source
stringlengths 31
227
| text
stringlengths 9
2k
|
|---|---|
https://en.wikipedia.org/wiki/Wil%20van%20der%20Aalst
|
Willibrordus Martinus Pancratius van der Aalst (born 29 January 1966) is a Dutch computer scientist and full professor at RWTH Aachen University, leading the Process and Data Science (PADS) group. His research and teaching interests include information systems, workflow management, Petri nets, process mining, specification languages, and simulation. He is also known for his work on workflow patterns.
Biography
Born in Eersel, Netherlands, van der Aalst received an MSc in computing science in 1988 at the Technische Universiteit Eindhoven (TU/e), and a PhD in mathematics in 1992 with the thesis "Timed colored Petri nets and their application to logistics" under supervision of Jaap Wessels and Kees van Hee.
In 1992 he started working at the Eindhoven University of Technology as an assistant professor for the department of Mathematics and Computing Science, where he headed the Specification and Modeling of Information Systems (SMIS) research group. From 2000 to 2003, he was a part-time full professor at the Computing Science department. And from 2000 to 2006 he was head of the Information Systems department at the Technology Management department of TU/e. Since 2006 he has been full professor at the Department of Mathematics & Computer Science of the Eindhoven University of Technology. He also has a part-time appointment in the BPM group of Queensland University of Technology (QUT).
He has been a visiting professor on at Karlsruhe Institute of Technology (AIFB), the University of Georgia (LSDIS), Johann Wolfgang Goethe University Frankfurt am Main (WI-II), the University of Colorado (CTRG), Queensland University of Technology (CITI), Aarhus University (DAIMI), and Fondazione Bruno Kessler (FBK).
He is associate editor for several journals, including "IEEE Transactions on Services Computing", "IEEE Transactions on Industrial Informatics", "International Journal of Business Process Integration and Management", "International Journal on Enterprise Modelling and Inform
|
https://en.wikipedia.org/wiki/Aromatic%20ring%20current
|
An aromatic ring current is an effect observed in aromatic molecules such as benzene and naphthalene. If a magnetic field is directed perpendicular to the plane of the aromatic system, a ring current is induced in the delocalized π electrons of the aromatic ring. This is a direct consequence of Ampère's law; since the electrons involved are free to circulate, rather than being localized in bonds as they would be in most non-aromatic molecules, they respond much more strongly to the magnetic field.
The ring current creates its own magnetic field. Outside the ring, this field is in the same direction as the externally applied magnetic field; inside the ring, the field counteracts the externally applied field. As a result, the net magnetic field outside the ring is greater than the externally applied field alone, and is less inside the ring.
Relevance to NMR spectroscopy
Aromatic ring currents are relevant to NMR spectroscopy, as they dramatically influence the chemical shifts of 1H nuclei ("protons") in aromatic molecules. The effect helps distinguish these nuclear environments and is therefore of great use in molecular structure determination. In benzene, the ring protons experience deshielding because the induced magnetic field has the same direction outside the ring as the external field and their chemical shift is 7.3 parts per million (ppm) compared to 5.6 for the vinylic proton in cyclohexene. In contrast any proton inside the aromatic ring experiences shielding because both fields are in opposite direction. This effect can be observed in cyclooctadecanonaene ([18]annulene) with 6 inner protons at −3 ppm.
The situation is reversed in antiaromatic compounds. In the dianion of [18]annulene the inner protons are strongly deshielded at 20.8 ppm and 29.5 ppm with the outer protons significantly shielded (with respect to the reference) at −1.1 ppm. Hence a diamagnetic ring current or diatropic ring current is associated with aromaticity whereas a paratropic ring
|
https://en.wikipedia.org/wiki/Attack%20rate
|
In epidemiology, the attack rate is the proportion of an at-risk population that contracts the disease during a specified time interval. It is used in hypothetical predictions and during actual outbreaks of disease. An at-risk population is defined as one that has no immunity to the attacking pathogen, which can be either a novel pathogen or an established pathogen. It is used to project the number of infections to expect during an epidemic. This aids in marshalling resources for delivery of medical care as well as production of vaccines and/or anti-viral and anti-bacterial medicines.
The rate is arrived at by taking the number of new cases in the population at risk and dividing by the number of persons at risk in the population.
See also
Incidence (epidemiology)
Compartmental models in epidemiology
Herd immunity
Risk assessment in public health
Vaccine-naive
|
https://en.wikipedia.org/wiki/Homelessness%20and%20aging
|
Homelessness and aging is a largely neglected topic in the literature. There is a widespread assumption that aged homeless people are rare, but this is not true. Japan, Australia and the United Kingdom show increases in their populations of aging homelessness. Increased Elderly adults who straddle the poverty line are at greater risk of falling into pathways of homelessness. When a homeless person enters their later years, or becomes homeless for the first time in older age, health issues can become difficult to address and compound as age progresses.
Research
Research in the older homeless population varies in age classification. The experiences that accompany homelessness, especially in the older population, require a lower age cut off point than is typically used for the older housed population. A specific age for which is considered elderly homeless varies in research, however, there is a general consensus that those older homeless that are between the ages of 50 and 65 years are at greater risks. Those between the ages of 50 and 65 are at greater risks because they fall between viable working age and governmental safety nets. This age group typically experiences poor physical health, poor nutrition and severe living conditions that put them in a greater risk category than those who are younger than 50 and older than 65 years of age. Studies consider this age group of the elderly homeless too old to benefit from employment services and too young for social safety net benefits.
A University of California study has followed 350 participants in Oakland since 2013. Their conclusions were that the majority had worked in low-paid low-skill occupations. 80% were African American. They were at greater risk of homelessness because they spent over 50% of their income on rent. Most were sicker to begin with and therefore spent more on medication. Once homeless, they died at a rate four to five times what would be expected in the general population, from the same causes a
|
https://en.wikipedia.org/wiki/Albatrellus%20subrubescens
|
Albatrellus subrubescens is a species of polypore fungus in the family Albatrellaceae. The fruit bodies (mushrooms) of the fungus have whitish to pale buff-colored caps that can reach up to in diameter, and stems up to long and thick. On the underside of the caps are tiny light yellow to pale greenish-yellow pores, the site of spore production. When the fruit bodies are fresh, the cap and pores stain yellow where exposed, handled, or bruised.
The species is found in Asia, Europe, and North America, where it grows on the ground in deciduous or mixed woods, usually in association with pine trees. It is closely related, and physically similar, to the more common Albatrellus ovinus, from which it may be distinguished macroscopically by differences in the color when bruised, and microscopically by the amyloid (staining bluish-black to black with Melzer's reagent) walls of the spores. The fruit bodies of A. subrubescens contain scutigeral, a bioactive chemical that has antibiotic activity. A. subrubescens mushrooms are mildly poisonous, and consuming them will result in a short-term gastrointestinal illness.
Taxonomy and phylogeny
The species was first described as Scutiger subrubescens by American mycologist William Murrill in 1940, based on collections that he found growing under oak near Gainesville, Florida, in November 1938. In 1947 he transferred it to the genus Polyporus. Josiah Lincoln Lowe examined Murrill's type material and thought that it did not differ from Albatrellus confluens. In 1965, Zdeněk Pouzar made collections from Bohemia (now the Czech Republic), and described it as a new species (Albatrellus similis), unaware of the similarity to Murrill's Florida specimens. Further study revealed that A. similis was identical to Murrill's Scutiger subrubescens, and Pouzar transferred the latter epithet to Albatrellus. In 1974, Pouzar recognized that Lowe's species Albatrellus confluens was distinct from A. subrubescens. The specific epithet subrubescens, "t
|
https://en.wikipedia.org/wiki/Morphea
|
Morphea is a form of scleroderma that mainly involves isolated patches of hardened skin on the face, hands, and feet, or anywhere else on the body, usually with no internal organ involvement. However, in Deep Morphea inflammation and sclerosis can be found in the deep dermis, panniculus, fascia, superficial muscle and bone.
Signs and symptoms
Morphea most often presents as macules or plaques a few centimeters in diameter, but also may occur as bands or in guttate lesions or nodules.
Morphea is a thickening and hardening of the skin and subcutaneous tissues from excessive collagen deposition. Morphea includes specific conditions ranging from very small plaques only involving the skin to widespread disease causing functional and cosmetic deformities. Morphea discriminates from systemic sclerosis by its supposed lack of internal organ involvement. This classification scheme does not include the mixed form of morphea in which different morphologies of skin lesions are present in the same individual. Up to 15% of morphea patients may fall into this previously unrecognized category.
Cause
Physicians and scientists do not know what causes morphea. Case reports and observational studies suggest there is a higher frequency of family history of autoimmune diseases in patients with morphea. Tests for autoantibodies associated with morphea have shown results in higher frequencies of anti-histone and anti-topoisomerase IIa antibodies. Case reports of morphea co-existing with other systemic autoimmune diseases such as primary biliary cirrhosis, vitiligo, and systemic lupus erythematosus lend support to morphea as an autoimmune disease.
Borrelia burgdorferi infection may be relevant for the induction of a distinct autoimmune type of scleroderma; it may be called "Borrelia-associated early onset morphea" and is characterized by the combination of disease onset at younger age, infection with B. burgdorferi, and evident autoimmune phenomena as reflected by high-titer antinuc
|
https://en.wikipedia.org/wiki/International%20Union%20of%20Pure%20and%20Applied%20Physics
|
The International Union of Pure and Applied Physics (IUPAP; ) is an international non-governmental organization whose mission is to assist in the worldwide development of physics, to foster international cooperation in physics, and to help in the application of physics toward solving problems of concern to humanity. It was established in 1922 and the first General Assembly was held in 1923 in Paris. The Union is domiciled in Geneva, Switzerland.
IUPAP carries out this mission by: sponsoring international meetings; fostering communications and publications; encouraging research and education; fostering the free circulation of scientists; promoting international agreements on the use of symbols, units, nomenclature and standards; and cooperating with other organizations on disciplinary and interdisciplinary problems.
IUPAP is a member of the International Science Council.
IUPAP is the lead organization promoting the adoption of the International Year of Basic Sciences for Sustainable Development, a proposal to be considered by the 76th session of the UN General Assembly.
History
In 1919 was formed the International Research Council “largely through the representatives of the National Academy of Sciences, Washington, and of the Royal Society, London, to coordinate international efforts in the different branches of sciences, under whose aegis international associations or unions in different branches of science could be formed".
In accordance with this principle, the 1922 General Assembly of the IRC convened at Brussels and a number of physicists present decided that the formation of a Physics Union was imperative.
Thirteen countries (Belgium, Canada, Denmark, France, Netherlands, Empire of Japan, Norway, Poland, Spain, Switzerland, United Kingdom, United States and Union of South Africa) immediately announced their adherence to the new Union.
An Executive committee was formed which undertook to prepare rules, regulations, and activities of the organization. The
|
https://en.wikipedia.org/wiki/History%20of%20cryptography
|
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classical cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.
The development of cryptography has been paralleled by the development of cryptanalysis — the "breaking" of codes and ciphers. The discovery and application, early on, of frequency analysis to the reading of encrypted communications has, on occasion, altered the course of history. Thus the Zimmermann Telegram triggered the United States' entry into World War I; and Allies reading of Nazi Germany's ciphers shortened World War II, in some evaluations by as much as two years.
Until the 1960s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a public encryption standard (DES), and the invention of public-key cryptography.
Antiquity
The earliest known use of cryptography is found in non-standard hieroglyphs carved into the wall of a tomb from the Old Kingdom of Egypt circa 1900 BC. These are not thought to be serious attempts at secret communications, however, but rather to have been attempts at mystery, intrigue, or even amusement for literate onlookers.
Some clay tablets from Mesopotamia somewhat later are clearly meant to protect information—one dated near 1500 BC was found to encrypt a craftsman's recipe for pottery glaze, presumably commercially valuable. Furthermore, Hebrew scholars made use of simple monoalphabetic substitution cip
|
https://en.wikipedia.org/wiki/Christopher%20Hills
|
Christopher Hills (April 9, 1926 – January 31, 1997) was an English-born author, described as the "Father of Spirulina" for popularizing spirulina cyanobacteria as a food supplement. He also wrote 30 books on consciousness, meditation, yoga and spiritual evolution, divining, world government, aquaculture, and personal health.
Hills was variously headlined by the press as a "Western Guru Scientist", "Natural Foods Pioneer", "Evolutionary Revolutionary" and a "Modern Merlin".
As a commodities trader and art patron in Jamaica, he retired from business at an early age to follow a spiritual quest that took him around the world as a speaker, author, entrepreneur and pioneer of algae as an efficient source of food and fuel for humanity.
Early biography
Born in Grimsby, England to a family of fishermen, Hills grew up sailing the North Sea. In 1940 he enrolled as a cadet in nautical school and joined the British Merchant Navy during World War II. At sea, Hills had several life and death experiences that formed his views on karma, divinity and destiny. At the end of the war, as navigating officer for an Esso oil tanker docked in Curaçao, he set up shop as a commodities trader with branch offices in Venezuela and Aruba. When a client reneged on a deal, Hills moved to Jamaica. There with the help of the philanthropist Percy Junor he founded commodity companies specializing in sugar, bananas, insurance, telegraph communications and agricultural spices pimento, nutmegs and ginger. Financing for the first export corporation came from British businessman Andrew Hay, then husband of best-selling motivational author Louise Hay who in the 1950s was a high-fashion model and family friend.
In 1950 Christopher Hills married an English woman, Norah Bremner, deputy headmistress of Wolmer's School in Kingston. Her father, Bernard E. Bremner B.E.M., was the Magistrate, Chief of Customs, and Mayor of King's Lynn, Norfolk who in 1951 co-founded the King's Lynn Festival with concert pianist
|
https://en.wikipedia.org/wiki/Bull%20%28rhinoceros%29
|
Bull was an individual male southern white rhinoceros and a famous conservation success story for his species. Southern white rhinos were thought to be extinct in the late 1800s until a small herd was discovered. Since then, rhinos like Bull have been part of various international breeding programs. As a result, their population is now close to 20,000, classifying them as Near Threatened and making them the only species of rhinoceros that is not endangered.
Bull was born in South Africa and was eventually moved to North America, where he lived in the San Diego Wild Animal Park and Toronto Zoo until his death in 2008. He can now be seen in the Schad Gallery of Biodiversity in the Royal Ontario Museum (ROM) in Toronto as part of the museum's collection of Iconic Objects.
Early life
Bull was born in the wild in South Africa, and for this reason, his age can only be estimated. However, after undergoing a series of examinations, specialists were able to estimate his age to be around 9–10 years at the time of his capture, so his birth year was recorded to be 1963. Although white rhinos are protected in South Africa, Bull and many others were taken into captivity under a breeding program in order to ensure the survival of the species should an unexpected disaster befall the main population.
At the time of the rhino’s capture, he was named “Mtondo”, which translates from Zulu as a term for male reproductive organs.
San Diego Wild Animal Park
Shortly after his capture, Mtondo was moved to different locations across North America, where he was studied as part of a conservation effort. His first North American home was the San Diego Wild Animal Park Zoo. He remained at this location until 1974, when he was transferred to the Toronto Zoo in Ontario, Canada.
Toronto Zoo
Following his time in the San Diego Wild Animal Park, the rhino spent the remainder of his life in the Toronto Zoo, with Ron Gilmore acting as his keeper.
Upon arriving at the Toronto Zoo, Mtondo’s
|
https://en.wikipedia.org/wiki/Helmholtz%20resonance
|
Helmholtz resonance or wind throb is the phenomenon of air resonance in a cavity, such as when one blows across the top of an empty bottle. The name comes from a device created in the 1850s by Hermann von Helmholtz, the Helmholtz resonator, which he used to identify the various frequencies or musical pitches present in music and other complex sounds.
History
Helmholtz described in his 1862 book On the Sensations of Tone an apparatus able to pick out specific frequencies from a complex sound. The Helmholtz resonator, as it is now called, consists of a rigid container of a known volume, nearly spherical in shape, with a small neck and hole in one end and a larger hole in the other end to emit the sound.
When the resonator's 'nipple' is placed inside one's ear, a specific frequency of the complex sound can be picked out and heard clearly. In his book Helmholtz explains: When we "apply a resonator to the ear, most of the tones produced in the surrounding air will be considerably damped; but if the proper tone of the resonator is sounded, it brays into the ear most powerfully…. The proper tone of the resonator may even be sometimes heard cropping up in the whistling of the wind, the rattling of carriage wheels, the splashing of water."
A set of varied size resonators was sold to be used as discrete acoustic filters for the spectral analysis of complex sounds. There is also an adjustable type, called a universal resonator, which consists of two cylinders, one inside the other, which can slide in or out to change the volume of the cavity over a continuous range. An array of 14 of this type of resonator has been employed in a mechanical Fourier sound analyzer. This resonator can also emit a variable-frequency tone when driven by a stream of air in the "tone variator" invented by William Stern, 1897.
When air is forced into a cavity, the pressure inside increases. When the external force pushing the air into the cavity is removed, the higher-pressure air inside will f
|
https://en.wikipedia.org/wiki/United%20States%20Navy%20use%20of%20Hydrometer%20in%20the%201800s
|
Certain ships of the United States Navy adopted the use of the hydrometer in the 1850s. Readings taken of the density of seawater contributed to research into the dynamics of ocean currents.
Adoption
The first International Maritime Conference held at Brussels in 1853 (aka "Brussels Conference") for devising a uniform system of meteorological observations at sea recommended the systematic use of the hydrometer. Captain John Rodgers, Lieutenant Porter, and Dr. William Samuel Waithman Ruschenberger, all of the United States Navy did this as did Dr. Raymond, in the American steamer Golden Age, and Captain Henry Toynbee, (F.R.A.S., F.R.A.G.S) of the English East Indiaman Gloriana. All of these men returned valuable observations with the hydrometer, though Captain Rodgers afforded the most extended series. Those navigators who used the hydrometer enlarged the bounds of knowledge and fields of research and led to the discovery of new relations of the sea.
The object which the Brussels Organization had in view when the specific gravity column was introduced into the sea-journal was that hydrographers might find in it data for computing the dynamical force which the sea derives for its currents from the difference in the specific gravity of its waters in different climes. The Brussels Conference agreed that a given difference as to specific gravity between the water in one part of the sea and the water in another would give rise to certain currents, and that the set and strength of these currents would be the same, whether such difference of specific gravity arose from difference of temperature or difference of saltiness, or both.
