source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Lingula%20of%20cerebellum
The lingula is a small tongue-shaped process, consisting of four or five folia; it lies in front of the lobulus centralis, and is concealed by it. Anteriorly, it rests on the dorsal surface of the anterior medullary velum, and its white substance is continuous with that of the velum. Additional images
https://en.wikipedia.org/wiki/Medic%20to%20Medic
Medic to Medic is a UK registered charity supporting trainee health workers in developing countries with the costs of their education. History The aim of the Medic to Medic is to guarantee the tuition fees for healthcare students who have academic potential, but are in financial need in developing countries. With this consistency of income, students are able to focus on their studies until graduation. Medic to Medic links student health workers in developing countries to international donors. In this way, they function along the lines of “sponsor a child” schemes run by well-known charities. Of note, although individual students are linked to donors, donations are pooled so that even if a donor withdraws, no student is left disadvantaged. At first, donors were mostly health professionals (hence “Medic to Medic”), but now include many members of the public as well. Students send their linked sponsor regular updates on their progress. This can then develop into a correspondence if the donor so wishes. Students are supported with tuition fees and other necessary allowances as well as being given a medical equipment pack and textbooks so that they have everything they need to reach their FULL potential and successfully qualify as health workers in their home country. As of September 2021, over 62 students are being supported with a graduate alumni of over 140 health professionals. Medic to Medic has expanded from sponsoring only medical students to sponsoring a whole range of trainee health professionals, from one country to three and from one university to six. This has all been thanks to donors, fundraisers, supporters, partner institutions and a fantastically enthusiastic team. See also Education in Malawi Education in Uganda
https://en.wikipedia.org/wiki/IWARP
iWARP is a computer networking protocol that implements remote direct memory access (RDMA) for efficient data transfer over Internet Protocol networks. Contrary to some accounts, iWARP is not an acronym. Because iWARP is layered on Internet Engineering Task Force (IETF)-standard congestion-aware protocols such as Transmission Control Protocol (TCP) and Stream Control Transmission Protocol (SCTP), it makes few requirements on the network, and can be successfully deployed in a broad range of environments. History In 2007, the IETF published five Request for Comments (RFCs) that define iWARP: RFC 5040 A Remote Direct Memory Access Protocol Specification is layered over Direct Data Placement Protocol (DDP). It defines how RDMA Send, Read, and Write operations are encoded using DDP into headers on the network. RFC 5041 Direct Data Placement over Reliable Transports is layered over MPA/TCP or SCTP. It defines how received data can be directly placed into an upper layer protocols receive buffer without intermediate buffers. RFC 5042 Direct Data Placement Protocol (DDP) / Remote Direct Memory Access Protocol (RDMAP) Security analyzes security issues related to iWARP DDP and RDMAP protocol layers. RFC 5043 Stream Control Transmission Protocol (SCTP) Direct Data Placement (DDP) Adaptation defines an adaptation layer that enables DDP over SCTP. RFC 5044 Marker PDU Aligned Framing for TCP Specification defines an adaptation layer that enables preservation of DDP-level protocol record boundaries layered over the TCP reliable connected byte stream. These RFCs are based on the RDMA Consortium's specifications for RDMA over TCP. The RDMA Consortium's specifications are influenced by earlier RDMA standards, including Virtual Interface Architecture (VIA) and InfiniBand (IB). Since 2007, the IETF has published three additional RFCs that maintain and extend iWARP: RFC 6580 IANA Registries for the Remote Direct Data Placement (RDDP) Protocols published in 2012 defines IANA re
https://en.wikipedia.org/wiki/Nonlinear%20metamaterial
A nonlinear metamaterial is an artificially constructed material that can exhibit properties not yet found in nature. Its response to electromagnetic radiation can be characterized by its permittivity and material permeability. The product of the permittivity and permeability results in the refractive index. Unlike natural materials, nonlinear metamaterials can produce a negative refractive index. These can also produce a more pronounced nonlinear response than naturally occurring materials. Nonlinear metamaterials are a periodic, nonlinear, transmission medium. These are a type of negative index metamaterial where the nonlinearity is available because the microscopic electric field of the inclusions can be larger than the macroscopic electric field of the electromagnetic (EM) source. This then becomes a useful tool which allows for enhancing the nonlinear behavior of the metamaterial. A dominant nonlinear response, however, can be derived from the hysteresis-type dependence of the material's magnetic permeability on the magnetic component of the incident electromagnetic wave (light) propagating through the material. Furthermore, the hysteresis-type dependence of the magnetic permeability on the field intensity allows changing the material from left to right-handed and back. Nonlinear media are essential for nonlinear optics. However most optical materials have a relatively weak nonlinear response, meaning that their properties only change by a small amount for large changes in intensity of the electromagnetic field. Nonlinear metamaterials can overcome this limitation, since the local fields of the resonant structures can be much larger than the average value of the field - in this respect metamaterials are similar to other composite media, such e.g. as random metal-dielectric composites, including fractal clusters and semicoutinouos/percolation metal films, where the areas with enhanced local light fields - “hot spots” - produce giant linear and non-line
https://en.wikipedia.org/wiki/Cell%20sorting
Cell sorting is the process through which a particular cell type is separated from others contained in a sample on the basis of its physical or biological properties, such as size, morphological parameters, viability and both extracellular and intracellular protein expression. The homogeneous cell population obtained after sorting can be used for a variety of applications including research, diagnosis, and therapy. Methods Methods of cell sorting fall into two major categories: fluorescence activated cell sorting (FACS) and immunomagnetic cell sorting. Due to many years of refinement and increased demand for cell separation however, researchers are working to develop microfluidic sorting devices that have many benefits in comparison to the main types of fluorescence-activated cell sorting and immunomagnetic cell sorting methods. Fluorescence-activated Fluorescence-Activated Cell Sorting, is also known as flow cytometry cell sorting, or commonly known by the acronym FACS, which is a trademark of Becton Dickinson and Company. Fluorescence activated cell sorting utilizes flow cytometry to separate cells based on morphological parameters and the expression of multiple extracellular and intracellular proteins. This method allows multiparameter cell sorting and involves encapsulating cells into small liquid droplets which are selectively given electric charges and sorted by an external electric field. Fluorescence activated cell sorting has several systems that work together to achieve successful sorting of events of interest. These include fluidic, optical, and electrostatic systems. The fluidic system has to establish a precisely-timedbreak off from the liquid stream in small uniform droplets, so that droplets containing individual cells can then be deflected electrostatically Based on the invention of Richard Sweet, droplet formation of the liquid jet of a cell sorter is stabilized by vibrations of an ultrasonic transducer at the exit of the nozzle orifice. Th
https://en.wikipedia.org/wiki/Joseph%20Goguen
Joseph Amadee Goguen ( ; June 28, 1941 – July 3, 2006) was an American computer scientist. He was professor of Computer Science at the University of California and University of Oxford, and held research positions at IBM and SRI International. In the 1960s, along with Lotfi Zadeh, Goguen was one of the earliest researchers in fuzzy logic and made profound contributions to fuzzy set theory. In the 1970s Goguen's work was one of the earliest approaches to the algebraic characterisation of abstract data types and he originated and helped develop the OBJ family of programming languages. He was author of A Categorical Manifesto and founder and Editor-in-Chief of the Journal of Consciousness Studies. His development of institution theory impacted the field of universal logic. Standard implication in product fuzzy logic is often called "Goguen implication". Goguen categories are named after him. He was married to Ryoko Amadee Goguen, who is a composer, pianist, and vocalist. Education and academic career Goguen received his bachelor's degree in mathematics from Harvard University in 1963, and his PhD in mathematics from the University of California, Berkeley in 1968, where he was a student of the founder of fuzzy set theory, Lotfi Zadeh. He taught at UC Berkeley, the University of Chicago and University of California, Los Angeles, where he was a full professor of computer science. He held a Research Fellowship in the Mathematical Sciences at the IBM Watson Research Center, where he organised the "ADJ" group. He also visited the University of Edinburgh in Scotland on three Senior Visiting Fellowships. From 1979 to 1988, Goguen worked at SRI International in Menlo Park, California. From 1988 to 1996, he was a professor at the Oxford University Computing Laboratory (now the Department of Computer Science, University of Oxford) in England and a Fellow at St Anne's College, Oxford. In 1996 he became professor of Computer Science at the University of California, San Die
https://en.wikipedia.org/wiki/Addition%20principle
In combinatorics, the addition principle or rule of sum is a basic counting principle. Stated simply, it is the intuitive idea that if we have A number of ways of doing something and B number of ways of doing another thing and we can not do both at the same time, then there are ways to choose one of the actions. In mathematical terms, the addition principle states that, for disjoint sets A and B, we have . The rule of sum is a fact about set theory. The addition principle can be extended to several sets. If are pairwise disjoint sets, then we have:This statement can be proven from the addition principle by induction on n. Simple example A person has decided to shop at one store today, either in the north part of town or the south part of town. If they visit the north part of town, they will shop at either a mall, a furniture store, or a jewelry store (3 ways). If they visit the south part of town then they will shop at either a clothing store or a shoe store (2 ways). Thus there are possible shops the person could end up shopping at today. Inclusion–exclusion principle The inclusion–exclusion principle (also known as the sieve principle) can be thought of as a generalization of the rule of sum in that it too enumerates the number of elements in the union of some sets (but does not require the sets to be disjoint). It states that if A1, ..., An are finite sets, then Subtraction principle Similarly, for a given finite set S, and given another set A, if , then . To prove this, notice that by the addition principle. Applications The addition principle can be used to prove Pascal's rule combinatorially. To calculate , one can view it as the number of ways to choose k people from a room containing n children and 1 teacher. Then there are ways to choose people without choosing the teacher, and ways to choose people that includes the teacher. Thus . The addition principle can also be used to prove the multiplication principle.
https://en.wikipedia.org/wiki/Robert%20W.%20Bussard
Robert W. Bussard (August 11, 1928 – October 6, 2007) was an American physicist who worked primarily in nuclear fusion energy research. He was the recipient of the Schreiber-Spence Achievement Award for STAIF-2004. He was also a fellow of the International Academy of Astronautics and held a Ph.D. from Princeton University. Kiwi (Rover-A) In June 1955 Bussard moved to Los Alamos and joined the Nuclear Propulsion Division's Project Rover designing nuclear thermal rocket engines. Bussard and R.D. DeLauer wrote two important monographs on nuclear propulsion, Nuclear Rocket Propulsion and Fundamentals of Nuclear Flight. Bussard ramjet In 1960, Bussard conceived of the Bussard ramjet, an interstellar space drive powered by hydrogen fusion using hydrogen collected with a magnetic field from the interstellar gas. Due to the presence of high-energy particles throughout space, much of the interstellar hydrogen exists in an ionized state (H II regions) that can be manipulated by magnetic or electric fields. Bussard proposed to "scoop" up ionized hydrogen and funnel it into a fusion reactor, using the exhaust from the reactor as a rocket engine. It appears the energy gain in the reactor must be extremely high for the ramjet to work at all; any hydrogen picked up by the scoop must be sped up to the same speed as the ship in order to provide thrust, and the energy required to do so increases with the ship's speed. Hydrogen itself does not fuse very well (unlike deuterium, which is rare in the interstellar medium), and so cannot be used directly to produce energy, a fact which accounts for the billion-year scale of stellar lifetimes. This problem was solved, in principle, according to Bussard by use of the stellar CNO cycle in which carbon is used as a catalyst to burn hydrogen via the strong nuclear reaction. In science fiction Bussard Ramjets are common plot devices in science fiction. Larry Niven uses them in his Known Space setting to propel interstellar flight. Foll
https://en.wikipedia.org/wiki/P53%20upregulated%20modulator%20of%20apoptosis
The p53 upregulated modulator of apoptosis (PUMA) also known as Bcl-2-binding component 3 (BBC3), is a pro-apoptotic protein, member of the Bcl-2 protein family. In humans, the Bcl-2-binding component 3 protein is encoded by the BBC3 gene. The expression of PUMA is regulated by the tumor suppressor p53. PUMA is involved in p53-dependent and -independent apoptosis induced by a variety of signals, and is regulated by transcription factors, not by post-translational modifications. After activation, PUMA interacts with antiapoptotic Bcl-2 family members, thus freeing Bax and/or Bak which are then able to signal apoptosis to the mitochondria. Following mitochondrial dysfunction, the caspase cascade is activated ultimately leading to cell death. Structure The PUMA protein is part of the BH3-only subgroup of Bcl-2 family proteins. This group of proteins only share sequence similarity in the BH3 domain, which is required for interactions with Bcl-2-like proteins, such as Bcl-2 and Bcl-xL. Structural analysis has shown that PUMA directly binds to antiapoptotic Bcl-2 family proteins via an amphiphatic α-helical structure which is formed by the BH3 domain. The mitochondrial localization of PUMA is dictated by a hydrophobic domain on its C-terminal portion. PUMA protein degradation is regulated by phosphorylation at a conserved serine residue at position 10.[31] Mechanism of action Biochemical studies have shown that PUMA interacts with antiapoptotic Bcl-2 family members such as Bcl-xL, Bcl-2, Mcl-1, Bcl-w, and A1, inhibiting their interaction with the proapoptotic molecules, Bax and Bak. When the inhibition of these is lifted, they result in the translocation of Bax and activation of mitochondrial dysfunction resulting in release of mitochondrial apoptogenic proteins cytochrome c, SMAC, and apoptosis-inducing factor (AIF) leading to caspase activation and cell death. Because PUMA has high affinity for binding to Bcl-2 family members, another hypothesis is that PUMA direc
https://en.wikipedia.org/wiki/Index%20of%20fractal-related%20articles
This is a list of fractal topics, by Wikipedia page, See also list of dynamical systems and differential equations topics. 1/f noise Apollonian gasket Attractor Box-counting dimension Cantor distribution Cantor dust Cantor function Cantor set Cantor space Chaos theory Coastline Constructal theory Dimension Dimension theory Dragon curve Fatou set Fractal Fractal antenna Fractal art Fractal compression Fractal flame Fractal landscape Fractal transform Fractint Graftal Iterated function system Horseshoe map How Long Is the Coast of Britain? Statistical Self-Similarity and Fractional Dimension Julia set Koch snowflake L-system Lebesgue covering dimension Lévy C curve Lévy flight List of fractals by Hausdorff dimension Lorenz attractor Lyapunov fractal Mandelbrot set Menger sponge Minkowski–Bouligand dimension Multifractal analysis Olbers' paradox Perlin noise Power law Rectifiable curve Scale-free network Self-similarity Sierpinski carpet Sierpiński curve Sierpinski triangle Space-filling curve T-square (fractal) Topological dimension Fractals
https://en.wikipedia.org/wiki/Journal%20of%20Integer%20Sequences
The Journal of Integer Sequences is a peer-reviewed open-access academic journal in mathematics, specializing in research papers about integer sequences. It was founded in 1998 by Neil Sloane. Sloane had previously published two books on integer sequences, and in 1996 he founded the On-Line Encyclopedia of Integer Sequences (OEIS). Needing an outlet for research papers concerning the sequences he was collecting in the OEIS, he founded the journal. Since 2002 the journal has been hosted by the David R. Cheriton School of Computer Science at the University of Waterloo, with Waterloo professor Jeffrey Shallit as its editor-in-chief. There are no page charges for authors, and all papers are free to all readers. The journal publishes approximately 50–75 papers annually. In most years from 1999 to 2014, SCImago Journal Rank has ranked the Journal of Integer Sequences as a third-quartile journal in discrete mathematics and combinatorics. It is indexed by Mathematical Reviews and Zentralblatt MATH.
