source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Kangaroo%20paw
Kangaroo paw is the common name for a number of species, in two genera of the family Haemodoraceae, that are native to the south-west of Western Australia. These rhizomatous perennial plants are noted for their unique bird-attracting flowers. The tubular flowers are coated with dense hairs and open at the apex with six claw-like structures which resemble kangaroo forelimbs, and it is from this paw-like formation that the common name "kangaroo paw" is derived. The kangaroo paw plant has been introduced into Japan and has been grown as a new ornamental crop mainly in Okinawa Island under a subtropical climate. History The genus Anigozanthos' author was French botanist Jacques-Julien Houtou de Labillardière, who first collected the kangaroo paw in 1792 near Esperance. Red and green kangaroo paw or Kurulbrang (Noongar) was introduced to England in 1833, and was first described in 1836 by botanist David Don. The specific name manglesii is so named in honour of the first individual to raise the specimen from seed, Robert Mangles, which he did in his English garden. His experience with growing the specimen is recorded in letters to his brother James Mangles. The red and green kangaroo paw was adopted as the state emblem of Western Australia in a proclamation on 9 October 1960. An image of a red and green kangaroo paw was superimposed onto a view of Perth from a distance on a 5 pence stamp, issued 1 November 1962, commemorating the Seventh British Empire and Commonwealth Games which were held in Perth that year. The stamp was designed by R. M. Warner. The red and green kangaroo paw was again included on a stamp on 10 July 1968, which were six cent stamps in a series of state floral emblems. It was designed by Nell Wilson. In 1990, disease was found on the kangaroo paw plant in Okinawa. The unreported fungi, which caused the plant to become very limp and wilt, was characterised by a discolouration of the plant leaving it a brown to black colour around the stalks, leaves
https://en.wikipedia.org/wiki/Orcein
Orcein, also archil, orchil, lacmus and C.I. Natural Red 28, are names for dyes extracted from several species of lichen, commonly known as "orchella weeds", found in various parts of the world. A major source is the archil lichen, Roccella tinctoria. Orcinol is extracted from such lichens. It is then converted to orcein by ammonia and air. In traditional dye-making methods, urine was used as the ammonia source. If the conversion is carried out in the presence of potassium carbonate, calcium hydroxide, and calcium sulfate (in the form of potash, lime, and gypsum in traditional dye-making methods), the result is litmus, a more complex molecule. The manufacture was described by Cocq in 1812 and in the UK in 1874. Edmund Roberts noted orchilla as a principal export of the Cape Verde islands, superior to the same kind of "moss" found in Italy or the Canary Islands, that in 1832 was yielding an annual revenue of $200,000. Commercial archil is either a powder (called cudbear) or a paste. It is red in acidic pH and blue in alkaline pH. History and uses The chemical components of orcein were elucidated only in the 1950s by Hans Musso. The structures are shown below. A paper originally published in 1961, embodying most of Musso's work on components of orcein and litmus, was translated into English and published in 2003 in a special issue of the journal Biotechnic & Histochemistry (Vol 78, No. 6) devoted to the dye. A single alternative structural formula for orcein, possibly incorrect, is given by the National Library of Medicine and Emolecules. Orcein is a reddish-brown dye, orchil is a purple-blue dye. Orcein is also used as a stain in microscopy to visualize chromosomes, elastic fibers, Hepatitis B surface antigens, and copper-associated proteins. Orcein is not approved as a food dye (banned in Europe since January 1977), with E number E121 before 1977 and E182 after. Its CAS number is . Its chemical formula is C28H24N2O7. It forms dark brown crystals. It is a mi
https://en.wikipedia.org/wiki/Military%20Grid%20Reference%20System
The Military Grid Reference System (MGRS) is the geocoordinate standard used by NATO militaries for locating points on Earth. The MGRS is derived from the Universal Transverse Mercator (UTM) grid system and the Universal Polar Stereographic (UPS) grid system, but uses a different labeling convention. The MGRS is used as geocode for the entire Earth. An example of an MGRS coordinate, or grid reference, would be [21_18_34.0_N_157_55_0.7_W_&language=en 4QFJ12345678], which consists of three parts: 4Q (grid zone designator, GZD) FJ (the 100,000-meter square identifier) 1234 5678 (numerical location; easting is 1234 and northing is 5678, in this case specifying a location with 10 m resolution) An MGRS grid reference is a point reference system. When the term 'grid square' is used, it can refer to a square with a side length of , 1 km, , 10 m or 1 m, depending on the precision of the coordinates provided. (In some cases, squares adjacent to a Grid Zone Junction (GZJ) are clipped, so polygon is a better descriptor of these areas.) The number of digits in the numerical location must be even: 0, 2, 4, 6, 8 or 10, depending on the desired precision. When changing precision levels, it is important to truncate rather than round the easting and northing values to ensure the more precise polygon will remain within the boundaries of the less precise polygon. Related to this is the primacy of the southwest corner of the polygon being the labeling point for an entire polygon. In instances where the polygon is not a square and has been clipped by a grid zone junction, the polygon keeps the label of the southwest corner as if it had not been clipped. 4Q ......................GZD only, precision level 6° × 8° (in most cases) 4Q FJ ...................GZD and 100 km Grid Square ID, precision level 100 km 4Q FJ 1 6 ...............precision level 10 km 4Q FJ 12 67 .............precision level 1 km 4Q FJ 123 678 ...........precision level 100 m 4Q FJ 1234 6789 .........p
https://en.wikipedia.org/wiki/Apache%20Hama
Apache Hama is a distributed computing framework based on bulk synchronous parallel computing techniques for massive scientific computations e.g., matrix, graph and network algorithms. It was a Top Level Project under the Apache Software Foundation. Retired in April 2020, project resources are made available as part of the Apache Attic. It was created by Edward J. Yoon, who named it (short for "Hadoop Matrix") and was inspired by Google's Pregel large-scale graph computing framework described in 2010. Hama also means hippopotamus in Korean language (하마), following the trend of naming Apache projects after animals and zoology (such as Apache Pig). Architecture Hama consists of three major components: BSPMaster, GroomServers and Zookeeper. BSPMaster BSPMaster is responsible for: Maintaining groom server status Controlling super steps in a cluster Maintaining job progress information Scheduling jobs and assigning tasks to groom servers Disseminating execution class across groom servers Controlling fault Providing users with the cluster control interface. A BSP Master and multiple grooms are started by the script. Then, the bsp master starts up with a RPC server for groom servers. Groom servers starts up with a BSPPeer instance and a RPC proxy to contact the bsp master. After started, each groom periodically sends a heartbeat message that encloses its groom server status, including maximum task capacity, unused memory, and so on. Each time the BSP master receives a heartbeat message, it brings up-to-date groom server status - the bsp master makes use of groom servers' status in order to effectively assign tasks to idle groom servers - and returns a heartbeat response that contains assigned tasks and others actions that a groom server has to do. For now, we have a FIFO job scheduler and very simple task assignment algorithms. GroomServer A groom server (shortly referred to as groom) is a process that performs BSP tasks assigned by BSPMaster. Each groom co
https://en.wikipedia.org/wiki/Serial%20Peripheral%20Interface
Serial Peripheral Interface (SPI) is a de facto standard (with many variants) for synchronous serial communication, used primarily in embedded systems for short-distance wired communication between integrated circuits. SPI uses a main–subnode (master/slave) architecture, where one main device orchestrates communication by providing the clock signal and chip select signal(s) which control any number of subservient peripherals. Motorola's original specification uses four wires to perform full duplex communication. It is sometimes called a four-wire serial bus to contrast with three-wire variants which are half duplex, and with the two-wire I²C and 1-Wire serial buses. Typical applications include interfacing microcontrollers with peripheral chips for Secure Digital cards, liquid crystal displays, analog-to-digital and digital-to-analog converters, flash and EEPROM memory, and various communication chips. SPI may be accurately described as a synchronous serial interface, but it is different from the Synchronous Serial Interface (SSI) protocol. Operation (Note: Variations section describes operation of non-standard variants.) SPI has four logic signals (which go by alternative namings): SCLK : Serial Clock (clock signal from main) MOSI : Main Out Sub In (data output from main) MISO : Main In Sub Out (data output from sub) : (active low signal from main to address subs and initiate transmission) MOSI on a main outputs to MOSI on a sub. MISO on a sub outputs to MISO on a main. SPI operates with a single device acting as main and with one or more sub devices. Sub devices should use tri-state outputs so their MISO signal becomes high impedance (electrically disconnected) when the device is not selected. Subs without tri-state outputs cannot share a MISO wire with other subs without using an external tri-state buffer. Data transmission To begin communication, the SPI main first selects a sub device by pulling its low. (Note: the bar above indicates it is a
https://en.wikipedia.org/wiki/C0-semigroup
{{DISPLAYTITLE:C0-semigroup }} In mathematics, a C0-semigroup, also known as a strongly continuous one-parameter semigroup, is a generalization of the exponential function. Just as exponential functions provide solutions of scalar linear constant coefficient ordinary differential equations, strongly continuous semigroups provide solutions of linear constant coefficient ordinary differential equations in Banach spaces. Such differential equations in Banach spaces arise from e.g. delay differential equations and partial differential equations. Formally, a strongly continuous semigroup is a representation of the semigroup (R+, +) on some Banach space X that is continuous in the strong operator topology. Thus, strictly speaking, a strongly continuous semigroup is not a semigroup, but rather a continuous representation of a very particular semigroup. Formal definition A strongly continuous semigroup on a Banach space is a map such that ,   (the identity operator on ) , as . The first two axioms are algebraic, and state that is a representation of the semigroup ; the last is topological, and states that the map is continuous in the strong operator topology. Infinitesimal generator The infinitesimal generator A of a strongly continuous semigroup T is defined by whenever the limit exists. The domain of A, D(A), is the set of x∈X for which this limit does exist; D(A) is a linear subspace and A is linear on this domain. The operator A is closed, although not necessarily bounded, and the domain is dense in X. The strongly continuous semigroup T with generator A is often denoted by the symbol (or, equivalently, ). This notation is compatible with the notation for matrix exponentials, and for functions of an operator defined via functional calculus (for example, via the spectral theorem). Uniformly continuous semigroup A uniformly continuous semigroup is a strongly continuous semigroup T such that holds. In this case, the infinitesimal generator A of T is
https://en.wikipedia.org/wiki/Expansion%20ratio
The expansion ratio of a liquefied and cryogenic substance is the volume of a given amount of that substance in liquid form compared to the volume of the same amount of substance in gaseous form, at room temperature and normal atmospheric pressure. If a sufficient amount of liquid is vaporized within a closed container, it produces pressures that can rupture the pressure vessel. Hence the use of pressure relief valves and vent valves are important. The expansion ratio of liquefied and cryogenic from the boiling point to ambient is: nitrogen – 1 to 696 liquid helium – 1 to 745 argon – 1 to 842 liquid hydrogen – 1 to 850 liquid oxygen – 1 to 860 neon – Neon has the highest expansion ratio with 1 to 1445. See also Liquid-to-gas ratio Boiling liquid expanding vapor explosion Thermal expansion
https://en.wikipedia.org/wiki/Statistical%20epidemiology
Statistical epidemiology is an emerging branch of the disciplines of epidemiology and biostatistics that aims to: Bring more statistical rigour to bear in the field of epidemiology Recognise the importance of applied statistics, especially with respect to the context in which statistical methods are appropriate and inappropriate Aid and improve our interpretation of observations Introduction The science of epidemiology has had enormous growth, particularly with charity and government funding. Many researchers have been trained to conduct studies, requiring multiple skills ranging from liaising with clinical staff to the statistical analysis of complex data, such as using Bayesian methods. The role of a Statistical Epidemiologist is to bring the most appropriate methods available to bear on observational study from medical research, requiring a broad appreciation of the underpinning methods and their context of applicability and interpretation. The earliest mention of this phrase was in an article by EB Wilson, taking a critical look at the way in which statistical methods were developing and being applied in the science of epidemiology. Academic recognition There are two Professors of Statistical Epidemiology in the United Kingdom (University of Leeds and Imperial College, London) and a Statistical Epidemiology group (Oxford University). Related fields Statistical epidemiology draws upon quantitative methods from fields such as: statistics, operations research, computer science, economics, biology, and mathematics. See also Epidemiology Biostatistics
https://en.wikipedia.org/wiki/ScRGB
scRGB is a wide color gamut RGB color space created by Microsoft and HP that uses the same color primaries and white/black points as the sRGB color space but allows coordinates below zero and greater than one. The full range is −0.5 through just less than +7.5. Negative numbers enables scRGB to encompass most of the CIE 1931 color space while maintaining simplicity and backward compatibility with sRGB without the complexity of color management. The cost of maintaining compatibility with sRGB is that approximately 80% of the scRGB color space consists of imaginary colors. Large positive numbers allow high dynamic range images to be represented, though the range is inferior to that of some other high dynamic range formats such as OpenEXR. Encoding Two encodings are defined for the individual primaries: a linear 16 bit per channel encoding and a nonlinear 12 bit per channel encoding. The 16 bit scRGB(16) encoding is the linear RGB channels converted by . Compared to 8-bit sRGB this ranges from almost times the color resolution near 0.0 to more than 14 times the color resolution near 1.0. Storage as 16 bits clamps the linear range to . The 12-bit scRGB-nl encoding is the linear RGB channels passed through the same opto-electric conversion function as sRGB (for negative numbers use ) and then converted by . This is exactly 5 times the color resolution of 8-bit sRGB, and 8-bit sRGB can be converted directly with . The linear range is clamped to the slightly larger . A 12-bit encoding called scYCC-nl is the conversion of the non-linear sRGB levels to JFIF-Y'CbCr and then converted by , , . This form can allow greater compression and direct conversion to/from JPEG files and video hardware. With the addition of an alpha channel with the same number of bits the 16-bit encoding may be seen referred to as 64 bit and the 12-bit encoding referred to as 48-bit. Alpha is not encoded as above, however. Alpha is instead a linear 0-1 range multiplied by where is 12 or 16.
https://en.wikipedia.org/wiki/MeBeam
MeBeam was a video chat website, that allowed any user to create videoconference rooms for up to 16 people. MeBeam did not require registration, login or downloading of software. Overview The site was launched by Ashod Apakian in November 2007 as a web-based demo of a research application he was working on. The goal was to create the world's fastest videotelephony site. It gained popularity after a plugin was developed to provide multi-party videoconferencing for Adium in August 2008, after being featured on Digg. The site was also featured on Chris Pirillo, at which point it gained widespread usage. The website used Adobe Systems Flash Player to display video and access the user's webcam. It works across, Windows, Linux and Macintosh, along with any web browser that supported Flash 8. See also Online chat Web chat
https://en.wikipedia.org/wiki/PlasMapper
PlasMapper (Plasmid Mapper) is a freely available web server that automatically generates and annotates high-quality circular plasmid maps. It is a particularly useful online service for molecular biologists wishing to generate plasmid maps without having to purchase or maintain expensive, commercial software. PlasMapper accepts plasmid/vector DNA sequence as input (FASTA format) and uses sequence pattern matching and BLAST sequence alignment to automatically identify and label common promoters, terminators, cloning sites, restriction sites, reporter genes, affinity tags, selectable marker genes, origins of replication and open reading frames. PlasMapper then reformats and presents the identified features in both a simple textual form and as high-resolution, multicolored image. The appearance and content of the output can be customized in numerous ways using a variety of online options. PlasMapper images can be rendered in both rasterized (Portable Network Graphics (PNG) and JPG) and scalable vector graphics (SVG) formats to accommodate a variety of user needs or preferences. The images and textual output are of sufficient quality that they may be used directly in publications or presentations. PlasMapper 3.0 The third iteration of PlasMapper was published on 26th April, 2023. This version includes massive overhaul to its visual genome and sequence editors, while also adding new features such as the PlasMapDB, codon optimization using Optipyzer, and BLAST capabilities, making it a one-stop shop for synthetic biologists specifically. See also Plasmid Restriction map Vector (molecular biology) CGView
https://en.wikipedia.org/wiki/Isenthalpic%20process
An isenthalpic process or isoenthalpic process is a process that proceeds without any change in enthalpy, H; or specific enthalpy, h. Overview If a steady-state, steady-flow process is analysed using a control volume, everything outside the control volume is considered to be the surroundings. Such a process will be isenthalpic if there is no transfer of heat to or from the surroundings, no work done on or by the surroundings, and no change in the kinetic energy of the fluid. This is a sufficient but not necessary condition for isoenthalpy. The necessary condition for a process to be isoenthalpic is that the sum of each of the terms of the energy balance other than enthalpy (work, heat, changes in kinetic energy, etc.) cancel each other, so that the enthalpy remains unchanged. For a process in which magnetic and electric effects (among others) give negligible contributions, the associated energy balance can be written as If then it must be that The throttling process is a good example of an isoenthalpic process in which significant changes in pressure and temperature can occur to the fluid, and yet the net sum the associated terms in the energy balance is null, thus rendering the transformation isoenthalpic. The lifting of a relief (or safety) valve on a pressure vessel is an example of throttling process. The specific enthalpy of the fluid inside the pressure vessel is the same as the specific enthalpy of the fluid as it escapes through the valve. With a knowledge of the specific enthalpy of the fluid and the pressure outside the pressure vessel, it is possible to determine the temperature and speed of the escaping fluid. In an isenthalpic process: , . Isenthalpic processes on an ideal gas follow isotherms, since . See also Adiabatic process Joule–Thomson effect Ideal gas laws Isentropic process
https://en.wikipedia.org/wiki/Neddylation
Neddylation (also NEDDylation) is the process by which the ubiquitin-like protein NEDD8 is conjugated to its target proteins. This process is analogous to ubiquitination, although it relies on its own E1 and E2 enzymes. No NEDD8-specific E3 has yet been identified and it is possible that the Neddylation system relies on E3 ligases with dual specificity. NEDD8 NEDD8 (neural-precursor-cell-expressed developmentally down-regulated 8) is a protein involved in the regulation of cell growth, viability and development. Neddylation process NEDD8 links itself to a protein through an isopeptide linkage between its carboxy-terminal glycine and the lysine of the substrate. The neddylation of the substrate causes in a structural change, and there are three main biochemical effects that result. First, neddylation can cause a conformational change in the substrate which may restrict molecular movement and the positioning of different binding partners. Second, it can cause the target protein to become incompatible with other proteins that it usually binds with. For example, CAND1 does not bind to neddylated proteins. In addition, neddylation can recruit NEDD8-interacting proteins. When NEDD8 binds to the ubiquitin E2 Ubc4, the interaction stimulates cullin-based ubiquitin ligases, although the exact mechanism is unclear. Disease association Neddylation is involved in the pathogenesis of Alzheimer's disease where its activation appears to drive neurons into apoptosis by initiating cell cycle reentry. Also, evidence shows that increased NEDD8 conjugation in human oral carcinoma cells led to abnormal higher degrees of proliferation. Because NEDD8 conjugation to cullin proteins plays an important role in the regulation of the cell cycle, an upregulation in conjugation causes this proliferation.
