source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/List%20of%20U.S.%20state%20mammals
A state mammal is the official mammal of a U.S. state as designated by a state's legislature. The first column of the table is for those denoted as the state mammal, and the second shows the state marine mammals. Animals with more specific designations are also listed. Many states also have separately officially designated state birds, state fish, state butterflies, state reptiles, and other animals. Listed separately are state dogs and state horses. State mammals Key: Years in parentheses denote the year of adoption by the state's legislature. See also Lists of United States state symbols List of U.S. state dogs List of U.S. state horses
https://en.wikipedia.org/wiki/David%20S.%20Moore
David Sheldon Moore is an American statistician, who is known for his leadership of statistics education for many decades. Biography David S. Moore received his A.B. from Princeton University and the Ph.D. from Cornell University in mathematics. In statistics education, David S. Moore is the author of a series of influential textbooks in statistical science, which use only high school algebra: Introduction to the Practice of Statistics (with George McCabe), of An Introduction to the Basic Practice of Statistics, and of Statistics: Concepts and Controversies. In statistical science, David S. Moore has done research in the asymptotic theory of robust and nonparametric statistics. Professor Moore was the 1998 President of the American Statistical Association. David S. Moore is a retired (in 2004) Shanti S. Gupta Distinguished Professor of Statistics, Emeritus at Purdue University. Professor Moore has served as the second president of the International Association for Statistical Education. He was the content developer for the Annenberg/Corporation for Public Broadcasting college-level telecourse Against All Odds: Inside Statistics. Publications Introduction to the Practice of Statistics with George McCabe. The Basic Practice of Statistics. Statistics: Concepts and Controversies.
https://en.wikipedia.org/wiki/Weil%20conjectures
In mathematics, the Weil conjectures were highly influential proposals by . They led to a successful multi-decade program to prove them, in which many leading researchers developed the framework of modern algebraic geometry and number theory. The conjectures concern the generating functions (known as local zeta functions) derived from counting points on algebraic varieties over finite fields. A variety over a finite field with elements has a finite number of rational points (with coordinates in the original field), as well as points with coordinates in any finite extension of the original field. The generating function has coefficients derived from the numbers of points over the extension field with elements. Weil conjectured that such zeta functions for smooth varieties are rational functions, satisfy a certain functional equation, and have their zeros in restricted places. The last two parts were consciously modelled on the Riemann zeta function, a kind of generating function for prime integers, which obeys a functional equation and (conjecturally) has its zeros restricted by the Riemann hypothesis. The rationality was proved by , the functional equation by , and the analogue of the Riemann hypothesis by . Background and history The earliest antecedent of the Weil conjectures is by Carl Friedrich Gauss and appears in section VII of his Disquisitiones Arithmeticae , concerned with roots of unity and Gaussian periods. In article 358, he moves on from the periods that build up towers of quadratic extensions, for the construction of regular polygons; and assumes that is a prime number congruent to 1 modulo 3. Then there is a cyclic cubic field inside the cyclotomic field of th roots of unity, and a normal integral basis of periods for the integers of this field (an instance of the Hilbert–Speiser theorem). Gauss constructs the order-3 periods, corresponding to the cyclic group of non-zero residues modulo under multiplication and its unique subgroup of inde
https://en.wikipedia.org/wiki/Ultra%20high%20frequency
Ultra high frequency (UHF) is the ITU designation for radio frequencies in the range between 300 megahertz (MHz) and 3 gigahertz (GHz), also known as the decimetre band as the wavelengths range from one meter to one tenth of a meter (one decimeter). Radio waves with frequencies above the UHF band fall into the super-high frequency (SHF) or microwave frequency range. Lower frequency signals fall into the VHF (very high frequency) or lower bands. UHF radio waves propagate mainly by line of sight; they are blocked by hills and large buildings although the transmission through building walls is strong enough for indoor reception. They are used for television broadcasting, cell phones, satellite communication including GPS, personal radio services including Wi-Fi and Bluetooth, walkie-talkies, cordless phones, satellite phones, and numerous other applications. The IEEE defines the UHF radar band as frequencies between 300 MHz and 1 GHz. Two other IEEE radar bands overlap the ITU UHF band: the L band between 1 and 2 GHz and the S band between 2 and 4 GHz. Propagation characteristics Radio waves in the UHF band travel almost entirely by line-of-sight propagation (LOS) and ground reflection; unlike in the HF band there is little to no reflection from the ionosphere (skywave propagation), or ground wave. UHF radio waves are blocked by hills and cannot travel beyond the horizon, but can penetrate foliage and buildings for indoor reception. Since the wavelengths of UHF waves are comparable to the size of buildings, trees, vehicles and other common objects, reflection and diffraction from these objects can cause fading due to multipath propagation, especially in built-up urban areas. Atmospheric moisture reduces, or attenuates, the strength of UHF signals over long distances, and the attenuation increases with frequency. UHF TV signals are generally more degraded by moisture than lower bands, such as VHF TV signals. Since UHF transmission is limited by the visual horizon
https://en.wikipedia.org/wiki/Lingual%20artery
The lingual artery arises from the external carotid artery between the superior thyroid artery and facial artery. It can be located easily in the tongue. Structure The lingual artery first branches off from the external carotid artery. It runs obliquely upward and medially to the greater horns of the hyoid bone. It then curves downward and forward, forming a loop which is crossed by the hypoglossal nerve. It then passes beneath the digastric muscle and stylohyoid muscle running horizontally forward, beneath the hyoglossus. This takes it through the sublingual space. Finally, ascending almost perpendicularly to the tongue, it turns forward on its lower surface as far as the tip of the tongue, now called the deep lingual artery (profunda linguae). Branches The lingual artery gives 4 main branches: the deep lingual artery, the sublingual artery, the suprahyoid branch, and the dorsal lingual branch. Deep lingual artery The deep lingual artery (or ranine artery) is the terminal portion of the lingual artery after the sublingual artery is given off. As seen in the picture, it travels superiorly in a tortuous course along the under (ventral) surface of the tongue, below the longitudinalis inferior, and above the mucous membrane. It lies on the lateral side of the genioglossus, the main large extrinsic tongue muscle, accompanied by the lingual nerve. However, as seen in the picture, the deep lingual artery passes inferior to the hyoglossus (the cut muscle on the bottom) while the lingual nerve (not pictured) passes superior to it (for a comparison, the hypoglossal nerve, pictured, passes superior to the hyoglossus). At the tip of the tongue, it is said to anastomose with the artery of the opposite side, but this is denied by Hyrtl. In the mouth, these vessels are placed one on either side of the frenulum linguæ. Sublingual artery The sublingual artery arises at the anterior margin of the hyoglossus, and runs forward between the genioglossus and mylohyoid muscle to th
https://en.wikipedia.org/wiki/Gcn2
GCN2 (general control nonderepressible 2) is a serine/threonine-protein kinase that senses amino acid deficiency through binding to uncharged transfer RNA (tRNA). It plays a key role in modulating amino acid metabolism as a response to nutrient deprivation. Introduction GCN2 is the only known eukaryotic initiation factor 2α kinase (eIF2α) in Saccharomyces cerevisiae. It inactivates eIF2α by phosphorylation at Serine 51 under conditions of amino acid deprivation, resulting in repression of general protein synthesis whilst allowing selected mRNA such as GCN4 to be translated due to regions upstream of the coding sequence. Elevated levels of GCN4 stimulate the expression of amino acid biosynthetic genes, which code for enzymes required to synthesize all 20 major amino acids. Structure Protein kinase GCN2 is a multidomain protein and its C-terminus contains a region homologous to histidyl-tRNA synthetase (HisRS) next to the kinase catalytic moiety. This HisRS-like region forms a dimer and dimerization is required for GCN2 function. The crucial contribution to GCN2 function is the promotion of tRNA binding and the stimulation of the kinase domain via physical interaction. Binding of uncharged tRNA to this synthetase-like domain induces a conformational change in which the GCN2 domains rotate 180° normal to the dimerization surface and thereby transpose from their antiparallel to a parallel orientation. Subsequently, GCN2 is activated. GCN2 activation results from a conformation that facilitates ATP binding, leading to autophosphorylation of an activation loop which leads to maximal GCN2 kinase activity. Function Regulation of translation GCN2 inhibits general translation by phosphorylation of eIF-2α at serine 51 within 15 min of amino acid deprivation, which then subsequently increases the affinity for the guanine exchange factor eIF2B to sequester eIF-2α leading to reduced formation of the ternary complex (TC) consisting of eIF2, GTP and the initiator Met-tRNA
https://en.wikipedia.org/wiki/Biomaterial
A biomaterial is a substance that has been engineered to interact with biological systems for a medical purpose, either a therapeutic (treat, augment, repair, or replace a tissue function of the body) or a diagnostic one. The corresponding field of study, called biomaterials science or biomaterials engineering, is about fifty years old. It has experienced steady and strong growth over its history, with many companies investing large amounts of money into the development of new products. Biomaterials science encompasses elements of medicine, biology, chemistry, tissue engineering and materials science. Note that a biomaterial is different from a biological material, such as bone, that is produced by a biological system. Additionally, care should be exercised in defining a biomaterial as biocompatible, since it is application-specific. A biomaterial that is biocompatible or suitable for one application may not be biocompatible in another. Introduction Biomaterials can be derived either from nature or synthesized in the laboratory using a variety of chemical approaches utilizing metallic components, polymers, ceramics or composite materials. They are often used and/or adapted for a medical application, and thus comprise the whole or part of a living structure or biomedical device which performs, augments, or replaces a natural function. Such functions may be relatively passive, like being used for a heart valve, or maybe bioactive with a more interactive functionality such as hydroxy-apatite coated hip implants. Biomaterials are also used every day in dental applications, surgery, and drug delivery. For example, a construct with impregnated pharmaceutical products can be placed into the body, which permits the prolonged release of a drug over an extended period of time. A biomaterial may also be an autograft, allograft or xenograft used as a transplant material. Bioactivity The ability of an engineered biomaterial to induce a physiological response that is suppor
https://en.wikipedia.org/wiki/Human%20biology
Human biology is an interdisciplinary area of academic study that examines humans through the influences and interplay of many diverse fields such as genetics, evolution, physiology, anatomy, epidemiology, anthropology, ecology, nutrition, population genetics, and sociocultural influences. It is closely related to the biomedical sciences, biological anthropology and other biological fields tying in various aspects of human functionality. It wasn't until the 20th century when biogerontologist, Raymond Pearl, founder of the journal Human Biology, phrased the term "human biology" in a way to describe a separate subsection apart from biology. It is also a portmanteau term that describes all biological aspects of the human body, typically using the human body as a type organism for Mammalia, and in that context it is the basis for many undergraduate University degrees and modules. Most aspects of human biology are identical or very similar to general mammalian biology. In particular, and as examples, humans : maintain their body temperature have an internal skeleton have a circulatory system have a nervous system to provide sensory information and operate and coordinate muscular activity. have a reproductive system in which they bear live young and produce milk. have an endocrine system and produce and eliminate hormones and other bio-chemical signalling agents have a respiratory system where air is inhaled into lungs and oxygen is used to produce energy. have an immune system to protect against disease Excrete waste as urine and feces. History The start of integrated human biology started in the 1920's, caused by Charles Darwin's theories, such as evolution, were re-conceptualized by many scientists. Human attributes, such as child growth and genetics, were put into question and thus human biology was created. Typical human attributes The key aspects of human biology are those ways in which humans are substantially different from other mammals. Humans ha
https://en.wikipedia.org/wiki/Knuth%27s%20Simpath%20algorithm
Simpath is an algorithm introduced by Donald Knuth that constructs a zero-suppressed decision diagram (ZDD) representing all simple paths between two vertices in a given graph.