https://en.wikipedia.org/wiki/Henry%20Baker%20Tristram
Henry Baker Tristram FRS (11 May 1822 – 8 March 1906) was an English clergyman, Bible scholar, traveller and ornithologist. As a parson-naturalist he was an early, but short-lived, supporter of Darwinism, attempting to reconcile evolution and creation. Biography He was the son of the Rev. Henry Baker Tristram, born at Eglingham vicarage, near Alnwick, Northumberland. He studied at Durham School and Lincoln College, Oxford. In 1846 he was ordained a priest. Diplomatic, scientific and missionary work Tristram was secretary to the governor of Bermuda from 1847 to 1849. He explored the Sahara desert, and in 1858 visited Palestine, returning there in 1863 and 1872, and dividing his time between natural history observations and identifying localities mentioned in the Old and New Testaments. In 1873 he became canon of Durham Cathedral. In 1881 he travelled again to Palestine, the Lebanon, Mesopotamia, and Armenia. He also made a second voyage to Japan to visit his daughter, Katherine Alice Salvin Tristram, in 1891. She was a missionary and headteacher in Osaka. She was the first woman missionary with the Church Missionary Society to have a degree. In 1858, he read the simultaneously-published papers by Charles Darwin and Alfred Russel Wallace that were read in the Linnean Society, and published a paper in Ibis stating that given the "series of about 100 Larks of various species before me... I cannot help feeling convinced of the views set forth by Messrs Darwin and Wallace." He attempted to reconcile this early acceptance of evolution with creation. Following the famous Oxford Debate between Thomas Henry Huxley and Samuel Wilberforce, Tristram, after early acceptance of the theory, rejected Darwinism. Tristram was a founder and original member of the British Ornithologists' Union, and appointed a fellow of the Royal Society in 1868. Edward Bartlett, an English ornithologist and son of Abraham Dee Bartlett, accompanied Tristram to Palestine in 1863–1864. During his tra
https://en.wikipedia.org/wiki/Oxyrrhis%20marina
Oxyrrhis marina is a species of heterotrophic dinoflagellate with flagella that is widely distributed in the world's oceans. Description This protozoan species has an asymmetrical oval shape to its single-celled body. It has been likened to a rugby ball. The cell usually measures between 20 and 30 micrometers, but it is known to reach 60. It has two flagella with a protruding, tentacle-like bulge between them. The flagella are covered in scales. Most individuals have scales on the body surface, as well. The two flagella have separate functions. One undulates in waves and the other is coiled, producing a corkscrew-like propulsion to move the cell. The individual appears colorless, but a concentrated culture of cells may have a pink tinge. Distribution and habitat The species is thought to have a global distribution except for the polar seas, where it is likely absent or rare, though few samples have been taken of these waters. There are specific records from waters near Europe, North America, Asia, New Zealand, the Canary Islands, Hawaii, and the Azores. It has been found in isolated inland waters, as well, such as a lake in Ukraine. It is less common in the open waters of the oceans. There is a question as to how it came to inhabit so many islands if it is apparently rare in the open ocean. It may have been slowly dispersed on the currents, carried in mats of algae, or transported by humans when shipping arose. It is most common in the intertidal zone and other coastal regions, where it is a member of the plankton. Habitat types include tide pools and estuaries. It was first described from a salt marsh. It tolerates wide ranges in salinity, temperature, and pH. Biology It is heterotrophic, obtaining nutrients externally instead of synthesizing them by an internal process such as photosynthesis. It is an omnivorous grazer, consuming various types of tiny organisms from its environment. It eats phytoplankton such as minute algaes. It has been observed eating Nanno
https://en.wikipedia.org/wiki/Non-monotonic%20logic
A non-monotonic logic is a formal logic whose conclusion relation is not monotonic. In other words, non-monotonic logics are devised to capture and represent defeasible inferences (cf. defeasible reasoning), i.e., a kind of inference in which reasoners draw tentative conclusions, enabling reasoners to retract their conclusion(s) based on further evidence. Most studied formal logics have a monotonic entailment relation, meaning that adding a formula to the hypotheses never produces a pruning of its set of conclusions. Intuitively, monotonicity indicates that learning a new piece of knowledge cannot reduce the set of what is known. Monotonic logics cannot handle various reasoning tasks such as reasoning by default (conclusions may be derived only because of lack of evidence of the contrary), abductive reasoning (conclusions are only deduced as most likely explanations), some important approaches to reasoning about knowledge (the ignorance of a conclusion must be retracted when the conclusion becomes known), and similarly, belief revision (new knowledge may contradict old beliefs). Abductive reasoning Abductive reasoning is the process of deriving a sufficient explanation of the known facts. An abductive logic should not be monotonic because the likely explanations are not necessarily correct. For example, the likely explanation for seeing wet grass is that it rained; however, this explanation has to be retracted when learning that the real cause of the grass being wet was a sprinkler. Since the old explanation (it rained) is retracted because of the addition of a piece of knowledge (a sprinkler was active), any logic that models explanations is non-monotonic. Reasoning about knowledge If a logic includes formulae that mean that something is not known, this logic should not be monotonic. Indeed, learning something that was previously not known leads to the removal of the formula specifying that this piece of knowledge is not known. This second change (a removal c
https://en.wikipedia.org/wiki/Hilpda
Hypoxia inducible lipid droplet-associated (Hilpda, also known as C7orf68 and HIG-2) is a protein that in humans is encoded by the HILPDA gene. Discovery HILPDA was originally discovered in a screen to identify new genes that are activated by low oxygen pressure (hypoxia) in human cervical cancer cells. The protein consists of 63 amino acids in humans and 64 amino acids in mice. Expression HILPDA is produced by numerous cells and tissues, including cancer cells, immune cells, fat cells, and liver cells. Low oxygen pressure (hypoxia), fatty acids, and beta-adrenergic agonists stimulate HILPDA expression. Function Nearly all cells have the ability to store excess energy as fat in special structures in the cell called lipid droplets. The formation and breakdown of lipid droplets is controlled by various enzymes and lipid droplet-associated proteins. One of the lipid droplet-associated proteins is HILPDA. HILPDA acts as a regulatory signal that blocks the breakdown of the fat stores in cells when the external fat supply is high or the availability of oxygen is low. In cells, HILPDA is located in the endoplasmic reticulum and around lipid droplets. Gain and loss-of-function studies have shown that HILPDA promotes fat storage in cancer cells, macrophages and liver cells. This effect is at least partly achieved by suppressing triglyceride breakdown by inhibiting the enzyme adipose triglyceride lipase. The binding of HILPDA to adipose triglyceride lipase occurs via the conserved N-terminal portion of HILPDA, which is similar to a region in the G0S2 protein. Clinical significance The deficiency of HILPDA in mice that are prone to develop atherosclerosis led to a reduction in atherosclerotic plaques, suggesting that HILPDA may be a potential therapeutic target for atherosclerosis. In addition, HILPDA may be targeted for the treatment of non-alcoholic fatty liver disease.
https://en.wikipedia.org/wiki/Apple%20DOS
Apple DOS is the family of disk operating systems for the Apple II series of microcomputers from late 1978 through early 1983. It was superseded by ProDOS in 1983. Apple DOS has three major releases: DOS 3.1, DOS 3.2, and DOS 3.3; each one of these three releases was followed by a second, minor "bug-fix" release, but only in the case of Apple DOS 3.2 did that minor release receive its own version number, Apple DOS 3.2.1. The best-known and most-used version is Apple DOS 3.3 in the 1980 and 1983 releases. Prior to the release of Apple DOS 3.1, Apple users had to rely on audio cassette tapes for data storage and retrieval. Version history When Apple Computer introduced the Apple II in April 1977, the new computer had no disk drive or disk operating system (DOS). Although Apple co-founder Steve Wozniak designed the Disk II controller late that year, and believed that he could have written a DOS, his co-founder Steve Jobs decided to outsource the task. The company considered using Digital Research's CP/M, but Wozniak sought an operating system that was easier to use. On 10 April 1978 Apple signed a $13,000 contract with Shepardson Microsystems to write a DOS and deliver it within 35 days. Apple provided detailed specifications, and early Apple employee Randy Wigginton worked closely with Shepardson's Paul Laughton as the latter wrote the operating system with punched cards and a minicomputer. There was no Apple DOS 1 or 2. Versions 0.1 through 2.8 were serially enumerated revisions during development, which might as well have been called builds 1 through 28. Apple DOS 3.0, a renamed issue of version 2.8, was never publicly released due to bugs. Apple published no official documentation until release 3.2. Apple DOS 3.1 was publicly released in June 1978, slightly more than one year after the Apple II was introduced, becoming the first disk-based operating system for any Apple computer. A bug-fix release came later, addressing a problem by means of its utility, which
https://en.wikipedia.org/wiki/TivoWeb
TivoWeb is a web server which runs in TiVo-branded DVRs. It adds functionality to TiVo such as being able to set recordings over the internet and undelete deleted shows. It also allows the addition of custom modules which add more features to TivoWeb. There are three main versions of TivoWeb still in day to day use. TivoWeb 1.9.4 is the original TivoWeb project and is no longer maintained; the last release of it was v1.9.4 (an installation tivoweb.tar.gz file for this version can be downloaded from http://www.tivocentral.co.uk/hacks/tivoweb.html. The original TivoWeb project has been followed by TivoWebPlus v1.0 to v1.3.1 and then more recently by TivoWebPlus 2.0.0. and 2.1.0. TivoWeb 1.9.4 modules will usually work under TivoWebPlus v1.0 to v1.3.1; however, this version of TivoWebPlus has also frequently been criticized for being relatively unstable and prone to crashes and module hangs, especially on TiVos running large satellite or cable TV platform databases. This resulted in the release of TivoWebPlus v2, a complete rewrite of the original TivoWeb code aimed at greatly increasing the stability of TivoWeb and also adding the ability to take advantage of the advanced hardware functionality of the very latest TiVo models whilst still also being compatible with the original Series 1 US and UK TiVo units. TivoWeb 1.9.4 and TivoWebPlus v1.0 to v1.3 modules do not work under TivoWebPlus v2 without certain internal alterations and amendments. However, the majority of modules and functionality add-ons from TivoWeb 1.9.4 and TivoWebPlus 1.0 to 1.3.1 have now been incorporated into TivoWebPlus 2.1.b3 (the current version at 25/2/09) and Portland Paw has also written a version of his www.tivohackman.com module that is directly compatible with this version of the TivoWeb project. Current and historical TivoWeb modules and related TiVo user interface extensions See also TiVo TiVo DVRs External links TivoWeb project TivoWebPlus project TivoWebPlus 2.1 Development T
https://en.wikipedia.org/wiki/FluBot
FluBot is a sophisticated SMS computer virus –specifically a banking Trojan– of global reach which aims to steal private data from Android smart phones. Unlike much malware, FluBot has proven exceptionally durable, coming in waves or "campaigns" with each redesign. It masquerades as innocuous messages such as missed calls and deliveries, asking the receiver to click links that download spyware. A variant, TeaBot, has infiltrated official app stores, including Google Play Store, in the guise of a QR-code reader. 16,000 reports of FluBot were reported to the Australian Competition & Consumer Commission's Scamwatch in Australia across eight weeks in 2021. Although coverage of FluBot primarily centres on Australia and New Zealand, the scam has also targeted European countries such as Germany and Poland in 2022 campaigns. In May 2022, FluBot infrastructure was taken down in an operation involving 11 countries and it is not expected to resurge.
https://en.wikipedia.org/wiki/Surespot
Surespot was a free open-source instant messaging application for Android and iOS with a focus on privacy and security. It was shut down on July 31, 2022. Features The application supported the sending of text, pictures, audio messages (in the past only after an in-app purchase), and Emoji icons. It also supported the deletion of messages from the receiving device. It allowed user blocking. There was no support for group messages and sending files other than photos. Surespot provided offline backup via iTunes (PC or Mac) on the iOS version, or to local device storage on the Android version. For secure communication, Surespot used end-to-end encryption by default. 256-bit AES-GCM encryption was used, with keys created with 512-bit ECDH. App users could use multiple identities, for instance for private or business use. Surespot was donationware. Reception As of November 4, 2014, Surespot had a score of 5 out of 7 points on the Electronic Frontier Foundation secure messaging scorecard. It had received points for having communications encrypted in transit, having communications encrypted with keys the provider doesn't have access to (end-to-end encryption), making it possible for users to independently verify their correspondent's identities, having its code open to independent review (open-source), and for having its security design well-documented. It was missing points because past communications were not secured if the encryption keys were stolen (no forward secrecy) and because there had not been a recent independent security audit. Controversy In May 2015, Channel 4 News published an investigation in which they alleged that "at least 115 ISIS-linked people" appeared to have used Surespot between November 2014 and May 2015. In June 2015, a Surespot user wrote a blog post about how the Surespot developers had stopped responding to his repeated questions regarding "governmental demands for information", leading to the user alleging that the Surespot develope
https://en.wikipedia.org/wiki/Paradoxoglanis%20parvus
Paradoxoglanis parvus is a species of electric catfish endemic to the Democratic Republic of the Congo, where it is found in the Congo and Kumbinanimi River systems. This species grows to a length of SL.
https://en.wikipedia.org/wiki/Optochin
Optochin (or ethylhydrocupreine hydrochloride) is a derivative of quinine introduced in 1911 by Morgenroth and Levy with the intention to treat pneumococci infection. In very high dilutions, it inhibits the growth of representatives of all four groups of pneumococci in vitro. That is the main reason it is now used in bacteriology for the differentiation of Streptococcus pneumoniae, which is optochin-sensitive, from the other, resistant alpha-hemolytic streptococci, sometimes called the viridans streptococci because of the green colouration on blood agar around colonies. The growth of bacteria that are optochin-sensitive will show a zone of inhibition around an optochin disc, while the growth of bacteria that are resistant to optochin will not be affected. In vitro, a minimum inhibitory concentration (MIC) of 1:10,000,000 will inhibit the growth of pneumococci, and 1:500,000 is bactericidal. Resistance For decades, Streptococcus pneumoniae has been considered susceptible to optochin; but some strains have been found to be resistant to optochin in laboratory testing. This is notable because the emergence of optochin-resistant strains would invalidate the distinguishing test described above. See also Quinine
https://en.wikipedia.org/wiki/List%20of%20model%20organisms
This is a list of model organisms used in scientific research. Viruses Phages (infecting prokaryotes): Escherichia virus Lambda (Phage lambda) Phi X 174, the first DNA genome ever to be sequenced (circular, 5386 base pairs in length), shortly after the RNA genome of bacteriophage MS2 (in 1976). T4 phage Animal viruses: SV40 Human alphaherpesvirus (Herpes simplex virus) Plant viruses: Tobacco mosaic virus Prokaryotes Bacteria: Escherichia coli (E. coli), common Gram-negative gut bacterium widely used in molecular genetics. Main lab strain is 'K-12'. Bacillus subtilis, endospore forming Gram-positive bacterium. Main lab strain is '168'. Caulobacter crescentus, bacterium that divides into two distinct cells used to study cellular differentiation. Mycoplasma genitalium, minimal organism. Aliivibrio fischeri, quorum sensing, bioluminescence and animal-bacterial symbiosis with Hawaiian bobtail squid. Bacteroides thetaiotaomicron, polysaccharide-degrading member of the human gut microbiota, used to study functional aspects of the gut microbiota. Synechocystis (specifically PCC 6803), photosynthetic cyanobacterium widely used in photosynthesis research. Pseudomonas fluorescens, soil bacterium that readily diversifies into different strains in the lab. Azotobacter vinelandii, obligate aerobe diazotroph used in nitrogen fixation research. Streptomyces coelicolor, soil-dwelling filamentous bacterium used to produce many clinically useful antibiotics. Archaea: Methanococcus and Methanosarcina, model methanogens, representing the two metabolic types of hydrogenotrophism and methylotrophism. Methanogenesis remains a key area of metabolic research. Halobacterium salinarum and Haloferax volcanii, model Haloarchaea. The former has a reputation in the study of DNA repair. The latter is more suited to more traditional genetics due to a shorter generation time and more stable genome. This order is known for its easy updake of genetic tools as well as resistance to c
https://en.wikipedia.org/wiki/Paleo%20Foundation
The Paleo Foundation is a private American organization that certifies food products related to the Paleolithic and ketogenic diet. Programs The organization currently issues a 'Certified Paleo' certification mark, with a previous iteration called "Paleo Friendly", for food products and dietary supplements that meet its standards. By 2018, it had certified food products from various food retailers and companies including Whole Foods, Walmart, and General Mills. Recently, the organization also begun certifying food products for its 'Keto Certified' program. Standards development More recently, the organization has described the diet "as a diet based on the types of foods presumed to have been eaten by early humans before the advent of agriculture... These foods included meat and seafood, nuts and seeds, roots and tubers, and fruits and berries. The diet of our ancient Paleolithic ancestors presumably excluded dairy, grains, and highly refined foods." In 2015, its founder, Karen Pendergrass, stated that the organization developed its standards for the Paleo diet based on "current research, archaeological records, paleogenetics, sustainability concerns, proposed health benefits, and input from various leading health experts of the Paleo Movement." Criticism Many nutrition and law experts have also been critical of such food certification programs, citing fears of arbitrary criteria that lack evidence within the certification standards and the lack of regulation by government agencies. They have since not been investigated. See also Paleolithic diet Product certification Certification mark Mark Sisson
https://en.wikipedia.org/wiki/Hafnium%20controversy
The hafnium controversy is a debate over the possibility of 'triggering' rapid energy releases, via gamma ray emission, from a nuclear isomer of hafnium, 178m2Hf. The energy release is potentially 5 orders of magnitude (100,000 times) more energetic than a chemical reaction, but 2 orders of magnitude less than a nuclear fission reaction. In 1998, a group led by Carl Collins of the University of Texas at Dallas reported having successfully initiated such a trigger. Signal-to-noise ratios were small in those first experiments, and to date no other group has been able to duplicate these results. Peter Zimmerman described claims of weaponization potential as having been based on "very bad science". Background 178m2Hf is a particularly attractive candidate for induced gamma emission (IGE) experiments, because of its high density of stored energy, 2.5 MeV per nucleus, and long 31-year half life for storing that energy. If radiation from some agent could "trigger" a release of that stored energy, the resulting cascade of gamma photons would have the best chance of finding a pair of excited states with the inverted lifetimes needed for stimulated emission. While induced emission adds only power to a radiation field, stimulated emission adds coherence. This process can help create extremely efficient nuclear reaction engines, along with more precise radiometric devices. A proposal to show the efficacy for "triggering" 178m2Hf was approved by a NATO-Advanced Research Workshop (NATO-ARW) held in Predeal in 1995. Although the proposal was to use incident protons to bombard the target, α-particles were available when the first experiment was scheduled. It was done by a French, Russian, Romanian and American team. Results were said to be extraordinary, but the results were not published. Nevertheless, 178m2Hf was implied to be of special importance to potential applications of IGE. A controversy quickly erupted. Importance 178m2Hf has the highest excitation energy of any co
https://en.wikipedia.org/wiki/KCNH6
Potassium voltage-gated channel subfamily H member 6 is a protein that in humans is encoded by the KCNH6 gene. The protein encoded by this gene is a voltage-gated potassium channel subunit.
