source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Subcellular%20localization
The cells of eukaryotic organisms are elaborately subdivided into functionally-distinct membrane-bound compartments. Some major constituents of eukaryotic cells are: extracellular space, plasma membrane, cytoplasm, nucleus, mitochondria, Golgi apparatus, endoplasmic reticulum (ER), peroxisome, vacuoles, cytoskeleton, nucleoplasm, nucleolus, nuclear matrix and ribosomes. Bacteria also have subcellular localizations that can be separated when the cell is fractionated. The most common localizations referred to include the cytoplasm, the cytoplasmic membrane (also referred to as the inner membrane in Gram-negative bacteria), the cell wall (which is usually thicker in Gram-positive bacteria) and the extracellular environment. The cytoplasm, the cytoplasmic membrane and the cell wall are subcellular localizations, whereas the extracellular environment is clearly not. Most Gram-negative bacteria also contain an outer membrane and periplasmic space. Unlike eukaryotes, most bacteria contain no membrane-bound organelles, however there are some exceptions (i.e. magnetosomes). Protein Subcellular Location Databases The experimentally determined subcellular locations of proteins can be found in UniProtKB, Compartments, and in a few more specialized resources, such as the lactic acid bacterial secretome database. There are also several subcellular location databases with computational predictions, such as the fungal secretome and subcellular proteome knowledgebase - version 2 (FunSecKB2), the plant secretome and subcellular proteome knowledgebase (PlantSecKB), MetazSecKB for protein subcellular locations of human and animals, and ProtSecKB for protein subcellular locations of all protists. See also Protein targeting Protein subcellular localization prediction.
https://en.wikipedia.org/wiki/Nibiru%20cataclysm
The Nibiru cataclysm is a supposed disastrous encounter between Earth and a large planetary object (either a collision or a near-miss) that certain groups believed would take place in the early 21st century. Believers in this doomsday event usually refer to this object as Nibiru or Planet X. The idea was first put forward in 1995 by Nancy Lieder, founder of the website ZetaTalk. Lieder claims she is a contactee with the ability to receive messages from extraterrestrials from the Zeta Reticuli star system through an implant in her brain. She states that she was chosen to warn mankind that the object would sweep through the inner Solar System in May 2003 (though that date was later postponed) causing Earth to undergo a physical pole shift that would destroy most of humanity. The prediction has subsequently spread beyond Lieder's website and has been embraced by numerous Internet doomsday groups. In the late 2000s, it became closely associated with the 2012 phenomenon. Since 2012, the Nibiru cataclysm has frequently reappeared in the popular media, usually linked to newsmaking astronomical objects such as Comet ISON or Planet Nine. Although the name "Nibiru" is derived from the works of the "ancient astronaut" writer Zecharia Sitchin and his interpretations of Babylonian and Sumerian mythology, he denied any connection between his work and various claims of a coming apocalypse. A prediction by self-described "Christian numerologist" David Meade that the Nibiru cataclysm would occur on 23 September 2017 received extensive media coverage. The idea that a planet-sized object will collide with or closely pass by Earth in the near future is not supported by any scientific evidence and has been rejected by astronomers and planetary scientists as pseudoscience and an Internet hoax. Such an object would have destabilised the orbits of the planets to the extent that their effects would be easily observable today. Astronomers have hypothesized many planets beyond Neptune, an
https://en.wikipedia.org/wiki/Iotapapillomavirus
Iotapapillomavirus is a genus of viruses, in the family Papillomaviridae. Rodents serve as natural hosts. There are two species in this genus. Diseases associated with this genus include: cutaneous lesions and benign skin tumours, such as papillomas and keratoacanthomas. Taxonomy The following two species are assigned to the genus: Iotapapillomavirus 1 Iotapapillomavirus 2 Structure Viruses in Iotapapillomavirus are non-enveloped, with icosahedral geometries, and T=7 symmetry. The diameter is around 60 nm. Genomes are circular, around 8kb in length. Life cycle Viral replication is nuclear. Entry into the host cell is achieved by attachment of the viral proteins to host receptors, which mediates endocytosis. Replication follows the dsDNA bidirectional replication model. DNA-templated transcription, with some alternative splicing mechanism is the method of transcription. The virus exits the host cell by nuclear envelope breakdown. Rodents serve as the natural host. Transmission routes are contact.
https://en.wikipedia.org/wiki/Immunologic%20checkpoint
An immune checkpoint regulator is a modulator of the immune system, that allows initiation of a productive immune response and prevents the onset of autoimmunity. Examples of such a molecule are cytotoxic T-lymphocyte antigen 4 (CTLA-4 or CD152), which is an inhibitory receptor found on immune cells and programmed cell death 1 (CD279), which has an important role in down-regulating the immune system by preventing the activation of T-cells. Tumours involve certain immune-checkpoint pathways as a major mechanism of immune resistance, particularly against T cells that are specific for tumor antigens. Therefore, the strategy in using immunological checkpoints in cancer therapy is to inhibit inhibitory molecules of the immune system, thus stimulating the immune system. The ability to interfere with the inhibitory function of checkpoint receptors CD152 and CD279 (programmed death-1) in oncology has proved successful. In metastatic melanoma FDA approved an αCD152 monoclonal antibody Ipilimumab, that was found to prolong survival. In melanoma, nonsmall cell lung cancer, and renal cell carcinoma there is hope with CD279 blocking Ab, that promotes antitumor responses. In hematologic malignancies a humanized αCD279 IgG1 needs further research. In solid tumors the use of CD279 IgG4 Ab is promising, and further CD273/PD-L2 in stage IV. In autoimmune rheumatic diseases, impaired tolerance leads to the development of diseases such as rheumatoid arthritis, systemic sclerosis, systemic lupus erythematosus, Sjogren’s syndrome, etc. Therefore, in autoimmune diseases the converse strategy of engaging immunological checkpoints may be beneficial: stimulate inhibitory molecules of the immune system, thus inhibiting the immune system (therefore, increase self-tolerance). What is known to work is Abatacept, an CD152-Ig used in treating rheumatoid arthritis and juvenile idiopathic arthritis. Not studied enough yet are the therapeutic opportunities using Programmed death-1 pathway.
https://en.wikipedia.org/wiki/Ciliary%20neurotrophic%20factor
Ciliary neurotrophic factor is a protein that in humans is encoded by the CNTF gene. The protein encoded by this gene is a polypeptide hormone and neurotrophic factor whose actions have mainly been studied in the nervous system where it promotes neurotransmitter synthesis and neurite outgrowth in certain neural populations including astrocytes. It is a hypothalamic neuropeptide that is a potent survival factor for neurons and oligodendrocytes and may be relevant in reducing tissue destruction during inflammatory attacks. A mutation in this gene, which results in aberrant splicing, leads to ciliary neurotrophic factor deficiency, but this phenotype is not causally related to neurologic disease. In addition to the predominant monocistronic transcript originating from this locus, the gene is also cotranscribed with the upstream ZFP91 gene. Cotranscription from the two loci results in a transcript that contains a complete coding region for the zinc finger protein but lacks a complete coding region for ciliary neurotrophic factor. CNTF has also been shown to be expressed by cells on the bone surface, and to reduce the activity of bone-forming cells (osteoblasts). Therapeutic applications Satiety effects In 2001, it was reported that in a human study examining the usefulness of CNTF for treatment of motor neuron disease, CNTF produced an unexpected and substantial weight loss in the study subjects. Further investigation revealed that CNTF could reduce food intake without causing hunger or stress, making it a candidate for weight control in leptin-resistant subjects, as CNTF is believed to operate like leptin, but by a non-leptin pathway. Recombinant human CNTF (Axokine) A recombinant version of human CNTF (rhCNTF), trade name Axokine, is a modified version with a 15 amino acid truncation of the C-terminus and two amino acid substitutions. It is three to five times more potent than CNTF in in vitro and in vivo assays and has improved stability properties. Like CN
https://en.wikipedia.org/wiki/Articularis%20cubiti%20muscle
The Articularis cubiti muscle is a muscle of the elbow. It is considered by some sources to be a part of the triceps brachii muscle. It is also known as the "subanconeus muscle", for its relationship to the anconeus muscle. It is classified as a muscle of the posterior brachium.
https://en.wikipedia.org/wiki/Haloarcula
Haloarcula (common abbreviation Har.) is a genus of extreme halophilic Archaea in the class of Halobactaria. Cell Structure Haloarcula species can be distinguished from other genera in the family Halobacteriaceae by the presence of specific derivatives of TGD-2 polar lipids. H. quadrata has predominantly flat, square-shaped, somewhat pleomorphic cells. Metabolism H. quadrata was first isolated when researchers were attempting to culture Haloquadratum walsbyi, a haloarchaeon that was thought to be unculturable until 2004. Similar to other halophilic archaea, Haloarcula species grow optimally at 40–45 °C. Growth appears in sheets of up to 65 cells often in the shape of a square or triangle. Taxonomy The genus of Haloarcula was long grouped with other halophilic archaea such as Halobacterium until genomic analysis prompted to reorder this genus in the new family of Haloarculaceae. Ecology Haloarcula species are found in neutral saline environments such as salt lakes, marine salterns, and saline soils. Like other members of the family Halobacteriaceae, Haloarcula requires at least 1.5 M NaCl for growth, but grow optimally in 2.0 to 4.5 M NaCl.
https://en.wikipedia.org/wiki/Pluripotency%20%28biological%20compounds%29
The pluripotency of biological compounds describes the ability of certain substances to produce several distinct biological responses. Pluripotent is also described as something that has no fixed developmental potential, as in being able to differentiate into different cell types in the case of pluripotent stem cells. One type of pluripotent cell, called a hematopoietic stem cell, can differentiate into a large variety of cells with different functions. This stem cell can produce red blood cells, platelets, mast cells, dendritic cells, macrophages, lymphocytes, neutrophils, basophils, and eosinophils. Each of these cells have a different function, but they all work together as part of the immune system. Monocytes can differentiate into either dendritic cells or macrophages. Macrophages are covered with chemical receptors and phagocytose foreign particles, but are specific about what immune responses to be involved in. Dendritic cells phagocytose invaders; then they present the antigen on their surface to stimulate the acquired immune system (lymphocytes) as backup. Another example are lymphocytes called naïve T-helper cells. These cells can differentiate into many subtypes once activated by antigen presenting cells (APCs) like dendrites. They divide into memory cells, TH1, TH17, and TH2 cells, to name a few. Memory cells are made solely for the purpose of having a template to use in the case of reinfection so the body has a jump start instead of starting over as if never infected. TH17 cells do a variety of tasks including recruiting neutrophils, creating defensins, and mediating inflammation in the intestinal epithelium and skin. TH2 cells produce cytokines that will trigger certain B cells. B cells can differentiate into memory cells or plasma cells. The B plasma cells produce the antibodies that are used to tag invading cells so they can be attacked, among other functions. TH1 cells are created to make cytokines, like interferon gamma, that activate macrophage
https://en.wikipedia.org/wiki/Everipedia
Everipedia () is a defunct blockchain-based online encyclopedia. Everipedia was founded in 2014 and was officially launched in 2015, as a fork of Wikipedia. Larry Sanger (who co-founded Wikipedia) joined the company in 2017. In 2022, Everipedia was inactivated, becoming a static archive and redirecting to a new crypto-only encyclopedia, IQ.Wiki. The company was initially headquartered in Westwood, Los Angeles but has since relocated to Santa Monica, California. The site depicts itself as "The World's Largest Blockchain & Crypto Encyclopedia" and formerly as "everyone's encyclopedia". History Everipedia (2014–2022) Everipedia, a portmantaeu of "Everyone's Encyclopedia", began in December 2014 as a small project of Sam Kazemian and Theodor Forselius in Kazemian's college dormitory room at University of California, Los Angeles (UCLA). The encyclopedia launched in January 2015 as a fork of Wikipedia. Travis Moore joined the company as a co-founder in the winter of 2015 and Mahbod Moghadam joined as a co-founder in July 2015. The company raised capital and received funding from angel investors. In July 2015, the company got its first seed funding from Mucker Capital and raised close to $130,000 from 201 investors on Wefunder. In October 2015, George Beall was introduced to Everipedia at a presentation in California State University, San Bernardino. After selling his technology start-up Touch Tiles in January 2016, Beall joined the group of co-founders. In 2016, the site generated most of its revenue from advertisements. The company aims to generate income through ways apart from donations or banners. In January 2017, they had eight full-time workers including two developers. By February 2018, headcount had increased to 15 full-time workers. , they raised $700,000 from angel investors. It was announced on February 8, 2018, that the company raised $30 million in funding headed by Galaxy Digital's EOS.io Ecosystem Fund. In December 2017, Everipedia announced that co-
https://en.wikipedia.org/wiki/List%20of%20black%20holes
This list of black holes (and stars considered probable candidates) is organized by mass (including black holes of undetermined mass); some items in this list are galaxies or star clusters that are believed to be organized around a black hole. Messier and New General Catalogue designations are given where possible. Supermassive black holes and candidates 1ES 2344+514 Ton 618 (this quasar has possibly the biggest black hole ever found, estimated at 66 billion solar masses) 3C 371 4C +37.11 (this radio galaxy is believed to have binary supermassive black holes) AP Lib S5 0014+81 (said to be a compact hyperluminous quasar, estimated at 40 billion solar masses) APM 08279+5255 (contains one of the largest black holes, estimated at 10-23 billion solar masses; previous candidate for largest) Arp 220 Centaurus A Fornax A HE0450-2958 IC 1459 Messier 31 (or the Andromeda Galaxy) Messier 32 Messier 51 (or the Whirlpool Galaxy) Messier 60 Messier 77 Messier 81 (or Bode's Galaxy) Messier 84 Messier 87 (or Virgo A) Messier 104 (or the Sombrero Galaxy) Messier 105 Messier 106 Mrk 421 Mrk 501 NGC 821 NGC 1023 NGC 1097 NGC 1271 NGC 1277 NGC 1332 NGC 1566 NGC 2787 NGC 3079 NGC 3115 NGC 3377 NGC 3384 NGC 3998 NGC 4151 NGC 4261 NGC 4438 NGC 4459 NGC 4473 NGC 4486B (a satellite galaxy of Messier 87) NGC 4564 NGC 4579 NGC 4596 NGC 4697 NGC 4889 NGC 4945 NGC 5033 NGC 6251 NGC 7052 NGC 7314 PKS 0521-365 Q0906+6930 (a blazar organized around a supermassive black hole) RX J1131 (first black hole whose spin was directly measured) Sagittarius A*, which is in the center of the Milky Way Types Quasar Supermassive black hole Hypercompact stellar system (hypothetical object organized around a supermassive black hole) Intermediate-mass black holes and candidates Cigar Galaxy (Messier 82, NGC 3034) GCIRS 13E HLX-1 M82 X-1 Messier 15 (NGC 7078) Messier 110 (NGC 205) Sculptor Galaxy (NGC 253) Triangulum Galaxy (Messier 33, NGC 598
https://en.wikipedia.org/wiki/Edge%20enhancement
Edge enhancement is an image processing filter that enhances the edge contrast of an image or video in an attempt to improve its acutance (apparent sharpness). The filter works by identifying sharp edge boundaries in the image, such as the edge between a subject and a background of a contrasting color, and increasing the image contrast in the area immediately around the edge. This has the effect of creating subtle bright and dark highlights on either side of any edges in the image, called overshoot and undershoot, leading the edge to look more defined when viewed from a typical viewing distance. The process is prevalent in the video field, appearing to some degree in the majority of TV broadcasts and DVDs. A modern television set's "sharpness" control is an example of edge enhancement. It is also widely used in computer printers especially for font or/and graphics to get a better printing quality. Most digital cameras also perform some edge enhancement, which in some cases cannot be adjusted. Edge enhancement can be either an analog or a digital process. Analog edge enhancement may be used, for example, in all-analog video equipment such as modern CRT televisions. Properties Edge enhancement applied to an image can vary according to a number of properties; the most common algorithm is unsharp masking, which has the following parameters: Amount. This controls the extent to which contrast in the edge detected area is enhanced. Radius or aperture. This affects the size of the edges to be detected or enhanced, and the size of the area surrounding the edge that will be altered by the enhancement. A smaller radius will result in enhancement being applied only to sharper, finer edges, and the enhancement being confined to a smaller area around the edge. Threshold. Where available, this adjusts the sensitivity of the edge detection mechanism. A lower threshold results in more subtle boundaries of colour being identified as edges. A threshold that is too lo
https://en.wikipedia.org/wiki/Security%20Protocols%20Open%20Repository
SPORE, the Security Protocols Open Repository, is an online library of security protocols with comments and links to papers. Each protocol is downloadable in a variety of formats, including rules for use with automatic protocol verification tools. All protocols are described using BAN logic or the style used by Clark and Jacob, and their goals. The database includes details on formal proofs or known attacks, with references to comments, analysis & papers. A large number of protocols are listed, including many which have been shown to be insecure. It is a continuation of the seminal work by John Clark and Jeremy Jacob. They seek contributions for new protocols, links and comments. See also Cryptographic nonce Cryptography Important books, papers, and open problems in cryptography. List of cryptography topics. Public-key cryptography Short and long lists of cryptographers. Symmetric-key algorithm
https://en.wikipedia.org/wiki/Heterarchy
A heterarchy is a system of organization where the elements of the organization are unranked (non-hierarchical) or where they possess the potential to be ranked a number of different ways. Definitions of the term vary among the disciplines: in social and information sciences, heterarchies are networks of elements in which each element shares the same "horizontal" position of power and authority, each playing a theoretically equal role. In biological taxonomy, however, the requisite features of heterarchy involve, for example, a species sharing, with a species in a different family, a common ancestor which it does not share with members of its own family. This is theoretically possible under principles of "horizontal gene transfer". A heterarchy may be parallel to a hierarchy, subsumed to a hierarchy, or it may contain hierarchies; the two kinds of structure are not mutually exclusive. In fact, each level in a hierarchical system is composed of a potentially heterarchical group which contains its constituent elements. The concept of heterarchy was first employed in a modern context by cybernetician Warren McCulloch in 1945. As Carole L. Crumley has summarised, "[h]e examined alternative cognitive structure(s), the collective organization of which he termed heterarchy. He demonstrated that the human brain, while reasonably orderly was not organized hierarchically. This understanding revolutionized the neural study of the brain and solved major problems in the fields of artificial intelligence and computer design." General principles, operationalization, and evidence In a group of related items, heterarchy is a state wherein any pair of items is likely to be related in two or more differing ways. Whereas hierarchies sort groups into progressively smaller categories and subcategories, heterarchies divide and unite groups variously, according to multiple concerns that emerge or recede from view according to perspective. Crucially, no one way of dividing a heterarchica
