source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Mirror%20symmetry%20conjecture
In mathematics, mirror symmetry is a conjectural relationship between certain Calabi–Yau manifolds and a constructed "mirror manifold". The conjecture allows one to relate the number of rational curves on a Calabi-Yau manifold (encoded as Gromov–Witten invariants) to integrals from a family of varieties (encoded as period integrals on a variation of Hodge structures). In short, this means there is a relation between the number of genus algebraic curves of degree on a Calabi-Yau variety and integrals on a dual variety . These relations were original discovered by Candelas, de la Ossa, Green, and Parkes in a paper studying a generic quintic threefold in as the variety and a construction from the quintic Dwork family giving . Shortly after, Sheldon Katz wrote a summary paper outlining part of their construction and conjectures what the rigorous mathematical interpretation could be. Constructing the mirror of a quintic threefold Originally, the construction of mirror manifolds was discovered through an ad-hoc procedure. Essentially, to a generic quintic threefold there should be associated a one-parameter family of Calabi-Yau manifolds which has multiple singularities. After blowing up these singularities, they are resolved and a new Calabi-Yau manifold was constructed. which had a flipped Hodge diamond. In particular, there are isomorphisms but most importantly, there is an isomorphism where the string theory (the A-model of ) for states in is interchanged with the string theory (the B-model of ) having states in . The string theory in the A-model only depended upon the Kahler or symplectic structure on while the B-model only depends upon the complex structure on . Here we outline the original construction of mirror manifolds, and consider the string-theoretic background and conjecture with the mirror manifolds in a later section of this article. Complex moduli Recall that a generic quintic threefold in is defined by a homogeneous polynomial of degr
https://en.wikipedia.org/wiki/List%20of%20amateur%20radio%20repeater%20sites
This is a list of repeater sites for amateur radio in Germany. It includes towers (e.g. CN Tower and Bremen TV tower), hills, mountains and other locations. List See also Deutscher Amateur-Radio-Club
https://en.wikipedia.org/wiki/Entoloma%20albidum
Entoloma albidum is a poisonous mushroom found in North America. See also List of Entoloma species
https://en.wikipedia.org/wiki/Pinatuzumab%20vedotin
Pinatuzumab vedotin (INN; development codes DCDT2980S and FCU2703) is a monoclonal antibody designed for the treatment of B-cell malignancies. This drug was developed by Genentech/Roche.
https://en.wikipedia.org/wiki/List%20of%20bacterial%20vaginosis%20microbiota
Bacterial vaginosis is caused by an imbalance of the naturally occurring bacteria in the vagina. The normally predominant species of Lactobacilli are markedly reduced. This is the list of organisms that are found in the vagina that are associated with bacterial vaginosis, an infectious disease of the vagina caused by excessive growth of specific bacteria. The census and relationships among the microbiota are altered in BV resulting in a complex bacterial milieu. Some species have been identified relatively recently. Having infections with the listed pathogens increases the risk of acquiring other sexually transmitted infections including HIV/AIDS. Microbiota Actinobacteria spp Actinomyces naeslundii Aggregatibacter actinomycetemcomitans Anaerococcus spp Atopobium vaginae Bacteroides ureolyticus Bifidobacterium spp Clostridiales spp Collinsella aerofaciens Eggerthella lenta Eggerthella spp Eubacterium spp Fusobacterium nucleatum Gardnerella vaginalis Leptotrichia amnionii Leptotrichia spp Megasphaera spp Mobiluncus spp Mycoplasma hominis Mycoplasma parvum Peptococcus spp Peptoniphilus spp Peptostreptococcus anaerobius Peptostreptococcus spp Porphyromonas gingivalis Prevotella bivia spp Prevotella disiens Prevotella intermedia Slackia spp Sneathia sanguinegens Streptococcus viridans Tannerella forsythia Treponema denticola Ureaplasma urealyticum Veillonella parvula
https://en.wikipedia.org/wiki/Sagnac%20effect
The Sagnac effect, also called Sagnac interference, named after French physicist Georges Sagnac, is a phenomenon encountered in interferometry that is elicited by rotation. The Sagnac effect manifests itself in a setup called a ring interferometer or Sagnac interferometer. A beam of light is split and the two beams are made to follow the same path but in opposite directions. On return to the point of entry the two light beams are allowed to exit the ring and undergo interference. The relative phases of the two exiting beams, and thus the position of the interference fringes, are shifted according to the angular velocity of the apparatus. In other words, when the interferometer is at rest with respect to a nonrotating frame, the light takes the same amount of time to traverse the ring in either direction. However, when the interferometer system is spun, one beam of light has a longer path to travel than the other in order to complete one circuit of the mechanical frame, and so takes longer, resulting in a phase difference between the two beams. Georges Sagnac set up this experiment in 1913 in an attempt to prove the existence of the aether that Einstein's theory of special relativity makes superfluous. A gimbal mounted mechanical gyroscope remains pointing in the same direction after spinning up, and thus can be used as a rotational reference for an inertial navigation system. With the development of so-called laser gyroscopes and fiber optic gyroscopes based on the Sagnac effect, bulky mechanical gyroscopes can be replaced by those with no moving parts in many modern inertial navigation systems. A conventional gyroscope relies on the principle of conservation of angular momentum whereas the sensitivity of the ring interferometer to rotation arises from the invariance of the speed of light for all inertial frames of reference. Description and operation Typically three or more mirrors are used, so that counter-propagating light beams follow a closed path such as a
https://en.wikipedia.org/wiki/Printed%20circuit%20board%20milling
Printed circuit board milling (also: isolation milling) is the milling process used for removing areas of copper from a sheet of printed circuit board (PCB) material to recreate the pads, signal traces and structures according to patterns from a digital circuit board plan known as a layout file. Similar to the more common and well known chemical PCB etch process, the PCB milling process is subtractive: material is removed to create the electrical isolation and ground planes required. However, unlike the chemical etch process, PCB milling is typically a non-chemical process and as such it can be completed in a typical office or lab environment without exposure to hazardous chemicals. High quality circuit boards can be produced using either process. In the case of PCB milling, the quality of a circuit board is chiefly determined by the system's true, or weighted, milling accuracy and control as well as the condition (sharpness, temper) of the milling bits and their respective feed/rotational speeds. By contrast, in the chemical etch process, the quality of a circuit board depends on the accuracy and/or quality of the mask used to protect the copper from the chemicals and the state of the etching chemicals. Advantages PCB milling has advantages for both prototyping and some special PCB designs. The biggest benefit is that one does not have to use chemicals to produce PCBs. When creating a prototype, outsourcing a board takes time. An alternative is to make a PCB in-house. Using the wet process, in-house production presents problems with chemicals and disposing thereof. High-resolution boards using the wet process are hard to achieve and still, when done, one still has to drill and eventually cut out the PCB from the base material. CNC machine prototyping can provide a fast-turnaround board production process without the need for wet processing. If a CNC machine is already used for drilling, this single machine could carry out both parts of the process, drilling and
https://en.wikipedia.org/wiki/After%20the%20Storm%20%28Ai%20song%29
"After the Storm" is a song recorded by Japanese-American singer-songwriter Ai featuring Malaysian-Australian singer Che'Nelle. The song is produced by Fifty1 Fifty and Ai, was released as a promotional single on May 22, 2013, by EMI Records Japan from her tenth studio album, Moriagaro. The song was used for the Japanese release of the Hong Kong martial arts film The Grandmaster. "After the Storm" is a pop ballad and is Ai's first promotional single to be recorded fully in English. Background Ai previously released "Voice" in early 2013, serving as the lead single for her then-upcoming tenth studio album. The second single, "Dear Mama" was issued digitally in April 2013. In May 2013, Ai announced she would be releasing a song for The Grandmaster. Along with this announcement, she announced the title of her tenth studio album, Moriagaro, and that "After the Storm" would be included on the album. Regarding being featured on the song, Che'Nelle commented, "I was thrilled when I heard about the duet from Ai because my wish came true. I've been saying that I want to collaborate with her for years!" Track listing Digital download and streaming "After the Storm" — 3:40 Chart performance "After the Storm" debuted at number 57 on the Billboard Japan Hot 100 for the week of May 26, 2013. It peaked at number 40 for the week of June 5, 2013. The song dropped to number 69 before falling off the chart, charting for three weeks. Release history
https://en.wikipedia.org/wiki/Vital%20rates
Vital rates refer to how fast vital statistics change in a population (usually measured per 1000 individuals). There are 2 categories within vital rates: crude rates and refined rates. Crude rates measure vital statistics in a general population (overall change in births and deaths per 1000). Refined rates measure the change in vital statistics in a specific demographic (such as age, sex, race, etc.). Marriage rates The national marriage rates since 1972,in the US have fallen by almost 50% at six people per 1000. According to Iran Index and National Organization for Civil Registration of Iran Iranian divorce rate is in the red at its record highest level since 1979, divorce quotas were introduced to curb enthuitasim.
https://en.wikipedia.org/wiki/Section%20%28biology%29
In biology a section () is a taxonomic rank that is applied differently in botany and zoology. In botany Within flora (plants), 'section' refers to a botanical rank below the genus, but above the species: Domain > Kingdom > Division > Class > Order > Family > Tribe > Genus > Subgenus > Section > Subsection > Species In zoology Within fauna (animals), 'section' refers to a zoological rank below the order, but above the family: Domain > Kingdom > Phylum > Class > Order > Section > Family > Tribe > Genus > Species In bacteriology The International Code of Nomenclature for Bacteria states that the Section rank is an informal one, between the subgenus and species (as in botany).
https://en.wikipedia.org/wiki/Rose%20Rand
Rose Rand (June 14, 1903 – July 28, 1980) was an Austrian-American logician and philosopher. She was a member of the Vienna Circle. Life and work Rose (Rozalia) Rand was born in Lemberg in the Austrian crown land of Galicia (today, Lviv, Ukraine). After her family moved to Austria she studied at the Polish Gymnasium in Vienna. In 1924 she enrolled in Vienna University, her teachers included Heinrich Gomperz, Moritz Schlick, and Rudolf Carnap. She graduated with her first degree in 1928. During her post-graduation years, she remained in contact with Vienna Circle colleagues such as Schlick. As a PhD candidate, Rand participated regularly in the Vienna Circle discussions, and kept records of these discussions, she was most active in the Vienna Circle from 1930 to 1935. Between 1930 and 1937 she worked, and took part in research, at the Psychiatric-neurological Clinic of the Vienna university. She also earned money by tutoring students, giving adult education classes, and translating Polish articles on logic. In 1937 her doctoral thesis on Kotarbiński's philosophy was approved and she completed her PhD viva. In 1938, on the same day as she completed her final doctoral exam, she was awarded her PhD. As a Jew however she was barred from her profession. Rand, unemployed and of Jewish descent, suffered great difficulties in pre-World War II Vienna. In 1939, with the assistance of Susan Stebbing, she finally emigrated to London as a Jew without nationality. After a period of time in England in which she worked as a nurse she was admitted as "distinguished foreigner" at the faculty of Moral Science at Cambridge University. There she attended the seminars of Ludwig Wittgenstein. In 1943 she lost her privileges and had to work at a metal factory, and teach night classes in German and psychology in the Luton Technical College and Tottenham Technical College. Between 1943 and 1950 she also worked in practical engineering. Karl Popper helped her to get a small research g
https://en.wikipedia.org/wiki/Sensory%20neuroscience
Sensory neuroscience is a subfield of neuroscience which explores the anatomy and physiology of neurons that are part of sensory systems such as vision, hearing, and olfaction. Neurons in sensory regions of the brain respond to stimuli by firing one or more nerve impulses (action potentials) following stimulus presentation. How is information about the outside world encoded by the rate, timing, and pattern of action potentials? This so-called neural code is currently poorly understood and sensory neuroscience plays an important role in the attempt to decipher it. Looking at early sensory processing is advantageous since brain regions that are "higher up" (e.g. those involved in memory or emotion) contain neurons which encode more abstract representations. However, the hope is that there are unifying principles which govern how the brain encodes and processes information. Studying sensory systems is an important stepping stone in our understanding of brain function in general. Typical experiments A typical experiment in sensory neuroscience involves the presentation of a series of relevant stimuli to an experimental subject while the subject's brain is being monitored. This monitoring can be accomplished by noninvasive means such as functional magnetic resonance imaging (fMRI) or electroencephalography (EEG), or by more invasive means such as electrophysiology, the use of electrodes to record the electrical activity of single neurons or groups of neurons. fMRI measures changes in blood flow which related to the level of neural activity and provides low spatial and temporal resolution, but does provide data from the whole brain. In contrast, Electrophysiology provides very high temporal resolution (the shapes of single spikes can be resolved) and data can be obtained from single cells. This is important since computations are performed within the dendrites of individual neurons. Single neuron experiments In most of the central nervous system, neurons communicate ex
https://en.wikipedia.org/wiki/Frank%20Wilson%20Warner
Frank Wilson Warner III (born March 2 1938 in Pittsfield, Massachusetts) is an American mathematician, specializing in differential geometry. Education and career Warner graduated in 1959 with a bachelor's degree from Pennsylvania State University and in 1963 with a Ph.D. in mathematics from the Massachusetts Institute of Technology. His thesis, written under the supervision of Isadore M. Singer, is entitled Conjugate Locus of a Riemannian Manifold. At the University of California, Berkeley, Warner was an assistant professor from 1965 to 1968. At the University of Pennsylvania, he became an associate professor in 1968 and a full professor in 1973. He was from 1995 to 1997 the deputy dean of the University of Pennsylvania School of Arts and Sciences. In 2000, he retired as professor emeritus. In the 1970s he and Jerry Kazdan, as collaborators, made important contributions to the theory of Riemannian manifolds with prescribed scalar curvature. They proved in 1975 that any smooth function can be realized as a scalar curvature if it becomes negative somewhere on the manifold. Their further research dealt with conjugate points on Riemannian manifolds. Warner was a Guggenheim Fellow for the academic year 1976–1977. He was elected in 1994 a Fellow of the American Association for the Advancement of Science. Selected publications Articles Books
https://en.wikipedia.org/wiki/Tape%20recorder
An audio tape recorder, also known as a tape deck, tape player or tape machine or simply a tape recorder, is a sound recording and reproduction device that records and plays back sounds usually using magnetic tape for storage. In its present-day form, it records a fluctuating signal by moving the tape across a tape head that polarizes the magnetic domains in the tape in proportion to the audio signal. Tape-recording devices include the reel-to-reel tape deck and the cassette deck, which uses a cassette for storage. The use of magnetic tape for sound recording originated around 1930 in Germany as paper tape with oxide lacquered to it. Prior to the development of magnetic tape, magnetic wire recorders had successfully demonstrated the concept of magnetic recording, but they never offered audio quality comparable to the other recording and broadcast standards of the time. This German invention was the start of a long string of innovations that have led to present-day magnetic tape recordings. Magnetic tape revolutionized both the radio broadcast and music recording industries. It gave artists and producers the power to record and re-record audio with minimal loss in quality as well as edit and rearrange recordings with ease. The alternative recording technologies of the era, transcription discs and wire recorders, could not provide anywhere near this level of quality and functionality. Since some early refinements improved the fidelity of the reproduced sound, magnetic tape has been the highest quality analog recording medium available. As of the first decade of the 21st century, analog magnetic tape has been largely replaced by digital recording technologies. History Wax strip recorder The earliest known audio tape recorder was a non-magnetic, non-electric version invented by Alexander Graham Bell's Volta Laboratory and patented in 1886 (). It employed a strip of wax-covered paper that was coated by dipping it in a solution of beeswax and paraffin and then ha
https://en.wikipedia.org/wiki/Implicit%20cognition
Implicit cognition refers to cognitive processes that occur outside conscious awareness or conscious control. This includes domains such as learning, perception, or memory which may influence a person's behavior without their conscious awareness of those influences. Overview Implicit cognition is everything one does and learns unconsciously or without any awareness that one is doing it. An example of implicit cognition could be when a person first learns to ride a bike: at first they are aware that they are learning the required skills. After having stopped for many years, when the person starts to ride the bike again they do not have to relearn the motor skills required, as their implicit knowledge of the motor skills takes over and they can just start riding the bike as if they had never stopped. In other words, they do not have to think about the actions that they are performing in order to ride the bike. It can be seen from this example that implicit cognition is involved with many of the different mental activities and everyday situations in people's daily lives. There are many processes in which implicit memory works, which include learning, our social cognition, and our problem-solving skills. History Implicit cognition was first discovered in the year of 1649 by Descartes in his Passions of the Soul. He said in one of his writings that he saw that unpleasant childhood experiences remain imprinted in a child's brain until its death without any conscious memory of it remaining. Even though this idea was never accepted by any of his peers, in 1704 Gottfried Wilhelm Leibniz in his New Essays Concerning Human Understanding stressed the importance of unconscious perceptions which he said were the ideas that we are not consciously aware of yet still influence people's behavior. He claimed that people have residual effects of prior impressions without any remembrance of them. In 1802 French philosopher Maine de Biran in his The Influence of Habit on the Faculty of
https://en.wikipedia.org/wiki/Anti-nRNP
Anti-nRNP is a type of antibody. They are autoantibodies against some ribonucleoproteins. Anti-nRNP antibodies can be elevated in mixed connective tissue disease. See also snRNP70
https://en.wikipedia.org/wiki/Mast%20cell%20activation%20syndrome
Mast cell activation syndrome (MCAS) is a term referring to one of two types of mast cell activation disorder (MCAD); the other type is idiopathic MCAD. MCAS is an immunological condition in which mast cells inappropriately and excessively release chemical mediators, resulting in a range of chronic symptoms, sometimes including anaphylaxis or near-anaphylaxis attacks. Primary symptoms include cardiovascular, dermatological, gastrointestinal, neurological and respiratory problems. MCAS is an umbrella term that describes a set of symptoms; it is not a specific diagnosis. Multiple diagnostic schemes for MCAS have been proposed. MCAS has been increasingly over-diagnosed or misdiagnosed. Signs and symptoms MCAS is an inflammatory condition that affects multiple systems. MCAS can present with a wide range of symptoms in multiple body systems, these symptoms may range from digestive discomfort to chronic pain, mental issues as well as an anaphylactic reaction. Symptoms typically wax and wane over time, varying in severity and duration. Many signs and symptoms are the same as those for mastocytosis, because both conditions result in too many mediators released by mast cells. It has many overlapping characteristics with recurrent idiopathic anaphylaxis, although there are distinguishing symptoms, specifically hives and angioedema. The condition may be mild until exacerbated by stressful life events, or symptoms may develop and slowly trend worse with time. MCAS symptoms are common in long COVID. Common symptoms include: Dermatological flushing hives easy bruising either a reddish or a pale complexion itchiness burning feeling dermatographism Cardiovascular lightheadedness, dizziness, non-cardiac chestpain, presyncope, syncope, arrhythmia, tachycardia Gastrointestinal diarrhea and/or constipation, cramping, intestinal discomfort nausea, vomiting, acid reflux swallowing difficulty, throat tightness Neuropsychiatric brain fog headache fatigue/lethargy lac
https://en.wikipedia.org/wiki/Capillitium
Capillitium (pl. capillitia) is a mass of sterile fibers within a fruit body interspersed among spores. It is found in Mycetozoa (slime molds) and gasteroid fungi of the fungal subdivision Agaricomycotina. In the fungi, the form of the capillitia, including shape, size, branching patterns, presence or absence of slits or pores, thickness of the walls, and color, are features that can be used to identify certain species or genera.
