text
stringlengths 5
10.5k
| source
stringlengths 33
146
|
|---|---|
mutation and selection in the host species alone. Extrapolating the coral probiotic hypothesis to other organisms, including higher plants and animals, led to the Rosenberg's support for and publications around the hologenome theory of evolution. == Theory == === Definition === The framework of the hologenome theory of evolution is as follows (condensed from Rosenberg et al., 2007): "All animals and plants establish symbiotic relationships with microorganisms." "Different host species contain different symbiont populations and individuals of the same species can also contain different symbiont populations." "The association between a host organism and its microbial community affect both the host and its microbiota." "The genetic information encoded by microorganisms can change under environmental demands more rapidly, and by more processes, than the genetic information encoded by the host organism." "... the genome of the host can act in consortium with the genomes of the associated symbiotic microorganisms to create a hologenome. This hologenome...can change more rapidly than the host genome alone, thereby conferring greater adaptive potential to the combined holobiont evolution." "Each of these points taken together [led Rosenberg et al. to propose that] the holobiont with its hologenome should be considered as the unit of natural selection in evolution." Some authors supplement the above principles with an additional one. If a given holobiont is to be considered a unit of natural selection: The hologenome must be heritable from generation to generation. Ten principles of holobionts and hologenomes were presented in PLOS Biology: I. Holobionts and hologenomes are units of biological organization II. Holobionts and hologenomes are not organ systems, superorganisms, or metagenomes III. The hologenome is a comprehensive gene system IV. The hologenome concept reboots elements of Lamarckian evolution V. Hologenomic variation integrates all mechanisms of mutation VI. Hologenomic evolution is most easily understood by equating a gene in
|
{"page_id": 34920670, "title": "Hologenome theory of evolution"}
|
century, the Song dynasty Chinese horologist, mechanical engineer, and astronomer Su Song created a water-driven astronomical clock for his clock-tower of Kaifeng City. Su Song is noted for having incorporated an escapement mechanism and the earliest known endless power-transmitting chain drive for his clock-tower and armillary sphere to function. Contemporary Muslim astronomers and engineers also constructed a variety of highly accurate astronomical clocks for use in their observatories, such as the astrolabic clock by Ibn al-Shatir in the early 14th century. The early development of mechanical clocks in Europe is not fully understood, but there is general agreement that by 1300–1330 there existed mechanical clocks (powered by weights rather than by water and using an escapement) which were intended for two main purposes: for signalling and notification (e.g. the timing of services and public events), and for modelling the solar system. The latter is an inevitable development because the astrolabe was used both by astronomers and astrologers, and it was natural to apply a clockwork drive to the rotating plate to produce a working model of the solar system. American historian Lynn White Jr. of Princeton University wrote: Most of the first clocks were not so many chronometers as exhibitions of the pattern of the cosmos … Clearly, the origins of the mechanical clock lie in a complex realm of monumental planetaria, equatoria, and astrolabes. The astronomical clocks developed by the English mathematician and cleric Richard of Wallingford in St Albans during the 1330s, and by medieval Italian physician and astronomer Giovanni Dondi dell'Orologio in Padua between 1348 and 1364 are masterpieces of their type. They no longer exist, but detailed descriptions of their design and construction survive, and modern reproductions have been made. Wallingford's clock may have shown the sun, moon (age, phase, and node), stars and planets, and
|
{"page_id": 804218, "title": "Astronomical clock"}
|
of M. polymorpha. The high prevalence of autopolyploidy in plants also impacts the structure of their sex chromosomes. Polyploidization can occur before and after the development of sex chromosomes. If it occurs after sex chromosomes are established, dosage should stay consistent between the sex chromosomes and autosomes, with minimal impact on sex differentiation. If it occurs before sex chromosomes become heteromorphic, as is likely in the octoploid red sorrel Rumex acetosella, sex is determined in a single XY system. In a more complicated system, the sandalwood species Viscum fischeri has X1X1X2X2 chromosomes in females, and X1X2Y chromosomes in males. ==== Sequence composition and evolution ==== Amplification of transposable elements, tandom repeats especially accumulation of long tandom repeats (LTR) retrotransposones are responsible for plant sex chromosome evolution. The insertion of retrotransposons is probably the major cause of y-chromosome expansion and plant genome size evolution. Retrotransposones contribute in size determination of sex chromosomes and its proliferation varies even in closely related species. LTR and tandom repeats play dominant role in the evolution of S. latifolia sex chromosomes. Athila is new family of retroelements, discovered in Arabidopsis thaliana, present in heterochromatin region only. Athila retroelements overrepresented in X but absent in Y while tandem repeats enriched in Y-chromosome. Some chloroplast sequences have also been identified in the Y-chromosome of S. latifolia. S. vulgaris has more retroelements in their sex chromosomes compare to S. latifolia. Microsatellite data shows that there is no significant difference between X and Y-chromosome microsatellites in both Silene species. This would conclude that microsatellites do not participate in Y-chromosome evolution. The portion of Y-chromosome that never recombine with X-chromosome faces selection reduction. This reduced selection leads to insertion of transposable elements and accumulation of deleterious mutation. The Y become larger and smaller than X due to insertion of retroelement and
|
{"page_id": 7123751, "title": "Sex chromosome"}
|
This concern revolves around the notion that the paraphrases of modal claims in terms of a fiction of possible worlds may not be about the same things as the original modal claims, potentially affecting the core point of modal claims being about their subject matter. These concerns are part of ongoing debates surrounding modal fictionalism and its compatibility with various philosophical positions. == See also == Fictionalism == References == "Modal fictionalism" at the Stanford Encyclopedia of Philosophy "Modal Fictionalism and Possible Worlds Semantics" at the Stanford Encyclopedia of Philosophy Modal fictionalism Gideon Rosen, 'Modal Fictionalism', Mind, 99, 395 (1990), pp. 327–354. Modal Fictionalism and Analysis Seahwa Kim, 'Modal Fictionalism and Analysis', in Mark Eli Kalderon (ed.), Fictionalism in Metaphysics (Oxford:Oxford University Press, 2005), pp. 116–33. Modal Fictionalism, Possible Worlds, and Artificiality Andrea Sauchelli, 'Modal Fictionalism, Possible Worlds, and Artificiality', Acta Analytica (forthcoming)
|
{"page_id": 22885030, "title": "Modal fictionalism"}
|
Plasmin-α2-antiplasmin complex (PAP) is a 1:1 irreversibly formed inactive complex of the enzyme plasmin and its inhibitor α2-antiplasmin. It is a marker of the activity of the fibrinolytic system and a marker of net activation of fibrinolysis. PAP levels are increased with pregnancy and by ethinylestradiol-containing combined birth control pills. Conversely, levels of PAP do not appear to be affected with menopausal hormone therapy. PAP levels have been reported to be elevated in men with prostate cancer. == References ==
|
{"page_id": 70296709, "title": "Plasmin-α2-antiplasmin complex"}
|
Paula Bonta is an Argentinian-Canadian computer scientist and educational software designer. She is known for developing programming environments for children, most notably contributing to the design of the Scratch programming language before it was even called Scratch. She co-founded the Playful Invention Company, a spin-off from the MIT Media Lab noted for developing the Programmable Cricket, with Mitchel Resnick and Brian Silverman and serves as Lead Designer. She was also the design director for several award-winning software products for children, including MicroWorlds and the "My Make Believe" series of products from Logo Computer Systems, Inc. She has a degree in computer science and a graduate degree from the Harvard Graduate School of Education. == References ==
|
{"page_id": 54684778, "title": "Paula Bonta"}
|
difference between these prokaryotic and eukaryotic cells. The average eukaryotic cell has about 25 times more DNA than a prokaryotic cell does. Replication occurs much faster in prokaryotic cells than in eukaryotic cells; bacteria sometimes only take 40 minutes, while animal cells can take up to 400 hours. Eukaryotes also have a distinct operation for replicating the telomeres at the end of their last chromosomes. Prokaryotes have circular chromosomes, causing no ends to synthesize. Prokaryotes have a short replication process that occurs continuously; eukaryotic cells, on the other hand, only undertake DNA replication during the S-phase of the cell cycle. The similarities are the steps for the DNA replication. In both prokaryotes and eukaryotes, replication is accomplished by unwinding the DNA by an enzyme called the DNA helicase. New strands are created by enzymes called DNA polymerases. Both of these follow a similar pattern, called semi-conservative replication, in which individual strands of DNA are produced in different directions, which makes a leading and lagging strand. These lagging strands are synthesized by the production of Okazaki fragments that are soon joined. Both of these organisms begin new DNA strands which also include small strands of RNA. == Uses in technology == === Medical concepts associated with Okazaki fragments === Although cells undergo multiple steps in order to ensure there are no mutations in the genetic sequence, sometimes specific deletions and other genetic changes during Okazaki fragment maturation go unnoticed. Because Okazaki fragments are the set of nucleotides for the lagging strand, any alteration including deletions, insertions, or duplications from the original strand can cause a mutation if it is not detected and fixed. Other causes of mutations include problems with the proteins that aid in DNA replication. For example, a mutation related to primase affects RNA primer removal and can make
|
{"page_id": 506315, "title": "Okazaki fragments"}
|
The Nexus Trilogy is a postcyberpunk thriller novel trilogy written by American author Ramez Naam and published between 2012-2015. The novel series follows the protagonist Kaden Lane, a scientist who works on an experimental nano-drug, Nexus, which allows the brain to be programmed and networked, connecting human minds together. As he pursues his work, he becomes entangled in government and corporate intrigue. The story takes place in the year 2040. Nexus tied for Best Novel in the 2014 Prometheus Awards given out by the Libertarian Futurist Society. It was also shortlisted for the 2014 Arthur C. Clarke award. Nexus was published in 2012. Its sequel, Crux, was published in 2013. The third volume of the trilogy, Apex, was published in 2014, and won the 2015 Philip K. Dick Award. The film rights to Nexus were purchased by Paramount in 2013. == Plot summary == === Nexus === Samantha Cataranes (Sam), an agent for the Emerging Risks Directorate (ERD) of the United States government, arrives undercover at a party looking for Kaden Lane. Kaden is there testing Nexus 5, an illegal, experimental nano-drug for direct input and output of brain signals. Sam talks with Kaden about his work and he invites her to be a part of a Nexus 5 study. Sam goes to the study and meets Kaden's close friends and colleagues: Rangan Shankari, Ilya Alexander, and Watson Cole (Wats). Sam takes Nexus 5, connecting her mind with the others, and they discover who she is and Kade uses Nexus to knock her out. When Sam awakes she threatens the group with prison, and promises a pardon in exchange for Kade's help. Wats escapes before the ERD extracts the group. The ERD describe a mission to spy on Su-Yong Shu, a brilliant Chinese neuroscientist who is implicated in murder and
|
{"page_id": 37984303, "title": "The Nexus Trilogy"}
|
the text doesn’t have this information, we would assume that Suzy opened a door to get into the restaurant, that there were tables there, that she ate the sandwich, then she paid for it, and so on. The fact that information of this type can turn up in people’s attempts to remember the text is further evidence of the existence of scripts. It is also a good indication of the fact that our understanding of what we read doesn’t come directly from what words and sentences are on the page, but the interpretations we create, in our minds, of what we read. Indeed, crucial information is sometimes omitted from important instructions on the assumption that everybody knows the script. Think carefully about the following instructions from a bottle of cough syrup. Fill measure cup to line and repeat every 2 to 3 hours .No, you’ve not just to keep filling the measure cup every 2 to 3 hours. Nor have you to rub the cough syrup on your neck or in your hair. You are expected to know the script and drink the stuff from the measure cup every 2 or 3 hours. Clearly, our understanding of what we read is not only based on what we see on the page (language structures), but also on other things that we have in mind (knowledge structures). To understand more about the connection between these two things, we have to take a close look at the workings of the human brain. > Discourse analysis 151 # Study questions 1 How is the word “discourse” usually defined? 2 What is the basic difference between cohesion and coherence? 3 How do speakers mark completion points at the end of a turn? 4 What are hedges in discourse? 5 Which maxim does this speaker seem
|
{"source": 991, "title": "from dpo"}
|
although approximations (like quasi-Newton methods) exist. * **Random Perturbations:** Adding noise to the gradients or weights can help the optimizer to jump out of saddle points or flat regions. Stochastic Gradient Descent with Restarts: Periodically resetting the learning rate (also known as learning rate annealing) can also help escape saddle points. * **Adaptive Learning Rates:** Learning rate schedules or adaptive learning rate methods can adjust the learning rate during training, helping to move out of saddle points more effectively. * **Batch Normalization:** Batch normalization normalizes the input layer by adjusting the mean and variance. This can help in smoother optimization landscapes and can indirectly assist in dealing with saddle points. * **Proper Initialization and Regularization:** * Good initialization strategies (like He or Glorot initialization) can set the training process on a good trajectory. * Regularization techniques like dropout or L2 regularization can also help in generalizing the learning process, which might contribute to avoiding getting stuck in saddle points. * **Warm-up Phases:** Starting with a lower learning rate and gradually increasing it (warm-up) can help the model to initially navigate the loss landscape more gently, avoiding getting stuck in sharp saddle points early in training. * **Escape Techniques:** Research has proposed various escape techniques, such as perturbing the parameters if the learning process stalls, which can help the optimizer to escape saddle points. * While these techniques can help mitigate the impact of saddle points, it’s important to note that in high-dimensional spaces (like those encountered in deep learning), saddle points are less problematic than poor local minima. Modern optimization algorithms, especially those with momentum and adaptive learning rates, are generally quite effective at navigating through saddle points. ### When Do You Use Bayesian Optimization? Can You Explain How It Works? * Bayesian optimization is a powerful strategy for optimizing
|
{"source": 2757, "title": "from dpo"}
|
they emerge, to recognize and defend against threats, and to mitigate internal weaknesses before they become detrimental. Strategists in successful organizations take the time to formulate, implement, and then evaluate strategies deliberately and systematically. Good strategists move their organiza-tion forward with purpose and direction, continually evaluating and improving the firm’s external and internal strategic positions. Strategy evaluation allows an organization to shape its own future rather than allowing it to be constantly shaped by remote forces that have little or no vested interest in the well-being of the enterprise. Although not a guarantee for success, strategic management allows organizations to make effective long-term decisions, to execute those decisions efficiently, and to take corrective actions as needed to ensure success. Computer networks and the Internet help to coordinate strategic-management activities and to ensure that deci-sions are based on good information. The Checkmate Strategic Planning Software is especially good in this regard (www.checkmateplan.com). A key to effective strategy evaluation and to successful strategic management is an integration of intuition and analysis: A potentially fatal problem is the tendency for analytical and intuitive issues to polarize. This polarization leads to strategy evaluation that is dominated by either analysis or intuition, or to strategy evaluation that is discontinuous, with a lack of coordination among analytical and intuitive issues. 19 Strategists in successful organizations realize that strategic management is first and foremost a people process. It is an excellent vehicle for fostering organizational communi-cation. People are what make the difference in organizations. The real key to effective strategic management is to accept the premise that the plan-ning process is more important than the written plan, that the manager is continu-ously planning and does not stop planning when the written plan is finished. The written plan is only a snapshot as of the moment it is
|
{"source": 4976, "title": "from dpo"}
|
broader interest. ![Image 84: Paper: Hai H. Nguyen (paper #533) Physical attacks through hardware bit probing expose significant vulnerabilities in cryptographic systems. This paper investigates the leakage resilience of linear code-based secret sharing schemes, including Shamir's secret sharing, under the threat of physical bit leakage. Our focus is on schemes over binary extension fields, which are prevalent in practical cryptographic applications. We present the following key results: \begin{enumerate} \item A novel dichotomy showing that every scheme is either perfectly secure or entirely insecure in the presence of any physical-bit leakage. \item A complete characterization of leakage resilience based on the minimal codewords in the dual code of the binary image code, providing new insights into the leakage structure. This is the first complete characterization in the context of leakage-resilient secret sharing. \item A Monte-Carlo construction of a variant of Shamir's secret sharing with high leakage resilience. \end{enumerate} ![Image 86: Paper: Wenjie Nan (paper #37) We present new techniques for garbling mixed arithmetic and boolean circuits, utilizing the homomorphic secret sharing scheme introduced by Roy \& Singh (Crypto 2021), along with the half-tree protocol developed by Guo et al. (Eurocrypt 2023). Compared to some two-party interactive protocols, our mixed garbling only requires several times $(<10)$ more communication cost. We construct the bit decomposition/composition gadgets with communication cost $O((\lambda+\lambda_{\text{DCR}}/k)b)$ for integers in the range $(-2^{b-1}, 2^{b-1})$, requiring $O(2^k)$ computations for the GGM-tree. Our approach is compatible with constant-rate multiplication protocols, and the cost decreases as $k$ increases. Even for a small $k=8$, the concrete efficiency ranges from $6\lambda b$ ($b \geq 1000$ bits) to $9\lambda b$ ($b
|
{"source": 6289, "title": "from dpo"}
|
In chemistry, a heteroatom (from Ancient Greek heteros 'different' and atomos 'uncut') is, strictly, any atom that is not carbon or hydrogen. == Organic chemistry == In practice, the term is mainly used more specifically to indicate that non-carbon atoms have replaced carbon in the backbone of the molecular structure. Typical heteroatoms are nitrogen (N), oxygen (O), sulfur (S), phosphorus (P), chlorine (Cl), bromine (Br), and iodine (I), as well as the metals lithium (Li) and magnesium (Mg). == Proteins == It can also be used with highly specific meanings in specialised contexts. In the description of protein structure, in particular in the Protein Data Bank file format, a heteroatom record (HETATM) describes an atom as belonging to a small molecule cofactor rather than being part of a biopolymer chain. == Zeolites == In the context of zeolites, the term heteroatom refers to partial isomorphous substitution of the typical framework atoms (silicon, aluminium, and phosphorus) by other elements such as beryllium, vanadium, and chromium. The goal is usually to adjust properties of the material (e.g., Lewis acidity) to optimize the material for a certain application (e.g., catalysis). == References == == External links == Journal - Heteroatom Chemistry
|
{"page_id": 13605, "title": "Heteroatom"}
|
for the well-being of animals had to be purged from anthropomorphism and sentimentalism. This point of view is taken for example in a report by the Dutch Federation of Veterinarians in the EEC (FVE, 1978) concerning welfare problems among domestic animals. This document states that: Although the interests of animals often conflict with the demands of society, society remains responsible for the welfare of the animals involved. Considerations regarding animal welfare ought to be based on veterinary, scientific and ethological norms, but not on sentiment. And although animals do not have fundamental rights, human beings have certain moral obligations towards them. == Intrinsic value and animal ethics (1980–2000) == During the 1970s and 1980s, the criticism regarding the living conditions of farm and laboratory animals was reexamined in other social debates, notably the discussions concerning the protection of the (natural) environment and the ones concerning the development of new breeding techniques. Due to this broadening of the issues, other objections against the use of animals for scientific or economic reasons emerged. The instrumental use of the animals, it was said, is hard to reconcile with their intrinsic (or inherent) value. In 1981 the Dutch government included the intrinsic value-argument in a statement concerning the protection of animals (CRM, 1981). At that time, a principle was formulated that allowed for the possibility that, in some cases, the interests of animals might prevail over and above those of science and industry. The interests of the animal involved health and well-being as experienced by the animals themselves, independent from considerations concerning their suitability for human use. It was now claimed that animals have an intrinsic value, that is a good-of-their-own, and an interest in their own well-being. Developments within the field of biotechnology broadened the scope of the debate on the moral status
|
{"page_id": 23975565, "title": "Intrinsic value in animal ethics"}
|
bilinear form is symmetric if and only if S is symmetric. There is thus a natural one-to-one correspondence between symmetric bilinear forms on TpM and symmetric linear isomorphisms of TpM to the dual T∗pM. As p varies over M, Sg defines a section of the bundle Hom(TM, T*M) of vector bundle isomorphisms of the tangent bundle to the cotangent bundle. This section has the same smoothness as g: it is continuous, differentiable, smooth, or real-analytic according as g. The mapping Sg, which associates to every vector field on M a covector field on M gives an abstract formulation of "lowering the index" on a vector field. The inverse of Sg is a mapping T*M → TM which, analogously, gives an abstract formulation of "raising the index" on a covector field. The inverse S−1g defines a linear mapping S g − 1 : T ∗ M → T M {\displaystyle S_{g}^{-1}:\mathrm {T} ^{*}M\to \mathrm {T} M} which is nonsingular and symmetric in the sense that [ S g − 1 α , β ] = [ S g − 1 β , α ] {\displaystyle \left[S_{g}^{-1}\alpha ,\beta \right]=\left[S_{g}^{-1}\beta ,\alpha \right]} for all covectors α, β. Such a nonsingular symmetric mapping gives rise (by the tensor-hom adjunction) to a map T ∗ M ⊗ T ∗ M → R {\displaystyle \mathrm {T} ^{*}M\otimes \mathrm {T} ^{*}M\to \mathbf {R} } or by the double dual isomorphism to a section of the tensor product T M ⊗ T M . {\displaystyle \mathrm {T} M\otimes \mathrm {T} M.} == Arclength and the line element == Suppose that g is a Riemannian metric on M. In a local coordinate system xi, i = 1, 2, …, n, the metric tensor appears as a matrix, denoted here by G, whose entries are the components gij of the
|
{"page_id": 195795, "title": "Metric tensor"}
|
