source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/SMC%20protein | SMC complexes represent a large family of ATPases that participate in many aspects of higher-order chromosome organization and dynamics. SMC stands for Structural Maintenance of Chromosomes.
Classification
Eukaryotic SMCs
Eukaryotes have at least six SMC proteins in individual organisms, and they form three distinct heterodimers with specialized functions:
A pair of SMC1 and SMC3 constitutes the core subunits of the cohesin complexes involved in sister chromatid cohesion. SMC1 and SMC3 also have functions in the repair of DNA double-strained breaks in the process of homologous recombination.
Likewise, a pair of SMC2 and SMC4 acts as the core of the condensin complexes implicated in chromosome condensation. SMC2 and SMC4 have the function of DNA repair as well. Condensin I plays a role in single-strained break repair but not in double-strained breaks. The opposite is true for Condensin II, which plays a role in homologous recombination.
A dimer composed of SMC5 and SMC6 functions as part of a yet-to-be-named complex implicated in DNA repair and checkpoint responses.
Each complex contains a distinct set of non-SMC regulatory subunits. Some organisms have variants of SMC proteins. For instance, mammals have a meiosis-specific variant of SMC1, known as SMC1β. The nematode Caenorhabditis elegans has an SMC4-variant that has a specialized role in dosage compensation.
The following table shows the SMC proteins names for several model organisms and vertebrates:
Prokaryotic SMCs
SMC proteins are conserved from bacteria to humans. Most bacteria have a single SMC protein in individual species that forms a homodimer. Recently SMC proteins have been shown to aid the daughter cells DNA at the origin of replication to guarantee proper segregation. In a subclass of Gram-negative bacteria, including Escherichia coli, a distantly related protein known as MukB plays an equivalent role.
Molecular structure
Primary structure
SMC proteins are 1,000-1,500 amino-acid long. They h |
https://en.wikipedia.org/wiki/Stichting%20Taurus | Stichting Taurus (Taurus Foundation) is a Dutch foundation which uses large herbivores grazing under natural circumstances for nature conservation. Robust cattle and horse breeds are used for this purpose.
Background and practise
Large herbivore species like the aurochs, wisent, elk, and wild horse play an important role in the dynamics between fauna and flora and their grazing is recognized as essential for maintaining the biodiversity in open, park-like areas. Therefore, their re-introduction into Europe's natural areas is deemed necessary, but some of these species are extinct in the wild. For these, their domesticated descendants have to be used.
Stichting Taurus uses Exmoor ponies and Konik horses as large equine grazers. Robust cattle breeds like the Scottish Highland cattle and Galloways are used as well, in addition to aurochs-like primitive breeds like Sayaguesa Cattle, Pajuna Cattle, Maremmana primitivo, Tudanca cattle, and others. The robust grazers can survive without supplementary food during the winter and roam freely in the natural landscape of Keent the whole year.
Further projects
In the early 2000s Stichting Taurus instigated the Tauros Programme, which is a project attempting to breed a type of cattle which comes as close as possible to the extinct aurochs by crossbreeding and selecting the robust and aurochs-like cattle breeds. This aurochs-like cattle is planned to be released into European wild areas. In 2010 it became a cooperative effort when the Dutch organisation Ark Nature (NL) joined the project, and in 2011 it became a European effort when Rewilding Europe joined.
See also
Milovice Nature Reserve |
https://en.wikipedia.org/wiki/Ferrimonadaceae | Ferrimonadaceae is a family in the order of Alteromonadales. |
https://en.wikipedia.org/wiki/Physical%20geodesy | Physical geodesy is the study of the physical properties of Earth's gravity and its potential field (the geopotential), with a view to their application in geodesy.
Measurement procedure
Traditional geodetic instruments such as theodolites rely on the gravity field for orienting their vertical axis along the local plumb line or local vertical direction with the aid of a spirit level. After that, vertical angles (zenith angles or, alternatively, elevation angles) are obtained with respect to this local vertical, and horizontal angles in the plane of the local horizon, perpendicular to the vertical.
Levelling instruments again are used to obtain geopotential differences between points on the Earth's surface. These can then be expressed as "height" differences by conversion to metric units.
Units
Gravity is commonly measured in units of m·s−2 (metres per second squared). This also can be expressed (multiplying by the gravitational constant G in order to change units) as newtons per kilogram of attracted mass.
Potential is expressed as gravity times distance, m2·s−2. Travelling one metre in the direction of a gravity vector of strength 1 m·s−2 will increase your potential by 1 m2·s−2. Again employing G as a multiplier, the units can be changed to joules per kilogram of attracted mass.
A more convenient unit is the GPU, or geopotential unit: it equals 10 m2·s−2. This means that travelling one metre in the vertical direction, i.e., the direction of the 9.8 m·s−2 ambient gravity, will approximately change your potential by 1 GPU. Which again means that the difference in geopotential, in GPU, of a point with that of sea level can be used as a rough measure of height "above sea level" in metres.
Gravity
Potential fields
Geoid
Due to the irregularity of the Earth's true gravity field, the equilibrium figure of sea water, or the geoid, will also be of irregular form. In some places, like west of Ireland, the geoid—mathematical mean sea level—sticks out as much as 10 |
https://en.wikipedia.org/wiki/Hiroshima%20%28painting%29 | Hiroshima, also known as ANT 79, is a painting by the French painter Yves Klein, created in 1961. Through the use of both anthropometry and monochromy, the work pays tribute to the victims of Hiroshima, affected by the atomic bomb dropped on August 6, 1945, by the United States. The painting refers to the imprints of the burned bodies on the walls of the city. It is held in the Menil Collection, in Houston.
History
Hiroshima is one of Klein's famous anthropometries, where he wanted to pay tribute to the victims of this tragic event. His anthropometries feature naked women covered in his own International Klein Blue and whose bodily imprints affixed to a canvas would create the final works. There were two types of anthropometries, the positive (dynamic) anthropometry, in which the model would act as a paintbrush, crawling across the canvas, and the negative (static), like Hiroshima, a method which consisted of spraying paint around a model used as a stencil.
Analysis
The composition of the painting is sober. The imprints of the bodies of the women painted in blue reveal ghostly silhouettes in movement. The work seeks to depicts human beings in general and not women in particular and the features of the characters are indistinguishable. Klein wanted, through negative anthropometry, to make reference to the shadows of human bodies burned by the bomb on the walls of the city of Hiroshima. This work pays tribute to the victims of the Little Boy bomb. The IKB used by Yves Klein marks the imprint of the bodies as nuclear heat was able to do to the victims of the bomb.
Klein said on this work: "...Hiroshima, the shadows of Hiroshima; in the desert of the atomic catastrophe, they were an undoubtedly terrible testimony but nonetheless a testimony of hope for the survival and permanence, even immaterial, of the flesh." |
https://en.wikipedia.org/wiki/The%20Infinity%20Clue | The Infinity Clue is the 70th title of the Hardy Boys Mystery Stories, written by Franklin W. Dixon. It was published by Wanderer Books in 1981.
Plot summary
After a dangerous tour of a nuclear power plant which was struck by an earthquake, Frank, Joe, and Chet travel to Washington, DC. This is after they receive a strange, cryptic letter from their father commanding them to go there and to be aware of Infinity. After they arrive in Washington, DC, they are threatened by a ruthless terrorist who seems to have a hobby with explosives. The Infinity clue seems to turn up everywhere and a supposedly cursed diamond is stolen. The Hardy Boys are suspect of stealing the diamond and take on this new case to try to clear their name. After failure after failure, the Hardy Boys go to a strange drilling site and find the Infinity clue there too. While staying at camp, they witness a boat disguised as carrying oysters passing by. The Hardy Boys witness strange flashes and go to the source to investigate. They find a strange island where the people seem to be living in the 18th century. They then find a supposedly dead man who is the owner of the stolen diamond. Later, they travel to a strange chain of islands and learn of a sinister plot to sabotage nuclear power plants with artificial earthquakes created by miniature nuclear bombs to harm the nuclear power industry and to make oil more popular.
The Hardy Boys books
1981 American novels
1981 children's books
Novels set in Washington, D.C.
Nuclear energy in fiction
Children's books set in Washington, D.C. |
https://en.wikipedia.org/wiki/Ion-to-photon%20detector | An ion-to-photon detector (IPD) is a component used for detecting ions in mass spectrometry.
Operation
In an ion-to-photon detector, a photomultiplier tube is coated with a layer of scintillator compound, such as Rhodamine B or CsI. When the ions pass through the mass analyzer of the spectrometer, they strike the scintillator compound and cause the release of photons. These photons are then detected by the photomultiplier tube. A conversion dynode, such as a microchannel plate can also be used between the ion beam and the scintillator to increase the signal. An MCP, when struck by an ion, will release electrons which then strike the scintillator.
Applications
The primary application for ion-to-photon detectors is acting as the detector in MALDI mass spectrometry. They could, in theory, be used for other types of mass spectrometry as well.
Comparison to other detectors
The conversion efficiency of ions to photons by an IPD is as good as, or better than, the conversion efficiency of ions to electrons by a multichannel plate detector. Ion-to-photon detectors may also detect ions with a mass of up to around 20,000 Da, better than microchannel plates. However, the resolution of the mass spectrum from an IPD equipped spectrometer is slightly lower. The noise in the spectrum, which may come from unfocused, slow speed ions, is also slightly higher. |
https://en.wikipedia.org/wiki/X-ray%20standing%20waves | The X-ray standing wave (XSW) technique can be used to study the structure of surfaces and interfaces with high spatial resolution and chemical selectivity. Pioneered by B.W. Batterman in the 1960s, the availability of synchrotron light has stimulated the application of this interferometric technique to a wide range of problems in surface science.
Basic principles
An X-ray standing wave (XSW) field is created by interference between an X-ray beam impinging on a sample and a reflected beam. The reflection may be generated at the Bragg condition for a crystal lattice or an engineered multilayer superlattice; in these cases, the period of the XSW equals the periodicity of the reflecting planes. X-ray reflectivity from a mirror surface at small incidence angles may also be used to generate long-period XSWs.
The spatial modulation of the XSW field, described by the dynamical theory of X-ray diffraction, undergoes a pronounced change when the sample is scanned through the Bragg condition. Due to a relative phase variation between the incoming and reflected beams, the nodal planes of the XSW field shift by half the XSW period. Depending on the position of the atoms within this wave field, the measured element-specific absorption of X-rays varies in a characteristic way. Therefore, measurement of the absorption (via X-ray fluorescence or photoelectron yield) can reveal the position of the atoms relative to the reflecting planes. The absorbing atoms can be thought of as "detecting" the phase of the XSW; thus, this method overcomes the phase problem of X-ray crystallography.
For quantitative analysis, the normalized fluorescence or photoelectron yield is described by
,
where is the reflectivity and is the relative phase of the interfering beams. The characteristic shape of can be used to derive precise structural information about the surface atoms because the two parameters (coherent fraction) and (coherent position) are directly related to the Fourier represen |
https://en.wikipedia.org/wiki/P2P%20Universal%20Computing%20Consortium | P2P Universal Computing Consortium (PUCC) is promoting research and development of an open P2P/Overlay network service platform that connects multi-types of devices users use, and conducts the standardization efforts. PUCC is a cross-industry consortium for open P2P/Overlay network standards. PUCC operations are supported by a combination of membership dues and public grants.
Objectives
Realize a seamless peer-to-peer communication platform that enables the creations of high level ubiquitous service between multi type networks and devices
Create neutral protocols through cross-industry cooperation by sharing comm-interoperable on goals and visions
Conduct research and development to create compelling technologies that support our everyday lives.
Working Groups
Architecture & Protocols (ap-wg)
Printing (prt-wg)
Streaming (st-wg)
Security (sec-wg)
Home Appliance Control (ha-wg)
Sensor Device Control WG (sdc-wg)
Healthcare Device WG (hc-wg) To be appeared soon
Device IOP Task Force (dev-tf)
History
In 2004, PUCC (P2P Universal Computing Consortium) was founded in Tokyo . The founding members were NTT DoCoMO, Ericsson, Kyoto University, and Keio University.
April 2005: The Working Groups were started. started standardization work on an open overlay network in the area of several applications, as well as core communication protocols and metadata.
July 2006: First government supported R&D was started. R&D work on harmonization of mobile network, home network, imaging devices was conducted using government funds.
March 2007: First PUCC specifications were published.
June 2007: PUCC joined the Healthy Living project, as a part of the Information Grand Voyage Project, supported by METI (Ministry of Economy, Trade and Industry).
November 2008: PUCC continuously supports the Information Grad Voyage Project. PUCC open overlay network is used as a platform to gather information and NON-IP networks and devices such as sensor networks, USB, Bluetooth.
PUCC chairs
|
https://en.wikipedia.org/wiki/Tame%20manifold | In geometry, a tame manifold is a manifold with a well-behaved compactification. More precisely, a manifold is called tame if it is homeomorphic to a compact manifold with a closed subset of the boundary removed.
The Whitehead manifold is an example of a contractible manifold that is not tame.
See also |
https://en.wikipedia.org/wiki/Holin%20superfamily%20VI | The Holin superfamily VI is a superfamily of integral membrane transport proteins. It is one of the seven different holin superfamilies in total. In general, these proteins are thought to play a role in regulated cell death, although functionality varies between families and individual members.
The Holin superfamily VI includes two TC families:
1.E.12 - The φAdh Holin (φAdh Holin) Family
1.E.26 - The Holin LLH (Holin LLH) Family
Superfamily VI includes families with members only from Bacillota. These proteins appear to have one N-terminal transmembrane segment (TMS), followed by an amphipathic, weakly hydrophobic peak that was not predicted to be transmembrane by the topological programs used by Reddy and Saier (2013). The average sizes of the members of the two families belonging to the Holin superfamily VI are 135 ± 11 and 130 ± 26 amino acyl residues (aas), respectively.
See also
Holin
Lysin
Transporter Classification Database |
https://en.wikipedia.org/wiki/BY1 | BY1 is a taxonomically unidentified basidiomycete fungus. ITS sequencing has placed it in the Russulales and is referred to as a stereaceous basidiomycete. Chemotaxonomically supporting its placement in this group, it produces fomannoxins and vibralactones. The fungus' mycelia were isolated from dead aspen in Minnesota, USA. It is presumed to decompose wood by white rot.
The mycelium can be grown on YMG agar at room temperature (4 g/L d-glucose, 4 g/L yeast extract, 10 g/L malt extract, 18 g/L agar). The culture can be obtained at the Jena Microbial Resource Collection registration number SF:011241.
When the mycelia is wounded by scalpel damage, a yellow pigment appears. These pigments were identified as polyenes by characteristic UV-Vis spectra. The structures of the polyenes were determined by NMR. They were identified as 1) (3Z,5E,7E,9E,11E,13Z,15E,17E)-18-methyl-19-oxoicosa-3,5,7,9,11,13,15,17-octaenoic acid; and 2) (3E,5Z,7E,9E,11E,13E,15Z,17E,19E)-20-methyl-21-oxodocosa-3,5,7,9,11,13,15,17,19-nonaenoic acid. The shorter polyene was found to be highly toxic against Drosophila melanogaster larvae. Feeding experiments with [1-13C]acetate revealed a polyketidic origin, and feeding experiments with l-[methyl-13C]methionine revealed methyl branching likely via S-adenosyl-l-methionine-dependent methyltransferase(s). Additionally, MALDI-TOF imaging at the mycelial wounding site identified these poylenes as localized at the wounded area. Two putative alleles of polyketide genes were identified, referred to as PPS1 and PPS2. QRT-PCR monitoring of PPS1 showed up-regulation of this gene after mycelial wounding. The domain architecture was the following for PPS1: KS, AT, DH, MT, KR, ACP, and thus was classified as a highly-reducing polyketide synthase (HR-PKS). This was the first characterized HR-PKS of basidiomycetic origin and forms its own clade in comparison to ascomycete HR-PKSs, bacterial polyene-forming PKSs, basidiomycete non-reducing PKSs, and ascomycete non-red |
https://en.wikipedia.org/wiki/Convex%20series | In mathematics, particularly in functional analysis and convex analysis, a is a series of the form where are all elements of a topological vector space , and all are non-negative real numbers that sum to (that is, such that ).
Types of Convex series
Suppose that is a subset of and is a convex series in
If all belong to then the convex series is called a with elements of .
If the set is a (von Neumann) bounded set then the series called a .
The convex series is said to be a if the sequence of partial sums converges in to some element of which is called the .
