source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/MAP-Seq | MAPseq or Multiplexed Analysis of Projections by Sequencing is a RNA-Seq based method for high-throughput mapping of neuronal projections. It was developed by Anthony M. Zador and his team at Cold Spring Harbor Laboratory and published in Neuron, a Cell Press magazine.
The method works by uniquely labeling neurons in a source region by injecting a viral library encoding a diverse collection of RNA sequences ("barcodes"). The barcode mRNA is expressed at high levels and transported into the axon terminals at distal target projection regions. Following this, the cells from source and putative target regions of interest are harvested, and their RNA is extracted and sequenced. By matching the presence of the unique "barcode" in the source and target tissue, one can map the projections of neuron in a one-to-many fashion.
See also
RNA-Seq
Patch-sequencing |
https://en.wikipedia.org/wiki/Omega%20hydroxy%20acid | Omega hydroxy acids (ω-hydroxy acids) are a class of naturally occurring straight-chain aliphatic organic acids n carbon atoms long with a carboxyl group at position 1 (the starting point for the family of carboxylic acids), and a hydroxyl at terminal position n where n > 3. They are a subclass of hydroxycarboxylic acids. The C16 and C18 omega hydroxy acids 16-hydroxy palmitic acid and 18-hydroxy stearic acid are key monomers of cutin in the plant cuticle. The polymer cutin is formed by interesterification of omega hydroxy acids and derivatives of them that are substituted in mid-chain, such as 10,16-dihydroxy palmitic acid. Only the epidermal cells of plants synthesize cutin.
Omega hydroxy fatty acids also occur in animals. Cytochrome P450 (CYP450) microsome ω-hydroxylases such as CYP4A11, CYP4A22, CYP4F2, and CYP4F3 in humans, Cyp4a10 and Cyp4a12 in mice, and Cyp4a1, Cyp4a2, Cyp4a3, and Cyp4a8 in rats metabolize arachidonic acid and many arachidonic acid metabolites to their corresponding omega hydroxyl products. This metabolism of arachidonic acid produces 20-hydroxyarachidonic acid (i.e. 20-hydroxyeicosatetraeonic acid or 20-HETE), a bioactive product involved in various physiological and pathological processes; and this metabolism of certain bioactive arachidonic acid metabolites such as leukotriene B4 and 5-hydroxyicosatetraenoic acid produces 20-hydroxylated products which are 100- to 1,000-fold weaker than, and therefore represents the inactivation of, their respective precursors.
List
The definition for "omega" includes number of carbons (C#) greater or equal to three. Lower numbers are included here to match the formula pattern CnH2nO3.
See also
Alpha hydroxy acid
Beta hydroxy acid |
https://en.wikipedia.org/wiki/Reaction%20quotient | In chemical thermodynamics, the reaction quotient (Qr or just Q) is a dimensionless quantity that provides a measurement of the relative amounts of products and reactants present in a reaction mixture for a reaction with well-defined overall stoichiometry, at a particular point in time. Mathematically, it is defined as the ratio of the activities (or molar concentrations) of the product species over those of the reactant species involved in the chemical reaction, taking stoichiometric coefficients of the reaction into account as exponents of the concentrations. In equilibrium, the reaction quotient is constant over time and is equal to the equilibrium constant.
A general chemical reaction in which α moles of a reactant A and β moles of a reactant B react to give ρ moles of a product R and σ moles of a product S can be written as
\it \alpha\,\rm A{} + \it \beta\,\rm B{} <=> \it \rho\,\rm R{} + \it \sigma\,\rm S{}.
The reaction is written as an equilibrium even though in many cases it may appear that all of the reactants on one side have been converted to the other side. When any initial mixture of A, B, R, and S is made, and the reaction is allowed to proceed (either in the forward or reverse direction), the reaction quotient Qr, as a function of time t, is defined as
where {X}t denotes the instantaneous activity of a species X at time t.
A compact general definition is
where Пj denotes the product across all j-indexed variables, aj(t) is the activity of species j at time t, and νj is the stoichiometric number (the stoichiometric coefficient multiplied by +1 for products and –1 for starting materials).
Relationship to K (the equilibrium constant)
As the reaction proceeds with the passage of time, the species' activities, and hence the reaction quotient, change in a way that reduces the free energy of the chemical system. The direction of the change is governed by the Gibbs free energy of reaction by the relation
,
where K is a constant independent of initi |
https://en.wikipedia.org/wiki/Yeast%20Metabolome%20Database | The Yeast Metabolome Database (YMDB) is a comprehensive, high-quality, freely accessible, online database of small molecule metabolites found in or produced by Saccharomyces cerevisiae (Baker’s yeast). The YMDB was designed to facilitate yeast metabolomics research, specifically in the areas of general fermentation as well as wine, beer and fermented food analysis. YMDB supports the identification and characterization of yeast metabolites using NMR spectroscopy, GC-MS spectrometry and Liquid chromatography–mass spectrometry (LC-MS spectrometry). The YMDB contains two kinds of data: 1) chemical data and 2) molecular biology/biochemistry data. The chemical data includes 2027 metabolite structures with detailed metabolite descriptions along with nearly 4000 NMR, GC-MS and LC/MS spectra.
The biochemical data includes 1104 protein (and DNA) sequences and more than 900 biochemical reactions (Fig. 1) that are linked to these metabolite entries. Each metabolite entry in the YMDB contains more than 80 data fields with 2/3 of the information being devoted to chemical data and the other 1/3 devoted to enzymatic or biochemical data. Many data fields are hyperlinked to other databases (KEGG, PubChem, MetaCyc, ChEBI, Protein Data Bank, UniProt, and GenBank) and a variety of structure and pathway viewing applets. The YMDB database supports extensive text, sequence, spectral, chemical structure and relational query searches.
Scope and access
All data in YMDB is non-proprietary or is derived from a non-proprietary source. It is freely accessible and available to anyone. In addition, nearly every data item is fully traceable and explicitly referenced to the original source. YMDB data is available through a public web interface and downloads.
Users may search through the YMDB using a variety of database-specific tools. The simple text query supports general text queries of the textual component of the database. By selecting either metabolites or proteins in the “search for” fie |
https://en.wikipedia.org/wiki/Kernel%20debugger | A kernel debugger is a debugger present in some operating system kernels to ease debugging and kernel development by the kernel developers. A kernel debugger might be a stub implementing low-level operations, with a full-blown debugger such as GNU Debugger (gdb), running on another machine, sending commands to the stub over a serial line or a network connection, or it might provide a command line that can be used directly on the machine being debugged.
Operating systems and operating system kernels that contain a kernel debugger:
The Windows NT family includes a kernel debugger named KD, which can act as a local debugger with limited capabilities (reading and writing kernel memory, and setting breakpoints) and can attach to a remote machine over a serial line, IEEE 1394 connection, USB 2.0 or USB 3.0 connection. The WinDbg GUI debugger can also be used to debug kernels on local and remote machines.
BeOS and Haiku include a kernel debugger usable with either an on-screen console or over a serial line. It features various commands to inspect memory, threads, and other kernel structures.
DragonFly BSD
Linux kernel; No kernel debugger was included in the mainline Linux tree prior to version 2.6.26-rc1 because Linus Torvalds didn't want a kernel debugger in the kernel.
KDB (local)
KGDB (remote)
MDB (local/remote)
NetBSD (DDB for local, KGDB for remote)
macOS - ddb for local, kdp for remote
OpenBSD includes ddb which has a syntax is similar to GNU Debugger. |
https://en.wikipedia.org/wiki/Neurosymploca%3F%20oligocenica | Neurosymploca? oligocenica is an extinct species of moth in the family Zygaenidae, and possibly in the modern genus Neurosymploca. The species is known from Early Oligocene, Rupelian stage, lake deposits near the commune of Céreste in the Alpes-de-Haute-Provence, France.
History and classification
Neurosymploca? oligocenica is known only from one fossil, the holotype, specimen "MNHN-LP-R 55185". It is a single, mostly complete adult which may be male, preserved as a compression fossil in fine grained shale. The shale specimen is from the fossil bearing calcareous and oilshale outcrops of paleolake Céreste. The type specimen is currently preserved in the paleoentomological collections housed in the Muséum national d'histoire naturelle, the National Museum of Natural History, located in Paris, France. N.? oligocenica was first studied by Fidel Fernández-Rubio of Madrid, Spain and André Nel of the Muséum national d'histoire naturelle, with their 2000 type description being published in the journal Boletín de La S.E.A. Fernández-Rubio and Nel coined the specific epithet oligocenica as a reference to Oligocene, the age of the species. At the time of description, a second fossil possibly from the same species had recently been discovered, however as it was being held in a private collection in Strasbourg, France, it was unavailable for study.
Description
The holotype of N.? oligocenica is long with a robust thorax and an abdomen which has four possible color bands and a definite darker fifth band near the apex. The slender antennae are 38–46 segments long, with tips which form less differentiated antennal clubs at the tips than modern species in the family. The antennae display a rhomboidal cross section that is not present in any other member of the family. While poorly preserved and partly disarticulated, the legs are very similar in appearance to modern species. The fore wings are long and wide, giving a length to width ratio that is greater than in modern species |
https://en.wikipedia.org/wiki/Drug%20allergy | A drug allergy is an allergy to a drug, most commonly a medication, and is a form of adverse drug reaction. Medical attention should be sought immediately if an allergic reaction is suspected.
An allergic reaction will not occur on the first exposure to a substance. The first exposure allows the body to create antibodies and memory lymphocyte cells for the antigen. However, drugs often contain many different substances, including dyes, which could cause allergic reactions. This can cause an allergic reaction on the first administration of a drug. For example, a person who developed an allergy to a red dye will be allergic to any new drug which contains that red dye.
A drug allergy is different from an intolerance. A drug intolerance, which is often a milder, non-immune-mediated reaction, does not depend on prior exposure.
Signs and symptoms
Symptoms of drug hypersensitivity reactions can be similar to non-allergic adverse effects. Common symptoms include:
Hives
Itching
Rash
Fever
Facial swelling
Shortness of breath due to the short-term constriction of lung airways or longer-term damage to lung tissue
Anaphylaxis, a life-threatening drug reaction (produces most of these symptoms as well as low blood pressure)
Cardiac symptoms such as chest pain, shortness of breath, fatigue, chest palpitations, light headedness, and syncope due to a rare drug-induced reaction, eosinophilic myocarditis
Causes
Some classes of medications have a higher rate of drug reactions than others. These include antiepileptics, antibiotics, antiretrovirals, NSAIDs, and general and local anesthetics.
Risk factors
Risk factors for drug allergies can be attributed to the drug itself or the characteristics of the patient. Drug-specific risk factors include the dose, route of administration, duration of treatment, repetitive exposure to the drug, and concurrent illnesses. Host risk factors include age, sex, atopy, specific genetic polymorphisms, and inherent predisposition to react to |
https://en.wikipedia.org/wiki/Service%20locator%20pattern | The service locator pattern is a design pattern used in software development to encapsulate the processes involved in obtaining a service with a strong abstraction layer. This pattern uses a central registry known as the "service locator", which on request returns the information necessary to perform a certain task. Proponents of the pattern say the approach simplifies component-based applications where all dependencies are cleanly listed at the beginning of the whole application design, consequently making traditional dependency injection a more complex way of connecting objects. Critics of the pattern argue that it is an anti-pattern which obscures dependencies and makes software harder to test.
Advantages
The "service locator" can act as a simple run-time linker. This allows code to be added at run-time without re-compiling the application, and in some cases without having to even restart it.
Applications can optimize themselves at run-time by selectively adding and removing items from the service locator. For example, an application can detect that it has a better library for reading JPG images available than the default one, and alter the registry accordingly.
Large sections of a library or application can be completely separated. The only link between them becomes the registry.
An application may use multiple structured service locators purposed for particular functionality/testing. Service locator does not mandate one single static class per process.
The solution may be simpler with service locator (vs. dependency injection) in applications with well-structured component/service design. In these cases, the disadvantages may actually be considered as an advantage (e.g., no need to supply various dependencies to every class and maintain dependency configurations).
Disadvantages
The registry hides the class' dependencies, causing run-time errors instead of compile-time errors when dependencies are missing (similar to using dependency injection). But e |
https://en.wikipedia.org/wiki/Blood%20fractionation | Blood fractionation is the process of fractionating whole blood, or separating it into its component parts. This is typically done by centrifuging the blood.
The resulting components are:
a clear solution of blood plasma in the upper phase (which can be separated into its own fractions, see Blood plasma fractionation),
the buffy coat, which is a thin layer of leukocytes (white blood cells) mixed with platelets in the middle, and
erythrocytes (red blood cells) at the bottom of the centrifuge tube.
Serum separation tubes (SSTs) are tubes used in phlebotomy containing a silicone gel; when centrifuged the silicone gel forms a layer on top of the buffy coat, allowing the blood serum to be removed more effectively for testing and related purposes.
As an alternative to energy-consuming centrifugation, more energy-efficient technologies have been studied, such as ultrasonic fractionation.
Plasma protein fractionation
Plasma proteins are separated by using the inherent differences of each protein. Fractionation involves changing the conditions of the pooled plasma (e.g., the temperature or the acidity) so that proteins that are normally dissolved in the plasma fluid become insoluble, forming large clumps, called precipitate. The insoluble protein can be collected by centrifugation. One of the very effective ways for carrying out this process is the addition of alcohol to the plasma membrane pool while simultaneously cooling the pool. This process is sometimes called cold alcohol fractionation or ethanol fractionation. It was described by and bears the eponym of Dr Edwin J. Cohn. This procedure is carried out in a series of steps so that a single pool of plasma yields several different protein products, such as albumin and immune globulin. Human serum albumin prepared by this process is used in some vaccines, for treating burn victims, and other medical applications.
See also
Blood plasma fractionation |
https://en.wikipedia.org/wiki/Megabias | A megabias, or a taphonomic megabias, is a large-scale pattern in the quality of the fossil record that affects paleobiologic analysis at provincial to global levels and at timescales usually exceeding ten million years. It can result from major shifts in intrinsic and extrinsic properties of organisms, including morphology and behaviour in relation to other organisms, or shifts in the global environment, which can cause secular or long-term cyclic changes in preservation.
Introduction
The fossil record exhibits bias at many different levels. At the most basic level, there is a global bias towards biomineralizing organisms, because biomineralized body parts are more resistant to decay and degradation. Due to the principle of uniformitarianism, there is a basic assumption in geology that the formation of rocks has occurred by the same naturalistic processes throughout history, and thus that the reach of such biases remains stable over time. A megabias is a direct contradiction of this, whereby changes occur in large scale paleobiologic patterns. This includes:
Changes in diversity and community structure over tens of millions of years
Variation in the quality of the fossil record between mass and background extinction times
Variation among different climate states, biogeographic provinces, and tectonic settings.
It is generally assumed that the quality of the fossil record decreases globally and across all taxa with increasing age, because more time is available for the diagenesis and destruction of both fossils and enclosing rocks, and thus the term "megabias" is usually used to refer to global trends in preservation. However, it has been noted that the fossil record of some taxa actually improves with greater age. Examples such as this, and other related paleobiological trends, clearly indicate the action of a megabias, but only within one particular taxon. Hence, it is necessary to define four classes of megabias related to the reach of the bias, first defined |
https://en.wikipedia.org/wiki/Scarification%20%28botany%29 | Scarification in botany involves weakening, opening, or otherwise altering the coat of a seed to encourage germination. Scarification is often done mechanically, thermally, and chemically. The seeds of many plant species are often impervious to water and gases, thus preventing or delaying germination. Any process designed to make the testa (seed coat) more permeable to water and gases is known as scarification.
Scarification, regardless of type, works by speeding up the natural processes which normally make seed coats permeable to water and air. For drupes (stone fruits), scarification also extends to weakening or removal of the hard endocarp shell around the seed.
Types
Regardless of the method, scarified seeds do not store well and need to be planted quickly, lest the seeds become unviable.
Mechanical
The most common type of scarification is mechanical scarification.
In mechanical scarification, the testa is physically opened to allow moisture and air in. Seed coats may be filed with a metal file, rubbed with sandpaper, nicked with a knife, cracked gently with a hammer, or weakened or opened in any other way.
Heat
Hot water
The imbibition of water through seed shell membrane is affected by water temperature. Species that can withstand hot water will sprout faster under that condition than from cold tap water.
The North Carolina State University recommends placing the seeds in boiling water and letting them soak while the water cools to room temperature, and then remove the seeds from the water and sow. The buoyancy of floating seeds must be compensated with gravity to submerge them, this can be achieved with an infuser.
Hot water scarification can be combined with chemical scarification, but might require protective equipment against formed gases.
Hot water treatment is also used for removal of pathogens. Placing seeds in 90 °C for 90 seconds followed by dip in cold water for 30 seconds kills the human pathogens Escherichia coli O157:H7 and Salmonella. A |
https://en.wikipedia.org/wiki/Evoked%20field | Evoked fields are part of the magnetoencephalogram. They are brain signals evoked by sensory stimulation, but usually buried by the ongoing brain activity. Repeating the stimulus multiple times and averaging the signals reduces the uncorrelated ongoing activity and reveals the evoked field. Evoked fields are the magnetoencephalographic equivalent to evoked potentials, which are part of the electroencephalogram.
Auditory evoked fields
An auditory evoked field (AEF) is a form neural activity that is induced by an auditory stimulus and recorded via magnetoencephalography, which is an equivalent of auditory evoked potential (AEP) recorded by electroencephalography. The advantage of AEF over AEP is the powerful spatial resolution provided by magnetic field recording, which AEP lacks. Thus, researchers using AEF often deals with the global responses of the whole brain at the cortical level while focusing on the role of the auditory pathway. The common applications of AEF are prenatal and neonatal hearing screening, cortical pitch perception, language comprehension, and attention.
