page_content
stringlengths
51
3.15k
Microbial cooperation Altruism Microbial_cooperation > Types of cooperation > Altruism According to Hamilton, an altruistic act is evolutionarily beneficial if the relatedness of the individual that profits from the altruistic act is higher than the cost/benefit ratio this act imposes. This rationale is referred to as Hamilton's rule. Natural selection normally favors a gene if it increases reproduction, because the offspring share copies of that gene.
Lens-based stabilization In biological eyes Optical_Image_Stabilization > In biological eyes In many animals, including human beings, the inner ear functions as the biological analogue of an accelerometer in camera image stabilization systems, to stabilize the image by moving the eyes. When a rotation of the head is detected, an inhibitory signal is sent to the extraocular muscles on one side and an excitatory signal to the muscles on the other side. The result is a compensatory movement of the eyes. Typically eye movements lag the head movements by less than 10 ms.
Microevolution Gene flow Microevolution > Four processes > Gene flow Horizontal transfer of genes from bacteria to eukaryotes such as the yeast Saccharomyces cerevisiae and the adzuki bean beetle Callosobruchus chinensis may also have occurred. An example of larger-scale transfers are the eukaryotic bdelloid rotifers, which appear to have received a range of genes from bacteria, fungi, and plants. Viruses can also carry DNA between organisms, allowing transfer of genes even across biological domains.
Scale analysis (statistics) Other models Scale_analysis_(statistics) > Measurement models > Other models Latent class analysis Multidimensional scaling NOMINATE (scaling method)
Energy industry History Energy_industry > History After a useful process has taken place, the total energy is conserved, but the resource itself is not conserved, since a process usually transforms the energy into unusable forms (such unnecessary or excess heat). Ever since humanity discovered various energy resources available in nature, it has been inventing devices, known as machines, that make life more comfortable by using energy resources. Thus, although the primitive man knew the utility of fire to cook food, the invention of devices like gas burners and microwave ovens has increased the usage of energy for this purpose alone manyfold. The trend is the same in any other field of social activity, be it construction of social infrastructure, manufacturing of fabrics for covering; porting; printing; decorating, for example textiles, air conditioning; communication of information or for moving people and goods (automobiles).
System of units Imperial and US customary units System_of_units > Imperial and US customary units Both imperial units and US customary units derive from earlier English units. Imperial units were mostly used in the former British Empire and the British Commonwealth, but in all these countries they have been largely supplanted by the metric system. They are still used for some applications in the United Kingdom but have been mostly replaced by the metric system in commercial, scientific, and industrial applications. US customary units, however, are still the main system of measurement in the United States.
Equilibrium constant Micro-constants Affinity_constant > Types of equilibrium constants > Micro-constants When two or more sites in an asymmetrical molecule may be involved in an equilibrium reaction there are more than one possible equilibrium constants. For example, the molecule L-DOPA has two non-equivalent hydroxyl groups which may be deprotonated. Denoting L-DOPA as LH2, the following diagram shows all the species that may be formed (X = CH2CH(NH2)CO2H). The concentration of the species LH is equal to the sum of the concentrations of the two micro-species with the same chemical formula, labelled L1H and L2H.
Spastic paralysis Pathophysiology Spastic_paralysis > Pathophysiology Spasticity mostly occurs in disorders of the central nervous system (CNS) affecting the upper motor neurons in the form of a lesion, such as spastic diplegia, or upper motor neuron syndrome, and can also be present in various types of multiple sclerosis, where it occurs as a symptom of the progressively-worsening attacks on myelin sheaths and is thus unrelated to the types of spasticity present in neuromuscular cerebral palsy rooted spasticity disorders.The cause of spasticity is thought to be where an imbalance occurs in the excitatory and inhibitory input to α motor neurons caused by damage to the spinal cord and/or central nervous system. The damage causes a change in the balance of signals between the nervous system and the muscles, leading to increased excitability in muscles. This is common in people who have cerebral palsy, brain injuries or a spinal cord injury, but it can happen to anybody e.g. having a stroke.One factor that is thought to be related to spasticity is the stretch reflex. This reflex is important in coordinating normal movements in which muscles are contracted and relaxed and in keeping the muscle from stretching too far.
Mechanical philosophy Summary Mechanical_philosophy Living bodies, as is well known, present at first sight certain characteristic properties which have no counterpart in lifeless matter. Mechanism aims to go beyond these appearances. It seeks to explain all "vital" phenomena as physical and chemical facts; whether or not these facts are in turn reducible to mass and motion becomes a secondary question, although Mechanists are generally inclined to favour such reduction. The theory opposed to this biological mechanism is no longer Dynamism, but Vitalism or Neo-vitalism, which maintains that vital activities cannot be explained, and never will be explained, by the laws which govern lifeless matter.
Electrical noise Quantification Signal_noise > Quantification Telecommunication systems strive to increase the ratio of signal level to noise level in order to effectively transfer data. Noise in telecommunication systems is a product of both internal and external sources to the system. Noise is a random process, characterized by stochastic properties such as its variance, distribution, and spectral density.
Channel system Boundedness problem Channel_system_(computer_science) > Problems and their complexity > Boundedness problem The boundedness problem consists in deciding whether the set of reachable configuration is finite. I.e. the length of the content of each channel is bounded. This problem is trivially decidable over machine capable of insertion of errors: 26 . It is also decidable over counter machine.
Original proof of Gödel's completeness theorem Statement of the theorem and its proof Original_proof_of_Gödel's_completeness_theorem > Statement of the theorem and its proof While we cannot do this by simply rearranging the quantifiers, we show that it is yet enough to prove the theorem for sentences of that form. Finally we prove the theorem for sentences of that form. This is done by first noting that a sentence such as B = ∀x1∀x2...∀xk ∃y1∃y2...∃ym φ(x1...xk, y1...ym) is either refutable (its negation is always true) or satisfiable, i.e. there is some model in which it holds (it might even be always true, i.e. a tautology); this model is simply assigning truth values to the subpropositions from which B is built.
Rolle's Theorem Generalization to higher derivatives Rolle's_Theorem > Generalization to higher derivatives We can also generalize Rolle's theorem by requiring that f has more points with equal values and greater regularity. Specifically, suppose that the function f is n − 1 times continuously differentiable on the closed interval and the nth derivative exists on the open interval (a, b), and there are n intervals given by a1 < b1 ≤ a2 < b2 ≤ ⋯ ≤ an < bn in such that f (ak) = f (bk) for every k from 1 to n.Then there is a number c in (a, b) such that the nth derivative of f at c is zero. The requirements concerning the nth derivative of f can be weakened as in the generalization above, giving the corresponding (possibly weaker) assertions for the right- and left-hand limits defined above with f (n − 1) in place of f. Particularly, this version of the theorem asserts that if a function differentiable enough times has n roots (so they have the same value, that is 0), then there is an internal point where f (n − 1) vanishes.