Findings
The observations made with it by Captain Rodgers, on board the Vincennes – the first United States warship to circumnavigate the globe – showed that the specific gravity of sea water varies but little in the trade-wind regions, notwithstanding the change of temperature. The temperature was a little greater in the southeast trade-wind
|
https://en.wikipedia.org/wiki/Distillery%2C%20Wine%20and%20Allied%20Workers%27%20International%20Union
|
The Distillery, Wine and Allied Workers' International Union (DWAW) was a labor union representing workers involved in making alcoholic drinks in the United States.
History
The union was founded in 1940 as the Distillery, Rectifying and Wine Workers' International Union, and was chartered by the American Federation of Labor on December 20. It transferred to the new AFL-CIO in 1955, and by 1957, it had 25,000 members.
In 1963, the union renamed itself as the Distillery, Rectifying, Wine and Allied Workers' International Union of America, becoming the DWAW in 1978. By 1980, the union's membership had risen slightly, to 26,600. On October 11, 1995, it merged into the United Food and Commercial Workers' International Union.
Presidents
1940: Joseph O'Neil
1958: Mort Brandenburg
1974: George Oneto
1985: George Orlando
|
https://en.wikipedia.org/wiki/Atlantic%20and%20Gulf%20Coastal%20Plain%20Province
|
The Atlantic and Gulf Coastal Plain Province is a coastal plain floristic province within the North American Atlantic Region, a floristic region within the Holarctic Kingdom. It lies to the east and south of the Appalachian Province. It encompasses the Atlantic coastal plain minus central and southern Florida, and the Gulf coastal plain. Although the precise definition varies, it extends as far north as Long Island or southern Nova Scotia, and as far south as eastern Texas or northeastern Mexico. Additionally, at the Mississippi Embayment the province stretches up to the confluence of the Ohio and Mississippi rivers in Cairo, Illinois.
Although no floristic treatment has been attempted on the province, it was designated the 36th biodiversity hotspot in 2016 due to having more than 1,500 endemic plant species combined with 70% habitat loss.
Additional Material
|
https://en.wikipedia.org/wiki/Augeas
|
In Greek mythology, Augeas (or Augeias, , ), whose name means "bright", was king of Elis and father of Epicaste. Some say that Augeas was one of the Argonauts. He is known for his stables, which housed the single greatest number of cattle in the country and had never been cleaned, until the time of the great hero Heracles.
Family
Augeas's lineage varies in the sources: he was said to be either the son of Helios either by Nausidame or Iphiboe, or of Eleios, or of Poseidon, or of Phorbas and Hyrmine. In the latter account, Augeas was probably the brother of Actor, Tiphys and Diogeneia. His children were Epicaste, Phyleus, Agamede, Agasthenes, and Eurytus.
Mythology
The fifth Labour of Heracles (Hercules in Latin) was to clean the Augean () stables. Eurystheus intended this assignment both as humiliating (rather than impressive, like the previous labours) and as impossible, since the livestock were divinely healthy (immortal) and therefore produced an enormous quantity of dung (). Those stables had not been cleaned in over thirty years, and 3,000 cattle lived there. However, Heracles succeeded by rerouting the rivers Alpheus and Peneus to wash out the filth.
Augeas reacted angrily because he had promised Heracles one tenth of his cattle if the job was finished in one day. He refused to honour the agreement, and Heracles killed him after completing the tasks. Heracles gave his kingdom to Phyleus, Augeas' son, who had been exiled for supporting Heracles against his father.
According to the odes of the poet Pindar, Heracles then founded the Olympic Games:
Eurystheus discounted the success of this labour because the rushing waters had done the work of cleaning the stables and because Heracles was paid. Stating that Heracles still had seven labours to do, Eurystheus then sent Heracles to defeat the Stymphalian Birds.
Classical literature sources
Augeas
Chronological listing of classical literature sources for Augeas:
Homer, Iliad 2. 615 ff (trans. Murray) (Greek
|
https://en.wikipedia.org/wiki/CIP/KIP
|
The CIP/KIP (CDK interacting protein/Kinase inhibitory protein) family is one of two families (CIP/KIP and INK4) of mammalian cyclin dependent kinase (CDK) inhibitors (CKIs) involved in regulating the cell cycle. The CIP/KIP family is made up of three proteins: p21cip1/waf1, P27kip1, p57kip2 These proteins share sequence homology at the N-terminal domain which allows them to bind to both the cyclin and CDK. Their activity primarily involves the binding and inhibition of G1/S- and S-Cdks; however, they have also been shown to play an important role in activating the G1-CDKs CDK4 and CDK6. In addition, more recent work has shown that CIP/KIP family members have a number of CDK-independent roles involving regulation of transcription, apoptosis, and the cytoskeleton.
Role in cell cycle progression
CIP/KIP family proteins bind a wide range of G1/S and S-phase cyclin-CDK complexes including cyclin D-CDK4,6 and cyclin E-, A-CDK2 complexes. Traditionally it was assumed that CIP/KIP proteins played a role in inhibiting all of these complexes; however it was later discovered that CIP/KIP proteins, while inhibiting CDK2 activity, may also activate cyclin D-CDK4,6 activity by facilitating stable binding between cyclin D and CDK4,6.
cyclin-CDK2 regulation
The crystal structure of p27 in a complex with cyclinA-CDK2 was published in 1996. The structure shows that p27 interacts with both cyclin A and CDK2. In addition, p27 mimics ATP and inserts itself into the ATP binding site thus preventing ATP binding. This mechanism blocks any kinase activity and prevents downstream hyper-phosphorylation of Rb that allows release of the E2F transcription factor and transcription of cell cycle-related genes.
cyclinD-CDK4,6 regulation
Cyclin D has low affinity for its CDK. Therefore, it was hypothesized that additional proteins were needed to allow for a stable cyclin D-CDK4,6 complex. Growing evidence has shown that CIP/KIP proteins are involved in this stabilization. The first
|
https://en.wikipedia.org/wiki/Core%20router
|
A core router is a router designed to operate in the Internet backbone, or core. To fulfill this role, a router must be able to support multiple telecommunications interfaces of the highest speed in use in the core Internet and must be able to forward IP packets at full speed on all of them. It must also support the routing protocols being used in the core. A core router is distinct from an edge router: edge routers sit at the edge of a backbone network and connect to core routers.
History
Like the term "supercomputer", the term "core router" refers to the largest and most capable routers of the then-current generation. A router that was a core router when introduced would likely not be a core router ten years later. Although the local area NPL network was using line speeds of 768 kbit/s from 1967, at the inception of the ARPANET (the Internet's predecessor) in 1969, the fastest links were 56 kbit/s. A given routing node had at most six links. The "core router" was a dedicated minicomputer called an IMP Interface Message Processor. Link speeds increased steadily, requiring progressively more powerful routers until the mid-1990s, when the typical core link speed reached 155 Mbit/s. At that time, several breakthroughs in fiber optic telecommunications (notably DWDM and EDFA) technologies combined to lower bandwidth costs that in turn drove a sudden dramatic increase in core link speeds: by 2000, a core link operated at 2.5 Gbit/s and core Internet companies were planning for 10 Gbit/s speeds.
The largest provider of core routers in the 1990s was Cisco Systems, who provided core routers as part of a broad product line. Juniper Networks entered the business in 1996, focusing primarily on core routers and addressing the need for a radical increase in routing capability that was driven by the increased link speed. In addition, several new companies attempted to develop new core routers in the late 1990s. It was during this period that the term "core router" came into
|
https://en.wikipedia.org/wiki/Biocommunication%20%28science%29
|
In the study of the biological sciences, biocommunication is any specific type of communication within (intraspecific) or between (interspecific) species of plants, animals, fungi, protozoa and microorganisms. Communication basically means sign-mediated interactions following three levels of (syntactic, pragmatic and semantic) rules. Signs in most cases are chemical molecules (semiochemicals), but also tactile, or as in animals also visual and auditive. Biocommunication of animals may include vocalizations (as between competing bird species), or pheromone production (as between various species of insects), chemical signals between plants and animals (as in tannin production used by vascular plants to warn away insects), and chemically mediated communication between plants and within plants.
Biocommunication of fungi demonstrates that mycelia communication integrates interspecific sign-mediated interactions between fungal organisms soil bacteria and plant root cells without which plant nutrition could not be organized. Biocommunication of Ciliates identifies the various levels and motifs of communication in these unicellular eukaryotes. Biocommunication of Archaea represents keylevels of sign-mediated interactions in the evolutionarily oldest akaryotes. Biocommunication of Phages demonstrates that the most abundant living agents on this planet coordinate and organize by sign-mediated interactions. Biocommunication is the essential tool to coordinate behavior of various cell types of immune systems.
Biocommunication, biosemiotics and linguistics
Biocommunication theory may be considered to be a branch of biosemiotics. Whereas Biosemiotics studies the production and interpretation of signs and codes, biocommunication theory investigates concrete interactions mediated by signs. Accordingly, syntactic, semantic, and pragmatic aspects of biocommunication processes are distinguished. Biocommunication specific to animals (animal communication) is considered a branch of
|
https://en.wikipedia.org/wiki/Lower%20envelope
|
In mathematics, the lower envelope or pointwise minimum of a finite set of functions is the pointwise minimum of the functions, the function whose value at every point is the minimum of the values of the functions in the given set. The concept of a lower envelope can also be extended to partial functions by taking the minimum only among functions that have values at the point. The upper envelope or pointwise maximum is defined symmetrically. For an infinite set of functions, the same notions may be defined using the infimum in place of the minimum, and the supremum in place of the maximum.
For continuous functions from a given class, the lower or upper envelope is a piecewise function whose pieces are from the same class. For functions of a single real variable whose graphs have a bounded number of intersection points, the complexity of the lower or upper envelope can be bounded using Davenport–Schinzel sequences, and these envelopes can be computed efficiently by a divide-and-conquer algorithm that computes and then merges the envelopes of subsets of the functions.
For convex functions or quasiconvex functions, the upper envelope is again convex or quasiconvex. The lower envelope is not, but can be replaced by the lower convex envelope to obtain an operation analogous to the lower envelope that maintains convexity. The upper and lower envelopes of Lipschitz functions preserve the property of being Lipschitz. However, the lower and upper envelope operations do not necessarily preserve the property of being a continuous function.
|
https://en.wikipedia.org/wiki/Cancer%20associated%20retinopathy
|
Cancer Associated Retinopathy (CAR) also known as Carcinoma Associated Retinopathy is an immune-mediated disease affecting the retina of the eye. It is a paraneoplastic type autoimmune retinopathy associated with cancer that can cause blindness. It can be seen in association with various types of cancers. It can be treated with a combination of chemotherapy and immunosuppression.
Pathophysiology
It is a paraneoplastic type of autoimmune retinopathy. It may be seen in association with various cancers including non-small cell lung cancer, breast cancer, gynacological cancers, tumors of the hematopoietic and lymphoid tissues, basal cell carcinoma, colon cancer, kidney cancer, prostate cancer and pancreatic cancer.
CAR results from the interaction between retinal antigen expression in cancer tissues and their systemic immune response. These antigens trigger an autoimmune response within the host to form antibodies that cross-react with the retinal antigen. This ultimately leads to retinal degeneration and apoptosis. Recoverin is the most common antigen associated with CAR.
Prevalence
The prevalence of CAR among cancer patients is thought to be 10%–15%.
Signs and symptoms
Patients may complain loss of vision, black spots in the field of vision (scotoma), night blindness, prolonged glare after light exposure, prolonged dark adaptation and defects in colour vision (dyschromatopsia). Major signs include circulating anti-retinal antibodies along with loss of the outer retinal layer including the ellipsoid layer and photoreceptor cells, abnormalities in ERG, fundus autofluorescence and visual field defectss.
Diagnosis
CAR is suspected in cancer patients who present with unexplained visual loss, scotomas and an abnormal ERG. Antiretinal antibodies can be detected using Western blot test, immunohistochemistry test or ELISA testing. But the diagnosis is challenging as the signs and symptoms overlaps with many other diseases affecting the retina.
Treatment
Long-term systemi
|
https://en.wikipedia.org/wiki/Lacunar%20ligament
|
The lacunar ligament, also named Gimbernat’s ligament, is a ligament in the inguinal region. It connects the inguinal ligament to the pectineal ligament, near the point where they both insert on the pubic tubercle.
Structure
The lacunar ligament is the part of the aponeurosis of the external oblique muscle that is reflected backward and laterally and is attached to the pectineal line of the pubis.
It is about 1.25 cm. long, larger in the male than in the female, almost horizontal in direction in the erect posture, and of a triangular form with the base directed laterally.
Its base is concave, thin, and sharp, and forms the medial boundary of the femoral ring. Its apex corresponds to the pubic tubercle.
Its posterior margin is attached to the pectineal line, and is continuous with the pectineal ligament. Its anterior margin is attached to the inguinal ligament.
Its surfaces are directed upward and downward.
Clinical significance
The lacunar ligament is the only boundary of the femoral canal that can be cut during surgery to release a femoral hernia. Care must be taken when doing so as up to 25% of people have an aberrant obturator artery (corona mortis) which can cause significant bleeding.
History
The lacunar ligament is sometimes called Gimbernat's ligament after Antoni de Gimbernat.
Additional images
See also
Inguinal ligament
Pectineal ligament
|
https://en.wikipedia.org/wiki/Antiproton
|
The antiproton, , (pronounced p-bar) is the antiparticle of the proton. Antiprotons are stable, but they are typically short-lived, since any collision with a proton will cause both particles to be annihilated in a burst of energy.
The existence of the antiproton with electric charge of , opposite to the electric charge of of the proton, was predicted by Paul Dirac in his 1933 Nobel Prize lecture. Dirac received the Nobel Prize for his 1928 publication of his Dirac equation that predicted the existence of positive and negative solutions to Einstein's energy equation () and the existence of the positron, the antimatter analog of the electron, with opposite charge and spin.
The antiproton was first experimentally confirmed in 1955 at the Bevatron particle accelerator by University of California, Berkeley, physicists Emilio Segrè and Owen Chamberlain, for which they were awarded the 1959 Nobel Prize in Physics.
In terms of valence quarks, an antiproton consists of two up antiquarks and one down antiquark (). The properties of the antiproton that have been measured all match the corresponding properties of the proton, with the exception that the antiproton has electric charge and magnetic moment that are the opposites of those in the proton, which is to be expected from the antimatter equivalent of a proton. The questions of how matter is different from antimatter, and the relevance of antimatter in explaining how our universe survived the Big Bang, remain open problems—open, in part, due to the relative scarcity of antimatter in today's universe.
Occurrence in nature
Antiprotons have been detected in cosmic rays beginning in 1979, first by balloon-borne experiments and more recently by satellite-based detectors. The standard picture for their presence in cosmic rays is that they are produced in collisions of cosmic ray protons with atomic nuclei in the interstellar medium, via the reaction, where A represents a nucleus:
+ A → + + + A
The secondary antiproton
|
https://en.wikipedia.org/wiki/Stamp%20mill
|
A stamp mill (or stamp battery or stamping mill) is a type of mill machine that crushes material by pounding rather than grinding, either for further processing or for extraction of metallic ores. Breaking material down is a type of unit operation.
Description
A stamp mill consists of a set of heavy steel (iron-shod wood in some cases) stamps, loosely held vertically in a frame, in which the stamps can slide up and down. They are lifted by cams on a horizontal rotating shaft. As the cam moves from under the stamp, the stamp falls onto the ore below, crushing the rock, and the lifting process is repeated at the next pass of the cam.
Each one frame and stamp set is sometimes called a "battery" or, confusingly, a "stamp" and mills are sometimes categorised by how many stamps they have, i.e. a "10 stamp mill" has 10 sets. They usually are arranged linearly, but when a mill is enlarged, a new line of them may be constructed rather than extending the line. Abandoned mill sites (as documented by industrial archaeologists) will usually have linear rows of foundation sets as their most prominent visible feature as the overall apparatus can exceed 20 feet in height, requiring large foundations. Stamps are usually arranged in sets of five.
Some ore processing applications used large quantities of water so some stamp mills are located near natural or artificial bodies of water. For example, the Redridge Steel Dam was built to supply stamp mills with process water. The California Stamp made its major debut at the 1894 San Francisco midsummer fair. It was the first type that generated electricity, powered by a wood feed steam boiler. Steam started the wheels and belts turning; a generator that also was steam driven supplied the electricity for overhead lighting. This was a big plus for mining company, enabling more production time.
History
The main components for water-powered stamp mills – water wheels, cams, and hammers – were known in the Hellenistic era in the Eastern
|
https://en.wikipedia.org/wiki/Discrete%20spectrum%20%28mathematics%29
|
In mathematics, specifically in spectral theory, a discrete spectrum of a closed linear operator is defined as the set of isolated points of its spectrum such that the rank of the corresponding Riesz projector is finite.
Definition
A point
in the spectrum of a closed linear operator in the Banach space with domain is said to belong to discrete spectrum of if the following two conditions are satisfied:
is an isolated point in ;
The rank of the corresponding Riesz projector is finite.
Here is the identity operator in the Banach space and is a smooth simple closed counterclockwise-oriented curve bounding an open region such that is the only point of the spectrum of in the closure of ; that is,
Relation to normal eigenvalues
The discrete spectrum coincides with the set of normal eigenvalues of :
Relation to isolated eigenvalues of finite algebraic multiplicity
In general, the rank of the Riesz projector can be larger than the dimension of the root lineal of the corresponding eigenvalue, and in particular it is possible to have , . So, there is the following inclusion:
In particular, for a quasinilpotent operator
one has
, ,
,
.
Relation to the point spectrum
The discrete spectrum of an operator is not to be confused with the point spectrum , which is defined as the set of eigenvalues of .
