id int64 39 79M | url stringlengths 31 227 | text stringlengths 6 334k | source stringlengths 1 150 ⌀ | categories listlengths 1 6 | token_count int64 3 71.8k | subcategories listlengths 0 30 |
|---|---|---|---|---|---|---|
68,918,886 | https://en.wikipedia.org/wiki/Alice%20Chancellor | Alice Percilla Chancellor (September 2, 1912 – June 22, 1985) was an American electronics engineer, recipient of the 1970 Outstanding Handicapped Federal Employee of the Year award.
Early life and education
Chancellor was born in Kentland, Indiana, the daughter of James Robert Chancellor and Laura Maria Lowman Chancellor. Her father was a farmer. She had a childhood accident and subsequent infection that, in adulthood, made her blind in one eye, and required both her legs to be amputated in separate surgeries (1962 and 1964). In 1956, she resigned her civil service job to pursue a degree in engineering, which she completed at the University of Arizona.
Career
Chancellor, who used a wheelchair, worked as a stenographer and typist as a young woman, in private industry, for an Indiana draft board during World War II, and after 1952 in the Federal Civil Service. In 1962, after her college degree was completed, she was an electronics engineer for the United States Army in Arizona, at the Electronic Proving Ground at Fort Huachuca. She was named the Department of the Army's 1970 Handicapped Employee, and won the 1970 Outstanding Handicapped Federal Employee of the Year award, which was presented to her at a March 1971 ceremony by Pat Nixon.
Chancellor also received two Department of the Army Meritorious Civilian Service Awards. She was a member of the Institute of Electrical and Electronics Engineers, and active in the Arizona chapter of the Armed Forces Communications Electronic Association.
Personal life
Chancellor lived alone in her own house, and drove an adapted car. She enjoyed sewing clothes, for herself and for charity. In 1969, she donated 50 handmade Easter dresses to a nearby Indian reservation. She also made wardrobes for students at the Papago Indian School. She died in 1985, in Sierra Vista, Arizona, aged 72 years.
References
1912 births
1985 deaths
People from Kentland, Indiana
20th-century American women engineers
20th-century American engineers
Electronics engineers
University of Arizona alumni
People from Fort Huachuca, Arizona
American wheelchair users
American amputees
Members of the IEEE
American scientists with disabilities | Alice Chancellor | [
"Engineering"
] | 418 | [
"Electronics engineers",
"Electronic engineering"
] |
68,918,936 | https://en.wikipedia.org/wiki/Transition%20metal%20thiosulfate%20complex | A transition metal thiosulfate complex is a coordination complex containing one or more thiosulfate ligands. Thiosulfate occurs in nature and is used industrially, so its interactions with metal ions are of some practical interest.
Examples
Thiosulfate is a potent ligand for soft metal ions. A typical complex is , which features a pair of S-bonded thiosulfate ligands. Simple aquo and ammine complexes are also known. Three binding modes are common: monodentate (κ1-), O,S-bidentate (κ2-), and bridging (μ-).
Linkage isomerism (O vs S) has been observed in .
Preparation
Typically, thiosulfate complexes are prepared from thiosulfate salts by displacement of aquo or chloro ligands. In some cases, they arise by oxidation of polysulfido complexes, or by binding of sulfur trioxide to sulfido ligands.
Applications
Photography
Silver-thiosulfate complexes are produced by common photographic fixers. By dissolving silver halides, the fixer stabilises the image. The dissolution process entails reactions involving the formation of 1:2 and 1:3 complexes (X = halide): Fixation involves these chemical reactions (X = halide, typically ):
Recovery of precious metals
Sodium thiosulfate and ammonium thiosulfate have been proposed as alternative lixiviants to cyanide for extraction of gold from ores and printed circuit boards. The complex [Au(S2O3)2]3- is assumed to be the principal product in such extractions. Presently cyanide salts are used on a large scale for that purpose with obvious risks. The advantages of this approach are that (i) thiosulfate is far less toxic than cyanide and (ii) that ore types that are refractory to gold cyanidation (e.g. carbonaceous or Carlin-type ores) can be leached by thiosulfate. One problem with this alternative process is the high consumption of thiosulfate, which is more expensive than cyanide. Another issue is the lack of a suitable recovery technique since does not adsorb to activated carbon, which is the standard technique used in gold cyanidation to separate the gold complex from the ore slurry.
Naming
In the IUPAC Red Book the following terms may be used for thiosulfate as a ligand: trioxido-1κ3O-disulfato(S—S)(2−); trioxidosulfidosulfato(2−); thiosulfato; sulfurothioato. In the naming for thiosulfate salts, the final "o" is replaced by "e". Thus, sodium aurothiosulfate could be called trisodium di(thiosulfato)aurate(I).
References
Coordination chemistry
Coordination complexes
Ligands
Thiosulfates | Transition metal thiosulfate complex | [
"Chemistry"
] | 627 | [
"Ligands",
"Coordination chemistry",
"Coordination complexes"
] |
68,920,181 | https://en.wikipedia.org/wiki/Ferrari%20V10%20engine | Ferrari manufactured a series of 3.0-litre, naturally-aspirated, V10 racing engines, exclusively for their Formula One race cars; between and . They chose a V10 engine configuration, because it offered the best compromise between power and fuel efficiency; the V12 was powerful but thirsty while the V8 was weaker but economical. They switched to 2.4-litre naturally-aspirated V8 engine configuration for . Over its decade-long evolution, power levels varied; from @ 15,500 rpm in 1996, to over 900 horsepower, around @ 19,000 rpm, toward the end of the season. The Tipo 05 series of engines, produced between 2001 and 2005, was officially stated to produce between @ 17,800 rpm, and @ 18,300 rpm. In qualifying mode, however, these engine were reputed to develop up to, or at times over, at 19,000 rpm.
First generation: Tipo 04x engine (1996–2000)
Tipo 046/046/2 (1996–1997)
This Tipo 046 engine is notable for being the first to use the then more conventional V10 engine format, because a V10 engine offered the best compromise between power and fuel efficiency; the V12 was powerful but thirsty while the V8 was weaker but economical. The engine was also called the 310. It was engineered by former Honda technician Osamu Goto. The engine is a 75-degree V10; and produces 715 hp @ 15,550 rpm. The engine itself weighs .
Specifications
Weight: 120 kg
Engine Configuration: 75° V10
Bore: 90mm
Stroke: 47.1mm
Valves: 4 per cylinder
Displacement: 2998.1 cc
No. of revolutions: Max. 16.000-17,000 rpm
Power: ~ 533 kW (715 hp)
Power/liter: 238 hp/L
Tipo 047/B/C (1998)
The 3-litre Ferrari Tipo 047 V10 engine and designed around a narrower track as mandated by the FIA in a series of regulation changes for that season. The engine itself is a 80-degree V10; which makes @ 17,300 rpm.
Specifications
Weight: 120 kg
Engine Configuration: 80° V10
Bore: 92mm
Stroke: 45.08mm
Valves: 4 per cylinder
Displacement: 2996.7 cc
No. of revolutions: Max. 17,300 rpm
Power: 592 kW (805 hp)
Power/liter: 269 hp/L
Tipo 048/B/C (1999)
The Tipo 048/B/C engine is an 80-degree, 3.0-litre V10 engine, manufactured by Ferrari. The engine itself was designed by Giles Simon; who lead the engine design and operations. It produces 790 BHP (552 KW) @ 16,300 rpm, and won Ferrari their first World Constructors' championship in 20 years.
Specifications
Weight: 048/114 kg , 048B/107 kg , 048C/105 kg
Engine Configuration: 80° V10
Bore: 94mm
Stroke: 43.19mm
Valves: 4 per cylinder
Displacement: 2997.3 cc
Power: ~ 552 kW (790 hp) @ 16,300 rpm
Power/liter: 263 hp/L
Tipo 049 (2000)
Giles Simon lead the engine design procedure and operations of the Tipo 049. The engine was newly designed, with a wider V-angle (90 degrees vs. 75 degrees in the 048 engine); this new wider angle improved and lowered the centre of gravity of the car that it powered. The engine produced between 805 and 815 hp @ 17,300 RPM.
Specifications
Weight: 106 kg
Engine Configuration: 90° V10
Bore: 96mm
Stroke: 41.4mm
Valves: 4 per cylinder
Displacement: 2996.6 cc
No. of revolutions: Max. 17,300 rpm
Power: ~ 599 kW (815 hp)
Power/liter: 272 hp/L
Exhaust: Two outlet pipes
Installation position: Mid-engine, rear, longitudinal
Second generation: Tipo 05x engine (2001–2005)
Tipo 050 engine (2001)
The Ferrari Tipo 050 engine was designed by Gilles Simon. It is a 90-degree V10; which produces @ 17,300 rpm in race mode. However, the engine can be tuned to produce up to 900 horsepower in qualifying trim. The whole engine unit weighs 94 kg (207 lb.).
Tipo 051 engine (2002)
Ferrari Tipo 051 is the name of a racing engine from the Italian manufacturer Ferrari, which the team used in Formula 1 in the 2002 season. The V10 engine was developed under engine chief Paolo Martinelli.
The Type 051 was a new development but based on the architecture of its predecessor, the Tipo 050. All the main components have been revised. The engine block was made using a refined micro-casting technology. The cylinder heads were downsized and the crankcase modified so that the crankshaft was lowered, giving the vehicle an exceptionally low center of gravity. Associated components have been redesigned to reduce rotating masses and friction.
Ferrari also developed a new transmission for the new engine. The new case is significantly smaller, stiffer, and made from a lightweight titanium alloy, making it around 15% lighter than its predecessor. Along with the lighter internals and new clutchless direct shift technology, this resulted in smoother and faster shifting. Prototypes of this transmission were already on the test bench in September 2001. In this way, the team was able to ensure that, despite all the innovations, it was reliable right from the start.
The engine management came as before from Magneti Marelli, Shell supplied the fuel.
The Tipo 051 was used by Ferrari in the 2002 season on the F2002. Sauber used this engine (development status mid-September 2002) in the Sauber C22 in the 2003 season. However, Sauber used the name PETRONAS 03A for the engine.
Ferrari officially specified 835 hp at 17,800 rpm. In qualifying mode, however, the engine developed up to 900 hp at 19,000 rpm. In order to ensure durability, the performance in the race was reduced. There it delivered up to 865 hp at 18,600 rpm. With this power, the Type 051 was considered one of the most powerful engines in the field and was only surpassed by the P81 used by BMW Williams. This made up to 940 hp, but was less reliable than the Type 051.
In the course of the season, there were two further expansion stages, type 051B/C.
Specifications
Weight: 95 kg
Engine Configuration: 90° V10
Bore: 96mm
Stroke: 41.4mm
Valves: 4 per cylinder
Displacement: 2996.6 cc
No. of revolutions: Max. 17,800 rpm
Power: ~ 614 kW (835 hp)
Power/liter: 279 hp/L
Exhaust: Two outlet pipes
Installation position: Mid-engine, rear, longitudinal
Giles Simon and Paolo Martinelli led the engine's design and operations. The 3.0-litre Tipo 051 V10 engine produced @ 17,800 rpm in race trim. In qualifying mode, however, the engine developed up to at 19,000 rpm. The engine had a very low centre of gravity, but to ensure durability and reliability, the engine performance was reduced during the race. Thus, the Tipo 051 was capable of producing , and revving to a maximum of 18,600 rpm, all while having excellent handling. The new 051 engine was not the strongest engine of 2002, only being beaten out by the BMW P81 engine used by the Williams team (which produced ); but it was lighter, more compact, very fuel-efficient, and very driveable. An innovative and very small clutchless gearbox allowing ultra-quick changes had been designed, and because the unit was so small, the rear end aerodynamics were extremely tightly packaged. Bridgestone developed special tyres, suited specifically for the car.
Tipo 052 engine (2003)
Ferrari Type 052 is the name of a racing engine from the Italian manufacturer Ferrari, which the team used in Formula 1 in the 2003 season. The V10 engine was developed under engine chief Paolo Martinelli.
The Tipo 052 was used by Ferrari in the 2003 season. Ferrari contested the first four races of the season with the previous year's car, the F2002. The Type 052 was not used until the fifth race with the debut of the F2003-GA. This was because the F2003-GA's chassis was designed around the engine.
The Tipo 052 was a completely new development. Ferrari essentially pursued two goals when developing the Tipo 052. On the one hand, the performance and drivability of the engine should be improved without impairing the reliability of the predecessor. On the other hand, the engine should be even better adapted to the design of the chassis in order to achieve better weight distribution. The team also hoped that the improved integration would result in weight savings of 4-5 percent and improved aerodynamics at the rear of the car. In addition to better integration, new materials also resulted in weight savings.
Engine management was by Magneti Marelli.
The specification used at the beginning of the season delivered around 200 revolutions per minute more than the predecessor Type 051.
During the season there were the usual expansion stages. Even though Ferrari officially stated an output of 845 hp at 18,300 rpm, experts suspected an output of 900 hp at up to 19,000 rpm.
Paolo Martinelli, assisted by Giles Simon, lead the engine design and operations. The Tipo 052 engine was a developed versions of the previous model. The 3.0 L V10 engine produced @ 18,300 rpm
Weight: 85 kg
Engine Configuration: 90° V10
Valves: 4 per cylinder
Displacement: 2996.6 cc
No. of revolutions: 18,300 rpm
Power/liter: 282 hp/L
Exhaust: Two outlet pipes
Power: (900 hp)
Installation position: Mid-engine, rear, longitudinal
Tipo 053 engine (2004)
Ferrari Tipo 053 is the name of a racing engine from the Italian manufacturer Ferrari, which the team used in Formula 1 in the 2004 season. The V10 engine was developed under engine chief Paolo Martinelli.
Type 053 is a completely new development. The engine rules introduced for the 2004 season required that each engine last an entire race weekend. An illegal engine change would have resulted in a grid penalty of 10 places. That is why Ferrari focused on durability and reliability when developing the 053. To achieve this goal, all moving parts have been redesigned. The weight increased only slightly compared to the predecessor Type 052, which is partly due to the use of new alloys. The engine management came from Magneti Marelli.
For the fourth year running, Technical Director and Paolo Martinelli, assisted by Giles Simon, lead the engine design and operations. The engine powered the highly successful Ferrari F2004, that was driven by Michael Schumacher and Rubens Barrichello, and gave Schumacher his fifth and final World Championship with Ferrari at the Belgian Grand Prix, and his seventh Formula One World Championship overall. The engine was now designed in accordance with the FIA's new technical regulations for the season, and had to last a full race weekend. The engine now produced @ 18,300 rpm in race trim, and around @ 19,000 rpm in qualifying mode. The engine also now weighed only 92 kg (203 lbs.).
The Type 053 was only used in the 2004 season and only by Ferrari on the F2004 and Sauber on the Sauber C23. However, Sauber used the name PETRONAS 04A for the engine.
For the San Marino Grand Prix, there was the first stage of development that delivered 920 hp.
Specifications
Weight: 95 kg
Length: 597mm
Width: 530mm
Height: 353mm
Engine Configuration: 90° V10
Valves: 4 per cylinder
Offset angle: 144°
Bore: 98mm
Stroke: 39.75mm
Displacement: 2998.3 cc
No. of revolutions: Max. 19,000 rpm
Power/liter: 307 hp/L
Exhaust: Two outlet pipes
Power: (920 hp)
Installation position: Mid-engine, rear, longitudinal
Tipo 055 engine (2005)
Ferrari Type 055 is the name of a racing engine from the Italian manufacturer Ferrari, which the team used in Formula 1 in the 2005 season. The V10 engine was developed under engine chief Paolo Martinelli.
The Tipo 055 is a further development of the predecessor Type 053. The engine rules introduced for the 2004 season were tightened again for the 2005 season. From now on, an engine had to last two entire race weekends. An illegal engine change would have resulted in a grid penalty of 10 places. Therefore, as in the previous year, Ferrari's focus in the development of the 055 was on durability and reliability. To achieve this goal, many parts were newly developed, some could be taken over from the predecessor. Although the engine was stable, the weight increased only marginally.
The engine management came as before from Magneti Marelli. Shell supplied new fuel and lubricants that should have a positive impact on reliability.
Throughout the season there were the usual stages of expansion.
The Tipo 055 was Ferrari's last 10-cylinder engine. From the 2006 season, Formula 1 relied on V8 engines with a displacement of 2.4 liters.
For the fifth and final year running, Technical Director Paolo Martinelli, assisted by Giles Simon, led the engine design and operations. The car was driven by Michael Schumacher and Rubens Barrichello. This was also Ferrari's last V10 engine. The 90°, naturally-aspirated, Tipo 055 engine made 865 hp @ 18,300 rpm, in race trim, and over 940 hp @ 19,000 rpm in qualifying mode. The engine only weighed around .
The Type 055 was only used in the 2005 season and only by Ferrari on the F2005 and Sauber on the Sauber C24. However, Sauber used the name PETRONAS 05A for the engine.
Specifications
Weight: 90 kg
Engine Configuration: 90° V10
Valves: 4 per cylinder
Displacement: 2998.3 cc
No. of revolutions: Max. 19,000 rpm
Exhaust: Two outlet pipes
Power Output: (940 hp)
Installation position: Mid-engine, rear, longitudinal
Formula One engine specifications
Naturally-aspirated V10 engines
Applications
Ferrari F310 and Ferrari F310B: Tipo 046 and Tipo 046/2
Ferrari F300: Tipo 047/B/C
Ferrari F399: Tipo 048/B/C
Ferrari F1-2000: Tipo 049
Ferrari F2001: Tipo 050
Ferrari F2002: Tipo 051/B/C
Ferrari F2003-GA: Tipo 052
Ferrari F2004: Tipo 053
Ferrari F2005: Tipo 054 and Tipo 055
Formula One World Championship results
6 World Constructors' Championships.
5 World Drivers' Championships.
77 race wins.
62 pole positions.
185 podium finishes (including Sauber Grand Prix results).
See also
Asiatech F1 engine
BMW E41 / P80 engine
Cosworth JD / VJ engine
Honda V10 engine
Mercedes-Benz FO engine
Peugeot F1 engine
Renault RS engine
Toyota RVX engine
Yamaha F1 engine
References
Engines by model
Ferrari engines
Formula One engines
Gasoline engines by model
V10 engines | Ferrari V10 engine | [
"Technology"
] | 3,206 | [
"Engines",
"Engines by model"
] |
53,446,511 | https://en.wikipedia.org/wiki/Tolerance%20ring | A tolerance ring is a radially sprung ring that is press fitted between two mating components to act as a frictional fastener. They are flexible shims designed to fix two cylindrical parts together. The wavelike protrusions that run around the circumference of the ring generate a retention force to provide an optimal fit between the two mating components without the need for adhesive or excessive assembly force, simplifying the process for manufacturers. They allow for any misalignment caused by thermal expansion or excessive vibration. Tolerance rings can be used as bearing mounts and as a means of dealing with torque transfer, torque overload protection and axial slip between mating components. They are often used to isolate undesirable vibration in engines and electric motors, for noise-free mechanism operation in passenger vehicles and domestic appliances, where noise reduction has become a major trend in recent years. Modifications to tolerance rings can be made to tune the dynamic stiffness and, therefore, the frequencies that can be isolated.
Tolerance rings can be used to eliminate noise completely, simply by taking up clearance between mating components, which could otherwise lead to rattling in the system as the parts are not completely constrained.
Automotive use
Tolerance rings are used in a number of mechanisms throughout the automotive powertrain and steering systems, as well as the car interior and exterior. Their torque limiting and overload capabilities allow them to be used as simple clutch devices in several applications, such as the automatic tailgate motor and the collapsible steering column. They are also used by automotive manufacturers to mount bearings in hinges and gears in the power train.
Their lightweight properties have also made tolerance rings attractive to automotive manufacturers as they seek to enhance car performance while complying with government requirements for reductions in carbon emissions. In the European Union, regulations on car emissions have been introduced by the European Commission, restricting the amount of carbon dioxide (CO2) emissions that a car can emit. Since 2015, EU law requires that new cars do not emit more than 130 grams per kilometer of carbon dioxide (CO2). If that limit is breached then manufacturers can face fines. From 2021 the new mandatory emission target will be a fleet average of 95 grams per kilometer. China is beginning to introduce legislation to create a National Standard, based on carbon emission reduction regulations already in effect in Europe. The U.S. Environmental Protection Agency (EPA) requires automotive companies to average carbon dioxide (CO2) tailpipe emissions at 101 grams per kilometer (163 grams/mile) by model year 2025. These regulations require car manufacturers to reduce the weight of their engines and vehicles to enhance fuel efficiency. According to the EPA estimations, every 10 per cent drop in car mass decreases fuel use between 5 and 10 per cent.
In most modern Electric Power Steering (EPS) systems, the motor housing is a part of the rack casting which is usually made from lightweight materials, such as aluminum alloys. The stators are traditionally press fitted into the housing. Tolerance rings can be used instead of press fitting. With their wavelike protrusions, tolerance rings generate a retention force when compressed between the housing and the stator. These protrusions act as springs and allow the mating components to expand and contract at different rates while still providing the required retention force. Tolerance rings also make sure that there is a constant thermal bridge between the stator and the housing, allowing heat to be dissipated away from the stator. Cooler operating temperatures result in higher efficiency and an extended life of the motor.
Tolerance rings are used as an electric motor stator mount in electric power steering (EPS) to protect the system from torque overload in the event of back-driven shocks through the steering system. They do this by allowing the drive shaft to slip inside the gear so the gear teeth are not damaged, which strengthens the longevity of the EPS system.
The collapsible steering column has been designed to protect the driver from injuries caused by striking the steering system in a crash. Consisting of two interlocking shafts, the collapsible steering column absorbs energy by collapsing inwards or breaking upon impact. To secure the shaft and housing of the steering column in place during normal driving conditions, a tolerance ring is fitted between the two parts. The tolerance ring is designed to axially slip at a predetermined torque level, enabling the shaft to slide inside its housing in a crash, absorbing impact energy to protect the driver.
According to the European Union Commission Directive 95/56/EC (1995), all vehicles are mandated to be fitted with anti-theft security devices. The regulation requires that a steering lock must be able to withstand forces of 100Nm applied to the steering wheel without failing. It also requires that cars exported to European markets be fitted with security devices. The Chinese national standard GB15740-2006 obliges Chinese car producers to incorporate anti-theft mechanisms in their vehicles. In a steering lock, a tolerance ring's wavelike protrusions maintain a retention force between the steering shaft and lock column. This allows the inner shaft to move freely within the housing when the steering lock is applied, while securing the two parts in place during normal car operation.
In a tailgate motor, the tolerance ring protects the motor and gearing from excessive force, acting as a clutch. If the trunk is subjected to a force opposite to the motion (i.e. when someone is manually opening the trunk when it is automatically closing), the tolerance ring will allow the components to slip against each other, at certain torque levels. This protects the other components in the trunk mechanism.
To ensure the armrest stays in place when it is stowed away by the passenger and does not fall down when the car travels over rough terrain, a tolerance ring is used at the pivot. Its wavelike protrusions generate sufficient torque to hold it in place and to allow for the correct adjustment feel.
Tolerance rings are used in a number of mechanisms in domestic and industrial air conditioning (AC) systems. AC manufacturers use them as stator and bearing mounts.
Air conditioning
Tolerance rings are used to secure the stator within the frame. It acts as a cushion when the AC motor is in operation to absorb vibration for noise-free AC performance.
Tolerance rings are also used in the top frame structure of AC systems to secure the top of the rotor, replacing spot welding. They absorb vibration from the rotor and crankshaft in the AC motor when the compressor is running at high speed, ensuring the AC pump operates as efficiently as possible over its life cycle and reducing noise.
Computing
Tolerance rings are used in hard disk drives (HDD) to mount disks or bearing cartridges into the drives. The waves on their outer surface allow them to absorb excess vibration to reduce torque ripple effect and resonance to improve the HDD’s performance. The tolerance rings also ensure fast and easy assembly by eliminating the need for adhesive.
References
Automotive steering technologies
Fasteners | Tolerance ring | [
"Engineering"
] | 1,400 | [
"Construction",
"Fasteners"
] |
53,448,372 | https://en.wikipedia.org/wiki/Shogi%20notation | Shogi notation is the set of various abbreviatory notational systems used to describe the piece movements of a shogi game record or the positions of pieces on a shogi board.
A game record is called a kifu in Japanese.
Recording moves
Western notation
The system used in English language texts to express shogi moves was established by George Hodges and Glyndon Townhill in 1976 by the second issue of Shogi magazine.
A slightly modified version was used in . It is derived from the algebraic notation used for chess, but differs in several respects. A typical move might be notated P86 or P-8f. The notation format has the following 5 part structure:
{| style='margin: 30px;'
! style='padding-right: 55px;' | 1
! style='padding-right: 55px;' | 2
! style='padding-right: 55px;' | 3
! style='padding-right: 55px;' | 4
! 5
|-
| style='padding-right: 55px; text-align: center;' | piece
| style='padding-right: 55px;' | (origin)
| style='padding-right: 55px;' | movement
| style='padding-right: 55px;' | destination
| (promotion)
|}
An example using all 5 parts is S72x83+ or S7bx8c+. All parts are obligatory except for the origin and promotion parts. (Thus, most notation strings only contain 3 parts.) The origin part is only indicated when needed to resolve ambiguity. The promotion part is only needed when there is the possibility of promotion.
Western notation is not used in Japanese language texts, as it is no more concise than traditional notation with Japanese characters (kanji) and two ciphers which originated in the Edo period.
Piece
The first letter represents the piece moved. For instance, P is for Pawn. Below are the abbreviations used.
{| style='margin: 20px;' class="wikitable"
! Abbreviation !! English Term !! Japanese
|-
| P || pawn ||
|-
| L || lance ||
|-
| N || knight ||
|-
| S || silver ||
|-
| G || gold ||
|-
| B || bishop ||
|-
| R || rook ||
|-
| K || king || /
|}
Promoted pieces are indicated by a + preceding the letter. For example, +P is a promoted pawn ( tokin), +R is a promoted rook (that is, a dragon ).
Some Japanese websites (such as 81Dojo) and Japanese authors use two different abbreviations for the promoted rook and promoted bishop in a way more similar to Japanese notation. Thus, D (for dragon) instead of +R and H (for horse) instead of +B. Additionally, a promoted pawn can be encountered as T (for tokin) instead of +P.
Ambiguity resolution: Origin coordinates
In cases where the moving piece is ambiguous, the starting square is added after the letter for the piece but before the movement indication.
For example, in diagrams below, Black has three golds which can move to square 78. Thus, simply notating G-78 is not enough to indicate the move. The three possible moves are distinguished via the origin specification as G77-78, G68-78, or G79-78.
Movement type
Following the abbreviation for the piece is a symbol for the type of move. There are 3 different indications:
{| style='margin: 20px;' class="wikitable"
! Notation Symbol !! Movement Type
|-
| - || simple movement
|-
| x || capture (opponent's piece)
|-
| * or ’|| drop (your own piece)
|}
As examples, P-24 indicates moving one's pawn to the 2d square (without capture), Px24 indicates moving one's pawn to the 24 square and capturing the opponent's piece that was on 24, and P*24 indicates dropping one's pawn in hand to the previously empty 24 square. (Note the x indication is a significant departure from Japanese notation, which has no way of signaling whether a piece was captured.)
There is some variation for the drop symbol. A * (asterisk) is often used, but some books (e.g. use a ’ (apostrophe) instead. Thus, Hosking B’56 is equivalent to Hodges B*5f.
The simple movement indication (the hyphen -) is not used by who does not use a movement symbol. Thus, Hosking P26 is equivalent to Hodges P-2f.
Destination coordinates
After the movement piece indication is the square on which the piece lands. This is indicated by a numeral for the file (1–9) and the rank (1–9), with 11 being the top right corner from Black's perspective and 99 being the bottom left corner. This is based on Japanese notation conventions.
Hosking differs from Hodges in that Hosking uses numerals for the rank notation whereas Hodges uses letters (a–i) for the rank.
Promotion status
If a move entitles the player to promote, then a + is added to the end if the promotion was taken or an = if it was declined. For example, Nx73= indicates an unpromoted knight capturing on 73 without promoting while Nx73+ indicates an unpromoted knight capturing on 73 and promoting. The promotion status is always omitted in situations where promotion is not possible. When promotion is possible, then the promotion status is obligatorily notated.
Other conventions
Game moves in western notation are always numbered (unlike Japanese game records). Additionally, what is numbered are pairs of two moves – the first move by Black, the second by White – instead of numbering each move by each player. This also differs from the Japanese system. For instance, three pairs of moves (or six individual moves) are numbered as 1.P-76 P-34 2.P-26 P-44 3.S-48 S-32. However, in the British Shogi magazine of the 1970s and 1980s, the pair number convention was not used for tsumeshogi problems, in which case the each player's move is number just as in the Japanese notation conventions.
Following western chess conventions, omitted moves are indicated with an ... ellipsis. As a consequence of the way moves are numbered in the western system, all moves by White are notated with an ellipsis prefix in texts. For example, ...P-55 indicates a move by White while P-55 indicates a move by Black. In handicap games, White plays first, so Black's first move is replaced by an ellipsis. For example, 1...G-32 2.P-76 G-72.
Unlike western chess, game states like check or checkmate are not typically notated. However, the use of question marks and exclamation points to indicate questionable and good moves, respectively, are occasionally used.
Japanese notation
The earliest way to indicate game records in Japan during the Edo period was to use descriptive sentences such as Open the bishop's diagonal, push the rook's pawn, close the bishop's diagonal and the like. Soon afterward, a notational system was developed which is mostly the same as what is used in the present day in Japan.
Current standard
In Japanese notation, the notation string has the following five-part format:
{| style='margin: 30px;' class="wikitable"
! style='padding-right: 55px;' | 1
! style='padding-right: 55px;' | 2
! style='padding-right: 55px;' | 3
! style='padding-right: 55px;' | 4
! 5
|-
| style='padding-right: 55px;' | (player side)
| style='padding-right: 55px;' | destination
| style='padding-right: 55px;' | piece
| style='padding-right: 55px;' | (movement)
| (promotion)
|}
A typical move is indicated like (equivalent to western P-86). An example that uses all five parts is (which could be either S72-83+ or S72x83+ in western notation). The player's side information is optional and the movement and promotion indications are only used in order to resolve ambiguity.
Player's side
It is common for the White (gote) and Black (sente) player to be indicated at the beginning of the notation string with either black and white triangles () or shogi-piece-shaped pentagons (), such as or . However, this is not obligatory: several books notate shogi moves without explicit indication of which player is making the moves. (See the adjacent image for an example.) In such cases, knowing which player the move refers to can be determined by the context in the book. This white/black convention is more common when the moves are not numbered (which is also optional to notate).
Destination coordinates
For the board's coordinates, the file is indicated with an Arabic numeral followed by the rank indicated with a Japanese numeral (instead of an Arabic number or letter like in the western system). For example, square 23 in Japanese notation is .
{| style="margin: 20px;" class="wikitable"
! Japanese numeral !! Japanese pronunciation !! Arabic equivalent
|-
| || ichi ||
|-
| || ni ||
|-
| || san ||
|-
| || yon ||
|-
| || go ||
|-
| || roku ||
|-
| || nana ||
|-
| || hachi ||
|-
| || kyū ||
|-
| || dō or onajiku || same
|}
Earlier (for instance, in the Edo period), only Japanese numerals were used for both file and rank coordinate.
There is also an abbreviatory convention: when a piece moves to the same coordinates as the previous move's piece (as in a capture), the position is simply indicated with (which is pronounced dō or onajiku) instead of the file-rank coordinate numbers. For example, if Black's pawn moved to a square in which White's pawn captured Black's pawn and then both players' bishops recaptured followed by a rook recapture, this could be notated as which would be equivalent to the western notation sequence 1.P-24 Px24 2.Bx24 Bx24 3.Rx24. always implies a capture (although not all captures will use , of course). In some cases where the coordinates may be forgotten by the reader (for instance, if its antecedent is separated by a page turn or several paragraphs of text), then the number coordinates will precede to aid the reader like this: . An alternate symbol is used instead of in older books.
It is also possible to encounter Arabic numerals for both the file and rank coordinates, such as instead of .
Also, since Japanese is often written vertically from top to bottom, the notation may be written vertically as well with the top number indicating the file and rank number below the file number. Finally, in older books of the Edo period, the notation may be written from right to left (as is the case with traditional vertical writing) even when the notation is written horizontally. However, this older practice is not used in the modern period, where horizontally writing is read from left to right following European language traditions. (See the 1839 game record image below for such an example.)
Piece
Pieces are indicated with kanji (instead of letters as in the western system). The piece's kanji follows the piece's board coordinates. The following symbols are used.
{| style="margin: 20px;" class="wikitable"
! Japanese !! Western !! Japanese || Western
|-
| || P || || +P
|-
| || L || || +L
|-
| || N || || +N
|-
| || S || || +S
|-
| || B || || +B
|-
| || R || or || +R
|-
| || G || || K
|}
Promoted pieces are indicated with a prefix except for the promoted pawn, promoted bishop, and promoted rook, which are , , , respectively.
The character for dragon can also be encountered as its shinjitai form as well.
is used instead of in some older texts.
In tsumeshogi, the character is used essentially as a variable that represents a piece of any value. It is used to indicate to an interposing piece (of any kind) that is placed between the king and the opponent's checking piece.
Ambiguity resolution: Movement description
When there is ambiguity in piece movement, there is a complex system of movement description using the symbols below. The movement descriptors consist of (a) a dropped piece indicator, (b) movement indicators, and (c) relative piece origin indicators.
{| style='margin: 20px;' class="wikitable"
! Movement notation !! Japanese Pronunciation !! Meaning
|-
| || utsu || dropped
|-
| || agaru || upward
|-
| || hiku || downward
|-
| || yoru || horizontally
|-
| || sogu || vertical forward (gold/silver only)
|-
| or || || upward (dragon/horse only; rare)
|}
{| style='margin: 20px;' class="wikitable"
! Piece origin notation !! Japanese Pronunciation !! Meaning
|-
| || migi || right-hand side (going leftwards)
|-
| || hidari || left-hand side (going rightwards)
|}
The symbol for a dropped piece is following the piece's character. In the usual course of a game, most dropped pieces will probably be unambiguous. In these unambiguous cases, explicit notation for the dropped piece is not required and usually omitted (unlike in western notation where the drop notation is obligatory). For example, a western notation such as P*23 will be notated simply as instead of . In other situations, there is a possibility that either a piece that is already in play on the board can move to a certain square or a piece of the same kind that is held in hand can be dropped to that square. In this case, when the piece on the board moves to that square, the notation simply notates the move as usual with no drop indication. However, when the piece in hand is dropped to that location, then the drop indication must be present in the notation in order to resolve the ambiguity. In other words, is only used when the following two conditions are met: (i) a piece is dropped and (ii) there is ambiguity with another piece on the board.
For ambiguity resolution with pieces on the board, the main notation symbols are for downward movement, for horizontal movement, and for upward movement. Note that these three indicators describe movement toward their destination square.
In the example below, three golds can move to the square. The gold that originates on and moves down is notated as (= G77-78). The other two possibilities are notated as (= G68-78) and (= G79-78).
The and indicate downward and upward movement, respectively, that can be both vertical as well as diagonal.
Unofficially, in some literature there exist two alternate symbols that are used instead of : and . However, these alternate symbols are reserved for indicating only the two most powerful promoted dragon and horse pieces. Thus, or instead of , but not or .
In certain situations, an indication of movement toward the destination square (that is, with , , ) is not sufficient to resolve ambiguity. In these cases, the origin square of the piece is notated with a relative positional indicator. These are for a piece moving from the right (and thus moving leftward) and for a piece moving from the left (rightward). For silvers, golds, and promoted pieces with gold-like movements (成銀, 成桂, 成香, と), if there is ambiguity and the pieces are side-by-side, then a piece moving straight forward is indicated by .
This positional information is relative to each player's directions. Thus, (literally: "white 5-2 gold right") refers to the gold general on the right from White's perspective (which would be on the left from Black's perspective).
If there are three or more identical pieces, it is possible that an origin indicator ( or ) followed by a movement indicator ( or ) will be needed.
Additionally, the indicator tends to always be used for vertical movement even when simply using ("right") and ("left") would suffice. Relatedly, is not recommended to be used for dragons and horses.
Promotion
A piece that promotes is indicated with (naru) following the piece's character, such as (N-73+). If a piece does not promote, this is indicated with (narazu) following the piece's character, such as (N-73=).
There is an alternate symbol for non-promotion: is sometimes used instead of – for instance, instead of .
Numbering
Unlike western notation, numbering Japanese game records is not obligatory. Although players' moves often are not numbered, shogi moves are always counted per player's move. This is commonly seen in checkmate problems where a 3-move () checkmate problem would mean a move sequence of black-white-black. This is unlike western chess which counts each pair of moves as one move. (In western notation for shogi, the move numbering tends to follow western chess notation conventions.)
Game end
Shogi games are officially over when a player formally resigns. The resignation is notated as tōryō. Other possible endings include rare draw by repetition, illegal move, and the very rare draw by impasse.
Other conventions
Unlike western notation, a capture of a piece is never explicitly notated in the Japanese system since the capture can be understood in the context of the game. However, when is used, it always implies a capture. So, in this sense is a notated capture. But, other captures of pieces that do not have the same coordinates as the preceding move are simply not indicated in the notation system.
Shorthand
In addition to the usual kanji symbols, there are also shorthand versions of piece symbols that can be written very quickly. For several of the symbols, there is variation in what shorthand symbol is used – the ones listed here may not be exhaustive of all the alternatives used in Japan.