https://en.wikipedia.org/wiki/Laser%20capture%20microdissection
Laser capture microdissection (LCM), also called microdissection, laser microdissection (LMD), or laser-assisted microdissection (LMD or LAM), is a method for isolating specific cells of interest from microscopic regions of tissue/cells/organisms (dissection on a microscopic scale with the help of a laser). Principle Laser-capture microdissection (LCM) is a method to procure subpopulations of tissue cells under direct microscopic visualization. LCM technology can harvest the cells of interest directly or can isolate specific cells by cutting away unwanted cells to give histologically pure enriched cell populations. A variety of downstream applications exist: DNA genotyping and loss of heterozygosity (LOH) analysis, RNA transcript profiling, cDNA library generation, proteomics discovery and signal-pathway profiling. The total time required to carry out this protocol is typically 1–1.5 h. Extraction A laser is coupled into a microscope and focuses onto the tissue on the slide. By movement of the laser by optics or the stage the focus follows a trajectory which is predefined by the user. This trajectory, also called element, is then cut out and separated from the adjacent tissue. After the cutting process, an extraction process has to follow if an extraction process is desired. More recent technologies utilize non-contact microdissection. There are several ways to extract tissue from a microscope slide with a histopathology sample on it. Press a sticky surface onto the sample and tear out. This extracts the desired region, but can also remove particles or unwanted tissue on the surface, because the surface is not selective. Melt a plastic membrane onto the sample and tear out. The heat is introduced, for example, by a red or infrared (IR) laser onto a membrane stained with an absorbing dye. As this adheres the desired sample onto the membrane, as with any membrane that is put close to the histopathology sample surface, there might be some debris extracted. Another
https://en.wikipedia.org/wiki/Television%20station
A television station is a set of equipment managed by a business, organisation or other entity such as an amateur television (ATV) operator, that transmits video content and audio content via radio waves directly from a transmitter on the earth's surface to any number of tuned receivers simultaneously. Overview Most often the term "television station" refers to a station which broadcasts structured content to an audience or it refers to the organization that operates the station. A terrestrial television transmission can occur via analog television signals or, more recently, via digital television signals. Television stations are differentiated from cable television or other video providers as their content is broadcast via terrestrial radio waves. A group of television stations with common ownership or affiliation are known as a TV network and an individual station within the network is referred to as O&O or affiliate, respectively. Because television station signals use the electromagnetic spectrum, which in the past has been a common, scarce resource, governments often claim authority to regulate them. Broadcast television systems standards vary around the world. Television stations broadcasting over an analog system were typically limited to one television channel, but digital television enables broadcasting via subchannels as well. Television stations usually require a broadcast license from a government agency which sets the requirements and limitations on the station. In the United States, for example, a television license defines the broadcast range, or geographic area, that the station is limited to, allocates the broadcast frequency of the radio spectrum for that station's transmissions, sets limits on what types of television programs can be programmed for broadcast and requires a station to broadcast a minimum amount of certain programs types, such as public affairs messages. Another form of television station is non-commercial educational (NCE) and
https://en.wikipedia.org/wiki/Allocative%20efficiency
Allocative efficiency is a state of the economy in which production is aligned with consumer preferences; in particular, the set of outputs is chosen so as to maximize the wellbeing of society. This is achieved if every good or service is produced up until the last unit provides a marginal benefit to consumers equal to the marginal cost of production. Description In economics, allocative efficiency entails production at the point on the production possibilities frontier that is optimal for society. In contract theory, allocative efficiency is achieved in a contract in which the skill demanded by the offering party and the skill of the agreeing party are the same. Resource allocation efficiency includes two aspects: At the macro aspect, it is the allocation efficiency of social resources, which is achieved through the economic system arrangements of the entire society. The micro aspect is the efficient use of resources, which can be understood as the production efficiency of the organization, which can be improved through innovation and progress within the organizations. Although there are different standards of evaluation for the concept of allocative efficiency, the basic principle asserts that in any economic system, choices in resource allocation produce both "winners" and "losers" relative to the choice being evaluated. The principles of rational choice, individual maximization, utilitarianism and market theory further suppose that the outcomes for winners and losers can be identified, compared, and measured. Under these basic premises, the goal of attaining allocative efficiency can be defined according to some principles where some allocations are subjectively better than others. For example, an economist might say that a policy change is an allocative improvement as long as those who benefit from the change (winners) gain more than the losers lose (see Kaldor–Hicks efficiency). An allocatively efficient economy produces an "optimal mix" of commodit
https://en.wikipedia.org/wiki/Cloud9%20IDE
Cloud9 IDE is an Online IDE (integrated development environment), published as open source from version 2.0, until version 3.0. It supports multiple programming languages, including C, C++, PHP, Ruby, Perl, Python, JavaScript with Node.js, and Go. It is written almost entirely in JavaScript, and uses Node.js on the back-end. The editor component uses Ace. Cloud9 was acquired by Amazon in July 2016 and became a part of Amazon Web Services (AWS). New users may only use the Cloud9 service through an AWS account. From March 2018, existing accounts on Cloud9's original website could be used, but new accounts could not be created. On April 2, 2019, Cloud9 announced that users would not be able to create new and use old workspaces on c9.io (aka original version, not Amazon Cloud9) after June 30, 2019. Features Some of the features of an older version included automatic code completion for snippets and identifiers, parenthesis and bracket matching, a debugger, and a gutter where line numbers and errors or warnings would be displayed. Cloud9 IDE also offered syntax highlighting for various languages, such as C#, C/C++, Java, JavaScript, Python, and Ruby. Particularly for JavaScript, it offered real-time language analysis, code reformatting, and refactoring facilities. It was also extensible and customizable, allowing users to change themes, plugins, and key-bindings to make their preferred setup. As an online IDE, it allowed simultaneous editing from multiple users by offering multiple cursors, and could support the creation of private and public projects. Users were also able to drag-and-drop files into projects and use tabs to manage multiple files. Projects could also be integration with Mercurial and Git repositories, as well as collaboration platforms like GitHub and Bitbucket. Other features: Built-in terminal, with npm and basic Unix commands Built in Image Editor Support for the following code repositories: FTP servers Support for deployment to: Herok
https://en.wikipedia.org/wiki/Osgood%27s%20lemma
In mathematics, Osgood's lemma, introduced by , is a proposition in complex analysis. It states that a continuous function of several complex variables that is holomorphic in each variable separately is holomorphic. The assumption that the function is continuous can be dropped, but that form of the lemma is much harder to prove and is known as Hartogs' theorem. There is no analogue of this result for real variables. If we assume that a function is globally continuous and separately differentiable on each variable (all partial derivatives exist everywhere), it is not true that will necessarily be differentiable. A counterexample in two dimensions is given by If in addition we define , this function is everywhere continuous and has well-defined partial derivatives in and everywhere (also at the origin), but is not differentiable at the origin.
https://en.wikipedia.org/wiki/Basilar%20part%20of%20pons
The basilar part of pons, also known as basis pontis, is the ventral part of the pons; the dorsal part is known as the pontine tegmentum. The basilar pons makes up two thirds of the pons within the brainstem. It has a ridged appearance with a shallow groove at the midline. This groove is called the basilar sulcus and is covered by the basilar artery, which feeds into the Circle of Willis and provides blood supply to the brainstem and cerebellum. The basilar pons has this kind of appearance due to the fibers that come out of the pons and enter the cerebellum. This part of the brainstem contains fibers from the corticospinal tract (a descending pathway for neurons to reach other structures in the body), pontine nuclei, and transverse pontine fibers. The corticospinal tract carries neurons from the primary motor cortex in the brain to the spinal cord, aiding in voluntary motor movement of the body. In addition to passing through the basilar pons, corticospinal tract fibers go through other structures of the brainstem, such as the internal capsule and the crus cerebri. An integral part of the basilar pons is the pontine nuclei. The pontine nuclei are responsible for projecting axons that go to the opposite cerebellar hemisphere through the middle cerebellar peduncle. Doing this makes the axons change into the transverse pontine fibers. The fibers of the pontine nuclei are all important to motor function, including fiber bundles such as the corticospinal fibers and corticopontine-pontocerebellar system. Specifically, the basilar pons contains all the corticofugal fibers, which include the corticospinal, corticobulbar (or corticonuclear), and corticopontine fibers. The basal pontine nuclei provides the most information to the cerebellum. These pontine nuclei are integral in helping the basilar pons carry information from the cerebral cortex to the cerebellum. The basilar pons is able to do this via the corticopontine fibers that it receives. Once the information passes
https://en.wikipedia.org/wiki/Damerau%E2%80%93Levenshtein%20distance
In information theory and computer science, the Damerau–Levenshtein distance (named after Frederick J. Damerau and Vladimir I. Levenshtein) is a string metric for measuring the edit distance between two sequences. Informally, the Damerau–Levenshtein distance between two words is the minimum number of operations (consisting of insertions, deletions or substitutions of a single character, or transposition of two adjacent characters) required to change one word into the other. The Damerau–Levenshtein distance differs from the classical Levenshtein distance by including transpositions among its allowable operations in addition to the three classical single-character edit operations (insertions, deletions and substitutions). In his seminal paper, Damerau stated that in an investigation of spelling errors for an information-retrieval system, more than 80% were a result of a single error of one of the four types. Damerau's paper considered only misspellings that could be corrected with at most one edit operation. While the original motivation was to measure distance between human misspellings to improve applications such as spell checkers, Damerau–Levenshtein distance has also seen uses in biology to measure the variation between protein sequences. Definition To express the Damerau–Levenshtein distance between two strings and , a function is defined, whose value is a distance between an prefix (initial substring) of string and a prefix of . The restricted distance function is defined recursively as: where is the indicator function equal to 0 when and equal to 1 otherwise. Each recursive call matches one of the cases covered by the Damerau–Levenshtein distance: corresponds to a deletion (from a to b), corresponds to an insertion (from a to b), corresponds to a match or mismatch, depending on whether the respective symbols are the same, corresponds to a transposition between two successive symbols. The Damerau–Levenshtein distance between and is then
https://en.wikipedia.org/wiki/Dislocation%20creep
Dislocation creep is a deformation mechanism in crystalline materials. Dislocation creep involves the movement of dislocations through the crystal lattice of the material, in contrast to diffusion creep, in which diffusion (of vacancies) is the dominant creep mechanism. It causes plastic deformation of the individual crystals, and thus the material itself. Dislocation creep is highly sensitive to the differential stress on the material. At low temperatures, it is the dominant deformation mechanism in most crystalline materials. Some of the mechanisms described below are speculative, and either cannot be or have not been verified by experimental microstructural observation. Principles Dislocations in crystals Dislocation creep takes place due to the movement of dislocations through a crystal lattice. Each time a dislocation moves through a crystal, part of the crystal shifts by one lattice point along a plane, relative to the rest of the crystal. The plane that separates the shifted and unshifted regions along which the movement takes place is the slip plane. To allow for this movement, all ionic bonds along the plane must be broken. If all bonds were broken at once, this would require so much energy that dislocation creep would only be possible in theory. When it is assumed that the movement takes place step by step, the breaking of bonds is immediately followed by the creation of new ones and the energy required is much lower. Calculations of molecular dynamics and analysis of deformed materials have shown that deformation creep can be an important factor in deformation processes. By moving a dislocation step by step through a crystal lattice, a linear lattice defect is created between parts of the crystal lattice. Two types of dislocations exist: edge and screw dislocations. Edge dislocations form the edge of an extra layer of atoms inside the crystal lattice. Screw dislocations form a line along which the crystal lattice jumps one lattice point. In both cases
https://en.wikipedia.org/wiki/Marine%20Stewardship%20Council
The Marine Stewardship Council (MSC) is a non-profit organisation which aims to set standards for sustainable fishing. Fisheries that wish to demonstrate they are well-managed and sustainable compared to the MSC's standards are assessed by a team of Conformity Assessment Bodies (CABs). The mission of the MSC is to use its ecolabel, for which the MSC receives royalties for licensing it to products, and fishery certification program to recognise and reward sustainable fishing practices. The MSC has faced criticism in the past, mainly centering on its close ties to the fishing industry and conflict of interest stemming from royalties received by the industry for its certification label. Contribution to changes in the oceans When buyers choose MSC-certified fish, well-managed fisheries are rewarded for sustainable practices. In turn, the growing market for certified sustainable seafood generates a powerful incentive for other fisheries to demonstrate they are fishing sustainably or to improve their performance so that they too can be eligible for MSC certification. In this way, the MSC program helps to harness market forces to incentivise positive environmental change. Environmental benefits A study commissioned and funded by MSC found that MSC-certified fisheries show improvements that deliver benefits to the marine environment. Benefits included: increased stocks; improved management of stocks; reduced bycatch; expansion of environmentally protected areas; and increased knowledge about ecosystem impacts amongst fishers. Key facts and figures The MSC was founded in 1996, inspired by the Grand Banks cod fishery collapse. In 1999 it became independent of its founding partners, the World Wide Fund for Nature (WWF) and Unilever. MSC has a staff of around 140 spread across the headquarters in London, regional offices in London, Seattle, Singapore and Sydney, and local offices in Edinburgh, Berlin, The Hague, Paris, Cape Town, Tokyo, Reykjavik, and the Baltic regio
https://en.wikipedia.org/wiki/Atmel%20AVR%20instruction%20set
The Atmel AVR instruction set is the machine language for the Atmel AVR, a modified Harvard architecture 8-bit RISC single chip microcontroller which was developed by Atmel in 1996. The AVR was one of the first microcontroller families to use on-chip flash memory for program storage. Processor registers There are 32 general-purpose 8-bit registers, R0–R31. All arithmetic and logic operations operate on those registers; only load and store instructions access RAM. A limited number of instructions operate on 16-bit register pairs. The lower-numbered register of the pair holds the least significant bits and must be even-numbered. The last three register pairs are used as pointer registers for memory addressing. They are known as X (R27:R26), Y (R29:R28) and Z (R31:R30). Postincrement and predecrement addressing modes are supported on all three. Y and Z also support a six-bit positive displacement. Instructions which allow an immediate value are limited to registers R16–R31 (8-bit operations) or to register pairs R25:R24–R31:R30 (16-bit operations ADIW and SBIW). Some variants of the MUL operation are limited to eight registers, R16 through R23. Special purpose registers In addition to these 32 general-purpose registers, the CPU has a few special-purpose registers: PC: 16- or 22-bit program counter SP: 8- or 16-bit stack pointer SREG: 8-bit status register RAMPX, RAMPY, RAMPZ, RAMPD and EIND: 8-bit segment registers that are prepended to 16-bit addresses in order to form 24-bit addresses; only available in parts with large address spaces. Status register The status register bits are: C Carry flag. This is a borrow flag on subtracts. The INC and DEC instructions do not modify the carry flag, so they may be used to loop over multi-byte arithmetic operations. Z Zero flag. Set to 1 when an arithmetic result is zero. N Negative flag. Set to a copy of the most significant bit of an arithmetic result. V Overflow flag. Set in case of two's complement overflow.
