source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Mills%20House%20and%20Smokehouse | The Mills House and Smokehouse, located south of Griffin, Georgia at 1590 Carver Rd., is an Italianate-style house built in 1875 and its smokehouse. It was listed on the National Register of Historic Places in 1980.
It is a two-story building, in plan, with a low roof and wide eaves supported by decorative brackets. It has an original one-story front porch. The main part of the house is built of "a combination of heavy mortised and tenoned timbers and light dimensioned lumber fastened with cut nails. This structure is sheathed with weatherboards, painted white. The house was originally supported by brick piers; it now rests on a continuous brick foundation wall. Original wood shingles on the roof have been covered with large, diamond-shaped asphalt shingles." |
https://en.wikipedia.org/wiki/Radioallergosorbent%20test | A radioallergosorbent test (RAST) is a blood test using radioimmunoassay test to detect specific IgE antibodies in order to determine the substances a subject is allergic to. This is different from a skin allergy test, which determines allergy by the reaction of a person's skin to different substances.
Medical uses
The two most commonly used methods of confirming allergen sensitization are skin testing and allergy blood testing. Both methods are recommended by the NIH guidelines and have similar diagnostic value in terms of sensitivity and specificity.
Advantages of the allergy blood test range from: excellent reproducibility across the full measuring range of the calibration curve, it has very high specificity as it binds to allergen specific IgE, and extremely sensitive too, when compared with skin prick testing. In general, this method of blood testing (in-vitro, out of body) vs skin-prick testing (in-vivo, in body) has a major advantage: it is not always necessary to remove the patient from an antihistamine medication regimen, and if the skin conditions (such as eczema) are so widespread that allergy skin testing cannot be done. Allergy blood tests, such as ImmunoCAP, are performed without procedure variations, and the results are of excellent standardization.
Adults and children of any age can take an allergy blood test. For babies and very young children, a single needle stick for allergy blood testing is often more gentle than several skin tests. However, skin testing techniques have improved. Most skin testing does not involve needles and typically skin testing results in minimal patient discomfort.
Drawbacks to RAST and ImmunoCAP techniques do exist. Compared to skin testing, ImmunoCAP and other RAST techniques take longer to perform and are less cost effective. Several studies have also found these tests to be less sensitive than skin testing for the detection of clinically relevant allergies. False positive results may be obtained due to cross-reacti |
https://en.wikipedia.org/wiki/James%20Colliander | James Ellis Colliander (born 22 June 1967) is an American-Canadian mathematician. He is currently Professor of Mathematics at University of British Columbia and served as Director of the Pacific Institute for the Mathematical Sciences (PIMS) during 2016-2021. He was born in El Paso, Texas, and lived there until age 8 and then moved to Hastings, Minnesota. He graduated from Macalester College in 1989. He worked for two years at the United States Naval Research Laboratory on fiber optic sensors and then went to graduate school to study mathematics. He received his PhD from the University of Illinois at Urbana–Champaign in 1997 and was advised by Jean Bourgain. Colliander was a postdoctoral fellow at the University of California, Berkeley and spent semesters at the University of Chicago, the Institute for Advanced Study and the Mathematical Sciences Research Institute.
He is also an award-winning teacher.
Research
Colliander's research mostly addresses dynamical aspects of solutions of Hamiltonian partial differential equations, especially non-linear Schrödinger equation.
Colliander is a collaborator with Markus Keel, Gigliola Staffilani, Hideo Takaoka, and Terence Tao, forming a group known as the "I-team". The name of this group has been said to come from a mollification operator used in the team's method of almost conserved quantities, or as an abbreviation for "interaction", referring both to the teamwork of the group and to the interactions of light waves with each other. The group's work was featured in the 2006 Fields Medal citations for group member Tao.
Organization creation
Colliander is co-founder of the education technology company called Crowdmark.
Colliander, with colleagues from PIMS, created Syzygy, a project that provides interactive computing for students and teachers at universities across Canada. Syzygy operates on infrastructure provided by Compute Canada.
Colliander, with colleagues from PIMS and Cybera, created Callysto, a project designe |
https://en.wikipedia.org/wiki/POISK%20Centre | The POISK Centre (in Russian:Центр «ПОИСК») is an educational and research organization founded in 2004 at Saint Petersburg State University (Russia). Its primary aim is to encourage secondary school students and university students to do independent scientific research.
The POISK Centre supports educational programs that motivate youth to develop an interest in physics and natural sciences, and to involve them in “what a real scientist does” as early as possible. These activities include tight collaboration with leading universities and secondary schools in Russia and abroad, joint seminars and workshops, regular international scientific conferences, language programs, but also the promotion of research competitions, such as the Young Physicists' Tournament.
POISK means ‘search’ in Russian, but it is also a Russian abbreviation for the Support Centre for Olympiads and Intellectual Competitions.
Achievements
Since 2004, the POISK Centre is the only university-based organization in Russia that is being selecting, supervising and preparing the National team that represents Russia at the International Young Physicists' Tournament.
The POISK Centre’s team has been a participant of IYPTs in 2004 (Brisbane, Australia), 2005 (Winterthur, Switzerland) and 2006 (Bratislava, Slovakia) with significant success, winning bronze medals twice. In May 2007, the POISK’s Russian team fought in the Finals and won silver at the Austrian Young Physicists' Tournament held in Leoben, Austria.
In November 2007, the POISK's team of university students was one of the two gold winners at the Ukrainian Physicists' Tournament for University Students held at the Kiev National University, Ukraine.
See also
International Young Physicists' Tournament
Ukrainian Physicists' Tournament for University Students
History of Young Physicists' Tournament in Russia
Austrian Young Physicists' Tournament
External links
The POISK Centre's Official Website
Video of the presentation made by the Russia |
https://en.wikipedia.org/wiki/Roseophilin | Roseophilin is an antibiotic isolated from Streptomyces griseoviridis shown to have antitumor activity. The chemical structure can be considered in terms of two components, a macrotricyclic segment and a heterocyclic side-chain. Several laboratory syntheses of roseophilin (e.g., those of Trost, Fürstner, Salamone) are based upon the Paal-Knorr synthesis, and two others are based on the Nazarov cyclization reaction (those of Tius, Frontier). The compound is related to the prodiginines. |
https://en.wikipedia.org/wiki/Homotopy%20analysis%20method | The homotopy analysis method (HAM) is a semi-analytical technique to solve nonlinear ordinary/partial differential equations. The homotopy analysis method employs the concept of the homotopy from topology to generate a convergent series solution for nonlinear systems. This is enabled by utilizing a homotopy-Maclaurin series to deal with the nonlinearities in the system.
The HAM was first devised in 1992 by Liao Shijun of Shanghai Jiaotong University in his PhD dissertation and further modified in 1997 to introduce a non-zero auxiliary parameter, referred to as the convergence-control parameter, c0, to construct a homotopy on a differential system in general form. The convergence-control parameter is a non-physical variable that provides a simple way to verify and enforce convergence of a solution series. The capability of the HAM to naturally show convergence of the series solution is unusual in analytical and semi-analytic approaches to nonlinear partial differential equations.
Characteristics
The HAM distinguishes itself from various other analytical methods in four important aspects. First, it is a series expansion method that is not directly dependent on small or large physical parameters. Thus, it is applicable for not only weakly but also strongly nonlinear problems, going beyond some of the inherent limitations of the standard perturbation methods. Second, the HAM is a unified method for the Lyapunov artificial small parameter method, the delta expansion method, the Adomian decomposition method, and the homotopy perturbation method. The greater generality of the method often allows for strong convergence of the solution over larger spatial and parameter domains. Third, the HAM gives excellent flexibility in the expression of the solution and how the solution is explicitly obtained. It provides great freedom to choose the basis functions of the desired solution and the corresponding auxiliary linear operator of the homotopy. Finally, unlike the ot |
https://en.wikipedia.org/wiki/Test%20case | In software engineering, a test case is a specification of the inputs, execution conditions, testing procedure, and expected results that define a single test to be executed to achieve a particular software testing objective, such as to exercise a particular program path or to verify compliance with a specific requirement. Test cases underlie testing that is methodical rather than haphazard. A battery of test cases can be built to produce the desired coverage of the software being tested. Formally defined test cases allow the same tests to be run repeatedly against successive versions of the software, allowing for effective and consistent regression testing.
Formal test cases
In order to fully test that all the requirements of an application are met, there must be at least two test cases for each requirement: one positive test and one negative test. If a requirement has sub-requirements, each sub-requirement must have at least two test cases. Keeping track of the link between the requirement and the test is frequently done using a traceability matrix. Written test cases should include a description of the functionality to be tested, and the preparation required to ensure that the test can be conducted.
A formal written test case is characterized by a known input and by an expected output, which is worked out before the test is executed. The known input should test a precondition and the expected output should test a postcondition.
Informal test cases
For applications or systems without formal requirements, test cases can be written based on the accepted normal operation of programs of a similar class. In some schools of testing, test cases are not written at all but the activities and results are reported after the tests have been run.
In scenario testing, hypothetical stories are used to help the tester think through a complex problem or system. These scenarios are usually not written down in any detail. They can be as simple as a diagram for a testing envi |
https://en.wikipedia.org/wiki/Serratus%20posterior%20superior%20muscle | The serratus posterior superior muscle is a thin, quadrilateral muscle. It is situated at the upper back part of the thorax, deep to the rhomboid muscles.
Structure
The serratus posterior superior muscle arises by an aponeurosis from the lower part of the nuchal ligament, from the spinous processes of C7, T1, T2, and sometimes T3, and from the supraspinal ligament. It is inserted, by four fleshy digitations into the upper borders of the second, third, fourth, and fifth ribs past the angle of the rib.
Function
The serratus posterior superior muscle elevates the second to fifth ribs. This aids deep respiration.
Additional images
See also
Serratus anterior muscle
Serratus posterior inferior muscle |
https://en.wikipedia.org/wiki/Elasticity%20of%20a%20function | In mathematics, the elasticity or point elasticity of a positive differentiable function f of a positive variable (positive input, positive output) at point a is defined as
or equivalently
It is thus the ratio of the relative (percentage) change in the function's output with respect to the relative change in its input , for infinitesimal changes from a point . Equivalently, it is the ratio of the infinitesimal change of the logarithm of a function with respect to the infinitesimal change of the logarithm of the argument. Generalisations to multi-input-multi-output cases also exist in the literature.
The elasticity of a function is a constant if and only if the function has the form for a constant .
The elasticity at a point is the limit of the arc elasticity between two points as the separation between those two points approaches zero.
The concept of elasticity is widely used in economics and Metabolic Control Analysis; see elasticity (economics) and Elasticity coefficient respectively for details.
Rules
Rules for finding the elasticity of products and quotients are simpler than those for derivatives. Let f, g be differentiable. Then
The derivative can be expressed in terms of elasticity as
Let a and b be constants. Then
,
.
Estimating point elasticities
In economics, the price elasticity of demand refers to the elasticity of a demand function Q(P), and can be expressed as (dQ/dP)/(Q(P)/P) or the ratio of the value of the marginal function (dQ/dP) to the value of the average function (Q(P)/P). This relationship provides an easy way of determining whether a demand curve is elastic or inelastic at a particular point. First, suppose one follows the usual convention in mathematics of plotting the independent variable (P) horizontally and the dependent variable (Q) vertically. Then the slope of a line tangent to the curve at that point is the value of the marginal function at that point. The slope of a ray drawn from the origin through the point is the |
https://en.wikipedia.org/wiki/P-adic%20exponential%20function | In mathematics, particularly p-adic analysis, the p-adic exponential function is a p-adic analogue of the usual exponential function on the complex numbers. As in the complex case, it has an inverse function, named the p-adic logarithm.
Definition
The usual exponential function on C is defined by the infinite series
Entirely analogously, one defines the exponential function on Cp, the completion of the algebraic closure of Qp, by
However, unlike exp which converges on all of C, expp only converges on the disc
This is because p-adic series converge if and only if the summands tend to zero, and since the n! in the denominator of each summand tends to make them large p-adically, a small value of z is needed in the numerator. It follows from Legendre's formula that if then tends to , p-adically.
Although the p-adic exponential is sometimes denoted ex, the number e itself has no p-adic analogue. This is because the power series expp(x) does not converge at . It is possible to choose a number e to be a p-th root of expp(p) for , but there are multiple such roots and there is no canonical choice among them.
p-adic logarithm function
The power series
converges for x in Cp satisfying |x|p < 1 and so defines the p-adic logarithm function logp(z) for |z − 1|p < 1 satisfying the usual property logp(zw) = logpz + logpw. The function logp can be extended to all of (the set of nonzero elements of Cp) by imposing that it continues to satisfy this last property and setting logp(p) = 0. Specifically, every element w of can be written as w = pr·ζ·z with r a rational number, ζ a root of unity, and |z − 1|p < 1, in which case logp(w) = logp(z). This function on is sometimes called the Iwasawa logarithm to emphasize the choice of logp(p) = 0. In fact, there is an extension of the logarithm from |z − 1|p < 1 to all of for each choice of logp(p) in Cp.
Properties
If z and w are both in the radius of convergence for expp, then their sum is too and we have the usual addition |
https://en.wikipedia.org/wiki/History%20of%20plant%20breeding | Plant breeding started with sedentary agriculture, particularly the domestication of the first agricultural plants, a practice which is estimated to date back 9,000 to 11,000 years. Initially, early human farmers selected food plants with particular desirable characteristics and used these as a seed source for subsequent generations, resulting in an accumulation of characteristics over time. In time however, experiments began with deliberate hybridization, the science and understanding of which was greatly enhanced by the work of Gregor Mendel. Mendel's work ultimately led to the new science of genetics. Modern plant breeding is applied genetics, but its scientific basis is broader, covering molecular biology, cytology, systematics, physiology, pathology, entomology, chemistry, and statistics (biometrics). It has also developed its own technology. Plant breeding efforts are divided into a number of different historical landmarks.
Early plant breeding
Domestication
Domestication of plants is an artificial selection process conducted by humans to produce plants that have more desirable traits than wild plants, and which renders them dependent on artificial usually enhanced environments for their continued existence. The practice is estimated to date back 9,000-11,000 years. Many crops in present-day cultivation are the result of domestication in ancient times, about 5,000 years ago in the Old World and 3,000 years ago in the New World. In the Neolithic period, domestication took a minimum of 1,000 years and a maximum of 7,000 years. Today, all principal food crops come from domesticated varieties. Almost all the domesticated plants used today for food and agriculture were domesticated in the centers of origin. In these centers there is still a great diversity of closely related wild plants, so-called crop wild relatives, that can also be used for improving modern cultivars by plant breeding.
A plant whose origin or selection is due primarily to intentional human a |
https://en.wikipedia.org/wiki/Zonal%20and%20poloidal | In magnetic confinement fusion the zonal direction primarily connotes the poloidal direction (i.e. the short way around the torus), the corresponding coordinate being denoted by y in the slab approximation or θ in magnetic coordinates. However, in the fusion context, usage is restricted to the context of zonal plasma flows and there will in general be a toroidal component in such flows as well. Thus, although the term zonal has come into use in plasma physics to emphasize an analogy with zonal flows in geophysics, it does not uniquely identify the direction of flow, unlike the case in geophysics.
See also
Toroidal and poloidal
Zonal and meridional
Zonal flow (plasma)
Zonal flow
Orientation (geometry)
Magnetic confinement fusion |
https://en.wikipedia.org/wiki/Worth%20syndrome | Worth syndrome, also known as benign form of Worth hyperostosis corticalis generalisata with torus platinus, autosomal dominant osteosclerosis, autosomal dominant endosteal hyperostosis or Worth disease, is a rare autosomal dominant congenital disorder that is caused by a mutation in the LRP5 gene. It is characterized by increased bone density and benign bony structures on the palate.
Causes
Worth syndrome is caused by a mutation in the LRP5 gene, located on human chromosome 11q13.4. The disorder is inherited in an autosomal dominant fashion. This indicates that the defective gene responsible for a disorder is located on an autosome (chromosome 11 is an autosome), and only one copy of the defective gene is sufficient to cause the disorder, when inherited from a parent who has the disorder.
