source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/SUnit
SUnit is a unit testing framework for the programming language Smalltalk. It is the original source of the xUnit design, originally written by one of the creators of Extreme Programming, Kent Beck. SUnit allows writing tests and checking results in Smalltalk. History SUnit was originally described by Beck in "Simple Smalltalk Testing: With Patterns" (1989), then published as chapter 30 "Simple Smalltalk Testing", in the book Kent Beck's Guide to Better Smalltalk by Kent Beck, Donald G. Firesmith (Editor) (Publisher: Cambridge University Press, Pub. Date: December 1998, , 408pp) External links @ Camp Smalltalk SUnit @ Ward Cunningham's Wiki Extreme programming Unit testing frameworks Unit testing
https://en.wikipedia.org/wiki/White%20boar
The White Boar was the personal device or badge of the English King Richard III of England (1452–1485, reigned from 1483), and is an early instance of the use of boars in heraldry. Livery badges were important symbols of political affiliation in the Wars of the Roses, and Richard distributed very large numbers at his coronation and the installation of his son Edward as Prince of Wales, for which an order of 13,000 badges in fustian cloth is recorded. Edward appears to have shared use of the badge, either from Richard's accession to the throne, or his own appointment as Prince of Wales, both in 1483, to his death the next year. Richard's choice of the badge was no doubt personal, but according to a slightly later document the boar had been a badge of the royal possession the "Honour of Windsor" (an "honour" was a large estate, not necessarily all located around the place from which it took its name). Another suggestion is that the boar was a pun on "Ebor", a contraction of Eboracum, the Latin name for York; Richard was known as "Richard of York" before being created Duke of Gloucester. The boar was originally a symbol of the royal, ancient heden roots of the family symbolizing the royal bloodline of Galtung (Galthi) meaning boar in Norwegian. The norse god Ynge-Frey had a "radiant" boar Gullinbursti whom he used as a horse, taking Yngve-Frey faster than any other riding animal could. The fact that the boar Gullinbursti was "radiant", is why the boar is always depicted as white rather than the natural brown colours of a boar. This made Gullinbursti symbol of Ynglinga, the house of Ingi/Yngve-Frey. The boar Gullinbursti was hence the old norse family name of the bloodline since Norwegian Rollo of Normandy (Hrolfr Ragnvaldsson) became the ancestor of the Plantagenet. Richard was villainized after his death by the Tudor dynasty that followed his brief reign, and most of his badges would no doubt have been hurriedly discarded after his death. Only two examples surviv
https://en.wikipedia.org/wiki/Floral%20isolation
Floral Isolation is a form of reproductive isolation found in angiosperms. Reproductive isolation is the process of species evolving mechanisms to prevent reproduction with other species. In plants, this is accomplished through the manipulation of the pollinator’s behavior (ethological isolation) or through morphological characteristics of flowers that favor intraspecific pollen transfer (morphological isolation). Preventing interbreeding prevents hybridization and gene flow between the species (introgression), and consequently protects genetic integrity of the species. Reproductive isolation occurs in many organisms, and floral isolation is one form present in plants. Floral isolation occurs prior to pollination, and is divided into two types of isolation: morphological isolation and ethological isolation. Floral isolation was championed by Verne Grant in the 1900s as an important mechanism of reproductive isolation in plants. Morphological Isolation Mechanical or morphological isolation is a form of floral isolation where the characteristics of the flower prevents reproduction between species. These morphological differences primarily affect the positioning of reproductive structures within flowers and control the placement of pollen on the pollinator’s body to promote transfer within the same species. For example, flowers of Salvia mellifera have anthers and stigmas which are positioned to contact the dorsal surface of the bumblebee abdomen while flowers of the co-occurring Salvia apiana place pollen on the bumblebee’s flanks. Ethological Isolation Ethological isolation is a form of floral isolation caused predominantly by the behavior of pollinators. Flowers can have morphological features which attract or reward specific types of pollinators. The relationship between floral signals and pollinators can promote floral constancy, where different pollinators preferentially visit one species over other others. The color or odor of flowers promot
https://en.wikipedia.org/wiki/Robert%20W.%20Floyd
Robert W Floyd (June 8, 1936 – September 25, 2001) was a computer scientist. His contributions include the design of the Floyd–Warshall algorithm (independently of Stephen Warshall), which efficiently finds all shortest paths in a graph and his work on parsing; Floyd's cycle-finding algorithm for detecting cycles in a sequence was attributed to him as well. In one isolated paper he introduced the important concept of error diffusion for rendering images, also called Floyd–Steinberg dithering (though he distinguished dithering from diffusion). He pioneered in the field of program verification using logical assertions with the 1967 paper Assigning Meanings to Programs. This was a contribution to what later became Hoare logic. Floyd received the Turing Award in 1978. Life Born in New York City, Floyd finished high school at age 14. At the University of Chicago, he received a Bachelor of Arts (B.A.) in liberal arts in 1953 (when still only 17) and a second bachelor's degree in physics in 1958. Floyd was a college roommate of Carl Sagan. Floyd became a staff member of the Armour Research Foundation (now IIT Research Institute) at Illinois Institute of Technology in the 1950s. Becoming a computer operator in the early 1960s, he began publishing many papers, including on compilers (particularly parsing). He was a pioneer of operator-precedence grammars, and is credited with initiating the field of programming language semantics in . He was appointed an associate professor at Carnegie Mellon University by the time he was 27 and became a full professor at Stanford University six years later. He obtained this position without a Doctor of Philosophy (Ph.D.) degree. He was a member of the International Federation for Information Processing (IFIP) IFIP Working Group 2.1 on Algorithmic Languages and Calculi, which specified, maintains, and supports the programming languages ALGOL 60 and ALGOL 68. He was elected a Fellow of the American Academy of Arts and Sciences in 1974.
https://en.wikipedia.org/wiki/Belgian%20Society%20of%20Biochemistry%20and%20Molecular%20Biology
The Belgian Society of Biochemistry and Molecular Biology (BMB) is a Belgian non-profit organization, concerned with biochemistry and molecular biology. The BMB was created, based on an initiative of Marcel Florkin, so a Belgian society could join the new International Union of Biochemistry. The first charter of the society was drafted by Edouard J. Bigwood, Jean Brachet, Christian de Duve, Marcel Florkin, Lucien Massart, Paul Putzeys, Laurent Vandendriessche and Claude Lièbecq. The first general assembly was held on 12 January 1952, and the first President of the society was Marcel Florkin, with Claude Lièbecq as secretary and treasurer. See also BIO.be National Fund for Scientific Research
https://en.wikipedia.org/wiki/Theatre%20of%20the%20Oppressed
The Theatre of the Oppressed (TO) describes theatrical forms that the Brazilian theatre practitioner Augusto Boal first elaborated in the 1970s, initially in Brazil and later in Europe. Boal was influenced by the work of the educator and theorist Paulo Freire and his book Pedagogy of the Oppressed. Boal's techniques use theatre as means of promoting social and political change in alignment originally with radical-left politics and later with centre-left ideology. In the Theatre of the Oppressed, the audience becomes active, such that as "spect-actors" they explore, show, analyse and transform the reality in which they are living. History Although it was first officially adopted in the 1970s, Theatre of the Oppressed, a term coined by Augusto Boal, is a series of theatrical analyses and critiques was first developed in the 1950s. Boal was an avid supporter of using interactive techniques, especially in the context of theatre. Many of his ideas are considered as "a new media perspective", despite the relatively early birth of these ideas. Since then, these ideas have been developed more, giving them meaning in a modern-day context. The creation of the Theatre of the Oppressed is largely based on the idea of dialogue and interaction between audience and performer. Moreover, these ideas have served as a framework for the development and evolution of stronger ideas. Terminology Joker/Facilitator/Difficultator Much of Augusto Boal's theatrical process requires a neutral party to be at the centre of proceedings. This individual is usually called the "facilitator". In Boal's literature this role is referred to as the "joker", in reference to the neutrality of the Joker card in a deck of playing cards. This person takes responsibility for the logistics of the process and ensures a fair proceeding, but must never comment upon or intervene in the content of the performance, as that is the province of the "spect-actors". Fairness in this context means making sure that the
https://en.wikipedia.org/wiki/Neutrophil%20swarming
Neutrophil swarming is a type of coordinated neutrophil movement that acts in response to acute tissue inflammation or infection. The term comes from the swarming characteristics of insects that are similar to the behavior of neutrophils in response to an infection. These processes have mostly been studied in tissues of mice and studies of mouse ear tissue has proved to be very effective at observing neutrophil movement. Neutrophil swarming typically aggregates at surface layers of tissue so the thin nature of the mouse ear tissue makes for a good model to study this process. Additionally, zebrafish larvae have been used for the study of neutrophil movement mainly because of their translucence during the first few days of their development. With transgenic lines that fluorescently label zebrafish neutrophils, the cells can be tracked by epifluorescence or confocal microscopy during the course of an inflammatory response. Through this method, specific subpopulations of neutrophils can be tracked and their origin and fate during the induction and resolution of inflammation is observed. Another advantage for using zebrafish to study neutrophil swarming is that adaptive immunity for this organism does not develop until around 4 weeks of age. This allows for the study of neutrophil movement and other host immune responses independent of adaptive immune responses. Variations A study of the lymph nodes of mice that were infected by injection of parasites into their earflaps revealed two types of neutrophil swarming: transient and persistent swarms. Transient swarms are characterized by groups of 10-150 neutrophils forming multiple small cell clusters within 10-40 minutes that quickly dispersed. Persistent swarms showed clusters of more than 300 neutrophils and recruitment lasted for more than 40 minutes. For both the transient and persistent swarms, the formed neutrophil clusters appeared to be competing with each other with the larger clusters attracting neutrophils fro
https://en.wikipedia.org/wiki/Need%20for%20Speed%3A%20Underground
Need for Speed: Underground is a 2003 racing video game and the seventh installment in the Need for Speed series. It was developed by EA Black Box and published by Electronic Arts. Three different versions of the game were produced: one for consoles and Microsoft Windows, and another for the Game Boy Advance. An arcade version was additionally developed by Global VR, and was published by Konami with assistance from Electronic Arts. Underground rebooted the franchise, ignoring previous Need for Speed games that featured sports cars and exotics. It was the first game in the series to offer a career mode that features a comprehensive storyline, and a garage mode that allowed players to fully customize their cars with a large variety of brand-name performance and visual upgrades. All races take place in the fictional Olympic City. Rather than exotic cars, Underground featured vehicles associated with the import scene. Underground was critically and commercially successful, and was followed by Need for Speed: Underground 2 in 2004. Plot The player begins the game in a circuit race set in Olympic City, driving a white Honda/Acura Integra Type R that sports a unique set of vinyls and a wide body kit. They dominantly win the race; only to be awakened from a daydream by a woman named Samantha. Samantha is the player's contact in Olympic City, touring him across the import culture scene and illegal street racing therein. She helps the player buy their first car, although later pokes fun at the player's choices regardless of their preference, saying "ouch, that's seriously weak, dude". She kickstarts the player by introducing them to local street racers such as Jose (who offers Circuit events), Klutch (who offers Drag events) and Dirt (who offers Drift events). In event #7, she introduces him to T.J., a mechanic who rewards him with numerous performance upgrades and parts, provided he wins his time trials challenges. Samantha also issues time trials to the player, her rewa
https://en.wikipedia.org/wiki/Ammonia%20solution
Ammonia solution, also known as ammonia water, ammonium hydroxide, ammoniacal liquor, ammonia liquor, aqua ammonia, aqueous ammonia, or (inaccurately) ammonia, is a solution of ammonia in water. It can be denoted by the symbols NH3(aq). Although the name ammonium hydroxide suggests an alkali with the composition , it is actually impossible to isolate samples of NH4OH. The ions and OH− do not account for a significant fraction of the total amount of ammonia except in extremely dilute solutions. Basicity of ammonia in water In aqueous solution, ammonia deprotonates a small fraction of the water to give ammonium and hydroxide according to the following equilibrium: NH3 + H2O + OH−. In a 1 M ammonia solution, about 0.42% of the ammonia is converted to ammonium, equivalent to pH = 11.63 because [] = 0.0042 M, [OH−] = 0.0042 M, [NH3] = 0.9958 M, and pH = 14 + log10[OH−] = 11.62. The base ionization constant is Kb = = 1.77. Saturated solutions Like other gases, ammonia exhibits decreasing solubility in solvent liquids as the temperature of the solvent increases. Ammonia solutions decrease in density as the concentration of dissolved ammonia increases. At , the density of a saturated solution is 0.88 g/ml and contains 35.6% ammonia by mass, 308 grams of ammonia per litre of solution, and has a molarity of approximately 18 mol/L. At higher temperatures, the molarity of the saturated solution decreases and the density increases. Upon warming of saturated solutions, ammonia gas is released. Applications In contrast to anhydrous ammonia, aqueous ammonia finds few non-niche uses outside of cleaning agents. Household cleaner Diluted (1–3%) ammonia is also an ingredient of numerous cleaning agents, including many window cleaning formulas. Because aqueous ammonia is a gas dissolved in water, as the water evaporates from a window, the gas evaporates also, leaving the window streak-free. In addition to use as an ingredient in cleansers with other cleansing ingredients,
https://en.wikipedia.org/wiki/Warsaw%20rectifier
The Warsaw rectifier is a pulse-width modulation (PWM) rectifier, invented by Włodzimierz Koczara in 1992. Features The Warsaw Rectifier provides following features: Unity power factor Three-wire input, does not require connection to the neutral wire Ohmic behaviour Controlled output voltage Simple control scheme Low power losses Unique features of the Warsaw Rectifier: Short circuits do not cause current flow through switches No cross short circuit of switches possible Dead time not required Topology Warsaw Rectifier is a unidirectional, three-phase, three-switch two-level PWM rectifier. This topology uses three transistors and eighteen diodes. The bidirectional switches (made as four diodes and one transistor circuit) are connected in a delta topology. The rectifier output does not require a divided DC-link circuit as in the Vienna Rectifier topology. See also Vienna rectifier
https://en.wikipedia.org/wiki/DVB-RCS
DVB-RCS (Digital Video Broadcasting - Return Channel via Satellite) provides a method by which the DVB-S platform (and in theory also the DVB-S2 platform) can become a bi-directional, asymmetric data path using wireless between broadcasters and customers. It is a specification for an interactive on-demand multimedia satellite communication system formulated in 1999 by the DVB consortium. Without this method, various degrees of interactivity can be offered, without implying any return channel back from the user to the service provider: Data Carrousel or Electronic Programs Guides (EPG) are examples of such enhanced TV services which make use of “local interactivity”, without any return path from customer to provider. Chronology The 5th revision of the DVB-RCS standard was completed in 2008. A major update included the very first broadband mobile standardization. This extended version, formally referred to as "ETSI EN 301 790 v 1.5.1" is also known as "DVB-RCS+M". The "+M" version added several new features, such as the ability to use "DVB-S2" bursts in the uplink channel back to the satellite. It incorporated signal fade mitigation techniques and other solutions to combat short term signal loss. In contrast to other satellite communications systems, DVB-RCS was created in an open environment where any DVB member can participate. DVB membership is open to all companies willing to subscribe. The work group called "DVB TM-RCS" is currently pursuing other technical solutions for the approved commercial system. In 2009 technical work started for a new version of DVB-RCS called "DVB-RCS NG" (Next Generation). In this more powerful version of the standard "RCS2" there will be support for Higher Layers for Satellite (HLS) communication. Evolution In older systems, interactive video broadcasting was possible as a result of using physical cables for connectivity. However, in remote areas cable connections may be unavailable, two-way communication was then impossible via
https://en.wikipedia.org/wiki/Alpha%E2%80%93beta%20pruning
Alpha–beta pruning is a search algorithm that seeks to decrease the number of nodes that are evaluated by the minimax algorithm in its search tree. It is an adversarial search algorithm used commonly for machine playing of two-player combinatorial games (Tic-tac-toe, Chess, Connect 4, etc.). It stops evaluating a move when at least one possibility has been found that proves the move to be worse than a previously examined move. Such moves need not be evaluated further. When applied to a standard minimax tree, it returns the same move as minimax would, but prunes away branches that cannot possibly influence the final decision. History John McCarthy during the Dartmouth Workshop met Alex Bernstein of IBM, who was writing a chess program. McCarthy invented alpha-beta search and recommended it to him, but Bernstein was "unconvinced". Allen Newell and Herbert A. Simon who used what John McCarthy calls an "approximation" in 1958 wrote that alpha–beta "appears to have been reinvented a number of times". Arthur Samuel had an early version for a checkers simulation. Richards, Timothy Hart, Michael Levin and/or Daniel Edwards also invented alpha–beta independently in the United States. McCarthy proposed similar ideas during the Dartmouth workshop in 1956 and suggested it to a group of his students including Alan Kotok at MIT in 1961. Alexander Brudno independently conceived the alpha–beta algorithm, publishing his results in 1963. Donald Knuth and Ronald W. Moore refined the algorithm in 1975. Judea Pearl proved its optimality in terms of the expected running time for trees with randomly assigned leaf values in two papers. The optimality of the randomized version of alpha–beta was shown by Michael Saks and Avi Wigderson in 1986. Core idea A game tree can represent many two-player zero-sum games, such as chess, checkers, and reversi. Each node in the tree represents a possible situation in the game. Each terminal node (outcome) of a branch is assigned a numeric score that
https://en.wikipedia.org/wiki/Information%20Hyperlinked%20over%20Proteins
Information Hyperlinked over Proteins (or iHOP) is an online text mining service that provides a gene-guided network to access PubMed abstracts. The service was established by Robert Hoffmann and Alfonso Valencia in 2004. The concept underlying iHOP is that by using genes and proteins as hyperlinks between sentences and abstracts, the information in PubMed can be converted into one navigable resource. Navigating across interrelated sentences within this network rather than the use of conventional keyword searches allows for stepwise and controlled acquisition of information. Moreover, this literature network can be superimposed upon experimental interaction data to facilitate the simultaneous analysis of novel and existing knowledge. As of September 2014, the network presented in iHOP contains 28.4 million sentences and 110,000 genes from over 2,700 organisms, including the model organisms Homo sapiens, Mus musculus, Drosophila melanogaster, Caenorhabditis elegans, Danio rerio, Arabidopsis thaliana, Saccharomyces cerevisiae and Escherichia coli. The iHOP system has shown that by navigating from gene to gene, distant medical and biological concepts may be connected by only a small number of genes; the shortest path between two genes has been shown to involve on average four intermediary genes. The iHOP system architecture consists of two separate parts: the 'iHOP factory' and the web application. The iHOP factory manages the PubMed source data (text and gene data) and organises it within a PostgreSQL relational database. The iHOP factory also produces the relevant XML output for display by the web application. iHOP is free to use and is licensed under a Creative Commons BY-ND license.
