source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/University%20of%20Virginia%20Darden%20School%20of%20Business
The Darden School of Business is the graduate business school of the University of Virginia, a public research university in Charlottesville, Virginia. Ranked amongst the top business schools in the world, the school offers MBA, PhD, and Executive Education programs. The school was founded in 1955 and named after Colgate Whitehead Darden Jr., a former Democratic congressman, governor of Virginia, and president of the University of Virginia. It is located on the grounds of the University of Virginia. Its faculty use the case method as their method of teaching courses. The school has been ranked in the top ten globally by The Economist and Financial Times. History The Darden School was the first graduate school of business of the Southern United States when it was founded in 1955. The original business school was nestled in the central grounds of the University of Virginia, before being moved its current location at the North Grounds. Designed by the Driehaus Prize winner Robert A. M. Stern, the Darden school's buildings feature sand-struck Virginia brick, Chippendale balustrades and red-metal standing seam roofs. In 2018, the Sands Family Grounds was inaugurated by the Darden School, in Arlington County, Virginia, in proximity to Washington D.C.'s central business district. The Sands Family Grounds occupy the top two floors of a 31-story skyscraper emblazoned with the UVA Darden Logo, and provides extensive facilities for students and event guests. Locations The full-time MBA program is located in Charlottesville, Virginia at the UVA Darden Goodwin Family Grounds, which is roughly two hours from Washington, D.C. In 2017, it was announced that Darden would establish dedicated facilities in Rosslyn, formerly introduced as the UVA Darden Sands Family Grounds in February 2019, as the new home base for the Executive MBA formats and new M.S. in Business Analytics degree launched with the McIntire School of Commerce. MBA Designed for students who seek to strengthen
https://en.wikipedia.org/wiki/Reach%20%28mathematics%29
Let X be a subset of Rn. Then the reach of X is defined as Examples Shapes that have reach infinity include a single point, a straight line, a full square, and any convex set. The graph of ƒ(x) = |x| has reach zero. A circle of radius r has reach r.
https://en.wikipedia.org/wiki/Example-centric%20programming
Example-centric programming is an approach to software development that helps the user to create software by locating and modifying small examples into a larger whole. That approach can be helped by tools that allow an integrated development environment (IDE) to show code examples or API documentation related to coding behaviors occurring in the IDE. “Borrow” tactics are often employed from online sources, by programmers leaving the IDE to troubleshoot. The purpose of example-centric programming is to reduce the time spent by developers searching online. Ideally, in example-centric programming, the user interface integrates with help module examples for assistance without programmers leaving the IDE. The idea for this type of “instant documentation” is to reduce programming interruptions. The usage of this feature is not limited to experts, as some novices reap the benefits of an integrated knowledge base, without resorting to frequent web searches or browsing. Background The growth of the web has fundamentally changed the way software is built. Vast increase in information resources and the democratization of access and distribution are main factors in the development of example-centric programming for end-user development. Tutorials are available on the web in seconds thus broadening the space of who writes it: designers, scientists, or hobbyists. By 2012 13 million program as a part of their job, yet only three million of those are actual professional programmers. Prevalence of online code repositories, documentation, blogs and forums—enables programmers to build applications iteratively searching for, modifying, and combining examples. Using the web is integral to an opportunistic approach to programming when focusing on speed and ease of development over code robustness and maintainability. There is a widespread use of the web by programmers, novices and experts alike, to prototype, ideate, and discover. To develop software quickly programmers often mash up
https://en.wikipedia.org/wiki/Isomorph
An isomorph is an organism that does not change in shape during growth. The implication is that its volume is proportional to its cubed length, and its surface area to its squared length. This holds for any shape it might have; the actual shape determines the proportionality constants. The reason why the concept is important in the context of the Dynamic Energy Budget (DEB) theory is that food (substrate) uptake is proportional to surface area, and maintenance to volume. Since volume grows faster than surface area, this controls the ultimate size of the organism. Alfred Russel Wallace wrote this in a letter to E. B. Poulton in 1865. The surface area that is of importance is the part that is involved in substrate uptake (e.g. the gut surface), which is typically a fixed fraction of the total surface area in an isomorph. The DEB theory explains why isomorphs grow according to the von Bertalanffy curve if food availability is constant. Organisms can also change in shape during growth, which affects the growth curve and the ultimate size, see for instance V0-morphs and V1-morphs. Isomorphs can also be called V2/3-morphs. Most animals approximate isomorphy, but plants in a vegetation typically start as V1-morphs, then convert to isomorphs, and end up as V0-morphs (if neighbouring plants affect their uptake). See also Dynamic energy budget V0-morph V1-morph shape correction function
https://en.wikipedia.org/wiki/KIR2DS1
Killer cell immunoglobulin-like receptor, two domains, short cytoplasmic tail, 1 is a protein that in humans is encoded by the KIR2DS1 gene. Function Killer cell immunoglobulin-like receptors (KIRs) are transmembrane glycoproteins expressed by natural killer cells and subsets of T cells. The KIR genes are polymorphic and highly homologous and they are found in a cluster on chromosome 19q13.4 within the 1 Mb leukocyte receptor complex (LRC). The gene content of the KIR gene cluster varies among haplotypes, although several 'framework' genes are found in all haplotypes (KIR3DL3, KIR3DP1, KIR3DL4, KIR3DL2). The KIR proteins are classified by the number of extracellular immunoglobulin domains (2D or 3D) and by whether they have a long (L) or short (S) cytoplasmic domain. KIR proteins with the long cytoplasmic domain transduce inhibitory signals upon ligand binding via an immunoreceptor tyrosine-based inhibitory motif (ITIM), while KIR proteins with the short cytoplasmic domain lack the ITIM motif and instead associate with the TYRO protein tyrosine kinase binding protein to transduce activating signals. The ligands for several KIR proteins are subsets of HLA class I molecules; thus, KIR proteins are thought to play an important role in regulation of the immune response.
https://en.wikipedia.org/wiki/Oberon%20%28operating%20system%29
The Oberon System is a modular, single-user, single-process, multitasking operating system written in the programming language Oberon. It was originally developed in the late 1980s at ETH Zurich. The Oberon System has an unconventional visual text user interface (TUI) instead of a conventional command-line interface (CLI) or graphical user interface (GUI). This TUI was very innovative in its time and influenced the design of the Acme text editor for the Plan 9 from Bell Labs operating system. The latest version of the Oberon System, Project Oberon 2013, is still maintained by Niklaus Wirth and several collaborators, but older ETH versions of the system have been orphaned. The system also evolved into the multi-process, symmetric multiprocessing (SMP) capable A2 (formerly Active Object System (AOS), then Bluebottle), with a zooming user interface (ZUI). History The Oberon operating system was originally developed as part of the NS32032-based Ceres workstation project. It was written almost entirely (and in the 2013 version entirely is valid) in the Oberon programming language. The basic system was designed and implemented by Niklaus Wirth and Jürg Gutknecht and its design and implementation is fully documented in their book "Project Oberon". The user Interface and programmers reference is found in Martin Reiser's book "The Oberon System". The Oberon System was later extended and ported to other hardware platforms by a team at ETH Zurich and there was recognition in popular magazines. Wirth and Gutknecht (although being active computer science professors) refer to themselves as 'part-time programmers' in the book Project Oberon. In late 2013, a few months before his 80th birthday, Wirth published a second edition of Project Oberon. It details implementing the Oberon System using a reduced instruction set computer (RISC) CPU of his own design realized on a Xilinx field-programmable gate array (FPGA) board. It was presented at the symposium organized for his 80th
https://en.wikipedia.org/wiki/Cheyenne%20%28supercomputer%29
The Cheyenne supercomputer at the NCAR-Wyoming Supercomputing Center (NWSC) in Cheyenne, Wyoming began operation as one of the world’s most powerful and energy-efficient computers. Ranked in November 2016 as the 20th most powerful computer in the world by Top500, the 5.34-petaflops system is capable of more than triple the amount of scientific computing performed by NCAR’s previous supercomputer, Yellowstone. It also is three times more energy efficient than Yellowstone, with a peak computation rate of more than 3 billion calculations per second for every watt of energy consumed. The National Science Foundation and the State of Wyoming through an appropriation to the University of Wyoming funded Cheyenne to provide the United States with a major new tool to advance understanding of the atmospheric and related Earth system sciences. High-performance computers such as Cheyenne allow researchers to run increasingly detailed models that simulate complex processes to estimate how they might unfold in the future. These predictions give resource managers and policy experts valuable information for planning ahead and mitigating risk. Cheyenne’s users advance the knowledge needed for saving lives, protecting property, and enabling U.S. businesses to better compete in the global marketplace. Scientists across the country will use Cheyenne to study phenomena ranging from weather and climate to wildfires, seismic activity, and airflows that generate power at wind farms. Their findings lay the groundwork for better protecting society from natural disasters, lead to more detailed projections of seasonal and longer-term weather and climate variability and change, and improve weather and water forecasts that are needed by economic sectors from agriculture and energy to transportation and tourism. The supercomputer’s name was chosen to honor the people of Cheyenne, Wyoming, who supported the installation of the NWSC and its computers there. The name also commemorates the 150th an
https://en.wikipedia.org/wiki/Nonlinear%20eigenproblem
In mathematics, a nonlinear eigenproblem, sometimes nonlinear eigenvalue problem, is a generalization of the (ordinary) eigenvalue problem to equations that depend nonlinearly on the eigenvalue. Specifically, it refers to equations of the form where is a vector, and is a matrix-valued function of the number . The number is known as the (nonlinear) eigenvalue, the vector as the (nonlinear) eigenvector, and as the eigenpair. The matrix is singular at an eigenvalue . Definition In the discipline of numerical linear algebra the following definition is typically used. Let , and let be a function that maps scalars to matrices. A scalar is called an eigenvalue, and a nonzero vector is called a right eigevector if . Moreover, a nonzero vector is called a left eigevector if , where the superscript denotes the Hermitian transpose. The definition of the eigenvalue is equivalent to , where denotes the determinant. The function is usually required to be a holomorphic function of (in some domain ). In general, could be a linear map, but most commonly it is a finite-dimensional, usually square, matrix. Definition: The problem is said to be regular if there exists a such that . Otherwise it is said to be singular. Definition: An eigenvalue is said to have algebraic multiplicity if is the smallest integer such that the th derivative of with respect to , in is nonzero. In formulas that but for . Definition: The geometric multiplicity of an eigenvalue is the dimension of the nullspace of . Special cases The following examples are special cases of the nonlinear eigenproblem. The (ordinary) eigenvalue problem: The generalized eigenvalue problem: The quadratic eigenvalue problem: The polynomial eigenvalue problem: The rational eigenvalue problem: where are rational functions. The delay eigenvalue problem: where are given scalars, known as delays. Jordan chains Definition: Let be an eigenpair. A tuple of vectors is called a Jo
https://en.wikipedia.org/wiki/Spite%20plateau
The Spite plateau (or Spite lithium plateau) is a baseline in the abundance of lithium found in old stars orbiting the galactic halo. It was named after the astronomers François and Monique Spite, who published the discovery in 1982. Background The element lithium was first produced during the Big Bang that created the observable universe. The cosmic abundance of lithium is of interest because it provides several constraints to the various Big Bang models. Those models that fail to satisfy these constraints are therefore subject to rejection or correction by the scientific community. Lithium is readily consumed by fusion with protons at temperatures above , such as is found in the cores of stars. Thus, if the convection zone of a main sequence star cicrulates a star's lithium through the core region (which is believed common in low-mass types K and M), the abundance of lithium in the star should be greatly reduced. Likewise, lithium can be produced in interstellar matter by spallation collisions with cosmic rays, or by the evolution of stars of moderate mass. Lithium estimates To obtain a good estimate of the primordial abundance of lithium, astronomers François and Monique Spite measured the abundance of lithium in old, population II stars (or old halo stars). Such stars were formed early in the universe out of material that had not been significantly modified by other processes. Their results showed that the curve on a graph of the abundance of lithium versus effective surface temperature formed a plateau among old halo stars for effective temperatures below about:   or roughly 5,600 K. This suggested that the plateau represented the primordial abundance level of lithium in the Milky Way, and thus they were able to estimate that the abundance of lithium at the beginning of the galaxy was: where is the number density of lithium atoms and / or ions, and is the number density of hydrogen atoms and / or ions. The current estimates for the primordial abu
https://en.wikipedia.org/wiki/Mobile%20signature%20roaming
In mobile telecommunications technology, the concept of mobile signature roaming means an access point (AP) should be able to get a mobile signature from any end-user, even if the AP and the end-user have not contracted a commercial relationship with the same MSSP. Otherwise, an AP would have to build commercial terms with as many MSSPs as possible, and this might be a cost burden. This means that a mobile signature transaction issued by an application provider should be able to reach the appropriate MSSP, and this should be transparent for the AP. Mobile signature roaming itself requires commercial agreements between the entities that facilitate it. In this respect, we assume that various entities (including MSSPs) will join in order to define common commercial terms and rules corresponding to a mobile signature roaming Service. This is the concept of a mobile signature roaming service. Entities involved Acquiring Entity (AE): an entity performing this role is one of the entry points of the mesh, and handles commercial agreements with APs. The entry point in the mesh may be for instance a MSSP, or an aggregator of Application Providers in the context of a particular communities of interests (e.g. payment associations, banks, MNOs etc.). That's the reason why we define this more abstract role. An Acquiring Entity implements the Web Service Interface specified in TS 102 204 [8]; Home MSSP (HMSSP): this is the MSSP that is able to deal with the current end-user and the current transaction; Routing Entity (RE): any entity that facilitates the communication between the AE and the home MSSP; Attribute Provider: this role is described by Liberty Alliance [3]. One or several mesh members may undertake this role and store relevant attributes in order to facilitate the discovery of the Home MSSP by other Mesh members; Identity Issuer: an entity that is able to make a link between a Mobile Signature and an end user's identity. Within a PKI system, this is typically the ce
https://en.wikipedia.org/wiki/Iterated%20monodromy%20group
In geometric group theory and dynamical systems the iterated monodromy group of a covering map is a group describing the monodromy action of the fundamental group on all iterations of the covering. A single covering map between spaces is therefore used to create a tower of coverings, by placing the covering over itself repeatedly. In terms of the Galois theory of covering spaces, this construction on spaces is expected to correspond to a construction on groups. The iterated monodromy group provides this construction, and it is applied to encode the combinatorics and symbolic dynamics of the covering, and provide examples of self-similar groups. Definition The iterated monodromy group of f is the following quotient group: where : is a covering of a path-connected and locally path-connected topological space X by its subset , is the fundamental group of X and is the monodromy action for f. is the monodromy action of the iteration of f, . Action The iterated monodromy group acts by automorphism on the rooted tree of preimages where a vertex is connected by an edge with . Examples Iterated monodromy groups of rational functions Let : f be a complex rational function be the union of forward orbits of its critical points (the post-critical set). If is finite (or has a finite set of accumulation points), then the iterated monodromy group of f is the iterated monodromy group of the covering , where is the Riemann sphere. Iterated monodromy groups of rational functions usually have exotic properties from the point of view of classical group theory. Most of them are infinitely presented, many have intermediate growth. IMG of polynomials The Basilica group is the iterated monodromy group of the polynomial See also Growth rate (group theory) Amenable group Complex dynamics Julia set
https://en.wikipedia.org/wiki/Pacific%20electric%20ray
Tetronarce californica also known as the Pacific electric ray is a species of electric ray in the family Torpedinidae, endemic to the coastal waters of the northeastern Pacific Ocean from Baja California to British Columbia. It generally inhabits sandy flats, rocky reefs, and kelp forests from the surface to a depth of , but has also been known to make forays into the open ocean. Measuring up to long, this species has smooth-rimmed spiracles (paired respiratory openings behind the eyes) and a dark gray, slate, or brown dorsal coloration, sometimes with dark spots. Its body form is typical of the genus, with a rounded pectoral fin disc wider than long and a thick tail bearing two dorsal fins of unequal size and a well-developed caudal fin. Solitary and nocturnal, the Pacific electric ray can generate up to 45 volts of electricity for the purposes of subduing prey or self-defense. It feeds mainly on bony fishes, ambushing them from the substrate during the day and actively hunting for them at night. Reproduction is aplacental viviparous, meaning that the embryos are initially nourished by yolk, later supplemented by histotroph ("uterine milk") produced by the mother. Females bear litters of 17–20 pups, probably once every other year. Care should be exercised around the Pacific electric ray, as it has been known to act aggressively if provoked and its electric shock can potentially incapacitate a diver. It and other electric rays are used as model organisms for biomedical research. The International Union for Conservation of Nature (IUCN) has listed this species under Least Concern, as it is not fished in any significant numbers. Taxonomy The Pacific electric ray was described by American ichthyologist William Orville Ayres, the first Curator of Ichthyology at the California Academy of Sciences, who named it after the U.S. state where it was first discovered by science. Ayers published his account in 1855, in the inaugural volume of the academy's Proceedings; no typ
https://en.wikipedia.org/wiki/Fragment-based%20lead%20discovery
Fragment-based lead discovery (FBLD) also known as fragment-based drug discovery (FBDD) is a method used for finding lead compounds as part of the drug discovery process. Fragments are small organic molecules which are small in size and low in molecular weight. It is based on identifying small chemical fragments, which may bind only weakly to the biological target, and then growing them or combining them to produce a lead with a higher affinity. FBLD can be compared with high-throughput screening (HTS). In HTS, libraries with up to millions of compounds, with molecular weights of around 500 Da, are screened, and nanomolar binding affinities are sought. In contrast, in the early phase of FBLD, libraries with a few thousand compounds with molecular weights of around 200 Da may be screened, and millimolar affinities can be considered useful. FBLD is a technique being used in research for discovering novel potent inhibitors. This methodology could help to design multitarget drugs for multiple diseases. The multitarget inhibitor approach is based on designing an inhibitor for the multiple targets. This type of drug design opens up new polypharmacological avenues for discovering innovative and effective therapies. Neurodegenerative diseases like Alzheimer’s (AD) and Parkinson’s, among others, also show rather complex etiopathologies. Multitarget inhibitors are more appropriate for addressing the complexity of AD and may provide new drugs for controlling the multifactorial nature of AD, stopping its progression. Library design In analogy to the rule of five, it has been proposed that ideal fragments should follow the 'rule of three' (molecular weight < 300, ClogP < 3, the number of hydrogen bond donors and acceptors each should be < 3 and the number of rotatable bonds should be < 3). Since the fragments have relatively low affinity for their targets, they must have high water solubility so that they can be screened at higher concentrations. Library screening and quant
