id int64 39 79M | url stringlengths 31 227 | text stringlengths 6 334k | source stringlengths 1 150 ⌀ | categories listlengths 1 6 | token_count int64 3 71.8k | subcategories listlengths 0 30 |
|---|---|---|---|---|---|---|
8,591,741 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Lynx | This is the list of notable stars in the constellation Lynx, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Lynx | List of stars in Lynx | [
"Astronomy"
] | 29 | [
"Lists of stars by constellation",
"Lynx (constellation)",
"Constellations"
] |
8,591,748 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Lyra | This is the list of notable stars in the constellation Lyra, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Lyra | List of stars in Lyra | [
"Astronomy"
] | 31 | [
"Lists of stars by constellation",
"Lyra",
"Constellations"
] |
8,591,753 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Mensa | This is the list of notable stars in the constellation Mensa, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Mensa | List of stars in Mensa | [
"Astronomy"
] | 31 | [
"Lists of stars by constellation",
"Mensa (constellation)",
"Constellations"
] |
8,591,756 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Microscopium | This is the list of notable stars in the constellation Microscopium, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Microscopium | List of stars in Microscopium | [
"Astronomy"
] | 35 | [
"Lists of stars by constellation",
"Microscopium",
"Constellations"
] |
8,591,759 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Monoceros | This is the list of notable stars in the constellation Monoceros, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Monoceros | List of stars in Monoceros | [
"Astronomy"
] | 33 | [
"Lists of stars by constellation",
"Monoceros",
"Constellations"
] |
8,591,764 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Musca | This is the list of notable stars in the constellation Musca, sorted by decreasing brightness.
See also
List of stars by constellation
Notes
References
List
Musca | List of stars in Musca | [
"Astronomy"
] | 32 | [
"Lists of stars by constellation",
"Musca",
"Constellations"
] |
8,591,770 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Norma | This is the list of notable stars in the constellation Norma, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Norma | List of stars in Norma | [
"Astronomy"
] | 29 | [
"Lists of stars by constellation",
"Norma (constellation)",
"Constellations"
] |
8,591,772 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Octans | This is the list of notable stars in the constellation Octans, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Octans | List of stars in Octans | [
"Astronomy"
] | 31 | [
"Lists of stars by constellation",
"Octans",
"Constellations"
] |
8,591,776 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Ophiuchus | This is the list of notable stars in the constellation Ophiuchus, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Ophiuchus | List of stars in Ophiuchus | [
"Astronomy"
] | 35 | [
"Lists of stars by constellation",
"Ophiuchus",
"Constellations"
] |
8,591,778 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Orion | This is the list of notable stars in the constellation Orion, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Orion | List of stars in Orion | [
"Astronomy"
] | 29 | [
"Lists of stars by constellation",
"Constellations",
"Orion (constellation)"
] |
8,591,785 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Pavo | This is the list of notable stars in the constellation Pavo, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Pavo | List of stars in Pavo | [
"Astronomy"
] | 31 | [
"Lists of stars by constellation",
"Constellations",
"Pavo (constellation)"
] |
8,591,788 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Pegasus | This is the list of notable stars in the constellation Pegasus, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Pegasus | List of stars in Pegasus | [
"Astronomy"
] | 29 | [
"Lists of stars by constellation",
"Pegasus (constellation)",
"Constellations"
] |
8,591,792 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Perseus | This is the list of notable stars in the constellation Perseus, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Perseus | List of stars in Perseus | [
"Astronomy"
] | 33 | [
"Perseus (constellation)",
"Lists of stars by constellation",
"Constellations"
] |
8,591,795 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Phoenix | This is the list of stars in the constellation Phoenix.
See also
List of stars by constellation
References
List
Phoenix | List of stars in Phoenix | [
"Astronomy"
] | 23 | [
"Lists of stars by constellation",
"Phoenix (constellation)",
"Constellations"
] |
8,591,799 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Pictor | This is the list of notable stars in the constellation Pictor, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Pictor | List of stars in Pictor | [
"Astronomy"
] | 31 | [
"Lists of stars by constellation",
"Pictor",
"Constellations"
] |
8,591,805 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Pisces | This is the list of notable stars in the constellation Pisces, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Pisces | List of stars in Pisces | [
"Astronomy"
] | 33 | [
"Lists of stars by constellation",
"Pisces (constellation)",
"Constellations"
] |
8,591,812 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Piscis%20Austrinus | This is the list of notable stars in the constellation Piscis Austrinus, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Piscis Austrinus | List of stars in Piscis Austrinus | [
"Astronomy"
] | 39 | [
"Piscis Austrinus",
"Lists of stars by constellation",
"Constellations"
] |
8,591,814 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Puppis | This is the list of notable stars in the constellation Puppis, sorted by decreasing brightness.
This constellation's Bayer designations (Greek-letter star names) were given while it was still considered part of the constellation of Argo Navis. After Argo Navis was broken up into Carina, Vela, and Puppis, these Greek-letter designations were kept, so that Puppis does not have a full complement of Greek-letter designations. For example, since Argo Navis's alpha star went to Carina, there is no Alpha Puppis.
See also
List of stars by constellation
References
List
Puppis | List of stars in Puppis | [
"Astronomy"
] | 128 | [
"Lists of stars by constellation",
"Puppis",
"Constellations"
] |
8,591,819 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Pyxis | This is the list of notable stars in the constellation Pyxis, sorted by decreasing brightness.
See also
Lists of stars by constellation
References
List
Pyxis | List of stars in Pyxis | [
"Astronomy"
] | 33 | [
"Lists of stars by constellation",
"Pyxis",
"Constellations"
] |
8,591,822 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Reticulum | This is the list of notable stars in the constellation Reticulum, sorted by decreasing brightness.
See also
List of stars by constellation
References
Notes
Bibliography
List
Reticulum | List of stars in Reticulum | [
"Astronomy"
] | 35 | [
"Lists of stars by constellation",
"Reticulum",
"Constellations"
] |
8,591,828 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Sagitta | This is the list of notable stars in the constellation Sagitta, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Sagitta | List of stars in Sagitta | [
"Astronomy"
] | 33 | [
"Lists of stars by constellation",
"Sagitta",
"Constellations"
] |
8,591,834 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Sagittarius | This is the list of notable stars in the constellation Sagittarius, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Sagittarius | List of stars in Sagittarius | [
"Astronomy"
] | 35 | [
"Lists of stars by constellation",
"Sagittarius (constellation)",
"Constellations"
] |
8,591,841 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Scorpius | This is the list of notable stars in the constellation Scorpius, sorted by decreasing brightness.
See also
Lists of stars by constellation
References
List
Scorpius | List of stars in Scorpius | [
"Astronomy"
] | 35 | [
"Lists of stars by constellation",
"Scorpius",
"Constellations"
] |
8,591,843 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Sculptor | This is the list of notable stars in the constellation Sculptor, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Sculptor | List of stars in Sculptor | [
"Astronomy"
] | 29 | [
"Lists of stars by constellation",
"Constellations",
"Sculptor (constellation)"
] |
8,591,847 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Scutum | This is the list of notable stars in the constellation Scutum, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Scutum | List of stars in Scutum | [
"Astronomy"
] | 33 | [
"Lists of stars by constellation",
"Scutum (constellation)",
"Constellations"
] |
8,591,853 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Serpens | This is the list of notable stars in the constellation Serpens, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Serpens | List of stars in Serpens | [
"Astronomy"
] | 33 | [
"Lists of stars by constellation",
"Constellations",
"Serpens"
] |
8,591,859 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Sextans | This is the list of notable stars in the constellation Sextans, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Sextans | List of stars in Sextans | [
"Astronomy"
] | 33 | [
"Lists of stars by constellation",
"Sextans",
"Constellations"
] |
8,591,867 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Taurus | This is the list of notable stars in the constellation Taurus, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Taurus | List of stars in Taurus | [
"Astronomy"
] | 31 | [
"Lists of stars by constellation",
"Taurus (constellation)",
"Constellations"
] |
8,591,869 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Telescopium | This is the list of notable stars in the constellation Telescopium, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Telescopium | List of stars in Telescopium | [
"Astronomy"
] | 37 | [
"Lists of stars by constellation",
"Telescopium",
"Constellations"
] |
8,591,873 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Triangulum | This is a list of notable stars in the constellation Triangulum, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Triangulum | List of stars in Triangulum | [
"Astronomy"
] | 33 | [
"Lists of stars by constellation",
"Triangulum",
"Constellations"
] |
8,591,877 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Triangulum%20Australe | This is the list of notable stars in the constellation Triangulum Australe, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Triangulum Australe | List of stars in Triangulum Australe | [
"Astronomy"
] | 39 | [
"Lists of stars by constellation",
"Triangulum Australe",
"Constellations"
] |
8,591,880 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Tucana | This is the list of notable stars in the constellation Tucana, sorted by decreasing brightness.
See also
List of stars by constellation
Notes
References
Allen, R. H. (1963). Star Names; Their Lore and Meaning, Dover Publications, Inc., New York, p. 418.
Wagman, M. (2003). Lost Stars, The Mcdonald & Woodward Publishing Company, Blacksburg, pp. 306–307.
List
Tucana | List of stars in Tucana | [
"Astronomy"
] | 92 | [
"Lists of stars by constellation",
"Tucana",
"Constellations"
] |
8,591,885 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Ursa%20Major | This is the list of notable stars in the constellation Ursa Major, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Ursa Major | List of stars in Ursa Major | [
"Astronomy"
] | 33 | [
"Lists of stars by constellation",
"Ursa Major",
"Constellations"
] |
8,591,892 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Ursa%20Minor | This is the list of notable stars in the constellation Ursa Minor, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Ursa Minor | List of stars in Ursa Minor | [
"Astronomy"
] | 33 | [
"Ursa Minor",
"Lists of stars by constellation",
"Constellations"
] |
8,591,895 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Vela | This is the list of notable stars in the constellation Vela, sorted by decreasing brightness.
This constellation's Bayer designations (Greek-letter star names) were given while it was still considered part of the constellation of Argo Navis. After Argo Navis was broken up into Carina, Vela, and Puppis, these Greek-letter designations were kept, so that Vela does not have a full complement of Greek-letter designations. For example, since Argo Navis's alpha star went to Carina, there is no Alpha Velorum.
See also
List of stars by constellation
References
List
Vela | List of stars in Vela | [
"Astronomy"
] | 129 | [
"Lists of stars by constellation",
"Vela (constellation)",
"Constellations"
] |
8,591,899 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Virgo | This is the list of notable stars in the constellation Virgo, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Virgo | List of stars in Virgo | [
"Astronomy"
] | 31 | [
"Lists of stars by constellation",
"Virgo (constellation)",
"Constellations"
] |
8,591,903 | https://en.wikipedia.org/wiki/List%20of%20stars%20in%20Volans | This is the list of notable stars in the constellation Volans, sorted by decreasing brightness.
See also
List of stars by constellation
References
List
Volans | List of stars in Volans | [
"Astronomy"
] | 31 | [
"Lists of stars by constellation",
"Volans",
"Constellations"
] |
8,592,308 | https://en.wikipedia.org/wiki/Comment%20%28computer%20programming%29 | In computer programming, a comment is text embedded in source code that a translator (compiler or interpreter) ignores. Generally, a comment is an annotation intended to make the code easier for a programmer to understand often explaining an aspect that is not readily apparent in the program (non-comment) code. For this article, comment refers to the same concept in a programming language, markup language, configuration file and any similar context. Some development tools, other than a source code translator, do parse comments to provide capabilities such as API document generation, static analysis, and version control integration. The syntax of comments varies by programming language yet there are repeating patterns in the syntax among languages as well as similar aspects related to comment content.
The flexibility supported by comments allows for a wide degree of content style variability. To promote uniformity, style conventions are commonly part of a programming style guide. But, best practices are disputed and contradictory.
Common attributes
Support for code comments is defined by each programming language. The features differ by language, but there are several common attributes that apply throughout.
Most languages support multi-line block (a.k.a. stream) and/or single line comments. A block comment is delimited with text that marks the start and end of comment text. It can span multiple lines or occupy any part of a line. Some languages allow block comments to be recursively nested inside one another, but others do not. A line comment ends at the end of the text line. In modern languages, a line comment starts with a delimiter but some older languages designate a column at which subsequent text is considered comment. Many languages support both block and line comments using different delimiters for each. For example, C, C++ and their many derivatives support block comments delimited by /* and */ and line comments delimited by //. Other languages support only one type of comment.
Comments can also be classified as either prologue or inline based on their position and content relative to program code. A prologue comment is a comment (or group of related comments) located near the top of an associated programming topic, such as before a symbol declaration or at the top of a file. An inline comment is a comment that is located on the same line as and to the right of program code to which is refers. Both prologue and inline comments can be represented as either line or block comments. For example:
/*
* prologue block comment; if is about foo()
*/
bool foo() {
return true; /* inline block comment; if is about this return */
}
//
// prologue line comment; if is about bar()
//
bool bar() {
return false; // inline line comment; if is about this return
}
Examples of use
Describe intent
Comments can explain the author's intent why the code is as it is. Some contend that describing what the code does is superfluous. The need to explain the what is a sign that it is too complex and should be re-worked.
"Don't document bad code – rewrite it."
"Good comments don't repeat the code or explain it. They clarify its intent. Comments should explain, at a higher level of abstraction than the code, what you're trying to do."
Highlight unusual practice
Comments may explain why a choice was made to write code that is counter to convention or best practice. For example:
' Second variable dim because of server errors produced when reuse form data.
' No documentation available on server behavior issue, so just coding around it.
vtx = server.mappath("local settings")
The example below explains why an insertion sort was chosen instead of a quicksort, as the former is, in theory, slower than the latter.
list = [f (b), f (b), f (c), f (d), f (a), ...];
// Need a stable sort. Besides, the performance really does not matter.
insertion_sort (list);
Describe algorithm
Comments can describe an algorithm as pseudocode. This could be done before writing the code as a first draft. If left in the code, it can simplify code review by allowing comparison of the resulting code with the intended logic. For example:
/* loop backwards through all elements returned by the server
(they should be processed chronologically)*/
for (i = (numElementsReturned - 0); i >= 1; i--) {
/* process each element's data */
updatePattern(i, returnedElements[i]);
}
Sometimes code contains a novel or noteworthy solution that warrants an explanatory comment. Such explanations might be lengthy and include diagrams and formal mathematical proofs. This may describe what the code does rather than intent, but may be useful for maintaining the code. This might apply for highly specialized problem domains or rarely used optimizations, constructs or function-calls.
Reference
When some aspect of the code is based on information in an external reference, comments link to the reference. For example as a URL or book name and page number.
Comment out
A common developer practice is to comment out one or more lines of code. The programmer adds comment syntax that converts program code into comments so that what was executable code will no longer be executed at runtime. Sometimes this technique is used to find the cause of a bug. By systematically commenting out and running parts of the program, the offending source code can be located.
Many IDEs support adding and removing comments with convenient user interface such as a keyboard shortcut.
Store metadata
Comments can store metadata about the code. Common metadata includes the name of the original author and subsequent maintainers, dates when first written and modified, link to development and user documentation, and legal information such as copyright and software license.
Some programming tools write metadata into the code as comments. For example, a version control tool might write metadata such as author, date and version number into each file when it's committed to the repository.
Integrate with development tools
Sometimes information stored in comments is used by development tools other than the translator the primary tool that consumes the code. This information may include metadata (often used by a documentation generator) or tool configuration.
Some source code editors support configuration via metadata in comments. One particular example is the modeline feature of Vim which configures tab character handling. For example:
# vim: tabstop=8 expandtab shiftwidth=4 softtabstop=4
Support documentation generation
An API documentation generator parses information from a codebase to generate API documentation. Many support reading information from comments, often parsing metadata, to control the content and formatting of the resulting document.
Although some claim that API documentation can be higher quality when written in a more traditional and manual way, some claim that storing documentation information in code comments simplifies the documenting process, as well as increases the likelihood that the documentation will be kept up to date. Examples include Javadoc, Ddoc, Doxygen, Visual Expert and PHPDoc. Forms of docstring are supported by Python, Lisp, Elixir, and Clojure. C#, F# and Visual Basic .NET implement a similar feature called "XML Comments" which are read by IntelliSense from the compiled .NET assembly.
Visualization
An ASCII art visualization such as a logo, diagram, or flowchart can be included in a comment.
The following code fragment depicts the process flow of a system administration script (Windows script file). Although a section marking the code appears as a comment, the diagram is in an XML CDATA section, which is technically not a comment, but serves the same purpose here. Although this diagram could be in a comment, the example illustrates one instance where the programmer opted not to use a comment as a way of including resources in source code.
<!-- begin: wsf_resource_nodes -->
<resource id="ProcessDiagram000">
<![CDATA[
HostApp (Main_process)
|
V
script.wsf (app_cmd) --> ClientApp (async_run, batch_process)
|
|
V
mru.ini (mru_history)
]]>
</resource>
Store resource data
Binary data may also be encoded in comments through a process known as binary-to-text encoding, although such practice is uncommon and typically relegated to external resource files.
Document development process
Sometimes, comments describe development processes related to the code. For example, comments might describe how to build the code or how to submit changes to the software maintainer.
Extend language syntax
Occasionally, code that is formatted as a comment is overloaded to convey additional information to the translator, such as conditional comments. As such, syntax that generally indicates a comment can actually represent program code; not comment code. Such syntax may be a practical way to maintain compatibility while adding additional functionality, but some regard such a solution as a kludge.
Other examples include interpreter directives:
The Unix "shebang" – #! – used on the first line of a script to point to the interpreter to be used.
"Magic comments" identifying the encoding a source file is using, e.g. Python's PEP 263.
The script below for a Unix-like system shows both of these uses:
#!/usr/bin/env python3
# -*- coding: UTF-8 -*-
print("Testing")
The gcc compiler (since 2017) looks for a comment in a switch statement if a case falls-thru to the next case. If an explicit indication of fall-thru is not found, then the compiler issues a warning about a possible coding problem. Inserting such a comment about fall-thru is a long standing convention, and the compiler has codified the practice. For example:
switch (command) {
case CMD_SHOW_HELP_AND_EXIT:
do_show_help();
/* Fall thru */
case CMD_EXIT:
do_exit();
break;
}
Relieve stress
To relieve stress or attempt humor, sometimes programmers add comments about the quality of the code, tools, competitors, employers, working conditions, or other arguably unprofessional topics sometimes using profanity.
Normative views
There are various normative views and long-standing opinions regarding the proper use of comments in source code. Some of these are informal and based on personal preference, while others are published or promulgated as formal guidelines for a particular community.
Need for comments
Experts have varying viewpoints on whether, and when, comments are appropriate in source code. Some assert that source code should be written with few comments, on the basis that the source code should be self-explanatory or self-documenting. Others suggest code should be extensively commented (it is not uncommon for over 50% of the non-whitespace characters in source code to be contained within comments).
In between these views is the assertion that comments are neither beneficial nor harmful by themselves, and what matters is that they are correct and kept in sync with the source code, and omitted if they are superfluous, excessive, difficult to maintain or otherwise unhelpful.
Comments are sometimes used to document contracts in the design by contract approach to programming.
Level of detail
Depending on the intended audience of the code and other considerations, the level of detail and description may vary considerably.
For example, the following Java comment would be suitable in an introductory text designed to teach beginning programming:
String s = "Wikipedia"; /* Assigns the value "Wikipedia" to the variable s. */
This level of detail, however, would not be appropriate in the context of production code, or other situations involving experienced developers. Such rudimentary descriptions are inconsistent with the guideline: "Good comments ... clarify intent." Further, for professional coding environments, the level of detail is ordinarily well defined to meet a specific performance requirement defined by business operations.
Styles
As free-form text, comments can be styled in a wide variety of ways. Many prefer a style that is consistent, non-obstructive, easy to modify, and difficult to break. As some claim that a level of consistency is valuable and worthwhile, a consistent commenting style is sometimes agreed upon before a project starts or emerges as development progresses.
The following C fragments show some of diversity in block comment style:
/*
This is the comment body.
*/
/***************************\
* *
* This is the comment body. *
* *
\***************************/
Factors such as personal preference, flexibility of programming tools can influence the commenting style used. For example, the first might be preferred by programmers who use a source code editor that does not automatically format a comment as shown in the second example.
Software consultant and technology commentator Allen Holub advocates aligning the left edges of comments:
/* This is the style recommended by Holub for C and C++.
* It is demonstrated in ''Enough Rope'', in rule 29.
*/
/* This is another way to do it, also in C.
** It is easier to do in editors that do not automatically indent the second
** through last lines of the comment one space from the first.
** It is also used in Holub's book, in rule 31.
*/
In many languages, a line comment can follow program code such that the comment is inline and generally describes the code to the left of it. For example, in this Perl:
print $s . "\n"; # Add a newline character after printing
If a language supports both line and block comments, programming teams may decide upon a convention of when to use which. For example, line comments only for minor comments, and block comments to for higher-level abstractions.
Tags
Programmers often use one of select words also known as tags, codetags and tokens to categorize the information in a comment. Programmers may leverage these tags by searching for them via a text editor or grep. Some editors highlight comment text based on tags.
Commonly used tags include:
BUG, DEBUG — identifies a known bug; maybe implying it should be fixed
FIXME — implies that there is work to do to fix a bug
HACK, BODGE, KLUDGE — marks a solution that might be considered low quality
TODO — describes some work to do
NOTE — relatively general information
UNDONE — a reversal or "roll back" of previous code
For example:
int foo() {
// TODO implement
}
Examples
Syntax for comments varies by programming language. There are common patterns used by multiple languages while also a wide range of syntax among the languages in general. To limit the length of this section, some examples are grouped by languages with the same or very similar syntax. Others are for particular languages that have less common syntax.
Curly brace languages
Many of the curly brace languages such as C, C++ and their many derivatives delimit a line comment with and a block comment with and . Originally, C lacked the line comment, but it was added in C99. Notable languages include: C, C++, C#, D, Java, JavaScript and Swift. For example:
/*
* Check if over maximum process limit, but be sure to exclude root.
* This is needed to make it possible for login to set per-user
* process limit to something lower than processes root is running.
*/
bool isOverMaximumProcessLimit() {
// TODO implement
}
Some languages, including D and Swift, allow blocks to be nested while other do not, including C and C++.
An example of nested blocks in D:
// line comment
/*
block comment
*/
/+ start of outer block
/+ inner block +/
end of outer block +/
An example of nested blocks in Swift:
/* This is the start of the outer comment.
/* This is the nested comment. */
This is the end of the outer comment. */
Scripting
A pattern in many scripting languages is to delimit a line comment with #. Support for a block comment varies. Notable languages include: Bash, Raku, Ruby, Perl, PowerShell, Python and R.
An example in R:
# This is a comment
print("This is not a comment") # This is another comment
Block in Ruby
A block comment is delimited by =begin and =end that start a line. For example:
puts "not a comment"
# this is a comment
puts "not a comment"
=begin
whatever goes in these lines
is just for the human reader
=end
puts "not a comment"
Block in Perl
Instead of a regular block commenting construct, Perl uses literate programming plain old documentation (POD) markup. For example:
=item Pod::List-E<gt>new()
Create a new list object. Properties may be specified through a hash
reference like this:
my $list = Pod::List->new({ -start => $., -indent => 4 });
=cut
sub new {
...