https://en.wikipedia.org/wiki/VESA%20Enhanced%20Video%20Connector
The VESA Enhanced Video Connector (EVC) is a VESA standard that was intended to reduce the number of cables around a computer by incorporating video, audio, FireWire and USB into a single cable system, terminating in a 35-pin Molex MicroCross connector. The intent was to make the monitor the central point of connection. The EVC physical standard was ratified in November 1994, and the pinout and signaling standard followed one year later. History The Video Electronic Standards Association (VESA) began working on a successor to the VGA connector for analog video and released the EVC physical standard in November 1994, followed by a pinout and signal standard in November 1995. After the P&D standard was released in June 1997, revisions to the EVC standards were issued in November 1997. EVC was used for few products, perhaps most commonly found on the HP9000 B/C/J-class workstations introduced in 1997. Although EVC did not find favour with computer manufacturers, it evolved into the somewhat more popular VESA Plug and Display (P&D) standard using a physically identical 35-pin interface with a different shell, capable of transmitting video (both analog and digital) and data. Digital Visual Interface (DVI, 1999), essentially a modified version of P&D stripped of the data signals with higher maximum resolution by adding a second, three-pair digital video channel, would become the industry standard for digital video connections and achieved widespread implementation. Technical A VESA EVC connector is capable of carrying analog video (VGA-based) output, video input (composite or S-video), FireWire, analog stereo audio (input and output), and USB signals. Analog video is carried by the C1–C4 pins surrounding the C5 crossed ground plane; this was a development of the 13W3 connector, which was typically fitted to high-end workstations and had three miniature coaxial terminals embedded in the connector. The quasi-coaxial "MicroCross" developed by Molex provided comparable shi
https://en.wikipedia.org/wiki/Inter-flow%20interference
In wireless routing, inter-flow interference refers to the interference between neighboring routers competing for the same busy channel. The inter-flow interference routing metric is incorporated in MIC and iAWARE wireless routing protocol. See also Collision domain Interference (communication) Intra-flow interference
https://en.wikipedia.org/wiki/A8V
A8V is point mutation on Troponin C (cTNC) that leads to a hypertrophic cardiomyopathy. The coordinated cardiac muscle contraction is regulated by the troponin complex on thin filament (troponin C which is calcium binding, troponin T that plays the role with tropomyosin, and troponin I which has an inhibitory action annulating the S1 ATPase activity in the presence of tropomyosin and troponin and absence of Ca2+). This mutation is determined by the change of Alanine to Valine at nucleotide 23 from C to T. Patients with this type of mutation shows thickness on the left ventricle wall of around 18 mm, compared to the normal this thickness would be 12 mm. Also, A8V affects the Ca2+ binding affinity compared to normal genotype and increased sensitivity on force development.
https://en.wikipedia.org/wiki/Cyanobacterin
Cyanobacterin is a chemical compound produced by the cyanobacteria Scytonema hofmanni. It is a photosynthesis inhibitor with algaecidal and herbicidal effects.
https://en.wikipedia.org/wiki/KSCW-DT
KSCW-DT (channel 33) is a television station in Wichita, Kansas, United States, affiliated with The CW. It is owned by Gray Television alongside Hutchinson-licensed CBS affiliate KWCH-DT (channel 12). Both stations share studios on 37th Street in northeast Wichita, while KSCW-DT's transmitter is located in rural northeastern Reno County (east of Hutchinson). KSCW-DT also operates a digital replacement translator on UHF channel 33 (its previous analog signal allotment) from a transmitter in North Wichita, just north of the station's studio facility. History The station was first licensed on June 8, 1988, under permits from LIN TV filing an application with the Federal Communications Commission (FCC), under the call letters KWCV. It was temporarily licensed as DKWCV on November 5, 1998, but on February 11, 1999, it was changed back to KWCV. The station first signed on the air on August 5, 1999, along with LIN TV (which also briefly owned KAKE and its satellites in 2000 before selling KAKE to Benedek Broadcasting) forming and owning 50% of Banks Broadcasting, which would become the station's owner. Originally operating as a WB affiliate, it was branded on-air as "Kansas' WB". Prior to the station's launch, The WB's programming could only be viewed in the Wichita market through Chicago-based cable superstation WGN, which carried the network's programming nationwide from The WB's January 1995 launch until October 1999, or Denver's KWGN-TV on cable or satellite. The station's original transmitter was located on a tower near Colwich. On January 24, 2006, the Warner Bros. unit of Time Warner and CBS Corporation announced that the two companies would shut down The WB and UPN and combine the networks' respective programming onto a newly created "fifth" network called The CW. One month later on February 22, 2006, News Corporation announced that it would launch another new network called MyNetworkTV. On March 21, not long after it was announced that the station would becom
https://en.wikipedia.org/wiki/European%20Conference%20on%20Wireless%20Sensor%20Networks
The European Conference on Wireless Sensor Networks (EWSN) is an annual academic conference on wireless sensor networks. Although there is no official ranking of academic conferences on wireless sensor networks, EWSN is widely regarded as the top European event in sensor networks. EWSN Events EWSN started in year 2004: EWSN 2015, Porto, Portugal, February 9–11, 2015 EWSN 2014, Oxford, UK, February 17–19, 2014 EWSN 2013 , Ghent, Belgium, February 13–15, 2013 EWSN 2012, Trento, Italy, February 15–17, 2012 EWSN 2011, Bonn, Germany, February 23.25, 2011 EWSN 2010, Coimbra, Portugal, February 17–19, 2010 EWSN 2009, Cork, Ireland, February 11–13, 2009 EWSN 2008, Bologna, Italy, January 30–31, February 1, 2008 EWSN 2007, Delft, The Netherlands, January 29–31, 2007 EWSN 2006, Zurich, Switzerland, February 13–15, 2006 EWSN 2005, Istanbul, Turkey, January 31 - February 2, 2005 EWSN 2004, Berlin, Germany, January 19–21, 2004 History EWSN started in year 2004 and the prime motivation behind EWSN was to provide the European researchers working in sensor networks a venue to disseminate their research results. However, over the years EWSN has grown into a truly International event with participants and authors coming from all over the world. In 2006 it was decided to silently upgrade the event from a workshop to a conference. With this change in effect the acronym (i.e. EWSN) remains the same. Therefore, when giving a reference to EWSN 2004 to 2006 use European Workshop on Wireless Sensor Networks, and when giving a reference to EWSN 2007 onwards use European Conference on Wireless Sensor Networks. See also Wireless sensor network External links EWSN Bibliography (from DBLP) Wireless sensor network Computer networking conferences
https://en.wikipedia.org/wiki/Release%20notes
Release notes are documents that are distributed with software products or hardware products, sometimes when the product is still in the development or test state (e.g., a beta release). For products that have already been in use by clients, the release note is delivered to the customer when an update is released. Another abbreviation for Release notes is Changelog or Release logs or Software changes or Revision history Updates or README file. However, in some cases, the release notes and changelog are published separately. This split is for clarity and differentiation of feature-highlights from bugs, change requests (CRs) or improvements on the other side. Purpose Release Notes are documents that are shared with end users, customers and clients of an organization. The definition of the terms 'End Users', 'Clients' and 'Customers' are very relative in nature and might have various interpretations based on the specific context. For instance, the Quality Assurance group within a software development organization can be interpreted as an internal customer. Content Release notes detail the corrections, changes or enhancements (functional or non-functional) made to the service or product the company provides. They might also be provided as an artifact accompanying the deliverables for System Testing and System Integration Testing and other managed environments especially with reference to an information technology organization. Release notes can also contain test results and information about the test procedure. This kind of information gives readers of the release note more confidence in the fix/change done; this information also enables implementer of the change to conduct rudimentary acceptance tests. They differ from End-user license agreement, since they do not (should not) contain any legal terms of the software product or service. The focus should be on the software release itself, not for example legal conditions. Release notes can also be interpreted as d
https://en.wikipedia.org/wiki/Carboxypeptidase
A carboxypeptidase (EC number 3.4.16 - 3.4.18) is a protease enzyme that hydrolyzes (cleaves) a peptide bond at the carboxy-terminal (C-terminal) end of a protein or peptide. This is in contrast to an aminopeptidases, which cleave peptide bonds at the N-terminus of proteins. Humans, animals, bacteria and plants contain several types of carboxypeptidases that have diverse functions ranging from catabolism to protein maturation. At least two mechanisms have been discussed. Functions Initial studies on carboxypeptidases focused on pancreatic carboxypeptidases A1, A2, and B in the digestion of food. Most carboxypeptidases are not, however, involved in catabolism. Instead they help to mature proteins, for example Post-translational modification. They also regulate biological processes, such as the biosynthesis of neuroendocrine peptides such as insulin requires a carboxypeptidase. Carboxypeptidases also function in blood clotting, growth factor production, wound healing, reproduction, and many other processes. Mechanism Carboxypeptidases hydrolyze peptides at the first amide or polypeptide bond on the C-terminal end of the chain. Carboxypeptidases act by replacing the substrate water with a carbonyl (C=O) group. The carboxypeptidase A hydrolysis reaction has two mechanistic hypotheses, via a nucleophilic water and via an anhydride. In the first proposed mechanism, a promoted-water pathway is favoured as Glu270 deprotonates the nucleophilic water. The Zn2+ ion, along with positively charged residues, decreases the pKa of the bound water to approximately 7. Glu 270 has a dual role in this mechanism as it acts as a base to allow for the attack at the amide carbonyl group during nucleophilic addition. It acts as an acid during elimination when the water proton is transferred to the leaving nitrogen group. The oxygen on the amide carbonyl group does not coordinate to the Zn2+ until the addition of the water. The deprotonation of the Zn2+ coordinated water by Glu 270 pro
https://en.wikipedia.org/wiki/Elsagate
Elsagate was a controversy surrounding videos on YouTube and YouTube Kids that were categorized as child-friendly, but contained themes inappropriate for children. These videos often featured fictional characters from family-oriented media, sometimes via crossovers, used without legal permission. The term itself is a portmanteau of Disney's Elsa from Frozen—known for frequently appearing in such videos—and , a suffix for scandals. The controversy also included channels that focused on real-life children, such as Toy Freaks, that raised concern about possible child abuse. Most videos in this category were produced either with live action or Flash animation, but some used claymation or computer-generated imagery. The videos were sometimes tagged in such a way as to circumvent YouTube's child safety algorithms, and some appeared on YouTube Kids. These videos were difficult to moderate due to the large scale of YouTube. In order to capture search results and attract attention from users, their titles and descriptions featured the names of fictional characters, as well as keywords such as "education", "learn colors", and "nursery rhymes". They also included automatically placed advertisements, making them lucrative to their owners and YouTube. Public awareness of the phenomenon grew in late 2017. That year—after reports on child safety on YouTube by several media outlets—YouTube adopted stricter guidelines regarding children's content. In late November, the platform deleted channels and videos falling into the Elsagate category, as well as inappropriate videos and user comments relating to children. History Early history (2016–2017) In June 2016, The Guardian published an article about the channel Webs and Tiaras, which had been created in March of the same year. The channel showed people dressed as characters like Spider-Man, Elsa, and the Joker engaging in bizarre or nonsensical actions. The videos themselves had background music but no dialogue. The lack of dialo
https://en.wikipedia.org/wiki/Gowdy%20solution
Gowdy universes or, alternatively, Gowdy solutions of Einstein's equations are simple model spacetimes in general relativity which represent an expanding universe filled with a regular pattern of gravitational waves. External links – a description of the different types of Gowdy universes suitable for a general audience General relativity
https://en.wikipedia.org/wiki/Susac%27s%20syndrome
Susac's syndrome (retinocochleocerebral vasculopathy) is a very rare form of microangiopathy characterized by encephalopathy, branch retinal artery occlusions and hearing loss. The cause is unknown but it is theorized that antibodies are produced against endothelial cells in tiny arteries which leads to damage and the symptoms related to the illness. Despite this being an extremely rare disease, there are four registries collecting data on the illness; two are the United States, one in Germany, and one in Portugal. Presentation Susac's syndrome is named for Dr. John Susac (1940–2012), of Winter Haven, Florida, who first described it in 1979. Susac's syndrome is a very rare disease, of unknown cause, and many persons who experience it do not display the bizarre symptoms named here. Their speech can be affected, such as the case of a female of late teens who suffered speech issues and hearing problems, and many experience unrelenting and intense headaches and migraines, some form of hearing loss, and impaired vision. The problem usually corrects itself, but this can take up to five years. In some cases, subjects can become confused. The syndrome usually affects women around the age of 18 years, with female to male ratio of cases of 2:1. William F. Hoyt was the first to call the syndrome Susac syndrome and later Robert Daroff asked Dr. Susac to write an editorial in Neurology about the disorder and to use the eponym of Susac syndrome in the title, forever linking this disease with him. Pathogenesis In the March 1979 report in Neurology, Drs. Susac, Hardman and Selhorst reported two patients with the triad of encephalopathy, hearing loss and microangiopathy of the retina. The first patient underwent brain biopsy, which revealed sclerosis of the media and adventitia of small pial and cortical vessels, suggestive of a healed angiitis. Both patients underwent fluorescein retinal angiography that demonstrated multifocal retinal artery occlusions without evidence of em
https://en.wikipedia.org/wiki/Core%20Multiplexing%20Technology
Core Multiplexing Technology is a term that appeared in some BIOSes. Details A subset of traditional applications are often difficult to parallelize and make use of additional CPU hardware available on the platform, restraining applications to use only one CPU. Core Multiplexing Technology would allow for a process to be split into multiple threads at compilation time and execution time by the introduction of speculative multithreading. Much in the same way a branch predictor allows for a processor to speculate on the outcome of a branch operation without actually performing the operation, speculative multithreading allows for the processor to speculate deeper, executing entire branches of code on an additional core. Most of the implementation is done in software, with the compiler rearranging code to take better use of a multithreaded platform, which allows Simultaneous multithreading (SMT) and Multicore systems (or a combination of the two) to take advantage of the technology. But, because the data dependencies of speculative multithreading, and the necessity to manage inter-thread dependent data, hardware implementation must be taken into consideration. Core Multiplexing Technology is thought to leverage Intel's Advanced Smart Cache technology of the upcoming Core 2 chips, which allows two cores to share a single L2 cache, and actively resize the cache between the two processors if one is idle, by allowing the two cores to share data to manage inter-thread dependent data. See also 3Server Apulet BINAC External Resources Intel Research on Speculative Multithreading Coverage of Core Multiplexing Technology BIOS Option BIOS
https://en.wikipedia.org/wiki/Siris%208
Siris 8 is a discontinued operating system developed by the French company CII for its Iris 80 and Mitra 15 computers. It was later replaced by Honeywell DPS 7. Jean Ichbiah worked at CII on the rewrite of the Siris 7 operating system of the Iris 80 to create a more successful version, used to operate a three processor Iris 80 in Évry. The first version of Siris 8 offered full compatibility with applications running on its predecessor Siris 7. Among its strong points were its excellent memory management, which took advantage of the extended virtual addresses and spaces of the Iris 80. Siris 8 was suitable for both scientific and business computing, as well as real-time applications. The first delivery of the uniprocessor version occurred in February 1972, and the dual-processor version in September 1972 for the French Atomic Energy Commission (CEA) . Siris 8 also included , networking software for transporting data to other computers. After the CII merger with Honeywell-Bull, the functionality of Siris was adapted for the GCOS system through an emulation processes, which made it possible to retain all of the Siris 8 customers. The final version of Siris 8, C10, was shipped in 1976. Characteristics Before demand paged virtual memory was added in 1975, Siris 8 was described as having "two core partitions… one for resident 'batch' tasks, one for swapped time-shared tasks." It operated in four separate modes: Batch processing comprising, local and remote Transaction processing Time sharing Real-time processing. The Siris 8 monitor consisted of a permanently resident portion and pagable segments. Batch jobs could be entered through the local or a remote card reader, or by the console operator. Timesharing could be started and stopped by the operator. A timesharing job was started by the DEMON task, which performed all terminal I/O. The system maintained three types of queues of work. The multiprogramming queue could run multiple jobs at a time, with jobs sche
https://en.wikipedia.org/wiki/17-Dimethylaminoethylamino-17-demethoxygeldanamycin
17-Dimethylaminoethylamino-17-demethoxygeldanamycin (17-DMAG) is a chemical compound which is a semi-synthetic derivative of the antibiotic geldanamycin. It is being studied for the possibility of treating cancer.