{| style='margin: 20px;' class="wikitable"
! Regular symbol !! Shorthand
|-
| || , , ,
|-
| ||
|-
| || , ,
|-
| ||
|-
| ||
|-
| ||
|-
| ||
|-
| || ,
|-
| || ,
|-
| || ,
|-
| || , ,
|-
| ||
|-
| || ,
|-
| || , ,
|}
Iroha notation
A notation used in older times was the iroha notation. It used the syllables of the Japanese poem Iroha () (as well as other Japanese characters) to label each square on the shogi board.
{| class="wikitable
|+ Iroha coordinate labels
! 9 !! 8 !! 7 !! 6 !! 5 !! 4 !! 3 !! 2 !! 1 !!
|-
| || || || || || || || ||
! a
|-
| || || || || || || || ||
! b
|-
| || || || || || || || ||
! c
|-
| || || || || || || || ||
! d
|-
| || || || || || || || ||
! e
|-
| || || || || || || || ||
! f
|-
| || || || || || || || ||
! g
|-
| || || || || || || || ||
! h
|-
| || || || || || || || ||
! i
|}
For example, the 23 square was indicated by the symbol . Tokugawa Ieharu (the tenth shōgun 1760–1786) favored this notational system. Therefore, it was used for all castle game records during his reign.
Kitao–Kawasaki notation
The Kitao–Kawasaki notation is a hybrid notation introduced by the Nekomado publishing company in English translations of shogi books by Madoka Kitao and Takashi Kaneko. The system incorporates elements of both the western and the Japanese notation systems.
The order of elements is the same as the western system except that a player's side argument is added.
{| style='margin: 30px;' class="wikitable"
! style='padding-right: 55px;' | 1
! style='padding-right: 55px;' | 2
! style='padding-right: 55px;' | 3
! style='padding-right: 55px;' | 4
! style='padding-right: 55px;' | 5
! 6
|-
| style='padding-right: 55px; text-align: center;' | player's side
| style='padding-right: 55px; text-align: center;' | piece
| style='padding-right: 55px;' | (origin)
| style='padding-right: 55px;' | movement
| style='padding-right: 55px;' | (destination)
| (promotion)
|}
A typical move is indicated like (western equivalent: P-86). An example that uses all 6 parts is (S72x83+ in western notation).
{| style='margin: 20px;' class="wikitable"
! Kitao–Kawasaki !! English Term !! Western !! Japanese
|-
| || promoted pawn || +P ||
|-
| || promoted lance || +L ||
|-
| || promoted knight || +N ||
|-
| || promoted silver || +S ||
|-
| || promoted bishop || +B ||
|-
| || promoted rook || +R ||
|}
Comparison examples
As an example, a Tempo Loss Bishop Exchange game might proceed and be notated like this:
Below is another notated game (Ishida opening) showing the more typical Japanese notation where moves are not numbered, dropped pieces are not indicated, and white/black turns are marked. It also shows an example of ambiguity resolution (G69-58/) and a piece entering a promotion zone that remains unpromoted (Sx23=/).
Recording games and positions
SFEN
SFEN is an extension of Forsyth–Edwards Notation (FEN) used for describing board positions of shogi games.
Formally, an SFEN is a text string of ASCII characters. It has four fields that are separated by a space. The fields:
Piece placement on the board from Black's perspective
Who has the next move
Pieces in hand
Move count (optional)
The following is an example (from a Tempo Loss Bishop Exchange opening)
lnsgk2nl/1r4gs1/p1pppp1pp/1p4p2/7P1/2P6/PP1PPPP1P/1SG4R1/LN2KGSNL b Bb
In this example, the first field is lnsgk2nl/1r4gs1/p1pppp1pp/1p4p2/7P1/2P6/PP1PPPP1P/1SG4R1/LN2KGSNL, the second is b, and the third is Bb. The fourth field is omitted, which is allowed.
For the first field, each piece is represented with a single letter. Gote's pieces are lowercase letters while Sente's pieces are uppercase letters. The set of letters used are the same as the ones used in western notation (p, +p, l, +l, n, +n, s, +s, g, b, +b, r, +r, k). Each rank is separated by a forward slash (/). The listing of ranks is from top (rank 1) to bottom (rank 9), and the order to pieces is from file 9 to file 1 (in other words, from left to right as viewed on typical shogi diagram with gote as the top player and sente as the bottom player). Empty squares are indicated with numeral corresponding to the number of adjacent empty squares on the same rank. In the example, rank 1 is lnsgk2nl which indicates sequence of lance, knight, silver, gold, king followed by two empty squares to the right of the king and a sequence of knight and lance.
The second field can be either b for Black's turn to play or w for White's turn to play. In the example, b indicates that Black has the next move.
The third field contains all of the pieces in hand held by each player. Black's pieces in hand use capital letters while White's pieces in hand use lowercase. In the example, the Bb indicates that Black has one bishop in hand (B), and White also has one bishop in hand (b). In SFEN holdings, if there are more than one piece of a type in hand, it is preceded by the piece count, e.g. 3P for three pawns in hand.
The fourth field is a integer representing the current move of the game. Moves are counted under shogi convention, meaning the move count is incremented with a single player's action. This field is specified as optional, but a program may require it for reading SFENs; for that reason, most programs will include the move count field when exporting positions.
Below is another example showing the board position for Yoshiharu Habu's famous 52 silver drop in an NHK game (Bishop Exchange Climbing Silver opening) with Hifumi Katoh.
ln1g5/1r2S1k2/p2pppn2/2ps2p2/1p7/2P6/PPSPPPPLP/2G2K1pr/LN4G1b w BGSLPnp 62
KIF
The KIF file format is used for saving full games of shogi. Internally, it uses Japanese notation in the UTF-8 text encoding, and each move is disambiguated with an origin square.
KI2
The KI2 file format is similar to the KIF format but more compact. Moves are only disambiguated with the standard Japanese relative direction kanji.
CSA
Another format for saving positions and games of shogi, which only uses ASCII internally. Mostly used in the computer shogi arena.
PSN
Portable Shogi Notation is a derivative of the Portable Game Notation used in chess, expanded to specify shogi pieces and drops. It uses the Hodges coordinate system. It has little support outside of GNU Shogi.
GNU Shogi also uses EPD instead of SFEN: the same board description, but with holdings appended in square brackets. Each held piece is listed, e.g. PPP for three pawns in hand. The following field for player to move has colors reversed from SFEN: w for sente, and b for gote.
See also
Chess notation
Notes
References
Sources
External links
81Dojo: Notation System
YouTube: All About Shogi Notations (Japanese, Western, Mixed)
Shogi Shack: Introduction to Kifu (棋譜) Notation
sfenreader: Create Shogi Diagram on the Web
Shogi Playground · tool that is able to switch between different notation systems, read electronic game records in .csa/.kif/ki2, and generate SFEN strings for board positions
Shogi theory
Chess notation
Notation | Shogi notation | [
"Mathematics"
] | 6,098 | [
"Symbols",
"Notation"
] |
53,450,372 | https://en.wikipedia.org/wiki/Plasmodium%20falciparum%20erythrocyte%20membrane%20protein%201 | Plasmodium falciparum erythrocyte membrane protein 1 (PfEMP1) is a family of proteins present on the membrane surface of red blood cells (RBCs or erythrocytes) that are infected by the malarial parasite Plasmodium falciparum. PfEMP1 is synthesized during the parasite's blood stage (erythrocytic schizogony) inside the RBC, during which the clinical symptoms of falciparum malaria are manifested. Acting as both an antigen and adhesion protein, it is thought to play a key role in the high level of virulence associated with P. falciparum. It was discovered in 1984 when it was reported that infected RBCs had unusually large-sized cell membrane proteins, and these proteins had antibody-binding (antigenic) properties. An elusive protein, its chemical structure and molecular properties were revealed only after a decade, in 1995. It is now established that there is not one but a large family of PfEMP1 proteins, genetically regulated (encoded) by a group of about 60 genes called var. Each P. falciparum is able to switch on and off specific var genes to produce a functionally different protein, thereby evading the host's immune system. RBCs carrying PfEMP1 on their surface stick to endothelial cells, which facilitates further binding with uninfected RBCs (through the processes of sequestration and rosetting), ultimately helping the parasite to both spread to other RBCs as well as bringing about the fatal symptoms of P. falciparum malaria.
Introduction
Malaria is the deadliest among infectious diseases, accounting for approximately 429,000 human deaths in 2015 as of the latest estimate by the World Health Organization. In humans, malaria can be caused by five Plasmodium parasites, namely P. falciparum, P. vivax, P. malariae, P. ovale and P. knowlesi. P. falciparum is the most dangerous species, attributed to >99% of malaria's death toll, with 70% of these deaths occurring in children under the age of five years. The parasites are transmitted through the bites of female mosquitos (of the species of Anopheles). Before invading the RBCs and causing the symptoms of malaria, the parasites first multiply in the liver. The daughter parasites called merozoites then only infect the RBCs. They undergo structural development inside the RBCs, becoming trophozoites and schizonts. It is during this period that malarial symptoms are produced.
Unlike RBCs infected by other Plasmodium species, P. falciparum-infected RBCs had been known to spontaneously stick together. By the early 1980s, it was established that when the parasite (both the trophozoite and schizont forms) enters the blood stream and infects RBCs, the infected cells form knobs on their surface. Then they become sticky, and get attached to the walls (endothelium) of the blood vessels through a process called cytoadhesion, or cytoadherence. Such attachment favours binding with and accumulation of other RBCs. This process is known as sequestration. It is during this condition that the parasites induce an immune response (antigen-antibody reaction) and evade destruction in the spleen. Although the process and significance of sequestration were described in detail by two Italian physicians Amico Bignami and Ettore Marchiafava in the early 1890s, it took a century to discover the actual factor for the stickiness and virulence.
Discovery
PfEMP1 was discovered by Russell J. Howard and his colleagues at the US National Institutes of Health in 1984. Using the techniques of radioiodination and immunoprecipitation, they found a unique but yet unknown antigen from P. falciparum-infected RBCs that appeared to cause binding with other cells. Since the antigenic protein could only be detected in infected cells, they asserted that the protein was produced by the malarial parasite, and not by RBCs. The antigen was large and appeared to be different in size in different strains of P. falciparum obtained from night monkey (Aotus). In one strain, called Camp (from Malaysia), the antigen was found to have a molecular size of approximately 285 kDa; while in the other, called St. Lucia (from El Salvador), it was approximately 260 kDa. Both antigens bind to cultured skin cancer (melanoma) cells. But the researchers failed to confirm whether or not the protein actually was an adhesion molecule to the wall of blood vessels. Later in the same year, they found out that the unknown antigen was associated only with RBCs having small lumps called knobs on their surface. The first human RBC antigen was reported in 1986. Howard's team found that the antigens from Gambian children, who were suffering from falciparum malaria, were similar to those from the RBCs of night monkey. They determined that the molecular sizes of the proteins ranged from 250 to 300 kDa.
In 1987, they discovered another type of surface antigen from the same Camp and St. Lucia strains of malarial parasites. This was also a large-sized protein of about 300 kDa, but quite different from the antigens reported in 1984. The new protein was unable to bind to melanoma cells and present only inside the cell. Hence, they named the earlier protein Plasmodium falciparum erythrocyte membrane protein 1 (PfEMP1), to distinguish it from the newly identified Plasmodium falciparum erythrocyte membrane protein 2 (PfEMP2). The distinction was confirmed the next year, with an additional information that PfEMP1 is relatively less in number.
Although some of the properties of PfEMP1 were firmly established, the protein was difficult to isolate due to its low occurrence. Five years after its discovery, one of the original researchers Irwin Sherman began to doubt the existence of PfEMP1 as a unique protein. He argued that the antigen could be merely a surface protein of RBCs that changes upon infection with malarial parasites. A consensus was achieved in 1995 following the identification (by cloning) of the gene for PfEMP1. The discovery of the genes was independently reported by Howard's team and two other teams at NIH. Howard's team identified two genes for PfEMP1, and recombinant protein products of these genes were shown to have antigenic and adhesive properties. They further affirmed that PfEMP1 is the key molecule in the ability of P. falciparum to evade the host's immune system. Joseph D. Smith and others showed that PfEMP1 is actually a large family of proteins encoded by a multigene family called var. The gene products can bind to a variety of receptors including those on endothelial cells. Xin-Zhuan Su and others showed that there could be more than 50 var genes which are distributed on different chromosomes of the malarial parasite.
Structure
PfEMP1 is a large family of proteins having high molecular weights ranging from 200 to 350 kDa. The wide range of molecular size reflects extreme variation in the amino acid composition of the proteins. But all the PfEMP1 proteins can be described as having three basic structural components, namely, an extracellular domain (ECD), a transmembrane domain (TMD) and an intracellular acidic terminal segment (ATS). The extracellular domain is fully exposed on the cell surface, and is the most variable region. It consists of a number of sub-domains, including a short and conserved N terminal segment (NTS) at the outermost region, followed by a highly variable Duffy-binding-like (DBL) domain, sometimes a Ca2+-binding C2 domain, and then one or two cysteine-rich interdomain regions (CIDRs).
Duffy-binding-like domains are so named because of their similarity to the Duffy binding proteins of P. vivax and P. knowlesi. There are six variant types of DBL, named DBLα, DBLβ, DBLγ, DBLδ, DBLε and DBLζ. CIDR is also divided into three classes: CIDRα, CIDRβ and CIDRγ. Both DBL and CIDR have an additional type called PAM, so named because of their specific involvement in pregnancy-associated malaria (PAM). In spite of the diverse DBL and CIDR proteins, the extracellular amino terminal region is partly conserved, consisting of about 60 amino acids of NTS, one each of DBLα and CIDR1 proteins in tandem. This semi-conserved DBLα-CIDR1 region is called the head structure. The last CIDR region joins the TMD, which is embedded in the cell membrane. The TMD and ATS are highly conserved among different PfEMP1s, and their structures have been solved using solution NMR ().
The head structure is followed by a variable combination of diverse DBL and CIDR proteins, and in many cases along with C2. This variation gives rise to different types of PfEMP1. The DBL-CIDR combination in a particular type of PfEMP1 protein is never random, but organized into specific sequences known as domain cassettes. In some domain cassettes, there are only two or few DBL domains and CIDR domains, but in others they cover the entire length of the PfEMP1. These differences are responsible for different binding capacity among different PfEMP1s. For instance, among the most well-known types, VAR3 (earlier called type 3 PfEMP1) is the smallest, consisting of only NTS with DBL1α and DBL2ε domains in the ECD. Its molecular size is approximately 150 kDa. In domain cassette (DC) 4 type, the ECD is made up of three domains DBLα1.1/1.4, CIDRα1.6 and DBLβ3. The DBLβ3 domain contains a binding site for intercellular adhesion molecule 1 (ICAM1). This is particularly implicated with the development of brain infection. VAR2CSA is atypical in having a single domain cassette that consists of three N terminal DBLPAM domains followed by three DBLε domains and one CIDRPAM. The seven domains always occur together. The usual NTS is absent. The protein specifically binds to chondroitin sulphate A (CSA); hence the name VAR2CSA.
Synthesis and transport
The PfEMP1 proteins are regulated and produced (encoded) by about 60 different var genes, but an individual P. falciparum would switch on only a single var gene at a time to produce only one type of PfEMP. The var genes are distributed in two exons. Exon 1 encodes amino acids of the highly variable ECD, while exon 2 encodes those of the conserved TMD and ATS. Based on their location in the chromosome and sequence, the var genes are generally classified into three major groups, A, B, and C, and two intermediate groups, B/A and B/C; or sometimes simply into five classes, upsA, upsB, upsC, upsD, and upsE respectively. Groups A and B are found towards the terminal end (subtelomeric) region of the chromosome, while group C is in the central (centromeric) region.
Once the PfEMP1 protein is fully synthesized (translated), it is carried to the cytoplasm towards the RBC membrane. The NTS is crucial for such directional movement. Within the cytoplasm, the newly synthesized protein is attached to a Golgi-like membranous vesicle called the Maurer's cleft. Inside the Maurer's clefts is a family of proteins called Plasmodium helical interspersed subtelomeric (PHIST) proteins. Of the PHIST proteins, PFI1780w and PFE1605w bind the intracellular ATS of PfEMP1 during transport to the RBC membrane.
The PfEMP1 molecule is deposited at the RBC membrane at the knobs. These knobs are easily identified as conspicuous bumps on the infected RBCs from the early trophozoite stage onward. The malarial parasite cannot induce its virulence on RBCs without knobs. As many as 10,000 knobs are distributed throughout the surface of a mature infected RBC, and each knob is 50-80 nm in diameter. The export of pfEMP1 from Maurer's cleft to RBC membrane is mediated by binding of another protein produced by the parasite called knob-associated histidine-rich protein (KAHRP). KAHRP enhances the structural rigidity of infected RBC and adhesion of PfEMP1 on the knobs. It is also directly responsible for forming knobs, as indicated by the fact that kahrp gene-deficient malarial parasites do not form knobs. To form a knob, KAHRP aggregates several membrane skeletal proteins of the host RBC, such as spectrin, actin, ankyrin R, and spectrin–actin band 4.1 complex. Upon arrival at the knob, PfEMP1 is attached to the spectrin network using the PHIST proteins.
Function
The primary function of PfEMP1 is to bind and attach RBCs to the wall of the blood vessels. The most important binding properties of P. falciparum known to date are mediated by the head structure of PfEMP1, consisting of DBL domains and CIDRs. DBL domains can bind to a variety of cell receptors including thrombospondin (TSP), complement receptor 1 (CR1), chondroitin sulfate A (CSA), P-selectin, endothelial protein C receptor (EPCR), and heparan sulfate. The DBL domain adjacent to the head structure binds to ICAM-1. CIDRs mainly bind to a large variety of cluster determinant 36 (CD36). These bindings produce the pathogenic characteristics of the parasite, such as sequestration of infected cells in different tissues, invasion of RBCs, and clustering of infected cells by a process called rosetting.
CIDR1 protein in the semi-conserved head structure is the principal and best understood adhesion site of PfEMP1. It binds with CD36 on endothelial cells. Only group B and C proteins are able to bind, and that too with only those having CIDRα2-6 sequence types. On the other hand, group A proteins have either CIDRα1 or CIDRβ/γ/δ, and they are responsible for the most severe condition of malaria. Binding with ICAM-1 is achieved through the DBLβ domain adjacent to the head structure. However, many PfEMP1s having DBLβ domain do not bind to ICAM-1, and it appears that only the DBLβ paired with C2 domain can to bind to ICAM-1. The DBLα-CIDRγ tandem pair is the main factor for rosetting, sticking together the infected RBC with the uninfected cells, and thereby clogging of the blood vessels. This activity is performed through binding with CR1.
The most dangerous malarial infection is in the brain and is called cerebral malaria. In cerebral malaria, the PfEMP1 proteins involved are DC8 and DC13. They are named after the number of domain cassettes they contain, and are capable of binding not only endothelial cells of the brain, but also in different organs including brain, lung, heart, and bone marrow. Initially, it was assumed that PfEMP1 binds to ICAM-1 in the brain, but DC8 and DC13 were found incompatible with ICAM-1. Instead DC8 and DC13 specifically bind to EPCR using CIDRα sub-types such as CIDRα1.1, CIDRα1.4, CIDRα1.5 and CIDRα1.7. However, it was later shown that DC13 can bind to both ICAM-1 and EPCR. EPCR is thus a potential vaccine and drug target in cerebral malaria.
VAR2CSA is unique in that it is mostly produced by the placenta during pregnancy (the condition called pregnancy-associated malaria, PAM, or placental malaria). The majority of PAM is therefore due to VAR2SCA. Unlike other PfEMP1, VAR2CSA binds to chondroitin sulfate A present on the vascular endothelium of the placenta. Although its individual domains can bind to CSA, its entire structure is used for complete binding. The major complication in PAM is low-birth-weight babies. However, women who survived the first infection generally develop an effective immune response. In P. falciparum-prevalent regions in Africa, pregnant women are found to contain high levels of antibody (immunoglobulin G, or IgG) against VAR2CSA, which protect them the placenta-attacking malarial parasite. They are noted for giving birth to heavier babies.
Clinical importance
In a normal human immune system, malarial parasite binding to RBCs stimulates the production of antibodies that attack the PfEMP1 molecules. Binding of antibody with PfEMP1 disables the binding properties of DBL domains, causing loss of cell adhesion, and the infected RBC is destroyed. In this scenario, malaria is avoided. However, to evade the host's immune response, different P. falciparum switch on and off different var genes to produce functionally different (antigenically distinct) PfEMP1s. Each variant type of PfEMP1 has different binding property, and thus, is not always recognized by antibodies.
By default, all the var genes in the malarial parasite are inactivated. Activation (gene expression) of var is initiated upon infection of the organs. Further, in each organ only specific var genes are activated. The severity of the infection is determined by the type of organ in which infection occurs, hence, the type of var gene activated. For examples, in the most severe cases of malaria, such as cerebral malaria, only the var genes for the PfEMP1 proteins DC8 and DC13 are switched on. Upon the synthesis of DC8 and DC13, their CIDRα1 domains bind to EPCR, which brings about the onset of severe malaria. The abundance of the gene products (transcripts) of these PfEMP1 proteins (specifically the CIDRα1 subtype transcripts) directly relates to the severity of the disease. This further indicates that preventing the interaction between CIDRα1 and EPCR would be good target for a potential vaccine. In pregnancy-associated malaria, another severe type of falciparum malaria, the gene for VAR2CSA (named var2csa) is activated in the placenta. Binding of VAR2CSA to CSA is the primary cause of premature delivery, death of the foetus and severe anaemia in the mother. This indicates that drugs targeting VAR2CSA will be able to prevent the effects of malaria, and for this reason VAR2CSA is the leading candidate for development of a PAM vaccine.
References
falciparum erythrocyte
Antigens
Apicomplexan proteins | Plasmodium falciparum erythrocyte membrane protein 1 | [
"Chemistry"
] | 4,100 | [
"Antigens",
"Biomolecules"
] |
53,451,356 | https://en.wikipedia.org/wiki/Siegfried%20Grossmann | Siegfried Grossmann (born 28 February 1930) is a German theoretical physicist who has been awarded the Max Planck Medal, the major prize for achievements in theoretical physics.
Biography
He was born near Königsberg in Prussia (now Kaliningrad, Russia) and educated at the Pedagogical High School in Berlin, where he graduated in teaching. Whilst training to be a teacher he studied physics, mathematics and chemistry at the Free University of Berlin.
In 1959 he became an assistant at the university to Günther Ludwig, a respected German theoretical physicist and was promoted to study the inelastic scattering of Hydrogen molecules. He qualified two years later with a work on Quantum Mechanics and from 1963 worked as a conservator at Munich Technical University. In 1964 he obtained an extraordinary professorship at the University of Marburg, to which his mentor Ludwig had already moved. In 1968 he was given a full professorship in theoretical physics, retiring in 1998.
He is married with three children.
Research
He is considered one of the founders of nonlinear dynamics and chaos theory. His work on turbulence contributed to an understanding of the transition from laminar to turbulent flow. He provided contributions to the description of a laser using nonlinear dynamics. With Stefan Thomae he produced a value for the Feigenbaum constant.
He is also one of the leading theoreticians in the fields of fluid dynamics and theory of turbulence, stochastic processes, phase transitions, laser physics, nuclear physics, transport theory, Bose-Einstein condensation and the general statistical physics, as well as mathematical physics and functional analysis.
Honours and awards
In 1991 he was elected a member of the European Academy of Sciences and Arts. In 1995 he was awarded the prestigious Max Planck Medal for outstanding achievements in the field of theoretical physics. In 2006 he received a doctorate from the University of Duisburg-Essen for his work on the theory of turbulence and non-linear dynamics.
At the age of 90 he is still scientifically active, publishing research papers every year and giving lectures at conferences and seminars.
Publications
Grossmann wrote over 200 publications in various fields of physics.
He also wrote two textbooks on the mathematical foundations of classical theoretical physics and quantum mechanics:
Mathematical introductory course for physics. Teubner, Stuttgart. .
Functional analysis with regard to applications in physics: Study book for students of physics and mathematics at universities and technical colleges. Aula Publishing House, Wiesbaden. .
References
Based on a translation of the equivalent article on German language Wikipedia
1930 births
Living people
Scientists from Königsberg
Free University of Berlin alumni
Mathematical physicists
Theoretical physicists
German theoretical physicists
20th-century German physicists
Winners of the Max Planck Medal | Siegfried Grossmann | [
"Physics"
] | 536 | [
"Theoretical physics",
"Theoretical physicists"
] |
53,451,378 | https://en.wikipedia.org/wiki/International%20Symposium%20on%20Mathematical%20Foundations%20of%20Computer%20Science | MFCS, the International Symposium on Mathematical Foundations of Computer Science is an academic conference organized annually since 1972. The topics of the conference cover the entire field of theoretical computer science. Up to 2012, the conference was held in different locations in Poland, Czech Republic and Slovakia but, since MFCS 2013, it travels around Europe. All contributions are strongly peer-reviewed. From 1974 to 2015, conference articles were published in proceedings published by Springer in the Lecture Notes in Computer Science series. Since 2016 the proceedings have been published by the Leibniz International Proceedings in Informatics.
Recent history of the symposium
References
Theoretical computer science conferences
Recurring events established in 1972 | International Symposium on Mathematical Foundations of Computer Science | [
"Technology"
] | 133 | [
"Computing stubs",
"Computer conference stubs"
] |
53,451,790 | https://en.wikipedia.org/wiki/Cytosolic%20ciliogenesis | Cytosolic ciliogenesis, otherwise cytoplasmic ciliogenesis, is a type of ciliogenesis where the cilium axoneme is formed in the cytoplasm or becomes exposed to the cytoplasm.
Cytosolic ciliogenesis is divided into three types: Primary cytosolic cilia are formed by exposing the axoneme of compartmentalized cilium (formed initially by compartmentalized ciliogenesis) to the cytoplasm. This type of cilia is found in the sperm of human and other mammals. Secondary cytosolic cilia are formed in parallels to the formation of the typical compartmentalized cilium. One end of the axoneme is exposed to the cytoplasm as the other end of the axoneme is formed as compartmentalized cilia. This type of cilia is found in insects. Tertiary cytosolic cilia are axonemes that form directly in the cytoplasm. This type of cilia is found in Plasmodium (the malaria parasite).
History
The term Cytosolic Ciliogenesis was coined in 2004 as part of a study that identified a large set of ciliogenesis genes.
It was found that a subset of genes that are thought to be essential for compartmentalized cilia are not essential to form the sperm flagellum. Since the axoneme of this flagellum was exposed to the cytoplasm it was named Cytosolic Ciliogenesis.
References
Cell biology
Organelles | Cytosolic ciliogenesis | [
"Biology"
] | 312 | [
"Cell biology"
] |
53,452,258 | https://en.wikipedia.org/wiki/Compartmentalized%20ciliogenesis | Compartmentalized ciliogenesis is the most common type of ciliogenesis where the cilium axoneme is formed separated from the cytoplasm by the ciliary membrane and a ciliary gate known as the transition zone.
References
Cell biology | Compartmentalized ciliogenesis | [
"Biology"
] | 54 | [
"Cell biology"
] |
53,455,286 | https://en.wikipedia.org/wiki/Vapor-tight%20tank | A vapor-tight tank is a piece of portable onshore oil production equipment designed to store crude oil and convey oil vapors to a flare stack.
Vapor-tight tanks are horizontal vessels that can usually hold up to 14.7 pounds per square inch (gauge) (1.01 bar(g)). They use that pressure to force oil vapors to the flare. Connection to a flare allows these systems to be operated in situations with a high hydrogen sulfide content. In fact, their original intended use was sour crude oil production. The first vapor-tight tanks were constructed from used crude oil tank cars by Tornado Technologies.
Vapor-tight tanks are frequently packaged with an integral separator, flare stack, and other equipment to form a complete single-well battery. Because of their small size and portability, they are mostly used in temporary production of oil wells.
Canadian regulations consider that vapor-tight tanks are process vessels, rather than storage tanks, so tankage spacing and secondary containment provisions are not applicable.
References
Storage tanks
Petroleum technology | Vapor-tight tank | [
"Chemistry",
"Engineering"
] | 213 | [
"Chemical equipment",
"Petroleum stubs",
"Petroleum technology",
"Petroleum engineering",
"Storage tanks",
"Petroleum"
] |
53,458,184 | https://en.wikipedia.org/wiki/Diaminomaleonitrile | Diaminomaleonitrile (DAMN) is an organic compound composed of two amino groups and two nitrile groups bonded to a central alkene unit. The systematic name reflects its relationship to maleic acid. DAMN form by oligomerization of hydrogen cyanide. It is the starting point for the synthesis of several classes of heterocyclic compounds. It has been considered as a possible organic chemical present in prebiotic conditions.
Isolation and synthesis
Diaminomaleonitrile was first isolated in 1873 as a black solid, when it was recognized as a polymer of hydrogen cyanide with the formula (HCN)x. It was identified as the tetramer (HCN)4 by ebullioscopy in 1923. The cis-configuration of the amino groups was shown in 1928 through reaction with glyoxal to give 2,3-diaminopyrazine, and the full structure was shown in 1955 to be diaminomaleonitrile, as opposed to the isomeric aminoiminosuccinonitrile (AISN).
It can be prepared by cyanation of aminomalonitrile.
Possible role in abiogenesis
Diaminomaleonitrile has been proposed since the 1960s as a key substance for the prebiotic synthesis of nucleobases. Photochemical rearrangement of DAMN under UV light gives 4-aminoimidazole-5-carbonitrile (AICN), which can react further to form various nucleobases.
Early experiments have also suggested that certain amino acids, such as aspartic acid, alanine, and glycine, may have their probiotic origins in the acidic hydrolysis of diaminomaleonitrile.
Due to the ubiquity of hydrogen cyanide and its oligomers in space, it has been proposed that the dark material found in comets may consist of diaminomaleonitrile and higher oligomers, and that such polymers of HCN may have covered the surface of the early Earth.
References
Nitriles
Diamines
Enamines
Substances discovered in the 19th century | Diaminomaleonitrile | [
"Chemistry"
] | 446 | [
"Nitriles",
"Functional groups"
] |
58,002,201 | https://en.wikipedia.org/wiki/List%20of%20women%20in%20leadership%20positions%20on%20astronomical%20instrumentation%20projects | The following is a list of women who are the principal investigators (PIs), project scientists (PSs) or directors (Dirs) of astronomical instruments, missions or observatories.
References
Women planetary scientists
Planetary scientists
Lists of women scientists
Astronomers | List of women in leadership positions on astronomical instrumentation projects | [
"Astronomy"
] | 53 | [
"Women astronomers",
"Astronomers",
"People associated with astronomy"
] |
58,002,416 | https://en.wikipedia.org/wiki/Selenium%20dichloride | Selenium dichloride is the inorganic compound with the formula SeCl2. It forms red-brown solutions in ethers. Selenium dichloride has been prepared by treating gray selenium with sulfuryl chloride. Adducts of selenium dichloride with thioethers and thioureas are well characterized. Related complexes of tellurium dichloride are known.
Solutions of selenium dichloride are unstable at room temperature, forming selenium monochloride after several minutes at room temperature:
3 SeCl2 → Se2Cl2 + SeCl4
References
Selenium(II) compounds
Chlorides
Nonmetal halides
Chalcohalides
Selenium halides | Selenium dichloride | [
"Chemistry"
] | 156 | [
"Chlorides",
"Inorganic compounds",
"Chalcohalides",
"Salts"
] |
58,003,379 | https://en.wikipedia.org/wiki/Adesto%20Technologies | Adesto Technologies Corporation was an American corporation founded in 2006 and based in Santa Clara, California. The company provided application-specific integrated circuits (ASICs) and embedded systems for the Internet of Things (IoT), and sells its products directly to original equipment manufacturers (OEMs) and original design manufacturers (ODMs) that manufacture products for its end customers. In 2020, Adesto was bought by Dialog Semiconductor.
History
Adesto Technologies was founded by Narbeh Derhacobian, Shane Hollmer, and Ishai Naveh in 2006. Derhacobian formerly served in senior technical and managerial roles at AMD, Virage Logic, and Cswitch Corporations. The company developed a non-volatile memory based on the movement of copper ions in a programmable metallization cell technology licensed from Axon Technologies Corp., a spinoff of Arizona State University.
In October 2010, Adesto acquired intellectual property and patents related to Conductive Bridging Random Access Memory (CBRAM) technology from Qimonda AG, and their first CBRAM product began production in 2011.
In 2015, the company held an initial public offering under the symbol IOTS, which entered the market at $5 per share. Underwriters included Needham & Company, Oppenheimer & Co. Inc., and Roth Capital Partners. The entire offering was valued at $28.75 million.
Between May and September 2018, Adesto completed two acquisitions of S3 Semiconductors and Echelon Corporation. In May, the company acquired S3 Semiconductors, a provider of analog and mixed-signal ASICs and Intellectual Property (IP) cores. In June, the company announced its intention to buy Echelon Corporation, a home and industrial automation company, for $45 million. The acquisition was completed three months later. The company's offerings were expanded to include ASICs and IP from S3 Semiconductors and embedded systems from Echelon Corporation, in addition to its original non-volatile memory (NVM) products.
In 2018 Adesto started a cooperation with the University of California San Diego in order to explore the possibility for calculations to be made directly in the memory.
In 2020, Adesto was acquired by Dialog Semiconductor, a company headquartered in Reading, United Kingdom, for $500 million.
References
External links
http://www.adestotech.com
Defunct semiconductor companies of the United States
2006 establishments in California
American companies established in 2006
Computer companies established in 2006
Electronics companies established in 2006
Technology companies based in the San Francisco Bay Area
Companies based in Santa Clara, California
Companies formerly listed on the Nasdaq
2015 initial public offerings
Embedded systems
2020 mergers and acquisitions
Defunct computer companies of the United States
Defunct computer hardware companies | Adesto Technologies | [
"Technology",
"Engineering"
] | 564 | [
"Embedded systems",
"Computer science",
"Computer engineering",
"Computer systems"
] |
58,004,297 | https://en.wikipedia.org/wiki/PKS%201353%E2%88%92341 | PKS 1353−341, also known as LEDA 88936 is a quasar (99% chance) located in the southern constellation Centaurus. It has an apparent magnitude of 18.5, making it only visible in powerful telescopes. Based on the object's luminosity, it is estimated to be 3.7 billion light years distant from the Solar System. It is receding from the Milky Way with a heliocentric radial velocity of
The object was first identified by R.A. Preston in 1985. Before then, it was unnoticed. Analysis in 1998 reveal that it might be relatively dusty based on the quasar's X-ray properties; Long thought to be solitary, the CHiPS (Clusters Hiding in Plain Sight) Survey found PSZ2 G317.79+26.63, a massive galaxy cluster surrounding the quasar. The team analyzed data from the 2MASS, NVSS, ROSAT, SUMSS, and WISE all-sky surveys in order to locate powerful sources of infrared, radio, and X-ray light. The goal was to discover new galaxy clusters that were previously misidentified as isolated sources of X-ray light due to the central quasar's brightness.
As an individual object, PKS 1353−341 has a central mass 300 billion times that of the Sun, which is 1/4 of the Milky Way's mass. It has an absolute magnitude of −22.4 in the blue passband, making it very luminous. The galaxy hosting PKS 1353−341 is a compact dwarf galaxy. Typical of quasars, PKS 1353−341 has two jets originating from the center of the galaxy. When combined with the surrounding cluster, both have a mass of , making it a thousand times more massive than our own galaxy.
References
Galaxy clusters
Quasars
Astronomical X-ray sources
Centaurus
Dwarf galaxies | PKS 1353−341 | [
"Astronomy"
] | 396 | [
"Galaxy clusters",
"Centaurus",
"Constellations",
"Astronomical X-ray sources",
"Astronomical objects"
] |
58,004,420 | https://en.wikipedia.org/wiki/Robophysics | Robophysics is an emerging scientific field to understand the physical principles of how robots move in the complex real world, analogous to biophysics to understand the motions of biological systems. This emerging area has demonstrated the need for a physics of robotics and reveal interesting problems at the interface of nonlinear dynamics, soft matter, control and biology.
References
Terrestrial locomotion
Robot locomotion | Robophysics | [
"Physics"
] | 78 | [
"Physical phenomena",
"Motion (physics)",
"Robot locomotion"
] |
58,004,595 | https://en.wikipedia.org/wiki/Gladys%20Ngetich | Gladys Chepkirui Ngetich (born c.1991) is a Kenyan engineer, and a Rhodes scholar, pursuing a doctorate degree in aerospace engineering at the University of Oxford, in the United Kingdom. She is the recipient of the Tanenbaum Fellowship and the Babaroa Excellence Award.
Background and education
Ngetich was born in Amalo Village, Nakuru County. She attended Lelaibei Primary School in Olenguruone. She studied at Mercy Girls' Secondary School in Kericho. She was admitted to the Jomo Kenyatta University of Agriculture and Technology, graduating with a Bachelor of Science degree in mechanical engineering, in 2013.
In 2015, Ngetich joined the University of Oxford on a Rhodes Scholarship to pursue a doctoral degree in Aerospace Engineering. In 2016, she earned a Tanenbaum Fellowship, an annual fellowship awarded to Rhodes scholars for a multifaceted program in Israel. In 2018, Ngetich was named a Skoll World Forum Fellow for the work she is doing in Kenya to empower girls and women. She also tutors engineering undergraduate students at Oriel College.
Achievements/Awards
In 2018, Ngetich was credited with a patent in collaboration with Rolls-Royce Plc. Her research work has been in BBC Science and the Oxford Science Blog and Medium. She received the ASME IGTI Young Engineer Turbo Expo Participation Award, for her paper at the 2018 Annual American Society of Mechanical Engineers (ASME) conference.
