source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Paranormal%20State
Paranormal State is an American paranormal reality television series that premiered on the A&E Network on December 10, 2007. The program follows and stars the Pennsylvania State University Paranormal Research Society, a student-led college club. The show features the group's investigations of alleged paranormal phenomena at reportedly haunted locations. Production The show was produced by Four Seasons Productions International and Go Go Luckey Productions (which produced MTV's Laguna Beach: The Real Orange County and Newport Harbor: The Real Orange County, and A&E's now-cancelled Rollergirls). Gary Auerbach and Julie Auerbach (who head Go Go Luckey Productions) and Betsy Schechter (Four Seasons) were the executive producers. The show was tentatively titled "Out There", "Dead Time" and "Paranormal U" before being called "Paranormal State." Every episode of the show was outlined by the production team first, co-executive producer Tina Gazzerro stated, to ensure that a producible episode will result. "We try to identify where we get our discovery moments, our 'Ah-ha!' moments", Gazzerro told the Pittsburgh Post-Gazette. Information about the event under investigation may also be held back from the students in order to create dramatic tension, and only situations which will have a conclusive outcome are investigated. "We may have information we don't give to [the PRS team]", Gazzerro said, "but we need to make sure [the episode is] produceable." Story arcs were also outlined for each "character" on the show, and the production team had publicly expressed its hope that a romantic relationship would develop between the research team leader Ryan Buell and one of the women on the series. The production team and the show's researchers say that no pressure was put on the research team to act in certain ways or make paranormal discoveries. A&E had high hopes for the new series. Cable television reality shows about the paranormal require only about a quarter of the budget of a scripted show of the same length. They also draw much-coveted younger viewers, and lean slightly more female than male (a difficult demographic to draw for most cable networks not explicitly targeting women) Fourteen half-hour episodes were ordered for the first season. A&E upped that order to 20 shows after seeing the pilot and the first few episodes. Had the show not been picked up by A&E, Buell said he had another series deal in the works with the Auerbachs and their production company. The show was initially scheduled to debut in May or June 2007, but was pushed back to December 2007 for undisclosed reasons. The show debuted on December 10, 2007, with 2.5 million viewers watching the first two back-to-back episodes, making it the third-most watched show on A&E since 2004. The cable network reported that this included 1.6 million people aged 18 to 49 (a highly coveted demographic by broadcasters and advertisers). It also included 1.5 million viewers in the 25-to-54 age range,
https://en.wikipedia.org/wiki/Summit%20Media
Summit Publishing Co., Inc., trading as Summit Media, is a Filipino digital lifestyle network in the Philippines. It has 15 media brands attracting around 20 million monthly unique visitors and approximately 33 million social media followers. It began as a consumer magazine publisher in June 1995, with Preview as its first magazine title. It turned into a publication conglomerate which published several lifestyle magazines titles, including Candy for young Filipino girls and Yes!, a Philippine entertainment magazine. The company is privately owned by Lisa Gokongwei-Cheng, the daughter of Filipino businessman John Gokongwei. It has expanded to publishing specialized magazines for companies and occasions in the Philippines, and also started publishing short books designed for Filipino readers. The results of the 2014 TNS Newsstand Survey showed that Summit Media had popularity in 12 categories: young women (Cosmopolitan Philippines - 60%), fashion (Preview - 38%), celebrity (YES! - 55%), men's luxury (Esquire Philippines - 93%), men's lifestyle (FHM Philippines - 71%), home (Real Living Philippines - 42%), family and home (Good Housekeeping Philippines - 47%), teens (Candy - 63%), parenting (Smart Parenting - 34%), automotive (Top Gear Philippines - 69%), society (Town & Country Philippines - 31%), and food (Yummy - 51%). The company also had the largest score in the local book publishing measurement with seven out of 10 books sold. Its different magazine titles are printed to copies that run over 100,000. It has been cited in Philippine Business magazine and Eventsite. On April 11, 2018, Summit Media announced the impending closure of the last six printed magazines namely, Cosmopolitan, FHM, Preview, Top Gear, Town and Country (all relegated to their online portals) and Yes! (relegated to Philippine Entertainment Portal), as part of the fully completed digitalization of the company, marking the end of the 23-year run of printing industry. List of magazines published Current Last printed titles published by Summit Media include: Preview - A local fashion magazine that was launched in 1995. It was the very first magazine of Summit, leading to its establishment. Cosmopolitan Philippines - A female fashion magazine that was launched in 1997. Licensed from Hearst Corporation. Esquire Philippines - A male fashion magazine that was launched in 2011. Licensed from Hearst Corporation. YES! - A local showbiz-oriented magazine that was launched in 2000. Top Gear Philippines - A number # 1 car magazine for all car and all other auto enthusiasts that was launched in 2004. Licensed from BBC Worldwide and Immediate Media Company. Sparkling - A K-Pop entertainment and lifestyle magazine that was launched in 2010. Former Some of the magazine titles are ceased in publication, here are the following: GamesMaster Philippines (August 2003–September 2006) (licensed from Future plc) Hi! (October 2004–March 2008) W.I.T.C.H. (July 2002–August 2008, ended on t
https://en.wikipedia.org/wiki/IBM%20Lotus%20Forms
IBM Forms is a suite of products by IBM's Lotus Software division that interact to develop and deliver data-driven, XML-based electronic forms (e-forms) to end-users. IBM Forms consists of a server, designer, and client viewer that enable creation, deployment, and streamlining of forms-based processes. IBM Forms originally used Extensible Forms Description Language (XFDL) as the format for its electronic forms, and it has gradually added XForms to XFDL as that standard has matured. With IBM Forms, organizations can use electronic forms to gather information from users and transmit that information to other systems. IBM Forms can be used as the front-end for business processes such as opening a new account. When a customer enters their information into a form and submits it for processing, their information could pass into a workflow application (such as FileNet or WebSphere Business Integration), a database (such as DB2 Universal Database or DB2 Content Manager), or any other type of application or process. There are four IBM Forms products: IBM Forms Server serves e-forms to web browsers and provides an API and platform to integrate e-forms with other business processes. IBM Forms Designer provides a WYSIWYG environment within Eclipse for designing e-forms. IBM Forms Viewer is a rich client that allows users to interact with e-forms online and offline. IBM Forms Turbo allows users to create, deploy, fill and perform basic reports on eForms using a Web browser. History of IBM Forms IBM Forms was originally a product called PureEdge Forms, developed by PureEdge Solutions based in Victoria, British Columbia, Canada. IBM bought PureEdge in 2005 and renamed the technology IBM Workplace Forms. In 2007, it was renamed Lotus Forms, starting with version 3.0. In 2010, it was rebranded IBM Forms, starting with version 4.0. Previous incarnation of Lotus Forms In 1994, Lotus Development Corporation introduced Lotus Forms, another tool for creating electronic and printed forms. It has no relation to the current IBM Forms product. Industry Standards From 1993 to 1998, PureEdge (since acquired by IBM) developed the Universal Forms Description Language (UFDL). XFDL is the result of developing an XML syntax for the UFDL, thereby permitting the expression of forms in a syntax that promotes application interoperability and adherence to worldwide Internet standards. The original version of XFDL was published as a W3C Note in 1998. A number of features of XFDL have since been incorporated into a W3C Recommendation called XForms between 2003 and 2009. References External links IBM Forms home page IBM Forms blog by John Boyer on IBM developerWorks Forms
https://en.wikipedia.org/wiki/Pierre%20Bellanger
Pierre Christian Bellanger (; born December 14, 1958) is founder and CEO of radio station Skyrock, and founder of Skyrock.com (French-language social network). Biography Bellanger created Skyrock in 1985 as a national FM station in France. Today, it ranks as the country's most popular radio station among 13- to 24-year-olds, with four million listeners each day. As a biology student in late 1970s Paris, Bellanger participated in the free radio movement that helped to topple the state's monopoly on broadcasting. Since then, as an entrepreneur in media and Internet, he has created a TV station, several radio stations, as well as numerous cable and satellite services. His interactive experience began in the mid-1980s with the Minitel and phone services. His first Internet company was created in 1994 as a joint venture with France Telecom. Bellanger is the author of two books: The Future of Radio (1992) and La convergence, c'est le code (2003). In 2006, the French Ministry of Culture and Communication named him to the Counsel for Strategic Analysis of Cultural and Communications Industries. In 2004, Bellanger helped to spearhead the French government's introduction of the Dispositif Alerte-Enlèvement, modeled on the North American AMBER Alert systems. Bibliography Pierre Bellanger : La radio du futur : Les sept défis de la radio commerciale en France, Armand Colin, (1992) Pierre Bellanger : Ils ont pensé le futur : web social, marketing, e-commerce..., KAWA Pierre Bellanger : La Souveraineté numérique, Éditions Stock References External links Pierre Bellanger on Social Networks 1958 births French businesspeople French people of Polish descent French people of Hungarian descent Living people
https://en.wikipedia.org/wiki/Median%20polish
The median polish is a simple and robust exploratory data analysis procedure proposed by the statistician John Tukey. The purpose of median polish is to find an additively-fit model for data in a two-way layout table (usually, results from a factorial experiment) of the form row effect + column effect + overall median. Median polish utilizes the medians obtained from the rows and the columns of a two-way table to iteratively calculate the row effect and column effect on the data. The results are not meant to be sensitive to the outliers, as the iterative procedure uses the medians rather than the means. Model for a two-way table Suppose an experiment observes the variable Y under the influence of two variables. We can arrange the data in a two-way table in which one variable is constant along the rows and the other variable constant along the columns. Let i and j denote the position of rows and columns (e.g. yij denotes the value of y at the ith row and the jth column). Then we can obtain a simple linear regression equation: where are constants, and and are values associated with rows and columns, respectively. The equation can be further simplified if no and values are present for the analysis: where and denote row effects and column effects, respectively. Procedure To carry out median polish: (1) find the row medians for each row, find the median of the row medians, record this as the overall effect. (2) subtract each element in a row by its row median, do this for all rows. (3) subtract the overall effect from each row median. (4) do the same for each column, and add the overall effect from column operations to the overall effect generated from row operations. (5) repeat (1)-(4) until negligible change occur with row or column medians References Frederick Mosteller and John Tukey (1977). "Data Analysis and Regression". Reading, MA: Addison-Wesley. . J.D. Emerson and D.C. Hoaglin (1983). "Analysis of two-way tables by medians". In "Understanding Robust and Exploratory Data Analysis", eds D. C. Hoaglin, F. Mosteller and J. W. Tukey. New York City: John Wiley & Sons. . pp. 165–210. William N. Venables and Brian D. Ripley (2002). Statistics Complements to Modern Applied Statistics with S, p.4–5. . Anwar Fitrianto, Hari Wijayanto, Sohel Rana, and Cheong Yee Voon (2014). "Median Polish for Final Grades of MTH3000- and MTH4000- Level Courses". Applied Mathematical Sciences, Vol. 8, no. 126, pp. 6295-6302 Exploratory data analysis
https://en.wikipedia.org/wiki/XML/EDIFACT
XML/EDIFACT is an Electronic Data Interchange (EDI) format used in Business-to-business transactions. It allows EDIFACT message types to be used by XML systems. EDIFACT is a formal machine-readable description of electronic business documents. It uses a syntax close to delimiter separated files. This syntax was invented in the 1980s to keep files as small as possible. Because of the Internet boom around 2000, XML started to become the most widely supported file syntax. But for example, an invoice is still an invoice, containing information about buyer, seller, product, due amount. EDIFACT works perfectly from the content viewpoint, but many software systems struggle to handle its syntax. So combining EDIFACT vocabulary and grammar with XML syntax makes XML/EDIFACT. The rules for XML/EDIFACT are defined by ISO TS 20625. Use-cases XML/EDIFACT is used in B2B scenarios as listed below: Newer EAI or B2B systems often cannot handle EDI (Electronic Data Interchange) syntax directly. Simple syntax converters do a 1:1 conversion before. Their input is an EDIFACT transaction file, their output an XML/EDIFACT instance file. XML/EDIFACT keeps XML B2B transactions relatively small. XML element names derived from EDIFACT tags are much shorter and more formal than those derived from natural language since they are simply expressions of the EDIFACT syntax. A company does not want to invest into new vocabularies from scratch. XML/EDIFACT reuses business content defined in UN/EDIFACT. Since 1987, the UN/EDIFACT library was enriched by global business needs for all sectors of industry, transport and public services. Large companies can order goods from small companies via XML/EDIFACT. The small companies use XSLT stylesheets to browse the message content in human readable forms, as shown in Example 3. Example 1: EDIFACT source code A name and address (NAD) segment, containing customer ID and customer address, expressed in EDIFACT syntax: NAD+BY+CST9955::91++Candy Inc+Sirup street 15+Sugar Town++55555' Example 3: XML/EDIFACT in a browser The same XML/EDIFACT instance presented with help of an XSLT stylesheet: External links UN/EDIFACT Main Page ISO/TS 20625:2002 - This document by the ISO costs CHF 158,00 to access. www.edifabric.com - A .NET framework for converting EDIFACT and X12 messages into XML and vice versa. Edifact-XML - A free complete java parser library for converting UN EDIFACT messages to XML. Edifact<->XML Converter plus Edifact xsd generator - UN/EDIFACT<->ISO/TS 20625 XML. XML-based standards Electronic data interchange
https://en.wikipedia.org/wiki/Galileo%20GDS
Galileo is a computer reservations system (CRS) owned by Travelport. As of 2000, it had a 26.4% share of worldwide CRS airline bookings. In addition to airline reservations, the Galileo CRS is also used to book train travel, cruises, car rental, and hotel rooms. The Galileo system was moved from Denver, Colorado, to the Worldspan datacenter in Atlanta, Georgia, on September 28, 2008, following the 2007 merger of Travelport and Worldspan (although they now share the same datacenter, they continue to be run as separate systems). Galileo is subject to the Capps II and its successor Secure Flight program for the selection of passengers with a risk profile. Galileo is a member of the International Air Transport Association, of the OpenTravel Alliance and of SITA. History Galileo traces its roots back to 1971 when United Airlines created its first computerized central reservation system under the name Apollo. During the 1980s and early 1990s, a significant proportion of airline tickets were sold by travel agents. Flights by the airline owning the reservation system had preferential display on the computer screen. Due to the high market penetration of the Sabre and Apollo systems, owned by American Airlines and United Airlines, respectively, Worldspan and Galileo were created by other airline groups in an attempt to gain market share in the computer reservation system market and, by inference, the commercial airline market. Galileo was formed in 1987 by nine European carriers -- British Airways, KLM Royal Dutch Airlines, Alitalia, Swissair, Austrian Airlines, Olympic, Sabena, Air Portugal and Aer Lingus. In response and to prevent possible government intervention, United Airlines spun off its Apollo reservation system, which was then controlled by Covia. Galileo International was born when Covia acquired Europe's Galileo and merged it with the Apollo system in 1992. The Apollo reservation system was used by United Airlines until 3 March 2012, when it switched to SHARES, a system used by its former Continental Airlines subsidiary. Apollo is still used by Galileo International (now part of Travelport GDS) travel agency customers in the United States, Canada, Mexico, and Japan. Galileo UK was originally created from Travicom which was the world's first multi-access reservations system using the technology developed by Videcom. Travicom was a company launched by Videcom, British Airways, British Caledonian and CCL in 1976 which in 1988 became Galileo UK. Developments Travel Agents now also book Amtrak Rail on the system and issue the tickets directly. Southwest Airlines has entered into a marketing agreement with Apollo/Galileo and travel agents are now able to book reservations on Southwest. These direct connects offer the possibility to sell ancillary services and to differentiate oneself from the competition. The development team at Travelport has developed an online search tool called ASK Travelport where registered users can go and find
https://en.wikipedia.org/wiki/European%20Peace%20Marches
The European Peace Marches (EPM) arose from a Europe-wide network of initiatives within the Peace Movement. The Marches took place from 1978 to 1992, mobilizing large numbers of citizens especially in the early 1980s. Their aim was to protest the arms race and the growth of military spending. The campaign had many ties to the peace groups in the former German Democratic Republic and to the British Campaign for Nuclear Disarmament. It evolved out of the Ostermärsche (Easter Marches) organized by the German peace movement. German author Heinrich Böll, German Bundestag member Petra Kelly and former Army colonel Gert Bastian were prominent members of the EPM. So are Volker Nick, Volker Scheub and Christoph. Then who wrote a book about blockade of the US Army base of Mutlangen. In November 1984, EPM organized a five-day "debriefing" workshop on the Hartmannswillerkopf in Alsace, France, following the struggle against the installation of Pershing II and SS-20 nuclear missiles in Germany (Mutlangen). About 200 representatives from many European peace movements came together to discuss the reasons of their failure to prevent this escalation in the arms race. The 1984 Network Liberty Alliance arose from this gathering. Arindi Seevah, disciple of Gandhi and founder of the Women's March Against Violence Project, recalled, in an interview broadcast on ITN and Zee TV: References External links Volker Nick, Volker Scheub, Christoph Then (1993). Mutlangen 1983-1987: Die Stationierung der Pershing II und die Kampagne Ziviler Ungehorsam bis zur Abrüstung. . Peace marches Cold War
https://en.wikipedia.org/wiki/Security%20descriptor
