source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Cryptochrome
Cryptochromes (from the Greek κρυπτός χρώμα, "hidden colour") are a class of flavoproteins found in plants and animals that are sensitive to blue light. They are involved in the circadian rhythms and the sensing of magnetic fields in a number of species. The name cryptochrome was proposed as a portmanteau combining the chromatic nature of the photoreceptor, and the cryptogamic organisms on which many blue-light studies were carried out. The genes Cry1 and Cry2 encode the two cryptochrome proteins CRY1 and CRY2, respectively. Cryptochromes are classified into plant Cry and animal Cry. Animal Cry can be further categorized into insect type (Type I) and mammal-like (Type II). CRY1 is a circadian photoreceptor whereas CRY2 is a clock repressor which represses Clock/Cycle (Bmal1) complex in insects and vertebrates. In plants, blue-light photoreception can be used to cue developmental signals. Besides chlorophylls, cryptochromes are the only proteins known to form photoinduced radical-pairs in vivo. These appear to enable some animals to detect magnetic fields. Cryptochromes have been the focus of several current efforts in optogenetics. Employing transfection, initial studies on yeast have capitalized on the potential of CRY2 heterodimerization to control cellular processes, including gene expression, by light. Discovery Although Charles Darwin first documented plant responses to blue light in the 1880s, it was not until the 1980s that research began to identify the pigment responsible. In 1980, researchers discovered that the HY4 gene of the plant Arabidopsis thaliana was necessary for the plant's blue light sensitivity, and, when the gene was sequenced in 1993, it showed high sequence homology with photolyase, a DNA repair protein activated by blue light. Reference sequence analysis of cryptochrome-1 isoform d shows two conserved domains with photolyase proteins. Isoform d nucleotide positions 6 through 491 show a conserved domain with deoxyribodipyrimidine photol
https://en.wikipedia.org/wiki/Satmap
Satmap Systems Limited is a United Kingdom company founded on 19 October 2005 and based in Leatherhead, Surrey. Since 2007 it has produced a standalone handheld GPS satellite navigation mapping device for use by walkers, cyclists, mountain rescue, emergency services and the military. Active 10 The Active 10 available since 2007 is sold in four different bundles: Active 10 (the device, a case, a lanyard and three lithium AA batteries). Active 10 BIKE (the device, a bike mount and a power pack including adaptors and a 2700mAh lithium polymer rechargeable battery. Active 10 PLUS GB (the device, a case, a lanyard, a power pack including adaptors and a 2700mAh lithium polymer rechargeable battery, the UK GB 1:50,000 Ordnance Survey map). Active 10 PLUS EU (the device, a case, a lanyard, a power pack including adaptors and a 2700mAh lithium polymer rechargeable battery, a Europe map). Active 12 The Active 12 introduced in 2014 is more technically advanced than the Active 10 with a High-Resolution 320x488 pixel HVGA screen, doubled RAM, Bluetooth and a barometric altimeter and it is supplied with a high resolution UK GB 1:50,000 map. It is virtually identical in appearance to the Active 10 but is distinguishable by its orange buttons. Accessories Accessories include a vehicle mount, silicone protective cases and screen covers. It is necessary to swap the caddy holding the batteries to change the power source. Detailed maps can be loaded on to the device by inserting an SD card into the side, 350 map titles from 13 countries are available including; 1:25,000 and 1:50,000 scale Ordnance Survey maps, Harvey Maps, a 1:16,000 A-Z street maps of London and other UK cities, marine maps, United States, Canada, Australia, Europe and Morocco maps. See also Garmin Magellan Navigation MapKing Navigon TomTom
https://en.wikipedia.org/wiki/Lyutika
Lyutika (, ) is a traditional vegetable mixture — salad or chunky relish, popular in the northern part of Bulgaria. It is consumed in the summer. Basic lyutika is made from roasted peppers, tomatoes, garlic, onions, and vegetable oil usually crushed with a pestle in a mortar. Often chopped parsley is added. Lyutika is served cold. The name comes from the pungent taste (lyut, meaning hot, pungent). There are varieties of lyutika that include yogurt, sirene (white cheese), hardboiled eggs, or chunks of cooked chicken breasts. See also List of salads Bulgarian cuisine Salads Condiments
https://en.wikipedia.org/wiki/Whiteboard%20animation
Whiteboard animation is the process of which an author physically draws and records an illustrated story using a whiteboard, or whiteboard-like surface, and marker pens. The animations frequently are aided with narration by script. The authors commonly use time-lapsed drawing and stop motion animation to liven hand-drawn illustrations, with YouTube used as a common platform. It is also used in television and internet advertisements to communicate with consumers in a personal way. The earliest videos made using Whiteboard Animation were published in 2009 on YouTube, used mostly for experimental purposes until developing into a storytelling device, focusing mostly on narratives and educational explanations. Description "Whiteboard animation" refers to a specific type of presentation that uses the process of creating a series of drawn pictures on a whiteboard that are recorded in sequence and then played back to create an animated presentation. The actual effect of whiteboard animation is time-lapse, or stop-motion. The actual sequential frame by frame animation is rarely used but has been incorporated. Other terms are "video scribing" and "animated doodling". These video animation styles are now seen in many variations and have taken a turn into many other animation styles. With the introduction of software to create whiteboard animations, the process has many different manifestations of varying quality. Those who use whiteboard animation are typically businesses and educators. Process The whiteboard animation production procedure begins with creating a topic. Once the topic is chosen, scriptwriting begins. After the content is created, it is time to create rough drafts of animations. These assist to set up the inventive bearing and timing for the movement. The rest of the process is as follows: Compose the content Record the voiceover Make starting animations Organize the animations Make Guides Record the video Match up sound and video Include music Exp
https://en.wikipedia.org/wiki/Heat%20capacities%20of%20the%20elements%20%28data%20page%29
Specific heat capacity Notes All values refer to 25 °C and to the thermodynamically stable standard state at that temperature unless noted. Values from CRC refer to "100 kPa (1 bar or 0.987 standard atmospheres)". Lange indirectly defines the values to be at a standard state pressure of "1 atm (101325 Pa)", although citing the same NBS and JANAF sources among others. It is assumed this inexactly refers to "ambient pressure".
https://en.wikipedia.org/wiki/KDM3A
Lysine demethylase 3A is a protein that in humans is encoded by the KDM3A gene. Function This gene encodes a zinc finger protein that contains a jumonji C (JmjC) domain and may play a role in hormone-dependent transcriptional activation. Alternative splicing results in multiple transcript variants. KDM3A catalyzes the demethylation of H3K9me1 and H3K9me2 residues. Its function is dependent on the presence of cofactors Fe(II) and α-Ketoglutarate.
https://en.wikipedia.org/wiki/Cancelling%20out
Cancelling out is a mathematical process used for removing subexpressions from a mathematical expression, when this removal does not change the meaning or the value of the expression because the subexpressions have equal and opposing effects. For example, a fraction is put in lowest terms by cancelling out the common factors of the numerator and the denominator. As another example, if a×b=a×c, then the multiplicative term a can be canceled out if a≠0, resulting in the equivalent expression b=c; this is equivalent to dividing through by a. Cancelling If the subexpressions are not identical, then it may still be possible to cancel them out partly. For example, in the simple equation 3 + 2y = 8y, both sides actually contain 2y (because 8y is the same as 2y + 6y). Therefore, the 2y on both sides can be cancelled out, leaving 3 = 6y, or y = 0.5. This is equivalent to subtracting 2y from both sides. At times, cancelling out can introduce limited changes or extra solutions to an equation. For example, given the inequality ab ≥ 3b, it looks like the b on both sides can be cancelled out to give a ≥ 3 as the solution. But cancelling 'naively' like this, will mean we don't get all the solutions (sets of (a, b) satisfying the inequality). This is because if b were a negative number then dividing by a negative would change the ≥ relationship into a ≤ relationship. For example, although 2 is more than 1, –2 is less than –1. Also if b were zero then zero times anything is zero and cancelling out would mean dividing by zero in that case which cannot be done. So in fact, while cancelling works, cancelling out correctly will lead us to three sets of solutions, not just one we thought we had. It will also tell us that our 'naive' solution is only a solution in some cases, not all cases: If b > 0: we can cancel out to get a ≥ 3. If b < 0: then cancelling out gives a ≤ 3 instead, because we would have to reverse the relationship in this case. If b is exactly zero: then the equa
https://en.wikipedia.org/wiki/Privatization%20of%20public%20toilets
Privatization of public toilets is an ongoing process in the United States and other countries. Police (e.g. in Los Angeles) have sometimes supported their privatization, claiming that public toilets are "crime scenes" that attract illegal activity. A criticism of toilet privatization is that it results in the denial of a basic service to the urban poor. In southern California in the 1980s, authorities consciously reduced the number of public toilets to make certain areas less attractive to "undesirables". In some cases, partial privatization of the toilet system takes place in the form of vendors supplying the service in exchange for advertising rights. Mayor of New York City Michael Bloomberg described such a deal as a "unique opportunity to...creat[e] a vibrant and aesthetically pleasing streetscape…without the burden of public investment." John Stossel points out that private property may be better taken care of than public property: "Think about shared public property, like public toilets. They're often gross...Compare dirty public toilets to privately run toilets. They're common in Europe, and cleaner, because their owners – selfishly seeking a profit – work at keeping them clean." See also Pay toilet
https://en.wikipedia.org/wiki/List%20of%20Samoan%20plant%20common%20names
Below are some Samoan plant names in alphabetical order in the Samoan language and their corresponding descriptions in English. Many are used in traditional medicines in the Samoa Islands comprising Samoa and American Samoa. See also List of protected areas of Samoa National Park of American Samoa Central Savai'i Rainforest, largest continuous patch of rainforest in Polynesia List of birds of Samoa List of mammals of Samoa IUCN Red List of Threatened Species Domesticated plants and animals of Austronesia
https://en.wikipedia.org/wiki/Sorcerian
is a 1987 action role-playing game developed by Nihon Falcom as the fifth installment in the Dragon Slayer line of games. Originally released for the PC-8801 Personal Computer, it has since been released on a wide variety of platforms. Gameplay Sorcerian is a side-scrolling action-RPG. The player can create up to ten characters, from whom up to four members can be present in a party at the same time. Each character is highly customizable, with four different classes/races (fighter, wizard, elf, and dwarf) and over 60 possible jobs/occupations (ranging from clown to exorcist) available for them to perform; each has its own strengths and weaknesses, affecting the seven primary attributes (strength, intelligence, protection, magic resistance, vitality, dexterity, and karma) in different ways, as well as different equipment limitations. The player can choose from fifteen different scenarios, or quests, to play through in the order of their choice. The party must battle enemies and perform tasks within the given levels to clear each scenario, before moving onto another scenario of their choice. The player controls the entire party at the same time, with all four members running in a line, jumping in sequence, and attacking in unison. The party members follow behind in a manner similar to the Options in the arcade shooter Gradius (1985). Sorcerian also employs class-based puzzles, such as using a high-strength character to force open doors. All the characters have a default starting age of 16. Each time a player begins a new scenario, a year passes by, while additional time passes by in towns as a character goes through training or enchants items. The characters age at different rates depending on their race, with humans reaching old age at 60, dwarves at 100, and elves at 200. Upon reaching old age, for every year that passes, a character can die permanently at a random time. There is also an "Advance Time" to speed up the flow of time. Another new feature of Sorceria
https://en.wikipedia.org/wiki/Hyperboloid%20structure
Hyperboloid structures are architectural structures designed using a hyperboloid in one sheet. Often these are tall structures, such as towers, where the hyperboloid geometry's structural strength is used to support an object high above the ground. Hyperboloid geometry is often used for decorative effect as well as structural economy. The first hyperboloid structures were built by Russian engineer Vladimir Shukhov (1853–1939), including the Shukhov Tower in Polibino, Dankovsky District, Lipetsk Oblast, Russia. Properties Hyperbolic structures have a negative Gaussian curvature, meaning they curve inward rather than curving outward or being straight. As doubly ruled surfaces, they can be made with a lattice of straight beams, hence are easier to build than curved surfaces that do not have a ruling and must instead be built with curved beams. Hyperboloid structures are superior in stability against outside forces compared with "straight" buildings, but have shapes often creating large amounts of unusable volume (low space efficiency). Hence they are more commonly used in purpose-driven structures, such as water towers (to support a large mass), cooling towers, and aesthetic features. A hyperbolic structure is beneficial for cooling towers. At the bottom, the widening of the tower provides a large area for installation of fill to promote thin film evaporative cooling of the circulated water. As the water first evaporates and rises, the narrowing effect helps accelerate the laminar flow, and then as it widens out, contact between the heated air and atmospheric air supports turbulent mixing. Work of Shukhov In the 1880s, Shukhov began to work on the problem of the design of roof systems to use a minimum of materials, time and labor. His calculations were most likely derived from mathematician Pafnuty Chebyshev's work on the theory of best approximations of functions. Shukhov's mathematical explorations of efficient roof structures led to his invention of a new syst
https://en.wikipedia.org/wiki/High-%20and%20low-level
High-level and low-level, as technical terms, are used to classify, describe and point to specific goals of a systematic operation; and are applied in a wide range of contexts, such as, for instance, in domains as widely varied as computer science and business administration. High-level describe those operations that are more abstract and general in nature; wherein the overall goals and systemic features are typically more concerned with the wider, macro system as a whole. Low-level describes more specific individual components of a systematic operation, focusing on the details of rudimentary micro functions rather than macro, complex processes. Low-level classification is typically more concerned with individual components within the system and how they operate. Features which emerge only at a high level of description are known as epiphenomena. Differences Due to the nature of complex systems, the high-level description will often be completely different from the low-level one; and, therefore, the (different) descriptions that each deliver are consequent upon the level at which each (differently) direct their study. For example, there are features of an ant colony that are not features of any individual ant; there are features of the human mind that are not known to be descriptive of individual neurons in the brain; there are features of oceans which are not features of any individual water molecule; and there are features of a human personality that are not features of any cell in a body. Uses In computer science, software is typically divided into two types: high-level end-user applications software (such as word processors, databases, video games, etc.), and low-level systems software (such as operating systems, hardware drivers, etc.).As such, high-level applications typically rely on low-level applications to function.In terms of programming, a high-level programming language is one which has a relatively high level of abstraction, and manipulates c
https://en.wikipedia.org/wiki/Jump%20search
In computer science, a jump search or block search refers to a search algorithm for ordered lists. It works by first checking all items Lkm, where and m is the block size, until an item is found that is larger than the search key. To find the exact position of the search key in the list a linear search is performed on the sublist L[(k-1)m, km]. The optimal value of m is , where n is the length of the list L. Because both steps of the algorithm look at, at most, items the algorithm runs in O() time. This is better than a linear search, but worse than a binary search. The advantage over the latter is that a jump search only needs to jump backwards once, while a binary can jump backwards up to log n times. This can be important if jumping backwards takes significantly more time than jumping forward. The algorithm can be modified by performing multiple levels of jump search on the sublists, before finally performing the linear search. For a k-level jump search the optimum block size ml for the l th level (counting from 1) is n(k-l)/k. The modified algorithm will perform k backward jumps and runs in O(kn1/(k+1)) time. Implementation algorithm JumpSearch is input: An ordered list L, its length n and a search key s. output: The position of s in L, or nothing if s is not in L. a ← 0 b ← ⌊√n⌋ while Lmin(b,n)-1 < s do a ← b b ← b + ⌊√n⌋ if a ≥ n then return nothing while La < s do a ← a + 1 if a = min(b, n) return nothing if La = s then return a else return nothing See also Skip list Interpolation search Linear search - runs in O(n) time, only looks forward Binary search - runs in O(log n) time, looks both forward and backward
https://en.wikipedia.org/wiki/Bishop%E2%80%93Phelps%20theorem
In mathematics, the Bishop–Phelps theorem is a theorem about the topological properties of Banach spaces named after Errett Bishop and Robert Phelps, who published its proof in 1961. Statement Importantly, this theorem fails for complex Banach spaces. However, for the special case where is the closed unit ball then this theorem does hold for complex Banach spaces. See also
https://en.wikipedia.org/wiki/Radiant%20intensity
In radiometry, radiant intensity is the radiant flux emitted, reflected, transmitted or received, per unit solid angle, and spectral intensity is the radiant intensity per unit frequency or wavelength, depending on whether the spectrum is taken as a function of frequency or of wavelength. These are directional quantities. The SI unit of radiant intensity is the watt per steradian (), while that of spectral intensity in frequency is the watt per steradian per hertz () and that of spectral intensity in wavelength is the watt per steradian per metre ()—commonly the watt per steradian per nanometre (). Radiant intensity is distinct from irradiance and radiant exitance, which are often called intensity in branches of physics other than radiometry. In radio-frequency engineering, radiant intensity is sometimes called radiation intensity. Mathematical definitions Radiant intensity Radiant intensity, denoted Ie,Ω ("e" for "energetic", to avoid confusion with photometric quantities, and "Ω" to indicate this is a directional quantity), is defined as where ∂ is the partial derivative symbol; Φe is the radiant flux emitted, reflected, transmitted or received; Ω is the solid angle. In general, Ie,Ω is a function of viewing angle θ and potentially azimuth angle. For the special case of a Lambertian surface, Ie,Ω follows the Lambert's cosine law Ie,Ω = I0 cos θ. When calculating the radiant intensity emitted by a source, Ω refers to the solid angle into which the light is emitted. When calculating radiance received by a detector, Ω refers to the solid angle subtended by the source as viewed from that detector. Spectral intensity Spectral intensity in frequency, denoted Ie,Ω,ν, is defined as where ν is the frequency. Spectral intensity in wavelength, denoted Ie,Ω,λ, is defined as where λ is the wavelength. Radio-frequency engineering Radiant intensity is used to characterize the emission of radiation by an antenna: where Ee is the irradiance of the antenna; r is the dist
https://en.wikipedia.org/wiki/Streaming%20vibration%20current
The streaming vibration current (SVI) and the associated streaming vibration potential is an electric signal that arises when an acoustic wave propagates through a porous body in which the pores are filled with fluid. Streaming vibration current was experimentally observed in 1948 by M. Williams. A theoretical model was developed some 30 years later by Dukhin and coworkers. This effect opens another possibility for characterizing the electric properties of the surfaces in porous bodies. See also Interface and colloid science
https://en.wikipedia.org/wiki/Gain%20%28electronics%29
In electronics, gain is a measure of the ability of a two-port circuit (often an amplifier) to increase the power or amplitude of a signal from the input to the output port by adding energy converted from some power supply to the signal. It is usually defined as the mean ratio of the signal amplitude or power at the output port to the amplitude or power at the input port. It is often expressed using the logarithmic decibel (dB) units ("dB gain"). A gain greater than one (greater than zero dB), that is, amplification, is the defining property of an active component or circuit, while a passive circuit will have a gain of less than one. The term gain alone is ambiguous, and can refer to the ratio of output to input voltage (voltage gain), current (current gain) or electric power (power gain). In the field of audio and general purpose amplifiers, especially operational amplifiers, the term usually refers to voltage gain, but in radio frequency amplifiers it usually refers to power gain. Furthermore, the term gain is also applied in systems such as sensors where the input and output have different units; in such cases the gain units must be specified, as in "5 microvolts per photon" for the responsivity of a photosensor. The "gain" of a bipolar transistor normally refers to forward current transfer ratio, either hFE ("beta", the static ratio of Ic divided by Ib at some operating point), or sometimes hfe (the small-signal current gain, the slope of the graph of Ic against Ib at a point). The gain of an electronic device or circuit generally varies with the frequency of the applied signal. Unless otherwise stated, the term refers to the gain for frequencies in the passband, the intended operating frequency range of the equipment. The term gain has a different meaning in antenna design; antenna gain is the ratio of radiation intensity from a directional antenna to (mean radiation intensity from a lossless antenna). Logarithmic units and decibels Power gain Powe
https://en.wikipedia.org/wiki/Ultrapolynomial
In mathematics, an ultrapolynomial is a power series in several variables whose coefficients are bounded in some specific sense. Definition Let and a field (typically or ) equipped with a norm (typically the absolute value). Then a function of the form is called an ultrapolynomial of class , if the coefficients satisfy for all , for some and (resp. for every and some ).
