source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Fernseh | The Fernseh AG television company was registered in Berlin on July 3, 1929, by John Logie Baird, Robert Bosch, Zeiss Ikon and D.S. Loewe as partners. John Baird owned Baird Television Ltd. in London, Zeiss Ikon was a camera company in Dresden, D.S. Loewe owned a company in Berlin and Robert Bosch owned a company, Robert Bosch GmbH, in Stuttgart. with an initial capital of 100,000 Reichsmark. Fernseh AG did research and manufacturing of television equipment.
Etymology
The company name "Fernseh AG" is a compound of Fernsehen ‘television’ and Aktiengesellschaft (AG) ‘joint-stock company’. The company was mainly known by its German abbreviation "FESE". See section see also on this page for other uses.
Early years
In 1929 Fernseh AG's original board of directors included: Emanuel Goldberg, Oliver George Hutchinson (for Baird), David Ludwig Loewe, and Erich Carl Rassbach (for Bosch) and Eberhard Falkenstein who did the legal work.
Carl Zeiss's company worked alongside the early Bosch company. Much of the early work was in the area of research and development. Along with early TV sets (DE-6, E1, DE10) Fernseh AG made the first "Remote Truck"/"OB van", an "intermediate-film" mobile television camera in August 1932. This was a film camera that had its film developed in the truck and a "telecine" then transmitted the signal almost "live".
Fernseh GmbH
In 1939 Robert Bosch GmbH took complete ownership of Fernseh AG when Zeiss Ikon AG sold its share of Fernseh AG.
In 1952 Fernseh moved to Darmstadt, Germany, and increased its broadcast product line.
In 1967 Fernseh, by then commonly called "Bosch Fernseh", introduced color TV products. Fernseh offered a full line of video and film equipment: professional video cameras, VTRs and telecine devices. On August 27, 1967, the first color TV program in Germany aired, with a live broadcast from a Bosch Fernseh outside broadcast (OB) van. The networks ZDF, NDR and WDR each acquired a new color OB van from Bosch Fernseh to begin broadc |
https://en.wikipedia.org/wiki/Superprism | A superprism is a photonic crystal in which an entering beam of light will lead to an extremely large angular dispersion. The ability of the photonic crystal to send optical beams with different wavelengths to considerably different angles in space in superprisms has been used to demonstrate wavelength demultiplexing in these structures. The first superprism also modified group velocity rather than phase velocity in order to achieve the "superprism phenomena". This effect was interpreted as anisotropic dispersion in contrast to an isotropic dispersion. Furthermore, the two beams of light appear to show negative bending within the crystal.
See also
Mirror Pack
Superlens
Prism (optics)
Metamaterial
Perfect mirror |
https://en.wikipedia.org/wiki/Lamb%20meal | Lamb meal is a popular ingredient in dog food. It is the dry rendered part from mammal tissues, specially prepared for feeding purposes by tanking under live steam or dry rendering. Though the meat has been cooked, dried, and ground, it is still meat, and has not had any blood, hair, hoof, horn, hide trimmings, manure, stomach or rumen contents added to it. |
https://en.wikipedia.org/wiki/List%20of%20interstitial%20cells | Interstitial cell refers to any cell that lies in the spaces between the functional cells of a tissue.
Examples include:
Interstitial cell of Cajal (ICC)
Leydig cells, cells present in the male testes responsible for the production of androgen (male sex hormone)
A portion of the stroma of ovary
Certain cells in the pineal gland
Renal interstitial cells
neuroglial cells
See also
List of human cell types derived from the germ layers |
https://en.wikipedia.org/wiki/Mir-498%20microRNA%20precursor%20family | In molecular biology mir-498 microRNA is a short RNA molecule. MicroRNAs function to regulate the expression levels of other genes by several mechanisms.
See also
MicroRNA |
https://en.wikipedia.org/wiki/Lumbar%20arteries | The lumbar arteries are arteries located in the lower back or lumbar region. The lumbar arteries are in parallel with the intercostals.
They are usually four in number on either side, and arise from the back of the aorta, opposite the bodies of the upper four lumbar vertebrae.
A fifth pair, small in size, is occasionally present: they arise from the middle sacral artery.
They run lateralward and backward on the bodies of the lumbar vertebrae, behind the sympathetic trunk, to the intervals between the adjacent transverse processes, and are then continued into the abdominal wall.
The arteries of the right side pass behind the inferior vena cava, and the upper two on each side run behind the corresponding crus of the diaphragm.
The arteries of both sides pass beneath the tendinous arches which give origin to the psoas major, and are then continued behind this muscle and the lumbar plexus.
They now cross the quadratus lumborum, the upper three arteries running behind, the last usually in front of the muscle.
At the lateral border of the quadratus lumborum they pierce the posterior aponeurosis of the transversus abdominis and are carried forward between this muscle and the obliquus internus.
They anastomose with the lower intercostal, the subcostal, the iliolumbar, the deep iliac circumflex, and the inferior epigastric arteries.
Additional images
See also
Lumbar veins |
https://en.wikipedia.org/wiki/Bode%20plot | In electrical engineering and control theory, a Bode plot is a graph of the frequency response of a system. It is usually a combination of a Bode magnitude plot, expressing the magnitude (usually in decibels) of the frequency response, and a Bode phase plot, expressing the phase shift.
As originally conceived by Hendrik Wade Bode in the 1930s, the plot is an asymptotic approximation of the frequency response, using straight line segments.
Overview
Among his several important contributions to circuit theory and control theory, engineer Hendrik Wade Bode, while working at Bell Labs in the 1930s, devised a simple but accurate method for graphing gain and phase-shift plots. These bear his name, Bode gain plot and Bode phase plot. "Bode" is often pronounced , although the Dutch pronunciation is Bo-duh. ().
Bode was faced with the problem of designing stable amplifiers with feedback for use in telephone networks. He developed the graphical design technique of the Bode plots to show the gain margin and phase margin required to maintain stability under variations in circuit characteristics caused during manufacture or during operation. The principles developed were applied to design problems of servomechanisms and other feedback control systems. The Bode plot is an example of analysis in the frequency domain.
Definition
The Bode plot for a linear, time-invariant system with transfer function ( being the complex frequency in the Laplace domain) consists of a magnitude plot and a phase plot.
The Bode magnitude plot is the graph of the function of frequency (with being the imaginary unit). The -axis of the magnitude plot is logarithmic and the magnitude is given in decibels, i.e., a value for the magnitude is plotted on the axis at .
The Bode phase plot is the graph of the phase, commonly expressed in degrees, of the transfer function as a function of . The phase is plotted on the same logarithmic -axis as the magnitude plot, but the value for the phase is pl |
https://en.wikipedia.org/wiki/CLC%20bio | CLC bio was a bioinformatics software company that developed a software suite subsequently purchased by QIAGEN.
History
CLC bio started commercial activities on January 1, 2005 headquartered in Aarhus, Denmark. Its product's development was also partly funded by collaborating with researchers on grant-funded projects. By 2012, it had additional offices in Cambridge, Massachusetts, Tokyo, Taipei and Delhi, with staff largely from research backgrounds (30% having a PhD) and had built a userbase of around 250,000 users in both academic institutions and biotechnology companies.
CLC bio was acquired by QIAGEN in 2013 and merged into its bioinformatics research and development division with several other purchased platforms in 2014.
Software
CLC bio's main activities were in software development for desktop (Mac OS X, Windows, and Linux), enterprise, and cloud software for analysis of biological data. CLC bio developed some of their own open source algorithms, as well as their own SIMD-accelerated implementations of several existing popular applications. In 2010, CLC bio was notable as the first commercial platform for bioinformatics analysis that utilized a graphical user interface for building, managing, and deploying analysis workflows as well as command-line tools, a SOAP and REST API, and later, the ability to run containerized tools.
As additional capabilities were added to the software platform, it was eventually split into several themed Workbenches and plugins with collections of features relevant to different applications (e.g. pathway analysis, genomics, and other omics). Features include read mapping and de novo assembly of high-throughput sequencing data, whole-genome detection of SNPs and structural variations, ChIP-seq, RNA-Seq, small RNA analysis, genome finishing, microbial genomics, structural biology, and functions to analyze, visualize, and compare genomic, transcriptomic, and epigenomic data.
Cloud Computing
In 2017, CLC bio launched their CL |
https://en.wikipedia.org/wiki/STONITH | STONITH ("Shoot The Other Node In The Head" or "Shoot The Offending Node In The Head"), sometimes called STOMITH ("Shoot The Other Member/Machine In The Head"), is a technique for fencing in computer clusters.
Fencing is the isolation of a failed node so that it does not cause disruption to a computer cluster. As its name suggests, STONITH fences failed nodes by resetting or powering down the failed node.
Multi-node error-prone contention in a cluster can have catastrophic results, such as if both nodes try writing to a shared storage resource. STONITH provides effective, if rather drastic, protection against these problems.
Single node systems use a comparable mechanism called a watchdog timer. A watchdog timer will reset the node if the node does not tell the watchdog circuit that it is operating well. A STONITH decision can be based on various decisions which can be customer specific plugins.
Google's inclusive language developer documentation discourages usage of this term. |
https://en.wikipedia.org/wiki/Archives%20of%20Virology | The Archives of Virology is a peer-reviewed scientific journal covering research in virology. It is published by Springer Science+Business Media and is the official journal of the Virology Division of the International Union of Microbiological Societies. It was established in 1939 as the Archiv für die gesamte Virusforschung and obtained its current title in 1975. According to the Journal Citation Reports, the journal has a 2020 impact factor of 2.574. |
https://en.wikipedia.org/wiki/Frontal%20eminence | A frontal eminence (or tuber frontale) is either of two rounded elevations on the frontal bone of the skull. They lie about 3 cm above the supraorbital margin on each side of the frontal suture. They are the site of ossification of the frontal bone during embryological development, although may not be the first site.
The frontal eminences vary in size in different individuals, are occasionally asymmetrical, and are especially prominent in young skulls. The surface of the bone above them is smooth, and covered by the epicranial aponeurosis.
See also
Squamous part of the frontal bone |
https://en.wikipedia.org/wiki/Chilling%20requirement | The chilling requirement of a fruit is the minimum period of cold weather after which a fruit-bearing tree will blossom. It is often expressed in chill hours, which can be calculated in different ways, all of which essentially involve adding up the total amount of time in a winter spent at certain temperatures.
Some bulbs have chilling requirements to bloom, and some seeds have chilling requirements to sprout.
Biologically, the chilling requirement is a way of ensuring that vernalization occurs.
Chilling units or chilling hours
A chilling unit in agriculture is a metric of a plant's exposure to chilling temperatures. Chilling temperatures extend from freezing point to, depending on the model, or even . Stone fruit trees and certain other plants of temperate climate develop next year's buds in the summer. In the autumn the buds become dormant, and the switch to proper, healthy dormancy is triggered by a certain minimum exposure to chilling temperatures. Lack of such exposure results in delayed and substandard foliation, flowering and fruiting. One chilling unit, in the simplest models, is equal to one hour's exposure to the chilling temperature; these units are summed up for a whole season. Advanced models assign different weights to different temperature bands.
Requirements
According to Fishman, chilling in trees acts in two stages. The first is reversible: chilling helps to build up the precursor to dormancy, but the process can be easily reversed with a rise in temperature. After the level of precursor reaches a certain threshold, dormancy becomes irreversible and will not be affected by short-term warm temperature peaks. Apples have the highest chilling requirements of all fruit trees, followed by apricots and, lastly, peaches. Apple cultivars have a diverse range of permissible minimum chilling: most have been bred for temperate weather, but Gala and Fuji can be successfully grown in subtropical Bakersfield, California.
Peach cultivars in Texas range in |
https://en.wikipedia.org/wiki/Brazilian%20Society%20of%20Physiology | The Brazilian Society of Physiology (Sociedade Brasileira de Fisiologia, in Portuguese language, official abbreviation SBFis) is a learned society and association of students and professionals in physiology in Brazil. It is a member of the Brazilian Federation of Experimental Biology Societies (FeSBE) and of the Brazilian Society for the Advancement of Science (SBPC). Internationally, it is the country's representative at the International Union of Physiological Sciences (IUPS) and at the Latin American Association of Physiological Sciences.
The Society was founded on August 10, 1957, in the city of Rio de Janeiro. Among the founding members was a host of important Brazilian scientists of the century, such as Wilson Teixeira Beraldo, Oto G. Bier, Franklin Moura Campos, Alberto de Carvalho, Carlos Chagas, Nelson Chaves, Mário Vianna Dias, Carlos Ribeiro Diniz, Hiss Martins Ferreira, Paulo Enéas Galvão, José Moura Gonçalves, Aristides Pacheco Leão, Thales Martins, Erasmo G. Mendes, José Ribeiro do Valle, Fernando Ubatuba, Amadeu Cury, Haiti Moussatché, Eline S. Prado, José Leal Prado, Paulo Sawaya, Mauricio Rocha e Silva, Lauro Sollero and Baeta Viana. Prof. Thales Martins was elected the first president. Among its most noted past presidents were Wilson Beraldo, Hiss Martins Ferreira, Eduardo Moacyr Krieger, César Timo-Iaria and Gerhard Malnic.
The Society's official journal is the Brazilian Journal of Medical and Biological Research, which is published on-line by SciElo.
See also
Brazilian science and technology
External links
SBFis official site
Scientific societies based in Brazil
Biology societies
Medical associations based in Brazil
Physiology organizations |
https://en.wikipedia.org/wiki/Rotating%20reference%20frame | A rotating frame of reference is a special case of a non-inertial reference frame that is rotating relative to an inertial reference frame. An everyday example of a rotating reference frame is the surface of the Earth. (This article considers only frames rotating about a fixed axis. For more general rotations, see Euler angles.)
Fictitious forces
All non-inertial reference frames exhibit fictitious forces; rotating reference frames are characterized by three:
the centrifugal force,
the Coriolis force,
and, for non-uniformly rotating reference frames,
the Euler force.
Scientists in a rotating box can measure the rotation speed and axis of rotation by measuring these fictitious forces. For example, Léon Foucault was able to show the Coriolis force that results from Earth's rotation using the Foucault pendulum. If Earth were to rotate many times faster, these fictitious forces could be felt by humans, as they are when on a spinning carousel.
Centrifugal force
In classical mechanics, centrifugal force is an outward force associated with rotation. Centrifugal force is one of several so-called pseudo-forces (also known as inertial forces), so named because, unlike real forces, they do not originate in interactions with other bodies situated in the environment of the particle upon which they act. Instead, centrifugal force originates in the rotation of the frame of reference within which observations are made.
Coriolis force
The mathematical expression for the Coriolis force appeared in an 1835 paper by a French scientist Gaspard-Gustave Coriolis in connection with hydrodynamics, and also in the tidal equations of Pierre-Simon Laplace in 1778. Early in the 20th century, the term Coriolis force began to be used in connection with meteorology.
Perhaps the most commonly encountered rotating reference frame is the Earth. Moving objects on the surface of the Earth experience a Coriolis force, and appear to veer to the right in the northern hemisphere, and to the l |
https://en.wikipedia.org/wiki/Internal%20conversion | Internal conversion is an atomic decay process where an excited nucleus interacts electromagnetically with one of the orbital electrons of an atom. This causes the electron to be emitted (ejected) from the atom. Thus, in internal conversion (often abbreviated IC), a high-energy electron is emitted from the excited atom, but not from the nucleus. For this reason, the high-speed electrons resulting from internal conversion are not called beta particles, since the latter come from beta decay, where they are newly created in the nuclear decay process.
IC is possible whenever gamma decay is possible, except if the atom is fully ionized. In IC, the atomic number does not change, and thus there is no transmutation of one element to another.
Since an electron is lost from the atom, a hole appears in an electron aura which is subsequently filled by other electrons that descend to the empty, yet lower energy level, and in the process emit characteristic X-ray(s), Auger electron(s), or both. The atom thus emits high-energy electrons and X-ray photons, none of which originate in that nucleus. The atom supplied the energy needed to eject the electron, which in turn caused the latter events and the other emissions.
Since primary electrons from IC carry a fixed (large) part of the characteristic decay energy, they have a discrete energy spectrum, rather than the spread (continuous) spectrum characteristic of beta particles. Whereas the energy spectrum of beta particles plots as a broad hump, the energy spectrum of internally converted electrons plots as a single sharp peak (see example below).
