source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Biological%20Weapons%20Anti-Terrorism%20Act%20of%201989
The Biological Weapons Anti-Terrorism Act of 1989 (BWATA), ) was a piece of U.S. legislation that was passed into law in 1990. It provided for the implementation of the Biological Weapons Convention as well as criminal penalties for violation of its provisions. The law was amended in 1996 and has been used to prosecute several individuals. History The Biological Weapons Anti-Terrorism Act of 1989 (BWATA) was drafted by University of Illinois international law professor Francis Boyle. The law, known as it went through the U.S. Senate during the 101st U.S. Congress as , was introduced to the Senate on May 16, 1989. The bill was sponsored by U.S. Senator Herb Kohl (D-WI) and collected 15 co-sponsors on its way through the Senate. An amended version of the bill passed the Senate in November 1989. The U.S. House of Representatives version of the bill, carrying the same title, was introduced to the House on January 3, 1989. The sponsor of BWATA in the House was Representative Robert W. Kastenmeier (D-WI) and the legislation picked up 52 co-sponsors as it went through the House.<ref name=lawtxt2>, THOMAS.gov, accessed January 10, 2009.</ref> The House of Representatives passed BWATA on May 8, 1990. BWATA was signed into law by then-U.S. President George H. W. Bush on May 22, 1990. BWATA has been expanded two separate times through the implementation of new laws. The first expansion closed certain loopholes that critics complained made prosecution difficult. The Anti-Terrorism and Effective Death Penalty Act of 1996 amended the law to address these issues. (See "prosecution difficulties" below). BWATA was additionally expanded by the USA Patriot Act in 2001. Act Definitions The act broadly defined several terms related to biological warfare (BW). Those terms were: vector, toxin, biological agent and delivery system. BWATA defined a biological agent as:"Original U.S. Interpretation of the BWC", (PDF),Federation of American Scientists, official site, accessed January 10,
https://en.wikipedia.org/wiki/Repetitive%20visual%20stimulus
A repetitive visual stimulus is a visual stimulus that has a distinctive property (e.g., frequency or phase). The stimuli are simultaneously presented to the user when focusing attention on the corresponding stimulus. For example, when the user focuses attention on a repetitive visual stimulus, a steady state visually evoked potential is elicited which manifests as oscillatory components in the user's electroencephalogram, especially in the signals from the primary visual cortex, matching the frequency or harmonics of that stimulus. Repetitive visual stimuli are said to evoke a lesser response in brain cells, specifically superior collicular cells, than moving stimuli. Habituation is very rapid in healthy subjects in reference to repetitive visual stimuli. Development changes around the first year of life are attributed for attention control and these are said to be fully functional around the ages of two and four years old. This is the age that toddlers seem to now prefer moving and changing stimuli, much like healthy adults. In infants, there is evidence that supports the hypothesis that infants prefer repetitive visual stimuli or patterns, in comparison to moving or changing targets.
https://en.wikipedia.org/wiki/Tandemly%20arrayed%20genes
Tandemly arrayed genes (TAGs) are a gene cluster created by tandem duplications, a process in which one gene is duplicated and the copy is found adjacent to the original. They serve to encode large numbers of genes at a time. TAGs represent a large proportion of genes in a genome, including between 14% and 17% of the human, mouse, and rat genomes. TAG clusters may have as few as two genes, with small clusters predominating, but may consist of hundreds of genes. An example are tandem clusters of rRNA encoding genes. These genes are transcribed faster than they would be if only a single copy of the gene was available. Additionally, a single RNA gene may not be able to provide enough RNA, but tandem repeats of the gene allow sufficient RNA to be produced. For example, cells in a human embryo contain between five and ten million ribosomes, and cell number doubles within 24 hours. In order to provide the necessary ribosomes, multiple RNA polymerases must consecutively transcribe multiple rRNA genes. In some species, such as Arabidopsis thaliana and Oryza sativa, most TAGs are the result of unequal chromosomal crossover during genetic recombination. See also Satellite DNA Tandem repeats Notes
https://en.wikipedia.org/wiki/List%20of%20polyhedral%20stellations
In the geometry of three dimensions, a stellation extends a polyhedron to form a new figure that is also a polyhedron. The following is a list of stellations of various polyhedra. See also List of Wenninger polyhedron models The Fifty-Nine Icosahedra Footnotes
https://en.wikipedia.org/wiki/Optical%20metric
The optical metric was defined by German theoretical physicist Walter Gordon in 1923 to study the geometrical optics in curved space-time filled with moving dielectric materials. Let be the normalized (covariant) 4-velocity of the arbitrarily-moving dielectric medium filling the space-time, and assume that the fluid’s electromagnetic properties are linear, isotropic, transparent, nondispersive, and can be summarized by two scalar functions: a dielectric permittivity and a magnetic permeability . Then the optical metric tensor is defined as where is the physical metric tensor. The sign of is determined by the metric signature convention used: is replaced with a plus sign (+) for a metric signature (-,+,+,+), while a minus sign (-) is chosen for (+,-,-,-). The inverse (contravariant) optical metric tensor is where is the contravariant 4-velocity of the moving fluid. Note that the traditional refractive index is defined as . Properties An important fact about Gordon's optical metric is that in curved space-time filled with dielectric material, electromagnetic waves (under geometrical optics approximation) follows geodesics of the optical metric instead of the physical metric. Consequently, the study of geometric optics in curved space-time with dielectric material can sometimes be simplified by using optical metric (note that the dynamics of the physical system is still described by the physical metric). For example, optical metric can be used to study the radiative transfer in stellar atmospheres around compact astrophysical objects such as neutron stars and white dwarfs, and in accretion disks around black holes. In cosmology, optical metric can be used to study the distance-redshift relation in cosmological models in which the intergalactic or interstellar medium have a non-vanishing refraction index. History After the original introduction of the concept of optical metric by Gordon in 1923, the mathematical formalism of optical metric was furth
https://en.wikipedia.org/wiki/Automatic%20identification%20and%20data%20capture
Automatic identification and data capture (AIDC) refers to the methods of automatically identifying objects, collecting data about them, and entering them directly into computer systems, without human involvement. Technologies typically considered as part of AIDC include QR codes, bar codes, radio frequency identification (RFID), biometrics (like iris and facial recognition system), magnetic stripes, optical character recognition (OCR), smart cards, and voice recognition. AIDC is also commonly referred to as "Automatic Identification", "Auto-ID" and "Automatic Data Capture". AIDC is the process or means of obtaining external data, particularly through the analysis of images, sounds, or videos. To capture data, a transducer is employed which converts the actual image or a sound into a digital file. The file is then stored and at a later time, it can be analyzed by a computer, or compared with other files in a database to verify identity or to provide authorization to enter a secured system. Capturing data can be done in various ways; the best method depends on application. In biometric security systems, capture is the acquisition of or the process of acquiring and identifying characteristics such as finger image, palm image, facial image, iris print, or voiceprint which involves audio data, and the rest all involve video data. Radio-frequency identification is relatively a new AIDC technology, which was first developed in the 1980s. The technology acts as a base in automated data collection, identification, and analysis systems worldwide. RFID has found its importance in a wide range of markets, including livestock identification and Automated Vehicle Identification (AVI) systems because of its capability to track moving objects. These automated wireless AIDC systems are effective in manufacturing environments where barcode labels could not survive. Overview of automatic identification methods Nearly all the automatic identification technologies consist of thre
https://en.wikipedia.org/wiki/CYP305%20family
Cytochrome P450, family 305, also known as CYP305, is an animal cytochrome P450 family found in insect genome. The first gene identified in this family is the CYP305A1 from the Drosophila melanogaster (Fruit fly).
https://en.wikipedia.org/wiki/97.5th%20percentile%20point
In probability and statistics, the 97.5th percentile point of the standard normal distribution is a number commonly used for statistical calculations. The approximate value of this number is 1.96, meaning that 95% of the area under a normal curve lies within approximately 1.96 standard deviations of the mean. Because of the central limit theorem, this number is used in the construction of approximate 95% confidence intervals. Its ubiquity is due to the arbitrary but common convention of using confidence intervals with 95% probability in science and frequentist statistics, though other probabilities (90%, 99%, etc.) are sometimes used. This convention seems particularly common in medical statistics, but is also common in other areas of application, such as earth sciences, social sciences and business research. There is no single accepted name for this number; it is also commonly referred to as the "standard normal deviate", "normal score" or "Z score" for the 97.5 percentile point, the .975 point, or just its approximate value, 1.96. If X has a standard normal distribution, i.e. X ~ N(0,1), and as the normal distribution is symmetric, One notation for this number is z.975. From the probability density function of the standard normal distribution, the exact value of z.975 is determined by History The use of this number in applied statistics can be traced to the influence of Ronald Fisher's classic textbook, Statistical Methods for Research Workers, first published in 1925: In Table 1 of the same work, he gave the more precise value 1.959964. In 1970, the value truncated to 20 decimal places was calculated to be 1.95996 39845 40054 23552... The commonly used approximate value of 1.96 is therefore accurate to better than one part in 50,000, which is more than adequate for applied work. Some people even use the value of 2 in the place of 1.96, reporting a 95.4% confidence interval as a 95% confidence interval. This is not recommended but is occasionally seen.
https://en.wikipedia.org/wiki/Rosalind%20Franklin%20and%20DNA
Rosalind Franklin and DNA is a biography of an English chemist Rosalind Franklin (1920–1958) written by her American friend Anne Sayre in 1975. Franklin was a physical chemist who made pivotal research in the discovery of the structure of DNA, known as "the most important discovery" in biology. DNA itself had become "life's most famous molecule". While working at the King's College London in 1951, she discovered two types of DNA called A-DNA and B-DNA. Her X-ray images of DNA indicated helical structure. Her X-ray image of B-DNA (called Photo 51) taken in 1952 became the best evidence for the structure of DNA. For the discovery of the correct chemical structure of DNA, the Nobel Prize in Physiology or Medicine 1962 was shared by her colleagues and close researchers James Watson, Francis Crick and Maurice Wilkins; she had died four years earlier in 1958 making her ineligible for the award. Background Rosalind Franklin joined King's College London in January 1951 to work on the crystallography of DNA. By the end of that year, she established two important facts: one is that phosphate groups, which are the molecular backbone for the nucleotide chains, lie on the outside (it was a general consensus at the time that they were at the inside); and the other is that DNA exists in two forms, a crystalline (dry form) A-DNA and a hydrated (wet form) B-DNA. With her PhD student Raymond Gosling, she produced a series of X-ray images of DNA. The photograph (number 51, hence, popularised as Photo 51) of B-DNA taken in May 1952 was especially crucial. X-ray crystallography did not immediately show the precise helical structure. Franklin chose to work on A-DNA, while B-DNA was given to Maurice Wilkins. By the early 1953, Franklin was aware that both A and B forms of DNA were composed of two helical chains. By then, James Watson and Francis Crick at Cambridge University had built a correct double helical model of DNA, based on her experimental data. The discovery of the structure
https://en.wikipedia.org/wiki/Fog%20%28poem%29
"Fog" is a poem by Carl Sandburg. It first appeared in Sandburg's first mainstream collection of poems, Chicago Poems, published in 1916. Sandburg has described the genesis of the poem. At a time when he was carrying a book of Japanese Haiku, he went to interview a juvenile court judge, and he had cut through Grant Park and saw the fog over Chicago harbor. He had certainly seen many fogs before, but this time he had to wait forty minutes for the judge, and he only had a piece of newsprint handy, so he decided to create an "American Haiku". Anthologies This poem has been frequently anthologized. Perhaps the earliest was . Reception Harriet Monroe, the editor of Poetry who first published several of the poems that went into Chicago Poems, said as part of her review of that collection: Staging In 1959 and 1960, Bette Davis and her husband Gary Merrill toured the nation, putting on The World of Carl Sandburg, a dramatic staged reading of selected Sandburg poetry and prose, culminating in a one-month run on Broadway (with Leif Erickson instead of Merrill). One review described highlights of Davis's performance, including: Recordings TC 1253 A vinyl LP of Carl Sandburg reading some of his poems, Carl Sandburg reading Fog and other poems was released on Caedmon (TC 1253) in 1968. Description: 2s. : 33 rpm, stereo ; 12in. Reviewed: An online link to Sandburg reading "Fog" is maintained by the state of Illinois. Influence The poet Richard Brautigan wrote a parody of the poem around 1956. The poem was once loosely paraphrased on a 2008 episode of The McLaughlin Group during which host John Mclaughlin and conservative commentator Pat Buchanan discussed the candidacy of 2008 Republican Presidential nominee John McCain. This exchange was later revisited when Andrew WK included a version of the conversation in a rock anthem song he composed which was featured on Public Radio International.