https://en.wikipedia.org/wiki/Inbox%20and%20outbox%20pattern
The inbox pattern and outbox pattern are two related patterns used by applications to persist data (usually in a database) to be used for operations with guaranteed delivery. The inbox and outbox concepts are used in the ActivityPub protocol and in email. The inbox pattern The application receives data which it persists to an inbox table in a database. Once the data has been persisted another application, process or service can read from the inbox table and use the data to perform an operation which it can retry upon failure until completion, the operation may take a long time to complete. The inbox pattern ensures that a message was received (e.g. to a queue) successfully at least once. The outbox pattern The application persists data to an outbox table in a database. Once the data has been persisted another application or process can read from the outbox table and use that data to perform an operation which it can retry upon failure until completion. The outbox pattern ensures that a message was sent (e.g. to a queue) successfully at least once. See also Enterprise service bus Message broker External links Push-based Outbox Pattern with Postgres Logical Replication Software design patterns
https://en.wikipedia.org/wiki/IP%20%28complexity%29
In computational complexity theory, the class IP (interactive proof) is the class of problems solvable by an interactive proof system. It is equal to the class PSPACE. The result was established in a series of papers: the first by Lund, Karloff, Fortnow, and Nisan showed that co-NP had multiple prover interactive proofs; and the second, by Shamir, employed their technique to establish that IP=PSPACE. The result is a famous example where the proof does not relativize. The concept of an interactive proof system was first introduced by Shafi Goldwasser, Silvio Micali, and Charles Rackoff in 1985. An interactive proof system consists of two machines, a prover, P, which presents a proof that a given string n is a member of some language, and a verifier, V, that checks that the presented proof is correct. The prover is assumed to be infinite in computation and storage, while the verifier is a probabilistic polynomial-time machine with access to a random bit string whose length is polynomial on the size of n. These two machines exchange a polynomial number, p(n), of messages and once the interaction is completed, the verifier must decide whether or not n is in the language, with only a 1/3 chance of error. (So any language in BPP is in IP, since then the verifier could simply ignore the prover and make the decision on its own.) Definition A language L belongs to IP if there exist V, P such that for all Q, w: The Arthur–Merlin protocol, introduced by László Babai, is similar in nature, except that the number of rounds of interaction is bounded by a constant rather than a polynomial. Goldwasser et al. have shown that public-coin protocols, where the random numbers used by the verifier are provided to the prover along with the challenges, are no less powerful than private-coin protocols. At most two additional rounds of interaction are required to replicate the effect of a private-coin protocol. The opposite inclusion is straightforward, because the verifier can always s
https://en.wikipedia.org/wiki/Amadou
Amadou is a spongy material derived from Fomes fomentarius and similar fungi that grow on the bark of coniferous and angiosperm trees, and have the appearance of a horse's hoof (thus the name "hoof fungus"). It is also known as the "tinder fungus" and is useful for starting slow-burning fires. The fungus must be removed from the tree, the hard outer layer scraped off, and then thin strips of the inner spongy layer cut for use as tinder.Amadou was a precious resource to ancient people, allowing them to start a fire by catching sparks from flint struck against iron pyrites. Bits of fungus preserved in peat have been discovered at the Mesolithic site of Star Carr in the UK, modified presumably for this purpose. Remarkable evidence for its utility is provided by the discovery of the 5,000-year-old remains of "Ötzi the Iceman", who carried it on a cross-alpine excursion before his death and subsequent ice-entombment. Amadou has great water-absorbing abilities. It is used in fly fishing for drying out dry flies that have become wet. Another use is for forming a felt-like fabric used in the making of hats and other items. It can be used as a kind of artificial leather. Mycologist Paul Stamets famously wears a hat made of amadou. Before such uses, amadou needs to be prepared by being pounded flat, and boiled or soaked in a solution of nitre. One method of preparation starts by soaking a slice in washing soda for a week, beating it gently from time to time. Following this it is left to dry. The result is initially hard and must be pounded with a blunt object to soften and flatten it.
https://en.wikipedia.org/wiki/Circular%20law
In probability theory, more specifically the study of random matrices, the circular law concerns the distribution of eigenvalues of an random matrix with independent and identically distributed entries in the limit . It asserts that for any sequence of random matrices whose entries are independent and identically distributed random variables, all with mean zero and variance equal to , the limiting spectral distribution is the uniform distribution over the unit disc. Precise statement Let be a sequence of matrix ensembles whose entries are i.i.d. copies of a complex random variable with mean 0 and variance 1. Let denote the eigenvalues of . Define the empirical spectral measure of as With these definitions in mind, the circular law asserts that almost surely (i.e. with probability one), the sequence of measures converges in distribution to the uniform measure on the unit disk. History For random matrices with Gaussian distribution of entries (the Ginibre ensembles), the circular law was established in the 1960s by Jean Ginibre. In the 1980s, Vyacheslav Girko introduced an approach which allowed to establish the circular law for more general distributions. Further progress was made by Zhidong Bai, who established the circular law under certain smoothness assumptions on the distribution. The assumptions were further relaxed in the works of Terence Tao and Van H. Vu, Guangming Pan and Wang Zhou, and Friedrich Götze and Alexander Tikhomirov. Finally, in 2010 Tao and Vu proved the circular law under the minimal assumptions stated above. The circular law result was extended in 1988 by Sommers, Crisanti, Sompolinsky and Stein to an elliptical law for ensembles of matrices with arbitrary correlations. The elliptic and circular laws were further generalized by Aceituno, Rogers and Schomerus to the hypotrochoid law which includes higher order correlations. See also Wigner semicircle distribution
https://en.wikipedia.org/wiki/Good%20Clinical%20Practice%20Directive
The Good Clinical Practice Directive (Directive 2005/28/EC of 8 April 2005 of the European Parliament and of the Council) lays down principles and detailed guidelines for good clinical practice as regards conducting clinical trials of medicinal products for human use, as well as the requirements for authorisation of the manufacturing or importation of such products. The directive deals with the following items: Good clinical practice for the design, conduct, recording and reporting of clinical trials: Good Clinical Practice (GCP) The Ethics Committee The sponsors Investigator's Brochure Manufacturing or import authorisation Exemption for Hospital & Health Centres and Reconstitution Conditions of Holding a Manufacturing Licence The Trial master file and archiving Format of Trial Master File Retention of Essential and Medical Records Inspectors Inspection procedures Final provisions
https://en.wikipedia.org/wiki/ZW%20sex-determination%20system
The ZW sex-determination system is a chromosomal system that determines the sex of offspring in birds, some fish and crustaceans such as the giant river prawn, some insects (including butterflies and moths), the schistosome family of flatworms, and some reptiles, e.g. majority of snakes, lacertid lizards and monitors including Komodo dragons. It is also present in some plants, where it has probably evolved independently on several occasions. The letters Z and W are used to distinguish this system from the XY sex-determination system. In the ZW system, females have a pair of dissimilar ZW chromosomes, and males have two similar ZZ chromosomes. In contrast to the XY sex-determination system and the X0 sex-determination system, where the sperm determines the sex, in the ZW system, the ovum determines the sex of the offspring. Males are the homogametic sex (ZZ), while females are the heterogametic sex (ZW). The Z chromosome is larger and has more genes, like the X chromosome in the XY system. Significance of the ZW and XY systems No genes are shared between the avian ZW and mammalian XY chromosomes, and, from a comparison between chicken and human, the Z chromosome appears similar to the autosomal chromosome 9 in humans. It has been proposed that the ZW and XY sex determination systems do not share an origin but that the sex chromosomes are derived from autosomal chromosomes of the common ancestor. These autosomes are thought to have evolved sex-determining loci that eventually developed into the respective sex chromosomes once the recombination between the chromosomes (X and Y or Z and W) was suppressed. The platypus, a monotreme mammal, has a system of five pairs of XY chromosomes. They form a multiple chain due to homologous regions in male meiosis and finally segregates into XXXXX-sperm and YYYYY-sperm. The bird Z-like pair shows up on opposite ends of the chain. Areas homologous to the bird Z chromosome are scattered throughout X3 and X5. Although the sex-deter
https://en.wikipedia.org/wiki/Cytoneme
Cytonemes are thin, cellular projections that are specialized for exchange of signaling proteins between cells. Cytonemes emanate from cells that make signaling proteins, extending directly to cells that receive signaling proteins. Cytonemes also extend directly from cells that receive signaling proteins to cells that make them. A cytoneme is a type of filopodium - a thin, tubular extension of a cell’s plasma membrane that has a core composed of tightly bundled, parallel actin filaments. Filopodia can extend more than 100 μm and have been measured as thin as 0.1 μm and as thick as 0.5 μm. Cytonemes with a diameter of approximately 0.2 μm and as long as 80 μm have been observed in the Drosophila wing imaginal disc. Many cell types have filopodia. The functions of filopodia have been attributed to pathfinding of neurons, early stages of synapse formation, antigen presentation by dendritic cells of the immune system, force generation by macrophages and virus transmission. They have been associated with wound closure, dorsal closure of Drosophila embryos, chemotaxis in Dictyostelium, Delta-Notch signaling, vasculogenesis, cell adhesion, cell migration, and cancer metastasis. Filopodia have been given various names: microspikes, pseudopods, thin filopodia, thick filopodia, gliopodia, myopodia, invadopodia, podosomes, telopodes, tunneling nanotubes and dendrites. The term cytoneme was coined to denote the presence of cytoplasm in their interior (cyto-) and their finger-like appearance (-neme), and to distinguish their role as signaling, rather than structural or force-generating, organelles. Filopodia with behaviors suggestive of roles in sensing patterning information were first observed in sea urchin embryos, and subsequent characterizations support the idea that they convey patterning signals between cells. The discovery of cytonemes in Drosophila imaginal discs correlated for the first time the presence and behavior of filopodia with a known morphogen signaling pro
https://en.wikipedia.org/wiki/Six-dimensional%20holomorphic%20Chern%E2%80%93Simons%20theory
In mathematical physics, six-dimensional holomorphic Chern–Simons theory or sometimes holomorphic Chern–Simons theory is a gauge theory on a three-dimensional complex manifold. It is a complex analogue of Chern–Simons theory, named after Shiing-Shen Chern and James Simons who first studied Chern–Simons forms which appear in the action of Chern–Simons theory. The theory is referred to as six-dimensional as the underlying manifold of the theory is three-dimensional as a complex manifold, hence six-dimensional as a real manifold. The theory has been used to study integrable systems through four-dimensional Chern–Simons theory, which can be viewed as a symmetry reduction of the six-dimensional theory. For this purpose, the underlying three-dimensional complex manifold is taken to be the three-dimensional complex projective space , viewed as twistor space. Formulation The background manifold on which the theory is defined is a complex manifold which has three complex dimensions and therefore six real dimensions. The theory is a gauge theory with gauge group a complex, simple Lie group The field content is a partial connection . The action is where where is a holomorphic (3,0)-form and with denoting a trace functional which as a bilinear form is proportional to the Killing form. On twistor space P3 Here is fixed to be . For application to integrable theory, the three form must be chosen to be meromorphic. See also Chern–Simons theory Four-dimensional Chern-Simons theory External links Holomorphic Chern–Simons theory nLab
https://en.wikipedia.org/wiki/Strongly%20compact%20cardinal
In set theory, a branch of mathematics, a strongly compact cardinal is a certain kind of large cardinal. A cardinal κ is strongly compact if and only if every κ-complete filter can be extended to a κ-complete ultrafilter. Strongly compact cardinals were originally defined in terms of infinitary logic, where logical operators are allowed to take infinitely many operands. The logic on a regular cardinal κ is defined by requiring the number of operands for each operator to be less than κ; then κ is strongly compact if its logic satisfies an analog of the compactness property of finitary logic. Specifically, a statement which follows from some other collection of statements should also follow from some subcollection having cardinality less than κ. The property of strong compactness may be weakened by only requiring this compactness property to hold when the original collection of statements has cardinality below a certain cardinal λ; we may then refer to λ-compactness. A cardinal is weakly compact if and only if it is κ-compact; this was the original definition of that concept. Strong compactness implies measurability, and is implied by supercompactness. Given that the relevant cardinals exist, it is consistent with ZFC either that the first measurable cardinal is strongly compact, or that the first strongly compact cardinal is supercompact; these cannot both be true, however. A measurable limit of strongly compact cardinals is strongly compact, but the least such limit is not supercompact. The consistency strength of strong compactness is strictly above that of a Woodin cardinal. Some set theorists conjecture that existence of a strongly compact cardinal is equiconsistent with that of a supercompact cardinal. However, a proof is unlikely until a canonical inner model theory for supercompact cardinals is developed. Extendibility is a second-order analog of strong compactness. See also List of large cardinal properties
https://en.wikipedia.org/wiki/Kate%20Bellingham
Katherine Bellingham (born 1963) is an English engineer and television presenter known for her role presenting the BBC1 science show Tomorrow's World from 1990–1994. Following a period pursuing other interests and raising children, she resumed her broadcasting career in 2010. Early life Bellingham was born in Buckrose, East Riding of Yorkshire, and educated at the independent Mount School in York, followed by the Oxford University, where she studied Physics. She graduated in 1984. She earned her MSc in Electronic Communications Systems Engineering from University of Hertfordshire. Career Broadcasting Bellingham was a BBC radio engineer working in the BBC Broadcasting House in 1988 when she was selected to co-host the annual Faraday Lecture sponsored by the Institution of Electrical Engineers – a tour of live shows for school pupils around the UK. A BBC Schools producer saw her perform and she was offered a presenting role on a new Design and Technology programme called Techno. She returned to her engineering training, but then applied for Tomorrow's World and joined the team of presenters working on the show in 1990 for four years. Programmes she has presented include: Radio Five Live – The Acid Test from 1994–7 and Splitting the Difference in 1996 BBC School Radio Radio 4 – Testing Times (four-part series in November 1999) BBC2 – Working in Engineering in 1999 The Open University Children's ITV – The Big Bang from 1996–2004 After around five years of regular television work, hosting numerous live events and presenting corporate video programmes, Bellingham decided to focus first on her young family and then to follow her core professional interest by returning to university to secure an MSc in Electronics. Promotion of engineering (especially for women) She trained and then worked as a maths teacher until July 2007, but has returned to media work, and to promoting STEM (science, technology, engineering and maths) to general public audiences, particular
https://en.wikipedia.org/wiki/Retroactive%20data%20structure
In computer science a retroactive data structure is a data structure which supports efficient modifications to a sequence of operations that have been performed on the structure. These modifications can take the form of retroactive insertion, deletion or updating an operation that was performed at some time in the past. Some applications of retroactive data structures In the real world there are many cases where one would like to modify a past operation from a sequence of operations. Listed below are some of the possible applications: Error correction: Incorrect input of data. The data should be corrected and all the secondary effects of the incorrect data be removed. Bad data: When dealing with large systems, particularly those involving a large amount of automated data transfer, it is not uncommon. For example, suppose one of the sensors for a weather network malfunctions and starts to report garbage data or incorrect data. The ideal solution would be to remove all the data that the sensor produced since it malfunctioned along with all the effects the bad data had on the overall system. Recovery: Suppose that a hardware sensor was damaged but is now repaired and data is able to be read from the sensor. We would like to be able to insert the data back into the system as if the sensor was never damaged in the first place. Manipulation of the past: Changing the past can be helpful in the cases of damage control and retroactive data structures are designed for intentional manipulation of the past. Time as a spatial dimension It is not possible to consider time as an additional spatial dimension. To illustrate this suppose we map the dimension of time onto an axis of space. The data structure we will use to add the spatial time dimension is a min-heap. Let the y axis represent the key values of the items within the heap and the x axis is the spatial time dimension. After several insertions and delete-min operations (all done non-retroactively) our min-heap woul
https://en.wikipedia.org/wiki/Riesel%20number
