source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Advances%20in%20Radio%20Science
Advances in Radio Science is a peer-reviewed open access scientific journal published by the German National Committee of the International Union of Radio Science. It covers radio science and radio engineering. It is abstracted and indexed in Scopus. See also Radio Science External links Electrical and electronic engineering journals Academic journals established in 2003 Multilingual journals Copernicus Publications academic journals Creative Commons Attribution-licensed journals Electromagnetism journals
https://en.wikipedia.org/wiki/Biological%20tests%20of%20necessity%20and%20sufficiency
Biological tests of necessity and sufficiency refer to experimental methods and techniques that seek to test or provide evidence for specific kinds of causal relationships in biological systems. A necessary cause is one without which it would be impossible for an effect to occur, while a sufficient cause is one whose presence guarantees the occurrence of an effect. These concepts are largely based on but distinct from ideas of necessity and sufficiency in logic. Tests of necessity, among which are methods of lesioning or gene knockout, and tests of sufficiency, among which are methods of isolation or discrete stimulation of factors, have become important in current-day experimental designs, and application of these tests have led to a number of notable discoveries and findings in the biological sciences. Definitions In biological research, experiments or tests are often used to study predicted causal relationships between two phenomena. These causal relationships may be described in terms of the logical concepts of necessity and sufficiency. Consider the statement that a phenomenon x causes a phenomenon y. X would be a necessary cause of y when the occurrence of y implies that x needed to have occurred. However, only the occurrence of the necessary condition x may not always result in y also occurring. In other words, when some factor is necessary to cause an effect, it is impossible to have the effect without the cause. X would instead be a sufficient cause of y when the occurrence of x implies that y must then occur. in other words, when some factor is sufficient to cause an effect, the presence of the cause guarantees the occurrence of the effect. However, a different cause z may also cause y, meaning that y may occur without x occurring. For a concrete example, consider the conditional statement "if an object is a square, then it has four sides". It is a necessary condition that an object has four sides if it is true that it is a square; conversely, the obj
https://en.wikipedia.org/wiki/Startup%20ecosystem
A startup ecosystem is formed by people, startups in their various stages and various types of organizations in a location (physical or virtual), interacting as a system to create and scale new startup companies. These organizations can be further divided into categories such as universities, funding organizations, support organizations (like incubators, accelerators, co-working spaces etc.), research organizations, service provider organizations (like legal, financial services etc.) and large corporations. Local Governments and Government organizations such as Commerce / Industry / Economic Development departments also play an important role in startup ecosystem. Different organizations typically focus on specific parts of the ecosystem function and startups at their specific development stage(s). Composition of the startup ecosystem Ideas, inventions and research i.e. Intellectual property rights (IPR) Entrepreneurship Education Startups at various stages Entrepreneurs Start up team members Angel investors Startup mentors Startup advisors Other business-oriented people People from other organizations with start-up activities Startup events Venture Capitalists List of organizations and/or organized activities with startup activities Universities Students Advisory and mentoring organizations Startup incubators Startup accelerators Coworking spaces Service providers (Consulting, Accounting, Legal, etc.) Event organizers Start-up competitions Startup Business Model Evaluators Business Angel Networks Venture capital companies Equity Crowdfunding portals Corporates (telcos, banking, health, food, etc.) Other funding providers (loans, grants etc.) Start-up blogs and social networks Other facilitators Investors from these roles are linked together through shared events, activities, locations and interactions. Startup ecosystems generally encompass the network of interactions between people, organizations, and their environment. Any parti
https://en.wikipedia.org/wiki/Sphere%20theorem
In Riemannian geometry, the sphere theorem, also known as the quarter-pinched sphere theorem, strongly restricts the topology of manifolds admitting metrics with a particular curvature bound. The precise statement of the theorem is as follows. If M is a complete, simply-connected, n-dimensional Riemannian manifold with sectional curvature taking values in the interval then M is homeomorphic to the n-sphere. (To be precise, we mean the sectional curvature of every tangent 2-plane at each point must lie in .) Another way of stating the result is that if M is not homeomorphic to the sphere, then it is impossible to put a metric on M with quarter-pinched curvature. Note that the conclusion is false if the sectional curvatures are allowed to take values in the closed interval . The standard counterexample is complex projective space with the Fubini–Study metric; sectional curvatures of this metric take on values between 1 and 4, with endpoints included. Other counterexamples may be found among the rank one symmetric spaces. Differentiable sphere theorem The original proof of the sphere theorem did not conclude that M was necessarily diffeomorphic to the n-sphere. This complication is because spheres in higher dimensions admit smooth structures that are not diffeomorphic. (For more information, see the article on exotic spheres.) However, in 2007 Simon Brendle and Richard Schoen utilized Ricci flow to prove that with the above hypotheses, M is necessarily diffeomorphic to the n-sphere with its standard smooth structure. Moreover, the proof of Brendle and Schoen only uses the weaker assumption of pointwise rather than global pinching. This result is known as the differentiable sphere theorem. History of the sphere theorem Heinz Hopf conjectured that a simply connected manifold with pinched sectional curvature is a sphere. In 1951, Harry Rauch showed that a simply connected manifold with curvature in [3/4,1] is homeomorphic to a sphere. In 1960, Marcel Berger a
https://en.wikipedia.org/wiki/Eisenstein%20sum
In mathematics, an Eisenstein sum is a finite sum depending on a finite field and related to a Gauss sum. Eisenstein sums were introduced by Eisenstein in 1848, named "Eisenstein sums" by Stickelberger in 1890, and rediscovered by Yamamoto in 1985, who called them relative Gauss sums. Definition The Eisenstein sum is given by where F is a finite extension of the finite field K, and χ is a character of the multiplicative group of F, and α is an element of K.
https://en.wikipedia.org/wiki/Ethogram
An ethogram is a catalogue or inventory of behaviours or actions exhibited by an animal used in ethology. The behaviours in an ethogram are usually defined to be mutually exclusive and objective, avoiding subjectivity and functional inference as to their possible purpose. For example, a species may use a putative threat display, which in the ethogram is given a descriptive name such as "head forward" or "chest-beating display", and not "head forward threat" or "chest-beating threat". This degree of objectivity is required because what looks like "courtship" might have a completely different function, and in addition, the same motor patterns in different species can have very different functions (e.g. tail wagging in cats and dogs). Objectivity and clarity in the definitions of behaviours also improve inter-observer reliability. Often, ethograms are hierarchical in presentation. The defined behaviours are recorded under broader categories of behaviour which may allow functional inference such that "head forward" is recorded under "Aggression". In ethograms of social behaviour, the ethogram may also indicate the "Giver" and "Receiver" of activities. Sometimes, the definition of a behaviour in an ethogram may have arbitrary components. For example, "Stereotyped licking" might be defined as "licking the bars of the cage more than 5 times in 30 seconds". The definition may be arguable, but if it is stated clearly, it fulfils the requirements of scientific repeatability and clarity of reporting and data recording. Some ethograms are given in pictorial form and not only catalogue the behaviours but indicate the frequency of their occurrence and the probability that one behaviour follows another. This probability can be indicated numerically or by the thickness of an arrow connecting the two behaviours. Sometimes the proportion of time that each behaviour occupies can be represented in a pie chart or bar chart Animal welfare science Ethograms are used extens
https://en.wikipedia.org/wiki/Tudor%20rose
The Tudor rose (sometimes called the Union rose) is the traditional floral heraldic emblem of England and takes its name and origins from the House of Tudor, which united the House of Lancaster and the House of York. The Tudor rose consists of five white inner petals, representing the House of York, and five red outer petals to represent the House of Lancaster. Origins In the Battle of Bosworth Field (1485), Henry VII, of the House of Lancaster, took the crown of England from Richard III, of the House of York. He thus brought to an end the retrospectively dubbed "Wars of the Roses". Kings of the House of Lancaster had sometimes used a red or gold rose as a badge; and the House of York had used a white rose as a badge. Henry's father was Edmund Tudor, and his mother was Margaret Beaufort from the House of Lancaster; in January 1486 he married Elizabeth of York to bring the two factions together. (In battle, Richard III fought under the banner of the boar, and Henry under the banner of the dragon of his native Wales.) The white rose versus red rose juxtaposition was mostly Henry's invention, created to exploit his appeal as a 'peacemaker king'. The historian Thomas Penn writes: On his marriage, Henry VII adopted the Tudor rose badge conjoining the White Rose of York and the Red Rose of Lancaster. The Tudor rose is occasionally seen divided in quarters (heraldically as "quartered") and vertically (in heraldic terms per pale) red and white. More often, the Tudor rose is depicted as a double rose, white on red and is always described, heraldically, as "proper" (that is, naturally-coloured, despite not actually existing in nature). Historical uses Henry VII was reserved in his usage of the Tudor rose. He regularly used the Lancastrian rose by itself, being the house to which he descended. His successor Henry VIII, descended from the House of York as well through his mother, would use the rose more often. When Arthur, Prince of Wales, died in 1502, his tomb in Worc
https://en.wikipedia.org/wiki/The%20Sims%20Social
The Sims Social was a Facebook addition to the Sims series of video games. It was announced during the Electronic Entertainment Expo 2011 press conference. As with the original Sims games, The Sims Social lets the user create their own customizable character. In this version, however, the player uses their character to interact with those of their Facebook friends. The characters can develop likes or dislikes for other Sims, creating relationships that can be publicized on the user's Facebook page. Description The Sims Social was a Facebook videogame developed by Playfish and EA, taking place in a fictional town called Littlehaven. A mobile application for smartphones was in development as a companion app to the Facebook version. The game also features remakes of real life famous people such as Lady Sim-Sim (Lady Gaga), Elvis Plumbob (Elvis Presley), and Sims Cara (Sin Cara). Skills Like other games in The Sims series, Sims could develop skills. There were six skills: art, cooking, music, writing, athletic, driving, and various project skill items which were tied with specific themed collections. Developing higher level skill levels allowed Sims to obtain new objects. Sims developed skills when the player interacted with an art object (such as easel or computer when level 30), a music object (such as a guitar or keyboard when level 10), a cooking object (such as a microwave, a coffee maker when level 10, or a stove when level 15), or a writing object (such as a computer or typewriter when level 10). At times, skills were a part of quests given to the player for their Sim to achieve. Careers However, careers in The Sims Social were much different than those of previous Sim games. Sims could aspire to three different career paths: Rocker, Chef, and Artist. Each career consisted of 5 levels each with three sub-levels. To advance in their given career players were required to submit appointments for various jobs. After the given appointment time the player could sen
https://en.wikipedia.org/wiki/Futile%20game
In game theory, a futile game is a game that permits a draw or a tie when optimal moves are made by both players. An example of this type of game is the classical form of Tic-tac-toe, though not all variants are futile games. The term does not apply to intransitive games, such as iterated prisoner's dilemma or rock–paper–scissors, in which there is no path to a draw or every strategy in the game can be beaten by another strategy. See also Partisan game Impartial game Solved game
https://en.wikipedia.org/wiki/Hereditary%20set
In set theory, a hereditary set (or pure set) is a set whose elements are all hereditary sets. That is, all elements of the set are themselves sets, as are all elements of the elements, and so on. Examples For example, it is vacuously true that the empty set is a hereditary set, and thus the set containing only the empty set is a hereditary set. Similarly, a set that contains two elements: the empty set and the set that contains only the empty set, is a hereditary set. In formulations of set theory In formulations of set theory that are intended to be interpreted in the von Neumann universe or to express the content of Zermelo–Fraenkel set theory, all sets are hereditary, because the only sort of object that is even a candidate to be an element of a set is another set. Thus the notion of hereditary set is interesting only in a context in which there may be urelements. Assumptions The inductive definition of hereditary sets presupposes that set membership is well-founded (i.e., the axiom of regularity), otherwise the recurrence may not have a unique solution. However, it can be restated non-inductively as follows: a set is hereditary if and only if its transitive closure contains only sets. In this way the concept of hereditary sets can also be extended to non-well-founded set theories in which sets can be members of themselves. For example, a set that contains only itself is a hereditary set. See also Hereditarily countable set Hereditarily finite set Well-founded set
https://en.wikipedia.org/wiki/Fargam
Fargam (Auspicious in Persian) was the name of a male Rhesus macaque monkey launched into space by Iran. This was Iran's second attempt at launching a monkey into space, their first attempt in 2010 had failed as the animal died in space. The news was released by Iranian state TV which also showed footage of Fargam strapped inside the rocket. Former president Rouhani congratulated Iranian Scientists afterwards, touting it as a "long step in getting the Islamic Republic of Iran closer to sending a man into space". In 2010, Iran had successfully launched worms, a rat and a turtle into space. Technology The launch was conducted using domestic research (Pažuheš in Persian). The rocket was reported to have reached an altitude of 120 km (75 miles) before the capsule was parachuted down. The whole mission was reported to have lasted 15 minutes. Skepticism Many are skeptical of the claims made by Iran as the pictures released afterwards showed two different monkeys. The animal is suspected to have died in flight, although Iran disputed the claim, saying that it was mix-up with pictures of another monkey candidate considered for the mission. See also Monkeys and apes in space Animals in space Iranian Space Agency
https://en.wikipedia.org/wiki/The%20New%20Voice%20of%20Ukraine
The New Voice of Ukraine or simply as the New Voice is a Ukrainian, English and Russian language newspaper based in Ukraine that was founded in 2014 to offer unbiased and unaffiliated independent reporting on issues regarding Ukraine. History The newspaper was founded in 2014 with the mission of not being affiliated to any political party nor be owned by any major corporation. According to data gathered in 2021 by Gemius international research the company had 5,572,440 "real users" visit their site, making them the 5th most viewed news company in Ukraine, additionally their site pulled 10,000,000+ unique visitors according to Google analytics that year. The company also has 14,000 paying subscribers who can see their limited number of articles with a paywall. Since the start of the Russian invasion of Ukraine, The New Voice of Ukraine has been reporting on the war 24/7 non-stop both on their website, and with their radio station, and, according to The Groundtruth Project is a reliable source that disseminates propaganda to report facts, instead of adding to misinformation. During the Battle of Kyiv, New Voice journalists preformed front-line reporting. Additionally, due to their war coverage, the newspaper was subjected to Russian cyberattacks.
https://en.wikipedia.org/wiki/R4000
The R4000 is a microprocessor developed by MIPS Computer Systems that implements the MIPS III instruction set architecture (ISA). Officially announced on 1 October 1991, it was one of the first 64-bit microprocessors and the first MIPS III implementation. In the early 1990s, when RISC microprocessors were expected to replace CISC microprocessors such as the Intel i486, the R4000 was selected to be the microprocessor of the Advanced Computing Environment (ACE), an industry standard that intended to define a common RISC platform. ACE ultimately failed for a number of reasons, but the R4000 found success in the workstation and server markets. Models There are three configurations of the R4000: the R4000PC, an entry-level model with no support for a secondary cache; the R4000SC, a model with secondary cache but no multiprocessor capability; and the R4000MC, a model with secondary cache and support for the cache coherency protocols required by multiprocessor systems. Description The R4000 is a scalar superpipelined microprocessor with an eight-stage integer pipeline. During the first stage (IF), a virtual address for an instruction is generated and the instruction translation lookaside buffer (TLB) begins the translation of the address to a physical address. In the second stage (IS), translation is completed and the instruction is fetched from an internal 8 KB instruction cache. The instruction cache is direct-mapped and virtually indexed, physically tagged. It has a 16- or 32-byte line size. Architecturally, it could be expanded to 32 KB. During the third stage (RF), the instruction is decoded and the register file is read. The MIPS III defines two register files, one for the integer unit and the other for floating-point. Each register file is 64 bits wide and contained 32 entries. The integer register file has two read ports and one write port, while the floating-point register file has two read ports and two write ports. Execution begins at stage four (EX) for bo
https://en.wikipedia.org/wiki/SPG23
Spastic paraplegia 23 (SPG autosomal recessive) is a 25cM gene locus at 1q24-q32. A genome-wide linkage screen has associated this locus with a type of hereditary spastic paraplegia (HSP).
https://en.wikipedia.org/wiki/2%CE%B1-Mannobiose
2α-Mannobiose is a disaccharide. It is formed by a condensation reaction, when two mannose molecules react together, in the formation of a glycosidic bond.
https://en.wikipedia.org/wiki/ZoneZero
ZoneZero is a website dedicated to photography, founded in 1994 by Mexican photographer Pedro Meyer. It first appeared online when the internet became a public resource, making it the oldest still standing and growing website dedicated to photography. Robert Hirsch has referred to it as a "top-notch" photographic site. The site is bilingual English and Spanish and free of charge. It has a curated gallery space with portfolios and slide shows of featured photographers. Anyone meeting certain requirements can submit up to five images to the portfolio. The site also includes a magazine, a monthly editorial written by foundation staff and the founder, moblogs, e-books for download, and a forum.
https://en.wikipedia.org/wiki/Swiss%20cheese%20%28mathematics%29
In mathematics, a Swiss cheese is a compact subset of the complex plane obtained by removing from a closed disc some countable union of open discs, usually with some restriction on the centres and radii of the removed discs. Traditionally the deleted discs should have pairwise disjoint closures which are subsets of the interior of the starting disc, the sum of the radii of the deleted discs should be finite, and the Swiss cheese should have empty interior. This is the type of Swiss cheese originally introduced by the Swiss mathematician Alice Roth. More generally, a Swiss cheese may be all or part of Euclidean space Rn – or of an even more complicated manifold – with "holes" in it.