Mechanism
In the quantum model of the electron, there is non-zero probability of finding the electron within the nucleus. In internal conversion, the wavefunction of an inner shell electron (usually an s electron) penetrates the nucleus. When this happens, the electron may couple to an excited energy state of the nucleus and take the energy of the nuclear transition directly, without an |
https://en.wikipedia.org/wiki/Ovomucin | Ovomucin is a glycoprotein found mainly in egg whites, as well as in the chalaza and vitelline membrane. The protein makes up around 2-4% of the protein content of egg whites; like other members of the mucin protein family, ovomucin confers gel-like properties. It is composed of two subunits, alpha-ovomucin (MUC5B) and beta-ovomucin (MUC6), of which the beta subunit is much more heavily glycosylated.
External links |
https://en.wikipedia.org/wiki/Cubist%20Pharmaceuticals | Cubist Pharmaceuticals was an American biopharmaceutical company that targeted pathogens like MRSA.
. The company employed 638 people, mostly in Lexington, MA. On 8 December 2014, Merck & Co. acquired Cubist for $102 per share in cash ($8.4 billion).
History
Cubist was founded in May 1992 by John K. Clarke, Paul R. Schimmel, Ph.D. and Barry M. Bloom, Ph.D, all of whom were also directors.
Cubist appeared on Fortune 2010’s List of fastest growing companies, and was named to the 2010 Deloitte Technology Fast 500.
In 2011, the company acquired Adolor, maker of a drug for treatment of constipation.
The company expected sales of its drug Cubicin to grow to more than 1 billion dollars per year.
In July 2013, Cubist Pharmaceuticals agreed to purchase Trius Therapeutics and Optimer Pharmaceuticals for around $1.6 billion.
In 2014, succeeding Michael Bonney as President, Robert J. Perez, was announced to take leadership on January 1, 2015.
In January 2015 Cubist Pharmaceuticals became a wholly owned subsidiary of Merck & Co.
Products
The company developed Cubicin (daptomycin) for injection, the first antibiotic in a class of anti-infectives called lipopeptides. In 2011, Cubist settled a patent litigation with Teva Pharmaceutical Industries regarding Cubicin.
In April 2011 it reached a deal with Optimer Pharmaceuticals in which its class of bacterium fighting drugs will be co marketed with Optimer's Fidaxomicin/Dificid (for $15 million per year).
In 2011, its product pipeline focused on gram-negative bacterial infections, Clostridium difficile-associated diarrhea, and respiratory syncytial virus.
Tedizolid was approved by the US Food and Drug Administration on June 20, 2014. |
https://en.wikipedia.org/wiki/Ecosection | An ecosection is a biogeographic unit smaller than an ecoregion that contains minor physiographic, macroclimatic or oceanographic variations. They are a virtual ecological zone in the Canadian province of British Columbia, which contains 139 ecosections that vary from pure terrestrial units to pure marine units.
See also
Bioregion
Ecological classification |
https://en.wikipedia.org/wiki/Job%20Submission%20Description%20Language | Job Submission Description Language is an extensible XML specification from the Global Grid Forum for the description of simple tasks to non-interactive computer execution systems. Currently at version 1.0 (released November 7, 2005), the specification focuses on the description of computational task submissions to traditional high-performance computer systems like batch schedulers.
Description
JSDL describes the submission aspects of a job, and does not attempt to describe the state of running or historic jobs. Instead, JSDL includes descriptions of:
Job name, description
Resource requirements that computers must have to be eligible for scheduling, such as total RAM available, total swap available, CPU clock speed, number of CPUs, Operating System, etc.
Execution limits, such as the maximum amount of CPU time, wallclock time, or memory that can be consumed.
File staging, or the transferring of files before or after execution.
Command to execute, including its command-line arguments, environment variables to define, stdin/stdout/stderr redirection, etc.
Software support
The following software is known to currently support JSDL:
GridWay meta scheduler
Platform LSF 7
UNICORE 6
GridSAM
Windows HPC Server 2008
GRIA
Genesis II Project http://genesis2.virginia.edu/wiki/
Advanced Resource Connector (ARC v0.6 and above)
XtreemOS Grid Operating System
EMOTIVE Cloud
IBM Tivoli Workload Scheduler Tivoli Workload Scheduler
See also
Resource Specification Language (See The Globus Resource Specification Language RSL v1.0)
Distributed Resource Management Application API
External links
JSDL working group project page
Windows HPC Server 2008
Grid computing
XML-based standards
Computer-related introductions in 2005 |
https://en.wikipedia.org/wiki/TRAIL | In the field of cell biology, TNF-related apoptosis-inducing ligand (TRAIL), is a protein functioning as a ligand that induces the process of cell death called apoptosis.
TRAIL is a cytokine that is produced and secreted by most normal tissue cells. It causes apoptosis primarily in tumor cells, by binding to certain death receptors. TRAIL and its receptors have been used as the targets of several anti-cancer therapeutics since the mid-1990s, such as Mapatumumab. However, as of 2013, these have not shown significant survival benefit. TRAIL has also been implicated as a pathogenic or protective factor in various pulmonary diseases, particularly pulmonary arterial hypertension.
TRAIL has also been designated CD253 (cluster of differentiation 253) and TNFSF10 (tumor necrosis factor (ligand) superfamily, member 10).
Gene
In humans, the gene that encodes TRAIL is located at chromosome 3q26, which is not close to other TNF family members. The genomic structure of the TRAIL gene spans approximately 20 kb and is composed of five exonic segments 222, 138, 42, 106, and 1245 nucleotides and four introns of approximately 8.2, 3.2, 2.3 and 2.3 kb.
The TRAIL gene lacks TATA and CAAT boxes and the promoter region contains putative response elements for transcription factors GATA, AP-1, C/EBP, SP-1, OCT-1, AP3, PEA3, CF-1, and ISRE.
The TRAIL gene as a drug target
TIC10 (which causes expression of TRAIL) was investigated in mice with various tumour types.
Small molecule ONC201 causes expression of TRAIL which kills some cancer cells.
Structure
TRAIL shows homology to other members of the tumor necrosis factor superfamily. It is composed of 281 amino acids and has characteristics of a type II transmembrane protein. The N-terminal cytoplasmic domain is not conserved across family members, however, the C-terminal extracellular domain is conserved and can be proteolytically cleaved from the cell surface. TRAIL forms a homotrimer that binds three receptor molecules.
Function |
https://en.wikipedia.org/wiki/Compound%20butter | Compound butters (, pl. beurres composés) are mixtures of butter and other ingredients used as a flavoring, in a fashion similar to a sauce.
Compound butters can be made or bought. A compound butter can be made by whipping additional elements, such as herbs, spices or aromatic liquids, into butter. It is usually re-formed and chilled before being melted on top of meats and vegetables, used as a spread, or used to finish sauces.
Beurres composés include:
Beurre à la bourguignonne – garlic and parsley butter
Beurre maitre d'hotel, butter with parsley and lemon juice
Café de Paris butter
Garlic butter
Beurre au citron – lemon butter
See also
Beurre manié, butter mixed with flour, used as a thickener in cooking
Cannabis butter or cannabutter, butter blended with cannabis and water, generally used in baking. |
https://en.wikipedia.org/wiki/Structural%20genomics | Structural genomics seeks to describe the 3-dimensional structure of every protein encoded by a given genome. This genome-based approach allows for a high-throughput method of structure determination by a combination of experimental and modeling approaches. The principal difference between structural genomics and traditional structural prediction is that structural genomics attempts to determine the structure of every protein encoded by the genome, rather than focusing on one particular protein. With full-genome sequences available, structure prediction can be done more quickly through a combination of experimental and modeling approaches, especially because the availability of large number of sequenced genomes and previously solved protein structures allows scientists to model protein structure on the structures of previously solved homologs.
Because protein structure is closely linked with protein function, the structural genomics has the potential to inform knowledge of protein function. In addition to elucidating protein functions, structural genomics can be used to identify novel protein folds and potential targets for drug discovery. Structural genomics involves taking a large number of approaches to structure determination, including experimental methods using genomic sequences or modeling-based approaches based on sequence or structural homology to a protein of known structure or based on chemical and physical principles for a protein with no homology to any known structure.
As opposed to traditional structural biology, the determination of a protein structure through a structural genomics effort often (but not always) comes before anything is known regarding the protein function. This raises new challenges in structural bioinformatics, i.e. determining protein function from its 3D structure.
Structural genomics emphasizes high throughput determination of protein structures. This is performed in dedicated centers of structural genomics.
While most struct |
https://en.wikipedia.org/wiki/Boundary%20element%20method | The boundary element method (BEM) is a numerical computational method of solving linear partial differential equations which have been formulated as integral equations (i.e. in boundary integral form), including fluid mechanics, acoustics, electromagnetics (where the technique is known as method of moments or abbreviated as MoM), fracture mechanics, and contact mechanics.
Mathematical basis
The integral equation may be regarded as an exact solution of the governing partial differential equation. The boundary element method attempts to use the given boundary conditions to fit boundary values into the integral equation, rather than values throughout the space defined by a partial differential equation. Once this is done, in the post-processing stage, the integral equation can then be used again to calculate numerically the solution directly at any desired point in the interior of the solution domain.
BEM is applicable to problems for which Green's functions can be calculated. These usually involve fields in linear homogeneous media. This places considerable restrictions on the range and generality of problems to which boundary elements can usefully be applied. Nonlinearities can be included in the formulation, although they will generally introduce volume integrals which then require the volume to be discretised before solution can be attempted, removing one of the most often cited advantages of BEM. A useful technique for treating the volume integral without discretising the volume is the dual-reciprocity method. The technique approximates part of the integrand using radial basis functions (local interpolating functions) and converts the volume integral into boundary integral after collocating at selected points distributed throughout the volume domain (including the boundary). In the dual-reciprocity BEM, although there is no need to discretize the volume into meshes, unknowns at chosen points inside the solution domain are involved in the linear algebraic equ |
https://en.wikipedia.org/wiki/UBB%2B1 | UBB+1 is shorthand for Ubiquitin-B+1, a frameshifted mutant arising from the Ubiquitin B gene. UBB+1 is thought to arise from molecular misreading, a poorly understood process. Molecular misreading introduces dinucleotide deletions (e.g. ΔGA, ΔGU) into mRNA transcripts. These deletions are not present in genomic DNA. UBB+1 has been observed in the hallmarks of Alzheimer's disease, as well as other tauopathies and in polyglutamine diseases (e.g. Huntington's disease) but not in synucleinopathies (e.g. Parkinson's disease). Since its discovery it has been shown in vitro and in vivo that UBB+1 inhibits the proteasome and gives rise to downstream effects (e.g. a behavioral phenotype; impaired contextual memory). In non-neuronal cells UBB+1 also accumulates suggesting a functional role in non-neuronal diseases. UBB+1 can be truncated by yeast's ubiquitin hydrolase 1 (YUH1) and ubiquitin C-terminal hydrolase L3 UCHL3 even though the glycine at position 76 has been substituted for a tyrosine. |
https://en.wikipedia.org/wiki/Chronology%20of%20computation%20of%20%CF%80 | The table below is a brief chronology of computed numerical values of, or bounds on, the mathematical constant pi (). For more detailed explanations for some of these calculations, see Approximations of .
The last 100 decimal digits of the latest 2022 world record computation are:
4658718895 1242883556 4671544483 9873493812 1206904813 2656719174 5255431487 2142102057 7077336434 3095295560
Before 1400
1400–1949
1949–2009
2009–present
See also
History of pi
Approximations of π |
https://en.wikipedia.org/wiki/Universal%20parabolic%20constant | The universal parabolic constant is a mathematical constant.
It is defined as the ratio, for any parabola, of the arc length of the parabolic segment formed by the latus rectum to the focal parameter. The focal parameter is twice the focal length. The ratio is denoted P.
In the diagram, the latus rectum is pictured in blue, the parabolic segment that it forms in red and the focal parameter in green. (The focus of the parabola is the point F and the directrix is the line L.)
The value of P is
. The circle and parabola are unique among conic sections in that they have a universal constant. The analogous ratios for ellipses and hyperbolas depend on their eccentricities. This means that all circles are similar and all parabolas are similar, whereas ellipses and hyperbolas are not.
Derivation
Take as the equation of the parabola. The focal parameter is and the semilatus rectum is .
Properties
P is a transcendental number.
Proof. Suppose that P is algebraic. Then must also be algebraic. However, by the Lindemann–Weierstrass theorem, would be transcendental, which is not the case. Hence P is transcendental.
Since P is transcendental, it is also irrational.
Applications
The average distance from a point randomly selected in the unit square to its center is
Proof.
There is also an interesting geometrical reason why this constant appears in unit squares. The average distance between a center of a unit square and a point on the square's boundary is .
If we uniformly sample every point on the perimeter of the square, take line segments (drawn from the center) corresponding to each point, add them together by joining each line segment next to the other, scaling them down, the curve obtained is a parabola. |
https://en.wikipedia.org/wiki/Dialysis%20disequilibrium%20syndrome | Dialysis disequilibrium syndrome (DDS) is the collection of neurological signs and symptoms, attributed to cerebral edema, during or following shortly after intermittent hemodialysis or CRRT.
Classically, DDS arises in individuals starting hemodialysis due to end-stage chronic kidney disease and is associated, in particular, with "aggressive" (high solute removal) dialysis. However, it may also arise in fast onset, i.e. acute kidney failure in certain conditions.
Symptoms and signs
Diagnosis of mild DDS is often complicated by other dialysis complications such as malignant hypertension, uremia, encephalopathy, subdural hemorrhage, hyper- and hypoglycaemia, or electrolyte imbalances. Presentation of moderate and severe DDS requires immediate identification and treatment as the condition can result in severe neurological issues and death.
1. Headache
2. Nausea
3. Dizziness
4. Confusion
5. Visual disturbance
6. Tremor
7. Seizures
8. Coma
Causes
The cause of DDS is currently not well understood. There are two theories to explain it; the first theory postulates that urea transport from the brain cells is slowed in chronic kidney disease, leading to a large urea concentration gradient, which results in reverse osmosis. The second theory postulates that organic compounds are increased in uremia to protect the brain and result in injury by, like in the first theory, reverse osmosis. More recent studies on rats noted that brain concentrations of organic osmolytes were not increased relative to baseline after rapid dialysis. Cerebral edema was thus attributed to osmotic effects related to a high urea gradient between plasma and brain.
Diagnosis
Clinical signs of cerebral edema, such as focal neurological deficits, papilledema and decreased level of consciousness, if temporally associated with recent hemodialysis, suggest the diagnosis. A computed tomography of the head is typically done to rule-out other intracranial causes.
MRI of the head has been used in researc |
https://en.wikipedia.org/wiki/After%20Burner | is a rail shooter arcade video game developed and released by Sega in 1987. The player controls an American F-14 Tomcat fighter jet and must clear each of the game's eighteen unique stages by destroying incoming enemies. The plane is equipped with a machine gun and a limited supply of heat-seeking missiles. The game uses a third-person perspective, as in Sega's earlier Space Harrier (1985) and Out Run (1986). It runs on the Sega X Board arcade system which is capable of surface and sprite rotation. It is the fourth Sega game to use a hydraulic "taikan" motion simulator arcade cabinet, one that is more elaborate than their earlier "taikan" simulator games. The cabinet simulates an aircraft cockpit, with flight stick controls, a chair with seatbelt, and hydraulic motion technology that moves, tilts, rolls and rotates the cockpit in sync with the on-screen action.
Designed by Sega veteran Yu Suzuki and the Sega AM2 division, After Burner was intended as being Sega's first "true blockbuster" video game. Development began in December 1986, shortly after the completion of Out Run, and was kept as a closely guarded secret within the company. Suzuki was inspired by the 1986 films Top Gun and Laputa: Castle in the Sky; he originally planned for the game to have a steampunk aesthetic similar to Laputa, but instead went with a Top Gun look to make the game approachable for worldwide audiences. It was designed outside the company in a building named "Studio 128", due to Sega adopting a flextime schedule to allow for games to be worked on outside company headquarters. An updated version with the addition of throttle controls, After Burner II, was released later the same year.