Eutectic bonding Overview Eutectic_bonding > Overview Eutectic bonding is based on the ability of silicon (Si) to alloy with numerous metals and form a eutectic system. The most established eutectic formations are Si with gold (Au) or with aluminium (Al). This bonding procedure is most commonly used for Si or glass wafers that are coated with an Au/Al film and partly with adhesive layer (compare with following image). The Si-Au couple has the advantages of an exceptionally low eutectic temperature, an already widespread use in die bonding and the compatibility with Al interconnects.
Identical particles Distinguishing between particles Exchange_degeneracy > Distinguishing between particles The problem with the second approach is that it contradicts the principles of quantum mechanics. According to quantum theory, the particles do not possess definite positions during the periods between measurements. Instead, they are governed by wavefunctions that give the probability of finding a particle at each position.
Pole mount transformer Connections Distribution_transformer > Connections (When there is only one phase wire, a neutral will always be provided as a return path.) Primaries provide power at the standard distribution voltages used in the area; these range from as low as 2.3 kV to about 35 kV depending on local distribution practice and standards; often 11 kV (50 Hz systems) and 13.8 kV (60 Hz systems) are used, but many other voltages are common. For example, in the United States, the most common voltage is 12.47 kV, which has a line-to-ground voltage of 7.2 kV. This has a 7.2 kV phase-to-neutral voltage, exactly 30 times the 240 V on the split-phase secondary side.
Program evaluation Planning a program evaluation Program_evaluation > Planning a program evaluation Who will use this evaluation? How will they use it? What questions is this evaluation seeking to answer?
Zero-knowledge proofs Short summary Zero-knowledge_proof > Practical examples > Discrete log of a given value > Short summary Peggy proves to know the value of x (for example her password). Peggy and Victor agree on a prime p {\displaystyle p} and a generator g {\displaystyle g} of the multiplicative group of the field Z p {\displaystyle \mathbb {Z} _{p}} . Peggy calculates the value y = g x mod p {\displaystyle y=g^{x}{\bmod {p}}} and transfers the value to Victor. The following two steps are repeated a (large) number of times.
Distributed Replicated Block Device Comparison to RAID-1 Distributed_Replicated_Block_Device > Comparison to RAID-1 When the application reads, the RAID layer chooses the storage device to read. When a storage device fails, the RAID layer chooses to read the other, without the application instance knowing of the failure. In contrast, with DRBD there are two instances of the application, and each can read only from one of the two storage devices.
Brace and bit Summary Brace_and_bit The cost of the greater torque is lower rotational speed; it is easy for a geared hand drill to achieve a rotational speed of several hundred revolutions per minute, while it would require considerable effort to achieve even 100 rpm with a brace. The front of the brace consists of a chuck spindle with V-shaped brackets or clamps inside. Turning the spindle of the chuck in a clockwise direction tightens the drill bit in the chuck; turning counterclockwise loosens the bit for removal.
Triangulation (computer vision) Computational complexity Triangulation_(computer_vision) > Properties > Computational complexity The function τ {\displaystyle \tau } is only an abstract representation of a computation which, in practice, may be relatively complex. Some methods result in a τ {\displaystyle \tau } which is a closed-form continuous function while others need to be decomposed into a series of computational steps involving, for example, SVD or finding the roots of a polynomial. Yet another class of methods results in τ {\displaystyle \tau } which must rely on iterative estimation of some parameters. This means that both the computation time and the complexity of the operations involved may vary between the different methods.
JPEG Discrete cosine transform Progressive_JPEG > JPEG codec example > Encoding > Discrete cosine transform The next step is to take the two-dimensional DCT, which is given by: G u , v = 1 4 α ( u ) α ( v ) ∑ x = 0 7 ∑ y = 0 7 g x , y cos ⁡ cos ⁡ {\displaystyle \ G_{u,v}={\frac {1}{4}}\alpha (u)\alpha (v)\sum _{x=0}^{7}\sum _{y=0}^{7}g_{x,y}\cos \left\cos \left} where u {\displaystyle \ u} is the horizontal spatial frequency, for the integers 0 ≤ u < 8 {\displaystyle \ 0\leq u<8} . v {\displaystyle \ v} is the vertical spatial frequency, for the integers 0 ≤ v < 8 {\displaystyle \ 0\leq v<8} . α ( u ) = { 1 2 , if u = 0 1 , otherwise {\displaystyle \alpha (u)={\begin{cases}{\frac {1}{\sqrt {2}}},&{\mbox{if }}u=0\\1,&{\mbox{otherwise}}\end{cases}}} is a normalizing scale factor to make the transformation orthonormal g x , y {\displaystyle \ g_{x,y}} is the pixel value at coordinates ( x , y ) {\displaystyle \ (x,y)} G u , v {\displaystyle \ G_{u,v}} is the DCT coefficient at coordinates ( u , v ) .
Matrix exponential Linear differential equations Matrix_exponential > Applications > Linear differential equations So, calculating eAt leads to the solution to the system, by simply integrating the third step with respect to t. A solution to this can be obtained by integrating and multiplying by e A t {\displaystyle e^{{\textbf {A}}t}} to eliminate the exponent in the LHS. Notice that while e A t {\displaystyle e^{{\textbf {A}}t}} is a matrix, given that it is a matrix exponential, we can say that e A t e − A t = I {\displaystyle e^{{\textbf {A}}t}e^{-{\textbf {A}}t}=I} . In other words, exp ⁡ A t = exp ⁡ ( − A t ) − 1 {\displaystyle \exp {{\textbf {A}}t}=\exp {{(-{\textbf {A}}t)}^{-1}}} .
Podsolisation Summary Podsolisation Podsolisation is an extreme form of leaching which causes the eluviation of iron and aluminium sesquioxides.The process generally occurs in areas where precipitation is greater than evapotranspiration. The minerals are removed by a process known as leaching. When organic material is broken down nutrients are released, but at the same time organic acids are released.
Array data type Summary Zero-based_array In computer science, array is a data type that represents a collection of elements (values or variables), each selected by one or more indices (identifying keys) that can be computed at run time during program execution. Such a collection is usually called an array variable or array value. By analogy with the mathematical concepts vector and matrix, array types with one and two indices are often called vector type and matrix type, respectively. More generally, a multidimensional array type can be called a tensor type, by analogy with the physical concept, tensor.Language support for array types may include certain built-in array data types, some syntactic constructions (array type constructors) that the programmer may use to define such types and declare array variables, and special notation for indexing array elements.