up of all four lobes, while the left lung only has two: the cranial and caudal lobes. To provide space for the heart, the left cranial lobe of the lungs is significantly smaller than that of the right. The diaphragm is a muscular structure that lies caudal to the lungs and contracts to facilitate respiration. === Diet and digestion === Rabbits are strict herbivores and are suited to a diet high in fiber, mostly in the form of cellulose. They will typically graze grass upon waking up and emerging from a burrow, and will move on to consume vegetation and other plants throughout the waking period; rabbits have been known to eat a wide variety of plants, including tree leaves and fruits, though consumption of fruit and lower fiber foods is common for pet rabbits where natural vegetation is scarce. Easily digestible food is processed in the gastrointestinal tract and expelled as regular feces. To get nutrients out of hard to digest fiber, rabbits ferment fiber in the cecum (part of the gastrointestinal tract) and then expel the contents as cecotropes, which are reingested (cecotrophy or refection). The cecotropes are then absorbed in the small intestine to use the nutrients. Soft cecotropes are usually consumed during periods of rest in underground burrows. Rabbits cannot vomit; and therefore if buildup occurs within the intestines (due often to a diet with insufficient fibre), intestinal blockage can occur. === Reproduction === The adult male reproductive system forms the same as most mammals with the seminiferous tubular compartment containing the Sertoli cells and an adluminal compartment that contains the Leydig cells. The Leydig cells produce testosterone, which maintains libido and creates secondary sex characteristics such as the genital tubercle and penis. The Sertoli cells triggers the production of Anti-Müllerian duct hormone, which absorbs the
|
{"page_id": 26573, "title": "Rabbit"}
|
the late Ian Holm, who portrayed the android Ash in the original film. After securing permission from Holm's estate, Rook was realized by effects company Legacy Effects, who created an animatronic head and torso based on a headscan Holm had made during the production of The Lord of the Rings film trilogy. For certain shots, the practical character was also enhanced by CGI and deepfake AI technology from the CGI company Metaphysic, such as for lip syncing lines or enhancing its nose and eyes. Betts' dialogue recordings were then modified with the filtering software Speecher, to be based on Ash's dialogue pulled from the original Alien. Trevor Newlin portrays the xenomorph, while the human–xenomorph hybrid (credited as the "Offspring") is portrayed by Romanian former basketball player Robert Bobroczkyi. To portray the Offspring, Bobroczkyi wore full body prosthetic makeup created by Legacy Effects, with the exception of the creature's tail which was CGI. == Production == === Development === After the acquisition of 21st Century Fox by The Walt Disney Company, 20th Century Fox confirmed at the 2019 CinemaCon that future Alien films were in development. In March 2022, it was reported that Fede Álvarez would write and direct a seventh Alien film after pitching his own story, said to be "unconnected" to the previous films in the franchise, with the project set to be released on Hulu. Álvarez later clarified that the film was not a standalone story. The film was said to take place between the events of Alien (1979) and Aliens (1986), with some technical crew members returning from the latter film. Álvarez stuck as close as possible to the established canon of the film series and used the fan wiki Xenopedia as a reference point while writing the story. The film features connections and references to all
|
{"page_id": 67165116, "title": "Alien: Romulus"}
|
faster, bi-directional, and offered real graphics as opposed to simple character graphics. The downside of the system was that it required much more advanced decoders, typically featuring Zilog Z80 or Motorola 6809 processors with RGB and/or RF output. The Innovation, Science and Economic Development Canada (then Department of Communications) launched a four-year plan to fund public roll-outs of the technology in an effort to spur the development of a commercial Telidon system. AT&T Corporation was so impressed by Telidon that they decided to join the project. They added a number of useful extensions, notably the ability to define original graphics commands (macro) and character sets (DRCS). They also tabled algorithms for proportionally spaced text, which greatly improved the quality of the displayed pages. A joint CSA/ANSI working group (X3L2.1) revised the specifications, which were submitted for standardization. In 1983, they became CSA T500 and ANSI X3.110, or NAPLPS. The data encoding system was also standardized as the NABTS (North American Broadcast Teletext Specification) protocol. Business models for Telidon services were poorly developed. Unlike the UK, where teletext was supported by one of only two large companies whose whole revenue model was based on a read-only medium (television), in North America Telidon was being offered by companies who worked on a subscriber basis. == One-way systems == Telidon-based teletext was tested in a few North American trials in the early 1980s — CBC IRIS, TVOntario, MTS-sponsored Project IDA, to name a few. NAPLPS was also part of the NABTS teletext standard, for the encoding and display of teletext pages. In the late 1980s and early 1990s, affiliates of the regional sports network group SportsChannel ran a service called Sports Plus Network, which ran sports news and scores while SportsChannel was not otherwise on the air. The screens, which frequently featured team
|
{"page_id": 90675, "title": "NAPLPS"}
|
matrices involves the Boolean arithmetic with 1 + 1 = 1 {\displaystyle 1+1=1} and 1 × 1 = 1. {\displaystyle 1\times 1=1.} An entry in the matrix product of two logical matrices will be 1, then, only if the row and column multiplied have a corresponding 1. Thus the logical matrix of a composition of relations can be found by computing the matrix product of the matrices representing the factors of the composition. "Matrices constitute a method for computing the conclusions traditionally drawn by means of hypothetical syllogisms and sorites." == Heterogeneous relations == Consider a heterogeneous relation R ⊆ A × B ; {\displaystyle R\subseteq A\times B;} that is, where A {\displaystyle A} and B {\displaystyle B} are distinct sets. Then using composition of relation R {\displaystyle R} with its converse R T , {\displaystyle R^{\textsf {T}},} there are homogeneous relations R R T {\displaystyle RR^{\textsf {T}}} (on A {\displaystyle A} ) and R T R {\displaystyle R^{\textsf {T}}R} (on B {\displaystyle B} ). If for all x ∈ A {\displaystyle x\in A} there exists some y ∈ B , {\displaystyle y\in B,} such that x R y {\displaystyle xRy} (that is, R {\displaystyle R} is a (left-)total relation), then for all x , x R R T x {\displaystyle x,xRR^{\textsf {T}}x} so that R R T {\displaystyle RR^{\textsf {T}}} is a reflexive relation or I ⊆ R R T {\displaystyle \mathrm {I} \subseteq RR^{\textsf {T}}} where I is the identity relation { ( x , x ) : x ∈ A } . {\displaystyle \{(x,x):x\in A\}.} Similarly, if R {\displaystyle R} is a surjective relation then R T R ⊇ I = { ( x , x ) : x ∈ B } . {\displaystyle R^{\textsf {T}}R\supseteq \mathrm {I} =\{(x,x):x\in B\}.} In this case R ⊆ R R
|
{"page_id": 7472170, "title": "Composition of relations"}
|
are treated separately. A robust simulator is one that will react to any input in a reasonable way. For instance, if we imagine a high speed racecar video game, from one simulation step to the next, it is conceivable that the cars would advance a substantial distance along the race track. If there is a shallow obstacle on the track (such as a brick wall), it is not entirely unlikely that the car will completely leap over it, and this is very undesirable. In other instances, the "fixing" that posteriori algorithms require isn't implemented correctly, resulting in bugs that can trap characters in walls or allow them to pass through them and fall into an endless void where there may or may not be a deadly bottomless pit, sometimes referred to as "black hell", "blue hell", or "green hell", depending on the predominant color. These are the hallmarks of a failing collision detection and physical simulation system. Big Rigs: Over the Road Racing is an infamous example of a game with a failing or possibly missing collision detection system. ==== Hitbox ==== A hitbox is an invisible shape commonly used in video games for real-time collision detection; it is a type of bounding box. It is often a rectangle (in 2D games) or cuboid (in 3D) that is attached to and follows a point on a visible object (such as a model or a sprite). Circular or spheroidial shapes are also common, though they are still most often called "boxes". It is common for animated objects to have hitboxes attached to each moving part to ensure accuracy during motion. Hitboxes are used to detect "one-way" collisions such as a character being hit by a punch or a bullet. They are unsuitable for the detection of collisions with feedback (e.g. bumping
|
{"page_id": 171552, "title": "Collision detection"}
|
In mathematics, and in particular singularity theory, an Ak singularity, where k ≥ 0 is an integer, describes a level of degeneracy of a function. The notation was introduced by V. I. Arnold. Let f : R n → R {\displaystyle f:\mathbb {R} ^{n}\to \mathbb {R} } be a smooth function. We denote by Ω ( R n , R ) {\displaystyle \Omega (\mathbb {R} ^{n},\mathbb {R} )} the infinite-dimensional space of all such functions. Let diff ( R n ) {\displaystyle \operatorname {diff} (\mathbb {R} ^{n})} denote the infinite-dimensional Lie group of diffeomorphisms R n → R n , {\displaystyle \mathbb {R} ^{n}\to \mathbb {R} ^{n},} and diff ( R ) {\displaystyle \operatorname {diff} (\mathbb {R} )} the infinite-dimensional Lie group of diffeomorphisms R → R . {\displaystyle \mathbb {R} \to \mathbb {R} .} The product group diff ( R n ) × diff ( R ) {\displaystyle \operatorname {diff} (\mathbb {R} ^{n})\times \operatorname {diff} (\mathbb {R} )} acts on Ω ( R n , R ) {\displaystyle \Omega (\mathbb {R} ^{n},\mathbb {R} )} in the following way: let φ : R n → R n {\displaystyle \varphi :\mathbb {R} ^{n}\to \mathbb {R} ^{n}} and ψ : R → R {\displaystyle \psi :\mathbb {R} \to \mathbb {R} } be diffeomorphisms and f : R n → R {\displaystyle f:\mathbb {R} ^{n}\to \mathbb {R} } any smooth function. We define the group action as follows: ( φ , ψ ) ⋅ f := ψ ∘ f ∘ φ − 1 {\displaystyle (\varphi ,\psi )\cdot f:=\psi \circ f\circ \varphi ^{-1}} The orbit of f , denoted orb(f), of this group action is given by orb ( f ) = { ψ ∘ f ∘ φ − 1 : φ ∈ diff ( R n ) , ψ
|
{"page_id": 23802570, "title": "Ak singularity"}
|
Egocentric bias is the tendency to rely too heavily on one's own perspective and/or have a higher opinion of oneself than reality. It appears to be the result of the psychological need to satisfy one's ego and to be advantageous for memory consolidation. Research has shown that experiences, ideas, and beliefs are more easily recalled when they match one's own, causing an egocentric outlook. Michael Ross and Fiore Sicoly first identified this cognitive bias in their 1979 paper, "Egocentric Biases in Availability and Attribution". Egocentric bias is referred to by most psychologists as a general umbrella term under which other related phenomena fall. The effects of egocentric bias can differ based on personal characteristics, such as age and the number of languages one speaks. Thus far, there have been many studies focusing on specific implications of egocentric bias in different contexts. Research on collaborative group tasks have emphasized that people view their own contributions differently than they view that of others. Other areas of research have been aimed at studying how mental health patients display egocentric bias, and at the relationship between egocentric bias and voter distribution. These types of studies surrounding egocentric bias usually involve written or verbal questionnaires, based on the subject's personal life or their decision in various hypothetical scenarios. == History and analysis == The term "egocentric bias" was first coined in 1980 by Anthony Greenwald, a psychologist at The Ohio State University. He described it as a phenomenon in which people skew their beliefs so that what they recall from their memory or what they initially understood is different than what actually occurred. He cites research by Rogers, Kuiper, and Kirker, who explain that the self-reference effect is the ability of people to recall information better if they think about how the information will affect
|
{"page_id": 511043, "title": "Egocentric bias"}
|
What web host are you the usage of? Can I am getting your affiliate hyperlink for your host? I desire my web site loaded up as fast as yours lol 982. Le dimanche 11 juin 2017, 23:48 par Ants exterminators I have been surfing on-line greater than three hours as of late, yet I by no means found any attention-grabbing article like yours. It is beautiful worth enough for me. In my opinion, if all web owners and bloggers made just right content material as you did, the web will likely be much more helpful than ever before. 983. Le lundi 12 juin 2017, 10:29 par Lara I've been surfing online more than 4 hours today, yet I never found any interesting article like yours. It is pretty worth enough for me. In my opinion, if all site owners and bloggers made good content as you did, the web will be much more useful than ever before. 984. Le lundi 12 juin 2017, 16:52 par Derby Excellent post. I was checking continuously this blog and I'm inspired! Very helpful info specially the remaining phase :) I maintain such information much. I used to be seeking this particular information for a very long time. Thank you and best of luck. 985. Le lundi 12 juin 2017, 17:07 par M88 Incredible points. Great arguments. Keep up the good effort. 986. Le lundi 12 juin 2017, 23:38 par audience Great items from you, man. I've have in mind your stuff prior to and you are simply too fantastic. I actually like what you have bought here, certainly like what you're stating and the best way wherein you are saying it. You are making it entertaining and you still take care of to keep it smart. I cant wait to read far more from
|
{"source": 1412, "title": "from dpo"}
|
the empirical formula of this compound? Explain your answer. (b) What is the coordination number of the Mn 3+ ion? (c) Calculate the edge length of the unit cell if the radius of a Mn 3+ ion is 0.65 A. (d) Calculate the density of the compound. 101. What is the spacing between crystal planes that diffract X-rays with a wavelength of 1.541 nm at an angle θ of 15.55° (first order reflection)? 102. A diffractometer using X-rays with a wavelength of 0.2287 nm produced first-order diffraction peak for a crystal angle θ = 16.21°. Determine the spacing between the diffracting planes in this crystal. 103. A metal with spacing between planes equal to 0.4164 nm diffracts X-rays with a wavelength of 0.2879 nm. What is the diffraction angle for the first order diffraction peak? 104. Gold crystallizes in a face-centered cubic unit cell. The second-order reflection (n = 2) of X-rays for the planes that make up the tops and bottoms of the unit cells is at θ = 22.20°. The wavelength of the X-rays is 1.54 Å. What is the density of metallic gold? 105. When an electron in an excited molybdenum atom falls from the L to the K shell, an X-ray is emitted. These X-rays are diffracted at an angle of 7.75° by planes with a separation of 2.64 Å. What is the difference in energy between the K shell and the L shell in molybdenum assuming a first-order diffraction? > 602 Chapter 10 | Liquids and Solids This content is available for free at # Chapter 11 # Solutions and Colloids Figure 11.1 Coral reefs, such as this one at the Palmyra Atoll National Wildlife Refuge, are vital to the ecosystem of earth’s oceans but are threatened by climate change and dissolved pollution. Marine
|
{"source": 3700, "title": "from dpo"}
|
but today your applet must be digitally signed by a phone manufacturer or a TEE provides similar features via the “Gatekeeper can later retrieve the key by sending in the right passcode. In the event that the entered passcode is not the right one, the lockbox increments an “attempt counter” that caps the number of
|
{"source": 5744, "title": "from dpo"}
|
mankind are more disposed to suffer while evils are sufferable, than to right APPENDIX B 238 > OREGON COMMON CORE STATE STANDARDS FOR English Language Arts > & Literacy in History/Social Studies, Science, and Technical Subjects themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same object, evinces a design to reduce them under absolute despotism, it is their duty to throw off such government, and to provide new guards for their future security. Such has been the patient sufferance of the women under this government, and such is now the necessity which constrains them to demand the equal station to which they are entitled. The history of mankind is a history of repeated injuries and usurpations on the part of man toward woman, having in direct object the establishment of an absolute tyranny over her. To prove this, let facts be submitted to a candid world. The history of mankind is a history of repeated injuries and usurpations on the part of man toward woman, having in direct object the establishment of an absolute tyranny over her. To prove this, let facts be submitted to a candid world. He has never permitted her to exercise her inalienable right to the elective franchise. He has compelled her to submit to laws, in the formation of which she had no voice. He has withheld from her rights which are given to the most ignorant and degraded men —both natives and foreigners. Having deprived her of this first right of a citizen, the elective franchise, thereby leaving her without representation in the halls of legislation, he has oppressed her on all sides. He has made her, if married, in the eye of the law, civilly dead. He has taken
|
{"source": 6820, "title": "from dpo"}
|
{ 145 ( 1 − 1 s.g. ) for density greater than water 140 s.g. − 130 for density lesser than water s.g. = { 145 145 − degrees Baum e ´ for density greater than water 140 130 + degrees Baum e ´ for density lesser than water {\displaystyle {\begin{aligned}\mathrm {degrees\ Baum{\acute {e}}} &={\begin{cases}\displaystyle 145\left(1-{\frac {1}{\text{s.g.}}}\right)&{\text{for density greater than water}}\\[3pt]\displaystyle {\frac {140}{\text{s.g.}}}-130&{\text{for density lesser than water}}\end{cases}}\\[3pt]{\text{s.g.}}&={\begin{cases}\displaystyle {\frac {145}{145-{\text{degrees Baum}}\mathrm {\acute {e}} }}&{\text{for density greater than water}}\\[3pt]\displaystyle {\frac {140}{130+{\text{degrees Baum}}\mathrm {\acute {e}} }}&{\text{for density lesser than water}}\end{cases}}\end{aligned}}} The numerator in the specific gravity calculation is commonly known as the "modulus". An older handbook gives the following formulae (no reference temperature being mentioned): s.g. = { 144 144 − degrees Baum e ´ for density greater than water 144 134 + degrees Baum e ´ for density lesser than water {\displaystyle {\text{s.g.}}={\begin{cases}\displaystyle {\frac {144}{144-{\text{degrees Baum}}\mathrm {\acute {e}} }}&{\text{for density greater than water}}\\[3pt]\displaystyle {\frac {144}{134+{\text{degrees Baum}}\mathrm {\acute {e}} }}&{\text{for density lesser than water}}\end{cases}}} == Other scales == Because of vague instructions or errors in translation a large margin of error was introduced when the scale was adopted. The API gravity scale is a result of adapting to the subsequent errors from the Baumé scale. The Baumé scale is related to the Balling, Brix, Plato and 'specific gravity times 1000' scales. == Use == Before standardization on specific gravity around the time of World War II the Baumé scale was generally used in industrial chemistry and pharmacology for the measurement of density of liquids. Today the Baumé scale is still used in various industries such as sugar beet processing, ophthalmics, starch industry, winemaking, industrial water treatment, metal finishing, and printed circuit board (PCB) fabrication. It is also used for caustic in refining process. == See also == Brix scale Ripeness in viticulture ==
|
{"page_id": 2769779, "title": "Baumé scale"}
|
UV-dependent mutation, which ultimately causes the symptoms of XP. ==== Trichothiodystrophy ==== Trichothiodystrophy (TTD) is a rare autosomal recessive disease whose symptoms span across multiple systems and can vary greatly in severity. The incidence rate of TTD is estimated to be 1.2 per million in Western Europe. Milder cases cause sparse and brittle hair, which is due to the lack of sulfur, an element that is part of the matrix proteins that give hair its strength. More severe cases cause delayed development, significant intellectual disability, and recurrent infection; the most severe cases see death at infancy or early childhood. TTD also affects the mother of the affected child during pregnancy, when she may experience pregnancy-induced high blood pressure and develop HELLP syndrome. The baby has a high risk of being born prematurely and will have a low birth weight. After birth, the child's normal growth is retarded, resulting in a short stature. Other symptoms include scaly skin, abnormalities of the fingernails and toenails, clouding of the lens of the eye from birth (congenital cataracts), poor co-ordination, and ocular and skeletal abnormalities. Half of affected individuals also experience photosensitivity to UV light. TTD is caused by mutations in one of three genes, ERCC2, ERCC3, or GTF2H5, the first two of which are also linked to xeroderma pigmentosum. However, patients with TTD do not show a higher risk of developing skin cancer, in contrast to patients with XP. The three genes associated with TTD encode for XPB, XPD and p8/TTDA of the general transcription factor IIH (TFIIH) complex, which is involved in transcription and DNA damage repair. Mutations in one of these genes cause reduction of gene transcription, which may be involved in development (including placental development), and thus may explain retardation in intellectual abilities, in some cases; these mutations also lead
|
{"page_id": 38057969, "title": "Progeroid syndromes"}
|
moths could endanger nearby farms' organic certification. Legal experts say that national organic standards penalize only deliberate GMO use. The creators claim that the moth does not migrate if sufficient food is available, nor can it survive winter weather. === Mediterranean fruit fly === The Mediterranean fruit fly is a global agricultural pest. They infest a wide range of crops (over 300) including wild fruit, vegetables and nuts, and in the process, cause substantial damage. The company Oxitec has developed GM-males which have a lethal gene that interrupts female development and kills them in a process called "pre-pupal female lethality". After several generations, the fly population diminishes as the males can no longer find mates. To breed the flies in the laboratory, the lethal gene can be "silenced" using the antibiotic tetracycline. Opponents argue that the long-term effects of releasing millions of GM-flies are impossible to predict. Dead fly larvae could be left inside crops. Helen Wallace from Genewatch, an organisation that monitors the use of genetic technology, stated "Fruit grown using Oxitec's GM flies will be contaminated with GM maggots which are genetically programmed to die inside the fruit they are supposed to be protecting". She added that the mechanism of lethality was likely to fail in the longer term as the GM flies evolve resistance or breed in sites contaminated with tetracycline which is widely used in agriculture. == Legislation == In July 2015, the House of Lords (U.K.) Science and Technology Committee launched an inquiry into the possible uses of GM-insects and their associated technologies. The scope of the inquiry is to include questions such as "Would farmers benefit if insects were modified in order to reduce crop pests? What are the safety and ethical concerns over the release of genetically modified insects? How should this emerging
|
{"page_id": 25174711, "title": "Genetically modified insect"}
|
systems maintained?” (architecture and agency), and "how do these systems change?” (in the present: agency, adaptiveness and reflexivity; and in the future: anticipation and imagination). Scholars of ESG say that their research is instrumental in addressing governance-related needs of UNDOS. First, it can identify salient frames for ocean problems that trigger policy action. Second, it can inform stakeholder involvement by mapping powerful and marginalized interests and suggesting pathways towards more inclusive participation. Third, it can support viable and effective ocean solutions based on insights into political support coalitions and governance design. Mainstreaming of governance research into ocean science has also been recommended: The ESG community can facilitate this mainstreaming by enhancing knowledge cumulation around ocean issues within the network; engaging more strongly in the production of actionable and action-oriented knowledge; and seeking integration into inter- and transdisciplinary ocean research. Sub-topics where ESG with regards to ocean governance can be applied are for example governance issues around deep sea mining, ocean acidification, marine biodiversity. ==== High Seas Treaty ==== There is the expectation that a new agreement in ocean law that was reached in 2023 will constitute a major innovation in ESG, and could add more complexity and robustness to existing global ocean governance. This agreement is called the High Seas Treaty or Global Ocean Treaty or the United Nations agreement on biodiversity beyond national jurisdiction (BBNJ Agreement). It was adopted on 19 June 2023 and is a legally binding instrument for the conservation and sustainable use of marine biological diversity of areas beyond national jurisdiction. It falls under the United Nations Convention on the Law of the Sea (UNCLOS). Social science research on ESG can offer insights on the factors that have promoted successful negotiation, design, and implementation of international environmental agreements that are similar to the High Seas Treaty.