Security descriptors are data structures of security information for securable Windows objects, that is objects that can be identified by a unique name. Security descriptors can be associated with any named objects, including files, folders, shares, registry keys, processes, threads, named pipes, services, job objects and other resources. Security descriptors contain discretionary access control lists (DACLs) that contain access control entries (ACEs) that grant and deny access to trustees such as users or groups. They also contain a system access control list (SACLs) that control auditing of object access. ACEs may be explicitly applied to an object or inherited from a parent object. The order of ACEs in an ACL is important, with access denied ACEs appearing higher in the order than ACEs that grant access. Security descriptors also contain the object owner. Mandatory Integrity Control is implemented through a new type of ACE on a security descriptor. Files and folder permissions can be edited by various tools including Windows Explorer, WMI, command line tools like Cacls, XCacls, ICacls, SubInACL, the freeware Win32 console FILEACL, the free software utility SetACL, and other utilities. To edit a security descriptor, a user needs WRITE_DAC permissions to the object, a permission that is usually delegated by default to administrators and the object's owner. Permissions in NTFS The following table summarizes NTFS permissions and their roles (in individual rows.) The table exposes the following information: Permission code: Each access control entry (ACE) specifies its permission with binary code. There are 14 codes (12 in older systems.) Meaning: Each permission code has a meaning, depending on whether it is applied to a file or a folder. For example, code 0x01 on file indicates the permission to read the file, while on a folder indicates the permission to list the content of the folder. Knowing the meaning alone, however, is useless. An ACE must also specify to whom the permission applies, and whether that permission is granted or denied. Included in: In addition to individual permissions, an ACE can specify special permissions known as "generic access rights." These special permissions are equivalents of a number individual permissions. For example, GENERIC_READ (or GR) is the equivalent of "Read data", "Read attributes", "Read extended attributes", "Read permissions", and "Synchronize". Because it makes sense to ask for these five at the same time, requesting "GENERIC_READ" is more convenient. Alias: The two Windows command-line utilities (icacls and cacls) have their own aliases for these permissions. Most of these permissions are self-explanatory, except the following: Renaming a file requires the "Delete" permission. File Explorer doesn't show "Synchronize" and always sets it. Multi-threaded apps like File Explorer and Windows Command Prompt need the "Synchronize" permission to be able to work with files and folders. Footno
https://en.wikipedia.org/wiki/Bruce%20Lee%20%28video%20game%29
Bruce Lee is a platform game written by Ron J. Fortier for the Atari 8-bit family and published in 1984 by Datasoft. The graphics are by Kelly Day and music by John A. Fitzpatrick. The player takes the role of Bruce Lee, while a second player controls either Yamo or alternates with player one for control of Bruce Lee. Commodore 64 and Apple II versions were released the same year. The game was converted to the ZX Spectrum and Amstrad CPC and published by U.S. Gold. It was the first U.S. Gold release featuring a famous individual. An MSX version was published in 1985 by Comptiq. Gameplay The plot involves the eponymous martial artist advancing from chamber to chamber in a wizard's tower, seeking to claim infinite wealth and the secret of immortality. There are twenty chambers, each represented by a single screen with platforms and ladders. To progress, the player must collect a number of lanterns suspended from various points in the chamber. Most chambers are guarded by two mobile enemies; The Ninja, who attacks with a "bokken stick" and The Green Yamo, a large unarmed warrior, visually styled as a sumo wrestler but attacking with punches and "crushing kicks". On platforms with sufficient graphics support, Yamo's skin is actually pictured as green, though in cover art he has a natural human skin tone. A multiplayer mode allows a second player to control Yamo, or to allow two players to alternately control Bruce. If the player playing Yamo is inactive for a certain time, the computer takes over. The Ninja and Yamo are also vulnerable to the screen's dangers, but have infinite lives so they always return; whereas Yamo is consistently identified as a single person, one version of the manual implies that each reappearance of the ninja is a new individual, replacing the previous one. Later chambers include more hazards such as mines and moving walls, as well as a "comb-like" surface that has an electric spark racing along it. Skilful walking, climbing, ducking and jumping are required to negotiate them. On the twentieth screen, Lee finally faces the evil Fire Wizard. Upon completing the game, it "loops" again. From the second loop on, the Ninja and Yamo are replaced as soon as they are killed, and the safe spots in the room with multiple electrified combs are removed. Reception The game was in the top ten of the UK software charts by May 1985, and topped the Atari chart by July 1985. The following month, it was number-eight on the all-formats chart and number-one on the Atari chart. The ZX Spectrum version of Bruce Lee received enthusiastic reviews. Computer Gaming World stated that the game "delivers all the foot kicking, kick jabbing, quick ducking action-packed adventure you'd expect from a good grade B, martial arts movie". CRASH magazine awarded 91%, highlighting zesty graphics, enjoyable fighting action and addictivity. Sinclair User also found the game enjoyable, awarding 4 out of 5 stars, but felt that sound was underused and a larger
https://en.wikipedia.org/wiki/Network%20Norway
The company was founded in 2006 by small group of people from Telenor and NetCom (Norway). Together with Siemens - during a few months in 2006/2007 - they built a new mobile operator from scratch and had a commercial launch of the GSM-900 network in 2007. This is probably one of the quickest launches of a mobile operator in history. Their network covered the greater Oslo area, as well as the cities of Stavanger and Trondheim. Outside these cities, customers could roam on the network of the Norwegian operator Netcom Norway. During 2007 Network Norway attracted several other partners like One Call and Lebara Group (now MyCall) into using their network and late in 2007 Network Norway and Tele2 formed the company Mobile Norway, both having equal shares of 50%. Mobile Norway is the seventh Norwegian company to win a license to operate a commercial mobile network Early in 2008, the company won a UMTS license, but as of July, 2009, the network is not on the air. In December 2009 (21st) Mobile Norway signed a contract with equipment vendor Ericsson as provider of their 2G and 3G network. As of March 2010 Network Norway is the only Norwegian mobile network operator who sells the new Nexus One in Norway. In 2011 Tele2 was the owner of Network Norway. In 2014 Tele2 was bought by TeliaSonera (NetCom (Norway)) while Network Norway was sold from Tele2 to Ice.net Mobile phone companies of Norway
https://en.wikipedia.org/wiki/CWN
CWN may refer to: Canadian Water Network, a water organization in Canada Catholic World News, online independent news service Clean Water Network, an American public-policy non-profit organization CWN (TV station), an Australian television station
https://en.wikipedia.org/wiki/Fox%20Crime
Fox Crime (stylized as FOXCRIME), is a television network, launched by the Fox Networks Group, which airs across several countries of Europe, Africa and Asia such as Italy, Portugal, Serbia, Bulgaria, and Turkey. Its basic programming include numerous television series, sitcoms and movies, among others, related to crime, horror and investigation. It was first launched in Italy on 31 October 2004, Bulgaria on 13 October 2006, Portugal on 28 September 2007, Hong Kong on 3 May 2008, Singapore on 2 October 2006, and in Vietnam on 29 October 2007. Fox Crime was also launched in the Philippines on 1 January 2008, on Sky Cable. In Indonesia, the channel was made available via Indovision in the middle of 2010. Later, it was launched in Thailand on 29 July 2010. Since 2016, Fox crime is available in MENACE Regions via AD Drama HD and via Elife in the United Arab Emirates. FX and BabyTV channel was launched along with in India on March 25, 2009. Fox Channels India had received downlink strikes from the I&B Ministry of Italy for the three channels on March 12, 2009. However India and Sri Lanka were currently using the Asian Feed. Fox Crime HD was launched in Asia in May, 2016 via AsiaSat 5, in Latvia it was launched along with Fox Life and National Geographic Channel on October 1, 2011. In 2013 the channel was launched in Africa as part of StarSat. The channel in Africa officially closed on September 30, 2016, but FOX Crime continued broadcasting in Ages and Maindubs with a Portuguese version. The channel has been owned by the International Operations division of The Walt Disney Company since March 2019. As of November 2023, the channel is still active in Portugal. Fox Crime around the world Programming The Alienist Body of Proof (Bulgaria) Bones Breakout Kings Broadchurch Brotherhood Burn Notice Castle The Closer Crime Town USA COPS Criminal Minds Detroit 1-8-7 Dexter Edison ( Film ) Hannibal Movie Night ( Film - Bulgaria ) Eastern Promises ( Film ) Donnie Brasco ( Film - Bulgaria ) Flashpoint Hope Springs Hustle The Glades Journeyman Las Vegas Law & Order Law & Order: Criminal Intent Law & Order: Special Victims Unit Law & Order: UK Major Crimes Missing Monk Moonlighting Murder in the First Night Stalker Numb3rs Prison Break ReGenesis Republic of Doyle Romanzo criminale – La serie (Bulgaria) Rookie Blue Sleepers ( Film ) Shetland (Portugal) The Blacklist The Chicago Code The District The Killing The Killpoint The Listener The Practice The Sopranos The Walking Dead The Godfather 1,2,3 (film) Underbelly White Collar World's Wildest Police Videos Out Of Time ( Film ) 36 ( Film ) Fox Crime Turkey Breakout Kings Bull Common Law CSI: Crime Scene Investigation CSI: Miami CSI: NY Homeland Jo Luther Murdoch Mysteries NYC 22 Medium MacGyver N.C.I.S. N.C.I.S.: Los Angeles Shark The Chicago Code The Glades The Killing Vegas See also Fox Crime (Australian TV channel) Fox Crime
https://en.wikipedia.org/wiki/The%20Terror%20Network
The Terror Network: The Secret War of International Terrorism () is a 1981 book by Claire Sterling, published by Henry Holt & Company, which argued that the USSR was using terrorists as a proxy force. In part because of the book, CIA director William J. Casey commissioned a Special National Intelligence Estimate on Soviet support for terrorism. After receiving the draft estimate, Casey objected that there was less in the draft on Soviet ties to terrorism than in Sterling's book. Although Casey was advised that the CIA had played a part in supplying Sterling with "concocted misinformation for public propaganda", he requested that the draft be revised. The resulting estimate had this to say about the book: Michael Ledeen promoted the book's claims when it was published. He was quoted in National Review, a conservative magazine, claiming that "Almost everything Claire said was borne out" by Stasi files that emerged after the end of the Cold War. According to Melvin Goodman, the Head of Office of Soviet Affairs at the CIA from 1976 to 1987, the claims of a terror network were in fact black propaganda created by the CIA. References Books about terrorism Books about the Soviet Union 1981 non-fiction books Henry Holt and Company books Disinformation operations
https://en.wikipedia.org/wiki/Virtual%20facility
A Virtual Facility (VF) is a highly realistic digital representation of a data center. The term "virtual" in Virtual Facility refers to the use of the word in Virtual Reality rather than the abstraction of computer resources as in platform virtualization. The VF mirrors the characteristics of the physical facility over time and allows modeling all relevant characteristics of a physical data center with a high degree of precision. VF Model includes Three-dimensional physical facility layout Network connectivity of facility equipment Full inventory of facility equipment, including electronics and electrical systems such as Power Distribution Units (PDUs) and Uninterruptible Power Supplies (UPSs) Full air conditioning system (ACUs) and controls within the room The term Virtual Facility was introduced by Future Facilities, a data center design consultancy focused on delivering Design and Operational solutions to address the emerging environmental problems facing the modern Mission Critical Facility (MCF). The concept is, in essence, a convergence of the fields of Virtual Reality (VR), Computer Simulation, and Expert Systems, applied to the specific domain of facilities. The VF type of computer simulation allows detailed analysis and prototyping of air flow in the data center by making use of Computational Fluid Dynamics (CFD) techniques. This, in turn, allows the airflow and temperatures of the facility to be analyzed visually (Scientific Visualization) and numerically to study and predict what will happen in the real facility. The importance of scientific methods in the design of mission-critical facilities has become a necessity since the performance gains predicted by Moore's Law go hand in hand with a rise in power and heat dissipated by equipment. Rules of thumb have proven to be no longer adequate. VF design purposes Greenfield design Asset management Troubleshooting existing data centers Making existing data centers more resilient Making existing data centers more energy efficient Cost prediction Staff training Capacity planning Load growth management The VF is now being employed by many large organizations as a way of virtually assessing a situation before having to spend huge sums of money trying to solve a problem in a real facility. It is essential to know whether adding new equipment or changing equipment will cause a logistical or thermal problem. The VF allows the designer or operator to assess the best course of action and gives in-depth understanding on unintuitive behaviors. References Data management
https://en.wikipedia.org/wiki/Fax%20modem
A fax modem enables a computer to transmit and receive documents as faxes on a telephone line. A fax modem is like a data modem but is designed to transmit and receive documents to and from a fax machine or another fax modem. Some, but not all, fax modems do double duty as data modems. As with other modems, fax modems can be internal or external. Internal fax modems are often called fax boards. In the early 1990s small business PCs commonly had a PC-based fax/modem card and fax software (typically WinFax Pro). Largely replaced by email, PC-based faxing with a fax/modem declined at the turn of the century. Where faxing from a PC is required there are a number of Internet-based faxing alternatives. Where businesses still had one or more traditional fax machines churning out pages, they were usually outnumbered by PCs processing E-mail. PC faxing Computer users may set up a PC fax/modem with card, telephone line access and software. A special printer driver may be included to allow treating a fax modem as a printer. Fax integration is available in unified communications (e.g. E-mail, Voice Mail and Fax managed together), in a number of Hosted PBX products where standard features allow users to send a fax by using the fax phone number as the address of a E-mail message, and receive incoming faxes via E-mail with the Fax content presented as a PDF attachment. Medical systems continue to use this technology into the 21st century, but many home and business users dropped the use of fax modems in favor of high speed internet. Illustrations See also Fax Fax demodulator Fax server Internet fax Modem Pulse-code modulation Telephony References External links Modems Fax
https://en.wikipedia.org/wiki/LCIII
LCIII or variation, may refer to: Macintosh LC III, 1990s Apple personal computer Late Cypriot III (LCIII), a period of the Mediterranean Bronze Age LC III pelvic fracture in the Young-Burgess classification Local Council III (LCIII), a type of local administration in Uganda; see Local Council (Uganda) Creative Playthings LCIII, an educational toy modular electronics experiment kit, based on the Raytheon Lectron Praga LC-III (aircraft), see List of aircraft (Pi - Pz) See also LC3 (disambiguation) LCII (disambiguation) LCI (disambiguation)
https://en.wikipedia.org/wiki/SQL%20Server%20Pro
SQL Server Pro () was a monthly trade digital publication and website owned by Penton serving the information needs of IT Professionals in various fields including data processing, database administration, database development, computer-related consulting, and many other areas. The company had editorial offices in the San Francisco Bay Area and Fort Collins, Colorado, USA. Established in 1999, SQL Server Pro was a website for Microsoft SQL Server professionals. Common topics of the website and digital publication included: SQL Server Administration Backup and Recovery High Availability Performance Tuning Security Storage Virtualization SQL Server Development ASP.NET Entity Framework PowerShell T-SQL Visual Studio SQL Server 2014 SQL Server 2012 SQL Server 2008 SQL Server 2005 Business Intelligence SQL Server Analysis Services SQL Server Integration Services SQL Server Reporting Services SQL Server Pro and its sister magazine, Windows IT Pro, reach very similar audiences. SQL Server Pro, however, focuses more on Microsoft's relational database management system than Windows IT Pro, which has a broader focus. References External links SQL Server Pro website Business magazines published in the United States Monthly magazines published in the United States Online magazines published in the United States Defunct computer magazines published in the United States 1999 establishments in the United States Magazines published in Colorado Mass media in Fort Collins, Colorado Professional and trade magazines
https://en.wikipedia.org/wiki/Vernon%20Burton
Orville Vernon Burton is a professor of history at Clemson University, the director of its Clemson CyberInstitute, and an author. He formerly served as director of the Institute for Computing in Humanities, Arts, and Social Science (CHASS) and professor of history and sociology at the University of Illinois. He is also a senior research scientist at the National Center for Supercomputing Applications, where he is associate director for humanities and social sciences. Burton has authored more than a hundred articles and wrote or edited fourteen books. His books include In My Father's House Are Many Mansions: Family and Community in Edgefield, South Carolina that was the subject of sessions at the Southern Historical Association and the Social Science History Association’s annual meetings. It was also submitted for a Pulitzer. He also wrote The Age of Lincoln, winner of the 2007 Chicago Tribune Heartland Prize for non-fiction. With civil rights lawyer Armand Derfner in 2021, Burton published Justice Deferred: Race and the Supreme Court, a lengthy survey of race-related cases on the US Supreme Court. Burton was born in Royston, Georgia and grew up in Ninety Six, South Carolina. He received a B.A. in 1969 for his undergraduate studies at Furman University and received his Ph.D. in 1976 in American History from Princeton University. Burton was selected nationwide as the 1999 U.S. Research and Doctoral University Professor of the Year (presented by the Carnegie Foundation for the Advancement of Teaching and by the Council for Advancement and Support of Education). He received the American Historical Association’s Eugene Asher Distinguished Teacher Award for 2003. Within the University of Illinois, Burton has won teaching awards at the department, school, college, and campus levels and received the 2006 Campus Award for Excellence in Public Engagement from the University of Illinois. Selected bibliography Class, Conflict, and Consensus: Antebellum Southern Community Studies (1982) In My Father's House Are Many Mansions: Family and Community in Edgefield, South Carolina (1987) A Gentleman and an Officer: A Military and Social History of James B. Griffin's Civil War (1996) Computing in the Social Sciences and Humanities (2002) The Free Flag of Cuba : The Lost Novel of Lucy Holcombe Pickens (2002) chair editorial board Slavery in America (2007); online primary sources online The Age of Lincoln (2008) “The South as ‘Other,’ the Southerner as Stranger,” Journal of Southern History, 79 (Feb. 2013), 7–50. his 2012 presidential address Dixie Redux: Essays in Honor of Sheldon Hackney. Montgomery: New South Books. (2013) (co-editor with Raymond Arsenault) Justice Deferred: Race and the Supreme Court. Cambridge, MA: Harvard University Press. (2021) (with Armand Derfner) References External links Year of birth missing (living people) Living people People from Royston, Georgia People from Ninety Six, South Carolina University of Illinois faculty Clemson
https://en.wikipedia.org/wiki/Consolidated%20Tape%20System
The Consolidated Tape System (CTS) is the electronic service, introduced in April 1976, that provides last sale and trade data for issues admitted to dealings on the American Stock Exchange, New York Stock Exchange, and U.S. regional stock exchanges. The Consolidated Tape Association (CTA) is the operating authority for both the Consolidated Quotation System (CQS) and the Consolidated Tape System (CTS). In July 2023, the UK's Financial Conduct Authority (FCA) announced it was setting up a 'consolidated tape' system for City traders. As well as cutting costs and improving the quality of data, the FCA said the reforms would “increase transparency and access to trading data”. The consolidated tape system is to be set up initially for the UK's bonds market followed by equities. A competitive tender process is to be opened up that would see a single firm providing the CT for bonds. See also Securities Information Processor Market data National market system plan Ticker tape References Financial markets Self-regulatory organizations in the United States
https://en.wikipedia.org/wiki/EpiData