Diagnosis
Treatment
History
The condition was first reported by H. M. Worth in 1966. In 1977, two doctors, R.J. Gorlin and L. Glass, distinguished the syndrome from van Buchem disease. In 1987 a group of Spanish doctors pointed out that the condition may not be benign, and may sometimes cause nerve damage. |
https://en.wikipedia.org/wiki/Stratification%20%28water%29 | Stratification in water is the formation in a body of water of relatively distinct and stable layers by density. It occurs in all water bodies where there is stable density variation with depth. Stratification is a barrier to the vertical mixing of water, which affects the exchange of heat, carbon, oxygen and nutrients. Wind-driven upwelling and downwelling of open water can induce mixing of different layers through the stratification, and force the rise of denser cold, nutrient-rich, or saline water and the sinking of lighter warm or fresher water, respectively. Layers are based on water density: denser water remains below less dense water in stable stratification in the absence of forced mixing.
Stratification occurs in several kinds of water bodies, such as oceans, lakes, estuaries, flooded caves, aquifers and some rivers.
Mechanism
The driving force in stratification is gravity, which sorts adjacent arbitrary volumes of water by local density, operating on them by buoyancy and weight. A volume of water of lower density than the surroundings will have a resultant buoyant force lifting it upwards, and a volume with higher density will be pulled down by the weight which will be greater than the resultant buoyant forces, following Archimedes' principle. Each volume will rise or sink until it has either mixed with its surroundings through turbulence and diffusion to match the density of the surroundings, reaches a depth where it has the same density as the surroundings, or reaches the top or bottom boundary of the body of water, and spreads out until the forces are balanced and the body of water reaches its lowest potential energy.
The density of water, which is defined as mass per unit of volume, is a function of temperature (), salinity () and pressure (), which is a function of depth and the density distribution of the overlaying water column, and is denoted as .
The dependence on pressure is not significant, since water is almost perfectly incompressible. A |
https://en.wikipedia.org/wiki/Energy%20Saving%20Trust%20Recommended | The Energy Saving Trust Recommended logo was a UK-based labelling and certification scheme for energy efficient products. A product that displays the logo shows that it met strict criteria on energy saving. The scheme was run by the Energy Saving Trust and was launched in 2000. The logo is registered with the UK Patent Office and could be used by manufacturers, retailers and suppliers to signpost consumers to best-in-class energy efficient products.
The Energy Saving trust no longer awards a "Recommended" certification. Its product certifications now include "Energy Saving Trust Endorsed", "Energy Saving Trust Listed", and "Verified by Energy Saving Trust".
How it works
The product criteria were created and managed by the Energy Saving Trust Recommended team, then peer-reviewed by an independent panel of industry experts. The criteria were reviewed annually to make sure they still represent only the most efficient products. Over 5% of products were tested every year to check they meet the criteria, the highest percentage of any UK certification scheme of this type.
Where you can find the label
The Energy Saving Trust Recommended label can be found across 31 product types in 7 product sectors. These include:
Home electronics - TVs, TV recorders, simple set top boxes, DAB radios, telephones and intelligent mains panels
Home appliances - fridges and freezers, washing machines, tumble dryers, electric ovens, dishwashers and kettles
IT - desktops, displays, laptops and printers
Lighting - LEDs, halogens, CFLs and luminaires
Heating - gas and oil boilers, heating controls, hot water cylinders and passive flue heat recovery devices/systems
Glazing
Insulation - pipe, cavity wall, external wall, dry lining and loft
Members
Energy Saving Trust Recommended was a voluntary scheme which means all members put themselves and their products forward to be certified. As well as products meeting set standards on performance, all companies met the Energy Saving Trust's cr |
https://en.wikipedia.org/wiki/Moorella%20%28bacterium%29 | Moorella is a genus of bacteria belonging to the phylum Bacillota.
These bacteria are thermophilic, anaerobic and endospore-forming and many species of this genus have been isolated from hot springs.
Some of these species were formerly included within the genus Clostridium, but after a taxonomic rearrangement of the class Clostridia, a phylogenetically distinct genus was identified, which was named Moorella in honor of the American microbiologist W.E.C. Moore.
Phylogeny
The current phylogeny of these bacteria has been inferred from a computational analysis of 16S ribosomal RNA genes of described species belonging to the Moorella Group (a larger group of bacteria within the family Thermoanaerobacteraceae that also includes other species actually not belonging to genus Moorella). The currently accepted taxonomy is based on the List of Prokaryotic names with Standing in Nomenclature (LPSN) and National Center for Biotechnology Information (NCBI)
See also
List of bacterial orders
List of bacteria genera |
https://en.wikipedia.org/wiki/Steinhart%E2%80%93Hart%20equation | The Steinhart–Hart equation is a model of the resistance of a semiconductor at different temperatures. The equation is
where
is the temperature (in kelvins),
is the resistance at (in ohms),
, , and are the Steinhart–Hart coefficients, which vary depending on the type and model of thermistor and the temperature range of interest.
Uses of the equation
The equation is often used to derive a precise temperature of a thermistor, since it provides a closer approximation to actual temperature than simpler equations, and is useful over the entire working temperature range of the sensor. Steinhart–Hart coefficients are usually published by thermistor manufacturers.
Where Steinhart–Hart coefficients are not available, they can be derived. Three accurate measures of resistance are made at precise temperatures, then the coefficients are derived by solving three simultaneous equations.
Inverse of the equation
To find the resistance of a semiconductor at a given temperature, the inverse of the Steinhart–Hart equation must be used. See the Application Note, "A, B, C Coefficients for Steinhart–Hart Equation".
where
Steinhart–Hart coefficients
To find the coefficients of Steinhart–Hart, we need to know at-least three operating points. For this, we use three values of resistance data for three known temperatures.
With , and values of resistance at the temperatures , and , one can express , and (all calculations):
Developers of the equation
The equation is named after John S. Steinhart and Stanley R. Hart who first published the relationship in 1968. Professor Steinhart (1929–2003), a fellow of the American Geophysical Union and of the American Association for the Advancement of Science, was a member of the faculty of University of Wisconsin–Madison from 1969 to 1991. Dr. Hart, a Senior Scientist at Woods Hole Oceanographic Institution since 1989 and fellow of the Geological Society of America, the American Geophysical Union, the Geochemical Society and the |
https://en.wikipedia.org/wiki/Artificial%20organ | An artificial organ is a human made organ device or tissue that is implanted or integrated into a human — interfacing with living tissue — to replace a natural organ, to duplicate or augment a specific function or functions so the patient may return to a normal life as soon as possible. The replaced function does not have to be related to life support, but it often is. For example, replacement bones and joints, such as those found in hip replacements, could also be considered artificial organs.
Implied by definition, is that the device must not be continuously tethered to a stationary power supply or other stationary resources such as filters or chemical processing units. (Periodic rapid recharging of batteries, refilling of chemicals, and/or cleaning/replacing of filters would exclude a device from being called an artificial organ.) Thus, a dialysis machine, while a very successful and critically important life support device that almost completely replaces the duties of a kidney, is not an artificial organ.
Purpose
Constructing and installing artificial organs, an extremely research-intensive and expensive process initially, may entail many years of ongoing maintenance services not needed by a natural organ:
providing life support to prevent imminent death while awaiting a transplant (e.g. artificial heart);
dramatically improving the patient's ability for self care (e.g. artificial limb);
improving the patient's ability to interact socially (e.g. cochlear implant); or
improving a patient's quality of life through cosmetic restoration after cancer surgery or an accident.
The use of any artificial organ by humans is almost always preceded by extensive experiments with animals. Initial testing in humans is frequently limited to those either already facing death or who have exhausted every other treatment possibility.
Examples
Artificial limbs
Artificial arms and legs, or prosthetics, are intended to restore a degree of normal function to amputees. Mechan |
https://en.wikipedia.org/wiki/Comparison%20of%20SSH%20clients | An SSH client is a software program which uses the secure shell protocol to connect to a remote computer. This article compares a selection of notable clients.
General
Platform
The operating systems or virtual machines the SSH clients are designed to run on without emulation include several possibilities:
Partial indicates that while it works, the client lacks important functionality compared to versions for other OSs but may still be under development.
The list is not exhaustive, but rather reflects the most common platforms today.
Technical
Features
Authentication key algorithms
This table lists standard authentication key algorithms implemented by SSH clients. Some SSH implementations include both server and client implementations and support custom non-standard authentication algorithms not listed in this table.
See also
Comparison of SSH servers
Comparison of FTP client software
Comparison of remote desktop software |
https://en.wikipedia.org/wiki/Gemmatimonas | Gemmatimonas is a Gram-negative, rod-shaped, motile and non-spore-forming genus of bacteria from the family of Gemmatimonaceae. |
https://en.wikipedia.org/wiki/IBM%20Series/1 | The IBM Series/1 is a 16-bit minicomputer, introduced in 1976, that in many respects competed with other minicomputers of the time, such as the PDP-11 from Digital Equipment Corporation and similar offerings from Data General and HP. The Series/1 was typically used to control and operate external electro-mechanical components while also allowing for primitive data storage and handling.
Although the Series/1 uses EBCDIC character encoding internally and locally attached EBCDIC terminals, ASCII-based remote terminals and devices could be attached via an I/O card with a RS-232 interface to be more compatible with competing minicomputers. IBM's own 3101 and 3151 ASCII display terminals are examples of this. This was a departure from IBM mainframes that used 3270 terminals and coaxial attachment.
Series/1 computers were withdrawn from marketing in 1988 at or near the introduction of the IBM AS/400 line.
A US government asset report dated May 2016 revealed that an IBM Series/1 was still being used as part of the country's nuclear command and control systems.
Models
Initially, model 1 (4952, Model C), model 3 (IBM 4953) and model 5 (IBM 4955, Model F) processors were provided. Later processors were the model 4 (IBM 4954) and model 6 (IBM 4956). Don Estridge had been the lead manager on the IBM Series/1 minicomputer. He reportedly had fallen out of grace when that project was ill-received.
Software support
The Series/1 could be ordered with or without operating system. Available were either of two mutually exclusive operating systems: Event Driven Executive (EDX) or Realtime Programming System (RPS). Systems using EDX were primarily programmed using Event Driven Language (EDL), though high level languages such as FORTRAN IV, PL/I, Pascal and COBOL were also available. EDL delivered output in IBM machine code for System/3 or System/7 and for the Series/1 by an emulator. Although the Series/1 is underpowered by today's standards, a robust multi-user operating envir |
https://en.wikipedia.org/wiki/Potometer | A potometer (from Greek ποτό = drunken, and μέτρο = measure), sometimes known as transpirometer, is a device used for measuring the rate of water uptake of a leafy shoot which is almost equal to the water lost through transpiration. The causes of water uptake are photosynthesis and transpiration.
The rate of transpiration can be estimated in two ways:
Indirectly - by measuring the distance the water level drops in the graduated tube over a measured length of time. It is assumed that this is due to the cutting taking in water which in turn is necessary to replace an equal volume of water lost by transpiration.
Directly - by measuring the reduction in mass of the potometer over a period of time. Here it is assumed that any loss in mass is due to transpiration.
There are two main types of potometers: the bubble potometer (as detailed below), and the mass potometer. The mass potometer consists of a plant with its root submerged in a beaker. This beaker is then placed on a digital balance; readings can be made to determine the amount of water lost by the plant.
Design
Potometers come in a variety of designs, but all follow the same basic principle.A length of capillary tube. A bubble is introduced to the capillary; as water is taken up by the plant, the bubble moves. By marking regular gradations on the tube, it is possible to measure water uptake. A reservoir. Typically a funnel with a tap; turning the tap on the reservoir resets the bubble. Some designs use a syringe instead.
A tube for holding the shoot'''. The shoot must be held in contact with the water; additionally, the surface of the water should not be exposed to the air. Otherwise, evaporation will interfere with measurements. A rubber bung greased with petroleum jelly suffices.
Preparation
Cut a leafy'' shoot for a plant and plunge its base into water. This prevents the xylem from taking up any air. Wetting the leaves themselves will alter the rate of transpiration.
Immerse the whole of the poto |
https://en.wikipedia.org/wiki/Model%20solid%20approximation | The model solid approximation is a method used for determining the extrema of energy bands in semiconductors. The method was first proposed for silicon-germanium alloys by Chris G. Van de Walle and Richard M. Martin in 1986 and extended to several other semiconductor materials by Van de Walle in 1989. It has been used extensively for modelling semiconductor heterostructure devices such as quantum cascade lasers.
Although the electrostatic potential in a semiconductor crystal fluctuates on an atomic scale, the model solid approximation averages these fluctuations out to obtain a constant energy level for each material. |
https://en.wikipedia.org/wiki/Complex%20response | A complex response refers to an environmental reaction to change that occurs at multiple levels to multiple objects, and can induce a chain reaction of responses to a single initial change. It is akin to the butterfly effect: one small event (change) can cascade through a given system creating new agents of change, and operating at several levels. The term is most commonly used in fluvial geomorphology, or the study of river systems and changes within those systems.
See also
complex system
Complex systems theory
Geomorphology |
https://en.wikipedia.org/wiki/Saturation%20vapor%20density | The saturation vapor density (SVD) is the maximum density of water vapor in air at a given temperature. The concept is related to saturation vapor pressure (SVP). It can be used to calculate exact quantity of water vapor in the air from a relative humidity (RH = % local air humidity measured / local total air humidity possible ) Given an RH percentage, the density of water in the air is given by . Alternatively, RH can be found by . As relative humidity is a dimensionless quantity (often expressed in terms of a percentage), vapor density can be stated in units of grams or kilograms per cubic meter.
For low temperatures (below approximately 400 K), SVD can be approximated from the SVP by the ideal gas law: where is the SVP, is the volume, is the number of moles, is the gas constant and is the temperature in kelvins. The number of moles is related to density by , where is the mass of water present and is the molar mass of water (18.01528 grams/mole). Thus, setting to 1 cubic meter, we get = = density.
The values shown at hyperphysics-sources indicate that the saturated vapor density is 4.85 g/m3 at 273 K, at which the saturated vapor pressure is 4.58 mm of Hg or 610.616447 Pa (760 mm of Hg ≈ 1 atm = 1.01325 * 105 Pa).
Therefore, for particular mole number and volume the saturated vapor pressure will not change if the temperature remains constant. |
https://en.wikipedia.org/wiki/Ulnar%20collateral%20ligament%20injury%20of%20the%20elbow | Ulnar collateral ligament injuries can occur during certain activities such as overhead baseball pitching. Acute or chronic disruption of the ulnar collateral ligament result in medial elbow pain, valgus instability, and impaired throwing performance. There are both non-surgical and surgical treatment options.
Signs and symptoms
Pain along the inside of the elbow is the main symptom of this condition. Throwing athletes report it occurs most often during the acceleration phase of throwing. The injury is often associated with an experience of a sharp “pop” in the elbow, followed by pain during a single throw. In addition, swelling and bruising of the elbow, loss of elbow range of motion, and a sudden decrease in throwing velocity are all common symptoms of a UCL injury. If the injury is less severe, pain can alleviate with complete rest.
Causes
The UCL stabilizes the elbow from being abducted during a throwing motion. If intense or repeated bouts of valgus stress occur on the UCL, injury may occur. Damage to the UCL is common among baseball pitchers and javelin throwers because the throwing motion is similar. Physicians believe repetitive movements, especially pitching in baseball, cause UCL injuries. Furthermore, physicians have stated that if an adolescent throws over 85 throws for 8 months or more in a year, or throws when exhausted, the adolescent has a significantly higher risk of UCL injury.
