source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Lyman%20Laboratory%20of%20Physics
The Lyman Laboratory of Physics (named for the physicist Theodore Lyman) is a building at Harvard University located between the Jefferson and Cruft Laboratories in the North Yard. It was built in the early 1930s, to a design by Coolidge, Shepley, Bulfinch and Abbott. Among those who have done research at Lyman are Sheldon Glashow, Higgins Professor of Physics, Emeritus and Richard Wilson, Mallinckrodt Professor of Physics, Emeritus. Here, Ranga Dias (Post-Doctoral Fellow) and Isaac F. Silvera (Thomas D. Cabot Professor of the Natural Sciences) claim to have gathered experimental evidence that solid metallic hydrogen had been synthesised.
https://en.wikipedia.org/wiki/Desmoglein
The desmogleins are a family of desmosomal cadherins consisting of proteins DSG1, DSG2, DSG3, and DSG4. They play a role in the formation of desmosomes that join cells to one another. Pathology Desmogleins are targeted in the autoimmune disease pemphigus. Desmoglein proteins are a type of cadherin, which is a transmembrane protein that binds with other cadherins to form junctions known as desmosomes between cells. These desmoglein proteins thus hold cells together, but, when the body starts producing antibodies against desmoglein, these junctions break down, and this results in subsequent blister or vesicle formation.
https://en.wikipedia.org/wiki/Fussballdaten.de
fussballdaten.de is a German-language website that predominantly collects comprehensive statistics on the top five tiers of German football. The website offers statistics on every Bundesliga, 2. Bundesliga and 3. Liga match and team since the leagues' foundation in 1963, 1974 and 2008, respectively.
https://en.wikipedia.org/wiki/The%20Flintstones%20%281988%20video%20game%29
The Flintstones is a 1988 video game based on the 1960s television series The Flintstones. The game was developed by Teque Software Development and published by Grandslam Entertainments. The game was released in Europe in 1988, for Amiga, Amstrad CPC, Atari ST, Commodore 64, MSX, and ZX Spectrum. A version for the Sega Master System was released in 1991. Gameplay Each version of The Flintstones features identical gameplay. The game contains four levels. The story begins with Fred Flintstone finishing work at a rock quarry and exclaiming "Yabba dabba doo!" which is the game's only spoken line of dialogue, achieved through speech synthesis. For the remainder of the game, character interactions are done through speech balloons. Fred wants to bowl with Barney Rubble at a bowling alley, but Fred's wife, Wilma, tells him that he must paint their living room first for the arrival of her mother. Playing as Fred, the player must paint the room while also preventing his young daughter, Pebbles, from scribbling on the walls. The player's paintbrush is a squirrel. When stopping Pebbles, the squirrel sometimes runs away and must be captured. In the second level, Fred must race to the bowling alley while avoiding rocks on the road. Hitting a rock results in the vehicle losing a wheel, requiring the player to search for a replacement and get back on the road. The third level is played as a bowling game between Fred and Barney, with the two players taking turns. In the final level, Fred returns home and discovers that Pebbles is missing from the house. He finds her climbing a construction site and competes against Barney to rescue her, while avoiding nuts and bolts. A practice mode allows the player to explore each area. A rendition of the theme music from the television series was created by Ben Daglish, and is present throughout the game, except for the ZX Spectrum version. Reception The Games Machine criticized the bowling level for "the long-winded restacking of the pins
https://en.wikipedia.org/wiki/List%20of%20eponyms%20of%20Nvidia%20GPU%20microarchitectures
This is a list of eponyms of Nvidia GPU microarchitectures. The eponym in this case is the person after whom an architecture is named. Listed are the person, their portrait, their profession or areas of expertise, their birth year, their death year, their country of origin, the microarchitecture named after them, and the year of release of the GPU architecture.
https://en.wikipedia.org/wiki/Harmonic%20Maass%20form
In mathematics, a weak Maass form is a smooth function on the upper half plane, transforming like a modular form under the action of the modular group, being an eigenfunction of the corresponding hyperbolic Laplace operator, and having at most linear exponential growth at the cusps. If the eigenvalue of under the Laplacian is zero, then is called a harmonic weak Maass form, or briefly a harmonic Maass form. A weak Maass form which has actually moderate growth at the cusps is a classical Maass wave form. The Fourier expansions of harmonic Maass forms often encode interesting combinatorial, arithmetic, or geometric generating functions. Regularized theta lifts of harmonic Maass forms can be used to construct Arakelov Green functions for special divisors on orthogonal Shimura varieties. Definition A complex-valued smooth function on the upper half-plane is called a weak Maass form of integral weight (for the group ) if it satisfies the following three conditions: (1) For every matrix the function satisfies the modular transformation law (2) is an eigenfunction of the weight hyperbolic Laplacian where (3) has at most linear exponential growth at the cusp, that is, there exists a constant such that as If is a weak Maass form with eigenvalue 0 under , that is, if , then is called a harmonic weak Maass form, or briefly a harmonic Maass form. Basic properties Every harmonic Maass form of weight has a Fourier expansion of the form where , and are integers depending on Moreover, denotes the incomplete gamma function (which has to be interpreted appropriately when ). The first summand is called the holomorphic part, and the second summand is called the non-holomorphic part of There is a complex anti-linear differential operator defined by Since , the image of a harmonic Maass form is weakly holomorphic. Hence, defines a map from the vector space of harmonic Maass forms of weight to the space of weakly holomorphic modular forms of weight
https://en.wikipedia.org/wiki/Trypanocidal%20agent
A trypanocidal agent is an antiprotozoal agent that acts upon trypanosome parasites. Examples include: Aminoquinuride benzonidazole blasticidin S DAPI diminazene diminazene aceturate eflornithine ethidium isometamidium chloride lonidamine melaminylthioarsenate melarsoprol nifurtimox pentamidine posaconazole puromycin quinapyramine salicylhydroxamic acid suramin tetraphenylporphine sulfonate Resistance , 17 or 18 African countries had confirmed resistant parasite populations, and that was up to 21. Multiply resistant populations are an increasing problem in the Adamawa Region of Cameroon and south east Mali. The Gibe River Valley in southwest Ethiopia showed universal resistance (in T. congolense isolated from Boran cattle) between July 1989 and February 1993. This likely indicates a permanent loss of function in this area for the tested trypanocides, diminazene aceturate, isometamidium chloride, and homidium chloride. See also Trypanosomiasis vaccine
https://en.wikipedia.org/wiki/Diethylene%20glycol
Diethylene glycol (DEG) is an organic compound with the formula (HOCH2CH2)2O. It is a colorless, practically odorless, and hygroscopic liquid with a sweetish taste. It is a four carbon dimer of ethylene glycol. It is miscible in water, alcohol, ether, acetone, and ethylene glycol. DEG is a widely used solvent. It can be a contaminant in consumer products; this has resulted in numerous epidemics of poisoning since the early 20th century. Preparation DEG is produced by the partial hydrolysis of ethylene oxide. Depending on the conditions, varying amounts of DEG and related glycols are produced. The resulting product is two ethylene glycol molecules joined by an ether bond. "Diethylene glycol is derived as a co-product with ethylene glycol (MEG) and triethylene glycol. The industry generally operates to maximize MEG production. Ethylene glycol is by far the largest volume of the glycol products in a variety of applications. Availability of DEG will depend on demand for derivatives of the primary product, ethylene glycol, rather than on DEG market requirements." Structure of DEG and related polyols Diethylene glycol is one of several glycols derived from ethylene oxide. Glycols related to and coproduced with diethylene glycol and have the formula HOCH2CH2(OCH2CH2)nOH are: n = 0 ethylene glycol ("antifreeze"); monoethylene glycol MEG n = 1 DEG n = 2 triethylene glycol, TEG, or triglycol n = 3 tetraethylene glycol n = 4 pentaethylene glycol n > 4 polyethylene glycol These compounds are all hydrophilic, more so than most diols, by virtue of the ether functionality. Uses Diethylene glycol is used in the manufacture of saturated and unsaturated polyester resins, polyurethanes, and plasticizers. DEG is used as a building block in organic synthesis, e.g. of morpholine and 1,4-dioxane. It is a solvent for nitrocellulose, resins, dyes, oils, and other organic compounds. It is a humectant for tobacco, cork, printing ink, and glue. It is also a component in brake fluid, l
https://en.wikipedia.org/wiki/Military%20colours%2C%20standards%20and%20guidons
In military organizations, the practice of carrying colours, standards, flags, or guidons, both to act as a rallying point for troops and to mark the location of the commander, is thought to have originated in Ancient Egypt some 5,000 years ago. The Roman Empire also made battle standards, reading SPQR a part of their vast armies. It was formalized in the armies of Europe in the High Middle Ages, with standards being emblazoned with the commander's coat of arms. General use As armies became trained and adopted set formations, each regiment's ability to keep its formation was potentially critical to its, and therefore its army's, success. In the chaos of battle, due to the amount of dust and smoke on a battlefield, soldiers needed to be able to determine where their regiment was. Regimental flags are generally awarded to a regiment by a head of state during a ceremony. They were therefore treated with respect as they represented the honour and traditions of the regiment. Colours may be inscribed with the names of battles or other symbols representing former achievements (see battle honours). Regiments tended to adopt "colour guards", composed of experienced or élite soldiers, to protect their colours. As a result, the capture of an enemy's standard was considered as a great feat of arms. They are never capriciously destroyed – when too old to use they are replaced and then laid up in museums, religious buildings and other places of significance to their regiment. However, in most modern armies, standing orders now call for the colours to be intentionally destroyed if they are ever in jeopardy of being captured by the enemy. Due to the advent of modern weapons, and subsequent changes in tactics, colours are no longer carried into battle, but continue to be used at events of formal character. Colours Asia Cambodia In Cambodia, the Colours of the Military and other uniformed institutions follow British, US, and French practice. It is basically a large version o
https://en.wikipedia.org/wiki/Einstein%20%28US-CERT%20program%29
The EINSTEIN System (part of the National Cybersecurity Protection System) is an network intrusion detection and prevention system that monitors the networks of US federal government departments and agencies. The system is developed and managed by the Cybersecurity and Infrastructure Security Agency (formerly NPPD/United States Computer Emergency Readiness Team (US-CERT)) in the United States Department of Homeland Security (DHS). The program was originally developed to provide "situational awareness" for the civilian agencies and to "facilitate identifying and responding to cyber threats and attacks, improve network security, increase the resiliency of critical, electronically delivered government services, and enhance the survivability of the Internet." The first version examined basic network traffic and subsequent versions examined content. EINSTEIN does not protect the network infrastructure of the private sector. History The Federal Computer Incident Response Capability (FedCIRC) was one of four watch centers that were protecting federal information technology when the E-Government Act of 2002 designated it the primary incident response center. With FedCIRC at its core, US-CERT was formed in 2003 as a partnership between the newly created DHS and the CERT Coordination Center which is at Carnegie Mellon University and funded by the U.S. Department of Defense. US-CERT delivered EINSTEIN to meet statutory and administrative requirements that DHS help protect federal computer networks and the delivery of essential government services. EINSTEIN was implemented to determine if the government was under cyber attack. EINSTEIN does this by collecting flow data from all civilian agencies and compared that flow data to a baseline. If one Agency reported a cyber event, the 24/7 Watch at US-CERT could look at the incoming flow data and assist resolution. If one Agency was under attack, US-CERT Watch could quickly look at other Agency feeds to determine if it was ac
https://en.wikipedia.org/wiki/Cangrelor
Cangrelor, sold under the brand name Kengreal among others, is a P2Y12 inhibitor FDA approved as of June 2015 as an antiplatelet drug for intravenous application. Some P2Y12 inhibitors are used clinically as effective inhibitors of adenosine diphosphate-mediated platelet activation and aggregation. Unlike clopidogrel (Plavix), which is a prodrug, cangrelor is an active drug not requiring metabolic conversion. Poor interim results led to the abandonment of the two CHAMPION clinical trials in mid-2009. The BRIDGE study, for short term use prior to surgery, continues. The CHAMPION PHOENIX trial was a randomized study of over 11,000 patients published in 2013. It found usefulness of cangrelor in patients getting cardiac stents. Compared with clopidogrel given around the time of stenting, intravenous ADP-receptor blockade with cangrelor significantly reduced the rate of stent thrombosis and myocardial infarction. Reviewers have questioned the methodology of the trial. Medical use According to phase III randomized trials, a cangrelor–clopidogrel combination is safe and has been found to be more effective than standard clopidogrel treatment at reducing ischemic events in the heart, without increasing major bleeding in the treatment of stenotic coronary arteries. The advantages of this drug combination are most prominent in patients with myocardial infarction. Available antiplatelet drugs have delayed onset and offset of action. Since cangrelor's effects are immediate and quickly reversed, it is a more desirable drug for elective treatment of stenotic coronary arteries, high risk acute coronary syndromes treated with immediate coronary stenting, and for bridging those surgery patients who require P2Y12 inhibition. Evidence regarding cangrelor therapy is limited by the lack studies assessing cangrelor administration in conjunction with either prasugrel or ticagrelor. Cangrelor been approved for adults undergoing percutaneous coronary intervention (PCI). Pharmacology
https://en.wikipedia.org/wiki/System%20and%20Organization%20Controls
System and Organization Controls (SOC), (also sometimes referred to as service organizations controls) as defined by the American Institute of Certified Public Accountants (AICPA), is the name of a suite of reports produced during an audit. It is intended for use by service organizations (organizations that provide information systems as a service to other organizations) to issue validated reports of internal controls over those information systems to the users of those services. The reports focus on controls grouped into five categories called Trust Service Criteria. The Trust Services Criteria were established by The AICPA through its Assurance Services Executive Committee (ASEC) in 2017 (2017 TSC). These control criteria are to be used by the practitioner/examiner (Certified Public Accountant, CPA) in attestation or consulting engagements to evaluate and report on controls of information systems offered as a service. The engagements can be done on an entity wide, subsidiary, division, operating unit, product line or functional area basis. The Trust Services Criteria were modeled in conformity to The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control - Integrated Framework (COSO Framework). In addition, the Trust Services Criteria can be mapped to NIST SP 800 - 53 criteria and to EU General Data Protection Regulation (GDPR) Articles. The AICPA auditing standard Statement on Standards for Attestation Engagements no. 18 (SSAE 18), section 320, "Reporting on an Examination of Controls at a Service Organization Relevant to User Entities' Internal Control Over Financial Reporting", defines two levels of reporting, type 1 and type 2. Additional AICPA guidance materials specify three types of reporting: SOC 1, SOC 2, and SOC 3. Trust Service Criteria Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique ris
https://en.wikipedia.org/wiki/Ratio%20estimator
The ratio estimator is a statistical estimator for the ratio of means of two random variables. Ratio estimates are biased and corrections must be made when they are used in experimental or survey work. The ratio estimates are asymmetrical and symmetrical tests such as the t test should not be used to generate confidence intervals. The bias is of the order O(1/n) (see big O notation) so as the sample size (n) increases, the bias will asymptotically approach 0. Therefore, the estimator is approximately unbiased for large sample sizes. Definition Assume there are two characteristics – x and y – that can be observed for each sampled element in the data set. The ratio R is The ratio estimate of a value of the y variate (θy) is where θx is the corresponding value of the x variate. θy is known to be asymptotically normally distributed. Statistical properties The sample ratio (r) is estimated from the sample That the ratio is biased can be shown with Jensen's inequality as follows (assuming independence between x and y): Under simple random sampling the bias is of the order O( n−1 ). An upper bound on the relative bias of the estimate is provided by the coefficient of variation (the ratio of the standard deviation to the mean). Under simple random sampling the relative bias is O( n−1/2 ). Correction of the mean's bias The correction methods, depending on the distributions of the x and y variates, differ in their efficiency making it difficult to recommend an overall best method. Because the estimates of r are biased a corrected version should be used in all subsequent calculations. A correction of the bias accurate to the first order is where mx is the mean of the variate x and sxy is the covariance between x and y. To simplify the notation sxy will be used subsequently to denote the covariance between the variates x and y. Another estimator based on the Taylor expansion is where n is the sample size, N is the population size, mx is the mea
https://en.wikipedia.org/wiki/Strong%20gravity
'Strong gravity' is a non-mainstream theoretical approach to particle confinement having both a cosmological scale and a particle scale gravity. In the 1960s, it was taken up as an alternative to the then young QCD theory by several theorists, including Abdus Salam, who showed that the particle level gravity approach can produce confinement and asymptotic freedom while not requiring a force behavior differing from an inverse-square law, as does QCD. Sivaram published a review of this bimetric theory approach. Although this approach has not so far led to a recognizably successful unification of strong and other forces, the modern approach of string theory is characterized by a close association between gauge forces and spacetime geometry. In some cases, string theory recognizes important duality between gravity-like and QCD-like theories, most notably the AdS/QCD correspondence. The concept of strong gravity follows from applying the potential gravitational energy to the term of heat in the equation of the first law of thermodynamics (), where the total energy is mass-energy and the work is also the kinetic energy: , becomes
https://en.wikipedia.org/wiki/AM-Franc
The "flag ticket" franc () was a currency issued by the United States for use in Allied-occupied France in the wake of the Battle of Normandy. With the swift take-over of sovereignty by General Charles de Gaulle, who considered the US occupation franc as "counterfeit money", the currency rapidly faded out of use in favour of the pre-war French franc. Gallery See also Franc CFA External links Dubious Liberators: Allied Plans to Occupy France, 1942-1944, by Ted Rall (archived from the original). Currencies of France Currency symbols Modern obsolete currencies
https://en.wikipedia.org/wiki/Induced%20cell%20cycle%20arrest