https://en.wikipedia.org/wiki/Aerospace
Aerospace is a term used to collectively refer to the atmosphere and outer space. Aerospace activity is very diverse, with a multitude of commercial, industrial, and military applications. Aerospace engineering consists of aeronautics and astronautics. Aerospace organizations research, design, manufacture, operate, or maintain both aircraft and spacecraft. The beginning of space and the ending of the air is proposed as 100 km (62 mi) above the ground according to the physical explanation that the air pressure is too low for a lifting body to generate meaningful lift force without exceeding orbital velocity. Overview In most industrial countries, the aerospace industry is a cooperation of the public and private sectors. For example, several states have a civilian space program funded by the government, such as National Aeronautics and Space Administration in the United States, European Space Agency in Europe, the Canadian Space Agency in Canada, Indian Space Research Organisation in India, Japan Aerospace Exploration Agency in Japan, Roscosmos State Corporation for Space Activities in Russia, China National Space Administration in China, SUPARCO in Pakistan, Iranian Space Agency in Iran, and Korea Aerospace Research Institute in South Korea. Along with these public space programs, many companies produce technical tools and components such as spacecraft and satellites. Some known companies involved in space programs include Boeing, Cobham, Airbus, SpaceX, Lockheed Martin, United Technologies, MDA and Northrop Grumman. These companies are also involved in other areas of aerospace, such as the construction of aircraft. History Modern aerospace began with Engineer George Cayley in 1799. Cayley proposed an aircraft with a "fixed wing and a horizontal and vertical tail," defining characteristics of the modern aeroplane. The 19th century saw the creation of the Aeronautical Society of Great Britain (1866), the American Rocketry Society, and the Institute of Aeronaut
https://en.wikipedia.org/wiki/Hyperphoton
A hyperphoton is a hypothetical particle with a very low mass and spin equal to one. The hypothesis of the existence of hyperphotons is an explanation for the violation of CP-invariance in the two-pion decay of a long-lived neutral kaon . According to this hypothesis, there is a long-range very weak field generated by hypercharged particles (for example, baryons), whose quantum carrier is a hyperphoton, which acts differently on and mesons whose hypercharges differ in signs. Criticism of the hypothesis This hypothesis contradicts a number of experimental data and theoretical principles of physics. Thus, it follows that the probability of two-photon decay of a long-lived neutral kaon is proportional to the square of the kaon energy in the laboratory reference frame, which does not agree with experimental data on its independence from the kaon energy. The experimental data also contradict such a consequence of this hypothesis as a very high probability of hyperphoton emission during the decay of a long-lived neutral kaon and when a charged kaon decays into a one charged pion. This hypothesis implicitly uses the action at a distance rejected by modern physics. In addition, it implies a violation of the equivalence principle. See also Fifth force
https://en.wikipedia.org/wiki/Centimorgan
In genetics, a centimorgan (abbreviated cM) or map unit (m.u.) is a unit for measuring genetic linkage. It is defined as the distance between chromosome positions (also termed loci or markers) for which the expected average number of intervening chromosomal crossovers in a single generation is 0.01. It is often used to infer distance along a chromosome. However, it is not a true physical distance. Relation to physical distance The number of base pairs to which it corresponds varies widely across the genome (different regions of a chromosome have different propensities towards crossover) and it also depends on whether the meiosis in which the crossing-over takes place is a part of oogenesis (formation of female gametes) or spermatogenesis (formation of male gametes). One centimorgan corresponds to about 1 million base pairs in humans on average. The relationship is only rough, as the physical chromosomal distance corresponding to one centimorgan varies from place to place in the genome, and also varies between males and females since recombination during gamete formation in females is significantly more frequent than in males. Kong et al. calculated that the female genome is 4460 cM long, while the male genome is only 2590 cM long. Plasmodium falciparum has an average recombination distance of ~15 kb per centimorgan: markers separated by 15 kb of DNA (15,000 nucleotides) have an expected rate of chromosomal crossovers of 0.01 per generation. Note that non-syntenic genes (genes residing on different chromosomes) are inherently unlinked, and cM distances are not applicable to them. Relation to the probability of recombination Because genetic recombination between two markers is detected only if there are an odd number of chromosomal crossovers between the two markers, the distance in centimorgans does not correspond exactly to the probability of genetic recombination. Assuming J. B. S. Haldane's map function, in which the number of chromosomal crossovers is dist
https://en.wikipedia.org/wiki/Acetophenone
Acetophenone is the organic compound with the formula C6H5C(O)CH3. It is the simplest aromatic ketone. This colorless, viscous liquid is a precursor to useful resins and fragrances. Production Acetophenone is formed as a byproduct of the cumene process, the industrial route for the synthesis of phenol and acetone. In the Hock rearrangement of isopropylbenzene hydroperoxide, migration of a methyl group rather than the phenyl group gives acetophenone and methanol as a result of an alternate rearrangement of the intermediate: C6H5C(CH3)2O2H -> C6H5C(O)CH3 + CH3OH The cumene process is conducted on such a large scale that even the small amount of acetophenone by-product can be recovered in commercially useful quantities. Acetophenone is also generated from ethylbenzene hydroperoxide. Ethylbenzene hydroperoxide is primarily converted to 1-phenylethanol (α-methylbenzyl alcohol) in the process with a small amount of by-product acetophenone. Acetophenone is recovered or hydrogenated to 1-phenylethanol which is then dehydrated to produce styrene. Uses Precursor to resins Commercially significant resins are produced from treatment of acetophenone with formaldehyde and a base. The resulting copolymers are conventionally described with the formula , resulting from aldol condensation. These substances are components of coatings and inks. Modified acetophenone-formaldehyde resins are produced by the hydrogenation of the aforementioned ketone-containing resins. The resulting polyol can be further crosslinked with diisocyanates. The modified resins are found in coatings, inks and adhesives. Niche uses Acetophenone is an ingredient in fragrances that resemble almond, cherry, honeysuckle, jasmine, and strawberry. It is used in chewing gum. It is also listed as an approved excipient by the U.S. FDA. Laboratory reagent In instructional laboratories, acetophenone is converted to styrene in a two-step process that illustrates the reduction of carbonyls using hydride and the deh
https://en.wikipedia.org/wiki/Ibogaine
Ibogaine is a naturally occurring psychoactive substance found in plants in the family Apocynaceae such as Tabernanthe iboga, Voacanga africana, and Tabernaemontana undulata. It is a psychedelic with dissociative properties. Preliminary research indicates that it may help counter drug addiction. However, its use has been associated with serious side effects and death. Between the years 1990 and 2008, a total of 19 fatalities temporally associated with the ingestion of ibogaine were reported, from which six subjects died of acute heart failure or cardiopulmonary arrest. The total number of subjects who have used it without major side effects during this period remains unknown. It is used as an alternative medicine treatment for drug addiction in some countries. Its prohibition in other countries has slowed scientific research. Ibogaine is also used to facilitate psychological introspection and spiritual exploration. Various derivatives of ibogaine designed to lack psychedelic properties (such as 18-MC) are under clinical trials which have shown them to be neither psychedelic nor psychoactive and to have acceptable safety profiles in humans. The psychoactivity of the root bark of the iboga tree (Tabernanthe iboga), from which ibogaine is extracted, was first discovered by the Pygmy tribes of Central Africa, who passed the knowledge to the Bwiti tribe of Gabon. French explorers in turn learned of it from the Bwiti tribe and brought ibogaine back to Europe in 1899–1900, where it was subsequently marketed in France as a stimulant under the trade name Lambarène. Ibogaine-containing preparations are used for medicinal and ritual purposes within the African spiritual traditions of the Bwiti, who claim to have learned it from the Pygmy peoples. Although ibogaine's anti-addictive properties were first widely promoted in 1962 by Howard Lotsof, its Western medical use predates that by at least a century. Additionally, the U.S. Central Intelligence Agency (CIA) studied the ef
https://en.wikipedia.org/wiki/Fibularis%20brevis
In human anatomy, the fibularis brevis (or peroneus brevis) is a muscle that lies underneath the fibularis longus within the lateral compartment of the leg. It acts to tilt the sole of the foot away from the midline of the body (eversion) and to extend the foot downward away from the body at the ankle (plantar flexion). Structure The fibularis brevis arises from the lower two-thirds of the lateral, or outward, surface of the fibula (inward in relation to the fibularis longus) and from the connective tissue between it and the muscles on the front and back of the leg. The muscle passes downward and ends in a tendon that runs behind the lateral malleolus of the ankle in a groove that it shares with the tendon of the fibularis longus; the groove is converted into a canal by the superior fibular retinaculum, and the tendons in it are contained in a common mucous sheath. The tendon then runs forward along the lateral side of the calcaneus, above the calcaneal tubercle and the tendon of the fibularis longus. It inserts into the tuberosity at the base of the fifth metatarsal on its lateral side. The fibularis brevis is supplied by the superficial fibular (peroneal) nerve. Function The fibularis brevis is the strongest abductor of the foot. Together with the fibularis longus and the tibialis posterior, it extends the foot downward away from the body at the ankle (plantar flexion). It opposes the tibialis anterior and the fibularis tertius, which pull the foot upward toward the body (dorsiflexion). The fibularis longus also tilts the sole of the foot away from the midline of the body (eversion). Together, the fibularis muscles help to steady the leg upon the foot, especially in standing on one leg. Clinical significance When the base of the fifth metatarsal is fractured, the fibularis brevis may pull on and displace the upper fragment (known as a Jones fracture). An inversion sprain of the foot may pull the tendon such that it avulses the tuberosity at the base of th
https://en.wikipedia.org/wiki/D-Link%20G604T%20network%20adaptor
The DSL-G604T is a first D-Link Wireless/ADSL router which firmware is based on open source the MontaVista Linux. The DSL-G604T was introduced in November 2004. This model has been discontinued. Specifications Hardware CPU: Texas Instrument AR7W MIPS 4KEc based SoC with built-in ADSL and Ethernet interfaces DRAM Memory: 16Mb Flash Memory: 2Mb SquashFS file system Wi-Fi: TI MiniPCI card Ethernet: 5-port Ethernet hub (1 internal, 4 external) Firmware The G604T runs MontaVista and busybox Linux which allows a degrejje of customisation with customised firmware. These and similar units from D-Link appear to have an issue that causes certain services to fail when using the factory provided firmware, namely the Debian package update service being interrupted due to a faulty DNS through DHCP issue at the kernel level. A v2.00B06.AU_20060728 patch was made available through their downloads section that provided some level of correction, but it was not a complete fix and the issue would resurface intermittently. When the issue was originally reported, D-Link seemed to have misunderstood that the same issue has been discovered by the Linux community at large to be common across a number of their router models and they failed to provide a complete fix across the board for all adsl router models. Russian version of the firmware (prefix .RU, e.g. V1.00B02T02.RU.20041014) has restrictions on configuring firewall rules – user can only change sender's address (computer address in the LAN segment) and the recipient's port. The web interface with Russian firmware also differs from the English interface. Default settings When running the D-link DSL-G604T router for the first time (or resetting), the device is configured with a default IP address (192.168.1.1), username (admin) and password (admin). Default username and password can also be printed on the router itself, in the manual, or on the box. Problems Security D-Link DSL-G604T has Cross-site scripting (XSS) vulne
https://en.wikipedia.org/wiki/Border%20barrier
A border barrier, border fence or border wall is a separation barrier that runs along or near an international border. Such barriers are typically constructed for border control purposes such as curbing illegal immigration, human trafficking, and smuggling. Some such barriers are constructed for defence or security reasons. In cases of a disputed or unclear border, erecting a barrier can serve as a de facto unilateral consolidation of a territorial claim that can supersede formal delimitation. A border barrier does not usually indicate the location of the actual border, and is usually constructed unilaterally by a country, without the agreement or cooperation of the other country. Examples of border walls include the ancient Great Wall of China, a series of walls separating China from nomadic empires to the north. The construction of border barriers increased in the early 2000s; half of all the border barriers built since World War II which ended in 1945, were built after 2000. List of current barriers Note: The table can be sorted alphabetically or chronologically using the icon. Border barriers in history Antiquity Antonine Wall (began in AD 142 by the Roman province in Britain) Anastasian Wall (built from AD 469, west of Istanbul, Turkey) Great Wall of China (parts were built as early as the 7th century BC by the Qi dynasty in China) Great Wall of Gorgan (built in 5th or 6th century AD) Hadrian's Wall (begun in AD 122) Madukkarai Wall (may have been built as early as the 1st century AD in India) Southern Great Wall, southern counterpart wall to the Great Wall, erected to protect and divide the Chinese from the "southern barbarians" called Miao (meaning barbaric and nomadic) Middle Ages Cheolli Jangseong The fortifications, castles and border walls between the Emirate of Granada and the Crown of Castile, later Spain between 1238 and 2 January 1492 although it continued as the internal border of the Crown of Castile, then Spain as Kingdom of Granada from
https://en.wikipedia.org/wiki/Elaeocarpus%20serratus
Elaeocarpus serratus is a tropical flowering plant in the family Elaeocarpaceae. It is a medium to large tree, with white flowers. It has a disjunctive distribution, with the species occurring in Sri Lanka and southern India, and in Assam, Bangladesh and other parts in the north of the Indian subcontinent. The fruit is commonly eaten, and people also use the plant for ornamental, religious and folk-medicinal purposes. There are historical records of traditional-medicine use of the plant. Paradoxurus jerdoni (Brown palm civet) consumes parts of the tree. Variety The species has an accepted variety, Elaeocarpus serratus var. weibelii. Description The taxa is a medium to large evergreen tree with a large spreading crown, reaching 15 to 60m in height. The flowers have pale-green petiole, 5 white to pale-olive-green calyxes calyx, sepal 4-6mm long, 5 white corollas, petals 4-5mm long, slightly-black anther, 18-30 stamen. The flowers expand to maximum size in late afternoon and hence are likely adapted to night pollinators, i.e. moths. Bears smooth ovoid green fruits the size of about 2.5 cm long. Recommended varieties are local cultivars (round and oval fruits). It has a brown seed inside the fruit. The seed has a hard outer shell. The seeds are slow for germination and can take up to 2 years. The wood is whitish yellow. Distribution The species has a disjunctive distribution, it is native to an area of southern and southwest India and Sri Lanka, and to an area from Assam, northeast India, to Bangladesh. Countries and regions in which it is indigenous to are: Sri Lanka; India (Tamil Nadu, Karnataka, Kerala, Assam, Arunachal Pradesh); Bangladesh. It has been introduced/naturalised to Réunion and Mauritius. It is widely available in the villages of West Bengal also. It is called 'Jalpai' and people eat it raw or make chutney, Jalpai ambal, or make Achar also. The weibelii variety is native to Karnataka and Kerala in southwest India. Habitat and ecology The tree is dro
https://en.wikipedia.org/wiki/Andrea%20Al%C3%B9
Andrea Alù (born September 27, 1978) is an Italian American scientist and engineer, currently Einstein Professor of Physics at The City University of New York Graduate Center. He is known for his contributions to the fields of optics, photonics, plasmonics, and acoustics, most notably in the context of metamaterials and metasurfaces. He has co-authored over 650 journal papers and 35 book chapters, and he holds 11 U.S. patents. Career biography Andrea Alù received his laurea (2001), MS (2003), and PhD (2007) in electronic engineering from Roma Tre University. After a postdoctoral fellowship with Professor Nader Engheta at the University of Pennsylvania, he joined the faculty in the department of electrical and computer engineering at the University of Texas at Austin, where he was the Temple Foundation Endowed Professor. In 2015 he was also the Royal Netherlands Academy of Arts and Sciences (KNAW) visiting professor at the AMOLF Institute in the Netherlands. In January 2018, he became the founding director of the Photonics Initiative at the Advanced Science Research Center (CUNY ASRC) and Einstein Professor of Physics at the CUNY Graduate Center. Alù is known for his breakthroughs in metamaterials, including his work on invisibility cloaking, or making objects transparent to incoming electromagnetic or acoustic waves. He realized the first freestanding three-dimensional invisibility cloak. His research group also developed the first acoustic circulator, a device that can route sound asymmetrically as a function of the propagation direction, and he has made important advances in ultrathin optical devices based on engineered materials for linear and nonlinear optics. Awards and honors Alù is a Fellow of the National Academy of Inventors, American Association for the Advancement of Science, Institute of Electrical and Electronics Engineers, SPIE, the American Physical Society, the Optical Society of America, and the Materials Research Society. He is a full member of
https://en.wikipedia.org/wiki/General%20disequilibrium
In macroeconomic theory, general disequilibrium is a situation in which some or all of the aggregated markets, such as the money market, the goods market, and the labor market, fail to clear because of price rigidities. In the 1960s and 1970s, economists such as Edmond Malinvaud, Robert Barro and Herschel Grossman, Axel Leijonhufvud, Robert Clower, and Jean-Pascal Benassy investigated how economic policy would impact an economy where prices did not adjust quickly to changes in supply and demand. The most notable case occurs when some external factor causes high levels of unemployment in an economy, leading to households consuming less and firms providing less employment, leading to a rationing of both goods and work hours. Studies of general disequilibrium have been considered the "height of the neoclassical synthesis" and an immediate precursor to the new Keynesian economics that followed the decline of the synthesis. Studies of general disequilibrium showed that the economy behaved differently depending on which markets (for example, the labor or the goods markets) were out of equilibrium. When both the goods and the labor market suffered from excess supply, the economy behaved according to Keynesian theory. See also Effective demand Disequilibrium (economics)
https://en.wikipedia.org/wiki/MakerBot
MakerBot Industries, LLC was an American desktop 3D printer manufacturer company headquartered in New York City. It was founded in January 2009 by Bre Pettis, Adam Mayer, and Zach "Hoeken" Smith to build on the early progress of the RepRap Project. It was acquired by Stratasys in June 2013. , MakerBot had sold over 100,000 desktop 3D printers worldwide. Between 2009 and 2019, the company released 7 generations of 3D printers, ending with the METHOD and METHOD X. It was at one point the leader of the desktop market with an important presence in the media, but its market share declined over the late 2010s. MakerBot also founded and operated Thingiverse, the largest online 3D printing community and file repository. In August 2022, the company completed a merger with its long-time competitor Ultimaker. The combined company is known as UltiMaker, but retains the MakerBot name for its Sketch line of education-focused 3D printers. History Smith was one of the founding members of the RepRap Research Foundation, a non-profit group created to help advance early research in the area of open-source 3D printers. Bre Pettis got inspired during an art residency in Vienna with Johannes Grenzfurthner/monochrom in 2007, when he wanted to create a robot that could print shot glasses for the event Roboexotica and did research about the RepRap project at the Vienna hackerspace Metalab. Shot glasses remained a theme throughout the history of MakerBot. The company started shipping kits in April 2009 and had sold approximately 3,500 units . Demand for the kits was so great in 2009 that the company solicited MakerBot owners to provide parts for future devices from their own MakerBots. Seed funding of $75,000 was provided by Jake Lodwick ($50,000) and Adrian Bowyer and his wife, Christine ($25,000). In August 2011, venture capital firm The Foundry Group invested $10 million in the company and joined its board. In April 2012, Zachary Smith was pushed out, involving disagreement on adhe