https://en.wikipedia.org/wiki/Donkey
The donkey is a domesticated equine. It derives from the African wild ass, Equus africanus, and may be classified either as a subspecies thereof, Equus africanus asinus, or as a separate species, Equus asinus. It was domesticated in Africa some years ago, and has been used mainly as a working animal since that time. There are more than 40 million donkeys in the world, mostly in underdeveloped countries, where they are used principally as draught or pack animals. While working donkeys are often associated with those living at or below subsistence, small numbers of donkeys or asses are kept for breeding or as pets in developed countries. An adult male donkey is a jack or jackass, an adult female is a jenny or jennet, and an immature donkey of either sex is a foal. Jacks are often mated with female horses (mares) to produce mules; the less common hybrid of a male horse (stallion) and jenny is a hinny. Nomenclature Traditionally, the scientific name for the donkey is Equus asinus asinus, on the basis of the principle of priority used for scientific names of animals. However, the International Commission on Zoological Nomenclature ruled in 2003 that if the domestic and the wild species are considered subspecies of a common species, the scientific name of the wild species has priority, even when that subspecies was described after the domestic subspecies. This means that the proper scientific name for the donkey is Equus africanus asinus when it is considered a subspecies and Equus asinus when it is considered a species. At one time, the synonym ass was the more common term for the donkey. The first recorded use of donkey was in either 1784 or 1785. While the word ass has cognates in most other Indo-European languages, donkey is an etymologically obscure word for which no credible cognate has been identified. Hypotheses on its derivation include the following: perhaps from Spanish for its don-like gravity; the donkey was also known as "the King of Spain's trumpet
https://en.wikipedia.org/wiki/Spacetime%20diagram
A spacetime diagram is a graphical illustration of locations in space at various times, especially in the special theory of relativity. Spacetime diagrams can show the geometry underlying phenomena like time dilation and length contraction without mathematical equations. The history of an object's location through time traces out a line or curve on a spacetime diagram, referred to as the object's world line. Each point in a spacetime diagram represents a unique position in space and time and is referred to as an event. The most well-known class of spacetime diagrams are known as Minkowski diagrams, developed by Hermann Minkowski in 1908. Minkowski diagrams are two-dimensional graphs that depict events as happening in a universe consisting of one space dimension and one time dimension. Unlike a regular distance-time graph, the distance is displayed on the horizontal axis and time on the vertical axis. Additionally, the time and space units of measurement are chosen in such a way that an object moving at the speed of light is depicted as following a 45° angle to the diagram's axes. Introduction to kinetic diagrams Position versus time graphs In the study of 1-dimensional kinematics, position vs. time graphs (called x-t graphs for short) provide a useful means to describe motion. Kinematic features besides the object's position are visible by the slope and shape of the lines. In Fig 1-1, the plotted object moves away from the origin at a positive constant velocity (1.66 m/s) for 6 seconds, halts for 5 seconds, then returns to the origin over a period of 7 seconds at a non-constant speed (but negative velocity). At its most basic level, a spacetime diagram is merely a time vs position graph, with the directions of the axes in a usual p-t graph exchanged; that is, the vertical axis refers to temporal and the horizontal axis to spatial coordinate values. Especially when used in special relativity (SR), the temporal axes of a spacetime diagram are often scaled with
https://en.wikipedia.org/wiki/Modelling%20biological%20systems
Modelling biological systems is a significant task of systems biology and mathematical biology. Computational systems biology aims to develop and use efficient algorithms, data structures, visualization and communication tools with the goal of computer modelling of biological systems. It involves the use of computer simulations of biological systems, including cellular subsystems (such as the networks of metabolites and enzymes which comprise metabolism, signal transduction pathways and gene regulatory networks), to both analyze and visualize the complex connections of these cellular processes. An unexpected emergent property of a complex system may be a result of the interplay of the cause-and-effect among simpler, integrated parts (see biological organisation). Biological systems manifest many important examples of emergent properties in the complex interplay of components. Traditional study of biological systems requires reductive methods in which quantities of data are gathered by category, such as concentration over time in response to a certain stimulus. Computers are critical to analysis and modelling of these data. The goal is to create accurate real-time models of a system's response to environmental and internal stimuli, such as a model of a cancer cell in order to find weaknesses in its signalling pathways, or modelling of ion channel mutations to see effects on cardiomyocytes and in turn, the function of a beating heart. Standards By far the most widely accepted standard format for storing and exchanging models in the field is the Systems Biology Markup Language (SBML). The SBML.org website includes a guide to many important software packages used in computational systems biology. A large number of models encoded in SBML can be retrieved from BioModels. Other markup languages with different emphases include BioPAX and CellML. Particular tasks Cellular model Creating a cellular model has been a particularly challenging task of systems biology and
https://en.wikipedia.org/wiki/Chofa
Chofa (, ; lit. sky tassel) is a Lao and Thai architectural decorative ornament that adorns the top at the end of wat and palace roofs in most Southeast Asian countries, such as Thailand, Cambodia, Laos, and Myanmar. It resembles a tall thin bird and looks hornlike. The chofa is generally believed to represent the mythical creature Garuda, half bird and half man, who is the vehicle of the Hindu god Vishnu. History The representation of cho fah is unclear and believed to represent garuda, however, the present research indicates that the original chofah upon which most subsequent chofah have been based is the gajashimha of Suryavarman II, the Khmer king who built Angkor Wat. Temple finials representing gajashimha was presumably appeared in Cambodia during or shortly after his reign (1113 AD to 1150 AD). These finials (chofah) symbolized the unification of the northern and southern Khmer kingdoms and the reign of King Suryavarman II. This symbolism spread extensively throughout the region including part of today Laos, Lanna, and Isan which were once the Khmer empire. From 13th to 18th century, ceramic finials or chofah in the form of the gajashimha were largely produced in Sukothai, Sawankalok, and Ayutthaya. Today most wats or pagodas and palaces throughout Cambodia, Laos, and Thailand are adorned with these sacred finials at their roof end with many types and appearance. Components Horn Tip Breast Types Swan tip (Pak Hong; ปากหงส์) Garuda tip (Pak Khrut; ปากครุฑ) Fish tip (Pak Pla; ปากปลา) Elephant head (Hua Chang; หัวช้าง) Naga head Bird head (Hua Nok; หัวนก) Lanna (ล้านนา) Others
https://en.wikipedia.org/wiki/Automatic%20Certificate%20Management%20Environment
The Automatic Certificate Management Environment (ACME) protocol is a communications protocol for automating interactions between certificate authorities and their users' servers, allowing the automated deployment of public key infrastructure at very low cost. It was designed by the Internet Security Research Group (ISRG) for their Let's Encrypt service. The protocol, based on passing JSON-formatted messages over HTTPS, has been published as an Internet Standard in by its own chartered IETF working group. Client implementations The ISRG provides free and open-source reference implementations for ACME: certbot is a Python-based implementation of server certificate management software using the ACME protocol, and boulder is a certificate authority implementation, written in Go. Since 2015 a large variety of client options have appeared for all operating systems. API versions API version 1 API v1 specification was published on April 12, 2016. It supports issuing certificates for fully-qualified domain names, such as example.com or cluster.example.com, but not wildcards like *.example.com. Let's Encrypt turned off API v1 support on 1 June 2021. API version 2 API v2 was released March 13, 2018 after being pushed back several times. ACME v2 is not backwards compatible with v1. Version 2 supports wildcard domains, such as *.example.com, allowing for many subdomains to have trusted TLS, e.g. https://cluster01.example.com, https://cluster02.example.com, https://example.com, on private networks under a single domain using a single shared "wildcard" certificate. A major new requirement in v2 is that requests for wildcard certificates require the modification of a Domain Name Service TXT record, verifying control over the domain. Changes to ACME v2 protocol since v1 include: The authorization/issuance flow has changed. JWS request authorization has changed. The "resource" field of JWS request bodies is replaced by a new JWS header: "url". Directory endpoint/res
https://en.wikipedia.org/wiki/Market%20fragmentation
Fragmentation in a technology market happens when a market is composed of multiple highly-incompatible technologies or technology stacks, forcing prospective buyers of a single product to commit to an entire product ecosystem, rather than maintaining free choice of complementary products and services. Two common varieties of fragmentation are market fragmentation and version fragmentation. Fragmentation is the opposite of, and is solved by standardization. Market fragmentation Market fragmentation happens when multiple competing firms offer highly-incompatible technologies or technology stacks, likely leading to vendor lock-in. Version fragmentation Version fragmentation happens when a firm offers multiple incompatible versions or variations of a single product, either in tandem or over time as a result of accumulated changes to product specification. Android and iOS operating systems A term being used in the Android development community is Android fragmentation. Fragmentation within Android is when a variety of versions of the Android platform, combined with a mixture of hardware result in the inability for some devices to properly run certain applications. Despite Google upgrading its Android operating system to version 4.4, also known as KitKat, users continued to use the earlier versions of the operating system, primarily Gingerbread (that's down to 0.3% share). The cause is primarily because hardware manufacturers of the devices are not able to upgrade to the later operating system for a number of reasons. As a result, applications written for one version will not operate consistently on the other, and vice versa. In August 2010, developers of the OpenSignal wireless crowd-sourcing app detected 3,997 distinct values for "android.build.MODEL" among users of their app. This variable represents the device model, though it may be altered by adding a custom ROM. OpenSignal acknowledged that while this made it problematic to develop apps, the wide variety of
https://en.wikipedia.org/wiki/Eberhard%20Zeidler%20%28mathematician%29
Eberhard Hermann Erich Zeidler (6 October 1940 in Leipzig, Germany – 18 November 2016 ibid) was a German mathematician, who worked primarily in the field of non-linear functional analysis. Life and work After attending the Leipzig Eberhard Zeidler began studying mathematics at the University of Leipzig in 1959. In 1961, he was exmatriculated because of critical statements, and was forced to work as a transport worker and absolve his military service in the East-German's NVA. In 1964, he was allowed to continue his studies. In 1967, he received his Dr. rer. nat. (PhD) with his work "" under . In 1970, he was appointed to habilitation and became a lecturer for analysis at the University of Leipzig. From 1974 to 1996 he was full professor for analysis. In the winter semester of 1979–1980, Eberhard Zeidler was a visiting professor at the University of Wisconsin–Madison (USA). From 1992 to 1996, he was head of the DFG research group on "" (Nonlinear functional analysis and its applications), and from 1992 to 2000 he was a member of the scientific advisory board of the Mathematisches Forschungsinstitut Oberwolfach. In 1996, Eberhard Zeidler became the first managing director of the Max Planck Institute for Mathematics in the Sciences when it was founded in Leipzig. In 2003, he gave up the management, but remained director. He retired in October 2007. Eberhard Zeidler has been a member of the German Academy of Sciences Leopoldina since 1994. Also, he was one of the founding members of the Foundation Board and the Foundation Advisory Board of the Stiftung Benedictus Gotthelf Teubner. Awards and honors 2005: International symposium of the Max Planck Institute for Mathematics in the Natural Sciences and the University of Leipzig on the occasion of the 65th birthday of Eberhard Zeidler 2006: 2014-02-21: Stiftung Benedictus Gotthelf Teubner Science Prize of the Teubner Foundation for the Promotion of Mathematical Sciences Publications . Dissertation. Universitä
https://en.wikipedia.org/wiki/Ms2%20%28software%29
ms2 is a non-commercial molecular simulation program. It comprises both molecular dynamics and Monte Carlo simulation algorithms. ms2 is designed for the calculation of thermodynamic properties of fluids. A large number of thermodynamic properties can be readily computed using ms2, e.g. phase equilibrium, transport and caloric properties. ms2 is limited to homogeneous state simulations. Features ms2 contains two molecular simulation techniques: molecular dynamics (MD) and Monte-Carlo. ms2 supports the calculation of vapor-liquid equilibria of pure components as well as multi-component mixtures. Different Phase equilibrium calculation methods are implemented in ms2. Furthermore, ms2 is capable of sampling various classical ensembles such as NpT, NVE, NVT, NpH. To evaluate the chemical potential, Widom's test molecule method and thermodynamic integration are implemented. Also, algorithms for the sampling of transport properties are implemented in ms2. Transport properties are determined by equilibrium MD simulations following the Green-Kubo formalism and the Einstein formalism. Applications ms2 has been frequently used for predicting thermophysical properties of fluids for chemical engineering applications as well as for scientific computing and soft matter physics. It has been used for modelling both model fluids as well as real substances. A large number interaction potentials are implemented in ms2, e.g. the Lennard-Jones potential, the Mie potential, electrostatic interactions (point charges, point dipoles and point quadrupoles), and external forces. Force fields from databases such as the MolMod database can readily be used in ms2. See also Comparison of software for molecular mechanics modeling List of Monte Carlo simulation software List of free and open-source software packages
https://en.wikipedia.org/wiki/Climatic%20adaptation
Climatic adaptation refers to adaptations of an organism that are triggered due to the patterns of variation of abiotic factors that determine a specific climate. Annual means, seasonal variation and daily patterns of abiotic factors are properties of a climate where organisms can be adapted to. Changes in behavior, physical structure, internal mechanisms and metabolism are forms of adaptation that is caused by climate properties. Organisms of the same species that occur in different climates can be compared to determine which adaptations are due to climate and which are influenced majorly by other factors. Climatic adaptations limits to adaptations that have been established, characterizing species that live within the specific climate. It is different from climate change adaptations which refers to the ability to adapt to gradual changes of a climate. Once a climate has changed, the climate change adaptation that led to the survival of the specific organisms as a species can be seen as a climatic adaptation. Climatic adaptation is constrained by the genetic variability of the species in question. Climate patterns The patterns of variation of abiotic factors determine a climate and thus climatic adaptation. There are many different climates around the world, each with its unique patterns. Because of this, the manner of climatic adaptation shows large differences between the climates. A subarctic climate, for instance, shows daylight time and temperature fluctuations as most important factors, while in rainforest climate, the most important factor is characterized by the stable high precipitation rate and high average temperature that doesn't fluctuate a lot. Humid continental climate is marked by seasonal temperature variances which commonly lead to seasonal climate adaptations. Because the variance of these abiotic factors differ depending on the type of climate, differences in the manner of climatic adaptation are expected. Research Research on climatic adaptat
https://en.wikipedia.org/wiki/FL%20Studio%20Mobile
FL Studio Mobile is a digital audio workstation available for Android, iOS and Windows UWP. The program allows for the creation of complete multi-track music projects, which can then be exported in WAV, MP3 and MIDI formats, to work with other digital audio workstations, or in FLM project format to be opened in FL Studio 10.0.5 or later. Various features include a step sequencer, piano roll, keyboard, drum pad, track editor, effects, and 133 sampled instruments including synths and drum kits. Instruments can also be added as .zip or .instr files. Release On June 21, 2011, Image-Line released FL Studio Mobile and FL Studio Mobile HD, versions of their Windows digital audio workstation FL Studio. FL Studio Mobile was designed by Artua and developed in cooperation with the makers of Music Studio. Image-Line released the program at an introductory price of $15.99 ($19.99 for the HD version), and both versions are available for download at the App Store. In November/December 2016 Image-Line released FL Studio Mobile 3 on the Android (Google Play Store) then iOS (Apple App Store) and finally Windows (Windows App Store). FL Studio Mobile 3 was a completely new application developed in-house at Image-Line, replacing the existing FL Studio Mobile 2, Artua developed version. The price was revised downward to US$14.99. FL Studio Mobile 1.0 is compatible with devices that operate iOS 3.1.3 or later, specifically all iPhones and iPod Touch models. iPad 1 and iPad 2 can run either FL Studio Mobile or FL Studio Mobile HD, and the HD version requires iOS 4.2 or later. The iPhone 4 version includes Retina Display support. Features Track editor The program has a track editor mode that supports 99 layered tracks. Features include adding, duplicating, and deleting tracks, changing the track's instruments, setting song signature and tempo, an effect bus setting, a pan knob, a volume fader, and mute and solo buttons. Piano roll editor The piano roll editor allows for manually draw
https://en.wikipedia.org/wiki/K.%20R.%20Parthasarathy%20%28probabilist%29
Kalyanapuram Rangachari Parthasarathy (25 June 1936 – 14 June 2023) was an Indian statistician who was professor emeritus at the Indian Statistical Institute and a pioneer of quantum stochastic calculus. Parthasarathy was the recipient the Shanti Swarup Bhatnagar Prize for Science and Technology in Mathematical Science in 1977 and the TWAS Prize in 1996. Biography Parthasarathy was born on 25 June 1936 in Madras, into a modest but deeply religious Hindu Brahmin family. He completed his early years of schooling in Thanjavur, before moving back to Madras to complete his schooling from P. S. School in the Mylapore neighbourhood of the city. He went on to study at the Ramakrishna Mission Vivekananda College, where he completed the B.A. (Honours) course in Mathematics. Parthasarathy then moved to Kolkata to attend the Research and Training school at the Indian Statistical Institute, where he completed his Ph.D., under the supervision of C. R. Rao in 1962. He was one of the "famous four" at ISI from 1956 to 1963, alongside R. Ranga Rao, Veeravalli S. Varadarajan, and S. R. Srinivasa Varadhan. He was awarded the first Ph.D. degree of ISI. He received the Shanti Swarup Bhatnagar Prize for Science and Technology in Mathematical Science in 1977 and the The World Academy of Sciences (TWAS) Prize for Mathematics in 1996. Parthasarathy was married to Shyama Parthasarathy. The couple had two sons. Parthasarathy died in Delhi on 14 June 2023, at the age of 86. Research Parthasarathy started his work on theoretical probability during his time at the Indian Statistical Institute. He later worked at the Steklov Mathematical Institute, USSR Academy of Sciences (1962–63), as lecturer where he collaborated with Andrey Kolmogorov. During this time, he continued to focus on the foundations of probability theory. Later he came to United Kingdom as Professor of Statistics at University of Sheffield (1964–68), University of Manchester (1968–70) and later at University of Nottingham wh
https://en.wikipedia.org/wiki/Lipid%20peroxidation
Lipid peroxidation is the chain of reactions of oxidative degradation of lipids. It is the process in which free radicals "steal" electrons from the lipids in cell membranes, resulting in cell damage. This process proceeds by a free radical chain reaction mechanism. It most often affects polyunsaturated fatty acids, because they contain multiple double bonds in between which lie methylene bridges (-CH2-) that possess especially reactive hydrogen atoms. As with any radical reaction, the reaction consists of three major steps: initiation, propagation, and termination. The chemical products of this oxidation are known as lipid peroxides or lipid oxidation products (LOPs). Initiation Initiation is the step in which a fatty acid radical is produced. The most notable initiators in living cells are reactive oxygen species (ROS), such as OH· and HOO·, which combines with a hydrogen atom to make water and a fatty acid radical. Propagation The fatty acid radical is not a very stable molecule, so it reacts readily with molecular oxygen, thereby creating a peroxyl-fatty acid radical. This radical is also an unstable species that reacts with another free fatty acid, producing a different fatty acid radical and a lipid peroxide, or a cyclic peroxide if it had reacted with itself. This cycle continues, as the new fatty acid radical reacts in the same way. Termination When a radical reacts with a non-radical, it can produce another radical, which is why the process is called a "chain reaction mechanism". The radical reaction stops when two radicals react and produce a non-radical species. This happens only when the concentration of radical species is high enough for there to be a high probability of collision of two radicals. Living organisms have different molecules that speed up termination by neutralizing free radicals and, therefore, protecting the cell membrane. Antioxidants such as vitamin C and vitamin E may inhibit lipid peroxidation. Other anti-oxidants made within
https://en.wikipedia.org/wiki/Mega%20Food%20Parks
Mega Food Park is a scheme of the Ministry of Food Processing (part of the Government of India) with the aim of establishing a "direct linkage from farm to processing and then to consumer markets" through a network of collection centres and primary processing centres. Its purpose was to increase processing of perishables from 6% to 20% and to increase India's share in global food trade by at least 3% up to year 2015. According to an estimate, the Indian food industry was to grow from $200 million USD to $310 million USD in 2015 by this plan. Highlights of scheme Government provides grants up to Rs 50 crores for each food park to a consortium of companies. 30-35 food processing units are expected to be established. Collective investment of companies is expected to be at least 250 crores. A turnover of 400-500 crore and employment generation of at least 30000 from each mega food park is expected. A total of 42 Mega Food Parks have been sanctioned so far by MoFPI in six phases. These MFPs are to ensure backward linkages to the farmers, SHGs, JLVs etc. & enhance farmer income. Each MFP is supposed to connect with 25000 farmers. Government has envisaged building quality labs at each of the food parks as well Status A sanction of 42 food parks has been planned, out of which 25 in various states have already been sanctioned with 17 pending, expression of interest is available from companies with the government. According to the Government, as of October 2016, 8 mega food parks have become operational and all 42 would be operational in the next 2 years.