Ngetich is the co-founder of the ILUU, a Nairobi-based non-profit that aims to inspire girls and women.
In September 2018, Business Daily Africa named Ngitech among its "Top 40 Under 40 Women in Kenya in 2018". In 2019 she started investigating sustainable space science using a Schmidt Science Fellowship. As of 2023, she is involved in satellite and rocket fuel research at Massachusetts Institute of Technology.
See also
Frannie Léautier
Emily Orwaru
Josephine Wapakabulo
References
External links
Brief Video Presentation by Gladys Ngetich, PhD. Published on 14 November 2019.
21st-century Kenyan women scientists
21st-century Kenyan scientists
Aerospace engineers
Women aerospace engineers
Mechanical engineers
Alumni of the University of Oxford
Jomo Kenyatta University of Agriculture and Technology alumni
Kalenjin people
People from Nakuru County
1991 births
Living people
21st-century Kenyan women engineers
21st-century Kenyan engineers
Kalenjin women | Gladys Ngetich | [
"Engineering"
] | 484 | [
"Mechanical engineers",
"Mechanical engineering",
"Aerospace engineers",
"Aerospace engineering"
] |
58,004,880 | https://en.wikipedia.org/wiki/NDUFAF6 | NADH:ubiquinone oxidoreductase complex assembly factor 6 is a protein that in humans is encoded by the NDUFAF6 gene. The protein is involved in the assembly of complex I in the mitochondrial electron transport chain. Mutations in the NDUFAF6 gene have been shown to cause Complex I deficiency, Leigh syndrome, and Acadian variant Fanconi Syndrome.
Structure
The NDUFAF6 gene is located on the q arm of chromosome 8 in position 22.1 and spans 222,728 base pairs. The gene produces a 38.2 kDa protein composed of 333 amino acids. The protein contains a predicted phytoene synthase domain.
Function
The NDUFAF6 gene encodes a protein that localizes to mitochondria. The encoded protein plays an important role in the assembly of complex I (NADH-ubiquinone oxidoreductase) of the mitochondrial respiratory chain through regulation of subunit ND1 biogenesis.
Clinical Significance
Mutations in the NDUFAF6 gene are associated with complex I enzymatic deficiency and lead to Leigh syndrome, which is characterized by lesions in the central nervous system and rapid deterioration of cognitive and motor functions. In Acadians, a non-coding mutation in NDUFAF6 has been shown to cause Acadian variant Fanconi Syndrome, symptoms of which include pulmonary interstitial fibrosis and proximal tubular dysfunction accompanied by slowly progressive kidney disease. Inheritance of mutations in the NDUFAF6 gene is autosomal recessive.
Interactions
The protein encoded by NDUFAF6 interacts with RHOXF2, OTX1, GUCD1, and GALNT6 proteins.
References
Further reading
Peripheral membrane proteins
Cellular respiration | NDUFAF6 | [
"Chemistry",
"Biology"
] | 365 | [
"Biochemistry",
"Cellular respiration",
"Metabolism"
] |
58,005,323 | https://en.wikipedia.org/wiki/Mika%20McKinnon | Mika McKinnon is a Canadian field geophysicist, disaster researcher, and science communicator. She is a co-investigator of the Southwest Research Institute's Project ESPRESSO and was a science adviser to the science fiction television series Stargate Atlantis and Stargate Universe.
Education and early career
In 2000, she was a student in the astronomy program of the Summer Science Program and later served on its board and as a guest lecturer.
McKinnon received her Bachelor of Science in Physics from the University of California, Santa Barbara in 2005, attending the College of Creative Studies. There, she re-launched the Society of Physics Students chapter and led a student colloquia on science in fiction.
She received her Master of Science in geophysics from the University of British Columbia in 2010. Her graduate work was about assessing and managing risk of landslides using statistical models to map their physical characteristics to better predict landslide runout and reduce the number of casualties and the extent of the damage.
While looking for work after graduation, during a hiring freeze by the Canadian government, she discovered women in her field were being hired because they could be paid less than men – which contributed to her vocal support for women and minorities in science.
Research career
McKinnon's research interests are in disaster management, preparedness, and communication, working at the intersection of scientific research, advocacy and policy. In policy, she uses expertise in both science and communication to teach science to disaster managers, revising Federal Emergency Management Agency's (FEMA) science curriculum for emergency managers as a contractor and working on several projects with Natural Resources Canada.
McKinnon is a co-investigator of Project ESPRESSO, lending her expertise in terrestrial landslides and hazard mapping towards the project's goal of characterizing extraterrestrial target surfaces (asteroids, comets, and moons) and reducing other operational risks for robots and humans in space exploration. The project, which represents a consortium of seven partner institutions, was proposed in response to NASA's 2016 call for Solar System Exploration Research Virtual Institute nodes, and is one of four selected projects resulting from that call. She holds a joint appointment at the SETI Institute, one of ESPRESSO's partner institutions.
Science communication
McKinnon earned the 2022 E. R. Ward Neale Medal, for sustained outstanding efforts in sharing earth science with Canadians, from the Geological Association of Canada.
McKinnon began her science communication efforts as a Master's student at UBC, after answering a call from the producers of the television show Stargate: Atlantis for a physicist who could help with accurate scientific justifications for the show's science fiction plots. After graduation, she pursued a career in science communication that included popular science writing and continuing her consulting role on the television shows Stargate: Atlantis and Stargate: Universe. More recently, McKinnon has consulted on Doomsday: 10 Ways the World Will End, No Tomorrow, Madam Secretary, and Star Trek: Discovery. In a profile with her alma mater, UCSB, she says that her interest in communication stemmed from the media's misrepresentation of a major landslide in the Pacific Northwest.
She was a contributing editor for Gawker Media, providing coverage on popular science topics for io9 and later became a science writer for Gizmodo. Her bylines cover topics including space exploration, dinosaur discovery, the convergence of science and art, and disaster preparedness. Her writing is in publications including Wired UK, Smithsonian magazine, Ars Technica, and Astronomy.
She volunteers for the National Academy of Sciences Science & Entertainment Exchange, providing subject matter expertise to the entertainment industry for more accurate depictions of science in the media.
References
External links
Official about.me profile
Year of birth missing (living people)
Living people
Canadian women non-fiction writers
Canadian geophysicists
Canadian science communicators
Canadian science writers
Summer Science Program
University of California, Santa Barbara alumni
University of British Columbia alumni
Women geophysicists
Women science writers
21st-century Canadian women scientists
21st-century Canadian physicists
21st-century Canadian non-fiction writers
21st-century Canadian women writers | Mika McKinnon | [
"Technology"
] | 839 | [
"Women science writers",
"Women in science and technology"
] |
58,005,993 | https://en.wikipedia.org/wiki/Macroraptorial%20sperm%20whale | Macroraptorial sperm whales were highly predatory whales of the sperm whale superfamily (Physeteroidea) of the Miocene epoch that hunted large marine mammals, including other whales, using their large teeth. They consist of five genera: Acrophyseter, Albicetus, Brygmophyseter, Livyatan and Zygophyseter. All species are known by at least a skull, and are informally grouped without a family designation. They were all likely the apex predator of their habitats, comparable to the modern day killer whale (Orcinus orca), and achieved great lengths, with one species—Livyatan—measuring about .
Discovery
Zygophyseter was discovered in the Pietra Leccese Formation in Italy from a skull, teeth, and vertebrae; Brygmophyseter was discovered in the Bessho Formation in Japan from a nearly-complete skeleton; and Acrophyseter and Livyatan both originate from the Pisco Formation in Peru and are known by only a skull. Albicetus is discovered from Santa Barbara Lighthouse in 1909, which is believed to most likely be part of the Monterey Formation. It was first classified within the genus Ontocetus (now a genus of walrus), and then moved to a wastebasket taxon Scaldicetus until Boersma and his colleagues gave a new generic name.
Description
{| class="wikitable"
|+ Macroraptorial body length range
! scope="col" | Genus
! scope="col" | SI
! scope="col" | Imperial
|- align="center"
| Acrophyseter || ≈4–4.5 m || ≈13–15 ft
|- align="center"
| Albicetus || ≈5.9–6.3 m || ≈19–21 ft
|- align="center"
| Brygmophyseter || ≈6.5–7 m || ≈21–23 ft
|- align="center"
| Zygophyseter || ≈6.5–7 m || ≈21–23 ft
|- align="center"
| Livyatan || ≈13.5–17.5 m || ≈44–57 ft
|}
Macroraptorial sperm whales had large, functional, conical teeth in both jaws, as opposed to the modern sperm whale whose teeth are small and nonfunctional in the upper jaw. The teeth were deeply rooted into the gumline and could interlock, probably to aid in holding struggling prey. The teeth of Livyatan, at a length of , were one of the biggest teeth of any animal, excluding tusks. The macroraptorials also had well-developed muscles used in biting—the temporalis and masseter. They also developed buccal exostoses in the mouth, bony growths which act as buttresses during biting, further increasing the bite force.
Like modern sperm whales, the macroraptorials had a curved basin—the supracranial basin—on the top of the skull. This encompassed the entire breadth of the snout in Livyatan and Brygmophyseter; Zygophyseter and Acrophyseter, instead, had reduced basins indicating beaks. The elongated lumbar vertebrae of Zygophyseter indicate it had larger multifidus and longissimus back muscles and was, thus, faster than the modern sperm whale which, comparable to other large open-ocean animals, travels horizontally at .
Paleobiology
Using their large and deeply rooted teeth, wide-opening jaws, and great size, they likely fed on a variety of sea life, including fish, cephalopods, seals, and small whales and dolphins, occupying a niche similar to the modern day killer whale (Orcinus orca). In fact, Zygophyseter is known colloquially as the "killer sperm whale" in reference to this. Likewise, they may have employed a similar hunting strategy of pursuing prey to tire it out before eventually drowning it. However, given their size, they probably did not need to hunt in groups. Livyatan probably targeted medium-sized whales ranging in size from . Macroraptorials probably competed with the extinct giant shark megalodon for the same food sources.
In sperm whales, the supracranial basin holds the spermaceti organ, a series of oil and wax reservoirs which aids in echolocation. Speculatively, the organ may also serve a secondary function, such as vocalizing, acoustic stunning of prey, head-butting between males, ramming into prey, or buoyancy control by increasing or decreasing the temperature of the wax to change the density and weight.
Taxonomy
The macroraptorial sperm whales are a paraphyletic fossil group of hyper-predatory stem sperm whales. All share large, functional, enamel-coated teeth on both the upper and lower jaws, which were used in capturing large prey. In contrast, the modern sperm whale (Physeter macrocephalus) lacks enamel, teeth in the upper jaw, and the ability to use its teeth to catch prey. However, Livyatan belongs to a different lineage than the other macroraptorials, and the development of large size and the spermaceti organ, an organ that is characteristic of sperm whales, are thought to have evolved independently from the other macroraptorials. The large teeth either evolved once in the group with a basilosaurid-like common ancestor, or independently in Livyatan. The large temporal fossa depressions on the skull of raptorials is probably descended from a common ancestor (plesiomorphy). The presence of enamel is thought to be an ancient and basal characteristic, as it is present on the teeth of fetal modern sperm whales. Macroraptorials appeared during an adaptive radiation event of baleen whales in the Miocene, an increase in whale populations and diversity, implying the macroraptorials evolved specifically to exploit baleen whales. A tooth found in Australia indicates macroraptorials still existed 5 mya in the Pliocene.
It has also been suggested that the macroraptorials be placed into the subfamily Hoplocetinae, a subfamily characterized by robust and enamel-coated teeth, alongside the genera Diaphorocetus, Idiorophus, and Hoplocetus, which are known from the Miocene to the Early Pleistocene. However, most of these whales are known from fragmentary remains or have been used as wastebasket taxa for indiscernible stem sperm whale remains.
See alsoScaldicetus''
References
Sperm whales
Prehistoric toothed whales
Prehistoric cetaceans
Miocene cetaceans
Miocene mammals of South America
Miocene mammals of Europe
Neogene Peru
Fossils of Peru
Paraphyletic groups | Macroraptorial sperm whale | [
"Biology"
] | 1,431 | [
"Phylogenetics",
"Paraphyletic groups"
] |
58,006,182 | https://en.wikipedia.org/wiki/Fine-Resolution%20Epithermal%20Neutron%20Detector | The Fine-Resolution Epithermal Neutron Detector (FREND) is a neutron detector that is part of the instrument payload on board the Trace Gas Orbiter (TGO), launched to Mars in March 2016. This instrument is currently mapping hydrogen levels to a maximum depth of beneath the Martian surface, thus revealing shallow water ice distribution. This instrument has an improved resolution of 7.5 times over the one Russia contributed to NASA's 2001 Mars Odyssey orbiter.
Overview
FREND can provide information while orbiting Mars on the presence of hydrogen, in the form of water or hydrated minerals in the top of the Martian surface. Locations where hydrogen is found may indicate water-ice deposits, which is one of the key ingredients for life. Mapping ground ice could also be useful for future resource utilization (ISRU) and crewed missions.
FREND also features a dosimeter to monitor the radiation environment along its orbit around Mars.
Objectives
The main science objective of the instrument is to carry out high spatial resolution mapping of epithermal and fast neutron fluxes from the Martian surface. FREND will work in synergy and complement orbital and ground data as measured the Dynamic Albedo of Neutrons (DAN) instrument on the Curiosity rover, the ADRON-RM instrument on the Rosalind Franklin rover and the ADRON-EM on the Kazachok.
The second goal of FREND is to use its dosimeter to measure the radiation dose at the TGO orbit from energetic particles of galactic cosmic rays and solar flares. The data will be used to estimate exposure levels of spacecraft and maintain radiation safety of crewed interplanetary flights.
Principle and development
Cosmic rays are sufficiently energetic to break apart atoms in the top one or two metres of Mars' surface, releasing high-energy neutrons, which can be measured by FREND instrument. The distribution of neutron velocities measured reveals the hydrogen content, which are a good indicator of hydrogen abundance —water or hydrated minerals— in the shallow subsurface of Mars.
FREND uses inherited technology developed by the Russian Space Research Institute and flown on the High Energy Neutron Detector (HEND) on Mars Odyssey; the Mercury Gamma and Neutron Spectrometer (MGNS) on BepiColombo; the Lunar Exploration Neutron Detector (LEND) on the Lunar Reconnaissance Orbiter, and Dynamic Albedo of Neutrons (DAN) on Curiosity rover.
This instrument's key components are four detectors containing Helium-3 for neutrons with energies from 0.4 keV to 500 keV, and a stilbene-based scintillator for high-energy neutrons up to 10 MeV. Each of the four 3He detectors counts neutrons independently for increased reliability. All five detectors are encased within a collimator that improves the resolution 7.5 times over the one Russia contributed to NASA's Mars Odyssey orbiter.
The Principal Investigator is Igor G. Mitrofanov, from the Russian Space Research Institute (IKI). Mitrofanov is also the PI for ExoMars' ADRON-RM and ADRON-EM neutron detector instruments.
See also
Astrobiology
Life on Mars
Water on Mars
References
ExoMars
Mars imagers
Astrobiology
Space science experiments | Fine-Resolution Epithermal Neutron Detector | [
"Astronomy",
"Biology"
] | 656 | [
"Origin of life",
"Speculative evolution",
"Astrobiology",
"Biological hypotheses",
"Astronomical sub-disciplines"
] |
58,006,785 | https://en.wikipedia.org/wiki/Polynomial%20solutions%20of%20P-recursive%20equations | In mathematics a P-recursive equation can be solved for polynomial solutions. Sergei A. Abramov in 1989 and Marko Petkovšek in 1992 described an algorithm which finds all polynomial solutions of those recurrence equations with polynomial coefficients. The algorithm computes a degree bound for the solution in a first step. In a second step an ansatz for a polynomial of this degree is used and the unknown coefficients are computed by a system of linear equations. This article describes this algorithm.
In 1995 Abramov, Bronstein and Petkovšek showed that the polynomial case can be solved more efficiently by considering power series solution of the recurrence equation in a specific power basis (i.e. not the ordinary basis ).
Other algorithms which compute rational or hypergeometric solutions of a linear recurrence equation with polynomial coefficients also use algorithms which compute polynomial solutions.
Degree bound
Let be a field of characteristic zero and a recurrence equation of order with polynomial coefficients , polynomial right-hand side and unknown polynomial sequence . Furthermore denotes the degree of a polynomial (with for the zero polynomial) and denotes the leading coefficient of the polynomial. Moreover letfor where denotes the falling factorial and the set of nonnegative integers. Then . This is called a degree bound for the polynomial solution . This bound was shown by Abramov and Petkovšek.
Algorithm
The algorithm consists of two steps. In a first step the degree bound is computed. In a second step an ansatz with a polynomial of that degree with arbitrary coefficients in is made and plugged into the recurrence equation. Then the different powers are compared and a system of linear equations for the coefficients of is set up and solved. This is called the method undetermined coefficients. The algorithm returns the general polynomial solution of a recurrence equation.
algorithm polynomial_solutions is
input: Linear recurrence equation .
output: The general polynomial solution if there are any solutions, otherwise false.
for do
repeat
with unknown coefficients for
Compare coefficients of polynomials and to get possible values for
if there are possible values for then
return general solution
else
return false
end if
Example
Applying the formula for the degree bound on the recurrence equationover yields . Hence one can use an ansatz with a quadratic polynomial with . Plugging this ansatz into the original recurrence equation leads toThis is equivalent to the following system of linear equationswith the solution . Therefore the only polynomial solution is .
References
Polynomials | Polynomial solutions of P-recursive equations | [
"Mathematics"
] | 504 | [
"Polynomials",
"Algebra"
] |
58,006,810 | https://en.wikipedia.org/wiki/Abramov%27s%20algorithm | In mathematics, particularly in computer algebra, Abramov's algorithm computes all rational solutions of a linear recurrence equation with polynomial coefficients. The algorithm was published by Sergei A. Abramov in 1989.
Universal denominator
The main concept in Abramov's algorithm is a universal denominator. Let be a field of characteristic zero. The dispersion of two polynomials is defined aswhere denotes the set of non-negative integers. Therefore the dispersion is the maximum such that the polynomial and the -times shifted polynomial have a common factor. It is if such a does not exist. The dispersion can be computed as the largest non-negative integer root of the resultant . Let be a recurrence equation of order with polynomial coefficients , polynomial right-hand side and rational sequence solution . It is possible to write for two relatively prime polynomials . Let andwhere denotes the falling factorial of a function. Then divides . So the polynomial can be used as a denominator for all rational solutions and hence it is called a universal denominator.
Algorithm
Let again be a recurrence equation with polynomial coefficients and a universal denominator. After substituting for an unknown polynomial and setting the recurrence equation is equivalent toAs the cancel this is a linear recurrence equation with polynomial coefficients which can be solved for an unknown polynomial solution . There are algorithms to find polynomial solutions. The solutions for can then be used again to compute the rational solutions .
algorithm rational_solutions is
input: Linear recurrence equation .
output: The general rational solution if there are any solutions, otherwise false.
Solve for general polynomial solution
if solution exists then
return general solution
else
return false
end if
Example
The homogeneous recurrence equation of order over has a rational solution. It can be computed by considering the dispersionThis yields the following universal denominator:andMultiplying the original recurrence equation with and substituting leads toThis equation has the polynomial solution for an arbitrary constant . Using the general rational solution isfor arbitrary .
References
Computer algebra | Abramov's algorithm | [
"Mathematics",
"Technology"
] | 429 | [
"Computer science",
"Computational mathematics",
"Computer algebra",
"Algebra"
] |
58,006,825 | https://en.wikipedia.org/wiki/P-recursive%20equation | In mathematics a P-recursive equation is a linear equation of sequences where the coefficient sequences can be represented as polynomials. P-recursive equations are linear recurrence equations (or linear recurrence relations or linear difference equations) with polynomial coefficients. These equations play an important role in different areas of mathematics, specifically in combinatorics. The sequences which are solutions of these equations are called holonomic, P-recursive or D-finite.
From the late 1980s, the first algorithms were developed to find solutions for these equations. Sergei A. Abramov, Marko Petkovšek and Mark van Hoeij described algorithms to find polynomial, rational, hypergeometric and d'Alembertian solutions.
Definition
Let be a field of characteristic zero (for example ), polynomials for , a sequence and an unknown sequence. The equationis called a linear recurrence equation with polynomial coefficients (all recurrence equations in this article are of this form). If and are both nonzero, then is called the order of the equation. If is zero the equation is called homogeneous, otherwise it is called inhomogeneous.
This can also be written as where is a linear recurrence operator with polynomial coefficients and is the shift operator, i.e. .
Closed form solutions
Let or equivalently be a recurrence equation with polynomial coefficients. There exist several algorithms which compute solutions of this equation. These algorithms can compute polynomial, rational, hypergeometric and d'Alembertian solutions. The solution of a homogeneous equation is given by the kernel of the linear recurrence operator: . As a subspace of the space of sequences this kernel has a basis. Let be a basis of , then the formal sum for arbitrary constants is called the general solution of the homogeneous problem . If is a particular solution of , i.e. , then is also a solution of the inhomogeneous problem and it is called the general solution of the inhomogeneous problem.
Polynomial solutions
In the late 1980s Sergei A. Abramov described an algorithm which finds the general polynomial solution of a recurrence equation, i.e. , with a polynomial right-hand side. He (and a few years later Marko Petkovšek) gave a degree bound for polynomial solutions. This way the problem can simply be solved by considering a system of linear equations. In 1995 Abramov, Bronstein and Petkovšek showed that the polynomial case can be solved more efficiently by considering power series solution of the recurrence equation in a specific power basis (i.e. not the ordinary basis ).
The other algorithms for finding more general solutions (e.g. rational or hypergeometric solutions) also rely on algorithms which compute polynomial solutions.
Rational solutions
In 1989 Sergei A. Abramov showed that a general rational solution, i.e. , with polynomial right-hand side , can be found by using the notion of a universal denominator. A universal denominator is a polynomial such that the denominator of every rational solution divides . Abramov showed how this universal denominator can be computed by only using the first and the last coefficient polynomial and . Substituting this universal denominator for the unknown denominator of all rational solutions can be found by computing all polynomial solutions of a transformed equation.
Hypergeometric solution
A sequence is called hypergeometric if the ratio of two consecutive terms is a rational function in , i.e. . This is the case if and only if the sequence is the solution of a first-order recurrence equation with polynomial coefficients. The set of hypergeometric sequences is not a subspace of the space of sequences as it is not closed under addition.
In 1992 Marko Petkovšek gave an algorithm to get the general hypergeometric solution of a recurrence equation where the right-hand side is the sum of hypergeometric sequences. The algorithm makes use of the Gosper-Petkovšek normal-form of a rational function. With this specific representation it is again sufficient to consider polynomial solutions of a transformed equation.
A different and more efficient approach is due to Mark van Hoeij. Considering the roots of the first and the last coefficient polynomial and – called singularities – one can build a solution step by step making use of the fact that every hypergeometric sequence has a representation of the formfor some with for and . Here denotes the Gamma function and the algebraic closure of the field . Then the have to be singularities of the equation (i.e. roots of or ). Furthermore one can compute bounds for the exponents . For fixed values it is possible to make an ansatz which gives candidates for . For a specific one can again make an ansatz to get the rational function by Abramov's algorithm. Considering all possibilities one gets the general solution of the recurrence equation.
D'Alembertian solutions
A sequence is called d'Alembertian if for some hypergeometric sequences and means that where denotes the difference operator, i.e. . This is the case if and only if there are first-order linear recurrence operators with rational coefficients such that .
1994 Abramov and Petkovšek described an algorithm which computes the general d'Alembertian solution of a recurrence equation. This algorithm computes hypergeometric solutions and reduces the order of the recurrence equation recursively.
Examples
Signed permutation matrices
The number of signed permutation matrices of size can be described by the sequence . A signed permutation matrix is a square matrix which has exactly one nonzero entry in every row and in every column. The nonzero entries can be . The sequence is determined by the linear recurrence equation with polynomial coefficientsand the initial values . Applying an algorithm to find hypergeometric solutions one can find the general hypergeometric solutionfor some constant . Also considering the initial values, the sequence describes the number of signed permutation matrices.
Involutions
The number of involutions of a set with elements is given by the recurrence equationApplying for example Petkovšek's algorithm it is possible to see that there is no polynomial, rational or hypergeometric solution for this recurrence equation.
Applications
A function is called hypergeometric if where denotes the rational functions in and . A hypergeometric sum is a finite sum of the form where is hypergeometric. Zeilberger's creative telescoping algorithm can transform such a hypergeometric sum into a recurrence equation with polynomial coefficients. This equation can then be solved to get for example a linear combination of hypergeometric solutions which is called a closed form solution of .
References
Polynomials | P-recursive equation | [
"Mathematics"
] | 1,386 | [
"Polynomials",
"Algebra"
] |
58,007,676 | https://en.wikipedia.org/wiki/Kellys%20Bush%20Park | The Kellys Bush Park is a heritage-listed bushland, partly on the former site of smelting works, at Nelson Parade, Hunters Hill in the Municipality of Hunter's Hill local government area of New South Wales, Australia. It is also known as Weil Park and The Smelting Company. The property is owned by Department of Planning and Environment, a department of the Government of New South Wales. It was added to the New South Wales State Heritage Register on 2 April 1999.
History
Indigenous history
At the time of European contact the Kelly's bush area was inhabited by the Wallumettagal Clan who spoke the Guringai language. They lived primarily on fish and shellfish, supplementing their diet when necessary with vegetables, marsupials, birds and grubs. They were also frequently observed firing the scrub both to facilitate access to the foreshore and to flush out game. Very little is known of their social structure and religious beliefs.
Development of Hunters Hill
Captain John Hunter (1737–1821) of the Sirius, charted Sydney Harbour in 1788. On 28 January 1788 he wrote in his journal: "A few days after my arrival with the transports in Port Jackson, I set off with a six-oared boat and a small boat, intending to make as good a survey of the harbour as circumstances would admit: I took to my assistance Mr Bradley, the first lieutenant, Mr Keltie, the master, and a young gentleman of the quarter-deck (midshipman Henry Waterhouse)." Hunter's meticulous chart shows 30 depth soundings around the peninsula bounded by the Parramatta and Lane Cove Rivers. Hunter was Governor of the Colony from 1795–1800. He is commemorated in the name of Hunters Hill.
In 1855 a speculative housing venture of erecting four prefabricated Swiss Cottages at Hunters Hill was underway. In this period Hunters Hill was an established French enclave, with the residence of the French consul located there at "Passy", and much of its early development was constructed by men of French descent. The prefabricated houses were advertised as "four splendid family residences, standing in their own grounds, of about 1 acres each", with "wood and water in abundance".
Beverley Sherry in her study of Hunter Hill notes that this was the first planned group of houses to be built in the municipality, marking the beginning of the garden suburb character of Australia's oldest Garden Suburb. The subdivision and garden suburb development occurred in the mid to late nineteenth century, predating the formation of the Garden Suburb movement. The historic development at Hunters Hill was consistently speculative, although some of the subdivisions were undertaken to provide residences for family members.
Kelly's Bush
Kelly's Bush derives its name from Mr Thomas H. Kelly who owned over of land on the foreshore of Hunter's Hill (stretching from Woolwich Road south to the Parramatta River). This area was bounded by the Parramatta River, Woolwich Road, Nelson Parade and Alfred Street. He established the Smelting Company on of waterfront land in 1892, with the adjoining seventeen acres of bush to the north designed to act as a buffer to the residential areas and zoned "open space". The Smelting Company allowed public access to the foreshore for recreation, through all areas except the actual works area. The condition of the surrounding bush fluctuated, depending on the amount of timber being used to fire the smelters.
Almost of the "open space" became known as Weil Park when it was purchased in 1956 by Hunter's Hill Council and the Cumberland County Council. The bush was cleared and a grassed oval created for sporting activities. In 1966 the Town Clerk wrote to the State Planning Authority stating: "There is insufficient area in the land held and known as Weil Park and Council feels that it is important to the interest of posterity that additional "open space" area should be acquired whilst the opportunity exists".
In 1967 the Smelting Company works moved to Alexandria and A. V. Jennings took a two-year option to purchase the site. They applied to Council seeking suspension of the County of Cumberland Planning Scheme Ordinance to enable the development of 147 home units, including three buildings of eight-storeys high. Council was opposed to the application and renewed its bid for State acquisition of the entire area as open space, however the State Planning Authority rejected the proposal. Jennings subsequently submitted a series of modified applications. The Hunters Hill Trust strongly condemned the Jennings development.
The SPA then arranged to buy from Jennings of sloping waterfront bush and abandoned industrial reserve for a "foreshore reserve". In 1969 the Council agreed in principle to a suspension of the existing zoning to permit the development of 56 townhouses (without any public consultation). This was subsequently reduced to 25 single dwelling allotments.
In an article that appeared in The Sydney Morning Herald on 25 July 1970 local Hunters Hill resident Betty James wrote how local children had pulled up a long line of survey pegs laid out through "their bush" as a heartfelt protest. Her article read like a love-letter to Kelly's Bush, describing its deep gullies of bracken fern, its blueberry ash, lily-pilly, tea tree and a rare stand of healthy banksias. James...also talked about it as an outdoor laboratory and living museum: there were Aboriginal middens and carvings in the sandstone. In September 1970, James and 12 other neighbours gathered at All Saints' parish hall and christened themselves the 'Battlers for Kelly's Bush'. The group, which the Hunters Hill Council would dismiss as "13 bloody housewives", elected James as President, Kath Lehany as secretary and Monica Sheehan as assistant secretary. Most of the women were lifelong Liberal Party voters who had never been involved in politics but each had a different reason for joining...Miriam Cunningham...had realised when she had been to Australia Square, then Sydney's tallest building, that Kellys Bush was the only patch of green she could see on the Parramatta River. "It was the lungs of Sydney.".
A group of concerned citizens had formed by this stage and called themselves "The Battlers".
Unwittingly, the battlers set down a blueprint for the modern-day protest movement. They wrote hundreds of letters. They organised a "phone tree" to pass on news. They invited media to "boil the billy" days in the bush and plied them with baked goods. They ran essay competitions for schoolchildren about why the bush should be saved. They made badges and banners and got their teenagers to hang them around Hunters Hill. They enlisted the local school band, which marched form Hunters Hill High School to Kellys Bush, calling for "browsing not housing". They even roped in local Kylie Tennant to write protest poems. Dinner parties became battlegrounds and the peninsula community divided over the issue. Some wanted the sewage pipes that A.V.Jennings promised to build for the whole area or believed local state Liberal MP Peter Coleman, who said Council rares would drop when Jennings came...Over the course of several months, the battlers sent several delegations to the Liberal Premier of the day, Robert Askin, to argue their case. "Askin derided us as middle-class matrons" says Hunters Hill resident Phil Jenkyn, who says the women inspired him to form a group known as the Defenders of Sydney Harbour Foreshores.
They met with the (then) Premier Robert Askin, asking him to intervene. The Battlers also wrote to the various unions asking for their support and were referred to the Trades and Labour Council.
Despite the protest, in 1971 the Minister for Local Government signed the notice rezoning the land from Reserved Open Space to Residential. The President of the Builders Labourers' Federation of Australia (BLF) met with The Battlers and went to the BLF executive, who supported them in principle. The trade union support resulted in the first "black ban" called on 16 June 1971 by the BLF over an area of land. Black bans would later become known as "green ban" for their active pursuit of the maintenance of green space. Six hundred people attended a rally in August 1971 to demonstrate their support for Kelly's Bush.
With the union green ban in force, A.V. Jennings were eventually forced to sell the land to Hunter's Hill Council, however, by a narrow margin the councillors voted to retain the Residential Zoning. In 1977 the new Premier, Neville Wran, announced that no development would take place at Kelly's Bush. The discovery of radioactive waste on the site raised serious doubts as to its suitability for residential development. A period of silence followed and then in 1983 Neville Wran announced that Kelly's Bush was to be set aside for full public access on a permanent basis. His press release read: "It represents a victory for environmentalists generally. The land will be used to give people access to natural bushland fronting Parramatta River."
The shape of modern Sydney is City of Sydney Labor councillor Meredith Burgmann, who wrote a book on the subject. The movement even inspired overseas activists, including German Petra Kelly, who would eventually form one of the world's first Green political parties.
Mundey and the BLF went on to lead 42 green bans in the early 1970s, holding up billions of dollars worth of construction.
It took the 13 women 13 years to save Kelly's Bush... When the Wran Government bought the land the women celebrated with a simple bush ceremony and a pot of tea – and invited Jack Mundey, by now their friend for life...Kids still build cubby houses here and roam by foot, bike or in their imagination among the banksias and bracken. Several of the seven dead battlers have had their ashes scattered in the bush....
Description
Kelly's Bush covers of bushland on the lower reaches of the Parramatta River in the Sydney Metropolitan Area. It is part of a network of near natural open spaces on the Sydney Harbour waterway system and is the only substantial area of natural bush on the lower Parramatta River. Kelly's Bush is the largest area of near natural bush on the Hunter's Hill peninsula. It is linked directly to Weil Park to the north, Nelson Parade and residential areas to the west, the Parramatta River to the south and residential areas and Woolwich Marina to the east. Kelly's Bush lies on the southerly aspect of the major ridge line of the Hunter's Hill Peninsula, which runs in an east-west direction. There are five major vegetation communities found in Kelly's Bush: eucalyptus (dominant), heath/closed shrub, closed rainforest, banksia/low closed forest and closed scrub/weed areas. The moss Racopilum cuspidigerum is known to occur here.
Condition
As at 12 January 1999, the park was intact in its 1983 conserved form. The park is substantially intact as an area of remnant bushland.
Modifications and dates
The site has seen the following modifications:
1892: established Smelting Company on two acres, with adjoining seventeen acres of bush to the north designed as buffer to the residential areas and zoned "open space". The Company allowed public access to the foreshore for recreation, through all areas except the actual works area. The condition of the bush fluctuated, depending on the amount of timber being used to fire the smelters.
1956: Almost 7 acres of "open space" became known as Weil Park when purchased by Hunter's Hill Council and Cumberland County Council. Bush cleared and a grassed oval created for sporting activities.
1967: the Smelting Company works moved to Alexandria and sold to A.V.Jennings - series of DAs - didn't progress.
SPA then arranged to buy from Jennings 5.6 acres of sloping waterfront bush and abandoned industrial reserve for a "foreshore reserve".
1971: Minister for Local Government rezoned the land from Reserved Open Space to Residential.
1977: Premier banned development on the site. The discovery of radioactive waste on the site raised serious doubts as to its suitability for residential development.
1983: Premier Wran announced that site to be set aside for full public access on a permanent basis.
1983–1999: Some improvements have been made, including a carpark, paths, foreshore park, and a viewing platform.
Heritage listing
As at 26 March 1999, Kelly's Bush Park has high local significance as a remnant of natural bushland located on the foreshores of the Parramatta River in Hunters Hill. The site has State significance as the site of the first "green bans" of the 1970s when a group of local residents enlisted the assistance of unions to oppose development of the site.
Kellys Bush Park was listed on the New South Wales State Heritage Register on 2 April 1999.
References
Citations
General bibliography
Attribution
External links
New South Wales State Heritage Register
Hunters Hill, New South Wales
Vegetation of Australia
Protected areas of New South Wales
Industrial buildings in New South Wales
Parks in Sydney
Smelting
Beaches of New South Wales
Articles incorporating text from the New South Wales State Heritage Register
Green bans
Woolwich, New South Wales
Protected areas established in 1983
1983 establishments in Australia | Kellys Bush Park | [
"Chemistry"
] | 2,703 | [
"Metallurgical processes",
"Smelting"
] |
58,008,487 | https://en.wikipedia.org/wiki/Reagent%20Chemicals | Reagent Chemicals is a publication of the American Chemical Society (ACS) Committee on Analytical Reagents, detailing standards of purity for over four hundred of the most widely used chemicals in laboratory analyses and chemical research. Chemicals that meet this standard may be sold as "ACS Reagent Grade" materials.
Reagent standards relieve chemists of concern over chemical purity. "ACS Reagent Grade", is regarded as a gold standard measure and is in some cases required for use in chemical manufacturing, usually where stringent quality specifications and a purity of equal to or greater than 95% are required. The American Chemical Society does not validate the purity of chemicals sold with this designation, but it relies on suppliers, acting in their self-interest, to meet these standards. In practice, the reliability of supplier stated purity is at times questionable.
In addition to specifications for each chemical, Reagent Chemicals provides detailed methods for determining how to measure the properties and impurities listed in the specifications. Included are detailed explanations for numerous common analytical methods such as gas, liquid, ion, and headspace chromatography, atomic absorption spectroscopy, and optical emission spectroscopy.
Reagent Chemicals is primarily of interest to manufacturers and suppliers of chemicals to laboratories worldwide, and less so to research laboratories. Many standards organizations and federal agencies that set guidelines require the use of ACS-grade regent chemicals for many test procedures. This includes the United States Pharmacopeia (USP) and the U.S. Environmental Protection Agency (EPA). An exception would be those working on trace analyses (measuring contaminants in the environment, for example), where small impurities in reagents would be significant.
Reagent Chemicals Online
After eleven paper editions over 68 years, Reagent Chemicals became an electronic resource in 2017. The publication is updated several times a year to include new reagents and methods of analysis. Changes are published online six months prior to becoming an official standard, allowing manufacturers to adjust their labels or processes.
While the full details of most reagents are behind a paywall, that for acetone is publicly available to showcase a typical entry.
History of Reagent Chemicals
1903: The American Chemical Society created the Committee on the Purity of Reagents, the forerunner of the Committee on Analytical Reagents, acknowledging the increasing needs for purity and standard in chemical research and manufacturing.