https://en.wikipedia.org/wiki/Alv%C3%A9ole%20Lab
Alvéole is a French company based in Paris and founded in 2010 by Quattrocento, a business accelerator company in the life science field, in collaboration with researchers from the French National Center for Scientific Research with expertise in bioengineering and cell imaging. Alvéole is specialized in the development of devices for controlling microenvironment in vitro. Its first product is Primo, a contactless and maskless photopatterning device allowing researchers to control the topography (via microfabrication) and biochemistry (via micropatterning) of cell microenvironment. Products Alvéole's first product is Primo, a photopatterning device which can be docked on standard inverted microscopes. Primo photopatterning technique is based on LIMAP technology and combines a maskless and contactless photolithography system controlled by a dedicated software (Leonardo) and a specific photo-initiator. This system modulate UV-light illumination through an array of micromirrors (digital micromirror device). The UV light is then projected through the objective of the microscope onto the substrate in order to either perform microfabrication or protein micropatterning. - Microfabrication: The modulated UV light is projected on a photosensitive resist. The cured photoresist can then be used as a mold to deposit PDMS and generate microstructured PDMS chips. - Protein micropatterning: The modulated UV light is projected onto a standard cell culture substrate previously coated with an anti-fouling polymer and reacts with the photo-initiator to locally degrade this coating. Adhesion proteins can then be adsorbed on the illuminated area only, allowing for the creation of proteins micropatterns on which cells can adhere. Applications By micropatterning adhesions proteins with a sub-cellular resolution, Primo enables to control cell adhesion and isolate single cells under highly reproducible conditions. This allows cell biology researchers from various fields – such as mech
https://en.wikipedia.org/wiki/Network%20block%20device
On Linux, network block device (NBD) is a network protocol that can be used to forward a block device (typically a hard disk or partition) from one machine to a second machine. As an example, a local machine can access a hard disk drive that is attached to another computer. The protocol was originally developed for Linux 2.1.55 and released in 1997. In 2011 the protocol was revised, formally documented, and is now developed as a collaborative open standard. There are several interoperable clients and servers. There are Linux-compatible NBD implementations for FreeBSD and other operating systems. The term 'network block device' is sometimes also used generically. Technically, a network block device is realized by three components: the server part, the client part, and the network between them. On the client machine, on which is the device node, a kernel driver controls the device. Whenever a program tries to access the device, the kernel driver forwards the request (if the client part is not fully implemented in the kernel it can be done with help of a userspace program) to the server machine, on which the data resides physically. On the server machine, requests from the client are handled by a userspace program. Network block device servers are typically implemented as a userspace program running on a general-purpose computer. All of the function specific to network block device servers can reside in a userspace process because the process communicates with the client via conventional sockets and accesses the storage via a conventional file system interface. The network block device client module is available on Unix-like operating systems, including Linux and Bitrig. Since the server is a userspace program, it can potentially run on every Unix-like platform; for example, NBD's server part has been ported to Solaris. Alternative protocols iSCSI: The "target-utils" iscsi package on many Linux distributions. NVMe-oF: an equivalent mechanism, exposing b
https://en.wikipedia.org/wiki/Custom%20firmware
Custom firmware, also known as aftermarket firmware, is an unofficial new or modified version of firmware created by third parties on devices such as video game consoles, mobile phones, and various embedded device types to provide new features or to unlock hidden functionality. In the video game console community, the term is often written as custom firmware or simply CFW, referring to an altered version of the original system software (also known as the official firmware or simply OFW) inside a video game console such as the PlayStation Portable, PlayStation 3, PlayStation Vita/PlayStation TV, PlayStation 4, Nintendo 3DS and Nintendo Switch. Installing custom firmware on some devices requires bootloader unlocking. Video game consoles Custom firmware often allow homebrew applications or ROM image backups to run directly within the game console, unlike official firmware, which usually only allow signed or retailed copies of software to run. Because custom firmware is often associated with software piracy, console manufacturers such as Nintendo and Sony have put significant effort into blocking custom firmware and other third party devices and content from their game consoles. PlayStation Portable, PlayStation 3 and PlayStation Vita/PlayStation TV Custom firmware is commonly seen in the PlayStation Portable handhelds released by Sony. Notable custom firmware include M33 by Dark_AleX as well as those made by others such as the 5.50GEN series, Minimum Edition (ME/LME) and PRO. Custom firmware is also seen in the PlayStation 3 console. Only early "Fat" and Slim (CECH-20xx until early CECH-25xx) models are able to run custom firmware. Slim (late CECH-25xx and CECH-30xx) and Super Slim models can only run HEN (Homebrew Enabler), which has functionality similar to a custom firmware. There is also ODE (Optical Drive Emulator), HAN (etHANol) and HFW (Hybrid Firmware) for the PS3. The PlayStation Vita/PlayStation TV has eCFW, meaning custom firmware for PSP running in th
https://en.wikipedia.org/wiki/North%20Atlantic%20oscillation
The North Atlantic Oscillation (NAO) is a weather phenomenon over the North Atlantic Ocean of fluctuations in the difference of atmospheric pressure at sea level (SLP) between the Icelandic Low and the Azores High. Through fluctuations in the strength of the Icelandic Low and the Azores High, it controls the strength and direction of westerly winds and location of storm tracks across the North Atlantic. The NAO was discovered through several studies in the late 19th and early 20th centuries. Unlike the El Niño–Southern Oscillation phenomenon in the Pacific Ocean, the NAO is a largely atmospheric mode. It is one of the most important manifestations of climate fluctuations in the North Atlantic and surrounding humid climates. The North Atlantic Oscillation is closely related to the Arctic oscillation (AO) (or Northern Annular Mode (NAM)), but should not be confused with the Atlantic multidecadal oscillation (AMO). Definition The NAO has multiple possible definitions. The easiest to understand are those based on measuring the seasonal average air pressure difference between stations, such as: Lisbon and Stykkishólmur/Reykjavík Ponta Delgada, Azores and Stykkishólmur/Reykjavík Azores (1865–2002), Gibraltar (1821–2007), and Reykjavík These definitions all have in common the same northern point (because this is the only station in the region with a long record) in Iceland; and various southern points. All are attempting to capture the same pattern of variation, by choosing stations in the "eye" of the two stable pressure areas, the Azores High and the Icelandic Low (shown in the graphic). A more complex definition, only possible with more complete modern records generated by numerical weather prediction, is based on the principal empirical orthogonal function (EOF) of surface pressure. This definition has a high degree of correlation with the station-based definition. This then leads onto a debate as to whether the NAO is distinct from the AO/NAM, and if not, whi
https://en.wikipedia.org/wiki/Critical%20resolved%20shear%20stress
In materials science, critical resolved shear stress (CRSS) is the component of shear stress, resolved in the direction of slip, necessary to initiate slip in a grain. Resolved shear stress (RSS) is the shear component of an applied tensile or compressive stress resolved along a slip plane that is other than perpendicular or parallel to the stress axis. The RSS is related to the applied stress by a geometrical factor, , typically the Schmid factor: where is the magnitude of the applied tensile stress, is the angle between the normal of the slip plane and the direction of the applied force, and is the angle between the slip direction and the direction of the applied force. The Schmid factor is most applicable to FCC single-crystal metals, but for polycrystal metals the Taylor factor has been shown to be more accurate. The CRSS is the value of resolved shear stress at which yielding of the grain occurs, marking the onset of plastic deformation. CRSS, therefore, is a material property and is not dependent on the applied load or grain orientation. The CRSS is related to the observed yield strength of the material by the maximum value of the Schmid factor: CRSS is a constant for crystal families. Hexagonal close-packed crystals, for example, have three main families - basal, prismatic, and pyramidal - with different values for the critical resolved shear stress. Slip systems and resolved shear stress In crystalline metals, slip occurs in specific directions on crystallographic planes, and each combination of slip direction and slip plane will have its own Schmid factor. As an example, for a face-centered cubic (FCC) system the primary slip plane is {111} and primary slip directions exist within the <110> permutation families. The Schmid Factor for an axial applied stress in the direction, along the primary slip plane of , with the critical applied shear stress acting in the direction can be calculated by quickly determining if any of the dot product between th
https://en.wikipedia.org/wiki/Close%20%28system%20call%29
A close system call is a system call used to close a file descriptor by the kernel. For most file systems, a program terminates access to a file in a filesystem using the close system call. This flushes file buffers, updates file metadata, which may include and end-of-file indicator in the data; de-allocates resources associated with the file (including the file descriptor) and updates the system wide table of files in use. Some programming languages maintain a data structure of files opened by their runtime library and may close when the program terminates. This practice is known as resource acquisition is initialization (RAII). Some operating systems will invoke the close on files held by a program if it terminates. Some operating systems will invoke the close syscall as part of an operating system recovery as a result of a system failure. C library POSIX definition The close call is standardized by the POSIX specification int close (int filedes); int fclose (FILE *stream); The function returns zero to indicate the file was closed successfully. If any error occurs, a value of -1 is returned and errno is appropriately set. The errors that can occur include: The argument supplied was not a valid file descriptor The function call was interrupted by a signal An I/O error occurred
https://en.wikipedia.org/wiki/Infraspinous%20fascia
The infraspinatous fascia is a dense fibrous membrane, covering the Infraspinatous muscle and fixed to the circumference of the infraspinatous fossa; it affords attachment, by its deep surface, to some fibers of that muscle. It is intimately attached to the deltoid fascia along the over-lapping border of the Deltoideus.