Cognitive load Journal special issues Cognitive_load > Further reading > Journal special issues For those wishing to learn more about cognitive load theory, please consider reading these journals and special issues of those journals: Educational Psychologist, vol. 43 (4) ISSN 0046-1520 Applied Cognitive Psychology vol. 20(3) (2006) Applied Cognitive Psychology vol. 21(6) (2007) ETR&D vol.
Pythagoras Works cited Pythagoras > References > Works cited Only a few relevant source texts deal with Pythagoras and the Pythagoreans; most are available in different translations. Later texts usually build solely upon information in these works. Classical sources Modern secondary sources
KMS driver History Graphics_Execution_Manager > History This expanded API is what is called Kernel Mode-setting (KMS) and the drivers which implement it are often referred to as KMS drivers. In March 2009, KMS was merged into the Linux kernel version 2.6.29, along with KMS support for the i915 driver. The KMS API have been exposed to user space programs since libdrm 2.4.3.
Solar panel recycling Applications Solar_Panels > Applications There are many practical applications for the use of solar panels or photovoltaics. It can first be used in agriculture as a power source for irrigation. In health care solar panels can be used to refrigerate medical supplies. It can also be used for infrastructure. PV modules are used in photovoltaic systems and include a large variety of electric devices: Solar canals Photovoltaic power stations Rooftop solar PV systems Standalone PV systems Solar hybrid power systems Concentrated photovoltaics Floating solar; water-borne solar panels Solar planes Solar-powered water purification Solar-pumped lasers Solar vehicles Solar water heating Solar panels on spacecraft and space stations
Bag of words model in computer vision Supervised models Bag_of_words_model_in_computer_vision > Learning and recognition based on the BoW model > Supervised models Since images are represented based on the BoW model, any discriminative model suitable for text document categorization can be tried, such as support vector machine (SVM) and AdaBoost. Kernel trick is also applicable when kernel based classifier is used, such as SVM. Pyramid match kernel is newly developed one based on the BoW model.
Hook-and-loop fastener Applications Hook_and_loop > Applications Hook-and-loop fasteners held together a human heart during the first artificial heart surgery. It is used in nuclear power plants and army tanks to hold flashlights to walls. In cars, hook-and-loop fasteners are used to bond headliners, floor mats and speaker covers.
Antimycin A Lethal Doses Antimycin_A > Toxicity > Lethal Doses Lethal doses in fish and amphibian species Lethal Doses in Mammals
History of the function concept Notion of "function" in contemporary set theory History_of_the_function_concept > Since 1950 > Notion of "function" in contemporary set theory 76 in Chapitre II of Theorie des Ensembles (theory of sets), gave a definition of a function as a triple f = (F, A, B). Here F is a functional graph, meaning a set of pairs where no two pairs have the same first member.
Spacecraft flight dynamics Basic principles Spacecraft_flight_dynamics > Basic principles A space vehicle's flight is determined by application of Newton's second law of motion: where F is the vector sum of all forces exerted on the vehicle, m is its current mass, and a is the acceleration vector, the instantaneous rate of change of velocity (v), which in turn is the instantaneous rate of change of displacement. Solving for a, acceleration equals the force sum divided by mass. Acceleration is integrated over time to get velocity, and velocity is in turn integrated to get position. Flight dynamics calculations are handled by computerized guidance systems aboard the vehicle; the status of the flight dynamics is monitored on the ground during powered maneuvers by a member of the flight controller team known in NASA's Human Spaceflight Center as the flight dynamics officer, or in the European Space Agency as the spacecraft navigator.For powered atmospheric flight, the three main forces which act on a vehicle are propulsive force, aerodynamic force, and gravitation. Other external forces such as centrifugal force, Coriolis force, and solar radiation pressure are generally insignificant due to the relatively short time of powered flight and small size of spacecraft, and may generally be neglected in simplified performance calculations.
Immunologic adjuvant Adaptive immune response Immunologic_adjuvant > Adaptive immune response In addition, mast cells also release chemokines which result in the positive chemotaxis of other immune cells of both the innate and adaptive immune responses to the infected area.Due to the variety of mechanisms and links between the innate and adaptive immune response, an adjuvant-enhanced innate immune response results in an enhanced adaptive immune response. Specifically, adjuvants may exert their immune-enhancing effects according to five immune-functional activities.
Spatial verification Methods Spatial_verification > Methods The most widely used for spatial verification and avoid errors caused by these outliers methods are:
Hydraulic analogy Voltage, current, and charge Hydraulic_analogy > Hydraulic analogy with horizontal water flow > Voltage, current, and charge Electric potential and voltage are usually measured in volts. Electric current is equivalent to a hydraulic volume flow rate; that is, the volumetric quantity of flowing water over time. Usually measured in amperes. A unit of electric charge is analogous to a unit volume of water.
Polymer-cased ammunition Summary Polymer-cased_ammunition Polymer-cased ammunition (PCA) is firearm ammunition (cartridge) with casings made from synthetic polymer instead of the typical metallic casing. PCA is considered a new alternative that potentially reduces production cost and weight for long guns and handguns.
Sensor based sorting Tomra Sorting Solutions │ Mining Sensor-based_sorting > Sensor-based ore sorting > Suppliers > Tomra Sorting Solutions │ Mining A sensor-based sorting equipment supplier with large installed base in the industries mining, recycling and food. Tomra's sensor-based sorting equipment and services for the precious metals and base metals segment are marketed through a cooperation agreement with Outotec from Finland, which brings the extensive comminution, processing and application experience of Outotec together with Tomra's sensor-based ore sorting technology and application expertise.
Cray-1 Vector machines Cray-1 > Background > Vector machines The addition of an instruction pipeline changes this. In such machines the CPU will "look ahead" and begin fetching succeeding instructions while the current instruction is still being processed. In this assembly line fashion any one instruction still requires as long to complete, but as soon as it finishes executing, the next instruction is right behind it, with most of the steps required for its execution already completed.
Injury in humans Complications Injury_in_humans > Treatment > Complications Complications may arise as a result of certain injuries, increasing the recovery time, further exasperating the symptoms, or potentially causing death. The extent of the injury and the age of the injured person may contribute to the likelihood of complications. Infection of wounds is a common complication in traumatic injury, resulting in diagnoses such as pneumonia or sepsis. Wound infection prevents the healing process from taking place and can cause further damage to the body.