https://en.wikipedia.org/wiki/Metal%20allergy
Metal allergies inflame the skin after it has been in contact with metal. They are a form of allergic contact dermatitis. They are becoming more common, , except in areas with regulatory countermeasures. People may become sensitized to certain metals by skin contact, usually by wearing or holding consumer products (including non-metal products, like textiles and leather treated with metals), or sometimes after exposure at work. Contact with damaged skin makes sensitization more likely. Medical implants may also cause allergic reactions. Diagnosis is by patch test, a method which does not work as well for metals as it does for some other allergens. Prevention and treatment consists of avoiding the metal allergen; there is no other treatment, . It can be difficult to identify and avoid the allergen, because many metals are common in the environment, and some are biologically necessary to humans. Regulations have successfully reduced the rates of some metal allergies in Europe, but are not widespread. The social and economic costs of metal allergies are high. Metal allergies are type IV allergies; the metals are haptens. The toxicity of some allergenic metals may contribute to the development of allergies. Metals Nickel allergy and allergies to mercury and chromium have long been recognised; gold, palladium, and cobalt have gotten attention more recently. There is often cross-sensitization, where a person allergic to one metal may become allergic to another, but monosensitization, reacting to just one metal, is also possible. For instance, many people allergic to nickel are often also allergic to cobalt (a similar element often found in the same places as nickel) and palladium. But it is also possible to only be allergic to one of these metals. Nickel is one of the most common contact allergens. Exposure routes Most cases of metal allergy are caused by consumer products containing metal; exposure at work can also cause metal allergies. The largest human exposu
https://en.wikipedia.org/wiki/Convex%20analysis
Convex analysis is the branch of mathematics devoted to the study of properties of convex functions and convex sets, often with applications in convex minimization, a subdomain of optimization theory. Convex sets A subset of some vector space is if it satisfies any of the following equivalent conditions: If is real and then If is real and with then Throughout, will be a map valued in the extended real numbers with a domain that is a convex subset of some vector space. The map is a if holds for any real and any with If this remains true of when the defining inequality () is replaced by the strict inequality then is called . Convex functions are related to convex sets. Specifically, the function is convex if and only if its is a convex set. The epigraphs of extended real-valued functions play a role in convex analysis that is analogous to the role played by graphs of real-valued function in real analysis. Specifically, the epigraph of an extended real-valued function provides geometric intuition that can be used to help formula or prove conjectures. The domain of a function is denoted by while its is the set The function is called if and for Alternatively, this means that there exists some in the domain of at which and is also equal to In words, a function is if its domain is not empty, it never takes on the value and it also is not identically equal to If is a proper convex function then there exist some vector and some such that for every where denotes the dot product of these vectors. Convex conjugate The of an extended real-valued function (not necessarily convex) is the function from the (continuous) dual space of and where the brackets denote the canonical duality The of is the map defined by for every If denotes the set of -valued functions on then the map defined by is called the . Subdifferential set and the Fenchel-Young inequality If and then the is For example,
https://en.wikipedia.org/wiki/Terminator%20Genisys%3A%20Future%20War
Terminator Genisys: Future War is a mobile MMO strategy video game created by Plarium in cooperation with Skydance Media. The events of the game take place in a post-apocalyptic future years after the events of the Terminator Genisys film. Originally developed as a sequel film, the game was announced on June 28, 2016 and released on May 18, 2017 on the iOS App Store and Google Play. It uses Plarium's usual model of free to play, with some in-game features and upgrades available to purchase. Gameplay In Terminator Genisys: Future War, players construct buildings, improve their base, train their troops, upgrade their leader, and create and develop clans. In total, 48 unit types are available to the player (24 for each faction). They are divided into six classes: infantry, cavalry, aviation, spy drones, assault and siege troops. In-game processes are initiated by using the following resources: energy, iridium, materials, ammo, fuel and the special in-game currency, technology points. These technology points can also be used to speed up an active process. To obtain resources, players need to construct special buildings or send their units to resource locations. As the game progresses, the cost and length of in-game processes increase accordingly. The strategic aim for players in a clan is to capture the time machine, a special location at the center of each dimension. Storyline Terminator Genisys: Future War is set directly after the events of the film Terminator Genisys. Genisys is destroyed and Skynet is offline, but the future war is far from over. The game gives players two options: they can lead the Resistance or join Skynet’s mechanized forces. According to the game's developers, "In a first for any Terminator game, players will have the option to be a Resistance or Skynet Commander as they battle rival player alliances for territory, dominance and survival." Arnold Schwarzenegger In the game, players can choose Arnold Schwarzenegger, the T-800 android
https://en.wikipedia.org/wiki/Squaring%20the%20circle
Squaring the circle is a problem in geometry first proposed in Greek mathematics. It is the challenge of constructing a square with the area of a given circle by using only a finite number of steps with a compass and straightedge. The difficulty of the problem raised the question of whether specified axioms of Euclidean geometry concerning the existence of lines and circles implied the existence of such a square. In 1882, the task was proven to be impossible, as a consequence of the Lindemann–Weierstrass theorem, which proves that pi () is a transcendental number. That is, is not the root of any polynomial with rational coefficients. It had been known for decades that the construction would be impossible if were transcendental, but that fact was not proven until 1882. Approximate constructions with any given non-perfect accuracy exist, and many such constructions have been found. Despite the proof that it is impossible, attempts to square the circle have been common in pseudomathematics (i.e. the work of mathematical cranks). The expression "squaring the circle" is sometimes used as a metaphor for trying to do the impossible. The term quadrature of the circle is sometimes used as a synonym for squaring the circle. It may also refer to approximate or numerical methods for finding the area of a circle. In general, quadrature or squaring may also be applied to other plane figures. History Methods to calculate the approximate area of a given circle, which can be thought of as a precursor problem to squaring the circle, were known already in many ancient cultures. These methods can be summarized by stating the approximation to that they produce. In around 2000 BCE, the Babylonian mathematicians used the approximation and at approximately the same time the ancient Egyptian mathematicians used Over 1000 years later, the Old Testament Books of Kings used the simpler approximation Ancient Indian mathematics, as recorded in the Shatapatha Brahmana and Shulba Sutras
https://en.wikipedia.org/wiki/Liver%20fluke
Liver fluke is a collective name of a polyphyletic group of parasitic trematodes under the phylum Platyhelminthes. They are principally parasites of the liver of various mammals, including humans. Capable of moving along the blood circulation, they can occur also in bile ducts, gallbladder, and liver parenchyma. In these organs, they produce pathological lesions leading to parasitic diseases. They have complex life cycles requiring two or three different hosts, with free-living larval stages in water. Biology The body of liver flukes is leaf-like and flattened. The body is covered with a tegument. They are hermaphrodites having complete sets of both male and female reproductive systems. They have simple digestive systems and primarily feed on blood. The anterior end is the oral sucker opening into the mouth. Inside, the mouth leads to a small pharynx which is followed by an extended intestine that runs through the entire length of the body. The intestine is heavily branched and the anus is absent. Instead, the intestine runs along an excretory canal that opens at the posterior end. Adult flukes produce eggs that are passed out through the excretory pore. The eggs infect different species of snails (as intermediate hosts) in which they grow into larvae. The larvae are released into the environment from where the definitive hosts (humans and other mammals) get the infection. In some species, another intermediate host is required, generally a cyprinid fish. In this case, the definitive hosts are infected from eating infected fish. Hence, they are food-borne parasites. Pathogenicity Liver fluke infections cause serious medical and veterinary diseases. Fasciolosis of sheep, goats and cattle, is the major cause of economic losses in dairy and meat industry. Fasciolosis of humans produces clinical symptoms such as fever, nausea, swollen liver, extreme abdominal pain, jaundice and anemia. Clonorchiasis and opisthorchiasis (due to Opisthorchis viverrini) are particularly
https://en.wikipedia.org/wiki/Frederick%20Gehring
Frederick William Gehring (7 August 1925 – 29 May 2012) was an American mathematician who worked in the area of complex analysis (quasi-conformal mappings). Personal life Both of Fred Gehring's parents graduated from the University of Michigan. His father, Carl Ernst Gehring, was a journalist who worked for the Ann Arbor News and a music critic. His mother, Hester Reed Gehring, was a foreign language examiner for students who needed to prove competency as a requirement for their graduate degree. She was also the daughter of John Oren Reed, a physics professor and Dean of the College of Literature, Science and the Arts at the University of Michigan. Gehring graduated from University High School in 1943 and hoped to attend the Massachusetts Institute of Technology. However, because of World War II, he was about to be drafted into the United States Navy. So he instead enrolled in the V-12 Navy College Training Program at the University of Michigan where he earned a BE in electrical engineering and a BA in mathematics in addition to completing various other Navy courses. He finished his coursework close to Victory in Europe Day. After graduating, the Navy sent him to serve on a destroyer in the Atlantic and Caribbean. When the war ended a few months later, Gehring was discharged from the Navy and returned to the University of Michigan, where he obtained a master's degree in mathematics. In 1949 Gehring went to the University of Cambridge to study mathematics under John Charles Burkill at Peterhouse. While there he met Lois Caroline Bigger, who was also working towards a Ph.D. (at Girton College). Both were attending the University of Cambridge on Fulbright scholarships. Gehring received his Ph.D. in mathematics in 1952 while Lois Bigger received her Ph.D. three months earlier in biochemistry. They married one year after returning to the US on August 25, 1953 and have two sons, Kalle (born 21 December 1958) and Peter (born 29 September 1960). Career
https://en.wikipedia.org/wiki/Hotel%20toilet%20paper%20folding
Hotel toilet paper folding is a common practice performed by hotels worldwide as a way of assuring guests that the bathroom has been cleaned. The common fold normally involves creating a triangle or "V" shape out of the first available sheet or square on a toilet paper roll. Commonly, the two corners of that sheet are tucked behind the paper symmetrically, forming a point at the end of the roll. More elaborate folding results in shapes like fans, sailboats, and even flowers. Toilet paper folding is also known as "toilet paper origami" or "toilegami". The practice has been considered an emblematic example of a meme copied across the world from a hotel to another, until it became common. Extent The practice is followed by hotels all over the world, according to Stephen Gill, a British photographer who published a book of pictures of folded hotel toilet paper from various nations. Dr. Susan Blackmore, who uses the example of hotel toilet paper folding to illustrate the use of memes, pointed out in the 2006 Darwin Day Lecture before the British Humanist Association that even a remote guesthouse she visited in rural Assam in India folded the first sheet on its rolls of toilet paper. Hotel toilet paper folding is such an institution that in the horror movie 1408 it is used as one of the eerie happenings noticed by the main character—after using the toilet paper, he finds it mysteriously has been freshly folded over when no one else had been in the room. Reasons According to David Feldman, in his "Imponderables" syndicated newspaper column, the practice is meant to assure customers that their hotel room has been cleaned. Feldman reported that he had contacted many of the country's largest innkeeper chains to ask why the toilet paper was folded, and all of them provided the same answer. He quoted James P. McCauley, executive director of the International Association of Holiday Inns: Stephen Gill believes the practice is meant to please or impress customers: Other
https://en.wikipedia.org/wiki/Anti%E2%80%93Saccharomyces%20cerevisiae%20antibody
Anti-Saccharomyces cerevisiae antibodies (ASCAs) are antibodies against antigens presented by the cell wall of the yeast Saccharomyces cerevisiae. These antibodies are directed against oligomannose sequences α-1,3 Man (α-1,2 Man α-1,2 Man)n (n = 1 or 2). ASCAs and perinuclear antineutrophil cytoplasmic antibodies (pANCAs) are the two most useful and often discriminating biomarkers for colitis. ASCA tends to recognize Crohn's disease more frequently, whereas pANCA tend to recognize ulcerative colitis. ASCA antibodies react to a yeast protein with mannans, a 200-kDa glycoprotein. Diseases Diseases in which ASCA are found include the following: Behçet's disease - The association with ASCA is not generally strong, but increased in patients with gastrointestinal symptoms. Coeliac disease Colitis Ulcerative colitis-familial. Microscopic colitis Collagenous colitis Crohn's disease Intestinal yeast and ASCA positive Intestinal yeast infections are seen in malabsorptive diseases like coeliac disease. In Crohn's disease and ulcerative colitis the presence of intestinal S. cerevisiae is rare, but the association with irritable bowel in coeliac disease remains unstudied. Anti-mannans Mannan (oligomannan) is a component of the yeast cell wall. Antibodies to yeast mannans are found at increased frequency in Crohn's disease and ASCA positive Crohn's tend to have lower low levels of mannan-binding lectin. Experimentally, antibodies to mannans from yeast can also crossreact to mannans of other types of yeast. Study of the sugars indicated that a mannotetraose (4-mer) was responsible for highest response. Studies of the 200 kDa glycoprotein antibodies found them commonly in healthy people, suggesting that the disease associated antibodies are to their carbohydrate moieties. Mannans from other yeast, for example candida albicans, have found to cross react with ASCA which suggests that other yeast may induce ASCA associated diseases. ASCA are serological markers of candid
https://en.wikipedia.org/wiki/Neuroanatomy%20of%20intimacy
Even though intimacy has been broadly defined in terms of romantic love and sexual desire, the neuroanatomy of intimacy needs further explanation in order to fully understand their neurological functions in different components within intimate relationships, which are romantic love, lust, attachment, and rejection in love. Also, known functions of the neuroanatomy involved can be applied to observations seen in people who are experiencing any of the stages in intimacy. Research analysis of these systems provide insight on the biological basis of intimacy, but the neurological aspect must be considered as well in areas that require special attention to mitigate issues in intimacy, such as violence against a beloved partner or problems with social bonding. Components of intimacy and neuroanatomy Attachment Pair bonding, or intense social attachment, normally initiates partner preference in sexual situations and monogamy in many mammalian species. Monogamous species generally exhibit an exclusive responsibility to each other as well as co-parenting to their offspring. Studies using monogamous prairie voles (Microtus ochrogaster) showed that forming a pair bond stimulated the mesolimbic dopaminergic pathway. In this pathway, dopamine is released from the ventral tegmental area (VTA) to the nucleus accumbens and prefrontal cortex, which then signals the ventral pallidum to complete reward processing in the pathway. Two important neuropeptides that mediated pair bond formation were oxytocin and arginine vasopressin (AVP). Even though both males and females have both molecules, oxytocin was shown to be predominantly in females and vasopressin predominantly promoted pair bonding in males. Receptor specificity was shown essential for mating by activating the dopamine D2 receptors in the nucleus accumbens in both male and female prairie voles. Other locations that were also activated in the study were gender specific, such as oxytocin receptors (OTR) in the p
https://en.wikipedia.org/wiki/Bell%27s%20law%20of%20computer%20classes
Bell's law of computer classes formulated by Gordon Bell in 1972 describes how types of computing systems (referred to as computer classes) form, evolve and may eventually die out. New classes of computers create new applications resulting in new markets and new industries. Description Bell considers the law to be partially a corollary to Moore's law which states "the number of transistors per chip double every 18 months". Unlike Moore's law, a new computer class is usually based on lower cost components that have fewer transistors or less bits on a magnetic surface, etc. A new class forms about every decade. It also takes up to a decade to understand how the class formed, evolved, and is likely to continue. Once formed, a lower priced class may evolve in performance to take over and disrupt an existing class. This evolution has caused clusters of scalable personal computers with 1 to thousands of computers to span a price and performance range of use from a PC, through mainframes, to become the largest supercomputers of the day. Scalable clusters became a universal class beginning in the mid-1990s; by 2010, clusters of at least one million independent computers will constitute the world's largest cluster. Definition: Roughly every decade a new, lower priced computer class forms based on a new programming platform, network, and interface resulting in new usage and the establishment of a new industry. Established market class computers aka platforms are introduced and continue to evolve at roughly a constant price (subject to learning curve cost reduction) with increasing functionality (or performance) based on Moore's law that gives more transistors per chip, more bits per unit area, or increased functionality per system. Roughly every decade, technology advances in semiconductors, storage, networks, and interfaces enable the emergence of a new, lower-cost computer class (aka "platform") to serve a new need that is enabled by smaller devices (e.g. more transisto
https://en.wikipedia.org/wiki/Genyomyrus
Genyomyrus donnyi is a species of elephantfish in the family Mormyridae being the only member of its genus. It occurs only in the Congo River basin in Middle Africa. It reaches a length of about .
