source
stringlengths 31
227
| text
stringlengths 9
2k
|
|---|---|
https://en.wikipedia.org/wiki/MALINTENT
|
MALINTENT is a technological system that was developed by the U.S. Department of Homeland Security to be implemented for detection of potential terrorist suspects.
The system does various test scanning for elevated blood pressure, rapid heart and breath rate, and non-verbal cues. According to the scientists, the MALINTENT system uses a barrage of non-invasive sensors and imagers to detect and evaluate a person's facial expressions to gauge whether the suspect could be planning to commit an attack or crime.
If the sensors pick up anything considered alarming, analysts can decide whether to subject a person to questioning.
See also
ADVISE
Information Awareness Office
MATRIX
Psycho-Pass
Surveillance
|
https://en.wikipedia.org/wiki/Spherical%20image
|
In differential geometry, the spherical image of a unit-speed curve is given by taking the curve's tangent vectors as points, all of which must lie on the unit sphere. The movement of the spherical image describes the changes in the original curve's direction If is a unit-speed curve, that is , and is the unit tangent vector field along , then the curve is the spherical image of . All points of must lie on the unit sphere because .
|
https://en.wikipedia.org/wiki/Certance
|
Certance, LLC, was a privately held company engaged in design and manufacture of computer tape drives.
Based in Costa Mesa, California, Certance designed and manufactured drives using a variety of tape formats, including Travan, DDS, and Linear Tape-Open computer tape drives. Certance was one of the three original technology partners, (Certance, IBM, and Hewlett-Packard), that created the Linear Tape-Open technology.
In 2005, Certance was acquired by Quantum Corporation.
History
The company began as the removable storage systems division of Seagate Technology. The division was formed in 1996 from storage companies Archive Corporation, Irwin Magnetic Systems, Cipher Data Products, and Maynard Electronics. In a restructuring involving Seagate Technology and Veritas Software, the division was spun off in 2000 into the independent company Seagate Removable Storage Systems. The company was the worldwide unit volume shipment leader in 2001, 2002, and 2003.
The company name was changed to "Certance" in 2003. In 2004, Quantum Corporation announced plans to acquire Certance. The acquisition was completed in 2005, whereupon Certance ceased to exist as an independent company.
|
https://en.wikipedia.org/wiki/Stirling%20numbers%20and%20exponential%20generating%20functions%20in%20symbolic%20combinatorics
|
The use of exponential generating functions (EGFs) to study the properties of Stirling numbers is a classical exercise in combinatorial mathematics and possibly the canonical example of how symbolic combinatorics is used. It also illustrates the parallels in the construction of these two types of numbers, lending support to the binomial-style notation that is used for them.
This article uses the coefficient extraction operator for formal power series, as well as the (labelled) operators (for cycles) and (for sets) on combinatorial classes, which are explained on the page for symbolic combinatorics. Given a combinatorial class, the cycle operator creates the class obtained by placing objects from the source class along a cycle of some length, where cyclical symmetries are taken into account, and the set operator creates the class obtained by placing objects from the source class in a set (symmetries from the symmetric group, i.e. an "unstructured bag".) The two combinatorial classes (shown without additional markers) are
permutations (for unsigned Stirling numbers of the first kind):
and
set partitions into non-empty subsets (for Stirling numbers of the second kind):
where is the singleton class.
Warning: The notation used here for the Stirling numbers is not that of the Wikipedia articles on Stirling numbers; square brackets denote the signed Stirling numbers here.
Stirling numbers of the first kind
The unsigned Stirling numbers of the first kind count the number of permutations of [n] with k cycles. A permutation is a set of cycles, and hence the set of permutations is given by
where the singleton marks cycles. This decomposition is examined in some detail on the page on the statistics of random permutations.
Translating to generating functions we obtain the mixed generating function of the unsigned Stirling numbers of the first kind:
Now the signed Stirling numbers of the first kind are obtained from the unsigned ones through the relation
Hence
|
https://en.wikipedia.org/wiki/Emergency%20care%20instructor
|
An emergency care instructor is a person who provides training in emergency care to civilians or military personnel. In order to qualify, a person must undergo appropriate courses, and have a certification level not lower (usually at least one level higher) than that to be taught. Often, experience with the provision of such care is required. If these requirements are met, the applicant will receive a certificate after completing training and fulfilling possible additional conditions.
Typically, upon certification it is necessary to hold a certain number of classes under the supervision of other instructors, and only after that may a new instructor teach courses on their own. The certificate must be renewed periodically.
Many first aid and medical care courses exist. They differ by:
the level of care (cardiopulmonary resuscitation, first aid for bleeding, help for children, etc.);
the minimum educational / professional level of students (persons without any prior medical training, persons with the qualification of first responder, EMT's of different levels, nurses, doctors);
the specific circumstances in which care is provided (wilderness emergency medical training, tactical medical training, etc.)
See also
List of emergency medicine courses
|
https://en.wikipedia.org/wiki/Ali%20Baba%20and%2040%20Thieves%20%28video%20game%29
|
Ali Baba and 40 Thieves is a maze arcade video game released by Sega in 1982. Players take the role of the famous Arabian hero who must fend off and kill the forty thieves who are trying to steal his money. The game is based on the folk tale of the same name. It was ported to the MSX platform, and then a Vector-06C port was made based on the MSX version.
Legacy
A clone for the ZX Spectrum was published by Suzy Soft in 1985 under the name Ali Baba.
|
https://en.wikipedia.org/wiki/Database%20encryption
|
Database encryption can generally be defined as a process that uses an algorithm to transform data stored in a database into "cipher text" that is incomprehensible without first being decrypted. It can therefore be said that the purpose of database encryption is to protect the data stored in a database from being accessed by individuals with potentially "malicious" intentions. The act of encrypting a database also reduces the incentive for individuals to hack the aforementioned database as "meaningless" encrypted data is of little to no use for hackers. There are multiple techniques and technologies available for database encryption, the most important of which will be detailed in this article.
Transparent/External database encryption
Transparent data encryption (often abbreviated as TDE) is used to encrypt an entire database, which therefore involves encrypting "data at rest". Data at rest can generally be defined as "inactive" data that is not currently being edited or pushed across a network. As an example, a text file stored on a computer is "at rest" until it is opened and edited. Data at rest are stored on physical storage media solutions such as tapes or hard disk drives. The act of storing large amounts of sensitive data on physical storage media naturally raises concerns of security and theft. TDE ensures that the data on physical storage media cannot be read by malicious individuals that may have the intention to steal them. Data that cannot be read is worthless, thus reducing the incentive for theft. Perhaps the most important strength that is attributed to TDE is its transparency. Given that TDE encrypts all data it can be said that no applications need to be altered in order for TDE to run correctly. It is important to note that TDE encrypts the entirety of the database as well as backups of the database. The transparent element of TDE has to do with the fact that TDE encrypts on "the page level", which essentially means that data is encrypted when st
|
https://en.wikipedia.org/wiki/Alcohol%20intolerance
|
Alcohol intolerance is due to a genetic polymorphism of the aldehyde dehydrogenase enzyme, which is responsible for the metabolism of acetaldehyde (produced from the metabolism of alcohol by alcohol dehydrogenase). This polymorphism is most often reported in patients of East Asian descent. Alcohol intolerance may also be an associated side effect of certain drugs such as disulfiram, metronidazole, or nilutamide. Skin flushing and nasal congestion are the most common symptoms of intolerance after alcohol ingestion. It may also be characterized as intolerance causing hangover symptoms similar to the "disulfiram-like reaction" of aldehyde dehydrogenase deficiency or chronic fatigue syndrome. Severe pain after drinking alcohol may indicate a more serious underlying condition.
Drinking alcohol in addition to consuming calcium cyanamide can cause permanent or long-lasting intolerance (nitrolime disease), contributing (in conjunction with other substances) to the accumulation of harmful acetaldehyde in the body by inhibiting the acetaldehyde dehydrogenase enzyme.
Signs and symptoms
Individuals with alcohol intolerance will experience unpleasant reactions immediately after drinking alcohol. Common signs and symptoms of alcohol intolerance include nasal congestion, skin flushing (redness), headaches, low blood pressure, nausea, and vomiting.
Causes
Genetics
ALDH1 is an isozyme of aldehyde dehydrogenase. A structural mutation in the gene of ALDH1, commonly found in East Asians, results in low levels of functional ALDH1 enzyme and thus, higher blood acetaldehyde levels. Higher blood acetaldehyde levels have been associated with facial flushing caused by an increase in heart rate and blood flow to the face from vasodilation of the blood vessels. Individuals that have the ALDH2*2 allele, a variant that has a mutation when compared to the wild-type ALDH2 isozyme, are known to have higher blood acetaldehyde levels. Individuals that have either mutation in the ALDH1 or ALDH2
|
https://en.wikipedia.org/wiki/Chung%E2%80%93Fuchs%20theorem
|
In mathematics, the Chung–Fuchs theorem, named after Chung Kai-lai and Wolfgang Heinrich Johannes Fuchs, states that for a particle undergoing a random walk in m-dimensions, it is certain to come back infinitely often to any neighborhood of the origin on a one-dimensional line (m = 1) or two-dimensional plane (m = 2), but in three or more dimensional spaces it will leave to infinity.
Specifically, if a position of the particle is described by the vector :
where are independent m-dimensional vectors with a given multivariate distribution,
then if , and , or if and ,
the following holds:
However, for ,
|
https://en.wikipedia.org/wiki/Crawford%20Dunn
|
Crawford Boddie Dunn (October 26, 1918 – September 17, 1980) was a designer specializing in graphics and corporate communication. Dunn is known for his modern design aesthetic and holistic approach to graphic identity and communication, which he applied to a variety of clients in the Southwest. In a 1975 newspaper article, Dunn said of the range of his work, "This spectrum comprises the design of print graphics, architectural graphics as well as corporate identity." A company brochure identifies another aspect of his work, "environmental signing design."
Early life and work history
Dunn was born in Bogalusa, Louisiana, and attended Haverford College and the University of Alabama before graduating with a bachelor's degree in industrial design from the Art Institute of Chicago. Dunn arrived in Dallas in 1951 where he first worked at the Vought Corporation. Ten years later he opened his own design firm, Crawford Dunn, Inc. A newspaper article from 1963 identifies his firm as Ikonogenics, Inc., and a later article announced his affiliation with the RYA Group to form RYA Crawford Dunn Incorporated. Upon his death in 1980 his firm was known as R.Y.A. Graphics.
Communication philosophy
Dunn's central philosophy of visual communication is expressed in his 1971 article "Alphasignal, Parasignal, Infrasignal: Notes Toward a Theory of Communication." In the article he defines three interrelated levels of communication signals ranging from a those containing pure information (alphsignal) to those colored or distorted by uncontrollable factors (infrasignal). Another concept developed by Dunn, ikonogenic, refers to the removal of all peripheral and secondary "noise" that lessens the impact of a message.
Range of clients
Dunn worked with a plethora of organizations on various design projects, including the World Trade Center in Dallas (signage), Texas Stadium, Zale Corporation, North Texas State University, the University of Texas at Arlington, Marsalis Zoo, the Southland Cor
|
https://en.wikipedia.org/wiki/Total%20mycosynthesis
|
Total mycosynthesis is the combination of the use of a filamentous fungal host organism with a genetic expression system that allows the assembly and controlled expression of one or more biosynthetic genes. Total mycosynthesis involves the reconstruction and/or engineering of biosynthetic pathways for the production of secondary metabolites. It is competitive with chemical total synthesis. It can be used both for the production of known natural products, and for the engineering of pathways to produce new compounds or pathway intermediates.Examples include the total mycosynthesis of tenellin where the tenS, tenC, tenA and tenB genes were transferred from Beauveria bassiana to the expression host Aspergillus oryzae. The expression system allows the engineering of TenS to control chain-length and methylation pattern.
Examples
|
https://en.wikipedia.org/wiki/Progressive%20provisioning
|
Progressive provisioning is a term used in entomology to refer to a form of parental behavior in which an adult (most commonly a hymenopteran such as a bee or wasp) feeds its larvae directly after they have hatched, feeding each larva repeatedly until it has completed development. The food is typically in the form of masticated or immobilized prey items (in predatory wasps), or regurgitated nectar mixed with pollen (in bees); only rarely are other sorts of food resources used (such as glandular secretions, or carrion). While this sort of direct and repetitive feeding of offspring is extremely common in groups such as birds and mammals, it is far less common among insects, with the exception of eusocial insects (one of the defining features of eusociality is cooperative brood care). Accordingly, progressive provisioning is universal among ants, and widespread among the social bees and wasps. Certain nonsocial wasps also rear their young with this type of feeding. Young termites (and other hemimetabolous insects) are able to feed themselves, and therefore do not demonstrate any form of provisioning.
One of the only well-known examples of progressive provisioning outside of the Hymenoptera are the burying beetles, which care for their larvae and supply them with a mass of carrion, which the adults chew and regurgitate to the developing larvae.
Many eusocial bees, such as stingless bees and halictids, practice mass provisioning, where all of the larval food is supplied before the egg is laid.
See also
Mass provisioning
|
https://en.wikipedia.org/wiki/Getting%20the%20wind%20knocked%20out%20of%20you
|
Getting the wind knocked out of you is an idiom that refers to the difficulty of breathing and temporary paralysis of the diaphragm caused by reflex diaphragmatic spasm when sudden force is applied to the upper central region of the abdomen and solar plexus. This often happens in contact sports, from a forceful blow to the abdomen, or by falling on the back.
The sensation of being unable to breathe can lead to anxiety and there may be residual pain from the original blow, but the condition typically clears spontaneously in a minute or two. Victims of such a "winding" episode often groan in a strained manner until normal breathing resumes. Loosening restrictive garments and flexing the hips and knees can help relieve the symptoms.
|
https://en.wikipedia.org/wiki/Hydrostatics
|
Fluid statics or hydrostatics is the branch of fluid mechanics that studies the condition of the equilibrium of a floating body and submerged body "fluids at hydrostatic equilibrium and the pressure in a fluid, or exerted by a fluid, on an immersed body".
It encompasses the study of the conditions under which fluids are at rest in stable equilibrium as opposed to fluid dynamics, the study of fluids in motion. Hydrostatics is a subcategory of fluid statics, which is the study of all fluids, both compressible or incompressible, at rest.
Hydrostatics is fundamental to hydraulics, the engineering of equipment for storing, transporting and using fluids. It is also relevant to geophysics and astrophysics (for example, in understanding plate tectonics and the anomalies of the Earth's gravitational field), to meteorology, to medicine (in the context of blood pressure), and many other fields.
Hydrostatics offers physical explanations for many phenomena of everyday life, such as why atmospheric pressure changes with altitude, why wood and oil float on water, and why the surface of still water is always level and horizontal whatever the shape of its container.
History
Some principles of hydrostatics have been known in an empirical and intuitive sense since antiquity, by the builders of boats, cisterns, aqueducts and fountains. Archimedes is credited with the discovery of Archimedes' Principle, which relates the buoyancy force on an object that is submerged in a fluid to the weight of fluid displaced by the object. The Roman engineer Vitruvius warned readers about lead pipes bursting under hydrostatic pressure.
The concept of pressure and the way it is transmitted by fluids was formulated by the French mathematician and philosopher Blaise Pascal in 1647.
Hydrostatics in ancient Greece and Rome
Pythagorean Cup
The "fair cup" or Pythagorean cup, which dates from about the 6th century BC, is a hydraulic technology whose invention is credited to the Greek mathematician
|
https://en.wikipedia.org/wiki/MicL%20sRNA
|
MicL RNA (mRNA-interfering complementary RNA regulator of Lpp) is a σ E transcription factor-dependent small non-coding RNA. It was discovered in E. coli. Together with MicA and RybB sRNAs, MicL sRNA down-regulates the synthesis of abundant outer membrane proteins in response to stress. MicL specifically targets mRNA of lipoprotein Lpp, preventing its translation.
|
https://en.wikipedia.org/wiki/Instruments%20used%20in%20microbiology
|
Instruments used specially in microbiology include:
Instrument list
As well as those "used in microbiological sterilization and disinfection" (see relevant section).
Image gallery
|
https://en.wikipedia.org/wiki/SOS
|
is a Morse code distress signal (), used internationally, originally established for maritime use. In formal notation is written with an overscore line, to indicate that the Morse code equivalents for the individual letters of "SOS" are transmitted as an unbroken sequence of three dots / three dashes / three dots, with no spaces between the letters. In International Morse Code three dots form the letter "S" and three dashes make the letter "O", so "S O S" became a common way to remember the order of the dots and dashes. (, , , and form equivalent sequences, but traditionally is the easiest to remember.)