https://en.wikipedia.org/wiki/Reprogramming
In biology, reprogramming refers to erasure and remodeling of epigenetic marks, such as DNA methylation, during mammalian development or in cell culture. Such control is also often associated with alternative covalent modifications of histones. Reprogrammings that are both large scale (10% to 100% of epigenetic marks) and rapid (hours to a few days) occur at three life stages of mammals. Almost 100% of epigenetic marks are reprogrammed in two short periods early in development after fertilization of an ovum by a sperm. In addition, almost 10% of DNA methylations in neurons of the hippocampus can be rapidly altered during formation of a strong fear memory. After fertilization in mammals, DNA methylation patterns are largely erased and then re-established during early embryonic development. Almost all of the methylations from the parents are erased, first during early embryogenesis, and again in gametogenesis, with demethylation and remethylation occurring each time. Demethylation during early embryogenesis occurs in the preimplantation period. After a sperm fertilizes an ovum to form a zygote, rapid DNA demethylation of the paternal DNA and slower demethylation of the maternal DNA occurs until formation of a morula, which has almost no methylation. After the blastocyst is formed, methylation can begin, and with formation of the epiblast a wave of methylation then takes place until the implantation stage of the embryo. Another period of rapid and almost complete demethylation occurs during gametogenesis within the primordial germ cells (PGCs). Other than the PGCs, in the post-implantation stage, methylation patterns in somatic cells are stage- and tissue-specific with changes that presumably define each individual cell type and last stably over a long time. Embryonic development The mouse sperm genome is 80–90% methylated at its CpG sites in DNA, amounting to about 20 million methylated sites. After fertilization, the paternal chromosome is almost compl
https://en.wikipedia.org/wiki/Triangular%20interval
The triangular interval (also known as the lateral triangular space, lower triangular space, and triceps hiatus) is a space found in the axilla. It is one of the three intermuscular spaces found in the axillary space. The other two spaces are: quadrangular space and triangular space. Borders Two of its borders are as follows: teres major - superior long head of the triceps brachii - medial Some sources state the lateral border is the humerus, while others define it as the lateral head of the triceps. (The effective difference is relatively minor, though.) Contents The contents of its borders are as follows: Radial nerve Profunda Brachii The radial nerve is visible through the triangular interval, on its way to the posterior compartment of the arm. Profunda Brachii also passes through the triangular interval from anterior to posterior. Additional images Triangular Interval Syndrome Triangular Interval Syndrome (TIS) was described as a differential diagnosis for radicular pain in the upper extremity. It is a condition where the radial nerve is entrapped in the triangular interval resulting in upper extremity radicular pain. The radial nerve and profunda brachii pass through the triangular interval and are hence vulnerable. The triangular interval has a potential for compromise secondary alterations in thickness of the teres major and triceps. It is described based on cadaveric studies that fibrous bands were commonly present between the teres major and triceps. When these bands were present, rotation of the shoulder caused a reduction in cross sectional area of the space. Normal resting postures of humeral adduction and internal rotation with scapular protraction may be speculated as a precedent for teres major contractures owing to the shortened position of this muscle in this position. In addition, hypertrophy of this muscle can occur secondary to weight training and potentially compromise the triangular interval with resultant entrapment of the radial
https://en.wikipedia.org/wiki/TurboDOS
TurboDOS is a multi user CP/M like operating system for the Z80 and 8086 CPUs developed by Software 2000 Inc. It was released around 1982 for S100 bus based systems such as the NorthStar Horizon and the Commercial Systems line of the multiprocessor systems including the CSI-50, CSI-75, SCI-100 and CSI-150. The multiprocessor nature of TurboDOS is its most unusual feature. Unlike other operating systems of its time where networking of processors was either an afterthought, or which only support a file transfer protocol, TurboDOS was designed from the ground up as a multiprocessor operating system. It is modular in construction, with the operating system generation based on a relocating, linking, loader program. This makes the incorporation of different hardware driver modules quite easy, particularly for bus-oriented machines, such as the IEEE-696 (S-100) bus which was commonly used for TurboDOS systems. Architecture TurboDOS is highly modular, consisting of more than forty separate functional modules distributed in relocatable form. These modules are "building blocks" that you can combine in various ways to produce a family of compatible operating systems. This section describes the modules in detail, and describes how to combine them in various configurations. Possible TurboDOS configurations include: single-user without spooling single-user with spooling network server simple network user (no local disks) complex network user (with local disks) Numerous subtle variations are possible in each of these categories. Module hierarchy The architecture of TurboDOS can be viewed as a three-level hierarchy. The highest level of the hierarchy is the process level. TurboDOS can support many concurrent processes at this level. The intermediate level of the hierarchy is the kernel level. The kernel supports the 93 C-functions and T-functions, and controls the sharing of computer resources such as processor time, memory, peripheral devices, and disk files. Proc
https://en.wikipedia.org/wiki/Scripting%20language
A scripting language or script language is a programming language that is used to manipulate, customize, and automate the facilities of an existing system. Scripting languages are usually interpreted at runtime rather than compiled. A scripting language's primitives are usually elementary tasks or API calls, and the scripting language allows them to be combined into more programs. Environments that can be automated through scripting include application software, text editors, web pages, operating system shells, embedded systems, and computer games. A scripting language can be a general purpose language or a domain-specific language for a particular environment; in the case of scripting an application, it is also known as an extension language. Scripting languages are also sometimes referred to as very high-level programming languages, as they sometimes operate at a high level of abstraction, or as control languages, particularly for job control languages on mainframes. The term scripting language is also used in a wider sense, namely, to refer to dynamic high-level programming languages in general; some are strictly interpreted languages, while others use a form of compilation. In this context, the term script refers to a small program in such a language; typically, contained in a single file, and no larger than a few thousand lines of code. The spectrum of scripting languages ranges from small to large, and from highly domain-specific language to general-purpose programming languages. A language may start as small and highly domain-specific and later develop into a portable and general-purpose language; conversely, a general-purpose language may later develop special domain-specific dialects. Examples AWK, a text-processing language available in most Unix-like operating systems, which has been ported to other operating systems. Bash, an interpreted scripting language for use on Unix, GNU and other Unix-like operating systems and environments. Groovy is an
https://en.wikipedia.org/wiki/Continuous%20poset
In order theory, a continuous poset is a partially ordered set in which every element is the directed supremum of elements approximating it. Definitions Let be two elements of a preordered set . Then we say that approximates , or that is way-below , if the following two equivalent conditions are satisfied. For any directed set such that , there is a such that . For any ideal such that , . If approximates , we write . The approximation relation is a transitive relation that is weaker than the original order, also antisymmetric if is a partially ordered set, but not necessarily a preorder. It is a preorder if and only if satisfies the ascending chain condition. For any , let Then is an upper set, and a lower set. If is an upper-semilattice, is a directed set (that is, implies ), and therefore an ideal. A preordered set is called a continuous preordered set if for any , the subset is directed and . Properties The interpolation property For any two elements of a continuous preordered set , if and only if for any directed set such that , there is a such that . From this follows the interpolation property of the continuous preordered set : for any such that there is a such that . Continuous dcpos For any two elements of a continuous dcpo , the following two conditions are equivalent. and . For any directed set such that , there is a such that and . Using this it can be shown that the following stronger interpolation property is true for continuous dcpos. For any such that and , there is a such that and . For a dcpo , the following conditions are equivalent. is continuous. The supremum map from the partially ordered set of ideals of to has a left adjoint. In this case, the actual left adjoint is Continuous complete lattices For any two elements of a complete lattice , if and only if for any subset such that , there is a finite subset such that . Let be a complete lattice. Then the following conditions are equiva
https://en.wikipedia.org/wiki/Call%20signs%20in%20Australia
Call signs in Australia are allocated by the Australian Communications and Media Authority and are unique for each broadcast station. The use of callsigns on-air in both radio and television in Australia is optional, so many stations used other on-air identifications. Australian broadcast stations officially have the prefix VL- and originally all callsigns used that format, but since Australia has no nearby neighbours, this prefix is no longer used except in an international context. Call sign blocks for telecommunication The International Telecommunication Union has assigned Australia the following call sign blocks for all radio communication, broadcasting or transmission: While not directly related to call signs, the International Telecommunication Union (ITU) further has divided all countries assigned amateur radio prefixes into three regions; Australia is located in ITU Region 3. It is assigned ITU Zones 55, 58 and 59, with the Pacific Islands in Australian jurisdiction in Zone 60. Call signs for radio All radio call signs begin with a single-digit number indicating the state or territory, followed by two or three letters. In most cases, two letters are used for AM stations and three for FM, but there are some exceptions, such as 5UV in Adelaide, which broadcasts on an FM frequency, and 3RPH in Melbourne, which broadcasts on an AM frequency. While some AM stations retained their old call signs when moving to FM, most add an extra letter to the call sign. For instance, when 7HO Hobart became an FM station, it adopted the callsign 7HHO. Certain ABC radio stations, particularly outside of metropolitan areas, may use five-letter call signs for FM stations: xABCFM for ABC Classic FM, xABCRN for Radio National, and xABCRR for ABC Local Radio – the x being the state number. Also, SBS FM radio stations use a five-letter call sign, xSBSFM. (Sydney and Melbourne's AM stations use 2EA and 3EA, meaning Ethnic Australia.) There are a number of exceptions: For some t
https://en.wikipedia.org/wiki/Average%20rectified%20value
In electrical engineering, the average rectified value (ARV) of a quantity is the average of its absolute value. The average of a symmetric alternating value is zero and it is therefore not useful to characterize it. Thus the easiest way to determine a quantitative measurement size is to use the average rectified value. The average rectified value is mainly used to characterize alternating voltage and current. It can be computed by averaging the absolute value of a waveform over one full period of the waveform. While conceptually similar to the root mean square (RMS), ARV will differ from it whenever a function's absolute value varies locally, as the former then increases disproportionately. The difference is expressed by the form factor See also Average absolute deviation Root mean square Form factor (electronics) True RMS converter
https://en.wikipedia.org/wiki/Eclipta%20angustata
Eclipta angustata is an Asian species of plants in the family Asteraceae. It is widespread across the Indian Subcontinent, Southeast Asia, southern China, Taiwan, and the Ryukyu Islands in Japan. It is regarded as a weed in some places, in others used as an herb, hair dye, or edible vegetable. Eclipta angustata was for years regarded as part of the species E. prostrata before being recognized as a distinct species in 2007. It differs in having sessile leaves, subovate achenes, and conspicuous tubercules.
