source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Basidium | A basidium (: basidia) is a microscopic spore-producing structure found on the hymenophore of reproductive bodies of basidiomycete fungi. These bodies also called tertiary mycelia, which are highly coiled versions of secondary mycelia. The presence of basidia is one of the main characteristic features of the genus. A basidium usually bears four sexual spores called basidiospores. Occasionally the number may be two or even eight. Each reproductive spore is produced at the tip of a narrow prong or horn called a sterigma (), and is forcefully expelled at full growth.
The word basidium literally means "little pedestal". This is the way the basidium supports the spores. However, some biologists suggest that the structure looks more like a club. A partially grown basidium is known as a basidiole.
Structure
Most basidiomycota have single celled basidia (holobasidia), but some have ones with many cells (a phragmobasidia). For instance, rust fungi in the order Puccinales have phragmobasidia with four cells that are separated by walls along their cross section. Some jelly fungi in the order Tremellales also have phragmobasidia with four cells that are separated by walls and are shaped like a cross. Sometimes the basidium develops from a probasidium, which is not elongated like a typical hypha. The basidium may be stalked or attached directly to the hyphae.
The basidium is normally club-shaped: narrow at the stem and wide near its outer end. It is widest in the middle hemispherical dome at its apex, and its base is about half the size of the widest diameter at the highest point. Basidia with a short and narrow base are shaped like an inverted egg, and occur in genera such as Paullicorticium, Oliveonia, and Tulasnella. Basidia with a wide base are often shaped like a barrel.
How basidiospores are expelled
In most basidiomycota, the basidiospores are forcibly expelled. The propulsive force is derived from a sudden change in the center of gravity of the discharged spore. Imp |
https://en.wikipedia.org/wiki/Qi%20Hardware | Qi Hardware is an organization which produces copyleft hardware and software, in an attempt to apply the Free Software Foundation's GNU GPL concept of copylefting software to the hardware layer by using the CC BY-SA license for schematics, bill of materials and PCB layout data. The project has been both a community of popular open hardware websites and a company, founded by Steve Mosher, Jon Phillips, Wolfgang Spraul and Yi Zhang, that makes hardware products. Formed from the now defunct Openmoko project, key members went on to form Qi Hardware Inc. and Sharism At Work Ltd. Thus far, the project has released the Ben Nanonote, the Milkymist One, and the Ben WPAN wireless project to create a copyleft wireless platform. The examples of Qi hardware projects are the Ben NanoNote pocket computer, Elphel 353 video camera and Milkymist One video synthesizer. |
https://en.wikipedia.org/wiki/Consent%20management | Consent management is a system, process or set of policies for allowing consumers and patients to determine what health information they are willing to permit their various care providers to access. It enables patients and consumers to affirm their participation in e-health initiatives and to establish consent directives to determine who will have access to their protected health information (PHI), for what purpose and under what circumstances. Consent management supports the dynamic creation, management and enforcement of consumer, organizational and jurisdictional privacy policies.
Industry References
Gartner Research “Hype Cycle for Healthcare Provider Technologies and Standards
Personal Information Management for Consent Management Solutions
The need to accommodate and automate consumer privacy preferences in health information exchange is recognized by the healthcare industry through various standards activities and consent discussions:
American Medical Informatics Association (AMIA), e-Consent: * The Design and Implementation of Consumer Consent Mechanisms in an Electronic Environment by Enrico Coiera, MBBS, PhD and Roger Clarke, MComm, PhD
Canada Health Infoway, iEHR Tech II Project, Standards Collaborative Partnership
Health Information Security and Privacy Collaboration (HISPC)
Health Information Technology Standards Panel (HITSP), “TP 30 - HITSP Manage Consent Directives Transaction Package.”
Health Level 7, “Community-based Collaborative Care Project.”
Integrating the Healthcare Enterprise (IHE), “Basic Patient Privacy Consents (BPPC).”
Integrating the Healthcare Enterprise (IHE), “Advanced Patient Privacy Consents (APPC).”
Organization for the Advancement of Structured Information Standards (OASIS), “Cross-Enterprise Security and Privacy Authorization (XSPA) Profile of XACML v2.0 for Healthcare Version 1.0.”
IAB Europe: List of Consent Management Provider, “”
Health policy in the United States |
https://en.wikipedia.org/wiki/Mycotic%20aneurysm | An infected aneurysm is an aneurysm arising from bacterial infection of the arterial wall. It can be a common complication of the hematogenous spread of bacterial infection.
Cause
Intracranial mycotic aneurysms (ICMAs) complicate about 2% to 3% of infective endocarditis (IE) cases, although as many as 15% to 29% of patients with IE have neurologic symptoms. Staphylococcus and Salmonella spp are the most common organisms that cause mycotic aneurysms. Anaerobic bacteria such as Bacteroides, and Clostridium spp can also cause mycotic aneurysms.
Treatment
Mycotic abdominal aorta aneurysm (MAAA) is a rare and life-threatening condition. Because of its rarity, there is a lack of adequately powered studies and consensus on its treatment and follow up. A management protocol on the management of mycotic abdominal aortic aneurysm was recently published in the Annals of Vascular Surgery by Premnath et al.
History
William Osler first used the term "mycotic aneurysm" in 1885 to describe a mushroom-shaped aneurysm in a patient with subacute bacterial endocarditis. This may create considerable confusion, since "mycotic" is typically used to define fungal infections. However, mycotic aneurysm is still used for all extracardiac or intracardiac aneurysms caused by infections, except for syphilitic aortitis.
The term "infected aneurysm" proposed by Jarrett and associates is more appropriate, since few infections involve fungi. According to some authors, a more accurate term might have been endovascular infection or infective vasculitis, because mycotic aneurysms are not due to a fungal organism.
Complications
Mycotic aneurysms account for 2.6% of aortic aneurysms. For the clinician, early diagnosis is the cornerstone of effective treatment. Without medical or surgical management, catastrophic hemorrhage or uncontrolled sepsis may occur. However, symptomatology is frequently nonspecific during the early stages, so a high index of suspicion is required to make the diagnosis. |
https://en.wikipedia.org/wiki/Four%20Big%20Things | The Four Big Things () is a term originally applied to the four symbols of material success in China from the 1950s until the 1970s, and is now used to refer to any visible marker of newfound affluence. The original list was:
A sewing machine
A bicycle
A wristwatch, generally from Shanghai Watch Company
A radio receiver, usually Red Star or Red Lantern brand
More recently, the "Four Big Things" could include televisions, refrigerators, cameras, cell phones, computers, apartments, cars, etc. |
https://en.wikipedia.org/wiki/Project%20Jefferson | Project Jefferson was a covert U.S. Defense Intelligence Agency program designed to determine if the current anthrax vaccine was effective against genetically modified bacteria. The program's legal status under the 1972 Biological Weapons Convention (BWC) is disputed.
History
The operation
Project Jefferson began in 1997 and was designed to reproduce a strain of genetically modified anthrax isolated by Russian scientists during the 1990s. The goal was to determine whether or not the strain was resistant to the commercially available U.S. anthrax vaccine.
Reportage
The project was disclosed in a September 4, 2001 article in The New York Times. Reporters Judith Miller, Stephen Engelberg and William J. Broad collaborated to write the article. It is presumed that the reporters had knowledge of the program for at least several months; shortly after the article appeared they published a book that detailed the story further. The 2001 book, Germs: Biological Weapons and America's Secret War, and the article are the only publicly available sources detailing Project Jefferson and its sister projects, Bacchus and Clear Vision.
Legality
Project Jefferson was operated by the Defense Intelligence Agency and reviewed by lawyers at the Pentagon. Those lawyers determined that Project Jefferson was in line with the BWC. Despite assertions from the Clinton and Bush administrations that the project, and its sisters, were legal, several international legal scholars disagreed.
Notable was the fact that the clandestine program was omitted from BWC confidence-building measure (CBM) declarations. These measures were introduced to the BWC in 1986 and 1991 to strengthen the treaty, the U.S. had long been a proponent of their value and some asserted that these tests damaged American credibility. U.S. desire to keep such programs secret was, according to Bush administration officials, a "significant reason" that Bush rejected a draft agreement signed by 143 nations to strengthen the BWC. |
https://en.wikipedia.org/wiki/Causal%20notation | In nature and human societies, many phenomena have causal relationships where one phenomenon A (a cause) impacts another phenomenon B (an effect). Establishing causal relationships is the aim of many scientific studies across fields ranging from biology and physics to social sciences and economics. It is also a subject of accident analysis, and can be considered a prerequisite for effective policy making.
To describe causal relationships between phenomena, non-quantitative visual notations are common, such as arrows, e.g. in the nitrogen cycle or many chemistry and mathematics textbooks. Mathematical conventions are also used, such as plotting an independent variable on a horizontal axis and a dependent variable on a vertical axis, or the notation to denote that a quantity "" is a dependent variable which is a function of an independent variable "". Causal relationships are also described using quantitative mathematical expressions.
The following examples illustrate various types of causal relationships. These are followed by different notations used to represent causal relationships.
Examples
What follows does not necessarily assume the convention whereby denotes an independent variable, and
denotes a function of the independent variable . Instead, and denote two quantities with an a priori unknown causal relationship, which can be related by a mathematical expression.
Ecosystem example: correlation without causation
Imagine the number of days of weather below zero degrees Celsius, , causes ice to form on a lake, , and it causes bears to go into hibernation . Even though does not cause and vice-versa, one can write an equation relating and . This equation may be used to successfully calculate the number of hibernating bears , given the surface area of the lake covered by ice. However, melting the ice in a region of the lake by pouring salt onto it, will not cause bears to come out of hibernation. Nor will waking the bears by physically disturbing the |
https://en.wikipedia.org/wiki/SNP%20annotation | Single nucleotide polymorphism annotation (SNP annotation) is the process of predicting the effect or function of an individual SNP using SNP annotation tools. In SNP annotation the biological information is extracted, collected and displayed in a clear form amenable to query. SNP functional annotation is typically performed based on the available information on nucleic acid and protein sequences.
Introduction
Single nucleotide polymorphisms (SNPs) play an important role in genome wide association studies because they act as primary biomarkers. SNPs are currently the marker of choice due to their large numbers in virtually all populations of individuals. The location of these biomarkers can be tremendously important in terms of predicting functional significance, genetic mapping and population genetics. Each SNP represents a nucleotide change between two individuals at a defined location. SNPs are the most common genetic variant found in all individual with one SNP every 100–300 bp in some species. Since there is a massive number of SNPs on the genome, there is a clear need to prioritize SNPs according to their potential effect in order to expedite genotyping and analysis.
Annotating large numbers of SNPs is a difficult and complex process, which need computational methods to handle such a large dataset. Many tools available have been developed for SNP annotation in different organisms: some of them are optimized for use with organisms densely sampled for SNPs (such as humans), but there are currently few tools available that are species non-specific or support non-model organism data. The majority of SNP annotation tools provide computationally predicted putative deleterious effects of SNPs. These tools examine whether a SNP resides in functional genomic regions such as exons, splice sites, or transcription regulatory sites, and predict the potential corresponding functional effects that the SNP may have using a variety of machine-learning approaches. But the t |
https://en.wikipedia.org/wiki/Fiber%20to%20the%20x | Fiber to the x (FTTX; also spelled "fibre") or fiber in the loop is a generic term for any broadband network architecture using optical fiber to provide all or part of the local loop used for last mile telecommunications. As fiber optic cables are able to carry much more data than copper cables, especially over long distances, copper telephone networks built in the 20th century are being replaced by fiber.
FTTX is a generalization for several configurations of fiber deployment, arranged into two groups: FTTP/FTTH/FTTB (Fiber laid all the way to the premises/home/building) and FTTC/N (fiber laid to the cabinet/node, with copper wires completing the connection).
Residential areas already served by balanced pair distribution plant call for a trade-off between cost and capacity. The closer the fiber head, the higher the cost of construction and the higher the channel capacity. In places not served by metallic facilities, little cost is saved by not running fiber to the home.
Fiber to the x is the key method used to drive next-generation access (NGA), which describes a significant upgrade to the broadband available by making a step change in speed and quality of the service. This is typically thought of as asymmetrical with a download speed of 24 Mbit/s plus and a fast upload speed.
Ofcom have defined super-fast broadband as "broadband products that provide a maximum download speed that is greater than 24 Mbit/s - this threshold is commonly considered to be the maximum speed that can be supported on current generation (copper-based) networks."
A similar network called a hybrid fiber-coaxial (HFC) network is used by cable television operators but is usually not synonymous with "fiber In the loop", although similar advanced services are provided by the HFC networks. Fixed wireless and mobile wireless technologies such as Wi-Fi, WiMAX and 3GPP Long Term Evolution (LTE) are an alternative for providing Internet access.
Definitions
The telecommunications industry differe |
https://en.wikipedia.org/wiki/Hardware%20reset | A hardware reset or hard reset of a computer system is a hardware operation that re-initializes the core hardware components of the system, thus ending all current software operations in the system. This is typically, but not always, followed by booting of the system into firmware that re-initializes the rest of the system, and restarts the operating system.
Hardware resets are an essential part of the power-on process, but may also be triggered without power cycling the system by direct user intervention via a physical reset button, watchdog timers, or by software intervention that, as its last action, activates the hardware reset line (e.g, in a fatal error where the computer crashes).
User initiated hard resets can be used to reset the device if the software hangs, crashes, or is otherwise unresponsive. However, data may become corrupted if this occurs. Generally, a hard reset is initiated by pressing a dedicated reset button, or holding a combination of buttons on some mobile devices. Devices may not have a dedicated Reset button, but have the user hold the power button to cut power, which the user can then turn the computer back on. On some systems (e.g, the PlayStation 2 video game console), pressing and releasing the power button initiates a hard reset, and holding the button turns the system off.
Hardware reset in 80x86 IBM PC
The 8086 microprocessors provide RESET pin that is used to do the hardware reset. When a HIGH is applied to the pin, the CPU immediately stops, and sets the major registers to these values:
The CPU uses the values of CS and IP registers to find the location of the next instruction to execute. Location of next instruction is calculated using this simple equation:
Location of next instruction = (CS<<4) + (IP)
This implies that after the hardware reset, the CPU will start execution at the physical address 0xFFFF0. In IBM PC compatible computers, This address maps to BIOS ROM. The memory word at 0xFFFF0 usually contains a JMP ins |
https://en.wikipedia.org/wiki/Comparison%20of%20X%20window%20managers | This article compares variety of different X window managers. For an introduction to the topic, see X Window System.
General information
Features
See also
Comparison of X Window System desktop environments
Window manager
List of Wayland compositors |
https://en.wikipedia.org/wiki/2520%20%28number%29 | 2520 (two thousand five hundred twenty) is the natural number following 2519 and preceding 2521.
In mathematics
2520 is:
the smallest number divisible by all integers from one to ten, i.e., it is their least common multiple.
half of 7! (5040), meaning 7 factorial, or .
the product of five consecutive numbers, namely .
a superior highly composite number.
a colossally abundant number.
the last highly composite number that is half of the next highly composite number.
the last highly composite number that is a divisor of all following highly composite numbers.
palindromic in undecimal (199111) and a repdigit in bases 55, 59, and 62.
a Harshad number in all bases between binary and hexadecimal.
the aliquot sum of 1080.
part of the 53-aliquot tree. The complete aliquot sequence starting at 1080 is 1080, 2520, 6840, 16560, 41472, 82311, 27441, 12209, 451, 53, 1, 0.
Factors
The factors, also called divisors, of 2520 are:
1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 14, 15, 18, 20, 21, 24, 28, 30, 35, 36, 40, 42, 45, 56, 60, 63, 70, 72, 84, 90, 105, 120, 126, 140, 168, 180, 210, 252, 280, 315, 360, 420, 504, 630, 840, 1260, 2520. |
https://en.wikipedia.org/wiki/Dermatocranium | The dermatocranium is the portion of the cranium that is composed of dermal bone, as opposed to the endocranium and splanchnocranium, which are composed of endochondral bone. The dermatocranium comprises the skull roof, the facial skeleton (usually excluding the dentary), and—in fishes—the opercular bones. |
https://en.wikipedia.org/wiki/ArviZ | ArviZ ( ) is a Python package for exploratory analysis of Bayesian models.
When working with Bayesian models there are a series of related tasks that need to be addressed besides inference itself:
Diagnoses of the quality of the inference, this is needed when using numerical methods such as Markov chain Monte Carlo techniques
Model criticism, including evaluations of both model assumptions and model predictions
Comparison of models, including model selection or model averaging
Preparation of the results for a particular audience
All these tasks are part of the Exploratory analysis of Bayesian models approach, and successfully performing them is central to the iterative and interactive modeling process. These tasks require both numerical and visual summaries.