https://en.wikipedia.org/wiki/Object%20request%20broker
In distributed computing, an object request broker (ORB) is a concept of a middleware, which allows program calls to be made from one computer to another via a computer network, providing location transparency through remote procedure calls. ORBs promote interoperability of distributed object systems, enabling such systems to be built by piecing together objects from different vendors, while different parts communicate with each other via the ORB. Common Object Request Broker Architecture (by Object Management Group) standardizes the way ORB may be implemented. Overview ORBs assumed to handle the transformation of in-process data structures to and from the raw byte sequence, which is transmitted over the network. This is called marshalling or serialization. In addition to marshalling data, ORBs often expose many more features, such as distributed transactions, directory services or real-time scheduling. Some ORBs, such as CORBA-compliant systems, use an interface description language to describe the data that is to be transmitted on remote calls. In object-oriented languages (.e.g. java), an ORB actually provides a framework which enables remote objects to be used over the network, in the same way as if they were local and part of the same process. On the client side, so-called stub objects are created and invoked, serving as the only part visible and used inside the client application. After the stub's methods are invoked, the client-side ORB performs the marshalling of invocation data, and forwards the request to the server-side ORB. On the server side, ORB locates the targeted object, executes the requested operation, and returns the results. Having the results available, the client's ORB performs the demarshalling and passes the results back into the invoked stub, making them available to the client application. The whole process is transparent, resulting in remote objects appearing as if they were local. Implementations CORBA - Common Object Reque
https://en.wikipedia.org/wiki/Hermann%20Rothe
Hermann Rothe (28 December 1882 in Vienna – 18 December 1923 in Vienna) was an Austrian mathematician. Rothe studied at the University of Vienna and the University of Göttingen. He attained the Doctorate in Engineering in 1909 in Vienna. Then he was assistant at the Vienna University of Technology, where he attained the Habilitation in 1910. In 1913 Rothe married and began to teach mathematics at the Vienna University of Technology as Professor extraordinarius, and from 1920 as Professor ordinarius. In 1923 he died after a long disease. Rothe is known for his collaboration (1910–1912) with Philipp Frank on special relativity. Based on group theory, they tried to derive the Lorentz transformation without the postulate of the constancy of the speed of light. Furthermore, Rothe worked — outside his teaching activity — on mathematical problems like Hermann Grassmann's "Ausdehnungslehre" (theory of extension, or exterior algebra). Publications See also Equichordal point problem Postulates of special relativity
https://en.wikipedia.org/wiki/Hadamard%27s%20inequality
In mathematics, Hadamard's inequality (also known as Hadamard's theorem on determinants) is a result first published by Jacques Hadamard in 1893. It is a bound on the determinant of a matrix whose entries are complex numbers in terms of the lengths of its column vectors. In geometrical terms, when restricted to real numbers, it bounds the volume in Euclidean space of n dimensions marked out by n vectors vi for 1 ≤ i ≤ n in terms of the lengths of these vectors ||vi||. Specifically, Hadamard's inequality states that if N is the matrix having columns vi, then If the n vectors are non-zero, equality in Hadamard's inequality is achieved if and only if the vectors are orthogonal. Alternate forms and corollaries A corollary is that if the entries of an n by n matrix N are bounded by B, so |Nij|≤B for all i and j, then In particular, if the entries of N are +1 and −1 only then In combinatorics, matrices N for which equality holds, i.e. those with orthogonal columns, are called Hadamard matrices. A positive-semidefinite matrix P can be written as N*N, where N* denotes the conjugate transpose of N (see Decomposition of a semidefinite matrix). Then So, the determinant of a positive definite matrix is less than or equal to the product of its diagonal entries. Sometimes this is also known as Hadamard's inequality. Proof The result is trivial if the matrix N is singular, so assume the columns of N are linearly independent. By dividing each column by its length, it can be seen that the result is equivalent to the special case where each column has length 1, in other words if ei are unit vectors and M is the matrix having the ei as columns then and equality is achieved if and only if the vectors are an orthogonal set. The general result now follows: To prove , consider P =M*M and let the eigenvalues of P be λ1, λ2, … λn. Since the length of each column of M is 1, each entry in the diagonal of P is 1, so the trace of P is n. Applying the inequality of arithmetic and geom
https://en.wikipedia.org/wiki/Space%20Invaders
is a 1978 shoot 'em up arcade video game developed and released by Taito in Japan, and licensed to Midway Manufacturing for overseas distribution. Space Invaders was the first fixed shooter and set the template for the genre. The goal is to defeat wave after wave of descending aliens with a horizontally moving laser to earn as many points as possible. Designer Tomohiro Nishikado drew inspiration from North American target shooting games like Breakout (1976) and Gun Fight (1975), as well as science fiction narratives such as the novel The War of the Worlds (1897), the anime Space Battleship Yamato (1974), and the film Star Wars (1977). To complete development of the game, he had to design custom hardware and development tools. Upon release, Space Invaders was an immediate commercial success; by 1982, it had grossed $3.8 billion ($ billion in -adjusted terms), with a net profit of $450 million ($ billion in terms). This made it the best-selling video game and highest-grossing entertainment product at the time, and the highest-grossing video game of all time. Space Invaders is considered one of the most influential video games of all time. It ushered in the golden age of arcade video games. It was the inspiration for numerous video games and game designers across different genres, and has been ported and re-released in various forms. The 1980 Atari VCS version quadrupled sales of the VCS, thereby becoming the first killer app for video game consoles. More broadly, the pixelated enemy alien has become a pop culture icon, often representing video games as a whole. Gameplay Space Invaders is a fixed shooter in which the player moves a laser cannon horizontally across the bottom of the screen and fires at aliens overhead. The aliens begin as five rows of eleven that move left and right as a group, shifting downward each time they reach a screen edge. The goal is to eliminate all of the aliens by shooting them. While the player has three lives, the game ends immediatel
https://en.wikipedia.org/wiki/Ziehl%E2%80%93Neelsen%20stain
The Ziehl-Neelsen stain, also known as the acid-fast stain, is a bacteriological staining technique used in cytopathology and microbiology to identify acid-fast bacteria under microscopy, particularly members of the Mycobacterium genus. This staining method was initially introduced by Paul Ehrlich (1854–1915) and subsequently modified by the German bacteriologists Franz Ziehl (1859–1926) and Friedrich Neelsen (1854–1898) during the late 19th century. The acid-fast staining method, in conjunction with auramine phenol staining, serves as the standard diagnostic tool and is widely accessible for rapidly diagnosing tuberculosis (caused by Mycobacterium tuberculosis) and other diseases caused by atypical mycobacteria, such as leprosy (caused by Mycobacterium leprae) and Mycobacterium avium-intracellulare infection (caused by Mycobacterium avium complex) in samples like sputum, gastric washing fluid, and bronchoalveolar lavage fluid. These acid-fast bacteria possess a waxy lipid-rich outer layer that contains high concentrations of mycolic acid, rendering them resistant to conventional staining techniques like the Gram stain. After the Ziehl-Neelsen staining procedure using carbol fuchsin, acid-fast bacteria are observable as vivid red or pink rods set against a blue or green background, depending on the specific counterstain used, such as methylene blue or malachite green, respectively. Non-acid-fast bacteria and other cellular structures will be colored by the counterstain, allowing for clear differentiation. Mycobacteria In anatomic pathology specimens, immunohistochemistry and modifications of Ziehl–Neelsen staining (such as Fite-Faraco staining) have comparable diagnostic utility in identifying Mycobacterium. Both of them are superior to traditional Ziehl–Neelsen stain. Mycobacterium are slow-growing rod-shaped bacilli that are slightly curved or straight, and are considered to be Gram positive. Some mycobacteria are free-living saprophytes, but many are pathogen
https://en.wikipedia.org/wiki/Walking%20fish
A walking fish, or ambulatory fish, is a fish that is able to travel over land for extended periods of time. Some other modes of non-standard fish locomotion include "walking" along the sea floor, for example, in handfish or frogfish. Types Most commonly, walking fish are amphibious fish. Able to spend longer times out of water, these fish may use a number of means of locomotion, including springing, snake-like lateral undulation, and tripod-like walking. The mudskippers are probably the best land-adapted of contemporary fish and are able to spend days moving about out of water and can even climb mangroves, although to only modest heights. The climbing gourami is often specifically referred to as a "walking fish", although it does not actually "walk", but rather moves in a jerky way by supporting itself on the extended edges of its gill plates and pushing itself by its fins and tail. Some reports indicate that it can also climb trees. The epaulette shark (Hemiscyllium ocellatum) tends to live in shallow waters where swimming is difficult, and can often be seen walking over rocks and sand by using its muscular pectoral fins. It lives in areas of great variation in water depth, usually where the tide falls below its location. If it finds itself out of water, it can survive for several hours, and is capable of walking over land to get to water. This means that it is easily observed by beachgoers in its natural range. There are a number of fish that are less adept at actual walking, such as the walking catfish. Despite being known for "walking on land", this fish usually wriggles and may use its pectoral fins to aid in its movement. Walking catfish have a respiratory system that allows them to live out of water for several days. Some are invasive species, for example, the northern snakehead in the U.S. Polypterids have rudimentary lungs and can also move about on land, though rather clumsily. The mangrove rivulus can survive for months out of water and can move to
https://en.wikipedia.org/wiki/Sauerkraut
Sauerkraut (; , ) is finely cut raw cabbage that has been fermented by various lactic acid bacteria. It has a long shelf life and a distinctive sour flavor, both of which result from the lactic acid formed when the bacteria ferment the sugars in the cabbage leaves. Although it is considered a national dish in Germany and is known under its German name in English-speaking countries, it did not originate in Germany and is also a traditional and ubiquitous dish in Central and Eastern Europe. Overview and history Fermented foods have a long history in many cultures, with sauerkraut being one of the most well-known instances of traditional fermented moist cabbage side dishes. The Roman writers Cato (in his De Agri Cultura) and Columella (in his De re Rustica) mentioned preserving cabbages and turnips with salt. Popular folklore has imagined that sauerkraut was introduced to Europe by the trade networks formed across Eurasia by the Golden Horde. However, according to Mack and Surina (2005), there is no evidence to support this theory, nor any evidence that fermented cabbage arrived from an East Asian source, and there is evidence of sauerkraut production in Europe dating back to the early period of the Western Roman Empire. Although "sauerkraut" is from a German word (Sauerkraut), the dish did not originate in Germany. Some claim fermenting cabbage suan cai was already practised in the days of the building of the Great Wall of China. However, the Romans, as previously noted, pickled forms of cabbage, and were the more likely source of modern-day European sauerkraut. It then took root in Central and Eastern European cuisines, but also in other countries including the Netherlands, where it is known as zuurkool, and France, where the name became choucroute. According to Mack and Surina (2005), the Slavic peoples of Europe likely discovered fermented cabbage on their own. The English name is borrowed from German where it means "sour cabbage". The names in Slavic and ot
https://en.wikipedia.org/wiki/Critical%20variable
Critical variables are defined, for example in thermodynamics, in terms of the values of variables at the critical point. On a PV diagram, the critical point is an inflection point. Thus: For the van der Waals equation, the above yields: Thermodynamic properties Conformal field theory
https://en.wikipedia.org/wiki/Prairie%20View%20Rotamak
The Prairie View (PV) Rotamak is a plasma physics experiment at Prairie View A&M University. The experiment studies magnetic plasma confinement to support controlled nuclear fusion experiments. Specifically, the PV Rotamak can be used as either a spherical tokamak or a field-reversed configuration. Some time between 2015 and 2017, most personnel moved on to advanced career opportunities. In 2017, a Final Report to Department of Energy (DOE) was prepared and submitted by Dr. Saganti of PVAMU on the entire research work supported by DOE for 12 years. Background FRCs and spherical tokamaks are of interest to the plasma physics community because of their confinement properties and their small size. While most large fusion experiments in the world are tokamaks, FRCs and STs are seen as a viable alternative because of their higher Beta, meaning the same power output could be produced from a smaller volume of plasma, and their good plasma stability. History The PV Rotamak was built in 2001, largely out of components of the disassembled Flinders Rotamak. The PV Rotamak has furnished the experimental data to produce more than 12 academic papers on plasma physics as of 2017. More recent pictorial depictions and short videos with all the equipment layout can be found from Saganti-PVSO Google Site. Apparatus The experimental apparatus consists of a vacuum vessel, electromagnetic coils, a high-power radio-frequency (RF) generation system to run the rotating magnetic field (RMF), and diagnostics. The vacuum vessel is made of Pyrex glass and is 80 cm long and 40 cm in diameter. The electromagnetic coils can produce up to 230 Gauss (0.023 Tesla) magnetic fields center of the vacuum vessel. Another electromagnetic coil running through the axis of the vacuum vessel can produce the magnetic field necessary to make the apparatus a spherical tokamak. The RF generation system can deliver 400 kW of power to the plasma in the form of a rotating magnetic field at a frequency of 500 
https://en.wikipedia.org/wiki/Differential%20item%20functioning
Differential item functioning (DIF) is a statistical characteristic of an item that shows the extent to which the item might be measuring different abilities for members of separate subgroups. Average item scores for subgroups having the same overall score on the test are compared to determine whether the item is measuring in essentially the same way for all subgroups. The presence of DIF requires review and judgment, and it does not necessarily indicate the presence of bias. DIF analysis provides an indication of unexpected behavior of items on a test. An item does not display DIF if people from different groups have a different probability to give a certain response; it displays DIF if and only if people from different groups with the same underlying true ability have a different probability of giving a certain response. Common procedures for assessing DIF are Mantel-Haenszel, item response theory (IRT) based methods, and logistic regression. Description DIF refers to differences in the functioning of items across groups, oftentimes demographic, which are matched on the latent trait or more generally the attribute being measured by the items or test. It is important to note that when examining items for DIF, the groups must be matched on the measured attribute, otherwise this may result in inaccurate detection of DIF. In order to create a general understanding of DIF or measurement bias, consider the following example offered by Osterlind and Everson (2009). In this case, Y refers to a response to a particular test item which is determined by the latent construct being measured. The latent construct of interest is referred to as theta (θ) where Y is an indicator of θ which can be arranged in terms of the probability distribution of Y on θ by the expression f(Y)|θ. Therefore, response Y is conditional on the latent trait (θ). Because DIF examines differences in the conditional probabilities of Y between groups, let us label the groups as the "reference" and "fo
https://en.wikipedia.org/wiki/Nuclear%20Terrorism%3A%20The%20Ultimate%20Preventable%20Catastrophe
Nuclear Terrorism: The Ultimate Preventable Catastrophe is a 2004 book by Harvard scholar Graham Allison. Allison explains that terrorists have been striving to acquire and then use nuclear weapons against the United States. During the 2004 U.S. Presidential election, President George W. Bush and Senator John Kerry featured the issue of terrorism in their foreign policy platforms, and both said it is the nation's foremost security challenge. Nuclear Terrorism is described as a well-written report for general readers on the terrorist threat and what is needed to reduce it. According to Warren Buffett in 2005: See also List of books about nuclear issues On Nuclear Terrorism The Four Faces of Nuclear Terrorism The Seventh Decade
https://en.wikipedia.org/wiki/Thiamine%20transporter
Members of this protein family have been assigned as thiamine transporters by a phylogenomic analysis of families of genes regulated by the THI element, a broadly conserved RNA secondary structure element through which thiamine pyrophosphate (TPP) levels can regulate transcription of many genes related to thiamine transport, salvage, and de novo biosynthesis. Species with this protein always lack the ThiBPQ ABC transporter. In some species (e.g. Streptococcus mutans and Streptococcus pyogenes), is the only THI-regulated gene. Evidence from Bacillus cereus indicates thiamine uptake is coupled to proton translocation. This family includes human solute transporters SLC19A1, SLC19A2 and SLC19A3.