After Burner was a worldwide commercial success, becoming Japan's second highest-grossing large arcade game of 1987 and overall arcade game of 1988 as well as among America's top five highest-grossing dedicated arcade games of 1988. It was acclaimed by critics for its impressive visuals, gameplay and over |
https://en.wikipedia.org/wiki/Kim%20Il%20Sung%20and%20Kim%20Jong%20Il%20badges | Kim Il Sung and Kim Jong Il badges are lapel pins with portraits depicting either one or both of the Eternal Leaders of North Korea, Kim Il Sung and Kim Jong Il. The badges have been common since the late 1960s, and are produced by the Mansudae Art Studio. There are more than 20 different designs, some of which are more common than others. Common examples include red flag-shaped pins depicting either Eternal President Kim Il Sung or Eternal General Secretary Kim Jong Il, smaller circular pins with the same portraits on white backgrounds (often with silver or gold edging), and larger flag-shaped pins depicting both leaders.
The badges were inspired by Chairman Mao badges worn by Chinese revolutionaries and citizens during the rule of Mao Zedong. Unlike their Chinese counterparts, which were never compulsory to wear, the North Korean badges have been an important part of North Korean attire for most of their history. As such, they are culturally more important than Mao badges ever were, and are a key part of North Korea's cult of personality. According to Jae-Cheon Lim, the badges are:
History
The inspiration for the badges were Chairman Mao badges worn by the Chinese during the Cultural Revolution, although North Korean propaganda attributes the idea to Kim Jong Il. It has been suggested by high-ranking defector Hwang Jang-yop that the Kapsan Faction Incident in 1967 triggered the systematic intensification of Kim Il Sung's cult of personality in general and the introduction of the badges in particular.
Badges bearing the portrait of Kim Il Sung first appeared in the late 1960s when the Mansudae Art Studio started making them for Workers' Party of Korea cadres, who started wearing them after the Kapsan Faction Incident. Mass-production followed in November 1970, after a decree by Kim Il Sung. The very first badges with portraits were produced by the party's Propaganda and Agitation Department. This batch of badges featured "a stern-looking portrait of Kim Il Sung |
https://en.wikipedia.org/wiki/Component-based%20usability%20testing | Component-based usability testing (CBUT) is a testing approach which aims at empirically testing the usability of an interaction component. The latter is defined as an elementary unit of an interactive system, on which behavior-based evaluation is possible. For this, a component needs to have an independent, and by the user perceivable and controllable state, such as a radio button, a slider or a whole word processor application. The CBUT approach can be regarded as part of component-based software engineering branch of software engineering.
Theory
CBUT is based on both software architectural views such as model–view–controller (MVC), presentation–abstraction–control (PAC), ICON and CNUCE agent models that split up the software in parts, and cognitive psychology views where a person's mental process is split up in smaller mental processes. Both software architecture and cognitive architecture use the principle of hierarchical layering, in which low level processes are more elementary and for humans often more physical in nature, such as the coordination movement of muscle groups. Processes that operate on higher level layers are more abstract and focus on a person's main goal, such as writing an application letter to get a job.
The layered protocol theory (LPT), which is a special version of perceptual control theory (PCT), brings these views together by suggesting that users interact with a system across several layers by sending messages. Users interact with components on high layers by sending messages, such as pressing keys, to components operating on lower layers, which on their turn relay a series of these messages into a single high-level message, such as DELETE, to a component on a higher layer. Components operating on higher layers, communicate back to the user by sending messages to components operating on lower-level layers. Whereas this layered-interaction model explains how the interaction is established, control loops explain the purpose of the inte |
https://en.wikipedia.org/wiki/Second%20audio%20program | Second audio program (SAP), also known as secondary audio programming, is an auxiliary audio channel for analog television that can be broadcast or transmitted both over-the-air and by cable television. Used mostly for audio description or other languages, SAP is part of the multichannel television sound (MTS) standard originally set by the National Television Systems Committee (NTSC) in 1984 in the United States. The NTSC video format and MTS are also used in Canada and Mexico.
Usage
SAP is often used to provide audio tracks in languages other than the native language included in the program. In the United States, this is sometimes used for Spanish-language audio (especially during sports telecasts), often leading to the function being referred to facetiously as the "Spanish audio program". Likewise, some Spanish-language programs may, in rare cases, offer English on SAP. Some stations may relay NOAA Weather Radio services, or, particularly in the case of PBS stations, a local National Public Radio (NPR) sister station, on the audio channel when SAP is not being used. In Canada, parliamentary and public affairs channel CPAC similarly uses SAP to carry both English and French-language audio.
SAP is also a means of distribution for audio description of programs for the visually impaired. Under the Twenty-First Century Communications and Video Accessibility Act of 2010, top U.S. television networks and cable networks have been gradually required to broadcast quotas of audio described programming per-quarter, Since May 26, 2015, broadcasters have been required under the Act to provide dictations on SAP of any "emergency information" displayed in a textual format outside of the Emergency Alert System and newscasts.
Frequencies
MTS features, including stereo and SAP, travel on subcarriers of the video carrier, much like color for television. It is not carried on the audio carrier in the manner of stereo sound for an FM radio broadcast, however, as it only has a freque |
https://en.wikipedia.org/wiki/Filoviridae | Filoviridae () is a family of single-stranded negative-sense RNA viruses in the order Mononegavirales. Two members of the family that are commonly known are Ebola virus and Marburg virus. Both viruses, and some of their lesser known relatives, cause severe disease in humans and nonhuman primates in the form of viral hemorrhagic fevers.
All filoviruses are classified by the US as select agents, by the World Health Organization as Risk Group 4 Pathogens (requiring Biosafety Level 4-equivalent containment), by the National Institutes of Health/National Institute of Allergy and Infectious Diseases as Category A Priority Pathogens, and by the Centers for Disease Control and Prevention as Category A Bioterrorism Agents, and are listed as Biological Agents for Export Control by the Australia Group.
Use of term
The family Filoviridae is a virological taxon that was defined in 1982 and emended in 1991, 1998, 2000, 2005, 2010 and 2011. The family currently includes the six virus genera Cuevavirus, Dianlovirus, Ebolavirus, Marburgvirus, Striavirus, and Thamnovirus and is included in the order Mononegavirales. The members of the family (i.e. the actual physical entities) are called filoviruses or filovirids. The name Filoviridae is derived from the Latin noun filum (alluding to the filamentous morphology of filovirions) and the taxonomic suffix -viridae (which denotes a virus family).
Note
According to the rules for taxon naming established by the International Committee on Taxonomy of Viruses (ICTV), the name Filoviridae is always to be capitalized, italicized, never abbreviated, and to be preceded by the word "family". The names of its members (filoviruses or filovirids) are to be written in lower case, are not italicized, and used without articles.
Life cycle
The filovirus life cycle begins with virion attachment to specific cell-surface receptors, followed by fusion of the virion envelope with cellular membranes and the concomitant release of the virus nucleocapsid int |
https://en.wikipedia.org/wiki/Nordic%20swan | The Nordic Ecolabel or Nordic swan is the official sustainability ecolabel for products from the Nordic countries. It was introduced by the Nordic Council of Ministers in 1989. The logo is based on the logo of the Nordic Council adopted in 1984 which symbolises trust, integrity and freedom. The Nordic Swan covers 67 different product groups, from hand soap to furniture to hotels.
The Nordic Swan is a voluntary license system in which the applicant agrees to follow criteria set outlined by the Nordic Ecolabelling. These criteria include environmental, quality and health arguments. The criteria levels promote products and services belonging to the most environmentally sound and take into account factors such as free trade and proportionality (cost vs. benefits).
Companies using the Nordic Swan label for their products must verify compliance, using samples from independent laboratories, certificates and control visits. The label is usually valid for three years, after which the criteria are revised and the company must reapply for a license.
The Nordic Ecolabel first appeared in the United States through a small offering of Nordic products. KCK Industries and ABENA introduced Bambo Nature, an environmentally friendly baby diaper. The success of this offering has led to the expansion of the Nordic Swan in the U.S.
Norway and Sweden implemented the Nordic swan in 1989, Finland in 1990, Iceland in 1991 and Denmark in 1998. |
https://en.wikipedia.org/wiki/Vacuum%20level | In physics, the vacuum level refers to the energy of a free stationary electron that is outside of any material (it is in a perfect vacuum).
It may be taken as infinitely far away from a solid, or, defined to be near a surface. Its definition and measurement are often discussed in ultraviolet photoelectron spectroscopy literature, for example As the vacuum level is a property of the electron and free space, it is often used as the level of alignment for the energy levels of two different materials. The vacuum level alignment approach may or may not hold due to details of the interface. It is particularly important in the design of vacuum device components such as cathodes.
If defined as being close to a surface, then the vacuum level is typically not a constant due to the equilibrium electric fields in vacuum. The value of the vacuum level depends on the surface chosen due to variations in work function.
The phrase "vacuum level" also occurs often in texts on squeezed light where it refers to an unsqueezed measurement. For example, "Thus, when the noise level in the spectrum analyzer shows broadband squeezing below the vacuum level, it also indicates the presence of entanglement between upper and lower sidebands."
Note that the phrase "vacuum level" may also refer to a measurement of residual pressure in a vacuum system or a device that uses differential pressure such as a carburetor but this usage should be very clear from context. |
https://en.wikipedia.org/wiki/IUPAC/IUPAP%20Joint%20Working%20Party | The IUPAC/IUPAP Joint Working Party is a group convened periodically by the International Union of Pure and Applied Chemistry (IUPAC) and the International Union of Pure and Applied Physics (IUPAP) to consider claims for discovery and naming of new chemical elements. It is sometimes called the Joint Working Party on Discovery of Elements. The working party's recommendations are voted on by the General Assembly of the IUPAP. |
https://en.wikipedia.org/wiki/Samuel%20Cate%20Prescott%20Award | The Samuel Cate Prescott Award has been awarded since 1964 by the Institute of Food Technologists (IFT) in Chicago, Illinois. It is awarded to food science or technology researchers who are under 36 years of age or who earned their highest degree within ten years before July 1 of the year the award is presented. This award is named for Samuel Cate Prescott (1872-1962), a food science professor from the Massachusetts Institute of Technology who was also the first president of IFT.
Award winners receive a plaque from IFT and a USD 3,000 honorarium.
Winners |
https://en.wikipedia.org/wiki/Egnyte | Egnyte is a software company headquartered in Mountain View, California. It sells cloud-based content security, compliance, and collaboration tools for businesses. Egnyte was founded in 2007 with a focus on modernized file servers, but it has since shifted to selling tools that help users securely collaborate with coworkers and third parties.
History
Egnyte was founded in 2007, and incorporated in 2008. The privately-held company was founded by Vineet Jain, Rajesh Ram, Kris Lahiri, and Amrit Jassal.
Egnyte received $1 million seed venture capital in 2007, $6 million in July 2009, $10 million in 2011, and $16 million in 2012. Egnyte announced a $29.5 million investment in 2013 that included Seagate, CenturyLink, Northgate Capital, and prior investors Kleiner Perkins, Google Ventures and Polaris Partners. In 2018, Egnyte has raised $137.5 million, including $75 million in Series E funding in 2018, led by Goldman Sachs.
By the end of 2019, the company reported having more than 16,000 customers worldwide, and it had reached more than $100 million in annual recurring revenue.
Egnyte initially sold cloud and on-premises file servers but later added features for collaboration and security and shifted its focus to cloud content governance for businesses. In 2020, it combined its two primary products—Egnyte Protect and Egnyte Connect—into one platform to manage, govern, and secure data.
That year, the long vacated CFO position, previously held by Steve Sutter, was filled by Suzanne Colvin, former CFO at Napster.
In January 2022, the company announced that it was seeking an IPO. Later that month, it was announced that Alexa King, former executive VP at FireEye would serve as a board director.
Features
The Egnyte platform provides content security, compliance, and collaboration capabilities to govern content. Egnyte's software can be used to scan a range of data repositories for malware—including email, on-premises storage, and third-party cloud storage—and block ran |
https://en.wikipedia.org/wiki/Hyper%20Sports | Hyper Sports, known in Japan as is an Olympic-themed sports video game released by Konami for arcades in 1984. It is the sequel to 1983's Track & Field and features seven new Olympic events. Like its predecessor, Hyper Sports has two run buttons and one action button per player. The Japanese release of the game sported an official license for the 1984 Summer Olympics.
Gameplay
The gameplay is much the same as Track & Field in that the player competes in an event and tries to score the most points based on performance criteria, and also by beating the computer entrants in that event. Also, the player tries to exceed a qualification time, distance, or score to advance to the next event. In Hyper Sports, if all of the events are passed successfully, the player advances to the next round of the same events which are faster and harder to qualify for.
The events changed to include these new sports:
Swimming - swimming speed is controlled by two run buttons, and breathing is controlled by the action button when prompted by swimmer on screen. There is one re-do if a player fouls due to launching before the gun, but only one "run" at the qualifying time.
Skeet shooting - selecting left or right shot via the two run buttons while a clay-bird is in the sight. There are three rounds to attempt to pass the qualifying score. If a perfect score is attained then a different pattern follows allowing for a higher score.
Long horse - speed to run at horse is computer controlled, player jumps and pushes off horse via the action button, and rotates as many times as possible via run buttons (and tries to land straight up on feet). There are three attempts at the qualifying score.
Archery - firing of the arrow controlled by action button; the elevation angle is controlled by depressing the action button and releasing at the proper time. There are three attempts at passing the qualifying score.
Triple jump - speed is controlled by the run buttons, jump and angle are controlled by actio |
https://en.wikipedia.org/wiki/Capability%20Maturity%20Model%20Integration | Capability Maturity Model Integration (CMMI) is a process level improvement training and appraisal program. Administered by the CMMI Institute, a subsidiary of ISACA, it was developed at Carnegie Mellon University (CMU). It is required by many U.S. Government contracts, especially in software development. CMU claims CMMI can be used to guide process improvement across a project, division, or an entire organization. CMMI defines the following maturity levels for processes: Initial, Managed, Defined, Quantitatively Managed, and Optimizing. Version 2.0 was published in 2018 (Version 1.3 was published in 2010, and is the reference model for the rest of the information in this article). CMMI is registered in the U.S. Patent and Trademark Office by CMU.
Overview
Originally CMMI addresses three areas of interest:
Product and service development – CMMI for Development (CMMI-DEV),
Service establishment, management, – CMMI for Services (CMMI-SVC), and
Product and service acquisition – CMMI for Acquisition (CMMI-ACQ).
In version 2.0 these three areas (that previously had a separate model each) were merged into a single model.
CMMI was developed by a group from industry, government, and the Software Engineering Institute (SEI) at CMU. CMMI models provide guidance for developing or improving processes that meet the business goals of an organization. A CMMI model may also be used as a framework for appraising the process maturity of the organization. By January 2013, the entire CMMI product suite was transferred from the SEI to the CMMI Institute, a newly created organization at Carnegie Mellon.
History
CMMI was developed by the CMMI project, which aimed to improve the usability of maturity models by integrating many different models into one framework. The project consisted of members of industry, government and the Carnegie Mellon Software Engineering Institute (SEI). The main sponsors included the Office of the Secretary of Defense (OSD) and the National Defense Industri |
https://en.wikipedia.org/wiki/JSP%20model%201%20architecture | In the design of Java Web applications, there are two commonly used design models, referred to as Model 1 and Model 2.
In Model 1, a request is made to a JSP or servlet and then that JSP or servlet handles all responsibilities for the request, including processing the request, validating data, handling the business logic, and generating a response. The Model 1 architecture is commonly used in smaller, simple task applications due to its ease of development.
Although conceptually simple, this architecture is not conducive to large-scale application development because, inevitably, a great deal of functionality is duplicated in each JSP. Also, the Model 1 architecture unnecessarily ties together the business logic and presentation logic of the application. Combining business logic with presentation logic makes it hard to introduce a new 'view' or access point in an application. For example, in addition to an HTML interface, you might want to include a Wireless Markup Language (WML) interface for wireless access. In this case, using Model 1 will unnecessarily require the duplication of the business logic with each instance of the presentation code. |
https://en.wikipedia.org/wiki/4-bit%20computing | 4-bit computing is the use of computer architectures in which integers and other data units are 4 bits wide. 4-bit central processing unit (CPU) and arithmetic logic unit (ALU) architectures are those that are based on registers or data buses of that size. Memory addresses (and thus address buses) for 4-bit CPUs are generally much larger than 4-bit (since only 16 memory locations would be very restrictive), such as 12-bit or more, while they could in theory be 8-bit.