https://en.wikipedia.org/wiki/Array%20controller%20based%20encryption
Within a storage network, encryption of data may occur at different hardware levels. Array controller based encryption describes the encryption of data occurring at the disk array controller before being sent to the disk drives. This article will provide an overview of different implementation techniques to array controller based encryption. For cryptographic and encryption theory, see disk encryption theory. Possible points of encryption in SAN The encryption of data can take place in many points in a storage network. The point of encryption may occur on the host computer, in the SAN infrastructure, the array controller or on each of the hard disks as shown on the diagram above. Each point of encryption has different merits and costs. Within the diagram, the key server components are also shown for each configuration of encryption. Designers of SANs and SAN components must take into consideration factors such as performance, deployment complexity, key server interoperability, strength of security, and cost when choosing where to implement encryption. But since the array controller is a natural central point of all data therefore encryption at this level is inherent and also reduces deployment complexity. Array controller-based encryption With different configurations of a hardware or software array controller, there are different types of solutions for this type of encryption. Each of these solutions can be built into existing infrastructures by replacing or upgrading certain components. Basic components include an encryption key server, key management client, and commonly an encryption unit which are all implemented into a storage network. Internal array controller encryption For an internal array controller configuration, the array controller is generally a PCI bus card situated inside the host computer. As shown in the diagram, the PCI array controller would contain an encryption unit where plaintext data is encrypted into ciphertext. This separate enc
https://en.wikipedia.org/wiki/Monkey%20patch
Monkey patching is a technique used to dynamically update the behavior of a piece of code at run-time. A monkey patch (also spelled monkey-patch, MonkeyPatch) is a way to extend or modify the runtime code of dynamic languages (e.g. Smalltalk, JavaScript, Objective-C, Ruby, Perl, Python, Groovy, etc.) without altering the original source code. Etymology The term monkey patch seems to have come from an earlier term, guerrilla patch, which referred to changing code sneakily – and possibly incompatibly with other such patches – at runtime. The word guerrilla, nearly homophonous with gorilla, became monkey, possibly to make the patch sound less intimidating. An alternative etymology is that it refers to “monkeying about” with the code (messing with it). Despite the name's suggestion, the "monkey patch" is sometimes the official method of extending a program. For example, web browsers such as Firefox and Internet Explorer used to encourage this, although modern browsers (including Firefox) now have an official extensions system. Definitions The definition of the term varies depending upon the community using it. In Ruby, Python, and many other dynamic programming languages, the term monkey patch only refers to dynamic modifications of a class or module at runtime, motivated by the intent to patch existing third-party code as a workaround to a bug or feature which does not act as desired. Other forms of modifying classes at runtime have different names, based on their different intents. For example, in Zope and Plone, security patches are often delivered using dynamic class modification, but they are called hot fixes. Applications Monkey patching is used to: Replace methods / classes / attributes / functions at runtime, e.g. to stub out a function during testing; Modify/extend behaviour of a third-party product without maintaining a private copy of the source code; Apply the result of a patch at runtime to the state in memory, instead of the source code on disk; Distr
https://en.wikipedia.org/wiki/Carl%20Gustav%20Hempel
Carl Gustav "Peter" Hempel (January 8, 1905 – November 9, 1997) was a German writer, philosopher, logician, and epistemologist. He was a major figure in logical empiricism, a 20th-century movement in the philosophy of science. He is especially well known for his articulation of the deductive-nomological model of scientific explanation, which was considered the "standard model" of scientific explanation during the 1950s and 1960s. He is also known for the raven paradox (also known as "Hempel's paradox"). Education Hempel studied mathematics, physics and philosophy at the University of Göttingen and subsequently at the University of Berlin and the Heidelberg University. In Göttingen, he encountered David Hilbert and was impressed by his program attempting to base all mathematics on solid logical foundations derived from a limited number of axioms. After moving to Berlin, Hempel participated in a congress on scientific philosophy in 1929 where he met Rudolf Carnap and became involved in the Berlin Circle of philosophers associated with the Vienna Circle. In 1934, he received his doctoral degree from the University of Berlin with a dissertation on probability theory, titled Beiträge zur logischen Analyse des Wahrscheinlichkeitsbegriffs (Contributions to the Logical Analysis of the Concept of Probability). Hans Reichenbach was Hempel's main doctoral supervisor, but after Reichenbach lost his philosophy chair in Berlin in 1933, Wolfgang Köhler and Nicolai Hartmann became the official supervisors. Career Within a year of completing his doctorate, the increasingly repressive and anti-semitic Nazi regime in Germany had prompted Hempel to emigrate to Belgium as his wife was of Jewish ancestry. In this he was aided by the scientist Paul Oppenheim, with whom he co-authored the book Der Typusbegriff im Lichte der neuen Logik on typology and logic in 1936. In 1937, Hempel emigrated to the United States, where he accepted a position as Carnap's assistant at the University of
https://en.wikipedia.org/wiki/Jet%20force
Jet force is the exhaust from some machine, especially aircraft, propelling the object itself in the opposite direction as per Newton's third law. An understanding of jet force is intrinsic to the launching of drones, satellites, rockets, airplanes and other airborne machines. Jet force begins with some propulsion system; in the case of a rocket, this is usually some system that kicks out combustible gases from the bottom. This repulsion system pushes out these gas molecules in the direction opposite the intended motion so rapidly that the opposite force, acting 180° away from the direction the gas molecules are moving, (as such, in the intended direction of movement) pushes the rocket up. A common wrong assumption is that the rocket elevates by pushing off the ground. If this were the case, the rocket would be unable to continue moving upwards after the aircraft is no longer close to the ground. Rather, the opposite force by the expelled gases is the reason for movement. Thrust, lift, weight and drag The jet force can be divided into components. The "forward" component of this force is generally referred to as thrust. The upward component of jet force is referred to as lift. There are also two other forces that impact motion of aircraft. Drag, which is also referred to as air resistance, is the force that opposes motion. As such, it acts against both components of the jet force (both the thrust and the lift). The fourth and final force is the weight itself, which acts directly downward. Thrust To analyze thrust, we take a mathematical perspective. First, an aircraft takes off at some angle with respect to the ground. For a rocket traveling straight "up", this angle would be 90°, or at least close to 90°. For airplanes and most other aircraft, this angle will be much less, generally ranging from 0° to 60°. We shall define this angle as θ. θ is constantly changing as the aircraft moves around. At any given moment, however, the cosine of this angle θ will give
https://en.wikipedia.org/wiki/Symmetry%20breaking%20of%20escaping%20ants
Symmetry breaking of escaping ants is a herd behavior phenomenon observed when ants are constrained to a cell with two equidistant exits and then sprayed with an insect repellent. The ants tend to crowd one door more while trying to escape (i.e., there is a symmetry breaking in their escape behavior), thereby decreasing evacuation efficiency. Description This phenomenon arises in experiments where worker ants are enclosed in circular cells with a glass cover in such a way that they can only move in two dimensions (i.e., ants cannot pass over one other). The cell has two exits located symmetrically relative to its center. The experiments consisted of two different sets of trials. In the first set of trials, both exits were opened at the same time, letting the ants escape. After 30 repetitions, one door was used 13.666% more than the other. In the second set of trials, the configuration was identical, but a few seconds before opening the doors, a dose of 50 µL of insect repellent was injected into the cell at its center through a small hole in the glass cover. After 30 repetitions, one door was used 38.3% more than the other. History Inspired by earlier computer simulations that predicted a symmetry-breaking phenomenon when panicked humans escape from a room with two equivalent exits, a team of researchers led by E. Altschuler carried out the two experiments described above, which revealed the symmetry-breaking effect in the leafcutter ant Atta insular in the presence of insect repellent. Another team of researchers led by Geng Li investigated the influence of the ant group's density on the symmetry breaking. They used the red imported fire ant to repeat the experiment with different amounts of ants. The results show that symmetry breaking is high at low densities of ants, but decreases beyond a certain point in the density of ants. In other words, when density is low, the ant group produces a collective escaping behavior, while at high density, their behavior i
https://en.wikipedia.org/wiki/Superficial%20cervical%20lymph%20nodes
The superficial cervical lymph nodes are lymph nodes that lie near the surface of the neck. Some sources state simply that they lie along the external jugular vein, while other sources state that they are only adjacent to the external jugular vein in the posterior triangle, and they are adjacent to the anterior jugular vein in the anterior triangle. They can be broken down into: superficial anterior cervical lymph nodes superficial lateral cervical lymph nodes
https://en.wikipedia.org/wiki/Digital%20sound%20file%20formats%20using%20the%20.snd%20extension
SND (SouND) file is a file extension that indicates that the file is a digital sound file. File contents Most commonly a file contains a NeXT sound file. This is essentially the same as the au file format used by Sun Microsystems. The first four bytes of a file contain the hex number 0x2e736e64 which displays as "" when interpreted as ASCII text. Another file format is attributed to Apple Inc. Data stored in such files are commands for the Macintosh Sound Manager including 'wavetable' sample-based instruments and sound samples. It can serve as a pure audio file format if only one command and one sound sample is stored in it. In this format, the first two bytes specify a 16-bit integer representing the numbers 1 or 2. Programs supporting audio files with the extension generally assume, and check, that it is NeXT/SUN (AU) format. Electronic music instrument manufacturer Akai had an audio file format with the extension . The first byte contains the number 1 and the second the number 4. The manufacturer of the HOM-BOT Robot Vacuum Cleaner LG Group and the VTech V.Flash use audio files with the extension . The sounds are encoded in PCM (single channel, 16 kHz, 16 bits signed). The Unity Game Engine uses a compressed format called .snd for sound packages. See also Au file format
https://en.wikipedia.org/wiki/Testosterone%20sulfate
Testosterone sulfate is an endogenous, naturally occurring steroid and minor urinary metabolite of testosterone. See also Androstanediol glucuronide Androsterone glucuronide Etiocholanolone glucuronide Testosterone glucuronide
https://en.wikipedia.org/wiki/4D%20SAS
4D SAS is a French company owned by Laurent Ribardière. 4D has a US-based subsidiary 4D Inc. 4D was founded in 1984 when development began for Silver Surfer (early codename for 4D) and had its initial product release in 1987 with its own Programming Language. It is the developer and publisher of 4D (or 4th Dimension) and the original developer of Wakanda.
https://en.wikipedia.org/wiki/Density%20%28computer%20storage%29
Density is a measure of the quantity of information bits that can be stored on a given length (linear density) of track, area of the surface (areal density), or in a given volume (volumetric density) of a computer storage medium. Generally, higher density is more desirable, for it allows more data to be stored in the same physical space. Density therefore has a direct relationship to storage capacity of a given medium. Density also generally affects the performance within a particular medium, as well as price. Storage device classes Solid state media Solid state drives use flash memory to store non-volatile media. They are the latest form of mass produced storage and rival magnetic disk media. Solid state media data is saved to a pool of NAND flash. NAND itself is made up of what are called floating gate transistors. Unlike the transistor designs used in DRAM, which must be refreshed multiple times per second, NAND flash is designed to retain its charge state even when not powered up. The highest capacity drives commercially available are the Nimbus Data Exadrive© DC series drives, these drives come in capacities ranging 16TB to 100TB. Nimbus states that for its size the 100TB SSD has a 6:1 space saving ratio over a nearline HDD Magnetic disk media Hard disk drives store data in the magnetic polarization of small patches of the surface coating on a disk. The maximum areal density is defined by the size of the magnetic particles in the surface, as well as the size of the "head" used to read and write the data. In 1956 the first hard drive, the IBM 350, had an areal density of 2,000 bit/in2. Since then, the increase in density has matched Moore's Law, reaching 1 Tbit/in2 in 2014. In 2015, Seagate introduced a hard drive with a density of 1.34 Tbit/in2, more than 600 million times that of the IBM 350. It is expected that current recording technology can "feasibly" scale to at least 5 Tbit/in2 in the near future. New technologies like heat-assisted magnetic record
https://en.wikipedia.org/wiki/Hironaka%27s%20example
In geometry, Hironaka's example is a non-Kähler complex manifold that is a deformation of Kähler manifolds found by . Hironaka's example can be used to show that several other plausible statements holding for smooth varieties of dimension at most 2 fail for smooth varieties of dimension at least 3. Hironaka's example Take two smooth curves C and D in a smooth projective 3-fold P, intersecting in two points c and d that are nodes for the reducible curve . For some applications these should be chosen so that there is a fixed-point-free automorphism exchanging the curves C and D and also exchanging the points c and d. Hironaka's example V is obtained by gluing two quasi-projective varieties and . Let be the variety obtained by blowing up along and then along the strict transform of , and let be the variety obtained by blowing up along D and then along the strict transform of C. Since these are isomorphic over , they can be glued, which results in a proper variety V. Then V has two smooth rational curves L and M lying over c and d such that is algebraically equivalent to 0, so V cannot be projective. For an explicit example of this configuration, take t to be a point of order 2 in an elliptic curve E, take P to be , take C and D to be the sets of points of the form and , so that c and d are the points (0,0,0) and , and take the involution σ to be the one taking to . A complete abstract variety that is not projective Hironaka's variety is a smooth 3-dimensional complete variety but is not projective as it has a non-trivial curve algebraically equivalent to 0. Any 2-dimensional smooth complete variety is projective, so 3 is the smallest possible dimension for such an example. There are plenty of 2-dimensional complex manifolds that are not algebraic, such as Hopf surfaces (non Kähler) and non-algebraic tori (Kähler). An effective cycle algebraically equivalent to 0 In a projective variety, a nonzero effective cycle has non-zero degree so cannot be alge
https://en.wikipedia.org/wiki/Geophilic
Geophilic means soil loving or preferring the soil. This term is usually used when referring to certain types of fungi or molds that live in the soil. Many of these organisms are usually recovered from the soil but occasionally infect humans and animals. They cause a marked inflammatory reaction, which limits the spread of the infection and may lead to a spontaneous cure but may also leave scars. Can also refer to someone who loves the earth, sustainability, or “green” initiatives. An individual with these tendencies may be referred to as a "geophile."
https://en.wikipedia.org/wiki/Urban%20gardening
Urban gardening may refer to: Urban Garden (sculpture), Seattle, Washington, U.S. The practice of growing vegetables, fruit and plants in urban areas, such as schools, backyards or apartment balconies. Container garden - Growing plants in pots or other containers, rather than in ground Urban horticulture - Growing crops or ornamental plants in urban or semi-urban setting Urban agriculture - Food production in urban setting Windowbox Urban park
https://en.wikipedia.org/wiki/Mercurial
Mercurial is a distributed revision control tool for software developers. It is supported on Microsoft Windows and Unix-like systems, such as FreeBSD, macOS, and Linux. Mercurial's major design goals include high performance and scalability, decentralization, fully distributed collaborative development, robust handling of both plain text and binary files, and advanced branching and merging capabilities, while remaining conceptually simple. It includes an integrated web-interface. Mercurial has also taken steps to ease the transition for users of other version control systems, particularly Subversion. Mercurial is primarily a command-line driven program, but graphical user interface extensions are available, e.g. TortoiseHg, and several IDEs offer support for version control with Mercurial. All of Mercurial's operations are invoked as arguments to its driver program hg (a reference to Hg – the chemical symbol of the element mercury). Olivia Mackall originated Mercurial and served as its lead developer until late 2016. Mercurial is released as free software under the GPL-2.0-or-later license. It is mainly implemented using the Python programming language, but includes a binary diff implementation written in C. History Mackall first announced Mercurial on 19 April 2005. The impetus for this was the announcement earlier that month by Bitmover that they were withdrawing the free version of BitKeeper because of the development of SourcePuller. BitKeeper had been used for the version control requirements of the Linux kernel project. Mackall decided to write a distributed version control system as a replacement for use with the Linux kernel. This project started a few days after the now well-known Git project was initiated by Linus Torvalds with similar aims. The Linux kernel project decided to use Git rather than Mercurial, but Mercurial is now used by many other projects (see below). In an answer on the Mercurial mailing list, Olivia Mackall explained how the name
https://en.wikipedia.org/wiki/Rehabilitation%20psychology
Rehabilitation psychology is a specialty area of psychology aimed at maximizing the independence, functional status, health, and social participation of individuals with disabilities and chronic health conditions. Assessment and treatment may include the following areas: psychosocial, cognitive, behavioral, and functional status, self-esteem, coping skills, and quality of life. As the conditions experienced by patients vary widely, rehabilitation psychologists offer individualized treatment approaches. The discipline takes a holistic approach, considering individuals within their broader social context and assessing environmental and demographic factors that may facilitate or impede functioning. This approach, integrating both personal (e.g., deficits, impairments, strengths, assets) and environmental factors, is consistent with the World Health Organization's (WHO) International Classification of Functioning, Disability and Health (ICF). In addition to clinical practice, rehabilitation psychologists engage in consultation, program development, teaching, training, public policy, and advocacy. Rehabilitation psychology shares some technical competencies with the specialties of clinical neuropsychology, counseling psychology, and health psychology; however, Rehabilitation Psychology is distinctive in its focus on working with individuals with all types of disability and chronic health conditions to maintain/gain and advance in vocation; in the context of interdisciplinary health care teams; and as social change agents to improve societal attitudes toward individuals living with disabilities and chronic health conditions. Rehabilitation psychologists work as advocates with persons with disabilities to eliminate attitudinal, policy, and physical barriers, and to emphasize employment, environmental access, and social role and community integration.   Rehabilitation psychologists provide clinical services in varied healthcare settings, including acute care hospitals, in
https://en.wikipedia.org/wiki/BlackBerry%20Tablet%20OS
BlackBerry Tablet OS is an operating system from BlackBerry Ltd based on the QNX Neutrino real-time operating system designed to run Adobe AIR and BlackBerry WebWorks applications, currently available for the BlackBerry PlayBook tablet computer. The BlackBerry Tablet OS is the first tablet running an operating system from QNX (now a subsidiary of RIM). BlackBerry Tablet OS supports standard BlackBerry Java applications. Support for Android apps has also been announced, through sandbox "app players" which can be ported by developers or installed through sideloading by users. A BlackBerry Tablet OS Native Development Kit, to develop native applications with the GNU toolchain is currently in closed beta testing. The first device to run BlackBerry Tablet OS was the BlackBerry PlayBook tablet computer. A similar QNX-based operating system, known as BlackBerry 10, replaced the long-standing BlackBerry OS on handsets after version 7. See also BlackBerry OS BlackBerry 10
https://en.wikipedia.org/wiki/Trena%20Wilkerson
Trena L. Wilkerson (born 1954) is an American mathematician and mathematics educator. She is a Professor of Mathematics Education in the Department of Curriculum & Instruction at Baylor University, and the president of the National Council of Teachers of Mathematics for the 2020–2022 term. Education and career Wilkerson majored in mathematics at Mississippi College, earned a master's degree in mathematics education from Southeastern Louisiana University, and worked as a high school teacher in Louisiana for 18 years, from 1976 to 1994. Returning to graduate study, she earned a Ph.D. in curriculum and instruction in 1994 at the University of Southern Mississippi, specializing in mathematics education, and became an assistant research professor at Louisiana State University from 1994 to 1999, when she moved to her present position at Baylor.
https://en.wikipedia.org/wiki/Discretization%20error
In numerical analysis, computational physics, and simulation, discretization error is the error resulting from the fact that a function of a continuous variable is represented in the computer by a finite number of evaluations, for example, on a lattice. Discretization error can usually be reduced by using a more finely spaced lattice, with an increased computational cost. Examples Discretization error is the principal source of error in methods of finite differences and the pseudo-spectral method of computational physics. When we define the derivative of as or , where is a finitely small number, the difference between the first formula and this approximation is known as discretization error. Related phenomena In signal processing, the analog of discretization is sampling, and results in no loss if the conditions of the sampling theorem are satisfied, otherwise the resulting error is called aliasing. Discretization error, which arises from finite resolution in the domain, should not be confused with quantization error, which is finite resolution in the range (values), nor in round-off error arising from floating-point arithmetic. Discretization error would occur even if it were possible to represent the values exactly and use exact arithmetic – it is the error from representing a function by its values at a discrete set of points, not an error in these values.