, when it was first agreed upon by the International Radio Telegraphic Convention in 1906, was merely a distinctive Morse code sequence and was initially not an abbreviation. Later in popular usage it became associated with mnemonic phrases such as "Save Our Souls" and "Save Our Ship". Moreover, due to its high-profile use in emergencies, the phrase "SOS" has entered general usage to informally indicate a crisis or the need for action.
originated in German government maritime radio regulations adopted effective 1 April 1905. It became a worldwide standard when it was included in the service regulations of the first International Radiotelegraph Convention signed on 3 November 1906, which became effective on 1 July 1908. In modern terminology, is a Morse "procedural signal" or "prosign, used as a start-of-message mark for transmissions requesting assistance when loss of life or catastrophic loss of property is imminent. Other prefixes are used for mechanical breakdowns, requests for medical assistance, and a relayed distress signal originally sent by another station. remained the maritime radio distress signal until 1999, when it was replaced by the Global Maritime Distress and Safety System.
is still recognized as a standard distress signal that may be used with any signaling method. It has been used as a visual distress signal, consisting of three short/thr
|
https://en.wikipedia.org/wiki/Tokenization%20%28data%20security%29
|
Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no intrinsic or exploitable meaning or value. The token is a reference (i.e. identifier) that maps back to the sensitive data through a tokenization system. The mapping from original data to a token uses methods that render tokens infeasible to reverse in the absence of the tokenization system, for example using tokens created from random numbers. A one-way cryptographic function is used to convert the original data into tokens, making it difficult to recreate the original data without obtaining entry to the tokenization system's resources. To deliver such services, the system maintains a vault database of tokens that are connected to the corresponding sensitive data. Protecting the system vault is vital to the system, and improved processes must be put in place to offer database integrity and physical security.
The tokenization system must be secured and validated using security best practices applicable to sensitive data protection, secure storage, audit, authentication and authorization. The tokenization system provides data processing applications with the authority and interfaces to request tokens, or detokenize back to sensitive data.
The security and risk reduction benefits of tokenization require that the tokenization system is logically isolated and segmented from data processing systems and applications that previously processed or stored sensitive data replaced by tokens. Only the tokenization system can tokenize data to create tokens, or detokenize back to redeem sensitive data under strict security controls. The token generation method must be proven to have the property that there is no feasible means through direct attack, cryptanalysis, side channel analysis, token mapping table exposure or brute force techniques to reverse tokens back to live data.
Replacing live data with token
|
https://en.wikipedia.org/wiki/Joshua%20Lederberg
|
Joshua Lederberg, ForMemRS (May 23, 1925 – February 2, 2008) was an American molecular biologist known for his work in microbial genetics, artificial intelligence, and the United States space program. He was 33 years old when he won the 1958 Nobel Prize in Physiology or Medicine for discovering that bacteria can mate and exchange genes (bacterial conjugation). He shared the prize with Edward Tatum and George Beadle, who won for their work with genetics.
In addition to his contributions to biology, Lederberg did extensive research in artificial intelligence. This included work in the NASA experimental programs seeking life on Mars and the chemistry expert system Dendral.
Early life and education
Lederberg was born in Montclair, New Jersey, to a Jewish family, son of Esther Goldenbaum Schulman Lederberg and Rabbi Zvi Hirsch Lederberg, in 1925, and moved to Washington Heights, Manhattan as an infant. He had two younger brothers. Lederberg graduated from Stuyvesant High School in New York City at the age of 15 in 1941. After graduation, he was allowed lab space as part of the American Institute Science Laboratory, a forerunner of the Westinghouse Science Talent Search. He enrolled in Columbia University in 1941, majoring in zoology. Under the mentorship of Francis J. Ryan, he conducted biochemical and genetic studies on the bread mold Neurospora crassa. Intending to receive his MD and fulfill his military service obligations, Lederberg worked as a hospital corpsman during 1943 in the clinical pathology laboratory at St. Albans Naval Hospital, where he examined sailors' blood and stool samples for malaria. He went on to receive his undergraduate degree in 1944.
Bacterial genetics
Joshua Lederberg began medical studies at Columbia's College of Physicians and Surgeons while continuing to perform experiments. Inspired by Oswald Avery's discovery of the importance of DNA, Lederberg began to investigate his hypothesis that, contrary to prevailing opinion, bacteria did not
|
https://en.wikipedia.org/wiki/IP%20tunnel
|
An IP tunnel is an Internet Protocol (IP) network communications channel between two networks. It is used to transport another network protocol by encapsulation of its packets.
IP tunnels are often used for connecting two disjoint IP networks that don't have a native routing path to each other, via an underlying routable protocol across an intermediate transport network. In conjunction with the IPsec protocol they may be used to create a virtual private network between two or more private networks across a public network such as the Internet. Another prominent use is to connect islands of IPv6 installations across the IPv4 Internet.
In IP tunnelling, every IP packet, including addressing information of its source and destination IP networks, is encapsulated within another packet format native to the transit network.
At the borders between the source network and the transit network, as well as the transit network and the destination network, gateways are used that establish the end-points of the IP tunnel across the transit network. Thus, the IP tunnel endpoints become native IP routers that establish a standard IP route between the source and destination networks. Packets traversing these end-points from the transit network are stripped from their transit frame format headers and trailers used in the tunnelling protocol and thus converted into native IP format and injected into the IP stack of the tunnel endpoints. In addition, any other protocol encapsulations used during transit, such as IPsec or Transport Layer Security, are removed.
IP in IP, sometimes called ipencap, is an example of IP encapsulation within IP and is described in RFC 2003. Other variants of the IP-in-IP variety are IPv6-in-IPv4 (6in4) and IPv4-in-IPv6 (4in6).
IP tunneling often bypasses simple firewall rules transparently since the specific nature and addressing of the original datagrams are hidden. Content-control software is usually required to block IP tunnels.
History
The first spec
|
https://en.wikipedia.org/wiki/Phylogenomics
|
Phylogenomics is the intersection of the fields of evolution and genomics. The term has been used in multiple ways to refer to analysis that involves genome data and evolutionary reconstructions. It is a group of techniques within the larger fields of phylogenetics and genomics. Phylogenomics draws information by comparing entire genomes, or at least large portions of genomes. Phylogenetics compares and analyzes the sequences of single genes, or a small number of genes, as well as many other types of data. Four major areas fall under phylogenomics:
Prediction of gene function
Establishment and clarification of evolutionary relationships
Gene family evolution
Prediction and retracing lateral gene transfer.
The ultimate goal of phylogenomics is to reconstruct the evolutionary history of species through their genomes. This history is usually inferred from a series of genomes by using a genome evolution model and standard statistical inference methods (e.g. Bayesian inference or maximum likelihood estimation).
Prediction of gene function
When Jonathan Eisen originally coined phylogenomics, it applied to prediction of gene function. Before the use of phylogenomic techniques, predicting gene function was done primarily by comparing the gene sequence with the sequences of genes with known functions. When several genes with similar sequences but differing functions are involved, this method alone is ineffective in determining function. A specific example is presented in the paper "Gastronomic Delights: A movable feast". Gene predictions based on sequence similarity alone had been used to predict that Helicobacter pylori can repair mismatched DNA. This prediction was based on the fact that this organism has a gene for which the sequence is highly similar to genes from other species in the "MutS" gene family which included many known to be involved in mismatch repair. However, Eisen noted that H. pylori lacks other genes thought to be essential for this function (specif
|
https://en.wikipedia.org/wiki/Bandwidth%20extension
|
Bandwidth extension of signal is defined as the deliberate process of expanding the frequency range (bandwidth) of a signal in which it contains an appreciable and useful content, and/or the frequency range in which its effects are such. Its significant advancement in recent years has led to the technology being adopted commercially in several areas including psychacoustic bass enhancement of small loudspeakers and the high frequency enhancement of coded speech and audio.
Bandwidth extension has been used in both speech and audio compression applications. The algorithms used in G.729.1 and Spectral Band Replication (SBR) are two of many examples of bandwidth extension algorithms currently in use. In these methods, the low band of the spectrum is encoded using an existing codec, whereas the high band is coarsely parameterized using fewer parameters. Many of these bandwidth extension algorithms make use of the correlation between the low band and the high band in order to predict the wider band signal from extracted lower-band features. Others encode the high band using very few bits. This is often sufficient since the ear is less sensitive to distortions in the high band compared to the low band.
Bass enhancement of small loudspeakers
Most often small loudspeakers are physically incapable of reproducing low frequency material. Using a psycho-acoustical phenomenon like the missing fundamental, perception of low frequencies can be greatly increased. By generating harmonics of lower frequencies and removing the lower frequencies themselves, the suggestion is created that these frequencies are still remaining in the signal. This process is usually applied through external equipment or embedded in the speaker system using a digital signal processor.
High frequency response can also be enhanced through generation of harmonics. Instead of mapping frequencies inside the reproducible region of the speaker, the speaker itself is used to generate frequencies outside the nor
|
https://en.wikipedia.org/wiki/Atovaquone
|
Atovaquone, sold under the brand name Mepron, is an antimicrobial medication for the prevention and treatment of Pneumocystis jirovecii pneumonia (PCP).
Atovaquone is a chemical compound that belongs to the class of naphthoquinones. Atovaquone is a hydroxy-1,4-naphthoquinone, an analog of both ubiquinone and lawsone.
Medical uses
Atovaquone is a medication used to treat or prevent:
For pneumocystis pneumonia (PCP), it is used in mild cases, although it is not approved for treatment of severe cases.
For toxoplasmosis, the medication has antiparasitic and therapeutic effects.
For malaria, it is one of the two components (along with proguanil) in the drug Malarone. Malarone has fewer side effects and is more expensive than mefloquine. Resistance has been observed.
For babesia, it is often used in conjunction with oral azithromycin.
Trimethoprim/sulfamethoxazole (TMP-SMX, Bactrim) is generally considered first-line therapy for PCP (not to be confused with sulfadiazine and pyrimethamine, which is first line for toxoplasmosis). However, atovaquone may be used in patients who cannot tolerate, or are allergic to, sulfonamide medications such as TMP-SMX. In addition, atovaquone has the advantage of not causing myelosuppression, which is an important issue in patients who have undergone bone marrow transplantation.
Atovaquone is given prophylactically to kidney transplant patients to prevent PCP in cases where Bactrim is contraindicated for the patient.
Malaria
Atovaquone, as a combination preparation with proguanil, has been commercially available from GlaxoSmithKline since 2000 as Malarone for the treatment and prevention of malaria.
Research
COVID-19
Preliminary research found that atovaquone could inhibit the replication of SARS-CoV-2 in vitro. Clinical trials of atovaquone for the treatment of COVID-19 are planned, and ongoing in United States in December 2021.
Atovaquone has also been found to inhibit human coronavirus OC43 and feline coronavirus in vitro.
|
https://en.wikipedia.org/wiki/Soy%20candle
|
Soy candles are candles made from soy wax, which is a processed form of soybean oil. They are usually container candles because soy wax typically has a lower melting point than traditional waxes, but can also be made into pillar candles if certain additives are mixed into the soy wax.
Soy wax
Soy wax is made by the full hydrogenation of soybean oil; chemically this gives a triglyceride, containing a high proportion of stearic acid. It is typically softer than paraffin wax and with a lower melting temperature, in most combinations. However, additives can raise this melting point to temperatures typical for paraffin-based candles. The melting point ranges from 49 to 82 degrees Celsius (130 to 150 degrees Fahrenheit), depending on the blend. The density of soy wax is about 90% that of water or 0.9 g/ml. This means nine pounds (144 oz) of wax will fill about ten 16-oz jars (160 fluid ounces of volume). Soy wax is available in flake and pellet form and has an off-white, opaque appearance. Its lower melting temperature can mean that candles will melt in hot weather. Since soy wax is usually used in container candles, this is not much of an issue.
Some soy candles are made up of a blend of different waxes, including beeswax, paraffin, or palm wax.
Soy candles
Sоу candles dіѕtrіbutе frаgrаnсеѕ and ѕсеntѕ slightly less than paraffin candles. Paraffin is usually added to make a 'soy blend' which allows for a better scent throw and works better in hotter weather conditions. Soy is often referred to as a superior wax in comparison to paraffin but in reality, there is very little difference in soot production and carcinogenic compounds released by both waxes. The low melting роіnt trаnѕlаtеѕ to сооlеr-burning, longer-lasting саndlеѕ in temperate areas.
Soy candles can also come with coconut wax as an additive because coconut wax is viewed as more sustainable and is softer than soy making for a larger melt pool and disbursement of scent.
|
https://en.wikipedia.org/wiki/Image%20foresting%20transform
|
In the practice of digital image processing Alexandre X. Falcao, Jorge Stolfi, and Roberto de Alencar Lotufo have created and proven that the Image Foresting Transform (IFT) can be used as a time saver in processing 2-D, 3-D images, and moving images.
History
In 1959 Dijkstra used a balanced heap data structure to improve upon an algorithm presented by Moore in 1957 and Bellman in 1958 that computed the cost of the paths in a general graph. The Bucket sorting technique is how Dial improved on the algorithm a decade later. The algorithm has been tweaked and modified in many ways since then. It is on this version that Falcao, Stolfi, and Lotufo improved.
Definition
The transform is a tweaked version of Dijkstra’s shortest-path algorithm that is optimized for using more than one input and the maximization of digital image processing operators. The transform makes a graph of the pixels in an image and the connections between these points are the "cost" of the path portrayed. The cost is calculated by inspecting the characteristics, for example, grey scale, color, gradient among many others, of the path between pixels. Trees are made by connecting the pixels that have the same or close cost for applying the operator decided upon. The robustness of the transform does come at a cost and uses a lot of storage space for the code and the data being processed. When the transform is through, the predecessor, cost, and label are returned. Most of the operators that are used for digital image processing can use these three pieces of information to be optimized.
Optimization
Depending on which digital image processing operator has been decided upon the algorithm can be further tweaked for optimization depending upon what that operator uses. The algorithm can also be optimized by cutting out the recalculation of paths. This is accomplished by using an external reference table to keep track of the calculated paths. "Backward Arcs" can be eliminated by comparing the cost of the
|
https://en.wikipedia.org/wiki/FKG%20inequality
|
In mathematics, the Fortuin–Kasteleyn–Ginibre (FKG) inequality is a correlation inequality, a fundamental tool in statistical mechanics and probabilistic combinatorics (especially random graphs and the probabilistic method), due to . Informally, it says that in many random systems, increasing events are positively correlated, while an increasing and a decreasing event are negatively correlated. It was obtained by studying the random cluster model.
An earlier version, for the special case of i.i.d. variables, called Harris inequality, is due to , see below. One generalization of the FKG inequality is the Holley inequality (1974) below, and an even further generalization is the Ahlswede–Daykin "four functions" theorem (1978). Furthermore, it has the same conclusion as the Griffiths inequalities, but the hypotheses are different.
The inequality
Let be a finite distributive lattice, and μ a nonnegative function on it, that is assumed to satisfy the (FKG) lattice condition (sometimes a function satisfying this condition is called log supermodular) i.e.,
for all x, y in the lattice .
The FKG inequality then says that for any two monotonically increasing functions ƒ and g on , the following positive correlation inequality holds:
The same inequality (positive correlation) is true when both ƒ and g are decreasing. If one is increasing and the other is decreasing, then they are negatively correlated and the above inequality is reversed.
Similar statements hold more generally, when is not necessarily finite, not even countable. In that case, μ has to be a finite measure, and the lattice condition has to be defined using cylinder events; see, e.g., Section 2.2 of .
For proofs, see or the Ahlswede–Daykin inequality (1978). Also, a rough sketch is given below, due to , using a Markov chain coupling argument.
Variations on terminology
The lattice condition for μ is also called multivariate total positivity, and sometimes the strong FKG condition; the term (multiplicat
|
https://en.wikipedia.org/wiki/3D%20reconstruction
|
In computer vision and computer graphics, 3D reconstruction is the process of capturing the shape and appearance of real objects.
This process can be accomplished either by active or passive methods. If the model is allowed to change its shape in time, this is referred to as non-rigid or spatio-temporal reconstruction.
Motivation and applications
The research of 3D reconstruction has always been a difficult goal. By Using 3D reconstruction one can determine any object's 3D profile, as well as knowing the 3D coordinate of any point on the profile. The 3D reconstruction of objects is a generally scientific problem and core technology of a wide variety of fields, such as Computer Aided Geometric Design (CAGD), computer graphics, computer animation, computer vision, medical imaging, computational science, virtual reality, digital media, etc. For instance, the lesion information of the patients can be presented in 3D on the computer, which offers a new and accurate approach in diagnosis and thus has vital clinical value. Digital elevation models can be reconstructed using methods such as airborne laser altimetry or synthetic aperture radar.