EpiData is a group of applications used in combination for creating documented data structures and analysis of quantitative data. Overview The EpiData Association, which created the software, was created in 1999 and is based in Denmark. EpiData was developed in Pascal and uses open standards such as HTML where possible. EpiData is widely used by organizations and individuals to create and analyze large amounts of data. The World Health Organization (WHO) uses EpiData in its STEPS method of collecting epidemiological, medical, and public health data, for biostatistics, and for other quantitative-based projects. Epicentre, the research wing of Médecins Sans Frontières, uses EpiData to manage data from its international research studies and field epidemiology studies. E.g.: Piola P, Fogg C et al.: Supervised versus unsupervised intake of six-dose artemether-lumefantrine for treatment of acute, uncomplicated Plasmodium falciparum malaria in Mbarara, Uganda: a randomised trial. Lancet. 2005 Apr 23–29;365(9469):1467-73 ''. Other examples: '', '' or ''. EpiData has two parts: Epidata Entry – used for simple or programmed data entry and data documentation. It handles simple forms or related systems EpiData Analysis – performs basic statistical analysis, graphs, and comprehensive data management, such as recoding data, label values and variables, and basic statistics. This application can create control charts, such as pareto charts or p-charts, and many other methods to visualize and describe statistical data. The software is free; development is funded by governmental and non-governmental organizations like WHO. See also Clinical surveillance Disease surveillance Epidemiological methods Control chart References External links EpiData official site EpiData Wiki EpiData-list – mailing list for EpiData World Health Organization STEPS approach to surveillance Médecins Sans Frontières Epicentre 1999 software Biostatistics Epidemiology Freeware Statistical software
https://en.wikipedia.org/wiki/Providence%20Black%20Repertory%20Company
The Providence Black Repertory Company (Black Rep) was a 501c3 non profit arts organization based in Providence, Rhode Island, USA. It offered programming inspired by the cultural traditions of the African Diaspora in Theater, Education, and Public Programs. It operated from 1996 till 2009. History Founded in 1996 by Artistic/Executive Director Donald W. King, and Chairman Michael S. Van Leesten, The Providence Black Repertory Company grew from a public program at AS220 called Xxodus Presents Miss Fannie's Soul Food Kitchen. Black Rep produced its first stage production, The Island, on the third floor of a former print shop on Washington St. in Downcity Providence. Ten years later, Black Rep was located at 276 Westminster St. in a facility that includes performance and rehearsal space as well as a café and lounge. Black Rep offers programming such as a Latin Jazz series, drumming workshops for youth, premiers of new American plays, and Sound Session, a music festival produced in partnership with The City of Providence's Department of Art, Culture & Tourism. Across the three program areas Black Rep contextualizes artistic work through humanities panels, discussions, printed materials, and outreach. In 2006, Black Rep celebrated its 10th Anniversary as a Downcity Providence cultural institution. According to a 2/1/2010 article published in the Providence Journal, "Established in 1996, the Black Rep was closed in December 2009 after the organization failed to keep a positive cash flow. The group was granted a hardship request to throw its annual New Year’s Eve party, in the hopes that revenue from the event could have helped pay off some debt. It wasn’t enough...". Theater The Theater experience at the Black Rep is informed by an approach that places the deliberate investigation of cultural, social, historical and political consciousness and conscience at the center of the creative process. Each season includes three mainstage productions and three readings of new American plays through the First Look Reading Series for plays in development. Mainstage productions have included plays by Amiri Baraka, Aisha Rahman, Athol Fugard, Federico García Lorca, Harold Pinter, Sam Shepard, Cheryl West, María Irene Fornés, and August Wilson, as well as original stage adaptations of the poetry of Langston Hughes and Kevin Young (poet). Each December, The Black Rep’s Affiliate Artist company develops a workshop production showcasing its own work in process while providing a chance for audiences to be part of its development. Public Programs Black Rep’s Public Programs present live music, poetry, and other performance-based art of the African Diaspora six nights a week in the Xxodus Café. Each week night of public programming is informed by a particular musical tradition of the African Diaspora. Monday is Polyphonic, an open mic for artists working in forms of musical expression deriving from the Blues (Hip Hop, Acoustic Solo, Rock etc.). Tuesday is Maro
https://en.wikipedia.org/wiki/Glee.com
GLEE.com was a social networking site geared toward the gay, lesbian, bisexual and transgender communities. The site was launched in February 2007 by Community Connect Inc. Community Connect was acquired by RadioOne Inc (now Urban One) in 2008. The site was shut down in 2010-11. Community Connect operated several niche market social networking sites and GLEE was their latest venture. As with their other social network sites, GLEE was modeled after the popular MySpace and Facebook offering many of the same features. GLEE.com was available only in the English language and primarily the North American market with approximately 86% of its users in the United States. Operations The site was free to users, generating revenues through advertising. Users registered and created profiles, which could include a variety of layout themes for profiles, users also had the option of custom designing a profile layout. Typically, profiles might include uploaded photo albums, music players, lists of interests and friends list. Other features included blog hosting, video hosting, groups, style and news sections, and community bulletin boards covering a variety of issues but with the added emphasis on those issues of importance to the LGBT community. Instant messaging, and email iswasavailable with other registered users. In addition, profiles are allowed a mirror on GLEE.com's professional networking site, which allows for job search (through an arrangement with Monster.com) along with the other features found on the social network. Publicity GLEE.com's launch in early 2007 received generally favorable coverage in internet focused media, with the caveat about competition from established sites and others still on the drawing board divvying up the niche market for potential LGBT users. In October 2007 GLEE.com received free publicity from an unlikely source, the United States military. The advertising firm that handles the military's recruiting advertising inadvertently placed the ads on the site. The mainstream and LGBT press along with several comedians picked up on the gaffe of advertising to an audience that the U.S. military then actively barred from joining through its Don't ask, don't tell policy. The Washington Post noted that Barack Obama created a profile on the site during the 2008 US Presidential election campaign. References External links Community Connect, Inc. Home page American social networking websites Companies based in New York City Internet properties established in 2007
https://en.wikipedia.org/wiki/World%20Magnetic%20Model
The World Magnetic Model (WMM) is a large spatial-scale representation of the Earth's magnetic field. It was developed jointly by the US National Geophysical Data Center and the British Geological Survey. The data and updates are issued by the US National Geospatial-Intelligence Agency and the UK Defence Geographic Centre. The model consists of a degree and order 12 spherical harmonic expansion of the magnetic scalar potential of the geomagnetic main field generated in the Earth's core. Apart from the 168 spherical-harmonic "Gauss" coefficients, the model also has an equal number of spherical-harmonic secular variation coefficients predicting the temporal evolution of the field over the upcoming five-year epoch. WMM is the standard geomagnetic model of the United States Department of Defense (DoD), the Ministry of Defence (United Kingdom), the North Atlantic Treaty Organization (NATO), the World Hydrographic Office (WHO) navigation and attitude/heading reference, and the Federal Aviation Administration (FAA). It is also used widely in civilian navigation systems as the magnetic model of the World Geodetic System. For example, WMM is pre-installed in Android and iOS devices to correct for the magnetic declination. The WMM is produced by the U.S. National Geophysical Data Center (NGDC) in collaboration with the British Geological Survey (BGS). The model, associated software, and documentation are distributed by the NGDC on behalf of National Geospatial-Intelligence Agency (NGA). Updated model coefficients are released at 5-year intervals, with WMM2015 (released Dec 15, 2014) supposed to last until December 31, 2019. However, due to extraordinarily large and erratic movements of the north magnetic pole, an out-of-cycle update (WMM2015v2) was released in February 2019 (delayed by a few weeks due to the U.S. federal government shutdown) to accurately model the magnetic field above 55° north latitude until the end of 2019. The next regular update (WMM2020) occurred in December 2019. Enhanced Magnetic Model (EMM) The Enhanced Magnetic Model (EMM) is a sister product of the NGDC featuring a much higher amount of data to degree and order 790, giving a wavelength of 51 km as opposed to the 3000 km of WMM. At this resolution, it is not only able to model the Earth's magnetic field at the core-mantle boundary ("main field"), but also take into account magnetic anomalies caused by the minerals in the Earth's crust. See also International Geomagnetic Reference Field: another model, of similar quality, which models past years as well Runway numbering References External links WMM model and software can be downloaded from the National Geophysical Data Center's WMM page World Magnetic Model method in the Android operating system World Magnetic Model 2015 NOAA press release Geomagnetism
https://en.wikipedia.org/wiki/Brutus%20Network
The Brutus Network () was a French Resistance movement during World War II. It was founded in 1941 by Pierre Fourcaud, parachuted in France with instructions from Charles de Gaulle to set up an intelligence network, and other socialist members of the French Section of the Workers' International (SFIO), from the Bouches-du-Rhône department in the Southern Zone, and led by Félix Gouin. As soon as July 1941, the network almost became the armed wing of the Comité d'action socialiste (CAS - Socialist Action Committee), of which Félix Gouin had been a co-founder, along with Daniel Mayer. The CAS delegate Eugène Thomas became the leader of the Brutus Network after the arrest of Pierre Fourcaud and the departure of his brother, Jean Fourcaud, for London. Extending itself in 1942–43, Brutus became a national Resistance network in February 1943, in particular through the impulsion of André Boyer. Boasting more than 1,000 agents, its headquarters were in Lyon, with Pierre Sudreau as responsible of the Northern Zone and Jean-Maurice Hermann of the Southern Zone. André Boyer entered the directing committee of the Mouvements unis de Résistance (United Movements of Resistance) in November 1943. At the end of this year, the network was strongly affected by the arrest of Boyer, Sudreau, and Hermann. Gaston Defferre, later mayor of Marseilles for years, succeeded to André Boyer (he was previously his deputy) as national chief. Some members Jean-Louis Bazerque Pierre Bourthoumieux Jean Biondi Élie Bloncourt André Boyer André Clavé Gaston Defferre Pierre Fourcaud Raymond Gernez Félix Gouin Ginette Kahn Bernheim Jean-Maurice Hermann Pierre Malafosse Daniel Mayer Émilienne Moreau Jacques Poupault Georges Ronceray Pierre Sudreau Eugène Thomas Jean Valnet Gaston Vedel Footnotes Bibliography Jean-Marc Binot and Bernard Boyer, Nom de code : Brutus, éd. Fayard, 2007 See also Vichy France French Section of the Workers' International External links Témoignage, video testimony of a Brutus member in Annecy French Resistance networks and movements French Section of the Workers' International
https://en.wikipedia.org/wiki/Domain%20Master%20Browser
The Domain Master Browser is necessary on a routed TCP/IP network, that is, when a Windows domain spans more than one TCP/IP network. When a Windows domain spans multiple subnets each of the subnets has an independent browser called the Master Browser. The Master Browser is responsible for the browse list within its respective subnet and portion of the domain on its subnet. The Domain Master Browser is used to collect information from each of the Master Browsers via the NetServerEnum API call. Once collected the list is merged with the Domain Master Browsers list for its own subnet. This merged list forms the enterprise wide browse list for the domain. This merged list is then distributed to the Master Browsers in each subnet so that the enterprise list can be available to computers requesting services. As part of the Microsoft Windows Server Operating Systems, the browser service is used to host information of other Windows computers within the same Windows domain or TCP/IP network... the Domain Master Browser coordinates browse lists from all the local browsers in a workgroup, no matter what their network segments. Browsing in these terms is specific to viewing network resources within the Windows network such as the available domains and computers. The information, called a Browse List, is held by the browser and primarily consists of the computer names and the services each of the computers offers. There are several browser roles: the Backup Browser, the Master Browser, and the Domain Master Browser. The Domain Master Browser is located on the domain Primary Domain Controller, or PDC. References External links http://support.microsoft.com/kb/188001/en-us – Description of the Microsoft Computer Browser Service http://support.microsoft.com/kb/188305 – Troubleshooting the Microsoft Computer Browser Service http://www.samba.org/samba/docs/man/Samba-HOWTO-Collection/NetworkBrowsing.html – explanation of browsing in MS Windows network Microsoft server technology
https://en.wikipedia.org/wiki/Apocalyptica%20%28video%20game%29
Apocalyptica is a third-person shooter computer game, developed by British studio Extreme FX (in their only official development credit) and published by Konami for Microsoft Windows on October 24, 2003. Gameplay Players control several different technologically advanced, religious super-soldiers (with four classes distinguishing between the larger number of characters) in a mission to destroy the armies of Neo-Satan, in locations like outer space, Nu Hades, and Hell. There are several weapon sets that the player can select (some unlocked in later levels), including a pistol and sword, a rifle, several spells, and later, large two-handed swords which heal the player with some of the damage done. There are a variety of different missions which have different ways to be completed. Some missions are simply objective-based, requiring the player to reach the end point of the mission, which may be accessed by using buttons or levers to open gates. Others require the rescue of hostages, and some require holding all of certain points on the map, while others are a fight over a certain object. In multiplayer mode, there are the classic games of Capture the Flag, Deathmatch, and Team Deathmatch against other players or the AI. Critical reception The game received generally negative reviews from critics. On the review aggregator GameRankings, the game had an average score of 40% based on 7 reviews. On Metacritic, the game had an average score of 34 out of 100, based on 5 reviews. Bob Colayco of GameSpot gave the game a rating of 3.1 out of 10, saying the game "is terrible from top to bottom, suffering from bland, derivative gameplay, simplistic level design, brain-dead AI, and a buggy graphics engine that chugs even at low resolution." Colayco said "The game was originally slated to ship for both the Xbox and the PC, but it doesn't take much time with the PC version to understand why the console version was scrapped.", saying that Konami quietly released the game and appeared to care little about it. References 2003 video games Konami games Third-person shooters Video games developed in the United Kingdom Windows games Windows-only games Multiplayer and single-player video games
https://en.wikipedia.org/wiki/MUMmer
MUMmer is a bioinformatics software system for sequence alignment. It is based on the suffix tree data structure and is considered by some to be one of the faster and most efficient systems available for this task, enabling it to be applied to very long sequences. It has been widely used for comparing different genomes to one another. In recent years, it has become a popular algorithm for comparing genome assemblies to one another, which allows scientists to determine how a genome has changed after adding more DNA sequence or after running a different genome assembly program. The acronym "MUMmer" comes from "Maximal Unique Matches", or MUMs. The original algorithms in the MUMMER software package were designed by Art Delcher, Simon Kasif and Steven Salzberg. Mummer was the first whole genome comparison system developed in Bioinformatics. It was originally applied to the comparison of two related strains of bacteria. The MUMmer software is open source and can be found at the MUMmer home page. The home page also has links to technical papers describing the system. The system is maintained primarily by Steven Salzberg and Arthur Delcher at Center for Computational Biology at Johns Hopkins University. MUMmer is a highly cited bioinformatics system in the scientific literature. According to Google Scholar, as of early 2013 the original MUMmer paper (Delcher et al., 1999) has been cited 691 times; the MUMmer 2 paper (Delcher et al., 2002) has been cited 455 times; and the MUMmer 3.0 article (Kurtz et al., 2004) has been cited 903 times. Overview What is MUMmer? Genomes are a large sequence of genetic instructions/information about an organism (in a chromosome); now, imagine “comparing a 4 Mb sequence such as M. Tuberculosis to another 4 Mb sequence, many algorithms either run out of memory or take too long to complete” (Arthur et al., 1999).Researchers therefore have been creating algorithms capable of comparing genome sequences. Mummer is a fast algorithm mostly used for the rapid alignment of entire genomes. The MUMmer algorithm is relatively new and has 4 versions. Versions of MUMmers MUMmer1 MUMmer1 or just MUMmer consists of three parts, the first part consists of the creation of suffix trees (to get MUMs), the second part in the longest increasing subsequence or longest common subsequences (to order MUMs), lastly any alignment to close gaps. To start the process, as a reminder, we need to get two Genomes as input. Once we receive them, we are going to search for the maximal unique matches (MUMs). MUMs’ algorithm has its own logic since it can be done in several ways. For instance, the naïve algorithm goes through all the sequences from one genome and compares it with the other sequences, which takes O(m*m2) which m and m2 are the two genomes. However, since MUMmer has to be fast, it uses the data structure called suffix tree (Suffix tree) which takes O(m+m2). From this tree, we extract the MUMs (which are the subsequences that are represen
https://en.wikipedia.org/wiki/Antec
Antec, Inc. is a Taiwanese manufacturer of personal computer (PC) components and consumer tech products. Antec's principal products are computer cases and power supplies. Antec also offers PC cooling products, notebook accessories, and previously offered a line of Antec Mobile Products (A.M.P.) which included Bluetooth speakers, headphones, portable batteries, and charging hubs. Originally founded in 1986 in Fremont, California, the company is now headquartered in Taipei City, with additional offices in Rotterdam, Beijing, and Fremont, California. Antec pioneered a number of innovations in the PC case industry, including the switch from beige to black exterior color, and first cases specifically designed for noise reduction with the Sonata and P180. In 2011, Antec was purchased by Ming-Jong Technologies Ltd. of Taiwan, and the combined company adopted the Antec name. Antec products are sold in over 40 countries through its online retail platform, Amazon, and distribution partners. The company is publicly traded on the Taipei stock exchange under ticker 6276. Products Computer enclosures Computer power supplies Computer cooling products Antec Mobile Products (a.m.p) In October 2012, Antec launched the now-defunct Antec Mobile Products (A.M.P.), a wholly owned subsidiary of Antec. The product range included a line of Bluetooth audio devices, USB-powered battery packs and mobile chargers. Console Gaming Antec entered the console gaming sector with the X-1 Cooler for the Xbox One in 2015 which received positive reviews. The cooler prevented the console from over-heating while in use and helped preserve the lifespan of the console. References External links Official website Antec Mobile Products website Manufacturing companies established in 1986 Computer enclosure companies Computer power supply unit manufacturers 1986 establishments in California Computer hardware cooling Companies listed on the Taipei Exchange
https://en.wikipedia.org/wiki/Sydney%20County%20Council