https://en.wikipedia.org/wiki/Neutron%20activation
Neutron activation is the process in which neutron radiation induces radioactivity in materials, and occurs when atomic nuclei capture free neutrons, becoming heavier and entering excited states. The excited nucleus decays immediately by emitting gamma rays, or particles such as beta particles, alpha particles, fission products, and neutrons (in nuclear fission). Thus, the process of neutron capture, even after any intermediate decay, often results in the formation of an unstable activation product. Such radioactive nuclei can exhibit half-lives ranging from small fractions of a second to many years. Neutron activation is the only common way that a stable material can be induced into becoming intrinsically radioactive. All naturally occurring materials, including air, water, and soil, can be induced (activated) by neutron capture into some amount of radioactivity in varying degrees, as a result of the production of neutron-rich radioisotopes. Some atoms require more than one neutron to become unstable, which makes them harder to activate because the probability of a double or triple capture by a nucleus is below that of single capture. Water, for example, is made up of hydrogen and oxygen. Hydrogen requires a double capture to attain instability as tritium (hydrogen-3), while natural oxygen (oxygen-16) requires three captures to become unstable oxygen-19. Thus water is relatively difficult to activate, as compared to sodium chloride (NaCl), in which both the sodium and chlorine atoms become unstable with a single capture each. These facts were experienced first-hand at the Operation Crossroads atomic test series in 1946. Examples An example of this kind of a nuclear reaction occurs in the production of cobalt-60 within a nuclear reactor: The cobalt-60 then decays by the emission of a beta particle plus gamma rays into nickel-60. This reaction has a half-life of about 5.27 years, and due to the availability of cobalt-59 (100% of its natural abundance), this neutr
https://en.wikipedia.org/wiki/Nautilus%20%28secure%20telephone%29
Nautilus is a program which allows two parties to securely communicate using modems or TCP/IP. It runs from a command line and is available for the Linux and Windows operating systems. The name was based upon Jules Verne's Nautilus and its ability to overcome a Clipper ship as a play on Clipper chip. The program was originally developed by Bill Dorsey, Andy Fingerhut, Paul Rubin, Bill Soley, and David Miller. Nautilus is historically significant in the realm of secure communications because it was one of the first programs which were released as open source to the general public which used strong encryption. It was created as a response to the Clipper chip in which the US government planned to use a key escrow scheme on all products which used the chip. This would allow them to monitor "secure" communications. Once this program and another similar program PGPfone were available on the internet, the proverbial cat was "out of the bag" and it would have been nearly impossible to stop the use of strong encryption for telephone communications. The project had to move their web presence by the end of May 2014 due to the decision of to shut down the developer platform that hosted the project. External links new Nautilus homepage from May 1 2014 on "Can Nautilus Sink Clipper?" Article in Wired, Aug 1995 Secure communication Cryptographic software VoIP software
https://en.wikipedia.org/wiki/Interface%20and%20colloid%20science
Interface and colloid science is an interdisciplinary intersection of branches of chemistry, physics, nanoscience and other fields dealing with colloids, heterogeneous systems consisting of a mechanical mixture of particles between 1 nm and 1000 nm dispersed in a continuous medium. A colloidal solution is a heterogeneous mixture in which the particle size of the substance is intermediate between a true solution and a suspension, i.e. between 1–1000 nm. Smoke from a fire is an example of a colloidal system in which tiny particles of solid float in air. Just like true solutions, colloidal particles are small and cannot be seen by the naked eye. They easily pass through filter paper. But colloidal particles are big enough to be blocked by parchment paper or animal membrane. Interface and colloid science has applications and ramifications in the chemical industry, pharmaceuticals, biotechnology, ceramics, minerals, nanotechnology, and microfluidics, among others. There are many books dedicated to this scientific discipline, and there is a glossary of terms, Nomenclature in Dispersion Science and Technology, published by the US National Institute of Standards and Technology. See also Interface (matter) Electrokinetic phenomena Surface science
https://en.wikipedia.org/wiki/Mallard%20%28documentation%29
Mallard is a markup language for the creation of help pages and user documentation for applications (technical documentation). Mallard 1.0 was released on 23 July 2013. Mallard is an XML language. Similar to DocBook, it defines the logical structure of a document. The documents are then displayed in a help browser, which creates links between the documents. Concepts such as guides and topics provide means for reaching help pages in different ways. At the moment, GNOME applications such as Web, Eye of GNOME, Evince and others use Mallard for documentation purposes. Mallard is the preferred system for the Gnome Documentation. Mallard pages can be viewed in Yelp, a GNOME help browser. Further output formats are planned that can be generated via the command line using the tools that are provided via Gitorious: HTML LaTeX Dot
https://en.wikipedia.org/wiki/Crystal%20growth
A crystal is a solid material whose constituent atoms, molecules, or ions are arranged in an orderly repeating pattern extending in all three spatial dimensions. Crystal growth is a major stage of a crystallization process, and consists of the addition of new atoms, ions, or polymer strings into the characteristic arrangement of the crystalline lattice. The growth typically follows an initial stage of either homogeneous or heterogeneous (surface catalyzed) nucleation, unless a "seed" crystal, purposely added to start the growth, was already present. The action of crystal growth yields a crystalline solid whose atoms or molecules are close packed, with fixed positions in space relative to each other. The crystalline state of matter is characterized by a distinct structural rigidity and very high resistance to deformation (i.e. changes of shape and/or volume). Most crystalline solids have high values both of Young's modulus and of the shear modulus of elasticity. This contrasts with most liquids or fluids, which have a low shear modulus, and typically exhibit the capacity for macroscopic viscous flow. Overview After successful formation of a stable nucleus, a growth stage ensues in which free particles (atoms or molecules) adsorb onto the nucleus and propagate its crystalline structure outwards from the nucleating site. This process is significantly faster than nucleation. The reason for such rapid growth is that real crystals contain dislocations and other defects, which act as a catalyst for the addition of particles to the existing crystalline structure. By contrast, perfect crystals (lacking defects) would grow exceedingly slowly. On the other hand, impurities can act as crystal growth inhibitors and can also modify crystal habit. Nucleation Nucleation can be either homogeneous, without the influence of foreign particles, or heterogeneous, with the influence of foreign particles. Generally, heterogeneous nucleation takes place more quickly since the foreign pa
https://en.wikipedia.org/wiki/Homotopy%20hypothesis
In category theory, a branch of mathematics, Grothendieck's homotopy hypothesis states that the ∞-groupoids are spaces. If we model our ∞-groupoids as Kan complexes, then the homotopy types of the geometric realizations of these sets give models for every homotopy type. It is conjectured that there are many different "equivalent" models for ∞-groupoids all which can be realized as homotopy types. See also Pursuing Stacks N-group (category theory)
https://en.wikipedia.org/wiki/Exapunks
Exapunks is a programming game developed by Zachtronics. It was released into early access on August 9, 2018, and fully released on October 22, 2018. Gameplay Exapunks takes place in an alternate timeline in the year 1997. The fictional world of Exapunks is heavily computerized, and a disease called "the phage" is ravaging the population, turning the bodies of those affected into computerized components. The player takes on the role of Moss, a hacker who breaks into computer systems in order to afford a $700/day drug to slow the progress of his phage affliction. His hacking missions are given to him by a mysterious artificial intelligence known as EMBER-2. Each mission takes place inside a network of interconnected and specialized computer systems. Using programmable software agents called EXAs, the player must accomplish each given task by writing computer code to cleverly manipulate the data stored on the network's systems. The EXAs' instruction set features a few simple opcodes for movement, data processing, network messaging, and interfacing with files and registers. Due to their limited memory capacity, these tasks often require several agents working together in a highly coordinated fashion. EXA units also have the ability to replicate themselves inside the network. Typical missions include retrieving data from secured storage systems, hacking into company databases, and causing an automated teller machine to dispense free cash. Some puzzles also require the player to hack Moss's body to maintain his health. Some puzzles challenge the player to hacker battles, where they must pit their EXAs against an opponent's agents, for example altering a television station's program to broadcast Moss' content instead. Players are generally free to write code for EXAs with as many EXAs as necessary, those are often limited by the number of opcodes that can be used. The player's solution must satisfy 100 different case scenarios iterating on the same problem. When the pl
https://en.wikipedia.org/wiki/Underwater%20acoustic%20positioning%20system
An underwater acoustic positioning system is a system for the tracking and navigation of underwater vehicles or divers by means of acoustic distance and/or direction measurements, and subsequent position triangulation. Underwater acoustic positioning systems are commonly used in a wide variety of underwater work, including oil and gas exploration, ocean sciences, salvage operations, marine archaeology, law enforcement and military activities. Method of operation Figure 1 describes the general method of operation of an acoustic positioning system, this is an example of a long baseline (LBL) positioning system for ROV Baseline station deployment and survey Acoustic positioning systems measure positions relative to a framework of baseline stations, which must be deployed prior to operations. In the case of a long-baseline (LBL) system, a set of three or more baseline transponders are deployed on the sea floor. The location of the baseline transponders either relative to each other or in global coordinates must then be measured precisely. Some systems assist this task with an automated acoustic self-survey, and in other cases GPS is used to establish the position of each baseline transponder as it is deployed or after deployment. Tracking or navigation operations Following the baseline deployment and survey, the acoustic positioning system is ready for operations. In the long baseline example (see figure 1), an interrogator (A) is mounted on the ROV that is to be tracked. The interrogator transmits an acoustic signal that is received by the baseline transponders (B, C, D, E). The reply of the baseline transponders is received again at the ROV. The signal time-of-flight or the corresponding distances A-B, A-C, A-D and A-E are transmitted via the ROV umbilical (F) to the surface, where the ROV position is computed and displayed on a tracking screen. The acoustic distance measurements may be augmented by depth sensor data to obtain better positioning accuracy in
https://en.wikipedia.org/wiki/Enzyme%20induction%20and%20inhibition
Enzyme induction is a process in which a molecule (e.g. a drug) induces (i.e. initiates or enhances) the expression of an enzyme. Enzyme inhibition can refer to the inhibition of the expression of the enzyme by another molecule interference at the enzyme-level, basically with how the enzyme works. This can be competitive inhibition, uncompetitive inhibition, non-competitive inhibition or partially competitive inhibition. If the molecule induces enzymes that are responsible for its own metabolism, this is called auto-induction (or auto-inhibition if there is inhibition). These processes are particular forms of gene expression regulation. These terms are of particular interest to pharmacology, and more specifically to drug metabolism and drug interactions. They also apply to molecular biology. History In the late 1950s and early 1960s, the French molecular biologists François Jacob and Jacques Monod became the first to explain enzyme induction, in the context of the lac operon of Escherichia coli. In the absence of lactose, the constitutively expressed lac repressor protein binds to the operator region of the DNA and prevents the transcription of the operon genes. When present, lactose binds to the lac repressor, causing it to separate from the DNA and thereby enabling transcription to occur. Monod and Jacob generated this theory following 15 years of work by them and others (including Joshua Lederberg), partially as an explanation for Monod's observation of diauxie. Previously, Monod had hypothesized that enzymes could physically adapt themselves to new substrates; a series of experiments by him, Jacob, and Arthur Pardee eventually demonstrated this to be incorrect and led them to the modern theory, for which he and Jacob shared the 1965 Nobel Prize in Physiology or Medicine (together with André Lwoff). Aryl hydrocarbon receptor Potency Index inducer or just inducer predictably induce metabolism via a given pathway and are commonly used in prospective clini
https://en.wikipedia.org/wiki/Dodecyl%20gallate
Dodecyl gallate, or lauryl gallate, is the ester of dodecanol and gallic acid. As a food additive it is used under the E number E312 as an antioxidant and preservative.
https://en.wikipedia.org/wiki/Taekjip%20Ha
Taekjip Ha (born February 20, 1968, Seoul, South Korea) is a South Korean-born American biophysicist who is currently a Bloomberg Distinguished Professor of Biophysics and Biomedical Engineering at Johns Hopkins University. He was previously the Gutgsell Professor of Physics, at University of Illinois at Urbana-Champaign where he was the principal investigator of Single Molecule Nanometry group. He is also a Howard Hughes Medical Institute investigator. Biography He received a B.S. degree in physics at Seoul National University in 1990, and joined the physics department at University of California, Berkeley where he began to study atomic physics in the lab of Raymond Jeanloz in Berkeley's geophysics department. He worked on a project to place nitrogen and carbon under very high pressures, with the goal to create a material harder than diamonds. During this time, he had to take a temporary leave of absence from Berkeley to South Korea for a year to fulfill South Korea's military service requirements. Upon his return, Ha changed his research interests and joined the lab of Daniel Chemla, a prominent scientist known for his studies of quantum optics of semiconductors. Soon after joining Chemla's group, Ha began working closely with scientist Shimon Weiss to build a near-field scanning optical microscope, a machine equipped with a small aperture and a short-pulse laser able to measure a material's properties with high time and spatial resolution. He subsequently received both his M.A. and Ph.D. at Berkeley and completed postdoctoral research at Lawrence Berkeley National Laboratory and Stanford University with advisor Steven Chu. He was appointed to the faculty of the University of Illinois in 2000 as assistant professor in the Department of Physics and Center for Biophysics and Computational Biology. In July 2015, it was announced that Ha would move to Johns Hopkins University as a Bloomberg Distinguished Professor. The Bloomberg Distinguished Professorship program w
https://en.wikipedia.org/wiki/Finite%20model%20property
In mathematical logic, a logic L has the finite model property (fmp for short) if any non-theorem of L is falsified by some finite model of L. Another way of putting this is to say that L has the fmp if for every formula A of L, A is an L-theorem if and only if A is a theorem of the theory of finite models of L. If L is finitely axiomatizable (and has a recursive set of inference rules) and has the fmp, then it is decidable. However, the result does not hold if L is merely recursively axiomatizable. Even if there are only finitely many finite models to choose from (up to isomorphism) there is still the problem of checking whether the underlying frames of such models validate the logic, and this may not be decidable when the logic is not finitely axiomatizable, even when it is recursively axiomatizable. (Note that a logic is recursively enumerable if and only if it is recursively axiomatizable, a result known as Craig's theorem.) Example A first-order formula with one universal quantification has the fmp. A first-order formula without function symbols, where all existential quantifications appear first in the formula, also has the fmp. See also Kripke semantics
https://en.wikipedia.org/wiki/Wireless%20identification%20and%20sensing%20platform
A wireless identification and sensing platform (WISP) is an RFID (radio-frequency identification) device that supports sensing and computing: a microcontroller powered by radio-frequency energy. That is, like a passive RFID tag, WISP is powered and read by a standard off-the-shelf RFID reader, harvesting the power it uses from the reader's emitted radio signals. To an RFID reader, a WISP is just a normal EPC gen1 or gen2 tag; but inside the WISP, the harvested energy is operating a 16-bit general purpose microcontroller. The microcontroller can perform a variety of computing tasks, including sampling sensors, and reporting that sensor data back to the RFID reader. WISPs have been built with light sensors, temperature sensors, and strain gauges. Some contain accelerometers. WISPs can write to flash and perform cryptographic computations. The WISP was originally developed by Intel Research Seattle, but after their closure development work has continued at the Sensor Systems Laboratory at the University of Washington in Seattle. Implementation The WISP consists of a board with power harvesting circuitry, demodulator, modulator, microcontroller, external sensors, and other components such as EEPROM and LED. Applications WISPs have been used for light level measurement, acceleration sensing, cold chain monitoring (passive data logging), and cryptography and security applications. See also Indian Institute of Remote Sensing Intel Research Lablets Remote sensing in mobile telecommunications NODE platform Quality control system (QCS) for web and papers SWARM Wireless sensor network nodes
https://en.wikipedia.org/wiki/Oenophilia
Oenophilia ( ; Greek) is a love (philia) of wine (oinos). In the strictest sense, oenophilia describes a disciplined devotion to wine, accompanying strict traditions of consumption and appreciation. In a general sense however, oenophilia simply refers to the enjoyment of wine, often by laymen. Oenophiles are also known as wine aficionados or connoisseurs. They are people who appreciate or collect wine, particularly grape wines from certain regions, varietal types, or methods of manufacture. While most oenophiles are hobbyists, some may also be professionals like vintners, sommeliers, wine merchants, or one who tastes and grades wines for a living. According to the Oxford English Dictionary, the earliest occurrence of the word oenophile was in 1865 in Culture of the Vine and Wine Making, an English translation of a French book by Jules Guyot. The word oenophilia was initially primarily used in contexts of excessive drinking, and in its earliest occurrence in 1908, spelled oinophilia. It became common in the wine lexicon in 1977 when Shirley Copperman used it for her new bring-your-own-wine restaurant she and her husband dubbed "Oenophilia", located on the upper West Side of Manhattan. A reviewer in a local paper, The Westsider, wrote about the debut: "If the name suggests a rare disease you wouldn't want to catch, a sign in the window informs you that you may already have it. 'Oenophilia', it says, 'is an affliction of the senses characterized by intense cravings for good food and service and vintage wines served in a tasteful, comfortable setting at reasonable prices.'" The reviewer from The Village Voice wrote in 1977: "Oenophilia. No, not a social disease. It's the sensual orientation towards the pleasures of fine food and wine, and the name of a spiffy new bistro for elegant gourmandizing....'" See also Oenology