Azithromycin Adverse effects Azithromycin > Adverse effects Azithromycin does not affect the efficacy of birth control unlike some other antibiotics such as rifampin. Hearing loss has been reported.Occasionally, people have developed cholestatic hepatitis or delirium. Accidental intravenous overdose in an infant caused severe heart block, resulting in residual encephalopathy.In 2013 the FDA issued a warning that azithromycin "can cause abnormal changes in the electrical activity of the heart that may lead to a potentially fatal irregular heart rhythm." The FDA noted in the warning a 2012 study that found the drug may increase the risk of death, especially in those with heart problems, compared with those on other antibiotics such as amoxicillin or no antibiotic. The warning indicated people with preexisting conditions are at particular risk, such as those with QT interval prolongation, low blood levels of potassium or magnesium, a slower than normal heart rate, or those who use certain drugs to treat abnormal heart rhythms.It has been reported that azithromycin blocks autophagy and may predispose cystic fibrosis patients to mycobacterial infection.
Synaptic cleft Homosynaptic plasticity Chemical_synapse > Synaptic plasticity > Homosynaptic plasticity It can result in either an increase or decrease in synaptic strength. One example is neurons of the sympathetic nervous system (SNS), which release noradrenaline, which, besides affecting postsynaptic receptors, also affects presynaptic α2-adrenergic receptors, inhibiting further release of noradrenaline. This effect is utilized with clonidine to perform inhibitory effects on the SNS.
Work in compressed air Summary Work_in_compressed_air Work in compressed air, compressed air work or hyperbaric work is occupational activity in an enclosed atmosphere at a controlled ambient pressure significantly higher than the adjacent normal atmospheric pressure. There are many parallels with underwater diving, and a few significant differences.
Hyperbolic cylinder Surface area Circular_cylinder > Properties > Surface area Having radius r and altitude (height) h, the surface area of a right circular cylinder, oriented so that its axis is vertical, consists of three parts: the area of the top base: πr2 the area of the bottom base: πr2 the area of the side: 2πrhThe area of the top and bottom bases is the same, and is called the base area, B. The area of the side is known as the lateral area, L. An open cylinder does not include either top or bottom elements, and therefore has surface area (lateral area) L = 2πrh.The surface area of the solid right circular cylinder is made up the sum of all three components: top, bottom and side. Its surface area is therefore, A = L + 2B = 2πrh + 2πr2 = 2πr(h + r) = πd(r + h),where d = 2r is the diameter of the circular top or bottom. For a given volume, the right circular cylinder with the smallest surface area has h = 2r. Equivalently, for a given surface area, the right circular cylinder with the largest volume has h = 2r, that is, the cylinder fits snugly in a cube of side length = altitude ( = diameter of base circle).The lateral area, L, of a circular cylinder, which need not be a right cylinder, is more generally given by: L = e × p,where e is the length of an element and p is the perimeter of a right section of the cylinder. This produces the previous formula for lateral area when the cylinder is a right circular cylinder.
Centripetal Force Calculus derivation Centripetal_Force > Analysis of several cases > Uniform circular motion > Calculus derivation Therefore, θ = ω t {\displaystyle \theta =\omega t} where t {\displaystyle t} is time.The velocity v {\displaystyle {\textbf {v}}} and acceleration a {\displaystyle {\textbf {a}}} of the motion are the first and second derivatives of position with respect to time: The term in parenthesis is the original expression of r {\displaystyle {\textbf {r}}} in Cartesian coordinates. Consequently, negative shows that the acceleration is pointed towards the center of the circle (opposite the radius), hence it is called "centripetal" (i.e. "center-seeking"). While objects naturally follow a straight path (due to inertia), this centripetal acceleration describes the circular motion path caused by a centripetal force.
Extensible Storage Engine Sorts and temporary tables Extensible_Storage_Engine > Query processing > Sorts and temporary tables ESE provides a sort capability in the form of temporary tables. The application inserts data records into the sort process one record at a time, and then retrieves them one record at a time in sorted order. Sorting is actually performed between the last record insertion and the first record retrieval.
Geometric mean Summary Geometric_mean The geometric mean of two numbers, a {\displaystyle a} and b {\displaystyle b} , is the length of one side of a square whose area is equal to the area of a rectangle with sides of lengths a {\displaystyle a} and b {\displaystyle b} . Similarly, the geometric mean of three numbers, a {\displaystyle a} , b {\displaystyle b} , and c {\displaystyle c} , is the length of one edge of a cube whose volume is the same as that of a cuboid with sides whose lengths are equal to the three given numbers. The geometric mean is one of the three classical Pythagorean means, together with the arithmetic mean and the harmonic mean. For all positive data sets containing at least one pair of unequal values, the harmonic mean is always the least of the three means, while the arithmetic mean is always the greatest of the three and the geometric mean is always in between (see Inequality of arithmetic and geometric means.)
Server-based signatures Summary Server-based_signatures In cryptography, server-based signatures are digital signatures in which a publicly available server participates in the signature creation process. This is in contrast to conventional digital signatures that are based on public-key cryptography and public-key infrastructure. With that, they assume that signers use their personal trusted computing bases for generating signatures without any communication with servers. Four different classes of server based signatures have been proposed: 1.
Molecular fossil Atmospheric disequilibrium Biomarker_(petroleum) > Examples > Atmospheric disequilibrium A disequilibrium in the abundance of gas species in an atmosphere can be interpreted as a biosignature. Life has greatly altered the atmosphere on Earth in a way that would be unlikely for any other processes to replicate. Therefore, a departure from equilibrium is evidence for a biosignature. For example, the abundance of methane in the Earth's atmosphere is orders of magnitude above the equilibrium value due to the constant methane flux that life on the surface emits. Depending on the host star, a disequilibrium in the methane abundance on another planet may indicate a biosignature.
SI base units Summary SI_base_unit The SI base units are the standard units of measurement defined by the International System of Units (SI) for the seven base quantities of what is now known as the International System of Quantities: they are notably a basic set from which all other SI units can be derived. The units and their physical quantities are the second for time, the metre (sometimes spelled meter) for length or distance, the kilogram for mass, the ampere for electric current, the kelvin for thermodynamic temperature, the mole for amount of substance, and the candela for luminous intensity. The SI base units are a fundamental part of modern metrology, and thus part of the foundation of modern science and technology. The SI base units form a set of mutually independent dimensions as required by dimensional analysis commonly employed in science and technology.The names and symbols of SI base units are written in lowercase, except the symbols of those named after a person, which are written with an initial capital letter. For example, the metre has the symbol m, but the kelvin has symbol K, because it is named after Lord Kelvin and the ampere with symbol A is named after André-Marie Ampère.