ArviZ offers data structures for manipulating data common in Bayesian analysis, like numerical samples from the posterior, prior predictive and posterior predictive distributions as well as observed data. Additionally, many numerical and visual diagnostics as well as plots are available. The ArviZ name is derived from reading "rvs" (the short form of random variates) as a word instead of spelling it and also using the particle "viz" usually used to abbreviate visualization.
ArviZ is an open source project, developed by the community and is an affiliated project of NumFOCUS. and it has been used to help interpret inference problems in several scientific domains, including astronomy, neuroscience, physics and statistics.
Library features
InferenceData object for Bayesian data manipulation. This object is based on xarray
Plots using two alternative backends matplotlib or bokeh
Numerical summaries and diagnostics for Markov chain Monte Carlo methods.
Integration with established probabilistic programming languages including; PyStan (the Python interface of Stan), PyMC, Edward Pyro, and easily integrated with novel or bespoke Bayesian analyses. ArviZ is also available in Julia, using the ArviZ.jl inter |
https://en.wikipedia.org/wiki/Epipharyngeal%20groove | The epipharyngeal groove is a ciliated groove along the dorsal side of the inside of the pharynx in some plankton-feeding early chordates, such as Amphioxus. It helps to carry a stream of mucus with plankton stuck in it, through the pharynx into the gut to be digested.
The subnotochordal rod or hypochord is a transient structure that appears ventral to the notochord in the heads of embryos of some vertebrates. Its appearance is stimulated by a chemical secreted by the notochord. The subnotochordal rod helps to stimulate development of the dorsal aorta.
There is an opinion that these two structures are homologous. |
https://en.wikipedia.org/wiki/Stronger%20Together%2C%20Tous%20Ensemble | Stronger Together, Tous Ensemble was a 90-minute Canadian benefit concert which aired on April 26, 2020, during the COVID-19 pandemic and a week after the 2020 Nova Scotia attacks. The program drew an audience of over 11,500,000 viewers and listeners, and was simulcast by every major Canadian television broadcast company, including Bell Media (CTV), Canadian Broadcasting Corporation (CBC Television), Rogers Media (Citytv), Corus Entertainment (Global), V, and numerous other television, radio, and Internet-based broadcast platforms. This made it both the largest multi-platform broadcast and highest viewed non-sporting broadcast in Canadian television history. Numerous singers, actors, athletes, charities, and those impacted by coronavirus were featured including remarks by Prime Minister Justin Trudeau. Over in donations during the event were raised for Food Banks Canada.
Production
Stronger Together, Tous Ensemble is primarily composed of homemade video from various celebrities' households, singing or giving words of encouragement. The program was created in collaboration to unite viewers during the COVID-19 pandemic and after the 2020 Nova Scotia attacks.
Broadcasters
The benefit concert aired on 120 different radio, television, and online platforms.
On television, the concert was broadcast on English-language stations CTV, CBC Television, Citytv, and Global. It was also broadcast on French-language station V. The special was also simulcast on networks owned by Bell Media (CP24, CTV 2, MTV, Much, TSN, and Vrak), the Canadian Broadcasting Corporation (Ici ARTV and Unis), Rogers Media (FX and Omni Television), Corus Entertainment (ABC Spark, National Geographic, SériesPlus, and Slice), Asian Television Network (ATN HD, ATN Bangla, ATN Cricket Plus, ATN Food Food, ATN Gujarati, ATN Jaya TV, ATN Life, ATN PM One, ATN Punjabi Plus, and CBN), Blue Ant Media (A.Side TV, BBC Earth, Cottage Life, HIFI, Love Nature, Makeful, and Smithsonian Channel), and Stingray Group ( |
https://en.wikipedia.org/wiki/Constrained%20equal%20awards | Constrained equal awards (CEA), also called constrained equal gains, is a division rule for solving bankruptcy problems. According to this rule, each claimant should receive an equal amount, except that no claimant should receive more than his/her claim. In the context of taxation, it is known as leveling tax.
Formal definition
There is a certain amount of money to divide, denoted by (=Estate or Endowment). There are n claimants. Each claimant i has a claim denoted by . Usually, , that is, the estate is insufficient to satisfy all the claims.
The CEA rule says that each claimant i should receive , where r is a constant chosen such that . The rule can also be described algorithmically as follows:
Initially, all agents are active, and all agents get 0.
While there are remaining units of the estate:
The next estate unit is divided equally among all active agents.
Each agent whose total allocation equals its claim becomes inactive.
Examples
Examples with two claimants:
; here . In general, when all claims are at least , each claimant receives exactly .
; here .
Examples with three claimants:
; here .
; here .
; here .
; here .
; here .
Usage
In the Jewish law, if several creditors have claims to the same bankrupt debtor, all of which have the same precedence (e.g. all loans have the same date), then the debtor's assets are divided according to CEA.
Characterizations
The CEA rule has several characterizations. It is the only rule satisfying the following sets of axioms:
Equal treatment of equals, invariance under truncation of claims, and composition up;
Conditional full compensation, and composition down;
Conditional full compensation, and claims-monotonicity.
Dual rule
The constrained equal losses (CEL) rule is the dual of the CEA rule, that is: for each problem , we have . |
https://en.wikipedia.org/wiki/Howard%20Wilson%20Emmons | Howard Wilson Emmons (1912–1998) was an American professor in the department of Mechanical Engineering at Harvard University. During his career he conducted original research on fluid mechanics, combustion and fire safety. Today he is most widely known for his pioneering work in the field of fire safety engineering. He has been called "the father of modern fire science" for his contribution to the understanding of flame propagation and fire dynamics. He also helped design the first supersonic wind tunnel, identified a signature of the transition to turbulence in boundary layer flows (now known as "Emmons spots"), and was the first to observe compressor stall in a gas turbine compressor (still a major item of research today). He initiated studies on diffusion flames inside a boundary layer, and Emmons problem is named after him. He was eventually awarded the Timoshenko Medal by the American Society of Mechanical Engineers and the 1968 Sir Alfred Egerton Gold Medal from The Combustion Institute.
Upon Professor Emmons' death, Professor Patrick Pagni wrote, "It is not possible to properly summarize the magnitude of Professor Emmons' unique contributions to the establishment of fire safety science as a discipline, other than to call him "Mr. Fire Research".
He continues to be remembered through the Emmons Lecture at International Symposium of The International Association for Fire Safety Science and the Howard W. Emmons Distinguished Scholar Endowment at Worcester Polytechnic Institute.
Biography
Born in Morristown, New Jersey on August 30, 1912.
Bachelor of Engineering in mechanical engineering from Stevens Institute of Technology in 1933.
Master of Engineering in mechanical engineering from Stevens Institute of Technology in 1935.
Doctor of Science in mechanical engineering for Harvard University in 1938.
Advisors were John Finnie Downie Smith and Charles Harold Berry.
Worked briefly for Westinghouse and the University of Pennsylvania.
Professor at Harvard from 19 |
https://en.wikipedia.org/wiki/Time%20Slotted%20Channel%20Hopping | Time Slotted Channel Hopping or Time Synchronized Channel Hopping (TSCH) is a channel access method for shared-medium networks.
TSCH is used by Low-Power devices to communicate using a wireless link. It is designed for low-power and lossy networks (LLNs) and aims at providing a reliable Media access control layer.
TSCH can be seen as a combination of Time division multiple access and Frequency-division multiple access mechanisms as it uses diversity in time and frequency to provide reliability to the upper network layers.
The TSCH mode was introduced in 2012 as an amendment (IEEE 802.15.4e) to the Medium Access Control (MAC) portion of the IEEE 802.15.4 standard. The amendment was rolled into the IEEE 802.15.4 in 2015.
Description
Wireless communications are often referred as unreliable due to the unpredictability of the wireless medium. While wireless communications bring many advantages (e.g no wires maintenance, costs reduction ...), the lack of reliability slows down the adoption of wireless networks technologies.
TSCH aims at reducing the impact of the wireless medium unpredictability to enable the use of reliable low-power wireless networks. It is very good at saving the nodes' energy because each node shares a schedule, allowing it to know in advance when to turn on or off its radio.
The IEEE 802.15.4 standard uses different frequency bands, and each frequency band is separated in channels. In TSCH, communications are done using those different channels and at different times. However, this standard does not define how to build and maintain the communication schedule. Many works have been proposed to organize the schedule in a centralized or distributed way.
Channel Hopping
Let chOf be the channel offset, assigned to a given link. The channel offset, chOf, is translated to a frequency f (i.e. a real channel) using:
where ASN is the Absolute Slot Number, i.e. the total number of slots that elapsed since the network was deployed. The ASN is increment |
https://en.wikipedia.org/wiki/Predictive%20informatics | Predictive informatics (PI) is the combination of predictive modeling and informatics applied to healthcare, pharmaceutical, life sciences and business industries.
Predictive informatics enables researchers, analysts, physicians and decision-makers to aggregate and analyze disparate types of data, recognize patterns and trends within that data, and make more informed decisions in an effort to preemptively alter future outcomes.
Current uses of PI
Healthcare
Over the past decade the increased usage of electronic health records has produced vast amounts of clinical data that is now computable. Predictive informatics integrates this data with other datasets (e.g., genotypic, phenotypic) in centralized and standardized data repositories upon which predictive analytics may be conducted.
Pharmaceuticals
The biopharmaceutical industry uses predictive informatics (a superset of chemoinformatics) to integrate information resources to transform data into knowledge in order to make better decisions faster in the area of drug lead identification and optimization.
Systems biology
Scientists involved in systems biology employ predictive informatics to integrate complex data about the interactions in biological systems from diverse experimental sources.
Other uses
Predictive informatics and analytics are also used in financial services, insurance, telecommunications, retail, and travel industries.
See also
Predictive analytics
Informatics (academic field)
Predictive modeling
Biomedical informatics
Chemoinformatics |
https://en.wikipedia.org/wiki/Computational%20physics | Computational physics is the study and implementation of numerical analysis to solve problems in physics. Historically, computational physics was the first application of modern computers in science, and is now a subset of computational science. It is sometimes regarded as a subdiscipline (or offshoot) of theoretical physics, but others consider it an intermediate branch between theoretical and experimental physics — an area of study which supplements both theory and experiment.
Overview
In physics, different theories based on mathematical models provide very precise predictions on how systems behave. Unfortunately, it is often the case that solving the mathematical model for a particular system in order to produce a useful prediction is not feasible. This can occur, for instance, when the solution does not have a closed-form expression, or is too complicated. In such cases, numerical approximations are required. Computational physics is the subject that deals with these numerical approximations: the approximation of the solution is written as a finite (and typically large) number of simple mathematical operations (algorithm), and a computer is used to perform these operations and compute an approximated solution and respective error.
Status in physics
There is a debate about the status of computation within the scientific method. Sometimes it is regarded as more akin to theoretical physics; some others regard computer simulation as "computer experiments", yet still others consider it an intermediate or different branch between theoretical and experimental physics, a third way that supplements theory and experiment. While computers can be used in experiments for the measurement and recording (and storage) of data, this clearly does not constitute a computational approach.
Challenges in computational physics
Computational physics problems are in general very difficult to solve exactly. This is due to several (mathematical) reasons: lack of algebraic and/or anal |
https://en.wikipedia.org/wiki/QRA%20locator | The QRA locator, also called QTH locator in some publications, is an obsolete geographic coordinate system used by amateur radio operators in Europe before the introduction of the Maidenhead Locator System. As a radio transmitter or receiver location system the QRA locator is considered defunct, but may be found in many older documents.
History
The QRA locator system in the 4-character format was introduced at a meeting of the VHF Working Group in The Hague in October 1959. The QRA locator was further developed with the addition of the fifth character at the Region 1 Conference in Malmö (1963).
The QRA locator was officially adopted by IARU Region 1 in 1966 and was renamed "QTH-locator" a year later.
Description
QRA locator references consist of a string of two capital letters, two numerical digits and one lower case letter, e.g. FG32c.
The two capital letters mark an area, or square, of two degrees longitude by one degree latitude, like the squares of Maidenhead Locator. The bottom left corner of square AA was at 40.0° N - 0.0° E. Therefore, square "AA" of the QRA locator corresponds to square "JN00" of Maidenhead locator. Maidenhead locator square "IO91", which covers part of Greater London, belongs to QRA locator square "ZL".
The main squares are subdivided to 80 smaller squares, each one covering 12' by 7'30", and which are numbered from 01 to 80. The small squares are numbered from North to South and West to East. The northwest corner of the main square is indicated with "01" and the southeastern corner with 80.
Each small square is further subdivided into nine squares, each one covering 4' by 2'30", indicated by the letters 'a' to 'j' (excluding 'i'), in a spiral pattern.
With this system, a location at 52° 26' 12" N - 0° 13' 6"E would have a QRA locator reference AM52g.
Disadvantages
The QRA locator system has two disadvantages, which led to its replacement by the current Maidenhead system:
The main disadvantage of the QRA Locator system is tha |
https://en.wikipedia.org/wiki/LY1%20encoding | LY1 (Y&Y 256 glyph encoding) is an 8-bit TeX encoding developed by Berthold Horn.
Character set |
https://en.wikipedia.org/wiki/WRBW | WRBW (channel 65), branded on-air as Fox 35 Plus, is a television station in Orlando, Florida, United States, serving as the local outlet for the MyNetworkTV programming service. It is owned and operated by Fox Television Stations alongside Fox outlet WOFL (channel 35). Both stations share studios on Skyline Drive in Lake Mary, while WRBW's transmitter is located in unincorporated Bithlo, Florida.
History
WRBW began operation as an independent station on June 6, 1994, airing vintage sitcoms, cartoons and older movies. It was owned by Rainbow Media, a subsidiary of Cablevision Systems Corporation. It originally operated from studio facilities located on the backlot of Universal Studios Florida. WRBW became the Orlando area affiliate of the United Paramount Network (UPN) (a network created by BHC and Paramount), when the network debuted on January 16, 1995. Since UPN only provided two hours of network programming two nights a week at launch, WRBW essentially still programmed itself as an independent station. During the late 1990s, especially during the wildfire plagued summer of 1998, there were occasions to which ABC Sports programming was moved to channel 65 in order for the market's ABC affiliate WFTV (channel 9) to provide wall-to-wall news coverage. Some of ABC's Saturday morning children's programs also aired on WRBW, until WRDQ signed on the air in April 2000.
Chris-Craft Industries, part-owner of UPN (through its United Television unit) bought the station in 1998, making WRBW the first owned-and-operated station of a major network in the Orlando market. Fox Television Stations acquired most of Chris-Craft's television stations, including WRBW, in 2001. Fox did not consider moving its affiliation from WOFL to WRBW, however; not only was WOFL one of Fox's strongest affiliates, but WRBW was located on a very high channel number. The buyout of Chris-Craft's stake in UPN by Viacom (which owned 50% of UPN since 1996) and the subsequent purchase of WRBW by Fox effe |
https://en.wikipedia.org/wiki/D%C3%B6rm%C3%B6g%C5%91%20D%C3%B6m%C3%B6t%C3%B6r | Dörmögő Dömötör (lit. Brumming Demetrius) is a fictional bear, created by Hungarian novelist Zsigmond Sebők in 1902 and comparable to Winnie the Pooh. Dörmögő Dömötör is also a children's magazine established in 1957 by state-owned Ifjúsági Lapkiadó. The magazine's mascot is the aforementioned bear, but it presents many different kind of stories, comics, puzzles, and others not related to the bear. The magazine is one of the best selling magazines of publisher Drize Publishing Ltd. |
https://en.wikipedia.org/wiki/Managed%20Extensibility%20Framework | Managed Extensibility Framework (MEF) is a component of .NET Framework 4.0 aiming to create lightweight, extensible applications. It aims to allow .NET application developers to discover and use extensions with no configuration required. It also aims to let extension developers encapsulate code easily and avoid fragile hard dependencies. Furthermore, it aims to allow extensions to be reused across applications. MEF was introduced as a part of .NET 4.0 and Silverlight 4. It was later improved with the release of .NET 4.5 by adding support for generic types and the introduction of a convention-based extension model.
Overview
MEF aims to solve the runtime extensibility problem. Without MEF, any application that wants to support a plugin model needs to create its own infrastructure from scratch. Those plugins will often be application-specific and cannot be reused across multiple implementations.
MEF aims to provide a standard way for the host application to expose itself and consume external extensions. Extensions, by their nature, could be reused amongst different applications. However, an extension can still be implemented in a way that is application-specific. Extensions themselves can depend on one another and MEF aims to make sure they are wired together in the correct order, sparing the developer from doing it manually.
MEF offers a set of discovery approaches for the application to locate and load available extensions.
MEF allows tagging extensions with additional metadata which aims to facilitate rich querying and filtering.
Design
Roughly speaking, MEF's core consists of a catalog and a CompositionContainer. A catalog is responsible for discovering extensions and the container coordinates creation and satisfies dependencies.