Gridiron football, racquet sports, ice hockey and water polo players have also been treated for damage to the UCL. Specific overhead movements like those that occur during baseball pitching, tennis serving or volleyball spiking increase the risk of UCL injury. During the cocking phase of pitching, the shoulder is horizontally abducted, externally rotated and the elbow is flexed. There is slight stress on the UCL in this position but it increases when the shoulder is further externally rotated in a throw. The greater the stress the more the UCL is stretched causing stra |
https://en.wikipedia.org/wiki/Cortina%20Systems | Cortina Systems, Inc. is a supplier of integrated circuits (ICs) for broadband communications founded in 2001. It is based in California.
Cortina System was bought by Inphi Corporation in 2014.
History
Cortina Systems was founded by Amir Nayyerhabibi (who served as president and CEO) in 2001 in the Menlo Park, California library, located in Silicon Valley.
It has development centers in USA, Canada, China, Taiwan, Israel.
Cortina’s product line spans computer and telecommunication networking: the company has products for core, enterprise, metropolitan high-speed networks, as well as products for the digital home networks. Products include:
Ethernet: 1-, 2-, and 4-port 10Gbit/s Ethernet MACs; 4-, 10-, 12-, and 24-port 1Gbit/s Ethernet MACs
Transport: 2.5Gbit/s, 10Gbit/s and 40Gbit/s FEC/OTN Framers; 100Gbit/s FEC/OTN/Ethernet Framer; 2.5G and 10Gbit/s VCAT framer
Framer: SONET/SDH POS, ATM, and GFP framer for OC-3 to OC-192 with integrated SerDes; RPR framer, RPR bridge
Access: 4-port EPON OLT, EPON ONU
PHY: 10Mbit/s transceiver; 1-, 2-, 4-, and 8-port Fast Ethernet transceivers: 6- and 8-port Fast Ethernet repeaters
T1/E1: 1-, 4-, and 8-port T1/E1/J1 transceivers and repeaters; OC3 transceiver
Digital Home Processor: Multi-core, Storage, Security
In 2006 it announced the Interlaken protocol with Cisco Systems.
Manufacturing
Cortina is a fabless semiconductor company. It outsources all semiconductor manufacturing to merchant foundries. The company is based in Sunnyvale, California. It also has other research and development sites in Hsinchu (Taiwan), Ottawa (Canada), Raleigh (USA) and Shanghai (China).
Acquisitions
Cortina has acquired several companies. In October 2014 Cortina was acquired by Inphi Corporation, with the exception of Cortina’s Access and Digital Home business. |
https://en.wikipedia.org/wiki/Revista%20Colombiana%20de%20Estad%C3%ADstica | The Revista Colombiana de Estadística (English: Colombian Journal of Statistics) is a biannual peer-reviewed scientific journal on statistics published by the National University of Colombia. It covers research on statistics, including applications, statistics education, and the history of statistics.
History
The Revista Colombiana de Estadística was established in 1968. During the first years, the journal only published papers in Spanish but since 1985 it also publishes papers in English. The journal stopped publication between 1969 and 1979. In 1979, it was relaunched by Luis Thorin and since 1981 the publication has been continuous with two issues per year. Recently, since 2011 the Journal only publishes articles in English language.
Abstracting and indexing
The Revista Colombiana de Estadística is abstracted and indexed in Scopus, SciELO, Current Index to Statistics, Mathematical Reviews, Zentralblatt MATH, Redalyc, Latindex, and Publindex (category A1). According to the Journal Citation Reports, the journal has a 2014 impact factor of 0.179.
See also
Comparison of statistics journals
List of statistics journals |
https://en.wikipedia.org/wiki/Geoffrey%20K.%20Martin | Geoffrey K. Martin is a mathematician currently advising in the field of mathematical physics. Martin is also the Associate Professor and Chair of the mathematics department at the University of Toledo. His fields of study include differential geometry, relativity, and the foundations of physics. Martin earned his Ph.D. at the Stony Brook University in 1983. Geoffrey is the son of horticulturists Joy Lee Martin and Ernest Martin who owned Logee's Greenhouses.
External links
University of Toledo, Department of Mathematics, Faculty Directory
University of Toledo, Department of Mathematics, Faculty Research Interests
Year of birth missing (living people)
Living people
20th-century American mathematicians
21st-century American mathematicians
Differential geometers
University of Toledo faculty
Stony Brook University alumni
Mathematicians from Ohio |
https://en.wikipedia.org/wiki/Mastika | Mastika or mastiha is a liqueur seasoned with mastic, a resin with a slightly pine or cedar-like flavor gathered from the mastic tree, a small evergreen tree native to the Mediterranean region. In Greece, mastiha () or mastichato () is a sweet liqueur produced with the mastika resin from the Greek island of Chios, which is distilled after hardening to crystals. Sugar is typically added. It is a sweet liqueur that is typically consumed at the end of a meal. It has a distinctive flavor, reminiscent of pine and herbs. It is claimed to have medicinal properties and to aid digestion.
In August of 2012, wildfires spread across the island of Chios, scorching and destroying more than half of the island's mastic orchards. Because the product has a "protected designation of origin" from the European Union, the fire not only impacted local Chios farmers, who lost approximately 60 percent of their crops, but also derailed the global supply of the product.
Chios Mastiha
Chios Mastiha Liqueur (, ) is a liqueur flavoured with mastic distillate or mastic oil from the island of Chios. The name Chios Mastiha has protected designation of origin status in the European Union. Chios Mastiha liqueur is clear with a sweet aroma. It is traditionally served cold.
Production
The process is regulated by Greek law and includes the flavouring of alcohol with mastic oil by agitation or the distillation of mastic with alcohol. The solution is then diluted with water and sweetened with sugar. The final alcoholic strength by volume of Chios Mastiha must be at least 15%.
Flavouring
The only flavouring agents used in Chios Mastiha liqueur are an alcoholic distillate of mastic or mastic oil made from Chios mastic. Mastic is the hardened sap harvested from the mastic tree, Pistacia lentiscus var chia, a small evergreen shrub that grows on rocky terrain on the southern part of the island. Chios mastic is certified by the Agricultural Products Certification and Supervision Organization as part of |
https://en.wikipedia.org/wiki/Excess%20mortality | In epidemiology, the excess deaths or excess mortality is a measure of the increase in the number deaths during a time period and/or in a certain group, as compared to the expected value or statistical trend during a reference period (typically of five years) or in a reference population. It may typically be measured in percentage points, or in number of deaths per time unit.
A short period of excess mortality that is followed by a compensating period of mortality deficit (i.e., fewer deaths than expected, because those people have died at a younger age) is quite common, and is also known as "harvesting". Mortality deficit in a particular time period can be caused by deaths displaced to an earlier time (due to harvesting by an event in the past) or deaths displaced to a future time (due to lives being saved, also called "avoided mortality").
Mortality displacement is the occurrence of deaths at an earlier time than they would have otherwise occurred, meaning the deaths are displaced from the future into the present, resulting in a changed life expectancy.
As opposed to number of registered fatalities of a certain death cause, such as a specific virus, a temporary excess mortality, and the mortality displacement, are measures that reflect many combined causes. The dominant reason may be events such as heat waves, cold spells, epidemics and pandemics (especially influenza pandemics), famine or war, and allows for estimates of the mortality caused by those events combined with other indirect health effects. Excess mortality is also studied for certain groups of people, such as elder, men, unemployed, etcetera.
Heat waves
During heat waves, for instance, there are often additional deaths observed in the population, affecting especially older adults and those who are sick. After some periods with excess mortality, however, there has also been observed a decrease in overall mortality during the subsequent weeks. Such short-term forward shift in mortality rate is also |
https://en.wikipedia.org/wiki/Belgian%20Co-ordinated%20Collections%20of%20Micro-organisms | The Belgian Co-ordinated Collections of Micro-organisms (BCCM) is a Belgian government funded consortium of seven scientific institutions, who manage and exploit a collection of microbial and genetic resources. The consortium comprises more than 269,000 publicly available strains of bacteria including mycobacteria and cyanobacteria, filamentous fungi, yeasts, diatoms and plasmids.
BCCM is embedded in international initiatives such as the World Federation of Culture Collections (WFCC) and operates in compliance with the rules of the Nagoya Protocol.
History
In 1983 the Belgian Council of Ministers decided to bring the microbial resources and the expertise available in different Belgian institutes together in a network of culture collections: with this the consortium of Belgian Co-ordinated Collections of Microorganisms (BCCM) saw the light of day.
In 1983, the BCCM consortium consisted of the microbial collections of one public scientific institution and two universities:
the collection of medical yeasts and fungi of the Mycology Laboratory of Sciensano (former Scientific Institute of Public Health) (BCCM/IHEM)
the collection of filamentous fungi, yeasts and arbuscular mycorrhizal fungi of the Université catholique de Louvain (BCCM/MUCL)
the bacteria collection of the Laboratory for Microbiology of the Faculty of Sciences of the Ghent University (BCCM/LMG).
In 1990 the plasmid collection of the Laboratory of Molecular Biology of Ghent University was added to the consortium (BCCM/GeneCorner).
In 2011, 3 additional dedicated collections were included in the BCCM consortium:
the diatom collection of the Laboratory for Protistology & Aquatic Ecology of Ghent University (BCCM/DCG)
the mycobacteria collection of the Institute of Tropical Medicine in Antwerp (BCCM/ITM)
the cyanobacteria collection of the Centre for Protein Engineering of the University of Liège (BCCM/ULC).
Collection
Micro-organisms are an important raw material in biotechnology. The propertie |
https://en.wikipedia.org/wiki/Shiva%20Corporation | Shiva Corporation was a company that specialized in computer networking and associated equipment, in particular remote access products. The company was founded in 1985, in Cambridge, Massachusetts, United States. Shiva was co-founded by Massachusetts Institute of Technology (MIT) graduates Frank Slaughter and by Daniel J. Schwinn, the current president and CEO of Avidyne Corporation.
Shiva added to its product portfolio with the acquisition of FastPath, an AppleTalk/Ethernet Gateway from Novell Inc. in 1990.
Shiva acquired the British network products company Spider Systems in 1995, which became Shiva Europe Ltd.
In 1996, Shiva acquired the Cupertino, California-based remote networking software supplier AirSoft Inc for around 65 million USD. This acquisition gave Shiva AirSoft's Powerburst software, which aimed to improve remote-access performance (speed and accuracy) by cacheing files on the client and validating data in the cache prior to fulfilling subsequent access requests. AirSoft's president at the time was Jagdeep Singh, who went on to co-found QuantumScape in 2010.
Users of 16-bit Internet Explorer on Windows 3 with dial-up connections saw the Shiva name regularly, as the company provided part of the dial-up TCP/IP stack for 16-bit Internet Explorer versions 3, 4 and 5.
In October 1998 Shiva was acquired by Intel and became part of the Intel Network Products Division. Intel's acquisition of Shiva took place during a lengthy class-action lawsuit in which it was alleged that Shiva hid information concerning the deterioration of the company. The lawsuit was settled in 1999 with Shiva agreeing to pay 4.35 million USD.
In November 2002 it was acquired by Simple Access Inc., which adopted the Shiva Corporation identity. A year later, the company was acquired by Mernet Secure Network. Mernet were subsequently acquired by Eicon Networks in February 2004. Since 2006, Eicon are now known as Dialogic Corporation. |
https://en.wikipedia.org/wiki/ALEKS | ALEKS (Assessment and Learning in Knowledge Spaces) is an online tutoring and assessment program that includes course material in mathematics, chemistry, introductory statistics, and business.
Rather than being based on numerical test scores, ALEKS uses the theory of knowledge spaces to develop a combinatorial understanding of the set of topics a student does or doesn't understand from the answers to its test questions. Based on this assessment, it determines the topics that the student is ready to learn and allows the student to choose from interactive learning modules for these topics.
ALEKS was initially developed at UC Irvine starting in 1994 with support from a large National Science Foundation grant. The software was granted by UC Irvine's Office of Technology Alliances to ALEKS Corporation under an exclusive, worldwide, perpetual license. In 2013, the ALEKS Corporation was acquired by McGraw-Hill Education.
Subjects covered
ALEKS is available for a variety of courses and subjects that cover K-12, higher education, and continuing education, ranging from basic arithmetic and chemistry to pre-calculus and MBA financial accounting preparation.
Notes |
https://en.wikipedia.org/wiki/Sputnik%20virophage | Mimivirus-dependent virus Sputnik (from Russian "satellite") is a subviral agent that reproduces in amoeba cells that are already infected by a certain helper virus; Sputnik uses the helper virus's machinery for reproduction and inhibits replication of the helper virus. It is known as a virophage, in analogy to the term bacteriophage.
Viruses like Sputnik that depend on co-infection of the host cell by helper viruses are known as satellite viruses. At its discovery in a Paris water-cooling tower in 2008, Sputnik was the first known satellite virus that inhibited replication of its helper virus and thus acted as a parasite of that virus. In analogy, it was called a virophage.
Sputnik virophages were found infecting giant viruses of Mimiviridae group A. However, they are able to grow in amoebae infected by Mimiviridae of any of the groups A, B, and C.
Virology
Sputnik was first isolated in 2008 from a sample obtained from humans; it was harvested from the contact lens fluid of an individual with keratitis. Naturally however, the Sputnik virophage has been found to multiply inside species of the opportunistically pathogenic protozoan Acanthamoeba, but only if that amoeba is infected with the large mamavirus. Sputnik harnesses the mamavirus proteins to rapidly produce new copies of itself.
Mamavirus is formally known as Acanthamoeba polyphaga mimivirus (APMV) and is a close relative of the previously known mimivirus. The mimivirus is a giant in the viral world; it has more genes than many bacteria and performs functions that normally occur only in cellular organisms. The mamavirus is even larger than the mimivirus, but the two are very similar in that they form large viral factories and complex viral particles. There are conditions in which Sputnik cannot produce new virions within these viruses however. It has been observed that when Mimivirus is cultured with germ-free amoeba, bald virions are produced that lack the surface fibers that are characteristic of th |
https://en.wikipedia.org/wiki/Project%20Gyanodaya | Gyanodaya is an e-learning platform launched by Godda District Administration of Government of Jharkhand in collaboration with Eckovation and Adani Foundation. Under this program, the state government schools in the tribal areas of Jharkhand are connected with smart classroom.
History
The project was launched in 2018 to encourage students to attend schools regularly to solve the problem of absenteeism which is a major issue due to onset of monsoon.This initiative also aims to provide online education in government schools for class 6 to 12 in subjects like science and mathematics. The use of audiovisual education medium via web has resulted into achieving higher attendance.
COVID-19 Disruption
During the COVID-19 disruption in 2020 when schools were closed as a part of state's pandemic mitigating guidelines, the online classes model by Gyanodaya was broadcast on Doordarshan's DD Jharkhand channel as a part of state government’s efforts to continue education, reaching out to over 5 million students in the state.
During COVID-19 pandemic, the state government distributed 43,977 tablets via Project Gyanodaya to 38,000 state-run schools.
Awards and recognition
In June 2021, the United Nations Development Programme, India’s 'Aspirational District Programme: An Appraisal' that measures the impact of flagship programmes making defining difference to sustainable development goals, recognized the Gyanodaya platform for mitigating urban-rural divides through digital education.
See also
Project Nanhi Kali, an Indian non-governmental organisation
Khan Academy |
https://en.wikipedia.org/wiki/Electrophoresis%20%28journal%29 | Electrophoresis is a peer-reviewed scientific journal covering all aspects of electrophoresis, including new or improved analytical and preparative methods, development of theory, and innovative applications of electrophoretic methods in the study of proteins, nucleic acids, and other compounds.