While each point of the discrete spectrum belongs to the point spectrum,
the converse is not necessarily true: the point spectrum does not necessarily consist of isolated points of the spectrum, as one can see from the example of the left shift operator,
For this operator, the point spectrum is the unit disc of the complex plane, the spectrum is the closure of the unit disc, while the discrete spectrum is empty:
See also
Spectrum (functional analysis)
Decomposition of spectrum (functional analysis)
Normal eigenvalue
Essential spectrum
Spectrum of an operator
Resolvent formalism
Riesz projector
Fredholm operator
Operator theory
|
https://en.wikipedia.org/wiki/Phylogenetic%20comparative%20methods
|
Phylogenetic comparative methods (PCMs) use information on the historical relationships of lineages (phylogenies) to test evolutionary hypotheses. The comparative method has a long history in evolutionary biology; indeed, Charles Darwin used differences and similarities between species as a major source of evidence in The Origin of Species. However, the fact that closely related lineages share many traits and trait combinations as a result of the process of descent with modification means that lineages are not independent. This realization inspired the development of explicitly phylogenetic comparative methods. Initially, these methods were primarily developed to control for phylogenetic history when testing for adaptation; however, in recent years the use of the term has broadened to include any use of phylogenies in statistical tests. Although most studies that employ PCMs focus on extant organisms, many methods can also be applied to extinct taxa and can incorporate information from the fossil record.
PCMs can generally be divided into two types of approaches: those that infer the evolutionary history of some character (phenotypic or genetic) across a phylogeny and those that infer the process of evolutionary branching itself (diversification rates), though there are some approaches that do both simultaneously. Typically the tree that is used in conjunction with PCMs has been estimated independently (see computational phylogenetics) such that both the relationships between lineages and the length of branches separating them is assumed to be known.
Applications
Phylogenetic comparative approaches can complement other ways of studying adaptation, such as studying natural populations, experimental studies, and mathematical models. Interspecific comparisons allow researchers to assess the generality of evolutionary phenomena by considering independent evolutionary events. Such an approach is particularly useful when there is little or no variation within species.
|
https://en.wikipedia.org/wiki/Counting%20sheep
|
Counting sheep is a mental exercise used in some Western cultures as a means of putting oneself to sleep.
In most depictions of the activity, the practitioner envisions an endless series of identical white sheep jumping over a fence, while counting them as they do so. The idea, presumably, is to induce boredom while occupying the mind with something simple, repetitive, and rhythmic, all of which are known to help humans sleep.
Although the practice is largely a stereotype, and rarely used as a solution for insomnia, it has been so commonly referenced by cartoons, comic strips, and other mass media, that it has become deeply engrained into popular culture's notion of sleep. The term "counting sheep" has entered the English language as an idiomatic term for insomnia. Sheep themselves have become associated with sleep, or lack thereof.
Effectiveness
The effectiveness of the method may depend upon the mental power required. An experiment conducted by researchers at Oxford University, though not involving livestock as the object of visualization, found that subjects who imagined "a beach or a waterfall" were forced to expend more mental energy, and fell asleep faster, than those asked to "simply distract from thoughts, worries and concerns." Sleep could be achieved by any number of complex activities that expend mental energy.
Origin
An early reference to counting sheep as a means of attaining sleep can be found in Illustrations of Political Economy by Harriet Martineau, from 1832:
"It was a sight of monotony to behold one sheep after another follow the adventurous one, each in turn placing its fore-feet on the breach in the fence, bringing up its hind legs after it, looking around for an instant from the summit, and then making the plunge into the dry ditch, tufted with locks of wool. The process might have been more composing if the field might have been another man's property, or if the flock had been making its way out instead of in; but the recollection of the
|
https://en.wikipedia.org/wiki/Rademacher%20system
|
In mathematics, in particular in functional analysis, the Rademacher system, named after Hans Rademacher, is an incomplete orthogonal system of functions on the unit interval of the following form:
The Rademacher system is stochastically independent, and is closely related to the Walsh system. Specifically, the Walsh system can be constructed as a product of Rademacher functions.
|
https://en.wikipedia.org/wiki/Lehmer%20mean
|
In mathematics, the Lehmer mean of a tuple of positive real numbers, named after Derrick Henry Lehmer, is defined as:
The weighted Lehmer mean with respect to a tuple of positive weights is defined as:
The Lehmer mean is an alternative to power means
for interpolating between minimum and maximum via arithmetic mean and harmonic mean.
Properties
The derivative of is non-negative
thus this function is monotonic and the inequality
holds.
The derivative of the weighted Lehmer mean is:
Special cases
is the minimum of the elements of .
is the harmonic mean.
is the geometric mean of the two values and .
is the arithmetic mean.
is the contraharmonic mean.
is the maximum of the elements of . Sketch of a proof: Without loss of generality let be the values which equal the maximum. Then
Applications
Signal processing
Like a power mean, a Lehmer mean serves a non-linear moving average which is shifted towards small signal values for small and emphasizes big signal values for big . Given an efficient implementation of a moving arithmetic mean called you can implement a moving Lehmer mean according to the following Haskell code.
lehmerSmooth :: Floating a => ([a] -> [a]) -> a -> [a] -> [a]
lehmerSmooth smooth p xs =
zipWith (/)
(smooth (map (**p) xs))
(smooth (map (**(p-1)) xs))
For big it can serve an envelope detector on a rectified signal.
For small it can serve an baseline detector on a mass spectrum.
Gonzalez and Woods call this a "contraharmonic mean filter" described for varying values of p (however, as above, the contraharmonic mean can refer to the specific case ). Their convention is to substitute p with the order of the filter Q:
Q=0 is the arithmetic mean. Positive Q can reduce pepper noise and negative Q can reduce salt noise.
See also
Mean
Power mean
Notes
External links
Lehmer Mean at MathWorld
Means
Articles with example Haskell code
|
https://en.wikipedia.org/wiki/Biological%20functions%20of%20nitric%20oxide
|
Biological functions of nitric oxide are roles that nitric oxide plays within biology.
Nitric oxide (nitrogen monoxide) is a molecule and chemical compound with chemical formula of NO. In mammals including humans, nitric oxide is a signaling molecule involved in several physiological and pathological processes. It is a powerful vasodilator with a half-life of a few seconds in the blood. Standard pharmaceuticals such as nitroglycerine and amyl nitrite are precursors to nitric oxide. Low levels of nitric oxide production are typically due to ischemic damage in the liver.
As a consequence of its importance in neuroscience, physiology, and immunology, nitric oxide was proclaimed "Molecule of the Year" in 1992. Research into its function led to the 1998 Nobel Prize for elucidating the role of nitric oxide as a cardiovascular signalling molecule.
Sources of nitric oxide
Nitric oxide biosynthesis
Platelet-derived factors, shear stress, acetylcholine, and cytokines stimulate the production of NO by endothelial nitric oxide synthase (eNOS). eNOS synthesizes NO from the terminal guanidine-nitrogen of L-arginine and oxygen and yields citrulline as a byproduct. NO production by eNOS is dependent on calcium-calmodulin and other cofactors.
Nitric oxide synthases (NOSs) synthesize the metastable free radical nitric oxide (NO). Three isoforms are known for the NOS enzyme: endothelial (eNOS), neuronal (nNOS), and inducible (iNOS) - each with separate functions. The neuronal enzyme (NOS-1) and the endothelial isoform (NOS-3) are calcium-dependent and produce low levels of this gas as a cell signaling molecule. The inducible isoform (NOS-2) is calcium-independent and produces large amounts of gas that can be cytotoxic.
NOS oxidizes the guanidine group of L-arginine in a process that consumes five electrons and results in the formation of NO with stoichiometric formation of L-citrulline. The process involves the oxidation of NADPH and the reduction of molecular oxygen. The transf
|
https://en.wikipedia.org/wiki/Ami%20Radunskaya
|
Ami Elizabeth Radunskaya is an American mathematician and musician. She is a professor of mathematics at Pomona College, where she specializes in dynamical systems and the applications of mathematics to medicine, such as the use of cellular automata to model drug delivery. In 2016 she was elected as the president of the Association for Women in Mathematics (AWM).
Early life and music
Radunskaya, the daughter of a UC Berkeley economist, began playing the cello as a 9-year-old. After graduating from high school at the age of 16, she took ten years off from her education to work as cellist and music composer, including seven years as a member of the Oakland Symphony. As "a well known Bay Area cellist specializing in new music", she "performed throughout the U.S. and Europe with Don Buchla." In the late 1970s, Buchla Electronic Musical Instruments made a custom synthesizer for her, the "Sili-Con Cello", and several of her works use the radio baton, a controller for electronic music devices in the form of a conductor's baton. One of her cello and radio baton compositions, "A Wild and Reckless Place" (1990), is known for its use of the Bohlen–Pierce scale.
Education
Radunskaya did her undergraduate studies at the University of California, Berkeley, as a single mother. There, she studied computer science and chemistry before eventually majoring in mathematics. She completed her doctorate in mathematics at Stanford University in 1992, under the supervision of Donald Samuel Ornstein; her dissertation was titled Statistical Properties of Deterministic Bernoulli Flows.
Mathematics career
After postdoctoral studies at Rice University, as the only woman in the mathematics department there, she joined the Pomona College faculty in 1994.
In June 2022, the college announced her appointment as the Lingurn H. Burkhead Professor of Mathematics, an endowed chair.
Awards and honors
Radunskaya was the AWM/MAA Falconer Lecturer for 2010, speaking on "Mathematical Challenges in the
|
https://en.wikipedia.org/wiki/LAN%20messenger
|
A LAN Messenger is an instant messaging program for computers designed for use within a single local area network (LAN).
Many LAN Messengers offer basics functionality for sending private messages, file transfer, chatrooms and graphical smileys. The advantage of using a simple LAN messenger over a normal instant messenger is that no active Internet connection or central server is required, and only people inside the firewall will have access to the system.
History
A precursor of LAN Messengers is the Unix talk command, and similar facilities on earlier systems, which enabled multiple users on one host system to directly talk with each other. At the time, computers were usually shared between multiple users, who accessed them through serial or telephone lines.
Novell NetWare featured a trivial person-to-person chat program for DOS, which used the [IPX/SPX] protocol suite. NetWare for Windows also included broadcast and targeted messages similar to WinPopup and the Windows Messenger service.
On Windows, WinPopup was a small utility included with Windows 3.11. WinPopup uses SMB/NetBIOS protocol and was intended to receive and send short text messages.
Windows NT/2000/XP improves upon this with Windows Messenger service, a Windows service compatible to WinPopup. On systems where this service is running, the received messages "pop up" as simple message boxes. Any software compatible with WinPopup, like the console utility NET SEND, can send such messages. However, due to security concerns, by default, the messenger service is off in Windows XP SP2 and blocked by Windows XP's firewall.
On Apple's -based computers, the iChat program has allowed LAN messaging over the Bonjour protocol since 2005. The multi-protocol messenger Pidgin has support for the Bonjour protocol, including on Windows.
See also
Comparison of instant messaging protocols
Comparison of cross-platform instant messaging clients
Comparison of LAN messengers
Friend-to-friend
IRC on LANs
Talker
|
https://en.wikipedia.org/wiki/Peter%20Wildy
|
Norman Peter Leete Wildy (31 March 1920 – 10 March 1987) was a 20th-century British virologist who was an expert on the herpes simplex virus.
Education and personal life
He was born in Tunbridge Wells in Kent on 31 March 1920 the son of Eric Lawrence Wildy (1890–1973) an electrical engineer, and his wife, Gwendolen Leete (1890–1982). He was educated at Eastbourne College. He studied Medicine at Cambridge University graduating MB ChB, and completed his medical training at St Thomas Hospital, London. In 1945 he married Joan Audrey Kenion. They had a son and two daughters.
He was called up and did his National Service as a medical officer with the Kings West African Rifles, serving in Nigeria, India and Egypt.
On his return he worked as a house officer at Greenbank Hospital, Plymouth. Housing was in short supply, so he bought Happy Medium, a retired RAF air-sea rescue launch, which was moored initially on the Cornish side of the Tamar. When he obtained a fellowship at St Thomas's Hospital in London, he sailed the Happy Medium to the more convenient location of Shoreham-by-Sea, near Brighton.
In the early 1950s he achieved a two-year Exchange Fellowship to the University of Melbourne, Australia.
He could play the flute and piccolo, kept Black Welsh Mountain Sheep, and was able to spin and dye wool, was a competent carpenter (he built his own spinning wheel) and capable of other practical activities such re-roofing a barn and re-building rooms in his house.
He died of lung cancer on 10 March 1987 at Cotton Hall in Kedington in Suffolk.
Scientific career
He obtained a research post at the Research Laboratory at St Thomas's Hospital in London, working as a bacteriologist, and was appointed to a lectureship in 1952 and senior lectureship in 1957. During this time he became interested in virology and managed to spend time working with Sir MacFarlane Burnet at the Walter and Eliza Hall Institute in Melbourne, Australia. It was there that he started work on herpes.
H
|
https://en.wikipedia.org/wiki/Diophantus%20II.VIII
|
The eighth problem of the second book of Arithmetica by Diophantus () is to divide a square into a sum of two squares.
The solution given by Diophantus
Diophantus takes the square to be 16 and solves the problem as follows:
To divide a given square into a sum of two squares.
To divide 16 into a sum of two squares.
Let the first summand be , and thus the second . The latter is to be a square. I form the square of the difference of an arbitrary multiple of x diminished by the root [of] 16, that is, diminished by 4. I form, for example, the square of 2x − 4. It is . I put this expression equal to . I add to both sides and subtract 16. In this way I obtain , hence .
Thus one number is 256/25 and the other 144/25. The sum of these numbers is 16 and each summand is a square.
Geometrical interpretation
Geometrically, we may illustrate this method by drawing the circle x2 + y2 = 42 and the line y = 2x - 4. The pair of squares sought are then x02 and y02, where (x0, y0) is the point not on the y-axis where the line and circle intersect. This is shown in the adjacent diagram.
Generalization of Diophantus's solution
We may generalize Diophantus's solution to solve the problem for any given square, which we will represent algebraically as a2. Also, since Diophantus refers to an arbitrary multiple of x, we will take the arbitrary multiple to be tx. Then:
Therefore, we find that one of the summands is and the other is . The sum of these numbers is and each summand is a square. Geometrically, we have intersected the circle x2 + y2 = a2 with the line y = tx - a, as shown in the adjacent diagram. Writing the lengths, OB, OA, and AB, of the sides of triangle OAB as an ordered tuple, we obtain the triple
.
The specific result obtained by Diophantus may be obtained by taking a = 4 and t = 2:
We see that Diophantus' particular solution is in fact a subtly disguised (3, 4, 5) triple. However, as the triple will always be rational as long as a and t are rational, w
|
https://en.wikipedia.org/wiki/Louisiana%20statistical%20areas
|
The U.S. currently has 25 statistical areas that have been delineated by the Office of Management and Budget (OMB). On March 6, 2020, the OMB delineated six combined statistical areas, nine metropolitan statistical areas, and ten micropolitan statistical areas in Louisiana.
Statistical areas
The Office of Management and Budget (OMB) has designated more than 1,000 statistical areas for the United States and Puerto Rico. These statistical areas are important geographic delineations of population clusters used by the OMB, the United States Census Bureau, planning organizations, and federal, state, and local government entities.
The OMB defines a core-based statistical area (commonly referred to as a CBSA) as "a statistical geographic entity consisting of the county or counties (or county-equivalents) associated with at least one core of at least 10,000 population, plus adjacent counties having a high degree of social and economic integration with the core as measured through commuting ties with the counties containing the core." The OMB further divides core-based statistical areas into metropolitan statistical areas (MSAs) that have "a population of at least 50,000" and micropolitan statistical areas (μSAs) that have "a population of at least 10,000, but less than 50,000."
The OMB defines a combined statistical area (CSA) as "a geographic entity consisting of two or more adjacent core-based statistical areas with employment interchange measures of at least 15%." The primary statistical areas (PSAs) include all combined statistical areas and any core-based statistical area that is not a constituent of a combined statistical area.
Table
The table below describes the 25 United States statistical areas and 64 parishes of the State of Louisiana with the following information:
The combined statistical area (CSA) as designated by the OMB.
The CSA population according to 2019 US Census Bureau population estimates.
The core based statistical area (CBSA) as designated by t
|
https://en.wikipedia.org/wiki/Puddle%20%28M.%20C.%20Escher%29
|
Puddle is a woodcut print by the Dutch artist M. C. Escher, first printed in February 1952.
Since 1936, Escher's work had become primarily focused on paradoxes, tessellation and other abstract visual concepts. This print, however, is a realistic depiction of a simple image that portrays two perspectives at once. It depicts an unpaved road with a large pool of water in the middle of it at twilight. Turning the print upside-down and focusing strictly on the reflection in the water, it becomes a depiction of a forest with a full moon overhead. The road is soft and muddy and in it there are two distinctly different sets of tire tracks, two sets of footprints going in opposite directions and two bicycle tracks. Escher has thus captured three elements: the water, sky and earth.
See also
Three Worlds
Sources
Locher, J.L. (2000). The Magic of M. C. Escher. Harry N. Abrams, Inc. .
Works by M. C. Escher
1952 prints
Woodcuts
Water in art
|
https://en.wikipedia.org/wiki/Xak%3A%20The%20Tower%20of%20Gazzel
|
Xak Precious Package: The Tower of Gazzel is a fantasy role-playing video game developed and published by the Japanese software developer MicroCabin. The game is a direct sequel to Xak: The Art of Visual Stage and Xak II: The Rising of the Red Moon. While technically being the third installment of the series, The Tower of Gazzel is a sidestory taking place between the events of Xak II and Xak III. The game was released in Japan only.
Story
After Latok Kart defeated Zamu Gospel during the events portrayed in Xak II, he and his friends are intrigued by rumours of a demonic tower and a man looking like Latok roaming its neighbourhood. The appearance of a false Latok and the kidnapping of Rune Greed's family are ploys to lure the two descendants of Duel into the tower, laid by the villains Al Acrila, Gill Berzes and a demon called Zegraya. Using Latok and Rune, they plan to resurrect the ancient demon Gazzel, a demon with unimaginable power comparable to destroying an entire mountain in a single attack.
Gameplay
The player controls Latok, looking onto the game world in bird's-eye view. Latok can swing his sword, optionally firing magical shots from its tip at the expense of magic points, and jump short distances. The player can choose to take along one of a party of four characters on his exploration of the tower. Each of these so-called 'support members' subtly change Latok's statistics, in addition to triggering different events within the game.
