source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Cuffitis
Cuffitis is inflammation at the anal transition zone or "cuff" created as a result of ileal pouch-anal anastomosis (IPAA). It is considered a variant form of ulcerative colitis that occurs in the rectal cuff. Cuffitis is a common complication of IPAA, particularly when a stapled anastomosis without mucosectomy procedure has been used. Signs and symptoms Symptoms of cuffitis mimic those of pouchitis. In addition, patients with cuffitis often present with small volume bloody bowel movements. Often, cuffitis can produce the appearance of bright red blood on tissue. Complications Surgery-associated ischemia may contribute inflammation at the anal transitional zone. Patients whose cuffitis is refractory to mesalamine and/or corticosteroids should be evaluated for other disease in the cuff area, such as fistula or anastomotic leaks. Cuffitis that is refractory to medication can also be a sign of Crohn's disease of the pouch. Chronic cuffitis can also contribute to the development of anastomotic stricture. Cuffitis that is refractory, Crohn's-related, or is associated with surgical complications can contribute to pouch failure. Diagnosis Definitive diagnose of cuffitis is obtained by endoscopy. Treatment Cuffitis is treated with mesalamine suppositories or topical application of lidocaine or corticosteroid medications. Systemic medications are rarely used.
https://en.wikipedia.org/wiki/Work-at-home%20scheme
A work-at-home scheme is a get-rich-quick scam in which a victim is lured by an offer to be employed at home, very often doing some simple task in a minimal amount of time with a large amount of income that far exceeds the market rate for the type of work. The true purpose of such an offer is for the perpetrator to extort money from the victim, either by charging a fee to join the scheme, or requiring the victim to invest in products whose resale value is misrepresented. Overview Remote work schemes have been recorded since the early 20th century; the earliest studied "envelope stuffing" scam originated in the United States during the Great Depression in the 1920s and 1930s. In this scam, the worker is offered entry to a scheme where they can earn $2 for every envelope they fill. After paying a small $2 fee to join the scheme, the victim is sent a flyer template for the self-same work-from-home scheme, and instructed to post these advertisements around their local area – the victim is simply "stuffing envelopes" with flyer templates that perpetuate the scheme. Originally found as printed adverts in newspapers and magazines, variants of this scam have expanded into more modern media, such as television and radio adverts, and forum posts on the Internet. In some countries, law enforcement agencies work to fight work-at-home schemes. In 2006, the United States Federal Trade Commission (FTC) established Project False Hopes, a federal and state law enforcement sweep that targets bogus business opportunities and work-at-home scams. The crackdown involved more than 100 law enforcement actions by the FTC, the Department of Justice, the United States Postal Inspection Service, and law enforcement agencies in eleven states. Home-based business and remote work are a legitimate avenue for employment, but anyone seeking such an employment opportunity can be scammed by accepting home employment offers from individuals or unknown companies. A 2007 report in the United States su
https://en.wikipedia.org/wiki/Subfunctionalization
Subfunctionalization was proposed by Stoltzfus (1999) and Force et al. (1999) as one of the possible outcomes of functional divergence that occurs after a gene duplication event, in which pairs of genes that originate from duplication, or paralogs, take on separate functions. Subfunctionalization is a neutral mutation process of constructive neutral evolution; meaning that no new adaptations are formed. During the process of gene duplication paralogs simply undergo a division of labor by retaining different parts (subfunctions) of their original ancestral function. This partitioning event occurs because of segmental gene silencing leading to the formation of paralogs that are no longer duplicates, because each gene only retains a single function. It is important to note that the ancestral gene was capable of performing both functions and the descendant duplicate genes can now only perform one of the original ancestral functions. Alternative Hypothesis Subfunctionalization after gene duplication is thought to be the newer model of functional divergence. Before 1910, scientists were unaware that genes were capable of multifunctionalization. The original thought was that each gene possessed one function, but in fact genes have independently mutable regions and possessed the ability to subfunctionalize. Neofunctionalization, where one paralogous copy derives a new function after gene duplication, is thought to be the classical model of functional divergence. Nevertheless, because of its neutral mutation process subfunctionalization seem to present a more parsimonious explanation for the retention of duplicates in a genome. Specialization Specialization is a unique model of subfunctionalization, in which paralogs divide into various areas of specialty rather than function. In this model both gene copies perform exactly the same ancestral function. For instance, while the ancestral gene may have performed its function in all tissues, developmental stage, and enviro
https://en.wikipedia.org/wiki/High%20Capacity%20Color%20Barcode
High Capacity Color Barcode (HCCB) is a technology developed by Microsoft for encoding data in a 2D "barcode" using clusters of colored triangles instead of the square pixels conventionally associated with 2D barcodes or QR codes. Data density is increased by using a palette of 4 or 8 colors for the triangles, although HCCB also permits the use of black and white when necessary. It has been licensed by the ISAN International Agency for use in its International Standard Audiovisual Number standard, and serves as the basis for the Microsoft Tag mobile tagging application. The technology was created by Gavin Jancke, an engineering director at Microsoft Research. Quoted by BBC News in 2007, he said that HCCB was not intended to replace conventional barcodes. "'It's more of a 'partner' barcode', he said. 'The UPC barcodes will always be there. Ours is more of a niche barcode where you want to put a lot of information in a small space.'" Technology HCCB uses a grid of colored triangles to encode data. Depending on the target use, the grid size (total number of symbols), symbol density (the printed size of the triangles), and symbol count (number of colors used) can be varied. HCCB can use an eight-, four-, or two-color (black-and-white) palette. Microsoft claims that laboratory tests using standard off-the-shelf printers and scanners have yielded readable eight-color HCCBs equivalent to approximately 3,500 characters per square inch. Microsoft Tag Microsoft Tag is a discontinued but still available implementation of High Capacity Color Barcode (HCCB) using 4 colors in a 5 x 10 grid. Additionally, the code works in monochrome. The print size can be varied to allow reasonable reading by a mobile camera phone; for example, a Tag on a real estate sign might be printed large enough to be read from a car driving by, whereas a Tag in a magazine could be smaller because the reader would likely be nearer. A Microsoft Tag is essentially a machine readable web link, analo
https://en.wikipedia.org/wiki/Bacterial%20DNA%20binding%20protein
In molecular biology, bacterial DNA binding proteins are a family of small, usually basic proteins of about 90 residues that bind DNA and are known as histone-like proteins. Since bacterial binding proteins have a diversity of functions, it has been difficult to develop a common function for all of them. They are commonly referred to as histone-like and have many similar traits with the eukaryotic histone proteins. Eukaryotic histones package DNA to help it to fit in the nucleus, and they are known to be the most conserved proteins in nature. Examples include the HU protein in Escherichia coli, a dimer of closely related alpha and beta chains and in other bacteria can be a dimer of identical chains. HU-type proteins have been found in a variety of bacteria (including cyanobacteria) and archaea, and are also encoded in the chloroplast genome of some algae. The integration host factor (IHF), a dimer of closely related chains which is suggested to function in genetic recombination as well as in translational and transcriptional control is found in Enterobacteria and viral proteins including the African swine fever virus protein A104R (or LMW5-AR). This family is also found in a group of eukaryotes known as dinoflagellates. These dinoflagellate histone-like proteins replace histone in some dinoflagellates and package DNA into a liquid-crystalline state. History Histone-like proteins are present in many Eubacteria, Cyanobacteria, and Archaebacteria. These proteins participate in all DNA-dependent functions; in these processes, bacterial DNA binding proteins have an architectural role, maintaining structural integrity as transcription, recombination, replication, or any other DNA-dependent process proceeds. Eukaryotic histones were first discovered through experiments in 0.4M NaCl. In these high salt concentrations, the eukaryotic histone protein is eluted from a DNA solution in which single stranded DNA is bound covalently to cellulose. Following elution, the protein
https://en.wikipedia.org/wiki/Fundamental%20theorem%20of%20curves
In differential geometry, the fundamental theorem of space curves states that every regular curve in three-dimensional space, with non-zero curvature, has its shape (and size or scale) completely determined by its curvature and torsion. Use A curve can be described, and thereby defined, by a pair of scalar fields: curvature and torsion , both of which depend on some parameter which parametrizes the curve but which can ideally be the arc length of the curve. From just the curvature and torsion, the vector fields for the tangent, normal, and binormal vectors can be derived using the Frenet–Serret formulas. Then, integration of the tangent field (done numerically, if not analytically) yields the curve. Congruence If a pair of curves are in different positions but have the same curvature and torsion, then they are congruent to each other. See also Differential geometry of curves Gaussian curvature
https://en.wikipedia.org/wiki/Kuratowski%27s%20theorem
In graph theory, Kuratowski's theorem is a mathematical forbidden graph characterization of planar graphs, named after Kazimierz Kuratowski. It states that a finite graph is planar if and only if it does not contain a subgraph that is a subdivision of (the complete graph on five vertices) or of (a complete bipartite graph on six vertices, three of which connect to each of the other three, also known as the utility graph). Statement A planar graph is a graph whose vertices can be represented by points in the Euclidean plane, and whose edges can be represented by simple curves in the same plane connecting the points representing their endpoints, such that no two curves intersect except at a common endpoint. Planar graphs are often drawn with straight line segments representing their edges, but by Fáry's theorem this makes no difference to their graph-theoretic characterization. A subdivision of a graph is a graph formed by subdividing its edges into paths of one or more edges. Kuratowski's theorem states that a finite graph is planar if it is not possible to subdivide the edges of or , and then possibly add additional edges and vertices, to form a graph isomorphic to . Equivalently, a finite graph is planar if and only if it does not contain a subgraph that is homeomorphic to or . Kuratowski subgraphs If is a graph that contains a subgraph that is a subdivision of or , then is known as a Kuratowski subgraph of . With this notation, Kuratowski's theorem can be expressed succinctly: a graph is planar if and only if it does not have a Kuratowski subgraph. The two graphs and are nonplanar, as may be shown either by a case analysis or an argument involving Euler's formula. Additionally, subdividing a graph cannot turn a nonplanar graph into a planar graph: if a subdivision of a graph has a planar drawing, the paths of the subdivision form curves that may be used to represent the edges of itself. Therefore, a graph that contains a Kuratowski subgraph ca
https://en.wikipedia.org/wiki/The%20Primordial%20Emotions
The Primordial Emotions: The Dawning of Consciousness is a 2006 book by Australian neuroscientist Derek Denton. Summary Denton argues that, if self-awareness and intentionality are intrinsic to consciousness, the primordial emotions such as thirst, hunger and pain (that involve feeling the self and intentionality) are the likely precursors to consciousness; that a kind of non-reflective consciousness evolved along with these feelings and before the emergence of cognition. This opposes the view put by Edelman and others that consciousness emerged after the development of cognitive processes such as the ability to create a scene from diverse sensory inputs. He sees the evolution of consciousness as a gradual, continuous process, beginning in the brain's most primitive regions with non-reflective consciousness of instincts, followed by reflective consciousness of the feelings and impulses associated with these instincts (this subjective experience is what he terms "primordial emotions"), then reflective consciousness of surroundings evolves, followed by the emergence of reflective consciousness of memories and behavioural options. Denton distinguishes between primordial emotions, "imperious states of arousal and compelling intentions to act" (p. 7) driven by activation of interoceptors and involving ancient, lower brain regions such as the medulla, midbrain and hypothalamus, and "classic" emotions, such as anger, fear and love, driven by distance receptors (vision, hearing, olfaction) and mediated by higher, more recently evolved brain regions.
https://en.wikipedia.org/wiki/Citronellal
{{chembox | Watchedfields = changed | verifiedrevid = 443528634 | Reference =<ref>Citronellal, The Merck Index, 12th Edition</ref> | Name = Citronellal | ImageFile_Ref = | ImageFile = Structural formula of (RS)-Citronellal.svg | ImageSize = 150 | ImageAlt = Skeletal formula of (+)-citronellal | ImageFile1 = (+)-Citronellal 3D ball.png | ImageAlt1 = Ball-and-stick model of the (+)-citronellal molecule | ImageCaption1 = (+)-Citronellal | ImageFile2 = (-)-Citronellal 3D ball.png | ImageAlt2 = Ball-and-stick model of the (-)-citronellal molecule | ImageCaption2 = (-)-Citronellal | IUPACName = 3,7-dimethyloct-6-enal |Section1= |Section2= |Section3= |Section4= }} Citronellal or rhodinal (C10H18O) is a monoterpenoid aldehyde, the main component in the mixture of terpenoid chemical compounds that give citronella oil its distinctive lemon scent. Citronellal is a main isolate in distilled oils from the plants Cymbopogon (excepting C. citratus, culinary lemongrass), lemon-scented gum, and lemon-scented teatree. The (S'')-(−)-enantiomer of citronellal makes up to 80% of the oil from kaffir lime leaves and is the compound responsible for its characteristic aroma. Citronellal has insect repellent properties, and research shows high repellent effectiveness against mosquitoes. Another research shows that citronellal has strong antifungal qualities. Compendial status British Pharmacopoeia See also Citral Citronellol Citronella oil Hydroxycitronellal Perfume allergy
https://en.wikipedia.org/wiki/Skull
The skull is a bone protective cavity for the brain. The skull is composed of four types of bone i.e., cranial bones, facial bones, ear ossicles and hyoid bone. However two parts are more prominent: the cranium (: craniums or crania) and the mandible. In humans, these two parts are the neurocranium (braincase) and the viscerocranium (facial skeleton) that includes the mandible as its largest bone. The skull forms the anterior-most portion of the skeleton and is a product of cephalisation—housing the brain, and several sensory structures such as the eyes, ears, nose, and mouth. In humans these sensory structures are part of the facial skeleton. Functions of the skull include protection of the brain, fixing the distance between the eyes to allow stereoscopic vision, and fixing the position of the ears to enable sound localisation of the direction and distance of sounds. In some animals, such as horned ungulates (mammals with hooves), the skull also has a defensive function by providing the mount (on the frontal bone) for the horns. The English word skull is probably derived from Old Norse , while the Latin word comes from the Greek root (). The human skull fully develops two years after birth.The junctions of the skull bones are joined by structures called sutures. The skull is made up of a number of fused flat bones, and contains many foramina, fossae, processes, and several cavities or sinuses. In zoology there are openings in the skull called fenestrae. Structure Humans The human skull is the bone structure that forms the head in the human skeleton. It supports the structures of the face and forms a cavity for the brain. Like the skulls of other vertebrates, it protects the brain from injury. The skull consists of three parts, of different embryological origin—the neurocranium, the sutures, and the facial skeleton (also called the membraneous viscerocranium). The neurocranium (or braincase) forms the protective cranial cavity that surrounds and houses the
https://en.wikipedia.org/wiki/Rosetta%20Stone%20%28software%29
Rosetta Stone Language Learning is proprietary, computer-assisted language learning (CALL) software published by Rosetta Stone Inc, part of the IXL Learning family of products. The software uses images, text, and sound to teach words and grammar by spaced repetition, without translation. Rosetta Stone calls its approach Dynamic Immersion. The software's name and logo allude to the ancient stone slab of the same name on which the Decree of Memphis is inscribed in three writing systems. IXL Learning acquired Rosetta Stone in March 2021. Dynamic Immersion In a Rosetta Stone Language Learning exercise, the learner pairs sound or text to one of several images. The number of images per screen varies. For example, the software shows the learner four photographs. A native speaker makes a statement that describes one of the photographs, and the statement is printed on the screen; the learner chooses the photograph that the speaker described. In another variation, the learner completes a textual description of a photograph. In writing exercises, the software provides an on-screen keyboard for the user to type characters that are not in the Latin alphabet or accents that may not be in their native language. Grammar lessons cover grammatical tense and grammatical mood. In grammar lessons, the program firstly shows the learner several examples of a grammatical concept, and in some levels, the word or words the learner should focus on are highlighted. Then the learner is given a sentence with several options for a word or phrase, and the learner chooses the correct option. If the learner has a microphone, the software will evaluate word pronunciation using the embedded speech recognition engine, TrueAccent. Each unit contains reviews of the content in those lessons, and each unit concludes with a Milestone activity, which is a simulated conversation that covers the content of the unit. Scoring The program immediately informs the learner whether the answer is right or wro
https://en.wikipedia.org/wiki/BioTapestry
BioTapestry is an open source software application for modeling and visualizing gene regulatory networks (GRNs). History BioTapestry was created at the Institute of Systems Biology in Seattle, in collaboration with the Davidson Lab at the California Institute of Technology. The project was initiated to support the ongoing development of the model of the GRN regulating the development of the endomesoderm in the sea urchin Strongylocentrotus purpuratus. BioTapestry was initially made public in late 2003 as a web-based, read-only interactive viewer for the sea urchin network, with the first fully functional editor released in August 2004 (v0.94.1). The current version, 7.0.0, was released in September 2014. Development Development work on BioTapestry is ongoing. For more information about version 7.0, see the release notes page. Usage BioTapestry is an interactive tool for modeling and visualizing gene regulatory networks. Interactive examples Sea urchin endomesoderm network from the Davidson Lab. Sea urchin ectoderm network from the Davidson Lab. Mouse ventral neural tube specification from the McMahon Lab. Environment And Gene Regulatory Influence Network (EGRIN) for Halobacterium salinarum NRC-1 from the Baliga Lab. T-cell gene regulatory network from the Rothenberg Lab. Zebrafish developmental gene regulatory network from the Yuh Lab. Limb Morphogenesis from the Vokes Lab. Features Input Gene Regulatory Networks can be drawn by hand. Networks can be built using lists of interactions entered via dialog boxes. Lists of interactions can be input using comma-separated-value (CSV) files. Networks can be built using SIF files as input. BioTapestry can accept network definitions via the Gaggle framework. Visualization BioTapestry uses orthogonal-directed hyperlinks and a hierarchical presentation of models. Analysis BioTapestry can create Systems Biology Markup Language files for a subset of networks. Documentation The BioTapestry home pag
https://en.wikipedia.org/wiki/Reaction%20bonded%20silicon%20carbide
Reaction bonded silicon carbide, also known as siliconized silicon carbide or SiSiC, is a type of silicon carbide that is manufactured by a chemical reaction between porous carbon or graphite with molten silicon. Due to the left over traces of silicon, reaction bonded silicon carbide is often referred to as siliconized silicon carbide, or its abbreviation SiSiC. If bulk silicon carbide is produced by sintering of silicon carbide powder, it usually contains traces of chemicals called sintering aids, which are added to support the sintering process by allowing lower sintering temperatures. This type of silicon carbide is often referred to as sintered silicon carbide, or abbreviated to SSiC. The silicon carbide powder is gained from silicon carbide produced as described in the article silicon carbide.