Induced cell cycle arrest is the use of a chemical or genetic manipulation to artificially halt progression through the cell cycle. Cellular processes like genome duplication and cell division stop. It can be temporary or permanent. It is an artificial activation of naturally occurring cell cycle checkpoints, induced by exogenous stimuli controlled by an experimenter. Model organisms In an academic research context, cell cycle arrest is typically performed in model organisms and cell extracts, such as Saccharomyces cervisiae (yeast) or Xenopus oocytes (frog eggs). Frog egg cell extracts have been used extensively in cell cycle research because they are relatively large, reaching a diameter of 1mm, and so contain large amounts of protein, making protein levels more easily measurable. Purposes There are a variety of reasons a researcher may want to temporarily or permanently prevent progress through the cell cycle. Cell cycle synchronization In some experiments, a researcher may want to control and synchronize the time when a group of cells progress to the next phase of the cell cycle. The cells can be induced to arrest as they arrive (at different time points) at a certain phase, so that when the arrest is lifted (for instance, rescuing cell cycle progression by introducing another chemical) all the cells resume cell cycle progression at the same time. In addition to this method acting as a scientific control for when the cells resume the cell cycle, this can be used to investigate necessity and sufficiency. Another reason synchrony is important is the control for amount of DNA content, which varies at different parts of the cell cycle based on whether DNA replication has occurred since the last round of completed mitosis and cytokinesis. Furthermore, synchronization of large numbers of cells into the same phase allows for the collection of large enough groups of cells in the same cycle for the use in other assays, such as western blot and RNA sequencing. D
https://en.wikipedia.org/wiki/History%20of%20magnetic%20resonance%20imaging
The history of magnetic resonance imaging (MRI) includes the work of many researchers who contributed to the discovery of nuclear magnetic resonance (NMR) and described the underlying physics of magnetic resonance imaging, starting early in the twentieth century. MR imaging was invented by Paul C. Lauterbur who developed a mechanism to encode spatial information into an NMR signal using magnetic field gradients in September 1971; he published the theory behind it in March 1973. The factors leading to image contrast (differences in tissue relaxation time values) had been described nearly 20 years earlier by physician and scientist Erik Odeblad and Gunnar Lindström. Among many other researchers in the late 1970s and 1980s, Peter Mansfield further refined the techniques used in MR image acquisition and processing, and in 2003 he and Lauterbur were awarded the Nobel Prize in Physiology or Medicine for their contributions to the development of MRI. The first clinical MRI scanners were installed in the early 1980s and significant development of the technology followed in the decades since, leading to its widespread use in medicine today. Nuclear magnetic resonance In 1950, spin echoes and free induction decay were first detected by Erwin Hahn and in 1952, Herman Carr produced a one-dimensional NMR spectrum as reported in his Harvard PhD thesis. The next step (from spectra to imaging) was proposed by Vladislav Ivanov in Soviet Union, who filed in 1960 a patent application for a Magnetic Resonance Imaging device. Ivanov's main contribution was the idea of using magnetic field gradient, combined with a selective frequency excitation/readout, to encode the spatial coordinates. In modern terms, it was only proton-density (not relaxation times) imaging, which was also slow, since only one gradient direction was used at a time and the imaging had to be done slice-by-slice. Nevertheless, it was a true magnetic resonance imaging procedure. Originally rejected as "improbable", I
https://en.wikipedia.org/wiki/Network%20encryption%20cracking
Network encryption cracking is the breaching of network encryptions (e.g., WEP, WPA, ...), usually through the use of a special encryption cracking software. It may be done through a range of attacks (active and passive) including injecting traffic, decrypting traffic, and dictionary-based attacks. Methods As mentioned above, several types of attacks are possible. More precisely they are: Decrypting traffic based on tricking access points (active attack) Injecting traffic based on known plaintext (active attack) Gathering traffic and performing brute force/dictionary based attacks Decrypting traffic using statistical analysis (passive attack) Injecting traffic Injecting traffic means inserting forged encrypted messages into the network. It may be done if either the key is known (to generate new messages), or if the key is not known and only an encrypted message and plaintext message is gathered, through comparison of the two. Programs able to do the latter are Aireplay and WepWedgie. Decrypting Decryption often requires 2 tools; 1 for gathering packets and another for analysing the packet and determining the key. Gathering packets may be done through tools such as WireShark or Prismdump and cracking may be done through tools such as WEPCrack, AirSnort, AirCrack, and WEPLab. When gathering packets, often a great amount of them are required to perform cracking. Depending on the attack used, 5-16 million frames may be required. The attack command itself, however, is surprisingly simple. WEPCrack Commands to be inputted into WEPCrack are: $ perl \progra~1\wepcrack\pcap-getIV.pl This command generates a log-file (ivfile.log) from a captured packet obtained by WireShark or prismdump A packet with at least 5 million frames is required. $ perl \progra~1\wepcrack\wepcrack\.pl ivfile.log This command asks WEPCrack to determine the key from the log file. AirCrack Aircrack is another program that's even simpler to use, as no command need to be entered; instead th
https://en.wikipedia.org/wiki/Library%20and%20information%20scientist
A library and information scientist, also known as a library scholar, is a researcher or academic who specializes in the field of library and information science and often participates in scholarly writing about and related to library and information science. A library and information scientist is neither limited to any one subfield of library and information science nor any one particular type of library. These scientists come from all information-related sectors. Bibliometric mappings Bibliometric methods have been used to create maps of library and information science, thus identifying the most important researchers as well as their relative connections (or distances) and identifying emerging trends related to LIS publications within the field. White and McCain (1998) made a map of information science and Åström (2002), Chen, Ibekwe-SanJuan, and Hou (2010), Janssens, Leta, Glanzel, and De Moor (2006), and Zhao and Strotmann (2008) constructed some later maps of library and information science. Jabeen, Yun, Rafiq, and Jabeen (2015) mapped the growth and trends of LIS publications. Notable library and information scientists Sanford Berman John Shaw Billings Suzanne Briet James Duff Brown Michael Buckland Lois Mai Chan Ingetraut Dahlberg Melville Dewey Douglas John Foskett Eugene Garfield Michael Gorman Allen Kent Frederick Kilgour David A. Kronick Frederick Wilfrid Lancaster Kathleen de la Peña McCook Alexander Ivanovich Mikhailov Herbert Marvin Ohlman Hope A. Olson Paul Otlet S. R. Ranganathan Gerald Salton Claire Kelly Schultz Jesse Shera Elaine Svenonius Robert Saxton Taylor Barbara Tillett Brian Campbell Vickery Herbert S. White See also Bibliometrician Computer scientist Documentalist Information scientist Librarian Library science
https://en.wikipedia.org/wiki/Half-carry%20flag
A half-carry flag (also known as an auxiliary flag) is a condition flag bit in the status register of many CPU families, such as the Intel 8080, Zilog Z80, the x86, and the Atmel AVR series, among others. It indicates when a carry or borrow has been generated out of the least significant four bits of the accumulator register following the execution of an arithmetic instruction. It is primarily used in decimal (BCD) arithmetic instructions. Usage Normally, a processor that utilizes binary arithmetic (which includes almost all modern CPUs) will add two 8-bit byte values according to the rules of simple binary addition. For example, adding 25 and 48 produces 6D. However, for binary-coded decimal (BCD) values, where each 4-bit nibble represents a decimal digit, addition is more complicated. For example, adding the decimal value 25 and 48, which are encoded as the BCD values 25 and 48, the binary addition of the two values produces 6D. Since the lower nibble of this value is a non-decimal digit (D), it must be adjusted by adding 06 to produce the correct BCD result of 73, which represents the decimal value 73. 0010 0101 25 + 0100 1000 48 ----------- 0110 1101 6D, intermediate result + 0110 06, adjustment ----------- 0111 0011 73, adjusted result Likewise, adding the BCD values 39 and 48 produces 81. This result does not have a non-decimal low nibble, but it does cause a carry out of the least significant digit (lower four bits) into the most significant digit (upper four bits). This is indicated by the CPU setting the half-carry flag. This value must also be corrected, by adding 06 to 81 to produce a corrected BCD result of 87. 0011 1001 39 + 0100 1000 48 ----------- 1000 0001 81, intermediate result + 0110 06, adjustment ----------- 1000 0111 87, adjusted result Finally, if an addition results in a non-decimal high digit, then 60 must be added to the value to produce the correct BCD result. For example, addi
https://en.wikipedia.org/wiki/Tanabe%E2%80%93Sugano%20diagram
In coordination chemistry, Tanabe–Sugano diagrams are used to predict absorptions in the ultraviolet (UV), visible and infrared (IR) electromagnetic spectrum of coordination compounds. The results from a Tanabe–Sugano diagram analysis of a metal complex can also be compared to experimental spectroscopic data. They are qualitatively useful and can be used to approximate the value of 10Dq, the ligand field splitting energy. Tanabe–Sugano diagrams can be used for both high spin and low spin complexes, unlike Orgel diagrams, which apply only to high spin complexes. Tanabe–Sugano diagrams can also be used to predict the size of the ligand field necessary to cause high-spin to low-spin transitions. In a Tanabe–Sugano diagram, the ground state is used as a constant reference, in contrast to Orgel diagrams. The energy of the ground state is taken to be zero for all field strengths, and the energies of all other terms and their components are plotted with respect to the ground term. Background Until Yukito Tanabe and Satoru Sugano published their paper "On the absorption spectra of complex ions", in 1954, little was known about the excited electronic states of complex metal ions. They used Hans Bethe's crystal field theory and Giulio Racah's linear combinations of Slater integrals, now called Racah parameters, to explain the absorption spectra of octahedral complex ions in a more quantitative way than had been achieved previously. Many spectroscopic experiments later, they estimated the values for two of Racah's parameters, B and C, for each d-electron configuration based on the trends in the absorption spectra of isoelectronic first-row transition metals. The plots of the energies calculated for the electronic states of each electron configuration are now known as Tanabe–Sugano diagrams. Number must be fit for each octahedral coordination complex because the C/B can deviate strongly from the theoretical value of 4.0. This ratio changes the relative energies of the level
https://en.wikipedia.org/wiki/Immunoglobulin%20superfamily
The immunoglobulin superfamily (IgSF) is a large protein superfamily of cell surface and soluble proteins that are involved in the recognition, binding, or adhesion processes of cells. Molecules are categorized as members of this superfamily based on shared structural features with immunoglobulins (also known as antibodies); they all possess a domain known as an immunoglobulin domain or fold. Members of the IgSF include cell surface antigen receptors, co-receptors and co-stimulatory molecules of the immune system, molecules involved in antigen presentation to lymphocytes, cell adhesion molecules, certain cytokine receptors and intracellular muscle proteins. They are commonly associated with roles in the immune system. Otherwise, the sperm-specific protein IZUMO1, a member of the immunoglobulin superfamily, has also been identified as the only sperm membrane protein essential for sperm-egg fusion. Immunoglobulin domains Proteins of the IgSF possess a structural domain known as an immunoglobulin (Ig) domain. Ig domains are named after the immunoglobulin molecules. They contain about 70-110 amino acids and are categorized according to their size and function. Ig-domains possess a characteristic Ig-fold, which has a sandwich-like structure formed by two sheets of antiparallel beta strands. Interactions between hydrophobic amino acids on the inner side of the sandwich and highly conserved disulfide bonds formed between cysteine residues in the B and F strands, stabilize the Ig-fold. Classification The Ig like domains can be classified as IgV, IgC1, IgC2, or IgI. Most Ig domains are either variable (IgV) or constant (IgC). IgV: IgV domains with 9 beta strands are generally longer than IgC domains with 7 beta strands. IgC1 and IgC2: Ig domains of some members of the IgSF resemble IgV domains in the amino acid sequence, yet are similar in size to IgC domains. These are called IgC2 domains, while standard IgC domains are called IgC1 domains. IgI: Other Ig domains exi
https://en.wikipedia.org/wiki/RCOS%20%28computer%20sciences%29
rCOS stands for refinement of object and component systems. It is a formal method providing component-based model-driven software development. Overview rCOS was originally developed by He Jifeng, Zhiming Liu and Xiaoshan Li at UNU-IIST in Macau, and consists of a unified multi-view modeling notation with a theory of relational semantic and graph-based operational semantics, a refinement calculus and tool support for model construction, model analysis and verification, and model transformations. Model transformations automate refinement rules and design patterns and generate conditions as proof obligations. rCOS support multiple dimensional modeling: models at different levels of abstraction related by refinement relations, hierarchy of compositions of components, and models of different views of the system (interaction protocols of components, reactive behaviors of components, data functionality, and class structures and data types). Components are composed and integrated based on their models of interfaces to support third party composition. Bibliography Ruzhen Dong, Johannes Faber, Wei Ke, Zhiming Liu: "rCOS: Defining Meanings of Component-Based Software Architectures". Unifying Theories of Programming and Formal Engineering Methods – ICTAC Training School on Software Engineering 2013, LNCS 8050: 1-66, Springer (2013) Wei Ke, Xiaoshan Li, Zhiming Liu, Volker Stolz: "rCOS: a formal model-driven engineering method for component-based software". Frontiers of Computer Science in China 6(1): 17-39 (2012) Zhiming Liu, Charles Morisset and Volker Stolz. "rCOS: Theory and Tool for Component-Based Model Driven Development, Keynote at FSEN09", Technical Report 406, UNU-IIST, P.O. Box 3058, Macau, February 2009. Zhenbang Chen, Zhiming Liu, Ander P. Ravn and Volker Stolz (2009). "Refinement and Verification in Component-Based Model Driven Design". UNU-IIST Research Report 381. Science of Computer Programming, 74(4):168-196, 2009. Liang Zhao, Xiaojian Liu, Zhiming Liu
https://en.wikipedia.org/wiki/Cryptographic%20key%20types
A cryptographic key is a string of data that is used to lock or unlock cryptographic functions, including authentication, authorization and encryption. Cryptographic keys are grouped into cryptographic key types according to the functions they perform. Description Consider a keyring that contains a variety of keys. These keys might be various shapes and sizes, but one thing is certain, each will generally serve a separate purpose. One key might be used to start an automobile, while another might be used to open a safe deposit box. The automobile key will not work to open the safe deposit box and vice versa. This analogy provides some insight on how cryptographic key types work. These keys are categorized in respect to how they are used and what properties they possess. A cryptographic key is categorized according to how it will be used and what properties it has. For example, a key might have one of the following properties: Symmetric, Public or Private. Keys may also be grouped into pairs that have one private and one public key, which is referred to as an Asymmetric key pair. Asymmetric versus symmetric keys Asymmetric keys differ from symmetric keys in that the algorithms use separate keys for encryption and decryption, while a symmetric key’s algorithm uses a single key for both processes. Because multiple keys are used with an asymmetric algorithm, the process takes longer to produce than a symmetric key algorithm would. However, the benefits lay in the fact that an asymmetric algorithm is much more secure than a symmetric key algorithm is. With a symmetric key, the key needs to be transmitted to the receiver, where there is always the possibility that the key could be intercepted or tampered with. With an asymmetric key, the message and/or accompanying data can be sent or received by using a public key; however, the receiver or sender would use his or her personal private key to access the message and/or accompanying data. Thus, asymmetric keys are suit
https://en.wikipedia.org/wiki/Dijkstra%E2%80%93Scholten%20algorithm
The Dijkstra–Scholten algorithm (named after Edsger W. Dijkstra and Carel S. Scholten) is an algorithm for detecting termination in a distributed system. The algorithm was proposed by Dijkstra and Scholten in 1980. First, consider the case of a simple process graph which is a tree. A distributed computation which is tree-structured is not uncommon. Such a process graph may arise when the computation is strictly a divide-and-conquer type. A node starts the computation and divides the problem in two (or more, usually a multiple of 2) roughly equal parts and distribute those parts to other processors. This process continues recursively until the problems are of sufficiently small size to solve in a single processor. Algorithm The Dijkstra–Scholten algorithm is a tree-based algorithm which can be described by the following: The initiator of a computation is the root of the tree. Upon receiving a computational message: If the receiving process is currently not in the computation: the process joins the tree by becoming a child of the sender of the message. (No acknowledgment message is sent at this point.) If the receiving process is already in the computation: the process immediately sends an acknowledgment message to the sender of the message. When a process has no more children and has become idle, the process detaches itself from the tree by sending an acknowledgment message to its tree parent. Termination occurs when the initiator has no children and has become idle. Dijkstra–Scholten algorithm for a tree For a tree, it is easy to detect termination. When a leaf process determines that it has terminated, it sends a signal to its parent. In general, a process waits for all its children to send signals and then it sends a signal to its parent. The program terminates when the root receives signals from all its children. Dijkstra–Scholten algorithm for directed acyclic graphs The algorithm for a tree can be extended to acyclic directed graphs. We add an add
https://en.wikipedia.org/wiki/Microbial%20loop
The microbial loop describes a trophic pathway where, in aquatic systems, dissolved organic carbon (DOC) is returned to higher trophic levels via its incorporation into bacterial biomass, and then coupled with the classic food chain formed by phytoplankton-zooplankton-nekton. In soil systems, the microbial loop refers to soil carbon. The term microbial loop was coined by Farooq Azam, Tom Fenchel et al. in 1983 to include the role played by bacteria in the carbon and nutrient cycles of the marine environment. In general, dissolved organic carbon (DOC) is introduced into the ocean environment from bacterial lysis, the leakage or exudation of fixed carbon from phytoplankton (e.g., mucilaginous exopolymer from diatoms), sudden cell senescence, sloppy feeding by zooplankton, the excretion of waste products by aquatic animals, or the breakdown or dissolution of organic particles from terrestrial plants and soils. Bacteria in the microbial loop decompose this particulate detritus to utilize this energy-rich matter for growth. Since more than 95% of organic matter in marine ecosystems consists of polymeric, high molecular weight (HMW) compounds (e.g., protein, polysaccharides, lipids), only a small portion of total dissolved organic matter (DOM) is readily utilizable to most marine organisms at higher trophic levels. This means that dissolved organic carbon is not available directly to most marine organisms; marine bacteria introduce this organic carbon into the food web, resulting in additional energy becoming available to higher trophic levels. Recently the term "microbial food web" has been substituted for the term "microbial loop". History Prior to the discovery of the microbial loop, the classic view of marine food webs was one of a linear chain from phytoplankton to nekton. Generally, marine bacteria were not thought to be significant consumers of organic matter (including carbon), although they were known to exist. However, the view of a marine pelagic food web w
https://en.wikipedia.org/wiki/Cyclin-dependent%20kinase%208
