source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/List%20of%20unproven%20methods%20against%20COVID-19
There are many fake or unproven medical products and methods that claim to diagnose, prevent or cure COVID-19. Fake medicines sold for COVID-19 may not contain the ingredients they claim to contain, and may even contain harmful ingredients. In March 2020, the World Health Organization (WHO) released a statement recommending against taking any medicines in an attempt to treat or cure COVID-19, although research on potential treatment was underway, including the Solidarity trial spearheaded by WHO. The WHO requested member countries to immediately notify them if any fake medicines or other falsified products were discovered. There are also many claims that existing products help against COVID-19, which are spread through rumors online rather than conventional advertising. Anxiety about COVID-19 makes people more willing to "try anything" that might give them a sense of control of the situation, making them easy targets for scams. Many false claims about measures against COVID-19 have circulated widely on social media, but some have been circulated by text, on YouTube, and even in some mainstream media. Officials advised that before forwarding information, people should think carefully and look it up. Misinformation messages may use scare tactics or other high-pressure rhetoric, claim to have all the facts while others do not, and jump to unusual conclusions. The public was advised to check the information source's source, looking on official websites; some messages have falsely claimed to be from official bodies like UNICEF and government agencies. Arthur Caplan, head of medical ethics at New York University's medical school, had simpler advice for COVID-19 products: "Anything online, ignore it". Products which claim to prevent COVID-19 risk giving dangerous false confidence and increasing infection rates. Going out to buy such products may encourage people to break stay-at-home orders, reducing social distancing. Some of the pretend treatments are also poisonous; h
https://en.wikipedia.org/wiki/Nicholas%20Young%20%28mathematician%29
Nicholas John Young is a British mathematician working in operator theory, functional analysis and several complex variables. He is a research professor at the University of Leeds. Much of his work has been about the interaction of operator theory and function theory. Publications Young has written more than a hundred papers, over 30 of them in collaboration with Jim Agler. He is the author of the book An Introduction to Hilbert Space. His Ph.D. adviser was Vlastimil Pták, and he has had 5 Ph.D. students.
https://en.wikipedia.org/wiki/Alloimmunity
Alloimmunity (sometimes called isoimmunity) is an immune response to nonself antigens from members of the same species, which are called alloantigens or isoantigens. Two major types of alloantigens are blood group antigens and histocompatibility antigens. In alloimmunity, the body creates antibodies (called alloantibodies) against the alloantigens, attacking transfused blood, allotransplanted tissue, and even the fetus in some cases. Alloimmune (isoimmune) response results in graft rejection, which is manifested as deterioration or complete loss of graft function. In contrast, autoimmunity is an immune response to the self's own antigens. (The allo- prefix means "other", whereas the auto- prefix means "self".) Alloimmunization (isoimmunization) is the process of becoming alloimmune, that is, developing the relevant antibodies for the first time. Alloimmunity is caused by the difference between products of highly polymorphic genes, primarily genes of the major histocompatibility complex, of the donor and graft recipient. These products are recognized by T-lymphocytes and other mononuclear leukocytes which infiltrate the graft and damage it. Types of the rejection Transfusion reaction Blood transfusion can result in alloantibodies reacting towards the transfused cells, resulting in a transfusion reaction. Even with standard blood compatibility testing, there is a risk of reaction against human blood group systems other than ABO and Rh. Hemolytic disease of the fetus and newborn Hemolytic disease of the fetus and newborn is similar to a transfusion reaction in that the mother's antibodies cannot tolerate the fetus's antigens, which happens when the immune tolerance of pregnancy is impaired. In many instances the maternal immune system attacks the fetal blood cells, resulting in fetal anemia. HDN ranges from mild to severe. Severe cases require intrauterine transfusions or early delivery to survive, while mild cases may only require phototherapy at birth. Transplan
https://en.wikipedia.org/wiki/Somatomedin%20receptor
A somatomedin receptor is a receptor which binds the somatomedins (IGFs). Somatomedin is abbreviated to IGF, in reference to insulin-like growth factor. There are two types: Insulin-like growth factor 1 receptor (IGF-1R) Insulin-like growth factor 2 receptor (IGF-2R) External links Receptors
https://en.wikipedia.org/wiki/Karen%20Ashe
Karen K. Hsiao Ashe is a professor at the Department of Neurology and Neuroscience at the University of Minnesota (UMN) Medical School, where she holds the Edmund Wallace and Anne Marie Tulloch Chairs in Neurology and Neuroscience. She is the founding director of the N. Bud Grossman Center for Memory Research and Care, and her specific research interest is memory loss resulting from Alzheimer's disease and related dementias. Her research has included the development of an animal model of Alzheimer's. In July 2022, concerns were raised that certain images in a 2006 Nature paper co-authored by Ashe's postdoctoral student Sylvain Lesné were manipulated. In May of 2023, the Star Tribune reported that Ashe was using new techniques to re-do the work reported in the 2006 Nature study, and that she stated "it's my responsibility to establish the truth of what we've published". Personal life and education Ashe's parents came to the United States from China to pursue PhDs; her father, C.C. Hsiao, taught aerospace engineering at the University of Minnesota, and her mother, Joyce, was a biochemist. She has three younger siblings. Attending the St. Paul Academy and Summit School in the 1970s, Ashe's interest in the brain began in primary school, where she excelled in math, along with music. She obtained her undergraduate degree at Harvard University in 1975 in chemistry and physics, starting as a sophomore at the age of 17. She went on to earn her PhD in brain and cognitive sciences at MIT in 1981 and her MD from Harvard in 1982. Ashe's husband, James is a neurologist; she has three children (two sons and a daughter). Professional life Early career Between 1986 and 1989, she was a post-doctoral fellow at the University of California, San Francisco where she researched prion diseases and published with Stanley Prusiner. In 1989, she was the first author on a  paper published in Nature, entitled "Linkage of a prion protein missense variant to Gerstmann‑Sträussler syndrome
https://en.wikipedia.org/wiki/Process%20isolation
Process isolation is a set of different hardware and software technologies designed to protect each process from other processes on the operating system. It does so by preventing process A from writing to process B. Process isolation can be implemented with virtual address space, where process A's address space is different from process B's address space – preventing A from writing onto B. Security is easier to enforce by disallowing inter-process memory access, in contrast with less secure architectures such as DOS in which any process can write to any memory in any other process. Limited inter-process communication In a system with process isolation, limited (controlled) interaction between processes may still be allowed over inter-process communication (IPC) channels such as shared memory, local sockets or Internet sockets. In this scheme, all of the process' memory is isolated from other processes except where the process is allowing input from collaborating processes. System policies may disallow IPC in some circumstances. For example, in mandatory access control systems, subjects with different sensitivity levels may not be allowed to communicate with each other. The security implications in these circumstances are broad and span applications in network key encryption systematics as well as distributed caching algorithms. Interface-defined protocols such as basic cloud access architecture and network sharing are similarly affected. Operating systems Notable operating systems that support process isolation: Unix, Linux, OS X VMS Microsoft Windows from Windows NT 3.1 Web browsers Internet Explorer 4 used process isolation in order to allow separate windowed instances of the browser their own processes; however, at the height of the browser wars, this was dropped in subsequent versions to compete with Netscape Navigator (which sought to concentrate upon one process for the entire Internet suite). This idea of process-per-instance would not be revisited
https://en.wikipedia.org/wiki/D-space
In mathematics, a topological space is a D-space if for any family of open sets such that for all points , there is a closed discrete subset of the space such that . History The notion of D-spaces was introduced by Eric Karel van Douwen and E.A. Michael. It first appeared in a 1979 paper by van Douwen and Washek Frantisek Pfeffer in the Pacific Journal of Mathematics. Whether every Lindelöf and regular topological space is a D-space is known as the D-space problem. This problem is among twenty of the most important problems of set theoretic topology. Properties Every Menger space is a D-space. A subspace of a topological linearly ordered space is a D-space iff it is a paracompact space.
https://en.wikipedia.org/wiki/Escherichia%20coli%20O104%3AH21
Escherichia coli O104:H21 is a rare serotype of Escherichia coli, a species of bacteria that lives in the lower intestines of mammals. Although there are many serotypes of E. coli, when in animals, there are benefits or do not cause disease. Some serotypes of E. coli have been recognized as pathogenic to humans, e.g. E. coli O157:H7, E. coli O121 and E. coli O104:H21. History Escherichia coli O104:H21 was discovered in 1982, when it caused an outbreak of severe bloody diarrhea. It had infected hamburgers, and those affected had eaten these hamburgers not fully cooked. An outbreak of E. coli responsible for at least 22 deaths in Northern Europe in May 2011 was reported to be caused by another O104 strain, Escherichia coli O104:H4. Effects Escherichia coli O104:H21 can cause outbreak of infection similar to that caused by E. coli O157:H7, the most common shiga-like toxin-producing E. coli (SLTEC). SLTECs are the most well-known causes of gastrointestinal illness and diarrhea. Treatment The body usually rids itself of harmful E. coli O104:H21 on its own within 5 to 10 days. Antibiotics should not be used, and neither should antidiarrheal agents such as loperamide. See also Escherichia coli E. coli O104:H4 E. coli O157:H7
https://en.wikipedia.org/wiki/Y%284260%29
The Y(4260) is an anomalous particle with an energy of 4260 MeV which does not appear to fit into the quark model. It was discovered by the BaBar experiment at Stanford University for the Department of Energy in California and later confirmed by several other experimental collaborations. It being a Charmonium state is unlikely because the Y(4260) is heavier than the threshold for production of two D mesons, yet sits, surprisingly in a dip in the production rate for pairs of D's. It is a possibility that it is a hybrid—a predicted but not-yet-seen type of particle, where a gluon is actually a permanent part of the makeup of the particle, instead of just an ephemeral messenger keeping the quarks bound together. See also Meson XYZ particle X(3872) Z(4430) Zc(3900)
https://en.wikipedia.org/wiki/Pancreatic%20branches%20of%20splenic%20artery
The pancreatic branches or pancreatic arteries are numerous small vessels derived from the splenic artery as it runs behind the upper border of the pancreas, supplying its body and tail. One of these, larger than the rest, is sometimes given off near the tail of the pancreas; it runs from left to right near the posterior surface of the gland, following the course of the pancreatic duct, and is called the greater pancreatic artery. These vessels anastomose with the pancreatic branches of the superior and inferior pancreaticoduodenal artery that are given off by the gastroduodenal artery and superior mesenteric artery respectively. Branches There are four main pancreatic branches of the splenic artery: Greater pancreatic artery Dorsal pancreatic artery Inferior pancreatic artery (aka transverse pancreatic artery) Caudal pancreatic artery
https://en.wikipedia.org/wiki/Symmetric%20relation
A symmetric relation is a type of binary relation. An example is the relation "is equal to", because if a = b is true then b = a is also true. Formally, a binary relation R over a set X is symmetric if: where the notation means that . If RT represents the converse of R, then R is symmetric if and only if R = RT. Symmetry, along with reflexivity and transitivity, are the three defining properties of an equivalence relation. Examples In mathematics "is equal to" (equality) (whereas "is less than" is not symmetric) "is comparable to", for elements of a partially ordered set "... and ... are odd": Outside mathematics "is married to" (in most legal systems) "is a fully biological sibling of" "is a homophone of" "is co-worker of" "is teammate of" Relationship to asymmetric and antisymmetric relations By definition, a nonempty relation cannot be both symmetric and asymmetric (where if a is related to b, then b cannot be related to a (in the same way)). However, a relation can be neither symmetric nor asymmetric, which is the case for "is less than or equal to" and "preys on"). Symmetric and antisymmetric (where the only way a can be related to b and b be related to a is if a = b) are actually independent of each other, as these examples show. Properties A symmetric and transitive relation is always quasireflexive. A symmetric, transitive, and reflexive relation is called an equivalence relation. One way to count the symmetric relations on n elements, that in their binary matrix representation the upper right triangle determines the relation fully, and it can be arbitrary given, thus there are as many symmetric relations as nxn binary upper triangle matrices,
https://en.wikipedia.org/wiki/SHIFTCOR
SHIFTCOR (Shift Correction) is a freely available web server as well as a stand-alone computer program for protein chemical shift re-referencing. Chemical shift referencing is a particularly widespread problem in biomolecular NMR with up to 25% of existing NMR chemical shift assignments being improperly referenced. Some of these referencing problems can lead to systematic errors of between 1.0 to 2.5 ppm (especially in 13C and 15N chemical shifts). Errors of this magnitude can play havoc with any attempt to compare assignments between proteins or to structurally interpret chemical shifts. Identifying which proteins are mis-assigned or improperly referenced can be challenging, as can correcting the errors once they are found. The SHIFTCOR program was designed to assist with identifying and fixing these chemical shift referencing problems. Specifically it compares, identifies, corrects and re-references 1H, 13C and 15N backbone chemical shifts of peptides and proteins by comparing the observed chemical shifts with the predicted chemical shifts derived from the 3D structure (using PDB coordinates) of the protein(s) of interest [1]. The predicted chemical shifts are calculated using the ShiftX program. The SHIFTCOR program was originally used to construct a database of properly re-referenced protein chemical shift assignments called RefDB. RefDB is a web-accessible database of more than 2000 correctly referenced protein chemical shift assignments. While originally available as a stand-alone program only, SHIFTCOR has since been released for general use as a web server. See also Chemical Shift NMR Protein Protein structure database Protein Chemical Shift Re-Referencing Protein secondary structure Protein Chemical Shift Prediction Chemical shift index Protein NMR
https://en.wikipedia.org/wiki/Birth%20defect
A birth defect, also known as a congenital disorder, is an abnormal condition that is present at birth regardless of its cause. Birth defects may result in disabilities that may be physical, intellectual, or developmental. The disabilities can range from mild to severe. Birth defects are divided into two main types: structural disorders in which problems are seen with the shape of a body part and functional disorders in which problems exist with how a body part works. Functional disorders include metabolic and degenerative disorders. Some birth defects include both structural and functional disorders. Birth defects may result from genetic or chromosomal disorders, exposure to certain medications or chemicals, or certain infections during pregnancy. Risk factors include folate deficiency, drinking alcohol or smoking during pregnancy, poorly controlled diabetes, and a mother over the age of 35 years old. Many are believed to involve multiple factors. Birth defects may be visible at birth or diagnosed by screening tests. A number of defects can be detected before birth by different prenatal tests. Treatment varies depending on the defect in question. This may include therapy, medication, surgery, or assistive technology. Birth defects affected about 96 million people . In the United States, they occur in about 3% of newborns. They resulted in about 628,000 deaths in 2015, down from 751,000 in 1990. The types with the greatest numbers of deaths are congenital heart disease (303,000), followed by neural tube defects (65,000). Classification Much of the language used for describing congenital conditions antedates genome mapping, and structural conditions are often considered separately from other congenital conditions. Many metabolic conditions are now known to have subtle structural expression, and structural conditions often have genetic links. Still, congenital conditions are often classified on a structural basis, organized when possible by primary organ system af
https://en.wikipedia.org/wiki/Parallax%20in%20astronomy
The most important fundamental distance measurements in astronomy come from trigonometric parallax, as applied in the stellar parallax method. As the Earth orbits the Sun, the position of nearby stars will appear to shift slightly against the more distant background. These shifts are angles in an isosceles triangle, with 2 AU (the distance between the extreme positions of Earth's orbit around the Sun) making the base leg of the triangle and the distance to the star being the long equal-length legs. The amount of shift is quite small, even for the nearest stars, measuring 1 arcsecond for an object at 1 parsec's distance (3.26 light-years), and thereafter decreasing in angular amount as the distance increases. Astronomers usually express distances in units of parsecs (parallax arcseconds); light-years are used in popular media. Because parallax becomes smaller for a greater stellar distance, useful distances can be measured only for stars which are near enough to have a parallax larger than a few times the precision of the measurement. In the 1990s, for example, the Hipparcos mission obtained parallaxes for over a hundred thousand stars with a precision of about a milliarcsecond, providing useful distances for stars out to a few hundred parsecs. The Hubble Space Telescope's Wide Field Camera 3 has the potential to provide a precision of 20 to 40 microarcseconds, enabling reliable distance measurements up to for small numbers of stars. The Gaia space mission provided similarly accurate distances to most stars brighter than 15th magnitude. Distances can be measured within 10% as far as the Galactic Center, about 30,000 light years away. Stars have a velocity relative to the Sun that causes proper motion (transverse across the sky) and radial velocity (motion toward or away from the Sun). The former is determined by plotting the changing position of the stars over many years, while the latter comes from measuring the Doppler shift of the star's spectrum caused by moti
https://en.wikipedia.org/wiki/The%20Ancient%20Tradition%20of%20Geometric%20Problems
The Ancient Tradition of Geometric Problems is a book on ancient Greek mathematics, focusing on three problems now known to be impossible if one uses only the straightedge and compass constructions favored by the Greek mathematicians: squaring the circle, doubling the cube, and trisecting the angle. It was written by Wilbur Knorr (1945–1997), a historian of mathematics, and published in 1986 by Birkhäuser. Dover Publications reprinted it in 1993. Topics The Ancient Tradition of Geometric Problems studies the three classical problems of circle-squaring, cube-doubling, and angle trisection throughout the history of Greek mathematics, also considering several other problems studied by the Greeks in which a geometric object with certain properties is to be constructed, in many cases through transformations to other construction problems. The study runs from Plato and the story of the Delian oracle to the second century BC, when Archimedes and Apollonius of Perga flourished; Knorr suggests that the decline in Greek geometry after that time represented a shift in interest to other topics in mathematics rather than a decline in mathematics as a whole. Unlike the earlier work on this material by Thomas Heath, Knorr sticks to the source material as it is, reconstructing the motivation and lines of reasoning followed by the Greek mathematicians and their connections to each other, rather than adding justifications for the correctness of the constructions based on modern mathematical techniques. In modern times, the impossibility of solving the three classical problems by straightedge and compass, finally proven in the 19th century, has often been viewed as analogous to the foundational crisis of mathematics of the early 20th century, in which David Hilbert's program of reducing mathematics to a system of axioms and calculational rules struggled against logical inconsistencies in its axiom systems, intuitionist rejection of formalism and dualism, and Gödel's incompleteness t
https://en.wikipedia.org/wiki/Teclozan
Teclozan is an antiprotozoal agent. It is a dichloroacetamide.