https://en.wikipedia.org/wiki/Tensor%20derivative%20%28continuum%20mechanics%29
The derivatives of scalars, vectors, and second-order tensors with respect to second-order tensors are of considerable use in continuum mechanics. These derivatives are used in the theories of nonlinear elasticity and plasticity, particularly in the design of algorithms for numerical simulations. The directional derivative provides a systematic way of finding these derivatives. Derivatives with respect to vectors and second-order tensors The definitions of directional derivatives for various situations are given below. It is assumed that the functions are sufficiently smooth that derivatives can be taken. Derivatives of scalar valued functions of vectors Let f(v) be a real valued function of the vector v. Then the derivative of f(v) with respect to v (or at v) is the vector defined through its dot product with any vector u being for all vectors u. The above dot product yields a scalar, and if u is a unit vector gives the directional derivative of f at v, in the u direction. Properties: If then If then If then Derivatives of vector valued functions of vectors Let f(v) be a vector valued function of the vector v. Then the derivative of f(v) with respect to v (or at v) is the second order tensor defined through its dot product with any vector u being for all vectors u. The above dot product yields a vector, and if u is a unit vector gives the direction derivative of f at v, in the directional u. Properties: If then If then If then Derivatives of scalar valued functions of second-order tensors Let be a real valued function of the second order tensor . Then the derivative of with respect to (or at ) in the direction is the second order tensor defined as for all second order tensors . Properties: If then If then If then Derivatives of tensor valued functions of second-order tensors Let be a second order tensor valued function of the second order tensor . Then the derivative of with respect to (or at ) in the direction is the
https://en.wikipedia.org/wiki/Managed%20facilities-based%20voice%20network
A managed facilities-based voice network (MFVN) is a communications network managed, operated, and maintained by a voice service provider that delivers traditional telephone service via a loop start analog telephone interface. MFVNs are interconnected with the public switched telephone network (PSTN) or other MFVNs and provide dialtone to end users. Historically, this was provided by equipment at Bell company central offices, however today's MFVNs can include a combination of access network (last mile network of copper, coaxial cable, fiber optics, or cellular), battery-backed customer premises equipment (CPE), network switches and routers, network management systems, voice call servers, and gateways to the broader PSTN. MFVN service providers can include cable operators and telephone companies, as well as new entrants that partner with these traditional carriers, but don't include providers that use customer-managed, non-battery-backed CPE to provide POTS service. Definition According to NFPA 72 2010, 3.3.141, an MFVN is defined simply as: History The term MFVN was introduced in 2007 by various telephony user organizations and stakeholders who rely on telephone service to provide security and life safety services. The concern of these organizations and stakeholders was the reliability of new telephone technology and services. This new technology was based on packet voice technology, or the Voice over Internet Protocol, which was not well understood. These organizations and stakeholders increasingly realized that they could no longer simply assume that phone service would be reliable enough, because it was increasingly being delivered in various ways, even by traditional providers. Clear performance requirements were needed to define when a phone line was suitable for security and life safety services. This issue was not new, as analog copper based networks had been transitioning to digital telephony technology for 25 years (via fiber buildout by telephone comp
https://en.wikipedia.org/wiki/CYP105%20family
Cytochrome P450, family 105, also known as CYP105, is a cytochrome P450 monooxygenase family in bacteria, predominantly found in the phylum Actinomycetota and the order Actinomycetales. The first three genes and subfamilies identified in this family is the herbicide-inducible P-450SU1 (CYP105A1, subfamily A) and P-450SU2 (CYP105B1, subfamily B) from Streptomyces griseolus and choP (CYP105C1, subfamily C) from Streptomyces sps cholesterol oxidase promoter region. Subfamily Application CYP105 enzymes is widely used in industry, such as the production of pravastatin.
https://en.wikipedia.org/wiki/Java%20KeyStore
A Java KeyStore (JKS) is a repository of security certificates either authorization certificates or public key certificates plus corresponding private keys, used for instance in TLS encryption. In IBM WebSphere Application Server and Oracle WebLogic Server, a file with extension jks serves as a keystore. The Java Development Kit maintains a CA keystore file named cacerts in folder jre/lib/security. JDKs provide a tool named keytool to manipulate the keystore. keytool has no functionality to extract the private key out of the keystore, but this is possible with third-party tools like jksExportKey, CERTivity, Portecle and KeyStore Explorer. See also Java Secure Socket Extension Keyring (cryptography) Public key infrastructure
https://en.wikipedia.org/wiki/Ring%20shedding
Ring shedding is a phenomenon in ocean currents where circle or ring-shaped eddies separate from the current. The rings are independent water current systems that can persist for several months and occur in most ocean basins. The separated rings can have both warm or cold cores and play a role in the thermohaline circulation, interocean mixing, and nutrient supply for algae and bacteria. The physical processes behind ring shedding are not fully understood yet and are thus an active subject of research. Process of ring shedding Ring shedding often takes place in the retroflection region, the region where the current loops back, as the retroflection is a condition for ring shedding to take place. The turbulent and dynamic nature of the ocean causes the current loop to sometimes close onto itself and separate ("shed") from the current. This results in an independent ring current that drifts away from the main current. The exact moment a ring is shed from the current is often unclear and the process behind it is still an active subject of research. The topography of the ocean floor and incoming eddies from upstream regions could play a role in ring shedding. Other research indicates that ring shedding is driven by barotropic instabilities. When the retroflection region destabilizes, the loop can separate from the current, forming a ring. Characteristics and observation The process of ring shedding was first described by Fuglisteri in 1972, who observed rings in the Gulf Stream. Since then, ring shedding has been observed in most ocean basins. Typically, the rings have a diameter of , a depth of up to , and a temperature anomaly of a few degrees Celsius. The rings drift slowly ( per day) until they either decay or are reabsorbed by their parent current. There are two main types of rings: cold core rings and warm core rings. The warm cores rings are easy to observe: due to their temperature anomaly satellites can detect them with infrared images. Due to geostrophy (
https://en.wikipedia.org/wiki/Friday%20Harbor%20Laboratories
Friday Harbor Laboratories (FHL), is a marine biology field station of the University of Washington, located in Friday Harbor, San Juan Island, Washington, United States. Friday Harbor Labs is known for its intensive summer classes offered to competitive graduate students from around the world in fields of marine biology and other marine sciences. Autumn and spring academic terms include courses designed for advanced undergraduates as well as graduate students; most spring and fall classes run 10 weeks and feature an original research component. In addition to serving students, Friday Harbor Laboratories has a small resident scientific staff and offers year-round laboratory, library, and housing accommodations for visiting researchers and their families. Research areas include marine algae, marine conservation biology, marine invertebrate zoology, comparative invertebrate embryology, experimental and field approaches in biology and paleontology, functional morphology and ecology of marine fishes, invertebrate larval ecology, and other current topics in marine science and oceanography. FHL was founded in 1904 by University of Washington Zoology Professor Trevor Kincaid, who became its first director. The Green fluorescent protein was discovered at FHL in 1962. There is a sculpture by Julian Voss-Andreae at the campus to commemorate the discovery. In 2004, zoologist Patricia Louise Dudley, who had spent many summers at the Laboratory, created an endowment to support "research or scholarships for the study of systematics, the structure of marine organisms, or for marine invertebrate ecology". She directed that fund recipients spend significant time at Friday Harbor, and added her desire that "findings contribute to the understanding of evolutionary relationships".
https://en.wikipedia.org/wiki/Dany%20Leviatan
Dany Leviatan (; born 21 February 1942) is an Israeli mathematician and former rector of Tel Aviv University. Biography Dany Leviatan completed his B.Sc. and M.Sc. at the Hebrew University of Jerusalem. A participant in the Academic Atuda program, Leviatan served as a mathematician in the Israel Air Force while working on his doctorate at the Hebrew University, which he completed in 1966. Academic career He worked as visiting professor at the University of Illinois at Champaign-Urbana from 1967 to 1970 through the Fulbright Scholarship Program, and became associate professor at Tel Aviv University in 1972. Leviatan served as head of the university's Department of Mathematics from 1972 to 1974, and dean of the Faculty of Exact Sciences from 1976 to 1980. He became head of the recently established School of Mathematics in 1982. Leviatan was appointed rector of Tel Aviv University on 16 August 2005, a position he kept until 2010. He briefly served as acting president of the university following the resignation of Zvi Galil in July 2009. Selected works See also
https://en.wikipedia.org/wiki/Polish%20Soil%20Classification
The Polish Soil Classification () is a soil classification system used to describe, classify and organize the knowledge about soils in Poland. Overview Presented below the 5th edition of Polish Soil Classification was published by Soil Science Society of Poland in 2011 and was in use to 2019 when 6th edition of Polish Soil Classification was published. Previous ones were published in 1956, 1959, 1974 and 1989, and they, following Dokuchaiev's ideas, were relied mostly on the natural's criteria (quality) like soil forming processes and soil morphological features (4th edition was transient because diagnostic soil horizons appeared there). 5th edition of classification, where it was possible, was built on quantitative criteria, like quantitative described diagnostic horizons, diagnostic materials and diagnostic properties. Soil forming processes are not a part of classification but the relationship between the processes and their morphological effects was taken into account during creating differentiating criteria of diagnostic horizons, materials and properties. The classification derives much of international systems: USDA soil taxonomy (1999) and World Reference Base for Soil Resources - WRB (2006). Polish soil science intellectual tradition has always maintained a balance between genetical-geographic approach (typical for the Russian scientific school) and substantional-geological-petrographic approach (characteristic for Western Europe). Multilateral look at the soil manifested, in all editions of classification, that each soil was described by three types of characteristics: Genetical genesis described by type of soil – based on diagnostic horizons, materials and properties, Geological origin of bedrock described by what might be literally translated as "kind" or "sort" of soil, Soil texture described of what might be literally translated as "class" or "species" of soil. The Polish Soil Classification has a hierarchical construction. Type of soil is
https://en.wikipedia.org/wiki/Sleep%20induction
Sleep induction is the deliberate effort to bring on sleep by various techniques or medicinal means, is practiced to lengthen periods of sleep, increase the effectiveness of sleep, and to reduce or prevent insomnia. Darkness and quiet Dim or dark surroundings with a peaceful, quiet sound level are conducive to sleep. Retiring to a bedroom, drawing the curtains to block out daylight and closing the door are common methods of achieving this. When this is not possible, such as on an airplane, other methods may be used, such as masks and earplugs for sleeping which airlines commonly issue to passengers for this purpose. Activities Guided imagery To relax and encourage sleep, a meditation in the form of guided imagery may be used. The stereotypical method is by counting sheep, imagining sheep jumping over a fence, while counting them. In most depictions of the activity, the person envisions an endless series of identical white sheep jumping over a fence, while counting the number that do so. The idea, presumably, is to induce boredom while occupying the mind with something simple, repetitive, and rhythmic, all of which are known to help humans sleep. It may also simulate REM sleep, tiring people's eyes. According to a BBC experiment conducted by researchers at Oxford University, counting sheep is actually an inferior means of inducing sleep. Hot bath The daily sleep/wake cycle is linked to the daily body temperature cycle. For this reason, a hot bath which raises the core body temperature has been found to improve the duration and quality of sleep. A 30-minute soak in a bath of  – which raises the core body temperature by one degree – is suitable for this purpose. A systematic review and meta-analysis of 17 different studies found that taking a warm bath or shower 1–2 hours before bedtime for as little as 10 minutes shortens the sleep onset time and improves sleep efficiency and subjective sleep quality and increases the amount of deep sleep. Sex Sexual interco
https://en.wikipedia.org/wiki/1089%20%28number%29
1089 is the integer after 1088 and before 1090. It is a square number (33 squared), a nonagonal number, a 32-gonal number, a 364-gonal number, and a centered octagonal number. 1089 is the first reverse-divisible number. The next is 2178 , and they are the only four-digit numbers that divide their reverse. In magic 1089 is widely used in magic tricks because it can be "produced" from any two three-digit numbers. This allows it to be used as the basis for a Magician's Choice. For instance, one variation of the book test starts by having the spectator choose any two suitable numbers and then apply some basic maths to produce a single four-digit number. That number is always 1089. The spectator is then asked to turn to page 108 of a book and read the 9th word, which the magician has memorized. To the audience it looks like the number is random, but through manipulation, the result is always the same. In base 10, the following steps always yield 1089: Take any three-digit number where the first and last digits differ by more than 1. Reverse the digits, and subtract the smaller from the larger one. Add to this result the number produced by reversing its digits. For example, if the spectator chooses 237 (or 732): 732 − 237 = 495 495 + 594 = 1089 as expected. On the other hand, if the spectator chooses 102 (or 201): 201 − 102 = 99 99 + 99 ≠ 1089 contradicting the rule. However, if we amend the third rule by reading 99 as a three-digit number 099 and take its reverse, we obtain: 201 − 102 = 099 099 + 990 = 1089 as expected. Explanation The spectator's 3-digit number can be written as 100 × A + 10 × B + 1 × C, and its reversal as 100 × C + 10 × B + 1 × A, where 1 ≤ A ≤ 9, 0 ≤ B ≤ 9 and 1 ≤ C ≤ 9. Their difference is 99 × (A − C) (For convenience, we assume A > C; if A < C, we first swap A and C.). Note that if A − C is 0, the difference is 0, and we do not get a 3-digit number for the next step. If A − C is 1, the difference is 99. Using a leading 0 gi
https://en.wikipedia.org/wiki/Food%20chemistry
Food chemistry is the study of chemical processes and interactions of all biological and non-biological components of foods. The biological substances include such items as meat, poultry, lettuce, beer, milk as examples. It is similar to biochemistry in its main components such as carbohydrates, lipids, and protein, but it also includes areas such as water, vitamins, minerals, enzymes, food additives, flavors, and colors. This discipline also encompasses how products change under certain food processing techniques and ways either to enhance or to prevent them from happening. An example of enhancing a process would be to encourage fermentation of dairy products with microorganisms that convert lactose to lactic acid; an example of preventing a process would be stopping the browning on the surface of freshly cut apples using lemon juice or other acidulated water. History of food chemistry The scientific approach to food and nutrition arose with attention to agricultural chemistry in the works of J. G. Wallerius, Humphry Davy, and others. For example, Davy published Elements of Agricultural Chemistry, in a Course of Lectures for the Board of Agriculture (1813) in the United Kingdom which would serve as a foundation for the profession worldwide, going into a fifth edition. Earlier work included that by Carl Wilhelm Scheele, who isolated malic acid from apples in 1785. Some of the findings of Liebig on food chemistry were translated and published by Eben Horsford in Lowell Massachusetts in 1848. In 1874 the Society of Public Analysts was formed, with the aim of applying analytical methods to the benefit of the public. Its early experiments were based on bread, milk, and wine. It was also out of concern for the quality of the food supply, mainly food adulteration and contamination issues that would first stem from intentional contamination to later with chemical food additives by the 1950s. The development of colleges and universities worldwide, most notably in the Un
https://en.wikipedia.org/wiki/Parallel%20parking%20problem
The parallel parking problem is a motion planning problem in control theory and mechanics to determine the path a car must take to parallel park into a parking space. The front wheels of a car are permitted to turn, but the rear wheels must stay aligned. When a car is initially adjacent to a parking space, to move into the space it would need to move in a direction perpendicular to the allowed path of motion of the rear wheels. The admissible motions of the car in its configuration space are an example of a nonholonomic system. See also Automatic parking Bicycle and motorcycle dynamics Falling cat problem Moving sofa problem
https://en.wikipedia.org/wiki/Submandibular%20triangle
The submandibular triangle (or submaxillary or digastric triangle) corresponds to the region of the neck immediately beneath the body of the mandible. Boundaries and coverings It is bounded: above, by the lower border of the body of the mandible, and a line drawn from its angle to the mastoid process; below, by the posterior belly of the Digastricus; in front, by the anterior belly of the Digastricus. It is covered by the integument, superficial fascia, Platysma, and deep fascia, ramifying in which are branches of the facial nerve and ascending filaments of the cutaneous cervical nerve. Its floor is formed by the Mylohyoideus anteriorly, and by the hyoglossus posteriorly. Triangles Beclard Triangle Lesser Triangle Pirogoff Triangle Divisions It is divided into an anterior and a posterior part by the stylomandibular ligament. Anterior part The anterior part contains the submandibular gland, superficial to which is the anterior facial vein, while imbedded in the gland is the facial artery and its glandular branches. Beneath the gland, on the surface of the Mylohyoideus, are the submental artery and the mylohyoid artery and nerve. Posterior part The posterior part of this triangle contains the external carotid artery, ascending deeply in the substance of the parotid gland This vessel lies here in front of, and superficial to, the external carotid, being crossed by the facial nerve, and gives off in its course the posterior auricular, superficial temporal, and internal maxillary branches: more deeply are the internal carotid, the internal jugular vein, and the vagus nerve, separated from the external carotid by the Styloglossus and Stylopharyngeus, and the hypoglossal nerve See also Anterior triangle of the neck Submandibular space Additional images Summary of contents The following summarizes the important structures found in the submandibular triangle: 1. The external and internal carotid artery 2. The internal jugular vein 3. The deep cervical ly
https://en.wikipedia.org/wiki/Miles%20McMullan
Miles McMullan (born William Niall McMullan, 1 August 1967 in Bangor) is an author, conservationist and naturalist from Northern Ireland, who has made innovative books on neotropical wildlife. Early life McMullan studied at Our Lady and St. Patrick's College, Ulster University and Trinity College, Dublin. He worked as a prize-winning landscape and portrait painter in his early years. He qualified as an editor and worked for several years writing academic texts before concentrating in the wildlife field guides that he has made since 2008. Career as an Author McMullan has specialised in making nature guidebooks for the most diverse countries of tropical South American countries including Venezuela, Colombia and Ecuador, where he has also worked as a naturalist guide, birding tourguide and author. His influential guide to the birds of Colombia was named second best bird book of 2010, second only to the acclaimed Collins Birds of Europe, and Neotropical Bird Club named his guides among the 25 best books of the past 25 years, noting their concise treatment of very large avifaunas. His Colombia book, with over 5000 illustrations and 2000 range distribution maps has been described as among the largest books ever made by a single author/illustrator. His books marked a divergence from the style used in previous national guidebooks. Titles His titles include Field Guide to the Birds of Colombia (with Thomas Donegan) (2010, updates in 2014 and 2018), Fieldbook of the Birds of Ecuador (with Lelis Navarrete) (2013, updated 2017), Field Guide to the Hummingbirds (2016), Field Guide to the Galapagos Islands (2017), Birds of the Colombian Andes (2019), Birds of Meta and the Colombian Llanos (2019), Birds of the Western Cordillera (2019), Birds and Common Mammals of Ecuadorian Amazon (with Andrés Vásquez) (2012), Birds of Northwest Ecuador (with Andrés Vásquez) and many other titles such as regional and reserve guides. He has published many smaller guidebooks and has spoken
https://en.wikipedia.org/wiki/Amenable%20number
An amenable number is a positive integer for which there exists a multiset of as many integers as the original number that both add up to the original number and when multiplied together give the original number. To put it algebraically, for a positive integer n, there is a multiset of n integers {a1, ..., an}, for which the equalities hold. Negative numbers are allowed in the multiset. For example, 5 is amenable since 5 = 1 + (-1) + 1 + (-1) + 5. All and only those numbers congruent to 0 or 1 (mod 4), except 4, are amenable. The first few amenable numbers are: 1, 5, 8, 9, 12, 13 ... A solution for integers of the form n = 4k + 1 could be given by a set of 2k (+1)s and 2k (-1)s and n itself. (This generalizes the example of 5 given above.) Although not obvious from the definition, the set of amenable numbers is closed under multiplication (the product of two amenable numbers is an amenable number). All composite numbers would be amenable if the multiset was allowed to be of any length, because, even if other solutions are available, one can always obtain a solution by taking the prime factorization (expressed with repeated factors rather than exponents) and add as many 1s as necessary to add up to n. The product of this set of integers will yield n no matter how many 1s there are in the set. Furthermore, still under this assumption, any integer n would be amenable. Consider the inelegant solution for n of }. In the sum, the positive ones are cancelled out by the negative ones, leaving n, while in the product, the two negative ones cancel out the effect of their signs. Amenable numbers should not be confused with amicable numbers, which are pairs of integers whose divisors add up to each other.
