text
stringlengths 5
10.5k
| source
stringlengths 33
146
|
|---|---|
Spherical neutron polarimetry (SNP) is a form of neutron polarimetry that measures the polarization of neutrons both before and after scattering. It uses controlled magnetic fields to manipulate the spin of the neutrons, which are then separated by the Meissner effect, allowing polarization to be measured. == References ==
|
{"page_id": 44842803, "title": "Spherical neutron polarimetry"}
|
organized in genus-specific fashions, as exemplified by the b-ketoadipate and Paa pathways. Comparative genomic studies further reveal that some pathways are more widespread than initially thought. Thus, the Box and Paa pathways illustrate the prevalence of non-oxygenolytic ring-cleavage strategies in aerobic aromatic degradation processes. Functional genomic studies have been useful in establishing that even organisms harboring high numbers of homologous enzymes seem to contain few examples of true redundancy. For example, the multiplicity of ring-cleaving dioxygenases in certain rhodococcal isolates may be attributed to the cryptic aromatic catabolism of different terpenoids and steroids. Finally, analyses have indicated that recent genetic flux appears to have played a more significant role in the evolution of some large genomes, such as LB400's, than others. However, the emerging trend is that the large gene repertoires of potent pollutant degraders such as LB400 and RHA1 have evolved principally through more ancient processes. That this is true in such phylogenetically diverse species is remarkable and further suggests the ancient origin of this catabolic capacity. == Anaerobic biodegradation of pollutants == Anaerobic microbial mineralization of recalcitrant organic pollutants is of great environmental significance and involves intriguing novel biochemical reactions. In particular, hydrocarbons and halogenated compounds have long been doubted to be degradable in the absence of oxygen, but the isolation of hitherto unknown anaerobic hydrocarbon-degrading and reductively dehalogenating bacteria during the last decades provided ultimate proof for these processes in nature. While such research involved mostly chlorinated compounds initially, recent studies have revealed reductive dehalogenation of bromine and iodine moieties in aromatic pesticides. Other reactions, such as biologically induced abiotic reduction by soil minerals, has been shown to deactivate relatively persistent aniline-based herbicides far more rapidly than observed in aerobic environments. Many novel biochemical reactions were discovered enabling the respective metabolic pathways, but progress in the molecular
|
{"page_id": 13475684, "title": "Microbial biodegradation"}
|
Department of Defense, Office of Corporate Information Management (DoD/CIM), to develop one or more Federal Information Processing Standard (FIPS) for modeling techniques. The techniques selected were IDEF0 for function modeling and IDEF1X for information modeling. These FIPS documents are based on the IDEF manuals published by the U.S. Air Force in the early 1980s. Sometime later, IEEE created the IDEF0 standard, and ISO adopted and published it as IEEE/ISO/IEC 31320-1. == IDEF0 topics == === The IDEF0 approach === IDEF0 may be used to model a wide variety of automated and non-automated systems. For new systems, it may be used first to define the requirements and specify the functions, and then to design an implementation that meets the requirements and performs the functions. For existing systems, IDEF0 can be used to analyze the functions the system performs and to record the mechanisms (means) by which these are done. The result of applying IDEF0 to a system is a model that consists of a hierarchical series of diagrams, text, and glossary cross-referenced to each other. The two primary modeling components are functions (represented on a diagram by boxes) and the data and objects that inter-relate those functions (represented by arrows). === IDEF0 Building blocks === The IDEF0 model displayed here on the left is based on a simple syntax. Each activity is described by a verb-based label placed in a box. Inputs are shown as arrows entering the left side of the activity box while output are shown as exiting arrows on the right side of the box. Controls are displayed as arrows entering the top of the box and mechanisms are displayed as arrows entering from the bottom of the box. Inputs, Controls, Outputs, and Mechanisms (ICOM) are all referred to as concepts. Arrow : A directed line, composed of
|
{"page_id": 2361538, "title": "IDEF0"}
|
another, then the ratio of their linear sizes is a {\displaystyle {\sqrt {a}}} . A square root can be constructed with a compass and straightedge. In his Elements, Euclid (fl. 300 BC) gave the construction of the geometric mean of two quantities in two different places: Proposition II.14 and Proposition VI.13. Since the geometric mean of a and b is a b {\displaystyle {\sqrt {ab}}} , one can construct a {\displaystyle {\sqrt {a}}} simply by taking b = 1. The construction is also given by Descartes in his La Géométrie, see figure 2 on page 2. However, Descartes made no claim to originality and his audience would have been quite familiar with Euclid. Euclid's second proof in Book VI depends on the theory of similar triangles. Let AHB be a line segment of length a + b with AH = a and HB = b. Construct the circle with AB as diameter and let C be one of the two intersections of the perpendicular chord at H with the circle and denote the length CH as h. Then, using Thales' theorem and, as in the proof of Pythagoras' theorem by similar triangles, triangle AHC is similar to triangle CHB (as indeed both are to triangle ACB, though we don't need that, but it is the essence of the proof of Pythagoras' theorem) so that AH:CH is as HC:HB, i.e. a/h = h/b, from which we conclude by cross-multiplication that h2 = ab, and finally that h = a b {\displaystyle h={\sqrt {ab}}} . When marking the midpoint O of the line segment AB and drawing the radius OC of length (a + b)/2, then clearly OC > CH, i.e. a + b 2 ≥ a b {\textstyle {\frac {a+b}{2}}\geq {\sqrt {ab}}} (with equality if and only if a = b),
|
{"page_id": 29208, "title": "Square root"}
|
HTML+TIME (Timed Interactive Multimedia Extensions) was the name of a W3C submission from Microsoft, Compaq/DEC and Macromedia that proposed an integration of SMIL semantics with HTML and CSS. The specifics of the integration were modified considerably by W3C working groups, and eventually emerged as the W3C Note XHTML+SMIL. The submission also proposed new animation and timing features that were adopted (with revisions) in SMIL 2.0. Microsoft modified their implementation in IE 5.5 to (mostly) match the W3C Note, but continues to use the HTML+TIME moniker to refer to the associated feature set. == See also == SMIL XHTML+SMIL Microsoft Vizact == External links == Original HTML+TIME submission XHTML+SMIL W3C Note Introduction to HTML+TIME HTML+TIME Overviews and Tutorials HTML+TIME demos and some how-to's
|
{"page_id": 2942788, "title": "HTML+TIME"}
|
be time consuming, so hospitality TVs can be cloned by storing settings on a USB drive and restoring those settings quickly. Additionally, server-based and cloud-based management systems can monitor and configure an entire fleet of TVs. === Healthcare television === Healthcare televisions include the provisions of hospitality TVs with additional features for usability and safety. They are designed for use in a healthcare setting in which the user may have limited mobility and audio/visual impairment. A key feature is the pillow speaker connection. Pillow speakers combine nurse call functions, TV remote control and a speaker for audio. In multiple occupancy rooms where several TVs are used in close proximity, the televisions can be programmed to respond to a remote control with unique codes so that each remote only controls one TV. Smaller TVs, also called bedside infotainment systems, have a full function keypad below the screen. This allows direct interaction without the use of a pillow speaker or remote. These TVs typically have antimicrobial surfaces and can withstand daily cleaning using disinfectants. In the US, the UL safety standard for televisions, UL 62368-1, contains a special section (annex DVB) which outlines additional safety requirements for televisions used in healthcare. === Outdoor television === Outdoor television sets are designed for outdoor use and are usually found in the outdoor sections of bars, sports field, or other community facilities. Most outdoor televisions use high-definition television technology. Their body is more robust. The screens are designed to remain clearly visible even in sunny outdoor lighting. The screens also have anti-reflective coatings to prevent glare. They are weather-resistant and often also have anti-theft brackets. Outdoor TV models can also be connected with BD players and PVRs for greater functionality. == Replacing == In the United States, the average consumer replaces their television every 6.9
|
{"page_id": 628485, "title": "Television set"}
|
contactless payment at the concessions and turnstiles. Wristbands are ideal to use for dark environments such as nightclubs and bars, or outdoor venues where patrons can be far away, such as festivals and theme parks. In addition, these styles of colored wristbands are used alongside hospital patient bands to serve as an extra safety reminder and alert for allergies. They will have a standard color and clearly written labeling, such as "Fall Risks" (which may come from medical conditions, injuries and/or medications used), "Allergies" (to cover allergic reactions), or "Latex Allergies" (to make sure medical safety gloves are not made of latex), amongst several other important cautions that would help protect the patient by preventing iatrogenic mistakes. == See also == Bracelet Diving watch#Watch strap/bracelet Power Balance Smart band Smartwatch Wrist brace == References ==
|
{"page_id": 1447100, "title": "Wristband"}
|
that as a monopoly, sites like YouTube and Google search result in more fake news than if there were more competition in the market that could make it harder to promote harmful content by just gaming one algorithm. == Antitrust == From the 2000s onward, Google and parent company Alphabet Inc. have faced antitrust scrutiny over alleged anti-competitive conduct in violation of competition law in a particular jurisdiction. Antitrust scrutiny of Google has primarily centered on the company's dominance in the search engine and digital advertising markets. The company has also been accused of leveraging control of the Android operating system to illegally curb competition. Google has also received antitrust scrutiny over its control of the Google Play store and alleged "self-preferencing" at the expense of third-party developers. Additionally, Google's alleged discrimination against rivals' advertisements on YouTube has been subject to antitrust litigation. More recently, Google Maps and the Google Automotive Services (GAS) package have become the target of antitrust scrutiny. === European Union === The European Commission has pursued several competition law cases against Google, namely: Complaint that Google abused its position as a dominant search engine to favor its own services over those of competitors. In particular, Google operated a free comparison shopping website Froogle, which it abandoned in favor of a paid-placement-only site called Google Shopping. Other comparison sites complained of a precipitous drop in web traffic due to changes in the Google search algorithm, and some were driven out of business. The investigation began in 2010 and concluded in July 2017 with a €2.42 billion fine against the parent company Alphabet, and an order to change its practices within 90 days. Complaint opened in 2015 that the dominance of the Android operating system was abused to make it difficult for competing third-party apps and search engines
|
{"page_id": 9874319, "title": "Criticism of Google"}
|
mass. Increase in length and diameter of CNT is correlated to increased toxicity and pathological alterations in the lungs. The biological interactions of nanotubes are not well understood, and the field is open to continued toxicological studies. It is often difficult to separate confounding factors, and since carbon is relatively biologically inert, some of the toxicity attributed to carbon nanotubes may be instead due to residual metal catalyst contamination. In previous studies, only Mitsui-7 was reliably demonstrated to be carcinogenic, although for unclear/unknown reasons. Unlike many common mineral fibers (such as asbestos), most SWCNTs and MWCNTs do not fit the size and aspect-ratio criteria to be classified as respirable fibers. In 2013, given that the long-term health effects have not yet been measured, NIOSH published a Current Intelligence Bulletin detailing the potential hazards and recommended exposure limit for carbon nanotubes and fibers. The U.S. National Institute for Occupational Safety and Health has determined non-regulatory recommended exposure limits (RELs) of 1 μg/m3 for carbon nanotubes and carbon nanofibers as background-corrected elemental carbon as an 8-hour time-weighted average (TWA) respirable mass concentration. Although CNT caused pulmonary inflammation and toxicity in mice, exposure to aerosols generated from sanding of composites containing polymer-coated MWCNTs, representative of the actual end-product, did not exert such toxicity. As of October 2016, single-wall carbon nanotubes have been registered through the European Union's Registration, Evaluation, Authorization and Restriction of Chemicals (REACH) regulations, based on evaluation of the potentially hazardous properties of SWCNT. Based on this registration, SWCNT commercialization is allowed in the EU up to 100 metric tons. Currently, the type of SWCNT registered through REACH is limited to the specific type of single-wall carbon nanotubes manufactured by OCSiAl, which submitted the application. === Physicochemical factors affecting carbon nanotube toxicity === Numerous studies have identified key physicochemical properties of
|
{"page_id": 5320, "title": "Carbon nanotube"}
|
Within the United States, the use of asbestos is limited by state and federal regulations and legislation. Improper use of asbestos and injury from exposure is addressed through administrative action, litigation, and criminal prosecution. Injury claims arising from asbestos exposure may be tried as mass torts. == Civil litigation == Asbestos litigation is the longest, most expensive mass tort in U.S. history, involving more than 8,000 defendants and 700,000 claimants. By the early 1990s, "more than half of the 25 largest asbestos manufacturers in the US, including Amatex, Carey-Canada, Celotex, Eagle-Picher, Forty-Eight Insulations, Manville Corporation, National Gypsum, Standard Insulation, Unarco, and UNR Industries had declared bankruptcy. Analysts have estimated that the total costs of asbestos litigation in the U.S. alone will eventually reach $200 to $275 billion." The amounts and method of allocating compensation have been the source of many court cases, and government attempts at resolution of existing and future cases. Claims made against employers by injured workers will typically be in the form of a workers compensation claim, although the long onset for diseases such as mesothelioma may make it impossible for a worker to pursue workers' compensation benefits. However, it is possible for an injured worker to also bring a product liability claim against a third party that is responsible for introducing asbestos into the workplace. Plaintiffs' attorneys have attempted to offer "every exposure" or "substantial factor" liability theories under which they do not need to prove defendants were the proximate cause of plaintiffs' injuries because no level of asbestos exposure is safe. This approach has been rejected by U.S. District Judge David C. Norton. Asbestos lawsuits in the U.S. have included the following as defendants: manufacturers of machinery that are alleged to have utilized asbestos-containing parts; owners of premises at which asbestos-containing products were installed; retailers
|
{"page_id": 52157367, "title": "Asbestos and the law (United States)"}
|
most existing protein complexes identification methods only consider a network's topology structures, and in doing so, these methods miss the advantage of using nodes' feature information. In protein-protein interaction, both topological structure and node features are essential ingredients for protein complexes. The spectral clustering method utilizes the eigenvalues of the affinity matrix of the data to map to a low-dimensional space. It has attracted much attention in recent years as one of the most efficient algorithms in the subcategory of dimensionality reduction. In this paper, a new version of spectral clustering, named text-associated DeepWalk-Spectral Clustering (TADW-SC), is proposed for attributed networks in which the identified protein complexes have structural cohesiveness and attribute homogeneity. Since the performance of spectral clustering heavily depends on the effectiveness of the affinity matrix, our proposed method will use the text-associated DeepWalk (TADW) to calculate the embedding vectors of proteins. In the following, the affinity matrix will be computed by utilizing the cosine similarity between the two low dimensional vectors, which will be considerable to improve the accuracy of the affinity matrix. Experimental results show that our method performs unexpectedly well in comparison to existing state-of-the-art methods in both real protein network datasets and synthetic networks. * ### [Robust graph regularization nonnegative matrix factorization for link prediction in attributed networks]( 2023, Multimedia Tools and Applications * ### [A novel method of spectral clustering in attributed networks by constructing parameter-free affinity matrix]( 2022, Cluster Computing * ### [A Novel Time-Aware Food Recommender-System Based on Deep Learning and Graph Clustering]( 2022, IEEE Access * ### [A Hybrid Method for Recommendation Systems based on Tourism with an Evolutionary Algorithm and Topsis Model]( 2022, Fuzzy Information and Engineering [View all citing articles on Scopus]( [View full text]( © 2021 Elsevier Ltd. All rights reserved. Recommended articles -------------------- * ### [A
|
{"source": 1493, "title": "from dpo"}
|
- 1; layerIndex >= 0; layerIndex--) { double[][] layerWeights = weights[layerIndex]; int inputSize = layerWeights.length; int outputSize = layerWeights.length; if (error == null) { error = new double[outputSize]; for (int i = 0; i 0) { for (int i = 0; i 1 / (1 + Math.exp(-x)); Function sigmoidDerivative = x -> x * (1 - x); NeuralNetwork nn = new NeuralNetwork(layerSizes, sigmoid, sigmoidDerivative); double[][] inputs = {{0, 0}, {0, 1}, {1, 0}, {1, 1}}; double[][] outputs = {{0}, {1}, {1}, {0}}; for (int epoch = 0; epoch < 10000; epoch++) { for (int i = 0; i < inputs.length; i++) { nn.train(inputs[i], outputs[i], 0.1); } } for (double[] input : inputs) {
|
{"source": 3869, "title": "from dpo"}
|
algorithm on the same input are related by a constant factor. In particular 𝑓 𝑖 , 𝑍 = 𝑐 𝑖 ⋅ 𝑓 𝑖 , 𝑄 is satisfied for the final results 𝑓 𝑖 , 𝑍 and 𝑓 𝑖 , 𝑄 of the two algorithms for suitable 𝑐 𝑖 ∈ 𝑄 . In this way, we show that the outcome of the integer variant of Yun’s algorithm directly produces the square-free factorization 𝑓 = 𝑐 ⋅ 𝑓 1 , 𝑍 1 … ⋅ 𝑓 𝑛 , 𝑍 𝑛 from above, so there even is no demand to post-process the result. The combination of the integer version of Yun’s algorithm together with the heuristic of Sect. 3 is then used to assemble the function . Theorem 2 (Yun Factorization and Square-Free Heuristic) 5 Square-Free Polynomials in G F ( 𝑝 ) Step 5 in Algorithm 1 mentions the selection of a suitable prime p, where two conditions have to be satisfied: First, p must be coprime to the leading coefficient of the input polynomial f. Second, f must be square-free in G F ( 𝑝 ) , required for Berlekamp’s algorithm to work. Here, for the second condition we use separability as sufficient criterion to ensure square-freeness. Example 2 Continuing Example 1, we need to process the polynomial 𝑓 = 4 + 47 𝑥 − 2 𝑥 2 − 23 𝑥 3 + 18 𝑥 4 + 10 𝑥 5 . Selecting 𝑝 = 2 or 𝑝 = 5 is not admissible since these numbers are not coprime to 10, the leading coefficient of f. Also 𝑝 = 3 is not admissible since the GCD of f and 𝑓 ′ is 2 + 𝑥 in G F ( 3 ) . Finally, 𝑝 = 7 is a valid choice since the GCD
|
{"source": 5808, "title": "from dpo"}
|
B symptoms (such as fevers, chills, night sweats, and unexplained weight loss). The endemic mycotic infection talaromycosis primarily affects those who are immunocompromised. Invasive opportunistic mycoses may also occur in immunocompromised people; these include aspergillosis, mucormycosis, Cryptococcus neoformans. Cancer can also cause fever of unknown origin. This is thought to be due to release of pyrogenic cytokines from cancer cells as well as due to spontaneous tumor necrosis (sometimes with secondary infections). The cancer types most associated with fever of unknown origin include renal cell carcinoma, lymphoma, liver cancer, ovarian cancer atrial myxoma and Castleman disease. In those with HIV currently being treated with antiretroviral therapy and with a low or undetectable viral load; causes of fever of unknown origin are usually not associated with HIV infection. But in those with AIDS, with high viral loads, viral replication, and immune compromise; cancers and opportunistic infection are the most common cause of FUO. Approximately 2 weeks after initial HIV infection, with viral loads being high, an acute retroviral syndrome can present with fevers, rash and mono-like symptoms. Immune reconstitution inflammatory syndrome is a common cause of FUO when a previously suppressed immune system is re-activated. The newly active immune system often has an exaggerated response against opportunistic pathogens leading to a fever and other inflammatory symptoms. Immune reconstitution syndrome commonly presents after microbiological control of infection (in cases of immune-suppressing pathogens such as HIV) but the syndrome may also present after organ transplant, in the post-partum state, with formerly neutropenic hosts or withdrawing anti-TNF therapy. Auto-inflammatory and auto-immune disorders account for approximately 5-32% of fevers of unknown origin. These can be classified as purely auto-inflammatory disorders (disorders of innate immunity, with dysregulated interleukin 1 beta and/or IL-18 responses), purely auto-immune disorders (in which the adaptive immunity is dysregulated, with a dysregulated