Abstracting and indexing
The journal is abstracted and indexed in:
According to the Journal Citation Reports, the journal has a 2020 impact factor of 3.535, ranking it 27th out of 87 journals in the category "Chemistry, Analytical" and 29th out of 78 in the category "Biochemical Research Methods". |
https://en.wikipedia.org/wiki/KoVariome | KoVariome is the variome of Korean ethnic groups. It was initiated in 2010 when the Genome Research Foundation in Korea was established. KoVariome has produced around 100 Korean genome diversity data on 4 April 2018 in Scientific Reports and 1,094 Korean genome variation information on 27 May 2020. |
https://en.wikipedia.org/wiki/Grand%20Theft%20Auto%20clone | A Grand Theft Auto clone (often shortened to GTA clone) is a subgenre of open world action-adventure video games, characterized by their likeness to the Grand Theft Auto series in either gameplay, or overall design. In these types of open world games, players may find and use a variety of vehicles and weapons while roaming freely in an open world setting. The objective of Grand Theft Auto clones is to complete a sequence of core missions involving driving and shooting, but often side-missions and minigames are added to improve replay value. The storylines of games in this subgenre typically have strong themes of crime, violence and other controversial elements such as drugs and sexually explicit content.
The subgenre has its origins in open world action adventure games popularized in Europe (and particularly the United Kingdom) throughout the 1980s and 1990s. The release of Grand Theft Auto (1997) marked a major commercial success for open-ended game design in North America, and featured a more marketable crime theme. But it was the popularity of its 3D sequel Grand Theft Auto III in 2001 that led to the widespread propagation of a more specific set of gameplay conventions consistent with a subgenre. The subgenre now includes many games from different developers all over the world where the player can control wide ranges of vehicles and weapons. The subgenre has evolved with greater levels of environmental detail and more realistic behaviors.
As usage of the term "clone" often has a negative connotation and can be seen as controversial, reviewers have come up with other names for the subgenre. Similar terminology for other genres, such as "[[Platform game#Naming|Donkey Kong-type]]" and "Doom clone", has given way to more neutral language. Names such as "sandbox game," however, are applied to a wider range of games that do not share key features of the Grand Theft Auto series.
Definition
A Grand Theft Auto clone is a video game that falls within the genre populari |
https://en.wikipedia.org/wiki/Capoid%20race | Capoid race is a grouping formerly used for the Khoikhoi and San peoples in the context of a now-outdated model of dividing humanity into different races. The term was introduced by Carleton S. Coon in 1962 and named for the Cape of Good Hope. Coon proposed that the term "Negroid" should be abandoned, and the sub-Saharan African populations of West African stock (including the Bantu) should be termed "Congoid" instead.
The observation of a significant difference between the Khoisan and the populations of West African stock was not original to Coon. It had been noted as early as 1684 by François Bernier, the early modern author who originally introduced the French word race to refer to the large divisions of mankind. Bernier, outside of five large divisions described in more detail, proposed the possible addition of more categories, primarily for "the Blacks of the Cape of Good Hope" (les Noirs du Cap de bonne Esperance), which seemed to him to be of significantly different build from most other populations below the Sahara. |
https://en.wikipedia.org/wiki/Bimorph | A bimorph is a cantilever used for actuation or sensing which consists of two active layers. It can also have a passive layer between the two active layers. In contrast, a piezoelectric unimorph has only one active (i.e. piezoelectric) layer and one passive (i.e. non-piezoelectric) layer.
Piezoelectric bimorph
The term bimorph is most commonly used with piezoelectric bimorphs. In actuator applications, one active layer contracts and the other expands if voltage is applied, thus the bimorph bends. In sensing applications, bending the bimorph produces voltage which can for example be used to measure displacement or acceleration. This mode can also be used for energy harvesting.
Bimetal bimorph
A bimetal could be regarded as a thermally activated bimorph. The first theory about the bending of thermally activated bimorphs was given by Stoney. Newer developments also enabled electrostatically activated bimorphs for the use in microelectromechanical systems.
See also
Shape-memory alloy |
https://en.wikipedia.org/wiki/Computer%20algebra%20system | A computer algebra system (CAS) or symbolic algebra system (SAS) is any mathematical software with the ability to manipulate mathematical expressions in a way similar to the traditional manual computations of mathematicians and scientists. The development of the computer algebra systems in the second half of the 20th century is part of the discipline of "computer algebra" or "symbolic computation", which has spurred work in algorithms over mathematical objects such as polynomials.
Computer algebra systems may be divided into two classes: specialized and general-purpose. The specialized ones are devoted to a specific part of mathematics, such as number theory, group theory, or teaching of elementary mathematics.
General-purpose computer algebra systems aim to be useful to a user working in any scientific field that requires manipulation of mathematical expressions. To be useful, a general-purpose computer algebra system must include various features such as:
a user interface allowing a user to enter and display mathematical formulas, typically from a keyboard, menu selections, mouse or stylus.
a programming language and an interpreter (the result of a computation commonly has an unpredictable form and an unpredictable size; therefore user intervention is frequently needed),
a simplifier, which is a rewrite system for simplifying mathematics formulas,
a memory manager, including a garbage collector, needed by the huge size of the intermediate data, which may appear during a computation,
an arbitrary-precision arithmetic, needed by the huge size of the integers that may occur,
a large library of mathematical algorithms and special functions.
The library must not only provide for the needs of the users, but also the needs of the simplifier. For example, the computation of polynomial greatest common divisors is systematically used for the simplification of expressions involving fractions.
This large amount of required computer capabilities explains the small number o |
https://en.wikipedia.org/wiki/258%20%28number%29 | 258 (two hundred [and] fifty-eight) is the natural number following 257 and preceding 259.
In mathematics
258 is:
a sphenic number
a nontotient
the sum of four consecutive prime numbers because 258 = 59 + 61 + 67 + 71
63 + 62 + 6
an Ulam number |
https://en.wikipedia.org/wiki/Felix%20Browder | Felix Earl Browder (; July 31, 1927 – December 10, 2016) was an American mathematician known for his work in nonlinear functional analysis. He received the National Medal of Science in 1999 and was President of the American Mathematical Society until 2000. His two younger brothers also became notable mathematicians, William Browder (an algebraic topologist) and Andrew Browder (a specialist in function algebras).
Early life and education
Felix Earl Browder was born in 1927 in Moscow, Russia, while his American father Earl Browder, born in Wichita, Kansas, was living and working there. He had gone to the Soviet Union in 1927. His mother was Raissa Berkmann, a Russian Jewish woman from St. Petersburg whom Browder met and married while living in the Soviet Union. As a child, Felix Browder moved with his family to the United States, where his father Earl Browder for a time was head of the American Communist Party and ran for US president in 1936 and 1940. A 1999 book by Alexander Vassiliev, published after the fall of the Soviet Union, said that Earl Browder was recruited in the 1940s as a spy for the Soviet Union.
Felix Browder was a child prodigy in mathematics; he entered MIT at age 16 in 1944 and graduated in 1946 with his first degree in mathematics. In 1946, at MIT he achieved the rank of a Putnam Fellow in the William Lowell Putnam Mathematical Competition. In 1948 (at age 20), he received his doctorate from Princeton University.
Career
Browder had an academic career, encountering difficulty in the 1950s in getting work during the McCarthy era because of his father's communist activities.
Browder headed the University of Chicago's mathematics department for 12 years. He also held posts at MIT, Boston University, Brandeis and Yale. In 1986 he became the first vice president for research at Rutgers University.
Browder received the 1999 National Medal of Science. He also served as president of the American Mathematical Society from 1999 to 2000.
In his outgoi |
https://en.wikipedia.org/wiki/Omega%20loop | The omega loop is a non-regular protein structural motif, consisting of a loop of six or more amino acid residues and any amino acid sequence. The defining characteristic is that residues that make up the beginning and end of the loop are close together in space with no intervening lengths of regular secondary structural motifs. It is named after its shape, which resembles the upper-case Greek letter Omega (Ω).
Structure
Omega loops, being non-regular, non-repeating secondary structural units, have a variety of three-dimensional shapes. Omega loop shapes are analyzed to identify recurring patterns in dihedral angles and overall loop shape to help identify potential roles in protein folding and function.
Since loops are almost always at the protein surface, it is often assumed that these structures are flexible; however, different omega loops exhibit ranges of flexibility across different time scales of protein motion and have been identified as playing a role in the folding of some proteins, including HIV-1 reverse transcriptase; cytochrome c; and nucleases.
Function
Omega loops can contribute to protein function. For example, omega loops can help stabilize interactions between protein and ligand, such as in the enzyme triose phosphate isomerase, and can directly affect protein function in other enzymes. A heritable coagulation disorder is caused by a single-site mutation in an omega loop of protein C.
Likewise, omega loops play an interesting role in the function of the beta-lactamases: mutations in the "omega loop region" of a beta-lactamase can change its specific function and substrate profile, perhaps due to an important functional role of the correlated dynamics of the region.
Cytochrome c
Omega loops have long been recognized also for their importance in the function and folding of the protein cytochrome c, contributing both key functional residues and well as important dynamic properties. Many researchers have studied omega loop function and dynamics in |
https://en.wikipedia.org/wiki/ISS%20ECLSS | The International Space Station Environmental Control and Life Support System (ECLSS) is a life support system that provides or controls atmospheric pressure, fire detection and suppression, oxygen levels, waste management and water supply. The highest priority for the ECLSS is the ISS atmosphere, but the system also collects, processes, and stores both waste and water produced and used by the crew—a process that recycles fluid from the sink, shower, toilet, and condensation from the air.
The Elektron system aboard Zvezda and a similar system in Destiny generate oxygen aboard the station.
The crew has a backup option in the form of bottled oxygen and Solid Fuel Oxygen Generation (SFOG) canisters.
Carbon dioxide is removed from the air by the Vozdukh system in Zvezda, one Carbon Dioxide Removal Assembly (CDRA) located in the U.S. Lab module, and one CDRA in the U.S. Node 3 module. Other by-products of human metabolism, such as methane from flatulence and ammonia from sweat, are removed by activated charcoal filters or by the Trace Contaminant Control System (TCCS).
Water recovery systems
The ISS has two water recovery systems. Zvezda contains a water recovery system that processes water vapor from the atmosphere that could be used for drinking in an emergency but is normally fed to the Elektron system to produce oxygen. The American segment has a Water Recovery System installed during STS-126 that can process water vapour collected from the atmosphere and urine into water that is intended for drinking. The Water Recovery System was installed initially in Destiny on a temporary basis in November 2008 and moved into Tranquility (Node 3) in February 2010.
The Water Recovery System consists of a Urine Processor Assembly and a Water Processor Assembly, housed in two of the three ECLSS racks.
The Urine Processor Assembly uses a low pressure vacuum distillation process that uses a centrifuge to compensate for the lack of gravity and thus aid in separating liquids and g |
https://en.wikipedia.org/wiki/Vanna%E2%80%93Volga%20pricing | The Vanna–Volga method is a mathematical tool used in finance. It is a technique for pricing first-generation exotic options in foreign exchange market (FX) derivatives.
Description
It consists of adjusting the Black–Scholes theoretical value (BSTV)
by the cost of a portfolio which hedges three main risks
associated to the volatility of the option: the Vega , the Vanna
and the Volga.
The Vanna is the sensitivity of the Vega with respect to a change in the spot FX rate:
.
Similarly, the Volga is the sensitivity
of the Vega with respect to a change of the implied volatility
:
.
If we consider a smile volatility term structure with ATM strike , ATM volatility , 25-Delta call/put volatilities , and where are the 25-Delta
call/put strikes (obtained by solving the equations and where denotes the
Black–Scholes Delta sensitivity) then the hedging portfolio
will be composed of the at-the-money (ATM), risk-reversal (RR) and butterfly (BF)
strategies:
with the Black–Scholes price of a call option (similarly for the put).
The simplest formulation of the Vanna–Volga method suggests that the
Vanna–Volga price of an exotic instrument is
given by
where by denotes the Black–Scholes price of the
exotic and the Greeks are calculated with ATM volatility and
These quantities represent a smile cost, namely the
difference between the price computed with/without including the
smile effect.
The rationale behind the above formulation of the Vanna-Volga price is that one can extract
the smile cost of an exotic option by measuring the
smile cost of a portfolio designed to hedge its Vanna and
Volga risks. The reason why one chooses the strategies BF and RR
to do this is because they are liquid FX instruments and they
carry mainly Volga, and respectively Vanna risks. The weighting
factors and represent
respectively the amount of RR needed to replicate the option's
Vanna, and the amount of BF needed to replicate the option's
Volga. The above approach ignores the small (but n |
https://en.wikipedia.org/wiki/Lov%20Grover | Lov Kumar Grover (born 1961) is an Indian-American computer scientist. He is the originator of the Grover database search algorithm used in quantum computing. Grover's 1996 algorithm won renown as the second major algorithm proposed for quantum computing (after Shor's 1994 algorithm), and in 2017 was finally implemented in a scalable physical quantum system. Grover's algorithm has been the subject of numerous popular science articles.
Grover received his bachelor's degree from the Indian Institute of Technology, Delhi in 1981 and his PhD in Electrical engineering from Stanford University in 1985. In 1984, he went to Bell Laboratories. He worked as a visiting professor at Cornell University from 1987 to 1994. He retired in 2008 becoming an independent researcher.
Publications
Grover L.K.: A fast quantum mechanical algorithm for database search, Proceedings, 28th Annual ACM Symposium on the Theory of Computing, (May 1996) p. 212
Grover L.K.: From Schrödinger's equation to quantum search algorithm, American Journal of Physics, 69(7): 769–777, 2001. Pedagogical review of the algorithm and its history.
Grover L.K.: Quantum Computing: How the weird logic of the subatomic world could make it possible for machines to calculate millions of times faster than they do today The Sciences, July/August 1999, pp. 24–30.
What's a Quantum Phone Book?, Lov Grover, Lucent Technologies |
https://en.wikipedia.org/wiki/Secular%20equilibrium | In nuclear physics, secular equilibrium is a situation in which the quantity of a radioactive isotope remains constant because its production rate (e.g., due to decay of a parent isotope) is equal to its decay rate.
In radioactive decay
Secular equilibrium can occur in a radioactive decay chain only if the half-life of the daughter radionuclide B is much shorter than the half-life of the parent radionuclide A. In such a case, the decay rate of A and hence the production rate of B is approximately constant, because the half-life of A is very long compared to the time scales considered. The quantity of radionuclide B builds up until the number of B atoms decaying per unit time becomes equal to the number being produced per unit time. The quantity of radionuclide B then reaches a constant, equilibrium value. Assuming the initial concentration of radionuclide B is zero, full equilibrium usually takes several half-lives of radionuclide B to establish.
The quantity of radionuclide B when secular equilibrium is reached is determined by the quantity of its parent A and the half-lives of the two radionuclide. That can be seen from the time rate of change of the number of atoms of radionuclide B:
where λA and λB are the decay constants of radionuclide A and B, related to their half-lives t1/2 by , and NA and NB are the number of atoms of A and B at a given time.
Secular equilibrium occurs when , or
Over long enough times, comparable to the half-life of radionuclide A, the secular equilibrium is only approximate; NA decays away according to
and the "equilibrium" quantity of radionuclide B declines in turn. For times short compared to the half-life of A, and the exponential can be approximated as 1.
See also
Bateman equation
Transient equilibrium |
https://en.wikipedia.org/wiki/Group%20selection | Group selection is a proposed mechanism of evolution in which natural selection acts at the level of the group, instead of at the level of the individual or gene.
Early authors such as V. C. Wynne-Edwards and Konrad Lorenz argued that the behavior of animals could affect their survival and reproduction as groups, speaking for instance of actions for the good of the species. In the 1930s, R.A. Fisher and J.B.S. Haldane proposed the concept of kin selection, a form of altruism from the gene-centered view of evolution, arguing that animals should sacrifice for their relatives, and thereby implying that they should not sacrifice for non-relatives. From the mid 1960s, evolutionary biologists such as John Maynard Smith, W. D. Hamilton, George C. Williams, and Richard Dawkins argued that natural selection acted primarily at the level of the gene. They argued on the basis of mathematical models that individuals would not altruistically sacrifice fitness for the sake of a group unless it would ultimately increase the likelihood of an individual passing on their genes. A consensus emerged that group selection did not occur, including in special situations such as the haplodiploid social insects like honeybees (in the Hymenoptera), where kin selection explains the behaviour of non-reproductives equally well, since the only way for them to reproduce their genes is via kin.