The Sydney County Council (SCC) was formed in 1935 to produce electricity and operate the electricity network in a number of municipalities in metropolitan Sydney. Unlike other New South Wales county councils, which were voluntary associations of local councils to undertake local government activities permitted or required of them by the Local Governnment Act 1919 (including electricity, gas and water supply, flood mitigation, weed control, abbatoirs, airports, town planning), Sydney County Council was established under a separate piece of legislation by the state government to perform the electricity distribution and streetlighting operations of the local government areas concerned. On its establishment it assumed control of the Electricity Department of the Sydney City Council, which was already supplying electricity to other municipalities. In 1952, the SCC lost most its electricity generation functions to the Electricity Commission of New South Wales (established 1950) and retained only its distribution functions. The SCC was merged with other municipal county councils in 1990 to form Sydney Electricity. History In 1904, the Municipal Council of Sydney's Electricity Department, one of the two main authorities responsible for electricity generation at the time, began to generate electricity for streetlights in the Sydney central business district. Pyrmont Power Station began operations in 1904, as the Sydney Electric Lighting Station, and was expanded over time. Construction of the Bunnerong Power Station began in 1926, and when Bunnerong 'A' Station was completed in 1937 it had a capacity of 175 MW, making it the largest power station in the State, and further expansion brought its capacity to 375 MW, making Bunnerong the largest power station in the southern hemisphere. In 1935, the Sydney County Council was formed and took over ownership of the Municipality of Sydney's Electricity Department including its power stations, which by then supplied electricity for domestic, commercial and community uses in addition to the original purpose of supply for street lighting. SCC progressively took over the electricity operations of other local councils in its vicinity. SCC took over the electricity works of Sutherland Shire Council in 1949. After the Electricity Commission of New South Wales was created in 1950 to manage electricity generation and distribution across the state, the SCC's Bunnerong and Pyrmont Power Stations were transferred to it in 1952; and the SCC became an electricity distributor only. By 1982, Brisbane Water, Mackellar and St George County Councils had merged with SCC. In 1989, the state government legislated to abolish the SCC and other electricity supply county councils formed under the Local Government Act. SCC became Sydney Electricity, a government controlled corporation. County council employees had been entitled to payment for unused accumulated sick leave but the state government legislated to prohibit such, leaving t
https://en.wikipedia.org/wiki/Wireless%20Session%20Protocol
The Wireless Session Protocol (WSP) is a communication protocol used in wireless networks to establish and manage sessions between a client and a server. It is part of the Wireless Application Protocol (WAP) suite of protocols and is designed to provide reliable and efficient data transfer over wireless connections. WSP allows for the exchange of messages between the client and server, enabling the delivery of content such as web pages, emails, and other data. Wireless Session Protocol (WSP) is an open standard for maintaining high-level Wireless sessions. The Protocol is involved from the second that the user connects to one URL and ends when the user leaves that URL. The session-wide properties are defined once at the beginning of the session, saving bandwidth over continuous monitoring. The session-establishing process does not have long connection algorithms. WSP is based on HTTP 1.1 with few enhancements. WSP provides the upper-level application layer of WAP with a consistent interface for two session services. The first is a connection-oriented service that operates above a transaction layer protocol WTP and the second is a connectionless service that operates above a secure or non-secure data-gram transport service. Therefore, WSP exists for two reasons. First, the connection mode enhances HTTP 1.1's performance over the wireless environment. Second, it provides a session layer so the whole WAP environment resembles OSI OSI Reference Model. References External links Open Mobile Alliance WSP on the Wireshark Wiki Open Mobile Alliance standards Session layer protocols Wireless Application Protocol
https://en.wikipedia.org/wiki/Darren%20McDonald
Darren McDonald (born 1967) is an Australian news anchor known for his work on Australia's Seven Network and New Zealand's TV3. Career McDonald was one of Australia's youngest news anchors, first presenting at age 17. Darren went on to read the news on 11am, and then became the first anchor of Sunrise News when it launched to cover the first Gulf War. Darren later worked at National Nine News, however his involvement with Network Ten show Sex/Life saw the end of his Australian television career after a segment saw him simulate masturbation. He later became a news reader in New Zealand at TV3 in the late 1990s, where he regularly presented late night news programme Nightline. Personal life McDonald is gay. In early 2002, a number of people were arrested for selling methamphetamine and importing MDMA into New Zealand; McDonald was amongst them. In 2003, he pleaded guilty to offering to supply methamphetamine and conspiracy to supply ecstasy. He admitted having been a drug addict from the age of 21, saying that he would spend around $1000 on drugs each week, and that he had even read the news while high on methamphetamine. See also List of New Zealand television personalities References Gay journalists Living people Australian LGBT journalists Australian television presenters New Zealand television presenters Australian expatriates in New Zealand 1967 births 21st-century Australian LGBT people
https://en.wikipedia.org/wiki/List%20of%20H2O%3A%20Just%20Add%20Water%20episodes
The following is an episode list for the Australian television show H2O: Just Add Water, which first aired on Network Ten in Australia and has since been broadcast in more than 120 countries worldwide. Series one premiered in Australia on 7 July 2006 and series two began there on 28 September 2007. The third series premiered in the United Kingdom on 26 October 2009 while its Australian premiere occurred on 22 May 2010. Series overview {| class="wikitable plainrowheaders" style="text-align:center;" |- ! scope="col" colspan="2" rowspan="2" style="padding: 0px 8px" |Series ! scope="col" rowspan="2" style="padding: 0px 8px" |Episodes ! scope="col" colspan="2" style="padding: 1px 8px" |Originally aired |- ! scope="col" style="padding: 1px 8px" | Series premiere ! scope="col" style="padding: 1px 8px" | Series finale |- | scope="row" bgcolor="#004FC5" height="10px"| | [[List of H2O: Just Add Water episodes#Series one (2006)|1]] | 26 | | |- | scope="row" bgcolor="#00AAFF" height="10px"| | [[List of H2O: Just Add Water episodes#Series two (2007–08)|2]] | 26 | | |- | scope="row" bgcolor="#00FFFF" height="10px"| | [[List of H2O: Just Add Water episodes#Series three (2009–10)|3]] | 26 | (UK) | (UK) |} Episodes Series one (2006) Emma Gilbert (Claire Holt), Cleo Sertori (Phoebe Tonkin) and Rikki Chadwick (Cariba Heine) are three teenage girls who become stranded on the mysterious Mako Island. When they enter an underground pool of water that leads to the ocean they find themselves bathed in the glow of moonlight from overhead. After being rescued the girls return to their normal lives but soon discover they have changed: seconds after contact with water they transform into mermaids. After further experimentation, they discover they also have unique supernatural powers over water. Emma can freeze water, Cleo can control the shape and volume of water, and Rikki can boil water. The girls enlist Cleo's long-time friend Lewis McCartney (Angus McLaren) to try to determine why this has happened to them and help them keep their new identity a secret. The series focuses on the girls dealing with everyday teen problems while trying to cope with their newfound abilities. The first series features a single primary storyline with three main elements. The girls meet Louise Chatham (Christine Amor), an older woman who reveals that she too was once a mermaid. She helps the girls understand their own situation and warns them of the dangers involved. After a confrontation with Ms. Chatham, Zane Bennett (Burgess Abernethy) gets trapped on her sinking houseboat which forces Emma to rush to his aid. During the rescue, Zane catches a glimpse of her tail and becomes obsessed with finding this "sea monster". Doctor Denman (Lara Cox), a marine biologist, also becomes focused on the mermaids when Lewis accidentally leaves behind a genetic sample of the girls he was working on in her lab. Zane later helps her to capture the girls, unaware of their true identities. When h
https://en.wikipedia.org/wiki/SocialRank
SocialRank (also called Social PageRank) is an algorithm that assigns a numerical weighting to each node in a Social networking service, with the purpose of measuring the node's - or the person's - relative importance or influence within the network. One approach to define a SocialRank is to calculate a superposition of attention that a node directly receives and SocialRank of its neighborhood. This definition partly follows the idea of Google's PageRank and means that the SocialRank of a person depends on autonomous value and on the SocialRank of other people that link to it. SocialRank is useful for characterizing communication networks such as Email or Instant Messaging, but it is particularly well-suited to describe users of Web 2.0 services such as Contact Management sites. External links Business Intelligence und Web 2.0 - Modellierung von Social Networks Social networks Social science indices
https://en.wikipedia.org/wiki/Plus%20minus%20method
The plus-minus method, also known as CRM (conventional reciprocal method), is a geophysical method to analyze seismic refraction data developed by J. G. Hagedoorn. It can be used to calculate the depth and velocity variations of an undulating layer boundary for slope angles less than ~10°. Theory In the plus-minus method, the near surface is modeled as a layer above a halfspace where both the layer and the halfspace are allowed to have varying velocities. The method is based on the analysis of the so-called 'plus time' and 'minus time' that are given by: where is the traveltime from A to B, the traveltime from A to X and the traveltime from B to X. Assuming that the layer boundary is planar between A'' and B'' and that the dip is small (<10°), the plus time corresponds to the intercept time in classic refraction analysis and the minus time can be expressed as: where is the offset between A and X and is the velocity of the halfspace. Therefore, the slope of the minus time can be used to estimate the velocity of the halfspace : The interval over which the slope is estimated should be chosen according to data quality. A larger results in more stable velocity estimates but also introduces stronger smoothing. Like in classical refraction analysis, the thickness of the upper layer can be derived from the intercept time : This requires an estimation of the velocity of the upper layer which can be obtained from the direct wave in the traveltime diagram. Furthermore, the results of the Plus-minus method can be used to calculate the shot-receiver static shift : where is the datum elevation and the surface elevation at station X. Applications The Plus-minus was developed for shallow seismic surveys where a thin, low velocity weathering layer covers the more solid basement. The thickness of the weathering layer is, among others, important for static corrections in reflection seismic processing or for engineering purposes. An important advantage of the method is that it does not require manual interpretation of the intercept time or the crossover point. This makes it is also easy to implement in computer programs. However, it is only applicable if the layer boundary is planar in parts and the dips are small. These assumptions often lead to smoothing of the actual topography of the layer boundary. Nowadays, the Plus-minus method has mostly been replaced by more advanced inversion methods that have less restrictions. However, the Plus-minus method is still used for real-time processing in the field because of its simplicity and low computational costs. References Seismology measurement
https://en.wikipedia.org/wiki/European%20Cooperation%20in%20Science%20and%20Technology
The European Cooperation in Science and Technology (COST Association) is running an EU-funded programme which enables researchers and innovators to set-up their own research networks in a wide range of scientific topics, called COST Actions. While COST does not fund research activities as such, it provides funding for scientific collaboration in the form of conferences, meetings, training schools and scientific exchanges. To date, COST has 41 Full Members, 1 Cooperating Member and 1 Partner Member. Prof. Alain Beretz is currently serving as the President of the COST Association, following his appointment in June 2021. History In the 1960s, European countries felt the need to begin framing science policies in order to bridge the gap in science and technology between Europe and the USA. As a result, COST was founded in 1971 to connect the research systems of individual European countries. The Ministerial Conference of 22 and 23 November 1971 is generally presented as the official entry into force of COST and at which the first intergovernmental agreements were signed. Objectives The COST governing board, the Committee of Senior Officials, approved the mission that will drive COST throughout the end of Horizon Europe:“COST provides networking opportunities for researchers and innovators in order to strengthen Europe’s capacity to address scientific, technological and societal challenges.”The organisation is currently engaging about 45,000 researchers and innovators. In all, nearly half a million researchers have participated in COST over the years. Members The 41 COST Members are: Albania, Armenia, Austria, Belgium, Bosnia and Herzegovina, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Georgia, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Moldova, Montenegro, The Netherlands, The Republic of North Macedonia, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey, United Kingdom, Ukraine. These countries govern COST via their representatives in the COST Committee of Senior Officials (CSO) – the General Assembly of the COST Association. Israel is a Cooperating Member and South Africa a Partner Member. COST Near Neighbour Countries include Algeria, Azerbaijan, Belarus, Egypt, The Faroe Islands, Jordan, Kosovo*, Lebanon, Libya, Morocco, Palestine**, Russia***, Syria, and Tunisia. Once their participation is approved, researchers from Near Neighbour Countries’ institutions are eligible to participate in the COST Action on the same basis as the COST Members that have signed the Memorandum of Understanding (MoU) – with the exception of the right to vote in the Management Committees or Working Groups of the Action. International Partner Countries are non-COST Members who are not a Near-Neighbour Country i.e. any country (worldwide) that is not included in the previous lists. Once their participation is approved, researchers from I
https://en.wikipedia.org/wiki/Russian%20Business%20Network
The Russian Business Network (commonly abbreviated as RBN) is a multi-faceted cybercrime organization, specializing in and in some cases monopolizing personal identity theft for resale. It is the originator of MPack and an alleged operator of the now defunct Storm botnet. The RBN, which is notorious for its hosting of illegal and dubious businesses, originated as an Internet service provider for child pornography, phishing, spam, and malware distribution physically based in St. Petersburg, Russia. By 2007, it developed partner and affiliate marketing techniques in many countries to provide a method for organized crime to target victims internationally. Activities According to internet security company VeriSign, RBN was registered as an internet site in 2006. Initially, much of its activity was legitimate. But apparently the founders soon discovered that it was more profitable to host illegitimate activities and started hiring its services to criminals. The RBN has been described by VeriSign as "the baddest of the bad". It offers web hosting services and Internet access to a wide range of criminal and objectionable activities, with individual activities earning up to $150 million in one year. Businesses that take active stands against such attacks are sometimes targeted by denial of service attacks originating in the RBN network. RBN has been known to sell its services to these operations for $600 per month. The business is difficult to trace. It is not a registered company, and its domains are registered to anonymous addresses. Its owners are known only by nicknames. It does not advertise, and trades only in untraceable electronic transactions. One increasingly known activity of the RBN is delivery of exploits through fake anti-spyware and anti-malware, for the purposes of PC hijacking and personal identity theft. McAfee SiteAdvisor tested 279 “bad” downloads from malwarealarm.com, mentioned in the Dancho Danchev referenced article, and found that MalwareAlarm is an update of the fake anti-spyware Malware Wiper. The user is enticed to use a “free download” to test for spyware or malware on their PC; MalwareAlarm then displays a warning message of problems on the PC to persuade the unwary web site visitor to purchase the paid version. In addition to MalwareAlarm, numerous instances of rogue software are linked to and hosted by the RBN. According to a since closed Spamhaus report, RBN is “Among the world's worst spammer, malware, phishing and cybercrime hosting networks. Provides 'bulletproof hosting', but is probably involved in the crime too”. Another Spamhaus report states, "Endless Russian/Ukrainian funded cybercrime hosting [at this network]." October 13, 2007, RBN was the subject of a Washington Post article, in which Symantec and other security firms claim RBN provides hosting for many illegal activities, including identity theft and phishing. Routing operations The RBN operates (or operated) on numerous Internet Serv
https://en.wikipedia.org/wiki/William%20Henry%20Blackmore
William Henry Blackmore (2 August 1827 – 12 April 1878) was an English lawyer who gained a fortune by exploiting a large social network as an investment promoter. He used his fortune for philanthropy, primarily centred on his interest in Native Americans, but ended his life after a failed investment deal related to the Denver and Rio Grande Western Railroad. Lawyer William was born 2 August 1827 in Salisbury, Wiltshire, England, to a family claiming descent from the family of Sir Richard Blackmore, the English poet and physician. His grandfather, The Reverend Richard Blackmore, was Rector of Donhead St Mary located on the edge of the Blackmore Vale. He attended King's College, Bruton, a public school in the neighbouring county of Somerset and then was articled to his uncle John Lambert of the Salisbury firm of solicitors Lambert and Norton. After qualifying in 1848 Henry joined the firm of solicitors Duncan, Squarey and Duncan in Liverpool, England and soon became a full partner of Duncan, Squarey and Blackmore. He was elected as a member of the American Philosophical Society in 1869. Social network and venture capitalisation Through several maritime compensation cases William developed contacts with Americans and their representatives; as well as British and European, investors, business and political leaders. An American lawyer, Cyrus Martin Fisher, showed William the large and immediate returns to assisting ventures to find capital. To this end William found his family and business connections useful. In each deal the promoter either took fees, stock or both in exchange for placing bonds or shares with investors. He opened a second office in Founder's Court, Lothbury, London, had success in ventures in Europe and Africa and became well known in British and European investment circles. On 14 May 1851 William married Mary Sidford. The couple entertained many prominent people of the time at Shepley House in Carshalton, south of London, including: Oliver Wendell Holmes Sr., Alfred, Lord Tennyson, "Mark Twain", John Russell Bartlett, Sir John Evans, Sir Arthur Church, the artist Ernest Griset, Sir John Lubbock, Colonel Lane Fox, Joseph W. Prestwick, and Charlotte Brontë. American investment On his first trip to America, 1863, William met with investors in New York and they developed a plan for investments in lands in Virginia, headed to Washington, D.C. in early 1864 with letters of introduction to senators, congressmen and President Abraham Lincoln. William made several trips to the United States to find investment opportunities, making additional deals with lands in Colorado and New Mexico and forming railway companies. General William Jackson Palmer needed financing for the Denver and Rio Grande Railroad which Blackmore placed primarily with a party of Dutch bankers. Blackmore became an investor in the United States Freehold Land and Emigration Company Limited which promoted emigration, particularly from the Netherlands and German
https://en.wikipedia.org/wiki/Shiraz%20Shivji