Active methods
Active methods, i.e. range data methods, given the depth map, reconstruct the 3D profile by numerical approximation approach and build the object in scenario based on model. These methods actively interfere with the reconstructed object, either mechanically or radiometrically using rangefinders, in order to acquire the depth map, e.g. structured light, laser range finder and other active sensing techniques. A simple example of a mechanical method would use a depth gauge to measure a distance to a rotating object put on a turntable. More applicable radiometric methods emit radiance towards the object and then measure its reflected part. Examples range from moving light sources, colored visible light, time-of-flight lasers to microwaves or 3D ultrasound. See 3D scanning for more details.
Passive methods
Passive metho
|
https://en.wikipedia.org/wiki/DNA%20glycosylase
|
DNA glycosylases are a family of enzymes involved in base excision repair, classified under EC number EC 3.2.2. Base excision repair is the mechanism by which damaged bases in DNA are removed and replaced. DNA glycosylases catalyze the first step of this process. They remove the damaged nitrogenous base while leaving the sugar-phosphate backbone intact, creating an apurinic/apyrimidinic site, commonly referred to as an AP site. This is accomplished by flipping the damaged base out of the double helix followed by cleavage of the N-glycosidic bond.
Glycosylases were first discovered in bacteria, and have since been found in all kingdoms of life. In addition to their role in base excision repair, DNA glycosylase enzymes have been implicated in the repression of gene silencing in A. thaliana, N. tabacum and other plants by active demethylation. 5-methylcytosine residues are excised and replaced with unmethylated cytosines allowing access to the chromatin structure of the enzymes and proteins necessary for transcription and subsequent translation.
Monofunctional vs. bifunctional glycosylases
There are two main classes of glycosylases: monofunctional and bifunctional. Monofunctional glycosylases have only glycosylase activity, whereas bifunctional glycosylases also possess AP lyase activity that permits them to cut the phosphodiester bond of DNA, creating a single-strand break without the need for an AP endonuclease. β-Elimination of an AP site by a glycosylase-lyase yields a 3' α,β-unsaturated aldehyde adjacent to a 5' phosphate, which differs from the AP endonuclease cleavage product. Some glycosylase-lyases can further perform δ-elimination, which converts the 3' aldehyde to a 3' phosphate.
Biochemical mechanism
The first crystal structure of a DNA glycosylase was obtained for E. coli Nth. This structure revealed that the enzyme flips the damaged base out of the double helix into an active site pocket in order to excise it. Other glycosylases have since been
|
https://en.wikipedia.org/wiki/Posterolateral%20tract
|
The posterolateral tract (fasciculus of Lissauer, Lissauer's tract, tract of Lissauer, dorsolateral fasciculus, dorsolateral tract, zone of Lissauer) is a small strand situated in relation to the tip of the posterior column close to the entrance of the posterior nerve roots. It is present throughout the spinal cord, and is most developed in the upper cervical regions.
Structure
The posterolateral tract contains centrally projecting axons from dorsal root ganglion cells carrying crude touch and pressure information (location, intensity and quality). These axons enter the spinal column and penetrate the grey matter of the dorsal horn, where they synapse on second-order neurons in either the substantia gelatinosa of Rolando or the nucleus proprius. Those neurons project their axon to the anterolateral quadrant of the contralateral half of the spinal cord, where they give the spinothalamic tract. The axons of second-order neurons ultimately synapse on neurons in the ventral posterior lateral nucleus (VPL) of the thalamus after coursing in the spinal lemniscus. After this, the 3rd order neuron fibers traverse the internal capsule and the corona radiata, ultimately synapsing in the post central gyrus (somatosensory cortex). The location of this synapse is dependent upon the somatotopic organisation of the somatosensory cortex, it can be estimated according to the position on the 'somatosensory homunculus'
The posterolateral tract consists of fine fibers which do not receive their myelin sheaths until toward the close of fetal life. In addition it contains great numbers of fine non-myelinated fibers derived mostly from the dorsal roots but partly endogenous in origin.
These fibers are intimately related to the substantia gelatinosa which is probably their terminal nucleus.
The non-myelinated fibers ascend or descend for short distances not exceeding one or two segments, but most of them enter the substantia gelatinosa at or near the level of their origin.
Clinical s
|
https://en.wikipedia.org/wiki/NAD%203020
|
The NAD 3020 is a stereo integrated amplifier by NAD Electronics, considered to be one of the most important components in the history of high fidelity audio. Launched in 1978, this highly affordable product delivered a good quality sound, which acquired a reputation as an audiophile amplifier of exceptional value. By 1998, the NAD 3020 had become the most well known and best-selling audio amplifier in history.
History
Launched in 1978 when the principal preoccupation of hi-fi manufacturers was power output, the sub-£80 (US$135) low-powered solid state amplifier, created and marketed by a then little-known manufacturer, gained a reputation for excellent sound quality and exceptional value. Stereophile magazine called the "ridiculously inexpensive". It was the first integrated amplifier built with convincing ability to drive difficult loudspeaker loads, and a sound quality that far exceeded other integrated amplifiers at its price point for the time.
In an era when the NAD's rated power output of 20 watts per channel continuous into 8 ohms was considered anaemic, the manufacturer claimed it could deliver much stronger power output into lower impedances under dynamic conditions (music or peak power output). Indeed, it is capable of delivering 40 watts into 8 ohm, 58 watts into 4 ohm, and 72 watts into 2 ohm loads for a limited time if pushed. The amplifier's main appeal was its inherent musicality, its ability to drive difficult speaker loads, and to allow audiophile grade source components to excel. Launching the product in the US at the Consumer Electronics Show, the company wired up a battery of loudspeakers in a way which presented an impedance of 1.1 ohm, and the amplifier experienced no problems. Similarly, at its London launch, NAD successfully demonstrated it driving the Linn Isobarik, whose impedance characteristics are known to be very challenging for amplifiers. It was the best-known and best-selling amplifier in the annals of hi-fi. The revolutionised
|
https://en.wikipedia.org/wiki/Cram%C3%A9r%27s%20conjecture
|
In number theory, Cramér's conjecture, formulated by the Swedish mathematician Harald Cramér in 1936, is an estimate for the size of gaps between consecutive prime numbers: intuitively, that gaps between consecutive primes are always small, and the conjecture quantifies asymptotically just how small they must be. It states that
where pn denotes the nth prime number, O is big O notation, and "log" is the natural logarithm. While this is the statement explicitly conjectured by Cramér, his heuristic actually supports the stronger statement
and sometimes this formulation is called Cramér's conjecture. However, this stronger version is not supported by more accurate heuristic models, which nevertheless support the first version of Cramér's conjecture. Neither form has yet been proven or disproven.
Conditional proven results on prime gaps
Cramér gave a conditional proof of the much weaker statement that
on the assumption of the Riemann hypothesis. The best known unconditional bound is
due to Baker, Harman, and Pintz.
In the other direction, E. Westzynthius proved in 1931 that prime gaps grow more than logarithmically. That is,
His result was improved by R. A. Rankin, who proved that
Paul Erdős conjectured that the left-hand side of the above formula is infinite, and this was proven in 2014 by Kevin Ford, Ben Green, Sergei Konyagin, and Terence Tao, and independently by James Maynard. The two sets of authors improved the result by a factor later that year.
Heuristic justification
Cramér's conjecture is based on a probabilistic model—essentially a heuristic—in which the probability that a number of size x is prime is 1/log x. This is known as the Cramér random model or Cramér model of the primes.
In the Cramér random model,
with probability one. However, as pointed out by Andrew Granville, Maier's theorem shows that the Cramér random model does not adequately describe the distribution of primes on short intervals, and a refinement of Cramér's model taking into
|
https://en.wikipedia.org/wiki/Geometrical%20Product%20Specification%20and%20Verification
|
Geometrical Product Specification and Verification (GPS&V) is a set of ISO standards developed by ISO Technical Committee 213. The aim of those standards is to develop a common language to specify macro geometry (size, form, orientation, location) and micro-geometry (surface texture) of products or parts of products so that the language can be used consistently worldwide.
Background
GPS&V standards cover:
dimensional specifications
macrogeometrical specifications (form, orientation, location and run-out)
surface texture specifications
measuring equipment and calibration requirements
uncertainty management for measurement and specification acceptance
Other ISO technical committees are strongly related to ISO TC 213.
ISO Technical Committee 10 is in charge of the standardization and coordination of technical product documentation (DPT).
The GPS&V standards describe the rules to define geometrical specifications which are further included in the DPT. The DPT is defined as the:
"means of conveying all or part of a design definition or specification of a product".
The DPT can be either a conventional documentation made of two dimensional Engineering drawings or a documentation based on Computer-aided design (CAD) models with 3RD annotations. The ISO rules to write the documentation are mainly described in ISO 128 and ISO 129 series while the rules for 3RD annotations are described in ISO 16792.
ISO Technical Committee 184 develops standards that are closely related to GPS&V standards. In particular ISO TC 184/SC4 develops ISO 10303 standard known as STEP standard.
GPS&V shall not to be confused with the use of ASME Y.14.5 which is often referred to as Geometric Dimension and Tolerance (GD&T).
History and concepts
History
ISO TC 213 was born in 1996 by merging three previous committees:
ISO Technical Committee 10 Sub-committee 5 (ISO/TC 10/SC5) Geometrical Tolerancing
ISO Technical Committee 57 (ISO/TC 57) Surface Texture
ISO Technical Committee 3 (ISO/TC
|
https://en.wikipedia.org/wiki/Cycle%20decomposition%20%28graph%20theory%29
|
In graph theory, a cycle decomposition is a decomposition (a partitioning of a graph's edges) into cycles. Every vertex in a graph that has a cycle decomposition must have even degree.
Cycle decomposition of Kn and Kn − I
Brian Alspach and Heather Gavlas established necessary and sufficient conditions for the existence of a decomposition of a complete graph of even order minus a 1-factor (a perfect matching) into even cycles and a complete graph of odd order into odd cycles. Their proof relies on Cayley graphs, in particular, circulant graphs, and many of their decompositions come from the action of a permutation on a fixed subgraph.
They proved that for positive even integers and with , the graph (where is a 1-factor) can be decomposed into cycles of length if and only if the number of edges in is a multiple of . Also, for positive odd integers and with , the graph can be decomposed into cycles of length if and only if the number of edges in is a multiple of .
|
https://en.wikipedia.org/wiki/Conserved%20signature%20indels
|
Conserved signature inserts and deletions (CSIs) in protein sequences provide an important category of molecular markers for understanding phylogenetic relationships. CSIs, brought about by rare genetic changes, provide useful phylogenetic markers that are generally of defined size and they are flanked on both sides by conserved regions to ensure their reliability. While indels can be arbitrary inserts or deletions, CSIs are defined as only those protein indels that are present within conserved regions of the protein.
The CSIs that are restricted to a particular clade or group of species, generally provide good phylogenetic markers of common evolutionary descent. Due to the rarity and highly specific nature of such changes, it is less likely that they could arise independently by either convergent or parallel evolution (i.e. homoplasy) and therefore are likely to represent synapomorphy. Other confounding factors such as differences in evolutionary rates at different sites or among different species also generally do not affect the interpretation of a CSI. By determining the presence or absence of CSIs in an out-group species, one can infer whether the ancestral form of the CSI was an insert or deletion and this can be used to develop a rooted phylogenetic relationship among organisms.
Most CSIs that have been identified have been found to exhibit high predictive value and they generally retain the specificity for the originally identified clades of species. Therefore, based upon their presence or absence, it should be possible to identify both known and even previously unknown species belonging to these groups in different environments.
Types
Group specific
Group specific CSIs are commonly shared by different species belonging to a particular taxon (e.g. genus, family, class, order, phylum) but they are not present in other groups. These CSIs were most likely introduced in an ancestor of the group of species before the members of the taxa diverged. They provi
|
https://en.wikipedia.org/wiki/CuproBraze
|
CuproBraze is a copper-alloy heat exchanger technology for high-temperature and pressure environments such as those in modern diesel engines. The technology, developed by the International Copper Association (ICA), is licensed for free to heat exchanger manufacturers around the world.
Applications for CuproBraze include charge air coolers, radiators, oil coolers, climate control systems, and heat transfer cores. CuproBraze is suited for charge air coolers and radiators in heavy industry where machinery must operate for long periods of time under harsh conditions without failures. CuproBraze is being specialized for off-road vehicles, trucks, buses, industrial engines, generators, locomotives, and military equipment. The technology is also amenable for light trucks, SUVs and passenger cars with special needs.
As an innovation from previous heat exchanger models CuproBraze creates new materials for heat exchanger parts that have previously been made of soldered copper/brass plate fin, soldered copper brass serpentine fin, and brazed aluminum serpentine fin to suit more demanding applications. Aluminum heat exchangers are viable and economical for cars, light trucks, and other light-duty applications. However, they are not amenable for environments characterized by high operating temperatures, humidity, vibration, salty corrosive air, and air pollution. In these environments, the additional tensile strength, durability, and corrosion resistance that CuproBraze technology provides are useful.
The CuproBraze technology uses brazing instead of soldering to join copper and brass radiator components. The heat exchangers are made with anneal-resistant copper and brass alloys. The tubes are fabricated from brass strip and coated with a brazing filler material in form of a powder-based paste or an amorphous brazing foil is laid between the tube and fin. There is another method of coating the tube in-line on the tube mill. This is done using the twin wire-arc spray process w
|
https://en.wikipedia.org/wiki/Archive%20for%20Rational%20Mechanics%20and%20Analysis
|
The Archive for Rational Mechanics and Analysis is a scientific journal that is devoted to research in mechanics as a deductive, mathematical science. The current editors in chief of the journal are Felix Otto and Vladimir Sverak. It was founded in 1956 by Clifford Truesdell when he moved from Indiana University to Johns Hopkins and lost control of a similar journal he had founded a few years previously, the Journal of Rational Mechanics and Analysis (now the Indiana University Mathematics Journal).
Gianfranco Capriz writes that Truesdell's ideals of mathematical and typesetting rigor gave the new journal a high reputation:
James Serrin, a later editor of the Archive, adds that it became the center of a revival of mechanics as an academic discipline, and that by the time of Truesdell's retirement as editor in 1989 subscribing to it was "necessary for every fine scientific library".
|
https://en.wikipedia.org/wiki/Hyperthecosis
|
Hyperthecosis, or ovarian hyperthecosis, is hyperplasia of the theca interna of the ovary. Hyperthecosis occurs when an area of luteinization occurs along with stromal hyperplasia. The luteinized cells produce androgens, which may lead to hirsutism and virilization (or masculinization) in affected women.
The term hyperthecosis refers to the presence of nests of luteinized theca cells in the ovarian stroma due to differentiation of the ovarian interstitial cells into steroidogenically active luteinized stromal cells. These nests or islands of luteinized theca cells are scattered throughout the stroma of the ovary, rather than being confined to areas around cystic follicles as in polycystic ovary syndrome (PCOS). These luteinized theca cells result in greater production of androgens.
Seen as a severe form of PCOS, the clinical features of hyperthecosis are similar to those of PCOS. Women with hyperthecosis often have more markedly elevated testosterone, more hirsutism, and are much more likely to be virilized. While elevated androgens in postmenopausal women is rare, hyperthecosis can present in both premenopausal or postmenopausal women. Women with hyperthecosis may or may not have always had underlying PCOS.
Cause
The etiology of hyperthecosis is unknown, however evidence suggests a possibility of genetic transmission. Hyperthecosis has been documented in familiar patterns. Insulin resistance may also play a role in the pathogenesis of hyperthecosis. Women with hyperthecosis have a significant degree of insulin resistance and insulin may stimulate the ovarian stromal androgen synthesis.
Prognosis
Although no large studies showing the long term outcomes for women with hyperthecosis exist, a diagnosis of hyperthecosis may suggest an increased risk for metabolic complications of hyperlipidemia and type 2 diabetes . In postmenopausal women, hyperthecosis may also contribute to the pathogenesis of endometrial polyp, endometrial hyperplasia, and endometrioid adenoca
|
https://en.wikipedia.org/wiki/Fitlads
|
Fitlads is a social networking, dating/hookup website and app for gay, bisexual and non-heterosexual men, as well as other men who have sex with men in the United Kingdom. It was launched in April 2003, and introduced video to the app in 2008.
The website is geared towards stereotypical "straight-acting" working-class "chav" or "scally"-type "lads", as well as those with a fetish for sports kits or bondage. It has a rating system for videos, which is seen by scholar David G. Kreps as communicating more "about sex ... than it is about sex itself".