In mathematics, a Riesel number is an odd natural number k for which is composite for all natural numbers n . In other words, when k is a Riesel number, all members of the following set are composite: If the form is instead , then k is a Sierpinski number. Riesel problem In 1956, Hans Riesel showed that there are an infinite number of integers k such that is not prime for any integer n. He showed that the number 509203 has this property, as does 509203 plus any positive integer multiple of 11184810. The Riesel problem consists in determining the smallest Riesel number. Because no covering set has been found for any k less than 509203, it is conjectured to be the smallest Riesel number. To check if there are k < 509203, the Riesel Sieve project (analogous to Seventeen or Bust for Sierpinski numbers) started with 101 candidates k. As of December 2022, 57 of these k had been eliminated by Riesel Sieve, PrimeGrid, or outside persons. The remaining 42 values of k that have yielded only composite numbers for all values of n so far tested are 23669, 31859, 38473, 46663, 67117, 74699, 81041, 107347, 121889, 129007, 143047, 161669, 206231, 215443, 226153, 234343, 245561, 250027, 315929, 319511, 324011, 325123, 327671, 336839, 342847, 344759, 362609, 363343, 364903, 365159, 368411, 371893, 384539, 386801, 397027, 409753, 444637, 470173, 474491, 477583, 485557, 494743. The most recent elimination was in April 2023, when 97139 × 218397548 − 1 was found to be prime by Ryan Propper. This number is 5,538,219 digits long. As of April 2023, PrimeGrid has searched the remaining candidates up to n = 14,500,000. Known Riesel numbers The sequence of currently known Riesel numbers begins with: 509203, 762701, 777149, 790841, 992077, 1106681, 1247173, 1254341, 1330207, 1330319, 1715053, 1730653, 1730681, 1744117, 1830187, 1976473, 2136283, 2251349, 2313487, 2344211, 2554843, 2924861, ... Covering set A number can be shown to be a Riesel number by exhibiting a covering set: a
https://en.wikipedia.org/wiki/Moisture%20expansion
Moisture expansion is the tendency of matter to change in volume in response to a change in moisture content. The macroscopic effect is similar to that of thermal expansion but the microscopic causes are very different. Moisture expansion is caused by hygroscopy. Matter
https://en.wikipedia.org/wiki/Error%20amplifier%20%28electronics%29
An error amplifier is most commonly encountered in feedback unidirectional voltage control circuits, where the sampled output voltage of the circuit under control, is fed back and compared to a stable reference voltage. Any difference between the two generates a compensating error voltage which tends to move the output voltage towards the design specification. An error amplifier is essentially what its name says, that is, it amplifies an error signal. This error is based on the difference between a reference signal and the input signal. It can also be treated as the difference between the two inputs. These are usually used in unison with feedback loops, owing to their self-correcting mechanism. They have an inverting and a non-inverting input pin set, which is what is responsible for the output to be the difference of the inputs. Devices Discrete Transistors Operational amplifiers Applications Regulated power supply. D.C Power Amplifiers Measurement Equipment Servomechanisms See also Differential amplifier External links Error Amplifier Design and Application , alphascientific.com. Originally accessed 27 April 2009, now 404. Try https://web.archive.org/web/20081006222215/http://www.alphascientific.com/technotes/technote3.pdf Error amplifier as an element in a voltage regulator:Stability analysis of low-dropout linear regulators with a PMOS pass element Electronic amplifiers
https://en.wikipedia.org/wiki/Cross-entropy%20benchmarking
Cross-entropy benchmarking (also referred to as XEB) is quantum benchmarking protocol which can be used to demonstrate quantum supremacy. In XEB, a random quantum circuit is executed on a quantum computer multiple times in order to collect a set of samples in the form of bitstrings . The bitstrings are then used to calculate the cross-entropy benchmark fidelity () via a classical computer, given by , where is the number of qubits in the circuit and is the probability of a bitstring for an ideal quantum circuit . If , the samples were collected from a noiseless quantum computer. If , then the samples could have been obtained via random guessing. This means that if a quantum computer did generate those samples, then the quantum computer is too noisy and thus has no chance of performing beyond-classical computations. Since it takes an exponential amount of resources to classically simulate a quantum circuit, there comes a point when the biggest supercomputer that runs the best classical algorithm for simulating quantum circuits can't compute the XEB. Crossing this point is known as achieving quantum supremacy; and after entering the quantum supremacy regime, XEB can only be estimated. The Sycamore processor was the first to demonstrate quantum supremacy via XEB. Instances of random circuits with and 20 cycles were run to obtain an XEB of . Generating samples took 200 seconds on the quantum processor when it would have taken 10,000 years on Summit at the time of the experiment. Improvements in classical algorithms have shortened the runtime to about a week on Sunway TaihuLight thus collapsing Sycamore's claim to quantum supremacy. As of 2021, the latest demonstration of quantum supremacy by Zuchongzhi 2.1 with , 24 cycles and an XEB of holds. It takes around 4 hours to generate samples on Zuchonzhi 2.1 when it would take 10,000 years on Sunway. See also Boson sampling
https://en.wikipedia.org/wiki/Pwpaw
PWPAW A Projector Augmented Wave (PAW) code for electronic structure calculation. It is a free software package, distributed under the copyleft GNU General Public License. It is a plane wave implementation of the projector augmented wave (PAW) method developed by Peter E. Blöchl for electronic structure calculations within the framework of density functional theory. In addition to the self-consistent calculation of the electronic structure of a periodic solid, the program has a number of other capabilities, including structural geometry optimization and molecular dynamics simulations within the Born–Oppenheimer approximation. See also Atompaw Software package for electron configuration calculations EXCITING Bloch's theorem
https://en.wikipedia.org/wiki/COPII
The Coat Protein Complex II, or COPII, is a group of proteins that facilitate the formation of vesicles to transport proteins from the endoplasmic reticulum to the Golgi apparatus or endoplasmic-reticulum–Golgi intermediate compartment. This process is termed anterograde transport, in contrast to the retrograde transport associated with the COPI complex. COPII is assembled in two parts: first an inner layer of Sar1, Sec23, and Sec24 forms; then the inner coat is surrounded by an outer lattice of Sec13 and Sec31. Function The COPII coat is responsible for the formation of vesicles from the endoplasmic reticulum (ER). These vesicles transport cargo proteins to the Golgi apparatus (in yeast) or the endoplasmic-reticulum-Golgi intermediate compartment (ERGIC, in mammals). Coat assembly is initiated when the cytosolic Ras GTPase Sar1 is activated by its guanine nucleotide exchange factor Sec12. Activated Sar1-GTP inserts itself into the ER membrane, binding preferentially to areas of membrane curvature. As Sar1-GTP inserts into the membrane, it recruits Sec23 and Sec24 to make up the inner cage. Once the inner coat is assembled, the outer coat proteins Sec13 and Sec31 are recruited to the budding vesicle. Hydrolysis of the Sar1 GTP to GDP promotes disassembly of the coat. Some proteins are found to be responsible for selectively packaging cargos into COPII vesicles. More recent research suggests the Sec23/Sec24-Sar1 complex participates in cargo selection. For example, Erv29p in Saccharomyces cerevisiae is found to be necessary for packaging glycosylated pro-α-factor. Sec24 proteins recognize various cargo proteins, packaging them into the budding vesicles. Structure The COPII coat consists of an inner layer – a flexible meshwork of Sar1, Sec23, and Sec24 – and an outer layer made of Sec13 and Sec31. Sar1 resembles other Ras-family GTPases, with a core of six beta strands flanked by three alpha helices, and two flexible "switch domains". Unlike other Ras GTPases, S
https://en.wikipedia.org/wiki/Van%20Cittert%E2%80%93Zernike%20theorem
The van Cittert–Zernike theorem, named after physicists Pieter Hendrik van Cittert and Frits Zernike, is a formula in coherence theory that states that under certain conditions the Fourier transform of the intensity distribution function of a distant, incoherent source is equal to its complex visibility. This implies that the wavefront from an incoherent source will appear mostly coherent at large distances. Intuitively, this can be understood by considering the wavefronts created by two incoherent sources. If we measure the wavefront immediately in front of one of the sources, our measurement will be dominated by the nearby source. If we make the same measurement far from the sources, our measurement will no longer be dominated by a single source; both sources will contribute almost equally to the wavefront at large distances. This reasoning can be easily visualized by dropping two stones in the center of a calm pond. Near the center of the pond, the disturbance created by the two stones will be very complicated. As the disturbance propagates towards the edge of the pond, however, the waves will smooth out and will appear to be nearly circular. The van Cittert–Zernike theorem has important implications for radio astronomy. With the exception of pulsars and masers, all astronomical sources are spatially incoherent. Nevertheless, because they are observed at distances large enough to satisfy the van Cittert–Zernike theorem, these objects exhibit a non-zero degree of coherence at different points in the imaging plane. By measuring the degree of coherence at different points in the imaging plane (the so-called "visibility function") of an astronomical object, a radio astronomer can thereby reconstruct the source's brightness distribution and make a two-dimensional map of the source's appearance. Statement of the theorem Consider two very distant parallel planes, both perpendicular to the line of sight, and let's call them source plane and observation plane;
https://en.wikipedia.org/wiki/Vibrio
Vibrio is a genus of Gram-negative bacteria, possessing a curved-rod (comma) shape, several species of which can cause foodborne infection, usually associated with eating undercooked seafood. Being highly salt tolerant and unable to survive in fresh water, Vibrio spp. are commonly found in various salt water environments. Vibrio spp. are facultative anaerobes that test positive for oxidase and do not form spores. All members of the genus are motile. They are able to have polar or lateral flagellum with or without sheaths. Vibrio species typically possess two chromosomes, which is unusual for bacteria. Each chromosome has a distinct and independent origin of replication, and are conserved together over time in the genus. Recent phylogenies have been constructed based on a suite of genes (multilocus sequence analysis). O. F. Müller (1773, 1786) described eight species of the genus Vibrio (included in Infusoria), three of which were spirilliforms. Some of the other species are today assigned to eukaryote taxa, e.g., to the euglenoid Peranema or to the diatom Bacillaria. However, Vibrio Müller, 1773 became regarded as the name of a zoological genus, and the name of the bacterial genus became Vibrio Pacini, 1854. Filippo Pacini isolated micro-organisms he called "vibrions" from cholera patients in 1854, because of their motility. In Latin "vibrio" means "to quiver". Biochemical characteristics of Vibrio spp. The genus Vibrio contains a large number of species. So, variation in the biochemical characteristics are most common in case of the genus Vibrio. Colony, morphological, physiological, and biochemical characteristics of the genus Vibrio are shown in the Table below. Note: Group-1: Vibrio alginolyticus; Group-2: Vibrio natriegens, Vibrio pelagius, Vibrio azureus; + = Positive; – =Negative; V =Variable (+/–) Pathogenic strains Several species of Vibrio are pathogens. Most disease-causing strains are associated with gastroenteritis, but can also infect open wounds
https://en.wikipedia.org/wiki/5-Formamidoimidazole-4-carboxamide%20ribotide
5-Formamidoimidazole-4-carboxamide ribotide (or FAICAR) is an intermediate in the formation of purines. It is formed by the enzyme AICAR transformylase from AICAR and 10-formyltetrahydrofolate.
https://en.wikipedia.org/wiki/Orofaciodigital%20syndrome%201
Orofaciodigital syndrome 1 (OFD1), also called Papillon-League and Psaume syndrome, is an X-linked congenital disorder characterized by malformations of the face, oral cavity, and digits with polycystic kidney disease and variable involvement of the central nervous system. Cause Orofaciodigital syndrome type 1 is caused by mutations in the OFD1 gene. OFD1 localizes to both centrosomes and basal bodies within the human genetic cellular structure. This suggests that this syndrome may fall into a broad category of ciliary diseases. The ciliary organelles are present in many cellular types throughout the human body. Cilia defects adversely affect numerous critical developmental signaling pathways essential to cellular development. Other types include: Relation to other rare genetic disorders Recent findings in genetic research have suggested that a large number of genetic disorders, both genetic syndromes and genetic diseases, that were not previously identified in the medical literature as related, may be, in fact, highly related in the genotypical root cause of these widely varying, phenotypically-observed disorders. Orofaciodigital syndrome has been found to be a ciliopathy. Other known ciliopathies include primary ciliary dyskinesia, Bardet–Biedl syndrome, polycystic kidney disease and polycystic liver disease, nephronophthisis, Alström syndrome, Meckel–Gruber syndrome and some forms of retinal degeneration. Diagnosis Orofaciodigital syndrome type 1 is diagnosed through genetic testing. Some symptoms of Orofaciodigital syndrome type 1 are oral features such as, split tongue, benign tumors on the tongue, cleft palate, hypodontia and other dental abnormalities. Other symptoms of the face include hypertelorism and micrognathia. Bodily abnormalities such as webbed, short, joined, or abnormally curved fingers and toes are also symptoms of Orofaciodigital syndrome type 1. The most frequent symptoms are accessory oral frenulum, broad alveolar ridges, frontal boss
https://en.wikipedia.org/wiki/Azanidazole
Azanidazole is a nitroimidazole derivative used in gynecology for the treatment of trichomonal infections.
https://en.wikipedia.org/wiki/Battery%20indicator
A battery indicator (also known as a battery gauge) is a device which gives information about a battery. This will usually be a visual indication of the battery's state of charge. It is particularly important in the case of a battery electric vehicle. Automobiles Some automobiles are fitted with a battery condition meter to monitor the starter battery. This meter is, essentially, a voltmeter but it may also be marked with coloured zones for easy visualization. Many newer cars no longer offer voltmeters or ammeters; instead, these vehicles typically have a light with the outline of an automotive battery on it. This can be somewhat misleading as it may be confused for an indicator of a bad battery when in reality it indicates a problem with the vehicle's charging system. Alternatively, an ammeter may be fitted. This indicates whether the battery is being charged or discharged. In the adjacent picture, the ammeter is marked "Alternator" and the symbols are "C" (charge) and "D" (discharge). Both ammeters and voltmeters individually or together can be used to assess the operating state of an automobile battery and charging system. Electronic devices A battery indicator is a feature of many electronic devices. In mobile phones, the battery indicator usually takes the form of a bar graph - the more bars that are showing, the better the battery's state of charge. Computers Computers may give a signal to users that an internal standby battery needs replacement. Portable computers using rechargeable batteries generally give the user some indication of the remaining operating time left on the battery. A Smart Battery System uses a controller integrated with an interchangeable battery pack to provide a more accurate indication of the state of battery charge. Batteries not part of a system Batteries that are part of a system, such as computer batteries, can have their properties checked and logged in operation to assist in determining remaining charge. A real bat
https://en.wikipedia.org/wiki/Concern%20%28computer%20science%29
In computer science, a concern is a particular set of information that has an effect on the code of a computer program. A concern can be as general as the details of database interaction or as specific as performing a primitive calculation, depending on the level of conversation between developers and the program being discussed. IBM uses the term concern space to describe the sectioning of conceptual information. Overview Usually the code can be separated into logical sections, each addressing separate concerns, and so it hides the need for a given section to know particular information addressed by a different section. This leads to a modular program. Edsger W. Dijkstra coined the term "separation of concerns" to describe the mentality behind this modularization, which allows the programmer to reduce the complexity of the system being designed. Two different concerns that intermingle in the same section of code are called "highly coupled". Sometimes the chosen module divisions do not allow for one concern to be completely separated from another, resulting in cross-cutting concerns. The various programming paradigms address the issue of cross-cutting concerns to different degrees. Data logging is a common cross-cutting concern, being used in many other parts of the program other than the particular module(s) that actually log the data. Since changes to the logging code can affect other sections, it could introduce bugs in the operation of the program. Paradigms that specifically address the issue of concern separation: Object-oriented programming, describing concerns as objects Functional programming, describing concerns as functions Aspect-oriented software development, treating concerns and their interaction as constructs of their own standing See also Cross-cutting concern Separation of concerns Issue (computers), a unit of work to accomplish an improvement in a data system
https://en.wikipedia.org/wiki/Rongo%C4%81
refers to the traditional Māori medicinal practices in New Zealand. Rongoā was one of the Māori cultural practices targeted by the Tohunga Suppression Act 1907, until lifted by the Maori Welfare Act 1962. In the later part of the 20th century there was renewed interest in Rongoā as part of a broader Māori renaissance. Rongoā can involve spiritual, herbal and physical components. Herbal aspects used plants such as harakeke, kawakawa, rātā, koromiko, kōwhai, kūmarahou, mānuka, tētēaweka and rimu. The practice of Rongoā has been removed from the Therapeutics Products Bill, excluding the practice from over-site or regulation and therefore reducing the need to show efficacy, safety or any quality controls over the drugs and therapies prescribed.