|
{"page_id": 4587713, "title": "Fever of unknown origin"}
|
active for long periods of time after neuronal activity has ceased. Synaptic vesicles are retrieved through two primary pathways: Clathrin-mediated endocytosis (CME): A slow, precise process that recycles vesicles using clathrin-coated pits. Activity-dependent bulk endocytosis (ADBE): A rapid pathway that retrieves large portions of membrane during high activity. The interaction between dynamin and syndapin, as described by Clayton et al. (2009), plays a key role in regulating both CME and ADBE. This regulation is activity-dependent: during low-frequency stimulation, CME ensures precise vesicle recycling, while during intense neuronal activity, ADBE provides a rapid, large-scale retrieval system to prevent membrane buildup. The balance between these two pathways allows neurons to adapt to different levels of synaptic demand and maintain transmission fidelity across a wide range of firing conditions. == Clinical Relevance == Disruptions in quantal neurotransmitter release are implicated in several neurological disorders:[6] Autism Spectrum Disorder (ASD): Altered synaptic vesicle cycling has been linked to ASD, affecting synaptic communication and neural circuit function. Neurodegenerative Diseases: Abnormalities in neurotransmitter release contribute to diseases like Alzheimer’s and Parkinson’s. Myasthenia Gravis: Impaired quantal release at neuromuscular junctions leads to muscle weakness and fatigue. Understanding these processes at the molecular level helps in the development of therapeutic interventions targeting synaptic dysfunction. Disruptions in quantal neurotransmitter release are implicated in several neurological and neurodevelopmental disorders. In autism spectrum disorder (ASD), altered synaptic vesicle cycling and imbalances in spontaneous vs. evoked neurotransmitter release have been linked to abnormal neuronal connectivity and impaired social behavior. Studies in model organisms suggest that synaptic dysfunction may underlie both the cognitive symptoms and the frequent co-occurrence of sleep disturbances observed in ASD patients. In neurodegenerative diseases such as Alzheimer’s and Parkinson’s, evidence shows that impaired vesicle trafficking and neurotransmitter release contribute to synaptic failure and progressive neuronal loss. Early disruption in synaptic
|
{"page_id": 45702632, "title": "Quantal neurotransmitter release"}
|
1901–1904. The diagnosis of the lichen was as follows (translated from Latin): Thick crust, brownish-gray, continuous or more often discontinuous, forming small spots, fissured and broken, often somewhat tubercular-granulous, with a darker and distinct margin, and a separate hypothallus; apothecia black, initially immersed in the thallus, marginate, later emerging, unmarginate, flat or convex, 0.5–1.0 mm wide; epithecium black or occasionally (in the same specimen) decolourised; hypothecium darkening to brownish or occasionally decolourised or carbonaceous; apothecia occasionally containing gonidia in an amphithecium (similar to Rinodina species), but when mature, always without an amphithecium; spores eight, brown, bicellular, 0.009–0.015 mm. Darbishire observed that the newly described species appeared to belong to the genus Buellia. However, he noted that in its early stages of development, the apothecium sometimes had lecanorine characteristics, sharing features with genus Rinodina. He noted that the hypothecium, a specific layer of tissue in the lichen's apothecium, was often carbonaceous (blackened), particularly near the edges of the apothecium. Darbishire acknowledged the close relationship between the genera Buellia and Rinodina. In 1948, Carroll William Dodge proposed to transfer the taxon to genus Rinodina; however, the name Rinodina frigida was not validly published by Dodge. Later, in 1973, Dodge placed the taxon in genus Beltraminia as Beltraminia frigida in his work Lichen Flora of the Antarctic Continent and Adjacent Islands. The genus Beltraminia has since been synonymised with Dimelaena. In her 1968 monograph on Antarctic lichens, Elke Mackenzie supported Darbishire's placement in Buellia, largely because of the lecideine structure of the mature apothecia, wherein the disc lacks a thalline margin. Darbishire also simultaneously described Buellia quercina, collected at the same type locality as B. frigidia, but with a more effigurate margin and lighter colour. MacKenzie rejected taxonomic value for variations in the black, grey, and whitish colours of the thallus due to
|
{"page_id": 74891676, "title": "Buellia frigida"}
|
aimed at developing technology for the computer of the 21st century. In parallel to the development of the concept and vision of "ambient intelligence" at Philips, several other initiatives were also starting to explore the concept of ambient intelligence. Following the advice of the Information Society and Technology Advisory Group (ISTAG), the European Commission used the vision for the launch of their sixth framework (FP6) in Information, Society and Technology, with a budget of 3.7 billion euros. During the first decade of the 21st century, several significant initiatives were launched. The Fraunhofer Society started several such activities, including multimedia, micro-system design, and augmented spaces. MIT started an ambient intelligence research group at their Media Lab. Several more research projects were started in countries such as the United States, Canada, Spain, France, and the Netherlands. Since 2004, the European Symposium on Ambient Intelligence (EUSAI) and many other conferences have been held that address special topics in ambient intelligence. == Social and political aspects == Europe's ISTAG suggests that society may be encouraged to use ambient intelligence if AmI projects are able to meet the following criteria: Facilitate human contact. Are oriented towards community and cultural enhancement. Help to build knowledge and skills for work, better quality of work, citizenship, and consumer choice. Inspire trust and confidence. Are consistent with long-term personal, societal, and environmental sustainability and with lifelong learning. Are made easy to live with and control by ordinary people. == Technologies == A variety of technologies can be used to enable ambient intelligence environments, such as: Bluetooth Low Energy RFID Microchip implant Sensors: ambient light sensors (photodetectors), thermometers, proximity sensors, and motion detectors Software agents Affective computing Nanotechnology Biometrics == Criticism == The ambient intelligence concept is subject to criticism. Ambient intelligence can be immersive, personalized, context-aware, and anticipatory. These
|
{"page_id": 2370788, "title": "Ambient intelligence"}
|
worked for the National Institutes of Health in the Laboratory of Mathematical Biology (1981-1982) and the National Bureau of Standards (1986-1991). Additionally, from 1988 to 1991, she was a member of the GRE Mathematics Advisory Board at Educational Testing Service (ETS). In 1993, she left Howard and began working for the National Institute of Standards and Technology, where she worked on mathematical problems from physics and chemistry research. While working at NIST she continued her research on the ergodic theory of dynamical systems. Fern also lectures at colleges and universities to encourage students in mathematics. She uses her experiences of the setbacks she experienced as a black woman in mathematics to mentor minority students interested in mathematics. In 1998 she was an instructor at a summer workshop for women entering Ph.D. programs in mathematics run by the EDGE Foundation (Enhancing Diversity in Graduate Education). == Awards and achievements == In 2000, Hunt received the Arthur S. Flemming Award for her contributions to probability and stochastic modeling, mathematical biology, computational geometry, nonlinear dynamics, computer graphics, and parallel computing. She has been a member of the Bryn Mawr College board of trustees since 1992 and the Biological and Environmental Research Advisory Committee for the United States Department of Energy since 1994. Hunt was included in the 2019 class of fellows of the American Mathematical Society "for outstanding applications of mathematics to science and technology, exceptional service to the US government, and for outreach and mentoring". The Association for Women in Mathematics has included her in the 2020 class of AWM Fellows for "her exceptional commitment to outreach and mentoring; for her sustained efforts to make the AWM organization more inclusive; for her service to higher education and government; and for inspiring those underrepresented in mathematics with her work in ergodic theory, probability,
|
{"page_id": 44341949, "title": "Fern Hunt"}
|
built upon a very simple "ladder" topology (see below). The chart at the bottom of the page shows these various topologies in terms of general constant k filters. Filters designed using network synthesis usually repeat the simplest form of L-section topology though component values may change in each section. Image designed filters, on the other hand, keep the same basic component values from section to section though the topology may vary and tend to make use of more complex sections. L-sections are never symmetrical but two L-sections back-to-back form a symmetrical topology and many other sections are symmetrical in form. === Ladder topologies === Ladder topology, often called Cauer topology after Wilhelm Cauer (inventor of the elliptic filter), was in fact first used by George Campbell (inventor of the constant k filter). Campbell published in 1922 but had clearly been using the topology for some time before this. Cauer first picked up on ladders (published 1926) inspired by the work of Foster (1924). There are two forms of basic ladder topologies: unbalanced and balanced. Cauer topology is usually thought of as an unbalanced ladder topology. A ladder network consists of cascaded asymmetrical L-sections (unbalanced) or C-sections (balanced). In low pass form the topology would consist of series inductors and shunt capacitors. Other bandforms would have an equally simple topology transformed from the lowpass topology. The transformed network will have shunt admittances that are dual networks of the series impedances if they were duals in the starting network - which is the case with series inductors and shunt capacitors. === Modified ladder topologies === Image filter design commonly uses modifications of the basic ladder topology. These topologies, invented by Otto Zobel, have the same passbands as the ladder on which they are based but their transfer functions are modified to improve
|
{"page_id": 6099726, "title": "Electronic filter topology"}
|
2019. In certain markets such as Israel the maximum legal limit is 1.7% for the amount of nicotine allowed in its pods, but in the US Juul does not offer 1.7%. Juul does not offer low-dose or no-dose nicotine pods. Juuls are unique from other e-cigarettes in that they use nicotine salts rather than freebase nicotine in order to reproduce the effects of conventional cigarettes. Nicotine salts are also less acidic than freebase nicotine, making them easier to inhale. Additionally, nicotine salts are more readily absorbed into the bloodstream at a rate similar to conventional cigarettes. Due to its lack of irritation and easiness to inhale, users may be unaware of how much nicotine they are actually intaking. Given the high nicotine concentrations in Juul, the nicotine-related health consequences of its use by young people could be more severe than those from their use of other e-cigarette products. Ari Atkins, Pax Labs' R&D engineer, said "We don't think a lot about addiction here because we're not trying to design a cessation product at all." He added, "anything about health is not on our mind." In April 2018, FDA Commissioner Dr. Scott Gottlieb stated that the nicotine in Juul is sufficient to result in addiction. Gottlieb further stated, "In some cases, our kids are trying these products and liking them without even knowing they contain nicotine. And that's a problem, because as we know the nicotine in these products can rewire an adolescent's brain, leading to years of addiction." In late 2018, news reports noted increasing rates of Juul addiction in teenagers, which negatively impacts brain development and relationships. Juul's high nicotine content has attracted concern because of nicotine's addictive properties. Particular concern has been expressed about the lack of vaping cessation treatments for adolescents, and the FDA scheduled a public
|
{"page_id": 47779086, "title": "Juul"}
|
being large (such as La or Sr) with the B ion being much smaller typically a transition metal (such as Mn, Co or Ni). == Complex perovskites == Although there is a large number of simple known ABX3 perovskites, this number can be greatly expanded if the A and B sites are increasingly doubled / complex AA′BB′X6. Ordered double perovskites are usually denoted as A2BB′O6 where disordered are denoted as A(BB′)O3. In ordered perovskites, three different types of ordering are possible: rock-salt, layered, and columnar. The most common ordering is rock-salt followed by the much more uncommon disordered and very distant columnar and layered. The formation of rock-salt superstructures is dependent on the B-site cation ordering. Octahedral tilting can occur in double perovskites, however Jahn–Teller distortions and alternative modes alter the B–O bond length. == Antiperovskites == The lattice of an antiperovskites (or inverse perovskites) is the same as that of the perovskite structure, but the anion and cation positions are switched. The typical perovskite structure is represented by the general formula ABX3, where A and B are cations and X is an anion. When the anion is the (divalent) oxide ion, A and B cations can have charges 1 and 5, respectively, 2 and 4, respectively, or 3 and 3, respectively. In antiperovskite compounds, the general formula is reversed, so that the X sites are occupied by an electropositive ion, i.e., cation (such as an alkali metal), while A and B sites are occupied by different types of anion. In the ideal cubic cell, the A anion is at the corners of the cube, the B anion at the octahedral center, and the X cation is at the faces of the cube. Thus the A anion has a coordination number of 12, while the B anion sits at the
|
{"page_id": 184306, "title": "Perovskite (structure)"}
|
a sample of n independent observations x1,..., xn of a p-dimensional zero-mean Gaussian random variable X with covariance R, the maximum likelihood estimator of R is given by R ^ = 1 n ∑ i = 1 n x i x i T . {\displaystyle {\hat {\mathbf {R} }}={1 \over n}\sum _{i=1}^{n}x_{i}x_{i}^{\mathrm {T} }.} The parameter R {\displaystyle R} belongs to the set of positive-definite matrices, which is a Riemannian manifold, not a vector space, hence the usual vector-space notions of expectation, i.e. " E [ R ^ ] {\displaystyle \mathrm {E} [{\hat {\mathbf {R} }}]} ", and estimator bias must be generalized to manifolds to make sense of the problem of covariance matrix estimation. This can be done by defining the expectation of a manifold-valued estimator R ^ {\displaystyle {\hat {\mathbf {R} }}} with respect to the manifold-valued point R {\displaystyle R} as E R [ R ^ ] = d e f exp R E [ exp R − 1 R ^ ] {\displaystyle \mathrm {E} _{\mathbf {R} }[{\hat {\mathbf {R} }}]\ {\stackrel {\mathrm {def} }{=}}\ \exp _{\mathbf {R} }\mathrm {E} \left[\exp _{\mathbf {R} }^{-1}{\hat {\mathbf {R} }}\right]} where exp R ( R ^ ) = R 1 2 exp ( R − 1 2 R ^ R − 1 2 ) R 1 2 {\displaystyle \exp _{\mathbf {R} }({\hat {\mathbf {R} }})=\mathbf {R} ^{\frac {1}{2}}\exp \left(\mathbf {R} ^{-{\frac {1}{2}}}{\hat {\mathbf {R} }}\mathbf {R} ^{-{\frac {1}{2}}}\right)\mathbf {R} ^{\frac {1}{2}}} exp R − 1 ( R ^ ) = R 1 2 ( log R − 1 2 R ^ R − 1 2 ) R 1 2 {\displaystyle \exp _{\mathbf {R} }^{-1}({\hat {\mathbf {R} }})=\mathbf {R} ^{\frac {1}{2}}\left(\log \mathbf {R} ^{-{\frac {1}{2}}}{\hat {\mathbf {R} }}\mathbf {R} ^{-{\frac {1}{2}}}\right)\mathbf {R} ^{\frac {1}{2}}} are
|
{"page_id": 974723, "title": "Estimation of covariance matrices"}
|
a cable run is significantly increased by the inclusion of connectors and splices. When computing the acceptable attenuation (loss budget) between a transmitter and a receiver one includes: dB loss due to the type and length of fiber optic cable, dB loss introduced by connectors, and dB loss introduced by splices. Connectors typically introduce 0.3 dB per connector on well-polished connectors. Splices typically introduce less than 0.2 dB per splice. The total loss can be calculated by: Loss = dB loss per connector × number of connectors + dB loss per splice × number of splices + dB loss per kilometer × kilometers of fiber, where the dB loss per kilometer is a function of the type of fiber and can be found in the manufacturer's specifications. For example, a typical 1550 nm single-mode fiber has a loss of 0.3 dB per kilometer. The calculated loss budget is used when testing to confirm that the measured loss is within the normal operating parameters. == Manufacturing == === Materials === Glass optical fibers are almost always made from silica, but some other materials, such as fluorozirconate, fluoroaluminate, and chalcogenide glasses as well as crystalline materials like sapphire, are used for longer-wavelength infrared or other specialized applications. Silica and fluoride glasses usually have refractive indices of about 1.5, but some materials such as the chalcogenides can have indices as high as 3. Typically the index difference between core and cladding is less than one percent. Plastic optical fibers (POF) are commonly step-index multi-mode fibers with a core diameter of 0.5 millimeters or larger. POF typically have higher attenuation coefficients than glass fibers, 1 dB/m or higher, and this high attenuation limits the range of POF-based systems. ==== Silica ==== Silica exhibits fairly good optical transmission over a wide range of wavelengths. In
|
{"page_id": 3372377, "title": "Optical fiber"}
|
IMT and the TRADOC Staff Judge Advocate (SJA). TRADOC OPREPs provide the initial data for the TRADOC Trainee Abuse Coordinator. b. With the exception of sexual assault allegations, which must be reported to CID for investigation pursuant to AR 600-20, commanders will promptly conduct a preliminary inquiry in accordance with the Manual for Courts Martial Part II, Chapter III, Rule 303 or AR 15-6, into every Trainee abuse allegation, regardless of the nature, magnitude, or source of the complaint. For some allegations, a quick and informal interview of the complainant and any witnesses is all that is required. Other allegations may require more extensive command or law enforcement investigation. Commanders will consult with their legal advisor when conducting an inquiry or evaluating evidence concerning all allegations of Trainee abuse. c. Commanders will document all preliminary inquiries into Trainee abuse cases, including those the commander determines are not credible. Commanders will provide supplemental information through their servicing OSJA by filling out TRADOC Form 350-6-1 (Training Abuse Report) on all Trainees abuse OPREPs and submit to TRADOC OSJA in an accurate and timely manner (not to exceed four working days from notice of the event). Until final disposition of each case, commands through servicing SJAs will submit a status update no later than the 28 th of each month. Updates will be transmitted electronically to the TRADOC training abuse coordinator and must include case number and current status. This process will continue for every open case until the case is closed. A final TRADOC Form 350-6-1 will be completed and forwarded to the TRADOC training abuse coordinator to report final disposition. d. Suspension actions. (1) Preliminary inquiries. Commanders should not automatically suspend DSs, or other cadre simply because they are pending a preliminary inquiry into a Trainee abuse allegation. Commanders will make
|
{"source": 86, "title": "from dpo"}
|
may be unclear. Hence, the phrase least significant bit is used to refer to the right-most bit (bit 0 above) and most significant bit to the leftmost bit (bit 31). The MIPS word is 32 bits long, so we can represent 2 32 different 32-bit patterns. It is natural to let these combinations represent the numbers from 0 to 2 32 1(4,294,967,295 ten ): 0000 0000 0000 0000 0000 0000 0000 0000 two = 0 ten 0000 0000 0000 0000 0000 0000 0000 0001 two = 1 ten 0000 0000 0000 0000 0000 0000 0000 0010 two = 2 ten . . . . . .1111 1111 1111 1111 1111 1111 1111 1101 two = 4,294,967,293 ten 1111 1111 1111 1111 1111 1111 1111 1110 two = 4,294,967,294 ten 1111 1111 1111 1111 1111 1111 1111 1111 two = 4,294,967,295 ten That is, 32-bit binary numbers can be represented in terms of the bit value times a power of 2 (here xi means the ith bit of x): ( ) ( ) ( ) ( ) ( )x x x x x31 2 30 2 29 2 1 2 0 231 30 29 1 0 … For reasons we will shortly see, these positive numbers are called unsigned numbers. Base 2 is not natural to human beings; we have 10 fingers and so find base 10 natural. Why didn’t computers use decimal? In fact, the first commercial computer did offer decimal arithmetic. The problem was that the computer still used on and off signals, so a decimal digit was simply represented by several binary digits. Decimal proved so inefficient that subsequent computers reverted to all binary, converting to base 10 only for the relatively infrequent input/output events. Keep in mind that the binary bit patterns above are simply representatives of
|
{"source": 2304, "title": "from dpo"}
|