https://en.wikipedia.org/wiki/Edge%20of%20chaos
The edge of chaos is a transition space between order and disorder that is hypothesized to exist within a wide variety of systems. This transition zone is a region of bounded instability that engenders a constant dynamic interplay between order and disorder. Even though the idea of the edge of chaos is an abstract one, it has many applications in such fields as ecology, business management, psychology, political science, and other domains of the social sciences. Physicists have shown that adaptation to the edge of chaos occurs in almost all systems with feedback. History The phrase edge of chaos was coined in the late 1980s by chaos theory physicist Norman Packard. In the next decade, Packard and mathematician Doyne Farmer co-authored many papers on understanding how self-organization and order emerges at the edge of chaos. One of the original catalysts that led to the idea of the edge of chaos were the experiments with cellular automata done by computer scientist Christopher Langton where a transition phenomenon was discovered. The phrase refers to an area in the range of a variable, λ (lambda), which was varied while examining the behaviour of a cellular automaton (CA). As λ varied, the behaviour of the CA went through a phase transition of behaviours. Langton found a small area conducive to produce CAs capable of universal computation. At around the same time physicist James P. Crutchfield and others used the phrase onset of chaos to describe more or less the same concept. In the sciences in general, the phrase has come to refer to a metaphor that some physical, biological, economic and social systems operate in a region between order and either complete randomness or chaos, where the complexity is maximal. The generality and significance of the idea, however, has since been called into question by Melanie Mitchell and others. The phrase has also been borrowed by the business community and is sometimes used inappropriately and in contexts that are far from
https://en.wikipedia.org/wiki/Proof%20mining
In proof theory, a branch of mathematical logic, proof mining (or proof unwinding) is a research program that studies or analyzes formalized proofs, especially in analysis, to obtain explicit bounds, ranges or rates of convergence from proofs that, when expressed in natural language, appear to be nonconstructive. This research has led to improved results in analysis obtained from the analysis of classical proofs.
https://en.wikipedia.org/wiki/The%20American%20Journal%20of%20Clinical%20Nutrition
The American Journal of Clinical Nutrition (AJCN) is a monthly peer-reviewed biomedical journal in the fields of dietetics and clinical nutrition. The journal was established in 1952 as the Journal of Clinical Nutrition, edited by S.O. Waife and published by the Nutrition Press. It was continued in series under the present title from 1954 and was published by the American Society for Clinical Nutrition (ASCN). It is now published by the American Society for Nutrition. The journal's editor-in-chief is Christopher P Duggan of Harvard Medical School. A poll conducted in 2009 by the Biomedical and Life Sciences Division of the Special Libraries Association identified the journal as among the "100 most influential journals ... over the last 100 years" in the fields of biology and medicine. According to the Journal Citation Reports, the journal has a 2021 impact factor of 7.045. Conflicts of interest Marion Nestle voiced concerns in November 2013 about conflict of interest by the AJCN board. Nestle stated that of the twelve-member editorial board "the majority — 7 of the 12 — list major corporate affiliations. The list of food companies for which they consult or advise ... includes Coca-Cola, PepsiCo, The Sugar Association, The National Restaurant Association, ConAgra, McDonald's, Kellogg, Mars, and many others." In a 2015 report, Michele Simon also voiced concerns regarding corporate involvement with the American Society for Nutrition's journals. The journal publicly lists the conflicts of interest of its editorial board on its website.
https://en.wikipedia.org/wiki/Institute%20of%20Theoretical%20Astrophysics
The Institute of Theoretical Astrophysics (Norwegian: Institutt for teoretisk astrofysikk, abbreviated ITA) is a research and teaching institute dedicated to astronomy, astrophysics and solar physics located at Blindern in Oslo, Norway. It is a department of The Faculty of Mathematics and Natural Sciences at the University of Oslo. It was founded in its current form by Svein Rosseland with funding from the Rockefeller Foundation in 1934, and was the first of its kind in the world when it opened. Prior to that, it existed as the University Observatory which was created in 1833. It thus is one of the university's oldest institutions. As of 2019, it houses research groups in cosmology, extragalactic astronomy, and The Rosseland Centre for Solar Physics, a Norwegian Centre of Excellence. History The observatory Prior to 1934, the university's astronomy efforts revolved around the University Observatory (Norwegian: Universitetsobservatoriet, abbreviated Observatoriet, lit. the Observatory) located downtown Oslo. The first observation facilities were provided in 1815 to the newly appointed professor Christopher Hansteen of the recently established Royal Frederick University (which was renamed the University of Oslo in 1939) in an octagonal shack at Akershus Festning, Christiania. Construction began in 1831 on a larger observatory which also could house Hansteen and his family. At its completion in 1833 it became the first building to have been erected by the university. An Institute of Theoretical Astrophysics The Observatory's final director, professor Svein Rosseland (appointed in 1928) did not consider its future to be promising. In a letter to a colleague, he wrote, He visited the Harvard College Observatory in 1929, and accepted a professorship there. However, rector Sem Sæland of the University of Oslo saw this as a great loss, as Rosseland already had become an internationally renowned scientist at the time. Sæland coordinated a political effort in which R
https://en.wikipedia.org/wiki/Protein-fragment%20complementation%20assay
Within the field of molecular biology, a protein-fragment complementation assay, or PCA, is a method for the identification and quantification of protein–protein interactions. In the PCA, the proteins of interest ("bait" and "prey") are each covalently linked to fragments of a third protein (e.g. DHFR, which acts as a "reporter"). Interaction between the bait and the prey proteins brings the fragments of the reporter protein in close proximity to allow them to form a functional reporter protein whose activity can be measured. This principle can be applied to many different reporter proteins and is also the basis for the yeast two-hybrid system, an archetypical PCA assay. Split protein assays Any protein that can be split into two parts and reconstituted non-covalently to form a functional protein may be used in a PCA. The two fragments however have low affinity for each other and must be brought together by other interacting proteins fused to them (often called "bait" and "prey" since the bait protein can be used to identify a prey protein, see figure). The protein that produces a detectable readout is called "reporter". Usually enzymes which confer resistance to nutrient deprivation or antibiotics, such as dihydrofolate reductase or beta-lactamase respectively, or proteins that give colorimetric or fluorescent signals are used as reporters. When fluorescent proteins are reconstituted the PCA is called Bimolecular fluorescence complementation assay. The following proteins have been used in split protein PCAs: Beta-lactamase Dihydrofolate reductase (DHFR) Focal adhesion kinase (FAK) Gal4, a yeast transcription factor (as in the classical yeast two-hybrid system) GFP (split-GFP), e.g. EGFP (enhanced green fluorescent protein) Horseradish peroxidase Infrared fluorescent protein IFP1.4, an engineered chromophore-binding domain (CBD) of a bacteriophytochrome from Deinococcus radiodurans LacZ (beta-galactosidase) Luciferase, including ReBiL (recombinase enhanc
https://en.wikipedia.org/wiki/Evolutionary%20Classification%20of%20Protein%20Domains
The Evolutionary Classification of Protein Domains (ECOD) is a biological database that classifies protein domains available from the Protein Data Bank. The ECOD tries to determine the evolutionary relationships between proteins. Similar to Pfam, CATH, and SCOP, ECOD compiles domains instead of whole proteins. However, ECOD focuses on evolutionary relationships more heavily: instead of grouping proteins by folds, which may simply represent convergent evolution, ECOD groups proteins by demonstratable homology only.
https://en.wikipedia.org/wiki/DNA%20digital%20data%20storage
DNA digital data storage is the process of encoding and decoding binary data to and from synthesized strands of DNA. While DNA as a storage medium has enormous potential because of its high storage density, its practical use is currently severely limited because of its high cost and very slow read and write times. In June 2019, scientists reported that all 16 GB of text from the English Wikipedia had been encoded into synthetic DNA. In 2021, scientists reported that a custom DNA data writer had been developed that was capable of writing data into DNA at 18 Mbps. Encoding methods Countless methods for encoding data in DNA are possible. The optimal methods are those that make economical use of DNA and protect against errors. If the message DNA is intended to be stored for a long period of time, for example, 1,000 years, it is also helpful if the sequence is obviously artificial and the reading frame is easy to identify. Encoding text Several simple methods for encoding text have been proposed. Most of these involve translating each letter into a corresponding "codon", consisting of a unique small sequence of nucleotides in a lookup table. Some examples of these encoding schemes include Huffman codes, comma codes, and alternating codes. Encoding arbitrary data To encode arbitrary data in DNA, the data is typically first converted into ternary (base 3) data rather than binary (base 2) data. Each digit (or "trit") is then converted to a nucleotide using a lookup table. To prevent homopolymers (repeating nucleotides), which can cause problems with accurate sequencing, the result of the lookup also depends on the preceding nucleotide. Using the example lookup table below, if the previous nucleotide in the sequence is T (thymine), and the trit is 2, the next nucleotide will be G (guanine). Various systems may be incorporated to partition and address the data, as well as to protect it from errors. One approach to error correction is to regularly intersperse synchroniz
https://en.wikipedia.org/wiki/Abzyme
An abzyme (from antibody and enzyme), also called catmab (from catalytic monoclonal antibody), and most often called catalytic antibody or sometimes catab, is a monoclonal antibody with catalytic activity. Abzymes are usually raised in lab animals immunized against synthetic haptens, but some natural abzymes can be found in normal humans (anti-vasoactive intestinal peptide autoantibodies) and in patients with autoimmune diseases such as systemic lupus erythematosus, where they can bind to and hydrolyze DNA. To date abzymes display only weak, modest catalytic activity and have not proved to be of any practical use. They are, however, subjects of considerable academic interest. Studying them has yielded important insights into reaction mechanisms, enzyme structure and function, catalysis, and the immune system itself. Enzymes function by lowering the activation energy of the transition state of a chemical reaction, thereby enabling the formation of an otherwise less-favorable molecular intermediate between the reactant(s) and the product(s). If an antibody is developed to bind to a molecule that is structurally and electronically similar to the transition state of a given chemical reaction, the developed antibody will bind to, and stabilize, the transition state, just like a natural enzyme, lowering the activation energy of the reaction, and thus catalyzing the reaction. By raising an antibody to bind to a stable transition-state analog, a new and unique type of enzyme is produced. So far, all catalytic antibodies produced have displayed only modest, weak catalytic activity. The reasons for low catalytic activity for these molecules have been widely discussed. Possibilities indicate that factors beyond the binding site may play an important role, in particular through protein dynamics. Some abzymes have been engineered to use metal ions and other cofactors to improve their catalytic activity. History The possibility of catalyzing a reaction by means of an antibody
https://en.wikipedia.org/wiki/Internet%20Mail%202000
Internet Mail 2000 is an Internet mail architecture proposed by Daniel J. Bernstein (and in subsequent years separately proposed by several others), designed with the precept that the initial storage of mail messages be the responsibility of the sender, and not of the recipient as it is with the SMTP-based Internet mail architecture. Whereas the SMTP-based Internet mail architecture has a close analogue in the architecture of paper mail, this is not the case for Internet Mail 2000. Its architecture depends on various things that are unique to the natures of the Internet and to electronic messages. One of its goals is to reduce spam. Implementations Over the years since Daniel J. Bernstein proposed it, several attempts have been made to design and to implement a real Internet Mail 2000 system, with varying degrees of achievement. The closest thing to a concrete, open implementation of the system is Meng Weng Wong's StubMail, which was presented at Google in July 2006. See also Bernstein has also suggested the Quick Mail Transfer Protocol (QMTP). External links Daniel J. Bernstein's original IM2000 outline (2000) Brett Watson's proposal (2002) JFC Morfin's proposal (2003) describing weemail — Jonathan de Boyne Pollard's detailed proposed specifications and elaboration of the system Duan's, Dong's, and Gopalan's proposal (2004) and subsequent Internet Draft (2006) describing Differentiated Mail Transfer Protocol (DMTP) Nathan Cheng's proposal (2006) describing Hypertext Mail Protocol (HTMP) Andrew Walrond's HeresyMail (seems to be abandoned?) Chrobok's, Trotman's, and O'Keefe's proposal which extends SMTP with Internet Mail 2000 features (General delivery) Email
https://en.wikipedia.org/wiki/Steel%20Bank%20Common%20Lisp
Steel Bank Common Lisp (SBCL) is a free Common Lisp implementation that features a high-performance native compiler, Unicode support and threading. The name "Steel Bank Common Lisp" is a reference to Carnegie Mellon University Common Lisp from which SBCL forked: Andrew Carnegie made his fortune in the steel industry and Andrew Mellon was a successful banker. History SBCL descends from CMUCL (created at Carnegie Mellon University), which is itself descended from Spice Lisp, including early implementations for the Mach operating system on the IBM RT PC, and the Three Rivers Computing Corporation PERQ computer, in the 1980s. William Newman originally announced SBCL as a variant of CMUCL in December 1999. The main point of divergence at the time was a clean bootstrapping procedure: CMUCL requires an already compiled executable binary of itself to compile the CMUCL source code, whereas SBCL supported bootstrapping from theoretically any ANSI-compliant Common Lisp implementation. SBCL became a SourceForge project in September 2000. The original rationale for the fork was to continue the initial work done by Newman without destabilizing CMUCL which was at the time already a mature and much-used implementation. The forking was amicable, and there have since then been significant flows of code and other cross-pollination between the two projects. Since then SBCL has attracted several developers, been ported to multiple hardware architectures and operating systems, and undergone many changes and enhancements: while it has dropped support for several CMUCL extensions that it considers beyond the scope of the project (such as the Motif interface) it has also developed many new ones, including native threading and Unicode support. Version 1.0 was released in November 2006, and active development continues. William Newman stepped down as project administrator for SBCL in April 2008. Several other developers have taken over interim management of releases for the time being
https://en.wikipedia.org/wiki/Valence%20%28chemistry%29
In chemistry, the valence (US spelling) or valency (British spelling) of an atom is a measure of its combining capacity with other atoms when it forms chemical compounds or molecules. Valence is generally understood to be the number of chemical bonds that each atom of a given element typically forms. For a specified compound the valence of an atom is the number of bonds formed by the atom. Double bonds are considered to be two bonds, and triple bonds to be three. In most compounds, the valence of hydrogen is 1, of oxygen is 2, of nitrogen is 3, and of carbon is 4. Valence is not to be confused with the related concepts of the coordination number, the oxidation state, or the number of valence electrons for a given atom. Description The valence is the combining capacity of an atom of a given element, determined by the number of hydrogen atoms that it combines with. In methane, carbon has a valence of 4; in ammonia, nitrogen has a valence of 3; in water, oxygen has a valence of 2; and in hydrogen chloride, chlorine has a valence of 1. Chlorine, as it has a valence of one, can be substituted for hydrogen in many compounds. Phosphorus has a valence 3 in phosphine () and a valence of 5 in phosphorus pentachloride (), which shows that elements may have exhibit than one valence. The structural formula of a compound represents the connectivity of the atoms, with lines drawn between two atoms to represent bonds. The two tables below show examples of different compounds, their structural formulas, and the valences for each element of the compound. Definition Valence is defined by the IUPAC as: The maximum number of univalent atoms (originally hydrogen or chlorine atoms) that may combine with an atom of the element under consideration, or with a fragment, or for which an atom of this element can be substituted. An alternative modern description is: The number of hydrogen atoms that can combine with an element in a binary hydride or twice the number of oxygen atoms combini
https://en.wikipedia.org/wiki/Armorial%20of%20Singapore
This is a list of the coats of arms that are currently used in Singapore, or have been used during its history. National coat of arms Government Military Historical arms
https://en.wikipedia.org/wiki/Pittsburgh%20Life%20Sciences%20Greenhouse
Pittsburgh Life Sciences Greenhouse (PLSG) is an investment firm based in the South Side neighborhood of Pittsburgh, Pennsylvania that provides resources and tools to entrepreneurial life sciences enterprises in Pittsburgh and western Pennsylvania in order to advance research and patient care. History Since PLSG began operations in 2002, it has assisted more than 435 life sciences companies and has affected more than 10,000 jobs in western Pennsylvania. PLSG has provided 34 companies with office or laboratory space, and 14 have been relocated to Pittsburgh from outside the region. PLSG has invested over $20 million in 77 companies, which has leveraged over $1.5 billion in additional capital to the region. PLSG guides researchers, entrepreneurs and emerging companies through the challenges faced in early stages of company development. They provide support to companies developing product and service innovations in biotechnology tools, diagnostics/screening, healthcare IT, medical devices and therapeutics. PLSG also helps in the expansion of more mature life science companies, by supporting new product and market developments and connecting them to investors. Pittsburgh Life Sciences Greenhouse grew out of an original plan known as BioVenture, developed by CMU and Pitt. The initiative received a major boost in 2001 when money from the state's settlement with the tobacco industry was pledged to create a life science greenhouse in Western Pennsylvania. In 2003, Pittsburgh Biomedical Corporation, a non-profit established in 1988 by the Pittsburgh Technology Council, consolidated with PLSG. Today, PLSG exists as a partnership between the Commonwealth of Pennsylvania, University of Pittsburgh, Carnegie Mellon University, University of Pittsburgh Medical Center and the regional foundation of community. Their state mission is to "create, nurture and help establish a globally dominant life sciences industry in western Pennsylvania."