https://en.wikipedia.org/wiki/List%20of%20unsolved%20problems%20in%20computer%20science
This article is a list of notable unsolved problems in computer science. A problem in computer science is considered unsolved when no solution is known, or when experts in the field disagree about proposed solutions. Computational complexity P versus NP problem What is the relationship between BQP and NP? NC = P problem NP = co-NP problem P = BPP problem P = PSPACE problem L = NL problem PH = PSPACE problem L = P problem L = RL problem Unique games conjecture Is the exponential time hypothesis true? Is the strong exponential time hypothesis (SETH) true? Do one-way functions exist? Is public-key cryptography possible? Log-rank conjecture Polynomial versus nondeterministic-polynomial time for specific algorithmic problems Can integer factorization be done in polynomial time on a classical (non-quantum) computer? Can the discrete logarithm be computed in polynomial time on a classical (non-quantum) computer? Can the shortest vector of a lattice be computed in polynomial time on a classical or quantum computer? Can clustered planar drawings be found in polynomial time? Can the graph isomorphism problem be solved in polynomial time? Can leaf powers and -leaf powers be recognized in polynomial time? Can parity games be solved in polynomial time? Can the rotation distance between two binary trees be computed in polynomial time? Can graphs of bounded clique-width be recognized in polynomial time? Can one find a simple closed quasigeodesic on a convex polyhedron in polynomial time? Can a simultaneous embedding with fixed edges for two given graphs be found in polynomial time? Other algorithmic problems The dynamic optimality conjecture: do splay trees have a bounded competitive ratio? Can a depth-first search tree be constructed in NC? Can the fast Fourier transform be computed in time? What is the fastest algorithm for multiplication of two n-digit numbers? What is the lowest possible average-case time complexity of Shellsort with a det
https://en.wikipedia.org/wiki/Maximum%20energy%20product
In magnetics, the maximum energy product is an important figure-of-merit for the strength of a permanent magnet material. It is often denoted and is typically given in units of either (kilojoules per cubic meter, in SI electromagnetism) or (mega-gauss-oersted, in gaussian electromagnetism). 1 MGOe is equivalent to . During the 20th century, the maximum energy product of commercially available magnetic materials rose from around 1 MGOe (e.g. in KS Steel) to over 50 MGOe (in neodymium magnets). Other important permanent magnet properties include the remanence () and coercivity (); these quantities are also determined from the saturation loop and are related to the maximum energy product, though not directly. Definition and significance The maximum energy product is defined based on the magnetic hysteresis saturation loop (- curve), in the demagnetizing portion where the and fields are in opposition. It is defined as the maximal value of the product of and along this curve (actually, the maximum of the negative of the product, , since they have opposing signs): Equivalently, it can be graphically defined as the area of the largest rectangle that can be drawn between the origin and the saturation demagnetization B-H curve (see figure). The significance of is that the volume of magnet necessary for any given application tends to be inversely proportional to . This is illustrated by considering a simple magnetic circuit containing a permanent magnet of volume and an air gap of volume , connected to each other by a magnetic core. Suppose the goal is to reach a certain field strength in the gap. In such a situation, the total magnetic energy in the gap (volume-integrated magnetic energy density) is directly equal to half the volume-integrated in the magnet: thus in order to achieve the desired magnetic field in the gap, the required volume of magnet can be minimized by maximizing in the magnet. By choosing a magnetic material with a high , and also choosin
https://en.wikipedia.org/wiki/Alert%20correlation
Alert correlation is a type of log analysis. It focuses on the process of clustering alerts (events), generated by NIDS and HIDS computer systems, to form higher-level pieces of information. Example of simple alert correlation is grouping invalid login attempts to report single incident like "10000 invalid login attempts on host X". See also ACARM ACARM-ng OSSIM Prelude Hybrid IDS Snort Computer systems Computer-aided engineering
https://en.wikipedia.org/wiki/Sinoconodon
Sinoconodon is an extinct genus of mammaliamorphs that appears in the fossil record of the Lufeng Formation of China in the Sinemurian stage of the Early Jurassic period, about 193 million years ago. While sharing many plesiomorphic traits with other non-mammaliaform cynodonts, it possessed a special, secondarily evolved jaw joint between the dentary and the squamosal bones, which in more derived taxa would replace the primitive tetrapod one between the articular and quadrate bones. The presence of a dentary-squamosal joint is a trait historically used to define mammals. Description This animal had skull of which suggest a presacral body length of and weight about due to the similar parameters to the European hedgehog. Sinoconodon closely resembled early mammaliaforms like Morganucodon, but it is regarded as more basal, differing substantially from Morganucodon in its dentition and growth habits. Like most other non-mammalian tetrapods, such as reptiles and amphibians, it was polyphyodont, replacing many of its teeth throughout its lifetime, and it seems to have grown slowly but continuously until its death. It was thus somewhat less mammal-like than mammaliaforms such as morganucodonts and docodonts. The combination of basal tetrapod and mammalian features makes it a unique transitional fossil. Taxonomy Sinoconodon was named by Patterson and Olson in 1961. Its type is Sinoconodon rigneyi. It was assigned to Triconodontidae by Patterson and Olson in 1961; to Triconodonta by Jenkins and Crompton in 1979; to Sinoconodontidae by Carroll in 1988; to Mammaliamorpha by Wible in 1991; to Mammalia by Luo and Wu in 1994; to Mammalia by Kielan-Jaworowska et al. in 2004; and to Mammaliaformes by Luo et al. in 2001 and Bi et al. in 2014. Phylogeny
https://en.wikipedia.org/wiki/Sec61
Sec61, termed SecYEG in prokaryotes, is a membrane protein complex found in all domains of life. As the core component of the translocon, it transports proteins to the endoplasmic reticulum in eukaryotes and out of the cell in prokaryotes. It is a doughnut-shaped pore through the membrane with 3 different subunits (heterotrimeric), SecY (α), SecE (γ), and SecG (β). It has a region called the plug that blocks transport into or out of the ER. This plug is displaced when the hydrophobic region of a nascent polypeptide interacts with another region of Sec61 called the seam, allowing translocation of the polypeptide into the ER lumen. Although SecY and SecE are conserved in all three domains of life, bacterial SecG is only weakly homologous with eukaryotic Sec61β. The eukaryotic Sec61β is however homologous to the archaeal "SecG", leading some authors to refer to the archaeal complex as SecYEβ instead of SecYEG. (All three components of the archaeal complex are closer to their eukaryotic homologues than to their bacterial ones, but the old two-empire names have become convention.) Structure Much of the knowledge on the structure of the SecY/Sec61α pore comes from an X-ray crystallography structure of its archaeal version. The large SecY subunit consists of two halves, trans-membrane segments 1-5 and trans-membrane segments 6-10. They are linked at the extracellular side by a loop between trans-membrane segments 5 and 6. SecY can open laterally at the front (lateral gate). SecE is a single spanning membrane protein in most species. It sits at the back of SecY, wrapping around the two halves of SecY. Secβ (SecG) is not essential. Its sits on the side of SecY and makes only few contacts with it. In a side view, the channel has an hourglass shape, with a cytoplasmic funnel that is empty, and an extracellular funnel that is filled with a little helix, called the plug. In the middle of the membrane is a construction, formed from a pore ring of four hydrophobic amino acids
https://en.wikipedia.org/wiki/Supersingular%20prime%20%28algebraic%20number%20theory%29
In algebraic number theory, a supersingular prime for a given elliptic curve is a prime number with a certain relationship to that curve. If the curve E is defined over the rational numbers, then a prime p is supersingular for E if the reduction of E modulo p is a supersingular elliptic curve over the residue field Fp. Noam Elkies showed that every elliptic curve over the rational numbers has infinitely many supersingular primes. However, the set of supersingular primes has asymptotic density zero (if E does not have complex multiplication). conjectured that the number of supersingular primes less than a bound X is within a constant multiple of , using heuristics involving the distribution of eigenvalues of the Frobenius endomorphism. As of 2019, this conjecture is open. More generally, if K is any global field—i.e., a finite extension either of Q or of Fp(t)—and A is an abelian variety defined over K, then a supersingular prime for A is a finite place of K such that the reduction of A modulo is a supersingular abelian variety.
https://en.wikipedia.org/wiki/4000%20%28number%29
4000 (four thousand) is the natural number following 3999 and preceding 4001. It is a decagonal number. Selected numbers in the range 4001–4999 4001 to 4099 4005 – triangular number 4007 – safe prime 4010 – magic constant of n × n normal magic square and n-queens problem for n = 20. 4013 – balanced prime 4019 – Sophie Germain prime 4027 – super-prime 4028 – sum of the first 45 primes 4030 – third weird number 4031 – sum of the cubes of the first six primes 4032 – pronic number 4033 – sixth super-Poulet number; strong pseudoprime in base 2 4060 – tetrahedral number 4073 – Sophie Germain prime 4079 – safe prime 4091 – super-prime 4092 – an occasional glitch in the game The Legend of Zelda: Ocarina of Time causes the Gossip Stones to say this number 4095 – triangular number and odd abundant number; number of divisors in the sum of the fifth and largest known unitary perfect number, largest Ramanujan–Nagell number of the form . 4096 = 642 = 163 = 84 = 46 = 212, the smallest number with exactly 13 divisors, a superperfect number 4100 to 4199 4104 = 23 + 163 = 93 + 153 4127 – safe prime 4133 – super-prime 4139 – safe prime 4140 – Bell number 4141 – centered square number 4147 – smallest cyclic number in duodecimal represented in base-12 notation as 249712.2×4147dez = 4972123×4147dez = 7249124×4147dez = 972412 4153 – super-prime 4160 – pronic number 4166 – centered heptagonal number, 4167 = 7! − 6! − 5! − 4! − 3! − 2! − 1!, number of planar partitions of 14 4169 – a number of points of norm n </= n in cubic lattice 4177 – prime of the form 2p-1 4181 – Fibonacci number, Markov number 4186 – triangular number 4187 – factor of R13, also the record number of wickets taken in first-class cricket by Wilfred Rhodes. 4199 – highly cototient number, product of three consecutive primes 4200 to 4299 4200 – nonagonal number, pentagonal pyramidal number, 4210 – 11th semi-meandric number 4211 – Sophie Germain prime 4213 – Riordan number 4217
https://en.wikipedia.org/wiki/Viscous%20liquid
In condensed matter physics and physical chemistry, the terms viscous liquid, supercooled liquid, and glass forming liquid are often used interchangeably to designate liquids that are at the same time highly viscous (see Viscosity of amorphous materials), can be or are supercooled, and able to form a glass. Working points in glass processing The mechanical properties of glass-forming liquids depend primarily on the viscosity. Therefore, the following working points are defined in terms of viscosity. The temperature is indicated for industrial soda lime glass: Fragile-strong classification In a widespread classification, due to chemist Austen Angell, a glass-forming liquid is called strong if its viscosity approximately obeys an Arrhenius law (log η is linear in 1/T ). In the opposite case of clearly non-Arrhenius behaviour the liquid is called fragile. This classification has no direct relation with the common usage of the word "fragility" to mean brittleness. Viscous flow in amorphous materials is characterised by deviations from the Arrhenius-type behaviour: the activation energy of viscosity Q changes from a high value QH at low temperatures (in the glassy state) to a low value QL at high temperatures (in the liquid state). Amorphous materials are classified accordingly to the deviation from Arrhenius type behaviour of their viscosities as either strong when or fragile when QH-QL≥QL. The fragility of amorphous materials is numerically characterized by the Doremus’ fragility ratio RD=QH/QL . Strong melts are those with (RD-1) < 1, whereas fragile melts are those with (RD-1) ≥ 1. Fragility is related to materials bond breaking processes caused by thermal fluctuations. Bond breaking modifies the properties of an amorphous material so that the higher the concentration of broken bonds termed configurons the lower the viscosity. Materials with a higher enthalpy of configuron formation compared with their enthalpy of motion have a higher Doremus fragility rati
https://en.wikipedia.org/wiki/Occurs%20check
In computer science, the occurs check is a part of algorithms for syntactic unification. It causes unification of a variable V and a structure S to fail if S contains V. Application in theorem proving In theorem proving, unification without the occurs check can lead to unsound inference. For example, the Prolog goal will succeed, binding X to a cyclic structure which has no counterpart in the Herbrand universe. As another example, without occurs-check, a resolution proof can be found for the non-theorem : the negation of that formula has the conjunctive normal form , with and denoting the Skolem function for the first and second existential quantifier, respectively; the literals and are unifiable without occurs check, producing the refuting empty clause. Rational tree unification Prolog implementations usually omit the occurs check for reasons of efficiency, which can lead to circular data structures and looping. By not performing the occurs check, the worst case complexity of unifying a term with term is reduced in many cases from to ; in the particular, frequent case of variable-term unifications, runtime shrinks to . Modern implementations, based on Colmerauer's Prolog II, use rational tree unification to avoid looping. However it is difficult to keep the complexity time linear in the presence of cyclic terms. Examples where Colmerauers algorithm becomes quadratic can be readily constructed, but refinement proposals exist. See image for an example run of the unification algorithm given in Unification (computer science)#A unification algorithm, trying to solve the goal , however without the occurs check rule (named "check" there); applying rule "eliminate" instead leads to a cyclic graph (i.e. an infinite term) in the last step. Sound unification ISO Prolog implementations have the built-in predicate unify_with_occurs_check/2 for sound unification but are free to use unsound or even looping algorithms when unification is invoked otherwise,
https://en.wikipedia.org/wiki/Secure%20transmission
In computer science, secure transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many secure transmission methods require a type of encryption. The most common email encryption is called PKI. In order to open the encrypted file, an exchange of key is done. Many infrastructures such as banks rely on secure transmission protocols to prevent a catastrophic breach of security. Secure transmissions are put in place to prevent attacks such as ARP spoofing and general data loss. Software and hardware implementations which attempt to detect and prevent the unauthorized transmission of information from the computer systems to an organization on the outside may be referred to as Information Leak Detection and Prevention (ILDP), Information Leak Prevention (ILP), Content Monitoring and Filtering (CMF) or Extrusion Prevention systems and are used in connection with other methods to ensure secure transmission of data. Secure transmission over wireless infrastructure WEP is a deprecated algorithm to secure IEEE 802.11 wireless networks. Wireless networks broadcast messages using radio, so are more susceptible to eavesdropping than wired networks. When introduced in 1999, WEP was intended to provide confidentiality comparable to that of a traditional wired network. A later system, called Wi-Fi Protected Access (WPA) has since been developed to provide stronger security. Web-based secure transmission Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the Internet for such things as web browsing, e-mail, Internet faxing, instant messaging and other data transfers. There are slight differences between SSL and TLS, but they are substantially the same.
https://en.wikipedia.org/wiki/Branching%20order%20of%20bacterial%20phyla%20%28Cavalier-Smith%2C%202002%29
There are several models of the Branching order of bacterial phyla, one of these was proposed in 2002 and 2004 by Thomas Cavalier-Smith. In this frame of work, the branching order of the major lineage of bacteria are determined based on some morphological characters, such as cell wall structure, and not based on the molecular evidence (molecular phylogeny). Whereas modern molecular studies point towards the root of the tree of life being between a monophyletic Bacteria and Archaea+Eukarya (Neomura), in the Cavalier-Smith theory, the last common ancestor (cenancestor) was a Gram-negative diderm bacterium with peptidoglycan, while Archaea and Eukaryotes stem from Actinobacteria. See also Branching order of bacterial phyla (Woese, 1987) Branching order of bacterial phyla (Rappe and Giovanoni, 2003) Branching order of bacterial phyla after ARB Silva Living Tree Branching order of bacterial phyla (Ciccarelli et al., 2006) Branching order of bacterial phyla (Battistuzzi et al.,2004) Branching order of bacterial phyla (Gupta, 2001) Branching order of bacterial phyla (Cavalier-Smith, 2002)
https://en.wikipedia.org/wiki/Burroughs%20B20
The B20 is a line of microcomputers from Burroughs Corporation. The systems, introduced in May 1982, consist of two models: the B21 and the B22. The B21 models are rebadged Convergent Technologies AWS workstations incorporating an Intel 8086 CPU. The B22 models are rebadged IWS workstations. They run the BTOS operating system, which is a version of Convergent's CTOS, as well as CP/M and MS-DOS. Systems support up to 640 KB of RAM. The B22 included a mass storage unit with a capacity of up to 60 MB. The Burroughs B25, a rebadged Convergent NGEN system with an Intel 80186 CPU, was introduced in 1983. The B26 was introduced in 1984, and a B28 system followed in 1985 based on the Intel 80286 CPU. There is also an 80186-based B27 which used an "F-bus" rather than the "X-bus" used on the B25/B26/B28. A cluster only (no storage) 80186-based B24 was later released and commonly used by bank tellers.
https://en.wikipedia.org/wiki/Windows%20for%20Pen%20Computing
Windows for Pen Computing is a software suite for Windows 3.1x, that Microsoft designed to incorporate pen computing capabilities into the Windows operating environment. Windows for Pen Computing was the second major pen computing platform for x86 tablet PCs; GO Corporation released their operating system, PenPoint OS, shortly before Microsoft published Windows for Pen Computing 1.0 in 1992. The software features of Windows for Pen Computing 1.0 includes an on-screen keyboard, a notepad program for writing with the stylus, and a program for training the system to respond accurately to the user's handwriting. Microsoft included Windows for Pen Computing 1.0 in the Windows SDK, and the operating environment was also bundled with compatible devices. Microsoft published Windows 95 in 1995, and later released Pen Services for Windows 95, also known as Windows for Pen Computing 2.0, for this new operating system. Windows XP Tablet PC Edition superseded Windows for Pen Computing in 2002. Subsequent Windows versions, such as Windows Vista and Windows 7, supported pen computing intrinsically. See also Windows Ink Workspace
https://en.wikipedia.org/wiki/Backscattering%20cross%20section
Backscattering cross section is a property of an object that determines what proportion of incident wave energy is scattered from the object, back in the direction of the incident wave. It is defined as the area which intercepts an amount of power in the incident beam which, if radiated isotropically, would yield a reflected signal strength at the transmitter of the same magnitude as the actual object produces. See also Radar cross-section Target strength
https://en.wikipedia.org/wiki/Digital%20Command%20Center
The Digital Command Center was a very large remote control introduced for RCA's high-end television sets; in 1983 for the Colortrak 2000 and the SJT400 CED player and in 1984 for the Dimensia Lyceum TV sets. The main feature of the Digital Command Center was that it was universal amongst many RCA components, including VCRs, CED players, tuners, amplifiers, CD players, etc., on top of controlling the monitor itself. The Digital Command Center took four AA batteries to power, due to its extensive and ahead-of-its time functionality. The initial Digital Command Center released in 1984 with the Dimensia system, the CRK35A, had 52 buttons, had onboard memory, and weighed nearly a pound with its batteries. In 1985, RCA released the Digital Command Component System, an all audio system that was compatible with all Dimensia audio components, which also used the Digital Command Center remote. The idea of this system was to have the full functionality of the Dimensia's sound system without the need of a Dimensia monitor. Dimensia Intelligent Audio Video and Dimensia Digital Control In Dimensia television systems, the remote was called Dimensia Intelligent Audio Video or Dimensia Digital Control because all of the components were integrated so that the remote could activate the entire system with the touch of one button by communicating with the built-in computer found in the Dimensia monitor via the black control jack found on all Dimensia components. This remote had 8 device keys on it; TV, VCR, VID2 (DISC), AUX, AM/FM, PHON, TAPE, and CD. Since the CED Player intended to be released with the Dimensia system in 1984 was cancelled, the VID2 button and the ability to control the CED Players was absent from later remotes. In 1987, the Dimensia Intelligent Audio Video was replaced with a wedge-shaped remote (CRK45A) shown at the bottom of the picture above.