https://en.wikipedia.org/wiki/Autophagy%20%28journal%29
Autophagy is a monthly peer-reviewed scientific journal covering all aspects of cell autophagy. It is published by Taylor & Francis and the editor-in-chief is Daniel J. Klionsky (University of Michigan). Abstracting and indexing The journal is abstracted and indexed in: According to the Journal Citation Reports, the journal has a 2020 impact factor of 16.016 and a five-year impact factor of 16.586 (2020) . See also Nature Communications PNAS Traffic Journal Cell Biology International Cell and Tissue Research Cell Cycle
https://en.wikipedia.org/wiki/Google%20Cast
Google Cast is a proprietary protocol developed by Google for playing Internet-streamed audiovisual content on a compatible consumer device. The protocol is used to initiate and control playback of content on digital media players, high-definition televisions, and home audio systems using a mobile device, personal computer, or smart speaker. The protocol was first launched on July 24, 2013, to support Google's first-generation Chromecast player. The Google Cast SDK was released on February 3, 2014, allowing third parties to modify their software to support the protocol. According to Google, over 20,000 Google Cast-ready apps were available as of May 2015. Support for Google Cast has since been integrated into subsequent devices, such as the Nexus Player and other Android TV devices (such as televisions), as well as soundbars, speakers, and later models of the Chromecast. Consumer devices that natively support the protocol are marketed as Chromecast built-in. over 55 million Chromecasts and Chromecast built-in devices have been sold. Operation Google Cast receivers can stream content via two methods: the first employs mobile and web apps that support the Google Cast technology; the second allows mirroring of content from the web browser Google Chrome running on a personal computer, as well as content displayed on some Android devices. In both cases, playback is initiated through the "cast" button on the sender device. The primary method of playing media on the device is through Google Cast–enabled mobile and web apps, which control program selection, playback, and volume. Google Cast receiver devices stream the media from the web within a local version of the Chrome browser, thus freeing the sender device up for other tasks, such as answering a call or using another application, without disrupting playback. Mobile apps enabled for Google Cast are available for both Android 4.1+ and iOS 7.0+; web apps enabled for Google Cast are available on computers running Goog
https://en.wikipedia.org/wiki/Phenotypic%20testing%20of%20mycobacteria
In microbiology, the phenotypic testing of mycobacteria uses a number of methods. The most-commonly used phenotypic tests to identify and distinguish Mycobacterium strains and species from each other are described below. Tests Acetamide as sole C and N sources Media: KH2PO4 (0.5 g), MgSO>4*7H20 (0.5 g), purified agar (20 g), distilled water (1000 ml). The medium is supplemented with acetamide to a final concentration of 0.02M, adjusted to a pH of 7.0 and sterilized by autoclaving at 115°C for 30 minutes. After sloping, the medium is inoculated with one loop of the cultures and incubated. Growth is read after incubation for two weeks (rapid growers) or four weeks (slow growers). Arylsulfatase test Arylsulfatase enzyme is present in most mycobacteria. The rate by which arylsulfatase enzyme breaks down phenolphthalein disulfate into phenolphthalein (which forms a red color in the presence of sodium bicarbonate) and other salts is used to differentiate certain strains of Mycobacteria. 3 day arylsulfatase test is used to identify potentially pathogenic rapid growers such as M. fortuitum and M. chelonae. Slow growing M. marinum and M. szulgai are positive in the 14-day arylsulfatase test. Catalase, semiquantitative activity Most mycobacteria produce the enzyme catalase, but they vary in the quantity produced. Also, some forms of catalase are inactivated by heating at 68°C for 20 minutes (others are stable). Organisms producing the enzyme catalase have the ability to decompose hydrogen peroxide into water and free oxygen. The test differs from that used to detect catalase in other types of bacteria by using 30% hydrogen peroxide in a strong detergent solution (10% polysorbate 80). Citrate Sole carbon source Egg medium Growth on Löwenstein–Jensen medium (LJ medium) L-Glutamate Sole carbon and nitrogen source Growth rate The growth rate is the length of time required to form mature colonies visible without magnification on solid media. Mycobacteria forming colonies v
https://en.wikipedia.org/wiki/Ppc64
ppc64 is an identifier commonly used within the Linux, GNU Compiler Collection (GCC) and LLVM open-source software communities to refer to the target architecture for applications optimized for 64-bit big-endian PowerPC and Power ISA processors. ppc64le is a pure little-endian mode that has been introduced with the POWER8 as the prime target for technologies provided by the OpenPOWER Foundation, aiming at enabling porting of the x86 Linux-based software with minimal effort. Details These two identifiers are frequently used when compiling source code to identify the target architecture. 64-bit Power and PowerPC processors are the following: PowerPC 620 RS64 – Apache, RS64-II Northstar, RS64-III Pulsar/IStar, and RS64-IV SStar POWER3 and POWER3-II POWER4 and POWER4+ PowerPC 970, 970FX, 970MP and 970GX POWER5 and POWER5+ PPE in Cell BE, PowerXCell 8i and Xenon. PWRficient POWER6 and POWER6+ POWER7 and POWER7+ A2, A2I (used in the Blue Gene/Q) and A2O PowerPC e5500 core based PowerPC e6500 core based POWER8 – P8-6c Murano, P8-12c Turismo and Venice, P8E (with NVLink) and CP1 POWER9 – P9C Cumulus, P9N Nimbus and P9 AIO Axone Power10 Microwatt, open source soft core Chiselwatt, open source soft core Defunct 64-bit PowerPC processors are the Motorola G5 and PowerPC e700.
https://en.wikipedia.org/wiki/Flag%20of%20Vietnam
The national flag of Vietnam, formally the National Flag of the Socialist Republic of Vietnam (), locally recognized as () and also (), was designed in 1940 and used during an uprising against the French in southern Vietnam that year. The red background symbolizes revolution and bloodshed. The golden star represents the five main classes in Vietnamese society—intellectuals, farmers, workers, entrepreneurs, and soldiers. The flag was used by the Viet Minh, a communist-led organization created in 1941 to oppose Japanese occupation. At the end of World War II, Viet Minh leader Ho Chi Minh proclaimed Vietnam independent and signed a decree on 5 September 1945 adopting the Viet Minh flag as the flag of the Democratic Republic of Vietnam. The DRV became the government of North Vietnam in 1954 following the Geneva Accords. The flag was modified on 30 November 1955 to make the rays of the star pointier. Until the end of the Vietnam War in 1975, South Vietnam used a yellow flag with three red stripes. The red flag of North Vietnam was later adopted as the flag of the unified Vietnam in 1976. The flag of Vietnam is the only flag amongst ASEAN that does not contain the colour white, with red and yellow/gold being its historical national colours. Design and history Vietnamese flag colours have often been various designs of red and bright yellow. According to Article 141 of the 1992 constitution: "The National Flag of the Socialist Republic of Vietnam is rectangular in shape, its width is equal to two thirds of its length, in the middle of fresh red background is a bright five-pointed golden star". The flag is blazoned: Gules, a mullet of five points or. The flag first appeared in the Southern uprising (Nam Kỳ Khởi nghĩa) of 23 November 1940, against French rule in southern Vietnam. A series of articles by Sơn Tùng on the origin of the flag were published in the state media in 1981. Sơn Tùng stated that the flag was designed by Nguyễn Hữu Tiến, a leader of the uprising wh
https://en.wikipedia.org/wiki/Medullary%20thymic%20epithelial%20cells
Medullary thymic epithelial cells (mTECs) represent a unique stromal cell population of the thymus which plays an essential role in the establishment of central tolerance. Therefore, mTECs rank among cells relevant for the development of functional mammal immune system. T cell precursors rise in bone marrow and migrate through the bloodstream to the thymus for further development. During their maturation in the thymus, they undergo a process called V(D)J recombination which conducts the development of T cell receptors (TCRs). The mechanism of this stochastic process enables on one hand the generation of vast repertoire of TCRs, however, on the other hand causes also origin of so called "autoreactive T cells" which recognize self antigens via their TCRs. Autoreactive T cells must be eliminated from the body or skewed into the T Regulatory cells (TRegs) lineage to prevent manifestations of autoimmunity. mTECs possess the ability to deal with these autoreactive clones via mediation of the processes of central tolerance, namely clonal deletion or T regulatory cells selection, respectively. N.B.: All the below cited references utilized mouse as a model organism. Self-antigens generation and presentation In 1989, two scientific groups came up with the hypothesis that the thymus expresses genes which are in the periphery, strictly expressed by specific tissues (e.g.: Insulin produced by β cells of the pancreas) to subsequently present these so-called "tissue restricted antigens" (TRAs) from almost all parts of the body to developing T cells in order to test which TCRs recognize self-tissues and can be therefore harmful to the body. It was found, after more than a decade, that this phenomenon is managed specifically by mTECs in the thymus and was named Promiscuous gene expression (PGE). Autoimmune regulator Aire is a protein called autoimmune regulator (Aire) which is also specifically expressed by mTECs. and its expression is completely dependent on NF- kappa B si
https://en.wikipedia.org/wiki/Dickey%E2%80%93Wicker%20Amendment
The Dickey–Wicker Amendment is the name of an appropriation bill rider attached to a bill passed by United States Congress in 1995, and signed by former President Bill Clinton, which prohibits the United States Department of Health and Human Services (HHS) from using appropriated funds for the creation of human embryos for research purposes or for research in which human embryos are destroyed. HHS funding includes the funding for the National Institutes of Health (NIH). It is named after Jay Dickey and Roger Wicker, two Republican Representatives. Technically, the Dickey Amendment is a rider to other legislation, which amends the original legislation. The rider receives its name from the name of the Congressman that originally introduced the amendment, Representative Dickey. The Dickey amendment language has been added to each of the Labor, HHS, and Education appropriations acts for fiscal years 1997 through 2009. The original rider can be found in Section 128 of P.L. 104–99. The wording of the rider is generally the same year after year. For fiscal year 2009, the wording in Division F, Section 509 of the Omnibus Appropriations Act, 2009, (enacted March 11, 2009) prohibits HHS, including NIH, from using fiscal year 2009 appropriated funds as follows: SEC. 509. (a) None of the funds made available in this Act may be used for-- (1) the creation of a human embryo or embryos for research purposes; or (2) research in which a human embryo or embryos are destroyed, discarded, or knowingly subjected to risk of injury or death greater than that allowed for research on fetuses in utero under 45 CFR 46.208(a)(2) and Section 498(b) of the Public Health Service Act (42 U.S.C. 289g(b)) (Title 42, Section 289g(b), United States Code). (b) For purposes of this section, the term "human embryo or embryos" includes any organism, not protected as a human subject under 45 CFR 46 (the Human Subject Protection regulations) ... that is derived by fertilization, parthenogenesis, cloni
https://en.wikipedia.org/wiki/Quillen%20determinant%20line%20bundle
In mathematics, the Quillen determinant line bundle is a line bundle over the space of Cauchy–Riemann operators of a vector bundle over a Riemann surface, introduced by . Quillen proved the existence of the Quillen metric on the determinant line bundle, a Hermitian metric defined using the analytic torsion of a family of differential operators. See also Quillen metric
https://en.wikipedia.org/wiki/List%20of%20garlic%20festivals
A garlic festival is a food festival focused on garlic. Examples include: United States Gilroy Garlic Festival, an annual food festival in Gilroy, California Hudson Valley Garlic Festival, in Saugerties, New York Connecticut Garlic and Harvest Festival, in Bethlehem, Connecticut Easton Garlic Fest, in Easton, Pennsylvania North Quabbin Garlic and Arts Festival, in Orange, Massachusetts Southern Vermont Garlic and Herb Festival, in Bennington, Vermont United Kingdom Isle of Wight Garlic Festival, an annual event held on the Isle of Wight, England Estonia , held in Jõgeva Parish, Jõgeva County France , held yearly in Lautrec, France Finland , held in Kerava, Uusimaa Japan Garlic and Bego Festival, held in Takko, Japan
https://en.wikipedia.org/wiki/Soybean%20oil
Soybean oil (British English: soyabean oil) is a vegetable oil extracted from the seeds of the soybean (Glycine max). It is one of the most widely consumed cooking oils and the second most consumed vegetable oil. As a drying oil, processed soybean oil is also used as a base for printing inks (soy ink) and oil paints. History Soybeans were cultivated in China by the late Shang dynasty, around 1000 BCE. Shijing, the Book of Odes, contains several poems mentioning soybeans. Production To produce soybean oil, the soybeans are cracked, adjusted for moisture content, heated to between 60 and 88 °C (140–190 °F), rolled into flakes, and solvent-extracted with hexanes. The oil is then refined, blended for different applications, and sometimes hydrogenated. Soybean oils, both liquid and partially hydrogenated are sold as "vegetable oil", or are ingredients in a wide variety of processed foods. Most of the remaining residue (soybean meal) is used as animal feed. In the 2002–2003 growing season, 30.6 million tons (MT) of soybean oil were produced worldwide, constituting about half of worldwide edible vegetable oil production, and thirty percent of all fats and oils produced, including animal fats and oils derived from tropical plants. In 2018–2019, world production was at 57.4 MT with the leading producers including China (16.6 MT), US (10.9 MT), Argentina (8.4 MT), Brazil (8.2 MT), and EU (3.2 MT). Composition Soybean oil contains only trace amounts of fatty carboxylic acids (about 0.3% by mass in the crude oil, 0.03% in the refined oil). Instead it contains esters. In the following content, the expressions "fatty acids" and "acid" below refer to esters rather than carboxylic acids. Per 100 g, soybean oil has 16 g of saturated fat, 23 g of monounsaturated fat, and 58 g of polyunsaturated fat. The major unsaturated fatty acids in soybean oil triglycerides are the polyunsaturates alpha-linolenic acid (C-18:3), 7-10%, and linoleic acid (C-18:2), 51%; and the monounsatu
https://en.wikipedia.org/wiki/Clorobiocin
Clorobiocin is an aminocoumarin antibacterial that inhibits the enzyme DNA gyrase.