A group of four bits is also called a nibble and has 24 = 16 possible values.
While 4-bit computing is mostly obsolete, 4-bit communication (even 1- or 2-bit) is still used in modern computers, that are otherwise e.g. 64-bit, and thus also have much larger buses.
History
A 4-bit processor may seem limited, but it is a good match for calculators, where each decimal digit fits into four bits.
Some of the first microprocessors had a 4-bit word length and were developed around 1970. The first commercial microprocessor was the binary-coded decimal (BCD-based) Intel 4004, developed for calculator applications in 1971; it had a 4-bit word length, but had 8-bit instructions and 12-bit addresses. It was succeeded by the Intel 4040.
The first commercial single-chip computer was the 4-bit Texas Instruments TMS 1000 (1974). It contained a 4-bit CPU with a Harvard architecture and 8-bit-wide instructions, an on-chip instruction ROM, and an on-chip data RAM with 4-bit words.
The Rockwell PPS-4 was another early 4-bit processor, introduced in 1972, which had a long lifetime in handheld games and similar roles. It was steadily improved and by 1975 been combined with several support chips to make a one-chip computer.
The 4-bit processors were programmed in assembly language or Forth, e.g. "MARC4 Family of 4 bit Forth CPU" (which is now discontinued) because of the extreme size constraint on programs and because common programming languages (for microcontrollers, 8-bit and larger), such as the C programming lang |
https://en.wikipedia.org/wiki/Han%20Terra | Han Terra is a Korean-born inventor, composer and musician. She was a child prodigy and was performing by age 6 as a Korean kayageum player beginning her training at the age of 4. She has invented a 24 stringed musical instrument called TeRra incorporating artificial intelligence.
Han is the first and the youngest individual kayageum musician of Blanchette Rockefeller Fund and who had a debut in the Carnegie Hall in New York. She was admitted a voting member of the Grammy Awards of The Recording Academy as few East Asian traditional musicians. Han is honored to be appointed as fellow of the Royal Society of Arts in a feat accomplished by few East Asian traditional musicians in the United Kingdom.
She is known for a polymath in the areas of music, instruments, arts, dance, linguistics, philosophy, psychology, history, literature, writing, journals, fashion, design, technology, science and aesthetics. She is the only one figure who mastered the Eastern traditional arts singing and dancing accompanied with the Western classical music in Korea, Japan, China, India, France, and has been performing globally since.
Name and genealogy
Han was born in Seoul, South Korea. Her birth name was Laesuk ("Advent of Goodness" or "Goddess"). She got the Buddhist name 'Myeong-wol' (명월, 明月), which means 'bright moon', from a Buddhist priest in her teens. Han also uses the pseudonym Dan-young (단영, 澶濴). She adopted the name 'TeRra' based on the name of the earth goddess Terra in the 2000s.
Han is a member of the Cheongju Han clan family. The clan is well known for a long tradition of the women members of royal consorts produced the largest numbers of 16 queens in Korean history. Her maternal grandmother's family was in the fashion and textile business and moved from Japan to Korea in the late 1920s.
Early life
Her initial ambition was to become a pianist, having begun to take piano lessons at the age of 4, and won the National Students Musical Competition. She began to study Kore |
https://en.wikipedia.org/wiki/Scientific%20Centre%20of%20Monaco | The Scientific Centre of Monaco (, CSM) is a Monegasque public establishment providing the Principality of Monaco with means to conduct scientific research. CSM is specialized in the study of corals and coral reefs, as well as fight against cancer in partnership with the Flavien Foundation. CSM is grouped into three departments aimed at studying the functioning of organisms in order to acquire better understanding, foresee the effects of environmental stress (Physiology of Conservation) or discover therapeutic treatments (Translational Biology). CSM is headed by Patrick Rampal.
History
The CSM was founded in 1960 by Rainier III, Prince of Monaco in order to provide the Principality with the means to conduct scientific research. Additionally, the CSM was aimed to support activities of governmental organizations and international agencies aimed at protection and conservation of marine life.
Since its foundation till 1990, the CSM monitored the radioactivity of the atmosphere and traced major ocean currents. In the late 1980s the CSM's first department was founded – Department of Marine Biology, specializing in the study of corals. In 1990, after a major restructuring the CSM environmental monitoring activities were transferred to a State service.
Since 2009, the CSM is also developing biomedical research activities. In 2010, the second department of the CSM was founded – Department of Polar Biology, created as a part of an international associated laboratory. Starting from this year, the CSM, under the leadership of the Prince Albert II, has become a multidisciplinary research institute integrating environmental economics, a Department of Polar Biology and the Department of Medical Biology - officially opened at the behest of Prince Albert II in 2013.
In 2014, the CSM started to collaborate with startup Coraliotech conducting joint research in the field of genetic diseases and DNA sequencing of corals with the Departments of Marine Biology and Medical Biology. I |
https://en.wikipedia.org/wiki/Knol | Knol was a Google project that aimed to include user-written articles on a range of topics. The lower-case term knol, which Google defined as a "unit of knowledge", referred to an article in the project. Knol was often viewed as a rival to Wikipedia.
The project was led by Udi Manber, a Google vice president of engineering. It was announced on December 13, 2007, and was opened in beta version on July 23, 2008, with a few hundred articles, mostly in the health and medical field.
Knol did not find a significant audience and became viewed as a failure. The project was closed on April 30, 2012, and all content was deleted after October 1, 2012. The Internet Archive has snapshots of Knol archived between July 2008 and May 2012.
Operation
Any contributor could create and own new Knol articles, and there could be multiple articles on the same topic with each written by a different author.
Authors could also choose to include ads from Google's AdSense on their pages. This profit-sharing was criticized as incentivizing self-promotion or spam.
All contributors to the Knol project had to sign in with a Google account and were supposed to state their real names. Contributions were licensed by default under the Creative Commons CC-BY-3.0 license (which allowed anyone to reuse the material as long as the original author was named), but authors were also able to choose the CC-BY-NC-3.0 license (which prohibits commercial reuse) or traditional copyright protection instead. Knol employed "nofollow" outgoing links, using an HTML directive to prevent links in its articles from influencing search-engine rankings.
Reception
Competition
Knol was described both as a rival to encyclopedia sites such as Wikipedia, Citizendium, and Scholarpedia and as a complement to Wikipedia, offering a different format that addressed many of Wikipedia's shortcomings. BBC News reported that "Many experts saw the initiative as an attack on the widely used Wikipedia communal encyclopaedia." The non- |
https://en.wikipedia.org/wiki/The%20Science%20of%20Life | The Science of Life is a book written by H. G. Wells, Julian Huxley and G. P. Wells, published in three volumes by The Waverley Publishing Company Ltd in 1929–30, giving a popular account of all major aspects of biology as known in the 1920s. It has been called "the first modern textbook of biology" and "the best popular introduction to the biological sciences". Wells's most recent biographer notes that The Science of Life "is not quite as dated as one might suppose".
In undertaking The Science of Life, H. G. Wells, who had published The Outline of History a decade earlier, selling over two million copies, desired the same sort of treatment for biology. He thought of his readership as "the intelligent lower middle classes ... [not] idiots, half-wits ... greenhorns, religious fanatics ... smart women or men who know all that there is to be known".
Julian Huxley, the grandson of T. H. Huxley under whom Wells had studied biology, and Wells' son "Gip", a zoologist, divided the initial writing between them; H. G. Wells revised, dealt (with the help of his literary agent, A. P. Watt) with publishers, and acted as a strict taskmaster, often obliging his collaborators to sit down and work together and keeping them on a tight schedule. (H. G. Wells had begun the book during his wife's final illness and is said to have used work on the book as a way to keep his mind off his loss.)
The text as published is presented as the common work of a "triplex author". H. G. Wells took 40% of the royalties; the remainder was split between Huxley and Wells's son. In his will, H. G. Wells left his rights in the book to G. P. Wells.
In 1927, Huxley gave up his chair of Zoology at King's College, London to concentrate on the work. Thanks to the success of the book, Huxley was able to give up teaching and devote himself to administration and experimental science.
The book was originally serialised in 31 fortnightly parts, published in 3 volumes in 1929–30 and in a single volume in 1931. T |
https://en.wikipedia.org/wiki/Biotechnology%20Heritage%20Award | The Biotechnology Heritage Award recognizes individuals who have made significant contributions to the development of biotechnology through discovery, innovation, and public understanding. It is presented annually at the Biotechnology Innovation Organization (BIO) Annual International Convention by the Biotechnology Innovation Organization (BIO, formerly the Biotechnology Industry Organization) and the Science History Institute (formerly the Chemical Heritage Foundation). The purpose of the award is "to encourage emulation, inspire achievement, and promote public understanding of modern science, industry, and economics".
Recipients
The award is given yearly and was first presented in 1999.
Ivor Royston, 2020
Janet Woodcock, 2019
William Rastetter, 2018
John C. Martin, 2017
Stanley Norman Cohen, 2016
Moshe Alafi and William K. Bowes, 2015
Robert S. Langer, 2014
George Rosenkranz, 2013
Nancy Chang, 2012
Joshua S. Boger, 2011
Arthur D. Levinson, 2010
Robert T. Fraley, 2009
Henri A. Termeer, 2008
Ronald E. Cape, 2007
Alejandro Zaffaroni, 2006
Paul Berg, 2005
Leroy Hood, 2004
William J. Rutter, 2003
Walter Gilbert, 2002
Francis S. Collins and J. Craig Venter, 2001
Herbert Boyer and Robert A. Swanson, 2000
George B. Rathmann, 1999
Photo Gallery
See also
List of biology awards |
https://en.wikipedia.org/wiki/Stevens%27s%20power%20law | Stevens' power law is an empirical relationship in psychophysics between an increased intensity or strength in a physical stimulus and the perceived magnitude increase in the sensation created by the stimulus. It is often considered to supersede the Weber–Fechner law, which is based on a logarithmic relationship between stimulus and sensation, because the power law describes a wider range of sensory comparisons, down to zero intensity.
The theory is named after psychophysicist Stanley Smith Stevens (1906–1973). Although the idea of a power law had been suggested by 19th-century researchers, Stevens is credited with reviving the law and publishing a body of psychophysical data to support it in 1957.
The general form of the law is
where I is the intensity or strength of the stimulus in physical units (energy, weight, pressure, mixture proportions, etc.), ψ(I) is the magnitude of the sensation evoked by the stimulus, a is an exponent that depends on the type of stimulation or sensory modality, and k is a proportionality constant that depends on the units used.
A distinction has been made between local psychophysics, where stimuli can only be discriminated with a probability around 50%, and global psychophysics, where the stimuli can be discriminated correctly with near certainty (Luce & Krumhansl, 1988). The Weber–Fechner law and methods described by L. L. Thurstone are generally applied in local psychophysics, whereas Stevens' methods are usually applied in global psychophysics.
The table to the right lists the exponents reported by Stevens.
Methods
The principal methods used by Stevens to measure the perceived intensity of a stimulus were magnitude estimation and magnitude production. In magnitude estimation with a standard, the experimenter presents a stimulus called a standard and assigns it a number called the modulus. For subsequent stimuli, subjects report numerically their perceived intensity relative to the standard so as to preserve the ratio between t |
https://en.wikipedia.org/wiki/IGRhCellID | IGRhCellID is a database of cell lines using some common tools to reduce cell lines misidentification.
See also
Cell line |
https://en.wikipedia.org/wiki/Caffeine%20use%20for%20sport | Caffeine use for sport is a worldwide known and tested idea. Many athletes use caffeine as a legal performance enhancer, as the benefits it provides, both physically and cognitively outweigh the disadvantages. The benefits caffeine provides influences the performance of both endurance athletes and anaerobic athletes. Caffeine has been proven to be effective in enhancing performance.
Caffeine is a stimulant drug. Once consumed, it is absorbed in the stomach and small intestine as well as being circulated throughout the body. It targets muscles and organs, in particular the brain.
Caffeine is most commonly known for being in coffee. It is also found in tea, chocolate, soft drinks, energy drinks and medications.
The short term effects from caffeine are usually noticed after 5–30 minutes and long term ones last for up to 12 hours.
Those who use caffeine regularly, most often drinking at least one coffee a day, can become dependent and addicted. If caffeine use for these people is stopped they may have withdrawals symptoms of feeling tired and headaches.
Effects
Physical
Caffeine acts on both the respiratory system and cardiovascular system. The cardiovascular system is the pathway the human body uses for circulating blood, supplying oxygen and removing waste products. The respiratory system is the system involved with the exchange of oxygen and carbon dioxide between the atmosphere and the blood.
Via many of these physiological responses, the fatigue an athlete would normally feel is postponed, allowing physical activity to be sustained for longer and of a higher level.
Cognitive
As caffeine targets the brain, there are many cognitive effects from using it. Caffeine can reduce tiredness and reaction time.
Disadvantages
Physical
Caffeine is a mild diuretic, which can often lead to dehydration. Other physical disadvantages include, impaired fine motor control, observed via the shakiness of athlete's hands, gastrointestinal upset, increased heart rate and |
https://en.wikipedia.org/wiki/Outside%E2%80%93in%20software%20development | Of all the agile software development methodologies, outside–in software development takes a different approach to optimizing the software development process. Unlike other approaches, outside–in development focuses on satisfying the needs of stakeholders. The underlying theory is that to create successful software, the team must have a clear understanding of the goals and motivations of the stakeholders. The ultimate goal is to produce software that is highly consumable and meets or exceeds the needs of the intended client.
Outside–in software development is meant to primarily supplement existing software development methodologies. While it is suited for agile software development, it is possible to fit outside-in development into waterfall-based methodologies.
The four stakeholder groups
What sets outside-in software development apart from other stakeholder-based approaches is the categorization of the four types of stakeholders. While the following four groups are unique however there can be and is usually a lot of interaction between them:
Principals: The people who buy your software—the most important stakeholder to appease.
End users: The people who interact with your product. They experience how your software works in the real world.
Partners: The people who make your product work in real life, such as operations teams and also business partners and system integrators.
Insiders: The people within your company that have some impact on how your team develops software.
It is crucial to speak with all stakeholders, even if they are not the primary audience of your software.
Implementing outside–in software development
The outside–in approach does not require your entire development methodology to change. Outside–in development can supplement the existing tools of developers.
Outside–in development works particularly well in the context of agile/lean development. One of the major tenets of lean-based software development is to program with the leas |
https://en.wikipedia.org/wiki/Gynecology%20in%20ancient%20Rome | Modern historians' knowledge of ancient Roman gynecology and obstetrics primarily comes from Soranus of Ephesus' four-volume treatise on gynecology. His writings covered medical conditions such as uterine prolapse and cancer and treatments involving materials such as herbs and tools such as pessaries. Ancient Roman doctors believed that menstruation was designed to rid the female body of excess fluids. They believed that menstrual blood had special powers. Roman doctors may also have noticed conditions such as premenstrual syndrome.
Techniques
Uterine prolapse
A Uterine prolapse occurs when the uterus (the end of which is also known as the cervix) begins to fall (prolapse) into the vaginal canal. In severe cases a Uterine prolapse can protrude from the vagina. . It is possible that this condition was the origin of the belief that the womb could move around. Ancient Roman gynecologists treated this condition by suspending the patient upside down from a ladder. This treatment was not universally accepted by ancient Roman doctors. Soranus of Ephesus criticized this treatment method. Another treatment at the time involved wrapping aetites, which were magic stones used to protect the fetus and ease childbirth, in the skin of sacrificed animals. The only known mention of a hysterectomy comes from the work Gynecology. Soranus writes that a woman with an inverted uterus infected with gangrene had her uterus and bladder removed.
Abortion and incontinence
There were surgical procedures for abortion in ancient Rome, but they were rarely used, and most abortions were conducted using herbs or other drugs. When surgery was used, it involved the usage of surgical instruments to penetrate the mother. Usually, this procedure ended with both the fetus' and the mother's death. Soranus of Ephesus wrote that purging, carrying heavy weights, and the injection of olive oil into the vagina or uterus, were all procedures used to carry out abortions. Ancient Roman doctors, including Sor |
https://en.wikipedia.org/wiki/Computerized%20physician%20order%20entry | Computerized physician order entry (CPOE), sometimes referred to as computerized provider order entry or computerized provider order management (CPOM), is a process of electronic entry of medical practitioner instructions for the treatment of patients (particularly hospitalized patients) under his or her care.