https://en.wikipedia.org/wiki/Data%20model%20%28GIS%29
A geographic data model, geospatial data model, or simply data model in the context of geographic information systems, is a mathematical and digital structure for representing phenomena over the Earth. Generally, such data models represent various aspects of these phenomena by means of geographic data, including spatial locations, attributes, change over time, and identity. For example, the vector data model represents geography as collections of points, lines, and polygons, and the raster data model represent geography as cell matrices that store numeric values. Data models are implemented throughout the GIS ecosystem, including the software tools for data management and spatial analysis, data stored in a variety of GIS file formats, specifications and standards, and specific designs for GIS installations. While the unique nature of spatial information has led to its own set of model structures, much of the process of data modeling is similar to the rest of information technology, including the progression from conceptual models to logical models to physical models, and the difference between generic models and application-specific designs. History The earliest computer systems that represented geographic phenomena were quantitative analysis models developed during the quantitative revolution in geography in the 1950s and 1960s; these could not be called a geographic information system because they did not attempt to store geographic data in a consistent permanent structure, but were usually statistical or mathematical models. The first true GIS software modeled spatial information using data models that would come to be known as raster or vector: SYMAP (by Howard Fisher, Harvard Laboratory for Computer Graphics and Spatial Analysis, developed 1963–1967) produced raster maps, although data was usually entered as vector-like region outlines or sample points then interpolated into a raster structure for output. The GRID package, developed at the lab in 1969 by Dav
https://en.wikipedia.org/wiki/Geometry%20of%20Complex%20Numbers
Geometry of Complex Numbers: Circle Geometry, Moebius Transformation, Non-Euclidean Geometry is an undergraduate textbook on geometry, whose topics include circles, the complex plane, inversive geometry, and non-Euclidean geometry. It was written by Hans Schwerdtfeger, and originally published in 1962 as Volume 13 of the Mathematical Expositions series of the University of Toronto Press. A corrected edition was published in 1979 in the Dover Books on Advanced Mathematics series of Dover Publications (). The Basic Library List Committee of the Mathematical Association of America has suggested its inclusion in undergraduate mathematics libraries. Topics The book is divided into three chapters, corresponding to the three parts of its subtitle: circle geometry, Möbius transformations, and non-Euclidean geometry. Each of these is further divided into sections (which in other books would be called chapters) and sub-sections. An underlying theme of the book is the representation of the Euclidean plane as the plane of complex numbers, and the use of complex numbers as coordinates to describe geometric objects and their transformations. The chapter on circles covers the analytic geometry of circles in the complex plane. It describes the representation of circles by Hermitian matrices, the inversion of circles, stereographic projection, pencils of circles (certain one-parameter families of circles) and their two-parameter analogue, bundles of circles, and the cross-ratio of four complex numbers. The chapter on Möbius transformations is the central part of the book, and defines these transformations as the fractional linear transformations of the complex plane (one of several standard ways of defining them). It includes material on the classification of these transformations, on the characteristic parallelograms of these transformations, on the subgroups of the group of transformations, on iterated transformations that either return to the identity (forming a periodic sequ
https://en.wikipedia.org/wiki/Edholm%27s%20law
Edholm's law, proposed by and named after Phil Edholm, refers to the observation that the three categories of telecommunication, namely wireless (mobile), nomadic (wireless without mobility) and wired networks (fixed), are in lockstep and gradually converging. Edholm's law also holds that data rates for these telecommunications categories increase on similar exponential curves, with the slower rates trailing the faster ones by a predictable time lag. Edholm's law predicts that the bandwidth and data rates double every 18 months, which has proven to be true since the 1970s. The trend is evident in the cases of Internet, cellular (mobile), wireless LAN and wireless personal area networks. Concept Edholm's law was proposed by Phil Edholm of Nortel Networks. He observed that telecommunication bandwidth (including Internet access bandwidth) was doubling every 18 months, since the late 1970s through to the early 2000s. This is similar to Moore's law, which predicts an exponential rate of growth for transistor counts. He also found that there was a gradual convergence between wired (e.g. Ethernet), nomadic (e.g. modem and Wi-Fi) and wireless networks (e.g. cellular networks). The name "Edholm's law" was coined by his colleague, John H. Yoakum, who presented it at a 2004 Internet telephony press conference. Slower communications channels like cellphones and radio modems were predicted to eclipse the capacity of early Ethernet, due to developments in the standards known as UMTS and MIMO, which boosted bandwidth by maximizing antenna usage. Extrapolating forward indicates a convergence between the rates of nomadic and wireless technologies around 2030. In addition, wireless technology could end wireline communication if the cost of the latter's infrastructure remains high. Underlying factors In 2009, Renuka P. Jindal observed the bandwidths of online communication networks rising from bits per second to terabits per second, doubling every 18 months, as predicted by Edholm'
https://en.wikipedia.org/wiki/Index%20of%20cryptography%20articles
Articles related to cryptography include: A A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis • Adaptive chosen-ciphertext attack • Adaptive chosen plaintext and chosen ciphertext attack • Advantage (cryptography) • ADFGVX cipher • Adi Shamir • Advanced Access Content System • Advanced Encryption Standard • Advanced Encryption Standard process • Adversary • AEAD block cipher modes of operation • Affine cipher • Agnes Meyer Driscoll • AKA (security) • Akelarre (cipher) • Alan Turing • Alastair Denniston • Al Bhed language • Alex Biryukov • Alfred Menezes • Algebraic Eraser • Algorithmically random sequence • Alice and Bob • All-or-nothing transform • Alphabetum Kaldeorum • Alternating step generator • American Cryptogram Association • AN/CYZ-10 • Anonymous publication • Anonymous remailer • Antoni Palluth • Anubis (cipher) • Argon2 • ARIA (cipher) • Arlington Hall • Arne Beurling • Arnold Cipher • Array controller based encryption • Arthur Scherbius • Arvid Gerhard Damm • Asiacrypt • Atbash • Attribute-based encryption • Attack model • Auguste Kerckhoffs • Authenticated encryption • Authentication • Authorization certificate • Autokey cipher • Avalanche effect B B-Dienst • Babington Plot • Baby-step giant-step • Bacon's cipher • Banburismus • Bart Preneel • BaseKing • BassOmatic • BATON • BB84 • Beale ciphers • BEAR and LION ciphers • Beaufort cipher • Beaumanor Hall • Bent function • Berlekamp–Massey algorithm • Bernstein v. United States • BestCrypt • Biclique attack • BID/60 • BID 770 • Bifid cipher • Bill Weisband • Binary Goppa code • Biometric word list • Birthday attack • Bit-flipping attack • BitTorrent protocol encryption • Biuro Szyfrów • Black Chamber • Blaise de Vigenère • Bletchley Park • Blind credential • Blinding (cryp
https://en.wikipedia.org/wiki/Chronoperates
Chronoperates (meaning "time wanderer" in Greek) is an extinct genus of mammal whose remains have been found in a late Paleocene deposit in Alberta, Canada. It is represented by the type species Chronoperates paradoxus and known only from a partial left lower jaw. It was first identified in 1992 as a non-mammalian cynodont, implying a ghost lineage of over 100 million years since the previously youngest known record of non-mammalian cynodonts, which at that time was in the Jurassic period (some non-mammalian cynodonts are now known to have persisted until the Early Cretaceous). Subsequent authors have challenged this interpretation, particularly as the teeth do not resemble any known non-mammalian cynodonts. Chronoperates is now generally considered to be more likely to be a late-surviving symmetrodont mammal. This would still infer a ghost lineage for symmetrodonts, but a more plausible one, as symmetrodonts persisted into the Late Cretaceous.
https://en.wikipedia.org/wiki/Mochi%20Media
Mochi Media was a browser-based games network, with more than 140 million monthly active users and 15,000 games on nearly 40,000 publisher websites. Mochi Media's products included tools for Flash-based web developers to display in-game advertising, complete micro-transactions and display score boards in games. The company was headquartered in downtown San Francisco. The company was founded in 2005. Mochi Media was dissolved by its parent company Shanda Games on 31 March 2014. All of its services were wound down, and final payments were paid to those eligible at the end of April 2014. Mochi API MochiMedia offered an ActionScript API to developers so that they could implement advertisements, leaderboards, and in-game micro-transactions. MochiAds MochiAds was an advertisement application targeting specifically towards monetizing web browser games using the Flash Player platform. Advertisements could be displayed as a game's pre-loader or as content inside the game itself. Mochi Coins In 2009, Mochi Media released a new system to access paid content in browser games called MochiCoins. The platform allowed developers to put additional content or features in the games, which users paid for with the MochiCoins in their account. These coins could be purchased through Mochi Media's website using credit cards, PayPal or SuperRewards. On 17 September 2012, Mochi Media made an announcement that they would discontinue Mochicoins. Players could no longer purchase Mochicoins after 5 October, and on 15 October, Mochicoins was discontinued. MochiCoins could be traded in for Ninja Kiwi coins beginning on 15 October. MochiSocial MochiSocial allowed developers to send game data to social networking sites. These interactions included posting to a news stream, sending gifts to or inviting friends, and posting achievements. Players of a game could opt to become a "Fan" of a game developer. This allowed the player to receive updates from game developers on new games or content. D
https://en.wikipedia.org/wiki/SM-4
The SM-4 (CM-4) is a PDP-11/40 compatible system, manufactured in the Eastern Bloc in the 1980s. It was very popular in science and technology. They were manufactured in the Soviet Union, Bulgaria and Hungary, beginning in 1975. The standard configuration includes 128 or 256 KB core memory, tape puncher, two RK-05 removable 2.5 MB disks and two RK-05F fixed disks, two TU-10 drives and Videoton VDT-340 terminals (VT52 non-compatible). The SM-4 processor operates at 900,000 operations per second. The SM-series also includes the SM-3. The SM-3 lacks floating point processing, similar to DEC's PDP 11/40 and 11/34 models. In early production, ferrite core memory is used. It operates at 200,000 operations per second in register-to-register operation. Operating systems commonly used include: RT-11 (Rafos after partial translation) RSTS/E RSX-11 DSM-11 (DIAMS after partial translations) DEMOS and MNOS The SM-4 was manufactured in seven configurations, numbers SM-1401 through SM-1407. Similar models include the SM-1420, with semiconductor memory, and the SM-1600, a hybrid of the SM-1420 and the M-6000, a system produced in Minsk. The main producer of the SM-4 was Minpribor, at a facility in Kyiv, Ukraine, which began production in 1980. See also SM EVM List of Soviet computer systems
https://en.wikipedia.org/wiki/57th%20meridian%20east
The meridian 57° east of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, Europe, Asia, the Indian Ocean, the Southern Ocean, and Antarctica to the South Pole. The 57th meridian east forms a great circle with the 123rd meridian west. From Pole to Pole Starting at the North Pole and heading south to the South Pole, the 57th meridian east passes through: {| class="wikitable plainrowheaders" ! scope="col" width="115" | Co-ordinates ! scope="col" | Country, territory or sea ! scope="col" | Notes |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Arctic Ocean | style="background:#b0e0e6;" | |-valign="top" | ! scope="row" | | Islands of Karl-Alexander, Jackson, Payer, Ziegler, Salisbury, and MacKlintok, Franz Josef Land |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Barents Sea | style="background:#b0e0e6;" | |- | ! scope="row" | | Severny Island, Novaya Zemlya |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Kara Sea | style="background:#b0e0e6;" | |- | ! scope="row" | | Yuzhny Island, Novaya Zemlya |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Barents Sea | style="background:#b0e0e6;" | Pechora Sea |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Gulf of Oman | style="background:#b0e0e6;" | |- | ! scope="row" | | |-valign="top" | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Indian Ocean | style="background:#b0e0e6;" | Passing just east of the Agalega Islands, Passing just west of the island of |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Southern Ocean | style="background:#b0e0e6;" | |- | ! scope="row" | Antarctica | Austra
https://en.wikipedia.org/wiki/Developmental%20Studies%20Hybridoma%20Bank
The Developmental Studies Hybridoma Bank (DSHB) is a National Resource established by the National Institutes of Health (NIH) in 1986 to bank and distribute at cost hybridomas and the monoclonal antibodies (mAbs) they produce to the basic science community worldwide. It is housed in the Department of Biology at the University of Iowa. Mission The mission of the DSHB is four-fold: Keep product prices low to facilitate research (currently 40.00 USD per ml of supernatant). Serve as a repository to relieve scientists of the time and expense of distributing hybridomas and the mAbs they produce. Assure the scientific community that mAbs with limited demand remain available. Maintain the highest product quality, provide prompt customer service and technical assistance. Description The DSHB is directed by David R. Soll at the University of Iowa. There are currently over 5000 hybridomas in the DSHB collection. The DSHB has obtained hybridomas from a variety of individuals and institutions, the latter including the Muscular Dystrophy Association, the National Cancer Institute, the NIH Common Fund, and the European Molecular Biology Laboratory (EMBL). The DSHB eagerly awaits new contributions. First time customers must agree to the DSHB terms of usage that products will be used for research purposes only, and that they cannot be commercialized or distributed to a third party. Researchers also agree to acknowledge both the DSHB and the contributing investigator and institution in publications that benefit from the use of DSHB products and provide to the DSHB citations of all publications. Individuals or institutions can deposit hybridomas for distribution at no cost. Contributing to the DSHB does not preclude the depositor from licensing cell lines for commercial purposes. The DSHB does not own any contributed intellectual property. The intellectual property remains that of the scientist and/or institution that banks the hybridomas. The DSHB covers the operating cost
https://en.wikipedia.org/wiki/Bursting
Bursting, or burst firing, is an extremely diverse general phenomenon of the activation patterns of neurons in the central nervous system and spinal cord where periods of rapid action potential spiking are followed by quiescent periods much longer than typical inter-spike intervals. Bursting is thought to be important in the operation of robust central pattern generators, the transmission of neural codes, and some neuropathologies such as epilepsy. The study of bursting both directly and in how it takes part in other neural phenomena has been very popular since the beginnings of cellular neuroscience and is closely tied to the fields of neural synchronization, neural coding, plasticity, and attention. Observed bursts are named by the number of discrete action potentials they are composed of: a doublet is a two-spike burst, a triplet three and a quadruplet four. Neurons that are intrinsically prone to bursting behavior are referred to as bursters and this tendency to burst may be a product of the environment or the phenotype of the cell. Physiological context Overview Neurons typically operate by firing single action potential spikes in relative isolation as discrete input postsynaptic potentials combine and drive the membrane potential across the threshold. Bursting can instead occur for many reasons, but neurons can be generally grouped as exhibiting input-driven or intrinsic bursting. Most cells will exhibit bursting if they are driven by a constant, subthreshold input and particular cells which are genotypically prone to bursting (called bursters) have complex feedback systems which will produce bursting patterns with less dependence on input and sometimes even in isolation. In each case, the physiological system is often thought as being the action of two linked subsystems. The fast subsystem is responsible for each spike the neuron produces. The slow subsystem modulates the shape and intensity of these spikes before eventually triggering quiescence. Inpu
https://en.wikipedia.org/wiki/Compaq%20Deskpro
The Compaq Deskpro is a line of business-oriented desktop computers manufactured by Compaq, then discontinued after the merger with Hewlett-Packard. Models were produced containing microprocessors from the 8086 up to the x86-based Intel Pentium 4. History Deskpro (8086) and Deskpro 286 The original Compaq Deskpro (released in 1984), available in several disk configurations, is an XT-class PC equipped with an 8 MHz 8086 CPU and Compaq's unique display hardware that combined Color Graphics Adapter graphics with high resolution Monochrome Display Adapter text. As a result, it was considerably faster than the original IBM PC, the XT and the AT, and had a much better quality text display compared to IBM PCs which were equipped with either the IBM Monochrome Display Adapter or Color Graphics Adapter cards. Its hardware and BIOS were claimed to be 100% compatible with the IBM PC, like the earlier Compaq Portable. This compatibility had given Compaq the lead over companies like Columbia Data Products, Dynalogic, Eagle Computer and Corona Data Systems. The latter two companies were threatened by IBM for BIOS copyright infringement, and settled out of court, agreeing to re-implement their BIOS. Compaq used a clean room design reverse-engineered BIOS, avoiding legal jeopardy. In 1985, Compaq released the Deskpro 286, which looks quite similar to the IBM PC/AT. Deskpro 386 In September 1986, the Deskpro 386 was announced after Intel released its 80386 microprocessor, beating IBM by seven months on their comparable 386 computer, thus making a name for themselves. The IBM-made 386DX machine, the IBM PS/2 Model 80, reached the market almost a year later, PC Tech Journal honored the Deskpro 386 with its 1986 Product of the Year award. The Deskpro 386/25 was released August, 1988 and cost $10,299. Other The form factor for the Compaq Deskpro is mostly the desktop model which lies upon a desk, with a monitor placed on top of it. Compaq has produced many tower upright models t
https://en.wikipedia.org/wiki/Mod%20openpgp
mod_openpgp was an Apache server module authored by Arturo 'Buanzo' Busleiman. The module implemented access authorization to servers, virtual hosts, or directories when incoming requests' HTTP OpenPGP signatures are valid and known by the local keyring. The module also allowed for the signing and encryption of HTTP requests, providing increased data integrity and confidentiality. The now defunct Enigform Mozilla Firefox extension implemented the client-side requirements of mod_openpgp. Despite its innovative approach to HTTP request security, Mod_OpenPGP faced challenges due to the complexities of the OpenPGP standard. This resulted in the concept of signed/encrypted HTTP request enhancements sometimes falling behind other methodologies in terms of adoption and usability. Prior to version 0.2.2, mod_openpgp was known as mod_auth_openpgp. The author maintained his interest in OpenPGP, releasing a Python module that extends the famous requests module, with some OpenPGP capabilities. mod_openpgp participated in the OWASP Summer of Code 2008. Enigform was mentioned in a worldwide survey of encryption products conducted by Bruce Schneier, K. Seidel, and S. Vijayakumar, highlighting its role in addressing data security challenges. Enigform received a Silver Award in the Security category at Les Trophées du Libre.