data analysis and ML methods to show that negative user-generated content – customer sentiment has negative impact on stock performance. The ever increasing popularity of big data research and big data skills have spilled over to an industrial context. Sun, Hall and Cegielski (2019) to identify possibilities to increase marketing performance (Järvinen and Karjaluoto, 2015 (Sivarajah et al. 2019 trials have been popular in the industrial field as well which have also resulted in some research. Laurell et al. (2019)]( and other related systematic literature reviews on sales ([Ancillai et al. 2019]( and advertising ([Cortez et al., 2019]( several scholars have approached industrial SMM. Subsequent to the publication of the aforementioned reviews on
|
{"source": 4931, "title": "from dpo"}
|
must get the total number of permutations: > n ∑ > k=0 [nk ] = n! , integer n 0. (6.9)For example, 6 + 11 + 6 + 1 = 24 = 4!.Stirling numbers are useful because the recurrence relations ( 6.3) and (6.8) arise in a variety of problems. For example, if we want to represent ordinary powers xn by falling powers xn, we nd that the rst few cases are x0 = x0 ; x1 = x1 ; x2 = x2 + x1 ; x3 = x3 + 3x 2 + x1 ; x4 = x4 + 6x 3 + 7x 2 + x1 . These coecients look suspiciously like the numbers in Table 258, re ected between left and right; therefore we can be pretty con dent that the general formula is > We'd better de ne > {nk > }=čnk > ď=0 > when k n0. xn = ∑ > k {nk } xk , integer n 0. (6.10 )And sure enough, a simple proof by induction clinches the argument: We have x · xk = xk+1 + kx k, because xk+1 = xk (x − k); hence x · xn−1 is x ∑ > k {n − 1k } xk = ∑ > k {n − 1k } xk+1 + ∑ > k {n − 1k } kx k = ∑ > k {n − 1k − 1 } xk + ∑ > k {n − 1k } kx k = ∑ > k ( k {n − 1k } + {n − 1k − 1 }) xk = ∑ > k {nk } xk . In other words, Stirling subset numbers are the coecients of factorial powers that yield ordinary powers. 6.1 STIRLING NUMBERS 263 We can go
|
{"source": 6137, "title": "from dpo"}
|
and features than a single stain alone. Combined with specific protocols for fixation and sample preparation, scientists and physicians can use these standard techniques as consistent, repeatable diagnostic tools. A counterstain is stain that makes cells or structures more visible, when not completely visible with the principal stain. Crystal violet stains both Gram positive and Gram negative organisms. Treatment with alcohol removes the crystal violet colour from gram negative organisms only. Safranin as counterstain is used to colour the gram negative organisms that got decolorised by alcohol. While ex vivo, many cells continue to live and metabolize until they are "fixed". Some staining methods are based on this property. Those stains excluded by the living cells but taken up by the already dead cells are called vital stains (e.g. trypan blue or propidium iodide for eukaryotic cells). Those that enter and stain living cells are called supravital stains (e.g. New Methylene Blue and brilliant cresyl blue for reticulocyte staining). However, these stains are eventually toxic to the organism, some more so than others. Partly due to their toxic interaction inside a living cell, when supravital stains enter a living cell, they might produce a characteristic pattern of staining different from the staining of an already fixed cell (e.g. "reticulocyte" look versus diffuse "polychromasia"). To achieve desired effects, the stains are used in very dilute solutions ranging from 1:5000 to 1:500000 (Howey, 2000). Note that many stains may be used in both living and fixed cells. == Preparation == The preparatory steps involved depend on the type of analysis planned. Some or all of the following procedures may be required. Wet mounts are used to view live organisms and can be made using water and certain stains. The liquid is added to the slide before the addition of the organism and
|
{"page_id": 411782, "title": "Staining"}
|
to Participatory Irrigation Mgmt. Worked in low energy technologies for water system development (Oorani – drinking water pond) in Ramanathapuram === Wasteland reclamation === Evolved models for participatory wasteland reclamation through a coalition between landless Self-help Group (SHG) women and farmers’ groups. Sustainable income for landless SHG women through collective farming. === ICT for rural development === Established the first successful model of Village Information Centre known as Samadhan Kendra through unique content creation in the local language. Software creation for local planning and primary production in local language including DSS. === Fuel-efficient stoves === CERD plans to expand its activities in this area by constructing more stoves and by expanding the works to areas such as Tamil Nadu. CERD construction of a fuel-efficient tawa for making dosa/parotta. Sought subsidies from the Renewable Energy Agency for the Tawa stove. === Biomass-based biogas units === With technical collaboration from IISc. Bangalore, CERD planned to construct biogas units. The units are based on biomass decomposition and tapping the biogas for cooking purposes. === Organic farming === Formed an Organic Farmers’ Association CERD plans to extend support to this network, including establishing organic certification processes for farmers and for arranging marketing linkages for their produce. Backward and forward links connect seeds, plant protection, harvest and post-harvest options. === Nutrition-based kitchen gardening systems === This is women-focused, especially for women under SHGs since malnutrition levels in Pondicherry women approach 80%. This programme plans to provide complete backward and forward linkages from seeds, bio-manures, biopesticides, processing, and marketing. === Micro-enterprises === CERD plans to support viable village-level enterprises for improved livelihood options for women, Dalits and other weaker sections with providing necessary science and technology inputs and data processing skills. == References == == External links == CERD Hot cooking style Member of Water Conflict
|
{"page_id": 41450867, "title": "Centre for Ecology & Rural Development"}
|
Unlike RNA viruses and RT viruses, DNA viruses have not been united under a single realm but are instead dispersed across numerous realms and various taxa that are not assigned to a realm. The realms Adnaviria, Duplodnaviria, and Singelaviria exclusively contain dsDNA viruses, Monodnaviria primarily contains ssDNA viruses but also contains dsDNA viruses, and Varidnaviria primarily contains dsDNA viruses with one ssDNA virus family: Finnlakeviridae. == Notes == == References == === Sources === === Bibliography === Cann, A (2015). Principles of Molecular Virology. Elsevier. pp. 122–127. ISBN 978-0128019559. Fermin, G (2018). Viruses: Molecular Biology, Host Interactions and Applications to Biotechnology. Elsevier. pp. 35–46. doi:10.1016/B978-0-12-811257-1.00002-4. ISBN 978-0128112571. S2CID 89706800. Lostroh, P (2019). Molecular and Cellular Biology of Viruses. Garland Science. ISBN 978-0429664304. Rampersad, S; Tennant, P (2018). Viruses: Molecular Biology, Host Interactions and Applications to Biotechnology. Elsevier. pp. 55–82. doi:10.1016/B978-0-12-811257-1.00003-6. ISBN 978-0128112571. S2CID 90170103. == External links == Media related to Baltimore classification at Wikimedia Commons
|
{"page_id": 4318577, "title": "Baltimore classification"}
|
microfluidic droplets in a microenvironment and the fabrication, transport, and utilization of nanomaterial constructs in the microdroplets. Manipulating magnetic droplets can be used to perform tasks such as arranging droplets into an ordered array for applications in cell culture studies, while the use of magnetic droplets for nanostructure fabrication can be used in drug delivery applications. ==== Magnetic droplets in non-traditional systems ==== In traditional, droplet-based microfluidic systems, that is to say, a droplet in a channel which contains an immiscible oil that separates the droplets, movement of the droplets is achieved through differences in pressure or surface tension. In non-traditional, droplet-based microfluidic systems, such as those herein, other mechanisms of control are needed to manipulate the droplets. Application of a magnetic field to a microfluid array containing magnetic droplets allows for easily achieved sorting and arrangement of the droplets into useful patterns and configurations. These types of manipulations can be achieved via static or dynamic application of a magnetic field which allows for a high degree of control over magnetic droplets. Characterization of the degree of control over magnetic droplets includes measurements of the magnetic susceptibility of the ferrofluid, measurement of the change in droplet in substrate interface area in the presence of an applied magnetic field, and measurement of the “roll-off angle” or the angle at which the droplet would move in the presence of a magnetic field when the surface was tilted. Interactions between the water droplet and the surface can be manipulated by adjusting the structure of the microfluidic system itself by applying a magnetic field to iron-doped poly[dimethylsiloxane] (PDMS), a common material for microfluidic devices. In other systems considered non-traditional, droplet-based microfluidic system, magnetic microdroplets can be a facile means of fabrication and control of micro and nanomaterials, sometimes called "robots". These nanostructures are formed
|
{"page_id": 54022162, "title": "Droplet-based microfluidics"}
|
velocity squared, nor to the inverse of the pipe diameter: the friction factor takes account of the remaining dependency on these parameters. From experimental measurements, the general features of the variation of fD are, for fixed relative roughness ε / D and for Reynolds number Re = V D / ν > ~2000, With relative roughness ε / D < 10−6, fD declines in value with increasing Re in an approximate power law, with one order of magnitude change in fD over four orders of magnitude in Re. This is called the "smooth pipe" regime, where the flow is turbulent but not sensitive to the roughness features of the pipe (because the vortices are much larger than those features). At higher roughness, with increasing Reynolds number Re, fD climbs from its smooth pipe value, approaching an asymptote that itself varies logarithmically with the relative roughness ε / D; this regime is called "rough pipe" flow. The point of departure from smooth flow occurs at a Reynolds number roughly inversely proportional to the value of the relative roughness: the higher the relative roughness, the lower the Re of departure. The range of Re and ε / D between smooth pipe flow and rough pipe flow is labeled "transitional". In this region, the measurements of Nikuradse show a decline in the value of fD with Re, before approaching its asymptotic value from below, although Moody chose not to follow those data in his chart, which is based on the Colebrook–White equation. At values of 2000 < Re < 4000, there is a critical zone of flow, a transition from laminar to turbulence, where the value of fD increases from its laminar value of 64 / Re to its smooth pipe value. In this regime, the fluid flow is found to be unstable,
|
{"page_id": 7127168, "title": "Friction loss"}
|
latitude on gravity, it followed that if the density of the Earth and Schiehallion had been the same, the attraction of the plumb-bob to the Earth would be 9,933 times the sum of its attractions to the mountain at the north and south stations. Yet the measured deflection of 11.6″ meant that Earth attraction was actually 17,804 times as great. From this it follows that the average density of Earth is approximately 1.8 times the density of the mountain. Hutton took a density of 2,500 kg·m−3 for Schiehallion, and announced that the density of the Earth was 1.8 times this, or 4,500 kg·m−3, less than 20% away from the modern value of 5,515 kg·m−3. That the mean density of the Earth should so greatly exceed that of its surface rocks naturally meant that there must be more dense material lying deeper. Hutton correctly surmised that the core material was likely metallic, and might have a density of 10,000 kg·m−3. He estimated this metallic portion to occupy some 65% of the diameter of the Earth. With a value for the mean density of the Earth, Hutton was able to set some values to Jérôme Lalande's planetary tables, which had previously only been able to express the densities of the major solar system objects in relative terms. == Repeat experiments == A more accurate measurement of the mean density of the Earth was made 24 years after Schiehallion, when in 1798 Henry Cavendish used an exquisitely sensitive torsion balance to measure the attraction between large masses of lead. Cavendish's figure of 5,448 ± 33 kg·m−3 was only 1.2% from the currently accepted value of 5,515 kg·m−3, and his result would not be significantly improved upon until 1895 by Charles Boys. The care with which Cavendish conducted the experiment and the accuracy of
|
{"page_id": 20865567, "title": "Schiehallion experiment"}
|
Quiescence search is an algorithm typically used to extend search at unstable nodes in minimax game trees in game-playing computer programs. It is an extension of the evaluation function to defer evaluation until the position is stable enough to be evaluated statically, that is, without considering the history of the position or future moves from the position. It mitigates the effect of the horizon problem faced by AI engines for various games like chess and Go. Human players usually have enough intuition to decide whether to abandon a bad-looking move, or search a promising move to a great depth. A quiescence search attempts to emulate this behavior by instructing a computer to search "volatile" positions to a greater depth than "quiet" ones to make sure there are no hidden traps and to get a better estimate of its value. Any sensible criterion may be used to distinguish "quiet" positions from "volatile" positions. One common criterion is that moves exist in the position that can dramatically change the valuation of the position, such as captures in chess or Go. As the main motive of quiescence search is to get a stable value out of a static evaluation function, it may also make sense to detect wide fluctuations in values returned by a simple heuristic evaluator over several ply, i.e. a history criterion. The quiescence search continues as long as the position remains volatile according to the criterion. In order to get the quiescence search to terminate, plies are usually restricted to moves that deal directly with the threat, such as moves that capture and recapture (often called a 'capture search') in chess. In highly "unstable" games like Go and reversi, a rather large proportion of computer time may be spent on quiescence searching. == The horizon effect == The horizon effect
|
{"page_id": 7724220, "title": "Quiescence search"}
|
or biblical explanations. Throughout the 18th century, scientists theorized valleys are formed by streams running through them, not from floods or other cataclysms. In 1785, Scottish physician James Hutton proposed an Earth history based on observable processes over an unlimited amount of time, which marked a shift from assumptions based on faith to reasoning based on logic and observation. In 1802, John Playfair, a friend of Hutton, published a paper clarifying Hutton's ideas, explaining the basic process of water wearing down the Earth's surface, and describing erosion and chemical weathering. Between 1830 and 1833, Charles Lyell published three volumes of Principles of Geology, which describes the shaping of the surface of Earth by ongoing processes, and which endorsed and established gradual denudation in the wider scientific community. As denudation came into the wider conscience, questions of how denudation occurs and what the result is began arising. Hutton and Playfair suggested over a period of time, a landscape would eventually be worn down to erosional planes at or near sea level, which gave the theory the name "planation". Charles Lyell proposed marine planation, oceans, and ancient shallow seas were the primary driving force behind denudation. While surprising given the centuries of observation of fluvial and pluvial erosion, this is more understandable given early geomorphology was largely developed in Britain, where the effects of coastal erosion are more evident and play a larger role in geomorphic processes. There was more evidence against marine planation than there was for it. By the 1860s, marine planation had largely fallen from favor, a move led by Andrew Ramsay, a former proponent of marine planation who recognized rain and rivers play a more important role in denudation. In North America during the mid-19th century, advancements in identifying fluvial, pluvial, and glacial erosion were made. The work
|
{"page_id": 949526, "title": "Denudation"}
|
and other environmental phenomena on scales from meters to hundreds of kilometers – now supported in the public domain MM5 The Fifth Generation Penn State/NCAR Mesoscale Model ARPS the Advanced Region Prediction System developed at the University of Oklahoma is a comprehensive multi-scale nonhydrostatic simulation and prediction system that can be used for regional-scale weather prediction up to the tornado-scale simulation and prediction. Advanced radar data assimilation for thunderstorm prediction is a key part of the system.. HIRLAM High Resolution Limited Area Model, is developed by the European NWP research consortia co-funded by 10 European weather services. The meso-scale HIRLAM model is known as HARMONIE and developed in collaboration with Meteo France and ALADIN consortia. GEM-LAM Global Environmental Multiscale Limited Area Model, the high resolution 2.5 km (1.6 mi) GEM by the Meteorological Service of Canada (MSC) ALADIN The high-resolution limited-area hydrostatic and non-hydrostatic model developed and operated by several European and North African countries under the leadership of Météo-France COSMO The COSMO Model, formerly known as LM, aLMo or LAMI, is a limited-area non-hydrostatic model developed within the framework of the Consortium for Small-Scale Modelling (Germany, Switzerland, Italy, Greece, Poland, Romania, and Russia). Meso-NH The Meso-NH Model is a limited-area non-hydrostatic model developed jointly by the Centre National de Recherches Météorologiques and the Laboratoire d'Aérologie (France, Toulouse) since 1998. Its application is from mesoscale to centimetric scales weather simulations. == Model output statistics == Because forecast models based upon the equations for atmospheric dynamics do not perfectly determine weather conditions near the ground, statistical corrections were developed to attempt to resolve this problem. Statistical models were created based upon the three-dimensional fields produced by numerical weather models, surface observations, and the climatological conditions for specific locations. These statistical models are collectively referred to as model output statistics (MOS), and
|
{"page_id": 5444216, "title": "Atmospheric model"}
|
accuracy and reducing bias found in other MSA algorithms. Traditional tools such as Clustal Omega, MAFFT, and earlier versions of MUSCLE rely on progressive alignment strategies that produce a single alignment. Muscle5, in contrast, generates an ensemble of high-accuracy alignments by perturbing a hidden Markov model and permuting its guide tree. At its core, the algorithm is a parallelized reimplementation of ProbCons, and is designed to scale efficiently to large datasets. Muscle5 has demonstrated improved benchmark performance compared to leading MSA methods across several datasets, including BAliBASE, BRAliBASE, and PREFAB. === Ensembles === A key innovation in Muscle5 is the use of alignment ensembles, which provide unbiased metrics of confidence in alignments. Each individual MSA (replicate) in the ensemble uses fixed but independently chosen parameters for the hidden Markov model and guide tree, allowing results to be averaged over a diverse set of replicates. This enables biologists to assess how sensitive their downstream analyses are to alignment uncertainty by comparing results across the ensemble. == Old algorithm == The MUSCLE algorithm (before v5) proceeds in three stages: the draft progressive, improved progressive, and refinement stage. === Stage 1: Draft Progressive === In this first stage, the algorithm produces a multiple alignment, emphasizing speed over accuracy. This step begins by computing the k-mer distance for every pair of input sequences to create a distance matrix. UPGMA clusters the distance matrix to produce a binary tree. From this tree a progressive alignment is constructed, beginning with the creation of profiles for each leaf of the tree. For every node in the tree, a pairwise alignment is constructed of the two child profiles, creating a new profile to be assigned to that node. This continues until there is a multiple sequence alignment of all input sequences at the root of the tree. Given
|
{"page_id": 6793518, "title": "MUSCLE (alignment software)"}
|
FOOD water FOOD cookies FOOD Chocolate chip FOOD cookies FOOD supper FOOD chocolate chip FOOD cookies FOOD drives FOOD volunteers FOOD cookies FOOD chips FOOD glass of milk FOOD cookies FOOD cookie FOOD Caroline Kuhn FOOD surprise FOOD practice FOOD forgotten FOOD dinner FOOD chili FOOD rice FOOD water FOOD salad FOOD Caroline Kuhn FOOD glad FOOD creepy FOOD Patsy FOOD deal FOOD dinner FOOD race FOOD old FOOD dinner FOOD bunch FOOD zillion Barbies FOOD chest FOOD practice FOOD Silliest Outfit FOOD role FOOD dinner FOOD dinner FOOD seat FOOD spaghetti FOOD spaghetti! FOOD hot dogs FOOD spaghetti FOOD hot dogs FOOD water FOOD stitch FOOD brains FOOD Krushers FOOD breath FOOD news FOOD Harry Kuhn FOOD volunteers FOOD proved Mr. Kuhn FOOD birthday FOOD Doritos FOOD Doritos FOOD cops FOOD friend FOOD old FOOD milk cartons FOOD milk cartons FOOD Junk Bucket FOOD Caroline Kuhn FOOD supper FOOD police cars FOOD police FOOD point FOOD cake FOOD food FOOD breath FOOD bunch FOOD cake FOOD carrot cake FOOD Mrs. Kuhn FOOD blast of static FOOD carrot cake FOOD pitch-black FOOD glad FOOD Mrs. Kuhn FOOD kidnapper FOOD notice FOOD popcorn popper FOOD popcorn FOOD popcorn FOOD batch of popcorn FOOD cheese FOOD cinnamon FOOD milk FOOD cereal FOOD popcorn FOOD feast FOOD Popcorn FOOD popcorn popper FOOD popcorn FOOD popcorn FOOD Parmesan cheese FOOD shaker FOOD bowl FOOD spice FOOD bowl FOOD popcorn FOOD kernel of popcorn FOOD pizza FOOD bowl FOOD brown FOOD bowl of popcorn FOOD birthday FOOD Patsy FOOD sunny FOOD hurry FOOD breakfast FOOD walkie-talkies FOOD squad cars FOOD computers FOOD cereal FOOD notice FOOD police FOOD breakfast FOOD studies FOOD lunch FOOD Perfect FOOD recipe test FOOD walkie-talkies FOOD principal’s office FOOD wheels FOOD breakfast FOOD perfect FOOD Jell-O FOOD chill FOOD fruit