|
{"page_id": 33853457, "title": "Earth system governance"}
|
where implied === When applying a rule to a number of indices (differentiation, symmetrization etc., shown next), the bracket or punctuation symbols denoting the rules are only shown on one group of the indices to which they apply. If the brackets enclose covariant indices – the rule applies only to all covariant indices enclosed in the brackets, not to any contravariant indices which happen to be placed intermediately between the brackets. Similarly if brackets enclose contravariant indices – the rule applies only to all enclosed contravariant indices, not to intermediately placed covariant indices. == Symmetric and antisymmetric parts == === Symmetric part of tensor === Parentheses, ( ), around multiple indices denotes the symmetrized part of the tensor. When symmetrizing p indices using σ to range over permutations of the numbers 1 to p, one takes a sum over the permutations of those indices ασ(i) for i = 1, 2, 3, ..., p, and then divides by the number of permutations: A ( α 1 α 2 ⋯ α p ) α p + 1 ⋯ α q = 1 p ! ∑ σ A α σ ( 1 ) ⋯ α σ ( p ) α p + 1 ⋯ α q . {\displaystyle A_{(\alpha _{1}\alpha _{2}\cdots \alpha _{p})\alpha _{p+1}\cdots \alpha _{q}}={\dfrac {1}{p!}}\sum _{\sigma }A_{\alpha _{\sigma (1)}\cdots \alpha _{\sigma (p)}\alpha _{p+1}\cdots \alpha _{q}}\,.} For example, two symmetrizing indices mean there are two indices to permute and sum over: A ( α β ) γ ⋯ = 1 2 ! ( A α β γ ⋯ + A β α γ ⋯ ) {\displaystyle A_{(\alpha \beta )\gamma \cdots }={\dfrac {1}{2!}}\left(A_{\alpha \beta \gamma \cdots }+A_{\beta \alpha \gamma \cdots }\right)} while for three symmetrizing indices, there are three indices to sum over and permute: A ( α β γ ) δ ⋯
|
{"page_id": 35456546, "title": "Ricci calculus"}
|
(4): 4. Bibcode:2002OccN....8d...4L. ISSN 0737-6766. Wilds, Richard P. (2018). "Lunar Occultations, Grazing". Encyclopedia of Lunar Science. Cham: Springer International Publishing. pp. 1–10. doi:10.1007/978-3-319-05546-6_220-3. ISBN 978-3-319-05546-6. == External links == Wood, Chuck (March 7, 2005). "One Good Occultation Deserves Another". Lunar Photo of the Day., showing grazing occultation of Jupiter as seen from Melbourne, Australia Astronomy Picture of Day for March 16, 2007, showing grazing occultation of Saturn [2] International Occultation Timing Association Predicted paths for future grazing occultations Zodiacal Catalogue (XZ80Q) of stars that can be occulted by the moon [3] Herald, David. "VizieR Lunar Occultation Archive". vizier.u-strasbg.fr. VizieR. Retrieved 2018-06-16. Predictions and analysis of Lunar Occultations and Grazing Lunar Occultations. Occult (Software), Lunar Occultation Workbench (LOW) and GRAZEPREP
|
{"page_id": 1414710, "title": "Grazing lunar occultation"}
|
in het bijzonder bij geringe opperwater-afvoer (Salt Movement on the Rotterdam Waterway Especially During Low Surface Water Discharge, 1957) Herstellings- en verbeteringswerken na de ramp van 1 februari 1953 (Restoration and Improvement Works After the Disaster of 1 February 1953, 1954) Verslag over de toestand der oevers en stranden in Zeeland 1951 VI: oevers langs Keeten, Mastgat en Zijpe (Report on the Condition of Banks and Beaches in Zeeland 1951 VI: Banks Along Keeten, Mastgat, and Zijpe, 1953) Verslag over de waarnemingen met de "Oceaan" in het mondingsgebied van de Westerschelde (Report on Observations with the "Ocean" in the Mouth Area of the Western Scheldt, 1943) Inleiding tot de getijberekening (Introduction to Tide Calculation, 1943). Most of these publications are maintained in electronic format by the Rijkswaterstaat archive. == Awards == Ferguson was awarded the Order of the Netherlands Lion, and his contributions to the scientific underpinning of the Delta Works Plan earned him an honorary doctorate from Delft University of Technology in 1987. == See also == Delta Works Flood control in the Netherlands Rijkswaterstaat == References == == External links == Trésor der Hollandsche Waterbouw – Digital repository of publications by H.A. Ferguson
|
{"page_id": 78789026, "title": "Herman Arend Ferguson"}
|
Alfonso Valencia is a Spanish biologist, ICREA Professor, current director of the Life Sciences department at Barcelona Supercomputing Center, of Spanish National Bioinformatics Institute (INB-ISCIII), and coordinator of the data pillar of the Spanish Personalised Medicine initiative, IMPaCT. From 2015 to 2018, he was President of the International Society for Computational Biology. His research interest is the development of Computational Biology methods and their application to biomedical problems. Some of the computational methods he developed are considered pioneering work in areas such as biological text mining, protein coevolution, disease networks and more recently modelling cellular systems (digital twins). He participates in some of the key cancer related international consortia. In terms of community services, he is one of the initial promoters of the ELIXIR infrastructure, founder of the Spanish and International Bioinformatics networks and former president of ISCB, the international professional association of Bioinformaticians. He is Executive Editor of the main journal in the field (Bioinformatics OUP). His research is focused on the study of biomedical systems with computational biology and bioinformatics approaches. == Education == Valencia studied biology at the Complutense University of Madrid, training in population genetics and biophysics. In 1987 he was a visiting scientist at the American Red Cross Laboratory. He received his PhD in molecular biology in 1988 from the Autonomous University of Madrid. From 1989 to 1994 he was a Postdoctoral Fellow in the laboratory of Chris Sander at the European Molecular Biology Laboratory (EMBL) in Heidelberg, studying the evolution of protein function using sequence- and structure-based approaches. The 1994 paper "Correlated mutations and residue contacts in proteins", of which Valencia was senior author, established the idea that correlated mutations at corresponding locations in the DNA sequences in different organisms could indicate that those locations corresponded to amino-acid residues that were physically close to
|
{"page_id": 41603161, "title": "Alfonso Valencia"}
|
phenomena in which an object exists in more than one state simultaneously. Superlattice Nanowire Interwoven bundles of nanowires using substances with different compositions and properties. == T == Technocyte A nanoscale artificial device (especially a nanite) in the human bloodstream used for repairs, cancer protection, as an artificial immune system or for other uses. Top Down Molding Carving and fabricating small materials and components by using larger objects such as our hands, tools and lasers. Transistor The basic element in an integrated circuit. == U == Universal Assembler Uses raw atoms and molecules to construct consumer goods, and is pollution free. Universal Constructor A machine capable of constructing anything that can be constructed. Utility fog Objects formed of "intelligent" polymorphic (able to change shape) substances, typically having an octet truss structure. == V == Vasculoid A single, complex, multisegmented nanotechnological medical robotic system capable of duplicating all essential thermal and biochemical transport functions of the blood, including circulation of respiratory gases, glucose, hormones, cytokines, waste products, and cellular components. Von Neumann Machine A machine which is able to build a working copy of itself using materials in its environment. Von Neumann Probe A von Neumann Machine able to move over interstellar or interplanetary distances and to utilize local materials to build new copies of itself. == W == Wet nanotechnology The study of biological systems that exist primarily in a water environment. == Z == Zeptosecond One-billion-trillionth of a second. Zettatechnology Referring to the typical number of distinct designed parts in a product made by the systems we envision (molecular, mature, or molecular-manufacturing-based nanotechnology). == See also == Outline of nanotechnology Glossary of physics Glossary of areas of mathematics Glossary of astronomy Glossary of biology Glossary of calculus Glossary of chemistry terms Glossary of engineering Glossary of probability and statistics
|
{"page_id": 63399479, "title": "Glossary of nanotechnology"}
|
to this definition")max(_iterable_, _*_, _default_, _key=None_)max(_arg1_, _arg2_, _*args_, _key=None_) Return the largest item in an iterable or the largest of two or more arguments. If one positional argument is provided, it should be an iterable`]( "list.sort"). The _default_ argument specifies an object to return if the provided iterable is empty. If the iterable is empty and _default_ is not provided, a `ValueError` is raised. If multiple items are maximal, the function returns the first one encountered. This is consistent with other sort-stability preserving tools such as `sorted(iterable, key=keyfunc, reverse=True)` and `heapq.nlargest(1, iterable, key=keyfunc)`. Changed in version 3.4: Added the _default_ keyword-only parameter. Changed in version 3.8: The _key_ can be `None`. _class_ memoryview(_object_) Return a “memory view” object created from the given argument. See Memory Views¶min(_iterable_, _*_, _default_, _key=None_)min(_arg1_, _arg2_, _*args_, _key=None_) Return the smallest item in an iterable or the smallest of two or more arguments. If one positional argument is provided, it should be an iterable`]( "list.sort"). The _default_ argument specifies an object to return if the provided iterable is empty. If the iterable is empty and _default_ is not provided, a `ValueError` is raised. If multiple items are minimal, the function returns the first one encountered. This is consistent
|
{"source": 31, "title": "from dpo"}
|
processors: the ARM Cortex-A8 core, which is used as the basis for the Apple A9 processor in the iPad, as well as the processor in the Motorola Droid and the iPhones 3GS and 4, and the Intel Core i7, a high-end, dynamically scheduled, speculative processor, intended for high-end desktops and server applications. We begin with the sim-pler processor. # The ARM Cortex-A8 The A8 is a dual-issue, statically scheduled superscalar with dynamic issue detection, which allows the processor to issue one or two instructions per clock. Figure 3.36 shows the basic pipeline structure of the 13-stage pipeline. The A8 uses a dynamic branch predictor with a 512-entry two-way set asso-ciative branch target buffer and a 4K-entry global history buffer, which is indexed by the branch history and the current PC. In the event that the branch tar-get buffer misses, a prediction is obtained from the global history buffer, which can then be used to compute the branch address. In addition, an eight-entry return stack is kept to track return addresses. An incorrect prediction results in a 13-cycle penalty as the pipeline is flushed. Figure 3.37 shows the instruction decode pipeline. Up to two instructions per clock can be issued using an in-order issue mechanism. A simple scoreboard structure is used to track when an instruction can issue. A pair of dependent instructions can be processed through the issue logic, but, of course, they will be serialized at the scoreboard, unless they can be issued so that the forwarding paths can resolve the dependence. Figure 3.38 shows the execution pipeline for the A8 processor. Either instruc-tion 1 or instruction 2 can go to the load/store pipeline. Fully bypassing is sup-ported among the pipelines. The ARM Cortex-A8 pipeline uses a simple two-issue statically scheduled superscalar to allow reasonably high clock rate with
|
{"source": 2299, "title": "from dpo"}
|
vulnerabilities are not limited to fingerprint experts and apply equally to other domains. However, the impor - tance of fingerprint evidence being reliable and unbiasable requires that these potential weaknesses be addressed. To achieve this, systematic research must be conducted to examine the cognitive and psychological elements involved in fingerprint identification. # 15.5 References Ahissar, M.; Hochstein, S. Task Difficulty and the Specificity of Perceptual Learning. Nature 1997 , 387 , 401–406. Anderson, J. R.; Schooler, L. J. Reflections of the Environ - ment in Memory. Psychol. Sci. 1991, 2, 396–408. Ashworth, A. R. S.; Dror, I. E. Object Identification as a Function of Discriminability and Learning Presentations: The Effect of Stimulus Similarity and Canonical Frame Alignment on Aircraft Identification. J . Exp. Psychol.: Applied 2000, 6 (2), 148–157 . Baker, C.; Behrmann, M.; Olson, C.R. Impact of Learning on Representation of Parts and Wholes in Monkey Infero- temporal Cortex. Nature Neurosci. 2002, 5, 1210–1216. Balcetis, E.; Dunning, D. See What You Want to See: Moti - vational Influences on Visual Perception. J. Pers. and Soc. Psychol. 2006, 91, 612–625. 15–20 C H A P T E R 1 5 Special Abilities and Vulnerabilities in Forensic Expertise Barlow, H. Conditions for Versatile Learning, Helmholtz’s Unconscious Inference, and Task of Perception. Vision Res. 1990, 30, 1561–1571. Baumeister, R. F .; Newman, L. S. Self-Regulation of Cogni - tive Inference and Decision Processes. Pers. Soc. Psychol. Bull. 1994, 20, 3–19. Blaha, L. M.; Townsend, J. T. Parts to Wholes: Configural Learning Fundamentally Changes the Visual Information Processing System [Abstract]. J. Vision 2006, 6 (6), 675a. Burns, B.; Shepp, B. E. Dimensional Interactions and the Structure of Psychological Space: The Representation of Hue, Saturation and Brightness. Percept. Psychophys. 1988, 43, 494–507 . Busey, T. Physical and Psychological Representations of Faces: Evidence From Morphing.