Shiraz Shivji (born 1947 in what is now Tanzania) was the primary designer of the 1985 Atari ST computer, and one of the engineers of the Commodore 64. Biography Shiraz Shivji, born 1947 in what is now Tanzania, was of Indian Ismaili heritage. He was interested in electronics from an early age in what is now Tanzania. He was educated in the United Kingdom, where he obtained a first-class honours degree at the University of Southampton. He then moved to the United States, where he obtained a master's degree in electrical engineering at Stanford University during 1969–1973. Commodore Shivji began work at Silicon Valley, and found work at Commodore International, where he was one of the engineers that helped build the Commodore 64. By 1984, he had been promoted to being the director of engineering at Commodore. In 1984, Shivji was involved in a scandal related to his work on the Commodore 900. He was one of three systems engineers on the project since its inception in 1983. He was sued by Commodore in mid-July 1984 for disclosing confidential research information connected to this project and disk drive design plans as he was beginning to transfer to Atari Corporation with Jack Tramiel. He was acquitted of all charges in court alongside several other engineers. Atari Corporation When Jack Tramiel took over Atari in 1984, with a number of Commodore engineers, the company was in bad shape, and Shivji's proposed cheap, powerful home computer, codenamed 'Rock Bottom Price,' was seen as a solution to financial woes. While working for the newly founded Atari Corporation, Shivji was the primary designer of the Atari ST computer, among other projects. Shivji became Atari's Vice President of Research and Development, and led a team of six engineers who designed the Atari 520ST computer. This work was completed in five months (July to December 1984). The prototype presentation at the January 1985 Las Vegas CES was successful for Atari, and the product revived the company. Shivji later led the design of the Atari TT before leaving Atari in 1990. Post-Atari Kamran Elahian recruited Shivji for his 1989 startup company, Momenta. While there Shivji designed the Momenta Pen Computer, the first pentop computer and one of the first full sized tablet computers. Shivji received seven patents between the years of 2000 and 2007. References External links Father of the ST A tribute to the ST List of patents filed 1947 births 20th-century American engineers 20th-century Indian engineers Alumni of the University of Southampton American electrical engineers Atari people Commodore people Indian Ismailis American Ismailis Tanzanian Ismailis Indian electrical engineers Indian emigrants to the United States Living people Stanford University alumni Tanzanian emigrants to the United States Tanzanian engineers Tanzanian people of Indian descent
https://en.wikipedia.org/wiki/Pile%20%28abstract%20data%20type%29
In computer science, a pile is an abstract data type for storing data in a loosely ordered way. There are two different usages of the term; one refers to an ordered double-ended queue, the other to an improved heap. Ordered double-ended queue The first version combines the properties of the double-ended queue (deque) and a priority queue and may be described as an ordered deque. An item may be added to the head of the list if the new item is valued less than or equal to the current head or to the tail of the list if the new item is greater than or equal to the current tail. Elements may be removed from both the head and the tail. Piles of this kind are used in the "UnShuffle sort" sorting algorithm. Improved heap The second version is a subject of patents and improves the heap data structure. The whole data pile based system can be generalized as shown: References Abstract data types
https://en.wikipedia.org/wiki/KNN
KNN may refer to: k-nearest neighbors algorithm (k-NN), a method for classifying objects Nearest neighbor graph (k-NNG), a graph connecting each point to its k nearest neighbors Kabataan News Network, a Philippine television show made by teens Khanna railway station, in Khanna, Punjab, India (by Indian Railways code) Kings Norton railway station, in Birmingham, England (by National Rail code) Knighton News Network, the recurring TV station which hosts the news recap by Herb Herbertson at the beginning of every episode of Nexo Knights Konkani language, spoken in the Konkan coast of India (by ISO 639-3 language code) Korea New Network, broadcast television in South Korea Kurdish News Network, news television network in Iraqi Kurdistan Kankan Airport, Guinea (by IATA airport code)
https://en.wikipedia.org/wiki/Japan%20National%20Route%2023
is a national highway connecting Toyohashi, Aichi and Ise, Mie in Japan. Route data Length: Origin: Toyohashi (originates at junction with Route 1) Terminus: Ise (ends at Ise Shrine) Major cities: Nishio, Nagoya, Yokkaichi and Tsu History 4 December 1952 - Designated as First Class National Highway 23 (from Yokkaichi, Mie to Ise, Mie) 1 April 1965 - Designated as General National Highway 23 (from Yokkaichi, Mie to Ise, Mie) 1 April 1975 - The highway was extended with the addition of a section between Yokkaichi, Mie and Toyohashi, Aichi. Intersects with Aichi Prefecture Mie Prefecture References 023 Roads in Aichi Prefecture Roads in Mie Prefecture
https://en.wikipedia.org/wiki/Sphaerodictyaceae
Sphaerodictyaceae is a family of green algae, in the order Chlamydomonadales. References External links Scientific references Scientific databases AlgaeBase AlgaTerra database Index Nominum Genericorum Chlorophyceae families Chlamydomonadales
https://en.wikipedia.org/wiki/Japan%20National%20Route%2024
is a national highway connecting Kyoto and Wakayama in Japan. Route data Length: 130.3 km (87.2 mi) Origin: Kyoto (originates at junction with Routes 1, 8 and 9) Terminus: Wakayama City (ends at Junction with Routes 26 and 42) Major cities: Uji, Nara, Tenri, Kashihara, Yamatotakada, Gojō, Hashimoto, Iwade History 4 December 1952 - First Class National Highway 24 (from Kyoto to Wakayama) 1 April 1965 - General National Highway 24 (from Kyoto to Wakayama) Intersects with Kyoto Prefecture Nara Prefecture Wakayama Prefecture References 024 Roads in Kyoto Prefecture Roads in Nara Prefecture Roads in Wakayama Prefecture
https://en.wikipedia.org/wiki/A%20Fire%20in%20the%20Sun
A Fire in the Sun is a cyberpunk science fiction novel by American writer George Alec Effinger, published in 1989. It is the second novel in the three-book Marîd Audran series, following the events of When Gravity Fails, and concentrating on Marîd's experience as he becomes the main lieutenant of Friedlander Bey's business empire while realizing that his new master has darker aspects than he suspected. The title of the novel comes from "It's All Over Now, Baby Blue", a song by Bob Dylan: "Yonder stands your orphan with his gun / crying like a fire in the sun". Plot summary Taking place some months after the events described in When Gravity Fails, Marîd Audran, once a small-time hustler on the streets of the decadent Budayeen, finds himself as one of the lieutenants of Friedlander Bey or "Papa", the most influential man in the city. With his independence taken from him and being stationed as a liaison between Bey and the local law enforcement under the supervision of Sergeant Hajjar, Audran is forced to pair up with his colleague Jirji Shaknahyi in order to track down yet another serial killer who likes to remove some of the internal organs of their victims. References American science fiction novels Cyberpunk novels 1989 science fiction novels 1989 American novels Doubleday (publisher) books
https://en.wikipedia.org/wiki/Ai%20Senshi%20Nicol
is a 1987 action-adventure game by Konami for the Family Computer Disk System. It was only released in Japan. Plot Nicol, a 14-year-old genius inventor and his girlfriend Stella, manage to invent a dimensional space transporting device. However, their research attracts the attention of Gyumao (Cow Demon), a ruthless dictator of a military empire with plans for space conquest. The Demon offers to buy the device from the couple and act out his nefarious plans. Wanting to preserve the peace of his world, Nicol turns down the offer, denying Gyumao the means to accomplish his goal. The Demon, furious, dispatches his soldiers to kidnap Stella and steal the device from Nicol's laboratory. The soldiers ambush Nicol and Stella during a date, overpowering Nicol and carrying off his girlfriend. Defeated, Nicol returns to his laboratory only to find the device gone. Fortunately, the transporter was not yet complete, lacking a vital part which was still in Nicol's possession. Gyumao hopes to exchange Stella with the indispensable part he needs, but Nicol has other plans in mind. Against Gyumao's orders, he travels to Gyumao's Dairasu star system to free his lover himself. A disapproving Gyumao shatters the device into pieces and scatters those fragments across seven locations. Nicol must then travel across Dairasu, collect the fragments, repair the transporter, and liberate his girlfriend. References External links Game info from Atari HQ 1987 video games Action-adventure games Famicom Disk System games Japan-exclusive video games Mobile games Konami games Video games developed in Japan
https://en.wikipedia.org/wiki/TransGrid
Transgrid is the manager and operator of the high voltage electricity transmission network in New South Wales and the Australian Capital Territory, Australia, and is part of the National Electricity Market (NEM). The company's offices are located in Sydney, Newcastle, Orange, Tamworth, Wagga, and Yass. History Transgrid began as the trading name of the Electricity Transmission Authority which was established on 1 February 1995 as a statutory authority under the Electricity Transmission Authority Act 1994, as part of the break-up of the Electricity Commission of New South Wales. The Authority was corporatised in December 1998, by the Energy Services Corporations Amendment (Transgrid Corporatisation) Act 1998, and Transgrid became the actual name of the corporation. In December 2015, a consortium called NSW Electricity Networks was the successful bidder for a 99-year lease of Transgrid's transmission network for $10.3 billion. The consortium consists of two Australian entities–Spark Infrastructure (15%), the Utilities Trust of Australia fund (20%)– together with the Canadian pension fund Caisse de depot et placement du Quebec (25%) and two Middle Eastern sovereign wealth funds–the Abu Dhabi Investment Authority (20%) and the Kuwait Investment Authority (20%). State Grid Corporation of China was one of the other bidders, in a consortium with Macquarie Infrastructure Real Assets. State Grid's bid was cleared by the Foreign Investment Review Board but was eventually unsuccessful, possibly because of its government and military connections. In 2018, Transgrid was among 17 energy businesses that supported the launch of the Energy Charter, a global initiative aimed at bringing together all parts of the power supply chain to give customers more affordable and reliable energy. In 2020, OMERS acquired a 19.99% stake in Transgrid from Wren House Infrastructure Management, which is part of the state-owned Kuwait Investment Authority. As of 2022, the current owners are: UTA Power Networks Trust, of which Utilities Trust of Australia is the substantial majority unit holder (22.505%) Spark Infrastructure (15.01%) Tawreed Investments Ltd, a wholly owned subsidiary of the Abu Dhabi Investment Authority (19.99%) Caisse de depot et placement du Quebec (22.505%) OMERS (19.99%) Network Transgrid operates the major high voltage electricity transmission network in NSW and the ACT, and is part of the National Electricity Market (NEM). The network connects generators, distributors and major end users. Transgrid's network comprises 104 bulk supply substations and more than 13,133 kilometres of high voltage transmission lines and cables. The network operates primarily at voltage levels of 500 kV, 330 kV, 220 kV and 132 kV. Transgrid's network also connects to 20 direct connect customers, including the four distribution businesses: Endeavour Energy, Ausgrid, Evoenergy, and Essential Energy. Transgrid participates in the Australian Energy Regulator's (AER) reve
https://en.wikipedia.org/wiki/Apodochloris
Apodochloris is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases AlgaeBase AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Closteridium
Closteridium is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases AlgaeBase AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Cystomonas
Cystomonas is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases AlgaeBase AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Emergococcus
Emergococcus is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases AlgaeBase AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Emergosphaera
Emergosphaera is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases AlgaeBase AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Ettlia
Ettlia is a genus of green algae, in the order Chlamydomonadales. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Chlamydomonadales genera Chlamydomonadales
https://en.wikipedia.org/wiki/Ferricystis
Ferricystis is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases AlgaeBase AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Hydrianum
Hydrianum is a genus of green algae, in the order Chlamydomonadales. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Chlamydomonadales genera Chlamydomonadales
https://en.wikipedia.org/wiki/Neospongiococcum
Neospongiococcum is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases AlgaeBase AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Octogoniella
Octogoniella is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases AlgaeBase AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Phaseolaria
Phaseolaria is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Pseudodictyochloris
Pseudodictyochloris is a genus of green algae, in the family Actinochloridaceae. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Chlamydomonadales genera Chlamydomonadales
https://en.wikipedia.org/wiki/Pseudoplanophila
Pseudoplanophila is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Pseudospongiococcum
Pseudospongiococcum is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Pseudotrochiscia
Pseudotrochiscia is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases {* AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Skujaster
Skujaster is a genus of green algae, in the family Chlorococcaceae. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Chlorococcaceae Chlorococcaceae genera
https://en.wikipedia.org/wiki/Server%20room
A server room is a room, usually air-conditioned, devoted to the continuous operation of computer servers. An entire building or station devoted to this purpose is a data center. The computers in server rooms are usually headless systems that can be operated remotely via KVM switch or remote administration software, such as Secure Shell, VNC, and remote desktop. Climate is one of the factors that affects the energy consumption and environmental impact of a server room. In areas where climate favours cooling and an abundance of renewable electricity, the environmental effects will be more moderate. Thus, countries with favourable conditions such as Canada, Finland, Sweden, and Switzerland are trying to attract companies to site server rooms there. Design considerations Building a server or computer room requires detailed attention to five main design considerations: Location Computer or server room location is the first consideration, even before considering the layout of the room's contents. Most designers agree that, where possible, the computer room should not be built where one of its walls is an exterior wall of the building. Exterior walls can often be quite damp and can contain water pipes that could burst and drench the equipment. Avoiding exterior windows means avoiding a security risk, and breakages. Avoiding both the top floors and basements means avoiding flooding, and leaks in the case of roofs. Lastly, server rooms should be centrally located because of the horizontal cabling involved which extends from this room to devices in other rooms. If a centralized computer room is not feasible, server closets on each floor may be an option. This is where computer, network and phone equipment are housed in closets and each closet is stacked above each other on the floor that they service. In addition to the hazards of exterior walls, designers need to evaluate any potential sources of interference in proximity to the computer room. Designing such a room means keeping clear of radio transmitters and electrical interference from power plants or lift rooms, etc. Other physical design considerations range from room size, door sizes and access ramps (to get equipment in and out) to cable organization, physical security and maintenance access. Air conditioning Computer equipment generates heat, and is sensitive to heat, humidity, and dust, but also the need for very high resilience and failover requirements. Maintaining a stable temperature and humidity within tight tolerances is critical to IT system reliability. In most server rooms "close control air conditioning" systems, also known as PAC (precision air conditioning) systems, are installed. These systems control temperature, humidity and particle filtration within tight tolerances 24 hours a day and can be remotely monitored. They can have built-in automatic alerts when conditions within the server room move outside defined tolerances. Air conditioning designs for most computer or ser
https://en.wikipedia.org/wiki/Quantum%20bus
A quantum bus is a device which can be used to store or transfer information between independent qubits in a quantum computer, or combine two qubits into a superposition. It is the quantum analog of a classical bus. There are several physical systems that can be used to realize a quantum bus, including trapped ions, photons, and superconducting qubits. Trapped ions, for example, can use the quantized motion of ions (phonons) as a quantum bus, while photons can act as a carrier of quantum information by utilizing the increased interaction strength provided by cavity quantum electrodynamics. Circuit quantum electrodynamics, which uses superconducting qubits coupled to a microwave cavity on a chip, is another example of a quantum bus that has been successfully demonstrated in experiments. History The concept was first demonstrated by researchers at Yale University and the National Institute of Standards and Technology (NIST) in 2007. Prior to this experimental demonstration, the quantum bus had been described by scientists at NIST as one of the possible cornerstone building blocks in quantum computing architectures. Mathematical description A quantum bus for superconducting qubits can be built with a resonance cavity. The hamiltonian for a system with qubit A, qubit B, and the resonance cavity or quantum bus connecting the two is where is the single qubit hamiltonian, is the raising or lowering operator for creating or destroying excitations in the th qubit, and is controlled by the amplitude of the D.C. and radio frequency flux bias. References Quantum information science Quantum electronics
https://en.wikipedia.org/wiki/Hardik
Hardik is a Hindu male given name. It is an adjective which means "from the heart" () in Hindi; "hard" () is Hindi for "heart". Notable people with the name include: Hardik Gohel (Indian computer scientist and educational leader) Hardik Mehta (Indian writer and director) Hardik Pandya (Indian cricketer) Hardik Patel (Indian political activist) Hardik Patel (Indian cricketer) Hardik Rathod (Indian cricketer) Hardik Sethi (Indian cricketer) Hardik Singh (Indian field hockey player) Hardikpreet Singh (Hong Kong-born Indian professional footballer) Hardik Shah (Indian civil servant) Hardik Tamore (Indian cricketer) Hindu given names
https://en.wikipedia.org/wiki/Watermen%27s%20stairs
Watermen's stairs were semipermanent structures that formed part of a complex transport network of public stairs, causeways and alleys in use from the 14th century to access the waters of the tidal River Thames in England. They were used by watermen, who taxied passengers across and along the river in London. Stairs were used at high tide, and causeways were used at low tide, built down to the littoral water level from street level, their location being memorised during a waterman's apprenticeship. Stairs were recognised by custom and practice as safe plying places to pick up and put down passengers and were a valuable aid to rescue if anyone was unfortunate enough to fall into the river, as they were often built adjacent to a public house. History The embanking of the tidal Thames was a centuries-old process that lined the river with walls that were meant to stop high water overflowing onto adjacent lands. Alleyways leading down to the Thames became the only practical way to cross over the river via boat as Old London Bridge was frequently blocked. Wharves and later rudimentary docks began to be used to offload goods but most ships simply moored in lines in the middle of the river and their cargo was rowed to shore and carried up shoreline stairs. Some of the Thames original shoreline did remain free from the construction of houses or walls. The access to the river was via shore, gaps between houses used to launch boats. Samuel Pepys in his diaries of 1665 mentions making landfall at Dukes Shore for example before wading up the beach to Narrow Street. As late as the 1850s nearly all new bridges were built with stairs at both ends, and generally on both sides. The Embankment which artificially engineered the Thames' natural course in the 1860s left buildings that had been located on the gently sloping incline to the river some distance from the water's edge. The growth of steamboats in the 1850s allowed boats to dock at specially constructed steamboat piers. Grab chains were built into the now steeply embanked high walls of the central Pool of the river Thames as an aide to rescue but access to the busiest central areas was geared towards mass transit by the 1890s. Later with the increased use of the Hackney carriage, London's stairs gradually fell into disuse or were simply built over and the abrupt collapse of traffic in the up river docks on the central tidal Thames in the 1960s effectively ended their use as transit points within London's transport network. Cause célèbre During the 1990s the continued existence of these sites as rights of way had seemed untenable, despite their importance to London's transport history and as future sites for archaeological investigation. In the 1980s a local lobby group initially based around the Isle of Dogs began to campaign for more local involvement, in the urban renewal of London's East End. Many local people who "worked the river" began to raise awareness of the decaying state of and lack of riv