https://en.wikipedia.org/wiki/Reflective%20subcategory
In mathematics, a full subcategory A of a category B is said to be reflective in B when the inclusion functor from A to B has a left adjoint. This adjoint is sometimes called a reflector, or localization. Dually, A is said to be coreflective in B when the inclusion functor has a right adjoint. Informally, a reflector acts as a kind of completion operation. It adds in any "missing" pieces of the structure in such a way that reflecting it again has no further effect. Definition A full subcategory A of a category B is said to be reflective in B if for each B-object B there exists an A-object and a B-morphism such that for each B-morphism to an A-object there exists a unique A-morphism with . The pair is called the A-reflection of B. The morphism is called the A-reflection arrow. (Although often, for the sake of brevity, we speak about only as being the A-reflection of B). This is equivalent to saying that the embedding functor is a right adjoint. The left adjoint functor is called the reflector. The map is the unit of this adjunction. The reflector assigns to the A-object and for a B-morphism is determined by the commuting diagram If all A-reflection arrows are (extremal) epimorphisms, then the subcategory A is said to be (extremal) epireflective. Similarly, it is bireflective if all reflection arrows are bimorphisms. All these notions are special case of the common generalization—-reflective subcategory, where is a class of morphisms. The -reflective hull of a class A of objects is defined as the smallest -reflective subcategory containing A. Thus we can speak about reflective hull, epireflective hull, extremal epireflective hull, etc. An anti-reflective subcategory is a full subcategory A such that the only objects of B that have an A-reflection arrow are those that are already in A. Dual notions to the above-mentioned notions are coreflection, coreflection arrow, (mono)coreflective subcategory, coreflective hull, anti-coreflective subcatego
https://en.wikipedia.org/wiki/Desmocollin
Desmocollins are a subfamily of desmosomal cadherins, the transmembrane constituents of desmosomes. They are co-expressed with desmogleins to link adjacent cells by extracellular adhesion. There are seven desmosomal cadherins in humans, three desmocollins and four desmogleins. Desmosomal cadherins allow desmosomes to contribute to the integrity of tissue structure in multicellular living organisms. Structure Three isoforms of desmocollin proteins have been identified. Desmocollin-1, coded by the DSC1 gene Desmocollin-2, coded by the DSC2 gene Desmocollin-3, coded by the DSC3 gene Each desmocollin gene encodes a pair of proteins: a longer 'a' form and a shorter 'b' form. The 'a' and 'b' forms differ in the length of their C-terminus tails. The protein pair is generated by alternative splicing. Desmocollin has four cadherin-like extracellular domains, an extracellular anchor domain, and an intracellular anchor domain. Additionally, the 'a' form has an intracellular cadherin-like sequence domain, which provides binding sites for other desmosomal proteins such as plakoglobin. Expression The desmosomal cadherins are expressed in tissue-specific patterns. Desmocollin-2 and desmoglein-2 are found in all desmosome-containing tissues such as colon and cardiac muscle tissues, while other desmosomal cadherins are restricted to stratified epithelial tissues. All seven desmosomal cadherins are expressed in epidermis, but in a differentiation-specific manner. The '2' and '3' isoforms of desmocollin and desmoglein are expressed in the lower epidermal layers, and the '1' proteins and desmoglein-4 are expressed in the upper epidermal layers. Different isoforms are located in the same individual cells, and single desmosomes contain more than one isoform of both desmocollin and desmoglein. It is unclear why there are multiple desmosomal cadherin isoforms. It is thought that they may have different adhesive properties that are required at different levels in stratified
https://en.wikipedia.org/wiki/Horticultural%20building%20system
Horticultural Building Systems are defined as the instance where vegetation and an architectural/architectonic system exist in a mutually defined and intentionally designed relationship that supports plant growth and an architectonic concept. The most common form of these systems in contemporary vernacular is green wall, vertical garden, green roof, roof garden, building-integrated agriculture (BIA), yet the history of these systems may be traced back through greenhouse technology, hydroponicums, horticultural growth chambers, and beyond. These horticultural building systems evolved form a reciprocal relationship between plant cultural requirements and architectural technology. Notes
https://en.wikipedia.org/wiki/BNR/Asp-box%20repeat
BNR/Asp-box repeat is a repetitive sequence of amino acids contained in some proteins. Many of these proteins contain multiple BNR (bacterial neuraminidase repeat) repeats or Asp-boxes. The repeats are short, however the repeats are never found closer than 40 residues together suggesting that the repeat is structurally longer. The Asp-box itself adopts a well-defined beta-hairpin fold. These repeats are found in a variety of non-homologous proteins, including bacterial ribonucleases, sulphite oxidases, reelin, netrins, sialidases, neuraminidases, some lipoprotein receptors, and a variety of glycosyl hydrolases. Examples Human genes encoding proteins containing this domain include: NEU1 NEU2 NEU3 RELN SORCS1 SORCS2 SORCS3 SORL1 SORT1
https://en.wikipedia.org/wiki/Axona
Axona was previously marketed as a medical food for the clinical dietary management of the impairment of metabolic processes associated with mild to moderate Alzheimer's disease. It is a proprietary formulation of fractionated palm kernel oil (caprylic triglyceride), a medium-chain triglyceride. Cericin, the company that makes Axona, states that during digestion, caprylic triglyceride is broken down into ketones, which provide an alternative energy source for the brain. Its use is based on the idea that the brain's ability to use its normal energy source, glucose, is impaired in Alzheimer's disease. Axona was first sold in March 2009. In 2013, US Food and Drug Administration (FDA) determined Axona was misbranded because the product was labeled and marketed as a medical food but does not meet the statutory definition of a medical food. Axona has not been approved by the FDA as a drug to treat Alzheimer's and the efficacy of managing the health of Alzheimer's patients by use of this medical food has been questioned by experts in the field, including the Alzheimer's Association. Description Axona is a medical food marketed to assist with dietary management of mild to moderate Alzheimer's disease. Axona is formulated for oral administration and is sold by prescription. The largest ingredient in Axona is caprylic triglyceride, also known as fractionated coconut oil, a medium-chain triglyceride. caprylic triglyceride is Generally Recognized As Safe (GRAS) by the FDA. A medical food in the US is an official FDA product classification, and was originally defined by Congress as part of the Orphan Drug Amendments of 1988 as "a food which is formulated to be consumed or administered through a feeding tube under the supervision of a physician and which is intended for the specific dietary management of a disease or condition for which distinctive nutritional requirements, based on recognized scientific principles, are established by medical evaluation." Medical foods
https://en.wikipedia.org/wiki/Interrupt%20descriptor%20table
The interrupt descriptor table (IDT) is a data structure used by the x86 architecture to implement an interrupt vector table. The IDT is used by the processor to determine the correct response to interrupts and exceptions. The details in the description below apply specifically to the x86 architecture. Other architectures have similar data structures, but may behave differently. Use of the IDT is triggered by three types of events: hardware interrupts, software interrupts, and processor exceptions, which together are referred to as interrupts. The IDT consists of 256 interrupt vectors–the first 32 (0–31 or 0x00–0x1F) of which are used for processor exceptions. Real mode In real mode, the interrupt table is called IVT (interrupt vector table). Up to the 80286, the IVT always resided at the same location in memory, ranging from 0x0000 to 0x03ff, and consisted of 256 far pointers. Hardware interrupts may be mapped to any of the vectors by way of a programmable interrupt controller. On the 80286 and later, the size and locations of the IVT can be changed in the same way as it is done with the IDT (Interrupt descriptor table) in protected mode (i.e., via the LIDT (Load Interrupt Descriptor Table Register) instruction) though it does not change the format of it. BIOS interrupts The BIOS provides simple real-mode access to a subset of hardware facilities by registering interrupt handlers. They are invoked as software interrupts with the INT assembly instruction and the parameters are passed via registers. These interrupts are used for various tasks like detecting the system memory layout, configuring VGA output and modes, and accessing the disk early in the boot process. Protected and long mode The IDT is an array of descriptors stored consecutively in memory and indexed by the vector number. It is not necessary to use all of the possible entries: it is sufficient to populate the table up to the highest interrupt vector used, and set the IDT length portion of the
https://en.wikipedia.org/wiki/WhatsApp
WhatsApp (officially WhatsApp Messenger) is a freeware, cross-platform, centralized instant messaging (IM) and voice-over-IP (VoIP) service owned by United States tech conglomerate Meta Platforms. It allows users to send text, voice messages and video messages, make voice and video calls, and share images, documents, user locations, and other content. WhatsApp's client application runs on mobile devices, and can be accessed from computers. The service requires a cellular mobile telephone number to sign up. In January 2018, WhatsApp released a standalone business app called WhatsApp Business which can communicate with the standard WhatsApp client. The service was created by WhatsApp Inc. of Mountain View, California, which was acquired by Facebook in February 2014 for approximately US$19.3 billion. It became the world's most popular messaging application by 2015, and had more than 2billion users worldwide by February 2020. By 2016, it had become the primary means of Internet communication in regions including Latin America, the Indian subcontinent, and large parts of Europe and Africa. History 2009–2014 WhatsApp was founded in February 2009 by Brian Acton and Jan Koum, former employees of Yahoo!. A month earlier, after Koum purchased an iPhone, he and Acton decided to create an app for the App Store. The idea started off as an app that would display statuses in a phone's Contacts menu, showing if a person was at work or on a call. Their discussions often took place at the home of Koum's Russian friend Alex Fishman in West San Jose. They realized that to take the idea further, they would need an iPhone developer. Fishman visited RentACoder.com, found Russian developer Igor Solomennikov, and introduced him to Koum. Koum named the app WhatsApp to sound like "what's up". On February 24, 2009, he incorporated WhatsApp Inc. in California. However, when early versions of WhatsApp kept crashing, Koum considered giving up and looking for a new job. Acton encouraged him
https://en.wikipedia.org/wiki/Geometric%20phase
In classical and quantum mechanics, geometric phase is a phase difference acquired over the course of a cycle, when a system is subjected to cyclic adiabatic processes, which results from the geometrical properties of the parameter space of the Hamiltonian. The phenomenon was independently discovered by S. Pancharatnam (1956), in classical optics and by H. C. Longuet-Higgins (1958) in molecular physics; it was generalized by Michael Berry in (1984). It is also known as the Pancharatnam–Berry phase, Pancharatnam phase, or Berry phase. It can be seen in the conical intersection of potential energy surfaces and in the Aharonov–Bohm effect. Geometric phase around the conical intersection involving the ground electronic state of the C6H3F3+ molecular ion is discussed on pages 385–386 of the textbook by Bunker and Jensen. In the case of the Aharonov–Bohm effect, the adiabatic parameter is the magnetic field enclosed by two interference paths, and it is cyclic in the sense that these two paths form a loop. In the case of the conical intersection, the adiabatic parameters are the molecular coordinates. Apart from quantum mechanics, it arises in a variety of other wave systems, such as classical optics. As a rule of thumb, it can occur whenever there are at least two parameters characterizing a wave in the vicinity of some sort of singularity or hole in the topology; two parameters are required because either the set of nonsingular states will not be simply connected, or there will be nonzero holonomy. Waves are characterized by amplitude and phase, and may vary as a function of those parameters. The geometric phase occurs when both parameters are changed simultaneously but very slowly (adiabatically), and eventually brought back to the initial configuration. In quantum mechanics, this could involve rotations but also translations of particles, which are apparently undone at the end. One might expect that the waves in the system return to the initial state, as characteriz
https://en.wikipedia.org/wiki/Ambient%20ionization
Ambient ionization is a form of ionization in which ions are formed in an ion source outside the mass spectrometer without sample preparation or separation. Ions can be formed by extraction into charged electrospray droplets, thermally desorbed and ionized by chemical ionization, or laser desorbed or ablated and post-ionized before they enter the mass spectrometer. Solid-liquid extraction Solid-liquid extraction based ambient ionization is based on the use of a charged spray, for example electrospray to create a liquid film on the sample surface. Molecules on the surface are extracted into the solvent. The action of the primary droplets hitting the surface produces secondary droplets that are the source of ions for the mass spectrometer. Desorption electrospray ionization (DESI) is one of the original ambient ionization sources and uses an electrospray source to create charged droplets that are directed at a solid sample. The charged droplets pick up the sample through interaction with the surface and then form highly charged ions that can be sampled into a mass spectrometer. Desorption atmospheric pressure photoionization (DAPPI) is a solid-liquid extraction ambient ionization method that enables the direct analysis of samples deposited on surfaces by means of a jet of hot solvent vapour and ultraviolet light. The hot jet thermally desorbs the sample from a surface and the vaporized sample is ionized by a vacuum ultraviolet light and consequently sampled into a mass spectrometer. Plasma-based techniques Plasma-based ambient ionization is based on an electrical discharge in a flowing gas that produces metastable atoms and molecules and reactive ions. Heat is often used to assist in the desorption of volatile species from the sample. Ions are formed by chemical ionization in the gas phase. One proposed mechanism involves Penning ionization of ambient water clusters in a helium discharge: He^\ast{} + [(H2O)_\mathit{n}H] ->{} [(H2O)_{\mathit n-1}H]+{} + OH^.{} +
https://en.wikipedia.org/wiki/Scale%20analysis%20%28mathematics%29
Scale analysis (or order-of-magnitude analysis) is a powerful tool used in the mathematical sciences for the simplification of equations with many terms. First the approximate magnitude of individual terms in the equations is determined. Then some negligibly small terms may be ignored. Example: vertical momentum in synoptic-scale meteorology Consider for example the momentum equation of the Navier–Stokes equations in the vertical coordinate direction of the atmosphere where R is Earth radius, Ω is frequency of rotation of the Earth, g is gravitational acceleration, φ is latitude, ρ is density of air and ν is kinematic viscosity of air (we can neglect turbulence in free atmosphere). In synoptic scale we can expect horizontal velocities about U = 101 m.s−1 and vertical about W = 10−2 m.s−1. Horizontal scale is L = 106 m and vertical scale is H = 104 m. Typical time scale is T = L/U = 105 s. Pressure differences in troposphere are ΔP = 104 Pa and density of air ρ = 100 kg⋅m−3. Other physical properties are approximately: R = 6.378 × 106 m; Ω = 7.292 × 10−5 rad⋅s−1; ν = 1.46 × 10−5 m2⋅s−1; g = 9.81 m⋅s−2. Estimates of the different terms in equation () can be made using their scales: Now we can introduce these scales and their values into equation (): We can see that all terms — except the first and second on the right-hand side — are negligibly small. Thus we can simplify the vertical momentum equation to the hydrostatic equilibrium equation: Rules of scale analysis Scale analysis is very useful and widely used tool for solving problems in the area of heat transfer and fluid mechanics, pressure-driven wall jet, separating flows behind backward-facing steps, jet diffusion flames, study of linear and non-linear dynamics. Scale analysis is an effective shortcut for obtaining approximate solutions to equations often too complicated to solve exactly. The object of scale analysis is to use the basic principles of convective heat transfer to produce order-of-mag
https://en.wikipedia.org/wiki/TRESOR
TRESOR (recursive acronym for "TRESOR Runs Encryption Securely Outside RAM", and also the German word for a safe) is a Linux kernel patch which provides encryption using only the CPU to defend against cold boot attacks on computer systems by performing encryption inside CPU registers rather than random-access memory (RAM). It is one of two proposed solutions for general-purpose computers. The other, called "frozen cache" uses the CPU cache instead. It was developed from its predecessor AESSE, presented at EuroSec 2010 and presented at USENIX Security 2011. The authors state that it allows RAM to be treated as untrusted from a security viewpoint without hindering the system. Motivation In computer security, a common problem for data security is how an intruder can access encrypted data on a computer. Modern encryption algorithms, correctly implemented and with strong passwords, are often unbreakable with current technology, so emphasis has moved to techniques that bypass this requirement, by exploiting aspects of data security where the encryption can be "broken" with much less effort, or else bypassed completely. A cold boot attack is one such means by which an intruder can defeat encryption despite system security, if they can gain physical access to the running machine. It is premised on the physical properties of the circuitry within memory devices that are commonly used in computers. The concept is that when a computer system has encrypted data open, the encryption keys themselves used to read or write that data are usually stored on a temporary basis in physical memory, in a plain readable form. (Holding these keys in "plain" form during use is hard or impossible to avoid with usual systems since the system itself must be able to access the data when instructed by the authorized user). Usually this is no benefit to an unauthorised intruder, because they cannot access or use those keys—for example due to security built into the software or system. However, i
https://en.wikipedia.org/wiki/Topological%20rigidity
In the mathematical field of topology, a manifold M is called topologically rigid if every manifold homotopically equivalent to M is also homeomorphic to M. Motivation A central problem in topology is determining when two spaces are the same i.e. homeomorphic or diffeomorphic. Constructing a morphism explicitly is almost always impractical. If we put further condition on one or both spaces (manifolds) we can exploit this additional structure in order to show that the desired morphism must exist. Rigidity theorem is about when a fairly weak equivalence between two manifolds (usually a homotopy equivalence) implies the existence of stronger equivalence homeomorphism, diffeomorphism or isometry. Definition. A closed topological manifold M is called topological rigid if any homotopy equivalence f : N → M with some manifold N as source and M as target is homotopic to a homeomorphism. Examples Example 1. If closed 2-manifolds M and N are homotopically equivalent then they are homeomorphic. Moreover, any homotopy equivalence of closed surfaces deforms to a homeomorphism. Example 2. If a closed manifold Mn (n ≠ 3) is homotopy-equivalent to Sn then Mn is homeomorphic to Sn. Rigidity theorem in geometry Definition. A diffeomorphism of flat-Riemannian manifolds is said to be affine iff it carries geodesics to geodesic. Theorem (Bieberbach) If f : M → N is a homotopy equivalence between flat closed connected Riemannian manifolds then f is homotopic to an affine homeomorphism. Mostow's rigidity theorem Theorem: Let M and N be compact, locally symmetric Riemannian manifolds with everywhere non-positive curvature having no closed one or two dimensional geodesic subspace which are direct factor locally. If f : M → N is a homotopy equivalence then f is homotopic to an isometry. Theorem (Mostow's theorem for hyperbolic n-manifolds, n ≥ 3): If M and N are complete hyperbolic n-manifolds, n ≥ 3 with finite volume and f : M → N is a homotopy equivalence then f is
https://en.wikipedia.org/wiki/Script%20lichen
A script lichen, or graphid lichen, is a member of a group of lichens which have spore producing structures that look like writing on the lichen body. The structures are elongated and narrow apothecia called lirellae, which look like short scribbles on the thallus. "Graphid" is derived from Greek for "writing". An example is Graphis mucronata.