https://en.wikipedia.org/wiki/Privoxy
Privoxy is a free non-caching web proxy with filtering capabilities for enhancing privacy, manipulating cookies and modifying web page data and HTTP headers before the page is rendered by the browser. Privoxy is a "privacy enhancing proxy", filtering web pages and removing advertisements. Privoxy can be customized by users, for both stand-alone systems and multi-user networks. Privoxy can be chained to other proxies and is frequently used in combination with Squid among others and can be used to bypass Internet censorship. History Privoxy is based on the Internet Junkbuster and is released under the GNU General Public License. It runs on Linux, OpenWrt, DD-WRT, Windows, macOS, OS/2, AmigaOS, BeOS, and most flavors of Unix. Almost any Web browser can use it. The software is hosted at SourceForge. Historically the Tor Project bundled Privoxy with Tor but this was discontinued in 2010 as they pushed their own internal Tor Browser project and recommended against external third party proxies. Privoxy still works if manually configured and is still recommended for third party non-browser applications which do not natively support SOCKS. Reception Shashank Sharma of Linux Format rated it 9/10 stars and wrote, "Privoxy is highly customisable, easy to set up, has good documentation and is fun to work with. Use it!" Erez Zukerman of PC World rated it 4/5 stars and called it complicated but powerful. Michelle Delio of Wired.com called it "an outstanding way to protect one's privacy". See also Content-control software Web accelerator which discusses host-based HTTP acceleration Proxy server which discusses client-side proxies Reverse proxy which discusses origin-side proxies Internet Cache Protocol Polipo, a caching web proxy server Proxomitron, a similar content-filtering proxy for Windows
https://en.wikipedia.org/wiki/Clifford%20algebra
In mathematics, a Clifford algebra is an algebra generated by a vector space with a quadratic form, and is a unital associative algebra. As -algebras, they generalize the real numbers, complex numbers, quaternions and several other hypercomplex number systems. The theory of Clifford algebras is intimately connected with the theory of quadratic forms and orthogonal transformations. Clifford algebras have important applications in a variety of fields including geometry, theoretical physics and digital image processing. They are named after the English mathematician William Kingdon Clifford (1845–1879). The most familiar Clifford algebras, the orthogonal Clifford algebras, are also referred to as (pseudo-)Riemannian Clifford algebras, as distinct from symplectic Clifford algebras. Introduction and basic properties A Clifford algebra is a unital associative algebra that contains and is generated by a vector space over a field , where is equipped with a quadratic form . The Clifford algebra is the "freest" unital associative algebra generated by subject to the condition where the product on the left is that of the algebra, and the is its multiplicative identity. The idea of being the "freest" or "most general" algebra subject to this identity can be formally expressed through the notion of a universal property, as done below. When is a finite-dimensional real vector space and is nondegenerate, may be identified by the label , indicating that has an orthogonal basis with elements with , with , and where indicates that this is a Clifford algebra over the reals; i.e. coefficients of elements of the algebra are real numbers. This basis may be found by orthogonal diagonalization. The free algebra generated by may be written as the tensor algebra , that is, the direct sum of the tensor product of copies of over all . Therefore one obtains a Clifford algebra as the quotient of this tensor algebra by the two-sided ideal generated by elements of the form f
https://en.wikipedia.org/wiki/Timer
A timer is a type of clock used for measuring specific times. Timers can be categorized into two main types. The word "timer" is usually reserved for devices that count down from a specified time interval called a countdown timer, while devices that do the opposite, measuring elapsed time by counting upwards from zero, are called stopwatches. A simple example of the first type is an hourglass. Working method timers have two main groups: hardware and software timers. Most timers give an indication that the time interval that had been set has expired - such as a loud noise. Time switches, timing mechanisms that activate a switch, are sometimes also called "timers." Hardware Mechanical Mechanical timers use clockwork to measure time. Manual timers are typically set by turning a dial to the time interval desired, turning the dial stores energy in a mainspring to run the mechanism. They function similarly to a mechanical alarm clock, the energy in the mainspring causes a balance wheel to rotate back and forth. Each swing of the wheel releases the gear train to move forward by a small fixed amount, causing the dial to move steadily backward until it reaches zero when a lever arm strikes a bell. The mechanical kitchen timer was invented in 1926 called a fan fly that spins against air resistance, low-precision mechanical egg-timers are sometimes of this type. The simplest and oldest type of mechanical timer is the hourglass - which is also known as "the glass of the hour" - in which a fixed amount of sand drains through a narrow opening from one chamber to another to measure a time interval. Electromechanical Short-period bimetallic electromechanical timers use a thermal mechanism, with a metal finger made of strips of two metals with different rates of thermal expansion sandwiched together, steel and bronze are common. An electric current flowing through this finger causes heating of the metals, one side expands less than the other, and an electrical contact on
https://en.wikipedia.org/wiki/Il%20Covile
Il Covile (Italian: The Lair) is an Italian online magazine published in Italy. Profile Edited by Stefano Borselli, the magazine was founded in September 2009, and its cultural line draws on Carl Schmitt’s “Catholical form”, on contemporary conservative thought (MacIntyre, Scruton) and on marxism of the second half of the twentieth-century (Cesarano, Camatte, Debord, Tronti). Outstanding features are the typographic qualities: William Morris’ font and Igino Marini’s Fell types are used for the heading and the text type, while the pages are usually decorated with vignette from Baroque era editions. Contents Many topics are covered, from architecture and planning (with the endorsement of the views of Christopher Alexander, Léon Krier, Nikos Salingaros), to critics of Contemporary art (Jean Clair, Marc Fumaroli, Aude De Kerros), to the choice of the rhymed verses, to the male identity (criticism of feminism and Gender Theory), to the Judaic and Christian roots of the occidental civilization. All themes are linked through the fil rouge of the opposition to the nihilist drift of modernity in the name of the Christian Epimetheus evoked by Konrad Weiß, Carl Schmitt and Ivan Illich. Il Covile also treats material culture, crafts and typography. Editorial Staff Francesco Borselli, Riccardo De Benedetti, Aude de Kerros, Pietro De Marco, Armando Ermini, Luciano Funari, Giuseppe Ghini, Ciro Lomonte, Roberto Manfredini, Ettore Maria Mazzola, Alzek Misheff, Pietro Pagliardini, Almanacco romano, Gabriella Rouf, Nikos Salingaros, Andrea Sciffo, Stefano Serafini, Stefano Silvestri, Massimo Zaratin. See also List of magazines in Italy
https://en.wikipedia.org/wiki/S-200%20%28bioremediation%29
S-200 is a bioremediation product used to clean up oil spills. It is an oleophilic nitrogen-phosphorus nutrient that promotes the growth of micro-organisms that degrade hydrocarbons (such as oil and fuel). S-200 bonds to the hydrocarbon to eliminate the need to reapply in tidal or rain events. S-200 is identified as a bioremediation accelerator and as such, does not contain bacterial cultures, but rather contributes to the establishment of a robust microbial population. In the laboratory, considerable biodegradation to alkanes was seen over the course of treatment. Field trials have yielded inconsistent results. The product was developed by International Environmental Products, a US company based around S-200 as its product. Field tests After laboratory and field trials, S-200 was the only bioremediation process selected by the Spanish Department of National Parks for the final cleanup of the Galician coastline following the Prestige oil tanker spill. The effects of the product were studied on a beach affected by the spill] off the coast of Spain in 2002. A study concluded that it enhanced the biodegradation rate of specific compounds, but did not establish whether it had improved the visible aspect of the beach, detached stuck oil, or reduced weathered oil. Other compounds, such as uric acid and lecithin, may be more effective than S-200, but wash off in tidal areas or rain events and must be applied continuously. In 2006, other researchers summarized the findings of experiments on Prestige-affected coastal areas, concluding that oloephilic substances such as S-200 were of "limited effectiveness. In 2006, a field bioremediation assay was conducted by the Department of Microbiology, University of Barcelona on the use of S-200 ten months after the Prestige heavy fuel-oil spill on a beach of the Cantabrian coast in northern Spain. The field survey indicated that the product enhanced the biodegradation rate, particularly of high molecular weight n-alkane
https://en.wikipedia.org/wiki/Cardinal%20and%20Ordinal%20Numbers
Cardinal and Ordinal Numbers is a book on transfinite numbers, by Polish mathematician Wacław Sierpiński. It was published in 1958 by Państwowe Wydawnictwo Naukowe, as volume 34 of the series Monografie Matematyczne of the Institute of Mathematics of the Polish Academy of Sciences. Sierpiński wrote on the same topic earlier, in his 1928 book Leçons sur les nombres transfinis, but his 1958 book on the topic was completely rewritten and significantly longer. A second edition of Cardinal and Ordinal Numbers was published in 1965. Topics After five introductory chapters on naive set theory and set-theoretic notation, and a sixth chapter on the axiom of choice, the book has four chapters on cardinal numbers, their arithmetic, and series and products of cardinal numbers, comprising approximately 50 pages. Following this, four longer chapters (totalling roughly 180 pages) cover orderings of sets, order types, well-orders, ordinal numbers, ordinal arithmetic, and the Burali-Forti paradox according to which the collection of all ordinal numbers cannot be a set. Three final chapters concern aleph numbers and the continuum hypothesis, statements equivalent to the axiom of choice, and consequences of the axiom of choice. The second edition makes only minor changes to the first except for adding footnotes concerning two later developments in the area: the proof by Paul Cohen of the independence of the continuum hypothesis, and the construction by Robert M. Solovay of the Solovay model in which all sets of real numbers are Lebesgue measurable. Audience and reception Sierpiński was known for his significant contributions to the theory of transfinite numbers;, reviewer Reuben Goodstein calls his book "a goldmine of results", and similarly Leonard Gillman writes that it is highly valuable "as a compendium of interesting mathematical information, presented with care and clarity". Both Gillman and John C. Oxtoby call the writing style "leisurely" and "unhurried", and although Gillm
https://en.wikipedia.org/wiki/Russula%20cyanoxantha
Russula cyanoxantha, synonymous with R. xyanoxantha, commonly known as the charcoal burner or variegated russula, is a basidiomycete mushroom, distinguished from most other members of the genus Russula by the fact that its gills do not split, but are soft and flexible. It is one of the most common species of Russula in Europe. It is an edible mushroom. It was designated "Mushroom of the Year" in 1997 by the German Association of Mycology. Description The most salient characteristic is the weak gills, which feel greasy to the touch, are flexible and do not break. The cap is wide, convex at first and later flattened, and greenish to bright brown; they vary considerably in color. The stipe is pure white, slightly convex underneath, from in height and in diameter. The spores are pure white. The stipe will give a green reaction when rubbed with iron salts (ferrous sulphate). Most other (but not all) Russula species give a salmon reaction. Coupled with the gill flexibility this is a good diagnostic clue to species level. Distribution and habitat Russula cyanoxantha grows in slightly acidic, but nutrient-rich soil. Like all Russulas, it is a mycorrhizal fungus. It is found most commonly in beech forests, and often in deciduous or mixed forests, appearing from May to November, with the highest concentration in July to September. Use The edible mushroom is suitable for many kinds of preparation; the flesh is not as hard as that of many other edible Russulas. It has a mild, nutty taste. Similar species The cap of the grey-green Russula grisea is more blue-grey but has violet or green hues with light cream gills; it also grows in mixed forests, particularly under beech, and more rarely in coniferous forests. Russula olivacea also may have a variegated cap, but produces yellow spores. See also List of Russula species
https://en.wikipedia.org/wiki/Rare%20variant%20%28genetics%29
A rare variant is a genetic variant which occurs at low frequency in a population. Rare variants play a significant role in both complex and Mendelian disease and are responsible for a portion of the missing heritability of complex diseases. The theoretical case for a significant role of rare variants is that alleles that strongly predispose an individual to disease will be kept at low frequencies in populations by purifying selection. Rare variants are increasingly being studied, as a consequence of whole exome and whole genome sequencing efforts. While these variants are individually infrequent in populations, there are many in human populations, and they can be unique to specific populations. They are more likely to be deleterious than common variants, as a result of rapid population growth and weak purifying selection. They have been suspected of acting independently or along with common variants to cause disease states. Methods of discovery Some methods, such as genetic burden tests, have been specifically developed to study genetic association of rare variants. These methods aggregate rare variants over genetic regions, such as genes or whole pathways, and evaluate cumulative effects of multiple genetic variants. These methods may increase power when multiple variants in the region are associated with a disease or a trait. In addition, compared to a genome-wide association study, a region or gene based test performs much fewer tests resulting in a less stringent multiple-hypothesis correction than the genome-wide significance. Some examples of these methods are SKAT, SKAT-O, ARIEL test, aSUM and STAAR. SNP annotations help to prioritize rare functional variants, and incorporating these annotations can effectively boost the power of genetic association of rare variants analysis of whole exome and whole genome sequencing studies. See also Allele frequency Functional genomics Genetic drift SNP annotation Whole exome sequencing Whole genome sequencing
https://en.wikipedia.org/wiki/Energy-efficient%20landscaping
Energy-efficient landscaping is a type of landscaping designed for the purpose of conserving energy. There is a distinction between the embedded energy of materials and constructing the landscape, and the energy consumed by the maintenance and operations of a landscape. Terminology and definition Landscaping often refers to the practice of landscape design and gardening, which traditionally concern with designing sites with vegetation and craft for aesthetic, cultural, social, and religious purposes. Landscape architecture and landscape engineering, on the other hand, are multi-disciplinary and interdisciplinary professions that integrate technical considerations, such as geography, ecology, biology,and engineering, into the design of landscape and the actualization of it. Energy-efficient landscaping falls into the categories of the latter, and it stresses the energy conservation in site operation or the creation of the site. Among its various term usage, energy-efficient landscaping can refer to the reduction of energy usage in maintenance and operation of the landscape narrowly for the user/owner of the site, or broadly for the energy conservation of the global environment, such as mitigating urban heat island effect with reflective surface (increase albedo) or reducing the need of water treatment and sewage by using pervious pavement. Common methods of energy-efficient landscaping include reducing heat or cooling load of a building through shade, wind-blocking, and insulation; management of water; and using plants or construction material that cost less energy. Methods and techniques Design techniques include: Shade with trees Planting trees for the purpose of providing shade, which reduces cooling costs. The mature height of the trees and their canopy shape need to be well studied. The location of the trees should be designed based on their height and the height of the building. Also, when trees are plant closer to the windows or walls, they will provide
https://en.wikipedia.org/wiki/Diphenylcyanoarsine
Diphenylcyanoarsine, also called Clark 2 (Chlor-Arsen-Kampfstoff 2, being the successor of Clark 1) by the Germans, was discovered in 1918 by Sturniolo and Bellinzoni and shortly thereafter used like the related Clark 1 gas by the Germans for chemical warfare in the First World War. The substance causes nausea, vomiting, and headaches. It can subsequently lead to e.g. pulmonary edema (fluid in the lungs). See also Cacodyl cyanide Clark 1 Chemical weapons
https://en.wikipedia.org/wiki/Midy%27s%20theorem
In mathematics, Midy's theorem, named after French mathematician E. Midy, is a statement about the decimal expansion of fractions a/p where p is a prime and a/p has a repeating decimal expansion with an even period . If the period of the decimal representation of a/p is 2n, so that then the digits in the second half of the repeating decimal period are the 9s complement of the corresponding digits in its first half. In other words, For example, Extended Midy's theorem If k is any divisor of h (where h is the number of digits of the period of the decimal expansion of a/p (where p is again a prime)), then Midy's theorem can be generalised as follows. The extended Midy's theorem states that if the repeating portion of the decimal expansion of a/p is divided into k-digit numbers, then their sum is a multiple of 10k − 1. For example, has a period of 18. Dividing the repeating portion into 6-digit numbers and summing them gives Similarly, dividing the repeating portion into 3-digit numbers and summing them gives Midy's theorem in other bases Midy's theorem and its extension do not depend on special properties of the decimal expansion, but work equally well in any base b, provided we replace 10k − 1 with bk − 1 and carry out addition in base b. For example, in octal In duodecimal (using inverted two and three for ten and eleven, respectively) Proof of Midy's theorem Short proofs of Midy's theorem can be given using results from group theory. However, it is also possible to prove Midy's theorem using elementary algebra and modular arithmetic: Let p be a prime and a/p be a fraction between 0 and 1. Suppose the expansion of a/p in base b has a period of ℓ, so where N is the integer whose expansion in base b is the string a1a2...aℓ. Note that b ℓ − 1 is a multiple of p because (b ℓ − 1)a/p is an integer. Also bn−1 is not a multiple of p for any value of n less than ℓ, because otherwise the repeating period of a/p in base b would be less than ℓ. Now
https://en.wikipedia.org/wiki/VACUUM
VACUUM is a set of normative guidance principles for achieving training and test dataset quality for structured datasets in data science and machine learning. The garbage-in, garbage out principle motivates a solution to the problem of data quality but does not offer a specific solution. Unlike the majority of the ad-hoc data quality assessment metrics often used by practitioners VACUUM specifies qualitative principles for data quality management and serves as a basis for defining more detailed quantitative metrics of data quality. VACUUM is an acronym that stands for: valid accurate consistent uniform unified model
https://en.wikipedia.org/wiki/Mike%20Lesser
Michael John Lesser (28 September 1943 – 1 July 2015) was a mathematical philosopher and political activist. Early life The youngest member of the Committee of 100, he was sent, aged 16, to Wormwood Scrubs Prison along with most of the committee. He served two spells as contributor to London's underground journal International Times. He was active in May 1968 in France. Career In 1992 he was the co-author, with Prof A. Wuensche, of the book The Global Dynamics Of Cellular Automata, published in the Santa Fe Institute's Reference Volumes. The book is an atlas of emergent forms evolving from the apparently chaotic product of a set of iterated logical operations. He was assistant to the Directing Professor, P. Allen, at the Institute for Ecotechnological Research at Cranfield University. He is the co-author of several scientific papers on dynamical systems theory with Allen. He worked on super computers at NASA's Goddard Jet Propulsion Lab and at the Rutherford Appleton Laboratories in Oxon, UK. He published papers on autism with Dinah Murray, with whom he co-founded Autism and Computing, a non-profit organization. In 2009 he founded The International Times Archive, a free archive of every page of International Times from its first issue in 1966 to its last in 1994. A biographical interview may also be found in the style magazine Dazed & Confused. A more complete autobiography may be found in The Times. Death Lesser died in London in 2015 at the age of 71. In December 2015, coroner Andrew Walker at Barnet Coroners Court ruled that Lesser died from asphyxiation. Evidence was given that Lesser had suffered from depression for "many years". He had a heart bypass in 1999 and in June 2015 had been told that he had terminal lung cancer. He left a note for his wife and friends.