https://en.wikipedia.org/wiki/Honoured%20Doctor%20of%20the%20People
Honoured Doctor of the People () was the highest honorary title awarded to physicians in East Germany. It was given in form of a medal. The title was stablished on 31 March 1949 and awarded every year on 11 December, the birthday of Robert Koch. Sources Bundesministerium für innerdeutsche Beziehungen (Hrsg.): DDR-Handbuch, Auszeichnungen, Verlag Wissenschaft und Politik, 1985, S. 26 und 29, . Andreas Herbst, Winfried Ranke, Jürgen R. Winkler: So funktionierte die DDR, Lexikon der Organisationen und Institutionen; Gesundheitswesen, Rowohlt Taschenbuch, 1994, . Honorary titles Medicine awards Awards established in 1949 1949 establishments in East Germany Orders, decorations, and medals of East Germany
https://en.wikipedia.org/wiki/Ben%20Munk
Benedikt "Ben" Aage Munk (December 3, 1929 – March 13, 2009) was professor of electrical engineering at the ElectroScience Laboratory (ESL) at The Ohio State University (OSU), Columbus, Ohio, US. Munk is best known for his contributions to the field of applied electromagnetic, especially periodic surfaces (also known as metasurfaces) and antenna arrays. He is the author of many papers on periodic surfaces and antennas, as well as two key books. The most significant work are the "Finite Antenna Arrays and FSS" in which he discusses the design of the ultra wide band tightly coupled dipole antenna array and "Frequency Selective Surfaces: Theory and Design". Unlike other antenna books that heavily emphasize theory and mathematics, Munk's approach is based on intuitive understanding and engineering aspects of the subjects. He had contributed two chapters to the third edition of John Kraus' classic book, "Antennas for All Applications", published in 2002. His last book publication is named "Metamaterials: Critique and Alternatives" which was published in 2009 by Wiley. In this books he argues against negative permittivity/permeability meta-materials and cloaking. According to his own words and Vita published alongside his dissertation, Munk graduated from a high school in Denmark in 1948. Afterwards he studied Electrical Engineering at the Technical University of Denmark also known as The Polytechnic Institute of Denmark and obtained master's degree in 1954. From 1954 to 1957 he as s with the Royal Danish Navy as a Lieutenant and antenna/radar engineer. He was an assistant group leader at Rohde and Schwarz in Munich, Germany developing antennas (1957-59). Munk was a chief designer for A/S Nordisk Antenne Fabrik, Denmark and worked with antennas, centralized antenna systems, and filters from 1959-60. From 1960 to 1963, he was a research and development engineer with the Andrew Corporation, Chicago, Illinois, working with antennas. Later on, from 1963-64, he was an anten
https://en.wikipedia.org/wiki/List%20of%20search%20engine%20software
Presented below is a list of search engine software. Commercial Free See also Search appliance Bilingual search engine Content discovery platform Document retrieval Incremental search Web crawler search engine
https://en.wikipedia.org/wiki/Mott%20problem
The Mott problem is an iconic challenge to quantum mechanics theory: how can the prediction of spherically symmetric wave function result in linear tracks seen in a cloud chamber. The problem was first formulated in 1927 by Albert Einstein and Max Born and solved in 1929 by Nevill Francis Mott Mott's solution notably only uses the wave equation, not wavefunction collapse, and it is considered the earliest example of what is now called decoherence theory. Spherical waves, particle tracks The problem later associated with Mott concerns a spherical wave function associated with an alpha ray emitted from the decay of a radioactive atomic nucleus. Intuitively, one might think that such a wave function should randomly ionize atoms throughout the cloud chamber, but this is not the case. The result of such a decay is always observed as linear tracks seen in Wilson's cloud chamber. The origin of the tracks given the original spherical wave predicted by theory is the problem requiring physical explanation. In practice, virtually all high energy physics experiments, such as those conducted at particle colliders, involve wave functions which are inherently spherical. Yet, when the results of a particle collision are detected, they are invariably in the form of linear tracks (see, for example, the illustrations accompanying the article on bubble chambers). It is somewhat strange to think that a spherically symmetric wave function should be observed as a straight track, and yet, this occurs on a daily basis in all particle collider experiments. History The problem of alpha particle track was discussed at the Fifth Solvay conference in 1927. Max Born described the problem as one that Albert Einstein pointed to, asking "how can the corpuscular character of the phenomenon be reconciled here with the representation by waves?". Born answers with Heisenberg's "reduction of the probability packet", now called wavefunction collapse, introduced in May of 1927. Born says each droplet
https://en.wikipedia.org/wiki/Lachlathetes%20gigas
Lachlathetes gigas is a species of antlions in the subfamily Palparinae. It is native to Gabon, Guinea and Sierra Leone. The species was named by Dalman in 1823, based on an insect figured by Dru Drury as a variety of Myrmeleon libelluloides. Description Antennae black, slender, and thickest at the extremities. Head, neck, and thorax yellowish brown, with a black longitudinal stripe running along the middle. Four palpi, two of which are short; the other two long, slender, and knobbed at the extremities. Thorax nearly covered with grey hairs. Abdomen yellowish brown in preserved specimens (probably green when living). Wings of equal length, the anterior being broadest, all marked with a great number of red-brown spots, and clouds of various shapes and sizes, and appearing to be composed of fine lattice-work like gauze, and perfectly transparent where they are not clouded. Legs nearly of equal length, having two strong tibial spurs. Wing-span 6¾ inches (170 mm).
https://en.wikipedia.org/wiki/Proper%20motion
Proper motion is the astrometric measure of the observed changes in the apparent places of stars or other celestial objects in the sky, as seen from the center of mass of the Solar System, compared to the abstract background of the more distant stars. The components for proper motion in the equatorial coordinate system (of a given epoch, often J2000.0) are given in the direction of right ascension (μα) and of declination (μδ). Their combined value is computed as the total proper motion (μ). It has dimensions of angle per time, typically arcseconds per year or milliarcseconds per year. Knowledge of the proper motion, distance, and radial velocity allows calculations of an object's motion from the Solar System's frame of reference and its motion from the galactic frame of reference – that is motion in respect to the Sun, and by coordinate transformation, that in respect to the Milky Way. Introduction Over the course of centuries, stars appear to maintain nearly fixed positions with respect to each other, so that they form the same constellations over historical time. Ursa Major or Crux, for example, look nearly the same now as they did hundreds of years ago. However, precise long-term observations show that the constellations change shape, albeit very slowly, and that each star has an independent motion. This motion is caused by the movement of the stars relative to the Sun and Solar System. The Sun travels in a nearly circular orbit (the solar circle) about the center of the galaxy at a speed of about 220 km/s at a radius of from Sagittarius A* which can be taken as the rate of rotation of the Milky Way itself at this radius. Any proper motion is a two-dimensional vector (as it excludes the component as to the direction of the line of sight) and it bears two quantities or characteristics: its position angle and its magnitude. The first is the direction of the proper motion on the celestial sphere (with 0 degrees meaning the motion is north, 90 degrees meaning
https://en.wikipedia.org/wiki/Maillet%27s%20determinant
In mathematics, Maillet's determinant Dp is the determinant of the matrix introduced by whose entries are R(s/r) for s,r = 1, 2, ..., (p – 1)/2 ∈ Z/pZ for an odd prime p, where and R(a) is the least positive residue of a mod p . calculated the determinant Dp for p = 3, 5, 7, 11, 13 and found that in these cases it is given by (–p)(p – 3)/2, and conjectured that it is given by this formula in general. showed that this conjecture is incorrect; the determinant in general is given by Dp = (–p)(p – 3)/2h−, where h− is the first factor of the class number of the cyclotomic field generated by pth roots of 1, which happens to be 1 for p less than 23. In particular, this verifies Maillet's conjecture that the determinant is always non-zero. Chowla and Weil had previously found the same formula but did not publish it. Their results have been extended to all non-prime odd numbers by K. Wang(1982).
https://en.wikipedia.org/wiki/Alan%20Kotok
Alan Kotok (November 9, 1941 – May 26, 2006) was an American computer scientist known for his work at Digital Equipment Corporation (Digital, or DEC) and at the World Wide Web Consortium (W3C). Steven Levy, in his book Hackers: Heroes of the Computer Revolution, describes Kotok and his classmates at the Massachusetts Institute of Technology (MIT) as the first true hackers. Kotok was a precocious child who skipped two grades before college. At MIT, he became a member of the Tech Model Railroad Club, and after enrolling in MIT's first freshman programming class, he helped develop some of the earliest computer software including a digital audio program and what is sometimes called the first video game (Spacewar!). Together with his teacher John McCarthy and other classmates, he was part of the team that wrote the Kotok-McCarthy program which took part in the first chess match between computers. After leaving MIT, Kotok joined the computer manufacturer Digital Equipment Corporation (DEC), where he worked for over 30 years. He was the chief architect of the PDP-10 family of computers, and created the company's Internet Business Group, responsible for several forms of Web-based technology including the first popular search engine. Kotok is known for his contributions to the Internet and to the World Wide Web through his work at the World Wide Web Consortium, which he and Digital had helped to found, and where he served as associate chairman. Personal life Alan Kotok was born in Philadelphia, Pennsylvania, and was raised as an only child in Vineland, New Jersey. During his childhood, he played with tools in his father's hardware store and learned model railroading. He was a precocious child, skipping two grades at high school, and he matriculated at Massachusetts Institute of Technology (MIT) at the age of 16 in the fall of 1958 and an MBA from Clark University in 1978. Although his interest in computers began at Vineland High School, his first practical experience of c
https://en.wikipedia.org/wiki/Customer%20service
Customer service is the assistance and advice provided by a company to those people who buy or use its products or services. Each industry requires different levels of customer service, but towards the end, the idea of a well-performed service is that of increasing revenues. The perception of success of the customer service interactions is dependent on employees "who can adjust themselves to the personality of the customer". Customer service is often practiced in a way that reflects the strategies and values of a firm. Good quality customer service is usually measured through customer retention. Customer service for some firms is part of the firm’s intangible assets and can differentiate it from others in the industry. One good customer service experience can change the entire perception a customer holds towards the organization. Customer service does not only focus on the external aspect of the organization, but also the internal relations that facilitate the business activity. For service firms, customer service plays a vital role due to the close interaction with clients, as in the healthcare or legal industries.[2] When close interaction is not required, there are different methods to provide individuals with a sense of attention. For instance, when withdrawing money from an ATM or skipping the line in an amusement park. Customers still receive the service they are looking for in a direct level without face-to-face interaction. The evolution in the service industry has identified the needs of consumers. Companies usually create policies or standards to guide their personnel to follow their particular service package. A service package is a combination of tangible and intangible characteristics a firm uses to take care of its clients. Customer support Customer support is a range of consumer services to assist customers in making cost-effective and correct use of a product. It includes assistance in planning, installation, training, troubleshooting, maintenanc
https://en.wikipedia.org/wiki/Extensible%20Authentication%20Protocol
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in , which made obsolete, and is updated by . EAP is an authentication framework for providing the transport and usage of material and parameters generated by EAP methods. There are many methods defined by RFCs, and a number of vendor-specific methods and new proposals exist. EAP is not a wire protocol; instead it only defines the information from the interface and the formats. Each protocol that uses EAP defines a way to encapsulate by the user EAP messages within that protocol's messages. EAP is in wide use. For example, in IEEE 802.11 (WiFi) the WPA and WPA2 standards have adopted IEEE 802.1X (with various EAP types) as the canonical authentication mechanism. Methods EAP is an authentication framework, not a specific authentication mechanism. It provides some common functions and negotiation of authentication methods called EAP methods. There are currently about 40 different methods defined. Methods defined in IETF RFCs include EAP-MD5, EAP-POTP, EAP-GTC, EAP-TLS, EAP-IKEv2, EAP-SIM, EAP-AKA, and EAP-AKA'. Additionally, a number of vendor-specific methods and new proposals exist. Commonly used modern methods capable of operating in wireless networks include EAP-TLS, EAP-SIM, EAP-AKA, LEAP and EAP-TTLS. Requirements for EAP methods used in wireless LAN authentication are described in . The list of type and packets codes used in EAP is available from the IANA EAP Registry. The standard also describes the conditions under which the AAA key management requirements described in can be satisfied. Lightweight Extensible Authentication Protocol (LEAP) The Lightweight Extensible Authentication Protocol (LEAP) method was developed by Cisco Systems prior to the IEEE ratification of the 802.11i security standard. Cisco distributed the protocol through the CCX (Cisco Certified Extensions) as part of getting 802.1X and dynamic WEP ad
https://en.wikipedia.org/wiki/Poor%20Richard%27s%20Almanack
Poor Richard's Almanack (sometimes Almanac) was a yearly almanac published by Benjamin Franklin, who adopted the pseudonym of "Poor Richard" or "Richard Saunders" for this purpose. The publication appeared continually from 1732 to 1758. It sold exceptionally well for a pamphlet published in the Thirteen Colonies; print runs reached 10,000 per year. Franklin, the American inventor, statesman, and accomplished publisher and printer, achieved success with Poor Richard's Almanack. Almanacks were very popular books in colonial America, offering a mixture of seasonal weather forecasts, practical household hints, puzzles, and other amusements. Poor Richard's Almanack was also popular for its extensive use of wordplay, and some of the witty phrases coined in the work survive in the contemporary American vernacular. History On December 28, 1732, Benjamin Franklin announced in The Pennsylvania Gazette that he had just printed and published the first edition of The Poor Richard, by Richard Saunders, Philomath. Franklin published the first Poor Richard's Almanack on December 28, 1732, and continued to publish new editions for 25 years, bringing him much economic success and popularity. The almanack sold as many as 10,000 copies a year. In 1735, upon the death of Franklin's brother, James, Franklin sent 500 copies of Poor Richard's to his widow for free, so that she could make money selling them. Contents The Almanack contained the calendar, weather, poems, sayings and astronomical and astrological information that a typical almanac of the period would contain. Franklin also included the occasional mathematical exercise, and the Almanack from 1750 features an early example of demographics. It is chiefly remembered, however, for being a repository of Franklin's aphorisms and proverbs, many of which live on in American English. These maxims typically counsel thrift and courtesy, with a dash of cynicism. In the spaces that occurred between noted calendar days, Franklin included
https://en.wikipedia.org/wiki/Volumetric%20flux
In fluid dynamics, the volumetric flux is the rate of volume flow across a unit area (m3·s−1·m−2), and has dimensions of distance/time (volume/(time*area)) - equivalent to mean velocity. The density of a particular property in a fluid's volume, multiplied with the volumetric flux of the fluid, thus defines the advective flux of that property. The volumetric flux through a porous medium is often modelled using Darcy's law. Volumetric flux is not to be confused with volumetric flow rate, which is the volume of fluid that passes through a given surface per unit of time (as opposed to a unit surface).