https://en.wikipedia.org/wiki/Cantuzumab%20ravtansine
Cantuzumab ravtansine (huC242-SPDB-DM4) is an antibody-drug conjugate designed for the treatment of cancers. The humanized monoclonal antibody cantuzumab (huC242) is linked to a cytotoxic agent, ravtansine (DM4). It uses a more hindered disulfide linkage than cantuzumab mertansine. See also Cantuzumab mertansine ImmunoGen Inc, developer of DM4 based drugs
https://en.wikipedia.org/wiki/PANoptosis
PANoptosis is an inflammatory cell death pathway. Genetic, molecular, and biochemical studies identified extensive crosstalk among the molecular components across cell death pathways in response to a variety of pathogens and innate immune triggers, leading to the conceptualization of PANoptosis. PANoptosis is defined as a unique innate immune inflammatory cell death pathway driven by caspases and RIPKs and regulated by multi protein PANoptosome complexes. PANoptosis is implicated in driving innate immune responses and inflammation in disease. PANoptosome formation and PANoptosis occur during pathogenic infections, including bacterial, viral, and fungal infections, as well as during inflammatory diseases and can be beneficial in the context of cancer. Inflammatory cell death is associated with activation of the immune system through the release of cytokines and damage-associated molecular patterns. Live pathogens that carry multiple pathogen-associated molecular patterns and homeostasis-altering triggers can modulate cell death pathways. Pyroptosis (inflammatory caspase-mediated cell death that drives maturation of the cytokines IL-1β and IL-18) and necroptosis (RIPK1/RIPK3/MLKL-driven cell death) were historically described as two major inflammatory cell death pathways, with recent studies describing PANoptosis as an additional inflammatory cell death pathway. Activation of PANoptosis can clear infected cells for host defense, and it has shown preclinical promise as an anti-cancer strategy. For example, PANoptosis is important for host defense during influenza infection through the ZBP1-PANoptosome and during Francisella and herpes simplex virus 1 infections through the AIM2-PANoptosome. Additionally, treatment of cancer cells with the PANoptosis-inducing agents TNF and IFN-γ can reduce tumor size in preclinical models. The combination of the nuclear export inhibitor selinexor and IFN can also cause PANoptosis and regress tumors in preclinical models. However, exc
https://en.wikipedia.org/wiki/Influenza%20A%20virus%20subtype%20H6N2
H6N2 is an avian influenza virus with two forms: one has a low and the other a high pathogenicity. It can cause a serious problem for poultry, and also infects ducks as well. H6N2 subtype is considered to be a non-pathogenic chicken virus, the host still unknown, but could strain from feral animals, and/or aquatic bird reservoirs. H6N2 along with H6N6 are viruses that are found to replicate in mice without preadaptation, and some have acquired the ability to bind to human-like receptors. Genetic markers for H6N2 include 22-amino acid stalk deletion in neuraminidase (NA) protein gene, increased N-glycosylation, and a D144 mutation of the Haemagglutinin (HA) protein gene. Transmission of avian influenza viruses from wild aquatic birds to domestic birds usually cause subclinical infections, and occasionally, respiratory disease and drops in egg production. Some histological features presented in chicken infected with H6N2 are fibrinous yolk peritonitis, salpingitis, oophoritis, nephritis, along with swollen kidneys as well. Signs and symptoms sneezing and lacrimation prostration anorexia and fever sometimes swelling of the infraorbital sinuses with nasal mucous
https://en.wikipedia.org/wiki/Ghost%20lineage
A ghost lineage is a hypothesized ancestor in a species lineage that has left no fossil evidence, but can still be inferred to exist or have existed because of gaps in the fossil record or genomic evidence. The process of determining a ghost lineage relies on fossilized evidence before and after the hypothetical existence of the lineage and extrapolating relationships between organisms based on phylogenetic analysis. Ghost lineages assume unseen diversity in the fossil record and serve as predictions for what the fossil record could eventually yield; these hypotheses can be tested by unearthing new fossils or running phylogenetic analyses. Ghost lineages and Lazarus taxa are related concepts, as both stem from gaps in the fossil record. A ghost lineage is any gap in a taxon's fossil record, with or without reappearance, while a Lazarus taxon is a type of ghost lineage wherein a species is believed to have gone extinct due to an absence of it in the fossil record, but then reappears after a period of time. Examples of Lazarus taxa include the famous coelacanths, as well as the Philippine naked-backed fruit bat. Name In 1992, an article stated: "These additional entities are taxa [groups] that are predicted to occur by the internal branching structure of phylogenetic trees....I refer to these as ghost lineages because they are invisible to the fossil record." Phylogenetic trees constructed based on fossil records and Darwin's Theory of Evolution often give an indication that species with similar phenotypes existed, although its fossil has not been discovered. It is important to note that ghost lineages and ghost taxa are not the same. A ghost lineage is a one direct connection between the descendant and the ancestor, whereas a ghost taxon has many split descendants. Examples When looking back at extinct organisms, there are some groups of organisms (or lineages) that have gaps in their fossil records. These organisms or species may be closely related to one anoth
https://en.wikipedia.org/wiki/Discrete%20Chebyshev%20polynomials
In mathematics, discrete Chebyshev polynomials, or Gram polynomials, are a type of discrete orthogonal polynomials used in approximation theory, introduced by Pafnuty Chebyshev and rediscovered by Gram. They were later found to be applicable to various algebraic properties of spin angular momentum. Elementary Definition The discrete Chebyshev polynomial is a polynomial of degree n in x, for , constructed such that two polynomials of unequal degree are orthogonal with respect to the weight function with being the Dirac delta function. That is, The integral on the left is actually a sum because of the delta function, and we have, Thus, even though is a polynomial in , only its values at a discrete set of points, are of any significance. Nevertheless, because these polynomials can be defined in terms of orthogonality with respect to a nonnegative weight function, the entire theory of orthogonal polynomials is applicable. In particular, the polynomials are complete in the sense that Chebyshev chose the normalization so that This fixes the polynomials completely along with the sign convention, . If the independent variable is linearly scaled and shifted so that the end points assume the values and , then as , times a constant, where is the Legendre polynomial. Advanced Definition Let be a smooth function defined on the closed interval [−1, 1], whose values are known explicitly only at points , where k and m are integers and . The task is to approximate f as a polynomial of degree n < m. Consider a positive semi-definite bilinear form where and are continuous on [−1, 1] and let be a discrete semi-norm. Let be a family of polynomials orthogonal to each other whenever is not equal to . Assume all the polynomials have a positive leading coefficient and they are normalized in such a way that The are called discrete Chebyshev (or Gram) polynomials. Connection with Spin Algebra The discrete Chebyshev polynomials have surprising connections to vario
https://en.wikipedia.org/wiki/Debris
Debris (, ) is rubble, wreckage, ruins, litter and discarded garbage/refuse/trash, scattered remains of something destroyed, or, as in geology, large rock fragments left by a melting glacier, etc. Depending on context, debris can refer to a number of different things. The first apparent use of the French word in English is in a 1701 description of the army of Prince Rupert upon its retreat from a battle with the army of Oliver Cromwell, in England. Disaster In disaster scenarios, tornadoes leave behind large pieces of houses and mass destruction overall. This debris also flies around the tornado itself when it is in progress. The tornado's winds capture debris it kicks up in its wind orbit, and spins it inside its vortex. The tornado's wind radius is larger than the funnel itself. Tsunamis and hurricanes also bring large amounts of debris, such as Hurricane Katrina in 2005 and Hurricane Sandy in 2012. Earthquakes rock cities to rubble debris. Geological In geology, debris usually applies to the remains of geological activity including landslides, volcanic explosions, avalanches, mudflows or Glacial lake outburst floods (Jökulhlaups) and moraine, lahars, and lava eruptions. Geological debris sometimes moves in a stream called a debris flow. When it accumulates at the base of hillsides, it can be called "talus" or "scree". In mining, debris called attle usually consists of rock fragments which contain little or no ore. Marine Marine debris applies to floating garbage such as bottles, cans, styrofoam, cruise ship waste, offshore oil and gas exploration and production facilities pollution, and fishing paraphernalia from professional and recreational boaters. Marine debris is also called litter or flotsam and jetsam. Objects that can constitute marine debris include used automobile tires, detergent bottles, medical wastes, discarded fishing line and nets, soda cans, and bilge waste solids. In addition to being unsightly, it can pose a serious threat to marine lif
https://en.wikipedia.org/wiki/List%20of%20psychological%20research%20methods
A wide range of research methods are used in psychology. These methods vary by the sources from which information is obtained, how that information is sampled, and the types of instruments that are used in data collection. Methods also vary by whether they collect qualitative data, quantitative data or both. Qualitative psychological research findings are not arrived at by statistical or other quantitative procedures. Quantitative psychological research findings result from mathematical modeling and statistical estimation or statistical inference. The two types of research differ in the methods employed, rather than the topics they focus on. There are three main types of psychological research: Correlational research Descriptive research Experimental research Common methods Common research designs and data collection methods include: Archival research Case study uses different research methods (e.g. interview, observation, self-report questionnaire) with a single case or small number of cases. Computer simulation (modeling) Ethnography Event sampling methodology, also referred to as experience sampling methodology, diary study, or ecological momentary assessment Experiment, often with separate treatment and control groups (see scientific control and design of experiments). See Experimental psychology for many details. Field experiment Focus group Interview, can be structured or unstructured. Meta-analysis Neuroimaging and other psychophysiological methods Observational study, can be naturalistic (see natural experiment), participant or controlled. Program evaluation Quasi-experiment Self-report inventory Survey, often with a random sample (see survey sampling) Twin study Research designs vary according to the period(s) of time over which data are collected: Retrospective cohort study: Participants are chosen, then data are collected about their past experiences. Prospective cohort study: Participants are recruited prior to the proposed
https://en.wikipedia.org/wiki/Above-threshold%20ionization
In atomic, molecular, and optical physics, above-threshold ionization (ATI) is a multi-photon effect where an atom is ionized with more than the energetically required number of photons. It was first observed in 1979 by Pierre Agostini and colleagues in xenon gas. Photoelectrons In the case of ATI the photoelectron peaks should appear at where the integer n represents the minimal number of photons absorbed, and the integer s represents the number of additional photons absorbed. W is the ionization energy, and is the electron kinetic energy of the peak corresponding to s additional photons being absorbed. Structure It typically has a strong maximum at the minimal number of photons to ionize the system, with successive peaks (known as ATI peaks) separated by the photon energy and thus corresponding to higher numbers of photons being absorbed. In the non-perturbative regime the bound states are dressed with the electric field, shifting the ionization energy. If the ponderomotive energy of the field is greater than the photon energy , then the first peak disappears. Features from ultrashort pulses High intensity ultrashort pulse lasers can create ATI features with 20 or more peaks. The photoelectron spectrum of electron energies is continuous since actual light sources contain a spread of energies.
https://en.wikipedia.org/wiki/Social%20experiment
A social experiment is a method of psychological or sociological research that observes people's reactions to certain situations or events. The experiment depends on a particular social approach where the main source of information is the participants' point of view and knowledge. To carry out a social experiment, specialists usually split participants into two groups — active participants (people who take action in particular events) and respondents (people who react to the action). Throughout the experiment, specialists monitor participants to identify the effects and differences resulting from the experiment. A conclusion is then created based on the results. Intentional communities are generally considered social experiments. Social psychology offers insight into how individuals act in groups and how behavior is affected by social burdens and pressures. In most social experiments, the subjects are unaware that they are partaking in an experiment. Several "actors" or "plants" are used to study social behaviors. Companies have also used social experiments to collect consumer data and their opinions about a product or a particular topic. History In 1895, American psychologist Norman Triplett constructed one of the earliest known social experiments, in which he found out that cyclists managed to ride a bike faster when racing against another person rather than racing against the clock. He duplicated the experiment in a laboratory using children and fishing reels and received similar results. Field social experiments had proved to be efficient as it reflects real life due to their natural setting. The social experiments commonly referred to today were conducted decades later, in which an experiment is done in a controlled environment such as a laboratory. An example of this is Stanley Milgram's obedience experiment in 1963. Social experiments began in the United States as a test of the negative income tax concept in the late 1960s and since then have been conducte
https://en.wikipedia.org/wiki/Pretty%20Easy%20privacy
Pretty Easy privacy (p≡p or pEp) is a pluggable data encryption and verification system, that provides automatic cryptographic key management through a set of libraries (providing p≡p adapters for application developers used programming languages and development environments) for written digital communications. Its main goal is to make end-to-end encryption the default in written digital communications for all users in the easiest way possible and on the channels they already make use of, including e-mails, SMS, or other types of messages. It exists as a plugin for Microsoft Outlook and Mozilla Thunderbird as well as a mobile app for Android and iOS. p≡p also works under Microsoft Windows, Unix-like and Mac OS X operating systems. Its cryptographic functionality is handled by an open-source p≡p engine relying on already existing cryptographic implementations in software like GnuPG, a modified version of netpgp (used only in iOS), and (as of p≡p v2.0) GNUnet. In its default configuration, p≡p does not rely on a web of trust or any form of centralized trust infrastructure, but instead lets users verify each other's authenticity by comparing cryptographic fingerprints in the form of natural language strings. Pretty Easy privacy was first released in 2016. Their free and open-source software includes p≡p engine, adapters, apps and add-ons (Including Microsoft Outlook). In March 2021, it was revealed that the company behind p≡p paid for fake reviews for their apps. Design principles Above all, p≡p – supposedly contrary to existing cryptographic solutions – should be easy to install, use, and understand. Furthermore, for their communications, p≡p users do not depend on any specific platform, message transport system (SMS, email, XMPP, etc.), or centrally provided client–server or "cloud" infrastructures: p≡p is fully peer-to-peer by design. Keys are exchanged opportunistically by transferring via email. Enigmail support Enigmail announced its support for the ne
https://en.wikipedia.org/wiki/Proof%20of%20identity%20%28blockchain%20consensus%29
Proof of identity (PoID) is a consensus protocol for permission-less blockchains, in which each uniquely identified individual receives one equal unit of voting power and associated rewards (minting token). The protocol is based on biometric identification, humanity identification parties and additional verification parties. The proof of identity supersedes the approach of proof of work and proof of stake which distribute voting power and rewards to participants according to their investment in some activity or resource and introduces the opportunity to create a universal basic income (UBI) for individuals. The proof of identity solves the problem with the proof of personhood in which individuals are requested to attend recurrent pseudonymous parties and creates a network that is permanently secured and censorship resilient. Background Currently used proofs of investment In a permission-less network, some kind of proof is required to prevent Sybil attacks, i.e., the event in which an attacker gains control over the transactions of the network by creating multiple users generated with a malicious script. The most common methods to prevent Sybil attacks are proofs of investment (proof of work, proof of stake) that require participants of the network to invest in some activity or resource as evidence of genuine involvement in the chain. The growing criticism over this approach is that voting power and rewards are not distributed equally among individuals but instead, big holders/corporations benefit the most from the network. Proof of investment blockchains are thus prone to the formation of oligarchies and marginally appeal to small investors/holders who receive minimal rewards. In the case of proof of work, there are additional sustainability concerns over the amount of electrical energy wasted as proof. The idea of having a "unique identity system" as a consensus protocol for cryptocurrencies, which would give each human user one and only one anti-Sybil pa
https://en.wikipedia.org/wiki/Code%20injection
Code injection is the exploitation of a computer bug that is caused by processing invalid data. The injection is used by an attacker to introduce (or "inject") code into a vulnerable computer program and change the course of execution. The result of successful code injection can be disastrous, for example, by allowing computer viruses or computer worms to propagate. Code injection vulnerabilities occur when an application sends untrusted data to an interpreter. Injection flaws are most often found in SQL, LDAP, XPath, NoSQL queries, OS commands, XML parsers, SMTP headers, program arguments, etc. Injection flaws tend to be easier to discover when examining source code than via testing. Scanners and fuzzers can help find injection flaws. Injection can result in data loss or corruption, lack of accountability, or denial of access. Injection can sometimes lead to complete host takeover. Certain types of code injection are errors in interpretation, giving special meaning to user input. Similar interpretation errors exist outside the world of computer science such as the comedy routine Who's on First?. In the routine, there is a failure to distinguish proper names from regular words. Likewise, in some types of code injection, there is a failure to distinguish user input from system commands. Code injection techniques are popular in system hacking or cracking to gain information, privilege escalation or unauthorized access to a system. Code injection can be used malevolently for many purposes, including: Arbitrarily modifying values in a database through SQL injection. The impact of this can range from website defacement to serious compromise of sensitive data. Installing malware or executing malevolent code on a server by injecting server scripting code (such as PHP or ASP). Privilege escalation to root permissions by exploiting Shell Injection vulnerabilities in a setuid root binary on UNIX, or Local System by exploiting a service on Microsoft Windows. Attacking
https://en.wikipedia.org/wiki/Glossomastix
Glossomastix is a genus of heterokont. It includes a single species, Glossomastix chrysoplasta.