}
Raku (previously called Perl 6) uses the same line comments and POD comments as Perl, but adds a configurable block comment type: "multi-line / embedded comments". It starts with #` and then an opening bracket character and ends with the matching closing bracket character. For example:
#`{{ "commenting out" this version
toggle-case(Str:D $s)
Toggles the case of each character in a string:
my Str $toggled-string = toggle-case("mY NAME IS mICHAEL!");
}}
sub toggle-case(Str:D $s) #`( this version of parens is used now ){
...
}
Block in PowerShell
PowerShell supports a block comment delimited by <# and #>. For example:
# Single line comment
<# Multi
Line
Comment #>
Block in Python
Although Python does not provide for block comments a bare string literal represented by a triple-quoted string is often used for this purpose. In the examples below, the triple double-quoted strings act like comments, but are also treated as docstrings:
"""
At the top of a file, this is the module docstring
"""
class MyClass:
"""Class docstring"""
def my_method(self):
"""Method docstring"""
Browser markup
Markup languages in general vary in comment syntax, but some of the notable internet markup formats such as HTML and XML delimit a block comment with <!-- and --> and provide no line comment support. An example in XML:
<!-- select the context here -->
<param name="context" value="public" />
For compatibility with SGML, double-hyphen (--) is not allowed inside comments.
ColdFusion provides syntax similar to the HTML comment, but uses three dashes instead of two. CodeFusion allows for nested block comments.
Double dash
A relatively loose collection of languages use -- for a single line comment. Notable languages include: Ada, Eiffel, Haskell, Lua, SQL and VHDL. Block comment support varies. An example in Ada:
-- the air traffic controller task takes requests for takeoff and landing
task type Controller (My_Runway: Runway_Access) is
-- task entries for synchronous message passing
entry Request_Takeoff (ID: in Airplane_ID; Takeoff: out Runway_Access);
entry Request_Approach(ID: in Airplane_ID; Approach: out Runway_Access);
end Controller;
Block in Haskell
In Haskell, a block comment is delimited by {- and -}. For example:
{- this is a comment
on more lines -}
-- and this is a comment on one line
putStrLn "Wikipedia" -- this is another comment
Haskell also provides a literate programming method of commenting known as "Bird Style". Lines starting with > are interpreted as code and everything else is considered a comment. One additional requirement is a blank line before and after the code block:
In Bird-style you have to leave a blank before the code.
> fact :: Integer -> Integer
> fact 0 = 1
> fact (n+1) = (n+1) * fact n
And you have to leave a blank line after the code as well.
Literate programming can also be accomplished via LaTeX. Example of a definition:
\usepackage{verbatim}
\newenvironment{code}{\verbatim}{\endverbatim}
Used as follows:
% the LaTeX source file
The \verb|fact n| function call computes $n!$ if $n\ge 0$, here is a definition:\\
\begin{code}
fact :: Integer -> Integer
fact 0 = 1
fact (n+1) = (n+1) * fact n
\end{code}
Here more explanation using \LaTeX{} markup
Block in Lua
Lua supports block comments delimited by --[[ and ]] For example:
--[[A multi-line
long comment
]]
Block in SQL
In some variants of SQL, the curly brace language block comment (/**/) is supported. Variants include: Transact-SQL, MySQL, SQLite, PostgreSQL, and Oracle.
MySQL also supports a line comment delimited by #.
Less common syntax
APL
APL uses ⍝ for a line comment. For example:
⍝ Now add the numbers:
c←a+b ⍝ addition
In dialects that have the ⊣ ("left") and ⊢ ("right") primitives, comments can often be inside or separate statements, in the form of ignored strings:
d←2×c ⊣'where'⊢ c←a+ 'bound'⊢ b
AppleScript
AppleScript supports both line and block comments. For example:
# line comment (in later versions)
(*
This program displays a greeting.
*)
on greet(myGreeting)
display dialog myGreeting & " world!"
end greet
-- Show the greeting
greet("Hello")
BASIC
Early versions of BASIC used (short for remark) for a line comment.
10 REM This BASIC program shows the use of the PRINT and GOTO Statements.
15 REM It fills the screen with the phrase "HELLO"
20 PRINT "HELLO"
30 GOTO 20
In later variations, including Quick Basic, Q Basic, Visual Basic (VB), VB.NET, VBScript, FreeBASIC and Gambas, a line comment is delimited with ' (apostrophe). An example in VB.NET:
Public Class Form1
Private Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click
' new style line comment
rem old style line comment still supported
MessageBox.Show("Hello, World") ' show dialog with a greeting
End Sub
End Class
Cisco IOS and IOS-XE configuration
The exclamation point (!) may be used to mark comments in a Cisco router's configuration mode, however such comments are not saved to non-volatile memory (which contains the startup-config), nor are they displayed by the "show run" command.
It is possible to insert human-readable content that is actually part of the configuration, and may be saved to the NVRAM startup-config via:
The "description" command, used to add a description to the configuration of an interface or of a BGP neighbor
The "name" parameter, to add a remark to a static route
The "remark" command in access lists
! Paste the text below to reroute traffic manually
config t
int gi0/2
no shut
ip route 0.0.0.0 0.0.0.0 gi0/2 name ISP2
no ip route 0.0.0.0 0.0.0.0 gi0/1 name ISP1
int gi0/1
shut
exit
Fortran
The following Fortran IV code fragment shows that comment syntax is column-oriented. A letter C in the first column causes the entire line to be treated as a comment.
C
C Lines beginning with 'C' in the first (a.k.a. comment) column are comments
C
WRITE (6,610)
610 FORMAT(12H HELLO WORLD)
END
The following Fortran 90 code fragment shows a more modern line comment syntax; text following !.
! A comment
program comment_test
print '(A)', 'Hello world' ! also a comment
end program
MATLAB
In MATLAB's programming language, the '%' character indicates a single-line comment. Multi line comments are also available via %{ and %} brackets and can be nested, e.g.
% These are the derivatives for each term
d = [0 -1 0];
%{
%{
(Example of a nested comment, indentation is for cosmetics (and ignored).)
%}
We form the sequence, following the Taylor formula.
Note that we're operating on a vector.
%}
seq = d .* (x - c).^n ./(factorial(n))
% We add-up to get the Taylor approximation
approx = sum(seq)
Nim
Nim delimits a line comment with # and block comments with #[ and ]#. Block comments can be nested.
Nim also has documentation comments that use mixed Markdown and ReStructuredText markups.
A line documentation comment uses '##' and a block documentation comment uses '##[' and ']##'.
The compiler can generate HTML, LaTeX and JSON documentation from the documentation comments.
Documentation comments are part of the abstract syntax tree and can be extracted using macros.
## Documentation of the module *ReSTructuredText* and **MarkDown**
# This is a comment, but it is not a documentation comment.
type Kitten = object ## Documentation of type
age: int ## Documentation of field
proc purr(self: Kitten) =
## Documentation of function
echo "Purr Purr" # This is a comment, but it is not a documentation comment.
# This is a comment, but it is not a documentation comment.
OCaml
OCaml supports nestable comments. For exmaple:
codeLine(* comment level 1(*comment level 2*)*)
Pascal, Delphi
In Pascal and Delphi, a block comment is delimited by { and }, and as an alternative for computers that do not support these characters, (* and *) are also supported. A line comment is delimited by \\. In Niklaus Wirth's more modern family of languages (including Modula-2 and Oberon), comments are delimited by (* and *). Comments can be nested. For example:
(* test diagonals *)
columnDifference := testColumn - column;
if (row + columnDifference = testRow) or
.......
PHP
Comments in PHP can be either curly brace style (both line and block), or line delimited with #l. Blocks cannot be nested. Starting in PHP 8, a # only means comment if it's not immediately followed by [. Otherwise, it delimits an attribute, which continues till the next ]. For example:
/**
* This class contains a sample documentation.
* @author Unknown
*/
#[Attribute]
class MyAttribute {
const VALUE = 'value';
// C++ style line comment
private $value;
# script style line comment
public function __construct($value = null) {
$this->value = $value;
}
}
Security issues
In interpreted languages the comments are viewable to the end user of the program. In some cases, such as sections of code that are "commented out", this may present a security vulnerability.
See also
Comparison of programming languages (syntax)#Comments
Notes and references
Further reading
Movshovitz-Attias, Dana and Cohen, William W. (2013) Natural Language Models for Predicting Programming Comments. In Association for Computational Linguistics (ACL), 2013.
External links
How to Write Comments by Denis Krukovsky
Source Code Documentation as a Live User Manual by PTLogica
How to Write Comments for the Javadoc Tool
Source code
Articles with example code
Articles with example C code
Articles with example Java code
Articles with example Perl code
Metadata | Comment (computer programming) | [
"Technology"
] | 6,056 | [
"Metadata",
"Data"
] |
8,592,529 | https://en.wikipedia.org/wiki/Akmon | An akmon is a multi-ton concrete block used for breakwater and seawall armouring. It was originally designed in the Netherlands in the 1960s, as an improvement on the tetrapod.
References
See Also
Wave-dissipating concrete block
External links
Official site (Japanese)
Wave-dissipating concrete blocks
Dutch inventions | Akmon | [
"Engineering"
] | 70 | [
"Civil engineering",
"Civil engineering stubs"
] |
8,593,160 | https://en.wikipedia.org/wiki/Forisome | Forisomes are proteins occurring in the sieve tubes of Fabaceae. Their molecules are about 1–3 μm wide and 10–30 μm long. They expand and contract anisotropically in response to changes of electric field, pH, or concentration of Ca2+ ions. Unlike most other moving proteins, the change is not dependent on ATP.
Forisomes function as valves in sieve tubes of the phloem system, by reversibly changing shape between low-volume ordered crystalloid spindles and high-volume disordered spherical conformations. The change from ordered to disordered conformation involves tripling of the protein's volume, loss of birefringence present in the crystalline phase, 120% radial expansion and 30% longitudinal shrinkage. In Vicia it was shown that forisomes are associated to the endoplasmic reticulum at sieve plates. There are evidences that the forisomes's behavior could depend on Ca2+ changes provoked by Ca2+-permeable ion channels, located on the endoplasmic reticulum and plasma membrane of sieve elements. responsible for shape changes.
Forisomes have possible applications as biomimetic smart materials (e.g. valves in microdevices) or smart composite materials.
References
External links
Forisome: A smart plant protein inside a phloem system
Forisome based biomimetic smart materials
Forisome Protein, a Key to Biomimetic Materials
Motor proteins
Smart materials
Plant proteins | Forisome | [
"Chemistry",
"Materials_science",
"Engineering"
] | 316 | [
"Protein stubs",
"Motor proteins",
"Materials science",
"Biochemistry stubs",
"Molecular machines",
"Smart materials"
] |
8,593,202 | https://en.wikipedia.org/wiki/Paulien%20Hogeweg | Paulien Hogeweg (born 1943) is a Dutch theoretical biologist and complex systems researcher studying biological systems as dynamic information processing systems at many interconnected levels. In 1970, together with Ben Hesper, she defined the term bioinformatics as "the study of informatic processes in biotic systems".
Early life and education
Born in Amsterdam, the Netherlands, Hogeweg graduated with a master's degree from the University of Amsterdam in 1969. In her last year as Biology Masters Student, Hogeweg published her studies on water plants titled Structure of aquatic vegetation: a comparison of aquatic vegetation in India, the Netherlands and Czechoslovakia. While volunteering at Leiden University, Hogeweg started her study as a Ph.D. student at Utrecht University. She published seven articles based on her Ph.D work. She graduated from Utrecht University in 1976. The title of her thesis is "Topics in Biological Pattern Analysis", which addressed pattern formation and pattern recognition in biology.
Career
After graduating with a Masters in biology she went to volunteer at a Lab at Leiden University. It was when volunteering at Leiden University that she met Hesper and coined the term Bioinformatics, which she defines as:“the study of information processes in biotic systems.” In 1977, Hogeweg opened a research lab dedicated to bioinformatics with Ben Hesper. In 1990, Hogeweg published an important paper in the field of pre-biotic study: Spiral wave structure in pre-biotic evolution hypercycle stable against parasites. In 1991, Hogeweg became a full professor of Theoretical Biology at Utrecht University (UU). Since 2008, Hogeweg has been an Honorary professor at UU. Hogeweg has participated as an editor board member for Journal Theoretical Biology, Bulletin Mathematical Biology, Biosystems, Artificial Life Journal, and Ecological Informatics.
Research
Starting with asynchronous extensions of L-systems she pioneered agent-based modeling studying development of social structure in animal societies, using the opportunity based "ToDo" principle where agents "do what there is to do", and a "DoDom" principle for dominance ranking, also known as the winner-loser effect. This type of research later became popular in artificial life.
When the first biological sequence data became available (from the EMBL) she developed a tree based algorithm for multiple sequence alignment. which is now common practice in sequence alignment and phylogeny. At about the same time she pioneered folding algorithms for predicting RNA secondary structures. RNA folding was also introduced to allow for a non-linear genotype to phenotype mapping to study evolution on complex fitness landscapes .
The first phase-phase trajectory of a chaotic attractor in an ecological food-chain model of three differential equations appeared long before chaos became popular. She pioneered the use of cellular automata for studying spatial ecological and evolutionary processes and demonstrated that spatial pattern formation can revert evolutionary selection pressures.
Extending the Cellular Potts model (CPM) to study morphogenesis and development she modeled the complete life cycle of Dictyostelium discoideum using simple rules for chemotaxis and differential adhesion . This CPM approach is now used for modeling in various areas of developmental biology, and the migration of immune cells in lymphoid tissues. Finally the CPM is used for EvoDevo research.
In recent years, Hogeweg has continued her research on co-evolutionary dynamics and morphogenesis, to expand on “adaptive genomics” and to study the interface between gene regulation and evolution in cellular organisms. Also, her research is focused on evolvability at the level of genome organization and regulatory networks, and has shown RNA increase in complexity as the result of interactions of secondary structure and spatial pattern formation.
Collaborations
Hogeweg has participated in diverse research groups in biological science. Her contribution varies from developing computational methods such as algorithm for tree based multiple sequence alignment which has become a standard practice. Most importantly, her work has greatly contributed to bioinformatics theory.
References
External links
Official website
Theoretical Biology and Bioinformatics Group, Utrecht University
1943 births
Living people
Dutch women scientists
21st-century Dutch biologists
Network scientists
Theoretical biologists | Paulien Hogeweg | [
"Biology"
] | 855 | [
"Bioinformatics",
"Theoretical biologists"
] |
8,593,762 | https://en.wikipedia.org/wiki/300B | In electronics, the 300B is a directly-heated power triode vacuum tube with a four-pin base, introduced in 1938 by Western Electric to amplify telephone signals. It measures high and wide, and the anode can dissipate 40 watts thermal. In the 1980s it began to be used increasingly by audiophiles in home audio equipment. The 300B has good linearity, low noise and good reliability; it is often used in single-ended triode (SET) audio amplifiers of about eight watts output. A push-pull pair can output 20 watts.
manufacturers of 300B and other tubes of similar characteristics included EkspoPUL (Electro Harmonix brand), ELROG, Emission Labs - EML, JJ Electronic, KR Audio, TJ FullMusic, Hengyang Electronics (Psvane brand), Linlai, Takatsuki Electric and Western Electric. Prices for new 300B tubes ranged from US$175 to $2,000 per matched pair.
Western Electric (tube manufacturer), a small, privately owned company in Rossville, Georgia resumed production of the original 300B in 2018 using the original, 1938 manufacturing standards on a modernized assembly line housed at the Rossville Works.
See also
List of vacuum tubes
References
http://www.aes.org/e-lib/browse.cfm?elib=6058
The 300B's history
300B data sheet
External links
Stereophile: In Search of the Perfect 300B Tube
Reviews of 300B tubes.
Vacuum tubes | 300B | [
"Physics"
] | 316 | [
"Vacuum tubes",
"Vacuum",
"Matter"
] |
8,594,100 | https://en.wikipedia.org/wiki/EXIT%20chart | An extrinsic information transfer chart, commonly called an EXIT chart, is a technique to aid the construction of good iteratively-decoded error-correcting codes (in particular low-density parity-check (LDPC) codes and Turbo codes).
EXIT charts were developed by Stephan ten Brink, building on the concept of extrinsic information developed in the Turbo coding community. An EXIT chart includes the response of elements of decoder (for example a convolutional decoder of a Turbo code, the LDPC parity-check nodes or the LDPC variable nodes). The response can either be seen as extrinsic information or a representation of the messages in belief propagation.
If there are two components which exchange messages, the behaviour of the decoder can be plotted on a two-dimensional chart. One component is plotted with its input on the horizontal axis and its output on the vertical axis. The other component is plotted with its input on the vertical axis and its output on the horizontal axis. The decoding path followed is found by stepping between the two curves. For a successful decoding, there must be a clear swath between the curves so that iterative decoding can proceed from 0 bits of extrinsic information to 1 bit of extrinsic information.
A key assumption is that the messages to and from an element of the decoder can be described by a single number, the extrinsic information. This is true when decoding codes from a binary erasure channel but otherwise the messages are often samples from a Gaussian distribution with the correct extrinsic information. The other key assumption is that the messages are independent (equivalent to an infinite block-size code without local structure between the components)
To make an optimal code, the two transfer curves need to lie close to each other. This observation is supported by the theoretical result that for capacity to be reached for a code over a binary-erasure channel there must be no area between the curves and also by the insight that a large number of iterations are required for information to be spread throughout all bits of a code.
References
T. Richardson and R. Urbanke: "Modern Coding Theory"
External links
Lecture notes on EXIT charts(PDF)
Error detection and correction
Information theory | EXIT chart | [
"Mathematics",
"Technology",
"Engineering"
] | 468 | [
"Telecommunications engineering",
"Reliability engineering",
"Applied mathematics",
"Error detection and correction",
"Computer science",
"Information theory"
] |
8,594,839 | https://en.wikipedia.org/wiki/Comparison%20of%20disk%20encryption%20software | This is a technical feature comparison of different disk encryption software.
Background information
Operating systems
Features
Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established) can be created for deniable encryption. Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others.
Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.
Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords.
Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.
Multiple keys: Whether an encrypted volume can have more than one active key.
Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2 or Argon2.
Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.
Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.
Filesystems: What filesystems are supported.
Two-factor authentication: Whether optional security tokens (hardware security modules, such as Aladdin eToken and smart cards) are supported (for example using PKCS#11)
Layering
Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to pre-boot authentication in the features comparison table.
Partition: Whether individual disk partitions can be encrypted.
File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices).
Swap space: Whether the swap space (called a "pagefile" on Windows) can be encrypted individually/explicitly.
Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported).
Modes of operation
Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.
CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks.
CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).
CBC with random per-sector keys: The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)
LRW: The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.
XTS: XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption.
Authenticated encryption: Protection against ciphertext modification by an attacker
See also
Cold boot attack
Comparison of encrypted external drives
Disk encryption software
Disk encryption theory
List of cryptographic file systems
Notes and references
External links
DiskCryptor vs Truecrypt – Comparison between DiskCryptor and TrueCrypt
Buyer's Guide to Full Disk Encryption – Overview of full-disk encryption, how it works, and how it differs from file-level encryption
Disk encryption software
Disk encryption software | Comparison of disk encryption software | [
"Mathematics",
"Technology"
] | 870 | [
"Computing-related lists",
"Cryptographic software",
"Cryptography lists and comparisons",
"Mathematical software"
] |
8,595,079 | https://en.wikipedia.org/wiki/Crossband%20operation | Crossband (cross-band, cross band) operation is a method of telecommunication in which a radio station receives signals on one frequency and simultaneously transmits on another for the purpose of full duplex communication or signal relay.
To avoid interference within the equipment at the station, the two frequencies used need to be separated, and ideally on different 'bands'. An unattended station working in this way is a radio repeater. It re-transmits the same information that it receives. This principle is used by telecommunications satellites and terrestrial mobile radio systems.
Uses
Crossband operation is sometimes used by amateur radio operators. Rather than taking it in turns to transmit on the same frequency, both operators can transmit at the same time but on different bands, each one listening to the frequency that the other is using to transmit. A variation on this procedure includes establishing contact on one frequency and then changing to a pair of other frequencies to exchange messages.
Crossband operation is also used in communication between ships (inter-ship) with a HF installation. Frequencies that may be used can be found in the 'Manual for use by the Maritime Mobile and Maritime Mobile-Satellite Services'. Usually inter-ship communication is simplex only (VHF or MF), HF gives the possibility to work duplex but usually the transmitter and receiver are so close to each other that this may cause problems. The solution is to work on frequencies that are far apart e.g.: sending on 8 MHz and receiving on 12 MHz.
This mode is often used in amateur radio satellites, with uplink on the VHF band and downlink on UHF band such as IO-86, AO-91, SO-50 and ARISS. Some of satellites such as PO-101 and AO-91 reversed that order with UHF band uplink and VHF band downlink. Such operation required a cross-band directional antenna that can transmit and receive on different antenna.
See also
See Radio frequency for more details about the radio spectrum.
References
Further reading
Additional articles on crossband repeat usage and setup:
www.jpole-antenna.com article
Ottawa ARES presentation
Santa Clara County ARES/RACES class materials
Amateur radio
Radio technology | Crossband operation | [
"Technology",
"Engineering"
] | 439 | [
"Information and communications technology",
"Telecommunications engineering",
"Radio technology"
] |
8,595,464 | https://en.wikipedia.org/wiki/Cat%20behavior | Cat behavior encompasses the actions and reactions displayed by a cat in response to various stimuli and events. Cat behavior includes body language, elimination habits, aggression, play, communication, hunting, grooming, urine marking, and face rubbing. It varies among individuals, colonies, and breeds.
Communication and sociability can vary greatly among individual cats. In a family with many cats, the interactions can change depending on which individuals are present and how restricted the territory and resources are. One or more individuals may become aggressive: fighting may occur with the attack, resulting in scratches and deep bite wounds.
Communication
Kittens vocalize early in development. Some examples of different vocalizations are described below.
Purring - This means that the cat is either content or is self-soothing due to fear.
Meowing - A frequently used greeting. A mother meows when interacting with her young. Meows can also be used when a cat wishes for attention.
Hissing or spitting - This indicates an angry or defensive cat.
Yowling - This means that the cat is in distress or feeling aggressive.
Chattering - This occurs when hunting or tracking potential prey. This consists of quick chirps made while the mouth vibrates. The gaze is fixed and staring. This behavior may be in response to a surge of adrenaline or may be caused by the anticipation of a pending hunt.
Body language
Cats rely strongly on body language to communicate. A cat may rub against an object or lick a person. Much of a cat's body language is through its tail, ears, head position, and back posture.
Tail
Observing how a cat holds its tail can give a good sense of the cat’s current temperament.
Held high, may have a slight curl forward - a sign of friendliness. The cat is happy, content, and comfortable. The tail may quiver or vibrate if the cat is excited.
Held low and tucked under - a sign of fear or unease. The cat is attempting to make itself a smaller target to potential threats.
Flicking, twitching - a sign of agitation. The cat is on high alert or is upset, and is not receptive to interaction. Cats may also flick their tails in an oscillating, snake-like motion, or abruptly from side to side, often just before pouncing on an object or animal.