1917: The American Chemical Society established the ACS Committee on Analytical Reagents. William F. Hillebrand (1853-1925), one of Washington's most distinguished chemists, was elected as the first chair. He played a key editorial role in judging which analytical methods would be published as ACS standards, with colleagues referring to him as "Supreme Court of Chemistry". He additionally achieved stature with Geological Survey and the Bureau of Standards.
1920s: The Committee began publishing specifications for chemical reagents and test methods in scientific journals. At this point, analytical methods were primarily what we now consider to be “Classical Wet Methods".
1950: The 1st edition of Reagent Chemicals was published and introduced the application of analytical instrumentation. Reagent Chemicals had significant impact on chemical laboratories by enabling greatly improved accuracy and sensitivity.
2000: The 9th edition was published and continued a trend toward eliminating or simplifying tedious classical procedures for trace analyses and adding instrumental methods, where possible.
2006: The release of the 10th edition introduced Monographs for Standard-Grade Reference Materials.
2016: The 11th edition introduces heavy metal test methodologies utilizing ICP-OES.
2017: The new online edition of Reagent Chemicals, based on the 11th edition in print, improved the speed and simplicity with which the Committee communicates updates and changes by bringing the entire reference resource to the ACS journals platform.
Committee
The ACS Committee on Analytical Reagents is responsible for the Reagent Chemicals publication and standards included within. The committee includes members from chemical and pharmaceutical manufacturers, academia, and government organizations (NIST, EPA, USGS).
Notes
References
Reagent Chemicals
American Chemical Society
Chemistry reference works
1950 in science | Reagent Chemicals | [
"Chemistry"
] | 838 | [
"American Chemical Society"
] |
58,009,698 | https://en.wikipedia.org/wiki/Elise%20S%C3%B8rensen | Elise Sørensen (Kalundborg, July 2, 1903 – Ordrup, July 5, 1977) was a Danish nurse and the inventor of the colostomy bag.
In 1954 her sister had an ostomy operation (a procedure that takes the end of the intestine out through the abdomen, allowing waste to exit via a surgically created stoma). After the operation, Sørensen's sister was uncomfortable going outside due to fear that stoma might leak, due to the metal/glass capsules or fabric/rubber bags that people used at the time.
Sørensen then created the world's first disposable ostomy bag attachable through an adhesive ring, very similar to the devices used today.
References
1903 births
1977 deaths
Danish nurses
Medical equipment | Elise Sørensen | [
"Biology"
] | 168 | [
"Medical equipment",
"Medical technology"
] |
58,009,999 | https://en.wikipedia.org/wiki/Mythily%20Ramaswamy | Mythily Ramaswamy (born 6 June 1954) is an Indian mathematician and professor in the Department of Mathematics at the TIFR Centre for Applicable Mathematics of the Tata Institute of Fundamental Research in Bangalore. Her research involves functional analysis and controllability of partial differential equations.
Education
Ramaswamy was born near Mumbai, to a banking family, but moved often to other parts of India as a child.
She obtained her doctorate in 1990 from Pierre and Marie Curie University in Paris. Her dissertation, Sur des questions de symetrie dans des problemes elliptiques [On questions of symmetry in elliptic problems] was supervised by Henri Berestycki.
Recognition
Ramaswamy was the 2004 winner of the Kalpana Chawla Award of the Karnataka State Council for Science and Technology, "given to a young woman scientist for achievements in the field of science and technology".
She was elected to the Indian Academy of Sciences in 2007. She became a Fulbright Scholar for 2016–2017, funding her to visit Michael Renardy at Virginia Tech.
References
1954 births
Living people
Indian mathematicians
Indian women mathematicians
Control theorists
Mathematical analysts
Pierre and Marie Curie University alumni
Academic staff of Tata Institute of Fundamental Research | Mythily Ramaswamy | [
"Mathematics",
"Engineering"
] | 242 | [
"Mathematical analysis",
"Control engineering",
"Mathematical analysts",
"Control theorists"
] |
58,011,237 | https://en.wikipedia.org/wiki/Q2343-BX418 | Q2343-BX418 is a young, low-metallicity dwarf galaxy located about 10 billion light years away from Earth. It has a redshift of 2.3052, and a stellar mass of 500 million solar masses.
Halo
In July 2018, new research was published suggesting that the galaxy was surrounded by a massive halo of diffuse gas 150,000 light years in diameter, about 10 times the size of the galaxy itself. The halo was measured to be giving off light in the Lyman-alpha line, an ultraviolet wavelength. By measuring the halo's spectra using the Keck Cosmic Web Imager at the Keck Observatory, the researchers found that the galaxy is surrounded by a roughly spherical outflow of gas. They also found that there are significant variations in the density and velocity of this gas.
Steidel's team had studied the galaxy before using other instruments at the Keck Observatory. However, the Keck Cosmic Web Imager allowed them to study the faint gas connecting galaxies, known as the cosmic web.
See also
List of galaxies
List of nearest galaxies
References
Principal Galaxies Catalogue objects
SDSS objects
Dwarf galaxies
Dwarf irregular galaxies
Pegasus (constellation) | Q2343-BX418 | [
"Astronomy"
] | 238 | [
"Pegasus (constellation)",
"Constellations"
] |
58,011,682 | https://en.wikipedia.org/wiki/Advanced%20Electric%20Propulsion%20System | Advanced Electric Propulsion System (AEPS) is a solar electric propulsion system for spacecraft that is being designed, developed and tested by NASA and Aerojet Rocketdyne for large-scale science missions and cargo transportation. The first application of the AEPS is to propel the Power and Propulsion Element (PPE) of the Lunar Gateway, to be launched no earlier than 2027. The PPE module is built by Maxar Space Systems in Palo Alto, California. Two identical AEPS engines would consume 25 kW being generated by the roll-out solar array (ROSA) assembly, which can produce over 60 kW of power.
The Power and Propulsion Element (PPE) for the Lunar Gateway will have a mass of 8-9 metric tons and will be capable of generating 50 kW of solar electric power for its Hall-effect thrusters for maneuverability, which can be supported by chemical monopropellant thrusters for high-thrust attitude control maneuvers.
Overview
Solar-electric propulsion has been shown to be reliable and efficient, and allows a significant mass reduction of spacecraft. High-power solar electric propulsion is a key technology that has been prioritized because of its significant exploration benefits in cis-lunar space and crewed missions to Mars.
The AEPS Hall thruster system was originally developed since 2015 by NASA Glenn Research Center and the Jet Propulsion Laboratory to be used on the now canceled Asteroid Redirect Mission. Work on the thruster did not stop following the mission cancellation in April 2017 because there is demand of such thrusters for a range of NASA, defense and commercial missions in deep space. Since May 2016, further work on AEPS has been transitioned to Aerojet Rocketdyne that is currently designing and testing the engineering-model hardware. This is a contract worth $65 million, where Aerojet Rocketdyne developed, qualified and will deliver five 12.5 kW Hall thruster subsystems, including thrusters, PPUs and xenon flow controllers.
Design
AEPS is based on the 12.5 kW development model thruster called 'Hall Effect Rocket with Magnetic Shielding' (HERMeS). The AEPS solar electric engine makes use of the Hall-effect thruster in which the propellant is ionized and accelerated by an electric field to produce thrust. To generate 12.5 kW at the thruster actually takes a total of 13.3 kW including power needed for the control electronics. Four identical AEPS engines (thruster and control electronics) would theoretically need more than the 50 kW generated by solar panels of the PPE. It is stated that the AEPS array is intended only to use 40 kW of the 50 kW, so the maximum thrust would be limited to around 1.77 N.
The engineering model is undergoing various vibration tests, thruster dynamic and thermal environment tests in 2017. AEPS is expected to accumulate about 5,000 h by the end of the contract and the design aims to achieve a flight model that offers a half-life of at least 23,000 hours and a full life of about 50,000 hours.
The three main components of the AEPS propulsion engine are: a Hall-effect thruster, Power Processor Unit (PPU), and the Xenon Flow Controller (XFC). The thrusters are throttleable over an input power range of 6.6740 kW with input voltages ranging from 95 to 140 V. The estimated xenon propellant mass for the Lunar Gateway would be 5,000 kg. The Preliminary Design Review took place in August 2017. It was concluded that "The Power Processing Unit successfully demonstrated stable operation of the propulsion system and responded appropriately to all of our planned contingency scenarios."
Tests
In July 2017, AEPS was tested at Glenn Research Center. The tests used a Power Processing Unit (PPU), which could also be used for other advanced spacecraft propulsion technology. In August 2018, Aerojet Rocketdyne completed the early systems integration test in a vacuum chamber, leading to the design finalization and verification phase. In November 2019, Aerojet Rocketdyne demonstrated the AEPS thruster at full power for the first time.
In July 2023, NASA and Aerojet Rocketdyne began qualification testing on AEPS.
See also
VASIMR variable impulse electric plasma engine
References
Hall effect
Ion engines
Magnetic propulsion devices
Spacecraft propulsion
Lunar Gateway | Advanced Electric Propulsion System | [
"Physics",
"Chemistry",
"Materials_science"
] | 878 | [
"Physical phenomena",
"Matter",
"Ion engines",
"Hall effect",
"Electric and magnetic fields in matter",
"Electrical phenomena",
"Solid state engineering",
"Ions"
] |
58,012,588 | https://en.wikipedia.org/wiki/Shipbuilding%20in%20the%20early%20modern%20period | Maritime travel experienced a large leap in the capabilities of seafaring vessels thanks to technological improvements in shipbuilding in the early modern era. Europe, Asia, and the Middle East all saw improvements on prior construction techniques, contributing to the Age of Discovery. As a result, the introduction of these technologies in the production of naval vessels was critical as they allowed nations that utilized these advancements to ascend to a state that could expand its influence at a far greater range. In military engagements, the exploration of new lands and potential colonies, or the transportation of goods for trade, better shipbuilding techniques coincided with prosperity. It is during this time that the practice of naval architecture appeared, as skilled designers could produce designs that had an enormous impact in ship performance and capabilities.
History
In the Middle Ages that preceded the early modern era, shipbuilding mainly utilized clinker building techniques, in which wooden hull planks were laid in an overlapping fashion so that they are both easier to construct and lighter. A common form of a clinker-built ship is Nordic longship associated with the vikings. These vessels had the advantage of allowing a certain degree of twisting. However, carvel construction techniques, which involve hull planks being laid smoothly next to each other, allowed for much larger vessels that displaced more water, allowing for a much larger cargo capacity, which is necessary for long distance maritime travel.
European designs
A popular design of European origin is the carrack, which utilized caravel construction techniques, allowing ships to increase in size dramatically, far past that which was capable with clinker building techniques. Seen throughout the 14th and 15th century, these ships were used for trade between European powers and their foreign markets. The carrack featured anywhere from three to four masts, dominating ship designs until it was superseded by the galleon in the 16th century.
The galleon featured a similar design to the carrack as it involved multiple sails and was much larger than vessels before it. With multiple decks, these ships allowed for both military and commercial use as the large cargo space allowed for the transportation of goods and multiple decks allowed for a large armament of cannons. This design saw a great amount of usage as European powers established overseas colonial empires. The Dutch fluyt ship could be recognized as a similar design to a galleon due to its pear-shaped hull.
A common feature of European designs was the consideration for a large degree of armament as colonial powers had to defend from both aggressive rival European traders and pirates seeking to plunder goods.
Asian designs
Many of the ships that were developed in Asia were characterized by a series of traits. For example, flat-bottomed craft were often prevalent in many Chinese vessels and were adapted for navigating in the shallow waters of the rivers that are common in China. For example, the Chinese treasure ship, known for its usage during Zheng He's seven voyages to bring distant goods and establish political and economic relationships with foreign powers.
The most prevalent ship design originating from Asia during this era was the junk, which was developed centuries earlier in Ancient China during the Han dynasty. Known for its battened sail and close to the water line stature, junks saw usage in both shallow waters and extensive ocean voyages.
Middle Eastern designs
Largely due to the absence of a large, oceanic body of water situated by the Middle East, most shipbuilding designs reflected that of shallow water vessels or iterations meant to prepare the ship for deep-sea voyage. The dhow was a long-hulled boat that was utilized for trading extensively in the Islamic world. In the early modern era, Middle Eastern shipbuilding stagnated for the most part. However, dhows did receive a variety of adjustments in order to suit the goals of global trade of this time period.
The baghlah allowed for greater range as it was a dhow scaled up to include a greater number of sails and larger cargo hold. These modifications to the traditional dhow allowed it travel much further, even as far as the Spice Islands.
North and South American designs
During this time, indigenous populations were limited to basic vessels that were constructed in previous eras. However, colonizing Europeans powers utilized their ship technology to traverse the Atlantic Ocean to access the New World.
References
Early modern period
Shipbuilding | Shipbuilding in the early modern period | [
"Engineering"
] | 850 | [
"Naval architecture",
"Shipbuilding",
"Marine engineering"
] |
58,012,993 | https://en.wikipedia.org/wiki/Scutoid | A scutoid is a particular type of geometric solid between two parallel surfaces. The boundary of each of the surfaces (and of all the other parallel surfaces between them) either is a polygon or resembles a polygon, but is not necessarily planar, and the vertices of the two end polygons are joined by either a curve or a Y-shaped connection on at least one of the edges, but not necessarily all of the edges. Scutoids present at least one vertex between these two planes. Scutoids are not necessarily convex, and lateral faces are not necessarily planar, so several scutoids can pack together to fill all the space between the two parallel surfaces. They may be more generally described as a mix between a frustum and a prismatoid.
Naming
The object was first described by Gómez-Gálvez et al. in a paper entitled Scutoids are a geometrical solution to three-dimensional packing of epithelia, and published in July 2018. Officially, the name scutoid was coined because of its resemblance to the shape of the scutum and scutellum in some insects, such as beetles in the subfamily Cetoniinae. Unofficially, Clara Grima has stated that while working on the project, the shape was temporarily called an Escu-toid as a joke after the biology group leader Luis M. Escudero. Since his last name, "Escudero", means "squire" (from Latin scutarius = shield-bearer), the temporary name was modified slightly to become "scutoid".
Appearance in nature
Epithelial cells adopt the "scutoidal shape" under certain circumstances. In epithelia, cells can 3D-pack as scutoids, facilitating tissue curvature. This is fundamental to the shaping of the organs during development.
"Scutoid is a prismatoid to which one extra mid-level vertex has been added. This extra vertex forces some of the "faces" of the resulting object to curve. This means that Scutoids are not polyhedra, because not all of their faces are planar. ... For the computational biologists who created/discovered the Scutoid, the key property of the shape is that it can combine with itself and other geometric objects like frustums to create 3D packings of epithelial cells." - Laura Taalman
Cells in the developing lung epithelium have been found to have more complex shapes than the term "scutoid", inspired by the simple scutellum of beetles, suggests. When "scutoids" exhibit multiple Y-shaped connections or vertices along their axis, they have therefore been called "punakoids" instead, as their shape is more reminiscent of the Pancake Rocks in Punakaiki, New Zealand.
Potential uses
The scutoid explains how epithelial cells (the cells that line and protect organs such as the skin) efficiently pack in three dimensions. As epithelial tissue bends or grows, the cells have to take on new shapes to pack together using the least amount of energy possible, and until the scutoid's discovery, it was assumed that epithelial cells packed in mostly frustums, as well as other prism-like shapes. Now, with the knowledge of how epithelial cells pack, it opens up many new possibilities in terms of artificial organs. The scutoid may be applied to making better artificial organs, allowing for things like effective organ replacements, recognizing whether a person's cells are packing correctly or not, and ways to fix that problem.
References
External links
Volume
Epithelium | Scutoid | [
"Physics",
"Mathematics"
] | 745 | [
"Scalar physical quantities",
"Physical quantities",
"Quantity",
"Size",
"Extensive quantities",
"Volume",
"Wikipedia categories named after physical quantities"
] |
73,327,906 | https://en.wikipedia.org/wiki/Nordic%20Institute%20for%20Interoperability%20Solutions | The Nordic Institute for Interoperability Solutions (NIIS) is a non-profit established in 2017 by Estonia and Finland, with the mission "to develop e-governance solutions...with the X-Road technology used nationwide in the Estonian X-tee and in the Finnish Suomi.fi Data Exchange Layer services". It is funded by both countries, with around 1M€ annually. In 2019, Iceland was invited as well, and later the Faroe Islands.
The NIIS manages, develops, verifies, and audits X-Road's source code; administers documentation, business and technical requirements; conducts development; develops and implements principles of licensing and distribution; provides second-line support for members, and engages in international cooperation. It also shares vendor training and certifications on its technology.
The institute has been coined as "a pioneer of cross-border e-governance solution" and "a key component of its digital diplomacy and digital foreign policy work", "unique in the world". In 2020, the Digital Public Goods Alliance found the X-Road technology managed by NIIS was found to be a digital public good in alignment with the Digital Public Goods Standard. Its CEO, Ville Sirviö, is often referenced in international publications.
References
External links
Internet in Estonia
Government agencies of Estonia
Government agencies of Finland
Government agencies of Iceland
Estonia–Finland relations
2017 establishments in Estonia
2017 establishments in Finland
Free and open-source software organizations
Non-profit technology | Nordic Institute for Interoperability Solutions | [
"Technology"
] | 298 | [
"Information technology",
"Non-profit technology"
] |
73,328,005 | https://en.wikipedia.org/wiki/Climate%20change%20and%20food%20security%20in%20Africa | Climate change in Africa is reducing its food security. Climate change at the global, continental, and sub-continental levels has been observed to include an increase in air and ocean temperatures, sea-level rise, a decrease in snow and ice extent, an increase and decrease in precipitation, changes in terrestrial and marine biological systems, and ocean acidification. The agricultural industry is responsible for more than 60% of full time employment in Africa. Millions of people in Africa depend on the agricultural industry for their economic well-being and means of subsistence. A variety of climate change-related factors such as worsening pests and diseases that damage agriculture and livestock, altered rainfall patterns, rising temperatures, droughts, and floods are having a negative impact on the agricultural industry in Africa. Many African populations access to food is being impacted by these climate change effects on the agricultural industry, which result in a trend of decreasing crop yields, animal losses, and rising food prices.
Effects of climate change on African food security
Since 1961 in Africa, anthropogenic climate change has been attributed to a 34% loss in agricultural total factor productivity, which measures agricultural production as well as livestock. The reduction in crop yields brought on by altered precipitation patterns and increased temperatures is one of the most significant effects because it causes variable periods of drought and flooding.
In 2010-2011, Somalia, a country on the Horn of Africa, experienced the East African Drought, which led to mass livestock fatality, and poor crop harvests. During the famine (October 2010- April 2012), the FAO (Food and Agriculture Organization) estimated that Somalia experienced around 258,000 deaths attributable to the emergency, 52% of which were estimated to be children. Somalia experienced drought again starting in 2020 and continuing through 2023, resulting in millions of livestock deaths, and poor/ failed harvests from 5 consecutive missed rainy seasons. The WHO (World Health Organization) estimated that in 2022, 43,000 people died in Somalia because of the drought.
The El Niño weather effect can severely alter climate in Africa, having the strongest effect on precipitation, it caused by the shifting of warm water in the Pacific Ocean, and was responsible for widespread drought, crop loss, and food insecurity in Southern Africa between 2015 and 2017. In a statement in 2016, the SADC (Southern African Development Community), comprising 16 member states in Southern Africa, estimated that around 40 million people within Southern Africa were experiencing or at risk of experiencing food insecurity because of the El Niño event, they also estimated that 9.3 million tonnes of cereal crops were lost.
As a result of climate change, droughts have become more common, rainfall patterns have become more erratic, and other extreme weather events have occurred. These events have disrupted agricultural cycles and decreased crop yields. According to recent research, agricultural productivity in Sub-Saharan Africa is strongly impacted by climate change. The results of a study conducted in 2022 and looking at thirty countries in the region revealed that increasing malnutrition rates correlate with increased levels of greenhouse gas emissions, which indicates a loss in food security. The research underscores the necessity of formulating adaptive strategies to mitigate the adverse effects of these elements.
Climate change has also boosted the prevalence of pests and illnesses, endangering agricultural output and livestock production. In 2020 and 2021 East Africa experienced a Desert Locust crisis, the worst of which Kenya and Uganda had seen for 70 years, that was caused by extreme weather events in the form of two tropical cyclones and increased precipitation in the region that provided circumstances apt for breeding. Desert Locust swarms consume crop land at an alarming rate, a study conducted by the FAO in 2020 surveyed 7800 households in Uganda, and found that 15% of all households reported over 75% of their crop had been damaged due to the swarms. Between 2003 and 2005 the Sahel region of Africa experienced a Desert Locust upsurge, which the FAO estimated to be responsible for a 80-100% loss in cereal crops, and a 85-90% loss in leguminous crops, in the countries Mauritania, Burkina Faso, and Mali. The FAO estimated that 8,380,000 people from the countries Burkina Faso, Mali, Mauritania, Niger, Senegal, and Chad were affected in some capacity from the upsurge.
Similar to agriculture, for many people in Africa, livestock is a vital source of food, income, and labor, which increases these communities vulnerability too, and exacerbates the food security situation. In Nigeria and Kenya, drought and desertification are destroying grazing land at an increasing rate, leading to competition and violent conflict between livestock owners over grazeland. Many Africans now find it difficult to afford food due to rising food prices brought on by these losses, as of 2020, 77% of the population of Sub-Saharan Africa cannot afford to eat a healthy diet. Additionally, because of the nutrition needs of adolescent women compared to men, more expensive foods are required to meet the nutrition baseline. Because of the increasing lack of these foods, in some places in Africa like Ghana, the cost for a nutrition adequate diet for women is three times that of a similar aged man. Climate change poses a serious challenge to food security in Africa, where agricultural yields have been gradually dropping, and where population growth and increased demand for food, water, and forage increase the possibility of hunger and under-nutrition.
Africa's vulnerability to climate change related food insecurity
The main sources of Africa's 3.6% share of the world's Carbon dioxide emissions are gas flaring in the Niger Delta and coal-fired power plants in South Africa. But, the continent's forests are rapidly disappearing because of desertification and deforestation, which has negative consequences for both Africa and the climate at large. Despite having very low carbon dioxide emissions in comparison to other places, Africa is more vulnerable than other continents to the damaging effects of climate change because of its unique vulnerabilities and reliance on climate sensitive resources.
In West Africa's arid and semi-arid regions, dry terrain or desert makes up three-quarters of the continent's surface. The Sahel is a region that stretches from East Africa to West Africa, and is a transition zone between the dry Sahara Desert in North Africa to wetter areas in the south. Economic activity in the Sahel is largely dependent on climate-sensitive industries, such as rain-fed agriculture and Forestry, which are responsible for over 60% of employment as well as 40% of the regions GDP. A study in 2014 on local communities near the Kahuzi-Biega National Park near Bukavu in the Democratic Republic of the Congo, found that 94% percent of respondents relied on rain-fed agriculture for income. Agriculture contributes around 70% of employment, 30% of GDP, and 50% of exports in a rain-fed economy.
All countries combined, Africa relies on imports to meet around 85% of the food requirements of its countries citizens. Therefore, Africa is highly vulnerable to food price shocks, and especially crop price seasonality, which climate change is expected to further worsen. A study measured the percentage of seasonal gap in food prices in 13 different foods, in 7 African countries (Burkina Faso, Ethiopia, Ghana, Malawi, Niger, Tanzania, and Uganda) between 2000 and 2012. The study found that maize experienced a 33.1% seasonal price gap and sorghum and millet to have 22% and 20.1% seasonal gaps, however, the largest seasonal price gaps could be found in fruit and vegetables, such as tomatoes (60.8%). The agriculture industry serves as a safety net for rural poor people. People are increasingly susceptible since drought and flooding are more frequent and intense in many areas, including the nations surrounding the Rift Valley, the plains of Mozambique, Senegal, and The Gambia.
African food security and climate change adaptation strategies
Numerous adaptation measures are being implemented in Africa to mitigate the impact of climate change on food security. Among the most crucial strategies is the development and adoption of climate-resilient agricultural techniques. This involves utilizing crops that are resistant to drought, enhancing soil and water conservation, and utilizing integrated pest management. Additionally, diversifying sources of income is another adaptive technique that can be employed. Many African communities rely heavily on a single food or livestock source, making them particularly vulnerable to climate change impacts. By diversifying income sources, such as through off-farm revenue-generating activities, a buffer against climate shocks can be created. Furthermore, enhancing food distribution and storage methods may contribute to reduced food waste and increased food availability. Farmers may invest in climate-resilient practices and technologies by having better access to credit and financial services.
The following adaptation strategies are being developed by individuals, groups, and institutions to mitigate climate change risks:
Climate-smart agriculture production
Diversification of sources of income and alternative livelihoods
Decentralization of local resource control
Alternative eco-friendly energy sources
Infrastructure development
Information on the climate
Early warning systems
Insurance program
References
External links
https://reliefweb.int/organization/kenya-red-cross
https://www.uncclearn.org/wp-content/uploads/library/fao34.pdf
Climate change adaptation
Environmental education
Agriculture in Africa
Environment of Africa
Climate change in Africa
Food security | Climate change and food security in Africa | [
"Environmental_science"
] | 1,902 | [
"Environmental education",
"Environmental social science"
] |
73,328,638 | https://en.wikipedia.org/wiki/Lanthanum-nickel%20alloy | Lanthanum forms several alloys with nickel, including LaNi5, La2Ni7, LaNi2, LaNi3, La2Ni3, LaNi and La3Ni etc.
LaNi5
LaNi5 is an intermetallic compound with a CaCu5 structure. It belongs to the hexagonal crystal system. It can be oxidized by air above 200 °C, and react with hydrochloric acid, sulfuric acid or nitric acid above 20 °C. LaNi5 can be used as a catalyst for hydrogenation reactions.
Other alloys
In addition to LaNi5, there are other alloys such as La2Ni7, LaNi2, LaNi3, La2Ni3, LaNi, and La3Ni, and nonstoichiometric alloys such as LaNi2.286 (tetragonal, space group I4̄2m). The nickel atoms in LaxNiy can also be replaced by other atoms, such as LaNi2.5Co2.5.
See also
List of named alloys
References
Nickel alloys
Intermetallics
Nickel compounds
Lanthanum compounds | Lanthanum-nickel alloy | [
"Physics",
"Chemistry",
"Materials_science"
] | 230 | [
"Nickel alloys",
"Inorganic compounds",
"Metallurgy",
"Alloys",
"Intermetallics",
"Condensed matter physics"
] |
73,328,748 | https://en.wikipedia.org/wiki/Lanthanum%20pentanickel | LaNi5 is a hexagonal intermetallic compound composed of rare earth element lanthanum and transition metal nickel. It presents a calcium pentacopper (CaCu5) crystal structure. It is a melting compound with the same composition and has hydrogen storage capacity.
Structure
LaNi5 has a calcium pentacopper (CaCu5) type crystal structure, with a hexagonal lattice, space group is P6/mmm (No. 191), with lanthanum atom is located at coordinate origin 1a (0,0,0), two nickel atoms are located at 2c (1/ 3,2/3,0) and (2/3,1/3,0), the other three at 3g (1/2,0,1/2), (0,1/2,1/2), (1/2,1/2,1/2), with a=511pm, c=397pm. The unit cell contains 1 LaNi5 atom, the volume is 90×10−24 cm3, the LaNi5 unit cell contains a larger The six deformed tetrahedral voids can be used to fill in hydrogen atoms.
Chemical reactions
As a hydrogen storage alloy, LaNi5 can absorb hydrogen to form the hydride LaNi5Hx (x≈6) when the pressure is slightly high and the temperature is low, or when the pressure decreases or the temperature increases, hydrogen can be released to form repeated absorption and release of hydrogen. Energy must be added for the dehydrogenation process to proceed as it is an endothermic reaction. A decrease in temperature will cause the reaction to stop.
Characteristics and applications
The hydrogen storage density per unit volume (crystal) of LaNi5H6.5 at 2 bar is equal to the density of gaseous molecular hydrogen at 1800 bar, and all hydrogen can be desorbed at 2 bar. Although the hydrogen storage density in practical applications is reduced due to the aggregation of some LaNi5 powders, it is still higher than the density of liquid hydrogen. This allows safe operation of hydrogen fuel. In order to improve its hydrogen storage performance, metals such as lead or manganese are often used to partially replace nickel. Currently, LaNi5 is commonly used in storage and transportation of hydrogen, hydrogen vehicle power, fuel cells, separation and purification of hydrogen, propylene hydrogenation catalysts, etc.
References
Lanthanum compounds
Nickel compounds
Nickel alloys
Intermetallics | Lanthanum pentanickel | [
"Physics",
"Chemistry",
"Materials_science"
] | 522 | [
"Nickel alloys",
"Inorganic compounds",
"Metallurgy",
"Intermetallics",
"Condensed matter physics",
"Alloys"
] |
73,328,756 | https://en.wikipedia.org/wiki/Lentinula%20novae-zelandiae | Lentinula novae-zelandiae, also known as New Zealand shiitake, is a species of edible saprobic fungus endemic to New Zealand.
Phylogenetic research suggests this species forms a monophyletic clade of Laurasian origins. It can be cultivated, with cultures and grow kits available commercially in New Zealand.
References
External links
Fungi of New Zealand
Edible fungi
Fungi in cultivation
Fungi described in 1983
Marasmiaceae
Fungus species | Lentinula novae-zelandiae | [
"Biology"
] | 89 | [
"Fungi",
"Fungus species"
] |
73,331,113 | https://en.wikipedia.org/wiki/Sierra%20Madre%20Wistaria | Sierra Madre Wisteria or The Wistaria Vine is a flowering Wisteria vine shown at the annual Wistaria Festival in Sierra Madre, California. The Wistaria Vine in 1990 was declared by the Guinness Book of World Records to be the largest blossoming plant in the world. The Wistaria vine is named after physician Caspar Wistar (1761–1818) by botanist Thomas Nuttall (1786–1859). The general name for the plant is spelled Wisteria. This single wisteria vine covers over an acre. The Wistaria Vine has over 1.5 million blossoms and weighs over 250 tons. The plant is on private land and open to the public once a year during the Wistaria Festival.
History
The vine was planted in 1894 by Mrs. William (Alice) Brugman. Brugman purchased the vine from the old Wilson nursery, in Monrovia, for seventy-five cents in a 1-gallon bucket. The vine's trunk is now over a meter in diameter. The lavender flowers have a sweet fragrance. Mrs. Brugman sold the home and the vine to Henry and Estelle Fennell in 1906. The Fennells promoted the vine's growth, building arbors and trellises to keep it off the ground. The vine is on the alluvial plain of the San Gabriel Mountains, with a good water source and drainage. The Fennells let the vine grow onto the house. From 1904 to 1950, the Pacific Electric's Sierra Madre Line street cars bought visitors from around greater Los Angeles to Wistaria Festival. The weight of the vine later destroyed the house, collapsing the roof. A new house was built north of the vine. In 1936, the Fennells sold the house and vine to Carrie Ida Lawless. Lawless built new arbors and trellises to keep the vine off the ground and the house. Lawless died in 1942, and her nephew Bruce McGill inherited the house and vine. McGill worked with the Sierra Madre Garden Club in care of the vine. The original lot was subdivided in 1961, so the vine is now on two adjoining properties. Due to the vine's status, the vine is now maintained by experts from universities and local horticulturists.
The Sierra Madre Wisteria is one of the Seven Horticultural Wonders of the World.
Wistaria Festival
Sierra Madre is known for its annual Wistaria Festival normally held in March. Wistaria Festival showcases the Chinese wisteria (Wisteria sinensis). The Wistaria Vine currently spans two backyards in Sierra Madre. In addition to the annual tour of The Wistaria Vine, the city hosts an artisan's arts and craft festival. Wistaria Festival also has live music at Sierra Madre Memorial Park, with food trucks. The vine is in bloom for March to mid-April. The Wistaria is on the City of Sierra Madre's Flag designed in 2005 with the San Gabriel Mountains, the 1896 Old North Church and the 1974 Bell Tower in Kersting Court.
See also
Lignum nephriticum
References
Sierra Madre Wisteria
Individual plants | Sierra Madre Wistaria | [
"Biology"
] | 659 | [
"Individual organisms",
"Plants",
"Individual plants"
] |
73,335,064 | https://en.wikipedia.org/wiki/Lentinula%20raphanica | Lentinula raphanica is a species of edible agaric fungus in the family Omphalotaceae. Described as two species, Armillaria raphanica and Gymnopus alliaceus by William Alphonso Murrill in 1943, they have been moved to a single species of the genus Lentinula by Ron Petersen and J.L. Mata in 2001. It is known from subtropical Americas including the Amazon rainforest, where it grows on oak and other hardwood. Fruitbodies are similar in external appearance to others members of the genus Lentinula (including shiitake), being distinguished by gills and smell reminiscent of radish or alliums, especially while drying. It is eaten by the Witoto and Andoque people in Colombia and the Yanomami in Brazil, with Yanomani calling it Naönaö amo in Sanumá language and serving it boiled with broth and beiju cakes.
References
External links
Photographs on Mushroom Observer
Fungi described in 2001
Fungi of Central America
Taxa named by Ron Petersen
Marasmiaceae
Edible fungi
Fungus species | Lentinula raphanica | [
"Biology"
] | 220 | [
"Fungi",
"Fungus species"
] |
73,335,436 | https://en.wikipedia.org/wiki/KSC-12-192 | KSC-12-192 is a drug that is used in scientific research to study the κ-opioid receptor, where it acts as a biased agonist.
KSC-12-192 preferentially activates G-protein coupling over β-arrestin 2 recruitment in vitro, an intrinsic activity shared with many other KOR ligands developed to separate KOR-mediated analgesia from accompanying dysphoria.
Compared with most of the known KOR G-protein biased agonists, KSC-12-192 and its parent compound ML138 do not exhibit stereoisomerism.
Out of a range of tested compounds with the same substituted triazole scaffold (see table), KSC-12-192 had the highest reported in vitro potency as a human KOR agonist (EC50 = 31nM).
See also
Ketazocine
RB-64
ICI-199,441
Spiradoline
References
Synthetic opioids
Kappa-opioid receptor agonists
Kappa-opioid receptor antagonists
Biased ligands
Triazoles
Pyridines
2-Furyl compounds
Trifluoromethyl compounds
Thioethers | KSC-12-192 | [
"Chemistry"
] | 245 | [
"Biased ligands",
"Signal transduction"
] |
73,337,621 | https://en.wikipedia.org/wiki/Lanthanum%20acetate | Lanthanum acetate is an inorganic compound, a salt of lanthanum with acetic acid with the chemical formula . According to X-ray crystallography, anhydrous lanthanum acetate is a coordination polymer. Each La(III) center is nine-coordinate, with two bidentate acetate ligands and the remaining sites occupied by oxygens provided by bridging acetate ligands. The praseodymium and holmium compounds are isostructural.
Synthesis
Lanthanum acetate can be formed by the reaction of lanthanum(III) oxide and acetic anhydride:
It is also made in a reaction of lanthanum oxide with 50% acetic acid:
Physical properties
Lanthanum(III) acetate forms colorless crystals.
Lanthanum acetate dissolves in water.
Lanthanum acetate forms hydrates of the composition , where n = 1 and 1.5.
Lanthanum acetate and its hydrates decompose when heated.
Uses
Lanthanum acetate is used in specialty glass manufacturing and in water treatment.
Also, it is used to produce porous lanthanum oxyfluoride (LaOF) films.
It is also used as a component in the production of ceramic products and as a catalyst in the pharmaceutical industry.
References
Inorganic compounds
Acetates
Lanthanum compounds | Lanthanum acetate | [
"Chemistry"
] | 285 | [
"Inorganic compounds"
] |
73,337,669 | https://en.wikipedia.org/wiki/LZ%20Color%2064 | The Color 64 was an 8-bit home computer produced in Brazil by the Rio de Janeiro company Novo Tempo / LZ Equipamentos between 1983 and 1986. It was one of the many machines based on the TRS-80 Color Computer introduced during the Brazilian "Market Reserve", like the Codimex CD-6809 or Prológica CP 400 COLOR.
History
Launched in mid-1983, the Color 64 was the second Brazilian TRS-80 Color Computer clone. The production line was installed in the old premises of Cervejaria Skol in Rio de Janeiro.
Due to its graphic and sound capabilities, Novo Tempo/LZ developed the "Computational Resources Switch" ("Comutador de Recursos Computacionais"), a piece of hardware designed for the educational market, allowing the creation of a small computer network. With it, a teacher could control ten other Color 64s, sharing programs and a printer.
Despite being one of the first TRS-80 Color clones in Brazil, its success was limited to the Rio de Janeiro state, due to limited marketing in the rest of the country. According to Folha de S. Paulo, the Color 64 had a retail price of 1.2 million Cr$ in July 1984.
To publicize TRS-80 Color Computers in Brazil and increase Color 64 sales, Novo Tempo/LZ encouraged the creation of user clubs in Rio de Janeiro. The largest one was "Clube Color", operating on the premises of the Micromaq software house.
Production of the Color 64 was discontinued in 1986, with the arrival of MSX machines offering better color and sound capabilities.
Technical features
The basic features of the LZ Color 64 are similar those of the TRS-80 Color Computer.
CPU: Motorola 6809E, 890 kHz to 1.8 MHz
Memory:
ROM: 16 KB (containing Color BASIC and Extended Color BASIC)
RAM: 64 KB
Keyboard:
Built-in, 53-keys
Display: Motorola 6847, 9 colors
Text mode (with 32 x 16 characters)
Low resolution graphics (with 64 x 32 pixels)
Medium and high resolution graphics (up to 256 x 192 pixels, 2 colors per pixel)
Expansion port (cartridges, disk interfaces, etc.)