https://en.wikipedia.org/wiki/Locale%20%28computer%20software%29
In computing, a locale is a set of parameters that defines the user's language, region and any special variant preferences that the user wants to see in their user interface. Usually a locale identifier consists of at least a language code and a country/region code. Locale is an important aspect of i18n. General locale settings These settings usually include the following display (output) format settings: Number format setting (LC_NUMERIC, C/C++) Character classification, case conversion settings (LC_CTYPE, C/C++) Date-time format setting (LC_TIME, C/C++) String collation setting (LC_COLLATE, C/C++) Currency format setting (LC_MONETARY, C/C++) Paper size setting (LC_PAPER, ISO 30112) Color setting The locale settings are about formatting output given a locale. So, the time zone information and daylight saving time are not usually part of the locale settings. Less usual is the input format setting, which is mostly defined on a per application basis. Programming and markup language support In these environments, C C++ Eiffel Java .NET Framework REBOL Ruby Perl PHP Python XML JSP JavaScript and other (nowadays) Unicode-based environments, they are defined in a format similar to BCP 47. They are usually defined with just ISO 639 (language) and ISO 3166-1 alpha-2 (2-letter country) codes. International standards In standard C and C++, locale is defined in "categories" of (text collation), (character class), (currency format), (number format), and (time format). The special category can be used to set all locale settings. There is no standard locale names associated with C and C++ standards besides a "minimal locale" name "C", although the POSIX format is a commonly-used baseline. POSIX platforms On POSIX platforms such as Unix, Linux and others, locale identifiers are defined in a way similar to the BCP 47 definition of language tags, but the locale variant modifier is defined differently, and the character set is optionally incl
https://en.wikipedia.org/wiki/Caml
Caml (originally an acronym for Categorical Abstract Machine Language) is a multi-paradigm, general-purpose programming language which is a dialect of the ML programming language family. Caml was developed in France at INRIA and ENS. Caml is statically typed, strictly evaluated, and uses automatic memory management. OCaml, the main descendant of Caml, adds many features to the language, including an object layer. Examples In the following, represents the Caml prompt. Hello World print_endline "Hello, world!";; Factorial function (recursion and purely functional programming) Many mathematical functions, such as factorial, are most naturally represented in a purely functional form. The following recursive, purely functional Caml function implements factorial: let rec fact n = if n=0 then 1 else n * fact(n - 1);; The function can be written equivalently using pattern matching: let rec fact = function | 0 -> 1 | n -> n * fact(n - 1);; This latter form is the mathematical definition of factorial as a recurrence relation. Note that the compiler inferred the type of this function to be , meaning that this function maps ints onto ints. For example, 12! is: # fact 12;; - : int = 479001600 Numerical derivative (higher-order functions) Since Caml is a functional programming language, it is easy to create and pass around functions in Caml programs. This capability has an enormous number of applications. Calculating the numerical derivative of a function is one such application. The following Caml function computes the numerical derivative of a given function at a given point : let d delta f x = (f (x +. delta) -. f (x -. delta)) /. (2. *. delta);; This function requires a small value . A good choice for delta is the cube root of the machine epsilon. The type of the function indicates that it maps a onto another function with the type . This allows us to partially apply arguments. This functional style is known as currying. In this case, it is useful to part
https://en.wikipedia.org/wiki/Paramodular%20group
In mathematics, a paramodular group is a special sort of arithmetic subgroup of the symplectic group. It is a generalization of the Siegel modular group, and has the same relation to polarized abelian varieties that the Siegel modular group has to principally polarized abelian varieties. It is the group of automorphisms of Z2n preserving a non-degenerate skew symmetric form. The name "paramodular group" is often used to mean one of several standard matrix representations of this group. The corresponding group over the reals is called the parasymplectic group and is conjugate to a (real) symplectic group. A paramodular form is a Siegel modular form for a paramodular group. Paramodular groups were introduced by and named by . Explicit matrices for the paramodular group There are two conventions for writing the paramodular group as matrices. In the first (older) convention the matrix entries are integers but the group is not a subgroup of the symplectic group, while in the second convention the paramodular group is a subgroup of the usual symplectic group (over the rationals) but its coordinates are not always integers. These two forms of the symplectic group are conjugate in the general linear group. Any nonsingular skew symmetric form on Z2n is equivalent to one given by a matrix where F is an n by n diagonal matrix whose diagonal elements Fii are positive integers with each dividing the next. So any paramodular group is conjugate to one preserving the form above, in other words it consists of the matrices of GL2n(Z) such that The conjugate of the paramodular group by the matrix (where I is the identity matrix) lies in the symplectic group Sp2n(Q), since though its entries are not in general integers. This conjugate is also often called the paramodular group. The paramodular group of degree 2 Paramodular group of degree n=2 are subgroups of GL4(Q) so can be represented as 4 by 4 matrices. There are at least 3 ways of doing this used in the literature. Thi
https://en.wikipedia.org/wiki/Virtual%20machine%20escape
In computer security, virtual machine escape is the process of a program breaking out of the virtual machine on which it is running and interacting with the host operating system. A virtual machine is a "completely isolated guest operating system installation within a normal host operating system". In 2008, a vulnerability () in VMware discovered by Core Security Technologies made VM escape possible on VMware Workstation 6.0.2 and 5.5.4. A fully working exploit labeled Cloudburst was developed by Immunity Inc. for Immunity CANVAS (commercial penetration testing tool). Cloudburst was presented in Black Hat USA 2009. Previous known vulnerabilities Xen pygrub: Command injection in grub.conf file. Directory traversal vulnerability in shared folders feature for VMware Directory traversal vulnerability in shared folders feature for VMware Xen Para Virtualized Frame Buffer backend buffer overflow. Cloudburst: VM display function in VMware QEMU-KVM: PIIX4 emulation does not check if a device is hotpluggable before unplugging The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier Oracle VirtualBox 3D acceleration multiple memory corruption VENOM: buffer-overflow in QEMU's virtual floppy disk controller QEMU-KVM: Heap overflow in pcnet_receive function. Xen Hypervisor: Uncontrolled creation of large page mappings by PV guests Xen Hypervisor: The PV pagetable code has fast-paths for making updates to pre-existing pagetable entries, to skip expensive re-validation in safe cases (e.g. clearing only Access/Dirty bits). The bits considered safe were too broad, and not actually safe. Xen Hypervisor: Disallow L3 recursive pagetable for 32-bit PV guests CVE-2017-5715, 2017-5753, 2017-5754: The Spectre and Meltdown hardware vulnerabilities, a cache side-channel attack on CPU level (Rogue Data Cache Load (RDCL)), allow a rogue process to read all memory of a computer, even outside the memory assigned to a virtual machine Hyper-V Remote Code Execution Vul
https://en.wikipedia.org/wiki/Type%20enforcement
The concept of type enforcement (TE), in the field of information technology, is an access control mechanism for regulating access in computer systems. Implementing TE gives priority to mandatory access control (MAC) over discretionary access control (DAC). Access clearance is first given to a subject (e.g. process) accessing objects (e.g. files, records, messages) based on rules defined in an attached security context. A security context in a domain is defined by a domain security policy. In the Linux security module (LSM) in SELinux, the security context is an extended attribute. Type enforcement implementation is a prerequisite for MAC, and a first step before multilevel security (MLS) or its replacement multi categories security (MCS). It is a complement of role-based access control (RBAC). Control Type enforcement implies fine-grained control over the operating system, not only to have control over process execution, but also over domain transition or authorization scheme. This is why it is best implemented as a kernel module, as is the case with SELinux. Using type enforcement is a way to implement the FLASK architecture. Access Using type enforcement, users may (as in Microsoft Active Directory) or may not (as in SELinux) be associated with a Kerberos realm, although the original type enforcement model implies so. It is always necessary to define a TE access matrix containing rules about clearance granted to a given security context, or subject's rights over objects according to an authorization scheme. Security Practically, type enforcement evaluates a set of rules from the source security context of a subject, against a set of rules from the target security context of the object. A clearance decision occurs depending on the TE access description (matrix). Then, DAC or other access control mechanisms (MLS / MCS, ...) apply. History Type enforcement was introduced in the Secure Ada Target architecture in the late 1980s with a full implementation de
https://en.wikipedia.org/wiki/Euler%27s%20totient%20function
In number theory, Euler's totient function counts the positive integers up to a given integer that are relatively prime to . It is written using the Greek letter phi as or , and may also be called Euler's phi function. In other words, it is the number of integers in the range for which the greatest common divisor is equal to 1. The integers of this form are sometimes referred to as totatives of . For example, the totatives of are the six numbers 1, 2, 4, 5, 7 and 8. They are all relatively prime to 9, but the other three numbers in this range, 3, 6, and 9 are not, since and . Therefore, . As another example, since for the only integer in the range from 1 to is 1 itself, and . Euler's totient function is a multiplicative function, meaning that if two numbers and are relatively prime, then . This function gives the order of the multiplicative group of integers modulo (the group of units of the ring ). It is also used for defining the RSA encryption system. History, terminology, and notation Leonhard Euler introduced the function in 1763. However, he did not at that time choose any specific symbol to denote it. In a 1784 publication, Euler studied the function further, choosing the Greek letter to denote it: he wrote for "the multitude of numbers less than , and which have no common divisor with it". This definition varies from the current definition for the totient function at but is otherwise the same. The now-standard notation comes from Gauss's 1801 treatise Disquisitiones Arithmeticae, although Gauss did not use parentheses around the argument and wrote . Thus, it is often called Euler's phi function or simply the phi function. In 1879, J. J. Sylvester coined the term totient for this function, so it is also referred to as Euler's totient function, the Euler totient, or Euler's totient. Jordan's totient is a generalization of Euler's. The cototient of is defined as . It counts the number of positive integers less than or equal to that ha
https://en.wikipedia.org/wiki/Basic%20access%20authentication
In the context of an HTTP transaction, basic access authentication is a method for an HTTP user agent (e.g. a web browser) to provide a user name and password when making a request. In basic HTTP authentication, a request contains a header field in the form of Authorization: Basic <credentials>, where credentials is the Base64 encoding of ID and password joined by a single colon :. It was originally implemented by Ari Luotonen at CERN in 1993 and defined in the HTTP 1.0 specification in 1996. It is specified in from 2015, which obsoletes from 1999. Features HTTP Basic authentication (BA) implementation is the simplest technique for enforcing access controls to web resources because it does not require cookies, session identifiers, or login pages; rather, HTTP Basic authentication uses standard fields in the HTTP header. Security The BA mechanism does not provide confidentiality protection for the transmitted credentials. They are merely encoded with Base64 in transit and not encrypted or hashed in any way. Therefore, basic authentication is typically used in conjunction with HTTPS to provide confidentiality. Because the BA field has to be sent in the header of each HTTP request, the web browser needs to cache credentials for a reasonable period of time to avoid constantly prompting the user for their username and password. Caching policy differs between browsers. HTTP does not provide a method for a web server to instruct the client to "log out" the user. However, there are a number of methods to clear cached credentials in certain web browsers. One of them is redirecting the user to a URL on the same domain, using credentials that are intentionally incorrect. However, this behavior is inconsistent between various browsers and browser versions. Microsoft Internet Explorer offers a dedicated JavaScript method to clear cached credentials: <script>document.execCommand('ClearAuthenticationCache');</script> In modern browsers, cached credentials for basic auth
https://en.wikipedia.org/wiki/Bithumb
Bithumb is a South Korean cryptocurrency exchange. Founded in 2014, Bithumb Korea has 8 million registered users, 1 million mobile app users, and a current cumulative transaction volume has exceeded USD $1 trillion. History In October 2018, BK Global Consortium signed a deal to buy a majority share of BTC Holding Co. which is Bithumb's largest investor. On January 22, 2019, OTC-listed holding company Blockchain Industries signed a binding letter of intent to merge with Bithumb on or before March 1, 2019. The plan is to form a new publicly traded entity called the Blockchain Exchange Alliance (BXA) that would ‘up-list’ on either the New York Stock Exchange or NASDAQ and make BXA the first major cryptocurrency exchange to go public. On April 11, 2019, Bithumb announced a net loss of KRW205.5 billion (US$180 million) in 2018, a sharp turnaround from the KRW427.2 billion profit in 2017, despite 2018's sales rising 17.5% to KRW391.7 million. The company blamed the loss on the sharp decline in the price of cryptocurrencies and reduced trading volume. Controversy In June 2017, hackers stole user information from a Bithumb employee's personal computer. In January 2018, Bithumb was raided by the government for alleged tax evasion. They were found not guilty, but still had to pay nearly $28 million in back taxes. In June 2018, approximately $32 million of cryptocurrency was stolen from Bithumb in a hack. In January 2019, 30 out of 340 total Bithumb employees were laid off in response to declining trading volume and profits in 2018. On March 29, 2019, Bithumb said that it was hacked. It pointed its fingers at insiders. Nearly $20 million worth of EOS and Ripple tokens were estimated to have been stolen. On September 2, 2020, Bithumb was reported in local Korean news that the Bithumb exchange was raided by the Seoul Metropolitan Police Agency's Intelligent Crime Investigation Unit. According to the report, the search and seizure is related to suspicion of investment f
https://en.wikipedia.org/wiki/Model-based%20design
Model-based design (MBD) is a mathematical and visual method of addressing problems associated with designing complex control, signal processing and communication systems. It is used in many motion control, industrial equipment, aerospace, and automotive applications. Model-based design is a methodology applied in designing embedded software. Overview Model-based design provides an efficient approach for establishing a common framework for communication throughout the design process while supporting the development cycle (V-model). In model-based design of control systems, development is manifested in these four steps: modeling a plant, analyzing and synthesizing a controller for the plant, simulating the plant and controller, integrating all these phases by deploying the controller. The model-based design is significantly different from traditional design methodology. Rather than using complex structures and extensive software code, designers can use Model-based design to define plant models with advanced functional characteristics using continuous-time and discrete-time building blocks. These built models used with simulation tools can lead to rapid prototyping, software testing, and verification. Not only is the testing and verification process enhanced, but also, in some cases, hardware-in-the-loop simulation can be used with the new design paradigm to perform testing of dynamic effects on the system more quickly and much more efficiently than with traditional design methodology. History As early as the 1920s two aspects of engineering, control theory and control systems, converged to make large-scale integrated systems possible. In those early days controls systems were commonly used in the industrial environment. Large process facilities started using process controllers for regulating continuous variables such as temperature, pressure, and flow rate. Electrical relays built into ladder-like networks were one of the first discrete control devices to au
https://en.wikipedia.org/wiki/DaT%20scan
DaT Scan (DaT scan or Dopamine Transporter Scan) commonly refers to a diagnostic method to investigate if there is a loss of dopaminergic neurons in striatum. The term may also refer to a brand name of Ioflupane (123I) which is used for the study. The scan principle is based on use of the radiopharmaceutical Ioflupane (123I) which binds to dopamine transporters (DaT). The signal from them is then detected by the use of single-photon emission computed tomography (SPECT) which uses special gamma-cameras to create a pictographic representation of the distribution of dopamine transporters in the brain. DaTSCAN is indicated in cases of tremor when its origin is uncertain. Although this method can distinguish essential tremor from Parkinson's syndrome, it is unable to distinguish between Parkinson's disease, multiple system atrophy or progressive supranuclear palsy. There is evidence that DaTSCAN is accurate in diagnosing early Parkinson's. Procedure At the beginning a patient should take two iodine tablets and wait for one hour. These pills are important because they prevent the accumulation of radioactive substances in the thyroid gland. After one hour, the patient gets an injection to the shoulder, which contains the radiopharmaceutical, and then waits for 4 hours. The concentration of the substance increases, and then it is scanned by a gamma-camera, which is located around the patient's head. The whole examination lasts about 30–45 minutes, and it is non-invasive. If a patient uses certain medications listed below, it is necessary to stop usage for a few days or weeks before the DaTSCAN, but only after a consultation with the patient's doctor. The examination takes just a few hours, so patients do not need to stay in a hospital overnight, but they have to drink much more than they are used to and go to the toilet more often. It is important for a fast elimination of the radioactive substances from the body. Contraindications pregnancy breast-feeding severe
https://en.wikipedia.org/wiki/Extrinsic%20extensor%20muscles%20of%20the%20hand
The extrinsic extensor muscles of the hand are located in the back of the forearm and have long tendons connecting them to bones in the hand, where they exert their action. Extrinsic denotes their location outside the hand. Extensor denotes their action which is to extend, or open flat, joints in the hand. They include the extensor carpi radialis longus (ECRL), extensor carpi radialis brevis (ECRB), extensor digitorum (ED), extensor digiti minimi (EDM), extensor carpi ulnaris (ECU), abductor pollicis longus (APL), extensor pollicis brevis (EPB), extensor pollicis longus (EPL), and extensor indicis (EI). Origin The extensor carpi radialis longus (ECRL) has the most proximal origin of the extrinsic hand extensors. It originates just distal to the brachioradialis at the lateral supracondylar ridge of the humerus, the lateral intermuscular septum, and by a few fibers at the lateral epicondyle of the humerus. Distal to this, the extensor carpi radialis brevis (ECRB), extensor digitorum, extensor digiti minimi, and extensor carpi ulnaris (ECU) originate from the lateral epicondyle via the . The ECRB has additional origins from the radial collateral ligament, the ECU from the dorsal border of the ulna (shared with the flexor carpi ulnaris and flexor digitorum profundus), and all four also originate from various fascia. Moving distally, there are the abductor pollicis longus (APL), extensor pollicis brevis (EPB), extensor pollicis longus (EPL), and extensor indicis (EI). The APL originates from the lateral part of the dorsal surface of the body of the ulna below the insertion of the anconeus and from the middle third of the dorsal surface of the body of the radius. The EPB arises from the radius distal to the APL and from the dorsal surface of the radius. The EPL arises from the dorsal surface of the ulna and the EI from the distal third of the dorsal part of the body of ulna. The APL, EPB, EPL, and EI all have an additional origin at the interosseus membrane. Course Th
https://en.wikipedia.org/wiki/Bandspread
In a radio receiver, a bandspread control is a secondary tuning control that allows accurate tuning of closely spaced frequencies of a radio band. With a main tuning control that covered a wide range of frequencies, for example 10-14 megahertz in a few turns of the tuning knob, a very small motion might change the tuning by tens of kilohertz and would make accurate tuning to any particular frequency difficult. A calibrated bandspread tuning control allows the main tuning to be set to a predefined spot on the control, and the bandspread allows tuning of a particular frequency within some restricted range of the main tuning control. One method of adding a bandspread control was to put a relatively small value variable tuning capacitor and dial directly in parallel with the main tuning variable capacitor ( or connected to a tap on the coil of the tuned circuit). The smaller capacitor would have much less effect on the resonant frequency than the main capacitor, allowing fine discrimination of the tuned frequency. A second method, mechanical bandspread, was a second tuning knob connected through a gear train to the main tuning knob; each turn of the bandspread dial moved the main dial through a small part of its range, improving the precision of tuning. Bandspread controls were found on communications receivers, amateur radio receivers, and some broadcast receivers. With the advent of digital frequency synthesizers that could be set with high resolution by a keypad or incremental tuning knob, the requirement for bandspread control in many applications was eliminated. In the mid-1960s, some British portable radios had a separate 'Bandspread' waveband covering the highest frequencies of the medium wave (AM) band (typically 1400 – 1600 kHz) to simplify tuning of popular commercial stations such as the offshore Radio Caroline and the continental Radio Luxembourg. A single tuning knob was used for all wavebands.