https://en.wikipedia.org/wiki/Legendre%27s%20equation
In mathematics, Legendre's equation is the Diophantine equation The equation is named for Adrien-Marie Legendre who proved in 1785 that it is solvable in integers x, y, z, not all zero, if and only if −bc, −ca and −ab are quadratic residues modulo a, b and c, respectively, where a, b, c are nonzero, square-free, pairwise relatively prime integers, not all positive or all negative .
https://en.wikipedia.org/wiki/DoD%20IPv6%20product%20certification
The Department of Defense (DoD) Internet Protocol version 6 (IPv6) product certification program began as a mandate from the DoD's Assistant Secretary of Defense for Networks & Information Integration (ASD-NII) in 2005. The program mandates the Joint Interoperability Test Command (JITC) in Fort Huachuca, AZ, to test and certify IT products for IPv6 capability according to the RFCs outlined in the DoD's IPv6 Standards Profiles for IPv6 Capable Products. Once products are certified for special interoperability, they are added to the DoD's Unified Capabilities Approved Products List (UC APL) for IPv6. This list is used by procurement offices in the DoD and the U.S. Federal agencies for ongoing purchases and acquisitions of IT equipment. As of February 2009, the DoD ceased the requirement for IPv6-only testing for certification and entry into the Unified Capabilities Approved Products List (UC APL). According to Kris Strance, DoD CIO IPv6 Lead, "The testing of IPv6 is a part of all product evaluations — it is much broader in scope now." The UC APL is now a single consolidated list of products that have completed Interoperability (IO) and Information Assurance (IA) certification. DoD IPv6 standards The DoD IPv6 Standards Profiles for IPv6 Capable Products (DoD IPv6 Profile) is the singular “IPv6 Capable” definition in DoD. It is a document that lists the six agreed upon product classes (Host, Router, Layer 3 Switch, Network Appliance, Security Device, and Advanced Server) and their corresponding standards (RFCs). It lists each standard according to its level of requirement: MUST: The standard is required to be implemented in the product now. SHOULD: The standard is optional, but recommended for implementation. SHOULD+: The standard is optional now, but will be required within a short period of time. DoD IPv6 generic test plan The JITC uses its publicly available IPv6 Generic Test Plan (GTP) to test each product for its conformance, performance and interoperabil
https://en.wikipedia.org/wiki/Common%20interosseous%20artery
The common interosseous artery, about 1 cm. in length, arises immediately below the tuberosity of the radius from the ulnar artery. Passing backward to the upper border of the interosseous membrane, it divides into two branches, the anterior interosseous and posterior interosseous arteries. Additional images
https://en.wikipedia.org/wiki/Weighted%20space
In functional analysis, a weighted space is a space of functions under a weighted norm, which is a finite norm (or semi-norm) that involves multiplication by a particular function referred to as the weight. Weights can be used to expand or reduce a space of considered functions. For example, in the space of functions from a set to under the norm defined by: , functions that have infinity as a limit point are excluded. However, the weighted norm is finite for many more functions, so the associated space contains more functions. Alternatively, the weighted norm is finite for many fewer functions. When the weight is of the form , the weighted space is called polynomial-weighted.
https://en.wikipedia.org/wiki/Anabolic%20steroid
Anabolic steroids, also known as anabolic-androgenic steroids (AAS), are a class of drugs that are structurally related to testosterone, the main male sex hormone, and produce effects by binding to the androgen receptor. Anabolic steroids have a number of medical uses, but are also used by athletes to increase muscle size, strength, and performance. Health risks can be produced by long-term use or excessive doses of AAS. These effects include harmful changes in cholesterol levels (increased low-density lipoprotein and decreased high-density lipoprotein), acne, high blood pressure, liver damage (mainly with most oral AAS), and left ventricular hypertrophy. These risks are further increased when athletes take steroids alongside other drugs, causing significantly more damage to their bodies. The effect of anabolic steroids on the heart can cause myocardial infarction and strokes. Conditions pertaining to hormonal imbalances such as gynecomastia and testicular size reduction may also be caused by AAS. In women and children, AAS can cause irreversible masculinization. Ergogenic uses for AAS in sports, racing, and bodybuilding as performance-enhancing drugs are controversial because of their adverse effects and the potential to gain advantage in physical competitions. Their use is referred to as doping and banned by most major sporting bodies. Athletes have been looking for drugs to enhance their athletic abilities since the Olympics started in Ancient Greece. For many years, AAS have been by far the most detected doping substances in IOC-accredited laboratories. Anabolic steroids are classified as Schedule III controlled substances in many countries. In countries where AAS are controlled substances, there is often a black market in which smuggled, clandestinely manufactured or even counterfeit drugs are sold to users. Uses Medical Since the discovery and synthesis of testosterone in the 1930s, AAS have been used by physicians for many purposes, with varying degrees
https://en.wikipedia.org/wiki/Laplace%20operator
In mathematics, the Laplace operator or Laplacian is a differential operator given by the divergence of the gradient of a scalar function on Euclidean space. It is usually denoted by the symbols , (where is the nabla operator), or . In a Cartesian coordinate system, the Laplacian is given by the sum of second partial derivatives of the function with respect to each independent variable. In other coordinate systems, such as cylindrical and spherical coordinates, the Laplacian also has a useful form. Informally, the Laplacian of a function at a point measures by how much the average value of over small spheres or balls centered at deviates from . The Laplace operator is named after the French mathematician Pierre-Simon de Laplace (1749–1827), who first applied the operator to the study of celestial mechanics: the Laplacian of the gravitational potential due to a given mass density distribution is a constant multiple of that density distribution. Solutions of Laplace's equation are called harmonic functions and represent the possible gravitational potentials in regions of vacuum. The Laplacian occurs in many differential equations describing physical phenomena. Poisson's equation describes electric and gravitational potentials; the diffusion equation describes heat and fluid flow; the wave equation describes wave propagation; and the Schrödinger equation describes the wave function in quantum mechanics. In image processing and computer vision, the Laplacian operator has been used for various tasks, such as blob and edge detection. The Laplacian is the simplest elliptic operator and is at the core of Hodge theory as well as the results of de Rham cohomology. Definition The Laplace operator is a second-order differential operator in the n-dimensional Euclidean space, defined as the divergence () of the gradient (). Thus if is a twice-differentiable real-valued function, then the Laplacian of is the real-valued function defined by: where the latter notatio
https://en.wikipedia.org/wiki/Almond%20paste
Almond paste is made from ground almonds or almond meal and sugar in equal quantities, with small amounts of cooking oil, beaten eggs, heavy cream or corn syrup added as a binder. It is similar to marzipan, but has a coarser texture. Almond paste is used as a filling in pastries, but it can also be found in chocolates. In commercially manufactured almond paste, ground apricot or peach kernels are sometimes added to keep the cost down (also known as persipan). Uses Almond paste is used as a filling in pastries of many different cultures. It is a chief ingredient of the American bear claw pastry. In the Nordic countries almond paste is used extensively, in various pastries and cookies. In Sweden (where it is known as mandelmassa) it is used in biscuits, muffins and buns and as a filling in the traditional Shrove Tuesday pastry semla and is used in Easter and Christmas sweets. In Denmark (where it is known as marcipan or mandelmasse), almond paste is used in several pastries, for example as a filling in the Danish traditional pastry kringle. In Finland almond paste (called mantelimassa) is used in chocolate pralines and in the Finnish version of the Shrove Tuesday pastry laskiaispulla. In the Netherlands, almond paste (called amandelspijs) is used in gevulde speculaas (stuffed brown-spiced biscuit) and banket. It is used as filling in the fruited Christmas bread Kerststol, traditionally eaten at Christmas breakfast. In Germany, almond paste is also used in pastries and sweets. In the German language, almond paste is known as Marzipanrohmasse and sold for example as Lübecker Edelmarzipan, i.e. "high quality marzipan from Lübeck". It Italy it's known as "pasta di mandorle". The soft paste is molded into creative shapes by pastry chefs which can be used as cake decorations or to make frutta martorana. Almond paste is the main ingredient of French traditional calisson candy in Aix-en-Provence. It is used as a filling in almond croissants. In Turkey, almond paste
https://en.wikipedia.org/wiki/Augmented%20marked%20graph
An augmented marked graph is basically a Petri net with a specific set of places called resource places. If removing these resource places and their associated arcs, it will become a marked graph where every cycle is marked. For each resource place, there are pairs of outgoing and incoming transitions connected by elementary paths. Application Augmented marked graphs are often used for modelling systems with shared resources, such as manufacturing systems. Based on the special properties of augmented marked graphs, the properties of the modelled systems, such as liveness, boundedness and reversibility, can be effectively analyzed.
https://en.wikipedia.org/wiki/Wood%20Screw%20Pump
The Wood Screw Pump is a low-lift axial-flow drainage pump designed by A. Baldwin Wood in 1913 to cope with the drainage problems of New Orleans. Wood's extremely efficient pumps replaced less efficient pumps in the city's drainage system, prior to which the city had experienced chronic flooding problems, bringing diseases such as malaria and yellow fever together with contamination of drinking water supplies. The pumps are driven by synchronous Allis-Chalmers and General Electric motors, built in the early 1900s. They were designed to lift a large volume of water into outfall canals from which the water flowed into Lake Pontchartrain. Having proved their operational efficiency in New Orleans, people around the world wanted Wood to make pumps for them, especially the Netherlands. Wood rejected all countries that asked as he refused to leave Louisiana. Until the arrival of Hurricane Katrina, the pumps had kept much of New Orleans from experiencing major inundation for nearly 100 years.
https://en.wikipedia.org/wiki/Adult
An adult is a human or other animal that has reached full growth. The biological definition of the word means an animal reaching sexual maturity and thus capable of reproduction. In the human context, the term adult has meanings associated with social and legal concepts. In contrast to a non-adult or "minor", a legal adult is a person who has attained the age of majority and is therefore regarded as independent, self-sufficient, and responsible. They may also be regarded as a "major". The typical age of attaining legal adulthood is 18 to 21, although definition may vary by legal rights, country, and psychological development. Human adulthood encompasses psychological adult development. Definitions of adulthood are often inconsistent and contradictory; a person may be biologically an adult, and have adult behavior, but still be treated as a child if they are under the legal age of majority. Conversely, one may legally be an adult but possess none of the maturity and responsibility that may define an adult character. In different cultures there are events that relate passing from being a child to becoming an adult or coming of age. This often encompasses the passing a series of tests to demonstrate that a person is prepared for adulthood, or reaching a specified age, sometimes in conjunction with demonstrating preparation. Most modern societies determine legal adulthood based on reaching a legally specified age without requiring a demonstration of physical maturity or preparation for adulthood. Biological adulthood Historically and cross-culturally, adulthood has been determined primarily by the start of puberty (the appearance of secondary sex characteristics such as menstruation and the development of breasts in women, ejaculation, the development of facial hair, and a deeper voice in men, and pubic hair in both sexes). In the past, a person usually moved from the status of child directly to the status of adult, often with this shift being marked by some type of
https://en.wikipedia.org/wiki/Evil%20number
In number theory, an evil number is a non-negative integer that has an even number of 1s in its binary expansion. These numbers give the positions of the zero values in the Thue–Morse sequence, and for this reason they have also been called the Thue–Morse set. Non-negative integers that are not evil are called odious numbers. Examples The first evil numbers are: 0, 3, 5, 6, 9, 10, 12, 15, 17, 18, 20, 23, 24, 27, 29, 30, 33, 34, 36, 39 ... Equal sums The partition of the non-negative integers into the odious and evil numbers is the unique partition of these numbers into two sets that have equal multisets of pairwise sums. As 19th-century mathematician Eugène Prouhet showed, the partition into evil and odious numbers of the numbers from to , for any , provides a solution to the Prouhet–Tarry–Escott problem of finding sets of numbers whose sums of powers are equal up to the th power. In computer science In computer science, an evil number is said to have even parity.