MEF's first-class citizen is the ComposablePart class. A composable part offers up one or more Exports, and may also depend on one or more externally provided services or Imports. A composable part also manages an instance, which ca |
https://en.wikipedia.org/wiki/Lysozyme%20PEGylation | Lysozyme PEGylation is the covalent attachment of Polyethylene glycol (PEG) to Lysozyme, which is one of the most widely investigated PEGylated proteins.
The PEGylation of proteins has become a common practice of modern therapeutic drugs, as the process is capable of enhancing solubility, thermal stability, enzymatic degradation resistance, and serum half-life of the proteins of interest. Lysozyme, as a natural bactericidal enzyme, lyses the cell wall of various gram-positive bacteria and offers protection against microbial infections. Lysozyme has six lysine residues which are accessible for PEGylation reactions. Thus, the PEGylation of lysozyme, or lysozyme PEGylation, can be a good model system for the PEGylation of other proteins with enzymatic activities by showing the enhancement of its physical and thermal stability while retaining its activity.
Previous works on lysozyme PEGylation showed various chromatographic schemes in order to purify PEGylated lysozyme, which included ion exchange chromatography, hydrophobic interaction chromatography, and size-exclusion chromatography (fast protein liquid chromatography), and proved its stable conformation via circular dichroism and improved thermal stability by enzymatic activity assays, SDS-PAGE, and size-exclusion chromatography (high-performance liquid chromatography).
Methodology
PEGylation
The chemical modification of lysozyme by PEGylation involves the addition of methoxy-PEG-aldehyde (mPEG-aldehyde) with varying molecular sizes, ranging from 2 kDa to 40 kDa, to the protein. The protein and mPEG-aldehyde are dissolved using a sodium phosphate buffer with sodium cyanoborohydride, which acts as a reducing agent and conditions the aldehyde group of mPEG-aldehyde to have a strong affinity towards the lysine residue on the N-terminal of lysozyme. The commonly used molar ratio of lysozyme and mPEG-aldehyde is 1:6 or 1:6.67. When sufficient PEGylation is reached, the reaction can be terminated by addition of ly |
https://en.wikipedia.org/wiki/Expensive%20Typewriter | Expensive Typewriter was a pioneering text editor program that ran on the DEC PDP-1 computer which had been delivered to MIT in the early 1960s.
Description
Since the program could drive an IBM Selectric typewriter (a letter-quality printer), it may be considered the first word processing software. It was written and improved between 1961 and 1962 by Steve Piner and L. Peter Deutsch. In the spirit of an earlier editor program, named "Colossal Typewriter", it was called "Expensive Typewriter" because at that time the PDP-1 cost a lot of money (approximately ) as compared to a conventional manual typewriter. |
https://en.wikipedia.org/wiki/Sphere%20theorem%20%283-manifolds%29 | In mathematics, in the topology of 3-manifolds, the sphere theorem of gives conditions for elements of the second homotopy group of a 3-manifold to be represented by embedded spheres.
One example is the following:
Let be an orientable 3-manifold such that is not the trivial group. Then there exists a non-zero element of having a representative that is an embedding .
The proof of this version of the theorem can be based on transversality methods, see .
Another more general version (also called the projective plane theorem, and due to David B. A. Epstein) is:
Let be any 3-manifold and a -invariant subgroup of . If is a general position map such that and is any neighborhood of the singular set , then there is a map satisfying
,
,
is a covering map, and
is a 2-sided submanifold (2-sphere or projective plane) of .
quoted in . |
https://en.wikipedia.org/wiki/Cytokine-induced%20killer%20cell | Cytokine-induced killer cells (CIK) cells are a group of immune effector cells featuring a mixed T- and natural killer (NK) cell-like phenotype. They are generated by ex vivo incubation of human peripheral blood mononuclear cells (PBMC) or cord blood mononuclear cells with interferon-gamma (IFN-γ), anti-CD3 antibody, recombinant human interleukin (IL)-1 and recombinant human interleukin (IL)-2.
Typically, immune cells detect major histocompatibility complex (MHC) presented on infected cell surfaces, triggering cytokine release, causing lysis or apoptosis. However, CIK cells have the ability to recognize infected or even malignant cells in the absence of antibodies and MHC, allowing for a fast and unbiased immune reaction. This is of particular importance as harmful cells that are missing MHC markers cannot be tracked and attacked by other immune cells, such as T-lymphocytes. As a special feature, terminally differentiated CD3+CD56+ CIK cells possess the capacity for both MHC-restricted and MHC-unrestricted anti-tumor cytotoxicity.
These properties, inter alia, rendered CIK cells attractive as a potential therapy for cancer and viral infections.
A new subclass of NK cells have been created both in vitro and in vivo. These NK cells referred to as cytokine induced memory-like natural killer cells are induced using cytokines, most commonly a mix of IL-12, IL-15, and IL-18. These NK cells are activated by these cytokines to stimulate an infection and induce an adaptive immune response. If cocultured with target cells such as tumor targets, these NK cells have memory-like abilities and are more adapt and effective at mounting a defense.
Nomenclature
They were given the name “cytokine-induced killer” because cultivation with certain cytokines is mandatory for the maturation into terminally differentiated CIK cells. Several sources also call them natural killer cell-like T cells due to their close relationship to NK cells. Others propose to classify CIK cells as subset |
https://en.wikipedia.org/wiki/Stan%20Frankel | Stanley Phillips Frankel (1919 – May, 1978) was an American computer scientist. He worked in the Manhattan Project and developed various computers as a consultant.
Early life
He was born in Los Angeles, attended graduate school at the University of Rochester, received his PhD in physics from the University of California, Berkeley, and began his career as a post-doctoral student under J. Robert Oppenheimer at University of California, Berkeley in 1942.
Career
Frankel helped develop computational techniques used in the nuclear research taking place at the time, notably making some of the early calculations relating to the diffusion of neutrons in a critical assembly of uranium with Eldred Nelson. He joined the T (Theoretical) Division of the Manhattan Project at Los Alamos in 1943. His wife Mary Frankel was also hired to work as a human computer in the T Division. While at Los Alamos, Frankel and Nelson organized a group of scientists' wives, including Mary, to perform some of the repetitive calculations using Marchant and Friden desk calculators to divide the massive calculations required for the project. This became Group T-5 under New York University mathematician Donald Flanders when he arrived in the late summer of 1943.
Mathematician Dana Mitchell noticed that the Marchant calculators broke under heavy use and persuaded Frankel and Nelson to order IBM 601 punched card machines. This experience led to Frankel' interest in the then-dawning field of digital computers. In August 1945, Frankel and Nick Metropolis traveled to the Moore School of Engineering in Pennsylvania to learn how to program the ENIAC computer. That fall they helped design a calculation that would determine the likelihood of being able to develop a fusion weapon. Edward Teller used the ENIAC results to prepare a report in the spring of 1946 that answered this question in the affirmative.
After losing his security clearance (and thus his job) during the red scare of the early 1950s, Franke |
https://en.wikipedia.org/wiki/Distinctive%20unit%20insignia | A distinctive unit insignia (DUI) is a metallic heraldic badge or device worn by soldiers in the United States Army. The DUI design is derived from the coat of arms authorized for a unit. DUIs may also be called "distinctive insignia" (DI) or, imprecisely, a "crest" or a "unit crest" by soldiers or collectors. The U.S. Army Institute of Heraldry is responsible for the design, development and authorization of all DUIs.
History
Pre-World War I Insignia
Distinctive ornamentation of a design desired by the organization was authorized for wear on the Mess Jacket uniform by designated organizations (staff corps, departments, corps of artillery, and infantry and cavalry regiments) per War Department General Order 132 dated December 31, 1902. The distinctive ornamentation was described later as coats of arms, pins and devices. The authority continued until omitted in the Army uniform regulation dated December 26, 1911.
Distinctive unit insignia
War Department Circular 161 dated 29 April 1920 authorized the use of a regimental coat of arms or badge as approved by the War Department for wear on the collar of the white uniform and the lapels of the mess jacket. War Department Circular 244, 1921 states: "It has been approved, in principle, that regiments of the Regular Army and National Guard may wear distinctive badges or trimmings on their uniforms as a means of promoting esprit de corps and keeping alive historical traditions. Various organizations which carry colors or standards have generally submitted coats of arms having certain historical significance. As fast as they are approved, these coats of arms will form the basis for regimental colors or standards which will eventually replace the present regimental colors or standards when these wear out. The use of these coats of arms as collar ornaments in lieu of the insignia of corps, departments, or arms of service would be an example of distinctive badge to be worn by the regiment." `The first unit to wear this insig |
https://en.wikipedia.org/wiki/Ornithonyssus%20sylviarum | Ornithonyssus sylviarum (also known as the northern fowl mite) is a haematophagous ectoparasite of poultry. In both size and appearance, it resembles the red mite, Dermanyssus gallinae.
This blood-feeding parasite is broadly distributed, and has been reported on 72 host species of North American birds in 26 families. The mites have been a major pest of the poultry industry since the early 1900s.
See also
Acariasis
Gamasoidosis
List of mites associated with cutaneous reactions |
https://en.wikipedia.org/wiki/Glycoside%20hydrolase%20family%2056 | In molecular biology, glycoside hydrolase family 56 is a family of glycoside hydrolases.
Glycoside hydrolases are a widespread group of enzymes that hydrolyse the glycosidic bond between two or more carbohydrates, or between a carbohydrate and a non-carbohydrate moiety. A classification system for glycoside hydrolases, based on sequence similarity, has led to the definition of >100 different families. This classification is available on the CAZy web site, and also discussed at CAZypedia, an online encyclopedia of carbohydrate active enzymes.
Glycoside hydrolase family 56 CAZY GH_56 includes enzymes with hyaluronidase activity. The venom of Apis mellifera (Honeybee) contains several biologically-active peptides and two enzymes, one of which is a hyaluronidase. The amino acid sequence of bee venom hyaluronidase contains 349 amino acids, and includes four cysteines and a number of potential glycosylation sites. The sequence shows a high degree of similarity to PH-20, a membrane protein of mammalian sperm involved in sperm-egg adhesion, supporting the view that hyaluronidases play a role in fertilisation.
PH-20 is required for sperm adhesion to the egg zona pellucida; it is located on both the sperm plasma membrane and acrosomal membrane. The amino acid sequence of the mature protein contains 468 amino acids, and includes six potential N-linked glycosylation sites and twelve cysteines, eight of which are tightly clustered near the C-terminus. |
https://en.wikipedia.org/wiki/Isoenthalpic%E2%80%93isobaric%20ensemble | The isoenthalpic-isobaric ensemble (constant enthalpy and constant pressure ensemble) is a statistical mechanical ensemble that maintains constant enthalpy and constant pressure applied. It is also called the -ensemble, where the number of particles is also kept as a constant. It was developed by physicist H. C. Andersen in 1980. The ensemble adds another degree of freedom, which represents the variable volume of a system to which the coordinates of all particles are relative. The volume becomes a dynamical variable with potential energy and kinetic energy given by . The enthalpy is a conserved quantity.
Using isoenthalpic-isobaric ensemble of Lennard-Jones fluid, it was shown that the Joule–Thomson coefficient and inversion curve can be computed directly from a single molecular dynamics simulation. A complete vapor-compression refrigeration cycle and a vapor–liquid coexistence curve, as well as a reasonable estimate of the supercritical point can be also simulated from this approach.
NPH simulation can be carried out using GROMACS and LAMMPS. |
https://en.wikipedia.org/wiki/Strudiella | Strudiella devonica is a species of extinct arthropod from the Devonian, originally described as the first complete Late Devonian terrestrial insect. It was recovered in the Strud (Gesves, Belgium) environment from the Bois des Mouches Formation, Upper Famennian. It had unspecialized, 'orthopteroid', mouthparts, indicating an omnivorous diet.
This discovery reduces a previous gap of 45 million years in the evolutionary history of insects, part of the arthropod gap (the 'gap' still occurs in the early Carboniferous, coinciding and extending past the Romer's gap for tetrapods, which may have been caused by low oxygen levels in the atmosphere). Body segments, legs and antennae are visible; however, genitalia were not preserved. The specimen has no wings, but it may be a juvenile.
Later study shows extra legs, and based on its poor state of preservation, its interpretation as an insect is unwarranted.
See also
Evolution of insects |
https://en.wikipedia.org/wiki/Panning%20%28audio%29 | Panning is the distribution of an audio signal (either monaural or stereophonic pairs) into a new stereo or multi-channel sound field determined by a pan control setting. A typical physical recording console has a pan control for each incoming source channel. A pan control or pan pot (short for "panning potentiometer") is an analog control with a position indicator which can range continuously from the 7 o'clock when fully left to the 5 o'clock position fully right. Audio mixing software replaces pan pots with on-screen virtual knobs or sliders which function like their physical counterparts.
Overview
A pan pot has an internal architecture which determines how much of a source signal is sent to the left and right buses. "Pan pots split audio signals into left and right channels, each equipped with its own discrete gain (volume) control." This signal distribution is often called a taper or law.
When centered (at 12 o'clock), the law can be designed to send −3, −4.5 or −6 decibels (dB) equally to each bus. "Signal passes through both the channels at an equal volume while the pan pot points directly north." If the two output buses are later recombined into a monaural signal, then a pan law of -6 dB is desirable. If the two output buses are to remain stereo then a law of -3 dB is desirable. A law of −4.5 dB at center is a compromise between the two. A pan control fully rotated to one side results in the source being sent at full strength (0 dB) to one bus (either the left or right channel) and zero strength (− dB) to the other. Regardless of the pan setting, the overall sound power level remains (or appears to remain) constant. Because of the phantom center phenomenon, sound panned to the center position is perceived as coming from between the left and right speakers, but not in the center unless listened to with headphones, because of head-related transfer function HRTF.
Panning in audio borrows its name from panning action in moving image technology. An audio pan |
https://en.wikipedia.org/wiki/Cardamine%20oligosperma | Cardamine oligosperma is a species of Cardamine known by the common name little western bittercress. It is native to western North America from Alaska to California to Colorado, where it grows in moist mountain habitats.
Description
Cardamine oligosperma is an annual or biennial herb growing from a taproot. It produces one or more upright, branching stems. The plentiful leaves are divided into many leaflets. The plant generally has a rosette of leaves at the base with leaflets nearly round in shape. The inflorescence is several centimeters long and bears many flowers with white petals just a few millimeters in length. The fruit is a silique up to 2.5 centimeters long.
Uses
The leaves are edible raw and other tender parts of the plant can be cooked, though have also been eaten raw. |
https://en.wikipedia.org/wiki/Fermata | A fermata (; "from fermare, to stay, or stop"; also known as a hold, pause, colloquially a birdseye or cyclops eye, or as a grand pause when placed on a note or a rest) is a symbol of musical notation indicating that the note should be prolonged beyond the normal duration its note value would indicate. Exactly how much longer it is held is up to the discretion of the performer or conductor, but twice as long is common. It is usually printed above but can be occasionally below (when it is upside down) the note to be extended.
When a fermata is placed over a bar or double-bar, it is used to indicate the end of a phrase or section of a work. In a concerto, it indicates the point at which the soloist is to play a cadenza.
A fermata can occur at the end of a piece (or movement) or
in the middle of a piece. It can be followed by either a brief rest or more notes.
Other names for a fermata are corona (Italian), point d'orgue (French), Fermate (German), calderón (Spanish), suspensão (Portuguese).
History and use
This symbol appears as early as the 15th century. It is quite common in the works of Guillaume Du Fay and Josquin des Prez.
In chorales by Johann Sebastian Bach and other composers of the Baroque, the fermata often signifies only the end of a phrase, and a breath is to be taken. In a few organ compositions, the fermatas occur in different measures for the right and left hands and for the feet, which would make holding them impractical. "In the older music the sign for the fermata is used, as frequently by Bach, merely as indicating the end of the piece, after a Da Capo, when modern composers usually write the word 'fine.' It does not then imply any pause in the music between the first and second part of the number."
In the classical and baroque eras, fermatas were usually points at which performers were expected to improvise cadenzas commensurate with its place in the score: in the middle of a movement required short cadenzas, over a I and it implied the kin |
https://en.wikipedia.org/wiki/Finite%20volume%20method | The finite volume method (FVM) is a method for representing and evaluating partial differential equations in the form of algebraic equations.
In the finite volume method, volume integrals in a partial differential equation that contain a divergence term are converted to surface integrals, using the divergence theorem.
These terms are then evaluated as fluxes at the surfaces of each finite volume. Because the flux entering a given volume is identical to that leaving the adjacent volume, these methods are conservative. Another advantage of the finite volume method is that it is easily formulated to allow for unstructured meshes. The method is used in many computational fluid dynamics packages.
"Finite volume" refers to the small volume surrounding each node point on a mesh.
Finite volume methods can be compared and contrasted with the finite difference methods, which approximate derivatives using nodal values, or finite element methods, which create local approximations of a solution using local data, and construct a global approximation by stitching them together. In contrast a finite volume method evaluates exact expressions for the average value of the solution over some volume, and uses this data to construct approximations of the solution within cells.