https://en.wikipedia.org/wiki/AudioLock
AudioLock is a music-specific anti-piracy service founded in 2010 by former DJ and electronic music producer Ben Rush. AudioLock specialises in the automated removal of infringing music content, using DMCA notices, across search engines Google, Yahoo, Bing and Yandex as well as cyberlockers, torrent sites, Usenet, SoundCloud, YouTube, Dailymotion, file search engines, VK, Facebook, Twitter and other social media sites. Digital watermarking is also used for the sending of promotional copies of the music in digital form to prevent pre-release leaks and detect their origin if distributed. Partnerships and memberships AudioLock is a member of the American Association of Independent Music (A2IM), the Association of Independent Music (AIM) and the Association For Electronic Music (AFEM). It is also partnered with numerous digital service providers, Trade association and distributors including; Traxsource, Believe Digital, Music Publishers Association (MPA) and !K7 Education and Public Speaking AudioLock offer education on the subject of music anti-piracy to the public and the wider music industry through its public speaking engagements and ambassador program. On the BBC In July 2016 AudioLock CEO Ben Rush was interviewed by BBC Radio 1 for its Newsbeat program to provide specialist insight into pirate download stores and their effect on dance music. Also interviewed were Mark Lawrence from the AFEM and Stuart Knight, Director of Toolroom Records. Public appearances AudioLock have been invited to talk about music anti-piracy an numerous notable industry events. These include: XPONorth (Inverness, Scotland June 2016) Brighton Music Conference (Brighton, England 2016) Import.io Data Summit (London, England 2014) Amsterdam Dance Event (Amsterdam 2015) International Music Summit (Ibiza 2015 & 2017) BPM Pro (Birmingham, England 2016) In 2013 AudioLock in conjunction with the Association of Independent Music (AIM) held its first Music Piracy Prevention Forum in Lon
https://en.wikipedia.org/wiki/Reset%20vector
In computing, the reset vector is the default location a central processing unit will go to find the first instruction it will execute after a reset. The reset vector is a pointer or address, where the CPU should always begin as soon as it is able to execute instructions. The address is in a section of non-volatile memory initialized to contain instructions to start the operation of the CPU, as the first step in the process of booting the system containing the CPU. Examples Below is a list of typically used addresses by different microprocessors: x86 family (Intel) The reset vector for the Intel 8086 processor is at physical address FFFF0h (16 bytes below 1 MB). The value of the CS register at reset is FFFFh and the value of the IP register at reset is 0000h to form the segmented address FFFFh:0000h, which maps to physical address FFFF0h. The reset vector for the Intel 80286 processor is at physical address FFFFF0h (16 bytes below 16 MB). The value of the CS register at reset is F000h with the descriptor base set to FF0000h and the value of the IP register at reset is FFF0h to form the segmented address FF000h:FFF0h, which maps to physical address FFFFF0h in real mode. This was changed to allow sufficient space to switch to protected mode without modifying the CS register. The reset vector for the Intel 80386 and later x86 processors is physical address FFFFFFF0h (16 bytes below 4 GB). The value of the selector portion of the CS register at reset is F000h, the value of the base portion of the CS register is FFFF0000h, and the value of the IP register at reset is FFF0h to form the segmented address FFFF0000h:FFF0h, which maps to the physical address FFFFFFF0h in real mode. Others The reset vector for ARM processors is address 0x0 or 0xFFFF0000. During normal execution RAM is re-mapped to this location to improve performance, compared to the original ROM-based vector table. The reset vector for MIPS32 processors is at virtual address 0xBFC00000, which is l
https://en.wikipedia.org/wiki/Ventricular%20hypertrophy
Ventricular hypertrophy (VH) is thickening of the walls of a ventricle (lower chamber) of the heart. Although left ventricular hypertrophy (LVH) is more common, right ventricular hypertrophy (RVH), as well as concurrent hypertrophy of both ventricles can also occur. Ventricular hypertrophy can result from a variety of conditions, both adaptive and maladaptive. For example, it occurs in what is regarded as a physiologic, adaptive process in pregnancy in response to increased blood volume; but can also occur as a consequence of ventricular remodeling following a heart attack. Importantly, pathologic and physiologic remodeling engage different cellular pathways in the heart and result in different gross cardiac phenotypes. Presentation In individuals with eccentric hypertrophy there may be little or no indication that hypertrophy has occurred as it is generally a healthy response to increased demands on the heart. Conversely, concentric hypertrophy can make itself known in a variety of ways. Most commonly, chest pain, either with or without exertion is present, along with shortness of breath with exertion, general fatigue, syncope, and palpitations. Overt signs of heart failure, such as edema, or shortness of breath without exertion are uncommon. Physiology The ventricles are the chambers in the heart responsible for pumping blood either to the lungs (right ventricle) or to the rest of the body (left ventricle). Ventricular hypertrophy may be divided into two categories: concentric hypertrophy and eccentric hypertrophy. These adaptations are related to how the cardiomyocyte contractile units, called sarcomeres, respond to stressors such as exercise or pathology. Concentric hypertrophy is a result of pressure overload on the heart, resulting in parallel sarcomerogenesis (addition of sarcomere units parallel to existing units). Eccentric hypertrophy is related to volume overload and leads to the addition of sarcomeres in series. Concentric hypertrophy results from
https://en.wikipedia.org/wiki/DEC%207000%20AXP%20and%20DEC%2010000%20AXP
The DEC 7000 AXP and DEC 10000 AXP are a series of high-end multiprocessor server computers developed and manufactured by Digital Equipment Corporation, introduced on 10 November 1992 (although the DEC 10000 AXP was not available until the following year). These systems formed part of the first generation of systems based on the 64-bit Alpha AXP architecture and at the time of introduction, ran Digital's OpenVMS AXP operating system, with DEC OSF/1 AXP available in March 1993. They were designed in parallel with the VAX 7000 and VAX 10000 minicomputers, and are identical except for the processor module(s) and supported bus interfaces. A field upgrade from a VAX 7000/10000 to a DEC 7000/10000 AXP was possible by means of swapping the processor boards. The DEC 7000/10000 AXP were intended to supersede the VAX 6000 series, and themselves were succeeded in 1995 by the AlphaServer 8200 and 8400 (TurboLaser) enterprise servers. Models The DEC 7000 AXP was positioned as a data center system, whereas the DEC 10000 AXP was positioned as a "mainframe" system. From a hardware point of view, the DEC 10000 AXP was essentially a larger configuration of the DEC 7000 AXP. Both shared the same System Cabinet, but the DEC 10000 AXP was configured as standard with one Expander Cabinet housing storage devices, and one Battery Cabinet housing an uninterruptible power supply. These were optional for a DEC 7000 AXP system. There are two models of the DEC 7000 AXP: Model 6x0, code-named Laser/Ruby: 182 MHz DECchip 21064 (EV4) processor(s) and when introduced, the base price was US$168,000. In October 1993, it was available with 200 MHz DECchip 21064 (EV4S) processor(s) (code-named Laser/Ruby+) and was priced from US$126,300. It was discontinued on 10 June 1995 and on 31 December 1995 for Europe. Upgrades were offered for an additional year after discontinuation. Model 7x0, code-named Laser/Ruby45: 275 MHz DECchip 21064A (EV45) processor(s). This model was introduced on 3 November 1
https://en.wikipedia.org/wiki/Nannochloropsis%20and%20biofuels
Nannochloropsis is a genus of alga within the heterokont line of eukaryotes, that is being investigated for biofuel production. One marine Nannochloropsis species has been shown to be suitable for algal biofuel production due to its ease of growth and high oil content (28.7% of dry weight), mainly unsaturated fatty acids and a significant percentage of palmitic acid. It also contains enough unsaturated fatty acid linolenic acid and polyunsaturated acid (>4 double bonds) for a quality biodiesel. Conditions that lead to oil content increase Oil productivity is defined as the oil produced by the algae per day per liter of culture, which is dependent on both growth rate and lipid content. Growth rate indicates how rapid the algae grow and lipid content indicates the percentage of dry weight that is lipid. In most of the studies, these two factors are investigated independently. Under normal growth conditions, Nannochloropsis does not reach its optimal oil production. Several conditions, including stress conditions, have been reported to increase oil content in Nannochloropsis. Nitrogen deprivation Nitrogen is essential for algal growth. Within a cell, nitrogen is involved in synthesizing amino acids, nucleic acids, chlorophyll, and other nitrogen-containing organic compounds. In a study in which 30 different microalgal strains were screened, one Nannochloropsis strain was shown to obtain 60% lipid content after nitrogen deprivation, up from 30% under normal growth conditions. This strain was selected for further scale-up experiments in a photobioreactor under natural sunlight. Lipid productivity increased to 204 milligram per liter per day(mg/L/day) under nitrogen starvation conditions, almost twice as much as the 117 mg/L/day under sufficient nutrition conditions. Based on these results, a two-phase cultivation process, with a nutrient sufficient phase to rapidly increase number of cells prior to a nitrogen deprived phase to boost lipid content, was found to produce
https://en.wikipedia.org/wiki/Quotient%20space%20%28topology%29
In topology and related areas of mathematics, the quotient space of a topological space under a given equivalence relation is a new topological space constructed by endowing the quotient set of the original topological space with the quotient topology, that is, with the finest topology that makes continuous the canonical projection map (the function that maps points to their equivalence classes). In other words, a subset of a quotient space is open if and only if its preimage under the canonical projection map is open in the original topological space. Intuitively speaking, the points of each equivalence class are or "glued together" for forming a new topological space. For example, identifying the points of a sphere that belong to the same diameter produces the projective plane as a quotient space. Definition Let be a topological space, and let be an equivalence relation on The quotient set is the set of equivalence classes of elements of The equivalence class of is denoted The construction of defines a canonical surjection As discussed below, is a quotient mapping, commonly called the canonical quotient map, or canonical projection map, associated to The quotient space under is the set equipped with the quotient topology, whose open sets are those subsets whose preimage is open. In other words, is open in the quotient topology on if and only if is open in Similarly, a subset is closed if and only if is closed in The quotient topology is the final topology on the quotient set, with respect to the map Quotient map A map is a quotient map (sometimes called an identification map) if it is surjective and is equipped with the final topology induced by The latter condition admits two more-elementary phrasings: a subset is open (closed) if and only if is open (resp. closed). Every quotient map is continuous but not every continuous map is a quotient map. Saturated sets A subset of is called saturated (with respect to ) if i
https://en.wikipedia.org/wiki/Solution%20in%20radicals
A solution in radicals or algebraic solution is a closed-form expression, and more specifically a closed-form algebraic expression, that is the solution of a polynomial equation, and relies only on addition, subtraction, multiplication, division, raising to integer powers, and the extraction of th roots (square roots, cube roots, and other integer roots). A well-known example is the solution of the quadratic equation There exist more complicated algebraic solutions for cubic equations and quartic equations. The Abel–Ruffini theorem, and, more generally Galois theory, state that some quintic equations, such as do not have any algebraic solution. The same is true for every higher degree. However, for any degree there are some polynomial equations that have algebraic solutions; for example, the equation can be solved as The eight other solutions are nonreal complex numbers, which are also algebraic and have the form where is a fifth root of unity, which can be expressed with two nested square roots. See also for various other examples in degree 5. Évariste Galois introduced a criterion allowing one to decide which equations are solvable in radicals. See Radical extension for the precise formulation of his result. Algebraic solutions form a subset of closed-form expressions, because the latter permit transcendental functions (non-algebraic functions) such as the exponential function, the logarithmic function, and the trigonometric functions and their inverses. See also Solvable quintics Solvable sextics Solvable septics
https://en.wikipedia.org/wiki/All-interval%20tetrachord
An all-interval tetrachord is a tetrachord, a collection of four pitch classes, containing all six interval classes. There are only two possible all-interval tetrachords (to within inversion), when expressed in prime form. In set theory notation, these are [0,1,4,6] (4-Z15) and [0,1,3,7] (4-Z29). Their inversions are [0,2,5,6] (4-Z15b) and [0,4,6,7] (4-Z29b). The interval vector for all all-interval tetrachords is [1,1,1,1,1,1]. Table of interval classes as relating to all-interval tetrachords In the examples below, the tetrachords [0,1,4,6] and [0,1,3,7] are built on E. Use in modern music The unique qualities of the all-interval tetrachord have made it very popular in 20th-century music. Composers including Elliott Carter (First String Quartet) and George Perle used it extensively. See also All-interval twelve-tone row All-trichord hexachord Perfect ruler Serialism Trichord
https://en.wikipedia.org/wiki/Application%20directory
An application directory is a grouping of software code, help files and resources that together comprise a complete software package but are presented to the user as a single object. They are currently used in RISC OS and the ROX Desktop, and also form the basis of the Zero Install application distribution system. Similar technology includes VMware ThinApp, and the NEXTSTEP/GNUstep/Mac OS X concept of application bundles. Their heritage lies in the system for automatically launching software stored on floppy disk on Acorn's earlier 8-bit micros such as the BBC Micro (the !BOOT file). Bundling various files in this manner allows tools for manipulating applications to be replaced by tools for manipulating the file system. Applications can often be "installed" simply by dragging them from a distribution medium to a hard disk, and "uninstalled" by deleting the application directory. Fixed contents In order to support user interaction with application directories, several files have special status. Application binaries Launching an application directory causes the included file AppRun (ROX Desktop) or !Run (RISC OS) to be launched. On RISC OS this is generally an Obey file (a RISC OS command script) which allocates memory and loads OS extension modules and shared libraries before executing the application binary, usually called !RunImage. Under the ROX Desktop, it is not uncommon for it to be a shell script that will launch the correct system binary if available or compile a suitable binary from source otherwise. Help files and icons Both RISC OS and the ROX Desktop allow the user to view help files associated with an application directory without launching the application. RISC OS relies on a file in the directory named !Help which is launched as if the user double-clicked on it when help is requested (and can be any format the system understands, but plain text and !Draw formats are common), while the ROX Desktop opens the application's Help subdirectory. Simila
https://en.wikipedia.org/wiki/Fas%20receptor
The Fas receptor, also known as Fas, FasR, apoptosis antigen 1 (APO-1 or APT), cluster of differentiation 95 (CD95) or tumor necrosis factor receptor superfamily member 6 (TNFRSF6), is a protein that in humans is encoded by the FAS gene. Fas was first identified using a monoclonal antibody generated by immunizing mice with the FS-7 cell line. Thus, the name Fas is derived from FS-7-associated surface antigen. The Fas receptor is a death receptor on the surface of cells that leads to programmed cell death (apoptosis) if it binds its ligand, Fas ligand (FasL). It is one of two apoptosis pathways, the other being the mitochondrial pathway. Gene FAS receptor gene is located on the long arm of chromosome 10 (10q24.1) in humans and on chromosome 19 in mice. The gene lies on the plus (Watson strand) and is 25,255 bases in length organized into nine protein encoding exons. Similar sequences related by evolution (orthologs) are found in most mammals. Protein Previous reports have identified as many as eight splice variants, which are translated into seven isoforms of the protein. Apoptosis-inducing Fas receptor is dubbed isoform 1 and is a type 1 transmembrane protein. Many of the other isoforms are rare haplotypes that are usually associated with a state of disease. However, two isoforms, the apoptosis-inducing membrane-bound form and the soluble form, are normal products whose production via alternative splicing is regulated by the cytotoxic RNA binding protein TIA1. The mature Fas protein has 319 amino acids, has a predicted molecular weight of 48 kiloDaltons and is divided into three domains: an extracellular domain, a transmembrane domain, and a cytoplasmic domain. The extracellular domain has 157 amino acids and is rich in cysteine residues. The transmembrane and cytoplasmic domains have 17 and 145 amino acids respectively. Exons 1 through 5 encode the extracellular region. Exon 6 encodes the transmembrane region. Exons 7-9 encode the intracellular region.