|
{"source": 4211, "title": "from dpo"}
|
over a number field _L_ with center _K_ and natural, maximal order \(\varLambda \) with \(\vert \gamma \vert =1\). Let \(\alpha = \alpha (n) \in (0,1)\) and \(q = q(n) \ge 2\), completely split in _K_, and the ideals above _q_ in _K_ totally ramify in _L_, be parameters such that \(\alpha \cdot q \ge \omega (\sqrt{\log N})\). Then, there is a polynomial-time quantum reduction from \({\mathcal {A}}\)-\(\hbox {DGS}_{{\mathcal {I}},\xi }\) to search \(\hbox {CLWE}_{q, \varSigma _\alpha }\) for any \(\xi = r \cdot \sqrt{d}\omega (\sqrt{\log {(d \cdot n)}})/ \alpha q\), where _d_ is constant, \(r > \sqrt{2} q \cdot \eta _\varepsilon ({\mathcal {I}})\) and \({\mathcal {I}}\) and \(q\varLambda \) are coprime. Note the DGS to search CLWE reduction requires a restriction on the ideal lattice problems that it holds for, but the search to decision part does not depend on any chosen ideal: ### Theorem 9 Let \(\varLambda \) be the natural order of a cyclic division algebra \({\mathcal {A}} = (L/K, \theta , \gamma )\), _d_ is constant, \(q \in \) poly(_n_) such that the ideals above _q_ in \({\mathcal {O}}_K\) are maximally ramified in \({\mathcal {O}}_L\), and assume that \(\alpha \cdot q \ge \eta _\varepsilon (\varLambda ^\vee )\) for a negligible \(\varepsilon = \varepsilon (n)\). Then, there is a probabilistic reduction from \(\hbox {CLWE}_{q, \varSigma _\alpha }\) to D-\(\hbox {CLWE}_{q ,\varUpsilon _\alpha }\) which runs in time polynomial in _n_. #### 4.3.1 Explicit Primes for the Reduction Which primes is the reduction valid for? We need \(q\in {\mathbb {Z}}\) such that _q_ splits completely in _K_, say as \(q{\mathcal {O}}_K = {\mathfrak {q}}_1...{\mathfrak {q}}_g\), and that these primes are maximally ramified in _L_, i.e., \({\mathfrak {q}}_i{\mathcal {O}}_L = {\mathfrak {Q}}_i^{[L:K]}\). To find such primes, we need to review how the algebras used are constructed. We set \(K
|
{"source": 6090, "title": "from dpo"}
|
j. Then the likelihood of this set of outcomes within the Bradley–Terry model is ∏ i j [ Pr ( i > j ) ] w i j {\displaystyle \prod _{ij}[\Pr(i>j)]^{w_{ij}}} and the log-likelihood of the parameter vector p = [p1, ..., pn] is l ( p ) = ln ∏ i j [ Pr ( i > j ) ] w i j = ∑ i = 1 n ∑ j = 1 n ln [ ( p i p i + p j ) w i j ] = ∑ i j w i j ln ( p i p i + p j ) = ∑ i j [ w i j ln ( p i ) − w i j ln ( p i + p j ) ] . {\displaystyle {\begin{aligned}{\mathcal {l}}(\mathbf {p} )&=\ln \prod _{ij}{{\bigl [}\Pr(i>j){\bigr ]}}^{w_{ij}}=\sum _{i=1}^{n}\sum _{j=1}^{n}\ln {\biggl [}\left({\frac {p_{i}}{p_{i}+p_{j}}}\right)^{w_{ij}}{\biggr ]}\\[6pt]&=\sum _{ij}w_{ij}\ln {\biggl (}{\frac {p_{i}}{p_{i}+p_{j}}}{\biggr )}=\sum _{ij}{\bigl [}w_{ij}\ln(p_{i})-w_{ij}\ln(p_{i}+p_{j}){\bigr ]}.\end{aligned}}} Zermelo showed that this expression has only a single maximum, which can be found by differentiating with respect to p i {\displaystyle p_{i}} and setting the result to zero, which leads to This equation has no known closed-form solution, but Zermelo suggested solving it by simple iteration. Starting from any convenient set of (positive) initial values for the p i {\displaystyle p_{i}} , one iteratively performs the update for all i in turn. The resulting parameters are arbitrary up to an overall multiplicative constant, so after computing all of the new values they should be normalized by dividing by their geometric mean thus: This estimation procedure improves the log-likelihood on every iteration, and is guaranteed to eventually reach the unique maximum. It is, however, slow to converge. More recently it has been pointed out that equation (2) can
|
{"page_id": 44439173, "title": "Bradley–Terry model"}
|
climate change, an interventionist program might be designed to return Earth to pre-industrial climate parameters. In order to achieve this, multiple approaches have been proposed, such as the management of solar radiation, the sequestration of carbon dioxide, and the design and release of climate altering genetically engineered organisms. These are typically referred to as geoengineering or climate engineering, rather than terraforming. === Other bodies in the Solar System === Other possible candidates for terraforming (possibly only partial or paraterraforming) include large moons of Jupiter or Saturn (Europa, Ganymede, Callisto, Enceladus, Titan), and the dwarf planet Ceres. The moons are covered in ice, so heating them would make some of this ice sublimate into an atmosphere of water vapour, ammonia and other gases. For Jupiter's moons, the intense radiation around Jupiter would cause radiolysis of water vapour, splitting it into hydrogen and oxygen. The former would be rapidly lost to space, leaving behind the oxygen (this already occurs on the moons to a minor extent, giving them thin atmospheres of oxygen). For Saturn's moons, the water vapour could be split by using orbital mirrors to focus sunlight, causing photolysis. The ammonia could be converted to nitrogen by introducing bacteria such as Nitrosomonas, Pseudomonas and Clostridium, resulting in an Earth-like nitrogen-oxygen atmosphere. This atmosphere would protect the surface from Jupiter's radiation, but it would also be possible to clear said radiation using orbiting tethers or radio waves. Challenges to terraforming the moons include their high amounts of ice and their low gravity. If all of the ice were fully melted, it would result in deep moon-spanning oceans, meaning any settlements would have to be floating (unless some of the ice was allowed to remain, to serve as land). Low gravity would cause atmospheric escape over time and may cause problems for human
|
{"page_id": 29824, "title": "Terraforming"}
|
the calculation of risk in business and, in mathematics, evaluation of multidimensional definite integrals with complicated boundary conditions. In application to systems engineering problems (space, oil exploration, aircraft design, etc.), Monte Carlo–based predictions of failure, cost overruns and schedule overruns are routinely better than human intuition or alternative "soft" methods. In principle, Monte Carlo methods can be used to solve any problem having a probabilistic interpretation. By the law of large numbers, integrals described by the expected value of some random variable can be approximated by taking the empirical mean (a.k.a. the 'sample mean') of independent samples of the variable. When the probability distribution of the variable is parameterized, mathematicians often use a Markov chain Monte Carlo (MCMC) sampler. The central idea is to design a judicious Markov chain model with a prescribed stationary probability distribution. That is, in the limit, the samples being generated by the MCMC method will be samples from the desired (target) distribution. By the ergodic theorem, the stationary distribution is approximated by the empirical measures of the random states of the MCMC sampler. In other problems, the objective is generating draws from a sequence of probability distributions satisfying a nonlinear evolution equation. These flows of probability distributions can always be interpreted as the distributions of the random states of a Markov process whose transition probabilities depend on the distributions of the current random states (see McKean–Vlasov processes, nonlinear filtering equation). In other instances, a flow of probability distributions with an increasing level of sampling complexity arise (path spaces models with an increasing time horizon, Boltzmann–Gibbs measures associated with decreasing temperature parameters, and many others). These models can also be seen as the evolution of the law of the random states of a nonlinear Markov chain. A natural way to simulate these sophisticated nonlinear Markov processes
|
{"page_id": 56098, "title": "Monte Carlo method"}
|
"L5-1668", a faint, cool M-type star, significantly redder and cooler than Sol and 12.3 light-years from it. Down is made habitable in part because of its large moon, Sheila. Grogs, though friendly, are feared by humanity, due to their telepathic ability to control the minds of animals (and possibly sentient species as well). Because of this fear, humans have placed a Bussard ramjet field generator in close orbit around Down's sun, thus enabling them to destroy the Grog population should they ever take hostile action against any sentient species. Jinx, orbiting Sirius A, is a massive moon of a gas giant (called Primary), stretched by tidal forces into an egg shape and tidally locked. It has habitable areas but has high surface gravity of 1.78 times Earth, near the limits of human extended tolerance. The points nearest to and farthest from Primary (called the "East" and "West" ends) lie elevated out of the atmosphere in vacuum. The atmosphere of the belt-region halfway between them is too dense and too hot to breathe, and is inhabited only by the Bandersnatchi. The zones between the vacuum areas and the high-density belt area have atmosphere breathable by humans. Jinx's "East" and "West" ends become a major in vacuo manufacturing area. Jinxian humans are short and squat, the strongest bipeds in Known Space. They tend to die early, from heart and circulatory problems. There is a tourist industry which provides substantial useful interplanetary trade credits for the Bandersnatchi, who allow themselves to be hunted by humans under strict protocols. Wunderland is a planet circling Alpha Centauri, and was the earliest extra-solar colony in Known Space's human history. It has a surface gravity of 60% that of Earth's and is hospitable to human life. Wunderland was invaded and its population enslaved by the Kzinti during
|
{"page_id": 18224, "title": "Known Space"}
|
voltages (millions of volts) long distances. To further study the conductive nature of low pressure air he set up a test facility at high altitude in Colorado Springs during 1899. Experiments he conducted there with a large coil operating in the megavolts range, as well as observations he made of the electronic noise of lightning strikes, led him to conclude incorrectly that he could use the entire globe of the Earth to conduct electrical energy. The theory included driving alternating current pulses into the Earth at its resonant frequency from a grounded Tesla coil working against an elevated capacitance to make the potential of the Earth oscillate. Tesla thought this would allow alternating current to be received with a similar capacitive antenna tuned to resonance with it at any point on Earth with very little power loss. His observations also led him to believe a high voltage used in a coil at an elevation of a few hundred feet would "break the air stratum down", eliminating the need for miles of cable hanging on balloons to create his atmospheric return circuit. Tesla would go on the next year to propose a "World Wireless System" that was to broadcast both information and power worldwide. In 1901, at Shoreham, New York he attempted to construct a large high-voltage wireless power station, now called Wardenclyffe Tower, but by 1904 investment dried up and the facility was never completed. === Post-war developments === Before World War II, little progress was made in wireless power transmission. Radio was developed for communication uses, but could not be used for power transmission since the relatively low-frequency radio waves spread out in all directions and little energy reached the receiver. In radio communication, at the receiver, an amplifier intensifies a weak signal using energy from another source. For
|
{"page_id": 570662, "title": "Wireless power transfer"}
|
Cutoff grade is the minimum grade required in order for a mineral or metal to be economically mined (or processed). Material found to be above this grade is considered to be ore, while material below this grade is considered to be waste. The cutoff grade can be determined through a variety of methods, each of varying complexity. Cutoff grades are selected to achieve a certain objective, such as resource utilization or economic benefit. Dividing these objectives even further gives way to specific goals such as the maximization of total profits, immediate profits, and present value. It is important to recognize that the cutoff grade is not simply calculated to a definitive answer. It is in fact a strategic variable that has major implications on mine design. The cutoff grade is adapted as the economic environment changes with regard to metal prices and mining costs, and is therefore constantly changing. Metal value is not the only factor affecting the profitability of an ore block. The presence of unwanted material in an ore block may increase the processing cost. This is also considered when classifying waste rock and ore. == References ==
|
{"page_id": 28849472, "title": "Cutoff grade"}
|
in July 2012 at the Campbelltown Arts Centre. magnitude III in February 2014 at Western Sydney University. Photographers of the Month in June and July 2018 at Camden Library, Narellan == Observatory == In 2011, the Society set up a sub-committee to seek a suitable site – remote from city lighting, yet within easy reach of Campbelltown/Camden – at which to locate its first astronomical observatory. In 2012, a suitable site was identified in the Dharawal National Park and the Society pursued opportunities to secure use of the site. The location was originally the site of the North Cliff coal mine, operated by BHP. Whilst anticipating some opposition to placing an observatory in a national park, the society was inspired by the Australian Astronomical Observatory in the Warrumbungles National Park and the concept received much local support. If successful, the observatory would have been used for astronomical research, public outreach, astro-imaging and members private observing. Whilst the proposal was welcomed in the community and supported by the mine lease-holder, it did not gain the necessary government support. == Volunteer computing == The Society organises a volunteer computing team for the purpose of carrying out scientific research using the Berkeley Open Infrastructure for Network Computing (BOINC) Project Management middleware platform, which allows users to contribute to a range of scientific computing projects at the same time. Volunteer computing is often also referred to as Citizen science, Distributed computing or Grid computing. The team is currently working as volunteers on projects for theSkyNet, SETI@home, Einstein@home, asteroids@home, LHC@home and other BOINC projects. == See also == List of telescopes of Australia List of astronomical societies Macarthur Astronomy Forum == References == == External links == Official Website Official Facebook page Official Twitter page
|
{"page_id": 34196945, "title": "Macarthur Astronomical Society"}
|
be estimated by numerous kinds of equipment. To calculate hydraulic conductivity, Darcy's law is used. The manipulation of the law depends on the soil saturation and instrument used. === Infiltration === Infiltration is the process by which water on the ground surface enters the soil. The water enters the soil through the pores by the forces of gravity and capillary action. The largest cracks and pores offer a great reservoir for the initial flush of water. This allows a rapid infiltration. The smaller pores take longer to fill and rely on capillary forces as well as gravity. The smaller pores have a slower infiltration as the soil becomes more saturated. == Pore types == A pore is not simply a void in the solid structure of soil. The various pore size categories have different characteristics and contribute different attributes to soils depending on the number and frequency of each type. A widely used classification of pore size is that of Brewer (1964): === Macropore === The pores that are too large to have any significant capillary force. Unless impeded, water will drain from these pores, and they are generally air-filled at field capacity. Macropores can be caused by cracking, division of peds and aggregates, as well as plant roots, and zoological exploration. Size >75 μm. === Mesopore === The largest pores filled with water at field capacity. Also known as storage pores because of the ability to store water useful to plants. They do not have capillary forces too great so that the water does not become limiting to the plants. The properties of mesopores are highly studied by soil scientists because of their impact on agriculture and irrigation. Size 30–75 μm. === Micropore === These are "pores that are sufficiently small that water within these pores is considered immobile,
|
{"page_id": 10121045, "title": "Pore space in soil"}
|
Gurzadyan, Grigor A. (2020). "The Roche Limit". Theory of Interplanetary Flights. Boca Raton, FL: CRC Press. pp. 263f. ISBN 9781000116717. Retrieved 22 July 2023. Ida, S.; Kokubo, E. & Takeda, T. (2012). "N-Body Simulations of Moon Accretion". In Marov, Mikhail Ya. & Rickman, Hans (ed.). Collisional Processes in the Solar System. Astrophysics and Space Science Library. Vol. 261. Berlin, Germany: Springer Science & Business Media. pp. 206, 209f. ISBN 9789401007122. Retrieved 22 July 2023.{{cite book}}: CS1 maint: multiple names: authors list (link) Ip, W.-H. & Fernandez, J.A. (2012). "Accretional Origin of the Giant Planers and its Consequences". In Marov, Mikhail Ya. & Rickman, Hans (ed.). Collisional Processes in the Solar System. Astrophysics and Space Science Library. Vol. 261. Berlin, Germany: Springer Science & Business Media. pp. 173f. ISBN 9789401007122. Retrieved 22 July 2023.{{cite book}}: CS1 maint: multiple names: authors list (link) Asher, D.J.; Bailey, M.E. & Steel (2012). "The Role of Non-Gravitational Forces in Decoupling Orbits from Jupiter". In Marov, Mikhail Ya. & Rickman, Hans (ed.). Collisional Processes in the Solar System. Astrophysics and Space Science Library. Vol. 261. Berlin, Germany: Springer Science & Business Media. p. 122. ISBN 9789401007122. Retrieved 22 July 2023.{{cite book}}: CS1 maint: multiple names: authors list (link) == External links == Can an Astronaut Orbit the Space Shuttle? The moon that went up a hill, but came down a planet Archived 2008-09-30 at the Wayback Machine == Definition == The Hill radius or sphere (the latter defined by the former radius) has been described as "the region around a planetary body where its own gravity (compared to that of the Sun or other nearby bodies) is the dominant force in attracting satellites," both natural and artificial. As described by de Pater and Lissauer, all bodies within a system such as the Sun's Solar System "feel
|
{"page_id": 722235, "title": "Hill sphere"}
|
The Certified Forensic Computer Examiner (CFCE) credential was the first certification demonstrating competency in computer forensics in relation to Windows based computers. The CFCE training and certification is conducted by the International Association of Computer Investigative Specialists (IACIS), a non-profit, all-volunteer organization of digital forensic professionals. == History == IACIS was formed and commenced training in 1990. The predecessor to the CFCE was the DOS Processing Certificate (DPC). The CFCE was introduced in 1998, when the training was expanded to include examination of Windows-based computers. The course materials also cover the MAC OS operating system and its associated file systems, however, the certificate only states proficiency in Windows. == Eligibility == In order to undertake the CFCE certification process, a candidate has to be a member of IACIS. IACIS membership is normally included in the fee to enter the CFCE training or certification process. There are two levels of membership in the organization, Regular and Associate. To be eligible for Regular membership, applicants must be a current full-time or former full-time law enforcement or government employee, or a current full-time contractor for a government agency. Regular members have access to training, certification, an active listserv and forensic research. Associate membership is available to current or aspiring members of the computer/digital forensics community that are able to pass a background check. Associate members have the same access to the benefits as Regular members with the exception that Regular members can vote and hold organizational offices. Proof of status will be verified upon application for membership. https://www.iacis.com/membership/membership-overview/ == Certification process == The certification process may be taken internally or externally and is conducted in two phases: Peer Review and Certification. An internal certification candidate attends a 2-week training course given by IACIS. Two courses are conducted annually. The US-based course is conducted
|
{"page_id": 15702854, "title": "Certified forensic computer examiner"}
|
left-hand-side (LHS) non-terminal A. We can represent this probability as P(A → β ) or as P(A → β |A) or as P(RHS |LHS ) Thus, if we consider all the possible expansions of a non-terminal, the sum of their probabilities must be 1: ∑ > β P(A → β ) = 1Figure 14.1 shows a PCFG: a probabilistic augmentation of the L1 miniature En-glish CFG grammar and lexicon. Note that the probabilities of all of the expansions of each non-terminal sum to 1. Also note that these probabilities were made up for pedagogical purposes. A real grammar has a great many more rules for each non-terminal; hence, the probabilities of any particular rule would tend to be much smaller. A PCFG is said to be consistent if the sum of the probabilities of all sentences consistent in the language equals 1. Certain kinds of recursive rules cause a grammar to be inconsistent by causing infinitely looping derivations for some sentences. For ex-ample, a rule S → S with probability 1 would lead to lost probability mass due to derivations that never terminate. See Booth and Thompson (1973) for more details on consistent and inconsistent grammars. How are PCFGs used? A PCFG can be used to estimate a number of useful probabilities concerning a sentence and its parse tree(s), including the probability of a particular parse tree (useful in disambiguation) and the probability of a sentence or a piece of a sentence (useful in language modeling). Let’s see how this works. ## 14.1.1 PCFGs for Disambiguation A PCFG assigns a probability to each parse tree T (i.e., each derivation ) of a sen-tence S. This attribute is useful in disambiguation . For example, consider the two parses of the sentence “Book the dinner flight” shown in Fig. 14.2. The sensible
|
{"source": 1010, "title": "from dpo"}
|