https://en.wikipedia.org/wiki/Muller%27s%20morphs
Hermann J. Muller (1890–1967), who was a 1946 Nobel Prize winner, coined the terms amorph, hypomorph, hypermorph, antimorph and neomorph to classify mutations based on their behaviour in various genetic situations, as well as gene interaction between themselves. These classifications are still widely used in Drosophila genetics to describe mutations. For a more general description of mutations, see mutation, and for a discussion of allele interactions, see dominance relationship. Key: In the following sections, alleles are referred to as +=wildtype, m=mutant, Df=gene deletion, Dp=gene duplication. Phenotypes are compared with '>', meaning 'phenotype is more severe thanLoss of function AmorphAmorphic describes a mutation that causes complete loss of gene function. Amorph is sometimes used interchangeably with "genetic null". An amorphic mutation might cause complete loss of protein function by disrupting translation ("protein null") and/or preventing transcription ("RNA null"). An amorphic allele elicits the same phenotype when homozygous and when heterozygous to a chromosomal deletion or deficiency that disrupts the same gene. This relationship can be represented as follows: m/m = m/Df An amorphic allele is commonly recessive to its wildtype counterpart. It is possible for an amorph to be dominant if the gene in question is required in two copies to elicit a normal phenotype (i.e. haploinsufficient). HypomorphHypomorphic describes a mutation that causes a partial loss of gene function. A hypomorph is a reduction in gene function through reduced (protein, RNA) expression or reduced functional performance, but not a complete loss. The phenotype of a hypomorph is more severe in trans to a deletion allele than when homozygous. m/DF > m/m Hypomorphs are usually recessive, but occasional alleles are dominant due to haploinsufficiency. Gain of function Hypermorph A hypermorphic mutation causes an increase in normal gene function. Hypermorphic alleles are gain o
https://en.wikipedia.org/wiki/Curtis%20Greene
Curtis Greene is an American mathematician, specializing in algebraic combinatorics. He is the J. McLain King Professor of Mathematics at Haverford College in Pennsylvania. Greene did his undergraduate studies at Harvard University, and earned his Ph.D. in 1969 from the California Institute of Technology under the supervision of Robert P. Dilworth. He held positions at the Massachusetts Institute of Technology and the University of Pennsylvania before moving to Haverford. Greene has written highly cited research papers on Sperner families, Young tableaux, and combinatorial equivalences between hyperplane arrangements, zonotopes, and graph orientations. With Daniel Kleitman, he has also written a highly cited survey paper on combinatorial proof techniques. In 2012 he became a fellow of the American Mathematical Society.
https://en.wikipedia.org/wiki/Extreme%20learning%20machine
Extreme learning machines are feedforward neural networks for classification, regression, clustering, sparse approximation, compression and feature learning with a single layer or multiple layers of hidden nodes, where the parameters of hidden nodes (not just the weights connecting inputs to hidden nodes) need to be tuned. These hidden nodes can be randomly assigned and never updated (i.e. they are random projection but with nonlinear transforms), or can be inherited from their ancestors without being changed. In most cases, the output weights of hidden nodes are usually learned in a single step, which essentially amounts to learning a linear model. The name "extreme learning machine" (ELM) was given to such models by Guang-Bin Huang. The idea goes back to Frank Rosenblatt, who not only published a single layer Perceptron in 1958, but also introduced a multi layer perceptron with 3 layers: an input layer, a hidden layer with randomized weights that did not learn, and a learning output layer. According to some researchers, these models are able to produce good generalization performance and learn thousands of times faster than networks trained using backpropagation. In literature, it also shows that these models can outperform support vector machines in both classification and regression applications. History From 2001-2010, ELM research mainly focused on the unified learning framework for "generalized" single-hidden layer feedforward neural networks (SLFNs), including but not limited to sigmoid networks, RBF networks, threshold networks, trigonometric networks, fuzzy inference systems, Fourier series, Laplacian transform, wavelet networks, etc. One significant achievement made in those years is to successfully prove the universal approximation and classification capabilities of ELM in theory. From 2010 to 2015, ELM research extended to the unified learning framework for kernel learning, SVM and a few typical feature learning methods such as Principal Compon
https://en.wikipedia.org/wiki/CrysTBox
CrysTBox (Crystallographic Tool Box) is a suite of computer tools designed to accelerate material research based on transmission electron microscope images via highly accurate automated analysis and interactive visualization. Relying on artificial intelligence and computer vision, CrysTBox makes routine crystallographic analyses simpler, faster and more accurate compared to human evaluators. The high level of automation together with sub-pixel precision and interactive visualization makes the quantitative crystallographic analysis accessible even for non-crystallographers allowing for an interdisciplinary research. Simultaneously, experienced material scientists can take advantage of advanced functionalities for comprehensive analyses. CrysTBox is being developed in the Laboratory of electron microscopy at the Institute of Physics of the Czech Academy of Sciences. For academic purposes, it is available for free. As of 2022, the suite has been deployed at research and educational facilities in more than 90 countries supporting research of ETH Zurich, Lawrence Berkeley National Laboratory, Max Planck Institutes, Chinese Academy of Sciences, Fraunhofer Institutes or Oxford University. Suite As a scientific tool, CrysTBox suite is freely available for academic purposes, it supports file formats widely used in the community and offers interconnection with other scientific software. Availability CrysTBox is freely available on demand for non-commercial use by non-commercial subjects. The only safe way to download CrysTBox installers is via a request form on the official website. Commercial use is not allowed due to the license of MATLAB used for CrysTBox compilation. Notable research and users Besides education, CrysTBox is mainly used in research with fields of application spanning from nuclear research to archaeology and paleontology. Among others, the suite was employed in development of additive manufacturing (including 3D printed biodegradable alloys, met
https://en.wikipedia.org/wiki/Decimal128%20floating-point%20format
decimal128 is a decimal floating-point computer number format that occupies 128 bits in computer memory. Formally introduced in IEEE 754-2008, it is intended for applications where it is necessary to emulate decimal rounding exactly, such as financial and tax computations. decimal128 supports 34 decimal digits of significand and an exponent range of −6143 to +6144, i.e. to . Because the significand is not normalized, most values with less than 34 significant digits have multiple possible representations; , etc. Zero has 12288 possible representations (24576 including negative zero). Representation of decimal128 values IEEE 754 allows two alternative representation methods for decimal128 values. The standard does not specify how to signify which representation is used, for instance in a situation where decimal128 values are communicated between systems. In one representation method, based on binary integer decimal (BID), the significand is represented as binary coded positive integer. The other, alternative, representation method is based on densely packed decimal (DPD) for most of the significand (except the most significant digit). Both alternatives provide exactly the same range of representable numbers: 34 digits of significand and possible exponent values. In both cases, the most significant 4 bits of the significand (which actually only have 10 possible values) are combined with the most significant 2 bits of the exponent (3 possible values) to use 30 of the 32 possible values of 5 bits in the combination field. The remaining combinations encode infinities and NaNs. In the case of Infinity and NaN, all other bits of the encoding are ignored. Thus, it is possible to initialize an array to Infinities or NaNs by filling it with a single byte value. Binary integer significand field This format uses a binary significand from 0 to = = 1ED09BEAD87C0378D8E63FFFFFFFF16 = . The encoding can represent binary significands up to = but values larger than
https://en.wikipedia.org/wiki/ACAT1
Acetyl-CoA acetyltransferase, mitochondrial, also known as acetoacetyl-CoA thiolase, is an enzyme that in humans is encoded by the ACAT1 (Acetyl-Coenzyme A acetyltransferase 1) gene. Acetyl-Coenzyme A acetyltransferase 1 is an acetyl-CoA C-acetyltransferase enzyme. Structure The gene is located on chromosome 11q22.3‐q23.1, spanning approx. 27 kb and contains twelve exons interrupted by eleven introns. The region flanking the 5’ end of the gene lacks a TATA box, but contains many GC’s and also has two CAAT boxes. The gene also may have a binding site for the transcription factor Sp1, and has sequences resembling the binding sites of several other transcription factors. Additionally, there is a 101-bp DNA fragment immediately upstream from the cap site that has promoter activity. The human ACAT1 gene produces a chimeric mRNA through trans-splicing, a process in which separate transcripts from chromosomes 1 and 7 are spliced together. The chimeric mRNA transcript uses two sections to initiate translation: AUG(1397-1399) and GGC(1274-1276). Initiation of the first codon (AUG) results in the translation of a 50-kDa ACAT1, and initiation of the other (GGC) produces another enzymatically active 56-kDa isoform respectively; the 56kDa isoform is naturally present in human cells, including human monocyte-derived macrophages. The resulting transcript encodes ACAT1, which is a 45.1 kDa protein composed of 427 amino acids. It is also a homotetrameric protein that has nine transmembrane domains (TMDs). One active residue is a Histidine at the 460th position, which is in the 7th TMD. ACAT1 has seven free Cysteine residues, but they do not affect catalytic activity. There are two functional sections of this protein, TMD7 and TMD8; one side is involved in substrate binding and catalysis, while the other is involved in subunit interactions and binding Function This gene encodes a mitochondrially localized enzyme that catalyzes the reversible formation of acetoacetyl-CoA from
https://en.wikipedia.org/wiki/Kirsch%20equations
The Kirsch equations describe the elastic stresses around the hole in an infinite plate in one directional tension. They are named after Ernst Gustav Kirsch. Result Loading an infinite plate with circular hole of radius a with stress σ, the resulting stress field is:
https://en.wikipedia.org/wiki/Psathyrella%20piluliformis
Psathyrella piluliformis is a species of agaric fungus in the family Psathyrellaceae. It produces fruit bodies (mushrooms) with broadly convex caps measuring in diameter. The caps are chestnut to reddish brown, the color fading in age and with dry weather. The closely spaced gills have an adnate attachment to the stipe. They are initially tan until the spores mature, when the gills turn dark brown. Fragments of the partial veil may remain on the cap margin, and as a wispy band of hairs on the stipe. The stipe is 2–7 cm tall and 3–7 mm wide, white, smooth, hollow, and bulging at the base. Fruiting occurs in clusters at the base of hardwood stumps. It is considered edible but of low quality, with fragile flesh and being difficult to identify. Similar species include Psathyrella carbonicola, P. longipes, P. longistriata, P. multipedata, P. spadicea, and Parasola conopilus. See also List of Psathyrella species
https://en.wikipedia.org/wiki/Diamond%20v.%20Chakrabarty
Diamond v. Chakrabarty, 447 U.S. 303 (1980), was a United States Supreme Court case dealing with whether living organisms can be patented. Writing for a five-justice majority, Chief Justice Warren E. Burger held that human-made bacteria could be patented under the patent laws of the United States because such an invention constituted a "manufacture" or "composition of matter". Justice William J. Brennan Jr., along with Justices Byron White, Thurgood Marshall, and Lewis F. Powell Jr., dissented from the Court's ruling, arguing that because Congress had not expressly authorized the patenting of biological organisms, the Court should not extend patent law to cover them. In the decades since the Court's ruling, the case has been recognized as a landmark case for U.S. patent law, with industry and legal commentators identifying it as a turning point for the biotechnology industry. Background Genetic engineer Ananda Mohan Chakrabarty, working for General Electric, developed a bacterium (derived from the Pseudomonas genus and now known as Pseudomonas putida) capable of breaking down crude oil, which he proposed to use in treating oil spills. General Electric filed a patent application for the bacterium in the United States listing Chakrabarty as the inventor, but the application was rejected by a patent examiner, because under patent law at that time, living things were generally understood to not be patentable subject matter under 35 U.S.C. § 101. General Electric and Chakrabarty appealed the examiner's decision to the Board of Patent Appeals and Interferences. The Board however agreed with the examiner that the bacterium was not patentable under current law. General Electric and Chakrabarty thereafter appealed the Board's decision to the United States Court of Customs and Patent Appeals. This time, General Electric and Chakrabarty prevailed with the court overturning the examiner's decision and holding "the fact that micro-organisms are alive is without legal si
https://en.wikipedia.org/wiki/Helion%20%28chemistry%29
A helion (symbol h) is the nucleus of a helium atom, a doubly positively charged cation. The term helion is a portmanteau of helium and ion, and in practice refers specifically to the nucleus of the helium-3 isotope, consisting of two protons and one neutron. The nucleus of the other stable isotope of helium, helium-4, which consists of two protons and two neutrons, is called an alpha particle. This particle is the daughter product in the beta-minus decay of tritium, an isotope of hydrogen: {| border="0" |- style="height:2em;" |||→ || ||+ || ||+ || |} CODATA reports the mass of a helion particle as =  Helions are intermediate products in the proton–proton chain reaction in stellar fusion. An antihelion is the antiparticle of a helion, consisting of two antiprotons and an antineutron.
https://en.wikipedia.org/wiki/Iliopubic%20eminence
Medial to the anterior inferior iliac spine is a broad, shallow groove, over which the iliacus and psoas major muscles pass. This groove is bounded medially by an eminence, the iliopubic eminence (or iliopectineal eminence), which marks the point of union of the ilium and pubis. It constitutes a lateral border of the pelvic inlet. The iliopectineal line is the border of the eminence. The psoas minor, when present, inserts at the pectineal line of the eminence. Additional images See also Iliofemoral ligament
https://en.wikipedia.org/wiki/Tur%C3%A1n%27s%20inequalities
In mathematics, Turán's inequalities are some inequalities for Legendre polynomials found by (and first published by ). There are many generalizations to other polynomials, often called Turán's inequalities, given by and other authors. If is the th Legendre polynomial, Turán's inequalities state that For , the th Hermite polynomial, Turán's inequalities are whilst for Chebyshev polynomials they are See also Askey–Gasper inequality Sturm Chain
https://en.wikipedia.org/wiki/Anabella%20Villalobos
Anabella P. Villalobos is a medicinal chemist and senior pharmaceutical executive at Biogen. Background and career Villalobos was raised in Panama City. She received her BS in chemistry from the University of Panama, received her Ph.D. (1987) at the University of Kansas with Professor Lester A. Mitscher, and was a National Institutes of Health postdoctoral fellow at Yale University, working with Samuel J. Danishefsky. She joined Pfizer in 1989, working on a variety of Central nervous system (CNS) projects in medicinal chemistry, diagnostics, and Positron emission tomography imaging radiotracers against Alzheimer's disease. In 2001, Villalobos became Head of CNS Medicinal Chemistry, and in 2007 Head of Antibacterial and CNS Chemistry. By 2016, she was VP of Neuroscience and Pain medicinal chemistry, and published a video outreach campaign to describe her work. In 2017, Villalobos was recruited to be the Senior Vice President for Biotherapeutics & Medicinal Sciences at Biogen. Awards and honors 2014: Connecticut Women's Hall of Fame honoree 2010: CURE award for neuroscience research 1987-1989: NIH postdoctoral fellow 1981-1983: Fulbright-Hays fellow
https://en.wikipedia.org/wiki/SI%20960
The Israeli Standards Institute's Standard SI 960 defines a 7-bit Hebrew code page. It is derived from, but does not conform to, ISO/IEC 646; more specifically, it follows ASCII except for the lowercase letters and backtick (`), which are replaced by the naturally ordered Hebrew alphabet. It is also known as DEC Hebrew (7-bit), because DEC standardized this character set before it became an international standard. Kermit named it hebrew-7 and HEBREW-7. The Hebrew alphabet is mapped to positions 0x60–0x7A, on top of the lowercase Latin letters (and grave accent for aleph). 7-bit Hebrew is stored in visual order. This mapping with the high bit set, i.e. with the Hebrew letters in 0xE0–0xFA, is also reflected in ISO 8859-8. Code page layout See also ISO/IEC 646 DEC National Replacement Character Set (NRCS) SI 1311
https://en.wikipedia.org/wiki/Clairaut%27s%20relation%20%28differential%20geometry%29
In classical differential geometry, Clairaut's relation, named after Alexis Claude de Clairaut, is a formula that characterizes the great circle paths on the unit sphere. The formula states that if γ is a parametrization of a great circle then where ρ(P) is the distance from a point P on the great circle to the z-axis, and ψ(P) is the angle between the great circle and the meridian through the point P. The relation remains valid for a geodesic on an arbitrary surface of revolution. A statement of the general version of Clairaut's relation is: Pressley (p. 185) explains this theorem as an expression of conservation of angular momentum about the axis of revolution when a particle moves along a geodesic under no forces other than those that keep it on the surface.