https://en.wikipedia.org/wiki/Comparison%20of%20CalDAV%20and%20CardDAV%20implementations
A comparison of CalDAV and CardDAV implementations offers two overviews of client and server computer software implementations of the CalDAV and CardDAV protocols. Client implementations There are more clients, mentioned for completeness: For the command line: Vdirsyncer (for WebDAV) + Khal (for calendaring) or + Khard (for contacts) Apple's iCal and Calendar For Windows and Mac eM Client Windows built in-support (kind of) For the Web: Kronolith For Android: CalDAV Sync, CardDAV Sync, iCal Import/Export CalDAV Server implementations The table is missing Kopano, Kerio Connect and Scalix, which are mentioned here for completeness. See also CalDAV CardDAV
https://en.wikipedia.org/wiki/Martha%20Guzm%C3%A1n%20Partida
Martha Dolores Guzmán Partida is a Mexican mathematician specializing in functional analysis, including Fourier analysis, harmonic analysis, and the theory of distributions. She is a professor of mathematics at the Universidad de Sonora. Education Guzmán Partida was an undergraduate at the Meritorious Autonomous University of Puebla. She completed her doctorate in 1995 at the National Autonomous University of Mexico. Her dissertation, Hardy Spaces of Conjugates Temperatures, was supervised by Salvador Pérez Esteva. Recognition Guzmán was elected to the Mexican Academy of Sciences in 2013.
https://en.wikipedia.org/wiki/Extreme%20programming
Extreme programming (XP) is a software development methodology intended to improve software quality and responsiveness to changing customer requirements. As a type of agile software development, it advocates frequent releases in short development cycles, intended to improve productivity and introduce checkpoints at which new customer requirements can be adopted. Other elements of extreme programming include: programming in pairs or doing extensive code review, unit testing of all code, not programming features until they are actually needed, a flat management structure, code simplicity and clarity, expecting changes in the customer's requirements as time passes and the problem is better understood, and frequent communication with the customer and among programmers. The methodology takes its name from the idea that the beneficial elements of traditional software engineering practices are taken to "extreme" levels. As an example, code reviews are considered a beneficial practice; taken to the extreme, code can be reviewed continuously (i.e. the practice of pair programming). History Kent Beck developed extreme programming during his work on the Chrysler Comprehensive Compensation System (C3) payroll project. Beck became the C3 project leader in March 1996. He began to refine the development methodology used in the project and wrote a book on the methodology (Extreme Programming Explained, published in October 1999). Chrysler cancelled the C3 project in February 2000, after seven years, when Daimler-Benz acquired the company. Ward Cunningham was another major influence on XP. Many extreme-programming practices have been around for some time; the methodology takes "best practices" to extreme levels. For example, the "practice of test-first development, planning and writing tests before each micro-increment" was used as early as NASA's Project Mercury, in the early 1960s. To shorten the total development time, some formal test documents (such as for acceptance testin
https://en.wikipedia.org/wiki/Redtail%20Telematics%20Corporation
Redtail Telematics is a provider of GPS enabled fleet tracking products. The company is based in North America with headquarters in the United Kingdom. Features Redtail's products use a technology solution known as VAM (Vehicle Asset Management) which includes features such as: 1) sensors 2) Onboard diagnostics 3) Vehicle status engine detection 4) GPS jamming/tamper protection alerts Partnerships The company's technology is provided by Plextek Limited, with which it has a strategic design partnership. As of 2015, it has partnered with insurance provider Admiral.
https://en.wikipedia.org/wiki/Rudolf%20Berghammer
Rudolf Berghammer (born 1952 in Oberndorf, Germany) is a German mathematician who works in computer science. Life Rudolf Berghammer worked as an electrician at the Farbwerke Hoechst, Kelheim, from 1966 until 1970. He began studying Mathematics and Computer Science in 1973 at TU München. His academic teachers were Friedrich L. Bauer, Klaus Samelson, Gottfried Tinhofer, and Gunther Schmidt. After obtaining his diploma in 1979, he started working as an assistant mainly to Gunther Schmidt and Friedrich L. Bauer at TU München where he obtained his award-winning Ph.D. in 1984. From 1988 on, he worked as an assistant to Gunther Schmidt at the Faculty for Computer Science of the Universität der Bundeswehr München, where he finally got his habilitation in 1990. Since 1993 he is a professor for Computer-aided Program Development at the Department of Computer Science at the University of Kiel. Work For many years he has served as head of the steering committee of the international RAMiCS conference series (formerly termed RelMiCS). Rudolf Berghammer is known for his work in relational mathematics, or Formal Methods of Programming, Semantics, Relational Methods in Computer Science. He developed the RelView system for the manipulation and visualisation of relations and relational programming. For instance, in 2019 he was coauthor of "Cryptomorphic topological structures: a computational relation algebraic approach". This work relates the classical neighborhood system approach to topology to closure operators, kernel operators, and Aumann contact relations. The formulation of one approach to another is done with calculus of relations. The article notes the contributions of RelView experiments with finite topologies, for instance for a set with seven elements, 9,535,241 topologies are tested. (see § 9). Personal One of his hobbies is mountaineering. In his youth he climbed Ortler or Piz Bernina and other noted summits. He is an active climber spending several days in the a
https://en.wikipedia.org/wiki/BGPsec
Border Gateway Protocol Security (BGPsec) is a security extension of the Border Gateway Protocol defined in RFC 8205, published in September 2017. BGPsec provides to receivers of valid BGPsec UPDATE messages cryptographic verification of the routes they advertise. BGPsec replaces the BGP AS_PATH attribute with a new BGPsec_Path attribute. BGPsec RFCs - BGPsec Protocol Specification - BGPsec Considerations for Autonomous System (AS) Migration - BGPsec Operational Considerations - BGPsec Algorithms, Key Formats, and Signature Formats - A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests See also Autonomous system (Internet) Border Gateway Protocol
https://en.wikipedia.org/wiki/Ga%C3%ABtan%20Dugas
Gaëtan Dugas (; February 19, 1952 – March 30, 1984) was a Québécois Canadian flight attendant and a relatively early patient with the human immunodeficiency virus (HIV), who once was widely described as "Patient Zero", accusing him of introducing HIV to the United States. This claim has since been proven incorrect. In March 1984, a study tracked Dugas, along with other gay and bisexual men, to indicate his role in a particular cluster of 40 AIDS cases in the United States. He was named "Patient O", with "O" standing for "Out-of-California". A 1987 book about the epidemic, And the Band Played On, used the term "Patient Zero" and put significant focus on Dugas, with media reports expanding his role in the epidemic further. A 2016 study confirmed that Dugas did not bring HIV to the United States, and he was not Patient Zero, via genetic analysis of stored blood samples, supported by historical detective work. Dugas worked as a flight attendant for Air Canada and died in Quebec City in March 1984 as a result of kidney failure caused by AIDS-related infections. 1984 cluster study A Centers for Disease Control and Prevention (CDC) study published in The American Journal of Medicine in 1984 titled Cluster of Cases of the Acquired Immune Deficiency Syndrome examined the sexual contacts of gay men infected with AIDS to determine if their histories were consistent with the hypothesis that AIDS was caused by an infectious agent. A graph included with the paper traced the sequence of infection among 40 men and labelled one of the nodes as "Patient 0" (with other nodes including the place of residence and a number indicating the sequence in which they developed AIDS symptoms, such as "NY 14"). The paper later stated: The researchers later stated they had originally intended to designate Dugas as "Patient O", with "O" standing for "Out-of-California" but at some point it was changed to a "0". "Patient Zero" designation Dugas is featured prominently in Randy Shilts's 1987 bo
https://en.wikipedia.org/wiki/Modern%20triangle%20geometry
In mathematics, modern triangle geometry, or new triangle geometry, is the body of knowledge relating to the properties of a triangle discovered and developed roughly since the beginning of the last quarter of the nineteenth century. Triangles and their properties were the subject of investigation since at least the time of Euclid. In fact, Euclid's Elements contains description of the four special points – centroid, incenter, circumcenter and orthocenter - associated with a triangle. Even though Pascal and Ceva in the seventeenth century, Euler in the eighteenth century and Feuerbach in the nineteenth century and many other mathematicians had made important discoveries regarding the properties of the triangle, it was the publication in 1873 of a paper by Emile Lemoine (1840–1912) with the title "On a remarkable point of the triangle" that was considered to have, according to Nathan Altschiller-Court, "laid the foundations...of the modern geometry of the triangle as a whole." The American Mathematical Monthly, in which much of Lemoine's work is published, declared that "To none of these [geometers] more than Émile-Michel-Hyacinthe Lemoine is due the honor of starting this movement of modern triangle geometry". The publication of this paper caused a remarkable upsurge of interest in investigating the properties of the triangle during the last quarter of the nineteenth century and the early years of the twentieth century. A hundred-page article on triangle geometry in Klein's Encyclopedia of Mathematical Sciences published in 1914 bears witness to this upsurge of interest in triangle geometry. In the early days, the expression "new triangle geometry" referred to only the set of interesting objects associated with a triangle like the Lemoine point, Lemoine circle, Brocard circle and the Lemoine line. Later the theory of correspondences which was an offshoot of the theory of geometric transformations was developed to give coherence to the various isolated results. Wit
https://en.wikipedia.org/wiki/Plastic%20wrap
Plastic wrap, cling film, Saran wrap, cling wrap, Glad wrap or food wrap is a thin plastic film typically used for sealing food items in containers to keep them fresh over a longer period of time. Plastic wrap, typically sold on rolls in boxes with a cutting edge, clings to many smooth surfaces and can thus remain tight over the opening of a container without adhesive. Common plastic wrap is roughly 0.0005 inches (12.7 μm) thick. The trend has been to produce thinner plastic wrap, particularly for household use (where very little stretch is needed), so now the majority of brands on shelves around the world are 8, 9 or 10 μm thick. Materials used Plastic wrap was initially created from polyvinyl chloride (PVC), which remains the most common component globally. PVC has an acceptably-low permeability to water vapor and oxygen, helping to preserve the freshness of food. There are concerns about the transfer of plasticizers from PVC into food. Pliofilm was made of various kinds of rubber chloride. Used in the middle of the 20th century, it could be heat-sealed. A common, cheaper alternative to PVC is low-density polyethylene (LDPE). It is less adhesive than PVC, but this can be remedied by adding linear low-density polyethylene (LLDPE), which also increases the film's tensile strength. In the US and Japan, plastic wrap is sometimes produced using polyvinylidene chloride (PVdC), though some brands, such as Saran wrap, have switched to other formulations due to environmental concerns. Food use Purpose The most important role plastic wrap plays in food packaging is protection and preservation. Plastic wrap can prevent food from perishing, extend its shelf-life, and maintain the quality of food. Plastic wrap generally provides protection for food from three aspects: chemical (gases, moisture, and light), biological (microorganisms, insects and animals), and physical (mechanical damage). In addition to food protection and preservation, plastic wrap can also reduce food
https://en.wikipedia.org/wiki/Enshittification
Enshittification, also known as platform decay, is the pattern of decreasing quality of online platforms that act as two-sided markets. Enshittification can be seen as a form of rent-seeking. Examples of alleged enshittification have included Amazon, Bandcamp, Google Search, Facebook, Reddit, and Twitter. Definition The term enshittification was coined by Cory Doctorow in a November 2022 blog post, later republished in Locus in January 2023. He expanded on the concept in an article of the January 2023 edition of Wired, in which he explained that enshittification is how platforms die: According to Doctorow, new platforms offer useful products and services at a loss, as a way to gain new users. Once users are locked in, the platform then offers access to the userbase to suppliers at a loss, and once suppliers are locked-in, the platform shifts surpluses to shareholders. Once the platform is fundamentally focused on the shareholders, and the users and vendors are locked in, the platform no longer has any incentive to maintain quality. Enshittified platforms which act as intermediaries can functionally act as both a monopoly on services and a monopsony on customers, as high switching costs prevent either from leaving even when alternatives technically exist. Doctorow has described the process of enshittification as happening through "twiddling"; the continual adjustment of the parameters of the system in search of marginal improvements of profits, without regard to any other goal. To solve the problem, Doctorow has called for two general principles to be followed: The first is a respect of the end-to-end principle, a fundamental principle of the Internet in which the role of a network is to reliably deliver data from willing senders to willing receivers. When applied to platforms, this entails users being given what they asked for, not what the platform prefers to present. For example, users would see all content from users they subscribed to, allowing content cre
https://en.wikipedia.org/wiki/Journal%20of%20Neurophysiology
The Journal of Neurophysiology is a monthly peer-reviewed scientific journal established in 1938. It is published by the American Physiological Society with Jan "Nino" Ramirez as its editor-in-chief. Ramirez is the Director for the Center for Integrative Brain Research at the University of Washington. The Journal of Neurophysiology publishes original articles on the function of the nervous system. All levels of function are included, from membrane biophysics to cell biology to systems neuroscience and the experimental analysis of behavior. Experimental approaches include molecular neurobiology, cell culture and slice preparations, membrane physiology, developmental neurobiology, functional neuroanatomy, neurochemistry, neuropharmacology, systems electrophysiology, imaging and mapping techniques, and behavioral analysis. Experimental preparations may be invertebrate or vertebrate species, including humans. Theoretical studies are acceptable if they are tied closely to the interpretation of experimental data and elucidate principles of broad interest. The journal published some of the first functional neuroimaging studies. The Journal's Deputy Editor is Reza Shadmehr. The current Associate Editors for the Journal of Neurophysiology are Robert M. Brownstone, Ansgar Buschges, Carmen C. Canavier, Christos Constantinidis, Leslie M. Kay, Zoe Kourtzi, M. Bruce MacIver, Hugo Merchant, Monica A. Perez, Albrecht Stroh, and Ana C. Takakura. Types of manuscripts published The Journal of Neurophysiology publishes research reports of any length, review articles, Rapid Reports, Innovative Methodology reports, Case Studies in Neuroscience, and NeuroForums (brief commentaries on recent articles authored by graduate and postdoctoral students). Review article topics must be approved by the editor-in-chief prior to submission of the article. Rapid Reports are short papers presenting important new findings that could potentially have a major impact on the field. Rapid Reports s
https://en.wikipedia.org/wiki/Cladostephaceae
Cladostephaceae is a family of brown algae belonging to the order Sphacelariales in the class Phaeophyceae. The family comprises a single genus: Cladostephus C.Agardh, 1817
https://en.wikipedia.org/wiki/Probe%20electrospray%20ionization
Probe electrospray ionization (PESI) is an electrospray-based ambient ionization technique which is coupled with mass spectrometry for sample analysis. Unlike traditional mass spectrometry ion sources which must be maintained in a vacuum, ambient ionization techniques permit sample ionization under ambient conditions, allowing for the high-throughput analysis of samples in their native state, often with minimal or no sample pre-treatment. The PESI ion source simply consists of a needle to which a high voltage is applied following sample pick-up, initiating electrospray directly from the solid needle. History Probe electrospray ionization is an ambient ionization mass spectrometry technique developed by Professor Kenzo Hiraoka et al. at the University of Yamanashi, Japan. The technique was developed to address some of the issues associated with traditional electrospray ionization (ESI), including clogging of the capillary and contamination, whilst providing a means of rapid and direct sample analysis. Since its initial conception, various modified forms of the PESI ion source have been developed, and the PESI-MS system has been commercialized by instrument manufacturing company Shimadzu. Principle of operation The PESI ion source consists of a solid needle or wire which acts as both the sampling probe and electrospray emitter. The needle is moved up and down along a vertical axis, a process which can be either automated or manual. When the needle is lowered to the sampling stage, the tip of the needle briefly touches the surface of a typical liquid sample. During this stage, the needle is held at ground potential. The needle is then raised to be level with the mass spectrometer inlet where a high voltage of 2-3 kV is applied. Electrospray is induced at the tip of the needle, producing analyte ions which are drawn into the mass spectrometer for analysis. The mechanism by which ions are formed is believed to be identical to traditional electrospray ionization. As a
https://en.wikipedia.org/wiki/Southern%20and%20Eastern%20Serbia
The Southern and Eastern Serbia () is one of five statistical regions of Serbia. It is also a level-2 statistical region according to the European NUTS. It was formed in 2010. As of 2022 census, the region has a total of 1,406,050 inhabitants. Formation In July 2009, the Serbian parliament adopted a law which divided Serbia into seven statistical regions. At first, it was decided that in the territory of current statistical region of Southern and Eastern Serbia there would be two statistical regions – Eastern Region () and Southern Region (). However, in May 2010, the law was changed, thus the Eastern and Southern region were merged into a single statistical region named Southern and Eastern Serbia. Districts The statistical region of Southern and Eastern Serbia is composed of 9 administrative districts: Economy Southern and Eastern Serbia region is the poorest in the country. Only Bor and Zaječar have GDP above the national average. The devastated areas include Babušnica, Bela Palanka, Bojnik, Bosilegrad, Vladičin Han, Golubac, Žagubica, Kuršumlija, Kučevo, Lebane, Medveđa, Svrljig, Surdulica, Trgovište and Crna Trava. The GDP of the region in 2017 was €6,640,000,000, or 13.8% of Serbia's GDP. The GDP per capita is €4,249. Cities and towns The largest cities and towns of the region are: Demographics According to the 2011 census, the population of Southern and Eastern Serbia is 1,563,916. The most populated city is Niš with around 260,000 people in metro area. Other urban centers are Smederevo, Leskovac, Zajecar and Vranje with more than 50,000 people living in city proper area. The region is heavily affected by depopulation. Most critical situation is in municipalities of Gadžin Han, Crna Trava, Ražanj, Trgovište, as well as Bulgarian populated places Dimitrovgrad and Bosilegrad. A good example of depopulation is Crna Trava that had 13,614 people in 1948, while in 2011 only 1,663 people were recorded. Albanians boycotted the 2011 census. It's estimated t
https://en.wikipedia.org/wiki/Delaunay%20refinement
In mesh generation, Delaunay refinements are algorithms for mesh generation based on the principle of adding Steiner points to the geometry of an input to be meshed, in a way that causes the Delaunay triangulation or constrained Delaunay triangulation of the augmented input to meet the quality requirements of the meshing application. Delaunay refinement methods include methods by Chew and by Ruppert. Chew's second algorithm Chew's second algorithm takes a piecewise linear system (PLS) and returns a constrained Delaunay triangulation of only quality triangles where quality is defined by the minimum angle in a triangle. Developed by L. Paul Chew for meshing surfaces embedded in three-dimensional space, Chew's second algorithm has been adopted as a two-dimensional mesh generator due to practical advantages over Ruppert's algorithm in certain cases and is the default quality mesh generator implemented in the freely available Triangle package. Chew's second algorithm is guaranteed to terminate and produce a local feature size-graded meshes with minimum angle up to about 28.6 degrees. The algorithm begins with a constrained Delaunay triangulation of the input vertices. At each step, the circumcenter of a poor-quality triangle is inserted into the triangulation with one exception: If the circumcenter lies on the opposite side of an input segment as the poor quality triangle, the midpoint of the segment is inserted. Moreover, any previously inserted circumcenters inside the diametral ball of the original segment (before it is split) are removed from the triangulation. Circumcenter insertion is repeated until no poor-quality triangles exist. Ruppert's algorithm Ruppert's algorithm takes a planar straight-line graph (or in dimension higher than two a piecewise linear system) and returns a conforming Delaunay triangulation of only quality triangles. A triangle is considered poor-quality if it has a circumradius to shortest edge ratio larger than some prescribed thresh
https://en.wikipedia.org/wiki/Primary%20fissure%20of%20cerebellum
The monticulus of the cerebellum is divided by the primary fissure (or preclival fissure) into an anterior, raised part, the culmen or summit, and a posterior sloped part, the clivus; the quadrangular lobule is similarly divided. Additional images See also Anatomy of the cerebellum
https://en.wikipedia.org/wiki/Samus%20Aran
is the protagonist of the video game series Metroid by Nintendo. She was created by the Japanese video game designer Makoto Kano. She was introduced as a player character in the original 1986 game Metroid. Raised and infused with the DNA of the Chozo, Samus Aran is an ex-soldier of the Galactic Federation who became a galactic bounty hunter. She uses a powered exoskeleton that is equipped with weapons such as directed-energy weapons and missiles. She executes missions given to her by the Galactic Federation and the Chozo while hunting the antagonistic Space Pirates and their leader Ridley, along with the cybernetic supercomputer Mother Brain, the energy-draining X Parasites and Metroids, and as well the rogue Chozo Raven Beak. Samus appears in several other game franchises, including as a playable character in the Super Smash Bros. series, and in other media, including films, manga series, and a comic book continuation of the TV series Captain N: The Game Master. In terms of gender representation in video games, Samus has received largely positive reception. She is also recognized as one of the earliest female video game protagonists and has remained a popular and well-received character. Her role in Metroid: Other M was less well-received due to how she was portrayed. Concept and creation Hiroji Kiyotake designed Samus Aran. Series co-creator Yoshio Sakamoto conceived of the idea of making Samus a woman midway through the first Metroids development, which the development team voted in favor of. The game's instruction manual refers to Samus as if she were male to obscure her real sex until the surprise reveal at the end of the game. Her appearance outside of her suit was based on actress Sigourney Weaver in her role as Ellen Ripley from Aliens, and actress Kim Basinger's roles from 9½ Weeks and My Stepmother Is an Alien. Sakamoto noted that during the course of the Metroid series, developers constantly try to express her femininity without sexually objectifyi
https://en.wikipedia.org/wiki/Olfactory%20trigone
The olfactory trigone is a small triangular area in front of the anterior perforated substance. Its apex, directed forward, occupies the posterior part of the olfactory sulcus, and is brought into view by throwing back the olfactory tract. It is part of the olfactory pathway.