https://en.wikipedia.org/wiki/TRACER%20%28cosmic%20ray%20detector%29
Transition Radiation Array for Cosmic Energetic Radiation (TRACER) is a balloon flown cosmic ray detector built and designed at the University of Chicago. The detector is designed to measure the energy spectra of cosmic ray nuclei with atomic numbers between five and twenty-six (boron to iron).
https://en.wikipedia.org/wiki/MED1
Mediator of RNA polymerase II transcription subunit 1 also known as DRIP205 or Trap220 is a subunit of the Mediator complex and is a protein that in humans is encoded by the MED1 gene. MED1 functions as a nuclear receptor coactivator. Function The activation of gene transcription is a multistep process that is triggered by factors that recognize transcriptional enhancer sites in DNA. These factors work with co-activators to direct transcriptional initiation by the RNA polymerase II apparatus. The mediator of RNA polymerase II transcription subunit 1 protein is a subunit of the CRSP (cofactor required for SP1 activation) complex, which, along with TFIID, is required for efficient activation by SP1. This protein is also a component of other multisubunit complexes [e.g., thyroid hormone receptor-(TR-) associated proteins that interact with TR and facilitate TR function on DNA templates in conjunction with initiation factors and cofactors]. It also regulates p53-dependent apoptosis and it is essential for adipogenesis. This protein is known to have the ability to self-oligomerize. Interactions MED1 has been shown to interact with: Androgen receptor, BRCA1, Calcitriol receptor, Cyclin-dependent kinase 8, Estrogen receptor alpha, Glucocorticoid receptor, Hepatocyte nuclear factor 4 alpha, P53, PPARGC1A, PPARG, TGS1, and Thyroid hormone receptor alpha. Protein family This entry represents subunit Med1 of the Mediator complex. The Med1 forms part of the Med9 submodule of the Srb/Med complex. It is one of three subunits essential for viability of the whole organism via its role in environmentally-directed cell-fate decisions.
https://en.wikipedia.org/wiki/Disaccharidase
Disaccharidases are glycoside hydrolases, enzymes that break down certain types of sugars called disaccharides into simpler sugars called monosaccharides. In the human body, disaccharidases are made mostly in an area of the small intestine's wall called the brush border, making them members of the group of "brush border enzymes". A genetic defect in one of these enzymes will cause a disaccharide intolerance, such as lactose intolerance or sucrose intolerance. Examples of disaccharidases Lactase (breaks down lactose into glucose and galactose) Maltase (breaks down maltose into 2 glucoses) Sucrase (breaks down sucrose into glucose and fructose) Trehalase (breaks down trehalose into 2 glucoses) For a thorough scientific overview of small-intestinal disaccharidases, one can consult chapter 75 of OMMBID. For more online resources and references, see inborn error of metabolism.
https://en.wikipedia.org/wiki/Michel%20de%20Castelnau
Michel de Castelnau, Sieur de la Mauvissière (c. 1520–1592) was a French soldier and diplomat, ambassador to Queen Elizabeth. He wrote a memoir covering the period between 1559 and 1570. Life He was born in La Mauvissière (now part of Neuvy-le-Roi, Indre-et-Loire), Touraine about 1520. He was a son of Jean de Castelnau and Jeanne Dusmesnil, one of a family of nine children. His grandfather, Pierre de Castelnau, had been Equerry (Master of the Horse) to Louis XII. Endowed with a clear and penetrating intellect and remarkable strength of memory, he received a careful education, capped off with travels in Italy and a long stay at Rome. He then spent some time in Malta and afterwards entered the army. His first acquaintance with war was in the campaigns of the French in Italy. His abilities and his courage won him the friendship and protection of Charles, Cardinal of Lorraine, who took him into his service. In 1557 a command in the navy was given to him, and the cardinal proposed to get him knighted. This, however, he declined, and then rejoined the French army in Picardy. Various delicate missions requiring tact and discretion were entrusted to him by the Constable, Anne de Montmorency, and these he discharged so satisfactorily that he was sent by the king, Henry II, to Scotland with dispatches for Mary of Guise, the mother of Mary, Queen of Scots, who was betrothed to the Dauphin (afterwards Francis II). From Scotland he passed into England in 1559, and treated with Queen Elizabeth respecting her claims on Calais, a settlement of which was effected at the congress of Le Cateau-Cambrésis. He was next sent as ambassador to the princes of Germany, for the purpose of prevailing upon them to withdraw their favor from the Protestants. This embassy was followed by missions to Margaret of Austria, governess of the Netherlands, to Savoy, and then to Rome, to ascertain the views of Pope Paul IV in regard to France. Paul having died just before his arrival, Castelnau used hi
https://en.wikipedia.org/wiki/Pleurotolysin
Pleurotolysin (TC# 1.C.97.1.1), a sphingomyelin-specific cytolysin. Its A (17 kDa; Q8X1M9) and B (59 kDa; Q5W9E8) components are assembled into a transmembrane pore complex. The Pleurotolysin Pore-Forming (Pleurotolysin) Family (TC# 1.C.97) is a family of pore forming proteins belonging to the MACPF superfamily. Function Proteins with membrane-attack complex/perforin (MACPF) domains have a variety of biological roles, including defense and attack, organismal development, and cell adhesion and signaling. The distribution of these proteins in fungi appears to be restricted to some Pezizomycotina and Basidiomycota species only, in correlation with the aegerolysins (PF06355). These two protein groups coincide in only a few species, and they operate as cytolytic bi-component pore-forming agents. Representative proteins include pleurotolysin B, which has a MACPF domain, the aegerolysin-like protein pleurotolysin A, and the very similar ostreolysin A (TC# 1.C.97.3.2) that has been purified from oyster mushroom (Pleurotus ostreatus). These act in concert to perforate natural and artificial lipid membranes with high cholesterol and sphingomyelin contents. The complex has a 13-meric rosette-like structure with a central lumen that is ~ 4-5 nm in diameter. The opened transmembrane pore is non-selectively permeable to ions and smaller neutral solutes, and is a cause of cytolysis of a colloid-osmotic type. Research Sakurai et al. 2004 cloned complementary and genomic DNAs encoding pleurotolysin, and studied pore-forming properties of recombinant proteins. Recombinant pleurotolysin A lacking the first methionine was purified as a 17-kDa protein with sphingomyelin-binding activity. The cDNA for pleurotolysin B encoded a precursor consisting of 523 amino acyl residues, of which 48 N-terminal amino acyl residues were absent in natural pleurotolysin B. Mature and precursor forms of pleurotolysin B were expressed as insoluble 59- and 63-kDa proteins, respectively. Although neither
https://en.wikipedia.org/wiki/Senait%20Fisseha
Professor Senait Fisseha is an Ethio-American physician, lawyer and obstetrician-gynecologist, with a specialization in endocrinology from the University of Michigan. She is currently Vice-President of International Programs at the Susan Thompson Buffet Foundation. Fisseha also received her Juris Doctor from Southern Illinois University and is recognized for her advocacy in global reproductive health, rights and gender equality. During the Covid-19 pandemic, she became an advocate for global equity, collaborating closely with African leaders and institutions in her capacity as an advisor and thought leader. Fisseha is the founder of the Center for International Reproductive Health Training (CIRHT) at the University of Michigan. She also chaired the election campaign and transition of Tedros Adhanom, the first African Director General of the World Health Organization, in 2016-17. Background and education Born in Addis Ababa, Ethiopia, Fisseha was the third youngest of ten siblings. Unlike her older siblings who were interested in engineering and physics, Senait showed an interest in medicine from a very young age. After concluding her high school education, Fisseha briefly studied at Tikur Anbessa (Black Lion Medical School) in Addis Ababa. In 1989, she relocated to the United States, enrolling at Rosary College (now Dominican University), where she earned her Bachelor of Science degree. Subsequently, she received funding from the Howard Hughes Medical Institute to pursue research at the University of Michigan. While at the University of Michigan, Senait developed new interests in the field of medical malpractice, specifically in the fields of obstetrics and gynecology. This, combined with an interest in international women's health and women's rights, led to pursuit of a joint Juris Doctor (J.D.)/Doctor of Medicine (M.D.) program. In 1999, she graduated with honors from Southern Illinois University, and was inducted into the Alpha Omega Alpha honor society. She
https://en.wikipedia.org/wiki/EA-3148
EA-3148 (Substance 100A) is a "V-series" nerve agent related to the better-known compounds VX and VR. It was studied by both the US and Soviet chemical weapons programmes during the Cold War, and is notable as the only V-series organophosphate nerve agent specifically identified in public domain sources as having a higher absolute potency as an acetylcholinesterase inhibitor than VX (around 50% more potent by weight). However, both the US and Soviet investigations of the compound concluded that despite its high potency, the physicochemical properties of the substance made it unsuitable for weaponisation, and further research was not conducted. The chemical structure of EA-3148 falls within the scope of compounds designated "Toxic chemicals" under Schedule 1 of the Chemical Weapons Convention and so it is illegal throughout the world under international law and may only be used for certain types of scientific and medical research. Effects A healthy American male soldier was given EA-3148, 1.15 µg/kg i.v.. Erythrocyte AChE values dropped precipitously to 22% of normal within 15 min of dosing and to 0% at 48 h; the value recovered to 88% of normal at 72 days post-exposure. Signs of toxicity were evident within 5-8 min of treatment in two comparably dosed subjects who felt dizzy, weak, tired, sweaty, and had hands and feet that were moist. Within 2 h post-exposure, these subjects reportedly were resting, eating, and feeling fine. A U.S. Army report summarizing experience with EA-3148 noted anorexia, fatigue, poor sleep, unusual dreams, dizziness, euphoria, blurred vision, increased salivation, restlessness; decrements in a test of numerical facility in four individuals and exaggeration of a schizoid personality in one male soldier.
https://en.wikipedia.org/wiki/NDUFA3
NADH dehydrogenase [ubiquinone] 1 alpha subcomplex subunit 3 is a protein that in humans is encoded by the NDUFA3 gene. The NDUFA3 protein is a subunit of NADH dehydrogenase (ubiquinone), which is located in the mitochondrial inner membrane and is the largest of the five complexes of the electron transport chain. Structure The NDUFA3 gene is located on the q arm of chromosome 19 at position 13.42, and it has a total span of 4,123 base pairs. The NDUFA3 gene produces a 9.3 kDa protein composed of 84 amino acids. NDUFA3 is a subunit of the enzyme NADH dehydrogenase (ubiquinone), the largest of the respiratory complexes. The structure is L-shaped with a long, hydrophobic transmembrane domain and a hydrophilic domain for the peripheral arm that includes all the known redox centers and the NADH binding site. NDUFA3 is one of about 31 hydrophobic subunits that form the transmembrane region of Complex I. It has been noted that the N-terminal hydrophobic domain has the potential to be folded into an alpha helix spanning the inner mitochondrial membrane with a C-terminal hydrophilic domain interacting with globular subunits of Complex I. The highly conserved two-domain structure suggests that this feature is critical for the protein function and that the hydrophobic domain acts as an anchor for the NADH:ubiquinone oxidoreductase complex at the inner mitochondrial membrane. Function The human NDUFA3 gene codes for a subunit of Complex I of the respiratory chain, which transfers electrons from NADH to ubiquinone. However, NDUFA3 is an accessory subunit of the complex that is believed not to be involved in catalysis. Initially, NADH binds to Complex I and transfers two electrons to the isoalloxazine ring of the flavin mononucleotide (FMN) prosthetic arm to form FMNH2. The electrons are transferred through a series of iron-sulfur (Fe-S) clusters in the prosthetic arm and finally to coenzyme Q10 (CoQ), which is reduced to ubiquinol (CoQH2). The flow of electrons changes the
https://en.wikipedia.org/wiki/Schr%C3%B6dinger%20picture
In physics, the Schrödinger picture or Schrödinger representation is a formulation of quantum mechanics in which the state vectors evolve in time, but the operators (observables and others) are mostly constant with respect to time (an exception is the Hamiltonian which may change if the potential changes). This differs from the Heisenberg picture which keeps the states constant while the observables evolve in time, and from the interaction picture in which both the states and the observables evolve in time. The Schrödinger and Heisenberg pictures are related as active and passive transformations and commutation relations between operators are preserved in the passage between the two pictures. In the Schrödinger picture, the state of a system evolves with time. The evolution for a closed quantum system is brought about by a unitary operator, the time evolution operator. For time evolution from a state vector at time 0 to a state vector at time , the time-evolution operator is commonly written , and one has In the case where the Hamiltonian of the system does not vary with time, the time-evolution operator has the form where the exponent is evaluated via its Taylor series. The Schrödinger picture is useful when dealing with a time-independent Hamiltonian ; that is, . Background In elementary quantum mechanics, the state of a quantum-mechanical system is represented by a complex-valued wavefunction . More abstractly, the state may be represented as a state vector, or ket, . This ket is an element of a Hilbert space, a vector space containing all possible states of the system. A quantum-mechanical operator is a function which takes a ket and returns some other ket . The differences between the Schrödinger and Heisenberg pictures of quantum mechanics revolve around how to deal with systems that evolve in time: the time-dependent nature of the system must be carried by some combination of the state vectors and the operators. For example, a quantum harmonic o
https://en.wikipedia.org/wiki/Sky%20Gnome
The Sky Gnome was a device from British Sky Broadcasting launched under their Sky Digital brand. It allowed users to listen to radio channels and digital television from their Sky digibox from around the house. History The Sky Gnome was released in September 2005 and was available until mid-2007 with a retail price of £75. Although Sky no longer markets the 'Gnome', it is still possible to use existing units. Until recent times, the website was available to use, but now it shows the message: "I'm Gone,", as well as the manufacturer's website (though that is covered with a simple domain holding page). The Gnome had many advantages compared to a DAB receiver: It provided more stations than a DAB radio, and the broadcasts were almost all of higher audio quality on satellite than via DAB. It worked anywhere in the UK that has a satellite installation compared to DAB which does not have universal coverage. A major disadvantage, however, was the device was not strictly a radio device and instead was effectively an external speaker - meaning it was not possible for one person to use the Sky TV service and another to listen to a different radio station. Technical information The Sky Gnome used a 433 MHz digital communication link to communicate information to and from the Digibox, the wide FM modulated audio was sent on one of four channels: 863.4 MHz, 863.8 MHz, 864.2 MHz, or 864.6 MHz. The Sky Gnome sender box connected to the main Digibox using the RS-232, audio out and RF2 connections. RS-232 is used to obtain information about the Sky box, such as current channel and time, while the RF2 connection is used for transmitting remote control inputs from the Gnome to the digibox. The Sky Gnome was compatible with the Sky and Sky+ Digiboxes. When used in a non-Sky satellite receiver, it was possible to listen to the radio channels, it was possible to change the channels of the receiver from the Sky Gnome.
https://en.wikipedia.org/wiki/Advanced%20Continuous%20Simulation%20Language
The Advanced Continuous Simulation Language, or ACSL (pronounced "axle"), is a computer language designed for modeling and evaluating the performance of continuous systems described by time-dependent, nonlinear differential equations. Like SIMCOS and TUTSIM, ACSL is a dialect of the Continuous System Simulation Language (CSSL), originally designed by the Simulation Councils Inc (SCI) in 1967 in an attempt to unify the continuous simulations field. Language highlights ACSL is an equation-oriented language consisting of a set of arithmetic operators, standard functions, a set of special ACSL statements, and a MACRO capability which allows extension of the special ACSL statements. ACSL is intended to provide a simple method of representing mathematical models on a digital computer. Working from an equation description of the problem or a block diagram, the user writes ACSL statements to describe the system under investigation. An important feature of ACSL is its sorting of the continuous model equations, in contrast to general purpose programming languages such as Fortran where program execution depends critically on statement order. Typical applications Applications of ACSL in new areas are being developed constantly. Typical areas in which ACSL is currently applied include control system design, aerospace simulation, chemical process dynamics, power plant dynamics, plant and animal growth, toxicology models, vehicle handling, microprocessor controllers, and robotics.