https://en.wikipedia.org/wiki/CodePen
CodePen is an online community for testing and showcasing user-created HTML, CSS and JavaScript code snippets. It functions as an online code editor and open-source learning environment, where developers can create code snippets, called "pens," and test them. It was founded in 2012 by full-stack developers Alex Vazquez and Tim Sabat and front-end designer Chris Coyier. Its employees work remotely, rarely all meeting together in person. CodePen is a large community for web designers and developers to showcase their coding skills, with an estimated 330,000 registered users and 14.16 million monthly visitors.
https://en.wikipedia.org/wiki/Core%20sample
A core sample is a cylindrical section of (usually) a naturally-occurring substance. Most core samples are obtained by drilling with special drills into the substance, such as sediment or rock, with a hollow steel tube, called a core drill. The hole made for the core sample is called the "core hole". A variety of core samplers exist to sample different media under different conditions; there is continuing development in the technology. In the coring process, the sample is pushed more or less intact into the tube. Removed from the tube in the laboratory, it is inspected and analyzed by different techniques and equipment depending on the type of data desired. Core samples can be taken to test the properties of manmade materials, such as concrete, ceramics, some metals and alloys, especially the softer ones. Core samples can also be taken of living things, including human beings, especially of a person's bones for microscopic examination to help diagnose diseases. Methods The composition of the subject materials can vary from almost liquid to the strongest materials found in nature or technology, and the location of the subject materials can vary from on the laboratory bench to over 10  km from the surface of the Earth in a borehole. The range of equipment and techniques applied to the task is correspondingly great. Core samples are most often taken with their long axis oriented roughly parallel to the axis of a borehole, or parallel to the gravity field for the gravity-driven tools. However it is also possible to take core samples from the wall of an existing borehole. Taking samples from an exposure, be it an overhanging rock face or on a different planet, is almost trivial. (The Mars Exploration Rovers carry a Rock Abrasion Tool, which is logically equivalent to the "rotary sidewall core" tool described below.) Some common techniques include: gravity coring, in which the core sampler is dropped into the sample, usually the bed of a water body, but essentially
https://en.wikipedia.org/wiki/Insulator%20%28genetics%29
An insulator is a type of cis-regulatory element known as a long-range regulatory element. Found in multicellular eukaryotes and working over distances from the promoter element of the target gene, an insulator is typically 300 bp to 2000 bp in length. Insulators contain clustered binding sites for sequence specific DNA-binding proteins and mediate intra- and inter-chromosomal interactions. Insulators function either as an enhancer-blocker or a barrier, or both. The mechanisms by which an insulator performs these two functions include loop formation and nucleosome modifications. There are many examples of insulators, including the CTCF insulator, the gypsy insulator, and the β-globin locus. The CTCF insulator is especially important in vertebrates, while the gypsy insulator is implicated in Drosophila. The β-globin locus was first studied in chicken and then in humans for its insulator activity, both of which utilize CTCF. The genetic implications of insulators lie in their involvement in a mechanism of imprinting and their ability to regulate transcription. Mutations to insulators are linked to cancer as a result of cell cycle disregulation, tumourigenesis, and silencing of growth suppressors. Function Insulators have two main functions: Enhancer-blocking insulators prevent distal enhancers from acting on the promoter of neighbouring genes Barrier insulators prevent silencing of euchromatin by the spread of neighbouring heterochromatin While enhancer-blocking is classified as an inter-chromosomal interaction, acting as a barrier is classified as an intra-chromosomal interaction. The need for insulators arises where two adjacent genes on a chromosome have very different transcription patterns; it is critical that the inducing or repressing mechanisms of one do not interfere with the neighbouring gene. Insulators have also been found to cluster at the boundaries of topologically associating domains (TADs) and may have a role in partitioning the genome into "chr
https://en.wikipedia.org/wiki/Reproductive%20technology
Reproductive technology encompasses all current and anticipated uses of technology in human and animal reproduction, including assisted reproductive technology (ART), contraception and others. It is also termed Assisted Reproductive Technology, where it entails an array of appliances and procedures that enable the realization of safe, improved and healthier reproduction. While this is not true of all people, for an array of married couples, the ability to have children is vital. But through the technology, infertile couples have been provided with options that would allow them to conceive children. Overview Assisted reproductive technology Assisted reproductive technology (ART) is the use of reproductive technology to treat low fertility or infertility. Modern technology can provide infertile couples with assisted reproductive technologies. The natural method of reproduction has become only one of many new techniques used today. There are millions of couples that do not have the ability to reproduce on their own because of infertility and therefore, must resort to these new techniques. The main causes of infertility are that of hormonal malfunctions and anatomical abnormalities. ART is currently the only form of assistance for individuals who, for the time being, can only conceive through surrogacy methods). Examples of ART include in vitro fertilization (IVF) and its possible expansions, including: artificial insemination artificial reproduction cloning (see human cloning for the special case of human beings) cytoplasmic transfer cryopreservation of sperm, oocytes, embryos embryo transfer fertility medication hormone treatment in vitro fertilization intracytoplasmic sperm injection in vitro generated gametes preimplantation genetic diagnosis Role of the Society for Assisted Reproductive Technology (SART) In 1981, after the birth of Elizabeth Carr, the first baby in the United States to be conceived through in vitro fertilization (IVF). Her birth ga
https://en.wikipedia.org/wiki/Tenosynovial%20giant%20cell%20tumor
Tenosynovial giant cell tumor (TGCT) is a group of rare, typically non-malignant tumors of the joints. TGCT tumors often develop from the lining of joints (also known as synovial tissue). Common symptoms of TGCT include swelling, pain, stiffness and reduced mobility in the affected joint or limb. This group of tumors can be divided into different subsets according to their site, growth pattern, and prognosis. Localized TGCT is sometimes referred to as giant cell tumor of the tendon sheath; diffuse TGCT is also called pigmented villonodular synovitis (PVNS). Classification Classification for TGCT encompasses two subtypes that can be divided according to site – within a joint (intra-articular) or outside of the joint (extra-articular) – and growth pattern (localized or diffuse) of the tumor(s). Localized and diffuse subsets of TGCT differ in their prognosis, clinical presentation, and biological behavior, but share a similar manner of disease development. Localized TGCT Localized TGCT is sometimes referred to as localized pigmented villonodular synovitis (L-PVNS), giant cell tumor of the tendon sheath (GCT-TS), nodular tenosynovitis, localized nodular tenosynovitis, and L-TGCT. The localized form of TGCT is more common. Localized TGCT tumors are typically 0.5 cm-4 cm), develop over years, are benign and non-destructive to the surrounding tissue, and may reoccur in the affected area. The most common symptom is painless swelling. Localized TGCT most often occurs in fingers, but can also occur in other joints. Diffuse TGCT Diffuse TGCT is sometimes referred to as pigmented villonodular synovitis (PVNS), conventional PVNS, and D-TGCT. Diffuse TGCT occurs less frequently and is locally aggressive (in some cases, tumors may infiltrate surrounding soft tissue). It most commonly affects people under 40 years old, though the age of occurrence varies. Diffuse TGCT may occur inside a joint (intra-articular) or outside of a joint (extra-articular). Intra-articular tumors
https://en.wikipedia.org/wiki/Cherry%20ice%20cream
Cherry ice cream is a common ice cream flavor, prepared using typical ice cream ingredients and cherries. Various types of cherries and cherry cultivars are used. In the United States, where the flavor is especially popular, it has been mass-produced since at least 1917. Overview Cherry ice cream is a common ice cream flavor in the United States consisting of typical ice cream ingredients and cherries. Whole or sliced or chopped cherries are used, and cherry juice or cherry juice concentrate is sometimes used as an ingredient. Cherry extract and cherry pit oil have also been used as ingredients. Various cherry cultivars are used, such as black cherries, bing cherries and sour cherry cultivars. Maraschino cherries are also used. In the 20th century, White House Cherry ice cream, consisting of vanilla ice cream with Maraschino cherries, was a popular flavor in some parts of the U.S. Cherry gelato has also been produced, and the dish can be prepared as a soft serve ice cream. Chocolate is sometimes used as an ingredient in cherry ice cream. History André Viard in Le Cuisinier Impérial, first published in 1806, gives a recipe for glace de cerises. Cherry ice cream has been produced in the United States since at least 1892. A version of the dish created in 1932 included bitter almond extract, which is used as an additive on sour cherries, and was described as providing the flavor of maraschino cherry to the sour cherries. It has become a tradition for cherry ice cream to be served at the International Cherry Blossom Festival in Macon, Georgia. Mass production Cherry ice cream has been mass-produced in the United States since at least 1917. See also List of cherry dishes List of ice cream flavors
https://en.wikipedia.org/wiki/Pull%20technology
Pull coding or client pull is a style of network communication where the initial request for data originates from the client, and then is responded to by the server. The reverse is known as push technology, where the server pushes data to clients. Pull requests form the foundation of network computing, where many clients request data from centralized servers. Pull is used extensively on the Internet for HTTP page requests from websites. A push can also be simulated using multiple pulls within a short amount of time. For example, when pulling POP3 email messages from a server, a client can make regular pull requests every few minutes. To the user, the email then appears to be pushed, as emails appear to arrive close to real-time. The tradeoff is this places a heavier load on both the server and network to function correctly. Most web feeds, such as RSS are technically pulled by the client. With RSS, the user's RSS reader polls the server periodically for new content; the server does not send information to the client unrequested. This continual polling is inefficient and has contributed to the shutdown or reduction of several popular RSS feeds that could not handle the bandwidth. For solving this problem, the WebSub protocol as another example of a push code was devised. Podcasting is specifically a pull technology. When a new podcast episode is published to an RSS feed, it sits on the server until it is requested by a feed reader, mobile podcasting app, or directory. Directories such as Apple Podcasts (iTunes), The Blubrry Directory, and many apps' directories request the RSS feed periodically to update the Podcast's listing on those platforms. Subscribers to those RSS feeds via app or reader will get the episodes when they request the RSS feed next time, independent of when the directory listing updates. See also Push technology Client–server model
https://en.wikipedia.org/wiki/Invertebrate%20zoology
Invertebrate zoology is the subdiscipline of zoology that consists of the study of invertebrates, animals without a backbone (a structure which is found only in fish, amphibians, reptiles, birds and mammals). Invertebrates are a vast and very diverse group of animals that includes sponges, echinoderms, tunicates, numerous different phyla of worms, molluscs, arthropods and many additional phyla. Single-celled organisms or protists are usually not included within the same group as invertebrates. Subdivisions Invertebrates represent 97% of all named animal species, and because of that fact, this subdivision of zoology has many further subdivisions, including but not limited to: Arthropodology - the study of arthropods, which includes Arachnology - the study of spiders and other arachnids Entomology - the study of insects Carcinology - the study of crustaceans Myriapodology - the study of centipedes, millipedes, and other myriapods Cnidariology - the study of Cnidaria Helminthology - the study of parasitic worms. Malacology - the study of mollusks, which includes Conchology - the study of Mollusk shells. Limacology - the study of slugs. Teuthology - the study of cephalopods. Invertebrate paleontology - the study of fossil invertebrates These divisions are sometimes further divided into more specific specialties. For example, within arachnology, acarology is the study of mites and ticks; within entomology, lepidoptery is the study of butterflies and moths, myrmecology is the study of ants and so on. Marine invertebrates are all those invertebrates that exist in marine habitats. History Early Modern Era In the early modern period starting in the late 16th century, invertebrate zoology saw growth in the number of publications made and improvement in the experimental practices associated with the field. (Insects are one of the most diverse groups of organisms on Earth. They play important roles in ecosystems, including pollination, natural enemies, saprophytes, and
https://en.wikipedia.org/wiki/Microsoft%20Network%20Monitor
Microsoft Network Monitor is a deprecated packet analyzer. It enables capturing, viewing, and analyzing network data and deciphering network protocols. It can be used to troubleshoot network problems and applications on the network. Microsoft Network Monitor 1.0 (codenamed Bloodhound) was originally designed and developed by Raymond Patch, a transport protocol and network adapter device driver engineer on the Microsoft LAN Manager development team. Network Monitor was replaced by Microsoft Message Analyzer (MMA was discontinued in 2019). History The LAN Manager development team had one shared hardware-based analyzer at the time. Netmon was conceived when the hardware analyzer was taken during a test to reproduce a networking bug, and the first Windows prototype was coded over the Christmas holiday. The first 4 bytes of the Netmon capture file format were used to validate the file. The values were 'RTSS' for Ray, Tom, Steve, and Steve - the first four members of the team. The code was originally written for OS/2 and had no user interface; a symbol was placed in the device driver where the packet buffers were kept so received data could be dumped in hex from within the kernel debugger. Netmon caused a bit of a stir for Microsoft IT since networks and e-mail were not encrypted at the time. Only a few software engineers had access to hardware analyzers due to their cost, but with Netmon many engineers around the company had access to network traffic for free. At the request of Microsoft IT, two simple identification features were added - a non-cryptographic password and an identification protocol named the Bloodhound-Oriented Network Entity (BONE) (created and named by Raymond Patch as a play on the codename Bloodhound). Network Monitor 3 is a complete overhaul of the earlier Network Monitor 2.x version. Originally versions of Network Monitor were only available through other Microsoft products, such as Systems Management Server (SMS). But now the fully featured
https://en.wikipedia.org/wiki/Color%20superconductivity
Color superconductivity is a phenomenon where matter carries color charge without loss, on analogy to the way conventional superconductors can carry electric charge without loss. Color superconductivity is predicted to occur in quark matter if the baryon density is sufficiently high (i.e., well above the density and energies of an atomic nucleus) and the temperature is not too high (well below 1012 kelvins). Color superconducting phases are to be contrasted with the normal phase of quark matter, which is just a weakly interacting Fermi liquid of quarks. In theoretical terms, a color superconducting phase is a state in which the quarks near the Fermi surface become correlated in Cooper pairs, which condense. In phenomenological terms, a color superconducting phase breaks some of the symmetries of the underlying theory, and has a very different spectrum of excitations and very different transport properties from the normal phase. Description Analogy with superconducting metals It is well known that at low temperature many metals become superconductors. A metal can be viewed in part as a Fermi liquid of electrons, and below a critical temperature, an attractive phonon-mediated interaction between the electrons near the Fermi surface causes them to pair up and form a condensate of Cooper pairs, which via the Anderson–Higgs mechanism makes the photon massive, leading to characteristic behaviors of a superconductor: infinite conductivity and the exclusion of magnetic fields (Meissner effect). The crucial ingredients for this to occur are: a liquid of charged fermions. an attractive interaction between the fermions low temperature (below the critical temperature) These ingredients are also present in sufficiently dense quark matter, leading physicists to expect that something similar will happen in that context: quarks carry both electric charge and color charge; the strong interaction between two quarks is powerfully attractive; the critical temperature is expec
https://en.wikipedia.org/wiki/ADAM11
Disintegrin and metalloproteinase domain-containing protein 11 is an enzyme that in humans is encoded by the ADAM11 gene. This gene encodes a member of the ADAM (a disintegrin and metalloprotease) protein family. Members of this family are membrane-anchored proteins structurally related to snake venom disintegrins, and have been implicated in a variety of biological processes involving cell-cell and cell-matrix interactions, including fertilization, muscle development, and neurogenesis. This gene represents a candidate tumor suppressor gene for human breast cancer based on its location within a minimal region of chromosome 17q21 previously defined by tumor deletion mapping.