"Fluffed" or "Halloween-cat tail" - When a cat fluffs up their tails, they are not happy. Here, they are attempting to make themselves appear larger, warning whomever they feel unsafe with, to back off.
Eyes
When cats greet another cat in their vicinity, they can do a slow, languid, long blink to communicate affection if they trust the person or animal they are in contact with. One way to communicate love and trust to a cat is to say its name, get its attention, look it in the eyes and then slowly blink at it to emulate trust and love. They may return the gesture.
In a study of 18 cats, the cat behavior of several half-blinks followed by a prolonged eye narrowing or eye closure was found to be a positive emotional response. They show a specific set of feline behaviors: several half-blinks followed by prolonged eye narrowing or eye closure. When a familiar human slow-blinks towards a cat, the cat tends to approach the human more frequently than if the human has a neutral expression that avoids eye contact. This behavior may share features with the "genuine" human smile that involves the corners of the eyes narrowing.
Ears
A cat's ears can tell an observer what they are feeling, such as pain, fear, or when they sense danger. At times, one may notice cats tend to have something we call, "airplane ears." This is when their ears are rotated to the sides or angled backward. Cats have acute hearing, so when something scares them, their ears tend to pin to the side or back, and the further they are, the more terrified the cat is. It can be difficult to understand what emotion the cat is portraying with their ears, especially since their ears undergo the same pattern when the cat feels they are in danger/feeling defensive, where their ears pin flat to their heads or turn back. "Airplane" ears do not last that long, only until the moment of danger or fear is over. When cats are in pain or feeling sick, they will hold their ears low, rotated to the side. Cats also show feelings of playfulness and happiness when their ears are pointing forward, straight up. This means the cat is alert and content.
Back posture
This one is simple--cats make themselves "smaller" when nervous or afraid, but arch their backs when they wish to appear more intimidating when they sense danger and feel defensive. When they arch their backs, they also tend to "fluff" their tails, hence the "Halloween" cat look, known as Piloerection. More information on posture is listed below.
Scent rubbing and spraying
These behaviors are thought to be a way of marking territory. Facial marking behavior is used to mark their territory as "safe". The cat rubs its cheeks on prominent objects in the preferred territory, depositing a chemical pheromone, known as a contentment pheromone. Synthetic versions of the feline facial pheromone are available commercially.
Cats have anal sacs or scent glands. Scent is deposited on the feces as it is eliminated. Unlike intact male cats, female and neutered male cats usually do not spray urine. Spraying is accomplished by backing up against a vertical surface and spraying a jet of urine on that surface. Unlike a dog's penis, a cat's penis points backward. Males neutered in adulthood may still spray after neutering. Urinating on horizontal surfaces in the home outside the litter box may indicate dissatisfaction with the box, due to a variety of factors such as substrate texture, cleanliness and privacy. It can also be a sign of urinary tract problems. Male cats on poor diets are susceptible to crystal formation in the urine, which can block the urethra and create a medical emergency.
Body postures
A cat's posture communicates its emotions. It is best to observe cats' natural behavior when they are by themselves, with humans, and with other animals. Their postures can be friendly or aggressive, depending on the situation. Some of the most basic and familiar cat postures include:
Relaxed posture – The cat is seen lying on the side or sitting. Its breathing is slow to normal, with legs bent, or hind legs laid out or extended. The tail is loosely wrapped, extended, or held up. It also hangs down loosely when the cat is standing.
Stretching posture – another posture indicating the cat is relaxed
Yawning posture – either by itself or in conjunction with a stretch: another posture of a relaxed cat.
Alert posture – The cat is lying on its belly, or it may be sitting. Its back is almost horizontal when standing and moving. Its breathing is normal, with its legs bent or extended (when standing). Its tail is curved back or straight upward, and there may be twitching while the tail is positioned downward.
Tense posture – The cat is lying on its belly, with the back of its body lower than its upper body (slinking) when standing or moving back. Its legs, including the hind legs, are bent, and its front legs are extended when standing. Its tail is close to the body, tensed or curled downward. There can be twitching when the cat is standing up.
Anxious/ovulating posture – The cat is lying on its belly. The back of the body is visibly lower than the front part when the cat is standing or moving. Its breathing may be fast, and its legs are tucked under its body. The tail is close to the body and may be curled forward (or close to the body when standing), with the tip of the tail moving up and down or side to side.
Fearful posture – The cat is lying on its belly or crouching directly on top of its paws. Its entire body may be shaking and very near the ground when standing up. Breathing is fast, with the cat's legs bent near the surface, and its tail is curled and very close to its body when standing on all fours.
Confident posture – The cat may walk around in a more comfortable manner with its tail up to the sky, indicating its importance. Cats often walk through houses with their tail standing up high above them, making them look grander and more elegant.
Terrified posture – The cat is crouched directly on top of its paws, with visible shaking seen in some parts of the body. Its tail is close to the body, and can be standing up, together with its hair on the back. The legs are very stiff or even bent to increase their size. Typically, cats avoid contact when they feel threatened, although they can resort to varying degrees of aggression when they feel cornered, or when escape is impossible.
Grooming
Oral grooming for domestic and feral cats is a common behavior; studies on domestic cats show that they spend about 8% of resting time grooming themselves. Grooming is extremely important not only to clean themselves but also to ensure ectoparasite control. Fleas tend to be the most common ectoparasite of cats, and some studies allude to indirect evidence that grooming in cats is effective in removing fleas. Cats do not only use their tongue for grooming to control ectoparasites; scratching may also aid in dislodging fleas from the head and neck.
Kneading
Kittens "knead" the breast while suckling, using the forelimbs one at a time in an alternating pattern to push against the mammary glands to stimulate lactation in the mother.
Cats carry these infantile behaviors beyond nursing and into adulthood. Some cats "nurse," i.e. suck, on clothing or bedding during kneading. The cat exerts firm downward pressure with its paw, opening its toes to expose its claws, then closes its claws as it lifts its paw. The process takes place with alternate paws at intervals of one to two seconds. The cat may knead while sitting on its owner's lap, which may prove painful if the cat has sharp claws.
Because most of the preferred "domestic traits" are neotenous, or juvenile traits that persist in the adult, kneading may be a relic juvenile behavior retained in adult domestic cats. It may also stimulate the cat and make it feel good, in the same manner as a human stretching. Kneading is often a precursor to sleeping. Many cats purr while kneading. They also purr mostly when newborn, when feeding, or when trying to feed on their mother's teat. The common association between the two behaviors may corroborate the evidence in favor of the origin of kneading as a remnant instinct.
Panting
Unlike dogs, panting is a rare occurrence in cats, except in warm weather environments. Cats may pant in response to anxiety, fear or excitement. Panting can also be caused by play, exercise, or stress from things like car rides. However, if panting is excessive or the cat appears in distress, it may be a symptom of a more serious condition, such as a nasal blockage, heartworm disease, head trauma, or drug poisoning. In many cases, feline panting, especially if accompanied by other symptoms, such as coughing or shallow breathing (dyspnea), is considered to be abnormal, and should be treated as a medical emergency.
Reflexes
Righting reflex
The righting reflex is the attempt of cats to land on their feet at the completion of a jump or a fall. They can do this more easily than other animals due to their flexible spine, floating collarbone, and loose skin. Cats also use vision and their vestibular apparatus to help tell which way to turn. They can then stretch themselves out and relax their muscles. The righting reflex does not always result in the cat landing on its feet.
Freeze reflex
Adult cats are able to make use of pinch-induced behavioural inhibition to induce a "freeze reflex" in their young, which enables them to be transported by the neck without resisting. This reflex, also known as clipnosis, can also be exhibited by adults.
Eating patterns
Cats are obligate carnivores and do not do well on herbivore diets. In the wild they usually hunt smaller mammals to keep themselves nourished. Many cats find and chew small quantities of long grass, but this is not for its nutritional value per se. The eating of grass seems to stem from feline ancestry and has nothing to do with dietary requirements. It is believed that feline ancestors instead ate grass to purge intestinal parasites.
Cats have no sweet taste receptors on their tongue and thus cannot taste sweet things at all. Cats mainly smell for their food, and what they taste for is amino acids instead. This may be a cause of cats being diagnosed with diabetes. The food that domestic cats get has a lot of carbohydrates in it, and a high sugar content cannot be efficiently processed by the digestive system of cats.
Cats drink water by lapping the surface with their tongue. A fraction of a teaspoon of water is taken up with each lap. Although some desert cats are able to obtain much of their water needs through the flesh of their prey, most cats come to bodies of water to drink.
Eating patterns are another indicator to understand behavior changes in domestic cats. Changes in typical eating patterns can be an early signal for possible physical or psychological health problems.
A cat's eating pattern in a domestic setting is essential for the cat and owner bond to form. This happens because cats form attachments to households that regularly feed them. Some cats ask for food dozens of times a day, including at night, with rubbing, pacing, meowing, or sometimes loud purring.
Sleeping patterns
More than half of cats sleep between 12 and 18 hours a day, sometimes even more. Most cats sleep more as they age.
Domestic cats seem to be comparatively flexible with regard to the times of day and night they are active or asleep.
Excretion
Cats tend to bury their feces after defecating and can be attracted to a litter box if it has attractant in it. Cats will also generally defecate more in those litter boxes.
Socialization
Socialization is defined as a member of a specific group learning to be part of that group. It is said to be a continuous learning process that allows an individual to learn the necessary skills and behaviors required for a particular social position.
Cats, domestic or wild, do participate in social behaviors, even though it is thought that most cat species (besides lions) are solitary, anti-social animals. Under certain circumstances, such as food availability, shelter, or protection, cats can be seen in groups.
The social behaviors that cats participate in are colony organization, social learning, socialization between cats, and socialization with humans.
Colony organization
Free-living domestic cats tend to form colonies. Small colonies consist of one female, known as a queen, and her kittens. Large colonies consist of several queens and their kittens. Male cats are present in both types of colonies and serve the purpose of reproduction and defending territory. Altruistic behavior occurs within these colonies. This means that if an expecting queen helps another queen that just gave birth, then the helping queen will get help in return when she gives birth.
Although free living cats are found in colonies, stable social order, like that of the lion, does not exist. Free living cats usually are found in colonies for protection against predators, and for food availability. Although there are many advantages of group living, such as easy access to mates, and defensive measures to protect food, there are also disadvantages, such as sexual competition for mates. If the group gets too big, fights may break out over food.
Social learning
Cats are observational learners. This type of learning emerges early in a cat's life, and has been shown in many laboratory studies. Young kittens learn to hunt from their mothers by observing their techniques when catching prey. The mother ensures that her kittens learn hunting techniques by first bringing dead prey to the litter, then live prey. She demonstrates the techniques required for successful capture to her kittens by bringing live prey to the litter for the kittens to catch themselves. Prey-catching behavior of kittens improves over time when mothers are present .
Observational learning for cats can be described in terms of the drive to complete the behavior, the cue that initiates the behavior, the response to the cue, and the reward for completing the behavior. This is shown when cats learn predatory behavior from their mothers. The drive is hunger, the cue is the prey, the response is to catch the prey, and the reward is to relieve the hunger sensation.
Kittens also show observational learning when they are socializing with humans. They are more likely to initiate socialization with humans when their mothers are exhibiting non-aggressive and non-defensive behaviors. Even though mothers spend most time with their kittens, male cats play an important role by breaking up fights among litter mates.
Observational learning is not limited to kittens. It can also be observed during adulthood. Studies have been done with adult cats performing a task, such as pressing a lever after a visual cue. Adult cats that see others performing a task learn to perform the same task faster than those who did not witness another cat performing it.
Socialization between cats
When strange cats meet, they ideally cautiously allow each other to smell their hindquarters, but this does not happen very often. Usually when strange cats meet, one cat makes a sudden movement that puts the other cat into a defensive mode. The subordinate cat will then draw in on itself and prepare to attack if needed. If an attack happens, the subordinate cat will usually run away, but this does not happen all the time and it could lead to a tomcat duel. Dominance is also seen as an underlying factor for how conspecifics -- members of the same species -- interact with each other.
Dominance can be seen among cats in multi-cat households. It can be seen when other cats submit to the dominant cat. Dominance includes such behaviors as the subordinate cat walking around the dominant cat, waiting for the dominant cat to walk past, avoiding eye contact, crouching, lying on its side (defensive posture), and retreating when the dominant cat approaches. The dominant cat presents a specific body posture as well. Its ears are straight up, the base of its tail is arched, and it looks directly at the subordinate cat. Dominant cats are usually not aggressive, but if a subordinate cat blocks food they may become aggressive. When this aggressive behavior occurs, it can also lead to the dominant cat preventing subordinate cats from eating and using the litter box. This can cause the subordinate cat to defecate somewhere else and create problems with human interaction.
Social conflicts
Social conflicts among cats depend solely on the behavior of the cats. Some research has shown that cats rarely pick fights, but when they do, it's usually for protecting food and/or litters, and defending territory.
The first sign of an imminent tomcat duel is when both cats draw themselves up high on their legs, all hair along the middle of their backs stands straight up, and they mew and howl loudly as they approach each other. The steps the cats make become slower and shorter the closer they get to each other. Once they are close enough to attack, they pause slightly, and then one cat leaps and tries to bite the nape of the other cat. The other cat has no choice but to retaliate, and both cats roll aggressively on the ground, with loud and intense screams by both. After some time the cats separate and stand face to face to begin the attack all over again. This can go on for some time until one cat does not get up again and remains seated. The defeated cat does not move until the victor has completed a sniff of the area and moves outside the fighting area. Once this happens, the defeated cat leaves the area, ending the duel.
Females may also fight with each other, and male-female fights can occur as well. Cats may need to be reintroduced or separated to avoid fights in a closed household.
Socialization with humans
One way cats and humans interact is through "head bunting," in which a cat rubs its head on a human in order to leave its scent to claim territory and create a bond. Cats can sometimes take cues from human pointing and from the direction of human gazes. They can sometimes discriminate between, and sometimes even correlate, human facial expressions, attentional states, and voices. Besides its own name, a cat can sometimes learn the names of humans and other cats.
Cats age three to nine weeks are sensitive to human socialization; after this period socialization can be less effective. Studies have shown that the earlier a kitten is handled, the less fearful it will be toward humans. Other factors that can enhance socialization are having many people handle the kitten frequently, the presence of the mother, and feeding. The presence of the mother is important because cats are observational learners. If the mother is comfortable around humans, it can reduce anxiety in the kitten and promote the kitten-human relationship.
Feral kittens around two to seven weeks old can be socialized, usually within a month of capture. Some species of cats cannot be socialized toward humans because of factors such as genetic influence and in some cases specific learning experiences. The best way to get a kitten to socialize is to handle it for many hours a week. The process is made easier if there is another socialized cat present but not necessarily in the same space as the feral cat. If the handler can get a cat to urinate in the litter tray, then the others in a litter will usually follow. Initial contact with thick gloves is highly recommended until trust is established, usually within the first week. Socializing an adult is challenging. Socialized adult feral cats tend to trust only those they trusted in their socialization period, and can be very fearful around strangers.
Cats can be companion animals. Studies have shown that these cats provide many physiological and psychological benefits for the owner. Other aspects of cat behavior that are deemed advantageous for the human-cat bond are cat hygiene (cats are known for good hygiene) and they do not have to be taken outside (use of the litter box). Cats are perfect for smaller spaces, and they have no problems with being left alone for extended periods. Even though there are a number of benefits of owning a cat, there are a number of problematic behaviors that can affect the human-cat relationship. One behavior is when cats attack people by clawing and biting. This often occurs spontaneously or is triggered by sudden movements. Another problematic behavior is the "petting and biting syndrome", which involves the cat being petted and then suddenly attacking and running away. Other problems are house soiling, scratching furniture, and when a cat brings dead prey into the house.
There are 52 measured personality traits in cats, with one study saying "five reliable personality factors were found using principal axis factor analysis: neuroticism, extroversion, dominance, impulsiveness and agreeableness."
Predatory behavior
Cats are natural predators. When allowed to roam outdoors, many cats will engage in predation on wildlife, as they are a serious threat to wildlife species. Understanding an indoor cat's personality can go a long way toward satisfying their instincts and avoid potentially inconvenient behavior (such as sudden hissing, dashing around the house, or climbing the curtains). Environmental enrichment items include:
A good-sized cat tree, with scratching posts
Toys that provide a release for their predatory instincts
A well kept litter box or toilet
Fresh water and dry cat food
Social interaction
Attack/Hunting Behavior
Although they are natural predators, pet cats tend to only hunt what is most available to them, around where they live. So, if moved to different areas, they can switch between prey depending on their availability.
When cats encounter prey, they try to make themselves as quiet and as small as possible, to avoid their prey running from them. Before pouncing at the prey, they push their behinds up into the air and "shake" them with their head low to the ground and paws in front of them so that they can prepare for dismount, or to pounce at their prey. The cat remains extremely tense before springing forward to strike their prey with their paws. When they have difficult access to their prey, such as in small pools of water or holes, they use their paws to "fish" out their food and reach into such areas effectively. When cats finally have control of their food, they tend to cuff or push the prey about, almost playfully. Cats also do something known as "prey shaking" which includes holding their prey in their mouths, and shaking their heads to successfully kill or disorient their prey. If their prey is not dead after this, one or two bites will do.
Post Hunting Behavior
When their prey is finally dead, they bite them for quite some time, up and down the length of the body. During this time they are picked up and held in their mouths. They chew and pull at their prey using their molars, for grinding. They start at the anterior end of the animal, near its head, enabling them to eat their smaller prey in as fast as one minute. They eat in a crouched position, holding down the victim with their paw(s). Note that while they attack, they do not bite off pieces of the prey until they are dead.
Environment
Cats like to organize their environment based on their needs. Like their ancestors, domestic cats still have an inherent desire to maintain an independent territory but are generally content to live with other cats for company as they easily get bored. Living alone for a longer time may cause them to forget how to communicate with other cats.
Sometimes adding a kitten to a household can be a bad idea. If there already is an older cat present and another cat is added, it may be better to get another older cat that has been socialized with other cats. When a kitten is introduced to a mature cat, that cat may show feline asocial aggression, in which they feel threatened and act aggressive to drive off the intruder. If this happens, the kitten and the cat should be separated and slowly introduced by rubbing towels on the animals and presenting the towel to the other.
Cats use scent and pheromones to help organize their territory by marking prominent objects. If these objects or scents are removed, it upsets the cat's perception of its environment.
See also
Cat behaviorist
Cat communication
Cat play and toys
Ethology
Cat training
References
Animal communication
Ethology
Articles containing video clips | Cat behavior | [
"Biology"
] | 5,482 | [
"Behavioural sciences",
"Ethology",
"Behavior"
] |
8,595,634 | https://en.wikipedia.org/wiki/Shantanu%20Narayen | Shantanu Narayen (born May 27, 1963) is an Indian-American business executive who has been the chairman, president, and chief executive officer (CEO) of Adobe Inc. since December 2007. Before this, he was the company's president and chief operating officer since 2005.
Early life and education
Narayen grew up in Hyderabad, India in a Telugu Hindu family. He is the second son of a mother who taught American literature and a father who ran a plastics company. He attended Hyderabad Public School.
He earned a bachelor's degree in electronics and communication engineering from University College of Engineering, Osmania University in Hyderabad. He moved to the United States to complete his education, and in 1986 received a master's degree in computer science from Bowling Green State University in Ohio. Later he received an MBA from the Haas School of Business, University of California, Berkeley.
Career
Early career
In 1986 Narayen joined a Silicon Valley start-up called Measurex Automation Systems, which made computer control systems for automotive and electronics customers. He then moved to Apple, where he was in senior management positions from 1989 to 1995.
After Apple, he was director of desktop and collaboration products for Silicon Graphics. In 1996 co-founded Pictra Inc., a company that pioneered the concept of digital photo sharing over the Internet.
Adobe
Narayen joined Adobe in 1998 as senior vice president of worldwide product development, a position he held through 2001. From 2001 to 2005 he was executive vice president of worldwide products.
In 2005 he was appointed president and chief operating officer.
CEO
In November 2007, Adobe announced that Bruce Chizen would step down as CEO effective December 1, 2007, to be replaced by Narayen.
As CEO, Narayen led the transformation of the company, moving its creative and digital document software franchises – which include flagship programs such as Photoshop, Premiere Pro, and Acrobat/PDF – from the desktop to the cloud. In addition, during his tenure as CEO, Adobe has entered the digital experiences category, an expansion which began with the company’s acquisition of Omniture in 2009.
In 2018 Adobe exceeded $100 billion in market cap and joined the Fortune 500 for the first time. In 2018 it also ranked No. 13 on Forbes’ Most Innovative Companies list.
In 2011, Barack Obama appointed him as a member of his Management Advisory Board. Narayen is the lead independent director on the board of directors for Pfizer, and vice chairman of the US-India Strategic Partnership Forum.
In 2023, Narayen's total compensation from Adobe was $44.9 million, up 42% from the previous year and representing a CEO-to-median worker pay ratio of 229-to-1.
Honors and awards
In May 2011, Narayen received an honorary doctorate from his alma mater, Bowling Green State University. In 2018, Narayen was ranked #12 on Fortune'''s "Businessperson of the Year" list, and was deemed "Global Indian of the Year" in 2018 by The Economic Times'' of India. In 2019, he was a recipient of India's Padma Shri award and in 2022 he was the recipient of Armenia's Global High-Tech Award.
Personal life
Narayen lives in Palo Alto, California. He met his wife Reni while at Bowling Green State University in the mid 1980s; she has a doctorate in clinical psychology. They have two sons. He once represented India in sailing at an Asian Regatta. He, along with Satya Nadella, has also invested in Major League Cricket to be hosted by the American Cricket Enterprises (ACE).
References
External links
Adobe.com: Shantanu Narayen
Shantanu Narayen Profile at Forbes
Living people
Telugu people
Businesspeople from Hyderabad, India
American technology chief executives
Haas School of Business alumni
Indian technology chief executives
Indian emigrants to the United States
Adobe Inc. people
Silicon Graphics people
Osmania University alumni
Bowling Green State University alumni
Businesspeople in computing
Pfizer people
American chief operating officers
Recipients of the Padma Shri in trade and industry
20th-century American businesspeople
21st-century American businesspeople
American people of Indian descent
American computer businesspeople
American chief executives
American chief executives of Fortune 500 companies
Chief executives in the technology industry
American people of Telugu descent
American computer scientists
1963 births | Shantanu Narayen | [
"Technology"
] | 868 | [
"Lists of people in STEM fields",
"Proprietary technology salespersons"
] |
8,595,671 | https://en.wikipedia.org/wiki/Navajo%20Lake | Navajo Lake is a reservoir located in San Juan County and Rio Arriba County in northwestern New Mexico, in the southwestern United States. Portions of the reservoir extend into Archuleta County in southern Colorado. The lake is part of the Colorado River Storage Project, which here manages the upper reaches of the San Juan River, storing and releasing water that is used locally for irrigation, or ultimately reaching the Colorado River in Utah. Water is impounded in Navajo Lake by the earth- and rock-filled Navajo Dam, long and high, completed in 1962. The lake is over long and lies at an elevation of up to .
The construction of the dam and the resulting lake flooded and destroyed one of the Navajos' most sacred sites.