The convex series is called if is a Cauchy series, which by definition means that the sequence of partial sums is a Cauchy sequence.
Types of subsets
Convex series allow for the definition of special types of subsets that are well-behaved and useful with very good stability properties.
If is a subset of a topological vector space then is said to be a:
if any convergent convex series with elements of has its (each) sum in
In this definition, is not required to be Hausdorff, in which case the sum may not be unique. In any such case we require that every sum belong to
or a if there exists a Fréchet space such that is equal to the projection onto (via the canonical projection) of some cs-closed subset of Every cs-closed set is lower cs-closed and every lower cs-closed set is lower ideally convex and convex (the converses are not true in general).
if any convergent b-series with elements of has its sum in
or a if there exists a Fréchet space such that is equal to the projection onto (via the canonical projection) of some ideally convex subset of Every ideally convex set is lower ideally convex. Every lower ideally convex set is convex but the converse is in general not true.
if any Cauchy convex series with elements of is convergent and its sum is in
if any Cauchy b-convex series with elements of is convergent and its sum is in
The empty s |
https://en.wikipedia.org/wiki/Bourchier%20knot | The Bourchier knot is a variety of heraldic knot. It was used as a heraldic badge by the Bourchier family, whose earliest prominent ancestor in England was John de Bourchier (alias Boucher, Boussier, etc., d. c. 1330), a Judge of the Common Pleas, seated at Stanstead Hall in the parish of Halstead, Essex. He was the father of Robert Bourchier, 1st Baron Bourchier (d.1349), Lord Chancellor of England. The various branches of his descendants held the titles Baron Bourchier, Count of Eu, Viscount Bourchier, Earl of Essex, Baron Berners, Baron FitzWarin and Earl of Bath. The knot should perhaps have been called the "FitzWarin knot" as according to Boutell (1864) the device was first used by the FitzWarin family, whose heir was the Bourchier family.
Forms
The Bourchier knot is shown in two forms: as a reef knot and as a granny knot.
Examples of reef knot form
Relief sculpture of a Bourchier knot (of the reef knot variety) on the chest-tomb in Bampton Church, Devon, supposed to be that of Thomasine Hankford (d.1453), heiress of the feudal barony of Bampton, wife of William Bourchier, 9th Baron FitzWarin (1407-1470), great-grandson of the 1st Baron Bourchier.
Examples of granny knot form
Bourchier knots on the monument of William Bourchier, 3rd Earl of Bath (1557-1623) in St Peter's Church, Tawstock, Devon.
Prominent examples
Beningbrough Hall, North Yorkshire, owned at one time by a branch of the Bourchier family. A large Bourchier knot is cut into a lawn adjoining the house.
On the tomb of Thomas Bourchier (c.1404-1486), Archbishop of Canterbury in Canterbury Cathedral
Sculpted on the Tudor gatehouse of Tawstock Court in North Devon, seat of the Bourchier Earls of Bath.
Tawstock Church in North Devon, visible on monuments to Bourchiers and Wrey baronets. |
https://en.wikipedia.org/wiki/Ganimal | A ganimal, also commonly referred to as GANimal, is a hybrid animal created with Generative artificial intelligence systems, such as generative adversarial networks (GANs) or diffusion models. The term ganimal is a portmanteau between the words "animal" and "GAN." It is typically used to refer to a hybrid animal generated by interpolating between distinct species; the term can also refer to any AI-generated creatures that have not been identified in reality. Ganimals are closely related to Artbreeder, an online website for blending images with AI.
There exist 78,210 ganimals generated from hybrid pairs of animal labels from BigGAN (G1) and 3,058,362,945 ganimals generated from blending G1 ganimals.
Example ganimals
The Baby Oagen is a ganimal combing a great white shark and a golden retriever. The Golden Foofa is a ganimal combining a golden retriever and a goldfish.
Meet the Ganimals
Meet the Ganimals is an online platform that allows visitors to generate, blend and curate ganimals. As of June 2020, 44,791 ganimals were generated, 8,547 ganimals were bred, and 743 ganimals were named by a total of 10,657 users. It also has an educational component where visitors can play with blending and learn about AI.
Evolution and ganimal morphology
Because ganimals exist within an attention economy and evolve based on human preferences, charismatic megafauna (e.g. ganimals with cute, dog-like morphologies) become the most popular. However, social cues can increase the diversity of the ganimals ecosystem and lead to the success of unconventional ganimals, such as those without eyes or that live underwater.
The Barracuda Effect
Although there is typically no human morphology used to synthesize ganimals, creepy humanoid characters would emerge whenever animals were bred with a barracuda. This occurs because many pictures on the internet of barracudas include a human holding the fish up as a prized catch. This highlights a cultural form of algorithmic bias embedded |
https://en.wikipedia.org/wiki/Lattice%20C | The Lattice C Compiler was released in June 1982 by Lifeboat Associates and was the first C compiler for the IBM Personal Computer. The compiler sold for $500 and would run on PC DOS or MS-DOS (which at the time were the same product with different brandings). The first hardware requirements were given as 96KB of RAM and one (later two) floppy drives. It was ported to many other platforms, such as mainframes (MVS), minicomputers (VMS), workstations (UNIX), OS/2, the Commodore Amiga, Atari ST and the Sinclair QL.
The compiler was subsequently repackaged by Microsoft under a distribution agreement as Microsoft C version 2.0. Microsoft developed their own C compiler that was released in April 1985 as Microsoft C Compiler 3.0. Lattice was purchased by SAS Institute in 1987 and rebranded as SAS/C. After this, support for other platforms dwindled until compiler development ceased for all platforms except IBM mainframes. The product is still available in versions that run on other platforms, but these are cross compilers that only produce mainframe code.
Some of the early 1982 commercial software for the IBM PC was ported from CP/M (where it was written for the BDS C subset of the C language) to MS-DOS using Lattice C including Perfect Writer, PerfectCalc, PerfectSpeller and PerfectFiler. This suite was bundled with the Seequa Chameleon and Columbia Data Products.
LMK, make tool
LSE, screen editor
TMN, text management utilities
Reception
In a 1983 review of five C compilers for the IBM PC, BYTE chose Lattice C as the best in the "superior quality, but expensive and unsuited to the beginner" category. It cited the software's "quick compile and execution times, small incremental code, best documentation and consistent reliability". PC Magazine that year similarly praised Lattice C's documentation and compile-time and runtime performance, and stated that it was slightly superior to the CI-C86 and c-systems C compilers. |
https://en.wikipedia.org/wiki/Hamilton%20C%20shell | Hamilton C shell is a clone of the Unix C shell and utilities for Microsoft Windows created by Nicole Hamilton at Hamilton Laboratories as a completely original work, not based on any prior code. It was first released on OS/2 on December 12, 1988 and on Windows NT in July 1992. The OS/2 version was discontinued in 2003 but the Windows version continues to be actively supported.
Design
Hamilton C shell differs from the Unix C shell in several respects. These include its compiler architecture, its use of threads, and the decision to follow Windows rather than Unix conventions.
Parser
The original C shell uses an ad hoc parser. This has led to complaints about its limitations. It works well enough for the kinds of things users type interactively but not very well for the more complex commands a user might take time to write in a script. It is not possible, for example, to pipe the output of a foreach statement into grep. There was a limit to how complex a command it could handle.
By contrast, Hamilton uses a top-down recursive descent parser that allows it to compile statements to an internal form before running them. As a result, statements can be nested or piped arbitrarily. The language has also been extended with built-in and user-defined procedures, local variables, floating point and additional expression, editing and wildcarding operators, including an "indefinite directory" wildcard construct written as "..." that matches zero or more directory levels as required to make the rest of the pattern match.
Threads
Lacking fork or a high performance way to recreate that functionality, Hamilton uses the Windows threads facilities instead. When a new thread is created, it runs within the same process space and it shares all of the process state. If one thread changes the current directory or the contents of memory, it's changed for all the threads. It's much cheaper to create a thread than a process but there's no isolation between them. To recreate |
https://en.wikipedia.org/wiki/Suslin%20algebra | In mathematics, a Suslin algebra is a Boolean algebra that is complete, atomless, countably distributive, and satisfies the countable chain condition. They are named after Mikhail Yakovlevich Suslin.
The existence of Suslin algebras is independent of the axioms of ZFC, and is equivalent to the existence of Suslin trees or Suslin lines.
See also
Andrei Suslin |
https://en.wikipedia.org/wiki/Cyttaria%20hariotii | Cyttaria hariotii is an edible mushroom commonly called llao llao, llaullao and pan de indio. The fungus, found in Patagonia, southern Chile and Argentina, is parasitic on Nothofagus (Southern beech) trees. The fungus affects its hosts internally in its sap ducts; the tree defends itself by generating galls to bypass the sap blockages. The fungus expands out of the gall to other parts of the tree. That grows in the branches of the trees as if it was a fruit. This one is a great edible mushroom of sweet flavor with which desserts, sweets and even icecreams are made. |
https://en.wikipedia.org/wiki/Extension%20method | In object-oriented computer programming, an extension method is a method added to an object after the original object was compiled. The modified object is often a class, a prototype or a type. Extension methods are features of some object-oriented programming languages. There is no syntactic difference between calling an extension method and calling a method declared in the type definition.
Not all languages implement extension methods in an equally safe manner, however. For instance, languages such as C#, Java (via Manifold, Lombok, or Fluent), and Kotlin don't alter the extended class in any way, because doing so may break class hierarchies and interfere with virtual method dispatching. This is why these languages strictly implement extension methods statically and use static dispatching to invoke them.
Support in programming languages
Extension methods are features of numerous languages including C#, Java via Manifold or Lombok or Fluent, Gosu, JavaScript, Oxygene, Ruby, Smalltalk, Kotlin, Dart, Visual Basic.NET and Xojo. In dynamic languages like Python, the concept of an extension method is unnecessary because non-builtin classes can be extended without any special syntax (an approach known as "monkey-patching", employed in libraries such as gevent).
In VB.NET and Oxygene, they are recognized by the presence of the "extension" keyword or attribute. In Xojo the "Extends" keyword is used with global methods.
In C# they're implemented as static methods in static classes, with the first argument being of extended class and preceded by "this" keyword.
In Java you add extension methods via Manifold, a jar file you add to your project's classpath. Similar to C# a Java extension method is declared static in an @Extension class where the first argument has the same type as the extended class and is annotated with @This. Alternatively, the Fluent plugin allows you to call any static method as an extension method without using annotations, as long as the method s |
https://en.wikipedia.org/wiki/Yuliy%20Sannikov | Yuliy Sannikov (born November 3, 1978) is a Ukrainian economist known for his contributions to mathematical economics, game theory, and corporate finance. He is an economics professor at the Stanford Graduate School of Business, and won both the 2015 Fischer Black Prize and 2016 John Bates Clark Medal.
Sannikov is also one of the few participants to win three gold medals at the International Mathematical Olympiad.
He received his A.B. in mathematics from Princeton in 2000, he then earned a Ph.D. in business administration from Stanford Graduate School of Business in 2004.
Publications
with Markus K. Brunnermeier: The I Theory of Money. NBER Working Paper 22533, 2016, .
with Markus K. Brunnermeier: International Credit Flows and Pecuniary Externalities. In. American Economic Journal: Macroeconomics 7(1), January 2015, 297–338, .
with Markus K. Brunnermeier: A Macroeconomic Model with a Financial Sector. The American Economic Review 104(2), February 2014, 379–421, .
with Dilip Abreu: An Algorithm for Two-Player Repeated Games With Perfect Monitoring. Theoretical Economics 9, 2014, 313–338, .
with Alex Edmans, Xavier Gabaix, Tomas Sadzik: Dynamic CEO Compensation. The Journal of Finance 67(5), October 2012, 1603–1647, .
with Eduardo Faingold: Reputation in Continuous-Time Games. Econometrica 79(3), May 2011, 773–876, .
with Andrzej Skrzypacz: The Role of Information in Repeated Games with Frequent Actions. Econometrica 78(3), May 2010, 847–882, .
A Continuous-Time Version of the Principal–Agent Problem. The Review of Economic Studies 75(3), July 2008, 957–984, .
with Andrzej Skrzypacz: Impossibility of Collusion under Imperfect Monitoring with Flexible Production. The American Economic Review 97(5), December 2007, 1794–1823, .
Games with Imperfectly Observable Actions in Continuous Time. Econometrica 75(5), September 2007, 1285–1329, .
with Peter M. DeMarzo: Optimal Security Design and Dynamic Capital Structure in a Continuous-Time Agency Model. The Jour |
https://en.wikipedia.org/wiki/Edwin%20Thompson%20Jaynes | Edwin Thompson Jaynes (July 5, 1922 – April 30, 1998) was the Wayman Crow Distinguished Professor of Physics at Washington University in St. Louis. He wrote extensively on statistical mechanics and on foundations of probability and statistical inference, initiating in 1957 the maximum entropy interpretation of thermodynamics as being a particular application of more general Bayesian/information theory techniques (although he argued this was already implicit in the works of Josiah Willard Gibbs). Jaynes strongly promoted the interpretation of probability theory as an extension of logic.
In 1963, together with Fred Cummings, he modeled the evolution of a two-level atom in an electromagnetic field, in a fully quantized way. This model is known as the Jaynes–Cummings model.
A particular focus of his work was the construction of logical principles for assigning prior probability distributions; see the principle of maximum entropy, the principle of maximum caliber, the principle of transformation groups and Laplace's principle of indifference. Other contributions include the mind projection fallacy.
Jaynes' book, Probability Theory: The Logic of Science (2003) gathers various threads of modern thinking about Bayesian probability and statistical inference, develops the notion of probability theory as extended logic, and contrasts the advantages of Bayesian techniques with the results of other approaches. This book, which he dedicated to Harold Jeffreys, was published posthumously in 2003 (from an incomplete manuscript that was edited by Larry Bretthorst).
See also
Differential entropy
Limiting density of discrete points |
https://en.wikipedia.org/wiki/CRAL-TRIO%20domain | CRAL-TRIO domain is a protein structural domain that binds small lipophilic molecules. This domain is named after cellular retinaldehyde-binding protein (CRALBP) and TRIO guanine exchange factor.
CRALB protein carries 11-cis-retinol or 11-cis-retinaldehyde. It modulates interaction of retinoids with visual cycle enzymes. TRIO is involved in coordinating actin remodeling, which is necessary for cell migration and growth.
Other members of the family are alpha-tocopherol transfer protein and phosphatidylinositol-transfer protein (Sec14). They transport their substrates (alpha-tocopherol and phosphatidylinositol or phosphatidylcholine, respectively) between different intracellular membranes. Family also include a guanine nucleotide exchange factor that may function as an effector of RAC1 small G-protein.
The N-terminal domain of yeast ECM25 protein has been identified as containing a lipid binding CRAL-TRIO domain.
Structure
The Sec14 protein was the first CRAL-TRIO domain for which the structure was determined. The structure contains several alpha helices as well as a beta sheet composed of 6 strands. Strands 2,3,4 and 5 form a parallel beta sheet with strands 1 and 6 being anti-parallel. The structure also identified a hydrophobic binding pocket for lipid binding.
Human proteins containing this domain
C20orf121; MOSPD2; PTPN9; RLBP1; RLBP1L1; RLBP1L2; SEC14L1; SEC14L2;
SEC14L3; SEC14L4; TTPA; |
https://en.wikipedia.org/wiki/Washington%20Redskins%20name%20controversy | The Washington Redskins name controversy involved the name and logo previously used by the Washington Commanders, a National Football League (NFL) franchise located in the Washington metropolitan area. In the 1960s, the team's longtime name—the Redskins—and the associated logo began to draw criticism from Native American groups and individuals. The topic, part of the larger Native American mascot controversy, began receiving widespread public attention in the 1990s. In 2020, the team responded to economic pressure in the wake of widespread recognition of systemic racism by retiring the name and logo. The team called itself the "Washington Football Team" before rebranding as the Commanders in 2022.
"Redskin" is a slang term for Native Americans in the United States and First Nations in Canada. The term redskin underwent pejoration through the 19th to early 20th centuries and in contemporary dictionaries of American English it is labeled as offensive, disparaging, or insulting.
For several decades, the team's owners and management, NFL commissioners, and most fans sought to keep the Redskins name, claiming that it honored the achievements and virtues of Native Americans and that it was not intended in a negative manner. Then-team president Bruce Allen noted that three high schools with a Native American-majority student body used the name. Supporters also pointed to a national poll taken in 2004 by the Annenberg Public Policy Center, which found that a majority of Native Americans were not offended by the name. The use of public opinion polling methods to measure the opinions of a small, diverse population was criticized by scholars, in particular the use of self-identification to select the individuals surveyed. The name was opposed by the National Congress of American Indians, which said in 2013 that it represented 1.2 million people in its member tribes.