https://en.wikipedia.org/wiki/Linear%20hashing
Linear hashing (LH) is a dynamic data structure which implements a hash table and grows or shrinks one bucket at a time. It was invented by Witold Litwin in 1980. It has been analyzed by Baeza-Yates and Soza-Pollman. It is the first in a number of schemes known as dynamic hashing such as Larson's Linear Hashing with Partial Extensions, Linear Hashing with Priority Splitting, Linear Hashing with Partial Expansions and Priority Splitting, or Recursive Linear Hashing. The file structure of a dynamic hashing data structure adapts itself to changes in the size of the file, so expensive periodic file reorganization is avoided. A Linear Hashing file expands by splitting a pre-determined bucket into two and contracts by merging two predetermined buckets into one. The trigger for a reconstruction depends on the flavor of the scheme; it could be an overflow at a bucket or load factor (i.e., the number of records divided by the number of buckets) moving outside of a predetermined range. In Linear Hashing there are two types of buckets, those that are to be split and those already split. While extendible hashing splits only overflowing buckets, spiral hashing (a.k.a. spiral storage) distributes records unevenly over the buckets such that buckets with high costs of insertion, deletion, or retrieval are earliest in line for a split. Linear Hashing has also been made into a scalable distributed data structure, LH*. In LH*, each bucket resides at a different server. LH* itself has been expanded to provide data availability in the presence of failed buckets. Key based operations (inserts, deletes, updates, reads) in LH and LH* take maximum constant time independent of the number of buckets and hence of records. Algorithm details Records in LH or LH* consists of a key and a content, the latter basically all the other attributes of the record. They are stored in buckets. For example, in Ellis' implementation, a bucket is a linked list of records. The file allows the key based
https://en.wikipedia.org/wiki/CPUID
In the x86 architecture, the CPUID instruction (identified by a CPUID opcode) is a processor supplementary instruction (its name derived from CPU Identification) allowing software to discover details of the processor. It was introduced by Intel in 1993 with the launch of the Pentium and SL-enhanced 486 processors. A program can use the CPUID to determine processor type and whether features such as MMX/SSE are implemented. History Prior to the general availability of the CPUID instruction, programmers would write esoteric machine code which exploited minor differences in CPU behavior in order to determine the processor make and model. With the introduction of the 80386 processor, EDX on reset indicated the revision but this was only readable after reset and there was no standard way for applications to read the value. Outside the x86 family, developers are mostly still required to use esoteric processes (involving instruction timing or CPU fault triggers) to determine the variations in CPU design that are present. In the Motorola 680x0 family — that never had a CPUID instruction of any kind — certain specific instructions required elevated privileges. These could be used to tell various CPU family members apart. In the Motorola 68010 the instruction MOVE from SR became privileged. This notable instruction (and state machine) change allowed the 68010 to meet the Popek and Goldberg virtualization requirements. Because the 68000 offered an unprivileged MOVE from SR the 2 different CPUs could be told apart by a CPU error condition being triggered. While the CPUID instruction is specific to the x86 architecture, other architectures (like ARM) often provide on-chip registers which can be read in prescribed ways to obtain the same sorts of information provided by the x86 CPUID instruction. Calling CPUID The CPUID opcode is 0F A2. In assembly language, the CPUID instruction takes no parameters as CPUID implicitly uses the EAX register to determine the main category
https://en.wikipedia.org/wiki/Organic%20certification
Organic certification is a certification process for producers of organic food and other organic agricultural products, in the European Union more commonly known as ecological or biological products. In general, any business directly involved in food production can be certified, including seed suppliers, farmers, food processors, retailers and restaurants. A lesser known counterpart is certification for organic textiles (or organic clothing) that includes certification of textile products made from organically grown fibres. Requirements vary from country to country (List of countries with organic agriculture regulation), and generally involve a set of production standards for growing, storage, processing, packaging and shipping that include: avoidance of synthetic chemical inputs (e.g. fertilizer, pesticides, antibiotics, food additives), irradiation, and the use of sewage sludge; avoidance of genetically modified seed; use of farmland that has been free from prohibited chemical inputs for a number of years (often, three or more); for livestock, adhering to specific requirements for feed, housing, and breeding; keeping detailed written production and sales records (audit trail); maintaining strict physical separation of organic products from non-certified products; undergoing periodic on-site inspections. In some countries, certification is overseen by the government, and commercial use of the term organic is legally restricted. Certified organic producers are also subject to the same agricultural, food safety and other government regulations that apply to non-certified producers. Certified organic foods are not necessarily pesticide-free, as certain pesticides are allowed. Purpose Organic certification addresses a growing worldwide demand for organic food. It is intended to assure quality, prevent fraud, and to promote commerce. While such certification was not necessary in the early days of the organic movement, when small farmers would sell their produ
https://en.wikipedia.org/wiki/Project%20Euler
Project Euler (named after Leonhard Euler) is a website dedicated to a series of computational problems intended to be solved with computer programs. The project attracts graduates and students interested in mathematics and computer programming. Since its creation in 2001 by Colin Hughes, Project Euler has gained notability and popularity worldwide. It includes over 850 problems as of 12 August 2023, with a new one added approximately every week. Problems are of varying difficulty, but each is solvable in less than a minute of CPU time using an efficient algorithm on a modestly powered computer. Features of the site A forum specific to each question may be viewed after the user has correctly answered the given question. Problems can be sorted on ID, number solved and difficulty. Participants can track their progress through achievement levels based on the number of problems solved. A new level is reached for every 25 problems solved. Special awards exist for solving special combinations of problems. For instance, there is an award for solving fifty prime numbered problems. A special "Eulerians" level exists to track achievement based on the fastest fifty solvers of recent problems so that newer members can compete without solving older problems. Example problem and solutions The first Project Euler problem is Multiples of 3 and 5 If we list all the natural numbers below 10 that are multiples of 3 or 5, we get 3, 5, 6 and 9. The sum of these multiples is 23. Find the sum of all the multiples of 3 or 5 below 1000. Although this problem is much simpler than the typical problem, it serves to illustrate the potential difference that an efficient algorithm makes. The brute-force algorithm examines every natural number less than 1000 and keeps a running sum of those meeting the criteria. This method is simple to implement, as shown by the following pseudocode: total := 0 for NUM from 1 through 999 do if NUM mod 3 = 0 or NUM mod 5 = 0 then total := to
https://en.wikipedia.org/wiki/Nintendo%20Labo
is a toys-to-life concept developed by Nintendo and released in April 2018. Labo consists of 2 parts, where one part is a game and one part is multiple sheets of cardboard. The games come as kits that include cardboard cut-outs and other materials that are to be assembled in combination with the Nintendo Switch console display and Joy-Con controllers to create a "Toy-Con" that can interact with the included game software and vice versa. Nintendo designed Labo as a way to teach principles of engineering and basic programming. Gameplay Nintendo Labo is released as individual Labo Kits, each containing a set of pre-made cardboard cut-outs and other materials, used to make one or more "Toy-Con", and a Nintendo Switch game card, which contains interactive instructions on how to assemble the Toy-Con and software that the Toy-Con can interact with. Once each Toy-Con is constructed, players insert the main Nintendo Switch display and/or one or both of the Joy-Con controllers according to the instructions. Each Toy-Con functions differently in the ways it interacts with either the Joy-Con or the main display. For example, the piano Toy-Con's keystrokes are read by the Right Joy-Con controller's infrared sensor to identify notes being played, while robotic Toy-Con move using HD Rumble from the Joy-Con controllers, which are controlled via the touchscreen. Players may freely decorate the cardboard parts using coloring pens, tape, and other materials, while more experienced users can invent new ways to play with each Toy-Con. The game software provides instructions on how the Toy-Con works with the Switch, such as describing the fundamentals of infrared sensing. Kits Two Labo Kits, Variety Kit and Robot Kit, were announced for launch in North America, Australia, and Japan on April 20, 2018, and in Europe on April 27, 2018. An accessory set containing stencils, stickers, and tape are available separately. Replacement packs for individual parts and Toy-Con are available for p
https://en.wikipedia.org/wiki/Peptide-mass%20fingerprint
In bio-informatics, a peptide-mass fingerprint or peptide-mass map is a mass spectrum of a mixture of peptides that comes from a digested protein being analyzed. The mass spectrum serves as a fingerprint in the sense that it is a pattern that can serve to identify the protein. The method for forming a peptide-mass fingerprint, developed in 1993, consists of isolating a protein, breaking it down into individual peptides, and determining the masses of the peptides through some form of mass spectrometry. Once formed, a peptide-mass fingerprint can be used to search in databases for related protein or even genomic sequences, making it a powerful tool for annotation of protein-coding genes. One major advantage to mass fingerprinting is that it is significantly faster to carry out than peptide sequencing, yet the results are equally useful. Disadvantages include the need for a single protein for analysis and the requirement that the protein sequence is located, at least with significant homology, in a database. Because the mass of individual peptides is measured in forming a fingerprint, mixtures of different proteins can yield unreliable results. Therefore, sample preparation is an important step in the process. Even then, if reliable results are obtained, there must be a matching peptide sequence in the database you are searching in order for the results to be useful. Sample preparation Before analyzing with mass spectrometry, a protein must be accurately isolated and digested. If not isolated, the results will represent a mixture of two or more proteins and will therefore be unreliable in protein identification. Because of this sensitivity, sample preparation is likely the most important step in forming a peptide-mass fingerprint. Isolation of a specific protein is most often done through a form of gel electrophoresis, in which proteins are separated by size and can be subsequently extracted for further preparation. However, they can also be isolated by liquid ch
https://en.wikipedia.org/wiki/Constance%20Kamii
Constance Kamii was a Swiss-Japanese-American mathematics education scholar and psychologist. She was a professor in the Early Childhood Education Program Department of Curriculum and Instruction at the University of Alabama in Birmingham, Alabama. Overview Constance Kamii was born in Geneva, Switzerland, and attended elementary schools there and in Japan. She finished high school in Los Angeles, attended Pomona College, and received her Ph.D. in education and psychology from the University of Michigan. She was a professor of early childhood education at the University of Alabama in Birmingham. A major concern of hers since her work on the Perry Preschool Project in the 1960s was the conceptualization of goals and objectives for early childhood education on the basis of a scientific theory explaining children’s sociological and intellectual development. Convinced that the only theory in existence that explains this development from the first day of life to adolescence was that of Jean Piaget, she studied under him on and off for 15 years. When she was not studying under Piaget in Geneva, she worked closely with teachers in the United States to develop practical ways of using his theory in classrooms. The outcome of this classroom research can be seen in Physical Knowledge in Preschool Education and Group Games in Early Education, which she wrote with Rheta DeVries. Since 1980, she had been extending this curriculum research to the primary grades and wrote Young Children Reinvent Arithmetic (about first grade), Young Children Continue to Reinvent Arithmetic, 2nd Grade, and Young Children Continue to Reinvent Arithmetic, 3rd Grade. In all these books, she emphasized the long-range, over-all aim of education envisioned by Piaget, which is children’s development of sociological and intellectual autonomy. Kamii studied under Jean Piaget to develop an early childhood curriculum based on his theory. This work can be seen in Physical Knowledge in Preschool Education (19
https://en.wikipedia.org/wiki/Tonsillar%20branches%20of%20glossopharyngeal%20nerve
The tonsillar branches of glossopharyngeal nerve supply the palatine tonsil, forming around it a plexus from which filaments are distributed to the soft palate and fauces, where they communicate with the palatine nerves.
https://en.wikipedia.org/wiki/Return%20receipt
In email, a return receipt is an acknowledgment by the recipient's email client to the sender of receipt of an email message. What acknowledgment, if any, is sent by the recipient to the sender is dependent on the email software of the recipient. Two notification services are available for email: delivery status notifications (DSNs) and message disposition notifications (MDNs). Whether such an acknowledgment of receipt is sent depends on the configuration of the recipient's email software. Delivery status notifications DSN is both a service that may optionally be provided by Message Transfer Agents (MTAs) using the Simple Mail Transfer Protocol (SMTP), or a message format used to return indications of message delivery to the sender of the message. Specifically, the DSN SMTP service is used to request indications of successful delivery or delivery failure (in the DSN format) be returned. Issuance of a DSN upon delivery failure is the default behavior, whereas issuance of a DSN upon successful delivery requires a specific request from the sender. However, for various reasons, it is possible for a message to be delivered, and a DSN is returned to the sender indicating successful delivery, but the message subsequently fails to be seen by the recipient or even made available to them. The DSN SMTP extension, message format, and associated delivery status codes are specified in RFCs 3461 through 3464 and 6522. Message disposition notifications MDNs provide a notification of the "disposition" of a message - indicating, for example, whether it is read by a recipient, discarded before being read, etc. However, for privacy reasons, and also for backward compatibility, requests for MDNs are entirely advisory in nature - i.e. recipients are free to ignore such requests. The format and usage of MDNs are specified in RFC 3798. A description of how multiple Mail User Agents (MUAs) should handle the generation of MDNs in an Internet Message Access Protocol (IMAP4) environm
https://en.wikipedia.org/wiki/High%20Bandwidth%20Memory
High Bandwidth Memory (HBM) is a computer memory interface for 3D-stacked synchronous dynamic random-access memory (SDRAM) initially from Samsung, AMD and SK Hynix. It is used in conjunction with high-performance graphics accelerators, network devices, high-performance datacenter AI ASICs, as on-package cache in CPUs and on-package RAM in upcoming CPUs, and FPGAs and in some supercomputers (such as the NEC SX-Aurora TSUBASA and Fujitsu A64FX). The first HBM memory chip was produced by SK Hynix in 2013, and the first devices to use HBM were the AMD Fiji GPUs in 2015. High Bandwidth Memory was adopted by JEDEC as an industry standard in October 2013. The second generation, HBM2, was accepted by JEDEC in January 2016. Technology HBM achieves higher bandwidth while using less power in a substantially smaller form factor than DDR4 or GDDR5. This is achieved by stacking up to eight DRAM dies and an optional base die which can include buffer circuitry and test logic. The stack is often connected to the memory controller on a GPU or CPU through a substrate, such as a silicon interposer. Alternatively, the memory die could be stacked directly on the CPU or GPU chip. Within the stack the die are vertically interconnected by through-silicon vias (TSVs) and microbumps. The HBM technology is similar in principle but incompatible with the Hybrid Memory Cube (HMC) interface developed by Micron Technology. HBM memory bus is very wide in comparison to other DRAM memories such as DDR4 or GDDR5. An HBM stack of four DRAM dies (4Hi) has two 128bit channels per die for a total of 8 channels and a width of 1024 bits in total. A graphics card/GPU with four 4Hi HBM stacks would therefore have a memory bus with a width of 4096 bits. In comparison, the bus width of GDDR memories is 32 bits, with 16 channels for a graphics card with a 512bit memory interface. HBM supports up to 4 GB per package. The larger number of connections to the memory, relative to DDR4 or GDDR5, required a new met
https://en.wikipedia.org/wiki/Vestigial%20twin
A vestigial twin is a form of parasitic twinning, where the parasitic "twin" is so malformed and incomplete that it typically consists entirely of extra limbs or organs. It also can be a complete living being trapped inside the host person, however the parasitic twin is anencephalic and lacks consciousness. This phenomenon occurs when a fertilized ovum or partially formed embryo splits incompletely. The result can be anything from two whole people joined by a bit of skin (conjoined twins), to one person with extra body parts belonging to the vestigial twin. Most vestigial limbs are non-functional, and although they may have bones, muscles and nerve endings, they are not under the control of the host. The possession of six or more digits on the hands and feet (polydactyly) usually has a genetic or chromosomal cause, and is not a case of vestigial twinning.