https://en.wikipedia.org/wiki/Temporal%20typography
Temporal typography is typography that appears to move or change over time. It normally appears in screen-based media, and in particular title sequences, TV station idents, and advertising. Within the field of typography, letterforms typically embody either static or kinetic forms. However there is another category of typography that escapes the purely static or purely kinetic. Unlike static typography, these forms are not bound by one iteration within a singular viewing experience. Similar to kinetic type, temporal typography carries the stamp of time but is not relegated to movement or time-based media. Temporal letterforms have the ability to manifest themselves in both static and kinetic ways, as well as physical and digital ways, and therefore cannot be evaluated by the same functional factors of traditional typography: legibility and readability. Viewership and perception are elevated, and formal and experiential conditions are re-prioritized as the forms transition from one state to the next.
https://en.wikipedia.org/wiki/Exterior%20Gateway%20Protocol
The Exterior Gateway Protocol (EGP) was a routing protocol used to connect different autonomous systems on the Internet from the mid-1980s until the mid-1990s, when it was replaced by Border Gateway Protocol (BGP). History EGP was developed by Bolt, Beranek and Newman in the early 1980s. It was first described in RFC 827 and formally specified in RFC 904. RFC 1772 outlined a migration path from EGP to BGP.
https://en.wikipedia.org/wiki/Rate%20of%20response
In behaviorism, rate of response is a ratio between two measurements with different units. Rate of responding is the number of responses per minute, or some other time unit. It is usually written as R. Its first major exponent was B.F. Skinner (1939). It is used in the Matching Law. R = # of Responses/Unit of time = B/t See also Rate of reinforcement
https://en.wikipedia.org/wiki/Analytical%20skill
Analytical skill is the ability to deconstruct information into smaller categories in order to draw conclusions. Analytical skill consists of categories that include logical reasoning, critical thinking, communication, research, data analysis and creativity. Analytical skill is taught in contemporary education with the intention of fostering the appropriate practises for future professions. The professions that adopt analytical skill include educational institutions, public institutions, community organisations and industry. Richard J. Heuer Jr. explained that In the article by Freed, the need for programs within the educational system to help students develop these skills is demonstrated. Workers "will need more than elementary basic skills to maintain the standard of living of their parents. They will have to think for a living, analyse problems and solutions, and work cooperatively in teams". Logical Reasoning Logical reasoning is a process consisting of inferences, where premises and hypotheses are formulated to arrive at a probable conclusion. It is a broad term covering three sub-classifications in deductive reasoning, inductive reasoning and abductive reasoning. Deductive Reasoning ‘Deductive reasoning is a basic form of valid reasoning, commencing with a general statement or hypothesis, then examines the possibilities to reach a specific, logical conclusion’. This scientific method utilises deductions, to test hypotheses and theories, to predict if possible observations were correct. A logical deductive reasoning sequence can be executed by establishing: an assumption, followed by another assumption and finally, conducting an inference. For example, ‘All men are mortal. Harold is a man. Therefore, Harold is mortal.’ For deductive reasoning to be upheld, the hypothesis must be correct, therefore, reinforcing the notion that the conclusion is logical and true. It is possible for deductive reasoning conclusions to be inaccurate or incorrect entirely, bu
https://en.wikipedia.org/wiki/Parameter%20Value%20Language
In computer programming, Parameter Value Language (PVL) is a markup language similar to XML. It is commonly employed for entries in the Planetary Database System used by NASA to store mission data, among other uses. There are at least two "dialects" – USGS Isis Cube Label and NASA PDS 3 Label.
https://en.wikipedia.org/wiki/Claire%20Voisin
Claire Voisin (born 4 March 1962) is a French mathematician known for her work in algebraic geometry. She is a member of the French Academy of Sciences and holds the chair of algebraic geometry at the Collège de France. Work She is noted for her work in algebraic geometry particularly as it pertains to variations of Hodge structures and mirror symmetry, and has written several books on Hodge theory. In 2002, Voisin proved that the generalization of the Hodge conjecture for compact Kähler varieties is false. The Hodge conjecture is one of the seven Clay Mathematics Institute Millennium Prize Problems which were selected in 2000, each having a prize of one million US dollars. Voisin won the European Mathematical Society Prize in 1992 and the Servant Prize awarded by the Academy of Sciences in 1996. She received the Sophie Germain Prize in 2003 and the Clay Research Award in 2008 for her disproof of the Kodaira conjecture on deformations of compact Kähler manifolds. In 2007, she was awarded the Ruth Lyttle Satter Prize in Mathematics for, in addition to her work on the Kodaira conjecture, solving the generic case of Green's conjecture on the syzygies of the canonical embedding of an algebraic curve. This case of Green's conjecture had received considerable attention from algebraic geometers for over two decades prior to its resolution by Voisin (the full conjecture for arbitrary curves is still partially open). She was an invited speaker at the 1994 International Congress of Mathematicians in Zürich in the section 'Algebraic Geometry', and she was also invited as a plenary speaker at the 2010 International Congress of Mathematicians in Hyderabad. In 2014, she was elected to the Academia Europaea. She served on the Mathematical Sciences jury of the Infosys Prize from 2017 to 2019. In 2009 she became a member of the German Academy of Sciences Leopoldina. In May 2016, she was elected as a foreign associate of the National Academy of Sciences. Also in 2016, she b
https://en.wikipedia.org/wiki/Socioemotional%20selectivity%20theory
Socioemotional selectivity theory (SST; developed by Stanford psychologist Laura L. Carstensen) is a life-span theory of motivation. The theory maintains that as time horizons shrink, as they typically do with age, people become increasingly selective, investing greater resources in emotionally meaningful goals and activities. According to the theory, motivational shifts also influence cognitive processing. Aging is associated with a relative preference for positive over negative information in individuals who have had rewarding relationships. This selective narrowing of social interaction maximizes positive emotional experiences and minimizes emotional risks as individuals become older. According to this theory, older adults systematically hone their social networks so that available social partners satisfy their emotional needs. The theory also focuses on the types of goals that individuals are motivated to achieve. Knowledge-related goals aim at knowledge acquisition, career planning, the development of new social relationships and other endeavors that will pay off in the future. Emotion-related goals are aimed at emotion regulation, the pursuit of emotionally gratifying interactions with social partners and other pursuits whose benefits can be realized in the present. When people perceive their future as open ended, they tend to focus on future-oriented and development- or knowledge-related goals, but when they feel that time is running out and the opportunity to reap rewards from future-oriented goals' realization is dwindling, their focus tends to shift towards present-oriented and emotion- or pleasure-related goals. Research on this theory often compares age groups (e.g., young adulthood vs. old adulthood), but the shift in goal priorities is a gradual process that begins in early adulthood. Importantly, the theory contends that the cause of these goal shifts is not age itself, i.e., not the passage of time itself, but rather an age-associated shift in ti
https://en.wikipedia.org/wiki/Viral%20regulatory%20and%20accessory%20protein
A viral regulatory and accessory protein is a type of viral protein that can play an indirect role in the function of a virus. An example is Nef.
https://en.wikipedia.org/wiki/Propenidazole
Propenidazole is an antiinfective imidazole derivative used in gynecology.
https://en.wikipedia.org/wiki/Poimapper
Poimapper is field data collection, sharing and analysing software. Mobile application is used to collect data and update data. By uploading data to a cloud server it is shared among other mobile and office workers. Poimapper is developed by Pajat Solutions Ltd. Pajat Solutions was founded in 2009 and is headquartered in Finland. In 2013 Pajat was awarded the European CSR award for innovative, non-business partnerships that have helped to solve social problems while creating business advantage. The award came from a partnership where NGO's like Plan International were using Poimapper in their health-related monitoring and evaluation work.
https://en.wikipedia.org/wiki/Anisocytosis
Anisocytosis is a medical term meaning that a patient's red blood cells are of unequal size. This is commonly found in anemia and other blood conditions. False diagnostic flagging may be triggered on a complete blood count by an elevated WBC count, agglutinated RBCs, RBC fragments, giant platelets or platelet clumps. In addition, it is a characteristic feature of bovine blood. The red cell distribution width (RDW) is a measurement of anisocytosis and is calculated as a coefficient of variation of the distribution of RBC volumes divided by the mean corpuscular volume (MCV). Types Anisocytosis is identified by RDW and is classified according to the size of RBC measured by MCV. According to this, it can be divided into Anisocytosis with microcytosis – Iron deficiency, sickle cell anemia Anisocytosis with macrocytosis – Folate or vitamin B12 deficiency, autoimmune hemolytic anemia, cytotoxic chemotherapy, chronic liver disease, myelodysplastic syndrome Increased RDW is seen in iron deficiency anemia and decreased or normal in thalassemia major (Cooley's anemia), thalassemia intermedia Anisocytosis with normal RBC size – Early iron, vit B12 or folate deficiency, dimorphic anemia, Sickle cell disease, chronic liver disease, myelodysplastic syndrome Etymology From Ancient Greek: an- without, or negative quality, iso- equal, cyt- cell, -osis condition. See also Anisopoikilocytosis Poikilocytosis Red blood cell distribution width
https://en.wikipedia.org/wiki/Phyllosphere
In microbiology, the phyllosphere is the total above-ground surface of a plant when viewed as a habitat for microorganisms. The phyllosphere can be further subdivided into the caulosphere (stems), phylloplane (leaves), anthosphere (flowers), and carposphere (fruits). The below-ground microbial habitats (i.e. the thin-volume of soil surrounding root or subterranean stem surfaces) are referred to as the rhizosphere and laimosphere. Most plants host diverse communities of microorganisms including bacteria, fungi, archaea, and protists . Some are beneficial to the plant, others function as plant pathogens and may damage the host plant or even kill it. The phyllosphere microbiome The leaf surface, or phyllosphere, harbours a microbiome comprising diverse communities of bacteria, archaea, fungi, algae and viruses. Microbial colonizers are subjected to diurnal and seasonal fluctuations of heat, moisture, and radiation. In addition, these environmental elements affect plant physiology (such as photosynthesis, respiration, water uptake etc.) and indirectly influence microbiome composition. Rain and wind also cause temporal variation to the phyllosphere microbiome. The phyllosphere includes the total aerial (above-ground) surface of a plant, and as such includes the surface of the stem, flowers and fruit, but most particularly the leaf surfaces. Compared with the rhizosphere and the endosphere the phyllosphere is nutrient poor and its environment more dynamic. Interactions between plants and their associated microorganisms in many of these microbiomes can play pivotal roles in host plant health, function, and evolution. Interactions between the host plant and phyllosphere bacteria have the potential to drive various aspects of host plant physiology. However, as of 2020 knowledge of these bacterial associations in the phyllosphere remains relatively modest, and there is a need to advance fundamental knowledge of phyllosphere microbiome dynamics. The assembly of the phyl
https://en.wikipedia.org/wiki/Holarctic%20realm
The Holarctic realm is a biogeographic realm that comprises the majority of habitats found throughout the continents in the Northern Hemisphere. It corresponds to the floristic Boreal Kingdom. It includes both the Nearctic zoogeographical region (which covers most of North America), and Alfred Wallace's Palearctic zoogeographical region (which covers North Africa, and all of Eurasia except for Southeast Asia, the Indian subcontinent, the southern Arabian Peninsula). These regions are further subdivided into a variety of ecoregions. Many ecosystems and the animal and plant communities that depend on them extend across a number of continents and cover large portions of the Holarctic realm. This continuity is the result of those regions’ shared glacial history. Major ecosystems Within the Holarctic realm, there are a variety of ecosystems. The type of ecosystem found in a given area depends on its latitude and the local geography. In the far north, a band of Arctic tundra encircles the shore of the Arctic Ocean. The ground beneath this land is permafrost (frozen year-round). In these difficult growing conditions, few plants can survive. South of the tundra, the boreal forest stretches across North America and Eurasia. This land is characterized by coniferous trees. Further south, the ecosystems become more diverse. Some areas are temperate grassland, while others are temperate forests dominated by deciduous trees. Many of the southernmost parts of the Holarctic are deserts, which are dominated by plants and animals adapted to the dry conditions. Animal species with a Holarctic distribution A variety of animal species are distributed across continents, throughout much of the Holarctic realm. These include the brown bear, grey wolf, red fox, wolverine, moose, caribou, golden eagle and common raven. The brown bear (Ursus arctos) is found in mountainous and semi-open areas distributed throughout the Holarctic. It once occupied much larger areas, but has been driv
https://en.wikipedia.org/wiki/Bzip2
bzip2 is a free and open-source file compression program that uses the Burrows–Wheeler algorithm. It only compresses single files and is not a file archiver. It relies on separate external utilities for tasks such as handling multiple files, encryption, and archive-splitting. bzip2 was initially released in 1996 by Julian Seward. It compresses most files more effectively than older LZW and Deflate compression algorithms but is slower. bzip2 is particularly efficient for text data, and decompression is relatively fast. The algorithm uses several layers of compression techniques, such as run-length encoding (RLE), Burrows–Wheeler transform (BWT), move-to-front transform (MTF), and Huffman coding. bzip2 compresses data in blocks between 100 and 900 kB and uses the Burrows–Wheeler transform to convert frequently recurring character sequences into strings of identical letters. The move-to-front transform and Huffman coding are then applied. The compression performance is asymmetric, with decompression being faster than compression. The algorithm has gone through multiple maintainers since its initial release, with Micah Snyder being the maintainer since June 2021. There have been some modifications to the algorithm, such as pbzip2, which uses multi-threading to improve compression speed on multi-CPU and multi-core computers. bzip2 is suitable for use in big data applications with cluster computing frameworks like Hadoop and Apache Spark, as the compressed blocks can be independently decompressed. History Seward made the first public release of bzip2, version 0.15, in July 1996. The compressor's stability and popularity grew over the next several years, and Seward released version 1.0 in late 2000. Following a nine-year hiatus of updates for the project since 2010, on 4 June 2019 Federico Mena accepted maintainership of the bzip2 project. Since June 2021, the maintainer is Micah Snyder. Implementation bzip2 uses several layers of compression techniques stacked o
https://en.wikipedia.org/wiki/Tintri
Tintri, Inc. is a division of DataDirect Networks based in Santa Clara, California. Tintri provides products designed for businesses cloud computing, virtual machines (VMs), and containers. The core product line is the VMstore, a storage system and software designed to simplify management in data center and cloud environments. After becoming a public company in 2017, within a year it ran out of cash and was acquired in bankruptcy. History Tintri was founded in 2007 by Kieran Harty, who had led development at VMware as their executive vice president of engineering from 1999 to 2006. A native of Ireland, Harty had graduate degrees from Trinity College, Dublin and Stanford University. Its initial objective was solving the mismatch between conventional storage and the demands of applications in virtual machine (VM) environments, which causes complex configuration and management as well as over-provisioning. Over time, Tintri addressed cloud needs of enterprise customers. Tintri means "lightning" in the Gaelic language. Early investors included David Cheriton (Harty's Ph.D. adviser) and venture capital from New Enterprise Associates and Lightspeed Venture Partners. The first two rounds raised about $17 million before being disclosed in 2011. Another round of about $25 million was disclosed in July, 2012, with Menlo Ventures as additional investor. Pete Sonsini, (son of Silicon Valley attorney Larry Sonsini) was an early board member. In October 2013, Ken Klein, a Tintri board member and former president of Wind River Systems, became chairman and chief executive. Ian Halifax, also from Wind River, was named chief financial officer in January 2014. A round of $75 million investment in February 2014 was led by Insight Venture Partners. In August 2015, a $125 million investment round was led by Silver Lake Kraftwerk joined by previous investors. In October, 2016, Charles Giancarlo (from Silver Lake) joined the board of directors. On June 1, 2017, Tintri filed with th
https://en.wikipedia.org/wiki/Alexander%20Adams%20%28sailor%29
Captain Alexander Adams (1780–1871) was a Scotsman who served in the British Royal Navy and then came to the Hawaiian islands and served in the navy of the Kingdom of Hawaii. Known to the Hawaiians as Alika Napunako Adams. Britain Adams was born December 27, 1780, in Arbroath, Angus, Scotland. He said his father was John Fyfe, who he said was the "Earl of Fyfe", born in Arbroath c. 1754. His mother was Jean Adams, born in Arbroath c. 1758. Leaving Scotland in 1792, he worked 4 years aboard Zephyr belonging to Husson & Co. out of Newcastle upon Tyne, England. In 1796, he left Zephyr, and joined Calcutta out of Lancaster for two trips. He was drafted into naval service aboard after the Battle of Trafalgar in the Napoleonic Wars. Hawaii He arrived in Hawaii some time between 1809 and 1811 on the American trading ship Albatross from Boston. He met King Kamehameha I and joined English sailor John Young, who had arrived in 1790, to command the navy of the Kingdom of Hawaii. He was awarded control of over in the Niu Valley, including control over the Kupapa Fishpond, which he later filled in for purposes of growing sweet potatoes. (east of Honolulu, coordinates ). In April 1816 at Kawaihae Bay, Adams negotiated to buy a ship called Forester under Captain John Ebbetts which had been owned by American John Jacob Astor. Prince Liholiho (soon to become King Kamehameha II) purchased the ship with sandalwood (Santalum ellipticum), and changed its name to Kaahumanu after his powerful stepmother Queen Kaahumanu. A condition of the deal was for Adams to take command of the ship. It was a small two-masted trading ship called a brig. On March 7, 1817, the Kingdom of Hawaii sent Adams to China on his ship to sell sandalwood. To enter the harbor, the ship paid $3000 in port charges, making it not a financial success. Upon returning October 5, 1817, at Hilo and hearing of the amount Adams had to pay, King Kamehameha decided Hawaii should also generate revenue from port charges.