Name change
In July 2020, amid the removal of many names and images as part of the George Floyd protests, a |
https://en.wikipedia.org/wiki/OldVersion.com | OldVersion.com is an archive website that stores and distributes older versions of primarily Internet-related IBM PC compatible and Apple Macintosh freeware and shareware application software. Alex Levine and Igor Dolgalev founded the site in 2001.
Levine created the site because "Companies make a lot of new versions. They're not always better for the consumer." As reported in The Wall Street Journal, 'Users often try to downgrade when they find confusing changes in a new version or encounter software bugs, or just decide they want to go back to a more familiar version,' said David Smith, an analyst at research firm Gartner. 'Often, they discover that the downgrade process is complicated, if not impossible.'
When OldVersion.com was launched it offered 80 versions of 14 programs.
By 2005, over 500 versions were posted.
By 28 August 2007, this had grown to 2388 versions of 179 programs, in categories such as "graphics", "file-sharing", "security" and "enterprise". The site also carries 600+ versions of 35 Macintosh programs.
In 2007, PC World labeled the site "a treasure trove ... of older-but-better software";
In 2005, National Review called OldVersion.com a "champion" for "software conservatives".
According to Alexander Levine's own words, he has received threats from proprietary software developers for running an archive of obsolete internet browsers with known critical security flaws.
See also
Abandonware
Legacy code
Planned obsolescence
Technology acceptance model
Switching barriers |
https://en.wikipedia.org/wiki/List%20of%20thermal%20conductivities | In heat transfer, the thermal conductivity of a substance, k, is an intensive property that indicates its ability to conduct heat. For most materials, the amount of heat conducted varies (usually non-linearly) with temperature.
Thermal conductivity is often measured with laser flash analysis. Alternative measurements are also established.
Mixtures may have variable thermal conductivities due to composition. Note that for gases in usual conditions, heat transfer by advection (caused by convection or turbulence for instance) is the dominant mechanism compared to conduction.
This table shows thermal conductivity in SI units of watts per metre-kelvin (W·m−1·K−1). Some measurements use the imperial unit BTUs per foot per hour per degree Fahrenheit ( =
Sortable list
This concerns materials at atmospheric pressure and around .
Analytical list
Thermal conductivities have been measured with longitudinal heat flow methods where the experimental arrangement is so designed to accommodate heat flow in only the axial direction, temperatures are constant, and radial heat loss is prevented or minimized. For the sake of simplicity the conductivities that are found by that method in all of its variations are noted as L conductivities, those that are found by radial measurements of the sort are noted as R conductivities, and those that are found from periodic or transient heat flow are distinguished as P conductivities. Numerous variations of all of the above and various other methods have been discussed by some G. K. White, M. J. Laubits, D. R. Flynn, B. O. Peirce and R. W. Wilson and various other theorists who are noted in an international Data Series from Purdue University, Volume I pages 14a–38a.
This concerns materials at various temperatures and pressures.
See also
Laser flash analysis
List of insulation materials
R-value (insulation)
Thermal transmittance
Specific heat capacity
Thermal conductivity
Thermal conductivities of the elements (data page)
Thermal |
https://en.wikipedia.org/wiki/MAG%20InnoVision | MAG Innovision is a Taiwan-headquartered manufacturer and provider of visual technology, specifically CRT monitors, liquid crystal displays, projectors, plasma displays, and HDTV technology. The company was founded by William Wang when he was 26 years old.
In the early to mid-1990s, its products were one of the top-rated in the market for computer CRT monitors in the North American market, alongside Sony, NEC, and Panasonic. Since the late 1990s and 2000s, these companies have been displaced by ViewSonic, and more recently by Samsung and LG, as the latter were at the forefront of fledgling LCD technology. |
https://en.wikipedia.org/wiki/Fit%20%28manufacturing%29 | In precision mechanics, fit refers to the degree of 'looseness' with which a shaft is inserted into a bored hole.
This coupling is related to the tolerance or allowance of both parts' dimensions. The shaft and the orifice must be of a similar diameter, otherwise there will not be a correct adjustment. With this in mind, measurements have been internationally standardised according to ISO regulation to ensure the interchangeability of items and their mass production.
Tolerance values are designated with a capital letter in the case of orifices and lower case letters in the case of shafts. The lower the value the higher the machining costs, as a greater precision is required.
Maximum and minimum clearance
The maximum clearance of a fit is the difference between the upper bound of the orifice diameter and the lower bound of the shaft diameter.
maximum clearance = maximum orifice diameter – minimum shaft diameter
The minimum clearance meanwhile is the difference between the lower bound of the orifice diameter and the upper bound of the shaft diameter.
minimum clearance = minimum orifice diameter – maximum shaft diameter
The maximum clearance in a loose or sliding fit is always greater than zero; on the other hand, in a tight fit both the maximum and minimum clearance are negative.
See also
Engineering fit
Interference fit
Bibliography
__notoc__
Mechanics |
https://en.wikipedia.org/wiki/Racah%20parameter | When an atom has more than one electron there will be some electrostatic repulsion between those electrons. The amount of repulsion varies from atom to atom, depending upon the number and spin of the electrons and the orbitals they occupy. The total repulsion can be expressed in terms of three parameters A, B and C which are known as the Racah parameters after Giulio Racah, who first described them. They are generally obtained empirically from gas-phase spectroscopic studies of atoms.
They are often used in transition-metal chemistry to describe the repulsion energy associated with an electronic term. For example, the interelectronic repulsion of a 3P term is A + 7B, and of a 3F term is A - 8B, and the difference between them is therefore 15B.
Definition
The Racah parameters are defined as
where are Slater integrals
and are the Slater-Condon parameters
where is the normalized radial part of an electron orbital, and
.
See also
Tanabe–Sugano diagram
Nephelauxetic effect |
https://en.wikipedia.org/wiki/Murray%20loop%20bridge | The Murray loop bridge is a bridge circuit used for locating faults in underground or underwater cables. It has been used for more than 100 years but is being replaced by the more precise Time-domain reflectometer.
One end of the faulted cable is connected through a pair of resistors to the voltage source. Also a null detector is connected. The other end of the cable is shorted. The bridge is brought to balance by changing the values of RB1 and RB2, which is achieved when:
which is equivalent to:
The value of resistance Rx is proportional the length Lx, thus the location of the fault can be calculated:
where L is the total length of the cable under test - a value proportional to Rg.
The method assumes a single fault exists, of low resistance compared with the undamaged cable insulation resistance, and that the cable conductors have uniform resistance per unit length.
Varley loop
The similar Varley loop uses fixed resistors for RB1 and RB2, and inserts a variable resistor in the faulted leg. Test sets for cable testing can be connected for either bridge technique. If the fault resistance is high, the sensitivity of the Murray bridge is reduced and the Varley loop may be more suitable.
See also
Fault (power engineering)
Time-domain reflectometer |
https://en.wikipedia.org/wiki/Chlorobaculum%20tepidum | Chlorobaculum tepidum, previously known as Chlorobium tepidum, is an anaerobic, thermophilic green sulfur bacteria first isolated from New Zealand. Its cells are gram-negative and non-motile rods of variable length. They contain chlorosomes and bacteriochlorophyll a and c.
Natural habitat and environmental requirements
Like other green sulfur bacteria C. tepidum requires light and specific compounds to perform anoxygenic photosynthesis. The compounds that C. tepidum requires reduced sulfur compounds (H2S, S0, thiosulfate), hydrogen gas (H2,) or ferrous iron (Fe2+). To fulfill their metabolic requirements, they reside primarily in anaerobic sulfur rich environments such as anaerobic levels of stratified lakes and lagoons, anaerobic levels of layered organic bacterial mats, and in hot springs where there is abundant sulfur. C. tepidum and other green sulfur bacteria also play a large role within the carbon and sulfur cycles. Within the sulfur cycle, they contribute to the oxidative branch by oxidizing reduced sulfur compounds. Within anaerobic sediment layers C. tepidum is able to couple carbon and sulfur cycling in a metabolically favorable way.
Photosynthetic mechanism
As it was mentioned before, C. tepidum performs anoxygenic photosynthesis. Within each cell there are 200-250 chlorosomes that are attached to the cytoplasmic side of reaction centers inserted within the inner cell membrane. The ellipsoidal shaped complexes act as light harvesting antenna to capture energy. Within each chlorosome are 215,000 ± 80,000 bacteriochlorophyll C that act as pigment molecules and absorb unique wavelengths of light relative to their color. Light energy is harvested by the chlorosomes and used in conjunction with H2, reduced sulfur compounds, or ferrous iron to preform redox reactions and provide energy to fix CO2 via the reverse tricarboxcylic acid cycle.
Genome structure
C. tepidum contains a genome that contains 2.15 Mbp, within there are a total of 2,337 genes (of th |
https://en.wikipedia.org/wiki/Contact%20immunity | Contact immunity is the property of some vaccines, where a vaccinated individual can confer immunity upon unimmunized individuals through contact with bodily fluids or excrement. In other words, if person “A” has been vaccinated for virus X and person “B” has not, person “B” can receive immunity to virus X just by coming into contact with person “A”. The term was coined by Romanian physician Ioan Cantacuzino.
The potential for contact immunity exists primarily in "live" or attenuated vaccines. Vaccination with a live, but attenuated, virus can produce immunity to more dangerous forms of the virus. These attenuated viruses produce little or no illness in most people. However, the live virus multiplies briefly, may be shed in body fluids or excrement, and can be contracted by another person. If this contact produces immunity and carries no notable risk, it benefits an additional person, and further increases the immunity of the group.
The most prominent example of contact immunity was the oral polio vaccine (OPV). This live, attenuated polio vaccine was widely used in the US between 1960 and 1990; it continues to be used in polio eradication programs in developing countries because of its low cost and ease of administration. It is popular, in part, because it is capable of contact immunity. Recently immunized children "shed" live virus in their feces for a few days after immunization. About 25 percent of people coming into contact with someone immunized with OPV gained protection from polio through this form of contact immunity. Although contact immunity is an advantage of OPV, the risk of vaccine-associated paralytic poliomyelitis—affecting 1 child per 2.4 million OPV doses administered—led the Centers for Disease Control and Prevention (CDC) to cease recommending its use in the US as of January 1, 2010, in favor of inactivated poliovirus vaccine (IPV). The CDC continues to recommend OPV over IPV for global polio eradication activities.
The main drawback of liv |
https://en.wikipedia.org/wiki/Evolutionary%20leadership%20theory | Evolutionary leadership theory analyses leadership from an evolutionary perspective. Evolutionary psychology assumes that our thinking, feeling and doing are the product of innate psychological mechanisms. These mechanisms have evolved because they enable people to effectively deal with situations that (directly or indirectly) are important for survival and reproduction (reproductive success).
Evolutionary theory suggests that both leadership and followership were important for the reproductive success of our ancestors. Evolutionary leadership theory was introduced by Professor Mark van Vugt, Professor of social and organizational psychology (VU University Amsterdam and University of Oxford) in the book Selected: Why Some People lead, Why Others Follow and Why it Matters (Van Vugt & Ahuja, 2010). In the earlier German books "Evolutionäre Führung" (2006) and "Natürlich führen" (2013) by Dipl.-Psych. Michael Alznauer (Germany) the theme of leadership is also approached from an evolutionary viewpoint but with a slightly different focus.
The theory distinguishes itself from other theories of leadership by stating that:
leading and following are adaptive behavioural strategies that have evolved to solve social coordination problems in ancestral groups (e.g. moving to new areas, big game hunting or conflicts with other groups).
the relationship between leaders and followers is fundamentally ambivalent. The leader can abuse his position of power for his own benefit at the expense of others (see also the section leadership and dominance).
modern organizational structures are sometimes inconsistent with innate psychological mechanisms of leading and following. This inconsistency is one possible explanation for the problems in the relationship between managers and subordinates in modern organizations.
Evolution of Leadership
Humans evolved as social animals. The group offers protection and cooperation in hunting, gathering and sharing food to make group membership attra |
https://en.wikipedia.org/wiki/List%20of%203D%20graphics%20libraries | 3D graphics have become so popular, particularly in video games, that specialized APIs (application programming interfaces) have been created to ease the processes in all stages of computer graphics generation. These APIs have also proved vital to computer graphics hardware manufacturers, as they provide a way for programmers to access the hardware in an abstract way, while still taking advantage of the special hardware of any specific graphics card.
The first 3D graphics framework was probably Core, published by the ACM in 1977.
Low-level 3D API
These APIs for 3D computer graphics are particularly popular:
ANGLE, web browsers graphics engine, a cross-platform translator of OpenGL ES calls to DirectX, OpenGL, or Vulkan API calls.
Direct3D (a subset of DirectX)
Glide a defunct 3D graphics API developed by 3dfx Interactive.
Mantle developed by AMD.
Metal developed by Apple.
OpenGL and the OpenGL Shading Language
OpenGL ES 3D API for embedded devices.
OptiX 7.0 and Latest developed by NVIDIA.
LibGCM
QuickDraw 3D developed by Apple Computer starting in 1995, abandoned in 1998.
Vulkan
Web-based API
WebGL is a JavaScript interface for OpenGL ES API, promoted by Khronos.
WebGPU an under-development web standard and JavaScript API for accelerated graphics and compute.
High-level 3D API
There are also higher-level 3D scene-graph APIs which provide additional functionality on top of the lower-level rendering API. Such libraries under active development include:
BGFX
ClanLib
Crystal Space
HOOPS 3D Graphics System
Horde3D
Irrlicht Engine
Java 3D
Java FX
JMonkey Engine
JT Open from Siemens Digital Industries Software
magnum
Mobile 3D Graphics API (M3G; JSR-184)
OGRE
OpenGL Performer
OpenSceneGraph (now obsolete OSG.JS for WebPlatforms)
OpenSG
QSDK
RAMSES
RenderWare
Panda3D
Zea Engine
Unigine
VTK
JavaScript-based engines
There is more interest in web browser based high-level API for 3D graphics engines. Some are:
A-Frame
Blend4Web
Cop |
https://en.wikipedia.org/wiki/Pparg%20coactivator%201%20alpha | PPARG coactivator 1 alpha is a protein that in humans is encoded by the PPARGC1A gene.
Function
The protein encoded by this gene is a transcriptional coactivator that regulates the genes involved in energy metabolism. This protein interacts with PPARgamma, which permits the interaction of this protein with multiple transcription factors. This protein can interact with, and regulate the activities of, cAMP response element binding protein (CREB) and nuclear respiratory factors (NRFs). It provides a direct link between external physiological stimuli and the regulation of mitochondrial biogenesis, and is a major factor that regulates muscle fiber type determination. This protein may be also involved in controlling blood pressure, regulating cellular cholesterol homoeostasis, and the development of obesity. |
https://en.wikipedia.org/wiki/Alpha-3%20beta-2%20nicotinic%20receptor | The alpha-3 beta-2 nicotinic receptor, also known as the α3β2 receptor, is a type of nicotinic acetylcholine receptor, consisting of α3 and β2 subunits.
It occurs alongside the more common α3β4 nicotinic receptor in autonomic ganglia, and as an facilitatory presynaptic autoreceptor at the neuromuscular junction (NMJ). At the NMJ, it is involved in upregulation of ACh release during high-frequency stimulation. Nicotine, a component of tobacco, a common stimulate of the receptor has been found to increase the concentration of this receptor. Blockage of this receptor in the presence of a partial postsynaptic neuromuscular block is thought to produce the characteristic tetanic fade caused by non-depolarizing neuromuscular blockers.
The receptor is classified as an allosteric enzyme that is generally activated by the natural agonist acetylcholine, however it may also be activated by external agonists such as nicotine and blocked by toxins such as bungarus toxin 3.1. The main role of the receptor is to allow the re uptake of the neurotransmitter acetylcholine. Because it is a receptor involved in mechanisms including the neurotransmitter acetylcholine it is synthesized in the brain. However, α3β2 receptors synthesized in different locations of the brain may have differing regulatory properties. this is due to the cytoplasmic region in which the receptor is being formulated. Even though, there have been theories, how the increase in the receptors and uptaking of acetylcholine because of smoking nicotine can cause schizophrenia, no real correlation has been deducted.