https://en.wikipedia.org/wiki/Forbes%20Log
The Forbes Log is an instrument for measuring the speed and distance traveled by ships, notably those of the Royal Navy. They were introduced commercially by Elliott Brothers in 1909 and were fitted to all capital ships by 1912, generally to aid the use of the dumaresq as well as battle reporting. History Elliott Brothers licensed the concept and began production in 1909. It was a standard fit to all capital ships by 1912. The company also licensed the device to Anschütz in 1911, in exchange for a license of Anschütz's gyrocompass technology. The Anschütz compass proved less accurate and less reliable than models introduced in 1913 by Sperry Gyroscope, and the Anschütz models produced by Elliot were replaced with Sperrys. Initial tests of the Forbes Log in 1912 demonstrated it was not entirely accurate, which added to a larger set of problems being encountered by the Navy's new gunlaying instruments. These issues were eventually solved, and the Forbes Log remained a standard solution well into World War II, by which time they were found on almost all British and allied ships, including submarines. One of the remote outputs of the Forbes Log was placed in the gunnery control rooms where they were initially used to set the dumaresq and range clocks by their respective operators; in the post World War I-era, the system was often automated, eliminating the need for an operator to do this. Description The measuring system of the Forbes Log consists of an L-shaped tube that projects through the hull with the bottom portion of the L facing forward. The ship's forward motion forces water into the tube where it spins a propeller and then exits through a second pipe facing aft. The propeller is connected to a small generator, whose electrical signal is then sent to the Log itself. This consists of a voltmeter pointer indicating the instantaneous speed, and an odometer-like system recording elapsed distance. The advantage to the Forbes Log is that the signal can be amplif
https://en.wikipedia.org/wiki/Narnia%20%28world%29
Narnia is a fantasy world created by C. S. Lewis as the primary location for his series of seven fantasy novels for children, The Chronicles of Narnia. The world is named after the country of Narnia, where much of the Chronicles takes place. In Narnia, some animals talk, mythical beasts abound, and magic is common. The series tracks the story of Narnia when humans, usually children, enter the Narnian world from Earth. The entire Narnian timeline, from its creation to its end (), ran parallel to 49 Earth-years (), thus on average a year on Earth meant 52.14 time dilation years in Narnia. Inspiration The landscape of Lewis's native Ireland, in particular Ulster, played a large part in the creation of the Narnian landscape. In his essay On Stories, Lewis wrote "I have seen landscapes, notably in the Mourne Mountains and southwards which under a particular light made me feel that at any moment a giant might raise his head over the next ridge". In a letter to his brother, Lewis would later confide "that part of Rostrevor which overlooks Carlingford Lough is my idea of Narnia". Although in adult life Lewis lived in England, he returned to Northern Ireland often and retained fond memories of the Irish scenery, saying "I yearn to see County Down in the snow; one almost expects to see a march of dwarfs dashing past. How I long to break into a world where such things were true." Beginning in 1906, young C.S Lewis (1898–1963) visited the northern Irish seaside near Portrush many times. In later years, Lewis remembered the sounds of the sea, the cliffs rising above it, and the ruined medieval towers of Dunluce Castle which many authors have speculated may have inspired his creation of Cair Paravel. Narnia and Narni, Italy Concerning Narnia and Narni, Roger Lancelyn Green writes about C.S. Lewis and Walter Hooper: Fictional geography Narnia The novels revolve around the fantastical country of Narnia. The nation of Narnia, often and officially the Kingdom of Narnia, was
https://en.wikipedia.org/wiki/Collision%20resistance
In cryptography, collision resistance is a property of cryptographic hash functions: a hash function H is collision-resistant if it is hard to find two inputs that hash to the same output; that is, two inputs a and b where a ≠ b but H(a) = H(b). The pigeonhole principle means that any hash function with more inputs than outputs will necessarily have such collisions; the harder they are to find, the more cryptographically secure the hash function is. The "birthday paradox" places an upper bound on collision resistance: if a hash function produces N bits of output, an attacker who computes only 2N/2 (or ) hash operations on random input is likely to find two matching outputs. If there is an easier method to do this than brute-force attack, it is typically considered a flaw in the hash function. Cryptographic hash functions are usually designed to be collision resistant. However, many hash functions that were once thought to be collision resistant were later broken. MD5 and SHA-1 in particular both have published techniques more efficient than brute force for finding collisions. However, some hash functions have a proof that finding collisions is at least as difficult as some hard mathematical problem (such as integer factorization or discrete logarithm). Those functions are called provably secure. Definition A family of functions {hk : {0, 1}m(k) → {0, 1}l(k)} generated by some algorithm G is a family of collision-resistant hash functions, if |m(k)| > |l(k)| for any k, i.e., hk compresses the input string, and every hk can be computed within polynomial time given k, but for any probabilistic polynomial algorithm A, we have Pr [k ← G(1n), (x1, x2) ← A(k, 1n) s.t. x1 ≠ x2 but hk(x1) = hk(x2)] < negl(n), where negl(·) denotes some negligible function, and n is the security parameter. Weak and strong collision resistance There are two different types of collision resistance. A hash function has weak collision resistance when, given a hashing function H and an x, n
https://en.wikipedia.org/wiki/Maltese%20lira
The lira (, plural: liri, ISO 4217 code: MTL) or pound (until ca. 1986 in English, code ) was the currency of Malta from 1972 until 31 December 2007. One lira was divided into 100 cents, each of 10 mils. After 1986 the lira was abbreviated as Lm, although the original sign continued to be used unofficially. In English the currency was still frequently called the pound even after its official English language name was changed to lira. The euro replaced the lira as the official currency of Malta on 1 January 2008 at the irrevocable fixed exchange rate of €1 per Lm 0.4293, or approximately €2.33 per Lm 1. History Sterling In 1825, an imperial order-in-council introduced sterling coinage to Malta, replacing a system under which various coinages circulated, including that issued in Malta by the Knights of St John. The pound was valued at 12 scudi of the local currency. This exchange rate meant that the smallest Maltese coin, the grano, was worth one third of a farthing (1 scudo = 20 tari = 240 grani). Consequently, -farthing (-penny) coins were issued for use in Malta until 1913, alongside the regular sterling coinage. Amongst the British colonies which used sterling coinage, Malta was unique in issuing a -farthing coin. Between 1914 and 1918, wartime emergency paper money issues were made by the government. Until 1972, the pound was divided into 20 shillings, each of 12 pence with 4 farthings to the penny; from May 1972 it was decimalised into 100 cents, and each cent into 10 mils. Pre-decimal sterling coinage continued to circulate in Malta for nearly a year after it was withdrawn in the UK due to decimalisation as Malta did not decimalise until 1972. Although the Maltese pound was initially equal to its sterling counterpart, this parity did not survive long after the floating of sterling on 22 June 1972. Banknotes Emergency issues between 1914 and 1918 were in denominations of 5 and 10 shillings, £1, £5 and £10. In 1940, notes dated 13 September 1939 in den
https://en.wikipedia.org/wiki/Ishigeales
Ishigeales is an order of brown algae. It includes two families, Ishigeaceae and Petrodermataceae. The genus Diplura is also included, but not placed to family.
https://en.wikipedia.org/wiki/Yamada%20Nishiki
Yamada Nishiki (Japanese: 山田錦) is a short-grain Japanese rice famous for its use in high-quality sake. It is particularly desired by sake brewers for its ability to absorb water and dissolve easily. Yamada Nishiki is the most commonly grown sake rice (sakamai). In 1923, Yamada Nishiki was created by crossing Yamadaho and Tankanwataribune. In 1936, the rice was named Yamada Nishiki. This special rice is mainly grown in Hyogo-ken, its original area, but also Okayama-ken and Fukuoka-ken. See also Japanese rice Japanese cuisine Shōchū
https://en.wikipedia.org/wiki/Beonex%20Communicator
Beonex Communicator is a discontinued open-source Internet suite based on the Mozilla Application Suite (MAS) by Ben Bucksch, a German Mozilla developer. It was intended to have a higher security and privacy level than other commercial products. The Internet suite contains a Web browser, an email and news client, an HTML editor (based on Mozilla Composer) and an IRC client (based on ChatZilla). Beonex Business Services offered the suite for free and provided documentation, easy install routines for third-party plug-ins, and tried to sell support and customer-specific changes on the browser. The main goal was to implement Kerberos, OpenPGP, and LDAP in Beonex, but that was marked as failed in mid-2004. It was discontinued before reaching production release stage. History Mozilla Organization stated that the Mozilla Application Suite was only for developers and testing purposes and was not meant for end users. On 5 January 2001 Beonex was included in the Linux distribution kmLinux version S-0.4, but was removed in version S-0.5 released on 23 March 2001. Beonex 0.8 was released in June 2002 received positive reviews about its speed. Beonex Launcher (BeOL, spoken B-O-L), was an additional upcoming product that never left alpha status; it was a stripped-down version of Beonex Communicator: a Web browser combined with an email client and a chat client. With a few preview releases of version 0.9 in mid-2002, Bucksch showed some new features he wanted to integrate, but before this version gained a stable status, he announced on 2 March 2004 that no new releases were planned until the Mozilla Foundation decided its future policy. In 2005, the Mozilla Foundation officially changed its policies and created the Mozilla Corporation to provide end-user support. Beonex Communicator 0.8.2-stable has several known security issues. Beonex never received much market share. In October 2020, the distributor of Beonex joined the Coalition for App Fairness, which defends the righ
https://en.wikipedia.org/wiki/Harmonic%20number
In mathematics, the -th harmonic number is the sum of the reciprocals of the first natural numbers: Starting from , the sequence of harmonic numbers begins: Harmonic numbers are related to the harmonic mean in that the -th harmonic number is also times the reciprocal of the harmonic mean of the first positive integers. Harmonic numbers have been studied since antiquity and are important in various branches of number theory. They are sometimes loosely termed harmonic series, are closely related to the Riemann zeta function, and appear in the expressions of various special functions. The harmonic numbers roughly approximate the natural logarithm function and thus the associated harmonic series grows without limit, albeit slowly. In 1737, Leonhard Euler used the divergence of the harmonic series to provide a new proof of the infinity of prime numbers. His work was extended into the complex plane by Bernhard Riemann in 1859, leading directly to the celebrated Riemann hypothesis about the distribution of prime numbers. When the value of a large quantity of items has a Zipf's law distribution, the total value of the most-valuable items is proportional to the -th harmonic number. This leads to a variety of surprising conclusions regarding the long tail and the theory of network value. The Bertrand-Chebyshev theorem implies that, except for the case , the harmonic numbers are never integers. Identities involving harmonic numbers By definition, the harmonic numbers satisfy the recurrence relation The harmonic numbers are connected to the Stirling numbers of the first kind by the relation The functions satisfy the property In particular is an integral of the logarithmic function. The harmonic numbers satisfy the series identities and These two results are closely analogous to the corresponding integral results and Identities involving There are several infinite summations involving harmonic numbers and powers of : Calculation An integral representation
https://en.wikipedia.org/wiki/Fylfot
The fylfot or fylfot cross ( ) and its mirror image, the gammadion are a type of swastika associated with medieval Anglo-Saxon culture. It is a cross with perpendicular extensions, usually at 90° or close angles, radiating in the same direction. However at least in modern heraldry texts, such as Friar and Woodcock & Robinson (see ) the fylfot differs somewhat from the archetypal form of the swastika: always upright and typically with truncated limbs, as shown in the figure at right. Etymology The most commonly cited etymology for this is that it comes from the notion common among 19th-century antiquarians, but based on only a single 1500 manuscript, that it was used to fill empty space at the foot of stained-glass windows in medieval churches. This etymology is often cited in modern dictionaries (such as the Collins English Dictionary and Merriam-Webster Online). History The fylfot, together with its sister figures, the gammadion and the swastika, has been found in a great variety of contexts over the centuries. It has occurred in both secular and religious contexts in the British Isles, elsewhere in Europe, in Asia Minor and in Africa. The gammadion is associated more with Byzantium, Rome and Graeco-Roman culture on the one hand, whereas the fylfot is associated more with Celtic and Anglo-Saxon culture on the other. Although the gammadion is very similar to the fylfot in appearance, it is thought to have originated from the conjunction of four capital 'Gammas' (, the third letter of the Greek alphabet) but that the similarity of the symbols is coincidental. Both of these swastika-like crosses may have been indigenous to the British Isles before the Roman invasion. Certainly they were in evidence a thousand years earlier but these may have been largely imports. They were certainly substantially in evidence during the Romano-British period with widespread examples of the duplicated Greek fret motif appearing on mosaics. After the withdrawal of the Romans in the e
https://en.wikipedia.org/wiki/Brian%20Butterworth
Brian Lewis Butterworth FBA (born 3 January 1944) is emeritus professor of cognitive neuropsychology in the Institute of Cognitive Neuroscience at University College London, England. His research has ranged from speech errors and pauses, short-term memory deficits, reading and the dyslexias both in alphabetic scripts and Chinese, and mathematics and dyscalculia. He has also pioneered educational neuroscience, notably in the study of learners with special educational needs (Educational Neuroscience, 2013). He read psychology and philosophy at Oxford University (1963-1966). He completed an MA on Gödel's theorem at Sussex University (1967-1968) under the direction of Peter Nidditch, and a PhD in psycholinguistics at UCL supervised by Frieda Goldman-Eisler, the first professor of psycholinguistics in the UK. Psycholinguistics His early work, following Goldman-Eisler's pioneering studies, explored the functions of pauses in speech. He confirmed that pauses are required for both long-range planning and lexical selection. He went on to show that gestures and glances were also coordinated with planning and with turn-taking in naturally occurring conversations, So, for example, certain gestures—'iconic' gestures— similarly both anticipate lexical selection and resist interruption. Pauses at the ends of sentences both mark the completion of a syntactic plan, and are loci for turn-changing, therefore a speaker who wished to retain the turn would indicate this by turning away or by continuing to gesture. This led to a novel approach to aphasia, and showed that even a fluent jargon-aphasic patient plans in the usual way, with pauses and gestures in the usual locations, and the neologisms created to fill lexical gaps. His study of the pauses in the speech of one neurological patient with short-term memory deficit revealed entirely normal speech. This resolved a current controversy as to whether short-term memory has an input or an output locus. The latter hypothesis implies tha
https://en.wikipedia.org/wiki/Canberra%20Ornithologists%20Group
The Canberra Ornithologists Group (COG) was founded on 15 April 1970 when the ACT branch of the Royal Australasian Ornithologists Union (RAOU) became defunct following drastic reform within the RAOU in the late 1960s which abolished all its branches. It publishes a quarterly journal, Canberra Bird Notes, as well as a monthly newsletter, Gang-gang. Its aims are to: encourage interest in, and develop knowledge of, the birds of the Canberra region promote and co-ordinate the study of birds to promote the conservation of native birds and their habitat COG holds monthly meetings in Canberra as well as regular field excursions. The logo of COG is the gang-gang cockatoo.
https://en.wikipedia.org/wiki/National%20Cyber%20Security%20Centre%20%28Ireland%29
The National Cyber Security Centre (NCSC) is a government computer security organisation in Ireland, an operational arm of the Department of the Environment, Climate and Communications. The NCSC was developed in 2013 and formally established by the Irish government in July 2015. It is responsible for Ireland's cyber security, with a primary focus on securing government networks, protecting critical national infrastructure, and assisting businesses and citizens in protecting their own systems. The NCSC incorporates the Computer Security Incident Response Team (CSIRT-IE). The NCSC is headquartered at 29/31 Adelaide Road, Dublin 2. Mandate and organisation The mandate for the NCSC includes; activities to reduce the vulnerability of critical systems and networks within the state to incidents and cyber-attacks; effective response when such attacks occur; responsibility for the protection of critical information infrastructure; establishing and maintaining cooperative relationships with national and international partners. Threats identified to Ireland's critical infrastructure and government networks include: lone individuals, activist groups, criminal groups, terrorist groups, and nation states seeking to gather intelligence or to damage or degrade infrastructure. Incidents arising through extreme weather, human error and hardware or software failure also pose significant risks to individuals, businesses and public administration. Work relating to the National Cyber Security Centre, and any records associated with the security of ICT systems in the state and outside it, are exempt from being disclosed under freedom of information (FOI). Richard Browne was appointed as the NCSC's director in January 2022, having served as acting director for the previous 18 months. Computer Security Incident Response Team (CSIRT-IE) The Computer Security Incident Response Team (CSIRT-IE) was established in late 2011 (prior to the official formation of the NCSC) within the Depa
https://en.wikipedia.org/wiki/K2-296b
K2-296b (more commonly referred to as EPIC 201238110 b) is a planet discovered by Heller et al. in 2019. There is another candidate planet in the system called EPIC 201238110 c. Habitability It has been classed as a warm superterran.
