text
stringlengths
31
999
source
stringclasses
5 values
A number of different Markov models of DNA sequence evolution have been proposed. These substitution models differ in terms of the parameters used to describe the rates at which one nucleotide replaces another during evolution. These models are frequently used in molecular phylogenetic analyses
https://huggingface.co/datasets/fmars/wiki_stem
Multiple sequence alignment (MSA) may refer to the process or the result of sequence alignment of three or more biological sequences, generally protein, DNA, or RNA. In many cases, the input set of query sequences are assumed to have an evolutionary relationship by which they share a linkage and are descended from a common ancestor. From the resulting MSA, sequence homology can be inferred and phylogenetic analysis can be conducted to assess the sequences' shared evolutionary origins
https://huggingface.co/datasets/fmars/wiki_stem
The Needleman–Wunsch algorithm is an algorithm used in bioinformatics to align protein or nucleotide sequences. It was one of the first applications of dynamic programming to compare biological sequences. The algorithm was developed by Saul B
https://huggingface.co/datasets/fmars/wiki_stem
In bioinformatics, neighbor joining is a bottom-up (agglomerative) clustering method for the creation of phylogenetic trees, created by Naruya Saitou and Masatoshi Nei in 1987. Usually based on DNA or protein sequence data, the algorithm requires knowledge of the distance between each pair of taxa (e. g
https://huggingface.co/datasets/fmars/wiki_stem
NeighborNet is an algorithm for constructing phylogenetic networks which is loosely based on the neighbor joining algorithm. Like neighbor joining, the method takes a distance matrix as input, and works by agglomerating clusters. However, the NeighborNet algorithm can lead to collections of clusters which overlap and do not form a hierarchy, and are represented using a type of phylogenetic network called a splits graph
https://huggingface.co/datasets/fmars/wiki_stem
Perfect phylogeny is a term used in computational phylogenetics to denote a phylogenetic tree in which all internal nodes may be labeled such that all characters evolve down the tree without homoplasy. That is, characteristics do not hold to evolutionary convergence, and do not have analogous structures. Statistically, this can be represented as an ancestor having state "0" in all characteristics where 0 represents a lack of that characteristic
https://huggingface.co/datasets/fmars/wiki_stem
In molecular phylogenetics, relationships among individuals are determined using character traits, such as DNA, RNA or protein, which may be obtained using a variety of sequencing technologies. High-throughput next-generation sequencing has become a popular technique in transcriptomics, which represent a snapshot of gene expression. In eukaryotes, making phylogenetic inferences using RNA is complicated by alternative splicing, which produces multiple transcripts from a single gene
https://huggingface.co/datasets/fmars/wiki_stem
PhylomeDB is a public biological database for complete catalogs of gene phylogenies (phylomes). It allows users to interactively explore the evolutionary history of genes through the visualization of phylogenetic trees and multiple sequence alignments. Moreover, phylomeDB provides genome-wide orthology and paralogy predictions which are based on the analysis of the phylogenetic trees
https://huggingface.co/datasets/fmars/wiki_stem
ProbCons is an open source probabilistic consistency-based multiple alignment of amino acid sequences. It is one of the most efficient protein multiple sequence alignment programs, since it has repeatedly demonstrated a statistically significant advantage in accuracy over similar tools, including Clustal and MAFFT. Algorithm The following describes the basic outline of the ProbCons algorithm
https://huggingface.co/datasets/fmars/wiki_stem
The quartet distance is a way of measuring the distance between two phylogenetic trees. It is defined as the number of subsets of four leaves that are not related by the same topology in both trees. Computing the quartet distance The most straightforward computation of the quartet distance would require O ( N 4 ) {\displaystyle O(N^{4})} time, where N {\displaystyle N} is the number of leaves in the trees
https://huggingface.co/datasets/fmars/wiki_stem
The Robinson–Foulds or symmetric difference metric, often abbreviated as the RF distance, is a simple way to calculate the distance between phylogenetic trees. It is defined as (A + B) where A is the number of partitions of data implied by the first tree but not the second tree and B is the number of partitions of data implied by the second tree but not the first tree (although some software implementations divide the RF metric by 2 and others scale the RF distance to have a maximum value of 1). The partitions are calculated for each tree by removing each branch
https://huggingface.co/datasets/fmars/wiki_stem
In bioinformatics, a sequence alignment is a way of arranging the sequences of DNA, RNA, or protein to identify regions of similarity that may be a consequence of functional, structural, or evolutionary relationships between the sequences. Aligned sequences of nucleotide or amino acid residues are typically represented as rows within a matrix. Gaps are inserted between the residues so that identical or similar characters are aligned in successive columns
https://huggingface.co/datasets/fmars/wiki_stem