Ligands
Agonists
Acetylcholine
Cytisine
DMPP
Epibatidine
Nicotine
Suberyldicholine
UB-165
Varenicline
PAMs
Levamisole
Morantel
Antagonists
Bupropion
DHβE
Mecamylamine
Memantine
Methyllycaconitine
PelA-5466, very selective, 300 fold more potent on α3β2 than α6/α3β2β3
Tubocurarine
See also
α3β4-Nicotinic receptor
α4β2-Nicotinic receptor
α7-Nicotinic receptor |
https://en.wikipedia.org/wiki/142nd%20meridian%20west | The meridian 142° west of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, North America, the Pacific Ocean, the Southern Ocean, and Antarctica to the South Pole.
The 142nd meridian west forms a great circle with the 38th meridian east.
From Pole to Pole
Starting at the North Pole and heading south to the South Pole, the 142nd meridian west passes through:
{| class="wikitable plainrowheaders"
! scope="col" width="130" | Co-ordinates
! scope="col" | Country, territory or sea
! scope="col" | Notes
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Arctic Ocean
| style="background:#b0e0e6;" |
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Beaufort Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Alaska
|-valign="top"
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Pacific Ocean
| style="background:#b0e0e6;" | Passing just east of Takume atoll, (at ) Passing just west of Rekareka atoll, (at ) Passing just east of Marokau atoll, (at ) Passing just east of Ravahere atoll, (at ) Passing just west of Nengonengo atoll, (at )
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Southern Ocean
| style="background:#b0e0e6;" |
|-
|
! scope="row" | Antarctica
| Unclaimed territory
|-
|}
See also
141st meridian west
143rd meridian west
w142 meridian west |
https://en.wikipedia.org/wiki/Aircraft%20principal%20axes | An aircraft in flight is free to rotate in three dimensions: yaw, nose left or right about an axis running up and down; pitch, nose up or down about an axis running from wing to wing; and roll, rotation about an axis running from nose to tail. The axes are alternatively designated as vertical, lateral (or transverse), and longitudinal respectively. These axes move with the vehicle and rotate relative to the Earth along with the craft. These definitions were analogously applied to spacecraft when the first crewed spacecraft were designed in the late 1950s.
These rotations are produced by torques (or moments) about the principal axes. On an aircraft, these are intentionally produced by means of moving control surfaces, which vary the distribution of the net aerodynamic force about the vehicle's center of gravity. Elevators (moving flaps on the horizontal tail) produce pitch, a rudder on the vertical tail produces yaw, and ailerons (flaps on the wings that move in opposing directions) produce roll. On a spacecraft, the movements are usually produced by a reaction control system consisting of small rocket thrusters used to apply asymmetrical thrust on the vehicle.
Principal axes
Normal axis, or yaw axis — an axis drawn from top to bottom, and perpendicular to the other two axes, parallel to the fuselage station.
Transverse axis, lateral axis, or pitch axis — an axis running from the pilot's left to right in piloted aircraft, and parallel to the wings of a winged aircraft, parallel to the buttock line.
Longitudinal axis, or roll axis — an axis drawn through the body of the vehicle from tail to nose in the normal direction of flight, or the direction the pilot faces, similar to a ship's waterline.
Normally, these axes are represented by the letters X, Y and Z in order to compare them with some reference frame, usually named x, y, z. Normally, this is made in such a way that the X is used for the longitudinal axis, but there are other possibilities to do it.
Vertical |
https://en.wikipedia.org/wiki/Euro%20calculator | A euro calculator is a type of calculator in European countries (see eurozone) that adopted the euro as their official monetary unit. It functions like any other normal calculator, but it also includes a special function which allows one to convert a value expressed in the previously official unit (the peseta in Spain, for example) to the new value in euros, or vice versa. Its use became very popular within the population and commerce of these countries especially during the first few months after adopting the euro.
As so many were produced, they are also found outside the eurozone to help staff with conversions at airports or railway stations where the euro has a strong presence. |
https://en.wikipedia.org/wiki/Retene | Retene, methyl isopropyl phenanthrene or 1-methyl-7-isopropyl phenanthrene, C18H18, is a polycyclic aromatic hydrocarbon present in the coal tar fraction, boiling above 360 °C. It occurs naturally in the tars obtained by the distillation of resinous woods. It crystallizes in large plates, which melt at 98.5 °C and boil at 390 °C. It is readily soluble in warm ether and in hot glacial acetic acid. Sodium and boiling amyl alcohol reduce it to a tetrahydroretene, but if it heated with phosphorus and hydriodic acid to 260 °C, a dodecahydride is formed. Chromic acid oxidizes it to retene quinone, phthalic acid and acetic acid. It forms a picrate that melts at 123-124 °C.
Retene is derived by degradation of specific diterpenoids biologically produced by conifer trees. The presence of traces of retene in the air is an indicator of forest fires; it is a major product of pyrolysis of conifer trees. It is also present in effluents from wood pulp and paper mills.
Retene, together with cadalene, simonellite and ip-iHMN, is a biomarker of vascular plants, which makes it useful for paleobotanic analysis of rock sediments. The ratio of retene/cadalene in sediments can reveal the ratio of the genus Pinaceae in the biosphere.
Health effects
A recent study has shown retene, which is a component of the Amazonian organic PM10, is cytotoxic to human lung cells. |
https://en.wikipedia.org/wiki/Intromittent%20organ | An intromittent organ is any external organ of a male organism that is specialized to deliver sperm during copulation. Intromittent organs are found most often in terrestrial species, as most non-mammalian aquatic species fertilize their eggs externally, although there are exceptions. For many species in the animal kingdom, the male intromittent organ is a hallmark characteristic of internal fertilization.
Species with intromittent organs
Invertebrates
Molluscs
Male cephalopods have a specialized arm, the hectocotylus, which is inserted into the female's mantle cavity to deliver a spermatophore during copulation. In some species, the hectocotylus breaks off inside the female's mantle cavity; in others, it can be used repeatedly to copulate with different females.
Arachnids
In spiders the intromittent organs are the male pedipalps, even though these are not primarily sexual organs, but serve as indirect mating organs; in the male the pedipalps have hollow, clubbed tips, often of complex internal anatomy. The sexually mature male typically deposits semen onto a specially woven silken mat, then sucks the emission into his pedipalps. In mating, he inserts the openings of the pedipalps in turn into the epigyne, the female external genital structure.
In Solifugae sperm transfer is also indirect; the male deposits a spermatophore on the ground, picks it up in his chelicerae, then inserts it into the female's genital opening.
In Opiliones (harvestmen), males have a structure called a penis, which is not present in other arachnids.
Millipedes
In most millipedes, sperm transfer is performed by one or two pair of modified legs called gonopods, which are often on the seventh body segment. During mating, a male bends his body to collect a spermatophore from the genital pore of his third segment, and inserts it into the female's body. Gonopods vary greatly among millipedes, and are often used to identify species.
Insects
Male insects possess an aedeagus, whose function is |
https://en.wikipedia.org/wiki/Baxter%20International | Baxter International Inc. is an American multinational healthcare company with headquarters in Deerfield, Illinois.
The company primarily focuses on products to treat kidney disease, and other chronic and acute medical conditions. The company had 2017 sales of $10.6 billion, across two businesses: BioScience and Medical Products. Baxter's BioScience business produces recombinant and blood plasma proteins to treat hemophilia and other bleeding disorders; plasma-based therapies to treat immune deficiencies and other chronic and acute blood-related conditions; products for regenerative medicine, and vaccines. Baxter's Medical Products business produces intravenous products and other products used in the delivery of fluids and drugs to patients; inhalational anaesthetics; contract manufacturing services; and products to treat end-stage kidney disease, or irreversible kidney failure, including products for peritoneal dialysis and hemodialysis.
History
Baxter International was founded in 1931 by Donald Baxter, a Los Angeles-based medical doctor, as a manufacturer and distributor of intravenous therapy solutions. Seeing a need for products closer to the Midwest, the company opened a manufacturing plant in Glenview, Illinois, in 1933. Baxter's interest was bought out in 1935 by Ralph Falk, who established a research and development function. In 1939 the company developed a vacuum-type collection container, extending the shelf life of blood from hours to weeks. In 1954, the company expanded operations outside of the United States by opening an office in Belgium. In 1956 Baxter International introduced the first functioning artificial kidney, and in 1971 became a member of the Fortune 500.
In 1971, Baxter built a major manufacturing plant in Ashdod, Israel, and as a result, the company was placed on the Arab League boycott list in the early 1980s.
Throughout the 1980s and 1990s the company expanded to deliver a wider variety of products and services (including vaccines, |
https://en.wikipedia.org/wiki/Linear%20transform%20model%20%28MRI%29 | The linear transform model refers to a fundamental assumption guiding the analysis of functional Magnetic Resonance Imaging (fMRI) studies. Specifically, the model holds that the fMRI signal is approximately proportional to a measure of local neural activity, averaged over a spatial extent of several millimeters and over a time period of several seconds.
Debate
The linear transform model is a common and widespread assumption used in the interpretation of fMRI studies. However, some scientists suggest reasons exist to remain sceptical. Heeger and Ress, in a review of fMRI and its relation to neuronal activity, argue that it is a reasonable and useful approximation for local neural activity "for some recording sites, in some brain areas, using certain experimental protocols", but it is not under other circumstances.
See also
Functional magnetic resonance imaging |
https://en.wikipedia.org/wiki/Cayleyan | In algebraic geometry, the Cayleyan is a variety associated to a hypersurface by , who named it the pippian in and also called it the Steiner–Hessian.
See also
Quippian |
https://en.wikipedia.org/wiki/PDF417 | PDF417 is a stacked linear barcode format used in a variety of applications such as transport, identification cards, and inventory management. "PDF" stands for Portable Data File. The "417" signifies that each pattern in the code consists of 4 bars and spaces in a pattern that is 17 units (modules) long. The PDF417 symbology was invented by Dr. Ynjiun P. Wang at Symbol Technologies in 1991. It is defined in ISO 15438.
Applications
PDF417 is used in many applications by both commercial and government organizations. PDF417 is one of the formats (along with Data Matrix) that can be used to print postage accepted by the United States Postal Service. PDF417 is also used by the airline industry's Bar Coded Boarding Pass (BCBP) standard as the 2D bar code symbolism for paper boarding passes. PDF417 is the standard selected by the Department of Homeland Security as the machine readable zone technology for RealID compliant driver licenses and state issued identification cards. PDF417 barcodes are also included on visas and border crossing cards issued by the State of Israel (example).
Features
In addition to features typical of two dimensional bar codes, PDF417's capabilities include:
Linking. PDF417 symbols can link to other symbols which are scanned in sequence allowing even more data to be stored.
User-specified dimensions. The user can decide how wide the narrowest vertical bar (X dimension) is, and how tall the rows are (Y dimension).
Public domain format. Anyone can implement systems using this format without any license.
The introduction of the ISO/IEC document states:
Manufacturers of bar code equipment and users of bar code technology require publicly available standard symbology specifications to which they can refer when developing equipment and application standards. It is the intent and understanding of ISO/IEC that the symbology presented in this International Standard is entirely in the public domain and free of all user restrictions, licences an |
https://en.wikipedia.org/wiki/Corticolous%20lichen | A corticolous lichen is a lichen that grows on bark. This is contrasted with lignicolous lichen, which grows on wood that has had the bark stripped from it, and saxicolous lichen, which grows on rock.
Examples of corticolous lichens include the crustose lichen Graphis plumierae, foliose lichen Melanohalea subolivacea and the fruticose Bryoria fuscescens. |
https://en.wikipedia.org/wiki/ISO/IEC%2015288 | The ISO/IEC 15288 is a technical standard in systems engineering which covers processes and lifecycle stages, developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Planning for the ISO/IEC 15288:2002(E) standard started in 1994 when the need for a common systems engineering process framework was recognized. The previously accepted standard MIL STD 499A (1974) was cancelled after a memo from the United States Secretary of Defense (SECDEF) prohibited the use of most U.S. Military Standards without a waiver (this memo was rescinded in 2005). The first edition was issued on 1 November 2002. Stuart Arnold was the editor and Harold Lawson was the architect of the standard. In 2004 this standard was adopted by the Institute of Electrical and Electronics Engineers as IEEE 15288. ISO/IEC 15288 has been updated 1 February 2008 as well as on 15 May 2015.
ISO/IEC 15288 is managed by ISO/IEC JTC1/SC7, which is the committee responsible for developing standards in the area of Software and Systems Engineering. ISO/IEC 15288 is part of the SC 7 Integrated set of Standards, and other standards in this domain include:
ISO/IEC TR 15504 which addresses capability
ISO/IEC 12207 and ISO/IEC 15288 which address lifecycle and
ISO 9001 & ISO 90003 which address quality
History
ISO/IEC 15288:2023
ISO/IEC 15288:2015
Revises: ISO/IEC 15288:2008 (harmonized with ISO/IEC 12207:2008)
Revises: ISO/IEC 15288:2002 (first edition)
Processes
The standard defines thirty processes grouped into four categories:
Agreement processes
Organizational project-enabling processes
Technical management processes
Technical processes
The standard defines two agreement processes:
Acquisition process (clause 6.1.1)
Supply process (clause 6.1.2)
The standard defines six organizational project-enabling processes:
Life cycle model management process (clause 6.2.1)
Infrastructure management process (clause 6.2.2)
Portfolio manage |
https://en.wikipedia.org/wiki/Vadastuximab%20talirine | Vadastuximab talirine is an antibody-drug conjugate (ADC) directed to CD33 (siglec-3) which is a transmembrane receptor expressed on cells of myeloid lineage. The experimental drug, being developed by Seattle Genetics, was in clinical trials for the treatment of acute myeloid leukemia (AML).
Development of vadastuximab talirine was discontinued in 2017 after a pivotal phase III clinical trial.
Target, mAb, linker, and cytotoxin
The drug target, CD33, is expressed on most AML cells. The CD33 antibody is attached to a highly potent DNA binding agent, a pyrrolobenzodiazepine (PBD) dimer (SGD-1882), via a proprietary site-specific conjugation chemistry via a cleavable (valine-alanine dipeptide as cathepsin B cleavage site) maleimidocaproyl type linker, to a monoclonal antibody with engineered cysteines (EC-mAb). Vadastuximab talirine contains two site-specific drug attachment engineered cysteines. This use of engineered cysteine residues at the sites of drug linker attachment results in a drug loading of approximately 2 PBD dimers per antibody. PBD dimers are significantly more potent than systemic chemotherapeutic drugs and the site-specific conjugation technology (EC-mAb) allows uniform drug-loading of the cell-killing PBD agent to the anti-CD33 antibody.
Clinical trials
The drug has concluded phase I clinical trials for acute myeloid leukemia. Interim results were presented in Dec 2014. and published April 2015.
Based on interim data from ongoing phase I clinical trials presented at the 57th Annual Meeting of the American Society of Hematology (ASH), researchers at Seattle Genetics have planned a phase III clinical trial to begin in 2016. This phase III study is expected to evaluate vadastuximab talirine in combination with hypomethylating agents (HMAs; azacitidine, decitabine) in previously untreated older AML patients. The drug is also being evaluated broadly across multiple lines of therapy in patients with myeloid malignancies, including in ongoing and plan |
https://en.wikipedia.org/wiki/Rediet%20Abebe | Rediet Abebe (Amharic: ረድኤት አበበ) is an Ethiopian computer scientist working in algorithms and artificial intelligence. She is an assistant professor of computer science at the University of California, Berkeley. Previously, she was a Junior Fellow at the Harvard Society of Fellows.
Abebe's research develops mathematical and computational frameworks for examining questions related to inequality and distributive justice. She co-founded the multi-institutional interdisciplinary research initiatives MD4SG and Black in AI.
Early life and education
Abebe was born and raised in Addis Ababa, Ethiopia. She was educated in the Ethiopian National Curriculum at Nazareth School before winning a competitive merit-based scholarship to attend the International Community School of Addis Ababa for high school.
Abebe attended Harvard University where she earned a Bachelor of Arts degree in mathematics and later a Master of Science degree in applied mathematics. As an undergraduate, she co-authored research papers in mathematics, physics, and public health. While at Harvard, Abebe contributed to The Harvard Crimson as a staff writer, where she focused on the Cambridge public school system (2009-2011).
After college, she attended the University of Cambridge as the Governor William Shirley Scholar at Pembroke College. She completed Part III of the Mathematics Tripos and earned a Master of Advanced Studies in pure mathematics under the supervision of Imre Leader.