Sources and types of responses
The main source of the auditory evoked field is the auditory cortex and the association cortices. The earliest cortical components of AEF is equivalent to the middle latency response (MLR) of the EEG evoked potential, called the middle latency auditory evoked field (MLAEF), which occurs at 30 to 50 ms after the stimulus onset. M30 and M50, occurring at 30 and 50 ms after the stimulus onset, correspond to the Pa and Pb peaks of MLR. The M50 response was often used to study the correlation of aging and hearing loss. Research has shown that the amplitude of contralateral M50 enlarges with age.
At 100 ms after stimulus onset occurs the most prominent response in the late latency range, the M100, which corresponds to the N1 peak of the auditory long latency response (ALR) potential. M100 is the most widely used magnetic field response clinically. In 2007, Lütkenhöne |
https://en.wikipedia.org/wiki/Hereditarianism | Hereditarianism is the doctrine or school of thought that heredity plays a significant role in determining human nature and character traits, such as intelligence and personality. Hereditarians believe in the power of genetics to explain human character traits and solve human social and political problems. Hereditarians adopt the view that an understanding of human evolution can extend the understanding of human nature.
Overview
Social scientist Barry Mehler defines hereditarianism as "the belief that a substantial part of both group and individual differences in human behavioral traits are caused by genetic differences". Hereditarianism is sometimes used as a synonym for biological or genetic determinism, though some scholars distinguish the two terms. When distinguished, biological determinism is used to mean that heredity is the only factor. Supporters of hereditarianism reject this sense of biological determinism for most cases. However, in some cases genetic determinism is true; for example, Matt Ridley describes Huntington's disease as "pure fatalism, undiluted by environmental variability". In other cases, hereditarians would see no role for genes; for example, the condition of "not knowing a word of Chinese" has nothing to do (directly) with genes.
Hereditarians point to the heritability of cognitive ability, and the outsized influence that cognitive ability has on life outcomes, as evidence in favor of the hereditarian viewpoint. According to Plomin and Van Stumm (2018), "Intelligence is highly heritable and predicts important educational, occupational and health outcomes better than any other trait." Estimates for the heritability of intelligence range from 20% in infancy to 80% in adulthood.
History
Francis Galton is generally considered the father of hereditarianism. In his book Hereditary Genius (1869), Galton pioneered research on the heredity of intelligence. Galton continued research into the heredity of human behavior in his later works, includ |
https://en.wikipedia.org/wiki/Class%20variable | In class-based, object-oriented programming, a class variable is a variable defined in a class of which a single copy exists, regardless of how many instances of the class exist.
A class variable is not an instance variable. It is a special type of class attribute (or class property, field, or data member). The same dichotomy between instance and class members applies to methods ("member functions") as well; a class may have both instance methods and class methods.
Static member variables and static member functions
In some languages, class variables and class methods are either statically resolved, not via dynamic dispatch, or their memory statically allocated at compile time (once for the entire class, as static variables), not dynamically allocated at run time (at every instantiation of an object). In other cases, however, either or both of these are dynamic. For example, if classes can be dynamically defined (at run time), class variables of these classes are allocated dynamically when the class is defined, and in some languages class methods are also dispatched dynamically.
Thus in some languages, static member variable or static member function are used synonymously with or in place of "class variable" or "class function", but these are not synonymous across languages. These terms are commonly used in Java, C# , and C++, where class variables and class methods are declared with the static keyword, and referred to as static member variables or static member functions.
Example
C++
struct Request {
static int count;
int number;
Requestobject() {
number = count; // modifies the instance variable "this->number"
++count; // modifies the class variable "Request::count"
}
};
int Request::count = 0;
In this C++ example, the class variable Request::count is incremented on each call to the constructor, so that Request::count always holds the number of Requests that have been constructed, and each new Request object is giv |
https://en.wikipedia.org/wiki/BOP%20clade | The BOP clade (sometimes BEP clade) is one of two major lineages (or clades) of undefined taxonomic rank in the grasses (Poaceae), containing more than 5,400 species, about half of all grasses. Its sister group is the PACMAD clade; contrary to many species of that group who have evolved C4 photosynthesis, the BOP grasses all use the C3 photosynthetic pathway.
The clade contains three subfamilies from whose initials its name derives: the bamboos (Bambusoideae); Oryzoideae (syn. Ehrhartoideae), including rice; and Pooideae, mainly distributed in temperate regions, with the largest diversity and important cereal crops such as wheat and barley. Oryzoideae is the earliest-diverging lineage, sister to the bamboos and Pooideae: |
https://en.wikipedia.org/wiki/NetWare%20Core%20Protocol | The NetWare Core Protocol (NCP) is a network protocol used in some products from Novell, Inc. It is usually associated with the client-server operating system Novell NetWare which originally supported primarily MS-DOS client stations, but later support for other platforms such as Microsoft Windows, the classic Mac OS, Linux, Windows NT, Mac OS X, and various flavors of Unix was added.
The NCP is used to access file, print, directory, clock synchronization, messaging, remote command execution and other network service functions. It originally took advantage of an easy network configuration and a little memory footprint of the IPX/SPX protocol stack. Since 1991 the TCP/IP implementation is available.
Novell eDirectory uses NCP for synchronizing data changes between the servers in a directory service tree.
Technical information
The original IPX/SPX implementation was provided only for Novell NetWare platform and now is obsolete. The TCP/IP implementation uses TCP/UDP port 524 and relies on SLP for name resolution.
For NCP operation in IPX/SPX networks the bare IPX protocol was used with Packet Type field set to 17. On the workstation (client station) side the IPX socket number of 0x4003 was used, on the server side the socket number of 0x0451.
The NCP PDU has the following structure:
The NCP Type field determines the type of operation:
Individual requests are identified by the Sequence Number (modulo 256). The Connection Number identifies an individual client station connection on the server. Novell Netware servers of version up to 2.x supported up to 255 connections and the Connection Number occupied only 1 octet. Later it was extended to 2 octets. Task number has value 3 in requests and 1 in replies. The Data field starts with NCP Function number octet which distinguishes individual services.
The contents and the length of the rest of the Data field depends on the NCP Function.
Client-side implementations
Novell Client for Windows Vista from Novell.
Nov |
https://en.wikipedia.org/wiki/Puerto%20Rico%20statistical%20areas | The currently has 15 statistical areas that have been delineated by the United States Office of Management and Budget (OMB). On March 6, 2020, the OMB delineated three combined statistical areas, eight metropolitan statistical areas, and four micropolitan statistical areas in .
Statistical areas
The Office of Management and Budget (OMB) has designated more than 1,000 statistical areas for the United States and Puerto Rico. These statistical areas are important geographic delineations of population clusters used by the OMB, the United States Census Bureau, planning organizations, and federal, state, and local government entities.
The OMB defines a core-based statistical area (commonly referred to as a CBSA) as "a statistical geographic entity consisting of the county or counties (or county-equivalents) associated with at least one core of at least 10,000 population, plus adjacent counties having a high degree of social and economic integration with the core as measured through commuting ties with the counties containing the core." The OMB further divides core-based statistical areas into metropolitan statistical areas (MSAs) that have "a population of at least 50,000" and micropolitan statistical areas (μSAs) that have "a population of at least 10,000, but less than 50,000."
The OMB defines a combined statistical area (CSA) as "a geographic entity consisting of two or more adjacent core-based statistical areas with employment interchange measures of at least 15%." The primary statistical areas (PSAs) include all combined statistical areas and any core-based statistical area that is not a constituent of a combined statistical area.
Table
The table below describes the 15 statistical areas and 78 municipios of the Commonwealth of Puerto Rico with the following information:
The combined statistical area (CSA) as designated by the OMB.
The CSA population according to 2019 US Census Bureau population estimates.
The core based statistical area (CBSA) as designated by |
https://en.wikipedia.org/wiki/Density%20contrast | Density contrast is a parameter used in galaxy formation to indicate where there are local enhancements in matter density.
It is believed that after inflation, although the universe was mostly uniform, some regions were slightly denser than others with contrast densities on the order of 1 trillionth. As the horizon distance expanded, the enclosed causally connected (i.e. gravitationally connected) masses increased until they reached the Jeans mass and began to collapse, which allowed galaxies, galaxy clusters, superclusters, and filaments to form. |
https://en.wikipedia.org/wiki/Facade%20pattern | The facade pattern (also spelled façade) is a software-design pattern commonly used in object-oriented programming. Analogous to a facade in architecture, a facade is an object that serves as a front-facing interface masking more complex underlying or structural code. A facade can:
improve the readability and usability of a software library by masking interaction with more complex components behind a single (and often simplified) API
provide a context-specific interface to more generic functionality (complete with context-specific input validation)
serve as a launching point for a broader refactor of monolithic or tightly-coupled systems in favor of more loosely-coupled code
Developers often use the facade design pattern when a system is very complex or difficult to understand because the system has many interdependent classes or because its source code is unavailable. This pattern hides the complexities of the larger system and provides a simpler interface to the client. It typically involves a single wrapper class that contains a set of members required by the client. These members access the system on behalf of the facade client and hide the implementation details.
Overview
The Facade
design pattern is one of the twenty-three well-known
GoF design patterns
that describe how to solve recurring design problems to design flexible and reusable object-oriented software, that is, objects that are easier to implement, change, test, and reuse.
What problems can the Facade design pattern solve?
To make a complex subsystem easier to use, a simple interface should be provided for a set of interfaces in the subsystem.
The dependencies on a subsystem should be minimized.
Clients that access a complex subsystem directly refer to (depend on) many different objects having different interfaces (tight coupling), which makes the clients hard to implement, change, test, and reuse.
What solution does the Facade design pattern describe?
Define a Facade object that
i |
https://en.wikipedia.org/wiki/Active%20Directory%20Rights%20Management%20Services | Active Directory Rights Management Services (AD RMS, known as Rights Management Services or RMS before Windows Server 2008) is a server software for information rights management shipped with Windows Server. It uses encryption and a form of selective functionality denial for limiting access to documents such as corporate e-mails, Microsoft Word documents, and web pages, and the operations authorized users can perform on them. Companies can use this technology to encrypt information stored in such document formats, and through policies embedded in the documents, prevent the protected content from being decrypted except by specified people or groups, in certain environments, under certain conditions, and for certain periods of time. Specific operations like printing, copying, editing, forwarding, and deleting can be allowed or disallowed by content authors for individual pieces of content, and RMS administrators can deploy RMS templates that group these rights together into predefined rights that can be applied en masse.
RMS debuted in Windows Server 2003, with client API libraries made available for Windows 2000 and later. The Rights Management Client is included in Windows Vista and later, is available for Windows XP, Windows 2000 or Windows Server 2003. In addition, there is an implementation of AD RMS in Office for Mac to use rights protection in OS X and some third-party products are available to use rights protection on Android, Blackberry OS, iOS and Windows RT.
Attacks against policy enforcement capabilities
In April 2016, an alleged attack on RMS implementations (including Azure RMS) was published and reported to Microsoft. The published code allows an authorized user that has been granted the right to view an RMS protected document to remove the protection and preserve the file formatting. This sort of manipulation requires that the user has been granted rights to decrypt the content to be able to view it. While Rights Management Services makes certain s |
https://en.wikipedia.org/wiki/CLCN7 | Chloride channel 7 alpha subunit also known as H+/Cl− exchange transporter 7 is a protein that in humans is encoded by the CLCN7 gene. In melanocytic cells this gene is regulated by the Microphthalmia-associated transcription factor.
Clinical significance
Mutations in the CLCN7 gene have been reported to be associated with autosomal dominant osteopetrosis type II, a rare disease of bones.
See also
Chloride channel |
https://en.wikipedia.org/wiki/Make%20It%20Rain%20%28Foy%20Vance%20song%29 | "Make It Rain" is a song by Northern Irish musician Foy Vance. It was made famous by Ed Sheeran in 2014 when it was used in the television series Sons of Anarchy. Two additional versions of this song charted in the United States after they were performed on The Voice. One by Matt McAndrew in 2014 and another by Koryn Hawthorne in 2015.
Ed Sheeran version
Ed Sheeran's recording of the song was used in the penultimate episode of season 7 of the television series Sons of Anarchy. Sheeran was a fan of the music for the series and mentioned it in a tweet. When the show's creator (Kurt Sutter) read the tweet, he proposed that Sheeran record a song for one of the episodes. As Sheeran was touring with Foy Vance at the time, and as one of Vance's songs (Make It Rain) started with the lyrics "When the sins of my father / Weigh down in my soul", Sheeran thought it was appropriate for the series and with Vance's approval, Sheeran recorded the song to be used in the episode "Red Rose" broadcast on 2 December 2014.
Charts
Certifications
Matt McAndrew version
Charts
Koryn Hawthorne version
Charts |
https://en.wikipedia.org/wiki/Agenesis | In medicine, agenesis () refers to the failure of an organ to develop during embryonic growth and development due to the absence of primordial tissue. Many forms of agenesis are referred to by individual names, depending on the organ affected:
Agenesis of the corpus callosum - failure of the Corpus callosum to develop
Renal agenesis - failure of one or both of the kidneys to develop
Amelia - failure of the arms or legs to develop
Penile agenesis - failure of penis to develop
Müllerian agenesis - failure of the uterus and part of the vagina to develop
Agenesis of the gallbladder - failure of the Gallbladder to develop. A person may not realize they have this condition unless they undergo surgery or medical imaging, since the gallbladder is neither externally visible nor essential.
Eye agenesis
Eye agenesis is a medical condition in which people are born with no eyes.
Dental & oral agenesis
Anodontia, absence of all primary or permanent teeth.
Aglossia, absence of the tongue.
Agnathia, absence of the jaw.
Wisdom tooth agenesis - most adult humans have three molars (on each upper/lower left/right side), with the third being referred to as the wisdom tooth. But many people have less than the four total. Agenesis of wisdom teeth is a normal condition that can differ widely by population, ranging from practically zero in Tasmanian Aborigines to nearly 100% in indigenous Mexicans. (See research paper with world map showing prevalence.)
Ear agenesis
Ear agenesis is a medical condition in which people are born without ears.
Because the middle and inner ears are necessary for hearing, people with complete agenesis of the ears are totally deaf. Minor agenesis that affects only the visible parts of the outer ear, which may be called microtia, typically produces cosmetic concerns and perhaps hearing impairment if the opening to the ear canal is blocked, but not deafness. |
https://en.wikipedia.org/wiki/Blood%E2%80%93brain%20barrier | The blood–brain barrier (BBB) is a highly selective semipermeable border of endothelial cells that regulates the transfer of solutes and chemicals between the circulatory system and the central nervous system, thus protecting the brain from harmful or unwanted substances in the blood. The blood–brain barrier is formed by endothelial cells of the capillary wall, astrocyte end-feet ensheathing the capillary, and pericytes embedded in the capillary basement membrane. This system allows the passage of some small molecules by passive diffusion, as well as the selective and active transport of various nutrients, ions, organic anions, and macromolecules such as glucose and amino acids that are crucial to neural function.
The blood–brain barrier restricts the passage of pathogens, the diffusion of solutes in the blood, and large or hydrophilic molecules into the cerebrospinal fluid, while allowing the diffusion of hydrophobic molecules (O2, CO2, hormones) and small non-polar molecules. Cells of the barrier actively transport metabolic products such as glucose across the barrier using specific transport proteins. The barrier also restricts the passage of peripheral immune factors, like signaling molecules, antibodies, and immune cells, into the CNS, thus insulating the brain from damage due to peripheral immune events.
Specialized brain structures participating in sensory and secretory integration within brain neural circuits—the circumventricular organs and choroid plexus—have in contrast highly permeable capillaries.
Structure
The BBB results from the selectivity of the tight junctions between the endothelial cells of brain capillaries, restricting the passage of solutes. At the interface between blood and the brain, endothelial cells are adjoined continuously by these tight junctions, which are composed of smaller subunits of transmembrane proteins, such as occludin, claudins (such as Claudin-5), junctional adhesion molecule (such as JAM-A). Each of these tight junct |
https://en.wikipedia.org/wiki/List%20of%20Chinese%20flags | This is a list of flags of entities named or related to "China".
People's Republic of China
National flags
Special administrative regions flags
Military flags
Civil flags
City flags
Political flags
Flags of Political Groups and Separatist Movements
Proposed national flags of the People's Republic of China
In July 1949, a contest was announced for a national flag for the newly founded People's Republic of China (PRC). From a total of about 3,000 proposed designs, 38 finalists were chosen. In September, the current flag, submitted by Zeng Liansong, was officially adopted, with the hammer and sickle removed.
Alternative proposals
Selection of proposals
House flags
Historical Communist States
Historical Military Flags
Republic of China
National flags
Standards
Head of state
Vice president
Other high executive officials
Military flags
Army
Navy
Air Force
Marine Corps
Combined Logistics Command
National Defense University
Coast Guard Administration
Police
Water Police
Fire Service
Rescue aviation
Ministries
Councils
Agency
Civil and Merchant Ensign
Postal flags
Chinese Maritime Customs Service
Salt Administration
Yacht Club Ensign
Sporting flags
City and county flags
As of 18 November 1997, the Chinese Government banned localities from making and using local flags and emblems. Despite the ban, some cities have adopted their own flag that often includes their local emblem as shown below. The ROC-controlled areas continues to use the respective flags.
Provinces
The PRC-controlled mainland does not have provincial flags, but the ROC-controlled area has a flag for one of its two provinces.
History
University flags
Political flags
Cultural flags
Proposed flags
Republic of China
Taiwan Independence Movement
Railway flags
House flags
Association flags
Warlords
Pre-Qing States
Standards
Qing dynasty and other pre-1912 states
National flags
Standards
Military flags
Navy
Chinese Maritime Customs Service
House flags
Fla |
https://en.wikipedia.org/wiki/Working%20animal | A working animal is an animal, usually domesticated, that is kept by humans and trained to perform tasks instead of being slaughtered to harvest animal products. Some are used for their physical strength (e.g. oxen and draft horses) or for transportation (e.g. riding horses and camels), while others are service animals trained to execute certain specialized tasks (e.g. hunting and guide dogs, messenger pigeons, and fishing cormorants). They may also be used for milking or herding. Some, at the end of their working lives, may also be used for meat or leather.