The Lake and associated shoreline areas near the dam in New Mexico and the river shorelines below the dam are part of New Mexico's Navajo Lake State Park, while the Portion of the shoreline and portion of the lake that is located in Colorado make up Navajo State Park which is managed as part of the Colorado State Parks system. The lake has smallmouth bass, black crappie, northern pike, channel catfish, and trout. The waters of Navajo Lake forced hundreds of families to leave their homes and communities. The four communities affected were Los Arboles, Los Pinos, Rose and Los Martinez. The 1.7 million acre-foot reservoir displaced an unknown amount of farms and ranches. It has been estimated that almost 200 families had to move. Some families had been here nearly 80–90 years.
See also
List of largest reservoirs of Colorado
References
External links
Navajo Lake State Park
Buildings and structures in Archuleta County, Colorado
Buildings and structures in Rio Arriba County, New Mexico
Buildings and structures in San Juan County, New Mexico
Bodies of water of Archuleta County, Colorado
Bodies of water of San Juan County, New Mexico
Colorado River Storage Project
Lakes of Rio Arriba County, New Mexico
Parks in Archuleta County, Colorado
Parks in Rio Arriba County, New Mexico
Parks in San Juan County, New Mexico
Reservoirs in Colorado
Reservoirs in New Mexico
State parks of New Mexico
1962 establishments in New Mexico | Navajo Lake | [
"Engineering"
] | 434 | [
"Colorado River Storage Project"
] |
8,596,033 | https://en.wikipedia.org/wiki/Moravian%20star | A Moravian star () is an illuminated decoration used during the Christian liturgical seasons of Advent, Christmas, and Epiphany representing the Star of Bethlehem pointing towards the infant Jesus. The Moravian Church teaches:
The Moravian star is popular in places where there are Moravian Christian congregations world wide The stars take their English name from the Moravian Church, originating in Moravia. In Germany, they are known as Herrnhut stars, named after the Moravian Mother Community in Saxony, Germany, where they were first commercially produced. With the rise of ecumenism, the use the Moravian star has spread beyond the Moravian Church to other Christian denominations, such as the Lutheran Church and Catholic Church, as well as the Methodist Church.
History
The first Moravian star is known to have originated in the 1830s at the Moravian Boys' School in Niesky, Germany, as a geometry lesson or project. The first mention is of a 110-point star for the 50th anniversary of the Paedagogium (classical school for boys) in Niesky. Around 1880, Peter Verbeek, an alumnus of the school, began making the stars and their instructions available for sale through his bookstore. His son Harry went on to found the Herrnhut Star Factory, which was the main source of stars until World War I. Although heavily damaged at the end of World War II, the Star Factory resumed manufacturing them. Briefly taken over by the government of East Germany in the 1950s, the factory was returned to the Moravian Church-owned Abraham Dürninger Company, which continues to make the stars in Herrnhut. Other star-making companies and groups have sprung up since then. Some Moravian congregations have congregation members who build and sell the stars as fund raisers.
Cultural and Religious importance
The star was soon adopted throughout the Moravian Church as an Advent symbol.
Moravian stars continue to be displayed during Advent, Christmas, and Epiphany throughout the world, even in areas without a significant Moravian Church presence. Many Moravian households display their stars year-round. The stars are often seen in Moravian nativity and Christmas village displays as a representation of the Star of Bethlehem pointing towards the infant Jesus. They are properly displayed from the first Sunday in Advent (the fourth Sunday before Christmas) until the Festival of Epiphany (January 6). Large advent stars shine in the dome of the Frauenkirche in Dresden and over the altar of the Thomaskirche in Leipzig. A Moravian star, one of the largest in the world, sits atop the North Tower of Atrium Health Wake Forest Baptist during the Advent and Christmas seasons. The city of Winston-Salem, North Carolina, which traces its origins to Salem has Moravian origins dating to 1766, uses the Moravian star as their official Christmas street decoration. Another star sits under Wake Forest University's Wait Chapel during the Advent and Christmas seasons as well.
The use of the stars during the Advent, Christmas, and Epiphany seasons is also a tradition in the West Indies, Greenland, Suriname, Labrador, Central America, South and East Africa, Ladakh in India, and in parts of Scandinavia: wherever the Moravian Church has sent missionaries.
in 2020, as the world descended in to the Covid19 pandemic, Moravians began to ring, rehang their stars as a sign of love, hope and peace during dark times. On March 27, 2020 Atrium Health Wake Forest Baptist reinstalled their 31 foot star, a top the North Tower.
Types of stars
The original Moravian star as manufactured in Herrnhut since 1897 exists only in a 26-point form, composed of eighteen square and eight triangular cone-shaped points. The 26th point is missing and used for mounting. This shape is technically known as a Kleetope of a rhombicuboctahedron. Each face of the geometric solid in the middle, the rhombicuboctahedron, serves as the base for one of the pyramid augmentations or starburst points. This is the most commonly seen and most widely available form of Christmas star.
Other forms of Christmas star exist, which differ from the original Herrnhut Moravian star. No matter how many points a star has, it has a symmetrical shape based on polyhedra. There are other stars with 20, 32, 50, 62 and 110 points that are commonly hand-made. The variety comes from various ways of forming the polyhedron that provides a base for the points—using an octagonal face instead of a square face, for example. The common original Herrnhut Moravian star becomes a 50-point star when the squares and triangles that normally make up the faces of the polyhedron become octagons and hexagons. This leaves a 4-sided trapezoidal hole in the corners of the faces which is then filled with an irregular four sided point. These 4-sided points form a "starburst" in the midst of an otherwise regular 26-point star.
Froebel stars, which are paper decorations made from four folded strips of paper, are sometimes inaccurately also called Moravian stars, among many other names.
See also
Christingle
Illumination (decoration)
Lovefeast
Nativity scene
References
External links
Make a German Froebel Star Ornament
Make a Froebel Star
Make a Moravian Star
Hardwood Moravian Stars
Christmas decorations
Christmas in Germany
Traditions of the Moravian Church
Herrnhut
Niesky
Advent
Star symbols | Moravian star | [
"Mathematics"
] | 1,093 | [
"Symbols",
"Star symbols"
] |
8,597,086 | https://en.wikipedia.org/wiki/Von%20Neumann%20universal%20constructor | John von Neumann's universal constructor is a self-replicating machine in a cellular automaton (CA) environment. It was designed in the 1940s, without the use of a computer. The fundamental details of the machine were published in von Neumann's book Theory of Self-Reproducing Automata, completed in 1966 by Arthur W. Burks after von Neumann's death. It is regarded as foundational for automata theory, complex systems, and artificial life. Indeed, Nobel Laureate Sydney Brenner considered Von Neumann's work on self-reproducing automata (together with Turing's work on computing machines) central to biological theory as well, allowing us to "discipline our thoughts about machines, both natural and artificial."
Von Neumann's goal, as specified in his lectures at the University of Illinois in 1949, was to design a machine whose complexity could grow automatically akin to biological organisms under natural selection. He asked what is the threshold of complexity that must be crossed for machines to be able to evolve. His answer was to specify an abstract machine which, when run, would replicate itself. In his design, the self-replicating machine consists of three parts: a "description" of ('blueprint' or program for) itself, a universal constructor mechanism that can read any description and construct the machine (sans description) encoded in that description, and a universal copy machine that can make copies of any description. After the universal constructor has been used to construct a new machine encoded in the description, the copy machine is used to create a copy of that description, and this copy is passed on to the new machine, resulting in a working replication of the original machine that can keep on reproducing. Some machines will do this backwards, copying the description and then building a machine. Crucially, the self-reproducing machine can evolve by accumulating mutations of the description, not the machine itself, thus gaining the ability to grow in complexity.
To define his machine in more detail, von Neumann invented the concept of a cellular automaton. The one he used consists of a two-dimensional grid of cells, each of which can be in one of 29 states at any point in time. At each timestep, each cell updates its state depending on the states of the surrounding cells at the prior timestep. The rules governing these updates are identical for all cells.
The universal constructor is a certain pattern of cell states in this cellular automaton. It contains one line of cells that serve as the description (akin to Turing's tape), encoding a sequence of instructions that serve as a 'blueprint' for the machine. The machine reads these instructions one by one and performs the corresponding actions. The instructions direct the machine to use its 'construction arm' (another automaton that functions like an operating system) to build a copy of the machine, without the description tape, at some other location in the cell grid. The description cannot contain instructions to build an equally long description tape, just as a container cannot contain a container of the same size. Therefore, the machine includes the separate copy machine which reads the description tape and passes a copy to the newly constructed machine. The resulting new set of universal constructor and copy machines plus description tape is identical to the old one, and it proceeds to replicate again.
Purpose
Von Neumann's design has traditionally been understood to be a demonstration of the logical requirements for machine self-replication. However, it is clear that far simpler machines can achieve self-replication. Examples include trivial crystal-like growth, template replication, and Langton's loops. But von Neumann was interested in something more profound: construction, universality, and evolution.
Note that the simpler self-replicating CA structures (especially, Byl's loop and the Chou–Reggia loop) cannot exist in a wide variety of forms and thus have very limited evolvability. Other CA structures such as the Evoloop are somewhat evolvable but still don't support open-ended evolution. Commonly, simple replicators do not fully contain the machinery of construction, there being a degree to which the replicator is information copied by its surrounding environment. Although the Von Neumann design is a logical construction, it is in principle a design that could be instantiated as a physical machine. Indeed, this universal constructor can be seen as an abstract simulation of a physical universal assembler. The issue of the environmental contribution to replication is somewhat open, since there are different conceptions of raw material and its availability.
Von Neumann's crucial insight is that the description of the machine, which is copied and passed to offspring separately via the universal copier, has a double use; being both an active component of the construction mechanism in reproduction, and being the target of a passive copying process. This part is played by the description (akin to Turing's tape of instructions) in Von Neumann's combination of universal constructor and universal copier. The combination of a universal constructor and copier, plus a tape of instructions conceptualizes and formalizes i) self-replication, and ii) open-ended evolution, or growth of complexity observed in biological organisms.
This insight is all the more remarkable because it preceded the discovery of the structure of the DNA molecule by Watson and Crick and how it is separately translated and replicated in the cell—though it followed the Avery–MacLeod–McCarty experiment which identified DNA as the molecular carrier of genetic information in living organisms. The DNA molecule is processed by separate mechanisms that carry out its instructions (translation) and copy (replicate) the DNA for newly constructed cells. The ability to achieve open-ended evolution lies in the fact that, just as in nature, errors (mutations) in the copying of the genetic tape can lead to viable variants of the automaton, which can then evolve via natural selection. As Brenner put it:
Evolution of Complexity
Von Neumann's goal, as specified in his lectures at the University of Illinois in 1949, was to design a machine whose complexity could grow automatically akin to biological organisms under natural selection. He asked what is the threshold of complexity that must be crossed for machines to be able to evolve and grow in complexity. His “proof-of-principle” designs showed how it is logically possible. By using an architecture that separates a general purpose programmable (“universal”) constructor from a general purpose copier, he showed how the descriptions (tapes) of machines could accumulate mutations in self-replication and thus evolve more complex machines (the image below illustrates this possibility.). This is a very important result, as prior to that, it might have been conjectured that there is a fundamental logical barrier to the existence of such machines; in which case, biological organisms, which do evolve and grow in complexity, could not be “machines”, as conventionally understood. Von Neumann's insight was to think of life as a Turing Machine, which, is similarly defined by a state-determined machine "head" separated from a memory tape.
In practice, when we consider the particular automata implementation Von Neumann pursued, we conclude that it does not yield much evolutionary dynamics because the machines are too fragile - the vast majority of perturbations cause them effectively to disintegrate. Thus, it is the conceptual model outlined in his Illinois lectures that is of greater interest today because it shows how a machine can in principle evolve. This insight is all the more remarkable because the model preceded the discovery of the structure of the DNA molecule as discussed above. It is also noteworthy that Von Neumann's design considers that mutations towards greater complexity need to occur in the (descriptions of) subsystems not involved in self-reproduction itself, as conceptualized by the additional automaton D he considered to perform all functions not directly involved in reproduction (see Figure above with Von Neumann's System of Self-Replication Automata with the ability to evolve.) Indeed, in biological organisms only very minor variations of the genetic code have been observed, which matches Von Neumann's rationale that the universal constructor (A) and Copier (B) would not themselves evolve, leaving all evolution (and growth of complexity) to automaton D. In his unfinished work, Von Neumann also briefly considers conflict and interactions between his self-reproducing machines, towards understanding the evolution of ecological and social interactions from his theory of self-reproducing machines.
Implementations
In automata theory, the concept of a universal constructor is non-trivial because of the existence of Garden of Eden patterns (configurations that have no predecessor). But a simple definition is that a universal constructor is able to construct any finite pattern of non-excited (quiescent) cells.
Arthur Burks and others extended the work of von Neumann, giving a much clearer and complete set of details regarding the design and operation of von Neumann's self-replicator. The work of J. W. Thatcher is particularly noteworthy, for he greatly simplified the design. Still, their work did not yield a complete design, cell by cell, of a configuration capable of demonstrating self-replication.
Renato Nobili and Umberto Pesavento published the first fully implemented self-reproducing cellular automaton in 1995, nearly fifty years after von Neumann's work. They used a 32-state cellular automaton instead of von Neumann's original 29-state specification, extending it to allow for easier signal-crossing, explicit memory function and a more compact design. They also published an implementation of a general constructor within the original 29-state CA but not one capable of complete replication - the configuration cannot duplicate its tape, nor can it trigger its offspring; the configuration can only construct.
In 2004, D. Mange et al. reported an implementation of a self-replicator that is consistent with the designs of von Neumann.
In 2007, Nobili published a 32-state implementation that uses run-length encoding to greatly reduce the size of the tape.
In 2008, William R. Buckley published two configurations which are self-replicators within the original 29-state CA of von Neumann. Buckley claims that the crossing of signal within von Neumann 29-state cellular automata is not necessary to the construction of self-replicators. Buckley also points out that for the purposes of evolution, each replicator should return to its original configuration after replicating, in order to be capable (in theory) of making more than one copy. As published, the 1995 design of Nobili-Pesavento does not fulfill this requirement but the 2007 design of Nobili does; the same is true of Buckley's configurations.
In 2009, Buckley published with Golly a third configuration for von Neumann 29-state cellular automata, which can perform either holistic self-replication, or self-replication by partial construction. This configuration also demonstrates that signal crossing is not necessary to the construction of self-replicators within von Neumann 29-state cellular automata.
C. L. Nehaniv in 2002, and also Y. Takada et al. in 2004, proposed a universal constructor directly implemented upon an asynchronous cellular automaton, rather than upon a synchronous cellular automaton.
Comparison of implementations
As defined by von Neumann, universal construction entails the construction of passive configurations, only. As such, the concept of universal construction constituted nothing more than a literary (or, in this case, mathematical) device. It facilitated other proof, such as that a machine well constructed may engage in self-replication, while universal construction itself was simply assumed over a most minimal case. Universal construction under this standard is trivial. Hence, while all the configurations given here can construct any passive configuration, none can construct the real-time crossing organ devised by Gorman.
Practicality and computational cost
All the implementations of von Neumann's self-reproducing machine require considerable resources to run on computer. For example, in the Nobili-Pesavento 32-state implementation shown above, while the body of the machine is just 6,329 non-empty cells (within a rectangle of size 97x170), it requires a tape that is 145,315 cells long, and takes 63 billion timesteps to replicate. A simulator running at 1,000 timesteps per second would take over 2 years to make the first copy. In 1995, when the first implementation was published, the authors had not seen their own machine replicate. However, in 2008, the hashlife algorithm was extended to support the 29-state and 32-state rulesets in Golly. On a modern desktop PC, replication now takes only a few minutes, although a significant amount of memory is required.
Animation gallery
See also
Codd's cellular automaton
Langton's loops
Nobili cellular automata
Quine, a program that produces itself as output
Santa Claus machine
Wireworld
References
External links
John von Neumann's 29 state Cellular Automata Implemented in OpenLaszlo by Don Hopkins
Artificial life
Cellular automaton patterns
Self-replicating machines
3D printing | Von Neumann universal constructor | [
"Physics",
"Technology",
"Biology"
] | 2,690 | [
"Physical systems",
"Self-replication",
"Machines",
"Self-replicating machines"
] |
15,894,497 | https://en.wikipedia.org/wiki/Bing%27s%20recognition%20theorem | In topology, a branch of mathematics, Bing's recognition theorem, named for R. H. Bing, asserts that a necessary and sufficient condition for a M to be homeomorphic to the is that every Jordan curve in M be contained within a topological ball. It is a weak version of the Poincaré conjecture.
References
3-manifolds
Geometric topology
Theorems in topology | Bing's recognition theorem | [
"Mathematics"
] | 77 | [
"Mathematical theorems",
"Theorems in topology",
"Geometric topology",
"Topology stubs",
"Topology",
"Mathematical problems"
] |
15,894,537 | https://en.wikipedia.org/wiki/Aristid%20von%20Grosse | Aristid von Grosse (January 1905 – July 21, 1985) was a German nuclear chemist. During his work with Otto Hahn, he got access to waste material from radium production, and with this starting material he was able in 1927 to isolate protactinium(V) oxide and was later able to produce metallic protactinium by decomposition of protactinium(V) iodide.
From 1948 to 1969, he was president of the Research Institute of Temple University and was later affiliated with the laboratories of the Franklin Institute in Philadelphia until his retirement in 1979. In 1971, he received a United States Atomic Energy Commission award in recognition of his "outstanding contributions to the development of nuclear energy."
Aristid was born in Riga in January 1905 and moved to the United States in 1930. He retired in 1979 and died of pneumonia in Laguna Hills, California on July 21, 1985.
References
1905 births
1985 deaths
Scientists from Riga
20th-century American chemists
People of Baltic German descent
Manhattan Project people
Nuclear chemists
Temple University faculty
Fellows of the American Physical Society
Deaths from pneumonia in California
Latvian emigrants to the United States | Aristid von Grosse | [
"Chemistry"
] | 231 | [
"Nuclear chemists"
] |
15,895,296 | https://en.wikipedia.org/wiki/Equisatisfiability | In mathematical logic (a subtopic within the field of formal logic), two formulae are equisatisfiable if the first formula is satisfiable whenever the second is and vice versa; in other words, either both formulae are satisfiable or both are not. Equisatisfiable formulae may disagree, however, for a particular choice of variables. As a result, equisatisfiability is different from logical equivalence, as two equivalent formulae always have the same models. Whereas within equisatisfiable formulae, only the primitive proposition the formula imposes is valued.
Equisatisfiability is generally used in the context of translating formulae, so that one can define a translation to be correct if the original and resulting formulae are equisatisfiable. Examples of translations that preserve equisatisfiability are Skolemization and some translations into conjunctive normal form such as the Tseytin transformation.
Examples
A translation from propositional logic into propositional logic in which every binary disjunction is replaced by , where is a new variable (one for each replaced disjunction) is a transformation in which satisfiability is preserved: the original and resulting formulae are equisatisfiable. Note that these two formulae are not equivalent: the first formula has the model in which is true while and are false (the model's truth value for being irrelevant to the truth value of the formula), but this is not a model of the second formula, in which has to be true in this case.
References
Metalogic
Model theory
Concepts in logic | Equisatisfiability | [
"Mathematics"
] | 344 | [
"Mathematical logic",
"Model theory"
] |
15,895,901 | https://en.wikipedia.org/wiki/Prescribed%20Ricci%20curvature%20problem | In Riemannian geometry, a branch of mathematics, the prescribed Ricci curvature problem is as follows: given a smooth manifold M and a symmetric 2-tensor h, construct a metric on M whose Ricci curvature tensor equals h.
See also
Prescribed scalar curvature problem
References
Thierry Aubin, Some nonlinear problems in Riemannian geometry. Springer Monographs in Mathematics, 1998.
Arthur L. Besse. Einstein manifolds. Reprint of the 1987 edition. Classics in Mathematics. Springer-Verlag, Berlin, 2008. xii+516 pp.
Dennis M. DeTurck, Existence of metrics with prescribed Ricci curvature: local theory. Invent. Math. 65 (1981/82), no. 1, 179–207.
Riemannian geometry
Mathematical problems
ricci curvature | Prescribed Ricci curvature problem | [
"Physics",
"Mathematics"
] | 161 | [
"Geometric measurement",
"Mathematical problems",
"Physical quantities",
"Curvature (mathematics)"
] |
15,896,503 | https://en.wikipedia.org/wiki/Southeastern%20Statistical%20Region | The Southeastern Statistical Region () is one of eight statistical regions of North Macedonia. Southeastern, located in the southeastern part of the country, borders Greece and Bulgaria. Internally, it borders the Vardar and Eastern statistical regions.
Municipalities
The Southeastern statistical region is divided into 10 municipalities:
Bogdanci
Bosilovo
Dojran
Gevgelija
Konče
Novo Selo
Radoviš
Strumica
Valandovo
Vasilevo
Demographics
Population
The current population of the Southeastern Statistical Region is 171,416 citizens, according to the last population census in 2002.
Ethnicities
The largest ethnic group in the region are the Macedonians.
References
Statistical regions of North Macedonia | Southeastern Statistical Region | [
"Mathematics"
] | 134 | [
"Statistical regions of North Macedonia",
"Statistical concepts",
"Statistical regions"
] |
15,897,071 | https://en.wikipedia.org/wiki/Kappa%20Cephei | Kappa Cephei, Latinized from κ Cephei, is a binary star system in the northern circumpolar constellation of Cepheus. It is visible to the naked eye as a faint, blue white-hued point of light with an apparent visual magnitude is 4.39. The system is located approximately 323–326 light years distant from the Sun, based on parallax.
The two gravitationally-bound members of this system had an angular separation of along a position angle of 120°, as of 2015. The primary, designated component A, has a stellar classification of B9III, matching a blue giant. The magnitude 8.34 secondary, component B, is an A-type main-sequence star of class A7V. A third star of 10th magnitude, BD+77 763, is listed as component C in the Washington Double Star Catalog although it is a background object unrelated to the other two.
References
A-type main-sequence stars
B-type giants
Binary stars
Cepheus (constellation)
Cephei, Kappa
Durchmusterung objects
Cephei, 01
192907
099255
7750 | Kappa Cephei | [
"Astronomy"
] | 236 | [
"Constellations",
"Cepheus (constellation)"
] |
15,897,104 | https://en.wikipedia.org/wiki/Eastern%20Statistical%20Region | The Eastern Statistical Region () is one of eight statistical regions of North Macedonia. Eastern, located in the eastern part of the country, borders Bulgaria. Internally, it borders the Vardar, Skopje, Northeastern, and Southeastern statistical regions.
Municipalities
Eastern statistical region is divided into 11 municipalities:
Demographics
Population
The current population of the Eastern Statistical Region is 150,234 citizens or 8.2% of the total population of the Republic of North Macedonia, according to the last population census in 2021.
Ethnicities
The largest ethnic group in the region are the Macedonians.
References
Statistical regions of North Macedonia | Eastern Statistical Region | [
"Mathematics"
] | 119 | [
"Statistical regions of North Macedonia",
"Statistical concepts",
"Statistical regions"
] |
15,897,518 | https://en.wikipedia.org/wiki/Pi%20Cephei | Pi Cephei (π Cephei) is a trinary star located in the constellation Cepheus. With a combined apparent magnitude of about 4.4, the system is faintly visible to the naked eye. The inner pair of stars orbits in 1.5 years while the outer companion completes one orbit in about 160 years.