Between 2014 and 2015, the website was one of those used by the serial killer Stephen Port as a means of initially contacting his victims. He also maintained accounts on Sleepyboy, Grindr, Hornet, Badoo, Gaydar, Flirt, DaddyHunt, PlanetRomeo, Manhunt, Slaveboys and CouchSurfing.
|
https://en.wikipedia.org/wiki/QPNC-PAGE
|
QPNC-PAGE, or Quantitative Preparative Native Continuous PolyAcrylamide Gel Electrophoresis, is a bioanalytical, one-dimensional, high-resolution and high-precision technique applied in biochemistry and bioinorganic chemistry to separate proteins quantitatively by isoelectric point and by continuous elution from a gel column.
This variant of native gel electrophoresis and subset of preparative polyacrylamide gel electrophoresis is used by biophysicists to isolate macromolecules in solution, for example, active or native metalloproteins in biological samples or properly and improperly folded metal cofactor-containing proteins or protein isoforms in complex protein mixtures.
The special feature of the QPNC-PAGE technique is based on a standardized polymerization time for acrylamide gel solutions to optimize gel properties, in particular gel stability, during an electrophoretic run. Physiological concentrations of metal ion cofactors are fractionated in quantitative amounts for further analysis.
Introduction
Proteins perform several functions in living organisms, including catalytic reactions and transport of molecules or ions within the cells, the organs or the whole body. The understanding of the processes in human organisms, which are mainly driven by biochemical reactions and protein-protein interactions, depends to a great extent on the ability to isolate active proteins in biological samples for more detailed examination of chemical structure and physiological function. This essential information can imply an important indication of a patient's state of health.
As about 30-40% of all known proteins contain one or more metal ion cofactors (e.g., ceruloplasmin, ferritin, amyloid-beta precursor protein, matrix metalloproteinase, or metallochaperones), especially native and denatured metalloproteins have to be isolated, identified and quantified after liquid biopsy. Many of these cofactors (e.g., iron, copper, or zinc) play a key role in vital enzymatic catalyt
|
https://en.wikipedia.org/wiki/Family%20Radio%20Service
|
The Family Radio Service (FRS) is an improved walkie-talkie radio system authorized in the United States since 1996. This personal radio service uses channelized frequencies around 462 and 467 MHz in the ultra high frequency (UHF) band. It does not suffer the interference effects found on citizens' band (CB) at 27 MHz, or the 49 MHz band also used by cordless telephones, toys, and baby monitors. FRS uses frequency modulation (FM) instead of amplitude modulation (AM). Since the UHF band has different radio propagation characteristics, short-range use of FRS may be more predictable than the more powerful license-free radios operating in the HF CB band.
Initially proposed by RadioShack in 1994 for use by families, FRS has also seen significant adoption by business interests, as an unlicensed, low-cost alternative to the business band. New rules issued by the FCC in May 2017 clarify and simplify the overlap between FRS and General Mobile Radio Service (GMRS) radio services.
Worldwide, a number of similar personal radio services exist; these share the characteristics of low power operation in the UHF (or upper VHF) band using FM, and simplified or no end-user licenses. Exact frequency allocations differ, so equipment legal to operate in one country may cause unacceptable interference in another. Radios approved for FRS are not legal to operate anywhere in Europe.
Technical information
FRS radios use narrow-band frequency modulation (NBFM) with a maximum deviation of 2.5 kilohertz. The channels are spaced at 12.5 kilohertz intervals.
All 22 channels are shared with GMRS radios. Initially, the FRS radios were limited to 500 milliwatts across all channels. However, after May 18, 2017, the limit is increased to 2 watts on channels 1-7 and 15–22.
FRS radios frequently have provisions for using sub-audible tone squelch (CTCSS and DCS) codes, filtering out unwanted chatter from other users on the same frequency. Although these codes are sometimes called "privacy codes"
|
https://en.wikipedia.org/wiki/Bent%20function
|
In the mathematical field of combinatorics, a bent function is a Boolean function that is maximally non-linear; it is as different as possible from the set of all linear and affine functions when measured by Hamming distance between truth tables. Concretely, this means the maximum correlation between the output of the function and a linear function is minimal. In addition, the derivatives of a bent function are balanced Boolean functions, so for any change in the input variables there is a 50 percent chance that the output value will change.
The maximal nonlinearity means approximating a bent function by an affine (linear) function is hard, a useful property in the defence against linear cryptanalysis. In addition, detecting a change in the output of the function yields no information about what change occurred in the inputs, making the function immune to differential cryptanalysis.
Bent functions were defined and named in the 1960s by Oscar Rothaus in research not published until 1976. They have been extensively studied for their applications in cryptography, but have also been applied to spread spectrum, coding theory, and combinatorial design. The definition can be extended in several ways, leading to different classes of generalized bent functions that share many of the useful properties of the original.
It is known that V. A. Eliseev and O. P. Stepchenkov studied bent functions, which they called minimal functions, in the USSR in 1962. However, their results have still not been declassified.
Bent functions are also known as perfectly nonlinear (PN) boolean functions. Certain functions that are as close as possible to perfect nonlinearity (e.g. for functions of an odd number of bits, or vectorial functions) are known as almost perfectly nonlinear (APN).
Walsh transform
Bent functions are defined in terms of the Walsh transform. The Walsh transform of a Boolean function is the function given by
where is the dot product in Z. Alternatively, let and .
|
https://en.wikipedia.org/wiki/Blood%E2%80%93testis%20barrier
|
The blood–testis barrier is a physical barrier between the blood vessels and the seminiferous tubules of the animal testes. The name "blood-testis barrier" is misleading as it is not a blood-organ barrier in a strict sense, but is formed between Sertoli cells of the seminiferous tubule and isolates the further developed stages of germ cells from the blood. A more correct term is the Sertoli cell barrier (SCB).
Structure
The walls of seminiferous tubules are lined with primitive germ layer cells and by Sertoli cells. The barrier is formed by tight junctions, adherens junctions and gap junctions between the Sertoli cells, which are sustentacular cells (supporting cells) of the seminiferous tubules, and divides the seminiferous tubule into a basal compartment (outer side of the tubule, in contact with blood and lymph) and an endoluminal compartment (inner side of the tubule, isolated from blood and lymph). The tight junctions are formed by intercellular adhesion molecules in between cells that are anchored to actin fibers within the cells. For the visualization of the actin fibers within the seminiferous tubules see Sharma et al.'s immunofluorescence studies.
Function
The presence of the SCB allows Sertoli cells to control the adluminal environment in which germ cells (spermatocytes, spermatids and sperm) develop by influencing the chemical composition of the luminal fluid.
The barrier also prevents passage of cytotoxic agents (bodies or substances that are toxic to cells) into the seminiferous tubules.
The fluid in the lumen of seminiferous tubules is quite different from plasma; it contains very little protein and glucose but is rich in androgens, estrogens, potassium, inositol and glutamic and aspartic acid. This composition is maintained by blood–testis barrier.
The barrier also protects the germ cells from blood-borne noxious agents,
prevents antigenic products of germ cell maturation from entering the circulation and generating an autoimmune response, and ma
|
https://en.wikipedia.org/wiki/Irmgard%20Fl%C3%BCgge-Lotz
|
Irmgard Flügge-Lotz, née Lotz (16 July 1903 – 22 May 1974) was a German-American mathematician and aerospace engineer. She was a pioneer in the development of the theory of discontinuous automatic control, which has found wide application in hysteresis control systems; such applications include guidance systems, electronics, fire-control systems, and temperature regulation. She became the first female engineering professor at Stanford University in 1961 and the first female engineer elected a Fellow of the American Institute of Aeronautics and Astronautics.
Early life and education
Lotz was born in Hamelin, Germany on 16 July 1903. She was encouraged at an early age to pursue technical subjects by her mother, whose family had been involved in construction for several generations. She often visited construction sites with her uncle and attended half-price matinee shows for technical films. After her father, Osark, a travelling journalist, was drafted for military service in World War I, the young Irmgard helped the family by becoming a math tutor while studying at a girls' Gymnasium in Hanover. Several years later, when Osark returned to Hanover he was in poor health and Irmgard continued to work to bring in extra money for the family. She graduated from the Gymnasium in 1923 and entered the Leibniz University Hannover to study mathematics and engineering. Later in life, she explained why she decided to study engineering:
In college she studied applied mathematics and fluid dynamics and was often the only woman in her classes. In 1927, she received her Diplom-Ingenieur and remained in Hanover for her doctorate. In 1929 she earned her doctorate in engineering, publishing her thesis on the mathematical theory of circular cylinders and heat conduction.
Lotz went to work for the Aerodynamische Versuchsanstalt (AVA) in Göttingen, one of the most prominent aeronautical research institutions in Europe. She joined as a junior research engineer and worked closely with Ludw
|
https://en.wikipedia.org/wiki/Mir-541%20microRNA%20precursor%20family
|
In molecular biology mir-541 microRNA is a short RNA molecule. MicroRNAs function to regulate the expression levels of other genes by several mechanisms.
See also
MicroRNA
|
https://en.wikipedia.org/wiki/FAT%20TOM
|
FAT TOM is a mnemonic device used in the food service industry to describe the six favorable conditions required for the growth of foodborne pathogens. It is an acronym for food, acidity, time, temperature, oxygen and moisture.
Conditions
Each of the six conditions that foster the growth foodborne pathogens are defined in set ranges:
See also
HACCP
Sanitation Standard Operating Procedures
|
https://en.wikipedia.org/wiki/Association%20of%20Polish%20Electrical%20Engineers
|
The Association of Polish Electrical Engineers (Stowarzyszenie Elektryków Polskich, SEP; also called Association of Polish Electricians) is a Polish non-governmental organisation integrating the community of electricians of Polish origin worldwide. The organisation brings together both engineers and technicians, as well as young students (pupils of technical and vocational schools) in electrical engineering in the broadest sense.
Activities
SEP is mainly involved in education activities (training courses for the operation of electrical equipment). It is also involved in conformity assessment of low-voltage electrical products (since 1933), through its office of quality, an SEP agency with national accreditations and recognition from the most prestigious international and European organisations. It also carries out extensive international cooperation under the English name of "Association of Polish Electrical Engineers". It is a member of the National Federation of Scientific and Technical Associations of Poland and the European organisation EUREL.
History
From 7 to 9 June 1919, a congress was held to establish the Association of Polish Electrical Engineers. Professor Mieczysław Pożaryski was elected its first president. In 1928 the organisation merged with the Association of Polish Radio Engineers, and in 1929 the name was changed to its present name by a decision of the board of directors. In 1939, the Association of Polish Telecommunication Engineers joined SEP.
Presidents
1919–1928 – Mieczysław Pożaryski (first president of the SEP)
1928–1929 – Kazimierz Straszewski
1929–1930 – Zygmunt Okoniewski
1930–1931 – Kazimierz Straszewski
1931–1932 – Felicjan Karśnicki
1932–1933 – Tadeusz Czaplicki
1933–1934 – Alfons Kühn
1934–1935 – Jan Obrąpalski
1935–1936 – Alfons Kühn
1936–1937 – Janusz Groszkowski
1937–1938 – Alfons Hoffmann
1938–1939 – Kazimierz Szpotański
1939 – Antoni Krzyczkowski
1939–1946 – Kazimierz Szpotański
1946–1947 – Kazimierz Straszew
|
https://en.wikipedia.org/wiki/Decoded%20neurofeedback
|
Decoded Neurofeedback (DecNef) is the process of inducing knowledge in a subject by increasing neural activation in predetermined regions in the brain, such as the visual cortex. This is achieved by measuring neural activity in these regions via functional magnetic resonance imaging (fMRI), comparing this to the ideal pattern of neural activation in these regions (for the intended purpose), and giving subjects feedback on how close their current pattern of neural activity is to the ideal pattern. Without explicit knowledge of what they are supposed to be doing or thinking about, over time participants learn to induce this ideal pattern of neural activation. Corresponding to this, their 'knowledge' or way of thinking has been found to change accordingly.
Experiments conducted in 2011 at Boston University (BU) and ATR Computational Neuroscience Laboratories in Kyoto, Japan demonstrated that volunteers were able to quickly solve complex visual puzzles they had not previously had exposure to. They did so by receiving the brain patterns of other volunteers who had already learned to solve the puzzles through trial and error methods.
The research has far-reaching implications for treating patients with various learning disabilities, mental illness, memory problems, and motor functionality impairments.
External links
National Science Foundation: Vision Scientists Demonstrate Innovative Learning Method
Science Magazine: Perceptual Learning Incepted by Decoded fMRI Neurofeedback Without Stimulus Presentation
Neuroscience
|
https://en.wikipedia.org/wiki/Cucurmosin
|
Cucurmosin is a type I ribosome inactivating protein (RIP) found in the sarcocarp (flesh) and seed of Cucurbita — notably Cucurbita moschata, that is toxic to cancer cells, if the dosage is high enough, by stopping their ribosomes. Cucurmosin is what Cucurbita use to defend against viral, fungal, and bacterial agents. It takes a lower dose of cucurmosin to kill cancer cells than healthy cells. It has been shown to induce apoptosis in pancreatic cancer and myeloid leukemia cells.
|
https://en.wikipedia.org/wiki/AFIB%20Technology
|
AFIB Technology (sometimes referred to as Microlife AFIB Technology) is a feature in sphygmomanometer devices that is designed to detect and monitor the incidence of atrial fibrillation in patients. The technology was designed, patented, and is currently used by the Microlife Corporation. It has been the subject of numerous medical studies and has been validated for in-home and clinical use. It can be found in several Microlife devices, including the WatchBP Home A, BP A200 Plus, WatchBP Office, and WatchBP O3.
Specifications
The Microlife devices that use the AFIB Technology are oscillometric and are equipped with an algorithm that can detect irregular pulse rhythms. The device will flash if atrial fibrillation is detected. Measurements are carried out in triplicate for more accurate readings. Studies have confirmed the relative accuracy of such readings when attempting to identify the existence of atrial fibrillation in patients.
One study indicated that the Microlife blood pressure monitor had a sensitivity for detecting atrial fibrillation of 100%, a specificity of 92%. Several clinical studies have tested the Microlife AFIB Technology against 12-lead electrocardiography (ECG) interpreted by cardiologists. The sensitivity for detection in these studies varied between 95 and 100% with specificity values of 89 to 92%.
One study noted that the WatchBP device was better for detecting atrial fibrillation than single-lead ECGs because of its higher specificity level (90 vs 76%, respectively), which would prevent many unnecessary refers for a 12-lead ECG and therefore safes labor and healthcare costs. In addition, it does not require clinical interpretation.
In virtually every study, researchers have concluded that Microlife's AFIB Technology is suitable for use as an atrial fibrillation detection system for in-home and/or clinical purposes. In 2013, the UK National Institute for Health and Care Excellence recommended the WatchBP Home A device for routine blood
|
https://en.wikipedia.org/wiki/Quasi-median%20networks
|
The concept of a quasi-median network is a generalization of the concept of a median network that was introduced to represent multistate characters. Note that, unlike median networks, quasi-median networks are not split networks. A quasi-median network is defined as a phylogenetic network, the node set of which is given by the quasi-median closure of the condensed version of M (let M be a multiple sequence alignment of DNA sequences on X) and in which any two nodes are joined by an edge if and only if the sequences associated with the nodes differ in exactly one position. The quasi-median closure is defined as the set of all sequences that can be obtained by repeatedly taking the quasi-median of any three sequences in the set and then adding the result to the set.
|
https://en.wikipedia.org/wiki/Abstract%20type
|
In programming languages, an abstract type (also known as existential types) is a type in a nominative type system that cannot be instantiated directly; by contrast, a concrete type be instantiated directly. Instantiation of an abstract type can occur only indirectly, via a concrete subtype.
An abstract type may provide no implementation, or an incomplete implementation. In some languages, abstract types with no implementation (rather than an incomplete implementation) are known as protocols, interfaces, signatures, or class types. In class-based object-oriented programming, abstract types are implemented as abstract classes (also known as abstract base classes), and concrete types as concrete classes. In generic programming, the analogous notion is a concept, which similarly specifies syntax and semantics, but does not require a subtype relationship: two unrelated types may satisfy the same concept.
Often, abstract types will have one or more implementations provided separately, for example, in the form of concrete subtypes that be instantiated. In object-oriented programming, an abstract class may include abstract methods or abstract properties that are shared by its subclasses. Other names for language features that are (or may be) used to implement abstract types include traits, mixins, flavors, roles, or type classes.
Creation
Abstract classes can be created, signified, or simulated in several ways:
By use of the explicit keyword in the class definition, as in Java, D or C#.