|
{"source": 1023, "title": "from dpo"}
|
versions of our tool with different levels of automation to understand how they supported continuous data profiling rather than comparing to a baseline with no tool and view this as an area for future work. > Fig. 6: AutoProfiler integrated into a domain scientist’s analysis workflow during our case study. AutoProfiler is shown on the bottom screen in the Jupyter notebook. 6 EVALUATION : L ONGITUDINAL CASE STUDY To address some of the limitations of our user study, we also evaluated how AutoProfiler helps data scientists in a real world environment by working with domain scientists at a US National Lab to integrate AutoProfiler into their workflows. These scientists work with large-scale image data collected from beamline X-ray scattering experiments to understand the properties of physical materials [ 23 ]. Two different scientists installed AutoProfiler into their Jupyter Lab environments and used it over a three month period during their analyses as much as they liked. We were unable to collect log data during this deployment for privacy reasons. We periodically spoke with the scientists during the deployment to make sure the tool was working. At the end of the 3-month period, we conducted in-person observations and interviews with the participants where they showed us the notebooks and datasets where they were using AutoProfiler and we asked about how they used the system, and which features they felt supported their workflows. As a Jupyter Lab extension, AutoProfiler fits into the existing work - flows of these scientists since they typically did data analysis with Python and had existing libraries for visualizing and manipulating their data. AutoProfiler helped improve two different workflows they have for data analysis. The first is for monitoring data outputs and quality while an experiment is running. Their experiments last for multiple hours or even days while
|
{"source": 2823, "title": "from dpo"}
|
chummun chummy chump chun chunet chung chungen chungking chungkui chungphaisan chungyen chunk chunks chunksize chunky chunn chunok chuo chuong chupasko chupin chupp churas church churcher churches churchfield churchgo churchgoer churchgoing churchil churchill churchillian churchman churchmen churchwoman churchwomen churchyard churka churma churn churned churng churning chusername chusha chut chute chutney chutskoff chuug chuy chw chwe chwee chwet chwss chya chychrun chye chyh chynena chynoweth chyrle chytil chyuan chz ci cia ciac ciacci ciaglo cial cialis cialiste cially ciampa ciampaglia ciampi ciampini cian cianci ciancibello cianfaglione ciannavei ciao ciaralli ciardi ciarla ciarsolo ciaschi ciathp ciausybp ciaux ciavaldini cib ciba cibernetica cibien cible cibles cic cicada ciccarelli ciccarone cicchetto cicchino cicchitelli cicci cicciolina ciccolella ciccone cicek cicely cicero ciceronian cicg cichocki cichon cicily cicinelli ciciolina ciciriello cicnet cicnt cicone cicora cicrp cics cict cicuttin cid cida cidalia cider cidi cidn cie ciearn ciel ciemat ciencias cientificia cieplowski cierr cies ciesielski cieslak cif cifarelli cifelli cifer cifersky ciffone cifuentes cigar cigare cigarette cigarettes cigay cigdem cignal cignetti cigy cih cihnf cii ciid cijmay cijn cikanek cikmay cilea cilia ciliate cilka cilley ciluaga cim cimap cimarron cimbalik cimbalo cimetierre cimino ciml cimlinc cimolai cims cin cina cinar cinc cinch cincinatti cincinnati cincinnatian cincinnatus cincnclantflt cind cinda cinde cindee cindelyn cinder cinderella cindi cindie cindra cindy cineca cinema cinemas cinematic cinematographer cinematography cinematronix cinemax cinerama cinfirmation cingolani cinicolo ciniero cinnabar cinnamon cinnet cinq cinque cinquefoil cintron cintz cio ciobanu ciocca ciochon cioci cioffi ciofolo ciolfi ciollo cion cionco ciordia cios ciotti cip cipher ciphers ciphertext cipitant cipolla cipolletta cipollini cipollone cipriani cipriano cipro cirarda ciraulo circa circe circiut circle circled circlelord circles circlet circling circone circuit circuite circuited circuiting circuitous circuitry circuits circulant circular circulate circulated circulating circulation circulatory circulent circumcircle circumcise circumcision circumference circumferential circumflex circumlocution circumnavigate circumpolar circumscribe circumscription circumspect circumsphere circumstance circumstances circumstantial
|
{"source": 5213, "title": "from dpo"}
|
high-level overview is provided below: **Balance Overview:** * Total funds in the endowment: $95,835,233 * Capital utilization: 75.3% * Monthly DeFi results: $315,738 Review the full report prepared by @Karpatkey * **Vote**: Tally * 116% increase from the annual average * 88.48% of voting weight from top 10 delegates * **Explore further:**Security Council Proposal. * **Looking Ahead:** * Incorporate delegate feedback to improve governance. * Set compensation guidelines for future stewardship. * Address upcoming proposals on the Kanban board. * **Summary:** The Meta-Governance Working Group focused on
|
{"source": 6413, "title": "from dpo"}
|
in teslas. V is the volume of the magnet (in m3). μ0 is the permeability of vacuum (4π×10−7 H/m). == Models == The preferred classical explanation of a magnetic moment has changed over time. Before the 1930s, textbooks explained the moment using hypothetical magnetic point charges. Since then, most have defined it in terms of Ampèrian currents. In magnetic materials, the cause of the magnetic moment are the spin and orbital angular momentum states of the electrons, and varies depending on whether atoms in one region are aligned with atoms in another. === Magnetic pole model === The sources of magnetic moments in materials can be represented by poles in analogy to electrostatics. This is sometimes known as the Gilbert model.: 258 In this model, a small magnet is modeled by a pair of fictitious magnetic monopoles of equal magnitude but opposite polarity. Each pole is the source of magnetic force which weakens with distance. Since magnetic poles always come in pairs, their forces partially cancel each other because while one pole pulls, the other repels. This cancellation is greatest when the poles are close to each other i.e. when the bar magnet is short. The magnetic force produced by a bar magnet, at a given point in space, therefore depends on two factors: the strength p of its poles (magnetic pole strength), and the vector ℓ {\displaystyle \mathrm {\boldsymbol {\ell }} } separating them. The magnetic dipole moment m is related to the fictitious poles as m = p ℓ . {\displaystyle \mathbf {m} =p\,\mathrm {\boldsymbol {\ell }} \,.} It points in the direction from South to North pole. The analogy with electric dipoles should not be taken too far because magnetic dipoles are associated with angular momentum (see Relation to angular momentum). Nevertheless, magnetic poles are very useful
|
{"page_id": 540979, "title": "Magnetic moment"}
|
Yamamoto M., Confined lateral diffusion of membrane receptors as studied by single particle tracking (nanovid microscopy). Effects of calcium-induced differentiation in cultured epithelial cells, Biophys J. 1993 Nov;65(5):2021-40. == External links == Quantitative Microscopy
|
{"page_id": 6988073, "title": "Nanovid microscopy"}
|
solutions. In solving a subsonic problem, one decision to be made by the aerodynamicist is whether to incorporate the effects of compressibility. Compressibility is a description of the amount of change of density in the flow. When the effects of compressibility on the solution are small, the assumption that density is constant may be made. The problem is then an incompressible low-speed aerodynamics problem. When the density is allowed to vary, the flow is called compressible. In air, compressibility effects are usually ignored when the Mach number in the flow does not exceed 0.3 (about 335 feet (102 m) per second or 228 miles (366 km) per hour at 60 °F (16 °C)). Above Mach 0.3, the problem flow should be described using compressible aerodynamics. === Compressible aerodynamics === According to the theory of aerodynamics, a flow is considered to be compressible if the density changes along a streamline. This means that – unlike incompressible flow – changes in density are considered. In general, this is the case where the Mach number in part or all of the flow exceeds 0.3. The Mach 0.3 value is rather arbitrary, but it is used because gas flows with a Mach number below that value demonstrate changes in density of less than 5%. Furthermore, that maximum 5% density change occurs at the stagnation point (the point on the object where flow speed is zero), while the density changes around the rest of the object will be significantly lower. Transonic, supersonic, and hypersonic flows are all compressible flows. ==== Transonic flow ==== The term Transonic refers to a range of flow velocities just below and above the local speed of sound (generally taken as Mach 0.8–1.2). It is defined as the range of speeds between the critical Mach number, when some parts of the
|
{"page_id": 2819, "title": "Aerodynamics"}
|
Critical Systems Limited. In 2004, Praxis Critical Systems Limited changed its name to Praxis High Integrity Systems Limited. In January 2010, the company became Altran Praxis. In early 2009, Praxis formed a partnership with AdaCore, and released SPARK Pro under the terms of the GPL. This was followed in June 2009 by the SPARK GPL Edition 2009, aimed at the free and open-source software (FOSS) and academic communities. In June 2010, Altran-Praxis announced that the SPARK programming language would be used in the software of US Lunar project CubeSat, expected to be completed in 2015. In January 2013, Altran-Praxis changed its name to Altran, which in April 2021 became Capgemini Engineering (following Altran's merger with Capgemini). The first Pro release of SPARK 2014 was announced on April 30, 2014, and was quickly followed by the SPARK 2014 GPL edition, aimed at the FLOSS and academic communities. == Industrial applications == === Safety-related systems === SPARK has been used in several high profile safety-critical systems, covering commercial aviation (Rolls-Royce Trent series jet engines, the ARINC ACAMS system, the Lockheed Martin C130J), military aviation (EuroFighter Typhoon, Harrier GR9, AerMacchi M346), air-traffic management (UK NATS iFACTS system), rail (numerous signalling applications), medical (the LifeFlow ventricular assist device), and space applications (the Vermont Technical College CubeSat project). === Security-related systems === SPARK has also been used in secure systems development. Users include Rockwell Collins (Turnstile and SecureOne cross-domain solutions), the development of the original MULTOS CA, the NSA Tokeneer demonstrator, the secunet multi-level workstation, the Muen separation kernel and Genode block-device encrypter. In August 2010, Rod Chapman, principal engineer of Altran Praxis, implemented Skein, one of candidates for SHA-3, in SPARK. In comparing the performance of the SPARK and C implementations and after careful optimization, he managed to have the SPARK version run only
|
{"page_id": 291874, "title": "SPARK (programming language)"}
|
an open-source speech recognition deep learning model in September 2022. == See also == Digital dictation Optical character recognition Speech synthesis == References ==
|
{"page_id": 30468489, "title": "Transcription software"}
|
{\displaystyle d} of degree n − 1 {\displaystyle n-1} with leading coefficient 1 ( n − 1 ) ! {\textstyle {\frac {1}{(n-1)!}}} . For example, the number of monomials in three variables ( n = 3 {\displaystyle n=3} ) of degree d is 1 2 ( d + 1 ) 2 ¯ = 1 2 ( d + 1 ) ( d + 2 ) {\textstyle {\frac {1}{2}}(d+1)^{\overline {2}}={\frac {1}{2}}(d+1)(d+2)} ; these numbers form the sequence 1, 3, 6, 10, 15, ... of triangular numbers. The Hilbert series is a compact way to express the number of monomials of a given degree: the number of monomials of degree d {\displaystyle d} in n {\displaystyle n} variables is the coefficient of degree d {\displaystyle d} of the formal power series expansion of 1 ( 1 − t ) n . {\displaystyle {\frac {1}{(1-t)^{n}}}.} The number of monomials of degree at most d in n variables is ( n + d n ) = ( n + d d ) {\textstyle {\binom {n+d}{n}}={\binom {n+d}{d}}} . This follows from the one-to-one correspondence between the monomials of degree d {\displaystyle d} in n + 1 {\displaystyle n+1} variables and the monomials of degree at most d {\displaystyle d} in n {\displaystyle n} variables, which consists in substituting by 1 the extra variable. == Multi-index notation == The multi-index notation is often useful for having a compact notation, specially when there are more than two or three variables. If the variables being used form an indexed family like x 1 , x 2 , x 3 , … , {\displaystyle x_{1},x_{2},x_{3},\ldots ,} one can set x = ( x 1 , x 2 , x 3 , … ) , {\displaystyle x=(x_{1},x_{2},x_{3},\ldots ),} and α = ( a , b , c , … )
|
{"page_id": 357416, "title": "Monomial"}
|
},60^{\circ }} and can be expressed in terms of σ c , σ b , σ t {\displaystyle \sigma _{c},\sigma _{b},\sigma _{t}} as (here σ b {\displaystyle \sigma _{b}} is the failure stress under equi-biaxial compression and σ t {\displaystyle \sigma _{t}} is the failure stress under uniaxial tension) r c := 6 5 [ σ b σ t 3 σ b σ t + σ c ( σ b − σ t ) ] ; r t := 6 5 [ σ b σ t σ c ( 2 σ b + σ t ) ] {\displaystyle r_{c}:={\sqrt {\cfrac {6}{5}}}\left[{\cfrac {\sigma _{b}\sigma _{t}}{3\sigma _{b}\sigma _{t}+\sigma _{c}(\sigma _{b}-\sigma _{t})}}\right]~;~~r_{t}:={\sqrt {\cfrac {6}{5}}}\left[{\cfrac {\sigma _{b}\sigma _{t}}{\sigma _{c}(2\sigma _{b}+\sigma _{t})}}\right]} The parameter z {\displaystyle z} in the model is given by z := σ b σ t σ c ( σ b − σ t ) . {\displaystyle z:={\cfrac {\sigma _{b}\sigma _{t}}{\sigma _{c}(\sigma _{b}-\sigma _{t})}}~.} The Haigh-Westergaard representation of the Willam-Warnke yield condition can be written as f ( ξ , ρ , θ ) = 0 ≡ f := λ ¯ ( θ ) ρ + B ¯ ξ − σ c ≤ 0 {\displaystyle f(\xi ,\rho ,\theta )=0\,\quad \equiv \quad f:={\bar {\lambda }}(\theta )~\rho +{\bar {B}}~\xi -\sigma _{c}\leq 0} where B ¯ := 1 3 z ; λ ¯ := 1 5 r ( θ ) . {\displaystyle {\bar {B}}:={\cfrac {1}{{\sqrt {3}}~z}}~;~~{\bar {\lambda }}:={\cfrac {1}{{\sqrt {5}}~r(\theta )}}~.} == Modified forms of the Willam-Warnke yield criterion == An alternative form of the Willam-Warnke yield criterion in Haigh-Westergaard coordinates is the Ulm-Coussy-Bazant form: f ( ξ , ρ , θ ) = 0 or f := ρ + λ ¯ ( θ ) ( ξ − B ¯ ) = 0 {\displaystyle f(\xi ,\rho ,\theta )=0\,\quad {\text{or}}\quad f:=\rho +{\bar {\lambda }}(\theta )~\left(\xi -{\bar
|
{"page_id": 17538047, "title": "Willam–Warnke yield criterion"}
|
in its triplet state (i.e. it is a diradical). This is referred to as air inhibition and is a diffusion-controlled reaction with rates typically in the order of 107–109 mol−1 s−1, the resulting peroxy radicals (ROO•) are less reactive towards polymerisation. However air stabilisation is not suitable for monomers with which it can form explosive peroxides, such as vinyl chloride. Other stable radicals include TEMPO and TEMPOL, which are exceedingly effective radical scavengers. Certain compounds marketed as true inhibitors, such as p-phenylenediamines, phenothiazine and hydroxylamines like HPHA and DEHA, are also thought to react through the intermediary of aminoxyl radicals. Not all inhibitors are radicals however, with quinones and quinone methides being important examples. === Retarders === Certain hydroxylamines and p-phenylenediamines may act as retarders. For styrene, nitrophenol compounds such as dinitro-ortho-cresol and di-nitro-sec-butylphenol (DNBP) have long been the important, however they are coming under regulatory pressure due to their high toxicity. == Inhibitors for transport & storage == Purified monomers stored at ambient temperatures are of less risk of polymerising and as such the most highly reactive inhibitors are rarely used at this stage. In general compounds are chosen which can be easily removed immediately prior to industrial polymerisation to make plastics. Compounds bearing a hydroxy group, which can be removed by an alkali wash, tend to dominate. Examples include 4-tert-butylcatechol (TBC), 4-methoxyphenol (MEHQ), butylated hydroxytoluene (BHT), and hydroquinone (HQ). == See also == Anti-skinning agent - These agents prevent polymerisation in paints and varnishes by binding to, and thus inhibiting, the action of oil drying agents Tubulin polymerisation inhibitors - chemotherapy drugs that interfere with the tubulin system == References ==
|
{"page_id": 62565944, "title": "Polymerisation inhibitor"}
|
providers. InfoSky offers cargo system services for more than 11 airlines and 15 airports. The H shares of the company were listed on the Stock Exchange of Hong Kong Limited on February 7, 2001, trade code 0696, and the net proceeds from the issuance of H shares amounted to approximately HK$1.2 billion. After the company was listed, we received much recognition from investors and were ranked 'Best Run' by Hong Kong Exchange. == Achievements == === 2002 === TravelSky was nominated as one of the Deloitte Touche Tohmastsu Technology Fast 500, with the net income increase rate of 38%, TravelSky was ranked 218th in the list. The United States Securities and Exchange Commission approved the company's Sponsored Level 1 American depositary receipt programme. === 2001 === In 2001 Forbes recognised TravelSky, along with only seven other listed entities, as one of the 200 best small-scale enterprises in the world. == Commercial outlook == According to its website in 2010, TravelSky is focused on diversification in the travel market, including travel-related rental and hotel reservation. == References ==
|
{"page_id": 28842378, "title": "TravelSky"}
|
Berlin on Oct 24-26, 1991, many European countries joined together to adapt common practices regarding tissue banks and the European Association of Tissue Banks was created. The first conference represented 17 countries but by 1998, 46 countries were represented In Eastern Europe, the Humboldt University Medical School has had a tissue bank since 1956 and supplied 50,000 bone grafts to more than 250 hospitals between 1956 and 1991. Throughout Europe, the European Bone Bank Foundation, Bone Implant Services, and the Euro-Skin Bank are a few organizations that prepare donated grafts for surgery. Pakistan, Indonesia, Bangladesh, and Malaysia use amnion in reconstructive surgery and burns. == Commerce == Body brokers are firms or individuals that buy and sell cadaver human body parts for use of research. Trade in these body parts is performed in a manner similar to other raw materials, though many brokers insist they charge fees as opposed to selling body parts. == Procedures == House Bill 4341 was passed in 2014 regarding permission given to all schools in Michigan to receive cadavers for the promotion of education. The medical school must have a mortuary license. The law protects the bodies to be used from anything other than learning purposes. The school has to be credited by the Department of Community Health in order to receive a body and to be able to practice on it. There is a limit to the number of cadavers they have at one point in time at the house. At the University of Washington, a body may be refused if there are signs of decomposition, severe trauma, infectious diseases, significant bedsores, obesity, jaundice, recent surgeries, or autopsied remains. The University of Washington’s School of Medicine has a continuing need for donated bodies to the Willed Body Program and accepts bodies of ages 18
|
{"page_id": 7855941, "title": "Tissue bank"}
|
each source. Submit stabilizing agents in airtight containers. Mark the sample date on the container. Include the SDS. 24-1.01D Quality Assurance 24-1.01D(1) General If requested, perform QC testing in the presence of the Engineer. If required, construct test strips with materials, tools, equipment, and methods you will use in the work. Construct test pads for compaction tests by scraping away material to the depth ordered. If a compaction test fails, corrective action must include the layers of material already placed above the test pad elevation. 24-1.01D(2) Quality Control 24-1.01D(2)(a) General Reserved 24-1.01D(2)(b) Quality Control Plan Reserved 24-1.01D(2)(c) Qualifications Reserved 24-1.01D(2)(d) Preparing Basement Material After preparing an area for soil stabilization, verify the surface grades. 24-1.01D(2)(e) Mixing Except for clods larger than 1 inch, randomly test the adequacy of the mixing with a phenolphthalein pH indicator solution. 24-1.01D(3) Department Acceptance Stabilized soil acceptance is based on: SECTION 24 STABILIZED SOILS 358 1. Visual inspection 2. Compliance with the requirements shown in the following table: Stabilized Soil Requirements for Acceptance Quality c haracteristic Test method Requirement Relative compaction, (min, %) California Test 231 and 216 See section for the specified stabilization agent a Stabilization agent application rate Calibrated tray or equal Final application rate ordered by the Engineer ± 5% > a For lime stabilized soil, see section 24-2.03E. For cement stabilized soil, see section 24-3.03D. 24-1.02 MATERIALS 24-1.02A General Reserved 24-1.02B Water Notify the Engineer if a water source other than potable water is used and perform testing for chlorides and sulfates. If potable water is not used, water for stabilized soil must be clean and contain no more than 650 parts per million of chlorides as Cl determined under California Test 422 and no more than 1,300 parts per million of sulfates as SO 4 determined under California Test 417.