Cell division protein kinase 8 is an enzyme that in humans is encoded by the CDK8 gene. Function The protein encoded by this gene is a member of the cyclin-dependent protein kinase (CDK) family. CDK8 and cyclin C associate with the mediator complex and regulate transcription by several mechanisms. CDK8 binds to and/or phosphorylates several transcription factors, which can have an activating or inhibitory effect on transcription factor function. CDK8 phosphorylates the Notch intracellular domain, SREBP, and STAT1 S727. CDK8 also inhibits transcriptional activation by influencing turnover of subunits in the mediator complex tail module. In addition, CDK8 influences binding of RNA polymerase II to the mediator complex. Clinical significance CDK8 is a colorectal cancer oncogene: the CDK8 gene is amplified in human colorectal tumors, activating β-catenin-mediated transcription that drives colon tumorigenesis. However, CDK8 may not be oncogenic in all cell types, and indeed may act as a tumor suppressor in the notch and EGFR signaling pathways. Specifically, CDK8 promotes turnover of the notch intracellular domain, and inhibits EGFR signaling-driven cell fates in C. elegans. Thus, CDK8 may be an oncogene in cancers driven by Wnt/β-catenin signaling, but could instead be a tumor suppressor gene in cancers driven by notch or EGFR signaling. In addition, CDK8 promotes transcriptional activation mediated by the tumor suppressor protein p53, indicating that it may have an important role in tumor suppression Further research is needed to delineate the effects of CDK8 inhibition in different tissues, so for the time being, drugs targeting CDK8 for cancer treatment remain untested in humans. An autosomal dominant syndrome has been described that is associated with mutations in the ATP binding pocket of the kinase domain. The clinical features include agenesis of the corpus callosum, mild to moderate intellectual disability, hypotonia, seizures, hearing or visual impairme
https://en.wikipedia.org/wiki/Candidatus%20Scalindua
"Candidatus Scalindua" is a bacterial genus, and a proposed member of the order Planctomycetales. These bacteria lack peptidoglycan in their cell wall and have a compartmentalized cytoplasm. They are ammonium oxidizing bacteria found in marine environments. Introduction "Candidatus Scalindua" is a bacterial genus, member of the order Planctomycetales. These bacteria lack peptidoglycan in their cell wall and have a compartmentalized cytoplasm. "Candidatus Scalindua" spp. can be further divided into three species: Scalindua brodae, Scalindua wagneri, and Scalindua sorokinii. They are ammonium oxidising bacteria found in marine environments. The genus "Ca. Scalindua" are the most abundant anammox bacteria in marine environments, so they are vital to the Earth's nitrogen cycle. Metabolism Members of the proposed genus Scalindua are anaerobic anammox (ammonium oxidizing) bacteria. The ammonium-oxidizing reaction composes a significant part of the global nitrogen cycle; by some estimates it is the cause of up to 50% of total nitrogen turnover in marine environments. It consists of the oxidization of ammonium using nitrite as an electron acceptor (both are fixed nitrogen) and subsequent generation of nitrogen gas: “NH4+ + NO2− = N2 + 2H2O (ΔG° = -357 kj mol-1)” This reaction uses nitrite (NO2−) as a terminal electron acceptor to produce nitric oxide (NO), which is then combined with ammonium (NH4+) to produce the intermediate hydrazine (N2H4) and water (H2O). Hydrazine, a very reactive molecule also used for rocket fuel, is then oxidized into nitrogen gas (N2). The half reactions may be represented as: “NO2− + 2H+ + e− = NO + H2O (E° = +0.38V) NO + NH4+ + 2H+ + 3e− = N2H4 + H2O (E° = +0.06V) N2H4 = N2 + 4H+ + 4e− (E° = -0.75V)” This metabolic pathway occurs anaerobically, something that was once considered impossible as ammonium was thought to be inert in the absence of oxygen. In fact, the presence of oxygen over 2 μM inhibits the anammox pathway, which is why
https://en.wikipedia.org/wiki/Egg%20drop%20competition
The egg drop contest is an experiment usually performed by college or primary school students. Competitors typically attempt to create a device that can keep a raw chicken egg intact when dropped from a height. Students are asked to build a device made from a limited or unlimited amount of materials to support an egg when dropped from various heights. Naked egg drop A variation of the egg drop competition is the naked egg drop, in which an exposed raw egg is dropped into a container below that must catch the egg and keep it from breaking. Egg hurls Another common variation on the egg drop competition is the egg hurl competition, where the containers are hurled by a device such as a trebuchet or air cannon. This variation is often used by schools that lack tall places from which to drop the containers. The egg hurl variation adds additional difficulties to the design of the container, since it is initially hurled at high speed and has to cope with horizontal as well as vertical velocities upon landing. Regional competitions Often schools work together to make larger competitions that pit more students against each other. One of the larger regional egg drop competitions is the Winston-Salem / Forsyth County Egg Drop Competition that takes place during Engineers Week (late February) each year. Egg drop is one of 18 events in the North Carolina Science Olympiad elementary competition. More than 100 teams compete in this annual competition. See also Egg tossing
https://en.wikipedia.org/wiki/Shannon%E2%80%93Fano%20coding
In the field of data compression, Shannon–Fano coding, named after Claude Shannon and Robert Fano, is a name given to two different but related techniques for constructing a prefix code based on a set of symbols and their probabilities (estimated or measured). Shannon's method chooses a prefix code where a source symbol is given the codeword length . One common way of choosing the codewords uses the binary expansion of the cumulative probabilities. This method was proposed in Shannon's "A Mathematical Theory of Communication" (1948), his article introducing the field of information theory. Fano's method divides the source symbols into two sets ("0" and "1") with probabilities as close to 1/2 as possible. Then those sets are themselves divided in two, and so on, until each set contains only one symbol. The codeword for that symbol is the string of "0"s and "1"s that records which half of the divides it fell on. This method was proposed in a later (in print) technical report by Fano (1949). Shannon–Fano codes are suboptimal in the sense that they do not always achieve the lowest possible expected codeword length, as Huffman coding does. However, Shannon–Fano codes have an expected codeword length within 1 bit of optimal. Fano's method usually produces encoding with shorter expected lengths than Shannon's method. However, Shannon's method is easier to analyse theoretically. Shannon–Fano coding should not be confused with Shannon–Fano–Elias coding (also known as Elias coding), the precursor to arithmetic coding. Naming Regarding the confusion in the two different codes being referred to by the same name, Krajči et al. write: Around 1948, both Claude E. Shannon (1948) and Robert M. Fano (1949) independently proposed two different source coding algorithms for an efficient description of a discrete memoryless source. Unfortunately, in spite of being different, both schemes became known under the same name Shannon–Fano coding. There are several reasons for this m
https://en.wikipedia.org/wiki/Shekel%20sign
The shekel sign ⟨₪⟩ is a currency sign used for the Israeli new shekel, which is the currency of Israel. Israeli new shekel (1986–present) The Israeli new shekel (, ), also known by the acronym NIS ( ), was announced officially on 22 September 1985, when the first new shekel banknotes and coins were introduced. It is constructed by combining the two Hebrew letters that constitute the acronym (the first letter of each of the two words, Hebrew being written from right to left): ⟨ש⟩ and ⟨ח⟩. Sometimes the ⟨₪⟩ symbol (Unicode 20AA) is used following the number, other times the acronym . The shekel sign, like the dollar sign ⟨$⟩, is usually placed left of the number (i.e. "₪12,000" and not "12,000₪"), but since Hebrew is written from right to left, this means that the symbol is actually written after the number. It is either not separated from the preceding number, or is separated only by a thin space. According to the Academy of the Hebrew Language recommendation for writing numbers in Hebrew, the sign should be written to the left of the number without a space between them. Unlike the dollar sign, the new shekel sign is not used that often when handwriting monetary amounts. The road sign announcing the entrance to an Israeli toll road, such as Highway 6 or the Carmel Tunnels, is a shekel symbol with a road in the background. Unicode and input The symbol has the Unicode code point . It has been in Unicode since June 1993, version 1.1.0. Under the Unicode bidirectional algorithm, typing the sign after the number will cause it to be displayed to the right of the number in any text directions. This contradicts the recommendation of the Academy of the Hebrew Language to place the sign to the left of the number in the Hebrew caption. Using the standard Hebrew keyboard (SI 1452), it must be typed as (the letter ש appears on the same key in regular Hebrew mode). The Shekel sign, however, is not engraved on most keyboards sold in Israel and the sign is rarely used in
https://en.wikipedia.org/wiki/Mucoadhesion
Mucoadhesion describes the attractive forces between a biological material and mucus or mucous membrane. Mucous membranes adhere to epithelial surfaces such as the gastrointestinal tract (GI-tract), the vagina, the lung, the eye, etc. They are generally hydrophilic as they contain many hydrogen macromolecules due to the large amount of water (approximately 95%) within its composition. However, mucin also contains glycoproteins that enable the formation of a gel-like substance. Understanding the hydrophilic bonding and adhesion mechanisms of mucus to biological material is of utmost importance in order to produce the most efficient applications. For example, in drug delivery systems, the mucus layer must be penetrated in order to effectively transport micro- or nanosized drug particles into the body. Bioadhesion is the mechanism by which two biological materials are held together by interfacial forces. The mucoadhesive properties of polymers can be evaluated via rheological synergism studies with freshly isolated mucus, tensile studies and mucosal residence time studies. Results obtained with these in vitro methods show a high correlation with results obtained in humans. Mucoadhesive bondings Mucoadhesion involves several types of bonding mechanisms, and it is the interaction between each process that allows for the adhesive process. The major categories are wetting theory, adsorption theory, diffusion theory, electrostatic theory, and fracture theory. Specific processes include mechanical interlocking, electrostatic, diffusion interpenetration, adsorption and fracture processes. Bonding mechanisms Wetting theory: Wetting is the oldest and most prevalent theory of adhesion. The adhesive components in a liquid solution anchor themselves in irregularities on the substrate and eventually harden, providing sites on which to adhere. Surface tension effects restrict the movement of the adhesive along the surface of the substrate, and is related to the thermodynamic wor
https://en.wikipedia.org/wiki/Excerebration
Excerebration is an ancient Egyptian mummification procedure of removal of the brain from corpses prior to actual embalming. Greek writer Herodotus, a frequent visitor to Egypt, wrote in the fifth century B.C. about the process, "Having agreed on a price, the bearers go away, and the workmen, left alone in their place, embalm the body. If they do this in a perfect way, they first draw out part of the brain through the nostrils with an iron hook, and inject certain drugs into the rest". An object more than 6.8 inches long, probably made from plants in the group Monocotyledon (including palm and bamboo), would have been used for liquefying and removing the brain. The instrument would be inserted through a hole punched into the ethmoid bone near the nose via a chisel. Some parts of the brain would be wrapped around this stick and pulled out, and the other parts would be liquefied. In order to drain the remaining liquified brain and cerebral fluid the individual would be put on their abdomen or their head would be lifted. Evolution of Excerebration Excerebration can be traced back to the Old Kingdom through Greco-Roman Egypt. The evidence of excerebration consists primarily of skull perforations. During the Old and Middle Kingdom there was a low frequency of skull perforations, leading some authors to hypothesize an alternative entrance via the foramen magnum. In skulls from the New Kingdom the primary entrance was transnasal. Over the millennia excerebration has changed. In the Old and Middle Kingdoms a transethmoidal excerebration was the standard. With the assistance of modern technology and CT scanning more evidence has arisen as to where in the skull excerebration occurred. Through CT scans it has been determined that over time the transethmoidal approach was shifted towards a transsphenoidal approach. However, there is also evidence of a combined transethmoidal-transsphenoidal excerebration that could have been used in the Third Intermediate Period. Religious
https://en.wikipedia.org/wiki/Linux%20for%20PlayStation%202
Linux for PlayStation 2 (or PS2 Linux) is a kit released by Sony Computer Entertainment in 2002 that allows the PlayStation 2 console to be used as a personal computer. It included a Linux-based operating system, a USB keyboard and mouse, a VGA adapter, a PS2 network adapter (Ethernet only), and a 40 GB hard disk drive (HDD). An 8 MB memory card is required; it must be formatted during installation, erasing all data previously saved on it, though afterwards the remaining space may be used for savegames. It is strongly recommended that a user of Linux for PlayStation 2 have some basic knowledge of Linux before installing and using it, due to the command-line interface for installation. The official site for the project was closed at the end of October 2009 and communities like ps2dev are no longer active. Capabilities The Linux Kit turns the PlayStation 2 into a full-fledged computer system, but it does not allow for use of the DVD-ROM drive except to read PS1 and PS2 discs due to piracy concerns by Sony. Although the HDD included with the Linux Kit is not compatible with PlayStation 2 games, reformatting the HDD with the utility disc provided with the retail HDD enables use with PlayStation 2 games but erases PS2 Linux, though there is a driver that allows PS2 Linux to operate once copied onto the APA partition created by the utility disc. The Network Adapter included with the kit only supports Ethernet; a driver is available to enable modem support if the retail Network Adapter (which includes a built-in V.90 modem) is used. The kit supports display on RGB monitors (with sync-on-green) using a VGA cable provided with the Linux Kit, or television sets with the normal cable included with the PlayStation 2 unit. The PS2 Linux distribution is based on , a Japanese distribution itself based on Red Hat Linux. PS2 Linux is similar to Red Hat Linux 6, and has most of the features one might expect in a Red Hat Linux 6 system. The stock kernel is Linux 2.2.1 (although
https://en.wikipedia.org/wiki/Dennard%20scaling
In semiconductor electronics, Dennard scaling, also known as MOSFET scaling, is a scaling law which states roughly that, as transistors get smaller, their power density stays constant, so that the power use stays in proportion with area; both voltage and current scale (downward) with length. The law, originally formulated for MOSFETs, is based on a 1974 paper co-authored by Robert H. Dennard, after whom it is named. Derivation Dennard's model of MOSFET scaling implies that, with every technology generation: Transistor dimensions could be scaled by −30% (0.7×). This has the following effects simultaneously: The area of an individual device reduces by 50%, because area is length times width. The capacitance associated with the device, C, is reduced by 30% (0.7×), because capacitance varies with area over distance. To keep the electric field unchanged, the voltage, V, is reduced by 30% (0.7×), because voltage is field times length. Characteristics such as current and transition time are likewise scaled down by 30%, due to their relationship with capacitance and voltage. Overall circuit delay is assumed to be dominated by transition time, so it too is reduced by 30%. The above effects lead to an increase in operating frequency, f, by about 40% (1.4×), because frequency varies with one over delay. Power consumption of an individual transistor decreases by 50%, because active power is CV2f. Therefore, in every technology generation, the area and power consumption of individual transistors is halved. In other words, if the transistor density doubles, power consumption (with twice the number of transistors) stays the same. Relation with Moore's law and computing performance Moore's law says that the number of transistors doubles approximately every two years. Combined with Dennard scaling, this means that performance per joule grows even faster, doubling about every 18 months (1.5 years). This trend is sometimes referred to as Koomey's law. The rate of doubling
https://en.wikipedia.org/wiki/Rich%20client
In computer networking, a rich client (also called heavy, fat or thick client) is a computer (a "client" in client–server network architecture) that typically provides rich functionality independent of the central server. This kind of computer was originally known as just a "client" or "thick client," in contrast with "thin client", which describes a computer heavily dependent on a server's applications. A rich client may be described as having a rich user interaction. While a rich client still requires at least periodic connection to a network or central server , it is often characterised by the ability to perform many functions without a connection. In contrast, a thin client generally does as little processing as possible on the client, relying on access to the server each time input data needs to be processed or validated. Introduction The designer of a client–server application decides which parts of the task should be executed on the client, and which on the server. This decision can crucially affect the cost of clients and servers, the robustness and security of the application as a whole, and the flexibility of the design to later modification or porting. The characteristics of the user interface often force the decision on a designer. For instance, a drawing package could require download of an initial image from a server, and allow all edits to be made locally, returning the revised drawing to the server upon completion. This would require a rich client and might be characterised by a long delay to start and stop (while a whole complex drawing was transferred), but quick to edit. Conversely, a thin client could download just the visible parts of the drawing at the beginning and send each change back to the server to update the drawing. This might be characterised by a short start-up time, but a tediously slow editing process. History The original server clients were simple text display terminals including Wyse VDUs, and rich clients were genera
https://en.wikipedia.org/wiki/Iron%20dependent%20repressor
In molecular biology, the iron dependent repressors are a family of bacterial and archaeal transcriptional repressors. At their N-terminus they contain a dtxR-type HTH domain. This is a DNA-binding, winged helix-turn-helix (wHTH) domain of about 65 amino acids present in metalloregulators of the dtxR/mntR family. The domain is named after Corynebacterium diphtheriae dtxR, an iron-specific diphtheria toxin repressor, and Bacillus subtilis mntR, a manganese transport regulator. Iron-responsive metalloregulators such as dtxR and ideR occur in Gram-positive bacteria of the high GC branch, while manganese-responsive metalloregulators like mntR are described in diverse genera of Gram-positive and Gram-negative bacteria and also in Archaea. The metalloregulators like dtxR/mntR contain the DNA-binding dtxR-type HTHdomain usually in the N-terminal part. The C-terminal part contains a dimerisation domain with two metal-binding sites, although the primary metal-binding site is less conserved in the Mn(II)-regulators. Fe(II)-regulated proteins contain an SH3-like domain as a C-terminal extension, which is absent in Mn(II)-regulated mntR. Metal-ion dependent regulators orchestrate the virulence of several important human pathogens. The dtxR protein regulates the expression of diphtheria toxin in response to environmental iron concentrations. Furthermore, dtxR and ideR control iron uptake. Homeostasis of manganese, which is an essential nutrient, is regulated by mntR. A typical dtxR-type metalloregulator binds two divalent metal effectors per monomer, upon which allosteric changes occur that moderate binding to the cognate DNA operators. Iron-bound dtxR homodimers bind to an interrupted palindrome of 19 bp, protecting a sequence of ~30 bp. The crystal structures of iron-regulated and manganese-regulated repressors show that the DNA binding domain contains three alpha-helices and a pair of antiparallel beta-strands. Helices 2 and 3 comprise the helix-turn-helix motif and the bet
https://en.wikipedia.org/wiki/Genome%20News%20Network
The Genome News Network (abbreviated GNN) is an online magazine that publishes news articles and educational resources about genomics and medicine. It was founded in 1999, with Barbara Culliton as the founding editor-in-chief. It was originally published by Celera Genomics. In 2001, the Institute for Genomic Research became the magazine's new publisher. An article published in the Lancet Oncology that year stated that the magazine "...offers news, original articles, the online reference book, What’s a genome?, and primers on sequencing and assembling the genome – all well written and illustrated". As of 2010, new issues of the magazine were published biweekly.