https://en.wikipedia.org/wiki/Project%20Wonderful
Project Wonderful was an advertising service created by programmer and webcomic author Ryan North in late 2006. Headquartered in Toronto, Ontario, the service supported up thousands of webcomics and blogs with auctioned online advertisements, until it was shut down in 2018. Concept and development In early 2006, Ryan North was talking with a friend about how they severely disliked existing online advertisement services such as Google ads and AdSense, because advertisements on those platforms are priced based on user clicks or displays, and "the Internet isn't really designed to keep track of who clicked where, when, and who viewed what page when." Project Wonderful launched 8 months later. Rather than paying for clicks, Project Wonderful allowed websites to auction advertisement space. Advertisers were able to bid on a particular ad block on a particular website and, as long as their bid was the highest, they got to decide what is shown on it. Being invite-only, Project Wonderful initially only had a few dozen advertisers participating in the "perpetual auction" of ad space, though this number grew rapidly. Project Wonderful was built on open source software, coupled with MySQL databases and an Apache front-end. The service was designed specifically for cartoonists, but in turn worked well for any independent website. Implementing new features into Project Wonderful took up most of North's time in the years following its initial release, together with his webcomic Dinosaur Comics. Usage Many webcomics, including Awkward Zombie, Loading Artist, Saturday Morning Breakfast Cereal, Questionable Content, Qwantz, MS Paint Adventures, Sinfest, and A Softer World used Project Wonderful as an advertising service. The service was used on platforms such as ComicSpace and Graphic Smash immediately after launch. Shaenon Garrity worked on implementing Project Wonderful on the subscription service Modern Tales in 2007. At its peak, Project Wonderful had around 10,000 publisher
https://en.wikipedia.org/wiki/Condyloid%20fossa
Behind either condyle of the lateral parts of occipital bone is a depression, the condyloid fossa (or condylar fossa), which receives the posterior margin of the superior facet of the atlas when the head is bent backward; the floor of this fossa is sometimes perforated by the condyloid canal, through which an emissary vein passes from the transverse sinus. Additional images See also Occipital condyle Atlas
https://en.wikipedia.org/wiki/Tropical%20Atlantic%20SST%20Dipole
The Tropical Atlantic SST Dipole refers to a cross-equatorial sea surface temperature (SST) pattern that appears dominant on decadal timescales. It has a period of about 12 years, with the SST anomalies manifesting their most pronounced features around 10–15 degrees of latitude off of the Equator. It is also referred to as the interhemispheric SST gradient or the Meridional Atlantic mode. This decadal-scale SST pattern constitutes one of the key features of SST variability in the Tropical Atlantic Ocean. Another one is the Atlantic Equatorial Mode, which occurs in the zonal (east-west) direction at interannual timescales, with sea surface temperature and heat content anomalies being observed in the eastern equatorial basin. Its importance in climate dynamics and decadal-scale climate prediction is evident when investigating its impact on adjacent continental regions such as the Northeast Brazil, the Sahel as well as its influence on North Atlantic cyclogenesis. Structure and key features of the interhemispheric SST dipole Early studies have focused on the connection between the enhancement (decrease) of tropical rainfall in regions such as Northeast Brazil, the Western Sub-Saharan Africa etc. and perturbations in the tropical Atlantic sea surface temperatures (Moura and Shukla (1981), Nobre and Shukla (1996).) Such research efforts have concentrated on the role of the interhemispheric (meridional) SST mode as a dynamical driver of the tropical Atlantic overlying atmosphere, by analyzing perturbations of this coupled tropical ocean-atmosphere system while examining local as well as remote influences (i.e. the tropical -mid-latitude N. Atlantic connection (Tanimoto and Xie (1999), Tourre et al. (1999)), the tropical Pacific influence via El Nino/La Nina events (Enfield and Mayer (1997)). Other studies, however, such as the ones carried out by Houghton and Tourre (1992) and Enfield and Mayer (1997), have questioned the very existence of this interhemispheric grad
https://en.wikipedia.org/wiki/The%20Unreasonable%20Effectiveness%20of%20Mathematics%20in%20the%20Natural%20Sciences
"The Unreasonable Effectiveness of Mathematics in the Natural Sciences" is a 1960 article by the physicist Eugene Wigner. In this paper, Wigner observes that a physical theory's mathematical structure often points the way to further advances in that theory and even to empirical predictions. Original paper and Wigner's observations Wigner begins his paper with the belief, common among those familiar with mathematics, that mathematical concepts have applicability far beyond the context in which they were originally developed. Based on his experience, he writes, "it is important to point out that the mathematical formulation of the physicist's often crude experience leads in an uncanny number of cases to an amazingly accurate description of a large class of phenomena". He then invokes the fundamental law of gravitation as an example. Originally used to model freely falling bodies on the surface of the earth, this law was extended on the basis of what Wigner terms "very scanty observations" to describe the motion of the planets, where it "has proved accurate beyond all reasonable expectations". Another oft-cited example is Maxwell's equations, derived to model the elementary electrical and magnetic phenomena known as of the mid-19th century. The equations also describe radio waves, discovered by David Edward Hughes in 1879, around the time of James Clerk Maxwell's death. Wigner sums up his argument by saying that "the enormous usefulness of mathematics in the natural sciences is something bordering on the mysterious and that there is no rational explanation for it". He concludes his paper with the same question with which he began: The miracle of the appropriateness of the language of mathematics for the formulation of the laws of physics is a wonderful gift which we neither understand nor deserve. We should be grateful for it and hope that it will remain valid in future research and that it will extend, for better or for worse, to our pleasure, even though perhaps
https://en.wikipedia.org/wiki/NProtect%20GameGuard%20Personal%202007
nProtect GameGuard Personal 2007 (often referred to as nProtect GGP2007) is an Anti-Virus security suite for Microsoft Windows 2000, XP, and Vista developed by INCA Internet for users playing online computer games. It includes real-time protection from most forms of malware, including viruses, trojans, spyware, worms, keyloggers, and rootkits, as well as a game optimization feature. Like many other security products, nProtect GameGuard Personal 2007 can cause collisions when executed with security products simultaneously. The collisions mainly occur when running the on-access scanning (real-time scanning) simultaneously. nProtect GameGuard Personal 2007 is available both in a free and a non-free edition, the former lacking treatment abilities for some malware. See also INCA Internet Co., Ltd. nProtect GameGuard Anti-Virus Software
https://en.wikipedia.org/wiki/History%20of%20display%20technology
Electrically operated display devices have developed from electromechanical systems for display of text, up to all-electronic devices capable of full-motion 3D color graphic displays. Electromagnetic devices, using a solenoid coil to control a visible flag or flap, were the earliest type, and were used for text displays such as stock market prices and arrival/departure display times. The cathode ray tube was the workhorse of text and video display technology for several decades until being displaced by plasma, liquid crystal (LCD), and solid-state devices such as thin-film transistors (TFTs), LEDs and OLEDs. With the advent of metal–oxide–semiconductor field-effect transistors (MOSFETs), integrated circuit (IC) chips, microprocessors, and microelectronic devices, many more individual picture elements ("pixels") could be incorporated into one display device, allowing graphic displays and video. Cathode ray tube One of the earliest electronic displays is the cathode-ray tube (CRT), which was first demonstrated in 1897 and made commercial in 1922. The CRT consists of an electron gun that forms images by firing electrons onto a phosphor-coated screen. The earliest CRTs were monochrome and were used primarily in oscilloscopes and black and white televisions. The first commercial colour CRT was produced in 1954. CRTs were the single most popular display technology used in television sets and computer monitors for over half a century; it was not until the 2000s that LCDs began to gradually replace them. A derivative of CRTs were storage tubes, which had the ability to retain information displayed on them, unlike standard CRTs which need to be refreshed periodically. In 1968, Tektronix introduced the Direct-view bistable storage tube, which went on to be widely used in oscilloscopes and computer terminals. Monochrome CRT 1922 Monochrome cathode ray tube: Color CRT 1954 Color cathode ray tube for the display of color television: Direct-View Bistable Storage Tube 1
https://en.wikipedia.org/wiki/Annona%20paludosa
Annona paludosa is a species of plant in the family Annonaceae. It is native to Brazil, French Guiana, Guyana, Suriname and Venezuela. Jean Baptiste Christophore Fusée Aublet, the French pharmacist and botanist who first formally described the species, named it after its swampy ( in Latin) habitat. Description It is a bush reaching 1.2-1.5 meters in height. Its branches have numerous light brown lenticels. Its oblong, membranous leaves are 16-20 by 6-7.5 centimeters and come to a point at their tip. The mature leaves are hairless on their green upper surface, but have woolly rust colored hairs on their reddish lower surfaces. The leaves have 18-20 secondary veins emanating from each side of their midribs. Its petioles are 5 by 3 millimeters, densely covered in woolly hairs, and have a groove on their upper surface. Its flowers are on 10-15 millimeter long peduncles that occur alone or in pairs. The peduncles are covered in woolly hairs and have a bracteole at their base and midpoint. Its sepals are united to form a calyx with 3 triangular lobes that are 10 by 10 millimeters and come to a tapering point. The outer surfaces of the sepals are covered in rust-colored woolly hairs. Its flowers have 6 petals arranged in two rows of 3. The thick, oval, outer petals have margins that touch but are not united. The outer petals are 15-18 by 15 millimeters, have a central ridge, and are covered in fine gray woolly hairs. The thinner inner petals are 14-15 by 6 millimeters and alternate with the outer petals. The inner petals are concave and covered on both surfaces with fine gray woolly hairs. Its flowers have numerous stamens that are 2.8-3 millimeters long. The velvety tissue connecting the lobes of anthers forms a cap on top of the stamens. Its flowers have numerous carpels. Its mature, oval, yellow fruit are 6 by 4 centimeters and covered in fleshy, pointed projections. Its broad, smooth, oval seeds are 8 by 4 millimeters with a prominent caruncle at their
https://en.wikipedia.org/wiki/Mercedes-Benz%20Bionic
The Mercedes-Benz Bionic is a concept car created by DaimlerChrysler AG under the Mercedes Group. It was first introduced in 2005 at the DaimlerChrysler Innovation Symposium in Washington, D. C. The Bionic is modeled after a type of fish, the yellow boxfish, Ostracion cubicus, and also has 80% lower nitrogen oxide emissions with its selective catalytic reduction technology. Engine and performance The Bionic is powered by a 103 kW direct-injection diesel engine with an average fuel economy of 54.7 MPG (US) (~4.3 L/100 km). This engine also outputs around and a little over of torque at around 1,600 rpm. The Bionic can go from in about eight seconds and has a top speed of a little over . Design The exterior design was modeled after the yellow boxfish (Ostracion cubicus), a marine fish that lives in coral reefs. Mercedes-Benz decided to model the Bionic after this fish due to the supposed low coefficient of drag of its body shape and the rigidity of its exoskeleton; this influenced the car's unusual looks. It was believed that the shape of the boxfish would improve aerodynamics and stability. However, in 2015, a paper in Journal of the Royal Society Interface claimed that "The drag-reduction performance of the two boxfish species studied was relatively low compared with more generalized body shapes of fish". Other parts of the design include the fact that the rear wheels are partially fitted with plastic and that it's considered as a lightweight vehicle. Mercedes-Benz reported a drag coefficient of 0.19; for comparison, the production vehicle with the lowest ever Cd value was the GM EV1, at 0.195. While the Bionic had a much larger internal volume than the EV1, the Bionic's larger frontal area made the EV1 more aerodynamic overall, as drag is a product of the area and the drag coefficient. The vehicle was capable of seating four people.
https://en.wikipedia.org/wiki/Fiddle%20yard
A fiddle yard or staging yard is a collection of model railway tracks that are hidden from view and allow trains to be stored and manipulated by the operators. These tracks are used to allow most model railways to be operated in a realistic manner. Whilst it is possible to have a realistic shunting yard in view, its operation is generally unreliable with models. Trains can be rearranged by lifting them off the track and replacing them. Development Fiddle yards were first built by British modellers so that they could build small layouts and operate them in a realistic manner. The first well-known model railway to use them was 'Maybank', which was exhibited at the 1939 Model Railway Club exhibition in London. This was an urban passenger terminus that led directly into a fiddle yard, hidden beneath a locomotive depot above it. It had an influence on C. J. Freezer, who as editor of Railway Modeller, would later go on to popularise them. In the 1950s he described the "Fiddle Yard to Terminus" layout, and used it for his influential 'Minories' design. The 'Peter Denny' design of fiddle yard, using a removable 'cassette' of tracks, was developed by the Reverend Peter Denny for his Buckingham Great Central layout around 1952. This used a number of parallel tracks and could also be used for rolling stock storage or transport, off the layout. Some of these cassettes use conventional pointwork, others slide sideways as a traverser, Denny's original rotated around a central pivot. Denny also used it to rotate by half a turn and to reverse the trains wholesale, without needing to uncouple and move locomotives from one end to the other. Denny was noted for his use of non-railway mechanisms and the original was cranked around by a Meccano geared drive, with remote switching and monitoring by a row of sprung metal contacts. Designs The fiddle yard is part of a layout, and as such varies with the type layout design, particularly whether it is of the "end-to-end" or "continuous
https://en.wikipedia.org/wiki/Medicago%20truncatula
Medicago truncatula, the barrelclover, strong-spined medick, barrel medic, or barrel medick, is a small annual legume native to the Mediterranean region that is used in genomic research. It is a low-growing, clover-like plant tall with trifoliate leaves. Each leaflet is rounded, long, often with a dark spot in the center. The flowers are yellow, produced singly or in a small inflorescence of two to five together; the fruit is a small, spiny pod. This species is studied as a model organism for legume biology because it has a small diploid genome, is self-fertile, has a rapid generation time and prolific seed production, is amenable to genetic transformation, and its genome has been sequenced. It forms symbioses with nitrogen-fixing rhizobia (Sinorhizobium meliloti and Sinorhizobium medicae) and arbuscular mycorrhizal fungi including Rhizophagus irregularis (previously known as Glomus intraradices). The model plant Arabidopsis thaliana does not form either symbiosis, making M. truncatula an important tool for studying these processes. It is also an important forage crop species in Australia. Sequencing of the genome The draft sequence of the genome of M. truncatula cultivar A17 was published in the journal Nature in 2011. The sequencing was carried out by an international partnership of research laboratories involving researchers from the University of Oklahoma (US), J. Craig Venter Institute (US), Genoscope (France), and Sanger Centre (UK). Partner institutions included the University of Minnesota (US), University of California-Davis (US), the National Center for Genomic Resources (US), John Innes Centre (UK), Institut National de Recherche Agronomique (France), Munich Information Center for Protein Sequences (Germany), Wageningen University (the Netherlands), and Ghent University (Belgium). The Medicago truncatula Sequencing Consortium began in 2001 with a seed grant from the Samuel Roberts Noble Foundation. In 2003, the National Science Foundation and the E
https://en.wikipedia.org/wiki/Login%20VSI
Login VSI maximizes the end-user experience for all digital workspaces. Login VSI's flagship product, Login Enterprise, is an automated testing platform that predicts performance, ensures business continuity and reduces risk. Login Enterprise tests the desktop and applications as a whole, from pre-production through to production. Login Enterprise includes standard “out-of-the-box” application template workloads. The technology is used by large organizations using Citrix XenApp, Citrix XenDesktop, VMware Horizon and Microsoft RDS. Login VSI has over 400 customers in 50 countries. Login VSI evolved from the consulting firm Login Consultants. The first product was commercially released in 2008 and was free. As large enterprises began adopting the product, the need to commercialize the product became evident. Login VSI was formed in 2012. In 2016, Login VSI announced the public launch of its second product, Login PI. Login PI is an active monitoring tool that constantly runs a single virtual user, to monitor and safeguard a good performance and availability of virtual desktop infrastructures and associated business applications. Both products use virtual users (or synthetic users) to test systems, without the need for real users. In 2018, Login VSI announced the Login VSI Enterprise Edition (a combination of Login VSI and Login PI), and the Login VSI Vendor Edition (focused on the industry-standard tests done by this audience).