https://en.wikipedia.org/wiki/Fourier-transform%20spectroscopy
Fourier-transform spectroscopy is a measurement technique whereby spectra are collected based on measurements of the coherence of a radiative source, using time-domain or space-domain measurements of the radiation, electromagnetic or not. It can be applied to a variety of types of spectroscopy including optical spectroscopy, infrared spectroscopy (FTIR, FT-NIRS), nuclear magnetic resonance (NMR) and magnetic resonance spectroscopic imaging (MRSI), mass spectrometry and electron spin resonance spectroscopy. There are several methods for measuring the temporal coherence of the light (see: field-autocorrelation), including the continuous-wave and the pulsed Fourier-transform spectrometer or Fourier-transform spectrograph. The term "Fourier-transform spectroscopy" reflects the fact that in all these techniques, a Fourier transform is required to turn the raw data into the actual spectrum, and in many of the cases in optics involving interferometers, is based on the Wiener–Khinchin theorem. Conceptual introduction Measuring an emission spectrum One of the most basic tasks in spectroscopy is to characterize the spectrum of a light source: how much light is emitted at each different wavelength. The most straightforward way to measure a spectrum is to pass the light through a monochromator, an instrument that blocks all of the light except the light at a certain wavelength (the un-blocked wavelength is set by a knob on the monochromator). Then the intensity of this remaining (single-wavelength) light is measured. The measured intensity directly indicates how much light is emitted at that wavelength. By varying the monochromator's wavelength setting, the full spectrum can be measured. This simple scheme in fact describes how some spectrometers work. Fourier-transform spectroscopy is a less intuitive way to get the same information. Rather than allowing only one wavelength at a time to pass through to the detector, this technique lets through a beam containing many dif
https://en.wikipedia.org/wiki/Syracuse%20dish
Introduction A Syracuse dish or Syracuse watch glass is a shallow, circular, flat-bottomed dish of thick glass. Usually, it is 67 mm in outer diameter and 52 mm in inner diameter. Background Nathan Cobb, one of the pioneers of nematology in the United States,was the first who suggested using the Syracuse Dish for counting nematodes in 1918. Uses It is used as laboratory equipment in biology for either storage or culturing.
https://en.wikipedia.org/wiki/Sammon%20mapping
Sammon mapping or Sammon projection is an algorithm that maps a high-dimensional space to a space of lower dimensionality (see multidimensional scaling) by trying to preserve the structure of inter-point distances in high-dimensional space in the lower-dimension projection. It is particularly suited for use in exploratory data analysis. The method was proposed by John W. Sammon in 1969. It is considered a non-linear approach as the mapping cannot be represented as a linear combination of the original variables as possible in techniques such as principal component analysis, which also makes it more difficult to use for classification applications. Denote the distance between ith and jth objects in the original space by , and the distance between their projections by . Sammon's mapping aims to minimize the following error function, which is often referred to as Sammon's stress or Sammon's error: The minimization can be performed either by gradient descent, as proposed initially, or by other means, usually involving iterative methods. The number of iterations needs to be experimentally determined and convergent solutions are not always guaranteed. Many implementations prefer to use the first Principal Components as a starting configuration. The Sammon mapping has been one of the most successful nonlinear metric multidimensional scaling methods since its advent in 1969, but effort has been focused on algorithm improvement rather than on the form of the stress function. The performance of the Sammon mapping has been improved by extending its stress function using left Bregman divergence and right Bregman divergence. See also Prefrontal cortex basal ganglia working memory State–action–reward–state–action Constructing skill trees
https://en.wikipedia.org/wiki/Linde%E2%80%93Buzo%E2%80%93Gray%20algorithm
The Linde–Buzo–Gray algorithm (introduced by Yoseph Linde, Andrés Buzo and Robert M. Gray in 1980) is a vector quantization algorithm to derive a good codebook. It is similar to the k-means method in data clustering. The algorithm At each iteration, each vector is split into two new vectors. A initial state: centroid of the training sequence; B initial estimation #1: code book of size 2; C final estimation after LGA: Optimal code book with 2 vectors; D initial estimation #2: code book of size 4; E final estimation after LGA: Optimal code book with 4 vectors; The final two code vectors are splitted into four and the process is repeated until the desired number of code vector is obtained.
https://en.wikipedia.org/wiki/Endotype
An endotype is a subtype of a health condition, which is defined by a distinct functional or pathobiological mechanism. This is distinct from a phenotype, which is any observable characteristic or trait of a disease, such as development, biochemical or physiological properties without any implication of a mechanism. It is envisaged that patients with a specific endotype present themselves within phenotypic clusters of diseases. One example is asthma, which is considered to be a syndrome, consisting of a series of endotypes. This is related to the concept of disease entity. Disease entity The main concept in nosology is the disease entity. Normally there are two ways to define a disease entity: Manifestational criteria and causal criteria. Manifestational criteria. These are a set of criteria based on signs, symptoms and laboratory findings that define a disease. They define a disease by its symptoms and medical findings. Causal criteria. These are a causal chain of events that defines the disease describing how it develops. They describe the disease by its etiology. Following Fred Gifford, these criteria lead one to view any disease entity in three different forms: Disease as symptoms: The disease is defined by the symptoms and signs that it produces. In fact, it can be said that the disease is the collection of them. It is the classical way to define a disease or a condition. Disease as state: The disease is not defined by a set of symptoms but by the underlying state of the body, including pathological tissues, abnormal cells and any other general medical findings. This kind of definition allows the researchers to speak about silent diseases, which cannot be considered as such by the previous definition. Proponents of this kinds of entity are for example Rudolph Virchow. Disease as a process: In the 20th century, a third concept of disease has appeared, based on the works of Caroline Whitbeck in 1977. Whitbeck proposed that a disease may be defined by th
https://en.wikipedia.org/wiki/International%20Conference%20on%20Neutrino%20Physics%20and%20Astrophysics
The International Conference on Neutrino Physics and Astrophysics is a significant international conference series in the field of neutrino physics, during which talks detailing notable progress in theoretical and experimental work are given. In addition, the conference reviews the status of proposed research in neutrino physics and astrophysics. Held every two years, the conference programs consist of plenary sessions with invited speakers, poster sessions and short evening talks. The shorthand designator for a particular conference is "Neutrino" followed by its year, e.g. Neutrino 2011. The first conference was held in Balatonfüred in 1972; however, three preceding conferences are often referenced with respect to the history of the Neutrino series. These meetings include the 1965 Informal Conference on Experimental Neutrino Physics at CERN; a 1968 conference in Moscow sponsored by the Academy of the USSR, which was organized just after certain cosmic ray neutrino events were seen in the gold mines of India, South Africa and Utah; and a 1970 meeting in Cortona. Each conference is supervised by a changing International Advisory Committee as well as the permanent International Neutrino Commission. The latter is assembled from the chairs of former conferences. The 28th meeting, Neutrino 2018, concluded June 9, 2018 in Heidelberg after featuring presentations encompassing many different branches of neutrino physics. It was recently announced that Neutrino 2024 will be held in Milano, following the 2020 conference in Chicago and the 2022 conference in Seoul.
https://en.wikipedia.org/wiki/Sherborne%20Sensors
Sherborne Sensors is a designer and manufacturer of precision inclinometers, accelerometers and load cells. Technologies utilized include mechanical servo, solid state and strain gauge. These precision measurement tools are available as both off-the-shelf and bespoke for use in military, aerospace, civil and industrial engineering applications. Sherborne Sensors is based in ‘transducer valley’ in Hampshire, UK, and supplies its products to over 50 countries across the world. Many of the inertial products currently offered have evolved from the Schaevitz brand that innovated sensor design during the 1940s and 1950s. The current LSOC/LSOP range of Linear Servo Inclinometers originate from the genuine Schaevitz units. The Force Transducers have their roots with the Maywood brand founded in the 1970s. History Sherborne Sensors began life in 1945 as Schaevitz Engineering, a New Jersey-based manufacturer of LVDTs and other precision sensors. The business operated solely in the USA until an association formed with Electro-Mechanisms (EM) in 1963. This allowed their products to be distributed in the UK and also to be manufactured under licence. Prompted by the success overseas, Schaevitz Engineering acquired the majority shareholding in EM and began manufacturing a UK range of inertial products in 1974. The Schaevitz name traded until 1986 when the company was acquired by Lucas who changed the name of the business to Lucas Control Systems. In 1997 the company became Lucas Varty and in 1999 was acquired by TRW. Throughout all of this time the Schaevitz brand remained strong and at the cutting edge of sensors technologies. This business model continued until August 2000 when the Schaevitz Sensors and Components division of TRW was acquired by Measurement Specialities Inc (MSI). In 2002 the Measurement Specialties UK group was put into financial receivership and its assets sold. A group of former Schaevitz employees purchased the Inertial Products Division from MSI
https://en.wikipedia.org/wiki/Vijay%20Vaishnavi
Vijay Kumar Vaishnavi is a noted researcher and scholar in the computer information systems field with contributions mainly in the areas of design science research, software engineering, and data structures & algorithms, authoring over 150 publications including seven books in these and related areas, and co-owning a patent. He is currently Professor Emeritus at the Department of Computer Information Systems, Georgia State University. He is Senior Editor Emeritus of MIS Quarterly and is on the editorial boards of a number of other major journals. His research has been funded by the National Science Foundation (NSF) (through multiple multi-year research grants) as well as by the industry. Education After his early education at National High School, Srinagar, Vaishnavi completed his matriculation at Model Academy, Jammu in 1962 and pre-university course at GM Science College, Jammu, in 1963. He completed his B.E. degree in electrical engineering in 1968 from Regional Engineering College, Srinagar (currently National Institute of Technology, Srinagar). He completed his M.Tech. degree in electrical engineering with major in computer science in 1971, (thesis advisor: Hari V. Sahasrabudhe) and Ph.D. degree in 1975 (dissertation advisor: Sanat K. Basu), both from the Indian Institute of Technology Kanpur. He did his postdoctoral work in computer science with Derick Wood at McMaster University, 1977–79. Professional career Vaishnavi has mainly been on the faculty of Georgia State University and has also held faculty positions at a number of other universities in India, Canada, and the US such as Birla Institute of Technology and Science, Pilani (where he started his career); Indian Institute of Technology Kanpur; Concordia University; and Ohio University. He has conducted the bulk of his research and scholarly work at the Computer Information Systems (CIS) department of Georgia State University; he joined the department as an associate professor in 1981 and became a ful
https://en.wikipedia.org/wiki/C%C3%A9a%27s%20lemma
Céa's lemma is a lemma in mathematics. Introduced by Jean Céa in his Ph.D. dissertation, it is an important tool for proving error estimates for the finite element method applied to elliptic partial differential equations. Lemma statement Let be a real Hilbert space with the norm Let be a bilinear form with the properties for some constant and all in (continuity) for some constant and all in (coercivity or -ellipticity). Let be a bounded linear operator. Consider the problem of finding an element in such that for all in Consider the same problem on a finite-dimensional subspace of so, in satisfies for all in By the Lax–Milgram theorem, each of these problems has exactly one solution. Céa's lemma states that for all in That is to say, the subspace solution is "the best" approximation of in up to the constant The proof is straightforward for all in We used the -orthogonality of and which follows directly from for all in . Note: Céa's lemma holds on complex Hilbert spaces also, one then uses a sesquilinear form instead of a bilinear one. The coercivity assumption then becomes for all in (notice the absolute value sign around ). Error estimate in the energy norm In many applications, the bilinear form is symmetric, so for all in This, together with the above properties of this form, implies that is an inner product on The resulting norm is called the energy norm, since it corresponds to a physical energy in many problems. This norm is equivalent to the original norm Using the -orthogonality of and and the Cauchy–Schwarz inequality for all in . Hence, in the energy norm, the inequality in Céa's lemma becomes for all in (notice that the constant on the right-hand side is no longer present). This states that the subspace solution is the best approximation to the full-space solution in respect to the energy norm. Geometrically, this means that is the projection of the
https://en.wikipedia.org/wiki/Crying%20in%20the%20Rain
"Crying in the Rain" is a song composed by Carole King with lyrics by Howard Greenfield, originally recorded by American duo the Everly Brothers. The single peaked at number six on the US Billboard Hot 100 in 1962. The song was the only collaboration between songwriters Greenfield and King, both of whom worked for Aldon Music at the time of the song's composition. On a whim, two Aldon songwriting partnerships decided to switch partners for a day – Gerry Goffin (who normally worked with King) partnered with Greenfield's frequent writing partner, Jack Keller, leaving King and Greenfield to pair up for the day. Despite the commercial success of their collaboration, King and Greenfield never wrote another song together. Track listing Charts Tammy Wynette version In 1981, "Crying in the Rain" was notably covered by American country artist Tammy Wynette. It became a major hit after being released as a single that year. Wynette's version was produced by Chips Moman at the Moman Recording Studio in Las Vegas, Nevada. The recording session also included nine additional tracks that would appear on Wynette's 1981 studio album. The song was released as a single in July 1981. It reached number 18 on the Billboard Hot Country Singles chart that same year. "Crying in the Rain" became Wynette's third single to reach the country songs top 20 in the 1980s decade. The song was issued on Wynette's twenty-second studio album, You Brought Me Back (1981). Additionally, "Crying in the Rain" peaked at number 11 on the RPM Country Tracks chart in Canada around the same time. It was her highest-charting solo song on the RPM survey since 1979. Track listing 7-inch single A. "Crying in the Rain" – 3:12 B. "Bring My Baby Back to Me" – 3:25 Charts A-ha version In 1989, Norwegian band A-ha covered the song. It was the first single taken from their fourth studio album, East of the Sun, West of the Moon (1990). Following its success, A-ha became closer to the Everly Brothers, who had orig
https://en.wikipedia.org/wiki/John%20Irwin%20Hutchinson
John Irwin Hutchinson (12 April 1867 – 1 December 1935) was an American mathematician born in Bangor, Maine. He was educated at Bates College, (A.B., 1889), Clark University (1890–92), and the University of Chicago (Ph.D., 1896). With Virgil Snyder he was coauthor of Differential and Integral Calculus (1902) and Elementary Treatise on the Calculus (1912). Books Differential and integral calculus (New York, American Book Company, 1902) Elementary textbook on the calculus. (New York, American Book Company, 1912)
https://en.wikipedia.org/wiki/Dynamic%20web%20page
A dynamic web page is a web page constructed at runtime (during software execution), as opposed to a static web page, delivered as it is stored. A server-side dynamic web page is a web page whose construction is controlled by an application server processing server-side scripts. In server-side scripting, parameters determine how the assembly of every new web page proceeds, and including the setting up of more client-side processing. A client-side dynamic web page processes the web page using JavaScript running in the browser as it loads. JavaScript can interact with the page via Document Object Model (DOM), to query page state and modify it. Even though a web page can be dynamic on the client-side, it can still be hosted on a static hosting service such as GitHub Pages or Amazon S3 as long as there is not any server-side code included. A dynamic web page is then reloaded by the user or by a computer program to change some variable content. The updating information could come from the server, or from changes made to that page's DOM. This may or may not truncate the browsing history or create a saved version to go back to, but a dynamic web page update using AJAX technologies will neither create a page to go back to, nor truncate the web browsing history forward of the displayed page. Using AJAX, the end user gets one dynamic page managed as a single page in the web browser while the actual web content rendered on that page can vary. The AJAX engine sits only on the browser requesting parts of its DOM, the DOM, for its client, from an application server. A particular application server could offer a standardized REST style interface to offer services to the web application. DHTML is the umbrella term for technologies and methods used to create web pages that are not static web pages, though it has fallen out of common use since the popularization of AJAX, a term which is now itself rarely used. Client-side-scripting, server-side scripting, or a combination of these
https://en.wikipedia.org/wiki/Moti%20Yung
Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography. Career Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked at the IBM Thomas J. Watson Research Center, CertCo, RSA Laboratories, and Google. In 2016, Yung moved from Google to Snap Inc. Yung is currently a research scientist at Google. Yung is an adjunct senior research faculty member at Columbia University, and has co-advised PhD students including Gödel Prize winner Matthew K. Franklin, Jonathan Katz, and Aggelos Kiayias. Research Yung research covers primarily the area of cryptography and its applications to information security and data privacy. He has worked on defining and implementing malicious (offensive) cryptography: cryptovirology and kleptography, and on various other foundational and applied fields of cryptographic research, including: user and entity electronic authentication, information-theoretic security, secure multi-party computation, threshold cryptosystems, and zero-knowledge proofs, Cryptovirology In 1996, Adam L. Young and Yung coined the term cryptovirology to denote the use of cryptography as an attack weapon via computer viruses and other malware in contrast to its traditional protective role. In particular, they described the first instances of ransomware using public-key cryptography. Kleptography In 1996, Adam L. Young and Yung introduced the notion of kleptography to show how cryptography could be used to attack host cryptosystems where the malicious resulting system with the embedded cryptologic tool in it resists reverse-engineering and cannot be detected by interacting with the host cryptosystem, as an argument against cryptographic systems and devices given by an external body as "black boxes" as was the Clipper chip and the Capstone program. After the 2013 Snowden affair, the NIST was believed to have mounted the first kleptographic attack agai
https://en.wikipedia.org/wiki/Hollow%20Moon
The Hollow Moon and the closely related Spaceship Moon are pseudoscientific hypotheses that propose that Earth's Moon is either wholly hollow or otherwise contains a substantial interior space. No scientific evidence exists to support the idea; seismic observations and other data collected since spacecraft began to orbit or land on the Moon indicate that it has a thin crust, extensive mantle and small, dense core, although overall it is much less dense than Earth. The first publication to mention a hollow Moon was H. G. Wells' 1901 novel The First Men in the Moon. The concept of a (partially) hollow Moon has been employed in science fiction multiple times. In 1970, two Soviet authors published a short piece in the popular press speculating that the Moon might be "the Creation of Alien Intelligence". Since the late 1970s, the hypothesis has been endorsed by conspiracy theorists like Jim Marrs and David Icke. Introduction The Hollow Moon hypothesis is the suggestion that the Moon is hollow, usually as a product of an alien civilization. It is often called the Spaceship Moon hypothesis and often corresponds with beliefs in UFOs or ancient astronauts. The suggestion of a hollow moon first appeared in science fiction, when H. G. Wells wrote about a hollow Moon in his 1901 book The First Men in the Moon. The concept of hollow planets was not new; The first discussion of a Hollow Earth was by scientist Edmond Halley in 1692. Wells borrowed from earlier fictional works that described a hollow Earth, such as the 1741 novel Niels Klim's Underground Travels by Ludvig Holberg. Both Hollow Moon and Hollow Earth are now considered to be fringe theories or conspiracy theories. The concept of the Moon as a spaceship is often mentioned as one of David Icke's beliefs. Claims and rebuttals Density The fact that the Moon is less dense than the Earth is advanced by conspiracy theorists as support for claims of a hollow Moon. The Moon's mean density is 3.3 g/cm3, whereas th
https://en.wikipedia.org/wiki/Blog%20comment%20hosting%20service
A blog comment hosting service is a service which externally hosts comments posted by users to blog or online newspaper posts. Many such services allow for users to log into a blog comment hosting service using social network profile credentials such as those of Facebook Connect, Yahoo!, Google, LinkedIn, Myspace, etc. Such services may also have an effect upon instances of comment spam, as prior registration with comment hosts may be the only means by which to make comments onto many blogs. Comparison of blog comment hosting services
https://en.wikipedia.org/wiki/Journal%20of%20Systems%20and%20Software
The Journal of Systems and Software is a computer science journal in the area of software systems, established in 1979 and published by Elsevier. Content and scope The journal publishes research papers, state-of-the-art surveys, and practical experience reports. It includes papers covering issues of programming methodology, software engineering, and hardware/software systems. Topics include: "software systems, prototyping issues, high-level specification techniques, procedural and functional programming techniques, data-flow concepts, multiprocessing, real-time, distributed, concurrent, and telecommunications systems, software metrics, reliability models for software, performance issues, and management concerns." Abstracting and indexing According to the 2021 Journal Citation Reports, the Journal of Systems and Software has an impact factor of 3.514. According to Google Scholar, the journal has an h5-index of 61, which ranks third among international publication venues in software systems, after ICSE and IEEE Transactions on Software Engineering. Past and present editors-in-chief John Manley and Alan Salisbury (1979–1983) Richard E. Fairley (1984–1985) Robert L. Glass (1986–2001) David N. Card (2002–2008) Hans van Vliet (2009–2017) Paris Avgeriou and David Shepherd (2018–current) Notable articles A few of the most notable (downloaded) articles are: Software defect prediction based on enhanced metaheuristic feature selection optimization and a hybrid deep neural network A software engineering perspective on engineering machine learning systems: State of the art and challenges MeTeaM: A method for characterizing mature software metrics teams
https://en.wikipedia.org/wiki/Alliance%20for%20Biosecurity
The Alliance for Biosecurity is a consortium of companies that develop products to respond to national security threats, including bioterrorism pathogens and emerging infectious diseases. It is headquartered in Washington DC. Background The United States faces risks to national security posed by the danger of bioterrorism or a destabilizing infectious disease pandemic. The vulnerability is considered severe because many of the vaccines and medicines that would be needed to protect people do not currently exist. The Alliance for Biosecurity is a group of pharmaceutical and biotechnology companies that work to create preventive measures and treatments for severe infectious diseases. Within the U.S. federal government, the Biomedical Advanced Research and Development Authority (BARDA) and the Project BioShield Special Reserve Fund (SRF) provide funding to research, develop, and procure a medicines to control epidemics. History The Alliance for Biosecurity was formed in 2005. Its purpose was to build a partnership between government and private sector biotechnology and pharmaceutical companies working in the biodefense space. The Center for Biosecurity, a nonprofit multidisciplinary organization of physicians public health professionals and scientists, was an organizer of the alliance and participates in it. Together, the two groups have provided congressional testimony and authored letters to Congress. In April 2018, the alliance conducted a national poll about biosecurity. Seventy-three percent of the 1,612 Americans polled said they would support a congressional decision to increase funding to address biosecurity needs and capabilities. The poll was conducted, in part, to measure support for biosecurity funding because reauthorization of the Pandemic and All-Hazards Preparedness Act (PAHPA) is due by September 30, 2018. PAHPA is a law that improved the federal government's medical and public health preparedness for national security threats. Examples of threats
https://en.wikipedia.org/wiki/Photosystem%20II
Photosystem II (or water-plastoquinone oxidoreductase) is the first protein complex in the light-dependent reactions of oxygenic photosynthesis. It is located in the thylakoid membrane of plants, algae, and cyanobacteria. Within the photosystem, enzymes capture photons of light to energize electrons that are then transferred through a variety of coenzymes and cofactors to reduce plastoquinone to plastoquinol. The energized electrons are replaced by oxidizing water to form hydrogen ions and molecular oxygen. By replenishing lost electrons with electrons from the splitting of water, photosystem II provides the electrons for all of photosynthesis to occur. The hydrogen ions (protons) generated by the oxidation of water help to create a proton gradient that is used by ATP synthase to generate ATP. The energized electrons transferred to plastoquinone are ultimately used to reduce to NADPH or are used in non-cyclic electron flow. DCMU is a chemical often used in laboratory settings to inhibit photosynthesis. When present, DCMU inhibits electron flow from photosystem II to plastoquinone. Structure of complex The core of PSII consists of a pseudo-symmetric heterodimer of two homologous proteins D1 and D2. Unlike the reaction centers of all other photosystems in which the positive charge sitting on the chlorophyll dimer that undergoes the initial photoinduced charge separation is equally shared by the two monomers, in intact PSII the charge is mostly localized on one chlorophyll center (70−80%). Because of this, P680+ is highly oxidizing and can take part in the splitting of water. Photosystem II (of cyanobacteria and green plants) is composed of around 20 subunits (depending on the organism) as well as other accessory, light-harvesting proteins. Each photosystem II contains at least 99 cofactors: 35 chlorophyll a, 12 beta-carotene, two pheophytin, two plastoquinone, two heme, one bicarbonate, 20 lipids, the cluster (including two chloride ions), one non heme and
https://en.wikipedia.org/wiki/Core-compact%20space
In general topology and related branches of mathematics, a core-compact topological space is a topological space whose partially ordered set of open subsets is a continuous poset. Equivalently, is core-compact if it is exponentiable in the category Top of topological spaces. Expanding the definition of an exponential object, this means that for any , the set of continuous functions has a topology such that function application is a unique continuous function from to , which is given by the Compact-open topology and is the most general way to define it. Another equivalent concrete definition is that every neighborhood of a point contains a neighborhood of whose closure in is compact. As a result, every (weakly) locally compact space is core-compact, and every Hausdorff (or more generally, sober) core-compact space is locally compact, so the definition is a slight weakening of the definition of a locally compact space in the non-Hausdorff case. See also Locally compact space
https://en.wikipedia.org/wiki/IBM%204767
The IBM 4767 PCIe Cryptographic Coprocessor is a hardware security module (HSM) that includes a secure cryptoprocessor implemented on a high-security, tamper resistant, programmable PCIe board. Specialized cryptographic electronics, microprocessor, memory, and random number generator housed within a tamper-responding environment provide a highly secure subsystem in which data processing and cryptography can be performed. Sensitive key material is never exposed outside the physical secure boundary in a clear format. The IBM 4767 is validated to FIPS PUB 140-2 Level 4, the highest level of certification achievable for commercial cryptographic devices. The IBM 4767 data sheet describes the coprocessor in detail. IBM supplies two cryptographic-system implementations: The PKCS#11 implementation creates a high-security solution for application programs developed for this industry-standard API. The IBM Common Cryptographic Architecture (CCA) implementation provides many functions of special interest in the finance industry, extensive support for distributed key management, and a base on which custom processing and cryptographic functions can be added. Toolkits for custom application development are also available. Applications may include financial PIN transactions, bank-to-clearing-house transactions, EMV transactions for integrated circuit (chip) based credit cards, and general-purpose cryptographic applications using symmetric key algorithms, hashing algorithms, and public key algorithms. The operational keys (symmetric or RSA private) are generated in the coprocessor and are then saved either in a keystore file or in application memory, encrypted under the master key of that coprocessor. Any coprocessor with an identical master key can use those keys. Performance benefits include the incorporation of elliptic curve cryptography (ECC) and format preserving encryption (FPE) in the hardware. Supported systems IBM supports the 4767 on certain IBM Z, IBM Power Sys
https://en.wikipedia.org/wiki/IPEX%20syndrome
Immunodysregulation polyendocrinopathy enteropathy X-linked syndrome (IPEX syndrome) is a rare autoimmune disease. It is one of the autoimmune polyendocrine syndromes. Most often, IPEX presents with autoimmune enteropathy, dermatitis (eczema), and autoimmune endocrinopathy (most often Type 1 diabetes), but other presentations exist. IPEX is caused by mutations in the gene FOXP3, which encodes transcription factor forkhead box P3 (FOXP3). FOXP3 is widely considered to be the master regulator of the regulatory T cell (Treg) lineage. FOXP3 mutation can lead to the dysfunction of CD4+ Tregs. In healthy people, Tregs maintain immune homeostasis. When there is a deleterious FOXP3 mutation, Tregs do not function properly and cause autoimmunity. IPEX onset usually happens in infancy. If left untreated, it is often fatal by the age of 2 or 3. A bone marrow transplant is generally considered the best treatment option. IPEX exclusively affects males and is inherited in an X-linked recessive manner; female carriers of pathogenic FOXP3 mutations do not have symptoms and no female cases are known. Presentation Classical triad The classical triad describes the most common symptoms of IPEX: intractable diarrhea, type 1 diabetes, and eczema. Symptoms usually begin shortly after birth. Other symptoms include: thyroid disease, kidney dysfunction, blood disorders, frequent infections, autoimmune hemolytic anemia, and food allergies, among others. Endocrinopathy The most common endocrinopathy associated with IPEX is type 1 diabetes, especially neonatal diabetes. In this type of diabetes, the immune system attacks insulin-producing cells. This makes the pancreas unable to produce insulin. Diabetes can permanently damage the pancreas. Thyroid disorders are also common. Enteropathy The most common enteropathy associated with IPEX is intractable diarrhea. Vomiting and gastritis are also common. Other manifestations include Celiac disease, ulcerative colitis, and ileus. Skin man
https://en.wikipedia.org/wiki/Adams%20resolution
In mathematics, specifically algebraic topology, there is a resolution analogous to free resolutions of spectra yielding a tool for constructing the Adams spectral sequence. Essentially, the idea is to take a connective spectrum of finite type and iteratively resolve with other spectra that are in the homotopy kernel of a map resolving the cohomology classes in using Eilenberg–MacLane spectra. This construction can be generalized using a spectrum , such as the Brown–Peterson spectrum , or the complex cobordism spectrum , and is used in the construction of the Adams–Novikov spectral sequencepg 49. Construction The mod Adams resolution for a spectrum is a certain "chain-complex" of spectra induced from recursively looking at the fibers of maps into generalized Eilenberg–Maclane spectra giving generators for the cohomology of resolved spectrapg 43. By this, we start by considering the mapwhere is an Eilenberg–Maclane spectrum representing the generators of , so it is of the formwhere indexes a basis of , and the map comes from the properties of Eilenberg–Maclane spectra. Then, we can take the homotopy fiber of this map (which acts as a homotopy kernel) to get a space . Note, we now set and . Then, we can form a commutative diagramwhere the horizontal map is the fiber map. Recursively iterating through this construction yields a commutative diagramgiving the collection . This meansis the homotopy fiber of and comes from the universal properties of the homotopy fiber. Resolution of cohomology of a spectrum Now, we can use the Adams resolution to construct a free -resolution of the cohomology of a spectrum . From the Adams resolution, there are short exact sequenceswhich can be strung together to form a long exact sequencegiving a free resolution of as an -module. E*-Adams resolution Because there are technical difficulties with studying the cohomology ring in generalpg 280, we restrict to the case of considering the homology coalgebra (of co-operatio
https://en.wikipedia.org/wiki/BrassiBase
BrassiBase is on online resource that documents information and research related to species within the plant family Brassicaceae. It is hosted by the University of Heidelberg. The website defines itself as "tools and biological resources for Brassicaceae character and trait studies". Researchers studying Brassicaceae species use the tools provided in BrassiBase to refine the taxonomy and evolutionary history of plants in this family and to perform phylogenetic analyses. External links
https://en.wikipedia.org/wiki/File%20comparison
In computing, file comparison is the calculation and display of the differences and similarities between data objects, typically text files such as source code. The methods, implementations, and results are typically called a diff, after the Unix diff utility. The output may be presented in a graphical user interface or used as part of larger tasks in networks, file systems, or revision control. Some widely used file comparison programs are diff, cmp, FileMerge, WinMerge, Beyond Compare, and File Compare. Many text editors and word processors perform file comparison to highlight the changes to a file or document. Method types Most file comparison tools find the longest common subsequence between two files. Any data not in the longest common subsequence is presented as a change or an insertion or a deletion. In 1978, Paul Heckel published an algorithm that identifies most moved blocks of text. This is used in the IBM History Flow tool. Other file comparison programs find block moves. Some specialized file comparison tools find the longest increasing subsequence between two files. The rsync protocol uses a rolling hash function to compare two files on two distant computers with low communication overhead. File comparison in word processors is typically at the word level, while comparison in most programming tools is at the line level. Byte or character-level comparison is useful in some specialized applications. Display Display of file comparison varies, with the main approaches being either showing two files side-by-side, or showing a single file, with markup showing the changes from one file to the other. In either case, particularly side-by-side viewing, code folding or text folding may be used to hide unchanged portions of the file, only showing the changed portions. Reasoning Comparison tools are used for various reasons. When one wishes to compare binary files, byte-level is probably best. But if one wishes to compare text files or computer progr
https://en.wikipedia.org/wiki/Outline%20of%20botany
The following outline is provided as an overview of and topical guide to botany: Botany – biological discipline which involves the study of plants. Core concepts of botany Bud Cell wall Chlorophyll Chloroplast Flora Flower Fruit Forest Leaf Meristem Photosynthesis Plant Plant cell Pollen Seed Seedling Spore Tree Vine Wood Subdisciplines of botany Branches of botany Agronomy Bryology (mosses and liverworts) Dendrology (woody plants) Ethnobotany Lichenology (lichens) Mycology (fungi) Paleobotany Palynology (spores and pollen) Phycology (algae) Phytosociology Plant anatomy Plant ecology Plant evolution Plant morphology Plant pathology Plant physiology Plant taxonomy Pteridology (ferns) History of botany History of botany History of plant systematics Kinds of plants Major plant groups Algae Cyanobacteria Brown algae Charophyta Chlorophyta Desmid Diatom Red algae Green algae Bryophytes Anthocerotophyta (hornworts) Bryophyta (mosses) Marchantiophyta (liverworts) Pteridophytes Lycopodiophyta (club mosses) Pteridophyta (ferns & horsetails) Rhyniophyta (early plants) Gymnosperms Pteridospermatophyta (seed "ferns") Cycadophyta Ginkgophyta Gnetophyta Pinophyta (conifers) Angiosperms Dicotyledon Asteraceae (sunflower family) Cactaceae (cactus family) Fabaceae (legume family) Lamiaceae (mint family) Rosaceae (rose family) Monocotyledon Araceae (arum family) Arecaceae (palm family) Iridaceae (iris family) Orchidaceae (orchid family) Poaceae (grass family) Some well-known plants List of culinary fruits List of edible seeds List of culinary herbs and spices List of culinary nuts List of vegetables List of woods General plant species concepts Plant taxonomy Cultivated plant taxonomy List of systems of plant taxonomy Clades Monophyletic Polyphyletic Speciation Isolating mechanisms Concept of species Species problem Notable botanists In alphabetical order by surname: Aristotle Arthur C