The Smith–Waterman algorithm performs local sequence alignment; that is, for determining similar regions between two strings of nucleic acid sequences or protein sequences. Instead of looking at the entire sequence, the Smith–Waterman algorithm compares segments of all possible lengths and optimizes the similarity measure. The algorithm was first proposed by Temple F
https://huggingface.co/datasets/fmars/wiki_stem
In biology, a substitution model, also called models of DNA sequence evolution, are Markov models that describe changes over evolutionary time. These models describe evolutionary changes in macromolecules (e. g
https://huggingface.co/datasets/fmars/wiki_stem
In computational phylogenetics, tree alignment is a computational problem concerned with producing multiple sequence alignments, or alignments of three or more sequences of DNA, RNA, or protein. Sequences are arranged into a phylogenetic tree, modeling the evolutionary relationships between species or taxa. The edit distances between sequences are calculated for each of the tree's internal vertices, such that the sum of all edit distances within the tree is minimized
https://huggingface.co/datasets/fmars/wiki_stem
TreeFam (Tree families database) is a database of phylogenetic trees of animal genes. It aims at developing a curated resource that gives reliable information about ortholog and paralog assignments, and evolutionary history of various gene families. TreeFam defines a gene family as a group of genes that evolved after the speciation of single-metazoan animals
https://huggingface.co/datasets/fmars/wiki_stem
UCbase is a database of ultraconserved sequences (UCRs or UCEs) that were first described by Bejerano, G. et al. in 2004
https://huggingface.co/datasets/fmars/wiki_stem
UPGMA (unweighted pair group method with arithmetic mean) is a simple agglomerative (bottom-up) hierarchical clustering method. It also has a weighted variant, WPGMA, and they are generally attributed to Sokal and Michener. Note that the unweighted term indicates that all distances contribute equally to each average that is computed and does not refer to the math by which it is achieved
https://huggingface.co/datasets/fmars/wiki_stem
WPGMA (Weighted Pair Group Method with Arithmetic Mean) is a simple agglomerative (bottom-up) hierarchical clustering method, generally attributed to Sokal and Michener. The WPGMA method is similar to its unweighted variant, the UPGMA method. Algorithm The WPGMA algorithm constructs a rooted tree (dendrogram) that reflects the structure present in a pairwise distance matrix (or a similarity matrix)
https://huggingface.co/datasets/fmars/wiki_stem
DNA barcoding of algae is commonly used for species identification and phylogenetic studies. Algae form a phylogenetically heterogeneous group, meaning that the application of a single universal barcode/marker for species delimitation is unfeasible, thus different markers/barcodes are applied for this aim in different algal groups. Diatoms Diatom DNA barcoding is a method for taxonomical identification of diatoms even to species level
https://huggingface.co/datasets/fmars/wiki_stem
DNA barcoding is an alternative method to the traditional morphological taxonomic classification, and has frequently been used to identify species of aquatic macroinvertebrates (generally considered those large enough to be seen without magnification). Many are crucial indicator organisms in the bioassessment of freshwater (e. g
https://huggingface.co/datasets/fmars/wiki_stem
The Consortium for the Barcode of Life (CBOL) was an international initiative dedicated to supporting the development of DNA barcoding as a global standard for species identification. CBOL's Secretariat Office is hosted by the National Museum of Natural History, Smithsonian Institution, in Washington, DC. Barcoding was proposed in 2003 by Prof
https://huggingface.co/datasets/fmars/wiki_stem
Deterministic Barcoding in Tissue for Spatial Omics Sequencing (DBiT-seq) was developed at Yale University by Rong Fan and colleagues in 2020 to create a multi-omics approach for studying spatial gene expression heterogenicity within a tissue sample. This method can used for the co-mapping mRNA and protein levels at a near single-cell resolution in fresh or frozen formaldehyde-fixed tissue samples. DBiT-seq utilizes next generation sequencing (NGS) and microfluidics
https://huggingface.co/datasets/fmars/wiki_stem
DNA barcoding is a method of species identification using a short section of DNA from a specific gene or genes. The premise of DNA barcoding is that by comparison with a reference library of such DNA sections (also called "sequences"), an individual sequence can be used to uniquely identify an organism to species, just as a supermarket scanner uses the familiar black stripes of the UPC barcode to identify an item in its stock against its reference database. These "barcodes" are sometimes used in an effort to identify unknown species or parts of an organism, simply to catalog as many taxa as possible, or to compare with traditional taxonomy in an effort to determine species boundaries
https://huggingface.co/datasets/fmars/wiki_stem
DNA barcoding in diet assessment is the use of DNA barcoding to analyse the diet of organisms. and further detect and describe their trophic interactions. This approach is based on the identification of consumed species by characterization of DNA present in dietary samples, e
https://huggingface.co/datasets/fmars/wiki_stem
DNA barcoding methods for fish are used to identify groups of fish based on DNA sequences within selected regions of a genome. These methods can be used to study fish, as genetic material, in the form of environmental DNA (eDNA) or cells, is freely diffused in the water. This allows researchers to identify which species are present in a body of water by collecting a water sample, extracting DNA from the sample and isolating DNA sequences that are specific for the species of interest