https://en.wikipedia.org/wiki/Gothicmed
Gothicmed is a European Union project carried out within the Culture 2000 programme and headed by the Ministry of Culture of the regional government of Valencia (Valencian Community), Spain. The aim of the project is to gain further insight into Gothic architecture in the Mediterranean, to connect researchers working separately in different countries, and to disseminate the values of this chapter in architectural history. The main objectives are the creation of a Transnational Cooperation Network of Mediterranean Gothic architecture through travelling exhibitions, the creation of scale models and a website. In particular, the purpose of the site is to facilitate a virtual access to some monuments that are not easy to visit physically or in a very poor state of preservation. In fact, some do not exist anymore but have been rebuilt with computer-aided architectural design of remaining elements. The following institutions have also taken part in this project: Directorate of Byzantine and Postbyzantine Monuments (Greece Ministry of Culture), Arsenale di Palermo, Sicily (Italy), Hipocausto-Gabinete de Prestaçao de Serviços (Portugal), International Tourism Institute (Slovenia) and Instituto Cervantes (Spain). Numerous institutions (museums, universities, institutes) as well as individual researchers have also participated in this project. Mediterranean Gothic The Castel Maniace castle-residence in Sicily, the Bellver on Majorca, and the Castel Nuovo in Naples; in the cathedrals in Nicosia, Palma de Majorca, Girona or Albi; in the churches in Slovenia, Évora or Palermo; in the fourteenth-century palaces in Rhodes, Dubrovnik, Malta or Valencia, certain common stylistic features emerge that link them to this period in the history of architecture that we have come to call the Gothic. In reality, parallel to the re-emergence of classical forms, a coherent Gothic period emerged in the Mediterranean from the early 13th century until well into the 16th century. Picking up t
https://en.wikipedia.org/wiki/Domino%20tiling
In geometry, a domino tiling of a region in the Euclidean plane is a tessellation of the region by dominoes, shapes formed by the union of two unit squares meeting edge-to-edge. Equivalently, it is a perfect matching in the grid graph formed by placing a vertex at the center of each square of the region and connecting two vertices when they correspond to adjacent squares. Height functions For some classes of tilings on a regular grid in two dimensions, it is possible to define a height function associating an integer to the vertices of the grid. For instance, draw a chessboard, fix a node with height 0, then for any node there is a path from to it. On this path define the height of each node (i.e. corners of the squares) to be the height of the previous node plus one if the square on the right of the path from to is black, and minus one otherwise. More details can be found in . Thurston's height condition describes a test for determining whether a simply-connected region, formed as the union of unit squares in the plane, has a domino tiling. He forms an undirected graph that has as its vertices the points (x,y,z) in the three-dimensional integer lattice, where each such point is connected to four neighbors: if x + y is even, then (x,y,z) is connected to (x + 1,y,z + 1), (x − 1,y,z + 1), (x,y + 1,z − 1), and (x,y − 1,z − 1), while if x + y is odd, then (x,y,z) is connected to (x + 1,y,z − 1), (x − 1,y,z − 1), (x,y + 1,z + 1), and (x,y − 1,z + 1). The boundary of the region, viewed as a sequence of integer points in the (x,y) plane, lifts uniquely (once a starting height is chosen) to a path in this three-dimensional graph. A necessary condition for this region to be tileable is that this path must close up to form a simple closed curve in three dimensions, however, this condition is not sufficient. Using more careful analysis of the boundary path, Thurston gave a criterion for tileability of a region that was sufficient as well as necessary. Counting tilin
https://en.wikipedia.org/wiki/Differential%20outcomes%20effect
The differential outcomes effect (DOE) is a theory in behaviorism, a branch of psychology, that shows that a positive effect on accuracy occurs in discrimination learning between different stimuli when unique rewards are paired with each individual stimulus. The DOE was first demonstrated in 1970 by Milton Trapold on an experiment with rats. Rats were trained to discriminate between a clicker and a tone by pressing the left and right levers. Half of the rats were trained using the differential outcomes procedure (DOP), where the clicker was paired with sucrose and tone with food pellets. The remaining rats were trained with only sucrose or only food pellets. The rats trained with the DOP were significantly more accurate than those trained with only one type of reinforcement (common outcome). Since then it has been established through a myriad of experiments that the DOE exists in most species capable of learning. Definition The DOE not only states that an association between a stimulus and a response is formed as traditional classical conditioning states, but that a simultaneous association is formed between a stimulus and a reinforcer in the subject. If one were to pair a stimulus with a reinforcer, that is known as a differential condition. When this is employed, one can expect a higher accuracy in tests when discriminating between two stimuli, due to this increased amount of information available to the subject than in a non-differential condition. History In 1970 the DOE was discovered by Trapold when testing the reasoning behind the theory. He created an experiment where rats were taught to discriminate between a clicking noise and a tone. He associated the left bar with the clicking noise and the right bar with the tone. The experimental group was given sucrose for one response and food for the other. The control group was randomly given either food or sucrose for each response. The rats in the experimental group were able to discriminate between the two sti
https://en.wikipedia.org/wiki/Task%20Force%2072%20%28model%20boat%20builders%29
Task Force 72 is an international association of Radio controlled model boat builders, all building in the common scale (ratio) of 1:72 (1 inch in 1:72 equals 72 inches or 6 feet in real life). History Task Force 72 originated in Australia in 1994, when a number of individuals building radio controlled models came together to form a voluntary association. The name derives from the military term for a group of warships operating to a common purpose, a task force, and the scale of the ship models being built (1:72). In the years since, the association has grown from a small number of model builders to several hundred currently active and former members located in Australia, the United States, United Kingdom, Canada, New Zealand and several other countries. At this time the largest grouping of members is located within Australia, although it is hoped to grow membership internationally. Annual Regatta The Association holds an annual regatta each year, normally at Wentworth Falls Lake, located in the Blue Mountains, west of Sydney in New South Wales, Australia. The Task Force 72 Annual Regatta is usually held in November or December of each calendar year. The 2018 Annual Regatta will be held on the weekend of Saturday 25 (10AM – 8PM) and Sunday 26 November (10AM – 4PM) at Naracoorte in South Australia. Two major prizes are awarded during the Regatta. The Bravo Zulu Award, named for the Naval flag hoist signifying 'well done', is awarded by a reviewing officer, usually but not always a serving member of the Royal Australian Navy. The Wentworth Shield is awarded to the model judged best by the members of Task Force 72 attending the Regatta. Several minor prizes are usually presented, including: Best Warship; Best Non-warship; The Newbie Award for the best first model by a member; and The Rob Sullivan Engineering Award for the most innovative engineering incorporated into a model.. Task Force 72 hopes that the Association's membership in other countries
https://en.wikipedia.org/wiki/Bistability
In a dynamical system, bistability means the system has two stable equilibrium states. A bistable structure can be resting in either of two states. An example of a mechanical device which is bistable is a light switch. The switch lever is designed to rest in the "on" or "off" position, but not between the two. Bistable behavior can occur in mechanical linkages, electronic circuits, nonlinear optical systems, chemical reactions, and physiological and biological systems. In a conservative force field, bistability stems from the fact that the potential energy has two local minima, which are the stable equilibrium points. These rest states need not have equal potential energy. By mathematical arguments, a local maximum, an unstable equilibrium point, must lie between the two minima. At rest, a particle will be in one of the minimum equilibrium positions, because that corresponds to the state of lowest energy. The maximum can be visualized as a barrier between them. A system can transition from one state of minimal energy to the other if it is given enough activation energy to penetrate the barrier (compare activation energy and Arrhenius equation for the chemical case). After the barrier has been reached, assuming the system has damping, it will relax into the other minimum state in a time called the relaxation time. Bistability is widely used in digital electronics devices to store binary data. It is the essential characteristic of the flip-flop, a circuit which is a fundamental building block of computers and some types of semiconductor memory. A bistable device can store one bit of binary data, with one state representing a "0" and the other state a "1". It is also used in relaxation oscillators, multivibrators, and the Schmitt trigger. Optical bistability is an attribute of certain optical devices where two resonant transmissions states are possible and stable, dependent on the input. Bistability can also arise in biochemical systems, where it creates digi
https://en.wikipedia.org/wiki/Abiogenesis
In biology, abiogenesis (from Greek ἀ- a- 'not' + βῐ́ος bios 'life' + γένεσις genesis 'origin') or the origin of life is the natural process by which life has arisen from non-living matter, such as simple organic compounds. The prevailing scientific hypothesis is that the transition from non-living to living entities on Earth was not a single event, but a process of increasing complexity involving the formation of a habitable planet, the prebiotic synthesis of organic molecules, molecular self-replication, self-assembly, autocatalysis, and the emergence of cell membranes. Many proposals have been made for different stages of the process. The study of abiogenesis aims to determine how pre-life chemical reactions gave rise to life under conditions strikingly different from those on Earth today. It primarily uses tools from biology and chemistry, with more recent approaches attempting a synthesis of many sciences. Life functions through the specialized chemistry of carbon and water, and builds largely upon four key families of chemicals: lipids for cell membranes, carbohydrates such as sugars, amino acids for protein metabolism, and nucleic acid DNA and RNA for the mechanisms of heredity. Any successful theory of abiogenesis must explain the origins and interactions of these classes of molecules. Many approaches to abiogenesis investigate how self-replicating molecules, or their components, came into existence. Researchers generally think that current life descends from an RNA world, although other self-replicating molecules may have preceded RNA. The classic 1952 Miller–Urey experiment demonstrated that most amino acids, the chemical constituents of proteins, can be synthesized from inorganic compounds under conditions intended to replicate those of the early Earth. External sources of energy may have triggered these reactions, including lightning, radiation, atmospheric entries of micro-meteorites and implosion of bubbles in sea and ocean waves. Other approaches (
https://en.wikipedia.org/wiki/1%3A10%20radio-controlled%20off-road%20buggy
A 1:10 radio-controlled off-road buggy is a 1:10 scale radio-controlled dune buggy designed for off-road racing. These cars are based on their full-scale equivalents that are commonly found in desert racing. The buggies are split into two race categories, two (2WD) and four-wheel drive (4WD). These can easily be distinguished visually by their wheel size at the front. Cars are typically electric powered, but nitro versions do exist but are less common because racing classes exist for electric cars. The class is inexpensive and similar to a number of other classes, and this makes them popular with newcomers. The cars are also known as 1/10 off-road. The class was created by Kyosho as a miniature version of their 1:8 scale buggy and popularized by its archrival Tamiya, the latter after witnessing an off-road race at the Baja Peninsula on a business trip. It became popularized in the United States as a racing class, where they helped to lead the radio-controlled car market in the 1980s before the touring car class suddenly took over for the next decade with many manufacturers abandoning the off-road class as a result. The Deutsche Meisterschaften (in West Germany) and ROAR Nationals (in North America) were amongst the first to host an official national championship a year before the International Federation of Model Auto Racing (IFMAR) hosted their official world championship in 1985. 1984 saw an introduction of 4WD cars that offered better traction thus 2WD car owners found themselves being forced to compete against its all-wheeled counterpart, resulting in the unlimited/modified category being split into its respective drivetrain classes. This division was first adopted by Remotely Operated Auto Racers (ROAR) and Japan Model Racing Car Association (JMRCA) in 1986 to become used in the Worlds in 1987 then became widely used. By the turn of the millennium, the off-road buggy market regained its market space, whilst continuing to compete with the touring car market,
https://en.wikipedia.org/wiki/Riparian%20forest
A riparian forest or riparian woodland is a forested or wooded area of land adjacent to a body of water such as a river, stream, pond, lake, marshland, estuary, canal, sink or reservoir. Etymology The term riparian comes from the Latin word ripa, 'river bank'; technically it only refers to areas adjacent to flowing bodies of water such as rivers, streams, sloughs and estuaries. However, the terms riparian forest and riparian zone have come to include areas adjacent to non-flowing bodies of water such as ponds, lakes, playas and reservoirs. Characteristics Riparian forests are subject to frequent inundation. Riparian forests help control sediment, reduce the damaging effects of flooding and aid in stabilizing stream banks. Riparian zones are transition zones between an upland terrestrial environment and an aquatic environment. Organisms found in this zone are adapted to periodic flooding. Many not only tolerate it, but require it in order to maintain health and complete their lifestyles. Threats Threats to riparian forests: Cleared for agricultural use because of the good soil quality Historically, trees used as wood fuel for steamships, steam locomotives, etc. Urban development (housing, roads, malls, etc.) Grazing Mining Disrupted hydrology, such as dams and levees, which reduces the amount and/or frequency of flooding Invasive species See also Bosque Gallery forest Management of Pacific Northwest riparian forests Riparian zone Tugay Swamp Oak Forests
https://en.wikipedia.org/wiki/Weakly%20contractible
In mathematics, a topological space is said to be weakly contractible if all of its homotopy groups are trivial. Property It follows from Whitehead's Theorem that if a CW-complex is weakly contractible then it is contractible. Example Define to be the inductive limit of the spheres . Then this space is weakly contractible. Since is moreover a CW-complex, it is also contractible. See Contractibility of unit sphere in Hilbert space for more. The Long Line is an example of a space which is weakly contractible, but not contractible. This does not contradict Whitehead theorem since the Long Line does not have the homotopy type of a CW-complex. Another prominent example for this phenomenon is the Warsaw circle.
https://en.wikipedia.org/wiki/Doug%20Stinson
Douglas Robert Stinson (born 1956 in Guelph, Ontario) is a Canadian mathematician and cryptographer, currently a Professor Emeritus at the University of Waterloo. Stinson received his B.Math from the University of Waterloo in 1978, his M.Sc. from Ohio State University in 1980, and his Ph.D. from the University of Waterloo in 1981. He was at the University of Manitoba from 1981 to 1989, and the University of Nebraska-Lincoln from 1990 to 1998. In 2011 he was named as a Fellow of the Royal Society of Canada. Stinson is the author of over 300 research publications as well as the mathematics-based cryptography textbook Cryptography: Theory and Practice (). Selected publications See also List of University of Waterloo people
https://en.wikipedia.org/wiki/Multi-particle%20collision%20dynamics
Multi-particle collision dynamics (MPC), also known as stochastic rotation dynamics (SRD), is a particle-based mesoscale simulation technique for complex fluids which fully incorporates thermal fluctuations and hydrodynamic interactions. Coupling of embedded particles to the coarse-grained solvent is achieved through molecular dynamics. Method of simulation The solvent is modelled as a set of point particles of mass with continuous coordinates and velocities . The simulation consists of streaming and collision steps. During the streaming step, the coordinates of the particles are updated according to where is a chosen simulation time step which is typically much larger than a molecular dynamics time step. After the streaming step, interactions between the solvent particles are modelled in the collision step. The particles are sorted into collision cells with a lateral size . Particle velocities within each cell are updated according to the collision rule where is the centre of mass velocity of the particles in the collision cell and is a rotation matrix. In two dimensions, performs a rotation by an angle or with probability . In three dimensions, the rotation is performed by an angle around a random rotation axis. The same rotation is applied for all particles within a given collision cell, but the direction (axis) of rotation is statistically independent both between all cells and for a given cell in time. If the structure of the collision grid defined by the positions of the collision cells is fixed, Galilean invariance is violated. It is restored with the introduction of a random shift of the collision grid. Explicit expressions for the diffusion coefficient and viscosity derived based on Green-Kubo relations are in excellent agreement with simulations. Simulation parameters The set of parameters for the simulation of the solvent are: solvent particle mass average number of solvent particles per collision box lateral collision box size st
https://en.wikipedia.org/wiki/EulerOS
EulerOS is a commercial Linux distribution developed by Huawei based on Red Hat Enterprise Linux to provide an operating system for server and cloud environments. Its open-source community version is known as openEuler, of which source code was released by Huawei at Gitee on December 31, 2019. OpenEuler became an open-source project operated by OpenAtom Foundation after Huawei donated the source code of openEuler to the foundation on November 9, 2021. KunLun Mission Critical Server EulerOS 2.0, running on the Huawei KunLun Mission Critical Server, was certified to conform to The Open Group's UNIX 03 standard, however the certification expired in September 2022. EulerOS/KunLun allows replacing central processing unit board modules and memory modules without stopping the OS. Hot swapping of CPU and memory is provided by EulerOS. Code shared with HarmonyOS EulerOS shares kernel technology with Huawei's mobile operating system, HarmonyOS. Huawei plans to unify additional components between both OSes.