https://en.wikipedia.org/wiki/List%20of%20restriction%20enzyme%20cutting%20sites%3A%20S
This article contains a list of the most studied restriction enzymes whose names start with S. It contains approximately 130 enzymes. The following information is given: Whole list navigation Restriction enzymes S Notes Biotechnology Restriction enzyme cutting sites Restriction enzymes
https://en.wikipedia.org/wiki/Yaw%20drive
The yaw drive is an important component of the horizontal axis wind turbines' yaw system. To ensure the wind turbine is producing the maximal amount of electric energy at all times, the yaw drive is used to keep the rotor facing into the wind as the wind direction changes. This only applies for wind turbines with a horizontal axis rotor. The wind turbine is said to have a yaw error if the rotor is not aligned to the wind. A yaw error implies that a lower share of the energy in the wind will be running through the rotor area. (The generated energy will be approximately proportional to the cosine of the yaw error). History When the windmills of the 18th century included the feature of rotor orientation via the rotation of the nacelle, an actuation mechanism able to provide that turning moment was necessary. Initially the windmills used ropes or chains extending from the nacelle to the ground in order to allow the rotation of the nacelle by means of human or animal power. Another historical innovation was the fantail. This device was actually an auxiliary rotor equipped with plurality of blades and located downwind of the main rotor, behind the nacelle in a 90° (approximately) orientation to the main rotor sweep plane. In the event of change in wind direction the fantail would rotate thus transmitting its mechanical power through a gearbox (and via a gear-rim-to-pinion mesh) to the tower of the windmill. The effect of the aforementioned transmission was the rotation of the nacelle towards the direction of the wind, where the fantail would not face the wind thus stop turning (i.e. the nacelle would stop to its new position). The modern yaw drives, even though electronically controlled and equipped with large electric motors and planetary gearboxes have great similarities to the old windmill concept. Types The main categories of yaw drives are: The Electric Yaw Drives: Commonly used in almost all modern turbines. The Hydraulic Yaw Drive: Hardly ever used anymore
https://en.wikipedia.org/wiki/Hemidesmosome
Hemidesmosomes are very small stud-like structures found in keratinocytes of the epidermis of skin that attach to the extracellular matrix. They are similar in form to desmosomes when visualized by electron microscopy, however, desmosomes attach to adjacent cells. Hemidesmosomes are also comparable to focal adhesions, as they both attach cells to the extracellular matrix. Instead of desmogleins and desmocollins in the extracellular space, hemidesmosomes utilize integrins. Hemidesmosomes are found in epithelial cells connecting the basal epithelial cells to the lamina lucida, which is part of the basal lamina. Hemidesmosomes are also involved in signaling pathways, such as keratinocyte migration or carcinoma cell intrusion. Structure Hemidesmosomes can be categorized into two types based on their protein constituents. Type 1 hemidesmosomes are found in stratified and pseudo-stratified epithelium. Type 1 hemidesmosomes have five main elements: integrin α6β4, plectin in its isoform 1a, i. e. P1a, tetraspanin protein CD151, BPAG1e, or bullous pemphigoid antigen isoform e, and BPAG2 (also known as BP180 or type 17 collagen). Type 1 hemidesmosomes are found in stratified and pseudostratified epithelial tissue. Type 2 hemidesmosomes contain integrin α6β4 and plectin without the BP antigens. Hemidesmosomes have two membrane-spanning components: Integrin α6β4 and BPAG2. Integrin α6β4 operates as a laminin-332 receptor. Integrin α6β4 is composed to two α and β subunit dimers. The larger β4 subunit has domains that bind to fibronectin III and calcium. The α6 subunit binds to extracellular BP180, CD151 and laminin-322. When integrin α6β4 binds to Plectin 1a and BPAG1, it associates with the keratin intermediate filaments in the cytoskeleton. Hemidesmosomes are linked to keratin by plectin isoform 1a from the plakin protein family. Plectin is a 500 kDa protein with a long, rod-like domain and a domain at the end that contains an intermediate filament binding site. BPAG2, or
https://en.wikipedia.org/wiki/Three-layer%20architecture
The Three-Layer Architecture is a hybrid reactive/deliberative robot architecture developed by R. James Firby that consists of three layers: a reactive feedback control mechanism, a reactive plan execution mechanism, and a mechanism for performing time-consuming deliberative computations. See also ATLANTIS architecture Servo, subsumption, and symbolic (SSS) architecture Distributed architecture for mobile navigation (DAMN) Autonomous robot architecture (AuRA)
https://en.wikipedia.org/wiki/CXorf40A
Protein CXorf40A is a protein that in humans is encoded by the CXorf40A gene.
https://en.wikipedia.org/wiki/Stanislas%20Dehaene
Stanislas Dehaene (born May 12, 1965) is a French author and cognitive neuroscientist whose research centers on a number of topics, including numerical cognition, the neural basis of reading and the neural correlates of consciousness. As of 2017, he is a professor at the Collège de France and, since 1989, the director of INSERM Unit 562, "Cognitive Neuroimaging". Dehaene was one of ten people to be awarded the James S. McDonnell Foundation Centennial Fellowship in 1999 for his work on the "Cognitive Neuroscience of Numeracy". In 2003, together with Denis Le Bihan, Dehaene was awarded the Grand Prix scientifique de la Fondation Louis D. from the Institut de France. He was elected to the American Philosophical Society in 2010. In 2014, together with Giacomo Rizzolatti and Trevor Robbins, he was awarded the Brain Prize. Dehaene is an associate editor of the journal Cognition, and a member of the editorial board of several other journals, including NeuroImage, PLoS Biology, Developmental Science, and Neuroscience of Consciousness. Early life and education Dehaene studied mathematics at the École Normale Supérieure in Paris from 1984 to 1989. He obtained his master's degree in Applied mathematics and computer science in 1985 from the University of Paris VI. He turned to neuroscience and psychology after reading Jean-Pierre Changeux's book, L'Homme neuronal (Neuronal Man: The Biology of The Mind). Dehaene began to collaborate on computational neuronal models of human cognition, including working memory and task control, collaborations which continue to the present day. Dehaene completed his PhD in Experimental Psychology in 1989 with Jacques Mehler at the École des Hautes Études en Sciences Sociales (EHESS), Paris. Career After receiving his doctorate, Dehaene became a research scientist at INSERM in the Cognitive Sciences and Psycholinguistics Laboratory (Laboratoire de Sciences Cognitives et Psycholinguistique) directed by Mehler. He spent two years, from 1992
https://en.wikipedia.org/wiki/Necking%20%28engineering%29
In engineering and materials science, necking is a mode of tensile deformation where relatively large amounts of strain localize disproportionately in a small region of the material. The resulting prominent decrease in local cross-sectional area provides the basis for the name "neck". Because the local strains in the neck are large, necking is often closely associated with yielding, a form of plastic deformation associated with ductile materials, often metals or polymers. Once necking has begun, the neck becomes the exclusive location of yielding in the material, as the reduced area gives the neck the largest local stress. Formation Necking results from an instability during tensile deformation when the cross-sectional area of the sample decreases by a greater proportion than the material strain hardens. Armand Considère published the basic criterion for necking in 1885, in the context of the stability of large scale structures such as bridges. Three concepts provide the framework for understanding neck formation. Before deformation, all real materials have heterogeneities such as flaws or local variations in dimensions or composition that cause local fluctuations in stresses and strains. To determine the location of the incipient neck, these fluctuations need only be infinitesimal in magnitude. During plastic tensile deformation the material decreases in cross-sectional area due to the incompressibility of plastic flow. (Not due to the Poisson effect, which is linked to elastic behaviour.) During plastic tensile deformation the material strain hardens. The amount of hardening varies with extent of deformation. The latter two effects determine the stability while the first effect determines the neck's location. The Considère treatment Instability (onset of necking) is expected to occur when an increase in the (local) strain produces no net increase in the load, . This will happen when This leads to with the subscript being used to emphasize that these
https://en.wikipedia.org/wiki/Radio%20acoustic%20ranging
Radio acoustic ranging, occasionally written as "radio-acoustic ranging" and sometimes abbreviated RAR, was a method for determining a ship's precise location at sea by detonating an explosive charge underwater near the ship, detecting the arrival of the underwater sound waves at remote locations, and radioing the time of arrival of the sound waves at the remote stations to the ship, allowing the ship's crew to use true range multilateration to determine the ship's position. Developed by the United States Coast and Geodetic Survey in 1923 and 1924 for use in accurately fixing the position of survey ships during hydrographic survey operations, it was the first navigation technique in human history other than dead reckoning that did not require visual observation of a landmark, marker, light, or celestial body, and the first non-visual means to provide precise positions. First employed operationally in 1924, radio acoustic ranging remained in use until 1944, when new radio navigation techniques developed during World War II rendered it obsolete. Technique To fix their position using radio acoustic ranging, a ship's crew first ascertained the temperature and salinity of sea water in the vicinity of the ship to determine an accurate velocity of sound through the water. The crew then threw a small TNT bomb off the ship's stern. It exploded at a depth of about , and a chronograph aboard the ship automatically recorded the time the explosion was heard at the ship. The sound traveled outward from the explosion, eventually reaching hydrophones at known locations – shore stations, anchored station ships, or moored buoys – at a distance from the ship. Each hydrophone was connected to a radio transmitter that automatically sent a signal indicating the time its hydrophone detected the sound. At the distances involved – generally less than – each of these radio signals arrived at the ship at essentially the same instant that each of the remote hydrophones detected the sound of
https://en.wikipedia.org/wiki/Food%20Industry%20Centre
The Food Industry Centre (FIC) at Cardiff Metropolitan University (also known as UWIC) is a Welsh research and education organisation designed to address issues of food safety and food-related health concerns. Its mission also includes supporting the Welsh food industry. The centre, which is part of UWIC's Cardiff School of Health Sciences at the university's Llandaff campus, was launched in 1999. A new facility for the centre opened on 21 April 2009 and was built at a cost of £5,000,000.
https://en.wikipedia.org/wiki/Fuchsian%20group
In mathematics, a Fuchsian group is a discrete subgroup of PSL(2,R). The group PSL(2,R) can be regarded equivalently as a group of orientation-preserving isometries of the hyperbolic plane, or conformal transformations of the unit disc, or conformal transformations of the upper half plane, so a Fuchsian group can be regarded as a group acting on any of these spaces. There are some variations of the definition: sometimes the Fuchsian group is assumed to be finitely generated, sometimes it is allowed to be a subgroup of PGL(2,R) (so that it contains orientation-reversing elements), and sometimes it is allowed to be a Kleinian group (a discrete subgroup of PSL(2,C)) which is conjugate to a subgroup of PSL(2,R). Fuchsian groups are used to create Fuchsian models of Riemann surfaces. In this case, the group may be called the Fuchsian group of the surface. In some sense, Fuchsian groups do for non-Euclidean geometry what crystallographic groups do for Euclidean geometry. Some Escher graphics are based on them (for the disc model of hyperbolic geometry). General Fuchsian groups were first studied by , who was motivated by the paper , and therefore named them after Lazarus Fuchs. Fuchsian groups on the upper half-plane Let H = {z in C : Im(z) > 0} be the upper half-plane. Then H is a model of the hyperbolic plane when endowed with the metric The group PSL(2,R) acts on H by linear fractional transformations (also known as Möbius transformations): This action is faithful, and in fact PSL(2,R) is isomorphic to the group of all orientation-preserving isometries of H. A Fuchsian group Γ may be defined to be a subgroup of PSL(2,R), which acts discontinuously on H. That is, For every z in H, the orbit Γz = {γz : γ in Γ} has no accumulation point in H. An equivalent definition for Γ to be Fuchsian is that Γ be a discrete group, which means that: Every sequence {γn} of elements of Γ converging to the identity in the usual topology of point-wise convergence is eventually
https://en.wikipedia.org/wiki/List%20of%20coastal%20weather%20stations%20in%20the%20British%20Isles
Reports from these coastal stations and automatic weather logging stations in the British Isles are included in the extended Shipping Forecasts on BBC Radio 4 at 0048 and 0520 local time each day. The stations are listed in the order they are read in the forecast, the numbers in brackets refer to the map on the right. Weather reports included in the forecasts are issued at 2300 local time for the late broadcast and 0400 for the early one, although reports issued at other times may be included if for some reason, the most recent weather report did not arrive. The report from each station is read in the following format: wind direction and speed, visibility in nautical miles, air pressure and pressure trend (steady, rising, or falling with rate of change). Tiree Automatic (1) Stornoway (2) Lerwick (3) Wick Automatic (0048 only) Aberdeen (0048 only) Leuchars (4) Boulmer (0048 only) Bridlington (5) Sandettie Light Vessel Automatic (6) Greenwich Light Vessel Automatic (7) St. Catherine's Point Automatic (0048 only) Jersey (8) Channel Light Vessel Automatic (9) Scilly Automatic (10) Milford Haven (0048 only) Aberporth (0048 only) Valley (0048 only) Liverpool Crosby (0048 only) Valentia (11) Ronaldsway (12) Malin Head (13) Machrihanish Automatic (0048 only) See also Coastline of the United Kingdom Shipping Forecast Inshore coastal areas of the United Kingdom
https://en.wikipedia.org/wiki/Artin%27s%20conjecture%20on%20primitive%20roots
In number theory, Artin's conjecture on primitive roots states that a given integer a that is neither a square number nor −1 is a primitive root modulo infinitely many primes p. The conjecture also ascribes an asymptotic density to these primes. This conjectural density equals Artin's constant or a rational multiple thereof. The conjecture was made by Emil Artin to Helmut Hasse on September 27, 1927, according to the latter's diary. The conjecture is still unresolved as of 2023. In fact, there is no single value of a for which Artin's conjecture is proved. Formulation Let a be an integer that is not a square number and not −1. Write a = a0b2 with a0 square-free. Denote by S(a) the set of prime numbers p such that a is a primitive root modulo p. Then the conjecture states S(a) has a positive asymptotic density inside the set of primes. In particular, S(a) is infinite. Under the conditions that a is not a perfect power and that a0 is not congruent to 1 modulo 4 , this density is independent of a and equals Artin's constant, which can be expressed as an infinite product . Similar conjectural product formulas exist for the density when a does not satisfy the above conditions. In these cases, the conjectural density is always a rational multiple of CArtin. Example For example, take a = 2. The conjecture claims that the set of primes p for which 2 is a primitive root has the above density CArtin. The set of such primes is S(2) = {3, 5, 11, 13, 19, 29, 37, 53, 59, 61, 67, 83, 101, 107, 131, 139, 149, 163, 173, 179, 181, 197, 211, 227, 269, 293, 317, 347, 349, 373, 379, 389, 419, 421, 443, 461, 467, 491, ...}. It has 38 elements smaller than 500 and there are 95 primes smaller than 500. The ratio (which conjecturally tends to CArtin) is 38/95 = 2/5 = 0.4. Partial results In 1967, Christopher Hooley published a conditional proof for the conjecture, assuming certain cases of the generalized Riemann hypothesis. Without the generalized Riemann hypothesis, there is
https://en.wikipedia.org/wiki/Job%20creation%20index
A job creation index is a measure of net hiring of full- and part-time adult workers. In the US, the index score is derived by subtracting the percentage of American workers who say their employers are 'firing' from the percentage of workers who say their employers are 'hiring'. United States The job creation index has been increasing since falling to -5 in February 2009 during the Great Recession. According to Gallup, in 2013 North Dakota was ranked number 1 for job creation in the US and had the highest job creation index with a score of 40, thus surpassing its closest competitors District of Columbia and South Dakota's score by 10 points. North Dakota has held this spot since 2009. Rhode Island earned a spot at the bottom of the job creation index with a score of 12. In 2013, the average score in the U.S. was 20, up 2 points from 2012. Nearly all states have shown significant improvement in job creation. The survey showed that northern states in the midwest are seeing a growth in jobs much more so than in other parts of the US. The results are based on telephone interviews from Gallup, which took place from January 2, 2013 - December 29, 2013. Gallup surveyed 208,758 adults employed full or part-time in all 50 states. In July 2017, the job creation index returned to its all-time high of +37. This was one point higher than the index score in June. Politics Three of the top five job creation index scores of 2013 are heavily Republican while a significant number of the states with the bottom index scores (six out of the bottom seven) are heavily Democratic. However, Gallup assessed, “Apart from this, there is little correspondence between net hiring and partisan affiliation in the states." United States 2013 scores See also Bureau of Labor Statistics Conference Board Leading Economic Index Economic mobility Economy of the United States List of U.S. states and territories by unemployment rate Occupational Outlook Handbook Unemployment in the United St
https://en.wikipedia.org/wiki/Adenophostin
Adenophostin A is a potent inositol trisphosphate (IP3) receptor agonist, but is much more potent than IP3. IP3R is a ligand-gated intracellular Ca2+ release channel that plays a central role in modulating cytoplasmic free Ca2+ concentration (Ca2+i). Adenophostin A is structurally different from IP3 but could elicit distinct calcium signals in cells.