Other ports:
Composite video monitor (PAL-M color TV using an external modulator)
RS-232C serial port
Analogue or digital joysticks
Cassette recorder (1500 baud, with remote engine control)
See also
Motorola 6809
CP 400 COLOR
Codimex CD-6809
TRS-80 Color Computer
References
Computer-related introductions in 1983
Goods manufactured in Brazil
Personal computers
TRS-80 Color Computer | LZ Color 64 | [
"Technology"
] | 543 | [
"Computing stubs",
"Computer hardware stubs"
] |
73,341,295 | https://en.wikipedia.org/wiki/Mathuranatha%20Sarman | Mathurānātha Śarman () was an Indian calendrist and astronomer who lived in Bengal and belonged to the Saurapakṣa tradition of Indian astronomy. He is known from his work the Ravisiddhāntamañjarī or Sūryasiddhāntamañjarī, with planetary longitude tables and the means to compute solar eclipses. The Sanskrit manuscript of the Ravisiddhāntamañjarī was published in the Bibliotheca Indica series, work number 198, by the Royal Asiatic Society of Bengal. He may also have been the author of some other works including the Pañcaṅgaratna and the Praśnaratnāṅkura or Samayāmṛta.
References
External links
Mathurānātha Śarman (1911). Ravisiddhāntamañjarī. Bibliotheca Indica, no. 198, edited by Viśvambhara Jyotisārnava. Calcutta: Asiatic Society.
Indian astronomers
17th-century Indian astronomers
Indian science writers
Chronologists
Bengali astronomers
Bengali writers | Mathuranatha Sarman | [
"Astronomy"
] | 213 | [
"Astronomers",
"Bengali astronomers"
] |
73,341,327 | https://en.wikipedia.org/wiki/Terms%20of%20orientation | Terms of orientation, terms of location, or spatial words are common linguistic descriptors used to indicate the spatial positioning of objects in three-dimensional space, including notions of top, bottom, front, back, left side, and right side as used in everyday language and interactions. Assigning these to objects then allows things to be described in relation to the object, above, below, in front of, behind, beside, and so forth.
Basic concepts
Linguist Eve V. Clark notes that "many objects in the world around us have an inherent orientation that we usually take for granted". One of the first learning tasks that children are presented with is learning the difference between the top and bottom of things, and the front and back of things. Children tend to first learn to understand the concept of things having a top, as demonstrated by the tendency to initially identify the uppermost surface of a set of shelves as the place to add a new object, ignoring lower shelves. The orientation assigned to an object can differ depending on the vantage point and intent of the observer:
For objects having a clearly discernible top and bottom, these aspects are determined by gravity, with the surface of the object tending to be closer to gravitational pull being the bottom, and the surface of the object tending to be farther from gravitational pull being the top. However, these distinction "do not distinguish between intrinsic tops and bottoms and absolute or environmental tops and bottoms", such as when an object has fallen over. For example, "a candle has an intrinsic top and bottom, because its canonical position is upright with certain defining features at each end. Even when a candle has fallen over, we can still talk about its top and bottom". Where an object does not inherently have such characteristics , the assignment of a top, bottom, and the like, is temporary and contingent. "If the reference object doesn't have an intrinsic orientation, or its intrinsic orientation isn't used for establishing the frame of reference, factors of the situational context determine the reference frame".
Terms describing the orientation of objects extend to the positional relationships of those objects relative to other objects, such as above, below, in front of, behind, and beside. The Cambridge Dictionary notes that "we usually use above, but not over, when there is no contact between the things referred to. Over or on top of have a more general meaning, and can be used when one thing touches or covers another". These universal terms are then easily translated to metaphorical concepts, such as being "on top of things", or of happiness being at the "top" of emotional states and sadness being at the "bottom".
Specialized terms in specific fields
Various specialized language is used in specific fields to identify, for example, anatomical terms of location (such as "anterior and posterior", "dorsal and ventral", or "proximal and distal") or geometric terms of location (such as "circumferential", "tangential", "parallel", and "orthogonal"). In everyday life, however, people generally use simpler and more universal terms. Orientational terms are often relative to the viewer, such that a person facing multiple objects from one vantage point may see one object as being on the right side of another, while a person facing those objects from a different vantage point may see the relationship differently. For some uses, where it is necessary to avoid confusion from differences in viewpoint, separate terminology is used to describe the sides of things. For example, proper right and proper left are conceptual terms used to unambiguously convey relative direction when describing an image or other object. The "proper right" hand of a figure is the hand that would be regarded by that figure as its right hand.
In stagecraft, blocking is used to designate portions of the stage in an absolute sense, with stage right, stage left, upstage, and downstage being used to refer to the same direction relative to the stage, irrespective of the position of the viewer. Similarly, port and starboard are nautical terms for watercraft, aircraft and spacecraft, referring respectively to the left and right sides of the vessel, when aboard and facing the bow (front). Port and starboard unambiguously refer to the left and right side of the vessel, not the observer. That is, the port side of the vessel always refers to the same portion of the vessel's structure, and does not depend on which way the observer is facing. The port side is the side to the left of an observer aboard the vessel and , towards the direction the vehicle is heading when underway. The starboard side is thus to the right of such an observer.
Orientation in living things
The existence of anatomical terms of location is a reflection of the tendency of living things, more than naturally occurring nonliving objects, to have an orientation, described by the concept of body relative direction. Aristotle reasoned that concepts of "front" and "back" were only relevant to animals with the ability to perceive these relative positions. An analysis of Aristotle's writings on the subject summed it up as follows:
Notably, Aristotle's assertion that "all animals have a front and a back" is not entirely accurate, with some uncharacteristic sea animals such as jellyfish, sea urchins, and starfish lacking these characteristics. With respect to jellyfish, Aristotle denied that they were animals at all. With respect to the small set of spherical animals, such as sea urchins, it has been noted that "since all radii are alike, a spherical animal can be divided into two similar pieces by a cut in any direction through the center. There is no front or rear, no top or bottom, no right or left sides, no ends—at least no permanent ones". It is further observed that an animal lacking a distinct front and back has "a disadvantage in directed locomotion", meaning that this form is "most typical of free-floating organisms that do not move under their own power".
Illustrations
Objects with no set orientation markers
A ping pong ball, like the orange one pictured below, is a uniform sphere, and is therefore a typical example of an object that has no set top, bottom, front, back, or sides; it only has these characteristics in a contingent and temporary sense relative to the viewer. The ball, seen from above in the picture, could be described as having its "top" facing the viewer and its "bottom" obscured, or could be described as having its "top" and "bottom" as the uppermost and lowermost points visible to the viewer relative to the screen on which the object is being viewed.
Objects with some set orientation markers
In the images, both the cones of the Korean fir and the man-made traffic cone have a clearly discernible top and bottom, but are not clearly differentiated along other dimensions. A person viewing either kind of cone would be likely to provisionally identify the surface of the cone facing them as "the front", and would further identify an object between themselves and the cone as being "in front of" the fir cone. The mountain has a clearly discernible top and bottom, but the assignment of a front and back would be arbitrary.
Objects with fully set orientation markers
In the third image below, a cat and a mouse are sitting on top of a dog, which is lying on its side; all three animals have a clearly discernible top and bottom, and a clearly discernible front, back, and sides. Although the cat and mouse are "on top of the dog", they are not sitting on the part that would be considered the top of the dog. Rather, they are sitting on the side of the dog, which serves as a provisional "top" surface, even though it continues to be understood to be the side of the animal.
See also
Deixis
Direction (geometry)
Orientation (geometry)
Orientability
Position (geometry)#Relative position
Sinistral and dextral
Spatial reference system
Vertical and horizontal
References
Orientation (geometry)
Position | Terms of orientation | [
"Physics",
"Mathematics"
] | 1,642 | [
"Geometric measurement",
"Point (geometry)",
"Physical quantities",
"Position",
"Topology",
"Space",
"Vector physical quantities",
"Geometry",
"Spacetime",
"Wikipedia categories named after physical quantities",
"Orientation (geometry)"
] |
73,341,960 | https://en.wikipedia.org/wiki/HX%20Velorum | HX Velorum, also known as HR 3462 and HD 74455, is a star in the constellation Vela. It is a 5th magnitude star, so it will be faintly visible to the naked eye of an observer far from city lights. It is a variable star, whose brightness varies slightly from magnitude 5.48 to 5.53 over a period of 1.12 days.
In 1981, Robert Shobbrook announced that HR 3462 is a variable star based on observations made in 1976. He correctly classified it as an ellipsoidal variable, but the period he derived, days, was a factor of two too short because his data did not allow him to distinguish between primary and secondary minima in the light curve. It was given the variable star designation HX Velorum in 1980. In 1983, Christoffel Waelkens and Frédy Rufener published the correct period of variability, 1.124 days.
HX Velorum is a triple star, consisting of a pair (components A, magnitude 5.5, and B, magnitude 8.28) separated by 0.5 arc seconds. Component A is itself a close binary pair (components Aa and Ab). The system's brightness variation is caused by the ellipsoidal Aa and Ab components orbiting each other.
HX Velorum is only about 2 arc minutes from the center of IC 2395, so it appears to be within that cluster. However the Gaia DR3 dataset lists the parallax of HX Velorum as , yielding a distance of light years, while the distance to IC 2395 has been estimated to be light years, so HX Velorum might be a foreground object rather than a true cluster member. Mark Blackford et al. concluded HX Velorum is a member of the cluster, but that conclusion was based in part on earlier, significantly different distance estimates for both the star and the cluster.
References
Vela (constellation)
Velorum, HX
074455
042712
3462
Rotating ellipsoidal variables
B-type main-sequence stars | HX Velorum | [
"Astronomy"
] | 438 | [
"Vela (constellation)",
"Constellations"
] |
73,343,026 | https://en.wikipedia.org/wiki/Sexual%20dimorphism%20in%20Carnivorans | Sexual dimorphism is the condition where sexes of the same species exhibit different morphological characteristics, particularly characteristics not directly involved in reproduction. Sexual dimorphism in carnivorans, in which males are larger than females, is common. Sexual selection is frequently cited as the cause of the intraspecific divergence in body proportions and craniomandibular morphology between the sexes within the Carnivora order. It is anticipated that animals with polygynous mating systems and high levels of territoriality and solitary behavior will exhibit the highest levels of sexual size dimorphism. Pinnipeds offer an illustration for this.
Different types
Body size
Sexual size dimorphism is the difference in body size between the sexes within a group of some sort or another. Carnivorans exhibit high levels of sexual size dimorphism with males generally being larger than females.
Canine tooth
Males have larger, longer and more powerful canines than their female counterparts. A study of skull and tooth size in 45 species of Carnivorans showed that sexual dimorphism was most pronounced in the size of the canine tooth. Breeding systems seems to be the most reasonable explanation for the finding. Social species like lions, in which males have a canine teeth 25% larger than females are the most sexual dimorphic of felids.
Skeletal structure
In terms of skeletal structure,
Carnivorans are highly sexually dimorphic. Males have more robust and larger skulls which promotes a stronger biteforce, larger necks to permit more powerful neck muscles that work to prevent torsional loading of the neck and improve the ability to rend with the teeth and jerk the skull. Males also have larger scapulae that enable more muscle to transmit force from the trunk to the forelimbs and stabilize the shoulder joint and stronger limbs with better mechanical advantages due to anatomy.
Mechanisms
A secondary factor that propels the evolution of sexual dimorphism might be provided by niche divergence and resource partitioning. For instance, the evidence for the divergence of the intersexual niche is found in the size and structure of the craniomandibular bones. The ecological difference between the sexes and even a decline in intersexual rivalry for resources and habitat usage is reflected in the skull's phenotypic variation. It is well known that many carnivoran species' males and females use different dietary resources. This is frequently manifested in prey size, with males frequently consuming larger prey than their female counterparts. Moreover, there is a correlation between sexual dimorphism and carnivory in carnivorans, meaning that species that are more carnivorous have larger size differences between males and females. Hence, increased sexual dimorphism in obligate carnivores lessens intraspecific nutritional competition by minimizing conflict between males and females.
Because they have an evolutionary impact on body size in both males and females, or both, sexual selection and natural selection are frequently seen as the main mechanisms behind sexual size dimorphism. It has long been assumed that sexual selection is the main cause of sexual size dimorphism in the majority of endothermic vertebrates (including mammals and birds), where the larger sex directly boosts its reproductive success through intrasexual competition. The evolution of sexual size dimorphism has been theorized to be influenced or maintained by natural selection. It is also possible that sexual selection has influenced the evolution of sexual size dimorphism, as suggested by the hyperallometric patterns found in both mammals and birds.
See also
Sexual dimorphism in non-human primates
Sexual selection
Ecological niche
References
Sexual dimorphism
Carnivora anatomy | Sexual dimorphism in Carnivorans | [
"Physics",
"Biology"
] | 760 | [
"Sex",
"Sexual dimorphism",
"Symmetry",
"Asymmetry"
] |
73,343,696 | https://en.wikipedia.org/wiki/Ilman%20Shazhaev | Ilman Shazhaev (born 13 May 1993, Grozny, the Chechen Republic) is a scientist, IT engineer, and the author of 30 scientific papers and 10 patents.
Early life and education
Ilman Shazhaev was born on the 13th of May in 1993 in Grozny, the Chechen Republic. In 2012, he received a gold medal at the Russian Federal Young Scientists Contest for his innovative project of a new-generation electricity counter. In 2015, Ilman graduated from Moscow State Road & Automobile University with a BS degree in Informatics and Computing.
From 2015 to 2017, he studied Mechanical Engineering in Harbin Institute of Technology, China. From 2017 to present, Ilman is a PHD candidate in Management of Science and Engineering, Shanghai Jiao Tong University, China.
From 2011 to 2012, Ilman worked as an engineer and researcher at Grozny State Oil Technological University. From 2013 to 2014, he served as an assistant to the Head of Grozny State Oil Technological University.
Due to his academic records, in 2014, Ilman was awarded the Russian President Scholarship. In 2015, he got the Chinese Government Scholarship, and in 2017 — Shanghai Government Scholarship. At the same time, Ilman initiated a business incubator program in partnership with the Heilongjiang province government of China and Wanda Group. Under Ilman's coordination, the program helped 10 startups and businesses accelerate and set up their business in the Chinese market.
In 2019, he cofounded Acoustery, a health tech company that developed AI technology for the early recognition of respiratory diseases.
In 2022, Ilman Shazhaev founded a decentralized science metaverse platform connecting scientists, gamers, and investors — MetaDeSci. Also, he created Farcana Gaming Metaverse and Farcana Labs, the scientific and engineering platform specialized in the cryptocurrency industry.
References
Software engineers
1993 births
Living people | Ilman Shazhaev | [
"Engineering"
] | 394 | [
"Software engineering",
"Software engineers"
] |
73,343,753 | https://en.wikipedia.org/wiki/Varix%20VC%2050 | The VC 50 was an 8-bit home computer produced in Brazil by the company Engetécnica (later called Varix) between 1983 and 1985. It was one of the many clone machines based on the TRS-80 Color Computer introduced during the Brazilian "Market Reserve", like the Codimex CD-6809 or Prológica CP 400 COLOR.
History
Launched in 1983, the initial target audience for the VC50 was mainly agricultural companies, sugar mills and distilleries. The machine, originally equipped with an integrated floppy disk drive and numeric keypad, came to be used as a controller for industrial manufacturing processes and for financial and production calculations related to agriculture. Varixx, formerly Engetécnica/Varix, developed specific software packages for these usages (including for example of sucrose content control or freight price list generation). The machine faced competition from established business machines like the CP 500 and the Sistema 700, both from Prológica, as well as Apple II compatibles, having a limited success, with 500 to 1000 units sold.
Despite intending to establish itself as a professional computer, the VC 50 also tried to compete with other Brazilian TRS-80 Color Computer clones, like the CP 400. It was not successful due to the extra cost of the integrated floppy disk drive.
Technical features
The basic features of the VC 50 are similar to the TRS-80 Color Computer.
CPU: Motorola 6809E, 890 kHz to 1.8 MHz
Memory:
ROM: 16 KB (containing Varix Basic)
RAM: 64 KB
Keyboard:
Built-in, 52-keys plus 12-keys keypad
Display: Motorola 6847, 9 colors
Text mode (with 32 x 16 characters)
Low resolution graphics (with 64 x 32 pixels)
Medium and high resolution graphics (up to 256 x 192 pixels, 2 colors per pixel)
Expansion port (cartridges, disk interfaces, etc.)
Built in disk drive: 180K, single sided
Other ports:
Composite video monitor (PAL-M color TV using an external modulator)
RS-232C serial port
Analogue or digital joysticks
Cassette recorder (1500 baud, with remote engine control)
See also
Motorola 6809
CP 400 COLOR
Codimex CD-6809
LZ Color 64
TRS-80 Color Computer
References
Computer-related introductions in 1983
Goods manufactured in Brazil
Personal computers
TRS-80 Color Computer | Varix VC 50 | [
"Technology"
] | 490 | [
"Computing stubs",
"Computer hardware stubs"
] |
73,344,059 | https://en.wikipedia.org/wiki/Lanthanum%20oxysulfide | Lanthanum oxysulfide is an inorganic compound, a salt of lanthanum and hydrogen sulfide acid, with the formula .
Synthesis
Calcination of lanthanum(III) sulfate in oxygen current at 750 °C:
The resulting product is reduced with hydrogen when heated:
Physical properties
The compound forms yellowish-white hexagonal crystals.
Uses
The compound is used as a laser host material.
References
Lanthanum compounds
Sulfides
Sulfur compounds
Oxygen compounds
Inorganic sulfur compounds | Lanthanum oxysulfide | [
"Chemistry"
] | 98 | [
"Inorganic compounds",
"Inorganic sulfur compounds"
] |
47,757,024 | https://en.wikipedia.org/wiki/Synthetic%20genomes | Synthetic genome is a synthetically built genome whose formation involves either genetic modification on pre-existing life forms or artificial gene synthesis to create new DNA or entire lifeforms. The field that studies synthetic genomes is called synthetic genomics.
Recombinant DNA technology
Soon after the discovery of restriction endonucleases and ligases, the field of genetics began using these molecular tools to assemble artificial sequences from smaller fragments of synthetic or naturally occurring DNA. The advantage in using the recombinatory approach as opposed to continual DNA synthesis stems from the inverse relationship that exists between synthetic DNA length and percent purity of that synthetic length. In other words, as you synthesize longer sequences, the number of error-containing clones increases due to the inherent error rates of current technologies. Although recombinant DNA technology is more commonly used in the construction of fusion proteins and plasmids, several techniques with larger capacities have emerged, allowing for the construction of entire genomes.
Polymerase cycling assembly
Polymerase cycling assembly (PCA) uses a series of oligonucleotides (or oligos), approximately 40 to 60 nucleotides long, that altogether constitute both strands of the DNA being synthesized. These oligos are designed such that a single oligo from one strand contains a length of approximately 20 nucleotides at each end that is complementary to sequences of two different oligos on the opposite strand, thereby creating regions of overlap. The entire set is processed through cycles of: (a) hybridization at 60 °C; (b) elongation via Taq polymerase and a standard ligase; and (c) denaturation at 95 °C, forming progressively longer contiguous strands and ultimately resulting in the final genome. PCA was used to generate the first synthetic genome in history, that of the Phi X 174 virus.
Gibson assembly method
The gibson assembly method, designed by Daniel Gibson during his time at the J. Craig Venter Institute, requires a set of double-stranded DNA cassettes that constitute the entire genome being synthesized. Note that cassettes differ from contigs by definition, in that these sequences contain regions of homology to other cassettes for the purposes of recombination. In contrast to Polymerase Cycling Assembly, Gibson Assembly is a single-step, isothermal reaction with larger sequence-length capacity; ergo, it is used in place of Polymerase Cycling Assembly for genomes larger than 6 kb.
A T5 exonuclease performs a chew-back reaction at the terminal segments, working in the 5' to 3' direction, thereby producing complementary overhangs. The overhangs hybridize to each other, a Phusion DNA polymerase fills in any missing nucleotides and the nicks are sealed with a ligase. However, the genomes capable of being synthesized using this method alone is limited because as DNA cassettes increase in length, they require propagation in vitro in order to continue hybridizing; accordingly, Gibson assembly is often used in conjunction with Transformation-Associated Recombination (see below) to synthesize genomes several hundred kilobases in size.
Transformation-associated recombination
The goal of transformation-associated recombination (TAR) technology in synthetic genomics is to combine DNA contigs by means of homologous recombination performed by the Yeast Artificial Chromosome (YAC). Of importance is the CEN element within the YAC vector, which corresponds to the yeast centromere. This sequence gives the vector the ability to behave in a chromosomal manner, thereby allowing it to perform homologous recombination.
First, gap repair cloning is performed to generate regions of homology flanking the DNA contigs. Gap Repair Cloning is a particular form of the Polymerase Chain Reaction in which specialized primers with extensions beyond the sequence of the DNA target are utilized. Then, the DNA cassettes are exposed to the YAC vector, which drives the process of homologous recombination, thereby connecting the DNA cassettes. Polymerase Cycling Assembly and TAR technology were used together to construct the 600 kb Mycoplasma genitalium genome in 2008, the first synthetic organism ever created. Similar steps were taken in synthesizing the larger Mycoplasma mycoides genome a few years later.
General creation of synthetic genomes
It is difficult to directly synthesize oligonucleotides larger than ~200 base pairs and maintain high fidelity. Therefore, smaller oligonucleotides (around 5-20 base pairs) are combined to create genome-size oligonucleotides. Previous methods of stitching the smaller strands involved using T4 polynucleotide ligase. Modern techniques, like PCA/PCR based-methods have improved on this method, increasing speed and fidelity. To further increase fidelity, PCA-based methods can include an error-reversal step in which nucleases recognize and cut mismatched base pairs. Recognition is possible because errors usually cause structural budges and abnormalities in the DNA. Currently, a 4-Mb E. coli genome created in May 2019 holds the record for the largest synthetic genome size.
See also
Synthetic genomics
References
Genetic engineering
Genome editing
Synthetic biology | Synthetic genomes | [
"Chemistry",
"Engineering",
"Biology"
] | 1,078 | [
"Synthetic biology",
"Genetics techniques",
"Biological engineering",
"Genome editing",
"Genetic engineering",
"Bioinformatics",
"Molecular genetics",
"Molecular biology"
] |
47,757,366 | https://en.wikipedia.org/wiki/Penicillium%20subericola | Penicillium subericola is a fast growing species of fungus in the genus Penicillium which was isolated from raw cork.
References
Further reading
subericola
Fungi described in 2010
Fungus species | Penicillium subericola | [
"Biology"
] | 42 | [
"Fungi",
"Fungus species"
] |
47,757,443 | https://en.wikipedia.org/wiki/Ti-10V-2Fe-3Al | Ti-10V-2Fe-3Al (UNS designation R56410), also known as Ti 10-2-3, is a non-ferrous near-beta titanium alloy featuring an excellent combination of strength, ductility, fracture toughness and high cycle fatigue strength. It is typically used in the aerospace industry for critical aircraft structures, such as landing gear.
Ti-10V-2Fe-3Al Chemistry
Ti-10V-2Fe-3Al Markets
Automobile
Ti-10V-2Fe-3Al Applications
Airframe components
Landing gear components
Ti-10V-2Fe-3Al Specifications
AMS: 4983, 4984, 4986, 4987
UNS: R56410
References
Titanium alloys | Ti-10V-2Fe-3Al | [
"Chemistry"
] | 159 | [
"Titanium alloys",
"Alloys"
] |
47,757,905 | https://en.wikipedia.org/wiki/Nektarios%20Tavernarakis | Nektarios N. Tavernarakis (Greek: Νεκτάριος Ν. Ταβερναράκης) is a Greek bioscientist, who studies Ageing, Cell death, and Neurodegeneration. He is currently Distinguished Professor of Molecular Systems Biology at the Medical School of the University of Crete, and the chairman of the board of directors at the Foundation for Research and Technology, in Heraklion, Crete, Greece. He is also the founder and first director of the Graduate Program in Bioinformatics of the University of Crete Medical School, and has served as director of the Institute of Molecular Biology and Biotechnology, where he is heading the Neurogenetics and Ageing laboratory. He was elected vice president of the European Research Council (ERC) in 2020, and chairman of the European Institute of Innovation and Technology (EIT) governing board and executive committee in 2022.
Early years
Nektarios Tavernarakis was born and grew up in Megali Vrisi, a small village in the municipality of Gortyna, about 30 Km to the south of Heraklion, and graduated with honours from the 1st High School of Heraklion (Kapetanakeio).
Biographical information
Nektarios Tavernarakis completed his undergraduate studies at the Department of Biology of the Aristotle University, in Thessaloniki, Greece (graduated with honours in 1989), and obtained his PhD degree from the Department of Biology of the University of Crete, in Heraklion, Greece, having received the best PhD Thesis Award. He trained as a postdoctoral researcher at the Department of Molecular Biology & Biochemistry of Rutgers University in New Jersey, USA. He has made notable contributions relevant to cell death, neurodegeneration and ageing, documented in the scientific literature.
In 2020, Nektarios Tavernarakis was elected vice president of the European Research Council (ERC), and in 2022, he became chairman of the European Institute of Innovation and Technology (EIT) Governing Board, He is a member of the European Molecular Biology Organization (EMBO), the European Academy of Sciences (EurASc), Academia Europaea, the German National Academy of Sciences-Leopoldina and the European Academy of Sciences and Arts (EASA). He is also a corresponding member of the Academy of Athens, and a Fellow of the American Association for the Advancement of Science (AAAS).
His work has received several prominent awards and scientific prizes, including two European Research Council (ERC) Advanced Investigator grant awards (in 2008 and 2016), a European Research Council (ERC) Proof of Concept grant award, the EMBO Young Investigator award, the International Human Frontier Science Program (HFSP) long-term postdoctoral fellowship, the BioMedical Research Award of the Academy of Athens, the Valergakis Post-Graduate Award of the Hellenic University Club of New York, the Galien Scientific Research Award, the Helmholtz International Fellow Award, the Alexander von Humboldt Foundation, Friedrich Wilhelm Bessel research award, the Research Excellence award of the Foundation for Research and Technology, and the Empeirikeion Foundation Academic Excellence Prize, among others. He is also the recipient of the Excellence Award, and the Scientific Prize for Medicine and Biology, of the Bodossaki Foundation, which are two of the most competitive scientific distinctions for Greeks, in Greece and abroad. He is the only Greek scientist to have been awarded both these prestigious prizes.
Research and scientific achievements
Nektarios Tavernarakis has contributed to the elucidation of the molecular mechanisms of necrotic cell death and neurodegeneration, the interplay between cellular metabolism and ageing, the mechanisms of sensory transduction and integration by the nervous system. He has also contributed towards the development of novel genetic tools for biomedical research, including an RNA interference (RNAi) method that allows efficient knockdown of neuronal genes. His PhD Thesis research focused on the expression and function of key stress response transcriptional activators in the yeast Saccharomyces cerevisiae, and provided original insights on the regulation of these activators by nutrient limitation, and the role of DNA in determining interactions between transcription factors and co-factors. His laboratory at IMBB was the first to commence Caenorhabditis elegans research in Greece. He has published more than 250 papers in peer-reviewed scientific journals, such as Nature. His work has received more than 55,000 citations. Among the notable discoveries of his team are the sophisticated molecular mechanisms, by which diverse physiological signals are integrated to modulate cellular mitochondrial content, protein synthesis, and energy homeostasis during ageing. These studies revealed intricate signaling pathways that coordinate mitophagy and mitochondrial biogenesis, to determine the number of mitochondria in cells, under stress and during ageing. Work from his lab implicated autophagy, lysosomal function, endocytosis, intracellular calcium homeostasis and specific proteolytic enzymes as major contributors to necrosis and neurodegeneration. His group developed, for the first time, experimental heat stroke models; and identified mechanisms protecting against heat cytotoxicity and other necrotic insults. He has isolated and characterized specific ion channels, involved in proprioception and coordinated locomotion, in dopaminergic signalling and associative learning. His team was the first to delineate the role of autophagy in the regulation of synaptic plasticity and behaviour under nutrient deprivation and stress. Work in his laboratory also led to the identification of specific nuclear autophagy mediators and the characterization of their role in ageing and germline immortality.
Personal life
Nektarios Tavernarakis is married and the father of two daughters. He is a licensed radio amateur, active mainly in the VHF, UHF and SHF radio bands. His callsign is SV9IOR.
Selected awards and distinctions
Bodossaki Foundation, Excellence Award (2024)
Member of the European Academy of Sciences (EurASc), (2023)
Fellow of the Royal Society of Biology (FRSB), London, UK (2023)
Chairman of the European Institute of Innovation and Technology (EIT) Governing Board and Executive Committee (2022)
Fellow of the American Association for the Advancement of Science (AAAS) (2020)
Elected Vice President, Scientific Council of the European Research Council (ERC) (2020)
Member of the European Institute of Innovation and Technology (EIT) Governing Board and Executive Committee (2020)
Member of the German National Academy of Sciences-Leopoldina (2019)
Corresponding Member of the Academy of Athens (2019)
Member of the European Academy of Sciences and Arts (2018)
Helmholtz International Fellow Award (2017)
Galien Scientific Research Award (2017)
Honorary Education Business Award (2017)
Member of the Scientific Council of the European Research Council (ERC) (2016)
European Research Council (ERC), Advanced Investigator Grant award (2016)
Research Support Award, Fondation Santé (2015)
BioMedical Research Excellence Award, Academy of Athens, (2014)
Member of Academia Europaea (2014)
Empeirikeion Foundation, Academic Excellence Prize (2012)
Excellence Professor, Medical School, University of Crete (2010)
Member of the European Molecular Biology Organization (EMBO) (2009)
European Research Council (ERC), Advanced Investigator Grant award (2008)
Foundation for Research and Technology, Research Excellence award (2007)
Alexander von Humboldt, Friedrich Wilhelm Bessel Research award (2007)
Member of the Faculty of 1000 in Biology/Medicine, section on Cellular Death & Stress Responses (2006)
Bodossaki Foundation, Academic Prize in Medicine and Biology (2005)<ref
European Molecular Biology Organization (EMBO) Young Investigator (2002–2005)
International Human Frontier Science Program Organization (HFSPO) fellow (1996–2000)
State of New Jersey, Commission on Cancer Research fellow (1996)
Hellenic University Club of New York, Frederick Valergakis, Academic achievement award (1996)
Selected publications
References
External links
Google Scholar, Nektarios Tavernarakis
Tavernarakis Lab
Institute of Molecular Biology and Biotechnology
Foundation for Research and Technology - Hellas
Medical School, University of Crete
Graduate Program in Bioinformatics
University of Crete
Biogerontologists
Cell biologists
Greek geneticists
Greek medical researchers
Greek neuroscientists
Living people
Molecular biologists
Greek physiologists
Systems biologists
Academic staff of the University of Crete
University of Crete alumni
Aristotle University of Thessaloniki alumni
1967 births
Scientists from Heraklion
Members of the Academy of Athens (modern)
Members of Academia Europaea | Nektarios Tavernarakis | [
"Chemistry"
] | 1,767 | [
"Biochemists",
"Molecular biology",
"Molecular biologists"
] |
47,758,127 | https://en.wikipedia.org/wiki/Penicillium%20sublateritium | Penicillium sublateritium is an anamorph species of fungus in the genus Penicillium.
References
Further reading
sublateritium
Fungi described in 1923
Fungus species | Penicillium sublateritium | [
"Biology"
] | 40 | [
"Fungi",
"Fungus species"
] |
47,758,776 | https://en.wikipedia.org/wiki/Penicillium%20sublectaticum | Penicillium sublectaticum is a species of fungus in the genus Penicillium which was isolated from house dust in Dunedin in New Zealand.
References
sublectaticum
Fungi described in 2014
Fungus species | Penicillium sublectaticum | [
"Biology"
] | 47 | [
"Fungi",
"Fungus species"
] |
47,759,150 | https://en.wikipedia.org/wiki/Leonardo%27s%20world%20map | Leonardo's world map is the name assigned to a unique world map drawn using the "octant projection" and found loosely inserted among a Codex of Leonardo da Vinci preserved in Windsor. It features an early use of the toponym America and incorporates information from the travels of Amerigo Vespucci, published in 1503 and 1505. Additionally, the map depicts the Arctic as an ocean and Antarctica as a continent of about the correct size.
The conjecture that the map was drawn by Leonardo himself is not universally accepted by scholars. Richard Henry Major, who first published the map in 1865 and defended its authenticity, dated it around 1514 because Florida is drawn as an island with the name of TERRA FLORIDA.
Description
Da Vinci developed the concept of dividing the surface of the globe into eight spherical equilateral triangles based on his botanical drawings. Each section of the globe is bounded by the Equator and two meridians separate by 90°. This was the first map of this type. Some critics believe that the existing map was not really an autograph work, since the precision and expertise in the drawing does not reflect the usual high standards of da Vinci. They suggest that it was probably done by a trusted employee or copyist at Leonardo's workshop. Da Vinci's authorship would be demonstrated by Christopher Tyler in his paper entitled "Leonardo da Vinci’s World Map", in which he provides examples of derivative maps in a similar projection to da Vinci's. The map was originally documented by R. H. Major in his work Memoir on a mappemonde by Leonardo da Vinci, the earliest map Being Known hitherto container containing the name of America
The eight triangles are configured as two four-leaf clovers side by side, with the earth poles in the center of each clove. One of the sides of the eight triangles (the one opposite the center of the pseudo clover), forms one fourth of the equator, the remaining two (those that converge to the center of the pseudo clover) forming the two meridians that, combined with the equator, dissect the globe into eight octants.
The name of "Florida" (Terra Florida), correctly placed opposite Cuba although in the form of "an island", is used after the discovery of Florida in 1513 and the return of Ponce de Leon's expedition.
Authorship
Leonardo's map authorship it is not universally accepted, with some authors being completely against any minimal contribution from him, either in the map or in the type of projection used; among them, Henry Harrisse (1892), or Eugène Müntz (1899 - citing Harrisse authority from 1892).
Since the discovery of the Ostrich Egg Globe, Stefaan Missinne has written a book in which he argues that the authorship of the design of the map is Leonardo's. In contrast the cartographic content is by a third hand. The manuscript world map intended to be glued has been attributed to Melzi, because of the type of lettering used and because of his proximity to Leonardo during his stay in France. Missinne finds it difficult to substantiate this attribution. He argues that on the map, the capital letters and small letters are used in combination, which is contradictory to Leonardo's customary practice. In addition, an unhatched mountain range in South America, is depicted showing only one not particularly “attractive” river. Missinne argues that the precise level of detail, for which Leonardo was known, is lacking. In contrast, the maker drew many toponyms on the coastal ranges, which shows that he must have used a portolan map as a template. The oceans do bear names and the spelling has only a few “mistakes,” i.e. variants such as “Brazill” ending with a double “l.” The letter “z” on C (abo) B (ona) speranza differs considerably from Leonardo’s types of “z.” which is also the case for the “b” in “Abatia”. Missinne's findings, however, are disputed.
Several scholars explicitly accept the authorship of both map and projection completely as Leonardo's work, describing the octant projection as the first of this type, among them, R. H. Major (1865) in his work Memoir on a mappemonde by Leonardo da Vinci, being the earliest map hitherto known containing the name of America, the "Enciclopedia universal ilustrada europeo-americana" (1934), Snyder in his book Flattening the Earth (1993), Christopher Tyler in his paper (2014) Leonardo da Vinci’s World Map, José Luis Espejo in his book (2012) Los mensajes ocultos de Leonardo Da Vinci, or David Bower in his work (2012) The unusual projection for one of John Dee's maps of 1580.
Others also accept explicitly the authorship of both the map and its projection as authentic, although leaving open the question of Leonardo's direct hand, giving the authorship of the work to one of his disciples as Nordenskiöld states in his book Facsimile-Atlas (1889) confirmed by Dutton (1995) and many others: "..on account of the remarkable projection not by Leonardo himself, but by some ignorant clerk.", or Keunig (1955) being more precise: "..by one of his followers at his direction.."
Mathematical reconstruction
The subject of mathematical analysis of Leonardo's octant globe has been considered very briefly in scientific publications. There are also few images of reconstruction of this globe.
See also
List of works by Leonardo da Vinci
Bernard J. S. Cahill
Codex Atlanticus
Cahill–Keyes projection
Waterman butterfly projection
Waterman polyhedron
References
External links
Proyecciones-cartograficas
Map projections
Works attributed to Leonardo da Vinci | Leonardo's world map | [
"Mathematics"
] | 1,206 | [
"Map projections",
"Coordinate systems"
] |
47,759,984 | https://en.wikipedia.org/wiki/Combinatorics%2C%20Probability%20and%20Computing | Combinatorics, Probability and Computing is a peer-reviewed scientific journal in mathematics published by Cambridge University Press. Its editor-in-chief is Béla Bollobás (DPMMS and University of Memphis).
History
The journal was established by Bollobás in 1992. Fields Medalist Timothy Gowers calls it "a personal favourite" among combinatorics journals and writes that it "maintains a high standard".
Content
The journal covers combinatorics, probability theory, and theoretical computer science. Currently, it publishes six issues annually. As with other journals from the same publisher, it follows a hybrid green/gold open access policy, in which authors may either place copies of their papers in an institutional repository after a six-month embargo period, or pay an open access charge to make their papers free to read on the journal's website.
Abstracting and indexing
The journal is abstracted and indexed in:
According to the Journal Citation Reports, the journal has a 2014 impact factor of 0.623. Since 2007, it has been ranked by SCImago Journal Rank as a first-quartile journal in four areas: applied mathematics, computational theory, statistics and probability, and theoretical computer science.