The entered orders are communicated over a computer network to the medical staff or to the departments (pharmacy, laboratory, or radiology) responsible for fulfilling the order. CPOE reduces the time it takes to distribute and complete orders, while increasing efficiency by reducing transcription errors including preventing duplicate order entry, while simplifying inventory management and billing.
CPOE is a form of patient management software.
Required data
In a graphical representation of an order sequence, specific data should be presented to CPOE system staff in cleartext, including:
identity of the patient
role of required member of staff
resources, materials and medication applied
procedures to be performed
operational sequence to be obeyed
feedback to be noted
case specific documentation to build
Some textual data can be reduced to simple graphics.
CPOE related terminology
CPOE systems use terminology familiar to medical and nursing staff, but there are different terms used to classify and concatenate orders. The following items are examples of additional terminology that a CPOE system programmer might need to know:
Filler
The application responding to, i.e., performing, a request for services (orders) or producing an observation. The filler can also originate requests for services (new orders), add additional services to existing orders, replace existing orders, put an order on hold, discontinue an order, release a held order, or cancel existing orders.
Order
A request for a service from one application to a second application. In some cases an application is allowed to place orders with itself.
Order detail segment
One of several seg |
https://en.wikipedia.org/wiki/Picada | Picada () is one of the characteristic sauces and culinary techniques essential to Catalan cuisine. The technique is typically found in Catalonia and Valencia and subsequently Catalan cuisine and Valencian cuisine. It is not an autonomous sauce like mayonnaise or romesco, but it is added as a seasoning during the cooking of a recipe.
Preparation
Often the preparation of a concoction begins with another essential sauce, like the sofregit, and ends with the final adding of the picada some minutes before the cooking termination. Picada is used to blend and thicken juices, to provide an excellent finishing touch to a multitude of recipes: meats, fish, rice, soups, legumes, vegetables. There are many variants for the rest of ingredients. The most common ones are garlic (often considered essential), saffron (also considered essential), and parsley. Other possible ingredients used more rarely are cinnamon, cooked liver (of chicken or rabbit), chocolate, cumin, herbs, and other spices.
The picada is prepared in the mortar and must contain a basic triad: almond, bread and some liquid. Almonds are toasted and can be replaced by another nut like hazelnut, pinenut, walnut, or some combination of those. Bread is crushed in a mortar after being made dry and hard from going stale, being toasted, or being fried in oil. Otherwise, some sort of sweet biscuit or cookie may be used. The liquid used is usually the cooking juice but stock or hot water can be used as well.
Historical background
Historically, picada of almonds is documented in Catalan cuisine since the 13th century. Picada is included in Robert de Nola's fifteenth century book Libre del Coch.
Variants
Other neighboring Mediterranean cuisines, as Occitan and Italian, have essentially similar sauces such as pesto.
In Argentina "Picada" is a presentation of cold cuts such as ham, cured ham, pepperoni, sausages, and pates, and cheeses such as blue cheese, pecorino and parmiggiano. Normally served with dips, bread, oliv |
https://en.wikipedia.org/wiki/Automated%20patch%20clamp | Automated patch clamping is beginning to replace manual patch clamping as a method to measure the electrical activity of individual cells. Different techniques are used to automate patch clamp recordings from cells in cell culture and in vivo. This work has been ongoing since the late 1990s by research labs and companies trying to reduce its complexity and cost of patch clamping manually. Patch clamping for a long time was considered an art form and is still very time consuming and tedious, especially in vivo. The automation techniques try to reduce user error and variability in obtaining quality electrophysiology recordings from single cells.
Manual patch clamp
The traditional manual method to patch clamp using glass pipettes was developed by Erwin Neher and Bert Sakmann and required a highly skilled technician. The technician would position the glass pipette near a cell and apply the appropriate suction to create an electrical seal between the pipette and the cell membrane. This seal ensures a quality recording by preventing any current from leaking out between the tip of the pipette and the cell membrane. This seal is made when the membrane of the cell chemically binds with the tip of the pipette so that the inside of the pipette is only connected to the cytoplasm of the cell. This membrane-glass connection or seal is called a "gigaseal".
The technician traditionally used their mouth to provide the precise pressures required to seal it to the cell. In addition to controlling the pressure, the technician must also position the pipette at precisely the correct distance from the cell so that the membrane will seal with it. Using a micromanipulator, the pipette is moved towards the cell until the technician sees a change in the electrical resistance between the fluid inside of the pipette and the surrounding fluid (see animation). This typically requires 3–12 months of training before a technician is able to reliably record from cells. The technician |
https://en.wikipedia.org/wiki/Gpsd | gpsd is a computer software program that collects data from a Global Positioning System (GPS) receiver and provides the data via an Internet Protocol (IP) network to potentially multiple client applications in a server-client application architecture. Gpsd may be run as a daemon to operate transparently as a background task of the server. The network interface provides a standardized data format for multiple concurrent client applications, such as Kismet or GPS navigation software.
Gpsd is commonly used on Unix-like operating systems. It is distributed as free software under the 3-clause BSD license.
Design
gpsd provides a TCP/IP service by binding to port 2947 by default. It communicates via that socket by accepting commands, and returning results. These commands use a JSON-based syntax and provide JSON responses. Multiple clients can access the service concurrently.
The application supports many types of GPS receivers with connections via serial ports, USB, and Bluetooth. Starting in 2009, gpsd also supports AIS receivers.
gpsd supports interfacing with the Network Time Protocol (NTP) server ntpd via shared memory to enable setting the host platform's time via the GPS clock.
Authors
gpsd was originally written by Remco Treffkorn with Derrick Brashear, then maintained by Russell Nelson. It is now maintained by Eric S. Raymond. |
https://en.wikipedia.org/wiki/Dynamic%20inconsistency | In economics, dynamic inconsistency or time inconsistency is a situation in which a decision-maker's preferences change over time in such a way that a preference can become inconsistent at another point in time. This can be thought of as there being many different "selves" within decision makers, with each "self" representing the decision-maker at a different point in time; the inconsistency occurs when not all preferences are aligned.
The term "dynamic inconsistency" is more closely affiliated with game theory, whereas "time inconsistency" is more closely affiliated with behavioral economics.
In game theory
In the context of game theory, dynamic inconsistency is a situation in a dynamic game where a player's best plan for some future period will not be optimal when that future period arrives. A dynamically inconsistent game is subgame imperfect. In this context, the inconsistency is primarily about commitment and credible threats. This manifests itself through a violation of Bellman's Principle of Optimality by the leader or dominant player, as shown in .
For example, a firm might want to commit itself to dramatically dropping the price of a product it sells if a rival firm enters its market. If this threat were credible, it would discourage the rival from entering. However, the firm might not be able to commit its future self to taking such an action because if the rival does in fact end up entering, the firm's future self might determine that, given the fact that the rival is now actually in the market and there is no point in trying to discourage entry, it is now not in its interest to dramatically drop the price. As such, the threat would not be credible. The present self of the firm has preferences that would have the future self be committed to the threat, but the future self has preferences that have it not carry out the threat. Hence, the dynamic inconsistency.
In behavioral economics
In the context of behavioral economics, time inconsistency is relate |
https://en.wikipedia.org/wiki/Metalloid | A metalloid is a type of chemical element which has a preponderance of properties in between, or that are a mixture of, those of metals and nonmetals. There is no standard definition of a metalloid and no complete agreement on which elements are metalloids. Despite the lack of specificity, the term remains in use in the literature of chemistry.
The six commonly recognised metalloids are boron, silicon, germanium, arsenic, antimony and tellurium. Five elements are less frequently so classified: carbon, aluminium, selenium, polonium and astatine. On a standard periodic table, all eleven elements are in a diagonal region of the p-block extending from boron at the upper left to astatine at lower right. Some periodic tables include a dividing line between metals and nonmetals, and the metalloids may be found close to this line.
Typical metalloids have a metallic appearance, but they are brittle and only fair conductors of electricity. Chemically, they behave mostly as nonmetals. They can form alloys with metals. Most of their other physical properties and chemical properties are intermediate in nature. Metalloids are usually too brittle to have any structural uses. They and their compounds are used in alloys, biological agents, catalysts, flame retardants, glasses, optical storage and optoelectronics, pyrotechnics, semiconductors, and electronics.
The electrical properties of silicon and germanium enabled the establishment of the semiconductor industry in the 1950s and the development of solid-state electronics from the early 1960s.
The term metalloid originally referred to nonmetals. Its more recent meaning, as a category of elements with intermediate or hybrid properties, became widespread in 1940–1960. Metalloids are sometimes called semimetals, a practice that has been discouraged, as the term semimetal has a different meaning in physics than in chemistry. In physics, it refers to a specific kind of electronic band structure of a substance. In this context, only |
https://en.wikipedia.org/wiki/Ciphertext%20stealing | In cryptography, ciphertext stealing (CTS) is a general method of using a block cipher mode of operation that allows for processing of messages that are not evenly divisible into blocks without resulting in any expansion of the ciphertext, at the cost of slightly increased complexity.
General characteristics
Ciphertext stealing is a technique for encrypting plaintext using a block cipher, without padding the message to a multiple of the block size, so the ciphertext is the same size as the plaintext.
It does this by altering processing of the last two blocks of the message. The processing of all but the last two blocks is unchanged, but a portion of the second-to-last block's ciphertext is "stolen" to pad the last plaintext block. The padded final block is then encrypted as usual.
The final ciphertext, for the last two blocks, consists of the partial penultimate block (with the "stolen" portion omitted) plus the full final block, which are the same size as the original plaintext.
Decryption requires decrypting the final block first, then restoring the stolen ciphertext to the penultimate block, which can
then be decrypted as usual.
In principle any block-oriented block cipher mode of operation can be used, but stream-cipher-like modes can already be applied to messages of arbitrary length without padding, so they do not benefit from this technique. The common modes of operation that are coupled with ciphertext stealing are Electronic Codebook (ECB) and Cipher Block Chaining (CBC).
Ciphertext stealing for ECB mode requires the plaintext to be longer than one block. A possible workaround is to use a stream cipher-like block cipher mode of operation when the plaintext length is one block or less, such as the CTR, CFB or OFB modes.
Ciphertext stealing for CBC mode doesn't necessarily require the plaintext to be longer than one block. In the case where the plaintext is one block long or less, the Initialization vector (IV) can act as the prior block of ciphert |
https://en.wikipedia.org/wiki/Special%20input/output | Special input/output (Special I/O or SIO) are inputs and/or outputs of a microcontroller designated to perform specialized functions or have specialized features.
Specialized functions can include:
Hardware interrupts,
analog input or output
PWM output
Serial communication, such as UART, USART, SPI bus, or SerDes.
External reset
Switch debounce
Input pull-up (or -down) resistors
open collector output
Pulse counting
Timing pulses
Some kinds of special I/O functions can sometimes be emulated with general-purpose input/output and bit banging software.
See also
Atari SIO |
https://en.wikipedia.org/wiki/Cobalamin%20biosynthesis | Cobalamin biosynthesis is the process by which bacteria and archea make cobalamin, vitamin B12. Many steps are involved in converting aminolevulinic acid via uroporphyrinogen III and adenosylcobyric acid to the final forms in which it is used by enzymes in both the producing organisms and other species, including humans who acquire it through their diet.
The feature which distinguishes the two main biosynthetic routes is whether the cobalt that is at the catalytic site in the coenzyme is incorporated early (in anaerobic organisms) or late (in aerobic organisms) and whether oxygen is required. In both cases, the macrocycle that will form a coordination complex with the cobalt ion is a corrin ring, specifically one with seven carboxylate groups called cobyrinic acid. Subsequently, amide groups are formed on all but one of the carboxylates, giving cobyric acid, and the cobalt is ligated by an adenosyl group. In the final part of the biosynthesis, common to all organisms, an aminopropanol sidechain is added to the one free carboxylic group and assembly of the nucleotide loop, which will provide the second ligand for the cobalt, is completed.
Many prokaryotic species cannot biosynthesize adenosylcobalamin, but can make it from cobalamin which they assimilate from external sources. In humans, dietary sources of cobalamin are bound after ingestion as transcobalamins and converted to the coenzyme forms in which they are used.
Cobalamin
Cobalamin (vitamin B12) is the largest and most structurally complex vitamin. It consists of a modified tetrapyrrole, a corrin, with a centrally chelated cobalt ion and is usually found in one of two biologically active forms: methylcobalamin and adenosylcobalamin. Most prokaryotes, as well as animals, have cobalamin-dependent enzymes that use it as a cofactor, whereas plants and fungi do not use it. In bacteria and archaea, these enzymes include methionine synthase, ribonucleotide reductase, glutamate and methylmalonyl-CoA mutases, ethan |
https://en.wikipedia.org/wiki/Pancrinol | Pancrinol was a medicine made from liver, spleen, kidney, and adrenal extracts from slaughter animals. It was manufactured by the laboratories of Dr. François Debat in Paris. This drug was presented, in drinkable ampoules, as a tonic against anemia, tuberculosis, and all organic deficiencies. It was used as a doping agent in cycling.
Bibliography
Revue Art et Médecine, no. 1, Octobre 1930
Sport et dopage : la grande hypocrisie, François Bellocq avec la collaboration de Serge Bressan, éditions du Félin, 1991
Patent medicines |
https://en.wikipedia.org/wiki/Model%20organism%20database | Model organism databases (MODs) are biological databases, or knowledgebases, dedicated to the provision of in-depth biological data for intensively studied model organisms. MODs allow researchers to easily find background information on large sets of genes, plan experiments efficiently, combine their data with existing knowledge, and construct novel hypotheses. They allow users to analyse results and interpret datasets, and the data they generate are increasingly used to describe less well studied species. Where possible, MODs share common approaches to collect and represent biological information. For example, all MODs use the Gene Ontology (GO) to describe functions, processes and cellular locations of specific gene products. Projects also exist to enable software sharing for curation, visualization and querying between different MODs. Organismal diversity and varying user requirements however mean that MODs are often required to customize capture, display, and provision of data.
Types of data and services
Model organism databases generate, source and collate species-specific information integratively by combining expert knowledge with literature curation and bioinformatics.
Services provided to biological research communities include:
Genome sequence annotations
Location of genes and regulatory regions in the genome
Functional curation of gene products
Discern functions fulfilled by the gene product by looking at a variety of data including Gene Ontology (GO) annotations, phenotypes, gene expression, pathway information
Protein/RNA sequence annotations
Anatomical information
Stock centres
Orthology
List of model organism databases |
https://en.wikipedia.org/wiki/Quantum%20thermodynamics | Quantum thermodynamics is the study of the relations between two independent physical theories: thermodynamics and quantum mechanics. The two independent theories address the physical phenomena of light and matter.
In 1905, Albert Einstein argued that the requirement of consistency between thermodynamics and electromagnetism leads to the conclusion that light is quantized, obtaining the relation . This paper is the dawn of quantum theory. In a few decades
quantum theory became established with an independent set of rules. Currently quantum thermodynamics addresses the emergence of thermodynamic laws from quantum mechanics.
It differs from quantum statistical mechanics in the emphasis on dynamical processes out of equilibrium.
In addition, there is a quest for the theory to be relevant for a single individual quantum system.
Dynamical view
There is an intimate connection of quantum thermodynamics with the theory of open quantum systems.
Quantum mechanics inserts dynamics into thermodynamics, giving a sound foundation to finite-time-thermodynamics.
The main assumption is that the entire world is a large closed system, and therefore, time evolution
is governed by a unitary transformation generated by a global Hamiltonian. For the combined system
bath scenario, the global Hamiltonian can be decomposed into:
where is the system Hamiltonian, is the bath Hamiltonian and is the system-bath interaction.
The state of the system is obtained from a partial trace over the combined system and bath:
.
Reduced dynamics is an equivalent description of the system dynamics utilizing only system operators.
Assuming Markov property for the dynamics the basic equation of motion for an open quantum system is the Lindblad equation (GKLS):
is a (Hermitian) Hamiltonian part and :
is the dissipative part describing implicitly through system operators the influence of the bath on the system.