https://en.wikipedia.org/wiki/Kenneth%20L.%20Cooke
Kenneth L. Cooke (August 13, 1925August 25, 2007) was an American mathematical biologist known for his contributions to the study of epidemics. He was the W. M. Keck Professor of Mathematics at Pomona College in Claremont, California. Early life and education Cooke was born in Kansas City, Missouri, in 1925. He enrolled at Pomona College, graduating in 1947 after serving in the Navy as a radar and radio technician during World War II. He subsequently earned a doctorate in mathematics from Stanford University. Career Cooke taught at Washington State University for seven years. He then joined the Pomona faculty in 1957 and remained at the college for the rest of his career. He was promoted to a named professorship in 1985. His work on epidemics involved modeling parameters under which a disease will spread or die out. He studied HIV/AIDS and other contagious diseases. His work also involved delay differential equations.
https://en.wikipedia.org/wiki/Schoonschip
Schoonschip was one of the first computer algebra systems, developed in 1963 by Martinus J. G. Veltman, for use in particle physics. "Schoonschip" refers to the Dutch expression "schoon schip maken": to make a clean sweep, to clean/clear things up (literally: to make the ship clean). The name was chosen "among others to annoy everybody, who could not speak Dutch". Veltman initially developed the program to compute the quadrupole moment of the W boson, the computation of which involved "a monstrous expression involving in the order of 50,000 terms in intermediate stages" The initial version, dating to December 1963, ran on an IBM 7094 mainframe. In 1966 it was ported to the CDC 6600 mainframe, and later to most of the rest of Control Data's CDC line. In 1983 it was ported to the Motorola 68000 microprocessor, allowing its use on a number of 68000-based systems running variants of Unix. FORM can be regarded, in a sense, as the successor to Schoonschip. Contacts with Veltman about Schoonschip have been important for Stephen Wolfram in building Mathematica. See also Comparison of computer algebra systems
https://en.wikipedia.org/wiki/Katalin%20Bimb%C3%B3
Katalin Bimbó (born 1963) is a logician and philosopher known for her books on mathematical logic and proof theory. She earned a Ph.D. in 1999 at Indiana University, under the supervision of Jon Michael Dunn, and is a professor of philosophy at the University of Alberta after having earned tenure there in 2013. Selected works Monographs Generalized Galois Logics: Relational Semantics of Nonclassical Logical Calculi (with J. M. Dunn, CSLI Publications, 2008) Combinatory Logic: Pure, Applied and Typed (CRC Press, 2012) Proof Theory: Sequent Calculi and Related Formalisms (CRC Press, 2015) Edited volumes J. Michael Dunn on Information Based Logics (Outstanding Contributions to Logic, vol. 8; Springer, 2016). Relevance Logics and other Tools for Reasoning. Essays in Honor of J. Michael Dunn (Tributes, vol. 46; College Publications, London, UK, 2022).
https://en.wikipedia.org/wiki/CADPAC
CADPAC, the Cambridge Analytic Derivatives Package, is a suite of programs for ab initio computational chemistry calculations. It has been developed by R. D. Amos with contributions from I. L. Alberts, J. S. Andrews, S. M. Colwell, N. C. Handy, D. Jayatilaka, P. J. Knowles, R. Kobayashi, K. E. Laidig, G. Laming, A. M. Lee, P. E. Maslen, C. W. Murray, J. E. Rice, E. D. Simandiras, A. J. Stone, M.-D. Su and D. J. Tozer. at Cambridge University since 1981. It is capable of molecular Hartree–Fock calculations, Møller–Plesset calculations, various other correlated calculations and density functional theory calculations. See also Quantum chemistry computer programs External links Computational chemistry software
https://en.wikipedia.org/wiki/Vanillin%E2%80%93HCl%20staining
Vanillin–HCl staining (10% vanillin and 90% of a mixture of ethanol and HCl, giving an orange color) can be used to visualize the localisation of tannins in cells. The localization of phlorotannins can be investigated by light microscopy after vanillin–HCl staining. The phlorotannins can be seen this way in physodes in brown algae. The vanillin-HCl method can be used to estimate the proanthocyanidins content in plant cells, resulting in a red color of the test in the presence of catechin or proanthocyanidins.
https://en.wikipedia.org/wiki/Microbial%20electrolysis%20cell
A microbial electrolysis cell (MEC) is a technology related to Microbial fuel cells (MFC). Whilst MFCs produce an electric current from the microbial decomposition of organic compounds, MECs partially reverse the process to generate hydrogen or methane from organic material by applying an electric current. The electric current would ideally be produced by a renewable source of power. The hydrogen or methane produced can be used to produce electricity by means of an additional PEM fuel cell or internal combustion engine. Microbial electrolysis cells MEC systems are based on a number of components: Microorganisms – are attached to the anode. The identity of the microorganisms determines the products and efficiency of the MEC. Materials – The anode material in a MEC can be the same as an MFC, such as carbon cloth, carbon paper, graphite felt, graphite granules or graphite brushes. Platinum can be used as a catalyst to reduce the overpotential required for hydrogen production. The high cost of platinum is driving research into biocathodes as an alternative. Or as other alternative for catalyst, the stainless steel plates were used as cathode and anode materials. Other materials include membranes (although some MECs are membraneless), and tubing and gas collection systems. Generating hydrogen Electrogenic microorganisms consuming an energy source (such as acetic acid) release electrons and protons, creating an electrical potential of up to 0.3 volts. In a conventional MFC, this voltage is used to generate electrical power. In a MEC, an additional voltage is supplied to the cell from an outside source. The combined voltage is sufficient to reduce protons, producing hydrogen gas. As part of the energy for this reduction is derived from bacterial activity, the total electrical energy that has to be supplied is less than for electrolysis of water in the absence of microbes. Hydrogen production has reached up to 3.12 m3H2/m3d with an input voltage of 0.8 volts. The effici
https://en.wikipedia.org/wiki/Looney%20Tunes%3A%20Rabbits%20Run
Looney Tunes: Rabbits Run is a 2015 American animated direct-to-video adventure comedy film in the Looney Tunes franchise produced by Warner Bros. Animation. It was the first new Looney Tunes direct-to-video film since Bah, Humduck! A Looney Tunes Christmas was released nine years prior. The film was made shortly after The Looney Tunes Show, and shares much of the same crew as that series, including director Jeff Siergey, who had also been a supervising animator on Space Jam and lead animator on Looney Tunes: Back in Action. It was released on August 4, 2015, by Warner Home Video, but it was released early on July 7, 2015 on Vudu and Walmart. Plot From his headquarters, NSA General Foghorn Leghorn, his intern Pete Puma, and spy Cecil Turtle oversee an operation on a mountain in the central Mexican jungle. The objective of the operation is to extract a rare flower, as the agents believe it to be the world's most powerful weapon. However, they are beaten to it by Speedy Gonzales. In New York City, Lola Bunny is tired of working for Giovanni Jones at the Acme department store perfume counter. She accidentally damages the store, gets fired and takes a long, awkward ride home in Bugs Bunny's taxi. Arriving in her apartment, she screams when she sees a mouse, even though it is her landlord, Speedy. He gives her the flower as a gift, unaware it is being watched by the NSA. General Leghorn sends agent Elmer Fudd to watch the flower, though Lola uses it to create her perfume, which has a side effect of invisibility. She doesn't notice as she accidentally sprays her eye, forcing her to wash it out, rendering her visible. Cecil sends his goons to get it, but Lola backs out the window and falls to Bugs' taxi below. On the way down, the perfume makes the wall invisible exposing, in successive apartments. General Leghorn puts out a reward of $500,000 for Bugs and Lola, and Yosemite Sam, who was preparing to rob a bank in Times Square (with just a short-range water pistol), lea
https://en.wikipedia.org/wiki/Timeline%20of%20materials%20technology
Major innovations in materials technology BC 28,000 BC – People wear beads, bracelets, and pendants 14,500 BC – First pottery, made by the Jōmon people of Japan. 6th millennium BC – Copper metallurgy is invented and copper is used for ornamentation (see Pločnik article) 2nd millennium BC – Bronze is used for weapons and armor 16th century BC – The Hittites develop crude iron metallurgy 13th century BC – Invention of steel when iron and charcoal are combined properly 10th century BC – Glass production begins in ancient Near East 1st millennium BC – Pewter beginning to be used in China and Egypt 1000 BC – The Phoenicians introduce dyes made from the purple murex. 3rd century BC – Wootz steel, the first crucible steel, is invented in ancient India 50s BC – Glassblowing techniques flourish in Phoenicia 20s BC – Roman architect Vitruvius describes low-water-content method for mixing concrete 1st millennium 3rd century – Cast iron widely used in Han Dynasty China 300 – Greek alchemist Zomius, summarizing the work of Egyptian alchemists, describes arsenic and lead acetate 4th century – Iron pillar of Delhi is the oldest surviving example of corrosion-resistant steel 8th century – Porcelain is invented in Tang Dynasty China 8th century – Tin-glazing of ceramics invented by Muslim chemists and potters in Basra, Iraq 9th century – Stonepaste ceramics invented in Iraq 900 – First systematic classification of chemical substances appears in the works attributed to Jābir ibn Ḥayyān (Latin: Geber) and in those of the Persian alchemist and physician Abū Bakr al-Rāzī ( 865–925, Latin: Rhazes) 900 – Synthesis of ammonium chloride from organic substances described in the works attributed to Jābir ibn Ḥayyān (Latin: Geber) 900 – Abū Bakr al-Rāzī describes the preparation of plaster of Paris and metallic antimony 9th century – Lustreware appears in Mesopotamia 2nd millennium 1000 – Gunpowder is developed in China 1340 – In Liège, Belgium, the first blast furnaces for the production
https://en.wikipedia.org/wiki/Amphetamine
Amphetamine (contracted from alpha-methylphenethylamine) is a central nervous system (CNS) stimulant that is used in the treatment of attention deficit hyperactivity disorder (ADHD), narcolepsy, and obesity. Amphetamine was discovered as a chemical in 1887 by Lazăr Edeleanu, and then as a drug in the late 1920s. It exists as two enantiomers: levoamphetamine and dextroamphetamine. Amphetamine properly refers to a specific chemical, the racemic free base, which is equal parts of the two enantiomers in their pure amine forms. The term is frequently used informally to refer to any combination of the enantiomers, or to either of them alone. Historically, it has been used to treat nasal congestion and depression. Amphetamine is also used as an athletic performance enhancer and cognitive enhancer, and recreationally as an aphrodisiac and euphoriant. It is a prescription drug in many countries, and unauthorized possession and distribution of amphetamine are often tightly controlled due to the significant health risks associated with recreational use. The first amphetamine pharmaceutical was Benzedrine, a brand which was used to treat a variety of conditions. Currently, pharmaceutical amphetamine is prescribed as racemic amphetamine, Adderall, dextroamphetamine, or the inactive prodrug lisdexamfetamine. Amphetamine increases monoamine and excitatory neurotransmission in the brain, with its most pronounced effects targeting the norepinephrine and dopamine neurotransmitter systems. At therapeutic doses, amphetamine causes emotional and cognitive effects such as euphoria, change in desire for sex, increased wakefulness, and improved cognitive control. It induces physical effects such as improved reaction time, fatigue resistance, and increased muscle strength. Larger doses of amphetamine may impair cognitive function and induce rapid muscle breakdown. Addiction is a serious risk with heavy recreational amphetamine use, but is unlikely to occur from long-term medical use at th
https://en.wikipedia.org/wiki/Monstrous%20birth
A monstrous birth, variously defined in history, is a birth in which a defect renders the animal or human child malformed to such a degree as to be considered "monstrous". Such births were often taken as omens, signs of God, or moral warnings to be wielded by society at large as a tool for manipulation in various ways. The development of the field of obstetrics helped do away with spurious associations with evil but the historical significance of these fetuses remains noteworthy. In early and medieval Christianity, monstrous births were presented as and used to pose difficult theological problems about humanity and salvation. Overview An early reference to monstrous birth is found in the apocryphal biblical text 2 Esdras, where it is linked to menstruation: "women in their uncleanness will bear monsters." Monstrous births are often placed in a religious context and interpreted as signs and symbols, as is evidenced in the 1493 Nuremberg Chronicle. According to David Hume's "The Natural History of Religion", they are among the first signs that arouse the barbarian's interest. Monstrous human births raise the question of the difference between humans and animals, and anthropologists have described different interpretations of and behaviors toward such births. Among the East African Nuer people, monstrous births are acted on in a way that restores the division between the categories of human and animal: "the Nuer treat monstrous births as baby hippopotamuses, accidentally born to humans, and, with this labelling, the appropriate action is clear. They gently lay them in the river where they belong." Whether monstrous births were natural, unnatural, or supernatural remained a topic of discussion. Saint Augustine held that nothing "done by the will of God could be contrary to nature," whereas Thomas Aquinas considered some miracles to be against nature. Medieval explanations Reasons for monstrous births given in early medieval penitentials (concerned with sexual sin) a
https://en.wikipedia.org/wiki/Risk%20parity
Risk parity (or risk premia parity) is an approach to investment management which focuses on allocation of risk, usually defined as volatility, rather than allocation of capital. The risk parity approach asserts that when asset allocations are adjusted (leveraged or deleveraged) to the same risk level, the risk parity portfolio can achieve a higher Sharpe ratio and can be more resistant to market downturns than the traditional portfolio. Risk parity is vulnerable to significant shifts in correlation regimes, such as observed in Q1 2020, which led to the significant underperformance of risk-parity funds in the Covid-19 sell-off. Roughly speaking, the approach of building a risk parity portfolio is similar to creating a minimum-variance portfolio subject to the constraint that each asset (or asset class, such as bonds, stocks, real estate, etc.) contributes equally to the portfolio overall volatility. Some of its theoretical components were developed in the 1950s and 1960s but the first risk parity fund, called the All Weather fund, was pioneered in 1996. In recent years many investment companies have begun offering risk parity funds to their clients. The term, risk parity, came into use in 2005, coined by Edward Qian, of PanAgora Asset Management, and was then adopted by the asset management industry. Risk parity can be seen as either a passive or active management strategy. Interest in the risk parity approach has increased since the financial crisis of 2007-2008 as the risk parity approach fared better than traditionally constructed portfolios, as well as many hedge funds. Some portfolio managers have expressed skepticism about the practical application of the concept and its effectiveness in all types of market conditions but others point to its performance during the financial crisis of 2007-2008 as an indication of its potential success. Description Risk parity is a conceptual approach to investing which attempts to provide a lower risk and lower fee alte
https://en.wikipedia.org/wiki/UML%20Partners
UML Partners was a consortium of system integrators and vendors convened in 1996 to specify the Unified Modeling Language (UML). Initially the consortium was led by Grady Booch, Ivar Jacobson, and James Rumbaugh of Rational Software. The UML Partners' UML 1.0 specification draft was proposed to the Object Management Group (OMG) in January 1997. During the same month the UML Partners formed a Semantics Task Force, chaired by Cris Kobryn, to finalize the semantics of the specification and integrate it with other standardization efforts. The result of this work, UML 1.1, was submitted to the OMG in August 1997 and adopted by the OMG in November 1997. Member list Members of the consortium include: Digital Equipment Corporation Hewlett-Packard i-Logix IBM ICON Computing IntelliCorp MCI Systemhouse Microsoft ObjecTime Oracle Corporation Platinum Technology Ptech Rational Software Reich Technologies Softeam Taskon Texas Instruments Unisys See also Unified Modeling Language object-oriented language
https://en.wikipedia.org/wiki/Nucleotide%20sugar