https://en.wikipedia.org/wiki/Block%20Error%20Rate
Block Error Rate (BLER) is a ratio of the number of erroneous blocks to the total number of blocks transmitted on a digital circuit. It is used in measuring the error rate when extracting data frames from a Compact Disc (CD). The BLER measurement is often used as a quality control measure with regards to how well audio is retained on a compact disc over time. BLER is also used for W-CDMA performance requirements tests (demodulation tests in multipath conditions, etc.). BLER is measured after channel de-interleaving and decoding by evaluating the Cyclic Redundancy Check (CRC) on each transport block. Block Error Rate (BLER) is used in LTE/4G technology to determine the in-sync or out-of-sync indication during radio link monitoring (RLM). Normal BLER is 2% for an in-sync condition and 10% for an out-of-sync condition. References Compact disc Audio software
https://en.wikipedia.org/wiki/Andrew%20Coulter%20Enright
Andrew Coulter Enright, born on August 9, 1979, is an American artist. He conceived the Cover Flow visual browsing computer interface purchased by Apple Computer in 2006, for iTunes, Safari and other products. Enright wrote the 2003 book How to Be Fashionable or Consume Like Me, a satirical account of the New York hipster movement. He is currently employed by a commercial organization, but he produces art independently in various media and maintains a personal blog, The Treehouse and The Cave. He lives in New York City with his wife. References 1979 births Living people Artists from New York City
https://en.wikipedia.org/wiki/Blyk
Blyk was an ad-supported mobile phone network that offered text messages and customer-to-customer calls, with a capped amount of usage being free of charge. It targeted young people and had offices in Finland, the Netherlands, the United Kingdom and in India. It was the first mobile network funded by advertising, and was targeted at 16 to 24-year-olds. Users signing up to the network received advertising messages on their mobiles, and in return were given a monthly allowance of free top-up. Blyk was first launched in the United Kingdom, and closed operations there in 2009, becoming instead a partner to other established network operators. History Blyk was founded by two Finns, Pekka Ala-Pietilä (formerly president of Nokia), and Antti Öhrling (ex-chairman and founder of the Contra advertising group). Its headquarters were in Helsinki but it also had an office in London. In February 2007 they appointed Jonathan MacDonald from the Ministry of Sound as UK Sales Director. In October 2007 Shaun Gregory was appointed UK CEO; he resigned on 9 January 2009 for personal reasons. Following Gregory's resignation, Antti Ohrling took over as UK CEO. Before February 2009, the network offered 43 free minutes and 217 free texts to be used each month. Balances were reset after 30 days, so unused credit did not roll over. If the balance was used up before the monthly reset, users could pay 15p/min and 10p/text; thus, the free credit was worth £28.15. In February 2009, the rates were changed to 24p/min and 8p/text. At this level, the free balance would have been worth £27.68/month. However, the system was also altered so that users' balances now reset to £15.00 every month. This can be spent on any combination of calls, texts, picture messages and data. Some people think this was because the company was making cutbacks due to the recession. In July 2009, Blyk announced that they were ending their service in the UK at the end of August, to become a partner for other established operators, including Orange in the UK and Vodafone in the Netherlands. The Blyk service in the United Kingdom ended for all members on 26 August 2009. Blyk became instead a partner to other established operators, globally. According to their website, they were working with Vodafone in the Netherlands, Aircel in India and with Orange in the United Kingdom. Reaction The response from the British press towards Blyk placed its emphasis on debating the potential effectiveness of mobile-based advertising, with concerns that it may prove intrusive in a similar manner to pop-ups on websites or spam email. The Guardian commented that "advertisers will have to be careful not to annoy their new users with the mobile equivalent of spam", with Channel 4 stating that the fact that "you have to suffer the ads" was the network's downside. Tech Digest also noted that if advertisers don't embrace the interactivity offered by the network, they may have to resort to spam. Channel 4's technology corre
https://en.wikipedia.org/wiki/Lesk%20algorithm
The Lesk algorithm is a classical algorithm for word sense disambiguation introduced by Michael E. Lesk in 1986. It operates on the premise that words within a given context are likely to share a common meaning. This algorithm compares the dictionary definitions of an ambiguous word with the words in its surrounding context to determine the most appropriate sense. Variations, such as the Simplified Lesk algorithm, have demonstrated improved precision and efficiency. However, the Lesk algorithm has faced criticism for its sensitivity to definition wording and its reliance on brief glosses. Researchers have sought to enhance its accuracy by incorporating additional resources like thesauruses and syntactic models. Overview The Lesk algorithm is based on the assumption that words in a given "neighborhood" (section of text) will tend to share a common topic. A simplified version of the Lesk algorithm is to compare the dictionary definition of an ambiguous word with the terms contained in its neighborhood. Versions have been adapted to use WordNet. An implementation might look like this: for every sense of the word being disambiguated one should count the number of words that are in both the neighborhood of that word and in the dictionary definition of that sense the sense that is to be chosen is the sense that has the largest number of this count. A frequently used example illustrating this algorithm is for the context "pine cone". The following dictionary definitions are used: PINE 1. kinds of evergreen tree with needle-shaped leaves 2. waste away through sorrow or illness CONE 1. solid body which narrows to a point 2. something of this shape whether solid or hollow 3. fruit of certain evergreen trees As can be seen, the best intersection is Pine #1 ⋂ Cone #3 = 2. Simplified Lesk algorithm In Simplified Lesk algorithm, the correct meaning of each word in a given context is determined individually by locating the sense that overlaps the most between its dictionary definition and the given context. Rather than simultaneously determining the meanings of all words in a given context, this approach tackles each word individually, independent of the meaning of the other words occurring in the same context. "A comparative evaluation performed by Vasilescu et al. (2004) has shown that the simplified Lesk algorithm can significantly outperform the original definition of the algorithm, both in terms of precision and efficiency. By evaluating the disambiguation algorithms on the Senseval-2 English all words data, they measure a 58% precision using the simplified Lesk algorithm compared to the only 42% under the original algorithm. Note: Vasilescu et al. implementation considers a back-off strategy for words not covered by the algorithm, consisting of the most frequent sense defined in WordNet. This means that words for which all their possible meanings lead to zero overlap with current context or with other word definitions are by default ass
https://en.wikipedia.org/wiki/Conjunctive%20query
In database theory, a conjunctive query is a restricted form of first-order queries using the logical conjunction operator. Many first-order queries can be written as conjunctive queries. In particular, a large part of queries issued on relational databases can be expressed in this way. Conjunctive queries also have a number of desirable theoretical properties that larger classes of queries (e.g., the relational algebra queries) do not share. Definition The conjunctive queries are the fragment of (domain independent) first-order logic given by the set of formulae that can be constructed from atomic formulae using conjunction ∧ and existential quantification ∃, but not using disjunction ∨, negation ¬, or universal quantification ∀. Each such formula can be rewritten (efficiently) into an equivalent formula in prenex normal form, thus this form is usually simply assumed. Thus conjunctive queries are of the following general form: , with the free variables being called distinguished variables, and the bound variables being called undistinguished variables. are atomic formulae. As an example of why the restriction to domain independent first-order logic is important, consider , which is not domain independent; see Codd's theorem. This formula cannot be implemented in the select-project-join fragment of relational algebra, and hence should not be considered a conjunctive query. Conjunctive queries can express a large proportion of queries that are frequently issued on relational databases. To give an example, imagine a relational database for storing information about students, their address, the courses they take and their gender. Finding all male students and their addresses who attend a course that is also attended by a female student is expressed by the following conjunctive query: (student, address) . ∃ (student2, course) . attends(student, course) ∧ gender(student, 'male') ∧ attends(student2, course) ∧ gender(student2, 'female') ∧ lives(student, address) Note that since the only entity of interest is the male student and his address, these are the only distinguished variables, while the variables course, student2 are only existentially quantified, i.e. undistinguished. Fragments Conjunctive queries without distinguished variables are called boolean conjunctive queries. Conjunctive queries where all variables are distinguished (and no variables are bound) are called equi-join queries, because they are the equivalent, in the relational calculus, of the equi-join queries in the relational algebra (when selecting all columns of the result). Relationship to other query languages Conjunctive queries also correspond to select-project-join queries in relational algebra (i.e., relational algebra queries that do not use the operations union or difference) and to select-from-where queries in SQL in which the where-condition uses exclusively conjunctions of atomic equality conditions, i.e. conditions constructed from column n
https://en.wikipedia.org/wiki/WZWP
WZWP is an American non-commercial FM radio station located in West Union, Ohio, and operates on the assigned frequency of 89.5 MHz. WZWP is one of seven stations in the King of Kings Radio network. Programming WZWP's programming consists of Christian talk and teaching shows such as Thru the Bible with J. Vernon McGee, Love Worth Finding with Adrian Rogers, In Touch with Charles Stanley, Focus on the Family, and Unshackled!. WZWP also airs a variety of Christian music. History The station began broadcasting in 1990, and held the call sign WVXM, airing a jazz/public radio format, and was an affiliate of NPR. The station was owned by Xavier University. In 1995, the station's call sign was changed to WVXW. The station was part of Xavier University's X-Star Radio Network. In 2005, Xavier University sold the seven stations of the X-Star Radio Network, including WVXM, to Cincinnati Classical Public Radio for $15 million. The station would air a NPR-news and information format. In 2007, three repeater stations (including WVXW) were sold to Christian Voice of Central Ohio in 2007 because of the small population and lack of a revenue stream from the outlying communities. That year, the station's call sign was changed to WZWP. WZWP would adopt a Christian format, airing primarily Christian talk and teaching programming, and was branded "The Promise". By 2010, the station was airing a Christian contemporary format and was branded "The River". In 2011, Somerset Educational Broadcasting Foundation purchased WZWP for $135,000. The station would become an affiliate of its "King of Kings Radio" network. References External links King of Kings Radio ZWP Adams County, Ohio Moody Radio affiliate stations Radio stations established in 1990 1990 establishments in Ohio
https://en.wikipedia.org/wiki/Computer%20Russification
In computing, Russification involves the localization of computers and software, allowing the user interface of a computer and its software to communicate in the Russian language using Cyrillic script. Problems associated with Russification before the advent of Unicode included the absence of a single character-encoding standard for Cyrillic (see Cyrillic script#Computer encoding). History of the MS-DOS Russification The first official Russification of MS-DOS was carried out for MS-DOS 4.01 in 1989/1990, released on . In Microsoft, the Russification project manager and one of its main developers was Nikolai Lyubovny (Николай Любовный). A Russian version of MS-DOS 5.0 was also developed in 1991, released on . Based on an initiative of Microsoft Germany in March 1991, derivates of the Russian MS-DOS 5.0 drivers used for keyboard, display and printer localization support (DISPLAY.SYS, EGS.CPI , EGA2.CPI, KEYB.COM, KEYBOARD.SYS, MSPRINT.SYS, COUNTRY.SYS, ALPHA.EXE) could also be purchased separately (with English messages) as part of Microsoft's AlphabetPlus kit. This enabled English issues of MS-DOS 3.3, 4.01 and 5.0 to be set up for Eastern European countries like Czechoslovakia, Poland, Hungary, Yugoslavia, Romania and Bulgaria. Russification of Microsoft Windows A comprehensive instruction set for computer Russification is maintained by Paul Gorodyansky. It is mirrored in many places and recommended by the U.S. Library of Congress. See also Cyrillization GOST 10859 Romanization of Russian АДОС, unrelated to Russian MS-DOS PTS-DOS Mojibake References External links Modern Online (Virtual) Keyboard for Russian (not just alphabet order) Online Keyboard for Russian Virtual Russian Online Keyboard with Spellcheck User interfaces Russian language Russification Computing in the Soviet Union
https://en.wikipedia.org/wiki/La%20Vendetta%20%28TV%20series%29
La Vendetta () is a Philippine television drama horror series broadcast by GMA Network. Directed by Gil Tejada Jr. and Lore Reyes, it stars Jennylyn Mercado, Sunshine Dizon and Jean Garcia. It premiered on October 29, 2007 on the network's Telebabad line up. The series concluded on January 18, 2008 with a total of 60 episodes. The series is streaming online on YouTube. Premise The story focuses on sisters named Amanda, Eloisa and Almira. Amanda is the eldest who had her mother died early. Her father married another woman with whom he had two more daughters. Sibling rivalry ensues between the sisters when they all vie for their father's attention. One night Almira will be killed, an incident that will eventually reveal the killer. Overview Pre-production The production started late September, while principal photography started on October 12, 2007 for an October 29, 2007 airdate. While the pre-production was conceived long before 2005, and had to be postponed because of the "boom" of telefantasyas. Casting This series is the much-awaited come-back series for Jennylyn Mercado after the feud between her manager and GMA Network, her role was expected to recurred but while the series is ongoing her character was upgraded into a series regular. This is also Sunshine Dizon's new series after the recently concluded Impostora. In addition, this is also the come-back Philippine drama for veterans Rustom Padilla (now known as BB Gandanghari) and Snooky Serna after their recent showbiz revelations. Sheryl Cruz was initially tapped to play Amanda, but chose to do Princess Sarah with ABS-CBN instead. Jean Garcia was chosen for her replacement. Cast and characters Lead cast Jennylyn Mercado as Almira Cardinale Sunshine Dizon as Eloisa Salumbides-Cardinale Jean Garcia as Amanda Cardinale Supporting cast Paolo Contis as Junjun Sabino Polo Ravales as Gabby Trajano Luis Alandy as Ariel Guevarra Wendell Ramos as Rigo Bayani Chynna Ortaleza as Joanna Alumpihit Angelica Jones as Gerta Lamismis Ynna Asistio as Alex Cardinale Joseph Marco as Santi Domingo Rustom Padilla (now known as BB Gandanghari) as Alfie Camba Dante Rivero as Edwin Cardinale Caridad Sanchez as Nana Mildred Lotlot de Leon as Rodora Alhambra Ella Guevara as Jessie Cardinale Guest cast Mark Herras as Galo Alumpihit Snooky Serna as Janet Salumbides Krystal Reyes as young Eloisa Hazel Ann Mendoza as teen Amanda Karen delos Reyes as Andrea Sheila Marie Rodriguez as Alona Jenny Miller as Mariel Miguel Tanfelix as young Junjun Deborah Sun as Alice Bayani Maricel Morales as Rebecca Jen Rosendahl as Vicky Gene Padilla as Dodong Nicole Dulalia as young Rodora Joy Folloso as young Amanda Jelaine Santos as Gigi Cheska Iñigo as Jaydine Ratings According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of La Vendetta earned a 28.7% rating. While the final episode scored a 33.4% rating. Accolades References External links 200
https://en.wikipedia.org/wiki/Cultural%20algorithm
Cultural algorithms (CA) are a branch of evolutionary computation where there is a knowledge component that is called the belief space in addition to the population component. In this sense, cultural algorithms can be seen as an extension to a conventional genetic algorithm. Cultural algorithms were introduced by Reynolds (see references). Belief space The belief space of a cultural algorithm is divided into distinct categories. These categories represent different domains of knowledge that the population has of the search space. The belief space is updated after each iteration by the best individuals of the population. The best individuals can be selected using a fitness function that assesses the performance of each individual in population much like in genetic algorithms. List of belief space categories Normative knowledge A collection of desirable value ranges for the individuals in the population component e.g. acceptable behavior for the agents in population. Domain specific knowledge Information about the domain of the cultural algorithm problem is applied to. Situational knowledge Specific examples of important events - e.g. successful/unsuccessful solutions Temporal knowledge History of the search space - e.g. the temporal patterns of the search process Spatial knowledge Information about the topography of the search space Population The population component of the cultural algorithm is approximately the same as that of the genetic algorithm. Communication protocol Cultural algorithms require an interface between the population and belief space. The best individuals of the population can update the belief space via the update function. Also, the knowledge categories of the belief space can affect the population component via the influence function. The influence function can affect population by altering the genome or the actions of the individuals. Pseudocode for cultural algorithms Initialize population space (choose initial population) Initialize belief space (e.g. set domain specific knowledge and normative value-ranges) Repeat until termination condition is met Perform actions of the individuals in population space Evaluate each individual by using the fitness function Select the parents to reproduce a new generation of offspring Let the belief space alter the genome of the offspring by using the influence function Update the belief space by using the accept function (this is done by letting the best individuals to affect the belief space) Applications Various optimization problems Social simulation Real-parameter optimization See also Artificial intelligence Artificial life Evolutionary computation Genetic algorithm Harmony search Machine learning Memetic algorithm Memetics Metaheuristic Social simulation Sociocultural evolution Stochastic optimization Swarm intelligence References Robert G. Reynolds, Ziad Kobti, Tim Kohler: Agent-Based Modeling of Cultural Change in Swarm Using Cultural Algorithms R.