https://en.wikipedia.org/wiki/Branch%20attachment
A branch attachment is where a branch is attached to the trunk of a tree. Three types of branch attachment are recognized due to differences in the anatomical position of buds that form them. Two key components contribute to the mechanical strength and toughness of the attachment: interlocking wood grain at the top of the attachment and an embedded knot that often lies within the attachment. A common malformation of a branch attachment is the inclusion of bark within the join, which can weaken the attachment. Anatomy in trees Initially branches are mechanically attached to the trunks of trees by forming interlocking wood grain patterns at the top of the joint, within what is known as 'axillary wood' (Fig. 1). The axillary wood (or xylem) formed in this location is denser than in surrounding tissues of the tree's stem or branch, the wood grain pattern formed is tortuous and in these tissues there is typically a reduction in vessel length, diameter and frequency of occurrence (i.e. more of the xylem consists of fibre cells). This specialized xylem tissue (axillary wood), formed under the branch bark ridge, provides unique mechanical properties to the union of the branch to the trunk, requiring that wood fibres are stretched along their length (the axial strength of the wood) in order to rupture the attachment apart. As the typical lateral branch of a tree and its trunk expand in diameter at different rates, the base of the smaller branch becomes occluded in the larger trunk of the tree which is producing a larger increment of growth, and this occluded part of the branch forms a knot that provides substantial additional mechanical support to the attachment as it develops (Fig. 2). This is not the case in tree forks, where the growth rate of both branches is approximately equal, and no occluded knot is formed. The combination of the interlocking axillary wood patterns at the junction apex and the occluded knot embedded into the tree's trunk make mature branch a
https://en.wikipedia.org/wiki/Hay%20meadow
A Hay meadow is an area of land set aside for the production of hay. In Britain hay meadows are typically meadows with high botanical diversity supporting a diverse assemblage of organisms ranging from soil microbes, fungi, arthropods including many insects through to small mammals such as voles and their predators, and up to insectivorous birds and bats. History Up until the turn of the 20th century, most farms in Britain were relatively small and each farm relied on the power of horses for transport and traction including ploughing. Even in the towns and cities, many horses were still in use pulling carriages and carts and delivering milk and bread to the door and Pit ponies were in widespread use in all the coal mining regions. The onset of war in 1918 required many horses and young men to be deployed in the European battlefields, many of whom never returned. This pattern was repeated in 1939. The two world wars made enormous technological strides in devising mechanised forms of transport which were built on to provide oil powered farm equipment including the ubiquitous tractors. During the same decades, British governments were strongly encouraging the population to grow more food especially at times when Atlantic convoys of food from the Americas were being lost to enemy torpedo activities. As a consequence of all these pressures, British farms became steadily larger and abandoned the use of horses in favour of oil fuelled farm machinery. Without the need to feed horses, there was no apparent need to maintain hay-meadows and most were ploughed up and re-sown to provide fodder crops such as mono-culture grass species for silage, brassica or turned over to direct food production such as cereal crops, potatoes or oil-seed rape. Types Northern Hay meadows Northern hay meadows are largely restricted to the northern counties of England including Northumberland, County Durham and Yorkshire with a few in the Scottish border counties. Water meadows Some pastures
https://en.wikipedia.org/wiki/Requirements%20Modeling%20Framework
The Requirements Modeling Framework (RMF) is an open-source software framework for working with requirements based on the ReqIF standard. RMF consists of a core allowing reading, writing and manipulating ReqIF data, and a user interface allowing to inspect and edit request data. RMF is the first and, currently, the only open-source reference implementation of the ReqIF standards. Noteworthy is the fact that RMF has already been deployed in the ProStep ReqIF Implementor Forum in order to ensure the interoperability of the commercial implementation. Since 2011 there have been reports in the German and in the international press about RMF. History RMF has been in development under the name ProR since 2009 in the scope of the DEPLOY research project, collaborative efforts quickly developed with the research project Verde resulting in significant acceleration of development. At this point, the data model is based on RIF, the predecessor of ReqIF. In June 2011, a proposal was created to transform the code into an Eclipse Foundation project. This proposal was adopted in November 2011. A part of the migration to the Eclipse Foundation was the conversion of RIF to the current version of ReqIF 1.0.1. In the spring of 2012 DEPLOY and Verde opted out of the research projects. Nevertheless, RMF keeps on evolving, within the framework of the research project Advance. From Formal Mind free extensions to ProR under the name ProR Essentials are developed. Currently neither version 0.14 nor 0.13 can be integrated into the latest version of eclipse, neither ProR nor RMF. Only version 0.10.0 remains, reasons for that are unknown. Version 0.13 (from the release folder) and version 0.14 (from the latest folder) can be integrated into eclipse version "Mars.2 Release (4.5.2)". Functionality The RMF core allows for storing, writing, validating and manipulating ReqIF files. The manipulation of data is implemented programmatically using EMF. ProR additionally enables the interactiv
https://en.wikipedia.org/wiki/Switched-mode%20power%20supply
A switched-mode power supply (SMPS), also called switching-mode power supply, switch-mode power supply, switched power supply, or simply switcher, is an electronic power supply that incorporates a switching regulator to convert electrical power efficiently. Like other power supplies, an SMPS transfers power from a DC or AC source (often mains power, see AC adapter) to DC loads, such as a personal computer, while converting voltage and current characteristics. Unlike a linear power supply, the pass transistor of a switching-mode supply continually switches between low-dissipation, full-on and full-off states, and spends very little time in the high dissipation transitions, which minimizes wasted energy. A hypothetical ideal switched-mode power supply dissipates no power. Voltage regulation is achieved by varying the ratio of on-to-off time (also known as duty cycles). In contrast, a linear power supply regulates the output voltage by continually dissipating power in the pass transistor. The switched-mode power supply's higher electrical efficiency is an important advantage. Switched-mode power supplies can also be substantially smaller and lighter than a linear supply because the transformer can be much smaller. This is because it operates at a high switching frequency which ranges from several hundred kHz to several MHz in contrast to the 50 or 60 Hz mains frequency. Despite the reduced transformer size, the power supply topology and the requirement for electromagnetic interference (EMI) suppression in commercial designs result in a usually much greater component count and corresponding circuit complexity. Switching regulators are used as replacements for linear regulators when higher efficiency, smaller size or lighter weight is required. They are, however, more complicated; switching currents can cause electrical noise problems if not carefully suppressed, and simple designs may have a poor power factor. History 1836 Induction coils use switches to generate h
https://en.wikipedia.org/wiki/British%20Pteridological%20Society
The British Pteridological Society is for fern enthusiasts of the British Isles, and was founded in England in 1891. The origins and early history of the BPS at the time of "Pteridomania" is described in the book The Victorian Fern Craze. The BPS celebrated its centenary in 1991; amongst other things, it was marked by the publication of the book, A World of Ferns. The British Pteridological Society is a registered charity: No. 1092399. The BPS has as its Patron the Prince of Wales. Publications The British Pteridological Society publishes a number of works, which promote pteridology: The Fern Gazette The Pteridologist The Bulletin Presidents of the Society John A. Wilson (1831-1914) was elected Chairman of the Society at the first meeting in 1891; subsequently Dr. F.W. Stansfield was invited to become the first President of the Society. He took office in 1892.
https://en.wikipedia.org/wiki/Ethnomycology
Ethnomycology is the study of the historical uses and sociological impact of fungi and can be considered a subfield of ethnobotany or ethnobiology. Although in theory the term includes fungi used for such purposes as tinder, medicine (medicinal mushrooms) and food (including yeast), it is often used in the context of the study of psychoactive mushrooms such as psilocybin mushrooms, the Amanita muscaria mushroom, and the ergot fungus. American banker Robert Gordon Wasson pioneered interest in this field of study in the late 1950s, when he and his wife became the first Westerners on record allowed to participate in a mushroom velada, held by the Mazatec curandera María Sabina. The biologist Richard Evans Schultes is also considered an ethnomycological pioneer. Later researchers in the field include Terence McKenna, Albert Hofmann, Ralph Metzner, Carl Ruck, Blaise Daniel Staples, Giorgio Samorini, Keewaydinoquay Peschel, John Marco Allegro, Clark Heinrich, John W. Allen, Jonathan Ott, Paul Stamets, Casey Brown and Juan Camilo Rodríguez Martínez. Besides mycological determination in the field, ethnomycology depends to a large extent on anthropology and philology. One of the major debates among ethnomycologists is Wasson's theory that the Soma mentioned in the Rigveda of the Indo-Aryans was the Amanita muscaria mushroom. Following his example similar attempts have been made to identify psychoactive mushroom usage in many other (mostly) ancient cultures, with varying degrees of credibility. Another much written about topic is the content of the Kykeon, the sacrament used during the Eleusinian mysteries in ancient Greece between approximately 1500 BCE and 396 CE. Although not an ethnomycologist as such, philologist John Allegro has made an important contribution suggesting, in a book controversial enough to have his academic career destroyed, that Amanita muscaria was not only consumed as a sacrament but was the main focus of worship in the more esoteric sects of Sumeri
https://en.wikipedia.org/wiki/Witch%27s%20milk
Witch's milk or neonatal milk is milk secreted from the breasts of some newborn human infants of either sex. Neonatal milk secretion is considered a normal physiological occurrence and no treatment or testing is necessary. It is thought to be caused by a combination of the effects of maternal hormones before birth, prolactin, and growth hormone passed through breastfeeding and the postnatal pituitary and thyroid hormone surge in the infant. Breast milk production occurs in about 5% of newborns and can persist for two months though breast buds can persist into childhood. Witch's milk is more likely to be secreted by infants born at full term, and not by prematurely born infants. The consistency of neonatal milk is estimated to be quite similar to maternal milk. Its production also may be caused by certain medications. In extremely rare cases neonatal mastitis may develop but it is unclear if it is related to neonatal milk secretion. Blood from the nipples is nearly always benign and frequently associated with duct ectasia; it should only be investigated when it is unilateral. Cultural interpretations In folklore, witch's milk was believed to be a source of nourishment for witches' familiar spirits. It was thought to be stolen from unwatched, sleeping infants. In other cultures expressing milk from the infant's breasts is supposed to contribute to a good breast shape in adulthood. In some cultures, the tradition of removing the milk ("milking") has been reported. This practice can prolong milk production and other problems cannot be ruled out. While breastfeeding may also contribute to prolonged milk production and breast enlargement, temporary, or permanent weaning is not recommended. See also Galactorrhea Gynecomastia Breastfeeding
https://en.wikipedia.org/wiki/Implosion%20%28mechanical%20process%29
Implosion is a process in which objects are destroyed by collapsing (or being squeezed in) on themselves. The opposite of explosion (which expands the volume), implosion reduces the volume occupied and concentrates matter and energy. True implosion usually involves a difference between internal (lower) and external (higher) pressure, or inward and outward forces, that is so large that the structure collapses inward into itself, or into the space it occupied if it is not a completely solid object. Examples of implosion include a submarine being crushed from the outside by the hydrostatic pressure of the surrounding water and the collapse of a massive star under its own gravitational pressure. An implosion can propel material outward (for example due to the force of inward falling material rebounding, or peripheral material being ejected as the inner parts collapse), but this is not an essential component of an implosion and not all kinds of implosion will do so. If the object was previously solid, then implosion usually requires it to take on a more dense form—in effect to be more concentrated, compressed, or converted into a new material that is denser than the original. Examples Nuclear weapons In an implosion-type nuclear weapon design, a sphere of plutonium, uranium, or other fissile material is imploded by a spherical arrangement of explosive charges. This decreases the material's volume and thus increases its density by a factor of two to three, causing it to reach critical mass and create a nuclear explosion. In some forms of thermonuclear weapons, the energy from this explosion is then used to implode a capsule of fusion fuel before igniting it, causing a fusion reaction (see Teller–Ulam design). In general, the use of radiation to implode something, as in a hydrogen bomb or in laser driven inertial confinement fusion, is known as radiation implosion. Fluid dynamics Cavitation (bubble formation/collapse in a fluid) involves an implosion process. When a
https://en.wikipedia.org/wiki/Saimiriine%20gammaherpesvirus%202
Saimiriine gammaherpesvirus 2 (SaHV-2) is a species of virus in the genus Rhadinovirus, subfamily Gammaherpesvirinae, family Herpesviridae, and order Herpesvirales. See also HSUR (Herpesvirus saimiri U RNAs) Squirrel monkey (Saimiri)
https://en.wikipedia.org/wiki/Sebastian%20Deffner
Sebastian Deffner is a German theoretical physicist and a professor in the Department of Physics at the University of Maryland, Baltimore County (UMBC). He is known for his contributions to the development of quantum thermodynamics with focus on the thermodynamics of quantum information, quantum speed limit for open systems, quantum control and shortcuts to adiabaticity. Education Deffner received his Diplom-Physiker (Master of Science) in 2008 from the University of Augsburg; and he received his doctorate from the same university in 2011 under the supervision of . Career From 2008 until 2011, Deffner was a research fellow at the University of Augsburg. From 2011 to 2014, he was a Research Associate in the group of Christopher Jarzynski at the University of Maryland, College Park (UMD) for which he had received the DAAD postdoctoral fellowship. From 2014 to 2016, he took up the position of a Director’s Funded Postdoctoral Fellow with Wojciech H. Zurek at the Los Alamos National Laboratory. Since 2016, he has held a position as a faculty member of the Department of Physics at the University of Maryland, Baltimore County (UMBC), where he leads the quantum thermodynamics group, and a position as a Visiting Professor at the University of Campinas in Brazil. Honors and awards Deffner’s contributions to quantum thermodynamics have been recognized through the 2016 Early Career Award from the New Journal of Physics, as well as the Leon Heller Postdoctoral Publication Prize from the Los Alamos National Laboratory in 2016. Since 2017, Deffner has been a member of the international editorial board for IOP Publishing's Journal of Physics Communications, and since 2019 he has been on the editorial advisory board of the Journal of Non-Equilibrium Thermodynamics, and a member of the Section Board for Quantum Information of Entropy. He is also a member of the inaugural editorial board of PRX Quantum. 2017 APS Outstanding Referee (American Physical Society). 2016 Leon Helle
https://en.wikipedia.org/wiki/Lacandon%20Jungle
The Lacandon Jungle (Spanish: Selva Lacandona) is an area of rainforest which stretches from Chiapas, Mexico, into Guatemala. The heart of this rainforest is located in the Montes Azules Biosphere Reserve in Chiapas near the border with Guatemala in the Montañas del Oriente region of the state. Although much of the jungle outside the reserve has been cleared, the Lacandon is still one of the largest montane rainforests in Mexico. It contains 1,500 tree species, 33% of all Mexican bird species, 25% of all Mexican animal species, 56% of all Mexican diurnal butterflies and 16% of all Mexico's fish species. The Lacandon in Chiapas is also home to a number of important Mayan archaeological sites including Palenque, Yaxchilan and Bonampak, with numerous smaller sites which remain partially or fully unexcavated. This rainforest, especially the area inside the Biosphere Reserve, is a source of political tension, pitting the EZLN or Zapatistas and their indigenous allies who want to farm the land against international environmental groups and the Lacandon Maya, the original indigenous group of the area and the one that holds the title to most of the lands in Montes Azures. Environment The jungle has approximately 1.9 million hectares stretching from southeast Chiapas into northern Guatemala and into the southern Yucatán Peninsula. The Chiapas portion is located on the Montañas del Oriente (Eastern Mountains) centered on a series of canyonlike valleys called the Cañadas, between smaller mountain ridges oriented from northwest to southeast. It is bordered by the Guatemalan border on two sides with Comitán de Domínguez to the southwest and the city of Palenque to north. Dividing the Chiapas part of the forest from the Guatemalan side is the Usumacinta River, which is the largest river in Mexico and the seventh largest in the world based on volume of water. The core of the Chiapas forest is the Montes Azules Biosphere Reserve, but it also includes some other protected areas
https://en.wikipedia.org/wiki/Glossary%20of%20developmental%20biology
This glossary of developmental biology is a list of definitions of terms and concepts commonly used in the study of developmental biology and related disciplines in biology, including embryology and reproductive biology, primarily as they pertain to vertebrate animals and particularly to humans and other mammals. The developmental biology of invertebrates, plants, fungi, and other organisms is treated in other articles; e.g. terms relating to the reproduction and development of insects are listed in Glossary of entomology, and those relating to plants are listed in Glossary of botany. This glossary is intended as introductory material for novices; for more specific and technical detail, see the article corresponding to each term. Additional terms relevant to vertebrate reproduction and development may also be found in Glossary of biology, Glossary of cell biology, Glossary of genetics, and Glossary of evolutionary biology. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z See also Introduction to developmental biology Outline of developmental biology Outline of cell biology Glossary of biology Glossary of cell biology Glossary of genetics Glossary of evolutionary biology
https://en.wikipedia.org/wiki/Carrier%20recovery
A carrier recovery system is a circuit used to estimate and compensate for frequency and phase differences between a received signal's carrier wave and the receiver's local oscillator for the purpose of coherent demodulation. In the transmitter of a communications carrier system, a carrier wave is modulated by a baseband signal. At the receiver, the baseband information is extracted from the incoming modulated waveform. In an ideal communications system, the carrier signal oscillators of the transmitter and receiver would be perfectly matched in frequency and phase, thereby permitting perfect coherent demodulation of the modulated baseband signal. However, transmitters and receivers rarely share the same carrier oscillator. Communications receiver systems are usually independent of transmitting systems and contain their oscillators with frequency and phase offsets and instabilities. Doppler shift may also contribute to frequency differences in mobile radio frequency communications systems. All these frequencies and phase variations must be estimated using the information in the received signal to reproduce or recover the carrier signal at the receiver and permit coherent demodulation. Methods For a quiet carrier or a signal containing a dominant carrier spectral line, carrier recovery can be accomplished with a simple band-pass filter at the carrier frequency or with a phase-locked loop, or both. However, many modulation schemes make this simple approach impractical because most signal power is devoted to modulation—where the information is present—and not to the carrier frequency. Reducing the carrier power results in greater transmitter efficiency. Different methods must be employed to recover the carrier in these conditions. Non-data-aided Non-data-aided/“blind” carrier recovery methods do not rely on knowledge of the modulation symbols. They are typically used for simple carrier recovery schemes or as the initial coarse carrier frequency recovery meth
https://en.wikipedia.org/wiki/Out-of-band%20control
Out-of-band control is a characteristic of network protocols with which data control is regulated. Out-of-band control passes control data on a separate connection from main data. Protocols such as FTP use out-of-band control. FTP sends its control information, which includes user identification, password, and put/get commands, on one connection, and sends data files on a separate parallel connection. Because it uses a separate connection for the control information, FTP uses out-of-band control. See also Out-of-band management In-band control Computer networks
https://en.wikipedia.org/wiki/Sideromycin
Sideromycins are a group of antibiotics linked to siderophores by covalent bonds. Examples of naturally occurring sideromycins are albomycin and salmycin. Sideromycins have some unique merits as antibiotic. They can actively bypass permeability barriers (membranes) to deliver the drug inside the target bacterial cell, irrespective of the size and polarity of the antibiotic moiety contained into it. Most importantly as they are substrates of high affinity siderophore transport systems they can be effective to kill bacteria at very low concentration. Also the delivery of the antibiotic will be highly target specific, so wouldn't affect the host system. Sideromycins is being considered as a new microbe-selective antibacterial agent, which can limit the emergence of resistance.