(cakeml.org) Scroogle down (scroogle.org) David Byrne Curates a Playlist of Great Protest Songs (davidbyrne.com) Uranium Chemistry (2008) (carlwillis.wordpress.com) Show HN: Project Ivory - a minimalist forum for intellectual discussions (pivory.com) Million Dollar Curve (cryptoexperts.github.io) Better Software Design with Clean Architecture (fullstackmark.com) IPhone 4S against all other iPhone models (low light shooting) (campl.us) “Super Engine” may fundamentally change the way internal combustion engines work (anl.gov) Minefold (YC W12) launches Feed The Beast servers (minefold.com) Webcam, Lights, and Audio for Remote Work, Podcasting, Videos, and Streaming (mattstauffer.com) How a Startup from Krakow Got Mentioned in “The Art of Computer Programming” (sinterit.com) How to disappear in America without a trace (skeptictank.org) We should have an email for each website (simplelogin.io) WiFi232 – An Internet Hayes Modem for Your Retro Computer (biosrhythm.com) Show HN: A virtual whiteboard for working or teaching remotely (whiteboardfox.com) Dotjs — hack the web (defunkt.io) Arend: Theorem Prover Based on Homotopy Type Theory by JetBrains (arend-lang.github.io) .NET on Linux – bye, Windows 10 (piotrgankiewicz.com) Ping Stick (sensitiveresearch.com) Why two spaces after a period isn’t wrong – lies typographers tell about history (heracliteanriver.com) G8 agenda calls for "civilized Internet": monitored, governed, controlled, taxed (g8internet.com) Open Source Needs FPGAs; FPGAs Need an On-Ramp (blinklight.io) Hellvetica.ttf – Kern in Hell (hellveticafont.com) Is it possible to opt out of social networking? (jonoscript.wordpress.com) Why We Do Pushups (markpeterdavis.com) CEO of ThinkPenguin, Inc arrested for filming police (trisquel.info) The Design and Implementation of Probabilistic Programming Languages (dippl.org) Show HN: Sports betting between friends (nospronos.com) Overthinking (aentan.com) Cakebrew: The Mac App for Homebrew (cakebrew.com) The C standard library function atexit is broken (mulle-kybernetik.com) Identifying Product Ideas (kabir.ml) Riley Walz: a 16 year old maker (enlight.nyc) Show HN: WrapAPI v2 – Build APIs, scrapers, bots on any website (wrapapi.com) Seth Roberts has died (sethroberts.net) Terracotta's Journey to the
|
{"source": 2757, "title": "from dpo"}
|
C++; Create 2 True Q++; Process 2 Process (M > 0) & (Q > 0) M−−; Q−−; Uni(10, 12) Processed 1 True M++; Process Initialize Initial Marking = {C = 1, M = 1, Q = 3}; Enabled Activities = {Create} 6.6.1.1 Declaring Queues and Variables in the Single Server Model The ACD model of the single server system has three queues (C, M and Q), but it has no variables. A queue is Creator Type, Resource Type, or Entity Type. Figure 6.40 shows the Queue spreadsheet window in which the three queues C, M, and Q are declared. The type of C is declared as Creator, those of M and Q as Resource and Entity, respectively. The initial values of C, M, and Q are declared as 1, 1, and 3, respectively. The declared queues are reflected in the ATT window as depicted in Fig. 6.41. 6.6.1.2 Defining Activity Transitions in the Single Server Model Figure 6.42 shows the graphical user interface (GUI) of the ATT window in which each entry of the activity transition table of the single server system (Table 6.13) is described “as it is” one by one: (1) the row numbers in the No column 174 Introduct Ion to Act IvIty-B Ased Model Ing And sIM ul AtIon are automatically assigned in sequence; (2) AND operator “&&” and OR operator “||” are used in the Condition columns; (3) each statement in the Action columns should be ended with a semicolon; (4) a time in the Time column is either a constant or a random variate specified, for example, as Exp() or Uni(). 6.6.1.3 Specifying the Enabled Activities in the Single Server Model As depicted in Fig. 6.43, the Create activity is specified as an enabled activity by Fig. 6.40. Declaring queues in the Queue spreadsheet
|
{"source": 4980, "title": "from dpo"}
|
this model imply secret key-agreement protocols (in a constructive sense). On the other hand, secret key-agreement protocols imply optimal in terms of error protocols for equality. 2022 CRYPTO Lower Bound on SNARGs in the Random Oracle Model have become a fundamental primitive in the cryptographic community. The focus of this work is constructions of SNARGs in the Random Oracle Model (ROM). Such SNARGs enjoy post-quantum security and can be deployed using lightweight cryptography to heuristically instantiate the random oracle. A ROM-SNARG is \emph{(t,ε)-sound} if no t-query malicious prover can convince the verifier to accept a false statement with probability larger than ε. Recently, Chiesa-Yogev (CRYPTO '21) presented a ROM-SNARG of length Θ(log(t/ε)⋅logt) (ignoring logn factors, for n being the instance size). This improvement, however, is still far from the (folklore) lower bound of Ω(log(t/ε)). Assuming the \textit{randomized exponential-time hypothesis}, we prove a tight lower bound of Ω(log(t/ε)⋅logt) for the length of {(t,ε)-sound} ROM-SNARGs. Our lower bound holds for constructions with non-adaptive verifiers and strong soundness notion called \textit{salted soundness}, restrictions that hold for \emph{all} known constructions (ignoring contrived counterexamples). We prove our lower bound by transforming any short ROM-SNARG (of the considered family) into a same length ROM-SNARG in which the verifier asks only a \emph{few} oracles queries, and then apply the recent lower bound of Chiesa-Yogev (TCC '20) for such SNARGs. 2022 CRYPTO Maliciously Secure Massively Parallel Computation for All-but-One Corruptions model gained wide adoption over the last decade. By now, it is widely accepted as the right model for capturing the commonly used programming paradigms (such as MapReduce, Hadoop, and Spark) that utilize parallel computation power to manipulate and analyze huge amounts of data. Motivated by the need to perform large-scale data analytics in a privacy-preserving manner,
|
{"source": 5793, "title": "from dpo"}
|
N-Acetylputrescine (NacPut), also known as monoacetylputrescine, is an endogenous metabolite of putrescine and a precursor and metabolic intermediate in the biosynthesis of γ-aminobutyric acid (GABA) from putrescine. The metabolic pathway is specifically putrescine into N-acetylputrescine by putrescine acetyltransferase (PAT), N-acetylputrescine into N-acetyl-γ-aminobutyraldehyde (N-acetyl-GABAL or N-acetyl-GABA aldehyde) by monoamine oxidase B (MAO-B), N-acetyl-GABAL into N-acetyl-γ-aminobutyric acid (N-acetyl-GABA) by aldehyde dehydrogenase (ALDH), and N-acetyl-GABA into GABA by an unknown deacetylase enzyme. This pathway is a minor alternative pathway to the major and primary pathway in which GABA is synthesized from glutamate. There is also another alternative pathway in which putrescine is converted into GABA with γ-aminobutyraldehyde (GABAL or GABA aldehyde) as an intermediate instead. It has been estimated that about 2 to 3% of GABA is synthesized from putrescine in the mouse brain, whereas in the case of the rat brain, the amount was negligible. In 2021, it was discovered that MAO-B does not mediate dopamine catabolism in the rodent striatum but instead participates in striatal GABA synthesis and that synthesized GABA in turn inhibits dopaminergic neurons in this brain area. It has been found that MAO-B, via the putrescine pathway, importantly mediates GABA synthesis in astrocytes in various brain areas, including in the hippocampus, cerebellum, striatum, cerebral cortex, and substantia nigra pars compacta (SNpc). These findings may warrant a rethinking of the actions of MAO-B inhibitors in the treatment of Parkinson's disease. == References ==
|
{"page_id": 78001798, "title": "N-Acetylputrescine"}
|
is subject to two equal and opposite forces: an electrical force z e E {\displaystyle zeE} and a frictional force F drag = f s = ( 6 π η a ) s {\displaystyle F_{\text{drag}}=fs=(6\pi \eta a)s} , where f {\displaystyle f} is the frictional coefficient, η {\displaystyle \eta } is the solution viscosity. For different ions with the same charge such as Li+, Na+ and K+ the electrical forces are equal, so that the drift speed and the mobility are inversely proportional to the radius a {\displaystyle a} . In fact, conductivity measurements show that ionic mobility increases from Li+ to Cs+, and therefore that Stokes radius decreases from Li+ to Cs+. This is the opposite of the order of ionic radii for crystals and shows that in solution the smaller ions (Li+) are more extensively hydrated than the larger (Cs+). == Mobility in gas phase == Mobility is defined for any species in the gas phase, encountered mostly in plasma physics and is defined as μ = q m ν m , {\displaystyle \mu ={\frac {q}{m\nu _{\text{m}}}},} where q {\displaystyle q} is the charge of the species, ν m {\displaystyle \nu _{\text{m}}} is the momentum-transfer collision frequency, m {\displaystyle m} is the mass. Mobility is related to the species' diffusion coefficient D {\displaystyle D} through an exact (thermodynamically required) equation known as the Einstein relation: μ = q k T D , {\displaystyle \mu ={\frac {q}{kT}}D,} where k {\displaystyle k} is the Boltzmann constant, T {\displaystyle T} is the gas temperature, D {\displaystyle D} is the diffusion coefficient. If one defines the mean free path in terms of momentum transfer, then one gets for the diffusion coefficient D = π 8 λ 2 ν m . {\displaystyle D={\frac {\pi }{8}}\lambda ^{2}\nu _{\text{m}}.} But both the momentum-transfer mean free
|
{"page_id": 1546092, "title": "Electrical mobility"}
|
a ρ ) = 2 σ a p p l i e d a ρ {\displaystyle \sigma _{\mathrm {elliptical\ crack} }=\sigma _{\mathrm {applied} }\left(1+2{\sqrt {\frac {a}{\rho }}}\right)=2\sigma _{\mathrm {applied} }{\sqrt {\frac {a}{\rho }}}} (For sharp cracks) where: σ a p p l i e d {\displaystyle \sigma _{\mathrm {applied} }} is the loading stress, a {\displaystyle a} is half the length of the crack, and ρ {\displaystyle \rho } is the radius of curvature at the crack tip. Putting these two equations together gets σ f r a c t u r e = E γ ρ 4 a r o . {\displaystyle \sigma _{\mathrm {fracture} }={\sqrt {\frac {E\gamma \rho }{4ar_{o}}}}.} Sharp cracks (small ρ {\displaystyle \rho } ) and large defects (large a {\displaystyle a} ) both lower the fracture strength of the material. Recently, scientists have discovered supersonic fracture, the phenomenon of crack propagation faster than the speed of sound in a material. This phenomenon was recently also verified by experiment of fracture in rubber-like materials. The basic sequence in a typical brittle fracture is: introduction of a flaw either before or after the material is put in service, slow and stable crack propagation under recurring loading, and sudden rapid failure when the crack reaches critical crack length based on the conditions defined by fracture mechanics. Brittle fracture may be avoided by controlling three primary factors: material fracture toughness (Kc), nominal stress level (σ), and introduced flaw size (a). Residual stresses, temperature, loading rate, and stress concentrations also contribute to brittle fracture by influencing the three primary factors. Under certain conditions, ductile materials can exhibit brittle behavior. Rapid loading, low temperature, and triaxial stress constraint conditions may cause ductile materials to fail without prior deformation. === Ductile === In ductile fracture, extensive plastic deformation (necking) takes place before
|
{"page_id": 261967, "title": "Fracture"}
|
Cylinder blown sheet is a type of hand-blown window glass. It is created with a similar process to broad sheet, but with the use of larger cylinders. In this manufacturing process glass is blown into a cylindrical shape by a glass blower. The ends of the cylinder are cut off and a cut is made down the side of the cylinder. The cut cylinder is then placed in an oven where the cylinder unrolls into a flat glass sheet. Blenko Glass Company used this method to make flat glass during the 20th century, but it used a process patented by William Blenko that used molds for the cylinder to enable consistency in the size of the glass. In Blenko's case, slight imperfections were desired for the purpose of giving the flat glass the appearance of antique glass. The standard (non-Blenko) cylinder method caused surface damages on the glass due to the flattening and moving, and the sheet therefore had to be ground and polished. In 1839 the Chance Brothers invented the patent plate process where the glass plate was placed on a wet piece of leather and ground and polished to remove all the surface damage. Other methods of producing hand-blown window glass included broad sheet, blown plate, crown glass and polished plate. These methods of manufacture lasted at least until the end of the 19th century. The early 20th century marks the move away from hand-blown to machine manufactured glass such as rolled plate, machine drawn cylinder sheet, the Fourcault process of flat drawn sheet, single and twin ground polished plate and most common, float glass. Cylinder blown sheet glass was manufactured in the UK in the mid 19th century. It had been manufactured in France and Germany (and imported to the UK) since the 18th century. == Notes
|
{"page_id": 2910667, "title": "Cylinder blown sheet glass"}
|
"ice maiden". By 1982, the company had $36 million in annual sales. Harp divorced her husband in 1982 and married Patrick J. McGovern the same year. She relinquished her role as president and CEO of Vector Graphic. The company rapidly declined, experiencing setbacks due to poor managerial decisions, mistimed advertising, and the entrance of IBM to the market. She returned to her leadership role in 1983, though she was unable to salvage the business and stepped down from the position in 1984. === Later business ventures === Harp McGovern went on to serve as president of the feminine hygiene business Aplex Corporation, which designed a handled, disposable paper funnel device enabling women to urinate while standing. She was president and CEO of Good Morning Teacher!, an educational publishing company. == Philanthropic activities == Harp McGovern and her husband Patrick co-founded the McGovern Institute for Brain Research at MIT in 2000. Their donation of approximately $350 million was among the largest gifts to a university at the time. == Awards and honors == Harp McGovern was named Entrepreneur of the Year in 1983 by Women Business Owners of New York. The Commonwealth Club of San Francisco awarded her the Distinguished Immigrant Award. She has also served as the Chair Emerita of the Board of Associates of the Whitehead Institute for Biomedical Research. == References == == External links == Lore Harp McGovern at the McGovern Institute Oral History of Lore Harp McGovern, Computer History Museum Computer Entrepreneurs: Adam Osborne & Lore Harp Interview (1984), The Computer Chronicles Biography on McGovern Institute Web Site Small Biography of Lore's co-founding of Vector Graphics MIT announcement of the McGovern Institute
|
{"page_id": 35184111, "title": "Lore Harp McGovern"}
|
MacBook is a type of Mac laptop computer that is developed and marketed by Apple that use Apple's macOS operating system since 2006. The MacBook brand replaced the PowerBook and iBook brands during the Mac transition to Intel processors, announced in 2005. The current lineup consists of the MacBook Air (2008–present) and the MacBook Pro (2006–present). Two different lines simply named "MacBook" existed from 2006 to 2012 and 2015 to 2019. The MacBook brand was the "world's top-selling line of premium laptops" as of 2015. == Overview == The MacBook family was initially housed in designs similar to the iBook and PowerBook lines which preceded them, which changed to a unibody aluminum construction similar to the one first introduced with the MacBook Air. The unibody construction also has a black plastic keyboard that was first used on the MacBook Air, which itself was inspired by the sunken keyboard of the original polycarbonate MacBooks. The now standardized keyboard brings congruity to the MacBook line, with black keys on a metallic aluminum body. The lids of the MacBook family are held closed by a magnet with no mechanical latch, a design element first introduced with the polycarbonate MacBook. The memory, drives, and batteries were accessible in the old MacBook lineup, though the newest compact lineup solders or glues all such components in place. All of the current MacBooks feature backlit keyboards. == Models named "MacBook" == === MacBook (2006–2012) === As part of the Mac transition to Intel processors, Apple released a 13-inch laptop simply named "MacBook", as a successor to the PowerPC-based iBook series of laptops. During its existence, it was the most affordable Mac, serving as the entry-level laptop that was less expensive than the rest of the Mac laptop lineup (the MacBook Pro portable workstation, and later the MacBook
|
{"page_id": 15295713, "title": "MacBook"}
|
two dozen countries, including Algeria, Antarctica, Argentina, Aruba, Australia, Czechoslovakia, Denmark, Ecuador, the Falkland Islands, Finland, Hong Kong, Iceland, Italy, Japan, Mexico, Netherlands, New Zealand, Switzerland, the United Kingdom, and the Union of Soviet Socialist Republics (USSR). She also traveled across the United States, and lived in several states as part of her work for the USGS. Schmidt traveled extensively throughout Alaska too, and crossed the Arctic Circle numerous times both in Alaska and elsewhere. === United States Geological Survey (USGS) === Schmidt began working for the United States Geological Survey (USGS) in Washington, D.C., in early 1943, postponing the completion of her doctoral dissertation until 1948. She worked in various positions for the USGS until 1963. From 1946 through 1948, she conducted research on radiography, paleontology, and micro-paleontology for the Paleontology and Stratigraphy Branch of the USGS. Beginning in 1948, and continuing through 1950, Schmidt worked for the top secret Military Geology Unit of the USGS, preparing "engineering geology reports, (classified) for [the] Corps of Engineers on suitability of areas in European and Pacific Theaters for construction and alignment of roads, airfields, and location of construction materials." She was one of the few women geologists to be hired to do this work, which was classified and required a security clearance. In 1949, Schmidt received routine clearance under the new loyalty investigation program that had been instituted by President Harry Truman through Executive Order 9835. From 1950 to 1952, Schmidt worked for the Geological Division of the USGS, organizing the Lexicon Project (map names) in Washington, and the Paleotectonic Map Project in Denver, CO. From 1952 until her departure for Alaska in 1956, she worked for the Mineral Classification Board, cataloging minerals for all US federal lands. In 1956, Schmidt transferred to Alaska to establish a field office for the
|
{"page_id": 48629621, "title": "Ruth A. M. Schmidt"}
|
A self-making bed (also known as a smart bed) is designed to automatically rearrange the bedding on a bed and prepare itself for use. == History == In 2008, inventor Enrico Berruti featured his self-making bed, dubbed "Selfy", at The International Exhibition of Inventions in Geneva, Switzerland. The bed makes itself by stretching and smoothing the sheets over the mattress by using metal rails that connect to the bed sheets alongside the bed. In 2017, the company Smartduvet released a fabric to make the bed through a network of air chambers. This is a breathable layer that is made of lightweight material. When activated it inflates the sheet's air chamber, placing the duvet and sheets back in position. Using an app, the user can preset a different bed-making time for each day of the week. It does not replace the existing bed and is non-permanent so it can be used with existing duvet and duvet coverbedding. == See also == Bed-making Smart home == References ==
|
{"page_id": 52338899, "title": "Self-making bed"}
|
{\partial y}{\partial x}}={\frac {\partial y}{\partial w_{2}}}{\frac {\partial w_{2}}{\partial w_{1}}}{\frac {\partial w_{1}}{\partial x}}={\frac {\partial f(w_{2})}{\partial w_{2}}}{\frac {\partial g(w_{1})}{\partial w_{1}}}{\frac {\partial h(w_{0})}{\partial x}}} === Two types of automatic differentiation === Usually, two distinct modes of automatic differentiation are presented. forward accumulation (also called bottom-up, forward mode, or tangent mode) reverse accumulation (also called top-down, reverse mode, or adjoint mode) Forward accumulation specifies that one traverses the chain rule from inside to outside (that is, first compute ∂ w 1 / ∂ x {\displaystyle \partial w_{1}/\partial x} and then ∂ w 2 / ∂ w 1 {\displaystyle \partial w_{2}/\partial w_{1}} and lastly ∂ y / ∂ w 2 {\displaystyle \partial y/\partial w_{2}} ), while reverse accumulation traverses from outside to inside (first compute ∂ y / ∂ w 2 {\displaystyle \partial y/\partial w_{2}} and then ∂ w 2 / ∂ w 1 {\displaystyle \partial w_{2}/\partial w_{1}} and lastly ∂ w 1 / ∂ x {\displaystyle \partial w_{1}/\partial x} ). More succinctly, Forward accumulation computes the recursive relation: ∂ w i ∂ x = ∂ w i ∂ w i − 1 ∂ w i − 1 ∂ x {\displaystyle {\frac {\partial w_{i}}{\partial x}}={\frac {\partial w_{i}}{\partial w_{i-1}}}{\frac {\partial w_{i-1}}{\partial x}}} with w 3 = y {\displaystyle w_{3}=y} , and, Reverse accumulation computes the recursive relation: ∂ y ∂ w i = ∂ y ∂ w i + 1 ∂ w i + 1 ∂ w i {\displaystyle {\frac {\partial y}{\partial w_{i}}}={\frac {\partial y}{\partial w_{i+1}}}{\frac {\partial w_{i+1}}{\partial w_{i}}}} with w 0 = x {\displaystyle w_{0}=x} . The value of the partial derivative, called the seed, is propagated forward or backward and is initially ∂ x ∂ x = 1 {\displaystyle {\frac {\partial x}{\partial x}}=1} or ∂ y ∂ y = 1 {\displaystyle {\frac {\partial y}{\partial y}}=1} . Forward accumulation evaluates the function and calculates the
|
{"page_id": 734787, "title": "Automatic differentiation"}
|
HWiNFO (also known as HWiNFO64) is a proprietary system monitoring, system profiling and system diagnostics program for Windows and DOS-based systems. It is developed by Martin Malik and REALiX. It was used by NASA during several tests of different microprocessors, including an AMD Ryzen 3 1200 and Intel i5-6600K. The program can monitor display, monitor and log the following items:: CPU GPU (granted the appropriate operating system drivers are installed) RAM (including speed and memory timings) Storage (certain SMART information and OS counters) not limited to HDD, SSD, and NVMe The number of hardware errors VM use == Operating systems support == HWiNFO 7.72 is the last version to support Windows XP and Vista HWiNFO 6.26 is the last version to support MS-DOS == References ==
|
{"page_id": 76533523, "title": "Hwinfo"}
|
numbers. They were thought of as numbers that should be in the system that weren't in the system. And what they actually were were collections of numbers. They were sets of numbers instead of individual numbers. And the idea here is that, say, you were to take — like in the integers, if you took the number two, you could replace that idea, that idea of two-ness with just the collection of even integers. And so that's an ideal now. Instead of a number, it’s an ideal, and it's really carrying the same information. But now it's a subset. And so by moving from individual elements of the ring, of the collection of numbers, you move to subsets of them. Now you have more things, and so now you can recover unique factorization in that world. So those are ideals. EL: Yeah. And so the Gaussian integers do have unique factorization. KS: They do. Yeah. EL: So this — actually, I kind of forgot, but recently, this came up in something I was writing where I wanted the example to be the Gaussian integers so bad because it doesn't have any square roots in it. But then it didn't work because it isn't true for that. I was trying to show how unique factorization could fail, but I didn't want to have to use square roots. But as far as I know, you can't do that. So then I fixed it by putting a square root of negative five in there and hoping that people would be patient with me about it. But yeah. KK: So that's the example of one where you don't get unique factorization, right? So you take the integers and you join the square root of minus five. That's one example. KS: That’s one of them.