Abebe completed her doctoral degree in computer science at Cornell University, where she was advised by Jon Kleinberg. Her dissertation made notable contributions across multiple fields in computer science, receiving the 2020 ACM SIGKDD Dissertation Award and an honorable mention for the ACM SIGecom Dissertation Award. She is the first Black woman to complete a Ph.D. in computer science in the university's history.
Research and career
Abebe's research develops techniques in AI and algorithms, with a focus on inequality a |
https://en.wikipedia.org/wiki/Semiconductor%20industry%20in%20China | The Chinese semiconductor industry, including integrated circuit design and manufacturing, forms a major part of mainland China's information technology industry.
China's semiconductor industry consists of a wide variety of companies, from integrated device manufacturers to pure-play foundries, fabless semiconductor companies and OSAT companies. Integrated device manufacturers (IDMs) design and manufacture integrated circuits. Pure-play foundries only manufacture devices for other companies, without designing them, while fabless semiconductor companies only design devices. Examples of Chinese IDMs are YMTC and CXMT, examples of Chinese pure-play foundries are SMIC, Hua Hong Semiconductor and Wingtech, examples of Chinese fabless companies are Zhaoxin, HiSilicon and UNISOC, and examples of Chinese OSAT companies are JCET, Huatian Technology and Tongfu Microelectronics.
Overview
China is currently the world's largest semiconductor market in terms of consumption. In 2020, China represented 53.7% of worldwide chip sales, or $239.45 billion out of $446.1 billion. However, a large percentage are imported from multinational suppliers. In 2020, imports took up 83.38% ($199.7 billion) of total chip sales. In response, the country has launched a number of initiatives to close the gap, including investing $150 billion into its domestic IC industry through avenues like the National Integrated Circuit Industry Investment Fund (CICF), with a “Made in China 2025” goal of 70% domestic production.
China leads the world in terms of number of new fabs under construction, with 8 out of 19 worldwide in 2021, and 17 fabs in total are expected to start construction from 2021 to 2023. Total installed capacity of Chinese-owned chipmakers will also increase from 2.96 million wafers per month (wpm) in 2020 to 3.572 million wpm in 2021.
Due to the rapid pace of Chinese semiconductor industry advances, on October 7, 2022, the U.S. government announced a major set of export restrictions towa |
https://en.wikipedia.org/wiki/Gastritis | Gastritis is inflammation of the lining of the stomach. It may occur as a short episode or may be of a long duration. There may be no symptoms but, when symptoms are present, the most common is upper abdominal pain (see dyspepsia). Other possible symptoms include nausea and vomiting, bloating, loss of appetite and heartburn. Complications may include stomach bleeding, stomach ulcers, and stomach tumors. When due to autoimmune problems, low red blood cells due to not enough vitamin B12 may occur, a condition known as pernicious anemia.
Common causes include infection with Helicobacter pylori and use of nonsteroidal anti-inflammatory drugs (NSAIDs). Less common causes include alcohol, smoking, cocaine, severe illness, autoimmune problems, radiation therapy and Crohn's disease. Endoscopy, a type of X-ray known as an upper gastrointestinal series, blood tests, and stool tests may help with diagnosis. The symptoms of gastritis may be a presentation of a myocardial infarction. Other conditions with similar symptoms include inflammation of the pancreas, gallbladder problems, and peptic ulcer disease.
Prevention is by avoiding things that cause the disease. Treatment includes medications such as antacids, H2 blockers, or proton pump inhibitors. During an acute attack drinking viscous lidocaine may help. If gastritis is due to NSAIDs these may be stopped. If H. pylori is present it may be treated with a combination of antibiotics such as amoxicillin and clarithromycin. For those with pernicious anemia, vitamin B12 supplements are recommended either by mouth or by injection. People are usually advised to avoid foods that bother them.
Gastritis is believed to affect about half of people worldwide. In 2013 there were approximately 90 million new cases of the condition. As people get older the disease becomes more common. It, along with a similar condition in the first part of the intestines known as duodenitis, resulted in 50,000 deaths in 2015. H. pylori was first discovere |
https://en.wikipedia.org/wiki/System%20Management%20Bus | The System Management Bus (abbreviated to SMBus or SMB) is a single-ended simple two-wire bus for the purpose of lightweight communication. Most commonly it is found in chipsets of computer motherboards for communication with the power source for ON/OFF instructions. The exact functionality and hardware interfaces vary with vendors.
It is derived from I²C for communication with low-bandwidth devices on a motherboard, especially power related chips such as a laptop's rechargeable battery subsystem (see Smart Battery System and ACPI). Other devices might include external master hosts, temperature sensor, fan or voltage sensors, lid switches, clock generator, and RGB lighting. PCI add-in cards may connect to an SMBus segment.
A device can provide manufacturer information, indicate its model/part number, save its state for a suspend event, report different types of errors, accept control parameters, return status over SMBus, and poll chipset registers. The SMBus is generally not user configurable or accessible. Although SMBus devices usually can't identify their functionality, a new PMBus coalition has extended SMBus to include conventions allowing that.
The SMBus was defined by Intel and Duracell in 1994. It carries clock, data, and instructions and is based on Philips' I²C serial bus protocol. Its clock frequency range is 10 kHz to 100 kHz. (PMBus extends this to 400 kHz.) Its voltage levels and timings are more strictly defined than those of I²C, but devices belonging to the two systems are often successfully mixed on the same bus.
SMBus is used as an interconnect in several platform management standards including: ASF, DASH, IPMI.
SMBus is used to access DRAM configuration information as part of serial presence detect. SMBus has grown into a wide variety of system enumeration use cases other than power management.
SMBus/I²C Interoperability
While SMBus is derived from I²C, there are several major differences between the specifications of the two busses in the |
https://en.wikipedia.org/wiki/Melodichthys%20hadrocephalus | Melodichthys hadrocephalus is a rare species of viviparous brotula found in the northeastern Atlantic Ocean off the coast of France. It is found at depths from . This is the only known species in its genus. It is known from a single specimen. |
https://en.wikipedia.org/wiki/Cotton%20candy | Cotton candy, also known as candy floss (candyfloss) and fairy floss, is a spun sugar confection that resembles cotton. It usually contains small amounts of flavoring or food coloring.
It is made by heating and liquefying sugar, and spinning it centrifugally through minute holes, causing it to rapidly cool and re-solidify into fine strands. It is often sold at fairs, circuses, carnivals, and festivals, served in a plastic bag, on a stick, or on a paper cone.
It is made and sold globally, as candy floss in the United Kingdom, Ireland, India, New Zealand, Sri Lanka and South Africa, as fairy floss in Australia, as "daddy's beard" in France; as "girl's hair" in the United Arab Emirates and Saudi Arabia, as "girl’s yarn" in Egypt. Similar confections include Korean and Iranian .
History
Several sources track the origin of cotton candy to a form of spun sugar found in Europe in the 19th century. At that time, spun sugar was an expensive, labor-intensive endeavor and was not generally available to the average person. Others suggest versions of spun sugar originated in Italy as early as the 15th century.
Machine-spun cotton candy was invented in 1897 by dentist William Morrison and confectioner John C. Wharton, and first introduced to a wide audience at the 1904 World's Fair as Fairy Floss with great success, selling 68,655 boxes at 25¢ ($ today) per box. On September 6, 1905, Albert D. Robinson of Lynn, Massachusetts submitted his patent for an Electric Candy-Spinning Machine, a combination of an electronic starter and motor-driven rotatable bowl that maintained heating efficiently. By May 1907, he transferred the rights to the General Electric Company of New York. His patent remains today as the basic cotton candy machine.
Joseph Lascaux, a dentist from New Orleans, Louisiana, invented a similar cotton candy machine in 1921. His patent named the sweet confection "cotton candy", eventually overtaking the name "fairy floss", although it retains this name in Austral |
https://en.wikipedia.org/wiki/Speed%20of%20light%20%28cellular%20automaton%29 | In Conway's Game of Life (and related cellular automata), the speed of light is a propagation rate across the grid of exactly one step (either horizontally, vertically or diagonally) per generation. In a single generation, a cell can only influence its nearest neighbours, and so the speed of light (by analogy with the speed of light in physics) is the maximum rate at which information can propagate. It is therefore an upper bound to the speed at which any pattern can move.
Notation
As in physics, the speed of light is represented with the letter c. This in turn is used as a reference for describing the average propagation speed of any given type of spaceship. For example, a glider is said to have a speed of c/4, as it takes four generations for a given state to be translated by one cell. Similarly, the "lightweight spaceship" is said to have a speed of c/2, as it takes four generations for a given state to be translated by two cells.
Lightspeed propagation
While c is an absolute upper bound to propagation speed, the maximum speed of a spaceship in Conway's Game of Life is c/2. This is because it is impossible to build a spaceship that can move every generation. (This is not true, though, for cellular automata in general; for instance, many light-speed spaceships exist in Seeds.) It is, however, possible for objects to travel at the speed of light if they move through a medium other than empty space. Such media include trails of hives, and alternating stripes of live and dead cells.
Faster than light propagation
Certain patterns can appear to move at a speed greater than one cell per generation, but like faster than light phenomena in physics this is illusory.
An example is the "Star Gate", an arrangement of three converging gliders that will mutually annihilate on collision. If a lightweight spaceship (LWSS) hits the colliding gliders, it will appear to move forwards by 11 cells in only 6 generations, and thus travel faster than light. This illusion ha |
https://en.wikipedia.org/wiki/Online%20identity%20management | Online identity management (OIM), also known as online image management, online personal branding, or personal reputation management (PRM), is a set of methods for generating a distinguished Web presence of a person on the Internet. Online identity management also refers to identity exposure and identity disclosure, and has particularly developed in the management on online identity in social network services or online dating services.
Aspects
One aspect of the online identity management process has to do with improving the quantity and quality of traffic to sites that have content related to a person. In that aspect, OIM is a part of another discipline called search engine optimization with the difference that the only keyword is the person's name, and the optimization object is not necessary a single web site; it can consider a set of completely different sites that contain positive online references. The objective in this case is to get high rankings for as many sites as possible when someone search for a person's name. If the search engine used is Google, this action is called "to google someone".
Another aspect has to do with impression management, i.e. "the process through which people try to control the impressions other people form of them". One of the objectives, in particular, is to increase the online reputation of the person.
Pseudonyms are sometimes used to protect the true online identity of individuals from harm. This can be the case when presenting unpopular views or dissenting opinion online in a way that will not affect the true identity of the author. Facebook estimates that up to 11.2% of accounts are fake. Many of these profiles are used as logins to protect the true identity of online authors.
An individual's presence could be reflected in any kind of content that refers to that person, including news, participation in blogs and forums, personal web sites, social media presence, pictures, video, etc. Because of that, online identity manag |
https://en.wikipedia.org/wiki/Approximation%20property | In mathematics, specifically functional analysis, a Banach space is said to have the approximation property (AP), if every compact operator is a limit of finite-rank operators. The converse is always true.
Every Hilbert space has this property. There are, however, Banach spaces which do not; Per Enflo published the first counterexample in a 1973 article. However, much work in this area was done by Grothendieck (1955).
Later many other counterexamples were found. The space of bounded operators on does not have the approximation property. The spaces for and (see Sequence space) have closed subspaces that do not have the approximation property.
Definition
A locally convex topological vector space X is said to have the approximation property, if the identity map can be approximated, uniformly on precompact sets, by continuous linear maps of finite rank.
For a locally convex space X, the following are equivalent:
X has the approximation property;
the closure of in contains the identity map ;
is dense in ;
for every locally convex space Y, is dense in ;
for every locally convex space Y, is dense in ;
where denotes the space of continuous linear operators from X to Y endowed with the topology of uniform convergence on pre-compact subsets of X.
If X is a Banach space this requirement becomes that for every compact set and every , there is an operator of finite rank so that , for every .
Related definitions
Some other flavours of the AP are studied:
Let be a Banach space and let . We say that X has the -approximation property (-AP), if, for every compact set and every , there is an operator of finite rank so that , for every , and .
A Banach space is said to have bounded approximation property (BAP), if it has the -AP for some .
A Banach space is said to have metric approximation property (MAP), if it is 1-AP.
A Banach space is said to have compact approximation property (CAP), if in the
definition of AP an operator of finite rank is replace |
https://en.wikipedia.org/wiki/Xenon-enhanced%20CT%20scanning | Xenon-enhanced CT scanning is a method of computed tomography (CT scanning) used for neuroimaging in which the subject inhales xenon gas while CT images are made. The method can be used to assess changes in cerebral blood flow in the period shortly after a traumatic brain injury, or to detect or indicate the location of a stroke. Xenon acts as a contrast medium and the saturation of brain tissue is proportional to blood flow. This allows the estimation of blood flow to any given brain area based on imaging results. |
https://en.wikipedia.org/wiki/Max%20Carl%20Wilhelm%20Weber | Max Carl Wilhelm Weber van Bosse or Max Wilhelm Carl Weber (5 December 1852 – 7 February 1937) was a German-Dutch zoologist and biogeographer.
Weber studied at the University of Bonn, then at the Humboldt University in Berlin with the zoologist Eduard Carl von Martens (1831–1904). He obtained his doctorate in 1877. Weber taught at the University of Utrecht then participated in an expedition to the Barents Sea. He became Professor of Zoology, Anatomy and Physiology at the University of Amsterdam in 1883. In the same year he received naturalised Dutch citizenship.
His discoveries as leader of the Siboga Expedition led him to propose Weber's Line, which encloses the region in which the mammalian fauna is exclusively Australasian, as an alternative to Wallace's Line. As is the case with plant species, faunal surveys revealed that for most vertebrate groups Wallace’s line was not the most significant biogeographic boundary. The Tanimbar Island group, and not the boundary between Bali and Lombok, appears to be the major interface between the Oriental and Australasian regions for mammals and other terrestrial vertebrate groups.
With G.A.F. Molengraaff, Weber gave names to the Sahul Shelf and the Sunda Shelf in 1919.
Weber became member of the Royal Netherlands Academy of Arts and Sciences in 1887.
Weber is commemorated in the scientific names of three species of reptiles: Anomochilus weberi, Hydrosaurus weberi, and Pachydactylus weberi. Two species of mammal are also named after him: Prosciurillus weberi and Myotis weberi.
Publications
Weber, M. [W. C.] (ed.), 1890-1907. Zoologische Ergebnisse einer Reise in Niederländisch Ost-Indien, 1 (1890-1891): [i-v], i-xi, maps I-III, 1-460, pls. I-XXV; 2 (1892): [i-v], 1-571, pls. I-XXX; 3 (1894): [i-v], 1-476, pls. I-XXII; 4 (1897-1907): [i-v], 1-453, pls. I-XVI (E. J. Brill, Leiden) .
Weber, M. [W. C.], 1902. Introduction et description de l'expedition", I. Siboga-expeditie .
Weber, M. [W. C.], 1904b. Enkele resultaten d |
https://en.wikipedia.org/wiki/Fiber%20network%20mechanics | Fiber network mechanics is a subject within physics and mechanics that deals with the deformation of networks made by the connection of slender fibers,. Fiber networks are used to model the mechanics of fibrous materials such as biopolymer networks and paper products. Depending on the mechanical behavior of individual filaments, the networks may be composed of mechanical elements such as Hookean springs, Euler-Bernoulli beams, and worm-like chains. The field of fiber network mechanics is closely related to the mechanical analysis of frame structures, granular materials, critical phenomena, and lattice dynamics. |
https://en.wikipedia.org/wiki/Helldivers%202 | Helldivers 2 is an upcoming video game. It is the sequel to the 2015 video game Helldivers. Unlike the first game, which was a top-down shooter, Helldivers 2 is a third-person shooter. It is scheduled to be released on February 8, 2024 for PlayStation 5 and Microsoft Windows.
Gameplay
Unlike the first game, which was a top-down shooter, Helldivers 2 is a third-person shooter. Similar to the first game, players are able to select Strategems, which are air drops players can call, which include cluster bombs, sentry guns, shield generators or supply pods containing limited-use special weaponry. Friendly fire is also always on. The game's armor system is inspired by real firearms fired against armored targets. The game also features multiplayer with up to four players, in which they're able to "explore unique planets and complete objectives together, and upgrade your equipment through the deep progression system of Helldivers 2."
Development
On December 3, 2020, Arrowhead Game Studios revealed that they were working on a new project expected to be released on PlayStation 5. It was also confirmed that the game would be a third-person shooter. CEO and game director, Johan Pilestedt said, "We are incredibly excited to create a new, next-gen, co-op experience for our fans and community. We are looking for talented developers to join us on this journey and are looking forward to sharing more details about the project at a later date."