By including, in the class definition, one or more abstract methods (called pure virtual functions in C++), which the class is declared to accept as part of its protocol, but for which no implementation is provided.
By inheriting from an abstract type, and not overriding all missing features necessary to complete the class definition. In other words, a child type that does not implement all abstract methods from its parent becomes abstract itself.
In many dynamically typed lan
|
https://en.wikipedia.org/wiki/List%20of%20congenital%20disorders
|
List of congenital disorders
Numerical
5p syndrome - see Cri du chat syndrome
A
Acrorenal mandibular syndrome
Albinism
Amelia and hemimelia
Amniotic band syndrome
Anencephaly
Angelman syndrome
Aposthia
Arnold–Chiari malformation
B
Bannayan–Zonana syndrome
Bardet–Biedl syndrome
Barth syndrome
Basal-cell nevus syndrome
Beckwith–Wiedemann syndrome
Benjamin syndrome
Bladder exstrophy
Bloom syndrome
Brachydactyly
C
Cat eye syndrome
Caudal regression syndrome
Sotos syndrome Cerebral Gigantism
CHARGE syndrome
Chromosome 16 abnormalities
Chromosome 18 abnormalities
Chromosome 20 abnormalities
Chromosome 22 abnormalities
Cleft lip/palate
Cleidocranial dysostosis
Club foot
Congenital adrenal hyperplasia (CAH)
Congenital central hypoventilation syndrome
Congenital diaphragmatic hernia (CDH)
Congenital Disorder of Glycosylation (CDG)
Congenital hyperinsulinism
Congenital insensitivity to pain with anhidrosis (CIPA)
Congenital pulmonary airway malformation (CPAM)
Conjoined twins
Costello syndrome
Craniopagus parasiticus
Cri du chat syndrome
Cyclopia
Cystic fibrosis
D
De Lange syndrome
Diphallia
Distal trisomy 10q
Down syndrome
E
Ectodermal dysplasia
Ectopia cordis
Ectrodactyly
Encephalocele
F
Fetal alcohol syndrome
Fetofetal transfusion
First arch syndrome
Freeman–Sheldon syndrome
G
Gastroschisis
Genu recurvatum
Goldenhar syndrome
H
Harlequin-type ichthyosis
Heart disorders (Congenital heart defects)
Hemifacial microsomia
Holoprosencephaly
Huntington's disease
Hirschsprung's disease, or congenital aganglionic megacolon
Hypertrichosis
Hypoglossia
Hypomelanism or hypomelanosis (albinism)
Hypospadias
Haemophilia
Heterochromia
Hemochromatosis
I
Imperforate anus
Imperforate hymen
Incontinentia pigmenti
Intestinal neuronal dysplasia
Ivemark syndrome
J
Jacobsen syndrome
K
Katz syndrome
Klinefelter syndrome
Kabuki syndrome
Kyphosis
L
Larsen syndrome
Laurence–Moon syndrome
Lisse
|
https://en.wikipedia.org/wiki/Ericoid%20mycorrhiza
|
The ericoid mycorrhiza is a mutualistic relationship formed between members of the plant family Ericaceae and several lineages of mycorrhizal fungi. This symbiosis represents an important adaptation to acidic and nutrient poor soils that species in the Ericaceae typically inhabit, including boreal forests, bogs, and heathlands. Molecular clock estimates suggest that the symbiosis originated approximately 140 million years ago.
Structure and function
Ericoid mycorrhizas are characterized by fungal coils that form in the epidermal cells of the fine hair roots of ericaceous species. Ericoid mycorrhizal fungi establish loose hyphal networks around the outside of hair roots, from which they penetrate the walls of cortical cells to form intracellular coils that can densely pack individual plant cells. However, the fungi do not penetrate plasma membranes of plant cells. Evidence suggests that coils only function for a period of a few weeks before the plant cell and fungal hyphae begin to degrade.
The coil is the site where fungi exchange nutrients obtained from the soil for carbohydrates fixed through photosynthesis by the plant. Ericoid mycorrhizal fungi have been shown to have enzymatic capabilities to break down complex organic molecules. This may allow some ericoid mycorrhizal fungi to act as saprotrophs. However, the primary function of these enzymatic capabilities is likely to access organic forms of nutrients, such as nitrogen, whose mineralized forms are in very limiting quantities in habitats typically occupied by ericaceous plants.
Fungal symbionts
The majority of research with ericoid mycorrhizal fungal physiology and function has focused on fungal isolates morphologically identified as Rhizoscyphus ericae, in the Ascomycota order Helotiales, now known to be a Pezoloma species.
In addition to Rhizoscyphus ericae, it is currently recognized that culturable Ascomycota such as Meliniomyces (closely allied with Rhizoscyphus ericae), Cairneyella variabilis, Gama
|
https://en.wikipedia.org/wiki/Soft-decision%20decoder
|
In information theory, a soft-decision decoder is a kind of decoding methods – a class of algorithm used to decode data that has been encoded with an error correcting code. Whereas a hard-decision decoder operates on data that take on a fixed set of possible values (typically 0 or 1 in a binary code), the inputs to a soft-decision decoder may take on a whole range of values in-between. This extra information indicates the reliability of each input data point, and is used to form better estimates of the original data. Therefore, a soft-decision decoder will typically perform better in the presence of corrupted data than its hard-decision counterpart.
Soft-decision decoders are often used in Viterbi decoders and turbo code decoders.
|
https://en.wikipedia.org/wiki/Card%20standards
|
Card standard(s) may refer to any amount of numbers of ISO standards related to smartcards.
ISO/IEC 7810 Identification cards — Physical characteristics
ISO/IEC 7812 Identification cards — Identification of issuers
ISO/IEC 7816 Identification cards — Integrated circuit cards
ISO/IEC 14443 Identification cards — Contactless integrated circuit cards — Proximity cards
See also
List of ISO standards
Smart cards
|
https://en.wikipedia.org/wiki/Kool-Aid%20Man
|
Kool-Aid Man (sometimes referred to as the Kool-Aid Guy or Captain Kool-Aid) is the official mascot for Kool-Aid, a brand of flavored drink mix. The character has appeared on television and in print advertising as a fun-loving, gigantic, and joyful anthropomorphic pitcher filled with "The Original Flavor" Cherry Kool-Aid. He is typically featured answering the call of children by smashing through walls or furnishings and then holding a pitcher filled with Kool-Aid while saying his catchphrase, "Oh yeah!" He had a comic series produced by Marvel Entertainment where he fought villains called "Thirsties" and even fought a man engulfed in fire named Scorch. He can also come in many different colors such as red, blue, green, and purple.
History
The precursor to Kool-Aid Man, "the Pitcher Man", was created on July 10, 1954. Marvin Potts, an art director for a New York advertising agency, was hired by General Foods to create an image that would accompany the slogan "A 5-cent package makes two quarts". Inspired by watching his young son draw smiley faces on a frosted window, Potts created the Pitcher Man, a glass pitcher with a wide smile emblazoned on its side and filled with Kool-Aid. It was one of several designs he created, but the only one that stuck, and General Foods began to use the Pitcher Man in all of its advertisements. The character's face was sometimes animated in synchronization with the jingle.
In 1974, arms and legs were added and Kool-Aid Man was introduced as a 6-foot-tall pitcher of cherry Kool-Aid, reportedly voiced by Grey Advertising composer Richard Berg and created by Alan Kupchick and Harold Karp (of Grey Advertising). Children, parched from playing, or other various activities, typically exchanged a few words referring to their thirst, then put a hand to the side of their mouths and shouted "Hey, Kool-Aid!", whereupon Kool-Aid Man made his grand entrance, breaking through walls, fences, ceilings, or furnishings, uttering the famous words "Oh yea
|
https://en.wikipedia.org/wiki/Tarjan%27s%20off-line%20lowest%20common%20ancestors%20algorithm
|
In computer science, Tarjan's off-line lowest common ancestors algorithm is an algorithm for computing lowest common ancestors for pairs of nodes in a tree, based on the union-find data structure. The lowest common ancestor of two nodes d and e in a rooted tree T is the node g that is an ancestor of both d and e and that has the greatest depth in T. It is named after Robert Tarjan, who discovered the technique in 1979. Tarjan's algorithm is an offline algorithm; that is, unlike other lowest common ancestor algorithms, it requires that all pairs of nodes for which the lowest common ancestor is desired must be specified in advance. The simplest version of the algorithm uses the union-find data structure, which unlike other lowest common ancestor data structures can take more than constant time per operation when the number of pairs of nodes is similar in magnitude to the number of nodes. A later refinement by speeds the algorithm up to linear time.
Pseudocode
The pseudocode below determines the lowest common ancestor of each pair in P, given the root r of a tree in which the children of node n are in the set n.children. For this offline algorithm, the set P must be specified in advance. It uses the MakeSet, Find, and Union functions of a disjoint-set forest. MakeSet(u) removes u to a singleton set, Find(u) returns the standard representative of the set containing u, and Union(u,v) merges the set containing u with the set containing v.
TarjanOLCA(r) is first called on the root r.
function TarjanOLCA(u) is
MakeSet(u)
u.ancestor := u
for each v in u.children do
TarjanOLCA(v)
Union(u, v)
Find(u).ancestor := u
u.color := black
for each v such that {u, v} in P do
if v.color == black then
print "Tarjan's Lowest Common Ancestor of " + u +
" and " + v + " is " + Find(v).ancestor + "."
Each node is initially white, and is colored black after it and all its children have been v
|
https://en.wikipedia.org/wiki/Freeze-casting
|
Freeze-casting, also frequently referred to as ice-templating, or freeze alignment, is a technique that exploits the highly anisotropic solidification behavior of a solvent (generally water) in a well-dispersed slurry to controllably template a directionally porous ceramic. By subjecting an aqueous slurry to a directional temperature gradient, ice crystals will nucleate on one side of the slurry and grow along the temperature gradient. The ice crystals will redistribute the suspended ceramic particles as they grow within the slurry, effectively templating the ceramic.
Once solidification has ended, the frozen, templated ceramic is placed into a freeze-dryer to remove the ice crystals. The resulting green body contains anisotropic macropores in a replica of the sublimated ice crystals and micropores found between the ceramic particles in the walls. This structure is often sintered to consolidate the particulate walls and provide strength to the porous material. The porosity left by the sublimation of solvent crystals is typically between 2–200 μm.
Overview
The first observation of cellular structures resulting from the freezing of water goes back over a century, but the first reported instance of freeze-casting, in the modern sense, was in 1954 when Maxwell et al. attempted to fabricate turbosupercharger blades out of refractory powders. They froze extremely thick slips of titanium carbide, producing near-net-shape castings that were easy to sinter and machine. The goal of this work, however, was to make dense ceramics. It was not until 2001, when Fukasawa et al. created directionally porous alumina castings, that the idea of using freeze-casting as a means of creating novel porous structures really took hold. Since that time, research has grown considerably with hundreds of papers coming out within the last decade.
The principles of freeze casting are applicable to a broad range of combinations of particles and suspension media. Water is by far the most commonly
|
https://en.wikipedia.org/wiki/MSX%20BASIC
|
MSX BASIC is a dialect of the BASIC programming language. It is an extended version of Microsoft's MBASIC Version 4.5, adding support for graphic, music, and various peripherals attached to MSX microcomputers. Generally, MSX BASIC is designed to follow GW-BASIC, released the same year for IBM PCs and clones. During the creation of MSX BASIC, effort was made to make the system flexible and expandable.
Distribution
MSX BASIC came bundled in the ROM of all MSX computers. At system start-up MSX BASIC is invoked, causing its command prompt to be displayed, unless other software placed in ROM takes control (which is the typical case of game cartridges and disk interfaces, the latter causing the MSX-DOS prompt to be shown if there is a disk present which contains the DOS system files).
When MSX BASIC is invoked, the ROM code for BIOS and the BASIC interpreter itself are visible on the lower 32K of the Z80 addressing space. The upper 32K are set to RAM, of which about 23K to 28K are available for BASIC code and data (the exact amount depends on the presence of disk controller and on the MSX-DOS kernel version).
Development Environment
MSX BASIC development environment is very similar to other versions of Microsoft BASIC. It has a command line-based Integrated Development Environment (IDE) system; all program lines must be numbered, all non-numbered lines are considered to be commands in direct mode (i.e., to be executed immediately). The user interface is entirely command-line-based.
Versions of MSX BASIC
Every new version of the MSX computer was bundled with an updated version of MSX BASIC. All versions are backward compatible and provide new capabilities to fully explore the new and extended hardware found on the newer MSX computers.
MSX BASIC 1.0
Bundled with MSX1 computers
16 KB in size
No native support for floppy disk requiring the Disk BASIC cartridge extension (4 KB overhead)
Support for all available screen modes:
Screen 0 (text mode 40 x 24 characte
|
https://en.wikipedia.org/wiki/Thyristor
|
A thyristor () is a solid-state semiconductor device with four layers of alternating P- and N-type materials used for high-power applications. It acts as a bistable switch (or a latch). There are two designs, differing in what triggers the conducting state. In a three-lead thyristor, a small current on its gate lead controls the larger current of the anode-to-cathode path. In a two-lead thyristor, conduction begins when the potential difference between the anode and cathode themselves is sufficiently large (breakdown voltage). The thyristor continues conducting until the voltage across the device is reverse-biased, the voltage is removed (by some other means), or through the control gate signal on newer types.
Some sources define "silicon-controlled rectifier" (SCR) and "thyristor" as synonymous. Other sources define thyristors as more complex devices that incorporate at least four layers of alternating N-type and P-type substrate.
The first thyristor devices were released commercially in 1956. Because thyristors can control a relatively large amount of power and voltage with a small device, they find wide application in control of electric power, ranging from light dimmers and electric motor speed control to high-voltage direct-current power transmission. Thyristors may be used in power-switching circuits, relay-replacement circuits, inverter circuits, oscillator circuits, level-detector circuits, chopper circuits, light-dimming circuits, low-cost timer circuits, logic circuits, speed-control circuits, phase-control circuits, etc. Originally, thyristors relied only on current reversal to turn them off, making them difficult to apply for direct current; newer device types can be turned on and off through the control gate signal. The latter is known as a gate turn-off thyristor, or GTO thyristor.
Unlike transistors, thyristors have a two-valued switching characteristic, meaning that a thyristor can only be fully on or off, while a transistor can lie in between on
|
https://en.wikipedia.org/wiki/Major%20immunogene%20complex
|
The Major immunogene complex (MIC) is a gene sequence containing loci coding for antigens on lymphocyte surface (Ia) histocompatibility (H) antigens, products of immune responses, and components system proteins.
The genes that code for immunoglobulins are assorted independently of the MIC, but the plasma cells which produce immunoglobulins are under the control of products of the MIC.
See also
Major histocompatibility complex
Immune system
|
https://en.wikipedia.org/wiki/Cake%20theory
|
Cake theory () is a metaphor about economic development and the redistribution of wealth in the political discourse of China. It emerged in 2010 as problems with an increased wealth gap became gradually more apparent. If economic development is seen as analogous to baking a cake, one side of the debate suggests that development should focus on "dividing the cake more fairly", while the other says development should be focused on "baking a bigger cake".
Synopsis
Thirty years of economic growth in China has resulted in higher standards of living and a substantial growth in national income, but also led to a widening wealth gap and a host of associated social problems. Conflicts are emerging between the haves and have-nots of society. The nouveau riche are seen as variously the beneficiaries of their hard work and enterprising character under the new market economy, or as cheaters of the system and inheritors of unfair privilege. At the 2010 National People's Congress, Premier Wen Jiabao remarked that "we must develop our economy to make the cake that is prosperity bigger, but also use a reasonable system to distribute the cake fairly."
To deal with the increasingly sharp conflicts between different interest groups, the Chinese Communist Party was said to have split ideologically over the "cake issue". On one side, orthodox communists suggest that the solution is to focus on distributing the wealth while pursuing higher growth ("dividing the cake"), while reformers and liberals suggest that the solution is to pursue continued growth and worry about dividing the wealth once the material wealth threshold is reached ("baking a bigger cake").
The ideological cleavage surfaced publicly in a war of words in late 2011, when Guangdong party chief Wang Yang stated that "one must bake a bigger cake first before dividing it." Wang said that "continued economic development" must take precedence over all other tasks. In response, Chongqing party chief Bo Xilai remarked, "Some pe
|
https://en.wikipedia.org/wiki/UML%20tool
|
A UML tool is a software application that supports some or all of the notation and semantics associated with the Unified Modeling Language (UML), which is the industry standard general-purpose modeling language for software engineering.