|
{"source": 1441, "title": "from dpo"}
|
Red: 660 nm; 4.54 × 10 14 Hz; 3.01 × 10 −19 J. Green: 520 nm; 5.77 × 10 14 Hz; 3.82 × 10 −19 J. Blue: 440 nm; 6.81 × 10 14 Hz; 4.51 × 10 −19 J. Somewhat different numbers are also possible. 15 . 5.49 × 10 14 s−1 ; no 17 . Quantized energy means that the electrons can possess only certain discrete energy values; values between those quantized values are not permitted. 19 . E = E2 − E5 = 2.179 × 10 −18 ⎛⎝⎜ 1 n22 − 1 n52 ⎞⎠⎟ J= 2.179 × 10 −18 ⎛⎝ 122 − 152 ⎞⎠ = 4.576 × 10 −19 J= 4.576 × 10 −19 J1.602 × 10 −19 J eV −1 = 2.856 eV 21 . −8.716 × 10 −18 J 23 . −3.405 × 10 −20 J 25 . 33.9 Å 27 . 1.471 × 10 −17 J 29 . Both involve a relatively heavy nucleus with electrons moving around it, although strictly speaking, the Bohr model works only for one-electron atoms or ions. According to classical mechanics, the Rutherford model predicts a miniature “solar system” with electrons moving about the nucleus in circular or elliptical orbits that are confined to planes. If the requirements of classical electromagnetic theory that electrons in such orbits would emit electromagnetic radiation are ignored, such atoms would be stable, having constant energy and angular momentum, but would not emit any visible light (contrary to observation). If classical electromagnetic theory is applied, then the Rutherford atom would emit electromagnetic radiation of continually increasing frequency (contrary to the observed discrete spectra), thereby losing energy until the atom collapsed in an absurdly short time (contrary to the observed long-term stability of atoms). The Bohr model retains the classical mechanics view of circular orbits confined
|
{"source": 3700, "title": "from dpo"}
|
in cryptocurrency applications with the Hierarchical Deterministic Wallet mechanism standardized in Bitcoin Improvement Proposal 32 (BIP32). Because of its linear nature, additive key derivation is also amenable to efficient implementation in the threshold setting. With presignatures, the secret and public nonces used in the ECDSA signing algorithm are precomputed. In the threshold setting, using presignatures along with other precomputed data allows for an extremely efficient "online phase" of the protocol. Recent works have advocated for both of these variations, sometimes combined together. However, somewhat surprisingly, we are aware of no prior security proof for additive key derivation, let alone for additive key derivation in combination with presignatures. In this paper, we provide a thorough analysis of these variations, both in isolation and in combination. Our analysis is in the generic group model (GGM). Importantly, we do not modify ECDSA or weaken the standard notion of security in any way. Of independent interest, we also present a version of the GGM that is specific to elliptic curves. This EC-GGM better models some of the idiosyncrasies (such as the conversion function and malleability) of ECDSA. In addition to this analysis, we report security weaknesses in these variations that apparently have not been previously reported. For example, we show that when both variations are combined, there is a cube-root attack on ECDSA, which is much faster than the best known, square-root attack on plain ECDSA. We also present two mitigations against these weaknesses: re-randomized presignatures and homogeneous key derivation. Each of these mitigations is very lightweight, and when used in combination, the security is essentially the same as that of plain ECDSA (in the EC-GGM). Media:[ can be different - however eventually these failure detectors are expected to converge their suspected processes sets. A Failure Detector is defined by a pair ( c, a ): • c: A Completeness property specifying that all failed processes should be eventually detected • a: An Accuracy property restricts the number of mistakes made by the Failure Detector .Chandra and Toueg in , define two completeness and four accuracy prop-erties. The Completeness properties are: • Strong Completeness : Every process that crashes is eventually per-manently suspected by every correct process. • Weak Completeness : Eventually every process that crashes is per-manently suspected by some correct process. The Accuracy Properties are: • Strong Accuracy : No process is suspected before it crashes. • Weak Accuracy : Some correct process is never suspected. • Eventual Strong Accuracy : There is a time after which correct processes are not suspected by any correct process. 27 Figure 2.6: Tabulating the failure detector properties into eight classes (taken from ) • Eventual Weak Accuracy : There is a time after which some correct process is never suspected. Note that properties such as Weak Completeness and Eventual Weak Accu-racy require that some property will hold permanently. In practice, this is never achievable because no process runs forever. Hence it is enough if such properties are satisfied for times which are ”long enough” for the algorithm to make progress. Figure 2.6, shows a taxonomy given in showing different failure detector classes according to the properties of accuracy and completeness. In , Chandra and Toueg further show that a failure detector in any class of this Taxonomy can be used to solve consensus. It is interesting to note that the weakest 1
|
{"source": 7318, "title": "from dpo"}
|
both copies are joined together by a common centromere; the pair of sister chromatids is called a dyad. The two sister chromatids are ultimately separated from each other into two different cells during mitosis or meiosis. site-directed mutagenesis small conditional RNA (scRNA) A class of small RNA molecules engineered so as to change conformation conditionally in response to cognate molecular inputs, often with the goal of controlling signal transduction pathways in vitro or in vivo. small interfering RNA (siRNA) small nuclear RNA (snRNA) small nucleolar RNA (snoRNA) A class of small RNA molecules whose primary function is to direct the chemical modification of other RNAs, mainly transfer RNAs (tRNA), small nuclear RNAs (snRNA), and especially ribosomal RNAs (rRNA) as a part of ribosome synthesis in the nucleolus. SnoRNAs contain antisense sequences that complement sequences within these target RNAs and guide ribonucleoprotein complexes to them, which can then catalyze specific nucleoside modifications, typically methylation or pseudouridylation. small temporal RNA (stRNA) A subclass of microRNAs, originally described in nematodes, which regulate the timing of developmental events by binding to complementary sequences in the 3' untranslated regions of messenger RNAs and inhibiting their translation. In contrast to siRNAs, which serve similar purposes, stRNAs bind to their target mRNAs after the initiation of translation and without affecting mRNA stability, which makes it possible for the target mRNAs to resume translation at a later time. small ubiquitin-like modifier (SUMO) Any of a family of small proteins, each approximately 100 amino acids, which are covalently conjugated to and removed from charged residues of other proteins in a form of post-translational modification known as SUMOylation, thereby functioning as a protein tag in a manner resembling ubiquitin. smooth endoplasmic reticulum (SER) snoRNA See small nucleolar RNA. snRNA See small nuclear RNA. solenoid fiber soluble RNA (sRNA) See transfer
|
{"page_id": 72243076, "title": "Glossary of cellular and molecular biology (M–Z)"}
|
of the functional data and the truncation to a finite number of included components. == See also == Principal component analysis == Notes == == References == James O. Ramsay; B. W. Silverman (8 June 2005). Functional Data Analysis. Springer. ISBN 978-0-387-40080-8.
|
{"page_id": 41204236, "title": "Functional principal component analysis"}
|
seconds per day. From the start, Huygens intended his clocks to be used for determination of longitude at sea. However, pendulum clocks did not tolerate the motion of a ship sufficiently well, and after a series of trials it was concluded that other approaches would be needed. The future of pendulum clocks would be on land. Together with telescopic instruments, they would revolutionise observational astronomy and cartography in the coming years. Huygens was also the first to use a balance spring as oscillator in a working clock, and this allowed accurate portable timepieces to be made. But it was not until the work of John Harrison that such clocks became accurate enough to be used as marine chronometers. == Methods of determining longitude == The development of the telescope and accurate clocks increased the range of methods that could be used to determine longitude. With one exception (magnetic declination) they all depend on a common principle, which was to determine an absolute time from an event or measurement and to compare the corresponding local time at two different locations. (Absolute here refers to a time that is the same for an observer anywhere on Earth.) Each hour of difference of local time corresponds to a 15 degrees change of longitude (360 degrees divided by 24 hours). Local noon is defined as the time at which the Sun is at the highest point in the sky. This is hard to determine directly, as the apparent motion of the Sun is nearly horizontal at noon. The usual approach was to take the mid-point between two times at which the Sun was at the same altitude. With an unobstructed horizon, the mid-point between sunrise and sunset could be used. At night, local time could be obtained from the apparent rotation of the stars
|
{"page_id": 13980071, "title": "History of longitude"}
|
content reaches about 60%, the magma ceases to behave like a fluid and begins to behave like a solid. Such a mixture of crystals with melted rock is sometimes described as crystal mush. Magma is typically also viscoelastic, meaning it flows like a liquid under low stresses, but once the applied stress exceeds a critical value, the melt cannot dissipate the stress fast enough through relaxation alone, resulting in transient fracture propagation. Once stresses are reduced below the critical threshold, the melt viscously relaxes once more and heals the fracture. === Temperature === Temperatures of molten lava, which is magma extruded onto the surface, are almost all in the range 700 to 1,400 °C (1,300 to 2,600 °F), but very rare carbonatite magmas may be as cool as 490 °C (910 °F), and komatiite magmas may have been as hot as 1,600 °C (2,900 °F). Magma has occasionally been encountered during drilling in geothermal fields, including drilling in Hawaii that penetrated a dacitic magma body at a depth of 2,488 m (8,163 ft). The temperature of this magma was estimated at 1,050 °C (1,920 °F). Temperatures of deeper magmas must be inferred from theoretical computations and the geothermal gradient. Most magmas contain some solid crystals suspended in the liquid phase. This indicates that the temperature of the magma lies between the solidus, which is defined as the temperature at which the magma completely solidifies, and the liquidus, defined as the temperature at which the magma is completely liquid. Calculations of solidus temperatures at likely depths suggests that magma generated beneath areas of rifting starts at a temperature of about 1,300 to 1,500 °C (2,400 to 2,700 °F). Magma generated from mantle plumes may be as hot as 1,600 °C (2,900 °F). The temperature of magma generated in subduction zones, where
|
{"page_id": 37508, "title": "Magma"}
|
Elixir sulfanilamide was an improperly prepared sulfonamide antibiotic that caused mass poisoning in the United States in 1937. It is believed to have killed 107 people. The public outcry caused by this incident and other similar disasters led to the passing of the 1938 Federal Food, Drug, and Cosmetic Act, which significantly increased the Food and Drug Administration's powers to regulate drugs. == History == Aside from the Pure Food and Drug Act of 1906 and the Harrison Act of 1914 banning the sale of some narcotic drugs, there was no federal regulatory control in the United States of America for drugs until Congress enacted the 1938 Food, Drug, and Cosmetic Act in response to the elixir sulfanilamide poisonings. In 1937, S. E. Massengill Company, a pharmaceutical manufacturer, created an oral preparation of sulfanilamide using diethylene glycol (DEG) as the solvent or excipient, and called the preparation "Elixir Sulfanilamide". DEG is poisonous to humans and other mammals, but Harold Watkins, the company's chief pharmacist and chemist, was not aware of this. (Although the first case of a fatality from the related ethylene glycol occurred in 1930 and studies had been published in medical journals stating DEG could cause kidney damage or failure, its toxicity was not widely known prior to the incident.) Watkins simply mixed raspberry flavoring into the powdered drug and then dissolved the mixture in DEG. Animal testing was not required by law, and Massengill performed none; there were no regulations at the time requiring premarket safety testing of drugs. The company started selling and distributing the medication in September 1937. By October 11, the American Medical Association received a report of several deaths caused by the medication. The Food and Drug Administration was notified, and an extensive search was conducted to recover the distributed medicine. Frances Oldham
|
{"page_id": 11077785, "title": "Elixir sulfanilamide"}
|
Palaeontologica Polonica, 56 (4): 665–678, doi:10.4202/app.2010.0067, retrieved 2017-08-15 Paracas Formation Clarke, Julia A.; Ksepka, Daniel T.; Stucchi, Marcelo; Urbina, Mario; Giannini, Norberto; Bertelli, Sara; Narváez, Yanina; Boyd, Clint A. (2007), "Paleogene equatorial penguins challenge the proposed relationship between penguin biogeography, body size evolution, and Cenozoic climate change", Proceedings of the National Academy of Sciences, 104 (28): 11545–11550, doi:10.1073/pnas.0611099104, PMC 1913862, PMID 17601778, retrieved 2017-08-15 Pisco Formation Altamirano Sierra, Alí J (2013), "Primer registro de pelicano (Aves: Pelecanidae) para el Mioceno tardio de la formacion Pisco, Peru" (PDF), Bulletin de l'Institut français d'études andines, 42: 1–12, retrieved 2017-09-04 Báez Gómez, Diego A (2006), "Estudio paleoambiental de la formación Pisco:: Localidad Ocucaje" (PDF), Revista del Instituto de Investigaciones FIGMMG, 9: 64–69, retrieved 2017-09-04 Bianucci, Giovanni; Di Celma, Claudio; Urbina, Mario; Lambert, Olivier (2016), "New beaked whales from the late Miocene of Peru and evidence for convergent evolution in stem and crown Ziphiidae (Cetacea, Odontoceti)" (PDF), PeerJ, 4: e2479, doi:10.7717/peerj.2479, PMC 5036081, PMID 27688973, retrieved 2019-02-12 Archived 2020-02-21 at the Wayback Machine Brand, Leonard; Urbina, Mario; Chadwick, Arthur; DeVries, Thomas J.; Esperante, Raul (2011), "A high resolution stratigraphic framework for the remarkable fossil cetacean assemblage of the Miocene/Pliocene Pisco Formation, Peru", Journal of South American Earth Sciences, 31 (4): 414–425, Bibcode:2011JSAES..31..414B, doi:10.1016/j.jsames.2011.02.015 Collareta, Alberto; Lambert, Olivier; De Muizon, Christian; Urbina, Mario; Bianucci, Giovanni (2017), "Koristocetus pescei gen. et sp. nov., a diminutive sperm whale (Cetacea: Odontoceti: Kogiidae) from the late Miocene of Peru", Fossil Record, 20 (2): 259–278, Bibcode:2017FossR..20..259C, doi:10.5194/fr-20-259-2017, retrieved 2019-02-12 Lambert, Olivier; Bianucci, Giovanni; Urbina, Mario; Geisler, Jonathan H. (2017), "A new inioid (Cetacea, Odontoceti, Delphinida) from the Miocene of Peru and the origin of modern dolphin and porpoise families", Zoological Journal of the Linnean Society, 179 (4): 919–946 Marx, Felix G.; Lambert, Olivier; De Muizon, Christian (2017), "A new Miocene
|
{"page_id": 21904332, "title": "South American land mammal age"}
|
Several shields can also be made do it yourself (DIY). == Software == A program for Arduino hardware may be written in any programming language with compilers that produce binary machine code for the target processor. Atmel provides a development environment for their 8-bit AVR and 32-bit ARM Cortex-M based microcontrollers: AVR Studio (older) and Atmel Studio (newer). === Legacy IDE === The Arduino integrated development environment (IDE) is a cross-platform application (for Microsoft Windows, macOS, and Linux) that is based on Processing IDE which is written in Java. It uses the Wiring API as programming style and HAL. It includes a code editor with features such as text cutting and pasting, searching and replacing text, automatic indenting, brace matching, and syntax highlighting, and provides simple one-click mechanisms to compile and upload programs to an Arduino board. It also contains a message area, a text console, a toolbar with buttons for common functions and a hierarchy of operation menus. The source code for the IDE is released under the GNU General Public License, version 2. The Arduino IDE supports the languages C and C++ using special rules of code structuring. The Arduino IDE supplies a software library from the Wiring project, which provides many common input and output procedures. User-written code only requires two basic functions, for starting the sketch and the main program loop, that are compiled and linked with a program stub main() into an executable cyclic executive program with the GNU toolchain, also included with the IDE distribution. The Arduino IDE employs the program avrdude to convert the executable code into a text file in hexadecimal encoding that is loaded into the Arduino board by a loader program in the board's firmware. Traditionally, Arduino IDE was used to program Arduino's official boards based on Atmel AVR Microcontrollers,
|
{"page_id": 5389424, "title": "Arduino"}
|
of sets is endowed with a topology, or inherits an appropriate topology from an underlying topological space, then the convergence of sets can be studied. Much of set-valued analysis arose through the study of mathematical economics and optimal control, partly as a generalization of convex analysis; the term "variational analysis" is used by authors such as R. Tyrrell Rockafellar and Roger J-B Wets, Jonathan Borwein and Adrian Lewis, and Boris Mordukhovich. In optimization theory, the convergence of approximating subdifferentials to a subdifferential is important in understanding necessary or sufficient conditions for any minimizing point. There exist set-valued extensions of the following concepts from point-valued analysis: continuity, differentiation, integration, implicit function theorem, contraction mappings, measure theory, fixed-point theorems, optimization, and topological degree theory. In particular, equations are generalized to inclusions, while differential equations are generalized to differential inclusions. One can distinguish multiple concepts generalizing continuity, such as the closed graph property and upper and lower hemicontinuity. There are also various generalizations of measure to multifunctions. == Applications == Set-valued functions arise in optimal control theory, especially differential inclusions and related subjects as game theory, where the Kakutani fixed-point theorem for set-valued functions has been applied to prove existence of Nash equilibria. This among many other properties loosely associated with approximability of upper hemicontinuous multifunctions via continuous functions explains why upper hemicontinuity is more preferred than lower hemicontinuity. Nevertheless, lower semi-continuous multifunctions usually possess continuous selections as stated in the Michael selection theorem, which provides another characterisation of paracompact spaces. Other selection theorems, like Bressan-Colombo directional continuous selection, Kuratowski and Ryll-Nardzewski measurable selection theorem, Aumann measurable selection, and Fryszkowski selection for decomposable maps are important in optimal control and the theory of differential inclusions. == Notes == == References == == Further reading == K. Deimling, Multivalued Differential Equations, Walter de Gruyter,
|
{"page_id": 12506030, "title": "Set-valued function"}
|
Robert Thomas Sawyer (June 20, 1901 – January 19, 1986) was the inventor of the first successful gas turbine locomotive. He also assisted in development of the diesel locomotive while he worked for General Electric, which led him to be known as the "Father of the Diesel Locomotive". Sawyer was the founder of what is now the modern-day International Gas Turbine Institute (IGTI), and among industry professionals was known as "Mr. Gas Turbine". Sawyer authored books about gas turbines, locomotives, and atomic power, and was awarded three U.S. Patents. The ASME established the R. Tom Sawyer Award to honor him for advancing gas turbine technology in all of its aspects for over 40 years. The award in his name is the highest award given by the IGTI, and is awarded annually at their international Turbo Expo. == Education and early work == Sawyer was born on June 20, 1901, in Schenectady, New York, but lived most of his life in Ho-Ho-Kus, New Jersey (Ridgewood, Bergen County). He received a bachelor's degree in electrical engineering from Ohio State University in 1923 followed by a master's degree in mechanical engineering in 1930. His undergraduate thesis was entitled "Preliminary Design of 60,000 kw Steam Power Station". While an undergraduate, he was a member of Sigma Pi fraternity and Scabbard and Blade. After receiving his undergraduate degree, Sawyer began working for General Electric, where he designed and developed early diesel locomotives. In 1928, while working on his master's degree, Sawyer rebuilt a 1920s Jordan automobile and replaced the gear box with a generator and motor. He thus created an early hybrid electric vehicle which combined the Jordan automobile's internal combustion engine (ICE) with a DC generator that powered an electric motor to drive the axles. Sawyer drove the car for 60,000 miles in the
|
{"page_id": 54225107, "title": "R. Tom Sawyer"}
|
time out on their outstanding requests, reconnect to the restarted server, and retry. Sec-tion 6.2.2 reports observed startup times. # 5.1.2 Chunk Replication As discussed earlier, each chunkis replicated on multiple chunkservers on different racks. Users can specify different replication levels for different parts of the file namespace. The default is three. The master clones existing replicas as needed to keep each chunk fully replicated as chunkservers go offline or detect corrupted replicas through checksum ver-ification (see Section 5.2). Although replication has served us well, we are exploring other forms of cross-server redun-dancy such as parity or erasure codes for our increasing read-only storage requirements. We expect that it is challenging but manageable to implement these more complicated re-dundancy schemes in our very loosely coupled system be-cause our traffic is dominated by appends and reads rather than small random writes. # 5.1.3 Master Replication The master state is replicated for reliability. Its operation log and checkpoints are replicated on multiple machines. A mutation to the state is considered committed only after its log record has been flushed to disklocally and on all master replicas. For simplicity, one master process remains in charge of all mutations as well as background activities such as garbage collection that change the system internally. When it fails, it can restart almost instantly. If its machine or diskfails, monitoring infrastructure outside GFS starts a new master process elsewhere with the replicated operation log. Clients use only the canonical name of the master (e.g. gfs-test), which is a DNS alias that can be changed if the master is relocated to another machine. Moreover, “shadow” masters provide read-only access to the file system even when the primary master is down. They are shadows, not mirrors, in that they may lag the primary slightly, typically fractions of a second.