On September 13, 2021, Helldivers 2 was mentioned in a GeForce Now leak. The game was then teased in a TikTok post that the developers uploaded. The post show's Arrowhead's social media manager starting their workday, which is then followed by a series of posts from fans demanding them to release the game. A portion of the game's trailer was then leaked, but was later removed.
On May 24, 2023, Helldivers 2 was announced during a PlayStation Showcase, which stated that the game would release later in 2023. On July 6, 2023, a trailer showc |
https://en.wikipedia.org/wiki/NUTS%20statistical%20regions%20of%20Croatia | Croatia (HR) is included in the Nomenclature of Territorial Units for Statistics (NUTS) of the European Union. The NUTS of Croatia were defined during the Accession of Croatia to the European Union, codified by the Croatian Bureau of Statistics in early 2007. The regions were revised twice, first in 2012, and then in 2021.
The three NUTS levels are:
NUTS-1: Croatia
NUTS-2: 4 regions (non-administrative)
NUTS-3: 21 counties (administrative)
The NUTS codes are as follows:
Below the NUTS levels, there are two LAU levels:
LAU-1: none (same as NUTS-3)
LAU-2: Cities and municipalities (Gradovi i općine)
See also
Subdivisions of Croatia
ISO 3166-2 codes of Croatia
FIPS region codes of Croatia |
https://en.wikipedia.org/wiki/YugabyteDB | YugabyteDB is a high-performance transactional distributed SQL database for cloud-native applications, developed by Yugabyte.
History
Yugabyte was founded by ex-Facebook engineers Kannan Muthukkaruppan, Karthik Ranganathan, and Mikhail Bautin. At Facebook, they were part of the team that built and operated Cassandra and HBase during a period of significant growth in workloads such as Facebook Messenger and Facebook's Operational Data Store.
The founders came together in February 2016 to build YugabyteDB, believing that the trends they experienced at Facebook – microservices, containerization, high availability, geographic distribution, APIs, and open-source – were relevant to all businesses, especially as they move from on-premise to cloud-native operations.
YugabyteDB was initially available in two editions: community and enterprise. In July 2019, Yugabyte open sourced previously commercial features and launched YugabyteDB as open-source under the Apache 2.0 license.
The rapid evolution of the product led to being named as a 2020 Gartner Cool Vendor in Data Management.
Yugabyte launched Yugabyte Cloud, now renamed YugabyteDB Managed, a fully managed database-as-a-service offering of YugabyteDB, in September 2021.
Funding
Six years after the company's inception, Yugabyte closed a $188 Million Series C funding round to become a Unicorn start-up with a valuation of $1.3Bn
Architecture
YugabyteDB is a distributed SQL database that aims to be strongly transactionally consistent across failure zones (i.e. ACID compliance]. Jepsen testing, the de facto industry standard for verifying correctness, has never fully passed, mainly due to race conditions during schema changes. In CAP Theorem terms YugabyteDB is a Consistent/Partition Tolerant (CP) database.
YugabyteDB has two layers, a storage engine known as DocDB and the Yugabyte Query Layer.
DocDB
The storage engine consists of a customized RocksDB combined with sharding and load balancing algorithms for the |
https://en.wikipedia.org/wiki/245%20%28number%29 | 245 (two hundred [and] forty-five) is the natural number following 244 and preceding 246.
Additionally, 245 is:
a composite number.
a stella octangula number.
palindromic in bases 34 (7734) and 48 (5548)
a Harshad number in bases 7, 9, 11, 15, 31, 35, 36 (and 14 other bases).
the aliquot sum of any of these numbers: 723, 1195, 2563, 3859,
part of the 97-aliquot tree. 4624, 4893, 2595, 1581, 723, 245, |
https://en.wikipedia.org/wiki/Great%20Canadian%20flag%20debate | The Great Canadian flag debate (or Great Flag Debate) was a national debate that took place in 1963 and 1964 when a new design for the national flag of Canada was chosen.
Although the flag debate had been going on for a long time prior, it officially began on June 15, 1964, when Prime Minister Lester B. Pearson proposed his plans for a new flag in the House of Commons. The debate lasted more than six months, bitterly dividing the people in the process. The debate over the proposed new Canadian flag was ended by closure on December 15, 1964. It resulted in the adoption of the "Maple Leaf" as the Canadian national flag.
The flag was inaugurated on February 15, 1965, a date that has been commemorated as National Flag of Canada Day since 1996.
Background
Union Jack and Red Ensign
The Union Jack served as the formal flag for various colonies in British North America, and remained as the formal national flag of Canada from Confederation to 1965. However, from the late-19th century to 1965, the civil ensign for Canada, the Canadian Red Ensign, was also used as an unofficial national flag and symbol for Canada.
The first Canadian Red Ensigns were used in Prime Minister Sir John A. Macdonald's time. The Governor General at the time of Macdonald's death, Lord Stanley, wrote to London in 1891:
... the Dominion Government has encouraged by precept and example the use on all public buildings throughout the provinces of the Red Ensign with the Canadian badge on the fly... [which] has come to be considered as the recognized flag of the Dominion, both ashore and afloat.
Under pressure from pro-imperial public opinion, Prime Minister Sir Wilfrid Laurier raised the Union Jack over Parliament, where it remained until the re-emergence of the Red Ensign in the 1920s.
William Lyon Mackenzie King tried to adopt a new Canadian national flag in 1925 and 1946, having received a recommendation that came back as a Red Ensign design that replaced the coat of arms of Canada with a gold |
https://en.wikipedia.org/wiki/Educational%20Commission%20for%20Foreign%20Medical%20Graduates | According to the US Department of Education, the Educational Commission for Foreign Medical Graduates is "the authorized credential evaluation and guidance agency for non-U.S. physicians and graduates of non-U.S. medical schools who seek to practice in the United States or apply for a U.S. medical residency program. It provides comprehensive information and resources on licensure, the U.S. Medical Licensure Examination (USMLE), residencies, and recognition."
Through its program of certification, the Educational Commission for Foreign Medical Graduates (ECFMG) assesses the readiness of international medical graduates to enter residency or fellowship programs in the United States that are accredited by the Accreditation Council for Graduate Medical Education (ACGME).
ECFMG acts as the registration and score-reporting agency for the USMLE for foreign medical students/ graduates, or in short, it acts as the designated Dean's office for International Medical Graduates (IMGs) in contrast to the American Medical Graduates (AMGs).
Medical schools in Canada that award the M.D. are not assessed by ECFMG, because the Liaison Committee on Medical Education historically accredited M.D.-granting institutions in both the U.S. and Canada (today, Canada has its own accrediting body that generally follows U.S. standards). M.D. graduates of American and Canadian institutions are not considered IMGs in either country.
History
ECFMG was founded in 1956, in response to the increase need for the evaluation of the readiness of international medical graduates entering the physician workforce during the 1950 expansion of US healthcare system. Its initial name was Evaluation Service for Foreign Medical Graduates (ESFMG). Later that year, it was renamed Educational Council for Foreign Medical Graduates. In conjunction with NBME,
it created what became known as the ECFMG certification which included examinations and
assessments of English language proficiency. In 1974, it merged with the |
https://en.wikipedia.org/wiki/Clock%20feedthrough | In analog electronics, Clock feedthrough is the result of the coupling between control signals on the analog switch and analog signal passing through the switch. In digital electronics, clock feedthrough is the coupling of the clock signal to the nodes where coupling is not intended. Such coupling happens because of the gate-to-source capacitance, interconnects parasitic capacitance or because of the substrate coupling. Clock feedthrough is generally considered harmful. Methods to reduce clock feedthrough include:
Slew rate reduction of the clock signal, usually by the resistor in series with the controlled gate.
Reduction of the voltage swing of the clock signal
Reduction of the interconnects parasitic capacitance by rerouting interconnects
Increase of the substrate resistance by the buried N-well insulation, shallow trench isolation, or back-grinding
Use of the differential clocks to spread clock feedthrough signal across large bandwidth
Use of the differential signal lines where clock feedthrough appears as common-mode signal |
https://en.wikipedia.org/wiki/Host%20adapter | In computer hardware, a host controller, host adapter, or host bus adapter (HBA), connects a computer system bus, which acts as the host system, to other network and storage devices. The terms are primarily used to refer to devices for connecting SCSI, SAS, NVMe, Fibre Channel and SATA devices. Devices for connecting to FireWire, USB and other devices may also be called host controllers or host adapters.
Host adapters can be integrated in the motherboard or be on a separate expansion card.
The term network interface controller (NIC) is more often used for devices connecting to computer networks, while the term converged network adapter can be applied when protocols such as iSCSI or Fibre Channel over Ethernet allow storage and network functionality over the same physical connection.
SCSI
A connects a host system and a peripheral SCSI device or storage system. These adapters manage service and task communication between the host and target. Typically a device driver, linked to the operating system, controls the host adapter itself.
In a typical parallel SCSI subsystem, each device has assigned to it a unique numerical ID. As a rule, the host adapter appears as SCSI ID 7, which gives it the highest priority on the SCSI bus (priority descends as the SCSI ID descends; on a 16-bit or "wide" bus, ID 8 has the lowest priority, a feature that maintains compatibility with the priority scheme of the 8-bit or "narrow" bus).
The host adapter usually assumes the role of SCSI initiator, in that it issues commands to other SCSI devices.
A computer can contain more than one host adapter, which can greatly increase the number of SCSI devices available.
Major SCSI adapter manufacturers are HP, ATTO Technology, Promise Technology, Adaptec, and LSI Corporation. LSI, Adaptec, and ATTO offer PCIe SCSI adapters which fit in Apple Mac, on Intel PCs, and low-profile motherboards which lack SCSI support due to the inclusion of SAS and/or SATA connectivity.
Fibre Channel
The te |
https://en.wikipedia.org/wiki/94th%20meridian%20west | The meridian 94° west of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, North America, the Gulf of Mexico, Central America, the Pacific Ocean, the Southern Ocean, and Antarctica to the South Pole.
The 94th meridian west forms a great circle with the 86th meridian east.
In the United States, the meridian runs just east of, and approximately parallel to, part of the border of Texas with Arkansas and Louisiana.
From Pole to Pole
Starting at the North Pole and heading south to the South Pole, the 94th meridian west passes through:
{| class="wikitable plainrowheaders"
! scope="col" width="120" | Co-ordinates
! scope="col" | Country, territory or sea
! scope="col" | Notes
|-
| style="background:#b0e0e6;" |
| style="background:#b0e0e6;" | Arctic Ocean
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Nunavut — Axel Heiberg Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Norwegian Bay
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Nunavut — Cornwall Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Belcher Channel
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Nunavut — Devon Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Wellington Channel
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Nunavut — Cornwallis Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Parry Channel
| style="background:#b0e0e6;" | Barrow Strait
|-
|
! scope="row" |
| Nunavut — Somerset Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Gulf of Boothia
| style="background:#b0e0e6;" | Brentford Bay
|-
|
! scope="row" |
| Nunavut — mainland
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Rasmussen Basin
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Nunavut — mainland
|-
| style="background: |
https://en.wikipedia.org/wiki/Popularity | In sociology, popularity is how much a person, idea, place, item or other concept is either liked or accorded status by other people. Liking can be due to reciprocal liking, interpersonal attraction, and similar factors. Social status can be due to dominance, superiority, and similar factors. For example, a kind person may be considered likable and therefore more popular than another person, and a wealthy person may be considered superior and therefore more popular than another person.
There are two primary types of interpersonal popularity: perceived and sociometric. Perceived popularity is measured by asking people who the most popular or socially important people in their social group are. Sociometric popularity is measured by objectively measuring the number of connections a person has to others in the group. A person can have high perceived popularity without having high sociometric popularity, and vice versa.
According to psychologist Tessa Lansu at the Radboud University Nijmegen, "Popularity [has] to do with being the middle point of a group and having influence on it."
Introduction
The term popularity is borrowed from the Latin term popularis, which originally meant "common." The current definition of the word popular, the "fact or condition of being well liked by the people", was first seen in 1601.
While popularity is a trait often ascribed to an individual, it is an inherently social phenomenon and thus can only be understood in the context of groups of people. Popularity is a collective perception, and individuals report the consensus of a group's feelings towards an individual or object when rating popularity. It takes a group of people to like something, so the more that people advocate for something or claim that someone is best liked, the more attention it will get, and the more popular it will be deemed.
Notwithstanding the above, popularity as a concept can be applied, assigned, or directed towards objects such as songs, movies, websites, a |
https://en.wikipedia.org/wiki/Rational%20function | In mathematics, a rational function is any function that can be defined by a rational fraction, which is an algebraic fraction such that both the numerator and the denominator are polynomials. The coefficients of the polynomials need not be rational numbers; they may be taken in any field K. In this case, one speaks of a rational function and a rational fraction over K. The values of the variables may be taken in any field L containing K. Then the domain of the function is the set of the values of the variables for which the denominator is not zero, and the codomain is L.
The set of rational functions over a field K is a field, the field of fractions of the ring of the polynomial functions over K.
Definitions
A function is called a rational function if and only if it can be written in the form
where and are polynomial functions of and is not the zero function. The domain of is the set of all values of for which the denominator is not zero.
However, if and have a non-constant polynomial greatest common divisor , then setting and produces a rational function
which may have a larger domain than , and is equal to on the domain of It is a common usage to identify and , that is to extend "by continuity" the domain of to that of Indeed, one can define a rational fraction as an equivalence class of fractions of polynomials, where two fractions and are considered equivalent if . In this case is equivalent to .
A proper rational function is a rational function in which the degree of is less than the degree of and both are real polynomials, named by analogy to a proper fraction in .
Degree
There are several non equivalent definitions of the degree of a rational function.
Most commonly, the degree of a rational function is the maximum of the degrees of its constituent polynomials and , when the fraction is reduced to lowest terms. If the degree of is , then the equation
has distinct solutions in except for certain values of , called critical |
https://en.wikipedia.org/wiki/P%C3%B3lya%20enumeration%20theorem | The Pólya enumeration theorem, also known as the Redfield–Pólya theorem and Pólya counting, is a theorem in combinatorics that both follows from and ultimately generalizes Burnside's lemma on the number of orbits of a group action on a set. The theorem was first published by J. Howard Redfield in 1927. In 1937 it was independently rediscovered by George Pólya, who then greatly popularized the result by applying it to many counting problems, in particular to the enumeration of chemical compounds.
The Pólya enumeration theorem has been incorporated into symbolic combinatorics and the theory of combinatorial species.
Simplified, unweighted version
Let X be a finite set and let G be a group of permutations of X (or a finite symmetry group that acts on X). The set X may represent a finite set of beads, and G may be a chosen group of permutations of the beads. For example, if X is a necklace of n beads in a circle, then rotational symmetry is relevant so G is the cyclic group Cn, while if X is a bracelet of n beads in a circle, rotations and reflections are relevant so G is the dihedral group Dn of order 2n. Suppose further that Y is a finite set of colors — the colors of the beads — so that YX is the set of colored arrangements of beads (more formally: YX is the set of functions .) Then the group G acts on YX. The Pólya enumeration theorem counts the number of orbits under G of colored arrangements of beads by the following formula:
where is the number of colors and c(g) is the number of cycles of the group element g when considered as a permutation of X.
Full, weighted version
In the more general and more important version of the theorem, the colors are also weighted in one or more ways, and there could be an infinite number of colors provided that the set of colors has a generating function with finite coefficients. In the univariate case, suppose that
is the generating function of the set of colors, so that there are fw colors of weight w for each integer w ≥ |
https://en.wikipedia.org/wiki/Clear%20cell | In histology, a clear cell is a cell that shows a clear cytoplasm when stained with hematoxylin and eosin (H&E).
Normal histology
In the skin, some secretory cells in the epithelium appear as clear cells, and are one of the components of eccrine sweat glands. A clear cell's plasma membrane is highly folded, more so on the apical and lateral surfaces. The cytoplasm of clear cells contains large amounts of glycogen and many mitochondria. Melanocytes appear as clear cells when in the stratum basale of the skin, and Langerhans' cells appear as clear cells in the stratum spinosum.
C cells, more commonly referred to as parafollicular cells are type of cell found in the thyroid gland which stain clear using H&E.