https://en.wikipedia.org/wiki/Superorganism
A superorganism or supraorganism is a group of synergetically interacting organisms of the same species. A community of synergetically interacting organisms of different species is called a holobiont. Concept The term superorganism is used most often to describe a social unit of eusocial animals, where division of labour is highly specialised and where individuals are not able to survive by themselves for extended periods. Ants are the best-known example of such a superorganism. A superorganism can be defined as "a collection of agents which can act in concert to produce phenomena governed by the collective", phenomena being any activity "the hive wants" such as ants collecting food and avoiding predators, or bees choosing a new nest site. In challenging environments, micro organisms collaborate and evolve together to process unlikely sources of nutrients such as methane. This process called syntrophy ("eating together") might be linked to the evolution of eukaryote cells and involved in the emergence or maintenance of life forms in challenging environments on Earth and possibly other planets. Superorganisms tend to exhibit homeostasis, power law scaling, persistent disequilibrium and emergent behaviours. The term was coined in 1789 by James Hutton, the "father of geology", to refer to Earth in the context of geophysiology. The Gaia hypothesis of James Lovelock, and Lynn Margulis as well as the work of Hutton, Vladimir Vernadsky and Guy Murchie, have suggested that the biosphere itself can be considered a superorganism, although this has been disputed. This view relates to systems theory and the dynamics of a complex system. The concept of a superorganism raises the question of what is to be considered an individual. Toby Tyrrell's critique of the Gaia hypothesis argues that Earth's climate system does not resemble an animal's physiological system. Planetary biospheres are not tightly regulated in the same way that animal bodies are: "planets, unlike animals,
https://en.wikipedia.org/wiki/Selection%20rule
In physics and chemistry, a selection rule, or transition rule, formally constrains the possible transitions of a system from one quantum state to another. Selection rules have been derived for electromagnetic transitions in molecules, in atoms, in atomic nuclei, and so on. The selection rules may differ according to the technique used to observe the transition. The selection rule also plays a role in chemical reactions, where some are formally spin-forbidden reactions, that is, reactions where the spin state changes at least once from reactants to products. In the following, mainly atomic and molecular transitions are considered. Overview In quantum mechanics the basis for a spectroscopic selection rule is the value of the transition moment integral  where and are the wave functions of the two states, "state 1" and "state 2", involved in the transition, and is the transition moment operator. This integral represents the propagator (and thus the probability) of the transition between states 1 and 2; if the value of this integral is zero then the transition is "forbidden". In practice, to determine a selection rule the integral itself does not need to be calculated: It is sufficient to determine the symmetry of the transition moment function If the transition moment function is symmetric over all of the totally symmetric representation of the point group to which the atom or molecule belongs, then the integral's value is (in general) not zero and the transition is allowed. Otherwise, the transition is "forbidden". The transition moment integral is zero if the transition moment function, is anti-symmetric or odd, i.e. holds. The symmetry of the transition moment function is the direct product of the parities of its three components. The symmetry characteristics of each component can be obtained from standard character tables. Rules for obtaining the symmetries of a direct product can be found in texts on character tables. Examples Electronic spectra Th
https://en.wikipedia.org/wiki/OpenPIC%20and%20MPIC
In order to compete with Intel's Advanced Programmable Interrupt Controller (APIC), which had enabled the first Intel 486-based multiprocessor systems, in early 1995 AMD and Cyrix proposed as somewhat similar-in-purpose OpenPIC architecture supporting up to 32 processors. The OpenPIC architecture had at least declarative support from IBM and Compaq around 1995. No x86 motherboard was released with OpenPIC however. After the OpenPIC's failure in the x86 market, AMD licensed the Intel APIC Architecture for its AMD Athlon and later processors. IBM however developed their Multiprocessor Interrupt Controller (MPIC) based on the OpenPIC register specification. In the reference IBM design, the processors share the MPIC over a DCR bus, with their access to the bus controlled by a DCR Arbiter. MPIC supports up to four processors and up to 128 interrupt sources. Through various implementations, the MPIC was included in PowerPC reference designs and some retail computers. IBM used a MPIC based on OpenPIC 1.0 in their RS/6000 F50 and one based on OpenPIC 1.2 in their RS/6000 S70. Both of these systems also used a dual 8259 on their PCI-ISA bridges. An IBM MPIC was also used in the RS/6000 7046 Model B50. The Apple Hydra Mac I/O (MIO) chip (from the 1990s classic Mac OS era) implemented a MPIC alongside a SCSI controller, ADB controller, GeoPort controller, and timers. The Apple implementation of "Open PIC" (as the Apple documentation of this era spells it) in their first MIO chip for the Common Hardware Reference Platform was based on version 1.2 of the register specification and supported up to two processors and up to 20 interrupt sources. A MPIC was also incorporated in the newer K2 I/O controller used in the Power Mac G5s. Freescale also uses a MPIC ("compatible with the Open PIC") on all its PowerQUICC and QorIQ processors. The Linux Kernel-based Virtual Machine (KVM) supports a virtualized MPIC with up to 256 interrupts, based on the Freescale variants. See also Pr
https://en.wikipedia.org/wiki/Instruction%20cycle
The instruction cycle (also known as the fetch–decode–execute cycle, or simply the fetch-execute cycle) is the cycle that the central processing unit (CPU) follows from boot-up until the computer has shut down in order to process instructions. It is composed of three main stages: the fetch stage, the decode stage, and the execute stage. In simpler CPUs, the instruction cycle is executed sequentially, each instruction being processed before the next one is started. In most modern CPUs, the instruction cycles are instead executed concurrently, and often in parallel, through an instruction pipeline: the next instruction starts being processed before the previous instruction has finished, which is possible because the cycle is broken up into separate steps. Role of components The program counter (PC) is a special register that holds the memory address of the next instruction to be executed. During the fetch stage, the address stored in the PC is copied into the memory address register (MAR) and then the PC is incremented in order to "point" to the memory address of the next instruction to be executed. The CPU then takes the instruction at the memory address described by the MAR and copies it into the memory data register (MDR). The MDR also acts as a two-way register that holds data fetched from memory or data waiting to be stored in memory (it is also known as the memory buffer register (MBR) because of this). Eventually, the instruction in the MDR is copied into the current instruction register (CIR) which acts as a temporary holding ground for the instruction that has just been fetched from memory. During the decode stage, the control unit (CU) will decode the instruction in the CIR. The CU then sends signals to other components within the CPU, such as the arithmetic logic unit (ALU) and the floating point unit (FPU). The ALU performs arithmetic operations such as addition and subtraction and also multiplication via repeated addition and division via repeated sub
https://en.wikipedia.org/wiki/Gradient%20enhanced%20NMR%20spectroscopy
Gradient enhanced NMR is a method for obtaining high resolution nuclear magnetic resonance spectra without the need for phase cycling. Gradient methodology is used extensively for two purposes, either rephasing (selection) or dephasing (elimination) of a particular magnetization transfer pathway. It includes the application of magnetic field gradient pulses to select specific coherences. By using actively shielded gradients, a gradient pulse is applied during the evolution period of the selected coherence to dephase the transverse magnetization and another gradient pulse refocuses the desired coherences remaining during the acquisition period. Advantages Significant reduction in measuring time Reduced T1 artifacts Elimination of phase cycling and difference methods Possibility for three and four-quantum editing The ability to detect resonances at the same chemical shift as a strong solvent resonance Drawbacks A need for field-frequency-lock blanking during long runs. Examples Selection of transverse magnetization (Ix, Sx, Iy etc.): (+)gradient 180°(x) (+)gradient Suppression of transverse magnetization (Ix, Sx, Iy etc.): (+)gradient 180°(x) (-)gradient
https://en.wikipedia.org/wiki/Conservation%20medicine
Conservation medicine is an emerging, interdisciplinary field that studies the relationship between human and animal health and environmental conditions. Specifically, conservation medicine is the study of how the health of humans, animals, and the environment are interconnected and affected by conservation issues. It is also known as planetary health, environmental medicine, medical geology, or ecological medicine. The environmental causes of health problems are complex, global, and poorly understood. Conservation medicine practitioners form multidisciplinary teams to tackle these issues. Teams may involve physicians and veterinarians working alongside researchers and clinicians from diverse disciplines, including microbiologists, pathologists, landscape analysts, marine biologists, toxicologists, epidemiologists, climate biologists, anthropologists, economists, and political scientists. Prevalence A physician in the 1800s, Rudolf Virchow, once said "between animal and human medicine, there is no dividing line- nor should there be". The intersection of the health of animals, humans, and their environment has been an area of discussion since then. The term conservation medicine was first described in the 1990s with the recognition of the impact human population, environmental degradation, illegal hunting, and biodiversity loss contributed to the health of wildlife populations in Africa. The increasing interest in conservation medicine since then represents a significant development in both medicine and environmentalism. While the initial discovery of conservation medicine focused on health of wildlife populations, it became apparent that human health is also impacted by animals and the environment as humans became more aware of zoonotic diseases. Diseases that spread between animals and humans such as certain strains of the flu, salmonellosis, West Nile virus, the plague, coronaviruses (severe acute respiratory syndrome (SARS) and Middle East respiratory syndro
https://en.wikipedia.org/wiki/PANTHER
In bioinformatics, the PANTHER (protein analysis through evolutionary relationships) classification system is a large curated biological database of gene/protein families and their functionally related subfamilies that can be used to classify and identify the function of gene products. PANTHER is part of the Gene Ontology Reference Genome Project designed to classify proteins and their genes for high-throughput analysis. The project consists of both manual curation and bioinformatics algorithms. Proteins are classified according to family (and subfamily), molecular function, biological process and pathway. It is one of the databases feeding into the European Bioinformatics Institute's InterPro database.—Application of PANTHER—The most important application of PANTHER is to accurately infer the function of uncharacterized genes from any organism based on their evolutionary relationships to genes with known functions. By combining gene function, ontology, pathways and statistical analysis tools, PANTHER enables biologists to analyze large-scale, genome-wide data obtained from the current advance technology including: sequencing, proteomics or gene expression experiments. Shortly, using the data and tools on the PANTHER, users will be able to: Obtain information about a particular gene of interest. Discover protein families and subfamilies, pathways, biological processes, molecular functions and cellular components. Create lists of genes related to a particular protein family/subfamily, molecular function, biological process or pathway. Analyze lists of genes, proteins or transcripts. PANTHER history 1998:Project was launched at Molecular Application Group. 1999:Acquired by Celera Genomics. 2000:PANTHER 1 released in Celera Discovery Systems (CDS). 2001: PANTHER 2 released, which is used in the annotationon of the first published human genome Celera. 2002: PANTHER 3 released. PANTHER annotations are integrated in FlyBase. Moved to ABI. 2003: PANTHER 4 rele
https://en.wikipedia.org/wiki/A20%20line
The A20, or address line 20, is one of the electrical lines that make up the system bus of an x86-based computer system. The A20 line in particular is used to transmit the 21st bit on the address bus. A microprocessor typically has a number of address lines equal to the base-two logarithm of the number of words in its physical address space. For example, a processor with 4 GB of byte-addressable physical space requires 32 lines (log2(4 GB) = log2(232 B) = 32), which are named A0 through A31. The lines are named after the zero-based number of the bit in the address that they are transmitting. The least significant bit is first and is therefore numbered bit 0 and signaled on line A0. A20 transmits bit 20 (the 21st bit) and becomes active once addresses reach 1 MB, or 220. Overview The Intel 8086, Intel 8088, and Intel 80186 processors had 20 address lines, numbered A0 to A19; with these, the processor can access 220 bytes, or 1 MB. Internal address registers of such processors only had 16 bits. To access a 20-bit address space, an external memory reference was made up of a 16-bit offset address added to a 16-bit segment number, shifted 4 bits to the left so as to produce a 20-bit physical address. The resulting address is equal to segment × 16 + offset. There are many combinations of segment and offset that produce the same 20-bit physical address. Therefore, there were various ways to address the same byte in memory. For example, here are four of the 4096 different segment:offset combinations, all referencing the byte whose physical address is 0x000FFFFF (the last byte in 1 MB-memory space): F000:FFFF FFFF:000F F555:AAAF F800:7FFF Referenced the last way, an increase of one in the offset yields F800:8000, which is a proper address for the processor, but since it translates to the physical address 0x00100000 (the first byte over 1 MB), the processor would need another address line for actual access to that byte. Since there is no such line on the 8086 line o
https://en.wikipedia.org/wiki/List%20of%20performance%20analysis%20tools
This is a list of performance analysis tools for use in software development. General purpose, language independent The following tools work based on log files that can be generated from various systems. time (Unix) - can be used to determine the run time of a program, separately counting user time vs. system time, and CPU time vs. clock time. timem (Unix) - can be used to determine the wall-clock time, CPU time, and CPU utilization similar to time (Unix) but supports numerous extensions. Supports reporting peak resident set size, major and minor page faults, priority and voluntary context switches via getrusage. Supports sampling procfs on supporting systems to report metrics such as page-based resident set size, virtual memory size, read-bytes, and write-bytes, etc. Supports collecting hardware counters when built with PAPI support. Multiple languages The following tools work for multiple languages or binaries. C and C++ Arm MAP, a performance profiler supporting Linux platforms. AppDynamics, an application performance management solution for C/C++ applications via SDK. AQtime Pro, a performance profiler and memory allocation debugger that can be integrated into Microsoft Visual Studio, and Embarcadero RAD Studio, or can run as a stand-alone application. IBM Rational Purify was a memory debugger allowing performance analysis. Instruments (bundled with Xcode) is used to profile an executable's memory allocations, time usage, filesystem activity, GPU activity etc. Intel Parallel Studio contains Intel VTune Amplifier, which tunes both serial and parallel programs. It also includes Intel Advisor and Intel Inspector. Intel Advisor optimizes vectorization (use of SIMD instructions) and prototypes threading implementations. Intel Inspector detects and debugs races, deadlocks and memory errors. Parasoft Insure++ provides a graphical tool that displays and animates memory allocations in real time to expose memory blowout, fragmentation, overuse, bottlenec
https://en.wikipedia.org/wiki/Configurable%20mixed-signal%20IC
Configurable Mixed-signal IC (abbreviated as CMIC) is a category of ICs comprising a matrix of analog and digital blocks which are configurable through programmable (OTP) non-volatile memory. The technology, in combination with its design software and development kits, allows immediate prototyping of custom mixed-signal circuits, as well as the integration of multiple discrete components into a single IC to reduce PCB cost, size and assembly issues. See also Field-programmable analog array Programmable system-on-chip
https://en.wikipedia.org/wiki/Costly%20signaling%20theory%20in%20evolutionary%20psychology
Costly signaling theory in evolutionary psychology refers to uses of costly signaling theory and adaptationism in explanations for psychological traits and states. Often informed by the closely related fields of human behavioral ecology and cultural evolution, such explanations are predominantly focused on humans and emphasize the benefits of altering the perceptions of others and the need to do so in ways that are difficult to fake due to the widespread existence of adaptations which demand reliable information to avoid manipulation through dishonest signals. Although initially created to explain costly morphological traits as honest signals of an individual's underlying quality resulting from sexual selection, the scope of costly signaling theory has been expanded to include signals of cooperative intent and need, with the targets of such signals often going beyond potential mates. Costly signaling background Almost any organism can benefit from altering the perceptions, behavior, and physiology of others in its environment in ways that favor itself. Particularly true in social species, the result is often investment in signals to enhance one’s perceived attractiveness, formidability, or cooperative value to members of their own species. A signal differs from a cue in that signals evolved to influence the behavior or perceptions of others, while a cue is any piece of information an organism uses to alter its current state that was not created for this purpose. As signals evolve due to their communicative effects and are often not fully linked to the qualities being signaled, they have the potential to be easily faked by those who do not possess a trait. Such faking would likely be favored through natural selection due to the ubiquity of conflicts of interests among living things creating situations in which the negative impacts on others are either not relevant or still worth the benefits to the signaler. Although there are substantial risks of being deceive
https://en.wikipedia.org/wiki/Chartered%20Institute%20of%20Ecology%20and%20Environmental%20Management
The Chartered Institute of Ecology and Environmental Management (CIEEM, ) is the professional body which represents and supports ecologists and environmental managers, mainly in the United Kingdom but increasingly in Ireland and mainland Europe, and the rest of the world. CIEEM's vision is of a healthy natural environment for the benefit of current and future generations. Established in 1991, CIEEM now has over 6,000 members drawn from local authorities, government agencies, industry, environmental consultancy, teaching/research, and NGOs. Formerly known as IEEM, CIEEM attained a royal charter in 2013, being recognised for its high level of professionalism. The Inaugural President from 1991–94 was the ecologist Tony Bradshaw FRS. Activities of CIEEM CIEEM provides a variety of services (including conferences, training, events, guidance and advice) to develop the competency and standards of professional ecologists and environmental managers and also to promote ecology and environmental management as a profession. CIEEM members are able to become Chartered Ecologists and/or Chartered Environmentalists. CIEEM is a constituent body of the Society for the Environment and the Environmental Policy Forum (EPF). CIEEM is also a member of the IUCN-UK Committee and a supporter member of Greener UK. CIEEM is a member of the UN Decade of Biodiversity 2011-2020 partnership, and was a signatory of the Countdown 2010 agreement to help save biodiversity and a member of the 2010 International Year of Biodiversity UK partnership. Awards The Institute makes a number of annual awards including: CIEEM Medal The CIEEM Medal is the Institute’s premier award and is presented in recognition of an outstanding single or lifelong contribution to the field of ecology and environmental management. Best Practice Awards Five best practice awards recognise the highest standards of ecological and environmental management practice by CIEEM members. Tony Bradshaw Award The Tony Bradshaw
https://en.wikipedia.org/wiki/User-Agent%20header
In computing, the User-Agent header is an HTTP header intended to identify the user agent responsible for making a given HTTP request. Whereas the character sequence User-Agent comprises the name of the header itself, the header value that a given user agent uses to identify itself is colloquially known as its user agent string. The user agent for the operator of a computer used to access the Web has encoded within the rules that govern its behavior the knowledge of how to negotiate its half of a request-response transaction; the user agent thus plays the role of the client in a client–server system. Often considered useful in networks is the ability to identify and distinguish the software facilitating a network session. For this reason, the User-Agent HTTP header exists to identify the client software to the responding server. Use in client requests When a software agent operates in a network protocol, it often identifies itself, its application type, operating system, device model, software vendor, or software revision, by submitting a characteristic identification string to its operating peer. In HTTP, SIP, and NNTP protocols, this identification is transmitted in a header field User-Agent. Bots, such as Web crawlers, often also include a URL and/or e-mail address so that the Webmaster can contact the operator of the bot. In HTTP, the "user agent string" is often used for content negotiation, where the origin server selects suitable content or operating parameters for the response. For example, the user agent string might be used by a web server to choose variants based on the known capabilities of a particular version of client software. The concept of content tailoring is built into the HTTP standard in RFC 1945 "for the sake of tailoring responses to avoid particular user agent limitations". The user agent string is one of the criteria by which Web crawlers may be excluded from accessing certain parts of a website using the Robots Exclusion Standard (
https://en.wikipedia.org/wiki/Quantum-confined%20Stark%20effect