|
{"source": 1498, "title": "from dpo"}
|
in spiral bevel geared systems]( **Mert, Behic** (2004) Novel acoustical and mechanical methods for rheological characterization of the biological materials Anxious martyr: John Donne and the literature of self -sacrifice Reading in English and Spanish: A comparative miscue analysis Military disengagement and democratic consolidation in post -military regimes: The case of El Salvador Imaging of near-infrared fluorescence, absorption, and scatter in turbid media Russia's regional executives and the strategy of confrontation: The link between institutional change and intergovernmental conflict Studies towards the total syntheses of the callipeltins The characterization of soil properties in in-situ conditions to develop “soil management/mapping units” using high-resolution remotely sensed data sets Large-scale gene expression profiling of the transition from cell division to endoreduplication in developing soybean seeds Asian American women's life writing: Autobiographical negotiations of inscrutability Competitive strategy, operational effectiveness, and M&A: Examining the role of acquirer and target strategy and effectiveness on M&A performance Faith and nothingness in Kierkegaard: A mystical reading of the God -relationship Analysis of grape anthocyanins and their biological properties in prostate cancer cells Planning models for electric transmission network expansion Laser-induced fluorescence measurements and modeling of nitric oxide and methylidyne in laminar, counter-flow partially premixed flames at high pressure Lattice Boltzmann models for simulations of drop -drop collisions A systemic conceptualization workshop in Chennai, India: Training and evaluation Exploring device and circuit architecture for scaled technologies [Structural
|
{"source": 3879, "title": "from dpo"}
|
John Wilkins, its first secretary, on his deathbed. In 1687 Newton published his _Principia_, the greatest single book of science ever written. Through the eyes of Daniel Waterhouse, we are given a preview of the _Principia_ in Book 3, complete with supporting diagrams. Daniel has a kidney stone surgically removed by the great polymath Robert Hooke, who among other things surveyed London for its rebuilding after the Fire. Robert Boyle’s work on gases under pressure led to the first steam engines — we watch one in operation at the very end of the book, pumping water out of a Cornish tin mine. And if mines can be pumped out, then metals can be more easily extracted, so here we are back with the coinage, the fusing and _con-fusing_ of metals and of modes of thought, the flow of trade. We see Newton as Master of the Royal Mint (as he was, from 1699), and the bankers of Europe scribbling out their bills and letters of credit. It all hangs together. That is Neal Stephenson’s real achievement — to show us the whole thing, this new System of the World, stirring into motion. It does not, and never can, operate flawlessly, like those beautiful mechanisms in glass cases at the Science Museum in South Kensington when I was a boy, which could be wakened to action by inserting a penny. A System of the World is not like that. There are drive shafts the wrong length, cog wheels that do not mesh, and pieces left over from the old system that can’t be made to fit anywhere. Somehow, though, it moves, and works, and a new world comes into being. As Daniel’s friend Roger Comstock observes: > We are at a fork in the road just now. One way takes us
|
{"source": 5830, "title": "from dpo"}
|
is a sealed hollow copper tube that contains a small amount of thermal transfer fluid (water or glycol mixture) which under low pressure boils at a very low temperature. The copper heat pipe transfers thermal energy from within the solar tube into a copper header. As the solution circulates through the copper header, the temperature rises. Other components in solar thermal water systems that contain copper include solar heat exchanger tanks and solar pumping stations, along with pumps and controllers. === HVAC systems === Air conditioning and heating in buildings and motor vehicles are two of the largest applications for heat exchangers. While copper tube is used in most air conditioning and refrigeration systems, typical air conditioning units currently use aluminum fins. These systems can harbor bacteria and mold and develop odors and fouling that can make them function poorly. Stringent new requirements including demands for increased operating efficiencies and the reduction or elimination of harmful emissions are enhancing copper's role in modern HVAC systems. Copper’s antimicrobial properties can enhance the performance of HVAC systems and associated indoor air quality. After extensive testing, copper became a registered material in the U.S. for protecting heating and air conditioning equipment surfaces against bacteria, mold, and mildew. Furthermore, testing funded by the U.S. Department of Defense is demonstrating that all-copper air conditioners suppress the growth of bacteria, mold and mildew that cause odors and reduce system energy efficiency. Units made with aluminum have not been demonstrating this benefit. Copper can cause a galvanic reaction in the presence of other alloys, leading to corrosion. === Gas water heaters === Water heating is the second largest energy use in the home. Gas-water heat exchangers that transfer heat from gaseous fuels to water between 3 and 300 kilowatts thermal (kWth) have widespread residential and commercial use
|
{"page_id": 37749393, "title": "Copper in heat exchangers"}
|
occurs. There is also a risk of injury and increased risk of predation for both sexes. ==== Examples ==== Cepero's grasshopper (Tetrix ceperoi) and the slender groundhopper (Tetrix subulata) – Naturally the distribution of the Cepero’s grasshopper and slender groundhopper overlap; however, they rarely co-exist. The reproductive success of the Cepero’s grasshopper decreases when housed within the same enclosure as high numbers of the slender groundhopper. The reduction of reproductive success stems from an increase in mating attempts by the Cepero's grasshopper towards the slender groundhopper, which may be due to their larger body size. However, these mating attempts are generally unsuccessful as the mate recognition of female slender groundhoppers are reliable, which may be due to the different courtship displays of the two species. The reduced reproductive success can cause the displacement in one of the species, potentially a factor as to why the species rarely co-exist despite sharing similar habitat preferences. Italian agile frog (Rana latastei) - The distribution of Italian agile frog and the agile frog (Rana dalmatina) overlap naturally in ponds and drainage ditches. In the areas of overlap, the abundance of agile frogs is higher than Italian agile frogs. When there is a higher abundance of agile frogs, the mating between Italian agile frogs is interfered with. Male agile frogs attempt to displace male Italian agile frogs during amplexus, which is a type of mating position where the male grasps onto the female. The Italian agile frog and agile frog have been seen in amplexus when co-existing. The mating attempts by the agile frog reduces the reproductive success of the Italian agile frog. The Italian agile frog also produces a lower number of viable eggs in the presence of the agile frog, potentially due to sperm competition between the male Italian agile frog and agile
|
{"page_id": 64053223, "title": "Reproductive interference"}
|
Science, University of Alexandria (Egypt) for its work with the Omayed Biosphere Reserve 2009, UNESCO Young Scientists Awards: Michel Batisse grant for biosphere reserve management case studies 2013, Women in Science Hall of Fame, Embassy of the United States, Cairo, Egypt, to honor outstanding female scientists throughout the Middle East and North Africa == References ==
|
{"page_id": 51037205, "title": "Boshra Salem"}
|
the parasitic capacitances could be reduced to a minimum. The overlap capacitance with the most adverse consequences on performance was the gate-to-drain parasitic capacitance, Cgd, which, by the well-known Miller effect, augmented the gate-to-source capacitance of the transistor by Cgd multiplied by the gain of the circuit to which that transistor was a part. The impact was a considerable reduction in the switching speed of transistors. In 1966, Robert W. Bower realized that if the gate electrode was defined first, it would be possible not only to minimize the parasitic capacitances between gate and source and drain, but it would also make them insensitive to misalignment. He proposed a method in which the aluminum gate electrode itself was used as a mask to define the source and drain regions of the transistor. However, since aluminum could not withstand the high temperature required for the conventional doping of the source and drain junctions, Bower proposed to use ion implantation, a new doping technique still in development at Hughes Aircraft, his employer, and not yet available at other labs. While Bower’s idea was conceptually sound, in practice it did not work, because it was impossible to adequately passivate the transistors, and repair the radiation damage done to the silicon crystal structure by the ion implantation, since these two operations would have required temperatures in excess of the ones survivable by the aluminum gate. Thus his invention provided a proof of principle, but no commercial integrated circuit was ever produced with Bower’s method. A more refractory gate material was needed. In 1967, John C. Sarace and collaborators at Bell Labs replaced the aluminum gate with an electrode made of vacuum-evaporated amorphous silicon and succeeded in building working self-aligned gate MOS transistors. However, the process, as described, was only a proof of principle, suitable
|
{"page_id": 7876376, "title": "Self-aligned gate"}
|
In a mixed-signal system (analog and digital), a reconstruction filter, sometimes called an anti-imaging filter, is used to construct a smooth analog signal from a digital input, as in the case of a digital to analog converter (DAC) or other sampled data output device. == Sampled data reconstruction filters == The sampling theorem describes why the input of an ADC requires a low-pass analog electronic filter, called the anti-aliasing filter: the sampled input signal must be bandlimited to prevent aliasing (here meaning waves of higher frequency being recorded as a lower frequency). For the same reason, the output of a DAC requires a low-pass analog filter, called a reconstruction filter - because the output signal must be bandlimited, to prevent imaging (meaning Fourier coefficients being reconstructed as spurious high-frequency 'mirrors'). This is an implementation of the Whittaker–Shannon interpolation formula. Ideally, both filters should be brickwall filters, constant phase delay in the pass-band with constant flat frequency response, and zero response from the Nyquist frequency. This can be achieved by a filter with a 'sinc' impulse response. === Implementation === While in theory a DAC outputs a series of discrete Dirac impulses, in practice, a real DAC outputs pulses with finite bandwidth and width. Both idealized Dirac pulses, zero-order held steps and other output pulses, if unfiltered, would contain spurious high-frequency replicas, "or images" of the original bandlimited signal. Thus, the reconstruction filter smooths the waveform to remove image frequencies (copies) above the Nyquist limit. In doing so, it reconstructs the continuous time signal (whether originally sampled, or modelled by digital logic) corresponding to the digital time sequence. Practical filters have non-flat frequency or phase response in the pass band and incomplete suppression of the signal elsewhere. The ideal sinc waveform has an infinite response to a signal, in both the
|
{"page_id": 1875242, "title": "Reconstruction filter"}
|
required. ==== Transmission example on a full-speed device ==== Synchronization Pattern A USB packet begins with an 8-bit synchronization sequence, 00000001₂. That is, after the initial idle state J, the data lines toggle KJKJKJKK. The final 1 bit (repeated K state) marks the end of the sync pattern and the beginning of the USB frame. For high-bandwidth USB, the packet begins with a 32-bit synchronization sequence. End of Packet (EOP) EOP is indicated by the transmitter driving 2 bit times of SE0 (D+ and D− both below max.) and 1 bit time of J state. After this, the transmitter ceases to drive the D+/D− lines and the aforementioned pull-up resistors hold it in the J (idle) state. Sometimes skew due to hubs can add as much as one bit time before the SE0 of the end of packet. This extra bit can also result in a bit stuff violation if the six bits before it in the CRC are 1s. This bit should be ignored by receiver. Bus Reset A USB bus is reset using a prolonged (10 to 20 milliseconds) SE0 signal. === High speed negotiation === A special protocol during reset, called chirping, is used to negotiate the high speed mode with a host or hub. A device that is high speed capable first connects as a full speed device (D+ pulled high), but upon receiving a USB RESET (both D+ and D− driven LOW by host for 10 to 20 ms) it pulls the D− line high, known as chirp K. This indicates to the host that the device is high bandwidth. If the host/hub is also HS capable, it chirps (returns alternating J and K states on D− and D+ lines) letting the device know that the hub operates at high bandwidth. The device has to
|
{"page_id": 57218551, "title": "USB communications"}
|
interface that provide both functionality and pleasant user experience. The goal of mobile interaction researches is to understand the requirements and needs of mobile users. Compared with stationary devices mobile devices have specific, often restricted, input and output requirements. A goal that is often named is to overcome the limitations of mobile devices. However, exploiting the special opportunities of mobile usage can also be seen as a central goal. == Disciplines involved == Mobile interaction is a multidisciplinary area with various academic subjects making contributions. This is a reflection of the complicated nature of an individual's interaction with a computer system. This includes factors such as an understanding of the user and the task the user wants to perform with the system, understanding of the design tools, software packages that are needed to achieve this and an understanding of software engineering tools. The following are the main disciplines involved in mobile interaction: === 1. Psychology === Many of the research methods and system evaluation techniques currently used in mobile human-computer interaction research are borrowed from psychology. As well as attitude measures, performance measures that are used in mobile human-computer interaction research studies come from the area of experimental psychology. Understanding users and their needs is a key aspect in the design of mobile systems, devices, and applications so that they will be easy and enjoyable to use. Individual user characteristics such as age, or personality physical disabilities such as blindness, all have an effect on users' performance when they are using mobile applications and systems, and these individual differences can also affect people's attitude towards the mobile service or device that they interact with. A study from 2020, for example, found that smartphone users initiated 89% of the interactions with their phones, with only 11% of the interactions resulting from
|
{"page_id": 22915254, "title": "Mobile interaction"}
|
The Digital Michelangelo Project was a pioneering initiative undertaken during the 1998–1999 academic year to digitize the sculptures and architecture of Michelangelo using advanced laser scanning technology. The project was led by a team of 30 faculty, staff, and students from Stanford University and the University of Washington, with the aim of creating high-resolution 3D models of Michelangelo's works for scholarly, educational, and preservation purposes. == Objectives == The primary goals of the Digital Michelangelo Project were: To apply recent advancements in laser rangefinder technology for digitizing large cultural artifacts. To create detailed digital archives of Michelangelo's sculptures and architectural spaces for future study and analysis. To explore potential educational and curatorial applications for 3D scanned data. === Artworks digitized === The project involved scanning several iconic works by Michelangelo, including: David The Unfinished Slaves (Atlas, Awakening, Bearded, and Youthful) St. Matthew The allegorical statues from the Medici tombs (Night, Day, Dawn, and Dusk) The architectural interiors of the Tribuna del David at the Galleria dell'Accademia and the New Sacristy in the Medici Chapels. == Technology and methodology == === 3D scanning === The project's primary scanner was a laser triangulation rangefinder mounted on a motorized gantry, custom-built by Cyberware Inc. The scanner used a laser sheet to project onto an object, capturing its shape through triangulation. Multiple scans were taken from various angles and combined into a single, detailed 3D mesh. The resolution achieved was fine enough to capture even Michelangelo's chisel marks, with triangles approximately 0.25 mm on each side. In addition to shape data, color data was captured using a spotlight and a secondary camera, enabling the creation of textured 3D models. === Data processing === The project developed a software suite for processing the scanned data. This included: Aligning and merging multiple scans into a seamless
|
{"page_id": 78793795, "title": "Digital Michelangelo Project"}
|
Robert Lee Grossman is an American computer scientist and bioinformatician at the University of Chicago. His primary research interests are data science and data-intensive computing. == Research == Grossman has worked in several fields. His early work (1984–1990) was in mathematics, where he developed algorithms in symbolic and numeric computing. In 1989, working with Richard Larson, he showed that trees have a natural multiplicative structure and are in fact a Hopf algebra. This algebra, sometimes called the Grossman–Larson algebra, is dual to the Connes-Kreimer algebra, which is one way of organizing the computations required when renormalizing Feynman diagrams. Working with Peter Crouch, he showed that there are Runge–Kutta methods that evolve naturally on Lie groups. From 1990 to 2010, he primarily worked in computer science, specifically, data mining and data intensive computing. With Stuart Bailey and Yunhong Gu, he developed open source software to move large datasets over wide area high performance networks (PTool and the UDP-based Data Transfer Protocol or UDT). With Yunhong Gu, he also developed Sector/Sphere, a distributed platform for data intensive computing. During this period, he also founded the Data Mining Group, which develops data mining standards, and led the technical working group that developed the Predictive Model Markup Language (PMML), which is now the dominant standard in analytics. Since 2010, he has primarily focused on data science and its applications to biology medicine, health care and the environment. He developed the first biomedical cloud that was designated as a NIH Trusted Partner, allowing it to interoperate with NIH's controlled access genomic data. He is currently leading the effort to build the NCI Genomic Data Commons, which will host all the genomic and associated clinical data from NIH/NCI funded research projects and clinical trials. He is a faculty member at the University of Chicago and the
|
{"page_id": 49996380, "title": "Robert L. Grossman"}
|
exp ( − 2 π ) ] = 10 − 1 / 4 ( 5 − 1 ) 1 / 4 R [ exp ( − 2 π ) ] 1 / 2 = = 2 1 / 2 5 − 1 / 8 sin [ 1 4 arctan ( 2 ) ] {\displaystyle {\begin{aligned}H_{M}{\bigl [}\exp(-2\pi ){\bigr ]}&=10^{-1/4}({\sqrt {5}}-1)^{1/4}R{\bigl [}\exp(-2\pi ){\bigr ]}^{1/2}=\\[4pt]&=2^{1/2}\,5^{-1/8}\,{\color {blue}\sin {\bigl [}{\tfrac {1}{4}}\arctan(2){\bigr ]}}\end{aligned}}} The Rogers–Ramanujan continued fraction takes the following ordinate values for these abscissa values: == Dedekind eta function identities == === Derivation by the geometric mean === Given are the mentioned definitions of G M {\displaystyle G_{M}} and H M {\displaystyle H_{M}} in this already mentioned way: G M ( q ) = q − 1 60 1 ( q ; q 5 ) ∞ ( q 4 ; q 5 ) ∞ {\displaystyle G_{M}(q)=q^{\frac {-1}{60}}{\frac {1}{(q;q^{5})_{\infty }(q^{4};q^{5})_{\infty }}}} H M ( q ) = q 11 60 1 ( q 2 ; q 5 ) ∞ ( q 3 ; q 5 ) ∞ {\displaystyle H_{M}(q)=q^{\frac {11}{60}}{\frac {1}{(q^{2};q^{5})_{\infty }(q^{3};q^{5})_{\infty }}}} The Dedekind eta function identities for the functions G and H result by combining only the following two equation chains: The quotient is the Rogers Ramanujan continued fraction accurately: H M ( q ) ÷ G M ( q ) = R ( q ) {\displaystyle H_{M}(q)\div G_{M}(q)=R(q)} But the product leads to a simplified combination of Pochhammer operators: H M ( q ) G M ( q ) = q 1 / 6 1 ( q ; q 5 ) ∞ ( q 4 ; q 5 ) ∞ ( q 2 ; q 5 ) ∞ ( q 3 ; q 5 ) ∞ = {\displaystyle H_{M}(q)\,G_{M}(q)=q^{1/6}{\frac {1}{(q;q^{5})_{\infty }(q^{4};q^{5})_{\infty }(q^{2};q^{5})_{\infty }(q^{3};q^{5})_{\infty }}}=} = q 1 / 6
|
{"page_id": 2324711, "title": "Rogers–Ramanujan identities"}
|