https://en.wikipedia.org/wiki/Flag%20signals
Flag signals can mean any of various methods of using flags or pennants to send signals. Flags may have individual significance as signals, or two or more flags may be manipulated so that their relative positions convey symbols. Flag signals allowed communication at a distance before the invention of radio and are still used especially in connection with ships. Flaghoist signalling Flaghoist signalling is one or more flags (or pennants) simultaneously flying from a fixed halyard, and generally any method of signaling by such means. Each of the flags has a distinct shape and color combination. Each flag or combination of flags has a preassigned meaning or "code". The International Code of Signals defines a standard set of flags and associated alphabet suitable for international use, as well as a set of standard codes. Flaghoist is also used in boat racing, to warn of impending severe weather, and other specialized applications. Maritime flag signalling has a long history, especially prior to the advent of radio, and remains the preferred means of signaling in many situations. In naval flag signalling, additional flags and an expanded list of signals are used for identification and commands, as well as the mercantile uses. Many navies have their own proprietary or secret codes, and use additional flags. A designator flag is used to indicate if a flaghoist signal is meant to be interpreted as an ICS signal or as a naval signal. The U.S. Navy uses a set of 68 flags, including flags for each letter of the alphabet and each numeral to convey messages of tactical or administrative nature. Semaphore Flag semaphore signalling uses two flags, held in specific positions to signify letters. This method requires simple equipment but can be obscured by bad weather. A permanently installed chain of semaphore stations is a semaphore line and before the invention of the electric telegraph, was the fastest means of communication over moderately long distances. Wig-wag flags
https://en.wikipedia.org/wiki/WDCN-LD
WDCN-LD (channel 6), branded on air as DC 87.7FM, is a low-power television station licensed to Fairfax, Virginia, United States, serving the Washington, D.C., metropolitan area. Owned by Signal Above LLC, WDCN-LD markets itself as a conventional FM radio station, broadcasting Spanish contemporary hits. WDCN-LD has its studios on Old Gallows Road in Tysons. The transmitter is on Lee Highway (US 29) near Interstate 495 (The Capital Beltway) in Merrifield. History Channel 6 In the analog television era, stations on television channel 6 broadcast an FM audio signal at 87.75 MHz which is receivable by ordinary FM radios. These stations, colloquially known as "Franken-FMs", took advantage of this fact and a loophole in Federal Communications Commission (FCC) regulations that only require a television station to broadcast some kind of video content, not that the video and audio content are related. Low-powered analog stations were exempt from the 2009 digital television transition, allowing WDCN-LP to continue operating as a Franken-FM. However, the later set a 2021 deadline for all low-powered stations to cease operating in analog. Several Franken-FMs proposed experimentally embedding an FM carrier at 87.7 MHz inside an ATSC 3.0 signal, which tests later showed to be technically feasible; the FCC initially allowed this under special temporary authority grants, provided the stations broadcast at least one accompanying television service, and the FM and television signals had similar coverage. On July 20, 2023, an FCC "Report and Order" included this station as one of 13 "FM6" stations allowed to continue to operate an FM radio broadcast, as a "ancillary or supplementary" service. Switch to digital WDCN-LP signed off on July 13, 2021, the day on which the FCC ended all analog television operation nationwide. It restarted operations on October 5, 2021, carrying The Country Network and the embedded FM signal. WDCN-LP previously simulcast on co-owned WOWZ-LP, another lo
https://en.wikipedia.org/wiki/Occupational%20therapy%20in%20the%20management%20of%20seasonal%20affective%20disorder
Occupational therapy is used to manage the issues caused by seasonal affective disorder (SAD). Occupational therapists assist with the management of SAD through the incorporation of a variety of healthcare disciplines into therapeutic practice. Potential patients with SAD are assessed, treated, and evaluated primarily using treatments such as drug therapies, light therapies, and psychological therapies. Therapists are often involved in designing an individualised treatment plan that most effectively meets the client's goals and needs around their responsiveness to a variety of treatments. Occupational therapists often have the primary responsibility of informing individuals with SAD of the etiology, prevalence, symptoms, and occupational performance issues caused by the disorder, as well as possibilities for positive intervention. The main symptom of SAD targeted is low energy levels, remedied with fatigue management and energy conservation strategies. Biomedical approaches The most common biomedical approaches used by occupational therapists in the treatment of SAD are light therapy; the use of exposure to various types of light, and pharmacotherapy. Light therapy Bright light therapy, commonly referred to as phototherapy, has been documented in multiple studies to be an effective treatment of SAD. A study completed in 2009 revealed that as little as twenty minutes of light exposure can improve the mood of those with SAD. Additionally, it has been found that bright light (at a minimum of 2500 lux "at eye level") has a higher rate of effectiveness than dimmer light levels in protecting against the "mood lowering" symptom that is characteristic of SAD. Due to its high success rates, it is regarded as a first-line treatment for SAD in Canadian, American, and international clinical guidelines. The most widely available method of administering phototherapy to those exhibiting symptoms of SAD is through a light therapy box, which is a commercially available device
https://en.wikipedia.org/wiki/Albert%20Rakoto%20Ratsimamanga
Albert Rakoto Ratsimamanga (28 December 1907 – 16 September 2001) was a Malagasy physician, biochemist and diplomat. Born into a disgraced royal family; Ratsimamanga trained as a doctor of exotic medicine in French Madagascar and France, where he pioneered modern nutraceuticals. Ratsimamanga returned to Madagascar and, with his wife, Suzanne Urverg-Ratsimamanga, in 1957, established the which specialised in herbal medicine. While in France, Ratsimamanga was involved in Madagascar's independence efforts, and after independence, he became the Malagasy Republic's first ambassador to France and helped shape its foreign affairs. Ratsimamanga is considered one of Madagascar's most renowned scholars and bestowed upon him the highest orders of merits nationally and internationally. He was also one of the founders of The World Academy of Sciences (1983) and the African Academy of Sciences (1985), and was selected Madagascar's Man of the Century. Early life and education Albert Rakoto Ratsimamanga was born on 28 December 1907, in Antananarivo, Madagascar, to Razanadrakoto Ratsimamanga and Lala Ralisoa. He was the grandson of Prince Ratsimamanga, uncle and advisor to Queen Ranavalona III, who was executed in 1897 at the beginning of the French colonisation of Madagascar. When Albert was only eleven years old, his father died in 1918 from heavy drinking. He received his early education at the Faculty of Medicine, University of Antananarivo, until he became a doctor of Indigenous Medicine in 1924. Ratsimamanga was a member of the Malagasy delegation to the 1930 Colonial Exhibition in Paris, during which he decided to join the University of Paris to become a Doctor of Science (MS) and a Doctor of Medicine (MD). He also graduated from the Institute of Exotic Medicine and the Pasteur Institut, and founded the association of Malagasy Students in France. Career Research Ratsimamanga started working at the French National Centre for Scientific Research (CNRS) in 1945 after he
https://en.wikipedia.org/wiki/204%20%28number%29
204 (two hundred [and] four) is the natural number following 203 and preceding 205. In mathematics 204 is a refactorable number. 204 is a square pyramidal number: 204 balls may be stacked in a pyramid whose base is an 8 × 8 square. Its square, 2042 = 41616, is the fourth square triangular number. As a figurate number, 204 is also a nonagonal number and a truncated triangular pyramid number. 204 is a member of the Mian-Chowla sequence. There are exactly 204 irreducible quintic polynomials over a four-element field, exactly 204 ways to place three non-attacking chess queens on a 5 × 5 board, exactly 204 squares of an infinite chess move that are eight knight's moves from the center, exactly 204 strings of length 11 over a three-letter alphabet with no consecutively-repeated substring, and exactly 204 ways of immersing an oriented circle into the oriented plane so that it has four double points. Both 204 and its square are sums of a pair of twin primes: 204 = 101 + 103 and 2042 = 41616 = 20807 + 20809. The only smaller numbers with the same property are 12 and 84. 204 is a sum of all the perfect squares from 1 to 64 (i.e. 12 + 22 + 32 + 42 + 52 + 62 + 72 + 82 = 204). In other fields In telecommunications, area code 204 is a North American telephone area code for the Canadian province of Manitoba. 204 is one of the original 86 area codes assigned in 1947 in the contiguous United States and the then-nine-province extent of Canada. More recently a second area code (431) was added to allow for the expanding phone number distribution within the province. 204 is the HTTP status code indicating the request was successfully fulfilled and that there is no additional content to send in the response payload body. In a poker deck with a single wild joker, there are 204 hands that are at least as good as a straight flush. Model 204 is a database management system.
https://en.wikipedia.org/wiki/Electronicam
Electronicam was a television recording system that shot an image on film and television at the same time through a common lens. It was developed by James L. Caddigan for the DuMont Television Network in the 1950s, before electronic recording on videotape was available. Since the film directly captured the live scene, its quality was much higher than the commonly used kinescope films, which were shot from a TV screen. How it worked The image passes through a lens into a beam splitter that sends half the light to a 35 mm or 16 mm camera mounted on the right side of the television camera. The other half of the light passes to the other side, through a 45-degree angle mirror and into a video camera tube. Because the camera dollies had to support two cameras—one conventional electronic "image orthicon" TV camera tube, and one 35mm motion picture camera—the system was bulky and heavy, and somewhat clumsy in operation. This made complex productions problematic. Single-stage shows, such as The Honeymooners, were relatively easy since they had few sets and generally small casts. In the studio, when two or three Electronicam cameras were used, a kinescope system recorded the live feed (as broadcast), so the Electronicam films could later be edited to match. The audio was recorded separately, onto either a magnetic fullcoat (1952, and all later) or as an optical soundtrack negative (pre-1952). Usage The DuMont Television Network used Electronicams in 1955 to produce most of its studio-based programming since it had (except for occasional sports events) discontinued use of coaxial cable and microwave links to connect stations. Stations were sent films of shows for broadcast. The "Classic 39" episodes of The Honeymooners aired during the 1955–56 television season on CBS were shot with Electronicams, which meant they could be rerun on broadcast TV and eventually transferred to home video. Without Electronicams, the half-hour The Honeymooners episodes in the 1955-56 season
https://en.wikipedia.org/wiki/25th%20meridian%20west%20from%20Washington
The 25th meridian of longitude west from Washington is a line of longitude approximately 102.05 degrees west of the Prime Meridian of Greenwich. In the United States of America, the meridian 25 degrees west of the Washington Meridian defines the eastern boundary of the State of Colorado, the western boundary of the State of Kansas, and the western boundary of the State of Nebraska south of the 41st parallel north. History On January 1, 1861, the Act Admitting the State of Kansas to the Union defined the western boundary of the new state as the 25th meridian of longitude west from Washington. This rendered the western portion of the Territory of Kansas unorganized. Thirty days later on February 28, 1861, the Act Organizing the Territory of Colorado defined the eastern boundary of the new territory as the 25th meridian of longitude west from Washington. The creation of the Colorado Territory moved the western boundary of the Territory of Nebraska south of the 41st parallel north east to this meridian. These boundaries on the 25th meridian of longitude west from Washington remained when Nebraska became a state on March 1, 1867, and Colorado became a state on August 1, 1876. Longitude in the United States Latitude and longitude uniquely describe the location of any point on Earth. Latitude may be simply calculated from astronomical or solar observation, either at land or sea, interrupted only by cloudy skies. Longitude, on the other hand, requires both astronomical or solar observation and some form of time reference to a longitude reference point. John Harrison produced the first precise marine chronometer in 1761. The completion of the first North American telegraph line between Washington, D.C. and Baltimore on May 24, 1844, introduced a technology that could transmit time signals at a large fraction of the speed of light. On September 28, 1850, the United States adopted two primary meridians of longitude for officially use: the Greenwich Meridian (thr
https://en.wikipedia.org/wiki/Stylomastoid%20foramen
The stylomastoid foramen is a foramen between the styloid and mastoid processes of the temporal bone of the skull. It is the termination of the facial canal, and transmits the facial nerve, and stylomastoid artery. Facial nerve inflammation in the stylomastoid foramen may cause Bell's palsy. Structure The stylomastoid foramen is between the styloid and mastoid processes of the temporal bone. The average distance between the opening of the stylomastoid foramen and the styloid process is around 0.7 mm or 0.8 mm in adults, but may decrease to around 0.2 mm during aging. The stylomastoid foramen transmits the facial nerve, and the stylomastoid artery. These 2 structures lie directly next to each other. Clinical significance Bell's palsy can result from inflammation of the facial nerve where it leaves the skull at the stylomastoid foramen. Patients with Bell's palsy appear with facial drooping on the affected side. Additional images
https://en.wikipedia.org/wiki/Paktor
Paktor is a location-based dating and networking mobile application that connects mutually interested users and allows them to chat individually or as a group. Founded in Singapore, the app was launched in June 2013, and has over 5 billion swipes to date (October 2015). In late 2013, Paktor launched a subsidiary called GaiGai, an offline dating service that focuses on match-making and dating events. The word 'Paktor' originates from the Cantonese word for 'dating' (Chinese character 拍拖). History Founding Paktor was founded by Joseph Phua and Ng Jing Shen. Paktor was first launched in Singapore in June 2013. Despite the immature market, there was a lot of interest from consumers and according to a Paktor newsletter, there were 250000 matches in the first 2 weeks of 2014. The company also shared that it had received over 100 million profile ratings at that time. The app is also available in Taiwan, Malaysia, Indonesia, Vietnam, Thailand, and South Korea. In February 2017, Paktor acquired dating apps DOWN, Goodnight, and Groopify, folding them into Paktor Labs, a social app accelerator. Change of Management In November 2017, Paktor Group appointed co-founder and chief technology officer Ng Jing Shen as CEO of Paktor Group, taking over from current CEO Joseph Phua. Phua remained in the group CEO of M17 Entertainment which was formed after the merger of Paktor and 17 Media. The company also promoted current head of operations Shn Juay to Chief Operating Officer at Paktor Group. In 2018, M17 Entertainment sold DOWN, the United States-based dating application, back to its founder Colin Hodge. Company Overview Financials In March 2014, Paktor revealed its first round of funding with a US$500,000 pre-Series-A round that valued the brand at US$6.5 million. At this time, co-founder and CEO Joseph Phua was quoted as saying that the app was “easily 10-20 times ahead of the next player” referring to their main markets; Singapore, Malaysia, Vietnam, Thailand, Taiwan a
https://en.wikipedia.org/wiki/Law%20of%20sines
In trigonometry, the law of sines, sine law, sine formula, or sine rule is an equation relating the lengths of the sides of any triangle to the sines of its angles. According to the law, where , and are the lengths of the sides of a triangle, and , and are the opposite angles (see figure 2), while is the radius of the triangle's circumcircle. When the last part of the equation is not used, the law is sometimes stated using the reciprocals; The law of sines can be used to compute the remaining sides of a triangle when two angles and a side are known—a technique known as triangulation. It can also be used when two sides and one of the non-enclosed angles are known. In some such cases, the triangle is not uniquely determined by this data (called the ambiguous case) and the technique gives two possible values for the enclosed angle. The law of sines is one of two trigonometric equations commonly applied to find lengths and angles in scalene triangles, with the other being the law of cosines. The law of sines can be generalized to higher dimensions on surfaces with constant curvature. History H.J.J. Wilson's book Eastern Science states that the 7th century Indian mathematician Brahmagupta describes what we now know as the law of sines in his astronomical treatise Brāhmasphuṭasiddhānta. In his partial translation of this work, Colebrooke translates Brahmagupta's statement of the sine rule as: The product of the two sides of a triangle, divided by twice the perpendicular, is the central line; and the double of this is the diameter of the central line. According to Ubiratàn D'Ambrosio and Helaine Selin, the spherical law of sines was discovered in the 10th century. It is variously attributed to Abu-Mahmud Khojandi, Abu al-Wafa' Buzjani, Nasir al-Din al-Tusi and Abu Nasr Mansur. Ibn Muʿādh al-Jayyānī's The book of unknown arcs of a sphere in the 11th century contains the spherical law of sines. The plane law of sines was later stated in the 13th century by Nasīr a
https://en.wikipedia.org/wiki/Radiobinding%20assay
A radiobinding assay is a method of detecting and quantifying antibodies targeted toward a specific antigen. As such, it can be seen as the inverse of radioimmunoassay, which quantifies an antigen by use of corresponding antibodies. Technique The corresponding antigen is radiolabeled and mixed with the fluid that may contain the antibody, such as blood serum from a person. Presence of antibodies causes precipitation of antibody-antigen complexes that can be collected by centrifugation into pellets. The amount of antibody is proportional to the radioactivity of the pellet, as determined by gamma counting. Uses It is used to detect most autoantibodies seen in latent autoimmune diabetes.