The entirety of the Tower is a large labyrinth spanning six floors, each with an elemental theme: darkness for the basement and respectively earth, fire, water, wind and heaven for the first through fifth floors. The game is one large puzzle with the goal of reaching the bottom floor and defeating Zegraya and Gazzel there. Many of the puzzles revolve around the fact the floors are heavily interconnected. On the floor of fire for example, there is a large wall of flames that Latok cannot pass through in any way. On the water
|
https://en.wikipedia.org/wiki/F-Secure
|
F-Secure Corporation is a global cyber security and privacy company, which has its headquarters in Helsinki, Finland.
The company has offices in Denmark, Finland, France, Germany, India, Italy, Japan, Malaysia, Netherlands, Norway, Poland, Sweden, the United Kingdom and the United States, with a presence in more than 100 countries, and Security Lab operations in Helsinki and in Kuala Lumpur, Malaysia.
F-Secure develops and sells antivirus, VPN, password management, and other consumer cyber security products and services for computers, mobile devices, smart TVs and internet of things devices. The company also offers several free-to-use tools on its website.
History
F-Secure was first established under the name Data Fellows by Petri Allas and Risto Siilasmaa on May 16, 1988. Data Fellows trained computer users and built customized databases. Three years later, the company launched its first major software project and developed the first heuristic scanner for antivirus products. F-Secure’s first antivirus product for Windows PCs was launched in 1994. Data Fellows became F-Secure in 1999. F-Secure was the first company that developed an anti-rootkit technology called BlackLight in 2005.
In June 2015, F-Secure expanded into the enterprise market by acquiring nSense, a Danish company that specializes in security consultation and vulnerability assessment. The purchase of Inverse Path, a privately owned Italian security consultancy with experience in avionics, automative, and industrial control sectors.
F-Secure Client Security received AV-TEST Best Protection award for the fifth time in 2016.
In June 2018, F-Secure acquired security company MWR InfoSecurity for 80 million pounds ($106 million). F-Secure gained the MWR consulting business (now F-Secure Consulting), its threat hunting product, Countercept (now F-Secure Managed Detection and Response), and its suite of phishing protection services, phishd.
February 17th 2022, F-Secure announced a demerger of its cor
|
https://en.wikipedia.org/wiki/Sense%20of%20balance
|
The sense of balance or equilibrioception is the perception of balance and spatial orientation. It helps prevent humans and nonhuman animals from falling over when standing or moving. Equilibrioception is the result of a number of sensory systems working together; the eyes (visual system), the inner ears (vestibular system), and the body's sense of where it is in space (proprioception) ideally need to be intact.
The vestibular system, the region of the inner ear where three semicircular canals converge, works with the visual system to keep objects in focus when the head is moving. This is called the vestibulo-ocular reflex (VOR). The balance system works with the visual and skeletal systems (the muscles and joints and their sensors) to maintain orientation or balance. Visual signals sent to the brain about the body's position in relation to its surroundings are processed by the brain and compared to information from the vestibular and skeletal systems.
Vestibular system
In the vestibular system, equilibrioception is determined by the level of a fluid called endolymph in the labyrinth, a complex set of tubing in the inner ear.
Dysfunction
When the sense of balance is interrupted it causes dizziness, disorientation and nausea. Balance can be upset by Ménière's disease, superior canal dehiscence syndrome, an inner ear infection, by a bad common cold affecting the head or a number of other medical conditions including but not limited to vertigo. It can also be temporarily disturbed by quick or prolonged acceleration, for example, riding on a merry-go-round. Blows can also affect equilibrioreception, especially those to the side of the head or directly to the ear.
Most astronauts find that their sense of balance is impaired when in orbit because they are in a constant state of weightlessness. This causes a form of motion sickness called space adaptation syndrome.
System overview
This overview also explains acceleration as its processes are interconnected with ba
|
https://en.wikipedia.org/wiki/Magnetic%20impurity
|
A magnetic impurity is an impurity in a host metal that has a magnetic moment. The magnetic impurity can then interact with the conduction electrons of the metal, leading to interesting physics such as the Kondo effect, and heavy fermion behaviour. Some examples of magnetic impurities that metals can be doped with are iron and nickel. Such an impurity will contribute a Curie-Weiss term to the magnetic susceptibility,
.
Early theoretical work concentrated on explaining the trend observed as the impurity was varied across the transition metal group. Based on the idea of a virtual bound state, Anderson proposed a model that was successful in explaining the formation of a localized magnetic moment from a magnetic impurity.
See also
Anderson impurity model
Anderson orthogonality theorem
Magnetic semiconductors
|
https://en.wikipedia.org/wiki/Bottle%20dynamo
|
A bottle dynamo or sidewall dynamo is a small electrical generator for bicycles employed to power a bicycle's lights. The traditional bottle dynamo (pictured) is not actually a dynamo at all (which creates DC power), but a low-power magneto that generates AC. Newer models can include a rectifier to create DC output to charge batteries for electronic devices including cellphones or GPS receivers.
Named after their resemblance to bottles, these generators are also called sidewall dynamos because they operate using a roller placed on the sidewall of a bicycle tire. When the bicycle is in motion and the dynamo roller is engaged, electricity is generated as the tire spins the roller.
Two other dynamo systems used on bicycles are hub dynamos and bottom bracket dynamos.
Advantages over hub dynamos
No extra resistance when disengaged When engaged, a dynamo requires the bicycle rider to exert more effort to maintain a given speed than would otherwise be necessary when the dynamo is not present or disengaged. Bottle dynamos can be completely disengaged when they are not in use, whereas a hub dynamo will always have added drag (though it may be so low as to be irrelevant or unnoticeable to the rider, and it is reduced significantly when lights are not being powered by the hub).
Easy retrofitting A bottle dynamo may be more feasible than a hub dynamo to add to an existing bicycle, as it does not require a replacement or rebuilt wheel.
Price A bottle dynamo is generally cheaper than a hub dynamo, but not always.
Disadvantages over hub dynamos
Slippage In wet conditions, the roller on a bottle dynamo can slip against the surface of a tire, which interrupts or reduces the amount of electricity generated. This can cause the lights to go out completely or intermittently. Hub dynamos do not need traction and are sealed from the elements.
Increased resistance Bottle dynamos typically create more drag than hub dynamos. However, when they are properly adjusted, the drag may be
|
https://en.wikipedia.org/wiki/Food%20science
|
Food science is the basic science and applied science of food; its scope starts at overlap with agricultural science and nutritional science and leads through the scientific aspects of food safety and food processing, informing the development of food technology.
Food science brings together multiple scientific disciplines. It incorporates concepts from fields such as chemistry, physics, physiology, microbiology, and biochemistry. Food technology incorporates concepts from chemical engineering, for example.
Activities of food scientists include the development of new food products, design of processes to produce these foods, choice of packaging materials, shelf-life studies, sensory evaluation of products using survey panels or potential consumers, as well as microbiological and chemical testing. Food scientists may study more fundamental phenomena that are directly linked to the production of food products and its properties.
Definition
The Institute of Food Technologists defines food science as "the discipline in which the engineering, biological, and physical sciences are used to study the nature of foods, the causes of deterioration, the principles underlying food processing, and the improvement of foods for the consuming public". The textbook Food Science defines food science in simpler terms as "the application of basic sciences and engineering to study the physical, chemical, and biochemical nature of foods and the principles of food processing".
Disciplines
Some of the subdisciplines of food science are described below.
Food chemistry
Food chemistry is the study of chemical processes and interactions of all biological and non-biological components of foods. The biological substances include such items as meat, poultry, lettuce, beer, and milk.
It is similar to biochemistry in its main components such as carbohydrates, lipids, and protein, but it also includes areas such as water, vitamins, minerals, enzymes, food additives, flavors, and colors. This
|
https://en.wikipedia.org/wiki/Chebyshev%20pseudospectral%20method
|
The Chebyshev pseudospectral method for optimal control problems is based on Chebyshev polynomials of the first kind. It is part of the larger theory of pseudospectral optimal control, a term coined by Ross. Unlike the Legendre pseudospectral method, the Chebyshev pseudospectral (PS) method does not immediately offer high-accuracy quadrature solutions. Consequently, two different versions of the method have been proposed: one by Elnagar et al., and another by Fahroo and Ross. The two versions differ in their quadrature techniques. The Fahroo–Ross method is more commonly used today due to the ease in implementation of the Clenshaw–Curtis quadrature technique (in contrast to Elnagar–Kazemi's cell-averaging method). In 2008, Trefethen showed that the Clenshaw–Curtis method was nearly as accurate as Gauss quadrature.
This breakthrough result opened the door for a covector mapping theorem for Chebyshev PS methods. A complete mathematical theory for Chebyshev PS methods was finally developed in 2009 by Gong, Ross and Fahroo.
Other Chebyshev methods
The Chebyshev PS method is frequently confused with other Chebyshev methods. Prior to the advent of PS methods, many authors proposed using Chebyshev polynomials to solve optimal control problems; however, none of these methods belong to the class of pseudospectral methods.
See also
Legendre pseudospectral method
Ross–Fahroo pseudospectral methods
Ross–Fahroo lemma
Bellman pseudospectral method
DIDO
|
https://en.wikipedia.org/wiki/Isolation%20amplifier
|
Isolation amplifiers are a form of differential amplifier that allow measurement of small signals in the presence of a high common mode voltage by providing electrical isolation and an electrical safety barrier. They protect data acquisition components from common mode voltages, which are potential differences between instrument ground and signal ground. Instruments that are applied in the presence of a common mode voltage without an isolation barrier allow ground currents to circulate, leading in the best case to a noisy representation of the signal under investigation. In the worst case, assuming that the magnitude of common mode voltage or current is sufficient, instrument destruction is likely. Isolation amplifiers are used in medical instruments to ensure isolation of a patient from power supply leakage current.
Amplifiers with an isolation barrier allow the front-end of the amplifier to float with respect to common mode voltage to the limit of the barrier's breakdown voltage, which is often 1,000 volts or more. This action protects the amplifier and the instrument connected to it, while still allowing a reasonably accurate measurement.
These amplifiers are also used for amplifying low-level signals in multi-channel applications. They can also eliminate measurement errors caused by ground loops. Amplifiers with internal transformers eliminate external isolated power supply. They are usually used as analogue interfaces between systems with separated grounds.
Isolation amplifiers may include isolated power supplies for both the input and output stages, or may use external power supplies on each isolated portion.
Concepts
Signal source components
All signal sources are a composite of two major components. The normal mode component (VNM) represents the signal of interest and is the voltage that is applied directly across the inputs of the amplifier. The common mode component (VCM) represents the difference in potential between the low side of the normal mode
|
https://en.wikipedia.org/wiki/Callie%20and%20Marie
|
Callie and Marie are a duo of characters in the Splatoon series. They first appeared in the original Splatoon (2015) as a pop music duo known as the Squid Sisters and have appeared in every subsequent entry in the series. They have been considered the mascots and face of the Splatoon series, appearing in other franchises such as Super Smash Bros. They have starred in real-world concerts in the form of holograms and have established themselves as fan-favorite characters.
Concept and creation
Callie and Marie were created for and first appeared in Splatoon for the Wii U in 2015. They were part of a pop duo known as the Squid Sisters, where they were the hosts of Inkopolis. Their role was to provide updates and map rotations to the player whenever they booted up the game, while being the singers behind some of the games soundtrack, such as "Calamari Inkantation". Callie is voiced by keity.pop, and Marie is voiced by Mari Kikuma. The names Callie and Marie may come from the Italian word calimari.
Despite the duo being referred to as the Squid Sisters, Callie and Marie are actually cousins, and are the granddaughters of Cap’n Craig Cuttlefish, a veteran of a major conflict known as the Great Turf War. The two were born in Calamari County, a rural area hours away from Inkopolis. The two rose to fame after winning a local singing contest in Calamari County, and went on to become the news hosts of Inkopolis. Callie's personality is shown to be energetic and cheerful, while Marie's is more laid back and relaxed.
Appearances
Splatoon
Splatoon was the first game in the Splatoon series, and the first to feature Callie and Marie as characters. Callie and Marie appear as the hosts of the game, and news reporters of Inkopolis. The two also appear in the games campaign under the aliases Agent 1 and 2. During each Splatfest, Callie and Marie would each pick a side and represent it, while performing live in Inkopolis during each Splatfest. The final Splatfest was Callie vs. Ma
|
https://en.wikipedia.org/wiki/Sonia%20Fahmy
|
Sonia Amin Fahmy is a computer scientist specializing in computer networking, including network architectures and communication protocols, and particularly known for her work on clustering in wireless ad hoc networks. She is a professor of computer science at Purdue University.
Education and career
Fahmy studied computer science as an undergraduate at The American University in Cairo, graduating in 1992. After working for two years as a software engineer in Egypt, she went to the Ohio State University for graduate study in computer science, earning a master's degree there in 1996 and completing her Ph.D. in 1999. Her dissertation, Traffic Management for Point-to-Point and Multipoint Available Bit Rate (ABR) Service in Asynchronous Transfer Mode (ATM) Networks, was supervised by Rajendra Jain.
She joined the Purdue University faculty as an assistant professor in 1999, earned tenure as an associate professor there in 2005, and was promoted to full professor in 2011. She was named a University Faculty Scholar for 2015–2020.
Recognition
In 2022, Fahmy was named an IEEE Fellow "for contributions to design and evaluation of network protocols and sensor networks".
|
https://en.wikipedia.org/wiki/Sagitta%20%28optics%29
|
In optics and especially telescope making, sagitta or sag is a measure of the glass removed to yield an optical curve. It is approximated by the formula
,
where is the radius of curvature of the optical surface. The sag is the displacement along the optic axis of the surface from the vertex, at distance from the axis.
A good explanation both of this approximate formula and the exact formula can be found here.
Aspheric surfaces
Optical surfaces with non-spherical profiles, such as the surfaces of aspheric lenses, are typically designed such that their sag is described by the equation
Here, is the conic constant as measured at the vertex (where ). The coefficients describe the deviation of the surface from the axially symmetric quadric surface specified by and .
See also
Versine
Chord
|
https://en.wikipedia.org/wiki/Baculoviral%20IAP%20repeat-containing%20protein%202
|
Baculoviral IAP repeat-containing protein 2 (also known as cIAP1) is a protein that in humans is encoded by the BIRC2 gene.
Function
cIAP1 is a member of the Inhibitor of Apoptosis family that inhibit apoptosis by interfering with the activation of caspases.
Interactions
BIRC2 has been shown to interact with:
CASP9,
DIABLO,
GSPT1,
HSP90B1,
HTRA2,
RIPK1,
RIPK2
TNFSF14,
TRAF1,
TRAF2, and
UBC.
|
https://en.wikipedia.org/wiki/Asset/liability%20modeling
|
Asset/liability modeling is the process used to manage the business and financial objectives of a financial institution or an individual through an assessment of the portfolio assets and liabilities in an integrated manner. The process is characterized by an ongoing review, modification and revision of asset and liability management strategies so that sensitivity to interest rate changes are confined within acceptable tolerance levels.
Different models use different elements based on specific needs and contexts. An individual or an organization may keep parts of the ALM process and outsource the modeling function or adapt the model according to the requirements and capabilities of relevant institutions such as banks, which often have their in-house modeling process. There is a vast array of models available today for practical asset and liability modeling and these have been the subject of several research studies.
Asset/liability modeling (pension)
In 2008, a financial crisis drove the 100 largest corporate pension plans to a record $300 billion loss of funded status. In the wake of those losses, many pension plan sponsors reexamined their pension plan asset allocation strategies, to consider risk exposures. A recent study indicates that many corporate defined benefit plans fail to address the full range of risks facing them, especially the ones related to liabilities. Too often, the study says, corporate pensions are distracted by concerns that have nothing to do with the long-term health of the fund. Asset/liability modeling is an approach to examining pension risks and allows the sponsor to set informed policies for funding, benefit design and asset allocation.
Asset/liability modeling goes beyond the traditional, asset-only analysis of the asset-allocation decision. Traditional asset-only models analyze risk and rewards in terms of investment performance. Asset/liability models take a comprehensive approach to analyze risk and rewards in terms of the overa
|
https://en.wikipedia.org/wiki/Andreaea%20rothii
|
Andreaea rothii, or Roth's andreaea moss, is a species of moss in the family Andreaeaceae native to North America and parts of Europe. This plant was described in 1807 by Weber and Mohr.
Description
Andreaea rothii gametophytes sometimes form extensive black to brown cushion-like patches, with individual shoots erect and less than 2 cm tall. The leaves of Andreaea rothii are 1-2 cm wide, and have a strong costa, which is roughly synonymous to a midrib. The leaves can be falcate-secund, curving to one side of the plant. This is especially true when wet, however the plants do not alter much when dry. The outline of the leaf is pear-shaped, swelling at the base and tapering to a tip, and can also be strongly curved depending on subspecies.
Distribution
Andreaea rothii grows on rocks that are wet, acidic, and exposed. This species is found anywhere from areas of high elevation to sea-level.
Reproduction
Andreae rothii gametophytes can be gonioautoicous—meaning the antheridia are bud-like in the axil of an archegonial branch—or cladautoicous—meaning the antheridia and archegonia are found on different branches of the same plant. Like all of the Andreaeaceae, sporangia are elevated on a pseudopodium, a structure resembling a seta but composed of gametophyte tissue rather than sporophyte tissue. The sporangia will dehisce longitudinally, forming slits through which spores are dispersed. This pattern of dehiscence gives the genus its common name: "Lantern mosses".
|
https://en.wikipedia.org/wiki/LExEN
|
LExEN, an acronym for Life in Extreme Environments, is a research program overseen by the National Science Foundation. It was originally developed by G. Michael Purdy in 1997 as an area of research in which scientists could seek funding for activities in the polar regions. Participating were the Directorates for Biological Sciences, Mathematical and Physical Sciences, Engineering, Geosciences, and the Office of Polar Programs of the National Science Foundation. The program sought to place a strong emphasis upon those life-supporting environments that exist near the extremes of planetary conditions. The study of extreme habitats, both planetary and extra-planetary, was underpinned by the idea that "deep understanding of certain earth-bound microbial systems would provide important insights into life-sustaining processes and the origin of life on our own planet, while illuminating the search for life in other planetary environments."