https://en.wikipedia.org/wiki/Heart%20symbol
The heart symbol is an ideograph used to express the idea of the "heart" in its metaphorical or symbolic sense. Represented by an anatomically inaccurate shape, the heart symbol is often used to represent the center of emotion, including affection and love, especially romantic love. It is sometimes accompanied or superseded by the "wounded heart" symbol, depicted as a heart symbol pierced with an arrow or as a heart symbol "broken" into two or more pieces, indicating lovesickness. History Similar shapes from antiquity Peepal leaves were used in artistic depictions of the Indus Valley civilisation: a heart-shaped pendant originating from there has been discovered and is now exhibited in the National Museum of India. In the 5th–6th century BC, the heart shape was used to represent the heart-shaped fruit of the plant silphium, a plant possibly used as a contraceptive and an aphrodisiac. Silver coins from Cyrene of the 5th–6th century BC bear a similar design, sometimes accompanied by a silphium plant and is understood to represent its seed or fruit. Since ancient times in Japan, the heart symbol has been called Inome (猪目), meaning the eye of a wild boar, and it has the meaning of warding off evil spirits. The decorations are used to decorate Shinto shrines, Buddhist temples, castles, and weapons. The oldest examples of this pattern are seen in some of the Japanese original tsuba (sword guard) of the style called toran gata tsuba (lit., inverted egg shaped tsuba) that were attached to swords from the sixth to seventh centuries, and part of the tsuba was hollowed out in the shape of a heart symbol. Earliest use The combination of the heart shape and its use within the heart metaphor was developed in the end of the Middle Ages, although the shape has been used in many ancient epigraphy monuments and texts. With possible early examples or direct predecessors in the 13th to 14th century, the familiar symbol of the heart representing love developed in the 15th century,
https://en.wikipedia.org/wiki/Conductor-discriminant%20formula
In mathematics, the conductor-discriminant formula or Führerdiskriminantenproduktformel, introduced by for abelian extensions and by for Galois extensions, is a formula calculating the relative discriminant of a finite Galois extension of local or global fields from the Artin conductors of the irreducible characters of the Galois group . Statement Let be a finite Galois extension of global fields with Galois group . Then the discriminant equals where equals the global Artin conductor of . Example Let be a cyclotomic extension of the rationals. The Galois group equals . Because is the only finite prime ramified, the global Artin conductor equals the local one . Because is abelian, every non-trivial irreducible character is of degree . Then, the local Artin conductor of equals the conductor of the -adic completion of , i.e. , where is the smallest natural number such that . If , the Galois group is cyclic of order , and by local class field theory and using that one sees easily that if factors through a primitive character of , then whence as there are primitive characters of we obtain from the formula , the exponent is Notes
https://en.wikipedia.org/wiki/Curvelet
Curvelets are a non-adaptive technique for multi-scale object representation. Being an extension of the wavelet concept, they are becoming popular in similar fields, namely in image processing and scientific computing. Wavelets generalize the Fourier transform by using a basis that represents both location and spatial frequency. For 2D or 3D signals, directional wavelet transforms go further, by using basis functions that are also localized in orientation. A curvelet transform differs from other directional wavelet transforms in that the degree of localisation in orientation varies with scale. In particular, fine-scale basis functions are long ridges; the shape of the basis functions at scale j is by so the fine-scale bases are skinny ridges with a precisely determined orientation. Curvelets are an appropriate basis for representing images (or other functions) which are smooth apart from singularities along smooth curves, where the curves have bounded curvature, i.e. where objects in the image have a minimum length scale. This property holds for cartoons, geometrical diagrams, and text. As one zooms in on such images, the edges they contain appear increasingly straight. Curvelets take advantage of this property, by defining the higher resolution curvelets to be more elongated than the lower resolution curvelets. However, natural images (photographs) do not have this property; they have detail at every scale. Therefore, for natural images, it is preferable to use some sort of directional wavelet transform whose wavelets have the same aspect ratio at every scale. When the image is of the right type, curvelets provide a representation that is considerably sparser than other wavelet transforms. This can be quantified by considering the best approximation of a geometrical test image that can be represented using only wavelets, and analysing the approximation error as a function of . For a Fourier transform, the squared error decreases only as . For a wide variety o
https://en.wikipedia.org/wiki/Prime-counting%20function
In mathematics, the prime-counting function is the function counting the number of prime numbers less than or equal to some real number x. It is denoted by (x) (unrelated to the number ). Growth rate Of great interest in number theory is the growth rate of the prime-counting function. It was conjectured in the end of the 18th century by Gauss and by Legendre to be approximately where log is the natural logarithm, in the sense that This statement is the prime number theorem. An equivalent statement is where li is the logarithmic integral function. The prime number theorem was first proved in 1896 by Jacques Hadamard and by Charles de la Vallée Poussin independently, using properties of the Riemann zeta function introduced by Riemann in 1859. Proofs of the prime number theorem not using the zeta function or complex analysis were found around 1948 by Atle Selberg and by Paul Erdős (for the most part independently). More precise estimates In 1899, de la Vallée Poussin proved that for some positive constant . Here, is the big notation. More precise estimates of are now known. For example, in 2002, Kevin Ford proved that Mossinghoff and Trudgian proved an explicit upper bound for the difference between and : for . For values of that are not unreasonably large, is greater than . However, is known to change sign infinitely many times. For a discussion of this, see Skewes' number. Exact form For let when is a prime number, and otherwise. Bernhard Riemann, in his work On the Number of Primes Less Than a Given Magnitude, proved that is equal to where is the Möbius function, is the logarithmic integral function, ρ indexes every zero of the Riemann zeta function, and is not evaluated with a branch cut but instead considered as where is the exponential integral. If the trivial zeros are collected and the sum is taken only over the non-trivial zeros ρ of the Riemann zeta function, then may be approximated by The Riemann hypothesis suggests that ev
https://en.wikipedia.org/wiki/Harsh%20Vardhan%20Batra
Harsh Vardhan Batra is an Indian scientist working in animal biotechnology at the Department of Biotechnology (DBT), of the Indian Ministry of Science and Technology. He is a former director of the Defence Food Research Laboratory (DFRL), a Defence Research and Development Organisation (DRDO) establishment at Mysore (April 2012 – Dec 2015). As a specialist in infectious diseases, he participated in the DRDO biodefence preparedness program, and was an expert member of the technical advisory committee on plague constituted by the government of India in September 1994. He served as technical consultant for the design and construction of high containment laboratories for DRDO, the Indian Council for Agricultural Research (ICAR) and Indian Council of Medical Research (ICMR). He participated in the United Nations Biological Weapons Convention (BTWC) ad hoc group meetings in Geneva as a member of the Indian delegation, and conducted World Health Organization (WHO) Southeast Asia Regional Office meetings and workshops on infectious diseases. Education Earned MVSc in Bacteriology and Hygiene (1979) and PhD in Veterinary Public Health and Epidemiology (1985) from Chaudhary Charan Singh Haryana Agricultural University in Hisar. In 1987 he conducted post-doctoral research at the Medical Research Council (MRC) in the Tuberculosis and Related Infections Unit at Hammersmith Hospital in London. Career Senior scientific officer and head of the mycobacteriology laboratory, National Institute of Immunology in New Delhi from 1984 to Nov.1990. Scientist at DRDO in Gwalior from November 1990 to February 2006. Additional Director, DFRL, Mysore from February 2006 to April 2012 and Director from April 2012 to December 2015. He conducted disease outbreak investigations as DRDO Life Sciences team leader during biological emergencies such as: Plague outbreaks at Surat, Gujarat and Beed, Maharashtra August and September 1994. Pneumonic plague in Shimla (Himachal Pradesh), February 2002.
https://en.wikipedia.org/wiki/Timeline%20of%20medicine%20and%20medical%20technology
This is a timeline of the history of medicine and medical technology. Antiquity 3300 BC – During the Stone Age, early doctors used very primitive forms of herbal medicine in India. 3000 BC – Ayurveda The origins of Ayurveda have been traced back to around 3,000 BCE. c. 2600 BC – Imhotep the priest-physician who was later deified as the Egyptian god of medicine. 2500 BC – Iry Egyptian inscription speaks of Iry as eye-doctor of the palace, palace physician of the belly, guardian of the royal bowels, and he who prepares the important medicine (name cannot be translated) and knows the inner juices of the body. 1900–1600 BC Akkadian clay tablets on medicine survive primarily as copies from Ashurbanipal's library at Nineveh. 1800 BC – Code of Hammurabi sets out fees for surgeons and punishments for malpractice 1800 BC – Kahun Gynecological Papyrus 1600 BC – Hearst papyrus, coprotherapy and magic 1551 BC – Ebers Papyrus, coprotherapy and magic 1500 BC – Saffron used as a medicine on the Aegean island of Thera in ancient Greece 1500 BC – Edwin Smith Papyrus, an Egyptian medical text and the oldest known surgical treatise (no true surgery) no magic 1300 BC – Brugsch Papyrus and London Medical Papyrus 1250 BC – Asklepios 9th century – Hesiod reports an ontological conception of disease via the Pandora myth. Disease has a "life" of its own but is of divine origin. 8th century – Homer tells that Polydamna supplied the Greek forces besieging Troy with healing drugs. Homer also tells about battlefield surgery Idomeneus tells Nestor after Machaon had fallen: A surgeon who can cut out an arrow and heal the wound with his ointments is worth a regiment. 700 BC – Cnidos medical school; also one at Cos 500 BC – Darius I orders the restoration of the House of Life (First record of a (much older) medical school) 500 BC – Bian Que becomes the earliest physician known to use acupuncture and pulse diagnosis 500 BC – The Sushruta Samhita is published, laying the framewor
https://en.wikipedia.org/wiki/Plant%20genetic%20resources
Plant genetic resources describe the variability within plants that comes from human and natural selection over millennia. Their intrinsic value mainly concerns agricultural crops (crop biodiversity). According to the 1983 revised International Undertaking on Plant Genetic Resources for Food and Agriculture of the Food and Agriculture Organization (FAO), plant genetic resources are defined as the entire generative and vegetative reproductive material of species with economical and/or social value, especially for the agriculture of the present and the future, with special emphasis on nutritional plants. In the State of the World’s Plant Genetic Resources for Food and Agriculture (1998) the FAO defined Plant Genetic Resources for Food and Agriculture (PGRFA) as the diversity of genetic material contained in traditional varieties and modern cultivars as well as crop wild relatives and other wild plant species that can be used now or in the future for food and agriculture. History The first use of plant genetic resources dates to more than 10,000 years ago, when farmers selected from the genetic variation they found in wild plants to develop their crops. As human populations moved to different climates and ecosystems, taking the crops with them, the crops adapted to the new environments, developing, for example, genetic traits providing tolerance to conditions such as drought, water logging, frost and extreme heat. These traits - and the plasticity inherent in having wide genetic variability - are important properties of plant genetic resources. In recent centuries, although humans had been prolific in collecting exotic flora from all corners of the globe to fill their gardens, it wasn’t until the early 20th century that the widespread and organized collection of plant genetic resources for agricultural use began in earnest. Russian geneticist Nikolai Vavilov, considered by some as the father of plant genetic resources, realized the value of genetic variability for
https://en.wikipedia.org/wiki/Visual%20computing
Visual computing is a generic term for all computer science disciplines dealing with images and 3D models, such as computer graphics, image processing, visualization, computer vision, virtual and augmented reality and video processing. Visual computing also includes aspects of pattern recognition, human computer interaction, machine learning and digital libraries. The core challenges are the acquisition, processing, analysis and rendering of visual information (mainly images and video). Application areas include industrial quality control, medical image processing and visualization, surveying, robotics, multimedia systems, virtual heritage, special effects in movies and television, and computer games. History and overview Visual computing is a fairly new term, which got its current meaning around 2005, when the International Symposium on Visual Computing first convened. Areas of computer technology concerning images, such as image formats, filtering methods, color models, and image metrics, have in common many mathematical methods and algorithms. When computer scientists working in computer science disciplines that involve images, such as computer graphics, image processing, and computer vision, noticed that their methods and applications increasingly overlapped, they began using the term "visual computing" to describe these fields collectively. And also the programming methods on graphics hardware, the manipulation tricks to handle huge data, textbooks and conferences, the scientific communities of these disciplines and working groups at companies intermixed more and more. Furthermore, applications increasingly needed techniques from more than one of these fields concurrently. To generate very detailed models of complex objects you need image recognition, 3D sensors and reconstruction algorithms, and to display these models believably you need realistic rendering techniques with complex lighting simulation. Real-time graphics is the basis for usable virtual and
https://en.wikipedia.org/wiki/Bonnacon
The bonnacon (also called bonasus or bonacho) is a legendary creature described as a bull with inward-curving horns and a horse-like mane. Medieval bestiaries usually depict its fur as reddish-brown or black. Because its horns were useless for self-defense, the bonnacon was said to expel large amounts of caustic feces from its anus at its pursuers, burning them and thereby ensuring its escape. Textual history The first known description of the bonnacon comes from Pliny the Elder's Naturalis Historia: The term is derived from Greek βόνᾱσος (bonasos), meaning "bison". The popularity of the Naturalis Historia in the Middle Ages led to the bonnacon's inclusion in medieval bestiaries. In the tradition of the Physiologus, bestiaries often ascribed moral and scriptural lessons to the descriptions of animals, but the bonnacon gained no such symbolic meaning. Manuscript illustrations of the creature may have served as a source of humor, deriving as much from the reaction of the hunters as from the act of defecation. The Aberdeen Bestiary describes the creature using similar language to Pliny, though the beast's location is moved from Paeonia to Asia: The bonnacon is also mentioned in the life of Saint Martha in the Golden Legend, a 13th-century hagiographical work by Jacobus de Voragine. In the story, Saint Martha encounters and tames the Tarasque, a dragon-like legendary creature said to be the offspring of the biblical Leviathan and the bonnacon. In this account, the bonnacon (here: bonacho or onacho) is said to originate in Galatia.