Pi Cephei was found to have a visual companion star by Otto Wilhelm von Struve in 1843. That the primary is itself a spectroscopic binary was first noticed by William Wallace Campbell in 1901 using photographic plates taken at Lick Observatory.
References
Spectroscopic binaries
Triple star systems
Cepheus (constellation)
Cephei, Pi
Cephei, 33
G-type giants
F-type main-sequence stars
A-type main-sequence stars
114222
218658
8819
Durchmusterung objects | Pi Cephei | [
"Astronomy"
] | 173 | [
"Constellations",
"Cepheus (constellation)"
] |
15,897,912 | https://en.wikipedia.org/wiki/T%20Cephei | T Cephei is a Mira variable star in the constellation Cepheus. Located approximately distant, it varies between magnitudes 5.2 and 11.3 over a period of around 388 days. When it is near its maximum brightness, it is faintly visible to the naked eye under good observing conditions.
Vitold Ceraski announced his discovery that the star is a variable star, in 1879. It appeared with its variable star designation, T Cephei, in Annie Jump Cannon's 1907 publication Second catalogue of variable stars. T Cephei is a red giant of spectral type M6-9e with an effective temperature 2,400 K, a radius of , a mass of , and a luminosity of . If it were in the place of the Sun, its photosphere would at least engulf the orbit of Mars. This star is believed to be in a late stage of its life, the asymptotic giant branch phase, blowing off its own atmosphere to form a white dwarf in a distant future.
See also
VV Cephei
R Cancri
Mira
S Cassiopeiae
References
External links
T Cephei in VizieR
Cepheus (constellation)
Mira variables
Cephei, T
202012
M-type giants
8113
104451
Durchmusterung objects
Emission-line stars | T Cephei | [
"Astronomy"
] | 271 | [
"Constellations",
"Cepheus (constellation)"
] |
15,898,162 | https://en.wikipedia.org/wiki/Omicron%20Cephei | Omicron Cephei, Latinized from ο Cephei, is a binary star in the constellation of Cepheus. It consists of a less massive F-type main sequence star in orbit with a more massive G-type giant star. The overall apparent visual magnitude of the system is 4.75.
The pair was first determined to be binary by F. G. W. Struve in 1832. Since then, the secondary has been seen to revolve approximately 45 degrees around the primary. A number of orbits have been computed, the most recent giving a period of approximately 1500 years.
Visual companion
There is a visual companion, CCDM J23186+6807C, to the binary star. It has an approximate apparent visual magnitude of 12.8 and is located approximately 45 arcseconds away from it.
References
Cepheus (constellation)
G-type giants
F-type main-sequence stars
Triple stars
Binary stars
Cephei, Omicron
Cephei, 34
219916
115088
BD+67 1514
8872 | Omicron Cephei | [
"Astronomy"
] | 221 | [
"Constellations",
"Cepheus (constellation)"
] |
15,898,570 | https://en.wikipedia.org/wiki/19%20Cephei | 19 Cephei is a supergiant star in the northern circumpolar constellation of Cepheus. It has a spectral class of O9 and is a member of Cep OB2, an OB association of massive stars located about from the Sun.
The spectrum of 19 Cephei shows line profile variability on an hourly and daily timescale. This is thought to be due to the changes in the stellar wind.
Double star catalogues list several companions for 19 Cephei. The Washington Double Star Catalog describes four companions: 11th magnitude stars 20" and 56" away, and two 15th magnitude stars 4-5" away. The Catalog of Components of Double and Multiple Stars gives only the two 11th magnitude stars.
A scattered cluster of faint stars has been detected associated with 19 Cephei. The brightest likely members apart from 19 Cep itself are 10th magnitude stars.
References
External links
Cepheus (constellation)
Cephei, 19
109017
O-type supergiants
209975
08428
BD+61 2246 | 19 Cephei | [
"Astronomy"
] | 213 | [
"Constellations",
"Cepheus (constellation)"
] |
15,898,833 | https://en.wikipedia.org/wiki/Wynne%20Edwin%20Baxter | Wynne Edwin Baxter FRMS FGS (1 May 1844 – 1 October 1920) was an English lawyer, translator, antiquarian and botanist, but is best known as the coroner who conducted the inquests on most of the victims of the Whitechapel Murders of 1888 to 1891 including three of the victims of Jack the Ripper in 1888, as well as on Joseph Merrick, the "Elephant Man".
Legal career
Baxter was the son of William Baxter, youngest of three sons of John Baxter (1781–1858), a Lewes printer and publisher, printer of Baxter's Bible. His Uncle George Baxter was the inventor of a method for colour printing. He attended Lewes Old Grammar School, and was educated privately by the Rev. Frost in Brighton. He studied Law and was admitted as a solicitor in 1867. Maintaining a link with printing, the family business, he was vice-president of the Provincial Newspaper Society between 1871 and 1877. He was appointed Junior Headborough for Lewes in 1868, Under-Sheriff of London and Middlesex from 1876 to 1879 and 1885 to 1886, Junior High Constable in 1878, and the last Senior High Constable in 1880. In 1881 Baxter became the first Mayor of Lewes. He acted as solicitor to Lewes Co-operative Benefit Building Society from 1870 until his death in 1920. He went on to become a member of the Law Society, the Law Association, and the Solicitor's Benevolent Association.
Baxter moved from Lewes to London in 1875, starting a solicitor's practice and an advertising agency at the same premises in Cannon Street. He maintained a legal practice at Lewes, which eventually would be run by his son, Reginald 'Reggie' Truscott Baxter. As the Coroner for Sussex from 1880 to 1887, Wynne Baxter conducted the inquest of the Brighton 'railway murderer' Percy Lefroy Mapleton who was hanged in 1881, as well as that of his victim, Isaac Frederick Gold.
By 1885 Baxter held two Deputy Coronerships in London, the City of London and Borough of Southwark. In December 1886 he won a bitterly fought contest to be elected the Coroner for the County of Middlesex (Eastern District); he was later appointed Coroner for the County of Middlesex (South Eastern District) from 1889 to 1891, and then for the City of London (Eastern District) and the Liberty of the Tower of London from 1892 until his death.
In July 1887 he held the inquest of Miriam Angel, who had been poisoned by Israel Lipski at 16, Batty Street. The name 'Lipski' was to become well known in Whitechapel in the next year, as was that of Baxter himself.
Whitechapel Murders
Baxter played a key judicial role during the Whitechapel Murders of 1888 to 1891, conducting the inquests into the deaths of Annie Millwood, Emma Elizabeth Smith, Polly Nichols, Annie Chapman, Elizabeth Stride, Rose Mylett, Alice McKenzie, the 'Pinchin Street Torso' and Frances Coles. The inquest for Mary Ann 'Polly' Nichols was conducted by Baxter on 1 September 1888 at the Working Lads' Institute in Whitechapel Road, and was attended by Detective Inspectors Frederick Abberline and Helson and Sergeants Godley and Enright on behalf of the Criminal Investigation Department (CID). Resumed on 3 and 17 September, Baxter heard testimony from numerous witnesses and gave examples of his blunt questioning style, such as this example reported in The Daily Telegraph of 4 September:
Baxter, to Henry Tomkins, horse slaughterer: Are there any women about there?
Tomkins: Oh! I know nothing about them, I don't like 'em.
Baxter: I did not ask you whether you like them; I ask you whether there were any about that night.
Baxter's own theory was that the murderer was attempting to obtain certain female organs for sale to doctors along with a medical periodical. Having heard medical evidence from Police Surgeon Dr George Bagster Phillips during the inquest into Annie Chapman's murder, Baxter said:
"The body had not been dissected, but the injuries had been made by someone who had considerable anatomical skill and knowledge. There were no meaningless cuts. The organ had been taken by one who knew where to find it, what difficulties he would have to contend against, and how he should use his knife so as to abstract the organ without injury to it....The conclusion that the desire was to possess the missing abdominal organ seemed overwhelming."
This theory was disproved soon after Baxter suggested it.
Later life
Appointed a Life Governor of the London Hospital in 1889, on 15 April 1890 he conducted the inquest into the death of the hospital's most famous resident, Joseph Carey Merrick, the 'Elephant Man', who had died on 11 April 1890. Wynne Edwin Baxter was the last High Constable of Lewes, and became the town's first Mayor in 1881.
The painting of Baxter as the first mayor of Lewes (as used at the top of this page), which hangs in the Assembly Room of Lewes Town Hall, is an interesting one. He is shown with the red mayor's gown, the mayoral chain, the mace and the chair. However, these items had to be made and he only had them for the last week of his mayoralty.
He was Clerk to the Lewes Provision Market, Governor of the Lewes Exhibition Fund, a member of the Committee of the Lewes National Schools, and a director of the Lewes Victoria Hospital.
Between November 1914 and April 1916, during the First World War, Baxter conducted inquests into the deaths of eleven German spies, including Karl Lody, who had been captured in Great Britain and tried and executed at the Tower of London. On 13 June 1917 the Germans launched the first daylight air raid over London. 17 Gotha G biplanes were flown from Belgium, dropping bombs on east London. 162 people were killed and a further 426 were injured during the raid, being the highest death toll from a single air raid on Britain during that war. On 15 June 1917 Baxter presided over the inquests of 20 of the victims at Poplar.
Baxter was a noted plant collector, a Fellow of the Geological Society of London and a Fellow and Treasurer of the Royal Microscopical Society. He was fluent in French, and, in the 1890s, translated a number of scientific books from that language into English. Baxter was also an antiquarian, having in his library 3,000 volumes concerning Paradise Lost author John Milton, many of them rare editions. He wrote and delivered academic papers on Milton. He was a member of the archaeological societies of Middlesex, Surrey, Kent, Sussex, and Gloucestershire. In addition, he was Clerk to two City Guilds, the Worshipful Company of Shipwrights and the Worshipful Company of Farriers. Moving to Stoke Newington he served as Chairman of the Public Library Committee, Chairman of the Licensing Bench, and Manager of Barn Street School. He was a prominent Freemason, being a member of the South Saxon Lodge No. 311.
In 1907 Baxter said "I have held over 30,000 inquests, and have not had one body exhumed yet".
Wynne Edwin Baxter died at his home at 170, Church Street, Stoke Newington, in 1920, at the age of 76. He has a memorial against the east wall of the churchyard of All Saints Church in Lewes.
Legacy
Baxter's legal practice in Lewes exists today as Mayo Wynne Baxter LLP, which was formed in 2007 with the merger of Mayo & Perkins and Wynne Baxter. The firm has eight offices across Sussex employing about 250 staff. In 2005 the Brighton and Hove Bus Company named their number 657 bus 'Wynne Baxter'. The name on the bus was unveiled during the 'Jack the Ripper' Conference, which that year was held in Brighton.
Publications
The Domesday Book of Kent – A Return of Owners of Land 1873. By Wynne E Baxter (1877); based on data in the Return of Owners of Land, 1873 government survey.
The Domesday Book for the County of Middlesex. By Wynne E. Baxter (Lewes: 1877).
The Microscope: Its construction and management. By Dr. Henri Van Heurck, Professor of Botany and Director at the Antwerp Botanical Gardens. Translated by Wynne E. Baxter, FRMS, FGS. London, Crosby, Lockwood & Son, New York, D. Van Nostrand Co., (1893)
A Treatise on the Diatomaceae by Henri van Heurck. Translated by Wynne E Baxter. Pub. W. Wesley & Son, London (1896)
Media
In the 1988 TV mini-series Jack the Ripper, starring Michael Caine as Inspector Abberline, Baxter was played by veteran actor Harry Andrews.
References
External links
Baxter on the Casebook:Jack the Ripper website
Baxter as Mayor of Lewes
1844 births
1920 deaths
Jack the Ripper
English lawyers
English solicitors
Microscopists
People from Lewes
Fellows of the Geological Society of London
Fellows of the Royal Microscopical Society
People educated at Lewes Old Grammar School
Freemasons of the United Grand Lodge of England | Wynne Edwin Baxter | [
"Chemistry"
] | 1,869 | [
"Microscopists",
"Microscopy"
] |
15,898,836 | https://en.wikipedia.org/wiki/16%20Cephei | 16 Cephei is a single star located about 119 light years away from the Sun in the constellation of Cepheus. It is visible to the naked eye as a faint, yellow-white hued star with an apparent visual magnitude of 5.036. The star has a relatively high proper motion, traversing the celestial sphere at the rate of 0.174 arc seconds per annum. It is moving closer to the Earth with a heliocentric radial velocity of −21 km/s.
This is an ordinary F-type main-sequence star, somewhat hotter than the sun, with a stellar classification of F5 V. It is around two billion years old with a projected rotational velocity of 26.4 km/s. The star has 1.38 times the mass of the Sun and 2.77 times the Sun's radius. It is radiating 11 times the luminosity of the Sun from its photosphere at an effective temperature of 6,238 K. The star is a source of X-ray emission.
There are several 11th and 12th magnitude stars within a few arc-minutes of 16 Cephei, all of them distant background objects. Only one of these is listed in the Washington Double Star Catalog and Catalog of Components of Double and Multiple Stars as a companion.
References
F-type main-sequence stars
Double stars
Cepheus (constellation)
Durchmusterung objects
Cephei, 16
108535
209369
8400 | 16 Cephei | [
"Astronomy"
] | 295 | [
"Constellations",
"Cepheus (constellation)"
] |
15,898,987 | https://en.wikipedia.org/wiki/Calcium%20channel%2C%20voltage-dependent%2C%20T%20type%2C%20alpha%201H%20subunit | Calcium channel, voltage-dependent, T type, alpha 1H subunit, also known as CACNA1H, is a protein which in humans is encoded by the CACNA1H gene.
Function
This gene encodes Cav3.2, a T-type member of the α1 subunit family, a protein in the voltage-dependent calcium channel complex. Calcium channels mediate the influx of calcium ions into the cell upon membrane polarization and consist of a complex of α1, α2δ, β, and γ subunits in a 1:1:1:1 ratio. The α1 subunit has 24 transmembrane segments and forms the pore through which ions pass into the cell. There are multiple isoforms of each of the proteins in the complex, either encoded by different genes or the result of alternative splicing of transcripts. Alternate transcriptional splice variants, encoding different isoforms, have been characterized for the gene described here.
Clinical significance
Studies suggest certain mutations in this gene lead to childhood absence epilepsy (CAE). Variants of Cav3.2 with increased channel activity contribute to susceptibility to idiopathic generalized epilepsy (IGE), but are not sufficient to induce epilepsy on their own. The SFARIgene database lists CACNA1H with an autism score of 2.1, indicating a candidate causal relationship with autism.
See also
T-type calcium channel
References
External links
Further reading
Ion channels
Integral membrane proteins | Calcium channel, voltage-dependent, T type, alpha 1H subunit | [
"Chemistry"
] | 309 | [
"Neurochemistry",
"Ion channels"
] |
15,899,375 | https://en.wikipedia.org/wiki/GTF2A1 | Transcription initiation factor IIA subunit 1 is a protein that in humans is encoded by the GTF2A1 gene.
Interactions
GTF2A1 has been shown to interact with TATA binding protein and TBPL1.
See also
Transcription Factor II A
References
Further reading
Transcription factors | GTF2A1 | [
"Chemistry",
"Biology"
] | 55 | [
"Induced stem cells",
"Gene expression",
"Transcription factors",
"Signal transduction"
] |
15,900,022 | https://en.wikipedia.org/wiki/A1689-zD1 | A1689-zD1 is a galaxy in the Virgo constellation. It was a candidate for the most distant and therefore earliest-observed galaxy discovered , based on a photometric redshift.
If the redshift, z~7.6, is correct, it would explain why the galaxy's faint light reaches us at infrared wavelengths. It could only be observed with Hubble Space Telescope's Near Infrared Camera and Multi-Object Spectrometer (NICMOS) and the Spitzer Space Telescope's Infrared Array Camera exploiting the natural phenomenon of gravitational lensing: the galaxy cluster Abell 1689, which lies between Earth and A1689-zD1, at a distance of 2.2 billion light-years from us, functions as a natural "magnifying glass" for the light from the far more distant galaxy which lies directly behind it, at 700 million years after the Big Bang, as seen from Earth.
See also
IOK-1
UDFy-38135539
List of the most distant astronomical objects
References
Virgo (constellation)
Galaxies
Dwarf galaxies
Gravitational lensing
Astronomical objects discovered in 2008 | A1689-zD1 | [
"Astronomy"
] | 233 | [
"Virgo (constellation)",
"Constellations"
] |
13,212,786 | https://en.wikipedia.org/wiki/TerraNet%20AB | Terranet AB is a company that develops technology for Advanced driver-assistance systems (ADAS) and autonomous vehicles. It is headquartered in Sweden and has an office in Stuttgart, Germany. Terranet is currently led by acting CEO Magnus Andersson.
Terranet previously focused on delivering mobile telephony and data services via a peer-to-peer mobile mesh network of handsets and light infrastructure. Since 2018, the company is focused on developing technology for advanced driver assistance and autonomous vehicles.
Terranet addresses the fast-growing global ADAS market, which is projected to reach USD 84 billion by 2025 - an increase of 150% from 2021.
The company's primary focus is to develop and commercialize their BlincVision product, a new type of anti-collision system for advanced driver assistance for motorized vehicles based on laser scanning, event cameras and three-dimensional image analysis. BlincVision is based on Voxelflow, a patented software for advanced three-dimensional image analysis of moving objects. In May 2022, Terranet shared that BlincVision is expected to be production ready in a couple of years.
Terranet Holding AB (publ) is listed on Nasdaq First North Premier Growth Market since 2017 (Nasdaq: TERRNT B).
History
Terranet AB was founded in 2004 by the inventor Anders Carlius, a serial entrepreneur from Lund, Skåne County. Carlius, who came from a background in chip manufacturing with Switchcore and also worked for web portal operator Spray Network, served as the first CEO until 2010. Since its inception Terranet has been headquartered at Lund's Ideon Science Park, which is best known as the home of Ericsson Radio Systems.
Carlius says he came up with the idea while travelling on safari in east Africa with his wife Emma. The first extensive pilot project was carried out in the autumn of 2005 on a farming co-operative in Botswana. Other trials included an agreement with Indian operator Bharat Sanchar Nigam to test 50 handsets in late 2012, and a number of pilots in South America. That year, development engineer Conny Do said his main prerogative was to miniaturise Terranet's credit card-sized circuit so that it could be installed in any mobile handset.
In 2017, Terranet was listed on Nasdaq First North Premier Growth Market (Nasdaq: TERRNT-B). The following year, the company decided to focus its operations on developing technologies for the automotive industry, more specifically for advanced driver assistance and autonomous vehicles.
On October 20, 2020, Terranet signed a Memorandum of Understanding with leading automotive marque Mercedes-Benz AG regarding the use of their advanced driver-assist systems and 3D motion awareness technology.
References
Mobile radio telephone systems
Telecommunications companies of Sweden
Mesh networking
Companies based in Lund | TerraNet AB | [
"Technology"
] | 574 | [
"Mobile telecommunications",
"Wireless networking",
"Mobile radio telephone systems",
"Mesh networking"
] |
13,213,116 | https://en.wikipedia.org/wiki/Captology | Captology is the study of computers as persuasive technologies. This area of inquiry explores the overlapping space between persuasion in general (influence, motivation, behavior change, etc.) and computing technology. This includes the design, research, and program analysis of interactive computing products (such as the Web, desktop software, specialized devices, etc.) created for the purpose of changing people's attitudes or behaviors.
B. J. Fogg in 1996 derived the term captology from an acronym: Computers As Persuasive Technologies. In 2003, he published the first book on captology, entitled Persuasive Technology: Using Computers to Change What We Think and Do.
Captology is not the same thing as Behavior Design, according to BJ Fogg who is the person who coined both terms and created the foundation for both areas.
See also
Is Google Making Us Stupid?
Humu (software)
References
Further reading
External links
The Stanford University Persuasive Technology Lab
The Web Credibility Project
Persuasive Computers: Perspectives and Research Directions
Computing culture
1990s neologisms
Persuasion | Captology | [
"Technology"
] | 220 | [
"Computing culture",
"Computer science stubs",
"Computer science",
"Computing and society",
"Computing stubs"
] |
13,213,280 | https://en.wikipedia.org/wiki/Kachurovskii%27s%20theorem | In mathematics, Kachurovskii's theorem is a theorem relating the convexity of a function on a Banach space to the monotonicity of its Fréchet derivative.
Statement of the theorem
Let K be a convex subset of a Banach space V and let f : K → R ∪ {+∞} be an extended real-valued function that is Fréchet differentiable with derivative df(x) : V → R at each point x in K. (In fact, df(x) is an element of the continuous dual space V∗.) Then the following are equivalent:
f is a convex function;
for all x and y in K,
df is an (increasing) monotone operator, i.e., for all x and y in K,
References
(Proposition 7.4)
Convex analysis
Theorems in functional analysis | Kachurovskii's theorem | [
"Mathematics"
] | 179 | [
"Theorems in mathematical analysis",
"Theorems in functional analysis"
] |
13,213,701 | https://en.wikipedia.org/wiki/K%C5%8Dmura%27s%20theorem | In mathematics, Kōmura's theorem is a result on the differentiability of absolutely continuous Banach space-valued functions, and is a substantial generalization of Lebesgue's theorem on the differentiability of the indefinite integral, which is that Φ : [0, T] → R given by
is differentiable at t for almost every 0 < t < T when φ : [0, T] → R lies in the Lp space L1([0, T]; R).
Statement
Let (X, || ||) be a reflexive Banach space and let φ : [0, T] → X be absolutely continuous. Then φ is (strongly) differentiable almost everywhere, the derivative φ′ lies in the Bochner space L1([0, T]; X), and, for all 0 ≤ t ≤ T,
References
(Theorem III.1.7)
Theorems in measure theory
Theorems in functional analysis | Kōmura's theorem | [
"Mathematics"
] | 199 | [
"Theorems in mathematical analysis",
"Theorems in measure theory",
"Theorems in functional analysis"
] |
13,214,323 | https://en.wikipedia.org/wiki/Fixed%20wireless | Fixed wireless is the operation of wireless communication devices or systems used to connect two fixed locations (e.g., building to building or tower to building) with a radio or other wireless link, such as laser bridge. Usually, fixed wireless is part of a wireless LAN infrastructure. The purpose of a fixed wireless link is to enable data communications between the two sites or buildings. Fixed wireless data (FWD) links are often a cost-effective alternative to leasing fiber or installing cables between the buildings.
The point-to-point signal transmissions occur through the air over a terrestrial microwave platform rather than through copper or optical fiber; therefore, fixed wireless does not require satellite feeds or local telephone service. The advantages of fixed wireless include the ability to connect with users in remote areas without the need for laying new cables and the capacity for broad bandwidth that is not impeded by fiber or cable capacities. Fixed wireless devices usually derive their electrical power from the public utility mains, unlike mobile wireless or portable wireless devices which tend to be battery powered.