https://en.wikipedia.org/wiki/Router%20alert%20label
In MPLS, a label with the value of 1 represents the router alert label. This label value is legal anywhere in the label stack except at the bottom. When a received packet contains this label value at the top of the label stack, it is delivered to a local software module for processing. The actual forwarding of the packet is determined by the label beneath it in the stack. However, if the packet is forwarded further, the Router Alert Label should be pushed back onto the label stack before forwarding. The use of this label is analogous to the use of the "Router Alert" option in IPv4 packets. Since this label cannot occur at the bottom of the stack, it is not associated with a particular network layer protocol. External links http://www.cisco.com/warp/public/105/mpls_faq_4649.shtml MPLS Label Stack Encoding RFC IP Router Alert Option RFC MPLS networking Internet Standards Network protocols Tunneling protocols
https://en.wikipedia.org/wiki/Sensing%20floor
A sensing floor is a floor with embedded sensors. Depending on their construction, these floors are either monobloc (e.g. structures made of a single frame, carpets). or modular (e.g. tiled floors, floors made of stripes of sensors). The first sensing floor prototypes were developed in the 1990s, mainly for human gait analysis. Such floors are usually used as a source of sensing information for an ambient intelligence. Depending on the type of sensors employed, sensing floors can measure load (pressure), proximity (to detect, track, and recognize humans), as well as the magnetic field (for detecting metallic objects like robots using magnetometers). Sensing floors have a variety of usages: Gait analysis for human identification and continuous health diagnosis (either in domestic or hospital environments) Mapping of the environment for autonomous robots Controller for interactive applications (as a MIDI music instrument, a games controller, dance movement analysis, etc.) More than 30 distinct sensing floor prototypes have been developed between 1990 and 2015. Notable examples of sensing floors have been developed by Oracle, MIT, and Inria. As of 2015, few sensing floors are available as commercial products, mainly targeting healthcare facilities (e.g. the GAITRite surface pressure sensing floor, and the SensFloor). Citations Sensors Robotics User interface techniques Security technology
https://en.wikipedia.org/wiki/Cognitive%20description
Cognitive description is a term used in psychology to describe the cognitive workings of the human mind. A cognitive description specifies what information is utilized during a cognitive action, how this information is processed and transformed, what data structures are used, and what behaviour is generated. See also Cognitive module
https://en.wikipedia.org/wiki/Boomerang%20Nebula
The Boomerang Nebula is a protoplanetary nebula located 5,000 light-years away from Earth in the constellation Centaurus. It is also known as the Bow Tie Nebula and catalogued as LEDA 3074547. The nebula's temperature is measured at making it the coolest natural place currently known in the Universe. The Boomerang Nebula is believed to be a star system evolving toward the planetary nebula phase. It continues to form and develop due to the outflow of gas from its core where a star in its late stage life sheds mass and emits starlight illuminating dust in the nebula. Millimeter scale dust grains mask portions of the nebula's center so most escaping visible light is in two opposing lobes forming a distinctive hourglass shape as viewed from Earth. The outflowing gas is moving outwards at a speed of about 164 km/s and expanding rapidly as it moves out into space; this gas expansion results in the nebula's unusually low temperature. Keith Taylor and Mike Scarrott called it the "Boomerang Nebula" in 1980 after observing it with the Anglo-Australian telescope at the Siding Spring Observatory. Unable to view it with great clarity, the astronomers saw merely a slight asymmetry in the nebula's lobes suggesting a curved shape like a boomerang. The nebula was photographed in detail by the Hubble Space Telescope in 1998 revealing a more symmetric hourglass shape. In 1995, using the 15-metre Swedish-ESO Submillimetre Telescope in Chile, astronomers measured its temperature as one degree above absolute zero (−272.15 °C). This makes it the coldest place in the Universe found so far, besides laboratory-created temperatures. Even the 2.7 K background glow from the Big Bang is warmer than the nebula. It is the only naturally occurring object found so far that has a temperature lower than the background radiation. In 2013, observations of the ALMA radio interferometer revealed other features of the Boomerang Nebula. The visible double lobe of the Boomerang Nebula was observed to be
https://en.wikipedia.org/wiki/Wine%20%26%20Spirit%20Education%20Trust
The Wine & Spirit Education Trust, often referred to as WSET, is a global organisation which arranges courses and exams in the field of wine, spirits and sake. WSET was founded in 1969, is headquartered in London and is generally regarded as one of the world's leading providers of wine education. In 2016, it opened its first international office, WSET Asia Pacific, in Hong Kong in response to high demand for wine and spirit education across Greater China. History and management WSET grew out of the Wine and Spirit Trade Association Education Committee and was set up with the financial assistance of the Worshipful Company of Vintners. The management of the WSET reports to a board of trustees made up of 8 members: three from The Worshipful Company of Vintners, three from the Wine and Spirit Trade Association, one from the Worshipful Company of Distillers and another one from the Institute of Masters of Wine. Courses The courses given by WSET were originally intended for people in the wine & spirit trade. The WSET programmes have increasingly been attended also by non-professional connoisseurs. The WSET offers professional certification in more than 70 countries worldwide, the courses are delivered by Approved Programme Providers. WSET Awards in Wines Level 1 Award in Wines Level 2 Award in Wines Level 3 Award in Wines Level 4 Diploma in Wines In the past 50 years, there have been over 10,000 WSET Level 4 Diploma graduates. Those who successfully complete the Diploma are able to use the post-nominal “DipWSET” after their name. WSET Awards in Spirits Level 1 Award in Spirits Level 2 Award in Spirits Level 3 Award in Spirits WSET Awards in Sake Level 1 Award in Sake Level 3 Award in Sake Notable alumni Notable DipWSETs include: Gerard Basset Jancis Robinson Jasper Morris Lisa Perotti-Brown See also Court of Master Sommeliers Master of Wine
https://en.wikipedia.org/wiki/Security%20hacker
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. Longstanding controversy surrounds the meaning of the term "hacker." In this controversy, computer programmers reclaim the term hacker, arguing that it refers simply to someone with an advanced understanding of computers and computer networks, and that cracker is the more appropriate term for those who break into computers, whether computer criminals (black hats) or computer security experts (white hats). A 2014 article noted that "the black-hat meaning still prevails among the general public". The subculture that has evolved around hackers is often referred to as the "computer underground". History Birth of subculture and entering mainstream: 1960s-1980s The subculture around such hackers is termed network hacker subculture, hacker scene, or computer underground. It initially developed in the context of phreaking during the 1960s and the microcomputer BBS scene of the 1980s. It is implicated with 2600: The Hacker Quarterly and the alt.2600 newsgroup. In 1980, an article in the August issue of Psychology Today (with commentary by Philip Zimbardo) used the term "hacker" in its title: "The Hacker Papers." It was an excerpt from a Stanford Bulletin Board discussion on the addictive nature of computer use. In the 1982 film Tron, Kevin Flynn (Jeff Bridges) describes his intentions to break into ENCOM's computer system, saying "I've been doing a little hacking here." CLU is the software he uses for this. By 1983, hacking in the sense of breaking computer security had already been in use as computer jargon, but there was no public awareness about such activities. However, the release of the film WarGames that year, featuri
https://en.wikipedia.org/wiki/Concurrency%20semantics
In computer science, concurrency semantics is a way to give meaning to concurrent systems in a mathematically rigorous way. Concurrency semantics is often based on mathematical theories of concurrency such as various process calculi, the actor model, or Petri nets. A more detailed account of concurrency semantics is given here: Concurrency (computer science). Semantics Formal methods
https://en.wikipedia.org/wiki/Mathematical%20chess%20problem
A mathematical chess problem is a mathematical problem which is formulated using a chessboard and chess pieces. These problems belong to recreational mathematics. The most well-known problems of this kind are the eight queens puzzle and the knight's tour problem, which have connection to graph theory and combinatorics. Many famous mathematicians studied mathematical chess problems, such as, Thabit, Euler, Legendre and Gauss. Besides finding a solution to a particular problem, mathematicians are usually interested in counting the total number of possible solutions, finding solutions with certain properties, as well as generalization of the problems to N×N or M×N boards. Independence problem An independence problem (or unguard) is a problem in which, given a certain type of chess piece (queen, rook, bishop, knight or king), one must find the maximum number that can be placed on a chessboard so that none of the pieces attack each other. It is also required that an actual arrangement for this maximum number of pieces be found. The most famous problem of this type is the eight queens puzzle. Problems are further extended by asking how many possible solutions exist. Further generalizations apply the problem to NxN boards. An 8×8 chessboard can have 16 independent kings, 8 independent queens, 8 independent rooks, 14 independent bishops, or 32 independent knights. Solutions for kings, bishops, queens and knights are shown below. To get 8 independent rooks is sufficient to place them on one of main diagonals. Domination problems A domination (or covering) problem involves finding the minimum number of pieces of the given kind to place on a chessboard such that all vacant squares are attacked at least once. It is a special case of the vertex cover problem. The minimum number of dominating kings is 9, queens is 5, rooks is 8, bishops is 8, and knights is 12. To get 8 dominating rooks, it is sufficient to place one on each file. Solutions for other pieces are provided on d
https://en.wikipedia.org/wiki/Tsakane%20Clay%20Grassland
The Tsakane Clay Grassland is a rare South African vegetation type supporting a unique grassland ecosystem. It is named after the township of Tsakane in Ekurhuleni, Gauteng, in which it is the dominant natural vegetation type. This ecosystem is characterized by its clay-rich soil, which supports a diverse array of flora and fauna, including several endemic and threatened species. The Tsakane Clay Grassland is an important conservation area, as it plays a crucial role in maintaining biodiversity and providing ecosystem services to the surrounding human populations. Geography The Tsakane Clay Grassland is the main vegetation type within the Suikerbosrand Nature Reserve, with a smaller occurrence of the Andesite Mountain Bushveld (SVcb11) vegetation unit. The altitude varies between 1,545 and 1,917 meters above sea level. The grassland extends from Soweto to the town of Springs in Gauteng and is distributed in patches southwards to Nigel and Vereeniging. The vegetation unit also occurs in parts of Mpumalanga between Balfour and Standerton and also in the northern side of the Vaal Dam. The landscape is flat to slightly undulating, with low hills also present in some areas of the grassland. Biodiversity The Tsakane Clay Grassland is home to a diverse range of plant species, including important taxa such as Andropogon schirensis, Eragrostis racemosa, Senecio inornatus, and Anthospermum rigidum subsp. pumilum. These species are adapted to the clay-rich soil conditions found in the grassland. The ecosystem also supports a variety of animal species, including mammals, birds, reptiles, and insects, many of which rely on the unique plant species for food and habitat. Conservation The Tsakane Clay Grassland is an important conservation area due to its high levels of biodiversity and the presence of several threatened and endemic species. Efforts to conserve the ecosystem include the establishment of protected areas, as well as ongoing research and monitoring programs to b
https://en.wikipedia.org/wiki/Acoustic%20release
An acoustic release is an oceanographic device for the deployment and subsequent recovery of instrumentation from the sea floor, in which the recovery is triggered remotely by an acoustic command signal. A typical release consists of the hydrophone (see dark gray cap in the figure), the battery housing (long gray cylinder), and a (red) hook which is opened to release the anchor by high-torque electrical motor. Method of operation Deployment phase: The instrument package is dropped to the sea floor. The principal components of the package are the anchor weight which allows the assembly to sink and then remain firmly on the sea floor, the acoustic release device which can receive a remote commands from the control station to drop the anchor weight, the instrument or payload which is to be deployed and later recovered, and a flotation device which keeps the assembly upright on the sea floor, and at the end of the deployment allows it to return to the surface. Operations phase: The instrument package is on the sea floor. This phase can last anywhere from minutes to several years, depending on the application. The instrument package is now typically unattended, performing its observations or work. Recovery phase: During this phase, an acoustic command is issued by the control station. The control station is typically on a boat, but may also be a device operated by a diver or mounted on an ROV. Upon receipt and verification, the acoustic release triggers a mechanism that drops the anchor weight. The remainder of the instrumentation package is now carried back to the surface by the flotation device for recovery. History and use Early use of acoustic releases for oceanography are reported in the 1960s, when it was recognized that deep ocean currents could more accurately be measured with sea floor mounted rather than ship board instruments. An obvious means of recovery was the use of a surface marker buoy linked to the sea floor instrument, but in areas of hig
https://en.wikipedia.org/wiki/Hypothalamic%20sulcus
The hypothalamic sulcus (sulcus of Monro) is a groove in the lateral wall of the third ventricle, marking the boundary between the thalamus and hypothalamus. The upper and lower portions of the lateral wall of the third ventricle correspond to the alar lamina and basal lamina, respectively, of the lateral wall of the fore-brain vesicle and are separated from each other by a furrow, the hypothalamic sulcus, which extends from the interventricular foramen to the cerebral aqueduct.
https://en.wikipedia.org/wiki/Abronia%20bogerti
Abronia bogerti, known by the common name Bogert's arboreal alligator lizard, is a species of lizard in the family Anguidae. The species is endemic to Mexico. Etymology The specific name, bogerti, is in honor of American herpetologist Charles Mitchill Bogert. Geographic range A. bogerti is indigenous to eastern Oaxaca, Mexico. A single specimen, the holotype, of A. bogerti was collected in 1954, and it was not seen again until 2000, at which time a second specimen was photographed. The type locality is "north of Niltepec, between Cerro Atravesado and Sierra Madre, Oaxaca". Behavior A. bogerti is largely arboreal. Reproduction A. bogerti is viviparous. Conservation status Because the species A. bogerti was collected in the canopy of the forest, it is believed that deforestation and ongoing crop and livestock farming pose the largest threats to its survival. Mexican law protects the lizard.