https://huggingface.co/datasets/fmars/wiki_stem
Fungal DNA barcoding is the process of identifying species of the biological kingdom Fungi through the amplification and sequencing of specific DNA sequences and their comparison with sequences deposited in a DNA barcode database such as the ISHAM reference database, or the Barcode of Life Data System (BOLD). In this attempt, DNA barcoding relies on universal genes that are ideally present in all fungi with the same degree of sequence variation. The interspecific variation, i
https://huggingface.co/datasets/fmars/wiki_stem
Metabarcoding is the barcoding of DNA/RNA (or eDNA/eRNA) in a manner that allows for the simultaneous identification of many taxa within the same sample. The main difference between barcoding and metabarcoding is that metabarcoding does not focus on one specific organism, but instead aims to determine species composition within a sample. A barcode consists of a short variable gene region (for example, see different markers/barcodes) which is useful for taxonomic assignment flanked by highly conserved gene regions which can be used for primer design
https://huggingface.co/datasets/fmars/wiki_stem
Microbial DNA barcoding is the use of DNA metabarcoding to characterize a mixture of microorganisms. DNA metabarcoding is a method of DNA barcoding that uses universal genetic markers to identify DNA of a mixture of organisms. History Using metabarcoding to assess microbial communities has a long history
https://huggingface.co/datasets/fmars/wiki_stem
Pollen DNA barcoding is the process of identifying pollen donor plant species through the amplification and sequencing of specific, conserved regions of plant DNA. Being able to accurately identify pollen has a wide range of applications though it has been difficult in the past due to the limitations of microscopic identification of pollen. Pollen identified using DNA barcoding involves the specific targeting of gene regions that are found in most to all plant species but have high variation between members of different species
https://huggingface.co/datasets/fmars/wiki_stem
The evolution of tetrapods began about 400 million years ago in the Devonian Period with the earliest tetrapods evolved from lobe-finned fishes. Tetrapods (under the apomorphy-based definition used on this page) are categorized as animals in the biological superclass Tetrapoda, which includes all living and extinct amphibians, reptiles, birds, and mammals. While most species today are terrestrial, little evidence supports the idea that any of the earliest tetrapods could move about on land, as their limbs could not have held their midsections off the ground and the known trackways do not indicate they dragged their bellies around
https://huggingface.co/datasets/fmars/wiki_stem
Eotetrapodiformes is a clade of tetrapodomorphs including the four-limbed vertebrates ("tetrapods" in the traditional sense) and their closest finned relatives, two groups of stem tetrapods called tristichopterids and elpistostegalids. Description This clade is defined as "the node-based clade arising from the most recent common ancestor of Eusthenopteron and Ichthyostega plus all of its descendants," for their litany of shared morphological characteristics, such as similarities in their lower jaws and endocrania. Utilizing the holotype FMNH PF 610 of the sarcopterygian Litoptychus bryanti, paleontologists highlighted the division between the ethmoid and sphenoid processes, as well as vomeral and parasphenoid processes similar to those of more derived tetrapods
https://huggingface.co/datasets/fmars/wiki_stem
The epididymis, which is a tube that connects a testicle to a vas deferens in the male reproductive system, evolved by retention of the mesonephric duct during regression and replacement of the mesonephros with the metanephric kidney. Similarly, during embryological involution of the paired mesonephric kidneys, each mesonephric duct is retained to become the epididymis, vas deferens, seminal vesicle and ejaculatory duct (Wolffian duct). In reptiles and birds both the testes and excurrent ducts (efferent ducts, epididymis, vas deferens) occur in an intra-abdominal location (testicond)
https://huggingface.co/datasets/fmars/wiki_stem
A feathered dinosaur is any species of dinosaur possessing feathers. While this includes all species of birds, there is a hypothesis that many, if not all non-avian dinosaur species also possessed feathers in some shape or form. This theory has been challenged by some research
https://huggingface.co/datasets/fmars/wiki_stem
Polydactyly in stem-tetrapods should here be understood as having more than five digits to the finger or foot, a condition that was the natural state of affairs in the earliest stegocephalians during the evolution of terrestriality. The polydactyly in these largely aquatic animals is not to be confused with polydactyly in the medical sense, i. e
https://huggingface.co/datasets/fmars/wiki_stem
Reptiles arose about 320 million years ago during the Carboniferous period. Reptiles, in the traditional sense of the term, are defined as animals that have scales or scutes, lay land-based hard-shelled eggs, and possess ectothermic metabolisms. So defined, the group is paraphyletic, excluding endothermic animals like birds that are descended from early traditionally-defined reptiles
https://huggingface.co/datasets/fmars/wiki_stem