Antennas
Fixed wireless services typically use a directional radio antenna on each end of the signal (e.g., on each building). These antennas are generally larger than those seen in Wi-Fi setups and are designed for outdoor use. Several types of radio antennas are available that accommodate various weather conditions, signal distances and bandwidths. They are usually selected to make the beam as narrow as possible and thus focus transmit power to their destination, increasing reliability and reducing the chance of eavesdropping or data injection. The links are usually arranged as a point-to-point setup to permit the use of these antennas. This also permits the link to have better speed and or better reach for the same amount of power.
These antennas are typically designed to be used in the unlicensed ISM band radio frequency bands (900 MHz, 1.8 GHz, 2.4 GHz and 5 GHz), however, in most commercial installations, licensed frequencies may be used to ensure quality of service (QoS) or to provide higher connection speeds.
Fixed wireless broadband
Businesses and homes can use fixed-wireless antenna technology to access broadband Internet and Layer 2 networks using fixed wireless broadband. Networks which have redundancy and saturation and antennas that can aggregate signal from multiple carriers are able to offer fail-over and redundancy for connectivity not generally afforded by wired connections. In rural areas where wired infrastructure is not yet available, fixed-wireless broadband can be a viable option for Internet access.
See also
Internet access
Mobile wireless communication
Mobile broadband
Microwave Bypass
Ethernet bridge
Wireless ISP
References
Wireless networking | Fixed wireless | [
"Technology",
"Engineering"
] | 525 | [
"Wireless networking",
"Computer networks engineering"
] |
13,214,553 | https://en.wikipedia.org/wiki/Geographic%20number | A geographic number is a telephone number, from a range of numbers in the United Kingdom National Telephone Numbering Plan, where part of its digit structure contains geographic significance used for routing calls to the physical location of the network termination point of the subscriber to whom the telephone number has been assigned, or where the network termination point does not relate to the geographic area code but where the tariffing remains consistent with that geographic area code.
In the Netherlands any telephone number consists of 10 digits and the geographic number is often separated with a minus sign. The number 0592 for example is the geographic number for the area in and around the city Assen, and Groningen uses 050. Someone living in Assen has a caller ID of 6 numbers and someone in Groningen has a caller ID of 7 numbers.
See also
Telephone number
Telephone numbering plan
List of country calling codes
Caller ID
Telephone numbers
Identifiers | Geographic number | [
"Mathematics"
] | 179 | [
"Mathematical objects",
"Numbers",
"Telephone numbers"
] |
13,214,825 | https://en.wikipedia.org/wiki/Nigerian%20Society%20of%20Chemical%20Engineers | The Nigerian Society of Chemical Engineers (NSChE) is an organization for chemical engineers in Nigeria. NSChE was officially inaugurated on 12 March 1969 at a meeting at BP House in Lagos attended by twenty four Chemical Engineers, all trained abroad. In 1999 it became a Division of the Nigerian Society of Engineers. The Society publishes the Nigerian Society of Chemical Engineering Journal.
Chapters
The following Chapters have been granted Charter status by the Council.
Anambra/Enugu/Ebonyi States
Oyo/Osun States
Kaduna/Kastina States
Lagos/Ogun States
Rivers/Bayelsa States
Cross River/Akwa Ibom
Imo/Abia States
Edo/Delta States
Kwara/Kogi States
Adamawa/Bauchi/Benue/Yobe/Gombe/Taraba States (ABBYGOT)
Benue Industrial
FCT/Niger Chapter
United States of America (USA) Chapter
Student chapters
The following student chapters have also been granted Charter Status by the Council:
Obafemi Awolowo University, Ile-Ife
Chukwuemeka Odumegwu Ojukwu University, uli
Ahmadu Bello University, Zaria
University of Lagos, Akoka, Lagos
University of Port Harcourt, Port Harcourt
Rivers State University of Science and Technology, Nkpolu, Port Harcourt;
Lagos State University, Ojo;
Ladoke Akintola University of Technology, Ogbomoso
Enugu State University of science and Technology, Enugu
Federal University of Technology, Owerri;
Federal University of Technology Yola now known as(Mautech)
Kaduna Polytechnic, Kaduna
University of Benin, Benin City
Petroleum Training Institute, Effurun
Auchi Polytechnic, Auchi
Michael Okpara University of Agriculture
Umudike Abia state
Federal University of Petroleum Resources Effurun (FUPRE)
References
External links
NSChE website
Chemical engineering organizations
Professional associations based in Nigeria
Organizations based in Lagos
1969 establishments in Nigeria
Organizations established in 1969 | Nigerian Society of Chemical Engineers | [
"Chemistry",
"Engineering"
] | 402 | [
"Chemical engineering",
"Chemical engineering organizations",
"Chemistry organization stubs"
] |
13,215,001 | https://en.wikipedia.org/wiki/Conveyor%20system | A conveyor system is a common piece of mechanical handling equipment that moves materials from one location to another. Conveyors are especially useful in applications involving the transport of heavy or bulky materials. Conveyor systems allow quick and efficient transport for a wide variety of materials, which make them very popular in the material handling and packaging industries. They also have popular consumer applications, as they are often found in supermarkets and airports, constituting the final leg of item/ bag delivery to customers. Many kinds of conveying systems are available and are used according to the various needs of different industries. There are chain conveyors (floor and overhead) as well. Chain conveyors consist of enclosed tracks, I-Beam, towline, power & free, and hand pushed trolleys.
Industries where used
Conveyor systems are used widespread across a range of industries due to the numerous benefits they provide.
Conveyors are able to safely transport materials from one level to another, which when done by human labor would be strenuous and expensive.
They can be installed almost anywhere, and are much safer than using a forklift or other machine to move materials.
They can move loads of all shapes, sizes and weights. Also, many have advanced safety features that help prevent accidents.
There are a variety of options available for running conveying systems, including the hydraulic, mechanical and fully automated systems, which are equipped to fit individual needs.
Conveyor systems are commonly used in many industries, including the Mining, automotive, agricultural, computer, electronic, food processing, aerospace, pharmaceutical, chemical, bottling and canning, print finishing and packaging. Although a wide variety of materials can be conveyed, some of the most common include food items such as beans and nuts, bottles and cans, automotive components, scrap metal, pills and powders, wood and furniture and grain and animal feed. Many factors are important in the accurate selection of a conveyor system. It is important to know how the conveyor system will be used beforehand. Some individual areas that are helpful to consider are the required conveyor operations, such as transport, accumulation and sorting, the material sizes, weights and shapes and where the loading and pickup points need to be.
Care and maintenance
A conveyor system is often the lifeline to a company's ability to effectively move its product in a timely fashion. The steps that a company can take to ensure that it performs at peak capacity, include regular inspections and system audits, close monitoring of motors and reducers, keeping key parts in stock, and proper training of personnel.
Increasing the service life of a conveyor system involves: choosing the right conveyor type, the right system design and paying attention to regular maintenance practices.
A conveyor system that is designed properly will last a long time with proper maintenance. Overhead conveyor systems have been used in numerous applications from shop displays, assembly lines to paint finishing plants and more.
Impact and wear-resistant materials used in manufacturing
Conveyor systems require materials suited to the displacement of heavy loads and the wear-resistance to hold-up over time without seizing due to deformation. Where static control is a factor, special materials designed to either dissipate or conduct electrical charges are used. Examples of conveyor handling materials include UHMW, nylon, Nylatron NSM, HDPE, Tivar, Tivar ESd, and polyurethane.
Growth in various industries
As far as growth is concerned the material handling and conveyor system makers are getting utmost exposure in the industries like automotive, pharmaceutical, packaging and different production plants. The portable conveyors are likewise growing fast in the construction sector and by the year 2014 the purchase rate for conveyor systems in North America, Europe and Asia is likely to grow even further. The most commonly purchased types of conveyors are line-shaft roller conveyors, chain conveyors and conveyor belts at packaging factories and industrial plants where usually product finishing and monitoring are carried. Commercial and civil sectors are increasingly implementing conveyors at airports, shopping malls, etc.
Types
Aero-mechanical conveyor
Automotive conveyor
Belt conveyor
Belt-driven live roller conveyor
Bucket conveyor
Chain conveyor
Chain-driven live roller conveyor
Drag conveyor
Dust-proof conveyor
Electric track vehicle system
Flexible conveyor
Gravity conveyor
Gravity skate-wheel conveyor
Lineshaft roller conveyor
Motorized-drive roller conveyor
Overhead I-beam conveyor
Overland conveyor
Pharmaceutical conveyor
Plastic belt conveyor
Pneumatic conveyor
Screw or auger conveyor
Spiral conveyor
Tube chain conveyor
Tubular Gallery conveyor
Vacuum conveyor
Vertical conveyor
Vibrating conveyor
Walking Beam
Wire mesh conveyor
Pneumatic
Every pneumatic system uses pipes or ducts called transport lines that carry a mixture of materials and a stream of air. These materials are free flowing powdery materials like cement and fly ash. Products are moved through tubes by air pressure. Pneumatic conveyors are either carrier systems or dilute-phase systems; carrier systems simply push items from one entry point to one exit point, such as the money-exchanging pneumatic tubes used at a bank drive-through window. Dilute-phase systems use push-pull pressure to guide materials through various entry and exit points. Air compressors or blowers can be used to generate the air flow.
Three systems used to generate high-velocity air stream:
Suction or vacuum systems, utilizing a vacuum created in the pipeline to draw the material with the surrounding air. The system operated at a low pressure, which is practically 0.4–0.5 atm below atmosphere, and is utilized mainly in conveying light free flowing materials.
Pressure-type systems, in which a positive pressure is used to push material from one point to the next. The system is ideal for conveying material from one loading point to a number of unloading points. It operates at a pressure of 6 atm and upwards.
Combination systems, in which a suction system is used to convey material from a number of loading points and a pressure system is employed to deliver it to a number of unloading points.
Vibrating
A vibrating conveyor is a machine with a solid conveying surface which is turned up on the side to form a trough. They are used extensively in food-grade applications to convey dry bulk solids where sanitation, washdown, and low maintenance are essential. Vibrating conveyors are also suitable for harsh, very hot, dirty, or corrosive environments. They can be used to convey newly-cast metal parts which may reach upwards of . Due to the fixed nature of the conveying pans vibrating conveyors can also perform tasks such as sorting, screening, classifying and orienting parts. Vibrating conveyors have been built to convey material at angles exceeding 45° from horizontal using special pan shapes. Flat pans will convey most materials at a 5° incline from horizontal line.
Flexible
The flexible conveyor is based on a conveyor beam in aluminum or stainless steel, with low-friction slide rails guiding a plastic multi-flexing chain. Products to be conveyed travel directly on the conveyor, or on pallets/carriers. These conveyors can be worked around obstacles and keep production lines flowing. They are made at varying levels and can work in multiple environments. They are used in food packaging, case packing, and pharmaceutical industries and also in large retail stores such as Wal-Mart and Kmart.
Spiral
Like vertical conveyors, spiral conveyors raise and lower materials to different levels of a facility. In contrast, spiral conveyors are able to transport material loads in a continuous flow. A helical spiral or screw rotates within a sealed tube and the speed makes the product in the conveyor rotate with the screw. The tumbling effect provides a homogeneous mix of particles in the conveyor, which is essential when feeding pre-mixed ingredients and maintaining mixing integrity. Industries that require a higher output of materials - food and beverage, retail case packaging, pharmaceuticals - typically incorporate these conveyors into their systems over standard vertical conveyors due to their ability to facilitate high throughput. Most spiral conveyors also have a lower angle of incline or decline (11 degrees or less) to prevent sliding and tumbling during operation.
Vertical
Vertical conveyors, also commonly referred to as freight lifts and material lifts, are conveyor systems used to raise or lower materials to different levels of a facility during the handling process. Examples of these conveyors applied in the industrial assembly process include transporting materials to different floors. While similar in look to freight elevators, vertical conveyors are not equipped to transport people, only materials.
Vertical lift conveyors contain two adjacent, parallel conveyors for simultaneous upward movement of adjacent surfaces of the parallel conveyors. One of the conveyors normally has spaced apart flights (pans) for transporting bulk food items. The dual conveyors rotate in opposite directions, but are operated from one gear box to ensure equal belt speed. One of the conveyors is pivotally hinged to the other conveyor for swinging the attached conveyor away from the remaining conveyor for access to the facing surfaces of the parallel conveyors. Vertical lift conveyors can be manually or automatically loaded and controlled. Almost all vertical conveyors can be systematically integrated with horizontal conveyors, since both of these conveyor systems work in tandem to create a cohesive material handling assembly line.
Like spiral conveyors, vertical conveyors that use forks can transport material loads in a continuous flow. With these forks the load can be taken from one horizontal conveyor and put down on another horizontal conveyor on a different level. By adding more forks, more products can be lifted at the same time. Conventional vertical conveyors must have input and output of material loads moving in the same direction. By using forks many combinations of different input- and output- levels in different directions are possible. A vertical conveyor with forks can even be used as a vertical sorter. Compared to a spiral conveyor a vertical conveyor - with or without forks - takes up less space.
Vertical reciprocating conveyors (or VRC) are another type of unit handling system. Typical applications include moving unit loads between floor levels, working with multiple accumulation conveyors, and interfacing overhead conveyors line. Common material to be conveyed includes pallets, sacks, custom fixtures or product racks and more.
Motorized Drive Roller (MDR)
Motorized Drive Roller (MDR) conveyor utilize drive rollers that have a Brushless DC (BLDC) motor embedded within a conveyor roller tube. A single motorized roller tube is then mechanically linked to a small number of non-powered rollers to create a controllable zone of powered conveyor. A linear collection of these individually powered zones are arranged end to end to form a line of contiguous conveyor. The mechanical performance (torque, speed, efficiency, etc.) of drive rollers equipped with BLDC motors is right in the range of that needed for roller conveyor zones when they need to convey general use carton boxes of the size and weight seen in typical modern warehouse and distribution applications. A typical motorized roller conveyor zone can handle carton items weighing up to approximately 35 kg (75 lbs.).
Heavy-duty roller
Heavy-duty roller conveyors are used for moving items that weigh at least . This type of conveyor makes the handling of such heavy equipment/products easier and more time effective. Many of the heavy duty roller conveyors can move as fast as .
Other types of heavy-duty roller conveyors are gravity roller conveyors, chain-driven live roller conveyors, pallet accumulation conveyors, multi-strand chain conveyors, and chain and roller transfers.
Gravity roller conveyors are easy to use and are used in many different types of industries such as automotive and retail.
Chain-driven live roller conveyors are used for single or bi-directional material handling. Large, heavy loads are moved by chain driven live roller conveyors.
Pallet accumulation conveyors are powered through a mechanical clutch. This is used instead of individually powered and controlled sections of conveyors.
Multi-strand chain conveyors are used for double-pitch roller chains. Products that cannot be moved on traditional roller conveyors can be moved by a multi-strand chain conveyor.
Chain and roller conveyors are short runs of two or more strands of double-pitch chain conveyors built into a chain-driven line roller conveyor. These pop up under the load and move the load off of the conveyor.
Walking Beam
It usually consists of two fluid power cylinders or also can use a motor driven cam. For the cylinder driven fluid power type, one axis is for vertical motion and the other for horizontal. Both cam and fluid power types require nests at each station to retain the part that is being moved. The beam is raised, raising the part from its station nest and holding the part in a nest on the walking beam, then moved horizontally, transporting the part to the next nest, then lowered vertically, placing the part in the next station's nest. The beam is then returned to its home position while it is in the lowered position out of the way of the parts. This type of conveying system is useful for parts that need to be accurately physically located or relatively heavy parts. All stations are equidistance and require a nest to retain the part.
See also
Belt conveyor
Chain conveyor
Checkweigher
Manufacturing
Material handling
Moving bed heat exchanger
Moving walkway
Treadmill
References
M.Marcu-Pipeline Conveyors (theory,photos,state of the art 1990-Pneumatic Pipeline conveyors with wheeled containers) at page 45 in: "Material handling in pyrometallurgy: proceedings of the International Symposium on Materials Handling in Pyrometallurgy, Hamilton, Ontario, August 26–30, 1990-Pergamon press"
External links
The importance of conveyor and sortation systems for controlled growth (2:03 min. video)
Freight transport
Packaging machinery
Material-handling equipment | Conveyor system | [
"Engineering"
] | 2,816 | [
"Packaging machinery",
"Industrial machinery"
] |
13,215,004 | https://en.wikipedia.org/wiki/Moreau%27s%20theorem | In mathematics, Moreau's theorem is a result in convex analysis named after French mathematician Jean-Jacques Moreau. It shows that sufficiently well-behaved convex functionals on Hilbert spaces are differentiable and the derivative is well-approximated by the so-called Yosida approximation, which is defined in terms of the resolvent operator.
Statement of the theorem
Let H be a Hilbert space and let φ : H → R ∪ {+∞} be a proper, convex and lower semi-continuous extended real-valued functional on H. Let A stand for ∂φ, the subderivative of φ; for α > 0 let Jα denote the resolvent:
and let Aα denote the Yosida approximation to A:
For each α > 0 and x ∈ H, let
Then
and φα is convex and Fréchet differentiable with derivative dφα = Aα. Also, for each x ∈ H (pointwise), φα(x) converges upwards to φ(x) as α → 0.
References
(Proposition IV.1.8)
Convex analysis
Theorems in functional analysis | Moreau's theorem | [
"Mathematics"
] | 229 | [
"Theorems in mathematical analysis",
"Theorems in functional analysis"
] |
13,215,186 | https://en.wikipedia.org/wiki/Personal%20communications%20network | Personal communications network (PCN) is the European digital cellular mobile telephone network. The underlying standard is known as Digital Cellular System, which defines a variant of GSM operating at 1.7–1.88 GHz. GSM-1800 has since been adopted by other locations, not necessarily under the PCN/DCS name. The network structure, the signal structure and the transmission characteristics are similar between PCN and GSM-900.
The PCN system was first initiated by Lord Young, UK Secretary of State for Trade and Industry, in 1988. The main characteristics of PCN are as follows:
Operating frequency – 1.7–1.88 GHz (1710–1785 MHz and 1805–1880 MHz).
Uses 30 GHz or up for microwave back bone system.
Covers both small cells and large cells.
Coverage inside and outside buildings.
Hand over.
Cell delivery.
Portable hand set.
User intelligent network.
The UK government's Department for Enterprise produced 'Phones on the Move: Personal Communications in the 1990s - a discussion document' in January 1989. The document presented a vision for how mobile communications might develop which outlined ideas for both the PCNs and the CT2 standards.
PCN is comparable to the North American Personal Communications Service band allocation. The 1800 MHz DCS band is reused in UMTS, LTE and 5G NR; it sees real-world deployment in LTE as "band 3".
External links
Press Notice: LORD YOUNG CALLS FOR APPLICATIONS TO RUN "PHONES ON THE MOVE"
Telephony
Wireless networking | Personal communications network | [
"Technology",
"Engineering"
] | 311 | [
"Wireless networking",
"Computer networks engineering"
] |
13,215,593 | https://en.wikipedia.org/wiki/Lp0%20on%20fire | lp0 on fire (also known as Printer on Fire) is an outdated error message generated on some Unix and Unix-like computer operating systems in response to certain types of printer errors. lp0 is the Unix device handle for the first line printer, but the error can be displayed for any printer attached to a Unix or Linux system. It indicates a printer error that requires further investigation to diagnose, but not necessarily that it is on fire.
Printer flammability
In the late 1950s, high speed computerized printing was still a somewhat experimental field. The first documented fire-starting printer was a Stromberg-Carlson 5000 xerographic printer (similar to a modern laser printer, but with a CRT as the light source instead of a laser), installed around 1959 at the Lawrence Livermore National Laboratory and modified with an extended fusing oven to achieve a print speed of one page per second. In the event of a printing stall, and occasionally during normal operation, the fusing oven would cause the paper to combust. This fire risk was aggravated by the fact that if the printer continued to operate, it would feed a fire with fresh paper at high speed. However, there is no evidence of the "lp0 on fire" message appearing in any software of the time.
As the technology matured, most large printer installations were drum printers, a type of impact printer which could print an entire line of text at once through the use of a high speed rotary printing drum. It was thought that in the event of a severe jam, the friction of paper against the drum could ignite either the paper itself, or, in a dirty machine, the accumulated paper and ink dust in the mechanism. Whether this ever happened is not known; there are no reports of friction-related printer fires.
The line printer employed a series of status codes, specifically ready, online, and check. If the online status was set to "off" and the check status was set to "on," the operating system would interpret this as the printer running out of paper. However, if the online code was set to "on" and the check code was also set to "on", it meant that the printer still had paper, but was suffering an error (and may still be attempting to run). Due to the potentially hazardous conditions which could arise in early line printers, UNIX displayed the message "on fire" to motivate any system operator viewing the message to go and check on the line printer immediately.
In the early 1980s, Xerox created a prototype laser printer engine and provided units to various computer companies. To fuse the toner, the paper path passed a glowing wire. If paper jammed anywhere in the path, the sheet in the fuser caught fire. The prototype UNIX driver reported paper jams as "on fire." Later print engine models used a hot drum in place of the wire.
Phrase origins
Michael K. Johnson ("mkj" of Red Hat and Fedora fame) wrote the first Linux version of this error message in 1992. However, he, Herbert Rosmanith and Alan Cox (all Linux developers) have acknowledged that the phrase existed in Unix in different forms prior to his Linux printer implementation.
Since then, the lp printer code has spread across all sorts of POSIX-compliant operating systems, which often still retain this legacy message.
Modern printer drivers and support have improved and hidden low-level error messages from users, so most Unix/Linux users today have never seen the "on fire" message. The "on fire" message remains in the Linux source code as of version 6.0.
The message is also present in other software modules, often to humorous effect. For example, in some kernels' CPU code, a CPU thermal failure could result in the message "CPU#0: Possible thermal failure (CPU on fire ?)" and similar humor can be found in the phrase "halt and catch fire".
See also
HTTP 418
Not a typewriter
PC LOAD LETTER
References
Computer errors
Computer humour
Computer printers
Fire | Lp0 on fire | [
"Chemistry",
"Technology"
] | 822 | [
"Computer errors",
"Combustion",
"Fire"
] |
13,215,976 | https://en.wikipedia.org/wiki/Plug-%26-Play%20TV%20Games | Plug-&-Play TV Games is a series of plug-n-play game devices produced by Jakks Pacific.
When connected to a television set via RCA connector cables, the user is able to play a pre-defined selection of video games. Some models are collections of ports of games by companies such as Atari and Namco, while others are collections of original games. Some versions facilitate the addition of games, via proprietary GameKey expansion cards, and/or include wireless features.
List of games
1 vs 100
Activision
Are You Smarter Than A 5th Grader?
Atari series
Atari Joystick Controller TV Video Game System
Atari Paddle Controller TV Game System
Avatar: The Last Airbender
The Batman
Bejeweled Deluxe
Big Buck Hunter Pro
Big Buck Safari
Blue's Room
Capcom
Cars 2
Deal or No Deal
Disney series
Disney Princess
Dora the Explorer series
Dragon Ball Z
DreamWorks Animation
EA Sports Madden, NHL 95 & FIFA '96
Elmo's World
Fantastic Four
Frogger
Go, Diego, Go!
Hannah Montana
High School Musical
Jeopardy!
Max Force
Mortal Kombat
¡Mucha Lucha!