The history of working animals may predate agriculture as dogs were used by hunter-gatherer ancestors; around the world, millions of animals work in relationship with their owners. Domesticated species are often bred for different uses and conditions, especially horses and working dogs. Working animals are usually raised on farms, though some are still captured from the wild, such as dolphins and some Asian elephants.
People have found uses for a wide variety of abilities in animals, and even industrialised societies use many animals for work. People use the strength of horses, elephants, and oxen to pull carts and move loads. Police forces use dogs for finding illegal substances and assisting in apprehending wanted persons, others use dogs to find game or search for missing or trapped people. People use various animals—camels, donkeys, horses, dogs, etc.—for transport, either for riding or to pull wagons and sleds. Other animals, including dogs and monkeys, help disabled people.
On rare occasions, wild animals are not only tamed, but trained to perform work—though often solely for novelty or entertainment, as such animals tend to lack the trustworthiness and mild temper of true domesticated working animals. Conversely, not all domesticated animals are working animals. For example, while cats may catch mice, it is an instinctive behaviour, not one that can be trained by human intervention. Other domesticated |
https://en.wikipedia.org/wiki/Center%20of%20percussion | The center of percussion is the point on an extended massive object attached to a pivot where a perpendicular impact will produce no reactive shock at the pivot. Translational and rotational motions cancel at the pivot when an impulsive blow is struck at the center of percussion. The center of percussion is often discussed in the context of a bat, racquet, door, sword or other extended object held at one end.
The same point is called the center of oscillation for the object suspended from the pivot as a pendulum, meaning that a simple pendulum with all its mass concentrated at that point will have the same period of oscillation as the compound pendulum.
In sports, the center of percussion of a bat, racquet, or club is related to the so-called "sweet spot", but the latter is also related to vibrational bending of the object.
Explanation
Imagine a rigid beam suspended from a wire by a fixture that can slide freely along the wire at point P, as shown in the Figure. An impulsive blow is applied from the left. If it is below the center of mass (CM) it will cause the beam to rotate counterclockwise around the CM and also cause the CM to move to the right. The center of percussion (CP) is below the CM. If the blow falls above the CP, the rightward translational motion will be bigger than the leftward rotational motion at P, causing the net initial motion of the fixture to be rightward. If the blow falls below the CP the opposite will occur, rotational motion at P will be larger than translational motion and the fixture will move initially leftward. Only if the blow falls exactly on the CP will the two components of motion cancel out to produce zero net initial movement at point P.
When the sliding fixture is replaced with a pivot that cannot move left or right, an impulsive blow anywhere but at the CP results in an initial reactive force at the pivot.
Calculating the center of percussion
For a free, rigid beam, an impulse applied at right angle at a distance |
https://en.wikipedia.org/wiki/NARCIS | NARCIS (National Academic Research and Collaboration Information System) of the Netherlands was an online portal for searching Dutch scientific research publications and data. As of July 2018, NARCIS indexed 268,989 data sets and 1,707,486 publications, including a significant proportion of open access works.
It started in 2004 as a project of the Koninklijke Nederlandse Akademie van Wetenschappen, Information Centre of the Radboud University of Nijmegen (METIS), Nederlandse Organisatie voor Wetenschappelijk Onderzoek, and Vereniging van Universiteiten. Since 2011 the (DANS) operated NARCIS from headquarters in The Hague. In 2015, it was decided to replace the Digital Author Identifier used until then with the International Standard Name Identifier or ORCID. As of 3 July 2023, the portal has been decommissioned.
See also
Open access in the Netherlands |
https://en.wikipedia.org/wiki/Chrain | (; ; or ; ; ; ; ; ; ; meaning "horseradish" in all these languages) is a spicy paste made of grated horseradish. It is a common condiment for meat and fish dishes in Eastern and Central European cuisines (Slovene, northern Croatian, Belarusian, Czech, Slovak, German (especially Bavarian), Polish, Romanian, Latvian, Lithuanian, Russian, Ukrainian and Ashkenazi Jewish cuisine). comes from Yiddish , which is in turn a loanword from Slavic languages.
There are two common forms of in the Slavic and Ashkenazi Jewish cuisines. White consists of grated horseradish and vinegar, and sometimes sugar and salt, while red includes the addition of beetroot. These types of are distinct from other horseradish-based condiments in that they are pareve (contain no dairy products), making it acceptable at both meat and dairy meals according to Jewish dietary law. In contrast, many Central European varieties include cream, while some Russian recipes call for with smetana (sour cream). There are also varieties including apples, lingonberry, cranberry and oranges.
The use of in Eastern and Central European cuisines Jewish communities is ancient, and is first attested in writing from the 12th century. Though it has had several historical uses, is most commonly associated in modern times with gefilte fish, for which it is considered an essential condiment. In Eastern and Central European cuisines chrain is a typical condiment for various fish dishes, as well as for meat and fish zakuski, such as kholodets (aspic) and beef tongue.
See also
Khrenovina sauce
Hrenovuha
Wasabi |
https://en.wikipedia.org/wiki/Base%20excision%20repair | Base excision repair (BER) is a cellular mechanism, studied in the fields of biochemistry and genetics, that repairs damaged DNA throughout the cell cycle. It is responsible primarily for removing small, non-helix-distorting base lesions from the genome. The related nucleotide excision repair pathway repairs bulky helix-distorting lesions. BER is important for removing damaged bases that could otherwise cause mutations by mispairing or lead to breaks in DNA during replication. BER is initiated by DNA glycosylases, which recognize and remove specific damaged or inappropriate bases, forming AP sites. These are then cleaved by an AP endonuclease. The resulting single-strand break can then be processed by either short-patch (where a single nucleotide is replaced) or long-patch BER (where 2–10 new nucleotides are synthesized).
Lesions processed by BER
Single bases in DNA can be chemically damaged by a variety of mechanisms, the most common ones being deamination, oxidation, and alkylation. These modifications can affect the ability of the base to hydrogen-bond, resulting in incorrect base-pairing, and, as a consequence, mutations in the DNA. For example, incorporation of adenine across from 8-oxoguanine (right) during DNA replication causes a G:C base pair to be mutated to T:A. Other examples of base lesions repaired by BER include:
Oxidized bases: 8-oxoguanine, 2,6-diamino-4-hydroxy-5-formamidopyrimidine (FapyG, FapyA)
Alkylated bases: 3-methyladenine, 7-methylguanosine
Deaminated bases: hypoxanthine formed from deamination of adenine. Xanthine formed from deamination of guanine. (Thymidine products following deamination of 5-methylcytosine are more difficult to recognize, but can be repaired by mismatch-specific glycosylases)
Uracil inappropriately incorporated in DNA or formed by deamination of cytosine
In addition to base lesions, the downstream steps of BER are also utilized to repair single-strand breaks.
The choice between long-patch and short-patch r |
https://en.wikipedia.org/wiki/Transcognition | Transcognition is the ability to employ one's cognitive faculties to undermine values by attacking their presuppositions and using one's non-cognitive attitude to create new values. These new values are attempts by which we try to render our world estimable. This transcognitive approach was first formulated by philosopher John T. Wilcox in his study 'Truth and Value in Nietzsche' (1974). Transcognition is not to be confused with technocognition, an interdisciplinary approach to counter misinformation in a post-truth world.
Transcognitive approach
In his study, Truth and Value in Nietzsche, Wilcox critically examines the issue of the relation of Friedrich Nietzsche's epistemological thinking and Nietzsche own values, in particular the extent to which, and the ways in which, Nietzsche regarded his own values as objective. This issue is called the 'problem of epistemic privilege'. To try and solve the problem, Wilcox identified a plethora of contradictions in Nietzsche's work. He divides these contradictions into two categories: the non-cognitive statements and the cognitive statements. The non-cognitive category consists of those statements which hold that values are not objective, but to be understood in terms of the beholder. This redefinition of non-cognitivism aligns with Nietzsche's perspectivism. Wilcox defines the cognitivist category as follows: those statements that can be objectively known. According to Wilcox, Nietzsche can be regarded as both a cognitivist and a non-cognitivist, in reference to the passages and quotations that were found in Nietzsche's legacy. For instance, the following passage from "Ecce Homo" seems to show Nietzsche endorsing an objective measure by which to differentiate between error and truth.How much truth can a certain mind endure; how much truth can it dare?—these questions became for me ever more and more the actual test of values. Error (belief in the ideal) is not blindness; error is cowardice... Every conquest, every step fo |
https://en.wikipedia.org/wiki/NPZ%20model | An NPZ model is the most basic abstract representation, expressed as a mathematical model, of a pelagic ecosystem which examines the interrelationships between quantities of nutrients, phytoplankton and zooplankton as time-varying states which depend only on the relative concentrations of the various states at the given time.
One goal in pelagic ecology is to understand the interactions among available nutrients (i.e. the essential resource base), phytoplankton and zooplankton. The most basic models to shed light on this goal are called nutrient-phytoplankton-zooplankton (NPZ) models. These models are a subset of Ecosystem models.
Example
An unrealistic but instructive example of an NPZ model is provided in Franks et al. (1986) (FWF-NPZ model). It is a system of ordinary differential equations that examines the time evolution of dissolved and assimilated nutrients in an ideal upper water column consisting of three state variables corresponding to amounts of nutrients (N), phytoplankton (P) and zooplankton (Z). This closed system model is shown in the figure to the right which also shows the "flow" directions of each state quantity.
These interactions, assumed to be spatial homogeneous (and thus is termed a "zero-dimensional" model) are described in general terms as follows
This NPZ model can now be cast as a system of first order differential equations:
where the parameters and variables are defined in the table below along with nominal values for a "standard environment"
An example of a 60 day sequence for the values shown is depicted in the figure to the right. Each state is color coded (Nutrient – black, Phytoplankton – green and Zooplankton – blue). Note that the initial nutrient concentration is rapidly consumed resulting in a phytoplankton bloom until the zooplankton begin aggressive grazing around day 10. Eventually both populations drop to a very low level and a high nutrient concentration remains. In the next section more sophistication is a |
https://en.wikipedia.org/wiki/Palynology | Palynology is the study of microorganisms and microscopic fragments of mega-organisms that are composed of acid-resistant organic material and occur in sediments, sedimentary rocks, and even some metasedimentary rocks. Palynomorphs are the microscopic, acid-resistant organic remains and debris produced by a wide variety plants, animals, and Protista that have existed since the late Proterozoic.
It is the science that studies contemporary and fossil palynomorphs (paleopalynology), including pollen, spores, orbicules, dinocysts, acritarchs, chitinozoans and scolecodonts, together with particulate organic matter (POM) and kerogen found in sedimentary rocks and sediments. Palynology does not include diatoms, foraminiferans or other organisms with siliceous or calcareous tests. The name of the science and organisms is derived from the Greek , "strew, sprinkle" and -logy) or of "particles that are strewn".
Palynology is an interdisciplinary science that stands at the intersection of earth science (geology or geological science) and biological science (biology), particularly plant science (botany). In Biostratigraphy, a branch of paleontology and paleobotany, it involves fossil palynomorphs from the Precambrian to the Holocene for their usefulness in the relative dating and correlation of sedimentary strata. Palynology is also used to date and understand the evolution of many kinds of plants and animals. In paleoclimatology, fossil palynomorphs are studied for their usefullness in understanding ancient Earth history in terms of reconstructing paleoenvironments and paleoclimates.
Palynology is quite useful in disciplines such as Archeology, in honey production, and criminal and civil law. In archaeology, palynology is widely used to reconstruct ancient paleoenvironments and environmental shifts that significantly influenced past human societies and reconstruct the diet of prehistoric and historic humans. Melissopalynology, the study of pollen and other palynomorphs in h |
https://en.wikipedia.org/wiki/ANKRD2 | Ankyrin Repeat, PEST sequence and Proline-rich region (ARPP), also known as Ankyrin repeat domain-containing protein 2 is a protein that in humans is encoded by the ANKRD2 gene. ARPP is a member of the muscle ankyrin repeat proteins (MARP), which also includes CARP and DARP, and is highly expressed in cardiac and skeletal muscle and in other tissues. Expression of ARPP has been shown to be altered in patients with dilated cardiomyopathy and amyotrophic lateral sclerosis.
A role for Ankrd2 in tumor progression and metastases spreading has also been described.
Structure
Two isoforms of ARPP have been documented; a 39.8 kDa protein isoform composed of 360 amino acids and a 36.2 kDa protein isoform composed of 327 amino acids. ANKRD2 has nine exons, four of which encode ankyrin repeats in the middle region of the protein, a PEST-like and Lysine-rich sequence in the N-terminal region, and a Proline-rich sequence containing consensus sequences for phosphorylation in the C-terminal region. It has been proposed that ARPP can homo- or hetero-dimerize with other MARPs in an antiparallel fashion. ARPP is highly expressed in nuclei and I-bands in slow skeletal fibers and cardiac muscle, specifically in ventricular regions at intercalated discs; and expression in brain, pancreas and esophageal epithelium has also been documented. Though ARPP and CARP proteins show significant homology, their expression profiles in muscle cells are markedly different; CARP is expressed throughout atria and ventricles, in development and in adult myocytes, however ARPP is almost exclusively ventricular and only in adult myocytes. ARPP was also found to be expressed in rhabdomyosarcomas, exhibiting a pattern distinct from actin and desmin.
Function
ARPP localizes to both nuclei and sarcomeres in muscle cells. ARPP may play a role in the differentiation of myocytes, as ARPP expression was shown to be induced during the C2C12 differentiation in vitro. A role for ARPP in regulating muscle gene exp |
https://en.wikipedia.org/wiki/Fluoroacetic%20acid | Fluoroacetic acid is a organofluorine compound with formula CH2FCO2H. It is a colorless solid that is noted for its relatively high toxicity. The conjugate base, fluoroacetate occurs naturally in at least 40 plants in Australia, Brazil, and Africa. It is one of only five known organic fluorine-containing natural products.
Toxicity
Fluoroacetic acid is a harmful metabolite of some fluorine-containing drugs (median lethal dose, LD50 = 10 mg/kg in humans). The most common metabolic sources of fluoroacetic acid are fluoroamines and fluoroethers. Fluoroacetic acid can disrupt the Krebs cycle.
In contrast with monofluoroacetic acid, difluoroacetic acid and trifluoroacetic acid are far less toxic. Its pKa is 2.66, in contrast to 1.24 and 0.23 for the respective di- and trifluorinated acids.
Uses
Fluoroacetic acid is used to manufacture pesticides especially rodenticides (see sodium fluoroacetate). The overall market is projected to rise at a considerable rate during the forecast period, 2021 to 2027.
See also
Difluoroacetic acid
Trifluoroacetic acid |
https://en.wikipedia.org/wiki/Anti-replay | Anti-replay is a sub-protocol of IPsec that is part of Internet Engineering Task Force (IETF). The main goal of anti-replay is to avoid hackers injecting or making changes in packets that travel from a source to a destination. Anti-replay protocol uses a unidirectional security association in order to establish a secure connection between two nodes in the network. Once a secure connection is established, the anti-replay protocol uses packet sequence numbers to defeat replay attacks as follows: When the source sends a message, it adds a sequence number to its packet; the sequence number starts at 0 and is incremented by 1 for each subsequent packet. The destination maintains a 'sliding window' record of the sequence numbers of validated received packets; it rejects all packets which have a sequence number which is lower than the lowest in the sliding window (i.e. too old) or already appears in the sliding window (i.e. duplicates/replays). Accepted packets, once validated, update the sliding window (displacing the lowest sequence number out of the window if it was already full).
See also
Cryptanalysis
Man in the middle attack
Replay attack
Session ID
Transport Layer Security |
https://en.wikipedia.org/wiki/Card%20security%20code | A card security code (CSC; also known as CVC, CVV, or several other names) is a series of numbers that, in addition to the bank card number, is printed (not embossed) on a credit or debit card. The CSC is used as a security feature for card not present transactions, where a personal identification number (PIN) cannot be manually entered by the cardholder (as they would during point-of-sale or card present transactions). It was instituted to reduce the incidence of credit card fraud.
These codes are in slightly different places for different card issuers. The CSC for Visa, Mastercard, and Discover credit cards is a three-digit number on the back of the card, to the right of the signature box. The CSC for American Express is a four-digit code on the front of the card above the account number. See the figures to the right for examples.
CSC was originally developed in the UK as an eleven-character alphanumeric code by Equifax employee Michael Stone in 1995. After testing with the Littlewoods Home Shopping group and NatWest bank, the concept was adopted by the UK Association for Payment Clearing Services (APACS) and streamlined to the three-digit code known today. Mastercard started issuing CVC2 numbers in 1997 and Visa in the United States issued them by 2001. American Express started to use the CSC in 1999, in response to growing Internet transactions and card member complaints of spending interruptions when the security of a card has been brought into question.
Contactless card and chip cards may electronically generate their own code, such as or a dynamic CVV.
Naming
The codes have different names:
"CSC" or "card security code": debit cards, American Express (three digits on back of card, also referred to as 3CSC)
"CVC" or "card validation code": Mastercard
"CVV" or "card verification value": Visa
"CAV" or "card authentication value": JCB
"CID": "card ID", "card identification number", or "card identification code": Discover, American Express (four digit |
https://en.wikipedia.org/wiki/A%20Different%20Universe | A Different Universe: Reinventing Physics from the Bottom Down is a 2005 physics book by Robert B. Laughlin, a winner of the Nobel Prize in Physics for the fractional quantum Hall effect. Its title is a play on the P. W. Anderson manifesto More is Different, historically important in claiming that condensed-matter physics deserves greater respect. The book extends his articles The Middle Way and The Theory of Everything, arguing the limits of reductionism. A key concept in Laughlin's works is protectorates, meaning robust physical regimes of behavior that do not depend on (that is, they are protected from the fickle details of) the underlying smaller-scale physics such as quantum noise. Such robust or reliable behavior at macroscopic scales makes possible higher-level entities, from biological life to nanotechnology. The book emphasizes more study of such macroscopic phenomena, sometimes called emergence, over the ever-downward dive into theoretically fundamental ideas such as string theory, which at some point become empirically irrelevant by having no observable consequences in our world. The arguments come full circle with modern dark energy ideas suggesting that spacetime or the vacuum may not be empty, but rather (for all we can observe) a medium, a possibility ironically glimpsed even by Einstein whose career began with demolishing the similar but too-simplistic notion of ether with his special relativity work. |
https://en.wikipedia.org/wiki/Kevin%20Lano | Kevin C. Lano (born 1963) is a British computer scientist.