https://en.wikipedia.org/wiki/Schur%20product%20theorem
In mathematics, particularly in linear algebra, the Schur product theorem states that the Hadamard product of two positive definite matrices is also a positive definite matrix. The result is named after Issai Schur (Schur 1911, p. 14, Theorem VII) (note that Schur signed as J. Schur in Journal für die reine und angewandte Mathematik.) We remark that the converse of the theorem holds in the following sense. If is a symmetric matrix and the Hadamard product is positive definite for all positive definite matrices , then itself is positive definite. Proof Proof using the trace formula For any matrices and , the Hadamard product considered as a bilinear form acts on vectors as where is the matrix trace and is the diagonal matrix having as diagonal entries the elements of . Suppose and are positive definite, and so Hermitian. We can consider their square-roots and , which are also Hermitian, and write Then, for , this is written as for and thus is strictly positive for , which occurs if and only if . This shows that is a positive definite matrix. Proof using Gaussian integration Case of M = N Let be an -dimensional centered Gaussian random variable with covariance . Then the covariance matrix of and is Using Wick's theorem to develop we have Since a covariance matrix is positive definite, this proves that the matrix with elements is a positive definite matrix. General case Let and be -dimensional centered Gaussian random variables with covariances , and independent from each other so that we have for any Then the covariance matrix of and is Using Wick's theorem to develop and also using the independence of and , we have Since a covariance matrix is positive definite, this proves that the matrix with elements is a positive definite matrix. Proof using eigendecomposition Proof of positive semidefiniteness Let and . Then Each is positive semidefinite (but, except in the 1-dimensional case, not posit
https://en.wikipedia.org/wiki/Denis%20Browne%20bar
The Denis Browne bar, also known as the Denis Browne splint or foot abduction orthosis, is a medical device used in the treatment of club foot. The device is named after Sir Denis Browne (1892-1967), an Australian-born surgeon at Great Ormond Street Hospital in London who was considered the father of pediatric surgery in the United Kingdom. Browne first described the device in 1934. The bar may be used as part of the Ponseti method, a series of nonsurgical techniques to address club foot. See also Orthotics
https://en.wikipedia.org/wiki/SDHAF1
Succinate dehydrogenase complex assembly factor 1 (SDHAF1), also known as LYR motif-containing protein 8 (LYRM8), is a protein that in humans is encoded by the SDHAF1, or LYRM8, gene. SDHAF1 is a chaperone protein involved in the assembly of the succinate dehydrogenase (SDH) complex (complex II). Mutations in this gene are associated with SDH-defective infantile leukoencephalopathy and mitochondrial complex II deficiency. Structure SDHAF1 is located on the q arm of chromosome 19 in position 13.12 and has 1 exon. The SDHAF1 gene produces a 12.8 kDa protein composed of 115 amino acids. SDHAF1 is ubiquitously expressed and belongs to the complex I LYR family and SDHAF1 subfamily. As such, SDHAF1 is one of at least eight proteins that has a LYR tripeptide motif, thought to be important for Fe-S metabolism. SDHAF1 also contains an N-terminal mitochondrial targeting sequence that does not get cleaved following import into the mitochondria. The encoded protein is fairly hydrophilic and does not contain a transmembrane domain. Function SDHAF1 is essential for the assembly of the succinate dehydrogenase (SDH) complex (complex II), an enzyme complex that is a component of both the tricarboxylic acid (TCA) cycle and the mitochondrial electron transport chain, and which couples the oxidation of succinate to fumarate with the reduction of ubiquinone (coenzyme Q) to ubiquinol. The succinate dehydrogenase (SDH) complex of the mitochondrial respiratory chain is composed of 4 individual subunits. The protein encoded by the SDHAF1 gene resides in the mitochondria, and is essential for SDH assembly, but does not physically associate with the complex in vivo. Specifically, SDHAF1 mediates and promotes the maturation of the SDHB subunit of the SDH catalytic dimer. The iron-sulfur (Fe-S) protein subunit SDHB is required for functional succinate dehydrogenase. By protecting SDHB from damaging oxidants, SDHAF1 plays a vital role in the assembly and stability of succinate dehydrogenase
https://en.wikipedia.org/wiki/StrongSwan
strongSwan is a multiplatform IPsec implementation. The focus of the project is on authentication mechanisms using X.509 public key certificates and optional storage of private keys and certificates on smartcards through a PKCS#11 interface and on TPM 2.0. Overview The project is maintained by Andreas Steffen who is a professor emeritus for Security in Communications with the University of Applied Sciences in Rapperswil, Switzerland. As a descendant of the FreeS/WAN project, strongSwan continues to be released under the GPL license. It supports certificate revocation lists and the Online Certificate Status Protocol (OCSP). A unique feature is the use of X.509 attribute certificates to implement access control schemes based on group memberships. StrongSwan interoperates with other IPsec implementations, including various Microsoft Windows and macOS VPN clients. The current version of strongSwan fully implements the Internet Key Exchange (IKEv2) protocol defined by RFC 7296. Features strongSwan supports IKEv1 and fully implements IKEv2. IKEv1 and IKEv2 features strongSwan offers plugins, enhancing its functionality. The user can choose among three crypto libraries (legacy [non-US] FreeS/WAN, OpenSSL, and gcrypt). Using the openssl plugin, strongSwan supports Elliptic Curve Cryptography (ECDH groups and ECDSA certificates and signatures) both for IKEv2 and IKEv1, so that interoperability with Microsoft's Suite B implementation on Vista, Win 7, Server 2008, etc. is possible. Automatic assignment of virtual IP addresses to VPN clients from one or several address pools using either the IKEv1 ModeConfig or IKEv2 Configuration payload. The pools are either volatile (i.e. RAM-based) or stored in a SQLite or MySQL database (with configurable lease-times). The ipsec pool command line utility allows the management of IP address pools and configuration attributes like internal DNS and NBNS servers. IKEv2 only features The IKEv2 daemon is inherently multi-threaded (16
https://en.wikipedia.org/wiki/Receptacle%20%28botany%29
In botany, the receptacle refers to vegetative tissues near the end of reproductive stems that are situated below or encase the reproductive organs. Angiosperms In angiosperms, the receptacle or torus (an older term is thalamus, as in Thalamiflorae) is the thickened part of a stem (pedicel) from which the flower organs grow. In some accessory fruits, for example the pome and strawberry, the receptacle gives rise to the edible part of the fruit. The fruit of Rubus species is a cluster of drupelets on top of a conical receptacle. When a raspberry is picked, the receptacle separates from the fruit, but in blackberries, it remains attached to the fruit. In the Daisy family (Compositae or Asteraceae), small individual flowers are arranged on a round or dome-like structure that is also called receptacle. Algae and bryophyta In phycology, receptacles occur at the ends of branches of algae mainly in the brown algae or Heterokontophyta in the Order Fucales. They are specialised structures which contain the reproductive organs called conceptacles. Receptacles also function as a structure that captures food.
https://en.wikipedia.org/wiki/Acetylpropionyl
Acetylpropionyl, also known as acetyl propionyl or 2,3-pentanedione, is an organic compound, specifically a diketone. Uses for acetylpropionyl include as a: Solvent for cellulose acetate, paints, inks, and lacquers Starting material for dyes, pesticides, and drugs Flavor, with an odor described as "buttery, cheesy, sweet, nutty, fruity, creamy, caramel" Food production facilities use acetylpropionyl in foods such as cookies, coffee, cereal, and chocolate. It is also found in nicotine containing liquids for vaping, and in flavored cigarettes. It is often used as a flavoring substitute for diacetyl, but may share similar human pulmonary toxicity. Safety As a flavoring agent, it is an ingredient in some e-liquid products for use with electronic cigarettes to give a buttery or caramel flavor. There is substantial evidence of the pulmonary toxicity of acetylpropionyl in animals. Rats exposed to acetylpropionyl develop both fibrosis and necrosis of the respiratory tract. Mice exposed to acetylpropionyl demonstrate more bronchial constriction in response to methacholine challenge. It is also known to cause genetic changes in animal brains. Acetylpropionyl has been used as a substitute for the toxic flavoring chemical diacetyl. However, in one flavoring manufacturing facility that substituted diacetyl for acetylpropionyl, abnormal lung function values were associated with total time spent in production areas. An investigation by NIOSH in 2009 at a facility that used buttermilk flavoring containing acetylpropionyl demonstrated that workers had higher than average reports of shortness of breath, asthma, and restrictive type spirometry defects. Another investigation by NIOSH in 2013 at a flavoring manufacturer that used acetylpropionyl revealed that those workers who spent the most time working with flavoring chemicals, including acetylpropionyl, were more likely to have abnormal lung function as detected by pulmonary function tests. See also Diacetyl, a similar dike
https://en.wikipedia.org/wiki/Vojta%27s%20conjecture
In mathematics, Vojta's conjecture is a conjecture introduced by about heights of points on algebraic varieties over number fields. The conjecture was motivated by an analogy between diophantine approximation and Nevanlinna theory (value distribution theory) in complex analysis. It implies many other conjectures in Diophantine approximation, Diophantine equations, arithmetic geometry, and mathematical logic. Statement of the conjecture Let be a number field, let be a non-singular algebraic variety, let be an effective divisor on with at worst normal crossings, let be an ample divisor on , and let be a canonical divisor on . Choose Weil height functions and and, for each absolute value on , a local height function . Fix a finite set of absolute values of , and let . Then there is a constant and a non-empty Zariski open set , depending on all of the above choices, such that Examples: Let . Then , so Vojta's conjecture reads for all . Let be a variety with trivial canonical bundle, for example, an abelian variety, a K3 surface or a Calabi-Yau variety. Vojta's conjecture predicts that if is an effective ample normal crossings divisor, then the -integral points on the affine variety are not Zariski dense. For abelian varieties, this was conjectured by Lang and proven by . Let be a variety of general type, i.e., is ample on some non-empty Zariski open subset of . Then taking , Vojta's conjecture predicts that is not Zariski dense in . This last statement for varieties of general type is the Bombieri–Lang conjecture. Generalizations There are generalizations in which is allowed to vary over , and there is an additional term in the upper bound that depends on the discriminant of the field extension . There are generalizations in which the non-archimedean local heights are replaced by truncated local heights, which are local heights in which multiplicities are ignored. These versions of Vojta's conjecture provide natural higher-dimensional analo
https://en.wikipedia.org/wiki/Experts%20Exchange
Experts Exchange (EE) is a website for people in information technology (IT) related jobs to ask each other for tech help, receive instant help via chat, hire freelancers, and browse tech jobs. Controversy has surrounded their policy of providing answers only via paid subscription. History Experts Exchange went live in October 1996. The first question asked was for a "Case sensitive Win31 HTML Editor". Experts Exchange went bankrupt in 2001 after venture capitalists moved the company to San Mateo, CA, and was brought back largely through the efforts of unpaid volunteers. Later, Austin Miller and Randy Redberg took ownership of Experts Exchange, and the company was made profitable again. Experts Exchange claims to have more than 3 million solutions. Its users are mainly young to middle-aged males in the IT field. Paywall In the past, the site employed HTTP cookie and HTTP referer inspection to display content selectively. The page shown employed JavaScript to display answers to humans after some content showing how to become a member. Subsequently, when an internal link was clicked by the user, they were blocked from viewing the answer information until either becoming a paid member or spoofing their browser's User Agent string to that of a search engine crawler such as GoogleBot. In response to these obfuscation techniques, which prevented anonymous users from seeing answer content, a few members of the community wrote articles about how to bypass the obfuscation by spoofing one's web browser referrer using an addon like Smart Referrer and setting the referer as being from Google. Stack Overflow founder Jeff Atwood cited Experts-Exchange's poor reputation and paywall as a motivation for creating Stack Overflow. See also Bulletin board system Chat room Internet forum Virtual community
https://en.wikipedia.org/wiki/CalyxOS
CalyxOS is an operating system for smartphones based on Android with mostly free and open-source software. It is produced by the Calyx Institute as part of its mission to "defend online privacy, security and accessibility." CalyxOS preserves the Android security model, using Android's Verified Boot system of cryptographic signing of the operating system, and running with a locked bootloader, partly thanks to an installer that guides the user through the process of unlocking and then re-locking the bootloader. History The Calyx Institute annual reports state CalyxOS was publicly launched during their 2018–2019 fiscal year. Inspiration included Tails and Qubes OS, and goals were said to be "completely open source", removing proprietary Google tracking, and including apps Tor, Signal and CalyxVPN for increased privacy. CalyxOS supports Google Pixel smartphones Pixel 3 and newer. CalyxOS supports Fairphone 4. In September 2023, CalyxOS announced support for Fairphone 5. In April 2022, CalyxOS announced support for OnePlus 8T, 9, and 9 Pro. However, in May 2022, CalyxOS announced OnePlus builds were pulled because of a bootloader "relock issue". As of July 2022, according to CalyxOS the OnePlus relock issue had not been resolved. Software CalyxOS ships with MicroG as an open-source alternative to the Google Mobile Services, including Mozilla Location Services as an optional replacement to the location services provided by Google, but gives the user the option to disable microG and its location services. Reception In October 2020, Moritz Tremmel reviewed CalyxOS. A month later, Tremmel explained why he preferred CalyxOS over LineageOS. A year later in September 2021, Tremmel further explained how CalyxOS was different from other ROMs because it did not require as much "fiddling". Rahul Nambiampurath, writing for MakeUseOf in March 2021, termed CalyxOS, "[one of the] best [Android] ROMs for privacy ... offers the perfect middle ground between convenience and pri
https://en.wikipedia.org/wiki/Chemoaffinity%20hypothesis
The Chemoaffinity hypothesis states that neurons make connections with their targets based on interactions with specific molecular markers and, therefore, that the initial wiring diagram of an organism is (indirectly) determined by its genotype. The markers are generated during cellular differentiation and aid not only with synaptogenesis, but also act as guidance cues for their respective axon. Sperry's experiments Roger Wolcott Sperry pioneered the inception of the Chemoaffinity Hypothesis following his 1960s experiments on the African Clawed Frog. He removed the eye of a frog and rotated it 180°, Sperry then replaced the eye and the visual nervous system repaired itself. However, the frog now had inverted vision. Initial eye orientation gives that the top of the eye is Dorsal, and the bottom is Ventral. Post-operation, the "top" of the eye is now Ventral, and the bottom is Dorsal. When a food source was above the frog, it extended its tongue downwards; meaning that the Dorsal-Ventral orientation of the eye still remained. In follow up experiments, the eye was detached and rotated 180° and the optic nerve was also cut to see if this would affect the Dorsal-Ventral orientation. The results were identical. Sperry concluded that each individual optic nerve and tectal neuron used some form of chemical marker which dictated their connectivity during development. He reasoned that when the eye had been rotated, each optic fiber and each tectal neuron possessed cytochemical labels that uniquely denoted their neuronal type and position and that optic fibers could utilize these labels to selectively navigate to their matching target cell, hence the visuomotor impairment. See also Neural development
https://en.wikipedia.org/wiki/Dictionnaire%20des%20Antiquit%C3%A9s%20Grecques%20et%20Romaines
{{DISPLAYTITLE:Dictionnaire des Antiquités Grecques et Romaines}} The Dictionnaire des Antiquités Grecques et Romaines d'après les textes et les monuments, contenant l'explication des termes qui se rapportent aux mœurs, aux institutions, à la religion, aux arts, aux sciences, au costume, au mobilier, à la guerre, à la marine, aux métiers, aux monnaies, poids et mesures, etc. etc., et en général à la vie publique et privée des anciens was a large illustrated French-language dictionary of Ancient Greece and Rome edited by Charles Victor Daremberg and Edmond Saglio and published in 10 volumes between 1873 and 1919 by the publisher Hachette Livre in Paris. Individual entries consisted of (sometimes book-length) articles by prominent classical scholars, François Lenormant among them. It aimed to compete directly with the Altertumswissenschaft of German universities, who were the uncontested masters in the field from 1810 onward. In an 1887 review of the first volume of the Dictionnaire for The Classical Review, John E. B. Mayor praised the result, saying "No other nation as yet possesses anything approaching to it in beauty and completeness; it is absolutely necessary to every classical library and to every public library frequented by scholars or artists." The Dictionnaire represented a work of extraordinary volume and was published at a slow pace. It took eleven issuings to finally complete volume 1, which spanned 1,703 pages and only covered through the letter C, in 1886. The first volume included 3,000 illustrations. Each of the eleven parts of the first volume, printed in large quarto form, was sold for five francs. Some thirty years after it was begun, the Dictionnaire had only reached the middle of the alphabet. Today the dictionary has value as a legacy work, amongst the other large dictionaries of antiquity that appeared in Europe around the same time: starting in 1893, the Germans published the monumental Realencyclopädie der Classischen Altertumswissenschaf
https://en.wikipedia.org/wiki/Medial%20pectoral%20nerve
The medial pectoral nerve (also known as the medial anterior thoracic nerve) is (typically) a branch of the medial cord of the brachial plexus and is derived from spinal nerve roots C8-T1. It provides motor innervation to the pectoralis minor muscle, and the lower half (sternal part) of the pectoralis major muscle. It runs along the inferior border of the pectoralis minor muscle. Damage to the medial pectoral nerve can result in inability to elevate the shoulder. Anatomy Origin The medial pectoral nerve usually arises from the medial cord of the brachial plexus; it can however occasionally arise directly from the anterior division of the inferior trunk of the brachial plexus. It is derived from the eighth cervical (C8) and first thoracic (T1) spinal nerve roots. The origin is situated posterior to the axillary artery. Course and relations It passes behind the first part of the axillary artery, curves forward between the axillary artery and vein, and unites in front of the artery with a filament from the lateral nerve. It then enters the deep surface of the pectoralis minor muscle, where it divides into a number of branches, which supply the muscle. Two or three branches pierce the muscle and end in the sternocostal head of the pectoralis major muscle. The medial pectoral nerve pierces both the pectoralis minor and the sternocostal head of the pectoralis major. The lateral pectoral nerve pierces only the clavicular head of the pectoralis major. Clinical relevance The medial pectoral nerve can be used as a donor nerve when reconstructing a damaged brachial plexus, or axillary nerve. See also Lateral pectoral nerve Additional images
https://en.wikipedia.org/wiki/Scale-free%20network
A scale-free network is a network whose degree distribution follows a power law, at least asymptotically. That is, the fraction P(k) of nodes in the network having k connections to other nodes goes for large values of k as where is a parameter whose value is typically in the range (wherein the second moment (scale parameter) of is infinite but the first moment is finite), although occasionally it may lie outside these bounds. The name "scale-free" could be explained by the fact that some moments of the degree distribution are not defined, so that the network does not have a characteristic scale or "size". Many networks have been reported to be scale-free, although statistical analysis has refuted many of these claims and seriously questioned others. Additionally, some have argued that simply knowing that a degree-distribution is fat-tailed is more important than knowing whether a network is scale-free according to statistically rigorous definitions. Preferential attachment and the fitness model have been proposed as mechanisms to explain conjectured power law degree distributions in real networks. Alternative models such as super-linear preferential attachment and second-neighbour preferential attachment may appear to generate transient scale-free networks, but the degree distribution deviates from a power law as networks become very large. History In studies of the networks of citations between scientific papers, Derek de Solla Price showed in 1965 that the number of links to papers—i.e., the number of citations they receive—had a heavy-tailed distribution following a Pareto distribution or power law, and thus that the citation network is scale-free. He did not however use the term "scale-free network", which was not coined until some decades later. In a later paper in 1976, Price also proposed a mechanism to explain the occurrence of power laws in citation networks, which he called "cumulative advantage" but which is today more commonly known under the name
https://en.wikipedia.org/wiki/Elementary%20arithmetic
Elementary arithmetic is a branch of mathematics involving basic numerical operations, namely addition, subtraction, multiplication, and division. Due to its low level of abstraction, broad range of application, and position as the foundation of all mathematics, elementary arithmetic is generally the first critical branch of mathematics to be taught in schools. Digits Symbols called digits are used to represent the value of numbers in a numeral system. The most commonly used digits are the Arabic numerals (0 to 9). The Hindu-Arabic numeral system is the most commonly used numeral system, being a positional notation system used to represent numbers using these digits. Successor function and size In elementary arithmetic, the successor of a natural number (including zero) is the result of adding one to that number, whereas the predecessor of a natural number (excluding zero) is the result obtained by subtracting one from that number. For example, the successor of zero is one and the predecessor of eleven is ten ( and ). Every natural number has a successor, and all natural numbers (except zero) have a predecessor. If one number is greater than () another number, then the latter is less than () the first one. For example, three is less than eight (), and eight is greater than three (). Counting Counting involves assigning a natural number to each object in a set, starting with one for the first object and increasing by one for each subsequent object. The number of objects in the set is the count which is equal to the highest natural number assigned to an object in the set. This count is also known as the cardinality of the set. Counting can also be the process of tallying using tally marks, drawing a mark for each object in a set. In more advanced mathematics, the process of counting can be thought of as constructing a one-to-one correspondence (or bijection), between the elements of a set and the set , where is a natural number, and the size of the set is .