In 1999 it was announced that the future of LExEN was still under consideration but despite the lack of research in the topic, the program no longer appears on the NSF A-Z Index of Funding Opportunities.
LExEN Award Winners
Jan P. Amend Washington University in St. Louis Growth Media for Hyperthermophiles: Geochemical Constraints on Realistic Carbon and Energy Sources in Shallow Marine Hydrothermal Systems
Ariel D. Anbar University of Rochester Biogenic Fractionations of Transition Metal Isotopes: Novel Methods for the Examination of Life in Extreme Environments
Douglas H. Bartlett Scripps Institution of Oceanography Characterization of the Upper Pressure Limits for Microbial Life
Don K. Button University of Alaska Characteristics of Bacteria Native to Extremely Dilute Environments
David A. Caron Woods Hole Oceanographic Institution Protistan Biodiversity in Antarctic Marine Ecosystems: Molecular Biological and Traditional Approaches
James P. Cowen University of Hawaii Collaborative Research: Development of Capability to Measure Pro
|
https://en.wikipedia.org/wiki/Shedun
|
Shedun is a family of malware software (also known as Kemoge, Shiftybug and Shuanet) targeting the Android operating system first identified in late 2015 by mobile security company Lookout, affecting roughly 20,000 popular Android applications. Lookout claimed the HummingBad malware was also a part of the Shedun family, however, these claims were refuted.
Avira Protection Labs stated that Shedun family malware is detected to cause approximately 1500-2000 infections per day.
All three variants of the virus are known to share roughly ~80% of the same source code.
In mid 2016, arstechnica reported that approximately 10.000.000 devices would be infected by this malware and that new infections would still be surging.
The malware's primary attack vector is repackaging legitimate Android applications (e.g. Facebook, Twitter, WhatsApp, Candy Crush, Google Now, Snapchat) with adware included. The app which remains functional is then released to a third party app store; once downloaded, the application generates revenue by serving ads (estimated to amount to $2 US per installation), most users cannot get rid of the virus without getting a new device, as the only other way to get rid of the malware is to root affected devices and re-flash a custom ROM.
In addition, Shedun-type malware has been detected pre-installed on 26 different types of Chinese Android-based hardware such as Smartphones and Tablet computers.
Shedun-family malware is known for auto-rooting the Android OS using well-known exploits like ExynosAbuse, Memexploit and Framaroot (causing a potential privilege escalation) and for serving trojanized adware and installing themselves within the system partition of the operating system, so that not even a factory reset can remove the malware from infected devices.
Shedun malware is known for targeting the Android Accessibility Service, as well as for downloading and installing arbitrary applications (usually adware) without permission. It is classified as "agg
|
https://en.wikipedia.org/wiki/Jos%C3%A9%20Luis%20Rodr%C3%ADguez%20Pitt%C3%AD
|
José Luis Rodríguez Pittí is a contemporary writer, videoartist and documentary photographer.
He is the author of short stories, poems and essays. Rodríguez Pittí is author of the books Panamá Blues (2010, miniTEXTOS (2008), Sueños urbanos (2008) and Crónica de invisibles (1999). Most of his stories and essays were published in literary magazines and newspapers.
In 1994, the Universidad de Panamá awarded him with the Premio "Darío Herrera". Other literary honors received are Accesit in the Premio Nacional "Signos" 1993 (Panamá), Concurso Nacional de Cuentos "José María Sánchez" 1998 (Panamá), Concurso "Amadís de Gaula" 1999 (Soria, España) and the Concurso "Maga" de Cuento Corto 2001 (Panamá)
Early life and education
Rodríguez Pittí was born in Panama City on 29 March 1971. He grew up in Mexico City, Santiago de Veraguas and Panamá City. He is resident of Toronto, Canada.
Graduated from the Universidad Tecnológica de Panamá, was Computer Vision, Programming Languages and Deep Learning Professor at the Universidad Tecnológica de Panamá and Universidad Santa María la Antigua.
Biography
President of the Writers Association of Panama from 2008 to 2010. Founder and President of Fundación El Hacedor (since 2007).
From 1990 to 1995 he traveled extensively in the Panamanian region of Azuero to collect stories and photograph, the body of three photo essays: "Viernes Santo en Pesé", "Cuadernos de Azuero", and "Noche de carnaval". Other photography essays are "De diablos, diablicos y otros seres de la mitología panameña" and "Regee Child". Some of his photographs are cover art of books published in Panamá. His work has been exhibited in Panamá, México, Canadá and Italy.
Awards and honors
1993, Finalista, Premio "Signos" de Joven Literatura 1993 otorgado en Panamá
1994, Premio "Darío Herrera" de Literatura otorgado por la Universidad de Panamá
1994, Premio Canon "Día de la Tierra"
1998, Accésit, Premio Nacional de Cuento "José María Sánchez" 1998 otorgado en Panamá
|
https://en.wikipedia.org/wiki/Sorbic%20acid
|
Sorbic acid, or 2,4-hexadienoic acid, is a natural organic compound used as a food preservative. It has the chemical formula and the structure . It is a colourless solid that is slightly soluble in water and sublimes readily. It was first isolated from the unripe berries of the Sorbus aucuparia (rowan tree), hence its name.
Production
The traditional route to sorbic acid involves condensation of malonic acid and crotonaldehyde. It can also be prepared from isomeric hexadienoic acids, which are available via a nickel-catalyzed reaction of allyl chloride, acetylene, and carbon monoxide. The route used commercially, however, is from crotonaldehyde and ketene. An estimated 30,000 tons are produced annually.
History
Sorbic acid was isolated in 1859 by distillation of rowanberry oil by A. W. von Hofmann. This affords parasorbic acid, the lactone of sorbic acid, which he converted to sorbic acid by hydrolysis. Its antimicrobial activities were discovered in the late 1930s and 1940s, and it became commercially available in the late 1940s and 1950s. Beginning in the 1980s, sorbic acid and its salts were used as inhibitors of Clostridium botulinum in meat products to replace the use of nitrites, which can produce carcinogenic nitrosamines.
Properties and uses
With a pKa of 4.76, sorbic acid is about as acidic as acetic acid.
Sorbic acid and its salts, especially potassium sorbate and calcium sorbate, are antimicrobial agents often used as preservatives in food and drinks to prevent the growth of mold, yeast, and fungi. In general the salts are preferred over the acid form because they are more soluble in water, but the active form is the acid. The optimal pH for the antimicrobial activity is below pH 6.5. Sorbates are generally used at concentrations of 0.025% to 0.10%. Adding sorbate salts to food will, however, raise the pH of the food slightly so the pH may need to be adjusted to assure safety. It is found in foods such as various kinds of cheese, bread, muffins, donu
|
https://en.wikipedia.org/wiki/Toxophore
|
A toxophore is the chemical group that produces the toxic effect in a toxin molecule: commonly used in pharmaceutical and pesticide sciences.
|
https://en.wikipedia.org/wiki/Void%20type
|
The void type, in several programming languages derived from C and Algol68, is the return type of a function that returns normally, but does not provide a result value to its caller. Usually such functions are called for their side effects, such as performing some task or writing to their output parameters. The usage of the void type in such context is comparable to procedures in Pascal and syntactic constructs which define subroutines in Visual Basic. It is also similar to the unit type used in functional programming languages and type theory. See Unit type#In programming languages for a comparison.
C and C++ also support the pointer to void type (specified as void *), but this is an unrelated notion. Variables of this type are pointers to data of an unspecified type, so in this context (but not the others) void * acts roughly like a universal or top type. A program can convert a pointer to any type of data (except a function pointer) to a pointer to void and back to the original type without losing information, which makes these pointers useful for polymorphic functions. The C language standard does not guarantee that the different pointer types have the same size or alignment.
In C and C++
A function with void result type ends either by reaching the end of the function or by executing a return statement with no returned value. The void type may also replace the argument list of a function prototype to indicate that the function takes no arguments. Note that in all of these situations, void is not a type qualifier on any value. Despite the name, this is semantically similar to an implicit unit type, not a zero or bottom type (which is sometimes confusingly called the "void type"). Unlike a real unit type which is a singleton, the void type lacks a way to represent its value and the language does not provide any way to declare an object or represent a value with type void.
In the earliest versions of C, functions with no specific result defaulted to a return t
|
https://en.wikipedia.org/wiki/Orlah
|
The prohibition on orlah fruit (lit. "uncircumcised" fruit) is a command found in the Bible not to eat fruit produced by a tree during the first three years after planting.
In rabbinical writings, the orlah prohibition () is counted as one of the negative commandments among the 613 commandments. Outside of the land of Israel the prohibition also applies to a certain degree.
Etymology
The Hebrew word literally means "uncircumcised". The use of this term is explained by Shlomo Ephraim Luntschitz as meaning "hidden and sealed" and it alludes to the creation itself.
Context
Commentators generally assume that the law was good agricultural practice, and that early harvesting would conflict with careful cultivation and pruning during the first three years in order to insure later good harvests and allow maturing of the trees. Grape vines produce fruit in three to six years, almond trees produce some flower buds in the fourth year and some fruit in the fifth, and sources from the Ancient Near East suggest that a good crop of dates was expected in the fourth year. In discussing the commandment that the fruit could not actually be eaten until the fifth year, Rooker (2000) notes that in the Code of Hammurabi a tenant-gardener could not eat of the fruit of an orchard until the fifth year, when he shared the produce with the owner.
Rabbinical writings
The Mishna stipulates that Orlah fruit must be burnt to guarantee that no one benefits from them, and even a garment dyed by way of pigment derived from Orlah is to be destroyed. The ancient custom in the Land of Israel was to mark the ground surrounding Orlah-plantings with crushed potsherds (), so as to signify that the fruit grown on the trees are forbidden to be eaten until after the first three years.
The Sifra points out that the three year count begins on Rosh HaShana (the Jewish new year) and not "tree years" (the Jewish agricultural holiday of Tu Bishvat). Thus, the fruit of a tree only two years and 30 days old
|
https://en.wikipedia.org/wiki/Credit%20valuation%20adjustment
|
Credit valuation adjustments (CVAs) are accounting adjustments made to reserve a portion of profits on uncollateralized financial derivatives. They are charged by a bank to a risky (capable of default) counterparty to compensate the bank for taking on the credit risk of the counterparty during the life of the transaction. These most common transaction types are interest rate derivatives, foreign exchange derivatives, and combinations thereof. The reserved profits can be viewed mathematically as the net present value of the credit risk embedded in the transaction.
In financial mathematics one defines CVA as the difference between the risk-free portfolio value and the true portfolio value that takes into account the possibility of a counterparty's default. In other words, CVA is the market value of counterparty credit risk. This price depends on counterparty credit spreads as well as on the market risk factors that drive derivatives' values and, therefore, exposure. CVA is one of a family of related valuation adjustments, collectively xVA; for further context here see .
Unilateral CVA is given by the risk-neutral expectation of the discounted loss. The risk-neutral expectation can be written as
where is the maturity of the longest transaction in the portfolio, is the future value of one unit of the base currency invested today at the prevailing interest rate for maturity , is the loss given default, is the time of default, is the exposure at time , and is the risk neutral probability of counterparty default between times and . These probabilities can be obtained from the term structure of credit default swap (CDS) spreads.
More generally CVA can refer to a few different concepts:
The mathematical concept as defined above;
A part of the regulatory Capital and RWA (risk-weighted asset) calculation introduced under Basel 3;
The CVA desk of an investment bank, whose purpose is to:
hedge for possible losses due to counterparty default;
hedge to reduce
|
https://en.wikipedia.org/wiki/Beta%20helix
|
A beta helix is a tandem protein repeat structure formed by the association of parallel beta sheet in a helical pattern with either two or three faces. The beta helix is a type of solenoid protein domain. The structure is stabilized by inter-strand hydrogen bonds, protein-protein interactions, and sometimes bound metal ions. Both left- and right-handed beta helices have been identified. These structures are distinct from jelly-roll folds, a different protein structure sometimes known as a "double-stranded beta helix".
The first beta-helix was observed in the enzyme pectate lyase, which contains a seven-turn helix that reaches 34 Å (3.4 nm) long. The P22 phage tail spike protein, a component of the P22 bacteriophage, has 13 turns and in its assembled homotrimer is 200 Å (20 nm) in length. Its interior is close-packed with no central pore and contains both hydrophobic residues and charged residues neutralized by salt bridges.
Both pectate lyase and P22 tailspike protein contain right-handed helices; left-handed versions have been observed in enzymes such as UDP-N-acetylglucosamine acyltransferase and archaeal carbonic anhydrase. Other proteins that contain beta helices include the antifreeze proteins from the beetle Tenebrio molitor (right-handed) and from the spruce budworm, Choristoneura fumiferana (left-handed), where regularly spaced threonines on the β-helices bind to the surface of ice crystals and inhibit their growth.
Beta helices can associate with each other effectively, either face-to-face (mating the faces of their triangular prisms) or end-to-end (forming hydrogen bonds). Hence, β-helices can be used as "tags" to induce other proteins to associate, similar to coiled coil segments.
Members of the pentapeptide repeat family have been shown to possess a quadrilateral beta-helix structure.
|
https://en.wikipedia.org/wiki/Elicitation%20technique
|
An elicitation technique is any of a number of data collection techniques used in anthropology, cognitive science, counseling, education, knowledge engineering, linguistics, management, philosophy, psychology, or other fields to gather knowledge or information from people. Recent work in behavioral economics has purported that elicitation techniques can be used to control subject misconceptions and mitigate errors from generally accepted experimental design practices. Elicitation, in which knowledge is sought directly from human beings, is usually distinguished from indirect methods such as gathering information from written sources.
A person who interacts with human subjects in order to elicit information from them may be called an elicitor, an analyst, experimenter, or knowledge engineer, depending on the field of study.
Elicitation techniques include interviews, observation of either naturally occurring behavior (including as part of participant observation) or behavior in a laboratory setting, or the analysis of assigned tasks.
List of elicitation techniques
Interviews
Existing System
Project Scope
Brain Storming
Focus Groups
Exploratory Prototypes
User Task Analysis
Observation
Surveys
Questionnaire
Story Board
|
https://en.wikipedia.org/wiki/Sea%20spray
|
Sea spray are aerosol particles formed from the ocean, mostly by ejection into Earth's atmosphere by bursting bubbles at the air-sea interface. Sea spray contains both organic matter and inorganic salts that form sea salt aerosol (SSA). SSA has the ability to form cloud condensation nuclei (CCN) and remove anthropogenic aerosol pollutants from the atmosphere. Coarse sea spray has also been found to inhibit the development of lightning in storm clouds.
Sea spray is directly (and indirectly, through SSA) responsible for a significant degree of the heat and moisture fluxes between the atmosphere and the ocean, affecting global climate patterns and tropical storm intensity. Sea spray also influences plant growth and species distribution in coastal ecosystems and increases corrosion of building materials in coastal areas.
Generation
Formation
When wind, whitecaps, and breaking waves mix air into the sea surface, the air regroups to form bubbles, floats to the surface, and bursts at the air-sea interface. When they burst, they release up to a thousand particles of sea spray, which range in size from nanometers to micrometers and can be expelled up to 20 cm from the sea surface. Film droplets make up the majority of the smaller particles created by the initial burst, while jet droplets are generated by a collapse of the bubble cavity and are ejected from the sea surface in the form of a vertical jet. In windy conditions, water droplets are mechanically torn off from crests of breaking waves. Sea spray droplets generated via such a mechanism are called spume droplets and are typically larger in size and have less residence time in air. Impingement of plunging waves on sea surface also generates sea spray in the form of splash droplets . The composition of the sea spray depends primarily on the composition of the water from which it is produced, but broadly speaking is a mixture of salts and organic matter. Several factors determine the production flux of sea spray, e
|
https://en.wikipedia.org/wiki/Alzheimer%27s%20disease%20in%20the%20media
|
This article provides a list of media documents portraying Alzheimer's disease as a critical feature of the main plot:
1949
Death of a Salesman; While not mentioned in the script by name, Willy Loman exhibits many notable signs of the disease.
1981
Chillysmith Farm; This film documents the aging and death of a grandfather in the bosom of his family, so that he could live and die among the people he loved
1986
Sonia by Paule Baillargeon
"I Forget" by SNFU from If You Swear, You'll Catch No Fish
1987
An Alzheimer's Story This documentary provides the rare opportunity of following a family with an Alzheimer's victim for two years
The More We Get Together The More We Get Together gives insights into working with very old, disoriented, nursing home residents (Demented).
No Place Like Home: Long Term Care For the Elderly Providing home care rather than institutionalized care is often less costly to the public and more desirable for the older person (including frail and demented).
1988
Aging in Soviet Georgia: A Toast to Sweet Old Age An in-depth look at the culture and experience of normal aging in the area of the world often called an "epicenter of longevity."
1990
Can't Afford to Grow Old The reality of aging is that there is no help in paying for a nurse or a housekeeper if you become disabled and need assistance
1992
Communicating With The "Alzheimer-Type" Population The two vignettes depicted in this video show typical examples of troublesome behavior in very old people who are disoriented
1993
Black Daisies for The Bride: A filmed play written by the poet Tony Harrison, based on the lives and experiences of people with Alzheimer's living in High Royds Hospital, Yorkshire. The play uses a combination of drama, documentary and music. The patients, their families and the staff play themselves, with the exception of a few professional actors.
1994
Complaints of a Dutiful Daughter by Deborah Hoffmann
1996
Forget Me Never When Diana Mc
|
https://en.wikipedia.org/wiki/Alais%20meteorite
|
Alais or Allais is the first carbonaceous chondrite meteorite identified. It fell near Alès in 1806 in multiple fragments which together weighed , although only remains. The meteorite contains a number of elements in similar proportions to the Solar System in its primordial state. It also contains organic compounds and water. It has proved to be one of the most important meteorites discovered in France.
History
At 17:00 on 15 March 1806, two detonations were heard near Alès in Gard, France. Shortly afterwards, two soft black stones were discovered in the villages of Saint-Étienne-de-l'Olm and Castelnau-Valence, weighing and respectively. The fragments were collected by people who observed the impact and given to two scientists that lived locally. The meteorite was analysed by Louis Jacques Thénard, who published a study in 1807, showing that it had a high carbon content. It was initially doubted that the fragments were of non-terrestrial origins as their attributes were markedly different to existing meteorites. However, it was increasingly realised that this was a new, albeit rare, type of meteorite. The meteorite is also known as Valence.