https://en.wikipedia.org/wiki/Tower%20of%20Hanoi
The Tower of Hanoi (also called The problem of Benares Temple or Tower of Brahma or Lucas' Tower and sometimes pluralized as Towers, or simply pyramid puzzle) is a mathematical game or puzzle consisting of three rods and a number of disks of various diameters, which can slide onto any rod. The puzzle begins with the disks stacked on one rod in order of decreasing size, the smallest at the top, thus approximating a conical shape. The objective of the puzzle is to move the entire stack to one of the other rods, obeying the following rules: Only one disk may be moved at a time. Each move consists of taking the upper disk from one of the stacks and placing it on top of another stack or on an empty rod. No disk may be placed on top of a disk that is smaller than it. With three disks, the puzzle can be solved in seven moves. The minimal number of moves required to solve a Tower of Hanoi puzzle is 2n − 1, where n is the number of disks. Origins The puzzle was invented by the French mathematician Édouard Lucas in 1883. Numerous myths regarding the ancient and mystical nature of the puzzle popped up almost immediately, including a myth about an Indian temple in Kashi Vishwanath containing a large room with three time-worn posts in it, surrounded by 64 golden disks. But, this story of Indian Kashi Vishwanath temple was spread tongue-in-cheek by a friend of Édouard Lucas. If the legend were true, and if the priests were able to move disks at a rate of one per second, using the smallest number of moves, it would take them 264 − 1 seconds or roughly 585 billion years to finish, which is about 42 times the estimated current age of the universe. There are many variations on this legend. For instance, in some tellings, the temple is a monastery, and the priests are monks. The temple or monastery may be in various locales including Hanoi, and may be associated with any religion. In some versions, other elements are introduced, such as the fact that the tower was created at
https://en.wikipedia.org/wiki/Vancomycin-resistant%20Staphylococcus%20aureus
Vancomycin-resistant Staphylococcus aureus (VRSA) are strains of Staphylococcus aureus that have acquired resistance to the glycopeptide antibiotic vancomycin. Bacteria can acquire resistant genes either by random mutation or through the transfer of DNA from one bacterium to another. Resistance genes interfere with the normal antibiotic function and allow a bacteria to grow in the presence of the antibiotic. Resistance in VRSA is conferred by the plasmid-mediated vanA gene and operon. Although VRSA infections are uncommon, VRSA is often resistant to other types of antibiotics and a potential threat to public health because treatment options are limited. VRSA is resistant to many of the standard drugs used to treat S. aureus infections. Furthermore, resistance can be transferred from one bacterium to another. Mechanism of acquired resistance Vancomycin-resistant Staphylococcus aureus was first reported in the United States in 2002. To date, documented cases of VRSA have acquired resistance through uptake of a vancomycin resistance gene cluster from Enterococcus (i.e. VRE). The acquired mechanism is typically the vanA gene and operon from a plasmid in Enterococcus faecium or Enterococcus faecalis. This mechanism differs from strains of vancomycin-intermediate Staphylococcus aureus (VISA), which appear to develop elevated MICs to vancomycin through sequential mutations resulting in a thicker cell wall and the synthesis of excess amounts of D-ala-D-ala residues. Diagnosis The diagnosis of vancomycin-resistant Staphylococcus aureus (VRSA) is performed by performing susceptibility testing on a single S. aureus isolate to vancomycin. This is accomplished by first assessing the isolate's minimum inhibitory concentration (MIC) using standard laboratory methods, including disc diffusion, gradient strip diffusion, and automated antimicrobial susceptibility testing systems. Once the MIC is known, resistance is determined by comparing the MIC with established breakpoints
https://en.wikipedia.org/wiki/Peak%20ornament
A peak ornament is a decorative element which may be located under the peak of eaves of a gabled building. For example, peak ornaments are notable features in some of the historic houses of the Noank Historic District, in the town of Groton, Connecticut. The peak ornament is an architectural element in architecture. See also Bargeboard Classical architecture Glossary of architecture Notes Ornaments (architecture)
https://en.wikipedia.org/wiki/Ta%C3%AF%20Forest%20ebolavirus
The species Taï Forest ebolavirus () is a virological taxon included in the genus Ebolavirus, family Filoviridae, order Mononegavirales. The species has a single virus member, Taï Forest virus (TAFV). The members of the species are called Taï Forest ebolaviruses. Tai Forest ebolavirus has been seen in a single human infection due to contact with chimpanzees from the Tai Forest in Côte d'Ivoire. Nomenclature The name Taï Forest ebolavirus is derived from Parc National de Taï (the name of a national park in Côte d'Ivoire, where Taï Forest virus was first discovered) and the taxonomic suffix ebolavirus (which denotes an ebolavirus species). According to the rules for taxon naming established by the International Committee on Taxonomy of Viruses (ICTV), the name Taï Forest ebolavirus is always to be capitalized, italicized, never abbreviated, and to be preceded by the word "species". The names of its members (Taï Forest ebolaviruses) are to be capitalized, are not italicized, and used without articles. The species was introduced in 1998 as Cote d'Ivoire Ebola virus. In 2002, the name was changed to Cote d'Ivoire ebolavirus. The name was proposed to be changed to Taï Forest ebolavirus in 2010, and this proposal was immediately accepted by the ICTV. A virus of the genus Ebolavirus is a member of the species Taï Forest ebolavirus if: it is endemic in Côte d'Ivoire it has a genome with three gene overlaps (VP35/VP40, GP/VP30, VP24/L) it has a genomic sequence different from Ebola virus by ≥30% but different from that of Taï Forest virus by <30%. Taï Forest virus (; TAFV) is a close relative of the much more commonly known Ebola virus (EBOV). TAFV causes severe disease in primates, the Ebola hemorrhagic fever. TAFV is a Select Agent, World Health Organization Risk Group 4 Pathogen (requiring Biosafety Level 4-equivalent containment), National Institutes of Health/National Institute of Allergy and Infectious Diseases Category A Priority Pathogen, Centers for Disea
https://en.wikipedia.org/wiki/Virtual%20leased%20line
Virtual leased lines (VLL), also referred to as virtual private wire service (VPWS) or EoMPLS (Ethernet over MPLS), is a way to provide Ethernet-based point to point communication over Multiprotocol Label Switching (MPLS) or Internet Protocol networks. VLL uses the pseudo-wire encapsulation for transporting Ethernet traffic over an MPLS tunnel across an MPLS backbone. VLL also describes a point to point bonded connection using the broadband bonding technology. Types There are 5 types of VLLs: Epipes: Emulates a point-to-point Ethernet service. VLAN-tagged Ethernet frames are supported. Interworking with other Layer 2 technologies is also supported. Apipes: Emulates a point-to-point ATM (Asynchronous Transfer Mode) service. Several subtypes are provided to support different ATM service types. Fpipes: Emulates point-to-point Frame Relay circuit. Some features for interworking with ATM are also supported. Ipipes: Provides IP interworking capabilities between different Layer 2 technologies. Cpipes: Emulates a point-to-point time-division multiplexing (TDM) circuit. See also Virtual Extensible LAN Virtual Private LAN Service
https://en.wikipedia.org/wiki/ARHGAP31
The Rho GTPase activating protein 31 is encoded in humans by the ARHGAP31 gene. It is a Cdc42/Rac1 GTPase regulator. Function ARHGAP31 encodes a GTPase-activating protein (GAP). A variety of cellular processes are regulated by Rho GTPases which cycle between an inactive form bound to GDP and an active form bound to GTP. This cycling between inactive and active forms is regulated by guanine nucleotide exchange factors and GAPs. The encoded protein is a GAP shown to regulate two GTPases involved in protein trafficking and cell growth. Clinical relevance ARHGAP31 mutations result in a loss of available active Cdc42 and consequently disrupt actin cytoskeletal structures, causing syndromic cutis aplasia and limb anomalies.
https://en.wikipedia.org/wiki/Developmental%20bioelectricity
Developmental bioelectricity is the regulation of cell, tissue, and organ-level patterning and behavior by electrical signals during the development of embryonic animals and plants. The charge carrier in developmental bioelectricity is the ion (a charged atom) rather than the electron, and an electric current and field is generated whenever a net ion flux occurs. Cells and tissues of all types use flows of ions to communicate electrically. Endogenous electric currents and fields, ion fluxes, and differences in resting potential across tissues comprise a signalling system. It functions along with biochemical factors, transcriptional networks, and other physical forces to regulate cell behaviour and large-scale patterning in processes such as embryogenesis, regeneration, and cancer suppression. Overview Developmental bioelectricity is a sub-discipline of biology, related to, but distinct from, neurophysiology and bioelectromagnetics. Developmental bioelectricity refers to the endogenous ion fluxes, transmembrane and transepithelial voltage gradients, and electric currents and fields produced and sustained in living cells and tissues. This electrical activity is often used during embryogenesis, regeneration, and cancer suppression—it is one layer of the complex field of signals that impinge upon all cells in vivo and regulate their interactions during pattern formation and maintenance. This is distinct from neural bioelectricity (classically termed electrophysiology), which refers to the rapid and transient spiking in well-recognized excitable cells like neurons and myocytes (muscle cells); and from bioelectromagnetics, which refers to the effects of applied electromagnetic radiation, and endogenous electromagnetics such as biophoton emission and magnetite. The inside/outside discontinuity at the cell surface enabled by a lipid bilayer membrane (capacitor) is at the core of bioelectricity. The plasma membrane was an indispensable structure for the origin and evolut
https://en.wikipedia.org/wiki/Forestry%20and%20Agricultural%20Biotechnology%20Institute
The Forestry and Agricultural Biotechnology Institute (FABI) (Pretoria) was established in 1997 and is located on the University of Pretoria campus. The goal of the institute is to help the development of novel food and fibre crops, that will clearly contribute to global economic development and food security. FABI was involved in 2011 in the completion of the eucalyptus tree genome (Eucalyptus grandis). Research Areas Agricultural and Forest Biotechnology Forest Entomology and Forest Pathology Agricultural Plant Pathology and Entomology Biological Control of Fungal Pathogens and Insect Pests Microbial Bioinformatics and Phylogenetics Mycology and Fungal Biodiversity External links The Forestry and Agricultural Biotechnology Institute web site University of Pretoria web site University of Pretoria Biotechnology organizations Research institutes in South Africa Forestry in South Africa Organizations established in 1997
https://en.wikipedia.org/wiki/SCICEX
SCICEX, standing for Scientific Ice Expeditions, was a five-year (1995–1999) scientific research program involving a collaboration between the U.S. Navy and academic researchers from a variety of different universities. The object of study was geophysical and oceanological conditions in the Arctic Ocean. The Navy made available a nuclear submarine for each research cruise. Margo Edwards was the chief scientist for the 1999 expedition and spent thirteen days on the USS Hawkbill, thereby becoming the first women to live aboard a Navy nuclear submarine during under-ice operations. Edwards' research found evidence of climate change in the Arctic, including thinning sea ice, volcanoes on the seafloor, and warm water moving into the Arctic from the Atlantic Ocean. These data are available for anyone to view. List of Expeditions SCICEX/93 · USS Pargo SCICEX/95 · USS Cavalla SCICEX/96 · USS Pogy SCICEX/97 · USS Archerfish SCICEX/98 · USS Hawkbill SCICEX/99 · USS Hawkbill External links SCICEX web site 2004 article on the SCICEX program in Arctic Research of the United States magazine SCICEX/96 photo gallery on the USS Pogy web site SCICEX/98 Navy Mission Report SCICEX Phase 2 Memorandum of Agreement from 2000 on the Arctic Submarine Laboratory web site SCICEX/99 page at the USS Hawkbill web site SCICEX/99 page at the University of Alaska Fairbanks Institute of Marine Science CNN documentary on SCICEX/99 Article on SCICEX/99 in Undersea Warfare magazine USS Pogy Alumni Site
https://en.wikipedia.org/wiki/17%20%28number%29
17 (seventeen) is the natural number following 16 and preceding 18. It is a prime number. Seventeen is the sum of the first four prime numbers. In mathematics Seventeen is the seventh prime number, which makes it the fourth super-prime, as seven is itself prime. It forms a twin prime with 19, a cousin prime with 13, and a sexy prime with both 11 and 23. Seventeen is the only prime number which is the sum of four consecutive primes (2, 3, 5, and 7), as any other four consecutive primes that are added always generate an even number divisible by two. It is one of six lucky numbers of Euler which produce primes of the form , and the sixth Mersenne prime exponent, which yields 131,071. It is also the minimum possible number of givens for a sudoku puzzle with a unique solution. 17 can be written in the form and ; and as such, it is a Leyland prime and Leyland prime of the second kind: 17 is the third Fermat prime, as it is of the form with . On the other hand, the seventeenth Jacobsthal–Lucas number — that is part of a sequence which includes four Fermat primes (except for 3) — is the fifth and largest known Fermat prime: 65,537. It is one more than the smallest number with exactly seventeen divisors, 65,536 = 216. Since seventeen is a Fermat prime, regular heptadecagons can be constructed with a compass and unmarked ruler. This was proven by Carl Friedrich Gauss and ultimately led him to choose mathematics over philology for his studies. Either 16 or 18 unit squares can be formed into rectangles with perimeter equal to the area; and there are no other natural numbers with this property. The Platonists regarded this as a sign of their peculiar propriety; and Plutarch notes it when writing that the Pythagoreans "utterly abominate" 17, which "bars them off from each other and disjoins them". 17 is the minimum number of vertices on a graph such that, if the edges are colored with three different colors, there is bound to be a monochromatic triangle; see Ramsey's theo
https://en.wikipedia.org/wiki/Bridgeland%20stability%20condition
In mathematics, and especially algebraic geometry, a Bridgeland stability condition, defined by Tom Bridgeland, is an algebro-geometric stability condition defined on elements of a triangulated category. The case of original interest and particular importance is when this triangulated category is the derived category of coherent sheaves on a Calabi–Yau manifold, and this situation has fundamental links to string theory and the study of D-branes. Such stability conditions were introduced in a rudimentary form by Michael Douglas called -stability and used to study BPS B-branes in string theory. This concept was made precise by Bridgeland, who phrased these stability conditions categorically, and initiated their study mathematically. Definition The definitions in this section are presented as in the original paper of Bridgeland, for arbitrary triangulated categories. Let be a triangulated category. Slicing of triangulated categories A slicing of is a collection of full additive subcategories for each such that for all , where is the shift functor on the triangulated category, if and and , then , and for every object there exists a finite sequence of real numbers and a collection of triangles with for all . The last property should be viewed as axiomatically imposing the existence of Harder–Narasimhan filtrations on elements of the category . Stability conditions A Bridgeland stability condition on a triangulated category is a pair consisting of a slicing and a group homomorphism , where is the Grothendieck group of , called a central charge, satisfying if then for some strictly positive real number . It is convention to assume the category is essentially small, so that the collection of all stability conditions on forms a set . In good circumstances, for example when is the derived category of coherent sheaves on a complex manifold , this set actually has the structure of a complex manifold itself. Technical remarks about stability co
https://en.wikipedia.org/wiki/Neurally%20controlled%20animat
A neurally controlled animat is the conjunction of a cultured neuronal network a virtual or physical robotic body, the Animat, "living" in a virtual computer generated environment or in a physical arena, connected to this array Patterns of neural activity are used to control the virtual body, and the computer is used as a sensory device to provide electrical feedback to the neural network about the Animat's movement in the virtual environment. The current aim of the Animat research is to study the neuronal activity and plasticity when learning and processing information in order to find a mathematical model for the neural network, and to determine how information is processed and encoded in the rat cortex. It leads towards interesting questions about consciousness theories as well.