https://en.wikipedia.org/wiki/Twine%20%28social%20network%29
Twine was an online, social web service for information storage, authoring and discovery, located at twine.com, that existed from 2007 to 2010. It was created and run by Radar Networks. The service was announced on October 19, 2007 and made open to the public on October 21, 2008. On March 11, 2010, Radar Networks was acquired by Evri Inc. along with Twine.com. On May 14, 2010, twine.com was shut down, becoming a redirect to evri.com. Twine combined features of forums, wikis, online databases and newsgroups and employed intelligent software to automatically mine and store data relationships expressed using RDF statements. Site description Twine serviced information storage, authoring and discovery through its website and browser-based tools. The service, intended for regular web users, attempted to automate certain processes related to data categorization and keyword-association (tagging). The system employed natural language processing and machine learning to extract concepts from written text in user data, and expressed it using RDF triples tied to a semantic taxonomy based on concepts mined from Wikipedia. This makes it easier for machines to process the data. The extracted data could be used in searches to additionally select the type of thing the user wanted to find, such as person or location. Twine was a social network and its users could add contacts, send private messages and share information. Users could collaborate on collecting data through private or public twines; data collections focused on a certain topic, such as politics. Data could be imported to Twine's website through conventional uploading of files, writing text with a WYSIWYG editor or using a bookmarking tool for webpages. The tool worked similarly to other social bookmarking websites. Users could manually write summaries, specify keywords (tags) and select an image to include in the bookmark that appears on Twine's website. Certain types of media in bookmarks, such as YouTube videos, we
https://en.wikipedia.org/wiki/Johannes%20Trithemius
Johannes Trithemius (; 1 February 1462 – 13 December 1516), born Johann Heidenberg, was a German Benedictine abbot and a polymath who was active in the German Renaissance as a lexicographer, chronicler, cryptographer, and occultist. He is considered the founder of modern cryptography (a claim shared with Leon Battista Alberti) and steganography, as well as the founder of bibliography and literary studies as branches of knowledge. He had considerable influence on the development of early modern and modern occultism. His students included Heinrich Cornelius Agrippa and Paracelsus. Early life The byname Trithemius refers to his native town of Trittenheim on the Moselle River, at the time part of the Electorate of Trier. When Johannes was still an infant his father, Johann von Heidenburg, died. His stepfather, whom his mother Elisabeth married seven years later, was hostile to education and thus Johannes could only learn in secret and with many difficulties. He learned Greek, Latin, and Hebrew. When he was 17 years old he escaped from his home and wandered around looking for good teachers, travelling to Trier, Cologne, the Netherlands, and Heidelberg. He studied at the University of Heidelberg. Career Travelling from the university to his home town in 1482, he was surprised by a snowstorm and took refuge in the Benedictine abbey of Sponheim near Bad Kreuznach. He decided to stay and was elected abbot in 1483, at the age of twenty-one. He often served as featured speaker and chapter secretary at the Bursfelde Congregation's annual chapter from 1492 to 1503, the annual meeting of reform-minded abbots. Trithemius also supervised the visits of the Congregation's abbeys. Trithemius wrote extensively as a historian, starting with a chronicle of Sponheim and culminating in a two-volume work on the history of Hirsau Abbey. His work was distinguished by mastery of the Latin language and eloquent phrasing, yet it was soon discovered that he inserted several fictional passages
https://en.wikipedia.org/wiki/Superdeterminism
Superdeterminism describes the set of local hidden-variable theories consistent with the results of experiments derived from Bell's theorem which include a local correlation between the measurement settings and the state being measured. Superdeterministic theories are not interpretations of quantum mechanics, but deeper theories which reproduce the predictions of quantum mechanics on average, for which a few toy models have been proposed. In such theories, "the probabilities of quantum theory then become no more mysterious than those used in classical statistical mechanics." Postulating that systems being measured are correlated with the settings of the measurements apparatus, is a violation of what Bell described as a "vital assumption" of his theorem. A hidden-variables theory which is superdeterministic can thus fulfill Bell's notion of local causality and still violate the inequalities derived from Bell's theorem. Unlike , superdeterministic theories cannot be excluded by Bell-type experiments (though they may be bounded) as ultimately the past light cones of all measurement settings and measured states overlap at the Big Bang implying a necessarily shared causal past and thus the possibility of local causal dependence. Overview Bell's theorem assumes that the measurements performed at each detector can be chosen independently of each other and of the hidden variables that determine the measurement outcome. This relation is often referred to as measurement independence or statistical independence. In a superdeterministic theory this relation is not fulfilled; the hidden variables are necessarily correlated with the measurement setting. Since the choice of measurements and the hidden variable are predetermined, the results at one detector can depend on which measurement is done at the other without any need for information to travel faster than the speed of light. The assumption of statistical independence is sometimes referred to as the free choice or free wi
https://en.wikipedia.org/wiki/Sobelivirales
Sobelivirales is an order of RNA viruses which infect eukaryotes. Member viruses have a positive-sense single-stranded RNA genome. The name of the group is a portmanteau of member orders "sobemovirus-like" and -virales which is the suffix for a virus order. Taxonomy The following families are recognized: Alvernaviridae Barnaviridae Solemoviridae
https://en.wikipedia.org/wiki/TB3Cs2H1%20snoRNA
TB3Cs2H1 is a member of the H/ACA-like class of non-coding RNA (ncRNA) molecule that guide the sites of modification of uridines to pseudouridines of substrate RNAs. It is known as a small nucleolar RNA (snoRNA) thus named because of its cellular localization in the nucleolus of the eukaryotic cell. TB3Cs2H1 is predicted to guide the pseudouridylation of LSU5 ribosomal RNA (rRNA) at residue Ψ308. See also TB11Cs2H1 snoRNA TB10Cs1H1 snoRNA
https://en.wikipedia.org/wiki/Saber%20%28Fate/stay%20night%29
, whose real name is (alternatively, Altria Pendragon), is a fictional character from the Japanese 2004 visual novel Fate/stay night by Type-Moon. Saber is a heroic warrior who is summoned by a teenager named Shirou Emiya to participate in a war between masters and servants who are fighting to accomplish their dreams using the mythical Holy Grail. Saber's relationship with the story's other characters depends on the player's decisions; she becomes a love interest to Shirou in the novel's first route and also serves as that route's servant protagonist, a supporting character in the second, and a villain called in the third route. Saber is an agile and mighty warrior who is loyal, independent, and reserved; she appears emotionally cold but is actually suppressing her emotions to focus on her goals. She is also present in the prequel light novel Fate/Zero, in which she is the servant of Shirou's guardian Kiritsugu Emiya during the previous Holy Grail War, and in the sequel Fate/hollow ataraxia. Saber also appears in the novel's printed and animated adaptations, reprising her role in the game. Saber was created by Kinoko Nasu after the series' leading illustrator suggested having an armored woman as a protagonist for the visual novel; writer Gen Urobuchi commented on her character becoming darker depending on the situations. Urobuchi created his scenario involving Saber and Kiritsugu because their relationship was little explored in the original visual novel. Saber has been voiced by Ayako Kawasumi in her Japanese appearances, and multiple actresses took the role in English-language dubs of the series' animated adaptations. Critical reception to Saber's character and role in the series and her relationship with Shirou has been generally positive. Her characterization and her relationship with the characters in Fate/Zero have also been met with a positive response. However, Saber's lack of character focus in the Unlimited Blade Works anime adaptation met mixed react
https://en.wikipedia.org/wiki/Nitrate%20reductase%20test
The nitrate reductase test is a test to differentiate between bacteria based on their ability or inability to reduce nitrate (NO3−) to nitrite (NO2−) using anaerobic respiration. Procedure Various assays for detecting nitrate reduction have been described. One method is performed as follows: Inoculate nitrate broth with an isolate and incubate for 48 hours. Add two nitrate tablets to the sample. If the bacterium produces nitrate reductase, the broth will turn a deep red within 5 minutes at this step. If no color change is observed, then the result is inconclusive. Add a small amount of zinc to the broth. If the solution remains colorless, then both nitrate reductase and nitrite reductase are present. If the solution turns red, nitrate reductase is not present.
https://en.wikipedia.org/wiki/Radiation%20trapping
Radiation trapping, imprisonment of resonance radiation, radiative transfer of spectral lines, line transfer or radiation diffusion is a phenomenon in physics whereby radiation may be "trapped" in a system as it is emitted by one atom and absorbed by another. Classical description Classically, one can think of radiation trapping as a multiple-scattering phenomena, where a photon is scattered by multiple atoms in a cloud. This motivates treatment as a diffusion problem. As such, one can primarily consider the mean free path of light, defined as the reciprocal of the density of scatterers and the scattering cross section: One can assume for simplicity that the scattering diagram is isotropic, which ends up being a good approximation for atoms with equally populated sublevels of total angular momentum. In the classical limit, we can think of the electromagnetic energy density as what is being diffused. So, we consider the diffusion constant in three dimensions, where is the transport time. The transport time accounts for both the group delay between scattering events and Wigner's delay time, which is associated with an elastic scattering process. It is written as where is the group velocity. When the photons are near resonance, the lifetime of an excited state in the atomic vapor is equal to the transport time, , independent of the detuning. This comes in handy, since the average number of scattering events is the ratio of the time spent in the system to the lifetime of the excited state (or equivalently, the scattering time). Since in a 3D diffusion process the electromagnetic energy density spreads as , we can find the average number of scattering events for a photon before it escapes: Finally, the number of scattering events can be related to the optical depth as follows. Since , the number of scattering events scales with the square of the optical depth. Derivation of the Holstein equation In 1947, Theodore Holstein attacked the problem of impr
https://en.wikipedia.org/wiki/Olf%20%28unit%29
The olf is a unit used to measure the strength of a pollution source. It was introduced by Danish professor P. Ole Fanger; the name "olf" is derived from the Latin word , meaning "smelled". One olf is the sensory pollution strength from a standard person defined as an average adult working in an office or similar non-industrial workplace, sedentary and in thermal comfort, with a hygienic standard equivalent of 0.7 baths per day and whose skin has a total area of 1.8 square metres. It was defined to quantify the strength of pollution sources that can be perceived by humans. The perceived air quality is measured in decipol. Examples of typical scent emissions See also Sick building syndrome
https://en.wikipedia.org/wiki/Report%20generator
A report generator is a computer program whose purpose is to take data from a source such as a database, XML stream or a spreadsheet, and use it to produce a document in a format which satisfies a particular human readership. Report generation functionality is almost always present in database systems, where the source of the data is the database itself. It can also be argued that report generation is part of the purpose of a spreadsheet. Standalone report generators may work with multiple data sources and export reports to different document formats. Information systems theory specifies that information delivered to a target human reader must be timely, accurate and relevant. Report generation software targets the final requirement by making sure that the information delivered is presented in the way most readily understood by the target reader. History An early report writer was part of Nomad software developed in the 1970s. It was most widely used in the 1970s and 1980s. See also List of reporting software Programming tools Reporting software
https://en.wikipedia.org/wiki/WiMP
WiMP was a music streaming service available on mobile devices, tablets, network players and computers. Music in WiMP was streamed using the AAC+ file format at a bitrate of 96 kbit/s or the AAC file format at a bitrate of 320 kbit/s if the high quality streaming option was selected. WiMP also offered a HiFi-product with FLAC/ALAC. WiMP has since been merged with Tidal. History WiMP was developed by Aspiro AS and the Norwegian music store chain Platekompaniet AS. It was first launched in Norway in February 2010. On January 30, 2015, it was announced that Aspiro AB had been acquired by Project Panther Bidco Ltd., which is indirectly owned by S. Carter Enterprises, LLC. The company was controlled by Shawn Corey Carter, better known by his stage name, Jay-Z. Aspiro AB was sold for 464 million SEK, which is about €50 million or US$56 million. However, WiMP would later merge with Tidal under the Tidal name. Cost and availability WiMP is funded by paid subscriptions such as, music fees, and subscriptions. As of 2012, WiMP is available in Norway, Denmark, Sweden, Germany and Poland. Tidal The service is also available in the U.S., Canada, the UK, Ireland, Finland, the Netherlands, Belgium, Luxembourg, France, Switzerland, Austria, Hungary, Romania and Turkey, where it is known as Tidal; and emphasizes the high-fidelity lossless mode, but the other modes, "High" and "Normal", are also available. Tidal claims to have 80 million tracks. Last.fm integration The application is integrated with Last.fm allowing a track to be "scrobbled". Catalog and editorial experience WiMP gives access to a music library of some 25 million tracks. WiMP has local editors in each country it operates, to present the local and international music and in-app magazines also available online. WiMP also offers music videos, so far available in the Android-client. Mobile devices WiMP is compatible with, Android, iOS, Symbian, MeeGo, Windows Phone 7, and Windows Phone 8, as well as Squeezebox,
https://en.wikipedia.org/wiki/Rocks%20Cluster%20Distribution
Rocks Cluster Distribution (originally NPACI Rocks) is a Linux distribution intended for high-performance computing (HPC) clusters. It was started by National Partnership for Advanced Computational Infrastructure and the San Diego Supercomputer Center (SDSC) in 2000. It was initially funded in part by an NSF grant (2000–07), but was funded by the follow-up NSF grant through 2011. Distribution Rocks was initially based on the Red Hat Linux (RHL) distribution, however modern versions of Rocks were based on CentOS, with a modified Anaconda installer that simplifies mass installation onto many computers. Rocks includes many tools (such as Message Passing Interface (MPI)) which are not part of CentOS but are integral components that make a group of computers into a cluster. Installations can be customized with additional software packages at install-time by using special user-supplied CDs (called "Roll CDs"). The "Rolls" extend the system by integrating seamlessly and automatically into the management and packaging mechanisms used by base software, greatly simplifying installation and configuration of large numbers of computers. Over a dozen Rolls have been created, including the Sun Grid Engine (SGE) roll, the Condor roll, the Lustre roll, the Java roll, and the Ganglia roll. By October 2010, Rocks was used for academic, government, and commercial organizations, employed in 1,376 clusters, on every continent except Antarctica. The largest registered academic cluster, having 8632 CPUs, is GridKa, operated by the Karlsruhe Institute of Technology in Karlsruhe, Germany. There are also a number of clusters ranging down to fewer than 10 CPUs, representing the early stages in the construction of larger systems, as well as being used for courses in cluster design. This easy scalability was a major goal in the development of Rocks, both for the researchers involved, and for the NSF: Release history See also Scientific Linux – a Linux distribution by Fermilab and CERN
https://en.wikipedia.org/wiki/Cyclocybe%20parasitica
Cyclocybe parasitica, also known as tawaka in Māori language or poplar mushroom, is a species of gilled mushroom in the genus Cyclocybe found mostly in New Zealand and Australia. It grows on native and introduced trees where it can cause heart rot, and does not seem to be associated with conifers. Description The cap is centrally attached, buff coloured, and darker at center. Stem is pale with white flesh. Veil is pressing against the gills and turns into a prominent ring often striated with dark brown spore print upon the stem expansion. Spores are cylindrical and thick walled with a prominent germ pore. Ecology The species grows parasitically and saprotrophically in hardwood trees such as Beilschmiedia tawa, Hoheria or Plagianthus but can also be found on Nothofagus, birches or poplars. It is native and probably indigenous to New Zealand. Fruiting bodies usually occur in late summer and autumn, sometimes single but usually in clusters. Uses Tawaka is an edible mushroom with meaty savoury taste. It can be collected in the wild or cultivated on logs that are inoculated four to eight weeks after cutting and defoliating. According to a study from Lincoln University in 1990, tawaka contains approximately 20% protein in dry mass, which is roughly half of what can be found in the common button mushroom, while the essential amino acid composition is similar. On the other hand, available carbohydrate content is almost three times higher. Although most commonly known for its culinary value, tawaka was historically used by Māori people as a traditional medicine.