https://en.wikipedia.org/wiki/Deekay
Deekay is a Danish production and songwriting team founded by Lars Halvor Jensen, Martin Michael Larsson with other members Tim "Data" McEwan, Daniel "Obi" Klein and Johannes "Josh" Jørgensen. The name Deekay comes from the acronym dk, which means Denmark. Deekay have written and produced for artists like Jason Derulo, Jordin Sparks, Lil Wayne, Diddy, Sugababes, Orianthi, JLS, Tinie Tempah, Jake Zyrus, Allison Iraheta, Method Man, Fat Joe, Styles P, Lemar, Medina, Mietta, Girls' Generation, Red Velvet, Loona, Exo, TVXQ and others. Selected production/songwriting credits Selected releases & recordings written and/or produced fully or in part by DEEKAY New Kids on the Block "Remix (I Like The)" – Produced & co-written', Top 40 US Billboard Adult Radio "10" – Entire album produced, co-written and mixed, except track 10 & 11, #6 US Billboard 200 Album Chart Diddy-Dirty Money feat. Lil Wayne "Strobe Lights" – Co-produced & co-written From Diddy/Dirty Money album Last Train to Paris, #7 US Billboard 200 Album Chart Orianthi "Believe" – co-written Title-track on Orianthi's 2nd studio album, which has reached certified Gold status in Japan and Australia. JLS "Kickstart" & "Only Tonight" – Produced & co-written From their UK No. 1 debut album, which sold in excess of 1.300.000 copies in the UK alone (4 x platinum) "Eyes Wide Shut", "Superhero" & "Better For You" – Produced & co-written, Eyes Wide Shut featured Tinie Tempah and reached #2 on the official UK Radio Airplay Chart, with a total of more than 500.000.000 impressions From their second album, "Outta This World" Sugababes "Change" – Produced & co-written Title-track on UK #1 album "Change" – the song was a top 3 UK radio airplay hit. Lemar "I Don't Mind That" – Produced & written From multi-platinum album "Time To Grow" "It's Not That Easy" – Co-written 1st single from multi-platinum album "The Truth About Love" – No. 2 Official UK Radio Airplay Chart & No. 7 UK Single Sales Chart Jedward "Lipstick" – Produced & co-written Hit No. 1 on the iTunes single chart in Germany, Sweden, Austria and Ireland. "Victory"– 7 tracks produced & co-written, #1 Ireland "Young Love" – Produced & co-written, #1 iTunes Sweden "Young Love" – 2 tracks produced & co-written, #1 Ireland Joe McElderry "Until The Stars Run Out" – Produced & co-written From his debut album, which entered the UK album chart at #3. Ashley Tisdale "Switch" & "I'm Back" – Produced & co-written The first track is included in the credits of the 2009 movie Aliens in the Attic and both of them are included in the Tidale's second studio album, Guilty Pleasure. Girls' Generation "Hoot" from the album Hoot (009) – Programmed & co-written Hit no. 1 on all Korean charts 7 minutes after release – 150.000+ pre-orders on "Hoot" album...The song was No. 1 for 5 weeks on the Music Bank K-Chart and won the Triple Crown on the Inkigayo chart in November/December 2010. The Hoot EP achieved 18 x platinum status in Korea and became best song of th
https://en.wikipedia.org/wiki/Open%20platform
In computing, an open platform describes a software system which is based on open standards, such as published and fully documented external application programming interfaces (API) that allow using the software to function in other ways than the original programmer intended, without requiring modification of the source code. Using these interfaces, a third party could integrate with the platform to add functionality. The opposite is a closed platform. An open platform does not mean it is open source, however most open platforms have multiple implementations of APIs. For example, Common Gateway Interface (CGI) is implemented by open source web servers as well as Microsoft Internet Information Server (IIS). An open platform can consist of software components or modules that are either proprietary or open source or both. It can also exist as a part of closed platform, such as CGI, which is an open platform, while many servers that implement CGI also have other proprietary parts that are not part of the open platform. An open platform implies that the vendor allows, and perhaps supports, the ability to do this. Using an open platform a developer could add features or functionality that the platform vendor had not completed or had not conceived of. An open platform allows the developer to change existing functionality, as the specifications are publicly available open standards. A service-oriented architecture allows applications, running as services, to be accessed in a distributed computing environment, such as between multiple systems or across the Internet. A major focus of Web services is to make functional building blocks accessible over standard Internet protocols that are independent from platforms and programming languages. An open SOA platform would allow anyone to access and interact with these building blocks. A 2008 Harvard Business School working paper, titled "Opening Platforms: How, When and Why?", differentiated a platform's openness in four aspects and gave example platforms. See also Application programming interface Open standard Open architecture Service-oriented architecture References Application programming interfaces Computing platforms
https://en.wikipedia.org/wiki/Global%20Peace%20Initiative%20of%20Women
Global Peace Initiative of Women (GPIW) is an international network of women and men spiritual and community leaders. GPIW developed from the first World Summit of Women Religious and Spiritual Leaders at the Palais des Nations (United Nations) in Geneva in 2002. GPIW places a special emphasis on building interfaith understanding and developing leadership in young community leaders worldwide. It is located in New York City. A major focus of GPIW’s work in the last decade has been to nurture and assist young ecology leaders working on issues related to climate change and the ecological crisis. GPIW explores the root causes of the great imbalance humanity is experiencing by working on the "inner levels" and asking how we can reclaim our deepest living connection to Mother Earth and to one another. This work is under the stewardship of a small group of women who work with many others around the world to help manifest the special qualities of the sacred feminine, which enables the inner transformation needed for us to meet the challenges facing Earth’s community of life. In 2011 GPIW held its first Inner Dimensions of Climate Change retreat in northern India. These 4–5 day intergenerational gatherings are held in various regions of the world in partnership with young ecological leaders and spiritual mentors from various backgrounds who are ready to investigate climate change from an ethical and spiritual perspective. Together, participants reflect on the inner shifts and changes that are needed to restructure the way humans are in relationship with the natural world. Since 2011, GPIW has invited and hosted approximately 500 young leaders to attend these retreats. Meetings have been held in Kashmir, Varanasi and Rishikesh, India, and in Morocco, Kenya, Cambodia, Japan, Costa Rica, Germany, Thailand, Cyprus, and the US. Dena Merriam is the founder and convener. The co-chair is Joan Chittister O.S.B., a Benedictine Sister and author. The 2008 summit has taken place in Jaipur, India, from March 6–10. In March GPIW convened an environmental conference in Kenya to mobilize to protect the environment and promote sustainable development. Notes External links http://www.gpiw.org Official Website of GPIW Peace organizations based in the United States
https://en.wikipedia.org/wiki/Species%20Survival%20Network
The Species Survival Network (SSN), founded in 1992, is an international coalition of over 80 non-governmental organizations (NGOs) committed to the promotion, enhancement, and strict enforcement of the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES). Through scientific and legal research, education and advocacy, the SSN is working to prevent over-exploitation of animals and plants due to international trade. The trade in parrots for pets, alligator hide handbags, dried seahorse curios, elephant ivory, and ramin pool cues—just a few examples of the billion dollar international trade in wildlife and plants. Few people realize the scope and impact of this trade that has been responsible for the decline of wild populations of a number of species of animals and plants. SSN believes that such trade can occur only when evidence positively demonstrates that survival of the species, subspecies or populations and their role in the ecosystems in which they occur will not be detrimentally affected by trade and when trade in live animals minimizes the risk of injury, damage to health or cruel treatment. The species must always receive the benefit of the doubt if available evidence is uncertain. Criteria for sustainability The CITES Parties have recognized, in Articles III and IV of the CITES Treaty, that international commercial trade in plants and animals must not be detrimental to the survival of species, or in other words, that it must be sustainable. Too often, use of a species is claimed to be sustainable in the absence of evidence to support this claim. Such evidence should be provided by those who wish to label a use “sustainable”. SSN has developed the following criteria to assist Parties when assessing the sustainability of trade in wild fauna and flora. Proposals to remove or reduce the level of protection afforded, or to start or increase international commercial trade in, a species should meet all of the following criteria: Information is collected A science-based management system is in place The Precautionary Principle is applied Government policies, laws and institutions are in place People living in the vicinity of the used population are empowered and experience benefits Economic sustainability is demonstrated Long-term conservation benefits are demonstrated The use is compatible with other uses of the species and is not detrimental to other species Animals are protected from cruelty and suffering, and incidental mortality is avoided For more detail on the individual criteria, please see the link below on SSN's Criteria for Assessing the Sustainability of Trade in Wild Fauna and Flora See also Wildlife smuggling References External links Species Survival Network CITES Non-profit organizations based in Washington, D.C. Organizations established in 1992 Wildlife smuggling
https://en.wikipedia.org/wiki/Wrangler%20%28TV%20series%29
Wrangler is an American Western television series starring Jason Evers that aired on the NBC television network from August 4 to September 15, 1960. In Wrangler, Evers played Pitcairn, a wrangler who roamed the Old West, finding adventures along the way. However, Wrangler did not have much of a chance to find adventure because the series lasted only for six episodes. It was a summer replacement series for The Ford Show Starring Tennessee Ernie Ford, but did not garner high enough ratings to become a full-fledged series. "Wrangler" stood out among westerns chiefly because it was the first of its genre to be videotaped rather than filmed. It earned an Emmy nomination for Outstanding Achievement in Electronic Camerawork in 1961. Guest stars included Tyler McVey in the episode "Incident at the Bar M." UCLA has preserved that episode in its Film and Television Archive. Three years after Wrangler, Evers landed the lead in the 26-episode ABC drama Channing, set on a fictitious college campus. References McNeil, Alex. Total Television (1996). New York: Penguin Books Brooks, Tim and Marsh, Earle, The Complete Directory to Prime Time Network and Cable TV Shows (1999). New York: Ballantine Books External links Wrangler at The Internet Movie Database 1960s Western (genre) television series 1960 American television series debuts 1960 American television series endings NBC original programming 1960s American drama television series
https://en.wikipedia.org/wiki/National%20Bingo%20Night%20%28Australian%20game%20show%29
National Bingo Night was an Australian game show, based on the American game show of the same name, which premiered on the Seven Network on 21 October 2007. The show was hosted by former Home and Away star Tim Campbell with former Girlband member Renee Bargh acting as the number caller. Tanveer Ahmed acted as the "commissioner", who refereed the playing studio audience. The show was axed after six weeks. Overview National Bingo Night was marketed as an interactive experience for both the studio audience and viewers at home. Members of the studio audience attempted to win a game of bingo while competing against a solo studio contestant. Each episode consisted of three games represented by red, white and blue bingo cards. Home viewers could collect pre-printed game cards from newspapers and the internet, and check the winning status of those cards by watching the program or checking the website after the show finished. Winning cards could be redeemed for a $100 cash prize and were also eligible to enter a weekly draw for $10,000. The show was pre-recorded, and the winning numbers pre-determined by the producers. A small set of winning cards was put into circulation. As a result, the game was not a true game of bingo, but rather a lottery, as emphasised in the game's terms and conditions. An end-of-season second chance draw had been planned for all home viewers, whether they won prizes or not, where they had the chance to win any unclaimed cash or prizes. Following the cancellation of the show, the second chance draw was cancelled as well. Games In each game, the solo contestant competed in a minigame that also served to unveil the numbers being called for the game. The contestant then tried to complete the minigame and outlast the audience before they could declare bingo. If they were successful, they won the major prize; if an audience member beat them to it, they walked away with nothing. The solo contestant played for a substantial major prize (such as a Jeep Grand Cherokee, a holiday package or $50,000 cash), while members of the studio audience competed for a lesser cash prize of $5,000. Three special prize balls also gave the contestant the chance to win up to an additional $10,000 if drawn. Contestants could only use certain drawn balls to put towards their game, determined by correctly guessing whether the next number is either red or black, odd or even or higher or lower than the previously drawn number, depending on the game. Some of the games were easier to win than others. For example, Time Flies requires a total of 365 to complete as opposed to Bingo 500 requiring a total of 500, while Around the World could be potentially won in no more than 9 straight correct guesses (providing no audience member declares bingo). Bingo 500 This game involved contestants aiming to have all their bingo balls add up to 500. In this game, the contestant guessed whether the next ball is higher or lower than the last ball drawn out. The player's fi
https://en.wikipedia.org/wiki/Japan%20National%20Route%20117
is a national highway connecting Nagano, Nagano and Ojiya, Niigata in Japan. Route data Length: 119.6 km (74.3 mi) Origin: Nagano City (originates at junction with Route 18) Terminus: Ojiya City (ends at Junction with Route 17) Major cities: Iiyama, Tokamachi History 1953-05-18 - Second Class National Highway 117 (from Nagano to Ojiya) 1965-04-01 - General National Highway 117 (from Nagano to Ojiya) Overlapping sections In Nagano City, from Nakagosho intersection to Nishiowaribe intersection: Route 19 In Nagano City, Nishiowaribe intersection to Asano intersection: Route 18 In Nagano City, Higashiwada intersection to Yanagihara-Kita intersection: Route 406 In Iiyama City, Komaki-bashi kita intersection to Ario intersection: Route 292 Municipalities passed through Nagano Prefecture Nagano - Obuse - Nagano - Nakano - Iiyama - Nozawaonsen - Sakae Niigata Prefecture Tsunan - Tokamachi - Ojiya - Nagaoka - Ojiya Intersects with Nagano Prefecture Route 18 Route 19 Route 406 Route 406 Route 18 Route 292 Route 403 Route 292 Route 403 Niigata Prefecture See also References External links 117 Roads in Nagano Prefecture Roads in Niigata Prefecture
https://en.wikipedia.org/wiki/Late%20Bhausaheb%20Hiray%20Smaranik%20Samiti%20Trust
Late Bhausaheb Hiray Smaranik Samiti Trust (LBHSST) (also known as Hiray College Or Bhausaheb Hiray College) is an Indian college. Its course include Master's degree in Computer Application, Architecture, Applied Arts and Interior Design. Masters in computer applications Information Technology Department was established in 1994, which started with MCA since 2001. This MCA programme is affiliated to University of Mumbai and approved by All India Council Of Technology. All students are selected on the basis of an entrance test covering topics on aptitude and computer concepts. It is a three-year full-time postgraduate course to which graduates from any field with mathematics at 10+2 level are eligible for admission. The duration of three years is divided in six semesters. The first Five semesters are class room training on theoretical concepts whereas 6th semester consist of Industrial Training to have hands on experience on live projects of industry. This helps them to get ready, to enter the industry. The final year includes one foreign language, which is mandatory for every student to go through. the curriculum has a strong core covering Information Technology, Business Management & Mathematics, along with the technical knowledge. Many students gets placed through campus recruitment. External links LBHSST on educationinfoindia.com LBHSST, Bandra on Wikimapia Universities and colleges in Mumbai
https://en.wikipedia.org/wiki/Oedipus%20%28Seneca%29
Oedipus is a fabula crepidata (Roman tragic play with Greek subject) of c. 1061 lines of verse that was written by Lucius Annaeus Seneca at some time during the 1st century AD. It is a retelling of the story of Oedipus, which is better known through the play Oedipus Rex by the Athenian playwright, Sophocles. It is written in Latin. Characters Oedipus is the king of Thebes, husband of Jocasta, and he is the supposed son of king Polybus of Corinth. He is the main protagonist of the play. Jocasta is the widow of the former king Laius, wife of Oedipus and sister of Creon. Creon is Jocasta's brother, and the chief aid to Oedipus in Thebes. Tiresias is a blind prophet who is charged by Oedipus to find the killer of King Laius. Manto is the daughter of Tiresias. She is used in the play to describe Tiresias' sacrifice to him, and therefore also to the audience. An Old Man (senex) is a messenger from Corinth who comes to tell Oedipus that Polybus is dead, and reveals part of Oedipus' history to him. Phorbas is an old shepherd who had given Oedipus to the Old Man when Oedipus was a child and who reveals Oedipus' real parentage to him. Messenger (nuntius) is the man who, in Act 5, relates what has become of Oedipus. The chorus are singers that aid the audience in understanding what emotion they should feel after a scene. Plot Act One The play opens with a fearful Oedipus lamenting a vicious plague which is affecting Thebes, the city over which he rules. People are dying in such huge numbers that there are not enough of the living to ensure that each of the victims is cremated. He also mentions a prophecy that he had received from Apollo before he came to Thebes that he would kill his father and marry his mother. He had thus fled the kingdom of his father Polybus. However, Oedipus is so disturbed by what is occurring in Thebes that he even considers returning to his home city. But Jocasta strengthens his resolution, and he stays. Act Two Creon returns from the Oracle at Delphi with the instruction that Thebes is required to avenge the death of the former King Laius if the citywide plague is to end. Oedipus utters an ironic curse on the yet unrevealed killer, wishing for him "the crimes that I have fled from". The prophet Tiresias appears and is asked by Oedipus to make clear the meaning of the oracle. Tiresias then proceeds to carry out a sacrifice, which contains a number of horrific signs. As Tiresias does not have the name of King Laius' killer, he proposes to summon Laius' spirit back from Erebus to learn the identity of the guilty one. Act Three Creon returns from seeing Tiresias after he has spoken to Laius' ghost, but is unwilling to reveal to Oedipus the killer's name. Oedipus threatens him, and then Creon relents. He says Laius accuses the king of having blood on his hands, and who "has defiled his father's marriage-bed". He goes on to say that Laius promises the plague will cease if the king is expelled from Thebes. Creon advises Oed