References
External links
Combinatorics journals
Probability journals
Theoretical computer science journals
Cambridge University Press academic journals
Academic journals established in 1992
Bimonthly journals | Combinatorics, Probability and Computing | [
"Mathematics"
] | 275 | [
"Combinatorics journals",
"Combinatorics"
] |
47,760,651 | https://en.wikipedia.org/wiki/ISqFt | iSqFt is a Software as a service (SaaS) company that serves general contractors, subcontractors, manufacturers, and suppliers in the North American commercial construction industry.
The company, founded as Construction Software Technologies in 1993, is headquartered in Greater Cincinnati. Dave Conway is the president and CEO.
Products
iSqFt’s software products are used primarily during the design, pre-construction, and procurement stages of construction, and are designed to help users identify project leads and product sales opportunities, network with other construction professionals, manage the bid solicitation process, and view and share digital drawings and specifications.
Mergers and acquisitions
From 2004 through 2009, iSqFt acquired a number of smaller or regional competitors, including:
BuildPoint (Redwood Shores, Calif.), a provider of online bid management services for general contractors
US Projects (Omaha, Neb.), a regional provider of online planning-phase project leads
BidFax (Memphis, Tenn.), a bid management client software application
BidNews Construction Reports (Tulsa, Okla.), a regional provider of bidding-phase project information
Plan Express (Memphis, Tenn.), a web-based document-sharing network
In 2006, iSqFt merged with Denver-based competitor Northstar Exchange Corp. (also known as Construction Information Network or Construction News Service).
In 2016, iSqFt became a part of ConstructConnect as a result of a merger with BidClerk, Construction Data and Construction Market Data.
Awards and recognition
In 2004, iSqFt was named one of Inc. magazine's 500 fastest-growing private companies in the country, ranking 50th on the list and first overall in the construction industry. The company appeared on the list again in 2005, after posting a three-year growth of 763%.
In 2009 and 2011, iSqFt was included on the Cincinnati Business Courier’s list of the fastest-growing companies in Greater Cincinnati.
In July 2015, iSqFt was named to the Constructech 50, a list of “the most influential construction technology providers with a strong and ongoing market presence.” Previously, iSqFt’s software application for subcontractors won a 2011 Constructech Magazine Top Products award.
References
Companies based in Cincinnati
Companies established in 1993
Construction software | ISqFt | [
"Engineering"
] | 467 | [
"Construction",
"Construction software"
] |
47,760,832 | https://en.wikipedia.org/wiki/Petroleum%20benzine | Petroleum benzine is a hydrocarbon-based solvent mixture that is classified by its physical properties (e.g. boiling point, vapor pressure) rather than a specific chemical composition. This complicates distinction within the long list of petroleum distillate solvent mixtures: mineral spirits, naphtha, petroleum naptha, white gas, white spirits, turps substitute, mineral turpentine, petroleum ether, ligroin, and Stoddard solvent.
The chemical composition of a petroleum distillate can also be modified to afford a solvent with reduced concentration of unsaturated hydrocarbons, i.e. alkenes, by hydrotreating and/or reduced aromatics, e.g. benzene, toluene, xylene, by several dearomatization methods. In a document that attempts to draw more concise distinctions between hydrocarbon solvents, conservator Alan Phenix explains that the most important distinction amongst the various hydrocarbon solvents is their boiling/distillation ranges (and, by association, volatility, flash point, etc.) and aromatic content.
Given the toxicity/carcinogenicity of some aromatic hydrocarbons, most notably benzene, the aromatic content of petroleum distillate solvents, which would typically be in the 10-25% (w/w) range for most petroleum fractions, can be advantageously reduced when their unique solvation properties are not required, and a less odorous, lower toxicity solvent is desired, especially when present in consumer products.
Phenix further points out, "To all intents and purposes, petroleum benzine appears synonymous with petroleum spirit." Petroleum spirit is generally considered to be the fractions between the very lightest hydrocarbons, petroleum ether, and the heavier distillates, mineral spirits. For example, petroleum benzine with a boiling range of 36 - 83 °C sold by EMD Millipore under CAS-No. 64742-49-0 is identified in the product MSDS as hydrotreated light petroleum distillates comprising ≥ 90% C5-C7 hydrocarbons, n-alkanes, isoalkanes, and < 5% n-hexane, while Santa Cruz Biotechnology sells a petroleum ether product under the same CAS-No.
Fisher Scientific offers a product 'Benzine (Petroleum Naphtha)' that retails for a high price that would suggest it is a specialty product but conforms to Marathon Petroleum's 'VM&P Naphtha' (Varnish Makers & Painters’ Naphtha) found widely distributed in many hardware stores in North America.
According to their corresponding MSDS, most commercially offered petroleum benzine solvents consist of paraffins (alkanes) with chain lengths of C5 to C9 (i.e. n-pentane to n-nonane and their isomers), cycloparaffins (cyclopentane, cyclohexane, ethylcyclopentane, etc.) and aromatic hydrocarbons (benzene, toluene, xylene, etc.).
The TSCA Definition 2008 describes petroleum benzine as "a complex combination of hydrocarbons obtained by treating a petroleum fraction with hydrogen in the presence of a catalyst. It consists of hydrocarbons having carbon numbers predominantly in the range of C4 through C11 and boiling in the range of approximately -20°C to 190°C."
Health concerns
Beginning in the 1960s and 70s, the high incidence rate of polyneuropathy amongst industrial workers chronically exposed to petroleum benzine and other hydrocarbon solvents prompted investigations into the safety of chronic exposure to petroleum distillates.
Many of the cases of polyneuropathy amongst workers chronically exposed to vapors of petroleum benzine and similar solvents have been attributed to the n-hexane component of these mixtures.
Using an animal model (Wistar-strain male rats), Ono and coworkers reported that chronic exposure (12 h a day for 24 weeks) to hydrocarbon solvent vapors conspicuously impaired peripheral nerve function in the 500 ppm n-hexane group, slightly impaired in the 200 ppm n-hexane group and petroleum benzine II group (containing 500 ppm n-hexane), and barely impaired in the petroleum benzine I group (containing 200 ppm n-hexane).
These results suggest that some components in petroleum benzine are likely to antagonize the neurotoxic effects of n-hexane to the peripheral nerves, possibly by inhibiting the oxidation of n-hexane to its more toxic metabolites 2-hexanone and 2,5-hexanedione.
Ono and coworkers also observed depressed body weight gains amongst the exposed groups compared to the control group in the order: petroleum benzine II > petroleum benzine I (containing 200 ppm n-hexane) >> 500 ppm n-hexane > 200 ppm n-hexane. These results suggest that other components found in petroleum benzine may have additive, synergistic or potentiative effects on the biological effects of n-hexane. Namely, 1000 ppm n-hexane, 3000 ppm n-heptane, and 1000 ppm toluene were reported to have depressing effects on the body weight gain of rats.
References
Hydrocarbon solvents
Petroleum products | Petroleum benzine | [
"Chemistry"
] | 1,146 | [
"Petroleum",
"Petroleum products"
] |
47,761,177 | https://en.wikipedia.org/wiki/Dataveillance | Dataveillance is the practice of monitoring and collecting online data as well as metadata. The word is a portmanteau of data and surveillance. Dataveillance is concerned with the continuous monitoring of users' communications and actions across various platforms. For instance, dataveillance refers to the monitoring of data resulting from credit card transactions, GPS coordinates, emails, social networks, etc. Using digital media often leaves traces of data and creates a digital footprint of our activity. Unlike sousveillance, this type of surveillance is not often known and happens discreetly. Dataveillance may involve the surveillance of groups of individuals. There exist three types of dataveillance: personal dataveillance, mass dataveillance, and facilitative mechanisms.
Unlike computer and network surveillance, which collects data from computer networks and hard drives, dataveillance monitors and collects data (and metadata) through social networks and various other online platforms. Dataveillance is not to be confused with electronic surveillance. Electronic surveillance refers to the surveillance of oral and audio systems such as wire tapping. Additionally, electronic surveillance depends on having suspects already presumed before surveillance can occur. On the other hand, dataveillance can use data to identify an individual or a group. Oftentimes, these individuals and groups have sparked some form of suspicion with their activity.
Dataveillance has significant impacts on advertising theory and practice. These impacts particularly stem from recent infrastructure and technological advancements that increase the extent to which advertisers can gain data information about consumers and their behaviours. For example, collecting data can be extended into collecting consumers’ offline behaviors and to places that are considered private.
Types
The types of dataveillance are separated by the way data is collected, as well as the number of individuals associated with it.
Personal Dataveillance: Personal dataveillance refers to the collection and monitoring of a person's personal data. Personal dataveillance can occur when an individual's data causes a suspicion or has attracted attention in some way. Personal data can include information such as birth date, address, social security (or social insurance) number, as well as other unique identifiers.
Mass Dataveillance: Refers to the collection of data on groups of people. The general distinction between mass dataveillance and personal dataveillance is the surveillance and collection of data as a group rather than an individual.
Facilitative Mechanisms: Unlike mass dataveillance a group is not targeted. An individual's data is placed into a system or database along with various others where computer matching can unveil distinct patterns. An individual's data is never considered to part of a group in this instance.
Benefits and concerns
Pros
There are many concerns and benefits associated with dataveillance. Dataveillance can be useful for collecting and verifying data in ways that are beneficial. For instance, personal dataveillance can be utilized by financial institutions to track fraudulent purchases on credit card accounts. This has the potential to prevent and regulate fraudulent financial claims and resolve the issue.
Compared to traditional methods of surveillance, dataveillance tends to be an economical approach, since it can monitor more information in a less time. In this case, the responsibility of monitoring is transferred to computers, therefore reducing time and human labor in the process of surveilling.
Dataveillance has also been useful in assessing security threats associated with terrorism. Authorities have utilized dataveillance to help them understand and predict potential terrorist or criminal threats. Dataveillance is very important to the concept of predictive policing. Since predictive policing requires a great deal of data to operate effectively and dataveillance can do just that. Predictive policing allows police to intervene in potential crimes to create safer communities and better understand potential threats.
Businesses also rely on dataveillance to help them understand the online activity for potential clients by tracking their online activity. By tracking their online activity through cookies, as well as various other methods, businesses are able to better understand what sort of advertisements work with their existing and potential clients. While making online transactions users often give away their information freely which is later used by the company for corporate or private interests. For businesses this information can help boost sales and attract attention towards their products to help generate revenue.
Cons
On the other hand, there are many concerns that arise with dataveillance. Dataveillance assumes that our technologies and data are a true reflection of ourselves. This presents itself as a potential concern. This becomes a critical concern when associated with the surveillance of criminal suspects and terrorist groups. Authorities who monitor these suspects would then assume that the data they have collected reflects their actions. This helps to understand potential or past threats for criminals as well.
There is also the lack of transparency and privacy regarding companies who collect and share their user's data. This is a critical issue with both the trust and belief of the data and its uses. Many social networks have argued that their users forfeit part of their privacy in order to provide their service for free. Several of these companies choose not to fully disclose what data is collected and who it is shared with. When data is volunteered to companies it is difficult to know what companies have gained data about you and your online activity. Much of an individual's data is shared with websites and social networks in order to provide a more customized marketing experience. Many of those social networks may share your information with intelligence agencies and authorities, without a user's knowledge. Since the recent scandal involving Edward Snowden and National Security Agency, it has been revealed that authorities may have access to more data from various devices and platforms. It has become very difficult to know what will happen with your data or what specifically has been collected. It is also important to recognize that while online users are worried about their information, many of those same worries are not always applied to their activities or behavior. With social networks collecting a large amount of personal data such as birth date, legal name, sex, and photos there is an issue of dataveillance compromising confidentiality. Ultimately, dataveillance can compromise online anonymity.
Despite dataveillance compromising anonymity, anonymity itself presents a crucial issue. Online criminals who steal users' data and information may exploit it for their own gain. Tactics used by online users to conceal their identity, make it difficult for others to track the criminal behavior and identify those responsible. Having unique identifiers such as IP addresses allows for the identification of users actions, which are often used to track illegal online activity such as piracy.
While dataveillance may help businesses market their products to existing and potential clients, there are concerns over how and who has access to customer data. When visiting a business's website, cookies are often installed onto users' devices. Cookies have been a new way for businesses to obtain data on potential customers, since it allows them to track their online activities. Companies may also look to sell information they have collected on their clients to third parties. Since clients are not notified about these transactions it becomes difficult to know where your data has been sold. Furthermore, since dataveillance is discrete, clients are very unlikely to know the exact nature of the data that has been either collected or sold. Education on tracking tools (such as cookies) presents a critical issue. If businesses or online services are unwilling to define cookies, or educate their users as to why they are being used, many may unwillingly accept them.
The issue stemming from companies and other agencies which collect personal data and information is that they have now engaged in the practices of data brokering. Data brokers, such as Acxiom, collect users' information, and are known for often selling that information to third parties. While companies may disclose that they are collecting data or online activity from their users, it is usually not comprehensible by everyday users. It is difficult for everyday people to spot this disclosure, since it is hidden by jargon and writing most often understood by lawyers. This is now becoming a new source of revenue for companies.
In terms of predictive policing, the proper use of crime data and the combination of offline practices and technology have also become the challenges for police institutions. Too much reliance on results brought up by big data may lead to the subjective judgement of police. It also may reduce the amount of real-time on site communication between local police officers and residents in particular areas, thus decreasing the opportunity for the police to investigate and cruise in local communities at a frequent basis. Secondly, data security still remains to be a huge dilemma, considering the access to crime data and the potential use of these data for negative purposes. Last but not least, discrimination towards certain community might be developed due to the findings of data analysis, which could lead to improper behaviours or over-reaction of surveillance.
One of the major issues with dataveillance is the removal of a human actors from the loop. Computer systems which oversee data and construct representations. This can allow for greater risk of false representations being created, as they are based on the data that has been surveilled. Computer systems can only use the data they have, wand if this is not an accurate depiction of individuals or their situations then false representations can be created. Dataveillance is highly automated through computer systems which observe our interactions and activities. Highly automated systems and technology eliminates human understanding of our activities.
Resistance
With such an increase in data collection and surveillance, many individuals are now attempting to reduce the concerns which have risen alongside it. Countersurveillance is perhaps the most significant concept focused on the tactics to prevent dataveillance. There are various tools associated with the concept of countersurveillance, which disrupt the effectiveness and possibilities of dataveillance.
Privacy-enhancing technologies, otherwise known as PETs, have been utilized by individuals to reduce data collection and decrease the possibility for dataveillance. PETs, such as adblocker, attempt to prevent other actors from collecting users data. In the case of adblock, the web browser extension is able to prevent the display of advertisements, which disrupts data collection about users online interactions. For businesses that may limit their opportunity to provide online users with tailored advertisements.
Recently, the European Union demanded companies to indicate that their website uses cookies. This law has become basic practice by many online services and companies, however, education on tracking tools with the general public differs and therefore can prevent the effectiveness of this sort of ruling. However, many companies are launching new PETs initiatives within their products. For example, Mozilla's Firefox Focus in pre-enabled with customizable privacy features, which allows for better online privacy. A few of the tools featured in Firefox Focus are also mimicked by other web browsers such as Apple's Safari. Some of the various tools featured with these web browsers are the capabilities to block ads and remove cookie data and history. Private browsing, otherwise known as Incognito for Google Chrome users, allows users to browse the web with having their history or cookies saved. These tools, aid in curbing dataveillance, by disrupting the collection and analysis of users' data. While several other web browsers may not pre-enable these PETs within their software users can download the same tools, like adblocker, through their browser's web store such as the Google Chrome Web Store. Many of these extensions help enable better privacy tools.
Social networks, such as Facebook, have introduced new security measures to help users protect their online data. Users can block their posts and other information on their account other than their name and profile picture. While this doesn't necessarily prevent data tracking these tools have helped to keep users data more private and less accessible for online criminals to exploit.
See also
Big data
Critical data studies
Global surveillance disclosures (2013–present)
Mass surveillance
Surveillance capitalism
Dataism
Internet privacy
References
Big data
Surveillance
Communication | Dataveillance | [
"Technology"
] | 2,446 | [
"Data",
"Big data"
] |
47,762,063 | https://en.wikipedia.org/wiki/Conservation%20and%20restoration%20of%20clocks | The conservation and restoration of clocks refers to the care given to the physical and functional aspects of time measuring devices featuring "moving hands on a dial face" exclusive of watches. Care for clocks constitutes regulating the external environment, cleaning, winding, lubrication, pest-management, and repairing or replacing mechanical and aesthetic components to preserve or achieve the desired state as specified by the owner. Clocks are typically composed of multiple types of materials such as wood, metal, paint, plastic, etc., which have unique behaviors and environmental interactions, making treatment options complex. The materials used and the complexity of clockwork warrant having a Horological Conservator complete the work.
Conservation and restoration
Interventive actions can be taken by trained conservators when clock issues arise, with treatment varying depending on the type of clock and situation.
Horological conservation history
The history of clock conservation dates back to ancient times. Horology, the study of the measurement of time, dates to 1450 BC, "when the Ancient Egyptians first observed the earth's natural circadian rhythms (Meadows, C., (n.d.)." Some examples of instruments used to measure time include: clocks, watches, sundials, hourglasses, time recorders, and atomic clocks. Horological Conservation is the science and art of preserving timepieces to connect humanity with the history and heritage of timepieces.
Conservators
A conservator who specializes in clock care will have the qualifications and training to properly treat a clock with the wherewithal to "[...] not totally compromise the historical worth of the object [...]." Conservators rely on a system of examination, documentation, and research prior to treatment so that proper treatment is received, as "Sometimes the only way one can understand the detailed history, quirks, and specific eccentricities common to a particular timepiece is by studying it to glean as much information from it as possible [...]." Aside from pinpointing clock issues and providing care to a clock in need, conservators are also able to impart knowledge about procedures like clock winding to ill-informed clock owners so that future clock damage due to human error may be avoided.
Conservators are encouraged to use restraint when restoring objects due to ethical concerns and only make necessary repairs rather than altering the appearance of objects such as clocks for aesthetic preferences. One exception to this dilemma is conservation done to correct previous treatments, which scholarship and investigation have proven to be dishonest or poorly-conceived efforts that took an object further away from its original form.
Preventive conservation
Preventive conservation involves the proper handling, creating and maintaining suitable storage and display environments, and regular maintenance to prevent issues from arising and impacting a clock's sustainability. Such controls can extend the life of a clock.
Correct handling
Handling is a potentially a major source of damage to any heritage item. Any handling of an object should be planned in advance and requires some precautions. Certain measures taken by a clock handler can prevent opportunities for damage.
Work areas should be clean and arranged to support the safety of the clock: uncluttered, free of any potential for the clock to be bumped, jostled, or moved unnecessarily, and secure from theft.
Wearing "[...] cotton or Nitrile gloves when handling the metal portions of the clock" can limit opportunities for transfer of contaminants from hands to clock surfaces.
Loose items such as jewelry and loose clothing like scarves or bulky jackets worn by a handler have the potential to come into contact with, and cause damage to, a clock. Removal of these items prior to clock handling can lower the risk of damage.
Pendulum damage during clock movement can be prevented by either removing the pendulum or fixing it within the interior of the clock via a latch or padding prior to clock movement. This can also prevent damage to other interior components.
When moving or handling a "weight-driven clocks, it is advisable to wait until the clock has wound down before it is relocated. Once it has stopped running, carefully remove the weights and pendulum".
A clock "[...] should always be grasped at its most sturdy area" and moved from one location to the next on its back.
The correlation of the size of a clock with the number of people moving it can ensure the safety of the clock. A small, mantle clock for example may only require one mover, while a tall clock can necessitate a number of movers to safely carry it to another location.
Proper storage and display
Proper storage and display mechanisms can work to ensure a clock's safety. For safety and mechanical reasons, conservators securely fix long case clocks and wall clocks to a wall to avoid accidents and to ensure the clocks area to run properly. The use of a solid, sturdy surface when storing or displaying a clock can prevent it from falling on a hard surface. A wall clock for example requires a secure attachment "[...] to a wall if accidents are to be avoided and clocks are to run properly."
Clock cases, which come in many different materials, require special consideration and treatment in their own right. Conservators further advise not exposing a clock to a heat source of any kind, including strong sunlight or a mantel over a working fire, as this can cause damage to the clock cases and movements.
Motion sensitive lighting and use of non-direct light sources can limit the amount of light and heat withstood by a clock, both of which are sources of clock damage. A clean clock environment can eliminate opportunities for dangerous contaminants to come into contact with a clock. An HVAC system can add an extra level of security by removing such contaminants from the air.
Correct humidity and temperature levels
The humidity and temperature of the environment in which a clock is being displayed or stored can adversely affect the clock's condition. Damage may be avoided by maintaining certain levels of humidity and temperature within the clock environment, dependent on the materials from which the clock is constructed.
a. Wood clocks
The ideal humidity and temperature ranges for clocks whose cases are made from wood vary depending on the season. In the summer, an environment with a temperature of 70 to 75 degrees Fahrenheit and 40% to 60% relative humidity is suitable. During the winter, an environment with a temperature of 70 degrees Fahrenheit and 35% to 50% relative humidity is prime.
b. Metal clocks
Clocks whose cases are made from metal function well in an environment with a temperature of 68 degrees Fahrenheit and a relative humidity of 30%.
Running clocks vs. static display
Clocks can be simple display objects if they are not required to run. This reduces the physical force on the clock. Whereas "running any functional object will result in wear and handling, which contributes to the degradation of the parts. Replacing the inner workings of a clock still requires handling, which could potentially damage the clock. It is important to note that conserving a non-functional clock is much less invasive (cheaper!) and preventive protection against corrosion and environmental hazards is the main concern for its stabilization and care.[viii] Perhaps the least invasive solution to highlight a functional clock would be to purchase a replica clock and safely store the original". Running clocks also require winding, which adds to the wear-and-tear of the gears and leads to more handling of the object.
Regular clock maintenance
Regular maintenance of a clock can ensure its long-term preservation. Conservation experts advise clocks need to be serviced regularly. A clock is a complex mechanical contraption made of a variety of materials and with many small moving parts. Even under perfect conditions lubricants deteriorate. Clocks should be examined and re-lubricated every three years. After five years, and certainly no longer than eight years, the whole movement is advised to be dismantled and 'cleaned' if excessive wear and expensive attention is to be avoided
Visual inspection can determine whether a clock should be cleaned and/or lubricated, whether any signs of infestation and/or damage exist, and whether a clock should be wound and/or set to the correct time.
Regular maintenance also applies to the environment surrounding the clock to ensure that the correct storage conditions are present.
a. Cleaning, polishing, and lubrication
Regular clock surface dusting can negate opportunities for corrosion or abrasion as a result of dust buildup. It should be stated that such surface cleaning can also result in a loss of information about a clock's history, as "[...] various "dirt" or "salt" deposits can provide precious clues to an objects past [...]." Loss of clock function due to clockwork wear can be avoided through regular clockwork cleaning, polishing, and lubrication performed by a trained professional. In performing such maintenance, a professional will disassemble clockwork so that it can be thoroughly examined "[...] for worn or broken parts, fatigued springs and accumulations of dirt or oil."
Cleaning clocks consist of multiple steps, which may or may not all be done as part of a treatment plan: washing, ultrasonics, rinsing, drying, polishing, refinishing, chalk brushing, and pegging out. At this point, should cleaning be the only treatment employed, the pieces could be reassembled with proper lubrication; however, depending on the type of clock, the pieces could also be primed for further treatments to the various parts such as mechanisms, frames, wheelwork, pivots, mainsprings, screws and screw threads, escapements, balance springs, pendulums, etc.
b. Winding and setting
In order to function as time keepers, and to prevent damage to clockwork, clocks must be regularly wound. An established winding schedule eliminates the threat of over-winding."Traditionally, the job of winding the clocks was given to an horologist or a trained individual. Winding had to be done at certain times of the day; ideally when the temperature was just right and the room vacant. Each clock had its own unique keys, doors, and intricacies within the mechanisms." Regular winding can also ensure that clockwork is still functioning. In setting the correct time, the minute hand is turned clockwise to the desired time.
When hand setting a clock, manually moving the hour or seconds hand rather than the minute hand to set the time can be damaging, as can be counterclockwise hand turning. Moving the minute hand ahead on a clock by several hours when setting the time can also lead to clockwork damage. For this reason, "Rather than turning the hands forward through several hours it is better to stop the clock and re-start it when the time matches that on the dial."
Agents of deterioration
Damage can occur via a variety of mechanisms, either rooted in human error or naturally caused. Agents of Deterioration (AOD) are the ten primary categories of threats to heritage objects. These agents of deterioration can occur while an object is in storage, on display, undergoing conservation, or during handling or transportation of the object.
Physical force
Physical force is any impact, shock, vibration, pressure or abrasion that causes damage to an object. Physical force damage commonly occurs when handling the object. Any excessive physical force will break, damage, splinter the clock frame or easily shatter the glass of the object.
Clocks are complex functional objects; many have moveable working parts. Any excessive physical force can damage the mechanics inside the clock which are critical to its operation. Most commonly, these delicate inner-workings are metal, but clocks can be made of any number of materials, from wood to precious metals like silver and gold. They can have enamel inlays or delicate carvings and be a variety of sizes from small clocks to large grandfather clocks or clock towers. When a clock is in the custody of a professional institution such as a museum, proper barriers and monitored security of the clocks greatly reduce this risk. Some common sources of physical force damage to clocks are:
a. Mishandling
The failure of a handler to remove loose items like jewelry or clothing items like scarves from their person can result in these items striking a clock's surface. A handler who uses his or her bare hands to touch or transport a clock exposes the clock to contaminants, leaving "unsightly and potentially damaging marks." A handler who chooses to drag rather than lift a large clock "[...] can place stress on the legs and feet of the clock." Lifting a clock via false handles or non-sturdy components may cause these parts to snap off of the clock, potentially leading to the clock falling and smashing on a surface.
b. Over-winding or improper hand setting
Improper clock winding and hand setting procedures can cause serious damage to clockwork components. The use of an inappropriate key to wind a clock is one such improper procedure. The manner in which a clock is wound is also important, as "[...] considerable and potentially expensive damage can be caused by not winding gently and steadily", as well as by turning the key too many times.
c. Unstable storage or display
Unsuitable storage and display environments pose great risks to a clock's condition. Placement of a clock on an unstable surface or non-secure mounting on a wall can cause a clock to fall when external vibrations or human-caused accidents occur.
Theft and vandalism
Some clocks are constructed out of precious materials that are a source of temptation for theft. They can be small enough to easily steal. While a minimal concern for most wood clocks, as they are rarely stolen in a burglary, a valuable historic clock may be more susceptible to theft.
With regard to vandalism, any public place runs a risk for any object being vandalized. If a clock is on display in a location that does not have conventional display cases for example, large clocks could be vandalize. In the case of wood clocks, slashing the wood, smashing the glass, or graffiti would be the most common problems for a public institution. High security, cameras, and inspections after crowds leave, especially for highly coveted antique clocks, are usually required in professional institutions.
Disassociation
The disassociation agent of deterioration refers to the separation or loss of individual parts of an object. This is possible in clocks, especially during cleaning or maintenance when the clock has to be disassembled. "Clocks can consist of up to five hundred individual components", so preventive conservation can be complex for these objects. Any one of those components can be lost or misplaced, resulting in damage to the object as a whole. If the part is critical, the clock may no longer run.
Incorrect relative humidity
The variety of materials used in clocks, can be sensitive to fluctuations in humidity. "A stable and appropriate relative humidity and temperature should be maintained to prevent parts from rusting, corrosion, darkening of silvers, and lubricants from drying out". Changes in relative humidity can cause wooded clocks to expand or contract. Fluctuating humidity leads to swelling and shrinking that can "loosen the joints of organic components". When changes in humidity causes the wooden parts of the clock to expand and contact, the inorganic components of a clock remain fixed, resulting in strain within the object. This is particularly a problem if the wood becomes warped and creates a pressure point against the inorganic interior workings.
Humidity that is too damp can deform organic materials or corrode metals found in clocks. High humidity can cause warping, rotting, and mold or fungus growth in a wood clock, and can corrode the metal components of a clock.
Glass facings can also trap moisture within the machine creating a prime environment for mold or rust, another agent of deterioration known as pollutants, to grow and build up internally.
Incorrect temperature
The temperature of a given environment can play a direct role in clock deterioration. "[...] extremes in temperature and humidity" can cause drastic changes in the materials from which a clock is made, inevitably leading to damage. Placement of a clock for example near "a heat source of any kind, including strong sunlight or a mantel over a working fire [...] can cause damage to cases and movements." In some instances, the heat from the fire contribute to faster deterioration in mantel clocks.
Clocks, regardless of the materials they are made of, are susceptible to damage from incorrect temperatures. Like light, temperature that is too high can cause weakening, discoloration, and or disintegration of organic materials.
With wood clocks, temperature is critical to conservation and preservation. Extreme heat and freezing temperature will significantly damage the wood's surface. Incorrect temperatures or uncontrolled climates of storage areas can cause rapid deterioration to wood clocks. Incorrect temperature causes the wood to expand or contract.
Pests
Depending on the materials the clock is made of, pests may be attracted to it. This is especially true for wooden clocks, since many pests feed on organic materials like wood. Many pests, rodents and insects burrow or feast on wood. Wood-boring insects may infest a clock if it is stored in an environment which supports insect activity and allows them access to the clock.
Even for clocks that are made entirely of metal, spiders can cause problems because "their webs attract dust and can clog a clock's movement".
Pests that are known to infest clocks are attracted to the organic materials from which a clock may be constructed:
Carpet beetle- Attracted to protein-based adhesives sometimes used in clock construction, and as such "[...] are generally found at joinery and inside clock cases."
Powderpost beetle- Lured by any wood materials from which a clock is constructed, they are known to drill holes into wood.
Light: infrared and ultraviolet
Over-exposure to light can impact clock materials in a number of ways; many of the materials used in clocks are prone to light damage, both ultraviolet and infrared.
Visible light damage can cause discoloration and deterioration. Exposure to infrared can increase the temperature of the wood, this can cause increased oxidation, which causing damage to the wood's surface and develop irregular markings.
Ultraviolet light can cause weakening, discoloration, and or disintegration of organic materials like wood. Exposure to direct sunlight (UV) over long periods of time will damage the wood by warping, fading, dry-rotting, and cause damage to the wood structure. Exposure to both UV and infrared light can alter, damage or ruin any stains or finish on a wood clock.
Light agents of deterioration can be associated with temperature agents of deterioration, depending on the nature of the light source. Heat from a light source can also cause the varnish or finish on a clock surface to melt, resulting in a sticky surface to which harmful contaminants can become attached. Too much light exposure can also result in changes to finish color, as well as cause finish deterioration "[...] resulting in a cracked, brittle and/or "alligatored" appearance."
Pollutants
Pollutants are any elements which can corrode, degrade, or alter the condition of an object. Chemicals, smoke, airborne particles, and gases are all pollutants that can damage a clock. The following are two such examples:
Dust is one such contaminant which settles on a clock's surface. If not addressed, dust buildup can lead to abrasion and corrosion. Dust and other airborne abrasives can build up inside clocks and impeded and wear down their mechanisms "the abrasive particle will become imbedded into the bearing wall and act as a piece of "sandpaper [...]." Regular clockwork activities can also lead to wear, as lubricants are known to degrade over time. In the case of mantel clocks that have been displayed above fireplaces, these abrasives include soot.
Oil is transferred to a clock surface when a clock is handled with bare hands. The presence of oil on a clock can cause damage, particularly corrosion when metal clock components are touched.
Other pollutants can cause oxidization and tarnishing in metal clocks. The cleaning agents used to remove pollutants can result in a chemical reaction with previously used lubricants or cleaning agents or with the materials of the clock. Excessive cleaning can "cause more issues like over-drying of bearings and stress corrosion cracking of brass that is exposed to ammonia solution". The mechanisms within clocks are highly sensitive to external matter like oils from fingertips or dust, so much so, that it can cause the machine to malfunction if it gets into the wrong area. For static displays, the functionality of a clock is not always necessary, but limiting the introduction of organic matter through mishandling will prevent unnecessary decay over the life of the clock. The wood used in many wood clocks are very porous, and easily absorb the elements around their environment and affect the integrity of the wood. Well-sealed and insulated rooms mitigate pollutant damage.
Fire
Like most heritage objects, clocks are highly vulnerable to fire. Not only are the fluctuations in temperature harmful, most clocks will be irreparably damaged if exposed to fire. Errant embers from a fireplace can be a potential threat to mantle clocks. Other threats may be any open flame, wood burning stove, heater, or pilot light.
Many clocks are small enough that evacuating them during an emergency could be possible. Large clocks that belong to buildings, like clock towers, may survive fire and could possibly be restored.
Water
Water damage is one of the greatest agents of deterioration for a wood clock; water warps, swells and rots the wood. The components of many clocks are extremely susceptible to water damage. Because of the complexity of these objects, they are very challenging to dry. It may be extremely difficult, depending upon the severity of the water damage, to repair or restore the clock to its correct condition. Salvaging warped or rotted wood can be challenging and the damaged material may need to be replaced entirely. Water damage also causes corrosion to the internal mechanisms of the clock.
Specific types of clock damage
Damage can impact all components and materials from which a clock may be constructed.
Wood damage
Due to its porous nature, wood is significantly impacted through contact with water. When humidity is high, the excess water in the air is absorbed, resulting in wood expansion, while little to no water in the air when humidity is low can cause wood shrinkage. Such changes in character from the wood's original state can lead to damage. Types of low humidity-related wood damage include "[...] structural cracks, lifting veneer and inlays, gaps in joints and the embrittlement of adhesives."
Metal damage
Similar to wood, interaction with water can also prove detrimental to metal. When contaminants come into contact with metal, they either combine with any present moisture or attract moisture to the metal. This "[...] combination with moisture can produce corrosion."
Plastic damage
Modern clocks may feature plastic cases, dials, faces, and mechanisms in conjunction with more traditional materials, such as metal or wood. As plastic was created in the twentieth century, conservation treatments are still being researched by conservators. Since the term plastic covers a broad spectrum of materials from celluloid to technopolymers, there are various reactions to environmental factors and agents of deterioration, making clocks with plastic cases or component parts susceptible to unique stresses that are not wholly understood at this point. What is known is that different types of plastics can degrade quickly and unexpectedly because of the inherent vice of some polymers.
Exposure to improper lighting, humidity, water, or solvents may cause chemical deterioration in plastics resulting in reactions such as "a white powder 'blooming' on the surface of an object, discoloration, distortion of the object's shape and strong indicator smells of vinegar, or mothballs," crazing, cracks, acid deposits, and sticky surface textures.
It can be difficult to easily identify the chemical makeup of the plastic used to create an object, which can make interventive conservation challenging because the potential reactions to treatments are unknown. Therefore, preventive conservation tactics similar to those used for organic objects are the primary method of caring for objects made with plastic such as clocks.
Finish or paint damage
Finish damage can occur as a result of the use of cleaning products and/or polishes on a clock's surface. Rather than perform their intended duty to assist in the preservation of a clock, some products "can actually darken or become opaque with age, resulting in a dark, dull and often irreparable finish." Any words or images painted on a clock surface can become faded or even removed when these delicate pieces are touched and exposed to moisture from hands.
Interior or clockwork damage
Clockwork damage can be inflicted via over-winding, interaction with contaminants, ill-advised lubrication, and clock movement when a pendulum is not secured prior to the clock being moved. A free swinging pendulum can itself be damaged and can inflict damage onto other interior components during such clock movement.
Improper cleaning and polishing
Many cleaners and polishers contain properties that "[...] have been proven to age poorly." Resultantly, the use of such cleaners and polishers can prove detrimental. The use of ammonia based cleaning products for example on brass clock components can lead to an irreversible form of damage called Stress Corrosion Cracking. Depending on the type of metal on which it is used, a metallic brush employed to apply cleaning products not only can create the proper conditions for corrosion, but can "[...] remove any protective oxide layers even with careful use."
Improper lubrication
Attempts by non-professionals to lubricate or repair clockwork can lead to serious damage and loss of clock functionality. A lubricant applied without first cleaning and polishing clockwork to remove the previous lubricant and contaminants can result in wear rather than prevent it. The combination of the newly applied lubricant with the previous lubricant often results in "[...] an unwanted chemical reaction between the two lubricants [...]." A careless lubricant choice can result in the use of inappropriate or "Poor-quality oil" on clockwork, which "can become sticky leading to mechanical problems." The inexperience of a non-professional can also lead to "the use of too much oil, or oil in the wrong place" during attempts to lubricate clockwork. The application of too much of a lubricant can be damaging because it "[...] usually causes the lubrication to run out of the bearing and by capillary action will cause the bearing to go dry." Totally ignoring the lubrication needs of clockwork can be jeopardizing not only because of lubricant degradation, but because of the acidic nature of the organic lubricants often used in antique clocks.
Examples
Anglesey Abbey Pagoda Clock
Horological conservators at West Dean College were responsible for the treatment of an 18th-century pagoda clock sent from the historic house Anglesey Abbey by the National Trust. In starting the project, examination of the clock revealed that "The automata and clock elements seem to be running, but struggling, and the music sounds as though it needs a few extra hands to help play its tune." The clock was then disassembled, and care was taken to document information about each of the over 600 components both textually and photographically, including measurements and where each component fits within the clock. "After examination, each component was cleaned and dried, wrapped in acid-free tissue, and stored with the catalogue number."
References
Clocks
Conservation and restoration of cultural heritage
Hr:Konzervacija satova | Conservation and restoration of clocks | [
"Physics",
"Technology",
"Engineering"
] | 5,742 | [
"Physical systems",
"Machines",
"Clocks",
"Measuring instruments"
] |
47,763,640 | https://en.wikipedia.org/wiki/Cortinarius%20subfoetens | Cortinarius subfoetens is a basidiomycete mushroom of the genus Cortinarius native to North America. It was first described in Wyoming.