https://en.wikipedia.org/wiki/Jim%20Whitehead%20%28computer%20scientist%29
E. James Whitehead is Professor and Chair of Computational Media at the University of California, Santa Cruz, United States. He served as the Chair of the Computer Science department University of California, Santa Cruz from 2010 to 2014. He received a BS in Electrical Engineering from the Rensselaer Polytechnic Institute in 1989, and a PhD in Information and Computer Science from the University of California, Irvine, in 2000. Previously, he performed hard, real-time firmware development as a software engineer for Raytheon, 1989–1992. From 1996 to 2004, Whitehead created and led the Internet Engineering Task Force working group on Web Distributed Authoring and Versioning, and is considered the "father" of the WebDAV protocol. He is author on over 50 peer-reviewed articles on software engineering and hypertext systems, and seven Internet standards (RFC) documents. Whitehead led the creation of the BS Computer Science: Computer Game Design degree program at UC Santa Cruz, the first game oriented degree program within the University of California system. He is also working with the Expressive Intelligence Studio as an advisor. Jim is a professor of Computational Media, he works in research in the fields of software evolution, software bug prediction, and automated generation of computer game levels. He is the president of the Society for the Advancement of the Science of Digital Games, the organization that sponsors the Foundations of Digital Games conference series.
https://en.wikipedia.org/wiki/Taegeuk
Taegeuk (, ) is a Korean term meaning "supreme ultimate", although it can also be translated as "great polarity / duality". The term and its overall concept is related to the Chinese Taiji (Wade-Giles: T'ai-chi). The symbol was chosen for the design of the Korean national flag in the 1880s. It substitutes the black and white color scheme often seen in most taijitu illustrations with blue and red, respectively, along with a horizontal separator, as opposed to vertical. South Koreans commonly refer to their national flag as (), where gi () means "flag" or "banner". This particular color-themed symbol is typically associated with Korean traditions and represents balance in the universe; the red half represents positive cosmic forces, and the blue half represents the complementary or opposing, negative cosmic forces. It is also used in Korean shamanism, Confucianism, Taoism, and Buddhism. History The diagram has been existent for the majority of written Korean history. The origins of the interlocking-sinusoid design in Korea can be traced to as early as the Goguryeo or Silla period, e.g. in the decoration of a sword, dated to the 5th or 6th century, recovered from the grave of Michu of Silla, or an artifact with the pattern of similar age found in the Bogam-ri tombs of Baekje at Naju, South Jeolla Province in 2008. In the compound of Gameunsa, a temple built in AD 628 during the reign of King Jinpyeong of Silla, a stone object, perhaps the foundation of a pagoda, is carved with the design. In Gojoseon, the ancient kingdom of Joseon, the design was used to express the hope for harmony of yin and yang. It is likely due to the earliest spread of ancient Chinese culture in Gojoseon, especially during the early Zhou dynasty. Today the is usually associated with Korean tradition and represents balance in the universe, as mentioned in the previous section (red is , or positive cosmic forces, and blue is , or negative cosmic forces). Among its many religious connotati
https://en.wikipedia.org/wiki/Sphenoid%20sinus
The sphenoid sinus is a paired paranasal sinus occurring within the body of the sphenoid bone. It represents one pair of the four paired paranasal sinuses. The pair of sphenoid sinuses are separated in the middle by a septum of sphenoid sinuses. Each sphenoid sinus communicates with the nasal cavity via the opening of sphenoidal sinus. The two sphenoid sinuses vary in size and shape, and are usually asymmetrical. Anatomy On average, a sphenoid sinus measures 2.2 cm vertical height, 2 cm in transverse breadth; and 2.2 cm antero-posterior depth. Each spehoid sinus is contained within the body of sphenoid bone, being situated just inferior to the sella turcica. The two sphenoid sinuses are separated medially by the septum of sphenoidal sinuses (which is usually asymmetrical). An opening of sphenoidal sinus forms a passage between each sphenoidal sinus, and the nasal cavity. Posteriorly, an opening of sphenoidal sinus opens into the sphenoidal sinus by an aperture high on the anterior wall the sinus; anteriorly, an opening of sphenoidal sinus opens into the roof of the nasal cavity via an aperture on the posterior wall of the sphenoethmoidal recess (occurring just superior the choana). Innervation The mucous membrane receives sensory innervation from the posterior ethmoidal nerve (branch of the ophthalmic nerve (CN V1)), and branches of the maxillary nerve (CN V2). Postganglionic parasympathetic fibers of the facial nerve that synapsed at the pterygopalatine ganglion control mucus secretion. Anatomical relations Proximal structures include: the optic canal and optic nerve, internal carotid artery, cavernous sinus, trigeminal nerve, pituitary gland, and the anterior ethmoidal cells. Anatomical variation The sphenoid sinuses vary in size and shape, and, owing to the lateral displacement of the intervening septum of sphenoid sinuses, are rarely symmetrical. When exceptionally large, the sphenoid sinuses may extend into the roots of the pterygoid processes or gr
https://en.wikipedia.org/wiki/Epicranium
The epicranium is the medical term for the collection of structures covering the cranium. It consists of the muscles, aponeurosis, and skin. Parts The epicranial aponeurosis is a tough layer of dense fibrous tissue that covers the upper part of the skull. The epicranial muscle (also called the epicranius) has two sections: the occipital belly, near the occipital bone, and the frontal belly, near the frontal bone. It is supplied by the supraorbital artery, the supratrochlear artery, and the occipital artery. It is innervated by the facial nerve. The epicranium also includes the skin of the scalp and the layer of subcutaneous tissue below it.
https://en.wikipedia.org/wiki/List%20of%20U.S.%20cities%20with%20diacritics
This is a list of U.S. cities whose official names have diacritics. Alaska Utqiaġvik American Samoa Āfono Ālega 'Āmanave Āmouli Aūa Fagasā Faleāsao Lumā Tāfuna California La Cañada Flintridge, Los Angeles County Los Baños, Merced County Piñon Hills, San Bernardino County San José, Santa Clara County Colorado Cañon, Conejos County Cañon City Piñon, Montrose County Piñon, Pueblo County Piñon Acres, La Plata County Guam Hagåtña Hagåtña Heights Hawaii City names in Hawaii often use the ʻokina, not to be confused with the apostrophe. Āhuimanu Āinaloa Hanapēpē Haikū-Pauwela Hālawa Hāliimaile Hāmoa, Maui County Hāna Hāōū Hāwī Hīlea, Hawaii County Hōlualoa Hōnaunau-Nāpōopoo Honokōhau, Maui County Hoōpūloa, Hawaii County Kāanapali Kaimū Kākio, Maui County Kalāheo Kamalō, Maui County Kāneohe Kaupō Kaūpūlehu Keālia Kēōkea, Hawaii County Kēōkea, Maui County Kīhei Kīholo, Hawaii County Kīlauea Kīpahulu Kīpū, Maui County Kōloa Kūkaiau, Hawaii County Kūkiʻo, Hawaii County Lāie Lānai City Laupāhoehoe Lāwai Līhue Māalaea Māili Mākaha Mākaha Valley Mākena Mānā, Hawaii County Mokulēia Mōpua, Maui County Mūolea, Maui County Nāālehu Nāhiku Nānākuli Nānāwale Estates Nāpili-Honokōwai Nīnole, Hāmākua District, Hawaii County Nīnole, Kaū District, Hawaii County Ōmao Ōmaopio, Maui County Ōōkala Pāauhau Pāhala Pāhoa Pāia Pākalā Village Pālehua, Honolulu County Pāpā Bay Estates, Hawaii County Pāpaaloa Pāpaikou Poipū Puaākala, Hawaii County Pūālaa, Hawaii County Puakō Pūkoo, Maui County Pūlehu, Maui County Pūpūkea Puunēnē Wahiawā Wahīlauhue, Maui County Waikāne Waikapū Waimānalo Waimānalo Beach Waiōhinu Waipāhoehoe, Hawaii County Welokā, Hawaii County Louisiana Pointe à la Hache West Pointe à la Hache Minnesota Arnesén, Lake of the Woods County Lindström Missouri O'Fallon, Missouri New Mexico Cañada de los Alamos Cañon, Mora County Cañon, Sandoval County Cañonc
https://en.wikipedia.org/wiki/Blue%20and%20Brown%20Books
The Blue and Brown Books are two sets of notes taken during lectures conducted by Ludwig Wittgenstein from 1933 to 1935. They were mimeographed as two separate books, and a few copies were circulated in a restricted circle during Wittgenstein's lifetime. The lecture notes from 1933–1934 were bound in blue cloth, and the notes dictated in 1934–1935 were bound in brown. Rush Rhees published these together for the first time in 1958 as Preliminary Studies for the "Philosophical Investigations". Inchoate versions of many of the ideas that would later be more fully explored in the Philosophical Investigations are found there, so these offer textual evidence for the genesis of what became known as Wittgenstein's later philosophy. The Blue Book The Blue Book was dictated from 1933 to 1934, and contains certain themes unaddressed in Wittgenstein's later works, including deliberations on thinking as operating with signs. An early conception of what would later become known as language-games is present in the text, which represents the first period of Wittgenstein's thought after 1932, a method of linguistic analysis which would later become ordinary language philosophy. While Wittgenstein in The Blue Book is not dogmatic nor systematic, he does provide arguments that point toward a more self-critical view of language. For example, he does not think that "understanding" and "explaining" are necessarily related. He suggests that when humans are learning a language-game they are actually being trained to understand it. He writes: As the citation suggests, Wittgenstein views understanding a language-game as being mostly concerned with training (which he calls "drill[ing]" in the above citation). Having said that, Wittgenstein is not one to believe that even understanding a language-game can be reduced to one process; like the plethora of language-games available to human beings, there are also plethora of "understandings." For example, the "understanding" of a language may c
https://en.wikipedia.org/wiki/Privilege%20revocation%20%28computing%29
Privilege revocation is the act of an entity giving up some, or all of, the privileges they possess, or some authority taking those (privileged) rights away. Information theory Honoring the Principle of least privilege at a granularity provided by the base system such as sandboxing of (to that point successful) attacks to an unprivileged user account helps in reliability of computing services provided by the system. As the chances of restarting such a process are better, and other services on the same machine aren't affected (or at least probably not as much as in the alternative case: i.e. a privileged process gone haywire instead). Computer security In computing security privilege revocation is a measure taken by a program to protect the system against misuse of itself. Privilege revocation is a variant of privilege separation whereby the program terminates the privileged part immediately after it has served its purpose. If a program doesn't revoke privileges, it risks the escalation of privileges. Revocation of privileges is a technique of defensive programming.
https://en.wikipedia.org/wiki/LOXSAT
LOXSAT is a NASA funded cryogenic fluid management demonstration satellite mission. Eta Space is building the payload. It is scheduled to launch no earlier than March 2024 on a Rocket Lab Electron launcher. NASA critical design review is due 15 June 2022. Mission objectives LOXSAT aims to demonstrate on-orbit docking and cryogenic refueling operations using a cryogenic fluid transfer disconnect and latching mechanism developed for depot applications. It will also demonstrate repeated mating/de-mating and the transfer of liquid oxygen. A LOXSAT2 mission is being defined. LOXSAT1 will test technology for Eta's orbital depot "CryoDock". See also Robotic Refueling Mission Propellant depot
https://en.wikipedia.org/wiki/Lancichinetti%E2%80%93Fortunato%E2%80%93Radicchi%20benchmark
Lancichinetti–Fortunato–Radicchi benchmark is an algorithm that generates benchmark networks (artificial networks that resemble real-world networks). They have a priori known communities and are used to compare different community detection methods. The advantage of the benchmark over other methods is that it accounts for the heterogeneity in the distributions of node degrees and of community sizes. The algorithm The node degrees and the community sizes are distributed according to a power law, with different exponents. The benchmark assumes that both the degree and the community size have power law distributions with different exponents, and , respectively. is the number of nodes and the average degree is . There is a mixing parameter , which is the average fraction of neighboring nodes of a node that do not belong to any community that the benchmark node belongs to. This parameter controls the fraction of edges that are between communities. Thus, it reflects the amount of noise in the network. At the extremes, when all links are within community links, if all links are between nodes belonging to different communities. One can generate the benchmark network using the following steps. Step 1: Generate a network with nodes following a power law distribution with exponent and choose extremes of the distribution and to get desired average degree is . Step 2: fraction of links of every node is with nodes of the same community, while fraction is with the other nodes. Step 3: Generate community sizes from a power law distribution with exponent . The sum of all sizes must be equal to . The minimal and maximal community sizes and must satisfy the definition of community so that every non-isolated node is in at least in one community: Step 4: Initially, no nodes are assigned to communities. Then, each node is randomly assigned to a community. As long as the number of neighboring nodes within the community does not exceed the community size a new node
https://en.wikipedia.org/wiki/Right%20gastroepiploic%20vein
The right gastroepiploic vein (right gastroomental vein) is a blood vessel that drains blood from the greater curvature and left part of the body of the stomach into the superior mesenteric vein. It runs from left to right along the greater curvature of the stomach between the two layers of the greater omentum, along with the right gastroepiploic artery. As a tributary of the superior mesenteric vein, it is a part of the hepatic portal system.