https://en.wikipedia.org/wiki/Caccioppoli%20set
In mathematics, a Caccioppoli set is a set whose boundary is measurable and has (at least locally) a finite measure. A synonym is set of (locally) finite perimeter. Basically, a set is a Caccioppoli set if its characteristic function is a function of bounded variation. History The basic concept of a Caccioppoli set was first introduced by the Italian mathematician Renato Caccioppoli in the paper : considering a plane set or a surface defined on an open set in the plane, he defined their measure or area as the total variation in the sense of Tonelli of their defining functions, i.e. of their parametric equations, provided this quantity was bounded. The measure of the boundary of a set was defined as a functional, precisely a set function, for the first time: also, being defined on open sets, it can be defined on all Borel sets and its value can be approximated by the values it takes on an increasing net of subsets. Another clearly stated (and demonstrated) property of this functional was its lower semi-continuity. In the paper , he precised by using a triangular mesh as an increasing net approximating the open domain, defining positive and negative variations whose sum is the total variation, i.e. the area functional. His inspiring point of view, as he explicitly admitted, was those of Giuseppe Peano, as expressed by the Peano-Jordan Measure: to associate to every portion of a surface an oriented plane area in a similar way as an approximating chord is associated to a curve. Also, another theme found in this theory was the extension of a functional from a subspace to the whole ambient space: the use of theorems generalizing the Hahn–Banach theorem is frequently encountered in Caccioppoli research. However, the restricted meaning of total variation in the sense of Tonelli added much complication to the formal development of the theory, and the use of a parametric description of the sets restricted its scope. Lamberto Cesari introduced the "right" generalization
https://en.wikipedia.org/wiki/List%20of%20installation%20software
The following is a list of applications for building installation programs, organized by platform support. Cross-platform Linux Windows macOS AmigaOS See also List of software package management systems
https://en.wikipedia.org/wiki/Absolute%20horizon
In general relativity, an absolute horizon is a boundary in spacetime, defined with respect to the external universe, inside which events cannot affect an external observer. Light emitted inside the horizon can never reach the observer, and anything that passes through the horizon from the observer's side is never seen again by the observer. An absolute horizon is thought of as the boundary of a black hole. In the context of black holes, the absolute horizon is generally referred to as an event horizon, though this is often used as a more general term for all types of horizons. The absolute horizon is just one type of horizon. For example, important distinctions must be made between absolute horizons and apparent horizons; the notion of a horizon in general relativity is subtle, and depends on fine distinctions. Definition An absolute horizon is only defined in an asymptotically flat spacetime – a spacetime which approaches flat space as one moves far away from any massive bodies. Examples of asymptotically flat spacetimes include Schwarzschild and Kerr black holes. The FRW universe – which is believed to be a good model for our universe – is generally not asymptotically flat. Nonetheless, we can think of an isolated object in an FRW universe as being nearly an isolated object in an asymptotically flat universe. The particular feature of asymptotic flatness which is needed is a notion of "future null infinity". This is the set of points which are approached asymptotically by null rays (light rays, for example) which can escape to infinity. This is the technical meaning of "external universe". These points are only defined in an asymptotically flat universe. An absolute horizon is defined as the past null cone of future null infinity. Nature of the absolute horizon The definition of an absolute horizon is sometimes referred to as teleological, meaning that it cannot be known where the absolute horizon is without knowing the entire evolution of the universe, incl
https://en.wikipedia.org/wiki/F.%20and%20M.%20Riesz%20theorem
In mathematics, the F. and M. Riesz theorem is a result of the brothers Frigyes Riesz and Marcel Riesz, on analytic measures. It states that for a measure μ on the circle, any part of μ that is not absolutely continuous with respect to the Lebesgue measure dθ can be detected by means of Fourier coefficients. More precisely, it states that if the Fourier–Stieltjes coefficients of satisfy for all , then μ is absolutely continuous with respect to dθ. The original statements are rather different (see Zygmund, Trigonometric Series, VII.8). The formulation here is as in Walter Rudin, Real and Complex Analysis, p.335. The proof given uses the Poisson kernel and the existence of boundary values for the Hardy space H1. Expansions to this theorem were made by James E. Weatherbee in his 1968 dissertation: Some Extensions Of The F. And M. Riesz Theorem On Absolutely Continuous Measures.
https://en.wikipedia.org/wiki/Listing%20number
In mathematics, a Listing number of a topological space is one of several topological invariants introduced by the 19th-century mathematician Johann Benedict Listing and later given this name by Charles Sanders Peirce. Unlike the later invariants given by Bernhard Riemann, the Listing numbers do not form a complete set of invariants: two different two-dimensional manifolds may have the same Listing numbers as each other. There are four Listing numbers associated with a space. The smallest Listing number counts the number of connected components of a space, and is thus equivalent to the zeroth Betti number.
https://en.wikipedia.org/wiki/Ensign%20%28flag%29
The ensign is a maritime flag that is used for the national identification of a ship. The ensign is the largest flag, generally flown at the stern (rear) of the ship while in port. In ports, depending on the ship's origin, it is sometimes identical with a jack on the bow of the ship. Jacks are more common on warships than on merchant ships. Etymology The Middle English is derived from the Latin word . Vexillology In vexillology an ensign is differentiated between a naval ensign (war ensign) and civil ensign (merchant), which both are the original expressions of the national flag. However, in the United Kingdom, Germany and Netherlands a separation between State and Armed ships on the one hand, and unarmed and private vessels was made earlier than in other Nations, see British ensign. Vexillologists distinguish three varieties of a national flag when used as an ensign: A state ensign or government ensign (usage symbol ) is worn by government vessels of official government agencies or civilian equipped auxiliary ships. A naval ensign (usage symbol ) is used by a country's navy as a war flag for military ships, which are enlisted as such. War ensigns do not mean, that the country is at war. It is about the military use. They fall under the law of war and United Nations Convention on the Law of the Sea. Large versions of naval ensigns called battle ensigns are used when a warship goes into battle. The ensign differs from the jack, which is flown from a jackstaff at the bow of a vessel additionally, if they are at the port. A civil ensign (usage symbol ) is worn by merchant and pleasure vessels. The merchant maritime flag or civil ensign is therefore the specific flag for the Merchant navy of a country, unless the (private) owners are authorized to use another. The commercial flag was created to give these private individuals the opportunity to declare their nationality. Some countries have a specific yacht ensign for recreational boats without declared cargo, whi
https://en.wikipedia.org/wiki/Generalized%20Wiener%20filter
The Wiener filter as originally proposed by Norbert Wiener is a signal processing filter which uses knowledge of the statistical properties of both the signal and the noise to reconstruct an optimal estimate of the signal from a noisy one-dimensional time-ordered data stream. The generalized Wiener filter generalizes the same idea beyond the domain of one-dimensional time-ordered signal processing, with two-dimensional image processing being the most common application. Description Consider a data vector which is the sum of independent signal and noise vectors with zero mean and covariances and . The generalized Wiener Filter is the linear operator which minimizes the expected residual between the estimated signal and the true signal, . The that minimizes this is , resulting in the Wiener estimator . In the case of Gaussian distributed signal and noise, this estimator is also the maximum a posteriori estimator. The generalized Wiener filter approaches 1 for signal-dominated parts of the data, and S/N for noise-dominated parts. An often-seen variant expresses the filter in terms of inverse covariances. This is mathematically equivalent, but avoids excessive loss of numerical precision in the presence of high-variance modes. In this formulation, the generalized Wiener filter becomes using the identity . An example The cosmic microwave background (CMB) is a homogeneous and isotropic random field, and its covariance is therefore diagonal in a spherical harmonics basis. Any given observation of the CMB will be noisy, with the noise typically having different statistical properties than the CMB. It could for example be uncorrelated in pixel space. The generalized Wiener filter exploits this difference in behavior to isolate as much as possible of the signal from the noise. The Wiener-filtered estimate of the signal (the CMB in this case) requires the inversion of the usually huge matrix . If S and N were diagonal in the same basis this would be trivial, but of
https://en.wikipedia.org/wiki/Ubuntu%20Unity
Ubuntu Unity is a Linux distribution based on Ubuntu, using the Unity interface in place of Ubuntu's GNOME Shell. The first release was 20.04 LTS on 7 May 2020. Prior to the initial release it had the working names of Unubuntu and Ubuntu Unity Remix. History The Unity interface was originally developed by Canonical and first included as the default interface in Ubuntu 11.04, which was released in April 2011. Unity was developed as an alternative to the GNOME Shell, which replaced the GNOME 2 interface. At that time, Canonical had planned to converge the desktop, cellphone and tablet interfaces into Unity 8, a project that was abandoned in 2017 when Ubuntu moved to the GNOME 3 desktop instead, ending Unity development at version 7, version 8 being incomplete. Ubuntu 17.04 introduced the GNOME 3 desktop in April 2017, but it was not universally accepted by Ubuntu users or developers. A number of forks were proposed, with UBports taking over Unity 8 development for its value as a cellphone interface and renaming it Lomiri in February 2020. In 2019 Canonical gave its approval for the use of trademarks for a Unity 7 Ubuntu remix. Linux Foundation Certified Developer and Ubuntu team member Rudra B. Saraswat, who is based near Bangalore, India, started Ubuntu Unity. He polled users and used a stock Unity 7 interface with the Ubuntu backend and minimal changes otherwise. He included the Nemo file manager as an alternative to GNOME Files and employed the GNOME Display Manager to replace LightDM X display manager. Saraswat had previously created several other Linux distributions, including the server-focused Krob Linux. About his motivations for starting Ubuntu Unity, Saraswat stated, "I had used Ubuntu 17.04 back when I was 8 [years old] and I really loved Unity7, so when Unity7 was discontinued by Canonical, I wasn't happy and wanted to bring it back. I created this project to give Unity7 a new life". Saraswat was ten years old in 2020 when he first released Ubuntu Unit
https://en.wikipedia.org/wiki/French%20standard%20sizes%20for%20oil%20paintings
French standard sizes for oil paintings refers to a series of different sized canvases for use by artists. The sizes were fixed in the 19th century. Most artists—not only French—used this standard, as it was supported by the main suppliers of artist materials. Only some contemporary artist material suppliers continue to use these standards today, as most artists no longer differentiate canvas sizes by subject. The main separation from size 0 (toile de 0) to size 120 (toile de 120) is divided in separate runs for faces/portraits (figure), landscapes (paysage), and marines (marine) which more or less keep the diagonal. That is, a figure 0 corresponds in height to a paysage 1 and a marine 2. In modern times in the USA size is usually stated height by width, where as in this article it is width by height.
https://en.wikipedia.org/wiki/Mendelian%20traits%20in%20humans
Mendelian traits in humans are human traits that are substantially influenced by Mendelian inheritance. Most – if not all – Mendelian traits are also influenced by other genes, the environment, immune responses, and chance. Therefore no trait is purely Mendelian, but many traits are almost entirely Mendelian, including canonical examples, such as those listed below. Purely Mendelian traits are a minority of all traits, since most phenotypic traits exhibit incomplete dominance, codominance, and contributions from many genes. If a trait is genetically influenced, but not well characterized by Mendelian inheritance, it is non-Mendelian. Examples Albinism (recessive) Achondroplasia Alkaptonuria Ataxia telangiectasia Brachydactyly (shortness of fingers and toes) Colour blindness (monochromatism, dichromatism, anomalous trichromatism, tritanopia, deuteranopia, protanopia) Duchenne muscular dystrophy Ectrodactyly Ehlers–Danlos syndrome Fabry disease Galactosemia Gaucher's disease Some forms of Haemophilia Hereditary breast–ovarian cancer syndrome Hereditary nonpolyposis colorectal cancer HFE hereditary haemochromatosis Huntington's disease Hypercholesterolemia Krabbe disease Lactase persistence (dominant) Leber's hereditary optic neuropathy Lesch–Nyhan syndrome Marfan syndrome Niemann–Pick disease Phenylketonuria Porphyria Retinoblastoma Sickle-cell disease Sanfilippo syndrome Tay–Sachs disease Wet (dominant) or dry (recessive) earwax Non-Mendelian traits Most traits (including all complex traits) are non-mendelian. Some traits commonly thought of as Mendelian are not, including: Eye Color Psychiatric diseases Hair color Height
https://en.wikipedia.org/wiki/BRD9
Bromodomain-containing protein 9 is a protein that in humans is encoded by the BRD9 gene. Structure and interaction BRD9 contains a bromodomain. It is closely related to BRD7. BRD9 is present in some SWI/SNF ATPase remodeling complexes. Role in cancer The BRD9 gene is frequently present in variable copy number in lung cancer. Small molecule inhibition Small molecules capable of binding to the bromodomain of BRD9 have been developed. See also Bromodomain
https://en.wikipedia.org/wiki/NARAM
NARAM is the Annual Meet of the National Association of Rocketry (NAR). It is the national contest culminating the rocket contest year, and also includes fun, or "sport," flying of model rockets for those who don't wish to compete. The NAR is the governing body for the sport/hobby of model rocketry in the United States. NARAM is traditionally held the first week of August. History The first NARAM was held in Denver, Colorado, in 1959 hosted by the Mile-HI section (#1). G. Harry Stine served as the contest director. NARAM-2 was hosted by the Peak City Section (#2) in Colorado Springs and the CD was William S. Roe, a co-founder of the NAR. Fifty years later, NARAM-50 was held at Great Meadow in The Plains, Virginia. NARAM-52, in Pueblo, CO was a tribute to William S. Roe. Here is a list of NARAMs by year and location and who was the contest director: NARAM-1, 1959, Denver, CO. Contest Director - G. Harry Stine NARAM-2, 1960, Colorado Springs, CO. Contest Director - William S. Roe NARAM-3, 1961, Denver, CO. Contest Director - J. Delano Hitch NARAM-4, 1962, USAF Academy, CO. Contest Director - Capt. Vernon VanVonderen NARAM-5, 1963, Bedford, MA. Contest Director - Marshall P. Wilder NARAM-6, 1964, Wallops Island, VA. Contest Director - Dr. William B. Rich NARAM-7, 1965, Aberdeen, MD. Contest Director - Howard Galloway NARAM-8, 1966, Clinton Co AFB, OH. Contest Director - G. Harry Stine NARAM-9, 1967, Mankato, MN. Contest Director - Dr. Ellsworth Beech NARAM-10, 1968, Wallops Island, VA. Contest Director - James S. Barrowman NARAM-11, 1969, USAF Academy, CO. Contest Director - William S. Roe NARAM-12, 1970, Houston, TX. Contest Director - Richard Sipes NARAM-13, 1971, Aberdeen, MD. Contest Director - Howard Galloway NARAM-14, 1972, Seattle, WA. Contest Director - Jess Medina NARAM-15, 1973, Columbus, OH. Contest Director - Dr. Gerald Gregorek NARAM-16, 1974, Manassas, VA. Contest Director - Col. Howard Kuhn NARAM-17, 1975, Orlando, FL. Contest D
https://en.wikipedia.org/wiki/Reinforced%20concrete
Reinforced concrete, also called ferroconcrete, is a composite material in which concrete's relatively low tensile strength and ductility are compensated for by the inclusion of reinforcement having higher tensile strength or ductility. The reinforcement is usually, though not necessarily, steel bars (rebar) and is usually embedded passively in the concrete before the concrete sets. However, post-tensioning is also employed as a technique to reinforce the concrete. In terms of volume used annually, it is one of the most common engineering materials. In corrosion engineering terms, when designed correctly, the alkalinity of the concrete protects the steel rebar from corrosion. Description Reinforcing schemes are generally designed to resist tensile stresses in particular regions of the concrete that might cause unacceptable cracking and/or structural failure. Modern reinforced concrete can contain varied reinforcing materials made of steel, polymers or alternate composite material in conjunction with rebar or not. Reinforced concrete may also be permanently stressed (concrete in compression, reinforcement in tension), so as to improve the behavior of the final structure under working loads. In the United States, the most common methods of doing this are known as pre-tensioning and post-tensioning. For a strong, ductile and durable construction the reinforcement needs to have the following properties at least: High relative strength High toleration of tensile strain Good bond to the concrete, irrespective of pH, moisture, and similar factors Thermal compatibility, not causing unacceptable stresses (such as expansion or contraction) in response to changing temperatures. Durability in the concrete environment, irrespective of corrosion or sustained stress for example. History Leaning Tower of Nevyansk in the town of Nevyansk in Sverdlovsk Oblast, Russia is the first building known to use reinforced concrete as a construction method. It was built on the orders
https://en.wikipedia.org/wiki/Sigma%20model
In physics, a sigma model is a field theory that describes the field as a point particle confined to move on a fixed manifold. This manifold can be taken to be any Riemannian manifold, although it is most commonly taken to be either a Lie group or a symmetric space. The model may or may not be quantized. An example of the non-quantized version is the Skyrme model; it cannot be quantized due to non-linearities of power greater than 4. In general, sigma models admit (classical) topological soliton solutions, for example, the Skyrmion for the Skyrme model. When the sigma field is coupled to a gauge field, the resulting model is described by Ginzburg–Landau theory. This article is primarily devoted to the classical field theory of the sigma model; the corresponding quantized theory is presented in the article titled "non-linear sigma model". Overview The sigma model was introduced by ; the name σ-model comes from a field in their model corresponding to a spinless meson called , a scalar meson introduced earlier by Julian Schwinger. The model served as the dominant prototype of spontaneous symmetry breaking of O(4) down to O(3): the three axial generators broken are the simplest manifestation of chiral symmetry breaking, the surviving unbroken O(3) representing isospin. In conventional particle physics settings, the field is generally taken to be SU(N), or the vector subspace of quotient of the product of left and right chiral fields. In condensed matter theories, the field is taken to be O(N). For the rotation group O(3), the sigma model describes the isotropic ferromagnet; more generally, the O(N) model shows up in the quantum Hall effect, superfluid Helium-3 and spin chains. In supergravity models, the field is taken to be a symmetric space. Since symmetric spaces are defined in terms of their involution, their tangent space naturally splits into even and odd parity subspaces. This splitting helps propel the dimensional reduction of Kaluza–Klein theories. In