Example
Consider a simple 1D advection problem:
Here, represents the state variable and represents the flux or flow of . Conventionally, positive represents flow to the right while negative represents flow to the left. If we assume that equation () represents a flowing medium of constant area, we can sub-divide the spatial domain, , into finite volumes or cells with cell centers indexed as . For a particular cell, , we can define the volume average value of at time and , as
and at time as,
where and represent locations of the upstream and downstream faces or edges respectively of the cell.
Integrating equation () in time, we have:
where .
To obtain the volume average of at time , we integrate |
https://en.wikipedia.org/wiki/LST%201590-4 | LST 1590-4 is a character encoding used to write the Lithuanian language. It is a modification of Windows-1257 to support additional accented letters and phonetic notation.
Codepage layout
The following table shows LST 1590–4. Each character is shown with its equivalent Unicode code point. Only the second half of the table (code points 128–255) is shown, the first half (code points 0–127) being the same as ASCII. |
https://en.wikipedia.org/wiki/Archos | Archos (, stylized as ARCHOS) is a French multinational electronics company that was established in 1988 by Henri Crohas. Archos manufactures tablets, smartphones, portable media players and portable data storage devices. The name is an anagram of Crohas' last name. Also, in Greek (-αρχος), it's a suffix used in nouns indicating a person with power. The company's slogan has been updated from "Think Smaller" to "On The Go", and the current "Entertainment your way".
Archos has developed a variety of products, including digital audio players, portable video players (PVP), digital video recorders, a personal digital assistant, netbooks, more recently tablet computers using Google Android and Microsoft Windows (tablet PCs), and smartphones (which are manufactured by ZTE under the "Archos" brand name).
Success and decline
By the year 2000, Archos became an important player in the portable media player market and this was demonstrated by the groundbreaking year 2000 release of the very first disk-based digital audio player (DAP) called Jukebox 6000. This product paved the way for the high-capacity DAPs, which finally resulted in the wide adoption of digital and MP3 players. Archos' success during this period was attributed to its strategy of technological leadership, releasing different iterations of a product line, which featured a succession of products with better specifications and technology than their predecessors.
In the latter part of the 2000s, Archos began to lose to Apple, which - for its part - introduced its own portable devices such as the iPod. This development highlighted a trend in the technology industry where beating competitors to the market and equipping products with the most advanced technology available do not always translate to success. The company started phasing its portable media players in 2008 to focus more on its Android tablet range.
In 2013, the company entered the mobile phone market by launching a series of smartphone models for ins |
https://en.wikipedia.org/wiki/Norman%E2%80%93Roberts%20syndrome | Norman–Roberts syndrome is a rare form of microlissencephaly caused by a mutation in the RELN gene. A small number of cases have been described. The syndrome was first reported by Margaret Grace Norman and M. Roberts et al. in 1976.
Lack of reelin prevents normal layering of the cerebral cortex and disrupts cognitive development. Patients have cerebellar hypoplasia, congenital lymphedema, and hypotonia. The disorder is also associated with myopia, nystagmus and generalized seizures.
Norman–Roberts syndrome is one of two known disorders caused by a disruption of the reelin-signaling pathway. The other is VLDLR-associated cerebellar hypoplasia, which is caused by a mutation in the gene coding for one of the reelin receptors, VLDLR.
Disruption of the RELN gene in human patients is analogous to the malfunctioning RELN gene in the reeler mouse. |
https://en.wikipedia.org/wiki/Ben%20Pridmore | Ben Pridmore (born October 14, 1976) is a former world memory champion, memory sport competitor and accountant.
Achievements
Pridmore is a three-time World Memory Champion winning the title 2004, 2008 and 2009. From Derby in the United Kingdom, Pridmore achieved this by winning a 10-discipline competition, the World Memory Championship, which has taken place every year since 1991. He has also earned the prestigious title of Master of Memory.
He held the official world record for memorizing the order of a randomly shuffled 52-card deck, and has memorised a pack in a time of 24.68 seconds on television. This record was beaten in 2010 by German memory athlete and lawyer Simon Reinhard. Pridmore's victory at the 2009 World Championship was his eighth consecutive memory competition win since coming second at the 2007 World Championship. He is the title holder for the UK Memory Champion for the years 2007–2011 and 2013 and Welsh Open Memory Champion 2009–2012 and 2014.
Besides memory sports he is famous for his mental calculation skills and took part in the Mental Calculation World Cup in 2004, 2006 and 2010. He has also won several medals at the Mind Sports Olympiad including becoming the 2001 World Champion at the ten disciplined mind sport competition the decamentathlon including also chess and reversi.
He also participated in the Memoriad World Mental Olympics in the year 2012 in Antalya and won one gold medal with the title "Memoriad Speed Cards World Memory Champion".
He is thought to have an IQ of 159 putting him in the genius range. He was prominently featured in the music video for DJ Shadow's single "Scale It Back".
Method
Like most memory experts, he creates a mental story, comprises a sequence of images in a variation of the Mnemonic Major System. In Pridmore's system for cards, two cards are represented as a three-letter word by the first consonant derived from the suits, the vowel from the first card's number, and the final consonant from the second ca |
https://en.wikipedia.org/wiki/AdGuard | AdGuard is an ad blocking service provided by AdGuard Software Limited with applications for Microsoft Windows, Linux, MacOS, Android and iOS. AdGuard is also available as a browser extension.
AdGuard Software Limited was founded in 2009 in Moscow. In 2014 AdGuard Software Limited's products became available in Cyprus, to where its headquarters were subsequently moved.
Features
AdGuard features include:
AdGuard Home
AdGuard Home acts as a recursive DNS resolver, which prevents most advertisements from displaying by responding with an invalid address for domains that appear in its filter lists. It is similar to Pi-hole.
AdGuard Browser extensions
The browser extension blocks video ads, interstitial ads, floating ads, pop-ups, banners, and text ads. It is also able to handle anti-AdBlock scripts. The product blocks spyware and warns users of malicious websites. AdGuard Content Blocker is an additional browser extension for browsers Yandex Browser and Samsung Internet, which uses Content Blocker API. It downloads filter list updates and asks browsers to enforce them via Content Blocker API.
AdGuard applications
AdGuard has Windows and Mac versions, as well as native mobile versions for Android and iOS. The application sets up a local VPN, which filters all traffic on the mobile device.
AdGuard DNS
AdGuard operates recursive name servers for public use. AdGuard DNS supports encryption technologies, including DNSCrypt, DNS over HTTPS, DNS over TLS, and DNS-over-QUIC. AdGuard began testing DNS service back in 2016, and officially launched it in 2018.
Reception
While the company's products have earned positive feedback in industry publications, a series of policies by Google and the Apple app store were implemented between 2014 - 2018, which impeded user access to AdGuard's mobile applications.
Macworld mentioned AdGuard for iOS in a list of five "best adblockers for iOS".
In April 2020, Android Central stated that AdGuard uses "a little more processin |
https://en.wikipedia.org/wiki/Mean%20line%20segment%20length | In geometry, the mean line segment length is the average length of a line segment connecting two points chosen uniformly at random in a given shape. In other words, it is the expected Euclidean distance between two random points, where each point in the shape is equally likely to be chosen.
Even for simple shapes such as a square or a triangle, solving for the exact value of their mean line segment lengths can be difficult because their closed-form expressions can get quite complicated. As an example, consider the following question:
What is the average distance between two randomly chosen points inside a square with side length 1?
While the question may seem simple, it has a fairly complicated answer; the exact value for this is .
Formal definition
The mean line segment length for an n-dimensional shape S may formally be defined as the expected Euclidean distance ||⋅|| between two random points x and y,
where λ is the n-dimensional Lebesgue measure.
For the two-dimensional case, this is defined using the distance formula for two points (x1, y1) and (x2, y2)
Approximation methods
Since computing the mean line segment length involves calculating multidimensional integrals, various methods for numerical integration can be used to approximate this value for any shape.
One such method is the Monte Carlo method. To approximate the mean line segment length of a given shape, two points are randomly chosen in its interior and the distance is measured. After several repetitions of these steps, the average of these distances will eventually converge to the true value.
These methods can only give an approximation; they cannot be used to determine its exact value.
Formulas
Line segment
For a line segment of length , the average distance between two points is .
Triangle
For a triangle with side lengths , , and , the average distance between two points in its interior is given by the formula
where is the semiperimeter, and denotes .
For an equilate |
https://en.wikipedia.org/wiki/Clique%20game | The clique game is a positional game where two players alternately pick edges, trying to occupy a complete clique of a given size.
The game is parameterized by two integers n > k. The game-board is the set of all edges of a complete graph on n vertices. The winning-sets are all the cliques on k vertices. There are several variants of this game:
In the strong positional variant of the game, the first player who holds a k-clique wins. If no one wins, the game is a draw.
In the Maker-Breaker variant , the first player (Maker) wins if he manages to hold a k-clique, otherwise the second player (Breaker) wins. There are no draws.
In the Avoider-Enforcer variant, the first player (Avoider) wins if he manages not to hold a k-clique. Otherwise, the second player (Enforcer) wins. There are no draws. A special case of this variant is Sim.
The clique game (in its strong-positional variant) was first presented by Paul Erdős and John Selfridge, who attributed it to Simmons. They called it the Ramsey game, since it is closely related to Ramsey's theorem (see below).
Winning conditions
Ramsey's theorem implies that, whenever we color a graph with 2 colors, there is at least one monochromatic clique. Moreover, for every integer k, there exists an integer R(k,k) such that, in every graph with vertices, any 2-coloring contains a monochromatic clique of size at least k. This means that, if , the clique game can never end in a draw. a Strategy-stealing argument implies that the first player can always force at least a draw; therefore, if , Maker wins. By substituting known bounds for the Ramsey number we get that Maker wins whenever .
On the other hand, the Erdos-Selfridge theorem implies that Breaker wins whenever .
Beck improved these bounds as follows:
Maker wins whenever ;
Breaker wins whenever .
Ramsey game on higher-order hypergraphs
Instead of playing on complete graphs, the clique game can also be played on complete hypergraphs of higher orders. For example, i |
https://en.wikipedia.org/wiki/ANKZF1 | Ankyrin repeat and zinc finger domain-containing protein 1 is a protein that in humans is encoded by the ANKZF1 gene. |
https://en.wikipedia.org/wiki/Sporodochium | A sporodochium (pl. sporodochia) is a small, compact stroma (mass of hyphae) usually formed on host plants parasitised by mitosporic fungi of the form order Tuberculariales (subdivision Deuteromycota, class Hyphomycetes). This stroma bears the conidiophores on which the asexual spores or conidia are formed. |
https://en.wikipedia.org/wiki/Active%20SETI | Active SETI (Active Search for Extra-Terrestrial Intelligence) is the attempt to send messages to intelligent extraterrestrial life. Active SETI messages are predominantly sent in the form of radio signals. Physical messages like that of the Pioneer plaque may also be considered an active SETI message. Active SETI is also known as METI (Messaging to Extra-Terrestrial Intelligence).
History
'Active SETI' was a term as early as 2005, though some decades after the term SETI. The term METI was coined in 2006 by Russian scientist Alexander Zaitsev, who proposed a subtle distinction between Active SETI and METI:
{{cquote|The science known as SETI deals with searching for messages from aliens. METI deals with the creation and transmission of messages to aliens. Thus, SETI and METI proponents have quite different perspectives. SETI scientists are in a position to address only the local question “does Active SETI make sense?” In other words, would it be reasonable, for SETI success, to transmit with the object of attracting ETI's attention? In contrast to Active SETI, METI pursues not a local, but a more global purpose – to overcome the Great Silence in the Universe, bringing to our extraterrestrial neighbors the long-expected annunciation “You are not alone!”'}}
Concern over METI was raised by the science journal Nature in an editorial in October 2006, which commented on a recent meeting of the International Academy of Astronautics SETI study group. The editor said, "It is not obvious that all extraterrestrial civilizations will be benign, or that contact with even a benign one would not have serious repercussions". In the same year, astronomer and science fiction author David Brin expressed similar concerns.
In 2010, Douglas A. Vakoch from SETI Institute, addressed concerns about the validity of Active SETI alone as an experimental science by proposing the integration of Active SETI and Passive SETI programs to engage in a clearly articulated, ongoing, and evolving se |
https://en.wikipedia.org/wiki/Mathematicism | Mathematicism is 'the effort to employ the formal structure and rigorous method of mathematics as a model for the conduct of philosophy'. or else it is the epistemological view that reality is fundamentally mathematical. The term has been applied to a number of philosophers, including Pythagoras and René Descartes although the term is not used by themselves.
The role of mathematics in Western philosophy has grown and expanded from Pythagoras onwards. It is clear that numbers held a particular importance for the Pythagorean school, although it was the later work of Plato that attracts the label of mathematicism from modern philosophers. Furthermore it is René Descartes who provides the first mathematical epistemology which he describes as a mathesis universalis, and which is also referred to as mathematicism.
Pythagoras
Although we don't have writings of Pythagoras himself, good evidence that he pioneered the concept of mathematicism is given by Plato, and summed up in the quotation often attributed to him that "everything is mathematics". Aristotle says of the Pythagorean school:
Further evidence for the views of Pythagoras and his school, although fragmentary and sometimes contradictory, comes from Alexander Polyhistor. Alexander tells us that central doctrines of the Pythagorieans were the harmony of numbers and the ideal that the mathematical world has primacy over, or can account for the existence of, the physical world.
According to Aristotle, the Pythagoreans used mathematics for solely mystical reasons, devoid of practical application. They believed that all things were made of numbers. The number one (the monad) represented the origin of all things and other numbers similarly had symbolic representations. Nevertheless modern scholars debate whether this numerology was taught by Pythagoras himself or whether it was original to the later philosopher of the Pythagorean school, Philolaus of Croton.
Walter Burkert argues in his study Lore and Science |
https://en.wikipedia.org/wiki/Interphalangeal%20joints%20of%20the%20foot | The interphalangeal joints of the foot are between the phalanx bones of the toes in the feet.
Since the great toe only has two phalanx bones (proximal and distal phalanges), it only has one interphalangeal joint, which is often abbreviated as the "IP joint". The rest of the toes each have three phalanx bones (proximal, middle, and distal phalanges), so they have two interphalangeal joints: the proximal interphalangeal joint between the proximal and middle phalanges (abbreviated "PIP joint") and the distal interphalangeal joint between the middle and distal phalanges (abbreviated "DIP joint").
All interphalangeal joints are ginglymoid (hinge) joints, and each has a plantar (underside) and two collateral ligaments. In the arrangement of these ligaments, extensor tendons supply the places of dorsal ligaments, which is similar to that in the metatarsophalangeal articulations.
Movements
The only movements permitted in the joints of the digits are flexion and extension; these movements are more extensive between the first and second phalanges than between the second and third. The flexor hallucis longus and flexor digitorum longus flex the interphalangeal joint of the big toe and lateral four toes, respectively. The tendons of both of these muscles cross as they reach their distal attachments. In other words, the flexor hallucis longus arises laterally, while the flexor digitorum longus arises medially.
The amount of flexion is very considerable, but extension is limited by the plantar and collateral ligaments.
See also
Interphalangeal joints of hand
Metatarsophalangeal joints |
https://en.wikipedia.org/wiki/Microtechnique | Microtechnique is an aggregate of methods used to prepare micro-objects for studying. It is currently being employed in many fields in life science. Two well-known branches of microtechnique are botanical (plant) microtechnique and zoological (animal) microtechnique.
With respect to both plant microtechnique and animal microtechnique, four types of methods are commonly used, which are whole mounts, smears, squashes, and sections, in recent micro experiments. Plant microtechnique contains direct macroscopic examinations, freehand sections, clearing, maceration, embedding, and staining. Moreover, three preparation ways used in zoological micro observations are paraffin method, celloidin method, and freezing method.
History
The early development of microtechnique in botany is closely related to that in zoology. Zoological and botanical discoveries are adopted by both zoologists and botanists.
The field of microtechnique lasted from at the end of the 1930s when the principle of dry preparation emerged. The early development of microtechnique in botany is closely related to that in zoology. Zoological and botanical discoveries are adopted by both zoologists and botanists. Since Hooke discovered cells, microtechnique had also developed with the emergence of early microscopes. Microtechnique then had advanced over the period of 1800–1875. After 1875, modern micro methods have emerged. In recent years, both traditional methods and modern microtechnique have been in use in many experiments.
Commonly used methods
Some general microtechnique can be used in both plant and animal micro observation. Whole mounts, smears, squashes, and sections are four commonly used methods when preparing plant and animal specimens for specific purposes.