https://en.wikipedia.org/wiki/Pediatric%20pathology
Pediatric pathology is the sub-specialty of surgical pathology which deals with the diagnosis and characterization of neoplastic and non-neoplastic diseases of children. The duties of pediatric pathologists can be divided into two categories: the examination of tissue samples, and the performing autopsies and placental examinations.
https://en.wikipedia.org/wiki/Shor%27s%20algorithm
Shor's algorithm is a quantum algorithm for finding the prime factors of an integer. It was developed in 1994 by the American mathematician Peter Shor. It is one of the few known quantum algorithms with compelling potential applications and strong evidence of superpolynomial speedup compared to best known classical (that is, non-quantum) algorithms. On the other hand, factoring numbers of practical significance requires far more qubits than available in the near future. Another concern is that noise in quantum circuits may undermine results, requiring additional qubits for quantum error correction. Shor proposed multiple similar algorithms solving the factoring problem, the discrete logarithm problem, and the period finding problem. "Shor's algorithm" usually refers to his algorithm solving factoring, but may also refer to each of the three. The discrete logarithm algorithm and the factoring algorithm are instances of the period finding algorithm, and all three are instances of the hidden subgroup problem. On a quantum computer, to factor an integer , Shor's algorithm runs in polynomial time, meaning the time taken is polynomial in , the size of the integer given as input. Specifically, it takes quantum gates of order using fast multiplication, or even utilizing the asymptotically fastest multiplication algorithm currently known due to Harvey and Van Der Hoven, thus demonstrating that the integer factorization problem can be efficiently solved on a quantum computer and is consequently in the complexity class BQP. This is significantly faster than the most efficient known classical factoring algorithm, the general number field sieve, which works in sub-exponential time: . Feasibility and impact If a quantum computer with a sufficient number of qubits could operate without succumbing to quantum noise and other quantum-decoherence phenomena, then Shor's algorithm could be used to break public-key cryptography schemes, such as The RSA scheme The Finite Field D
https://en.wikipedia.org/wiki/Log-structured%20file%20system
A log-structured filesystem is a file system in which data and metadata are written sequentially to a circular buffer, called a log. The design was first proposed in 1988 by John K. Ousterhout and Fred Douglis and first implemented in 1992 by Ousterhout and Mendel Rosenblum for the Unix-like Sprite distributed operating system. Rationale Conventional file systems tend to lay out files with great care for spatial locality and make in-place changes to their data structures in order to perform well on optical and magnetic disks, which tend to seek relatively slowly. The design of log-structured file systems is based on the hypothesis that this will no longer be effective because ever-increasing memory sizes on modern computers would lead to I/O becoming write-heavy because reads would be almost always satisfied from memory cache. A log-structured file system thus treats its storage as a circular log and writes sequentially to the head of the log. This has several important side effects: Write throughput on optical and magnetic disks is improved because they can be batched into large sequential runs and costly seeks are kept to a minimum. The structure is naturally suited to media with append-only zones or pages such as flash storages and shingled magnetic recording HDDs Writes create multiple, chronologically-advancing versions of both file data and meta-data. Some implementations make these old file versions nameable and accessible, a feature sometimes called time-travel or snapshotting. This is very similar to a versioning file system. Recovery from crashes is simpler. Upon its next mount, the file system does not need to walk all its data structures to fix any inconsistencies, but can reconstruct its state from the last consistent point in the log. Log-structured file systems, however, must reclaim free space from the tail of the log to prevent the file system from becoming full when the head of the log wraps around to meet it. The tail can release spa
https://en.wikipedia.org/wiki/Quantum%20rotor%20model
The quantum rotor model is a mathematical model for a quantum system. It can be visualized as an array of rotating electrons which behave as rigid rotors that interact through short-range dipole-dipole magnetic forces originating from their magnetic dipole moments (neglecting Coulomb forces). The model differs from similar spin-models such as the Ising model and the Heisenberg model in that it includes a term analogous to kinetic energy. Although elementary quantum rotors do not exist in nature, the model can describe effective degrees of freedom for a system of sufficiently small number of closely coupled electrons in low-energy states. Suppose the n-dimensional position (orientation) vector of the model at a given site is . Then, we can define rotor momentum by the commutation relation of components However, it is found convenient to use rotor angular momentum operators defined (in 3 dimensions) by components Then, the magnetic interactions between the quantum rotors, and thus their energy states, can be described by the following Hamiltonian: where are constants.. The interaction sum is taken over nearest neighbors, as indicated by the angle brackets. For very small and very large , the Hamiltonian predicts two distinct configurations (ground states), namely "magnetically" ordered rotors and disordered or "paramagnetic" rotors, respectively. The interactions between the quantum rotors can be described by another (equivalent) Hamiltonian, which treats the rotors not as magnetic moments but as local electric currents. Properties One of the important features of the rotor model is the continuous O(N) symmetry, and hence the corresponding continuous symmetry breaking in the magnetically ordered state. In a system with two layers of Heisenberg spins and , the rotor model approximates the low-energy states of a Heisenberg antiferromagnet, with the Hamiltonian using the correspondence The particular case of quantum rotor model which has the O(2) symmetr
https://en.wikipedia.org/wiki/Batch%20file
A batch file is a script file in DOS, OS/2 and Microsoft Windows. It consists of a series of commands to be executed by the command-line interpreter, stored in a plain text file. A batch file may contain any command the interpreter accepts interactively and use constructs that enable conditional branching and looping within the batch file, such as IF, FOR, and GOTO labels. The term "batch" is from batch processing, meaning "non-interactive execution", though a batch file might not process a batch of multiple data. Similar to Job Control Language (JCL), DCL and other systems on mainframe and minicomputer systems, batch files were added to ease the work required for certain regular tasks by allowing the user to set up a script to automate them. When a batch file is run, the shell program (usually COMMAND.COM or cmd.exe) reads the file and executes its commands, normally line-by-line. Unix-like operating systems, such as Linux, have a similar, but more flexible, type of file called a shell script. The filename extension .bat is used in DOS and Windows. Windows NT and OS/2 also added .cmd. Batch files for other environments may have different extensions, e.g., .btm in 4DOS, 4OS2 and 4NT related shells. The detailed handling of batch files has changed significantly between versions. Some of the detail in this article applies to all batch files, while other details apply only to certain versions. Variants DOS In MS-DOS, a batch file can be started from the command-line interface by typing its name, followed by any required parameters and pressing the key. When DOS loads, the file AUTOEXEC.BAT, when present, is automatically executed, so any commands that need to be run to set up the DOS environment may be placed in this file. Computer users would have the AUTOEXEC.BAT file set up the system date and time, initialize the DOS environment, load any resident programs or device drivers, or initialize network connections and assignments. A .bat file name extension identi
https://en.wikipedia.org/wiki/Asymptotic%20gain%20model
The asymptotic gain model (also known as the Rosenstark method) is a representation of the gain of negative feedback amplifiers given by the asymptotic gain relation: where is the return ratio with the input source disabled (equal to the negative of the loop gain in the case of a single-loop system composed of unilateral blocks), G∞ is the asymptotic gain and G0 is the direct transmission term. This form for the gain can provide intuitive insight into the circuit and often is easier to derive than a direct attack on the gain. Figure 1 shows a block diagram that leads to the asymptotic gain expression. The asymptotic gain relation also can be expressed as a signal flow graph. See Figure 2. The asymptotic gain model is a special case of the extra element theorem. As follows directly from limiting cases of the gain expression, the asymptotic gain G∞ is simply the gain of the system when the return ratio approaches infinity: while the direct transmission term G0 is the gain of the system when the return ratio is zero: Advantages This model is useful because it completely characterizes feedback amplifiers, including loading effects and the bilateral properties of amplifiers and feedback networks. Often feedback amplifiers are designed such that the return ratio T is much greater than unity. In this case, and assuming the direct transmission term G0 is small (as it often is), the gain G of the system is approximately equal to the asymptotic gain G∞. The asymptotic gain is (usually) only a function of passive elements in a circuit, and can often be found by inspection. The feedback topology (series-series, series-shunt, etc.) need not be identified beforehand as the analysis is the same in all cases. Implementation Direct application of the model involves these steps: Select a dependent source in the circuit. Find the return ratio for that source. Find the gain G∞ directly from the circuit by replacing the circuit with one corresponding to T = ∞. Find the ga
https://en.wikipedia.org/wiki/Orphan%20drug
An orphan drug is a pharmaceutical agent that is developed to treat certain rare medical conditions. An orphan drug would not be profitable to produce without government assistance, due to the small population of patients affected by the conditions. The conditions that orphan drugs are used to treat are referred to as orphan diseases. The assignment of orphan status to a disease and to drugs developed to treat it is a matter of public policy that depends on the legislation (if there is any) of the country. Designation of a drug as an orphan drug has yielded medical breakthroughs that might not otherwise have been achieved, due to the economics of drug research and development. Examples of this can be that in the U.S. and the EU, it is easier to gain marketing approval for an orphan drug. There may be other financial incentives, such as an extended period of exclusivity, during which the producer has sole rights to market the drug. All are intended to encourage development of drugs which would otherwise lack sufficient profit motive to attract corporate research budgets and personnel. Definition United States According to the US Food and Drug Administration (FDA), an orphan drug is defined as one "intended for the treatment, prevention or diagnosis of a rare disease or condition, which is one that affects less than 200,000 persons in the US" (which equates to approximately 6 cases per 10,000 population) "or meets cost recovery provisions of the act". Europe In the European Union (EU), the European Medicines Agency (EMA) defines a drug as "orphan" if it is intended for the diagnosis, prevention or treatment of a life-threatening or chronically and seriously debilitating condition affecting not more than 5 in 10,000 EU people. EMA also qualifies a drug as orphan if – without incentives – it would be unlikely that marketing the drug in the EU would generate sufficient benefit for the affected people and for the drug manufacturer to justify the investment. Japan
https://en.wikipedia.org/wiki/IBM%20801
The 801 was an experimental central processing unit (CPU) design developed by IBM during the 1970s. It is considered to be the first modern RISC design, relying on processor registers for all computations and eliminating the many variant addressing modes found in CISC designs. Originally developed as the processor for a telephone switch, it was later used as the basis for a minicomputer and a number of products for their mainframe line. The initial design was a 24-bit processor; that was soon replaced by 32-bit implementations of the same concepts and the original 24-bit 801 was used only into the early 1980s. The 801 was extremely influential in the computer market. Armed with huge amounts of performance data, IBM was able to demonstrate that the simple design was able to easily outperform even the most powerful classic CPU designs, while at the same time producing machine code that was only marginally larger than the heavily optimized CISC instructions. Applying these same techniques even to existing processors like the System/370 generally doubled the performance of those systems as well. This demonstrated the value of the RISC concept, and all of IBM's future systems were based on the principles developed during the 801 project. For his work on the 801, John Cocke was recognized with several awards and medals, including the Turing Award in 1987, National Medal of Technology in 1991, and the National Medal of Science in 1994. History Original concept In 1974, IBM began examining the possibility of constructing a telephone switch to handle one million calls an hour, or about 300 calls per second. They calculated that each call would require 20,000 instructions to complete, and when one added timing overhead and other considerations, such a machine required performance of about 12 MIPS. This would require a significant advance in performance; their current top-of-the-line machine, the IBM System/370 Model 168 of late 1972, offered about 3 MIPS. The group worki
https://en.wikipedia.org/wiki/%CE%91-Ketovaleric%20acid
α-Ketovaleric acid is a keto acid that is found in human blood. Unlike related keto acids, it is not an intermediate or metabolite associated with amino acids and its origin is unknown. See also α-Ketoisovaleric acid 3-Oxopentanoic acid (β-ketovaleric acid) Levulinic acid (γ-ketovaleric acid)
https://en.wikipedia.org/wiki/List%20of%20population%20related%20meta%20concepts%20and%20meta%20lists
Outline of demography contains human demography and population related important concepts and high-level aggregated lists compiled in the useful categories. The subheadings have been grouped by the following 4 categories: Meta (lit. "highest" level) units, such as the universal important concepts related to demographics and places. Macro (lit. "high" level) units where the "whole world" is the smallest unit of measurement, such as the aggregated summary demographics at global level. For example, United Nations. Meso (lit. "middle" or "intermediate" level) units where the smallest unit of measurement cover more than one nation and more than one continent but not all the nations or continents. For example, summary list at continental level, e.g. Eurasia and Latin America or Middle East which cover two or more continents. Other examples include the intercontinental organisations e.g. the Commonwealth of Nations or the organisation of Arab states. Micro (lit. "lower" or "smaller") level units where country is the smallest unit of measurement, such as the "globally aggregated lists" by the "individual countries" . Please do not add sections on the items that are the nano (lit. "minor" or "tiny") level units as per the context described above, e.g. list of things within a city must be kept out. Meta or important concepts Global human population World population Demographics of the world Fertility and intelligence Human geography Geographic mobility Globalization Human migration List of lists on linguistics Impact of human population Human impact on the environment Biological dispersal Carrying capacity Doomsday argument Environmental migrant Human overpopulation Malthusian catastrophe List of countries by carbon dioxide emissions List of countries by carbon dioxide emissions per capita List of countries by greenhouse gas emissions List of countries by greenhouse gas emissions per capita Overconsumption Overexploitation Population eco
https://en.wikipedia.org/wiki/Idiopathic%20chronic%20fatigue