if he/ she has served more than four semesters in a student government elected and/or appointed office, or in any office or position where he/she voted on the expendi - ture of ASU funds in any college. > a. Ten weeks or more in office or service will be counted as a full semester. > b. An officer may serve a fifth semester if eligible at the time of assuming office (e.g. has served three semesters and is a candidate for an office with a one-year term) with the approval of the college president or designee. Please contact the ASU Advisor concerning Administrative Procedures AP 5410. The ASU Constitution provides for a tripartite form of gov - ernment consisting of executive, legislative, and judicial branches. The executive branch is headed by the presi - dent, who serves for a one-year term. He/she/they serve as chairperson of the Board of Directors (BOD), which is composed of elected/appointed officers. The BOD is the legislative branch, which has the power to approve pres - idential appointments. The Inter-Club Council is headed by the ASU Executive Vice President. A judicial branch is developed around a Supreme Court. The court tries all impeachments and reviews BOD legislation. Input is vital if an educational institution wishes to be suc - cessful in adapting to the growing needs of its students. The opportunity for student involvement exists through the ASU. ASU MEMBERSHIP STICKER Membership in the Associated Student Union is important to a quality program of extra and co-curricular activities which includes student government, athletics, clubs, choir, drama, etc. Supporting ASU is beneficial to both the stu - dent and the college. STUDENT ORGANIZATIONS Approximately 40 campus organizations have open mem - bership to students who are members of the Associated Student Union. Service clubs, special interest
|
{"source": 957, "title": "from dpo"}
|
we will use a 0.033 Hz clock so that the machine cycles between states at no faster than once every 30 seconds. There are two output signals: > Inputs Current state Outputs Clock Next-state function Output function Next state > FIGURE B.10.1 A state machine consists of internal storage that contains the state and two combinational functions: the next-state function and the output function. Often, the output function is restricted to take only the current state as its input; this does not change the capability of a sequential machine, but does affect its internals. B.10 Finite-State Machines B-69 > ■ NSlite: When this signal is asserted, the light on the north-south road is green; when this signal is deasserted, the light on the north-south road is red. > ■ EWlite: When this signal is asserted, the light on the east-west road is green; when this signal is deasserted, the light on the east-west road is red. In addition, there are two inputs: > ■ NScar: Indicates that a car is over the detector placed in the roadbed in front of the light on the north-south road (going north or south). > ■ EWcar: Indicates that a car is over the detector placed in the roadbed in front of the light on the east-west road (going east or west). The traffic light should change from one direction to the other only if a car is waiting to go in the other direction; otherwise, the light should continue to show green in the same direction as the last car that crossed the intersection. To implement this simple traffic light we need two states: > ■ NSgreen: The traffic light is green in the north-south direction. > ■ EWgreen: The traffic light is green in the east-west direction. We also need to create
|
{"source": 2304, "title": "from dpo"}
|
SYSTEMS ENGINEERING HANDBOOK at a detailed technical level, plays a pivotal role in bottom-up product realization. A phase product can be verified recursively through - out the project life cycle and on a wide variety of product forms. For example: TYPES OF HARDWARE Breadboard: A low fidelity unit that demonstrates function only without considering form or fit in the case of hardware or platform in the case of software. It often uses commercial and/or ad hoc components and is not intended to provide definitive information regarding operational performance. Brassboard: A medium fidelity functional unit that typically tries to make use of as much operational hardware/software as possible and begins to address scaling issues associated with the operational system. It does not have the engineering pedigree in all aspects, but is structured to be able to operate in simulated operational environments in order to assess performance of critical functions. Engineering Unit: A high fidelity unit that demonstrates critical aspects of the engineering processes involved in the development of the operational unit. Engineering test units are intended to closely resemble the final product (hardware/software) to the maximum extent possible and are built and tested so as to establish confidence that the design will function in the expected environments. In some cases, the engineering unit will become the final product, assuming proper traceability has been exercised over the components and hardware handling. Prototype Unit: The prototype unit demonstrates form, fit, and function at a scale deemed to be representative of the final product operating in its operational environment. A subscale test article provides fidelity sufficient to permit validation of analytical models capable of predicting the behavior of full-scale systems in an operational environment. Qualification Unit: A unit that is the same as the flight unit (form, fit, function, components, etc.) that will be
|
{"source": 4933, "title": "from dpo"}
|
plaintexts. The required memory for the attack is dominated by the storage of the plaintexts and ciphertexts, which is λ × 2108 × 32 = λ × 2113 bytes. The time complexity of Step 2 is dominated by the time complexity of Steps 2(b), 2(d) and 2(f)(i), which is λ×2×2107 ×2124 × 27+4 32 ×12 +2 ×2124 ×228 ×256 × 732 ×12 ≈ λ× 2228 .37 12-round Serpent encryptions. Step 3 has a time complexity of at most φ × 2132 12-round Serpent encryptions. There are λ×2107 plaintext pairs ( Pi,j ,̂ Pi,j ) for a guess of ( KΘ , K 1,18 , K 1,22 , K 1,24 , K 1,25 , K 12 ,1, K 12 ,8, · · · , K 12 ,28 ). Fol-lowing Theorem 2 of , we have that the probability that the correct guess of ( KΘ , K 1,18 , K 1,22 , K 1,24 , K 1,25 , K 12 ,1,K12 ,8, · · · , K 12 ,28 ) is recorded in Step 2(f)(iii) is about 96.6% when λ = 2 18 .8 and φ = 1, and is about 98.8% when λ = 2 16 .5 and φ = 2 104 . Thus, when λ = 2 16 .5 and φ = 2 104 , with a success probability of about 98.8% the at-tack requires 2 125 .5 chosen plaintexts, and has a total time complexity of approximately 2 244 .9 12-round Serpent encryptions. 6.5 Differential-Linear Attack on 11-Round Serpent-192 The 9-round differential-linear distinguisher enables us to break 11-round Serpent-192; the attack is basically the version of the above 12-round Serpent-256 attack when the first round is removed. Let φ = 1, then we get similarly that with a success probability of about 99.5% the attack requires 2 107
|
{"source": 6150, "title": "from dpo"}
|
spectrum, which is observed to contain a series of acoustic peaks at near-equal spacing but different heights. The locations of these peaks depend on cosmological parameters. Matching theory to data, therefore, constrains cosmological parameters. The CMB anisotropy was first discovered by COBE in 1992, though this had too coarse resolution to detect the acoustic peaks. After the discovery of the first acoustic peak by the balloon-borne BOOMERanG experiment in 2000, the power spectrum was precisely observed by WMAP in 2003–2012, and even more precisely by the Planck spacecraft in 2013–2015. The results support the Lambda-CDM model. The observed CMB angular power spectrum provides powerful evidence in support of dark matter, as its precise structure is well fitted by the Lambda-CDM model, but difficult to reproduce with any competing model such as modified Newtonian dynamics (MOND). === Structure formation === Structure formation refers to the period after the Big Bang when density perturbations collapsed to form stars, galaxies, and clusters. Prior to structure formation, the Friedmann solutions to general relativity describe a homogeneous universe. Later, small anisotropies gradually grew and condensed the homogeneous universe into stars, galaxies and larger structures. Ordinary matter is affected by radiation, which is the dominant element of the universe at very early times. As a result, its density perturbations are washed out and unable to condense into structure. If there were only ordinary matter in the universe, there would not have been enough time for density perturbations to grow into the galaxies and clusters currently seen. Dark matter provides a solution to this problem because it is unaffected by radiation. Therefore, its density perturbations can grow first. The resulting gravitational potential acts as an attractive potential well for ordinary matter collapsing later, speeding up the structure formation process. === Sky surveys and baryon acoustic oscillations ===
|
{"page_id": 8651, "title": "Dark matter"}
|
This is a list of topics that are included in high school physics curricula or textbooks. == Mathematical Background == SI Units Scalar (physics) Euclidean vector Motion graphs and derivatives Pythagorean theorem Trigonometry == Motion and forces == Motion Force === Linear motion === Linear motion Displacement Speed Velocity Acceleration Center of mass Mass Momentum Newton's laws of motion Work (physics) Free body diagram === Rotational motion === Angular momentum (Introduction) Angular velocity Centrifugal force Centripetal force Circular motion Tangential velocity Torque == Conservation of energy and momentum == Energy Conservation of energy Elastic collision Inelastic collision Inertia Moment of inertia Momentum Kinetic energy Potential energy Rotational energy == Electricity and magnetism == Ampère's circuital law Capacitor Coulomb's law Diode Direct current Electric charge Electric current Alternating current Electric field Electric potential energy Electron Faraday's law of induction Ion Inductor Joule heating Lenz's law Magnetic field Ohm's law Resistor Transistor Transformer Voltage == Heat == Entropy First law of thermodynamics Heat Heat transfer Second law of thermodynamics Temperature Thermal energy Thermodynamic cycle Volume (thermodynamics) Work (thermodynamics) == Waves == Wave Longitudinal wave Transverse waves Transverse wave Standing Waves Wavelength Frequency Light Light ray Speed of light Sound Speed of sound Radio waves Harmonic oscillator Hooke's law Reflection Refraction Snell's law Refractive index Total internal reflection Diffraction Interference (wave propagation) Polarization (waves) Vibrating string Doppler effect == Gravity == Gravitational potential Newton's law of universal gravitation Newtonian constant of gravitation == See also == Outline of physics Physics education == References == == Further reading ==
|
{"page_id": 36536147, "title": "List of physics concepts in primary and secondary education curricula"}
|
solar cells that assemble into well defined networks. This system exhibits a PCE of 2.04%. Hydrogen bonding guides the morphology. Device efficiency based on co-polymer approaches have yet to cross the 2% barrier, whereas bulk-heterojunction devices exhibit efficiencies >7% in single junction configurations. Fullerene-grafted rod-coil block copolymers have been used to study domain organization. Supramolecular approaches to organic solar cells provide understanding about the macromolecular forces that drive domain separation. == Transparent polymer cells == Transparent or semi-transparent PSCs allow for the absorption of low- or high-energy photons outside the visible spectrum, thus optimizing its sunlight harnessing capabilities and covering a broader absorption spectra. These types of PSCs are ideal for capturing near-infrared or ultraviolet photons due to its low inherent sensitivity to photons within the visible spectrum. Typical PSCs utilize opaque metal electrodes that limit its transparency, and thus its performance. The absorber layer of PSCs are intrinsically semi-transparent. Thus, one approach to achieving a visibly transparent PSC is to modify the top electrode to make it more transparent. Materials such as ITO, ultra-thin metals, metal grids, graphene, and carbon nanotubes have been used to fabricate semi-transparent top electrodes. Yet, the performance of transparent PSCs have shown to be lacking when compared to their opaque electrode PSC counterparts. When the top electrode is made transparent, the cell's ability to trap the electromagnetic field in the absorber layer decreases, resulting in a low PCE. An extensive amount of research is currently being conducted to improve the PCE of such cells. These types of PSCs have been applied to building-integrated photovoltaics, tandem devices, and portable electronics. === Infrared polymer cells === Infrared cells preferentially absorb light in the infrared range rather than visible wavelengths. A 2010 study developed infrared-transparent PSCs with a CNT film top electrode on the back side and
|
{"page_id": 18397250, "title": "Organic solar cell"}
|
Thickness in geology and mining refers to the distance across a packet of rock, whether it be a facies, stratum, bed, seam, lode etc. Thickness is measured at right angles to the surface of the seam or bed and thus independently of its spatial orientation. The concept of thickness came originally from mining language, where it was used mainly to indicate the workability of seams. It has since become an established term in earth science, for example in geology, for the depth of sedimentary rocks, in hydrogeology for the vertical extent of groundwater – i.e. the distance from the base of the groundwater layer to its surface – or in soil science for the vertical extent of soil horizons. == Literature == Walter Bischoff, Heinz Bramann, Westfälische Berggewerkschaftskasse Bochum: Das kleine Bergbaulexikon. 7th edn., Verlag Glückauf GmbH, Essen, 1988, ISBN 3-7739-0501-7. Heinz Kundel: Kohlengewinnung. 6. Auflage, Verlag Glückauf GmbH, Essen, 1983, ISBN 3-7739-0389-8.
|
{"page_id": 53760606, "title": "Thickness (geology)"}
|
Hyperluminous quasar discovered by a Japanese team of astronomers, led by Yoshiki Toba (NAOJ), among the sources identified by eROSITA instrument, on board the Spektr-RG spacecraft. This quasar, emitting from Radio to X-ray, would have a redshift z=1.62. The mass of SMBH in the core of the host galaxy, would be pair to 620 million solar masses. By the researchres, the IR luminosity of this object would be 68 trillion solar luminosity, with an Eddington ratio of 3.6. Tha SFR would be as high as a thousand solar masses/yr. Toba and colleagues have used facilities at Seimei Telescope, and at the James Clerk Maxwell Telescope (JCMT) for this study. == References ==
|
{"page_id": 77728654, "title": "EFEDSJ0828–0139"}
|
= π p {\displaystyle DP={\frac {N}{d}}={\frac {\pi }{p}}} Ratio of the number of teeth to the pitch diameter. Could be measured in teeth per inch or teeth per centimeter, but conventionally has units of per inch of diameter. Where the module, m, is in metric units D P = 25.4 m {\displaystyle DP={\frac {25.4}{m}}} in imperial units Base circle In involute gears, the tooth profile is generated by the involute of the base circle. The radius of the base circle is somewhat smaller than that of the pitch circle Base pitch, normal pitch, pb In involute gears, distance from one face of a tooth to the corresponding face of an adjacent tooth on the same gear, measured along the base circle Interference Contact between teeth other than at the intended parts of their surfaces Interchangeable set A set of gears, any of which mates properly with any other === Helical gear === Helix angle, ψ the Angle between a tangent to the helix and the gear axis. It is zero in the limiting case of a spur gear, albeit it can be considered as the hypotenuse angle as well. Normal circular pitch, pn Circular pitch in the plane normal to the teeth. Transverse circular pitch, p Circular pitch in the plane of rotation of the gear. Sometimes just called "circular pitch". p n = p cos ( ψ ) {\displaystyle p_{n}=p\cos(\psi )} Several other helix parameters can be viewed either in the normal or transverse planes. The subscript n usually indicates the normal. === Worm gear === Lead Distance from any point on a thread to the corresponding point on the next turn of the same thread, measured parallel to the axis. Linear pitch, p Distance from any point on a thread to the corresponding point on the adjacent
|
{"page_id": 82916, "title": "Gear"}
|
printing in tissue engineering for the development of Bone scaffolds. Bone scaffolds are typically made of porous biodegradable materials that provide the mechanical support during repair regeneration of damaged and diseased bone. The design of the scaffolds presents a surface that promotes cell attachments, growth, and differentiation, while providing a porous network for tissue growth. For bone scaffold continuous ingrowth of bone tissue, interconnected porosity is important as it can allow nutrients and molecules to transport to inner parts of scaffold to facilitate cell ingrowth, vascularization, as well as waste material removal. The 3D bioprinting method has been used to fabricate more ideal structural scaffolds with better control of pore morphology, pore size and porosity. 3D printing can be essential to bone scaffolds as it takes into account the high degree of porosity together with high mechanical strength, which is critical for the bone scaffold to perform. === Heart Muscle Scaffolds === Cardiac muscle, on the other hand, has an elastic modulus of only around 10 MPa, 3 orders of magnitude smaller than bone. However, it experiences constant cyclic loading as the heart pumps. This means that the scaffold must be both tough and elastic, a property achieved using polymeric materials. === Spinal Cord Engineering === Source: Spinal cord injury can be seriously detrimental to normal form and function in the human body, often leading to major loss of motor and sensory function that can even affect the whole of the body below the injury level. The number of global spinal cord injury cases rose to 27.04 million in 2016 where each patient can cost the economy from $1–5 million for a given case. As a result, there is a significant need for novel solutions to address the issue. Novel biomaterial and tissue engineering strategies have been developed recently to
|
{"page_id": 21880823, "title": "Nano-scaffold"}
|
1960s. This stimulated MIM's interest in the Sirosmelt lance, which was seen as a way to produce a robust submerged lance. Following the copper slag trials of 1976–1978, MIM initiated a joint project with the CSIRO in 1978 to investigate the possibility of applying Sirosmelt lances to lead smelting. The work began with computer modelling the equilibrium thermodynamics (1978) and was followed by laboratory bench-scale test work using large alumina silicate crucibles (1978–1979). The results were sufficiently encouraging that MIM built a 120 kg/h test rig in Mount Isa. It began operation in September 1980. This was used to develop a two-stage process to produce lead bullion from Mount Isa lead concentrate. The first stage was an oxidation step that removed virtually all the sulfur from the feed, oxidising the contained lead to lead oxide (PbO) that was largely collected in the slag (some was carried out of the furnace as lead oxide fume that was returned for lead recovery). The second stage was a reduction step in which the oxygen was removed from the lead to form lead metal. ==== The lead ISASMELT pilot plant (1983–1990) ==== Following the 120 kg/h test work, MIM decided to proceed to install a 5 t/h lead ISASMELT pilot plant in its Mount Isa lead smelter. It bought Aberfoyle's matte fuming furnace and transported it from Kalgoorlie to Mount Isa, where it was rebuilt and commissioned in 1983 to demonstrate the first stage of the process in continuous operation and for testing the reduction step using batches of high-lead slag. One of the key features of the pilot plant was that it was run by operations’ personnel in the lead smelter as though it was an operations’ plant. The high lead slag produced by the continuous smelting of the lead concentrate was subsequently
|
{"page_id": 39223191, "title": "ISASMELT"}
|
=== In Jordan, Adnan Badran, deputy director of UNESCO from 1992 to 1998, organised a meeting with representatives from universities and other organisations. No government members could be met, and no commitment was obtained. In a last ditch effort to save the project, Schopper contacted his former student Isa Khubeis, then vice-president of Al-Balqa Applied University. Khubeis invited Iaccarino and Schopper to dinner along with Khaled Toukan, President of Al-Balqa University, and Prince Ghazi Bin Muhammad, who chairman of the Board of Governors of the university and a close advisor of King Abdullah II. Schopper explained the situation to Prince Ghazi, who arranged a meeting with King Abdullah for the following day. King Abdullah formally committed Jordan to the project during the meeting in a signed letter addressed to the Director General of UNESCO. After long discussions and a series of votes, Jordan was formally approved to be the host of the Centre at the third meeting of the SESAME Interim Council in June 2000. Egypt and Iran withdrew their proposals before the final round of voting. The decision was ratified by 9 votes in favour and 1 abstention. Jordan was seen as an appropriate location for the project because it was the only country at the time to have maintained diplomatic relations with all other founding members: Bahrain, Cyprus, Egypt, Iran, Israel, Pakistan, the Palestinian Authority, and Turkey. == Cost == The project cost around $98 million, with $5 million donated each by Jordan, Israel, Turkey, Iran and the European Union. The rest was in kind donations of equipment by CERN, and land by Jordan (the largest contributor to the project). Jordan also contributed the building construction costs, and a $7 million solar power plant, making SESAME the first accelerator in the world powered solely by renewable energy. The
|
{"page_id": 12260613, "title": "Synchrotron-Light for Experimental Science and Applications in the Middle East"}
|
The Knight keyboard, designed by Tom Knight, was used with the MIT-AI lab's bitmapped display system. It was a precursor to the space-cadet keyboard and the later Symbolics keyboard. == Influence == The Knight keyboard is notable for its influence on Emacs keybindings, particularly for helping popularize the meta key, which originated with the Stanford keyboard. The layout is also noteworthy: the meta key was outside the control key, which is opposite from the layout used on most modern keyboards, dating to the Model M IBM PC keyboard, which uses the Alt key instead, and places it inward to the control key. == References == == External links == Xah Lee (2011-10-27). "Space-cadet Keyboard and Lisp Machine Keyboards".