Quadratic equation Vieta's formulas Quadratic_equations > Advanced topics > Alternative methods of root calculation > Vieta's formulas Vieta's formulas (named after François Viète) are the relations x 1 + x 2 = − b a , x 1 x 2 = c a {\displaystyle x_{1}+x_{2}=-{\frac {b}{a}},\quad x_{1}x_{2}={\frac {c}{a}}} between the roots of a quadratic polynomial and its coefficients. They result from comparing term by term the relation ( x − x 1 ) ( x − x 2 ) = x 2 − ( x 1 + x 2 ) x + x 1 x 2 = 0 {\displaystyle \left(x-x_{1}\right)\left(x-x_{2}\right)=x^{2}-\left(x_{1}+x_{2}\right)x+x_{1}x_{2}=0} with the equation x 2 + b a x + c a = 0. {\displaystyle x^{2}+{\frac {b}{a}}x+{\frac {c}{a}}=0.} The first Vieta's formula is useful for graphing a quadratic function.
MOSI protocol Overview of States MOSI_protocol > Overview of States At a time, only one cache can have the owned state for a block. All the other caches with the same block must be in shared state.Shared (S) - Cache block is valid, could be shared by multiple caches, and may or may not have the same value as the main memory.
Variable reluctance sensor Uses and applications Variable_reluctance_sensor > Uses and applications A VR sensor used as a simple proximity sensor can determine the position of a mechanical link in a piece of industrial equipment. A crankshaft position sensor (in an automobile engine) is used to provide the angular position of the crankshaft to the engine control unit. The engine control unit can then calculate engine speed (angular velocity). Speed sensors used in automobile transmissions are used to measure the rotational speed (angular velocity) of shafts within the transmission.
Electrical component Transistors Electrical_components > Active components > Semiconductors > Transistors Transistors were considered the invention of the twentieth century that changed electronic circuits forever. A transistor is a semiconductor device used to amplify and switch electronic signals and electrical power. Field-effect transistors (FET) MOSFET (metal–oxide–semiconductor FET) – by far the most widely manufactured electronic component (also known as MOS transistor)PMOS (p-type MOS) NMOS (n-type MOS) CMOS (complementary MOS) Power MOSFET LDMOS (lateral diffused MOSFET) MuGFET (multi-gate field-effect transistor) FinFET (fin field-effect transistor) TFT (thin-film transistor) FeFET (ferroelectric field-effect transistor) CNTFET (carbon nanotube field-effect transistor) JFET (junction field-effect transistor) – N-channel or P-channel SIT (static induction transistor) MESFET (metal semiconductor FET) HEMT (high-electron-mobility transistor) Composite transistors BiCMOS (bipolar CMOS) IGBT (Insulated-gate bipolar transistor) Other transistors Bipolar junction transistor (BJT, or simply "transistor") – NPN or PNP Photo transistor – amplified photodetector Darlington transistor – NPN or PNP Photo Darlington – amplified photodetector Sziklai pair (compound transistor, complementary Darlington) Thyristors Silicon-controlled rectifier (SCR) – passes current only after triggered by a sufficient control voltage on its gate TRIAC (TRIode for Alternating Current) – bidirectional SCR Unijunction transistor (UJT) Programmable Unijunction transistor (PUT) SITh (static induction thyristor)
Hereditary cancers Preventive actions Hereditary_cancer > Preventive actions Genetic testing is important as if a test comes out positive they are more aware of their own personal health and the health of immediate family members. With the help and advice from a medical professional they can take steps to reduce their elevated risk of cancer development through: Regular exercise A healthy, balanced diet Maintaining a healthy weight Not smoking Staying safe under the sun's harmful raysThere are other forms of preventive actions, an example for Hereditary Breast and Ovarian Cancer would be to go through surgery: A hysterectomy is the removal of all or some of the uterus, whereas a mastectomy is removing a breast (double mastectomy meaning that both breasts are removed), this can often add years onto their life expectancy. Another preventive measure is regular cancer screening and check-ups. If a person has Lynch's syndrome then they should have a regular colonoscopy to examine if there is any change in the cells lining the intestinal wall, regular check-ups are associated with an additional 7 years onto the life expectancy on average for a person with Lynch's syndrome.
Ring expansion reaction Favorskii rearrangement Ring_expansion_reaction > Ring contraction reactions > Favorskii rearrangement The Favorskii rearrangement is a classic anionic ring contraction. It proceeds through a carbanion that attacks an endocyclic carbon and expels a leaving group (a halide) forming a bicyclic molecule with rings smaller than the original. The bicycle is then opened by nucleophilic attack on the ketone to give the contracted product. This reaction has been used to convert cyclohexanone to the methyl ester of cyclopropanecarboxylic acid. An alternative to the standard Favorskii rearrangement, is to perform what can be thought of as a negative pinacol rearrangement where an anionic group encourages a bond aligned with a leaving group to migrate and expel the leaving group, which has been used in several syntheses. It should also be noted that the so-called "quasi-Favorskii rearrangement" proceeds without an additional nucleophile to form the final contracted product.
Wavelet Comparisons with Fourier transform (continuous-time) Wavelet_analysis > Comparisons with Fourier transform (continuous-time) A given resolution cell's time-bandwidth product may not be exceeded with the STFT. All STFT basis elements maintain a uniform spectral and temporal support for all temporal shifts or offsets, thereby attaining an equal resolution in time for lower and higher frequencies.
Binary Domain Summary Binary_Domain Binary Domain is a third-person shooter video game developed by Ryu Ga Gotoku Studio and published by Sega. It was released for PlayStation 3 and Xbox 360 in February 2012 and Windows in April 2012. The game is set in Tokyo, Japan, in the year 2080. It features innovative artificial intelligence technology.
Artifact (error) Summary Artifact_(error) In natural science and signal processing, an artifact or artefact is any error in the perception or representation of any information introduced by the involved equipment or technique(s).
Average case analysis Worst-case versus amortized versus average-case performance Average_case_analysis > Worst-case versus amortized versus average-case performance Often however, a pessimistic analysis may be too pessimistic, so an analysis that gets closer to the real value but may be optimistic (perhaps with some known low probability of failure) can be a much more practical approach. One modern approach in academic theory to bridge the gap between worst-case and average-case analysis is called smoothed analysis.
Linkage Editor Overview Linking_loader > Overview This pass is usually omitted on hardware offering virtual memory: every program is put into its own address space, so there is no conflict even if all programs load at the same base address. This pass may also be omitted if the executable is a position independent executable. On some Unix variants, such as SINTRAN III, the process performed by a linker (assembling object files into a program) was called loading (as in loading executable code onto a file). Additionally, in some operating systems, the same program handles both the jobs of linking and loading a program (dynamic linking).