My Little Pony
Pac-Man and Ms. Pac-Man series (Namco series)
PAW Patrol series
Nicktoons series
Pixar
Power Rangers series
The Price Is Right
Phineas and Ferb
Retro Arcade featuring Space Invaders
Scooby-Doo
Sesame Street
Shrek
Spider-Man series (Notable games include: The Amazing Spider-Man and the Masked Menace, Spider-Man's Villain Roundup, more)
SpongeBob SquarePants series (Notable games include: The Fry-Cook Games, Jellyfish Dodge, more)
Star Wars series
Superman
Super Silly Makeover
Tele-Doodle
Thomas & Friends series (Games include: Right on Time and Learning Circus Express)
Triple Header Sports
Toy Story series
Ultimotion series (Unlicensed Wii Clones)
The Walking Dead Zombie Hunter
Wall-E
Winnie the Pooh
Winx Club
Wheel of Fortune series
WWE
World Poker Tour
C64 Direct to TV
Your Windows XPLaptop
References
Video game platforms
[ The person editing this and has done plenty of research from multiple trustworthy sources. ] | Plug-&-Play TV Games | [
"Technology"
] | 432 | [
"Computing platforms",
"Video game platforms"
] |
13,217,890 | https://en.wikipedia.org/wiki/IMO%20number | The IMO number of the International Maritime Organization is a generic term covering two distinct meanings. The IMO ship identification number is a unique ship identifier; the IMO company and registered owner identification number is used to identify uniquely each company and/or registered owner managing ships of at least 100 gross tons (gt). The schemes are managed in parallel, but IMO company/owner numbers may also be obtained by managers of vessels not having IMO ship numbers. IMO numbers were introduced to improve maritime safety and reduce fraud and pollution, under the International Convention for the Safety of Life at Sea (SOLAS).
The IMO ship number scheme has been mandatory, for SOLAS signatories, for passenger and cargo ships above a certain size since 1996, and voluntarily applicable to various other vessels since 2013/2017. The number identifies a ship and does not change when the ship's owner, country of registry (flag state) or name changes, unlike the official numbers used in some countries, e.g. the UK. The ship's certificates must also bear the IMO ship number. Since 1 July 2004, passenger ships are also required to carry the marking on a horizontal surface visible from the air.
History
IMO resolutions (1987–2017)
In 1987 the IMO adopted Resolution A.600(15) to create the IMO ship identification number scheme aimed at the "enhancement of maritime safety and pollution prevention and the prevention of maritime fraud" by assigning to each ship a unique permanent identification number. Lloyd's Register had already introduced permanent numbers for all the ships in their published register in 1963, and these were modified to seven-digit numbers in 1969. It is this number series that was adopted as the basis for IMO ship numbers in 1987.
Unique and permanent numbers are needed due to the frequent changes in ships' names or other details. As one example, the vessel with IMO ship number "IMO 9176187" was built in Japan, has been through the names Asia Melody, Cornelie Oldendorff, Maxima, Jaydee M, Evangelia, Evangeli, Shinsung Dream and Orange Dream, has operated under the flags of Panama, Liberia, Marshall Islands, the Republic of Korea and Sierra Leone, with numerous different owners/operators, and has had home ports of Majuro, Freetown and Cheju, but its IMO number has remained unchanged throughout.
The original resolution applied to cargo vessels (meaning "ships which are not passenger ships") at least 300 gt and passenger vessels of at least 100 gt.
This resolution was revoked in 2013, being replaced by Resolution A.1078(28), which allowed application of the Scheme to ships of 100 gt and above, including fishing vessels. That in turn was revoked in 2017 and replaced by Resolution A.1117(30), which allows its application to ships of 100 gt and above, "including fishing vessels of steel and non-steel hull construction; passenger ships of less than 100 gt, high-speed passenger craft and mobile offshore drilling units [...]; and all motorized inboard fishing vessels of less than 100 gt down to a size limit of 12 metres in length overall (LOA), authorized to operate outside waters under the national jurisdiction of the flag State". IMO resolutions are "for implementation on a voluntary basis".
Although not mandatory under SOLAS, since IMO ship numbers became available also to fishing vessels in 2013, some regional fisheries management organisations, the European Union and other organizations or states have made them mandatory for fishing vessels above a certain size.
SOLAS regulation (1994)
SOLAS regulation XI-1/3 was adopted in 1994 and came into force on 1 January 1996, making IMO ship numbers mandatory for those countries that have ratified (or acceded to, accepted, approved, adopted, etc.) SOLAS.
The IMO scheme and hence SOLAS regulation does not apply to:
ships without mechanical means of propulsion
pleasure yachts
ships engaged on special service (e.g. lightships, SAR vessels)
hopper barges
hydrofoils, air cushion vehicles
floating docks and structures classified in a similar manner
ships of war and troopships
wooden ships.
Security enhancements 2002
In December 2002, the Diplomatic Conference on Maritime Security adopted a number of measures aimed at enhancing security of ships and port facilities. This included a modification to SOLAS Regulation XI-1/3 to require the IMO ship numbers to be permanently marked in a visible place either on the ship's hull or superstructure as well as internally and on the ship's certificates. Passenger ships should also carry the marking on a horizontal surface visible from the air. The enhanced regulations came into effect on 1 July 2004.
Company and Registered Owner Regulation 2005
In May 2005, IMO adopted a new SOLAS regulation XI-1/3-1 on the mandatory company and registered owner identification number scheme, with entry into force on 1 January 2009.
The regulation provides that every ship owner and management company shall have a unique identification number. Other amendments require these numbers to be added to the relevant certificates and documents in the International Safety Management Code (ISM) and the International Ship and Port Facility Security Code (ISPS). Like the IMO ship identification number, the company identification number is a seven-digit number with the prefix IMO. For example, for the ship Atlantic Star (IMO 8024026), IMO 5304986 referred to the former ship manager Pullmantur Cruises Ship Management Ltd and IMO 5364264 to her former owner, Pullmantur Cruises Empress Ltd.
Assignment
S&P Global is the manager of the scheme and, as such, identifies and assigns IMO numbers without charge. The organization was previously known as Lloyd's Register-Fairplay, IHS Fairplay and IHS Maritime.
For new vessels, the IMO ship number is assigned to a hull during construction, generally upon keel laying. Many vessels which fall outside the mandatory requirements of SOLAS have numbers allocated by Lloyd's Register or IHS Markit in the same numerical series, including fishing vessels and commercial yachts.
Structure
IMO number of a vessel
An IMO number is made of the three letters "IMO" followed by a seven-digit number. This consists of a six-digit sequential unique number followed by a check digit. The integrity of an IMO number can be verified using its check digit. The checksum of an IMO ship identification number is calculated by multiplying each of the first six digits by a factor of 7 to 2 corresponding to their position from right to left. The rightmost digit of this sum is the check digit.
Example for IMO 9074729:
(9×7) + (0×6) + (7×5) + (4×4) + (7×3) + (2×2) = 139.
IMO number of a company
The checksum of an IMO company and registered owner identification number is calculated somewhat differently. The first six digits are multiplied by the respective weights: 8, 6, 4, 2, 9, and 7 and then summed. From this sum modulo 11 is taken. The result of which is subtracted from 11. And modulo 10 of this difference results in the check digit.
Example for company IMO 2041999:
See also
ENI number, a comparable system for European barges and other inland waterway vessels
Maritime Mobile Service Identity (MMSI), 9-digit numbers identifying mobile radio stations, used alongside IMO numbers
References
External links
IMO Identification Numbers for Ships, Companies & Registered Owners by IHS Markit
IMO NUMBER SEARCH
International Maritime Organization
Law of the sea
Ship identification numbers
Ship registration | IMO number | [
"Mathematics"
] | 1,574 | [
"Ship identification numbers",
"Mathematical objects",
"Numbers"
] |
13,217,926 | https://en.wikipedia.org/wiki/Tikker | A tikker, alternately spelled ticker, was a vibrating interrupter used in early wireless telegraphy radio receivers such as crystal radio receivers in order to receive continuous wave (CW) radiotelegraphy signals.
In the early years of the 20th century, before modern AM or FM radio transmission was developed, radio transmitters communicated information by radiotelegraphy; the transmitter was switched off and on by the operator with a telegraph key, producing pulses of radio waves, to spell out text messages in Morse code. Around 1905 the first continuous wave radio transmitters began to replace the earlier spark transmitters. The Morse code signal of the spark transmitter consisted of pulses of radio waves called damped waves which repeated at an audio rate, so they were audible as a buzz or tone in a receiver's earphones. In contrast the new continuous wave transmitters produced a signal consisting of pulses of continuous waves, unmodulated sinusoidal carrier waves, which were inaudible in the earphones. So to receive this new modulation method, the receiver had to produce a tone during the pulses of carrier.
The "tikker", invented in 1908 by Valdemar Poulsen, was the first primitive device that did this. It consisted of a vibrating switch contact between the receiver's detector and earphone, which was repeatedly opened by an electromagnet. It functioned as a crude modulator; it interrupted the signal from the detector at an audio rate, producing a buzz in the earphone whenever the carrier was present. Thus the "dots" and "dashes" of the Morse code were made audible.
Around 1915 the tikker was replaced by a better means of accomplishing the same thing; the heterodyne receiver invented by Reginald Fessenden in 1902. In this an electronic oscillator generated a radio signal at a frequency fo offset from the incoming radio wave carrier fC. This was applied to the rectifying detector with the radio carrier. In the detector the two signals mixed, creating a heterodyne (beat) signal at the difference fC - fC between these frequencies, which was in the audio frequency range. The heterodyne provided the audible tone in the earphone whenever the carrier was present. After vacuum tube oscillators were invented in 1913 by Alexander Meissner the heterodyne receiver replaced the tikker. Today the heterodyne method is still used to receive CW signals, and the beat frequency oscillator (BFO) is a standard part of all communications receivers.
References
Radio technology | Tikker | [
"Technology",
"Engineering"
] | 518 | [
"Information and communications technology",
"Telecommunications engineering",
"Radio technology"
] |
13,218,926 | https://en.wikipedia.org/wiki/Standard%20Commands%20for%20Programmable%20Instruments | The Standard Commands for Programmable Instruments (SCPI; often pronounced "skippy") defines a standard for syntax and commands to use in controlling programmable test and measurement devices, such as automatic test equipment and electronic test equipment.
Overview
SCPI was defined as an additional layer on top of the specification "Standard Codes, Formats, Protocols, and Common Commands". The standard specifies a common syntax, command structure, and data formats, to be used with all instruments. It introduced generic commands (such as CONFigure and MEASure) that could be used with any instrument. These commands are grouped into subsystems. SCPI also defines several classes of instruments. For example, any controllable power supply would implement the same DCPSUPPLY base functionality class. Instrument classes specify which subsystems they implement, as well as any instrument-specific features.
The physical hardware communications link (physical layer) is not defined by SCPI. While it was originally created for the IEEE-488.1 (GPIB) bus, SCPI can also be used with RS-232, RS-422, RS-485, USB, Ethernet, VXIbus, HiSLIP, etc.
SCPI commands are ASCII textual strings, which are sent to the instrument over the physical layer. Commands are a series of one or more keywords, many of which take parameters. In the specification, keywords are written CONFigure: The entire keyword can be used, or it can be abbreviated to just the uppercase portion. Responses to query commands are typically ASCII strings. However, for bulk data, binary formats can be used.
The SCPI specification consists of four volumes: Volume 1: "Syntax and Style", Volume 2: "Command Reference", Volume 3: "Data Interchange Format", Volume 4: "Instrument Classes". The specification was originally released as non-free printed manuals, then later as one free PDF file that includes all four volumes.
SCPI history
First released in 1990, SCPI originated as an additional layer for IEEE-488. IEEE-488.1 specified the physical and electrical bus, and IEEE-488.2 specified protocol and data format, but neither specified instrument commands. Different manufacturers, and even different models, of the same type of instrument would use different command sets. SCPI created a standard which could be common across all manufacturers and models. It requires use of the IEEE-488.2 data formats, but does not mandate the IEEE-488.1 bus.
In 2002-2003, the SCPI Consortium voted to become part of the IVI Foundation (Interchangeable Virtual Instruments).
IEEE 488.2 history
In 1987, IEEE introduced IEEE 488.2-1987 specification "Standard Codes, Formats, Protocols, and Common Commands", it was later revised in 1992 as IEEE 488.2-1992.
While IEEE 488.2 provided a device-independent syntax, there was still no standard for instrument-specific commands. Commands to control the same class of instrument, e.g., multimeters, would vary between manufacturers and even models. The United States Air Force, and later Hewlett-Packard, recognized this problem. In 1989, HP developed their TML language which was the forerunner to SCPI.
The IEC developed their own standards in parallel with the IEEE, with IEC 60625-2-1993 (IEC 625). In 2004, the IEEE and IEC combined their respective standards into a "dual logo" IEEE/IEC standard IEC 60488-2-2004, Part 2: Codes, Formats, Protocols and Common Commands, replaces IEEE 488.2-1992 and IEC 60625-2-1993.
Command syntax
SCPI commands to an instrument may either perform a set operation (e.g. switching a power supply on) or a query operation (e.g. reading a voltage). Queries are issued to an instrument by appending a question-mark to the end of a command. Some commands can be used for both setting and querying an instrument. For example, the data-acquisition mode of an instrument could be set by using the ACQuire:MODe command or it could be queried by using the ACQuire:MODe? command. Some commands can both set and query an instrument at once. For example, the *CAL? command runs a self-calibration routine on some equipment, and then returns the results of the calibration.
Similar commands are grouped into a hierarchy or "tree" structure. For example, any instruction to read a measurement from an instrument will begin with "MEASure". Specific sub-commands within the hierarchy are nested with a colon (:) character. For example, the command to "Measure a DC voltage" would take the form MEASure:VOLTage:DC?, and the command to "Measure an AC current" would take the form MEASure:CURRent:AC?.
:MEASure
:VOLTage
:DC?
:AC?
:CURRent
:DC?
:AC?
...
Case
Though the command syntax above shows commands in mixed case, SCPI is not case sensitive.
For example, for VOLTage, all of the following are valid representations:VOLTAGE, voltage, Voltage, VoLtAgE.
Abbreviating commands
The command syntax shows some characters in a mixture of upper and lower case. Abbreviating the command to only sending the upper case has the same meaning as sending the upper and lower case command.
For example, the command “SYSTem:COMMunicate:SERial:BAUD 2400” would set an RS-232 serial communications interface to 2400 bit/s. This could also alternatively be abbreviated “SYST:COMM:SER:BAUD 2400”. The query command “SYSTem:COMMunicate:SERial:BAUD?” or “SYST:COMM:SER:BAUD?” would instruct the instrument to report its current baud rate.
The only valid commands are the short form and long form of each command, all other subset variations are invalid.
For example, COMM (short form) and COMMUNICATE (long form) are valid, but COM, COMMUN, COMMUNIC subsets are invalid, also appended letters are invalid too, such as COMMUNICATED.
Concatenating commands
Multiple commands can be issued to an instrument in a single string. They are made of simple commands separated by a semicolon character (;).
For example, the command to "Measure a DC voltage then measure an AC current" would be issued as MEASure:VOLTage:DC?;:MEASure:CURRent:AC?.
Simple commands which start with a colon (:) are interpreted with respect to the root of the command tree. Otherwise, they refer implicitly to the last node of the previous command (unless they already begin with an asterisk). For example,
:SOURce:FREQuency:STARt 100;STOP 200
is a shorthand for the message
:SOURce:FREQuency:STARt 100;:SOURce:FREQuency:STOP 200
Arguments
Some commands accept or require one or more additional arguments. Arguments are given after the command, and are separated from the command using a space. For example, the command to set the trigger mode of an instrument to "normal" may be given as "TRIGger:MODe NORMal". Here, the word "NORMal" is used as the argument to the "TRIGger:MODe" command. When multiple arguments are provided, the arguments are written as a comma-separated list. For example, a query command that performs an AC Volts measurement on a digital multimeter, using the meter's 10 VRMS measurement range, and displaying the measured voltage value with 4-1/2 digits of resolution, would be written as "MEASure:VOLTage:AC? 10,4".
Integer arguments
For commands that accept integer arguments, values may be specified in multiple computer number formats: decimal, hexadecimal, octal, binary. The last three formats are defined by IEEE 488.2, which SCPI is based upon. Decimal numbers (radix 10) aren't prefixed, hexadecimal numbers (radix 16) are prefixed with #H or #h, octal numbers (radix 8) with #Q or #q, and binary numbers (radix 2) with #B or #b. Hexadecimal digits may use either uppercase letters (ABCDEF), or lowercase letters (abcdef), or mixed case letters (aBcDeF). For octal, the letter "Q" was chosen instead of the letter "O" to minimize the visual confusion with the number "0" (zero).
The following argument examples are numerically equivalent:
Decimal: 26
Hexadecimal: #H1A or #h1a
Octal: #Q32 or #q32
Binary: #B11010 or #b11010
488.2 commands
Since SCPI was defined as an additional layer on top of the IEEE 488.2 specification, a SCPI compliant device should recognize various 488.2 commands too. These commands might also be known unofficially as asterisk commands (or star commands), because they all start with the asterisk * character.
According to section 4.1.1 of Volume 1 of SCPI, all SCPI devices must implement the following 488.2 commands. In the real world some low-end devices may only support a subset of these 488.2 commands, or may even accept the commands but not perform any operation. A user should check the official programmers manual for each device before assuming all of these 488.2 commands are supported.
*CLS
*ESE
*ESE?
*ESR?
*IDN?
*OPC
*OPC?
*RST
*SRE
*SRE?
*STB?
*TST?
*WAI
According to section 4.1.2 of Volume 1 of SCPI, all other 488.2 commands not listed above are considered optional and not required by SCPI.
*AAD
*CAL?
*DDT
*DDT?
*DLF
*DMC
*EMC
*EMC?
*GMC?
*IST?
*LMC?
*LRN?
*OPT?
*PCB
*PMC
*PRE
*PRE?
*PSC
*PSC?
*PUD
*PUD?
*RCL
*RDT
*RDT?
*SAV
*TRG
*RMC
*SDS
See also
IEEE-488 (GPIB)
Virtual Instrument Software Architecture (VISA)
Instrument driver
List of TCP and UDP port numbers - scpi-raw on TCP port 5025 and UDP port 5025
References
External links
SCPI Organization, official website
Specifications
SCPI-1999, Volume 1-4, 819 page PDF file, free download (doesn't include asterisk (*) commands, because they are specified in IEEE 488.2 & IEC 60488-2)
IEEE 488.2-1992, 254 page PDF file, costs USD$52 in 2024 (superseded by IEEE/IEC 60488-2-2004)
IEEE/IEC 60488-2-2004, 264 page PDF file, costs USD$373 in 2024
Programming Manual Examples
Multimeters
Tektronix DMM6500, 1202 page PDF file.
Oscilloscopes
Keysight InfiniiVision Families, 1896 page PDF file.
Rohde-Schwarz MXO 4 Series, 848 page PDF file.
Tektronix MSO 4/5/6 Families, 2050 page PDF file.
Electronic engineering
Electronics standards
Input/output
Electronic test equipment | Standard Commands for Programmable Instruments | [
"Technology",
"Engineering"
] | 2,403 | [
"Computer engineering",
"Electronic test equipment",
"Measuring instruments",
"Electronic engineering",
"Electrical engineering"
] |
13,219,252 | https://en.wikipedia.org/wiki/Zaurategrast | Zaurategrast (CDP323) is a small-molecule prodrug antagonist of the vascular cell adhesion molecule 1 (VCAM-1) binding to α4-integrins. It was originally developed by the British biopharmaceutical company Celltech plc. (now UCB S.A.) and was a putative new drug for oral treatment of multiple sclerosis.
In October 2006, UCB and Biogen Idec announced a collaboration to jointly develop and commercialize zaurategrast for the treatment of multiple sclerosis and other potential indications. In June 2009, development of zaurategrast was discontinued due to discouraging results of a Phase II clinical trial.
Mechanism of action
The mechanism of action of zaurategrast were believed to rely on preventing immune cells to migrate from blood vessels through the vessel walls to reach various inflamed tissues, including the brain. This mechanism is thought to prevent overshooting immune reactions and subsequent tissue damage as seen during uncontrolled immune cell migration as in multiple sclerosis. Zaurategrast has the same mechanism of action as the monoclonal antibody natalizumab.
Results in animal models
Zaurategrast was investigated in chronic experimental autoimmune encephalomyelitis (EAE) in mice. The drug was effective when given prophylactically (i.e., before the disease was induced in mice) and when given therapeutically (i.e., after outbreak of the disease) and reduced the disease severity significantly.
Clinical development
The safety, tolerability, and pharmacokinetic profile of zaurategrast have been evaluated in 75 female and male healthy volunteers in three separate Phase 1 studies. Zaurategrast was well tolerated at oral doses up to 1000 mg given twice daily for 7 consecutive days with an adverse event profile comparable to that observed with placebo. There was no gender effect. The oral administration resulted in inhibition of VCAM-1 binding which could be maintained throughout a 12‑ or 24‑hour dose interval at well tolerated doses
A Phase 2 study commenced in June 2007 in Europe and in the US. The study intends to enroll over 200 patients with relapsing MS who have failed earlier treatment with an interferon-beta and will compare two doses of the drug to placebo over a period of six months. The results are expected by the end of 2008., Preliminary interim efficacy analysis showed that patients enrolled in this clinical trial did not benefit as expected from zaurategrast compared to placebo after a six-month treatment period. No cases of progressive multifocal leukoencephalopathy were noted.
References
External links
Listings in the US NIH trial registry
Immunosuppressants
Naphthyridines
Propionic acids
Organobromides
Abandoned drugs
Spiro compounds
Cyclobutenes | Zaurategrast | [
"Chemistry"
] | 601 | [
"Organic compounds",
"Spiro compounds",
"Drug safety",
"Abandoned drugs"
] |
13,219,331 | https://en.wikipedia.org/wiki/Export%20Land%20Model | The Export Land Model, or Export-Land Model, refers to work done by Dallas geologist Jeffrey Brown, building on the work of others, and discussed widely on The Oil Drum. It models the decline in oil exports that result when an exporting nation experiences both a peak in oil production and an increase in domestic oil consumption. In such cases, exports decline at a far faster rate than the decline in oil production alone.
The Export Land Model is important to petroleum importing nations because when the rate of global petroleum production peaks and begins to decline, the petroleum available on the world market will decline much more steeply than the decline in total production.
Theory
As world oil exports approach (or pass) a global peak, the price of exported oil increases and further stimulates domestic economic growth and oil consumption in Export-Land countries, creating a positive feedback process between declining exports and higher prices. Eventually, however, the level of export decline outpaces the increasing oil price, slowing domestic growth. In some cases, an Export Land eventually becomes a net importer. It is unlikely that an Export Land would constrain domestic consumption to help importing countries. In fact, many oil exporting countries subsidize domestic consumption below price levels defined by the world market.