https://en.wikipedia.org/wiki/Electronic%20Journal%20of%20Statistics
The Electronic Journal of Statistics is an open access peer-reviewed scientific journal published by the Institute of Mathematical Statistics and the Bernoulli Society. It covers all aspects of statistics (theoretical, computational, and applied) and the editor-in-chief is Domenico Marinucci. According to the Journal Citation Reports, the journal has a 2013 impact factor of 1.024. By 2017, the impact factor was recorded as 1.529.
https://en.wikipedia.org/wiki/Limit%20ordinal
In set theory, a limit ordinal is an ordinal number that is neither zero nor a successor ordinal. Alternatively, an ordinal λ is a limit ordinal if there is an ordinal less than λ, and whenever β is an ordinal less than λ, then there exists an ordinal γ such that β < γ < λ. Every ordinal number is either zero, or a successor ordinal, or a limit ordinal. For example, the smallest limit ordinal is ω, the smallest ordinal greater than every natural number. This is a limit ordinal because for any smaller ordinal (i.e., for any natural number) n we can find another natural number larger than it (e.g. n+1), but still less than ω. The next-smallest limit ordinal is ω+ω. This will be discussed further in the article. Using the von Neumann definition of ordinals, every ordinal is the well-ordered set of all smaller ordinals. The union of a nonempty set of ordinals that has no greatest element is then always a limit ordinal. Using von Neumann cardinal assignment, every infinite cardinal number is also a limit ordinal. Alternative definitions Various other ways to define limit ordinals are: It is equal to the supremum of all the ordinals below it, but is not zero. (Compare with a successor ordinal: the set of ordinals below it has a maximum, so the supremum is this maximum, the previous ordinal.) It is not zero and has no maximum element. It can be written in the form ωα for α > 0. That is, in the Cantor normal form there is no finite number as last term, and the ordinal is nonzero. It is a limit point of the class of ordinal numbers, with respect to the order topology. (The other ordinals are isolated points.) Some contention exists on whether or not 0 should be classified as a limit ordinal, as it does not have an immediate predecessor; some textbooks include 0 in the class of limit ordinals while others exclude it. Examples Because the class of ordinal numbers is well-ordered, there is a smallest infinite limit ordinal; denoted by ω (omega). The ordinal ω is also th
https://en.wikipedia.org/wiki/Grifola%20frondosa
Grifola frondosa (also known as hen-of-the-woods, in Japanese, ram's head or sheep's head) is a polypore mushroom that grows at the base of trees, particularly old growth oaks or maples. It is typically found in late summer to early autumn. It is native to China, Europe, and North America. Description Like the sulphur shelf mushroom, G. frondosa is a perennial fungus that often grows in the same place for several years in succession. It occurs most prolifically in the northeastern regions of the United States, but has been found as far west as Idaho. G. frondosa grows from an underground tuber-like structure known as a sclerotium, about the size of a potato. The fruiting body, occurring as large as , rarely , is a cluster consisting of multiple grayish-brown caps which are often curled or spoon-shaped, with wavy margins and broad. The undersurface of each cap bears about one to three pores per millimeter, with the tubes rarely deeper than . The milky-white stipe (stalk) has a branchy structure and becomes tough as the mushroom matures. In Japan, the can grow to more than . Identification This is a very distinct mushroom except for its cousin, the black staining mushroom, which is similar in taste but rubbery. Edible species which look similar to Grifola frondosa include Meripilus sumstinei (which stains black), Sparassis spathulata and Laetiporus sulphureus, another edible bracket fungus that is commonly called chicken of the woods or "sulphur shelf." Uses The species is a choice edible mushroom. Maitake has been consumed for centuries in China and Japan where it is one of the major culinary mushrooms. The mushroom is used in many Japanese dishes, such as nabemono. The softer caps must be thoroughly cooked. Research Although under laboratory and preliminary clinical research for many years, particularly for the possible biological effects of its polysaccharides, there are no completed, high-quality clinical studies for Grifola frondosa . See also Medicina
https://en.wikipedia.org/wiki/Orungo%20virus
Orungo virus (ORUV) is an arbovirus of the genus Orbivirus, the subfamily Sedoreovirinae and the family Reoviridae. There are four known subtypes of Orungo virus designated Orungo-1 (ORUV-1), Orungo-2 (ORUV-2), Orungo-3 (ORUV-3), and Orungo-4 (ORUV-4). It was first isolated by the Uganda Virus Research Institute in Entebbe, Uganda by Oyewale Tomori and colleagues. Antibodies to the virus have been found in humans, monkeys, sheep, and cattle.
https://en.wikipedia.org/wiki/Poincar%C3%A9%20group
The Poincaré group, named after Henri Poincaré (1906), was first defined by Hermann Minkowski (1908) as the group of Minkowski spacetime isometries. It is a ten-dimensional non-abelian Lie group that is of importance as a model in our understanding of the most basic fundamentals of physics. Overview A Minkowski spacetime isometry has the property that the interval between events is left invariant. For example, if everything were postponed by two hours, including the two events and the path you took to go from one to the other, then the time interval between the events recorded by a stop-watch you carried with you would be the same. Or if everything were shifted five kilometres to the west, or turned 60 degrees to the right, you would also see no change in the interval. It turns out that the proper length of an object is also unaffected by such a shift. A time or space reversal (a reflection) is also an isometry of this group. In Minkowski space (i.e. ignoring the effects of gravity), there are ten degrees of freedom of the isometries, which may be thought of as translation through time or space (four degrees, one per dimension); reflection through a plane (three degrees, the freedom in orientation of this plane); or a "boost" in any of the three spatial directions (three degrees). Composition of transformations is the operation of the Poincaré group, with proper rotations being produced as the composition of an even number of reflections. In classical physics, the Galilean group is a comparable ten-parameter group that acts on absolute time and space. Instead of boosts, it features shear mappings to relate co-moving frames of reference. Poincaré symmetry Poincaré symmetry is the full symmetry of special relativity. It includes: translations (displacements) in time and space (P), forming the abelian Lie group of translations on space-time; rotations in space, forming the non-abelian Lie group of three-dimensional rotations (J); boosts, transformations conne
https://en.wikipedia.org/wiki/Meromelia
Meromelia is a birth defect characterized by the lacking of a part, but not all, of one or more limbs with the presence of a hand or foot. It results in a shrunken and deformed extremity. Cause Such defects are mainly the results of genetic disorders, but some teratogenic (or environmental) factors have been identified, such as the use of thalidomide from 1957 to 1962 for morning sickness (NVP). Diagnosis Meromelia is a birth defect characterized by lacking part of at least one free limb. Treatment Treatment may include prosthetic limbs, surgery, rehabilitation, or LASIK. Etymology The word meromelia comes from the Greek 'part, partial' + 'limb'. See also Amelia (birth defect) Phocomelia Polymelia Amniotic band syndrome
https://en.wikipedia.org/wiki/RCUDA
rCUDA, which stands for Remote CUDA, is a type of middleware software framework for remote GPU virtualization. Fully compatible with the CUDA application programming interface (API), it allows the allocation of one or more CUDA-enabled GPUs to a single application. Each GPU can be part of a cluster or running inside of a virtual machine. The approach is aimed at improving performance in GPU clusters that are lacking full utilization. GPU virtualization reduces the number of GPUs needed in a cluster, and in turn, leads to a lower cost configuration – less energy, acquisition, and maintenance. The recommended distributed acceleration architecture is a high performance computing cluster with GPUs attached to only a few of the cluster nodes. When a node without a local GPU executes an application needing GPU resources, remote execution of the kernel is supported by data and code transfers between local system memory and remote GPU memory. rCUDA is designed to accommodate this client-server architecture. On one end, clients employ a library of wrappers to the high-level CUDA Runtime API, and on the other end, there is a network listening service that receives requests on a TCP port. Several nodes running different GPU-accelerated applications can concurrently make use of the whole set of accelerators installed in the cluster. The client forwards the request to one of the servers, which accesses the GPU installed in that computer and executes the request in it. Time-multiplexing the GPU, or in other words sharing it, is accomplished by spawning different server processes for each remote GPU execution request. rCUDA v20.07 The rCUDA middleware enables the concurrent usage of CUDA-compatible devices remotely. rCUDA employs either the InfiniBand network or the socket API for the communication between clients and servers. rCUDA can be useful in three different environments: Clusters. To reduce the number of GPUs installed in High Performance Clusters. This leads to ener
https://en.wikipedia.org/wiki/Vibration%20theory%20of%20olfaction
The vibration theory of smell proposes that a molecule's smell character is due to its vibrational frequency in the infrared range. This controversial theory is an alternative to the more widely accepted docking theory of olfaction (formerly termed the shape theory of olfaction), which proposes that a molecule's smell character is due to a range of weak non-covalent interactions between its protein odorant receptor (found in the nasal epithelium), such as electrostatic and Van der Waals interactions as well as H-bonding, dipole attraction, pi-stacking, metal ion, Cation–pi interaction, and hydrophobic effects, in addition to the molecule's conformation. Introduction The current vibration theory has recently been called the "swipe card" model, in contrast with "lock and key" models based on shape theory. As proposed by Luca Turin, the odorant molecule must first fit in the receptor's binding site. Then it must have a vibrational energy mode compatible with the difference in energies between two energy levels on the receptor, so electrons can travel through the molecule via inelastic electron tunneling, triggering the signal transduction pathway. The vibration theory is discussed in a popular but controversial book by Chandler Burr. The odor character is encoded in the ratio of activities of receptors tuned to different vibration frequencies, in the same way that color is encoded in the ratio of activities of cone cell receptors tuned to different frequencies of light. An important difference, though, is that the odorant has to be able to become resident in the receptor for a response to be generated. The time an odorant resides in a receptor depends on how strongly it binds, which in turn determines the strength of the response; the odor intensity is thus governed by a similar mechanism to the "lock and key" model. For a pure vibrational theory, the differing odors of enantiomers, which possess identical vibrations, cannot be explained. However, once the link betwe
https://en.wikipedia.org/wiki/Network%20Access%20License
The Network Access License (NAL) is mandatory for telecommunication equipment that is exported to or sold in China. This license applies to telecommunication equipment that is connected to the public telecommunication network. For receiving the Network Access License, an application has to be submitted at the Ministry of Industry and Information Technology (MIIT) in Beijing. Among others, the Ministry of Industry and Information Technology is responsible for the Chinese regulation and development of the Internet, wireless, broadcasting, communications and production of electronic and information goods, and the promotion of the national knowledge economy. History In 2001, the Chinese authorities published the first three product categories requiring NAL. Since then, about 25 product categories including about 300 different kinds of telecommunication devices have been added to the product catalogue. Furthermore, the NAL products are categorized in basic and high-end equipment. In August 2014, the Ministry of Industry and Information Technology has issued 495 network access licenses for telecom equipment. In 2014, there are only 14 test laboratories that are authorized for the testing of the telecommunication equipment. Most of these test laboratories are specialized on product categories. Application process The application process is a 4-step process and include: Submission of application documents Product tests Factory inspection License issue The length of time required to obtain an NAL varies according to the product for which the license is sought. Based on current regulations, it usually takes 20 days for testing and 60 days for processing an application. Nevertheless, for some products it may take longer. See also Ministry of Industry and Information Technology of the People's Republic of China MIIT Standardization Administration of China SAC Electronic information industry in China Ministries of China
https://en.wikipedia.org/wiki/Algorithms-Aided%20Design
Algorithms-Aided Design (AAD) is the use of specific algorithms-editors to assist in the creation, modification, analysis, or optimization of a design. The algorithms-editors are usually integrated with 3D modeling packages and read several programming languages, both scripted or visual (RhinoScript, Grasshopper, MEL, C#, Python). The Algorithms-Aided Design allows designers to overcome the limitations of traditional CAD software and 3D computer graphics software, reaching a level of complexity which is beyond the human possibility to interact with digital objects. The acronym appears for the first time in the book AAD Algorithms-Aided Design, Parametric Strategies using Grasshopper, published by Arturo Tedeschi in 2014. Further reading Mario Carpo, "The second digital turn: design beyond intelligence", Writing Architecture, 2017, "AD Scripting Cultures: Architectural Design and Programming", John Wiley & Sons, 1 edition 2011, Kostas Terzidis, "Algorithmic Architecture", Routledge, 1 edition 2006, Nicholas Pisca, "YSYT - Maya MEL Basics for Designers", 2009, Arturo Tedeschi, AAD Algorithms-Aided Design, Parametric Strategies using Grasshopper, Le Penseur, Brienza 2014, http://architosh.com/2016/05/inflection-point-disruptions-platforms-and-growth-with-rhino-grasshopper-part-1/
https://en.wikipedia.org/wiki/Sunfleck
Sunflecks are brief increases in solar irradiance that occur in understories of an ecosystem when sunlight is able to directly reach the ground. They are caused by either wind moving branches and/or leaves in the canopy or as the sun moves during the day. Although each sunfleck only last for seconds or minutes at a time, they can be responsible more than 80% of the photons that reach plants in the understory, and up to 35% of carbon fixation. This makes them important sources of energy for plants in the understory of forests. The amount of energy that a sunfleck provides depends on their duration, size and shape and the intensity of photosynthetically active radiation (PAR), which itself depends on the arrangement of vegetation in the canopy and the position of the sun in the sky. The abundance of sunflecks varies greatly both within and between ecosystems, generally the frequency and intensity of sunflecks decreases as tree {i.e., plant or canopy} height and the leaf area index increase. There is no clear distinction between sunflecks and sunpatches, although the latter tend to last for at least an hour and the intensity of PAR reaches the full level of sunlight, whereas the intensity of PAR in sunflecks rarely reaches this. Because the amount of diffuse sunlight reaching the forest floor varies depending on the type of forest, there is no way to quantify an intensity of direct sunlight that qualifies as a sunfleck.