Biochemical pathway Overview Molecular_pathway > Overview One example of an exception to this "rule" is the metabolism of glucose. Glycolysis results in the breakdown of glucose, but several reactions in the glycolysis pathway are reversible and participate in the re-synthesis of glucose (gluconeogenesis). Glycolysis was the first metabolic pathway discovered:As glucose enters a cell, it is immediately phosphorylated by ATP to glucose 6-phosphate in the irreversible first step.
Directory-based coherence protocols Summary Directory-based_coherence_protocols In computer engineering, directory-based cache coherence is a type of cache coherence mechanism, where directories are used to manage caches in place of bus snooping. Bus snooping methods scale poorly due to the use of broadcasting. These methods can be used to target both performance and scalability of directory systems.
Tunnel crankcase Disadvantages Tunnel_crankshaft > Disadvantages Although the reduced length of the crankshaft may allow large engines to be built with shorter machinery. Crankshaft inertiaThe enlarged webs have greater mass, thus greater rotational inertia, particularly as they place this mass at the greatest radius away from the axis of the crankshaft. This gives an engine that is slower to accelerate, although it also means that the engine maintains a constant speed more easily under a rapidly varying load.
Graphoid Summary Graphoid A graphoid is a set of statements of the form, "X is irrelevant to Y given that we know Z" where X, Y and Z are sets of variables. The notion of "irrelevance" and "given that we know" may obtain different interpretations, including probabilistic, relational and correlational, depending on the application. These interpretations share common properties that can be captured by paths in graphs (hence the name "graphoid"). The theory of graphoids characterizes these properties in a finite set of axioms that are common to informational irrelevance and its graphical representations.
Audio transformer Instrument transformer Audio_transformer > Instrument transformer Instrument transformers are typically used to operate instruments from high voltage lines or high current circuits, safely isolating measurement and control circuitry from the high voltages or currents. The primary winding of the transformer is connected to the high voltage or high current circuit, and the meter or relay is connected to the secondary circuit. Instrument transformers may also be used as an isolation transformer so that secondary quantities may be used without affecting the primary circuitry.Terminal identifications (either alphanumeric such as H1, X1, Y1, etc. or a colored spot or dot impressed in the case) indicate one end of each winding, indicating the same instantaneous polarity and phase between windings. This applies to both types of instrument transformers. Correct identification of terminals and wiring is essential for proper operation of metering and protective relay instrumentation.
Parabolic Flight Operating principles Reduced_gravity_aircraft > Operating principles The aircraft gives its occupants the sensation of weightlessness by following a parabolic flight path relative to the center of the Earth. While following this path, the aircraft and its payload are in free fall at certain points of its flight path. The aircraft is used in this way to demonstrate to astronauts what it is like to orbit the Earth.
Friction coefficient Lubricants Coefficient_of_static_friction > Reducing friction > Lubricants A common way to reduce friction is by using a lubricant, such as oil, water, or grease, which is placed between the two surfaces, often dramatically lessening the coefficient of friction. The science of friction and lubrication is called tribology. Lubricant technology is when lubricants are mixed with the application of science, especially to industrial or commercial objectives. Superlubricity, a recently discovered effect, has been observed in graphite: it is the substantial decrease of friction between two sliding objects, approaching zero levels.
Accessible toilet Description Accessible_toilet > Description Public toilets (aka restrooms) can present accessibility challenges for people with disabilities. For example, stalls may not be able to fit a wheelchair, and transferring between the wheelchair and the toilet seat may pose a challenge. Accessible toilets are designed to address these issues by providing more space and bars for users to grab and hold during transfers, and space for an assistant if necessary. Toilets in private homes can be modified to increase accessibility; this is one of the skills of an occupational therapist. Common modifications include: adding a raised toilet seat on top of a standard toilet, installing a taller and more convenient height toilet bowl, attaching a frame or grab bars, and ensuring the toilet paper is within reach and can be detached with one hand. These modifications can enable aging in place for seniors who wish to remain in their homes and communities.
Adversarial stylometry Evaluation Adversarial_stylometry > Evaluation Zhai et al. (2022) identify DS-PAN (Castro-Castro, Ortega Bueno & Muñoz 2017) and Mutant-X (Mahmood et al. 2019) as the 2022 state of the art in automated obfuscation. Manual stylistic modulation is a significant effort, with poor scalability properties; tool assistance can reduce the burden to varying degrees. Deterministic automated methods can lose effectiveness against a classifier trained adversarially, where output from the style transfer program is used in the classifier's training set.Potthast, Hagen & Stein (2016) give three criteria for use in evaluation of adversarial stylometry methods: safety, meaning that stylistic characteristics are reliably eliminated; soundness, meaning that the semantic content of the text is not unacceptably altered; and sensible, meaning that the output is "well-formed and inconspicuous".
Residual neural network Summary Residual_neural_network This enables deep learning models with tens or hundreds of layers to train easily and approach better accuracy when going deeper. The identity skip connections, often referred to as "residual connections", are also used in the 1997 LSTM networks, Transformer models (e.g., BERT, GPT models such as ChatGPT), the AlphaGo Zero system, the AlphaStar system, and the AlphaFold system. Residual Networks were developed by Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun, which won the ImageNet 2015 competition.
Control charts Criticisms Shewhart_chart > Criticisms Several authors have criticised the control chart on the grounds that it violates the likelihood principle. However, the principle is itself controversial and supporters of control charts further argue that, in general, it is impossible to specify a likelihood function for a process not in statistical control, especially where knowledge about the cause system of the process is weak.Some authors have criticised the use of average run lengths (ARLs) for comparing control chart performance, because that average usually follows a geometric distribution, which has high variability and difficulties.Some authors have criticized that most control charts focus on numeric data. Nowadays, process data can be much more complex, e.g. non-Gaussian, mix numerical and categorical, or be missing-valued.
Jacobi's formula Via Diagonalization Jacobi's_formula > Derivation > Via Diagonalization Then t r ( A − 1 A ′ ) = t r ( L ( L − 1 ) ′ ) + t r ( D − 1 D ′ ) + t r ( L − 1 L ′ ) = t r ( D − 1 D ′ ) . {\displaystyle \mathrm {tr} (A^{-1}A')=\mathrm {tr} (L(L^{-1})')+\mathrm {tr} (D^{-1}D')+\mathrm {tr} (L^{-1}L')=\mathrm {tr} (D^{-1}D').} Let λ i {\displaystyle \lambda _{i}} , i = 1 , … , n {\displaystyle i=1,\ldots ,n} be the eigenvalues of A. Then det ( A ) ′ det ( A ) = ∑ i = 1 n λ i ′ / λ i = t r ( D − 1 D ′ ) = t r ( A − 1 A ′ ) , {\displaystyle {\frac {\det(A)'}{\det(A)}}=\sum _{i=1}^{n}\lambda _{i}'/\lambda _{i}=\mathrm {tr} (D^{-1}D')=\mathrm {tr} (A^{-1}A'),} which is the Jacobi formula for matrices A with distinct nonzero eigenvalues.