The quantum-confined Stark effect (QCSE) describes the effect of an external electric field upon the light absorption spectrum or emission spectrum of a quantum well (QW). In the absence of an external electric field, electrons and holes within the quantum well may only occupy states within a discrete set of energy subbands. Only a discrete set of frequencies of light may be absorbed or emitted by the system. When an external electric field is applied, the electron states shift to lower energies, while the hole states shift to higher energies. This reduces the permitted light absorption or emission frequencies. Additionally, the external electric field shifts electrons and holes to opposite sides of the well, decreasing the overlap integral, which in turn reduces the recombination efficiency (i.e. fluorescence quantum yield) of the system. The spatial separation between the electrons and holes is limited by the presence of the potential barriers around the quantum well, meaning that excitons are able to exist in the system even under the influence of an electric field. The quantum-confined Stark effect is used in QCSE optical modulators, which allow optical communications signals to be switched on and off rapidly. Even if Quantum Objects (Wells, Dots or Discs, for instance) emit and absorb light generally with higher energies than the band gap of the material, the QCSE may shift the energy to values lower than the gap. This was evidenced recently in the study of quantum discs embedded in a nanowire. Theoretical description The shift in absorption lines can be calculated by comparing the energy levels in unbiased and biased quantum wells. It is a simpler task to find the energy levels in the unbiased system, due to its symmetry. If the external electric field is small, it can be treated as a perturbation to the unbiased system and its approximate effect can be found using perturbation theory. Unbiased system The potential for a quantum well may be writte
https://en.wikipedia.org/wiki/Digital%20dividend%20after%20digital%20television%20transition
The digital dividend refers to the radio spectrum which is released in the process of digital television transition. When television broadcasters switch from analog TV to digital-only platforms, part of the electromagnetic spectrum that has been used for broadcasting will be freed-up because digital television needs less spectrum than analog television, due to lossy compression. One reason is that new digital video compression technology can transmit numerous digital subchannels using the same amount of spectrum used to transmit one analog TV channel. However, the primary reason is that digital transmissions require much less of a guard band on either side, since they are not nearly as prone to RF interference from adjacent channels. Because of this, there is no longer any need to leave empty channels to protect stations from each other, in turn allowing stations to be repacked into fewer channels, leaving more contiguous spectrum to be allocated for other wireless services. The digital dividend usually locates at frequency bands from 174 to 230 MHz (VHF) and from 470 to 862 MHz (UHF). However, the location and size of digital dividend vary among countries due to the factors including geographical position and penetration of satellite/cable services. As a result of the technological transition, a significant number of governments are now planning for or allocating their digital dividends. For examples, the United States completed its transition on 12 June 2009 and auctioned the spectrum. Meanwhile, Australia is still planning for it. Potential uses In countries where the digital television transition has not yet finished, over-the-air broadcasting services are still using radio-frequency spectrum in what is known as the Very High Frequency (VHF) and Ultra High Frequency (UHF) bands. After the completion of digital transition, part of this spectrum will be released as digital dividend to provide a range of new communication services. Proposed utilization of t
https://en.wikipedia.org/wiki/Halteromyces
Halteromyces is a genus of fungi belonging to the family Cunninghamellaceae. Species: Halteromyces radiatus Shipton & Schipper
https://en.wikipedia.org/wiki/Malformative%20syndrome
A malformative syndrome (or malformation syndrome) is a recognizable pattern of congenital anomalies that are known or thought to be causally related (VIIth International Congress on Human Genetics). Causes exogenous causes exogenous toxic (teratogenetic agents) ionizing radiations fetal infections (maternofetal infections) genetic causes (or intrinsic causes) (genetic malformative diseases) chromosomal anomalies (chromosomal malformative diseases) numerical chromosomal anomalies (e.g. trisomy 13, trisomy 18, trisomy 21) structural chromosomal anomalies microdeletions (microdeletion syndromes) chromosomal rearrangements gene mutations (monogenic malformative diseases) Kabuki mask syndrome: MLL2 Joubert syndrome, Meckel syndrome and related syndromes: TMEM216 cleft lip with and without cleft palate: MAFB and ABCA4 Schinzel–Giedion syndrome: SETBP1 Fanconi anemia and related disorders: RAD51C Noonan syndrome: NRAS generalized lymph vessel dysplasia: CCBE1 brachydactyly-anonychia: SOX9 genetic metabolic diseases Smith–Lemli–Opitz syndrome See also Congenital abnormality Malformative syndrome ICD-10 Chapter Q: Congenital malformations, deformations and chromosomal abnormalities List of congenital disorders List of ICD-9 codes 740-759: Congenital anomalies March of Dimes
https://en.wikipedia.org/wiki/Aubry%E2%80%93Andr%C3%A9%20model
The Aubry–André model is a statistical toy model to study thermodynamic properties in condensed matter. The model is usually employed to study quasicrystals and the transition metal-insulator in disordered systems predicted by Anderson localization. It was first developed by Serge Aubry and Gilles André in 1980. Tight–binding description Aubry–André model defines a periodic potential over a one-dimensional lattice with hopping between nearest neighbors sites with no interactions. In tight-binding, the on-site energies of Aubry-André potential have a periodicity that is incommensurate with the periodicity of the lattice. The potential can be written as , where the sum goes over all sites , is a Wannier state on lattice site and the on-site energies are given by . where is the disorder strength, is a phase and is the periodicity of the potential. The full Hamiltonian can be written as , where is the hopping constant. This Hamiltonian is self-dual as it retains the same form after a Fourier transformation. For special values of the system can demonstrate localization. For the case where and (golden ratio), Aubry and André showed that if , then the eigenmodes are exponentially localized, as in the Anderson model. For , the eigenmodes are extended plane waves. This limit between the two behaviors is called the localization transition or the Aubry-André transition. For finite chains, the periodicity of the potential can also be chosen to be the ratio , with primes and larger than number of sites in the chain. In the Aubry-André model, the energy spectrum as function of , is given by the almost Mathieu equation , related to Harper equation () that leads to a fractal spectrum known as the Hofstadter's butterfly, which describes the motion of an electron in a two-dimensional lattice under a magnetic field. Realization IN 2009, Y. Lahini et al. presented one of the first experimental realizations of the Aubry-André model in photonic lattices. Conden
https://en.wikipedia.org/wiki/Philip%20Hanawalt
Philip C. Hanawalt (born 1931) is an American biologist who discovered the process of repair replication of damaged DNA in 1963. He is also considered the co-discoverer of the ubiquitous process of DNA excision repair along with his mentor, Richard Setlow, and Paul Howard-Flanders. He holds the Dr. Morris Herzstein Professorship in the Department of Biology at Stanford University, with a joint appointment in the Dermatology Department in Stanford University School of Medicine. Early life and education Philip C. Hanawalt was born on 1931 in Akron, Ohio. He was raised in Midland, Michigan. Having an interest in electronics from youth, Hanawalt earned an honorable mention in the 1949 Westinghouse Science Talent Search, receiving a scholarship to attend Deep Springs College. Hanawalt eventually transferred to Oberlin College where he received his B.A. degree in physics in 1954. He received his M.S. degree in physics from Yale University in 1955. Hanawalt also received his Ph.D. in Biophysics from Yale University in 1959. His doctoral thesis advisor was Richard Setlow. He undertook three years of postdoctoral study at the University of Copenhagen, Denmark, and at the California Institute of Technology before joining the faculty at Stanford in 1961. DNA repair DNA repair is the process by which all living cells deal with damage to their genetic material. Such damage occurs as a consequence of exposure to environmental radiations and genotoxic chemicals, but also to endogenous oxidations and the intrinsic instability of DNA. Hanawalt and his colleagues discovered a special pathway of excision repair, called transcription-coupled repair, which is targeted to expressed genes, and he studies several diseases characterized by defects in DNA repair pathways. DNA repair is important for protecting against cancer and some aspects of ageing in humans, and its deficiency has been implicated in the etiology of a number of hereditary diseases. Career In 1965 Hanawalt became ass
https://en.wikipedia.org/wiki/Trajectory%20optimization
Trajectory optimization is the process of designing a trajectory that minimizes (or maximizes) some measure of performance while satisfying a set of constraints. Generally speaking, trajectory optimization is a technique for computing an open-loop solution to an optimal control problem. It is often used for systems where computing the full closed-loop solution is not required, impractical or impossible. If a trajectory optimization problem can be solved at a rate given by the inverse of the Lipschitz constant, then it can be used iteratively to generate a closed-loop solution in the sense of Caratheodory. If only the first step of the trajectory is executed for an infinite-horizon problem, then this is known as Model Predictive Control (MPC). Although the idea of trajectory optimization has been around for hundreds of years (calculus of variations, brachystochrone problem), it only became practical for real-world problems with the advent of the computer. Many of the original applications of trajectory optimization were in the aerospace industry, computing rocket and missile launch trajectories. More recently, trajectory optimization has also been used in a wide variety of industrial process and robotics applications. History Trajectory optimization first showed up in 1697, with the introduction of the Brachystochrone problem: find the shape of a wire such that a bead sliding along it will move between two points in the minimum time. The interesting thing about this problem is that it is optimizing over a curve (the shape of the wire), rather than a single number. The most famous of the solutions was computed using calculus of variations. In the 1950s, the digital computer started to make trajectory optimization practical for solving real-world problems. The first optimal control approaches grew out of the calculus of variations, based on the research of Gilbert Ames Bliss and Bryson in America, and Pontryagin in Russia. Pontryagin's maximum principle is of part
https://en.wikipedia.org/wiki/Design%20Criteria%20Standard%20for%20Electronic%20Records%20Management%20Software%20Applications
United States Department of Defense standard 5015.2-STD, the Design Criteria Standard for Electronic Records Management Software Applications, was implemented in June 2002. This standard defines requirements for the management of records within the Department of Defense, which has become the accepted standard for many state, county, and local governments. The standard was developed in 1996 by a team led by Kenneth Thibodeau of the National Archives and Records Administration. , only three companies are certified for records management at all levels for the Department of Defense: HP Enterprise (American), Feith Systems and Software (American), and Open Text (Canadian). The following additional companies have some level of certification: IBM Corporation, Oracle USA, Gimmal LLC, EMC, Newgen Software, ZL Technologies, Perceptive, Laserfiche, Alfresco, Collabware, and Northrop Grumman. See also Records management Digital curation Archives
https://en.wikipedia.org/wiki/Rudiger%20syndrome
Rudiger syndrome is a congenital disorder characterized by the association of severe growth retardation with abnormalities of the extremities, urogenital abnormalities and facial abnormalities. It has been described in a family where an affected brother and sister died as infants. Both autosomal recessive and autosomal dominant inheritance have been suggested with the disorder. The features ectrodactyly, ectodermal dysplasia and cleft palate have been described with Rudiger syndrome, giving it the rarely used designation "EEC syndrome". However, this is not to be confused with the formal EEC syndrome associated with chromosome 7. It was characterized in 1971.
https://en.wikipedia.org/wiki/Quantum%20reference%20frame
A quantum reference frame is a reference frame which is treated quantum theoretically. It, like any reference frame, is an abstract coordinate system which defines physical quantities, such as time, position, momentum, spin, and so on. Because it is treated within the formalism of quantum theory, it has some interesting properties which do not exist in a normal classical reference frame. Reference frame in classical mechanics and inertial frame Consider a simple physics problem: a car is moving such that it covers a distance of 1 mile in every 2 minutes, what is its velocity in metres per second? With some conversion and calculation, one can come up with the answer "13.41m/s"; on the other hand, one can instead answer "0, relative to itself". The first answer is correct because it recognises a reference frame is implied in the problem. The second one, albeit pedantic, is also correct because it exploits the fact that there is not a particular reference frame specified by the problem. This simple problem illustrates the importance of a reference frame: a reference frame is quintessential in a clear description of a system, whether it is included implicitly or explicitly. When speaking of a car moving towards east, one is referring to a particular point on the surface of the Earth; moreover, as the Earth is rotating, the car is actually moving towards a changing direction, with respect to the Sun. In fact, this is the best one can do: describing a system in relation to some reference frame. Describing a system with respect to an absolute space does not make much sense because an absolute space, if it exists, is unobservable. Hence, it is impossible to describe the path of the car in the above example with respect to some absolute space. This notion of absolute space troubled a lot of physicists over the centuries, including Newton. Indeed, Newton was fully aware of this stated that all inertial frames are observationally equivalent to each other. Simply put, relati
https://en.wikipedia.org/wiki/Cloth%20face%20mask
A cloth face mask is a mask made of common textiles, usually cotton, worn over the mouth and nose. When more effective masks are not available, and when physical distancing is impossible, cloth face masks are recommended by public health agencies for disease "source control" in epidemic situations to protect others from virus laden droplets in infected mask wearers' breath, coughs, and sneezes. Because they are less effective than N95 masks, surgical masks, or physical distancing in protecting the wearer against viruses, they are not considered to be personal protective equipment by public health agencies. They are used by the general public in household and community settings as protection against both infectious diseases and particulate air pollution. Cloth face masks were routinely used by healthcare workers starting from the late 19th century until the mid 20th century. In the 1960s they fell out of use in the developed world in favor of disposable surgical masks with an electret (electrically charged) filter material, but cloth masks persisted in developing countries. During the COVID-19 pandemic, their use in developed countries was revived due to shortages, as well as for environmental concerns and practicality. Launderable cloth electret filters were also being developed. Usage Prior to the COVID-19 pandemic, reusable cloth face masks were predominantly used by healthcare workers in developing countries and were especially prominent in Asia. Cloth face masks contrast with surgical masks and respirators such as N95 masks, which are made of nonwoven fabric formed through a melt blowing process, and are regulated for their effectiveness based upon efficiency of minimum particle size filtered and/or maximum penetrating particle (MPP) size, along with other criteria such as outer splash/spray protection, inner splash/spray absorption, contaminant accumulation and shedding, air flow, and inflammability. Like surgical masks, and unlike respirators, cloth face
https://en.wikipedia.org/wiki/Island%2035%20Mastodon
The Island 35 Mastodon was discovered on Island No. 35 of the Mississippi River in Tipton County, Tennessee, United States. In 1900, a Pleistocene mastodon skeleton was excavated approximately east of Reverie, Tennessee and southeast of Wilson, Arkansas. In 1957 the site was reported as destroyed. Mastodons are members of the prehistoric, extinct genus Mammut. They resemble modern elephants. Native to North America, they are said to have lived on the North American continent from almost 4 million years ago, in the Pliocene Epoch, until their eventual disappearance about 10,000 years ago. Discovery In 1900, archaeologist James K. Hampson documented the discovery of skeletal remains of a mastodon on Island No. 35 of the Mississippi River, Tipton County, Tennessee. The site of the prehistoric find is approximately east of Reverie, Tennessee and south of Blytheville, Arkansas. During heavy rain in June 1900, sand at the point bar of Island No. 35 had been washed away, exposing the mastodon skeleton in the sediment when the water retreated from the sandbar in July of the same year. John Pendleton, a resident of Island No. 35, notified his neighbor James K. Hampson about unusual bones he had found exposed by the retreating water at the head of the river island. Reportedly, Hampson visited the site of the find "2 or 3 weeks" after the prehistoric bones had been discovered. By the time of Hampson's arrival, many of the bones had been stolen and the skeleton had been considerably damaged by "curiosity seekers" and "ivory hunters". The remainder of the skeleton ("mainly parts of the hind leg and pelvis") were excavated by Hampson with the help of a pick to separate the mastodon bones from the gravel and pebbles in which they had been resting "cemented together by a clay". Although this find was initially believed to be the remains of a single animal, Morse and Morse subsequently reported that the site consisted of at least two separate mastodons. Several human ar
https://en.wikipedia.org/wiki/Ministry%20of%20Medical%20Education%20%28Maharashtra%29
The Ministry of Medical Education is a ministry in the Government of Maharashtra. Ministry is responsible for implementation of laws and acts related to Medical Education and Profession. The Ministry is headed by a cabinet level minister. Hasan Mushrif is current Minister of Medical education. Head office List of cabinet ministers List of ministers of state List of principal secretary Departments Ministry is further divided into several departments. AYUSH Directorate of Medical Education & Research (DMER) Maharashtra University of Health Sciences (MUHS) Maharashtra Institute of Mental Health See also Maharashtra State Pharmacy Council Medical education in India
https://en.wikipedia.org/wiki/Commercial%20astronaut
A commercial astronaut is a person who has commanded, piloted, or served as an active crew member of a privately funded spacecraft. This is distinct from an otherwise non-government astronaut, for example Charlie Walker, who flies while representing a non-government corporation but with funding or training or both coming from government sources. Criteria The definition of "astronaut" and the criteria for determining who has achieved human spaceflight vary. The Fédération Aéronautique Internationale defines spaceflight as any flight over of altitude. In the United States, professional, military, and commercial astronauts who travel above an altitude of are eligible to be awarded astronaut wings. Until 2003, professional space travelers were sponsored and trained exclusively by governments, whether by the military or by civilian space agencies. However, with the first sub-orbital flight by the privately funded Scaled Composites Tier One program in 2004, the commercial astronaut category was created. The next commercial program to achieve sub-orbital flight was Virgin Galactic's SpaceShipTwo program in 2018. Criteria for commercial astronaut status in other countries have yet to be made public. By 2021, with the substantial increase in commercial spaceflight—with the first suborbital passenger flight by both Virgin Galactic's SpaceShipTwo and Blue Origin's New Shepard in July, and with SpaceX's first orbital private spaceflight completed on September 18, 2021—the roles and functions of people going to space are expanding. Criteria for the broader designation "astronaut" has become open to interpretation. Even in the US alone, the "FAA, U.S. military and NASA all have different definitions of what it means to be designated as an 'astronaut' and none of them fit perfectly with the way Blue Origin or Virgin Galactic are doing business." It is even possible that by the FAA commercial astronaut definition, one company's July flight participants may receive FAA commerci
https://en.wikipedia.org/wiki/Noxious%20weed
A noxious weed, harmful weed or injurious weed is a weed that has been designated by an agricultural or other governing authority as a plant that is injurious to agricultural or horticultural crops, natural habitats or ecosystems, or humans or livestock. Most noxious weeds have been introduced into an ecosystem by ignorance, mismanagement, or accident. Some noxious weeds are native. Typically they are plants that grow aggressively, multiply quickly without natural controls (native herbivores, soil chemistry, etc.), and display adverse effects through contact or ingestion. Noxious weeds are a large problem in many parts of the world, greatly affecting areas of agriculture, forest management, nature reserves, parks and other open space. Many noxious weeds have come to new regions and countries through contaminated shipments of feed and crop seeds or were intentionally introduced as ornamental plants for horticultural use. Some "noxious weeds", such as ragwort, produce copious amounts of nectar, valuable for the survival of bees and other pollinators, or other advantages like larval host foods and habitats. In the USA, wild parsnip Pastinaca sativa, for instance, provides large tubular stems that some bee species hibernate in, larval food for two different swallowtail butterflies, and other beneficial qualities. Types Some noxious weeds are harmful or poisonous to humans, domesticated grazing animals, and wildlife. Open fields and grazing pastures with disturbed soils and open sunlight are often more susceptible. Protecting grazing animals from toxic weeds in their primary feeding areas is therefore important. Control Some guidelines to prevent the spread of noxious weeds are: Avoid driving through noxious weed-infested areas. Avoid transporting or planting seeds and plants that one cannot identify. For noxious weeds in flower or with seeds on plants, pulling 'gently' out and placing in a secure closable bag is recommended. Disposal such as hot composting or co
https://en.wikipedia.org/wiki/Henry%27s%20pocket
In animal anatomy, Henry's pocket, more formally known as a cutaneous marginal pouch, is a fold of skin forming an open pouch on the lower posterior part of the external ear. The pocket is situated in the approximate location of the antitragus in the human ear. It occurs in a number of mammalian species, including weasels and bats, but is particularly noticeable on the domestic cat, as well as some dog breeds. The pocket is of unknown function, and it is unclear if it has any at all. However, one hypothesis is that it aids in the detection of high-pitched sounds by attenuating lower pitches, especially when the ear is angled, common for a predator when hunting. Since the pocket occurs in a wide variety of mammalian species, it is likely a conserved feature from their common ancestor. The pocket is a common area for parasites to gather, and should be checked during a veterinary examination.