In 1994 David Sloan Wilson and Elliott Sober argued for multi-level selection, including group selection, on the grounds that groups, like individuals, could compete. In 2010 three authors including E. O. Wilson, known for his work on social insects especially ants, again revisited the arguments for group selection. They argued that group selection can occur when competition between two or more groups, some containing altruistic individuals who act cooperatively together, is more important for survival than competition between individuals within each group, provoking a strong rebuttal from a large group of |
https://en.wikipedia.org/wiki/CRFS | CRFS (Coherent Remote File System) is a network file system protocol by Zach Brown formerly of Oracle intended to leverage the Btrfs architecture to gain higher performance than existing protocols (such as NFS and SMB) and to expose Btrfs features such as snapshots to remote clients. The code is unmaintained.
If one is looking for a network file system on top of Btrfs, there are a number of options available, which are under active support and development, including Ceph, BeeGFS, GlusterFS, and Samba.
See also
Btrfs
Ceph
BeeGFS
GlusterFS |
https://en.wikipedia.org/wiki/Ultrasound%20attenuation%20spectroscopy | Ultrasound attenuation spectroscopy is a method for characterizing properties of fluids and dispersed particles. It is also known as acoustic spectroscopy.
There is an international standard for this method.
Measurement of attenuation coefficient versus ultrasound frequency yields raw data for further calculation of various system properties. Such raw data are often used in the calculation of the particle size distribution in heterogeneous systems such as emulsions and colloids. In the case of acoustic rheometers, the raw data are converted into extensional viscosity or volume viscosity.
Instruments that employ ultrasound attenuation spectroscopy are referred to as Acoustic spectrometers. |
https://en.wikipedia.org/wiki/Morphism%20of%20algebraic%20stacks | In algebraic geometry, given algebraic stacks over a base category C, a morphism of algebraic stacks is a functor such that .
More generally, one can also consider a morphism between prestacks; (a stackification would be an example.)
Types
One particular important example is a presentation of a stack, which is widely used in the study of stacks.
An algebraic stack X is said to be smooth of dimension n - j if there is a smooth presentation of relative dimension j for some smooth scheme U of dimension n. For example, if denotes the moduli stack of rank-n vector bundles, then there is a presentation given by the trivial bundle over .
A quasi-affine morphism between algebraic stacks is a morphism that factorizes as a quasi-compact open immersion followed by an affine morphism.
Notes |
https://en.wikipedia.org/wiki/Chirality%20%28journal%29 | Chirality is a monthly peer-reviewed scientific journal publishing original contributions of scientific work on the role of chirality in chemistry and biochemistry in respect to biological, chemical, materials, pharmacological, spectroscopic and physical properties. The editor-in-chief is
Nina Berova (Columbia University).
According to the Journal Citation Reports, the journal has a 2021 impact factor of 2.183. |
https://en.wikipedia.org/wiki/Idaeovirus | Idaeovirus is a genus of positive-sense ssRNA viruses that contains two species: Raspberry bushy dwarf virus (RBDV) and Privet idaeovirus. RBDV has two host-dependent clades: one for raspberries; the other for grapevines. Infections are a significant agricultural burden, resulting in decreased yield and quality of crops. RBDV has a synergistic relation with Raspberry leaf mottle virus, with co-infection greatly amplifying the concentration of virions in infected plants. The virus is transmitted via pollination with RBDV-infected pollen grains that first infect the stigma before causing systemic infection.
Virology
RBDV is non-enveloped with an isometric protein coat about 33 nanometres in diameter. Inside the protein coat is the viral genome, which is bipartite, with the RNA strands referred to as RNA-1 and RNA-2. RNA-1 is 5,449 nucleotides in length and contains one open reading frame (ORF) that encodes for a combined protein that has methyltransferase, helicase, and an RNA-dependent RNA polymerase domains. RNA-2 is 2,231 nucleotides in length and contains two ORFs, one at the 5' end and the other at the 3' end. The first ORF encodes for a cell-to-cell movement protein, while the second ORF is expressed as a subgenomic RNA strand. This strand, RNA-3, is 946 nucleotides in length and encodes for the coat protein. Infection has been shown to not occur if RNA-3 is either not present or is sufficiently damaged.
Life cycle
Viral replication is cytoplasmic. Entry into the host cell is achieved by penetration into the host cell. Replication follows the positive stranded RNA virus replication model. Positive stranded RNA virus transcription is the method of transcription. The virus exits the host cell by tubule-guided viral movement. Plants serve as the natural host. Transmission routes are pollen associated.
Diagnosis
Single-step reverse transcription polymerase chain reactions has been developed to detect RBDV. Viruses are enriched by antibodies in the PCR microwells, |
https://en.wikipedia.org/wiki/Non-abelian%20gauge%20transformation | In theoretical physics, a non-abelian gauge transformation means a gauge transformation taking values in some group G, the elements of which do not obey the commutative law when they are multiplied. By contrast, the original choice of gauge group in the physics of electromagnetism had been U(1), which is commutative.
For a non-abelian Lie group G, its elements do not commute, i.e. they in general do not satisfy
.
The quaternions marked the introduction of non-abelian structures in mathematics.
In particular, its generators ,
which form a basis for the vector space of infinitesimal transformations (the Lie algebra), have a commutation rule:
The structure constants quantify the lack of commutativity, and do not vanish. We can deduce that the structure constants are antisymmetric in the first two indices and real. The normalization is usually chosen (using the Kronecker delta) as
Within this orthonormal basis, the structure constants are then antisymmetric with respect to all three indices.
An element of the group can be expressed near the identity element in the form
,
where are the parameters of the transformation.
Let be a field that transforms covariantly in a given representation .
This means that under a transformation we get
Since any representation of a compact group is equivalent to a unitary representation, we take
to be a unitary matrix without loss of generality.
We assume that the Lagrangian depends only on the field and the derivative :
If the group element is independent of the spacetime coordinates (global symmetry), the derivative of the transformed
field is equivalent to the transformation of the field derivatives:
Thus the field and its derivative transform in the same way. By the unitarity of the representation,
scalar products like , or are invariant under global
transformation of the non-abelian group.
Any Lagrangian constructed out of such scalar products is globally invariant:
Gauge theories |
https://en.wikipedia.org/wiki/EasyEffects | EasyEffects (formerly known as PulseEffects) is a free and open-source GTK application for Unix-like systems which provides a large array of audio effects and filters to apply to input and output audio streams.
The application originally used the Pulseaudio sound server as it allowed effects to be added to audio streams with ease, however, now runs exclusively on the PipeWire sound server after a port in 2021.
It is published under the GPL-3.0-or-later license.
Overview
EasyEffects uses PipeWire to process incoming and outgoing audio streams independently and can apply various sound effects in the form of plug-ins made by different developer teams such as Calf Studio Gear, MDA.LV2 and GStreamer. All plugins have their own presets and can be applicable inside the suite rather than having to use a different mixer or executing a script from the command line.
Available output effects are limiter, autovolume, compressor of dynamic range, filter, 30 bands parametric equalizer, bass enhancer, exciter, reverbation, crossfeed, delay, maximizer and spectrum analyzer. Available input effects are WebRTC, limiter, compressor, filter, equalizer, deeser, reverbation, pitch shift and spectrum analyzer. |
https://en.wikipedia.org/wiki/Rose%20%28heraldry%29 | The rose is a common device in heraldry. It is often used both as a charge on a coat of arms and by itself as an heraldic badge. The heraldic rose has a stylized form consisting of five symmetrical lobes, five barbs, and a circular seed. The rose is one of the most common plant symbols in heraldry, together with the lily, which also has a stylistic representation in the fleur-de-lis.
The rose was the symbol of the English Tudor dynasty, and the ten-petaled Tudor rose (termed a double rose) is associated with England. Roses also feature prominently in the arms of the princely House of Lippe and on the seal of Martin Luther.
Appearance
The normal appearance of the heraldic rose is a five-petaled rose, mimicking the look of a wild rose on a hedgerow. It is shown singly and full-faced. It most commonly has yellow seeds in the center and five green barbs as backing; such a rose is blazoned as barbed and seeded proper. If the seeds and barbs are of a different colour, then the rose is barbed and seeded of that/those tinctures. The rose of Lippe shown below, for example, is blazoned a Rose Gules, barbed and seeded Or.
Some variations on the rose have been used. Roses may appear with a stem, in which case they are described as slipped or stalked. A rose with a stalk and leaves may also be referred to as a damask rose, stalked and leaved, as appearing on the Canting arms of the House of Rossetti.
Rose branches, slips, and leaves have occasionally appeared in arms alone, without the flower. A combination of two roses, one within the other, is termed a double rose, famously used by the Tudors.
A rose sometimes appears surrounded by rays, which makes it a rose-en-soleil (rose in the sun). A rose may be crowned. Roses may appear within a chaplet, a garland of leaves with four flowers. In badges, it is not uncommon for a rose to be conjoined with another device. Catherine of Aragon's famous badge was a pomegranate conjoined with the double rose of her husband, Henry VI |
https://en.wikipedia.org/wiki/Folate%20targeting | Folate targeting is a method utilized in biotechnology for drug delivery purposes. This Trojan Horse process, which was created by Drs. Christopher P. Leamon and Philip S. Low, involves the attachment of the vitamin, folate (folic acid), to a molecule/drug to form a "folate conjugate". Based on the natural high affinity of folate for the folate receptor protein (FR), which is commonly expressed on the surface of many human cancers, folate-drug conjugates also bind tightly to the FR and trigger cellular uptake via endocytosis. Molecules as diverse as small radiodiagnostic imaging agents to large DNA plasmid formulations have successfully been delivered inside FR-positive cells and tissues.
Background
Folic acid (FA, folate or vitamin B9), is a vital nutrient required by all living cells for nucleotide biosynthesis and for the proper metabolic maintenance of 1-carbon pathways. Aside from its cofactor role for intracellular enzymes, FA also displays high affinity for the folate receptor (FR), a glycosylphosphatidyinositol-linked protein that captures its ligands from the extracellular milieu and transports them inside the cell via a non-destructive, recycling endosomal pathway. The FR is also a recognized tumor antigen/biomarker. Because of this, diagnostic and therapeutic methods which exploit the FR's function are being developed for cancer.
The FR is an emerging therapeutic target for diagnosis and treatment of cancer and chronic inflammatory diseases. Expression of the FR is selectively upregulated on certain malignant cells and activated macrophages. Overexpression of the FR on these types of cells is clinically significant because they designate areas where the physiological symptoms of disease are most extensive. The malignant cells indicate the presence of tumors associated with ovarian, lung, breast, kidney, brain, endometrial, and colon cancer. Macrophages become activated in chronic diseases such as rheumatoid arthritis, Crohn's disease, ulcerative co |
https://en.wikipedia.org/wiki/I/O%20Acceleration%20Technology | I/O Acceleration Technology (I/OAT) is a DMA engine (an embedded DMA controller) by Intel bundled with high-end server motherboards, that offloads memory copies from the main processor by performing direct memory accesses (DMA). It is typically used for accelerating network traffic, but supports any kind of copy.
Using I/OAT for network acceleration is supported by Microsoft Windows since the release of Scalable Networking Pack for Windows Server 2003 SP1. However, it is no longer included in Windows from version 8 on-wards. It was used by the Linux kernel starting in 2006 but this feature was subsequently disabled due to an alleged lack of performance benefits while creating a possibility of data corruption.
See also |
https://en.wikipedia.org/wiki/History%20of%20the%20battery | Batteries provided the primary source of electricity before the development of electric generators and electrical grids around the end of the 19th century. Successive improvements in battery technology facilitated major electrical advances, from early scientific studies to the rise of telegraphs and telephones, eventually leading to portable computers, mobile phones, electric cars, and many other electrical devices.
Students and engineers developed several commercially important types of battery. "Wet cells" were open containers that held liquid electrolyte and metallic electrodes. When the electrodes were completely consumed, the wet cell was renewed by replacing the electrodes and electrolyte. Open containers are unsuitable for mobile or portable use. Wet cells were used commercially in the telegraph and telephone systems. Early electric cars used semi-sealed wet cells.
One important classification for batteries is by their life cycle. "Primary" batteries can produce current as soon as assembled, but once the active elements are consumed, they cannot be electrically recharged. The development of the lead-acid battery and subsequent "secondary" or "chargeable" types allowed energy to be restored to the cell, extending the life of permanently assembled cells. The introduction of nickel and lithium based batteries in the latter half of the 20th century made the development of innumerable portable electronic devices feasible, from powerful flashlights to mobile phones. Very large stationary batteries find some applications in grid energy storage, helping to stabilize electric power distribution networks.
Invention
From the mid 18th century on, before there were batteries, experimenters used Leyden jars to store electrical charge. As an early form of capacitor, Leyden jars, unlike electrochemical cells, stored their charge physically and would release it all at once. Many experimenters took to hooking several Leyden jars together to create a stronger charge and |
https://en.wikipedia.org/wiki/Iiyama%20%28company%29 | iiyama is a brand name of . It produces liquid crystal display (LCD) monitors and LED display panels. It was previously an independent Japanese computer electronics company called with its headquarters in Chiyoda-ku, Tokyo. Iiyama was founded in 1972 by Kazuro Katsuyama, named after the city of Iiyama in Nagano Prefecture, Japan. The company was bought in January 2006 by MCJ Corporation, which includes Mouse Computer Corporation. The headquarters of iiyama was moved to Europe in October 2008. The CEO since January 2006 has been Takeichi Shinji.
History
Founded in March 1972 as by 23-year-old bank employee Kazuro Katsuyama, it first started manufacturing television boards and substrates for Mitsubishi at a local plant in Nagano Prefecture. They started producing black and white TVs in 1976 and color TVs in 1979, followed by computer monitors under its own brand name in 1981 which then became its main product range.
The company expanded to the western market in 1987 and in the 1990s opened up offices in Philadelphia, Germany, Poland, France, UK, Sweden, the Czech Republic, Taiwan, and its international head office in the Netherlands, where it is registered as Iiyama Benelux B.V. By 1993 it was the leading monitor supplier in Japan with a 21% market share. The first LCDs were released by iiyama in 1997.
In 2001 it merged with e-yama to create , and its headquarters moved to Nagano City. In 2006 holding company bought Iiyama and renamed it to , moving its base to Chūō, Tokyo. In October 2008 iiyama Corporation became part of Mouse Computer Co., Ltd., one of MCJ's companies.
See also
Iiyama Vision Master Pro series |
https://en.wikipedia.org/wiki/Refrigerated%20van | A refrigerated van (also called a refrigerated wagon) is a railway goods wagon with cooling equipment. Today they are designated by the International Union of Railways (UIC) as Class I.
History
The first wagons were cooled with ice that had been cut in winter from special pools or lakes. It was Gustavus Swift who succeed in the winter of 1877 for the first time in developing an efficient cooling system for railway wagons for Chicago businesses and meat producers. It circulated air through the ice and then through the entire wagon in order to cool it down. This system was the basis of the success of the Union Stock Yard, the Chicago slaughterhouses. The cooled wagons made it possible for the first time to transport the meat of slaughtered animals to the whole of the US. Later, manufactured ice was used, but this rapidly gave way to other means of cooling; the simplest was the substitution of normal (water) ice by dry ice. With the increasing reliability of combustion engines, engine-powered refrigerator vans emerged. There are even vans whose cooling is achieved by the evaporation of liquid gas.
Construction
Compared with machine-cooled vans, ice-cooled wagons have the disadvantage of uneven temperature control, because the cooling effect is only achieved by air circulation. On the other hand, machine-cooled wagons are expensive to maintain and operate, but can be set to the desired temperature and maintained at that temperature throughout the entire journey. They are also better suited to transporting goods at deep-freeze temperatures of around , whereas evaporators and ice-cooling are more suited to maintaining temperatures of around . Banana transport wagons with gas evaporators have an optimum internal temperature of In addition to proper refrigerated vans, there are covered wagons with thermal insulation and, in some cases, even those are equipped with refrigerating sets. These wagons can only operate at temperatures between , where a constant internal temp |
https://en.wikipedia.org/wiki/Dialgebra | In abstract algebra, a dialgebra is the generalization of both algebra and coalgebra. The notion was originally introduced by Lambek as "subequalizers". Many algebraic notions have previously been generalized to dialgebras. Dialgebra also attempts to obtain Lie algebras from associated algebras.