Idiopathic chronic fatigue (ICF) or chronic idiopathic fatigue or insufficient/idiopathic fatigue is characterized by unexplained fatigue that lasts at least six consecutive months. which does not meet the criteria for chronic fatigue syndrome. It is widely understood to have a profound effect on the lives of patients who experience it. ICF is a common illness of unknown origin, and remains poorly understood. Classification Idiopathic chronic fatigue does not have its dedicated diagnostic code in the World Health Organization's ICD-11 classification. ICF is defined as a physical medical condition of unknown origin where CFS symptoms are not met, and because the World Health Organization does not recognize any kind of fatigue-based psychiatric illness (unless it is accompanied by related psychiatric symptoms), this means that only the fatigue codes in the physical symptoms category of the ICD can be used. MG22 (Fatigue) and R53.8 (Other malaise and fatigue) codes in the ICD-11 and ICD-10 respectively both allow ICF to be coded as fatigue or unspecified chronic fatigue, and are used when no more specific codes exist. These codes help distinguish ICF from many other forms of fatigue including cancer-related fatigue, chronic fatigue syndrome, fatigue due to depression, fatigue due to old age, weakness/asthenia, and in the ICD-10, also from fatigue lasting under 6 months. The ICD-11 MG22 Fatigue code is also shared with lethargy, and exhaustion, which may not be as long lasting. Diagnosis ICF is fatigue of unknown origin, persisting or relapsing for a minimum of six consecutive months, and failing to meet the criteria for chronic fatigue syndrome. There are no agreed upon international criteria for idiopathic chronic fatigue, however the CDC's 1994 Idiopathic Chronic Fatigue criteria, known as the Fukuda ICF criteria, are commonly used. Differential diagnosis Differences from chronic fatigue ICF differs from chronic fatigue since it is unexplained rather than link
https://en.wikipedia.org/wiki/Evolution%20by%20gene%20duplication
Evolution by gene duplication is an event by which a gene or part of a gene can have two identical copies that can not be distinguished from each other. This phenomenon is understood to be an important source of novelty in evolution, providing for an expanded repertoire of molecular activities. The underlying mutational event of duplication may be a conventional gene duplication mutation within a chromosome, or a larger-scale event involving whole chromosomes (aneuploidy) or whole genomes (polyploidy). A classic view, owing to Susumu Ohno, which is known as Ohno model, he explains how duplication creates redundancy, the redundant copy accumulates beneficial mutations which provides fuel for innovation. Knowledge of evolution by gene duplication has advanced more rapidly in the past 15 years due to new genomic data, more powerful computational methods of comparative inference, and new evolutionary models. Theoretical models Several models exist that try to explain how new cellular functions of genes and their encoded protein products evolve through the mechanism of duplication and divergence. Although each model can explain certain aspects of the evolutionary process, the relative importance of each aspect is still unclear. This page only presents which theoretical models are currently discussed in the literature. Review articles on this topic can be found at the bottom. In the following, a distinction will be made between explanations for the short-term effects (preservation) of a gene duplication and its long-term outcomes. Preservation of gene duplicates Since a gene duplication occurs in only one cell, either in a single-celled organism or in the germ cell of a multi-cellular organism, its carrier (i.e. the organism) usually has to compete against other organisms that do not carry the duplication. If the duplication disrupts the normal functioning of an organism, the organism has a reduced reproductive success (or low fitness) compared to its competitors
https://en.wikipedia.org/wiki/Matt%20Parker
Matthew Thomas Parker (born 22 December 1980) is an Australian recreational mathematician, author, comedian, YouTube personality and science communicator based in the United Kingdom. His book Humble Pi was the first maths book in the UK to be a Sunday Times No. 1 bestseller. Parker was the Public Engagement in Mathematics Fellow at Queen Mary University of London. He is a former maths teacher and has helped popularise maths via his tours and videos. Early life and education Matt Parker was born in Perth, Australia, and grew up in the northern suburb of Duncraig. He began showing an interest in maths and science from a young age, and at one point was part of his school's titration team. Parker went to the University of Western Australia and started off studying mechanical engineering before he "realized the very real risk of being employable at the end of it." He switched into physics and later mathematics. His love of maths led him to want a job in the subject. While at university, Parker wrote comedy for Pelican, the students' magazine, and produced comedy sketches. Having become interested in comedy, he enrolled on course for stand-up. Career After college, Parker taught maths in Australia for a while before moving to London and continuing teaching. He became involved in support education, working with universities and other organizations to arrange maths talks. He later went back to teaching, before stopping after one year. He now helps students communicate mathematics to other people, speaks at schools, does media work, and occasionally writes about maths. His goal is "to get more people more excited about maths." Parker has appeared in numerous YouTube videos, talking about various subjects related to mathematics. He has his own YouTube channel, "Stand-up Maths", with over one million subscribers, and also frequently appears as a guest on other popular channels such as Brady Haran's Numberphile and James May's Head Squeeze (now BritLab). Parker has made
https://en.wikipedia.org/wiki/Psc%20%28military%29
psc is a post-nominal for Post Staff College (formally Passed Staff College) in the Commonwealth militaries of Bangladesh, India, New Zealand, Pakistan, Sri Lanka and the United Kingdom. It indicates that an officer has undertaken the staff officer course at a staff college. United Kingdom The practice originated in the British Army where the initials psc appeared in the service lists denoting that the officer had attended the Staff College, Camberley. Royal Navy officers who attended the staff course at Royal Naval College, Greenwich and RAF officers who attended the RAF Staff College, Bracknell also used the qualification. Since the 1997 amalgamation of staff training officers now receive the letters psc(j) from the Joint Services Command and Staff College as Post Staff College (Joint)(United Kingdom) (psc(j)(UK)) after completing the Advanced Command and Staff Course. British officers also receive the letters psc(nation) or psc(j)(nation) from attendance at overseas staff colleges, where the (nation) is substituted for the NATO abbreviation of that country, i,e, attendance at the French 'l'Ecole de Guerre' results in psc(j)(FRA). Bangladesh PSC is used for Bangladeshi Armed Forces officers who have attended the Defence Services Command & Staff College (DSCSC), Bangladesh.The College is well acclaimed internationally as a centre of excellence for study on subjects of contemporary military interest and has so far graduated over 5979 officers including 1300+ officers from 44 different countries. India Initials psc is used by officers who attended the Defence Services Staff College, Wellington. Pakistan In Pakistan initials psc is used by officers who attended the Pakistan Command and Staff College, Quetta. Malaysia Officers graduated from the Malaysian Armed Forces Staff College, Kuala Lumpur use the initials psc. Namibia Officers who graduate from the Senior Command and Staff Course at the Namibia Command and Staff College use the initials psc. New Zealand
https://en.wikipedia.org/wiki/Intercavernous%20sinuses
The intercavernous sinuses are two in number, an anterior and a posterior, and connect the two cavernous sinuses across the middle line. The anterior passes in front of the hypophysis cerebri (pituitary gland), the posterior behind it, and they form with the cavernous sinuses a venous circle (circular sinus) around the hypophysis. The anterior one is usually the larger of the two, and one or other is occasionally absent.
https://en.wikipedia.org/wiki/GeForce%20500%20series
A refresh of the Fermi based GeForce 400 series, the GeForce 500 series is a series of graphics processing units developed by Nvidia, first released on November 9, 2010 with the GeForce GTX 580. Its direct competitor was AMD's Radeon HD 6000 Series; they were launched approximately a month apart. Overview The Nvidia Geforce 500 series graphics cards are significantly modified versions of the GeForce 400 series graphics cards, in terms of performance and power management. Like the Nvidia GeForce 400 series graphics cards, the Nvidia Geforce 500 series supports DirectX 11.0,OpenGL 4.6, and OpenCL 1.1. The refreshed Fermi chip includes 512 stream processors, grouped in 16 stream multiprocessors clusters (each with 32 CUDA cores), and is manufactured by TSMC in a 40 nm process. The Nvidia GeForce GTX 580 graphics card is the first in the Nvidia GeForce 500 series to use a fully enabled chip based on the refreshed Fermi architecture, with all 16 stream multiprocessors clusters and all six 64-bit memory controllers active. The new GF110 GPU was enhanced with full speed FP16 filtering (the previous generation GF100 GPU could only do half-speed FP16 filtering) and improved z-culling units. On January 25, 2011, Nvidia launched the GeForce GTX 560 Ti, to target the "sweet spot" segment where price/performance ratio is considered important. With its more than 30% improvement over the GTX 460, and performance in between the Radeon HD 6870 and 6950 1GB, the GTX 560 Ti directly replaced the GeForce GTX 470. On February 17, 2011, it was reported that the GeForce GTX 550 Ti would be launching on March 15, 2011. Although the GTX 550 Ti is a GF116 mainstream chip, Nvidia chose to name its new card the GTX 550 Ti, and not the GTS 550. Performance was shown to be at least comparable and up to 12% faster than the current Radeon HD 5770. Price-wise, the new card trod into the range occupied by the GeForce GTX 460 (768 MB) and the Radeon HD 6790. On March 24, 2011, the GTX 590 wa
https://en.wikipedia.org/wiki/Mass%20flow%20meter
A mass flow meter, also known as an inertial flow meter, is a device that measures mass flow rate of a fluid traveling through a tube. The mass flow rate is the mass of the fluid traveling past a fixed point per unit time. The mass flow meter does not measure the volume per unit time (e.g. cubic meters per second) passing through the device; it measures the mass per unit time (e.g. kilograms per second) flowing through the device. Volumetric flow rate is the mass flow rate divided by the fluid density. If the density is constant, then the relationship is simple. If the fluid has varying density, then the relationship is not simple. For example, the density of the fluid may change with temperature, pressure, or composition. The fluid may also be a combination of phases such as a fluid with entrained bubbles. Actual density can be determined due to dependency of sound velocity on the controlled liquid concentration. Operating principle of a Coriolis flow meter There are two basic configurations of Coriolis flow meter: the curved tube flow meter and the straight tube flow meter. This article discusses the curved tube design. The animations on the right do not represent an actually existing Coriolis flow meter design. The purpose of the animations is to illustrate the operating principle, and to show the connection with rotation. Fluid is being pumped through the mass flow meter. When there is mass flow, the tube twists slightly. The arm through which fluid flows away from the axis of rotation must exert a force on the fluid, to increase its angular momentum, so it bends backwards. The arm through which fluid is pushed back to the axis of rotation must exert a force on the fluid to decrease the fluid's angular momentum again, hence that arm will bend forward. In other words, the inlet arm (containing an outwards directed flow), is lagging behind the overall rotation, the part which in rest is parallel to the axis is now skewed, and the outlet arm (containing an inwa
https://en.wikipedia.org/wiki/121%20%28number%29
121 (one hundred [and] twenty-one) is the natural number following 120 and preceding 122. In mathematics One hundred [and] twenty-one is a square (11 times 11) the sum of the powers of 3 from 0 to 4, so a repunit in ternary. Furthermore, 121 is the only square of the form , where p is prime (3, in this case). the sum of three consecutive prime numbers (37 + 41 + 43). As , it provides a solution to Brocard's problem. There are only two other squares known to be of the form . Another example of 121 being one of the few numbers supporting a conjecture is that Fermat conjectured that 4 and 121 are the only perfect squares of the form (with being 2 and 5, respectively). It is also a star number, a centered tetrahedral number, and a centered octagonal number. In decimal, it is a Smith number since its digits add up to the same value as its factorization (which uses the same digits) and as a consequence of that it is a Friedman number (). But it cannot be expressed as the sum of any other number plus that number's digits, making 121 a self number. In other fields 121 is also: The electricity emergency telephone number in Egypt The number for voicemail for mobile phones on the Vodafone network The undiscovered chemical element unbiunium has the atomic number 121 The official end score for cribbage The pennant number of RTS Moskva, the Russian Navy’s Black Sea flagship, which was damaged beyond repair on April 13, 2022. See also List of highways numbered 121 United States House of Representatives House Resolution 121 United Nations Security Council Resolution 121
https://en.wikipedia.org/wiki/Sphereland
Sphereland: A Fantasy About Curved Spaces and an Expanding Universe is a 1965 translation of , a 1957 novel by Dionys Burger, and is a sequel to Flatland, a novel by "A Square" (a pen name of Edwin Abbott Abbott). The novel expands upon the social and mathematical foundations on which Flatland is based. It is markedly different from the first novel in that it has a more prosaic ending and treatment of society. Plot summary The Circles (who are appointed as priests/leaders of Flatland due to their many sides, or an appearance thereof) do not take A Square's revelation about a third dimension to be accurate, and A Square is ostracized by his community. Then after some time, society becomes more open to the ideas of Spaceland and, overall, to change and advancement. However, when a prominent surveyor finds a Triangle with more than 180 degrees, he is fired from his job and generally considered a crackpot, since such a construction is not possible in Euclidean geometry. He eventually makes friends with the grandson of A Square, A Hexagon, because he is a mathematician and scientist. Together, they come upon a theory to explain the unusual measurements: they actually live on a very large sphere, and the Triangles have more than 180 degrees due to being inscribed on a non-planar surface. With help from the sphere from the first novel, they are able to prove this theory. However, the established scientific community is not able to comprehend the idea proposed by the two, and thus they do not attempt to enlighten Flatland. Furthermore, as the residents of Flatland advance, they begin to travel in space; they see distant worlds like their own, and the surveyor tries to find the distance between their world and these distant worlds, using trigonometry and radar. From his calculations, he and the hexagon determine that the universe is expanding; again they try to reveal this theory to the outside world, but again it is not accepted. Therefore, like his grandfather in the pre
https://en.wikipedia.org/wiki/Converse%20theorem
In the mathematical theory of automorphic forms, a converse theorem gives sufficient conditions for a Dirichlet series to be the Mellin transform of a modular form. More generally a converse theorem states that a representation of an algebraic group over the adeles is automorphic whenever the L-functions of various twists of it are well-behaved. Weil's converse theorem The first converse theorems were proved by who characterized the Riemann zeta function by its functional equation, and by who showed that if a Dirichlet series satisfied a certain functional equation and some growth conditions then it was the Mellin transform of a modular form of level 1. found an extension to modular forms of higher level, which was described by . Weil's extension states that if not only the Dirichlet series but also its twists by some Dirichlet characters χ, satisfy suitable functional equations relating values at s and 1−s, then the Dirichlet series is essentially the Mellin transform of a modular form of some level. Higher dimensions J. W. Cogdell, H. Jacquet, I. I. Piatetski-Shapiro and J. Shalika have extended the converse theorem to automorphic forms on some higher-dimensional groups, in particular GLn and GLm×GLn, in a long series of papers.