Nucleotide sugars are the activated forms of monosaccharides. Nucleotide sugars act as glycosyl donors in glycosylation reactions. Those reactions are catalyzed by a group of enzymes called glycosyltransferases. History The anabolism of oligosaccharides - and, hence, the role of nucleotide sugars - was not clear until the 1950s when Leloir and his coworkers found that the key enzymes in this process are the glycosyltransferases. These enzymes transfer a glycosyl group from a sugar nucleotide to an acceptor. Biological importance and energetics To act as glycosyl donors, those monosaccharides should exist in a highly energetic form. This occurs as a result of a reaction between nucleoside triphosphate (NTP) and glycosyl monophosphate (phosphate at anomeric carbon). The recent discovery of the reversibility of many glycosyltransferase-catalyzed reactions calls into question the designation of sugar nucleotides as 'activated' donors. Types There are nine sugar nucleotides in humans which act as glycosyl donors and they can be classified depending on the type of the nucleoside forming them: Uridine Diphosphate: UDP-α-D-Glc, UDP-α-D-Gal, UDP-α-D-GalNAc, UDP-α-D-GlcNAc, UDP-α-D-GlcA, UDP-α-D-Xyl Guanosine Diphosphate: GDP-α-D-Man, GDP-β-L-Fuc. Cytidine Monophosphate: CMP-β-D-Neu5Ac; in humans, it is the only nucleotide sugar in the form of nucleotide monophosphate. Cytidine Diphosphate: CDP-D-Ribitol (i.e. CMP-[ribitol phosphate]); though not a sugar, the phosphorylated sugar alcohol ribitol phosphate is incorporated into matriglycan as if it were a monosaccharide. In other forms of life many other sugars are used and various donors are utilized for them. All five of the common nucleosides are used as a base for a nucleotide sugar donor somewhere in nature. As examples, CDP-glucose and TDP-glucose give rise to various other forms of CDP and TDP-sugar donor nucleotides. Structures Listed below are the structures of some nucleotide sugars (one example from each type
https://en.wikipedia.org/wiki/CO2%20rocket
{{DISPLAYTITLE:CO2 rocket}} A carbon dioxide rocket (CO2 rocket) is a type of rocket that uses carbon dioxide as a propellant. It should be fired outdoors. Carbon dioxide rocket (slurry, hybrid, etc.) can be used in model rocketry, where it is also known as a pop rocket. Its engine could generate a specific impulse of around 280 seconds. See also Water rocket
https://en.wikipedia.org/wiki/Ames%20strain
The Ames strain is one of 89 known strains of the anthrax bacterium (Bacillus anthracis). It was isolated from a diseased 14-month-old Beefmaster heifer that died in Sarita, Texas in 1981. The strain was isolated at the Texas Veterinary Medical Diagnostic Laboratory and a sample was sent to the United States Army Medical Research Institute of Infectious Diseases (USAMRIID). Researchers at USAMRIID mistakenly believed the strain came from Ames, Iowa because the return address on the package was the USDA's National Veterinary Services Laboratories in Ames and mislabeled the specimen. The Ames strain came to wide public attention during the 2001 anthrax attacks when seven letters containing it were mailed to media outlets and US Senators on September 18, 2001, and October 9, 2001. Because of its virulence, the Ames strain is used by the United States for developing vaccines and testing their effectiveness. Use of the Ames strain started in the 1980s, after work on weaponizing the Vollum 1B strain ended and all weaponized stocks were destroyed after the end of the U.S. biological warfare program in 1969. Virulence Virulence plasmids Researchers have identified two specific virulence plasmids in B. anthracis, with the Ames strain expressing greater virulence compared to other strains. The virulence of B. anthracis results from two plasmids, pXO1 and pXO2. Plasmid pXO2 encodes an antiphagocytic poly-D-glutamic acid capsule, which allows B. anthracis to evade the host immune system. Plasmid pXO1 encodes three toxin proteins: edema factor (EF), lethal factor (LF) and protective antigen (PA). Variation in virulence can be explained by the presence or absence of plasmids; for example, isolates missing either pXO1 or pXO2 are considered attenuated, meaning they will not cause significant infection. One possible mechanism that may be responsible for the regulation of virulence is the copy number of plasmids per cell. The number of plasmids among isolates varies, with as m
https://en.wikipedia.org/wiki/Dinesh%20Manocha
Dinesh Manocha is an Indian-American computer scientist and the Paul Chrisman Iribe Professor of Computer Science at University of Maryland College Park, formerly at University of North Carolina at Chapel Hill. His research interests are in scientific computation, robotics, self-driving cars, affective computing, virtual and augmented reality and 3D computer graphics. Biography Dinesh Manocha is currently a Paul Chrisman Iribe Professor Professor of computer science at the University of Maryland, College Park. He received his B.Tech. degree in computer science and engineering from the Indian Institute of Technology, Delhi in 1987; M.S. and Ph.D. in computer science at the University of California at Berkeley in 1990 and 1992, respectively. Manocha has supervised more than 45 MS and Ph.D. students. He is married to his frequent collaborator and UMD faculty colleague, Ming C. Lin. Research Manocha's research interests include geometric computing, interactive computer graphics, physics-based simulation and robotics. He has published more than 280 papers in these areas. Awards and honors Manocha has received more than 11 best paper and panel awards at the ACM SuperComputing, ACM Multimedia, ACM Solid Modeling, Pacific Graphics, IEEE VR, IEEE Visualization, ACM SIGMOD, ACM VRST, CAD, I/ITSEC and Eurographics Conferences. He was selected as an ACM Fellow in 2009 "for contributions to geometric computing and applications to computer graphics, robotics and GPU computing", and is also an AAAS Fellow.
https://en.wikipedia.org/wiki/8th%20meridian%20east
The meridian 8° east of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, Europe, Africa, the Atlantic Ocean, the Southern Ocean, and Antarctica to the South Pole. The 8th meridian east forms a great circle with the 172nd meridian west. From Pole to Pole Starting at the North Pole and heading south to the South Pole, the 8th meridian east passes through: {| class="wikitable plainrowheaders" ! scope="col" width="125" | Co-ordinates ! scope="col" | Country, territory or sea ! scope="col" | Notes |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Arctic Ocean | style="background:#b0e0e6;" | |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Atlantic Ocean | style="background:#b0e0e6;" | |-valign="top" | ! scope="row" | | Islands of Smøla and Tustna, the mainland (passing through Kristiansand), and the island of Flekkerøy. |-valign="top" | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | North Sea | style="background:#b0e0e6;" | Passing just west of Jutland, Passing just east of the island of Heligoland, |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | |-valign="top" | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Mediterranean Sea | style="background:#b0e0e6;" | Passing just west of the islands of Sardinia and San Pietro, |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | |-valign="top" | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Atlantic Ocean | style="background:#b0e0e6;" | Passing just west of the island of Bioko, |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Southern Ocean | style="background:#b0e0e6;" | |- | ! scope="row" | Antarctica | Queen Maud Land, claimed by |- |} See also 7th merid
https://en.wikipedia.org/wiki/RTX%20toxin
The RTX toxin superfamily is a group of cytolysins and cytotoxins produced by bacteria. There are over 1000 known members with a variety of functions. The RTX family is defined by two common features: characteristic repeats in the toxin protein sequences, and extracellular secretion by the type I secretion systems (T1SS). The name RTX (repeats in toxin) refers to the glycine and aspartate-rich repeats located at the C-terminus of the toxin proteins, which facilitate export by a dedicated T1SS encoded within the rtx operon. Structure and function RTX proteins range from 40 to over 600 kDa in size and all contain C-terminally located glycine and aspartate-rich repeat sequences of nine amino acids. The repeats contain the common sequence structure , (where X represents any amino acid), but the number of repeats varies within RTX protein family members. These consensus regions function as sites for Ca2+ binding, which facilitate folding of the RTX protein following export via an ATP-mediated type 1 secretion system (T1SS). Most of the T1SS proteins are encoded within the rtx operon. The T1SS proteins form a continuous channel spanning both the inner membrane (IM) and outer membrane (OM) of the bacterial cell, preventing RTX toxin exposure to the periplasmic space (between the IM and OM). Type 1 secretion system components include: an ABC transporter (TC# 3.A.1), a membrane fusion protein (MFP; TC# 8.A.1), and an outer membrane protein (OMF; TC# 1.B.17). The OMF is often encoded outside of the rtx operon as it may have multiple functions within the cell. In Escherichia coli, Pasteurella haemolytica, and Vibrio cholerae, TolC functions as the OMP in T1SS RTX toxin export. In each case, the tolC gene is located outside the rtx operon and encodes a conserved multifunctional protein. During transport, the T1SS recognizes the C-terminal repeats of the RTX toxin, and the C-terminus is transferred first through the channel. The general rtx gene cluster encodes three protein
https://en.wikipedia.org/wiki/Game%20complexity
Combinatorial game theory measures game complexity in several ways: State-space complexity (the number of legal game positions from the initial position), Game tree size (total number of possible games), Decision complexity (number of leaf nodes in the smallest decision tree for initial position), Game-tree complexity (number of leaf nodes in the smallest full-width decision tree for initial position), Computational complexity (asymptotic difficulty of a game as it grows arbitrarily large). These measures involve understanding game positions, possible outcomes, and computation required for various game scenarios. Measures of game complexity State-space complexity The state-space complexity of a game is the number of legal game positions reachable from the initial position of the game. When this is too hard to calculate, an upper bound can often be computed by also counting (some) illegal positions, meaning positions that can never arise in the course of a game. Game tree size The game tree size is the total number of possible games that can be played: the number of leaf nodes in the game tree rooted at the game's initial position. The game tree is typically vastly larger than the state space because the same positions can occur in many games by making moves in a different order (for example, in a tic-tac-toe game with two X and one O on the board, this position could have been reached in two different ways depending on where the first X was placed). An upper bound for the size of the game tree can sometimes be computed by simplifying the game in a way that only increases the size of the game tree (for example, by allowing illegal moves) until it becomes tractable. For games where the number of moves is not limited (for example by the size of the board, or by a rule about repetition of position) the game tree is generally infinite. Decision trees The next two measures use the idea of a decision tree, which is a subtree of the game tree, with each po
https://en.wikipedia.org/wiki/P2PTV
P2PTV refers to peer-to-peer (P2P) software applications designed to redistribute video streams in real time on a P2P network; the distributed video streams are typically TV channels from all over the world but may also come from other sources. The draw to these applications is significant because they have the potential to make any TV channel globally available by any individual feeding the stream into the network where each peer joining to watch the video is a relay to other peer viewers, allowing a scalable distribution among a large audience with no incremental cost for the source. Technology and use In a P2PTV system, each user, while downloading a video stream, is simultaneously also uploading that stream to other users, thus contributing to the overall available bandwidth. The arriving streams are typically a few minutes time-delayed compared to the original sources. The video quality of the channels usually depends on how many users are watching; the video quality is better if there are more users. The architecture of many P2PTV networks can be thought of as real-time versions of BitTorrent: if a user wishes to view a certain channel, the P2PTV software contacts a "tracker server" for that channel in order to obtain addresses of peers who distribute that channel; it then contacts these peers to receive the feed. The tracker records the user's address, so that it can be given to other users who wish to view the same channel. In effect, this creates an overlay network on top of the regular internet for the distribution of real-time video content. The need for a tracker can also be eliminated by the use of distributed hash table technology. Some applications allow users to broadcast their own streams, whether self-produced, obtained from a video file, or through a TV tuner card or video capture card. Many of the commercial P2PTV applications were developed in China (TVUPlayer, PPLive, QQLive, PPStream). The majority of available applications broadcast mainly
https://en.wikipedia.org/wiki/FCER1
The high-affinity IgE receptor, also known as FcεRI, or Fc epsilon RI, is the high-affinity receptor for the Fc region of immunoglobulin E (IgE), an antibody isotype involved in the allergy disorder and parasites immunity. FcεRI is a tetrameric receptor complex that binds Fc portion of the ε heavy chain of IgE. It consists of one alpha (FcεRIα – antibody binding site), one beta (FcεRIβ – which amplifies the downstream signal), and two gamma chains (FcεRIγ – the site where the downstream signal initiates) connected by two disulfide bridges on mast cells and basophils. It lacks the beta subunit on other cells. It is constitutively expressed on mast cells and basophils and is inducible in eosinophils. Tissue distribution FcεRI is found on epidermal Langerhans cells, eosinophils, mast cells, and basophils. As a result of its cellular distribution, this receptor plays a major role in controlling allergic responses. FcεRI is also expressed on antigen-presenting cells, and controls the production of important immune mediators (cytokines, interleukins, leukotrienes, and prostaglandins) that promote inflammation. The most known mediator is histamine, which results in the five symptoms of inflammation: heat, swelling, pain, redness and loss of function. FcεRI was demonstrated in bronchial/tracheal airway smooth muscle cells in normal and asthmatic patients. FcεRI cross-linking by IgE and anti-IgE antibodies led to Th2 (IL-4, -5, and -13) cytokines and CCL11/eotaxin-1 chemokine release; and ([Ca2+]i) mobilization, suggesting a likely IgE-FcεRI-ASM (airway smooth muscle cell)-mediated link to airway inflammation and airway hyperresponsiveness. Mechanism of action Crosslinking of the FcεRI via IgE-antigen complexes leads to degranulation of mast cells or basophils and release of inflammatory mediators. Under laboratory conditions, degranulation of isolated basophils can also be induced with antibodies to the FcεRIα, which crosslink the receptor. Such crosslinking and potent
https://en.wikipedia.org/wiki/Fogger
A fogger is any device that creates a fog, typically containing an insecticide for killing insects and other arthropods. Foggers are often used by consumers as a low cost alternative to professional pest control services. The number of foggers needed for pest control depends on the size of the space to be treated, as stated for safety reasons on the instructions supplied with the devices. The fog may contain flammable gases, leading to a danger of explosion if a fogger is used in a building with a pilot light or other naked flame. Fogger composition Total release foggers (TRFs) (also called "bug bombs") are used to kill cockroaches, fleas, and flying insects by filling an area with insecticide. Most foggers contain pyrethroid, pyrethrin, or both as active ingredients. Pyrethroids are a class of synthetic insecticides that are chemically similar to natural pyrethrins and have low potential for systemic toxicity in mammals. Pyrethrins are insecticides derived from chrysanthemum flowers (pyrethrum). Piperonyl butoxide and n-octyl bicycloheptene dicarboximide often are added to pyrethrin products to inhibit insects' microsomal enzymes that detoxify pyrethrins. To distribute their insecticide, foggers also contain aerosol propellants. Hazards to humans During 2001-2006, a total of 466 fogger-related illnesses or injuries were identified in the United States by the SENSOR-Pesticides program. These illnesses or injuries often resulted from inability or failure to vacate before the fogger discharged, reentry into the treated space too soon after the fogger was discharged, excessive use of foggers for the space being treated, and failure to notify others nearby. Exposure symptoms Pyrethrins have little systemic toxicity in mammals, but they have been reported to induce contact dermatitis, conjunctivitis, and asthma. Signs and symptoms of pyrethroid toxicity include abnormal skin sensation (e.g., burning, itching, tingling, and numbness), dizziness, salivation, headache,
https://en.wikipedia.org/wiki/Super%20weaner