https://en.wikipedia.org/wiki/Hugo%20Fricke
Hugo Fricke (August 15, 1892, in Aarhus, Denmark – April 5, 1972, in Huntington, New York, US) was a Danish-American physicist who studied the chemical (radiolysis) and biological (radiation biology) effects of X-ray and electron beams and who also invented the Fricke dosimeter named after him. He also made important contributions to the theory of impedance measurements. Early life, education and career Hugo Fricke was born on August 15, 1892, in Aarhus, Denmark, to Hedevig (née Kämpfner) and Gunnar Fricke, the oldest of four siblings. Fricke relocated to Copenhagen in 1910, where he studied at the University of Copenhagen from 1910 to 1916, where he also worked as an assistant to Niels Bohr. In 1918, he moved to Lund University where he worked with Manne Siegbahn on X-ray spectroscopy. In 1919 he emigrated to the US, working at Columbia University and at Harvard University with Theodore Lyman until 1921. He moved to Cleveland Clinic by invitation of George Crile to head a biophysics laboratory between 1921 and 1928. Afterwards, Fricke was hired by Charles Davenport to work at Cold Spring Harbor Laboratory in Cold Spring Harbor from 1928 to 1955. He worked at Argonne National Laboratory from 1955 and at the Danish Atomic Energy Laboratory, now Risø DTU, from 1966 onwards. In 1949 he married Dorothy Newman. During his stay at Cleveland Clinic, Fricke and colleagues discovered the radiation response of ferrous sulphate that eventually resulted in the widely used dosimeter named after him. His research at Cold Spring Harbor Laboratory laid the foundation for the understanding of the radiation chemistry of water. Honors and awards In 1972 he was awarded the Weiss Medal of the Association for Radiation Research. He was elected a Fellow of the American Physical Society in 1928. See also Gel dosimetry Joseph Joshua Weiss Milton Burton
https://en.wikipedia.org/wiki/Prince%20of%20Wales%27s%20feathers
The Prince of Wales's feathers are the heraldic badge of the Prince of Wales, the heir to the British throne. The badge consists of three white ostrich feathers encircled by a gold coronet. A ribbon below the coronet bears the German motto (, "I serve"). As well as being used in royal heraldry, the feathers are sometimes used to symbolise Wales itself, particularly in Welsh rugby union and Welsh regiments of the British Army. Bearers of the motif The feathers are the badge of the heir apparent to the British throne regardless of whether or not the Prince of Wales title is held. House of Plantagenet The ostrich feathers heraldic motif is generally traced back to Edward, the Black Prince (1330–1376), eldest son and heir apparent of King Edward III of England. The Black Prince bore (as an alternative to his paternal arms) a shield of Sable, three ostrich feathers argent, described as his "shield for peace", probably meaning the shield he used for jousting. These arms appear several times on his chest tomb in Canterbury Cathedral, alternating with his paternal arms (the royal arms of King Edward III differenced by a label of three points argent). The Black Prince also used heraldic badges of one or more ostrich feathers in various other contexts. The feathers had first appeared at the time of the marriage of Edward III to Philippa of Hainault, and Edward III himself occasionally used ostrich feather badges. It is therefore likely that the Black Prince inherited the badge from his mother, descended from the Counts of Hainault, whose eldest son bore the title "Count of Ostrevent", the ostrich (, Old French spellings including ostruce) feathers being possibly an heraldic pun on that name. Alternatively, the badge may have derived from the Counts of Luxembourg, from whom Philippa was also descended, who had used the badge of an ostrich. Sir Roger de Clarendon, an illegitimate son of the Black Prince by his mistress Edith Willesford, bore arms of Or, on a bend sable th
https://en.wikipedia.org/wiki/World%20Federation%20for%20Culture%20Collections
The World Federation for Culture Collections is an international body formed under the umbrella of the International Union of Biological Sciences and a Federation within the International Union of Microbiological Societies. The WFCC operates as a clearing house for information on collections of microbiological specimens. It supports the development, maintenance and establishment of culture collections. The WFCC bylaws were published in 1972 in the International Journal of Systematic Biology (Int. J. Syst. Bacteriol., 22: 406-409, 1972) and updated several times since. One of its main activities is the support of the WFCC-MIRCEN World Data Centre for Microorganisms. There are over 2.4 Million cultures and 676 culture collections under the purview of the WFCC. The WFCC is governed by an executive board and through a series of committees. Members of the executive board include scientists from Australia, Belgium, Brazil, China, Germany, India, Japan, Morocco, The Netherlands, the Russian Federation and the United States. Global significance The WFCC is the main international body that coordinates the activities of culture collections around the world. Their activities include lobbying for support for collections, preventing the loss of collections, promoting the use of collections, and coordinating international regulations relating to the shipping and use of biological materials. The WFCC is a Multidisciplinary Commission of the International Union of Biological Sciences (IUBS) and a Federation within the International Union of Microbiological Societies (IUMS). In 1977 the WIPO established the Budapest Treaty on the International Recognition of the Deposit of Microorganisms for the Purposes of Patent Procedure. There are 42 International Depository Authorities worldwide where microorganisms may be deposited for patent purposes. The WFCC coordinates the International Congress of Culture Collections. The most recent meeting was the 13th International Conference o
https://en.wikipedia.org/wiki/Full%20custom
In integrated circuit design, full-custom is a design methodology in which the layout of each individual transistor on the integrated circuit (IC), and the interconnections between them, are specified. Alternatives to full-custom design include various forms of semi-custom design, such as the repetition of small transistor subcircuits; one such methodology is the use of standard cell libraries (which are themselves designed full-custom). Full-custom design potentially maximizes the performance of the chip, and minimizes its area, but is extremely labor-intensive to implement. Full-custom design is limited to ICs that are to be fabricated in extremely high volumes, notably certain microprocessors and a small number of application-specific integrated circuits (ASICs). As of 2008 the main factor affecting the design and production of ASICs was the high cost of mask sets (number of which is depending on the number of IC layers) and the requisite EDA design tools. The mask sets are required in order to transfer the ASIC designs onto the wafer. See also Electronics design flow
https://en.wikipedia.org/wiki/Standard%20day
The term standard day is used throughout meteorology, aviation, and other sciences and disciplines as a way of defining certain properties of the atmosphere in a manner which allows those who use our atmosphere to effectively calculate and communicate its properties at any given time. For example, a temperature deviation of +8 °C means that the air at any given altitude is 8 °C (14 °F) warmer than what standard day conditions and the measurement altitude would predict, and would indicate a higher density altitude. These variations are extremely important to both meteorologists and aviators, as they strongly determine the different properties of the atmosphere. For example, on a cool day, an airliner might have no problem safely departing a medium length runway, but on a warmer day, the density altitude might be higher, require a higher ground speed and true airspeed prior to liftoff, which would require more acceleration, a longer runway, and a reduced climb rate after liftoff. The pilot may choose to reduce the gross weight of the aircraft by carrying less fuel or reducing the amount/weight of the cargo, or even reducing the number of passengers (usually the last option). Not carrying sufficient fuel to complete the flight to the destination, the pilot would plan an intermediate fuel stop, which would likely delay the final destination arrival time. In meteorology, departure from standard day conditions is what gives rise to all weather phenomena, including thunderstorms, fronts, clouds, even the heating and cooling of our planet. Standard day parameters For Pilots: At sea level, Altimeter:29.92 in/Hg at The "standard day" model of the atmosphere is defined at sea level, with certain present conditions such as temperature and pressure. But other factors, such as humidity, further alter the nature of the atmosphere, and are also defined under standard day conditions: Density (ρ): 1.225 kg/m3 (0.00237 slug/ft3) Pressure (p): 101.325 kPa (14.7 lb/ in2)
https://en.wikipedia.org/wiki/Convex%20Computer
Convex Computer Corporation was a company that developed, manufactured and marketed vector minisupercomputers and supercomputers for small-to-medium-sized businesses. Their later Exemplar series of parallel computing machines were based on the Hewlett-Packard (HP) PA-RISC microprocessors, and in 1995, HP bought the company. Exemplar machines were offered for sale by HP for some time, and Exemplar technology was used in HP's V-Class machines. History Convex was formed in 1982 by Bob Paluck and Steve Wallach in Richardson, Texas. It was originally named Parsec and early prototype and production boards bear that name. They planned on producing a machine very similar in architecture to the Cray Research vector processor machines, with a somewhat lower performance, but with a much better price–performance ratio. In order to lower costs, the Convex designs were not as technologically aggressive as Cray's, and were based on more mainstream chip technology, attempting to make up for the loss in performance in other ways. Their first machine was the C1, released in 1985. The C1 was very similar to the Cray-1 in general design, but its CPU and main memory was implemented with slower but less expensive CMOS technology. They offset this by increasing the capabilities of the vector units, including doubling the vector registers' length to 128 64-bit elements each. It also used virtual memory as opposed to the static memory system of the Cray machines, which improved programming. It was generally rated at 20 MFLOPS peak for double precision (64-bit), and 40 MFLOPS peak for single precision (32-bit), about one fifth the normal speed of the Cray-1. They also invested heavily in advanced automatic vectorizing compilers in order to gain performance when existing programs were ported to their systems. The machines ran a BSD version of Unix known initially as Convex Unix then later as ConvexOS due to trademark and licensing issues. ConvexOS has DEC VMS compatibility features as well
https://en.wikipedia.org/wiki/Concentric%20objects
In geometry, two or more objects are said to be concentric when they share the same center. Any pair of (possibly unalike) objects with well-defined centers can be concentric, including circles, spheres, regular polygons, regular polyhedra, parallelograms, cones, conic sections, and quadrics. Geometric objects are coaxial if they share the same axis (line of symmetry). Geometric objects with a well-defined axis include circles (any line through the center), spheres, cylinders, conic sections, and surfaces of revolution. Concentric objects are often part of the broad category of whorled patterns, which also includes spirals (a curve which emanates from a point, moving farther away as it revolves around the point). Geometric properties In the Euclidean plane, two circles that are concentric necessarily have different radii from each other. However, circles in three-dimensional space may be concentric, and have the same radius as each other, but nevertheless be different circles. For example, two different meridians of a terrestrial globe are concentric with each other and with the globe of the earth (approximated as a sphere). More generally, every two great circles on a sphere are concentric with each other and with the sphere. By Euler's theorem in geometry on the distance between the circumcenter and incenter of a triangle, two concentric circles (with that distance being zero) are the circumcircle and incircle of a triangle if and only if the radius of one is twice the radius of the other, in which case the triangle is equilateral. The circumcircle and the incircle of a regular n-gon, and the regular n-gon itself, are concentric. For the circumradius-to-inradius ratio for various n, see Bicentric polygon#Regular polygons. The same can be said of a regular polyhedron's insphere, midsphere and circumsphere. The region of the plane between two concentric circles is an annulus, and analogously the region of space between two concentric spheres is a spherical sh
https://en.wikipedia.org/wiki/Fisher%20information%20metric
In information geometry, the Fisher information metric is a particular Riemannian metric which can be defined on a smooth statistical manifold, i.e., a smooth manifold whose points are probability measures defined on a common probability space. It can be used to calculate the informational difference between measurements. The metric is interesting in several aspects. By Chentsov’s theorem, the Fisher information metric on statistical models is the only Riemannian metric (up to rescaling) that is invariant under sufficient statistics. It can also be understood to be the infinitesimal form of the relative entropy (i.e., the Kullback–Leibler divergence); specifically, it is the Hessian of the divergence. Alternately, it can be understood as the metric induced by the flat space Euclidean metric, after appropriate changes of variable. When extended to complex projective Hilbert space, it becomes the Fubini–Study metric; when written in terms of mixed states, it is the quantum Bures metric. Considered purely as a matrix, it is known as the Fisher information matrix. Considered as a measurement technique, where it is used to estimate hidden parameters in terms of observed random variables, it is known as the observed information. Definition Given a statistical manifold with coordinates , one writes for the probability density as a function of . Here is drawn from the value space R for a (discrete or continuous) random variable X. The probability is normalized by where is the distribution of . The Fisher information metric then takes the form: The integral is performed over all values x in R. The variable is now a coordinate on a Riemann manifold. The labels j and k index the local coordinate axes on the manifold. When the probability is derived from the Gibbs measure, as it would be for any Markovian process, then can also be understood to be a Lagrange multiplier; Lagrange multipliers are used to enforce constraints, such as holding the expectation
https://en.wikipedia.org/wiki/Paraquat
Paraquat (trivial name; ), or N,N′-dimethyl-4,4′-bipyridinium dichloride (systematic name), also known as methyl viologen, is an organic compound with the chemical formula [(C6H7N)2]Cl2. It is classified as a viologen, a family of redox-active heterocycles of similar structure. This salt is one of the most widely used herbicides. It is quick-acting and non-selective, killing green plant tissue on contact. It is also toxic (lethal) to human beings and animals due to its redox activity, which produces superoxide anions. It has been linked to the development of Parkinson's disease and is banned in several countries. Paraquat may be in the form of salt with chloride or other anions; quantities of the substance are sometimes expressed by cation mass alone (paraquat cation, paraquat ion). The name is derived from the para positions of the quaternary nitrogens. Production Pyridine is coupled by treatment with sodium in ammonia followed by oxidation to give 4,4′-bipyridine. This chemical is then dimethylated with chloromethane to give the final product as the dichloride salt. Use of other methylating agents gives the bispyridinium with alternate counterions. For example, Hugo Weidel's original synthesis used methyl iodide to produce the diiodide. Herbicide use Although first synthesized in 1882, paraquat's herbicidal properties were not recognized until 1955 in the Imperial Chemical Industries (ICI) laboratories at Jealott's Hill, Berkshire, England. Paraquat was first manufactured and sold by ICI in early 1962 under the trade name Gramoxone, and is today among the most commonly used herbicides. Paraquat is classified as a non-selective contact herbicide. The key characteristics that distinguish it from other agents used in plant protection products are: It kills a wide range of annual grasses and broad-leaved weeds and the tips of established perennial weeds. It is very fast-acting. It is rain-fast within minutes of application. It is partially inactivated upon con
https://en.wikipedia.org/wiki/Flash%20%28tattoo%29
Tattoo flash is any tattoo design that is pre-prepared for customers to avoid the need for custom designs, or as a starting point for custom work. Tattoo flash was designed for rapid tattooing and used in "street shops"—tattoo shops that handle a large volume of standardized tattoos for walk-in customers. Pieces of flash are traditionally drawn or printed on paper, and displayed for walk-in customers in binders or on the walls of tattoo shops. In the 21st century they may also be advertised online and on social media. History The term "flash" is derived from the traveling carnival and circus trade in the late 1800s: an attraction needed to be eye-catching to draw in the crowd, and that visual appeal was called flash. Tattoo artists working at those carnivals would hang up their designs in front of their booths to catch people's attention, so they adopted "flash" as a term for this artwork. Traveling tattoo artists developed sketchbooks of designs that were easy to transport and show to potential customers. The development of electric tattoo machines in the 1890s enabled faster and more precise tattooing. More tattoo artists started to work from shops as a full-time profession. To fulfill increased demand for tattoos, especially sailor tattoos, artists bought and sold sets of pre-drawn designs. These "flash" designs were on larger sheets of paper than sketchbook pages, intended to be framed and hung on walls. Many of these designs were relatively simple — with black outlines, limited colors, and limited shading — to enable quick work. Skilled professional tattoo artists sold flash to other artists, who were seeking out quality designs to advertise to potential customers. This process of selling and buying attractive sets of designs helped shape American traditional tattooing into a more consistent genre. Many common flash designs are still in this "old school" style. For example, Lew Alberts (1880–1954), known as Lew the Jew, was a prolific tattoo artist who cre
https://en.wikipedia.org/wiki/Elgato
Elgato is a brand of consumer technology products. The brand was manufactured and designed by Elgato Systems, founded in 2010 by Markus Fest and was headquartered in Munich, Germany, until 2018 when the brand was sold to Corsair. History The brand, Elgato, was formerly a brand of Elgato Systems. The Elgato brand was used to refer to the company gaming and thunderbolt devices and was commonly called Elgato Gaming. On June 28, 2018, Corsair acquired the Elgato brand from Elgato Systems, while Elgato Systems kept their smart home division and renamed the company to Eve Systems. Products Thunderbolt dock Elgato introduced a Thunderbolt docking station in June 2014. A computer is plugged into the dock using a Thunderbolt port in order to gain access to the dock's three USB ports, audio jacks, HDMI and Ethernet. It is typically used to plug a Macbook into an office setting (printer, monitor, keyboard) or to provide additional ports not available in the MacBook Air. A review in The Register said it was compact and useful, but Windows users should consider a USB 3.0 dock. The Register and CNET disagreed on whether it was competitively priced. Reviews in TechRadar and Macworld gave it 4 out of 5 stars. Thunderbolt SSD Elgato introduced two external solid-state drives in September 2012 called Thunderbolt Drive. Benchmark tests by MacWorld and Tom's Hardware said that the hard drive was slower than other products they tested, despite being connected through a faster Thunderbolt port, rather than Firewire. The following year, in 2013, Elgato replaced them with similar drives identified as "Thunderbolt Drive +", which added USB 3.0 support and was claimed to be faster than the previous iteration. A CNET review of a Thunderbolt Drive+ drive gave it a 4.5 out of 5 star rating. It said the drive was "blazing fast" and "the most portable drive to date" but was also expensive. An article in The Register explained that the original drives introduced in 2012 didn't perform well
https://en.wikipedia.org/wiki/Uncleftish%20Beholding
"Uncleftish Beholding" (1989) is a short text by Poul Anderson, included in his anthology "All One Universe". It is designed to illustrate what English might look like without its large number of loanwords from languages such as French, Greek, and Latin, especially with regard to the proportion of scientific words with origins in those languages. Written as a demonstration of linguistic purism in English, the work explains atomic theory using Germanic words almost exclusively and coining new words when necessary; many of these new words have cognates in modern German, an important scientific language in its own right. The title phrase uncleftish beholding calques "atomic theory." To illustrate, the text begins: It goes on to define firststuffs (chemical elements), such as waterstuff (hydrogen), sourstuff (oxygen), and ymirstuff (uranium), as well as bulkbits (molecules), bindings (compounds), and several other terms important to uncleftish worldken (atomic science). and are the modern German words for hydrogen and oxygen, and in Dutch the modern equivalents are and . Sunstuff refers to helium, which derives from , the Ancient Greek word for 'sun'. Ymirstuff references Ymir, a giant in Norse mythology similar to Uranus in Greek mythology. Glossary The vocabulary used in "Uncleftish Beholding" does not completely derive from Anglo-Saxon. Around, from Old French (Modern French ), completely displaced Old English (modern English (now obsolete), cognate to German and Latin ) and left no "native" English word for this concept. The text also contains the French-derived words rest, ordinary and sort. The text gained increased exposure and popularity after being circulated around the Internet, and has served as inspiration for some inventors of Germanic English conlangs. Douglas Hofstadter, in discussing the piece in his book , jocularly refers to the use of only Germanic roots for scientific pieces as "Ander-Saxon." See also Anglish Thing Explainer
https://en.wikipedia.org/wiki/IF-MAP
The Interface for Metadata Access Points (IF-MAP) is an open specification for a client/server protocol developed by the Trusted Computing Group (TCG) as one of the core protocols of the Trusted Network Connect (TNC) open architecture. IF-MAP provides a common interface between the Metadata Access Point (MAP), a database server acting as a clearinghouse for information about security events and objects, and other elements of the TNC architecture. The IF-MAP protocol defines a publish/subscribe/search mechanism with a set of identifiers and data types. History The IF-MAP protocol was first published by the TCG on April 28, 2008. Originally, the IF-MAP specification was developed to support data sharing across various vendor’s devices and applications for network security. The specification has also been adopted for additional use cases of data-sharing including physical security. The 2.0 version of the IF-MAP spec separated the base protocol from the metadata definitions that define how different types of information are represented. The goal in separating the base protocol from the metadata definitions within the specification was to allow the specification to be adopted across other technologies (such as cloud computing, industrial control systems, or smart grid) to leverage their existing data models within the MAP framework. Version 2.1 of the IF-MAP spec was published on May 7, 2012. The primary new feature of IF-MAP 2.1 is that the IF-MAP identifier space became extensible. A reference implementation is available under GPLv3 license on Google Code repository.