References
subfoetens
Fungi described in 1995
Fungi of North America
Taxa named by Meinhard Michael Moser
Fungus species | Cortinarius subfoetens | [
"Biology"
] | 60 | [
"Fungi",
"Fungus species"
] |
47,763,703 | https://en.wikipedia.org/wiki/Cortinarius%20alboviolaceus | Cortinarius alboviolaceus is a basidiomycete mushroom of the genus Cortinarius native to Europe and North America.
Description
The mushroom is lilac, later yellowing and often becoming whitish/grayish. Its cap is 3–8 cm wide, conical to umbonate, dry, silky, with whitish to pale lilac flesh. The gills are adnate or adnexed, grayish lilac becoming brown as the spores mature and lend their color. The stalk is 4–8 cm tall and .5–1.5 wide, larger at the base, sometimes with white veil tissue. The odour and taste are indistinct.
Similar species
Similar species include the essentially identical C. griseoviolaceus, as well as Inocybe lilacina. C. camphoratus is similar, but with a foul odour. C. malachius has a grayish cap and, when dry, a scaly surface.
Potential edibility
Its edibility is considered unknown by some guides but it is not recommended due to its similarity to deadly poisonous species. At least one guide considers it edible, but not recommended. Conflicting accounts indicate that it may itself be poisonous.
References
alboviolaceus
Fungi described in 1801
Fungi of Europe
Taxa named by Christiaan Hendrik Persoon
Fungus species | Cortinarius alboviolaceus | [
"Biology"
] | 279 | [
"Fungi",
"Fungus species"
] |
47,763,726 | https://en.wikipedia.org/wiki/Thaxterogaster%20occidentalis | Thaxterogaster occidentalis is a species of fungus in the family Cortinariaceae.
Taxonomy
It was described in 1939 by the American mycologist Alexander H. Smith who classified it as Cortinarius occidentalis.
In 2022 the species was transferred from Cortinarius and reclassified as Thaxterogaster occidentalis based on genomic data.
Habitat and distribution
Native to the Northern Hemisphere.
References
occidentalis
Fungi described in 1939
Taxa named by Alexander H. Smith
Fungus species | Thaxterogaster occidentalis | [
"Biology"
] | 111 | [
"Fungi",
"Fungus species"
] |
47,763,930 | https://en.wikipedia.org/wiki/Specification%20for%20human%20interface%20for%20semiconductor%20manufacturing%20equipment | This specification is usually called SEMI E95-0200 standard. It was originally published in February 2000, and the latest technical revision is SEMI E95-1101.
This standard addresses the area of processing content with the direct intention of developing common software standards, so that problems involving operator training, operation specifications, and efficient development can be resolved more easily.
See also
Semiconductor Equipment and Materials International
Notes
Semiconductor device fabrication
Technical specifications | Specification for human interface for semiconductor manufacturing equipment | [
"Materials_science",
"Technology"
] | 88 | [
"Semiconductor device fabrication",
"nan",
"Microtechnology"
] |
47,764,175 | https://en.wikipedia.org/wiki/GoGuardian | GoGuardian is an educational software company founded in 2015 and based in Los Angeles, California. The company's services monitor student activity online, filter content, and alert school officials to possible suicidal or self-harm ideation. It also offers a network-level filtering solution marketed for bring your own device environments, GoGuardian DNS. Concerns have been raised over these functions, claiming the software is spyware.
Product history
GoGuardian was founded in 2015 and is based in Los Angeles, CA. Its feature set includes computer filtering, tracking, monitoring, and management, as well as usage analytics, activity flagging, and theft recovery for ChromeOS devices. GoGuardian also offers filtering functionality for third-party tools such as YouTube.
In June 2015, GoGuardian reported it was installed in over 1,600 of the estimated 15,000 school districts in the United States.
In January 2015, Los Angeles Unified School District (LAUSD) chose GoGuardian to support their 1:1 device rollout program. This provides LAUSD device tracking and grade-level-specific filtering, and facilitates compliance with the Children's Internet Protection Act (CIPA).
In September 2015, the company released GoGuardian for Teachers, a tool to monitor student activity and control student learning. In January 2016, GoGuardian announced the launch of Google Classroom integration for GoGuardian for Teachers.
In May 2018, GoGuardian was acquired by private equity firm Sumeru Equity Partners and appointed Tony Miller to their board of directors.
In August 2018, GoGuardian launched Beacon, a software system installed on school computers that analyzes students' browsing behavior to alert people concerned about students at risk of suicide or self-harm.
In November 2020, GoGuardian merged with Pear Deck.
Student privacy
GoGuardian products allow teachers and administrators to view and snapshot students' computer screens, close and open browser tabs, and see running applications. GoGuardian can collect information about any activity when users are logged onto their accounts, including data originating from a student's webcam, microphone, keyboard, and screen, along with historical data such as browsing history. This collection can be performed whether students connect from school-provided or personally-owned devices. Parents have raised privacy concerns over this data collection, claiming the software is spyware.
In 2016, researcher Elana Zeide raised the concern that the use of GoGuardian software for suicide prevention, though "well-meaning", could result in "overreach". Zeide further noted that legitimate personal reasons could motivate a student to wish to search for sensitive information in private. According to Zeide, this concern is compounded by the fact that school devices may be the only devices for lower-income students. American School Counselor Association ethics chair Carolyn Stone said that GoGuardian's ability to track web searches conducted at home is "intrusive" and is "conditioning children to accept constant monitoring" as normal.
Until October 2015, GoGuardian software was able to track keystrokes and remotely activate student webcams. GoGuardian said that the features were removed as part of its "ongoing commitment to student privacy."
GoGuardian technical product manager Cody Rice stated in 2016 that schools had control over GoGuardian's collection and management of data and that no client had complained about privacy.
GoGuardian faced scrutiny by the Electronic Frontier Foundation (EFF) in 2023, over the inconsistent filtering presented by it. The EFF has presented problems with GoGuardian Beacon being used to replace social workers and other mental health professionals in a school landscape. The EFF has also stressed the possibility of using the data collected by GoGuardian to track and to advertise to children under the age of 13. GoGuardian has also faced criticism for flagging LGBTQ keywords.
Recognition
Inc. 500
Deloitte's Fast 500
In 2018, GoGuardian was named as the 27th fastest growing technology company in North America.
Forbes 30 Under 30
In January 2016, two of the company's co-founders, Aza Steel and Advait Shinde, were named to Forbes magazine's annual "30 Under 30" list in the Education category.
International Design Awards Gold: GoGuardian Teacher
2016 Awards of Excellence Tech and Learning
References
Further reading
Spying on Students: School-Issued Devices and Student Privacy a study by the Electronic Frontier Foundation
GoGuardian Beacon listed as a 2018 "Silver in Education / Behavioral correction tools" by International Design Awards
School Software Walks The Line Between Safety Monitor And 'Parent Over Shoulder' by Larry Magid writing in Forbes
Internet safety
Child safety
Companies based in Los Angeles
Software companies based in California
Security companies of the United States
Computer security software
Software companies of the United States | GoGuardian | [
"Engineering"
] | 972 | [
"Cybersecurity engineering",
"Computer security software"
] |
47,764,455 | https://en.wikipedia.org/wiki/Mobile%20Broadband%20Plus | Mobile Broadband Plus (MBB+) is a term for wireless Internet access through mobile devices. Mobile Broadband Plus is distinct from traditional mobile broadband by featuring global Internet access, providing international mobile services without roaming charges.
Development
Standards of Mobile Broadband Plus have been developed by telecommunication, mobile phone, and laptop computer manufacturers which includes virtual SIM and cloud SIM technology. Established in 2012, a group of specialists from uCloudlink has adopted cloud SIM as one of the MBB+ standards which provides a global network solution without roaming charges.
High speed anywhere and anytime
In 2011, 90% of the world's population lived in areas with 2G coverage, while 45% lived in areas with 2G and 3G coverage. Mobile broadband uses the spectrum of 225 MHz to 3700 MHz.
MBB+ is designed to address issues with connectivity, network capacity, application quality, and mobile network operators' overall inexperience with data traffic. The service of MBB+ covers the globe, normally in 100+ countries, providing high speed internet on the move with 3G and 4G connectivity.
Roaming free
Through patented Cloud SIM technology, MBB+ taps into a world's worth of SIM cards that are located throughout the globe. It will find the most optimal local mobile network and the corresponding SIM card in the cloud SIM server via the internet, then starts to convert the local mobile connection into Wi-Fi signals. In this case, all the data resource are within "domestic" boundaries and saving the user from international charges.
Secure access
WBB+ supports Wi-Fi encryption including WPA and WPA2.
See also
Broadband Internet access
MiFi
Mobile Enterprise
Mobile device
Mobile VoIP
References
Mobile telecommunications
Broadband | Mobile Broadband Plus | [
"Technology"
] | 343 | [
"Mobile telecommunications"
] |
47,764,669 | https://en.wikipedia.org/wiki/Peclers | Peclers is a trend consulting agency founded in Paris in 1970.
Operations
The company provides trend analysis, consumer reports, and brand strategies for multiple brands and creative individuals. Peclers' creative team develops seasonal trend books that serve as a foundation for businesses in the fashion and home industries. The agency offers trend forecasts and styling intelligence, catering to various sectors such as retail, beauty, wellness and cosmetics, electronics, and consumer goods.
History
1970: Founded by Dominique Peclers in Paris, France
2001: Opened its first office in New York
2003: Joined WPP plc, a multinational advertising and public relations company in London, England
2007: Eric Duchamp joins as president of Peclers Paris
2010: Opened its second office in Shanghai
References
External links
Peclers website
Fashion organizations
French companies established in 1970
Cultural trends
French fashion journalists
Cosmetics businesspeople
Cosmetics companies of France
Style guides
Consumer Reports
Consumer behaviour
Consumer electronics
Well-being | Peclers | [
"Biology"
] | 190 | [
"Behavior",
"Consumer behaviour",
"Human behavior"
] |
47,765,854 | https://en.wikipedia.org/wiki/Name%20resolution%20%28semantics%20and%20text%20extraction%29 | In semantics and text extraction, name resolution refers to the ability of text mining software to determine which actual person, actor, or object a particular use of a name refers to. It can also be referred to as entity resolution.
Name resolution in simple text
For example, in the text mining field, software frequently needs to interpret the following text:
John gave Edward the book. He then stood up and called to John to come back into the room.
In these sentences, the software must determine whether the pronoun "he" refers to "John", or "Edward" from the first sentence. The software must also determine whether the "John" referred to in the second sentence is the same as the "John" in the first sentence, or a third person whose name also happens to be "John". Such examples apply to almost all languages, and not only English.
Name resolution across documents
Frequently, this type of name resolution is also used across documents, for example to determine whether the "George Bush" referenced in an old newspaper article as President of the United States (George H. W. Bush) is the same person as the "George Bush" mentioned in a separate news article years later about a man who is running for President (George W. Bush.) Because many people may have the same name, analysts and software must take into account substantially more information than only a name to determine whether two identical references ("George Bush") actually refer to the same specific entity or person.
Name/entity resolution in text extraction and semantics is a notoriously difficult problem, in part because in many cases there is not sufficient information to make an accurate determination. Numerous partial solutions exist that rely on specific contextual clues found in the data, but there is no currently known general solution.
The problem is sometimes referred to as name disambiguation and, for digital libraries, author disambiguation.
For examples of software that might provide name resolution benefits, see also:
AeroText
AlchemyAPI
Attensity
Autonomy
Basis Technology
Dandelion API, providing a customizable approach for name resolution using an internal knowledge graph (built on Wikipedia, DBpedia and other sources)
DBpedia Spotlight, providing a simple approach for name resolution using DBpedia and Wikipedia
NetOwl
See also
Identity resolution
Named entity recognition
Naming collision
Anaphor resolution
References
Computational linguistics
Tasks of natural language processing | Name resolution (semantics and text extraction) | [
"Technology"
] | 487 | [
"Natural language and computing",
"Computational linguistics"
] |
47,765,871 | https://en.wikipedia.org/wiki/Name%20resolution%20%28programming%20languages%29 | In programming languages, name resolution is the resolution of the tokens within program expressions to the intended program components.
Overview
Expressions in computer programs reference variables, data types, functions, classes, objects, libraries, packages and other entities by name. In that context, name resolution refers to the association of those not-necessarily-unique names with the intended program entities. The algorithms that determine what those identifiers refer to in specific contexts are part of the language definition.
The complexity of these algorithms is influenced by the sophistication of the language. For example, name resolution in assembly language usually involves only a single simple table lookup, while name resolution in C++ is extremely complicated as it involves:
namespaces, which make it possible for an identifier to have different meanings depending on its associated namespace;
scopes, which make it possible for an identifier to have different meanings at different scope levels, and which involves various scope overriding and hiding rules. At the most basic level name resolution usually attempts to find the binding in the smallest enclosing scope, so that for example local variables supersede global variables; this is called shadowing.
visibility rules, which determine whether identifiers from specific namespaces or scopes are visible from the current context;
overloading, which makes it possible for an identifier to have different meanings depending on how it is used, even in a single namespace or scope;
accessibility, which determines whether identifiers from an otherwise visible scope are actually accessible and participate in the name resolution process.
Static versus dynamic
In programming languages, name resolution can be performed either at compile time or at runtime. The former is called static name resolution, the latter is called dynamic name resolution.
A somewhat common misconception is that dynamic typing implies dynamic name resolution. For example, Erlang is dynamically typed but has static name resolution. However, static typing does imply static name resolution.
Static name resolution catches, at compile time, use of variables that are not in scope; preventing programmer errors. Languages with dynamic scope resolution sacrifice this safety for more flexibility; they can typically set and get variables in the same scope at runtime.
For example, in the Python interactive REPL:
>>> number = 99
>>> first_noun = "problems"
>>> second_noun = "hound"
>>> # Which variables to use are decided at runtime
>>> print(f"I got {number} {first_noun} but a {second_noun} ain't one.")
I got 99 problems but a hound ain't one.
However, relying on dynamic name resolution in code is discouraged by the Python community. The feature also may be removed in a later version of Python.
Examples of languages that use static name resolution include C, C++, E, Erlang, Haskell, Java, Pascal, Scheme, and Smalltalk. Examples of languages that use dynamic name resolution include some Lisp dialects, Perl, PHP, Python, Rebol, and Tcl.
Name masking
Masking occurs when the same identifier is used for different entities in overlapping lexical scopes. At the level of variables (rather than names), this is known as variable shadowing. An identifier I' (for variable X') masks an identifier I (for variable X) when two conditions are met
I' has the same name as I
I' is defined in a scope which is a subset of the scope of I
The outer variable X is said to be shadowed by the inner variable X'.
For example, the parameter "foo" shadows the local variable "foo" in this common pattern:
private int foo; // Name "foo" is declared in the outer scope
public void setFoo(int foo) { // Name "foo" is declared in the inner scope, and is function-local.
this.foo = foo; // Since "foo" will be first found (and resolved) in the ''innermost'' scope,
// in order to successfully overwrite the stored value of the attribute "foo"
// with the new value of the incoming parameter "foo", a distinction is made
// between "this.foo" (the object attribute) and "foo" (the function parameter).
}
public int getFoo() {
return foo;
}
Name masking can cause complications in function overloading, due to overloading not happening across scopes in some languages, notably C++, thus requiring all overloaded functions to be redeclared or explicitly imported into a given namespace.
Alpha renaming to make name resolution trivial
In programming languages with lexical scoping that do not reflect over variable names, α-conversion (or α-renaming) can be used to make name resolution easy by finding a substitution that makes sure that no variable name masks another name in a containing scope. Alpha-renaming can make static code analysis easier since only the alpha renamer needs to understand the language's scoping rules.
For example, in this code:
class Point {
private:
double x, y;
public:
Point(double x, double y) { // x and y declared here mask the privates
setX(x);
setY(y);
}
void setX(double newx) { x = newx; }
void setY(double newy) { y = newy; }
}
within the constructor, the instance variables and are shadowed by local variables of the same name. This might be alpha-renamed to:
class Point {
private:
double x, y;
public:
Point(double a, double b) {
setX(a);
setY(b);
}
void setX(double newx) { x = newx; }
void setY(double newy) { y = newy; }
}
In the new version, there is no masking, so it is immediately obvious which uses correspond to which declarations.
See also
Namespace (programming)
Scope (programming)
Naming collision
References
Computer libraries
Compiler construction | Name resolution (programming languages) | [
"Technology"
] | 1,259 | [
"IT infrastructure",
"Computer libraries"
] |
47,765,880 | https://en.wikipedia.org/wiki/Name%20resolution%20%28computer%20systems%29 | In computer systems, name resolution refers to the retrieval of the underlying numeric values corresponding to computer hostnames, account user names, group names, and other named entities.
Computer operating systems commonly employ multiple key/value lists that associate easily remembered names with integer numbers used to identify users, groups, other computers, hardware devices, and other entities. In that context, name resolution refers to the retrieval of numeric values given the associated names, while reverse name resolution refers to the opposite process of finding name(s) associated with specified numeric values:
In computer networking, it refers to processes used to obtain the assigned IP addresses needed to communicate with devices whose host or domain names are known. Examples include the Domain Name System (DNS), Network Information Service and Multicast DNS (mDNS). IP addresses for devices on the local segment can in turn be resolved to MAC addresses by invoking the Address Resolution Protocol (ARP).
Unix operating systems associate both an alphanumeric name and a user or group ID with each user account or defined group of user names.
The GNU C Library provides various operating system facilities that shell commands and other applications can call to resolve such names to the corresponding addresses or IDs, and vice versa. Some Linux distributions use an nsswitch.conf file to specify the order in which multiple resolution services are used to effect such lookups.
See also
Name server
Multicast DNS
Name Service Switch
Identity resolution
Naming collision
References
Computer libraries | Name resolution (computer systems) | [
"Technology"
] | 300 | [
"Computing stubs",
"IT infrastructure",
"Computer libraries"
] |
47,765,929 | https://en.wikipedia.org/wiki/Transportation%20improvement%20program | A transportation improvement program (TIP) is a United States federally mandated requirement ( (j)) for all metropolitan planning organizations (MPOs). The TIP, also known as a short-range plan, lists all transportation projects in an MPO's metropolitan planning area that seek federal transportation funding within at least a four-year horizon.
The TIP is complementary to the long-range transportation plan (LRTP), or regional transportation plan (RTP), that plans on a twenty or thirty year horizon.
Development of the TIP
MPOs must consider the following when developing a TIP:
The MPO should involve its member governments, the State, and local public transit operators.
The TIP should contain transportation projects consistent with the RTP.
Investment priorities from the RTP should be reflected in the TIP.
The public should be given an opportunity to comment on the TIP and modifications made to the TIP.
Reasonable funding estimates should accompany projects included in the TIP.
The TIP must be approved not only by the MPO but also the Governor.
Relationship to Statewide Planning
The TIPs of various MPOs within a state feed directly into the state transportation improvement program (STIP). Also a federal requirement ( (g)), each STIP is approved by the Federal Highway Administration (FHWA) in conjunction with the Federal Transit Administration (FTA).
External links
Metropolitan Planning Process & Products
Portland Metro TIP
List of recurring planning activities
References
Transportation planning
Urban planning | Transportation improvement program | [
"Engineering"
] | 292 | [
"Urban planning",
"Architecture"
] |
47,767,615 | https://en.wikipedia.org/wiki/Cafe%20Bazaar | Cafe Bazaar () is an Iranian app store for the Android operating system, founded in April 2011 by Reza Mohammadi and Hessam Armandehi. Cafe Bazaar tailors its services specifically towards Persian-speaking users and offers more than 25,000 downloadable Iranian and international apps for gaming, social media, messaging and other uses.
In April 2019 Cafe Bazaar announced it has surpassed 40 million users. It gets roughly 20 million visits a week within Iran and its value is estimated at €380 million.
Cafe Bazaar is by far the most popular app store among Iranians, controlling 97% of the market. Cafe Bazaar is owned by Hezardastan Information Technology Development Group which also operates Divar (lit. The Wall), a popular online classified ad service similar to Craigslist. According to an April 2018 report, Cafe Bazaar has 36 million users, with 29 million using the platform every month and 5.3 million using it every day. In 2017, Cafe Bazaar participated in the Mobile World Congress event in Barcelona, the world's largest mobile gathering, to introduce Iran's local mobile ecosystem resulting in many new partnerships.
Content
Nearly 160,000 applications are available on Cafe Bazaar's platform covering a wide range of uses such as education, planning, ride-sharing, e-commerce, travel, lifestyle, wellness, and others. According to the report, citing data compiled between March 2017 and March 2018, income from gaming apps experienced a 94% year-on-year increase. Other apps also surged 64% compared to the year which ended in March 2017. 4.7 million apps are downloaded from Cafe Bazaar every day and 7.9 million apps are sold every month. Over 21,668 developer teams have published their work on Cafe Bazaar. While only 28% of the developer teams are based in Tehran, they hold a 71.6% share of the market turnover.
َApplications
According to the report, citing data compiled between March 2017 and March 2018, income from gaming apps experienced a 94% year-on-year increase. Other apps also surged 64% compared to the year which ended in March 2017. 4.7 million apps are downloaded from Cafe Bazaar every day and 7.9 million apps are sold every month.
According to Cafe Bazaar's CEO Amin Amirsharifi, in 2017, the most popular apps on Cafe Bazaar are Telegram, Instagram, SHAREit (a file transfer platform), Divar (a classified ads app), and Snapp (a taxi-hailing app).
According to the 2018 report, the most downloaded apps between March 2017 and March 2018 are as follows:
Games
Cafe Bazaar has had much success with game downloads in the midst of the “raging success of mobile games” in Iran as demonstrated by the popularity of games like Clash of Clans. According to the 2013 survey, Iran had 18 million gamers between the ages of three and forty. Café Bazaar is increasingly looking towards games to drive future revenue. Chinese developers have already staked a prominent position in the games offered by Cafe Bazaar. Their app marketplace offers games from major international developers including Supercell, Tap4Fun, and Elex.
In terms of revenue generated from game users, Iran ranks third behind Turkey and Saudi Arabia in the Middle East region according to data compiled by Newzoo.
According to Cafe Bazaar, there are about 120 non-Iranian publishers and developers, with over 800 apps, that offer apps through its platform. App developers receive 70% of revenue from their apps. There are local publishers that work with foreign developers to localize apps and games for a Persian-speaking customer base.
Media and video
In 2018, Cafe Bazaar announced a new collaboration with local VOD and IPTV service providers like Filimo to deliver video streaming services. The new service, at its inception, largely focused on the 2018 World Cup. After that, the video content was diversified on the platform with the help of other content providers. Currently, thousands of film and television programs are provided on the platform, including all popular Iranian titles, in addition to an IPTV channel for kids.
Financial transactions
As mobile games got more popular in Iran, Cafe Bazaar allowed In-App purchases with debit cards for popular foreign Android games. This is especially important as e-commerce is very popular in Iran and Debit Cards are the preferred system of payment. By 2015, 20% of Iranians reported shopping daily using their debit card, 24% weekly, and 28% on a monthly basis. As of 2016, Machinarium, Clash of Kings, Brothers in Arms 3, March of Empires, Township, King's Empire and other world renowned titles were participating in this mechanism. Prior to Cafe Bazaar facilitating the use of local debit cards for In-App purchases, users of foreign games like Clash of Clans, one of the most popular games in Iran, had to resort to using third-party websites were security was sometimes lacking and services were expensive.
Parent company and shareholders
Cafe Bazaar is a product of Hezardastan Information Technology Development Group that is owned by an international group of shareholders. According to the company, their shareholders are as follows:
Cafe Bazaar is part of a technology scene that has developed amid —and perhaps due to— international sanctions and strict censorship laws that have scared off global tech companies. Considering the fact that at the time, Google Play was not accessible to the Iranian users, Cafe Bazaar launched their marketplace offering not only the viral apps you see in Google Play, but local Iranian apps making a room for Iranian startups and app developers to launch their product in their homeland.
Investment and diversification
In 2018, Amsterdam-based International Internet Investment Coöperatief (IIIC) committed to investing €38 million in Cafe Bazaar's parent company, Hezardastan Information Technology Development Group, in exchange for a 10% stake. Co-Founder and Chairman Hessam Armandehi told ILNA that “[o]ur management structure will remain intact after the investment. … The money will be used to develop new services including a cloud service.” He added that “We are planning to turn Cafe Bazaar into a unicorn startup.” The investment of the Dutch firm will facilitate Cafe Bazaar moving into new fields of innovation.
Philanthropic work
Cafe Bazaar donated money to help rebuild a school in Revansar County, in the province of Kermanshah that was badly affected by the 2017 earthquake that devastated parts of western Iran. Cafe Bazaar teamed up with developers from Iran and abroad to raise funds. The school was opened on 26 November 2018.
Cafe Bazaar has sponsored a number of competitions and events aimed at promoting digital and programming knowledge in Iran and promoting Iran's information technology industry globally. These events include the 43rd ACM International Collegiate Programming Contest, the Iran Internet Programming Contest, the International Bebras Challenge on Informatics and Computational Thinking, and the annual Born in Iran festival. And building a site and designing an application and attending a webinar
See also
Google Play
App Store (iOS)
BlackBerry World
List of mobile software distribution platforms
List of most downloaded Android applications
Communications in Iran
References
External links
Online marketplaces of Iran
Mobile software distribution platforms
Iranian brands | Cafe Bazaar | [
"Technology"
] | 1,440 | [
"Mobile content",
"Mobile software distribution platforms"
] |
47,767,659 | https://en.wikipedia.org/wiki/Expressive%20therapies%20continuum | The Expressive Therapies Continuum (ETC) is a model of creative functioning used in the field of art therapy that is applicable to creative processes both within and outside of an expressive therapeutic setting. The concept was initially proposed and published in 1978 by art therapists Sandra Kagin and Vija Lusebrink, who based the continuum on existing models of human development and information processing.
This schematic model serves to describe and assess an individual's level of creative functioning based on aspects such as the artist's purpose for creating a piece, choice of medium, interaction with the chosen medium, and imagery within the piece. Conversely, it also serves to meet the needs of the client by assisting the art therapist in choosing a developmentally or situationally appropriate activity or art medium. By analyzing an individual's art making process and the resulting artwork using the ETC, art therapists can assess strengths, weaknesses, and disconnect in various levels of a client's cognitive functioning - suggesting or substantiating diagnosis of, or recovery from, a mental health condition.
History and Development
The Expressive Therapies Continuum was conceptualized by co-creators Lusebrink and Kagin after Lusebrink joined the faculty of the Institute of Expressive Therapies at the University of Louisville, which had been founded by Kagin. Kagin had earned a master's degree in special education and child psychology while working at a state facility in Kansas that served individuals with developmental and intellectual challenges. The institution received funding to study the adaptive behavior of residents, and this allowed Kagin to investigate their responses to media experiences in art therapy. Her thesis research revealed three discernable agents of change in the artmaking process; these could be therapeutically modified to affect client responses. She called these agents of change “Media Dimension Variables”, which consist of task complexity, task structure, and media properties.
Lusebrink's background included experience teaching art and volunteering at a state facility in California that served psychiatric populations. While at this institution she facilitated art therapy sessions and conducted research on individuals who had schizophrenia. She became involved in a study that examined the progression of schizophrenia among individuals who were not taking medication versus those who were. The brain wave studies that were collected in this research sparked Lusebrink's interest in the mental image formation process and the shift from nonconsciousness to consciousness. This interest ultimately led her to the work of psychologist Jerome Bruner and psychiatrist Mardi Horowitz. Each hypothesized a three-tier model related to the development of internal imagery based on physical, emotional, and intellectual information processing, and Lusebrink became fascinated with these concepts.
When Lusebrink learned about Kagin's Media Dimension Variables, she realized that task complexity, task structure, and media properties could be modified on an individualized basis to create therapeutic shifting among the levels of information processing that had been proposed by both Bruner and Horowitz. Lusebrink and Kagin collaborated to fuse their respective ideas into a framework that described how the targeted initiation of creative mental activity could yield therapeutic results by integrating overly differentiated kinds of information processing. Based on her earlier work with individuals who had developmental and intellectual challenges, Kagin made major contributions to the development of the Kinesthetic and Cognitive components of the ETC. Lusebrink's previous work with people who had schizophrenia positioned her to take the lead on formulating the Affective and Symbolic components.
In 1978 Lusebrink and Kagin published a paper, “The Expressive Therapies Continuum”, in the journal Art Psychotherapy (now The Arts in Psychotherapy). The article introduced the framework and exposed readers to concepts and terminology that were unfamiliar in art therapy at the time. The two presented the Expressive Therapies Continuum to their peers at the 1978 annual conference of the American Art Therapy Association, but the foreign-sounding ideas did not resonate with attendees.
Despite additional publications by Lusebrink, the development of knowledge and skills related to the ETC remained limited to Lusebrink and Kagin's students at the University of Louisville for several decades. During that time the two expanded their ideas, and the ETC evolved into an outcome-informed system that includes assessment, treatment planning, intervention, progress monitoring, and case conceptualization. In 2009 a former student of theirs, Lisa Hinz, published the first edition of Expressive Therapies Continuum: A Framework for Using Art in Therapy, and the ETC finally began to receive widespread recognition among art therapists in the United States. By that point in time the larger mental health field had begun to espouse ideas that aligned with the ETC; Lusebrink and Kagin's concepts and terminology no longer sounded so foreign to art therapy professionals.
Levels of functioning
According to Lusebrink:
The first three levels of the ETC reflect three established systems of human information processing: the Kinesthetic/Sensory (K/S level); the Perceptual/Affective (P/A level); and the Cognitive/Symbolic (C/S level) ... The fourth level of the ETC is the Creative level (CR). It is seen as a synthesis of the other three levels of the continuum.A diagram of the ETC, as pictured in the top right of the page, can be read from left to right and from the bottom, upwards. The model flows in a direction that travels from simple information processing and image formation to increasingly complex thought processes and interactions with the media. Individuals can fluctuate from level to level depending on personal and situational factors. They may also display an integration of all of the first three levels of functioning. This integration indicates that the individual is operating on the fourth and final level of functioning, known as the Creative level. The Creative level both transcends and intersects the prior three levels, in which the individual is either equally incorporating all aspects of the ETC or is able to find a satisfying and meaningful creative experience on one of the three levels alone.
However, an individual cannot wholly operate at both ends of a level, as each level is bipolar. For example, if the individual is more focused on the quick and scribbly movement of a chalk-pastel on paper, then he or she is less focused on the sensory aspects of the media, such as the sound of the chalk against the paper or the powdery feel of chalk in one's hand.
Kinesthetic/Sensory Level (K/S)
As the first level of the ETC, the Kinesthetic/Sensory level is described as a form of preverbal information processing that is "rhythmic, tactile, and sensual". This simple type of interaction with various art media stimulates primal areas of the brain and meets basic expressive needs—all while providing sensory and kinesthetic feedback for the artist. If an individual is operating at the kinesthetic end of the spectrum, he or she may find satisfaction in movement—i.e. pounding at a piece of clay or scribbling frantically with a crayon. In contrast, if the individual is gravitating towards the sensory end of the spectrum, he or she might take more pleasure in the feel of finger-paints or the smell of scented markers.
This level is particularly useful for young children but may also be useful for anyone needing to focus on sensorimotor skills. In addition, functioning at this level may allow for better access to preverbal memories or expression of extreme emotions. Individuals may identify operation at the K/S as a personal coping mechanism, in which the experience rather than the product is viewed as therapeutic.
Perceptual/Affective Level (P/A)
The second level of the ETC, the Perceptual/Affective level may or may not include verbal thought processes. However, the focus has shifted from the experience alone (with little focus on the outcome, as in the K/S level) to using the media to create an intentionally expressive or self-satisfying final product. The process may be characterized either by an individual's intent to express his or her own literal reality or be characterized by content that is "emotional and raw...without regard to form".
By working with individuals at the P/A level, art therapists can help clients to perceive images or notions in a new way, strengthening communication and assisting with the formation of meaningful relationships. They can also focus on the identification and healthy expression of one's emotions.
Cognitive/Symbolic Level (C/Sy)
Operation at the third level of the ETC, the cognitive/symbolic level, requires "complex and sophisticated" information processing, in which the individual consciously and strategically plans—prior to creating the art piece—for an expressive and self-satisfying final product. At this level, individuals are able to step outside their own sphere of perception and emotional expression and focus on ways that they interact with the world around them. They may begin to use satire and hidden meanings in their pieces to best express their unique response to their surroundings or situation (symbolic) or use art to plan and to problem-solve (cognitive).
Creative Level (Cr)
The final level, which either intersects the previous three levels or transcends above them, is the Creative level. This level symbolizes a wholeness, in which the individual achieves a sense of joy, fulfillment, or wellbeing by taking part in the creative process and expressing the self. This may be accomplished through the integration of the three previous levels (where there was inclusion of all expressive operations in the art-making process; a feeling of oneness) or success in fulfilling an individual's need at any given level, which may be healing in and of itself.
Implications for art therapy
This model of creative functioning has been used by Cornelia Elbrecht as a theoretical framework to support sensorimotor art therapy. It is especially useful within trauma-informed practice because the three levels of creative functioning (K/S P/A C/Sy) can be linked to the three levels of neurobiological functioning as identified by neuroscientist and trauma-expert Bruce Perry in his Neurosequential 'RRR' model: regulate, relate, reason. Each level corresponds to a level of brain functioning which goes from:
1) REGULATING the nervous system thanks to autonomic homeostasis (the brainstem, cerebellum and mid-brain) which is also what happens at a K/S level during sensorimotor art therapy;
2) RELATING thanks to emotional resonance and the perception of facial expressions (the limbic system) which is also what happens at a P/A level when an emotional response occurs in relation to the colour and forms perceived in the artwork;
3) REASONING thanks to the identification of meaning in the process and/or finished product (thanks to the neo-cortex and executive functions), which is what happens at a C/Sy level.
Lusebrink and Hinz in their chapter "The expressive therapies continuum as a framework for the treatment of trauma" describe the continuum's usefulness for distinguishing 'bottom up' and 'top down' processes within psychodynamic art therapy. Within the field of psychodynamic art therapy Mimma Della Cagnoletta in Italy has developed an additional model "The three modalities of the creative process" which offers a framework that has been developed from Thomas Ogden's three states of experience. Instead of linking to neurobiological levels of functioning, Della Cagnoletta places the creative process within an intra- and extra-psychic framework derived from psychoanalytical perspective. As such the modalities explain the way in which the person is relating with their environment in terms of the fears and defense mechanisms that are operating, and the resources that are being activated. Having a simpler practical structure of only 3 modalities, it offers the art therapist an immediate and operational guide in the here and now of the service user’s relationship with the art materials during the creative process.
References
Behavioural sciences | Expressive therapies continuum | [
"Biology"
] | 2,464 | [
"Behavioural sciences",
"Behavior"
] |
47,767,681 | https://en.wikipedia.org/wiki/Phellodon%20secretus | Phellodon secretus is a rare species of tooth fungus in the family Bankeraceae. Described as new to science in 2003, it is found in Finland, where it grows under the fallen trunks of pine trees. It somewhat resembles Phellodon connatus, but has a thinner stipe, a softer, cotton-like cap, and smaller, rounder spores.
References
External links
Fungi described in 2003
Fungi of Europe
Inedible fungi
secretus
Fungus species | Phellodon secretus | [
"Biology"
] | 95 | [
"Fungi",
"Fungus species"
] |
47,767,701 | https://en.wikipedia.org/wiki/Phellodon%20rufipes | Phellodon rufipes is a species of tooth fungus in the family Bankeraceae. It was described as new to science in 1971 by Dutch mycologist Rudolph Arnold Maas Geesteranus, from collections made in Japan.
References
External links
Fungi described in 1971
Fungi of Japan
Inedible fungi
rufipes
Fungus species | Phellodon rufipes | [
"Biology"
] | 67 | [
"Fungi",
"Fungus species"
] |
47,767,738 | https://en.wikipedia.org/wiki/Phellodon%20radicatus | Phellodon radicatus is a species of tooth fungus in the family Bankeraceae. It was described as new to science in 1985 from collections made in Gainesville, Florida.
References
External links
Fungi described in 1985
Fungi of the United States
Inedible fungi
radicatus
Fungi without expected TNC conservation status
Fungus species | Phellodon radicatus | [
"Biology"
] | 66 | [
"Fungi",
"Fungus species"
] |
47,767,818 | https://en.wikipedia.org/wiki/Phellodon%20putidus | Phellodon putidus is a species of tooth fungus in the family Bankeraceae. Found in North America, it was first described scientifically by George F. Atkinson as Hydnum putidum in 1900. Howard James Banker transferred it to the genus Phellodon in 1906.
References
External links
Fungi described in 1900
Fungi of North America
putidus
Fungus species | Phellodon putidus | [
"Biology"
] | 76 | [
"Fungi",
"Fungus species"
] |
47,767,884 | https://en.wikipedia.org/wiki/Phellodon%20plicatus | Phellodon plicatus is a species of tooth fungus in the family Bankeraceae. Found in Australia, it was first described in 1925 by Curtis Gates Lloyd as a species of Hydnum. Dutch mycologist Rudolph Arnold Maas Geesteranus transferred it to the genus Phellodon in 1966.
References
External links
Fungi described in 1925
Fungi of Australia
Inedible fungi
plicatus
Fungus species | Phellodon plicatus | [
"Biology"
] | 83 | [
"Fungi",
"Fungus species"
] |
47,767,949 | https://en.wikipedia.org/wiki/Phellodon%20tenuis | Phellodon tenuis is a species of tooth fungus in the family Bankeraceae. Found in Brazil, it was described as new to science in 1988 by Richard Baird.