https://en.wikipedia.org/wiki/ST2-PT
ST2-PT (Single Transition-to-single Transition Polarization Transfer) is a method of sensitivity enhancement in NMR spectroscopy, developed by K.V. Pervushin, G. Wider, and K. Wüthrich in 1998. This method affords a sensitivity enhancement for kinetically stable amide 15N–1H groups in proteins.
https://en.wikipedia.org/wiki/M114%20bomb
The M114 bomb was a four-pound U.S. anti-personnel bomb and biological cluster bomb sub-munition. The M114 was used in the M33 cluster bomb. History The M114 was a sub-munition for the M33 cluster bomb, as such, it was the first standardized U.S. biological weapon in 1952. The M114 was an improved version of a British World War II-era bomblet that was designed to disperse anthrax. Specifications The M114 was similar to a pipe bomb: it had a tube with a diameter of . 108 M114s were clustered into the M33 cluster bomb; each had its own detonator and was ejected from the M33 while the bomb was still aloft. Each M114 held 320 milliliters of Brucella suis.
https://en.wikipedia.org/wiki/Melly%20Oitzl
Melly S. Oitzl (in full: Maria-Silvana Oitzl, born 1955 in Lind/Arnoldstein) is an Austrian behavioral neuroscientist. She is associate professor of medical pharmacology at Leiden University and adjunct professor of cognitive neurobiology at the University of Amsterdam. Oitzl is mainly interested in the relationships between stress, cognition, and emotion. She obtained her Ph.D. with the mention magna cum laude in 1989 from the University of Düsseldorf. Oitzl is a member of the board of the Earth and Life Sciences division of the Netherlands Organisation for Scientific Research, from which she had received an "Aspasia" grant in 2008. She has been a member of the executive committee and a treasurer of the European Brain and Behaviour Society. According to the Web of Science, Oitzl has published more than 130 articles in peer-reviewed scientific journals, which have been cited over 5000 times, with an h-index of 33.
https://en.wikipedia.org/wiki/Nikodym%20set
In mathematics, a Nikodym set is a subset of the unit square in with complement of Lebesgue measure zero (i.e. with an area of 1), such that, given any point in the set, there is a straight line that only intersects the set at that point. The existence of a Nikodym set was first proved by Otto Nikodym in 1927. Subsequently, constructions were found of Nikodym sets having continuum many exceptional lines for each point, and Kenneth Falconer found analogues in higher dimensions. Nikodym sets are closely related to Kakeya sets (also known as Besicovitch sets). The existence of Nikodym sets is sometimes compared with the Banach–Tarski paradox. There is, however, an important difference between the two: the Banach–Tarski paradox relies on non-measurable sets. Mathematicians have also researched Nikodym sets over finite fields (as opposed to ).
https://en.wikipedia.org/wiki/Pseudorandom%20ensemble
In cryptography, a pseudorandom ensemble is a family of variables meeting the following criteria: Let be a uniform ensemble and be an ensemble. The ensemble is called pseudorandom if and are indistinguishable in polynomial time.
https://en.wikipedia.org/wiki/Coordinated%20vulnerability%20disclosure
In computer security, coordinated vulnerability disclosure (CVD, formerly known as responsible disclosure) is a vulnerability disclosure model in which a vulnerability or an issue is disclosed to the public only after the responsible parties have been allowed sufficient time to patch or remedy the vulnerability or issue. This coordination distinguishes the CVD model from the "full disclosure" model. Developers of hardware and software often require time and resources to repair their mistakes. Often, it is ethical hackers who find these vulnerabilities. Hackers and computer security scientists have the opinion that it is their social responsibility to make the public aware of vulnerabilities. Hiding problems could cause a feeling of false security. To avoid this, the involved parties coordinate and negotiate a reasonable period of time for repairing the vulnerability. Depending on the potential impact of the vulnerability, the expected time needed for an emergency fix or workaround to be developed and applied and other factors, this period may vary between a few days and several months. Coordinated vulnerability disclosure may fail to satisfy security researchers who expect to be financially compensated. At the same time, reporting vulnerabilities with the expectation of compensation is viewed by some as extortion. While a market for vulnerabilities has developed, vulnerability commercialization (or "bug bounties") remains a hotly debated topic. Today, the two primary players in the commercial vulnerability market are iDefense, which started their vulnerability contributor program (VCP) in 2003, and TippingPoint, with their zero-day initiative (ZDI) started in 2005. These organizations follow the coordinated vulnerability disclosure process with the material bought. Between March 2003 and December 2007 an average 7.5% of the vulnerabilities affecting Microsoft and Apple were processed by either VCP or ZDI. Independent firms financially supporting coordinated vulner
https://en.wikipedia.org/wiki/Fermi%E2%80%93Ulam%20model
The Fermi–Ulam model (FUM) is a dynamical system that was introduced by Polish mathematician Stanislaw Ulam in 1961. FUM is a variant of Enrico Fermi's primary work on acceleration of cosmic rays, namely Fermi acceleration. The system consists of a particle that collides elastically between a fixed wall and a moving one, each of infinite mass. The walls represent the magnetic mirrors with which the cosmic particles collide. A. J. Lichtenberg and M. A. Lieberman provided a simplified version of FUM (SFUM) that derives from the Poincaré surface of section and writes where is the velocity of the particle after the -th collision with the fixed wall, is the corresponding phase of the moving wall, is the velocity law of the moving wall and is the stochasticity parameter of the system. If the velocity law of the moving wall is differentiable enough, according to KAM theorem invariant curves in the phase space exist. These invariant curves act as barriers that do not allow for a particle to further accelerate and the average velocity of a population of particles saturates after finite iterations of the map. For instance, for sinusoidal velocity law of the moving wall such curves exist, while they do not for sawtooth velocity law that is discontinuous. Consequently, at the first case particles cannot accelerate infinitely, reversely to what happens at the last one. Over the years FUM became a prototype model for studying non-linear dynamics and coupled mappings. The rigorous solution of the Fermi-Ulam problem (the velocity and energy of the particle are bounded) was given first by L. D. Pustyl'nikov in (see also and references therein). In spite of these negative results, if one considers the Fermi–Ulam model in the framework of the special theory of relativity, then under some general conditions the energy of the particle tends to infinity for an open set of initial data. 2D generalization Though the 1D Fermi–Ulam model does not lead to accelerati
https://en.wikipedia.org/wiki/Sedgwick%20Memorial%20Medal
The Sedgwick Memorial Medal, given by the American Public Health Association, was established in 1929 for distinguished service and advancement of public health knowledge and practice. It is considered the APHA's highest honor. The medal is established in honour of William Thompson Sedgwick (1855–1921). Award recipients Source: APHA 1929 Charles V. Chapin 1930 Theobald Smith 1931 George W. McCoy 1932 William H. Park 1933 Milton J. Rosenau 1934 Edwin O. Jordon 1935 Haven Emerson 1936 Frederick F. Russell 1938 Wade H. Frost 1939 Thomas Parran 1940 Hans Zinsser 1941 Charles Armstrong 1942 C.E.A. Winslow 1943 James S. Simmons 1944 Ernest W. Goodpasture 1946 Karl F. Meyer 1947 Reginald M. Atwater 1948 Abel Wolman 1949 Henry F. Vaughan 1950 Rolla Eugene Dyer 1951 Edward S. Godfrey 1952 Kenneth F. Maxcy 1953 Carl E. Buck 1954 Willson G. Smillie 1955 Albert J. Chesley 1956 Frederick W. Jackson 1957 Lowell J. Reed 1958 Martha May Eliot 1959 Louis I. Dublin 1960 Fred T. Foard 1961 Frank G. Boudreau 1962 Ira V. Hiscock 1963 Gaylord W. Anderson 1964 Leona Baumgartner 1965 Willimina R. Walsh 1966 Fred L. Soper 1967 George Baehr 1968 Herman E. Hilleboe 1969 Marion W. Sheahan 1970 Hugh R. Leavell 1971 Margaret G. Arnstein 1972 Paul B. Cornely 1973 Isidore S. Falk 1974 Myron E. Wegman 1975 Leroy Edgar Burney 1976 Malcolm H. Merrill 1977 Lester Breslow 1978 M. Allen Pond 1979 Doris E. Roberts 1980 Lorin E. Kerr 1981 Dwight F. Metzler 1982 C. Rufus Rorem 1983 Milton I. Roemer 1984 Milton Terris 1985 Henrik L. Blum 1986 C. Arden Miller 1987 Larry J. Gordon 1988 Dorothy P. Rice 1989 Clarence L. Brumback 1990 Cecil G. Sheps 1991 Ruth Roemer 1992 Julius B. Richmond 1993 William H. Foege 1994 William H. McBeath 1995 Joyce Lashof 1996 Leonard Schuman 1997 Victor W. Sidel 1998 H. Jack Geiger 1999 Avedis Donabedian 2000 Philip R. Lee 2001 Myron Allukian 2002 C. William Keck 2003 E. Richard Brown 2004 Kenneth Olden
https://en.wikipedia.org/wiki/Mouthbrooder
Mouthbrooding, also known as oral incubation and buccal incubation, is the care given by some groups of animals to their offspring by holding them in the mouth of the parent for extended periods of time. Although mouthbrooding is performed by a variety of different animals, such as the Darwin's frog, fish are by far the most diverse mouthbrooders. Mouthbrooding has evolved independently in several different families of fish. Mouthbrooding behaviour Paternal mouthbrooders are species where the male looks after the eggs. Paternal mouthbrooders include the arowana, various mouthbrooding bettas and gouramies such as Betta pugnax, and sea catfish such as Ariopsis felis. Among cichlids, paternal mouthbrooding is relatively rare, but is found among some of the tilapiines, most notably the black-chin tilapia Sarotherodon melanotheron. In the case of the maternal mouthbrooders, the female takes the eggs. Maternal mouthbrooders are found among both African and South American cichlids. African examples are the haplochromines, such as the mbuna, Astatotilapia burtoni, and the dwarf mouthbrooders Pseudocrenilabrus multicolor, and some of the tilapiines, such as Oreochromis mossambicus and Oreochromis niloticus. The South American maternal mouthbrooders are all members of the subfamily Geophaginae (commonly known as "eartheaters" on account of their substrate-sifting feeding mode) such as Gymnogeophagus balzanii and Geophagus steindachneri. Biparental mouthbrooding occurs where both parents take some of the eggs. This is relatively rare, but is found among the cichlid genus Xenotilapia, and a single catfish, the spatula-barbled catfish (Phyllonemus typus). Typically, after courtship, the male fertilises the eggs and then collects them in his mouth, holding onto them until they hatch. During this time he cannot feed. Among the maternal mouthbrooding cichlids, it is quite common (e.g., among the mbuna) for the male to fertilise the eggs only once they are in the female's mouth.