The Markov property imposes
that the system and bath are uncorrelated at all times .
The L |
https://en.wikipedia.org/wiki/Urban%20mining | An urban mine is the stockpile of rare metals in the discarded waste electrical and electronic equipment (WEEE) of a society. Urban mining is the process of recovering these rare metals through mechanical and chemical treatments. In 1997, recycled gold accounted for approximately 20% of the 2700 tons of gold supplied to the market.
The name was coined in the 1980s by Professor Hideo Nanjyo of the Research Institute of Mineral Dressing and Metallurgy at Tohoku University and the idea has gained significant traction in Japan (and in other parts of Asia) in the 21st century.
Research published by the Japanese government's National Institute of Materials Science in 2010 estimated that there were 6,800 tonnes of gold recoverable from used electronic equipment in Japan. |
https://en.wikipedia.org/wiki/Display%20aspect%20ratio | The display aspect ratio (or DAR) is the aspect ratio of a display device and so the proportional relationship between the physical width and the height of the display. It is expressed as two numbers separated by a colon (x:y), where x corresponds to the width and y to the height. Common aspect ratios for displays, past and present, include 5:4, 4:3, 16:10, and 16:9.
To distinguish:
The display aspect ratio (DAR) is calculated from the physical width and height of a display, measured each in inch or cm (Display size).
The pixel aspect ratio (PAR) is calculated from the width and height of one pixel.
The storage aspect ratio (SAR) is calculated from the numbers of pixels in width and height stated in the display resolution.
Because the units cancel out, all aspect ratios are unitless.
Diagonal and area
The size of a television set or computer monitor is given as the diagonal measurement of its display area, usually in inches. Wider aspect ratios result in smaller overall area, given the same diagonal.
TVs
Most televisions were built with an aspect ratio of 4:3 until the late 2000s, when widescreen TVs with 16:9 displays became the standard. This aspect ratio was chosen as the geometric mean between 4:3 and 2.35:1, an average of the various aspect ratios used in film. While 16:9 is well-suited for modern HDTV broadcasts, older 4:3 video has to be either padded with bars on the left and right side (pillarboxed), cropped or stretched, while movies shot with wider aspect ratios are usually letterboxed, with black bars at the top and bottom.
Since the turn of the 21st century, many music videos began shooting on widescreen aspect ratio.
Computer displays
As of 2016, most computer monitors use widescreen displays with an aspect ratio of 16:9, although some portable PCs use narrower aspect ratios like 3:2 and 16:10 while some high-end desktop monitors have adopted ultrawide displays.
The following table summarises the different aspect ratios that have been used |
https://en.wikipedia.org/wiki/Caper | Capparis spinosa, the caper bush, also called Flinders rose, is a perennial plant that bears rounded, fleshy leaves and large white to pinkish-white flowers.
The plant is best known for the edible flower buds (capers), used as a seasoning or garnish, and the fruit (caper berries), both of which are usually consumed salted or pickled. Other species of Capparis are also picked along with C. spinosa for their buds or fruits. Other parts of Capparis plants are used in the manufacture of medicines and cosmetics.
Capparis spinosa is native to almost all the circum-Mediterranean countries, and is included in the flora of most of them, but whether it is indigenous to this region is uncertain. The family Capparaceae could have originated in the tropics and later spread to the Mediterranean basin.
The taxonomic status of the species is controversial and unsettled. Species within the genus Capparis are highly variable, and interspecific hybrids have been common throughout the evolutionary history of the genus. As a result, some authors have considered C. spinosa to be composed of multiple distinct species, others that the taxon is a single species with multiple varieties or subspecies, or that the taxon C. spinosa is a hybrid between C. orientalis and C. sicula.
Plant
The shrubby plant is many-branched, with alternate leaves, thick and shiny, round to ovate. The flowers are complete, sweetly fragrant, and showy, with four sepals and four white to pinkish-white petals, many long violet-coloured stamens, and a single stigma usually rising well above the stamens.
Range
Capparis spinosa ranges around the Mediterranean Basin, Arabian Peninsula, and portions of Western and Central Asia.
In southern Europe it is found in southern Portugal, southern and eastern Spain including the Balearic Islands, Mediterranean France including Corsica, Italy including Sicily and Sardinia, Croatia's Dalmatian islands, Albania, Greece and the Greek Islands, western and southern Turkey, on Cypr |
https://en.wikipedia.org/wiki/StICQ | stICQ is an ICQ client for mobile phones with symbian OS.
StICQ was written by the Russian programmer Sergey Taldykin. StICQ is a native Symbian application (.SIS) for instant messaging over Internet for the ICQ network (using the OSCAR protocol).
It supports all main statuses including "Not Available", "Invisible" etc., contact search using ICQ UID, black lists, multi-user support, sound announcements and even SMS sending using default ICQ server.
Its features are its small size, low memory usage and relatively stable work. One of the key features of the client is its ability to suspend outcoming data until GPRS coverage is available. It also suspend the status of the user, while all other mobile clients usually report connection problem and drop the user out.
Currently, stICQ does not support smiley pictures but have a unique feature of quick emoticon input using the call button (special plugin required).
Notable, stICQ supports the yellow "Ready to chat" extended status while "Depressive", as well as "At home", "At work" etc. are displayed as "Offline". This caused to call stICQ an "anti-depressive ICQ".
The source code has been sold to the development team of Quiet Internet Pager messenger. 1.01 version QiP for Symbian has been released recently.
StICQ is free for download, as are a wide variety of mods changing status icons and menu text.
Keypad shortcuts
Pressing asterisk in a contact list window allows you to maximize the program window. It will also affect message windows.
Pressing the green button allows the smiley templates to be inserted by downloading and installing the templates file (stICQ.tpl).
Known bugs
StICQ is known to drop out when receiving large amounts of text in one message. Thus, users should beware their interlocutor of sending messages that exceeds 10-15 phone display lines.
When using StICQ with a T9 dictionary, users should press any cursor key to get rid of "Previous" command for right button after sending a message or the |
https://en.wikipedia.org/wiki/National%20Guide%20Dog%20Month | National Guide Dog Month is a celebration of the work of guide dogs in the United States as a way to raise awareness, appreciation and support for guide dog schools across the United States. It was established in 2008, as a fundraising drive to benefit non-profit guide dog organizations accredited by the International Guide Dog Federation. It is observed during the month of September.
History
National Guide Dog Month was first inspired by Dick Van Patten, who was impressed by the intelligence and training of guide dogs. During a visit to the campus of the Guide Dogs of the Desert in Palm Springs, California, Van Patten was blindfolded to experience how guide dogs provide assistance and mobility to blind people.
After learning that the costs to raise and train a guide dog exceed $40,000 and can take up to two years, Van Patten was inspired to help raise awareness and money for guide dog schools.
Van Patten served as an honorary Board Member for the Guide Dogs of the Desert. Through his pet food company, Dick Van Patten's Natural Balance Pet Foods, he has underwritten all costs for the promotion of National Guide Dog Month to ensure that all money raised would directly benefit non-profit, accredited guide dog schools in the United States.
In 2008, Van Patten enlisted the support of the Petco Foundation, to organize a fundraising campaign through their retail stores. The San Diego based retailer piloted the first guide dog fundraiser in the Southern California area to benefit the Guide Dogs of the Desert, based in Palm Springs, California. In 2009 National Guide Dog Month was established to benefit the non-profit guide dogs schools accredited by the International Guide Dog Federation (IGDF).
In 2009, National Guide Dog Month was established for the month of May; however, in 2010, it was moved to September due to conflicts with other national fundraising drives.
Beneficiaries
In 2011, the non-profit guide dog schools in the United States listed by IGDF were |
https://en.wikipedia.org/wiki/Patlak%20plot | A Patlak plot (sometimes called Gjedde–Patlak plot, Patlak–Rutland plot, or Patlak analysis) is a graphical analysis technique based on the compartment model that uses linear regression to identify and analyze pharmacokinetics of tracers involving irreversible uptake, such as in the case of deoxyglucose. It is used for the evaluation of nuclear medicine imaging data after the injection of a radioopaque or radioactive tracer.
The method is model-independent because it does not depend on any specific compartmental model configuration for the tracer, and the minimal assumption is that the behavior of the tracer can be approximated by two compartments – a "central" (or reversible) compartment that is in rapid equilibrium with plasma, and a "peripheral" (or irreversible) compartment, where tracer enters without ever leaving during the time of the measurements. The amount of tracer in the region of interest is accumulating according to the equation:
where represents time after tracer injection, is the amount of tracer in region of interest, is the concentration of tracer in plasma or blood, is the clearance determining the rate of entry into the peripheral (irreversible) compartment, and is the distribution volume of the tracer in the central compartment. The first term of the right-hand side represents tracer in the peripheral compartment, and the second term tracer in the central compartment.
By dividing both sides by , one obtains:
The unknown constants and can be obtained by linear regression from a graph of against .
See also
Logan plot
Positron emission tomography
Multi-compartment model
Binding potential
Deconvolution
Albert Gjedde |
https://en.wikipedia.org/wiki/TreadMarks | TreadMarks is a distributed shared memory system created at Rice University in the 1990s. |
https://en.wikipedia.org/wiki/CYP25%20family | Cytochrome P450, family 25, also known as CYP25, is a nematoda cytochrome P450 monooxygenase family. The first gene identified in this family is the CYP25A1 from the Caenorhabditis elegans. |
https://en.wikipedia.org/wiki/Positivo%20Tecnologia | Positivo Tecnologia, known as Positivo, started in 1989 under the name Positivo Informatica until 2017. It is a Brazilian technology company headquartered in Curitiba, Paraná. It is the Information Technology division of Brazilian holding organization Grupo Positivo.
Nowadays, the product portfolio includes smartphones, laptops, computer servers, tablets, payment solutions, gadgets for smart homes and offices, electronic ballots, set-top box for Brazilian digital television and educational software used in more than 40 countries. The company also serves as an OEM/ODM/EMS.
It is listed on the Novo Mercado of B3.
Market
Brazil's market share
16.1% of total PC sales (2009)
24.7% official market sales (2009)
29.9% retail market share
Target market
Target market segmentation is based on families with a low monthly budget and their need to buy a personal computer. The low-cost configurations combined with long-term financing allowed the company to build a national coverage and distribution model in 2004, selling the products in major retail companies throughout Brazil. These are designed to serve both as a TV and a personal computer.
Positivo Tecnologia has diversified contracts with the Brazilian government for electronic ballots to reduce its dependence on computer sales and variations in the economy.
Products/Services
According to Grupo Positivo, Positivo Tecnologia:
Manufactures microcomputers.
Manufactures mobile phones, including smartphones.
Develops education software.
Runs education portals.
Provides teacher training and educational and technical support for Grupo Positivo partner schools. |
https://en.wikipedia.org/wiki/37th%20meridian%20east | The meridian 37° east of Greenwich is a line of longitude that extends from the North Pole across the
Arctic Ocean, Europe, Asia, Africa, the Indian Ocean, the Southern Ocean, and Antarctica to the South Pole.
The 37th meridian east forms a great circle with the 143rd meridian west.
From Pole to Pole
Starting at the North Pole and heading south to the South Pole, the 37th meridian east passes through:
{| class="wikitable plainrowheaders"
! scope="col" width="125" | Co-ordinates
! scope="col" | Country, territory or sea
! scope="col" | Notes
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Arctic Ocean
| style="background:#b0e0e6;" |
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Barents Sea
| style="background:#b0e0e6;" | Passing just east of Victoria Island,
|-
|
! scope="row" |
| Kola Peninsula
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | White Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Onega Peninsula
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | White Sea
| style="background:#b0e0e6;" | Onega Bay
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Sea of Azov
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Taman Peninsula
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Black Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Red Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
|
|-
|
! scope="row" |
| For about 6km
|-
|
! scope="row" |
| For about 19km
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
|
! scope="row" |
|
|-
| style="background:#b0e0e6;" |
! s |
https://en.wikipedia.org/wiki/Human%20Rights%20Logo | The Human Rights Logo has its origin in the international "Logo for Human Rights" initiative, which was started in 2010. Its goal was to create an internationally recognized logo to support the global human rights movement. The winning logo was created by Predrag Stakić from Serbia.
The winning logo
The Human Rights Logo combines the silhouette of a hand with that of a bird, and a white thumb grabbing the bird. It is intended as a peaceful contribution towards strengthening human rights and as such is meant to be used across cultural and language borders. The logo is now available to everyone at no cost as an open source product. It is free from rights and can be used worldwide by everyone without paying fees or obtaining licenses.
The competition
The goal of the Logo for Human Rights initiative was to create an internationally recognized symbol for human rights. To this end, an international online design competition starting on 3 May 2011 (World Press Freedom Day) launched a global appeal for submissions of logo designs and put them to a vote. The competition is known as one of the largest, most complex creative crowdsourcing projects ever conducted.
From the more than 15,300 suggestions from over 190 countries a collective decision by all participants selected the top hundred logos, after which an international jury decided on the top ten logos. From these 10 logos, the internet community selected a winner within a three-week voting period.
The competition officially ended on 23 September with the presentation of the universal logo for human rights during UN General Assembly week in New York City by Cinema for Peace.
Presentation of the winning logo
The presentation of the winning logo took place on 23 September 2011 in New York, in an event organised by Cinema for Peace with former editor-in-chief of Time Magazine Michael Elliott hosting the event.
In speeches, television journalist Ann Curry and German Federal Foreign Minister Guido Westerwelle, as well as |
https://en.wikipedia.org/wiki/Lists%20of%20planets | A planet is a large, rounded astronomical body that is neither a star nor its remnant. The best available theory of planet formation is the nebular hypothesis, which posits that an interstellar cloud collapses out of a nebula to create a young protostar orbited by a protoplanetary disk.
In the Solar System
For a list of geophysical planets in the Solar System, see: List of gravitationally rounded objects of the Solar System This also includes a list of the eight planets according to the IAU definition.
For a list of objects in the Solar System once but no longer generally considered planets, see: List of former planets
For a list of objects in the Solar System, including planets, that have been or are believed to exist, but either have not been proven or have been disproven, see: List of hypothetical Solar System objects
Outside the Solar System
Exoplanets
List of nearest exoplanets
List of proper names of exoplanets
Extrasolar systems
List of multiplanetary systems
List of exoplanets discovered using the Kepler space telescope
List of stars with proplyds
List of rogue planets
Exoplanets by method of detection
List of exoplanets detected by radial velocity
List of transiting exoplanets
List of exoplanets detected by microlensing
List of directly imaged exoplanets
List of exoplanets detected by timing
Records in exoplanet detection
List of exoplanet extremes
List of exoplanet firsts
Potential terrestrial exoplanets
List of nearest terrestrial exoplanet candidates
List of potentially habitable exoplanets
Fictional or non-scientific planets
For a list of planets as used in astrology, see: Planets in astrology
For a list of supposed planets not based on scientific evidence, see: Planetary objects proposed in religion, astrology, ufology and pseudoscience
For a list of planets in fiction, see: Planets in science fiction, Stars and planetary systems in fiction and Fictional planets of the Solar System
Mixed
List of planet types (etymologically |
https://en.wikipedia.org/wiki/Federation%20of%20Clinical%20Immunology%20Societies | The Federation of Clinical Immunology Societies (FOCIS) was initially established as a cross-disciplinary meeting, holding its first Annual Meeting in 2001. It subsequently became a 501(c)3 organization in 2003. Its mission is to improve human health through immunology by fostering interdisciplinary approaches to both understand and treat immune-based diseases. FOCIS currently has 58 Member Societies, representing roughly 65,000 clinician scientists.
Its member societies include: American Academy of Allergy, Asthma, and Immunology, British Society for Immunology, European Academy of Allergy and Clinical Immunology, European Society for Primary Immunodeficiencies, and World Allergy Organization. |
https://en.wikipedia.org/wiki/Geometric%20design | Geometrical design (GD) is a branch of computational geometry. It deals with the construction and representation of free-form curves, surfaces, or volumes and is closely related to geometric modeling. Core problems are curve and surface modelling and representation. GD studies especially the construction and manipulation of curves and surfaces given by a set of points using polynomial, rational, piecewise polynomial, or piecewise rational methods. The most important instruments here are parametric curves and parametric surfaces, such as Bézier curves, spline curves and surfaces. An important non-parametric approach is the level-set method.