https://en.wikipedia.org/wiki/Kanpy%C5%8D%20%28food%29
, sometimes romanized and pronounced , are dried shavings of Lagenaria siceraria var. hispida, a variety of calabash gourd. The gourd is known as (夕顔) or (フクベ) in Japanese. Kanpyō is an ingredient in traditional Edo style Japanese cuisine. Cooked and flavored kanpyō is commonly used in futomaki sushi roll. Kanpyō was originally grown in the Osaka region. Now it is a specialty product of Tochigi Prefecture, where it is a cottage industry. The region is so tied to the food product that it hosts the "Kanpyō Highway with History and Romance". The yuru-chara for Oyama, Tochigi is (), an anthropomorphized calabash. The gourd is harvested between late July and September. The white flesh of the gourd is cut into strips 3 cm wide and 3 mm thick, then either dried in the sun or dehydrated. Over 200 tons a year of dried kanpyō are produced per year. Kanpyō available in the United States is sometimes chemically bleach-dried to a very white color, as opposed to the creamy color of the naturally-dried kind. Sulfur dioxide is sometimes used as a fumigant but must not be used in concentrations exceeding 5.0 g per 1 kg of dry matter. Dishes featuring kanpyō In addition to being the focus of many dishes, kanpyō strips are frequently used as an edible twist tie in dishes such as fukusa-zushi and chakin-zushi. Typically the dried strips are boiled to soften, and then boiled a second time with soy sauce, sugar, and other ingredients added for flavor. Futomaki Kanpyō-maki, also called teppo maki ("gun barrel maki") as it looks like the end of a rifle Matsukasa sushi ("pinecone sushi"), a roll using squid filet (instead of nori) wrapped around sushi rice, kanpyō, shiitake, snow peas, and whitefish Shojin dashijiru, a vegan soup stock See also Oden
https://en.wikipedia.org/wiki/Archer%27s%20paradox
The archer's paradox is the phenomenon of an arrow traveling in the direction it is pointed at full draw, when it seems that the arrow would have to pass through the starting position it was in before being drawn, where it was pointed to the side of the target. The bending of the arrow when released is the explanation for why the paradox occurs and should not be confused with the paradox itself. Flexing of the arrow when shot from a modern 'centre shot' bow is still present and is caused by a variety of factors, mainly the way the string is deflected from the fingers as the arrow is released. The term was first used by E. J. Rendtroff in 1913, but detailed descriptions of the phenomenon appear in archery literature as early as Horace A. Ford's 1859 text "Archery: Its Theory and Practice". As understanding was gained about the arrow flexing around and out of the way of the bow as it is shot (as first filmed by Clarence Hickman) and then experiencing oscillating back-and-forth bending as it travels toward the target, this dynamic flexing has incorrectly become a common usage of the term. This misuse sometimes causes misunderstanding on the part of those only familiar with modern target bows, which often have risers with an eccentrically cutout "arrow window"; being "centre shot", these bows do not exhibit any paradoxical behaviour as the arrow is always pointing visually along its line of flight. Details In order to be accurate, an arrow must have the correct stiffness, or "dynamic spine", to flex out of the way of the bow and to return to the correct path as it leaves the bow. Incorrect dynamic spine results in unpredictable contact between the arrow and the bow, therefore unpredictable forces on the arrow as it leaves the bow, and therefore reduced accuracy. Additionally, if an archer shoots several arrows with different dynamic spines, as they clear the bow they will be deflected on launch by different amounts and so will strike in different places. Competiti
https://en.wikipedia.org/wiki/Entitlement%20%28fair%20division%29
Entitlement in fair division describes that proportion of the resources or goods to be divided that a player can expect to receive. In many fair division settings, all agents have equal entitlements, which means that each agent is entitled to 1/n of the resource. But there are practical settings in which agents have different entitlements. Some examples are: In partnership resolution settings, each partner is entitled to a fraction of the common assets in proportion to his/her investment in the partnership. In inheritance settings, the law in some jurisdictions prescribes a different share to each heir according to his/her proximity to the deceased person. For example, according to the Bible, the firstborn son must receive twice as much as every other son. In contrast, according to the Italian law, when there are three heirs - parent, brother and spouse - they are entitled to 1/4, 1/12 and 2/3 respectively. In parliamentary democracies, each party is entitled to a number of seats in the parliament that is, in general, proportional to the number of votes it received. The idea is based on the normal idea of entitlement. Entitlements can be determined by agreeing on a cooperative game and using its value as the entitlement. When agents have equal entitlements, it is reasonable to require that the solution satisfies the axiom of anonymity (also called: symmetry), that is, agents are treated only by their valuations and not by their names. In contrast, when agents have different entitlements, anonymity is no longer valid, and the solutions must be asymmetric. Various problems of fair division with different entitlements have been studied. Dividing money Even when only money is to be divided and some fixed amount has been specified for each recipient, the problem can be complex. The amounts specified may be more or less than the amount of money, and the profit or loss will then need to be shared out. The proportional rule is normally used in law nowadays, and is
https://en.wikipedia.org/wiki/Dronabinol
The International Nonproprietary Name dronabinol, also known under the trade names Marinol, Syndros, Reduvo and Adversa, is a generic name for the molecule of delta-9-tetrahydrocannabinol in the pharmaceutical context. It has indications as an appetite stimulant, antiemetic, and sleep apnea reliever and is approved by the FDA as safe and effective for HIV/AIDS-induced anorexia and chemotherapy-induced nausea and vomiting only. Dronabinol is the principal psychoactive constituent enantiomer form, (−)-trans-Δ9-tetrahydrocannabinol, found in cannabis. Dronabinol does not include any other tetrahydrocannabinol (THC) isomers or any cannabidiol. Medical uses Appetite stimulant and anti-emetic Dronabinol is used to stimulate appetite and therefore weight gain in patients with HIV/AIDS and cancer. It is also used to treat chemotherapy-induced nausea and vomiting. Analgesic Dronabinol demonstrated analgesic efficacy in a majority of studies in chronic pain, the data in acute pain is less conclusive. Cannabis addiction Dronabinol may be useful in treating cannabis addiction as it has been shown to reduce cannabis withdrawal symptoms and the subjective effects of marijuana. Sleep apnea Dronabinol demonstrates significant improvement in sleep apnea scores. Phase 2B clinical trials were completed in 2017 for FDA approval for this indication. Overdose A mild overdose of dronabinol presents drowsiness, dry-mouth, euphoria, and tachycardia; whereas a severe overdose presents lethargy, slurred speech, decreased motor coordination, and postural hypotension. History While dronabinol was initially approved by the United States Food and Drug Administration on May 31, 1985, it was not until May 13, 1986, the Drug Enforcement Administration (DEA) issued a Final Rule and Statement of Policy authorizing the "rescheduling of synthetic dronabinol in sesame oil and encapsulated in soft gelatin capsules from Schedule I to Schedule II" (DEA 51 FR 17476-78). This permitted medical use of
https://en.wikipedia.org/wiki/Detect%20and%20avoid
Detect and avoid (DAA) is a set of technologies designed to avoid interference between a given emitter and the wireless environment. Its need was generated by the Ultra-wideband (UWB) standard that uses a fairly large spectrum to emit its pulses. According to the U.S. Federal Communications Commission (FCC), UWB can use from 3.1 to 10.6 GHz. That means it could interfere with WiMAX, 3G or 4G networks. External links Detect & Avoid – Short page on DAA Detect and Avoid Technology: For Ultra Wideband (UWB) Spectrum Usage – whitepaper presenting an experience with DAA. Wireless networking
https://en.wikipedia.org/wiki/Seafood%20boil
Seafood boil is the generic term for any number of types of social events in which shellfish, whether saltwater or freshwater, is the central element. Regional variations dictate the kinds of seafood, the accompaniments and side dishes, and the preparation techniques (boiling, steaming, baking, or raw). In some cases, a boil may be sponsored by a community organization as a fund-raiser or a mixer. In this way, seafood boils are like a fish fry, barbecue, or church potluck supper. Boils are also held by individuals for their friends and family for a weekend get-together and on the holidays of Memorial Day and Independence Day. While boils and bakes are traditionally associated with coastal regions of the United States, there are exceptions. Louisiana Shrimp, crab, and crawfish boils are a Louisiana Cajun tradition and can be found across Louisiana and can even now be found along the Gulf South. But it is the more popular crawfish boil that is most closely associated with Louisiana. The Breaux Bridge Crawfish Festival in Louisiana has been named one of the top 10 food events by USA Today and is a showcase for Cajun music and culture. Major crawfish boils are held by churches and other organizations as fundraisers throughout the spring. Tulane University holds an annual "Crawfest" in April, and the University of New Orleans holds an annual crawfish boil for all students at the end of the spring semester (Students unwinding on Crawfish and Unprecedented Fun—SUCAUF). Smaller events can be found in backyards and parks throughout April, May, and June. Locals traditionally eat crawfish, as well as crabs, without tools such as shell crackers or picks. One reason for the popularity of crawfish may be price. During the height of the season (late spring) the price may be less than a $1.50/pound retail for live crawfish (2006) with crawfish prices currently being around $.99/pound. Shrimp and crab are higher valued cash crops, and can be a less affordable option for larger gr
https://en.wikipedia.org/wiki/Species%20diversity
Species diversity is the number of different species that are represented in a given community (a dataset). The effective number of species refers to the number of equally abundant species needed to obtain the same mean proportional species abundance as that observed in the dataset of interest (where all species may not be equally abundant). Meanings of species diversity may include species richness, taxonomic or phylogenetic diversity, and/or species evenness. Species richness is a simple count of species. Taxonomic or phylogenetic diversity is the genetic relationship between different groups of species. Species evenness quantifies how equal the abundances of the species are. Calculation of diversity Species diversity in a dataset can be calculated by first taking the weighted average of species proportional abundances in the dataset, and then taking the inverse of this. The equation is: The denominator equals mean proportional species abundance in the dataset as calculated with the weighted generalized mean with exponent q - 1. In the equation, S is the total number of species (species richness) in the dataset, and the proportional abundance of the ith species is . The proportional abundances themselves are used as weights. The equation is often written in the equivalent form: The value of q determines which mean is used. q = 0 corresponds to the weighted harmonic mean, which is 1/S because the values cancel out, with the result that 0D is equal to the number of species or species richness, S. q = 1 is undefined, except that the limit as q approaches 1 is well defined: which is the exponential of the Shannon entropy. q = 2 corresponds to the arithmetic mean. As q approaches infinity, the generalized mean approaches the maximum value. In practice, q modifies species weighting, such that increasing q increases the weight given to the most abundant species, and fewer equally abundant species are hence needed to reach mean proportional abundance. Consequentl
https://en.wikipedia.org/wiki/Kengo%20Hirachi
Kengo Hirachi (平地 健吾 Hirachi Kengo, born 30 November 1964) is a Japanese mathematician, specializing in CR geometry and mathematical analysis. Hirachi received from Osaka University his B.S. in 1987, his M.S. in 1989, and his Dr.Sci., advised by Gen Komatsu, in 1994 with dissertation The second variation of the Bergman kernel for ellipsoids. He was a research assistant from 1989 to 1996 and a lecturer from 1996 to 2000 at Osaka University. He was an associate professor from 2000 to 2010 and a full professor from 2010 to the present at the University of Tokyo. He was a visiting professor at the Mathematical Sciences Research Institute from October 1995 to September 1996, at the Erwin Schrödinger Institute for Mathematical Physics from March 2004 to April 2004, at Princeton University from October 2004 to July 2005, and at the Institute for Advanced Study from January 2009 to April 2009. Awards and honors Takebe Senior Prize (1999) of the Mathematical Society of Japan Geometry Prize (2003) of the Mathematical Society of Japan Stefan Bergman Prize (2006) Inoue Prize for Science (2012) Invited lecture at ICM, Seoul 2014
https://en.wikipedia.org/wiki/Indirect%20immunoperoxidase%20assay
Indirect immunoperoxidase assay (IPA) is a laboratory technique used to detect and titrate viruses that do not cause measurable cytopathic effects and cannot be measured by classical plaque assays. These viruses include human coronavirus 229E and OC43. Methodology Susceptible cells are inoculated with serial logarithmic dilutions of samples in a 96-well plate. After viral growth, viral detection by IPA yields the infectious virus titer, expressed as tissue culture infectious dose (TCID50). This represents the dilution of a virus-containing sample at which half of a series of laboratory wells contain replicating viruses. This technique is a reliable method for the titration of human coronaviruses (HCoV) in biological samples (cells, tissues, or fluids). It is also reliable in the detection of antibodies to human cytomegalovirus. See also Coronavirus Immunoassay Immunoperoxidase Virus quantification
https://en.wikipedia.org/wiki/Assassin%27s%20Creed%3A%20The%20Fall
Assassin's Creed: The Fall is an American comic book three-issue mini-series published by WildStorm. Set in the Assassin's Creed universe, it tells the story of Nikolai Orelov, a member of the Russian Brotherhood of Assassins, who battles Templar influence in Russia in the late 19th and early 20th centuries. The miniseries also features a framing story, taking place from 1998 to 2000, which follows Nikolai's descendant Daniel Cross as he explores his ancestor's genetic memories while trying to learn more about his own past and the history of the Assassins. Written and illustrated by Cameron Stewart and Karl Kerschl, the series was initially going to be an expansion of the travels of Ezio Auditore da Firenze, but was moved to an entirely new setting to provide greater freedom to the writers. However, the story still follows the millennia-old conflict between the Assassins and the Templars, which is central to the Assassin's Creed franchise. It also incorporates several events from Russian history like the Borki train disaster, the Tunguska explosion, and the Russian Revolution. The first issue of the comic was released on November 10, 2010, a few days before the retail debut of Assassin's Creed: Brotherhood. It was followed by the second issue on December 1, 2010, and the third on January 12, 2011. Stewart and Kerschl later worked on a graphic novel sequel to the comic, titled Assassin's Creed: The Chain, which was published by UbiWorkshop in August 2012. A video game set in-between the events of The Fall and The Chain, Assassin's Creed Chronicles: Russia, was released in February 2016. Plot synopsis The comic intercuts between events in Nikolai Orelov's life from 1888 to 1917, and his great-grandson Daniel Cross, who struggles with Nikolai's memories that he can inexplicably relive. Nikolai In 1888, Nikolai Orelov is having reservations about the Assassin life as he recalls the death of his friend and fellow Assassin Aleksandr Ulyanov, who was executed one year
https://en.wikipedia.org/wiki/KNMD-TV
KNMD-TV, virtual channel 5 (VHF digital channel 8), is an ATSC 3.0 Public Broadcasting Service (PBS) member television station serving Albuquerque, New Mexico, United States that is licensed to the capital city of Santa Fe. Owned by the University of New Mexico, it is a sister station to Albuquerque-licensed KNME-TV (channel 5). Both stations share studios on UNM's North Campus on University Boulevard Northeast in Albuquerque, while KNMD-TV's transmitter is located atop Sandia Crest. History KNMD began broadcasting in late 2004 at 200 watts on VHF channel 9. It was launched as an exclusively digital television station and is the first and only station in the Albuquerque market to have never broadcast in analog. Signal issues Broadcasting at only 200 watts, KNMD's signal was sometimes hard to pick up in many areas without pixelation and choppy sound. KNMD was not licensed as a low-powered TV station but originally used low power because of interference issues with KCHF which broadcasts its digital signal on channel 10 from a site near Los Alamos, New Mexico. KNMD filed an application with the FCC in 2009 to move transmission frequency to channel 8 and increase power to 5.14 kW in order to improve its signal quality and range. They were granted a permit to make the changes in October 2009. In late August 2010, the upgrades were completed, greatly improving the station's signal. ATSC 3.0 conversion KNMD-TV converted to ATSC 3.0 (Next Gen TV) on June 30, 2021. In preparation for this change, on February 15, World Channel began airing on KNME-TV channel 5.4, and Create debuted on 5.5. KNMD-TV simulcasts the entire KNME multiplex in ATSC 3.0 format. Prior to the conversion, KNMD received a construction permit to increase power from 5.14 kW to 16.6 kW. Digital television Digital channels The station's digital signal is multiplexed: In the new ATSC 3.0 signal, KNMD's main HD channel is on 5.4 and runs programming from the "World" public television network which airs
https://en.wikipedia.org/wiki/Zoo%20hypothesis
The zoo hypothesis speculates on the assumed behavior and existence of technologically advanced extraterrestrial life and the reasons they refrain from contacting Earth. It is one of many theoretical explanations for the Fermi paradox. The hypothesis states that alien life intentionally avoids communication with Earth to allow for natural evolution and sociocultural development, and avoiding interplanetary contamination, similar to people observing animals at a zoo. The hypothesis seeks to explain the apparent absence of extraterrestrial life despite its generally accepted plausibility and hence the reasonable expectation of its existence. A variant on the zoo hypothesis suggested by the former MIT Haystack Observatory scientist John Allen Ball is the "laboratory" hypothesis, in which humanity is being subjected to experiments, with Earth serving as a giant laboratory. Aliens might, for example, choose to allow contact once the human species has passed certain technological, political, and/or ethical standards. Alternatively, aliens may withhold contact until humans force contact upon them, possibly by sending a spacecraft to an alien-inhabited planet. In this regard, reluctance to initiate contact could reflect a sensible desire to minimize risk. An alien society with advanced remote-sensing technologies may conclude that direct contact with neighbors confers added risks to itself without an added benefit. In the related laboratory hypothesis, the zoo hypothesis is extended such that the 'zoo keepers' are subjecting humanity to experiments, a hypothesis which Ball describes as "morbid" and "grotesque", overlooking the possibility that such experiments may be altruistic, i.e., designed to accelerate the pace of civilization to overcome a tendency for intelligent life to destroy itself, until a species is sufficiently developed to establish contact, as in the zoo hypothesis. Assumptions The zoo hypothesis assumes, first, that whenever the conditions are such that l
https://en.wikipedia.org/wiki/ADAM28
Disintegrin and metalloproteinase domain-containing protein 28 is an enzyme that in humans is encoded by the ADAM28 gene. This gene encodes a member of the ADAM (a disintegrin and metalloprotease domain) family. Members of this family are membrane-anchored proteins structurally related to snake venom disintegrins, and have been implicated in a variety of biological processes involving cell–cell and cell–matrix interactions, including fertilization, muscle development, and neurogenesis. The protein encoded by this gene is a lymphocyte-expressed ADAM protein. Alternative splicing results in two transcript variants. The shorter version encodes a secreted isoform, while the longer version encodes a transmembrane isoform.