Life and work
Kevin Lano studied at the University of Reading, attaining a first class degree in Mathematics and Computer Science, and the University of Bristol where he completed his doctorate. He was an originator of formal object-oriented techniques (Z++), and developed a combination of UML and formal methods in a number of papers and books. He was one of the founders of the Precise UML group, who influenced the definition of UML 2.0.
Lano published the book Advanced Systems Design with Java, UML and MDA (Butterworth-Heinemann, ) in 2005. He is also the editor of UML 2 Semantics and Applications, published by Wiley in October 2009, among a number of computer science books.
Lano was formerly a Research Officer at the Oxford University Computing Laboratory (now the Oxford University Department of Computer Science). He is a reader at the Department of Informatics at King's College London.
In 2008, Lano and his co-authors Andy Evans, Robert France, and Bernard Rumpe, were awarded the Ten Year Most Influential Paper Award at the MODELS 2008 Conference on Model Driven Engineering Languages and Systems for the 1998 paper "The UML as a Formal Modeling Notation".
Selected publications
Books
Reverse Engineering and Software Maintenance (McGraw-Hill, 1993)
Object-oriented Specification Case Studies (Prentice Hall, 1993)
Formal Object-oriented Development (Springer, 1995)
The B Language and Method: A Guide to Practical Formal Development (Springer, 1996)
Software Design in Java 2 (Palgrave, 2002)
UML 2 Semantics and Applications (Wiley, 2009), editor
Model-Driven Development using UML and Java (Cengage, 2009)
Agile MBD using UML-RSDS (Taylor & Francis, 2016)
Financial Software Engineering (Springer, 2019), with Howard Haughton |
https://en.wikipedia.org/wiki/Suillus%20punctipes | Suillus punctipes, commonly known as the spicy suillus, is a bolete fungus in the family Suillaceae.
Taxonomy
The fungus was originally described in 1878 by American mycologist Charles Horton Peck as a species of Boletus. Collected from Gansevoort, New York, Peck described its distinguishing features as "its rhubarb-colored stem thickened at the base and the brownish color of the young hymenium". Rolf Singer transferred it to Suillus in 1945.
Habitat and distribution
The bolete has been recorded from Taiwan.
Uses
The species is edible but very soft.
See also
List of North American boletes |
https://en.wikipedia.org/wiki/Testicular%20microlithiasis | Testicular microlithiasis is an unusual condition diagnosed on testicular ultrasound. It is believed to be found in 0.1–0.6% of males globally, with frequency varying based on geographic location and is more often found in individuals with subfertility. It is a often an asymptomatic, non-progressive disease; though in a very small number of cases it may also cause bouts of extreme chronic fatigue, hormone imbalance and pain, which can be severe and accompanied by swelling around the testicular region (dependent on the size and location of the calcification). In an extremely rare select few cases, individuals with microlithiasis have also been known to experience calcification of the prostate, which can lead to the passing of stones. These rare cases can lead to secondary infections if not treated with care, due to the resulting damaged tissue. It is important to note however that these symptoms are rarely seen in the majority of people who have been diagnosed.
Testicular microlithiasis is not associated with risk of testicular cancer in asymptomatic individuals. However, a large meta-analysis has shown that in individuals with associated risk factors for testicular germ cell tumor, the increase in risk of concurrent diagnosis of testicular germ cell tumor, or testicular carcinoma-in-situ upon biopsy is approximately eight to ten-fold.
There is extensive controversy over whether testicular microlithiasis in individuals with testicular germ cell tumor, or risk factors for such, should undergo testicular biopsy to exclude the presence of testicular carcinoma in situ, also known as intratubular germ cell neoplasia of unclassified type. Additionally, whether the presence of testicular microlithiasis should influence decision for adjuvant chemotherapy or surveillance in individuals with testicular germ cell tumor remains unclear. A recent review in Nature Reviews Urology has comprehensively evaluated these topics. It is important to note however as with any condition th |
https://en.wikipedia.org/wiki/Keystone%20virus | Keystone virus (Keystone orthobunyavirus) is a mosquito-borne virus which can infect mammals. It was first discovered in animals in the Florida area, where it is spread in part by local species of Aedes mosquitoes. In 1964, a case of human infection, producing minor symptoms of a rash and fever, was circumstantially diagnosed. Conclusive laboratory demonstration of the virus in humans was first obtained and reported in 2018.
The virus
The Keystone virus was first discovered in mosquitoes in the Keystone area of Tampa, Florida in 1964, based on antigenic evidence from specimens caught in 1963. The virus has been subsequently observed along the eastern and southern coastline of the United States, from Boston through Texas. In small mammals it can produce symptoms of encephalitis. Infection in humans is believed to be widespread, based on a 1972 report detecting Keystone virus antibodies in 19–21 percent of the people tested in the Tampa Bay region.
The first laboratory isolation of the virus from a human case occurred in Florida in 2016, and was reported in 2018. Identification took almost two years after the case actually occurred, when blood samples taken from the subject in 2016 were analyzed retrospectively by researchers studying the incidence of Zika virus in the Florida population.
The Aedes atlanticus mosquito is a demonstrated vector. The virus transmits transstadially through the different stages of the insect's life: A female mosquito may lay eggs carrying the virus, which hatch into infected larvae, eventually maturing into adults that can infect mammals while injecting their anti-coagulant saliva during a bite. |
https://en.wikipedia.org/wiki/Pork%20rind | Pork rind is the culinary term for the skin of a pig. It can be used in many different ways.
It can be rendered, fried in fat, baked, or roasted to produce a kind of pork cracklings (US) or scratchings (UK); these are served in small pieces as a snack or side dish and can also be used as an appetizer. The frying renders much of the fat, making it much smaller.
Snack
Often a byproduct of the rendering of lard, it is also a way of making even the tough skin of a pig edible. In many ancient cultures, animal fats were the only way of obtaining oil for cooking and they were common in many people's diets until the Industrial Revolution made vegetable oils more common and more affordable.
Microwaveable pork rinds are sold in bags that resemble microwaveable popcorn and can be eaten still warm. Pickled pork rinds, though, are often enjoyed refrigerated and cold. Unlike the crisp and fluffy texture of fried pork rinds, pickled pork rinds are very rich and buttery, much like foie gras.
Preparation
For the large-scale production of commercial pork rinds, frozen, dried pork skin pellets are used. They are first rehydrated in water with added flavoring, and then fried in pork fat at . Cooking makes the rinds expand five times their original size and float on the oil surface. The rinds are then removed from the fat, flavored, and air-dried. Antioxidants may be added to improve stability.
Nutritional value
Like many snack foods, pork rinds can be high in sodium and fat; however, they are low in carbohydrates and are sometimes considered an alternative snack food for those following a low-carbohydrate diet. According to Men's Health, a serving contains nine times the protein and less fat than is found in a serving of potato chips, which are much higher in carbohydrates. They add that 43% of pork rind's fat is unsaturated, and most of that is oleic acid, the same healthy fat found in olive oil. Another 13% of its fat content is stearic acid, a type of saturated fat that |
https://en.wikipedia.org/wiki/Umesh%20Vazirani | Umesh Virkumar Vazirani is an Indian–American academic who is the Roger A. Strauch Professor of Electrical Engineering and Computer Science at the University of California, Berkeley, and the director of the Berkeley Quantum Computation Center. His research interests lie primarily in quantum computing. He is also a co-author of a textbook on algorithms.
Biography
Vazirani received a BS from MIT in 1981 and received his Ph.D. in 1986 from UC Berkeley under the supervision of Manuel Blum.
He is the brother of University of California, Irvine professor Vijay Vazirani.
Research
Vazirani is one of the founders of the field of quantum computing. His 1993 paper with his student Ethan Bernstein on quantum complexity theory defined a model of quantum Turing machines which was amenable to complexity based analysis. This paper also gave an algorithm for the quantum Fourier transform, which was then used by Peter Shor within a year in his celebrated quantum algorithm for factoring integers.
With Charles Bennett, Ethan Bernstein, and Gilles Brassard, he showed that quantum computers cannot solve black-box search problems faster than in the number of elements to be searched. This result shows that the Grover search algorithm is optimal. It also shows that quantum computers cannot solve NP-complete problems in polynomial time using only the certifier.
Awards and honors
In 2005, both Vazirani and his brother Vijay Vazirani were inducted as Fellows of the Association for Computing Machinery, Umesh for "contributions to theoretical computer science and quantum computation" and his brother Vijay for his work on approximation algorithms. Vazirani was awarded the Fulkerson Prize for 2012 for his work on improving the approximation ratio for graph separators and related problems (jointly with Satish Rao and Sanjeev Arora). In 2018, he was elected to the National Academy of Sciences.
Selected publications
. A preliminary version of this paper was also published in STOC '87.
.
.
. |
https://en.wikipedia.org/wiki/Rhabdomyosarcoma | Rhabdomyosarcoma (RMS) is a highly aggressive form of cancer that develops from mesenchymal cells that have failed to fully differentiate into myocytes of skeletal muscle. Cells of the tumor are identified as rhabdomyoblasts.
The four subtypes are embryonal rhabdomyosarcoma, alveolar rhabdomyosarcoma, pleomorphic rhabdomyosarcoma, and spindle-cell/sclerosing rhabdomyosarcoma. Embryonal and alveolar are the main groups, and these types are the most common soft tissue sarcomas of childhood and adolescence. The pleomorphic type is usually found in adults.
It is generally considered to be a disease of childhood, as the vast majority of cases occur in those below the age of 18. It is commonly described as one of the small-blue-round-cell tumors of childhood due to its appearance on an H&E stain. Despite being relatively rare, it accounts for approximately 40% of all recorded soft-tissue sarcomas.
RMS can occur in any soft-tissue site in the body, but is primarily found in the head, neck, orbit, genitourinary tract, genitals, and extremities. No clear risk factors have been identified, but the disease has been associated with some congenital abnormalities. Signs and symptoms vary according to tumor site, and prognosis is closely tied to the location of the primary tumor. Common sites of metastasis include the lungs, bone marrow, and bones. There are many classification systems for RMS and a variety of defined histological types. Embryonal rhabdomyosarcoma is the most common type and comprises about 60% of cases.
Outcomes vary considerably, with five-year survival rates between 35 and 95%, depending on the type of RMS involved, so clear diagnosis is critical for effective treatment and management. Accurate and quick diagnosis is often difficult due to the heterogeneity of RMS tumors and a lack of strong genetic markers of the disease, although recent research by UVA Health researchers discovered "multiple lines of evidence supporting [the gene] AVIL is powerful driver |
https://en.wikipedia.org/wiki/Bareiss%20algorithm | In mathematics, the Bareiss algorithm, named after Erwin Bareiss, is an algorithm to calculate the determinant or the echelon form of a matrix with integer entries using only integer arithmetic; any divisions that are performed are guaranteed to be exact (there is no remainder). The method can also be used to compute the determinant of matrices with (approximated) real entries, avoiding the introduction of any round-off errors beyond those already present in the input.
History
The general Bareiss algorithm is distinct from the Bareiss algorithm for Toeplitz matrices.
In some Spanish-speaking countries, this algorithm is also known as Bareiss-Montante, because of René Mario Montante Pardo, a professor of the Universidad Autónoma de Nuevo León, Mexico, who popularized the method among his students.
Overview
Determinant definition has only multiplication, addition and subtraction operations. Obviously the determinant is integer if all matrix entries are integer. However actual computation of the determinant using the definition or Leibniz formula is impractical, as it requires O(n!) operations.
Gaussian elimination has O(n3) complexity, but introduces division, which results in round-off errors when implemented using floating point numbers.
Round-off errors can be avoided if all the numbers are kept as integer fractions instead of floating point. But then the size of each element grows in size exponentially with the number of rows.
Bareiss brings up a question of performing an integer-preserving elimination while keeping the magnitudes of the intermediate coefficients reasonably small. Two algorithms are suggested:
Division-free algorithm — performs matrix reduction to triangular form without any division operation.
Fraction-free algorithm — uses division to keep the intermediate entries smaller, but due to the Sylvester's Identity the transformation is still integer-preserving (the division has zero remainder).
For completeness Bareiss also suggests fraction- |
https://en.wikipedia.org/wiki/Anonymous%20post | An anonymous post, is an entry on a textboard, anonymous bulletin board system, or other discussion forums like Internet forum, without a screen name or more commonly by using a non-identifiable pseudonym.
Some online forums such as Slashdot do not allow such posts, requiring users to be registered either under their real name or utilizing a pseudonym. Others like JuicyCampus, AutoAdmit, 2channel, and other Futaba-based imageboards (such as 4chan) thrive on anonymity. Users of 4chan, in particular, interact in an anonymous and ephemeral environment that facilitates rapid generation of new trends.
History of online anonymity
Online anonymity can be traced to Usenet newsgroups in the late 1990s where the notion of using invalid emails for posting to newsgroups was introduced. This was primarily used for discussion on newsgroups pertaining to certain sensitive topics. There was also the introduction of anonymous remailers which were capable of stripping away the sender's address from mail packets before sending them to the receiver. Online services which facilitated anonymous posting sprang up around mid-1992, originating with the cypherpunk group.
The precursor to Internet forums like 2channel and 4chan were textboards like Ayashii World and Amezou World that provided the ability for anonymous posts in Japan. These "large-scale anonymous textboards" were inspired by the Usenet culture and were primarily focused on technology, unlike their descendants.
Today, image boards receive tremendous Internet traffic from all parts of the world. In 2011, on 4chan's most popular board, /b/, there were roughly 35,000 threads and 400,000 posts created per day. At that time, that level of content was on par with YouTube. Such high traffic suggests a broad demand from Internet users for anonymous content sharing sites.
Levels of anonymity
Anonymity on the Internet can pertain to both the utilization of pseudonyms or requiring no authentication at all (also called "perfect anonymi |
https://en.wikipedia.org/wiki/Gerontological%20nursing | Gerontological nursing is the specialty of nursing pertaining to older adults. Gerontological nurses work in collaboration with older adults, their families, and communities to support healthy aging, maximum functioning, and quality of life. The term gerontological nursing, which replaced the term geriatric nursing in the 1970s, is seen as being more consistent with the specialty's broader focus on health and wellness, in addition to illness.
Gerontological nursing is important to meet the health needs of an aging population. Due to longer life expectancy and declining fertility rates, the proportion of the population that is considered old is increasing. Between 2000 and 2050, the number of people in the world who are over age 60 is predicted increase from 605 million to 2 billion. The proportion of older adults is already high and continuing to increase in more developed countries. In 2010, seniors (aged 65 and older) made up 13% and 23% of the populations of the US and Japan, respectively. By 2050, these proportions will increase to 21% and 36%.
Scope
Gerontology nursing is a unique field in nursing which requires nurses to focus their care on older population. This population tend to have more comorbidities such as high blood pressure, diabetes, heart conditions, etc. This field requires complex care to fulfill their needs. Nurses are to be mindful of their long history for individualized care. Nurses use evidence based practice in their care to educate and promote well-being in gerontological population. Professional nursing involves the use of culturally competent care combined with scientific research to deliver clinical expertise.
Geriatric nurses are expected to be skilled in patient care, treatment planning, education, mental health, and rehabilitation. They also take on many roles in the workplace. The main responsibility is as a caregiver. They can also be advocates, counselors, and educators for their patients.
Gerontological nursing draws on knowl |
https://en.wikipedia.org/wiki/Quadratic%20irrational%20number | In mathematics, a quadratic irrational number (also known as a quadratic irrational or quadratic surd) is an irrational number that is the solution to some quadratic equation with rational coefficients which is irreducible over the rational numbers. Since fractions in the coefficients of a quadratic equation can be cleared by multiplying both sides by their least common denominator, a quadratic irrational is an irrational root of some quadratic equation with integer coefficients. The quadratic irrational numbers, a subset of the complex numbers, are algebraic numbers of degree 2, and can therefore be expressed as
for integers ; with , and non-zero, and with square-free. When is positive, we get real quadratic irrational numbers, while a negative gives complex quadratic irrational numbers which are not real numbers. This defines an injection from the quadratic irrationals to quadruples of integers, so their cardinality is at most countable; since on the other hand every square root of a prime number is a distinct quadratic irrational, and there are countably many prime numbers, they are at least countable; hence the quadratic irrationals are a countable set.
Quadratic irrationals are used in field theory to construct field extensions of the field of rational numbers . Given the square-free integer , the augmentation of by quadratic irrationals using produces a quadratic field ). For example, the inverses of elements of ) are of the same form as the above algebraic numbers:
Quadratic irrationals have useful properties, especially in relation to continued fractions, where we have the result that all real quadratic irrationals, and only real quadratic irrationals, have periodic continued fraction forms. For example
The periodic continued fractions can be placed in one-to-one correspondence with the rational numbers. The correspondence is explicitly provided by Minkowski's question mark function, and an explicit construction is given in that article. It is en |
https://en.wikipedia.org/wiki/Computational%20photography | Computational photography refers to digital image capture and processing techniques that use digital computation instead of optical processes. Computational photography can improve the capabilities of a camera, or introduce features that were not possible at all with film based photography, or reduce the cost or size of camera elements. Examples of computational photography include in-camera computation of digital panoramas, high-dynamic-range images, and light field cameras. Light field cameras use novel optical elements to capture three dimensional scene information which can then be used to produce 3D images, enhanced depth-of-field, and selective de-focusing (or "post focus"). Enhanced depth-of-field reduces the need for mechanical focusing systems. All of these features use computational imaging techniques.