Curation and distribution
As an early fall (soon after the consensus that meteorites were real, extraterrestrial phenomenon), Alais has largely been dispersed. Few samples have been preserved, less than Orgueil, but more than Tonk and particularly Revelstoke.
Source: Grady, M. M. Catalogue of Meteorites, 5th Edition, Cambridge University Press
Description
Overview
The Alais meteorite is one of the most important meteorites in France. It is black with loose friable textures with a low density of less than . Originally consisting of fragments that together weighed , it has been subject to substantial scientific examination and currently only remains. A fragment, weighing is held by the National Museum of Natural History, France.
Composition and classification
The meteorite is one of five known meteorites belonging to the
|
https://en.wikipedia.org/wiki/Intermediate%20Math%20League%20of%20Eastern%20Massachusetts
|
The Intermediate Math League of Eastern Massachusetts (or IMLEM) is a math league for middle schools across Eastern Massachusetts. A brief history of IMLEM is given in its By-Laws:
Schools
As of 2017, 86 different schools attend the competition. Each school is allowed to send more than 1 team and each team can consist of at most 10 people. Alternates, people who are not officially part of team, can be taken too. There are a total of 15 different geographic clusters of schools and there is even a cluster of schools from Pennsylvania. The schools are then separated into different divisions with the schools in each division be approximately the same level. Schools can then make their way up through divisions to try to get into the top division, which is the Lexington Division. In total there are 13 divisions.
Schools may send more than one team, however no student can compete on more than one team in a year. Also, a school may send alternates to gain the experience of a meet.
Meets
IMLEM has five meets every year, one in October, November, January, February, and March. For the first three meets, no calculators or external aids of any sort are allowed for any round. However, for the last two meets, calculators without programming or graphing capabilities, and without a QWERTY keyboard, are allowed for all rounds.
Meets are held at distinct locations for each of the ten geographic clusters. Schools within the clusters generally hold at most one of the meets. Each of the meets are generally held on the same day by all clusters; however for scheduling conflicts, schools may host meets on other days.
There are five individual categories, and they are: Mystery, Geometry, Number Theory, Arithmetic, and Algebra. Each individual round contains three questions, varying in content but focusing on topics published by the test writer. Questions in individual rounds are worth 2 points each. (Before this was the case, questions would be worth the question number, i.e., one poi
|
https://en.wikipedia.org/wiki/Gaudin%20model
|
In physics, the Gaudin model, sometimes known as the quantum Gaudin model, is a model, or a large class of models, in statistical mechanics first described in its simplest case by Michel Gaudin. They are exactly solvable models, and are also examples of quantum spin chains.
History
The simplest case was first described by Michel Gaudin in 1976, with the associated Lie algebra taken to be , the two-dimensional special linear group.
Mathematical formulation
Let be a semi-simple Lie algebra of finite dimension .
Let be a positive integer. On the complex plane , choose different points, .
Denote by the finite-dimensional irreducible representation of corresponding to the dominant integral element . Let be a set of dominant integral weights of . Define the tensor product .
The model is then specified by a set of operators acting on , known as the Gaudin Hamiltonians. They are described as follows.
Denote by the invariant scalar product on (this is often taken to be the Killing form). Let be a basis of and be the dual basis given through the scalar product. For an element , denote by the operator which acts as on the th factor of and as identity on the other factors. Then
These operators are mutually commuting. One problem of interest in the theory of Gaudin models is finding simultaneous eigenvectors and eigenvalues of these operators.
Instead of working with the multiple Gaudin Hamiltonians, there is another operator , sometimes referred to as the Gaudin Hamiltonian. It depends on a complex parameter , and also on the quadratic Casimir, which is an element of the universal enveloping algebra , defined as
This acts on representations by multiplying by a number dependent on the representation, denoted . This is sometimes referred to as the index of the representation. The Gaudin Hamiltonian is then defined
Commutativity of for different values of follows from the commutativity of the .
Higher Gaudin Hamiltonians
When has rank greater than
|
https://en.wikipedia.org/wiki/Structure-based%20combinatorial%20protein%20engineering
|
Structure-based combinatorial protein engineering (SCOPE) is a synthetic biology technique for creating gene libraries (lineages) of defined composition designed from structural and probabilistic constraints of the encoded proteins. The development of this technique was driven by fundamental questions about protein structure, function, and evolution, although the technique is generally applicable for the creation of engineered proteins with commercially desirable properties. Combinatorial travel through sequence spacetime is the goal of SCOPE.
Description
At its inception, SCOPE was developed as a homology-independent recombination technique to enable the creation of multiple crossover libraries from distantly related genes. In this application, an “exon plate tectonics” design strategy was devised to assemble “equivalent” elements of structure (continental plates) with variability in the junctions linking them (fault lines) to explore global protein space. To create the corresponding library of genes, the breeding scheme of Gregor Mendel was adapted into a PCR strategy to selectively cross hybrid genes, a process of iterative inbreeding to create all possible combinations of coding segments with variable linkages. Genetic complementation in temperature-sensitive E. coli was used as the selection system to successfully identify functional hybrid DNA polymerases of minimal architecture with enhanced phenotypes.
SCOPE was then used to construct a synthetic enzyme lineage, which was biochemically characterized to recapitulate the evolutionary divergence of two modern day enzymes. The rapid evolvability of chemical diversity in terpene synthases were demonstrated through processes akin to both Darwinian gradualism and saltation: some mutational pathways show steady, additive changes, whereas others show drastic jumps between contrasting product specificities with single mutational steps. Further, a metric was devised to describe the chemical distance of mutational ste
|
https://en.wikipedia.org/wiki/Avenanthramide
|
Avenanthramides (anthranilic acid amides, formerly called "avenalumins") are a group of phenolic alkaloids found mainly in oats (Avena sativa), but also present in white cabbage butterfly eggs (Pieris brassicae and P. rapae), and in fungus-infected carnation (Dianthus caryophyllus). A number of studies demonstrate that these natural products have anti-inflammatory, antioxidant, anti-itch, anti-irritant, and antiatherogenic activities. Oat kernel extracts with standardized levels of avenanthramides are used for skin, hair, baby, and sun care products. The name avenanthramides was coined by Collins when he reported the presence of these compounds in oat kernels. It was later found that three avenanthramides were the open-ring amides of avenalumins I, II, and III, which were previously reported as oat phytoalexins by Mayama and co-workers.
History
Oat has been used for personal care purposes since antiquity. Indeed, wild oats (Avena sativa) was used in skin care in Egypt and the Arabian peninsula 2000 BC. Oat baths were a common treatment of insomnia, anxiety, and skin diseases such as eczema and burns. In Roman times, its use as a medication for dermatological issues was reported by Pliny, Columella, and Theophrastus. In the 19th century, oatmeal baths were often used to treat many cutaneous conditions, especially pruritic inflammatory eruptions. In the 1930s, the literature provided further evidence about the cleansing action of oat along with its ability to relieve itching and protect skin.
Colloidal oatmeal
In 2003, colloidal oatmeal was officially approved as a skin protectant by the FDA. However, little thought had been given to the active ingredient in oats responsible for the anti-inflammatory effect until more attention was paid to avenanthramides, which were first isolated and characterized in the 1980s by Collins.
Since then, many congeners have been characterized and purified, and it is known that avenanthramides have antioxidant, anti-inflammatory, and
|
https://en.wikipedia.org/wiki/Pheromone
|
A pheromone () is a secreted or excreted chemical factor that triggers a social response in members of the same species. Pheromones are chemicals capable of acting like hormones outside the body of the secreting individual, to affect the behavior of the receiving individuals. There are alarm pheromones, food trail pheromones, sex pheromones, and many others that affect behavior or physiology. Pheromones are used by many organisms, from basic unicellular prokaryotes to complex multicellular eukaryotes. Their use among insects has been particularly well documented. In addition, some vertebrates, plants and ciliates communicate by using pheromones. The ecological functions and evolution of pheromones are a major topic of research in the field of chemical ecology.
Background
The portmanteau word "pheromone" was coined by Peter Karlson and Martin Lüscher in 1959, based on the Greek φέρω phérō ('I carry') and ὁρμων hórmōn ('stimulating'). Pheromones are also sometimes classified as ecto-hormones. They were researched earlier by various scientists, including Jean-Henri Fabre, Joseph A. Lintner, Adolf Butenandt, and ethologist Karl von Frisch who called them various names, like for instance "alarm substances". These chemical messengers are transported outside of the body and affect neurocircuits, including the autonomous nervous system with hormone or cytokine mediated physiological changes, inflammatory signaling, immune system changes and/or behavioral change in the recipient. They proposed the term to describe chemical signals from conspecifics that elicit innate behaviors soon after the German biochemist Adolf Butenandt had characterized the first such chemical, bombykol, a chemically well-characterized pheromone released by the female silkworm to attract mates.
Categorization by function
Aggregation
Aggregation pheromones function in mate choice, overcoming host resistance by mass attack, and defense against predators. A group of individuals at one location is refe
|
https://en.wikipedia.org/wiki/RNase%20PH
|
RNase PH is a tRNA nucleotidyltransferase, present in archaea and bacteria, that is involved in tRNA processing. Contrary to hydrolytic enzymes, it is a phosphorolytic enzyme, meaning that it uses inorganic phosphate as a reactant to cleave nucleotide-nucleotide bonds, releasing diphosphate nucleotides. The active structure of the proteins is a homohexameric complex, consisting of three ribonuclease (RNase) PH dimers. RNase PH has homologues in many other organisms, which are referred to as RNase PH-like proteins. The part of another larger protein with a domain that is very similar to RNase PH is called an RNase PH domain (RPD).
See also
Two highly related exoribonuclease complexes:
Polynucleotide phosphorylase
Exosome complex
|
https://en.wikipedia.org/wiki/Locally%20testable%20code
|
A locally testable code is a type of error-correcting code for which it can be determined if a string is a word in that code by looking at a small (frequently constant) number of bits of the string. In some situations, it is useful to know if the data is corrupted without decoding all of it so that appropriate action can be taken in response. For example, in communication, if the receiver encounters a corrupted code, it can request the data be re-sent, which could increase the accuracy of said data. Similarly, in data storage, these codes can allow for damaged data to be recovered and rewritten properly.
In contrast, locally decodable codes use a small number of bits of the codeword to probabilistically recover the original information. The fraction of errors determines how likely it is that the decoder correctly recovers the original bit; however, not all locally decodable codes are locally testable.
Clearly, any valid codeword should be accepted as a codeword, but strings that are not codewords could be only one bit off, which would require many (certainly more than a constant number) probes. To account for this, testing failure is only defined if the string is off by at least a set fraction of its bits. This implies words of the code must be longer than the input strings by adding some redundancy.
Definition
To measure the distance between two strings, the Hamming distance is used
The distance of a string from a code is computed by
Relative distances are computed as a fraction of the number of bits
A code is called -local -testable if there exists a Turing machine M given random access to an input that makes at most non-adaptive queries of and satisfies the following:
For any and , . In other words, M accepts given access to any codeword of C.
For such that , . M must reject strings -far from C at least half the time.
Also the rate of a code is the ratio between its message length and codeword length
Limits
It remains an open question whe
|
https://en.wikipedia.org/wiki/Treadwheel
|
A treadwheel, or treadmill, is a form of engine typically powered by humans. It may resemble a water wheel in appearance, and can be worked either by a human treading paddles set into its circumference (treadmill), or by a human or animal standing inside it (treadwheel). These devices are no longer used for power or punishment, and the term "treadmill" has come to mean an exercise machine for running, walking or other exercises in place.
History
Uses of treadwheels included raising water, to power cranes, or grind grain. They were used extensively in the Greek and Roman world, such as in the reverse overshot water-wheel used for dewatering purposes. They were widely used in the Middle ages to lift the stones in the construction of Gothic cathedrals. There is a literary reference to one in 1225, and one treadwheel crane survives at Chesterfield, Derbyshire and is housed in the Museum. It has been dated to the early 14th century and was housed in the top of the church tower until its removal in 1947. They were used extensively in the Renaissance famously by Brunelleschi during the construction of Florence cathedral.
Penal treadmills were used in prisons during the early Victorian period in the UK as a form of punishment. According to The Times in 1827, and reprinted in William Hone's Table-Book in 1838, the amount prisoners walked per day on average varied, from the equivalent of 6,600 vertical feet at Lewes to as much as 17,000 vertical feet in ten hours during the summertime at Warwick gaol. In 1902, the British government banned the use of the treadwheel as a form of punishment.
See also
Chain pump
The Experiment, a horse-powered boat
Horse mill
List of historical harbour cranes
Treadwheel crane
|
https://en.wikipedia.org/wiki/Degree%20of%20truth
|
In classical logic, propositions are typically unambiguously considered as being true or false. For instance, the proposition one is both equal and not equal to itself is regarded as simply false, being contrary to the Law of Noncontradiction; while the proposition one is equal to one is regarded as simply true, by the Law of Identity. However, some mathematicians, computer scientists, and philosophers have been attracted to the idea that a proposition might be more or less true, rather than wholly true or wholly false. Consider My coffee is hot.
In mathematics, this idea can be developed in terms of fuzzy logic. In computer science, it has found application in artificial intelligence. In philosophy, the idea has proved particularly appealing in the case of vagueness. Degrees of truth is an important concept in law.
The term is an older concept than conditional probability. Instead of determining the objective probability, only a subjective assessment is defined. Especially for novices in the field, the chance for confusion is high. They are highly likely to confound the concept of probability with the concept of degree of truth. To overcome the misconception, it makes sense to see probability theory as the preferred paradigm to handle uncertainty.
In adjudicative processes, 'substantive truth' is distinct from 'formal legal truth' which comes in four degrees: hearsay, balance of probabilities, proven beyond reasonable doubt and absolute truth (knowledge reserved unto God).
See also
Language
Meaning (linguistics) — Semiotics
Technology
Artificial intelligence
Logic
Bivalence
Fuzzy logic
Fuzzy set
Half-truth
Multi-valued logic
Paradox of the heap
Truth
Truth value
Vagueness
Books
Vagueness and Degrees of Truth
Bibliography
|
https://en.wikipedia.org/wiki/Geometric%20mechanics
|
Geometric mechanics is a branch of mathematics applying particular geometric methods to many areas of mechanics, from mechanics of particles and rigid bodies to fluid mechanics and control theory.
Geometric mechanics applies principally to systems for which the configuration space is a Lie group, or a group of diffeomorphisms, or more generally where some aspect of the configuration space has this group structure. For example, the configuration space of a rigid body such as a satellite is the group of Euclidean motions (translations and rotations in space), while the configuration space for a liquid crystal is the group of diffeomorphisms coupled with an internal state (gauge symmetry or order parameter).
Momentum map and reduction
One of the principal ideas of geometric mechanics is reduction, which goes back to Jacobi's elimination of the node in the 3-body problem, but in its modern form is due to K. Meyer (1973) and independently J.E. Marsden and A. Weinstein (1974), both inspired by the work of Smale (1970). Symmetry of a Hamiltonian or Lagrangian system gives rise to conserved quantities, by Noether's theorem, and these conserved quantities are the components of the momentum map J. If P is the phase space and G the symmetry group, the momentum map is a map , and the reduced spaces are quotients of the level sets of J by the subgroup of G preserving the level set in question: for one defines , and this reduced space is a symplectic manifold if is a regular value of J.
Variational principles
Hamilton's principle
Lagrange d'Alembert principle
Maupertuis' principle of least action
Euler–Poincaré
Vakonomic
Geometric integrators
One of the important developments arising from the geometric approach to mechanics is the incorporation of the geometry into numerical methods.
In particular symplectic and variational integrators are proving particularly accurate for long-term integration of Hamiltonian and Lagrangian systems.
History
The term "geometric
|
https://en.wikipedia.org/wiki/Double%20inverted%20pendulum
|
A double inverted pendulum is the combination of the inverted pendulum and the double pendulum. The double inverted pendulum is unstable, meaning that it will fall down unless it is controlled in some way. The two main methods of controlling a double inverted pendulum are moving the base, as with the inverted pendulum, or by applying a torque at the pivot point between the two pendulums.
See also
Inverted pendulum
Inertia wheel pendulum
Furuta pendulum
Tuned mass damper
|
https://en.wikipedia.org/wiki/Shigeru%20Mukai
|
is a Japanese mathematician at Kyoto University specializing in algebraic geometry.
Work
He introduced the Fourier–Mukai transform in 1981 in a paper on abelian varieties, which also made up his doctoral thesis. His research since has included work on vector bundles on K3 surfaces, three-dimensional Fano varieties, moduli theory, and non-commutative Brill-Noether theory. He also found a new counterexample to Hilbert's 14th problem (the first counterexample was found by Nagata in 1959).
Publications
|
https://en.wikipedia.org/wiki/Thermoanaerobacter
|
Thermoanaerobacter is a genus in the phylum Bacillota (Bacteria). Members of this genus are thermophilic and anaerobic, several of them were previously described as Clostridium species and members of the now obsolete genera Acetogenium and Thermobacteroides
Etymology
The name Thermoanaerobacter derives from:Greek adjective thermos (θερμός), hot; Greek prefix an (ἄν), not; Greek noun aer, aeros (ἀήρ, ἀέρος), air; Neo-Latin masculine gender noun, bacter, nominally meaning "a rod", but in effect meaning a bacterium, rod; Neo-Latin masculine gender noun Thermoanaerobacter, rod which grows in the absence of air at elevated temperatures.