https://en.wikipedia.org/wiki/Eight-to-fourteen%20modulation
Eight-to-fourteen modulation (EFM) is a data encoding technique – formally, a line code – used by compact discs (CD), laserdiscs (LD) and pre-Hi-MD MiniDiscs. EFMPlus is a related code, used in DVDs and Super Audio CDs (SACDs). EFM and EFMPlus were both invented by Kees A. Schouhamer Immink. According to European Patent Office former President Benoît Battistelli, "Immink's invention of EFM made a decisive contribution to the digital revolution." Technological classification EFM belongs to the class of DC-free run-length limited (RLL) codes; these have the following two properties: the spectrum (power density function) of the encoded sequence vanishes at the low-frequency end, and both the minimum and maximum number of consecutive bits of the same kind are within specified bounds. In optical recording systems, servo mechanisms accurately follow the track in three dimensions: radial, focus, and rotational speed. Everyday handling damage, such as dust, fingerprints, and tiny scratches, not only affects retrieved data, but also disrupts the servo functions. In some cases, the servos may skip tracks or get stuck. Specific sequences of pits and lands are particularly susceptible to disc defects, and disc playability can be improved if such sequences are barred from recording. The use of EFM produces a disc that is highly resilient to handling and solves the engineering challenge in a very efficient manner. How it works Under EFM rules, the data to be stored is first broken into eight-bit blocks (bytes). Each eight-bit block is translated into a corresponding fourteen-bit codeword using a lookup table. The 14-bit words are chosen such that binary ones are always separated by a minimum of two and a maximum of ten binary zeroes. This is because bits are encoded with NRZI encoding, or modulo-2 integration, so that a binary one is stored on the disc as a change from a land to a pit or a pit to a land, while a binary zero is indicated by no change. A sequence 0011 woul
https://en.wikipedia.org/wiki/K42
K42 is a discontinued open-source research operating system (OS) for cache-coherent 64-bit multiprocessor systems. It was developed primarily at IBM Thomas J. Watson Research Center in collaboration with the University of Toronto and University of New Mexico. The main focus of this OS is to address performance and scalability issues of system software on large-scale, shared memory, non-uniform memory access (NUMA) multiprocessing computers. K42 uses a microkernel architecture rather than the traditional monolithic kernel design. K42 consists of a small exception-handling component that serves as the microkernel, a fast inter-process communication (IPC) mechanism named protected procedure call (PPC), and servers for most other components of the operating system. These servers exist in separate address spaces and rely upon the fast IPC mechanism for communication with the microkernel and other servers. History The core of K42 is based on the University of Toronto's operating system Tornado. K42 is the university's third generation of research on scalable operating systems. Tornado OS on a nuMachine Multiprocessor was the second generation and Hurricane OS on a Hector Multiprocessor was the first generation. Features K42 supports the Linux PowerPC 64 and 32 application binary interfaces (ABIs), so most PowerPC Linux binary files can run on K42 without modification, including the relational database DB2. K42 has some device drivers implemented specifically for it, but it gets most of its hardware support by directly linking in Linux device drivers to a special server. Another goal of the K42 design is to achieve a customizable and maintainable system. Being built with an object-oriented programming design, it allows applications to customize and thus optimize the OS services required, and then on the fly, hot swap kernel object implementations. This is particularly important for applications, such as databases and web servers, where the ability to control physical r
https://en.wikipedia.org/wiki/Superantigen
Superantigens (SAgs) are a class of antigens that result in excessive activation of the immune system. Specifically they cause non-specific activation of T-cells resulting in polyclonal T cell activation and massive cytokine release. SAgs are produced by some pathogenic viruses and bacteria most likely as a defense mechanism against the immune system. Compared to a normal antigen-induced T-cell response where 0.0001-0.001% of the body's T-cells are activated, these SAgs are capable of activating up to 20% of the body's T-cells. Furthermore, Anti-CD3 and Anti-CD28 antibodies (CD28-SuperMAB) have also shown to be highly potent superantigens (and can activate up to 100% of T cells). The large number of activated T-cells generates a massive immune response which is not specific to any particular epitope on the SAg thus undermining one of the fundamental strengths of the adaptive immune system, that is, its ability to target antigens with high specificity. More importantly, the large number of activated T-cells secrete large amounts of cytokines, the most important of which is Interferon gamma. This excess amount of IFN-gamma in turn activates the macrophages. The activated macrophages, in turn, over-produce proinflammatory cytokines such as IL-1, IL-6 and TNF-alpha. TNF-alpha is particularly important as a part of the body's inflammatory response. In normal circumstances it is released locally in low levels and helps the immune system defeat pathogens. However, when it is systemically released in the blood and in high levels (due to mass T-cell activation resulting from the SAg binding), it can cause severe and life-threatening symptoms, including shock and multiple organ failure. Structure SAgs are produced intracellularly by bacteria and are released upon infection as extracellular mature toxins. The sequences of these toxins are relatively conserved among the different subgroups. More important than sequence homology, the 3D structure is very similar among differ
https://en.wikipedia.org/wiki/Hyperbolic%20Dehn%20surgery
In mathematics, hyperbolic Dehn surgery is an operation by which one can obtain further hyperbolic 3-manifolds from a given cusped hyperbolic 3-manifold. Hyperbolic Dehn surgery exists only in dimension three and is one which distinguishes hyperbolic geometry in three dimensions from other dimensions. Such an operation is often also called hyperbolic Dehn filling, as Dehn surgery proper refers to a "drill and fill" operation on a link which consists of drilling out a neighborhood of the link and then filling back in with solid tori. Hyperbolic Dehn surgery actually only involves "filling". We will generally assume that a hyperbolic 3-manifold is complete. Suppose M is a cusped hyperbolic 3-manifold with n cusps. M can be thought of, topologically, as the interior of a compact manifold with toral boundary. Suppose we have chosen a meridian and longitude for each boundary torus, i.e. simple closed curves that are generators for the fundamental group of the torus. Let denote the manifold obtained from M by filling in the i-th boundary torus with a solid torus using the slope where each pair and are coprime integers. We allow a to be which means we do not fill in that cusp, i.e. do the "empty" Dehn filling. So M = . We equip the space H of finite volume hyperbolic 3-manifolds with the geometric topology. Thurston's hyperbolic Dehn surgery theorem states: is hyperbolic as long as a finite set of exceptional slopes is avoided for the i-th cusp for each i. In addition, converges to M in H as all for all corresponding to non-empty Dehn fillings . This theorem is due to William Thurston and fundamental to the theory of hyperbolic 3-manifolds. It shows that nontrivial limits exist in H. Troels Jorgensen's study of the geometric topology further shows that all nontrivial limits arise by Dehn filling as in the theorem. Another important result by Thurston is that volume decreases under hyperbolic Dehn filling. In fact, the theorem states t
https://en.wikipedia.org/wiki/Anti-de%20Sitter%20space
In mathematics and physics, n-dimensional anti-de Sitter space (AdSn) is a maximally symmetric Lorentzian manifold with constant negative scalar curvature. Anti-de Sitter space and de Sitter space are named after Willem de Sitter (1872–1934), professor of astronomy at Leiden University and director of the Leiden Observatory. Willem de Sitter and Albert Einstein worked together closely in Leiden in the 1920s on the spacetime structure of the universe. Manifolds of constant curvature are most familiar in the case of two dimensions, where the elliptic plane or surface of a sphere is a surface of constant positive curvature, a flat (i.e., Euclidean) plane is a surface of constant zero curvature, and a hyperbolic plane is a surface of constant negative curvature. Einstein's general theory of relativity places space and time on equal footing, so that one considers the geometry of a unified spacetime instead of considering space and time separately. The cases of spacetime of constant curvature are de Sitter space (positive), Minkowski space (zero), and anti-de Sitter space (negative). As such, they are exact solutions of the Einstein field equations for an empty universe with a positive, zero, or negative cosmological constant, respectively. Anti-de Sitter space generalises to any number of space dimensions. In higher dimensions, it is best known for its role in the AdS/CFT correspondence, which suggests that it is possible to describe a force in quantum mechanics (like electromagnetism, the weak force or the strong force) in a certain number of dimensions (for example four) with a string theory where the strings exist in an anti-de Sitter space, with one additional (non-compact) dimension. Non-technical explanation Technical terms translated A maximally symmetric Lorentzian manifold is a spacetime in which no point in space and time can be distinguished in any way from another, and (being Lorentzian) the only way in which a direction (or tangent to a path at a spacet
https://en.wikipedia.org/wiki/Windjammers%202
Windjammers 2 is a 2022 sports video game developed and published by Dotemu. It is the sequel to the 1994 Neo Geo game Windjammers, co-produced by Data East and SNK. Windjammers 2 was released for Nintendo Switch, PlayStation 4, Stadia, Windows, and Xbox One on January 20, 2022. It received generally positive reviews from critics, who praised the visuals, new content and gameplay mechanics. Gameplay Windjammers 2 is a sports game played from a top-down perspective, in which players must try to throw a frisbee into their opponent's goal while protecting their own. Players can earn 3 or 5 points by landing the frisbee into their opponent's goal in the yellow or red zones respectively, or can try to land the frisbee on the floor of their opponent's side to earn 2 points. Players win a set by achieving a certain number points, and win the match by winning the most sets. In the game, players select from 11 playable characters; this includes all six returning characters from the original Windjammers, along with Jao Raposa of Brazil, Max Hurricane of Canada, Sammy Ho of China, Sophie De Lys of France, and the secret character Disc Man. Two additional characters, Anna Szalinski of Poland and the cyborg Jamma GX03, were added as part of a free update, bringing the total to 13. Each character has their own attributes. For instance, some characters have more steady control than others at the cost of speed. There are EX Moves, which are special powers can be that activated for gameplay advantages. Players can compete on 10 different courts, including all six courts from Windjammers, which feature different goal zones and gameplay properties. Both single-player and local multiplayer modes are featured. The game includes an "Arcade Mode", where multiple matches are played through championships. Windjammers 2 launched with cross-platform play between the Windows and Xbox One versions, later expanded to all systems following an update in October 2023. Development Dotemu, the ga
https://en.wikipedia.org/wiki/Amplitude%20damping%20channel
In the theory of quantum communication, an amplitude damping channel is a quantum channel that models physical processes such as spontaneous emission. A natural process by which this channel can occur is a spin chain through which a number of spin states, coupled by a time independent Hamiltonian, can be used to send a quantum state from one location to another. The resulting quantum channel ends up being identical to an amplitude damping channel, for which the quantum capacity, the classical capacity and the entanglement assisted classical capacity of the quantum channel can be evaluated. Qubit Channel We consider here the amplitude damping channel in the case of a single qubit. Any quantum channel can be defined in several equivalent ways. For example, via Stinespring's dilation theorem, a channel can be represented via an isometry as , and we say in this case that is the Stinespring representation of . In particular, the single-qubit amplitude damping channel has Stinespring representation given byAn alternative equivalent representation is given via Kraus operators. This means to represent the action of the channel in the formfor some set of operators such that . For the amplitude dampling channel, one choice of such representation readswithMore explicitly, we thus have Model for a Spin Chain Quantum Channel The main construct of the quantum channel based on spin chain correlations is to have a collection of N coupled spins. At either side of the quantum channel, there are two groups of spins and we refer to these as quantum registers, A and B. A message is sent by having the sender of the message encode some information on register A, and then, after letting it propagate over some time t, having the receiver later retrieve it from B. The state is prepared on A by first decoupling the spins on A from those on the remainder of the chain. After preparation, is allowed to interact with the state on the remainder of the chain, which initially has the st
https://en.wikipedia.org/wiki/Insect%20biodiversity
Insect biodiversity accounts for a large proportion of all biodiversity on the planet—over half of the estimated 1.5 million organism species described are classified as insects. Species diversity Estimates of the total number of insect species or those within specific orders are often highly variable. Globally, averages of these predictions estimate there are around 1.5 million beetle species and 5.5 million insect species with around 1 million insect species currently found and described. Between 950,000–1,000,000 of all described species are insects, so over 50% of all described eukaryotes (1.8 million) are insects (see illustration). With only 950,000 known non-insects, if the actual number of insects is 5.5 million, they may represent over 80% of the total, and with only about 20,000 new species of all organisms being described each year, most insect species likely will remain undescribed, unless species descriptions greatly increase in rate. Of the 24 orders of insects, four dominate in terms of numbers of described species, with at least 670,000 species included in Coleoptera, Diptera, Hymenoptera and Lepidoptera. The fossil record concerning insects stretches back for hundreds of millions of years. It suggests there are ongoing background levels of both new species appearing and extinctions. Very occasionally, the record also appears to show mass extinctions of insects. The Permian–Triassic extinction event saw the greatest level of insect extinction, with the Cretaceous–Paleogene being the second highest. Insect diversity has recovered after past mass extinctions, due to periods where new species originate with increased frequency, though the recovery can take millions of years. In the Holocene Several studies seemed to indicate that some insect populations are in decline in the late 20th and early 21st centuries, and has also been popularized as the windshield phenomenon. For many studies, factors such as abundance, biomass, and species richness are o
https://en.wikipedia.org/wiki/First%20break%20picking
In seismology, first-break picking is the detecting or picking the onset arrivals of refracted signals from all the signals received by receiver arrays and produced by a particular source signal generation. It is also called first arrival picking or first break detection. First-break picking can be done automatically, manually or as a combination of both. With the development of computer science and the size of seismic surveys, automatic picking is often preferred. Significance First-break picks associated with the refracted arrival times are used in an inversion scheme to study the near-surface low-velocity zone and subsequent determination of static corrections. Static correction is a correction applied to geophysical data, especially seismic data, to compensate for the effect of near-surface irregularities, differences in the elevation of shots and geophones, or any application to correct the positions of source and receivers. History of First Break Picking Gelchinsky and Shtivelman(1983) used correlation properties of signals and applied a statistical criterion for the estimation of first arrivals time. Coppens(1985) calculated the ratio of energy of seismogram of the two windows and used that to differentiate in signal and noise. Michael D. McCormark et al.(1993) introduced a backpropagation neural network (BNN) method. The Neural network which edits seismic data or pick first breaks was trained by users, who were just selecting and presenting to the network examples of trace edits or refraction picks. The network then changes internal weights iteratively until it can reproduce the examples accurately provided by the users. Fabio Boschetti et al.(1996) introduce a fractal-based algorithm, which detects the presence of a signal by analyzing the variation in fractal dimension along the trace. This method works when signal-to-noise ratio is small, but it is considerably slow. A direct correlation method was introduced by Joseph et al.(1999) which was develop
https://en.wikipedia.org/wiki/Passive%20antibody%20therapy
Passive antibody therapy, also called serum therapy, is a subtype of passive immunotherapy that administers antibodies (same as immunoglobin) to target and kill pathogens or cancer cells. It is designed to draw support from foreign antibodies that are donated from a person, extracted from animals, or made in the laboratory to elicit an immune response instead of relying on the innate immune system to fight disease. It has a long history from the 18th century for treating infectious diseases and is now a common cancer treatment. The mechanism of actions include: antagonistic and agonistic reaction, complement-dependent cytotoxicity (CDC), and antibody-dependent cellular cytotoxicity (ADCC). History Passive antibody therapy was first propounded by Emil von Behring and Shibasaburo Kitasato in 1890 to treat diphtheria after the observation of immunization in rabbits after injecting serum from tetanus-immunized rabbits. Later in 1891, Paul Ehrlich joined Behring's and Kitasato's research to ameliorate immunizability from lethal toxins. This established the basis of antibody immunotherapy. With the ideology of using antibody serum to treat infectious diseases, the three scientists standardized serum production in dairy cows and merchandised serum vaccines for tetanus and diphtheria. The prevalence of serum therapy surged in the early 19th century. When the H1N1 influenza pandemic (Spanish flu) struck the US and Europe, serum containing antibodies from recovered patients are prevalently injected into patients. With proven therapeutic effects, the applications expanded to other viral and bacterial infections, such as pneumococcus, meningococcus, and rabies, despite an unknown underlying mechanism. Yet, severe anaphylactic reactions and hypersensitivity were common, ergo, serum therapy was pulled out from the market in the 1940s. The resurrection of antibody immunotherapy contributed to Cesar Milstein and Georges J. F. Kohler, who manifested the mass production of pure m
https://en.wikipedia.org/wiki/Port%20scanner