The definition of computational photography has evolved to cover a number of
subject areas in computer graphics, computer vision, and applied
optics. These areas are given below, organized according to a taxonomy
proposed by Shree K. Nayar. Within each area is a list of techniques, and for
each technique one or two representative papers or books are cited.
Deliberately omitted from the
taxonomy are image processing (see also digital image processing)
techniques applied to traditionally captured
images in order to produce better images. Examples of such techniques are
image scaling, dynamic range compression (i.e. tone mapping),
color management, image completion (a.k.a. inpainting or hole filling),
image compression, digital watermarking, and artistic image effects.
Also omitted are techniques that produce range data,
volume data, 3D models, 4D light fields,
4D, 6D, or 8D BRDFs, or other high-dimensional image-based representations. Epsilon photography is a sub-field of computational photography.
Effect on photography
Photos taken using computational photography can allow amateurs to produce photographs rivalling the quality of professional photographe |
https://en.wikipedia.org/wiki/Tsetlin%20machine | A Tsetlin machine is an Artificial Intelligence algorithm based on propositional logic.
Background
A Tsetlin machine is a form of learning automaton based upon algorithms from reinforcement learning to learn expressions from propositional logic. Ole-Christoffer Granmo gave the method its name after Michael Lvovitch Tsetlin and his Tsetlin automata. The method uses computationally simpler and more efficient primitives compared to more ordinary artificial neural networks.
As of April 2018 it has shown promising results on a number of test sets.
Types
Original Tsetlin machine
Convolutional Tsetlin machine
Regression Tsetlin machine
Relational Tsetlin machine
Weighted Tsetlin machine
Arbitrarily deterministic Tsetlin machine
Parallel asynchronous Tsetlin machine
Coalesced multi-output Tsetlin machine
Tsetlin machine for contextual bandit problems
Tsetlin machine autoencoder
Tsetlin machine composites: plug-and-play collaboration between specialized Tsetlin machines
Applications
Keyword spotting
Aspect-based sentiment analysis
Word-sense disambiguation
Novelty detection
Intrusion detection
Semantic relation analysis
Image analysis
Text categorization
Fake news detection
Game playing
Batteryless sensing
Recommendation systems
Word embedding
ECG analysis
Edge computing
Bayesian network learning
Original Tsetlin machine
Tsetlin automaton
The Tsetlin automaton is the fundamental learning unit of the Tsetlin machine. It tackles the multi-armed bandit problem, learning the optimal action in an environment from penalties and rewards. Computationally, it can be seen as a finite-state machine (FSM) that changes its states based on the inputs. The FSM will generate its outputs based on the current states.
A quintuple describes a two-action Tsetlin automaton:
A Tsetlin automaton has states, here :
The FSM can be triggered by two input events
The rules of state migration of the FSM are stated as
It includes two output actions
Which |
https://en.wikipedia.org/wiki/Moored%20training%20ship |
A moored training ship (MTS) is a United States Navy nuclear powered submarine that has been converted to a training ship for the Naval Nuclear Power Training Command's Nuclear Power Training Unit (NPTU) at Naval Support Activity Charleston in South Carolina. The NPTU is part of the Navy's Nuclear Power School at Goose Creek, S.C. The Navy uses decommissioned nuclear submarines and converts them to MTSs to train personnel in the operation and maintenance of submarines and their nuclear reactors. The first moored training ship was a fleet ballistic missile submarine, redesignated as (MTS-635) in 1989, followed a year later by , a ballistic missile submarine, redesignated as (MTS-626). Conversion of these two boats took place at the Charleston Naval Shipyard and modifications included special mooring arrangements with a mechanism to absorb power generated by the main propulsion shaft.
The Navy added two more moored training ships to this facility, and , a pair of attack submarines. The conversions for these two took place at the Norfolk Naval Shipyard and they will then be taken to NSA Charleston. La Jolla became inactive in early 2015 and began the 32 month conversion to a training ship. Changes include having the hull cut into three sections, with the center section being recycled and the other two joined with three new sections, manufactured by Electric Boat, extending the overall length by 23 m (76 ft). The project was expected to be completed by the end of 2018. San Francisco arrived at Norfolk to begin her conversion in January 2018.
With the addition of La Jolla and San Francisco, the Navy will retire Sam Rayburn and Daniel Webster. Sam Rayburn will be relocated to Norfolk Naval Shipyard in 2021, to remain there until the inactivation process begins, and Daniel Webster will also be inactivated at Norfolk, sometime later.
Moored training ships
See also
United States Navy Nuclear Propulsion
Nuclear marine propulsion
United States naval reactors
Li |
https://en.wikipedia.org/wiki/Two-component%20regulatory%20system | In the field of molecular biology, a two-component regulatory system serves as a basic stimulus-response coupling mechanism to allow organisms to sense and respond to changes in many different environmental conditions. Two-component systems typically consist of a membrane-bound histidine kinase that senses a specific environmental stimulus and a corresponding response regulator that mediates the cellular response, mostly through differential expression of target genes. Although two-component signaling systems are found in all domains of life, they are most common by far in bacteria, particularly in Gram-negative and cyanobacteria; both histidine kinases and response regulators are among the largest gene families in bacteria. They are much less common in archaea and eukaryotes; although they do appear in yeasts, filamentous fungi, and slime molds, and are common in plants, two-component systems have been described as "conspicuously absent" from animals.
Mechanism
Two-component systems accomplish signal transduction through the phosphorylation of a response regulator (RR) by a histidine kinase (HK). Histidine kinases are typically homodimeric transmembrane proteins containing a histidine phosphotransfer domain and an ATP binding domain, though there are reported examples of histidine kinases in the atypical HWE and HisKA2 families that are not homodimers. Response regulators may consist only of a receiver domain, but usually are multi-domain proteins with a receiver domain and at least one effector or output domain, often involved in DNA binding. Upon detecting a particular change in the extracellular environment, the HK performs an autophosphorylation reaction, transferring a phosphoryl group from adenosine triphosphate (ATP) to a specific histidine residue. The cognate response regulator (RR) then catalyzes the transfer of the phosphoryl group to an aspartate residue on the response regulator's receiver domain. This typically triggers a conformational change that |
https://en.wikipedia.org/wiki/Parallel%20port | In computing, a parallel port is a type of interface found on early computers (personal and otherwise) for connecting peripherals. The name refers to the way the data is sent; parallel ports send multiple bits of data at once (parallel communication), as opposed to serial communication, in which bits are sent one at a time. To do this, parallel ports require multiple data lines in their cables and port connectors and tend to be larger than contemporary serial ports, which only require one data line.
There are many types of parallel ports, but the term has become most closely associated with the printer port or Centronics port found on most personal computers from the 1970s through the 2000s. It was an industry de facto standard for many years, and was finally standardized as IEEE 1284 in the late 1990s, which defined the Enhanced Parallel Port (EPP) and Extended Capability Port (ECP) bi-directional versions. Today, the parallel port interface is virtually non-existent in new computers because of the rise of Universal Serial Bus (USB) devices, along with network printing using Ethernet and Wi-Fi connected printers.
The parallel port interface was originally known as the Parallel Printer Adapter on IBM PC-compatible computers. It was primarily designed to operate printers that used IBM's eight-bit extended ASCII character set to print text, but could also be used to adapt other peripherals. Graphical printers, along with a host of other devices, have been designed to communicate with the system.
History
Centronics
An Wang, Robert Howard and Prentice Robinson began development of a low-cost printer at Centronics, a subsidiary of Wang Laboratories that produced specialty computer terminals. The printer used the dot matrix printing principle, with a print head consisting of a vertical row of seven metal pins connected to solenoids. When power was applied to the solenoids, the pin was pushed forward to strike the paper and leave a dot. To make a complete character gl |
https://en.wikipedia.org/wiki/Nightmares%20in%20the%20Sky | Nightmares in the Sky: Gargoyles and Grotesques is a coffee table book about architectural gargoyles and grotesques, photographed by f-stop Fitzgerald with accompanying text by Stephen King, and published in 1988. An excerpt was published in the September 1988 issue of Penthouse. Some of the images in the book were used as textures in the video games Doom and Doom II.
Reception
Kirkus Reviews found some King's text took a "teen stance" occasionally, but that it "evokes the weight and brooding presence" of gargoyles, coming to a possibility to their purpose quoting King, "venting the waste material of our own hidden fears". However, it was the stark photographs from f-stop Fitzgerald that truly stood out to the reviewer. |
https://en.wikipedia.org/wiki/Audio%20power | Audio power is the electrical power transferred from an audio amplifier to a loudspeaker, measured in watts. The electrical power delivered to the loudspeaker, together with its efficiency, determines the sound power generated (with the rest of the electrical power being converted to heat).
Amplifiers are limited in the electrical energy they can output, while loudspeakers are limited in the electrical energy they can convert to sound energy without being damaged or distorting the audio signal. These limits, or power ratings, are important to consumers finding compatible products and comparing competitors.
Power handling
In audio electronics, there are several methods of measuring power output (for such things as amplifiers) and power handling capacity (for such things as loudspeakers).
Amplifiers
Amplifier output power is limited by voltage, current, and temperature:
Voltage: The amp's power supply voltage limits the maximum amplitude of the waveform it can output. This determines the peak momentary output power for a given load resistance.
Current: The amp's output devices (transistors or tubes) have a current limit, above which they are damaged. This determines the minimum load resistance that the amp can drive at its maximum voltage.
Temperature: The amp's output devices waste some of the electrical energy as heat, and if it is not removed quickly enough, they will rise in temperature to the point of damage. This determines the continuous output power.
As an amplifier's power output strongly influences its price, there is an incentive for manufacturers to exaggerate output power specs to increase sales. Without regulations, imaginative approaches to advertising power ratings became so common that in 1975 the US Federal Trade Commission intervened in the market and required all amplifier manufacturers to use an engineering measurement (continuous average power) in addition to any other value they might cite.
Loudspeakers
For loudspeakers, there is a |
https://en.wikipedia.org/wiki/Haplogroup%20M8 | In human mitochondrial genetics, Haplogroup M8 is a human mitochondrial DNA (mtDNA) haplogroup.
Origin
Haplogroup M8 is a descendant of haplogroup M. Haplogroup M8 is divided into subclades M8a, C and Z.
Distribution
It is an East Asian haplogroup. Today, haplogroup M8 is found at its highest frequency in indigenous populations of East Siberia such as Evenk and Yukaghir. Haplogroup M8 is one of the most common mtDNA haplogroups among Yakut, Tuvan. Haplogroup C, the most major one of three subclades is highly distributed among the Amerindian and Indigienous peoples of East Siberia. Haplogroup Z, the other one of three subclades is highly distributed among Even from Kamchatka (8/39 Z1a2a, 3/39 Z1a3, 11/39 = 28.2% Z total), mtDNA Haplogroup M8a, not well known one of three subclades is highly distributed among Northern Han Chinese from Liaoning (16/317 = 5.0%).
Table of Frequencies by ethnic group
Subclades
Haplogroup C, the most major one of three subclades is highly distributed among the Amerindian and Indigienous peoples of East Siberia. Haplogroup Z, the other one of three subclades is highly distributed among Even from Kamchatka (8/39 Z1a2a, 3/39 Z1a3, 11/39 = 28.2% Z total), mtDNA Haplogroup M8a, not well known one of three subclades is highly distributed among Northern Han Chinese from Liaoning (16/317 = 5.0%).
Tree
This phylogenetic tree of haplogroup M8 subclades is based on the paper by Mannis van Oven and Manfred Kayser Updated comprehensive phylogenetic tree of global human mitochondrial DNA variation and subsequent published research.
M8
M8a
M8a1 - Ulch
M8a1a - Japanese
M8a2'3
M8a2 - Japanese, Han Chinese
M8a2-a* - Japanese,Russia
M8a2a'b (T152C!) - Japanese
M8a2a - Han Chinese
M8a2a1 - Japanese, Han Chinese(Hunan)
M8a2a1a1
M8a2a1b
M8a2a1c - Japanese
M8a2b - Japanese,Han Chinese(Shandong)
M8a2b1
M8a2b2 - Russia
M8a2c - Japanese, Han Chinese
M8a2d - Han Chinese
M8a2e - Ami(Taiwan Aborigines),Han Chinese(Taiwan)
M8a3 - Japanese, Han Chinese
M8a3a - Ha |
https://en.wikipedia.org/wiki/Desulfovibrio%20bizertensis | Desulfovibrio bizertensis is a weakly halotolerant, strictly anaerobic, sulfate-reducing and motile bacterium from the genus of Desulfovibrio which has been isolated from marine sediments from Tunisia. |
https://en.wikipedia.org/wiki/K-stability | In mathematics, and especially differential and algebraic geometry, K-stability is an algebro-geometric stability condition, for complex manifolds and complex algebraic varieties. The notion of K-stability was first introduced by Gang Tian and reformulated more algebraically later by Simon Donaldson. The definition was inspired by a comparison to geometric invariant theory (GIT) stability. In the special case of Fano varieties, K-stability precisely characterises the existence of Kähler–Einstein metrics. More generally, on any compact complex manifold, K-stability is conjectured to be equivalent to the existence of constant scalar curvature Kähler metrics (cscK metrics).
History
In 1954, Eugenio Calabi formulated a conjecture about the existence of Kähler metrics on compact Kähler manifolds, now known as the Calabi conjecture. One formulation of the conjecture is that a compact Kähler manifold admits a unique Kähler–Einstein metric in the class . In the particular case where , such a Kähler–Einstein metric would be Ricci flat, making the manifold a Calabi–Yau manifold. The Calabi conjecture was resolved in the case where by Thierry Aubin and Shing-Tung Yau, and when by Yau. In the case where , that is when is a Fano manifold, a Kähler–Einstein metric does not always exist. Namely, it was known by work of Yozo Matsushima and André Lichnerowicz that a Kähler manifold with can only admit a Kähler–Einstein metric if the Lie algebra is reductive. However, it can be easily shown that the blow up of the complex projective plane at one point, is Fano, but does not have reductive Lie algebra. Thus not all Fano manifolds can admit Kähler–Einstein metrics.
After the resolution of the Calabi conjecture for attention turned to the loosely related problem of finding canonical metrics on vector bundles over complex manifolds. In 1983, Donaldson produced a new proof of the Narasimhan–Seshadri theorem. As proved by Donaldson, the theorem states that a holomorphic vector |
https://en.wikipedia.org/wiki/Spur%20%28stem%29 | Spurs are short, slow growing stems with greatly shortened internodes that can bear leaves, flowers and fruit. Spurs are perennial growths and commonly arise from the leaf axils on shoots.
They are common in fruit trees such as Apple, Pear, Plum and Almond. The spurs have horticultural importance. For example, the number of spurs on an almond (Prunus dulcis) tree is highly connected to the overall almond yield.
Ginkgo develops spurs from first-year leaf axils, and in subsequent years these produce clusters of leaves and eventually cones. Porcelainflower Hoya carnosa produces spurs for its inflorescences as well. |
https://en.wikipedia.org/wiki/Dynamic/Dialup%20Users%20List | A Dial-up/Dynamic User List (DUL) is a type of DNSBL which contains the IP addresses an ISP assigns to its customer on a temporary basis, often using DHCP or similar protocols. Dynamically assigned IP addresses are contrasted with static IP addresses which do not change once they have been allocated by the service provider.
DULs serve several purposes. Their primary function is to assist an ISP in enforcement of its Acceptable Use Policy, many of which prohibit customers from setting up an email server. Customers are expected to use the email facilities of the service provider. This use of a DUL is especially helpful in curtailing abuse when a customer's computer has been converted into a zombie computer and is distributing email without the knowledge of the computer's owner. A second major use involves receivers who do not wish to accept email from computers with dynamically assigned email addresses. They use DULs to enforce this policy. Receivers adopt such policies because computers at dynamically assigned IP addresses so often are a source of spam.
The first DUL was created by Gordon Fecyk in 1998. It quickly became quite popular because it addressed a specific tactic popular with spammers at the time. The DUL subsequently was absorbed by Mail Abuse Prevention System (MAPS) in 1999. When MAPS was no longer a free service, other DNSBLs such as Dynablock, Not Just Another Bogus List (NJABL), and Spam and Open Relay Blocking System (SORBS) began providing lists of dynamically assigned IP addresses. |
https://en.wikipedia.org/wiki/The%20Swallow%27s%20Tail | The Swallow's Tail — Series of Catastrophes () was Salvador Dalí's last painting. It was completed in May 1983, as the final part of a series based on the mathematical catastrophe theory of René Thom.
Thom suggested that in four-dimensional phenomena, there are seven possible equilibrium surfaces, and therefore seven possible discontinuities, or "elementary catastrophes": fold, cusp, swallowtail, butterfly, hyperbolic umbilic, elliptic umbilic, and parabolic umbilic. "The shape of Dalí's Swallow's Tail is taken directly from Thom's four-dimensional graph of the same title, combined with a second catastrophe graph, the s-curve that Thom dubbed, 'the cusp'. Thom's model is presented alongside the elegant curves of a cello and the instrument's f-holes, which, especially as they lack the small pointed side-cuts of a traditional f-hole, equally connote the mathematical symbol for an integral in calculus: ∫."
In his 1979 speech, Gala, Velázquez and the Golden Fleece, presented upon his 1979 induction into the prestigious Académie des Beaux-Arts of the Institut de France, Dalí described Thom's theory of catastrophes as "the most beautiful aesthetic theory in the world". He also recollected his first and only meeting with René Thom, at which Thom purportedly told Dalí that he was studying tectonic plates; this provoked Dalí to question Thom about the railway station at Perpignan, France (near the Spanish border), which the artist had declared in the 1960s to be the center of the universe.