A super weaner (also super-weaner or superweaner) is an exceptionally large elephant seal at weaning age. Super weaners may reach their large sizes by stealing milk from nursing female elephant seals or by being adopted by an additional mother elephant seal. Background Elephant seals have an abrupt weaning process, in which the weaned juvenile seal does not receive assistance from its parents in finding food. The postweaning period is important for the seals' development, with a high mortality rate. Phenomenon A super weaner, an elephant seal at weaning age which obtains milk from multiple females, can weigh . A typical elephant seal at the same age weighs between and . While most mother elephant seals will bite weaned elephant seals that attempt to suckle, some will allow it for unknown reasons; some super weaners also obtain the additional milk through theft. Instances A study carried out on Año Nuevo Island in California between 1972 and 1977 observed the existence of some recently weaned northern elephant seal pups which either stole milk from nursing females or were "adopted by foster mothers." Male pups were more persistent and successful at stealing milk, and the largest weaners were universally male, including exceptionally large weaners which the study defined as "superweaners". These seals were "so large that their corpulence impeded their movements"; observation of two of them showed that their ability to acquire additional milk after being weaned was a major factor in their size. The study additionally found that the large weaner seals reach their large sizes through two distinct strategies: by stealing milk from nursing female elephant seals ("milk thieves"), or by being adopted by an additional mother elephant seal ("double mother-sucklers"). A 2014 study published in Proceedings of the Royal Society B explored the benefits of high fat stores in female northern elephant seals, which relate to their buoyancy. Daniel P. Costa, one of the authors
https://en.wikipedia.org/wiki/Microsoft%20Speech%20API
The Speech Application Programming Interface or SAPI is an API developed by Microsoft to allow the use of speech recognition and speech synthesis within Windows applications. To date, a number of versions of the API have been released, which have shipped either as part of a Speech SDK or as part of the Windows OS itself. Applications that use SAPI include Microsoft Office, Microsoft Agent and Microsoft Speech Server. In general, all versions of the API have been designed such that a software developer can write an application to perform speech recognition and synthesis by using a standard set of interfaces, accessible from a variety of programming languages. In addition, it is possible for a 3rd-party company to produce their own Speech Recognition and Text-To-Speech engines or adapt existing engines to work with SAPI. In principle, as long as these engines conform to the defined interfaces they can be used instead of the Microsoft-supplied engines. In general, the Speech API is a freely redistributable component which can be shipped with any Windows application that wishes to use speech technology. Many versions (although not all) of the speech recognition and synthesis engines are also freely redistributable. There have been two main 'families' of the Microsoft Speech API. SAPI versions 1 through 4 are all similar to each other, with extra features in each newer version. SAPI 5, however, was a completely new interface, released in 2000. Since then several sub-versions of this API have been released. Basic architecture The Speech API can be viewed as an interface or piece of middleware which sits between applications and speech engines (recognition and synthesis). In SAPI versions 1 to 4, applications could directly communicate with engines. The API included an abstract interface definition which applications and engines conformed to. Applications could also use simplified higher-level objects rather than directly call methods on the engines. In SAPI 5 howeve
https://en.wikipedia.org/wiki/Hexagonal%20phase
A hexagonal phase of lyotropic liquid crystal is formed by some amphiphilic molecules when they are mixed with water or another polar solvent. In this phase, the amphiphile molecules are aggregated into cylindrical structures of indefinite length and these cylindrical aggregates are disposed on a hexagonal lattice, giving the phase long-range orientational order. In normal topology hexagonal phases, which are formed by type I amphiphiles, the hydrocarbon chains are contained within the cylindrical aggregates such that the polar-apolar interface has a positive mean curvature. Inverse topology hexagonal phases have water within the cylindrical aggregates and the hydrocarbon chains fill the voids between the hexagonally packed cylinders. Normal topology hexagonal phases are denoted by HI while inverse topology hexagonal phases are denoted by HII. When viewed by polarization microscopy, thin films of both normal and inverse topology hexagonal phases exhibit birefringence, giving rise to characteristic optical textures. Typically, these textures are smoke-like, fan-like or mosaic in appearance. The phases are highly viscous and small air bubbles trapped within the preparation have highly distorted shapes. Size and shapes of lamellar, micellar and hexagonal phases of lipid bilayer phase behavior and mixed lipid polymorphism in aqueous dispersions can be easily identified and characterized by negative staining transmission electron microscopy too. See also Lamellar phase Lipid polymorphism Micelle
https://en.wikipedia.org/wiki/American%20Graphics%20Institute
American Graphics Institute, Inc. (AGI) is a company headquartered in the Boston suburb of Woburn, Massachusetts that provides publishing, consulting and technical training. The institute also writes and publishes books about business strategy and design technology. History American Graphics Institute was founded in 1994 by Christopher Smith and Jennifer Smith. AGI initially provided instruction on the use of early desktop publishing software from companies such as Adobe Systems and Quark, Inc. but later began teaching web publishing and interactive design classes. In 2007, the company was acquired by creative staffing firm Aquent and renamed Aquent Graphics Institute. In July 2009, the founders reacquired AGI and it was again renamed American Graphics Institute. Educational content AGI's founders and instructors are the creators of various books, e-books, and video tutorials. The books cover 16 different topics including web design, HTML, Adobe, Photoshop, and Microsoft Office, some of which were created for the For Dummies book series. In 2013, AGI partnered with publisher John Wiley & Sons to launch Digital Classroom, a digital subscription service that gave subscribers access to 2,500 video tutorials and 50 e-books many created by AGI. The Digital Classroom subscription service is no longer available but its e-books are still in publication some used internationally in universities and colleges for classes that teach design and publishing. Development training and consulting AGI's development training services include certificate programs, classes at training centers and through online courses, and private training for groups and organizations. AGI has training centers in Boston, Chicago, London, New York City, Orlando, and Philadelphia. CRE8 conference AGI hosted the annual CRE8 Conference in Florida which provided professional development education for marketing and design professionals. Conference speakers included Marissa Mayer, Al Gore, and Michae
https://en.wikipedia.org/wiki/List%20of%20logic%20symbols
In logic, a set of symbols is commonly used to express logical representation. The following table lists many common symbols, together with their name, how they should be read out loud, and the related field of mathematics. Additionally, the subsequent columns contains an informal explanation, a short example, the Unicode location, the name for use in HTML documents, and the LaTeX symbol. Basic logic symbols Advanced and rarely used logical symbols These symbols are sorted by their Unicode value: Usage in various countries Poland in Poland, the universal quantifier is sometimes written ∧, and the existential quantifier as ∨. The same applies for Germany. Japan The ⇒ symbol is often used in text to mean "result" or "conclusion", as in "We examined whether to sell the product ⇒ We will not sell it". Also, the → symbol is often used to denote "changed to", as in the sentence "The interest rate changed. March 20% → April 21%". See also Józef Maria Bocheński List of notation used in Principia Mathematica List of mathematical symbols Logic alphabet, a suggested set of logical symbols Logical connective Mathematical operators and symbols in Unicode Non-logical symbol Polish notation Truth function Truth table Wikipedia:WikiProject Logic/Standards for notation
https://en.wikipedia.org/wiki/Plantae%20Preissianae
Plantae preissianae sive enumeratio plantarum quas in australasia occidentali et meridionali-occidentali annis 1838-1841 collegit Ludovicus Preiss, more commonly known as Plantae preissianae, is a book written by Johann Georg Christian Lehmann and Ludwig Preiss. Written in Latin, it is composed of two volumes and was first published by Sumptibus Meissneri in Hamburg between 1844 and 1847. The two volumes were published in six separate parts. The books detail the plants collected by Ludwig Preiss, James Drummond, Thomas Livingstone Mitchell and Johann Lhotsky in Western Australia. The books are regarded as one of the earliest and most important contributions to the study of the flora of Western Australia. Priess amassed a collection of over 2,700 species of plants while in Western Australia from 1838 to 1842 when he returned to Germany. As a result of Priess' samples and notes Lehmann and his team of botanists, Stephan Endlicher, Christian Gottfried Daniel Nees von Esenbeck, Gustav Kunze, Carl Meissner, Friedrich Gottlieb Bartling, Johannes Conrad Schauer, Friedrich Anton Wilhelm Miquel and Ernst Gottlieb von Steudel, were able to study and name the plants in the next five years.
https://en.wikipedia.org/wiki/Journal%20of%20Algebra%20and%20Its%20Applications
The Journal of Algebra and Its Applications covers both theoretical and applied algebra, with a focus on practical applications. It is published by World Scientific. According to the Journal Citation Reports, the journal has a 2020 impact factor of 0.736. Abstracting and indexing The journal is abstracted and indexed in: Mathematical Reviews Zentralblatt MATH Science Citation Index Expanded Current Contents/Physical Chemical and Earth Sciences Journal Citation Reports/Science Edition INSPEC
https://en.wikipedia.org/wiki/Ectoparasiticide
An ectoparasiticide is an antiparasitic drug used in the treatment of ectoparasitic infestations. These drugs are used to kill the parasites that live on the body surface. Permethrin, sulfur, lindane, dicophane, benzyl benzoate, ivermectin and crotamiton are well known ectoparasiticides. Permethrin Broad-spectrum and potent pyrethroid insecticide  and is most convenient for both scabies and lice. First choice drug. 100% cure rate. Causes neurological paralysis in insects probably by delaying depolarisation. Crotamiton Second choice drug. Effective scabicide, pediculocide and antipruritic. Cure rate 60-88%. Benzyl benzoate 2nd line drug for scabies and is seldom used for pediculosis. Cure rate 76-100% Lindane Effective in treating head lice (67-92%cure) and scabies (84-92% cure) with a single treatment. Penetrates through chitinous covers and affecting the nervous system. Sulfur Oldest scabicide and weak pediculocide, antiseptic, fungicide and keratolytic. Applied to skin, it is slowly reduced to H2S and oxidized to SO2 and pentathionic acid, which dissolve the cuticle of itch mites and kill it. Ivermectin Antihelminthic drug found highly effective in scabies and pediculosis. It is the only orally administered drug used for ectoparasitosis. Acts through a glutamate-gated Cl− ion channel found only in invertebrates. Dicophan Insecticide for mosquito, flies and other pests. Penetrates through the exoskeleton and acts as a neurotoxin.
https://en.wikipedia.org/wiki/Bifurcation%20diagram
Consider a system of differential equations that describes some physical quantity, that for concreteness could represent one of three examples: 1. the position and velocity of an undamped and frictionless pendulum, 2. a neuron's membrane potential over time, and 3. the average concentration of a virus in a patient's bloodstream. The differential equations for these examples include *parameters* that may affect the output of the equations. Changing the pendulum's mass and length will affect its oscillation frequency, changing the magnitude of injected current into a neuron may transition the membrane potential from resting to spiking, and the long-term viral load in the bloodstream may decrease with carefully timed treatments. In general, researchers may seek to quantify how the long-term (asymptotic) behavior of a system of differential equations changes if a parameter is changed. In the dynamical systems branch of mathematics, a bifurcation diagram quantifies these changes by showing how fixed points, periodic orbits, or chaotic attractors of a system change as a function of bifurcation parameter. Bifurcation diagrams are used to visualize these changes. Logistic map An example is the bifurcation diagram of the logistic map: The bifurcation parameter r is shown on the horizontal axis of the plot and the vertical axis shows the set of values of the logistic function visited asymptotically from almost all initial conditions. The bifurcation diagram shows the forking of the periods of stable orbits from 1 to 2 to 4 to 8 etc. Each of these bifurcation points is a period-doubling bifurcation. The ratio of the lengths of successive intervals between values of r for which bifurcation occurs converges to the first Feigenbaum constant. The diagram also shows period doublings from 3 to 6 to 12 etc., from 5 to 10 to 20 etc., and so forth. Symmetry breaking in bifurcation sets In a dynamical system such as which is structurally stable when , if a bifurcation diagram
https://en.wikipedia.org/wiki/TCP%20pacing
In the field of computer networking, TCP pacing is the denomination of a set of techniques to make the pattern of packet transmission generated by the Transmission Control Protocol less bursty. It can be conducted by the network scheduler. Bursty traffic can lead to higher queuing delays, more packet losses and lower throughput. However it has been observed that TCP's congestion control mechanisms may lead to bursty traffic on high bandwidth and highly multiplexed networks, a proposed solution to this problem is TCP pacing. TCP pacing involves evenly spacing data transmissions across a round-trip time. See also Micro-bursting (networking)
https://en.wikipedia.org/wiki/Invar
Invar, also known generically as FeNi36 (64FeNi in the US), is a nickel–iron alloy notable for its uniquely low coefficient of thermal expansion (CTE or α). The name Invar comes from the word invariable, referring to its relative lack of expansion or contraction with temperature changes, and is a registered trademark of ArcelorMittal. The discovery of the alloy was made in 1895 by Swiss physicist Charles Édouard Guillaume for which he received the Nobel Prize in Physics in 1920. It enabled improvements in scientific instruments. Properties Like other nickel/iron compositions, Invar is a solid solution; that is, it is a single-phase alloy. In one commercial version it consists of approximately 36% nickel and 64% iron. The invar range was described by Westinghouse scientists in 1961 as "30–45 atom per cent nickel". Common grades of Invar have a coefficient of thermal expansion (denoted α, and measured between 20 °C and 100 °C) of about 1.2 × 10−6 K−1 (1.2 ppm/°C), while ordinary steels have values of around 11–15 ppm/°C. Extra-pure grades (<0.1% Co) can readily produce values as low as 0.62–0.65 ppm/°C. Some formulations display negative thermal expansion (NTE) characteristics. Though it displays high dimensional stability over a range of temperatures, it does have a propensity to creep. Applications Invar is used where high dimensional stability is required, such as precision instruments, clocks, seismic creep gauges, television shadow-mask frames, valves in engines and large aerostructure molds. One of its first applications was in watch balance wheels and pendulum rods for precision regulator clocks. At the time it was invented, the pendulum clock was the world's most precise timekeeper, and the limit to timekeeping accuracy was due to thermal variations in length of clock pendulums. The Riefler regulator clock developed in 1898 by Clemens Riefler, the first clock to use an Invar pendulum, had an accuracy of 10 milliseconds per day, and served as the prim
https://en.wikipedia.org/wiki/DyP-type%20peroxidase%20family
In molecular biology, the DyP-type peroxidase family is a family of haem peroxidase enzymes. Haem peroxidases were originally divided into two superfamilies, namely, the animal peroxidases and the plant peroxidases (which are subdivided into class I, II and III), which include fungal (class II) and bacterial peroxidases. The DyP (for dye de-colourising peroxidase) family constitutes a novel class of haem peroxidase. Because these enzymes were derived from fungal sources, the DyP family was thought to be structurally related to the class II secretory fungal peroxidases. However, the DyP family exhibits only low sequence similarity to classical fungal peroxidases, such as LiP and MnP, and does not contain the conserved proximal and distal histidines and an essential arginine found in other plant peroxidase superfamily members. DyP proteins have several characteristics that distinguish them from all other peroxidases, including a particularly wide substrate specificity, a lack of homology to most other peroxidases, and the ability to function well under much lower pH conditions compared with the other plant peroxidases. In terms of substrate specificity, DyP degrades the typical peroxidase substrates, but also degrades hydroxyl-free anthraquinone (many dyes are derived from anthraquinone compounds). Crystal structures of DyP family members reveal two domains, each one adopting a ferredoxin-like fold. The proteins consist of an N-terminal domain and a C-terminal domain likely to be related by a duplication of an ancestral gene, as inferred from the conserved topology of the domains. The haem iron is penta-coordinated, with the protein contributing a conserved histidine ligand to the iron centre. A conserved Asp most likely acts as a proton donor/acceptor and takes the place of the catalytic histidine used by plant peroxidases. This Asp substitution helps explain why the DyP family is active at low pH.