A port scanner is an application designed to probe a server or host for open ports. Such an application may be used by administrators to verify security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities. A port scan or portscan is a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port; this is not a nefarious process in and of itself. The majority of uses of a port scan are not attacks, but rather simple probes to determine services available on a remote machine. To portsweep is to scan multiple hosts for a specific listening port. The latter is typically used to search for a specific service, for example, an SQL-based computer worm may portsweep looking for hosts listening on TCP port 1433. TCP/IP basics The design and operation of the Internet is based on the Internet Protocol Suite, commonly also called TCP/IP. In this system, network services are referenced using two components: a host address and a port number. There are 65535 distinct and usable port numbers, numbered 1..65535. (Port zero is not a usable port number.) Most services use one, or at most a limited range of, port numbers. Some port scanners scan only the most common port numbers, or ports most commonly associated with vulnerable services, on a given host. The result of a scan on a port is usually generalized into one of three categories: Open or Accepted: The host sent a reply indicating that a service is listening on the port. Closed or Denied or Not Listening: The host sent a reply indicating that connections will be denied to the port. Filtered, Dropped or Blocked: There was no reply from the host. Open ports present two vulnerabilities of which administrators must be wary: Security and stability concerns associated with the program responsible for delivering the service - Open ports. Security and stability concerns associated with the operating sy
https://en.wikipedia.org/wiki/SETI%40home
SETI@home ("SETI at home") is a project of the Berkeley SETI Research Center to analyze radio signals with the aim of searching for signs of extraterrestrial intelligence. Until March 2020, it was run as an Internet-based public volunteer computing project that employed the BOINC software platform. It is hosted by the Space Sciences Laboratory at the University of California, Berkeley, and is one of many activities undertaken as part of the worldwide SETI effort. SETI@home software was released to the public on May 17, 1999, making it the third large-scale use of volunteer computing over the Internet for research purposes, after Great Internet Mersenne Prime Search (GIMPS) was launched in 1996 and distributed.net in 1997. Along with MilkyWay@home and Einstein@home, it is the third major computing project of this type that has the investigation of phenomena in interstellar space as its primary purpose. In March 2020, the project stopped sending out new work to SETI@home users, bringing the crowdsourced computing aspect of the project to a stop. At the time, the team intended to shift focus onto the analysis and interpretation of the 20 years' worth of accumulated data. However, the team left open the possibility of eventually resuming volunteer computing using data from other radio telescopes, such as MeerKAT and FAST. As of November 2021, the science team has analysed the data and removed noisy signals (Radio Frequency Interference) using the Nebula tool they developed and will choose the top-scoring 100 or so multiplets to be observed using the Five-hundred-meter Aperture Spherical Telescope, to which they have been granted 24 hours of observation time. Scientific research The two original goals of SETI@home were: to do useful scientific work by supporting an observational analysis to detect intelligent life outside Earth to prove the viability and practicality of the "volunteer computing" concept The second of these goals is considered to have succeeded com
https://en.wikipedia.org/wiki/Breast%20milk%20jewelry
Breast milk jewelry or Breast milk jewellery (Commonwealth English) is jewellery made from pumped or expressed mother's breast milk as a keepsake often worn by the mother. Breast milk keepsakes come in various jewelry types such as rings, lockets, pendants and popular European style beads. Some pendants may be bezel set, locket set, made from only resin, or filled. Filled styles use a preserved breast milk and resin mix to fill holes or openings in jewelry pieces, usually Sterling Silver. Generally, the filled shapes are trees, leaves, or hearts representing love and life. Various methods may be used to make the jewelry. To preserve and protect it, the piece may be covered in a clear resin or glaze. No matter the process used for preservation there seems to be a long and tedious process involved in creating the keepsakes, leading to long waits for order fulfillment. The long waits for order fulfillment have caused online speculation about the practice, even gaining media attention. Origin In 2013 NBC New York published an article about the jewellery, mentioning two Etsy artists (from Rhode Island and South Carolina) that reportedly started the idea as early as 2007. Process After the purchase of a breast milk keepsake design the consumer sends their breast milk to the creator so the process can begin. Each creator likely uses a different trade process. In some methods it is believed that solvents or chemicals are added to assist the preservation. Other methods may include dehydrating, freeze drying, cooking down, or mixing breast milk with other media. Forming and curing take place after a period of drying and/or curing with the medium mixes. Coating, pouring, or mixing the preserved milk into resin is believed to be the final step. See also Galalith
https://en.wikipedia.org/wiki/LexisNexis%20Risk%20Solutions
LexisNexis Risk Solutions is a global data and analytics company that provides data and technology services, analytics, predictive insights and fraud prevention for a wide range of industries. It is headquartered in Alpharetta, Georgia (part of the Atlanta metropolitan area), and has offices throughout the U.S. and in: Australia; Brazil; China; France; Hong Kong SAR; India; Ireland; Israel; the Philippines; and the U.K. The company's customers include businesses within the insurance, financial services, healthcare and corporate sectors as well as the local, state and federal government, law enforcement and public safety. LexisNexis Risk Solutions operates within the Risk & Business Analytics market segment of RELX, a multinational information and analytics company based in London. Overview Market segments LexisNexis Risk Solutions operates in four market segments: Insurance Services; Business Services; Health Care Services; and Government Services. Technology LexisNexis Risk Solutions uses HPCC Systems, also known as DAS (Data Analytics Supercomputer), extensively—its software architecture runs from commodity computing clusters to provide high-performance, data-parallel processing for big data applications. The HPCC Systems platform includes a data refinery (Thor) and a rapid data delivery engine (ROXIE) that utilize the Enterprise Control Language (ECL). LexisNexis Risk Solutions open-sourced the HPCC Systems platform in 2011, and has seen some success with the adoption of this platform by diverse entities, an example being GuardHat, which makes smart hard hats with embedded HPCC Systems technology. History A subsidiary of RELX (formerly Reed Elsevier), LexisNexis Risk Solutions first began as the Risk & Information Analytics Group (RIAG) within LexisNexis, a corporation offering legal database services. In 2000, Reed Elsevier acquired RiskWise and PeopleWise, which together became the basis of RIAG. The creation of RIAG expanded LexisNexis
https://en.wikipedia.org/wiki/Bruce%20Lee%20%28video%20game%29
Bruce Lee is a platform game written by Ron J. Fortier for the Atari 8-bit family and published in 1984 by Datasoft. The graphics are by Kelly Day and music by John A. Fitzpatrick. The player takes the role of Bruce Lee, while a second player controls either Yamo or alternates with player one for control of Bruce Lee. Commodore 64 and Apple II versions were released the same year. The game was converted to the ZX Spectrum and Amstrad CPC and published by U.S. Gold. It was the first U.S. Gold release featuring a famous individual. An MSX version was published in 1985 by Comptiq. Gameplay The plot involves the eponymous martial artist advancing from chamber to chamber in a wizard's tower, seeking to claim infinite wealth and the secret of immortality. There are twenty chambers, each represented by a single screen with platforms and ladders. To progress, the player must collect a number of lanterns suspended from various points in the chamber. Most chambers are guarded by two mobile enemies; The Ninja, who attacks with a "bokken stick" and The Green Yamo, a large unarmed warrior, visually styled as a sumo wrestler but attacking with punches and "crushing kicks". On platforms with sufficient graphics support, Yamo's skin is actually pictured as green, though in cover art he has a natural human skin tone. A multiplayer mode allows a second player to control Yamo, or to allow two players to alternately control Bruce. If the player playing Yamo is inactive for a certain time, the computer takes over. The Ninja and Yamo are also vulnerable to the screen's dangers, but have infinite lives so they always return; whereas Yamo is consistently identified as a single person, one version of the manual implies that each reappearance of the ninja is a new individual, replacing the previous one. Later chambers include more hazards such as mines and moving walls, as well as a "comb-like" surface that has an electric spark racing along it. Skilful walking, climbing, ducking and j
https://en.wikipedia.org/wiki/Semantide
Semantides (or semantophoretic molecules) are biological macromolecules that carry genetic information or a transcript thereof. Three different categories or semantides are distinguished: primary, secondary and tertiary. Primary Semantides are genes, which consist of DNA. Secondary semantides are chains of messenger RNA, which are transcribed from DNA. Tertiary semantides are polypeptides, which are translated from messenger RNA. In eukaryotic organisms, primary semantides may consist of nuclear, mitochondrial or plastid DNA. Not all primary semantides ultimately form tertiary semantides. Some primary semantides are not transcribed into mRNA (non-coding DNA) and some secondary semantides are not translated into polypeptides (non-coding RNA). The complexity of semantides varies greatly. For tertiary semantides, large globular polypeptide chains are most complex while structural proteins, consisting of repeating simple sequences, are least complex. The term semantide and related terms were coined by Linus Pauling and Emile Zuckerkandl. Although semantides are the major type of data used in modern phylogenetics, the term itself is not commonly used. Related terms Isosemantic DNA or RNA that differs in base sequence, but translate into identical polypeptide chains are referred to as being isosemantic. Episemantic Molecules that are synthesized by enzymes (tertiary semantides) are referred to as episemantic molecules. Episemantic molecules have a larger variety in types than semantides, which only consist of three types (DNA, RNA or polypeptides). Not all polypeptides are tertiary semantides. Some, mainly small polypeptides, can also be episemantic molecules. Asemantic Molecules that are not produced by an organism are referred to as asemantic molecules, because they do not contain any genetic information. Asementic molecules may be changed into episemantic molecules by anabolic processes. Asemantic molecules may also become semantic molecules when they integrate
https://en.wikipedia.org/wiki/Katharine%20Burr%20Blodgett%20Medal%20and%20Prize
The Katharine Burr Blodgett Medal and Prize is a gold medal awarded annually by the Institute of Physics to "recognise contributions to the organisation or application of physics in an industrial or commercial context." The medal is accompanied by a prize of £1000. History At its inception in 2008, the award was named the "Business and Innovation Medal". In 2012, it was renamed the "Swan Medal and Prize" in memory of Sir Joseph Swan, a chemist, physicist, and early developer of the incandescent light bulb. Since 2016, the award was renamed again to commemorate Katharine Burr Blodgett, inventor of low-reflectance "invisible" glass (Langmuir–Blodgett film), and the first woman to receive a degree in physics from Cambridge University. Medallists The following have been award one of these medals: Katharine Burr Blodgett Medal and Prize 2022 Andrew James Shields for "pioneering industrial R&D over two decades on quantum communication devices and systems" 2021 Brian Corbett for "serial identification and creation of breakthrough innovative photonic device technology solutions" 2020 Drew Nelson for "pioneering efforts in commercialising compound semiconductor materials" 2019 Chris Hancock for "designing and patenting an electro-surgery platform." 2018 Michael Begg and James Ramage, Tesla Engineering, for "the transformation of Tesla Engineering Ltd from a manufacturer of conventional magnets for particle accelerators into a world leader of magnets for high-energy physics, MRI and oncology equipment." 2017 Cliff Jones, University of Leeds, for "inventions in the area of liquid crystal displays, and his role in the founding and commercial success of Displaydata." 2016 Graeme Malcolm, M Squared Lasers for "his role in founding M Squared Lasers, and his contribution to the design and manufacture of transformative award-winning photonics products." Swan Medal and Prize 2015 Iain Baikie, KP Technology, for "contributions to the development of Kelvin Probe (KP) method instru
https://en.wikipedia.org/wiki/Reeler
A reeler is a mouse mutant, so named because of its characteristic "reeling" gait. This is caused by the profound underdevelopment of the mouse's cerebellum, a segment of the brain responsible for locomotion. The mutation is autosomal and recessive, and prevents the typical cerebellar folia from forming. Cortical neurons are generated normally but are abnormally placed, resulting in disorganization of cortical laminar layers in the central nervous system. The reason is the lack of reelin, an extracellular matrix glycoprotein, which, during the corticogenesis, is secreted mainly by the Cajal–Retzius cells. In the reeler neocortex, cortical plate neurons are aligned in a practically inverted fashion ("outside-in"). In the ventricular zone of the cortex fewer neurons have been found to have radial glial processes. In the dentate gyrus of hippocampus, no characteristic radial glial scaffold is formed and no compact granule cell layer is established. Therefore, the reeler mouse presents a good model in which to investigate the mechanisms of establishment of the precise neuronal network during development. Types of reelers There are two types of the reeler mutation: Albany2 mutation (Reln(rl-Alb2) Orleans mutation (Reln-rl-orl, or rl-orl), in which reelin lacks a C-terminal region and a part of the eighth reelin repeat. This hampers the secretion of the protein from the cell. In order to unravel the reelin signaling chain, attempts are made to cut the signal downstream of reelin, leaving reelin expression intact but creating the reeler phenotype, sometimes a partial phenotype, thus confirming the role of downstream molecules. The examples include: Double knockout of VLDLR and ApoER2 receptors; Double knockout of Src and Fyn kinases. Cre-loxP recombination mice model that lacks Crk and CrkL in most neurons. Was used to show that Crk/CrkL lie downstream of DAB1] in the reelin signaling pathway. Scrambler mouse Key pathological findings in the reeler brain structu
https://en.wikipedia.org/wiki/Homogeneously%20staining%20region
Homogeneously staining regions (HSRs) are chromosomal segments with various lengths and uniform staining intensity after G banding. This type of aberration is also known as Copy Number Gains or Amplification. An HSR is one type of change in a chromosome's structure which is frequently observed in the nucleus of human cancer cells. In the region of a chromosome where an HSR occurs, a segment of the chromosome, which presumably contains a gene or genes that give selective advantage to the progression of the cancer, is amplified or duplicated many times. As a result of the duplication this chromosomal segment is greatly lengthened and expanded such that when it is stained with a fluorescent probe specific to the region (Fluorescent in situ hybridization), rather than causing a focal fluorescent signal as in a normal chromosome, the probe "paints" a broad fluorescent signal over the whole of the amplified region. It is because of the appearance of this broadly staining region that this chromosomal abnormality was named a homogeneously staining region. The homogenously staining region was first observed in chromosome 2 by June Biedler and Barbara Spengler in cells that had been made resistant to methotrexate. The HSR was found to due to the amplification of the DHFR gene.
https://en.wikipedia.org/wiki/Nilpotent
In mathematics, an element of a ring is called nilpotent if there exists some positive integer , called the index (or sometimes the degree), such that . The term, along with its sister idempotent, was introduced by Benjamin Peirce in the context of his work on the classification of algebras. Examples This definition can be applied in particular to square matrices. The matrix is nilpotent because . See nilpotent matrix for more. In the factor ring , the equivalence class of 3 is nilpotent because 32 is congruent to 0 modulo 9. Assume that two elements and in a ring satisfy . Then the element is nilpotent as An example with matrices (for a, b): Here and . By definition, any element of a nilsemigroup is nilpotent. Properties No nilpotent element can be a unit (except in the trivial ring, which has only a single element ). All nilpotent elements are zero divisors. An matrix with entries from a field is nilpotent if and only if its characteristic polynomial is . If is nilpotent, then is a unit, because entails More generally, the sum of a unit element and a nilpotent element is a unit when they commute. Commutative rings The nilpotent elements from a commutative ring form an ideal ; this is a consequence of the binomial theorem. This ideal is the nilradical of the ring. Every nilpotent element in a commutative ring is contained in every prime ideal of that ring, since . So is contained in the intersection of all prime ideals. If is not nilpotent, we are able to localize with respect to the powers of : to get a non-zero ring . The prime ideals of the localized ring correspond exactly to those prime ideals of with . As every non-zero commutative ring has a maximal ideal, which is prime, every non-nilpotent is not contained in some prime ideal. Thus is exactly the intersection of all prime ideals. A characteristic similar to that of Jacobson radical and annihilation of simple modules is available for nilradical: nilpotent elements
https://en.wikipedia.org/wiki/Bromo%20adjacent%20homology%20domain%20containing%201
Bromo adjacent homology domain containing 1 (BAHD1) is a protein that in humans is encoded by the BAHD1 gene. BAHD1 is involved in heterochromatin formation and transcriptional repression. Discovery BAHD1 was first cloned from a human brain cDNA library and the coding sequence was named KIAA0945. Bierne and colleagues further discovered the function of BAHD1 in the regulation of chromatin structure and gene expression. Function BAHD1 acts as a co-repressor by interacting with a set of proteins that promote chromatin compaction and regulate transcription. Tandem-affinity purification of the BAHD1-associated protein complex in human HEK293 cells identified MIER proteins (MIER1, MIER2, MIER3), histone deacetylase HDAC1 and HDAC2, histone H3K9 methyltransferase EHMT2, heterochromatin protein 1 (HP1 alpha, HP1 beta, HP1 gamma), MBD1, TRIM28 and CDYL as partners of BAHD1. Overexpression of BAHD1 in HEK293 cells induces large-scale chromatin condensation and DNA methylation on autosomes. The C-terminal BAH domain of BAHD1 acts as a reader for the epigenetic mark H3K27me3. Ectopically expressed BAHD1 colocalizes with the heterochromatic inactive X chromosome (Xi). Animal studies Ablation of the Bahd1 gene in the mouse alters placental development and results in hypocholesterolemia, hypoglycemia and decreased body fat. Bahd1-haplodeficiency in mice decreases the efficiency of infection with the bacterial pathogen Listeria monocytogenes. Clinical significance During infection of human epithelial cells with the pathogen Listeria monocytogenes, BAHD1 represses interferon-stimulated genes. At specific stages of infection, a Listeria nucleomodulin, LntA, acts as an inhibitor of BAHD1 and activates interferon-stimulated genes. The BAHD1 gene is downregulated in the colon tissue in a mouse model of ulcerative colitis.