Thom reportedly replied, "I can assure you that Spain pivoted precisely — not in the area of — but exactly there where the Railway Station in Perpignan stands today". Dalí was immediately enraptured by Thom's statement, influencing his painting Topological Abduction of Europe — Homage to René Thom, the lower left corner of which features an equation closely linked to the "swallow's tail": an illustration of the graph, and the term queue d'aronde. The seismic fracture that transver |
https://en.wikipedia.org/wiki/Giuseppe%20Sterzi | Giuseppe Nazzareno Sterzi (1876–1919) was an Italian anatomist, neuroanatomist and medical historian. Although his research activity encompassed no more than fifteen years, the themes treated by Sterzi are relevant to neuroanatomy and history of anatomy. Sterzi’s research on comparative neuroanatomy and embryology were acknowledged by numerous contemporaries (Bardeleben, Chiarugi, Edinger, Eisler, Johnston, Krause, Nicolas, Obersteiner, Sobotta) and many of his discoveries were soon incorporated into anatomy textbooks. Sterzi was awarded several scientific prizes, among which were the ‘Premio Fossati’ of the Reale Istituto Lombardo di Scienze e di Lettere, Milano in 1909 and the ‘Prix Lallemand’ of the Académie des Sciences de l'Institut de France, Paris in 1912.
Biography
Sterzi was born into a noble family in Cittadella, Italy. His father Paolo, who in his student years in Padova had been involved in the patriotic uprisings against the Austrian government, was an engineer; his mother was Carolina Barolo. In 1893 he matriculated in the University of Pisa where he joined the medical school. The Chairman Professor Guglielmo Romiti asked him to enter the Anatomy department. In 1899 he graduated in Medicine, and few months later was appointed senior lecturer in the Anatomy Department of the University of Padova, then directed by Professor Dante Bertelli.
In 1906 he became Professor of Topographical Anatomy on annual contract and in 1910, having been selected by the National Search Committee, he was made full Professor and Chairman of the Anatomy Department of the University of Cagliari. In the summer of 1915, Sterzi volunteered for the Italian Army where he served as medical officer. After the end of World War I, Sterzi, who had the rank of lieutenant colonel and was entitled to be released from the army, chose to remain in his office as director of the military hospital of Arezzo during the postwar Spanish flu epidemic. During the winter of 1919 he contracted a feve |
https://en.wikipedia.org/wiki/Weighted%20automaton | In theoretical computer science and formal language theory, a weighted automaton or weighted finite-state machine is a generalization of a finite-state machine in which the edges have weights, for example real numbers or integers. Finite-state machines are only capable of answering decision problems; they take as input a string and produce a Boolean output, i.e. either "accept" or "reject". In contrast, weighted automata produce a quantitative output, for example a count of how many answers are possible on a given input string, or a probability of how likely the input string is according to a probability distribution. They are one of the simplest studied models of quantitative automata.
The definition of a weighted automaton is generally given over an arbitrary semiring , an abstract set with an addition operation and a multiplication operation . The automaton consists of a finite set of states, a finite input alphabet of characters and edges which are labeled with both a character in and a weight in . The weight of any path in the automaton is defined to be the product of weights along the path, and the weight of a string is the sum of the weights of all paths which are labeled with that string. The weighted automaton thus defines a function from to .
Weighted automata generalize deterministic finite automata (DFAs) and nondeterministic finite automata (NFAs), which correspond to weighted automata over the Boolean semiring, where addition is logical disjunction and multiplication is logical conjunction. In the DFA case, there is only one accepting path for any input string, so disjunction is not applied. When the weights are real numbers and the outgoing weights for each state add to one, weighted automata can be considered a probabilistic model and are also known as probabilistic automata. These machines define a probability distribution over all strings, and are related to other probabilistic models such as Markov decision processes and Markov chains.
Weig |
https://en.wikipedia.org/wiki/Gemfire | Gemfire (released in Japan as Royal Blood or ロイヤルブラッド Roiyaru Buraddo, Super Royal Blood or スーパーロイヤルブラッド Sūpā Roiyaru Buraddo in its Super Famicom version) is a medieval war game for MSX, Nintendo Entertainment System, Super NES, FM Towns, Mega Drive/Genesis, DOS, and later Microsoft Windows, developed by Koei. The object in the game is to unify a fictional island by force. Players use infantry, cavalry, and archers, as well as fantasy units such as magicians, dragons or gargoyles in order to capture the castle needed to control that particular territory.
A sequel, Royal Blood II, was released in the Japan market for Windows.
Plot
The game takes place in the fictitious Isle of Ishmeria. Once upon a time, six wizards, each wielding a unique brand of magic, used their powers to protect the island and maintain peace. This was disrupted when they were collectively challenged by a Fire Dragon, summoned forth by a wizard intent on plunging the country into darkness.
The sea-dwelling dragon of peace known as the Pastha charged the six wizards with the task of fighting back. They succeeded, sealing the Fire Dragon away into a ruby at the top of a crown, and themselves became the six jewels around the crown's base. The crown, called Gemfire, was a symbol of utmost power and authority.
When Gemfire fell into the hands of the now current King of Ishmeria, Eselred, he sought to abuse the object's power, using it to embark on a tyrannical reign, instilling fear within his oppressed subjects. Ishmeria fell into despair as his power flourished. Finally, his young daughter, Princess Robyn, could not bear to watch her father's grievous misdeeds any longer — she seized Gemfire and pried the six wizard gems loose, causing them to shoot upward into the sky and circle briefly overhead before scattering themselves to different parts of Ishmeria. When a furious Eselred learned of Robyn's actions, he had her locked her away in a tower; but it was futile as the deed had already been do |
https://en.wikipedia.org/wiki/Oh%20Mummy | Oh Mummy is a video game for the Amstrad CPC models of home computer. It was developed by Gem Software and published by Amsoft in 1984. It was often included in the free bundles of software that came with the computer. The gameplay is similar to that of the 1981 arcade game Amidar.
Gameplay
The object of the game is to unveil all of the treasure within each level (or pyramid) of the game whilst avoiding the mummies. Each level consists of a two-dimensional board. In contrast with Pac-Man, when the player's character walks around, footprints are left behind. By surrounding an area of the maze with footprints, its content is revealed, which is either a scroll, a mummy, a key, a tomb or nothing at all. In order to complete a level, it is necessary to unveil the key and a tombstone. The scroll enables the player to kill/eat one mummy on the level. If a mummy is unveiled, it follows the player to the next level. The difficulty and speed of the game increases as the player progresses through the levels.
The game is primarily for one player but has a limited multiplayer mode in which players can alternate taking a turn to play each level. Whilst, even at the time, it was considered simple in terms of gameplay, graphics and sound, it was for many people one of the better and more addictive early offerings for the Amstrad.
The music played during gameplay is based on the children's song "The Streets of Cairo, or the Poor Little Country Maid".
Ports
The game was also released for the MSX, ZX Spectrum, the Amstrad CPC 464, Tatung Einstein and Camputers Lynx. The ZX Spectrum version was given away in one of several introductory software packs for the computer, this particular pack also including Crazy Golf, Alien Destroyer, Punchy, Treasure Island and Disco Dan. The game was also unofficially ported to the Sega Genesis and Mattel Intelevision. |
https://en.wikipedia.org/wiki/Nonlinear%20Oscillations | Nonlinear Oscillations is a quarterly peer-reviewed mathematical journal that was established in 1998. It is published by Springer Science+Business Media on behalf of the Institute of Mathematics, National Academy of Sciences of Ukraine. It covers research in the qualitative theory of differential or functional differential equations. This includes the qualitative analysis of differential equations with the help of symbolic calculus systems and applications of the theory of ordinary and functional differential equations in various fields of mathematical biology, electronics, and medicine.
Nonlinear Oscillations is a translation of the Ukrainian journal Neliniyni Kolyvannya (). The editor-in-chief is Anatoly M. Samoilenko (Institute of Mathematics of the National Academy of Sciences of Ukraine).
External links
Mathematics journals
Quarterly journals
English-language journals
Springer Science+Business Media academic journals
Academic journals established in 1998 |
https://en.wikipedia.org/wiki/Physics%20and%20Beyond | Physics and Beyond () is a book by Werner Heisenberg, the German physicist who discovered the uncertainty principle. It tells, from his point of view, the history of exploring atomic science and quantum mechanics in the first half of the 20th century.
As the subtitle "Encounters and Conversations" suggests, the core part of this book takes the form of discussions between himself and other scientists. Heisenberg says: "I wanted to show that science is done by people, and the most wonderful ideas come from dialog".
With chapters like "The first encounter with the science about atoms", "Quantum mechanics and conversations with Einstein", "Conversation about the relation between biology, physics and chemistry" or "Conversations about language" and "The behavior of an individual during a political disaster", dated 1937–1941, a reader can hear speaking such persons as Erwin Schrödinger, Niels Bohr, Albert Einstein or Max Planck, not only about physics, but also about many other questions related to biology, humans, philosophy, and politics.
Not only that, these conversations are often situated in detailed description of the historical atmosphere and a beautiful scenery, as many of them were led in nature during the many journeys they made, backpacking or sailing. "'Do you see whales, Heisenberg?', 'Yes, I see only whales, but I hope they are only big waves.'", is one of humorous scenes when the author, Bohr and other friends were sailing in a dark night.
The book provides a first-hand account about how science is done and how quantum physics, especially the Copenhagen interpretation, emerged.
"Nobody can reproduce these conversations verbatim, but I believe that the spirit of what the people said, and how they did, is conserved," the author tries to explain in the preface.
Many believe that the golden years of physics around 1925, when "even small people could do big things" are gone. But the people who had been there continue to speak to us through this book.
The |
https://en.wikipedia.org/wiki/Conversocial | Conversocial is a provider of social customer service software headquartered in New York City and founded in London. Companies such as Google, Barclaycard, Hertz, Tesco, Sainsbury's, Volkswagen and University of Phoenix use Conversocial's Software as a Service to manage the flow of customer service inquiries and discussions on social media channels.
History
Joshua March & Dan Lester founded Conversocial in November 2009 in London. After spending two years working with applications for social media for both the Facebook Developer Garage London and , they realized that social media was the future of communications online. After , which they sold to social media marketing company Betapond in 2012, March has focused solely on Conversocial.
In February 2016, Twitter announced that Conversocial is a Twitter Official Partner, and is working with the company to add deep messaging deep links to tweets.
In February 2017, Twitter announced that would deepen its partnership with Conversocial for greater growth and monetization in the area of social customer service.
Funding
In 2012 Conversocial expanded to the USA, opening its headquarters in Manhattan, New York.
In 2013, Conversocial received $4.4 million in additional funding from a round led by Octopus Ventures.
In 2014, Conversocial received $5 million in additional funding from a round led by Octopus Ventures.
In 2015, Conversocial received $11 million in additional funding from a round led by Dawn Capital.
Product
Conversocial is a real-time social media management system which allows companies to provide customer support through Facebook and Twitter. Conversocial's functions include:
Priority Response Engine – The self-learning prioritization engine uses natural language processing and analysis of historic responses to prioritise messages.
Conversation History
Team Management – Conversocial's collaborative platform lets teams share social communication, while management retains control of social platforms. |
https://en.wikipedia.org/wiki/Contact%20pad | Contact pads or bond pads are small, conductive surface areas of a printed circuit board (PCB) or die of an integrated circuit. They are often made of gold, copper, or aluminum and measure mere micrometres wide. Pads are positioned on the edges of die, to facilitate connections without shorting. Contact pads exist to provide a larger surface area for connections to a microchip or PCB, allowing for the input and output of data and power.
Possible methods of connecting contact pads to a system include soldering, wirebonding, or flip chip mounting.
Contact pads are created alongside a chip's functional structure during the photolithography steps of the fabrication process, and afterwards they are tested. During the test process, contact pads are probed with the needles of a probe card on Automatic Test Equipment in order to check for faults via electrical resistance.
Further reading
Kraig Mitzner, Complete PCB Design Using OrCAD Capture and PCB Editor, Newnes, 2009 .
Jing Li, Evaluation and Improvement of the Robustness of a PCB Pad in a Lead-free Environment, ProQuest, 2007 .
Deborah Lea, Fredirikus Jonck, Christopher Hunt, Solderability Measurements of PCB Pad Finishes and Geometries, National Physical Laboratory, 2001 .
Electronic engineering
Printed circuit board manufacturing |
https://en.wikipedia.org/wiki/Aegyptosaurus | Aegyptosaurus (meaning 'Egypt's lizard') is a genus of sauropod dinosaur that lived in what is now Africa, around 95 million years ago, during the Late Cretaceous Period (Cenomanian faunal stage).
Discovery and naming
The holotype (1912VIII61) consists of three caudal vertebrae, a partial scapula, and some limb bones, all of which were discovered in the Bahariya Formation of Egypt between 1910 and by Ernst Stromer and Richard Markgraf and the holotype was sent to Munich, Germany in 1915 to be studied at the same time the holotype of Spinosaurus aegyptiacus was described.
Aegyptosaurus was described by German paleontologist Ernst Stromer in 1932, seventeen years after the holotype was sent to Munich, and its fossils have been found in the Bahariya Formation of Egypt, the Farak Formation of Niger and in several other different locations in the Sahara Desert. The generic name, Aegyptosaurus, is derived from the country in which it was discovered and the Greek sauros meaning 'lizard'. All of the specimens destroyed in 1944 were discovered before 1939 and the fossils were stored together in Munich, but were obliterated when an Allied bombing raid destroyed the museum where they were kept on 25 April 1944, during World War II. Only fragments from other specimens still exist, mostly in the form of indeterminate specimens from Egypt and Niger.
de Lapparent (1960) referred a series of caudal vertebrae from the Continental intercalaire of Egypt to Aegyptosaurus baharijensis.
Description
In 2010, based on Paralititan and other related titanosaurs, Gregory S. Paul estimated the length of Aegyptosaurus at , and its weight at . |
https://en.wikipedia.org/wiki/Match%20moving | In visual effects, match moving is a technique that allows the insertion of 2D elements, other live action elements or CG computer graphics into live-action footage with correct position, scale, orientation, and motion relative to the photographed objects in the shot. It also allows for the removal of live action elements from the live action shot. The term is used loosely to describe several different methods of extracting camera motion information from a motion picture. Sometimes referred to as motion tracking or camera solving, match moving is related to rotoscoping and photogrammetry.
Match moving is sometimes confused with motion capture, which records the motion of objects, often human actors, rather than the camera. Typically, motion capture requires special cameras and sensors and a controlled environment (although recent developments such as the Kinect camera and Apple's Face ID have begun to change this). Match moving is also distinct from motion control photography, which uses mechanical hardware to execute multiple identical camera moves. Match moving, by contrast, is typically a software-based technology, applied after the fact to normal footage recorded in uncontrolled environments with an ordinary camera.
Match moving is primarily used to track the movement of a camera through a shot so that an identical virtual camera move can be reproduced in a 3-D animation program. When new animated elements are composited back into the original live-action shot, they will appear in perfectly matched perspective and therefore appear seamless.
As it is mostly software-based, match moving has become increasingly affordable as the cost of computer power has declined; it is now an established visual-effects tool and is even used in live television broadcasts as part of providing effects such as the yellow virtual down-line in American football.
Principle
The process of match moving can be broken down into two steps.
Tracking
The first step is identifying and tr |
https://en.wikipedia.org/wiki/Marvin%20Knopp | Marvin Isadore Knopp (January 4, 1933 – December 24, 2011) was an American mathematician who worked primarily in number theory. He made
notable contributions to the theory of modular forms.
Life and education
Knopp was born on January 4, 1933, in Chicago, Illinois. He received his PhD under Paul T. Bateman from the University of Illinois in 1958 where he became friends with fellow student Gene Golub.
Over the course of his career, he advised twenty Ph.D. students. He is the father of pianist Seth Knopp, and of Yehudah, Abby, and Elana. Marvin was married to Josephine Zadovsky Knopp for 25 years but the marriage ended in divorce. Knopp died on December 24, 2011, during a vacation in Florida. Marvin found happiness from his children, old movies, great music and numbers. The last 30 years of Knopp's life was shared with Phyllis Zemble. During the 6 years following his death, Zemble organized his papers and books (with the help of Wladimer Pribitkin), his photographs and his mathematical correspondence, which she donated to the American Institute of Mathematics (AIM). On AIM's website, you can find 131 of Knopp's reprints.
Personal life
Knopp was born in Chicago, Illinois in 1933. He was an Ashkenazi Jew.
Career
After receiving his PhD in 1958, Knopp taught at the University of Wisconsin and then, for a few years, at the
University of Illinois Chicago before moving, in 1976, to Temple University where he stayed until his sudden death in 2011.
Knopp was a leading expert in the theory of modular forms and a pioneering figure in the theory of Eichler cohomology, modular integrals and generalized modular forms. He was closely associated with Emil Grosswald. In Jean Dieudonne's influential book A Panorama of Pure Mathematics (Academic Press, 1982),
he is mentioned (p. 95) as one of those who "made substantial contributions" to the theory of modular forms.
Selected publications
Further reading
A set of papers in honor of Grosswald; includes reminiscences, list of P |
https://en.wikipedia.org/wiki/Terbium%28III%29%20oxide | Terbium(III) oxide, also known as terbium sesquioxide, is a sesquioxide of the rare earth metal terbium, having chemical formula . It is a p-type semiconductor, which conducts protons, which is enhanced when doped with calcium. It may be prepared by the reduction of in hydrogen at 1300 °C for 24 hours.
It is a basic oxide and easily dissolved to dilute acids, and then almost colourless terbium salt is formed.
Tb2O3 + 6 H+ → 2 Tb3+ + 3 H2O
The crystal structure is cubic and the lattice constant is a = 1057 pm. |
https://en.wikipedia.org/wiki/Succade | Succade is the candied peel of any of the citrus species, especially from the citron or Citrus medica which is distinct with its extra-thick peel; in addition, the taste of the inner rind of the citron is less bitter than those of the other citrus. However, the term is also occasionally applied to the peel, root, or even entire fruit or vegetable like parsley, fennel and cucurbita which have a bitter taste and are boiled with sugar to get a special "sweet and sour" outcome.