Whole mounts
Whole mounts are usually used when observers need to use a whole organism or do some detailed research on specific organ structure. This method requires objects in which moisture can be removed, like seeds and micro fossils.
|
https://en.wikipedia.org/wiki/Mitochondrial%20Eve | In human genetics, the Mitochondrial Eve (also mt-Eve, mt-MRCA) is the matrilineal most recent common ancestor (MRCA) of all living humans. In other words, she is defined as the most recent woman from whom all living humans descend in an unbroken line purely through their mothers and through the mothers of those mothers, back until all lines converge on one woman.
In terms of mitochondrial haplogroups, the mt-MRCA is situated at the divergence of macro-haplogroup L into L0 and L1–6. As of 2013, estimates on the age of this split ranged at around 155,000 years ago, consistent with a date later than the speciation of Homo sapiens but earlier than the recent out-of-Africa dispersal.
The male analog to the "Mitochondrial Eve" is the "Y-chromosomal Adam" (or Y-MRCA), the individual from whom all living humans are patrilineally descended. As the identity of both matrilineal and patrilineal MRCAs is dependent on genealogical history (pedigree collapse), they need not have lived at the same time. As of 2013, estimates for the age Y-MRCA are subject to substantial uncertainty, with a wide range of times from 180,000 to 580,000 years ago (with an estimated age of between 120,000 and 156,000 years ago, roughly consistent with the estimate for mt-MRCA.).
The name "Mitochondrial Eve" alludes to the biblical Eve, which has led to repeated misrepresentations or misconceptions in journalistic accounts on the topic. Popular science presentations of the topic usually point out such possible misconceptions by emphasizing the fact that the position of mt-MRCA is neither fixed in time (as the position of mt-MRCA moves forward in time as mitochondrial DNA (mtDNA) lineages become extinct), nor does it refer to a "first woman", nor the only living female of her time, nor the first member of a "new species".
History
Early research
Early research using molecular clock methods was done during the late 1970s to early 1980s. Allan Wilson, Mark Stoneking, Rebecca L. Cann and Wesley Brown fo |
https://en.wikipedia.org/wiki/Electronarcosis | Electronarcosis, also called electric stunning or electrostunning, is a profound stupor produced by passing an electric current through the brain. Electronarcosis may be used as a form of electrotherapy in treating certain mental illnesses in humans, or may be used to render livestock unconscious prior to slaughter.
History
In 1902, Stephen Leduc discovered he could produce a narcotic-like state in animals, and eventually, he tried it on himself, where he remained conscious but unable to move in a dream-like state.
In 1951, an American psychiatrist Hervey M. Cleckley published a paper on the results of treating 110 patients having anxiety neuroses with electronarcosis therapy. He argued that patients may benefit from electronarcosis after other treatments have failed.
A 1974 paper discussed the advantage of using electronarcosis for short-term general anesthesia. Researchers achieved electronarcosis by applying 180 mA at a frequency of 500 Hertz to the mastoid part of the temporal bone.
Phases
Electronarcosis results in a condition similar to an epileptic seizure, with the three phases called tonic, clonic, and recovery.
During the tonic phase, the patient or animal collapses and becomes rigid.
During the clonic, muscles relax and some movement occurs.
During recovery, the patient or animal becomes aware.
Livestock
Electronarcosis is one of the methods used to render animals unconscious before slaughter and unable to feel pain. Electronarcosis may be followed immediately by electrocution or by bleeding.
Modern electronarcosis is typically performed by applying 200 volts of high frequency alternating current of about 1500 hertz for 3 seconds to the animal's head. A high-frequency current is alleged to not be felt as an electric shock or cause skeletal muscle contractions. A wet animal will pass a current of over an ampere. If other procedures do not follow electronarcosis, the animal will usually recover.
Studies have been used to determine optimal p |
https://en.wikipedia.org/wiki/Mathematical%20Biology | Mathematical Biology is a two-part monograph on mathematical biology first published in 1989 by the applied mathematician James D. Murray. It is considered to be a classic in the field and sweeping in scope.
Part I: An Introduction
Part I of Mathematical Biology covers population dynamics, reaction kinetics, oscillating reactions, and reaction-diffusion equations.
Chapter 1: Continuous Population Models for Single Species
Chapter 2: Discrete Population Models for a Single Species
Chapter 3: Models for Interacting Populations
Chapter 4: Temperature-Dependent Sex Determination (TSD)
Chapter 5: Modelling the Dynamics of Marital Interaction: Divorce Prediction and Marriage Repair
Chapter 6: Reaction Kinetics
Chapter 7: Biological Oscillators and Switches
Chapter 8: BZ Oscillating Reactions
Chapter 9: Perturbed and Coupled Oscillators and Black Holes
Chapter 10: Dynamics of Infectious Diseases
Chapter 11: Reaction Diffusion, Chemotaxis, and Nonlocal Mechanisms
Chapter 12: Oscillator-Generated Wave Phenomena
Chapter 13: Biological Waves: Single-Species Models
Chapter 14: Use and Abuse of Fractals
Part II: Spatial Models and Biomedical Applications
Part II of Mathematical Biology focuses on pattern formation and applications of reaction-diffusion equations. Topics include: predator-prey interactions, chemotaxis, wound healing, epidemic models, and morphogenesis.
Chapter 1: Multi-Species Waves and Practical Applications
Chapter 2: Spatial Pattern Formation with Reaction Diffusion Systems
Chapter 3: Animal Coat Patterns and Other Practical Applications of Reaction Diffusion Mechanisms
Chapter 4: Pattern Formation on Growing Domains: Alligators and Snakes
Chapter 5: Bacterial Patterns and Chemotaxis
Chapter 6: Mechanical Theory for Generating Pattern and Form in Development
Chapter 7: Evolution, Morphogenetic Laws, Developmental Constraints and Teratologies
Chapter 8: A Mechanical Theory of Vascular Network Formation
Chapter 9: Epidermal Wound Hea |
https://en.wikipedia.org/wiki/Aconitum | Aconitum (), also known as aconite, monkshood, wolfsbane, leopard's bane, devil's helmet or blue rocket, is a genus of over 250 species of flowering plants belonging to the family Ranunculaceae. These herbaceous perennial plants are chiefly native to the mountainous parts of the Northern Hemisphere in North America, Europe, and Asia; growing in the moisture-retentive but well-draining soils of mountain meadows.
Most Aconitum species are extremely poisonous and must be handled very carefully. Several Aconitum hybrids, such as the Arendsii form of Aconitum carmichaelii, have won gardening awards—such as the Royal Horticultural Society's Award of Garden Merit. Some are used by florists.
Etymology
The name aconitum comes from the Greek word , which may derive from the Greek akon for dart or javelin, the tips of which were poisoned with the substance, or from akonae, because of the rocky ground on which the plant was thought to grow. The Greek name lycoctonum, which translates literally to "wolf's bane", is thought to indicate the use of its juice to poison arrows or baits used to kill wolves. The English name monkshood refers to the cylindrical helmet, called the galea, distinguishing the flower.
Description
The dark green leaves of Aconitum species lack stipules. They are palmate or deeply palmately lobed with five to seven segments. Each segment again is trilobed with coarse sharp teeth. The leaves have a spiral (alternate) arrangement. The lower leaves have long petioles.
The tall, erect stem is crowned by racemes of large blue, purple, white, yellow, or pink zygomorphic flowers with numerous stamens. They are distinguishable by having one of the five petaloid sepals (the posterior one), called the galea, in the form of a cylindrical helmet, hence the English name monkshood. Two to 10 petals are present. The two upper petals are large and are placed under the hood of the calyx and are supported on long stalks. They have a hollow spur at their apex, containing t |
https://en.wikipedia.org/wiki/Anvis%20Group | Anvis (Antivibrationssystems) is a global business group that specialises in antivibration systems to decouple vibrating parts in motor vehicles. The company's head office is located in Steinau an der Straße, Germany.
Company
Anvis Group GmbH operates 13 business sites around the world. Its 2,500 employees generate annual turnover of more than €300 million. In 2013, the company was acquired by the Japanese Sumitomo Riko group from the Sumitomo Group. The product range of the Anvis Group was significantly expanded as a result of the simultaneous acquisition of Dytech, an Italian company that makes special fluid-handling products. Together, the business group generates turnover of nearly €3 billion. The customer structure comprises Original Equipment Manufacturer (OEM) like the Volkswagen AG, BMW, Daimler AG, Audi, Renault-Nissan, Mazda, Toyota and General Motors and first-tier companies (the direct suppliers to OEMs) like Continental AG. Anvis Industry SAS, a subsidiary of the Anvis Group, also supplies solutions and products to the railroad industry, among others.
The AVS Holding 2 GmbH owns 100 percent of shares in Anvis Netherlands B.V., which holds all foreign subsidiaries.
Products
The Anvis Group's products include vibration control solutions for automotive and industrial applications. The foundation of the products is its processing of natural rubber, synthetic elastomers and plastics. The Anvis Group holds more than 160 patents in this area.
History
Kléber-Colombes, a company specialising in elastomers and expansion joints, was established in 1910. Nearly 50 years later, in 1956, the automotive supplier Woco Industrietechnik GmbH went into operation. In 1980, Woco entered the antivibration sector. Its work soon resulted in the first automotive parts that used a rubber-metal combination that could reduce vibration and driving noise in cars. The basis of these parts was innovations in the area of natural-rubber, plastic and metal adhesion technology. Mic |
https://en.wikipedia.org/wiki/Portal%20%28video%20game%29 | Portal is a 2007 puzzle-platform game developed and published by Valve. It was released in a bundle, The Orange Box, for Windows, Xbox 360 and PlayStation 3, and has been since ported to other systems, including Mac OS X, Linux, Android (via Nvidia Shield), and Nintendo Switch.
Portal consists primarily of a series of puzzles that must be solved by teleporting the player's character and simple objects using "the Aperture Science Handheld Portal Device", often referred to as the "portal gun", a device that can create inter-spatial portals between two flat planes. The player-character, Chell, is challenged and taunted by an artificial intelligence named GLaDOS (Genetic Lifeform and Disk Operating System) to complete each puzzle in the Aperture Science Enrichment Center using the portal gun with the promise of receiving cake when all the puzzles are completed. The game's unique physics allows kinetic energy to be retained through portals, requiring creative use of portals to maneuver through the test chambers. This gameplay element is based on a similar concept from the game Narbacular Drop; many of the team members from the DigiPen Institute of Technology who worked on Narbacular Drop were hired by Valve for the creation of Portal, making it a spiritual successor to the game.
Portal was acclaimed as one of the most original games of 2007, despite some criticism for its short duration. It received praise for its originality, unique gameplay and dark story with a humorous series of dialogue. GLaDOS, voiced by Ellen McLain in the English-language version, received acclaim for her unique characterization, and the end credits song "Still Alive", written by Jonathan Coulton for the game, was praised for its original composition and humorous twist. Portal is often cited as one of the greatest video games ever made. Excluding Steam download sales, over four million copies of the game have been sold since its release, spawning official merchandise from Valve including plush |
https://en.wikipedia.org/wiki/Walk-regular%20graph | In discrete mathematics, a walk-regular graph is a simple graph where the number of closed walks of any length from a vertex to itself does not depend on the choice of vertex.
Equivalent definitions
Suppose that is a simple graph. Let denote the adjacency matrix of , denote the set of vertices of , and denote the characteristic polynomial of the vertex-deleted subgraph for all Then the following are equivalent:
is walk-regular.
is a constant-diagonal matrix for all
for all
Examples
The vertex-transitive graphs are walk-regular.
The semi-symmetric graphs are walk-regular.
The distance-regular graphs are walk-regular. More generally, any simple graph in a homogeneous coherent algebra is walk-regular.
A connected regular graph is walk-regular if:
It has at most four distinct eigenvalues.
It is triangle-free and has at most five distinct eigenvalues.
It is bipartite and has at most six distinct eigenvalues.
Properties
A walk-regular graph is necessarily a regular graph.
Complements of walk-regular graphs are walk-regular.
Cartesian products of walk-regular graphs are walk-regular.
Categorical products of walk-regular graphs are walk-regular.
Strong products of walk-regular graphs are walk-regular.
In general, the line graph of a walk-regular graph is not walk-regular.
-walk-regular graphs
A graph is -walk regular if for any two vertices and of graph-distance the number of walks of length from to depends only of and .
For these are exactly the walk-regular graphs.
If is at least the diameter of the graph, then the -walk regular graphs coincide with the distance-regular graphs.
In fact, if and the graph has an eigenvalue of multiplicity at most (except for eigenvalues and , where is the degree of the graph), then the graph is already distance-regular. |
https://en.wikipedia.org/wiki/Endotherm | An endotherm (from Greek ἔνδον endon "within" and θέρμη thermē "heat") is an organism that maintains its body at a metabolically favorable temperature, largely by the use of heat released by its internal bodily functions instead of relying almost purely on ambient heat. Such internally generated heat is mainly an incidental product of the animal's routine metabolism, but under conditions of excessive cold or low activity an endotherm might apply special mechanisms adapted specifically to heat production. Examples include special-function muscular exertion such as shivering, and uncoupled oxidative metabolism, such as within brown adipose tissue.
Only birds and mammals are extant universally endothermic groups of animals. However, Argentine black and white tegu, leatherback sea turtles, lamnid sharks, tuna and billfishes, cicadas, and winter moths are also endothermic. Unlike mammals and birds, some reptiles, particularly some species of python and tegu, possess seasonal reproductive endothermy in which they are endothermic only during their reproductive season.
In common parlance, endotherms are characterized as "warm-blooded". The opposite of endothermy is ectothermy, although in general, there is no absolute or clear separation between the nature of endotherms and ectotherms.
Origin
Endothermy was thought to have originated towards the end of the Permian Period. One recent study claimed the origin of endothermy within Synapsida (the mammalian lineage) was among Mammaliamorpha, a node calibrated during the Late Triassic period, about 233 million years ago. Another study instead argued that endothermy only appeared later, during the Middle Jurassic, among crown-group mammals.
Evidence for endothermy has been found in basal synapsids ("pelycosaurs"), pareiasaurs, ichthyosaurs, plesiosaurs, mosasaurs, and basal archosauromorphs. Even the earliest amniotes might have been endotherms.
Mechanisms
Generating and conserving heat
Many endotherms have a larger amount |
https://en.wikipedia.org/wiki/Solido | Solido is a French manufacturing company which produces die-cast scale models of cars, military vehicles, and commercial vehicles. Vehicles are usually made of a zamac alloy in varying scales. Solido's main competition in France was Norev, but internationally it is Polistil, Corgi Toys, Dinky Toys, Mercury, and Tekno.
History
"Solido" was the brand name established in 1930 by Ferdinand de Vazeilles of the "Fonderie de précision de Nanterre" in the western Paris suburb of Nanterre, France. The company was one of the first European firms to champion the "virtues of unbreakable diecast metal." Vazeilles' first product was a metal Gergovia brand spark plug on wheels. In 1932, some of the first vehicle kits were made in Zamac, labeled with the theme "toys with transformations" referring to their various bodies fitting on standard chassis, like the real coach builders and car manufacturers did at that time. Some were fitted with spring-loaded motors that would propel them across the floor. It was similar to what Schuco was offering in Germany. In 1953, de Vazeilles bequeathed the company, then called Solijouets SA, to his son Jean René. By 1960, de Vazeilles' three children, Charlotte, Jean and Colette were running it.
After World War II, the company factory was relocated farther west to the town of Ivry-la-Bataille in Normandy. In 1974, the company opened a new factory in Oulins. Later information on the Solido boxes labeled the company home as in nearby Anet, a postal designation.
At the end of the 1970s, during a financial crisis, Solido entered the Jouet Francais Group which included Jouef, Delacoste & Heller. The new company was called Heller-Solido SA, and the Vazeilles family no longer controlled the Solido company. At the end of 1980, Heller-Solido SA went into liquidation and was purchased by Majorette. The Majorette takeover brought cost-saving measures and, though the Oulins factory remained in operation, some contract construction of toys took place at oth |
https://en.wikipedia.org/wiki/Honda%20E%20series | The E series was a collection of successive humanoid robots created by the Honda Motor Company between the years of 1986 and 1993. These robots were only experimental, but later evolved into the Honda P series, with Honda eventually amassing the knowledge and experience necessary to create Honda's advanced humanoid robot: ASIMO. The fact that Honda had been developing the robots was kept secret from the public until the announcement of the Honda P2 in 1996.
E0, developed in 1986, was the first robot. It walked in a straight line on two feet, in a manner resembling human locomotion, taking around 5 seconds to complete a single step. Quickly engineers realised that in order to walk up slopes, the robot would need to travel faster. The model has 6 degrees of freedom: one in each groin, one in each knee and one in each ankle.
Models
E0, developed in 1986.
E1, developed in 1987, was larger than the first and walked at 0.25 km/h. This model and subsequent E-series robots have 12 degrees of freedom: 3 in each groin, 1 in each knee and 2 in each ankle.
E2, developed in 1989, could travel at 1.2km/h, through the development of "dynamic movement".