https://en.wikipedia.org/wiki/Farmitalia
Farmitalia was an Italian pharmaceutical company best known for its parallel discovery with Rhone-Poulenc of daunorubicin and subsequent discovery of doxorubicin. Farmitalia had been founded in 1935 as a joint venture by Rhone-Poulenc and Montecatini. Farmitalia occupied a position of choice in the world rankings of the profession, not only in Italy, but also at the world level with in particular the patent of Adriamycin, an anti-cancer drug qualified. From its creation, Farmaceutici Italia buys the Schiapparelli factory. In 1978, Farmitalia was merged with Carlo Erba SpA, an Italian pharmaceutical company that had been founded in 1853 by the pharmacist , in which Montecatini had acquired a controlling interest in 1971. The merged company was called Farmitalia Carlo Erba SpA. Farmitalia Carlo Erba was acquired by Pharmacia in 1993, then Pharmacia was acquired by Pfizer in 2003. Drugs discovered at Farmitalia that reached the market included (with date of first publication): 1960 Sulfalene 1963 Daunorubicin 1969 Doxorubicin 1980 Cabergoline 1984 Reboxetine
https://en.wikipedia.org/wiki/Shortest%20path%20problem
In graph theory, the shortest path problem is the problem of finding a path between two vertices (or nodes) in a graph such that the sum of the weights of its constituent edges is minimized. The problem of finding the shortest path between two intersections on a road map may be modeled as a special case of the shortest path problem in graphs, where the vertices correspond to intersections and the edges correspond to road segments, each weighted by the length of the segment. Definition The shortest path problem can be defined for graphs whether undirected, directed, or mixed. It is defined here for undirected graphs; for directed graphs the definition of path requires that consecutive vertices be connected by an appropriate directed edge. Two vertices are adjacent when they are both incident to a common edge. A path in an undirected graph is a sequence of vertices such that is adjacent to for . Such a path is called a path of length from to . (The are variables; their numbering here relates to their position in the sequence and needs not to relate to any canonical labeling of the vertices.) Let where is the edge incident to both and . Given a real-valued weight function , and an undirected (simple) graph , the shortest path from to is the path (where and ) that over all possible minimizes the sum When each edge in the graph has unit weight or , this is equivalent to finding the path with fewest edges. The problem is also sometimes called the single-pair shortest path problem, to distinguish it from the following variations: The single-source shortest path problem, in which we have to find shortest paths from a source vertex v to all other vertices in the graph. The single-destination shortest path problem, in which we have to find shortest paths from all vertices in the directed graph to a single destination vertex v. This can be reduced to the single-source shortest path problem by reversing the arcs in the directed graph. The all-pairs short
https://en.wikipedia.org/wiki/Inverse%20kinematics
In computer animation and robotics, inverse kinematics is the mathematical process of calculating the variable joint parameters needed to place the end of a kinematic chain, such as a robot manipulator or animation character's skeleton, in a given position and orientation relative to the start of the chain. Given joint parameters, the position and orientation of the chain's end, e.g. the hand of the character or robot, can typically be calculated directly using multiple applications of trigonometric formulas, a process known as forward kinematics. However, the reverse operation is, in general, much more challenging. Inverse kinematics is also used to recover the movements of an object in the world from some other data, such as a film of those movements, or a film of the world as seen by a camera which is itself making those movements. This occurs, for example, where a human actor's filmed movements are to be duplicated by an animated character. Robotics In robotics, inverse kinematics makes use of the kinematics equations to determine the joint parameters that provide a desired configuration (position and rotation) for each of the robot's end-effectors. This is important because robot tasks are performed with the end effectors, while control effort applies to the joints. Determining the movement of a robot so that its end-effectors move from an initial configuration to a desired configuration is known as motion planning. Inverse kinematics transforms the motion plan into joint actuator trajectories for the robot. Similar formulas determine the positions of the skeleton of an animated character that is to move in a particular way in a film, or of a vehicle such as a car or boat containing the camera which is shooting a scene of a film. Once a vehicle's motions are known, they can be used to determine the constantly-changing viewpoint for computer-generated imagery of objects in the landscape such as buildings, so that these objects change in perspective while them
https://en.wikipedia.org/wiki/Nvidia%20PureVideo
PureVideo is Nvidia's hardware SIP core that performs video decoding. PureVideo is integrated into some of the Nvidia GPUs, and it supports hardware decoding of multiple video codec standards: MPEG-2, VC-1, H.264, HEVC, and AV1. PureVideo occupies a considerable amount of a GPU's die area and should not be confused with Nvidia NVENC. In addition to video decoding on chip, PureVideo offers features such as edge enhancement, noise reduction, deinterlacing, dynamic contrast enhancement and color enhancement. Operating system support The PureVideo SIP core needs to be supported by the device driver, which provides one or more interfaces such as NVDEC, VDPAU, VAAPI or DXVA. One of these interfaces is then used by end-user software, for example VLC media player or GStreamer, to access the PureVideo hardware and make use of it. Nvidia's proprietary device driver is available for multiple operating systems and support for PureVideo has been added to it. Additionally, a free device driver is available, which also supports the PureVideo hardware. Linux Support for PureVideo has been available in Nvidia's proprietary driver version 180 since October 2008 through VDPAU. Since April 2013 nouveau also supports PureVideo hardware and provides access to it through VDPAU and partly through XvMC. Microsoft Windows Microsoft's Windows Media Player, Windows Media Center and modern video players support PureVideo. Nvidia also sells PureVideo decoder software which can be used with media players which use DirectShow. Systems with dual GPU's either need to configure the codec or run the application on the Nvidia GPU to utilize PureVideo. Media players which use LAV, ffdshow or Microsoft Media Foundation codecs are able to utilize PureVideo capabilities. OS X OS X was sold with Nvidia hardware, so support is probably available. PureVideo HD PureVideo HD (see "naming confusions" below) is a label which identifies Nvidia graphics boards certified for HD DVD and Blu-ray Disc playba
https://en.wikipedia.org/wiki/International%20Committee%20Against%20Racism
The International Committee Against Racism was the "mass organization" of the Progressive Labor Party in the United States. It was founded in 1973 once it had become clear that the Worker Student Alliance section of the Students for a Democratic Society could not sustain itself and that a new group with a more long-term vision not focused on students was going to be needed. Anti-racism was chosen as the focus for that new group. History Early leaders of the group included Dr. Robert Kinlock, Toby Schwartz, and Finley Campbell. At first the group took the name "Committee Against Racism" (CAR), but as various Latin American members began to start chapters in their home countries, CAR added "International" to the beginning of its name and became InCAR, proclaiming itself to have not just a U.S. anti-racist focus, but a worldwide one as well. In 1975 the Committee Against Racism conducted their Summer Project in support of integration and busing in Boston, MA. A joint Freedom School and Petition Campaign culminated in an attempt to have a presence outside South Boston High School on the first day of Phase II busing. Two bus loads of protesters were taken off the buses before reaching the high school, detained and released by police. By 1978 InCAR had about 1,500 members. It had a magazine periodical for its written work, known as Arrow (Flecha in Spanish), published bilingually. For the most part, PL did not bother to hide that it was in charge of InCAR, but it did always choose to frame its role in InCAR as one of "leadership" rather than control. According to PL's party statement: "InCAR is a radical organization led by the Party which the Party builds in order to advance the struggle for communism." InCAR, for its own part, insisted in its mission statement (reprinted on the inside front cover of every Arrow issue) that it "recognizes the absolute necessity of unity of communists and non-communists in this struggle" against both societal and organized racism. L
https://en.wikipedia.org/wiki/Ethyl%20methylphenylglycidate
Ethyl methylphenylglycidate, commonly known as strawberry aldehyde, is an organic compound used in the flavor industry in artificial fruit flavors, in particular strawberry. Uses Because of its pleasant taste and aroma, ethyl methylphenylglycidate finds use in the fragrance industry, in artificial flavors, and in cosmetics. Its end applications include perfumes, soaps, beauty care products, detergents, pharmaceuticals, baked goods, candies, ice cream, and others. Chemistry Ethyl methylphenylglycidate contains ester and epoxide functional groups, despite its common name, lacks presence of an aldehyde. It is a colourless liquid that is insoluble in water. Ethyl methylphenylglycidate is usually prepared by the condensation of acetophenone and the ethyl ester of monochloroacetic acid in the presence of a base, in a reaction known as the Darzens condensation. Safety Long-term, high-dose studies in rats have demonstrated that ethyl methylphenylglycidate has no significant adverse health effects and is not carcinogenic. The US Food and Drug Administration has classified ethyl methylphenylglycidate as generally recognized as safe (GRAS). See also List of strawberry topics
https://en.wikipedia.org/wiki/Epiphyllum%20hybrid
Epiphyllum hybrids, epiphyllums, epicacti, or just epis, also known as orchid cacti, which are widely grown for their flowers, are artificial hybrids derived primarily from species of the genus Disocactus. These Disocactus species are not true epiphyllum, but they used to be included in the genus Epiphyllum. Parental species Epiphyllum hybrids are mostly derived from two or more of the following species: Disocactus crenatus (Lindl.) M.Á.Cruz & S.Arias (= Epiphyllum crenatum (Lindl.) G.Don) Disocactus phyllanthoides (DC.) Barthlott (= Epiphyllum phyllanthoides (DC.) Sweet) Disocactus speciosus (Cav.) Barthlott (= Epiphyllum speciosum (Cav.) Haw.) Disocactus macranthus (Alexander) Kimnach & Hutchison (= Pseudorhipsalis macrantha Alexander) Disocactus ackermannii (Haw.) Ralf Bauer (= Epiphyllum ackermannii Haw.) Some cacti in the tribe Hylocereeae other than Disocactus have been crossed with species or hybrids of Disocactus, but not all the derived hybrids are considered epiphyllum hybrids. For example, × Disoselenicereus fulgidus (Disocactus speciosus × Selenicereus pteranthus) and × Aporodisocactus mallisonii (Aporocactus flagelliformis × Disocactus speciosus) are too morphologically dissimilar to Epiphyllum to be called "epiphyllum hybrids". The following are some species reported to be used in intergeneric crosses to breed epiphyllum hybrids: Epiphyllum chrysocardium Alexander (reported to be one of the parents of 'Hunsrück Début') Epiphyllum hookeri Haw. (reported to be crossed with Disocactus crenatus and then with 'Crème de menthe' to breed 'Aaba') Pfeiffera monacantha (Griseb.) P.V.Heath (reported to be one of the parents of 'Naranja') Pfeiffera paranganiensis (Cárdenas) P.V.Heath (reported to be one of the parents of 'Inca's Golden Dream') The following reports on intergeneric epiphyllum hybrids are either dubious or false: × Epinicereus cooperi is alleged to be a hybrid between Disocactus crenatus and Selenicereus grandiflorus, but it turns ou
https://en.wikipedia.org/wiki/Istv%C3%A1n%20Orosz
István Orosz (born 24 October 1951) is a Hungarian painter, printmaker, graphic designer and animated film director. He is known for his mathematically inspired works, impossible objects, optical illusions, double-meaning images and anamorphoses. The geometric art of István Orosz, with forced perspectives and optical illusions, has been compared to works by M. C. Escher. Biography He was born in Kecskemét. He studied at the Hungarian University of Arts and Design (now Moholy-Nagy University of Art and Design) in Budapest as a pupil of István Balogh and Ernő Rubik. After graduating in 1975 he began to deal with theatre as a stage designer and animated film as animator and film director. He is known as painter, printmaker, poster designer, and illustrator as well. He likes to use visual paradox, double meaning images, and illusionistic approaches while following traditional printing techniques such as woodcutting and etching. He also tries to renew the technique of anamorphosis. He is a regular participant in the major international biennials of posters and graphic art and his works have been shown in individual and group exhibitions in Hungary and abroad. Film director at the PannóniaFilm Studio in Budapest, Habil. professor at University of West Hungary in Sopron, co-founder of Hungarian Poster Association, member of Alliance Graphique International (AGI) and Hungarian Art Academie. He often uses ΟΥΤΙΣ, or Utisz, (pronounced: outis) (No one) as artist's pseudonym. Quotes "Utisz - It was the Homeric hero Odysseus, who fought the Cyclops, had used this name, and had put out the monster's eye. I imagine that poster is nothing else but an Odysseus' gesture: some kind of attack upon the eye." "If you want to create a poster try to explain your idea in a sentence. Then try to reduce it, leave out phrases, attributes until you just have the bare essentials. When you do not need any letter at all you are ready with the poster." "... When I have drawn these impossible obje
https://en.wikipedia.org/wiki/IBM%203767
IBM 3767 Communication Terminal is a serial printer terminal that employed dot matrix print-head technology and, for the first time, the Synchronous Data Link Control (SDLC) communications protocol set under IBM's Systems Network Architecture (SNA). It was introduced in 1974 and was used widely during the late 1970s to 1990s, for attachment to IBM System/360 and System/370 mainframe computers and IBM System/7 as an alternative to a 2741 typewriter terminal. Needs for more efficient computer terminals During the late 1960 and 1970s, the computing environment expanded beyond the large computer rooms based on card input/output and started to allow data input and output terminals from remote locations. For such purposes, printer terminals such as the IBM 2741, using the traditional asynchronous serial communication (start-stop signaling), and display terminals such as IBM 2260 and IBM 3270, using the new communications protocol set (Binary Synchronous Communications or BSC), became available. There were needs to use a new more efficient communications protocol set and to make available a more efficient and reliable remote printer and display terminals. To satisfy such needs, IBM 3767 serial printer and IBM 3770 communications system (including a line printer) became available as part of the "Advanced Communications Function" (ACF) announcement which included the new System Network Architecture (SNA) and Synchronous Data Link Control (SDLC) communications protocol set, followed by another announcement in July, 1975, which included IBM 3760 Data Entry Station and the new models of IBM 3270 display stations, and IBM 3790 communication system. 3767 functions, features and models IBM 3767 Communication Terminal had the following functions: IBM's own wire matrix, serial print-head technology Keyboard Communications: SNA/SDLC or BSC Communications speed from 200/300 to 19,200 bits per second US English or one of the world's other major languages There were sever
https://en.wikipedia.org/wiki/Seismic%20oceanography
Seismic oceanography is a form of acoustic oceanography, in which sound waves are used to study the physical properties and dynamics of the ocean. It provides images of changes in the temperature and salinity of seawater. Unlike most oceanographic acoustic imaging methods, which use sound waves with frequencies greater than 10,000 Hz, seismic oceanography uses sound waves with frequencies lower than 500 Hz. Use of low-frequency sound means that seismic oceanography is unique in its ability to provide highly detailed images of oceanographic structure that span horizontal distances of hundreds of kilometres and which extend from the sea surface to the seabed. Since its inception in 2003, seismic oceanography has been used to image a wide variety of oceanographic phenomena, including fronts, eddies, thermohaline staircases, turbid layers and cold methane seeps. In addition to providing spectacular images, seismic oceanographic data have given quantitative insight into processes such as movement of internal waves and turbulent mixing of seawater. Method Data acquisition Seismic oceanography is based on marine seismic reflection profiling, in which a ship tows specialised equipment for generating underwater sound. This equipment is known as the acoustic source. The ship also tows one or more cables along which are arranged hundreds of hydrophones, which are instruments for recording underwater sound. These cables are referred to as streamers, and are between a few hundred metres and 10 km in length. Both the acoustic source and the streamers lie a few metres beneath the sea surface. The acoustic source generates sound waves once every few seconds by releasing either compressed air or electrical charge into the sea. Most of these sound waves travel downwards towards the seabed, and a small fraction of the sound is reflected from boundaries at which the temperature or salinity of seawater changes (these boundaries are known as thermohaline boundaries). The hydrophones
https://en.wikipedia.org/wiki/Strategic%20move
A strategic move in game theory is an action taken by a player outside the defined actions of the game in order to gain a strategic advantage and increase one's payoff. Strategic moves can either be unconditional moves or response rules. The key characteristics of a strategic move are that it involves a commitment from the player, meaning the player can only restrict her own choices and that the commitment has to be credible, meaning that once employed it must be in the interest of the player to follow through with the move. Credible moves should also be observable to the other players. Strategic moves are not warnings or assurances. Warnings and assurances are merely statements of a player's interest, rather than an actual commitment from the player. The term was coined by Thomas Schelling in his 1960 book, The Strategy of Conflict, and has gained wide currency in political science and industrial organization.
https://en.wikipedia.org/wiki/TPCN2
Two pore segment channel 2 (TPC2) is a protein which in humans is encoded by the TPCN2 gene. TPC2 is an ion channel, however, in contrast to other calcium and sodium channels which have four homologous domains, each containing 6 transmembrane segments (S1 to S6), TPCN1 only contains two domain (each containing segments S1 to S6). Structure TPC2 is homologous to TPC1, the best characterized member of the TPC family. The structure of a TPC1 ortholog from Arabidopsis thaliana has been solved by two laboratories. The structures were solved using X-ray crystallography and contained the fold of a voltage-gated ion channel and EF hands. Filoviral Infections Genetic knockout and pharmacological inhibition experiments demonstrate that Two-pore Channels, TPC1 and TPC2, are required for infection by Filoviruses Ebola and Marburg in mice. See also Two-pore channel
https://en.wikipedia.org/wiki/Snow%20science
Snow science addresses how snow forms, its distribution, and processes affecting how snowpacks change over time. Scientists improve storm forecasting, study global snow cover and its effect on climate, glaciers, and water supplies around the world. The study includes physical properties of the material as it changes, bulk properties of in-place snow packs, and the aggregate properties of regions with snow cover. In doing so, they employ on-the-ground physical measurement techniques to establish ground truth and remote sensing techniques to develop understanding of snow-related processes over large areas. History Snow was described in China, as early as 135 BCE in Han Ying's book Disconnection, which contrasted the pentagonal symmetry of flowers with the hexagonal symmetry of snow. Albertus Magnus proved what may be the earliest detailed European description of snow in 1250. Johannes Kepler attempted to explain why snow crystals are hexagonal in his 1611 book, Strena seu De Nive Sexangula. In 1675 Friedrich Martens, a German physician, catalogued 24 types of snow crystal. In 1865, Frances E. Chickering published Cloud Crystals - a Snow-Flake Album. In 1894, A. A. Sigson photographed snowflakes under a microscope, preceding Wilson Bentley's series of photographs of individual snowflakes in the Monthly Weather Review. Ukichiro Nakaya began an extensive study on snowflakes in 1932. From 1936 to 1949, Nakaya created the first artificial snow crystals and charted the relationship between temperature and water vapor saturation, later called the Nakaya Diagram and other works of research in snow, which were published in 1954 by Harvard University Press publishes as Snow Crystals: Natural and Artificial. Teisaku Kobayashi, verified and improves the Nakaya Diagram with the 1960 Kobayashi Diagram, later refined in 1962. Further interest in artificial snowflake genesis continued in 1982 with Toshio Kuroda and Rolf Lacmann, of the Braunschweig University of Technology,
https://en.wikipedia.org/wiki/Copy%20trading
Copy trading enables individuals in the financial markets to automatically copy positions opened and managed by other selected individuals. Unlike mirror trading, a method that allows traders to copy specific strategies, copy trading links a portion of the copying trader's funds to the account of the copied investor. Any trading action made thenceforth by the copied investor, such as opening a position, assigning Stop Loss and Take Profit orders, or closing a position, are also executed in the copying trader's account according to the proportion between the copied investor's account and the copying trader's allotted copy trading funds. The copying trader usually retains the ability to disconnect copied trades and manage them themselves. They can also close the copy relationship altogether, which closes all copied positions at the current market price. Copied investors, who are called leaders or signal providers, are often compensated by flat monthly subscription fees on the part of a trader, a signal follower, seeking to copy their trades. Apart from that, popular investors may earn up to 100% spread rebate on their personal transactions. The reward schemes serve to stimulate traders to allow others to monitor and copy their trades instead of trading privately. Copy trading has led to the development of a new type of investment portfolio, which some industry insiders call "People-Based Portfolios" or "Signal Portfolios" (borrowing the terminology of the popular MetaQuotes Signal Marketplace). People-based portfolios differ from traditional investment portfolios in that the investment funds are invested in other investors, rather than traditional market-based instruments. While followers do not pass capital into the accounts of the signal providers, the latter operate as portfolio managers de facto, as they have indirect control over a portion in the capital of the signal followers. Therefore, social trading networks provide an innovative framework for delegated
https://en.wikipedia.org/wiki/Canadian%20Society%20for%20Psychomotor%20Learning%20and%20Sport%20Psychology
The Canadian Society for Psychomotor Learning and Sport Psychology () (SCAPPS) is a multidisciplinary association that promotes psychomotor learning and sport psychology in Canada. It was founded as a society in Banff, Alberta, in 1977. The organization encourages the exchange of ideas and scientific knowledge. Journals Journal of Exercise, Movement, and Sport (JEMS) See also Sport psychology
https://en.wikipedia.org/wiki/ESA%20CAVES
CAVES, an acronym for Cooperative Adventure for Valuing and Exercising human behaviour and performance Skills, is a European Space Agency astronaut training course in which international astronauts train in a space-analogue cave environment. Designed at the European Astronaut Center, the course aims to prepare astronauts for safe and efficient long duration spaceflight operations by means of a realistic scientific and exploration mission within a multicultural, ISS-representative team. Each training course lasts for approximately three weeks. The first two weeks focus on providing the astronauts with the necessary behavioural patterns, scientific knowledge, and technical skills to work effectively and safely in an underground environment. During this time, trainees visit simple caves to become acquainted with the conditions they will find themselves in during their final expedition, a six-day uninterrupted expedition exploring a complex cave system. The main purpose of the mission is to foster their communication, decision-making, problem-solving, leadership and team dynamics capabilities by means of team activities and a real crew mission performed in a space-like environment. Location The first five editions of CAVES (2011, 2012, 2013, 2014 and 2016) took place in several caves on the Italian island of Sardinia, part of a Karst System which lies within the Supramonte region. The rocks in this area are predominantly limestone and dolomite. The 2019 edition of CAVES was carried out in the so-called “Classical Karst” area, a karst region between Italy and Slovenia, world famous for its limestone caves. Here, the course makes use of facilities provided by Skočjanske Caves Regional Park, with field activities occurring in several caves along the underground course of the river Timavo, both in Italy and Slovenia. Objectives The CAVES training has the following training objectives for its participants: Working together effectively in a challenging environment; A