https://en.wikipedia.org/wiki/Seven-dimensional%20space
In mathematics, a sequence of n real numbers can be understood as a location in n-dimensional space. When n = 7, the set of all such locations is called 7-dimensional space. Often such a space is studied as a vector space, without any notion of distance. Seven-dimensional Euclidean space is seven-dimensional space equipped with a Euclidean metric, which is defined by the dot product. More generally, the term may refer to a seven-dimensional vector space over any field, such as a seven-dimensional complex vector space, which has 14 real dimensions. It may also refer to a seven-dimensional manifold such as a 7-sphere, or a variety of other geometric constructions. Seven-dimensional spaces have a number of special properties, many of them related to the octonions. An especially distinctive property is that a cross product can be defined only in three or seven dimensions. This is related to Hurwitz's theorem, which prohibits the existence of algebraic structures like the quaternions and octonions in dimensions other than 2, 4, and 8. The first exotic spheres ever discovered were seven-dimensional. Geometry 7-polytope A polytope in seven dimensions is called a 7-polytope. The most studied are the regular polytopes, of which there are only three in seven dimensions: the 7-simplex, 7-cube, and 7-orthoplex. A wider family are the uniform 7-polytopes, constructed from fundamental symmetry domains of reflection, each domain defined by a Coxeter group. Each uniform polytope is defined by a ringed Coxeter-Dynkin diagram. The 7-demicube is a unique polytope from the D7 family, and 321, 231, and 132 polytopes from the E7 family. 6-sphere The 6-sphere or hypersphere in seven-dimensional Euclidean space is the six-dimensional surface equidistant from a point, e.g. the origin. It has symbol , with formal definition for the 6-sphere with radius r of The volume of the space bounded by this 6-sphere is which is 4.72477 × r7, or 0.0369 of the 7-cube that contains the 6-sphere
https://en.wikipedia.org/wiki/Operation%20Torpedo
Operation Torpedo was a 2011 operation in which the Federal Bureau of Investigation (FBI) compromised three different hidden services hosting child pornography, which would then target anyone who happened to access them using a network investigative technique (NIT). The operation started after Dutch law enforcement compromised a hidden service called Pedoboard, and found it was physically located at a Nebraska web hosting company. The ensuing FBI investigation found that an employee, Aaron McGrath, was operating two child pornography sites at his work and one at his home. After a year of surveillance, the FBI arrested McGrath and took control of his three sites (PedoBoard, PedoBook, TB2) for a two-week period starting in November 2012. During this time the websites were modified to serve up a NIT, which would attempt to unmask visitors by revealing their IP address, operating system and web browser. The NIT was successful in revealing approximately 25 domestic users as well as numerous foreign users. The NIT code was revealed as part of the case USA v Cottom et al. Researchers from University of Nebraska at Kearney and Dakota State University reviewed the NIT code and found that it was an Adobe Flash application that would ping a user's real IP address back to an FBI controlled server, rather than routing their traffic through the Tor network and protecting their identity. It used a technique from Metasploit's "decloaking engine" and only affected users who had not updated their Tor web browser. An investigation by The Daily Dot claimed that the NIT was created by former part-time employee of The Tor Project and Vidalia developer Matthew Edman and was internally known as "Cornhusker". The U.S. Department of Justice noted in December 2015 that besides McGrath, 18 users in the United States had been convicted as a result of the operation. One user caught by the NIT had accessed the site for only nine minutes and had since wiped his computer, yet a month-later polic
https://en.wikipedia.org/wiki/Thrombosis%20prevention
Thrombosis prevention or thromboprophylaxis is medical treatment to prevent the development of thrombosis (blood clots inside blood vessels) in those considered at risk for developing thrombosis. Some people are at a higher risk for the formation of blood clots than others, such as those with cancer undergoing a surgical procedure. Prevention measures or interventions are usually begun after surgery as the associated immobility will increase a person's risk. Blood thinners are used to prevent clots, these blood thinners have different effectiveness and safety profiles. A 2018 systematic review found 20 studies that included 9771 people with cancer. The evidence did not identify any difference between the effects of different blood thinners on death, developing a clot, or bleeding. A 2021 review found that low molecular weight heparin (LMWH) was superior to unfractionated heparin in the initial treatment of venous thromboembolism for people with cancer. There are medication-based interventions and non-medication-based interventions. The risk of developing blood clots can be lowered by life style modifications, the discontinuation of oral contraceptives, and weight loss. In those at high risk both interventions are often used. The treatments to prevent the formation of blood clots is balanced against the risk of bleeding. One of the goals of blood clot prevention is to limit venous stasis as this is a significant risk factor for forming blood clots in the deep veins of the legs. Venous stasis can occur during the long periods of not moving. Thrombosis prevention is also recommended during air travel. Thrombosis prophylaxis is effective in preventing the formation of blood clots, their lodging in the veins, and their developing into thromboemboli that can travel through the circulatory system to cause blockage and subsequent tissue death in other organs. Clarence Crafoord is credited with the first use of thrombosis prophylaxis in the 1930s. Pathophysiology of bloo
https://en.wikipedia.org/wiki/Human%20bonding
Human bonding is the process of development of a close interpersonal relationship between two or more people. It most commonly takes place between family members or friends, but can also develop among groups, such as sporting teams and whenever people spend time together. Bonding is a mutual, interactive process, and is different from simple liking. It is the process of nurturing social connection. Bonding typically refers to the process of attachment that develops between romantic or platonic partners, close friends, or parents and children. This bond is characterised by emotions such as affection and trust. Any two people who spend time together may form a bond. Male bonding refers to the establishment of relationships between men through shared activities. The term female bonding refers to the formation of close personal relationships between women. Cross-sex friendships refers to personal relationships between men and women. Early views In the 4th century BC, the Greek philosopher Plato argued that love directs the bonds of human society. In his Symposium, Eryximachus, one of the narrators in the dialog, states that love goes far beyond simple attraction to human beauty. He states that it occurs throughout the animal and plant kingdoms, as well as throughout the universe. Love directs everything that occurs, in the realm of the gods as well as that of humans (186a–b). Eryximachus reasons that when various opposing elements such as wet and dry are "animated by the proper species of Love, they are in harmony with one another... But when the sort of Love that is crude and impulsive controls the seasons, he brings death and destruction" (188a). Because it is love that guides the relations between these sets of opposites throughout existence, in every case it is the higher form of love that brings harmony and cleaves toward the good, whereas the impulsive vulgar love creates disharmony. Plato concludes that the highest form of love is the greatest. When love "is
https://en.wikipedia.org/wiki/Real-time%20transcription
Real-time transcription is the general term for transcription by court reporters using real-time text technologies to deliver computer text screens within a few seconds of the words being spoken. Specialist software allows participants in court hearings or depositions to make notes in the text and highlight portions for future reference. Real-time transcription is also used in the broadcasting environment where it is more commonly termed "captioning." Career opportunities Real-time reporting is used in a variety of industries, including entertainment, television, the Internet, and law. Specific careers include the following: Judicial reporters use a stenotype to provide instant transcripts on computer screens as a trial or deposition occurs. Communication access real-time translation (CART) reporters assist the hearing-impaired by transcribing spoken words, giving them personal access to the communications they need day to day. Television broadcast captioners use real-time reporting technology to allow hard-of-hearing or deaf people to see what is being said on live television broadcasts such as news, emergency broadcasts, sporting events, awards shows, and other programs. Internet information (or Webcast) reporters provide real-time reporting of sales meetings, press conferences, and other events, while simultaneously transmitting the transcripts to computers worldwide. Other rapid data entry positions. History Before the advent of the stenotype machine, court reporters wrote official trial transcripts by hand using a shorthand system of stenoforms that could later be translated into readable English. It often took eight years of training to learn this manual form of writing at the necessary speed. Walter Heironimus was among the first stenographers to make use of the stenotype machine during his work in the U.S. District Court system in New Jersey in 1935. A "transcript crisis" arose during the later half of the twentieth century due to the increasing
https://en.wikipedia.org/wiki/Blueprint%20%28Plomin%20book%29
Blueprint: How DNA Makes Us Who We Are is a book by behavioral geneticist Robert Plomin, first published in 2018 by the MIT Press and Allen Lane. The book argues that genetic factors, and specifically variations in individuals' DNA, has a large effect on human psychological traits, accounting for approximately half of all variation in such traits. The book also claims that genes play a more important role in people's personalities than does the environment. In Blueprint, Plomin argues that environmental effects on human psychological differences, although they exist, are "...mostly random – unsystematic and unstable – which means that we cannot do much about them." Reviews Science journalist Matt Ridley praised Blueprint as "a hugely important book." Behavior geneticist Kathryn Paige Harden criticized the book for overstating the importance of genes for the development of human traits, writing, "Insisting that DNA matters is scientifically accurate; insisting that it is the only thing that matters is scientifically outlandish." Steven Mithen gave the book a mixed review in the Guardian, in which he wrote, "I am happy to bow to Plomin as a psychologist and a geneticist, but I found his sociology rather lacking, in fact quite baffling." Nathaniel Comfort criticized the book for promoting genetic determinism and "play[ing] fast and loose with the concept of heritability". He concluded that "Ultimately, if unintentionally, Blueprint is a road map for regressive social policy." Journalist David Goodhart reviewed the book more positively, calling it "an important and challenging book that reveals to the general reader what has quietly become a new scientific consensus: psychological traits, including intelligence, are significantly influenced by our genes." Geneticist Barbara Jennings reviewed the book positively, suggesting that those who have criticized it for being "a manifesto for genetic determinism" are "misreading [...] the book".
https://en.wikipedia.org/wiki/Supernatural%20number
In mathematics, the supernatural numbers, sometimes called generalized natural numbers or Steinitz numbers, are a generalization of the natural numbers. They were used by Ernst Steinitz in 1910 as a part of his work on field theory. A supernatural number is a formal product: where runs over all prime numbers, and each is zero, a natural number or infinity. Sometimes is used instead of . If no and there are only a finite number of non-zero then we recover the positive integers. Slightly less intuitively, if all are , we get zero. Supernatural numbers extend beyond natural numbers by allowing the possibility of infinitely many prime factors, and by allowing any given prime to divide "infinitely often," by taking that prime's corresponding exponent to be the symbol . There is no natural way to add supernatural numbers, but they can be multiplied, with . Similarly, the notion of divisibility extends to the supernaturals with if for all . The notion of the least common multiple and greatest common divisor can also be generalized for supernatural numbers, by defining and . With these definitions, the gcd or lcm of infinitely many natural numbers (or supernatural numbers) is a supernatural number. We can also extend the usual -adic order functions to supernatural numbers by defining for each . Supernatural numbers are used to define orders and indices of profinite groups and subgroups, in which case many of the theorems from finite group theory carry over exactly. They are used to encode the algebraic extensions of a finite field. Supernatural numbers also arise in the classification of uniformly hyperfinite algebras. See also Profinite integer
https://en.wikipedia.org/wiki/IEEE%20Journal%20of%20Solid-State%20Circuits
The IEEE Journal of Solid-State Circuits is a monthly peer-reviewed scientific journal on new developments and research in solid-state circuits, published by the Institute of Electrical and Electronics Engineers (IEEE) in New York City. The journal serves as a companion venue for expanding on work presented at the International Solid-State Circuits Conference, the Symposia on VLSI Technology and Circuits, and the Custom Integrated Circuits Conference. The journal has an impact factor of 6.12 and is edited by Dennis Sylvester (University of Michigan).
https://en.wikipedia.org/wiki/HPMPA
HPMPA is an experimental broad spectrum antiviral.
https://en.wikipedia.org/wiki/Ribulose%201%2C5-bisphosphate
Ribulose 1,5-bisphosphate (RuBP) is an organic substance that is involved in photosynthesis, notably as the principal acceptor in plants. It is a colourless anion, a double phosphate ester of the ketopentose (ketone-containing sugar with five carbon atoms) called ribulose. Salts of RuBP can be isolated, but its crucial biological function happens in solution. RuBP occurs not only in plants but in all domains of life, including Archaea, Bacteria, and Eukarya. History RuBP was originally discovered by Andrew Benson in 1951 while working in the lab of Melvin Calvin at UC Berkeley. Calvin, who had been away from the lab at the time of discovery and was not listed as a co-author, controversially removed the full molecule name from the title of the initial paper, identifying it solely as "ribulose". At the time, the molecule was known as ribulose diphosphate (RDP or RuDP) but the prefix di- was changed to bis- to emphasize the nonadjacency of the two phosphate groups. Role in photosynthesis and the Calvin-Benson Cycle The enzyme ribulose-1,5-bisphosphate carboxylase-oxygenase (rubisco) catalyzes the reaction between RuBP and carbon dioxide. The product is the highly unstable six-carbon intermediate known as 3-keto-2-carboxyarabinitol 1,5-bisphosphate, or 2'-carboxy-3-keto-D-arabinitol 1,5-bisphosphate (CKABP). This six-carbon β-ketoacid intermediate hydrates into another six-carbon intermediate in the form of a gem-diol. This intermediate then cleaves into two molecules of 3-phosphoglycerate (3-PGA) which is used in a number of metabolic pathways and is converted into glucose. In the Calvin-Benson cycle, RuBP is a product of the phosphorylation of ribulose-5-phosphate (produced by glyceraldehyde 3-phosphate) by ATP. Interactions with rubisco RuBP acts as an enzyme inhibitor for the enzyme rubisco, which regulates the net activity of carbon fixation. When RuBP is bound to an active site of rubisco, the ability to activate via carbamylation with and is blocked. The
https://en.wikipedia.org/wiki/Pandora%20International
Pandora International is a maker of hardware and software systems for video editing, Telecine Control and Colour Correction. Pandora was founded in 1985 By Steve Brett and Martin Greenwood, later Aine Marsland joined the team and took over the administration of the company. Pandora International devices are able to colour-correct video and 16 mm and 35 mm motion picture film in real time. Pandora International is based in Greenhithe, Kent, England. Pogle Colour corrector Pandora Int. was the maker the Pogle colour corrector controller. The Pogle can control a Telecine machine, like the FDL60 the first digital telecine. New models could control FDL 90, Quadra and Spirit DataCines Pogle used customized external control panels. The Pogle also included a VTR deck controller which was capable of controlling up to four video tape decks for field accurate editing including 3/2 sequence control. Other systems made do with a separate computer system [e.g. TLC] for this function. Pogle has a CPU rack which used twin Motorola 68020 CPU's and a telecine interface rack which varied depending on the make and model of the Telecine system in use. The first Pogles controlled the telecine's internal colour corrector. Originally Pogles used a PDOS operating system which was quickly replaced with a proprietary system named ANDIX. The program and list are stored on a SCSI hard disk, with backup to a 3.5" floppy disk. Video display is to a multi-sync monitor. The newer operating system updated to a Silicon Graphics (SGI) platinum operating system ran on a SGI Indy computer and later an SGI O2; these replaced the internal CPU and video cards in the Pogle controller rack. The Indy computer and O2 computer's backup is usually to an external zip Drive or ext. floppy. The O2 has an internal CD-ROM. Pandora's DCP external colour corrector is a Rec. 601 digital system so some telecine's [e.g. FDL60] which only had analog output's had to first send their signal to an external analog-to-digi