Application areas include shipbuilding, aircraft, and automotive industries, as well as architectural design. The modern ubiquity and power of computers means that even perfume bottles and shampoo dispensers are designed using techniques unheard of by shipbuilders of 1960s.
Geometric models can be built for objects of any dimension in any geometric space. Both 2D and 3D geometric models are extensively used in computer graphics. 2D models are important in computer typography and technical drawing. 3D models are central to computer-aided design and manufacturing, and many applied technical fields such as geology and medical image processing.
Geometric models are usually distinguished from procedural and object-oriented models, which define the shape implicitly by an algorithm. They are also contrasted with digital images and volumetric models; and with mathematical models such as the zero set of an arbitrary polynomial. However, the distinction is often blurred: for instance, geometric shapes can be represented by objects; a digital image can be interpreted as a collection of colored squares; and geometric shapes such as circles are defined by implicit mathematical equations. Also, the modeling of fractal objects often requires a combination of geometric and procedural techniques.
Geometric problems originating in architecture |
https://en.wikipedia.org/wiki/Superframe | In telecommunications, superframe (SF) is a T1 framing standard. In the 1970s it replaced the original T1/D1 framing scheme of the 1960s in which the framing bit simply alternated between 0 and 1.
Superframe is sometimes called D4 Framing to avoid confusion with single-frequency signaling. It was first supported by the D2 channel bank, but it was first widely deployed with the D4 channel bank.
In order to determine where each channel is located in the stream of data being received, each set of 24 channels is aligned in a frame. The frame is 192 bits long (8 * 24), and is terminated with a 193rd bit, the framing bit, which is used to find the end of the frame.
In order for the framing bit to be located by receiving equipment, a predictable pattern is sent on this bit. Equipment will search for a bit which has the correct pattern, and will align its framing based on that bit. The pattern sent is 12 bits long, so every group of 12 frames is called a superframe. The pattern used in the 193rd bit is 100011 011100.
Each channel sends two bits of call supervision data during each superframe using robbed-bit signaling during frames 6 and 12 of the superframe.
More specifically, after the 6th and 12th bit in the superframe pattern, the least significant data bit of each channel (bit 8; T1 data is sent big-endian and uses 1-origin numbering) is replaced by a "channel-associated signalling" bit (bits A and B, respectively).
Superframe remained in service in many places through the turn of the century, replaced by the improved extended superframe (ESF) of the 1980s in applications where its additional features were desired.
Extended superframe
In telecommunications, extended superframe (ESF) is a T1 framing standard. ESF is sometimes called D5 Framing because it was first used in the D5 channel bank, invented in the 1980s.
It is preferred to its predecessor, superframe, because it includes a cyclic redundancy check (CRC) and 4000 bit/s channel capacity for a data |
https://en.wikipedia.org/wiki/Donath%E2%80%93Landsteiner%20hemolytic%20anemia | Donath–Landsteiner hemolytic anemia (DLHA) is a result of cold-reacting antibody immunoglobulin (Ig) induced hemolytic response inside vessels leading to anemia and, thus, a cold antibody autoimmune hemolytic anemias (CAAHA).
In most patients with DLHA, the antibody selectively targets against the red blood cells on-surface antigen called the antigen P or antigen I, respectively. Most cases were found to be owing to polyclonal IgG. Nonetheless, IgM-induced DLHA has already also been described in the past. For example, there was a case study reporting that autoimmune hemolytic anemia where an IgA Donath–Landsteiner denoted as [D-L] antibody appeared to cause Donath–Landsteiner cold hemoglobinuria. The most notable difference between DLHA and CAD (cold agglutinin disease) is the causative agent. For cold agglutinin disease, the causative agent is constantly owing to a cold-active IgM antibody.
In 1865, it was widely accepted as a common sense that cold exposure may result in hemoglobinuria paroxysms. After decades of devoted researches, now the elucidation of the etiology and diagnostic methods of DLHA have been learned and developed.
Discovering the D–L antibody has empowered DLHA to be differentiated from other hemoglobinuria that something other than D-L is responsible for. As of 2019, it is concluded that the existence of the Donath–Landsteiner antibody is clearly pathognomonic for the DLHA.
Signs and symptoms
Somewhat similar to cold agglutinin disease, more than often, signs and symptoms of DHLA is tied to an abrupt onset of hemoglobinuria subsequent to cold exposure.
Exact signs and symptoms of DLHA are anemia-alike
dyspnea
palpitations
fatigue
pallor
Hemolysis-alike
jaundice
dark urine
pain
Signs and symptoms that indicate a medical emergency and that the patients with DLHA require to be hospitalized
Rapidly progressive anemia
Worsening anemia
Severe anemia
Respiratory distress
Circulatory shock
Renal failure
Severe infection
Patient's c |
https://en.wikipedia.org/wiki/Hyper-converged%20infrastructure | Hyper-converged infrastructure (HCI) is a software-defined IT infrastructure that virtualizes all of the elements of conventional "hardware-defined" systems. HCI includes, at a minimum, virtualized computing (a hypervisor), software-defined storage, and virtualized networking (software-defined networking). HCI typically runs on commercial off-the-shelf (COTS) servers.
The primary difference between converged infrastructure and hyperconverged infrastructure is that in HCI both the storage area network and the underlying storage abstractions are implemented virtually in software (at or via the hypervisor) rather than physically in hardware. Because software-defined elements are implemented in the context of the hypervisor, management of all resources can be federated (shared) across all instances of a hyper-converged infrastructure.
Description
Hyperconvergence evolves away from discrete, software-defined systems that are connected and packaged together toward a purely software-defined environment where all functional elements run on commercial, off-the-shelf (COTS) servers, with the convergence of elements enabled by a hypervisor. HCI systems are usually made up of server systems equipped with direct-attached storage. HCI includes the ability to pool like systems together. All physical data-center resources reside on a single administrative platform for both hardware and software layers.
Consolidation of all functional elements at the hypervisor level, together with federated identity management, was promoted to improve data-center inefficiencies and reduce the total cost of ownership (TCO) for data centers.
The potential impact of the hyper-converged infrastructure is that companies will no longer need to rely on different compute and storage systems, though it is still too early to prove that it can replace storage arrays in all market segments. It is likely to further simplify management and increase resource-utilization rates where it does apply.
See a |
https://en.wikipedia.org/wiki/Bacteriovoracales | Bacteriovoracales is an order of bacteria. |
https://en.wikipedia.org/wiki/Educational%20Studies%20in%20Mathematics | Educational Studies in Mathematics is a peer-reviewed academic journal covering mathematics education. It was established by Hans Freudenthal in 1968. The journal is published by Springer Science+Business Media and the editors-in-chief are Susanne Prediger (Technical University of Dortmund) and David Wagner (University of New Brunswick). According to the Journal Citation Reports, the journal has a 2020 impact factor of 2.402.
Editors-in-chief
The following persons are or have been editors-in-chief:
1968-1977: Hans Freudenthal
1978-1989: Alan Bishop
1990-1995: Willibald Dörfler
1996-2000: Kenneth Ruthven
2001-2005: Anna Sierpińska
2006-2008: Tommy Dreyfus
2009-2013: Norma Presmeg
2014-2018: Merrilyn Goos
2019-2020: Arthur Bakker
2021-2022: Arthur Bakker and David Wagner
2022-present: Susanne Prediger and David Wagner
See also
List of mathematics education journals |
https://en.wikipedia.org/wiki/Samplesort | Samplesort is a sorting algorithm that is a divide and conquer algorithm often used in parallel processing systems. Conventional divide and conquer sorting algorithms partitions the array into sub-intervals or buckets. The buckets are then sorted individually and then concatenated together. However, if the array is non-uniformly distributed, the performance of these sorting algorithms can be significantly throttled. Samplesort addresses this issue by selecting a sample of size from the -element sequence, and determining the range of the buckets by sorting the sample and choosing elements from the result. These elements (called splitters) then divide the array into approximately equal-sized buckets. Samplesort is described in the 1970 paper, "Samplesort: A Sampling Approach to Minimal Storage Tree Sorting", by W. D. Frazer and A. C. McKellar.
Algorithm
Samplesort is a generalization of quicksort. Where quicksort partitions its input into two parts at each step, based on a single value called the pivot, samplesort instead takes a larger sample from its input and divides its data into buckets accordingly. Like quicksort, it then recursively sorts the buckets.
To devise a samplesort implementation, one needs to decide on the number of buckets . When this is done, the actual algorithm operates in three phases:
Sample elements from the input (the splitters). Sort these; each pair of adjacent splitters then defines a bucket.
Loop over the data, placing each element in the appropriate bucket. (This may mean: send it to a processor, in a multiprocessor system.)
Sort each of the buckets.
The full sorted output is the concatenation of the buckets.
A common strategy is to set equal to the number of processors available. The data is then distributed among the processors, which perform the sorting of buckets using some other, sequential, sorting algorithm.
Pseudocode
The following listing shows the above mentioned three step algorithm as pseudocode and shows how t |
https://en.wikipedia.org/wiki/UEFI%20Platform%20Initialization | The Platform Initialization Specification (PI Specification) is a specification published by the Unified EFI Forum that describes the internal interfaces between different parts of computer platform firmware. This allows for more interoperability between firmware components from different sources. This specification is normally, but not by requirement, used in conjunction with the UEFI specification.
Current version
Platform Initialization Specification 1.7, Released January 2019.
Contents
As of version 1.3, the PI specification contains five volumes:
Volume 1: Pre-EFI Initialization Core Interface
Volume 2: Driver Execution Environment Core Interface
Volume 3: Shared Architectural Elements
Volume 4: System Management Mode Core Interface
Volume 5: Standards |
https://en.wikipedia.org/wiki/DO-204 | DO-204 is a family of diode semiconductor packages defined by JEDEC. This family comprises lead-mounted axial devices with round leads. Generally a diode will have a line painted near the cathode end.
Dimensions
Common variants
Several common packages are archived in DO-204 as variants, and may be referred to using their alternative names.
DO-7
The DO-7 (also known as DO-204-AA) is a common semiconductor package for 1N34A germanium diodes.
DO-35
The DO-35 (also known as DO-204-AH or SOD27) is a semiconductor package used to encapsulate signal diodes (i.e., diodes meant to handle small amounts of current and voltage). It is often used to package small signal, low power diodes such as 1N4148 (a 100 V, 300 mA silicon diode.)
DO-41
The DO-41 (also known as DO-204-AL or SOD66) is a common semiconductor package used to encapsulate rectifier diodes (i.e., diodes meant to handle larger currents and voltages than signal diodes). The name is derived from the JEDEC descriptor "Diode Outline, Case Style 41". DO-41 diodes are larger than signal diode packages such as DO-35, which are not required to handle large currents. The most common diode using this packaging is the 1N4001 to 1N4007 series of rectification diodes.
National standards |
https://en.wikipedia.org/wiki/Landline | A landline (land line, land-line, main line, fixed-line, and wireline) is a telephone connection that uses metal wires from the owner's premises also referred to as: POTS, Twisted pair, telephone line or public switched telephone network (PSTN).
Landline services are traditionally provided via an analogue copper wire to a telephone exchange. Landline service is usually distinguished from other more modern forms of telephone services which use Internet Protocol based services over optical fiber (Fiber-to-the-x) or other broadband services (VDSL/Cable) using Voice over IP, although sometimes modern fixed phone services delivered over a fixed internet connection are sometimes referred to as a landline (non-cellular service).
Characteristics
Landline service is typically provided through the outside plant of a telephone company's central office, or wire center. The outside plant comprises tiers of cabling between distribution points in the exchange area, so that a single pair of copper wire, or an optical fiber, reaches each subscriber location, such as a home or office, at the network interface. Customer premises wiring extends from the network interface ("NID") to the location of one or more telephones inside the premises.
A subscriber's telephone connected to a landline can be hard-wired or cordless and typically refers to the operation of wireless devices or systems in fixed locations such as homes. Fixed wireless devices usually derive their electrical power from the utility mains electricity, unlike mobile wireless or portable wireless, which tend to be battery-powered. Although mobile and portable systems can be used in fixed locations, efficiency and bandwidth are compromised compared with fixed systems. Mobile or portable, battery-powered wireless systems can be used as emergency backups for fixed systems in case of a power blackout or natural disaster.
Other aspects of landline is the ability to carry high-speed internet popularly known as Digital subsc |
https://en.wikipedia.org/wiki/L-arabinose%20operon | The L-arabinose operon, also called the ara or araBAD operon''', is an operon required for the breakdown of the five-carbon sugar L-arabinose in Escherichia coli. The L-arabinose operon contains three structural genes: araB, araA, araD (collectively known as araBAD), which encode for three metabolic enzymes that are required for the metabolism of L-arabinose. AraB (ribulokinase), AraA (an isomerase), and AraD (an epimerase) produced by these genes catalyse conversion of L-arabinose to an intermediate of the pentose phosphate pathway, D-xylulose-5-phosphate.
The structural genes of the L-arabinose operon are transcribed from a common promoter into a single transcript, a mRNA. The expression of the L-arabinose operon is controlled as a single unit by the product of regulatory gene araC and the catabolite activator protein (CAP)-cAMP complex. The regulator protein AraC is sensitive to the level of arabinose and plays a dual role as both an activator in the presence of arabinose and a repressor in the absence of arabinose to regulate the expression of araBAD. AraC protein not only controls the expression of araBAD but also auto-regulates its own expression at high AraC levels.
Structure
L-arabinose operon is composed of structural genes and regulatory regions including the operator region (araO1, araO2) and the initiator region (araI1, araI2). The structural genes, araB, araA and araD, encode enzymes for L-arabinose catabolism. There is also a CAP binding site where CAP-cAMP complex binds to and facilitates catabolite repression, and results in positive regulation of araBAD when the cell is starved of glucose.
The regulatory gene, araC, is located upstream of the L-arabinose operon and encodes the arabinose-responsive regulatory protein AraC. Both araC and araBAD have a discrete promoter where RNA polymerase binds and initiates transcription. araBAD and araC are transcribed in opposite directions from the araBAD promoter (PBAD) and araC promoter (PC) respectively.
|
https://en.wikipedia.org/wiki/Noil | Noil refers to the short fibers that are removed during the combing process in spinning. These fibers are often then used for other purposes.
Fibers are chosen for their length and evenness in specific spinning techniques, such as worsted. The short noil fibers are left over from combing of wool or spinning silk.
Noil may be treated as a shorter-staple fiber and spun, hand-plied, or used as wadding. Noil may also be used as a decorative additive in spinning projects like rovings and yarns. As noil is a relatively short fiber, fabric made from noil is weaker and often considered less valuable than that made using long lengths of longer staple lengths, though it is sometimes valued for aesthetic effects (see Slub (textiles)).
Silk
Silk noil is also called "raw silk", although this is a misnomer.
Silk noil may also be made from the short fibres taken from silkworm cocoons – either fibres that are naturally shorter or fibres broken by emerging silk moths. Rather than the continuous filament length of silk, shorter fibers are silk noil, which has a slightly rough texture. It is relatively weaker and has low resilience. It tends to have very low lustre, which makes it appear more like cotton than silk.
Noil silk has the advantage of being made from protein. Thus, it has a better texture and depth than cotton and gives a nice fall and drape.
Silk noil is also blended or appended with heavier fabrics like velvets and satins to create varied textures. Made out of the strongest natural fibres (with a protein base) around, noil saris are not as slippery as many synthetic fibres or filament silk. Being silk, it dyes easily, absorbs moisture well, and can also be waterproofed with a polyurethane coating. Such coatings increase their use in furnishings and upholstery.
Silk noil hails from China, whence it was exported to Europe in the Middle Ages, especially to Italy. It was used to create silk blends through the first half of the 14th century. However, over time its |
https://en.wikipedia.org/wiki/Cranial%20evolutionary%20allometry | Cranial evolutionary allometry (CREA) is a scientific theory regarding trends in the shape of mammalian skulls during the course of evolution in accordance with body size (i.e., allometry). Specifically, the theory posits that there is a propensity among closely related mammalian groups for the skulls of the smaller species to be short and those of the larger species to be long. This propensity appears to hold true for placental as well as non-placental mammals, and is highly robust. Examples of groups which exhibit this characteristic include antelopes, fruit bats, mongooses, squirrels and kangaroos as well as felids.