https://en.wikipedia.org/wiki/PX5%20RTOS
PX5 RTOS is a real-time operating system (RTOS) designed for embedded systems. It is implemented using the ANSI C programming language. Overview The PX5 RTOS, created by William Lamie, is an embedded real-time operating system (RTOS) that was launched in January 2023. Lamie, who also developed other RTOSes such as Nucleus RTX, Nucleus PLUS, and ThreadX (acquired by Microsoft), currently serves as the President and CEO of PX5, an embedded software company headquartered in San Diego, California, United States. Among these RTOSes, approximately 10 billion devices are operated by the ThreadX RTOS, while the Nucleus RTOS is used in around 3 billion devices. The name PX5 is an abbreviation where P stands for POSIX threads, X stands for thread switching, and 5 represents fifth generation RTOS. Written in ANSI C, the PX5 RTOS is compatible with various embedded microcontroller unit (MCU) and memory protection unit (MPU) architectures. It has minimal resource requirements, needing less than 1KB of FLASH and 1KB of RAM for basic operations on microcontrollers. One of the notable features of the PX5 RTOS is its native support for POSIX Threads (pthreads), which is an industry-standard API often absent in many other RTOS solutions. Additionally, it offers real-time extensions such as event flags, fast queues, tick timers, and memory management. The PX5 RTOS executes most API calls and context switches in less than a microsecond on typical 32-bit microcontrollers. It is also deterministic - ensuring predictable processing for each API and context switch regardless of the number of active threads. The PX5 RTOS incorporates Pointer/Data Verification (PDV) technology, which verifies function return addresses, function pointers, system objects, global data, memory pools, and more. Supported platforms PX5 RTOS supports most of the embedded MCU and MPU architectures, including ARM's Cortex-M, Cortex-R, Cortex-A, and RISC-V architecture families. It supports both 32-bit and 64-b
https://en.wikipedia.org/wiki/CA%20Anti-Spyware
CA Anti-Spyware is a spyware detection program distributed by CA, Inc. Until 2007, it was known as PestPatrol. This product is now offered by Total Defense, Inc. and has been named Total Defense Anti-Virus. History PestPatrol, Inc. was a Carlisle, PA based software company founded by Dr. David Stang and Robert Bales, which developed PestPatrol and released its first version in 2000. Originally called SaferSite, the company changed its name in 2002 to better reflect the focus of the company. PestPatrol was an anti-malware product, designed to protect a computer system against threats such as adware, spyware and viruses. It performed automated scans of a system's hard disks, Windows registry and other crucial system areas, and enabled manual scans for specific threats, selected from a very long list of known malicious software. Among its unique features were CookiePatrol, which purges spyware cookies, and KeyPatrol, which detects keyloggers. Unlike most anti-spyware programs designed for home use on a single desktop, PestPatrol also provided a solution for the network environments found in enterprises. Among the features that made it appealing for enterprise security administrators was the ability to manage networked desktops remotely. Early versions of the product were criticized for the poor user interface, described alternatively as something that "looks like an application that was ported from OS/2, with unclear buttons" or a "clunky, text-based UI", but the reviewers praised its malware detection and removal capabilities, stating "PestPatrol is the most effective anti-spyware system - short of a switch to Linux - that we've ever used". It was described by InfoWorld as "one of the most established brands in anti-spyware", and in 2002, it was selected as "Security product of year" by Network World, which cited its ability to detect and remove more than 60,000 types of malware, and its defenses against Remote Administration Tools (RATs). Billing itself as t
https://en.wikipedia.org/wiki/CARNET
CARNET (Croatian Academic and Research Network, ) is the national research and education network of Croatia. It is funded from the government budget and it operates from offices in Zagreb and five other cities. CARNET was established in 1991 as a project of the Ministry of Science and Technology of the Republic of Croatia. In March 1995 the Government of the Republic of Croatia passed the Decree on founding of the CARNET institution with the purpose of facilitating progress of individuals, as well as of the society as a whole, through the use of new information technologies. CARNET's activities can be divided in three basic areas: Internet service provision, encouragement of information society development and education for the new era. History The institution A body responsible for coordinating the establishment of the Croatian educational computer network has been established on 3 October 1991. That was the beginning of the work of the Croatian Academic and Research Network - CARNET, the first Internet Service Provider (ISP) in Croatia. In the several years that followed CARNET was the only Internet service provider in Croatia, providing the service free of charge, not only to the academic community, but to all citizens of the Republic of Croatia as well. In November 1992 the first international communication connection was established, which connected CARNET Internet exchange point in Zagreb to Austria. By that act Croatia became a part of the world computer network – the Internet. During 1992, the first equipment was procured and the backbone of the CARNET network was built. Institutions in Croatia were connected at the speed of 19 - 200 kbit/s, while the whole network was connected to the Internet through Austria at the speed of 64 kbit/s. The first institutions to be connected to the Internet were the University Computing Centre - SRCE, the Faculty of Electrical Engineering and Computing in Zagreb, the Ruđer Bošković Institute, the Faculty of Science, th
https://en.wikipedia.org/wiki/NuSMV
In computer science, NuSMV is a reimplementation and extension of the SMV symbolic model checker, the first model checking tool based on binary decision diagrams (BDDs). The tool has been designed as an open architecture for model checking. It is aimed at reliable verification of industrially sized designs, for use as a backend for other verification tools and as a research tool for formal verification techniques. NuSMV has been developed as a joint project between ITC-IRST ( in Trento), Carnegie Mellon University, the University of Genoa and the University of Trento. NuSMV 2, version 2 of NuSMV, inherits all the functionalities of NuSMV. Furthermore, it combines BDD-based model checking with SAT-based model checking. It is maintained by Fondazione Bruno Kessler, the successor organization of ITC-IRST. Functionalities NuSMV supports the analysis of specifications expressed in CTL and LTL. It can be run in batch mode, or interactively with a textual user interface. Running NuSMV Interactively The interaction shell of NuSMV is activated from the system prompt as follows: [system_prompt]$ NuSMV -int NuSMV> go NuSMV> NuSMV first tries to read and execute commands from an initialization file if such file exists and is readable unless -s was passed on the command line. File master.nusmvrc is looked for in the directories defined in environment variable NUSMV_LIBRARY_PATH or in the default library path if no such variable is defined. If no such file exists, user's home directory and the current directory will also be checked. Commands in the initialization file are executed consecutively. When the initialization phase is completed the NuSMV shell prompt is displayed and the system is now ready to execute user commands. A NuSMV command usually consists of a command name and arguments to the invoked command. It is possible to make NuSMV read and execute a sequence of commands from a file, through the command line option -source: [system_prompt]$ NuSMV -source cmd_fil
https://en.wikipedia.org/wiki/Outline%20of%20aerospace
The following outline is provided as an overview of and topical guide to the aerospace field: Aerospace – comprises the atmosphere of Earth and surrounding space. Typically the term is used to refer to the aerospace industry, which researches, designs, manufactures, operates, and maintains vehicles moving through air and space. The aerospace field is diverse, with a multitude of commercial, industrial, and military applications. Essence of aerospace Aerospace Aircraft Atmosphere Geocentric orbit Space Spacecraft Aerospace industries and applications Air transport Aerospace manufacturing Space exploration Subdisciplines of the aerospace field General aviation Aeronautics Astronautics Aerospace engineering Aerospace organizations Space agencies NASA ESA Canadian Space Agency Indian Space Research Organization Russian Federal Space Agency (RKA) China National Space Administration Iranian Space Agency German Aerospace Center United Kingdom Space Agency Aerospace companies Aerospace manufacturers Airbus Boeing Bombardier Aerospace Embraer Lockheed Martin Northrop Grumman Air transport companies Lists of airlines Aerospace schools List of aerospace engineering schools History of aerospace History of aerospace Timeline of aviation Timeline of space exploration Discovery and exploration of the Solar System Timeline of Solar System exploration Wright brothers, Kittyhawk, Wright Glider Vergeltungswaffe V-1 flying bomb V-2 rocket List of V-2 test launches List of V-2 launches in the United States Project Vanguard Sputnik, Sputnik crisis Space race Operation Paperclip List of communications satellite firsts Apollo program List of Proton launches List of Thor and Delta launches List of R-7 launches List of Falcon 1 launches List of NRO Launches List of Atlas launches List of Long March launches List of Black Brant launches List of Titan launches List of Ariane launches List of GPS satellite launches Skylab
https://en.wikipedia.org/wiki/Rocky%20%28bear%29
Rocky (b. 1953) was a parachuting Asian black bear. She was purchased from a Kumamoto zoo to serve as a mascot for the U.S. 187th Airborne Regimental Combat Team during the Korean War. She completed five parachute jumps, earning her parachutist badge. After sustaining injuries during an artillery attack, she was awarded a Purple Heart. After she was discharged, Rocky was shipped to the United States where she was a guest on the television program Zoo Parade. She lived out the remainder of her life at the Lincoln Park Zoo in Chicago. Early life and paratrooping Rocky was born on 1 April 1953 in Hokkaido. She lived briefly at a zoo in Kumamoto, Japan. Members of the U.S. 187th Airborne Regimental Combat Team's AAA Battery were stationed in Kumamoto during the Korean War. They decided they needed a mascot for the regiment and purchased the cub from the zoo for (approximately $111). She was originally named Rakkasan, or "Rocky-San", which was a nickname for the regiment and the Japanese word for parachute (). Rocky served as the mascot for the battalion and was taken along on parachute jumps. She was "encouraged" to jump five times, including one assisted jump, meeting the qualifications for designation as a paratrooper and earning her parachutist badge. Rocky had a special parachute harness, but was a reluctant paratrooper. For her first jump, just two months after leaving the zoo, she was placed in the kit bag of Gene Castle. On her next jump, out of a C-119, she bit three soldiers before the jumpmaster eventually pushed her out. On her fourth jump, she chewed the toe off of the boot of a paratrooper who was forcing her out of the plane. The 187th was stationed in Korea for four months in the summer of 1953. Rocky was outside of the mess hall when the AAA Battery came under artillery fire, Rocky was hit underneath the chin by shell fragments. She received a Purple Heart. She also received a Korean Service Medal. Despite her accolades, she bit several soldiers, sh
https://en.wikipedia.org/wiki/Synthetic%20exosome
Exosomes are small vesicles secreted by cells that play a crucial role in intercellular communication. They contain a variety of biomolecules, including proteins, nucleic acids and lipids, which can be transferred between cells to modulate cellular processes. Exosomes have been increasingly acknowledged as promising therapeutic tool and delivery platforms due to unique biological properties. Biocompatibility: Exosomes are naturally occurring particles in body, which makes them highly biocompatible and less likely to activate immune response. Targeting ability: Exosomes are assembled to express specific proteins or peptides, allowing them to target specific cells or tissues. Natural cargo carries: Exosomes can naturally transport a variety of biomolecules, including proteins, RNA and DNA, which can be used for therapeutic purposes. However, due to exosomes being small in size (30-150 nm), present in various biological fluids (such as blood, urine, saliva), sensitivity to environmental factors (such temperature, pH), complexity of drug loading efficiency, there are challenges associated with isolation, purification, delivery and drug payload. While application of exosomes is still in its early stages, approaches are being explored to produce exosome-like nanovesicles (ELNs or artificial exosomes) to overcome these challenges. ELNs are a type of engineered exosomes designed to modify the structure and enhance the function of natural exosomes. The content of ELNs can be highly-customized to match with various medical needs, allowing for more precise control over their properties compared to natural exosomes. Additionally, ELNs can be modified with selectively expressed functional groups on the surface to enhance its targeting and uptake by cells or tissues. For example, ELNs can be engineered to enhance their stability in fluids, to target specific cell types, such ascytosol of brain cells. Further, ELNs could consistently deliver cargo mRNA with therapeutic cata
https://en.wikipedia.org/wiki/California%20Native%20Plant%20Society
The California Native Plant Society (CNPS) is a California environmental non-profit organization (501(c)3) that seeks to increase understanding of California's native flora and to preserve it for future generations. The mission of CNPS is to conserve California native plants and their natural habitats, and increase understanding, appreciation, and horticultural use of native plants throughout the entire state and California Floristic Province. History California Native Plant Society was founded in 1965 by professional botanists and grassroots activists who, after saving an important native plant garden in Berkeley's Tilden Regional Park, were inspired to create an ongoing organization with the mission to save and promote the native plants of California. Structure For 50 years, professional CNPS staff and volunteers have worked alongside scientists, government officials, and regional planners to protect habitats and species, and to advocate for well-informed environmental practices, regulations, and policies. The organization works at the local level through the various regional chapters, and at the state level through its five major programs, board of directors, Chapter Council, and state office. CNPS continues to be a grassroots organization, with nearly 10,000 members and volunteers in 35 chapters covering the state of California and northwest Baja California. Chapter volunteers promote CNPS’s mission to conserve California’s native plants and their natural habitats, and to increase the horticultural uses of native plants at the local level. Membership is open to everyone, and chapter activities ranging from field trips, restoration activities, meetings, symposia, public garden maintenance, plant sales, and more are open to the public. At the state organizational level, CNPS has five core programs in Conservation, Rare Plant Science, Vegetation Science, Education, and Horticulture. Each program has dedicated CNPS staff supported by volunteer committees consist
https://en.wikipedia.org/wiki/Humu%20%28software%29
Humu is a software company that uses machine learning to send "nudges," small recommendations based in nudge theory, to employees at work. History Humu was founded in May 2017 by former Google executives Laszlo Bock, Wayne Crosby, and Jessie Wisdom. Before founding Humu, Laszlo Bock served as Google's original Head of People Operations. Humu exited stealth mode in October 2018 with $40 million in funding. Humu analyzes company data and employee feedback to identify changes likely to improve employees' happiness, performance, and retention. The platform then delivers "nudges," short messages urging users to change their behavior. The company holds a trademark on "Nudge Engine," based on the behavioral economics concept of nudge theory from Nobel Prize-winning economist Richard Thaler and popularized in Thaler's 2008 book Nudge, co-authored with legal scholar Cass R. Sunstein. The book argues that small cues can help people make better choices. Notable customers include Fidelity Investments, Silicon Valley Bank, Lumen, Farfetch, and American fast casual restaurant chain Sweetgreen. A 2019 trademark dispute between Humu and American video streaming service Hulu was settled in federal court. On June 24, 2021, Humu announced Humu Business Edition, a personal coach for mid-sized businesses. Funding In May 2019, Humu announced it had raised $40 million in series A and B funding led by Index Ventures and IVP. See also Captology
https://en.wikipedia.org/wiki/Materials%20Research%20Bulletin
Materials Research Bulletin is a peer-reviewed, scientific journal that covers the study of materials science and engineering. The journal is published by Elsevier and was established in 1966. The Editor-in-Chief is Rick Ubic. The journal focuses on the development and understanding of materials, including their properties, structure, and processing, and the application of these materials in various fields. The scope of the journal includes the following areas: ceramics, metals, polymers, composites, electronic and optical materials, and biomaterials. Materials Research Bulletin features original research articles, review articles, and short communications. Abstracting and indexing The journal is abstracted and indexed for example in: Materials Science Citation Index Chemical Abstracts Cambridge Scientific Abstracts Scopus Web of Science According to the Journal Citation Reports, the journal has a 2021 impact factor of 5.6.
https://en.wikipedia.org/wiki/International%20Centre%20for%20Mathematical%20Sciences
The International Centre for Mathematical Sciences (ICMS) is a mathematical research centre based in Edinburgh. According to its website, the centre is "designed to bring together mathematicians and practitioners in science, industry and commerce for research workshops and other meetings." The centre was jointly established in 1990 by the University of Edinburgh and Heriot-Watt University, under the supervision of Professor Elmer Rees, with initial support from Edinburgh District Council, the Scottish Development Agency and the International Centre for Theoretical Physics. In April 1994 the Centre moved to 14 India Street, Edinburgh, the birthplace of James Clerk Maxwell and home of the James Clerk Maxwell Foundation. In 2010 it was relocated to 15 South College Street to accommodate larger events. As of 2020, the ICMS is located within the newly established Bayes centre. The current scientific director (appointed in 2016) is Professor Paul Glendinning. The ICMS is a member of the European Mathematical Society. Premises From April 1994, the Centre rented from the James Clerk Maxwell Foundation accommodation at 14, India Street, the birthplace of James Clerk Maxwell. Increased activity necessitated removal in 2010 to a converted church in South College Street, and then in 2018 to its present location in the nearby Bayes Centre of the University of Edinburgh. See also Edinburgh Mathematical Society Isaac Newton Institute, Cambridge
https://en.wikipedia.org/wiki/Louis%20Annin%20Ames
Louis Annin Ames (1866–1952) was an American flagmaker. From 1896 to 1952 he served as chief executive officer of Annin & Co. In 1915 he designed the flag of the City of New York. He was a member of the Ames family. Biography Louis Annin Ames was born on Saint Helena Island, South Carolina on September 5, 1866. He married Abby Whitney Crowell on January 20, 1909, and they had two children. He died at his home in Essex Fells, New Jersey on November 28, 1952. He was buried at Kensico Cemetery in Valhalla, New York.
https://en.wikipedia.org/wiki/Pauli%E2%80%93Lubanski%20pseudovector
In physics, the Pauli–Lubanski pseudovector is an operator defined from the momentum and angular momentum, used in the quantum-relativistic description of angular momentum. It is named after Wolfgang Pauli and Józef Lubański, It describes the spin states of moving particles. It is the generator of the little group of the Poincaré group, that is the maximal subgroup (with four generators) leaving the eigenvalues of the four-momentum vector invariant. Definition It is usually denoted by (or less often by ) and defined by: where is the four-dimensional totally antisymmetric Levi-Civita symbol; is the relativistic angular momentum tensor operator (); is the four-momentum operator. In the language of exterior algebra, it can be written as the Hodge dual of a trivector, Note , and Where is the generator of rotations and is the generator of boosts. evidently satisfies as well as the following commutator relations, Consequently, The scalar is a Lorentz-invariant operator, and commutes with the four-momentum, and can thus serve as a label for irreducible unitary representations of the Poincaré group. That is, it can serve as the label for the spin, a feature of the spacetime structure of the representation, over and above the relativistically invariant label for the mass of all states in a representation. Little group On an eigenspace of the 4-momentum operator with 4-momentum eigenvalue of the Hilbert space of a quantum system (or for that matter the standard representation with interpreted as momentum space acted on by 5×5 matrices with the upper left 4×4 block an ordinary Lorentz transformation, the last column reserved for translations and the action effected on elements (column vectors) of momentum space with appended as a fifth row, see standard texts) the following holds: The components of with replaced by form a Lie algebra. It is the Lie algebra of the Little group of , i.e. the subgroup of the homogeneous Lorentz group that leave
https://en.wikipedia.org/wiki/Miraitowa%20and%20Someity
Miraitowa () is the official mascot of the 2020 Summer Olympics, and Someity () is the official mascot of the 2020 Summer Paralympics. The events were held in Tokyo, Japan, in 2021. The checkered design on both mascots was inspired by the ichimatsu moyo pattern of the Tokyo 2020 official logo, while Someity's pink design was inspired by cherry blossoms. Both fictional characters have various superpowers, such as teleportation. Created by Japanese artist Ryo Taniguchi, the mascots were selected from a competitive process that took place in late 2017 and early 2018. A total of 2,042 candidate designs were submitted to the Tokyo 2020 Organising Committee, which then selected three pairs of unnamed mascot designs from the batch to present to Japanese elementary school students for the final decision. The results of the selection were announced on 28 February 2018, and the mascots were named on 22 July 2018. Miraitowa is named after the Japanese words for and , and Someity is named after someiyoshino (ソメイヨシノ), a type of cherry blossom. Someity's name also echoes the English phrase "so mighty". The mascots helped financing the Tokyo Games through merchandising and licensing deals. History Selection and naming process In late 2017 and early 2018, the Tokyo 2020 Organising Committee held a competition to determine the design of the 2020 mascots. A total of 2,042 design submissions were accepted between 1 August and 14 August 2017. The entries were then subjected to a series of format and design examinations led by media specialists and the Organising Committee's Mascot Selection Panel to determine whether they "would appeal to elementary school-aged children" and whether they "amply reflected the spirit of the Tokyo 2020 Games Vision". By mid-October 2017, this process reduced the pool to a shortlist of three sets of mascot candidates, which were unveiled on 7 December 2017. Each set included two mascots: one for the Olympic Games and the other for the Paralympic Gam
https://en.wikipedia.org/wiki/Mks%20vir
mks_vir (formerly: MkS_Vir) is a Polish antivirus program, created by Marek Sell in 1987. The original reason for creation of this software was that the solutions existing on the market these times did not satisfy the author's needs. The first versions for DOS were distributed on floppy disks by Apexim, the company in which Marek Sell worked. The updates were issued monthly and sent by mail. Initially, the software delivered to the users was personalized – the main screen contained the serial number and the data of the license owner. Despite that, the program was often used without license and its popularity can be confirmed by appearing Trojan horses, impersonating program updates, which were not issued yet. Later, together with the full version of the software, demo versions were issued, which allowed to use the program for a week. For educational reasons, the program contained descriptions of operation of some viruses (including demonstrations of their graphical and sound effects) and, from the 3.99 version, a lexicon of the viruses popular in Poland. In 1996, it became the winner of the third edition of the Teraz Polska contest. In 1996, the MKS company, founded by Marek Sell, became the developer of the program. A website of the program and a BBS were created. The company continued the development of the program after the death of the author in 2004. Versions for Microsoft Windows and Unix were created. An online scanner, based on the ActiveX technology, became available on the software website. After the bankruptcy of the MKS company, in 2011, the property receiver sold the rights to the mks_vir trademark to the ArcaBit company, set up a few years earlier by the former MKS employees. It reactivated the mks_vir product as a free antivirus application. Officially, the ArcaBit company resigned from the distribution and the support for the software on 2014, March 1. Although they released a brand new version during May 2018. Some of the program versions: 3.1
https://en.wikipedia.org/wiki/Votive%20ship
A votive ship, sometimes called a church ship, is a ship model displayed in a church. As a rule, votive ships are constructed and given as gifts to the church by seamen and ship builders. Votive ships are relatively common in churches in the Nordic countries Denmark, Sweden, Norway and Finland, as well as on Åland and Faroe islands, but are known also to exist in Germany, the United Kingdom and Spain. The practice of displaying model ships in churches stems from the Middle Ages and appears to have been known throughout Christian Europe, in both Catholic and Lutheran countries. The oldest known remaining votive ship is a Spanish ship model from the 15th century. A model ship originally displayed in Stockholm Cathedral but today in the Stockholm Maritime Museum dating from circa 1590 is the oldest surviving example in the Nordic countries. Votive ships are quite common in France, in coastal towns (and in some inland ones as well) either as model ships (generally made by sailors after escaping a shipwreck ) or as paintings (generally depicting some awkward situation) they are known under the Latin term of Ex-Voto (made after a vow). The church of Sainte Anne d'Auray in Brittany has the biggest French collection of marine ex-votos, but the practice even extends to the Mediterranean French shores, including Corsica.