See also
F-algebra |
https://en.wikipedia.org/wiki/Smith%20number | In number theory, a Smith number is a composite number for which, in a given number base, the sum of its digits is equal to the sum of the digits in its prime factorization in the same base. In the case of numbers that are not square-free, the factorization is written without exponents, writing the repeated factor as many times as needed.
Smith numbers were named by Albert Wilansky of Lehigh University, as he noticed the property in the phone number (493-7775) of his brother-in-law Harold Smith:
4937775 = 3 · 5 · 5 · 65837
while
4 + 9 + 3 + 7 + 7 + 7 + 5 = 3 + 5 + 5 + (6 + 5 + 8 + 3 + 7)
in base 10.
Mathematical definition
Let be a natural number. For base , let the function be the digit sum of in base . A natural number with prime factorisation
is a Smith number if
Here the exponent is the multiplicity of as a prime factor of (also known as the p-adic valuation of ).
For example, in base 10, 378 = 21 · 33 · 71 is a Smith number since 3 + 7 + 8 = 2 · 1 + 3 · 3 + 7 · 1, and 22 = 21 · 111 is a Smith number, because 2 + 2 = 2 · 1 + (1 + 1) · 1.
The first few Smith numbers in base 10 are
4, 22, 27, 58, 85, 94, 121, 166, 202, 265, 274, 319, 346, 355, 378, 382, 391, 438, 454, 483, 517, 526, 535, 562, 576, 588, 627, 634, 636, 645, 648, 654, 663, 666, 690, 706, 728, 729, 762, 778, 825, 852, 861, 895, 913, 915, 922, 958, 985.
Properties
W.L. McDaniel in 1987 proved that there are infinitely many Smith numbers.
The number of Smith numbers in base 10 below 10n for n = 1, 2, ... is given by
1, 6, 49, 376, 3294, 29928, 278411, 2632758, 25154060, 241882509, ... .
Two consecutive Smith numbers (for example, 728 and 729, or 2964 and 2965) are called Smith brothers. It is not known how many Smith brothers there are. The starting elements of the smallest Smith n-tuple (meaning n consecutive Smith numbers) in base 10 for n = 1, 2, ... are
4, 728, 73615, 4463535, 15966114, 2050918644, 164736913905, ... .
Smith numbers can be constructed from factored repunits. , |
https://en.wikipedia.org/wiki/William%20V.%20Cruess%20Award | The William V. Cruess Award has been awarded every year since 1970. It is awarded for excellence in teaching in food science and technology and is the only award in which student members in the Institute of Food Technologists (IFT) can nominate. This award is named after William V. Cruess (1886-1968), a food science professor at the University of California, Berkeley and later at the University of California, Davis who was also the first ever IFT Award winner when he won the Nicholas Appert Award in 1942.
Award winners receive a bronze medal showing a side view of Cruess from the Northern California Section of IFT and a USD 3000 honorarium from the IFT office in Chicago, Illinois.
Winners |
https://en.wikipedia.org/wiki/Google%20Street%20View%20privacy%20concerns | Privacy advocates have objected to the Google Street View feature, pointing to photographs that show people leaving strip clubs, protesters at an abortion clinic, sunbathers in bikinis, cottagers at public parks, people picking up prostitutes, and people engaging in activities visible from public property which they do not wish to be photographed and have published online. Google maintains that the photos were taken from public property. However, this does not take into account that the Street View cameras take pictures from an elevated position, enabling them to look over hedges and walls designed to prevent some areas from being open to public view. Before launching the service, Google removed photos of domestic violence shelters, and additionally allows users to flag inappropriate or sensitive imagery for Google to review and remove. When the service was first launched, the process for requesting that an image be removed was not trivial. Google changed its policy to make removal more straightforward, but has since removed the option to request removal of an image, replacing it by an option to request blurring of an image. Images of potential break-ins, sunbathers, and individuals entering adult bookstores have, however, remained active and these images have been widely republished.
In Europe, the creation of Google Street View may not be legal in all jurisdictions. Some European countries have laws prohibiting the filming without consent of an individual on public property for the purpose of public display.
Google Street View blurs parts of images containing car number plates and human faces in order to protect privacy and anonymity.
Americas
Argentina
In Argentina, Street View cars started taking pictures four years later than originally planned. Initially, Google planned to start collecting images on the same day as in Brazil but they didn't get government permits. These permits were obtained in September 2013. One day after Google Street View cars started |
https://en.wikipedia.org/wiki/Archenteron | The archenteron, also called the gastrocoel or the primitive digestive tube, is the internal cavity of the primitive gastrointestinal tract that forms during gastrulation in a developing animal embryo. It develops into the endoderm and mesoderm of the animal.
Formation in sea urchins
As primary mesenchyme cells detach from the vegetal pole in the gastrula and enter the fluid-filled cavity in the center (the blastocoel), the remaining cells at the vegetal pole flatten to form a vegetal plate. This buckles inwards towards the blastocoel in a process called invagination. The cells continue to be rearranged until the shallow dip formed by invagination transforms into a deeper, narrower pouch formed by the gastrula's endoderm. This pouch narrows and lengthens to become the archenteron, a process driven by convergent extension. The open end of the archenteron is called the blastopore.
The filopodia—thin fibers formed by the mesenchyme cells, found in late gastrulation—contract to drag the tip of the archenteron across the blastocoel. The endoderm of the archenteron will fuse with the ectoderm of the blastocoel wall. At this point gastrulation is complete, and the embryo has a functional digestive tube.
Similar formation process in other animals
The indentation that is actually formed is called the lip of the blastopore or the dorsal lip in amphibians and fish, and the primitive streak in birds and mammals. Each is controlled by the dorsal lip and primitive node (also known as Hensen's node), respectively.
During gastrulation, the archenteron develops into the digestive tube, with the blastopore developing into either the mouth (in protostomes) or the anus (in deuterostomes).
External links
Diagram
Animal developmental biology |
https://en.wikipedia.org/wiki/SNX8 | The SNX8 is a sorting nexin protein involved in intracellular molecular traffic from the early endosomes to the TGN. It is suggested that it acts as an adaptor protein in events related to immune response and cholesterol regulation, for example. As a protein of the SNXs family, the SNX8 is formed of 465 aminoacids and presents a BAR-domain and a PX-domain which are very relevant in relation to its functions. Furthermore, SNX8 study is motivated by its medical significance in relation to diseases such as Alzheimer's Disease, cancer, neurodevelopmental malformations and to its role in fighting against viral infections.
Structure
Sorting nexins (SNXs)
SNX8 belongs to the sorting nexin family of proteins, which mainly contain two functional membrane-binding that allow SNXs to have different roles in endosomal sorting and protein trafficking thanks to its membrane curvature ability. To begin with, SNX-PX is a distinct phosphoinositide (PI)-binding domain. The preferential interaction of this domain with membrane lipids makes the main function of SNX-PX the targeting of proteins to phosphatidylinositol-3-phosphate (PI(3)P) to endosomes. On the other hand, the BAR (Bin/amphiphysin/Rvs) domain is a key regulator of phosphoinositide-mediated, tubular-based endosomal sorting. Accordingly, this domain also dimerizes to sense, stabilize and induce membrane curvature. The SNX-BAR proteins that contain both domains are a part of phosphoinositide-enriched, high-curvature tubular micro-domains of the endo-lysosomal network.
The mammalian genome contains 12 genes coding for SNX-BAR proteins (SNX1, SNX2, SNX4, SNX9, SNX18, SNX32 and SNX33). Other domains, such as PDZ (postsynaptic density protein-95, discs-large, zona occludens-1), SH3 (Src homology 3) and RA (Ras-associated), are involved in protein-protein interactions.
SNX8
The SNX8 protein, even though is very similar to the other sorting nexins, presents a domain structure which resembles the most to SNX1's and SNX9's; fo |
https://en.wikipedia.org/wiki/Observer%20%28special%20relativity%29 | In special relativity, an observer is a frame of reference from which a set of objects or events are being measured. Usually this is an inertial reference frame or "inertial observer". Less often an observer may be an arbitrary non-inertial reference frame such as a Rindler frame which may be called an "accelerating observer".
The special relativity usage differs significantly from the ordinary English meaning of "observer". Reference frames are inherently nonlocal constructs, covering all of space and time or a nontrivial part of it; thus it does not make sense to speak of an observer (in the special relativistic sense) having a location. Also, an inertial observer cannot accelerate at a later time, nor can an accelerating observer stop accelerating.
Physicists use the term "observer" as shorthand for a specific reference frame from which a set of objects or events is being measured. Speaking of an observer in special relativity is not specifically hypothesizing an individual person who is experiencing events, but rather it is a particular mathematical context which objects and events are to be evaluated from. The effects of special relativity occur whether or not there is a sentient being within the inertial reference frame to witness them.
History
Einstein made frequent use of the word "observer" (Beobachter) in his original 1905 paper on special relativity and in his early popular exposition of the subject. However he used the term in its vernacular sense, referring for example to "the man at the railway-carriage window" or "observers who take the railway train as their reference-body" or "an observer inside who is equipped with apparatus". Here the reference body or coordinate system—a physical arrangement of metersticks and clocks which covers the region of spacetime where the events take place—is distinguished from the observer—an experimenter who assigns spacetime coordinates to events far from himself by observing (literally seeing) coincidences betwee |
https://en.wikipedia.org/wiki/Magnetocapacitance | Magnetocapacitance is a property of some dielectric, insulating materials, and metal–insulator–metal heterostructures that exhibit a change in the value of their capacitance when an external magnetic field is applied to them. Magnetocapacitance can be an intrinsic property of some dielectric materials, such as multiferroic compounds like BiMnO3, or can be a manifest of properties extrinsic to the dielectric but present in capacitance structures like Pd, Al2O3, and Al. |
https://en.wikipedia.org/wiki/Shot%20transition%20detection | Shot transition detection (or simply shot detection) also called cut detection is a field of research of video processing. Its subject is the automated detection of transitions between shots in digital video with the purpose of temporal segmentation of videos.
Use
Shot transition detection is used to split up a film into basic temporal units called shots; a shot is a series of interrelated consecutive pictures taken contiguously by a single camera and representing a continuous action in time and space.
This operation is of great use in software for post-production of videos. It is also a fundamental step of automated indexing and content-based video retrieval or summarization applications which provide an efficient access to huge video archives, e.g. an application may choose a representative picture from each scene to create a visual overview of the whole film and, by processing such indexes, a search engine can process search items like "show me all films where there's a scene with a lion in it."
Cut detection can do nothing that a human editor couldn't do manually, however it is advantageous as it saves time. Furthermore, due to the increase in the use of digital video and, consequently, in the importance of the aforementioned indexing applications, the automatic cut detection is very important nowadays.
Basic technical terms
In simple terms cut detection is about finding the positions in a video in that one scene is replaced by another one with different visual content. Technically speaking the following terms are used:
A digital video consists of frames that are presented to the viewer's eye in rapid succession to create the impression of movement. "Digital" in this context means both that a single frame consists of pixels and the data is present as binary data, such that it can be processed with a computer. Each frame within a digital video can be uniquely identified by its frame index, a serial number.
A shot is a sequence of frames shot uninterrupt |
https://en.wikipedia.org/wiki/Kiwix | Kiwix is a free and open-source offline web browser created by Emmanuel Engelhart and Renaud Gaudin in 2007. It was first launched to allow offline access to Wikipedia, but has since expanded to include other projects from the Wikimedia Foundation, public domain texts from Project Gutenberg, many of the Stack Exchange sites, and many other resources. Available in more than 100 languages, Kiwix has been included in several high-profile projects, from smuggling operations in North Korea and encyclopedic access in Cuba to Google Impact Challenge's recipient Bibliothèques Sans Frontières.
History
Founder Emmanuel Engelhart sees Wikipedia as a common good, saying "The contents of Wikipedia should be available for everyone! Even without Internet access. This is why I have launched the Kiwix project."
After becoming a Wikipedia editor in 2004, Engelhart became interested in developing offline versions of Wikipedia. A project to make a Wikipedia CD, initiated in 2003, was a trigger for the project.
In 2012, Kiwix received a grant from Wikimedia France to build a kiwix-plug, which was deployed to universities in eleven countries known as the Afripedia Project. In February 2013 Kiwix won SourceForge's Project of the Month award and an Open Source Award in 2015.
Description
The software is designed as an offline reader for a web content. It can be used on computers without an internet connection, computers with a slow or expensive connection, or to avoid censorship. It can also be used while travelling (e.g. on a plane or train).
Users first download Kiwix, then download content for offline viewing with Kiwix. Compression saves disk space and bandwidth. All of English-language Wikipedia, with pictures, fits on a large USB stick or external media.
All content files are compressed in ZIM format, which makes them smaller, but leaves them easy to index, search, and selectively decompress.
The ZIM files are then opened with Kiwix, which looks and behaves like a web browser |
https://en.wikipedia.org/wiki/Topological%20category | In category theory, a discipline in mathematics, the notion of topological category has a number of different, inequivalent definitions.
In one approach, a topological category is a category that is enriched over the category of compactly generated Hausdorff spaces. They can be used as a foundation for higher category theory, where they can play the role of (,1)-categories. An important example of a topological category in this sense is given by the category of CW complexes, where each set Hom(X,Y) of continuous maps from X to Y is equipped with the compact-open topology.
In another approach, a topological category is defined as a category along with a forgetful functor that maps to the category of sets and has the following three properties:
admits initial (also known as weak) structures with respect to
Constant functions in lift to -morphisms
Fibers are small (they are sets and not proper classes).
An example of a topological category in this sense is the category of all topological spaces with continuous maps, where one uses the standard forgetful functor.
See also
Infinity category
Simplicial category |
https://en.wikipedia.org/wiki/Hardwood | Hardwood is wood from dicot trees. These are usually found in broad-leaved temperate and tropical forests. In temperate and boreal latitudes they are mostly deciduous, but in tropics and subtropics mostly evergreen. Hardwood (which comes from angiosperm trees) contrasts with softwood (which is from gymnosperm trees).
Characteristics
Hardwoods are produced by angiosperm trees that reproduce by flowers, and have broad leaves. Many species are deciduous. Those of temperate regions lose their leaves every autumn as temperatures fall and are dormant in the winter, but those of tropical regions may shed their leaves in response to seasonal or sporadic periods of drought. Hardwood from deciduous species, such as oak, normally shows annual growth rings, but these may be absent in some tropical hardwoods.
Hardwoods have a more complex structure than softwoods and are often much slower growing as a result. The dominant feature separating "hardwoods" from softwoods is the presence of pores, or vessels. The vessels may show considerable variation in size, shape of perforation plates (simple, scalariform, reticulate, foraminate), and structure of cell wall, such as spiral thickenings.
As the name suggests, the wood from these trees is generally harder than that of softwoods, but there are significant exceptions. In both groups there is an enormous variation in actual wood hardness, with the range in density in hardwoods completely including that of softwoods; some hardwoods (e.g., balsa) are softer than most softwoods, while yew is an example of a hard softwood.
Chemistry
The structural polymers of hardwoods are cellulose, hemicellulose, and lignin. The constituents of hardwood lignin differs from those included in softwood. Sinapyl alcohol and coniferyl alcohol are the main monomers of hardwood lignin.
Hardwoods contain less amount of non-structural constituents, named extractives, than softwoods. These extractives are usually categorized into three broad groups: alipha |
https://en.wikipedia.org/wiki/Institute%20of%20Computational%20Mathematics%20and%20Mathematical%20Geophysics | Institute of Computational Mathematics and Mathematical Geophysics of the Siberian Branch of the RAS, ICMMG SB RAS () is a research institute in Novosibirsk, Russia. It was founded in 1964.