Domain adaptation Softwares Domain_randomization > Softwares Several compilations of domain adaptation and transfer learning algorithms have been implemented over the past decades: ADAPT (Python) TLlib (Python) Domain-Adaptation-Toolbox (Matlab) == References ==
Neutron economy Summary Neutron_economy A fission reactor is based on the idea of maintaining criticality, where every fission event leads to another fission event, no more and no less. As fission of uranium releases two or three neutrons, this means some of the neutrons must be removed as part of the overall process. Some will be lost purely due to geometry, those released travelling outward from the outer edge of the fuel mass will not have a chance to cause fission, for instance.
Closed control loop Other examples Control_loop > Open-loop and closed-loop > Other examples Now, when the car goes uphill, the difference between the input (the sensed speed) and the reference continuously determines the throttle position. As the sensed speed drops below the reference, the difference increases, the throttle opens, and engine power increases, speeding up the vehicle. In this way, the controller dynamically counteracts changes to the car's speed. The central idea of these control systems is the feedback loop, the controller affects the system output, which in turn is measured and fed back to the controller.
Plastics extrusion Advantages Plastics_extrusion > Advantages A great advantage of extrusion is that profiles such as pipes can be made to any length. If the material is sufficiently flexible, pipes can be made at long lengths even coiling on a reel. Another advantage is the extrusion of pipes with integrated coupler including rubber seal.
Halobacterium salinarium Low oxygen and phototrophy Halobacterium_salinarium > Adaptation to extreme conditions > Low oxygen and phototrophy Upon absorption of a photon, retinal changes its conformation, causing a conformational change in the bacterioopsin protein, as well, which drives proton transport. The proton gradient formed thereby can then be used to generate chemical energy via ATP synthase.
Divide-and-conquer eigenvalue algorithm Conquer Divide-and-conquer_eigenvalue_algorithm > Conquer The conquer part of the algorithm is the unintuitive part. Given the diagonalizations of the submatrices, calculated above, how do we find the diagonalization of the original matrix? First, define z T = ( q 1 T , q 2 T ) {\displaystyle z^{T}=(q_{1}^{T},q_{2}^{T})} , where q 1 T {\displaystyle q_{1}^{T}} is the last row of Q 1 {\displaystyle Q_{1}} and q 2 T {\displaystyle q_{2}^{T}} is the first row of Q 2 {\displaystyle Q_{2}} . It is now elementary to show that T = ( + β z z T ) {\displaystyle T={\begin{bmatrix}Q_{1}&\\&Q_{2}\end{bmatrix}}\left({\begin{bmatrix}D_{1}&\\&D_{2}\end{bmatrix}}+\beta zz^{T}\right){\begin{bmatrix}Q_{1}^{T}&\\&Q_{2}^{T}\end{bmatrix}}} The remaining task has been reduced to finding the eigenvalues of a diagonal matrix plus a rank-one correction.
Lac operon Classification of regulatory mutants Lactose_operon > Development of the classic model > Classification of regulatory mutants If one copy of the lac genes carries a mutation in lacI, but the second copy is wild type for lacI, the resulting phenotype is normal—but lacZ is expressed when exposed to inducer IPTG. Mutations affecting repressor are said to be recessive to wild type (and that wild type is dominant), and this is explained by the fact that repressor is a small protein which can diffuse in the cell. The copy of the lac operon adjacent to the defective lacI gene is effectively shut off by protein produced from the second copy of lacI.
Gradient vector flow Theory Gradient_vector_flow > Theory The boundary conditions are effectively provided by the locations in the image where the magnitude of the edge gradient is large, where the solution is driven to agree more with the edge gradients. Computational Solutions. There are two fundamental ways to compute GVF.
Kepler-61 Summary Kepler-61 Kepler-61 is a K-type main-sequence star approximately 1,100 light years from Earth in the constellation Cygnus. It is located within the field of vision of the Kepler spacecraft, the satellite that NASA's Kepler Mission used to detect planets that may be transiting their stars. On April 24, 2013 it was announced that the star has an extrasolar planet (a super-Earth) orbiting in the inner edge of the habitable zone, named Kepler-61b.
Circle of equal altitude Parameters Circle_of_equal_altitude > Parameters The center of the CoP, is the geographical position (GP) of the observed body, the substellar point for a star, the subsolar point for the sun. The radius is the great circle distance equal to the zenith distance of the body. Center = geographical position (GP) of the body: ( B g p {\displaystyle B_{gp}} , L g p {\displaystyle L_{gp}} ) = (Dec, -GHA) If L g p {\displaystyle L_{gp}} is defined as west longitude (+W/-E) then it will be +GHA, since HA (GHA or LHA) is always measured west-ward (+W/-E). Radius = zenith distance: zd = 60 ⋅ (90 - Ho) (aka co-altitude of Ho)As the circles used for navigation generally have a radius of thousands of miles, a segment a few tens of miles long closely approximates a straight line, as described in Sumner's original use of the method.
IRONCAD Summary IRONCAD IRONCAD is a software product for 3D and 2D CAD (computer-aided-design) design focused mainly on the mechanical design market that runs on Microsoft Windows. It is developed by Atlanta, GA based IronCAD LLC.
Direct-Shift Gearbox Disadvantages Direct-Shift_Gearbox > Advantages and disadvantages > Disadvantages The clutch pack mechanisms have a limited lifespan; Marginally worse mechanical efficiency compared to a conventional manual transmission, especially on wet-clutch variants due to electronics and hydraulic systems; Expensive specialist transmission fluids/lubricants with dedicated additives are required, which need regular changes; Relatively expensive to manufacture, and therefore increases new vehicle purchase price; Relatively lengthy shift time when shifting to a gear ratio which the transmission control unit did not anticipate (around 1100 ms, depending on the situation); Torque handling capability constraints impose a limit on after-market engine tuning modifications (though many tuners and users may exceed the official torque limits notwithstanding); (Later variants have been fitted to more powerful cars, such as the 300 bhp/350 Nm VW R36 and the 272 bhp/350 Nm Audi TTS.) Heavier than a comparable Getrag conventional manual transmission (75 kg (165 lb) vs. 47.5 kg (105 lb));
Holger Bech Nielsen Work Holger_Bech_Nielsen > Work In a series of papers uploaded to arXiv.org in 2009, Nielsen and fellow physicist Masao Ninomiya proposed a radical theory to explain the seemingly improbable series of failures preventing the Large Hadron Collider (LHC) from becoming operational. The collider was intended to be used to find evidence of the hypothetical Higgs boson particle. They suggested that the particle might be so abhorrent to nature that its creation would ripple backward through time and stop the collider before it could create one, in a fashion similar to the time travel Grandfather paradox. Subsequently the LHC claimed the discovery of Higgs boson on 4 July 2012.Nielsen is a member of the Norwegian Academy of Science and Letters.