https://en.wikipedia.org/wiki/Viroporin
Viroporins are small and usually hydrophobic multifunctional viral proteins that modify cellular membranes, thereby facilitating virus release from infected cells. Viroporins are capable of assembling into oligomeric ion channels or pores in the host cell's membrane, rendering it more permeable and thus facilitating the exit of virions from the cell. Many viroporins also have additional effects on cellular metabolism and homeostasis mediated by protein-protein interactions with host cell proteins. Viroporins are not necessarily essential for viral replication, but do enhance growth rates. They are found in a variety of viral genomes but are particularly common in RNA viruses. Many viruses that cause human disease express viroporins. These viruses include hepatitis C virus, HIV-1, influenza A virus, poliovirus, respiratory syncytial virus, and SARS-CoV. Structure Viroporins are usually small - under 100 or 120 amino acid residues - and contain at least one region capable of folding into an amphipathic transmembrane helix. Some examples also contain stretches of basic amino acids, or stretches of aromatic amino acids thought to reside in the interfacial region of the membrane. Oligomers of these proteins, most often tetramers, form ion channels or pores of usually weak ion selectivity that permit diffusion of ions across the cell membrane. The molecular architecture of the pore, its degree of selectivity, the extent to which it incorporates lipids from the surrounding membrane, and the presence of portions of the protein that extend beyond the membrane all vary among viroporins and indicate that these proteins have a diverse array of functional roles. Classification A proposed classification scheme sorts viroporins into four classes based on their topology and orientation in the membrane. Class I viroporins possess a single transmembrane helix; in class IA the C-terminus is oriented into the cytosol and in class IB the N-terminus is so oriented. Class II viroporins
https://en.wikipedia.org/wiki/Mold
A mold () or mould () is one of the structures that certain fungi can form. The dust-like, colored appearance of molds is due to the formation of spores containing fungal secondary metabolites. The spores are the dispersal units of the fungi. Not all fungi form molds. Some fungi form mushrooms; others grow as single cells and are called microfungi (for example yeasts). A large and taxonomically diverse number of fungal species form molds. The growth of hyphae results in discoloration and a fuzzy appearance, especially on food. The network of these tubular branching hyphae, called a mycelium, is considered a single organism. The hyphae are generally transparent, so the mycelium appears like very fine, fluffy white threads over the surface. Cross-walls (septa) may delimit connected compartments along the hyphae, each containing one or multiple, genetically identical nuclei. The dusty texture of many molds is caused by profuse production of asexual spores (conidia) formed by differentiation at the ends of hyphae. The mode of formation and shape of these spores is traditionally used to classify molds. Many of these spores are colored, making the fungus much more obvious to the human eye at this stage in its life-cycle. Molds are considered to be microbes and do not form a specific taxonomic or phylogenetic grouping, but can be found in the divisions Zygomycota and Ascomycota. In the past, most molds were classified within the Deuteromycota. Mold had been used as a common name for now non-fungal groups such as water molds or slime molds that were once considered fungi. Molds cause biodegradation of natural materials, which can be unwanted when it becomes food spoilage or damage to property. They also play important roles in biotechnology and food science in the production of various pigments, foods, beverages, antibiotics, pharmaceuticals and enzymes. Some diseases of animals and humans can be caused by certain molds: disease may result from allergic sensitivity to m
https://en.wikipedia.org/wiki/Maltol
Maltol is a naturally occurring organic compound that is used primarily as a flavor enhancer. It is found in nature in the bark of larch trees and in the needles of pine trees, and is produced during the roasting of malt (from which it gets its name) and in the baking of bread. It has the odor of caramel and is used to impart a pleasant aroma to foods and fragrances. It is used as a flavor enhancer, is designated in the U.S. as INS number 636, and is known in the European E number food additive series as E636. Chemistry Maltol is a white crystalline powder that is soluble in hot water and other polar solvents. Like related 3-hydroxy-4-pyrones such as kojic acid, it binds to hard metal centers such as Fe3+, Ga3+, Al3+, and VO2+. Related to this property, maltol has been reported to greatly increase aluminium uptake in the body and to increase the oral bioavailability of gallium and iron. See also Ethyl maltol Ferric maltol Gallium maltolate 5-Hydroxymaltol Isomaltol
https://en.wikipedia.org/wiki/Apply
In mathematics and computer science, apply is a function that applies a function to arguments. It is central to programming languages derived from lambda calculus, such as LISP and Scheme, and also in functional languages. It has a role in the study of the denotational semantics of computer programs, because it is a continuous function on complete partial orders. Apply is also a continuous function in homotopy theory, and, indeed underpins the entire theory: it allows a homotopy deformation to be viewed as a continuous path in the space of functions. Likewise, valid mutations (refactorings) of computer programs can be seen as those that are "continuous" in the Scott topology. The most general setting for apply is in category theory, where it is right adjoint to currying in closed monoidal categories. A special case of this are the Cartesian closed categories, whose internal language is simply typed lambda calculus. Programming In computer programming, apply applies a function to a list of arguments. Eval and apply are the two interdependent components of the eval-apply cycle, which is the essence of evaluating Lisp, described in SICP. Function application corresponds to beta reduction in lambda calculus. Apply function Apply is also the name of a special function in many languages, which takes a function and a list, and uses the list as the function's own argument list, as if the function were called with the elements of the list as the arguments. This is important in languages with variadic functions, because this is the only way to call a function with an indeterminate (at compile time) number of arguments. Common Lisp and Scheme In Common Lisp apply is a function that applies a function to a list of arguments (note here that "+" is a variadic function that takes any number of arguments): (apply #'+ (list 1 2)) Similarly in Scheme: (apply + (list 1 2)) C++ In C++, Bind is used either via the std namespace or via the boost namespace. C# and Java In C# an
https://en.wikipedia.org/wiki/BCL10
B-cell lymphoma/leukemia 10 is a protein that in humans is encoded by the BCL10 gene. Like BCL2, BCL3, BCL5, BCL6, BCL7A, and BCL9, it has clinical significance in lymphoma. Function Bcl10 was identified by its translocation in a case of mucosa-associated lymphoid tissue (MALT) lymphoma. The protein encoded by this gene contains a caspase recruitment domain (CARD), and has been shown to activate NF-κB. This protein is reported to interact with other CARD and coiled coil domain containing proteins including CARD9, -10, -11 and -14, which are thought to function as upstream regulators in NF-κB signaling. This protein is found to form a complex with the paracaspase MALT1, a protein encoded by another gene known to be translocated in MALT lymphoma. MALT1 and Bcl10 thought to synergize in the activation of NF-κB, and the deregulation of either of them may contribute to the same pathogenetic process that leads to the malignancy. Bcl10 is evolutionary conserved since cnidaria and has been shown to be functionally conserved all the way back to zebrafish. Notably, just like the upstream CARD-CC family, Bcl10 is absent in insects and nematodes, and the correlated phylogenetic distribution of Bcl10 and CARD-CC proteins indicate a conserved complex. Interactions BCL10 has been shown to interact with: CARD10, CARD11, CARD14, CARD9 CRADD, IKBKG, MALT1, and TRAF2.
https://en.wikipedia.org/wiki/Cray%20J90
The Cray J90 series (code-named Jedi during development) was an air-cooled vector processor supercomputer first sold by Cray Research in 1994. The J90 evolved from the Cray Y-MP EL minisupercomputer, and is compatible with Y-MP software, running the same UNICOS operating system. The J90 supported up to 32 CMOS processors with a 10 ns (100 MHz) clock. It supported up to 4 GB of main memory and up to 48 GB/s of memory bandwidth, giving it considerably less performance than the contemporary Cray T90, but making it a strong competitor to other technical computers in its price range. All input/output in a J90 system was handled by an IOS (Input/Output Subsystem) called IOS Model V. The IOS-V was based on the VME64 bus and SPARC I/O processors (IOPs) running the VxWorks RTOS. The IOS was programmed to emulate the IOS Model E, used in the larger Cray Y-MP systems, in order to minimize changes in the UNICOS operating system. By using standard VME boards, a wide variety of commodity peripherals could be used. The J90 was available in three basic configurations, the J98 with up to eight processors, the J916 with up to 16 processors, and the J932 with up to 32 processors. Each J90 processor was composed of two chips - one for the scalar portion of the processor, and the other for the vector portion. The scalar chip was also notable for including a small (128 word) data cache to enhance scalar performance. (Cray machines have always had instruction caching.) In 1997 the J90se (Scalar Enhanced) series became available, which doubled the scalar speed of the processors to 200 MHz; the vector chip remained at 100 MHz. Support was also added for the GigaRing I/O system found on the Cray T3E and Cray SV1, replacing IOS-V. Later, SV1 processors could be installed in a J90 or J90se, further increasing performance within the same frame. External links Fred Gannett's Cray FAQ J90 at top500.org Computer-related introductions in 1994 J90 Vector supercomputers
https://en.wikipedia.org/wiki/OSIAN
OSIAN, or Open Source IPv6 Automation Network, is a free and open-source implementation of IPv6 networking for wireless sensor networks (WSNs). OSIAN extends TinyOS, which started as a collaboration between the University of California, Berkeley in co-operation with Intel Research and Crossbow Technology, and has since grown to be an international consortium, the TinyOS Alliance. OSIAN brings direct Internet-connectivity to smartdust technology. Design Architecturally, OSIAN treats TinyOS as the underlying operating system providing hardware drivers, while OSIAN itself adds Internet networking capabilities. Users are able to download and install OSIAN-enabled firmware to their embedded hardware, form a PPP connection with their computer, and communicate raw IPv6 UDP to other wireless sensors from their favorite programming language on their computer. OSIAN is developed using a style very much like the development of Linux, which requires peer reviews and unit testing before any code moves into core repositories. Platforms OSIAN is designed for deeply embedded systems with very small amounts of memory. One primary platform contains a TI MSP430-based CC430 system-on-a-chip, which contains 32 kB ROM and 4 kB RAM. See also TinyOS Contiki 6LoWPAN External links SuRF Developer Kit supporting OSIAN Wireless sensor network Embedded systems
https://en.wikipedia.org/wiki/N-body%20units
N-body units are a completely self-contained system of units used for N-body simulations of self-gravitating systems in astrophysics. In this system, the base physical units are chosen so that the total mass, M, the gravitational constant, G, and the virial radius, R, are normalized. The underlying assumption is that the system of N objects (stars) satisfies the virial theorem. The consequence of standard N-body units is that the velocity dispersion of the system, v, is and that the dynamical or crossing time, t, is . The use of standard N-body units was advocated by Michel Hénon in 1971. Early adopters of this system of units included H. Cohn in 1979 and D. Heggie and R. Mathieu in 1986. At the conference MODEST14 in 2014, D. Heggie proposed that the community abandon the name "N-body units" and replace it with the name "Hénon units" to commemorate the originator.