https://en.wikipedia.org/wiki/Istv%C3%A1n%20Gy%C3%B6ngy
István Gyöngy (born 1951) is a Hungarian mathematician working in the fields of stochastic differential equations, stochastic partial differential equations and their applications to nonlinear filtering and stochastic control. Recently, he has focused his attention on numerical analysis and especially accelerated numerical methods, making use of Richardson extrapolation . He obtained his Candidate degree at Moscow State University in 1981 under the supervision of Nicolai V. Krylov. Formerly at the Department of Probability Theory and Statistics of the Eötvös Loránd University of Budapest, he is currently a professor at the University of Edinburgh, where he is head of the Probability and Stochastic Analysis research group.
https://en.wikipedia.org/wiki/Batchelor%20Prize
The Batchelor Prize is an award presented once every four years by the International Union of Theoretical and Applied Mechanics (IUTAM) for outstanding research in fluid dynamics. The prize of $25,000 is sponsored by the Journal of Fluid Mechanics and presented at the International Congress of Theoretical and Applied Mechanics (ICTAM). The research recognised by the Prize will normally have been published during the ten-year period prior to the award to ensure that the work is of current interest. The award is named in honour of George Batchelor, an Australian applied mathematician and fluid dynamicist. Recipients Source: IUTAM 2020: Alexander Smits, Princeton University 2016: Raymond E. Goldstein, University of Cambridge 2012: Detlef Lohse 2008: Howard A. Stone See also List of physics awards List of prizes named after people
https://en.wikipedia.org/wiki/Adaptive%20quadrature
Adaptive quadrature is a numerical integration method in which the integral of a function is approximated using static quadrature rules on adaptively refined subintervals of the region of integration. Generally, adaptive algorithms are just as efficient and effective as traditional algorithms for "well behaved" integrands, but are also effective for "badly behaved" integrands for which traditional algorithms may fail. General scheme Adaptive quadrature follows the general scheme 1. procedure integrate ( f, a, b, τ ) 2. 3. 4. if ε > τ then 5. m = (a + b) / 2 6. Q = integrate(f, a, m, τ/2) + integrate(f, m, b, τ/2) 7. endif 8. return Q An approximation to the integral of over the interval is computed (line 2), as well as an error estimate (line 3). If the estimated error is larger than the required tolerance (line 4), the interval is subdivided (line 5) and the quadrature is applied on both halves separately (line 6). Either the initial estimate or the sum of the recursively computed halves is returned (line 7). The important components are the quadrature rule itself the error estimator and the logic for deciding which interval to subdivide, and when to terminate. There are several variants of this scheme. The most common will be discussed later. Basic rules The quadrature rules generally have the form where the nodes and weights are generally precomputed. In the simplest case, Newton–Cotes formulas of even degree are used, where the nodes are evenly spaced in the interval: When such rules are used, the points at which has been evaluated can be re-used upon recursion: A similar strategy is used with Clenshaw–Curtis quadrature, where the nodes are chosen as Or, when Fejér quadrature is used, Other quadrature rules, such as Gaussian quadrature or Gauss-Kronrod quadrature, may also be used. An algorithm may elect to use different quadrature methods on different subintervals, for example using a high-or
https://en.wikipedia.org/wiki/EPR1
Effector cell peptidase receptor 1, also known as EPR1, is a human gene. This locus represents an antisense transcript of the survivin locus. This record was withdrawn in collaboration with HGNC. It was defined by L26245.1, which appears to be a cloning artifact ().(This information come from https://www.ncbi.nlm.nih.gov/gene?term=L26245.1)
https://en.wikipedia.org/wiki/NEDD9
Neural precursor cell expressed developmentally down-regulated protein 9 (NEDD-9) is a protein that in humans is encoded by the NEDD9 gene. NEDD-9 is also known as enhancer of filamentation 1 (EF1), CRK-associated substrate-related protein (CAS-L), and Cas scaffolding protein family member 2 (CASS2). An important paralog of this gene is BCAR1. Discovery In 1992, Kumar, et al., first described a sequence tag corresponding to the NEDD9 3′ untranslated region based on the cloning of a group of genes predominantly expressed in the brain of embryonic, but not adult mice, a group of genes designated neural precursor cell expressed, developmentally down-regulated. In 1996, two groups independently described the complete sequence of the NEDD9 gene, and provided initial functional analysis of NEDD9 protein. Law et al. overexpressed a human cDNA library in S. cerevisiae, and screened for genes that simultaneously affected cell cycle and cell polarity controls, inducing a filamentous yeast budding phenotype, and thus identified the HEF1 protein (Human Enhancer of Filamentation 1). This study identified HEF1/NEDD9 as an interactive partner for focal adhesion kinase (FAK), connecting it to integrin signaling. Separately, Minegishi et al. cloned the gene encoding a protein hyperphosphorylated following ligation of β1-integrins in T cells and hypothesized to play a role in the process of T cell costimulation, designating this gene Cas-L (Crk-associated substrate-related protein, Lymphocyte type). Gene The genomic coordinates of the NEDD9 gene are 6:11,183,530-11,382,580 in the GRCh37 assembly, or 6:11,183,298-11,382,348 in the GRCh38 assembly. The gene is on the minus strand. The cytogenetic location is 6p25-p24, based on the nomenclature developed by the Human Genome Organization (HUGO) gene nomenclature committee (HGNC). NEDD9 is the HGNC approved symbol. Official IDs are 7733 (HGNC), 4739 (Entrez Gene), and ENSG00000111859 (Ensembl). CAS-L, CASL, HEF1, dJ49G10.2, dJ761I2
https://en.wikipedia.org/wiki/Glutinous%20rice
Glutinous rice (Oryza sativa var. glutinosa; also called sticky rice, sweet rice or waxy rice) is a type of rice grown mainly in Southeast and East Asia, and the northeastern regions of South Asia, which has opaque grains, very low amylose content, and is especially sticky when cooked. It is widely consumed across Asia. It is called glutinous () in the sense of being glue-like or sticky, and not in the sense of containing gluten (which it does not). While often called sticky rice, it differs from non-glutinous strains of japonica rice, which also become sticky to some degree when cooked. There are numerous cultivars of glutinous rice, which include japonica, indica and tropical japonica strains. History In China, glutinous rice has been grown for at least 2,000 years. However, researchers believe that glutinous rice distribution appears to have been culturally influenced and closely associated with the early southward migration and distribution of the Tai ethnic groups, particularly the Lao people along the Mekong River basin originating from Southern China. Along the Greater Mekong Sub-region, the Lao have been cultivating glutinous rice for approximately 4000–6000 years. The history of rice cultivation in Thailand dates back over 5,000 years. Different types of rice have been cultivated in various regions during different historical periods, including glutinous rice, large-grain rice, and slender grain rice. Through archaeological research, Japanese scholars found that fortified grain was likely the glutinous-lowland variety of glutinous rice, and large-grain rice was likely glutinous rice that thrives at high altitudes. Meanwhile, slender grain rice is non-glutinous. Sticky rice has been a staple food in all regions from north to south since about 3,000 years ago, and it has played an essential role in the country's food culture. Cultivation Glutinous rice is grown in Laos, Thailand, Cambodia, Vietnam, Malaysia, Indonesia, Myanmar, Nepal, Bangladesh, Bhutan
https://en.wikipedia.org/wiki/File%20Transfer%20Protocol
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a plain-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP). The first FTP client applications were command-line programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many dedicated FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications such as HTML editors and file managers. An FTP client used to be commonly integrated in web browsers, where file servers are browsed with the URI prefix "ftp://". In 2021, FTP support was dropped by Google Chrome and Firefox, two major web browser vendors, due to it being superseded by the more secure SFTP and FTPS; although neither of them have implemented the newer protocols. History of FTP servers The original specification for the File Transfer Protocol was written by Abhay Bhushan and published as on 16 April 1971. Until 1980, FTP ran on NCP, the predecessor of TCP/IP. The protocol was later replaced by a TCP/IP version, (June 1980) and (October 1985), the current specification. Several proposed standards amend , for example (February 1994) enables Firewall-Friendly FTP (passive mode), (June 1997) proposes security extensions, (September 1998) adds support for IPv6 and defines a new type of passive mode. Protoc
https://en.wikipedia.org/wiki/World%20Wireless%20System
The World Wireless System was a turn of the 20th century proposed telecommunications and electrical power delivery system designed by inventor Nikola Tesla based on his theories of using Earth and its atmosphere as electrical conductors. He claimed this system would allow for "the transmission of electric energy without wires" on a global scale as well as point-to-point wireless telecommunications and broadcasting. He made public statements citing two related methods to accomplish this from the mid-1890s on. By the end of 1900 he had convinced banker J. P. Morgan to finance construction of a wireless station (eventually sited at Wardenclyffe) based on his ideas intended to transmit messages across the Atlantic to England and to ships at sea. His decision to change the design to include wireless power transmission to better compete with Guglielmo Marconi's new radio based telegraph system was met with Morgan's refusal to fund the changes. The project was abandoned in 1906, never to become operational. During this period Tesla filed numerous patents associated with the basic functions of his system, including transformer design, transmission methods, tuning circuits, and methods of signaling. He also described a plan to have some thirty Wardenclyffe-style telecommunications stations positioned around the world to be tied into existing telephone and telegraph systems. He would continue to elaborate to the press and in his writings for the next few decades on the system's capabilities and how it was superior to radio-based systems. Despite claims of having "carried on practical experiments in wireless transmission", there is no documentation he ever transmitted power beyond relatively short distances and modern scientific opinion is generally that his wireless power scheme would not have worked. History Origins Tesla's ideas for a World Wireless system grew out of experiments beginning in the early 1890s after learning of Hertz's experiments with electromagnetic wav
https://en.wikipedia.org/wiki/Smile%20%28Doctor%20Who%29
"Smile" is the second episode of the tenth series of the British science fiction television series Doctor Who. It was written by Frank Cottrell-Boyce and broadcast on 22 April 2017 on BBC One. "Smile" received generally positive reviews from critics, with critics commenting on the Doctor and Bill's growing relationship. In the episode, the Doctor (Peter Capaldi) and his new companion Bill Potts (Pearl Mackie) visit an off-Earth colony only to find it devoid of any life except for robots that communicate via emoji. Synopsis Despite Nardole's caution, the Twelfth Doctor allows Bill to select her first destination for a trip in the TARDIS. They land in the far future on an off-world Earth colony. The colony is empty except for millions of nanobots called the Vardy that maintain it, along with robotic avatars that interact with the pair via emoji. The robots give the Doctor and Bill badges which report their emotions also through emoji—seemingly the only way to communicate with the Vardy. The Doctor suspects they have arrived before the full colony ship is due, but remains curious as to the absence of any type of pre-colony crew preparing for their arrival. They discover the bones of these humans being used for fertiliser. The Doctor realises that if the Vardy sense they are not happy, the nanobots will consume them to their skeletons, and warns Bill to keep smiling as they escape. Resolving to destroy the Vardy before the arrival of the unsuspecting colonists, the Doctor locates the ship that brought the pre-colony crew to the planet and plans on overloading its reactor. However, Bill discovers a young boy who leads her to a large number of hibernation chambers including some humans just awaking; the Doctor realises that this is the colony ship. The pair review the ship's logs from the non-hibernating flight crew. The Vardy were programmed to help construct and operate the colony and make the colonists happy, monitoring the emotional state of the colonists through
https://en.wikipedia.org/wiki/Stretched%20tuning
Stretched tuning is a detail of musical tuning, applied to wire-stringed musical instruments, older, non-digital electric pianos (such as the Fender Rhodes piano and Wurlitzer electric piano), and some sample-based synthesizers based on these instruments, to accommodate the natural inharmonicity of their vibrating elements. In stretched tuning, two notes an octave apart, whose fundamental frequencies theoretically have an exact 2:1 ratio, are tuned slightly farther apart (a stretched octave). "For a stretched tuning the octave is greater than a factor of 2; for a compressed tuning the octave is smaller than a factor of 2." Melodic stretch refers to tunings with fundamentals stretched relative to each other, while harmonic stretch refers to tunings with harmonics stretched relative to fundamentals which are not stretched. For example, the piano features both stretched harmonics and, to accommodate those, stretched fundamentals. Fundamentals and harmonics In most musical instruments, the tone-generating component (a string or resonant column of air) vibrates at many frequencies simultaneously: a fundamental frequency that is usually perceived as the pitch of the note, and harmonics or overtones that are multiples of the fundamental frequency and whose wavelengths therefore divide the tone-generating region into simple fractional segments (1/2, 1/3, 1/4, etc.). (See harmonic series.) The fundamental note and its harmonics sound together, and the amplitude relationships among them strongly affect the perceived tone or timbre of the instrument. In the acoustic piano, harpsichord, and clavichord, the vibrating element is a metal wire or string; in many non-digital electric pianos, it is a tapered metal tine (Rhodes piano) or reed (Wurlitzer electric piano) with one end clamped and the other free to vibrate. Each note on the keyboard has its own separate vibrating element whose tension and/or length and weight determines its fundamental frequency or pitch. In electric
https://en.wikipedia.org/wiki/Brachymeiosis
Brachymeiosis was a hypothesized irregularity in the sexual reproduction of ascomycete fungi, a variant of meiosis following an "extra" karyogamy (nuclear fusion) step. The hypothesized process would have transformed four diploid nuclei into eight haploid ones. The current scientific consensus is that brachymeiosis does not occur in any fungi. According to the current understanding, ascomycetes reproduce by forming male and female organs (antheridia/spermatia and ascogonia), transferring haploid nuclei from the antheridium to the ascogonium, and growing a dikaryotic ascus containing both nuclei. Karyogamy then occurs in the ascus to form a diploid nucleus, followed by meiosis and mitosis to form eight haploid nuclei in the ascospores. In 1895, the botanist R.A. Harper reported the observation of a second karyogamy event in the ascogonium prior to ascogeny. This would imply the creation of a tetraploid nucleus in the ascus, rather than a diploid one; in order to produce the observed haploid ascospores, a second meiotic reduction in chromosome count would then be necessary. The second reduction was hypothesized to occur during the second or third mitotic division in the ascus, even though chromosome reduction does not typically occur during mitosis. This supposed form of meiosis was termed “brachymeiosis” in 1908 by H. C. I. Fraser. The existence of brachymeiosis was controversial throughout the first half of the twentieth century, with many conflicting results published. Then, research with improved staining techniques established clearly that only one reductive division occurs in the asci of all examined species, including some which had been believed to undergo brachymeiosis. As a result of these studies, the theories of double fusion and subsequent brachymeiosis were discarded around 1950.
https://en.wikipedia.org/wiki/Input-to-state%20stability
Input-to-state stability (ISS) is a stability notion widely used to study stability of nonlinear control systems with external inputs. Roughly speaking, a control system is ISS if it is globally asymptotically stable in the absence of external inputs and if its trajectories are bounded by a function of the size of the input for all sufficiently large times. The importance of ISS is due to the fact that the concept has bridged the gap between input–output and state-space methods, widely used within the control systems community. ISS unified the Lyapunov and input-output stability theories and revolutionized our view on stabilization of nonlinear systems, design of robust nonlinear observers, stability of nonlinear interconnected control systems, nonlinear detectability theory, and supervisory adaptive control. This made ISS the dominating stability paradigm in nonlinear control theory, with such diverse applications as robotics, mechatronics, systems biology, electrical and aerospace engineering, to name a few. The notion of ISS was introduced for systems described by ordinary differential equations by Eduardo Sontag in 1989. Since that the concept was successfully used for many other classes of control systems including systems governed by partial differential equations, retarded systems, hybrid systems, etc. Definition Consider a time-invariant system of ordinary differential equations of the form where is a Lebesgue measurable essentially bounded external input and is a Lipschitz continuous function w.r.t. the first argument uniformly w.r.t. the second one. This ensures that there exists a unique absolutely continuous solution of the system (). To define ISS and related properties, we exploit the following classes of comparison functions. We denote by the set of continuous increasing functions with and the set of continuous strictly decreasing functions with . Then we can denote as functions where for all and for all . System () is called
https://en.wikipedia.org/wiki/Bump%20and%20hole
The bump-and-hole method is a tool in chemical genetics for studying a specific isoform in a protein family without perturbing the other members of the family. The unattainability of isoform-selective inhibition due to structural homology in protein families is a major challenge of chemical genetics. With the bump-and-hole approach, a protein–ligand interface is engineered to achieve selectivity through steric complementarity while maintaining biochemical competence and orthogonality to the wild type pair. Typically, a "bumped" ligand/inhibitor analog is designed to bind a corresponding "hole-modified" protein. Bumped ligands are commonly bulkier derivatives of a cofactor of the target protein. Hole-modified proteins are recombinantly expressed with an amino acid substitution from a larger to smaller residue, e.g. glycine or alanine, at the cofactor binding site. The designed ligand/inhibitor has specificity for the engineered protein due to steric complementarity, but not the native counterpart due to steric interference. History Inspiration for the bump-and-hole method was drawn from mutant E. coli strains which carried an A294S mutant version of phenylalanine tRNA synthetase and survived exposure to p-FluoroPhe, a slightly bumped phenylalanine analog which is cytotoxic when incorporated in translation. The A294S mutant strain was able to incorporate Phe, but not the bumped p-FluoroPhe due to steric crowding from the hydroxymethylene of S294. Later work in the labs of Peter G. Schultz and David A. Tirrell showed that a hole-modified A294G phenylalanine tRNA synthetase mutant was able to incorporate the bumped p-FluoroPhe in translation, demonstrating that steric manipulation can successfully broaden substrate scope, even for the highly specific aminoacyl synthetase. The first bump-and-hole pair, developed by Stuart Schreiber and colleagues, was a bumped cyclosporin A small-molecule with an Ile replacing Val at position 11, and a hole-modified (S99T/F113A) cyclo
https://en.wikipedia.org/wiki/Fatty%20acid%20metabolism%20regulator%20protein%20FadR
In molecular biology, the fatty acid metabolism regulator protein FadR, is a bacterial transcription factor. Bacteria regulate membrane fluidity by manipulating the relative levels of saturated and unsaturated fatty acids within the phospholipids of their membrane bilayers. In Escherichia coli, the transcription factor, FadR, functions as a switch that co-ordinately regulates the machinery required for fatty acid beta-oxidation and the expression of a key enzyme in fatty acid biosynthesis. This single [repressor controls the transcription of the whole fad regulon. Binding of fadR is specifically inhibited by long chain fatty acyl-CoA compounds. The crystal structure of FadR reveals a two domain dimeric molecule where the N-terminal winged-helix domain binds DNA, and the C-terminal domain binds acyl-CoA. The binding of acyl-CoA to the C-terminal domain results in a conformational change that affects the DNA binding affinity of the N-terminal domain. FadR is a member of the GntR family of bacterial transcription regulators. The DNA-binding domain is well conserved for this family, whereas the C-terminal effector-binding domain is more variable, and is consequently used to define the GntR subfamilies. The FadR group is the largest subgroup, and is characterised by an all-helical C-terminal domain composed of 6 to 7 alpha helices.