https://en.wikipedia.org/wiki/Threshold%20displacement%20energy
In materials science, the threshold displacement energy () is the minimum kinetic energy that an atom in a solid needs to be permanently displaced from its site in the lattice to a defect position. It is also known as "displacement threshold energy" or just "displacement energy". In a crystal, a separate threshold displacement energy exists for each crystallographic direction. Then one should distinguish between the minimum () and average () over all lattice directions' threshold displacement energies. In amorphous solids, it may be possible to define an effective displacement energy to describe some other average quantity of interest. Threshold displacement energies in typical solids are of the order of 10-50 eV. Theory and simulation The threshold displacement energy is a materials property relevant during high-energy particle radiation of materials. The maximum energy that an irradiating particle can transfer in a binary collision to an atom in a material is given by (including relativistic effects) where E is the kinetic energy and m the mass of the incoming irradiating particle and M the mass of the material atom. c is the velocity of light. If the kinetic energy E is much smaller than the mass of the irradiating particle, the equation reduces to In order for a permanent defect to be produced from initially perfect crystal lattice, the kinetic energy that it receives must be larger than the formation energy of a Frenkel pair. However, while the Frenkel pair formation energies in crystals are typically around 5–10 eV, the average threshold displacement energies are much higher, 20–50 eV. The reason for this apparent discrepancy is that the defect formation is a complex multi-body collision process (a small collision cascade) where the atom that receives a recoil energy can also bounce back, or kick another atom back to its lattice site. Hence, even the minimum threshold displacement energy is usually clearly higher than the Frenkel pair formation ener
https://en.wikipedia.org/wiki/STRING
In molecular biology, STRING (Search Tool for the Retrieval of Interacting Genes/Proteins) is a biological database and web resource of known and predicted protein–protein interactions. The STRING database contains information from numerous sources, including experimental data, computational prediction methods and public text collections. It is freely accessible and it is regularly updated. The resource also serves to highlight functional enrichments in user-provided lists of proteins, using a number of functional classification systems such as GO, Pfam and KEGG. The latest version 11b contains information on about 24,5 million proteins from more than 5000 organisms. STRING has been developed by a consortium of academic institutions including CPR, EMBL, KU, SIB, TUD and UZH. Usage Protein–protein interaction networks are an important ingredient for the system-level understanding of cellular processes. Such networks can be used for filtering and assessing functional genomics data and for providing an intuitive platform for annotating structural, functional and evolutionary properties of proteins. Exploring the predicted interaction networks can suggest new directions for future experimental research and provide cross-species predictions for efficient interaction mapping. Features The data is weighted and integrated and a confidence score is calculated for all protein interactions. Results of the various computational predictions can be inspected from different designated views. There are two modes of STRING: Protein-mode and COG-mode. Predicted interactions are propagated to proteins in other organisms for which interaction has been described by inference of orthology. A web interface is available to access the data and to give a fast overview of the proteins and their interactions. A plug-in for cytoscape to use STRING data is available. Another possibility to access data STRING is to use the application programming interface (API) by constructing a URL that co
https://en.wikipedia.org/wiki/Intelligence
Intelligence has been defined in many ways: the capacity for abstraction, logic, understanding, self-awareness, learning, emotional knowledge, reasoning, planning, creativity, critical thinking, and problem-solving. It can be described as the ability to perceive or infer information; and to retain it as knowledge to be applied to adaptive behaviors within an environment or context. The term rose to prominence during the early 1900s. Most psychologists believe that intelligence can be divided into various domains or competencies. Intelligence is most often studied in humans but has also been observed in both non-human animals and in plants despite controversy as to whether some of these forms of life exhibit intelligence. Intelligence in computers or other machines is called artificial intelligence. Etymology The word intelligence derives from the Latin nouns intelligentia or intellēctus, which in turn stem from the verb intelligere, to comprehend or perceive. In the Middle Ages, the word intellectus became the scholarly technical term for understanding, and a translation for the Greek philosophical term nous. This term, however, was strongly linked to the metaphysical and cosmological theories of teleological scholasticism, including theories of the immortality of the soul, and the concept of the active intellect (also known as the active intelligence). This approach to the study of nature was strongly rejected by the early modern philosophers such as Francis Bacon, Thomas Hobbes, John Locke, and David Hume, all of whom preferred "understanding" (in place of "intellectus" or "intelligence") in their English philosophical works. Hobbes for example, in his Latin De Corpore, used "intellectus intelligit", translated in the English version as "the understanding understandeth", as a typical example of a logical absurdity. "Intelligence" has therefore become less common in English language philosophy, but it has later been taken up (with the scholastic theories whic
https://en.wikipedia.org/wiki/List%20of%20amateur%20radio%20software
This is a list of software for amateur radio. Software tools Logging Software Operating systems The Debian project maintains a pure blend that includes ham radio software. The HamBSD project is a variation of OpenBSD. See also Amateur radio station § Computer-control software List of amateur radio modes Software-defined radio
https://en.wikipedia.org/wiki/Calgary%E2%80%93Cambridge%20model
The Calgary–Cambridge model (Calgary-Cambridge guide) is a method for structuring medical interviews. It focuses on giving a clear structure of initiating a session, gathering information, physical examination, explaining results and planning, and closing a session. It is popular in medical education in many countries. Method The Calgary–Cambridge model involves: initiating a session: This involves preparation by the clinician, building rapport with the patient, and an understanding of why the interview is needed. gathering information: This may be split into a focus on a biomedical perspective, the patient's experience, and contextual information about the patient. Contextual information may include personal history, social history, and other medical history. a physical examination of a patient: This varies based on the purpose of the interview. explaining results and planning: This aims to ensure a shared understanding, and allowing for shared decision-making. closing a session: This may involve discussing further plans. This is designed to give a clear structure to the interview, and to help to build the relationship between the clinician and the patient. The importance of nonverbal communication is noted. The model is based on 71 skills and techniques that improve patient interviews. These include maintaining eye contact, active listening (not interrupting, giving verbal cues), summarizing information frequently, asking about patient ideas and beliefs, and showing empathy. Advantages The Calgary–Cambridge model was developed based on evidence from interviews of patients, and what made them successful. It is generally focussed on the patient and their experience. The guide of skills and techniques is generally seen as comprehensive. Disadvantages The Calgary–Cambridge model has been criticized for creating a separation between the process of interviewing a patient and the information gained. The 71 skills are very difficult to incorporate simultaneo
https://en.wikipedia.org/wiki/Hydraulic%20signaling%20in%20plants
Hydraulic signals in plants are detected as changes in the organism's water potential that are caused by environmental stress like drought or wounding. The cohesion and tension properties of water allow for these water potential changes to be transmitted throughout the plant. Plants respond to external stimuli through thigmomorphogenesis. For example, bending a shoot can cause arrestment of growth on another area of the plant. These types of nonlocal responses can be induced by long distance signaling. Long distance communication in plants must satisfy two things: First, signaling must occur rapidly to an apical area of the plant; Second, the signal must be perceived at the apical site and be converted to a physiological or thigmorphogenetic response. One form of long distance signaling is through hydraulic pulses from the roots to the shoots of a plant. Tree branches and stems contain microchannels that make up the xylem network and serve to carry water longitudinally. Stimuli like wounding can cause tension and compression of plant tissues, which pinches the cross section of the shoot. Hydraulic signaling begins with a local response like water expulsion, creating a suction in the vascular system. The compression of the cross section will then lead to a general increase of hydraulic pressure in the channels of the shoot. This extensive change in hydraulic pressure will lead to activation of hydraulic sensors. Water potential The driving force of the movement of water is the water potential gradient. The water potential gradient is defined by comparing the potential energy of water to pure water at standard conditions. This water potential gradient must be maintained from the soil through the plant and into the air via transpiration. In the xylem, water is transported throughout the plant following increasing water potential differences. These differences are determined by soil water availability and vapor pressure deficit.  If this gradient is flipped the trans
https://en.wikipedia.org/wiki/Diagonal%20magic%20cube
The class of diagonal magic cubes is the second of the six magic cube classes (when ranked by the number of lines summing correctly), coming after the simple magic cubes. In a diagonal magic cube of order m, all 6m of the diagonals in the m planes parallel to the top, front, and sides of the cube must sum correctly. This means that the cube contains 3m simple magic squares of order m. Because the cube contains so many magic squares, it was considered for many years to be "perfect" (although other types of cubes were also sometimes called a "perfect magic cube"). It is now known that there are three higher classes of cubes. The (proper) diagonal magic cube has a total of 3m2 + 6m + 4 correctly summing lines and 3m + 6 simple magic squares. The new definition perfect magic cube has a total of 13m2 correct lines and 9m pandiagonal magic squares. See also Magic cube classes Notes External links New definition: Harvey Heinz’s magic cubes Aale de Winkel’s Magic Encyclopedia Old definition: Christian Boyer’s Multimagic cubes Walter Trump’s Search for the smallest ‘perfect’ cube Magic squares
https://en.wikipedia.org/wiki/Mir-550%20microRNA%20precursor%20family
In molecular biology mir-550 microRNA is a short RNA molecule. MicroRNAs function to regulate the expression levels of other genes by several mechanisms. Further reading See also MicroRNA External links MicroRNA MicroRNA precursor families
https://en.wikipedia.org/wiki/Matroid
In combinatorics, a branch of mathematics, a matroid is a structure that abstracts and generalizes the notion of linear independence in vector spaces. There are many equivalent ways to define a matroid axiomatically, the most significant being in terms of: independent sets; bases or circuits; rank functions; closure operators; and closed sets or flats. In the language of partially ordered sets, a finite simple matroid is equivalent to a geometric lattice. Matroid theory borrows extensively from the terminology of both linear algebra and graph theory, largely because it is the abstraction of various notions of central importance in these fields. Matroids have found applications in geometry, topology, combinatorial optimization, network theory and coding theory. Definition There are many equivalent ways to define a (finite) matroid. Independent sets In terms of independence, a finite matroid is a pair , where is a finite set (called the ground set) and is a family of subsets of (called the independent sets) with the following properties: (I1) The empty set is independent, i.e., . (I2) Every subset of an independent set is independent, i.e., for each , if then . This is sometimes called the hereditary property, or the downward-closed property. (I3) If and are two independent sets (i.e., each set is independent) and has more elements than , then there exists such that is in . This is sometimes called the augmentation property or the independent set exchange property. The first two properties define a combinatorial structure known as an independence system (or abstract simplicial complex). Actually, assuming (I2), property (I1) is equivalent to the fact that at least one subset of is independent, i.e., . Bases and circuits A subset of the ground set that is not independent is called dependent. A maximal independent set—that is, an independent set that becomes dependent upon adding any element of —is called a basis for the matroid. A circuit in
https://en.wikipedia.org/wiki/Costamere
The costamere is a structural-functional component of striated muscle cells which connects the sarcomere of the muscle to the cell membrane (i.e. the sarcolemma). Costameres are sub-sarcolemmal protein assemblies circumferentially aligned in register with the Z-disk of peripheral myofibrils. They physically couple force-generating sarcomeres with the sarcolemma in striated muscle cells and are thus considered one of several "Achilles' heels" of skeletal muscle, a critical component of striated muscle morphology which, when compromised, is thought to directly contribute to the development of several distinct myopathies. The dystrophin-associated protein complex, also referred to as the dystrophin-associated glycoprotein complex (DGC or DAGC), contains various integral and peripheral membrane proteins such as dystroglycans and sarcoglycans, which are thought to be responsible for linking the internal cytoskeletal system of individual myofibers to structural proteins within the extracellular matrix (such as collagen and laminin). Therefore, it is one of the features of the sarcolemma which helps to couple the sarcomere to the extracellular connective tissue as some experiments have shown. Desmin protein may also bind to the DAG complex, and regions of it are known to be involved in signaling. Structure Costameres are highly complex networks of proteins and glycoproteins, and can be considered as consisting of two major protein complexes: the dystrophin-glycoprotein complex (DGC) and the integrin-vinculin-talin complex. The sarcoglycans of the DGC and the integrins of the integrin-vinculin-talin complex attach directly to filamin C, a component of the Z-disk, linking these protein complexes of costameres to complexes of the Z-disk. Restated, filamin C physically links the two complexes that constitute the costamere to sarcomeres by interacting with the sarcoglycans in the DGC and the integrins of the integrin-vinculin-talin complex. The DGC consists of peripheral a
https://en.wikipedia.org/wiki/Empire%20City%3A%201931
(known as Street Fight in Germany and the Benelux Union) is a shooter game developed by Seibu Kaihatsu that was originally released into arcades in 1986, by Taito in Japan and Europe and by Romstar in North America. The game has players taking on the mafia in 1931 New York City by gunning down mobsters one by one. Versions of the game were released for the Family Computer (1987) and MSX (1988) as Acclaim advertised a release for the Nintendo Entertainment System in Western regions, but the console version remained exclusive to Japan. Seibu Kaihatsu eventually released a follow-up game, Dead Angle. Gameplay The game is set in 1931 New York City where the player controls a young FBI agent who is out to avenge his family members, who were killed in a gang shootout. Over a period of several months, he targets mobsters, culminating with the mafia boss. Players use a joystick to move a crosshair around the screen to aim and shoot at mobsters one at a time. They lurk around various areas, including on the street and in windows. An arrow appears that helps direct players to the location of the next mobster onscreen. Players have a set amount of time to find and shoot each enemy; if time is running out, a speech bubble appears counting down the last few seconds on the timer. When the timer reaches zero, the player is shot and the screen pans to the location of the enemy. A defend button is available as a last resort to avoid being shot. Players can replenish their ammo by shooting hidden ammunition boxes and get bonus points by shooting at gold bars. Levels are cleared after a set number of mobsters are eliminated. In the game's final level, the player has only one opportunity to assassinate the mob boss as he walks in front of windows in a building. After the final level is completed, the game loops back to the beginning. The Famicom version is largely the same. The player's progress can be restored any time in the Famicom version by using a password system of four
https://en.wikipedia.org/wiki/Auf%20Wiedersehen%20Monty
Auf Wiedersehen Monty (German for "Goodbye Monty") is a computer game for the ZX Spectrum, Commodore 64, Amstrad CPC, MSX and Commodore 16. Released in 1987, it is the fourth game in the Monty Mole series. It was written by Peter Harrap and Shaun Hollingworth with music by Rob Hubbard and Ben Daglish. Gameplay The player controls Monty as he travels around Europe collecting money in order to buy a Greek island - Montos, where he can safely retire. Gameplay is in the style of a flick-screen platform game, similar to many such games of the 1980s such as Technician Ted and Jet Set Willy. Some screens (such as those representing the Eiffel Tower and the Pyrenees) bear some relation to their real-life counterparts but most are just typical platform game screens. Auf Wiedersehen Monty contains many features and peculiarities for the player to discover. Examples include being suddenly attacked by a bull's head in Spain after collecting a red cape (presumably a reference to bullfighting), a car being dropped in one of two places on entering a screen representing Düsseldorf in West Germany, a chef's hat found in Sweden (a reference to the Swedish Chef of Muppets fame; also, the two rooms representing Sweden are subtitled Bjorn and Borg), and a record in Luxembourg that when collected makes Monty breakdance to the game's title music (this may be a reference to Radio Luxembourg). It is possible to get to areas of the game more quickly by flying from an airport using air tickets which can be collected throughout the game. Some parts of the game can only be reached in this manner. As well as money, there are other miscellaneous objects to collect in the game for points. This was important as the player needs a certain number of points to get to Montos. These are often particular to the country Monty is visiting (such as berets in France). Bottles of wine or a glass of beer in West Germany cause Monty to briefly become drunk and his control to become slightly erratic leading