https://en.wikipedia.org/wiki/Laurie%20Williams%20%28software%20engineer%29
Laurie Williams is an American software engineer known for her writings on pair programming and agile software development. She is a distinguished professor of computer science at North Carolina State University, and interim head of the Department of Computer Science at North Carolina State University. Education and career Williams graduated from Lehigh University in 1984, with a bachelor's degree in industrial engineering. After earning an M.B.A. from Duke University in 1990, she completed a Ph.D. at the University of Utah in 2000. Her dissertation, The Collaborative Software Process, was supervised by Robert R. Kessler. She joined the North Carolina State University in 2000, and was named a distinguished professor in 2018. Books With Robert R. Kessler, Williams is the author of the book Pair Programming Illuminated (Addison-Wesley, 2002). With Michele Marchesi, Giancarlo Succi, and James Donovan Wells, she is an author of Extreme Programming Perspectives (Addison-Wesley, 2003). Recognition In 2009, Williams became one of the two inaugural winners of the ACM SIGSOFT Influential Educator Award, for her work on pair programming in computer science education. In 2018, Williams was elected as a Fellow of the IEEE "for contributions to reliable and secure software engineering".
https://en.wikipedia.org/wiki/A.J.%20Han%20Vinck
Adrianus Johannes "Han" Vinck (born 15 May 1949, in Breda) is a Dutch computer scientist. He serves as senior professor in Digital Communications at the University of Duisburg-Essen, Germany, since September 2014. He is a member of the digital signal processing group at the electrical engineering Department. His interest is in Information and Communication theory, Coding and Network aspects in digital communications. He is the author of the textbook Coding Concepts and Reed-Solomon Codes. Early life He earned a PhD at Eindhoven University, the Netherlands (Syndrome Decoding of Convolutional Codes, supervisor: J.P.M. Schalkwijk). Academic positions Visiting scientist at the German Aerospace Center in Oberpfaffenhofen, Germany (1986) Full professor in Digital Communications at the University of Duisburg-Essen, Germany (Institute for Experimental Mathematics) (1990-2014) Director of the Post-Graduate School on Networking, "CINEMA" (1997-1999) Chairman of the Benelux Information and Communication Society (WIC) (1998-2001) Chairman for the communication division of the Institute for Critical Infrastructures, CRIS (2000-2004) Adjunct professor at the Sun Yat-Sen University in Kaohsiung, Taiwan (2003) Visiting professor at the University of Johannesburg, South Africa (2010-2012) Consultant professor at the Harbin Institute of Technology, Harbin, China (2011) Director of the Institute for Experimental Mathematics in Essen Adjunct professor at the National Cheng Kung University Tainan, Taiwan (2014 -2015) Honorary professor at the University of Johannesburg, South Africa (2014 -2015) President of the Leibniz foundation. This foundation supports research and education in the field of Information theory, Neurosciences and Biology. (2014-) Professional activities In 1990 Vinck organized the IEEE Information Theory workshop in Veldhoven, the Netherlands. He served on the Board of Governors of the IEEE Information Theory Society from 1997-2006. Vinck is the fo
https://en.wikipedia.org/wiki/Duffing%20map
The Duffing map (also called as 'Holmes map') is a discrete-time dynamical system. It is an example of a dynamical system that exhibits chaotic behavior. The Duffing map takes a point (xn, yn) in the plane and maps it to a new point given by The map depends on the two constants a and b. These are usually set to a = 2.75 and b = 0.2 to produce chaotic behaviour. It is a discrete version of the Duffing equation.
https://en.wikipedia.org/wiki/Ability
Abilities are powers an agent has to perform various actions. They include common abilities, like walking, and rare abilities, like performing a double backflip. Abilities are intelligent powers: they are guided by the person's intention and executing them successfully results in an action, which is not true for all types of powers. They are closely related to but not identical with various other concepts, such as disposition, know-how, aptitude, talent, potential, and skill. Theories of ability aim to articulate the nature of abilities. Traditionally, the conditional analysis has been the most popular approach. According to it, having an ability means one would perform the action in question if one tried to do so. On this view, Michael Phelps has the ability to swim 200 meters in under 2 minutes because he would do so if he tried to. This approach has been criticized in various ways. Some counterexamples involve cases in which the agent is physically able to do something but unable to try, due to a strong aversion. In order to avoid these and other counterexamples, various alternative approaches have been suggested. Modal theories of ability, for example, focus on what is possible for the agent to do. Other suggestions include defining abilities in terms of dispositions and potentials. An important distinction among abilities is between general abilities and specific abilities. General abilities are abilities possessed by an agent independent of their situation while specific abilities concern what an agent can do in a specific situation. So while an expert piano player always has the general ability to play various piano pieces, they lack the corresponding specific ability in a situation where no piano is present. Another distinction concerns the question of whether successfully performing an action by accident counts as having the corresponding ability. In this sense, an amateur hacker may have the effective ability to hack his boss's email account, because the
https://en.wikipedia.org/wiki/Extended%20supersymmetry
In theoretical physics, extended supersymmetry is supersymmetry whose infinitesimal generators carry not only a spinor index , but also an additional index where is integer (such as 2 or 4). Extended supersymmetry is also called , supersymmetry, for example. Extended supersymmetry is very important for analysis of mathematical properties of quantum field theory and superstring theory. The more extended supersymmetry is, the more it constrains physical observables and parameters. See also Supersymmetry algebra Harmonic superspace Projective superspace Supersymmetry
https://en.wikipedia.org/wiki/Polysporangiophyte
Polysporangiophytes, also called polysporangiates or formally Polysporangiophyta, are plants in which the spore-bearing generation (sporophyte) has branching stems (axes) that bear sporangia. The name literally means 'many sporangia plant'. The clade includes all land plants (embryophytes) except for the bryophytes (liverworts, mosses and hornworts) whose sporophytes are normally unbranched, even if a few exceptional cases occur. While the definition is independent of the presence of vascular tissue, all living polysporangiophytes also have vascular tissue, i.e., are vascular plants or tracheophytes. Extinct polysporangiophytes are known that have no vascular tissue and so are not tracheophytes. Early polysporangiophytes History of discovery Paleobotanists distinguish between micro- and megafossils. Microfossils are primarily spores, either single or in groups. Megafossils are preserved parts of plants large enough to show structure, such as stem cross-sections or branching patterns. Dawson, a Canadian geologist and paleobotanist, was the first to discover and describe a megafossil of a polysporangiophyte. In 1859 he published a reconstruction of a Devonian plant, collected as a fossil from the Gaspé region of Canada, which he named Psilophyton princeps. The reconstruction shows horizontal and upright stem-like structures; no leaves or roots are present. The upright stems or axes branch dichotomously and have pairs of spore-forming organs (sporangia) attached to them. Cross-sections of the upright axes showed that vascular tissue was present. He later described other specimens. Dawson's discoveries initially had little scientific impact; Taylor et al. speculate that this was because his reconstruction looked very unusual and the fossil was older than was expected. From 1917 onwards, Robert Kidston and William H. Lang published a series of papers describing fossil plants from the Rhynie chert – a fine-grained sedimentary rock found near the village of Rhynie, Ab
https://en.wikipedia.org/wiki/Great%20cardiac%20vein
The great cardiac vein (left coronary vein) is a vein of the heart. It begins at the apex of the heart and ascends along the anterior interventricular sulcus before joining the oblique vein of the left atrium to form the coronary sinus upon the posterior surface of the heart. Anatomy Course The great cardiac vein ascends along the anterior interventricular sulcus to the base of the ventricles. It then curves around the left margin of the heart to reach the posterior surface. Fate Upon reaching the posterior surface of the heart, the great cardiac vein merges with the oblique vein of the left atrium to form the coronary sinus. At the junction of the great cardiac vein and the coronary sinus, there is typically a valve present. This is the Vieussens valve of the coronary sinus. Tributaries The great cardiac vein receives tributaries from the left atrium and from both ventricles: one, the left marginal vein, is of considerable size, and ascends along the left margin of the heart.
https://en.wikipedia.org/wiki/Metaviridae
Metaviridae is a family of viruses which exist as Ty3-gypsy LTR retrotransposons in a eukaryotic host's genome. They are closely related to retroviruses: members of the family Metaviridae share many genomic elements with retroviruses, including length, organization, and genes themselves. This includes genes that encode reverse transcriptase, integrase, and capsid proteins. The reverse transcriptase and integrase proteins are needed for the retrotransposon activity of the virus. In some cases, virus-like particles can be formed from capsid proteins. Some assembled virus-like particles of members of the family Metaviridae can penetrate and infect previously uninfected cells. An example of this is the gypsy, a retroelement found in the Drosophila melanogaster genome. The ability to infect other cells is determined by the presence of the retroviral env genes which encode coat proteins. Metaviridae is a family of retrotransposons found in all eukaryotes known and studied. Viruses of this family proliferate through intermediates called virus-like particles known for their ability to induce mutations and genome sequencing. Members of the family Metaviridae are often referred to as LTR-retrotransposons of the Ty3-gypsy family. Among the members are only species that produce intracellular particles, the collection of these particles is heterogeneous. Extracellular particles are surrounded by oval nuclei and are called virions. In many systems, virions are characterized biochemically. Genomes of retrotransposons in this family are positive strand RNAs. In addition to the RNA genome, some cellular RNAs can be randomly associated with particles, including specific tRNAs, in case of virus replication prepared by tRNAs. Particle fractions from cells are heterogeneous relative to maturation and are therefore associated with intermediate transcriptions and reverse transcription products in addition to genomic RNA. When it comes to virion producing members, it appears that the viri
https://en.wikipedia.org/wiki/Indigenous%20horticulture
Indigenous horticulture is practised in various ways across all inhabited continents. Indigenous refers to the native peoples of a given area and horticulture is the practice of small-scale intercropping. Africa North Africa In North Africa, one such example is the farming practices of the Eggon, a Nigerian hill farming community. The Eggon live in the Mada hills, between Lafia and Akwanga. The hills lay between two rivers, the Mada and Arikya. The altitude helps crops retain moisture on the hills, due to early morning mists and fogs; this also makes for earlier and longer crop cultivation. They practice bush fallow agriculture as well as mixed farming land management styles. They focus on growing yams, cassava, maize, beans, and African rice; much of what is produced is exported as a cash crop and is their primary source of cash income. The Eggon use a terraced agricultural system to maximize space on the hills. The goats they raise are kept mostly for fertilizers used in farming. They are only killed on special occasions, such as weddings. The Eggon use the diversity in their environment to maximize their crop production. West Africa In West Africa, the Kissidougou live on the savannah, dotted by dense areas of "forest islands" created by them. The Kissidougou practice intercropping within the forested areas. However, they also operate farms maintained on slopes or plateaus located between the forest islands. They prepare the savannah lands for forestation through farming and burning of the grasses to fertilize the soils. The Kissidougou graze their cattle on the savannah to help to maintain flammable grasses around the farms and the villages. The Kissidougou create diversity in their environment by farming and transforming savannah into lush, dense forest. The prevalence of wetlands in West Africa has helped to support local indigenous horticulture. Seasonal flooding of major rivers in the region, such as the Niger, the Sudd, and the Senegal, have made it pos
https://en.wikipedia.org/wiki/SdrG%20C%20terminal%20protein%20domain
In molecular biology, the protein domain SdrG C terminal refers to the C terminus domain of an adhesin found only on the cell walls of bacteria. More specifically, SdrG is only found in gram-positive bacteria. This particular domain binds to a glycoprotein named fibrinogen. SdrG stands for serine-aspartate dipeptide repeats, which as its name suggests, contains repeats of two amino acids, serine and aspartate. Gram-positive pathogens such as Staphylococci, Streptococci, and Enterococci, contain SdrG anchored to their cell walls; these proteins act as adhesins and help the bacteria adhere to the host tissues via a dock-lock-latch mechanism. This protein domain is of huge significance since it binds to fibrinogen, a glycoprotein involved in important processes such as haemostasis and coagulation. By understanding more about the way they attach to human cells, it is hope a therapeutic target can be developed to prevent diseases such as nosocomial sepsis which are caused by a bacterium which operates in this manner. Function SdrG protein function SdrG protein is a bacterial cell wall-anchored adhesion and its function is to adhere to human cells. It does this by binding to the Beta chain of human fibrinogen which is found in the extracellular matrix. Such adhesins have also been named MSCRAMMs which is short for microbial surface components recognizing adhesive matrix molecules. SdrG C-terminal domain function The C-terminal domain is responsible for the attachment of the protein to the attachment of the protein to the cell wall. Mechanism SdrG binds to its ligand with a dynamic "dock, lock, SdrG, the ligand binding site has been further localized and latch" mechanism. When it does bind to fibrinogen, it binds and forms an immunoglobin fold. SdrG as an apoprotein and in complex ligand binding activity peptide analogous to its binding site in Fg. Structure The whole SdrG protein contains two domains, a N-terminal one named N2 domain and the C-terminal one name
https://en.wikipedia.org/wiki/1/2%20%2B%201/4%20%2B%201/8%20%2B%201/16%20%2B%20%E2%8B%AF
In mathematics, the infinite series is an elementary example of a geometric series that converges absolutely. The sum of the series is 1. In summation notation, this may be expressed as The series is related to philosophical questions considered in antiquity, particularly to Zeno's paradoxes. Proof As with any infinite series, the sum is defined to mean the limit of the partial sum of the first terms as approaches infinity. By various arguments, one can show that this finite sum is equal to As approaches infinity, the term approaches 0 and so tends to 1. History Zeno's paradox This series was used as a representation of many of Zeno's paradoxes. For example, in the paradox of Achilles and the Tortoise, the warrior Achilles was to race against a tortoise. The track is 100 meters long. Achilles could run at 10 m/s, while the tortoise only 5. The tortoise, with a 10-meter advantage, Zeno argued, would win. Achilles would have to move 10 meters to catch up to the tortoise, but the tortoise would already have moved another five meters by then. Achilles would then have to move 5 meters, where the tortoise would move 2.5 meters, and so on. Zeno argued that the tortoise would always remain ahead of Achilles. The Dichotomy paradox also states that to move a certain distance, you have to move half of it, then half of the remaining distance, and so on, therefore having infinitely many time intervals. This can be easily resolved by noting that each time interval is a term of the infinite geometric series, and will sum to a finite number. The Eye of Horus The parts of the Eye of Horus were once thought to represent the first six summands of the series. In a myriad ages it will not be exhausted A version of the series appears in the ancient Taoist book Zhuangzi. The miscellaneous chapters "All Under Heaven" include the following sentence: "Take a chi long stick and remove half every day, in a myriad ages it will not be exhausted." See also 0.999... 1/2 − 1/4
https://en.wikipedia.org/wiki/Propachlor
Propachlor (2-chloro-N-isopropylacetanilide) is an herbicide first marketed by Monsanto. It was registered for use in the United States during 1965. The preparation acts on annual grasses and on some broadleaf weeds and was briefly sold in the UK as a germination inhibitor under the name Murphy Covershield. Between 1987 and 1996, about 2.1 million pounds of its active ingredient were used in the United States. 75% was applied to sorghum crops and 24% to maize. Monsanto voluntarily discontinued its manufacture in 1998. It is currently listed in the U.S. Environmental Protection Agency's Toxics Release Inventory. In 2008, the European Commission issued a decision withdrawing its approval for use as of March 18, 2009, citing the presence of its metabolites in groundwater. Propachlor was added to California's Proposition 65 list as a carcinogen in 2001. Current manufacturers It is currently being produced by Makhteshim Agan Group and Shenzhen Qinfeng Pesticides Co., Ltd.