https://en.wikipedia.org/wiki/General%20sense%20%28anatomy%29
In medicine and anatomy, the general senses are the senses which are perceived due to receptors scattered throughout the body such as touch, temperature, and hunger, rather than tied to a specific structure, as the special senses vision or hearing are. Often, the general senses are associated with a specific drive; that is, the sensation will cause a change in behavior meant to reduce the sensation.
https://en.wikipedia.org/wiki/Alate
Alate (Latin ālātus, from āla (“wing”)) is an adjective and noun used in entomology and botany to refer to something that has wings or winglike structures. In entomology In entomology, "alate" usually refers to the winged form of a social insect, especially ants or termites, though can also be applied to aphids and some thrips. An alate is a winged reproductive caste from a social insect colony in its winged form. Alate females are typically those destined to become gynes (queens), whereas alate males are occasionally referred to as "drones" (or "kings", in the case of termites). Their common behavioural function is starting a new colony, to expand their mother colonies etc. Colonies of termites and ants produce alates. It is a flight-based form of reproductive technique. In a termite colony, alates (winged males and winged females) disperse in a specific period or a month. Male and female pair to each other during flight, shed their wings, and start a new colony. The existence of reproductives that do not have wings (e.g., ergatoid queens and gamergates) necessitates a term to distinguish the winged from the wingless reproductive forms. This is an example of polymorphism associated with eusociality. A "dealate" is an adult insect that shed or lost its wings ("dealation"). In botany In botany "alate" refers to winglike structures on some seeds that use wind dispersal. It is also used to describe flattened ridges which run longtitudianally on stems.
https://en.wikipedia.org/wiki/Bernstein%20set
In mathematics, a Bernstein set is a subset of the real line that meets every uncountable closed subset of the real line but that contains none of them. A Bernstein set partitions the real line into two pieces in a peculiar way: every measurable set of positive measure meets both the Bernstein set and its complement, as does every set with the property of Baire that is not a meagre set.
https://en.wikipedia.org/wiki/Claude%20Chevalley
Claude Chevalley (; 11 February 1909 – 28 June 1984) was a French mathematician who made important contributions to number theory, algebraic geometry, class field theory, finite group theory and the theory of algebraic groups. He was a founding member of the Bourbaki group. Life His father, Abel Chevalley, was a French diplomat who, jointly with his wife Marguerite Chevalley née Sabatier, wrote The Concise Oxford French Dictionary. Chevalley graduated from the École Normale Supérieure in 1929, where he studied under Émile Picard. He then spent time at the University of Hamburg, studying under Emil Artin and at the University of Marburg, studying under Helmut Hasse. In Germany, Chevalley discovered Japanese mathematics in the person of Shokichi Iyanaga. Chevalley was awarded a doctorate in 1933 from the University of Paris for a thesis on class field theory. When World War II broke out, Chevalley was at Princeton University. After reporting to the French Embassy, he stayed in the U.S., first at Princeton and then (after 1947) at Columbia University. His American students included Leon Ehrenpreis and Gerhard Hochschild. During his time in the U.S., Chevalley became an American citizen and wrote a substantial part of his lifetime's output in English. When Chevalley applied for a chair at the Sorbonne, the difficulties he encountered were the subject of a polemical piece by his friend and fellow Bourbakiste André Weil, titled "Science Française?" and published in the Nouvelle Revue Française. Chevalley was the "professeur B" of the piece, as confirmed in the endnote to the reprint in Weil's collected works, Oeuvres Scientifiques, tome II. Chevalley eventually did obtain a position in 1957 at the faculty of sciences of the University of Paris and after 1970 at the Université de Paris VII. Chevalley had artistic and political interests, and was a minor member of the French non-conformists of the 1930s. The following quote by the co-editor of Chevalley's collected work
https://en.wikipedia.org/wiki/Mucormycosis
Mucormycosis, also known as black fungus, is a serious fungal infection that comes under fulminant fungal sinusitis, usually in people who are immunocompromised. It is curable only when diagnosed early. Symptoms depend on where in the body the infection occurs. It most commonly infects the nose, sinuses, eyes and brain resulting in a runny nose, one-sided facial swelling and pain, headache, fever, blurred vision, bulging or displacement of the eye (proptosis), and tissue death. Other forms of disease may infect the lungs, stomach and intestines, and skin. It is spread by spores of molds of the order Mucorales, most often through inhalation, contaminated food, or contamination of open wounds. These fungi are common in soils, decomposing organic matter (such as rotting fruit and vegetables), and animal manure, but usually do not affect people. It is not transmitted between people. Risk factors include diabetes with persistently high blood sugar levels or diabetic ketoacidosis, low white blood cells, cancer, organ transplant, iron overload, kidney problems, long-term steroids or use of immunosuppressants, and to a lesser extent in HIV/AIDS. Diagnosis is by biopsy and culture, with medical imaging to help determine the extent of disease. It may appear similar to aspergillosis. Treatment is generally with amphotericin B and surgical debridement. Preventive measures include wearing a face mask in dusty areas, avoiding contact with water-damaged buildings, and protecting the skin from exposure to soil such as when gardening or certain outdoor work. It tends to progress rapidly and is fatal in about half of sinus cases and almost all cases of the widespread type. Mucormycosis is usually rare, affecting fewer than 2 people per million people each year in San Francisco, but is now ~80 times more common in India. People of any age may be affected, including premature infants. The first known case of mucormycosis was possibly the one described by Friedrich Küchenmeister in
https://en.wikipedia.org/wiki/Iperf
iperf, Iperf, or iPerf, is a tool for network performance measurement and tuning. It is a cross-platform tool that can produce standardized performance measurements for any network. iperf has client and server functionality, and can create data streams to measure the throughput between the two ends in one or both directions. Typical iperf output contains a time-stamped report of the amount of data transferred and the throughput measured. The data streams can be either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP): UDP: When used for testing UDP capacity, iperf allows the user to specify the datagram size and provides results for the datagram throughput and the packet loss. TCP: When used for testing TCP capacity, iperf measures the throughput of the payload. iperf uses 1024 × 1024 for mebibytes and 1000 × 1000 for megabytes. iperf is open-source software written in C, and it runs on various platforms including Linux, Unix and Windows (either natively or inside Cygwin). The availability of the source code enables the user to scrutinize the measurement methodology. iperf is a compatible reimplementation of the ttcp program that was developed at the National Center for Supercomputing Applications at the University of Illinois by the Distributed Applications Support Team (DAST) of the National Laboratory for Applied Network Research (NLANR), which was shut down on December 31, 2006, on termination of funding by the United States National Science Foundation. iperf3 iperf3 is a rewrite of iperf from scratch to create a smaller, simpler code base. It also includes a library version which enables other programs to use the provided functionality. iperf3 is single threaded while iperf2 is multi-threaded. iperf3 was started in 2009, with the first release in January 2014. iperf3 is not backwards compatible with iperf2. iperf3 only officially supports Linux. Unofficial builds for Windows provided by Vivien Guéant have not been maintained since 2016.
https://en.wikipedia.org/wiki/Biorefinery
A biorefinery is a refinery that converts biomass to energy and other beneficial byproducts (such as chemicals). The International Energy Agency Bioenergy Task 42 defined biorefining as "the sustainable processing of biomass into a spectrum of bio-based products (food, feed, chemicals, materials) and bioenergy (biofuels, power and/or heat)". As refineries, biorefineries can provide multiple chemicals by fractioning an initial raw material (biomass) into multiple intermediates (carbohydrates, proteins, triglycerides) that can be further converted into value-added products. Each refining phase is also referred to as a "cascading phase". The use of biomass as feedstock can provide a benefit by reducing the impacts on the environment, as lower pollutants emissions and reduction in the emissions of hazard products. In addition, biorefineries are intended to achieve the following goals: Supply the current fuels and chemical building blocks Supply new building blocks for the production of novel materials with disruptive characteristics Creation of new jobs, including rural areas Valorization of waste (agricultural, urban, and industrial waste) Achieve the ultimate goal of reducing GHG emissions Classification of biorefinery systems Biorefineries can be classified based in four main features: Platforms: Refers to key intermediates between raw material and final products. The most important intermediates are: Biogas from anaerobic digestion Syngas from gasification Hydrogen from water-gas shift reaction, steam reforming, water electrolysis and fermentation C6 sugars from hydrolysis of sucrose, starch, cellulose and hemicellulose C5 sugars (e.g., xylose, arabinose: C5H10O5), from hydrolysis of hemicellulose and food and feed side streams Lignin from the processing of lignocellulosic biomass. Liquid from pyrolysis (pyrolysis oil) Products: Biorefineries can be grouped in two main categories according to the conversion of biomass in an energetic or non-energet
https://en.wikipedia.org/wiki/Rumiyah%20%28magazine%29
Rumiyah () was an online magazine used by the Islamic State (IS) for propaganda and recruitment. It was first published in September 2016 and was released in several languages, including English, French, German, Russian, Indonesian and Uyghur. The magazine replaces Dabiq, Dar al-Islam and other magazines that were released until mid-2016. Analysts attributed the change of name partly to the imminent loss of the town of Dabiq to a Turkish-led military offensive, which occurred in October 2016. The name Rumiyah (Rome) was a reference to a hadith in which Muhammed said that Muslims would conquer both Constantinople and Rome in that order. Like Dabiq, each issue opens with a quote attributed to Abu Hamza al-Muhajir: "O muwahhidin, rejoice, for by Allah, we will not rest from our jihad except beneath the olive trees of Rumiyah (Rome)." The first issue was released after the death of IS spokesman, Abu Mohammad al-Adnani, who was featured heavily in the magazine. In October 2016, Islamic State released the second edition of the magazine in which it justified attacks against non-Muslims, including detailed descriptions of how to carry out knife attacks on smaller groups of people. In October 2016, Rumiyah advised followers to carry out stabbing attacks and argued that jihadists throughout Muslim history have "struck the necks of the kuffar" (unbelievers) in the name of Allah with "swords, severing limbs and piercing the fleshy meat of those who opposed Islam". The magazine advised its readers that knives are easy to obtain and to hide and that they make good, deadly weapons where Muslims might be regarded with suspicion. Issues See also Dar al-Islam (magazine) Konstantiniyye (magazine) Dabiq (magazine)
https://en.wikipedia.org/wiki/Manufacturing%20bill%20of%20materials
A manufacturing bill of materials (MBOM), also referred to as the manufacturing BOM, contains all the parts and assemblies required to build a complete and shippable product. MBOM is a type of bill of materials (BOM). Unlike engineering bill of materials (EBOM), which is organized with regards to how the product is designed, the MBOM is focused on the parts that are needed to manufacture a product. In addition to the parts list in an EBOM, the MBOM also includes information about how the parts relate to each other. In a batch execution system such as ISA-88, the MBOM will refer to the formula part of the recipe. A recipe will include a "recipe procedure" and "equipment requirements" in addition to the formula. The "recipe procedure" explains the steps to make the end product. The "equipment requirements" describes the machines and tools that are necessary to make the product. In ISA-95 terms, the MBOM will refer to the "material specification" in the "product definition model". An MBOM is not the same as "as manufactured" or "as built". The MBOM can be viewed as the ingredients in a recipe to make a cake, where as "as built" refers to the actual materials that were consumed to make the cake. In ISA-88 terms "as built" is the same as the batch record, in ISA-95 terms "as built" is the same as a "segment response" in "production performance". The details in an MBOM are good enough to allow it to be used in a manufacturing operations management (MOM) System or manufacturing execution system (MES). The MBOM typically contains more information than what is needed to do the MRP (material requirements planning) part of an MPS (master production schedule) in an ERP (enterprise resource planning) system.
https://en.wikipedia.org/wiki/Homicidal%20chauffeur%20problem
In game theory, the homicidal chauffeur problem is a mathematical pursuit problem which pits a hypothetical runner, who can only move slowly, but is highly maneuverable, against the driver of a motor vehicle, which is much faster but far less maneuverable, who is attempting to run him down. Both runner and driver are assumed to never tire. The question to be solved is: under what circumstances, and with what strategy, can the driver of the car guarantee that he can always catch the pedestrian, or the pedestrian guarantee that he can indefinitely elude the car? The problem is often used as an unclassified proxy for missile defense and other military targeting, allowing scientists to publish on it without security implications. The problem was proposed by Rufus Isaacs in a 1951 report for the RAND Corporation, and in the book Differential Games. The homicidal chauffeur problem is a classic example of a differential game played in continuous time in a continuous state space. The calculus of variations and level set methods can be used as a mathematical framework for investigating solutions of the problem. Although the problem is phrased as a recreational problem, it is an important model problem for mathematics used in a number of real-world applications. A discrete version of the problem was described by Martin Gardner (in his book Mathematical Carnival, chapter 16), where a squad car of speed 2 chases a crook of speed 1 on a rectangular grid, where the squad car but not the crook is constrained not to make left-hand turns or U-turns. See also Variational calculus Level-set method Apollonius pursuit problem Conway's Angel problem, another mathematical game which pits a powerful and maneuverable adversary against a highly resourceful but less powerful foe Princess and Monster game
https://en.wikipedia.org/wiki/Link-Systems%20International
Link-Systems International, Inc. (LSI) is a privately held American distance-learning software corporation based in Tampa, Florida. The company is best known for NetTutor, its online tutoring service; WorldWideTestbank, its platform for authoring online content; and its WorldWideWhiteboard education-focused online collaboration platform. History Link-Systems International was founded in 1995, then incorporated in the state of Florida on February 27, 1996. It started as an internet content authoring and repurposing service. For several years, LSI performed the conversion of scholarly content such as journals from earlier print-oriented formats to a format for Web display. Link-Systems International, Inc. ranked 3396 on the Inc. 5000 list in 2014 REB7I. WorldWideWhiteboard (formerly NetTutor): 1997 In 1997, LSI released "NetTutor", a Java-based application. The online educational interface allowed participants and a "leader" to collaborate in real time. When the leader drew or placed text, figures, or symbols, such as square-root and integral signs, on a virtual whiteboard, content would be simultaneously displayed on all users' screens. Other participants can "raise their hands" and be recognized by the leader, who can grant them access to draw or type on the whiteboard area. A secondary, instant messaging-style text area allows text-only communication. LSI leased this interface, mainly to schools and textbook publishers, renaming the platform WorldWideWhiteboard in 2001, in order to distinguish it from its online tutoring service, which retained the NetTutor name. NetTutor: 1998 LSI launched the NetTutor online tutoring service in 1998. NetTutor uses the WorldWideWhiteboard and a proprietary queuing system. Students who log in gain access to professional tutors who provide assistance in specific subject areas. NetTutor employs its tutors on a full-time basis at LSI headquarters in Tampa. (Other online tutoring services employ part-time tutors and allow them to tu
https://en.wikipedia.org/wiki/Rain%20on%20Your%20Parade
"Rain on Your Parade" is a song by Welsh singer Duffy from the deluxe version of her debut studio album Rockferry (2008). It was released as the lead and only single from the deluxe album worldwide on 9 November 2008. The song was written by Duffy and Rockferry collaborator Steve Booker and produced by Booker. It is an up-tempo pop song in which Duffy uses an idiom for ruining her lover and their intentions. The song marked a departure from the down-tempo soul and balladry of the original version of Rockferry, incorporating elements of R&B and soul. It received positive reviews from critics, with many complimenting Duffy's vocals. Musically, the song bears a striking resemblance to James Bond songs, making notable use of strings. It was called a "big, retro-sounding pop-soul number". Commercially, the song was a moderate chart success, peaking at number 15 on the UK Singles Chart, and reaching the top ten on the Italian FIMI Singles Chart. The song's accompanying music video featured Duffy in a style never previously connected with her, with a complicated dance routine and violin players. Duffy performed "Rain on Your Parade" on several television shows including The Royal Variety Show and New Year Live, whilst it has since featured on several film soundtracks and compilation albums. The song was released alongside three B-sides, one of which, titled "Smoke Without Fire" was written for the film An Education. Release and background Promotion Duffy performed the song on various TV shows and broadcast festivals in order to promote the release. Shows included The Royal Variety Show, New Year Live and various others. The song as well as "I'm Scared" featured in the 2009 film, Bride Wars. She also performed the track on the BBC Comic Relief charity appeal. The song features a prevalent string section that plays the main riff on the track. The song is used to promote the season 5 of Desperate Housewives in Australia. Reception Critical The song was well received by c
https://en.wikipedia.org/wiki/Brush%20border
A brush border (striated border or brush border membrane) is the microvillus-covered surface of simple cuboidal and simple columnar epithelium found in different parts of the body. Microvilli are approximately 100 nanometers in diameter and their length varies from approximately 100 to 2,000 nanometers. Because individual microvilli are so small and are tightly packed in the brush border, individual microvilli can only be resolved using electron microscopes; with a light microscope they can usually only be seen collectively as a fuzzy fringe at the surface of the epithelium. This fuzzy appearance gave rise to the term brush border, as early anatomists noted that this structure appeared very much like the bristles of a paintbrush. Brush border cells are found mainly in the following organs: The small intestine tract: This is where absorption takes place. The brush borders of the intestinal lining are the site of terminal carbohydrate digestions. The microvilli that constitute the brush border have enzymes for this final part of digestion anchored into their apical plasma membrane as integral membrane proteins. These enzymes are found near to the transporters that will then allow absorption of the digested nutrients. The kidney: Here the brush border is useful in distinguishing the proximal tubule (which possesses the brush border) from the distal convoluted tubule (which does not). The large intestine also has microvilli on the surface of its enterocytes. The brush border morphology increases a cell's surface area, a trait which is especially useful in absorptive cells. Cells that absorb substances need a large surface area in contact with the substance to be efficient. In intestinal cells, the microvilli are referred to as brush border and are protoplasmic extensions contrary to villi which are submucosal folds, while in the kidneys, microvilli are referred to as striated border. See also List of distinct cell types in the adult human body
https://en.wikipedia.org/wiki/Ductuli%20aberrantes
Ductuli aberrantes are two long narrow tubes, the ductulus aberrans inferior and the ductulus aberrans superior. The ductulus aberrant inferior (vas aberrans of Haller), is occasionally found connected with the lower part of the canal of the epididymis, or with the commencement of the vas deferens. Its length varies from 3.5 to 35 cm. , and it may become dilated toward its extremity; more commonly it retains the same diameter throughout. Its structure is similar to that of the ductus deferens. Occasionally it is found unconnected with the epididymis. A second tube, the ductulus aberrans superior, occurs in the head of the epididymis; it is connected with the rete testis.