|
{"page_id": 9677898, "title": "Knight keyboard"}
|
on green cherries. The cherries dry out and may drop off. Yield loss can be huge. Diseased material must be removed. Copper-based fungicides work. Resistant varieties exist, but their cup quality can be mediocre. Brown eye spot, coffee leaf spot, coffee eye spot, berry blotch or berry spot disease Cercospora coffeicola Worldwide Brown spots on the leaves, which sometimes drop. Red cherries may have dark spots. The disease spreads by wind and water. Nurseries to be given special attention. Good fertilizers and intensive pruning reduce the risks. Exposed material to be removed and destroyed. Copper-holding fungicides are sometimes used. American Leaf Spot Mycena citricolor Mainly Latin America and the Caribbean Affects all plant parts – stems, branches, leaves and fruits. Subcircular brown spots are formed on leaves, which turn pale brown to straw-coloured, eventually causing leaf fall. Copper-based fungicides alternated with modern triazoles with systemic effect. Good cultural practices such as weed control, pruning and shade control can reduce disease intensity. Pest problem: Viruses Coffee ringspot virus The Americas and Philippines Characterized by clear ringspot symptoms on leaves and cherries that may be deformed. Transmitted by a mite. Damage can result in subsequent fungal diseases. No obvious treatment. Destruction and replanting with proper seed selection can be necessary. Seen mainly in Brazil in the early 2000s. Emaravirus Hawaii Carried by mites on leaves, which get spots. Infected trees have to be destroyed. The disease is not treatable like fungal infections. CHAPTER 5 – COFFEE QUALITY FROM SEED TO CUP 164 Name of disease or pest Distribution range Symptoms and damage Pest management and remedies Pest problem: Bacteria Bacterial blight Pseudomonas syringae East Africa and South America
|
{"source": 1026, "title": "from dpo"}
|
if m ≥ mH() then for every distribution D it holds that with probability of at least 1 − δ0, LD (A(S)) ≤ min h∈H LD (h) + .Suggest a procedure that relies on A and learns H in the usual agnostic PAC learning model and has a sample complexity of mH(, δ ) ≤ k m H() + ⌈ 2 log(4 k/δ ) 2 ⌉ , where k = dlog( δ)/ log( δ0)e. Hint: Divide the data into k + 1 chunks, where each of the first k chunks is of size mH() examples. Train the first k chunks using A. Argue that the probability that for all of these chunks we have LD (A(S)) > min h∈H LD (h)+ is at most δk > 0 ≤ δ/ 2. Finally, use the last chunk to choose from the k hypotheses that A generated from the k chunks (by relying on Corollary 4.6). 2. Prove that the function h given in Equation (10.5) equals the piece-wise con-stant function defined according to the same thresholds as h.3. We have informally argued that the AdaBoost algorithm uses the weighting mechanism to “force” the weak learner to focus on the problematic examples in the next iteration. In this question we will find some rigorous justification for this argument. 10.7 Exercises 143 Show that the error of ht w.r.t. the distribution D(t+1) is exactly 1 /2. That is, show that for every t ∈ [T ] > m ∑ > i=1 D(t+1) > i 1[yi6 =ht(xi)] = 1 /2. 4. In this exercise we discuss the VC-dimension of classes of the form L(B, T ). We proved an upper bound of O(dT log( dT )), where d = VCdim( B). Here we wish to prove an almost matching lower bound. However, that will
|
{"source": 3334, "title": "from dpo"}
|
is regarded as correct). We’ll see in Section 6.3.3 how, using this solution as an ingredient, we can build a data structure for the original version of the nearest neighbor problem. Recall that upper bounds on communication complexity are always suspect — by design, the computational model is extremely powerful so that lower bounds are as impressive as possible. There are cases, however, where designing a good communication protocol reveals 6.3 An Upper Bound: Biased Random Inner Products 89 the key idea for a solution that is realizable in a reasonable computational model. Next is the biggest example of this that we’ll see in the course. In the special case where S contains only one point, the decision version of the (1 + )-approximate nearest neighbor problem resembles two other problems that we’ve studied before in other contexts, one easy and one hard. 1. Equality . Recall that when Alice and Bob just want to decide whether their inputs are the same or different — equivalently, deciding between Hamming distance 0 and Hamming distance at least 1 — there is an unreasonably effective (public-coin) randomized communication protocol for the problem. Alice and Bob interpret the first 2n public coins as two random n-bits strings r1, r2. Alice sends the inner product modulo 2 of her input x with r1 and r2 (2 bits) to Bob. Bob accepts if and only if the two inner products modulo 2 of his input y with r1, r2 match those of Alice. This protocol never rejects inputs with x = y, and accepts inputs with x 6 = y with probability 1/4.2. Gap-Hamming . Recall in this problem Alice and Bob want to decide between the cases where the Hamming distance between their inputs is at most n > 2 − √n, or at
|
{"source": 5222, "title": "from dpo"}
|
= g{x\, ..., xn). Hástad (1998) later improved this lower bound to íl(n 3~°^). This is at present the largest known lower bound for the formula complexity of an NP-function of n variables over a complete basis. The method of Subbotovskaya is based on random restrictions similar to the ones used in Section 12.2. The main lemma is the following. Lemma 12.5.1 Let f = f(x\, ..., xn) be a nonatom Boolean function of n vari-ables. Then there is an i, 1 < i < n, and an e G {0,1} such that for the function g = f(xi, ..., XÍ-I,E, Xi+\, ..., xn) ofn — 1 variables obtainedfrom f by substi-tuting X{ = e, the following inequality holds: # (L(g) + 1) < (l - A ) ( L ( / ) + i) < (\ _ £) ( L ( / ) + 1} . Proof. Fix a formula F computing / with l = L(f) AND and O R gates. F can be represented by a binary tree each of whose l + 1 leaves is labeled by an atom x¿ or x¡. Let us choose, randomly, a variable x¿, 1 < i < n, according to a uniform distribution, and assign to it a random binary valué e G {0,1}. When we substitute the valúes e and 1 — e to x¿ and ~x¡, respectively, the number of leaves in F is reduced; the expected number of leaves omitted in this manner is (l + \)/n. However, further reduction may oceur. 218 CIRCUIT COMPLEXITY Indeed, suppose a leaf is labeled x¿ and it feeds, say, an AND gate x¿ A H in F. Observe that we may assume that the variable x¿ does not appear in the subformula H, as otherwise F can be simplified by
|
{"source": 6424, "title": "from dpo"}
|
as a reduced partition function ratio, a simplified form of the Bigeleisen–Mayer equation notated mathematically as s s ′ f {\displaystyle {\frac {s}{s'}}f} or ( Q ∗ Q ) r {\displaystyle ({\frac {Q^{*}}{Q}})_{r}} . The reduced partition function ratio can be derived from power series expansion of the function and allows the partition functions to be expressed in terms of frequency. It can be used to relate molecular vibrations and intermolecular forces to equilibrium isotope effects. As the model is an approximation, many applications append corrections for improved accuracy. Some common, significant modifications to the equation include accounting for pressure effects, nuclear geometry, and corrections for anharmonicity and quantum mechanical effects. For example, hydrogen isotope exchange reactions have been shown to disagree with the requisite assumptions for the model but correction techniques using path integral methods have been suggested. == History of discovery == One aim of the Manhattan Project was increasing the availability of concentrated radioactive and stable isotopes, in particular 14C, 35S, 32P, and deuterium for heavy water. Harold Urey, Nobel laureate physical chemist known for his discovery of deuterium, became its head of isotope separation research while a professor at Columbia University.: 45 In 1945, he joined The Institute for Nuclear Studies at the University of Chicago, where he continued to work with chemist Jacob Bigeleisen and physicist Maria Mayer, both also veterans of isotopic research in the Manhattan Project. In 1946, Urey delivered the Liversidge lecture at the then-Royal Institute of Chemistry, where he outlined his proposed model of stable isotope fractionation. Bigeleisen and Mayer had been working on similar work since at least 1944 and, in 1947, published their model independently from Urey. Their calculations were mathematically equivalent to a 1943 derivation of the reduced partition function by German physicist Ludwig Waldmann. == Applications ==
|
{"page_id": 68305758, "title": "Urey–Bigeleisen–Mayer equation"}
|
He expands his metaphor by describing the underside of the epigenetic landscape. Here we see that the "landscape" is really more like a giant sheet that would blow away except that a series of tension-bearing cables holds it down. The pegs that connect the cables to the ground are the genes. The cables themselves are the epigenetic factors that influence gene expression in various regions of the embryo. The depth and direction of the channels is thus determined by a combination of genetic makeup and the epigenetic feedback loops by which genes are regulated. While Waddington does assert that the process of development is genetically driven, he makes no attempt to explain how this works and even offers evidence to the contrary. He observes, for instance, that genes ordinarily determine peripheral traits, such as eye color, rather than "focal" traits, such as the structure of the eye itself. Moreover, when genetic mutation influences basic structures, the result tends to be the complete transformation of a structure into another rather than piecemeal change, which Waddington illustrates with the developmental ball rolling out of one creode into another. Thus his account gives the impression that genes influence development, perhaps altering the course of a region of cells, without determining the endpoints toward which the embryo develops. This interpretation is further reinforced by Waddington's discussion of the organization of the gene pool, where he points out that "the epigenetic process occurring during the development of the organism might be so buffered or canalized that the optimum end-result is produced irrespective of the genes which the individual contains." The more deeply creodes are carved into the epigenetic landscape, the weaker the influence of genes over development. He also argues that deep creodes will resist not only genetic but environmental pressures to change course. This
|
{"page_id": 1006356, "title": "Creode"}
|
taught at the Stanford Graduate School of Business from 1979 until 1985, was a visiting professor at New York University and went on to become a tenured professor at Princeton University in the Department of Economics. He chaired that department from 1996 until September 2002, when he went on public service leave. He resigned his position at Princeton July 1, 2005. Bernanke served as a member of the Board of Governors of the Federal Reserve System from 2002 to 2005. In one of his first speeches as a governor, entitled "Deflation: Making Sure It Doesn't Happen Here", he outlined what has been referred to as the Bernanke doctrine. As a member of the board of governors of the Federal Reserve System on February 20, 2004, Bernanke gave a speech in which he postulated that we are in a new era called the Great Moderation, where modern macroeconomic policy has decreased the volatility of the business cycle to the point that it should no longer be a central issue in economics. In June 2005, Bernanke was named chairman of President George W. Bush's Council of Economic Advisers and resigned as Fed governor. The appointment was largely viewed as a test run to ascertain if Bernanke could be Bush's pick to succeed Greenspan as Fed chairman the next year. He held the post until January 2006. == Chairman of the United States Federal Reserve == On February 1, 2006, Bernanke began a fourteen-year term as a member of the Federal Reserve Board of Governors and a four-year term as chairman. By virtue of the chairmanship, he sat on the Financial Stability Oversight Board that oversees the Troubled Asset Relief Program. He also served as chairman of the Federal Open Market Committee, the System's principal monetary policy making body. His first months as
|
{"page_id": 1838387, "title": "Ben Bernanke"}
|
Ganapath: A Hero is Born is a 2023 Indian Hindi-language dystopian sports action film written and directed by Vikas Bahl, who also produced the film in association with Jackky Bhagnani, Vashu Bhagnani and Deepshikha Deshmukh. It stars Tiger Shroff in a dual role alongside Kriti Sanon, Elli AvrRam and Rahman, while Amitabh Bachchan made in cameo appearance. The film was announced in November 2020 and underwent a long, heavy pre-production stage. Principal photography commenced in November 2021 and wrapped up in February 2023 with filming taking place in United Kingdom, Ladakh and Mumbai. Ganapath was released theatrically on 20 October 2023 and received mixed-to-negative reviews from critics and became a box office bomb. == Plot == In the year 2070, a destructive war leaves the world divided by a towering wall, with the rich people residing in a city called Silver City led by the Dalini, while the poor people survives in a destroyed city and struggles for basic necessities as it was controlled by the Silver City. Meanwhile, Guddu resides in the Silver City and works for Dalini's henchmen John, who conducts boxing matches and earns money through the bets placed by the rich people. One day, John tells Guddu to take Dimple, John's girlfriend, to a nightclub as he is busy on a meeting. Dimple gets physical with Guddu, where John catches them red-handed and buries them alive. Guddu miraculously survives and Kaizad asks him to move away to the city of poor people and meet Shiva, a combat trainer. Guddu learns that he is actually Ganapath, a legendary saviour of the poor people, as predicted by Maharishi Dalapathi. Guddu receives combat training under Shiva and his confidante Jassi, where he ultimately embraces himself as Ganapath and deceives John, Dalini and their henchmen into believing that he is
|
{"page_id": 69236234, "title": "Ganapath"}
|
before the position 1 of the delimiter. As soon as the delimiter is set on a position where this condition is not met, we stop, move the delimiter to this position, and start again by marking this position as a new initial position (i.e., position 1). Keep iterating until the end of the sequence. The Lempel–Ziv complexity corresponds to the number of iterations needed to finish this procedure. Said differently, the Lempel–Ziv complexity is the number of different sub-strings (or sub-words) encountered as the binary sequence is viewed as a stream (from left to right). == Formal explanations == The method proposed by Lempel and Ziv uses three notions: reproducibility, producibility and exhaustive history of a sequence, that we defined here. === Notations === Let S be a binary sequence of length n (i.e., n {\displaystyle n} symbols taking value 0 or 1). Let S ( i , j ) {\displaystyle S(i,j)} , with 1 ≤ i , j ≤ n {\displaystyle 1\leq i,j\leq n} , be the sub-word of S {\displaystyle S} from index i to index j (if j < i , S ( i , j ) {\displaystyle j<i,S(i,j)} is the empty string). The length n of S is denoted l ( S ) {\displaystyle l(S)} , and a sequence Q {\displaystyle Q} is said to be a fixed prefix of S {\displaystyle S} if: ∃ j < l ( S ) , s.t. S ( 1 , j ) = Q . {\displaystyle \exists j<{l(S),{\text{ s.t. }}S(1,j)=Q.}} === Reproducibility and producibility === On the one hand, a sequence S of length n is said to be reproducible from its prefix S(1,j) when S(j+1,n) is a sub-word of S(1,j). This is denoted S(1,j)→S. Said differently, S is reproducible from its prefix S(1,j) if the rest of the
|
{"page_id": 54061907, "title": "Lempel–Ziv complexity"}
|
degradation in natural waters can be three to seven times greater. Surprisingly, the pH and the temperature of the water do not affect the photodegradation significantly. It is mainly degraded by aerobic microorganisms in soils. == Mechanism of action == Hexazinone is a broad-spectrum residual and contact herbicide, rapidly absorbed by the leaves and roots. It is tolerated by many conifers, and therefore it is a very effective herbicide for the control for annual and perennial broadleaf weeds, some grasses, and some woody species. Hexazinone works as rain or snowmelt makes it possible for the herbicide to move downward into the soil. There the hexazinone is absorbed from the soil by the roots. It moves through the conductive tissues to the leaves, where it blocks the photosynthesis of the plant within the chloroplasts. Hexazinone binds to a protein of the photosystem II complex, which blocks the electron transport. The result are multiple following reactions. First triplet-state chlorophyll reacts with oxygen to form singlet oxygen. Both chlorophyll and singlet oxygen then remove hydrogen ions from the unsaturated lipids present in de cells and the organelle membranes, forming lipid radicals. These radicals will oxidize other lipids and proteins, eventually resulting in loss of the membrane integrity of the cells and organelles. This will result in a loss of chlorophyll, leakage of cellular contents, cell death, and eventually death of the plant. Woody plants first show yellowing of the leaves before they start to defoliate, eventually they will die. Sometimes plants are able to refoliate and defoliate again during the growing season. == References == == External links == DuPont webpage on Velpar Hexazinone in the Pesticide Properties DataBase (PPDB)
|
{"page_id": 2717521, "title": "Hexazinone"}
|
Magic Leap, Inc. is an American technology company that released a head-mounted augmented reality display, called Magic Leap One, which superimposes 3D computer-generated imagery over real world objects. It is attempting to construct a light-field chip using silicon photonics. Magic Leap was founded by Rony Abovitz in 2010 and has raised $2.6 billion from a list of investors including Google and Alibaba Group. In December 2016, Forbes estimated that Magic Leap was worth $4.5 billion. On July 11, 2018, AT&T invested in the company and became its exclusive partner. On August 8, 2018, the Magic Leap One was made available in the United States through AT&T. On May 28, 2020, Rony Abovitz announced that Magic Leap had raised $350 million in new funding and that he would be stepping down as CEO. On July 7, 2020, the company announced their new CEO would be former Microsoft executive Peggy Johnson. == History == === 2010–2014: founding and secrecy === Magic Leap was founded by Rony Abovitz in 2010. According to past versions of its website, the startup evolved from a company named "Magic Leap Studios" which around 2010 was working on a graphic novel and a feature film series, and in 2011 became a corporation, releasing an augmented reality app at Comic-Con that year. In October 2014, when the company was still operating in stealth mode (but already reported to be working on projects relating to augmented reality and computer vision), it raised more than $540 million of venture funding from Google, Qualcomm, Andreessen Horowitz and Kleiner Perkins, among other investors. A November 2014 analysis by Gizmodo, based on job listings, trademark registrations and patent applications from Magic Leap, concluded that the company appeared to be building a competitor to the Google Glass and Oculus Rift that would "blend computer-generated graphics
|
{"page_id": 44178166, "title": "Magic Leap"}
|