https://en.wikipedia.org/wiki/Prevx
Prevx is a discontinued anti-malware utility. There are separate real-time and on-demand versions. It can remove low-risk adware for free, but the user has to purchase and enter a license key if it is more serious. Scanning can take anywhere from less than two minutes to five minutes. Reception Tony Zaitoun, of About.com, liked the utility except that he had some confusion about configuring the interface and that key protection was disabled by default. The issue referenced has since been corrected. Awards Editors' Choice by PC Magazine Platinum & Standard Checkmark by West Coast Labs History Prevx Limited was formed in March 2001 in the UK and registered under the name “Immunify”, changing its name to “TrustCorps” later that year and finally re-branded as “Prevx” in 2003. The founder team was led by Nick Ray as CEO and Paul Stubbs as COO. Originally positioned as a Host Intrusion Prevention System, the company's initial software product was designed to protect UNIX / Linux servers from advanced malware threats without reliance on malware signatures, thus providing protection from unknown or “Zero-Day” threats.   The software was positioned the last line of defence against threats that had bypassed or overcome firewall, network security and any installed anti-virus or other host-based protection systems.  This early product monitored the behaviour of executables in real-time and would block system calls that breached its rules, thus providing protection.  It offered protection against buffer overflow attacks and could successfully detect rootkits that attempted to hide themselves in memory or on disk. At the end of 2002, the company received investment from South East Growth Fund and in early 2003 from private investors through an angel network, Hotbed. In 2003, the company rebranded to Prevx and in June 2004 launched its first product for the Windows platform, “Prevx Home - Beta”, offered as a freeware download.  Prevx Home 1.0 (also free) followed in Septe
https://en.wikipedia.org/wiki/Sustainable%20sushi
Sustainable sushi is sushi made from fished or farmed sources that can be maintained or whose future production does not significantly jeopardize the ecosystems from which it is acquired. Concerns over the sustainability of sushi ingredients arise from greater concerns over environmental, economic and social stability, and human health. Origin In 1999, Miya's created the first plant-based sushi menu, in New Haven, Connecticut, as a healthier and more environmentally responsible approach to the cuisine of sushi. By 2004, Miya's had created the first sushi menu that featured sustainable sushi. Miya's is credited as the first sushi restaurant in the world to actively promote sustainable items on its menu. Across the country from Miya's, Bamboo in Portland was the world's first certified sustainable sushi restaurant. Opening in 2008, Bamboo works with independent third party organizations to audit their supply chain for sustainable seafood. Also, opening in 2008 was Tataki in San Francisco, which featured sustainable seafood. Since then, a growing number of sushi restaurants have adopted sustainability as a guiding principle and have come together to form what they refer to as the "sustainable sushi movement". These individuals espouse the use of only environmentally responsible seafood products as a means of preserving the art of sushi and the health of the world's oceans. Currently, there are upwards of 25 sustainable sushi restaurants in the United States. The gravity of the movement has been acknowledged by many media outlets around the world, including TIME Magazine, which recognized the restaurants Miya's, Bamboo, and Tataki as pioneers in the sushi sustainability. Background on environmental sustainability Sustainable sushi raises questions about the sources of the fish used—whether ingredients were caught or raised. It also raises questions about the vulnerability of the species (longevity and reproductive capability) and whether humans are overfishing the
https://en.wikipedia.org/wiki/Symmetric%20cone
In mathematics, symmetric cones, sometimes called domains of positivity, are open convex self-dual cones in Euclidean space which have a transitive group of symmetries, i.e. invertible operators that take the cone onto itself. By the Koecher–Vinberg theorem these correspond to the cone of squares in finite-dimensional real Euclidean Jordan algebras, originally studied and classified by . The tube domain associated with a symmetric cone is a noncompact Hermitian symmetric space of tube type. All the algebraic and geometric structures associated with the symmetric space can be expressed naturally in terms of the Jordan algebra. The other irreducible Hermitian symmetric spaces of noncompact type correspond to Siegel domains of the second kind. These can be described in terms of more complicated structures called Jordan triple systems, which generalize Jordan algebras without identity. Definitions A convex cone C in a finite-dimensional real inner product space V is a convex set invariant under multiplication by positive scalars. It spans the subspace C – C and the largest subspace it contains is C ∩ (−C). It spans the whole space if and only if it contains a basis. Since the convex hull of the basis is a polytope with non-empty interior, this happens if and only if C has non-empty interior. The interior in this case is also a convex cone. Moreover, an open convex cone coincides with the interior of its closure, since any interior point in the closure must lie in the interior of some polytope in the original cone. A convex cone is said to be proper if its closure, also a cone, contains no subspaces. Let C be an open convex cone. Its dual is defined as It is also an open convex cone and C** = C. An open convex cone C is said to be self-dual if C* = C. It is necessarily proper, since it does not contain 0, so cannot contain both X and −X. The automorphism group of an open convex cone is defined by Clearly g lies in Aut C if and only if g takes the closure of C onto i
https://en.wikipedia.org/wiki/Refresh%20rate
The refresh rate, also known as vertical refresh rate or vertical scan rate in reference to terminology originating with the cathode-ray tubes (CRTs), is the number of times per second that a raster-based display device displays a new image. This is independent from frame rate, which describes how many images are stored or generated every second by the device driving the display. On CRT displays, higher refresh rates produce less flickering, thereby reducing eye strain. In other technologies such as liquid-crystal displays, the refresh rate affects only how often the image can potentially be updated. Non-raster displays may not have a characteristic refresh rate. Vector displays, for instance, do not trace the entire screen, only the actual lines comprising the displayed image, so refresh speed may differ by the size and complexity of the image data. For computer programs or telemetry, the term is sometimes applied to how frequently a datum is updated with a new external value from another source (for example; a shared public spreadsheet or hardware feed). Physical factors While all raster display devices have a characteristic refresh rate, the physical implementation differs between technologies. Cathode-ray tubes Raster-scan CRTs by their nature must refresh the screen since their phosphors will fade and the image will disappear quickly unless refreshed regularly. In a CRT, the vertical scan rate is the number of times per second that the electron beam returns to the upper left corner of the screen to begin drawing a new frame. It is controlled by the vertical blanking signal generated by the video controller, and is partially limited by the monitor's maximum horizontal scan rate. The refresh rate can be calculated from the horizontal scan rate by dividing the scanning frequency by the number of horizontal lines, plus some amount of time to allow for the beam to return to the top. By convention, this is a 1.05x multiplier. For instance, a monitor with a
https://en.wikipedia.org/wiki/Topographical%20code
In medicine, "topographical codes" (or "topography codes") are codes that indicate a specific location in the body. Examples Only the first of these is a system dedicated only to topography. The others are more generalized systems that contain topographic axes. Nomina Anatomica (updated to Terminologia Anatomica) ICD-O SNOMED MeSH (the 'A' axis) See also Medical classification
https://en.wikipedia.org/wiki/MAXI%20J1659-152
MAXI J1659-152 is a rapidly rotating black hole/star system, discovered by NASA's Swift space telescope on September 25, 2010. On March 19, 2013, ESA's XMM-Newton space telescope helped to identify a star and a black hole that orbit each other at the rate of once every 2.4 hours. The black hole and the star orbit their common center of mass. Because the star is the lighter object, it lies farther from this point and has to "travel around its larger orbit at a breakneck speed of two million kilometers per hour", 500 to 600 km/s, or about 20 times Earth's orbital velocity. The star was the fastest moving star ever seen in an X-ray binary system until the discovery of system 47 Tuc X9. On the other hand, the black hole orbits at 'only' . The black hole in this compact pairing is at least three times more massive than the Sun, while its red dwarf companion star has a mass only 20% that of the Sun. The pair is separated by roughly a million kilometers – for comparison the distance to the Sun from Earth is about 150 million kilometers. See also MAXI (ISS Experiment) S4716
https://en.wikipedia.org/wiki/Comparison%20of%20source-code-hosting%20facilities
A source-code-hosting facility (also known as forge) is a file archive and web hosting facility for source code of software, documentation, web pages, and other works, accessible either publicly or privately. They are often used by open-source software projects and other multi-developer projects to maintain revision and version history, or version control. Many repositories provide a bug tracking system, and offer release management, mailing lists, and wiki-based project documentation. Software authors generally retain their copyright when software is posted to a code hosting facilities. General information Features Version control systems Popularity Discontinued: CodePlex, Gna!, Google Code. Specialized hosting facilities The following are open-source software hosting facilities that only serve a specific narrowly focused community or technology. Former hosting facilities Alioth (Debian) – In 2018, Alioth has been replaced by a GitLab based solution hosted on salsa.debian.org. Alioth has been finally switched off in June 2018. BerliOS – abandoned in April 2014 Betavine – abandoned somewhere in 2015. CodeHaus – shut down in May 2015 CodePlex – shut down in December 2017. Fedora Hosted – closed in March 2017 Gitorious – shut down in June 2015. Gna! – shut down in 2017. Google Code – closed in January 2016, all projects archived. See http://code.google.com/archive/. java.net – Java.net and kenai.com hosting closed April 2017. Phabricator – wound down operations 1 June 2021, all projects continued to be hosted with very limited support after 31 August 2021. Tigris.org – shut down in July 2020. Mozdev.org - shut down in July 2020. See also Comparison of version-control software Distributed version control Forge (software) List of free software project directories List of version-control software Source code escrow for closed-source software Version control (source-code-management systems) Notes
https://en.wikipedia.org/wiki/Glossary%20of%20leaf%20morphology
The following terms are used to describe leaf morphology in the description and taxonomy of plants. Leaves may be simple (a single leaf blade or lamina) or compound (with several leaflets). The edge of the leaf may be regular or irregular, may be smooth or bearing hair, bristles or spines. For more terms describing other aspects of leaves besides their overall morphology see the leaf article. The terms listed here all are supported by technical and professional usage, but they cannot be represented as mandatory or undebatable; readers must use their judgement. Authors often use terms arbitrarily, or coin them to taste, possibly in ignorance of established terms, and it is not always clear whether because of ignorance, or personal preference, or because usages change with time or context, or because of variation between specimens, even specimens from the same plant. For example, whether to call leaves on the same tree "acuminate", "lanceolate", or "linear" could depend on individual judgement, or which part of the tree one collected them from. The same cautions might apply to "caudate", "cuspidate", and "mucronate", or to "crenate", "dentate", and "serrate." Another problem is to establish definitions that meet all cases or satisfy all authorities and readers. For example, it seems altogether reasonable to define a mucro as "a small sharp point as a continuation of the midrib", but it may not be clear how small is small enough, how sharp is sharp enough, how hard the point must be, and what to call the point when one cannot tell whether the leaf has a midrib at all. Various authors or field workers might come to incompatible conclusions, or might try to compromise by qualifying terms so vaguely that a description of a particular plant practically loses its value. Use of these terms is not restricted to leaves, but may be applied to morphology of other parts of plants, e.g. bracts, bracteoles, stipules, sepals, petals, carpels or scales. Some of these terms are als
https://en.wikipedia.org/wiki/Microbarom
In acoustics, microbaroms, also known as the "voice of the sea", are a class of atmospheric infrasonic waves generated in marine storms by a non-linear interaction of ocean surface waves with the atmosphere. They typically have narrow-band, nearly sinusoidal waveforms with amplitudes up to a few microbars, and wave periods near 5 seconds (0.2 hertz). Due to low atmospheric absorption at these low frequencies, microbaroms can propagate thousands of kilometers in the atmosphere, and can be readily detected by widely separated instruments on the Earth's surface. History The reason for the discovery of this phenomenon was an accident: the aerologists working at the marine hydrometeorological stations and watercraft drew attention to the strange pain that a person experiences when approaching the surface of a standard meteorological probe (a balloon filled with hydrogen). During one of the expeditions, this effect was demonstrated to the Soviet academician V. V. Shuleikin by the chief meteorologist V. A. Berezkin. This phenomenon drew genuine interest among scientists; in order to study it, special equipment was designed to record powerful but low-frequency vibrations that are not audible to human ears. As a result of several series of experiments, the physical essence of this phenomenon was clarified and in 1935 when V.V. Shuleikin published his first work entirely devoted to the infrasonic nature of the “voice of the sea”. Microbaroms were first described in United States in 1939 by American seismologists Hugo Benioff and Beno Gutenberg at the California Institute of Technology at Pasadena, based on observations from an electromagnetic microbarograph, consisting of a wooden box with a low-frequency loudspeaker mounted on top. They noted their similarity to microseisms observed on seismographs, and correctly hypothesized that these signals were the result of low pressure systems in the Northeast Pacific Ocean. In 1945, Swiss geoscientist L. Saxer showed the first re
https://en.wikipedia.org/wiki/Reproductive%20toxicity
Reproductive toxicity refers to the potential risk from a given chemical, physical or biologic agent to adversely affect both male and female fertility as well as offspring development. Reproductive toxicants may adversely affect sexual function, ovarian failure, fertility as well as causing developmental toxicity in the offspring. Lowered effective fertility related to reproductive toxicity relates to both male and female effects alike and is reflected in decreased sperm counts, semen quality and ovarian failure. Infertility is medically defined as a failure of a couple to conceive over the course of one year of unprotected intercourse. As many as 20% of couples experience infertility. Among men, oligospermia is defined as a paucity of viable spermatozoa in the semen, whereas azoospermia refers to the complete absence of viable spermatozoa in the semen. The Globally Harmonized System of Classification and Labelling of Chemicals (GHS) separates reproductive toxicity from germ cell mutagenicity and carcinogenicity, even though both these hazards may also affect fertility. Effects Many drugs can affect the human reproductive system. Their effects can be desired (hormonal contraception), a minor unwanted side effect (many antidepressants) or a major public health problem (thalidomide). However, most studies of reproductive toxicity have focused on occupational or environmental exposure to chemicals and their effects on reproduction. Both consumption of alcohol and tobacco smoking are known to be "toxic for reproduction" in the sense used here. One well-known group of substances which are toxic for reproduction are teratogens – substances which cause birth defects. (S)-thalidomide is possibly the most notorious of these. Another group of substances which have received much attention (and prompted some controversy) as possibly toxic for reproduction are the so-called endocrine disruptors. Endocrine disruptors change how hormones are produced and how they int
https://en.wikipedia.org/wiki/Cross-fostering
Cross-fostering is a technique used in animal husbandry, animal science, genetic and nature versus nurture studies, and conservation, whereby offspring are removed from their biological parents at birth and raised by surrogates, typically of a different species, hence 'cross.' This can also occasionally occur in nature. Animal husbandry Cross-fostering young animals is usually done to equalize litter size. Individual animals born in large litters are faced with much more competition for resources, such as breast milk, food and space, than individuals born in smaller litters. Herd managers will typically move some individuals from a large litter to a smaller litter where they will be raised by a non-biological parent. This is typically done in pig farming because litters with up to 15 piglets are common. A sow with a large litter may have difficulty producing enough milk for all piglets, or the sow may not have enough functional teats to feed all piglets simultaneously. When this occurs, smaller or weaker piglets are at risk of starving to death. Herd managers will often transfer some piglets from a large litter to another lactating sow which either has a smaller litter or has had her own biological piglets recently weaned. Herd managers will typically try to equalize litters by number and also weight of individuals. When done successfully, cross-fostering reduces piglet mortality. In research Cross-fostering can be used to study the impact of postnatal environment on genetic-linked diseases as well as on behavioural pattern. In behavioral studies, if cross-fostered offspring show a behavioral trait similar to their biological parents and dissimilar from their foster parents, a behavior can be shown to have a genetic basis. Similarly if the offspring develops traits dissimilar to their biological parents and similar to their foster parents environmental factors are shown to be dominant. In many cases there is a blend of the two, which shows both genes and environme