E3, developed in 1991, travelled at 3km/h, the average speed of a walking human.
E4, developed in 1991, lengthened the knee to achieve speeds of up to 4.7km/h.
E5, developed in 1992, was able to walk autonomously, albeit with a very large head.
E6, developed in 1993, was able to autonomously balance, walk over obstacles, and even climb stairs.
See also
Honda P series |
https://en.wikipedia.org/wiki/List%20of%20software%20forks | This is a list of notable software forks.
Undated
The many varieties of proprietary Unix in the 1980s and 1990s — almost all derived from AT&T Unix under licence and all called "Unix", but increasingly mutually incompatible. See UNIX wars.
Most Linux distributions are descended from other distributions, most being traceable back to Debian, Red Hat or Softlanding Linux System (see image right). Since most of the content of a distribution is free and open source software, ideas and software interchange freely as is useful to the individual distribution. Merges (e.g., United Linux or Mandriva) are rare.
Pretty Good Privacy, forked outside of the United States to free it from restrictive US laws on the exportation of cryptographic software.
The game NetHack has spawned a number of variants using the original code, notably Slash'EM (1997), and was itself a fork (1987) of Hack.
Openswan and strongSwan, from the discontinued FreeS/WAN.
1981
Symbolics Lisp Machine operating system, later called Symbolics Genera. Forked from the MIT Lisp Machine operating system, which was licensed by MIT to Symbolics in 1980. This fork later motivated Richard Stallman to start the GNU Project.
1985
POSTGRES (later PostgreSQL), after Ingres branched off as a proprietary project.
1990
Microsoft SQL Server, from Sybase SQL Server, via a technology-sharing agreement concerning the Tabular Data Stream protocol.
SWLPC, from LPMud.
1991
Xemacs, from GNU Emacs, originally for Lucid Corporation internal needs.
1993
FreeBSD, started as a patchkit to 386BSD.
NetBSD, started as a patchkit to 386BSD.
1995
Apache HTTP Server, from the moribund NCSA HTTPd.
OpenBSD, a fork of NetBSD 1.0 by Theo de Raadt due to internal developer personality clashes.
1997
EGCS was a fork of GCC, later named as the official version.
1998
Grace, from Xmgr, after that project ceased development.
1999
FilmGIMP, later called CinePaint, from GIMP, to handle 48-bit colour.
OSSH from SSH, when that proj |
https://en.wikipedia.org/wiki/Cytochrome%20c%20oxidase%20subunit%20III | Cytochrome c oxidase subunit III (COX3) is an enzyme that in humans is encoded by the MT-CO3 gene. It is one of main transmembrane subunits of cytochrome c oxidase. It is also one of the three mitochondrial DNA (mtDNA) encoded subunits (MT-CO1, MT-CO2, MT-CO3) of respiratory complex IV. Variants of it have been associated with isolated myopathy, severe encephalomyopathy, Leber hereditary optic neuropathy, mitochondrial complex IV deficiency, and recurrent myoglobinuria .
Structure
The MT-CO3 gene produces a 30 kDa protein composed of 261 amino acids. COX3, the protein encoded by this gene, is a member of the cytochrome c oxidase subunit 3 family. This protein is located on the inner mitochondrial membrane. COX3 is a multi-pass transmembrane protein: in human, it contains 7 transmembrane domains at positions 15–35, 42–59, 81–101, 127–147, 159–179, 197–217, and 239–259.
Function
Cytochrome c oxidase () is the terminal enzyme of the respiratory chain of mitochondria and many aerobic bacteria. It catalyzes the transfer of electrons from reduced cytochrome c to molecular oxygen:
4 cytochrome c+2 + 4 H+ + O2 4 cytochrome c+3 + 2 H2O
This reaction is coupled to the pumping of four additional protons across the mitochondrial or bacterial membrane.
Cytochrome c oxidase is an oligomeric enzymatic complex that is located in the mitochondrial inner membrane of eukaryotes and in the plasma membrane of aerobic prokaryotes. The core structure of prokaryotic and eukaryotic cytochrome c oxidase contains three common subunits, I, II and III. In prokaryotes, subunits I and III can be fused and a fourth subunit is sometimes found, whereas in eukaryotes there are a variable number of additional small subunits.
As the bacterial respiratory systems are branched, they have a number of distinct terminal oxidases, rather than the single cytochrome c oxidase present in the eukaryotic mitochondrial systems. Although the cytochrome o oxidases do not catalyze the cytochrome c but the q |
https://en.wikipedia.org/wiki/Endometritis | Endometritis is inflammation of the inner lining of the uterus (endometrium). Symptoms may include fever, lower abdominal pain, and abnormal vaginal bleeding or discharge. It is the most common cause of infection after childbirth. It is also part of spectrum of diseases that make up pelvic inflammatory disease.
Endometritis is divided into acute and chronic forms. The acute form is usually from an infection that passes through the cervix as a result of an abortion, during menstruation, following childbirth, or as a result of douching or placement of an IUD. Risk factors for endometritis following delivery include Caesarean section and prolonged rupture of membranes. Chronic endometritis is more common after menopause. The diagnosis may be confirmed by endometrial biopsy. Ultrasound may be useful to verify that there is no retained tissue within the uterus.
Treatment is usually with antibiotics. Recommendations for treatment of endometritis following delivery includes clindamycin with gentamicin. Testing for and treating gonorrhea and chlamydia in those at risk is also recommended. Chronic disease may be treated with doxycycline. Outcomes with treatment are generally good.
Rates of endometritis are about 2% following vaginal delivery, 10% following scheduled C-section, and 30% with rupture of membranes before C-section if preventive antibiotics are not used. The term "endomyometritis" may be used when inflammation of the endometrium and the myometrium is present. The condition is also relatively common in other animals such as cows.
Symptoms
Symptoms may include fever, lower abdominal pain, and abnormal vaginal bleeding or discharge.
Types
Acute endometritis
Acute endometritis is characterized by infection. The organisms most often isolated are believed to be because of compromised abortions, delivery, medical instrumentation, and retention of placental fragments. There is not enough evidence for the use of prophylactic antibiotics to prevent endometritis afte |
https://en.wikipedia.org/wiki/Modular%20invariance | In theoretical physics, modular invariance is the invariance under the group such as SL(2,Z) of large diffeomorphisms of the torus. The name comes from the classical name modular group of this group, as in modular form theory.
In string theory, modular invariance is an additional requirement for one-loop diagrams. This helps in getting rid of some global anomalies such as the gravitational anomalies.
Equivalently, in two-dimensional conformal field theory the torus partition function must be invariant under the modular group SL(2,Z).
String theory
Symmetry |
https://en.wikipedia.org/wiki/Sleep%20temple | Sleep temples (also known as dream temples or Egyptian sleep temples) are regarded by some as an early instance of hypnosis over 4000 years ago, under the influence of Imhotep. Imhotep served as Chancellor and as High Priest of the sun god Ra at Heliopolis. He was said to be a son of the ancient Egyptian demiurge Ptah, his mother being a mortal named Khredu-ankh.
Sleep temples were hospitals of sorts, healing a variety of ailments, perhaps many of them psychological in nature. Patients were taken to an unlit chamber to sleep and be treated for their specific ailment.The treatment involved chanting, placing the patient into a trance-like or hypnotic state, and analysing their dreams in order to determine treatment. Meditation, fasting, baths, and sacrifices to the patron deity or other spirits were often involved as well.
Sleep temples also existed in the Middle East and Ancient Greece. In Greece, they were built in honor of Asclepios, the Greek god of medicine and were called Asclepieions. The Greek treatment was referred to as incubation and focused on prayers to Asclepios for healing. These sleep chambers were filled with snakes, a symbol to Asclepios. A similar Hebrew treatment was referred to as Kavanah and involved focusing on letters of the Hebrew alphabet spelling the name of their God. In 1928, Mortimer Wheeler unearthed a Roman sleep temple at Lydney Park, Gloucestershire, with the assistance of a young J.R.R. Tolkien. |
https://en.wikipedia.org/wiki/Gluteus%20maximus | The gluteus maximus is the main extensor muscle of the hip in humans. It is the largest and outermost of the three gluteal muscles and makes up a large part of the shape and appearance of each side of the hips. It is the single largest muscle in the human body. Its thick fleshy mass, in a quadrilateral shape, forms the prominence of the buttocks. The other gluteal muscles are the medius and minimus, and sometimes informally these are collectively referred to as the glutes.
Its large size is one of the most characteristic features of the muscular system in humans, connected as it is with the power of maintaining the trunk in the erect posture. Other primates have much flatter hips and cannot sustain standing erectly.
The muscle is made up of muscle fascicles lying parallel with one another, and are collected together into larger bundles separated by fibrous septa.
Structure
The gluteus maximus (or buttock) is the outermost muscle of the buttocks. It arises from connections to nearby structures in this area. It arises from the posterior gluteal line of the inner upper ilium, a bone of the pelvis, as well as above it to the iliac crest and slightly below it; from the lower part of the sacrum and the side of the coccyx, the tailbone; from the aponeurosis of the erector spinae (lumbodorsal fascia), the sacrotuberous ligament, and the fascia covering the gluteus medius (gluteal aponeurosis).
The fibers are directed obliquely inferiorly and laterally;
The gluteus maximus ends in two main areas:
those forming the upper and larger portion of the muscle, together with the superficial fibers of the lower portion, end in a thick tendinous lamina, which passes across the greater trochanter, and inserts into the iliotibial band of the fascia lata;
the deeper fibers of the lower portion are inserted into the gluteal tuberosity of the linea aspera, between the vastus lateralis and adductor magnus. If present, the third trochanter also serves as an attachment.
Bursae
Three bu |
https://en.wikipedia.org/wiki/Rotatin | Rotatin is a protein that in humans is encoded by the RTTN gene. It is involved in the maintenance of cellular cilia and the radial migration of neurons in the cerebral cortex.
Function
Rotatin is involved in the maintenance of ciliary basal bodies. Mutations in rotatin result in fewer, abnormally short cilia, with bulbous tips and multiple basal bodies. It is also involved in the radial migration of neurons in the cerebral cortex and localises in similar areas to the migration-guiding Cajal–Retzius cells. Its other roles include arrangement of the heart loops in heart development.
Clinical significance
Mutations in both copies of rotatin cause a syndrome of microcephaly, short stature and polymicrogyria with or without seizures.
History
The gene was first characterised in 2002 and was given its name for its role in the axial migration of heart loop development. |
https://en.wikipedia.org/wiki/Early%20numeracy | Early numeracy is a branch of numeracy that aims to enhance numeracy learning for younger learners, particularly those at-risk in the area of mathematics. Usually the mathematical learning begins with simply learning the first digits, 1 through 10. This is done because it acts as an entry way to the expansion of counting. One can keep track of the digits using any of the fingers.
See also
Primary education |
https://en.wikipedia.org/wiki/Molecular%20epidemiology | Molecular epidemiology is a branch of epidemiology and medical science that focuses on the contribution of potential genetic and environmental risk factors, identified at the molecular level, to the etiology, distribution and prevention of disease within families and across populations. This field has emerged from the integration of molecular biology into traditional epidemiological research. Molecular epidemiology improves our understanding of the pathogenesis of disease by identifying specific pathways, molecules and genes that influence the risk of developing disease. More broadly, it seeks to establish understanding of how the interactions between genetic traits and environmental exposures result in disease.
History
The term "molecular epidemiology" was first coined by Edwin D. Kilbourne in a 1973 article entitled "The molecular epidemiology of influenza". The term became more formalized with the formulation of the first book on molecular epidemiology titled Molecular Epidemiology: Principles and Practice by Paul A. Schulte and Frederica Perera. At the heart of this book is the impact of advances in molecular research that have given rise to and enabled the measurement and exploitation of the biomarker as a vital tool to link traditional molecular and epidemiological research strategies to understand the underlying mechanisms of disease in populations.
Modern use
While most molecular epidemiology studies are using conventional disease designation system for an outcome (with the use of exposures at the molecular level), compelling evidence indicates that disease evolution represents inherently heterogeneous process differing from person to person. Conceptually, each individual has a unique disease process different from any other individual ("the unique disease principle"), considering uniqueness of the exposome and its unique influence on molecular pathologic process in each individual. Studies to examine the relationship between an exposure and molecular pa |
https://en.wikipedia.org/wiki/Microbial%20oxidation%20of%20sulfur | Microbial oxidation of sulfur is the oxidation of sulfur by microorganisms to build their structural components. The oxidation of inorganic compounds is the strategy primarily used by chemolithotrophic microorganisms to obtain energy to survive, grow and reproduce. Some inorganic forms of reduced sulfur, mainly sulfide (H2S/HS−) and elemental sulfur (S0), can be oxidized by chemolithotrophic sulfur-oxidizing prokaryotes, usually coupled to the reduction of oxygen (O2) or nitrate (NO3−). Anaerobic sulfur oxidizers include photolithoautotrophs that obtain their energy from sunlight, hydrogen from sulfide, and carbon from carbon dioxide (CO2).
Most of the sulfur oxidizers are autotrophs that can use reduced sulfur species as electron donors for CO2 fixation. The microbial oxidation of sulfur is an important link in the biogeochemical cycling of sulfur in environments hosting both abundant reduced sulfur species and low concentrations of oxygen, such as marine sediments, oxygen minimum zones (OMZs) and hydrothermal systems.
Ecology
The oxidation of hydrogen sulfide has been considered one of the most important processes in the environment, given that the oceans have had very low oxygen and high sulfidic conditions over most of the Earth's history. The modern analog ecosystems are deep marine basins, for instance in the Black Sea, near the Cariaco trench and the Santa Barbara basin. Other zones of the ocean that experience periodic anoxic and sulfidic conditions are the upwelling zones off the coasts of Chile and Namibia, and hydrothermal vents, which are a key source of H2S to the ocean. Sulfur oxidizing microorganisms (SOM) are thus restricted to upper sediment layers in these environments, where oxygen and nitrateschm are available. The SOM may play an important yet unconsidered role in carbon sequestration, since some models and experiments with Gammaproteobacteria have suggested that sulfur-dependent carbon fixation in marine sediments could be responsible for al |
https://en.wikipedia.org/wiki/Real-time%20text | Real-time text (RTT) is text transmitted instantly as it is typed or created. Recipients can immediately read the message while it is being written, without waiting.
Real-time text is used for conversational text, in collaboration, and in live captioning. Technologies include TDD/TTY devices for the deaf, live captioning for TV, Text over IP (ToIP), some types of instant messaging, captioning for telephony/video teleconferencing, telecommunications relay services including ip-relay, transcription services including Remote CART, TypeWell, collaborative text editing, streaming text applications, next-generation 9-1-1/1-1-2 emergency service. Obsolete TDD/TTY devices are being replaced by more modern real-time text technologies, including Text over IP, ip-relay, and instant messaging.
During 2012, the Real-Time Text Taskforce (R3TF) designed a standard international symbol to represent real-time text, as well as the alternate name Fast Text to improve public education of the technology.
Use over instant messaging
While standard instant messaging is not real-time text (messages are sent deliberately when the writer is ready, not transmitted while they are being composed), a real-time text option is found in some instant messaging software, including AOL Instant Messenger's "Real-Time IM" feature. Real-time text is also possible over any XMPP compatible chat networks, including those used by Apple iChat, Cisco WebEx, and Google Talk, by using appropriate software that has a real-time text feature. When present in IM programs, the real-time text feature can be turned on/off, just like other chat features such as audio. Real-time text programs date at least to the 1970s, with the talk program on the DEC PDP-11, which remains in use on Unix systems.
Certain real-time text applications have a feature that allows the real-time text to be "turned off", for temporary purposes. This allows the sender to pre-compose the message as a standard IM or text message before transm |
https://en.wikipedia.org/wiki/152nd%20meridian%20west | The meridian 152° west of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, North America, the Pacific Ocean, the Southern Ocean, and Antarctica to the South Pole.
The 152nd meridian west forms a great circle with the 28th meridian east.
From Pole to Pole
Starting at the North Pole and heading south to the South Pole, the 152nd meridian west passes through:
{| class="wikitable plainrowheaders"
! scope="col" width="130" | Co-ordinates
! scope="col" | Country, territory or sea
! scope="col" | Notes
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Arctic Ocean
| style="background:#b0e0e6;" |
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Beaufort Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Alaska
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Cook Inlet
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Alaska — Kalgin Island
|-valign="top"
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Cook Inlet
| style="background:#b0e0e6;" | Passing just west of the Kenai Peninsula, Alaska, (at )
|-
|
! scope="row" |
| Alaska — the Barren Islands
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Pacific Ocean
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Alaska — Afognak Island
|-valign="top"
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Pacific Ocean
| style="background:#b0e0e6;" | Passing just east of Kodiak Island, Alaska, (at ) Passing just west of Flint Island, (at ) Passing just west of Tupai atoll, (at ) Passing just east of Maupiti atoll, (at ) Passing just west of Bora Bora island, (at )
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Southern Ocean
| style="background:#b0e0e6;" |
|-valign="top"
|
! scope="row" | Antarctica
| Ross Dependency, claimed by
|}
See also
151s |
https://en.wikipedia.org/wiki/Regional%20Internet%20registry | A regional Internet registry (RIR) is an organization that manages the allocation and registration of Internet number resources within a region of the world. Internet number resources include IP addresses and autonomous system (AS) numbers.