https://en.wikipedia.org/wiki/Dispora
Dispora is a genus of green algae, in the family Coccomyxaceae. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Trebouxiophyceae genera Trebouxiophyceae Enigmatic algae taxa
https://en.wikipedia.org/wiki/Lusitania%20%28alga%29
Lusitania is a genus of green algae, in the family Coccomyxaceae. Its sole species is Lusitania henriquesii. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Trebouxiophyceae genera Trebouxiophyceae Monotypic algae genera Enigmatic algae taxa
https://en.wikipedia.org/wiki/Dendrocystis
Dendrocystis is a genus of green algae, in the family Oocystaceae. There is a single species, Dendrocystis raoi. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Trebouxiophyceae genera Chlorellales Monotypic algae genera
https://en.wikipedia.org/wiki/Palmodactylon
Palmodactylon is a genus of green algae, in the family Radiococcaceae. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Sphaeropleales genera Sphaeropleales
https://en.wikipedia.org/wiki/Planochloris
Planochloris is a genus of green algae, in the family Sphaerocystidaceae. Its sole species is Planochloris pyrenoidifera. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Chlamydomonadales genera Chlamydomonadales Monotypic algae genera
https://en.wikipedia.org/wiki/Hypnomonas
Hypnomonas is a genus of green algae, in the family Hypnomonadaceae. Its sole species is Hypnomonas tuberculata. References External links Scientific references Scientific databases AlgaTerra database Index Nominum Genericorum Chlamydomonadales genera Chlamydomonadales Monotypic algae genera
https://en.wikipedia.org/wiki/Blue%20Night
Blue Night may refer to: "Blue Night", a song on the album Earth Moving by Mike Oldfield Blue Night Network of the Toronto Transit Commission Blue Night (Michael Learns to Rock album), 2000, or the title track Blue Night (Art Blakey album), 1985 B.L.U.E. Nights, a 2000 album by Bruford Levin Upper Extremities Blue Night (film), a 2018 film
https://en.wikipedia.org/wiki/Telematic%20art
Telematic art is a descriptive of art projects using computer-mediated telecommunications networks as their medium. Telematic art challenges the traditional relationship between active viewing subjects and passive art objects by creating interactive, behavioural contexts for remote aesthetic encounters. Telematics was first coined by Simon Nora and Alain Minc in The Computerization of Society. Roy Ascott sees the telematic art form as the transformation of the viewer into an active participator of creating the artwork which remains in process throughout its duration. Ascott has been at the forefront of the theory and practice of telematic art since 1978 when he went online for the first time, organizing different collaborative online projects. Pioneering experiments Although Ascott was the first person to name this phenomenon, the first use of telecommunications as an artistic medium has occurred in 1922 when the Hungarian constructivist artist László Moholy-Nagy made the work Telephone Pictures. This work questioned the idea of the isolated individual artist and the unique art object. In 1932, Bertold Brecht emphasized the idea of telecommunications as an artistic medium in his essay 'The Radio as an Apparatus of Communication'. In this essay, Brecht advocated the two-way communication for radio to give the public the power of representation and to pull it away from the control of corporate media. Art historian Edward A. Shanken has authored several historical accounts of telematic art, including From Cybernetics to Telematics: The Art, Pedagogy, and Theory of Roy Ascott. In 1977, 'Satellite Arts Project' by Kit Galloway and Sherrie Rabinowitz used satellites to connect artists on the east and west coast of the United States. This was the first time that artists were connected in a telematic way. With the support of NASA, the artists produced composite images of participants, enabling an interactive dance concert amongst geographically disparate performers. An estimated audience of 25,000 saw bi-coastal discussions on the impact of new technologies on art, and improvised, interactive dance and music performances that were mixed in real time and shown on a split screen. These first satellite works emphasized the primacy of process that remained central to the theory and practice of telematic art. Ascott used telematics for the first time in 1978 when he organized a computer-conferencing project between the United States and the United Kingdom called Terminal Art. For this project, he used Jacques Vallée's Infomedia Notepad System, which made it possible for the users to retrieve and add information stored in the computer’s memory. This made it possible to interact with a group of people to make "aesthetic encounters more participatory, culturally diverse, and richly layered with meaning". Ascott did more similar projects like Ten Wings, which was part of Robert Adrian’s The World in 24 Hours in 1982. An important telematic artwork of Ascott i
https://en.wikipedia.org/wiki/Shaw%20Multicultural%20Channel
Shaw Multicultural Channel (or simply Shaw Multicultural) is a Canadian ethnic cable television community channel, offering programming in 20 different languages. It is owned and operated by Shaw Communications, and is available on cable systems in Vancouver and Calgary regional markets. The channel operates on cable channel 4 in the Greater Vancouver region, on cable channel 10 in the Calgary Region and on Shaw BlueCurve TV channel 901 in those regions. The channel was launched in 1979 as Rogers Multicultural Channel, under the ownership of Rogers Communications, and was available only in the Vancouver market on Rogers Cable. Shaw took over ownership and renamed the channel in 2000 following an asset swap with Rogers, which also saw Shaw become the primary cable television service provider in British Columbia. Service was subsequently extended to the Calgary market. Despite the sale of Shaw Media and the Global Television Network to Corus Entertainment in 2016, the channel remains owned by Shaw. The channel supports the work of local ethnic television producers and also covers and promotes cultural events in both Metro Vancouver and Calgary. Programming Languages References External links Official site Multicultural and ethnic television in Canada Canadian community channels Shaw Communications Television stations in Vancouver Television stations in Calgary Television channels and stations established in 1979 Multilingual broadcasters 1979 establishments in British Columbia
https://en.wikipedia.org/wiki/Japan%20National%20Route%2038
is a national highway connecting Takikawa and Kushiro in Hokkaidō, Japan. Route data Length: 298.4 km (185.5 mi) Origin: Takikawa, Hokkaido (originates at junction with Routes 12 and 451) Terminus: Kushiro, Hokkaido (ends at the origin of Route 44) Major cities: Ashibetsu, Furano, Obihiro History 1952-12-04 - First Class National Highway 38 (from Takikawa to Kushiro) 1965-04-01 - General National Highway 38 (from Takikawa to Kushiro) Overlapping sections In Ashibetsu, from North-2 West-1 South intersection to Ashibetsu-bashi intersection: Route 452 In Frano, from Wakamatsu-cho 15 intersection to Higashiyama-yanagi intersection: Route 237 In Shimizu, South-1-11 to South-4-11: Route 274 From Obihiro (Odori North-1 intersection) to Makubetsu (Akeno intersection): Route 242 From Urahoro (Yoshino-Kyoei intersection) to the terminus: Route 336 From Shiranuka (West-1 South-2 intersection) to Kushiro (Otanoshike intersection): Route 392 From Kushiro (Kitaodori-5 intersection) to the terminus: Routes 44, 272 and 391 References 038 Roads in Hokkaido
https://en.wikipedia.org/wiki/Pragmatic%20mapping
Pragmatic mapping — a term in current use in linguistics, computing, cognitive psychology, and related fields — is the process by which a given abstract predicate (a symbol) comes to be associated through action (a dynamic index) with some particular logical object (an icon). The logical object may be a thing, person, relation, event, situation, or a string of these at any conceivable level of complexity. A relatively simple example is the conventional — successful, appropriate, and mundanely “true” — linking of a proper name to the person of whom it is a conventional designation. There are three parts to this process when it succeeds. There is the abstract symbol which is used to represent something else (the name or the entire signifying predication, for instance); there is the something else that is represented by that symbol (whatever is signified); and there is the act of using the symbol in a conventional way to represent whatever it usually represents (the act of signifying). Pragmatic mapping is the process by which any material argument, or any imagined one, comes to be associated with a predicate that purports to be and succeeds in being about it. That is the predicate must be appropriate ("true" in the most mundane sense relative) to its logical object. The predication may be as simple as a naming act or as complex as a representation consisting of many distinct propositions with many associated clauses. For instance, if we say "Jesse James was an American outlaw" the name "Jesse James" purports to be about a certain historical person whom we may know to have been shot by another individual named Robert Ford. We may know that a movie featuring Brad Pitt as Jesse James was released in September 2007 in select theaters across America. If the pragmatic mapping of the name "Jesse James" is complete, i.e., if it succeeds, it is mapped onto that certain individual that was actually shot by Robert Ford. Nothing of importance changes in the pragmatic mapping process if it turns out that Jesse James and Robert Ford are figments of someone’s imagination, excepting, of course, the truth value of the propositions that include the logical object of the name, Jesse James. In ordinary conversation and human communication in general, it has been demonstrated logically and mathematically that meaning is utterly dependent on the true and appropriate pragmatic mapping of symbols to their conventional logical objects. Infants depend on exemplification of such mapping relations to acquire languages and all meaningful linguistic representations have been proved to depend on such mappings. See also Wörter und Sachen References Frege, G. (1967). Begriffsschrift, a formula language modeled upon that of arithmetic for pure thought. In J. van Heijenoort (Ed. and Trans.), Frege and Gödel: Two fundamental texts in mathematical logic (pp. 5–82). Harvard University Press, Cambridge, Massachusetts. (Original work published 1879) Krashen, S. D. 1982. Principl
https://en.wikipedia.org/wiki/CALO
CALO was an artificial intelligence project that attempted to integrate numerous AI technologies into a cognitive assistant. CALO is an acronym for "Cognitive Assistant that Learns and Organizes". The name was inspired by the Latin word "Calo" which means "soldier's servant". The project started in May 2003 and ran for five years, ending in 2008. The CALO effort has had many major spin-offs, most notably the Siri intelligent software assistant that is now part of the Apple iOS since iOS 5, delivered in several phones and tablets; Social Kinetics, a social application that learned personalized intervention and treatment strategies for chronic disease patients, sold to RedBrick Health; the Trapit project, which is a web scraper and news aggregator that makes intelligent selections of web content based on user preferences; Tempo AI, a smart calendar; Desti, a personalized travel guide; and Kuato Studios, a game development startup. CALO was funded by the Defense Advanced Research Projects Agency (DARPA) under its Personalized Assistant that Learns (PAL) program. DARPA's five-year contract brought together over 300 researchers from 25 of the top university and commercial research institutions, with the goal of building a new generation of cognitive assistants that can reason, learn from experience, be told what to do, explain what they are doing, reflect on their experience, and respond robustly to surprise. SRI International was the lead integrator responsible for coordinating the effort to produce an assistant that can live with and learn from its users, provide value to them, and then pass a yearly evaluation that measures how well the system has learned to do its job. Functions CALO assists its user with six high-level functions: Organizing and Prioritizing Information: As the user works with email, appointments, web pages, files, and so forth, CALO uses machine learning algorithms to build a queryable model of who works on which projects, what role they play, how important they are, how documents and deliverables are related to this, etc. Preparing Information Artifacts: CALO can help its user put together new documents such as PowerPoint presentations, leveraging learning about structure and content from previous documents accessed in the past. Mediating Human Communications: CALO provides assistance as its user interacts with other people, both in electronic forums (e.g. email) and in physical meetings. If given access to participate in a meeting, CALO automatically generates a meeting transcript, tracks action item assignments, detects roles of participants, and so forth. CALO can also put together a "PrepPak" for a meeting containing information to read ahead of time or have at your fingertips as the meeting progresses. Task Management: CALO can automate routine tasks for you (e.g. travel authorizations), and can be taught new procedures and tasks by observing and interacting with the user. Scheduling and Reasoning in Time: CALO
https://en.wikipedia.org/wiki/C-base
c-base e.V. is a non-profit association located in Berlin, Germany. Its purpose is to increase knowledge and skills pertaining to computer software, hardware and data networks. The association is engaged in numerous related activities. For example, the society has had stands at large festivals, such as Children's Day, where they introduce young people to topics like robotics and computer-aided design. The association's headquarters, c-base station, is also used by other initiatives and groups in and around Berlin as an event location or as function rooms, for example the wireless community network freifunk.net, the Chaos Computer Club and the Berlin Wikipedia group. Any group that identifies themselves with the purpose of the c-base are also welcome to use the premises for meetings and events. History Seventeen people founded c-base e. V. in the autumn of 1995. In the years 2002 and 2003 the BerlinBackBone project was launched to make available and promote free public access to the internet via wireless community networks. Also in 2003 the c-base association began staging weekly meetings of musicians, called Cosmic Open Stage, thus providing a platform for well known or unknown musicians to hold jam sessions or to give concerts. Since 2004 the premises of the c-base association are also used in cooperation by transmediale. c-base is recognized as one of the first hackerspaces in the world. It, along with The Loft in San Diego, USA and Metalab, directly influenced the creation of hackerspaces in the US. Activities Apart from the main purpose of the c-base association the members are also engaged in many other activities, for example Go and Jugger, the rules of which supposedly were gained through analysis of files on c-beam, the main computer in the c-base station. Once a year, @c-terra, an event organised by the c-base association, gives an overview of all activities offered. The premises of the c-base association host a lot of different events (parties, presentations, theatrical performances, concerts and art exhibitions), such as Cosmic Open Stage. The c-base society is also present at events of the Chaos Computer Club like the Chaos Communication Congress or the Chaos Communication Camp. From September 14–16, 2006 the fourth Wizards of OS conference was held in cooperation with c-base. Mythological self-image of the c-base The location for c-base is accompanied by a myth. This myth says that there are remnants of a space station called c-base underneath the city centre of Berlin. The space station's antenna is the Fernsehturm Berlin, a large spire with a mirrored ball near the top and a distinctive landmark nearby. History of the space station According to the stories of the members of the c-base, the space station crashed due to unstable conditions in its orbit after exiting a time warp. At that time there was a number of highly technological advanced and heretofore undiscovered lifeforms aboard the station. Much evidence of
https://en.wikipedia.org/wiki/War%20Times
War Times is a real-time strategy computer game for Windows released in 2004. It was developed and produced by Spanish company Legend Studios and distributed in USA and Canada by Strategy First. It is a World War II strategy game where the player can play as either the Allies or the Axis and usually has to complete a task that pertains to killing the opposing force or defending a base from enemies for a set amount of time. Story Two campaigns are available: The first campaign concerns the Allies, with the player playing as Britain, the United States, or the Soviet Union. The second campaign is the Axis, with the player playing as Nazi Germany. In the Allied Campaign, the player can play in all the theaters except the Asia-Pacific theater All of the important battles such as the Battle of Berlin, Operation Market Garden, and D-Day can be played. The German Campaign you play the important battles as Operation Sea Lion and Operation Barbarossa. Gameplay Each Nation has their own unique kind of units. The Germans have the flamethrower, dirigible, sidecar, panzer IV, tiger I, jagdpanzer. Britain has the matilda, mortar soldier, and spy. The Soviet Union has the Amphibious Elite, T-34, and the SU-76. The United States has the Elite soldier, Super bomber, and the Sherman References www.gamespot.com review 2004 video games Real-time strategy video games Strategy First games Video games developed in Spain Windows games Windows-only games World War II video games
https://en.wikipedia.org/wiki/CDMA%20mobile%20test%20set
A CDMA Mobile Test Set is a call simulating device that is used to test CDMA cell phones. It provides a network-like environment forming a platform to test the cell phone. This reduces cost of manufacturing and testing the cell phone in a real environment. It can be used to test all major 2G, 2.5G, 3G and 3.5G wireless technologies. In a lab, high-precision measurement correction over the entire frequency and dynamic range as well as compensation for temperature effects in realtime are critical factors for achieving accuracy. A good quality mobile test set helps in achieving excellent accuracy, which is a major concern for mobile manufacturers. Technologies supported A mobile test set should ideally support the following technologies: CDMA2000 WCDMA Bluetooth GSM 1xEVDO Analog TDMA Tests that can be performed RF (Antenna) Audio LC Display DUT Camera and Keypad Other DUT Interfaces Companies that manufacture Mobile test set Rohde & Schwarz Agilent Anritsu Product Types Agilent 8960 Agilent 8924C (Older model) R&S CMU200 Universal Radio Communication Tester Anritsu MT8820C Anritsu MT8870A Anritsu MD8475A References Agilent Technologies, http://www.home.agilent.com/agilent/product.jspx?nid=-536900143.0.00&lc=eng&cc=US Rohde & Schwarz International, http://www2.rohde-schwarz.com/en/products/test_and_measurement/product_categories/mobile_radio/ Anritsu Corporation, http://www.anritsu.com/en-US/Products-Solutions/Test-Measurement/Mobile-Wireless-Communications/Handset-One-Box-Testers/index.aspx Electronic test equipment