https://en.wikipedia.org/wiki/Event%20calculus
The event calculus is a logical language for representing and reasoning about events and their effects first presented by Robert Kowalski and Marek Sergot in 1986. It was extended by Murray Shanahan and Rob Miller in the 1990s. Similar to other languages for reasoning about change, the event calculus represents the effects of actions on fluents. However, events can also be external to the system. In the event calculus, one can specify the value of fluents at some given time points, the events that take place at given time points, and their effects. Fluents and events In the event calculus, fluents are reified. This means that they are not formalized by means of predicates but by means of functions. A separate predicate is used to tell which fluents hold at a given time point. For example, means that the box is on the table at time ; in this formula, is a predicate while is a function. Events are also represented as terms. The effects of events are given using the predicates and . In particular, means that, if the event represented by the term is executed at time , then the fluent will be true after . The predicate has a similar meaning, with the only difference being that will be false after . Domain-independent axioms Like other languages for representing actions, the event calculus formalizes the correct evolution of the fluent via formulae telling the value of each fluent after an arbitrary action has been performed. The event calculus solves the frame problem in a way that is similar to the successor state axioms of the situation calculus: a fluent is true at time if and only if it has been made true in the past and has not been made false in the meantime. This formula means that the fluent represented by the term is true at time if: an event has taken place: ; this took place in the past: ; this event has the fluent as an effect: ; the fluent has not been made false in the meantime: A similar formula is used to formalize the opp
https://en.wikipedia.org/wiki/Programming%20game
A programming game is a video game that incorporates elements of computer programming, enabling the player to direct otherwise autonomous units within the game to follow commands in a domain-specific programming language, often represented as a visual language to simplify the programming metaphor. Programming games broadly fall into two areas: single-player games where the programming elements either make up part of or the whole of a puzzle game, and multiplayer games where the player's automated program is pitted against other players' programs. As puzzle games Early games in the genre include System 15000 and Hacker, released in 1984 and 1985 respectively. Programming games have been used as part of puzzle games, challenging the player to achieve a specific result once the program starts operating. An example of such a game is SpaceChem, where the player must use its visual language to manipulate two waldos as to disassemble and reassemble chemical molecules. In such games, players are able to test and debug their program as often as necessary until they find a solution that works. Many of these games encourage the player to find the most efficient program, measured by the number of timesteps needed or number of commands required. Other similar games include Human Resource Machine, Infinifactory, and TIS-100. Zachtronics is a video game development company known for its programming-centric puzzle games. Other games incorporate the elements of programming as portions of puzzles in the larger game. For example, Hack 'n' Slash include a metaphor of being able to access the internal programs and variables of objects represented in the game world, pausing the rest of the game as the player engages this programming interface, and modify the object's program as to progress further; this might be changing the state of an object from being indestructible to destructible. Other similar games with this type of programming approach include Transistor, else Heart.Break(), G
https://en.wikipedia.org/wiki/Erich%20Bessel-Hagen
Erich Bessel-Hagen (12 September 1898 in Charlottenburg – 29 March 1946 in Bonn) was a German mathematician and a historian of mathematics. Erich Paul Werner Bessel-Hagen was born in 1898 in Charlottenburg, a suburb, later a district in Berlin. He studied at the University of Berlin where in 1920 he obtained a Ph.D. in mathematics under the direction of Constantin Carathéodory. His reputation was that of a gentleman as well as a conscientious intellect. This was averred in the early 1940s, when the ruling Nazis increased their persecutions of German officials who have Jewish ancestry. After Felix Hausdorff (a professor 30 years his senior) had been retired and placed under restrictions, Bessel-Hagen became the only former colleague who visited him regularly. On noticing that Hausdorff used private math researches to while away time, he started bringing him books he had borrowed from a library which no longer welcomed Jews.
https://en.wikipedia.org/wiki/Paul%20Ehrlich%20and%20Ludwig%20Darmstaedter%20Prize
The Paul Ehrlich and Ludwig Darmstaedter Prize is an annual award bestowed by the since 1952 for investigations in medicine. It carries a prize money of 120,000 Euro. The prize awarding ceremony is traditionally held on 14 March, the birthday of Nobel laureate Paul Ehrlich, in the St. Paul's Church, Frankfurt am Main. Researchers from worldwide are awarded in the following fields of medicine: Immunology, Cancer research, Haematology, Microbiology and experimental and clinical Chemotherapy. It is one of the highest endowed and internationally most distinguished awards in medicine in Germany. List of winners Some of the prize winners were awarded the Nobel Prize. ( indicates Nobel Prize recipients): 1952 , Tübingen , Nonnenhorn 1953 Adolf Butenandt, Munich 1939 1954 Ernst Boris Chain, London 1945 1956 Gerhard Domagk, Elberfeld 1939 1958 Richard Johann Kuhn, Heidelberg 1938 1960 Felix Haurowitz, Bloomington 1961 Albert Hewett Coons, Boston , Langen Örjan Ouchterlony, Gothenburg , Paris 1962 Otto Heinrich Warburg, Berlin 1931 1963 Helmut Holzer, Freiburg im Breisgau , Cologne , Berlin , Rome 1964 , Copenhagen 1965 , Freiburg im Breisgau , Paris Ida Ørskov, Copenhagen , Copenhagen Bruce Stocker, Stanford 1966 Francis Peyton Rous, New York 1966 1967 , Villejuif Renato Dulbecco, San Diego 1975 1968 Walter Thomas James Morgan, London , Montreux 1969 , Boston Anne-Marie Staub, Paris Winifred M. Watkins, London 1970 Ernst Ruska, Berlin 1986 Helmut Ruska, Düsseldorf 1971 Albert Claude, Brussels Keith R. Porter, Boulder Fritiof S. Sjöstrand, Los Angeles 1972 Denis Parsons Burkitt, London / Uganda Jan Waldenström, Malmö 1973 Michael Anthony Epstein, Bristol Kimishige Ishizaka, Baltimore Dennis H. Wright, Southampton 1974 James L. Gowans, Oxford Jacques Miller, Melbourne 1975 George Bellamy Mackaness, Saranac Lake Avrion Mitchison, London , Copenhagen 1976 , Villejuif Boris Ephrussi, Gif-sur-Yvette
https://en.wikipedia.org/wiki/Mie%E2%80%93Gr%C3%BCneisen%20equation%20of%20state
The Mie–Grüneisen equation of state is an equation of state that relates the pressure and volume of a solid at a given temperature. It is used to determine the pressure in a shock-compressed solid. The Mie–Grüneisen relation is a special form of the Grüneisen model which describes the effect that changing the volume of a crystal lattice has on its vibrational properties. Several variations of the Mie–Grüneisen equation of state are in use. The Grüneisen model can be expressed in the form where is the volume, is the pressure, is the internal energy, and is the Grüneisen parameter which represents the thermal pressure from a set of vibrating atoms. If we assume that is independent of and , we can integrate Grüneisen's model to get where and are the pressure and internal energy at a reference state usually assumed to be the state at which the temperature is 0K. In that case p0 and e0 are independent of temperature and the values of these quantities can be estimated from the Hugoniot equations. The Mie–Grüneisen equation of state is a special form of the above equation. History Gustav Mie, in 1903, developed an intermolecular potential for deriving high-temperature equations of state of solids. In 1912, Eduard Grüneisen extended Mie's model to temperatures below the Debye temperature at which quantum effects become important. Grüneisen's form of the equations is more convenient and has become the usual starting point for deriving Mie–Grüneisen equations of state. Expressions for the Mie–Grüneisen equation of state A temperature-corrected version that is used in computational mechanics has the form where is the bulk speed of sound, is the initial density, is the current density, is Grüneisen's gamma at the reference state, is a linear Hugoniot slope coefficient, is the shock wave velocity, is the particle velocity, and is the internal energy per unit reference volume. An alternative form is A rough estimate of the internal energy can
https://en.wikipedia.org/wiki/Malecot%27s%20method%20of%20coancestry
Malecot's coancestry coefficient, , refers to an indirect measure of genetic similarity of two individuals which was initially devised by the French mathematician Gustave Malécot. is defined as the probability that any two alleles, sampled at random (one from each individual), are identical copies of an ancestral allele. In species with well-known lineages (such as domesticated crops), can be calculated by examining detailed pedigree records. Modernly, can be estimated using genetic marker data. Evolution of inbreeding coefficient in finite size populations In a finite size population, after some generations, all individuals will have a common ancestor : . Consider a non-sexual population of fixed size , and call the inbreeding coefficient of generation . Here, means the probability that two individuals picked at random will have a common ancestor. At each generation, each individual produces a large number of descendants, from the pool of which individual will be chosen at random to form the new generation. At generation , the probability that two individuals have a common ancestor is "they have a common parent" OR "they descend from two distinct individuals which have a common ancestor" : What is the source of the above formula? Is it in a later paper than the 1948 Reference. This is a recurrence relation easily solved. Considering the worst case where at generation zero, no two individuals have a common ancestor, , we get The scale of the fixation time (average number of generation it takes to homogenize the population) is therefore This computation trivially extends to the inbreeding coefficients of alleles in a sexual population by changing to (the number of gametes). See also Coefficient of relationship Consanguinity Genetic distance
https://en.wikipedia.org/wiki/Ramsey%20class
In the area of mathematics known as Ramsey theory, a Ramsey class is one which satisfies a generalization of Ramsey's theorem. Suppose , and are structures and is a positive integer. We denote by the set of all subobjects of which are isomorphic to . We further denote by the property that for all partitions of there exists a and an such that . Suppose is a class of structures closed under isomorphism and substructures. We say the class has the A-Ramsey property if for ever positive integer and for every there is a such that holds. If has the -Ramsey property for all then we say is a Ramsey class. Ramsey's theorem is equivalent to the statement that the class of all finite sets is a Ramsey class.
https://en.wikipedia.org/wiki/Krypto%20%28game%29
Krypto is a card game designed by Daniel Yovich in 1963 and published by Parker Brothers and MPH Games Co. It is a mathematical game that promotes proficiency with basic arithmetic operations. More detailed analysis of the game can raise more complex statistical questions. Rules The Krypto deck consists of 56 cards: three of each of the numbers 1-6, four each of the numbers 7-10, two each of 11-17, one each of 18-25. Six cards are dealt: a common objective card at the top and five other cards below. Each player must use all five of the cards' numbers exactly once, using any combination of arithmetic operations (addition, subtraction, multiplication, and division), to form the objective card's number. The first player to come up with a correct formula is the winner. International tournament rules The official international rules for Krypto differ slightly from the house rules, and they involve a system of scorekeeping. Five cards are dealt face up in the center of the game table. (Each player works with the same set of five cards, rather than a set exclusive to them.) Then a sixth card is dealt face up in the center of the table that becomes the Objective Card. Each player commences (mentally) to mathematically manipulate the numbers of each card so that the last solution equals the Objective Card number. Krypto International Rules specify the use of whole numbers only, using addition, subtraction, division, multiplication and/or any combination thereof ... fractions, negative numbers or square rooting are not permitted. Each of the five cards must be used once and only once. The first player to solve the problem declares "Krypto" and has 30 seconds to explain the answer. When a player "Kryptos" and cannot relate the proper solution, a new hand is dealt and the hand is replayed. The player that errored receives a minus one point in the score box for that hand and is not eligible to play for a score for the replay of that hand. Each hand must be solved within
https://en.wikipedia.org/wiki/Vectorization%20%28mathematics%29
In mathematics, especially in linear algebra and matrix theory, the vectorization of a matrix is a linear transformation which converts the matrix into a vector. Specifically, the vectorization of a matrix A, denoted vec(A), is the column vector obtained by stacking the columns of the matrix A on top of one another: Here, represents the element in the i-th row and j-th column of A, and the superscript denotes the transpose. Vectorization expresses, through coordinates, the isomorphism between these (i.e., of matrices and vectors) as vector spaces. For example, for the 2×2 matrix , the vectorization is . The connection between the vectorization of A and the vectorization of its transpose is given by the commutation matrix. Compatibility with Kronecker products The vectorization is frequently used together with the Kronecker product to express matrix multiplication as a linear transformation on matrices. In particular, for matrices A, B, and C of dimensions k×l, l×m, and m×n. For example, if (the adjoint endomorphism of the Lie algebra of all n×n matrices with complex entries), then , where is the n×n identity matrix. There are two other useful formulations: More generally, it has been shown that vectorization is a self-adjunction in the monoidal closed structure of any category of matrices. Compatibility with Hadamard products Vectorization is an algebra homomorphism from the space of matrices with the Hadamard (entrywise) product to Cn2 with its Hadamard product: Compatibility with inner products Vectorization is a unitary transformation from the space of n×n matrices with the Frobenius (or Hilbert–Schmidt) inner product to Cn2: where the superscript † denotes the conjugate transpose. Vectorization as a linear sum The matrix vectorization operation can be written in terms of a linear sum. Let X be an matrix that we want to vectorize, and let ei be the i-th canonical basis vector for the n-dimensional space, that is . Let Bi be a block matri
https://en.wikipedia.org/wiki/Seam%20carving
Seam carving (or liquid rescaling) is an algorithm for content-aware image resizing, developed by Shai Avidan, of Mitsubishi Electric Research Laboratories (MERL), and Ariel Shamir, of the Interdisciplinary Center and MERL. It functions by establishing a number of seams (paths of least importance) in an image and automatically removes seams to reduce image size or inserts seams to extend it. Seam carving also allows manually defining areas in which pixels may not be modified, and features the ability to remove whole objects from photographs. The purpose of the algorithm is image retargeting, which is the problem of displaying images without distortion on media of various sizes (cell phones, projection screens) using document standards, like HTML, that already support dynamic changes in page layout and text but not images. Image Retargeting was invented by Vidya Setlur, Saeko Takage, Ramesh Raskar, Michael Gleicher and Bruce Gooch in 2005. The work by Setlur et al. won the 10-year impact award in 2015. Seams Seams can be either vertical or horizontal. A vertical seam is a path of pixels connected from top to bottom in an image with one pixel in each row. A horizontal seam is similar with the exception of the connection being from left to right. The importance/energy function values a pixel by measuring its contrast with its neighbor pixels. Process The below example describes the process of seam carving: The seams to remove depends only on the dimension (height or width) one wants to shrink. It is also possible to invert step 4 so the algorithm enlarges in one dimension by copying a low energy seam and averaging its pixels with its neighbors. Computing seams Computing a seam consists of finding a path of minimum energy cost from one end of the image to another. This can be done via Dijkstra's algorithm, dynamic programming, greedy algorithm or graph cuts among others. Dynamic programming Dynamic programming is a programming method that stores the results
https://en.wikipedia.org/wiki/Tensor%20tympani%20muscle
The tensor tympani is a muscle within the middle ear, located in the bony canal above the bony part of the auditory tube, and connects to the malleus bone. Its role is to dampen loud sounds, such as those produced from chewing, shouting, or thunder. Because its reaction time is not fast enough, the muscle cannot protect against hearing damage caused by sudden loud sounds, like explosions or gunshots. Structure The tensor tympani is a muscle that is present in the middle ear. It arises from the cartilaginous part of the auditory tube, and the adjacent great wing of the sphenoid. It then passes through its own canal, and ends in the tympanic cavity as a slim tendon that connects to the handle of the malleus. The tendon makes a sharp bend around the processus cochleariformis, part of the wall of its cavity, before it joins with the malleus. The tensor tympani receives blood from the middle meningeal artery via the superior tympanic branch. It is one of two muscles in the tympanic cavity, the other being the stapedius. Nerve supply The tensor tympani is supplied by the tensor tympani nerve, a branch of the mandibular branch of the trigeminal nerve. As the tensor tympani is supplied by motor fibers of the trigeminal nerve, it does not receive fibers from the trigeminal ganglion, which has sensory fibers only. Development The tensor tympani muscle develops from mesodermal tissue in the 1st pharyngeal arch. Function The tensor tympani acts to dampen the noise produced by chewing. When tensed, the muscle pulls the malleus medially, tensing the tympanic membrane and damping vibration in the ear ossicles and thereby reducing the perceived amplitude of sounds. It is not to be confused by the acoustic reflex, but can be activated by the startle reflex. Voluntary control Contracting muscles produce vibration and sound. Slow twitch fibers produce 10 to 30 contractions per second (equivalent to 10 to 30 Hz sound frequency). Fast twitch fibers produce 30 to 70 contractions
https://en.wikipedia.org/wiki/Individualized%20medicine
Individualized medicine tailors treatment to a single patient. The term refers to an individual, truly personalized medicine that strives to treat each patient on the basis of his own individual biology. Individualized medicine represents a further individualization of personalized medicine. While the latter is aimed at a specific group of patients, individualized medicine deals with the individual circumstances of a single person. Thus, individualized medicine goes one step further and can be considered as an increase in personalized medicine. Individualized medicine seeks to derive tailored therapies for individuals by taking into account a person's genes as well as the full range of that person's unique nature, including biological, physiological and anatomical information. Background Individualized medicine was first mentioned in the literature in 2003 and described the individual drug metabolism in pharmacogenomics. Subsequently, the term was used to improve diagnosis based on genetic differences and physiological information and to better tailor the treatment to the needs of a single patient. More recently, a second context has been introduced that relates to therapeutic approaches that use a person's own cell material to develop a treatment that is unique to the patient from whom the material originated. Examples are stem-cell therapies and cancer vaccines, which are based on individually distinct molecular profiles. Genome research Genome research has led to new resources that allow more accurate diagnosis and disease management to be tailored to each patient. The challenge of health research is to maximize therapeutic efficacy for each patient while minimizing side effects. An individual medicine approach may be required for those patients who cannot be categorized by mainstream personalized medicine or who suffer diseases without effective drug therapies. The widespread use of advanced imaging techniques and high-throughput technologies that allow f