https://en.wikipedia.org/wiki/HPO%20formalism
The history projection operator (HPO) formalism is an approach to temporal quantum logic developed by Chris Isham. It deals with the logical structure of quantum mechanical propositions asserted at different points in time. Introduction In standard quantum mechanics a physical system is associated with a Hilbert space . States of the system at a fixed time are represented by normalised vectors in the space and physical observables are represented by Hermitian operators on . A physical proposition about the system at a fixed time can be represented by an orthogonal projection operator on (See quantum logic). This representation links together the lattice operations in the lattice of logical propositions and the lattice of projection operators on a Hilbert space (See quantum logic). The HPO formalism is a natural extension of these ideas to propositions about the system that are concerned with more than one time. History propositions Homogeneous histories A homogeneous history proposition is a sequence of single-time propositions specified at different times . These times are called the temporal support of the history. We shall denote the proposition as and read it as " at time is true and then at time is true and then and then at time is true" Inhomogeneous histories Not all history propositions can be represented by a sequence of single-time propositions at different times. These are called inhomogeneous history propositions. An example is the proposition OR for two homogeneous histories . History projection operators The key observation of the HPO formalism is to represent history propositions by projection operators on a history Hilbert space. This is where the name "History Projection Operator" (HPO) comes from. For a homogeneous history we can use the tensor product to define a projector where is the projection operator on that represents the proposition at time . This is a projection operator on the tensor product "history
https://en.wikipedia.org/wiki/Copying%20network%20models
Copying network models are network generation models that use a copying mechanism to form a network, by repeatedly duplicating and mutating existing nodes of the network. Such a network model has first been proposed in 1999 to explain the network of links between web pages, but since has been used to model biological and citation networks as well. Origins In 1999 Jon Kleinberg and 3 co-authors published an article to Computing and combinatorics attempting to construct a network model that explains patterns found in an analysis of the World Wide Web. The intuition behind the model was that when a user decides to build and publish her own web page, she encounters a list of links for her topic of interest on the web and ends up copying this collection, or many such collections to her own web page. This creating a new node in the network - the new page - and copying edges from already existing nodes in some fashion. They outlined a model very generally, but didn't analyse the predictions of an exact model in detail, mostly due to computational limitations, but suggested that copying nodes randomly is a simple, model worthy mechanism for creating Zipfian distribution networks. This paper since, has been cited over 1200 times, which is a number comparable to significant papers contributing to network science, like the one describing the Erdős–Rényi model (about 8300) and includes notable network science books like Mark Newman's. Description General model To understand a general model, take a basic network growth model, which is characterized by four stochastic processes. Creation processes and for node- and edge-creation, and deletion processes and for node- and edge-deletion. Take a discrete time timeframe, where consists of simply at each step, creating a node with probability , and similarly is deleting a node with probability ad(t). Consequently, this also means includes removing all edges that belonged to a node that was removed. is where the essenc
https://en.wikipedia.org/wiki/Const%20%28computer%20programming%29
In some programming languages, const is a type qualifier (a keyword applied to a data type) that indicates that the data is read-only. While this can be used to declare constants, in the C family of languages differs from similar constructs in other languages in being part of the type, and thus has complicated behavior when combined with pointers, references, composite data types, and type-checking. In other languages, the data is not in a single memory location, but copied at compile time on each use. Languages which use it include C, C++, D, JavaScript, Julia, and Rust. Introduction When applied in an object declaration, it indicates that the object is a constant: its value may not be changed, unlike a variable. This basic use – to declare constants – has parallels in many other languages. However, unlike in other languages, in the C family of languages the const is part of the type, not part of the object. For example, in C, declares an object x of int const type – the const is part of the type, as if it were parsed "(int const) x" – while in Ada, declares a constant (a kind of object) X of INTEGER type: the constant is part of the object, but not part of the type. This has two subtle results. Firstly, const can be applied to parts of a more complex type – for example, int const * const x; declares a constant pointer to a constant integer, while int const * x; declares a variable pointer to a constant integer, and int * const x; declares a constant pointer to a variable integer. Secondly, because const is part of the type, it must match as part of type-checking. For example, the following code is invalid: void f(int& x); // ... int const i; f(i); because the argument to f must be a variable integer, but i is a constant integer. This matching is a form of program correctness, and is known as const-correctness. This allows a form of programming by contract, where functions specify as part of their type signature whether they modify their arguments or not, an
https://en.wikipedia.org/wiki/Schoenberg%20hexachord
6-Z44 (012569), known as the Schoenberg hexachord, is Arnold Schoenberg's signature hexachord, as one transposition contains the pitches [A], Es, C, H, B, E, G (A. Schoenberg), E, B, and B being Es, H, and B in German. Its Z-related hexachord and complement is 6-Z19 (3478te or, in prime form, 013478). They have the interval vector of <3,1,3,4,3,1> in common. 6-Z44 lacks prime and inversional combinatoriality. 6-Z44 contains set 3-3 twice and set 3-4 twice. Set 7-22 contains 6-Z44 twice and 6-Z19 twice. Schoenberg used the hexachord in the song "Seraphita" (op. 22 no. 1) and the monodrama Die glückliche Hand. 6-Z44 is associated with the character Hauptmann in Alban Berg's Wozzeck. Each movement of Berg's 1913 Four Pieces for Clarinet and Piano (op. 5) begins with a statement of 6-Z44 or 6-Z19. John Weinzweig uses two minor triads a semitone apart, 6-Z19, and their complement, 6-Z44, in an aggregate chord at the end of "City of Brass" from Wine of Peace as well as in the tone row for his Piano Concerto. 6-Z44 is one of the "fundamental harmonies in the last movement," of Igor Stravinsky's The Rite of Spring, "Sacrificial Dance". See also Musical cryptogram Sacher hexachord
https://en.wikipedia.org/wiki/Z-order%20curve
In mathematical analysis and computer science, functions which are Z-order, Lebesgue curve, Morton space-filling curve, Morton order or Morton code map multidimensional data to one dimension while preserving locality of the data points. It is named in France after Henri Lebesgue, who studied it in 1904, and named in the United States after Guy Macdonald Morton, who first applied the order to file sequencing in 1966. The z-value of a point in multidimensions is simply calculated by interleaving the binary representations of its coordinate values. Once the data are sorted into this ordering, any one-dimensional data structure can be used, such as simple one dimensional arrays, binary search trees, B-trees, skip lists or (with low significant bits truncated) hash tables. The resulting ordering can equivalently be described as the order one would get from a depth-first traversal of a quadtree or octree. Coordinate values The figure below shows the Z-values for the two dimensional case with integer coordinates 0 ≤ x ≤ 7, 0 ≤ y ≤ 7 (shown both in decimal and binary). Interleaving the binary coordinate values (starting to the right with the x-bit (in blue) and alternating to the left with the y-bit (in red)) yields the binary z-values (tilted by 45° as shown). Connecting the z-values in their numerical order produces the recursively Z-shaped curve. Two-dimensional Z-values are also known as quadkey values. The Z-values of the x coordinates are described as binary numbers from the Moser–de Bruijn sequence, having nonzero bits only in their even positions: x[] = {0b000000, 0b000001, 0b000100, 0b000101, 0b010000, 0b010001, 0b010100, 0b010101} The sum and difference of two x values are calculated by using bitwise operations: x[i+j] = ((x[i] | 0b10101010) + x[j]) & 0b01010101 x[i−j] = ((x[i] & 0b01010101) − x[j]) & 0b01010101 if i ≥ j This property can be used to offset a Z-value, for example in two dimensions the coordinates to the top (decreasing y), bottom (increasi
https://en.wikipedia.org/wiki/Millennial%20pause
The millennial pause is a pause in speaking that is present at the start of some recorded videos, especially on short-form video app TikTok. The practice of including such a pause is generally ascribed to millennials, a group often defined to include people born in the 1980s or 1990s. The phenomenon is an example of the digital generation gap between millennials and younger generations. Observation The practice was first observed as early as 1 March 2021, when a TikTok user questioned "why [millennials] pause so long before speaking", and mentioned that they should "hit record and GO". The term "millennial pause" is attributed to TikTok user nisipisa, a millennial who posted a TikTok video on 26 November 2021, pointing out that Taylor Swift, a millennial singer, includes such pauses at the start of her videos. Kathryn Lindsay of The Atlantic, a millennial herself, stated that this pause is becoming more noticeable as short-form videos are becoming more prevalent on social network Instagram, instant messaging app Snapchat, and online video platform YouTube. Videos by people other than millennials have also been described as exhibiting a millennial pause; Parade reported that singer JC Chasez included one in his TikTok debut video, and James Factora of Them mentioned how actress Jennifer Coolidge included one in "a perfect TikTok" during her debut. Theory It has been conjectured that the reason why people older than zoomers tend to include a pause at the start of their videos is to make sure that the device they are using is actually recording before beginning to say anything. In contrast, younger users are said to trust that the devices are working correctly, and begin speaking immediately after the recording begins. Another theory for the pause's prevalence is that the habit may have first been adopted when earlier recording devices commonly took a split second before beginning to record. Although newer devices do not exhibit the same delay, this habit
https://en.wikipedia.org/wiki/Animal%20echolocation
Echolocation, also called bio sonar, is a biological sonar used by several animal groups, both in the air and underwater. Echolocating animals emit calls and listen to the echoes of those calls that return from various objects near them. They use these echoes to locate and identify the objects. Echolocation is used for navigation, foraging, and hunting prey. Echolocation calls can be frequency modulated (FM, varying in pitch during the call) or constant frequency (CF). FM offers precise range discrimination to localize the prey, at the cost of reduced operational range. CF allows both the prey's velocity and its movements to be detected by means of the Doppler effect. FM may be best for close, cluttered environments, while CF may be better in open environments or for hunting while perched. Echolocating animals include mammals, especially odontocetes (toothed whales) and some bat species, and, using simpler forms, species in other groups such as shrews. A few bird species in two cave-dwelling bird groups echolocate, namely cave swiftlets and the oilbird. Some prey animals that are hunted by echolocating bats take active countermeasures to avoid capture. These include predator avoidance, attack deflection, and the use of ultrasonic clicks which most likely function as warnings rather than as echolocation jamming. Early research The term echolocation was coined by 1944 by the American zoologist Donald Griffin, who, with Robert Galambos, first demonstrated the phenomenon in bats. As Griffin described in his book, the 18th century Italian scientist Lazzaro Spallanzani had, by means of a series of elaborate experiments, concluded that when bats fly at night, they rely on some sense besides vision, but he did not discover that the other sense was hearing. The Swiss physician and naturalist Louis Jurine repeated Spallanzani's experiments (using different species of bat), and concluded that when bats hunt at night, they rely on hearing. In 1908, Walter Louis Hahn conf
https://en.wikipedia.org/wiki/Email%20bomb
On Internet usage, an email bomb is a form of net abuse that sends large volumes of email to an address to overflow the mailbox, overwhelm the server where the email address is hosted in a denial-of-service attack (DoS attack) or as a smoke screen to distract the attention from important email messages indicating a security breach. Methods There are three methods of perpetrating an email bomb: mass mailing, list linking and zip bombing. Mass mailing Mass mailing consists of sending numerous duplicate emails to the same email address. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected by spam filters. Email-bombing using mass mailing is also commonly performed as a DDoS attack by employing the use of "zombies" botnets; hierarchical networks of computers compromised by malware and under the attacker's control. Similar to their use in spamming, the attacker instructs the botnet to send out millions of emails, but unlike normal botnet spamming, the emails are all addressed to only one or a few addresses the attacker wishes to flood. This form of email bombing is similar to other DDoS flooding attacks. As the targets are frequently the dedicated hosts handling website and email accounts of a business, this type of attack can be devastating to both services of the host. This type of attack is more difficult to defend against than a simple mass-mailing bomb because of the multiple source addresses and the possibility of each zombie computer sending a different message or employing stealth techniques to defeat spam filters. List linking List linking, also known as "email cluster bomb", means signing a particular email address up to several email list subscriptions. The victim then has to unsubscribe from these unwanted services manually. The attack can be carried out automatically with simple scripts: this is easy, almost impossible to trace back to the perpetrator, and potentially very destructive. A massive
https://en.wikipedia.org/wiki/DNA%E2%80%93DNA%20hybridization
In genomics, DNA–DNA hybridization is a molecular biology technique that measures the degree of genetic similarity between pools of DNA sequences. It is usually used to determine the genetic distance between two organisms and has been used extensively in phylogeny and taxonomy. Method The DNA of one organism is labelled, then mixed with the unlabelled DNA to be compared against. The mixture is incubated to allow DNA strands to dissociate and then cooled to form renewed hybrid double-stranded DNA. Hybridized sequences with a high degree of similarity will bind more firmly, and require more energy to separate them: i.e. they separate when heated at a higher temperature than dissimilar sequences, a process known as "DNA melting". To assess the melting profile of the hybridized DNA, the double-stranded DNA is bound to a column or filter and the mixture is heated in small steps. At each step, the column or filter is washed; sequences that melt become single-stranded and wash off. The temperatures at which labelled DNA comes off reflects the amount of similarity between sequences (and the self-hybridization sample serves as a control). These results are combined to determine the degree of genetic similarity between organisms. One method was introduced for hybridizing large numbers of DNA samples against large numbers of DNA probes on a single membrane. These samples would have to be separated in their own lanes inside the membranes and then the membrane would have to be rotated to a different angle where it would result in simultaneous hybridization with many different DNA probes. Uses When several species are compared, similarity values allow organisms to be arranged in a phylogenetic tree; it is therefore one possible approach to carrying out molecular systematics. In microbiology DNA–DNA hybridization (DDH) is used as a primary method to distinguish bacterial species as it is difficult to visually classify them accurately. This technique is not widely used on
https://en.wikipedia.org/wiki/SCALD
The structured computer-aided logic design (SCALD) software was a computer aided design system developed for building the S-1 computer. It used the Stanford University Drawing System (SUDS), and it was developed by Thomas M. McWilliams and Lawrence Curtis Widdoes, Jr. The work led to the start of the Valid Logic Systems company (briefly known as SCALD Corporation) in 1981, which was purchased by Cadence Design in 1991. McWilliams and Widdoes won the W. Wallace McDowell Award in 1984 for the SCALD methodology. See also Static timing analysis
https://en.wikipedia.org/wiki/Son%20of%20Man%20%28novel%29
Son of Man is a science fiction novel by American writer Robert Silverberg, published in 1971. The book is about Clay, a 20th-century man, who travels billions of years into the future and meets humanity in its future forms. Some of the issues discussed in the book are sexuality, telepathic communication between people, physical prowess or frailty, division of humans by caste or ability, and the preservation of ancient wisdom, among other things. Reception Norman Spinrad has described it as "brilliant". Matt Hughes considers it "an artifact of its period, a remarkable, heady, head-trippy plunge into a new way of writing sf, and into a new way of thinking", but notes that because Silverberg is addressing "the timeless questions -- what are we? where do we come from? where are we going?", the book has not become "stale and musty".
https://en.wikipedia.org/wiki/Cabrito
Cabrito () is the name in both Spanish and Portuguese for roast goat kid in various Iberian and Latin American cuisines. Argentina Cabrito is also a regional specialty of Córdoba Province in Argentina, especially the town of Quilino, which has a festival in its honour. "Chivito" differs from "cabrito" in that chivito is a slightly older animal with less tender meat. The chivito has already begun to eat solid foods, whereas the cabrito is still a suckling. Mexico It is a regional specialty of the city of Monterrey, Mexico, and the surrounding state of Nuevo Leon, based on the Jewish cuisine of the founders of the city. In northern Mexico, cabrito is cooked in a variety of ways: Cabrito al pastor: The best-known and perhaps most popular form. The whole carcass is opened flat and impaled on a spit. The spit is then placed next to a bed of glowing embers and roasted slowly in the open air without seasonings other than the light scent it will absorb from the slow-burning charcoal. Cabrito al horno (oven-roasted cabrito): Toasted slowly in an oven at low temperatures. A number of variants of this preparation have emerged, including some very elaborate processes that involve applying seasonings and covering the cooking meat at specific times to produce a tasty and juicy treat. Cabrito en salsa (cabrito in sauce): The animal is cut into portions, browned in oil and braised in a tomato-based sauce with onions, garlic and green chilies, and other seasonings until tender. Cabrito en sangre (cabrito in blood), sometimes fritada de cabrito: A less common preparation in which the blood of the animal is collected when it is slaughtered and it becomes the basis for the sauce that the goat is braised in, along with the animal's liver, kidneys, and heart, and other seasonings. The end product is tender cabrito in a rich, very dark sauce. Portugal and Brazil In Portuguese, the name cabrito is used for a goat kid (not just roasted) in Northeast Region, Brazil, especially in th
https://en.wikipedia.org/wiki/Shuga%20%28ice%29
Shuga is a spongy, porridgy body of ice suspended in water. It may be formed from grease ice or from anchor ice rising to the surface and typically comprises lumps of ice, a few centimeters across. Shuga is the third stage in the development of sea ice, formed as a result of snow falling on frazil ice to become grease ice which is then further worked by subsequent wind and wave action. As cooling continues, the next stage is reached when sheets of rind or nilas ice emerge. Shuga may also occur in freshwater situations.