UML tool is used broadly here to include application programs which are not exclusively focused on UML, but which support some functions of the Unified Modeling Language, either as an add-on, as a component or as a part of their overall functionality.
Kinds of Functionality
UML tools support the following kinds of functionality:
Diagramming
Diagramming in this context means creating and editing UML diagrams; that is diagrams that follow the graphical notation of the Unified Modeling Language.
The use of UML diagrams as a means to draw diagrams of – mostly – object-oriented software is generally agreed upon by software developers. When developers draw diagrams of object-oriented software, they usually follow the UML notation. On the other hand, it is often debated whether those diagrams are needed at all, during what stages of the software development process they should be used, and how (if at all) they should be kept up to date. The primacy of software code often leads to the diagrams being deprecated.
Round-trip engineering
Round-trip engineering refers to the ability of a UML tool to perform code generation from models, and model generation from code (a.k.a., reverse engineering), while keeping both the model and the code semantically consistent with each other. Code generation and reverse engineering are explained in more detail below.
Code generation
Code generation in this context means that the user creates UML diagrams, which have some connected model data, and the UML tool derives from the diagrams part or all of the source code for the software system. In some tools the user can provide a skeleton of the program source code, in the form of a source code template, where predefined tokens are then replaced with program
|
https://en.wikipedia.org/wiki/Conjunctive%20grammar
|
Conjunctive grammars are a class of formal grammars
studied in formal language theory.
They extend the basic type of grammars,
the context-free grammars,
with a conjunction operation.
Besides explicit conjunction,
conjunctive grammars allow implicit disjunction
represented by multiple rules for a single nonterminal symbol,
which is the only logical connective expressible in context-free grammars.
Conjunction can be used, in particular,
to specify intersection of languages.
A further extension of conjunctive grammars
known as Boolean grammars
additionally allows explicit negation.
The rules of a conjunctive grammar are of the form
where is a nonterminal and
, ...,
are strings formed of symbols in and (finite sets of terminal and nonterminal symbols respectively).
Informally, such a rule asserts that
every string over
that satisfies each of the syntactical conditions represented
by , ...,
therefore satisfies the condition defined by .
Formal definition
A conjunctive grammar is defined by the 4-tuple where
is a finite set; each element is called a nonterminal symbol or a variable. Each variable represents a different type of phrase or clause in the sentence. Variables are also sometimes called syntactic categories.
is a finite set of terminals, disjoint from , which make up the actual content of the sentence. The set of terminals is the alphabet of the language defined by the grammar .
is a finite set of productions, each of the form for some in and . The members of are called the rules or productions of the grammar.
is the start variable (or start symbol), used to represent the whole sentence (or program). It must be an element of .
It is common to list all right-hand sides for the same left-hand side on the same line, using | (the pipe symbol) to separate them. Rules and can hence be written as .
Two equivalent formal definitions
of the language specified by a conjunctive grammar exist.
One definition is based upon representing the gram
|
https://en.wikipedia.org/wiki/Metabolic%20trapping
|
Metabolic trapping refers to a localization mechanism of synthesized radiocompounds in the human body. It can be defined as the intracellular accumulation of a radioactive tracer based on the relative metabolic activity of the body's tissues. It is a basic principle of the design of radiopharmaceuticals as metabolic probes for functional studies or tumor location.
Metabolic trapping is the mechanism underlying the (PET) scan, an effective tool for detecting tumors, as there is a greater uptake of the target molecule by tumor tissue than by normal tissue.
In order to use it as a diagnostic tool in medicine, scientists have studied the trapping of radioactive molecules within different tissues throughout the body. In 1978, Gallagher et al. studied glucose tagged with Fluorine-18 (F-18) to see how it metabolized in the tissues of different organs. This group studied how long it took the lungs, liver, kidneys, heart, and brain to metabolize radioactive glucose. They found the molecule distributed uniformly, and then, after two hours, only the heart and the brain had significant levels of radioactivity from the F-18 due to metabolic trapping. This trapping occurred because once the glucose was pulled into the cells, the glucose was phosphorylated to cause the concentration of glucose in the cell to appear lower than it is, which then promotes the transport of more glucose. This phosphorylation of the radioactive glucose caused the metabolic trapping in the heart and the brain. The lungs, liver, and kidneys did not experience metabolic trapping, and the radioactive glucose that was not trapped was excreted in the urine. F-18 radiolabeled glucose did not get collected by the kidneys and cycled back into the system, as it would do for normal glucose. This suggests that the active transporter requires the hydroxyl (-OH) group found on the C-2 position of the sugar, where the F-18 atom was placed. Without the active transport, the radiolabeled glucose that was not trapped
|
https://en.wikipedia.org/wiki/Demineralization%20%28physiology%29
|
Demineralization - it is the opposite process of mineralization, a process to reduce the content of mineral substances in tissue or organism, such as bone demineralization, of teeth. Demineralization can lead to serious diseases such as osteoporosis or tooth decay.
Usually, treatment involves administration of appropriate dietary supplements to help restore the remineralization of human tissues and their physiological state.
|
https://en.wikipedia.org/wiki/184%20%28number%29
|
184 (one hundred [and] eighty-four) is the natural number following 183 and preceding 185.
In mathematics
There are 184 different Eulerian graphs on eight unlabeled vertices, and 184 paths by which a chess rook can travel from one corner of a 4 × 4 chessboard to the opposite corner without passing through the same square twice. 184 is also a refactorable number.
In other fields
Some physicists have proposed that 184 is a magic number for neutrons in atomic nuclei.
In poker, with one or more jokers as wild cards, there are 184 different straight flushes.
See also
The year AD 184 or 184 BC
List of highways numbered 184
|
https://en.wikipedia.org/wiki/Geoid
|
The geoid () is the shape that the ocean surface would take under the influence of the gravity of Earth, including gravitational attraction and Earth's rotation, if other influences such as winds and tides were absent. This surface is extended through the continents (such as with very narrow hypothetical canals). According to Gauss, who first described it, it is the "mathematical figure of the Earth", a smooth but irregular surface whose shape results from the uneven distribution of mass within and on the surface of Earth. It can be known only through extensive gravitational measurements and calculations. Despite being an important concept for almost 200 years in the history of geodesy and geophysics, it has been defined to high precision only since advances in satellite geodesy in the late 20th century.
All points on a geoid surface have the same geopotential (the sum of gravitational potential energy and centrifugal potential energy). The force of gravity acts everywhere perpendicular to the geoid, meaning that plumb lines point perpendicular and bubble levels are parallel to the geoid.
Being an equigeopotential means the geoid corresponds to the free surface of water at rest (if only gravity and rotational acceleration were at work); this is also a sufficient condition for a ball to remain at rest instead of rolling over the geoid.
Earth's gravity acceleration (the vertical derivative of geopotential) is thus non-uniform over the geoid.
The geoid undulation or geoidal height is the height of the geoid relative to a given reference ellipsoid.
The geoid serves as a coordinate surface for various vertical coordinates, such as orthometric heights, geopotential heights, and dynamic heights (see Geodesy#Heights).
Description
The geoid surface is irregular, unlike the reference ellipsoid (which is a mathematical idealized representation of the physical Earth as an ellipsoid), but is considerably smoother than Earth's physical surface. Although the "ground" of the Ea
|
https://en.wikipedia.org/wiki/Spatial%20embedding
|
Spatial embedding is one of feature learning techniques used in spatial analysis where points, lines, polygons or other spatial data types. representing geographic locations are mapped to vectors of real numbers. Conceptually it involves a mathematical embedding from a space with many dimensions per geographic object to a continuous vector space with a much lower dimension.
Such embedding methods allow complex spatial data to be used in neural networks and have been shown to improve performance in spatial analysis tasks
Embedded data types
Geographic data can take many forms: text, images, graphs, trajectories, polygons. Depending on the task, there may be a need to combine multimodal data from different sources. The next section describes examples of different types of data and their uses.
Text
Geolocated posts on social media can be used to acquire a library of documents bound to a given place that can be later transformed to embedded vectors using word embedding techniques.
Image
Satellites and aircraft collect digital spatial data acquired from remotely sensed images which can be used in machine learning. They are sometimes hard to analyse using basic image analysis methods and convolutional neural networks can be used to acquire an embedding of images bound to a given geographical object or a region.
Point
A single point of interest (POI) can be assigned multiple features that can be used in machine learning. These could be demographic, transportation, meteorological, or economic data, for example. When embedding single points, it is common to consider the entire set of available points as nodes in a graph.
Line / multiline
Among other things, motion trajectories are represented as lines (multilines). Individual trajectories are embedded taking into account travel time, distances and also features of points visited along the way. Embedding of trajectories allows to improve performance of such tasks as clustering and also categorization.
Polygon
The
|
https://en.wikipedia.org/wiki/Toxicokinetics
|
Toxicokinetics (often abbreviated as 'TK') is the description of both what rate a chemical will enter the body and what occurs to excrete and metabolize the compound once it is in the body.
Relation to Pharmacokinetics
It is an application of pharmacokinetics to determine the relationship between the systemic exposure of a compound and its toxicity. It is used primarily for establishing relationships between exposures in toxicology experiments in animals and the corresponding exposures in humans. However, it can also be used in environmental risk assessments in order to determine the potential effects of releasing chemicals into the environment. In order to quantify toxic effects, toxicokinetics can be combined with toxicodynamics. Such toxicokinetic-toxicodynamic (TKTD) models are used in ecotoxicology (see ecotoxmodels a website on mathematical models in ecotoxicology).
Similarly, physiological toxicokinetic models are physiological pharmacokinetic models developed to describe and predict the behavior of a toxicant in an animal body; for example, what parts (compartments) of the body a chemical may tend to enter (e.g. fat, liver, spleen, etc.), and whether or not the chemical is expected to be metabolized or excreted and at what rate.
Processes
Four potential processes exist for a chemical interacting with an animal: absorption, distribution, metabolism and excretion (ADME). Absorption describes the entrance of the chemical into the body, and can occur through the air, water, food, or soil. Once a chemical is inside a body, it can be distributed to other areas of the body through diffusion or other biological processes. At this point, the chemical may undergo metabolism and be biotransformed into other chemicals (metabolites). These metabolites can be less or more toxic than the parent compound. After this potential biotransformation occurs, the metabolites may leave the body, be transformed into other compounds, or continue to be stored in the body compartmen
|
https://en.wikipedia.org/wiki/Mojo%20Motors
|
Mojo Motors, Inc. was an American automotive classified website for preowned automobiles.
Founder Paul Nadjarian was a Ford Motor Company and eBay Motors executive before starting Mojo Motors, Inc. in 2011. The startup aggregates used cars from dealerships in a geographic area that offer discount pricing and then alerts shoppers when the price of the vehicle they are following drops in price.
In 2012, the company secured nearly $5 million in funding from venture firms Atlas Venture, RPM Ventures and NextView Ventures to expand nationwide.
|
https://en.wikipedia.org/wiki/Abdullah%20Atalar
|
Abdullah Atalar (born April 11, 1954) is a Turkish scientist and academic. Atalar was the Rector of İhsan Doğramacı Bilkent University, and a professor at Department of Electrical and Electronics Engineering. He received B.S. degree from Middle East Technical University, in 1974, M.S. and Ph.D. degrees from Stanford University in 1976 and 1978, respectively, all in Electrical Engineering. His thesis work was on reflection acoustic microscopy.
Atalar is a member of Turkish Academy of Sciences,. He was a member of Scientific and Technological Research Council (TÜBİTAK) science board (2004-2011), and chairman of the board of directors of TUBITAK Space (2004-2007) and TUBITAK Ulakbim (2004-2012). He is the chairman of the board of directors of Bilkent Holding, the endowment company owned wholly by Bilkent University. He is a recipient of TUBITAK's science award (1994). He is a fellow of the IEEE. He is married to Ayşe, granddaughter of İhsan Doğramacı, founder of İhsan Doğramacı Bilkent University.
|
https://en.wikipedia.org/wiki/PhiU53%20holin%20family
|
The Firmicute Phage φU53 Holin (φU53 Holin) Family (TC# 1.E.13) consists of putative holins that range in size from 117 to 124 amino acyl residues (aas) in length and exhibit 3 transmembrane segments (TMSs) found in Bacillota phage. While annotated as holins, it appears as though many members of the φU53 holin family are not yet functionally characterized. A representative list of homologues can be found in the Transporter Classification Database.
See also
Holin
Lysin
Transporter Classification Database
Further reading
Chandry, P. S.; Moore, S. C.; Boyce, J. D.; Davidson, B. E.; Hillier, A. J. (1997-10-01). "Analysis of the DNA sequence, gene expression, origin of replication and modular structure of the Lactococcus lactis lytic bacteriophage sk1". Molecular Microbiology 26 (1): 49–64. . .
Saier, Milton H.; Reddy, Bhaskara L. (2015-01-01). "Holins in Bacteria, Eukaryotes, and Archaea: Multifunctional Xenologues with Potential Biotechnological and Biomedical Applications". Journal of Bacteriology 197(1): 7–17. . . . .
Wang, I. N.; Smith, D. L.; Young, R. (2000-01-01). "Holins: the protein clocks of bacteriophage infections". Annual Review of Microbiology 54: 799–825. . . .
|
https://en.wikipedia.org/wiki/Bozo%20the%20Clown
|
Bozo the Clown, sometimes billed as "Bozo, The World's Most Famous Clown", is a clown character created for children's entertainment, widely popular in the second half of the 20th century. He was introduced in the United States in 1946, and to television in 1949, later appearing in franchised television programs of which he was the host, where he was portrayed by numerous local performers.
Creation and history
The character was created by Alan W. Livingston, and portrayed by Pinto Colvig for a children's storytelling record album and illustrated read-along book set in 1946. He became popular and served as the mascot for Capitol Records.
The character first appeared on US television in 1949 portrayed by Colvig. After the creative rights to Bozo were purchased by Larry Harmon in 1957, the character became a common franchise across the United States, with local television stations producing their own Bozo shows featuring the character. Harmon bought out his business partners in 1965 and produced Bozo's Big Top for syndication to local television markets not producing their own Bozo shows in 1966, while Chicago's Bozo's Circus, which premiered in 1960, went national via cable and satellite in 1978.
Performers who have portrayed Bozo, aside from Colvig and Harmon, include Syd Saylor (1950s on KTTV), Earl Frank Cady (WJRT-TV, 1967-), Willard Scott (1959–1962), Frank Avruch (1959–1970), Bob Bell (1960–1984), and Joey D'Auria (1984–2001). Bozo TV shows were also produced in other countries including Mexico, Brazil, Greece, Australia, and Thailand.
David Arquette purchased the rights to the Bozo the Clown character from Larry Harmon Pictures in 2021.
Animation feature
Bozo appeared in a 1958–1962 animated series, Bozo: The World's Most Famous Clown. The voice cast included Larry Harmon starring as Bozo, with Paul Frees as the narrator.
Franchises and licensing
Bozo was created as a character by Livingston, who produced a children's storytelling record-album and illust
|
https://en.wikipedia.org/wiki/Buffy%20coat
|
The buffy coat is the fraction of an anticoagulated blood sample that contains most of the white blood cells and platelets following centrifugation.
Description
After centrifugation, one can distinguish a layer of clear fluid (the plasma), a layer of red fluid containing most of the red blood cells, and a thin layer in between. Composing less than 1% of the total volume of the blood sample, the buffy coat (so-called because it is usually buff in hue), contains most of the white blood cells and platelets. The buffy coat is usually whitish in color, but is sometimes green if the blood sample contains large amounts of neutrophils, which are high in green-colored myeloperoxidase. The layer beneath the buffy coat contains granulocytes and red blood cells.
The buffy coat is commonly used for DNA extraction, with white blood cells providing approximately 10 times more concentrated sources of nucleated cells. They are extracted from the blood of mammals because mammalian red blood cells are anucleate and do not contain DNA. A common protocol is to store buffy coat specimens for future DNA isolation and these may remain in frozen storage for many years.
Diagnostic uses
Quantitative buffy coat (QBC), based on the centrifugal stratification of blood components, is a laboratory test for the detection of malarial parasites, as well as of other blood parasites.
The blood is taken in a QBC capillary tube which is coated with acridine orange (a fluorescent dye) and centrifuged; the fluorescing parasitized erythrocytes get concentrated in a layer which can then be observed by fluorescence microscopy, under ultraviolet light at the interface between red blood cells and buffy coat. This test is more sensitive than the conventional thick smear and in > 90% of cases the species of parasite can also be identified.
In cases of extremely low white blood cell count, it may be difficult to perform a manual differential of the various types of white cells, and it may be virtually impossi
|
https://en.wikipedia.org/wiki/262%20%28number%29
|
262 (two hundred [and] sixty-two) is a natural number preceded by the number 261 and followed by 263. It has the prime factorization 2·131.
