list of independent finite translations . Because discreteness requires that the spacings between lattice points have a lower bound, the group of rotational symmetries of the lattice at any point must be a finite group (alternatively, the point is the only system allowing for infinite rotational symmetry). The strength of the theorem is that not all finite groups are compatible with a discrete lattice; in any dimension, we will have only a finite number of compatible groups.
Dimensions 2 and 3
The special cases of 2D (wallpaper groups) and 3D (space groups) are most heavily used in applications, and they can be treated together.
Lattice proof
A rotation symmetry in dimension 2 or 3 must move a lattice point to a succession of other lattice points in the same plane, generating a regular polygon of coplanar lattice points. We now confine our attention to the plane in which the symmetry acts , illustrated with lattice vectors in the figure.
Now consider an 8-fold rotation, and the displacement vectors between adjacent points of the polygon. If a displacement exists between any two lattice points, then that same displacement is repeated everywhere in the lattice. So collect all the edge displacements to begin at a single lattice point. The edge vectors become radial vectors, and their 8-fold symmetry implies a regular octagon of lattice points around the collection point. But this is impossible, because the new octagon is about 80% as large as the original. The significance of the shrinking is that it is unlimited. The same construction can be repeated with the new octagon,
|
https://en.wikipedia.org/wiki/Littoral%E2%80%93Inner%20Carniola%20Statistical%20Region
|
The Littoral–Inner Carniola Statistical Region () is a statistical region in southwest Slovenia. Until January 1, 2015 it was named the Inner Carniola–Karst Statistical Region ().
The karst terrain, with Postojna Cave and intermittent Lake Cerknica, is the most important natural feature of this statistical region. This is one of the smallest statistical regions in Slovenia, and it is the least densely populated, with a population density six times lower than the Central Slovenia Statistical Region. The region is among the economically less developed ones in the country because in 2012 it contributed only 1.8% of Slovenia’s GDP. With an average of four employees per company, the enterprises in the region are among the smallest in Slovenia. In 2012, agriculture in this region generated around 6% of gross value added, which is one of the highest shares of gross value added by agriculture per individual region. In 2013, the average utilised agricultural area per farm was the highest in this region. The region has the highest employment rate in Slovenia (it was 59.9% in 2013), and the registered unemployment rate is among the lowest. The region also has the highest share of women in tertiary education (151 female students per 100 male students).
Municipalities
The Littoral–Inner Carniola Statistical Region comprises the following 6 municipalities:
Bloke
Cerknica
Ilirska Bistrica
Loška Dolina
Pivka
Postojna
Demographics
The population in 2020 was 52,841. It has a total area of 1,456 km².
Economy
Employment structure: 55.8% services, 36.8% industry, 7.4% agriculture.
Tourism
It attracts only 4.1% of the total number of tourists in Slovenia, most being from Italy (17.8%). Only 9.3% of tourists are from Slovenia.
Transportation
Length of motorways: 32.5 km
Length of other roads: 1241.9 km
|
https://en.wikipedia.org/wiki/Intellectual%20Mastery%20of%20Nature
|
Intellectual Mastery of Nature: Theoretical Physics from Ohm to Einstein is a two-volume reference work on the history of theoretical physics by Christa Jungnickel and Russell McCormmach that was initially published in 1986 by the University of Chicago Press. The book was well received and it won the 1987 Pfizer Award, given annually by the History of Science Society. In 2017, the duo released a revised and condensed version of the book through Springer International Publishing titled The Second Physicist: On the History of Theoretical Physics in Germany. The authors also wrote the 1996 and updated 1999 biography of Henry Cavendish, originally titled Cavendish, the book was given the subtitle The Experimental Life in the revised version of 1999.
Background
The book draws its name from Hermann von Helmholtz's view that the objective of theoretical physics is the "intellectual mastery of nature".
Content
Volume I: The Torch of Mathematics: 1800-1870
Volume 2: The Now Mighty Theoretical Physics: 1870-1925
Reception
Intellectual Mastery of Nature was met with critical acclaim and won the 1987 Pfizer Award, the highest award offered by the History of Science Society. The book was reviewed by John L. Heilbron, Jed Buchwald, I. Bernard Cohen, John Servos, L. Pearce Williams, Nancy J. Nersessian, and Paul Forman. In his 1988 review, Bernard Cohen wrote that the book is "replete with historical insights about science" and represents "a magisterial contribution to social, educational, institutional, and intellectual history and a magnificent portrayal of the actual growth and content of the science with which they are concerned." The book was also reviewed in Science, Nature, The Journal of Higher Education, Minerva, American Scientist, and several others; in a 2017 review of the authors' newer book The Second Physicist, it was remarked that the original was a "monumental" book "which was widely praised and justly given the Pfizer Award".
In his 1986 review, John L
|
https://en.wikipedia.org/wiki/Arity
|
In logic, mathematics, and computer science, arity () is the number of arguments or operands taken by a function, operation or relation. In mathematics, arity may also be called rank, but this word can have many other meanings. In logic and philosophy, arity may also be called adicity and degree. In linguistics, it is usually named valency.
Examples
In general, functions or operators with a given arity follow the naming conventions of n-based numeral systems, such as binary and hexadecimal. A Latin prefix is combined with the -ary suffix. For example:
A nullary function takes no arguments.
Example:
A unary function takes one argument.
Example:
A binary function takes two arguments.
Example:
A ternary function takes three arguments.
Example:
An n-ary function takes n arguments.
Example:
Nullary
A constant can be considered an operation of arity 0, called a nullary.
Also, outside of functional programming, a function without arguments can be meaningful and not necessarily constant (due to side effects). Such functions may have some hidden input, such as global variables or the whole state of the system (time, free memory, etc.).
Unary
Examples of unary operators in mathematics and in programming include the unary minus and plus, the increment and decrement operators in C-style languages (not in logical languages), and the successor, factorial, reciprocal, floor, ceiling, fractional part, sign, absolute value, square root (the principal square root), complex conjugate (unary of "one" complex number, that however has two parts at a lower level of abstraction), and norm functions in mathematics. In programming the two's complement, address reference, and the logical NOT operators are examples of unary operators.
All functions in lambda calculus and in some functional programming languages (especially those descended from ML) are technically unary, but see n-ary below.
According to Quine, the Latin distributives being singuli, bini, terni, and so f
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.