Clear cell cancers
Clear-cell adenocarcinomas are adenocarcinomas that contain a preponderance of clear cells. |
https://en.wikipedia.org/wiki/Mississippi%20statistical%20areas | The U.S. currently has 30 statistical areas that have been delineated by the Office of Management and Budget (OMB). On March 6, 2020, the OMB delineated seven combined statistical areas, four metropolitan statistical areas, and 19 micropolitan statistical areas in Mississippi.
Statistical areas
The Office of Management and Budget (OMB) has designated more than 1,000 statistical areas for the United States and Puerto Rico. These statistical areas are important geographic delineations of population clusters used by the OMB, the United States Census Bureau, planning organizations, and federal, state, and local government entities.
The OMB defines a core-based statistical area (commonly referred to as a CBSA) as "a statistical geographic entity consisting of the county or counties (or county-equivalents) associated with at least one core of at least 10,000 population, plus adjacent counties having a high degree of social and economic integration with the core as measured through commuting ties with the counties containing the core." The OMB further divides core-based statistical areas into metropolitan statistical areas (MSAs) that have "a population of at least 50,000" and micropolitan statistical areas (μSAs) that have "a population of at least 10,000, but less than 50,000."
The OMB defines a combined statistical area (CSA) as "a geographic entity consisting of two or more adjacent core-based statistical areas with employment interchange measures of at least 15%." The primary statistical areas (PSAs) include all combined statistical areas and any core-based statistical area that is not a constituent of a combined statistical area.
Table
The table below describes the 30 United States statistical areas and 82 counties of the State of Mississippi with the following information:
The combined statistical area (CSA) as designated by the OMB.
The CSA population according to 2019 US Census Bureau population estimates.
The core based statistical area (CBSA) as designated |
https://en.wikipedia.org/wiki/Collateral%20fissure | The collateral fissure (or sulcus) is on the tentorial surface of the hemisphere and extends from near the occipital pole to within a short distance of the temporal pole.
Behind, it lies below and lateral to the calcarine fissure, from which it is separated by the lingual gyrus; in front, it is situated between the parahippocampal gyrus and the anterior part of the fusiform gyrus.
Additional images |
https://en.wikipedia.org/wiki/Modal%20%CE%BC-calculus | In theoretical computer science, the modal μ-calculus (Lμ, Lμ, sometimes just μ-calculus, although this can have a more general meaning) is an extension of propositional modal logic (with many modalities) by adding the least fixed point operator μ and the greatest fixed point operator ν, thus a fixed-point logic.
The (propositional, modal) μ-calculus originates with Dana Scott and Jaco de Bakker, and was further developed by Dexter Kozen into the version most used nowadays. It is used to describe properties of labelled transition systems and for verifying these properties. Many temporal logics can be encoded in the μ-calculus, including CTL* and its widely used fragments—linear temporal logic and computational tree logic.
An algebraic view is to see it as an algebra of monotonic functions over a complete lattice, with operators consisting of functional composition plus the least and greatest fixed point operators; from this viewpoint, the modal μ-calculus is over the lattice of a power set algebra. The game semantics of μ-calculus is related to two-player games with perfect information, particularly infinite parity games.
Syntax
Let P (propositions) and A (actions) be two finite sets of symbols, and let Var be a countably infinite set of variables. The set of formulas of (propositional, modal) μ-calculus is defined as follows:
each proposition and each variable is a formula;
if and are formulas, then is a formula;
if is a formula, then is a formula;
if is a formula and is an action, then is a formula; (pronounced either: box or after necessarily )
if is a formula and a variable, then is a formula, provided that every free occurrence of in occurs positively, i.e. within the scope of an even number of negations.
(The notions of free and bound variables are as usual, where is the only binding operator.)
Given the above definitions, we can enrich the syntax with:
meaning
(pronounced either: diamond or after possibly ) meaning
mea |
https://en.wikipedia.org/wiki/Active%20metabolite | An active metabolite, or pharmacologically active metabolite is a biologically active metabolite of a xenobiotic substance, such as a drug or environmental chemical. Active metabolites may produce therapeutic effects, as well as harmful effects.
Metabolites of drugs
An active metabolite results when a drug is metabolized by the body into a modified form which produces effects in the body. Usually these effects are similar to those of the parent drug but weaker, although they can still be significant (see e.g. 11-hydroxy-THC, morphine-6-glucuronide). Certain drugs such as codeine and tramadol have metabolites (morphine and O-desmethyltramadol respectively) that are stronger than the parent drug and in these cases the metabolite may be responsible for much of the therapeutic action of the parent drug. Sometimes, however, metabolites may produce toxic effects and patients must be monitored carefully to ensure they do not build up in the body. This is an issue with some well-known drugs, such as pethidine (meperidine) and dextropropoxyphene.
Prodrugs
Sometimes drugs are formulated in an inactive form that is designed to break down inside the body to form the active drug. These are called prodrugs. The reasons for this type of formulation may be because the drug is more stable during manufacture and storage as the prodrug form, or because the prodrug is better absorbed by the body or has superior pharmacokinetics (e.g., lisdexamphetamine). |
https://en.wikipedia.org/wiki/Opacity%20porins | Opacity family porins are a family of porins from pathogenic Neisseria.
These bacteria possess a repertoire of phase-variable opacity proteins that mediate various pathogen/host cell interactions. These proteins are related to OmpA-like transmembrane domain family. |
https://en.wikipedia.org/wiki/Wiswesser%20line%20notation | Wiswesser line notation (WLN), invented by William J. Wiswesser in 1949, was the first line notation capable of precisely describing complex molecules. It was the basis of ICI Ltd's CROSSBOW database system developed in the late 1960s. WLN allowed for indexing the Chemical Structure Index (CSI) at the Institute for Scientific Information (ISI). It was also the tool used to develop the CAOCI (Commercially Available Organic Chemical Intermediates) database, the datafile from which Accelrys' (successor to MDL) ACD file was developed. WLN is still being extensively used by BARK Information Services. Descriptions of how to encode molecules as WLN have been published in several books.
Examples
1H : methane
2H : ethane
3H : propane
1Y : isobutane
1X : neopentane
Q1 : methanol
1R : toluene
1V1 : acetone
2O2 : diethyl ether
1VR : acetophenone
ZR CVQ : 3-aminobenzoic acid
QVYZ1R : phenylalanine
QX2&2&2 : 3-ethylpentan-3-ol
QVY3&1VQ : 2-propylbutanedioic acid
L66J BMR& DSWQ IN1&1 : 6-dimethylamino-4-phenylamino-naphthalene-2-sulfonic acid
QVR-/G 5 : pentachlorobenzoic acid |
https://en.wikipedia.org/wiki/Cartan%20formula | In mathematics, Cartan formula can mean:
one in differential geometry: , where , and are Lie derivative, exterior derivative, and interior product, respectively, acting on differential forms. See interior product for the detail. It is also called the Cartan homotopy formula or Cartan magic formula. This formula is named after Élie Cartan.
one in algebraic topology, which is one of the five axioms of Steenrod algebra. It reads:
.
See Steenrod algebra for the detail. The name derives from Henri Cartan, son of Élie.
Footnotes
See also
List of things named after Élie Cartan |
https://en.wikipedia.org/wiki/Shadow%20effect | The shadow effect is a phenomenon seen in genetic studies that use noninvasive genetic data collection methods. It occurs when there are not enough loci and/or loci that have low variance of alleles within the population. As a result, researchers can capture two separate individuals and mistakenly label them as the same individual. This can create a negative bias in the data and portray a population as smaller and less genetically diverse than it is. This is most commonly seen in collection methods that rely on environmental DNA (eDNA) which is collected directly from the environment (such as feces or hair removed from the ground). The accuracy of non-invasive collection data can be increased by increasing the amount of loci being examined during the study.
Background
There are several types of rarefaction methods that can be used to estimate the size of a hard monitor species. The study of population size and density falls under demography, the study of populations of any kind of organism.
Mark and recapture is a common form of data collection involving species with large populations. Being able to capture and mark a species in a noninvasive way allows for accurate readings of the population's size, both total and effective over several rounds of recapture. However, for species that are difficult to capture or view directly such as endangered species, it can be near impossible to use the mark-recapture method to obtain genetic samples.
Another method for population size estimation is a real-time polymerase chain reaction (qPCR). qPCR is a molecular approach that measures the amplification of DNA over time rather than just at the end of the reaction. This method is useful because it can rely on eDNA to give an estimate of how abundant a species is in a given habitat.
Noninvasive forms of data collection can be achieved through the collection of fur, feces or other fragments of DNA-rich material left behind (eDNA). Once considered costly, modern advancements hav |
https://en.wikipedia.org/wiki/Semantic%20Sensor%20Web | The Semantic Sensor Web (SSW) is a marriage of sensor web and semantic Web technologies. The encoding of sensor descriptions and sensor observation data with Semantic Web languages enables more expressive representation, advanced access, and formal analysis of sensor resources. The SSW annotates sensor data with spatial, temporal, and thematic semantic metadata. This technique builds on current standardization efforts within the Open Geospatial Consortium's Sensor Web Enablement (SWE) and extends them with Semantic Web technologies to provide enhanced descriptions and access to sensor data.
Semantic modeling and annotation of sensor data
Ontologies and other semantic technologies can be key enabling technologies for sensor networks because they will improve semantic interoperability and integration, as well as facilitate reasoning, classification and other types of assurance and automation not included in the Open Geospatial Consortium (OGC) standards. A semantic sensor network will allow the network, its sensors and the resulting data to be organised, installed and managed, queried, understood and controlled through high-level specifications. Ontologies for sensors provide a framework for describing sensors. These ontologies allow classification and reasoning on the capabilities and measurements of sensors, provenance of measurements and may allow reasoning about individual sensors as well as reasoning about the connection of a number of sensors as a macroinstrument. The sensor ontologies, to some degree, reflect the OGC standards and, given ontologies that can encode sensor descriptions, understanding how to map between the ontologies and OGC models is an important consideration. Semantic annotation of sensor descriptions and services that support sensor data exchange and sensor network management will serve a similar purpose as that espoused by semantic annotation of Web services. This research is conducted through the W3C Semantic Sensor Network Incubator Gro |
https://en.wikipedia.org/wiki/Principal%20branch | In mathematics, a principal branch is a function which selects one branch ("slice") of a multi-valued function. Most often, this applies to functions defined on the complex plane.
Examples
Trigonometric inverses
Principal branches are used in the definition of many inverse trigonometric functions, such as the selection either to define that
or that
.
Exponentiation to fractional powers
A more familiar principal branch function, limited to real numbers, is that of a positive real number raised to the power of .
For example, take the relation , where is any positive real number.
This relation can be satisfied by any value of equal to a square root of (either positive or negative). By convention, is used to denote the positive square root of .
In this instance, the positive square root function is taken as the principal branch of the multi-valued relation .
Complex logarithms
One way to view a principal branch is to look specifically at the exponential function, and the logarithm, as it is defined in complex analysis.
The exponential function is single-valued, where is defined as:
where .
However, the periodic nature of the trigonometric functions involved makes it clear that the logarithm is not so uniquely determined. One way to see this is to look at the following:
and
where is any integer and continues the values of the -function from their principal value range , corresponding to into the principal value range of the -function , covering all four quadrants in the complex plane.
Any number defined by such criteria has the property that .
In this manner log function is a multi-valued function (often referred to as a "multifunction" in the context of complex analysis). A branch cut, usually along the negative real axis, can limit the imaginary part so it lies between and . These are the chosen principal values.
This is the principal branch of the log function. Often it is defined using a capital letter, .
See also
Branch point
B |
https://en.wikipedia.org/wiki/Cameron%20Leigh%20Stewart | Cameron Leigh Stewart FRSC is a Canadian mathematician. He is a professor of pure mathematics at the University of Waterloo.
Contributions
He has made numerous contributions to number theory, in particular to work on the abc conjecture. In 1976 he obtained, with Alan Baker, an effective improvement to Liouville's Theorem. In 1991 he proved that the number of solutions to a Thue equation is at most , where is a pre-determined positive real number and is the number of distinct primes dividing a large divisor of . This improves on an earlier result of Enrico Bombieri and Wolfgang M. Schmidt and is close to the best possible result. In 1995 he obtained, along with Jaap Top, the existence of infinitely many quadratic, cubic, and sextic twists of elliptic curves of large rank. In 1991 and 2001 respectively, he obtained, along with Kunrui Yu, the best unconditional estimates for the abc conjecture. In 2013, he solved an old problem of Erdős (so his Erdős number is 1) involving Lucas and Lehmer numbers. In particular, he proved that the largest prime divisor of satisfies .
Education
Stewart completed a B.Sc. at the University of British Columbia in 1971 and a M.Sc in 1972 from McGill University. He earned his doctorate from the University of Cambridge in 1976, under the supervision of Alan Baker.
Recognition
In 1974, while at Cambridge, he was awarded the J.T. Knight Prize.
He was elected Fellow of the Royal Society of Canada in 1989. He was appointed Fellow of the Fields Institute in 2008. Since 2003 he has held a Canada Research Chair (tier 1). Since 2005 he has been appointed University Professor at the University of Waterloo. He was selected to give the annual Isidore and Hilda Dressler Lecture at Kansas State University in 2015.
He was elected as a fellow of the Canadian Mathematical Society in 2019.
Selected works |
https://en.wikipedia.org/wiki/Large-signal%20model | Large-signal modeling is a common analysis method used in electronic engineering to describe nonlinear devices in terms of the underlying nonlinear equations. In circuits containing nonlinear elements such as transistors, diodes, and vacuum tubes, under "large signal conditions", AC signals have high enough magnitude that nonlinear effects must be considered.
"Large signal" is the opposite of "small signal", which means that the circuit can be reduced to a linearized equivalent circuit around its operating point with sufficient accuracy.
Differences between Small Signal and Large Signal
A small signal model takes a circuit and based on an operating point (bias) and linearizes all the components. Nothing changes because the assumption is that the signal is so small that the operating point (gain, capacitance, etc.) doesn't change.
A large signal model, on the other hand, takes into account the fact that the large signal actually affects the operating point, as well as that elements are non-linear and circuits can be limited by power supply values to avoid variation in operating point. A small signal model ignores simultaneous variations in the gain and supply values.
See also
Diode modelling
Transistor models#Large-signal nonlinear models |
https://en.wikipedia.org/wiki/Gmail%20interface | The Gmail interface makes Gmail unique amongst webmail systems for several reasons. Most evident to users are its search-oriented features and means of managing e-mail in a "conversation view" that is similar to an Internet forum.
An official redesign of the Gmail interface was rolled out on November 1, 2011 that simplified the look and feel of Gmail into a more minimalist design to provide a more consistent look throughout Google products and services as part of an overall design change. Another major redesign took place April 2018 which introduced new information rights management controls designed for business use cases.
Programming
Gmail makes use of Ajax, employing browser features such as JavaScript, keyboard access keys and Web feed integration.
Organization
Advanced search
Gmail allows users to conduct advanced searches using either the Advanced Search interface or through search operators in the search box. Emails can be searched by their text; by their ‘From’, ‘To’ and ‘Subject’ fields, by their location, date and size; by associated labels, categories and circles, by whether or not the message is read, and by whether or not the message has an attachment. There are also a large number of advanced search operators. By default, Gmail combines search terms with an invisible "AND". Gmail allows the use of Boolean operators such as "OR" for finding messages that match at least one of the more search terms.
Filters
Gmail allows users to create rules (‘filters’) for the automatic organization of incoming mail. Filters are created using the Advanced Search interface using the same criteria as those used for searching. Gmail can perform any combination of the following actions upon an email that meets all the specified criteria in a filter:
archiving (i.e. removing the message from the Inbox)
adding a star
marking as read
marking as important
applying a label
moving to the bin
forwarding to another e-mail address
Labels
Labels provide a flexible meth |
https://en.wikipedia.org/wiki/Lego%20Trains | Lego Trains (stylized as LEGO Trains) is a product range and theme of the construction toy Lego, which incorporates buildable train sets. The Lego Trains theme became a sub-theme of Lego City in 2006. Products in the range have included locomotives, tracks, rolling stock, stations, signal boxes, and other track-side buildings and accessories. The theme is popular among adult fans, as well as children, and has spawned international associations and conventions. The train system is sometimes referred to as 'L-gauge' among Lego fans, in reference to traditional model railway scales. Lego trains use a nominal gauge of , based on 5-stud track centerlines gauge, corresponding with a circa 1:38 scale.
Development
The design of Lego trains has developed substantially, with several different systems introduced, with varying degrees of cross-compatibility.