Lattice basis Summary Fundamental_pair_of_periods In mathematics, a fundamental pair of periods is an ordered pair of complex numbers that defines a lattice in the complex plane. This type of lattice is the underlying object with which elliptic functions and modular forms are defined.
Einstein–de Haas effect History Einstein–de_Haas_effect > History In that historical context the idea of the orbital motion of electrons in atoms contradicted classical physics. This contradiction was addressed in the Bohr model in 1913, and later was removed with the development of quantum mechanics. S.J.
Quantum Wells Description and overview Multiple_quantum_well > Description and overview For example, an electron in the conduction band can have lower energy within the well than it could have in the AlGaAs region of this structure. Consequently, an electron in the conduction band with low energy can be trapped within the quantum well. Similarly, holes in the valence band can also be trapped in the top of potential wells created in the valence band. The states that confined carriers can be in are particle-in-a-box-like states.
Decision making process Intuitive vs. rational Decision_tool > Cognitive styles > Intuitive vs. rational The psychologist Daniel Kahneman, adopting terms originally proposed by the psychologists Keith Stanovich and Richard West, has theorized that a person's decision-making is the result of an interplay between two kinds of cognitive processes: an automatic intuitive system (called "System 1") and an effortful rational system (called "System 2"). System 1 is a bottom-up, fast, and implicit system of decision-making, while system 2 is a top-down, slow, and explicit system of decision-making. System 1 includes simple heuristics in judgment and decision-making such as the affect heuristic, the availability heuristic, the familiarity heuristic, and the representativeness heuristic.
Molar specific heat Measurement Heat_Capacity > Measurement The heat capacity can usually be measured by the method implied by its definition: start with the object at a known uniform temperature, add a known amount of heat energy to it, wait for its temperature to become uniform, and measure the change in its temperature. This method can give moderately accurate values for many solids; however, it cannot provide very precise measurements, especially for gases.
James Franck Franck–Hertz experiment James_Franck > Franck–Hertz experiment Slower electrons just bounce off mercury atoms without losing any significant speed or kinetic energy.These experimental results provided confirmation of Albert Einstein's photoelectric effect and Planck's relation (E = fh) linking energy (E) and frequency (f) arising from quantisation of energy with Planck's constant (h). But they also provided evidence supporting the model of the atom that had been proposed the previous year by Niels Bohr. Its key feature was that an electron inside an atom occupies one of the atom's "quantum energy levels".
Producer–consumer problem Dijkstra's bounded buffer solution Producer–consumer_problem > Dijkstra's bounded buffer solution If the buffer is empty, that is the number of queueing portions is zero, the consumer thread will wait in the P(number of queueing portions) operation. The V() operations release the semaphores. As a side effect, a thread can move from the wait queue to the ready queue.
Institute for Information, Telecommunication and Media Law Current research projects Institute_for_Information,_Telecommunication_and_Media_Law > Scientific activities > Current research projects Thereby the head of the Project is Fernando Galindo of the University of Zaragoza. Matters of Law in the German Research Network (DFN). The German Research Network (DFN) supports communication and the exchange of information or data between representatives of science, research, education and culture in national and international networks.
McCarthy 91 function History McCarthy_91_function > History The 91 function was introduced in papers published by Zohar Manna, Amir Pnueli and John McCarthy in 1970. These papers represented early developments towards the application of formal methods to program verification. The 91 function was chosen for being nested-recursive (contrasted with single recursion, such as defining f ( n ) {\displaystyle f(n)} by means of f ( n − 1 ) {\displaystyle f(n-1)} ). The example was popularized by Manna's book, Mathematical Theory of Computation (1974).
Affective disorder Not otherwise specified Mood_disturbance > Classification > Not otherwise specified The diagnosis of MD-NOS does not exist in the DSM-5, however the diagnoses of unspecified depressive disorder and unspecified bipolar disorder are in the DSM-5.Most cases of MD-NOS represent hybrids between mood and anxiety disorders, such as mixed anxiety-depressive disorder or atypical depression. An example of an instance of MD-NOS is being in minor depression frequently during various intervals, such as once every month or once in three days. There is a risk for MD-NOS not to get noticed, and for that reason not to get treated.
Anonymous recursion Passing functions as arguments Anonymous_recursion > Alternatives > Passing functions as arguments This is mainly of academic interest, particularly to show that the lambda calculus has recursion, as the resulting expression is significantly more complicated than the original named recursive function. Conversely, the use of fixed-pointed combinators may be generically referred to as "anonymous recursion", as this is a notable use of them, though they have other applications.This is illustrated below using Python.
Marketing and artificial intelligence Use of artificial intelligence to analyze social networks on the web Marketing_and_artificial_intelligence > Use of artificial intelligence to analyze social networks on the web A social network is a social arrangement of actors who make up a group, within a network; there can be an array of ties and nodes that exemplifies common occurrences within a network and common relationships. Lui (2011), describes a social network as, “the study of social entities (people in an organization, called actors), and their interactions and relationships. The interactions and relationships can be represented with a network or graph, where each vertex (or node) represents an actor and each link represents a relationship.” At the present time there is a growth in virtual social networking with the common emergence of social networks being replicated online, for example, social networking sites such as Twitter, Facebook and LinkedIn. From a marketing perspective, analysis and simulation of these networks can help to understand consumer behavior and opinion. The use of Agent-based social simulation techniques and data/opinion mining to collect social knowledge of networks can help a marketer to understand their market and segments within it.
Ebola hemorrhagic fever Pathophysiology Ebola > Pathophysiology Like other filoviruses, EBOV replicates very efficiently in many cells, producing large amounts of virus in monocytes, macrophages, dendritic cells and other cells including liver cells, fibroblasts, and adrenal gland cells. Viral replication triggers high levels of inflammatory chemical signals and leads to a septic state.EBOV is thought to infect humans through contact with mucous membranes or skin breaks. After infection, endothelial cells (cells lining the inside of blood vessels), liver cells, and several types of immune cells such as macrophages, monocytes, and dendritic cells are the main targets of attack. Following infection, immune cells carry the virus to nearby lymph nodes where further reproduction of the virus takes place.