Rhipidistia, also known as Dipnotetrapodomorpha, is a clade of lobe-finned fishes which includes the tetrapods and lungfishes. Rhipidistia formerly referred to a subgroup of Sarcopterygii consisting of the Porolepiformes and Osteolepiformes, a definition that is now obsolete. However, as cladistic understanding of the vertebrates has improved over the last few decades, a monophyletic Rhipidistia is now understood to include the whole of Tetrapoda and the lungfishes
https://huggingface.co/datasets/fmars/wiki_stem
Romer's gap is an example of an apparent gap in the tetrapod fossil record used in the study of evolutionary biology. Such gaps represent periods from which excavators have not yet found relevant fossils. Romer's gap is named after paleontologist Alfred Romer, who first recognised it
https://huggingface.co/datasets/fmars/wiki_stem
Venom in snakes and some lizards is a form of saliva that has been modified into venom over its evolutionary history. In snakes, venom has evolved to kill or subdue prey, as well as to perform other diet-related functions. While snakes occasionally use their venom in self defense, this is not believed to have had a strong effect on venom evolution
https://huggingface.co/datasets/fmars/wiki_stem
Tiktaalik (; Inuktitut ᑎᒃᑖᓕᒃ [tiktaːlik]) is a monospecific genus of extinct sarcopterygian (lobe-finned fish) from the Late Devonian Period, about 375 Mya (million years ago), having many features akin to those of tetrapods (four-legged animals). Tiktaalik is estimated to have had a total length of 1. 25–2
https://huggingface.co/datasets/fmars/wiki_stem
An academic, or scientific genealogy organizes a family tree of scientists and scholars according to mentoring relationships, often in the form of dissertation supervision relationships, and not according to genetic relationships as in conventional genealogy. Since the term academic genealogy has now developed this specific meaning, its additional use to describe a more academic approach to conventional genealogy would be ambiguous, so the description scholarly genealogy is now generally used in the latter context. Overview The academic lineage or academic ancestry of someone is a chain of professors who have served as academic mentors or thesis advisors of each other, ending with the person in question
https://huggingface.co/datasets/fmars/wiki_stem
In genealogy and in phylogenetic studies of evolutionary biology, antecedents or antecessors are predecessors in a family line. For example, one is the descendant of their grandparents, who are one's antecedents. This term has particular utility in evolutionary coalescent theory, which models the process of genetic drift in reverse time
https://huggingface.co/datasets/fmars/wiki_stem
BALSAC is a population database that allows for the creation of genealogical histories from Quebec, covering individuals from within the province's territory from the beginning of European settlement in the 17th century to today. The database is named after the first letters of the regions it first included. History BALSAC was created in 1972 at the Université du Québec à Chicoutimi in partnership with Université Laval, McGill University, and the Université de Montréal on the initiative of Gérard Bouchard
https://huggingface.co/datasets/fmars/wiki_stem
C2orf74, also known as LOC339804, is a protein encoding gene located on the short arm of chromosome 2 near position 15 (2p15). Isoform 1 of the gene is 19,713 base pairs long. C2orf74 has orthologs in 135 different species, including primarily placental mammals and some marsupials
https://huggingface.co/datasets/fmars/wiki_stem
During the decennial England and Wales Censuses of 1841 to 1901, the individual schedules returned from each household were transcribed and collated by the census enumerators into Census Enumerators' Books (CEBs). It is these CEBs that are used by researchers in the fields of social science, local and family history etc. Their contents changed over time
https://huggingface.co/datasets/fmars/wiki_stem
Cluster genealogy is a research technique employed by genealogists to learn more about an ancestor by examining records left by the ancestor's cluster. A person's cluster consists of the extended family, friends, neighbors, and other associates such as business partners. Researching the lives of an ancestor's cluster leads to a more complete and more accurate picture of the ancestor's life
https://huggingface.co/datasets/fmars/wiki_stem
The coefficient of inbreeding of an individual is the probability that two alleles at any locus in an individual are identical by descent from the common ancestor(s) of the two parents. Calculation An individual is said to be inbred if there is a loop in its pedigree chart. A loop is defined as a path that runs from an individual up to the common ancestor through one parent and back down to the other parent, without going through any individual twice
https://huggingface.co/datasets/fmars/wiki_stem
The coefficient of relationship is a measure of the degree of consanguinity (or biological relationship) between two individuals. The term coefficient of relationship was defined by Sewall Wright in 1922, and was derived from his definition of the coefficient of inbreeding of 1921. The measure is most commonly used in genetics and genealogy
https://huggingface.co/datasets/fmars/wiki_stem
Consanguine marriage is marriage between individuals who are closely related. Though it may involve incest, it implies more than the sexual nature of incest. In a clinical sense, marriage between two family members who are second cousins or closer qualifies as consanguineous marriage
https://huggingface.co/datasets/fmars/wiki_stem