Urbain Jean Joseph Le Verrier (French: [yʁbɛ̃ ʒɑ̃ ʒozɛf lə vɛʁje]; 11 March 1811 – 23 September 1877) was a French astronomer and mathematician who specialized in celestial mechanics and is best known for predicting the existence and position of Neptune using only mathematics. The calculations were made to explain discrepancies with Uranus's orbit and the laws of Kepler and Newton. Le Verrier sent the coordinates to Johann Gottfried Galle in Berlin, asking him to verify. Galle found Neptune the same night he received Le Verrier's letter, within 1° of the predicted position. The discovery of Neptune is widely regarded as a dramatic validation of celestial mechanics, and is one of the most remarkable moments of 19th-century science. == Life == === Early years === Urbain Le Verrier was born at Saint-Lô, Manche, France, to a modest bourgeois family, his parents being Louis-Baptiste Le Verrier and Marie-Jeanne-Josephine-Pauline de Baudre. He studied at the École Polytechnique – briefly chemistry, under Gay-Lussac, writing papers on the combinations of phosphorus and hydrogen, and of phosphorus and oxygen. He then switched to astronomy, particularly celestial mechanics, and accepted a job at the Paris Observatory. He spent most of his professional life there, eventually becoming director of the institution, 1854–1870 and again 1873–1877. In 1846 Le Verrier became a member of the French Academy of Sciences, and in 1855 was elected a foreign member of the Royal Swedish Academy of Sciences. His name is one of the 72 names inscribed on the Eiffel Tower. === Career === ==== Early work ==== Le Verrier's first work in astronomy was presented to the Académie des Sciences in September 1839, entitled Sur les variations séculaires des orbites des planètes (On the Secular Variations of the Orbits of the Planets). This work addressed the then most-important question in astronomy:
|
{"page_id": 176356, "title": "Urbain Le Verrier"}
|
country's disillusionment with institutions enabled Donald Trump's election. === Perceived risk === Risk perception barriers include worrying about whether financial or temporal investments will pay off. An example of a financial investment is solar panels which are initially costly. A temporal investment can simply be spending the time to do research on the topic instead of doing something else. There exists the concept of psychological distance, where people tend to discount future risks when making trade-offs between cost and benefits, and instead prioritize immediate day-to-day concerns. Spatial distance allows individuals to disregard any risks, and instead consider them more likely for other people and places than for themselves. This barrier can simply be thought of as "out of sight, out of mind." Additionally, people typically underestimate the likelihood of being affected by natural disasters, as well as the degree to which others are concerned about environmental issues. Furthermore, the human brain privileges experience over analysis: personal experiences with extreme weather events can influence risk perceptions, beliefs, behaviour and policy support, whereas statistical information by itself means very little to most people. It has been hypothesised many times that no matter how strong the climate knowledge provided by risk analysts, experts and scientists is, risk perception determines agents' ultimate response in terms of mitigation. However, recent literature reports conflicting evidence about the actual impact of risk perception on agents’ climate response. Rather, a no-direct perception-response link with the mediation and moderation of many other factors and a strong dependency on the context analysed is shown. Some moderation factors considered as such in the specialised literature include communication and social norms. Yet, conflicting evidence of the disparity between public communication about climate change and the lack of behavioural change has also been observed in the general public. Likewise, doubts are raised about
|
{"page_id": 59742900, "title": "Barriers to pro-environmental behaviour"}
|
which they generated from selling a special pink-colored Mercy skin where all proceeds went towards it. By July 2019, total in-game spending in Overwatch exceeded one billion dollars as estimated by SuperData, the sixth Activision-Blizzard product line to reach this metric. === Controversies === While the developers were aiming to avoid sexualization of the characters, there was some criticism of the female characters of the game during its development. In February 2015, Anita Sarkeesian commented on the lack of diversity in the female heroes' body types from the game's first twelve revealed characters, while Nathan Grayson of Kotaku remarked that "Overwatch's women are mostly super slim and clad in cat suits." In March 2015, the development team revealed a new character, Zarya, who is a female Russian bodybuilder with a muscular body, and pledged commitment to diversity. Following promotional images featuring the female character Tracer in March 2016, a thread on Blizzard's official forums drew attention to one of Tracer's victory poses, which was criticized by a user as out of character and oversexualized. Kaplan apologized for the pose, stating "The last thing we want to do is make someone feel uncomfortable, under-appreciated or misrepresented," and confirmed that Blizzard planned to replace the pose. Kaplan's response drew mixed reactions from the gaming community, with many claiming Blizzard had forgone its creative control over the game and censored its content to placate one offended user, while others praised Blizzard's willingness to listen to the community and adhere to standards for portraying a character according to their personality. Kaplan later stated that the team was already unsure of the pose and was thinking of changing it. The following week, a replacement pose was released, although it was noted to be similar to the original pose. The replacement pose was alleged to be
|
{"page_id": 44331238, "title": "Overwatch (video game)"}
|
certified drainage pump tests. Certification documents must be in US customary units. Submit the factory original hard copy and 2 copies as PDF files on 2 CDs or DVDs. Send to OSD, Documents Unit. The Department will not accept a facsimile copy. Notify the Engineer of the submittal. Include in the notification the date and contents of the submittal. Factory-certified test documents for each drainage pump must include: 1. Generated pump curve from the cutoff head to the minimum dynamic head shown. Show on the pump curve: 1.1. Identified test points used to generate the pump curve. 1.2. Plot of the design pump rates and dynamic heads shown on the pump curve. 1.3. Identified and plotted test point horsepower and efficiencies on the pump curve. 2. Data that confirms the pump develops from 97 to 100 percent of the motor nameplate power at the point the pump requires maximum power. 3. Motor rpm. 4. Impeller final diameter. 74-2.01D Quality Assurance 74-2.01D(1) General Reserved 74-2.01D(2) Regulatory Requirements Drainage pumps must be factory certified under ANSI/HI 14.6. Each pump certification must be for the actual motor, pump, and trimmed impeller combination delivered to the job site. The impeller balancing must be factory certified under ISO 1940-1, ISO Balance Quality Grade G6.3, at the supplied motor rpm. 74-2.02 MATERIALS 74-2.02A General Reserved 74-2.02B Drainage Pumps and Pumping Apparatus 74-2.02B(1) General Reserved SECTION 74 PUMPING EQUIPMENT AND CONTROLS 991 74-2.02B(2) Drainage Pump Drainage pumps must be submersible, end-suction, single-stage, close-coupled, overhung-impeller, centrifugal wastewater pumps complying with ANSI/HI 1.1-1.2 and ANSI/HI 1.3. Pumps must be assembled and tested at the factory. Do not use a base elbow mounted pump. Drainage pumps must be coated with the manufacturer's standard finish for the intended use. Drainage pumps must be the rpm and voltage shown and comply with
|
{"source": 1498, "title": "from dpo"}
|
loafs loam loamier loamiest loamy loan loaned loaner loaners loaning loans loansharking loanword loanwords loath loathe loathed loather loathers loathes loathing loathings loathsome loathsomely loathsomeness loaves lob Lobachevsky lobar lobbed lobber lobbers lobbied lobbies lobbing lobby lobbying lobbyist lobbyists lobe lobed lobes lobotomies lobotomise lobotomised lobotomises lobotomising lobotomy lobs lobster lobsters local locale locales localisation localise localised localises localising localities locality locally locals locate located locates locating location locations locator locators locavore locavores Lochinvar loci lock lockable Locke Lockean locked locker lockers locket lockets Lockheed locking lockjaw lockout lockouts locks locksmith locksmiths lockstep lockup lockups Lockwood loco locomotion locomotive locomotives locos locoweed locoweeds locum locums locus locust locusts locution locutions lode lodes lodestar lodestars lodestone lodestones lodge Lodge lodged lodger lodgers lodges lodging lodgings Lodz Loewe Loewi Loews loft lofted loftier loftiest loftily loftiness lofting lofts lofty log Logan loganberries loganberry logarithm logarithmic logarithms logbook logbooks loge loges logged logger loggerhead loggerheads loggers loggia loggias logging logic logical logicality logically logician logicians logier logiest login logins logistic logistical logistically logistics logjam logjams logo LOGO logoff logoffs logon logons logos logotype logotypes logout logouts logrolling logs logy Lohengrin loin loincloth loincloths loins Loire Lois loiter loitered loiterer loiterers loitering loiters Loki Lola lolcat lolcats Lolita loll Lollard lolled lollies lolling lollipop lollipops Lollobrigida lollop lolloped lolloping lollops lolls lolly lollygag lollygagged lollygagging lollygags Lombard Lombardi Lombardy Lome Lon London Londoner Londoners lone lonelier loneliest loneliness lonely loner loners lonesome lonesomely lonesomeness long Long longboat longboats longbow longbows longed longer longest longevity Longfellow longhair longhairs longhand longhorn longhorns longhouse longhouses longing longingly longings longish longitude longitudes longitudinal longitudinally longs longshoreman longshoremen longsighted longstanding Longstreet longtime Longueuil longueur longueurs longways Lonnie loo loofah loofahs look lookalike lookalikes looked looker lookers looking lookout lookouts looks lookup loom loomed looming looms loon loonie loonier loonies
|
{"source": 3879, "title": "from dpo"}
|
actual security requirements. Evaluation of customized systems will address the perceived requirements, but you now ask the non-expert user to confirm that the security requirements have been properly captured. If further help is provided at this stage, you start to cross the borderline between a security evaluation intended for the general public and the job of a security consultant who advises a particular client. What is the Method of the Evaluation? The credibility of evaluation very much hinges on the methods used in evaluation. An evaluation method should prevent two situations from arising: 1. An evaluated product is later found to contain a serious flaw. 2. Different evaluations of the same product disagree in their assessment of the product. Repeatability (re-evaluation by the same team gives the same result) and reproducibility (re-evaluation by a different team gives the same result) are therefore often stated as requirements of an evaluation methodology. Security evaluation can be product-oriented or process-oriented. Product-oriented (inves-tigational ) methods examine and test the product. They may tell more about the product than process-oriented methods, but different evaluations may well give different results. Is this a problem for credibility? Process (audit ) oriented methods look at documentation and the process of product development. They are cheaper and it is much easier to achieve repeatable results, but the results themselves may not be very valuable. The first version of the European Information Technology Security Evaluation Manual was a prime example of repeatability overpowering content. Is this a problem for credibility? What is the Organizational Framework of the Evaluation Process? Security evaluations should arrive at independent, commonly accepted verdicts on the properties of products. An independent evaluation facility can either be a government 238 13 SECURITY EVALUATION agency (the approach taken originally in the US) or a properly accredited private
|
{"source": 5831, "title": "from dpo"}
|
The Darlington Lecture is a lectureship of the John Innes Centre named after its former director, the geneticist C. D. Darlington. == Lecturers == Source: John Innes Centre 2001 Alec Jeffreys 2002 Kim Nasmyth 2004 Nicholas R. Cozzarelli 2005 Frank Grosveld 2007 Susan R. Wessler, University of Georgia, USA - 'It's alive: activation of virtual rice transposable elements in Arabidopsis and yeast' 2008 Ewan Birney, EMBL, Hinxton, Cambridge, UK - 'Ensembl and ENCODE; understanding genomes' 2010 Edward Rubin, Lawrence Berkeley National Laboratory 2012 David Baulcombe, Department of Plant Sciences, University of Cambridge, UK – ‘RNA silencing and genome defense of plants’ 2013 Chad Nusbaum, Broad Institute of MIT and Harvard, USA- ‘DNA technology as the engine of scientific discovery’ 2015 Detlef Weigel, Molecular Biology of Plants & Animals, MPI for Developmental Biology – ‘Origin and consequences of genetic and epigenetic variation in Arabidopsis thaliana and its relatives’ == See also == Bateson Lecture Biffen Lecture Chatt Lecture Haldane Lecture List of genetics awards == References ==
|
{"page_id": 40939772, "title": "Darlington Lecture"}
|
by using INCI names. The cosmetic regulation laws are enforceable for important consumer safety. For example, the ingredients are listed on the ingredient declaration for the purchaser to reduce the risk of an allergic reaction to an ingredient the user has had an allergy to before. INCI names are mandated on the ingredient statement of every consumer personal care product. The INCI system allows the consumer to identify the ingredient content. In the U.S., true soaps (as defined by the FDA) are specifically exempted from INCI labeling requirements as cosmetics per FDA regulation. == See also == Ingredients of cosmetics Cosmetic, Toiletry, and Fragrance Association (CTFA) Registration, Evaluation, Authorisation and Restriction of Chemicals (REACH) List of cosmetic ingredients == References == == External links == European Commission: Cosmetic Ingredients Database FDA: Labeling Claims A to Z INCI Database FDA: Cosmetic Labeling Guide
|
{"page_id": 1401268, "title": "International Nomenclature of Cosmetic Ingredients"}
|
The U.S. Chemical Safety and Hazard Investigation Board (USCSB), generally referred to as the Chemical Safety Board (CSB), is an independent U.S. federal agency charged with investigating industrial chemical accidents. Headquartered in Washington, D.C., the agency's board members are appointed by the president and confirmed by the United States Senate. The CSB conducts root cause investigations of chemical accidents at fixed industrial facilities. == History == The U.S. Chemical Safety Board is authorized by the Clean Air Act Amendments of 1990 and became operational in January 1998. The Senate legislative history states: "The principal role of the new chemical safety board is to investigate accidents to determine the conditions and circumstances which led up to the event and to identify the cause or causes so that similar events might be prevented." Congress gave the CSB a unique statutory mission and provided in law that no other agency or executive branch official may direct the activities of the board. Following the successful model of the National Transportation Safety Board and the Department of Transportation, Congress directed that the CSB's investigative function be completely independent of the rulemaking, inspection, and enforcement authorities of the Environmental Protection Agency and Occupational Safety and Health Administration. Congress recognized that board investigations would identify chemical hazards that were not addressed by those agencies. Also similarly to the NTSB, the CSB performs "investigations [that] identify the root causes of chemical incidents and share these findings broadly across industries to prevent future incidents." Following criticism from lawmakers and allegations of mismanagement, the former chairman of the CSB, Rafael Moure-Eraso, resigned in March 2015. He was replaced by Vanessa Allen Sutherland in August 2015. Sutherland resigned with two years left in her five-year term after the Trump administration proposed shutting down the CSB as part of the 2019 United
|
{"page_id": 7980534, "title": "U.S. Chemical Safety Board"}
|
interest in Mendelism, other biologists started to establish modern genetics as a science. All three of these researchers, each from a different country, published their rediscovery of Mendel's work within a two-month span in the spring of 1900. Mendel's results were quickly replicated, and genetic linkage quickly worked out. Biologists flocked to the theory; even though it was not yet applicable to many phenomena, it sought to give a genotypic understanding of heredity, which they felt was lacking in previous studies of heredity, which had focused on phenotypic approaches. Most prominent of these previous approaches was the biometric school of Karl Pearson and W. F. R. Weldon, which was based heavily on statistical studies of phenotype variation. The strongest opposition to this school came from William Bateson, who perhaps did the most in the early days of publicising the benefits of Mendel's theory (the word "genetics", and much of the discipline's other terminology, originated with Bateson). This debate between the biometricians and the Mendelians was extremely vigorous in the first two decades of the 20th century, with the biometricians claiming statistical and mathematical rigor, whereas the Mendelians claimed a better understanding of biology. Modern genetics shows that Mendelian heredity is, in fact, an inherently biological process, though not all genes of Mendel's experiments are yet understood. Ultimately, the two approaches were combined, especially by work conducted by R. A. Fisher as early as 1918. The combination, in the 1930s and 1940s, of Mendelian genetics with Darwin's theory of natural selection resulted in the modern synthesis of evolutionary biology. In the Soviet Union and China, Mendelian genetics was rejected in favor of Lamarckism, leading to imprisonment and even execution of Mendelian geneticists (see Lysenkoism). === Modern analysis of the genes causing Mendel's pea phenotypes === Mendel postulated that seven "factors" determine
|
{"page_id": 12562, "title": "Gregor Mendel"}
|
different ideas." Harris's first book, The End of Faith (2004), won the PEN/Martha Albrand Award for First Nonfiction. Harris's next two books, which discuss philosophical issues relating to ethics and free will, received several negative academic reviews. In his review of The Moral Landscape, neuroscientist Kenan Malik criticized Harris for not engaging adequately with philosophical literature: "Imagine a sociologist who wrote about evolutionary theory without discussing the work of Darwin, Fisher, Mayr, Hamilton, Trivers or Dawkins on the grounds that he did not come to his conclusions by reading about biology and because discussing concepts such as 'adaptation', 'speciation', 'homology', 'phylogenetics' or 'kin selection' would 'increase the amount of boredom in the universe'. How seriously would we, and should we, take his argument?" On the other hand, The Moral Landscape received a largely positive review from psychologists James Diller and Andrew Nuzzolilli. Additionally, Free Will received a mixed academic review from philosopher Paul Pardi, who said that while it suffers from some conceptual confusions and that the core argument is a bit too "breezy", it serves as a "good primer on key ideas in physicalist theories of freedom and the will". Harris's book on spirituality and meditation received mainly positive reviews as well as some mixed reviews. It was praised by Frank Bruni, for example, who described it as "so entirely of this moment, so keenly in touch with the growing number of Americans who are willing to say that they do not find the succor they crave, or a truth that makes sense to them, in organized religion." In 2018, Robert Wright, a visiting professor of science and religion at Union Theological Seminary, published an article in Wired criticizing Harris, whom he described as "annoying" and "deluded". Wright wrote that Harris, despite claiming to be a champion of rationality,
|
{"page_id": 2400008, "title": "Sam Harris"}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.