https://en.wikipedia.org/wiki/Impedance%20control
Impedance control is an approach to dynamic control relating force and position. It is often used in applications where a manipulator interacts with its environment and the force position relation is of concern. Examples of such applications include humans interacting with robots, where the force produced by the human relates to how fast the robot should move/stop. Simpler control methods, such as position control or torque control, perform poorly when the manipulator experiences contacts. Thus impedance control is commonly used in these settings. Mechanical impedance is the ratio of force output to motion input. This is analogous to electrical impedance that is the ratio of voltage output to current input (e.g. resistance is voltage divided by current). A "spring constant" defines the force output for a displacement (extension or compression) of the spring. A "damping constant" defines the force output for a velocity input. If we control the impedance of a mechanism, we are controlling the force of resistance to external motions that are imposed by the environment. Mechanical admittance is the inverse of impedance - it defines the motions that result from a force input. If a mechanism applies a force to the environment, the environment will move, or not move, depending on its properties and the force applied. For example, a marble sitting on a table will react very differently to a given force than will a log floating in a lake. The key theory behind the method is to treat the environment as an admittance and the manipulator as an impedance. It assumes the postulate that "no controller can make the manipulator appear to the environment as anything other than a physical system." This rule of thumb can also be stated as: "in the most common case in which the environment is an admittance (e.g. a mass, possibly kinematically constrained) that relation should be an impedance, a function, possibly nonlinear, dynamic, or even discontinuous, specifying the force pro
https://en.wikipedia.org/wiki/Fast%20neutron%20therapy
Fast neutron therapy utilizes high energy neutrons typically between 50 and 70 MeV to treat cancer. Most fast neutron therapy beams are produced by reactors, cyclotrons (d+Be) and linear accelerators. Neutron therapy is currently available in Germany, Russia, South Africa and the United States. In the United States, one treatment center is operational, in Seattle, Washington. The Seattle center uses a cyclotron which produces a proton beam impinging upon a beryllium target. Advantages Radiation therapy kills cancer cells in two ways depending on the effective energy of the radiative source. The amount of energy deposited as the particles traverse a section of tissue is referred to as the linear energy transfer (LET). X-rays produce low LET radiation, and protons and neutrons produce high LET radiation. Low LET radiation damages cells predominantly through the generation of reactive oxygen species, see free radicals. The neutron is uncharged and damages cells by direct effect on nuclear structures. Malignant tumors tend to have low oxygen levels and thus can be resistant to low LET radiation. This gives an advantage to neutrons in certain situations. One advantage is a generally shorter treatment cycle. To kill the same number of cancerous cells, neutrons require one third the effective dose as protons. Another advantage is the established ability of neutrons to better treat some cancers, such as salivary gland, adenoid cystic carcinomas and certain types of brain tumors, especially high-grade gliomas LET When therapeutic energy X-rays (1 to 25 MeV) interact with cells in human tissue, they do so mainly by Compton interactions, and produce relatively high energy secondary electrons. These high energy electrons deposit their energy at about 1 keV/µm. By comparison, the charged particles produced at a site of a neutron interaction may deliver their energy at a rate of 30–80 keV/µm. The amount of energy deposited as the particles traverse a section of tissue is refe
https://en.wikipedia.org/wiki/Superparamagnetic%20relaxometry
Superparamagnetic relaxometry (SPMR) is a technology combining the use of sensitive magnetic sensors and the superparamagnetic properties of magnetite nanoparticles (NP). For NP of a sufficiently small size, on the order of tens of nanometers (nm), the NP exhibit paramagnetic properties, i.e., they have little or no magnetic moment. When they are exposed to a small external magnetic field, on the order of a few millitesla (mT), the NP align with that field and exhibit ferromagnetic properties with large magnetic moments. Following removal of the magnetizing field, the NP slowly become thermalized, decaying with a distinct time constant from the ferromagnetic state back to the paramagnetic state. This time constant depends strongly upon the NP diameter and whether they are unbound or bound to an external surface such as a cell. Measurement of this decaying magnetic field is typically done by superconducting quantum interference detectors (SQUIDs). The magnitude of the field during the decay process determines the magnetic moment of the NPs in the source. A spatial contour map of the field distribution determines the location of the source in three dimensions as well as the magnetic moment. Superparamagnetic nanoparticles for SPMR applications SPMR measurements depend on the characteristics of the nanoparticle (NP) that is used. The NP must have the property that the bulk material is normally ferromagnetic in the bulk. Magnetite (Fe3O4) is one such example as it is ferromagnetic when below its Curie temperature. However, if the NPs are single domain, and of a size less than ~50 nm, they exhibit paramagnetic properties even below the Curie temperature due to the energy of the NP being dominated by thermal activity rather than magnetic energy. If an external magnetic field is applied, the NPs align with that field and have a magnetic moment now characteristic of ferromagnetic behavior. When this external field is removed, the NPs relax back to their paramagnetic stat
https://en.wikipedia.org/wiki/Protein%20toxicity
Protein toxicity is the effect of the buildup of protein metabolic waste compounds, like urea, uric acid, ammonia, and creatinine. Protein toxicity has many causes, including urea cycle disorders, genetic mutations, excessive protein intake, and insufficient kidney function, such as chronic kidney disease and acute kidney injury. Symptoms of protein toxicity include unexplained vomiting and loss of appetite. Untreated protein toxicity can lead to serious complications such as seizures, encephalopathy, further kidney damage, and even death. Definition Protein toxicity occurs when protein metabolic wastes build up in the body. During protein metabolism, nitrogenous wastes such as urea, uric acid, ammonia, and creatinine are produced. These compounds are not utilized by the human body and are usually excreted by the kidney. However, due to conditions such as renal insufficiency, the under-functioning kidney is unable to excrete these metabolic wastes, causing them to accumulate in the body and lead to toxicity. Although there are many causes of protein toxicity, this condition is most prevalent in people with chronic kidney disease who consumes a protein-rich diet, specifically, proteins from animal sources that are rapidly digested and metabolized, causing the release of a high concentration of protein metabolic wastes in the blood stream rapidly. Causes and pathophysiology Protein toxicity has a significant role in neurodegenerative diseases. Whether it is due to high protein intake, pathological disorders lead to the accumulation of protein waste products, the no efficient metabolism of the proteins, or oligomerization of the amino acids from proteolysis. The mechanism by which protein can lead to well known neurodegenerative diseases includes transcriptions dysfunction, propagation, pathological cytoplasmic inclusions, mitochondrial and stress granule dysfunction. Ammonia, one of the waste products of protein metabolism, is very harmful, especially to the brai
https://en.wikipedia.org/wiki/Paratingent%20cone
In mathematics, the paratingent cone and contingent cone were introduced by , and are closely related to tangent cones. Definition Let be a nonempty subset of a real normed vector space . Let some be a point in the closure of . An element is called a tangent (or tangent vector) to at , if there is a sequence of elements and a sequence of positive real numbers such that and The set of all tangents to at is called the contingent cone (or the Bouligand tangent cone) to at . An equivalent definition is given in terms of a distance function and the limit infimum. As before, let be a normed vector space and take some nonempty set . For each , let the distance function to be Then, the contingent cone to at is defined by
https://en.wikipedia.org/wiki/Crypto%20Wars
Attempts, unofficially dubbed the "Crypto Wars", have been made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption by national intelligence agencies, especially the National Security Agency (NSA). Export of cryptography from the United States Cold War era In the early days of the Cold War, the U.S. and its allies developed an elaborate series of export control regulations designed to prevent a wide range of Western technology from falling into the hands of others, particularly the Eastern bloc. All export of technology classed as 'critical' required a license. CoCom was organized to coordinate Western export controls. Two types of technology were protected: technology associated only with weapons of war ("munitions") and dual use technology, which also had commercial applications. In the U.S., dual use technology export was controlled by the Department of Commerce, while munitions were controlled by the State Department. Since in the immediate post WWII period the market for cryptography was almost entirely military, the encryption technology (techniques as well as equipment and, after computers became important, crypto software) was included as a Category XIII item into the United States Munitions List. The multinational control of the export of cryptography on the Western side of the cold war divide was done via the mechanisms of CoCom. By the 1960s, however, financial organizations were beginning to require strong commercial encryption on the rapidly growing field of wired money transfer. The U.S. Government's introduction of the Data Encryption Standard in 1975 meant that commercial uses of high quality encryption would become common, and serious problems of export control began to arise. Generally these were dealt with through case-by-case export license request proceedings brought by computer manufacturers, such as IBM, and by their large corporate customers
https://en.wikipedia.org/wiki/Multirate%20filter%20bank%20and%20multidimensional%20directional%20filter%20banks
This article provides a short survey of the concepts, principles and applications of Multirate Filter Banks and Multidimensional Directional Filter Banks. Multirate systems Linear time-invariant systems typically operate at a single sampling rate, which means that we have the same sampling rate at input and output. In other words, in an LTI system, the sampling rate would not change in the system. Systems that use different sampling rates at different stages are called multirate systems. The multirate system can have different sampling rates based on desire. Also multirate systems can provide different sampling rates without destroying the signal components. In Figure 1, you can see a block diagram of a two channel multirate system. Multirate Filter Bank A multirate filter bank divides a signal into a number of subbands, which can be analysed at different rates corresponding to the bandwidth of the frequency bands. One important fact in multirate filtering is that the signal should be filtered before decimation, otherwise aliasing and frequency folding would occur. Multirate Filter Designs Multirate filter design makes use of properties of decimation and interpolation (or expansion) in the design implementation of the filter. Decimation or downsampling by a factor of essentially means keeping every sample of a given sequence. Decimation, Interpolation, and Modulation Generally speaking, using decimation is very common in multirate filter designs. In the second step, after using decimation, interpolation will be used to restore the sampling rate. The advantage of using decimators and interpolator is that they can reduce the computations when resulting in a lower sampling rate. Decimation by a factor of can be mathematically defined as: or equivalently, . Expansion or upsampling by a factor of M means that we insert M-1 zeros between each sample of a given signal or a sequence. The expansion by a factor of M can be mathematically explained as: or equiva
https://en.wikipedia.org/wiki/Base36
Base36 is a binary-to-text encoding scheme that represents binary data in an ASCII string format by translating it into a radix-36 representation. The choice of 36 is convenient in that the digits can be represented using the Arabic numerals 0–9 and the Latin letters A–Z (the ISO basic Latin alphabet). Each base36 digit needs less than 6 bits of information to be represented. Conversion Signed 32- and 64-bit integers will only hold at most 6 or 13 base-36 digits, respectively (that many base-36 digits can overflow the 32- and 64-bit integers). For example, the 64-bit signed integer maximum value of "9223372036854775807" is "" in base-36. Similarly, the 32-bit signed integer maximum value of "2147483647" is "" in base-36. Standard implementations The C standard library since C89 supports base36 numbers via the strtol and strtoul functions In the Common Lisp standard (ANSI INCITS 226-1994), functions like parse-integer support a radix of 2 to 36. Java SE supports conversion from/to String to different bases from 2 up to 36. For example, and Just like Java, JavaScript also supports conversion from/to String to different bases from 2 up to 36. PHP, like Java, supports conversion from/to String to different bases from 2 up to 36 using the base_convert function, available since PHP 4. Go supports conversion to string to different bases from 2 up to 36 using the built-in strconv.FormatInt(), and strconv.FormatUint() functions, and conversions from string encoded in different bases from 2 up to 36 using the built-in strconv.ParseInt(), and strconv.ParseUint() functions. Python allows conversions of strings from base 2 to base 36. See also Uuencoding
https://en.wikipedia.org/wiki/Anthropology
Anthropology is the scientific study of humanity, concerned with human behavior, human biology, cultures, societies, and linguistics, in both the present and past, including past human species. Social anthropology studies patterns of behavior, while cultural anthropology studies cultural meaning, including norms and values. A portmanteau term sociocultural anthropology is commonly used today. Linguistic anthropology studies how language influences social life. Biological or physical anthropology studies the biological development of humans. Archaeological anthropology, often termed as "anthropology of the past," studies human activity through investigation of physical evidence. It is considered a branch of anthropology in North America and Asia, while in Europe, archaeology is viewed as a discipline in its own right or grouped under other related disciplines, such as history and palaeontology. Etymology The abstract noun anthropology is first attested in reference to history. Its present use first appeared in Renaissance Germany in the works of Magnus Hundt and Otto Casmann. Their Neo-Latin derived from the combining forms of the Greek words ánthrōpos (, "human") and lógos (, "study"). Its adjectival form appeared in the works of Aristotle. It began to be used in English, possibly via French , by the early 18th century. Origin and development of the term Through the 19th century In 1647, the Bartholins, early scholars of the University of Copenhagen, defined as follows: Sporadic use of the term for some of the subject matter occurred subsequently, such as the use by Étienne Serres in 1839 to describe the natural history, or paleontology, of man, based on comparative anatomy, and the creation of a chair in anthropology and ethnography in 1850 at the French National Museum of Natural History by Jean Louis Armand de Quatrefages de Bréau. Various short-lived organizations of anthropologists had already been formed. The Société Ethnologique de Paris, the first to
https://en.wikipedia.org/wiki/Tabtoxin
Tabtoxin, also known as wildfire toxin, is a simple monobactam phytotoxin produced by Pseudomonas syringae. It is the precursor to the antibiotic tabtoxinine β-lactam (TBL). It is produced by: Pseudomonas syringae pv. tabaci, the causal agent of the wildfire of tobacco. P. syringae pv. coronafaciens P. syringae pv. garcae P. syringae BR2, causes a disease of bean (Phaseolus vulgaris) similar to tobacco wildfire. This organism is closely related to P. syringae pv. tabaci but cannot be classified in the pathovar tabaci because it is not pathogenic on tobacco. Tabtoxin is a dipeptide precursor to the biologically active form of TBL, differing by having an extra threonine attached by a peptide bond to the C terminus. Tabtoxin is required by BR2(R) for both chlorosis and lesion formation on bean. All mutations that affected tabtoxin production, whether spontaneous deletion or transposon induced, also affected lesion formation, and in all cases, restoration of tabtoxin production also restored pathogenic symptoms. Other factors may be required for BR2 to be pathogenic on bean, but apparently these are in addition to tabtoxin production. TBL functions as a toxin by inhibition of glutamine synthetase. Self-resistance Tabtoxin resistance protein (TTR) is an enzyme that catalyzes the acetylation of TBL, rendering tabtoxin-producing pathogens tolerant to their own phytotoxins. The structure of an inactivated mutant of TTR is solved with its natural cofactor acetyl-CoA to 1.55 Å resolution. The binary complex forms a characteristic “V” shape for substrate binding and contains the four motifs conserved in the GCN5-related N-acetyltransferase (GNAT) superfamily, which also includes the histone acetyltransferases (HATs). There are reports that TTR possesses HAT activity and suggest an evolutionary relationship between TTR and other GNAT members. The production of tabtoxin itself is also part of the self-resistance strategy. These pathogens produce TBL before tabtoxin is pr
https://en.wikipedia.org/wiki/Square%20root%20of%205
The square root of 5 is the positive real number that, when multiplied by itself, gives the prime number 5. It is more precisely called the principal square root of 5, to distinguish it from the negative number with the same property. This number appears in the fractional expression for the golden ratio. It can be denoted in surd form as: It is an irrational algebraic number. The first sixty significant digits of its decimal expansion are: . which can be rounded down to 2.236 to within 99.99% accuracy. The approximation (≈ 2.23611) for the square root of five can be used. Despite having a denominator of only 72, it differs from the correct value by less than (approx. ). As of January 2022, its numerical value in decimal has been computed to at least 2,250,000,000,000 digits. Rational approximations The square root of 5 can be expressed as the continued fraction The successive partial evaluations of the continued fraction, which are called its convergents, approach : Their numerators are 2, 9, 38, 161, … , and their denominators are 1, 4, 17, 72, … . Each of these is a best rational approximation of ; in other words, it is closer to than any rational number with a smaller denominator. The convergents, expressed as , satisfy alternately the Pell's equations When is approximated with the Babylonian method, starting with and using , the th approximant is equal to the th convergent of the continued fraction: The Babylonian method is equivalent to Newton's method for root finding applied to the polynomial . The Newton's method update, , is equal to when . The method therefore converges quadratically. Relation to the golden ratio and Fibonacci numbers The golden ratio is the arithmetic mean of 1 and . The algebraic relationship between , the golden ratio and the conjugate of the golden ratio () is expressed in the following formulae: (See the section below for their geometrical interpretation as decompositions of a rectangle.) then naturall
https://en.wikipedia.org/wiki/Continuous%20automaton
A continuous automaton can be described as a cellular automaton extended so the valid states a cell can take are not just discrete (for example, the states consist of integers between 0 and 3), but continuous, for example, the real number range [0,1]. The cells however remain discretely separated from each other. One example is called computational verb cellular network (CVCN), of which the states of cells are in the region of [0,1]. Such automata can be used to model certain physical reactions more closely, such as diffusion. One such diffusion model could conceivably consist of a transition function based on the average values of the neighbourhood of the cell. Many implementations of Finite Element Analysis can be thought of as continuous automata, though this degree of abstraction away from the physics of the problem is probably inappropriate. Continuous spatial automata resemble continuous automata in having continuous values, but they also have a continuous set of locations rather than restricting the values to a discrete grid of cells. See also Continuous spatial automaton Cellular automaton Reference notes Cellular automata
https://en.wikipedia.org/wiki/HostDime
HostDime Global Corp is a global data center infrastructure provider offering an array of cloud products including physical bare metal servers, virtualized cloud servers, and colocation services. HostDime's data centers are carrier-neutral facilities in global edge locations. HostDime owns and operates infrastructure and networks in eight countries: the United States, Mexico, Brazil, United Kingdom, Netherlands, India, Colombia, and Hong Kong. Their flagship facility is in Orlando, Florida. History HostDime Global Corp was founded by Manny Vivar and opened its first data center in downtown Orlando, Florida in December 2003 and moved its servers from a New Jersey Colocation facility. The company was bootstrapped and funded with under $50 by Vivar. HostDime's first international location was in João Pessoa, Brazil in 2006. Locations in Mexico, Colombia, and the United Kingdom opened in 2008, with India in 2010, and Netherlands and Hong Kong in 2012. In November 2012, a report by Citizen Lab found that HostDime was among a handful of American companies selling hosting services to the Syrian government in direct opposition of an executive order from President Barack Obama. HostDime stated that the website in question, Syria's Ministry of Religious Affairs, was hosted by a customer who leased a server in their data center. Immediate steps were taken to sever ties from Syria and that matter was quickly resolved. In 2013, HostDime built their first data center build of its own was a 10,000 square foot facility in Guadalajara, Mexico. In 2016, HostDime purchased a 5-acre land parcel fronting I-4 in Orlando metro area, Town of Eatonville. The seven-story building would combine the data company's headquarters and its data center in one structure. On July 14, 2017, HostDime officially opened their data center in João Pessoa, Brazil. The facility was only the second data center in northeast Brazil. The $15 million data center officially became Tier III Design Certified b
https://en.wikipedia.org/wiki/Leu-enkephalin
Leu-enkephalin is an endogenous opioid peptide neurotransmitter with the amino acid sequence Tyr-Gly-Gly-Phe-Leu that is found naturally in the brains of many animals, including humans. It is one of the two forms of enkephalin; the other is met-enkephalin. The tyrosine residue at position 1 is thought to be analogous to the 3-hydroxyl group on morphine. Leu-enkephalin has agonistic actions at both the μ- and δ-opioid receptors, with significantly greater preference for the latter. It has little to no effect on the κ-opioid receptor. See also Met-enkephalin
https://en.wikipedia.org/wiki/Visual%20appearance
The visual appearance of objects is given by the way in which they reflect and transmit light. The color of objects is determined by the parts of the spectrum of (incident white) light that are reflected or transmitted without being absorbed. Additional appearance attributes are based on the directional distribution of reflected (BRDF) or transmitted light (BTDF) described by attributes like glossy, shiny versus dull, matte, clear, turbid, distinct, etc. Since "visual appearance" is a general concept that includes also various other visual phenomena, such as color, visual texture, visual perception of shape, size, etc., the specific aspects related to how humans see different spatial distributions of light (absorbed, transmitted and reflected, either regularly or diffusely) have been given the name cesia. It marks a difference (but also a relationship) with color, which could be defined as the sensation arising from different spectral compositions or distributions of light. Appearance of reflective objects The appearance of reflecting objects is determined by the way the surface reflects incident light. The reflective properties of the surface can be characterized by a closer look at the (micro)-topography of that surface. Structures on the surface and the texture of the surface are determined by typical dimensions between some 10 mm and 0.1 mm (the detection limit of the human eye is at ~0.07 mm). Smaller structures and features of the surface cannot be directly detected by the unaided eye, but their effect becomes apparent in objects or images reflected in the surface. Structures at and below 0.1 mm reduce the distinctness of image (DOI), structures in the range of 0.01 mm induce haze and even smaller structures affect the gloss of the surface. Definitiondiffusion, scattering: process by which the spatial distribution of a beam of radiation is changed in many directions when it is deviated by a surface or by a medium, without change of frequency of its monoch