https://en.wikipedia.org/wiki/Helmholtz%20reciprocity
The Helmholtz reciprocity principle describes how a ray of light and its reverse ray encounter matched optical adventures, such as reflections, refractions, and absorptions in a passive medium, or at an interface. It does not apply to moving, non-linear, or magnetic media. For example, incoming and outgoing light can be considered as reversals of each other, without affecting the bidirectional reflectance distribution function (BRDF) outcome. If light was measured with a sensor and that light reflected on a material with a BRDF that obeys the Helmholtz reciprocity principle one would be able to swap the sensor and light source and the measurement of flux would remain equal. In the computer graphics scheme of global illumination, the Helmholtz reciprocity principle is important if the global illumination algorithm reverses light paths (for example raytracing versus classic light path tracing). Physics The Stokes–Helmholtz reversion–reciprocity principle was stated in part by Stokes (1849) and with reference to polarization on page 169 of Hermann Helmholtz's Handbuch der physiologischen Optik of 1856 as cited by Gustav Kirchhoff and by Max Planck. As cited by Kirchhoff in 1860, the principle is translated as follows:A ray of light proceeding from point 1 arrives at point 2 after suffering any number of refractions, reflections, &c. At point 1 let any two perpendicular planes a1, b1 be taken in the direction of the ray; and let the vibrations of the ray be divided into two parts, one in each of these planes. Take similar planes a2, b2 in the ray at point 2; then the following proposition may be demonstrated. If when the quantity of light i polarized in the plane a1 proceeds from 1 in the direction of the given ray, that part k thereof of light polarized in a2 arrives at 2, then, conversely, if the quantity of light i polarized in a2 proceeds from 2, the same quantity of light k polarized in a1 [Kirchhoff's published text here corrected by Wikipedia editor to agr
https://en.wikipedia.org/wiki/List%20of%20awards%20in%20bioinformatics%20and%20computational%20biology
The following is a list of awards in the fields of bioinformatics and computational biology. Awards ASBMB DeLano Award for Computational Biosciences - "to a scientist for the most accessible and innovative development or application of computer technology to enhance research in the life sciences at the molecular level" Benjamin Franklin Award for Open Access in the Life Sciences - "to an individual who has, in his or her practice, promoted free and open access to the materials and methods used in the life sciences" ISCB Innovator Award - "leading scientists who are within two decades post-degree, who consistently make outstanding contributions to the field, and who continue to forge new directions" ISCB Overton Prize - "for outstanding accomplishment to a scientist in the early to mid stage of his or her career" ISCB Accomplishment by a Senior Scientist Award - "members of the computational biology community who are more than 12 to 15 years post-degree and have made major contributions to the field of computational biology through research, education, service, or a combination of the three" Research Parasite Award - "Outstanding contributions to the rigorous secondary analysis of data" The SIB Bioinformatics Awards - since 2008, the Swiss Institute of Bioinformatics has delivered awards to acknowledge early career bioinformaticians and ground-breaking resources of national or international standing. See also List of biology awards List of computer-related awards
https://en.wikipedia.org/wiki/Lynne%20Butler
Lynne Marie Butler (born 1959) is an American mathematician whose research interests include algebraic combinatorics, group theory, and mathematical statistics. She is a professor of mathematics at Haverford College. Early life and education Butler's parents were both medical professionals. She is the identical twin sister of Laurie Butler, now a professor of chemistry at the University of Chicago; they were the youngest of six siblings, and grew up in Garden City, New York. After Butler's father had a stroke, the family moved to St. Petersburg, Florida, where Butler went to high school. She credits a high school mathematics teacher, Mr. Mead, for sparking her interest in mathematics, writing "He wanted to learn group theory, and so did I, so we learned together." Butler majored in mathematics at the University of Chicago, graduating in 1981. She went to the Massachusetts Institute of Technology for doctoral study in mathematics, intending to work in algebraic topology despite warnings about the professor she would be working with from other women in the department. He thought that the prospect of marriage and children would make women unable to concentrate on mathematics, refused to let her read his recent work, and eventually told her that her difficulty in reading a paper "confirmed his bad opinion of female mathematicians". On the advice of the department chair, in order to avoid the possibility that her former advisor would be asked to recommend her, she changed her research topic. Instead, she began working in combinatorics with Richard P. Stanley as her new advisor. She completing her Ph.D. in 1986. In 2013, bored with combinatorics and noting that many of her female students were doing particularly well the application-oriented components of her classes, she returned to the University of Chicago for a master's degree in statistics. Career After completing her doctorate, Butler became a postdoctoral researcher and then, a year later, an assistant profess
https://en.wikipedia.org/wiki/Partial%20volume%20%28imaging%29
The partial volume effect can be defined as the loss of apparent activity in small objects or regions because of the limited resolution of the imaging system. It occurs in medical imaging and more generally in biological imaging such as positron emission tomography (PET) and single-photon emission computed tomography (SPECT). If the object or region to be imaged is less than twice the full width at half maximum (FWHM) resolution in x-, y- and z-dimension of the imaging system, the resultant activity in the object or region is underestimated. A higher resolution decreases this effect, as it better resolves the tissue. Partial volume loss alone occurs only when the surrounding activity of the object or region is zero, or less or more than the object. And the loss of activity in the object generally involves an increase in activity in adjacent regions, which are considered outside the object (i.e., spillover). For a small object (e.g., a voxel) or an object of size comparable to the spatial resolution of the imaging system, the observed activity is the sum of activity due to partial volume loss plus spillover from adjacent regions. The method to correct for the partial volume effect is referred to as partial volume correction (see ). See also Spillover (imaging)
https://en.wikipedia.org/wiki/Data%20breach
A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen, altered or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, information leakage and data spill. Incidents range from concerted attacks by individuals who hack for personal gain or malice (black hats), organized crime, political activists or national governments, to poorly configured system security or careless disposal of used computer equipment or data storage media. Leaked information can range from matters compromising national security, to information on actions which a government or official considers embarrassing and wants to conceal. A deliberate data breach by a person privy to the information, typically for political purposes, is more often described as a "leak". Data breaches may involve financial information such as credit card and debit card details, bank details, personal health information (PHI), Personally identifiable information (PII), trade secrets of corporations or intellectual property. Data breaches may involve overexposed and vulnerable unstructured data – files, documents, and sensitive information. Data breaches can be quite costly to organizations with direct costs (remediation, investigation, etc.) and indirect costs (reputational damages, providing cyber security to victims of compromised data, etc.). According to the nonprofit consumer organization Privacy Rights Clearinghouse, a total of 227,052,199 individual records containing sensitive personal information were involved in security breaches in the United States between January 2005 and May 2008, excluding incidents where sensitive data was apparently not actually exposed. Many jurisdictions have passed data breach notification laws, which requires a company that has been subject to a data breach to inform customers and take other steps to remediate possible injuries. 50 U.S. states have some
https://en.wikipedia.org/wiki/Fraction
A fraction (from , "broken") represents a part of a whole or, more generally, any number of equal parts. When spoken in everyday English, a fraction describes how many parts of a certain size there are, for example, one-half, eight-fifths, three-quarters. A common, vulgar, or simple fraction (examples: and ) consists of an integer numerator, displayed above a line (or before a slash like ), and a non-zero integer denominator, displayed below (or after) that line. If these integers are positive, then the numerator represents a number of equal parts, and the denominator indicates how many of those parts make up a unit or a whole. For example, in the fraction , the numerator 3 indicates that the fraction represents 3 equal parts, and the denominator 4 indicates that 4 parts make up a whole. The picture to the right illustrates of a cake. Other uses for fractions are to represent ratios and division. Thus the fraction can also be used to represent the ratio 3:4 (the ratio of the part to the whole), and the division (three divided by four). We can also write negative fractions, which represent the opposite of a positive fraction. For example, if represents a half-dollar profit, then − represents a half-dollar loss. Because of the rules of division of signed numbers (which states in part that negative divided by positive is negative), −, and all represent the same fraction negative one-half. And because a negative divided by a negative produces a positive, represents positive one-half. In mathematics the set of all numbers that can be expressed in the form , where a and b are integers and b is not zero, is called the set of rational numbers and is represented by the symbol Q or ℚ, which stands for quotient. A number is a rational number precisely when it can be written in that form (i.e., as a common fraction). However, the word fraction can also be used to describe mathematical expressions that are not rational numbers. Examples of these usages include algebra
https://en.wikipedia.org/wiki/Transparent%20Anatomical%20Manikin
The Transparent Anatomical Manikin (TAM) is a three-dimensional, transparent anatomical model of a human being, created for medical instructional purposes. TAM was created by designer – Richard Rush, in 1968. It consisted of a see-through reproduction of a female human body, with various organs being wired so specific body systems would light up on command on cue, with a pre-recorded educational presentation. Rush eventually produced 42 TAMs, many of which are still displayed in US health education museums. A cheaper model – the Mobile TAM, was created by Rush in the 1980s. The Transparent Anatomical Manikin was used as cover art on the 1970 soundtrack album Music from The Body, by Roger Waters and Ron Geesin, and the American alternative rock band Nirvana's 1993 album In Utero. See also Resusci Anne, a common manikin used in CPR training TraumaMan, a surgical training manikin used in ATLS training Harvey mannequin Medical education mannequin
https://en.wikipedia.org/wiki/Projection%20pursuit%20regression
In statistics, projection pursuit regression (PPR) is a statistical model developed by Jerome H. Friedman and Werner Stuetzle which is an extension of additive models. This model adapts the additive models in that it first projects the data matrix of explanatory variables in the optimal direction before applying smoothing functions to these explanatory variables. Model overview The model consists of linear combinations of ridge functions: non-linear transformations of linear combinations of the explanatory variables. The basic model takes the form where xi is a 1 × p row of the design matrix containing the explanatory variables for example i, yi is a 1 × 1 prediction, {βj} is a collection of r vectors (each a unit vector of length p) which contain the unknown parameters, {fj} is a collection of r initially unknown smooth functions that map from ℝ → ℝ, and r is a hyperparameter. Good values for r can be determined through cross-validation or a forward stage-wise strategy which stops when the model fit cannot be significantly improved. As r approaches infinity and with an appropriate set of functions {fj}, the PPR model is a universal estimator, as it can approximate any continuous function in ℝp. Model estimation For a given set of data , the goal is to minimize the error function over the functions and vectors . No method exists for solving over all variables at once, but it can be solved via alternating optimization. First, consider each pair individually: Let all other parameters be fixed, and find a "residual", the variance of the output not accounted for by those other parameters, given by The task of minimizing the error function now reduces to solving for each j in turn. Typically new pairs are added to the model in a forward stage-wise fashion. Aside: Previously-fitted pairs can be readjusted after new fit-pairs are determined by an algorithm known as backfitting, which entails reconsidering a previous pair, recalculating the residual given how ot
https://en.wikipedia.org/wiki/Cold%20liquor%20tank
Cold liquor tanks, cold water tanks as they called in the brewery. Cold liquor tank is a buffer vessel and it carries cold water that will be used to cool the bitter wort down to a fermentable temperature field after boiling. Two stage heat exchanger The first stage is ground water and it running back to HLT to next sparge. Glycol serves as a secondary cooling system and its back to glycol container. Valves on both channels, and a temp exploration right after the heat exchanger. Heats up your water for your next brew without using any extra power, reuses your water you would use from a CLT, and saves you the space of a whole tank. Primary purpose of the CLT’s Cold liquor tanks are used for brewing process and CLT's also called buffer tanks. Buffer tanks contain cold water used for the purpose of cooling the bitter wort temperature down to the fermentable level range after boiling. This process is done by wort cooler. Temperature The cold storage tank that been a single skin vessel and should be in a room which requires cold temperature. Cold liquid tanks connected with glycol chiller tanks and its impressed inside water. Frequency level of the cooling capacity of the beer helps to recommend the appropriate volume and cooling methods. It can contain 1000+ litre and when water can be passed through the heat exchanger and when it run hot liquid tank temperature near about 70 to 80-degree Celsius. It's a typical process and its help continuous brewing without any break and no need waiting for gain actual temperature. Features of cold liquor tanks 12 Gauge 304L Stainless Steel Construction Double Walled and Insulated 1 1/2" Polyurethane Lining Internal Welds Ground to a Healthful Food Grade Finish Exterior Polished to #4 Brushed Finish Flat Bottom with 1 1/2" TC Center Drain Dome Top with 18" Round Manway 1 1/2" TC Water Inlet Port 1 1/2" TC Water Return Port 1 1/2" TC Temperature Port Removable Level Gauge Water Re-Circulation Assembly Sizes of
https://en.wikipedia.org/wiki/Naive%20set%20theory
Naive set theory is any of several theories of sets used in the discussion of the foundations of mathematics. Unlike axiomatic set theories, which are defined using formal logic, naive set theory is defined informally, in natural language. It describes the aspects of mathematical sets familiar in discrete mathematics (for example Venn diagrams and symbolic reasoning about their Boolean algebra), and suffices for the everyday use of set theory concepts in contemporary mathematics. Sets are of great importance in mathematics; in modern formal treatments, most mathematical objects (numbers, relations, functions, etc.) are defined in terms of sets. Naive set theory suffices for many purposes, while also serving as a stepping stone towards more formal treatments. Method A naive theory in the sense of "naive set theory" is a non-formalized theory, that is, a theory that uses natural language to describe sets and operations on sets. The words and, or, if ... then, not, for some, for every are treated as in ordinary mathematics. As a matter of convenience, use of naive set theory and its formalism prevails even in higher mathematics – including in more formal settings of set theory itself. The first development of set theory was a naive set theory. It was created at the end of the 19th century by Georg Cantor as part of his study of infinite sets and developed by Gottlob Frege in his Grundgesetze der Arithmetik. Naive set theory may refer to several very distinct notions. It may refer to Informal presentation of an axiomatic set theory, e.g. as in Naive Set Theory by Paul Halmos. Early or later versions of Georg Cantor's theory and other informal systems. Decidedly inconsistent theories (whether axiomatic or not), such as a theory of Gottlob Frege that yielded Russell's paradox, and theories of Giuseppe Peano and Richard Dedekind. Paradoxes The assumption that any property may be used to form a set, without restriction, leads to paradoxes. One common example is Rus
https://en.wikipedia.org/wiki/Lonicera%20%C3%97%20purpusii
Lonicera × purpusii, the Purpus honeysuckle, is a hybrid species of flowering plant in the family Caprifoliaceae. It originated as a cross of garden origin between two Chinese species, L. fragrantissima and L. standishii. Growing to tall and broad, it is a somewhat untidy shrub with ovate leaves and small paired cream/yellow flowers in winter. The flowers are strongly fragrant with the typical honeysuckle scent. It is extremely hardy, tolerating temperatures down to and a wide range of conditions. In a favourable environment it may be evergreen but is otherwise deciduous. In the latter case, the flowers are borne on the bare branches. The widely grown cultivar 'Winter Beauty' is a recipient of the Royal Horticultural Society's Award of Garden Merit. It flowers best in full sun.