History
On January 1, 1964, the Computing Center was established in Novosibirsk, later it was transformed into the Institute of Computational Mathematics and Mathematical Geophysics. In 2004, the institute has created an Expert Database on Tsunami Observations in the Pacific Ocean containing information on 1500 tsunamigenic events that have occurred in the Pacific region between 47 BC and 2003.
Activities
Research in the field of mathematical modeling of oceanic and atmospheric physics, environmental protection, geophysics, telecommunication systems and software for supercomputers etc. |
https://en.wikipedia.org/wiki/Doll%20Reader | Doll Reader was a collectors magazine in the United States, appearing eight times a year. It included information on antique dolls, collectible and modern dolls, and offerings from manufacturers and contemporary doll artists. The last publisher of Doll Reader was Madavor Media, LLC, in Quincy, Massachusetts.
Publication history
Doll Reader began publication in 1972, originally put out by Hobby House Press. The founding editor was Paul A. Ruddell.
In October 2010, Haute Doll — a fashion doll collector's magazine — was merged into Doll Reader.
Doll Reader merged with DOLL in 2012. |
https://en.wikipedia.org/wiki/Electronic%20Case%20Filing%20System | Electronic Case Filing System (ECFS) is an automated system developed in Tarrant County, Texas that enables law enforcement agencies, criminal district attorney, county criminal courts, criminal district courts, and the defense bar to process and exchange information about criminal offenses. ECFS software does not work on the Apple Mac platform.
History
ECFS was conceived in November 2002 in Tarrant County, Texas. Initially, the purpose of the system was to enable law enforcement agencies to submit offense reports to the criminal district attorney's office for possible prosecution. In July 2003, the Criminal District Attorney's accepted the first electronic case filing via ECFS. Since that time, more than 100,000 cases have been filed in ECFS by the 47 Law Enforcement Agencies located in Tarrant County, Texas. ECFS was expanded in June 2004 to incorporate the Grand Jury function which is able to return Indictments to the Criminal District Courts on the same day that a True Bill is decided.
In January 2005, ECFS was extended to enable the Judges and their Court Staff to effectively manage the docket (case load) for each of the nine (9) Criminal District Courts. Since the implementation of ECFS, Tarrant County has been able to control the Jail population, despite a significant increase in the number of cases being filed. In August 2005, ECFS was extended to enable members of the Tarrant County Criminal Defense Lawyers Association to browse and view defendant, offense, and evidence via ECFS. Through this process, defense attorneys are no longer required to visit the Criminal District Attorney's Office to view and copy file.
Since January 2006, the Criminal District Attorney's Office has been completely paperless and all Offense Reports are submitted via ECFS and made available to Law Enforcement Agencies, County and District Courts, and Defense Attorneys. In July 2006, ECFS was extended to allow criminal defendants to be magistrated electronically. This process |
https://en.wikipedia.org/wiki/JOSSO | Java Open Single Sign On (JOSSO) is an open source Identity and Access Management (IAM) platform for rapid and standards-based Cloud-scale Single Sign-On, web services security, authentication and provisioning.
See also
Shibboleth (Internet2)
CAS
Digital certificates
List of single sign-on implementations
External links
JOSSO Home Page
Federated identity |
https://en.wikipedia.org/wiki/Sticking%20probability | The sticking probability is the probability that molecules are trapped on surfaces and adsorb chemically. From Langmuir's adsorption isotherm, molecules cannot adsorb on surfaces when the adsorption sites are already occupied by other molecules, so the sticking probability can be expressed as follows:
where is the initial sticking probability and is the surface coverage fraction ranging from 0 to 1.
Similarly, when molecules adsorb on surfaces dissociatively, the sticking probability is
The square is owing to the fact that a disassociation of 1 molecule into 2 parts requires 2 adsorption sites. These equations are simple and can be easily understood but cannot explain experimental results.
In 1958, P. Kisliuk presented an equation for the sticking probability that can explain experimental results. In his theory, molecules are trapped in precursor states of physisorption before chemisorption. Then the molecules meet adsorption sites that molecules can adsorb to chemically, so the molecules behave as follows.
If these sites are not occupied, molecules do the following (with probability in parentheses):
adsorb on the surface chemically ()
desorb from the surface ()
move to the next precursor state ()
and if these sites are occupied, they
desorb from the surface ()
move to the next precursor state ()
Note that an occupied site is defined as one where there is a chemically bonded adsorbate so by definition it would be . Then the sticking probability is, according to equation (6) of the reference,
When , this equation is identical in result to Langmuir's adsorption isotherm.
Notes |
https://en.wikipedia.org/wiki/Lymph%20node%20biopsy | Lymph node biopsy is a test in which a lymph node or a piece of a lymph node is removed for examination under a microscope (see: biopsy).
The lymphatic system is made up of several lymph nodes connected by lymph vessels. The nodes produce white blood cells (lymphocytes) that fight infections. When an infection is present, the lymph nodes swell, produce more white blood cells, and attempt to trap the organisms that are causing the infection. The lymph nodes also try to trap cancer cells.
Imaging studies include CXR, CT scans of Abdomen,chest, pelvis, neck and PET scans.
CBC, ESR, serum ferritin, bone marrow aspiration.
Indications
The test is used to help determine the cause of lymph node enlargement (swollen glands or lymphadenitis). It may also determine whether tumors in the lymph node are cancerous or noncancerous. Enlarged lymph nodes may be caused by a number of conditions, ranging from very mild infections to serious malignancies. Benign conditions can often be distinguished from cancerous and infectious processes by microscopic examination. The pathologist may also perform additional tests on the lymph node tissue to assist in making a diagnosis.
Some of the conditions where abnormal values are obtained are:
Hodgkin's lymphoma
Non-Hodgkin's lymphoma
Sarcoidosis
tuberculous cervical lymphadenitis (scrofula)
Lymph node biopsies may be performed to evaluate the spread of cancer. See Lymphadenectomy#With sentinel node biopsy.
However, Sentinel lymph node biopsy for evaluating early, thin melanoma has not been shown to improve survival, and for this reason, should not be performed. Patients with melanoma in situ, T1a melanoma or T1b melanoma ≤ 0.5mm have a low risk of cancer spreading to lymph nodes and high 5-year survival rates, so this kind of biopsy is unnecessary.
Procedure
The test is done in an operating room in a hospital, or at an outpatient surgical facility. There are two ways the sample may be obtained:
Needle biopsy
Open (excisional) bio |
https://en.wikipedia.org/wiki/Miguel%20Teurbe%20Tol%C3%B3n | Miguel Teurbe Tolón y de la Guardia (September 20, 1820 – November 16, 1857) was a Cuban playwright, poet, and the creator of the Coat of arms of Cuba and the Flag of Cuba.
In 1849, Tolón was declared an enemy of Spain and was forced into exile in the United States.
While in the United States, Tolón was a freemason.
He was married to Emilia Margarita Teurbe Tolón y Otero. |
https://en.wikipedia.org/wiki/Phthipodochiton | Phthipodochiton is an extinct genus of molluscs, known from several fossils from the upper Ordovician fauna of the Lady Burn Starfish beds of Girvan, Scotland. It shows a mixture of aplacophoran body plan and polyplacophoran-like valves, and it is an informative fossil in the evolution of aculiferan mollusks.
It was previously classified under the genus Helminthochiton, but it has been reassigned to its own genus in 2012.
Morphology
Phthipodochiton body is worm-like, with eight polyplacophoran-like valves but no true foot. Head and tail valves are slightly smaller than the intermediate ones. The only ornaments on the valves appear to be growth lines. The body is also covered by a sheet of spicules ; no radula has been preserved.
Life habits
Phthipodochiton was carnivorous, feeding on crinoids, as shown by a fossil preserved with gut contents. In contrast with modern chitons, Phthipodochiton probably did not creep on its foot but had a locomotion style similar to that of solenogastres.
Taxonomy
Phthipodochiton shares similarities with genera as Alastega, Robustum and Septemchiton. but it is sufficiently distinct from all of them to be considered a separate species. It is considered to belong to the aplacophoran stem lineage, along with Acaenoplax, and it has also been placed close to Matthevia and the shelled aplacophoran Kulindroplax in phylogenetic analyses. |
https://en.wikipedia.org/wiki/Coupled%20cluster | Coupled cluster (CC) is a numerical technique used for describing many-body systems. Its most common use is as one of several post-Hartree–Fock ab initio quantum chemistry methods in the field of computational chemistry, but it is also used in nuclear physics. Coupled cluster essentially takes the basic Hartree–Fock molecular orbital method and constructs multi-electron wavefunctions using the exponential cluster operator to account for electron correlation. Some of the most accurate calculations for small to medium-sized molecules use this method.
The method was initially developed by Fritz Coester and Hermann Kümmel in the 1950s for studying nuclear-physics phenomena, but became more frequently used when in 1966 Jiří Čížek (and later together with Josef Paldus) reformulated the method for electron correlation in atoms and molecules. It is now one of the most prevalent methods in quantum chemistry that includes electronic correlation.
CC theory is simply the perturbative variant of the many-electron theory (MET) of Oktay Sinanoğlu, which is the exact (and variational) solution of the many-electron problem, so it was also called "coupled-pair MET (CPMET)". J. Čížek used the correlation function of MET and used Goldstone-type perturbation theory to get the energy expression, while original MET was completely variational. Čížek first developed the linear CPMET and then generalized it to full CPMET in the same work in 1966. He then also performed an application of it on the benzene molecule with Sinanoğlu in the same year. Because MET is somewhat difficult to perform computationally, CC is simpler and thus, in today's computational chemistry, CC is the best variant of MET and gives highly accurate results in comparison to experiments.
Wavefunction ansatz
Coupled-cluster theory provides the exact solution to the time-independent Schrödinger equation
where is the Hamiltonian of the system, is the exact wavefunction, and E is the exact energy of the ground state |
https://en.wikipedia.org/wiki/Subgradient%20method | Subgradient methods are iterative methods for solving convex minimization problems. Originally developed by Naum Z. Shor and others in the 1960s and 1970s, subgradient methods are convergent when applied even to a non-differentiable objective function. When the objective function is differentiable, sub-gradient methods for unconstrained problems use the same search direction as the method of steepest descent.
Subgradient methods are slower than Newton's method when applied to minimize twice continuously differentiable convex functions. However, Newton's method fails to converge on problems that have non-differentiable kinks.
In recent years, some interior-point methods have been suggested for convex minimization problems, but subgradient projection methods and related bundle methods of descent remain competitive. For convex minimization problems with very large number of dimensions, subgradient-projection methods are suitable, because they require little storage.
Subgradient projection methods are often applied to large-scale problems with decomposition techniques. Such decomposition methods often allow a simple distributed method for a problem.
Classical subgradient rules
Let be a convex function with domain . A classical subgradient method iterates
where denotes any subgradient of at , and is the iterate of . If is differentiable, then its only subgradient is the gradient vector itself.
It may happen that is not a descent direction for at . We therefore maintain a list that keeps track of the lowest objective function value found so far, i.e.
Step size rules
Many different types of step-size rules are used by subgradient methods. This article notes five classical step-size rules for which convergence proofs are known:
Constant step size,
Constant step length, , which gives
Square summable but not summable step size, i.e. any step sizes satisfying
Nonsummable diminishing, i.e. any step sizes satisfying
Nonsummable diminishing step leng |
https://en.wikipedia.org/wiki/Configuration%20model | In network science, the configuration model is a method for generating random networks from a given degree sequence. It is widely used as a reference model for real-life social networks, because it allows the modeler to incorporate arbitrary degree distributions.
Rationale for the model
In the configuration model, the degree of each vertex is pre-defined, rather than having a probability distribution from which the given degree is chosen. As opposed to the Erdős–Rényi model, the degree sequence of the configuration model is not restricted to have a Poisson distribution, the model allows the user to give the network any desired degree distribution.
Algorithm
The following algorithm describes the generation of the model:
Take a degree sequence, i. e. assign a degree to each vertex. The degrees of the vertices are represented as half-links or stubs. The sum of stubs must be even in order to be able to construct a graph (). The degree sequence can be drawn from a theoretical distribution or it can represent a real network (determined from the adjacency matrix of the network).
Choose two stubs uniformly at random and connect them to form an edge. Choose another pair from the remaining stubs and connect them. Continue until you run out of stubs. The result is a network with the pre-defined degree sequence. The realization of the network changes with the order in which the stubs are chosen, they might include cycles (b), self-loops (c) or multi-links (d) (Figure 1). Yet, the expected number of self-loops and multi-links goes to zero in the N → ∞ limit.
Self-loops, multi-edges and implications
The algorithm described above matches any stubs with the same probability. The uniform distribution of the matching is an important property in terms of calculating other features of the generated networks. The network generation process does not exclude the event of generating a self-loop or a multi-link. If we designed the process where self-loops and multi-edges are |
https://en.wikipedia.org/wiki/H%C3%BCrthle%20cell | A Hürthle cell is a cell in the thyroid that is often associated with Hashimoto's thyroiditis as well as benign and malignant tumors (Hürthle cell adenoma and Hürthle cell carcinoma, formerly considered a subtype of follicular thyroid cancer). This version is a relatively rare form of differentiated thyroid cancer, accounting for only 3-10% of all differentiated thyroid cancers. Oncocytes in the thyroid are often called Hürthle cells. Although the terms oncocyte, oxyphilic cell, and Hürthle cell are used interchangeably, Hürthle cell is used only to indicate cells of thyroid follicular origin.
Diseases
Hürthle cell neoplasms can be separated into Hürthle cell adenomas and carcinomas, which are respectively benign and malignant tumors arising from the follicular epithelium of the thyroid gland. The mitochondrial DNA of Hürthle cell carcinoma contain somatic mutations. Hürthle cell carcinomas consists of at least 75% Hürthle cells. Chronic lymphocytic thyroiditis or Hashimoto's thyroiditis, along with cases of long-standing Graves' disease, show Hürthle cells present.
Diagnosis
Hürthle cell adenomas are most likely diagnosed much more frequently than Hürthle cell carcinomas. The female to male ratio for Hurthle cell adenomas is 8:1, while the ratio is 2:1 for the malignant version. Hürthle cell cancer tends to occur in older patients. The median age at diagnosis for Hürthle cell carcinomas is approximately 61 years old. Typically a painless thyroid mass is found in patients with this type of cancer. As expected, patients with carcinoma usually present larger tumors than patients with adenoma. Rarely, the cancer can spread to the lymph nodes. On few occasions, patients with Hürthle cell carcinoma have distant metastases in the lungs or surrounding bones. Hürthle cell neoplasms are somewhat difficult to differentiate between being benign or malignant. Since the size and growth pattern of the tumor cannot be used to determine malignancy, although larger tumors have h |
https://en.wikipedia.org/wiki/Private%20IP | PIP in telecommunications and datacommunications stands for Private Internet Protocol or Private IP. PIP refers to connectivity into a private extranet network which by its design emulates the functioning of the Internet. Specifically, the Internet uses a routing protocol called border gateway protocol (BGP), as do most Multiprotocol Label Switching (MPLS) networks. With this design, there is an ambiguity to the route that a packet can take while traversing the network. Whereas the Internet is a public offering, MPLS PIP networks are private. This lends a known, often used, and comfortable network design model for private implementation.
Private IP removes the need for antiquated Frame Relay networks, and even more antiquated point-to-point networks, with the service provider able to offer a private extranet to its customer at an affordable pricepoint. |
https://en.wikipedia.org/wiki/Tarski%27s%20undefinability%20theorem | Tarski's undefinability theorem, stated and proved by Alfred Tarski in 1933, is an important limitative result in mathematical logic, the foundations of mathematics, and in formal semantics. Informally, the theorem states that "arithmetical truth cannot be defined in arithmetic".
The theorem applies more generally to any sufficiently strong formal system, showing that truth in the standard model of the system cannot be defined within the system.