https://en.wikipedia.org/wiki/Isoamyl%20acetate
Isoamyl acetate, also known as isopentyl acetate, is an organic compound that is the ester formed from isoamyl alcohol and acetic acid, with the molecular formula C7H14O2. It is a colorless liquid that is only slightly soluble in water, but very soluble in most organic solvents. Isoamyl acetate has a strong odor which is described as similar to both banana and pear. Pure isoamyl acetate, or mixtures of isoamyl acetate, amyl acetate, and other flavors in ethanol may be referred to as banana oil or pear oil. Production Isoamyl acetate is prepared by the acid catalyzed reaction (Fischer esterification) between isoamyl alcohol and glacial acetic acid as shown in the reaction equation below. Typically, sulfuric acid is used as the catalyst. Alternatively, p-toluenesulfonic acid or an acidic ion exchange resin can be used as the catalyst. It is also produced synthetically by the rectification of amyl acetate. Applications Isoamyl acetate is used to confer banana or pear flavor in foods such as circus peanuts, Juicy Fruit and pear drops. Banana oil and pear oil commonly refer to a solution of isoamyl acetate in ethanol that is used as an artificial flavor. It is also used as a solvent for some varnishes, oil paints, and nitrocellulose lacquers. As a solvent and carrier for materials such as nitrocellulose, it was extensively used in the aircraft industry for stiffening and wind-proofing fabric flying surfaces, where it and its derivatives were generally known as 'aircraft dope'. Now that most aircraft wings are made of metal, such use is mostly limited to historically accurate reproductions and scale models. Because of its intense, pleasant odor and its low toxicity, isoamyl acetate is used to test the effectiveness of respirators or gas masks. Occurrence in nature Isoamyl acetate occurs naturally in many plants, including apple, banana, coffee, grape, guava, lychee, papaya, peach, pomegranate, and tomato. It is also released by fermentation processes, including t
https://en.wikipedia.org/wiki/Tartar%20Guided%20Missile%20Fire%20Control%20System
The Tartar Guided Missile Fire Control System is an air defense system developed by the United States Navy to defend warships from air attack. Since its introduction the system has been improved and sold to several United States allies. Description The Tartar Guided Missile Fire Control System is a component of the overall Tartar Weapons System. It consists of the target illuminators and associated computer systems needed to fire a missile once a target has been identified. It operates in conjunction with the weapon direction systems (WDS), the ship's long-range air search radars, and the guided missile launch system (GMLS) to engage air targets. The Tartar FCS receives target designation information from the WDS. The system then acquires and tracks the target, positions the missile launcher, programs the missile with intercept data, and lets the WDS know that it is ready to fire. Once the missile is fired, the FCS provides CW illumination of the target and postfiring evaluation. There are two major families of Tartar FCS: the Mk. 74 and the Mk. 92. The latter is used on the and the former is used everywhere else. Each Mk 74 includes the AN/SPG-51, a director Mk 73, a computer system, and associated consoles. The Mk. 92 contains a combined antenna system (CAS), a separate track illumination radar (STIR), weapon control consoles, a computer complex, and ancillary equipment. Deployment It was installed on numerous US cruiser and destroyers in the 1960s through early 1990s such as the s, s, s and the s. It is also in use in other countries such as the fleet escorts of the French Navy Kersaint, Bouvet, Du Chayla and Dupetit-Thouars, and was also in use on and . RIM-66B Standard Starting in the middle 1960s a new family of guided missiles referred to as the Standard missiles were developed to replace the poor performing missiles used by existing fire control systems. The RIM-66A/B Standard replaced the earlier RIM-24C Tartar used by the system. The new missile m
https://en.wikipedia.org/wiki/Abstract%20cell%20complex
In mathematics, an abstract cell complex is an abstract set with Alexandrov topology in which a non-negative integer number called dimension is assigned to each point. The complex is called “abstract” since its points, which are called “cells”, are not subsets of a Hausdorff space as is the case in Euclidean and CW complexes. Abstract cell complexes play an important role in image analysis and computer graphics. History The idea of abstract cell complexes (also named abstract cellular complexes) relates to J. Listing (1862) and E. Steinitz (1908). Also A.W Tucker (1933), K. Reidemeister (1938), P.S. Aleksandrov (1956) as well as R. Klette and A. Rosenfeld (2004) have described abstract cell complexes. E. Steinitz has defined an abstract cell complex as where E is an abstract set, B is an asymmetric, irreflexive and transitive binary relation called the bounding relation among the elements of E and dim is a function assigning a non-negative integer to each element of E in such a way that if , then . V. Kovalevsky (1989) described abstract cell complexes for 3D and higher dimensions. He also suggested numerous applications to image analysis. In his book (2008) he has suggested an axiomatic theory of locally finite topological spaces which are generalization of abstract cell complexes. The book contains among others new definitions of topological balls and spheres independent of metric, a new definition of combinatorial manifolds and many algorithms useful for image analysis. Basic results The topology of abstract cell complexes is based on a partial order in the set of its points or cells. The notion of the abstract cell complex defined by E. Steinitz is related to the notion of an abstract simplicial complex and it differs from a simplicial complex by the property that its elements are no simplices: An n-dimensional element of an abstract complexes must not have n+1 zero-dimensional sides, and not each subset of the set of zero-dimensional sides of a cell
https://en.wikipedia.org/wiki/Chemical%20genetics
Chemical genetics is the investigation of the function of proteins and signal transduction pathways in cells by the screening of chemical libraries of small molecules. Chemical genetics is analogous to classical genetic screen where random mutations are introduced in organisms, the phenotype of these mutants is observed, and finally the specific gene mutation (genotype) that produced that phenotype is identified. In chemical genetics, the phenotype is disturbed not by introduction of mutations, but by exposure to small molecule tool compounds. Phenotypic screening of chemical libraries is used to identify drug targets (forward genetics or chemoproteomics) or to validate those targets in experimental models of disease (reverse genetics). Recent applications of this topic have been implicated in signal transduction, which may play a role in discovering new cancer treatments. Chemical genetics can serve as a unifying study between chemistry and biology. The approach was first proposed by Tim Mitchison in 1994 in an opinion piece in the journal Chemistry & Biology entitled "Towards a pharmacological genetics". Method Chemical genetic screens are performed using libraries of small molecules that have known activities or simply diverse chemical structures. These screens can be done in a high-throughput mode, using 96 well-plates, where each well contains cells treated with a unique compound. In addition to cells, Xenopus or zebrafish embryos can also be screened in 96 well format where compounds are dissolved in the media in which embryos grow. Embryos are developed until the stage of interest and then the phenotype can be analyzed. Several concentrations can be tested in order to determine the toxic and the optimal concentrations. Applications Adding compounds to developing embryos allow comprehension of mechanism of action of drugs, their toxicity and developmental processes involving their targets. Chemical screens have been mostly performed on either wild type
https://en.wikipedia.org/wiki/Mathematica%20Applicanda
Mathematica Applicanda is a peer-reviewed scientific journal covering applied mathematics. It was established in 1973 by the Polish Mathematical Society as Series III of the Annales Societatis Mathematicae Polonae, under the name Matematyka Stosowana (ISSN 0137-2890). The first editor-in-chief was Marceli Stark. In 1999 the journal was renamed Matematyka Stosowana-Matematyka dla Społeczeństwa (ISSN 1730-2668 ). Since 2012 its main issue is the electronic one with the name Mathematica Applicanda with ISSN 2299-4009. Former Editors-in-chief Marceli Stark (volume I) Robert Bartoszyński (volumes II - XXIX) Andrzej Kiełbasiński (volumes XXX - XLI) Witold Kosiński (volumes XLII - LIV) Krzysztof J. Szajowski (volumes LV - LXIII) Krzysztof Burnecki (volume LXIV) Abstracting and indexing The journal is abstracted and indexed in MathSciNet Zentralblatt MATH CEON The Library of Science (Biblioteka Nauki) BazTech Scopus See also List of mathematical physics journals List of probability journals List of statistics journals
https://en.wikipedia.org/wiki/208%20%28number%29
208 (two hundred [and] eight) is the natural number following 207 and preceding 209. 208 is a practical number, a tetranacci number, a rhombic matchstick number, a happy number, and a member of Aronson's sequence. There are exactly 208 five-bead necklaces drawn from a set of beads with four colors, and 208 generalized weak orders on three labeled points.
https://en.wikipedia.org/wiki/Metlife%20Foundation%20Award%20for%20Medical%20Research%20in%20Alzheimer%27s%20Disease
The Metlife Foundation Award for Medical Research in Alzheimer's Disease were awarded annually from 1986 to 2016 to recognize scientific contributions toward a better understanding of the underlying causes, prevention, and treatments of Alzheimer's disease. The awards were endowed by the Metlife Foundation and administered by The American Federation for Aging Research. Each of the winners received a personal award of US$50,000 and US$200,000 in research funds to further their research. Recipients Source: See also List of medicine awards List of neuroscience awards
https://en.wikipedia.org/wiki/Rank%20%28computer%20programming%29
In computer programming, rank with no further specifications is usually a synonym for (or refers to) "number of dimensions"; thus, a two-dimensional array has rank two, a three-dimensional array has rank three and so on. Strictly, no formal definition can be provided which applies to every programming language, since each of them has its own concepts, semantics and terminology; the term may not even be applicable or, to the contrary, applied with a very specific meaning in the context of a given language. In the case of APL the notion applies to every operand; and dyads ("binary functions") have a left rank and a right rank. The box below instead shows how rank of a type and rank of an array expression could be defined (in a semi-formal style) for C++ and illustrates a simple way to calculate them at compile time. #include <type_traits> #include <cstddef> /* Rank of a type * ------------- * * Let the rank of a type T be the number of its dimensions if * it is an array; zero otherwise (which is the usual convention) */ template <typename T> struct rank { static const std::size_t value = 0; }; template<typename T, std::size_t N> struct rank<T[N]> { static const std::size_t value = 1 + rank<T>::value; }; template <typename T> constexpr auto rank_v = rank<T>::value; /* Rank of an expression * * Let the rank of an expression be the rank of its type */ template <typename T> using unqualified_t = std::remove_cv_t<std::remove_reference_t<T>>; template <typename T> auto rankof(T&& expr) { return rank_v<unqualified_t<T>>; } Given the code above the rank of a type T can be calculated at compile time by rank<T>::value or the shorter form rank_v<T> Calculating the rank of an expression can be done using rankof(expr) See also Rank (linear algebra), for a definition of rank as applied to matrices Rank (J programming language), a concept of the same name in the J programming language Arrays Programming language topics
https://en.wikipedia.org/wiki/Certificate%20policy
A certificate policy (CP) is a document which aims to state what are the different entities of a public key infrastructure (PKI), their roles and their duties. This document is published in the PKI perimeter. When in use with X.509 certificates, a specific field can be set to include a link to the associated certificate policy. Thus, during an exchange, any relying party has an access to the assurance level associated with the certificate, and can decide on the level of trust to put in the certificate. RFC 3647 The reference document for writing a certificate policy is, , . The RFC proposes a framework for the writing of certificate policies and Certification Practice Statements (CPS). The points described below are based on the framework presented in the RFC. Main points Architecture The document should describe the general architecture of the related PKI, present the different entities of the PKI and any exchange based on certificates issued by this very same PKI. Certificate uses An important point of the certificate policy is the description of the authorized and prohibited certificate uses. When a certificate is issued, it can be stated in its attributes what use cases it is intended to fulfill. For example, a certificate can be issued for digital signature of e-mail (aka S/MIME), encryption of data, authentication (e.g. of a Web server, as when one uses HTTPS) or further issuance of certificates (delegation of authority). Prohibited uses are specified in the same way. Naming, identification and authentication The document also describes how certificates names are to be chosen, and besides, the associated needs for identification and authentication. When a certification application is filled, the certification authority (or, by delegation, the registration authority) is in charge of checking the information provided by the applicant, such as his identity. This is to make sure that the CA does not take part in an identity theft. Key generation The ge
https://en.wikipedia.org/wiki/Venom%20optimization%20hypothesis
Venom optimization hypothesis, also known as venom metering, is a biological hypothesis which postulates that venomous animals have physiological control over their production and use of venoms. It explains the economic use of venom because venom is a metabolically expensive product, and that there is a biological mechanism for controlling their specific use. The hypothetical concept was proposed by Esther Wigger, Lucia Kuhn-Nentwig, and Wolfgang Nentwig of the Zoological Institute at the University of Bern, Switzerland, in 2002. A number of venomous animals have been experimentally found to regulate the amount of venom they use during predation or defensive situations. Species of anemones, jellyfish, ants, scorpions, spiders, and snakes are found to use their venoms frugally depending on the situation and size of their preys or predators. Development Venom optimization hypothesis was postulated by Wigger, Kuhn-Nentwig, and Nentwig from their studies of the amount of venom used by a wandering spider Cupiennius salei. This spider produces a neurotoxic peptide called CsTx-1 for paralysing its prey. It does not weave webs for trapping preys, and therefore, entirely depends on its venom for predation. It is known to prey on a variety of insects including butterflies, moths, earwigs, cockroaches, flies and grasshoppers. Its venom glands store only about 10 μl of crude venom. Refilling of the glands takes 2–3 days and the lethal efficacy of the venom is, initially, very low for several days, requiring 8 to 18 days for full effect. It was found that the amount of venom released differed for each specific prey. For example, for bigger and stronger insects like beetles, the spider uses the entire amount of its venom; while for small ones, it uses only a small amount, thus economizing its costly venom. In fact, experiments show that the amount of venom released is just sufficient (at the lethal dose) to paralyze the target organism depending on the size or strength, and is
https://en.wikipedia.org/wiki/Banana%20flour
Banana flour is a powder traditionally made of green bananas. Historically, banana flour has been used in Africa and Jamaica as a cheaper alternative to wheat flour. It is now often used as a gluten-free replacement for wheat flours or as a source of resistant starch, which has been promoted by certain dieting trends such as paleo and primal diets and by some recent nutritional research. Banana flour, due to the use of green bananas, has a very mild banana flavor raw, and when cooked, it has an earthy, nonbanana flavor; it also has a texture reminiscent of lighter wheat flours and requires about 25% less volume, making it a good replacement for white and white whole-wheat flour. Production methods Banana flour is generally produced with green bananas that are peeled, chopped, dried, and then ground. This process can be completed traditionally by hand, where the bananas are sun dried, dried in an oven, or a residential food dryer, and then either ground in a mortar and pestle or with a mechanical grinder. The green banana process requires 8–10 kg of raw green bananas to produce 1 kg of banana flour. In recent years, large scale commercial production has begun in Africa and South America using the same basic methodology. Chile has been developing an alternative method of banana flour production using ripe banana waste. Chilean researchers have developed a process that uses over-ripe banana peels to add dietary fiber to the ripe banana fruit, which does not have the resistant starch properties of green bananas. Banana powder is made from dried and ground fully ripened banana puree and thus does not have the fiber of banana peel flour content nor the resistant starch of green banana flour. Uses Historical use Traditionally, banana flour was produced as an alternative to high-priced wheat flour in various parts of Africa and Jamaica. As early as 1900, banana flour was sold in Central America under the brand-name Musarina and marketed as beneficial for those with sto
https://en.wikipedia.org/wiki/Clock%20%28model%20checking%29
In model checking, a subfield of computer science, a clock is a mathematical object used to model time. More precisely, a clock measures how much time passed since a particular event occurs, in this sense, a clock is more precisely an abstraction of a stopwatch. In a model of some particular program, the value of the clock may either be the time since the program was started, or the time since a particular event occurred in the program. Those clocks are used in the definition of timed automaton, signal automaton, timed propositional temporal logic and clock temporal logic. They are also used in programs such as UPPAAL which implement timed automata. Generally, the model of a system uses many clocks. Those multiple clocks are required in order to track a bounded number of events. All of those clocks are synchronized. That means that the difference in value between two fixed clocks is constant until one of them is restarted. In the language of electronics, it means that clock's jitter is null. Example Let us assume that we want to modelize an elevator in a building with ten floors. Our model may have clocks , such that the value of the clock is the time someone had wait for the elevator at floor . This clock is started when someone calls the elevator on floor (and the elevator was not already called on this floor since last time it visited that floor). This clock can be turned off when the elevator arrives at floor . In this example, we actually need ten distinct clocks because we need to track ten independent events. Another clock may be used to check how much time an elevator spent at a particular floor. A model of this elevator can then use those clocks to assert whether the elevator's program satisfies properties such as "assuming the elevator is not kept on a floor for more than fifteen seconds, then no one has to wait for the elevator for more than three minutes". In order to check whether this statement holds, it suffices to check that, in every run of
https://en.wikipedia.org/wiki/Enkephalinase
Enkephalinases are enzymes that degrade endogenous enkephalin opioid peptides. They include: Aminopeptidase N (APN) Neutral endopeptidase (NEP) Dipeptidyl peptidase 3 (DPP3) Carboxypeptidase A6 (CPA6) Leucyl/cystinyl aminopeptidase (LNPEP) Angiotensin-converting enzyme (ACE) See also Enkephalinase inhibitor Oxytocinase
https://en.wikipedia.org/wiki/List%20of%20Indian%20state%20birds
India, officially the Republic of India, is a country in South Asia. It is made up of 28 states and 8 union territories. All Indian states have their own government and union territories come under the jurisdiction of the central government. As with most of the other countries India, has a national emblem—the Lion Capital of Sarnath. Apart from India's national emblem, each of its states and union territories have their own seals and symbols which include animals, birds, trees, flowers, etc. A list of state birds of India is given below. See Symbols of Indian states and territories for a complete list of all state characters and seals. States Union territories See also Indian peafowl, the national bird of India List of Indian state symbols List of Indian state flags List of Indian state emblems List of Indian state mottos List of Indian state songs List of Indian state foundation days List of Indian state animals List of Indian state flowers List of Indian state trees
https://en.wikipedia.org/wiki/Ethics%20of%20care