Mathematical properties
There are four divisors of this number, the divisors being , , , and 262 itself, which makes it a semiprime.
It is the sixth meandric number, and the ninth open meandric number.
As it cannot be divided into the sum of the proper divisors of any number, it is the 17th untouchable number.
As it eventually reaches 1 when replaced by the sum of the square of each digit, it is the 40th 10-happy number.
As 262 is 262 backwards, it is a palindromic number.
|
https://en.wikipedia.org/wiki/Navin%20M.%20Singhi
|
Navin Madhavprasad Singhi (born 1949) is an Indian mathematician and a Professor Emeritus at Tata Institute of Fundamental Research, Mumbai, specializing in combinatorics and graph theory. He is the recipient of the prestigious Shanti Swarup Bhatnagar Prize for Science and Technology. Singhi is known for his research in block designs, projective planes, Intersection graphs of hypergraphs, and coding theory. He was a visiting professor at IIT Mumbai, University of Mumbai, Indian Statistical Institute and other various universities in the United States and Europe.
Early life
Singhi was born in Indore and raised in Goregaon, Mumbai and earned a M.A. in mathematics from the University of Mumbai.
Career
Singhi earned a Ph.D. (1974) from the University of Mumbai, his advisor was S. S. Shrikhande. Professor Singhi is a Fellow of the Indian National Science Academy.
|
https://en.wikipedia.org/wiki/Ideal%20%28order%20theory%29
|
In mathematical order theory, an ideal is a special subset of a partially ordered set (poset). Although this term historically was derived from the notion of a ring ideal of abstract algebra, it has subsequently been generalized to a different notion. Ideals are of great importance for many constructions in order and lattice theory.
Definitions
A subset of a partially ordered set is an ideal, if the following conditions hold:
is non-empty,
for every x in and y in P, implies that y is in ( is a lower set),
for every x, y in , there is some element z in , such that and ( is a directed set).
While this is the most general way to define an ideal for arbitrary posets, it was originally defined for lattices only. In this case, the following equivalent definition can be given:
a subset of a lattice is an ideal if and only if it is a lower set that is closed under finite joins (suprema); that is, it is nonempty and for all x, y in , the element of P is also in .
A weaker notion of order ideal is defined to be a subset of a poset that satisfies the above conditions 1 and 2. In other words, an order ideal is simply a lower set. Similarly, an ideal can also be defined as a "directed lower set".
The dual notion of an ideal, i.e., the concept obtained by reversing all ≤ and exchanging with is a filter.
Frink ideals, pseudoideals and Doyle pseudoideals are different generalizations of the notion of a lattice ideal.
An ideal or filter is said to be proper if it is not equal to the whole set P.
The smallest ideal that contains a given element p is a and p is said to be a of the ideal in this situation. The principal ideal for a principal p is thus given by .
Terminology confusion
The above definitions of "ideal" and "order ideal" are the standard ones, but there is some confusion in terminology. Sometimes the words and definitions such as "ideal", "order ideal", "Frink ideal", or "partial order ideal" mean one another.
Prime ideals
An important
|
https://en.wikipedia.org/wiki/Author%20profiling
|
Author profiling is the analysis of a given set of texts in an attempt to uncover various characteristics of the author based on stylistic- and content-based features, or to identify the author. Characteristics analysed commonly include age and gender, though more recent studies have looked at other characteristics like personality traits and occupation
Author profiling is one of the three major fields in automatic authorship identification (AAI), the other two being authorship attribution and authorship identification. The process of AAI emerged at the end of the 19th century. Thomas Corwin Mendenhall, an American autodidact physicist and meteorologist, was the first to apply this process to the works of Francis Bacon, William Shakespeare, and Christopher Marlowe. From these three historic figures, Mendenhall sought to uncover their quantitative stylistic differences by inspecting word lengths.
Although much progress has been made in the 21st century, the task of author profiling remains an unsolved problem due to its difficulty.
Techniques
Through the analysis of texts, various author profiling techniques can be applied to predict information about the author. For example, function words, as well as part-of-speech analysis, can be referenced to determine the author's gender and truth of a text.
The process of author profiling usually involves the following steps:
Identifying specific features to be extracted from the text
Building an adopted, standard representation (e.g.Bag-of-words model) for the target profile
Building a classification model using a standard classifier (e.g. Support Vector Machines) for the target profile
Machine learning algorithms for author profiling have become increasingly complex over time. Algorithms used in author profiling include:
Support Vector Machines
Naive Bayes classifiers
Deep averaging networks, many layers in a cycle of machine learning that uses the mean of word embeddings within a text
Long Short-Term memory
|
https://en.wikipedia.org/wiki/BraSCII
|
BraSCII is an encoded repertoire of characters that was used in Brazil. It was used in the 1980s on several printers, in applications like , in video boards and it was the standard character set in the Brazilian line of MSX computers. This code page is known by Star printers as Code page 3847.
History
This character set was devised in 1986 by the Brazilian National Standards Organization (Associação Brasileira de Normas Técnicas (ABNT)) through the standard NBR-9614:1986 and later revised in 1991 in the standard NBR-9611:1991.
The code is based on the ISO/IEC 4873 standards, and it was nicknamed "BraSCII" (Brazilian Standard Code for Information Interchange) in analogy to "American Standard Code for Information Interchange" (ASCII). While ASCII is a 7-bit code, BraSCII is an 8-bit code, where the characters from 160 to 255 were configured to support extended characters. It is nearly identical to ECMA-94 (1985) and ISO 8859-1 (1987) except that the characters × and ÷ are replaced by Œ and œ, as they still were in the Multinational Character Set (MCS, 1983) and Lotus International Character Set (LICS, 1985), whereas these code points were empty in the earliest versions of ECMA-94 (1985) and ISO 8859-1. However, it is completely identical for the first draft of ECMA-94 and ISO 8859-1. In some other devices, this character set is simply referred as "ABNT".
This character set was different from the other Brazilian character set, ABICOMP.
The goal of this character set was to eliminate the "Babel's Tower" of the existing coding systems for the Portuguese language (ISO IR-16, ISO IR-84, IBM 256, IBM 275, IBM 850, DEC Multinational, HP Roman-8, Mac OS Roman, etc.). In spite of that, this code set had troubles in imposing itself, mainly due to the pressure of big multinational corporations and finished by being less and less used because of the ubiquity of other character sets (ISO 8859-1 and later Unicode).
Coverage
Each character is encoded as a single eight-bit cod
|
https://en.wikipedia.org/wiki/Elliptic%20operator
|
In the theory of partial differential equations, elliptic operators are differential operators that generalize the Laplace operator. They are defined by the condition that the coefficients of the highest-order derivatives be positive, which implies the key property that the principal symbol is invertible, or equivalently that there are no real characteristic directions.
Elliptic operators are typical of potential theory, and they appear frequently in electrostatics and continuum mechanics. Elliptic regularity implies that their solutions tend to be smooth functions (if the coefficients in the operator are smooth). Steady-state solutions to hyperbolic and parabolic equations generally solve elliptic equations.
Definitions
Let be a linear differential operator of order m on a domain in Rn given by
where denotes a multi-index, and denotes the partial derivative of order in .
Then is called elliptic if for every x in and every non-zero in Rn,
where .
In many applications, this condition is not strong enough, and instead a uniform ellipticity condition may be imposed for operators of order m = 2k:
where C is a positive constant. Note that ellipticity only depends on the highest-order terms.
A nonlinear operator
is elliptic if its linearization is; i.e. the first-order Taylor expansion with respect to u and its derivatives about any point is an elliptic operator.
Example 1 The negative of the Laplacian in Rd given by is a uniformly elliptic operator. The Laplace operator occurs frequently in electrostatics. If ρ is the charge density within some region Ω, the potential Φ must satisfy the equation
Example 2 Given a matrix-valued function A(x) which is symmetric and positive definite for every x, having components aij, the operator is elliptic. This is the most general form of a second-order divergence form linear elliptic differential operator. The Laplace operator is obtained by taking A = I. These operators also occur in electrostatics in pola
|
https://en.wikipedia.org/wiki/Trophozoite
|
A trophozoite (G. trope, nourishment + zoon, animal) is the activated, feeding stage in the life cycle of certain protozoa such as malaria-causing Plasmodium falciparum and those of the Giardia group. (The complement of the trophozoite state is the thick-walled cyst form.)
They are often different from the cyst stage, which is a protective, dormant form of the protozoa. Trophozoites are often found in the host's body fluids and tissues and in many cases, they are the form of the protozoan that causes disease in the host. (The complement of the trophozoite state is the thick-walled cyst form.) In the protozoan, Entamoeba histolytica it invades the intestinal mucosa of its host, causing dysentery, which aid in the trophozoites traveling to the liver and leading to the production of hepatic abscesses.
Life cycle stages
Trophozoite and cyst stages are shown in the life cycle of Balantidium coli the causative agent of balantidiasis.
In the apicomplexan life cycle the trophozoite undergoes schizogony (asexual reproduction) and develops into a schizont which contains merozoites.
The trophozoite life stage of Giardia colonizes and proliferates in the small intestine. Trophozoites develop during the course of the infection into cysts which is the infectious life stage.
|
https://en.wikipedia.org/wiki/Key%20%28engineering%29
|
In mechanical engineering, a key is a machine element used to connect a rotating machine element to a shaft. The key prevents relative rotation between the two parts and may enable torque transmission. For a key to function, the shaft and rotating machine element must have a keyway and a keyseat, which is a slot and pocket in which the key fits. The whole system is called a keyed joint. A keyed joint may allow relative axial movement between the parts.
Commonly keyed components include gears, pulleys, couplings, and washers.
Types
There are five main types of keys: sunk, saddle, tangent, round, and spline.
Sunk key
Types of sunk keys: rectangular, square, parallel sunk, gib-head, feather, and Woodruff.
Parallel keys
Parallel keys are the most widely used. They have a square or rectangular cross-section. Square keys are used for smaller shafts and rectangular faced keys are used for shaft diameters over or when the wall thickness of the mating hub is an issue. Set screws often accompany parallel keys to lock the mating parts into place. The keyway is a longitudinal slot in both the shaft and mating part.
W =
H =
where
W is the key width
H is the key height
d is the shaft diameter
Woodruff keys
Woodruff keys are semicircular, fitting partly into a circular segment keyway with the remainder fitting into a longitudinal slot keyway in the mating part. The circular segment can be cut directly by plunge cutting with a circular Woodruff cutter without any reliefs. The main advantage of the Woodruff key is the elimination of milling near shaft shoulders, where stress concentrations, and concentricity would be affected. The latter is particularly important for high speed operation. The more exact fit of the key and keyway also reduces play, and stress concentrations in, and improves the reliability of the key. An additional advantage is a stuck key can be removed from a shaft with a hammer blow, the circular profile will push the key out of the slot, as opp
|
https://en.wikipedia.org/wiki/Journal%20of%20Phycology
|
The Journal of Phycology is a bimonthly peer-reviewed scientific journal of phycology (the study of algae), published by John Wiley & Sons, Inc. on behalf of the Phycological Society of America. The journal was established in 1965 and published quarterly until 1992, when it changed to a bimonthly format.
Abstracting and indexing
The journal is abstracted and indexed in:
According to the Journal Citation Reports, the journal has a 2020 impact factor of 2.923, ranking it 22nd out of 111 journals in the category "Marine & Freshwater Biology" and 76th out of 235 journals in the category "Plant Sciences".
|
https://en.wikipedia.org/wiki/Ileocolic
|
In many Animalia, including humans, an ileocolic structure or problem is something that concerns the region of the gastrointestinal tract from the ileum to the colon. In Animalia that have ceca, the ileocecal region is a subset of the ileocolic region, and the entire range can also be described as ileocecocolic, whereas in some Animalia, the ileocolic region contains no cecum, as the ileum joins the colon directly.
Things that are ileocolic, ileocecal, or both include the following:
Ileocecal fold
Ileocecal/ileocolic intussusception
Ileocecal valve
Ileocolic artery
Ileocolic lymph nodes
Ileocolic vein
|
https://en.wikipedia.org/wiki/Ewa%20Kubicka
|
Ewa Maria Kubicka is a Polish mathematician interested in graph theory and actuarial science. She is known for introducing the concept of the chromatic sum of a graph, the minimum possible sum when the vertices are labeled by natural numbers with no two adjacent vertices having equal labels.
Kubicka studied mathematics at Wrocław University of Science and Technology beginning in 1974, and earned a master's degree there in 1979. She came to Western Michigan University for graduate study, earning both a master's degree in computer science and a Ph.D. in mathematics in 1989. Her dissertation, The Chromatic Sum and Efficient Tree Algorithms, was supervised by Allen J. Schwenk. She became an assistant professor at Emory University and then, in 1990, moved to the University of Louisville, where she has been a full professor since 2004. At Louisville, she directs the actuarial program and is undergraduate advisor for mathematics.
She is known for having an erdős number of one.
Selected publications
.
.
.
.
.
.
.
.
.
.
.
|
https://en.wikipedia.org/wiki/Ractopamine
|
Ractopamine () is an animal feed additive used to promote leanness and increase food conversion efficiency in farmed animals in several countries, but banned in others. Pharmacologically, it is a phenol-based TAAR1 agonist and β adrenoreceptor agonist that stimulates β1 and β2 adrenergic receptors.
It is most commonly administered to animals for meat production as ractopamine hydrochloride. It is the active ingredient in products marketed in the US as Paylean for swine, Optaflexx for cattle, and Topmax for turkeys. It was developed by Elanco Animal Health, a division of Eli Lilly and Company.
As of 2014, the use of ractopamine was banned in 160 countries, including the European Union, China and Russia, while 27 other countries, such as Japan, the United States, South Korea, and New Zealand have deemed meat from livestock fed ractopamine safe for human consumption.
Commercial ractopamine is a mixture of all four possible stereoisomers. It is also a positional isomer of dobutamine, a related drug.
Mode of action
When used as a food additive, ractopamine added to feed can be distributed by the blood to the muscle tissues, where it serves as a full agonist to murine (mouse or rat) TAAR1, a receptor protein (not necessarily in humans). It is also an agonist to beta-adrenergic receptors. A cascade of events will then be initiated to increase protein synthesis, which results in increased muscle fiber size. Ractopamine is known to increase the rate of weight gain, improve feed efficiency, and increase carcass leanness in finishing swine. Its use in finishing swine yields about of additional lean pork per animal, and improves feed efficiency by 10%. In cattle on 28 January 2004 Elanco Animal Health
made Optaflexx commercially available in the US. Optaflexx is a "medicated feed additive that is labeled only for use in steers or market heifers (not breeding heifers or bulls) during the last 28–42 days on feed."
Regulation around the world
On 6 July 2012, the internationa
|
https://en.wikipedia.org/wiki/High%E2%80%93low%20system
|
The high–low system (or high–low pressure system, high–low propulsion system, high–low projection system) is a design of cannon and anti-tank warfare launcher using a smaller high-pressure chamber to store propellant. It allows a much larger projectile to be launched without the heavy equipment usually needed for large caliber weapons. When the propellant is ignited, the higher pressure gases are bled out through vents (or ports) at reduced pressure to a much larger low pressure chamber to push a projectile forward. The high-low system allows the weight of the weapon and its ammunition to be reduced significantly. Production cost and time are drastically lower than for standard cannon or other small-arm weapon systems firing a projectile of the same size and weight. It has a far more efficient use of the propellant, unlike earlier recoilless weapons, where most of the propellant is expended to the rear of the weapon to counter the recoil of the projectile being fired.
Origin
In the final years of World War II, Nazi Germany researched and developed low-cost anti-tank weapons. Large anti-tank cannon firing high velocity projectiles were the best option, but costly to produce and required a well trained crew. They also lacked mobility on the battlefield once emplaced. Anti-tank rocket launchers and recoilless rifles, while much lighter and simpler to manufacture, gave the gunner's position away and were not as accurate as anti-tank cannons. Recoilless rifles used a huge amount of propellant to fire the projectile, with estimates ranging from only one-fifth to one-ninth of the propellant gases being used to push the projectile forward. The German military asked for an anti-tank weapon with performance in-between that of the standard high velocity cannon and the cheaper rocket and recoilless infantry anti-tank weapons. They also stipulated that any solution had to be more efficient in the use of propellant, as the German war industry had reached maximum cannon propellan
|
https://en.wikipedia.org/wiki/Inverted%20nun
|
Inverted ( "isolated " or "inverted " or "" in Hebrew) is a rare glyph used in classical Hebrew. Its function in the ancient texts is disputed. It takes the form of the letter in mirror image, and appears in the Masoretic text of the Tanakh in nine different places:
Numbers - twice, 10:35–36: the two verses are delineated by inverted , sometimes isolated outside the passage text and sometimes embedded within words in verses 10:35 and 11:1.