https://en.wikipedia.org/wiki/Anoxic%20event
Oceanic anoxic events or anoxic events (anoxia conditions) describe periods wherein large expanses of Earth's oceans were depleted of dissolved oxygen (O2), creating toxic, euxinic (anoxic and sulfidic) waters. Although anoxic events have not happened for millions of years, the geologic record shows that they happened many times in the past. Anoxic events coincided with several mass extinctions and may have contributed to them. These mass extinctions include some that geobiologists use as time markers in biostratigraphic dating. On the other hand, there are widespread, various black-shale beds from the mid-Cretaceous which indicate anoxic events but are not associated with mass extinctions. Many geologists believe oceanic anoxic events are strongly linked to the slowing of ocean circulation, climatic warming, and elevated levels of greenhouse gases. Researchers have proposed enhanced volcanism (the release of CO2) as the "central external trigger for euxinia." Human activities in the Holocene epoch , such as the release of nutrients from farms and sewage, cause relatively small-scale dead zones around the world. British oceanologist and atmospheric scientist Andrew Watson says full-scale ocean anoxia would take "thousands of years to develop." The idea that modern climate change could lead to such an event is also referred to as Kump's hypothesis, however, evidence is still missing. Background The concept of the oceanic anoxic event (OAE) was first proposed in 1976 by Seymour Schlanger (1927–1990) and geologist Hugh Jenkyns and arose from discoveries made by the Deep Sea Drilling Project (DSDP) in the Pacific Ocean. The finding of black, carbon-rich shales in Cretaceous sediments that had accumulated on submarine volcanic plateaus (e.g. Shatsky Rise, Manihiki Plateau), coupled with their identical age to similar, cored deposits from the Atlantic Ocean and known outcrops in Europe—particularly in the geological record of the otherwise limestone-dominated Apennines
https://en.wikipedia.org/wiki/Micro-Controller%20Operating%20Systems
Micro-Controller Operating Systems (MicroC/OS, stylized as μC/OS, or Micrium OS) is a real-time operating system (RTOS) designed by Jean J. Labrosse in 1991. It is a priority-based preemptive real-time kernel for microprocessors, written mostly in the programming language C. It is intended for use in embedded systems. MicroC/OS allows defining several functions in C, each of which can execute as an independent thread or task. Each task runs at a different priority, and runs as if it owns the central processing unit (CPU). Lower priority tasks can be preempted by higher priority tasks at any time. Higher priority tasks use operating system (OS) services (such as a delay or event) to allow lower priority tasks to execute. OS services are provided for managing tasks and memory, communicating between tasks, and timing. History The MicroC/OS kernel was published originally in a three-part article in Embedded Systems Programming magazine and the book μC/OS The Real-Time Kernel by Labrosse. He intended at first to simply describe the internals of a portable OS he had developed for his own use, but later developed it as a commercial product in his own company Micrium, Inc. in versions II and III. In 2016 Micrium, Inc. was acquired by Silicon Laboratories and it was subsequently released as open-source unde the Apache license. Silicon Labs continues to maintain an open-source product named Micrium OS for use on their own silicon and a group of former Micrium, Inc. employees (including Labrosse) provides consultancy and support for both μC/OS and Cesium RTOS, a proprietary fork made just after the open-source release. μC/OS-II Based on the source code written for μC/OS, and introduced as a commercial product in 1998, μC/OS-II is a portable, ROM-able, scalable, preemptive, real-time, deterministic, multitasking kernel for microprocessors, and digital signal processors (DSPs). It manages up to 64 tasks. Its size can be scaled (between 5 and 24 Kbytes) to only contain the
https://en.wikipedia.org/wiki/Diaper%20fetishism
Diaper fetishism, nappy fetishism, or diaperism is a type of garment fetish in which a person derives pleasure from wearing or using a diaper. Though separate and distinct, diaper fetishism can also be used as a component of various other kinks, such as ageplay or paraphilic infantilism, which together form a spectrum of practices colloquially referred to as "adult baby/diaper lover" or "AB/DL". Behavior and attraction Generally speaking, people who choose to wear diapers for recreational purposes (as opposed to medical need or situational convenience) may informally classify themselves as "diaper lovers" (DLs), yet vary widely in their motivation, interest and focus of attention. While some use diapers to achieve or enhance sexual pleasure as part of a kink or fetish, others find diapers to be a source of non-sexual positive feelings, such as comfort, relaxation, nostalgia, as well as being loved or cared for. This is not a dichotomy, however, as many DLs experience both sexual and non-sexual gratification. (Strictly speaking, the term "diaper fetishism" may only apply to those who derive at least some degree of sexual arousal from the activity.) In other words, there is no singular or archetypal behavior and a wide range of thought patterns and activities exist, but all tend to be harmless forms of self-expression and/or an efficacious release from some kind of pressure. Whether motivated mainly by sexual pleasure or feelings of comfort, many DLs find wearing diapers to be an intense multisensory experience in which touch (the soft, bulky or squishy feeling of wearing a diaper), sight (seeing themselves or another adult in a diaper), sound (the crinkle of the material), and in some cases smell (baby powder, wet wipes, urine or feces) are all stimulated. For some people with a diaper fetish, any one of these sensations may be enough stimulus to derive some level of erotic pleasure or sexual arousal, and may or may not represent a connection or overlap with othe
https://en.wikipedia.org/wiki/Balneola
Balneola is a genus of bacteria. See also List of bacterial orders List of bacteria genera
https://en.wikipedia.org/wiki/Acct%20URI%20scheme
The acct URI scheme is a proposed internet standard published by the Internet Engineering Task Force, defined by . The purpose of the scheme is to identify, rather than interact, with user accounts hosted by a service provider. This scheme differs from the DNS name which specifies the service provider. The acct URI was intended to be the single URI scheme that would return information about a person (or possibly a thing) that holds an account at a given domain. Example The following is an example of an acct URI: acct:juliet%40capulet.example@shoppingsite.example
https://en.wikipedia.org/wiki/Transverse%20abdominal%20muscle
The transverse abdominal muscle (TVA), also known as the transverse abdominis, transversalis muscle and transversus abdominis muscle, is a muscle layer of the anterior and lateral (front and side) abdominal wall , deep to (layered below) the internal oblique muscle. It is thought by most fitness instructors to be a significant component of the core. Structure The transverse abdominal, so called for the direction of its fibers, is the innermost of the flat muscles of the abdomen. It is positioned immediately deep to the internal oblique muscle. The transverse abdominal arises as fleshy fibers, from the lateral third of the inguinal ligament, from the anterior three-fourths of the inner lip of the iliac crest, from the inner surfaces of the cartilages of the lower six ribs, interdigitating with the diaphragm, and from the thoracolumbar fascia. It ends anteriorly in a broad aponeurosis (the Spigelian fascia), the lower fibers of which curve inferomedially (medially and downward), and are inserted, together with those of the internal oblique muscle, into the crest of the pubis and pectineal line, forming the inguinal conjoint tendon also called the aponeurotic falx. In layman's terms, the muscle ends in the middle line of a person's abdomen. Throughout the rest of its extent the aponeurosis passes horizontally to the middle line, and is inserted into the linea alba; its upper three-fourths lie behind the rectus muscle and blend with the posterior lamella of the aponeurosis of the internal oblique; its lower fourth is in front of the rectus abdominis. Innervation The transverse abdominal is innervated by the lower intercostal nerves (thoracoabdominal, nerve roots T7-T11), as well as the iliohypogastric nerve and the ilioinguinal nerve. Function The transverse abdominal helps to compress the ribs and viscera, providing thoracic and pelvic stability. This is explained further here. The transverse abdominal also helps a pregnant woman to deliver her child. Without a s
https://en.wikipedia.org/wiki/Rupee
Rupee is the common name for the currencies of India, Mauritius, Nepal, Pakistan, Seychelles, and Sri Lanka, and of former currencies of Afghanistan, Bahrain, Kuwait, Oman, the United Arab Emirates (as the Gulf rupee), British East Africa, Burma, German East Africa (as Rupie/Rupien), and Tibet. In Indonesia and the Maldives, the unit of currency is known as rupiah and rufiyaa respectively, cognates of the word rupee. The Indian rupees () and Pakistani rupees () are subdivided into one hundred paise (singular paisa) or pice. The Nepalese rupee (रू) subdivides into one hundred paisa (singular and plural) or four sukaas. The Mauritian, Seychellois, and Sri Lankan rupees subdivide into 100 cents. Etymology The Hindustani word rupiyā is derived from the Sanskrit word rūpya (), which means "wrought silver, a coin of silver", in origin an adjective meaning "shapely", with a more specific meaning of "stamped, impressed", whence "coin". It is derived from the noun rūpa () "shape, likeness, image". History The history of the rupee traces back to Ancient India circa 3rd century BC. Ancient India was one of the earliest issuers of coins in the world, along with the Lydian staters, several other Middle Eastern coinages and the Chinese wen. The term is from rūpya, a Sanskrit term for silver coin, from Sanskrit rūpa, beautiful form. Arthashastra, written by Chanakya, chief adviser to the first Maurya emperor Chandragupta Maurya (c. 340–290 BCE), mentions silver coins as rūpyarūpa, other types including gold coins (rūpya-suvarṇa), copper coins (tāmrarūpa) and lead coins (sīsarūpa) are mentioned. Rūpa means form or shape, example, rūpyarūpa, rūpya – wrought silver, rūpa – form. This coinage system continued more or less across the Indian subcontinent well till 20th century. In the intermediate times there was no fixed monetary system as reported by the Da Tang Xi Yu Ji. During his reign from 1538/1540 to 1545, Sher Shah Suri of the Sur Empire set up a new civic and mili
https://en.wikipedia.org/wiki/Hallucinations%20%28book%29
Hallucinations is a 2012 book written by the neurologist Oliver Sacks. In Hallucinations, Sacks recounts stories of hallucinations and other mind-altering episodes of both his patients and himself and uses them in an attempt to elucidate certain features and structures of the brain including his own migraine headaches. Summary Hallucinations was written with the intention to remove the stigma of hallucinations in the eyes of society and the medical world. The book is separated into fifteen chapters; each chapter pertains to a different observation of hallucinations made by Sacks. The hallucinations mentioned in this book come from the everyday citizen and his own experiences, which are used to connect the structure and function of the brain of a healthy person to the symptom of hallucination. Sacks also mentions the positive effects of hallucinations in culture and art. Sacks notes that the symptom of hallucinations have a negative connotation that was created by society. The purpose of Hallucinations was to take away the public fear of symptoms relating to mental illness by showcasing many instances where healthy individuals experienced hallucinations. Sacks also uses this book to educate society on the different types of hallucinations and the neurological basis behind hallucinations. Awards and honors 2014 Wellcome Book Prize shortlist
https://en.wikipedia.org/wiki/Rotating%20wheel%20space%20station
A rotating wheel space station, also known as a von Braun wheel, is a concept for a hypothetical wheel-shaped space station. Originally proposed by Konstantin Tsiolkovsky in 1903, the idea was expanded by Herman Potočnik in 1929. Specifications This type of station rotates about its axis, creating an environment of artificial gravity. Occupants of the station would experience centrifugal acceleration, according to the following equation: where is the angular velocity of the station, is its radius, and is linear acceleration at any point along its perimeter. In theory, the station could be configured to simulate the gravitational acceleration of Earth (9.81 m/s2), allowing for human long stays in space without the drawbacks of microgravity. History Both scientists and science fiction writers have thought about the concept of a rotating wheel space station since the beginning of the 20th century. Konstantin Tsiolkovsky wrote about using rotation to create an artificial gravity in space in 1903. Herman Potočnik introduced a spinning wheel station with a 30-meter diameter in his Problem der Befahrung des Weltraums (The Problem of Space Travel). He even suggested it be placed in a geostationary orbit. In the 1950s, Wernher von Braun and Willy Ley, writing in Colliers Magazine, updated the idea, in part as a way to stage spacecraft headed for Mars. They envisioned a rotating wheel with a diameter of 76 meters (250 feet). The 3-deck wheel would revolve at 3 RPM to provide artificial one-third gravity. It was envisaged as having a crew of 80. In 1959, a NASA committee opined that such a space station was the next logical step after the Mercury program. The Stanford torus, proposed by NASA in 1975, is an enormous version of the same concept, that could harbor an entire city. NASA has never attempted to build a rotating wheel space station, for several reasons. First, such a station would be very difficult to construct, given the limited lifting capability avail
https://en.wikipedia.org/wiki/List%20of%20wild%20edible%20plants%20in%20Mongolian%20cuisine
The following is a list of wild edible plants in Mongolian cuisine: Oil Cannabis sativa Cereal Abutilon theophrasti Agriophyllus arenarium Artemisia anethifolia Artemisia annua Artemisia pectina Artemisia xerophytica Convolvulus gortschakovii Corispermum mongolicum Elymus giganteus Fagopyrum esculentum Kalidium foliatum Polygonum alpinum Polygonum sibiricum Psammochloa villosa Fruits and berries Amygdalus mongolica Crataegus sanguinea Elaeagnus angustifolia Ephedra sinica Fragaria orientalis Grossularia acicularis Hippophae rhamnoides Malus baccata Malus pallasiana Nitaria Roborowskii Oxycoccus microcarpus Padus asiatica Prunus armeniaca sibirica Ribes altissimum Ribes nigrum Ribes rubrum Rubus sachalinensis Sorbus sibirica Vaccinium vitisidaea Mushrooms Psalliota arvensis Psalliota campestris Onion family Allium altacium Allium anisopodium Allium fischeri Allium lineare Allium macrostemon Allium ramosum Allium prostratum Allium senescens Allium victorialis Nuts Pinus sibrica Spices Carum buriaticum Schizonepeta annua Tea substitutes Bergenia crassifolia Betula gmelinii Chamaenerion angustifolium Dasiphora fruticosa Dendranthema indicum Geranium pseudosibiricum Lagopsis supina Lycium chinense Paeonia anomala Populus tremula Serratula cardunculus Spiraea media Starchy plants Agropyron repens Asparagus dahuricum Butomus umbellatus Cirsium esculentum Lilium martagon Lilium tenuifolium Phlomis tuberosa Phragmites communis Polygonum divaricatum Polygonum viviparum rhizome Potentilla anserina root Rumex altaicum Rumex compactum Rumex undulatum Sanguisorba officinalis root Sinomorium songaricum Sphallerocarpus gracilis Typha laxmanni Sweeteners Glycyrrhiza uralensis Snacks Corylus heterophylla Cyanchum chinense Erodium stephanianum Juglans mandshurica Greens Cynanchum sibiricum Heracleum dissectum Rheum nanum Rumex acetosa Polygonum aviculare Urtica angustifolia Vegeta
https://en.wikipedia.org/wiki/Gastroileal%20reflex
The gastroileal reflex is one of the three extrinsic reflexes of the gastrointestinal tract, the other two being the gastrocolic reflex and the enterogastric reflex. The gastroileal reflex is stimulated by the presence of food in the stomach and gastric peristalsis. Initiation of the reflex causes peristalsis in the ileum and the opening of the ileocecal valve (which allows the emptying of the ileal contents into the large intestine, or colon). This in turn stimulates colonic peristalsis and an urge to defecate.
https://en.wikipedia.org/wiki/Hyper-threading
Hyper-threading (officially called Hyper-Threading Technology or HT Technology and abbreviated as HTT or HT) is Intel's proprietary simultaneous multithreading (SMT) implementation used to improve parallelization of computations (doing multiple tasks at once) performed on x86 microprocessors. It was introduced on Xeon server processors in February 2002 and on Pentium 4 desktop processors in November 2002. Since then, Intel has included this technology in Itanium, Atom, and Core 'i' Series CPUs, among others. For each processor core that is physically present, the operating system addresses two virtual (logical) cores and shares the workload between them when possible. The main function of hyper-threading is to increase the number of independent instructions in the pipeline; it takes advantage of superscalar architecture, in which multiple instructions operate on separate data in parallel. With HTT, one physical core appears as two processors to the operating system, allowing concurrent scheduling of two processes per core. In addition, two or more processes can use the same resources: If resources for one process are not available, then another process can continue if its resources are available. In addition to requiring simultaneous multithreading support in the operating system, hyper-threading can be properly utilized only with an operating system specifically optimized for it. Overview Hyper-Threading Technology is a form of simultaneous multithreading technology introduced by Intel, while the concept behind the technology has been patented by Sun Microsystems. Architecturally, a processor with Hyper-Threading Technology consists of two logical processors per core, each of which has its own processor architectural state. Each logical processor can be individually halted, interrupted or directed to execute a specified thread, independently from the other logical processor sharing the same physical core. Unlike a traditional dual-processor configuration that
https://en.wikipedia.org/wiki/Agent%20Vinod%20%282012%20film%29
Agent Vinod is a 2012 Indian Hindi-language action spy film written and directed by Sriram Raghavan produced by Saif Ali Khan and Dinesh Vijan. The film borrows its name from the 1977 film of the same name, and stars Saif Ali Khan and Kareena Kapoor in the lead roles, while Ram Kapoor, Prem Chopra, Shahbaz Khan and Adil Hussain appeared in prominent roles. Ravi Kishan made a special appearance in the film. The film received mixed reviews from critics, who praised the visuals, acting performances, action sequences, songs, cinematography and production values, but criticized the screenplay and writing. Plot In the Dasht-E-maadar desert in kotha Afghanistan, inside a Taliban camp, ISI official Col. Huzefa is interrogating a captured man presumed to be a RAW agent. The man gives details of RAW's operations in Afghanistan in exchange for money and safe passage across the border. He betrays his colleague, Major Rajan, who has also infiltrated the camp. This is only a ruse, as both overpower their captors and fight their way out of the camp. Along the way, they rescue a girl called Farah. In New Delhi, Agent Vinod is show a message from Russia and tasked to find out what '242' is. Vinod travels to St. Petersburg. There he is almost captured, but manages to escape and goes to Tangiers, Morocco. Vinod assumes identity as Freddie and meets mafia boss David Kazan and his personal (Pakistani) doctor, Ruby Mendes. Vinod manages to convince Kazan that he is Freddie Khambatta and hacks Kazan's phone. Vinod gets closer to Ruby to find out what '242' is. Ruby is actually a British-Pakistani working undercover for the ISI. Vinod obtains an invitation card for a private auction and learns that many international terrorist groups are converging at an antiques auction in Marakkesh to purchase '242'. At the auction, Vinod learns that '242' is actually the detonator for the nuclear device. A bidding war ensues, and Kazan manages to secure the detonator. It turns out that a group of ro
https://en.wikipedia.org/wiki/Etiocholanedione
Etiocholanedione, also known as 5β-androstanedione or as etiocholane-3,17-dione, is a naturally occurring etiocholane (5β-androstane) steroid and an endogenous metabolite of androgens like testosterone, dihydrotestosterone, dehydroepiandrosterone (DHEA), and androstenedione. It is the C5 epimer of androstanedione (5α-androstanedione). Although devoid of androgenic activity like other 5β-reduced steroids, etiocholanedione has some biological activity of its own. The compound has been found to possess potent haematopoietic effects in a variety of models. In addition, it has been found to promote weight loss in animals and in a double-blind, placebo-controlled clinical study in humans conducted in 1993. These effects are said to be similar to those of DHEA. Unlike DHEA however, etiocholanedione cannot be metabolized further into steroid hormones like androgens and estrogens.