It is believed that the reason for this trend has to do with size-related constraints on the formation and development of the mammalian skull. Facial length is one of the best known examples of heterochrony. |
https://en.wikipedia.org/wiki/Probabilistic%20number%20theory | In mathematics, Probabilistic number theory is a subfield of number theory, which explicitly uses probability to answer questions about the integers and integer-valued functions. One basic idea underlying it is that different prime numbers are, in some serious sense, like independent random variables. This however is not an idea that has a unique useful formal expression.
The founders of the theory were Paul Erdős, Aurel Wintner and Mark Kac during the 1930s, one of the periods of investigation in analytic number theory. Foundational results include the Erdős–Wintner theorem and the Erdős–Kac theorem on additive functions.
See also
Number theory
Analytic number theory
Areas of mathematics
List of number theory topics
List of probability topics
Probabilistic method
Probable prime |
https://en.wikipedia.org/wiki/Predation | Predation is a biological interaction where one organism, the predator, kills and eats another organism, its prey. It is one of a family of common feeding behaviours that includes parasitism and micropredation (which usually do not kill the host) and parasitoidism (which always does, eventually). It is distinct from scavenging on dead prey, though many predators also scavenge; it overlaps with herbivory, as seed predators and destructive frugivores are predators.
Predators may actively search for or pursue prey or wait for it, often concealed. When prey is detected, the predator assesses whether to attack it. This may involve ambush or pursuit predation, sometimes after stalking the prey. If the attack is successful, the predator kills the prey, removes any inedible parts like the shell or spines, and eats it.
Predators are adapted and often highly specialized for hunting, with acute senses such as vision, hearing, or smell. Many predatory animals, both vertebrate and invertebrate, have sharp claws or jaws to grip, kill, and cut up their prey. Other adaptations include stealth and aggressive mimicry that improve hunting efficiency.
Predation has a powerful selective effect on prey, and the prey develop antipredator adaptations such as warning coloration, alarm calls and other signals, camouflage, mimicry of well-defended species, and defensive spines and chemicals. Sometimes predator and prey find themselves in an evolutionary arms race, a cycle of adaptations and counter-adaptations. Predation has been a major driver of evolution since at least the Cambrian period.
Definition
At the most basic level, predators kill and eat other organisms. However, the concept of predation is broad, defined differently in different contexts, and includes a wide variety of feeding methods; and some relationships that result in the prey's death are not generally called predation. A parasitoid, such as an ichneumon wasp, lays its eggs in or on its host; the eggs hatch into larvae |
https://en.wikipedia.org/wiki/VEX%20prefix | The VEX prefix (from "vector extensions") and VEX coding scheme are an extension to the x86 and x86-64 instruction set architecture for microprocessors from Intel, AMD and others.
Features
The VEX coding scheme allows the definition of new instructions and the extension or modification of previously existing instruction codes. This serves the following purposes:
The opcode map is extended to make space for future instructions.
It allows instruction codes to have up to four operands (plus immediate), where the original scheme allows only two operands (plus immediate).
It allows the size of SIMD vector registers to be extended from the 128-bit XMM registers to the 256-bit YMM registers. There is room for further extensions of the register size.
It allows existing two-operand instructions to be modified into non-destructive three-operand forms where the destination register is different from both source registers. For example, instead of (where register a is changed by the instruction).
The VEX prefix replaces the most commonly used instruction prefix bytes and escape codes. In many cases, the number of prefix bytes and escape bytes that are replaced is the same as the number of bytes in the VEX prefix, so that the total length of the VEX-encoded instruction is the same as the length of the legacy instruction code. In other cases, the VEX-encoded version is longer or shorter than the legacy code. In 32-bit mode VEX encoded instructions can only access the first 8 YMM/XMM registers; the encodings for the other registers would be interpreted as the legacy LDS and LES instructions that are not supported in 64-bit mode.
Instruction Encoding
The VEX coding scheme uses a code prefix consisting of two or three bytes, which may be added to existing or new instruction codes.
In x86 architecture, instructions with a memory operand may use the ModR/M byte which specifies the addressing mode. This byte has three bit fields:
mod, bits [7:6] - combined with the r/m field |
https://en.wikipedia.org/wiki/Active-set%20method | In mathematical optimization, the active-set method is an algorithm used to identify the active constraints in a set of inequality constraints. The active constraints are then expressed as equality constraints, thereby transforming an inequality-constrained problem into a simpler equality-constrained subproblem.
An optimization problem is defined using an objective function to minimize or maximize, and a set of constraints
that define the feasible region, that is, the set of all x to search for the optimal solution. Given a point in the feasible region, a constraint
is called active at if , and inactive at if Equality constraints are always active. The active set at is made up of those constraints that are active at the current point .
The active set is particularly important in optimization theory, as it determines which constraints will influence the final result of optimization. For example, in solving the linear programming problem, the active set gives the hyperplanes that intersect at the solution point. In quadratic programming, as the solution is not necessarily on one of the edges of the bounding polygon, an estimation of the active set gives us a subset of inequalities to watch while searching the solution, which reduces the complexity of the search.
Active-set methods
In general an active-set algorithm has the following structure:
Find a feasible starting point
repeat until "optimal enough"
solve the equality problem defined by the active set (approximately)
compute the Lagrange multipliers of the active set
remove a subset of the constraints with negative Lagrange multipliers
search for infeasible constraints
end repeat
Methods that can be described as active-set methods include:
Successive linear programming (SLP)
Sequential quadratic programming (SQP)
Sequential linear-quadratic programming (SLQP)
Reduced gradient method (RG)
Generalized reduced gradient method (GRG) |
https://en.wikipedia.org/wiki/Stephanie%20van%20Willigenburg | Stephanie van Willigenburg is a professor of mathematics at the University of British Columbia whose research is in the field of algebraic combinatorics and concerns quasisymmetric functions. Together with James Haglund, Kurt Luoto and Sarah Mason, she introduced the quasisymmetric Schur functions, which form a basis for quasisymmetric functions.
Education
Van Willigenburg earned her Ph.D. in 1997 at the University of St. Andrews under the joint supervision of Edmund F. Robertson and Michael D. Atkinson, with a thesis titled The Descent Algebras of Coxeter Groups.
Recognition
Van Willigenburg was awarded the Krieger–Nelson Prize in 2017 by the Canadian Mathematical Society. She was named to the 2023 class of Fellows of the American Mathematical Society, "for contributions to algebraic combinatorics, mentorship and exposition, and inclusive community building".
Selected publications |
https://en.wikipedia.org/wiki/Levy%20Mwanawasa%20Medical%20University | Levy Mwanawasa Medical University (LMMU), is a public university in Lusaka, Zambia. It is the country’s first ever specialized University for health studies.
Location
The main campus of the university is located on Chainama Hill,
in northeastern Lusaka, the capital and largest city of Zambia. The geographical coordinates of the university campus are: 15°23'06.0"S, 28°21'14.0"E (Latitude:-15.385000; Longitude:28.353889).
Overview
The Levy Mwanawasa Medical University School of Medicine and Clinical Sciences, comprises the Chainama College of Health Sciences, the Dental Training School, Levy Mwanawasa University Teaching Hospital and Chainama Hills Hospital. Those public institutions, which were operating independent of each other, were integrated into one teaching institution, the School of Medicine of LMMU.
The schools and institutes that make up the university, include the following, as of August 2020: 1. Institute of Basic and Biomedical Sciences 2. School of Nursing 3. School of Health Sciences 4. School of Medicine and Clinical Sciences and 5. School of Public Health and Environmental Sciences.
History
In 2016, the government of Zambia began the expansion of Levy Mwanawasa Teaching Hospital to 850 bed capacity. At the same time, construction started on a training annex, with student capacity of 3,000 adjacent to the hospital. The work was funded by the Zambian government to the tune of ZMW:170 million (approx. US$10 million). Sanjin Construction Engineering Group Company Limited were the main contractors. This formed the nucleus of Levy Mwanawasa Medical University.
Academic programmes
As of August 2020, the following degree courses were offered at the university:
School of Medicine and Clinical Sciences
Undergraduate degree courses:
Bachelor of Medicine and Bachelor of Surgery
Bachelor of Science in Clinical Sciences
Bachelor of Science in Clinical Anaesthesia
Bachelor of Science in Clinical Ophthalmology
Bachelor of Science in Optometry
Bachelor |
https://en.wikipedia.org/wiki/W%C5%82odzimierz%20Kuperberg | Włodzimierz Kuperberg (born January 19, 1941) is a professor of mathematics at Auburn University, with research interests in geometry and topology.
Biography
Although Kuperberg is Polish-American, he was born in what is now Belarus, where his parents and older siblings had traveled east to escape World War II. In 1946, the family returned to Poland, resettling in Szczecin, where Kuperberg grew up. He began his studies at the University of Warsaw in 1959, and received his Ph.D. from the same institution in 1969, under the supervision of Karol Borsuk. During his time at Warsaw, he published three high school textbooks in Polish. Kuperberg left Poland due to the anti-semitic aspects of the 1967-1968 Polish political crisis, and worked at Stockholm University until 1972, when he assumed a visiting position at the University of Houston. In 1974, Kuperberg took a position at Auburn where he remains.
Kuperberg married mathematician Krystyna Kuperberg in 1964, and their son Greg Kuperberg is also a professional mathematician, while their daughter Anna Kuperberg is a photographer.
Research highlights
Although much of Kuperberg's early mathematical work is in topology, he is best known today for his work in geometry, and in particular on packing and covering problems. His first paper in this area (1982) showed that the ratio of packing density to covering density of any convex body in the plane is at least 3/4. His 1990 paper on double lattices with his son Greg provides the best lower bound known at that time for packing densities of arbitrary two-dimensional convex bodies; with Bezdek (1990) he calculated the exact packing density of the infinite cylinder, which prior to Hales' 1998 solution of the Kepler conjecture was the first nontrivial calculation of the packing density of any three-dimensional convex body.
Awards and honors
As a high school student, Kuperberg won first prize in the 10th Polish Mathematical Olympiad, leading him to enroll in mathematics when he beg |
https://en.wikipedia.org/wiki/It%C3%B4%E2%80%93Nisio%20theorem | The Itô-Nisio theorem is a theorem from probability theory that characterizes convergence in Banach spaces. The theorem shows the equivalence of the different types of convergence for sums of independent and symmetric random variables in Banach spaces. The Itô-Nisio theorem leads to a generalization of Wiener's construction of the Brownian motion. The symmetry of the distribution in the theorem is needed in infinite spaces.
The theorem was proven by Japanese mathematicians Kiyoshi Itô and in 1968.
Statement
Let be a real separable Banach space with the norm induced topology, we use the Borel σ-algebra and denote the dual space as . Let be the dual pairing and is the imaginary unit. Let
be independent and symmetric -valued random variables defined on the same probability space
be the probability measure of
some -valued random variable.
The following is equivalent
converges almost surely.
converges in probability.
converges to in the Lévy–Prokhorov metric.
is uniformly tight.
in probability for every .
There exist a probability measure on such that for every
Remarks:
Since is separable point (i.e. convergence in the Lévy–Prokhorov metric) is the same as convergence in distribution . If we remove the symmetric distribution condition:
in a finite-dimensional setting equivalence is true for all except point (i.e. the uniform tighness of ),
in an infinite-dimensional setting is true but does not always hold.
Literature |
https://en.wikipedia.org/wiki/Nikolai%20Kardashev | Nikolai Semyonovich Kardashev (; 25 April 1932 – 3 August 2019) was a Soviet and Russian astrophysicist, Doctor of Physical and Mathematical Sciences, and the deputy director of the Astro Space Center of PN Lebedev Physical Institute of the Russian Academy of Sciences in Moscow.
Early life
He was born in Moscow to a family of professional revolutionaries involved with the Bolshevik Party. His parents were Semyon Karlovich Brike and Nina Nikolaevna Kardasheva; his father was an important member of the party, and his mother joined as well before the October Revolution in 1917. Both of his parents were arrested during the Great Purge of 1937 and 1938. His father was ultimately shot and his mother was assigned to labor camps and would not be released for many years. Due to his parents’ absence, he was sent to an orphanage from which he was then taken by his mother's sister after a great deal of effort. His aunt then died during World War II when he was 16 years old and he then had to live on his own in a large communal flat. His mother was released in 1956, by which time Nikolai had completed university.
Education
He attended Moscow State University (Russian abbreviation MGU) in the Astronomy division of the Mechanics and Mathematics Department. Here he concentrated his studies/interests in radio astronomy, a topic which was new and developing.
Career
He joined the Space Research Institute (IKI) of the USSR Academy of Sciences in 1967. He became deputy director of IKI in 1977. During the dissolution of the USSR, Nikolai became the director of the Astro Space Center of the Lebedev Physical Institute. In 1978, Nikolai started a project known as the Space VLBI mission RadioAstron. This mission endured for more than 30 years and a spacecraft was finally launched in 2011. The RadioAstron mission has become important to modern observational astrophysics.
He in 1964 proposed what would be known as the Kardashev scale, the idea of measuring a civilization's degree of tech |
https://en.wikipedia.org/wiki/Harmonized%20System | The Harmonized Commodity Description and Coding System, also known as the Harmonized System (HS) of tariff nomenclature is an internationally standardized system of names and numbers to classify traded products. It came into effect in 1988 and has since been developed and maintained by the World Customs Organization (WCO) (formerly the Customs Co-operation Council), an independent intergovernmental organization based in Brussels, Belgium.
It is used by over 200 WCO member countries and economies as a basis for their Customs tariffs and for the collection of international trade statistics as well as many other purposes.
Structure
The HS is organized logically by economic activity or component material. For example, animals and animal products are found in one section of the HS, while machinery and mechanical appliances are found in another. The HS is organized into 21 Sections, which are subdivided into 96 Chapters (Chapters 1 to 97 with Chapter 77 reserved for potential future use by the HS). The 96 HS Chapters are further subdivided into 1,228 headings and 5,612 subheadings in the current 2022 edition of the HS.
Section and Chapter titles describe broad categories of goods, while headings and subheadings describe products in more detail. Generally, HS Sections and Chapters are arranged in order of a product's degree of manufacture or in terms of its technological complexity. Natural commodities, such as live animals and vegetables, for example, are described in the early Sections of the HS, whereas more evolved goods such as machinery and precision instruments are described in later Sections. Chapters within the individual Sections are also usually organized in order of complexity or degree of manufacture. For example, within Section X (Pulp of wood or of other fibrous cellulosic material; Recovered (waste and scrap) paper or paperboard; Paper and paperboard and articles thereof), Chapter 47 provides for pulp of wood or of other fibrous cellulosic materials, w |
https://en.wikipedia.org/wiki/An%20Illustrated%20Book%20of%20Bad%20Arguments | An Illustrated Book of Bad Arguments is a book on critical thinking written by Ali Almossawi and illustrated by Alejandro Giraldo. The book describes 19 logical fallacies using a set of illustrations, in which various cartoon characters participate.
The online version of the book was published under a Creative Commons license on July 15, 2013. The print edition was released on December 5, 2013 and is also shared under a Creative Commons license. The book is part of a not-for-profit project aimed at raising awareness of the importance of critical thinking.
Style
Each "bad argument" is discussed on a double page, with a written explanation on one side and an illustration on the other. The book is written using terse prose that relies heavily on the use of examples. The illustrations are done in a woodcut style and are said to be inspired by characters from Lewis Carroll's stories and poems.
Editions
Moscow-based Dodo Magic Bookroom published the Russian edition on November 24, 2013, the Rome-based humanist non-profit association Uaar published the Italian edition as Nessun Dogma on November 20, 2014.
The audiobook version is narrated by former BBC announcer and newsreader James Gillies. In it, illustrations have been replaced with short sketches.
Reception
The Omaha World-Herald'''s review said that "this little book takes a potentially ponderous subject (logical fallacies) and makes it wonderfully entertaining." Jenny Bristol reviewed it for the community blog GeekDad, calling it "a great format for teaching kids about logic".L'Express reviewed the French version of the book, concluding that it is “a short and perfectly organized book that examines and dismantles a score of fallacious arguments … [with] illustrations largely inspired by allegories of Animal Farm by G. Orwell and the work of Lewis Caroll”. The Spanish version of the book was reviewed by Rafael Martínez for Loffit, and it emphasized how effectively the book's lessons could be learned by li |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.