Psalms - seven times in chapter 107 (vs 20-25, vs 39)
The images at right show three common variants of the inverted – vertically flipped, horizontally flipped, and Z-shaped. Other renderings exist, corresponding to alternative interpretations of the term "inverted". It may also occur with a dot above.
Occurrence and appearance
Inverted are found in nine passages of the Masoretic Text of the Bible. The exact shape varies between different manuscripts and printed editions. In many manuscripts, a reversed is found, referred to as a "" by the Masoretes. In some earlier printed editions, they are shown as the standard upside down or rotated, presumably because the printer did not want to design a new rare character. Recent scholarly editions of the Masoretic text show the reversed as described by the Masoretes. In some manuscripts, however, other symbols are occasionally found instead. These are sometimes referred to in rabbinical literature as "simaniyot" (markers).
In the Torah, the inverted frame the text:
The are generally positioned close to, but not touching, the first and last words of the couplet. They are supposed to be positioned between the gaps in between the paragraphs, but there is disagreement as to how this should be done. Some texts invert the existing in the Torah text and don't add inverted before and after it.
Rashi's commentary states that the name of the city of Haran at the end of the Torah portion Noach also occurs with an inverted , but this is not found in existing texts.
Rabbinic basis
|
https://en.wikipedia.org/wiki/Ravn%20virus
|
Ravn virus (; RAVV) is a close relative of Marburg virus (MARV). RAVV causes Marburg virus disease in humans and nonhuman primates, a form of viral hemorrhagic fever. RAVV is a Select agent, World Health Organization Risk Group 4 Pathogen (requiring Biosafety Level 4-equivalent containment), National Institutes of Health/National Institute of Allergy and Infectious Diseases Category A Priority Pathogen, Centers for Disease Control and Prevention Category A Bioterrorism Agent, and listed as a Biological Agent for Export Control by the Australia Group.
Use of term
Ravn virus (today abbreviated RAVV, but then considered identical to Marburg virus) was first described in 1987 and is named after a 15-year old Danish boy who fell ill and died from it. Today, the virus is classified as one of two members of the species Marburg marburgvirus, which is included into the genus Marburgvirus, family Filoviridae, order Mononegavirales. The name Ravn virus is derived from Ravn (the name of the Danish patient from whom this virus was first isolated) and the taxonomic suffix virus.
Previous designations
Ravn virus was first introduced as a new subtype of Marburg virus in 1996. In 2006, a whole-genome analysis of all marburgviruses revealed the existence of five distinct genetic lineages. The genomes of representative isolates of four of those lineages differed from each other by only 0-7.8% on the nucleotide level, whereas representatives of the fifth lineage, including the new "subtype", differed from those of the other lineages by up to 21.3%. Consequently, the fifth genetic lineage was reclassified as a virus, Ravn virus (RAVV), distinct from the virus represented by the four more closely related lineages, Marburg virus (MARV).
Virus inclusion criteria
A virus that fulfills the criteria for being a member of the species Marburg marburgvirus is a Ravn virus if it has the properties of Marburg marburgviruses and if its genome diverges from that of the prototype Marburg marburgvi
|
https://en.wikipedia.org/wiki/Software%20aging
|
In software engineering, software aging is the tendency for software to fail or cause a system failure after running continuously for a certain time, or because of ongoing changes in systems surrounding the software. Software aging has several causes, including the inability of old software to adapt to changing needs or changing technology platforms, and the tendency of software patches to introduce further errors. As the software gets older it becomes less well-suited to its purpose and will eventually stop functioning as it should. Rebooting or reinstalling the software can act as a short-term fix. A proactive fault management method to deal with the software aging incident is software rejuvenation. This method can be classified as an environment diversity technique that usually is implemented through software rejuvenation agents (SRA).
The phenomenon was first identified by David Parnas, in an essay that explored what to do about it:"Programs, like people, get old. We can't prevent aging, but we can understand its causes, take steps to limit its effects, temporarily reverse some of the damage it has caused, and prepare for the day when the software is no longer viable."
From both an academic and industrial point of view, the software aging phenomenon has increased. Recent research has focussed on clarifying its causes and effects. Memory bloating and leaking, along with data corruption and unreleased file-locks are particular causes of software aging.
Proactive management of software aging
Software aging
Software failures are a more likely cause of unplanned systems outages compared to hardware failures. This is because software exhibits over time an increasing failure rate due to data corruption, numerical error accumulation and unlimited resource consumption. In widely used and specialized software, a common action to clear a problem is rebooting because aging occurs due to the complexity of software which is never free of errors. It is almost impossible
|
https://en.wikipedia.org/wiki/Slater-type%20orbital
|
Slater-type orbitals (STOs) are functions used as atomic orbitals in the linear combination of atomic orbitals molecular orbital method. They are named after the physicist John C. Slater, who introduced them in 1930.
They possess exponential decay at long range and Kato's cusp condition at short range (when combined as hydrogen-like atom functions, i.e. the analytical solutions of the stationary Schrödinger equation for one electron atoms). Unlike the hydrogen-like ("hydrogenic") Schrödinger orbitals, STOs have no radial nodes (neither do Gaussian-type orbitals).
Definition
STOs have the following radial part:
where
is a natural number that plays the role of principal quantum number, = 1,2,...,
is a normalizing constant,
is the distance of the electron from the atomic nucleus, and
is a constant related to the effective charge of the nucleus, the nuclear charge being partly shielded by electrons. Historically, the effective nuclear charge was estimated by Slater's rules.
The normalization constant is computed from the integral
Hence
It is common to use the spherical harmonics depending on the polar coordinates
of the position vector as the angular part of the Slater orbital.
Derivatives
The first radial derivative of the radial part of a Slater-type orbital is
The radial Laplace operator is split in two differential operators
The first differential operator of the Laplace operator yields
The total Laplace operator yields after applying the second differential operator
the result
Angular dependent derivatives of the spherical harmonics don't depend on the radial function and have to be evaluated separately.
Integrals
The fundamental mathematical properties are those associated with the kinetic energy, nuclear attraction and Coulomb repulsion integrals for placement of the orbital at the center of a single nucleus. Dropping the normalization factor , the representation of the orbitals below is
The Fourier transform is
where the are defined
|
https://en.wikipedia.org/wiki/Anaeromyces%20robustus
|
Anaeromyces robustus is a fungal microorganism that lives in the gut rumen of many ruminant herbivores such as cows and sheep. Previously thought to be protozoa from their flagellated zoospores, they are biomass degraders and help the animal by breaking down carbohydrates and plant materials from the food the animal ingests. This fungus, therefore, is anaerobic and lives without oxygen. Gut fungi are dramatically outnumbered by other organisms in the microbiome; however, they are important members of the gut microbiome in ruminants and hind-gut fermenters and play a key role in digestion.
Taxonomy
Initially, this fungal species was isolated from sheep fecal material in the Santa Barbara Zoo in 2017. With how this was found, it fit into the order of the Neocallimastigomycota as all species within this order live in the gut rumen of large herbivores.
Description
A. robustus is characterized by its long hyphal segments and its ability to reproduce asexually from flagellated zoospores. With the production of zoospores, this fungus's lifecycle is very representative of species of fungi from the phylum Chitridiomycota. This fungus has polycentric sporangia development as many sporangia develop throughout the thallus. With this, there is also nucleus movement through many repeated divisions through the rhizoids.
Ecology
As stated beforehand, this fungus helps animals with digestion of plant materials. Certain enzymes produced from A. robustus have significantly more enzymatic activity when compared to bacteria and other organisms inside of the gut rumen. Other gut bacteria and archaea, however, can have a positive impact on the way A. robustus functions. There is a species of archaea, Methanobacterium bryantii, that enhances the function of the fungus. In particular, this archaea increases the fungus's ability to break down carbohydrates by increasing the CAZyme production of the fungus. When exposed to harmful gut bacteria, rumen fungi are known to produce their own
|
https://en.wikipedia.org/wiki/Computer%20Go
|
Computer Go is the field of artificial intelligence (AI) dedicated to creating a computer program that plays the traditional board game Go. The field is sharply divided into two eras. Before 2015, the programs of the era were weak. The best efforts of the 1980s and 1990s produced only AIs that could be defeated by beginners, and AIs of the early 2000s were intermediate level at best. Professionals could defeat these programs even given handicaps of 10+ stones in favor of the AI. Many of the algorithms such as alpha-beta minimax that performed well as AIs for checkers and chess fell apart on Go's 19x19 board, as there were too many branching possibilities to consider. Creation of a human professional quality program with the techniques and hardware of the time was out of reach. Some AI researchers speculated that the problem was unsolvable without creation of human-like AI.
The application of Monte Carlo tree search to Go algorithms provided a notable improvement in the late 2000s decade, with programs finally able to achieve a low-dan level: that of an advanced amateur. High-dan amateurs and professionals could still exploit these programs' weaknesses and win consistently, but computer performance had advanced past the intermediate (single-digit kyu) level. The tantalizing unmet goal of defeating the best human players without a handicap, long thought unreachable, brought a burst of renewed interest. The key insight proved to be an application of machine learning and deep learning. DeepMind, a Google acquisition dedicated to AI research, produced AlphaGo in 2015 and announced it to the world in 2016. AlphaGo defeated Lee Sedol, a 9 dan professional, in a no-handicap match in 2016, then defeated Ke Jie in 2017, who at the time continuously held the world No. 1 ranking for two years. Just as checkers had fallen to machines in 1995 and chess in 1997, computer programs finally conquered humanity's greatest Go champions in 2016–2017. DeepMind did not relea
|
https://en.wikipedia.org/wiki/Coppersmith%27s%20attack
|
Coppersmith's attack describes a class of cryptographic attacks on the public-key cryptosystem RSA based on the Coppersmith method. Particular applications of the Coppersmith method for attacking RSA include cases when the public exponent e is small or when partial knowledge of a prime factor of the secret key is available.
RSA basics
The public key in the RSA system is a tuple of integers , where N is the product of two primes p and q. The secret key is given by an integer d satisfying ; equivalently, the secret key may be given by and if the Chinese remainder theorem is used to improve the speed of decryption, see CRT-RSA. Encryption of a message M produces the ciphertext , which can be decrypted using by computing .
Low public exponent attack
In order to reduce encryption or signature verification time, it is useful to use a small public exponent (). In practice, common choices for are 3, 17 and 65537 . These values for e are Fermat primes, sometimes referred to as and respectively . They are chosen because they make the modular exponentiation operation faster. Also, having chosen such , it is simpler to test whether and while generating and testing the primes in step 1 of the key generation. Values of or that fail this test can be rejected there and then. (Even better: if e is prime and greater than 2, then the test can replace the more expensive test .)
If the public exponent is small and the plaintext is very short, then the RSA function may be easy to invert, which makes certain attacks possible.
Padding schemes ensure that messages have full lengths, but additionally choosing the public exponent is recommended. When this value is used, signature verification requires 17 multiplications, as opposed to about 25 when a random of similar size is used. Unlike low private exponent (see Wiener's attack), attacks that apply when a small is used are far from a total break, which would recover the secret key d.
The most powerful attacks on low pub
|
https://en.wikipedia.org/wiki/Backpropagation
|
As a machine-learning algorithm, backpropagation performs a backward pass to adjust a neural network model's parameters, aiming to minimize the mean squared error (MSE). In a multi-layered network, backpropagation uses the following steps:
Propagate training data through the model from input to predicted output by computing the successive hidden layers' outputs and finally the final layer's output (the feedforward step).
Adjust the model weights to reduce the error relative to the weights.
The error is typically the squared difference between prediction and target.
For each weight, the slope or derivative of the error is found, and the weight adjusted by a negative multiple of this derivative, so as to go downslope toward the minimum-error configuration.
This derivative is easy to calculate for final layer weights, and possible to calculate for one layer given the next layer's derivatives. Starting at the end, then, the derivatives are calculated layer by layer toward the beginning -- thus "backpropagation".
Repeatedly update the weights until they converge or the model has undergone enough iterations.
It is an efficient application of the Leibniz chain rule (1673) to such networks. It is also known as the reverse mode of automatic differentiation or reverse accumulation, due to Seppo Linnainmaa (1970). The term "back-propagating error correction" was introduced in 1962 by Frank Rosenblatt, but he did not know how to implement this, even though Henry J. Kelley had a continuous precursor of backpropagation already in 1960 in the context of control theory.
Backpropagation computes the gradient of a loss function with respect to the weights of the network for a single input–output example, and does so efficiently, computing the gradient one layer at a time, iterating backward from the last layer to avoid redundant calculations of intermediate terms in the chain rule; this can be derived through dynamic programming. Gradient descent, or variants such as s
|
https://en.wikipedia.org/wiki/Orthonormal%20frame
|
In Riemannian geometry and relativity theory, an orthonormal frame is a tool for studying the structure of a differentiable manifold equipped with a metric. If M is a manifold equipped with a metric g, then an orthonormal frame at a point P of M is an ordered basis of the tangent space at P consisting of vectors which are orthonormal with respect to the bilinear form gP.
See also
Frame (linear algebra)
Frame bundle
k-frame
Moving frame
Frame fields in general relativity
|
https://en.wikipedia.org/wiki/High%20brightness%20monitor
|
A high brightness monitor, also known as a sunlight readable monitor or VHB (very high brightness) monitor, is a computer monitor designed to operate in very bright environments, for example in broad daylight. Sunlight Readable monitors typically provide at least 1,000 nits of brightness, versus 200-300 nits brightness for a typical desktop computer monitor. Sunlight Readable monitors may also be optically bonded. This process adds a protective outer glass, then fills the air gap between the glass and the LCD panel with an optical-grade resin to eliminate internal reflections and condensation. This also strengthens the outer glass and improves image contrast.
High brightness sunlight readable monitors are typically used commercially in kiosks, vending systems, pipeline inspection systems, outdoor digital signage and advertising, in sports stadiums, in military vehicles, on ships for navigation systems, on bus and train platforms, and much more.
Computer peripherals
Display devices
|
https://en.wikipedia.org/wiki/Sort%20sol
|
Sort sol is a murmuration, a flocking behavior that occurs in the marshlands in southwestern Jutland, Denmark, in particular the marsh near Tønder and Ribe. Very large numbers of migratory starlings gather there in spring and autumn when they move between their winter grounds in southern Europe and their summer breeding grounds in Scandinavia and other countries near the Baltic Sea.
Sort sol takes place in the hours just after sunset. The birds gather in large flocks and form huge formations in the sky just before they decide for a location to roost for the night. The movements of the formations have been likened to kind of a dance or ballet and the birds are so numerous that they seem to obliterate the sunset, hence the term "sort sol" (Danish for "black sun"). Sort sol in the marsh near Tønder can occasionally comprise a formation with up to one million birds. Usually flocks break up when the number of individuals exceed about half a million birds due to excessive internal disturbances in the flock.
If a predator bird enters the flock, the starlings initiate a veritable bombardment with droppings and vomit that soil the feathers of the predator. In rare cases the sticky deposits may render the predator unable to stay airborne.
See also
Flock (birds)
Swarm
|
https://en.wikipedia.org/wiki/Armorial%20of%20Indonesia
|
This is a list of emblems or coat of arms used in Indonesia. Indonesia is divided into 38 provinces, and each province is divided into regencies (kabupaten) and cities (kota). There are 416 regencies and 98 cities. Each province, regency, and city has its own emblem.
Many of the emblems incorporate rice and cotton (for prosperity and the fifth principle of Pancasila, a remnant from socialist heraldry popular during the guided democracy era); symbols marking Pancasila in entirety; as well as symbols marking the date Indonesia declared its independence, 17 August 1945.
National
Provincial
Regencies and cities
Aceh
North Sumatra
West Sumatra
Riau
Riau Islands
Jambi
South Sumatra
Bengkulu
Bangka Belitung Islands
Lampung
Banten
Jakarta
West Java
Central Java
Special Region of Yogyakarta
East Java
Bali
West Nusa Tenggara
East Nusa Tenggara
West Kalimantan
Central Kalimantan
South Kalimantan
East Kalimantan
North Kalimantan
West Sulawesi
South Sulawesi
Southeast Sulawesi
Central Sulawesi
Gorontalo
North Sulawesi
Maluku
North Maluku
Southwest Papua
West Papua
Central Papua
South Papua
Highland Papua
Papua
Historical
National
Kingdom and Sultanate
Subdivisions
States
Provinces
Colonial era
Cities and regencies
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.