https://en.wikipedia.org/wiki/Newton%27s%20minimal%20resistance%20problem
Newton's minimal resistance problem is a problem of finding a solid of revolution which experiences a minimum resistance when it moves through a homogeneous fluid with constant velocity in the direction of the axis of revolution, named after Isaac Newton, who studied the problem in 1685 and published it in 1687 in his Principia Mathematica. This is the first example of a problem solved in what is now called the calculus of variations, appearing a decade before the brachistochrone problem. Newton published the solution in Principia Mathematica without his derivation and David Gregory was the first person who approached Newton and persuaded him to write an analysis for him. Then the derivation was shared with his students and peers by Gregory. According to I Bernard Cohen, in his Guide to Newton’s Principia, "The key to Newton’s reasoning was found in the 1880s, when the earl of Portsmouth gave his family’s vast collection of Newton’s scientific and mathematical papers to Cambridge University. Among Newton’s manuscripts they found the draft text of a letter, … in which Newton elaborated his mathematical argument. [This] was never fully understood, however, until the publication of the major manuscript documents by D. T. Whiteside [1974], whose analytical and historical commentary has enabled students of Newton not only to follow fully Newton’s path to discovery and proof, but also Newton’s later (1694) recomputation of the surface of least resistance". Even though Newton's model for the fluid was wrong as per our current understanding, the fluid he had considered finds its application in hypersonic flow theory as a limiting case. Definition In Proposition 34 of Book 2 of the Principia, Newton wrote, "If in a rare medium, consisting of equal particles freely disposed at equal distances from each other, a globe and a cylinder described on equal diameter move with equal velocities in the direction of the axis of the cylinder, the resistance of the globe will be but h
https://en.wikipedia.org/wiki/Closure%20%28mathematics%29
In mathematics, a subset of a given set is closed under an operation of the larger set if performing that operation on members of the subset always produces a member of that subset. For example, the natural numbers are closed under addition, but not under subtraction: is not a natural number, although both 1 and 2 are. Similarly, a subset is said to be closed under a collection of operations if it is closed under each of the operations individually. The closure of a subset is the result of a closure operator applied to the subset. The closure of a subset under some operations is the smallest superset that is closed under these operations. It is often called the span (for example linear span) or the generated set. Definitions Let be a set equipped with one or several methods for producing elements of from other elements of . A subset of is said to be closed under these methods, if, when all input elements are in , then all possible results are also in . Sometimes, one may also say that has the . The main property of closed sets, which results immediately from the definition, is that every intersection of closed sets is a closed set. It follows that for every subset of , there is a smallest closed subset of such that (it is the intersection of all closed subsets that contain ). Depending on the context, is called the closure of or the set generated or spanned by . The concepts of closed sets and closure are often extended to any property of subsets that are stable under intersection; that is, every intersection of subsets that have the property has also the property. For example, in a Zariski-closed set, also known as an algebraic set, is the set of the common zeros of a family of polynomials, and the Zariski closure of a set of points is the smallest algebraic set that contains . In algebraic structures An algebraic structure is a set equipped with operations that satisfy some axioms. These axioms may be identities. Some axioms may contain existe
https://en.wikipedia.org/wiki/Relational%20quantum%20mechanics
Relational quantum mechanics (RQM) is an interpretation of quantum mechanics which treats the state of a quantum system as being observer-dependent, that is, the state is the relation between the observer and the system. This interpretation was first delineated by Carlo Rovelli in a 1994 preprint, and has since been expanded upon by a number of theorists. It is inspired by the key idea behind special relativity, that the details of an observation depend on the reference frame of the observer, and uses some ideas from Wheeler on quantum information. The physical content of the theory has not to do with objects themselves, but the relations between them. As Rovelli puts it: "Quantum mechanics is a theory about the physical description of physical systems relative to other systems, and this is a complete description of the world". The essential idea behind RQM is that different observers may give different accurate accounts of the same system. For example, to one observer, a system is in a single, "collapsed" eigenstate. To a second observer, the same system is in a superposition of two or more states and the first observer is in a correlated superposition of two or more states. RQM argues that this is a complete picture of the world because the notion of "state" is always relative to some observer. There is no privileged, "real" account. The state vector of conventional quantum mechanics becomes a description of the correlation of some degrees of freedom in the observer, with respect to the observed system. The terms "observer" and "observed" apply to any arbitrary system, microscopic or macroscopic. The classical limit is a consequence of aggregate systems of very highly correlated subsystems. A "measurement event" is thus described as an ordinary physical interaction where two systems become correlated to some degree with respect to each other. The proponents of the relational interpretation argue that this approach resolves some of the traditional interpreta
https://en.wikipedia.org/wiki/RepRap%20Ormerod
The RepRap Ormerod is an open-source fused deposition modeling 3D printer and is part of the RepRap project. The RepRap Ormerod is named after the English entomologist Eleanor Anne Ormerod, it was designed by RepRapPro. There have been two versions of the Ormerod, the Ormerod 1 was released in December 2013 and the Ormerod 2 released in December 2014. The RepRap Ormerod has a 200 mm × 200 mm × 200 mm build volume, uses a Bowden extruder, it also has a micro SD card and USB and Ethernet connections allowing it to be connected to a network. The printer was praised for the simplicity of construction and its low cost. See also RepRap Fisher Prusa i3
https://en.wikipedia.org/wiki/Drive%20shaft
A drive shaft, driveshaft, driving shaft, tailshaft (Australian English), propeller shaft (prop shaft), or Cardan shaft (after Girolamo Cardano) is a component for transmitting mechanical power and torque and rotation, usually used to connect other components of a drivetrain that cannot be connected directly because of distance or the need to allow for relative movement between them. As torque carriers, drive shafts are subject to torsion and shear stress, equivalent to the difference between the input torque and the load. They must therefore be strong enough to bear the stress, while avoiding too much additional weight as that would in turn increase their inertia. To allow for variations in the alignment and distance between the driving and driven components, drive shafts frequently incorporate one or more universal joints, jaw couplings, or rag joints, and sometimes a splined joint or prismatic joint. History The term driveshaft first appeared during the mid-19th century. In Stover's 1861 patent reissue for a planing and matching machine, the term is used to refer to the belt-driven shaft by which the machine is driven. The term is not used in his original patent. Another early use of the term occurs in the 1861 patent reissue for the Watkins and Bryson horse-drawn mowing machine. Here, the term refers to the shaft transmitting power from the machine's wheels to the gear train that works the cutting mechanism. In the 1890s, the term began to be used in a manner closer to the modern sense. In 1891, for example, Battles referred to the shaft between the transmission and driving trucks of his Climax locomotive as the drive shaft, and Stillman referred to the shaft linking the crankshaft to the rear axle of his shaft-driven bicycle as a drive shaft. In 1899, Bukey used the term to describe the shaft transmitting power from the wheel to the driven machinery by a universal joint in his Horse-Power. In the same year, Clark described his Marine Velocipede using
https://en.wikipedia.org/wiki/TelecityGroup
Telecity Group plc (formerly TelecityRedbus and before that Telecity), was a European carrier-neutral datacentre and colocation centre provider. It specialised in the design, build and management of datacentre space. It was listed on the London Stock Exchange until it was acquired by Equinix in January 2016. History Telecity Group plc was the result of the uniting of three separate companies – TeleCity Limited, Redbus Interhouse Limited and Globix Holdings (UK) Limited. TeleCity Limited was founded by Mike Kelly and Anish Kapoor from Manchester University in April 1998 and opened its first data centre in Manchester. At that time 3i Group made an investment of £24 million in the Company. In July 1998, Redbus Interhouse Limited was incorporated, and commenced operations in its first data centre in London Docklands in July 1999. By March 2000, Redbus Interhouse Limited floated on the main market of the London Stock Exchange and in June 2000, TeleCity Limited’s parent company, TeleCity plc floated on the London Stock Exchange. In September 2005, TeleCity plc was taken private by 3i and Oak Hill and by October of that year Telecity Group plc was incorporated and became the holding company of Telecity plc and its group companies in November 2005. In January 2006 Telecity Group acquired Redbus Interhouse plc, a rival business, resulting in the two business, TeleCity and Redbus, trading under the name of TelecityRedbus. Later in 2006 Telecity Group plc bought the European assets of the US-based Globix Corporation. Following a rebranding exercise implemented in August 2007, TeleCity, Redbus and Globix (UK) began to trade under the name TelecityGroup. In October Telecity Group plc listed on the main market of the London Stock Exchange. In August 2010, TelecityGroup acquired Internet Facilitators Limited (IFL), a provider of-carrier neutral data centres in Manchester. In August 2011 TelecityGroup acquired Data Electronics, which operates two carrier-neutral data centres i
https://en.wikipedia.org/wiki/Synthetic%20genomics
Synthetic genomics is a nascent field of synthetic biology that uses aspects of genetic modification on pre-existing life forms, or artificial gene synthesis to create new DNA or entire lifeforms. Overview Synthetic genomics is unlike genetic modification in the sense that it does not use naturally occurring genes in its life forms. It may make use of custom designed base pair series, though in a more expanded and presently unrealized sense synthetic genomics could utilize genetic codes that are not composed of the two base pairs of DNA that are currently used by life. The development of synthetic genomics is related to certain recent technical abilities and technologies in the field of genetics. The ability to construct long base pair chains cheaply and accurately on a large scale has allowed researchers to perform experiments on genomes that do not exist in nature. Coupled with the developments in protein folding models and decreasing computational costs the field of synthetic genomics is beginning to enter a productive stage of vitality. History Researchers were able to create a synthetic organism for the first time in 2010. This breakthrough was undertaken by Synthetic Genomics, Inc., which continues to specialize in the research and commercialization of custom designed genomes. It was accomplished by synthesizing a 600 kbp genome (resembling that of Mycoplasma genitalium, save the insertion of a few watermarks) via the Gibson Assembly method and Transformation Associated Recombination. Recombinant DNA technology Soon after the discovery of restriction endonucleases and ligases, the field of genetics began using these molecular tools to assemble artificial sequences from smaller fragments of synthetic or naturally-occurring DNA. The advantage in using the recombinatory approach as opposed to continual DNA synthesis stems from the inverse relationship that exists between synthetic DNA length and percent purity of that synthetic length. In other words, as you
https://en.wikipedia.org/wiki/Principal%20root%20of%20unity
In mathematics, a principal n-th root of unity (where n is a positive integer) of a ring is an element satisfying the equations In an integral domain, every primitive n-th root of unity is also a principal -th root of unity. In any ring, if n is a power of 2, then any n/2-th root of −1 is a principal n-th root of unity. A non-example is in the ring of integers modulo ; while and thus is a cube root of unity, meaning that it is not a principal cube root of unity. The significance of a root of unity being principal is that it is a necessary condition for the theory of the discrete Fourier transform to work out correctly.
https://en.wikipedia.org/wiki/Rush%20Hour%20%28puzzle%29
Rush Hour is a sliding block puzzle invented by Nob Yoshigahara in the 1970s. It was first sold in the United States in 1996. It is now being manufactured by ThinkFun (formerly Binary Arts). ThinkFun now sells Rush Hour spin-offs Rush Hour Jr., Safari Rush Hour, Railroad Rush Hour, Rush Hour Brain Fitness and Rush Hour Shift, with puzzles by Scott Kim. The game sold more than 1 million units. Game The board is a 6×6 grid with grooves in the tiles to allow cars to slide, card tray to hold the cards, current active card holder and an exit hole. The game comes with 16 vehicles (12 cars, 4 trucks), each colored differently, and 40 puzzle cards. Cars and trucks are both one square wide, but cars are two squares long and trucks are three squares long. Vehicles can only be moved along a straight line on the grid; rotation is forbidden. Puzzle cards, each with a level number that indicates the difficulty of the challenge, show the starting positions of cars and trucks. Not all cars and trucks are used in all challenges. Objective The goal of the game is to get only the red car out through the exit of the board by moving the other vehicles out of its way. However, the cars and trucks (set up before play, according to a puzzle card) obstruct the path which makes the puzzle even more difficult. Editions The Regular Edition comes with forty puzzles split into four different difficulties, ranging from Beginner to Expert. The Deluxe Edition has a black playing board, card box in place of the Regular Edition's card tray, and sixty new puzzles with an extra difficulty: the Grand Master. The Ultimate Collector's Edition has a playing board that can hold vehicles not in play and can display the active card in a billboard-like display. The Ultimate Collectors Edition also includes 155 new puzzles (with some of them being from card set three) and a white limo. In 2011, the board was changed to black, like the Deluxe Edition. An iOS version of the game was released in 2010. Expans
https://en.wikipedia.org/wiki/The%20Creepy%20Line
The Creepy Line is a 2018 American documentary exploring the influence Google and Facebook have on public opinion, and the power the companies have that is not regulated or controlled by national government legislation. The title is taken from a quote by Eric Schmidt, who when describing Google's use of personal information stated that the company did not cross the line that an ordinary user would find unacceptable. It was released in October 2018. Synopsis The film contrasts the notion of fake news which is visible, with the invisible ranking or masking of information by Google and Facebook, and features headshot interviews with Robert Epstein, Jaron Lanier, Jordan Peterson and Peter Schweizer. Reception The Verge reviewed The Creepy Line, writing that "Despite its dark name, The Creepy Line appeals to the comforting logic of conspiracy: when something goes wrong in life, it’s because an all-powerful entity thinks you’re important enough to attack."
https://en.wikipedia.org/wiki/Linopristin/flopristin
Linopristin/flopristin (development codes NXL103 and XRP 2868) is an experimental drug candidate under development by Novexel. It is an oral streptogramin antibiotic that has potent in vitro activity against certain Gram-positive bacteria including methicillin resistant Staphylococcus aureus (MRSA), as well as the important respiratory pathogens including penicillin-, macrolide- and quinolone-resistant strains. It is a combination of linopristin and flopristin. Clinical trials Positive results have been reported from a phase II trial comparing it with amoxicillin. Another phase II trial began in 2010 comparing it with linezolid for treatment of acute bacterial skin and skin structure infections (ABSSSI). No development activity has been reported since 2015.
https://en.wikipedia.org/wiki/Congresstrading.com
Congresstrading.com is a commercial website that provides access to a database of financial disclosures of members of the United States Congress. It also provides a forum to discuss Congress' stock trades, according to WXII 12, an NBC affiliate news station. Congress is required to publicly disclose their financial transactions by the STOCK Act. History Since its founding in October 2020, congresstrading.com has been credited by various news organizations for providing and disclosing information related to financial transactions by members of Congress. In January 2021, the New York Times reported that Speaker Nancy Pelosi purchased Tesla stock options based on information sourced from congresstrading.com. In October 2021 CNBC, CNN, and the Washington Post reported that Congresswoman Marjorie Taylor Greene bought shares of Trump SPAC Digital World Acquisition Corp based on information provided by congresstrading.com.