History
In 1931, Kurt Gödel published the incompleteness theorems, which he proved in part by showing how to represent the syntax of formal logic within first-order arithmetic. Each expression of the formal language of arithmetic is assigned a distinct number. This procedure is known variously as Gödel numbering, coding and, more generally, as arithmetization. In particular, various sets of expressions are coded as sets of numbers. For various syntactic properties (such as being a formula, being a sentence, etc.), these sets are computable. Moreover, any computable set of numbers can be defined by some arithmetical formula. For example, there are formulas in the language of arithmetic defining the set of codes for arithmetic sentences, and for provable arithmetic sentences.
The undefinability theorem shows that this encoding cannot be done for semantic concepts such as truth. It shows that no sufficiently rich interpreted language can represent its own semantics. A corollary is that any metalanguage capable of expressing the semantics of some object language (e.g. a predicate is definable in Zermelo-Fraenkel set theory for whether formulae in the language of Peano arithmetic are true in the standard model of arithmetic) must have expressive power exceeding that of the object language. The metalanguage includes primitive notions, axioms, and rules absent from the object language, so that there are theorems provable in the metalanguage not provable in the object language.
The undefinability theorem is conventionally attrib |
https://en.wikipedia.org/wiki/Folpet | Folpet is the tradename for the organic compound with the formula C6H4(CO)2NSCCl3. It is a fungicide derived from phthalimide (C6H4(CO)2N-) and trichloromethylsulfenyl chloride. The compound is white although commercial samples can appear brownish. It is structurally related to Captan, which is also a trichloromethylsulfenyl-containing fungicide.
Resistance
folpet resistance is still unheard of due to its multiple effects. However, in 2001 some degree of cross-resistance was reported in iprodione-resistant South African Botrytis cinerea on grape. |
https://en.wikipedia.org/wiki/RNSAP | RNSAP (Radio Network Subsystem Application Part) is a 3GPP signalling protocol responsible for communications between RNCs Radio Network Controllers defined in 3GPP specification TS 25.423. It is carried on the lur interface and provides functionality needed for soft handovers and SRNS (Serving Radio Network Subsystem) relocation (handoff between RNCs). It defines signalling between RNCs, including SRNC (Serving RNC) and DRNC (drift RNC).
SRNC | DRNC
| IUR |
RNSAP | RNSAP
| | |
Converge protol | Converge protol
| | |
AAL 5 | AAL5
ATM | ATM
Physical links------→→→ Physical links
RNSAP Layer Architecture
Procedures
RNSAP Basic Mobility Procedures-
This set of procedures is used to handle mobility with in the UTRAN.This is the most important of the RNSAP procedures. The
procedures belonging to this set includes SRNC relocation, inter-RNC cell update and UTRAN registration area update.
RNSAP DCH procedures-
This set of procedure used to handle dedicated channel traffic (it includes DCH, DSCH and TDD USCH) between two RNCs. Unlike the basic mobility procedures which is used only for signalling, this set of procedures provides support for data transfer over the Iur interface. The data transfer takes place using a frame protocol. The procedures belonging to this set include establishment, modification and release of dedicated channel in the DRNC due to hard and soft handover, set-up/release of dedicated transport connections over Iur interface and data transfer for dedicated channels.
RNSAP Common Transport Channel Procedures-
This set of procedures is used to handle common and shared channel traffic (it excludes DCH, DSCH and TDD USCH) between two RNCs. In particular, this set of procedures facilitates the set-up and release of common channel transport |
https://en.wikipedia.org/wiki/Guanine%20tetrad | In molecular biology, a guanine tetrad (also known as a G-tetrad or G-quartet) is a structure composed of four guanine bases in a square planar array. They most prominently contribute to the structure of G-quadruplexes, where their hydrogen bonding stabilizes the structure. Usually, there are at least two guanine tetrads in a G-quadruplex, and they often feature Hoogsteen-style hydrogen bonding.
Guanine tetrads are formed by sequences rich in guanine, such as GGGGC. They may also play a role in the dimerization of non-endogenous RNAs to facilitate the replication of some viruses. Guanine tetrads dimerize through their 5' ends since it is more energetically favorable.
They can be stabilized by central cations, such as lithium, sodium, potassium, rubidium, or cesium. However, they still form a variety of different structures. Guanine tetrads are not always stable, but the sugar-phosphate backbone of DNA can assist in stability of the guanine tetrads themselves. Guanine tetrads are more stable when stacked, as intermolecular forces between each layers help stabilize them.
Guanine tetrads can also influence recombination, replication, and transcription. For instance, guanine tetrads are found in the promoter region of the Myc family of oncogenes. They also function in immunoglobulin class switching and may play a role in the genome of HIV. Guanine tetrads appear frequently in the telomeric regions of DNA.
See also
G-quadruplex
Hoogsteen base pair
Heterochromatin
Regulation of gene expression
Guanine
Telomere |
https://en.wikipedia.org/wiki/Childhood%20development%20of%20fine%20motor%20skills | Fine motor skills are the coordination of small muscle movements which occur e.g., in the fingers, usually in coordination with the eyes. In application to motor skills of hands (and fingers) the term dexterity is commonly used.
The abilities which involve the use of hands develop over time, starting with primitive gestures such as grabbing at objects to more precise activities that involve precise eye–hand coordination. Fine motor skills are skills that involve a refined use of the small muscles controlling the hand, fingers, and thumb. The development of these skills allows one to be able to complete tasks such as writing, drawing, and buttoning.
According to the results of a study conducted in the USA assessing the difference in foundational motor skills between males and females between the age of five and six years old, there was no significant difference between gender. However, the results displayed a difference in the ability to catch and aim between the six-year-old males and females. The study's results proposed that these gender differences are not concrete when adding age as an observing factor.
Young children's lives consistent with visual and performing arts that hold as much importance as language and play (Child Development Division, & California Department of Education. 2011, p. 40). "The arts build skills such as problem solving and critical thinking; they bring parallel opportunities for the development of language/communication, mathematics, and the development of social and interpersonal skills. The following activities are often referred to as children's play: scribbling with a crayon, pretending to be a pirate or a bird, humming bits of a tune, banging on a drum, or swaying to music".
Self-care skills
As children refine their motor skills, they are able to help themselves by completing daily activities independently. For example, children between the ages of 2 and 3 are able to put on and take off simplistic articles of clothing. They ar |
https://en.wikipedia.org/wiki/Hawking%20radiation | Hawking radiation is the theoretical thermal black-body radiation released outside a black hole's event horizon. This is counterintuitive because once ordinary electromagnetic radiation is inside the event horizon, it cannot escape. It is named after the physicist Stephen Hawking, who developed a theoretical argument for its existence in 1974. Hawking radiation is predicted to be extremely faint and is many orders of magnitude below the current best telescopes' detecting ability.
Hawking radiation reduces the mass and rotational energy of black holes and is therefore also theorized to cause black hole evaporation. Because of this, black holes that do not gain mass through other means are expected to shrink and ultimately vanish.
For all except the smallest black holes, this happens extremely slowly. The radiation temperature is inversely proportional to the black hole's mass, so micro black holes are predicted to be larger emitters of radiation than larger black holes and should dissipate faster per their mass. As such, if small black holes exist such as permitted by the hypothesis of primordial black holes, they ought to die the fastest the smaller they shrink, leading to a final cataclysm of high energy radiation alone. Such radiation surges have not been detected as of yet.
Overview
First predicted by Einstein's 1915 theory of general relativity, evidence for the astrophysical objects termed black holes began to mount half a century later, and these objects are of current interest primarily because of their compact size and immense gravitational attraction.
A black hole can form when enough matter or energy is compressed into a volume small enough that the escape velocity is greater than the speed of light. Nothing can travel that fast, so nothing within a certain distance, proportional to the mass of the black hole, can escape beyond that distance. The region beyond which not even light can escape is the event horizon; an observer outside it cannot observe |
https://en.wikipedia.org/wiki/IBM%20PS/2%20Model%2025 | The Personal System/2 Model 25 and its later submodels the 25 286 and 25 SX are IBM's lowest-end entries in the Personal System/2 (PS/2) family of personal computers. Like its sibling the Model 30, the Model 25 features an Industry Standard Architecture bus, allowing it to use expansion cards from its direct predecessors, the PC/XT and the PC/AT—but not from higher entries in the PS/2 line, which use Micro Channel. Unlike all other entries in the PS/2 line, the Model 25 and its submodels are built into an all-in-one form factor, with its cathode-ray tube (CRT) monitor and system board occupying the same enclosure. IBM oriented the Model 25 at home office workers and students.
Development and release
IBM unveiled the Model 25 on August 4, 1987. It is the fifth entry of the Personal System/2 range. The first Model 25 is powered by an Intel 8086 running at 8 MHz, roughly twice the speed of the original IBM Personal Computer. A college student-oriented version of the Model 25, the Collegiate, has two 720 KB floppy drives, with a maximum RAM capacity of 640 KB, and was packaged with the official PS/2 Mouse, Windows 2.0, and four blank floppy disks.
In 1990, IBM released the Model 25 286, which upgrades the original to an Intel 80286 running at 10 MHz. In late 1991, IBM's Boca Raton facility, led by José García, developed the Model 25 SX, which features an Intel 80386SX clocked at 20 MHz. This version of the Model 25 was sold only to K–12 schools. The Model 25 series was never officially sold outside of the United States.
IBM neither included nor supported hard disk drives in the original Model 25, although several aftermarket kits were available by late 1987. The later 25 286 and 25 SX were sold with a hard drive as an option.
Reception
Multiple contemporary reviewers compared the Model 25 to Apple's original Macintosh. Stephen Satchell of InfoWorld wrote when he first saw the Model 25 on its announcement: "[M]y immediate impression was that I was looking at a defor |
https://en.wikipedia.org/wiki/Critical%20mass | In nuclear engineering, a critical mass is the smallest amount of fissile material needed for a sustained nuclear chain reaction. The critical mass of a fissionable material depends upon its nuclear properties (specifically, its nuclear fission cross-section), density, shape, enrichment, purity, temperature, and surroundings. The concept is important in nuclear weapon design.
Explanation of criticality
When a nuclear chain reaction in a mass of fissile material is self-sustaining, the mass is said to be in a critical state in which there is no increase or decrease in power, temperature, or neutron population.
A numerical measure of a critical mass is dependent on the effective neutron multiplication factor , the average number of neutrons released per fission event that go on to cause another fission event rather than being absorbed or leaving the material. When k = 1, the mass is critical, and the chain reaction is self-sustaining.
A subcritical mass is a mass of fissile material that does not have the ability to sustain a fission chain reaction. A population of neutrons introduced to a subcritical assembly will exponentially decrease. In this case, k < 1. A steady rate of spontaneous fissions causes a proportionally steady level of neutron activity. The constant of proportionality increases as increases.
A supercritical mass is one which, once fission has started, will proceed at an increasing rate. The material may settle into equilibrium (i.e. become critical again) at an elevated temperature/power level or destroy itself. In the case of supercriticality, k > 1.
Due to spontaneous fission a supercritical mass will undergo a chain reaction. For example, a spherical critical mass of pure uranium-235 (235U) with a mass of about would experience around 15 spontaneous fission events per second. The probability that one such event will cause a chain reaction depends on how much the mass exceeds the critical mass. If there is uranium-238 (238U) present, the |
https://en.wikipedia.org/wiki/Domain-to-range%20ratio | The domain-to-range ratio (DRR) is a ratio which describes how the number of outputs corresponds to the number of inputs of a given logical function or software component. The domain-to-range ratio is a mathematical ratio of cardinality between the set of the function's possible inputs (the domain) and the set of possible outputs (the range). For a function defined on a domain, , and a range, , the domain-to-range ratio is given as:It can be used to measure the risk of missing potential errors when testing the range of outputs alone.
Example
Consider the function isEven() below, which checks the parity of an unsigned short number , any value between and , and yields a boolean value which corresponds to whether is even or odd. This solution takes advantage of the fact that integer division in programming typically rounds towards zero.
bool isEven(unsigned short x) {
return (x / 2) == ((x + 3)/2 - 1);
}Because can be any value from to , the function's domain has a cardinality of . The function yields , if is even, or , if is odd. This is expressed as the range , which has a cardinality of . Therefore, the domain-to-range ratio of isEven() is given by:Here, the domain-to-range ratio indicates that this function would require a comparatively large number of tests to find errors. If a test program attempts every possible value of in order from to , the program would have to perform tests for each of the two possible outputs in order to find errors or edge cases. Because errors in functions with a high domain-to-range ratio are difficult to identify via manual testing or methods which reduce the number of tested inputs, such as orthogonal array testing or all-pairs testing, more computationally complex techniques may be used, such as fuzzing or static program analysis, to find errors. |
https://en.wikipedia.org/wiki/Lejeunea%20hodgsoniana | Lejeunea hodgsoniana is a species of liverwort named in honour of Eliza Amy Hodgson. The often extensive mats formed by L. lamacerina are composed of small (shoots
up to 2 cm long and 0.5–1.5 mm wide), delicate, pale green shoots. The lobules are
smaller than the broadly rounded main leaf lobes. The underleaves are rather small
and distant. Often fertile, with small, 5-keeled perianths.
L. cavifolia (p. 221) has relatively larger, more overlapping underleaves and
relatively smaller lobules. L. patens (p. 223) has a large, inflated lobule, which
makes an acute angle with the leaf lobe. L. holtii (L. eckloniana) (Paton, p. 497) is
a rare plant of south-west Ireland, and has distinctly elliptical leaves, with rather
small underleaves and even smaller lobules. L. mandonii (Paton, p. 500) is also very
rare in oceanic districts; it is as tiny as Harpalejeunea molleri (p. 219), but has slightly
elongated, rounded leaf lobes and a very distinctive, smoothly rounded perianth that
differs from the 5-angled perianths of most related species. Aphanolejeunea (p. 227),
Microlejeunea (p. 220), Drepanolejeunea (p. 218), etc. – are usually much smaller,
with differently shaped leaves, often longer and thinner or pointed.
Especially characteristic of rock faces by streams in humid valleys, and often covering
extensive areas. It is far less frequent on crags or on trees in the uplands.
Distribution
The species is endemic to New Zealand. |
https://en.wikipedia.org/wiki/1-Arseno-3-phosphoglycerate | 1-Arseno-3-phosphoglycerate is a compound produced by the enzyme glyceraldehyde 3-phosphate dehydrogenase, present in high concentrations in many organisms, from glyceraldehyde 3-phosphate and arsenate in the glycolysis pathway.
The compound is unstable and hydrolyzes spontaneously to 3-phosphoglycerate, bypassing the energy producing step of glycolysis.
Effects on glycolysis
1-Arseno-3-phosphoglycerate can be derived from the glycolytic pathway via the bonding of Arsenate and glyceraldehyde-3-phosphate, which is catalyzed by glyceraldehyde phosphate dehydrogenase (GAPDH). The net production of ATP is zero as a result of the formation of the intermediate, 1-arseno-3-phosphoglycerate, as opposed to the conventional pathway, which produces a net result of two ATP molecules.
Glyceraldehyde-3-phosphate + AsO4^3- + NAD+ ->[GAPDH] NADH +H+ + 1-Arseno-3-phosphoglycerate |
https://en.wikipedia.org/wiki/Male%20egg | Male egg can refer to either:
An egg that artificially contains genetic material from a male.
An egg from a haplodiploid species such as an ant or bee that is unfertilized and will hatch a male
A fertilized egg that a male organism is developing in
This article focuses on the first definition.
Male eggs are the result of a process in which the eggs of a female would be emptied of their genetic contents (a technique similar to that used in the cloning process), and those contents would be replaced with male DNA. Such eggs could then be fertilized by sperm. The procedure was conceived by Calum MacKellar, a Scottish bioethicist. With this technique, two males could be the biological parents of a child. However, such a procedure would additionally require an artificial womb or a female gestational carrier.
In 2023, male eggs from male mice cells were developed and used to create bi-paternal mice that grew into adulthood; bi-paternal mice had been obtained in 2008, but they only survived for a few days.
See also
Female sperm
Male pregnancy
LGBT reproduction
Genomic imprinting |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.