The ethics of care (alternatively care ethics or EoC) is a normative ethical theory that holds that moral action centers on interpersonal relationships and care or benevolence as a virtue. EoC is one of a cluster of normative ethical theories that were developed by some feminists and environmentalists since the 1980s. While consequentialist and deontological ethical theories emphasize generalizable standards and impartiality, ethics of care emphasize the importance of response to the individual. The distinction between the general and the individual is reflected in their different moral questions: "what is just?" versus "how to respond?" Carol Gilligan, who is considered the originator of the ethics of care, criticized the application of generalized standards as "morally problematic, since it breeds moral blindness or indifference". Assumptions of the framework include: persons are understood to have varying degrees of dependence and interdependence; other individuals affected by the consequences of one's choices deserve consideration in proportion to their vulnerability; and situational details determine how to safeguard and promote the interests of individuals. Historical background The originator of the ethics of care was Carol Gilligan, an American ethicist and psychologist. Gilligan created this model as a critique to her mentor, developmental psychologist Lawrence Kohlberg's model of moral development. Gilligan observed that measuring moral development by Kohlberg's stages of moral development found boys to be more morally mature than girls, and this result held for adults as well (although when education is controlled for there are no gender differences). Gilligan argued that Kohlberg's model was not objective, but rather a masculine perspective on morality, founded on principles of justice and rights. In her 1982 book In a Different Voice, she further posited that men and women have tendencies to view morality in different terms. Her theory claimed women t
https://en.wikipedia.org/wiki/Heirloom%20plant
An heirloom plant, heirloom variety, heritage fruit (Australia and New Zealand), or heirloom vegetable (especially in Ireland and the UK) is an old cultivar of a plant used for food that is grown and maintained by gardeners and farmers, particularly in isolated communities of the Western world. These were commonly grown during earlier periods in human history, but are not used in modern large-scale agriculture. In some parts of the world, it is illegal to sell seeds of cultivars that are not listed as approved for sale. The Henry Doubleday Research Association, now known as Garden Organic, responded to this legislation by setting up the Heritage Seed Library to preserve seeds of as many of the older cultivars as possible. However, seed banks alone have not been able to provide sufficient insurance against catastrophic loss. In some jurisdictions, like Colombia, laws have been proposed that would make seed saving itself illegal. Many heirloom vegetables have kept their traits through open pollination, while fruit varieties such as apples have been propagated over the centuries through grafts and cuttings. The trend of growing heirloom plants in gardens has been returning in popularity in North America and Europe. Origin Before the industrialization of agriculture, a much wider variety of plant foods were grown for human consumption, largely due to farmers and gardeners saving seeds and cuttings for future planting. From the 16th century through the early 20th centuries, the diversity was huge. Old nursery catalogues were filled with plums, peaches, pears and apples of numerous varieties and seed catalogs offered legions of vegetable varieties. Valuable and carefully selected seeds were sold and traded using these catalogs along with useful advice on cultivation. Since World War II, agriculture in the industrialized world has mostly consisted of food crops which are grown in large, monocultural plots. In order to maximize consistency, few varieties of each type of
https://en.wikipedia.org/wiki/Procyanidin
Procyanidins are members of the proanthocyanidin (or condensed tannins) class of flavonoids. They are oligomeric compounds, formed from catechin and epicatechin molecules. They yield cyanidin when depolymerized under oxidative conditions. See the box below entitled "Types of procyanidins" for links to articles on the various types. Distribution in plants Procyanidins, including the lesser bioactive / bioavailable polymers (4 or more catechines), represent a group of condensed flavan-3-ols that can be found in many plants, most notably apples, maritime pine bark, cinnamon, aronia fruit, cocoa beans, grape seed, grape skin, and red wines of Vitis vinifera (the common grape). However, bilberry, cranberry, black currant, green tea, black tea, and other plants also contain these flavonoids. Procyanidins can also be isolated from Quercus petraea and Q. robur heartwood (wine barrel oaks). Açaí oil, obtained from the fruit of the açaí palm (Euterpe oleracea), is rich in numerous procyanidin oligomers. Apples contain on average per serving about eight times the amount of procyanidin found in wine, with some of the highest amounts found in the Red Delicious and Granny Smith varieties. The seed testas of field beans (Vicia faba) contain procyanidins that affect the digestibility in piglets and could have an inhibitory activity on enzymes. Cistus salviifolius also contains oligomeric procyanidins. Analysis Condensed tannins can be characterised by a number of techniques including depolymerisation, asymmetric flow field flow fractionation or small-angle X-ray scattering. DMACA is a dye used for localization of procyanidin compounds in plant histology. The use of the reagent results in blue staining. It can also be used to titrate procyanidins. Total phenols (or antioxidant effect) can be measured using the Folin-Ciocalteu reaction. Results are typically expressed as gallic acid equivalents (GAE). Procyanidins from field beans (Vicia faba) or barley have been estimated us
https://en.wikipedia.org/wiki/Trustworthy%20AI
Trustworthy AI is a programme of work of the ITU (United Nations Specialized Agency for ICT) under its AI for Good programme. The programme advances the standardization of a number of Privacy-enhancing technologies (PETs), including homomorphic encryption, federated learning, secure multi-party computation, differential privacy, zero-knowledge proof. Privacy-Enhancing Technologies apply complex and sometimes counterintuitive operations to process signals and information while safeguarding privacy. For instance, homomorphic encryption allows for computing on encrypted data, where the outcomes or result is still encrypted and unknown to those performing the computation, but decryptable by the original encryptor. These technologies are often developed with the goal of enabling use in jurisdictions different from the data creation (under e.g. GDPR). As such, the programme being led by two international organizations develops international standards to operate in this context. The PETs are used from analytics such as Artificial Intelligence. History The origin of the programme lies with the ITU-WHO Focus Group on Artificial Intelligence for Health, where strong need for privacy at the same time as the need for analytics, created a demand for a standard in these technologies. When AI for Good moved online in 2020, the TrustworthyAI seminar series was initiated to start discussions on such work, which eventually led to the standardization activities. Standardization Multi-Party Computation Secure Multi-Party Computation (MPC) is being standardizated under "Question 5" (the incubator) of ITU-T Study Group 17. Homomorphic Encryption ITU has been collaborating since the early stage of the HomomorphicEncryption.org standardization meetings, which has developed a standard on Homomorphic encryption. The 5th homomorphic encryption meeting was hosted at ITU HQ in Geneva. Federated Learning Zero-sum masks as used by federated learning for privacy preservation are used e
https://en.wikipedia.org/wiki/Coupon%20%28PWB%29
A coupon or test coupon is a printed circuit board (PCB) used to test the quality of a printed wiring board (PWB) fabrication process. Test coupons are fabricated on the same panel as the PWBs, typically at the edges. Coupons are then inspected to ensure proper layer alignment, electrical connectivity, and cross sectioned to inspect internal structures. Coupons can be designed custom for a PWB or selected from a vendor library. Overview A coupon is designed to include traces and vias with the same dimensions and structures as those of the main PWB. It is standard practice to locate coupons on the edges of a panel, from which multiple PWBs are fabricated, to verify the consistency of plating, etching, and lamination across the whole panel. The use of coupons for testing is a necessary step in accurately and reliably monitoring fabrication quality and consistency.
https://en.wikipedia.org/wiki/Risk%20factors%20of%20schizophrenia
Risk factors of schizophrenia include many genetic and environmental phenomena. The prevailing model of schizophrenia is that of a special neurodevelopmental disorder with no precise boundary or single cause (i.e. arises from multiple mechanisms). Schizophrenia is thought to develop from very complex gene–environment interactions with vulnerability factors. The interactions of these risk factors are intricate, as numerous and diverse medical insults from conception to adulthood can be involved. The combination of genetic and environmental factors leads to deficits in the neural circuits that affect sensory input and cognitive functions. Historically, this theory has been broadly accepted but impossible to prove given ethical limitations. The first definitive proof that schizophrenia arises from multiple biological changes in the brain was recently established in human tissue grown from patient stem cells, where the complexity of disease was found to be "even more complex than currently accepted" due to cell-by-cell encoding of schizophrenia-related neuropathology. A genetic predisposition on its own, without superimposed environmental risk factors, generally does not give rise to schizophrenia. Environmental risk factors are many, and include pregnancy complications, prenatal stress and nutrition, and adverse childhood experiences. An environmental risk factor may act alone or in combination with others. Schizophrenia typically develops between the ages of 16–30 (generally males aged 16–25 years and females 25–30 years); about 75 percent of people living with the illness developed it in these age-ranges. Childhood schizophrenia (very early onset schizophrenia) develops before the age of 13 years and is quite rare (frequency is 1 in 40,000). On average there is a somewhat earlier onset for men than women, with the possible influence of the female sex hormone estrogen being one hypothesis and socio-cultural influences another. Estrogen seems to have a dampening effe
https://en.wikipedia.org/wiki/NAV1
Neuron navigator 1 is a protein that in humans is encoded by the NAV1 gene. This gene belongs to the neuron navigator family and is expressed predominantly in the nervous system. The encoded protein contains coiled-coil domains and a conserved AAA domain characteristic for ATPases associated with a variety of cellular activities. This gene is similar to unc-53, a Caenorhabditis elegans gene involved in axon guidance. The exact function of this gene is not known.
https://en.wikipedia.org/wiki/Augmented%20truncated%20dodecahedron
In geometry, the augmented truncated dodecahedron is one of the Johnson solids (). As its name suggests, it is created by attaching a pentagonal cupola () onto one decagonal face of a truncated dodecahedron. External links Johnson solids
https://en.wikipedia.org/wiki/Thermal%20emittance
Thermal emittance or thermal emissivity () is the ratio of the radiant emittance of heat of a specific object or surface to that of a standard black body. Emissivity and emittivity are both dimensionless quantities given in the range of 0 to 1, representing the comparative/relative emittance with respect to a blackbody operating in similar conditions, but emissivity refers to a material property (of a homogeneous material), while emittivity refers to specific samples or objects. For building products, thermal emittance measurements are taken for wavelengths in the infrared. Determining the thermal emittance and solar reflectance of building materials, especially roofing materials, can be very useful for reducing heating and cooling energy costs in buildings. Combined index Solar Reflectance Index (SRI) is often used to determine the overall ability to reflect solar heat and release thermal heat. A roofing surface with high solar reflectance and high thermal emittance will reflect solar heat and release absorbed heat readily. High thermal emittance material radiates thermal heat back into the atmosphere more readily than one with a low thermal emittance. In common construction applications, the thermal emittance of a surface is usually higher than 0.8–0.85. High thermal emittance materials are essential to passive daytime radiative cooling, which uses surfaces high in thermal emittance and solar reflectance to lower surface temperatures by dissipating heat to outer space. It has been proposed as a solution to energy crises and global warming.
https://en.wikipedia.org/wiki/Computability%20theory
Computability theory, also known as recursion theory, is a branch of mathematical logic, computer science, and the theory of computation that originated in the 1930s with the study of computable functions and Turing degrees. The field has since expanded to include the study of generalized computability and definability. In these areas, computability theory overlaps with proof theory and effective descriptive set theory. Basic questions addressed by computability theory include: What does it mean for a function on the natural numbers to be computable? How can noncomputable functions be classified into a hierarchy based on their level of noncomputability? Although there is considerable overlap in terms of knowledge and methods, mathematical computability theorists study the theory of relative computability, reducibility notions, and degree structures; those in the computer science field focus on the theory of subrecursive hierarchies, formal methods, and formal languages. Introduction Computability theory originated in the 1930s, with work of Kurt Gödel, Alonzo Church, Rózsa Péter, Alan Turing, Stephen Kleene, and Emil Post. The fundamental results the researchers obtained established Turing computability as the correct formalization of the informal idea of effective calculation. In 1952, these results led Kleene to coin the two names "Church's thesis" and "Turing's thesis". Nowadays these are often considered as a single hypothesis, the Church–Turing thesis, which states that any function that is computable by an algorithm is a computable function. Although initially skeptical, by 1946 Gödel argued in favor of this thesis: With a definition of effective calculation came the first proofs that there are problems in mathematics that cannot be effectively decided. In 1936, Church and Turing were inspired by techniques used by Gödel to prove his incompleteness theorems - in 1931, Gödel independently demonstrated that the is not effectively decidable. This result
https://en.wikipedia.org/wiki/Chimera%20%28software%20library%29
Chimera is a software library created as a research project at UCSB for the C programming language that implements a structured, peer-to-peer routing platform to allow the easy development of peer-to-peer applications. The project's focus is on providing a fast, lightweight implementation of a system like other prefix-routing protocols such as UCSB's Tapestry system and Microsoft Research's Pastry system, that can be easily used to build an application that creates an overlay network with a limited number of library calls. The library is intended to serve as both a usable complete structured peer-to-peer system and a starting point for further research. It includes some of the current work in locality optimization and soft-state operations. The system contains both a leaf set of neighbor nodes, which provides fault tolerance and a probabilistic invariant of constant routing progress, and a PRR-style routing table to improve routing time to a logarithmic factor of network size. Chimera is currently being used in industry labs, as part of research done by the U.S. Department of Defense, and by startup companies. Notes
https://en.wikipedia.org/wiki/Full%20state%20feedback
Full state feedback (FSF), or pole placement, is a method employed in feedback control system theory to place the closed-loop poles of a plant in pre-determined locations in the s-plane. Placing poles is desirable because the location of the poles corresponds directly to the eigenvalues of the system, which control the characteristics of the response of the system. The system must be considered controllable in order to implement this method. Principle If the closed-loop dynamics can be represented by the state space equation (see State space (controls)) with output equation then the poles of the system transfer function are the roots of the characteristic equation given by Full state feedback is utilized by commanding the input vector . Consider an input proportional (in the matrix sense) to the state vector, . Substituting into the state space equations above, we have The poles of the FSF system are given by the characteristic equation of the matrix , . Comparing the terms of this equation with those of the desired characteristic equation yields the values of the feedback matrix which force the closed-loop eigenvalues to the pole locations specified by the desired characteristic equation. Example of FSF Consider a system given by the following state space equations: The uncontrolled system has open-loop poles at and . These poles are the eigenvalues of the matrix and they are the roots of . Suppose, for considerations of the response, we wish the controlled system eigenvalues to be located at and , which are not the poles we currently have. The desired characteristic equation is then , from . Following the procedure given above, the FSF controlled system characteristic equation is where Upon setting this characteristic equation equal to the desired characteristic equation, we find . Therefore, setting forces the closed-loop poles to the desired locations, affecting the response as desired. This only works for Single-Input systems. Mult
https://en.wikipedia.org/wiki/GraalVM
GraalVM is a Java VM and JDK based on HotSpot/OpenJDK, implemented in Java. It supports additional programming languages and execution modes, like ahead-of-time compilation of Java applications for fast startup and low memory footprint. The first production-ready version, GraalVM 19.0, was released in May 2019. The most recent version is GraalVM , made available in . Major differentiators of GraalVM compared to the base JDK are: GraalVM Compiler, a JIT compiler for Java GraalVM Native Image, allowing the ahead-of-time compilation of Java applications Truffle Language Implementation framework and the GraalVM SDK, to implement additional programming language runtimes LLVM Runtime and JavaScript Runtime Project goals To improve the performance of Java virtual machine-based languages to match the performance of native languages. To reduce the startup time of JVM-based applications by compiling them ahead-of-time with GraalVM Native Image technology. To enable GraalVM integration into the Oracle Database, OpenJDK, Node.js, Android/iOS, and to support similar custom embeddings. To allow freeform mixing of code from any programming language in a single program, billed as "polyglot applications". To include an easily extended set of "polyglot programming tools". History GraalVM has its roots in the Maxine Virtual Machine project at Sun Microsystems Laboratories (now Oracle Labs). The goal was to write a Java virtual machine in Java itself, hoping to free the development from the problems of developing in C++, particularly manual memory management, and benefit from meta-circular optimizations. Upon realizing that writing everything in Java was too ambitious as a first step, the decision was taken to focus on the compiler only and hook it into Hotspot, to reuse as much as possible the Hotspot runtime. The GraalVM compiler was started by manually converting the code of the Hotspot client compiler (named "C1") into Java, replacing the previous Maxine compiler.
https://en.wikipedia.org/wiki/Fibro-adipose%20vascular%20anomaly
Fibro-adipose vascular anomaly, also known as FAVA, is a type of vascular anomaly that is both rare and painful. FAVA is characterized by tough fibrofatty tissue taking over portions of muscle, most often contained within a single limb. FAVA also causes venous and/or lymphatic abnormalities. Though FAVA has only been recognized as a distinct vascular anomaly, separate from common venous malformations, within the past ten years, FAVA a distinct congenital disorder. Signs and symptoms Common symptoms of FAVA include severe pain and difficulty moving the affected limb, mild enlargement of the affected limb with visible veins, and contracture. In the cohort described by Alomari et al. from the Vascular Anomalies Center at Boston Children’s Hospital, FAVA was located, in descending order, in the calf, forearm/wrist and thigh. The most common presentation is severe pain. Calf lesions, particularly those located in the posterior compartment, are commonly associated with restricted ankle dorsiflexion (equinus contracture). Genetics No one knows what causes FAVA, though recent research revealed mutations in a gene called PIK3CA in some—but not all—cases. PIK3CA is a gene in the receptor tyrosine kinase phosphatidylinositol 3-kinase (PI3)-AKT growth-signaling pathway. The PIK3CA gene is located on the long (q) arm of chromosome 3. There has been no evidence to suggest that FAVA is inherited or passed along in families. Diagnosis FAVA is most often diagnosed in older children, teens and young adults, though it has been diagnosed earlier and later in a patient's life. The constellation of clinical, radiologic, and histopathologic findings typically allow the diagnosis of FAVA. The most helpful imaging studies are ultrasonography (US) and magnetic resonance imaging (MRI). The major imaging features of FAVA include the presence of complex intramuscular solid lesion replacing normal muscle fibers with fibrofatty overgrowth and phlebectasia. The extrafascial part is compose