https://en.wikipedia.org/wiki/Chronometric%20singularity
A chronometric singularity (also called a temporal or horological singularity) is a point at which time cannot be measured or described. An example involves a time at a coordinate singularity, e.g.a geographical pole. Since time on Earth is measured through longitudes, and no unique longitude exists at a pole, time is not defined uniquely at this point. There is a clear connection with coordinate singularities, as can be seen from this example. In relativity, similar singularities can be found in the case of Schwarzschild coordinates. Stephen Hawking once compared by a talk-show guest's question about "before the beginning of time" to asking "what's north of the north pole". See also Coordinate singularity No-boundary proposal and imaginary time Spacetime singularity Time
https://en.wikipedia.org/wiki/Openn%20Negotiation
Openn is a platform that facilitates real time communication and negotiation in a property transaction. Openn Negotiation combines flexibility of a private treaty with the transparency of auction price discovery. Openn Offers supports a traditional private treaty process with improved transparency. Openn Tender allows buyers to submit tender offers digitally before a set deadline for the agent and seller to review. It was launched in Australia in 2016, and has seen significant growth largely due to COVID-19 restrictions on traditional home inspections and on-site auctions. Operations The Openn platform has been built with the intention to offer multiple sales methods for property transactions. Openn Negotiation is the primary product offering and sales process – it combines the flexibility of a private treaty with the transparency of auction price discovery. Functionally, the Openn platform provides agents with a tool to facilitate real time communication and negotiation between all stakeholders in a property transaction. The platform provides additional benefits to agents such as digital contracting, data retention and integration to agency customer relationship management (CRM) systems to promote efficient work processes and improved outcomes for their customers. Openn Negotiation’s online bidding platform is transparent for buyers, sellers and agents. Since 2017, Openn Negotiation has sold $4.95 billion worth of property in Australia. Partnerships and integrations August 2021 – CoreLogic onthehouse.com.au April 2022 – The Canadian Real Estate Association REALTOR.ca Awards March 2021 – United States National Association of Realtors REACH Program Patents Australian Patent – 2017280108 US Patent – US 11,250,498 B2 See also Online auction
https://en.wikipedia.org/wiki/Elongated%20triangular%20pyramid
In geometry, the elongated triangular pyramid is one of the Johnson solids (). As the name suggests, it can be constructed by elongating a tetrahedron by attaching a triangular prism to its base. Like any elongated pyramid, the resulting solid is topologically (but not geometrically) self-dual. Formulae The following formulae for volume and surface area can be used if all faces are regular, with edge length a: The height is given by If the edges are not the same length, use the individual formulae for the tetrahedron and triangular prism separately, and add the results together. Dual polyhedron Topologically, the elongated triangular pyramid is its own dual. Geometrically, the dual has seven irregular faces: one equilateral triangle, three isosceles triangles and three isosceles trapezoids. Related polyhedra and honeycombs The elongated triangular pyramid can form a tessellation of space with square pyramids and/or octahedra.
https://en.wikipedia.org/wiki/Anatolian%20hunter-gatherers
Anatolian hunter-gatherer (AHG) is a distinct anatomically modern human archaeogenetic lineage, first identified in a 2019 study based on the remains of a single Epipaleolithic individual found in central Anatolia, radiocarbon dated to around 13,500 BCE. A population related to this individual was the main source of the ancestry of later Anatolian Neolithic Farmers (also known as Early European Farmers), who along with Western Hunter Gatherers (WHG) and Ancient North Eurasians (via Eastern Hunter Gatherers and or Western Steppe Herders) are one of the three currently known ancestral genetic contributors to present-day Europeans. Introduction The existence of this ancient population has been inferred through the genetic analysis of the remains of a man from the site of Pınarbaşı (37 ° 29'N, 33 ° 02'E), in central Anatolia, which has been dated at 13,642-13,073 cal BCE. This population is genetically differentiated from the rest of the known Pleistocene populations. It has been discovered that populations of the Anatolian Neolithic (Anatolian Neolithic Farmers) derive most of their ancestry from the AHG, with minor gene flow from Iranian/Caucasus and Levantine sources, suggesting that agriculture was adopted in situ by these hunter-gatherers and not spread by demic diffusion into the region. The Anatolian hunter gatherers began farming around 8300 BC, at places such as Çayönü. Cows, sheep and goats may have been domesticated first in southern Turkey. These farmers moved into Thrace (now European Turkey) around 7000 BC. Genetics At the autosomal level, in the Principal component analysis (PCA) the analyzed AHG individual turns out to be close to two later Anatolian populations, the Anatolian Aceramic Farmers (AAF) dating from 8300-7800 BCE, and the Anatolian Ceramic Farmers (ACF) dating from 7000-6000 BCE. These early Anatolian farmers later replaced the European hunter-gatherer populations in Europe to a large extent, ultimately becoming the main genetic co
https://en.wikipedia.org/wiki/Robin%20Hood%20Flour
Robin Hood Flour is a brand of flour made by the Horizon Milling division of Cargill. The brand is marketed to the food service and industrial section by Horizon Milling and the consumer retail sector by The J.M. Smucker Company. History Originally established as a brand of the Moose Jaw Milling Company by miller Donald Mclean in 1900. New Prague Flouring Mill (of Minnesota), owned by Francis Atherton Bean of Minneapolis, purchased the mill in 1909. The company manufactured flour under the brand names Keynote, Saskana and Robin Hood. Acquisitions Through a series of acquisitions and restructurings, the company became International Multifoods Corporation in 1970. The Moose Jaw mill closed in 1966 due to excess capacity; the mill was demolished but the grain bins and elevator are still in use as an inland terminal owned and operated by Parrish and Heimbecker Ltd. The newer Saskatoon mill (built in 1928) continues to manufacture the Robin Hood brand flour. In June 2004, The J.M. Smucker Company purchased three milling facilities in Canada from International Multifoods, including the Robin Hood brand. In 2006, Smuckers announced the sale of the milling facilities in Canada for US$78 million to Horizon Milling G.P., a unit of Cargill. Under the agreement, Horizon Milling owns and operates the Canadian mills in Saskatoon, Montreal and Burlington that manufacture Robin Hood branded products. Horizon Milling markets Robin Hood products directly to the food service and industrial sector in Canada, U.S. and Caribbean. Smuckers continues to market Robin Hood products to the retail market. See also Arthur H. Hider
https://en.wikipedia.org/wiki/Inverse%20trigonometric%20functions
In mathematics, the inverse trigonometric functions (occasionally also called arcus functions, antitrigonometric functions or cyclometric functions) are the inverse functions of the trigonometric functions (with suitably restricted domains). Specifically, they are the inverses of the sine, cosine, tangent, cotangent, secant, and cosecant functions, and are used to obtain an angle from any of the angle's trigonometric ratios. Inverse trigonometric functions are widely used in engineering, navigation, physics, and geometry. Notation Several notations for the inverse trigonometric functions exist. The most common convention is to name inverse trigonometric functions using an arc- prefix: , , , etc. (This convention is used throughout this article.) This notation arises from the following geometric relationships: when measuring in radians, an angle of radians will correspond to an arc whose length is , where is the radius of the circle. Thus in the unit circle, "the arc whose cosine is " is the same as "the angle whose cosine is ", because the length of the arc of the circle in radii is the same as the measurement of the angle in radians. In computer programming languages, the inverse trigonometric functions are often called by the abbreviated forms , , . The notations , , , etc., as introduced by John Herschel in 1813, are often used as well in English-language sources, much more than the also established , , – conventions consistent with the notation of an inverse function, that is useful (for example) to define the multivalued version of each inverse trigonometric function: However, this might appear to conflict logically with the common semantics for expressions such as (although only , without parentheses, is the really common use), which refer to numeric power rather than function composition, and therefore may result in confusion between notation for the reciprocal (multiplicative inverse) and inverse function. The confusion is somewhat mitigated by th
https://en.wikipedia.org/wiki/Snappy%20%28compression%29
Snappy (previously known as Zippy) is a fast data compression and decompression library written in C++ by Google based on ideas from LZ77 and open-sourced in 2011. It does not aim for maximum compression, or compatibility with any other compression library; instead, it aims for very high speeds and reasonable compression. Compression speed is 250 MB/s and decompression speed is 500 MB/s using a single core of a circa 2011 "Westmere" 2.26 GHz Core i7 processor running in 64-bit mode. The compression ratio is 20–100% lower than gzip. Snappy is widely used in Google projects like Bigtable, MapReduce and in compressing data for Google's internal RPC systems. It can be used in open-source projects like MariaDB ColumnStore, Cassandra, Couchbase, Hadoop, LevelDB, MongoDB, RocksDB, Lucene, Spark, and InfluxDB. Decompression is tested to detect any errors in the compressed stream. Snappy does not use inline assembler (except some optimizations) and is portable. Stream format Snappy encoding is not bit-oriented, but byte-oriented (only whole bytes are emitted or consumed from a stream). The format uses no entropy encoder, like Huffman coding or arithmetic coding. The first bytes of the stream are the length of uncompressed data, stored as a little-endian varint, which allows for use of a variable-length code. The lower seven bits of each byte are used for data and the high bit is a flag to indicate the end of the length field. The remaining bytes in the stream are encoded using one of four element types. The element type is encoded in the lower two bits of the first byte (tag byte) of the element: 00 – Literal – uncompressed data; upper 6 bits are used to store length (len-1) of data. Lengths larger than 60 are stored in a 1-4 byte integer indicated by a 6 bit length of 60 (1 byte) to 63 (4 bytes). 01 – Copy with length stored as 3 bits and offset stored as 11 bits; one byte after tag byte is used for part of offset; 10 – Copy with length stored as 6 bits of tag byte
https://en.wikipedia.org/wiki/Actinophrys
Actinophrys is a genus of heliozoa, amoeboid unicellular organisms with many axopodial filaments that radiate out of their cell. It contains one of the most common heliozoan species, Actinophrys sol. It is classified within the monotypic family Actinophryidae. Characteristics Actinophrys species belong to an informal group known as heliozoa, which are unicellular eukaryotes (or protists) that are heterotrophic (also known as protozoa) and present stiff radiating arms known as axopodia. In particular, Actinophrys species are characterized by axonemes consisting of double interlocking spirals of microtubules. Their axonemes end on a large central nucleus. They are also characterized by the siliceous material present in their cysts. Systematics Actinophrys was described in 1830 by German naturalist Christian Gottfried Ehrenberg, with the type species Actinophrys sol. The species originally belonged to a genus named Trichoda, described earlier by Otto Friedrich Müller and later declared obsolete. In 1824, Bory de St. Vincent transferred that species to a new genus Peritricha but, without any new observations to justify the change, it fell out of use. Species There are currently four accepted species of Actinophrys. Actinophrys sol (=A. difformis ; A. marina ; A. stella ; A. oculata ; A. tenuipes ; A. fissipes ; A. longipes ; A. tunicata ; A. limbata ; A. paradoxa ; A. picta ; A. alveolata ; A. subalpina ; A. vesiculata ) Actinophrys pontica Actinophrys salsuginosa Actinophrys tauryanini
https://en.wikipedia.org/wiki/Secreted%20frizzled-related%20protein%201
Secreted frizzled-related protein 1, also known as SFRP1, is a protein which in humans is encoded by the SFRP1 gene. Function Secreted frizzled-related protein 1 (SFRP1) is a member of the SFRP family that contains a cysteine-rich domain homologous to the putative Wnt-binding site of Frizzled proteins. SFRPs act as soluble modulators of Wnt signaling. SFRP1 and SFRP5 may be involved in determining the polarity of photoreceptor cells in the retina. SFRP1 is expressed in several human tissues, with the highest levels in the heart. The Secreted frizzled-related protein (SFRP) family consists of five secreted glycoproteins in humans (SFRP1, SFRP2, SFRP3, SFRP4, SFRP5) that act as extracellular signaling ligands. Each SFRP is ~300 amino acids in length and contains a cysteine-rich domain (CRD) that shares 30-50% sequence homology with the CRD of Frizzled (Fz) receptors. SFRPs are able to bind Wnt proteins and Fz receptors in the extracellular compartment. The interaction between SFRPs and Wnt proteins prevents the latter from binding the Fz receptors. SFRPs are also able to downregulate Wnt signaling by the formation of an inhibitory complex with the Frizzled receptors. The Wnt pathway plays a key role in embryonic development, cell differentiation and cell proliferation. It has been shown that the deregulation of this critical developmental pathway occurs in several human tumor entities. SFRP1 is a 35 kDa prototypical member of the SFRP family. It acts as a biphasic modulator of Wnt signaling, counteracting Wnt-induced effects at high concentrations and promoting them at lower concentrations. It is located in a chromosomal region (8p12-p11.1) that is frequently deleted in breast cancer and is thought to harbour a tumor suppressor gene. Tumor suppression There are 3 types of tumor suppressor genes: Genes that affect cell growth Genes that limit the cell cycle and induce apoptosis Genes that repair damaged DNA SFRP1 appears to fall in the first catego
https://en.wikipedia.org/wiki/Momordicilin
Momordicilin or 24-[1′-hydroxy,1′-methyl-2′-pentenyloxyl]-ursan-3-one is a chemical compound, a triterpenoid with formula , found in the fresh fruit of the bitter melon (Momordica charantia). The compound is soluble in ethyl acetate and chloroform but not in petrol. It crystallizes as needles that melt at 170−171 °C. It was isolated in 1997 by S. Begum and others. See also Momordicin I Momordicin-28 Momordicinin Momordenol Momordol
https://en.wikipedia.org/wiki/Calculator%20spelling
Calculator spelling is an unintended characteristic of the seven-segment display traditionally used by calculators, in which, when read upside-down, the digits resemble letters of the Latin alphabet. Each digit may be mapped to one or more letters, creating a limited but functional subset of the alphabet, sometimes referred to as beghilos (or beghilosz). Applications Aside from novelty and amusement, calculator spelling has limited utility. The popularity of pagers in the 1990s gave rise to a form of leetspeak called pagerspeak. Students, in particular, experimented with calculators to discover new words. English version The "original" attributed example of calculator spelling, which dates from the 1970s, is 5318008, which when turned over spells "BOOBIES". Another early example of calculator spelling offered the sequence 0.7734, which becomes "hello", or could also be written as "0.1134". The 1979 album Five Three One - Double Seven O Four by The Hollies encodes the band's name in calculator spelling ("hOLLIES"). Other words possible with the traditional "BEghILOSZ" set include "loose", "shell", "BEIgE", "gOBBLE", "gOOgLE", and many others. Among the longest are "hILLBILLIES" and "SLEIghBELLS" at 11, "gLOSSOLOgIES" and "BIBLIOLOgIES" at 12 letters, and "hEEBEEgEEBEES" at 13 letters. Another common case, 7734206, spells "gO 2 hELL". 8008 is special in that it can spell "BOOB" upside-down or right-side up. 71077345 spells "SHELLOIL". There are also a couple of names that are able to be calculator spelled. For example, 7718=BILL, 46137=LEIgh, 5107=LOIS, 31773=ELLIE, 31717173=ELI LILIE (in Polish: lily flowers of Elisabeth) and 302=ZOE. 80085 (BOOBS) was used as a gag in the episode Mortyplicity of Rick and Morty. During the episode, Rick Sanchez disables clones of the Smith family with the phrase "Analysis mode; password 80085.". His daughter, Beth Smith, makes the comment "Kinda expected a funnier password." Scientific and programmer calculators Scientific
https://en.wikipedia.org/wiki/Hypoxia-inducible%20factor
Hypoxia-inducible factors (HIFs) are transcription factors that respond to decreases in available oxygen in the cellular environment, or hypoxia. They are only present in parahoxozoan animals. Discovery The HIF transcriptional complex was discovered in 1995 by Gregg L. Semenza and postdoctoral fellow Guang Wang. In 2016, William Kaelin Jr., Peter J. Ratcliffe and Gregg L. Semenza were presented the Lasker Award for their work in elucidating the role of HIF-1 in oxygen sensing and its role in surviving low oxygen conditions. In 2019, the same three individuals were jointly awarded the Nobel Prize in Physiology or Medicine for their work in elucidating how HIF senses and adapts cellular response to oxygen availability. Structure Oxygen-breathing species express the highly conserved transcriptional complex HIF-1, which is a heterodimer composed of an alpha and a beta subunit, the latter being a constitutively-expressed aryl hydrocarbon receptor nuclear translocator (ARNT). HIF-1 belongs to the PER-ARNT-SIM (PAS) subfamily of the basic helix-loop-helix (bHLH) family of transcription factors. The alpha and beta subunit are similar in structure and both contain the following domains: N-terminus – a bHLH domain for DNA binding central region – Per-ARNT-Sim (PAS) domain, which facilitates heterodimerization C-terminus – recruits transcriptional coregulatory proteins Members The following are members of the human HIF family: Function HIF1α expression in haematopoietic stem cells explains the quiescence nature of stem cells for being metabolically maintaining at a low rate so as to preserve the potency of stem cells for long periods in a life cycle of an organism. The HIF signaling cascade mediates the effects of hypoxia, the state of low oxygen concentration, on the cell. Hypoxia often keeps cells from differentiating. However, hypoxia promotes the formation of blood vessels, and is important for the formation of a vascular system in embryos and tumors. The hyp
https://en.wikipedia.org/wiki/Biomedical%20technology