In European genealogy, a descent from antiquity (DFA or DfA) is a proven unbroken line of descent between specific individuals from ancient history and people living today. Descents can readily be traced back to the Early Middle Ages, but beyond that, insufficient documentation of the ancestry of the new royal and noble families of the period makes tracing them to historical figures from antiquity challenging. Though the subject of ongoing effort, no well-researched, historically-documented generation-by-generation genealogical descents are known to exist in Europe
https://huggingface.co/datasets/fmars/wiki_stem
A family tree, also called a genealogy or a pedigree chart, is a chart representing family relationships in a conventional tree structure. More detailed family trees, used in medicine and social work, are known as genograms. Representations of family history Genealogical data can be represented in several formats, for example, as a pedigree or ancestry chart
https://huggingface.co/datasets/fmars/wiki_stem
Several genealogical numbering systems have been widely adopted for presenting family trees and pedigree charts in text format. Ascending numbering systems Ahnentafel Ahnentafel, also known as the Eytzinger Method, Sosa Method, and Sosa-Stradonitz Method, allows for the numbering of ancestors beginning with a descendant. This system allows one to derive an ancestor's number without compiling the complete list, and allows one to derive an ancestor's relationship based on their number
https://huggingface.co/datasets/fmars/wiki_stem
The Genealogical Proof Standard (GPS) is a guideline for establishing the reliability ("proof") of a genealogical conclusion with reasonable certainty. It is important within the genealogical community for clearly communicating the quality of research performed, such as by a professional genealogist. It is also useful for helping new genealogists understand what is needed to do high-quality research
https://huggingface.co/datasets/fmars/wiki_stem
The Generations of Noah, also called the Table of Nations or Origines Gentium, is a genealogy of the sons of Noah, according to the Hebrew Bible (Genesis 10:9), and their dispersion into many lands after the Flood, focusing on the major known societies. The term nations to describe the descendants is a standard English translation of the Hebrew word "goyim", following the c. 400 CE Latin Vulgate's "nationes", and does not have the same political connotations that the word entails today
https://huggingface.co/datasets/fmars/wiki_stem
In genetic genealogy, the identical ancestors point (IAP), or all common ancestors (ACA) point, or genetic isopoint, is the most recent point in a given population's past such that each individual alive at this point either has no living descendants, or is the ancestor of every individual alive in the present. This point lies further in the past than the population's most recent common ancestor (MRCA). Calculation A set of full siblings has an IAP one generation back: their parents
https://huggingface.co/datasets/fmars/wiki_stem
The International Congress of Genealogical and Heraldic Sciences is a biennial conference discussing topics of heraldic and genealogical interest. The Congress brings together scholars and other interested persons from all the nations of Europe and from many countries around the world. The first Congress was held in Barcelona in 1929; at the second Congress, held in 1953, it was decided that future meetings would be held every two years (there have been two exceptions)
https://huggingface.co/datasets/fmars/wiki_stem
Jure matris (iure matris) is a Latin phrase meaning "by right of his mother" or "in right of his mother". It is commonly encountered in the law of inheritance when a noble title or other right passes from mother to son. It is also used in the context of monarchy in cases where a woman holds a title in her own right but grants exercise of the power to her son
https://huggingface.co/datasets/fmars/wiki_stem
Jure uxoris (a Latin phrase meaning "by right of (his) wife") describes a title of nobility used by a man because his wife holds the office or title suo jure ("in her own right"). Similarly, the husband of an heiress could become the legal possessor of her lands. For example, married women in England and Wales were legally incapable of owning real estate until the Married Women's Property Act 1882
https://huggingface.co/datasets/fmars/wiki_stem
In biology and genetic genealogy, the most recent common ancestor (MRCA), also known as the last common ancestor (LCA) or concestor, of a set of organisms is the most recent individual from which all the organisms of the set are descended. The term is also used in reference to the ancestry of groups of genes (haplotypes) rather than organisms. The MRCA of a set of individuals can sometimes be determined by referring to an established pedigree
https://huggingface.co/datasets/fmars/wiki_stem
Nomen nescio (pronounced [ˈnoːmɛn ˈnɛskɪ. oː]), abbreviated to N. N
https://huggingface.co/datasets/fmars/wiki_stem
In genetics, a non-paternity event (also known as misattributed paternity, not parent expected, or NPE) is the situation in which someone who is presumed to be an individual's father is not in fact the biological father. This presumption of NPE is a subset of a misattributed parentage experience (MPE) which may be on the part of the individual, the parents, or the attending midwife, physician or nurse. An NPE may result from sperm donation, undisclosed adoption, heteropaternal superfecundation, promiscuity, paternity fraud, or sexual assault, as well as medical mistakes, for example, mixups during procedures such as in vitro fertilization and artificial insemination