The regional Internet registry system evolved, eventually dividing the responsibility for management to a registry for each of five regions of the world. The regional Internet registries are informally liaised through the unincorporated Number Resource Organization (NRO), which is a coordinating body to act on matters of global importance.
Five regional registries
The African Network Information Centre (AFRINIC) serves Africa.
The American Registry for Internet Numbers (ARIN) serves Antarctica, Canada, parts of the Caribbean, and the United States.
The Asia Pacific Network Information Centre (APNIC) serves East Asia, Oceania, South Asia, and Southeast Asia.
The Latin America and Caribbean Network Information Centre (LACNIC) serves most of the Caribbean and all of Latin America.
The Réseaux IP Européens Network Coordination Centre (RIPE NCC) serves Europe, Central Asia, Russia, and West Asia.
Internet Assigned Numbers Authority
Regional Internet registries are components of the Internet Number Registry System, which is described in IETF RFC 7020, where IETF stands for the Internet Engineering Task Force. The Internet Assigned Numbers Authority (IANA) delegates Internet resources to the RIRs who, in turn, follow their regional policies to delegate resources to their customers, which include Internet service providers and end-user organizations. Collectively, the RIRs participate in the Number Resource Organization (NRO), formed as a body to represent their collective interests, undertake joint activities, and coordinate their activities globally. The NRO has entered into an agreement with ICANN for the establishment of the Address Supporting Organisation (ASO), which undertakes coordination of global IP addressing pol |
https://en.wikipedia.org/wiki/ChipWits | ChipWits is a programming game for the Macintosh written by Doug Sharp and Mike Johnston, and published by BrainPower software in 1984. Ports to the Apple II and Commodore 64 were published by Epyx in 1985.
The player uses a visual programming language to teach a virtual robot how to navigate various mazes of varying difficulty. The gameplay straddles the line between entertainment and programming education. The game was developed in MacFORTH and later ported to the Apple II and Commodore 64.
Reception
Computer Gaming World preferred Robot Odyssey to ChipWits but stated that both were "incredibly vivid simulation experiences". The magazine criticized ChipWits inability to save more than 16 robots or copy a robot to a new save slot, and cautioned that it "may be too simple for people familiar with programming". The magazine added that the criticism was "more a cry for a more complex Chipwits II game than condemnation of the current product".
ChipWits won numerous awards, including MACazine Best of '85 and MacUser's Editor's Choice 1985 Award, as well as being named The 8th Best Apple Game of All Time by Maclife.
Reviews
Games #66
Legacy
From 2006 to 2008, Mike Johnston and Doug Sharp developed and released ChipWits II, written in Adobe AIR. That version featured several innovations including an in-game tutorial, updated graphics, a soundtrack, isometric and 3D rendering, several new chips, and new missions. That version is no longer supported, but the original site is archived at .
In September 2021, ChipWits, Inc. was formed by Doug Sharp and Mark Roth to create a modern reboot of the game. The new version is being written in Unity and is in early access testing. |
https://en.wikipedia.org/wiki/Vaccine%20ingredients | A vaccine dose contains many ingredients (stabilizers, adjuvants, residual inactivating ingredients, residual cell culture materials, residual antibiotics and preservatives) very little of which is the active ingredient, the immunogen. A single dose may have merely nanograms of virus particles, or micrograms of bacterial polysaccharides. A vaccine injection, oral drops or nasal spray is mostly water. Other ingredients are added to boost the immune response, to ensure safety or help with storage, and a tiny amount of material is left-over from the manufacturing process. Very rarely, these materials can cause an allergic reaction in people who are very sensitive to them.
Volume
The volume of a vaccine dose is influenced by the route of administration. While some vaccines are given orally or nasally, most require an injection. Vaccines are not injected intravenously into the bloodstream. Most injections deposit a small dose into a muscle, but some are given superficially just under the skin surface or deeper beneath the skin.
Fluenz Tetra, a live flu vaccine for children, is administered nasally with 0.1ml of liquid sprayed into each nostril. The live typhoid vaccine, Vivotif, and a live adenovirus vaccine, licensed only for military use, both come as hard gastro-resistant tablets. The Sabin oral live polio vaccine is taken as two 0.05ml drops of a bitter salty liquid that was historically added to sugar cubes when given to young children. Rotarix, a live rotavirus vaccine, has about 1.5ml of liquid containing 1g of sugar to make it taste better. The Dukoral cholera vaccine comes as a 3ml suspension along with 5.6g of effervescent granules, which are mixed and added to around 150ml water to make a sweet raspberry flavoured drink.
At the other end of the volume scale, the smallpox vaccine is a minuscule 0.0025ml droplet that is picked up when a bifurcated needle is dipped into a vial containing around 100 doses. This needle is pricked 15 times into a small area of s |
https://en.wikipedia.org/wiki/Cockington%20Green%20Gardens | Cockington Green Gardens is a park of miniatures, situated in Nicholls, Australian Capital Territory. Doug and Brenda Sarah had the idea to create a miniature village in 1972, and Cockington Green was opened on 3 November 1979.
The business is family owned and operated, incorporating over four generations.
Gallery |
https://en.wikipedia.org/wiki/Mir-84%20microRNA%20precursor%20family | In molecular biology mir-84 microRNA is a short RNA molecule. MicroRNAs function to regulate the expression levels of other genes by several mechanisms.
See also
MicroRNA |
https://en.wikipedia.org/wiki/Forking%20extension | In model theory, a forking extension of a type is an extension of that type that is not whereas a non-forking extension is an extension that is as free as possible. This can be used to extend the notions of linear or algebraic independence to stable theories. These concepts were introduced by S. Shelah.
Definitions
Suppose that A and B are models of some complete ω-stable theory T.
If p is a type of A and q is a type of B containing p, then q is called a forking extension of p if its Morley rank is smaller, and a nonforking extension if it has the same Morley rank.
Axioms
Let T be a stable complete theory. The non-forking relation ≤ for types over T is the unique relation that satisfies the following axioms:
If p≤ q then p⊂q. If f is an elementary map then p≤q if and only if fp≤fq
If p⊂q⊂r then p≤r if and only if p≤q and q≤ r
If p is a type of A and A⊂B then there is some type q of B with p≤q.
There is a cardinal κ such that if p is a type of A then there is a subset A0 of A of cardinality less than κ so that (p|A0) ≤ p, where | stands for restriction.
For any p there is a cardinal λ such that there are at most λ non-contradictory types q with p≤q. |
https://en.wikipedia.org/wiki/Radar%20tracker | A radar tracker is a component of a radar system, or an associated command and control (C2) system, that associates consecutive radar observations of the same target into tracks. It is particularly useful when the radar system is reporting data from several different targets or when it is necessary to combine the data from several different radars or other sensors.
Role of the radar tracker
A classical rotating air surveillance radar system detects target echoes against a background of noise. It reports these detections (known as "plots") in polar coordinates representing the range and bearing of the target. In addition, noise in the radar receiver will occasionally exceed the detection threshold of the radar's Constant false alarm rate detector and be incorrectly reported as targets (known as false alarms). The role of the radar tracker is to monitor consecutive updates from the radar system (which typically occur once every few seconds, as the antenna rotates) and to determine those sequences of plots belonging to the same target, whilst rejecting any plots believed to be false alarms. In addition, the radar tracker is able to use the sequence of plots to estimate the current speed and heading of the target. When several targets are present, the radar tracker aims to provide one track for each target, with the track history often being used to indicate where the target has come from.
When multiple radar systems are connected to a single reporting post, a multiradar tracker is often used to monitor the updates from all of the radars and form tracks from the combination of detections. In this configuration, the tracks are often more accurate than those formed from single radars, as a greater number of detections can be used to estimate the tracks.
In addition to associating plots, rejecting false alarms and estimating heading and speed, the radar tracker also acts as a filter, in which errors in the individual radar measurements are smoothed out. In essenc |
https://en.wikipedia.org/wiki/Health%20Volunteers%20Overseas | Health Volunteers Overseas (HVO) is a Washington, DC-based nonprofit concerned with health care in resource-scarce countries. through the training, mentorship, and education of local health professionals. Since 1986, HVO has relied on establishing equitable partnerships with hospitals, universities, medical institutes, and Ministries of Health. HVO’s programs exploit health professionals as short- and long-term volunteers providing both in-person and virtual training, as well as provide scholarships for on-site clinicians to attend international continuing education opportunities. HVO volunteers provide training on average to over 3,100 health professionals each year across 18+ specialties and 23+ countries.
History
The idea for the organization was sparked by an article by Dr. Ralph Crawshaw, published in the December 1984 issue of the Journal of the American Medical Association. In the article, Dr. Crawshaw urged fellow medical practitioners to "make a substantial difference to your colleagues in developing countries" and cited the example of Orthopaedics Overseas. In 1986, the Orthopaedics Overseas Board of Directors voted to become the first division of the newly created Health Volunteers Overseas. Two anesthesiologists went to Ethiopia for the first HVO volunteer trip later that year.
Since opening its doors in 1986, HVO volunteers have completed more than 12,000 assignments in Africa, Asia, Latin America, Eastern Europe, the Caribbean. Volunteers are drawn from the fields of anesthesia, dermatology, emergency medicine, hand surgery, hematology, internal medicine, mental health, nursing education, obstetrics & gynecology, oncology, oral health, orthopaedics, pediatrics, pharmacology, rehabilitation (PT, OT, SLP), and wound management.
In 2020, HVO signed the Brocher Declaration, committing to following ethical and sustainable practices for short-term global health engagements.
The issue
The delivery of health care services in any country is dependent on a |
https://en.wikipedia.org/wiki/Trend%20Micro | is a Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.
Eva Chen, who is the founder, currently serves as Trend Micro's chief executive officer, a position she has held since 2005. She succeeded founding CEO Steve Chang, who now serves as chairman.
History
1988–1999
The company was founded in 1988 in Los Angeles by Steve Chang, his wife, Jenny Chang, and her sister, Eva Chen (陳怡樺). The company was established with proceeds from Steve Chang's previous sale of a copy protection dongle to a United States-based Rainbow Technologies. Shortly after establishing the company, its founders moved headquarters to Taipei.
In 1992, Trend Micro took over a Japanese software firm to form Trend Micro Devices and established headquarters in Tokyo. It then made an agreement with CPU maker Intel, under which it produced an anti-virus product for local area networks (LANs) for sale under the Intel brand. Intel paid royalties to Trend Micro for sales of LANDesk Virus Protect in the United States and Europe, while Trend paid royalties to Intel for sales in Asia. In 1993, Novell began bundling the product with its network operating system. In 1996 the two companies agreed to a two-year continuation of the agreement in which Trend was allowed to globally market the ServerProtect product under its own brand alongside Intel's LANDesk brand.
Trend Micro was listed on the Tokyo Stock Exchange in 1998 under the ticker 4704. The company began trading on the United States-based NASDAQ stock exchange in July 1999.
2000s
In 2004, founding chief executive officer Steve Chang decided to split the responsibilities of CEO an |
https://en.wikipedia.org/wiki/Sumatran%20flying%20squirrel | The Sumatran flying squirrel (Hylopetes winstoni) is a flying squirrel only found on the island of Sumatra. It is listed as data deficient on the IUCN red list. Originally discovered in 1949, it is known only from a single specimen. It is a nocturnal, arboreal creature, spending most of its life in the canopy. The Sumatran flying squirrel is threatened by a restricted range and habitat loss due to logging.
Unlike most other flying squirrels, it does not have a membrane connecting to its tail. |
https://en.wikipedia.org/wiki/MOS%20Technology%208568 | The MOS Technology 8568 Video Display Controller (VDC) was the graphics processor responsible for the 80 column or RGBI display on the Commodore 128DCR personal computer. In the Commodore 128 service manual, this part was referred to as the "80 column CRT controller." The 8568 embodied many of the features of the older 6545E monochrome CRT controller plus RGBI color.
The original ("flat") Commodore 128 and the Commodore 128D (European plastic hausing) used the 8563 video controller to generate the 80 column display. The 8568 was essentially an updated version of the 8563, combining the latter's functionality with glue logic that had been implemented by discrete components in physical proximity to the 8563. Unlike the 8563, the 8568 included an unused (in the C-128) active low interrupt request line (/INTR), which was asserted when the "ready" bit in the 8568's status register changed from 0 to 1. Reading the control register would automatically deassert /INTR. Owing to differences in pin assignments and circuit interfacing, the 8563 and 8568 are not electrically interchangeable.
The Commodore 128 had two video display modes, which were usually used singularly, but could be used simultaneously if the computer was connected to two compatible video monitors. The VIC-II chip, also found in the Commodore 64, was mapped directly into main memory—the video memory and CPUs (the 8502 and Z80A processors) shared a common 128 KB RAM, and the VIC-II control registers were accessed as memory locations (that is, they were memory mapped).
Unlike the VIC-II, the 8568 had its own local video RAM, 64K in the C-128DCR model (sold in North America) and, depending on the date of manufacture of the particular machine, either 16 or 64K in the C-128D model (marketed in Europe). Addressing the VDC's internal registers and dedicated video memory must be accomplished by indirect means. First the program must tell the VDC which of its 37 internal registers is to be accessed. Next t |
https://en.wikipedia.org/wiki/Lusin%27s%20theorem | In the mathematical field of real analysis, Lusin's theorem (or Luzin's theorem, named for Nikolai Luzin) or Lusin's criterion states that an almost-everywhere finite function is measurable if and only if it is a continuous function on nearly all its domain. In the informal formulation of J. E. Littlewood, "every measurable function is nearly continuous".
Classical statement
For an interval [a, b], let
be a measurable function. Then, for every ε > 0, there exists a compact E ⊆ [a, b] such that f restricted to E is continuous and
Note that E inherits the subspace topology from [a, b]; continuity of f restricted to E is defined using this topology.
Also for any function f, defined on the interval [a, b] and almost-everywhere finite, if for any ε > 0 there is a function ϕ, continuous on [a, b], such that the measure of the set
is less than ε, then f is measurable.
General form
Let be a Radon measure space and Y be a second-countable topological space equipped with a Borel algebra, and let be a measurable function. Given , for every of finite measure there is a closed set with such that restricted to is continuous.
On the proof
The proof of Lusin's theorem can be found in many classical books. Intuitively, one expects it as a consequence of Egorov's theorem and density of smooth functions. Egorov's theorem states that pointwise convergence is nearly uniform, and uniform convergence preserves continuity. |
https://en.wikipedia.org/wiki/Bans%20on%20Nazi%20symbols | The use of flags and emblems of Nazi Germany (1933–1945) is currently subject to legal restrictions in a number of countries, such as France, Germany, Israel, Italy and Hungary.
While legal in most countries, the display of flags associated with the Nazi government (see: Nazi flags) is subject to restriction or an outright ban in several European countries.
Many Nazi flags make use of the swastika symbol; however, the swastika is not always used in connection with the National Socialist German Workers' Party movement or of the German Third Reich or the combined German military of 1933–1945. Outside of Nazism, use of swastikas pre-dates the German Third Reich by some 3,000 years. It is possible to display certain non-Nazi swastikas even in areas where Nazi swastikas are prohibited.
Summary table
Asia
Iran
After the 1979 Iranian Revolution, Holocaust denial, and Nazi symbols are legal in Iran, although it dates to the 1940s during the Pahlavi era.
Israel
The use of Nazi symbols has been illegal in Israel since early 2012.
China
Until 2018, displaying Nazi symbol was treated as a kind of minor offence when it amounted to harassment, so those displaying Nazi symbols were usually punished by a small fine or less than 20 days detention under the Public Security Administration Punishment Law.
In April 2018, the 2nd Session of the Standing Committee of the 13th National People's Congress adopted a law called "" on 27 April 2018, which came into force on 1 May the same year. Those who display Nazi or other fascist symbols will face heavy fines as well as imprisonment.
Japan
The use of Nazi symbols is not a crime in Japan.
Malaysia
According to the Malaysian law, the display of Nazi symbols is a crime.
Saudi Arabia
In Saudi Arabia, the display of Nazi symbols is illegal.
South Korea
The Republic of Korea has no provisions or laws regarding the use of Nazi imagery.
Thailand
The use of Nazi symbols is legal in Thailand.