https://en.wikipedia.org/wiki/Kempner%20series
The Kempner series is a modification of the harmonic series, formed by omitting all terms whose denominator expressed in base 10 contains the digit 9. That is, it is the sum where the prime indicates that n takes only values whose decimal expansion has no nines. The series was first studied by A. J. Kempner in 1914. The series is counterintuitive because, unlike the harmonic series, it converges. Kempner showed the sum of this series is less than 90. Baillie showed that, rounded to 20 decimals, the actual sum is . Heuristically, this series converges because most large integers contain every digit. For example, a random 100-digit integer is very likely to contain at least one '9', causing it to be excluded from the above sum. Schmelzer and Baillie found an efficient algorithm for the more general problem of any omitted string of digits. For example, the sum of where n has no instances of "42" is about . Another example: the sum of where n has no occurrence of the digit string "314159" is about . (All values are rounded in the last decimal place.) Convergence Kempner's proof of convergence is repeated in some textbooks, for example Hardy and Wright, and also appears as an exercise in Apostol. We group the terms of the sum by the number of digits in the denominator. The number of n-digit positive integers that have no digit equal to '9' is 8 × 9n−1 because there are 8 choices (1 through 8) for the first digit, and 9 independent choices (0 through 8) for each of the other n−1 digits. Each of these numbers having no '9' is greater than or equal to 10n−1, so the reciprocal of each of these numbers is less than or equal to 101−n. Therefore, the contribution of this group to the sum of reciprocals is less than 8 × ()n−1. Therefore the whole sum of reciprocals is at most The same argument works for any omitted non-zero digit. The number of n-digit positive integers that have no '0' is 9n, so the sum of where n has no digit '0' is at most The series also converge
https://en.wikipedia.org/wiki/Werner%20syndrome
Werner syndrome (WS) or Werner's syndrome, also known as "adult progeria", is a rare, autosomal recessive disorder which is characterized by the appearance of premature aging. Werner syndrome is named after the German scientist Otto Werner. He identified the syndrome in four siblings observed with premature aging, which he explored as the subject of his dissertation of 1904. It has a global incidence rate of less than 1 in 100,000 live births (although incidence in Japan and Sardinia is higher, affecting 1 in 20,000–40,000 and 1 in 50,000, respectively). 1,300 cases had been reported as of 2006. Affected individuals typically grow and develop normally until puberty; the mean age of diagnosis is twenty-four, often realized when the adolescent growth spurt is not observed. The youngest person diagnosed was six years old. The median and mean ages of death are 47–48 and 54 years, respectively. The main causes of death are cardiovascular disease and cancer. Presentation Werner syndrome patients exhibit growth retardation, short stature, premature graying of hair, alopecia (hair loss), wrinkling, prematurely aged faces with beaked noses, skin atrophy (wasting away) with scleroderma-like lesions, lipodystrophy (loss of fat tissues), abnormal fat deposition leading to thin legs and arms, and severe ulcerations around the Achilles tendon and malleoli (around ankles). Other symptoms include change in voice (weak, hoarse, high-pitched), atrophy of gonads leading to reduced fertility, bilateral cataracts (clouding of lens), premature arteriosclerosis (thickening and loss of elasticity of arteries), calcinosis (calcium deposits in blood vessels), atherosclerosis (blockage of blood vessels), type 2 diabetes, osteoporosis (loss of bone mass), telangiectasia, and malignancies. The prevalence of rare cancers, such as meningiomas, are increased in individuals with Werner syndrome. Gene expression Gene transcription changes found in WS cells are strikingly similar to those observ
https://en.wikipedia.org/wiki/Lars%20Eilebrecht
Lars Eilebrecht (born March 1972) is a German software engineer, solutions architect, IT security expert, and Open Source evangelist. He is one of the original developers of the Apache HTTP Server, and co-founder and former Vice President of the Apache Software Foundation. Lars was based in the United Kingdom between 2009 and 2019 where he founded the IT consultancy company Primevation Ltd. Since 2019 he is based in Germany where he works as a Chief Information Security Officer. Open Source Lars has been active in open software projects, and most notably the Apache HTTP Server project. He was a member of the Apache Group, and is co-founder and member of the Apache Software Foundation. Since the beginning of the Apache Software Foundation he was a member of the Conferences Committee helping the foundation to organise ApacheCon events. He served as Vice President, Conference Planning from 2007 to 2009. Additionally he is a member of the ASF Security Team and the ASF Public Relations Committee. Lars is an Open Source evangelist and received O'Reilly's Appaloosa Award for raising awareness of Apache. Career Between 2008 and 2019 Lars worked as an independent IT consultant for companies such as the BBC, Channel 4, Heise Media, El Tiempo and Pearson. Lars was owner and managing director of Primevation Ltd, and partner at pliXos GmbH. Previous employers of Lars Eilebrecht include Ciphire Labs, Quam, Parc Technologies, CyberSolutions, and Cable & Wireless. Lars has an interest in IT security and cryptography. He has worked as a CISO for the Widas Group and polypoly, was Director Security Solutions and Chief Security Architect at Ciphire Labs, and speaker at conferences such as Financial Cryptography and Data Security and the 21st Chaos Communication Congress (21C3). Lars was a member of the International Financial Cryptography Association from 2005 to 2006. In 1998 Lars received a Master of Science degree in Computer Engineering from the University of Siegen in Germ
https://en.wikipedia.org/wiki/Relapsing%E2%80%93remitting
Relapsing–remitting is a medical term referring to a presentation of disease symptoms that become worse over time (relapsing), followed by periods of less severe symptoms that do not completely cease (partial remitting). The term is used to describe a type of multiple sclerosis called relapsing–remitting multiple sclerosis, where unpredictable relapses are followed by remission for months to years. The term is also used to describe palindromic rheumatism in the context of rheumatoid arthritis, catatonia, lupus, mental disorders, and experimental autoimmune encephalomyelitis.
https://en.wikipedia.org/wiki/DataCore
DataCore, also known as DataCore Software, is a developer of software-defined storage based in Fort Lauderdale, Florida, United States. The company is a pioneer in the development of SAN virtualization technology, and offers software-defined storage solutions across core data center, edge and cloud environments. History DataCore was founded in Fort Lauderdale in February 1998 by George Teixeira and Ziya Aral, co-workers at parallel computing company Encore Computer. The premise behind the company was to allow network operators to purchase commodity disk drives, external storage arrays or SAN disk drive arrays, and treat them all as virtual disks of networked, block-access storage. This storage was controlled using DataCore software. They were joined by 10 other former Encore colleagues, and they all worked without pay until January 1999, when the company secured its first funding round, of $8 million. In 2000, the company had a $35 million Series C funding round. In 2006, seeing an exodus of venture funding, company employees mortgaged their homes to keep the business going, until 2008 when a US$30 million round of funding stabilized company finances. In 2011, the company launched SANsymphony-V, an upgrade to its storage virtualization software offering faster performance. In April 2014, the company released version 10 of its SANsymphony product. In March 2015, DataCore partnered with Chinese technology vendor Huawei to run SANsymphony-V software on Huawei's FusionServer to create virtual storage networks. In 2016, the company's SANsymphony-V software was reported to have set new price performance records based on testing done by Redwood City, California-based non-profit testing company Storage Performance Council using their SPC-1 storage performance benchmark. The results led to complaints from multiple vendors, who claimed that storing all the "test" data in cache made the results unfair. One of the three SPC-1 benchmark results was later withdrawn. In M
https://en.wikipedia.org/wiki/Fungal%20DNA%20barcoding
Fungal DNA barcoding is the process of identifying species of the biological kingdom Fungi through the amplification and sequencing of specific DNA sequences and their comparison with sequences deposited in a DNA barcode database such as the ISHAM reference database, or the Barcode of Life Data System (BOLD). In this attempt, DNA barcoding relies on universal genes that are ideally present in all fungi with the same degree of sequence variation. The interspecific variation, i.e., the variation between species, in the chosen DNA barcode gene should exceed the intraspecific (within-species) variation. A fundamental problem in fungal systematics is the existence of teleomorphic and anamorphic stages in their life cycles. These morphs usually differ drastically in their phenotypic appearance, preventing a straightforward association of the asexual anamorph with the sexual teleomorph. Moreover, fungal species can comprise multiple strains that can vary in their morphology or in traits such as carbon- and nitrogen utilisation, which has often led to their description as different species, eventually producing long lists of synonyms. Fungal DNA barcoding can help to identify and associate anamorphic and teleomorphic stages of fungi, and through that to reduce the confusing multitude of fungus names. For this reason, mycologists were among the first to spearhead the investigation of species discrimination by means of DNA sequences, at least 10 years earlier than the DNA barcoding proposal for animals by Paul D. N. Hebert and colleagues in 2003, who popularised the term "DNA barcoding". The success of identification of fungi by means of DNA barcode sequences stands and falls with the quantitative (completeness) and qualitative (level of identification) aspect of the reference database. Without a database covering a broad taxonomic range of fungi, many identification queries will not result in a satisfyingly close match. Likewise, without a substantial curatorial effort to
https://en.wikipedia.org/wiki/Automata-based%20programming
Automata-based programming is a programming paradigm in which the program or part of it is thought of as a model of a finite-state machine (FSM) or any other (often more complicated) formal automaton (see automata theory). Sometimes a potentially infinite set of possible states is introduced, and such a set can have a complicated structure, not just an enumeration. Finite-state machine-based programming is generally the same, but, formally speaking, does not cover all possible variants, as FSM stands for finite-state machine, and automata-based programming does not necessarily employ FSMs in the strict sense. The following properties are key indicators for automata-based programming: The time period of the program's execution is clearly separated down to the automaton steps. Each step is effectively an execution of a code section (same for all the steps) which has a single entry point. That section might be divided down to subsections to be executed depending on different states, although this is not necessary. Any communication between the automaton steps is only possible via the explicitly noted set of variables named the automaton state. Between any two steps, the program cannot have implicit components of its state, such as local variables' values, return addresses, the current instruction pointer, etc. That is, the state of the whole program, taken at any two moments of entering an automaton step, can only differ in the values of the variables being considered as the automaton state. The whole execution of the automata-based code is a cycle of the automaton steps. Another reason for using the notion of automata-based programming is that the programmer's style of thinking about the program in this technique is very similar to the style of thinking used to solve mathematical tasks using Turing machines, Markov algorithms, etc. Example Task Consider the task of reading a text from standard input line-by-line and writing the first word of each line to stan
https://en.wikipedia.org/wiki/Smacoviridae
Smacoviridae is a family of single-stranded DNA viruses. The genomes of this family are small (2.3–2.8 kilobases in length). The name Smacoviridae stands for 'small circular genome virus'. The genomes are circular single-stranded DNA and encode rolling-circle replication initiation proteins (Rep) and unique capsid proteins. As of 2021, 12 genera and 84 species are recognized in this family. The viruses in this taxon were isolated from faecal samples from insects and vertebrates by metagenomic methods. Little is known about their biology. Taxonomy The family Smacoviridae is the sole member of the order Cremevirales and together with other families of CRESS DNA viruses is included within the phylum Cressdnaviricota. The family currently includes the following genera: Babosmacovirus Bonzesmacovirus Bostasmacovirus Bovismacovirus Cosmacovirus Dragsmacovirus Drosmacovirus Felismacovirus Huchismacovirus Inpeasmacovirus Porprismacovirus Simismacovirus Biology These viruses have single stranded genomes of 2.3–2.8 kilobases in length. The genome encodes two proteins, a Rep (replicator) and a CP (capsid) protein.