Species
The genus contains 15 species, namely
T. acetoethylicus (Ben-Bassat and Zeikus 1983) Rainey and Stackebrandt 1993 (Latin noun acetum, vinegar; Neo-Latin adjective ethylicus, pertaining to ethyl alcohol; Neo-Latin masculine gender adjective acetoethylicus, intended to mean producing acetic acid and ethanol.) This species, formerly known as Thermobacteroides acetoethylicus, used to be the type species of Thermobacteroides, but was transferred over to the genus Thermoanaerobacter, while the other member of the genus Thermobacteroides, Thermobacteroides proteolyticus was reclassified as Coprothermobacter proteolyticus
T. brockii (Zeikus et al. 1983) Lee et al. 1993 (Neo-Latin genitive case noun brockii, of Brock, named for Thomas Dale Brock who pioneered studies on the physiology and ecology of thermophiles.) this species was previously known as Thermoanaerobium brockii
T. ethanolicus Wiegel and Ljungdahl 1982 (Type species of the genus; Neo-Latin noun ethanol, ethanol; Latin masculine gender suff. -icus, suffix used with the sense of pertaining to; Neo-Latin masculine gender adjective ethanolicus, indicating the production of ethanol.)
"T. inferii" Orlygsson & Beck 2007
T. italicus Kozianowski et al. 1998 (Latin masculine gender adjective italicus, pertaining to Italy, where the organism was isolated.)
"T. keratinophilus" R
|
https://en.wikipedia.org/wiki/Involuntary%20park
|
Involuntary park is a neologism coined by science fiction author and environmentalist Bruce Sterling to describe previously inhabited areas that for environmental, economic, or political reasons have, in Sterling's words, "lost their value for technological instrumentalism" and been allowed to return to an overgrown, feral state.
Origin of the term
Discussing involuntary parks in the context of rising sea levels due to global warming, Sterling writes:
While Sterling's original vision of an involuntary park was of places abandoned due to collapse of economy or rising sea-level, the term has come to be used on any land where human inhabitation or use for one reason or other has been stopped, including military exclusion zones, minefields, and areas considered dangerous due to pollution.
Existing examples
Abandoned human settlements and developments overtaken by foliage and wild animals are known to exist in numerous locations around the world. Ghost towns, disused railways, mines, and airfields, or areas experiencing urban decay or deindustrialization may be subject to a resurgence in ecological proliferation as human presence is reduced.
The Chernobyl Exclusion Zone has seen the return of previously extirpated indigenous species such as boars, wolves, and brown bears, as well as a thriving herd of re-introduced Przewalski's horses. While wildlife flourishes in the least affected areas, tumors, infertility, and lower brain weight are reported in many small animals (including mice and birds) living in areas subject to severe contamination.
The former Rocky Mountain Arsenal in Denver was abandoned for years due to contamination from production of chemical weapons, yet the wildlife returned and the site was eventually turned into a wildlife refugium.
Involuntary parks where human presence is severely limited can host animal species that are otherwise extremely threatened in their range. The Korean Demilitarized Zone is hypothesized to house not only Korean tigers,
|
https://en.wikipedia.org/wiki/XML%20validation
|
XML validation is the process of checking a document written in XML (eXtensible Markup Language) to confirm that it is both well-formed and also "valid" in that it follows a defined structure. A well-formed document follows the basic syntactic rules of XML, which are the same for all XML documents. A valid document also respects the rules dictated by a particular DTD or XML schema. Automated tools – validators – can perform well-formedness tests and many other validation tests, but not those that require human judgement, such as correct application of a schema to a data set.
Standards
OASIS CAM is a standard specification that provides contextual validation of content and structure that is more flexible than basic schema validations.
Schematron, a method for advanced XML validation.
Tools
xmllint is a command line XML tool that can perform XML validation. It can be found in UNIX / Linux environments.
XML toolkit. The XML C parser and toolkit of Gnome – libxml includes xmllint
XML Validator Online Validate your XML data.
XML Schema Validator Validate XML files against an XML Schema.
|
https://en.wikipedia.org/wiki/73rd%20meridian%20west
|
The meridian 73° west of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, North America, the Atlantic Ocean, the Caribbean Sea, South America, the Pacific Ocean, the Southern Ocean, and Antarctica to the South Pole.
The 73rd meridian west forms a great circle with the 107th meridian east.
From Pole to Pole
Starting at the North Pole and heading south to the South Pole, the 73rd meridian west passes through:
{| class="wikitable plainrowheaders"
! scope="col" width="120" | Co-ordinates
! scope="col" | Country, territory or sea
! scope="col" | Notes
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Arctic Ocean
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Nunavut – Ellesmere Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Nares Strait
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Cape Alexander
|-valign="top"
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Baffin Bay
| style="background:#b0e0e6;" | Passing just west of Hakluyt Island, (at ) Passing through the Carey Islands, (at )
|-
|
! scope="row" |
| Nunavut – Dexterity Island, Adams Island and Baffin Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Foxe Basin
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Nunavut – Baffin Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Hudson Strait
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Quebec – passing through the Archipelago of Saint-Pierre Lake
|-valign="top"
|
! scope="row" |
| Vermont Massachusetts – from Connecticut – from (passing just west of New Haven at )
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Long Island Sound
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| New York – Long Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background
|
https://en.wikipedia.org/wiki/Plant%20evolutionary%20developmental%20biology
|
Evolutionary developmental biology (evo-devo) is the study of developmental programs and patterns from an evolutionary perspective. It seeks to understand the various influences shaping the form and nature of life on the planet. Evo-devo arose as a separate branch of science rather recently. An early sign of this occurred in 1999.
Most of the synthesis in evo-devo has been in the field of animal evolution, one reason being the presence of model systems like Drosophila melanogaster, C. elegans, zebrafish and Xenopus laevis. However, since 1980, a wealth of information on plant morphology, coupled with modern molecular techniques has helped shed light on the conserved and unique developmental patterns in the plant kingdom also.
Historical perspective
Before 1900
The origin of the term "morphology" is generally attributed to Johann Wolfgang von Goethe (1749–1832). He was of the opinion that there is an underlying fundamental organisation () in the diversity of flowering plants. In his book The Metamorphosis of Plants, he proposed that the enabled us to predict the forms of plants that had not yet been discovered. Goethe was the first to make the perceptive suggestion that flowers consist of modified leaves. He also entertained different complementary interpretations.
In the middle centuries, several basic foundations of our current understanding of plant morphology were laid down. Nehemiah Grew, Marcello Malpighi, Robert Hooke, Antonie van Leeuwenhoek, Wilhelm von Nageli were just some of the people who helped build knowledge on plant morphology at various levels of organisation. It was the taxonomical classification of Carl Linnaeus in the eighteenth century though, that generated a firm base for the knowledge to stand on and expand. The introduction of the concept of Darwinism in contemporary scientific discourse also had had an effect on the thinking on plant forms and their evolution.
Wilhelm Hofmeister, one of the most brilliant botanists of his times, was
|
https://en.wikipedia.org/wiki/Reverse%20transcription%20polymerase%20chain%20reaction
|
Reverse transcription polymerase chain reaction (RT-PCR) is a laboratory technique combining reverse transcription of RNA into DNA (in this context called complementary DNA or cDNA) and amplification of specific DNA targets using polymerase chain reaction (PCR). It is primarily used to measure the amount of a specific RNA. This is achieved by monitoring the amplification reaction using fluorescence, a technique called real-time PCR or quantitative PCR (qPCR). Combined RT-PCR and qPCR are routinely used for analysis of gene expression and quantification of viral RNA in research and clinical settings.
The close association between RT-PCR and qPCR has led to metonymic use of the term qPCR to mean RT-PCR. Such use may be confusing, as RT-PCR can be used without qPCR, for example to enable molecular cloning, sequencing or simple detection of RNA. Conversely, qPCR may be used without RT-PCR, for example to quantify the copy number of a specific piece of DNA.
Nomenclature
The combined RT-PCR and qPCR technique has been described as quantitative RT-PCR or real-time RT-PCR (sometimes even called quantitative real-time RT-PCR), has been variously abbreviated as qRT-PCR, RT-qPCR, RRT-PCR, and rRT-PCR. In order to avoid confusion, the following abbreviations will be used consistently throughout this article:
Not all authors, especially earlier ones, use this convention and the reader should be cautious when following links. RT-PCR has been used to indicate both real-time PCR (qPCR) and reverse transcription PCR (RT-PCR).
History
Since its introduction in 1977, Northern blot has been used extensively for RNA quantification despite its shortcomings: (a) time-consuming technique, (b) requires a large quantity of RNA for detection, and (c) quantitatively inaccurate in the low abundance of RNA content. However, since PCR was invented by Kary Mullis in 1983, RT PCR has since displaced Northern blot as the method of choice for RNA detection and quantification.
RT-PCR has rise
|
https://en.wikipedia.org/wiki/American%20Civil%20Liberties%20Union
|
The American Civil Liberties Union (ACLU) is an American nonprofit human rights organization founded in 1920. The organization strives "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". The ACLU works through litigation and lobbying and has over 1,800,000 members as of July 2018, with an annual budget of over $300 million. Affiliates of the ACLU are active in all 50 states, Washington, D.C., and Puerto Rico. The ACLU provides legal assistance in cases where it considers civil liberties at risk. Legal support from the ACLU can take the form of direct legal representation or preparation of amicus curiae briefs expressing legal arguments when another law firm is already providing representation.
In addition to representing persons and organizations in lawsuits, the ACLU lobbies for policy positions established by its board of directors. Current positions of the ACLU include opposing the death penalty; supporting same-sex marriage and the right of LGBT people to adopt; supporting reproductive rights such as birth control and abortion rights; eliminating discrimination against women, minorities, and LGBT people; decarceration in the United States; protecting housing and employment rights of veterans; reforming sex offender registries and protecting housing and employment rights of convicted first-time offenders; supporting the rights of prisoners and opposing torture; and upholding the separation of church and state by opposing government preference for religion over non-religion or for particular faiths over others.
Legally, the ACLU consists of two separate but closely affiliated nonprofit organizations, namely the American Civil Liberties Union, a 501(c)(4) social welfare group; and the ACLU Foundation, a 501(c)(3) public charity. Both organizations engage in civil rights litigation, advocacy, and education, but only donations to the 501(c)(3) foundation are tax d
|
https://en.wikipedia.org/wiki/BitKeeper
|
BitKeeper is a software tool for distributed revision control of computer source code. Originally developed as proprietary software by BitMover Inc., a privately held company based in Los Gatos, California, it was released as open-source software under the Apache-2.0 license on 9 May 2016. BitKeeper is no longer being developed.
History
BitKeeper was originally developed by BitMover Inc., a privately held company from Los Gatos, California owned by Larry McVoy, who had previously designed TeamWare.
BitKeeper and the Linux Kernel
BitKeeper was first mentioned as a solution to some of the growing pains that Linux was having in September 1998. Early access betas were available in May 1999 and on May 4, 2000, the first public release of BitKeeper was made available.
BitMover used to provide access to the system for certain open-source or free-software projects, one of which was the source code of the Linux kernel. The license for the "community" version of BitKeeper had allowed for developers to use the tool at no cost for open source or free software projects, provided those developers did not participate in the development of a competing tool (such as Concurrent Versions System, GNU arch, Subversion or ClearCase) for the duration of their usage of BitKeeper plus one year. This restriction applied regardless of whether the competing tool was free or proprietary. This version of BitKeeper also required that certain meta-information about changes be stored on computer servers operated by BitMover, an addition that made it impossible for community version users to run projects of which BitMover was unaware.
The decision made in 2002 to use BitKeeper for Linux kernel development was a controversial one. Some, including GNU Project founder Richard Stallman, expressed concern about proprietary tools being used on a flagship free project. While project leader Linus Torvalds and other core developers adopted BitKeeper, several key developers (including Linux veteran Al
|
https://en.wikipedia.org/wiki/Physics%20in%20Perspective
|
Physics in Perspective is a quarterly peer-reviewed academic journal published by Birkhäuser. It covers historical, philosophical, and social scientific perspectives of physics. The editors-in-chief are Joseph D. Martin (Durham University) and Richard Staley (University of Cambridge).
History
The journal was established in 1999 by John S. Rigden and Roger H. Stuewer, "to recognize historical and philosophical studies as essential to understanding the foundations of physics, to appreciating the diffusion of physics into all areas of science, and to conveying the cultural influence of physics on the arts and humanities."
Abstracting and indexing
The journal is abstracted and indexed by:
According to the Journal Citation Reports, the journal has a 2017 impact factor of 0.625.
|
https://en.wikipedia.org/wiki/Salt%20and%20pepper%20shakers
|
Salt and pepper shakers or salt and pepper pots, of which the first item can also be called a salt cellar in British English, are condiment dispensers used in Western culture that are designed to allow diners to distribute grains of edible salt and ground peppercorns. Salt and pepper shakers are sometimes held in a cruet-stand.
History and usage
Salt and pepper shakers can be made from a variety of materials, including plastic, glass, metal, and ceramic.
An 1872 newspaper stated: "A pepper-box for salt is the latest Yankee invention."
Salt shakers became increasingly common after anti-caking agents were introduced by the Morton Salt company in 1911. The Great Depression of the 1930s boosted the popularity of salt and pepper shakers as global ceramics producers concentrated on inexpensive items.
Except in the most casual dining establishments, they are usually provided as a matched set, sometimes distinguishable only by the number of holes on the top of the shaker. Designs range from small, plain glass screw cap containers (invented by John Landis Mason, inventor of the Mason jar) to more ornate works of art. Sometimes the design refers to some pair of related objects—such as a replica of a West Highland White Terrier containing salt and a Scottish Terrier containing pepper. Designs may also relate to specific occasions or holidays. As a result of this diversity of design, collecting salt and pepper shakers is a hobby. Design of salt and pepper shakers has also been used to transmit cultural perspectives about race and other cultural values.
Two Museums of Salt and Pepper Shakers in the US and Spain are dedicated to showing the variety and history of salt and pepper shakers through the ages. Żupny Castle in Poland also contains a collection of salt shakers.
Distinguishing salt from pepper
The number of holes varies by culture, health, and taste. In the United States where excessive salt is considered unhealthy, salt is stored in the shaker with the fewer hole
|
https://en.wikipedia.org/wiki/KZNO-LD
|
KZNO-LD (channel 12) is a low-power television station in Los Angeles, California, United States. Owned by the Venture Technologies Group, it transmits from Mount Harvard, a peak adjacent to Mount Wilson in Los Angeles County, as a Spanish-language religious radio station that can be received at 87.7 FM. Its ATSC 3.0 video feed broadcasts Jewelry Television on digital channel 6.1.
History
The station was founded on August 7, 1996, as translator K06MU in Big Bear Lake. It was also available to area subscribers of Charter Cable on channel 6. The station's programming at the time was similar to a public-access television cable television channel, consisting primarily of news, public affairs and travel programs produced by local residents of the Big Bear Valley.
In 2016, ownership was transferred from Bear Valley Broadcasting to Venture Technologies, which previously owned KSFV-CA, which also operated on analog channel 6 as a radio station, which, as KSFV-CD, now shares transmitting facilities on Mount Harvard (a peak adjacent to Mount Wilson) in Los Angeles County with Ontario-licensed KPOM-CD.
While operating as an analog TV station, KZNO-LP audio could be heard locally by radio receivers at 87.7 FM, since TV channel 6 is in the 82–88 MHz range. Because it was a low-power station, it was not obligated to switch to a digital signal on June 12, 2009, which was required of all full-power TV stations in the United States.
As of July 9, 2021, KZNO-LP had ceased its analog TV transmissions, prior to the July 13, 2021, Federal Communications Commission (FCC) deadline for LPTV stations to end analog TV transmissions. The station was licensed for digital operation effective July 15, 2021, changing its call sign to KZNO-LD at the same time. Effective July 27, 2021, the station was granted a six-month special temporary authority to resume audio transmissions receivable at 87.7 FM. On July 20, 2023, an FCC "Report and Order" included this station as one of 13 "FM6" stations a
|
https://en.wikipedia.org/wiki/Super-Poulet%20number
|
A super-Poulet number is a Poulet number, or pseudoprime to base 2, whose every divisor d divides
2d − 2.
For example, 341 is a super-Poulet number: it has positive divisors {1, 11, 31, 341} and we have:
(211 - 2) / 11 = 2046 / 11 = 186
(231 - 2) / 31 = 2147483646 / 31 = 69273666
(2341 - 2) / 341 = 13136332798696798888899954724741608669335164206654835981818117894215788100763407304286671514789484550
When is not prime, then it and every divisor of it are a pseudoprime to base 2, and a super-Poulet number.
The super-Poulet numbers below 10,000 are :
Super-Poulet numbers with 3 or more distinct prime divisors
It is relatively easy to get super-Poulet numbers with 3 distinct prime divisors. If you find three Poulet numbers with three common prime factors, you get a super-Poulet number, as you built the product of the three prime factors.
Example:
2701 = 37 * 73 is a Poulet number,
4033 = 37 * 109 is a Poulet number,
7957 = 73 * 109 is a Poulet number;
so 294409 = 37 * 73 * 109 is a Poulet number too.
Super-Poulet numbers with up to 7 distinct prime factors you can get with the following numbers:
{ 103, 307, 2143, 2857, 6529, 11119, 131071 }
{ 709, 2833, 3541, 12037, 31153, 174877, 184081 }
{ 1861, 5581, 11161, 26041, 37201, 87421, 102301 }
{ 6421, 12841, 51361, 57781, 115561, 192601, 205441 }
For example, 1118863200025063181061994266818401 = 6421 * 12841 * 51361 * 57781 * 115561 * 192601 * 205441 is a super-Poulet number with 7 distinct prime factors and 120 Poulet numbers.
External links
Numericana
Integer sequences
|
https://en.wikipedia.org/wiki/Citrus%20Red%202
|
Citrus Red 2, Citrus Red No. 2, C.I. Solvent Red 80, or C.I. 12156 is an artificial dye. As a food dye, it has been permitted by the US Food and Drug Administration (FDA) since 1956 to color the skin of oranges. Citrus Red 2 is listed by the International Agency for Research on Cancer (IARC) as a group 2B carcinogen, a substance "possibly carcinogenic to humans".
Properties
Citrus Red 2 is an orange to yellow solid or a dark red powder with a melting point of 156 °C. It is not soluble in water, but is readily soluble in many organic solvents.
Use
In the United States, Citrus Red 2 is sometimes used to color oranges. It is only permitted to be used on the peel. It is permitted when the fruit is intended to be eaten, but is not permitted when the fruit is intended or used for processing, for example to manufacture orange juice. It is used on some oranges from the US state of Florida but is banned in the US states of California and Arizona.
|
https://en.wikipedia.org/wiki/Superpattern
|
In the mathematical study of permutations and permutation patterns, a superpattern or universal permutation is a permutation that contains all of the patterns of a given length. More specifically, a k-superpattern contains all possible patterns of length k.