https://en.wikipedia.org/wiki/Sham%20surgery
Sham surgery (placebo surgery) is a faked surgical intervention that omits the step thought to be therapeutically necessary. In clinical trials of surgical interventions, sham surgery is an important scientific control. This is because it isolates the specific effects of the treatment as opposed to the incidental effects caused by anesthesia, the incisional trauma, pre- and postoperative care, and the patient's perception of having had a regular operation. Thus sham surgery serves an analogous purpose to placebo drugs, neutralizing biases such as the placebo effect. Human research A number of studies done under Institutional Review Board-approved settings have delivered important and surprising results. With the progress in minimally invasive surgery, sham procedures can be more easily performed as the sham incision can be kept small similarly to the incision in the studied procedure. A review of studies with sham surgery found 53 such studies: in 39 there was improvement with the sham operation and in 27 the sham procedure was as good as the real operation. Sham-controlled interventions have therefore identified interventions that are useless but had been believed by the medical community to be helpful based on studies without the use of sham surgery. Examples Cardiovascular diseases In 1939 Fieschi introduced internal mammary ligation as a procedure to improve blood flow to the heart. Not until a controlled study was done two decades later could it be demonstrated that the procedure was only as effective as the sham surgery. Central nervous system disease In neurosurgery, cell-transplant surgical interventions were offered in many centers in the world for patients with Parkinson disease until sham-controlled experiments involving the drilling of burr holes into the skull demonstrated such interventions to be ineffective and possibly harmful. Subsequently, over 90% of surveyed investigators believed that future neurosurgical interventions (e.g. gene transfer
https://en.wikipedia.org/wiki/Clock%20rate
In computing, the clock rate or clock speed typically refers to the frequency at which the clock generator of a processor can generate pulses, which are used to synchronize the operations of its components, and is used as an indicator of the processor's speed. It is measured in the SI unit of frequency hertz (Hz). The clock rate of the first generation of computers was measured in hertz or kilohertz (kHz), the first personal computers (PCs) to arrive throughout the 1970s and 1980s had clock rates measured in megahertz (MHz), and in the 21st century the speed of modern CPUs is commonly advertised in gigahertz (GHz). This metric is most useful when comparing processors within the same family, holding constant other features that may affect performance. Determining factors Binning Manufacturers of modern processors typically charge higher prices for processors that operate at higher clock rates, a practice called binning. For a given CPU, the clock rates are determined at the end of the manufacturing process through actual testing of each processor. Chip manufacturers publish a "maximum clock rate" specification, and they test chips before selling them to make sure they meet that specification, even when executing the most complicated instructions with the data patterns that take the longest to settle (testing at the temperature and voltage that gives the lowest performance). Processors successfully tested for compliance with a given set of standards may be labeled with a higher clock rate, e.g., 3.50 GHz, while those that fail the standards of the higher clock rate yet pass the standards of a lower clock rate may be labeled with the lower clock rate, e.g., 3.3 GHz, and sold at a lower price. Engineering The clock rate of a CPU is normally determined by the frequency of an oscillator crystal. Typically a crystal oscillator produces a fixed sine wave—the frequency reference signal. Electronic circuitry translates that into a square wave at the same frequency for di
https://en.wikipedia.org/wiki/Edison%20Volta%20Prize
The Edison Volta Prize is awarded biennially by the European Physical Society (EPS) to individuals or groups of up to three people in recognition of outstanding achievements in physics. The award consists of a diploma, a medal, and 10,000 euros in prize money. The award has been established in 2012 by the Centro di Cultura Scientifica "Alessandro Volta", Edison S.p.A. and the European Physical Society. 2020 Laureates The 2020 EPS Edison Volta Prize was awarded to: Klaus Ensslin, ETH Zurich Laboratorium für Festkörperphysik, Switzerland Jurgen Smet, Max Planck Institute for Solid State Research, Stuttgart, Germany Dieter Weiss, Universität Regensburg Institut für experimentelle und angewandte Physik, Germany "for their seminal contributions to condensed matter nano-science". 2018 Laureates The 2018 EPS Edison Volta Prize was awarded to: Alain Brillet, CNRS, Observatoire de la Côte d’Azur, Nice, France Karsten Danzmann, Max-Planck- Institut für Gravitationsphysik and Leibniz University, Hannover, Germany Adalberto Giazotto, (died 2017), INFN, Pisa, Italy Jim Hough, University of Glasgow, UK for "the development, in their respective countries, of key technologies and innovative experimental solutions, that enabled the advanced interferometric gravitational wave detectors LIGO and Virgo to detect the first gravitational wave signals from mergers of Black Holes and of Neutron Stars" 2016 Laureate 2016 - The 2016 EPS Edison Volta Prize was awarded to Michel A.G. Orrit, University of Leiden, the Netherlands for "seminal contributions to optical science, to the field of single-molecule spectroscopy and imaging (first single molecule detection by fluorescence and first optical detection of magnetic resonance in single molecule) and for pioneering investigations into the photoblinking and photobleaching behaviors of individual molecules at the heart of many current optical super-resolution experiments." 2015 Laureates The 2015 EPS Edison Volta Prize has been awa
https://en.wikipedia.org/wiki/Spotted%20bamboo
Spotted bamboo refers to several types of bamboo with stems that are mottled by dark spots, sometimes considered to be within the genus Phyllostachys and forms of Phyllostachys bambusoides, also known as teardrop bamboo and as mottled bamboo. Phyllostachys bambusoides forma. lacrima-deae is widely encountered. Distribution Phyllostachys bambusoides forma. lacrima-deae, is native to Hunan, Henan, Jiangxi and Zhejiang, and especially the Jiuyi Mountains areas of China. Uses The stems of the spotted bamboos are esteemed and cost-effective for making the handles of Chinese brushes, used for calligraphy and painting. Examples of brushes from the eighth century CE (corresponding to the Tang Dynasty, in China) are preserved in the Shōsōin, in Japan; in fact, the prestige value of this type of bamboo was evidently so high at the time that among the Shōsōin treasures are preserved objects made out of some sort of imitation spotted bamboo. Legendary origins Legend has it that when Emperor Shun died suddenly during a trip to Cangwu, the tears of his two concubines, (the Xiang River goddesses Ehuang (娥皇) and Nüying (女英)) dropped onto surrounding bamboo and stained it forever. Mottled bamboo is known for being a decorative plant. The Chinese name of originates from the legend. Xiang (湘) refers to the Xiang River, where the story supposedly took place, fei (妃) means "concubine" and zhu (竹) means "bamboo", thus the "bamboo of the concubines by the Xiang River". The term "mottled bamboo" is also used to describe online discussion board moderators in Mainland China, because when the word for moderator (版主) is entered using the keyboard in Pinyin, the word for mottled bamboo (斑竹) appears as the first option, as they sound very similar. Hence, mottled bamboo gradually became another way of calling a moderator. See also Cosmopterix phyllostachysea Bamboo Dongting Lake Four Treasures of the Study Mottled Bamboo Xiaoxiang Xiaoxiang poetry Xiang River Xiang River goddesse
https://en.wikipedia.org/wiki/Somos%20sequence
In mathematics, a Somos sequence is a sequence of numbers defined by a certain recurrence relation, described below. They were discovered by mathematician Michael Somos. From the form of their defining recurrence (which involves division), one would expect the terms of the sequence to be fractions, but nevertheless many Somos sequences have the property that all of their members are integers. Recurrence equations For an integer number k larger than 1, the Somos-k sequence is defined by the equation when k is odd, or by the analogous equation when k is even, together with the initial values ai = 1 for i < k. For k = 2 or 3, these recursions are very simple (there is no addition on the right-hand side) and they define the all-ones sequence (1, 1, 1, 1, 1, 1, ...). In the first nontrivial case, k = 4, the defining equation is while for k = 5 the equation is These equations can be rearranged into the form of a recurrence relation, in which the value an on the left hand side of the recurrence is defined by a formula on the right hand side, by dividing the formula by an − k. For k = 4, this yields the recurrence while for k = 5 it gives the recurrence While in the usual definition of the Somos sequences, the values of ai for i < k are all set equal to 1, it is also possible to define other sequences by using the same recurrences with different initial values. Sequence values The values in the Somos-4 sequence are 1, 1, 1, 1, 2, 3, 7, 23, 59, 314, 1529, 8209, 83313, 620297, 7869898, ... . The values in the Somos-5 sequence are 1, 1, 1, 1, 1, 2, 3, 5, 11, 37, 83, 274, 1217, 6161, 22833, 165713, ... . The values in the Somos-6 sequence are 1, 1, 1, 1, 1, 1, 3, 5, 9, 23, 75, 421, 1103, 5047, 41783, 281527, ... . The values in the Somos-7 sequence are 1, 1, 1, 1, 1, 1, 1, 3, 5, 9, 17, 41, 137, 769, 1925, 7203, 34081, ... . Integrality The form of the recurrences describing the Somos sequences involves divisions, making it appear likely that the sequences defined
https://en.wikipedia.org/wiki/Flags%20of%20regions%20of%20Egypt
This list of flags of regions of Egypt shows the flags of the 27 governorates of Egypt. Historical See also Flag of Egypt List of Egyptian flags External links Egypt geography-related lists Flags of Egypt Egypt Egypt
https://en.wikipedia.org/wiki/Glide%20OS
Glide OS was a cross-platform web desktop developed by Jumptuit. It was notable for operating on both desktop operating systems, like Microsoft Windows, Mac OS X and Linux and its contemporary mobile operating systems like Apple iOS, Google Android and Honeycomb, BlackBerry OS and BlackBerry Tablet OS (QNX), webOS, Symbian and Windows Mobile. Glide OS was compatible with a variety of web browsers, including Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, and Google Chrome. History Jumptuit (originally TransMedia) was founded by Donald Leka. He began to develop a cloud computing platform that could manage media across proprietary platforms. The Company shifted its focus from business clients to consumers unveiling Glide at the National Association of Broadcasters (NAB) Convention on April 18, 2005 and launching a free consumer version on November 30, 2005. The latest HTML5 version of Glide was 4.0 and was presented at the Harvard University Cyberposium 16 Technology Conference on November 13, 2010. The previous version, 3.0, was launched on May 20, 2008 at the All Things Digital Conference (AllThingsD). In 2006, Intel announced plans to include Glide on ultra-mobile PCs. However the project has not manifested as a consumer product. Glide provided support for most tablets of its day, including the Apple iPad, HP Touchpad, BlackBerry Playbook, Samsung Galaxy, Motorola XOOM and most recently the Amazon Kindle Fire and Barnes & Noble Nook Tablet. Glide OS and the Company have won numerous awards, including PC World's Top 100 Products of the Year, Laptop Magazine's Top 50 Products of the Year, EContent Magazine's Top 100 Companies of the Year and Red Herring's Top 100 Companies of the Year among others. Features Glide featured a desktop-like interface which displayed the Desktop, Glide HD, and Web Portal. Glide included several web-based applications, including an integrated office suite, media players, photo editor, calendar software, webmail, addres
https://en.wikipedia.org/wiki/Hierarchical%20and%20recursive%20queries%20in%20SQL
A hierarchical query is a type of SQL query that handles hierarchical model data. They are special cases of more general recursive fixpoint queries, which compute transitive closures. In standard SQL:1999 hierarchical queries are implemented by way of recursive common table expressions (CTEs). Unlike Oracle's earlier connect-by clause, recursive CTEs were designed with fixpoint semantics from the beginning. Recursive CTEs from the standard were relatively close to the existing implementation in IBM DB2 version 2. Recursive CTEs are also supported by Microsoft SQL Server (since SQL Server 2008 R2), Firebird 2.1, PostgreSQL 8.4+, SQLite 3.8.3+, IBM Informix version 11.50+, CUBRID, MariaDB 10.2+ and MySQL 8.0.1+. Tableau has documentation describing how CTEs can be used. TIBCO Spotfire does not support CTEs, while Oracle 11g Release 2's implementation lacks fixpoint semantics. Without common table expressions or connected-by clauses it is possible to achieve hierarchical queries with user-defined recursive functions. Common table expression A common table expression, or CTE, (in SQL) is a temporary named result set, derived from a simple query and defined within the execution scope of a SELECT, INSERT, UPDATE, or DELETE statement. CTEs can be thought of as alternatives to derived tables (subquery), views, and inline user-defined functions. Common table expressions are supported by Teradata (starting with version 14), IBM Db2, Informix (starting with version 14.1), Firebird (starting with version 2.1), Microsoft SQL Server (starting with version 2005), Oracle (with recursion since 11g release 2), PostgreSQL (since 8.4), MariaDB (since 10.2), MySQL (since 8.0), SQLite (since 3.8.3), HyperSQL, Informix (since 14.10), Google BigQuery, Sybase (starting with version 9), Vertica, H2 (experimental), and many others. Oracle calls CTEs "subquery factoring". The syntax for a CTE (which may or may not be recursive) is as follows: WITH [RECURSIVE] with_query [, ...] SELEC
https://en.wikipedia.org/wiki/Phase-gate%20process
A phase-gate process (also referred to as a waterfall process) is a project management technique in which an initiative or project (e.g., new product development, software development, process improvement, business change) is divided into distinct stages or phases, separated by decision points (known as gates). At each gate, continuation is decided by (typically) a manager, steering committee, or governance board. The decision is made based on forecasts and information available at the time, including the business case, risk analysis, and availability of necessary resources (e.g., money, people with correct competencies). History A phased approach to investment decisions for development arose in large-scale projects for mechanical and chemical engineering, particularly since the 1940s. One source described eight phases. In 1958, the American Association of Cost Engineers created four standard cost estimate type classifications to match these development and approval phases. Other industries with complex products and projects picked up on the process. For example, NASA practiced the concept of phased development in the 1960s with its phased project planning or what is often called phased review process. The phased review process was intended to break up the development of any project into a series of phases that could be individually reviewed in sequence. Review points at the end of each phase required that a number of criteria be met before the project could progress to the next phase. The phased review process consisted of five phases with periodic development reviews between phases. NASA's phased review process is considered a first generation process because it did not take into consideration the analysis of external markets in new product development. The waterfall process variant arose through publication of Winston Royce's paper on large developments, as it illustrated work cascading down from each phase as a series of waterfalls from which work could not
https://en.wikipedia.org/wiki/Ischiopagi
Ischiopagi comes from the Greek word ischio- meaning hip (ilium) and -pagus meaning fixed or united. It is the medical term used for conjoined twins (Class V) who are united at the pelvis. The twins are classically joined with the vertebral axis at 180°. The conjoined twins usually have four arms; two, three or four legs; and typically one external genitalia and anus. It is mostly confused with pygopagus where the twins are joined dorsally at the buttocks facing away from each other, whereas ischiopagus twins are joined ventrally and caudally at the sacrum and coccyx. Parapagus is also similar to ischiopagus; however, parapagus twins are joined side-by-side whereas ischiopagus twins typically have spines connected at a 180° angle, facing away from one another. Classification Ischiopagus Dipus: This is the rarest variety with the twins sharing two legs with no lower extremities on one side. Ischiopagus Tripus: These twins share three legs, the third leg is often two fused legs, or is non-functioning. The twins also usually share only one set of external genitalia. Ischiopagus Tetrapus/Quadripus: This variety has the twins at a symmetrical continuous longitudinal axis with their area of union not broken anteriorly. The axes extends in a straight line but in opposite directions. The lower extremities are oriented at right angles to the axes of the thorax and the adjacent limbs near the union of the ischium belong to the opposite twin. Embryology During embryonic development, twins can form from the splitting of a single embryo (monozygotic) which forms identical twins or the twins can arise from separate oocytes in the same menstrual cycle (dizygotic) which forms fraternal twins. Although the latter is more frequent, monozygotic is the reason conjoined twins can develop. In monozygotic twinning for conjoined twins such as ischiopagi, the twins form by the splitting of a bi-laminar embryonic disc after the formation of the inner cell masses. Thus, making the twins
https://en.wikipedia.org/wiki/Geek
The word geek is a slang term originally used to describe eccentric or non-mainstream people; in current use, the word typically connotes an expert or enthusiast obsessed with a hobby or intellectual pursuit. In the past, it had a generally pejorative meaning of a "peculiar person, especially one who is perceived to be overly intellectual, unfashionable, boring, or socially awkward". In the 21st century, it was reclaimed and used by many people, especially members of some fandoms, as a positive term. Some use the term self-referentially without malice or as a source of pride, often referring simply to "someone who is interested in a subject (usually intellectual or complex) for its own sake". Etymology The word comes from English dialect geek or geck (meaning a "fool" or "freak"; from Middle Low German Geck). Geck is a standard term in modern German and means "fool" or "fop". The root also survives in the Dutch and Afrikaans adjective gek ("crazy"), as well as some German dialects, like the Alsatian word Gickeleshut ("jester's hat"; used during carnival). In 18th century Austria, Gecken were freaks on display in some circuses. In 19th century North America, the term geek referred to a performer in a geek show in a circus, traveling carnival or travelling funfair sideshows (see also freak show). The 1976 edition of the American Heritage Dictionary included only the definition regarding geek shows. This variation of the term was used to comic effect in the 1970s TV shows such as Sanford & Son, and Starsky and Hutch. In the Bounty Hunter episode of 1976 of Starsky and Hutch, stating that "a geek is a freak in a circus side show, who is kept in a pit and they throw snakes and chicken heads at, and he runs around crazy and gobbles them up", and "in 1932 the geeks formed their own union". Professional wrestling manager "Classy" Freddie Blassie recorded a song in the 1970s called "Pencil-Necked Geek". Definitions The 1975 edition of the American Heritage Dictionary,