https://en.wikipedia.org/wiki/Framework%20Computer
Framework Computer, Inc. is an American laptop manufacturer. The company positions itself as a proponent of the electronics right to repair movement, and their laptops are designed to be easy to disassemble, with replaceable parts. In November 2021, Time magazine listed the Framework Laptop on their list of the 100 Best Inventions of 2021. In March 2022, Fast Company listed the Framework Laptop on their list of the Most Innovative Companies of 2022. In October 2023, Time magazine listed the Framework Laptop 16 on their list of the 200 Best Inventions of 2023. History In January 2020, the company was founded by Nirav Patel, who was the original Head of Hardware at Oculus. In the first half of 2021, the company was funded with a $9 million seed round. YouTuber Linus Sebastian invested $225,000 in the company in September after having previously commended the 11th Gen Intel Framework Laptop 13. In January 2022, the company raised an additional $18 million of financing in a series A round, led by Spark Capital. Products Framework Laptop 13 In July 2021, Framework began fulfillment of their first product, the Framework Laptop (retroactively the Framework Laptop 13), with an 11th Gen Intel Core i5 or i7 chip to the US and Canada. In December 2021, Framework opened pre-orders to the UK, Germany and France. In February 2022, pre-ordering became available for Ireland, Austria and The Netherlands. The Framework Laptop received a 10 out of 10 in iFixit's repairability score. The standard Framework Laptop ships as a fully assembled laptop, while the Framework Laptop DIY Edition ships with the RAM, storage, operating system, and in 11th Gen, the WiFi module uninstalled. All of these modules can be ordered with the DIY edition for an additional fee, or left out and purchased separately. In May 2022, the company launched their second generation Framework Laptop with a 12th Gen Intel Core i5 or i7 chip that ships with an upgraded back panel, alongside their 12 Gen Upgrade K
https://en.wikipedia.org/wiki/Ribosomal%20L28e%20protein%20family
Ribosomal L28e protein family is a family of evolutionarily related proteins. Members include 60S ribosomal protein L28. Ribosomes are the particles that catalyse mRNA-directed protein synthesis in all organisms. The codons of the mRNA are exposed on the ribosome to allow tRNA binding. This leads to the incorporation of amino acids into the growing polypeptide chain in accordance with the genetic information. Incoming amino acid monomers enter the ribosomal A site in the form of aminoacyl-tRNAs complexed with elongation factor Tu (EF-Tu) and GTP. The growing polypeptide chain, situated in the P site as peptidyl-tRNA, is then transferred to aminoacyl-tRNA and the new peptidyl-tRNA, extended by one residue, is translocated to the P site with the aid the elongation factor G (EF-G) and GTP as the deacylated tRNA is released from the ribosome through one or more exit sites. About 2/3 of the mass of the ribosome consists of RNA and 1/3 of protein. The proteins are named in accordance with the subunit of the ribosome which they belong to - the small (S1 to S31) and the large (L1 to L44). Usually they decorate the rRNA cores of the subunits. Many of ribosomal proteins, particularly those of the large subunit, are composed of a globular, surfaced-exposed domain with long finger-like projections that extend into the rRNA core to stabilise its structure. Most of the proteins interact with multiple RNA elements, often from different domains. In the large subunit, about 1/3 of the 23S rRNA nucleotides are at least in van der Waal's contact with protein, and L22 interacts with all six domains of the 23S rRNA. Proteins S4 and S7, which initiate assembly of the 16S rRNA, are located at junctions of five and four RNA helices, respectively. In this way proteins serve to organise and stabilise the rRNA tertiary structure. While the crucial activities of decoding and peptide transfer are RNA based, proteins play an active role in functions that may have evolved to streamline the pro
https://en.wikipedia.org/wiki/Enzyme%20inhibitor
An enzyme inhibitor is a molecule that binds to an enzyme and blocks its activity. Enzymes are proteins that speed up chemical reactions necessary for life, in which substrate molecules are converted into products. An enzyme facilitates a specific chemical reaction by binding the substrate to its active site, a specialized area on the enzyme that accelerates the most difficult step of the reaction. An enzyme inhibitor stops ("inhibits") this process, either by binding to the enzyme's active site (thus preventing the substrate itself from binding) or by binding to another site on the enzyme such that the enzyme's catalysis of the reaction is blocked. Enzyme inhibitors may bind reversibly or irreversibly. Irreversible inhibitors form a chemical bond with the enzyme such that the enzyme is inhibited until the chemical bond is broken. By contrast, reversible inhibitors bind non-covalently and may spontaneously leave the enzyme, allowing the enzyme to resume its function. Reversible inhibitors produce different types of inhibition depending on whether they bind to the enzyme, the enzyme-substrate complex, or both. Enzyme inhibitors play an important role in all cells, since they are generally specific to one enzyme each and serve to control that enzyme's activity. For example, enzymes in a metabolic pathway may be inhibited by molecules produced later in the pathway, thus curtailing the production of molecules that are no longer needed. This type of negative feedback is an important way to maintain balance in a cell. Enzyme inhibitors also control essential enzymes such as proteases or nucleases that, if left unchecked, may damage a cell. Many poisons produced by animals or plants are enzyme inhibitors that block the activity of crucial enzymes in prey or predators. Many drug molecules are enzyme inhibitors that inhibit an aberrant human enzyme or an enzyme critical for the survival of a pathogen such as a virus, bacterium or parasite. Examples include methotrexate (u
https://en.wikipedia.org/wiki/Ping%20Zhang%20%28graph%20theorist%29
Ping Zhang is a mathematician specializing in graph theory. She is a professor of mathematics at Western Michigan University and the author of multiple textbooks on graph theory and mathematical proof. Zhang earned a master's degree in 1989 from the University of Jordan, working there on ring theory with Hasan Al-Ezeh. She completed her Ph.D. in 1995 at Michigan State University. Her dissertation, in algebraic combinatorics, was Subposets of Boolean Algebras, and was supervised by Bruce Sagan. After a short-term position at the University of Texas at El Paso, she joined the Western Michigan faculty in 1996. Books Zhang is the author of: Mathematical Proofs: A Transition to Advanced Mathematics (with Gary Chartrand and A. D. Polimeni, Addison-Wesley, 2002; 2nd ed., 2007; 3rd ed., 2012) Introduction to Graph Theory (with Gary Chartrand, McGraw-Hill, 2004; Chinese ed., 2006); revised as A First Course in Graph Theory (Dover, 2012) Chromatic Graph Theory (with Gary Chartrand, CRC Press, 2008) Graphs & Digraphs (by Gary Chartrand and Linda Lesniak, with Zhang added as a co-author on the 5th ed., CRC Press, 2010) Discrete Mathematics (with Gary Chartrand, Waveland Press, 2011) Covering Walks in Graphs (with Futaba Fujie, Springer, 2014) Color-Induced Graph Colorings (Springer, 2015) The Fascinating World of Graph Theory (with Arthur T. Benjamin and Gary Chartrand, Princeton University Press, 2015) A Kaleidoscopic View of Graph Colorings (Springer, 2016) How to Label a Graph (with Gary Chartrand and Cooroo Egan, Springer, 2019) She is also the co-editor of: Handbook of Graph Theory (originally edited by Jonathan L. Gross and Jay Yellen, with Zhang added as a co-editor on the 2nd ed., CRC Press, 2013)
https://en.wikipedia.org/wiki/Syringa%20%C3%97%20persica
Syringa × persica, the Persian lilac, is a hybrid, thought to originate from a cross of Syringa × laciniata and S. afghanica. More compact than common lilacs, it grows up to and spreads about . Persian lilac prefers warmer winter climates (hardiness zones 5–9) than many species of lilac. Its hybrid with S. vulgaris, the common lilac, is S. x chinensis, sometimes called Rouen lilac. This is a different plant than Melia azedarach, also sometimes called Persian lilac.
https://en.wikipedia.org/wiki/Anycast
Anycast is a network addressing and routing methodology in which a single IP address is shared by devices (generally servers) in multiple locations. Routers direct packets addressed to this destination to the location nearest the sender, using their normal decision-making algorithms, typically the lowest number of BGP network hops. Anycast routing is widely used by content delivery networks such as web and name servers, to bring their content closer to end users. Addressing methods There are four principal addressing methods in the Internet Protocol: History The first documented use of anycast routing for topological load-balancing of Internet-connected services was in 1989, the technique was first formally documented in the IETF four years later. It was first applied to critical infrastructure in 2001 with the anycasting of the I-root nameserver. Early objections Early objections to the deployment of anycast routing centered on the perceived conflict between long-lived TCP connections and the volatility of the Internet's routed topology. In concept, a long-lived connection, such as an FTP file transfer (which can take hours to complete for large files) might be re-routed to a different anycast instance in mid-connection due to changes in network topology or routing, with the result that the server changes mid-connection, and the new server is not aware of the connection and does not possess the TCP connection state of the previous anycast instance. In practice, such problems were not observed, and these objections dissipated by the early 2000s. Many initial anycast deployments consisted of DNS servers, using principally UDP transport. Measurements of long-term anycast flows revealed very few failures due to mid-connection instance switches, far fewer (less than 0.017% or "less than one flow per ten thousand per hour of duration" according to various sources) than were attributed to other causes of failure. Numerous mechanisms were developed to efficiently shar
https://en.wikipedia.org/wiki/Duodenojejunal%20flexure
The duodenojejunal flexure or duodenojejunal junction, also known as the angle of Treitz, is the border between the duodenum and the jejunum. Structure The ascending portion of the duodenum ascends on the left side of the aorta, as far as the level of the upper border of the second lumbar vertebra. At this point, it turns abruptly forward to merge with the jejunum, forming the duodenojejunal flexure. This forms the beginning of the jejunum. The duodenojejunal flexure is surrounded by the suspensory muscle of the duodenum. It is retroperitoneal, so is less mobile than the jejunum that comes after it, helping to stabilise the jejunum. The duodenojejunal flexure lies in front of the left psoas major muscle, the left renal artery, and the left renal vein. It is covered in front, and partly at the sides, by peritoneum continuous with the left portion of the mesentery. Clinical significance The ligament of Treitz, a peritoneal fold, from the right crus of diaphragm, is an identification point for the duodenojejunal flexure during abdominal surgery. Additional images See also Duodenum Transpyloric plane
https://en.wikipedia.org/wiki/Flag%20of%20Anchorage%2C%20Alaska
The flag of Anchorage, Alaska, was adopted by the city of Anchorage in 1973. It is a field of yellow with the seal of the city, which features a blue anchor in the foreground as well as a blue airplane, yellow sun, and yellow sailboat in the background. The words "ANCHORAGE ALASKA" are also present. History In 1973, the city of Anchorage held a contest to adopt a city flag for the first time. Artist and longtime art professor at the University of Alaska Anchorage Joan Kimura submitted an acrylic painting of her design which was slightly adjusted and then adopted by the city. In 1975 the Anchorage Assembly passed a resolution to adapt the seal on the flag into the seal of the city, which is still in use today. Symbolism The large anchor is in reference to the city's name as well as its origin as an anchorage, notably for the third voyage of James Cook. The modern airplane symbolizes Anchorage's role as a transportation hub with its Ted Stevens Anchorage International Airport. The yellow sun symbolizes the city's variation in daylight across the seasons due to its northern latitude. The ship is HMS Resolution used by Captain James Cook in his exploration of the Cook Inlet, upon which Anchorage was founded. It is unknown what the field of yellow is meant to represent, but it is possibly in reference to the Yukon Gold Rush. Reception The North American Vexillological Association ranked the Anchorage flag as the 29th best of 150 selected city flags in the United States and rated it a 5.33 out of 10. Ted Kaye, secretary of the Association, said "it has great imagery, an anchor for Anchorage is just super. But writing the words Anchorage, Alaska on the flag, in a sense, shows that Anchorage is insecure about its symbolism." The flag is rarely seen in the city; it is most notably flown at the Anchorage public library and the Anchorage Museum. The Kimura Art Gallery at the University of Alaska Anchorage is named in honor of Sam Kimura, Professor Emeritus of Art, and th
https://en.wikipedia.org/wiki/Kaon
In particle physics, a kaon (), also called a K meson and denoted , is any of a group of four mesons distinguished by a quantum number called strangeness. In the quark model they are understood to be bound states of a strange quark (or antiquark) and an up or down antiquark (or quark). Kaons have proved to be a copious source of information on the nature of fundamental interactions since their discovery in cosmic rays in 1947. They were essential in establishing the foundations of the Standard Model of particle physics, such as the quark model of hadrons and the theory of quark mixing (the latter was acknowledged by a Nobel Prize in Physics in 2008). Kaons have played a distinguished role in our understanding of fundamental conservation laws: CP violation, a phenomenon generating the observed matter–antimatter asymmetry of the universe, was discovered in the kaon system in 1964 (which was acknowledged by a Nobel Prize in 1980). Moreover, direct CP violation was discovered in the kaon decays in the early 2000s by the NA48 experiment at CERN and the KTeV experiment at Fermilab. Basic properties The four kaons are : , negatively charged (containing a strange quark and an up antiquark) has mass and mean lifetime . (antiparticle of above) positively charged (containing an up quark and a strange antiquark) must (by CPT invariance) have mass and lifetime equal to that of . Experimentally, the mass difference is , consistent with zero; the difference in lifetimes is , also consistent with zero. , neutrally charged (containing a down quark and a strange antiquark) has mass . It has mean squared charge radius of . , neutrally charged (antiparticle of above) (containing a strange quark and a down antiquark) has the same mass. As the quark model shows, assignments that the kaons form two doublets of isospin; that is, they belong to the fundamental representation of SU(2) called the 2. One doublet of strangeness +1 contains the and the . The antiparticles form the ot
https://en.wikipedia.org/wiki/Heartland%20Payment%20Systems
Heartland Payment Systems, Inc. is a U.S.-based payment processing and technology provider. Founded in 1997, Heartland Payment Systems' last headquarters were in Princeton, New Jersey. An acquisition by Global Payments, expected to be worth $3.8 billion or $4.3 billion was finalized on April 25, 2016. Heartland Payment Systems provides payment processing for more than 275,000 business locations in the United States and processes more than 11 million transactions a day and more than $80 billion in transactions a year, as of 2014. In 2014, the Nilson Report ranked Heartland the 6th largest payment processor in the country by transaction count, and the 8th largest by processed dollar volume. Associated businesses In addition to payment processing, Heartland has developed or acquired businesses in payroll processing, gift card and campus card, point of sale systems, school payments and nutrition, network management, mobile payments and ordering, eCommerce, billing, and lending services. History Heartland processed its first card transaction on July 15, 1997. In 2001 the company received a $40 million private equity investment from Greenhill Capital Partners, L.P. (New York, NY), LLR Partners, Inc. (Philadelphia, PA), and their affiliated investment funds. The company went public on the New York Stock Exchange on August 11, 2005. On May 17, 2010, Heartland announced its debut on the list of America’s largest companies at #954. Security breach On January 20, 2009 Heartland announced that it had been "the victim of a security breach within its processing system in 2008". The data stolen included the digital information encoded onto the magnetic stripe built into the backs of credit and debit cards; with that data, thieves can fashion counterfeit credit cards by imprinting the same stolen information onto fabricated cards. One estimate claimed 100 million cards and more than 650 financial services companies were compromised; at the time, it was characterized as the la
https://en.wikipedia.org/wiki/System%20Packet%20Interface
The System Packet Interface (SPI) family of Interoperability Agreements from the Optical Internetworking Forum specify chip-to-chip, channelized, packet interfaces commonly used in synchronous optical networking and Ethernet applications. A typical application of such a packet level interface is between a framer (for optical network) or a MAC (for IP network) and a network processor. Another application of this interface might be between a packet processor ASIC and a traffic manager device. Context There are two broad categories of chip-to-chip interfaces. The first, exemplified by PCI-Express and HyperTransport, supports reads and writes of memory addresses. The second broad category carries user packets over 1 or more channels and is exemplified by the IEEE 802.3 family of Media Independent Interfaces and the Optical Internetworking Forum family of System Packet Interfaces. Of these last two, the family of System Packet Interfaces is optimized to carry user packets from many channels. The family of System Packet Interfaces is the most important packet-oriented, chip-to-chip interface family used between devices in the Packet over SONET and Optical Transport Network, which are the principal protocols used to carry the internet between cities. Specifications The agreements are: SPI-3 – Packet Interface for Physical and Link Layers for OC-48 (2.488 Gbit/s) SPI-4.1 – System Physical Interface Level 4 (SPI-4) Phase 1: A System Interface for Interconnection Between Physical and Link Layer, or Peer-to-Peer Entities Operating at an OC-192 Rate (10 Gbit/s). SPI-4.2 – System Packet Interface Level 4 (SPI-4) Phase 2: OC-192 System Interface for Physical and Link Layer Devices. SPI-5 – Packet Interface for Physical and Link Layers for OC-768 (40 Gbit/s) SPI-S – Scalable System Packet Interface - useful for interfaces starting with OC-48 and scaling into the Terabit range History of the specifications These agreements grew out of the donation to the OIF by PMC-S