https://en.wikipedia.org/wiki/Shiitake
The shiitake (alternate form shitake) (; Lentinula edodes) is an edible mushroom native to East Asia, which is cultivated and consumed around the globe. It is considered a medicinal mushroom in some forms of traditional medicine. Taxonomy The fungus was first described scientifically as Agaricus edodes by Miles Joseph Berkeley in 1877. It was placed in the genus Lentinula by David Pegler in 1976. The fungus has acquired an extensive synonymy in its taxonomic history: Agaricus edodes Berk. (1878) Armillaria edodes (Berk.) Sacc. (1887) Mastoleucomychelloes edodes (Berk.) Kuntze (1891) Cortinellus edodes (Berk.) S.Ito & S.Imai (1938) Lentinus edodes (Berk.) Singer (1941) Collybia shiitake J.Schröt. (1886) Lepiota shiitake (J.Schröt.) Nobuj. Tanaka (1889) Cortinellus shiitake (J.Schröt.) Henn. (1899) Tricholoma shiitake (J.Schröt.) Lloyd (1918) Lentinus shiitake (J.Schröt.) Singer (1936) Lentinus tonkinensis Pat. (1890) Lentinus mellianus Lohwag (1918) The mushroom's Japanese name is composed of , for the tree Castanopsis cuspidata that provides the dead logs on which it is typically cultivated, and . The specific epithet is the Latin word for "edible". It is also commonly called "sawtooth oak mushroom", "black forest mushroom", "black mushroom", "golden oak mushroom", or "oakwood mushroom". Distribution and habitat Shiitake grow in groups on the decaying wood of deciduous trees, particularly shii and other chinquapins, chestnut, oak, maple, beech, sweetgum, poplar, hornbeam, ironwood, and mulberry. Its natural distribution includes warm and moist climates in Southeast Asia. Cultivation The earliest written record of shiitake cultivation is seen in the Records of Longquan County () compiled by He Zhan () in 1209 during the Song dynasty in China. The 185-word description of shiitake cultivation from that literature was later cross-referenced many times and eventually adapted in a book by a Japanese horticulturist in 1796, the first book on shiitake cultivation
https://en.wikipedia.org/wiki/Closure%20problem
In graph theory and combinatorial optimization, a closure of a directed graph is a set of vertices C, such that no edges leave C. The closure problem is the task of finding the maximum-weight or minimum-weight closure in a vertex-weighted directed graph. It may be solved in polynomial time using a reduction to the maximum flow problem. It may be used to model various application problems of choosing an optimal subset of tasks to perform, with dependencies between pairs of tasks, one example being in open pit mining. Algorithms Condensation The maximum-weight closure of a given graph G is the same as the complement of the minimum-weight closure on the transpose graph of G, so the two problems are equivalent in computational complexity. If two vertices of the graph belong to the same strongly connected component, they must behave the same as each other with respect to all closures: it is not possible for a closure to contain one vertex without containing the other. For this reason, the input graph to a closure problem may be replaced by its condensation, in which every strongly connected component is replaced by a single vertex. The condensation is always a directed acyclic graph. Reduction to maximum flow As showed, a maximum-weight closure may be obtained from G by solving a maximum flow problem on a graph H constructed from G by adding to it two additional vertices s and t. For each vertex v with positive weight in G, the augmented graph H contains an edge from s to v with capacity equal to the weight of v, and for each vertex v with negative weight in G, the augmented graph H contains an edge from v to t whose capacity is the negation of the weight of v. All of the edges in G are given infinite capacity in H. A minimum cut separating s from t in this graph cannot have any edges of G passing in the forward direction across the cut: a cut with such an edge would have infinite capacity and would not be minimum. Therefore, the set of vertices on the same side of
https://en.wikipedia.org/wiki/Intel%20i960
Intel's i960 (or 80960) was a RISC-based microprocessor design that became popular during the early 1990s as an embedded microcontroller. It became a best-selling CPU in that segment, along with the competing AMD 29000. In spite of its success, Intel stopped marketing the i960 in the late 1990s, as a result of a settlement with DEC whereby Intel received the rights to produce the StrongARM CPU. The processor continues to be used for a few military applications. Origin The i960 design was begun in response to the failure of Intel's iAPX 432 design of the early 1980s. The iAPX 432 was intended to directly support high-level languages that supported tagged, protected, garbage-collected memory—such as Ada and Lisp—in hardware. Because of its instruction-set complexity, its multi-chip implementation, and design flaws, the iAPX 432 was very slow in comparison to other processors of its time. In 1984, Intel and Siemens started a joint project, ultimately called BiiN, to create a high-end, fault-tolerant, object-oriented computer system programmed entirely in Ada. Many of the original i432 team members joined this project, although a new lead architect, Glenford Myers, was brought in from IBM. The intended market for the BiiN systems was high-reliability-computer users such as banks, industrial systems, and nuclear power plants. Intel's major contribution to the BiiN system was a new processor design, influenced by the protected-memory concepts from the i432. The new design was to include a number of features to improve performance and avoid problems that had led to the i432's downfall. The first 960 processors entered the final stages of design, known as taping-out, in October 1985 and were sent to manufacturing that month, with the first working chips arriving in late 1985 and early 1986. The BiiN effort eventually failed, due to market forces, and the 960 was left without a use. Myers attempted to save the design by extracting several subsets of the full capability
https://en.wikipedia.org/wiki/Undeniable%20signature
An undeniable signature is a digital signature scheme which allows the signer to be selective to whom they allow to verify signatures. The scheme adds explicit signature repudiation, preventing a signer later refusing to verify a signature by omission; a situation that would devalue the signature in the eyes of the verifier. It was invented by David Chaum and Hans van Antwerpen in 1989. Overview In this scheme, a signer possessing a private key can publish a signature of a message. However, the signature reveals nothing to a recipient/verifier of the message and signature without taking part in either of two interactive protocols: Confirmation protocol, which confirms that a candidate is a valid signature of the message issued by the signer, identified by the public key. Disavowal protocol, which confirms that a candidate is not a valid signature of the message issued by the signer. The motivation for the scheme is to allow the signer to choose to whom signatures are verified. However, that the signer might claim the signature is invalid at any later point, by refusing to take part in verification, would devalue signatures to verifiers. The disavowal protocol distinguishes these cases removing the signer's plausible deniability. It is important that the confirmation and disavowal exchanges are not transferable. They achieve this by having the property of zero-knowledge; both parties can create transcripts of both confirmation and disavowal that are indistinguishable, to a third-party, of correct exchanges. The designated verifier signature scheme improves upon deniable signatures by allowing, for each signature, the interactive portion of the scheme to be offloaded onto another party, a designated verifier, reducing the burden on the signer. Zero-knowledge protocol The following protocol was suggested by David Chaum. A group, G, is chosen in which the discrete logarithm problem is intractable, and all operation in the scheme take place in this group. Commo
https://en.wikipedia.org/wiki/Aquatic%20ape%20hypothesis
The aquatic ape hypothesis (AAH), also referred to as aquatic ape theory (AAT) or the waterside hypothesis of human evolution, postulates that the ancestors of modern humans took a divergent evolutionary pathway from the other great apes by becoming adapted to a more aquatic habitat. While the hypothesis has some popularity with the lay public, it is generally ignored or classified as pseudoscience by anthropologists. The theory developed before major discoveries of ancient hominin fossils in East Africa. The hypothesis was initially proposed by the English marine biologist Alister Hardy in 1960, who argued that a branch of apes was forced by competition over terrestrial habitats to hunt for food such as shellfish on the coast and seabed, leading to adaptations that explained distinctive characteristics of modern humans such as functional hairlessness and bipedalism. The popular science writer Elaine Morgan supported this hypothesis in her 1972 book The Descent of Woman. In it, she contrasted the theory with zoologist and ethnologist Desmond Morris's theories of sexuality, which she believed to be rooted in sexism. Anthropologists do not take the hypothesis seriously: John Langdon characterized it as an "umbrella hypothesis" (a hypothesis that tries to explain many separate traits of humans as a result of a single adaptive pressure) that was not consistent with the fossil record, and he said that its claim that it was simpler and therefore more likely to be true than traditional explanations of human evolution was not true. According to anthropologist John Hawkes, the AAH is not consistent with the fossil record. Traits that the hypothesis tries to explain evolved at vastly different times, and distributions of soft tissue the hypothesis alleges are unique to humans are common among other primates. History In 1942 the German pathologist Max Westenhöfer (1871–1957) discussed various human characteristics (hairlessness, subcutaneous fat, the regression of the olf
https://en.wikipedia.org/wiki/Terpene%20synthase%20N%20terminal%20domain
In molecular biology, this protein domain belongs to the terpene synthase family (TPS). Its role is to synthesize terpenes, which are part of primary metabolism, such as sterols and carotene, and also part of the secondary metabolism. This entry will focus on the N terminal domain of the TPS protein. Function Terpenes synthases have a role in producing important molecules in metabolism, these molecules are part of a large group called terpenoids . In particular, the N terminal domain has feature of the copalyl diphosphate synthase (CPS) active site. Structure The N-terminal domain forms an alpha-barrel similar to that of the sesquiterpene cyclase epiaristolochene synthase. Conservation Sequences containing this protein domain belong to the terpene synthase family. It has been suggested that this gene family be designated tps (for terpene synthase). Sequence comparisons reveal similarities between the monoterpene (C10) synthases, sesquiterpene (C15) synthases and the diterpene (C20) synthases. It has been split into six subgroups on the basis of phylogeny, called Tpsa-Tpsf . Tpsa includes vetispiridiene synthase. Tpsb includes (-)-limonene synthase. Tpsc includes copalyl diphosphate synthase (kaurene synthase A). Tpsd includes taxadiene synthase, pinene synthase, and myrcene synthase. Tpse includes ent-kaurene synthase B. Tpsf includes S-linalool synthase. In the fungus Phaeosphaeria sp. (strain L487) the synthesis of ent-kaurene from geranylgeranyl dophosphate is promoted by a single bifunctional protein. See also Terpene synthase C terminal domain
https://en.wikipedia.org/wiki/Nuclear%20equivalence
According to the principle of nuclear equivalence, the nuclei of essentially all differentiated adult cells of an individual are genetically (though not necessarily metabolically) identical to one another and to the nucleus of the zygote from which they descended. This means that virtually all somatic cells in an adult have the same genes. However, different cells express different subsets of these genes. The evidence for nuclear equivalence comes from cases in which differentiated cells or their nuclei have been found to retain the potential of directing the development of the entire organism. Such cells or nuclei are said to exhibit totipotency.
https://en.wikipedia.org/wiki/James%20Harrison%20%28engineer%29
James Harrison (17 April 1816 – 3 September 1893) was a Scottish Victorian newspaper printer, journalist, politician, and pioneer in the field of mechanical refrigeration. Harrison founded the Geelong Advertiser newspaper and was a member of the Victorian Legislative Council and Victorian Legislative Assembly. Harrison is also remembered as the inventor of the mechanical refrigeration process creating ice and founder of the Victorian Ice Works and as a result, is often called "the father of refrigeration". In 1873 he won a gold medal at the Melbourne Exhibition by proving that meat kept frozen for months remained perfectly edible. Early life James Harrison was born at Bonhill, Dunbartonshire, the son of a fisherman. Harrison attended Anderson's University and then the Glasgow Mechanics' Institution, specialising in chemistry. He trained as a printing apprentice in Glasgow and worked in London as a compositor before emigrating to Sydney, Australia in 1837 to set up a printing press for the English company Tegg & Co. Moving to Melbourne in 1839 he found employment with John Pascoe Fawkner as a compositor and later editor on Fawkner's Port Phillip Patriot. When Fawkner acquired a new press, Harrison offered him 30 pounds for the original old press to start Geelong's first newspaper. The first weekly edition of the Geelong Advertiser appeared November 1840: edited by 'James Harrison and printed and published for John Pascoe Fawkner (sole proprietor) by William Watkins...'. By November 1842, Harrison became sole owner. Political career Harrison was a member of Geelong's first town council in 1850 and represented Geelong in the Victorian Legislative Council from November 1854 until its abolition in March 1856. Harrison then represented Geelong 1858–59 and Geelong West 1859–60 in the Victorian Legislative Assembly. As an editor he was an early advocate for tariff protection which later he brought to prominence when he was editor of The Age under the proprietorship of
https://en.wikipedia.org/wiki/Declawing%20of%20crabs
Declawing of crabs is the process whereby one or both claws of a crab are manually detached before the return of the live crab to the water, as practiced in the fishing industry worldwide. Crabs commonly have the ability to regenerate lost limbs after a period of time, and thus declawing is viewed as a potentially more sustainable method of fishing. Due to the time it takes for a crab to regrow lost limbs, however, whether or not the practice represents truly sustainable fishing is still a point of scientific inquiry, and the ethics of declawing are also subject to debates over pain in crustaceans. While not always fatal, declawing can substantially alter the chances of a crab's survival in the wild. Declawing is a controversial practice; some jurisdictions have banned it partially or completely, while others only allow the crab's claws to be harvested commercially. Procedure Declawing is done by hand. To ensure a clean break along the natural fracture plane, one finger is placed on the basal cheliped joint. A rapid and firm downward motion is then applied as the claw is fully extended, breaking the claw at the basi-ischum between the coxa at the base of the leg and the merus. Particularly for crabs whose whole bodies are not consumed by humans, declawing is an attractive practice. Claw removal can facilitate storage and transport of crab meat, eliminate cannibalism within storage tanks, and make handling easier for crew. Effects of declawing Crabs that survive the initial declawing face potential disadvantages in feeding, mating, and self-defense. The most immediate impact of declawing, however, is possible death. In an experiment using commercial techniques, 47% of Florida stone crabs that had both claws removed died after declawing, as did 28% of single-claw amputees. 76% of these casualties occurred within 24 hours of declawing. Declawing also affects the ability of a crab to feed, as crabs generally use their claws to facilitate the capture and consumption
https://en.wikipedia.org/wiki/Victorivirus
Victorivirus is a genus of viruses, in the family Totiviridae. Filamentous fungi serve as natural hosts. There are 14 species in this genus. Structure Viruses in Victorivirus are non-enveloped, with icosahedral geometries, and T=2 symmetry. The diameter is around 40 nm. Genomes are linear, around 4.6-6.7kb in length. The genome has 2 open reading frames. Life cycle Viral replication is cytoplasmic. Entry into the host cell is achieved by virus remains intracellular. Replication follows the double-stranded RNA virus replication model. Double-stranded RNA virus transcription is the method of transcription. Translation takes place by RNA termination-reinitiation. The virus exits the host cell by cell to cell movement. Filamentous fungi serve as the natural host. Taxonomy The genus Victorivirus includes the following species: Aspergillus foetidus slow virus 1 Beauveria bassiana victorivirus 1 Chalara elegans RNA Virus 1 Coniothyrium minitans RNA virus Epichloe festucae virus 1 Gremmeniella abietina RNA virus L1 Helicobasidium mompa totivirus 1-17 Helminthosporium victoriae virus 190S Magnaporthe oryzae virus 1 Magnaporthe oryzae virus 2 Rosellinia necatrix victorivirus 1 Sphaeropsis sapinea RNA virus 1 Sphaeropsis sapinea RNA virus 2 Tolypocladium cylindrosporum virus 1
https://en.wikipedia.org/wiki/Tav%20HaYosher
The Tav HaYosher is a certification mark offered, free of charge, to Kosher food establishments that meet a series of ethical criteria developed by the organization, Uri L'Tzedek. Particularly, the Tav HaYosher confirms that an eating establishment with its seal pays minimum wage to all employees and overtime to those employees working more than 40 hours a week. It also ensures the establishment offers employees appropriate breaks as required by law, and provides a safe and abuse-free working environment. Traditional kosher certification agencies such as the Orthodox Union and Star-K offer kosher certification (known in Hebrew as a Hechsher), which confirms that the food meets the standards of kosher dietary law and can be eaten by those Jews who observe the laws of Kashrut. Many non-Jews purchase kosher food, believing that the kosher certification implies that the food was produced to meet a higher ethical standard all around, not just in terms of Jewish law (Halacha) and Kashrut. Many kosher consumers were shocked to discover that Agriprocessors, a kosher slaughterhouse and meat processor in Postville, Iowa, had been raided by Federal authorities on May 12, 2009, where U.S. Immigration and Customs Enforcement had discovered breaches ranging from fraud to defiance of child labor laws to immigration violations. In 2009, the Tav HaYosher was announced by Uri L'Tzedek as the Orthodox Jewish community's response to these legal and ethical offenses. Each restaurant applying for the certificate is reviewed by one of 60 volunteers, who audit the company's ledgers and speak with workers to ensure that they are being treated fairly. The Tav HaYosher ensures that workers receive their rights according to federal and state law as well as ethical standards. After the free initial certification, inspectors visit each establishment unannounced every two to three months to verify continuing compliance. In May 2009 five New York City restaurants carried Tav HaYosher seal and
https://en.wikipedia.org/wiki/Bass%20conjecture
In mathematics, especially algebraic geometry, the Bass conjecture says that certain algebraic K-groups are supposed to be finitely generated. The conjecture was proposed by Hyman Bass. Statement of the conjecture Any of the following equivalent statements is referred to as the Bass conjecture. For any finitely generated Z-algebra A, the groups K'n(A) are finitely generated (K-theory of finitely generated A-modules, also known as G-theory of A) for all n ≥ 0. For any finitely generated Z-algebra A, that is a regular ring, the groups Kn(A) are finitely generated (K-theory of finitely generated locally free A-modules). For any scheme X of finite type over Spec(Z), K'n(X) is finitely generated. For any regular scheme X of finite type over Z, Kn(X) is finitely generated. The equivalence of these statements follows from the agreement of K- and K'-theory for regular rings and the localization sequence for K'-theory. Known cases Daniel Quillen showed that the Bass conjecture holds for all (regular, depending on the version of the conjecture) rings or schemes of dimension ≤ 1, i.e., algebraic curves over finite fields and the spectrum of the ring of integers in a number field. The (non-regular) ring A = Z[x, y]/x2 has an infinitely generated K1(A). Implications The Bass conjecture is known to imply the Beilinson–Soulé vanishing conjecture.
https://en.wikipedia.org/wiki/RootkitRevealer
RootkitRevealer is a proprietary freeware tool for rootkit detection on Microsoft Windows by Bryce Cogswell and Mark Russinovich. It runs on Windows XP and Windows Server 2003 (32-bit-versions only). Its output lists Windows Registry and file system API discrepancies that may indicate the presence of a rootkit. It is the same tool that triggered the Sony BMG copy protection rootkit scandal. RootkitRevealer is no longer being developed. See also Sysinternals Process Explorer Process Monitor ProcDump