https://en.wikipedia.org/wiki/Thermochromic%20ink
Thermochromic ink (also called thermochromatic ink) is a type of dye that changes color when temperatures increase or decrease. Often used in the manufacture of many toys or product packaging, as well as thermometers. Thermochromic ink can also turn transparent when heat is applied; an example of this type of thermochromic ink is found on corners of an examination mark sheet. This proves that the sheet has not been edited or photocopied, and also on certain pizza boxes to show the temperature of the product. Use on packaging can be to detect temperature history during shipping and to indicate proper heating in an oven. Examples On June 20, 2017, the United States Postal Service released the first application of thermochromic ink to postage stamps in its Total Eclipse of the Sun Forever stamp to commemorate the solar eclipse of August 21, 2017. When pressed with a finger, body heat turns the black circle in the center of the stamp into an image of the full moon. The stamp image is a photo of a total solar eclipse seen in Jalu, Libya, on March 29, 2006. The photo was taken by retired NASA astrophysicist Fred Espenak, aka "Mr. Eclipse". See also Thermochromism Security printing Active packaging
https://en.wikipedia.org/wiki/G.%20N.%20Watson
George Neville Watson (31 January 1886 – 2 February 1965) was an English mathematician, who applied complex analysis to the theory of special functions. His collaboration on the 1915 second edition of E. T. Whittaker's A Course of Modern Analysis (1902) produced the classic "Whittaker and Watson" text. In 1918 he proved a significant result known as Watson's lemma, that has many applications in the theory on the asymptotic behaviour of exponential integrals. Life He was born in Westward Ho! in Devon the son of George Wentworth Watson, a schoolmaster and genealogist, and his wife, Mary Justina Griffith. He was educated at St Paul's School in London, as a pupil of F. S. Macaulay. He then studied Mathematics at Trinity College, Cambridge. There he encountered E. T. Whittaker, though their overlap was only two years. From 1914 to 1918 he lectured in Mathematics at University College, London. He became Professor of Pure Mathematics at the University of Birmingham in 1918, replacing Prof R S Heath, and remained in this role until 1951. He was awarded an honorary MSc Pure Science in 1919 by Birmingham University. He was President of the London Mathematical Society 1933/35. He died at Leamington Spa on 2 February 1965. Works His Treatise on the theory of Bessel functions (1922) also became a classic, in particular in regard to the asymptotic expansions of Bessel functions. He subsequently spent many years on Ramanujan's formulae in the area of modular equations, mock theta functions and q-series, and for some time looked after Ramanujan's lost notebook. Ramanujan discovered many more modular equations than all of his mathematical predecessors combined. Watson provided proofs for most of Ramanujan's modular equations. Bruce C. Berndt completed the project begun by Watson and Wilson. Much of Berndt's book Ramanujan's Notebooks, Part 3 (1998) is based upon the prior work of Watson. Watson's interests included solvable cases of the quintic equation. He introduced Wa
https://en.wikipedia.org/wiki/Hyperbolic%20manifold
In mathematics, a hyperbolic manifold is a space where every point looks locally like hyperbolic space of some dimension. They are especially studied in dimensions 2 and 3, where they are called hyperbolic surfaces and hyperbolic 3-manifolds, respectively. In these dimensions, they are important because most manifolds can be made into a hyperbolic manifold by a homeomorphism. This is a consequence of the uniformization theorem for surfaces and the geometrization theorem for 3-manifolds proved by Perelman. Rigorous definition A hyperbolic -manifold is a complete Riemannian -manifold of constant sectional curvature . Every complete, connected, simply-connected manifold of constant negative curvature is isometric to the real hyperbolic space . As a result, the universal cover of any closed manifold of constant negative curvature is . Thus, every such can be written as where is a torsion-free discrete group of isometries on . That is, is a discrete subgroup of . The manifold has finite volume if and only if is a lattice. Its thick–thin decomposition has a thin part consisting of tubular neighborhoods of closed geodesics and ends which are the product of a Euclidean ()-manifold and the closed half-ray. The manifold is of finite volume if and only if its thick part is compact. Examples The simplest example of a hyperbolic manifold is hyperbolic space, as each point in hyperbolic space has a neighborhood isometric to hyperbolic space. A simple non-trivial example, however, is the once-punctured torus. This is an example of an (Isom(), )-manifold. This can be formed by taking an ideal rectangle in – that is, a rectangle where the vertices are on the boundary at infinity, and thus don't exist in the resulting manifold – and identifying opposite images. In a similar fashion, we can construct the thrice-punctured sphere, shown below, by gluing two ideal triangles together. This also shows how to draw curves on the surface – the black line in the diagram becomes
https://en.wikipedia.org/wiki/Maxwell%20Rosenlicht
Maxwell Alexander Rosenlicht (April 15, 1924 – January 22, 1999) was an American mathematician known for works in algebraic geometry, algebraic groups, and differential algebra. Rosenlicht went to school in Brooklyn (Erasmus High School) and studied at Columbia University (B.A. 1947) and at Harvard University, where he studied under Zariski. He became a Putnam fellow twice, in 1946 and 1947. He was awarded in his doctorate on an Algebraic Curve Equivalence Concepts in 1950. In 1952, he went to Northwestern University. From 1958 until his retirement in 1991, he was a professor at Berkeley. He was also a visiting professor in Mexico City, IHÉS, Rome, Leiden, and Harvard University. In 1960, he shared the Cole Prize in algebra with Serge Lang for his work on generalized Jacobian varieties. He also studied the algorithmic algebraic theory of integration. Rosenlicht was a Fulbright Fellow and 1954 Guggenheim Fellow. He died of neurological disease on a trip to Hawaii. Rosenlicht married in 1954 and had four children. Publications
https://en.wikipedia.org/wiki/Isoguanine
Isoguanine or 2-hydroxyadenine is a purine base that is an isomer of guanine. It is a product of oxidative damage to DNA and has been shown to cause mutation. It is also used in combination with isocytosine in studies of unnatural nucleic acid analogues of the normal base pairs in DNA. It is used as a nucleobase of hachimoji nucleic acids. In hachimoji DNA, it pairs with 1-methylcytosine, while in hachimoji RNA, it pairs with isocytosine.
https://en.wikipedia.org/wiki/Spectral%20energy%20distribution
A spectral energy distribution (SED) is a plot of energy versus frequency or wavelength of light (not to be confused with a 'spectrum' of flux density vs frequency or wavelength). It is used in many branches of astronomy to characterize astronomical sources. For example, in radio astronomy they are used to show the emission from synchrotron radiation, free-free emission and other emission mechanisms. In infrared astronomy, SEDs can be used to classify young stellar objects. Detector for spectral energy distribution The count rates observed from a given astronomical radiation source have no simple relationship to the flux from that source, such as might be incident at the top of the Earth's atmosphere. This lack of a simple relationship is due in no small part to the complex properties of radiation detectors. These detector properties can be divided into those that merely attenuate the beam, including residual atmosphere between source and detector, absorption in the detector window when present, quantum efficiency of the detecting medium, those that redistribute the beam in detected energy, such as fluorescent photon escape phenomena, inherent energy resolution of the detector. See also Astronomical radio source Astronomical X-ray sources Background radiation Bremsstrahlung Cosmic microwave background spectral distortions Cyclotron radiation Electromagnetic radiation Synchrotron radiation Wavelength dispersive X-ray spectroscopy
https://en.wikipedia.org/wiki/Colombeau%20algebra
In mathematics, a Colombeau algebra is an algebra of a certain kind containing the space of Schwartz distributions. While in classical distribution theory a general multiplication of distributions is not possible, Colombeau algebras provide a rigorous framework for this. Such a multiplication of distributions has long been believed to be impossible because of L. Schwartz' impossibility result, which basically states that there cannot be a differential algebra containing the space of distributions and preserving the product of continuous functions. However, if one only wants to preserve the product of smooth functions instead such a construction becomes possible, as demonstrated first by Colombeau. As a mathematical tool, Colombeau algebras can be said to combine a treatment of singularities, differentiation and nonlinear operations in one framework, lifting the limitations of distribution theory. These algebras have found numerous applications in the fields of partial differential equations, geophysics, microlocal analysis and general relativity so far. Colombeau algebras are named after French mathematician Jean François Colombeau. Schwartz' impossibility result Attempting to embed the space of distributions on into an associative algebra , the following requirements seem to be natural: is linearly embedded into such that the constant function becomes the unity in , There is a partial derivative operator on which is linear and satisfies the Leibniz rule, the restriction of to coincides with the usual partial derivative, the restriction of to coincides with the pointwise product. However, L. Schwartz' result implies that these requirements cannot hold simultaneously. The same is true even if, in 4., one replaces by , the space of times continuously differentiable functions. While this result has often been interpreted as saying that a general multiplication of distributions is not possible, in fact it only states that one cannot unrestricted
https://en.wikipedia.org/wiki/Tjalling%20Koopmans
Tjalling Charles Koopmans (August 28, 1910 – February 26, 1985) was a Dutch-American mathematician and economist. He was the joint winner with Leonid Kantorovich of the 1975 Nobel Memorial Prize in Economic Sciences for his work on the theory of the optimum allocation of resources. Koopmans showed that on the basis of certain efficiency criteria, it is possible to make important deductions concerning optimum price systems. Biography Koopmans was born in 's-Graveland, Netherlands. He began his university education at the Utrecht University at seventeen, specializing in mathematics. Three years later, in 1930, he switched to theoretical physics. In 1933, he met Jan Tinbergen, the winner of the 1969 Nobel Memorial Prize in Economics, and moved to Amsterdam to study mathematical economics under him. In addition to mathematical economics, Koopmans extended his explorations to econometrics and statistics. In 1936 he graduated from Leiden University with a PhD, under the direction of Hendrik Kramers. The title of the thesis was "Linear regression analysis of economic time series". He also worked for the Economic and Financial Organization of the League of Nations. Koopmans moved to the United States in 1940. There he worked for a while for a government body in Washington, D.C., where he published on the economics of transportation focusing on optimal routing, then moved to Chicago where he joined a research body, the Cowles Commission for Research in Economics, affiliated with the University of Chicago. In 1946, he became a naturalized citizen of the United States and in 1948 director of the Cowles Commission. Also in 1948, he was elected as a Fellow of the American Statistical Association. In 1950 he became a corresponding member of the Royal Netherlands Academy of Arts and Sciences. Rising hostile opposition to the Cowles Commission by the department of economics at University of Chicago during the 1950s led Koopmans to convince the Cowles family to move it to Yale
https://en.wikipedia.org/wiki/Stuart%20Kauffman
Stuart Alan Kauffman (born September 28, 1939) is an American medical doctor, theoretical biologist, and complex systems researcher who studies the origin of life on Earth. He was a professor at the University of Chicago, University of Pennsylvania, and University of Calgary. He is currently emeritus professor of biochemistry at the University of Pennsylvania and affiliate faculty at the Institute for Systems Biology. He has a number of awards including a MacArthur Fellowship and a Wiener Medal. He is best known for arguing that the complexity of biological systems and organisms might result as much from self-organization and far-from-equilibrium dynamics as from Darwinian natural selection, as discussed in his book Origins of Order (1993). In 1967 and 1969 he used random Boolean networks to investigate generic self-organizing properties of gene regulatory networks, proposing that cell types are dynamical attractors in gene regulatory networks and that cell differentiation can be understood as transitions between attractors. Recent evidence suggests that cell types in humans and other organisms are attractors. In 1971 he suggested that a zygote may not be able to access all the cell type attractors in its gene regulatory network during development and that some of the developmentally inaccessible cell types might be cancer cell types. This suggested the possibility of "cancer differentiation therapy". He also proposed the self-organized emergence of collectively autocatalytic sets of polymers, specifically peptides, for the origin of molecular reproduction, which have found experimental support. Education and early career Kauffman graduated from Dartmouth in 1960, was awarded the BA (Hons) by Oxford University (where he was a Marshall Scholar) in 1963, and completed a medical degree (M.D.) at the University of California, San Francisco in 1968. After completing his internship, he moved into developmental genetics of the fruitfly, holding appointments first at the
https://en.wikipedia.org/wiki/Ergebnisse%20der%20Mathematik%20und%20ihrer%20Grenzgebiete
Ergebnisse der Mathematik und ihrer Grenzgebiete/A Series of Modern Surveys in Mathematics is a series of scholarly monographs published by Springer Science+Business Media. The title literally means "Results in mathematics and related areas". Most of the books were published in German or English, but there were a few in French and Italian. There have been several sequences, or Folge: the original series, neue Folge, and 3.Folge. Some of the most significant mathematical monographs of 20th century appeared in this series. Original series The series started in 1932 with publication of Knotentheorie by Kurt Reidemeister as "Band 1" (English: volume 1). There seems to have been double numeration in this sequence. Neue Folge This sequence started in 1950 with the publication of Transfinite Zahlen by Heinz Bachmann. The volumes are consecutively numbered, designated as either "Band" or "Heft". A total of 100 volumes was published, often in multiple editions, but preserving the original numbering within the series. The ISSN for this sequence is 0071-1136. As of February 2008, P. R. Halmos, P. J. Hilton, R. Remmert, and B. Szökefalvi-Nagy are listed on the series' website as the editors of the defunct 2. Folge. 3. Folge This sequence started in 1983 with the publication of Galois module structure of algebraic integers by Albrecht Fröhlich. As of February 2008, the editor-in-chief is R. Remmert. External links Series of mathematics books
https://en.wikipedia.org/wiki/Characterization%20%28materials%20science%29
Characterization, when used in materials science, refers to the broad and general process by which a material's structure and properties are probed and measured. It is a fundamental process in the field of materials science, without which no scientific understanding of engineering materials could be ascertained. The scope of the term often differs; some definitions limit the term's use to techniques which study the microscopic structure and properties of materials, while others use the term to refer to any materials analysis process including macroscopic techniques such as mechanical testing, thermal analysis and density calculation. The scale of the structures observed in materials characterization ranges from angstroms, such as in the imaging of individual atoms and chemical bonds, up to centimeters, such as in the imaging of coarse grain structures in metals. While many characterization techniques have been practiced for centuries, such as basic optical microscopy, new techniques and methodologies are constantly emerging. In particular the advent of the electron microscope and secondary ion mass spectrometry in the 20th century has revolutionized the field, allowing the imaging and analysis of structures and compositions on much smaller scales than was previously possible, leading to a huge increase in the level of understanding as to why different materials show different properties and behaviors. More recently, atomic force microscopy has further increased the maximum possible resolution for analysis of certain samples in the last 30 years. Microscopy Microscopy is a category of characterization techniques which probe and map the surface and sub-surface structure of a material. These techniques can use photons, electrons, ions or physical cantilever probes to gather data about a sample's structure on a range of length scales. Some common examples of microscopy techniques include: Optical microscopy Scanning electron microscopy (SEM) Transmission electron mi
https://en.wikipedia.org/wiki/Battle%20management%20language
A Battle Management Language (BML) is the unambiguous language used to command and control forces and equipment conducting military operations and to provide for situational awareness and a shared, common operational picture. It can be seen as a standard digitized representation of a commander's intent to be used for real troops, for simulated troops, and for future robotic forces. BML is particularly relevant in a network centric environment for enabling mutual understanding. The need for common BML was identified by the U.S. Army's Simulation to C4I Interoperability Overarching Integrated Product Team (SIMCI OIPT) and was originally defined in a paper titled Standardizing Battle Management Language - A Vital Move Towards the Army Transformation published by the Simulation Interoperability Standards Organization in 2001 . The same issues that have driven the Army to embark on this program also confront the other Services C4ISR and simulation systems, and future military operations. Acknowledging the significant need for training in joint environments to support future operations, SISO and other BML development efforts have expanded to encompass Joint BML (J-BML) for all military branches and ultimately to more recent work on establishing a Coalition BML (C-BML) for all Services and multinational coalition members promoting interoperability among their C4ISR systems and simulations, and also among systems employed in real-world operations. Coalition Battle Management Language Coalition Battle Management Language (C-BML, CBML) is an unambiguous language to describe a commander's intent, to be understood by both live forces and automated systems, for multi-national simulated and real world operations. Following a meeting of subject matter experts at the Spring 2004 SIW, the Simulation Interoperability Standards Organization determined that a detailed evaluation of BML efforts at a coalition level was necessary and formally established a Coalition BML (C-BML) Stud