Biomedical technology is the application of engineering and technology principles to the domain of living or biological systems, with an emphasis on human health and diseases. Biomedical engineering and Biotechnology alike are often loosely called Biomedical Technology or Bioengineering. The Biomedical technology field is currently growing at a rapid pace. Biomedical news has often been reported on various platforms, including the MediUnite Journal; and required jobs for the industry expect to grow 23% by 2024, and with the pay averaging over $86,000. Biomedical technology involves: Biomedical science Biomedical informatics Biomedical research Biomedical engineering Bioengineering Biotechnology Biomedical technologies: Cloning Therapeutic cloning
https://en.wikipedia.org/wiki/Factorization%20system
In mathematics, it can be shown that every function can be written as the composite of a surjective function followed by an injective function. Factorization systems are a generalization of this situation in category theory. Definition A factorization system (E, M) for a category C consists of two classes of morphisms E and M of C such that: E and M both contain all isomorphisms of C and are closed under composition. Every morphism f of C can be factored as for some morphisms and . The factorization is functorial: if and are two morphisms such that for some morphisms and , then there exists a unique morphism making the following diagram commute: Remark: is a morphism from to in the arrow category. Orthogonality Two morphisms and are said to be orthogonal, denoted , if for every pair of morphisms and such that there is a unique morphism such that the diagram commutes. This notion can be extended to define the orthogonals of sets of morphisms by and Since in a factorization system contains all the isomorphisms, the condition (3) of the definition is equivalent to (3') and Proof: In the previous diagram (3), take (identity on the appropriate object) and . Equivalent definition The pair of classes of morphisms of C is a factorization system if and only if it satisfies the following conditions: Every morphism f of C can be factored as with and and Weak factorization systems Suppose e and m are two morphisms in a category C. Then e has the left lifting property with respect to m (respectively m has the right lifting property with respect to e) when for every pair of morphisms u and v such that ve = mu there is a morphism w such that the following diagram commutes. The difference with orthogonality is that w is not necessarily unique. A weak factorization system (E, M) for a category C consists of two classes of morphisms E and M of C such that: The class E is exactly the class of morphisms having the left lifting property with re
https://en.wikipedia.org/wiki/BioBIKE
BioBike(nee. BioLingua ) is a cloud-based, through-the-web programmable (Paas) symbolic biocomputing and bioinformatics platform that aims to make computational biology, and especially intelligent biocomputing (that is, the application of Artificial Intelligence to computational biology) accessible to research scientists who are not expert programmers. Unique capabilities BioBIKE is an integrated symbolic biocomputing and bioinformatics platform, built from the start as an entirely (what is now called) cloud-based architecture where all computing is done in remote servers, and all user access is accomplished through web browsers. BioBIKE has a built-in frame system in which all objects, data, and knowledge are represented. This enables code written either in the native Lisp, in the visual programming language, or systems of rules expressed in the SNARK theorem prover to access the whole of biological knowledge in an integrated manner. For its time (released in 2002) it was unique in permitting users to create fully functional biocomputing programs that run on the back-end servers entirely through the web browser UI. (In modern terms it was one of the first PaaS (Platform as a Service) systems, predating even Salesforce in this capability.) Initially this programming was carried out in raw Lisp, but Jeff Elhai's team at VCU, with NSF funding, created an entirely graphical programming environment on top of BioBIKE based upon the Boxer-style programming environments. Being a multi-headed, multi-threaded, multi-user, multi-tenancy cloud-based system, BioBIKE users were able to directly work together through their web browsers, remotely sharing the same listener and memory space. This permitted a unique sort of collaboration, discussed in Shrager (2007). A specialized offshoot of BioBIKE called "BioDeducta" includes SRI's SNARK theorem prover, offering unique "deductive biocomputing" capabilities. Implementation BioBIKE is open-source software implemented using
https://en.wikipedia.org/wiki/Percus%E2%80%93Yevick%20approximation
In statistical mechanics the Percus–Yevick approximation is a closure relation to solve the Ornstein–Zernike equation. It is also referred to as the Percus–Yevick equation. It is commonly used in fluid theory to obtain e.g. expressions for the radial distribution function. The approximation is named after Jerome K. Percus and George J. Yevick. Derivation The direct correlation function represents the direct correlation between two particles in a system containing N − 2 other particles. It can be represented by where is the radial distribution function, i.e. (with w(r) the potential of mean force) and is the radial distribution function without the direct interaction between pairs included; i.e. we write . Thus we approximate c(r) by If we introduce the function into the approximation for c(r) one obtains This is the essence of the Percus–Yevick approximation for if we substitute this result in the Ornstein–Zernike equation, one obtains the Percus–Yevick equation: The approximation was defined by Percus and Yevick in 1958. Hard spheres For hard spheres, the potential u(r) is either zero or infinite, and therefore the Boltzmann factor is either one or zero, regardless of temperature T. Therefore structure of a hard-spheres fluid is temperature independent. This leaves just two parameters: the hard-core radius R (which can be eliminated by rescaling distances or wavenumbers), and the packing fraction η (which has a maximum value of 0.64 for random close packing). Under these conditions, the Percus-Yevick equation has an analytical solution, obtained by Wertheim in 1963. Solution as C code The static structure factor of the hard-spheres fluid in Percus-Yevick approximation can be computed using the following C function: double py(double qr, double eta) { const double a = pow(1+2*eta, 2)/pow(1-eta, 4); const double b = -6*eta*pow(1+eta/2, 2)/pow(1-eta, 4); const double c = eta/2*pow(1+2*eta, 2)/pow(1-eta, 4); const double A =
https://en.wikipedia.org/wiki/Rogue%20Company
Rogue Company is a free-to-play multiplayer tactical third-person hero shooter video game developed by First Watch Games and published by Hi-Rez Studios. The game was released in open beta on October 1, 2020 for Microsoft Windows via the Epic Games Store, Steam, Xbox One, PlayStation 4, Nintendo Switch, with an Xbox Series X/S release following on November 25, 2020, and a PlayStation 5 release on March 30, 2021. The game features full support for cross-platform play and cross-progression. The game takes inspiration from the Counter-Strike series of tactical shooters. The game came out of the Beta on May 23, 2022. Gameplay Rogue Company features a range of playable characters, referred to as Rogues. There are 26 playable Rogues in Rogue Company. The game features objective-based game modes and various maps. Matches consist of multiple rounds, with each round usually beginning with both teams skydiving from aircraft to the map below to compete against each other in various objectives. Between rounds players may use money earned from completing tasks and eliminating players in the previous round to buy and upgrade weapons, equipment and perks. A number of game modes have been revealed: Extraction is a 4v4 game mode, where the attacking team is tasked with hacking an objective; the winner of a round is determined once the objective is hacked or all players on a team have been eliminated. Strikeout is a variation of Extraction in which players are able to respawn after being eliminated, with each team having a limited number of respawns each round. In this mode, victory must be achieved via killing enemies until they have no respawns left. This can be more easily achieved by hacking the objective, an area rather than a box. Demolition is a 4v4 mode in which one team must plant a bomb within a time limit. Wingman is a 2v2 game mode, basically the game mode Strikeout but with less respawns and teams of 2. Development Rogue Company was announced on September 5, 2019. F
https://en.wikipedia.org/wiki/Chord%20chart
A chord chart (or chart) is a form of musical notation that describes the basic harmonic and rhythmic information for a song or tune. It is the most common form of notation used by professional session musicians playing jazz or popular music. It is intended primarily for a rhythm section (usually consisting of piano, guitar, drums and bass). In these genres the musicians are expected to be able to improvise the individual notes used for the chords (the "voicing") and the appropriate ornamentation, counter melody or bassline. In some chord charts, the harmony is given as a series of chord symbols above a traditional musical staff. The rhythmic information can be very specific and written using a form of traditional notation, sometimes called rhythmic notation, or it can be completely unspecified using slash notation, allowing the musician to fill the bar with chords or fills any way they see fit (called comping). In Nashville notation the key is left unspecified on the chart by substituting numbers for chord names. This facilitates on-the-spot key changes to songs. Chord charts may also include explicit parts written in modern music notation (such as a musical riff that the song is dependent on for character), lyrics or lyric fragments, and various other information to help the musician compose and play their part. Rhythmic notation Rhythmic notation specifies the exact rhythm in which to play or comp the indicated chords. The chords are written above the staff and the rhythm is indicated in the traditional manner, though pitch is unspecified through the use of slashes placed on the center line instead of notes. This is contrasted with the less specific slash notation. Slash notation Slash notation is a form of purposefully vague musical notation which indicates or requires that an accompaniment player or players improvise their own rhythm pattern or comp according to the chord symbol given above the staff. On the staff a slash is placed on each beat (so that th
https://en.wikipedia.org/wiki/Faustmann%27s%20formula
Faustmann's formula, or the Faustmann model, gives the present value of the income stream for forest rotation. It was derived by the German forester Martin Faustmann in 1849. The rotation problem, deciding when to cut down the forest, means solving the problem of maximising Faustmann's formula and this was solved by Bertil Ohlin in 1921 to become the Faustmann-Ohlin theorem, although other German foresters were aware of the correct solution in 1860. ƒ(T) is the stock of timber at time T p the price of timber and is constant which implies that the value of the forest at time T is pf(T) r is the discount rate and is also constant. The Faustmann formula is as follows: From this formula two theorems are interpreted: The optimal time to cut the forest is when the time rate of change of its value is equal to interest on the value of the forest plus the interest on the value of the land. The optimal time to cut is when the time rate of change of its value is equal to the interest rate modified by land rent. See also Hotelling's rule
https://en.wikipedia.org/wiki/Collateral%20eminence
The collateral eminence is an elongated swelling lying lateral parallel with the hippocampus. It corresponds with the medial part of the collateral fissure, and its size depends on the depth and direction of this fissure. It is continuous behind with a flattened triangular area, the trigone of the lateral ventricle, situated between the posterior and inferior horn. It is not always present.
https://en.wikipedia.org/wiki/Spine%20of%20scapula
The spine of the scapula or scapular spine is a prominent plate of bone, which crosses obliquely the medial four-fifths of the scapula at its upper part, and separates the supra- from the infraspinatous fossa. Structure It begins at the vertical [vertebral or medial border] border by a smooth, triangular area over which the tendon of insertion of the lower part of the Trapezius glides, and, gradually becoming more elevated, ends in the acromion, which overhangs the shoulder-joint. The spine is triangular, and flattened from above downward, its apex being directed toward the vertebral border. Root The root of the spine of the scapula is the most medial part of the scapular spine. It is termed "triangular area of the spine of scapula", based on its triangular shape giving it distinguishable visible shape on x-ray images. The root of the spine is on a level with the tip of the spinous process of the third thoracic vertebra. Function It presents two surfaces and three borders. Its superior surface is concave; it assists in forming the supraspinatous fossa, and gives origin to part of the supraspinatus. Its inferior surface forms part of the infraspinatous fossa, gives origin to a portion of the infraspinatus, and presents near its center the orifice of a nutrient canal. Of the three borders, the anterior is attached to the dorsal surface of the bone; the posterior, or crest of the spine, is broad, and presents two lips and an intervening rough interval. The trapezius is attached to the superior lip, and a rough tubercle is generally seen on that portion of the spine which receives the tendon of insertion of the lower part of this muscle. The deltoideus is attached to the whole length of the inferior lip. The interval between the lips is subcutaneous and partly covered by the tendinous fibers of these muscles. The lateral border, or base, the shortest of the three, is slightly concave; its edge, thick and round, is continuous above with the under surface of th
https://en.wikipedia.org/wiki/Visual%20comparison
A visual comparison is to compare two or more things by eye. This might be done by placing them side by side; by overlaying them; by alternating an image or by presenting each image to a separate eye. Such comparisons are the first stage in a child's development of an understanding of geometry and measurement, before they move to an understanding of measuring devices such as a ruler. People with sufficient control over the parallax of their eyeballs (e.g. those who can easily view random-dot stereograms) can hold up two paper printouts and go cross-eyed to superimpose them. This invokes deep, fast, built-in image comparison wetware (the same machinery responsible for depth perception) and differences stand out almost immediately. This technique is good for finding edits in graphical images, or for comparing an image with a compressed version to spot artefacts. Visual comparison with a standard chart or reference is often used as a means of measuring complex phenomena such as the weather, sea states or the roughness of a river. A colour chart is used for this purpose in many contexts such as chemistry, cosmetics, medical testing and photography. Comparison by eye may also be used as a source of amusement or intelligence testing, as in the popular puzzle of spot the difference. In policing, the technique is used for analysis of fingerprints and identity parades. Visual comparison task can be simplified by using a computer software (e.g. Image Compare application) that automatically aligns a pair of images based on common visual features present in the two images. Such computer assisted visual comparison is being increasingly popular in Book history research. Computer jargon A visual diff finds differences between two files by eyeball search. The term optical diff has also been reported, and is sometimes more specifically used for the act of superimposing two nearly identical printouts on one another and holding them up to a light to spot differences. Though t
https://en.wikipedia.org/wiki/Gamma%20counter
A gamma counter is an instrument to measure gamma radiation emitted by a radionuclide. Unlike survey meters, gamma counters are designed to measure small samples of radioactive material, typically with automated measurement and movement of multiple samples. Operation Gamma counters are usually scintillation counters. In a typical system, a number of samples are placed in sealed vials or test tubes, and moved along a track. One at a time, they move down inside a shielded detector, set to measure specific energy windows characteristic of the particular isotope. Within this shielded detector there is a scintillation crystal that surrounds the radioactive sample. Gamma rays emitted from the radioactive sample interact with the crystal, are absorbed, and light is emitted. A detector, such as a photomultiplier tube converts the visible light to an electrical signal. Depending on the half-life and concentration of the sample, measurement times may vary from 0.02 minutes to several hours. If the photon has too low of an energy level it will be absorbed into the scintillation crystal and never be detected. If the photon has too high of an energy level the photons may just pass right through the crystal without any interaction. Thus the thickness of the crystal is very important when sampling radioactive materials using the Gamma Counter. Applications Gamma counters are standard tools used in the research and development of new radioactive compounds used for diagnosing (and treating disease) as in PET scanning. Gamma counters are used in radiobinding assays, radioimmunoassays (RIA) and nuclear medicine measurements such as GFR and hematocrit. Some gamma counters can be used for gamma spectroscopy to identify radioactive materials based on their output energy spectrum, e.g. as a wipe test counter.
https://en.wikipedia.org/wiki/Colloids%20and%20Surfaces
Colloids and Surfaces is a peer-reviewed journal of surface science. It was established in 1980. In 1993, it split into two parts Colloids and Surfaces A and Colloids and Surfaces B. The journal is published by Elsevier. Colloids and Surfaces A Colloids and Surfaces A: Physicochemical and Engineering Aspects focused on aspects related to applications of colloids and interfacial phenomena. The journal is published biweekly jointly edited by M. Adler, F. Grieser, J.B. Li and D. Prieve Colloids and Surfaces B Colloids and Surfaces B: Biointerfaces focuses on the biological aspects. It is published monthly jointly edited by J.L. Brash, H.J. Busscher, H. Chen and D. Danino.
https://en.wikipedia.org/wiki/Poultry%20allergy
Poultry meat allergy is a rare food allergy in humans caused by consumption of poultry meat (commonly chicken and turkey) whereby the body triggers an immune reaction and becomes overloaded with immunoglobulin E (IgE) antibodies. It can co-occur with egg allergy but more often occurs without allergy to poultry eggs. One study found that not chicken, just turkey meat are the primary cause of allergic reactions, whilst goose, pheasant, and duck meat cause milder reaction or no symptoms. Symptoms and signs Symptoms are similar to other forms of allergies and occur after ingestion of the allergen. Some symptoms include abdominal cramping, angioedema, generalized urticaria, and chest tightness. Diagnosis Epidemiology As it is a rare condition and it is not well documented; epidemiological data is unknown. Severe cases have been documented. A research study in 2016 found only 16 cases of previously published poultry meat allergy, plus an additional 28 cases that were being analyzed in the study.