https://en.wikipedia.org/wiki/Fluid%20flow%20through%20porous%20media
In fluid mechanics, fluid flow through porous media is the manner in which fluids behave when flowing through a porous medium, for example sponge or wood, or when filtering water using sand or another porous material. As commonly observed, some fluid flows through the media while some mass of the fluid is stored in the pores present in the media. Classical flow mechanics in porous media assumes that the medium is homogenous, isotropic, and has an intergranular pore structure. It also assumes that the fluid is a Newtonian fluid, that the reservoir is isothermal, that the well is vertical, etc. Traditional flow issues in porous media often involve single-phase steady state flow, multi-well interference, oil-water two-phase flow, natural gas flow, elastic energy driven flow, oil-gas two-phase flow, and gas-water two-phase flow. The physicochemical flow process will involve various physical property changes and chemical reactions in contrast to the basic Newtonian fluid in the classical flow theory of porous system. Viscosity, surface tension, phase state, concentration, temperature, and other physical characteristics are examples of these properties. Non-Newtonian fluid flow, mass transfer through diffusion, and multiphase and multicomponent fluid flow are the primary flow issues. Governing laws The movement of a fluid through porous media is described by the combination of Darcy's law with the principle of conservation of mass in order to express the capillary force or fluid velocity as a function of various other parameters including the effective pore radius, liquid viscosity or permeability. However, the use of Darcy's law alone does not produce accurate results for heterogeneous media like shale, and tight sandstones, where there is a huge proportion of nanopores. This necessitates the use of a flow model that considers the weighted proportion of various flow regimes like Darcy flow, transition flow, slip flow, and free molecular flow. Darcy's law The basic
https://en.wikipedia.org/wiki/Umbral%20calculus
In mathematics before the 1970s, the term umbral calculus referred to the surprising similarity between seemingly unrelated polynomial equations and certain shadowy techniques used to "prove" them. These techniques were introduced by John Blissard and are sometimes called Blissard's symbolic method. They are often attributed to Édouard Lucas (or James Joseph Sylvester), who used the technique extensively. Short history In the 1930s and 1940s, Eric Temple Bell attempted to set the umbral calculus on a rigorous footing. In the 1970s, Steven Roman, Gian-Carlo Rota, and others developed the umbral calculus by means of linear functionals on spaces of polynomials. Currently, umbral calculus refers to the study of Sheffer sequences, including polynomial sequences of binomial type and Appell sequences, but may encompass systematic correspondence techniques of the calculus of finite differences. The 19th-century umbral calculus The method is a notational procedure used for deriving identities involving indexed sequences of numbers by pretending that the indices are exponents. Construed literally, it is absurd, and yet it is successful: identities derived via the umbral calculus can also be properly derived by more complicated methods that can be taken literally without logical difficulty. An example involves the Bernoulli polynomials. Consider, for example, the ordinary binomial expansion (which contains a binomial coefficient): and the remarkably similar-looking relation on the Bernoulli polynomials: Compare also the ordinary derivative to a very similar-looking relation on the Bernoulli polynomials: These similarities allow one to construct umbral proofs, which, on the surface, cannot be correct, but seem to work anyway. Thus, for example, by pretending that the subscript n − k is an exponent: and then differentiating, one gets the desired result: In the above, the variable b is an "umbra" (Latin for shadow). See also Faulhaber's formula. Umbral Taylor
https://en.wikipedia.org/wiki/Amanita%20magnivelaris
Amanita magnivelaris, commonly known as the great felt skirt destroying angel or the great feltskirt destroying angel amanita, is a highly toxic basidiomycete fungus, one of many in the genus Amanita. Originally described from Ithaca, New York, by Charles Horton Peck, it is found in New York state and southeastern Canada. Like most other Amanita mushrooms, the great felt skirt destroying angel is hepatotoxic and can cause serious liver damage which can be fatal. See also List of Amanita species List of deadly fungi
https://en.wikipedia.org/wiki/Reye%20syndrome
Reye syndrome is a rapidly worsening brain disease. Symptoms of Reye syndrome may include vomiting, personality changes, confusion, seizures, and loss of consciousness. While liver toxicity typically occurs in the syndrome, jaundice usually does not. Death occurs in 20–40% of those affected with Reye syndrome, and about a third of those who survive are left with a significant degree of brain damage. The cause of Reye syndrome is unknown. It usually begins shortly after recovery from a viral infection, such as influenza or chickenpox. About 90% of cases in children are associated with aspirin (salicylate) use. Inborn errors of metabolism are also a risk factor. The syndrome is associated with changes on blood tests such as a high blood ammonia level, low blood sugar level, and prolonged prothrombin time. Often, the liver is enlarged in the syndrome. Prevention is typically by avoiding the use of aspirin in children. When aspirin was withdrawn for use in children in the US and UK in the 1980s, a decrease of more than 90% in rates of Reye syndrome was seen. Early diagnosis of the syndrome improves outcomes. Treatment is supportive; mannitol may be used to help with the brain swelling. The first detailed description of Reye syndrome was in 1963 by Australian pathologist Douglas Reye. The syndrome most commonly affects children. It affects fewer than one in a million children a year. The general recommendation to use aspirin in children was withdrawn because of Reye syndrome, with use only recommended in Kawasaki disease. Signs and symptoms Reye syndrome progresses through five stages: Stage I Vasoconstrictive rash on palms of hands and feet Persistent, heavy vomiting that is not relieved by not eating Generalized lethargy Confusion Nightmares (possible symptom) No fever usually present Headaches Stage II Deep lethargy Delirium Confusion Combative behavior Stupor Hyperventilation Fatty liver (found on biopsy) Hyperactive reflexes Stage III Continua
https://en.wikipedia.org/wiki/CCIR%20System%20G
CCIR System G, also known as the "Gerber Standard", is an analog broadcast television system used in sixty countries around the world for UHF channels. System G is generally associated with System B for VHF.At a CCIR Geneva meeting in July 1950, Dr. Gerber (a Swiss engineer), proposed a modified 625-lines system with a 7 MHz channel bandwidth (based on work by Telefunken and Walter Bruch). Known as the "Gerber Standard", it was initially approved for VHF broadcasts, and eventually adapted for UHF. Usually paired with PAL colour, it was also used with SECAM in Egypt, Iran and Saudi Arabia. Specifications Some of the important specs are listed below. Frame rate: 25 Hz Interlace: 2/1 Field rate: 50 Hz Lines/frame: 625 Hz Line rate: 15625 Hz Visual bandwidth: 5 MHz Vision modulation: AC3 negative Preemphasis: 50 μs Sound modulation: F3 Sound offset: 5.5 MHz Channel bandwidth: 8 MHz A frame is the total picture. The frame rate is the number of pictures displayed in one second. But each frame is actually scanned twice interleaving odd and even lines. Each scan is known as a field (odd and even fields.) So field rate is twice the frame rate. In each frame there are 625 lines (or 312.5 lines in a field.) So line rate (line frequency) is 625 times the frame frequency or 625•25=15625 Hz. The RF parameters of the transmitted signal are exactly the same as those for System B which is used on the 7.0 MHz wide channels of the VHF bands. The only difference is the width of the guard band between the channels, which on System G is 1.0 MHz wider than for System B: in other words 1.15 MHz (assuming the worst case which is when NICAM sound is in use). System H A few countries (Belgium, Luxembourg and Netherlands) use a variant of system G which is known as System H. System H is similar to system G but the lower (vestigial) side band is 500 kHz wider. This makes much better use of the 8.0 MHz channels of the UHF bands by reducing the width of the guard-band by 500 
https://en.wikipedia.org/wiki/Paul%20St%C3%A4ckel
Paul Gustav Samuel Stäckel (20 August 1862, Berlin – 12 December 1919, Heidelberg) was a German mathematician, active in the areas of differential geometry, number theory, and non-Euclidean geometry. In the area of prime number theory, he used the term twin prime (in its German form, "Primzahlzwilling") for the first time. After passing his Abitur in 1880 he studied mathematics and physics at the University of Berlin, but also listened to lectures on philosophy, psychology, education, and history. A year later he qualified for teaching in higher education and then taught at Gymnasien in Berlin. In 1885 he wrote his doctoral dissertation under Leopold Kronecker and Karl Weierstraß. In 1891 he completed his Habilitation at the University of Halle. Later he worked as a professor at the University of Königsberg (außerordentlicher Professor from 1895 to 1897), the University of Kiel (ordentlicher Professor, 1897 to 1905), University of Hannover (1905 to 1908), the Karlsruhe Institute of Technology (1908 to 1913), and the University of Heidelberg (1913 to 1919). Stäckel worked on both mathematics and the history of mathematics. He edited the letters exchanged between Carl Friedrich Gauss and Wolfgang Bolyai, made contributions to editions of the collected works of Euler and Gauss (for whose works he wrote Gauss als Geometer), and edited the Geometrischen Untersuchungen by Wolfgang and Johann Bolyai (published in 1913). Additionally he translated works of Jacob Bernoulli, Johann Bernoulli, Augustin Louis Cauchy, Leonhard Euler, Joseph-Louis Lagrange, Adrien-Marie Legendre, Carl Gustav Jacobi from French and Latin into German for the series Ostwalds Klassiker der exakten Wissenschaften. In 1904 he was an invited speaker at the International Congress of Mathematicians in Heidelberg. In 1905 he was the president of the Deutsche Mathematiker-Vereinigung. His doctoral students include Paul Riebesell. Works Über die Bewegung eines Punktes auf einer Fläche, 1885, Dissertatio
https://en.wikipedia.org/wiki/Out%20of%20the%20box%20%28feature%29
An out-of-the-box feature or functionality (also called OOTB or off the shelf), particularly in software, is a native feature or built-in functionality of a product that comes directly from the vendor and works immediately when the product is placed in service. In the context of software, out-of-the-box features and functionality are available for all users by default and do not require customization, modification, configuration, scripting, add-ons, modules, third-party tools, or additional fees in order to be used. See also Convention over configuration Commercial off-the-shelf Government off-the-shelf Commodity computing Out-of-box experience
https://en.wikipedia.org/wiki/C-Bus%20%28protocol%29
C-Bus is a communications protocol based on a seven layer OSI model for home and building automation that can handle cable lengths up to 1000 metres using Cat-5 cable. It is used in Australia, New Zealand, Asia, the Middle East, Russia, United States, South Africa, the UK and other parts of Europe including Greece and Romania. C-Bus was created by Clipsal Australia's Clipsal Integrated Systems division (now part of Schneider Electric) for use with its brand of home automation and building lighting control system. C-Bus has been briefly available in the United States but Schneider Electric has now discontinued sales in the United States. C-Bus is used in the control of domotics, or home automation systems, as well as commercial building lighting control systems. Unlike the more common X10 protocol which uses a signal imposed upon the AC power line, C-Bus uses a dedicated low-voltage cable or two-way wireless network to carry command and control signals. This improves the reliability of command transmission and makes C-Bus far more suitable for large, commercial applications than X10. C-Bus System The C-Bus System can be used to control lighting and other electrical systems and products automatically or via remote control and can also be interfaced to a home security system, AV products or other electrical items. The C-Bus system is available in a wired version and a wireless version, with a gateway available to allow messages to be sent between wired and wireless networks. The wired C-Bus system uses a standard category 5 UTP (Unshielded Twisted Pair) cable as its network communications cable and does not require end of line termination. Clipsal manufactures a specific category 5 cable for use within electrical distribution panels. This cable has a pink outer sheath which is rated to ensure adequate electrical isolation between the mains voltages found in distribution panels and the extra low voltage C-Bus. Outside of distribution panels standard category 5
https://en.wikipedia.org/wiki/Quantum%20dimer%20models
Quantum dimer models were introduced to model the physics of resonating valence bond (RVB) states in lattice spin systems. The only degrees of freedom retained from the motivating spin systems are the valence bonds, represented as dimers which live on the lattice bonds. In typical dimer models, the dimers do not overlap ("hardcore constraint"). Typical phases of quantum dimer models tend to be valence bond crystals. However, on non-bipartite lattices, RVB liquid phases possessing topological order and fractionalized spinons also appear. The discovery of topological order in quantum dimer models (more than a decade after the models were introduced) has led to new interest in these models. Classical dimer models have been studied previously in statistical physics, in particular by P. W. Kasteleyn (1961) and M. E. Fisher (1961).
https://en.wikipedia.org/wiki/Telkomcel
Telkomcel is a mobile telecommunication service located in Timor-Leste, owned by Telekomunikasi Indonesia International (TL) S.A. The company was established on 17 September 2012. It has three main business areas: mobile services, corporate solution and wholesale and international services. Since its official launch on 17 January 2013, Telkomcel has attracted more than 60,000 mobile subscribers and provides mobile coverage to 95% of Timor-Leste. On 24 June 2013, Telkomcel joined the Bridge Alliance, an Asian-Australian-African alliance of mobile operators. Network Service Telkomcel data network supported by 3G High Speed Download Packet Access (HSDPA) technology which is capable of transmitting data at up to 14.4 Mbit/s. Previous technology such as GPRS and EDGE are also available. In delivering 3G technology, Telkomcel using 850 MHz frequency. The advantage of this frequency is it ability to serve larger coverage, up to three times the coverage of 2.1 GHz frequency.
https://en.wikipedia.org/wiki/Horner%27s%20syndrome
Horner's syndrome, also known as oculosympathetic paresis, is a combination of symptoms that arises when a group of nerves known as the sympathetic trunk is damaged. The signs and symptoms occur on the same side (ipsilateral) as it is a lesion of the sympathetic trunk. It is characterized by miosis (a constricted pupil), partial ptosis (a weak, droopy eyelid), apparent anhidrosis (decreased sweating), with apparent enophthalmos (inset eyeball). The nerves of the sympathetic trunk arise from the spinal cord in the chest, and from there ascend to the neck and face. The nerves are part of the sympathetic nervous system, a division of the autonomic (or involuntary) nervous system. Once the syndrome has been recognized, medical imaging and response to particular eye drops may be required to identify the location of the problem and the underlying cause. Signs and symptoms Signs that are found in people with Horner's syndrome on the affected side of the face include the following: ptosis (drooping of the upper eyelid) anhidrosis (decreased sweating) miosis (constriction of the pupil) Enophthalmos (sinking of the eyeball into the face) inability to completely close or open the eyelid facial flushing headaches loss of ciliospinal reflex bloodshot conjunctiva, depending on the site of lesion. unilateral straight hair (in congenital Horner's syndrome); the hair on the affected side may be straight in some cases. heterochromia iridum (in congenital Horner's syndrome) Interruption of sympathetic pathways leads to several implications. It inactivates the dilator muscle and thereby produces miosis. It inactivates the superior tarsal muscle which produces ptosis. It reduces sweat secretion in the face. Patients may have apparent enophthalmos (affected eye looks to be slightly sunken in) but this is not always the case. The ptosis from inactivation of the superior tarsal muscle causes the eye to appear sunken in, but when actually measured, enophthalmos is not present.