Fruits which are commonly candied also include dates, cherries, pineapple, ginger, and the rind of watermelon.
Name
The word succade is most probably derived from the Latin succidus, but according to others the name may have originated from the Hebrew word sukkah, the temporary booth that Jews build on the holiday of Sukkot. The citron, known in Hebrew as an etrog, is one of the symbolic Four Species used on that holiday. After Sukkot, some Jews candy the etrog or make marmalade from it.
While the word Succade was widely used in German, today it is usually called Zitronat. The French called it fruit glacé or fruit confit , and is also known as candied fruit or crystallized fruit. It has been around since the 14th century.
Production
The citron fruits are halved, depulped, immersed in seawater or ordinary salt water to ferment for about 40 days, the brine being changed every two weeks; rinsed, and put in denser brine in wooden barrels for storage and for export. After partial de-salting and boiling to soften the peel, it is candied in a strong sugar solution. The candied peel is sun-dried or put up in jars for future use. Candying is traditionally done in Livorno, Italy, where they gathered the Corsican citrons from Corsica, the Diamante citrons from Liguria, Naples, Calabria and Sicily, and the Greek citron from Greece through Trieste.
The continual process of drenching the fruit in syrup causes the fruit to become saturated with sugar, thereby preventing the growth of spoilage microorga |
https://en.wikipedia.org/wiki/Kai%20Simons | Kai Simons (born 24 May 1938) is a Finnish professor of biochemistry and cell biology and physician living and working in Germany. He introduced the concept of lipid rafts, as well as coined the term trans-Golgi network and proposed its role in protein and lipid sorting. The co-founder and co-organizer of EMBO, ELSO, Simons initiated the foundation of MPI-CBG, where he acted as a director (1998–2006) and a group-leader (until 2012). He is the co-founder and co-owner of Lipotype GmbH.
Biography
Kai Simons is the son of a physics professor. His father convinced him to study medicine, though he originally wanted to study physics. While studying at the University of Helsinki, Simons spent a summer internship in the Stockholm laboratory of Bengt Samuelsson There, he studied mechanisms of vitamin B12 absorption. He worked with other students to organize a campaign to fight taeniasis, a disease common in eastern Finland where eating raw fish is popular.
After completing his MD in 1964, he began a postdoctoral fellowship at Rockefeller University in New York City where he worked between 1966 and 1967 on blood serum protein polymorphism. He returned to Helsinki in 1967, where he began working as a Junior Investigator for the Finnish Medical Research Council at the University of Helsinki. He became a group leader in 1972 and was a biochemistry professor in 1971–79 at the medical faculty of this university At first, he continued his work on serum proteins. Next, together with Leevi Kääriäinen and Ossi Renkonen, he started a research team – later joined by Ari Helenius, his first PhD student and later a post doctoral researcher who became Simons' brother-in-law. After a one-month stay in MRC Laboratory for Molecular Biology in Cambridge, the group started investigating a Semliki Forest virus, introduced to Simons by Kääriäinen.
In 1975 Simons came to Heidelberg (Germany), as one of the EMBL group leaders. Together with Ari Helenius he helped to develop EMBL, headed at this |
https://en.wikipedia.org/wiki/Profinite%20integer | In mathematics, a profinite integer is an element of the ring (sometimes pronounced as zee-hat or zed-hat)
where the inverse limit
indicates the profinite completion of , the index runs over all prime numbers, and is the ring of p-adic integers. This group is important because of its relation to Galois theory, étale homotopy theory, and the ring of adeles. In addition, it provides a basic tractable example of a profinite group.
Construction
The profinite integers can be constructed as the set of sequences of residues represented as
such that .
Pointwise addition and multiplication make it a commutative ring.
The ring of integers embeds into the ring of profinite integers by the canonical injection:
where
It is canonical since it satisfies the universal property of profinite groups that, given any profinite group and any group homomorphism , there exists a unique continuous group homomorphism with .
Using Factorial number system
Every integer has a unique representation in the factorial number system as
where for every , and only finitely many of are nonzero.
Its factorial number representation can be written as .
In the same way, a profinite integer can be uniquely represented in the factorial number system as an infinite string , where each is an integer satisfying .
The digits determine the value of the profinite integer mod . More specifically, there is a ring homomorphism sending
The difference of a profinite integer from an integer is that the "finitely many nonzero digits" condition is dropped, allowing for its factorial number representation to have infinitely many nonzero digits.
Using the Chinese Remainder theorem
Another way to understand the construction of the profinite integers is by using the Chinese remainder theorem. Recall that for an integer with prime factorization
of non-repeating primes, there is a ring isomorphism
from the theorem. Moreover, any surjection
will just be a map on the underlying decompositions |
https://en.wikipedia.org/wiki/Linux%20Lite | Linux Lite is a Linux distribution based on Debian and Ubuntu created by a team of programmers led by Jerry Bezencon. Created in 2012, it uses a customized implementation of Xfce as its desktop environment, and runs on the main Linux kernel.
The distribution aims to appeal to Linux beginners and Windows users, by trying to make the transition from Windows to Linux as smooth as possible. To achieve this, the distribution tries to conserve many of the visual and functional elements of Windows, to create an experience that can be perceived as familiar by Windows users. Additionally, the distro sets out to "dispel the myth that Linux is hard to use", by trying to offer a simple and intuitive desktop experience.
See also
Debian
Lubuntu
Ubuntu |
https://en.wikipedia.org/wiki/Diagrammatic%20reasoning | Diagrammatic reasoning is reasoning by means of visual representations. The study of diagrammatic reasoning is about the understanding of concepts and ideas, visualized with the use of diagrams and imagery instead of by linguistic or algebraic means.
Diagram
A diagram is a 2D geometric symbolic representation of information according to some visualization technique. Sometimes, the technique uses a 3D visualization which is then projected onto the 2D surface. The term diagram in common sense can have two meanings.
visual information device: Like the term "illustration" the diagram is used as a collective term standing for the whole class of technical genres, including graphs, technical drawings and tables.
specific kind of visual display: This is only the genre, that shows qualitative data with shapes that are connected by lines, arrows, or other visual links.
In science the term is used in both ways. For example, Anderson (1997) stated more general "diagrams are pictorial, yet abstract, representations of information, and maps, line graphs, bar charts, engineering blueprints, and architects' sketches are all examples of diagrams, whereas photographs and video are not". On the other hand, Lowe (1993) defined diagrams as specifically "abstract graphic portrayals of the subject matter they represent".
In the specific sense diagrams and charts contrast computer graphics, technical illustrations, infographics, maps, and technical drawings, by showing "abstract rather than literal representations of information". The essences of a diagram can be seen as:
a form of visual formatting devices
a display that does not show quantitative data, but rather relationships and abstract information
with building blocks such as geometrical shapes that are connected by lines, arrows, or other visual links.
Or as Bert S. Hall wrote, "diagrams are simplified figures, caricatures in a way, intended to convey essential meaning". According to Jan V. White (1984) "the characteris |
https://en.wikipedia.org/wiki/Iodine%E2%80%93starch%20test | The iodine–starch test is a chemical reaction that is used to test for the presence of starch or for iodine. The combination of starch and iodine is intensely blue-black.
The interaction between starch and the triiodide anion () is the basis for iodometry.
History and principles
The iodine–starch test was first described by J. J. Colin and H. F. Gaultier de Claubry, and independently by F. Stromeyer, in 1814.
The triiodide anion instantly produces an intense blue-black colour upon contact with starch. The intensity of the colour decreases with increasing temperature and with the presence of water-miscible organic solvents such as ethanol. The test cannot be performed at very low pH due to the hydrolysis of the starch under these conditions. It is thought that the iodine–iodide mixture combines with the starch to form an infinite polyiodide homopolymer. This was rationalized through single crystal X-ray crystallography and comparative Raman spectroscopy.
Starch as an indicator
Starch is often used in chemistry as an indicator for redox titrations where triiodide is present. Starch forms a very dark blue-black complex with triiodide. However, the complex is not formed if only iodine or only iodide (I−) is present. The colour of the starch complex is so deep, that it can be detected visually when the concentration of the iodine is as low as 20 µM at 20 °C. During iodine titrations, concentrated iodine solutions must be reacted with some titrant, often thiosulfate, in order to remove most of the iodine before the starch is added. This is due to the insolubility of the starch–triiodide complex which may prevent some of the iodine reacting with the titrant. Close to the endpoint, the starch is added, and the titration process is resumed taking into account the amount of thiosulfate added before adding the starch.
The color change can be used to detect moisture or perspiration, as in the Minor test or starch–iodine test.
See also
Lugol's iodine
Counterfeit banknote d |
https://en.wikipedia.org/wiki/AnIML | The Analytical Information Markup Language (AnIML) is an open ASTM XML standard for storing and sharing any analytical chemistry and biological data.
AnIML and FAIR data
A main reason of using AnIML is that FAIR data (Findable, Accessible, Interoperable and Reusable) standards are automatically implemented. As AnIML's structure is human-readable, Accessibility is given. Interoperability, Reusability and Findability are secured by the AnIML Core and AnIML Technique Definitions.
History
AnIML has been continuously worked on starting from 2003 up to 2020. The last AnIML Core Version update happened in 2010. So far, no standardisation document nor public example files have been published. The standard exists only in pre-release form.
Architecture
AnIML is a XML standard which consists of two logical layers:
AnIML Core
AnIML Technique Definitions
Additionally, AnIML Technique Definition Documents apply constraints to the AnIML Core and are specified by the AnIML Technique Definitions.
The AnIML Core consists of a set of rules defining the structure of the XML document, providing a universal container for arbitrary analytical data. AnIML Technique Definitions describe how to use the AnIML Core to record experiments of a particular scientific discipline. There is a big similarity between the mechanisms of AnIML and the AVI format. The AnIML Core defines the data container whereas the AnIML Technique Definitions act similar to the AVI codec. It defines how the data needs to be structured and labeled. Technique Definitions are XML documents, specified by the Technique Schema. |
https://en.wikipedia.org/wiki/Light%20fixture | A light fixture (US English), light fitting (UK English), lamp, or luminaire is an electrical device containing an electrical component called a lamp that provides illumination. All light fixtures have a fixture body and one or more lamps. The lamps may be in sockets for easy replacement—or, in the case of some LED fixtures, hard-wired in place.
Fixtures may also have a switch to control the light, either attached to the lamp body or attached to the power cable. Permanent light fixtures, such as dining room chandeliers, may have no switch on the fixture itself, but rely on a wall switch.
Fixtures require an electrical connection to a power source, typically AC mains power, but some run on battery power for camping or emergency lights. Permanent lighting fixtures are directly wired. Movable lamps have a plug and cord that plugs into a wall socket.
Light fixtures may also have other features, such as reflectors for directing the light, an aperture (with or without a lens), an outer shell or housing for lamp alignment and protection, an electrical ballast or power supply, and a shade to diffuse the light or direct it towards a workspace (e.g., a desk lamp). A wide variety of special light fixtures are created for use in the automotive lighting industry, aerospace, marine and medicine sectors.
Portable light fixtures are often called lamps, as in table lamp or desk lamp. In technical terminology, the lamp is the light source, which, in casual terminology, is called the light bulb. Both the International Electrotechnical Commission (IEC) and the Illuminating Engineering Society (IES) recommend the term luminaire for technical use.
History
Fixture manufacturing began soon after production of the incandescent light bulb. When practical uses of fluorescent lighting were realized after 1924, the three leading companies to produce various fixtures were Lightolier, Artcraft Fluorescent Lighting Corporation, and Globe Lighting in the United States.
Fixture types
Light f |
https://en.wikipedia.org/wiki/Ribonucleoprotein%20Networks%20Analyzed%20by%20Mutational%20Profiling | Ribonucleoprotein Networks Analyzed by Mutational Profiling (RNP-MaP) is a strategy for probing RNA-protein networks and protein binding sites at a nucleotide resolution. Information about RNP assembly and function can facilitate a better understanding of biological mechanisms. RNP-MaP uses NHS-diazirine (SDA), a hetero-bifunctional crosslinker, to freeze RNA-bound proteins in place. Once the RNA-protein crosslinks are formed, MaP reverse transcription is then conducted to reversely transcribe the protein-bound RNAs as well as introduce mutations at the site of RNA-protein crosslinks. Sequencing results of the cDNAs reveal information about both protein-RNA interaction networks and protein binding sites.
Strategy
Components
RNA-MaP involves three major components:
Ribonucleoproteins (RNPs): complexes made up of RNAs and RNA-binding proteins (RBPs)
NHS-diazirine (SDA): a cell permeable crosslinking reagent. SDA contains two reactive groups - a diazirine and a succinimidyl ester. The reaction between succinimidyl esters and amine groups (e.g. lysine side chains) results in peptide bonds (or amide bonds). When exposed to UV light with a wavelength of 365 nm, an intermediate broadly reactive toward nucleotide riboses and bases is formed. As a result, proteins are crosslinked with RNA by the SDA linker.
Mutational profiling (MaP): a method using reverse transcriptase with relaxed fidelity to incorporate modified residues at protein-RNA binding sites.
Workflow
Long-wavelength UV and SDA reagents are first supplied to living cells to crosslink protein residues with RNA by forming amide bonds between amine groups of lysine (or arginine) residues and succinimidyl esters. Next, cells containing crosslinked RNPs are lysed and the RNA-bound proteins are digested into peptide adducts. MaP reverse transcription is then performed to label the protein-RNA binding sites through peptide adduct-induced mutations. Sequencing of the mutation-containing cDNA product will reveal |
https://en.wikipedia.org/wiki/Hierarchical%20internetworking%20model | The Hierarchical internetworking model is a three-layer model for network design first proposed by Cisco. It divides enterprise networks into three layers: core, distribution, and access layer.
Access layer
End-stations and servers connect to the enterprise at the access layer. Access layer devices are usually commodity switching platforms, and may or may not provide layer 3 switching services. The traditional focus at the access layer is minimizing "cost-per-port": the amount of investment the enterprise must make for each provisioned Ethernet port. This layer is also called the desktop layer because it focuses on connecting client nodes, such as workstations to the network.
Distribution layer
The distribution layer is the smart layer in the three-layer model. Routing, filtering, and QoS policies are managed at the distribution layer. Distribution layer devices also often manage individual branch-office WAN connections. This layer is also called the Workgroup layer.
Core layer
The core is the backbone of a network, where the internet(internetwork) gateway are located. The core network provides high-speed, highly redundant forwarding services to move packets between distribution-layer devices in different regions of the network. Core switches and routers are usually the most powerful, in terms of raw forwarding power, in the enterprise; core network devices manage the highest-speed connections, such as 10 Gigabit Ethernet or 100 Gigabit Ethernet.
See also
Multi-tier architecture
Service layer |
https://en.wikipedia.org/wiki/Credential%20service%20provider | A credential service provider (CSP) is a trusted entity that issues security tokens or electronic credentials to subscribers. A CSP forms part of an authentication system, most typically identified as a separate entity in a Federated authentication system. A CSP may be an independent third party, or may issue credentials for its own use. The term CSP is used frequently in the context of the US government's eGov and e-authentication initiatives. An example of a CSP would be an online site whose primary purpose may be, for example, internet banking - but whose users may be subsequently authenticated to other sites, applications or services without further action on their part.
History
In any authentication system, some entity is required to authenticate the user on behalf of the target application or service. For many years there was poor understanding of the impact of security and the multiplicity of services and applications that would ultimately require authentication. The result of this is that not only are users burdened with many credentials that they must remember or carry around with them, but also applications and services must perform some level of registration and then some level of authentication of those users. As a result, Credential Service Providers were created. A CSP separates those functions from the application or service and typically provides trust to that application or service over a network (such as the Internet).
CSP Process
The CSP establishes a mechanism to uniquely identify each subscriber and the associated tokens and credentials issued to that subscriber. The CSP registers or gives the subscriber a token to be used in an authentication protocol and issues credentials as needed to bind that token to the identity, or to bind the identity to some other useful verified attribute. The subscriber may be given electronic credentials to go with the token at the time of registration, or credentials may be generated later as needed. Subscribers |
https://en.wikipedia.org/wiki/W%5EX | W^X ("write xor execute", pronounced W xor X) is a security feature in operating systems and virtual machines. It is a memory protection policy whereby every page in a process's or kernel's address space may be either writable or executable, but not both. Without such protection, a program can write (as data "W") CPU instructions in an area of memory intended for data and then run (as executable "X"; or read-execute "RX") those instructions. This can be dangerous if the writer of the memory is malicious. W^X is the Unix-like terminology for a strict use of the general concept of executable space protection, controlled via the system call.
W^X is relatively simple on processors that support fine-grained page permissions, such as Sun's SPARC and SPARC64, AMD's AMD64, Hewlett-Packard's PA-RISC, HP's (originally Digital Equipment Corporation's) Alpha, and ARM.
The term W^X has also been applied to file system write/execute permissions to mitigate file write vulnerabilities (as with in memory) and attacker persistence. Enforcing restrictions on file permissions can also close gaps in W^X enforcement caused by memory mapped files. Outright forbidding the usage of arbitrary native code can also mitigate kernel and CPU vulnerabilities not exposed via the existing code on the computer. A less intrusive approach is to lock a file for the duration of any mapping into executable memory, which suffices to prevent post-inspection bypasses.
Compatibility
Some early Intel 64 processors lacked the NX bit required for W^X, but this appeared in later chips. On more limited processors such as the Intel i386, W^X requires using the CS code segment limit as a "line in the sand", a point in the address space above which execution is not permitted and data is located, and below which it is allowed and executable pages are placed. This scheme was used in Exec Shield.
Linker changes are generally required to separate data from code (such as trampolines that are needed for linker and l |
https://en.wikipedia.org/wiki/Gairdner%20Foundation | The Gairdner Foundation is a non-profit organization devoted to the recognition of outstanding achievements in biomedical research worldwide. It was created in 1957 by James Arthur Gairdner to recognize and reward the achievements of medical researchers whose work contributes significantly to improving the quality of human life. Since the first awards were made in 1959, the Gairdner Awards have become Canada's most prestigious medical awards, recognizing and celebrating the research of the world’s best and brightest biomedical researchers.