https://huggingface.co/datasets/fmars/wiki_stem
A Nonconformist register is broadly similar to a parish register, but deriving from a nonconformist church or chapel. Nonconformist churches do not conform to the doctrines of the Church of England. In other words, these Protestant churches dissent from the established church
https://huggingface.co/datasets/fmars/wiki_stem
A one-name study is a project researching a specific surname, as opposed to a particular pedigree (ancestors of one person) or descendancy (descendants of one person or couple). Some people who research a specific surname may restrict their research geographically and chronologically, perhaps to one country and time period, while others may collect all occurrences world-wide for all time. A one-name study is not limited to persons who are related biologically
https://huggingface.co/datasets/fmars/wiki_stem
One-place studies are a branch of family history and/or local history with a focus on the entire population of a single road, village or community, not just a single, geographically dispersed family line. Introduction In the course of a one-place study, a prime objective is to transcribe the registers of christenings, marriages and burials of the parish church so they can be restructured into family order in a database. This is then correlated with other archival records such as tax, land and testamentary documents, and published as a biographical index
https://huggingface.co/datasets/fmars/wiki_stem
A parish register, alternatively known as a parochial register, is a handwritten volume, normally kept in the parish church of an ecclesiastical parish in which certain details of religious ceremonies marking major events such as baptisms (together with the dates and names of the parents), marriages (with the names of the partners), children, and burials (that had taken place within the parish) are recorded. Along with these vital details, church goods, the parish's response to briefs, and notes on various happenings in the parish were also recorded. These elaborate records existed for the purpose of preventing bigamy and consanguineous marriage
https://huggingface.co/datasets/fmars/wiki_stem
A ranked society in anthropology is one that ranks individuals in terms of their genealogical distance from the chief. Another term for a "ranked society" is a chiefdom. Closer relatives of the chief have higher rank or social status than more distant ones
https://huggingface.co/datasets/fmars/wiki_stem
Residential genealogy refers to the study of the historical connections between individuals and their places of residence or ownership. This interdisciplinary field involves researching historical documents, land records, and other materials to discover the changing occupants or owners of a particular dwelling or piece of land over time. Residential genealogy is intriguing to a diverse array of individuals, including history enthusiasts, genealogists, and real estate agents
https://huggingface.co/datasets/fmars/wiki_stem
Intrusion tolerance is a fault-tolerant design approach to defending information systems against malicious attacks. In that sense, it is also a computer security approach. Abandoning the conventional aim of preventing all intrusions, intrusion tolerance instead calls for triggering mechanisms that prevent intrusions from leading to a system security failure
https://huggingface.co/datasets/fmars/wiki_stem
In telecommunication, a recovery procedure is a process that attempts to bring a system back to a normal operating state. Examples: The actions necessary to restore an automated information system's data files and computational capability after a system failure. In data communications, a process whereby a data station attempts to resolve conflicting or erroneous conditions arising during the data transfer
https://huggingface.co/datasets/fmars/wiki_stem
Fault tolerance is the property that enables a system to continue operating properly in the event of the failure of one or more faults within some of its components. If its operating quality decreases at all, the decrease is proportional to the severity of the failure, as compared to a naively designed system, in which even a small failure can cause total breakdown. Fault tolerance is particularly sought after in high-availability, mission-critical, or even life-critical systems
https://huggingface.co/datasets/fmars/wiki_stem
Software fault tolerance is the ability of computer software to continue its normal operation despite the presence of system or hardware faults. Fault-tolerant software has the ability to satisfy requirements despite failures. Introduction The only thing constant is change
https://huggingface.co/datasets/fmars/wiki_stem
Information governance, or IG, is the overall strategy for information at an organization. Information governance balances the risk that information presents with the value that information provides. Information governance helps with legal compliance, operational transparency, and reducing expenditures associated with legal discovery
https://huggingface.co/datasets/fmars/wiki_stem
A business record is a document (hard copy or digital) that records an "act, condition, or event" related to business. Business records include meeting minutes, memoranda, employment contracts, and accounting source documents. It must be retrievable at a later date so that the business dealings can be accurately reviewed as required
https://huggingface.co/datasets/fmars/wiki_stem