The Blue Era (1966-1980)
Lego trains were first introduced in 1966 with Lego set number 080. The train sets used blue rails, and the first train sets were simply push-along. Set number 115 introduced 4.5 volt battery-operated trains (initially the battery box was handheld, but train sets soon contained a railcar that carried the battery box), and train sets numbered 720 (1969) and up operated on 12-volt electrified rails, introduced in 1969. In 1972, 4.5-volt trains gained a monolithic railcar that carried the batteries and contained both a bottom-mounted stop button to be actuated by signals, as well as a side-mounted lever for manual go/stop/back control and tripping by a track-side pivot. All three kinds (push trains, 4.5-volt battery-operated trains and 12-volt electric trains) existed alongside each other and even allowed for upgrades. The motors were the same size, the push trains used a motor-shaped dummy block of bricks, and all used the same wheel style. These wheels had the same press-fit metal axles as used in the two larger sizes of rubber-tire Lego wheels, which also meant that both 4.5-volt and 12-volt m |
https://en.wikipedia.org/wiki/Grand%20Challenges | Grand Challenges are difficult but important problems set by various institutions or professions to encourage solutions or advocate for the application of government or philanthropic funds especially in the most highly developed economies and
Grand challenges are more than ordinary research questions or priorities, they are end results or outcomes that are global in scale; very difficult to accomplish, yet offer hope of being ultimately tractable; demand an extensive number of research projects across many technical and non-technical disciplines and accompanied by well-defined metrics. Lastly, Grand challenges "require coordinated, collaborative, and collective efforts" and must capture "the popular imagination, and thus political support."
In engineering
Grand Challenges: A Strategic Plan for Bridge Engineering, initiative sponsored by the Highway Subcommittee on Bridges and Structures (HSCOBS) of the American Association of State Highway and Transportation Officials (AASHTO) started in 2000.
Grand Challenges for Engineering, initiative sponsored by the National Academy of Engineering (NAE) for engineering problems in the next century.
Global Grand Challenges, summit meetings sponsored by The National Academy of Engineering of the United States, The Royal Academy of Engineering of the United Kingdom, and the Chinese Academy of Engineering.
ASCE Grand Challenge for Civil Engineering, initiative by the American Society of Civil Engineering's (ASCE) to enhance significantly the performance and life-cycle value of infrastructure by 2025.
Grand Challenges for Disaster Reduction, initiative sponsored by the National Science and Technology Council, Committee on Environment and Natural Resources.
In government and military
DARPA Grand Challenge, initiative to develop technologies needed to create fully autonomous ground vehicles, capable of completing a substantial off-road course within a limited time.
DARPA Urban Challenge, part of DARPA's Grand Chall |
https://en.wikipedia.org/wiki/Syzygium%20suborbiculare | Syzygium suborbiculare, the red bush apple or lady apple, is a shrub or small understorey tree native to northern Australia and New Guinea.
Description
This tree or shrub typically grows to a height of . It blooms between June and November producing white flowers. The leaves are smooth, thick, leathery, broad oval 7.2–19 cm long. Flowers are white with numerous stamens. The edible fruit is flattened-globular, fleshy, prominently ribbed, 3–7 cm long, with a large seed.
Habitat
It is found in open forests and woodland and on the flood plains and rocky sandstone hills of the Kimberley region of Western Australia where it grows in sandy soils.
Uses
The fruit is eaten raw by Aboriginal people. The tree is also used as firewood and as a nectar source for bees.
The fruit has been regarded among the Aboriginal people as being particularly medicinally effective against respiratory problems. The juice extracted from the boiled or roasted fruit has been used to clear chest congestion or as a cough remedy; the fire-heated leaves were used to heal wounds; the pulp of a cooked fruit has been used to treat a sore ear; chewed fruit or seeds have been used as a remedy against toothache or mouth sores. |
https://en.wikipedia.org/wiki/Streptomyces%20phage%20%CE%A60 | Streptomyces phage Φ0 is a bacteriophage that infects Streptomyces. It was discovered in 2016. The bacteriophage contains a double-stranded RNA genome and probably belongs to the Cystoviridae family. |
https://en.wikipedia.org/wiki/Shard%20%28database%20architecture%29 | A database shard, or simply a shard, is a horizontal partition of data in a database or search engine. Each shard is held on a separate database server instance, to spread load.
Some data within a database remains present in all shards, but some appear only in a single shard. Each shard (or server) acts as the single source for this subset of data.
Database architecture
Horizontal partitioning is a database design principle whereby rows of a database table are held separately, rather than being split into columns (which is what normalization and vertical partitioning do, to differing extents). Each partition forms part of a shard, which may in turn be located on a separate database server or physical location.
There are numerous advantages to the horizontal partitioning approach. Since the tables are divided and distributed into multiple servers, the total number of rows in each table in each database is reduced. This reduces index size, which generally improves search performance. A database shard can be placed on separate hardware, and multiple shards can be placed on multiple machines. This enables a distribution of the database over a large number of machines, greatly improving performance. In addition, if the database shard is based on some real-world segmentation of the data (e.g., European customers v. American customers) then it may be possible to infer the appropriate shard membership easily and automatically, and query only the relevant shard.
In practice, sharding is complex. Although it has been done for a long time by hand-coding (especially where rows have an obvious grouping, as per the example above), this is often inflexible. There is a desire to support sharding automatically, both in terms of adding code support for it, and for identifying candidates to be sharded separately. Consistent hashing is a technique used in sharding to spread large loads across multiple smaller services and servers.
Where distributed computing is used to separate l |
https://en.wikipedia.org/wiki/Dunstan%20St.%20Omer | Sir Dunstan Gerbert Raphael St. Omer (24 October 1927 – 5 May 2015) was a Saint Lucian painter, muralist and educator. He designed the national flag of Saint Lucia.
Early life
Dunstan St. Omer was born in Castries on 24 October 1927. He attended St. Aloysius R.C. Boys School and Saint Mary's College.
Career
St. Omer left Saint Lucia for Curaçao where he was influenced by the Greek artist Pandelis. He returned to Saint Lucia in 1949 and held various teaching jobs.
St. Omer was the editor of The Voice newspaper from 1959–1962.
St. Omer painted several murals in churches around Saint Lucia including the Cathedral Basilica of the Immaculate Conception. His murals feature black divinity portraying Christ and the Holy Family as black.
In 1967, St. Omer designed the flag of Saint Lucia, winning a national contest for the best flag design marking Saint Lucia's statehood.
He taught art from 1971 until his retirement in 2002. He also worked as an art specialist in the Ministry of Education.
Honours
In 2004, St. Omer received the Papal Medal from the Catholic Church and the Saint Lucia Cross from the government of Saint Lucia for his church murals. In 2007, the National Cultural Centre declared him a National Cultural Hero. He was appointed Knight Commander of the Order of St Michael and St George in 2010 for service to Art.
Personal life
Dunstan St. Omer was married to Cynthia St. Croix. They had nine children. |
https://en.wikipedia.org/wiki/38%20%28number%29 | 38 (thirty-eight) is the natural number following 37 and preceding 39.
In mathematics
specifically, the 11th discrete Semiprime, it being the 7th of the form (2.q).
the first member of the third cluster of two discrete semiprimes 38, 39 the next such cluster is 57, 58.
with an aliquot sum of 22 in an aliquot sequence of five composite numbers (38,22,14,10,8,7,1,0) to the Prime in the 7-aliquot tree. 34 is the first semiprime within a chain of 4 semiprimes in its aliquot sequence (38,22,14,10). The next semiprime with a four semiprime chain is 166.
38! − 1 yields which is the 16th factorial prime.
There is no answer to the equation φ(x) = 38, making 38 a nontotient.
38 is the sum of the squares of the first three primes.
37 and 38 are the first pair of consecutive positive integers not divisible by any of their digits.
38 is the largest even number which cannot be written as the sum of two odd composite numbers.
The sum of each row of the only non-trivial (order 3) magic hexagon is 38.
In science
The atomic number of strontium
Astronomy
The Messier object M38, a magnitude 7.0 open cluster in the constellation Auriga
The New General Catalogue object NGC 38, a spiral galaxy in the constellation Pisces
In other fields
Thirty-eight is also:
The 38th parallel north is the pre-Korean War boundary between North Korea and South Korea.
The number of slots on an American roulette wheel (0, 00, and 1 through 36; European roulette does not use the 00 slot and has only 37 slots)
The Ishihara test is a color vision test consisting of 38 pseudoisochromatic plates.
A "38" is often the name for a snub nose .38 caliber revolver.
The 38 class is the most famous class of steam locomotive used in New South Wales
Gerald Ford, 38th President of the United States
Arnold Schwarzenegger, 38th Governor of California, most recent Republican governor of California, and the second governor to be born outside of the United States
Cats have a total of 38 chromosomes in their genom |
https://en.wikipedia.org/wiki/Kunita%E2%80%93Watanabe%20inequality | In stochastic calculus, the Kunita–Watanabe inequality is a generalization of the Cauchy–Schwarz inequality to integrals of stochastic processes.
It was first obtained by Hiroshi Kunita and Shinzo Watanabe and plays a fundamental role in their extension of Ito's stochastic integral to square-integrable martingales.
Statement of the theorem
Let M, N be continuous local martingales and H, K measurable processes. Then
where the angled brackets indicates the quadratic variation and quadratic covariation operators. The integrals are understood in the Lebesgue–Stieltjes sense. |
https://en.wikipedia.org/wiki/Proactive%20learning | Proactive learning is a generalization of active learning designed to relax unrealistic assumptions and thereby reach practical applications.
"Active learning seeks to select the most informative unlabeled instances and ask an omniscient oracle for their labels, so as to retrain a learning algorithm maximizing accuracy. However, the oracle is assumed to be infallible (never wrong), indefatigable (always answers), individual (only one oracle), and insensitive to costs (always free or always charges the same)."
"In real life, it is possible and more general to have multiple sources of information with differing reliabilities or areas of expertise. Active learning also assumes that the single oracle is perfect, always providing a correct answer when requested. In reality, though, an "oracle" (if we generalize the term to mean any source of expert information) may be incorrect (fallible)
with a probability that should be a function of the difficulty of the question. Moreover, an oracle may be reluctant – it may refuse to answer if it is too uncertain or too busy. Finally, active learning presumes the oracle is either free or charges uniform cost in label elicitation.
Such an assumption is naive since cost is likely to be regulated by difficulty (amount of work required to formulate an answer) or other factors."
Proactive learning relaxes all four of these assumptions, relying on a decision-theoretic approach to jointly select the optimal oracle and instance, by casting the problem as a utility optimization problem subject to a budget constraint. |
https://en.wikipedia.org/wiki/Pleurotus%20tuber-regium | Pleurotus tuber-regium, the king tuber mushroom, is an edible gilled fungus native to the tropics, including Africa, Asia, and Australasia. It has been shown to be a distinct species incapable of cross-breeding and phylogenetically removed from other species of Pleurotus.
Pleurotustuber-regium is a saprotroph found on dead wood, including Daniellia trees in Africa. As the fungus consumes the wood, it produces a sclerotium, or storage tuber, either within the decaying wood or in the underlying soil. These sclerotia are round, dark brown with white interiors, and up to 30 cm wide. The fruiting bodies then emerge from the sclerotium. Both the sclerotium and the fruiting bodies are edible.
In addition to being saprotrophic, P. tuber-regium is also nematophagous, catching nematodes by paralyzing them with a toxin.
Pleurotus tuber-regium has a history of economic importance in Africa as food and as a medicinal mushroom. Industrial cultivation is not yet common, but studies have shown P. tuber-regium can be grown on organic wastes such as corn, sawdust, cardboard. Mycelial growth occurs between 15 °C and 40 °C, with an optimum growth rate at 35 °C. A recent study demonstrated that polysaccharides of P. tuber-regium are able to delay the progression of diabetes and associated complications in rats with insulin resistance.
Pleurotus tuber-regium can degrade polyethylene film. |
https://en.wikipedia.org/wiki/TRANK1 | Tetratricopeptide repeat and ankyrin repeat containing 1 is a protein that in humans is encoded by the TRANK1 gene.
Disease Linkage
Through a Genome-wide association study, TRANK1 has been relationed with the Bipolar disorder. |
https://en.wikipedia.org/wiki/Poincar%C3%A9%20series%20%28modular%20form%29 | In number theory, a Poincaré series is a mathematical series generalizing the classical theta series that is associated to any discrete group of symmetries of a complex domain, possibly of several complex variables. In particular, they generalize classical Eisenstein series. They are named after Henri Poincaré.
If Γ is a finite group acting on a domain D and H(z) is any meromorphic function on D, then one obtains an automorphic function by averaging over Γ:
However, if Γ is a discrete group, then additional factors must be introduced in order to assure convergence of such a series. To this end, a Poincaré series is a series of the form
where Jγ is the Jacobian determinant of the group element γ, and the asterisk denotes that the summation takes place only over coset representatives yielding distinct terms in the series.
The classical Poincaré series of weight 2k of a Fuchsian group Γ is defined by the series
the summation extending over congruence classes of fractional linear transformations
belonging to Γ. Choosing H to be a character of the cyclic group of order n, one obtains the so-called Poincaré series of order n:
The latter Poincaré series converges absolutely and uniformly on compact sets (in the upper halfplane), and is a modular form of weight 2k for Γ. Note that, when Γ is the full modular group and n = 0, one obtains the Eisenstein series of weight 2k. In general, the Poincaré series is, for n ≥ 1, a cusp form.
Notes |
https://en.wikipedia.org/wiki/Topological%20combinatorics | The mathematical discipline of topological combinatorics is the application of topological and algebro-topological methods to solving problems in combinatorics.
History
The discipline of combinatorial topology used combinatorial concepts in topology and in the early 20th century this turned into the field of algebraic topology.
In 1978 the situation was reversed—methods from algebraic topology were used to solve a problem in combinatorics—when László Lovász proved the Kneser conjecture, thus beginning the new field of topological combinatorics. Lovász's proof used the Borsuk–Ulam theorem and this theorem retains a prominent role in this new field. This theorem has many equivalent versions and analogs and has been used in the study of fair division problems.
In another application of homological methods to graph theory, Lovász proved both the undirected and directed versions of a conjecture of András Frank: Given a k-connected graph G, k points , and k positive integers that sum up to , there exists a partition of such that , , and spans a connected subgraph.
In 1987 the necklace splitting problem was solved by Noga Alon using the Borsuk–Ulam theorem. It has also been used to study complexity problems in linear decision tree algorithms and the Aanderaa–Karp–Rosenberg conjecture. Other areas include topology of partially ordered sets and Bruhat orders.
Additionally, methods from differential topology now have a combinatorial analog in discrete Morse theory.
See also
Sperner's lemma
Discrete exterior calculus
Topological graph theory
Combinatorial topology
Finite topological space |
https://en.wikipedia.org/wiki/Electroencephalography | Electroencephalography (EEG) is a method to record an electrogram of the spontaneous electrical activity of the brain. The biosignals detected by EEG have been shown to represent the postsynaptic potentials of pyramidal neurons in the neocortex and allocortex. It is typically non-invasive, with the EEG electrodes placed along the scalp (commonly called "scalp EEG") using the International 10–20 system, or variations of it. Electrocorticography, involving surgical placement of electrodes, is sometimes called "intracranial EEG". Clinical interpretation of EEG recordings is most often performed by visual inspection of the tracing or quantitative EEG analysis.
Voltage fluctuations measured by the EEG bioamplifier and electrodes allow the evaluation of normal brain activity. As the electrical activity monitored by EEG originates in neurons in the underlying brain tissue, the recordings made by the electrodes on the surface of the scalp vary in accordance with their orientation and distance to the source of the activity. Furthermore, the value recorded is distorted by intermediary tissues and bones, which act in a manner akin to resistors and capacitors in an electrical circuit. This means not all neurons will contribute equally to an EEG signal, with an EEG predominately reflecting the activity of cortical neurons near the electrodes on the scalp. Deep structures within the brain further away from the electrodes will not contribute directly to an EEG; these include the base of the cortical gyrus, mesial walls of the major lobes, hippocampus, thalamus, and brain stem.
A healthy human EEG will show certain patterns of activity that correlate with how awake a person is. The range of frequencies one observes are between 1 and 30 Hz, and amplitudes will vary between 20 and 100 μV. The observed frequencies are subdivided into various groups: alpha (8–13 Hz), beta (13–30 Hz), delta (0.5–4 Hz), and theta (4–7 Hz). Alpha waves are observed when a person is in a state of relaxed |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.