Since 1959, more than 390 Canada Gairdner Awards have been given to scientists from 35 countries; of these recipients, 98 have subsequently gone on to win a Nobel Prize.
History
The Gairdner Foundation was created in 1957 by James Arthur Gairdner (1893-1971). Known as Big Jim to his grandchildren, he was, indeed, a larger than life figure. Described by his friends as a talented maverick and visionary, Gairdner was a colorful personality who lived large. He was, by turns, an athlete, a soldier, a stockbroker, a businessman, a philanthropist and a landscape painter. When he died, he left his private estate to the Town of Oakville as an art gallery, which still operates today.
While he had always had an interest in medicine, it was the onset of severe arthritis in his early 50s that led Gairdner to become involved with the newly created Canadian Arthritis and Rheumatism Society. In 1957 he donated $500,000 to establish a foundation to recognize major research contributions in the conquest of disease and human suffering. The Gairdner Foundation was thus born, which was to be his most lasting legacy.
Gairdner’s decision to create awards that recognize outstanding discoveries by the world’s top scientists was, and continues to be, an act of extraordinary vision. Much of his original instruction regarding the process of selection and awarding of the prizes remains in place today, contributing to the current stature of the Canada G |
https://en.wikipedia.org/wiki/Dexiothetism | Dexiothetism refers to a reorganisation of a clade's bauplan, with right becoming ventral and left becoming dorsal. The organism would then recruit a new left hand side.
Details
If a bilaterally symmetrical ancestor were to become affixed by its right hand side, it would occlude all features on that side. When that organism wanted to become secondarily bilaterally symmetrical again, it would be forced to resculpt its new left and right hand sides from the old left hand side. The end result is a bilaterally symmetrical animal, but with its dorsoventral axis rotated a quarter of a turn.
Implications
Dexiothetism has been implicated in the origin of the unusual embryology of the cephalochordate amphioxus, whereby its gill slits originate on the left hand side and the migrate to the right hand side.
In Jefferies' Calcichordate Theory, he supposes that all chordates and their mitrate ancestors are dexiothetic. |
https://en.wikipedia.org/wiki/Dedekind%E2%80%93MacNeille%20completion | In mathematics, specifically order theory, the Dedekind–MacNeille completion of a partially ordered set is the smallest complete lattice that contains it. It is named after Holbrook Mann MacNeille whose 1937 paper first defined and constructed it, and after Richard Dedekind because its construction generalizes the Dedekind cuts used by Dedekind to construct the real numbers from the rational numbers. It is also called the completion by cuts or normal completion.
Order embeddings and lattice completions
A partially ordered set (poset) consists of a set of elements together with a binary relation on pairs of elements that is reflexive ( for every x), transitive (if and then ), and antisymmetric (if both and hold, then ). The usual numeric orderings on the integers or real numbers satisfy these properties; however, unlike the orderings on the numbers, a partial order may have two elements that are incomparable: neither nor holds. Another familiar example of a partial ordering is the inclusion ordering ⊆ on pairs of sets.
If is a partially ordered set, a completion of means a complete lattice with an order-embedding of into . The notion of a complete lattice means that every subset of elements of has an infimum and supremum; this generalizes the analogous properties of the real numbers. The notion of an order-embedding enforces the requirements that distinct elements of must be mapped to distinct elements of , and that each pair of elements in has the same ordering in as they do in . The extended real number line (real numbers together with +∞ and −∞) is a completion in this sense of the rational numbers: the set of rational numbers {3, 3.1, 3.14, 3.141, 3.1415, 3.14159, ...} does not have a rational least upper bound, but in the real numbers it has the least upper bound .
A given partially ordered set may have several different completions. For instance, one completion of any partially ordered set is the set of its downwardly closed subsets ordered b |
https://en.wikipedia.org/wiki/Software%20metric | In software engineering and development, a software metric is a standard of measure of a degree to which a software system or process possesses some property. Even if a metric is not a measurement (metrics are functions, while measurements are the numbers obtained by the application of metrics), often the two terms are used as synonyms. Since quantitative measurements are essential in all sciences, there is a continuous effort by computer science practitioners and theoreticians to bring similar approaches to software development. The goal is obtaining objective, reproducible and quantifiable measurements, which may have numerous valuable applications in schedule and budget planning, cost estimation, quality assurance, testing, software debugging, software performance optimization, and optimal personnel task assignments.
Common software measurements
Common software measurements include:
ABC Software Metric
Balanced scorecard
Bugs per line of code
Code coverage
Cohesion
Comment density
Connascent software components
Constructive Cost Model
Coupling
Cyclomatic complexity (McCabe's complexity)
Cyclomatic complexity density
Defect density - defects found in a component
Defect potential - expected number of defects in a particular component
Defect removal rate
DSQI (design structure quality index)
Function Points and Automated Function Points, an Object Management Group standard
Halstead Complexity
Instruction path length
Maintainability index
Source lines of code - number of lines of code
Program execution time
Program load time
Program size (binary)
Weighted Micro Function Points
Cycle time (software)
First pass yield
Corrective Commit Probability
Limitations
As software development is a complex process, with high variance on both methodologies and objectives, it is difficult to define or measure software qualities and quantities and to determine a valid and concurrent measurement metric, especially when making such a prediction prior to t |
https://en.wikipedia.org/wiki/Philasterides%20dicentrarchi | Philasterides dicentrarchi is a marine protozoan ciliate that was first identified in 1995 after being isolated from infected European sea bass (Dicentrarchus labrax) reared in France. The species was also identified as the causative agent of outbreaks of scuticociliatosis that occurred between summer 1999 and spring 2000 in turbot (Scophthalmus maximus) cultivated in the Atlantic Ocean (Galicia, Northwest Spain). Infections caused by P. dicentrarchi have since been observed in turbot reared in both open flow and recirculating production systems. In addition, the ciliate has also been reported to cause infections in other flatfishes, such as the olive flounder (Paralichthys olivaceus) in Korea and the fine flounder (Paralichthys adspersus) in Peru, as well as in seadragons (Phyllopteryx taeniolatus and Phycodurus eques), seahorses (Hippocampus kuda and H. abdominalis), and several species of sharks in other parts of the world.
Biology and Pathology
P. dicentrarchi is included within the subclass Scuticociliatia, which includes about 20 species of ciliates that are typically microphagous bacteriovores and generally abundant in eutrophic habitats in lakes and in coastal marine habitats. Some of these ciliates, characterized by possessing a scutica (a transient kinetosomal structure that is present during stomatogenesis), can behave as endoparasites and are capable of producing serious infections in a wide variety of vertebrates, especially fish, and invertebrates such as crustaceans and echinoderms. P. dicentrarchi is a microaerophilic scuticociliate that lives at the sea bottom, at or below the oxycline or on the monimolimnion, where it feeds on bacteria. However, when it encounters a host it can also behave as an opportunistic histiophagous parasite. Survival of the species inside the host and adaptation to a parasitic lifestyle are attributed to the existence of physiological adaptations at the level of mitochondrial metabolism. Such adaptations include the prese |
https://en.wikipedia.org/wiki/Journal%20of%20Bioinformatics%20and%20Computational%20Biology | The Journal of Bioinformatics and Computational Biology was founded in 2003 and is published by World Scientific. The journal covers analysis of cellular information, especially in the technical aspect. The managing editor is Limsoon Wong (National University of Singapore).
Abstracting and indexing
The journal is abstracted and indexed in:
Index Medicus
BIOSIS Previews
Biological Abstracts
MEDLINE
CompuScience
Scopus
Inspec
English-language journals
Academic journals established in 2003
Bioinformatics and computational biology journals
World Scientific academic journals |
https://en.wikipedia.org/wiki/Normal%20form%20%28dynamical%20systems%29 | In mathematics, the normal form of a dynamical system is a simplified form that can be useful in determining the system's behavior.
Normal forms are often used for determining local bifurcations in a system. All systems exhibiting a certain type of bifurcation are locally (around the equilibrium) topologically equivalent to the normal form of the bifurcation. For example, the normal form of a saddle-node bifurcation is
where is the bifurcation parameter. The transcritical bifurcation
near can be converted to the normal form
with the transformation .
See also canonical form for use of the terms canonical form, normal form, or standard form more generally in mathematics. |
https://en.wikipedia.org/wiki/Global%20brain | The global brain is a neuroscience-inspired and futurological vision of the planetary information and communications technology network that interconnects all humans and their technological artifacts. As this network stores ever more information, takes over ever more functions of coordination and communication from traditional organizations, and becomes increasingly intelligent, it increasingly plays the role of a brain for the planet Earth.
Basic ideas
Proponents of the global brain hypothesis claim that the Internet increasingly ties its users together into a single information processing system that functions as part of the collective nervous system of the planet. The intelligence of this network is collective or distributed: it is not centralized or localized in any particular individual, organization or computer system. Therefore, no one can command or control it. Rather, it self-organizes or emerges from the dynamic networks of interactions between its components. This is a property typical of complex adaptive systems.
The World Wide Web in particular resembles the organization of a brain with its web pages (playing a role similar to neurons) connected by hyperlinks (playing a role similar to synapses), together forming an associative network along which information propagates. This analogy becomes stronger with the rise of social media, such as Facebook, where links between personal pages represent relationships in a social network along which information propagates from person to person.
Such propagation is similar to the spreading activation that neural networks in the brain use to process information in a parallel, distributed manner.
History
Although some of the underlying ideas were already expressed by Nikola Tesla in the late 19th century and were written about by many others before him, the term "global brain" was coined in 1982 by Peter Russell in his book The Global Brain. How the Internet might be developed to achieve this was set out in 1986. |
https://en.wikipedia.org/wiki/Lionel%20Briand | Lionel Claude Briand, born in Paris, France, on November 21, 1965, is a software engineer, and professor at the University of Ottawa and University of Luxembourg. He is an IEEE Fellow, a Canada Research Chair in Intelligent Software Dependability and Compliance and a European Research Council Advanced grantee. His research foci are testing, verification, and validation of software systems; applying machine learning and evolutionary computation to software engineering; and software quality assurance, among others. He was vice-director of the University of Luxembourg's SnT - Interdisciplinary Centre for Security, Reliability and Trust from 2014 to 2019, and editor in chief of Empirical Software Engineering (Springer) from 2003 to 2016.
In 2012, he was the recipient of the Harlan D. Mills Award.
In 2022, he was the recipient of the ACM SIGSOFT Outstanding Research Award
Selected research
Arcuri, Andrea, and Lionel Briand. "A practical guide for using statistical tests to assess randomized algorithms in software engineering." 2011 33rd International Conference on Software Engineering (ICSE). IEEE, 2011.
Andrews, James H., Lionel C. Briand, and Yvan Labiche. "Is mutation an appropriate tool for testing experiments?." Proceedings of the 27th international conference on Software engineering. ACM, 2005.
Briand, Lionel C., John W. Daly, and Jurgen K. Wust. "A unified framework for coupling measurement in object-oriented systems." IEEE Transactions on software Engineering 25.1 (1999): 91–121.
Basili, Victor R., Lionel C. Briand, and Walcélio L. Melo. "A validation of object-oriented design metrics as quality indicators." IEEE Transactions on software engineering 22.10 (1996): 751–761. |
https://en.wikipedia.org/wiki/Tyndall%20effect | The Tyndall effect is light scattering by particles in a colloid such as a very fine suspension (a sol). Also known as Tyndall scattering, it is similar to Rayleigh scattering, in that the intensity of the scattered light is inversely proportional to the fourth power of the wavelength, so blue light is scattered much more strongly than red light. An example in everyday life is the blue colour sometimes seen in the smoke emitted by motorcycles, in particular two-stroke machines where the burnt engine oil provides these particles.
Under the Tyndall effect, the longer wavelengths are transmitted more, while the shorter wavelengths are more diffusely reflected via scattering. The Tyndall effect is seen when light-scattering particulate matter is dispersed in an otherwise light-transmitting medium, where the diameter of an individual particle is in the range of roughly 40 to 900 nm, i.e. somewhat below or near the wavelengths of visible light (400–750 nm).
It is particularly applicable to colloidal mixtures; for example, the Tyndall effect is used in nephelometers to determine the size and density of particles in aerosols and other colloidal matter. Investigation of the phenomenon led directly to the invention of the ultramicroscope and turbidimetry.
It is named after the 19th-century physicist John Tyndall, who first studied the phenomenon extensively.
History
Prior to his discovery of the phenomenon, Tyndall was primarily known for his work on the absorption and emission of radiant heat on a molecular level. In his investigations in that area, it had become necessary to use air from which all traces of floating dust and other particulates had been removed, and the best way to detect these particulates was to bathe the air in intense light. In the 1860s, Tyndall did a number of experiments with light, shining beams through various gases and liquids and recording the results. In doing so, Tyndall discovered that when gradually filling the tube with smoke and then sh |
https://en.wikipedia.org/wiki/Wake%20%28Sawyer%20novel%29 | Wake, also called WWW: Wake, is a 2009 novel written by Canadian novelist Robert J. Sawyer and the first book in his WWW Trilogy. It was first serialized in four parts in Analog Science Fiction and Fact from November 2008 to March 2009, was first published in book form on April 8, 2009, and was followed by Watch in 2010 and by Wonder in 2011 (both novels are not serialized in Analog). The novel details the spontaneous emergence of an intelligence on the World Wide Web, called Webmind, and its friendship with a blind teenager named Caitlin.
Sawyer developed the initial idea for Wake in January 2003 when he wrote in his diary about the emergence of consciousness on the World Wide Web. The novel was named a 2010 Hugo Award nominee in the category for Best Novel and won a 2009 Aurora Award.
Plot
Wake is set in 2012. Fifteen-year-old Caitlin Decter has been blind from birth. The Decter family recently moved from Austin, Texas to Waterloo, Ontario after Caitlin's father, Malcolm, received a job at the Perimeter Institute. Caitlin is emailed by Dr. Masayuki Kuroda, a scientist specializing in "signal processing related to V1." He believes that her blindness is caused by her retinas miscoding the visual information and offers to install a signal processor behind her left eye to unscramble the data. The device sends the data to a miniature computer, or "eyePod", which reprocesses the signals and returns them. The correct data is sent to her optic nerve, theoretically granting her sight. In duplex mode it sends and receives the signals, and in simplex mode it only sends them. Caitlin and her mother, Barbara, fly to Tokyo for the procedure. Although her pupils now react to light, Caitlin still cannot see. They return to Canada while Dr. Kuroda works on updating the software.
A bird-flu epidemic with a mortality rate of at least 90% has begun in China. Dr. Quan Li, a senior member of the Communist Party, recommends the President order a culling of ten to eleven thousand peo |
https://en.wikipedia.org/wiki/Branching%20order%20of%20bacterial%20phyla%20%28Rappe%20and%20Giovanoni%2C%202003%29 | There are several models of the Branching order of bacterial phyla, the most cited of these was proposed in 1987 paper by Carl Woese. This cladogram was later expanded by Rappé and Giovanoni in 2003 to include newly discovered phyla. Clear names are added in parentheses, see list of bacterial phyla.
See also
Branching order of bacterial phyla (Woese, 1987)
Branching order of bacterial phyla (Rappé and Giovanoni, 2003)
Branching order of bacterial phyla after ARB Silva Living Tree
Branching order of bacterial phyla (Ciccarelli et al., 2006)
Branching order of bacterial phyla (Battistuzzi et al.,2004)
Branching order of bacterial phyla (Gupta, 2001)
Branching order of bacterial phyla (Cavalier-Smith, 2002) |
https://en.wikipedia.org/wiki/Signal%20reconstruction | In signal processing, reconstruction usually means the determination of an original continuous signal from a sequence of equally spaced samples.
This article takes a generalized abstract mathematical approach to signal sampling and reconstruction. For a more practical approach based on band-limited signals, see Whittaker–Shannon interpolation formula.
General principle
Let F be any sampling method, i.e. a linear map from the Hilbert space of square-integrable functions to complex space .
In our example, the vector space of sampled signals is n-dimensional complex space. Any proposed inverse R of F (reconstruction formula, in the lingo) would have to map to some subset of . We could choose this subset arbitrarily, but if we're going to want a reconstruction formula R that is also a linear map, then we have to choose an n-dimensional linear subspace of .
This fact that the dimensions have to agree is related to the Nyquist–Shannon sampling theorem.
The elementary linear algebra approach works here. Let (all entries zero, except for the kth entry, which is a one) or some other basis of . To define an inverse for F, simply choose, for each k, an so that . This uniquely defines the (pseudo-)inverse of F.
Of course, one can choose some reconstruction formula first, then either compute some sampling algorithm from the reconstruction formula, or analyze the behavior of a given sampling algorithm with respect to the given formula.
Ideally, the reconstruction formula is derived by minimizing the expected error variance. This requires that either the signal statistics is known or a prior probability for the signal can be specified. Information field theory is then an appropriate mathematical formalism to derive an optimal reconstruction formula.
Popular reconstruction formulae
Perhaps the most widely used reconstruction formula is as follows. Let be a basis of in the Hilbert space sense; for instance, one could use the eikonal
,
although other choices are |
https://en.wikipedia.org/wiki/Red-suffusion%20rosy-faced%20lovebird%20mutation | The red-suffusion rose-faced lovebird (Agapornis roseicollis), also known as the red-pied lovebird, is not a true colour mutation of lovebird species. Many breeders believe it is due to a health issue, most likely dealing with the bird's liver. Some think the red-pied has some genetic relations with the Lutino rosy-faced lovebird mutation, as many cases of red spots appear in Lutino lovebirds. Although many breeders of parrots have claimed that this is a genetic mutation, no one has been able to successfully reproduce it through a series of generations.
See also
Rosy-faced lovebird
Rosy-faced lovebird colour genetics |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.