|
{"source": 47, "title": "from dpo"}
|
Protection can still be maintained by calling the OS to allocate those buf-fers at initialization and preventing unauthorized memory accesses in hardware. In general, some or all of the following are the steps needed to send a mes-sage at end node devices over a network: 1. The application executes a system call, which copies data to be sent into an operating system or network interface buffer, divides the message into pack-ets (if needed), and composes the header and trailer for packets. 2. The checksum is calculated and included in the header or trailer of packets. 3. The timer is started, and the network interface hardware sends the packets. Message reception is in the reverse order: 3. The network interface hardware receives the packets and puts them into its buffer or the operating system buffer. 2. The checksum is calculated for each packet. If the checksum matches the sender’s checksum, the receiver sends an acknowledgment back to the packet sender. If not, it deletes the packet, assuming that the sender will resend the packet when the associated timer expires. 1. Once all packets pass the test, the system reassembles the message, copies the data to the user’s address space, and signals the corresponding application. F.2 Interconnecting Two Devices ■ F-9 The sender must still react to packet acknowledgments: > ■ When the sender gets an acknowledgment, it releases the copy of the corre-sponding packet from the buffer. > ■ If the sender reaches the time-out instead of receiving an acknowledgment, it resends the packet and restarts the timer. Just as a protocol is implemented at network end nodes to support communi-cation, protocols are also used across the network structure at the physical, data link, and network layers responsible primarily for packet transport, flow control, error handling, and other functions described next.
|
{"source": 2299, "title": "from dpo"}
|
(5), a VR model (6) and finally, its name chosen by the students (7). Communication (K6) aligns with the didactical principle of dialogical learning which lead to the development of “Polly’s Journal”. In the learning journal the students write about their experiences. Thus, writing about mathematics in a reflecting way is practiced. 96 3.4.2 Secondary Education Although the project aims at younger students, it is also suitable for secondary education. Its curriculum is structured by the same central themes and mathematical competencies as primary education. Both encompass more involved subjects and skills respectively . Polyhedra serve well as visual aids and applications for the subject area of analytical geometry that is involved in the core idea [L3] Space and Form . Their faces are defined as planes spanned by the coordinates of the vertices. Two neighboring faces intersect in a straight line. These core concepts of analytical geometry can be derived from the 3D printer data which state the coordinates of the polyhedra and their incidences. For printing the polyhedra with a 3D printer each one has to be rotated so that one of the faces is parallel to the xy-plane. This operation can be executed by methods of analytical geometry, and holding the correctly printed polyhedron in their hands, the learners have a tangible proof for the accuracy of their calculation, see Figure 3.5. > (a) (b) (c) Figure 3.5: Photographies of a 3D printed polyhedron. 97 3.5 Applying Didactical Principles into the Project Design In Chapter 1.2 we described the shift that has occurred in science communication from knowledge over affection towards trust. This has lead to overcome the deficit model and the development of more dialogical formats of science communication that foster an eye-level encounter between science and the public. According to Baram-Tsabari and Osborne this
|
{"source": 4215, "title": "from dpo"}
|
with scripts for teaching skills in this way. Instead, they used the information from the research intervention sessions to develop their own explanations for each lesson. Treatment teachers were told that the purpose of the project was to study teacher explanation. They received six 2-hour training sessions in the course of one academic year. These sessions emphasized how to • Make decisions about recasting prescribed basal text skills as strategies. • Decide on explicit statements about the strategy being taught, when it would be used, and how to do the mental processing involved. • Organize these statements into a lesson format that progressed from an introduction, to modeling, to interaction between teacher and students, to closure. The training interventions also included one-on-one coaching, collaborative sharing between the teachers, specific feedback regarding observed lessons, and videotapes of model lessons. Treated-control teachers were told that the purpose of the study was to validate at the 3rd grade level the results of a previous (unrelated) study involving classroom management for 1st graders. They received three 2-hour training sessions on using the management principles employed in the 1st grade study. In the classroom, they followed their usual instructional routines regarding basal textbook skill instruction, while adding the management principles of the 1st grade study. Neither the treatment nor the control group was made aware of the other’s existence. Both groups of teachers received identical information about how to implement an uninterrupted sustained silent reading (USSR) program and how to prepare students to take a standardized reading test. Was instruction explicit or implicit? Explicit. Difficulty and nature of texts used: Basal reading textbooks for the 2nd grade. Was trainers’(teachers’) fidelity in delivering treatment checked? Yes, by observations and checklists. Properties of teachers/trainers: Number of teachers who administered treatments: Treatment group = 10 Control group =
|
{"source": 6100, "title": "from dpo"}
|
decreased wildlife populations on agricultural lands. This reminds us that ecological footprint calculations are anthropocentric, assuming that all Earth's biocapacity is legitimately available to human beings. If we assume that some biocapacity should be left for other species, the level of ecological overshoot increases. According to Wackernagel and the organisation he has founded, the Earth has been in "overshoot", where humanity is using more resources and generating waste at a pace that the ecosystem cannot renew, since the 1970s. According to the Global Footprint Network's calculations, currently people use Earth's resources at approximately 171% of capacity. This implies that humanity is well over Earth's human carrying capacity at current levels of affluence. According to the GFN:In 2023, Earth Overshoot Day fell on August 2nd. Earth Overshoot Day marks the date when humanity has exhausted nature's budget for the year. For the rest of the year, we are maintaining our ecological deficit by drawing down local resource stocks and accumulating carbon dioxide in the atmosphere. We are operating in overshoot. Currently, more than 85% of humanity lives in countries that run an ecological deficit. This means their citizens use more resources and generate more waste and pollution than can be sustained by the biocapacity found within their national boundaries. In some cases, countries are running an ecological deficit because their per capita ecological footprints are higher than the hectares of bioproductive land available on average globally (this was estimated at <1.7 hectares per person in 2019). Examples include France, Germany and Saudi Arabia. In other cases, per capita resource use may be lower than the global available average, but countries are running an ecological deficit because their populations are high enough that they still use more bioproductive land than they have within their national borders. Examples include China, India and the
|
{"page_id": 301500, "title": "Ecological footprint"}
|
X-Ray absorption. The closely-related (but distinct) term 'Work Function' may also be used in certain contexts. Typical values of first ionisation energies are typically around 1 eV — approximately in the infra-red or visible light bands. Binding energies of inner electrons may range into the hundreds-of-KeV range. However even at the top end of this range, the effects of mass-energy equivalence are minimal. As a basic, easily measured atomic quantity, any prospective atomic theory will be expected to reproduce the measured ionisation energies accurately. While general trends are explainable via a basic model of coulombic attraction and repulsion between a central nucleus and orbiting electron cloud, extending these models to derive predictions of specific binding energies fails to reproduce the observed data. Indeed this failure of several classical and semi-classical models of the atom (notably the Bohr model) to accurately predict observed ionisation energies is one of many evidences that led to the rejection of classical theories of the atom in favour of Modern Quantum Mechanics in the early 1920s. While rarely contextualised in terms of the binding energy explicitly, the difference in energy between atomic levels is nevertheless implicitly the difference in binding energy between the initial and final levels. In transitioning to the new state the electron must raise or lower its own energy by absorbing or emitting a single photon with the precise energy difference between the two states. As there are a limited number of available states and transitions available, this leaves few, highly specific photon energies the electron may emit or absorb, with each chemical species having a unique arrangement of energy levels and allowable transitions, . The emitted spectral lines thus contain information on the energy-level structure of the species examined, the study of which is the domain of spectroscopy. === Molecular Binding Energy
|
{"page_id": 79984146, "title": "User:SharkApologist/sandbox/Binding energy"}
|
A not evaluated (NE) species is one which has been categorized under the IUCN Red List of threatened species as not yet having been assessed by the International Union for Conservation of Nature. A species which is uncategorized and cannot be found in the IUCN repository is also considered not evaluated. == Description == This conservation category is one of nine IUCN threat assessment categories for species to indicate their risk of global extinction. The categories range from extinct (EX) at one end of the spectrum, to least concern (LC) at the other. The categories data deficient and not evaluated (NE) are not on the spectrum, because they indicate species that have not been reviewed enough to assign to a category. The category of not evaluated does not indicate that a species is not at risk of extinction, but simply that the species has not yet been studied for any risk to be quantified and published. The IUCN advises that species categorised as not evaluated "... should not be treated as if they were non-threatened. It may be appropriate ... to give them the same degree of attention as threatened taxa, at least until their status can be assessed.": 7 : 76 By 2015, the IUCN had assessed and allocated conservation statuses to over 76,000 species worldwide. From these it had categorised some 24,000 species as globally threatened at one conservation level or another. However, despite estimates varying widely as to the number of species existing on Earth (ranging from 3 million up to 30 million), this means the IUCN's 'not evaluated' (NE) category is by far the largest of all nine extinction risk categories. == Other applications == The global IUCN assessment and categorization process has subsequently been applied at country and sometimes at regional levels as the basis
|
{"page_id": 28302783, "title": "Not evaluated"}
|
Academy of Sciences. He was elected to the United States National Academy of Sciences in 1957, the American Academy of Arts and Sciences in 1961, and the American Philosophical Society in 1963. He was an Invited Speaker at the International Congress of Mathematicians (ICM) in Zürich in 1932 and a Plenary Speaker at the ICM in Cambridge, Massachusetts in 1950. In memory of Hopf, ETH Zürich awards the Heinz Hopf Prize for outstanding scientific work in the field of pure mathematics. == See also == Co-Hopfian group Cohomotopy group EHP spectral sequence Hopfian group Hopfian object Quantum group == Selected publications == Alexandroff P., Hopf H. Topologie Bd.1 — B: 1935 Hopf, Heinz (1964), Selecta Heinz Hopf, Herausgegeben zu seinem 70. Geburtstag von der Eidgenössischen Technischen Hochschule Zürich, Berlin, New York: Springer-Verlag, MR 0170777 Hopf, Heinz (2001), Collected papers/Gesammelte Abhandlungen, Berlin, New York: Springer-Verlag, ISBN 978-3-540-57138-4, MR 1851430 == References == == Further reading == Bagni, Giorgio T. "Heinz Hopf". History of ICMI web-site. Hilton, Peter J. (1972), "Heinz Hopf", Bulletin of the London Mathematical Society, 4 (2): 202–217, doi:10.1112/blms/4.2.202 == External links == O'Connor, John J.; Robertson, Edmund F., "Heinz Hopf", MacTutor History of Mathematics Archive, University of St Andrews "On the curvature integra of closed hypersurfaces," transl. by D. H. Delphenich "Vector fields in n-dimensional manifolds," transl. by D. H. Delphenich
|
{"page_id": 543082, "title": "Heinz Hopf"}
|
exact nature and causes of accident-proneness, assuming that it exists as a distinct entity, are unknown. Factors which have been considered as associated with accident-proneness have included absent-mindedness, clumsiness, carelessness, impulsivity, predisposition to risk-taking, and unconscious desires to create accidents as a way of achieving secondary gains. Broad studies on the speed and accuracy using a specially designed test sheet of finding a specific figure on various people, such as Japanese, Brazil-born Japanese, Chinese, Russian, Spanish, Filipino, Thai, and Central American with different educational backgrounds. The studies have revealed that educational background or study experience is the key factor of concentration capability. Screening new employees using this test gave drastic decreases in work accidents in several companies. === Hypophobia === In July 1992, Behavioral Ecology published experimental research conducted by biologist Lee A. Dugatkin where guppies were sorted into "bold", "ordinary", and "timid" groups based upon their reactions when confronted by a smallmouth bass (i.e. inspecting the predator, hiding, or swimming away) after which the guppies were left in a tank with the bass. After 60 hours, 40 percent of the timid guppies and 15 percent of the ordinary guppies survived while none of the bold guppies did. In The Handbook of the Emotions (1993), psychologist Arne Öhman studied pairing an unconditioned stimulus with evolutionarily-relevant fear-response neutral stimuli (snakes and spiders) versus evolutionarily-irrelevant fear-response neutral stimuli (mushrooms, flowers, physical representation of polyhedra, firearms, and electrical outlets) on human subjects and found that ophidiophobia and arachnophobia required only one pairing to develop a conditioned response while mycophobia, anthophobia, phobias of physical representations of polyhedra, firearms, and electrical outlets required multiple pairings and went extinct without continued conditioning while the conditioned ophidiophobia and arachnophobia were permanent. Similarly, psychologists Susan Mineka, Richard Keir, and Veda Price found that laboratory-raised rhesus macaques did not
|
{"page_id": 13416327, "title": "Accident-proneness"}
|
in six properties in the County making a claim. Average payouts per claim were $3,733 across all types of claims, with total claims amounting to $660 million over the five years examined. Urban flooding can also create far-reaching supply chain issues, which can create significant interruptions in the availability of goods and services, as well as financial losses for businesses. Between 1961 and 2020, nearly 10,000 cases were reported with 1.3 million deaths and a minimum of US$3.3 trillion of financial losses at an equivalent loss rate of almost US$1800 per second. On average, the total reported deaths worldwide were around 23,000/year for the past 6 decades at an equivalent rate of one death every 24 min. == Modeling == === Localized models === Flood modeling is often conducted in a very localized fashion, with hydrological models created for individual municipalities and incorporating details about buildings, infrastructure, vegetation, land use, and drainage systems. This localized modeling can be very useful, especially when paired with historical data, in predicting which specific locations (e.g. streets or intersections) will be the most impacted during a flood event and can be helpful in designing effective mitigation systems specific to local needs. Flood flows in urban environments have been investigated relatively recently despite many centuries of flood events. Some researchers mentioned the storage effect in urban areas. Several studies looked into the flow patterns and redistribution in streets during storm events and the implication in terms of flood modelling. Some recent research considered the criteria for safe evacuation of individuals in flooded areas. But some recent field measurements during the 2010–2011 Queensland floods showed that any criterion solely based upon the flow velocity, water depth or specific momentum cannot account for the hazards caused by the velocity and water depth fluctuations. These considerations ignore further
|
{"page_id": 69023655, "title": "Urban flooding"}
|
It was described by Lord Falconer of Thoroton, former head of the judiciary, as a likely "smoking gun". In May 2023 the Evidence Based Justice Lab – University of Exeter published a 41-page analysis and assessment of Brian Altman's "General Review". Concluding their executive summary, Richard Moorhead, Karen Nokes and Rebecca Helm say: There are lessons to be learned on the nature of human and professional relationships that encourage lawyers to absorb and reflect back their client's view without sufficient independence and critical detachment. The Review demonstrated a tendency to treat with cynicism the appellants and to disregard entirely the human costs of the Post Office's conduct. This blindness to the humanity of others is sometimes reified in practice (and the Bar's Code of Conduct) as fearless advocacy. The Review stands as a monument to that approach, showing how the decision-making of the lawyers can be limited or corrupted by excessive zeal. === Deloitte Review === In 2014 auditors from Deloitte found that branch accounts could be altered remotely by Fujitsu. In February 2016 they began a further review, intending to look at Horizon transactions since its launch in 1999, but the Post Office halted their work four months later on legal advice after the subpostmasters had launched their group action. == Exposing the IT problems == In 2004, Bates approached Computer Weekly investigative journalist Tony Collins over suspicions about the Horizon IT system. Five years elapsed before the journalists felt able to 'stand up' the story. Horizon was legally declared unreliable in Bates & Others v Post Office Ltd, in 2018. The unlawful nondisclosure of knowledge by the Post Office in its prosecution cases was established in law in the case of Hamilton & Others vs Post Office Ltd, in 2021. In September 2015, Baroness Neville-Rolfe, on behalf of
|
{"page_id": 46256346, "title": "British Post Office scandal"}
|
If a number produces a digital root of exactly b − 1 {\displaystyle b-1} , then the number is a multiple of b − 1 {\displaystyle b-1} . With this in mind the digital root of a positive integer n {\displaystyle n} may be defined by using floor function ⌊ x ⌋ {\displaystyle \lfloor x\rfloor } , as dr b ( n ) = n − ( b − 1 ) ⌊ n − 1 b − 1 ⌋ . {\displaystyle \operatorname {dr} _{b}(n)=n-(b-1)\left\lfloor {\frac {n-1}{b-1}}\right\rfloor .} == Properties == The digital root of a 1 + a 2 {\displaystyle a_{1}+a_{2}} in base b {\displaystyle b} is the digital root of the sum of the digital root of a 1 {\displaystyle a_{1}} and the digital root of a 2 {\displaystyle a_{2}} : dr b ( a 1 + a 2 ) = dr b ( dr b ( a 1 ) + dr b ( a 2 ) ) . {\displaystyle \operatorname {dr} _{b}(a_{1}+a_{2})=\operatorname {dr} _{b}(\operatorname {dr} _{b}(a_{1})+\operatorname {dr} _{b}(a_{2})).} This property can be used as a sort of checksum, to check that a sum has been performed correctly. The digital root of a 1 − a 2 {\displaystyle a_{1}-a_{2}} in base b {\displaystyle b} is congruent to the difference of the digital root of a 1 {\displaystyle a_{1}} and the digital root of a 2 {\displaystyle a_{2}} modulo ( b − 1 ) {\displaystyle (b-1)} : dr b ( a 1 − a 2 ) ≡ ( dr b ( a 1 ) − dr b ( a 2 ) ) ( mod ( b − 1 ) ) . {\displaystyle \operatorname {dr} _{b}(a_{1}-a_{2})\equiv (\operatorname {dr} _{b}(a_{1})-\operatorname {dr} _{b}(a_{2})){\pmod {(b-1)}}.} The digital root of − n {\displaystyle -n} in base b
|
{"page_id": 8286632, "title": "Digital root"}
|
Fabric Of The Cosmos (Updated: November 2011). TV series on IMDb
|
{"page_id": 1247287, "title": "The Fabric of the Cosmos"}
|