https://en.wikipedia.org/wiki/OnDemand
OnDemand is a brand name for a video-on-demand, London-based company owned by the On Demand Group, who provide mobile video services such as pay-per-view to over 25 million subscribers. Their product is sold through middleware to smart TV companies such as Panasonic. They have teamed up with Hollywood companies such as Twentieth Century Fox Home Entertainment to supply their services across multiple platforms for TV, broadband and mobile, and across multi-territories in partnership with companies such as Virgin Media. Together with Inview Technology they are providing viewers with access to movies on a transactional video-on-demand (TVOD) basis, and a library of on-demand TV content available on an SVOD basis including TV series, children's programming, classic movies and music videos. See also 10-foot user interface Enhanced TV Second screen C-Cast Home theater PC Interactive television Hotel television systems Hybrid Broadcast Broadband TV List of digital distribution platforms for mobile devices Non-linear media Over-the-top content TV Genius Smartphone Tivoization
https://en.wikipedia.org/wiki/Absorption%20%28electromagnetic%20radiation%29
In physics, absorption of electromagnetic radiation is how matter (typically electrons bound in atoms) takes up a photon's energy — and so transforms electromagnetic energy into internal energy of the absorber (for example, thermal energy). A notable effect of the absorption of electromagnetic radiation is attenuation of the radiation; attenuation is the gradual reduction of the intensity of light waves as they propagate through the medium. Although the absorption of waves does not usually depend on their intensity (linear absorption), in certain conditions (optics) the medium's transparency changes by a factor that varies as a function of wave intensity, and saturable absorption (or nonlinear absorption) occurs. Quantifying absorption Many approaches can potentially quantify radiation absorption, with key examples following. The absorption coefficient along with some closely related derived quantities The attenuation coefficient (NB used infrequently with meaning synonymous with "absorption coefficient") The Molar attenuation coefficient (also called "molar absorptivity"), which is the absorption coefficient divided by molarity (see also Beer–Lambert law) The mass attenuation coefficient (also called "mass extinction coefficient"), which is the absorption coefficient divided by density The absorption cross section and scattering cross-section, related closely to the absorption and attenuation coefficients, respectively "Extinction" in astronomy, which is equivalent to the attenuation coefficient Other measures of radiation absorption, including penetration depth and skin effect, propagation constant, attenuation constant, phase constant, and complex wavenumber, complex refractive index and extinction coefficient, complex dielectric constant, electrical resistivity and conductivity. Related measures, including absorbance (also called "optical density") and optical depth (also called "optical thickness") All these quantities measure, at least to some ex
https://en.wikipedia.org/wiki/13th%20root
Extracting the 13th root of a number is a famous category for the mental calculation world records. The challenge consists of being given a large number (possibly over 100 digits) and asked to return the number that, when taken to the 13th power, equals the given number. For example, the 13th root of 8,192 is 2 and the 13th root of 96,889,010,407 is 7. Properties of the challenge Extracting the 13th root has certain properties. One is that the 13th root of a number is much smaller: a 13th root will have approximately 1/13th the number of digits. Thus, the 13th root of a 100-digit number only has 8 digits and the 13th root of a 200-digit number will have 16 digits. Furthermore, the last digit of the 13th root is always the same as the last digit of the power. For the 13th root of a 100-digit number there are 7,992,563 possibilities, in the range 41,246,264 – 49,238,826. This is considered a relatively easy calculation. There are 393,544,396,177,593 possibilities, in the range 2,030,917,620,904,736 – 2,424,462,017,082,328, for the 13th root of a 200-digit number. This is considered a difficult calculation. Records The Guinness Book of World Records has published records for extracting the 13th root of a 100-digit number. All world records for mentally extracting a 13th root have been for numbers with an integer root: The first record was 23 minutes by De Grote (Mexico). The most published time was at one time 88.8 seconds by Klein (Netherlands). Mittring calculated it in 39 seconds. Alexis Lemaire has broken this record with 13.55 seconds. This is the last official world record for extracting the 13th root of a 100-digit number. Mittring attempted to break this record with 11.8 seconds, but it was rejected by all organizations (Saxonia Record club, Guinness, 13th root group). Lemaire broke this record unofficially 6 times, twice within 4 seconds: the best was 3.625 seconds. Lemaire has also set the first world record for the 13th root of a 200-dig
https://en.wikipedia.org/wiki/Networked%20flying%20platform
Networked flying platforms (NFPs) are unmanned flying platforms of various types including unmanned aerial vehicles (UAVs), drones, tethered balloon and high-altitude/medium-altitude/low-altitude platforms (HAPs/MAPs/LAPs) carrying RF/mmWave/FSO payload (transceivers) along with an extended battery life capabilities, and are floating or moving in the air at a quasi-stationary positions with the ability to move horizontally and vertically to offer 5G and beyond 5G (B5G) cellular networks and network support services. Deployment configurations There are following two possible NFPs deployment configurations: Deployment configuration 1: NFPs are expected to complement the conventional cellular networks to further enhance the wireless capacity, expand the coverage and improve the network reliability for temporary events, where there is a high density of mobile users or small cells in a limited/hard to reach area or in a remote region where infrastructure is not available and expensive to deploy, e.g., sports events and concert gatherings Deployment configuration 2: NFPs can be deployed for unexpected scenarios, such as in emergency situations to support disaster relief activities and to enable communications when conventional cellular networks are either damaged or congested. In addition, owing to their mobility, NFPs are expected to deploy quickly and efficiently to support cellular networks, enhance network quality of service (QoS) and improve network resilience under emergency scenarios NFPs can be manually (non-autonomously) controlled but mainly designed for autonomous pre-determined flights. NFPs can either operate in a single NFP mode where NFPs do not cooperate with other NFPs in the network, if exists or a swarm of NFPs where multiple interconnected NFPs cooperate, collaborate and perform the network mission autonomously with one of the NFPs designated as mother-NFP
https://en.wikipedia.org/wiki/Myki%20%28password%20manager%29
Myki was a password manager and authenticator developed by Myki Security. Myki was available on iOS (requires iOS10 or higher) and Android (requires Android 5 or higher), as browser extensions on Chrome, Firefox, Safari, Opera and Microsoft Edge, and as a standalone desktop app for Windows, macOS, Linux, Arch Linux, and Debian. It was available in English, Arabic, French, German, Italian, Portuguese and Spanish. On 24 March 2022, MYKI announced Jump Cloud's acquisition of Myki and on 10 April 2022, Myki ceased to operate. Product Overview The Myki Password Manager and Authenticator was an offline (data stored on smartphone, not cloud) free mobile application for storing and managing passwords, credit cards, government IDs and notes. Myki was available on iOS and Android and was available as browser extensions on Chrome, Firefox. Safari and Opera. and as a standalone desktop app for Windows (requires Windows 8 or higher), macOS (requires MacOS 10.12 or higher), Linux (App image &. snap), Arch Linux (paceman), and Debian (.deb). Myki For Teams was an offline password manager for teams. Myki for Managed Service Providers enables MSPs to manage the passwords of the multiple companies they administer. Myki was named one of the Best Password Managers of 2018 globally by PC Magazine. History Myki Security was founded in 2015 by Antoine Vincent Jebara and Priscilla Elora Sharuk. Myki launched its product in a private beta in September 2016. In 2016, Myki was the first MENA-based company selected to compete in TechCrunch Disrupt Battlefield in San Francisco, California. In January 2017, Myki raised $1.2 million from BECO Capital in Dubai, United Arab Emirates, Leap Ventures and B&Y Venture Partners in Beirut, Lebanon. In 2019, Myki added a secure password-sharing feature, allowing users to share sensitive login credentials securely with trusted individuals, further differentiating it from other password managers in the market. End of support On 24 February 2022, it
https://en.wikipedia.org/wiki/Antimetric%20electrical%20network
An antimetric electrical network is an electrical network that exhibits anti-symmetrical electrical properties. The term is often encountered in filter theory, but it applies to general electrical network analysis. Antimetric is the diametrical opposite of symmetric; it does not merely mean "asymmetric" (i.e., "lacking symmetry"). It is possible for networks to be symmetric or antimetric in their electrical properties without being physically or topologically symmetric or antimetric. Definition
https://en.wikipedia.org/wiki/Biologist
A biologist is a scientist who conducts research in biology. Biologists are interested in studying life on Earth, whether it is an individual cell, a multicellular organism, or a community of interacting populations. They usually specialize in a particular branch (e.g., molecular biology, zoology, and evolutionary biology) of biology and have a specific research focus (e.g., studying malaria or cancer). Biologists who are involved in basic research have the aim of advancing knowledge about the natural world. They conduct their research using the scientific method, which is an empirical method for testing hypotheses. Their discoveries may have applications for some specific purpose such as in biotechnology, which has the goal of developing medically useful products for humans. In modern times, most biologists have one or more academic degrees such as a bachelor's degree plus an advanced degree like a master's degree or a doctorate. Like other scientists, biologists can be found working in different sectors of the economy such as in academia, nonprofits, private industry, or government. History Francesco Redi, the founder of biology, is recognized to be one of the greatest biologists of all time. Robert Hooke, an English natural philosopher, coined the term cell, suggesting plant structure's resemblance to honeycomb cells. Charles Darwin and Alfred Wallace independently formulated the theory of evolution by natural selection, which was described in detail in Darwin's book On the Origin of Species, which was published in 1859. In it, Darwin proposed that the features of all living things, including humans, were shaped by natural processes of descent with accumulated modification leading to divergence over long periods of time. The theory of evolution in its current form affects almost all areas of biology. Separately, Gregor Mendel formulated in the principles of inheritance in 1866, which became the basis of modern genetics. In 1953, James D. Watson and Francis
https://en.wikipedia.org/wiki/8-Hydroxyguanosine
8-Hydroxyguanosine is an RNA nucleoside which is an oxidative derivative of guanosine. Measurement of the levels of 8-hydroxyguanosine is used as a biomarker of oxidative stress causing RNA damage. See also 8-Oxo-2'-deoxyguanosine
https://en.wikipedia.org/wiki/The%20Doomsday%20Machine%20%28book%29
The Doomsday Machine: The High Price of Nuclear Energy, the World's Most Dangerous Fuel is a 2012 book by Martin Cohen and Andrew McKillop which addresses a broad range of concerns regarding the nuclear industry, the economics and environmental aspects of nuclear energy, nuclear power plants, and nuclear accidents. The book has been described by The New York Times as "a polemic on the evils of splitting the atom". Synopsis Economic fundamentals "The usual rule of thumb for nuclear power is that about two thirds of the generation cost is accounted for by fixed costs, the main ones being the cost of paying interest on the loans and repaying the capital..." Areva, the French nuclear plant operator, for example, offers that 70 percent of the cost of a kWh of nuclear electricity is accounted for by the fixed costs from the construction process. In the foreword to the book, Steve Thomas, Professor of Energy Studies at the University of Greenwich in the UK, states that "the economic realities of rapidly escalating costs and insurmountable financing problems... will mean that the much-hyped nuclear renaissance will one day be remembered as just another 'nuclear myth'." In discussions about the economics of nuclear power, the authors explain, what is often not appreciated is that the cost of equity, that is, companies using their own funds to pay for new plants, is generally higher than the cost of debt. Another advantage of borrowing may be that "once large loans have been arranged at low interest rates—perhaps with government support—the money can then be lent out at higher rates of return". Environmental platform As Matthew Wald in the New York Times noted, despite being at its heart environmentalist, the book challenges certain Green orthodoxies, notably the idea that whatever the risks of nuclear energy, the threat from man-made climate change is greater. As Chiara Proietti Silvestri wrote in a review for the Italian Energy journal Energia in the Doomsday Machin
https://en.wikipedia.org/wiki/Ran%20Raz
Ran Raz () is a computer scientist who works in the area of computational complexity theory. He was a professor in the faculty of mathematics and computer science at the Weizmann Institute. He is now a professor of computer science at Princeton University. Ran Raz received his Ph.D. at the Hebrew University of Jerusalem in 1992 under Avi Wigderson and Michael Ben-Or. Ran Raz is well known for his work on interactive proof systems. His two most-cited papers are on multi-prover interactive proofs and on probabilistically checkable proofs. Ran Raz received the Erdős Prize in 2002. His work has been awarded in the top conferences in theoretical computer science. In 2004, he received the best paper award in ACM Symposium on Theory of Computing (STOC) for , and the best paper award in IEEE Conference on Computational Complexity (CCC) for . In 2008, the work received the best paper award in IEEE Symposium on Foundations of Computer Science (FOCS). Selected publications . . . . . Notes Year of birth missing (living people) Living people Theoretical computer scientists Academic staff of Weizmann Institute of Science Israeli computer scientists Erdős Prize recipients
https://en.wikipedia.org/wiki/Windows%20Phone%208.1
Windows Phone 8.1 is the third generation of Microsoft's Windows Phone mobile operating system, succeeding Windows Phone 8. Rolled out at Microsoft's Build Conference in San Francisco, California, on April 2, 2014, it was released in final form to Windows Phone developers on April 14, 2014 and reached general availability on August 4, 2014. All Windows Phones running Windows Phone 8 can be upgraded to Windows Phone 8.1, with release dependent on carrier rollout dates. Windows Phone 8.1 is also the last version that uses the Windows Phone brand name as it was succeeded by Windows 10 Mobile. Some Windows Phone 8.1 devices are capable of being upgraded to Windows 10 Mobile. Microsoft delayed the upgrade and reduced the supported device list from their initial promise. Support has ended for Windows Phone 8.1 on July 11, 2017. History Windows Phone 8.1 was first rumored to be Windows Phone Blue, a series of updates to Microsoft's mobile operating system that would coincide with the release of Windows 8.1. Although Microsoft had originally planned to release WP8.1 in late 2013, shortly after the release of its PC counterpart, general distribution of the new operating system was pushed back until early 2014. Instead of waiting over a year to add new features to Windows Phone 8, Microsoft opted to release three incremental updates to its existing mobile OS. These updates are delivered with corresponding firmware updates for the specific devices. The updates included GDR2 (Lumia Amber), which introduced features such as "Data Sense", and GDR3 (Lumia Black), which brought support for quad-core processors, 1080p high-definition screens of up to six inches, the addition of a "Driving Mode," and extra rows of live tiles for larger "phablet" devices. The updated operating system's final name was leaked to the public when Microsoft released the Windows Phone 8.1 SDK to developers on February 10, 2014, but it wasn't until Microsoft's Build conference keynote on April 2, 2014 w
https://en.wikipedia.org/wiki/Witting%20polytope
In 4-dimensional complex geometry, the Witting polytope is a regular complex polytope, named as: 3{3}3{3}3{3}3, and Coxeter diagram . It has 240 vertices, 2160 3{} edges, 2160 3{3}3 faces, and 240 3{3}3{3}3 cells. It is self-dual. Each vertex belongs to 27 edges, 72 faces, and 27 cells, corresponding to the Hessian polyhedron vertex figure. Symmetry Its symmetry by 3[3]3[3]3[3]3 or , order 155,520. It has 240 copies of , order 648 at each cell. Structure The configuration matrix is: The number of vertices, edges, faces, and cells are seen in the diagonal of the matrix. These are computed by the order of the group divided by the order of the subgroup, by removing certain complex reflections, shown with X below. The number of elements of the k-faces are seen in rows below the diagonal. The number of elements in the vertex figure, etc., are given in rows above the digonal. Coordinates Its 240 vertices are given coordinates in : where . The last 6 points form hexagonal holes on one of its 40 diameters. There are 40 hyperplanes contain central 3{3}3{4}2, figures, with 72 vertices. Witting configuration Coxeter named it after Alexander Witting for being a Witting configuration in complex projective 3-space: or The Witting configuration is related to the finite space PG(3,22), consisting of 85 points, 357 lines, and 85 planes. Related real polytope Its 240 vertices are shared with the real 8-dimensional polytope 421, . Its 2160 3-edges are sometimes drawn as 6480 simple edges, slightly less than the 6720 edges of 421. The 240 difference is accounted by 40 central hexagons in 421 whose edges are not included in 3{3}3{3}3{3}3. The honeycomb of Witting polytopes The regular Witting polytope has one further stage as a 4-dimensional honeycomb, . It has the Witting polytope as both its facets, and vertex figure. It is self-dual, and its dual coincides with itself. Hyperplane sections of this honeycomb include 3-dimensional honeycombs . The honeycomb of Witting