https://en.wikipedia.org/wiki/AirHop%20Communications
AirHop Communications is a privately funded American corporation based in San Diego, CA. AirHop develops radio access network (RAN) software that addresses the installation, operation and performance challenges of multi-layer deployments of small cells in 3G and 4G networks. AirHop's customers are typically base station equipment vendors for wireless network operators. Technology AirHop holds 20 patent applications for its eSON™ self-organizing network (SON) software. eSON enables carriers to build a 3G or 4G LTE heterogeneous network (“het-net”) to augment existing macro base stations. Many carriers are using small cells and self-organizing networks to fill in gaps in 3G and 4G networks due to signal attenuation and add capacity. The 3rd Generation Partnership Project (3GPP) defined a SON specification to allow base stations to discover each other when inserted into a network and to adjust their radio frequency (RF) signal strength to avoid overlap and interference. AirHop was founded to extend this technology beyond initial network start-up to also provide ongoing interference management and spectrum reuse. This gives carriers the ability to both initialize the network and ongoing RAN intelligence to adjust signal levels as small cells come online and overlap with each other. eSON also optimizes spectrum reuse (spectral efficiency), enabling macrocells and small cells to share the same spectrum without interference (communication). History AirHop was founded in 2007 by three engineers in charge of 3G research and development at Texas Instruments. They foresaw that the present wireless network infrastructure would have to change as part of the move to 4G technologies to support mobile broadband. They left TI in October 2007 to begin developing SON software. The company announced a $1 million investment in September 2009 and added several wireless industry executives to its management team. AirHop showcased the first of its 3GPP Long Term Evolution (LTE) sol
https://en.wikipedia.org/wiki/Scorpion%20sting
A scorpion sting is an injury caused by the stinger of a scorpion resulting in the medical condition known as scorpionism, which may vary in severity. The anatomical part of the scorpion that delivers the sting is called a "telson". In typical cases, scorpion stings usually result in pain, paresthesia, and variable swelling. In serious cases, scorpion stings may involve the envenomation of humans by toxic scorpions, which may result in extreme pain, serious illness, or even death depending on the toxicity of the venom. Most scorpion stings range in severity from minor swelling to medically significant lesions, with only a few able to cause severe allergic, neurotic or necrotic reactions. However, scorpion stings account for approximately 3,000 deaths a year worldwide. The Brazilian yellow scorpion (Tityus serrulatus) is one species known for being especially dangerous, being responsible for most scorpion sting fatalities in South America. Scorpion stings are seen all over the world but are predominantly seen in the tropical and subtropical areas. In the Western hemisphere, these areas include Mexico, northern South America and southeast Brazil. In the Eastern hemisphere, these regions include Sub-Saharan Africa, the Middle East, and the Indian subcontinent. Characteristics and side effects The byproducts of some arthropods may be used as an aphrodisiac. Some of these arthropods whose byproduct may be used as medicines can be found in North America. Across North America, the Arizona bark scorpion (Centruroides sculpturatus) has proven to be the most venomous scorpion. While stings from this species will rarely result in death, side effects can include numbness, tingling, convulsions, difficult breathing, and occasionally, paralysis. These side effects may last up to 72 hours after injection of the venom. It is also observed that penile erection may occur after being stung. The pain of a sting from the Arizona Bark Scorpion has been compared to being struck by a b
https://en.wikipedia.org/wiki/Endothermic%20gas
Endothermic gas is a gas that inhibits or reverses oxidation on the surfaces it is in contact with. This gas is the product of incomplete combustion in a controlled environment. An example mixture is hydrogen gas (H2), nitrogen gas (N2), and carbon monoxide (CO). The hydrogen and carbon monoxide are reducing agents, so they work together to shield surfaces from oxidation. Endothermic gas is often used as a carrier gas for gas carburizing and carbonitriding. An endothermic gas generator could be used to supply heat to form an endothermic reaction. Synthesised in the catalytic retort(s) of endothermic generators, the gas in the endothermic atmosphere is combined with an additive gas including natural gas, propane (C3H8) or air and is then used to improve the surface chemistry work positioned in the furnace. Purposes There are two common purposes of the atmospheres in the heat treating industry: Protect the processed material from surface reactions (chemically inert) Allow surface of processed material to change (chemically reactive) Principal components of a endothermic gas generator Principal components of endothermic gas generators: Heating chamber for supplying heat by electric heating elements of combustion, Vertical cylindrical retorts, Tiny, porous ceramic pieces that are saturated with nickel, which acts as a catalyst for the reaction, Cooling heat exchanger in order to cool the products of the reaction as quickly as possible so that it reaches a particular temperature which stops any further reaction, Control system which will help maintain the consistency of the temperature of the reaction which will help adjust the gas ratio, providing the wanted dew point. Chemical composition Chemistry of endothermic gas generators: N2 (nitrogen) → 45.1% (volume) CO (carbon monoxide) → 19.6% (volume) CO2 (carbon dioxide) → 0.4% (volume) H2 (hydrogen) → 34.6% (volume) CH4 (methane) → 0.3% (volume) Dew point → +20/+50 Gas ratio → 2.6:1 Applications
https://en.wikipedia.org/wiki/Surface%20runoff
Surface runoff (also known as overland flow or terrestrial runoff) is the unconfined flow of water over the ground surface, in contrast to channel runoff (or stream flow). It occurs when excess rainwater, stormwater, meltwater, or other sources, can no longer sufficiently rapidly infiltrate in the soil. This can occur when the soil is saturated by water to its full capacity, and the rain arrives more quickly than the soil can absorb it. Surface runoff often occurs because impervious areas (such as roofs and pavement) do not allow water to soak into the ground. Furthermore, runoff can occur either through natural or human-made processes. Surface runoff is a major component of the water cycle. It is the primary agent of soil erosion by water. The land area producing runoff that drains to a common point is called a drainage basin. Runoff that occurs on the ground surface before reaching a channel can be a nonpoint source of pollution, as it can carry human-made contaminants or natural forms of pollution (such as rotting leaves). Human-made contaminants in runoff include petroleum, pesticides, fertilizers and others. Much agricultural pollution is exacerbated by surface runoff, leading to a number of down stream impacts, including nutrient pollution that causes eutrophication. In addition to causing water erosion and pollution, surface runoff in urban areas is a primary cause of urban flooding, which can result in property damage, damp and mold in basements, and street flooding. Generation Surface runoff is defined as precipitation (rain, snow, sleet, or hail) that reaches a surface stream without ever passing below the soil surface. It is distinct from direct runoff, which is runoff that reaches surface streams immediately after rainfall or melting snowfall and excludes runoff generated by the melting of snowpack or glaciers. Snow and glacier melt occur only in areas cold enough for these to form permanently. Typically snowmelt will peak in the spring and glacie
https://en.wikipedia.org/wiki/Framework-specific%20modeling%20language
A framework-specific modeling language (FSML) is a kind of domain-specific modeling language which is designed for an object-oriented application framework. FSMLs define framework-provided abstractions as FSML concepts and decompose the abstractions into features. The features represent implementation steps or choices. A FSML concept can be configured by selecting features and providing values for features. Such a concept configuration represents how the concept should be implemented in the code. In other words, concept configuration describes how the framework should be completed in order to create the implementation of the concept. Applications FSMLs are used in model-driven development for creating models or specifications of software to be built. FSMLs enable the creation of the models from the framework completion code (that is, automated reverse engineering) the creation of the framework completion code from the models (that is, automated forward engineering) code verification through constraint checking on the model automated round-trip engineering Examples Eclipse Workbench Part Interaction FSML An example FSML for modeling Eclipse Parts (that is, editors and views) and Part Interactions (for example listens to parts, requires adapter, provides selection). The prototype implementation supports automated round-trip engineering of Eclipse plug-ins that implement workbench parts and part interactions. See also General-purpose modeling (GPM) Model-driven engineering (MDE) Domain-specific language (DSL) Model-driven architecture (MDA) Meta-Object Facility (MOF)
https://en.wikipedia.org/wiki/Botryosphaeran
Botryosphaeran is an exopolysaccharide (EPS) produced by the ascomyceteous fungus Botryosphaeria rhodina. Characterization of the chemical structure of botryosphaeran showed this EPS to be a (1→3)(1→6)-β-D-glucan. This particular β-glucan can be produced by several strains of Botryosphaeria rhodina that include: MAMB-05, DABAC-P82, and RCYU 30101. Botryosphaeran exhibits interesting rheological properties and novel biological functions including hypoglycaemia, hypocholesterolaemia, anti-atheroslerosis and anti-cancer activity, with potential commercial applications. Three cosmetic products formulated with botryosphaeran have been developed to promote skin health and treat skin conditions for future intended commercialization purposes. History The ascomycete and filamentous fungus, Botryosphaeria rhodina (strain MAMB-05), was isolated from a canker on the trunk of a eucalypt tree, and was molecularly characterized by sequencing the Internal Transcribed Spacer (ITS) region of rDNA. The β-glucan, botryosphaeran, was discovered accidentally in 1994 while cultivating Botryosphaeria rhodina MAMB-05 on nutrient media containing glucose to produce the enzyme, laccase. This fungal isolate produces a constitutive laccase that could be induced to higher enzyme titers by various lignin-like aromatic compounds, and especially veratryl alcohol. The fungus was found to be ligninolytic. Botryosphaeran is secreted by the fungus during growth and appears in the fermentation broth where its presence causes an increase in the broth's viscosity. It can easily be extracted from the broth by precipitation methods. Veratryl alcohol, however, suppresses the formation of botryosphaeran. Production and isolation Botryosphaeran is produced under submerged fermentation conditions when Botryosphaeria rhodina MAMB-05 is grown on nutrient media containing glucose and mineral salts. Extracting the fermentation broth with alcohol causes the EPS (botryosphaeran) to precipitate from solution, an
https://en.wikipedia.org/wiki/Dead-beat%20control
In discrete-time control theory, the dead-beat control problem consists of finding what input signal must be applied to a system in order to bring the output to the steady state in the smallest number of time steps. For an Nth-order linear system it can be shown that this minimum number of steps will be at most N (depending on the initial condition), provided that the system is null controllable (that it can be brought to state zero by some input). The solution is to apply feedback such that all poles of the closed-loop transfer function are at the origin of the z-plane. This approach is straightforward for linear systems. However, when it comes to nonlinear systems, dead beat control is an open research problem. Usage The sole design parameter in deadbeat control is the sampling period. As the error goes to zero within N sampling periods, the settling time remains within the range of Nh, where h is the sampling parameter. Also, the magnitude of the control signal increases significantly as the sampling period decreases. Thus, careful selection of the sampling period is crucial when employing this control method. Finally, since the controller is based upon cancelling plant poles and zeros, these must be known precisely, otherwise the controller will not be deadbeat. Transfer function of dead-beat controller Consider that a plant has the transfer function where The transfer function of the corresponding dead-beat controller is where d is the minimum necessary system delay for controller to be realizable. For example, systems with two poles must have at minimum 2 step delay from controller to output, so d = 2. The closed-loop transfer function is and has all poles at the origin. In general, a closed loop transfer function which has all of its poles at the origin is called a dead beat transfer function. Notes
https://en.wikipedia.org/wiki/ESP%20Easy
ESP Easy is a free and open source MCU firmware for the Internet of things (IoT). and originally developed by the LetsControlIt.com community (formerly known as ESP8266.nu community). It runs on ESP8266 Wi-Fi based MCU (microcontroller unit) platforms for IoT from Espressif Systems. The name "ESP Easy," by default, refers to the firmware rather than the hardware on which it runs. At a low level, the ESP Easy firmware works the same as the NodeMCU firmware and also provides a very simple operating system on the ESP8266. The main difference between ESP Easy firmware and NodeMCU firmware is that the former is designed as a high-level toolbox that just works out-of-the-box for a pre-defined set of sensors and actuators. Users simply hook up and read/control over simple web requests without having to write any code at all themselves, including firmware upgrades using OTA (Over The Air) updates. The ESP Easy firmware can be used to turn ESP8266 modules into simple multifunction sensor and actuator devices for home automation platforms. Once the firmware is loaded on the hardware, configuration of ESP Easy is entirely web interface based. ESP Easy firmware is primarily used on ESP8266 modules/hardware as a wireless Wi-Fi sensor device with added sensors for temperature, humidity, barometric pressure, light intensity, etc. The ESP Easy firmware also offers some low-level actuator functions to control relays. The firmware is built on the ESP8266 core for Arduino which in turn uses many open source projects. Getting started with ESP Easy takes a few basic steps. In most cases, ESP8266 modules come with AT or NodeMCU LUA firmware, and you need to replace the existing firmware with the ESP Easy firmware by flashing the hardware with a (available on Windows, macOS and Linux platforms) flash tool to use it. Related projects ESP8266 Arduino Core As Arduino.cc began developing new MCU boards based on non-AVR processors like the ARM/SAM MCU used in the Arduino Due, they needed
https://en.wikipedia.org/wiki/Signal%20lamp
A signal lamp (sometimes called an Aldis lamp or a Morse lamp) is a visual signaling device for optical communication by flashes of a lamp, typically using Morse code. The idea of flashing dots and dashes from a lantern was first put into practice by Captain Philip Howard Colomb, of the Royal Navy, in 1867. Colomb's design used limelight for illumination, and his original code was not the same as Morse code. During World War I, German signalers used optical Morse transmitters called , with a range of up to 8 km (5 miles) at night, using red filters for undetected communications. Modern signal lamps produce a focused pulse of light, either by opening and closing shutters mounted in front of the lamp, or by tilting a concave mirror. They continue to be used to the present day on naval vessels and for aviation light signals in air traffic control towers, as a backup device in case of a complete failure of an aircraft's radio. History Signal lamps were pioneered by the Royal Navy in the late 19th century. They were the second generation of signalling in the Royal Navy, after the flag signals most famously used to spread Nelson's rallying-cry, "England expects that every man will do his duty", before the Battle of Trafalgar. The idea of flashing dots and dashes from a lantern was first put into practice by Captain, later Vice Admiral, Philip Howard Colomb, of the Royal Navy, in 1867. Colomb's design used limelight for illumination. His original code was not identical to Morse code, but the latter was subsequently adopted. Another signalling lamp was the Begbie lamp, a kerosene lamp with a lens to focus the light over a long distance. During the trench warfare of World War I when wire communications were often cut, German signals used three types of optical Morse transmitters, called , the intermediate type for distances of up to 4 km (2.5 miles) in daylight and of up to 8 km (5 miles) at night, using red filters for undetected communications. In 1944 Arthur Cyri
https://en.wikipedia.org/wiki/Beta%20normal%20form
In the lambda calculus, a term is in beta normal form if no beta reduction is possible. A term is in beta-eta normal form if neither a beta reduction nor an eta reduction is possible. A term is in head normal form if there is no beta-redex in head position. The normal form of a term, if one exists, is unique (as a corollary of the Church–Rosser theorem). However, a term may have more than one head normal form. Beta reduction In the lambda calculus, a beta redex is a term of the form: . A redex is in head position in a term , if has the following shape (note that application has higher priority than abstraction, and that the formula below is meant to be a lambda-abstraction, not an application): , where and . A beta reduction is an application of the following rewrite rule to a beta redex contained in a term: where is the result of substituting the term for the variable in the term . A head beta reduction is a beta reduction applied in head position, that is, of the following form: , where and . Any other reduction is an internal beta reduction. A normal form is a term that does not contain any beta redex, i.e. that cannot be further reduced. A head normal form is a term that does not contain a beta redex in head position, i.e. that cannot be further reduced by a head reduction. When considering the simple lambda calculus (viz. without the addition of constant or function symbols, meant to be reduced by additional delta rule), head normal forms are the terms of the following shape: , where is a variable, and . A head normal form is not always a normal form, because the applied arguments need not be normal. However, the converse is true: any normal form is also a head normal form. In fact, the normal forms are exactly the head normal forms in which the subterms are themselves normal forms. This gives an inductive syntactic description of normal forms. There is also the notion of weak head normal form: a term in weak head normal form is either a
https://en.wikipedia.org/wiki/Nessus%20Attack%20Scripting%20Language
The Nessus Attack Scripting Language, usually referred to as NASL, is a scripting language that is used by vulnerability scanners like Nessus and OpenVAS. With NASL specific attacks can be automated, based on known vulnerabilities. Tens of thousands of plugins have been written in NASL for Nessus and OpenVAS. Files that are written in this language usually get the file extension .nasl. For the exploitation of a zero day attack it is possible for an end user of Nessus or OpenVAS to write custom code in NASL which is executed by these vulnerability scanners. In earlier versions of Nessus, a binary called nasl or nasl.exe was provided that could interpret NASL code to perform vulnerability scans. In later versions of Nessus, this should be done via an API that is provided by this software. An example of executing a NASL plugin 'myzeroday.nasl' on Windows, a command such as the following could be invoked: An equivalent example of a Linux or UNIX command could look like this: If the plugin, in this example myzeroday.nasl, is placed in the same directory where other NASL plugins are located, it can also be included in standard scans by Nessus or OpenVAS, via the Web GUI or an API. Many of the specifications of the formal language are similar to those of the programming language C and the scripting language Perl and those of other languages. Control flow such as the for loop, the if and if-else statements are part of the language and comments are preceded by a hash. An example of "Hello World" in NASL is: In the release notes of Nessus 6.10.0 of 1/31/2017, a new NASL compiler for faster plugins was mentioned.
https://en.wikipedia.org/wiki/Walter%20Warwick%20Sawyer
Walter Warwick Sawyer (or W. W. Sawyer) (April 5, 1911– February 15, 2008) was a mathematician, mathematics educator and author, who taught on several continents. Life and career Walter Warwick Sawyer was born in St. Ives, Hunts, England on April 5, 1911. He attended Highgate School in London. He was an undergraduate at St. John's College, Cambridge, obtaining a BA in 1933 and specializing in quantum theory and relativity. He was an assistant lecturer in mathematics from 1933 to 1937 at University College, Dundee and from 1937 to 1944 at University of Manchester. From 1945 to 1947, he was the head of mathematics at Leicester College of Technology. In 1948 Sawyer became the first head of the mathematics department of what is now the University of Ghana. From 1951 to 1956, he was at Canterbury College (now the University of Canterbury in New Zealand). He left Canterbury College to become an associate professor at the University of Illinois, where he worked from winter 1957 through June 1958. While there, he criticized the New Math movement, which included criticism of the people who had hired him. From 1958 to 1965, he was a professor of mathematics at Wesleyan University, where he edited Mathematics Student Journal. In the fall of 1965 he became a professor at the University of Toronto, appointed to both the College of Education and the Department of Mathematics. He retired in 1976. Sawyer was the author of some 11 books. He is probably best known for his semi-popular works Mathematician's Delight and Prelude to Mathematics. Both of these have been translated into many languages. Mathematician's Delight was still in print 65 years after it was written. Some mathematicians have credited these books with helping to inspire their choice of a career. Sawyer died on February 15, 2008, at the age of 96. He is survived by a daughter, Anne León (Artist) and granddaughter, Anita León (Educator). Partial bibliography Mathematician's Delight, (Penguin, 1943), is
https://en.wikipedia.org/wiki/Negative%20air%20ionization%20therapy
Negative air ionization therapy (NAIs) uses air ionisers as a non-pharmaceutical treatment for respiratory disease, allergy, or stress-related health conditions. The mainstream scientific community considers many applications of NAIs to be pseudoscience. Many negative ion products release ozone, a chemical known to cause lung damage. Research For Seasonal Affective Disorder (SAD), a randomized controlled trial (RCT) comparing high (4.5x1014 ions/second) and low (1.7x1011 ions/second) flow rate negative air ionization with bright light therapy found that the post-treatment improvement percentage was 57.1% for bright light, 47.9% for high-density ions and 22.7% for low-density ions. An older RCT conducted by the same authors also found air ionization effective for SAD. A 2007 review considers this therapy "under investigation" and suggests that it may be a helpful treatment for SAD. An RCT comparing the short-term effects of bright light, an auditory stimulus, and high and low-density negative ions on mood and alertness in mildly depressed and non-depressed adults found that the three first (active) stimuli, but not the low-density placebo, reduced depression on the Beck Depression Inventory scale. The auditory stimulus, bright light, and high-density ions all produced rapid mood changes - with small to medium effect sizes - in depressed and non-depressed subjects. Researchers have continued to cite a dearth of evidence about the effects of negative air ionization. "The presence of NAIs is credited for increasing psychological health, productivity, and overall well-being but without consistent or reliable evidence in therapeutic effects and with controversy in anti-microorganisms," researchers wrote in a 2018 article published in the International Journal of Molecular Sciences. See also Topics characterized as pseudoscience Ionized bracelet Earthing therapy Water ionizer
https://en.wikipedia.org/wiki/Helenalin
Helenalin, or (-)-4-Hydroxy-4a,8-dimethyl-3,3a,4a,7a,8,9,9a-octahydroazuleno[6,5-b]furan-2,5-dione, is a toxic sesquiterpene lactone which can be found in several plants such as Arnica montana and Arnica chamissonis Helenalin is responsible for the toxicity of the Arnica spp. Although toxic, helenalin possesses some in vitro anti-inflammatory and anti-neoplastic effects. Helenalin can inhibit certain enzymes, such as 5-lipoxygenase and leukotriene C4 synthase. For this reason the compound or its derivatives may have potential medical applications. Structure and reactivity Helenalin belongs to the group of sesquiterpene lactones which are characterised by a lactone ring. Beside this ring, the structure of helenalin has two reactive groups (α-methylene-γ-butyrolactone and a cyclopentenone group) that can undergo a Michael addition. The double bond in the carbonyl group can undergo a Michael addition with a thiol group, also called a sulfhydryl group. Therefore, helenalin can interact with proteins by forming covalent bonds to the thiol groups of cysteine-containing proteins/peptides, such as glutathione. This effect can disrupt the molecule's biological function. Addition reactions can occur because thiol groups are strong nucleophiles; a thiol has a lone pair of electrons. Chemical derivatives There are several derivatives of helenaline known within the same sesquiterpene lactone group; pseudoguaianolides. Most of these derivatives occur naturally, such as the compound dihydrohelenalin, but there are also some semi-synthetic derivatives known, such as 2β-(S-glutathionyl)-2,3-dihydrohelenalin. In general, most derivatives are more toxic than helenalin itself. Among these, derivatives with the shortest ester groups are most likely to contain a higher toxicity. Other derivatives include 11α,13-dihydrohelenalin acetate, 2,3-dehydrohelenalin and 6-O-isobutyrylhelenalin. The molecular conformation differs between helenalin and its derivatives, which affects the lipo
https://en.wikipedia.org/wiki/Claude%20Lemar%C3%A9chal
Claude Lemaréchal is a French applied mathematician, and former senior researcher (directeur de recherche) at INRIA near Grenoble, France. In mathematical optimization, Claude Lemaréchal is known for his work in numerical methods for nonlinear optimization, especially for problems with nondifferentiable kinks. Lemaréchal and Philip Wolfe pioneered bundle methods of descent for convex minimization. Awards In 1994, Claude Lemaréchal and Roger J-B Wets were each awarded the George B. Dantzig Prize. Recognizing "original research that has had a major impact on the field of mathematical programming", the Dantzig Prize is awarded by the Society for Industrial and Applied Mathematics (SIAM) and the Mathematical Programming Society (MPS). Lagrangian duality and nonconvex primal problems Soon after joining INRIA (then named "IRIA"), Lemaréchal had the assignment of helping a glass-manufacturer with a problem of scheduling its production, a problem whose first formulation required minimizing a non-convex function. For this non-convex minimization problem, Lemaréchal applied the theory of Lagrangian duality that was described in Lasdon's Optimization Theory for Large Systems. Because the primal problem was non-convex, there was no guarantee that a solution to the dual problem would provide useful information about the primal. Nonetheless, the dual problem did furnish useful information. Lemaréchal's success with Lagrangian dual methods on nonlinear programming problems with nonconvexities interested Ivar Ekeland and Jean–Pierre Aubin, who applied the Shapley–Folkman lemma to explain the Lemaréchal's success. The Aubin–Ekeland analysis of duality gaps considered the convexclosure of a nonconvex minimization problem — that is, the problem defined by the closed convex hull of the epigraph of the original problem. Following Ekeland and Aubin, similar applications of the Shapley–Folkman lemma are described in optimization monographs and textbooks. These developments were ca
https://en.wikipedia.org/wiki/RadExPro%20seismic%20software
RadExPro is a Windows-based seismic processing software system produced by RadExPro Seismic Software LLC based in Georgia. It is suitable for in-field QC (both online and offline) and processing of 3D and 2D marine and on-land seismic data, advanced processing of HR/UHR offshore seismic, as well as for the onshore near-surface seismic reflection, refraction, MASW, and VSP processing. For marine applications where data was collected within a broad range of parameters and equipment (single or multi-channel, boomer, sparker or airgun, 2D or 3D), high resolution marine data benefits greatly from in-depth processing in RadExPro, revealing more details from data and extracting more geologic information for presentation.