to switch between the two types simply by opening and closing the respective valves from two different on-board fuel tanks. In 2016, the IMO adopted new sulfur-emissions regulations for implementation by larger ships beginning in January 2020. Of total global air emissions, marine shipping accounts for 18 to 30 percent of the nitrogen oxides and 9% of the sulfur oxides. Sulfur in the air creates acid rain which damages crops and buildings. When inhaled, sulfur is known to cause respiratory problems and even increases the risk of a heart attack. According to Irene Blooming, a spokeswoman for the European environmental coalition Seas at Risk, the fuel used in oil tankers and container ships is high in sulfur and cheaper to buy compared to the fuel used for domestic land use. "A ship lets out around 50 times more sulfur than a lorry per tonne of cargo carried." Cities in the United States like Long Beach, Los Angeles, Houston, Galveston, and Pittsburgh see some of the heaviest shipping traffic, which has left local officials desperately trying to clean up the air. Increasing trade between the United States and China is helping to increase the number of vessels navigating the Pacific and is exacerbating multiple environmental problems. To maintain the level of growth China is experiencing, large amounts of grain are being shipped to China. The numbers of shipments are expected to continue increasing. In contrast to sulfur emissions (which depend on the fuel used), nitrous oxide emissions are primarily a function of combustion temperature. As air contains over 70% nitrogen by volume, some of it will react with oxygen during combustion. Given that those reactions are endothermic, a higher amount of nitrous oxides will be produced at higher combustion temperatures. However, other pollutants, particularly unburned or partially burnt hydrocarbons (also known
|
{"page_id": 23567924, "title": "Environmental impact of shipping"}
|
, we use the trigram if the evidence is backoff sufficient, otherwise we use the bigram, otherwise the unigram. In other words, we only “back off” to a lower-order n-gram if we have zero evidence for a higher-order n-gram. By contrast, in interpolation , we always mix the probability estimates from interpolation all the n-gram estimators, weighing and combining the trigram, bigram, and unigram counts. 3.4 • SMOOTHING 45 In simple linear interpolation, we combine different order n-grams by linearly in-terpolating all the models. Thus, we estimate the trigram probability P(wn|wn−2wn−1) by mixing together the unigram, bigram, and trigram probabilities, each weighted by a λ :ˆP(wn|wn−2wn−1) = λ1P(wn|wn−2wn−1)+λ2P(wn|wn−1)+λ3P(wn) (3.26) such that the λ s sum to 1: ∑ > i λi = 1 (3.27) In a slightly more sophisticated version of linear interpolation, each λ weight is computed by conditioning on the context. This way, if we have particularly accurate counts for a particular bigram, we assume that the counts of the trigrams based on this bigram will be more trustworthy, so we can make the λ s for those trigrams higher and thus give that trigram more weight in the interpolation. Equation 3.28 shows the equation for interpolation with context-conditioned weights: ˆP(wn|wn−2wn−1) = λ1(wn−1 > n−2 )P(wn|wn−2wn−1)+λ2(wn−1 > n−2 )P(wn|wn−1)+ λ3(wn−1 > n−2 )P(wn) (3.28) How are these λ values set? Both the simple interpolation and conditional inter-polation λ s are learned from a held-out corpus. A held-out corpus is an additional held-out training corpus that we use to set hyperparameters like these λ values, by choosing the λ values that maximize the likelihood of the held-out corpus. That is, we fix the n-gram probabilities and then search for the λ values that—when plugged into Eq. 3.26—give us the highest probability of the held-out set. There are various ways
|
{"source": 1018, "title": "from dpo"}
|
is difficult. So I made this (guyneedsgift.com) V8 benchmark run against ActionScript in a wide amount of browsers/FlashPlayerss (iq12.com) Show HN: Embedding Deep Learning models into your Slides using R (rpubs.com) San Francisco most intensely gentrified city in new rankings (ncrc.org) Show HN: Uber for DryClean and Laundry Delivery Service in LA (wash.io) Show HN: Tips and tricks to speed up development (Screencast) (paulrugelhiatt.com) KillerStartups.com (killerstartups.com) Music visualizer with glitch effect (uberviz.io) Agency Guy Built an A.I. Clone to Attend Zoom Meetings for Him (musebycl.io) Digital Comic Museum (digitalcomicmuseum.com) Most Important Penetration Testing Commands Cheat Sheet for Linux Machine (techincidents.com) Teaching code optimization to 11-year-old son. (carymillsap.blogspot.com) Gulp-obfuscate Zalgo setting (mikegroseclose.github.io) MQTT: An Implementer's Perspective (vasters.com) Show HN : WebRTC helped me to launch my startup after 2 years of waiting. (voz.io) Swiss Fort Knox - High secure data center inside the Swiss Alps (swissfortknox.com) Article on Lewis Carroll, Logical Paradox and Belief (epochemagazine.org) Confrontation With TSA Agent Leaves Grandpa's Ashes On Floor (theindychannel.com) Show HN: Tampon - an open source Buffer app (tamponapp.com) Beware of Google Bearing Gifts (notonihilism.org) A better user interface for math (2011) (wabisabistartup.com) Attacking Audio reCaptcha using Google's Web Speech API (debasish.in) We Wouldn't Work for the Galactic Empire If It Were Against McKinsey's Values (honestyisbest.com) 10 Company name types on TechCrunch: pros and cons - useful if you're trying to pick a name (thenameinspector.com) Beta launch: Squeezed Books (YC wasn't-even-submitted company) (squeezedbooks.com) Eiffel goodies for Pascal programmers (tetrack.com) A-Life, Emergent AI and S.T.A.L.K.E.R.:An Interview with Dmitriy Iassenev (aigamedev.com) Impossible to get a bank account these days (world.tax) Show HN: Convert a Markdown Doc to WordPress Posts and Pages (scribewp.com) The Fallacy of Placing Confidence in Confidence Intervals (learnbayes.org) ARM Macs and Virtualization: It's going to be great (ml-illustrated.com) Let's Hear It. The truth about
|
{"source": 2757, "title": "from dpo"}
|
A review and meta-analysis of reading rate. _Journal of Memory and Language_, _109_, 104047. Brysbaert, M., & Stevens, M. (2018). Power Analysis and Effect Size in Mixed Effects Models: A Tutorial. _Journal of Cognition_, _1_(1). Bulus, M., & Dong, N. (2021). Bound Constrained Optimization of Sample Sizes Subject to Monetary Restrictions in Planning Multilevel Randomized Trials and Regression Discontinuity Studies. _The Journal of Experimental Education_, _89_(2), 379–401. Button, K. S., Ioannidis, J. P. A., Mokrysz, C., Nosek, B. A., Flint, J., Robinson, E. S. J., & Munafò, M. R. (2013). Power failure: Why small sample size undermines the reliability of neuroscience. _Nature Reviews Neuroscience_, _14_(5), 365–376. Carter, E. C., Schönbrodt, F. D., Gervais, W. M., & Hilgard, J. (2019). Correcting for Bias in Psychology: A Comparison of Meta-Analytic Methods. _Advances in Methods and Practices in Psychological Science_, _2_(2), 115–144. Cascio, W. F., & Zedeck, S. (1983). Open a New Window in Rational Research Planning: Adjust Alpha to Maximize Statistical Power. _Personnel Psychology_, _36_(3), 517–526. Chang, M. (2016). _Adaptive Design Theory and Implementation Using SAS and R_ (2nd ed.). Chapman and Hall/CRC. Cho, H.-C., & Abe, S. (2013). Is two-tailed testing for directional research hypotheses tests legitimate? _Journal of Business Research_, _66_(9), 1261–1266. Cohen, J. (1988). _Statistical power analysis for the behavioral sciences_ (2nd ed.). L. Erlbaum Associates. Cook, J., Hislop, J., Adewuyi, T., Harrild, K., Altman, D., Ramsay, C., & Vale, L. (2014). Assessing methods to specify the target difference for a randomised controlled trial: DELTA (Difference ELicitation in TriAls) review. _Health Technology Assessment_, _18_(28). Copay, A. G., Subach, B. R., Glassman, S. D., Polly, D. W. Jr., & Schuler, T. C. (2007). Understanding the minimum clinically important difference: A review of concepts and methods. _The Spine Journal_, _7_(5), 541–546. Correll,
|
{"source": 4991, "title": "from dpo"}
|
for 20.0 s at constant speed until the brakes are applied, stopping the truck in a uniform manner in an additional 5.00 s. (a) How long is the truck in motion? (b) What is the average velocity of the truck for the motion described? 34. Why is the following situation impossible? Starting from rest, a charging rhinoceros moves 50.0 m in a straight line in 10.0 s. Her acceleration is constant during the entire motion, and her final speed is 8.00 m/s. 35. The driver of a car slams on the brakes when he sees a tree blocking the road. The car slows uniformly with an acceleration of 25.60 m/s 2 for 4.20 s, making straight skid marks 62.4 m long, all the way to the tree. With what speed does the car then strike the tree? 36. In the particle under constant acceleration model, we identify the variables and parameters v xi , v xf , a x, t, and x f 2 x i . Of the equations in the model, Equations 2.13–2.17, the first does not involve x f 2 x i , the sec-ond and third do not contain a x, the fourth omits v xf ,and the last leaves out t. So, to complete the set, there should be an equation not involving v xi . (a) Derive it from the others. (b) Use the equation in part (a) to solve Problem 35 in one step. 37. A speedboat travels in a straight line and increases in speed uniformly from v i 5 20.0 m/s to vf 5 30.0 m/s in a displacement ∆ x of 200 m. We wish to find the time interval required for the boat to move through this BIO MWAMT SAMT GP Section 2.5 Motion Diagrams 22. Draw motion diagrams
|
{"source": 6367, "title": "from dpo"}
|
Liquid carryover refers to the unintended transport of liquids such as water, hydrocarbon condensates, compressor oil or glycol in a natural gas, hydrogen, carbon dioxide or other industrial gas pipeline or process. Ideally, only gas enters gas processing. Understanding pipeline composition at critical points is crucial to ensure optimal efficiency and safety. Natural gas processing aims to deliver gas suitable for transmission systems without causing operational issues in downstream pipelines, compressors, or equipment. Ideally, all dry industrial gases remain "dry" during processing. However, due to fluid dynamics complexities, gas and liquid phases may not fully separate, leading to wet gas or two-phase flows. These can occur as mist flow (tiny liquid droplets) or stratified flow (a liquid stream along the pipe wall). These conditions can significantly impact gas processing facilities' operational safety, efficiency, and lifespan. == Challenges and risks == Liquid carryover is a major concern, responsible for roughly 60% of plant failures in natural gas processing. Effective phase separation at the beginning of the processing train prevents hydrocarbons and other liquids from entering the gas treatment plant. Improper separation allows liquid carryover to contaminate the desulfurization stage, triggering foaming and fouling, leading to unplanned shutdowns and reduced gas flow. As the gas progresses through desulfurization and dehumidification, it comes into contact with significant processing liquids. Amine-based liquids used in desulfurization to remove hydrogen sulfide (H2S) and carbon dioxide (CO2) can carry over if not properly separated, contaminating the dehumidification stage. Dehumidification utilizes a liquid desiccant, such as monoethylene glycol (MEG) or triethylene glycol (TEG), to reduce gas moisture content and meet sales gas specifications. Carryover of glycol into this process can cause issues by blocking heat exchangers or disrupting temperature control. Notably, while glycol is a common component found during pipeline pigging analysis, there's currently no method to directly
|
{"page_id": 76014795, "title": "Liquid carryover"}
|
sp. C Tadpole shrimp Triops cancriformis Triops newberryi Triops longicaudatus Barnacles Paralepas klepalae Paralepas xenophorae Koleolepas avis Koleolepas tinkeri Ibla quadrivalvis Ibla cumingii Ibla idiotica Ibla segmentata Calantica studeri Calantica siemensi Calantica spinosa Calantica villosa Arcoscalpellum sp. Euscalpellum squamuliferum Scalpellum peronii Scalpellum scalpellum Scalpellum vulgare Scillaelepas arnaudi Scillaelepas bocquetae Scillaelepas calyculacilla Scillaelepas falcate Scillaelepas fosteri Smilium hastatum Smilium peronii Chelonibia patula Chelonibia testudinaria Bathylasma alearum Bathylasma corolliforme Conopea galeata Conopea calceola Conopea merrilli Solidobalanus masignotus Tetrapachylasma trigonum Megalasma striatum Octolasmis warwickii Lysmata Lysmata wurdemanni Lysmata amboinensis Lysmata californica Lysmata bahia Lysmata intermedia Lysmata grabhami Lysmata seticaudata Lysmata nilita Lysmata hochi Lysmata nayaritensis Lysmata rafa Lysmata boggessi Lysmata ankeri Lysmata pederseni Lysmata debelius Lysmata galapaguensis Lysmata cf. trisetacea Insects Icerya bimaculata Icerya purchasi Crypticerya zeteki === Annelida (Ringed worms) === Salvatoria clavata Ophryotrocha gracilis Ophryotrocha hartmanni Ophryotrocha diadema Ophryotrocha bacci Ophryotrocha maculata Ophryotrocha socialis === Chordata === Kryptolebias marmoratus Serranus fasciatus Serranus baldwini === Angiosperms (Flowering plants) === Some Acer (maple) species Castilla elastica Culcita macrocarpa Datisca cannabina (false hemp) Datisca glomerata (Durango root) Fraxinus lanuginosa (Japanese ash) Fraxinus ornus Fuchsia microphylla Gagea serotina Mercurialis annua (Annual mercury) Neobuxbaumia mezcalaensis Nephelium lappaceum (Rambutan) Panax trifolius (Ginseng) Oxalis suksdorfii Phillyrea angustifolia Phillyrea latifolia Ricinocarpos pinifolius Sagittaria lancifolia (sub-androdioecy) Saxifraga cernua Schizopepon bryoniaefolius Spinifex littoreus Ulmus minor == See also == Gynodioecy Plant sexuality Dioecy Trioecy Hermaphrodite Monoicy == References == == External links == Ishida, Kiyoshi; Hiura, Tsutom (1998). "Pollen Fertility and Flowering Phenology in an Androdioecious Tree, Fraxinus lanuginosa (Oleaceae), in Hokkaido, Japan". International Journal of Plant Sciences. 159 (6): 941–947. doi:10.1086/314088. S2CID 84228081. Pennisi, Elizabeth (2006). "Sex and the Single Killifish" (PDF). Science. 313 (5792): 2006. doi:10.1126/science.313.5792.1381. PMID 16959986. S2CID 84857451. Archived from the original (PDF) on 2008-10-01. Retrieved 2008-01-25. Diana Wolf. 'Breeding systems: Evolution of androdioecy'
|
{"page_id": 13605305, "title": "Androdioecy"}
|
is 92,955,807 miles. In Scotland, both transits were observed by Erskine's friend and neighbour, Reverend Alexander Bryce, minister of the church at Kirknewton, only 3 miles from Kirkhill. Bryce was a competent mathematician and he calculated the AU and the other distance parameters of the Solar System: it is these values that Erskine used to create his scale model of the Solar System. == The epitome == In his 'Account of the Parish of Uphall', Erskine writes: "In the year 1776, I caused a representation to be made of the solar system, on a scale of 12,283 miles and 28/100 to an inch; the table of which epitome is engraved on a belfray which stands in the middle of my garden, and of which I shall insert a transcript below." The scale appears unusual but it followed simply from Bryce's calculation of the diameter of the Sun as 884,396 miles and Erskine's arbitrary choice of a representation of the Sun by a freestone spheroid 6 feet, or 72 inches, in diameter. Dividing 884,396 by 72 gives 12,283.28 miles to one inch, or 778,268,621:1. Of the six planets known in the eighteenth century Jupiter and Saturn were modelled in stone, the latter having an iron band, and the smaller planets were made of bronze: all were mounted on plinths or pillars in the grounds of the Kirkhill estate at the correct scaled distance from the Sun. Primrose, writing in 1898, says that only a few of the plinths remained in his day. The table giving the dimensions of his representation is carved into the east face of the stone pillar, or belfry; it is barely legible now, but the details are preserved in the Uphall account. Planet diameters and distances on the pillar are reproduced here, along with the values obtained
|
{"page_id": 67371587, "title": "Kirkhill Astronomical Pillar"}
|
(Ao) of the specimen as listed The following tables gives examples of test specimen dimensions and tolerances per standard ASTM E8. == Equipment == The most common testing machine used in tensile testing is the universal testing machine. This type of machine has two crossheads; one is adjusted for the length of the specimen and the other is driven to apply tension to the test specimen. Testing machines are either electromechanical or hydraulic. The electromechanical machine uses an electric motor, gear reduction system and one, two or four screws to move the crosshead up or down. A range of crosshead speeds can be achieved by changing the speed of the motor. The speed of the crosshead, and consequently the load rate, can be controlled by a microprocessor in the closed-loop servo controller. A hydraulic testing machine uses either a single- or dual-acting piston to move the crosshead up or down. Manually operated testing systems are also available. Manual configurations require the operator to adjust a needle valve in order to control the load rate. A general comparison shows that the electromechanical machine is capable of a wide range of test speeds and long crosshead displacements, whereas the hydraulic machine is a cost-effective solution for generating high forces. The machine must have the proper capabilities for the test specimen being tested. There are four main parameters: force capacity, speed, precision and accuracy. Force capacity refers to the fact that the machine must be able to generate enough force to fracture the specimen. The machine must be able to apply the force quickly or slowly enough to properly mimic the actual application. Finally, the machine must be able to accurately and precisely measure the gauge length and forces applied; for instance, a large machine that is designed to measure long elongations may
|
{"page_id": 28863594, "title": "Tensile testing"}
|
to that of the Soviet Union, e.g. 1ЛБ00ШМ (1LB00ShM) for a 74LS00. Some of the two-letter functional groups were borrowed from the Soviet designation, while others differed. Unlike the Soviet scheme, the two or three digit number after the functional group matched the western counterpart. The series followed at the end (i.e. ШМ for LS). Only the LS series is known to have been manufactured in Bulgaria.: 8–11 Czechoslovakia (TESLA) used the 7400 numbering scheme with manufacturer prefix MH. Example: MH7400. Tesla also produced industrial grade (8400, −25 ° to 85 °C) and military grade (5400, −55 ° to 125 °C) ones. Poland (Unitra CEMI) used the 7400 numbering scheme with manufacturer prefixes UCA for the 5400 and 6400 series, as well as UCY for the 7400 series. Examples: UCA6400, UCY7400. Note that ICs with the prefix MCY74 correspond to the 4000 series (e.g. MCY74002 corresponds to 4002 and not to 7402). Hungary (Tungsram, later Mikroelektronikai Vállalat / MEV) also used the 7400 numbering scheme, but with manufacturer suffix – 7400 is marked as 7400APC. Romania (I.P.R.S.) used a trimmed 7400 numbering with the manufacturer prefix CDB (example: CDB4123E corresponds to 74123) for the 74 and 74H series, where the suffix H indicated the 74H series. For the later 74LS series, the standard numbering was used. East Germany (HFO) also used trimmed 7400 numbering without manufacturer prefix or suffix. The prefix D (or E) designates digital IC, and not the manufacturer. Example: D174 is 7474. 74LS clones were designated by the prefix DL; e.g. DL000 = 74LS00. In later years East German made clones were also available with standard 74* numbers, usually for export. A number of different technologies were available from the Soviet Union, Czechoslovakia, Poland, and East Germany. The 8400 series in the table below indicates an industrial
|
{"page_id": 319536, "title": "7400-series integrated circuits"}
|
Earth Rangers (French: Éco Héros) is a Canadian registered charity focused on environmental education and conservation for children and families. The goal of the organization is to educate children and their families about environmental issues, and mobilize them to take actions that protect animals and the environment. Earth Rangers is membership-based, with over 300,000 members and alumni across Canada. Earth Rangers also provides in-school programming to elementary schools, with school assemblies that feature live animal ambassadors. Earth Rangers headquarters is located in Woodbridge, Ontario. == Origins and mission == Founded in 2004 by Robert Schad and Peter Kendall, Earth Rangers began as a local organization serving schools and communities across the Greater Toronto Area. In 2011 the organization expanded its reach across Canada, and has grown into the largest kid-focused conservation organization globally. The mission of Earth Rangers is to create a generation of conservationists. == Programs == === Membership === Children can sign up for a free Earth Rangers membership in the Earth Rangers App, available on Android, iOS, and Amazon. Once parents have activated the account via email verification, they receive a welcome package in the mail that includes a personalized membership card. Through the Earth Rangers App children can create avatars, listen to podcasts, read blog articles, answer daily trivia questions, and complete environmental activities to gain points and virtual badges, and unlock avatar items and animal habitats. === Missions === Missions are environmental activities that are designed for children to complete with their family and friends in the real world. Mission activities include improving shoreline health by organizing a cleanup, reducing energy at home by adjusting the thermostat, helping pollinators plant native flowers, and more. Once completed, children can gain rewards and unlock additional content on the Earth Rangers App. === School assemblies === Earth Rangers
|
{"page_id": 9791593, "title": "Earth Rangers"}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.