References
External links
Fungi described in 1988
Fungi of South America
Inedible fungi
tenuis
Fungus species | Phellodon tenuis | [
"Biology"
] | 55 | [
"Fungi",
"Fungus species"
] |
47,767,987 | https://en.wikipedia.org/wiki/Phellodon%20nothofagi | Phellodon nothofagi is a species of tooth fungus in the family Bankeraceae. Found in New Zealand, it was described as new to science in 1971 by mycologist Robert Francis Ross McNabb.
References
External links
Fungi described in 1971
Fungi of New Zealand
Inedible fungi
nothofagi
Fungus species | Phellodon nothofagi | [
"Biology"
] | 65 | [
"Fungi",
"Fungus species"
] |
47,768,047 | https://en.wikipedia.org/wiki/Phellodon%20mississippiensis | Phellodon mississippiensis is a species of tooth fungus in the family Bankeraceae. It was described as new to science by mycologist Richard Baird in 2014 from collections made in the Tombigbee National Forest in Mississippi. It is one of the few Phellodon species with clamp connections in the hyphae.
References
External links
Fungi described in 2014
Fungi of the United States
Inedible fungi
mississippiensis
Fungi without expected TNC conservation status
Fungus species | Phellodon mississippiensis | [
"Biology"
] | 94 | [
"Fungi",
"Fungus species"
] |
47,768,144 | https://en.wikipedia.org/wiki/Phellodon%20excentrimexicanus | Phellodon excentrimexicanus is a species of tooth fungus in the family Bankeraceae. Found in Mexico, it was described as new to science in 1985 by mycologist Richard Baird (the original epithet spelling was "excentri-mexicana"). It is similar in appearance to Phellodon fibulatus, which is found in the southern Appalachian Mountains, but the Mexican species lacks clamp connections, and its stipe is consistently eccentric (i.e., attached to the side, rather than the center, of the cap).
References
External links
Fungi described in 1985
Fungi of Mexico
Inedible fungi
excentrimexicanus
Fungus species | Phellodon excentrimexicanus | [
"Biology"
] | 139 | [
"Fungi",
"Fungus species"
] |
47,768,197 | https://en.wikipedia.org/wiki/Phellodon%20indicus | Phellodon indicus is a species of tooth fungus in the family Bankeraceae. Found in Himachal Pradesh, India, it was described as new to science in 1978.
References
External links
Fungi described in 1971
Fungi of India
Inedible fungi
indicus
Fungus species | Phellodon indicus | [
"Biology"
] | 55 | [
"Fungi",
"Fungus species"
] |
47,768,238 | https://en.wikipedia.org/wiki/Phellodon%20atratus | Phellodon atratus is a species of tooth fungus in the family Bankeraceae. Found in North America, it was described as new to science in 1964 by Canadian mycologist Kenneth A. Harrison. It occurs most frequently closer to the Pacific coast and under Sitka spruce.
Description
The cap is dark violet to black, sometimes making it difficult to see; the margins are usually lighter. It is wide, while the off-center stipe is tall. The flesh is violet or blue-black. It has a mild smell and produces a white spore print.
Similar species
Phellodon melaleucus is similar, but appears more brownish, also staining brown. Other lookalikes include P. niger, P. alboniger, P. melaleucus, P. tomentosus, and members of Hydnellum.
References
External links
Fungi described in 1964
Fungi of North America
Inedible fungi
atratus
Fungus species | Phellodon atratus | [
"Biology"
] | 195 | [
"Fungi",
"Fungus species"
] |
47,768,408 | https://en.wikipedia.org/wiki/Phellodon%20fibulatus | Phellodon fibulatus is a species of tooth fungus in the family Bankeraceae. Found in the United States, the fungus was described as new to science in 1972 by Canadian mycologist Kenneth A. Harrison. It is one of the few species of Phellodon that possess clamp connections in its hyphae.
References
External links
Fungi described in 1972
Fungi of the United States
Inedible fungi
fibulatus
Fungi without expected TNC conservation status
Fungus species | Phellodon fibulatus | [
"Biology"
] | 96 | [
"Fungi",
"Fungus species"
] |
47,768,452 | https://en.wikipedia.org/wiki/Phellodon%20implicatus | Phellodon implicatus is a species of tooth fungus in the family Bankeraceae. It was described as new to science in 1986 from collections made in Florida. It is one of the few Phellodon species known to possess clamp connections in its hyphae.
References
External links
Fungi described in 1986
Fungi of the United States
Inedible fungi
implicatus
Fungi without expected TNC conservation status
Fungus species | Phellodon implicatus | [
"Biology"
] | 85 | [
"Fungi",
"Fungus species"
] |
66,078,568 | https://en.wikipedia.org/wiki/Technocreep | Technocreep: The Surrender of Privacy and the Capitalization of Intimacy is a 2014 book by Thomas P. Keenan, an adjunct professor of computer science at the University of Calgary.
The book includes tips about how to increase one's personal privacy, and how to catch companies selling one's data.
Technocreep was a recommended book for the secondary schools of British Columbia during the 2015-2016 academic year, and was also recommended by the Office of the Information and Privacy Commissioner of British Columbia.
Reception
The Daily Californian described the book as having an "Atwoodian flavor". The Rumpus said "Keenan lays out the evidence calmly, methodically and without polemics." Quill & Quire called it a "companion guide" to life in a post-Snowden world.
The book was a featured topic on Science for the People.
References
External links
2014 non-fiction books | Technocreep | [
"Technology"
] | 182 | [
"Computing stubs",
"Computer book stubs"
] |
66,078,970 | https://en.wikipedia.org/wiki/David%20Sobral | David Ricardo Serrano Gonçalves Sobral (born 11 February 1986) is a Portuguese Astrophysicist, best known for the discovery of galaxy CR-7. He was an Astrophysics lecturer and Reader at Lancaster University from January 2016 to August 2022.
Publications
A large H alpha survey at z=2.23, 1.47, 0.84 and 0.40: the 11 Gyr evolution of star-forming galaxies from HiZELS, Monthly Notices of the Royal Astronomical Society in 2013
Evidence for PopIII-like stellar populations in the most luminous Lyα emitters at the epoch of reionization: spectroscopic confirmation, The Astrophysical Journal 808 (2)
Chasing a Starlight: Investigating One of the Oldest Known Galaxies with MUSE
References
Astrophysics
Living people
Academics of Lancaster University
Portuguese astronomers
Astrophysicists
1986 births
Alumni of the University of Edinburgh | David Sobral | [
"Physics",
"Astronomy"
] | 180 | [
"Astrophysicists",
"Astronomical sub-disciplines",
"Astrophysics"
] |
66,079,715 | https://en.wikipedia.org/wiki/V%20Persei | V Persei, also known as Nova Persei 1887 was discovered by Williamina Fleming on a Harvard College Observatory objective-prism photograph taken on 3 November 1887. It is believed to be the first nova whose spectrum was recorded. The nova had an apparent magnitude of 9.2 at the time of discovery. Judging from the consistency of the nova's brightness after discovery, and details of the spectral lines seen, McLaughlin estimated that the nova was five or six months past peak brightness at the time of its discovery, and at its peak it was almost certainly at least as bright as 4th magnitude. So V Persei was probably visible to the naked eye, though there is no record that anyone actually noticed it when that was possible. It is currently an 18th magnitude object.
All novae are binary stars, with a "donor" star orbiting so close to a white dwarf companion that matter is transferred from the donor to the white dwarf. Because the stars are so close together, novae are often eclipsing binaries, and V Persei shows such eclipses. That allows the orbital period, 2.57 hours, to be measured easily. The peak-to-peak brightness variation during the eclipse cycle is about 0.5 magnitudes. Classical novae, like V Persei, are a type of cataclysmic variable star (CV) and the orbital periods of CVs have a bimodal distribution with peaks around 1.4 and 10 hours. Few CVs have orbital periods between 2 and 3 hours. Because of this, V Persei's 2.57 hour period makes it a useful object for constraining models of CV evolution.
In 1997 the William Herschel Telescope was used to search for a resolved shell surrounding V Persei, but none was found.
References
Perseus 1887, Nova
Perseus (constellation)
Persei, V | V Persei | [
"Astronomy"
] | 379 | [
"Perseus (constellation)",
"Astronomical events",
"Constellations",
"Novae"
] |
66,079,732 | https://en.wikipedia.org/wiki/Mark%20Bowick | Mark John Bowick (born 1957) is a theoretical physicist in condensed matter theory and high energy physics. He is the deputy director of the Kavli Institute for Theoretical Physics at the University of California, Santa Barbara, and a Visiting Distinguished Professor of Physics in UCSB's Physics Department.
Early life and education
Bowick was born in Rotorua, New Zealand, and earned his bachelor's degree, B.Sc. (Hons.), at the University of Canterbury in Christchurch. In 1983, he received his Ph.D. in theoretical physics from the California Institute of Technology, where he held an Earle C. Anthony Graduate Fellowship.
Professional career
Bowick then spent three years at Yale University as the research associate of their Sloane Physics Lab's "Particle Theory Group," followed by a two-year postdoctoral position at the Center for Theoretical Physics, at MIT.
He was awarded first prize in the 1986 Gravity Research Foundation Essay Competition. In 1987, he joined the faculty of the physics department at Syracuse University, where he was granted an Outstanding Junior Investigator award, from the United States Department of Energy, for the years 1987 to 1994. At Syracuse, Bowick served as assistant and associate professor from 1987 to 1998, was promoted to full professor of physics in 1998, and went on to become director of the Soft Matter Program from 2011 to 2016.
In August 2016, the Kavli Institute for Theoretical Physics, at the University of California, Santa Barbara, invited Bowick to join as deputy director and visiting distinguished professor of physics.
Research
Bowick's research interests include symmetry breaking, the interplay of order and geometry, topological defects, building blocks for supramolecular self-assembly, membrane statistical mechanics, shaped structures, and common themes in condensed matter and particle physics.
Since 2002, his career has been split between high-energy physics and condensed matter physics, with ongoing research support by the National Science Foundation.
Honors and awards
First prize in the Gravity Research Foundation Essay Competition (1986)
Outstanding Junior Investigator, United States Department of Energy (1987–1994)
Fellow of the American Physical Society, Division of Condensed Matter Physics (elected 2004)
Fellow of the American Association for the Advancement of Science (elected 2022).
Syracuse honored Bowick with two commendations: the Chancellor's Citation for Exceptional Academic Achievement in 2006, and the William Wasserstrom Prize for Excellence in Graduate Teaching and Advising in 2009. He was also named the Joel Dorman Steele Professor of Physics in 2013.
Personal life
Bowick is married to theoretical physicist M. Cristina Marchetti. They have two adult children.
In 2016, while director of Syracuse University's Soft Matter Program, Bowick commissioned composer Andrew Waggoner to write music for their Active And Smart Matter Conference: A New Frontier for Science & Engineering. The world premiere of this eclectic composition, entitled Hexacorda Mollia, was performed by the JACK Quartet on June 22, 2016.
Selected publications
Bowick, MJ and LCR Wijewardhana, Superstrings at High Temperature, Physical Review Letters 54 (23), 2485 (1985).
Bowick, MJ, and TW Appelquist, D Karabali, LCR Wijewardhana, Spontaneous chiral-symmetry breaking in three-dimensional QED, Physical Review D 33 (12), 3704 (1986).
Bowick, MJ, and L Chandar, EA Schiff, AM Srivastava, The Cosmological Kibble Mechanism in the Laboratory – String Formation in Liquid-Crystals, Science 263 (5149), 943–944 (1994).
Bowick, MJ and A Travesset, The statistical mechanics of membranes, Physics Reports 344 (4-6), 255–308 (2001).
Bowick, MJ, and AR Bausch, A Cacciuto, AD Dinsmore, MF Hsu, DR Nelson, ... Grain boundary scars and spherical crystallography, Science 299 (5613), 1716–1718 (2003).
Bowick, MJ and L Giomi, Two-Dimensional Matter: Order, Curvature and Defects, Advances in Physics 58 (5), 449–563 (2009).
Bowick MJ, and L Giomi, X Ma, MC Marchetti, Defect annihilation and proliferation in active nematics, Physical Review Letters 110 (22), 228101 (2013).
Bowick, MJ, and FC Keber, E Loiseau, T Sanchez, SJ DeCamp, L Giomi, ... Topology and dynamics of active nematic vesicles, Science 345 (6201), 1135–1139 (2014).
References
External links
Group webpage at Kavli Institute for Theoretical Physics
Mark Bowick on Google Scholar
1957 births
20th-century American physicists
21st-century American physicists
Living people
People from Rotorua
California Institute of Technology alumni
University of California, Santa Barbara faculty
American particle physicists
American theoretical physicists
Syracuse University faculty
Fellows of the American Physical Society
University of Canterbury alumni
Topological dynamics
American condensed matter physicists
Fellows of the American Association for the Advancement of Science
20th-century New Zealand physicists | Mark Bowick | [
"Mathematics"
] | 1,066 | [
"Topology",
"Topological dynamics",
"Dynamical systems"
] |
66,080,932 | https://en.wikipedia.org/wiki/Bird%20of%20Washington | The Bird of Washington, Washington Eagle, or Great Sea Eagle (Falco washingtonii, F. washingtoniensis, F. washingtonianus, or Haliaetus washingtoni) was a putative species of sea eagle which was claimed in 1826 and published by John James Audubon in his famous work The Birds of America. It is now not recognised as a valid species. Theories about its true nature include the following:
It was a juvenile specimen or subspecies of bald eagle (Haliaeetus leucocephalus).
It was an invention and that the picture was plagiarised from a picture of a golden eagle in Rees's Cyclopædia.
It was actually a genuine species, but it was rare and became extinct after Audubon's sightings.
John James Audubon's painting of the bird was acquired by Sidney Dillon Ripley, and his family donated it to the Smithsonian American Art Museum in 1994.
References
Further reading
Allen, J. A. 1870. "What is the ‘Washington Eagle'?" The American Naturalist 4: pp 524–527.
Audubon, J. J. 1828. "Notes on the Bird of Washington (Fálco Washingtoniàna), or Great American Sea Eagle." Magazine of Natural History 1: pp 115–120.
Maruna, S. 2006. "Substantiating Audubon's Washington Eagle." Ohio Cardinal 29: pp 140–150.
Cryptozoology
Fictional birds of prey
Scientific misconduct
John James Audubon
Ornithological fraud
Hypothetical species | Bird of Washington | [
"Technology",
"Biology"
] | 322 | [
"Hypothetical species",
"Scientific misconduct",
"Controversial taxa",
"Controversial bird taxa",
"Ethics of science and technology",
"Biological hypotheses"
] |
66,081,014 | https://en.wikipedia.org/wiki/HD%204313 | HD 4313 is a star with an orbiting exoplanetary companion in the constellation of Pisces. It has an apparent visual magnitude of 7.83, which is too faint to be reading visible to the unaided eye. The systam is located at a distance of 446 light years based on parallax, and is drifting further away with a radial velocity of 14.5 km/s. This is a single star, which means it has no binary partners, at least in range of projected separations from 6.85 to 191.78 AU. It hosts an extrasolar planet.
This is an aging K-type star with a mass of nearly twice the Sun, although different methods give mass estimates which differ as much as . It is a swollen star with 5.14 times the radius of the Sun, and has a cool effective temperature of 4,966 k. The "IV" in the spectral class means it's a K-type subgiant star which has exhausted the hydrogen at its core, and cooling and expanding to become a red giant. It is around two billion years in age and is spinning with a projected rotational velocity of 1.9 km/s.
Planetary system
HD 4313 has a superjovian exoplanet orbiting it. This exoplanet was discovered in 2010. It is orbiting the star at a distance of with an orbital period of 356 days and an eccentricity (ovalness) of 0.15. As the orbital inclination is unknown, only a lower bound on the mass can be determined. The exoplanet has at least 1.2 times the mass of Jupiter.
References
K-type subgiants
Planetary systems with one confirmed planet
Pisces (constellation)
BD+07 104
004313
003574
J00454035+0750421 | HD 4313 | [
"Astronomy"
] | 378 | [
"Pisces (constellation)",
"Constellations"
] |
66,081,438 | https://en.wikipedia.org/wiki/Kepler-1649 | Kepler-1649 is a red dwarf star of spectral type M5V with a radius , a mass , and a metallicity of -0.15 [Fe/H].
Planetary system
Two confirmed planets orbit the star: Kepler-1649b and Kepler-1649c. Kepler-1649b is similar to Venus, whereas Kepler-1649c is a potentially habitable exoplanet similar to Earth.
References
M-type main-sequence stars
Kepler objects of interest
Cygnus (constellation)
TIC objects | Kepler-1649 | [
"Astronomy"
] | 105 | [
"Cygnus (constellation)",
"Constellations"
] |
66,081,592 | https://en.wikipedia.org/wiki/Planetary%20Habitability%20Laboratory | The Planetary Habitability Laboratory (PHL) is a research remote laboratory intended to study the habitability of the Solar System and other stellar systems, specifically, potentially habitable exoplanets. The PHL is managed by the University of Puerto Rico at Arecibo with the collaboration of international scientists from different organizations including the SETI Institute and NASA. The Laboratory is directed by astrobiologist Professor Abel Méndez. PHL is especially known for its Habitable Exoplanets Catalog, one of the most comprehensive catalogs on exoplanetary habitability.
See also
List of potentially habitable exoplanets
References
University of Puerto Rico
NASA
Astrobiology
Arecibo, Puerto Rico | Planetary Habitability Laboratory | [
"Astronomy",
"Biology"
] | 140 | [
"Origin of life",
"Astrobiology stubs",
"Speculative evolution",
"Astrobiology",
"Astronomy stubs",
"Biological hypotheses",
"Astronomical sub-disciplines"
] |
66,082,562 | https://en.wikipedia.org/wiki/Lutetium%20phthalocyanine | Lutetium phthalocyanine () is a coordination compound derived from lutetium and two phthalocyanines. It was the first known example of a molecule that is an intrinsic semiconductor. It exhibits electrochromism, changing color when subject to a voltage.
Structure
is a double-decker sandwich compound consisting of a ion coordinated to two the conjugate base of two phthalocyanines. The rings are arranged in a staggered conformation. The extremities of the two ligands are slightly distorted outwards. The complex features a non-innocent ligand, in the sense that the macrocycles carry an extra electron. It is a free radical with the unpaired electron sitting in a half-filled molecular orbital between the highest occupied and lowest unoccupied orbitals, allowing its electronic properties to be finely tuned.
Properties
, along with many substituted derivatives like the alkoxy-methyl derivative , can be deposited as a thin film with intrinsic semiconductor properties; said properties arise due to its radical nature and its low reduction potential compared to other metal phthalocyanines. This initially green film exhibits electrochromism; the oxidized form is red, whereas the reduced form is blue and the next two reduced forms are dark blue and violet, respectively. The green/red oxidation cycle can be repeated over 10,000 times in aqueous solution with dissolved alkali metal halides, before it is degraded by hydroxide ions; the green/blue redox degrades faster in water.
Electrical properties
and other lanthanide phthalocyanines are of interest in the development of organic thin-film field-effect transistors.
derivatives can be selected to change color in the presence of certain molecules, such as in gas detectors; for example, the thioether derivative changes from green to brownish-purple in the presence of NADH.
References
Phthalocyanines
Lutetium complexes
Chemical tests
Organic semiconductors
Sandwich compounds
Free radicals | Lutetium phthalocyanine | [
"Chemistry",
"Biology"
] | 406 | [
"Free radicals",
"Molecular electronics",
"Semiconductor materials",
"Chemical tests",
"Sandwich compounds",
"Senescence",
"Biomolecules",
"Organometallic chemistry",
"Organic semiconductors"
] |
66,082,725 | https://en.wikipedia.org/wiki/Activity-driven%20model | In network science, the activity-driven model is a temporal network model in which each node has a randomly-assigned "activity potential", which governs how it links to other nodes over time.
Each node (out of total) has its activity potential drawn from a given distribution . A sequence of timesteps unfolds, and in each timestep each node forms ties to random other nodes at rate (more precisely, it does so with probability per timestep). All links are then deleted after each timestep.
Properties of time-aggregated network snapshots are able to be studied in terms of . For example, since each node after timesteps will have on average outgoing links, the degree distribution after timesteps in the time-aggregated network will be related to the activity-potential distribution by
Spreading behavior according to the SIS epidemic model was investigated on activity-driven networks, and the following condition was derived for large-scale outbreaks to be possible:
where is the per-contact transmission probability, is the per-timestep recovery probability, and (, ) are the first and second moments of the random activity-rate .
Extensions
A variety of extensions to the activity-driven model have been studied. One example is activity-driven networks with attractiveness, in which the links that a given node forms do not attach to other nodes at random, but rather with a probability proportional to a variable encoding nodewise attractiveness. Another example is activity-driven networks with memory, in which activity-levels change according to a self-excitation mechanism.
References
Random graphs | Activity-driven model | [
"Mathematics"
] | 327 | [
"Mathematical relations",
"Graph theory",
"Random graphs"
] |
66,084,756 | https://en.wikipedia.org/wiki/Rocketdyne%20LR-101 | The LR-101 is a fixed thrust, single start vernier thruster developed by Rocketdyne in the mid-to-late fifties and used in the Atlas, Thor and Delta launch vehicles until 1990.
Each of these rockets used two LR-101 secondary engines to provide yaw, pitch and roll control during their ascent to space. The pair of LR-101 vernier thrusters would receive their propellant flow from the turbopumps of the sustainer engine until it was shut off.
After sustainer burnout, this pair of thrusters would switch to feed off the remaining propellant, effectively becoming a Pressure-fed engine. The remaining fuel would then be spent for the last trajectory corrections and stabilization of the rocket before separating the payload.
Variants
Due to several modifications the LR-101 underwent over the years, there are many different variants of this engine (LR101-NA-3, LR101-NA-7, LR101-NA-9, LR101-NA-11, LR101-NA-13, etc).
One of the first changes was the downrating of the engine to a lower thrust level, both because the engine provided far more thrust than required to steer the rocket and to save fuel for the main engines. Another major change was the replacement of the original pyrotechnical ignition system with an igniter using a hypergolic fuel mixture composed of Triethylaluminum and Triethylborane.
Additionally, the Atlas, Thor and Delta Rockets each possessed unique aerodynamically shielded gimbal mounts in the vicinity of their primary engines to provide large arcs for the vernier thrusters. While the pair of LR-101s on the Atlas was mounted radially above the booster engines of the vehicle, on the Thor they were placed at the base of the vehicle.
Role in experimental rocketry
The LR-101 is one of the most common vernier thrusters utilized in American rocketry and has become a sought-after object for item collectors and builders of amateur rockets.
Rocket engineer Robert C. Truax, who had led the initial design studies for the PGM-17 Thor missile had planned on propelling his 'X-3 Volksrocket' with four Rocketdyne LR-101 engines, but despite many test firings the rocket never left the ground.
On the 'Galactic Aztec', the engine used RP-2 (Kerosene) as a propellant instead of RP-1, which was utilized in the SM-65 Atlas and PGM-17 Thor ballistic missiles as well as the later commercial Delta rockets.
See also
SM-65 Atlas - The first rocket to use the LR-101
Rocketdyne - The designer bureau of the LR-101
References
External links
Rocket engines using kerosene propellant
LR-101
North American Aviation
Rocket engines using the pressure-fed cycle
Rocket engines of the United States
Spacecraft components
Spacecraft attitude control
LR-105 | Rocketdyne LR-101 | [
"Astronomy"
] | 617 | [
"Rocketry stubs",
"Astronomy stubs"
] |
66,085,891 | https://en.wikipedia.org/wiki/Bed%20hangings | Bed hangings or bed curtains are fabric panels that surround a bed; they were used from medieval times through to the 19th century. Bed hangings provided privacy when the master or great bed was in a public room, such as the parlor, but also showed evidence of wealth when beds were located in areas of the home where . They also kept warmth in, and were a way of showing one's wealth. When bedrooms became more common in the mid-1700s, the use of bed hangings diminished.
Bed hangings were made of various fabrics, depending on the place, time period, and wealth of the owner. Fabrics included wool, cotton, linen, fustian, and, for those who could afford it, silk or velvet. Stitches were worked in wool or, for the rich or the nobility, silk and gold. Decorations on bed hangings also varied based on geography and time period. French hangings during the Renaissance might depict embroidered scenes from the Bible, mythology, or allegory. Hangings from the UK used floral, leaf, chinoiserie, and animal themes at various times, and those from the American Colonies often followed suit, though with less dense stitching to preserve scarce crewel wool. Examples of bed hangings can be found in museums and historic homes.
Purpose
Bed hangings, also known as bed "furniture," were used from medieval times through the 19th century, though their popularity waned from the mid 1700s. Bed hangings proved useful for several reasons. The master bed was often located in the parlor, and the hangings provided privacy. Other beds may have occupied the hall and kitchen, as well as the upstairs bedrooms.
Given the public locations of some beds, the decorated hangings also served as a show of wealth and helped to keep warmth in. Bed hangings in the second half of the 1600s through the first half of the 1700s were often embroidered with Jacobean motifs. Some hangings were embroidered with blue and green crewel wool on cream cotton and linen. Although many examples of crewel work survive, such curtains are rarely specified in inventories, and wealthier owners paid for embroidery in coloured silks and gold and silver thread. By the mid-18th century, separate rooms for sleeping were becoming more common. The spaces where beds were located were no longer areas where courtiers gathered, with the attendant need to impress. The need for bed hangings diminished.
Categories of bed hangings
Some medieval bed canopies and curtains were suspended from ceiling beams. In English these canopies were known as a "hung celour". The fabric canopy concealed an iron frame with iron curtain rods.These beds can be seen in manuscript illuminations, paintings, and engravings, showing cords suspending the front of the canopy to the ceiling. Such beds could easily be dismantled and the rich fabric hangings carefully packed away. Scottish inventories of the 16th and 17th-century mention "chapel beds". These had elaborate fabric canopies, apparently suspended from the ceiling of the bedchamber. Mary, Queen of Scots had a number of her chapel beds converted into "foure nuikit" four cornered standing beds in 1565, recycling rich fabrics from other beds and velvet covers were made for the new posts.
A complete set of bed furniture for a standing bed may include a coverlet (not technically a bed hanging), "a headcloth, three or four valences (depending on whether the bed was against the wall), side curtains, a tester cloth (canopy or celure), and bases, attached to the bed rail."
Headcloth (or Head cloth): this would hang above the head of the bed and extended just below the head board. It would normally be as wide as the bed. If there was extra width, it may have been designed to be wrapped around the bed posts.
Valences: these short pieces of fabric would extend around the top of the bed, outside of the other hangings, and would lie perfectly flat. They were the "crowning element in a set of bed hangings." They were usually in three pieces, one for each side and one for the bottom of the bed, but by the late 1700s a valence might be one long piece.
Side curtains: these would hang on both sides of the bed, and be used to cover the upper half of the bed.
Tester cloth: the canopy or celure for the bed (the word tester was occasionally used to mean the headcloth)
Foot curtains: these would be wider than the side curtains. They would be pulled both toward the center sides of the bed, to meet the side curtains, and towards the foot of the bed, to meet in the center across from the headcloth.
Bases: These would often be stiff, and used to cover the lower bed frame.
Cantonniéres or Bonnegrâces: A 17th-century elaboration was to place narrow fixed curtains at the corners or foot posts.
Case curtains: some elaborate 18th-century beds were given permanent protective case-curtains which ran on an iron rod in front of the bed proper to keep the dust off the precious fabrics. The French designer Daniel Marot called the cover curtains un tour de lit.
Bed curtains were lined with a show fabric, often different to the outside. Some beds had inner valances concealing the curtain rods and rings. In England, after 1620, wooden beds with carved wooden headboards became less popular than a fashionable type known as a "French bed", a fabric box often depicted in paintings and engravings, especially by Abraham Bosse. These beds could have headcloths, embroidered with the owner's heraldry. The curtains at the sides and ends were sometimes fixed at the top and designed to be pulled up and tied.
Materials
English bed curtains were often made of wool, though in the mid 1600s linen and cotton fabrics started to be used, particularly fustian, a heavy twill-woven cloth with a linen warp and a cotton weft. Baptist Hicks sold watchet (blue) velvet for a valence and watchet taffeta sarcenet for curtains to the Earl of Northumberland in 1586, from his London shop at the sign of the White Bear. Matching watchet fringes were supplied by a silkman, Mr Bate. Bess of Hardwick owned an opulent "Pearl bed" featuring the Cavendish heraldry, which she bequeathed to her daughter, the Countess of Shrewsbury. The valences were of black velvet embroidered with pearls and silver "sivines and woodbines" (wild raspberries and vines). The counterpane of black velvet was striped with silver and coiled silver purl.
In the late 1600s those who could afford it might use silk and velvet fabrics. Some wealthy householders had sets of summer and winter curtains. A woollen fabric called perpetuana was popular in the 17th century. The warm woollen curtains could be as sumptuously decorated with embroidery and passementerie as the suites of silk curtains used in summer.
Colonial American bed hangings were often made of home-grown linen or from local wool. These would be spun, dyed and woven, though finer fabrics were available for purchase.
Passementerie, lace, and fringes
Bed hanging fabrics were decorated and edged with fringes and borders of lace and passementerie. These were carefully described in the inventories of aristocrats and the wealthy. "Passamayne", a variety of bobbin woven lace was made of silver and gold Venice thread to trim the beds of Henry VIII and James V of Scotland. Bess of Hardwick had a canopy bed with six curtains, "striped" with gold and silver, and "layde with gold lace about the edges, and a gold twist downe the seams and fringed about with golde fringe". The curtains of a bed owned by Anne of Denmark in the first decade of the 17th century were made of fabric in panes of alternating colour, the seams covered with lace of green silk with gold and silver thread. In Cambridge, Massachusetts, in 1643, Elizabeth Glover owned 11 beds, one with curtains of "Cheney" glazed worsted wool with "a deep silke silk fring[e] on the vallance, & a smaller on the curtaines", and the counterpane was embellished with strips of green lace.
Aristocrats like Elizabeth Preston, Countess of Desmond of Kilkenny Castle, bought stocks of gold and silver thread for passementerie, which may have been made up to their specification by specialist weavers. After 1660, the words "galloon" or "loom lace" for woven lace applied to bed curtains replaced the older term "passamayne". Curtains were also decorated with tapes and ribbons.
Needlework decorations
Continental bed hangings
Embroidery was used to decorate bed hangings, with some of the finest embroidery produced in Caen, in France. Elaborately decorated bed hangings were known in medieval and renaissance France as courtepointerie, a term now associated with quilts. These sumptuous bed hangings were purchased by the nobility and royalty. In 1662, during the reign of Louis XIV, the royal Gobelins workshops were established. Although better known for their tapestries, there and at Versailles, professional embroiderers worked on royal commissions of bed hangings based on the designs of painters. During the Renaissance in France, bed valences were embroidered with scenes from the Bible, mythology, and allegory. Many bed hangings were made from velvet or satin and had applique interlacing and scroll designs. These motifs full of movement, as well as others that were delicate and refined in the 16th century were followed in the next by a more monumental style produced by professionals. Those of the highest quality were made by professionals. Bed hangings were highly valued possessions, and records from the Middle Ages through the 1700s indicate that they were their owners' most prized possessions.
In Italy, embroidered bed hangings had been made in Palermo since the 12th century. Professional workers embroidered padded gold threads on velvet or satin, used braid-outlined appliqué, sometimes with silk embroidery for use as furnishings such as valences. In the second half of the 17th century, lighter domestic embroidered work became more colorful, freer, and naturalistic.
In 1512, Bona Sforza of Aragon married King Zygmunt I of Poland. As part of her trousseau, she brought a four poster marriage bed with 23 hangings attached to the canopy. One of the most expensive "was made of silver material with a gold border, woven with the stylized inflorescence of artichokes."
English and Colonial American bed hangings
In England, Elizabeth of York, the wife of Henry VII, employed an embroiderer called Robynet to work on her "riche bedde" and other works in 1502. Robynet had a team of four men and three female embroiderers who were paid wages and board money to lodge in Richmond Palace for seven weeks. The account mentions black crewel wool used to "purfulle" or purfle around the roses, and tawny thread used to lay embroidered work on red satin edges. Making the shapes of roses and clouds involved the use of searing candles. Robynet also used round and flat gold thread.
Beds were made as proud displays of family and marital heraldry. William Capel (died 1515), mayor of London, and his wife Margaret Arundell, owned a bed with valences of crimson satin and red sarcenet silk curtains, embroidered with the Capel and Arundell arms, their anchor badge, and their motto. The Capel anchor badge was carved in the doorways at their house in Rayne, Essex.
The inventories of Henry VIII include a number of beds, recording the main fabric colours. Often, all the components were the same colour. There are also examples of the use of contrasting fabrics, with a bed with a crimson and purple canopy, yellow, white, and purple curtains, and a russet and yellow counterpoint or covering. The fabrics were enriched with embroiderery, and coloured stones and pearls. A pearl bed was supplied by Pierre Conyn in 1540, and a bed with rich Arras (tapestry) curtains was bought for Prince Edward from Petar van de Wall.
The most economical bed hangings were plain or mechanically decorated. Crewel embroidery with wool was used to decorate bed hangings in England and the colonial US from the mid 1600s to the mid 1700s.
The designs used in England were more dense than the open designs found in colonial America, and many used a wider range of stitches. Thread was hard to get in Colonial America, and so it was not used where it would not show. Colonial bed hangings used stitches where most of the wool is visible on the front, and not wasted on the back. Such stitches include economy (Romanian) stitch, flat stitch, herringbone, buttonhole, running (outline), and French and bullion knot stitches. Regardless, the work involved a great deal of time and effort, as it required decorating large expanses of fabric.
For bed hangings decorated at home, the colors of the embroidery depended on what was available for use, or what could be dyed. Those who had access to a full range of colors could embroider realistic floral designs, while others would select or be limited to a monochromatic color scheme. Blue and rose and blue and white were popular in the American colonies, with the blue dye coming from the household's indigo pot. The designs used varied with the country and the time period. Elizabethan designs had scrolling vines and animal patterns, Jacobean designs might be predominantly leaves. About the turn of the 17th century, chinoiserie design elements became popular. By the mid 1700s, designs were more natural and included pictorial elements, such as animals.
Artifacts
According to Hedlund, it is possible that few pieces of 17th century crewel bed hangings survive because women did not have the leisure time to work on them. More have survived from the 18th century. Few full sets of bed hangings were passed down intact, because their worth often meant they were divided amongst surviving heirs. In the New England in the US, the great bed and its hangings went to the eldest son, but if the bed hangings were embroidered, the bed might go to the eldest son and the hangings would be divided amongst the other children. Some pieces that still exist may never have been part of a full set. Later in the Colonial period some sets of hangings were smaller, including only side curtains at the head of the bed and valances.
Examples
In Great Britain, an embroidered valance made for Colin Campbell of Glenorchy and Katherine Ruthven including their initials and depicting Adam and Eve, is now at the Burrell Collection in Glasgow. They married in 1550 and the valance was used at Balloch. It was worked with silk threads on linen canvas, probably by a professional embroiderer in Scotland. The Oxburgh Hangings, hanging in Oxburgh Hall, were embroidered by Mary, Queen of Scots and Bess of Hardwick between 1570 and approximately 1585.
In 1597 the German traveller Paul Hentzner was shown a tester at Hampton Court which Anne Boleyn had embroidered as a gift for Henry VIII, this is not known to have survived. The Burrell Collection has a cream silk taffeta valance decorated with black velvet cutwork including the initials of Henry and Anne Boleyn, and their emblems of acorns and honeysuckle. The Tudor valance was preserved at Kimberly Hall by the Wodehouse family, who were relations of Anne Boleyn. A silk fabric-hung bed for Mary of Guise in a style of 1540 was recreated from inventory evidence in 2010 for display at Stirling Castle.
In the United States, the only complete set of embroidered bed hangings are those made by Mary Bulman, most likely in the 1730s, which are housed in the Old Gaol Museum in York, Maine. This set includes "four curtains, a coverlet, a headcloth, tester, outer valences, and inner valences." These inner valences contained an embroidered poem by Isaac Watts, "Meditation in a Grove." These valences would hang inside the bed curtains, where they could be read while in bed. When Mary's husband died in 1745, his probate inventory listed the value of the bed hangings as 20 pounds, which was the same amount as a 10-acre piece of land also in the inventory.
A set of bed hangings donated to the Museum of Fine Arts, Boston by Samuel Bradstreet, a descendant of the early American poet Anne Bradstreet, were worked in crewel in a pattern of large floral designs, and were likely made in the second quarter of the 1700s.
The New Elizabethan Embroidery Project created a new set of bed hangings in the Elizabethan style for the 16th century bed in the Grand Tudor chamber in Sulgrave Manor, the ancestral home of George Washington, the first president of the United States. Completed in 2007 by stitchers in both the US and the UK, the designs were inspired by motifs and symbols found elsewhere in the house.
The Rijksmuseum in Amsterdam has an almost complete set of 18th-century Chinese silk embroidered bed hangings, missing only the tester and the headboard. The designs include peacocks, flowering vines, foliage, butterflies, and vases of flowers. Created for the export trade, the set is extremely luxurious and was designed for a state bed, one meant to be seen.
See also
Canopy bed
Box-bed
Notes
References
Kaye, Myrna. (1998). There a Bed in the Piano. Boston: Bullfinch.
External links
Victoria and Albert Museum
The Prison Embroideries of Mary, Queen of Scots
Colonial Boston Embroidery (Museum of Fine Arts, Boston)
Rijksmuseum Chinese Silk Bed Hangings
Embroidery
Embroidery in the United States
Embroidery in the United Kingdom
Beds
Bedding
Needlework
Furnishings | Bed hangings | [
"Biology"
] | 3,719 | [
"Beds",
"Behavior",
"Sleep"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.