Computer security, cyber security, digital security or information technology security (IT security) is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. The field is significant due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi. Also, due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT)
https://huggingface.co/datasets/fmars/wiki_stem
Corporate governance are mechanisms, processes and relations by which corporations are controlled and operated ("governed"). Definitions "Corporate governance" may be defined, described or delineated in diverse ways, depending on the writer's purpose. Writers focused on a disciplinary interest or context (such as accounting, finance, law, or management) often adopt narrow definitions that appear purpose-specific
https://huggingface.co/datasets/fmars/wiki_stem
Cryptographic splitting, also known as cryptographic bit splitting or cryptographic data splitting, is a technique for securing data over a computer network. The technique involves encrypting data, splitting the encrypted data into smaller data units, distributing those smaller units to different storage locations, and then further encrypting the data at its new location. With this process, the data is protected from security breaches, because even if an intruder is able to retrieve and decrypt one data unit, the information would be useless unless it can be combined with decrypted data units from the other locations
https://huggingface.co/datasets/fmars/wiki_stem
The Cyber Assessment Framework is a mechanism designed by NCSC for assuring the security of organisations. The CAF is tailored towards the needs of Critical National Infrastructure, to meet the NIS regulations, but the objectives can be used by other organisations. In addition to national public-sector and infrastructure bodies, the CAF is also being used by local government
https://huggingface.co/datasets/fmars/wiki_stem
Internet security awareness or Cyber security awareness refers to how much end-users know about the cyber security threats their networks face, the risks they introduce and mitigating security best practices to guide their behavior. End users are considered the weakest link and the primary vulnerability within a network. Since end-users are a major vulnerability, technical means to improve security are not enough
https://huggingface.co/datasets/fmars/wiki_stem
Data re-identification or de-anonymization is the practice of matching anonymous data (also known as de-identified data) with publicly available information, or auxiliary data, in order to discover the person the data belong to. This is a concern because companies with privacy policies, health care providers, and financial institutions may release the data they collect after the data has gone through the de-identification process. The de-identification process involves masking, generalizing or deleting both direct and indirect identifiers; the definition of this process is not universal
https://huggingface.co/datasets/fmars/wiki_stem
Discovery, in the law of common law jurisdictions, is a pre-trial procedure in a lawsuit in which each party, through the law of civil procedure, can obtain evidence from the other party or parties by means of discovery devices such as interrogatories, requests for production of documents, requests for admissions and depositions. Discovery can be obtained from non-parties using subpoenas. When a discovery request is objected to, the requesting party may seek the assistance of the court by filing a motion to compel discovery
https://huggingface.co/datasets/fmars/wiki_stem
Election cybersecurity or election security refers to the protection of elections and voting infrastructure from cyberattack or cyber threat – including the tampering with or infiltration of voting machines and equipment, election office networks and practices, and voter registration databases. Cyber threats or attacks to elections or voting infrastructure could be carried out by insiders within a voting jurisdiction, or by a variety of other actors ranging from nefarious nation-states, to organized cyber criminals to lone-wolf hackers. Motives may range from a desire to influence the election outcome, to discrediting democratic processes, to creating public distrust or even political upheaval
https://huggingface.co/datasets/fmars/wiki_stem
Electronic discovery (also ediscovery or e-discovery) refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format (often referred to as electronically stored information or ESI). Electronic discovery is subject to rules of civil procedure and agreed-upon processes, often involving review for privilege and relevance before data are turned over to the requesting party. Electronic information is considered different from paper information because of its intangible form, volume, transience and persistence
https://huggingface.co/datasets/fmars/wiki_stem
IASME Governance is an Information Assurance standard that is designed to be simple and affordable to help improve the cyber security of Small and medium-sized enterprises (SMEs). The IASME Governance technical controls are aligned with the Cyber Essentials scheme and certification to the IASME standard includes certification to Cyber Essentials. The IASME Governance standard was developed in 2010 and has proven to be very effective at improving the security of supply chains for large organisations
https://huggingface.co/datasets/fmars/wiki_stem
Information architecture (IA) is the structural design of shared information environments; the art and science of organizing and labelling websites, intranets, online communities and software to support usability and findability; and an emerging community of practice focused on bringing principles of design, architecture and information science to the digital landscape. Typically, it involves a model or concept of information that is used and applied to activities which require explicit details of complex information systems. These activities include library systems and database development