https://en.wikipedia.org/wiki/WS-Security%20based%20products%20and%20services
WS-Security is a flexible and feature-rich extension to SOAP to apply security to web services. It is a member of the WS-* family of web service specifications and was published by OASIS. Closely related to WS-Security is WS-Trust, also a WS-* specification and OASIS standard that provides extensions to WS-Security. The following are WS-Security based products and services: See also WS-* Web Service Specifications Identity management Identity management systems List of single sign-on implementations OASIS (organization) SAML 2.0 SAML-based products and services Security Token Service (STS) Single sign-on WS-Federation WS-Trust Web Services
https://en.wikipedia.org/wiki/Painlev%C3%A9%20transcendents
In mathematics, Painlevé transcendents are solutions to certain nonlinear second-order ordinary differential equations in the complex plane with the Painlevé property (the only movable singularities are poles), but which are not generally solvable in terms of elementary functions. They were discovered by , , , and . History Painlevé transcendents have their origin in the study of special functions, which often arise as solutions of differential equations, as well as in the study of isomonodromic deformations of linear differential equations. One of the most useful classes of special functions are the elliptic functions. They are defined by second order ordinary differential equations whose singularities have the Painlevé property: the only movable singularities are poles. This property is rare in nonlinear equations. Poincaré and L. Fuchs showed that any first order equation with the Painlevé property can be transformed into the Weierstrass elliptic equation or the Riccati equation, which can all be solved explicitly in terms of integration and previously known special functions. Émile Picard pointed out that for orders greater than 1, movable essential singularities can occur, and found a special case of what was later called Painleve VI equation (see below). (For orders greater than 2 the solutions can have moving natural boundaries.) Around 1900, Paul Painlevé studied second order differential equations with no movable singularities. He found that up to certain transformations, every such equation of the form (with a rational function) can be put into one of fifty canonical forms (listed in ). found that forty-four of the fifty equations are reducible in the sense that they can be solved in terms of previously known functions, leaving just six equations requiring the introduction of new special functions to solve them. There were some computational errors, and as a result he missed three of the equations, including the general form of Painleve VI.
https://en.wikipedia.org/wiki/Langton%27s%20ant
Langton's ant is a two-dimensional universal Turing machine with a very simple set of rules but complex emergent behavior. It was invented by Chris Langton in 1986 and runs on a square lattice of black and white cells. The universality of Langton's ant was proven in 2000. The idea has been generalized in several different ways, such as turmites which add more colors and more states. Rules Squares on a plane are colored variously either black or white. We arbitrarily identify one square as the "ant". The ant can travel in any of the four cardinal directions at each step it takes. The "ant" moves according to the rules below: At a white square, turn 90° clockwise, flip the color of the square, move forward one unit At a black square, turn 90° counter-clockwise, flip the color of the square, move forward one unit Langton's ant can also be described as a cellular automaton, where the grid is colored black or white and the "ant" square has one of eight different colors assigned to encode the combination of black/white state and the current direction of motion of the ant. Modes of behavior These simple rules lead to complex behavior. Three distinct modes of behavior are apparent, when starting on a completely white grid. Simplicity. During the first few hundred moves it creates very simple patterns which are often symmetric. Chaos. After a few hundred moves, a large, irregular pattern of black and white squares appears. The ant traces a pseudo-random path until around 10,000 steps. Emergent order. Finally the ant starts building a recurrent "highway" pattern of 104 steps that repeats indefinitely. All finite initial configurations tested eventually converge to the same repetitive pattern, suggesting that the "highway" is an attractor of Langton's ant, but no one has been able to prove that this is true for all such initial configurations. It is only known that the ant's trajectory is always unbounded regardless of the initial configuration – this is known as the C
https://en.wikipedia.org/wiki/Hand%E2%80%93eye%20calibration%20problem
In robotics and mathematics, the hand–eye calibration problem (also called the robot–sensor or robot–world calibration problem) is the problem of determining the transformation between a robot end-effector and a sensor or sensors (camera or laser scanner) or between a robot base and the world coordinate system. It is conceptually analogous to biological hand–eye coordination (hence the name). It takes the form of , where A and B are two systems, usually a robot base and a camera, and and are unknown transformation matrices. A highly studied special case of the problem occurs where , taking the form of the problem . Solutions to the problem take the forms of several types of methods, including separable closed-form solutions, simultaneous closed-form solutions, and iterative solutions. The covariance of in the equation can be calculated for any randomly perturbed matrices and . The problem is an important part of robot calibration, with efficiency and accuracy of the solutions determining the speed accuracy of the calibrations of robots. Methods Many different methods and solutions developed to solve the problem, broadly defined as either separable, simultaneous solutions. Each type of solution has specific advantages and disadvantages as well as formulations and applications to the problem. A common theme throughout all of the methods is the common use of quaternions to represent rotations. Separable solutions Given the equation , it is possible to decompose the equation into a purely rotational and translational part; methods utilizing this are referred to as separable methods. Where represents a 3×3 rotation matrix and a 3×1 translation vector, the equation can be broken into two parts: The second equation becomes linear if is known. As such, the most frequent approach is to solve for and using the first equation, then using to solve for the variables in the second equation. Rotation is represented using quaternions, allowing for a linear solution to
https://en.wikipedia.org/wiki/Badanj%20Cave
Badanj Cave () is located in Borojevići village near the town of Stolac, Bosnia and Herzegovina. This rather small cave has come to public attention after the 1976 discovery of its cave engravings, that date to between 12,000 and 16,000 BC. Thanks to local natural benefits and preferable composition, topography, climate, hydrography and vegetation and rich hunting grounds have long attracted prehistoric settlers: the region has been settled since antiquity. The site is rock shelter or overhang recessed beneath a cliff that descends to the right bank of the river Bregava. Two chronologically distinct strata of Palaeolithic occupation were identified beneath the surface layer. Of particular significance was the discovery of a particular carving of the Badanj site, as it ranks among the oldest works of art in Bosnia and Herzegovina. The carving is cut into the diagonal surface of a large polished block of stone, and probably represents a horse seen from the offside flank that has been hit by arrows. Only the rear half of the body survives, with flanks typical for a horse and part of the body; the rest of the drawing has been partly damaged. The Badanj carvings include depictions of animals and symbols, as is typical of Mediterranean prehistoric art. The site was dated to the late Upper Palaeolithic. The cave is part of The Natural and Architectural Ensemble of Stolac, submitted by the Stolac municipality, and the Herzegovina-Neretva county to be recognized a UNESCO heritage site in 2007 and inducted into UNESCO's tentative list. It has also been designated as a National Monument of Bosnia and Herzegovina since 2003. See also List of caves in Bosnia and Herzegovina
https://en.wikipedia.org/wiki/Intersection%20%28set%20theory%29
In set theory, the intersection of two sets and denoted by is the set containing all elements of that also belong to or equivalently, all elements of that also belong to Notation and terminology Intersection is written using the symbol "" between the terms; that is, in infix notation. For example: The intersection of more than two sets (generalized intersection) can be written as: which is similar to capital-sigma notation. For an explanation of the symbols used in this article, refer to the table of mathematical symbols. Definition The intersection of two sets and denoted by , is the set of all objects that are members of both the sets and In symbols: That is, is an element of the intersection if and only if is both an element of and an element of For example: The intersection of the sets {1, 2, 3} and {2, 3, 4} is {2, 3}. The number 9 is in the intersection of the set of prime numbers {2, 3, 5, 7, 11, ...} and the set of odd numbers {1, 3, 5, 7, 9, 11, ...}, because 9 is not prime. Intersecting and disjoint sets We say that if there exists some that is an element of both and in which case we also say that . Equivalently, intersects if their intersection is an , meaning that there exists some such that We say that if does not intersect In plain language, they have no elements in common. and are disjoint if their intersection is empty, denoted For example, the sets and are disjoint, while the set of even numbers intersects the set of multiples of 3 at the multiples of 6. Algebraic properties Binary intersection is an associative operation; that is, for any sets and one has Thus the parentheses may be omitted without ambiguity: either of the above can be written as . Intersection is also commutative. That is, for any and one has The intersection of any set with the empty set results in the empty set; that is, that for any set , Also, the intersection operation is idempotent; that is, any set satisfies that .
https://en.wikipedia.org/wiki/CLIMAT
CLIMAT is a code for reporting monthly climatological data assembled at land-based meteorological surface observation sites to data centres. CLIMAT-coded messages contain information on several meteorological variables that are important to monitor characteristics, changes, and variability of climate. Usually these messages are sent and exchanged via the Global Telecommunication System (GTS) of the World Meteorological Organisation (WMO). Modifications of the CLIMAT code are the CLIMAT SHIP and CLIMAT TEMP / CLIMAT TEMP SHIP codes which serve to report monthly climatological data assembled at ocean-based meteorological surface observation sites and at land-/ocean-based meteorological upper-air observation sites, respectively. The monthly values included usually are obtained by averaging observational values of one or several daily observations over the respective month. Contents of CLIMAT (TEMP) (SHIP) messages CLIMAT-messages contain comprehensive information on a variety of climate-relevant meteorological parameters such as monthly mean temperature, mean daily maximum and minimum temperatures of the month, monthly mean pressure, monthly mean vapour pressure, total precipitation for the month and total sunshine for the month. Information on so-called normal values of these parameters, usually averaged over a period of 30 years for a specific month, can also be transmitted with CLIMAT-messages. Data on extreme values of certain parameters and days of a month with certain parameters exceeding defined thresholds can also be included, as well as information on the number of days of a month where data are missing for a certain parameter. CLIMAT SHIP messages contain information on fewer variables (e.g., total sunshine for the month and extreme values are not included). CLIMAT TEMP (SHIP)-messages contain information on monthly mean temperature, monthly mean geopotential, monthly mean dew-point depression and wind characteristics at specific pressure surfaces. Characte
https://en.wikipedia.org/wiki/Test%20theory
In experimental physics, a test theory tells experimenters how to perform particular comparisons between specific theories or classes of theory. Without a good reference test theory, these experiments can be difficult to construct. Different theories often define relationships and parameters in different, often incompatible, ways. Sometimes, physical theories and models that nominally produce significantly diverging predictions can be found to produce very similar, even identical, predictions, once definitional differences are taken into account. A good test theory should identify potential sources of definitional bias in the way that experiments are constructed. It should also be able to deal with a wide range of possible objections to experimental tests based upon it. Discovery that a test theory has serious omissions can undermine the validity of experimental work that is designed according to that theory. Examples Parameterized post-Newtonian formalism is used to compare theories of gravity. Test theories of special relativity are useful when designing experiments to look for possible violations of Poincare symmetry. Physics experiments
https://en.wikipedia.org/wiki/Media%20naturalness%20theory
Media naturalness theory is also known as the psychobiological model. The theory was developed by Ned Kock and attempts to apply Darwinian evolutionary principles to suggest which types of computer-mediated communication will best fit innate human communication capabilities. Media naturalness theory argues that natural selection has resulted in face-to-face communication becoming the most effective way for two people to exchange information. The theory has been applied to human communication outcomes in various contexts, such as: education, knowledge transfer, communication in virtual environments, e-negotiation, business process improvement, trust and leadership in virtual teamwork, online learning, maintenance of distributed relationships, performance in experimental tasks using various media, and modular production. Its development is also consistent with ideas from the field of evolutionary psychology. The media naturalness theory builds on the media richness theory's arguments that face-to-face interaction is the richest type of communication medium by providing an evolutionary explanation for the face-to-face medium's degree of richness. Media naturalness theory argues that since ancient hominins communicated primarily face-to-face, evolutionary pressures since that time have led to the development of a brain that is consequently designed for that form of communication. Kock points out that computer-mediated communication is far too recent a phenomenon to have had the time necessary to shape human cognition and language capabilities via natural selection. In turn, Kock argues that using communication media that suppress key elements found in face-to-face communication, as many electronic communication media do, ends up posing cognitive obstacles to communication, and particularly in the case of complex tasks (e.g., business process redesign, new product development, online learning), because such tasks seem to require more intense communication over extend
https://en.wikipedia.org/wiki/Glossary%20of%20quantum%20computing
This glossary of quantum computing is a list of definitions of terms and concepts used in quantum computing, its sub-disciplines, and related fields.