https://en.wikipedia.org/wiki/Introduction%20to%20evolution
In biology, evolution is the process of change in all forms of life over generations, and evolutionary biology is the study of how evolution occurs. Biological populations evolve through genetic changes that correspond to changes in the organisms' observable traits. Genetic changes include mutations, which are caused by damage or replication errors in organisms' DNA. As the genetic variation of a population drifts randomly over generations, natural selection gradually leads traits to become more or less common based on the relative reproductive success of organisms with those traits. The age of the Earth is about 4.5 billion years. The earliest undisputed evidence of life on Earth dates from at least 3.5 billion years ago. Evolution does not attempt to explain the origin of life (covered instead by abiogenesis), but it does explain how early lifeforms evolved into the complex ecosystem that we see today. Based on the similarities between all present-day organisms, all life on Earth is assumed to have originated through common descent from a last universal ancestor from which all known species have diverged through the process of evolution. All individuals have hereditary material in the form of genes received from their parents, which they pass on to any offspring. Among offspring there are variations of genes due to the introduction of new genes via random changes called mutations or via reshuffling of existing genes during sexual reproduction. The offspring differs from the parent in minor random ways. If those differences are helpful, the offspring is more likely to survive and reproduce. This means that more offspring in the next generation will have that helpful difference and individuals will not have equal chances of reproductive success. In this way, traits that result in organisms being better adapted to their living conditions become more common in descendant populations. These differences accumulate resulting in changes within the population. This proce
https://en.wikipedia.org/wiki/Capacity%20of%20a%20set
In mathematics, the capacity of a set in Euclidean space is a measure of the "size" of that set. Unlike, say, Lebesgue measure, which measures a set's volume or physical extent, capacity is a mathematical analogue of a set's ability to hold electrical charge. More precisely, it is the capacitance of the set: the total charge a set can hold while maintaining a given potential energy. The potential energy is computed with respect to an idealized ground at infinity for the harmonic or Newtonian capacity, and with respect to a surface for the condenser capacity. Historical note The notion of capacity of a set and of "capacitable" set was introduced by Gustave Choquet in 1950: for a detailed account, see reference . Definitions Condenser capacity Let Σ be a closed, smooth, (n − 1)-dimensional hypersurface in n-dimensional Euclidean space ℝn, n ≥ 3; K will denote the n-dimensional compact (i.e., closed and bounded) set of which Σ is the boundary. Let S be another (n − 1)-dimensional hypersurface that encloses Σ: in reference to its origins in electromagnetism, the pair (Σ, S) is known as a condenser. The condenser capacity of Σ relative to S, denoted C(Σ, S) or cap(Σ, S), is given by the surface integral where: u is the unique harmonic function defined on the region D between Σ and S with the boundary conditions u(x) = 1 on Σ and u(x) = 0 on S; S′ is any intermediate surface between Σ and S; ν is the outward unit normal field to S′ and is the normal derivative of u across S′; and σn = 2πn⁄2 ⁄ Γ(n ⁄ 2) is the surface area of the unit sphere in ℝn. C(Σ, S) can be equivalently defined by the volume integral The condenser capacity also has a variational characterization: C(Σ, S) is the infimum of the Dirichlet's energy functional over all continuously-differentiable functions v on D with v(x) = 1 on Σ and v(x) = 0 on S. Harmonic/Newtonian capacity Heuristically, the harmonic capacity of K, the region bounded by Σ, can be found by taking the condenser capa
https://en.wikipedia.org/wiki/ACOX3
Peroxisomal acyl-coenzyme A oxidase 3 is an enzyme that in humans is encoded by the ACOX3 gene. Acyl-Coenzyme A oxidase 3 also known as pristanoyl-CoA oxidase (ACOX3) is involved in the desaturation of 2-methyl branched fatty acids in peroxisomes. Unlike the rat homolog, the human gene is expressed in very low amounts in the liver such that its mRNA was undetectable by routine Northern-blot analysis, by immunoblotting for its product, or by enzyme activity measurements. However the human cDNA encoding a 700 amino acid protein with a peroxisomal targeting C-terminal tripeptide S-K-L was isolated and is thought to be expressed under special conditions such as specific developmental stages or in a tissue specific manner in tissues that have not yet been examined. See also ACOX1 Acyl-CoA oxidase
https://en.wikipedia.org/wiki/Allelic%20exclusion
Allelic exclusion is a process by which only one allele of a gene is expressed while the other allele is silenced. This phenomenon is most notable for playing a role in the development of B lymphocytes, where allelic exclusion allows for each mature B lymphocyte to express only one type of immunoglobulin. This subsequently results in each B lymphocyte being able to recognize only one antigen. This is significant as the co-expression of both alleles in B lymphocytes is associated with autoimmunity and the production of autoantibodies. Many regulatory processes can lead to allelic exclusion. In one instance, one allele of the gene can become transcriptionally silent, resulting in the transcription and expression of only the other allele. This could be caused in part by decreased methylation of the expressed allele. Conversely, allelic exclusion can also be regulated through asynchronous allelic rearrangement. In this case, both alleles are transcribed but only one becomes a functional protein. In B-lymphocytes Allelic exclusion has been observed most often in genes for cell surface receptors and has been extensively studied in immune cells such as B lymphocytes. Allelic exclusion of immunoglobulin (Ig) heavy chain and light chain genes in B cells forms the genetic basis for the presence of only a single type of antigen receptor on a given B lymphocyte, which is central in explaining the ‘one B cell — one antibody’ rule. The variable domain of the B-cell antigen receptor is encoded by the V, (D), and J gene segments, the recombination of which gives rise to Ig gene allelic exclusion. V(D)J recombination occurs imprecisely, so that while transcripts from both alleles are expressed, only one is able to give rise to a functional surface antigen receptor. If no successful rearrangement occurs on either chromosome, the cell dies. Models Stochastic In the stochastic model, while the Ig rearrangement is proposed to be very efficient, the probability of functional allel
https://en.wikipedia.org/wiki/Heap%20%28mathematics%29
In abstract algebra, a semiheap is an algebraic structure consisting of a non-empty set H with a ternary operation denoted that satisfies a modified associativity property: A biunitary element h of a semiheap satisfies [h,h,k] = k = [k,h,h] for every k in H. A heap is a semiheap in which every element is biunitary. The term heap is derived from груда, Russian for "heap", "pile", or "stack". Anton Sushkevich used the term in his Theory of Generalized Groups (1937) which influenced Viktor Wagner, promulgator of semiheaps, heaps, and generalized heaps. Груда contrasts with группа (group) which was taken into Russian by transliteration. Indeed, a heap has been called a groud in English text.) Examples Two element heap Turn into the cyclic group , by defining the identity element, and . Then it produces the following heap: Defining as the identity element and would have given the same heap. Heap of integers If are integers, we can set to produce a heap. We can then choose any integer to be the identity of a new group on the set of integers, with the operation and inverse . Heap of a groupoid with two objects One may generalize the notion of the heap of a group to the case of a groupoid which has two objects A and B when viewed as a category. The elements of the heap may be identified with the morphisms from A to B, such that three morphisms x, y, z define a heap operation according to: This reduces to the heap of a group if a particular morphism between the two objects is chosen as the identity. This intuitively relates the description of isomorphisms between two objects as a heap and the description of isomorphisms between multiple objects as a groupoid. Heterogeneous relations Let A and B be different sets and the collection of heterogeneous relations between them. For define the ternary operator where qT is the converse relation of q. The result of this composition is also in so a mathematical structure has been formed by the ternary operat
https://en.wikipedia.org/wiki/ABC%20model%20of%20flower%20development
The ABC model of flower development is a scientific model of the process by which flowering plants produce a pattern of gene expression in meristems that leads to the appearance of an organ oriented towards sexual reproduction, a flower. There are three physiological developments that must occur in order for this to take place: firstly, the plant must pass from sexual immaturity into a sexually mature state (i.e. a transition towards flowering); secondly, the transformation of the apical meristem's function from a vegetative meristem into a floral meristem or inflorescence; and finally the growth of the flower's individual organs. The latter phase has been modelled using the ABC model, which aims to describe the biological basis of the process from the perspective of molecular and developmental genetics. An external stimulus is required in order to trigger the differentiation of the meristem into a flower meristem. This stimulus will activate mitotic cell division in the apical meristem, particularly on its sides where new primordia are formed. This same stimulus will also cause the meristem to follow a developmental pattern that will lead to the growth of floral meristems as opposed to vegetative meristems. The main difference between these two types of meristem, apart from the obvious disparity between the objective organ, is the verticillate (or whorled) phyllotaxis, that is, the absence of stem elongation among the successive whorls or verticils of the primordium. These verticils follow an acropetal development, giving rise to sepals, petals, stamens and carpels. Another difference from vegetative axillary meristems is that the floral meristem is "determined", which means that, once differentiated, its cells will no longer divide. The identity of the organs present in the four floral verticils is a consequence of the interaction of at least three types of gene products, each with distinct functions. According to the ABC model, functions A and C are required in
https://en.wikipedia.org/wiki/Avira
Avira Operations GmbH & Co. KG is a German multinational computer security software company mainly known for its Avira Free Security antivirus software. Although founded in 2006, the Avira antivirus application has been under active development since 1986 through its predecessor company H+BEDV Datentechnik GmbH. Since 2021, Avira has been owned by American software company NortonLifeLock (now Gen Digital), after being previously owned by investment firm Investcorp. The company also has offices in the United States, China, Romania, and Japan. Technology Virus definition Avira periodically "cleans out" its virus definition files, replacing specific signatures with generic ones for a general increase in performance and scanning speed. A 15MB database clean-out was made on 27 October 2008, causing problems to the users of the Free edition because of its large size and Avira's slow Free edition servers. Avira responded by reducing the size of the individual update files, delivering less data in each update. Nowadays there are 32 smaller definition files that are updated regularly in order to avoid peaks in the download of the updates. Its file-by-file scanning feature has jokingly been titled "Luke Filewalker" by the developers, as a reference to the Star Wars media franchise character "Luke Skywalker". Advance heuristic Avira products contain heuristics that proactively uncover unknown malware, before a special virus signature to combat the damaging element has been created and before a virus guard update has been sent. Heuristic virus detection involves extensive analysis and investigation of the affected codes for functions typical of malware. If the code being scanned exhibits these characteristic features it is reported as being suspicious, although not necessarily malware; the user decides whether to act on or ignore the warning. ProActiv The ProActiv component uses rule sets developed by the Avira Malware Research Center to identify suspicious behavior.
https://en.wikipedia.org/wiki/Hoodia%20currorii
Hoodia currorii is a succulent plant native to Namibia and the Cape Province of South Africa. It grows in desert areas and is common along the road from Karibib to Swakopmund in Namibia. It is also known as ghaap in the vernacular. Description Hoodia currorii grows in erect clumps with gray-green stems, 8 centimeters in diameter. It reaches heights of 50 to 80 centimeters tall. It bears rust-red flowers mid-summer which are covered in purple hairs. These are large flowers, about five to ten centimeters in diameter. Cultivation Hoodia currorii is more commonly seen cultivated than other Hoodia species. It can be grown from cuttings. Uses Hoodia currorii may be eaten after the spines are removed and is said to have a sweet flavor.
https://en.wikipedia.org/wiki/5
5 (five) is a number, numeral and digit. It is the natural number, and cardinal number, following 4 and preceding 6, and is a prime number. It has garnered attention throughout history in part because distal extremities in humans typically contain five digits. Evolution of the Arabic digit The evolution of the modern Western digit for the numeral 5 cannot be traced back to the Indian system, as for the digits 1 to 4. The Kushana and Gupta empires in what is now India had among themselves several forms that bear no resemblance to the modern digit. The Nagari and Punjabi took these digits and all came up with forms that were similar to a lowercase "h" rotated 180°. The Ghubar Arabs transformed the digit in several ways, producing from that were more similar to the digits 4 or 3 than to 5. It was from those digits that Europeans finally came up with the modern 5. While the shape of the character for the digit 5 has an ascender in most modern typefaces, in typefaces with text figures the glyph usually has a descender, as, for example, in . On the seven-segment display of a calculator and digital clock, it is represented by five segments at four successive turns from top to bottom, rotating counterclockwise first, then clockwise, and vice-versa. It is one of three numbers, along with 4 and 6, where the number of segments matches the number. Mathematics Five is the third smallest prime number, and the second super-prime. It is the first safe prime, the first good prime, the first balanced prime, and the first of three known Wilson primes. Five is the second Fermat prime, the second Proth prime, and the third Mersenne prime exponent, as well as the third Catalan number and the third Sophie Germain prime. Notably, 5 is equal to the sum of the only consecutive primes 2 + 3 and it is the only number that is part of more than one pair of twin primes, (3, 5) and (5, 7). It also forms the first pair of sexy primes with 11, which is the fifth prime number and Heegner n
https://en.wikipedia.org/wiki/PacketFence
PacketFence is an open-source network access control (NAC) system which provides the following features: registration, detection of abnormal network activities, proactive vulnerability scans, isolation of problematic devices, remediation through a captive portal, 802.1X, wireless integration and User-Agent / DHCP fingerprinting. The company that develops PacketFence, Inverse Inc. was acquired by Akamai Technologies on February 1, 2021. PacketFence version 10 supports Red Hat Enterprise Linux 7 and its derivatives, notably CentOS, and Debian Stretch. Inverse Inc. has also been releasing a version of PacketFence dubbed the "Zero Effort NAC", which is a standalone Virtual Appliance that is preconfigured installation of PacketFence, making it easier than ever to deploy a NAC in your environment. PacketFence version 11 added support for Red Hat Enterprise Linux 8 and it's derivatives, notably CentOS, and Debian Bullseye. Further reading External links PacketFence website PacketFence on GitHub
https://en.wikipedia.org/wiki/Penveu
The Penveu is a pen-like device developed by the American company Interphase, for use with digital audio-visual presentations. History In 1991, SMART Technologies introduced an Interactive Whiteboard, on which the image from a projector was displayed. A USB connection allowed the presenter to virtually interact with the projection. Other after-market products aimed at working with existing projectors (Mimio and eBeam) came out after that. Interphase Corporation (NASDAQ:INPH) was founded in 1974, and filed for initial public offering in 1984. In 2010, penveu was invented. The company developed the concepts and tested them for two years until unveiling the product at the DEMO conference in Santa Clara, California, on April 18, 2012. On May 30, 2014, the product was released to the market. Since the product is made of two electronic boards (one in the handheld pen and one in the base station), the engineering department named those two boards the PEN and the VEU (video enhancement unit). PENVEU became the name of the device. On September 30, 2015, Interphase Corporation announced it had ceased operations and commenced bankruptcy proceedings. Technology The core of the penveu technology surrounds a camera located near the tip of the pen, but is implemented in two parts of the penveu system: the PEN, and the VEU. The video signal (VGA) that comes from the computer towards the display device (projector or TV monitor) is intercepted by the VEU box. Over there, visual targets are inserted into that video stream. Those targets include position-encoded information, related to the location of each target within the display area. The targets are inserted as increased brightness in one frame, and reduced brightness in the next frame. There is a digital signal processor (DSP) in the pen, which calculates the position of the tip based on the information retrieved from the targets detected. As a result of the positioning targeting system being integrated with the displayed i