Turkey
The Turkish law bans the use of Nazi |
https://en.wikipedia.org/wiki/HyperNEAT | Hypercube-based NEAT, or HyperNEAT, is a generative encoding that evolves artificial neural networks (ANNs) with the principles of the widely used NeuroEvolution of Augmented Topologies (NEAT) algorithm developed by Kenneth Stanley. It is a novel technique for evolving large-scale neural networks using the geometric regularities of the task domain. It uses Compositional Pattern Producing Networks (CPPNs), which are used to generate the images for Picbreeder.org and shapes for EndlessForms.com . HyperNEAT has recently been extended to also evolve plastic ANNs and to evolve the location of every neuron in the network.
Applications to date
Multi-agent learning
Checkers board evaluation
Controlling Legged Robotsvideo
Comparing Generative vs. Direct Encodings
Investigating the Evolution of Modular Neural Networks
Evolving Objects that can be 3D-printed
Evolving the Neural Geometry and Plasticity of an ANN |
https://en.wikipedia.org/wiki/Grigori%20Perelman | Grigori Yakovlevich Perelman (; born 13 June 1966) is a Russian mathematician who is known for his contributions to the fields of geometric analysis, Riemannian geometry, and geometric topology. In 2005, Perelman abruptly quit his research job at the Steklov Institute of Mathematics, and in 2006 stated that he had quit professional mathematics, due to feeling disappointed over the ethical standards in the field. He lives in seclusion in Saint Petersburg, and has not accepted offers for interviews since 2006.
In the 1990s, partly in collaboration with Yuri Burago, Mikhael Gromov, and Anton Petrunin, he made contributions to the study of Alexandrov spaces. In 1994, he proved the soul conjecture in Riemannian geometry, which had been an open problem for the previous 20 years. In 2002 and 2003, he developed new techniques in the analysis of Ricci flow, and proved the Poincaré conjecture and Thurston's geometrization conjecture, the former of which had been a famous open problem in mathematics for the past century. The full details of Perelman's work were filled in and explained by various authors over the following several years.
In August 2006, Perelman was offered the Fields Medal for "his contributions to geometry and his revolutionary insights into the analytical and geometric structure of the Ricci flow", but he declined the award, stating: "I'm not interested in money or fame; I don't want to be on display like an animal in a zoo." On 22 December 2006, the scientific journal Science recognized Perelman's proof of the Poincaré conjecture as the scientific "Breakthrough of the Year", the first such recognition in the area of mathematics.
On 18 March 2010, it was announced that he had met the criteria to receive the first Clay Millennium Prize for resolution of the Poincaré conjecture. On 1 July 2010, he rejected the prize of one million dollars, saying that he considered the decision of the board of the Clay Institute to be unfair, in that his contribution to so |
https://en.wikipedia.org/wiki/Herbert%20Busemann | Herbert Busemann (12 May 1905 – 3 February 1994) was a German-American mathematician specializing in convex and differential geometry. He is the author of Busemann's theorem in Euclidean geometry and geometric tomography. He was a member of the Royal Danish Academy and a winner of the Lobachevsky Medal (1985), the first American mathematician to receive it. He was also a Fulbright scholar in New Zealand in 1952.
Biography
Herbert Busemann was born in Berlin to a well-to-do family. His father, Alfred Busemann, was a director of Krupp, where Busemann also worked for several years. He studied at University of Munich, Paris, and Rome. He defended his dissertation in University of Göttingen in 1931, where his advisor was Richard Courant. He remained in Göttingen as an assistant until 1933, when he escaped Nazi Germany to Copenhagen (he had a Jewish grandfather). He worked at the University of Copenhagen until 1936, when he left to the United States. There, he got married in 1939 and naturalized in 1943. He had temporary positions at the Institute for Advanced Study, Johns Hopkins University, Illinois Institute of Technology, Smith College, and eventually became a professor in 1947 at University of Southern California. He advanced to a distinguished professor in 1964, and continued working at USC until his retirement in 1970. Over the course of his work at USC, he supervised over 10 Ph.D. students.
He is the author of six monographs, two of which were translated into Russian.
He received Lobachevsky Medal in 1985 for his book The geometry of geodesics.
Busemann was also an active mathematical citizen. At different times, he was the president of the California chapter of Mathematical Association of America, and a member of the council of the American Mathematical Society.
Busemann was also an accomplished linguist; he was able to read and speak in French, German, Spanish, Italian, Russian, and Danish. He could also read Arabic, Latin, Greek and Swedish. |
https://en.wikipedia.org/wiki/Anode%20break%20excitation | Anode break excitation (ABE) is an electrophysiological phenomenon whereby a neuron fires action potentials in response to termination of a hyperpolarizing current.
When a hyperpolarizing current is applied across a membrane, the electrical potential across the membrane falls (becomes negative of the resting potential); this fall is followed by a drop in the threshold required for action potential (since the threshold is directly linked to the potential across the membrane - they rise and fall together).
ABE arises after the hyperpolarizing current is terminated: the potential across the cell rises rapidly with the absence of hyperpolarizing stimulus, but the action potential threshold stays at its lowered value. As a result, the potential is suprathreshold: sufficient to cause an action potential within the cell.
Further reading
External links
A description of anode break excitation.
See also
Action potential
Hodgkin–Huxley model
Neural accommodation
Electrophysiology |
https://en.wikipedia.org/wiki/Australian%20Tropical%20Rainforest%20Plants | Australian Tropical Rainforest Plants, also known as RFK, is an identification key giving details—including images, taxonomy, descriptions, range, habitat, and other information—of almost all species of flowering plants (i.e. trees, shrubs, vines, forbs, grasses and sedges, epiphytes, palms and pandans) found in tropical rainforests of Australia, with the exception of most orchids which are treated in a separate key called Australian Tropical Rainforest Orchids (see External links section). A key for ferns is under development. RFK is a project initiated by the Australian botanist Bernie Hyland.
History
The information system had its beginnings when Hyland started working for the Queensland Department of Forestry in the 1960s. It was during this time that he was tasked with the creation of an identification system for rainforest trees, but given no direction as to its format. Having little belief in single-access keys, he began work on creating a multi-access key (or polyclave) which would eventually become RFK. He discussed the project with Neil Harvey from the Department's Brisbane office and received considerable assistance from him. Harvey was able to take the raw data given him by Hyland and convert it (using a Fortran program he wrote himself) into a format that could be used to create a key using the then standard 80-column punched cards.
Early versions
These cards formed the basis of the key and were used in conjunction with a handbook. Edition 1 was published in 1972 and covered just 584 taxa, using 48 bark characteristics and 45 leaf characteristics to make an identification. Edition 2, published in 1983, expanded the number of taxa covered to 799, however this was almost the maximum capacity for the card-based system, and a new technology was required to expand it further.
Digitisation
In 1983 Hyland began a collaboration with Trevor Whiffin of La Trobe University, whom he had met in 1973, to expand the key even further. As well as planning for a compu |
https://en.wikipedia.org/wiki/Rotating%20disk%20electrode | In analytical chemistry, a rotating disk electrode (RDE) is a working electrode used in three-electrode systems for hydrodynamic voltammetry. The electrode rotates during experiments, inducing a flux of analyte to the electrode. These working electrodes are used in electrochemical studies when investigating reaction mechanisms related to redox chemistry, among other chemical phenomena. The more complex rotating ring-disk electrode can be used as a rotating disk electrode if the ring is left inactive during the experiment.
Structure
The electrode includes a conductive disk embedded in an inert non-conductive polymer or resin that can be attached to an electric motor that has very fine control of the electrode's rotation rate. The disk, like any working electrode, is generally made of a noble metal or glassy carbon, however any conductive material can be used based on specific needs.
Function
The disk's rotation is usually described in terms of angular velocity. As the disk turns, some of the solution described as the hydrodynamic boundary layer is dragged by the spinning disk and the resulting centrifugal force flings the solution away from the center of the electrode. Solution flows up, perpendicular to the electrode, from the bulk to replace the boundary layer. The sum result is a laminar flow of solution towards and across the electrode. The rate of the solution flow can be controlled by the electrode's angular velocity and modeled mathematically. This flow can quickly achieve conditions in which the steady-state current is controlled by the solution flow rather than diffusion. This is a contrast to still and unstirred experiments such as cyclic voltammetry where the steady-state current is limited by the diffusion of species in solution.
By running linear sweep voltammetry and other experiments at various rotation rates, different electrochemical phenomena can be investigated, including multi-electron transfer, the kinetics of a slow electron t |
https://en.wikipedia.org/wiki/CC%20chemokine%20receptors | CC chemokine receptors (or beta chemokine receptors) are integral membrane proteins that specifically bind and respond to cytokines of the CC chemokine family. They represent one subfamily of chemokine receptors, a large family of G protein-linked receptors that are known as seven transmembrane (7-TM) proteins since they span the cell membrane seven times. To date, ten true members of the CC chemokine receptor subfamily have been described. These are named CCR1 to CCR10 according to the IUIS/WHO Subcommittee on Chemokine Nomenclature.
Mechanism
The CC chemokine receptors all work by activating the G protein Gi.
Types
Overview table
CCR1
CCR1 was the first CC chemokine receptor identified and binds multiple inflammatory/inducible (see inducible gene) CC chemokines (including CCL4, CCL5, CCL6, CCL14, CCL15, CCL16 and CCL23). In humans, this receptor can be found on peripheral blood lymphocytes and monocytes. There is some suggestion that this chemokine receptor is restricted to memory T-cells within the lymphocyte pool. This receptor is also designated cluster of differentiation marker CD191.
CCR2
CCR2 can interact with CCL2, CCL8 and CCL16 and has been identified on the surface of monocytes, activated memory T cells, B cells, and basophils in humans, and also in peritoneal macrophages in mice. CCR2 is also designated CD192.
CCR3
CCR3 is a receptor for multiple inflammatory/inducible CC chemokines, including CCL11, CCL26, CCL7, CCL13, CCL15, CCL24 and CCL5 that attract eosinophils, and CCL28 that attracts B and T lymphocytes to mucosal tissues. It is most highly expressed in both eosinophils and basophils, but can also be found in Th1 and Th2 cells and airway epithelial cells. Thus CCR3 plays a role in allergic reactions. CCR3 is also known as CD193.
CCR4
CCR4 is expressed on Th2 T lymphocytes and is up-regulated by T cell receptor activation. However, some reports suggest a role for this receptor also in trafficking of dendritic cells. The CC chemokin |
https://en.wikipedia.org/wiki/Hardening%20%28computing%29 | In computer security, hardening is usually the process of securing a system by reducing its surface of vulnerability, which is larger when a system performs more functions; in principle a single-function system is more secure than a multipurpose one. Reducing available ways of attack typically includes changing default passwords, the removal of unnecessary software, unnecessary usernames or logins, and the disabling or removal of unnecessary services.
There are various methods of hardening Unix and Linux systems. This may involve, among other measures, applying a patch to the kernel such as Exec Shield or PaX; closing open network ports; and setting up intrusion detection systems, firewalls and intrusion-prevention systems. There are also hardening scripts and tools like Lynis, Bastille Linux, JASS for Solaris systems and Apache/PHP Hardener that can, for example, deactivate unneeded features in configuration files or perform various other protective measures.
Binary hardening
Binary hardening is a security technique in which binary files are analyzed and modified to protect against common exploits. Binary hardening is independent of compilers and involves the entire toolchain. For example, one binary hardening technique is to detect potential buffer overflows and to substitute the existing code with safer code. The advantage of manipulating binaries is that vulnerabilities in legacy code can be fixed automatically without the need for source code, which may be unavailable or obfuscated. Secondly, the same techniques can be applied to binaries from multiple compilers, some of which may be less secure than others.
Binary hardening often involves the non-deterministic modification of control flow and instruction addresses so as to prevent attackers from successfully reusing program code to perform exploits. Common hardening techniques are:
Buffer overflow protection
Stack overwriting protection
Position independent executables and address space layout randomi |
https://en.wikipedia.org/wiki/Positive%20linear%20functional | In mathematics, more specifically in functional analysis, a positive linear functional on an ordered vector space is a linear functional on so that for all positive elements that is it holds that
In other words, a positive linear functional is guaranteed to take nonnegative values for positive elements. The significance of positive linear functionals lies in results such as Riesz–Markov–Kakutani representation theorem.
When is a complex vector space, it is assumed that for all is real. As in the case when is a C*-algebra with its partially ordered subspace of self-adjoint elements, sometimes a partial order is placed on only a subspace and the partial order does not extend to all of in which case the positive elements of are the positive elements of by abuse of notation. This implies that for a C*-algebra, a positive linear functional sends any equal to for some to a real number, which is equal to its complex conjugate, and therefore all positive linear functionals preserve the self-adjointness of such This property is exploited in the GNS construction to relate positive linear functionals on a C*-algebra to inner products.
Sufficient conditions for continuity of all positive linear functionals
There is a comparatively large class of ordered topological vector spaces on which every positive linear form is necessarily continuous.
This includes all topological vector lattices that are sequentially complete.
Theorem Let be an Ordered topological vector space with positive cone and let denote the family of all bounded subsets of
Then each of the following conditions is sufficient to guarantee that every positive linear functional on is continuous:
has non-empty topological interior (in ).
is complete and metrizable and
is bornological and is a semi-complete strict -cone in
is the inductive limit of a family of ordered Fréchet spaces with respect to a family of positive linear maps where for all where is the positive cone |
https://en.wikipedia.org/wiki/Enciklopedio%20Kalblanda | () was the first online encyclopedia written in the Esperanto language. It was founded on January 11, 1996 by Stephen Kalb, who was the general editor. The encyclopedia contained 139 articles linked to 85 other themes. The text of the encyclopedia (though not the pictures) is under the GFDL.
In December 2001, Kalb donated his 139 articles to the Esperanto Wikipedia, to be expanded. It is linked on as . He now contributes directly to .
Imported articles |
https://en.wikipedia.org/wiki/OIC%20Computer%20Emergency%20Response%20Team | The OIC Computer Emergency Response Team (; ), commonly known as OIC-CERT, is a computer emergency response team and one of the 17 affiliated organs of the Organisation of Islamic Cooperation. Focused on global cybersecurity in the 27 member and non-member states, it is considered the world's third-largest computer emergency response team coordinated by the 27 countries. The OIC-CERT is primarily focused on providing emergency support in cyber resilience with global collaboration with its associated members and information security organizations. It also encourages member states to implement cybersecurity policies by their respective CERTs.
Chaired by CyberSecurity Malaysia, a national cybersecurity agency, it also serves as the Secretariat of OIC-CERT. Huawei became the first multinational technology corporation to sign the OIC-CERT membership in 2021. Its membership is sponsored by the UAE Computer Emergency Response Team (aeCERT). OIC-CERT maintains a global information and communications technology ecosystem and assisted nations in preventing cyberattack challenges.
History
OIC Computer Emergency Response Team was established by adopting a resolution INF-36/2 in May 2009 by the OIC Council of Foreign Ministers in its 36th session held in Damascus, Syria. The council of foreign affairs granted OIC-CERT the status of an affiliated institution in the same year.
Code of Ethics
Code of Ethics are the fundamental elements of the organisation that determine the status, cybercrime behaviour and membership by its Steering Committee. It regulates the information security organizations and the member states under four Codes of Ethics.
Objectives
Established for global cooperation between the cybersecurity organisation within the framework of the Charter of the Organisation of Islamic Cooperation, its main activities are focused on promoting and building the relationship between the member states in cybersecurity sector, in addition to exchanging information and mini |
https://en.wikipedia.org/wiki/Diagnostic%20board | In electronic systems a diagnostic board is a specialized device with diagnostic circuitry on a printed circuit board that connects to a computer or other electronic equipment replacing an existing module, or plugging into an expansion card slot.
A multi-board electronic system such as a computer comprises multiple printed circuit boards or cards connected via connectors. When a fault occurs in the system, it is sometimes possible to isolate or identify the fault by replacing one of the boards with a diagnostic board. A diagnostic board can range from extremely simple to extremely sophisticated.
Simple standard diagnostic plug-in boards for computers are available that display numeric codes to assist in identifying issues detected during the power-on self-test executed automatically during system startup.
Dummy board
A dummy board provides a minimal interface. This type of diagnostic board in intended to confirm that the interface is correctly implemented. For example, a PC motherboard manufacturer can test PCI functionality of a PC motherboard by connecting a dummy PCI board into each PCI slot on the motherboard
Extender board
An extender board (or board extender, card extender, extender card) is a simple circuit board that interposes between a card cage backplane and the circuit board of interest to physically 'extend' the circuit board of interest out from the card cage allowing access to both sides of the circuit board to connect diagnostic equipment such as an oscilloscope or systems analyzer. For example, a PCI extender board can be plugged into a PCI slot on a computer motherboard, and then a PCI card connected to the extender board to 'extend' the board into free space for access. This approach was common in the 1970s and 1980s particularly on S-100 bus systems.
The concept can become unworkable when signal timing is affected by the length of the signal paths on the diagnostic board, as well as introducing Radio Frequency Interference (RFI) into the ci |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.