https://en.wikipedia.org/wiki/Isolation%20transformer
An isolation transformer is a transformer used to transfer electrical power from a source of alternating current (AC) power to some equipment or device while isolating the powered device from the power source, usually for safety reasons or to reduce transients and harmonics. Isolation transformers provide galvanic isolation; no conductive path is present between source and load. This isolation is used to protect against electric shock, to suppress electrical noise in sensitive devices, or to transfer power between two circuits which must not be connected. A transformer sold for isolation is often built with special insulation between primary and secondary, and is specified to withstand a high voltage between windings. Isolation transformers block transmission of the DC component in signals from one circuit to the other, but allow AC components in signals to pass. Transformers that have a ratio of 1 to 1 between the primary and secondary windings are often used to protect secondary circuits and individuals from electrical shocks between energized conductors and earth ground. Suitably designed isolation transformers block interference caused by ground loops. Isolation transformers with electrostatic shields are used for power supplies for sensitive equipment such as computers, medical devices, or laboratory instruments. Some specifications require that Isolation transformers be a part of the lightning protection on the AC circuits. Terminology Sometimes the term is used to emphasize that a device is not an autotransformer whose primary and secondary circuits are connected. Power transformers with specified insulation between primary and secondary are not usually described only as "isolation transformers" unless this is their primary function. Only transformers whose primary purpose is to isolate circuits are routinely described as isolation transformers. Operation Isolation transformers are designed with attention to capacitive coupling between the two winding
https://en.wikipedia.org/wiki/Multi-key%20quicksort
Multi-key quicksort, also known as three-way radix quicksort, is an algorithm for sorting strings. This hybrid of quicksort and radix sort was originally suggested by P. Shackleton, as reported in one of C.A.R. Hoare's seminal papers on quicksort; its modern incarnation was developed by Jon Bentley and Robert Sedgewick in the mid-1990s. The algorithm is designed to exploit the property that in many problems, strings tend to have shared prefixes. One of the algorithm's uses is the construction of suffix arrays, for which it was one of the fastest algorithms as of 2004. Description The three-way radix quicksort algorithm sorts an array of (pointers to) strings in lexicographic order. It is assumed that all strings are of equal length ; if the strings are of varying length, they must be padded with extra elements that are less than any element in the strings. The pseudocode for the algorithm is then algorithm sort(a : array of string, d : integer) is if length(a) ≤ 1 or d ≥ K then return p := pivot(a, d) i, j := partition(a, d, p) (Note a simultaneous assignment of two variables.) sort(a[0:i), d) sort(a[i:j), d + 1) sort(a[j:length(a)), d) Unlike most string sorting algorithms that look at many bytes in a string to decide if a string is less than, the same as, or equal to some other string; and then turning its focus to some other pair of strings, the multi-key quicksort initially looks at only one byte of every string in the array, byte d, initially the first byte of every string. The recursive call uses a new value of d and passes a subarray where every string in the subarray has exactly the same initial part -- the characters before character d. The function must return a single character. Bentley and Sedgewick suggest either picking the median of or some random character in that range. The partition function is a variant of the one used in ordinary three-way quicksort: it rearranges so that all of have an element
https://en.wikipedia.org/wiki/Capped%20octahedral%20molecular%20geometry
In chemistry, the capped octahedral molecular geometry describes the shape of compounds where seven atoms or groups of atoms or ligands are arranged around a central atom defining the vertices of a gyroelongated triangular pyramid. This shape has C3v symmetry and is one of the three common shapes for heptacoordinate transition metal complexes, along with the pentagonal bipyramid and the capped trigonal prism. Examples of the capped octahedral molecular geometry are the heptafluoromolybdate () and the heptafluorotungstate () ions. The "distorted octahedral geometry" exhibited by some AX6E1 molecules such as xenon hexafluoride (XeF6) is a variant of this geometry, with the lone pair occupying the "cap" position.
https://en.wikipedia.org/wiki/Cytostasis
Cytostasis (cyto – cell; stasis – stoppage) is the inhibition of cell growth and multiplication. Cytostatic refers to a cellular component or medicine that inhibits cell division. Cytostasis is an important prerequisite for structured multicellular organisms. Without regulation of cell growth and division only unorganized heaps of cells would be possible. Chemotherapy of cancer, treatment of skin diseases and treatment of infections are common use cases of cytostatic drugs. Active hygienic products generally contain cytostatic substances. Cytostatic mechanisms and drugs generally occur together with cytotoxic ones. Activators Nitric oxide – activated macrophages produce large amounts of nitric oxide (NO), which induces both cytostasis and cytotoxicity to tumor cells both in vitro and in vivo. Nitric oxide-induced cytostasis targets ribonucleotide reductase by rapid and reversible inhibition. However, other studies show there could be other targets that are responsible for producing long-lasting cytostasis in cells. Lipopolysaccharide (LPS) and lipid A-associated protein – studies have demonstrated that LPS and LAP are potent macrophage activators that have been shown to stimulate tumoricidal (cytostatic) activity in vitro. LAP and LPS were shown to stimulate C3H/HeJ macrophages to kill target tumor cells. It was concluded that LAP can deliver at least one of the triggering signals necessary for inducing macrophage activity that leads to cytostasis. Polyunsaturated fatty acid – N-3 and n-6 polyunsaturated fatty acids were found to have a distinct effect on cell growth in certain human urothelial cells. Cystostatic concentrations of n-3 and n-6 PUFA did not induce apoptosis, but did cause permanent cellular growth arrest by effecting the cell cycle. Study shows that metabolites of the lipoxygenase pathway are involved with the antiproliferation induce by PUFA. However, PUFA cytostatic activity is not tumor-specific. Medical uses Cytostatic agents have been ben
https://en.wikipedia.org/wiki/Megalodon%20%28website%29
Megalodon (, "web gyotaku") is an on demand web citation service based in Japan. It is owned by Affility. Megalodon's server can be searched for "web gyotaku" or copies of web pages, by prefixing any URL with "gyo.tc"; the process checks the query against other services as well, including Google's cached pages and Mementos. On 12 November 2010, Affility revealed that all files copied before the first half of 2007 were lost because of a malfunction in their backup process. Megalodon does not archive sites which include a "noindex" or "noarchive" tag in the robots.txt file. See also List of Web archiving initiatives Wayback Machine archive.today
https://en.wikipedia.org/wiki/Static%20variable
In computer programming, a static variable is a variable that has been allocated "statically", meaning that its lifetime (or "extent") is the entire run of the program. This is in contrast to shorter-lived automatic variables, whose storage is stack allocated and deallocated on the call stack; and in contrast to objects, whose storage is dynamically allocated and deallocated in heap memory. Variable lifetime is contrasted with scope (where a variable can be used): "global" and "local" refer to scope, not lifetime, but scope often implies lifetime. In many languages, global variables are always static, but in some languages they are dynamic, while local variables are generally automatic, but may be static. In general, is the allocation of memory at compile time, before the associated program is executed, unlike dynamic memory allocation or automatic memory allocation where memory is allocated as required at run time. History Static variables date at least to ALGOL 60 (1960), where they are known as own variables: This definition is subtly different from a static variable: it only specifies behavior, and hence lifetime, not storage: an own variable can be allocated when a function is first called, for instance, rather than at program load time. The use of the word static to refer to these variables dates at least to BCPL (1966), and has been popularized by the C programming language, which was heavily influenced by BCPL. The BCPL definition reads: Note that BCPL defined a "dynamic data item" for what is now called an automatic variable (local, stack-allocated), not for heap-allocated objects, which is the current use of the term dynamic allocation. The static keyword is used in C and related languages both for static variables and other concepts. Addressing The absolute address addressing mode can only be used with static variables, because those are the only kinds of variables whose location is known by the compiler at compile time. When the program (execut
https://en.wikipedia.org/wiki/Context-based%20access%20control
Context-based access control (CBAC) is a feature of firewall software, which intelligently filters TCP and UDP packets based on application layer protocol session information. It can be used for intranets, extranets and internets. CBAC can be configured to permit specified TCP and UDP traffic through a firewall only when the connection is initiated from within the network needing protection. (In other words, CBAC can inspect traffic for sessions that originate from the external network.) However, while this example discusses inspecting traffic for sessions that originate from the external network, CBAC can inspect traffic for sessions that originate from either side of the firewall. This is the basic function of a stateful inspection firewall. Without CBAC, traffic filtering is limited to access list implementations that examine packets at the network layer, or at most, the transport layer. However, CBAC examines not only network layer and transport layer information but also examines the application-layer protocol information (such as FTP connection information) to learn about the state of the TCP or UDP session. This allows support of protocols that involve multiple channels created as a result of negotiations in the FTP control channel. Most of the multimedia protocols as well as some other protocols (such as FTP, RPC, and SQL*Net) involve multiple control channels. CBAC inspects traffic that travels through the firewall to discover and manage state information for TCP and UDP sessions. This state information is used to create temporary openings in the firewall's access lists to allow return traffic and additional data connections for permissible sessions (sessions that originated from within the protected internal network). CBAC works through deep packet inspection and hence Cisco calls it 'IOS firewall' in their Internetwork Operating System (IOS). CBAC also provides the following benefits: Denial-of-service prevention and detection Real-time alerts and
https://en.wikipedia.org/wiki/Monterey%20County%20reforestation
The Monterey County reforestation refers to efforts in Monterey County, California, to preserve the county's pine forests and urban environment. This one county boasts the native Monterey Pine ecosystem; one of the rarest forest ecosystems in the world. Only a few thousand acres of these endemic trees exist in four locations along the Pacific Ocean on the Central Coast of California. The city of Monterey itself maintains more than 19,000 trees in parks and along streets, as well as about of Monterey Pine forests. Pine Forests on the Monterey Peninsula Although the Monterey Pine tree species is widely grown in landscapes and in nurseries throughout Northern America, only a few thousand acres of these trees exist in only four locations; one of these being the Pacific Ocean on the Central Coast of California. The Monterey Peninsula is home to the largest of these stands, but the trees there are threatened by impacts from development, non-native invasive species, and diseases. The local Monterey Pine forest provides numerous benefits to the region's economy, from its intrinsic beauty that attracts tourists, to recreational settings for residents and visitors, to valuable ecological services, such as watershed protection and enhanced air quality. However, except for a few small sites and the Point Lobos State Reserve, much of the remaining forest is not protected within conservation areas. According to The Monterey Pine Forest Watch, “Half of our native forest has already been removed” and “Much of the remaining forest is in private hands and subject to development.” Urban Forestry Even sites that are protected from tree removal, such as Veteran's Memorial Park, have been impacted by human activities and tree diseases, such as the pine pitch canker. According to Robert Reid, the head of the City of Monterey's Urban Forestry program, he said that the disease was first discovered in 1986, and since then, hundreds of pines of all ages have died and their loss has had a
https://en.wikipedia.org/wiki/Card%20Verifiable%20Certificate
Card Verifiable Certificates (CVC) are digital certificates that are designed to be processed by devices with limited computing power such as smart cards. This is achieved by using simple type–length–value (TLV) encoding with fixed fields. Fixed fields means that each field in the certificate is of fixed, or maximum, length and each field comes in a well defined order. This makes parsing easy, in contrast to asn.1 parsing which requires more processing and has to keep fields in memory while parsing nested content. CVC is used by the third generation ePassports implementing Extended Access Control (EAC). There are open source implementations for processing EAC/CVC certificates: EJBCA JMRTD
https://en.wikipedia.org/wiki/Microlocal%20analysis
In mathematical analysis, microlocal analysis comprises techniques developed from the 1950s onwards based on Fourier transforms related to the study of variable-coefficients-linear and nonlinear partial differential equations. This includes generalized functions, pseudo-differential operators, wave front sets, Fourier integral operators, oscillatory integral operators, and paradifferential operators. The term microlocal implies localisation not only with respect to location in the space, but also with respect to cotangent space directions at a given point. This gains in importance on manifolds of dimension greater than one. See also Algebraic analysis Microfunction External links lecture notes by Richard Melrose newer lecture notes by Richard Melrose Fourier analysis Generalized functions
https://en.wikipedia.org/wiki/Boris%20Vladimirovich%20Gnedenko
Boris Vladimirovich Gnedenko (; January 1, 1912 – December 27, 1995) was a Soviet mathematician and a student of Andrey Kolmogorov. He was born in Simbirsk (now Ulyanovsk), Russia, and died in Moscow. He is perhaps best known for his work with Kolmogorov, and his contributions to the study of probability theory, particularly extreme value theory, with such results as the Fisher–Tippett–Gnedenko theorem. Gnedenko was appointed as Head of the Physics, Mathematics and Chemistry Section of the Ukrainian Academy of Sciences in 1949, and became Director of the NASU Institute of Mathematics in 1955. Gnedenko was a leading member of the Russian school of probability theory and statistics. He also worked on applications of statistics to reliability and quality control in manufacturing. He wrote a history of mathematics in Russia (published 1946) and with O. B. Sheynin the section on the history of probability theory in the history of mathematics by Kolmogorov and Adolph P. Yushkevich (published 1992). In 1958 he was a plenary speaker at the International Congress of Mathematicians in Edinburgh with a talk entitled "Limit theorems of probability theory". Books with A. N. Kolmogorov: with A. Ya. Khinchin: with Yu. K. Belyayev and A. D. Solovyev: with I. N. Kovalenko:
https://en.wikipedia.org/wiki/Manure
Manure is organic matter that is used as organic fertilizer in agriculture. Most manure consists of animal feces; other sources include compost and green manure. Manures contribute to the fertility of soil by adding organic matter and nutrients, such as nitrogen, that are utilised by bacteria, fungi and other organisms in the soil. Higher organisms then feed on the fungi and bacteria in a chain of life that comprises the soil food web. History According to a Byzantine tradition attributed to Cassianus Bassus pig dung was generally not usable as fertilizer, except for almond trees. Similar views recorded by Columella were unrelated to the Islamic taboos of later centuries, though the medieval Andalusian writer Ibn Bassal and some later writers from Yemen also recorded negative effects of pig dung "burning" plants. Ibn Bassal described a sort of mixed manure with straw or sweeping mixed in as , implying that was not composed of only manure. The sweepings from hot baths included urine and human wastes, which Ibn Bassal describes as dry and salty, unsuitable for use as fertilizer unless mixed with manure. Ibn Bassal gives two recipes for composting pigeon (hamam) and possibly donkey (himar) manure, though the translation is uncertain. Bassal says the excessive heat and moist qualities of pigeon dung worked well for weaker and less hardy plants, especially those affected by cold temperatures. Types There are in the 21st century three main classes of manures used in soil management: Animal manure Most animal manure consists of feces. Common forms of animal manure include farmyard manure (FYM) or farm slurry (liquid manure). FYM also contains plant material (often straw), which has been used as bedding for animals and has absorbed the feces and urine. Agricultural manure in liquid form, known as slurry, is produced by more intensive livestock rearing systems where concrete or slats are used, instead of straw bedding. Manure from different animals has different quali
https://en.wikipedia.org/wiki/Reflectometry
Reflectometry is a general term for the use of the reflection of waves or pulses at surfaces and interfaces to detect or characterize objects, sometimes to detect anomalies as in fault detection and medical diagnosis. There are many different forms of reflectometry. They can be classified in several ways: by the used radiation (electromagnetic, ultrasound, particle beams), by the geometry of wave propagation (unguided versus wave guides or cables), by the involved length scales (wavelength and penetration depth in relation to size of the investigated object), by the method of measurement (continuous versus pulsed, polarization resolved, ...), and by the application domain. Radiation sources Electromagnetic radiation of widely varying wavelength is used in many different forms of reflectometry: Radar: Reflections of radiofrequency pulses are used to detect the presence and to measure the location and speed of objects such as aircraft, missiles, ships, vehicles. Lidar: Reflections of light pulses are used typically to penetrate ground cover by vegetation in aerial archaeological surveys. Characterization of semiconductor and dielectric thin films: Analysis of reflectance data utilizing the Forouhi Bloomer dispersion equations can determine the thickness, refractive index, and extinction coefficient of thin films utilized in the semiconductor industry. X-ray reflectometry: is a surface-sensitive analytical technique used in chemistry, physics, and materials science to characterize surfaces, thin films and multilayers. Propagation of electric pulses and reflection at discontinuities in cables is used in time domain reflectometry (TDR) to detect and localize defects in electric wiring. Skin reflectance: In anthropology, reflectometry devices are often used to gauge human skin color through the measurement of skin reflectance. These devices are typically pointed at the upper arm or forehead, with the emitted waves then interpreted at various percentages. Lower fr
https://en.wikipedia.org/wiki/Pierre%20De%20Muelenaere
Pierre de Muelenaere (born 25 October 1958) is a Belgian entrepreneur and scientist. He is the co-founder of IRIS (Image Recognition Integrated Systems), a leading company in the information management industry. In 2018 he became CEO of EVS Broadcast Equipment. Biography De Muelenaere was born in Brussels. He received a civil engineering Degree in Electronics from the Université Catholique de Louvain in 1981 and a PhD in Applied science in 1987, from the same university. His original background is Integrated circuit design and Artificial Intelligence. During his PhD, he developed new microprocessor architectures dedicated to very fast Image Processing and Recognition. A prototype of a complete OCR system was also built in the University labs, based on a new generation of custom Image Processing ICs. With the support of the Belgian holding Ackermans & van Haaren, and together with fellow PhD student Jean-Didier Legat, de Muelenaere founded IRIS (Image Recognition Integrated Systems) in April 1987, to bring this invention to the market, develop and market Optical character recognition (OCR) and Intelligent Document Recognition (IDR) products. De Muelenaere led IRIS through all its development steps as president and CEO of the company. In 1992, de Muelenaere and performed a Management buyout. In 1999, I.R.I.S. was introduced on the Brussels Stock Exchange, (BXS, now NYSE Euronext) and received the "1999 Best Belgian IPO Award" from BXS. I.R.I.S. had more than 500 staff, with offices in Belgium, Luxembourg, France, Germany, The Netherlands, Norway, USA and Hong-Kong. In 2008, the revenue was over €100million. Over the years, de Muelenaere has been a main contributor to the R&D vision of I.R.I.S. and has contributed to the development of many new I.R.I.S. technologies and products and to a number of patents filed by the company. He also established strategic agreements with international partners in the US, Europe and Asia such as HP, Canon, Kodak, Adobe, Fujitsu