https://huggingface.co/datasets/fmars/wiki_stem
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information
https://huggingface.co/datasets/fmars/wiki_stem
The Open Group Information Security Management Maturity Model (O-ISM3) is a maturity model for managing information security. It aims to ensure that security processes in any organization are implemented so as to operate at a level consistent with that organization’s business requirements. O-ISM3 defines a comprehensive but manageable number of information security processes sufficient for the needs of most organizations, with the relevant security control(s) being identified within each process as an essential subset of that process
https://huggingface.co/datasets/fmars/wiki_stem
A retention schedule is a listing of organizational information types, or series of information in a manner which facilitates the understanding and application of the identified and approved retention period, and other information retention aspects. Purpose Retention schedules are an important aspect of records management. Many organizations are subject to rules and regulations (at the local, state or federal level) that govern for how long they are required to keep records before they can safely dispose of them
https://huggingface.co/datasets/fmars/wiki_stem
Abstract Syntax Notation One (ASN. 1) is a standard interface description language for defining data structures that can be serialized and deserialized in a cross-platform way. It is broadly used in telecommunications and computer networking, and especially in cryptography
https://huggingface.co/datasets/fmars/wiki_stem
The Encoding Control Notation (ECN) is a standardized formal language that is part of the Abstract Syntax Notation One (ASN. 1) family of international standards. ECN is designed to be used along with ASN
https://huggingface.co/datasets/fmars/wiki_stem
A IA5String is a restricted character string type in the ASN. 1 notation. It is used to represent ISO 646 (IA5) characters
https://huggingface.co/datasets/fmars/wiki_stem
ASN. 1 Information Object Class is a concept widely used in ASN. 1 specifications to address issues related to protocol specification similar to issues addressed by CORBA/IDL specifications
https://huggingface.co/datasets/fmars/wiki_stem
T. 61 is an ITU-T Recommendation for a Teletex character set. T
https://huggingface.co/datasets/fmars/wiki_stem
In computing, object identifiers or OIDs are an identifier mechanism standardized by the International Telecommunication Union (ITU) and ISO/IEC for naming any object, concept, or "thing" with a globally unambiguous persistent name. Syntax and lexicon An OID corresponds to a node in the "OID tree" or hierarchy, which is formally defined using the ITU's OID standard, X. 660
https://huggingface.co/datasets/fmars/wiki_stem
In computing, the Structure of Management Information (SMI), an adapted subset of ASN. 1, is a technical language used in definitions of Simple Network Management Protocol (SNMP) and its extensions to define sets ("modules") of related managed objects in a Management Information Base (MIB). SMI subdivides into three parts: module definitions, object definitions, and notification definitions
https://huggingface.co/datasets/fmars/wiki_stem
TTCN-3 (Testing and Test Control Notation version 3) is a strongly typed testing language used in conformance testing of communicating systems. TTCN-3 is written by ETSI in the ES 201 873 series, and standardized by ITU-T in the Z. 160 Series
https://huggingface.co/datasets/fmars/wiki_stem
X. 690 is an ITU-T standard specifying several ASN. 1 encoding formats: Basic Encoding Rules (BER) Canonical Encoding Rules (CER) Distinguished Encoding Rules (DER)The Basic Encoding Rules (BER) were the original rules laid out by the ASN
https://huggingface.co/datasets/fmars/wiki_stem
In computing, configuration files (commonly known simply as config files) are files used to configure the parameters and initial settings for some computer programs. They are used for user applications, server processes and operating system settings. Some applications provide tools to create, modify, and verify the syntax of their configuration files; these sometimes have graphical interfaces
https://huggingface.co/datasets/fmars/wiki_stem
. properties is a file extension for files mainly used in Java-related technologies to store the configurable parameters of an application. They can also be used for storing strings for Internationalization and localization; these are known as Property Resource Bundles
https://huggingface.co/datasets/fmars/wiki_stem
sudo ( or ) is a program for Unix-like computer operating systems that enables users to run programs with the security privileges of another user, by default the superuser. It originally stood for "superuser do", as that was all it did, and it is its most common usage; however, the official Sudo project page lists it as "su 'do' ". The current Linux manual pages for su define it as "substitute user", making the correct meaning of sudo "substitute user, do", because sudo can run a command as other users as well
https://huggingface.co/datasets/fmars/wiki_stem
AUTOEXEC. BAT is a system file that was originally on DOS-type operating systems. It is a plain-text batch file in the root directory of the boot device
https://huggingface.co/datasets/fmars/wiki_stem