Definitions and example
If π is a permutation of length n, represented as a sequence of the numbers from 1 to n in some order, and s = s1, s2, ..., sk is a subsequence of π of length k, then s corresponds to a unique pattern, a permutation of length k whose elements are in the same order as s. That is, for each pair i and j of indexes, the ith element of the pattern for s should be less than the jthe element if and only if the ith element of s is less than the jth element. Equivalently, the pattern is order-isomorphic to the subsequence. For instance, if π is the permutation 25314, then it has ten subsequences of length three, forming the following patterns:
A permutation π is called a k-superpattern if its patterns of length k include all of the length-k permutations. For instance, the length-3 patterns of 25314 include all six of the length-3 permutations, so 25314 is a 3-superpattern. No 3-superpattern can be shorter, because any two subsequences that form the two patterns 123 and 321 can only intersect in a single position, so five symbols are required just to cover these two patterns.
Length bounds
introduced the problem of determining the length of the shortest possible k-superpattern. He observed that there exists a superpattern of length k2 (given by the lexicographic ordering on the coordinate vectors of points in a square grid) and also observed that, for a superpattern of length n, it must be the case that it has at least as many subsequences as there are patterns. That is, it must be true that , from which it follows by Stirling's approximation that n ≥ k2/e2, where e ≈ 2.71828 is Euler's number.
This lower bound was later improved very slightly by
,
who increased it to 1.000076k2/e2, disproving
|
https://en.wikipedia.org/wiki/Thor-CD
|
Thor-CD was a re-recordable CD format proposed in 1988 by Tandy.
Several years before recordable compact discs were introduced, Tandy Corporation announced a similar CD format named Thor-CD, but after being pushed back for several years, it was finally cancelled due to steep manufacturing costs.
At the time Tandy proposed the new format, CDs were mostly used for digital music, but not for other digital data. Tandy aimed to change this with its new format.
However, the introduction of the CD-ROM format, which was incompatible with Tandy's proposal, all but killed Tandy's product.
See also
Vaporware
|
https://en.wikipedia.org/wiki/Canal%20%28anatomy%29
|
In anatomy, a canal (or canalis in Latin) is a tubular passage or channel which connects different regions of the body.
Examples include:
Cranial Region
Alveolar canals
Carotid canal
Facial canal
Greater palatine canal
Incisive canals
Infraorbital canal
Mandibular canal
Optic canal
Palatovaginal canal
Pterygoid canal
Abdominal Region
Inguinal canal
Pelvic Region
Anal canal
Pudendal canal
Upper Extremities
Suprascapular canal
Carpal canal
Ulnar canal
Radial canal
Lower Extremities
Adductor canal
Femoral canal
Obturator canal
See also
Foramen
Canaliculus
|
https://en.wikipedia.org/wiki/Pythagorean%20addition
|
In mathematics, Pythagorean addition is a binary operation on the real numbers that computes the length of the hypotenuse of a right triangle, given its two sides. According to the Pythagorean theorem, for a triangle with sides and , this length can be calculated as
where denotes the Pythagorean addition operation.
This operation can be used in the conversion of Cartesian coordinates to polar coordinates. It also provides a simple notation and terminology for some formulas when its summands are complicated; for example, the energy-momentum relation in physics becomes
It is implemented in many programming libraries as the hypot function, in a way designed to avoid errors arising due to limited-precision calculations performed on computers. In its applications to signal processing and propagation of measurement uncertainty, the same operation is also called addition in quadrature; it is related to the quadratic mean or "root mean square".
Applications
Pythagorean addition (and its implementation as the hypot function) is often used together with the atan2 function to convert from Cartesian coordinates to polar coordinates :
If measurements have independent errors respectively, the quadrature method gives the overall error,
whereas the upper limit of the overall error is
if the errors were not independent.
This is equivalent of finding the magnitude of the resultant of adding orthogonal vectors, each with magnitude equal to the uncertainty, using the Pythagorean theorem.
In signal processing, addition in quadrature is used to find the overall noise from independent sources of noise. For example, if an image sensor gives six digital numbers of shot noise, three of dark current noise and two of Johnson–Nyquist noise under a specific condition, the overall noise is
digital numbers, showing the dominance of larger sources of noise.
The root mean square of a finite set of numbers is just their Pythagorean sum, normalized to form a generalized mean by divid
|
https://en.wikipedia.org/wiki/Atmospheric%20optics
|
Atmospheric optics is "the study of the optical characteristics of the atmosphere or products of atmospheric processes .... [including] temporal and spatial resolutions beyond those discernible with the naked eye". Meteorological optics is "that part of atmospheric optics concerned with the study of patterns observable with the naked eye". Nevertheless, the two terms are sometimes used interchangeably.
Meteorological optical phenomena, as described in this article, are concerned with how the optical properties of Earth's atmosphere cause a wide range of optical phenomena and visual perception phenomena.
Examples of meteorological phenomena include:
The blue color of the sky. This is from Rayleigh scattering, which sends more higher frequency/shorter wavelength (blue) sunlight into the eye of an observer than other frequencies/wavelength.
The reddish color of the Sun when it is observed through a thick atmosphere, as during a sunrise or sunset. This is because long-wavelength (red) light is scattered less than blue light. The red light reaches the observer's eye, whereas the blue light is scattered out of the line of sight.
Other colours in the sky, such as glowing skies at dusk and dawn. These are from additional particulate matter in the sky that scatter different colors at different angles.
Halos, afterglows, coronas, polar stratospheric clouds, and sun dogs. These are from scattering, or refraction, by ice crystals and from other particles in the atmosphere. They depend on different particle sizes and geometries.
Mirages. These are optical phenomena in which light rays are bent due to thermal variations in the refractive index of air, producing displaced or heavily distorted images of distant objects. Other optical phenomena associated with this include the Novaya Zemlya effect, in which the Sun has a distorted shape and rises earlier or sets later than predicted. A spectacular form of refraction, called the Fata Morgana, occurs with a temperature inversion, in
|
https://en.wikipedia.org/wiki/Little%20Snitch
|
Little Snitch is a host-based application firewall for macOS. It can be used to monitor applications, preventing or permitting them to connect to attached networks through advanced rules. It is produced and maintained by the Austrian firm Objective Development Software GmbH.
Unlike a stateful firewall, which is designed primarily to protect a system from external attacks by restricting inbound traffic, Little Snitch is designed to protect privacy by limiting outbound traffic. Until Little Snitch 4, it controlled network traffic by registering kernel extensions through the standard application programming interface (API) provided by Apple, but for its 5th release it switched to using Apple's Network Extensions due to the deprecationof Kernel Extensions on macOS Catalina.
If an application or process attempts to establish a network connection, Little Snitch prevents the connection, if a rule for that connection has been set by the user. For that, a dialog is presented to the user, which allows one to deny or permit the connection on a one-time, time limited, or permanent basis. The dialog also allows the user to restrict the parameters of the connection, restricting it to a specific port, protocol, or domain. Little Snitch's integral network monitor shows ongoing traffic in real time with domain names and traffic direction displayed.
The application (version 4) received a positive 4.5/5 review from Macworld.
|
https://en.wikipedia.org/wiki/Degranulation
|
Degranulation is a cellular process that releases antimicrobial cytotoxic or other molecules from secretory vesicles called granules found inside some cells. It is used by several different cells involved in the immune system, including granulocytes (neutrophils, basophils, and eosinophils) and mast cells. It is also used by certain lymphocytes such as natural killer (NK) cells and cytotoxic T cells, whose main purpose is to destroy invading microorganisms.
Mast cells
Degranulation in mast cells is part of an inflammatory response, and substances such as histamine are released. Granules from mast cells mediate processes such as "vasodilation, vascular homeostasis, innate and adaptive immune responses, angiogenesis, and venom detoxification."
Antigens interact with IgE molecules already bound to high affinity Fc receptors on the surface of mast cells to induce degranulation, via the activation of tyrosine kinases within the cell. The mast cell releases a mixture of compounds, including histamine, proteoglycans, serotonin, and serine proteases from its cytoplasmic granules.
Eosinophils
In a similar mechanism, activated eosinophils release preformed mediators such as major basic protein, and enzymes such as peroxidase, following interaction between their Fc receptors and IgE molecules that are bound to large parasites like helminths.
Neutrophils
Degranulation in neutrophils can occur in response to infection, and the resulting granules are released in order to protect against tissue damage. Excessive degranulation of neutrophils, sometimes triggered by bacteria, is associated with certain inflammatory disorders, such as asthma and septic shock.
Four kinds of granules exist in neutrophils that display differences in content and regulation. Secretory vesicles are the most likely to release their contents by degranulation, followed by gelatinase granules, specific granules, and azurophil granules.
Cytotoxic T cells and NK cells
Cytotoxic T cells and NK cells rele
|
https://en.wikipedia.org/wiki/Habit%20%28biology%29
|
Habit, equivalent to habitus in some applications in biology, refers variously to aspects of behaviour or structure, as follows:
In zoology (particularly in ethology), habit usually refers to aspects of more or less predictable behaviour, instinctive or otherwise, though it also has broader application. Habitus refers to the characteristic form or morphology of a species.
In botany, habit is the characteristic form in which a given species of plant grows (see plant habit).
Behavior
In zoology, habit (not to be confused with habitus as described below) usually refers to a specific behavior pattern, either adopted, learned, pathological, innate, or directly related to physiology. For example:
...the [cat] was in the habit of springing upon the [door knocker] in order to gain admission...
If these sensitive parrots are kept in cages, they quickly take up the habit of feather plucking.
The spider monkey has an arboreal habit and rarely ventures onto the forest floor.
The brittle star has the habit of breaking off arms as a means of defense.
Mode of life (or lifestyle, modus vivendi) is a concept related to habit, and it is sometimes referred to as the habit of an animal. It may refer to the locomotor capabilities, as in "(motile habit", sessile, errant, sedentary), feeding behaviour and mechanisms, nutrition mode (free-living, parasitic, holozoic, saprotrophic, trophic type), type of habitat (terrestrial, arboreal, aquatic, marine, freshwater, seawater, benthic, pelagic, nektonic, planktonic, etc.), period of activity (diurnal, nocturnal), types of ecological interaction, etc.
The habits of plants and animals often change responding to changes in their environment. For example: if a species develops a disease or there is a drastic change of habitat or local climate, or it is removed to a different region, then the normal habits may change. Such changes may be either pathological, or adaptive.
Structure
In botany, habit is the general appearance, growth form,
|
https://en.wikipedia.org/wiki/Sir%20Hans%20Krebs%20Medal
|
The Sir Hans Krebs Lecture and Medal is awarded annually by the Federation of European Biochemical Societies (FEBS) for outstanding achievements in Biochemistry and Molecular Biology or related sciences.
It was endowed by the Lord Rank Centre for Research and named after the German-born British biochemist Sir Hans Adolf Krebs, well known for identifying the urea and citric acid cycles. The awardee receives a silver medal and presents one of the plenary lectures at the FEBS Congress.
List of recipients
Source: (1968–2002)
2022 Cecília Rodrigues (University of Lisbon, Portugal)
2019 Mathias Uhlen
2018 Albert J.R. Heck
2017 Carol V. Robinson
2016 Kári Stefánsson
2015 Jürgen Knoblich
2014 Michael N. Hall
2013 Richard J. Roberts
2012 V. Ramakrishnan
2011 Elena Conti
2010 Harald Stenmark
2009 Václav Hořejší
2008 Tim Hunt
2007 Tom Rapoport
2006 Aaron Ciechanover
2005 Thomas Jenuwein
2004 Ryszard Gryglewski
2003 No award?
2002 Jacques Pouysségur
2001 Sir Philip Cohen
2000 Thomas Steitz
1999 Stanley B. Prusiner
1998 Bengt I. Samuelsson
1997 David Baltimore
1996 Josef Stefaan Schell
1995 Kim Nasmyth
1994 Jean-Pierre Changeux
1993 Christiane Nüsslein-Volhard
1992 Robert Huber
1991 No Award
1990 Pierre Chambon
1989 Helmut Beinert
1988 No award
1987 Tom Blundell
1986 Gottfried Schatz
1985 Robert Joseph Paton Williams
1984 Richard Henderson
1983 Arthur Kornberg
1982 François Jacob
1981 Cesar Milstein
1980 Sydney Brenner (No lecture due to illness)
1979 Pierre Desnuelle
1978 Peter D. Mitchell
1977 Francis Crick
1976 No award
1975 Heinz-Gunter Wittmann
1974 Charles Weissmann
1973 Arthur B. Pardee
1972 Ephraim Katchalski
1971 David Chilton Phillips
1970 No Award
1969 Alexander Spirin
1968 Max Perutz (inaugural award)
See also
List of biochemistry awards
|
https://en.wikipedia.org/wiki/Weed%20science
|
Weed science is a scientific discipline concerned with plants that may be considered weeds, their effects on human activities, and their management "a branch of applied ecology that attempts to modify the environment against natural evolutionary trends.".
History
Weeds have existed since humans began settled agriculture have existed since the advent of settled agriculture around 10,000 years ago it has been suggested that the most common characteristic of the ancestors of our presently dominant crop plants is their willingness—their tendency to be successful, to thrive, in disturbed habitats, mostly those around human dwellings. Farmers have likely always been aware of weeds in their crops, although the evidence for their awareness and concern is nearly all anecdotal.
Unlike other agricultural sciences like entomology or plant pathology, the emergence of weed science is comparatively recent, occurring largely within the 20th century and coinciding with the development of herbicides.
Weeds are controlled in much of the world by hand (roguing) or with crude hoes. The size of a farmer's holding and yield per unit area are limited by several things and paramount among them is the rapidity with which a family can weed its crops. More human labor may be expended to weed crops than on any other single human enterprise, and most of that labor is expended by women. Weed control in the Western world and other developed areas of the world is done by sophisticated machines and by substituting chemical energy (herbicides) for mechanical and human energy. There is a relationship between the way farmers control weeds and the ability of a nation to feed its people. Successful weed management is one of the essential ingredients to maintain and increase food production.
In 1923, Clark and Fletcher suggested that the "annual losses due to the occurrence of pernicious weeds on farm land in Canada, although acknowledged in a general way, are far greater than is realized." They
|
https://en.wikipedia.org/wiki/GNU%20Bison
|
GNU Bison, commonly known as Bison, is a parser generator that is part of the GNU Project. Bison reads a specification in the BNF notation (a context-free language), warns about any parsing ambiguities, and generates a parser that reads sequences of tokens and decides whether the sequence conforms to the syntax specified by the grammar.
The generated parsers are portable: they do not require any specific compilers. Bison by default generates LALR(1) parsers but it can also generate canonical LR, IELR(1) and GLR parsers.
In POSIX mode, Bison is compatible with Yacc, but also has several extensions over this earlier program, including
Generation of counterexamples for conflicts
Location tracking (e.g., file, line, column)
Rich and internationalizable syntax error messages in the generated parsers
Customizable syntax error generation,
Reentrant parsers
Push parsers, with autocompletion
Support for named references
Several types of reports (graphical, XML) on the generated parser
Support for several programming languages (C, C++, D, or Java)
Flex, an automatic lexical analyser, is often used with Bison, to tokenise input data and provide Bison with tokens.
Bison was originally written by Robert Corbett in 1985. Later, in 1989, Robert Corbett released another parser generator named Berkeley Yacc. Bison was made Yacc-compatible by Richard Stallman.
Bison is free software and is available under the GNU General Public License, with an exception (discussed below) allowing its generated code to be used without triggering the copyleft requirements of the licence.
Features
Counterexample generation
One delicate issue with LR parser generators is the resolution of conflicts (shift/reduce and reduce/reduce conflicts). With many LR parser generators, resolving conflicts requires the analysis of the parser automaton, which demands some expertise from the user.
To aid the user in understanding conflicts more intuitively, Bison can instead automatically generate co
|
https://en.wikipedia.org/wiki/Sex%E2%80%93gender%20distinction
|
Though the terms sex and gender have been used interchangeably since at least the fourteenth century, in contemporary academic literature they usually have distinct meanings. Sex generally refers to an organism's biological sex, while gender usually refers to either social roles typically associated with the sex of a person (gender role) or personal identification of one's own gender based on an internal awareness (gender identity). While in ordinary speech, the terms sex and gender are often used interchangeably, most contemporary social scientists, behavioral scientists and biologists, many legal systems and government bodies, and intergovernmental agencies such as the WHO make a distinction between gender and sex.
In most individuals, the various biological determinants of sex are congruent, and consistent with the individual's gender identity, but in some circumstances, an individual's assigned sex and gender do not align, and the person may be transgender. Also in some cases, an individual may have sex characteristics that complicate sex assignment, and the person may be intersex.
Sexologist John Money pioneered the concept of a distinction between biological sex and gender identity in 1955. Madison Bentley had already defined gender as the "socialized obverse of sex" a decade earlier, in 1945. As originally conceived by Money, gender and sex are analysed together as a single category including both biological and social elements, but later work by Robert Stoller separated the two, designating sex and gender as biological and cultural categories, respectively. Before the work of Bentley, Money and Stoller, the word gender was only regularly used to refer to grammatical categories.
Sex
Biologists
Anisogamy, or the size differences of gametes (sex cells), is the defining feature of the two sexes. According to biologist Michael Majerus there is no other universal difference between males and females.
By definition, males are organisms that produce small, mob
|
https://en.wikipedia.org/wiki/Food%20Unwrapped%20%28book%29
|
Food Unwrapped is a 2014 book about the food industry by the British writer Daniel Tapper. It is based on a BBC Channel 4 television series of the same name, and covers food science and food technology in mass-produced foods with the objective of "dispel[ing] food myths and reveal[ing] some truths about the food we buy". Subjects covered in the book include the relative merits of sea salt versus table salt; and the harm or lack of harm in artificial food colorings and flavorings.
The book's author has also been a contributor to The Guardian and Waitrose Kitchen. In 2013, using knowledge he acquired as a self-taught homebrewer, Tapper opened a brewery producing American pale ale style beer (using American Cascade hops).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.