Hypothetical example
Given a hypothetical oil producing country (known by the model as an Export Land) that produces , consumes , and exports to oil consuming countries around the world, the model would be applied as such (illustrated in the graph above):
Export Land hits the point of Peak Oil production, and over a five-year period production drops by 25%. Over the same time period, Export Land's consumption increases by 20% to 1.2 mbpd. This causes Export Land's net exports over the five-year period to fall from 1 mbpd to 0.3 mbpd, a decrease of 70% -- resulting from a combination of increasing domestic consumption in Export Land and a 25% drop in production. Counter-intuitively, the fractional decline in exports is much greater than the sum of the fractional increase in domestic consumption and the fractional decline in production.
Real-world examples
Several real-world nations exhibit the characteristics of the Export Land Model as pictured in the image gallery above. These four nations exhibit increasing domestic consumption along with declining production. Indonesia has already shifted from oil exporter to oil importer while Egypt is hovering on the brink. Malaysia and Mexico also have the hallmarks of the Export Land Model.
Within 5 years, Mexico (the second biggest exporter of oil to the US) may become a net oil importer. Other nations where this may soon happen include Iran, Algeria and Malaysia.
A recent report from CIBC World Markets also indicates that as much as 40% of Saudi Arabia's expected production increases will be offset by rising internal demand by 2010, and Iranian exports will decline by more than 50% for similar reasons. This report indicates that similar market pressures could reduce net worldwide oil exports by (about 3%).
Nations may also reach their peak of oil production without fitting the Export Land model. For example, the United Kingdom began importing oil in 2006, after decades of exporting, due to declining production. But as domestic consumption in the UK has remained essentially unchanged for the last 20 years, their rising import levels essentially match their falling production levels. Similarly, Norway's exports began declining in 2001, but at the same rate as their production because their domestic consumption was also not growing. Unlike many exporters, these two countries don't subsidize local market oil price and have high fuel prices by world standards, thus one of the premises of the export land model (that domestic consumption should not be affected by world market price) does not apply to those countries.
See also
Energy development
Energy security
Oil price increases since 2003
Oil reserves
World energy resources and consumption
References
Peak oil
Petroleum politics | Export Land Model | [
"Chemistry"
] | 791 | [
"Petroleum",
"Petroleum politics"
] |
13,219,793 | https://en.wikipedia.org/wiki/New%20Alchemy%20Institute | The New Alchemy Institute was a research center that did pioneering investigation into organic agriculture, aquaculture and bioshelter design between 1969 and 1991. It was founded by John Todd, Nancy Jack Todd, and William McLarney. Its purpose was to research human support systems of food, water, and shelter and to completely rethink how these systems were designed.
Purpose of the Institute
The New Alchemy Institute was founded on a , former dairy farm in Hatchville, part of Falmouth, Massachusetts, on Cape Cod. Their stated aim was to do research on behalf of the planet: "Among our major tasks is the creation of ecologically derived human support systems - renewable energy, agriculture, aquaculture, housing and landscapes. The strategies we research emphasize a minimal reliance on fossil fuels and operate on a scale accessible to individuals, families and small groups. It is our belief that ecological and social transformations must take place at the lowest functional levels of society if humankind is to direct its course towards a greener, saner world.
Our programs are geared to produce not riches, but rich and stable lives, independent of world fashion and the vagaries of international economics. The New Alchemists work at the lowest functional level of society on the premise that society, like the planet itself, can be no healthier than the components of which it is constructed. The urgency of our efforts is based on our belief that the industrial societies which now dominate the world are in the process of destroying it." (Fall 1970, Bulletin of the New Alchemists. )
Areas of research
Bioshelters
A bioshelter is a solar greenhouse that is managed as a self-contained ecosystem. The groupings of plants, animals, soil and insects are selected so that closed loops of life cycles, materials, water, and energy are created, and require minimal inputs from outside the system. They emulate natural rhythms of growth and cycling of nutrients.
New Alchemy built several bioshelters:
"The Ark" located at the property in Hatchville, Massachusetts, United States
"The Ark" located at Spry Point, Prince Edward Island, Canada was built in 1976 and demolished in the late 1990s.
Organic agriculture
New Alchemy investigated the practices of organic agriculture for both field crops, and greenhouse growing. They researched intensive gardening, biological pest control, cover cropping, irrigation using fish pond water, perennial food crops, and tree crops.
Aquaculture
New Alchemy experimented with growing edible fish in ponds in the bioshelters. The solar aquaculture ponds were above-ground, translucent tanks. The fertile pond water was used for irrigating the crops in the greenhouses. This proved to be a successful way to raise edible fish, floating hydroponic crops, and irrigated greenhouse food crops.
Ideological basis
The scientists working at New Alchemy were determined to rethink how human support systems were designed. They looked to nature as the ultimate designer, using careful observation of natural cycles and processes as the template for creating truly sustainable systems.
Publications
The research conducted at New Alchemy was documented in a series of journals and technical bulletins. A complete list is available at: New Alchemy Institute
References
External links
New Alchemy Institute
Ocean Arks International
Environmental research institutes
Research institutes in Massachusetts
Research institutes in Canada | New Alchemy Institute | [
"Environmental_science"
] | 679 | [
"Environmental research institutes",
"Environmental research"
] |
13,221,438 | https://en.wikipedia.org/wiki/Stephen%20Parke | Stephen Parke is a
New Zealand-American theoretical physicist. He is a distinguished scientist and former head (2010–2015) of the Theoretical Physics Department at the Fermi National Accelerator Laboratory Batavia, Illinois.
Born in Gisborne, New Zealand, Parke attended Campion College, Gisborne and St Peter's College, Auckland. He did his undergraduate studies, mathematics and physics, at the University of Auckland in New Zealand where his mentor was Dan Walls. He obtained a Fulbright Travel Grant and was awarded a Frank Knox Memorial Fellowship to attend graduate school at Harvard University. He was a graduate student of Sidney Coleman, obtaining a PhD in theoretical particle physics in 1980. He held a postdoctoral fellowship at the Stanford Linear Accelerator Center (1980–1983) collaborating with Sidney Drell before moving to the Fermi National Accelerator Laboratory as an Associate Scientist. He became an APS fellow in 1996 and in 2018 he was awarded a Doctorate of Science from the University of Auckland for his work on "Amplitudes in Gauge Theories". Parke's Erdos number is 3, having written papers with both Sidney Coleman and mathematician Terence Tao.
Contributions to physics
He is an originator of Parke–Taylor amplitudes, which he developed with his colleague, Tomasz Taylor. Parke-Taylor amplitudes represent a new approach to computing scattering amplitudes in quantum chromodynamics using symmetry methods such as supersymmetry. This work was further extended in collaboration with Michelangelo Mangano and Xu Zhan. The discovery of the Parke-Taylor amplitudes ignited the amplitude revolution: a major advance in our understanding and calculability of scattering amplitudes in gauge theories, the foundation of particle physics. This advance is discussed in detail in Chapter 11 of Graham Farmelo's book "The Universe speaks in Numbers". Parke's important Amplitude papers are
linked here.
With collaborator Gregory Mahon and others he pioneered the study of spin correlations in Top Quark pair production at Hadron collider which has lead to the confirmation of quantum entanglement at the highest possible energy by ATLAS and CMS. Here is a link to his important Top Quark papers.
Parke is also an expert on neutrino physics. He gave the first analytical solution to the MSW effect including the non-adabatic region and has made important contributions to the physics of Long baseline Neutrino Oscillation experiments, T2K, NOvA, Hyper-Kamiokande and DUNE as well as the reactor experiments RENO, Daya Bay and JUNO. Here is a link to his important Neutrino papers.
He has also written papers on Magnetic Monopoles and the decay of the false vacuum in curved space time.
Personnal Life
Parke's father was the orthopedic surgeon William Parke and mother Muriel Parke (née Stephens), a school teacher. His parents both born in Liverpool immigrated from the UK to New Zealand in 1949 to help with the polio epidemic raging in New Zealand at that time. Parke is a nephew of marine botanist Mary Parke.
Parke is married to Winifred Haun, the MacArthur Foundation and 3Arts award-winning Choreographer and artistic director of the contemporary dance company Winifred Haun & Dancers. WH&D is one of the more diverse and innovative dance companies in Chicago. They have three amazing daughters: Athena, Iris and Selene.
See also
List of alumni of St Peter's College, Auckland for more biographical details
References
External links
Parke's scientific publications are available on the INSPIRE-HEP Literature Database .
HEPNames profile: Stephen Parke
Stephen Parke at Fermilab Theoretical Physics Department
Particle physicists
Neutrino physicists
American theoretical physicists
Fellows of the American Physical Society
20th-century American physicists
21st-century American physicists
Harvard University alumni
American people of New Zealand descent
New Zealand scientists
New Zealand physicists
University of Auckland alumni
People from Gisborne, New Zealand
Living people
People educated at St Peter's College, Auckland
Theoretical physicists
Th
People associated with Fermilab
People educated at Campion College, Gisborne
Year of birth missing (living people) | Stephen Parke | [
"Physics"
] | 846 | [
"Theoretical physics",
"Theoretical physicists",
"Particle physics",
"Particle physicists"
] |
13,221,513 | https://en.wikipedia.org/wiki/Paul%20Mackenzie%20%28physicist%29 | Paul B. Mackenzie (born 1950) is a theoretical physicist at the Fermi National Accelerator Laboratory. He did graduate work in physics at Cornell University where he was a student of G. Peter Lepage. He is an expert on Lattice Gauge Theory. He is the chair of the Executive Committee of USQCD, the US collaboration for developing the necessary supercomputing hardware and software for quantum chromodynamics formulated on a lattice.
Selected publications
Mackenzie's has published 71 scientific papers listed in the INSPIRE-HEP Literature Database. The most widely cited of them, "Viability of lattice perturbation theory" in Physical Review D 48 (5), pp. 2250–2264 (1993) has been cited 589 times by March 2009. The second most widely cited, "On the elimination of scale ambiguities in perturbative quantum chromodynamics " Physical Review D 28 (1), pp. 228–235 (1983) has been cited 406 times. Both papers are with Lepage, and the second also with Stan Brodsky.
References
External links
Fermilab Theoretical Physics Department
Fermilab Homepage for Paul Mackenzie
People associated with Fermilab
20th-century American physicists
Particle physicists
Theoretical physicists
Living people
1950 births | Paul Mackenzie (physicist) | [
"Physics"
] | 263 | [
"Theoretical physics",
"Particle physicists",
"Particle physics",
"Theoretical physicists"
] |
13,222,142 | https://en.wikipedia.org/wiki/Audio%20equipment%20testing | Audio equipment testing is the measurement of audio quality through objective and/or subjective means. The results of such tests are published in journals, magazines, whitepapers, websites, and in other media.
Those who test and evaluate equipment can be roughly divided into two groups: "Objectivists", who believe that all perceivable differences in audio equipment can be explained scientifically through measurement and double-blind listening tests; and the "Subjectivists", who believe that the human ear is capable of hearing details and differences that cannot be directly measured.
Summary of Objective versus Subjective Audiophiles, in general:
Both agree that measurements are not a substitute for listening tests.
Both agree that different audio components may have different sound qualities.
Disagree that subjective listeners can overcome placebo and confirmation bias in non-blind listening tests.
Disagree about whether perceived sound quality can be measured through objective means.
Objectivists
Objectivists believe that audio components and systems must pass rigorously conducted double-blind tests and meet specified performance requirements in order to validate the claims made by their proponents.
Objectivists point out that properly conducted and interpreted double-blind tests fail to support subjectivists' claims of significant or even subtle sonic differences between devices in cases where measurements predict that there should be no sonic differences in normal music listening.
Objectivists feel that subjectivists often lack engineering training, technical knowledge, and objective credentials, but nevertheless make authoritative claims about product performance.
Objectivists are likely to stress the importance of accounting for the influence of placebo and confirmation bias in subjective listening tests .
Objectivists reject arguments that are based on accepted physical principles but applied to circumstances where they are irrelevant. For instance, the skin effect, which relates the efficiency of cables to the frequency transmitted, is often applied to audio frequencies where it is insignificant .
Objectivists believe that subjectivists' preferences are often driven by gullibility and fashion—e.g., the late eighties' vogue for marking the edges of CDs with a green felt marker or suspending cables above the floor on small racks—and bear no relation to well-known laws of physics.
Objectivists claim that subjectivists often reject attempts to notate differences in sound using objective measurements, despite the evidence of their effectiveness.
Because measured audio distortion is higher in electromechanical components such as microphones, turntables, tonearms, phono cartridges, and loudspeakers than in purely electronic components such as preamplifiers and power amplifiers, objectivists generally do not accept that very subtle differences in the latter can have an appreciable effect on the perceived quality of reproduced sound.
British audio equipment designer Peter Baxandall, who is often considered an objectivist, has written, "I ... confidently maintain that all first-class, competently designed amplifiers, tested under completely fair and carefully controlled conditions, including the avoidance of overloading, sound absolutely indistinguishable on normal programme material no matter how refined the listening tests, or the listeners, may be; and that when an inferior amplifier is compared with a very good one and a subjective quality difference is genuinely and reliably established, it is always possible, by straightforward scientific investigation, to find a rational explanation for this difference." Baxandall also proposed a "cancellation test", which he claimed would prove his point.
Subjectivists
Subjectivist Harry Pearson, long-time editor of The Absolute Sound, an audiophile magazine, has stated:
"We believe that the sound of music, unamplified, occurring in a real space is a philosophic absolute against which we may judge the performance of devices designed to reproduce music."
Subjectivists rely on demonstrations and comparisons but believe there are problems in applying double-blind methods to comparisons of audio devices. They believe that a relaxing environment and sufficient time measured in days or weeks is necessary for the discriminating ear to do its work. They believe that careful individual listening is an appropriate tool for discovering the true worth of a device or treatment, and will generally acquire equipment that suits their own listening or style preferences as opposed to measurable equipment performance. They are also likely to de-emphasize or ignore the potential impact of placebo and confirmation bias on subjective listening tests.
Subjectivists claim that experienced listeners can be relied upon for valid advice on how equipment sounds. British Hi-fi critic, Martin Colloms, writes that "the ability to assess sound quality is not a gift, nor is it the feature of a hyperactive imagination; it is simply a learned skill", which can be acquired by example, education and practice. In any event, the eventual purchase decision will be made by the end-user, whose "perception is reality" and can be influenced by factors other than the equipment's actual performance.
Opposing viewpoints
The most significant difference between the two groups is that subjectivists claim there is a limit to what can be tested using objective measurements, while objectivists believe that since blind testing is the gold standard of all science, perceived sound quality should not be exempt from objective measurements.
Objectivists tend to see the subjectivists as irrational and prone to gullibility, while subjectivists often dismiss objectivists as simple "meter men" who lack a nuanced appreciation of sound.
Although the debate can be heated in certain quarters, both groups seek optimal listening experiences, and in some cases, the findings of one group has informed the other.
Objectivists argue that vacuum-tube amplifiers often exhibit lower-fidelity than solid-state designs, and that in addition to their substantially higher total harmonic distortion level, they require rebiasing, tend to be less reliable, less powerful, generate more heat, and are usually more expensive.
Subjectivists are often argue that while tube electronics are less linear than solid-state electronics at high-signal levels, they are much more linear at low-signal levels (less than one watt) and that many musical signals spend much of their time at these low levels.
However, in cases where the subjectivists' claims can be verified by objective measure, it could not be considered a strictly "subjective" position. A more literally subjectivist argument is that listeners may be able to discern pleasurable benefits from tube equipment that would escape any attempt at objective measurement.
Objectivists claim that digital sound can have higher fidelity than analog sound because it lacks clicks, pops, wow, flutter, audio feedback, degradation, generational loss, and rumble, has a higher signal-to-noise ratio, has a wider dynamic range, has less total harmonic distortion, and has a flatter and more extended frequency response.
Subjectivists have argued that the process of converting a bit-stream to an analog waveform requires heavy filtering to remove spurious high-frequency information and that it should be expected that such filtering should involve some signal degradation and a large amount of phase shift in the passband. They point out that commonly used consumer-grade digital-to-analog converters (DACs) exhibit poor linearity at low levels.
Both of these problems have since been verified by objective measure, and were then addressed by such solutions as digital filtering, oversampling, and the use of DACs operating at 20-bit (or higher) resolution.
Today, many objectivists and subjectivists may agree that a preference for analog formats is often rooted in pleasing and familiar distortions and artifacts. At the same time, members of both camps might also agree that the best historical analog formats have often displayed great levels of audio fidelity as well.
Musician Neil Young is a harsh critic of the sound of the original CD format but has expressed approval for the sound of higher definition formats such as SACD, which has a greater margin between its ideal behavior and the theoretical limits of human hearing.
However, many independent listening tests and mathematical studies have shown that Young's assertions are basically untrue. Regardless, in 2011, Neil Young filed paperwork to trademark his own developing high-resolution audio player.
Objectivists and Subjectivist were once at odds about the importance of total harmonic distortion. Both groups now seem to agree that the distribution of harmonic distortion can be important in perceived sound quality. This is another case where subjective opinion was eventually verified by objective measure, and taken into account by objectivist engineers.
Although this is no longer technically a point of contention, objectivists may be more likely to stress the importance of reducing total harmonic distortion in a system, while subjectivists may more often stress the importance on creating a more pleasing distribution of harmonic distortion.
Difficulty of testing
It is difficult, but very important, to match sound levels before comparing systems, as minute increases in loudness—more than 0.15 dB or 0.1 dB—have been demonstrated to cause perceived improvements in sound quality.
Listening tests are subjected to many variables, and results are notoriously unreliable. Thomas Edison, for example, showed that large audiences responded favorably when presented both live performances by artists and reproductions by his recording system, which today would be regarded as primitive in quality.
Similarly, results of component evaluation between various listeners or even the same listener under different circumstances cannot be easily replicated or standardized.
Similarly, the acoustic behavior of the listening room—the interaction between loudspeakers and the room's acoustics—and the interaction between an electromechanical device (loudspeaker) and an electronic device (amplifier) are subjected to many more variables than between electronic components. Thus the "difference" in sound quality between amplifiers is actually the ability of an amplifier to interface well with loudspeakers or a lucky combination of loudspeaker, amplifier, and room that works well together.
The introduction of switching apparatus, with either metal connection (mechanical switches) or electronic processing (solid-state switches), may, some believe, obscure the differences between the two signal sources being tested.
Skepticism advocate James Randi has offered a $1 million prize to subjectivists who can prove their most dubious claims through scientific blind testing. The prize remains unclaimed.
See also
Test CD
References
External links
The Audio Critic - Thirty-year publication, now online only, with in-depth independent verification of vendors' claims.
Stereophile - Largest, oldest, and most read subjectivist magazine includes online reviews and articles.
Audiocheck - Site for testing audio equipment and speakers
YouTube - 1-minute audio test for speakers and headphones
PGY-I2S - I2S Audio Testing Software (Physical Layer to Audio experience)
Audio electronics | Audio equipment testing | [
"Engineering"
] | 2,153 | [
"Audio electronics",
"Audio engineering"
] |
13,222,289 | https://en.wikipedia.org/wiki/Roman%20concrete | Roman concrete, also called , was used in construction in ancient Rome. Like its modern equivalent, Roman concrete was based on a hydraulic-setting cement added to an aggregate.
Many buildings and structures still standing today, such as bridges, reservoirs and aqueducts, were built with this material, which attests to both its versatility and its durability. Its strength was sometimes enhanced by the incorporation of pozzolanic ash where available (particularly in the Bay of Naples). The addition of ash prevented cracks from spreading. Recent research has shown that the incorporation of mixtures of different types of lime, forming conglomerate "clasts" allowed the concrete to self-repair cracks.
Roman concrete was in widespread use from about 150 BC; some scholars believe it was developed a century before that.
It was often used in combination with facings and other supports, and interiors were further decorated by stucco, fresco paintings, or coloured marble. Further innovative developments in the material, part of the so-called concrete revolution, contributed to structurally complicated forms. The most prominent example of these is the Pantheon dome, the world's largest and oldest unreinforced concrete dome.
Roman concrete differs from modern concrete in that the aggregates often included larger components; hence, it was laid rather than poured. Roman concretes, like any hydraulic concrete, were usually able to set underwater, which was useful for bridges and other waterside construction.
Historic references
Vitruvius, writing around 25 BC in his Ten Books on Architecture, distinguished types of materials appropriate for the preparation of lime mortars. For structural mortars, he recommended pozzolana ( in Latin), the volcanic sand from the beds of Pozzuoli, which are brownish-yellow-gray in colour in that area around Naples, and reddish-brown near Rome. Vitruvius specifies a ratio of 1 part lime to 3 parts pozzolana for mortar used in buildings and a 1:2 ratio for underwater work.
The Romans first used hydraulic concrete in coastal underwater structures, probably in the harbours around Baiae before the end of the 2nd century BC. The harbour of Caesarea is an example (22-15 BC) of the use of underwater Roman concrete technology on a large scale, for which enormous quantities of pozzolana were imported from Puteoli.
For rebuilding Rome after the fire in 64 AD which destroyed large portions of the city, Nero's new building code largely called for brick-faced concrete. This appears to have encouraged the development of the brick and concrete industries.
Material properties
Roman concrete, like any concrete, consists of an aggregate and hydraulic mortar, a binder mixed with water that hardens over time. The composition of the aggregate varied, and included pieces of rock, ceramic tile, lime clasts, and brick rubble from the remains of previously demolished buildings. In Rome, readily available tuff was often used as an aggregate.
Gypsum and quicklime were used as binders. Volcanic dusts, called pozzolana or "pit sand", were favoured where they could be obtained. Pozzolana makes the concrete more resistant to salt water than modern-day concrete. Pozzolanic mortar had a high content of alumina and silica.
Research in 2023 found that lime clasts, previously considered a sign of poor aggregation technique, react with water seeping into any cracks. This produces reactive calcium, which allows new calcium carbonate crystals to form and reseal the cracks. These lime clasts have a brittle structure that was most likely created in a "hot-mixing" technique with quicklime rather than traditional slaked lime, causing cracks to preferentially move through the lime clasts, thus potentially playing a critical role in the self-healing mechanism.
Concrete and, in particular, the hydraulic mortar responsible for its cohesion, was a type of structural ceramic whose utility derived largely from its rheological plasticity in the paste state. The setting and hardening of hydraulic cements derived from hydration of materials and the subsequent chemical and physical interaction of these hydration products. This differed from the setting of slaked lime mortars, the most common cements of the pre-Roman world. Once set, Roman concrete exhibited little plasticity, although it retained some resistance to tensile stresses.The setting of pozzolanic cements has much in common with setting of their modern counterpart, Portland cement. The high silica composition of Roman pozzolana cements is very close to that of modern cement to which blast furnace slag, fly ash, or silica fume have been added.
The strength and longevity of Roman 'marine' concrete is understood to benefit from a reaction of seawater with a mixture of volcanic ash and quicklime to create a rare crystal called tobermorite, which may resist fracturing. As seawater percolated within the tiny cracks in the Roman concrete, it reacted with phillipsite naturally found in the volcanic rock and created aluminous tobermorite crystals. The result is a candidate for "the most durable building material in human history". In contrast, modern concrete exposed to saltwater deteriorates within decades.
The Roman concrete at the Tomb of Caecilia Metella is another variation higher in potassium that triggered changes that "reinforce interfacial zones and potentially contribute to improved mechanical performance".
Seismic technology
For an environment as prone to earthquakes as the Italian peninsula, interruptions and internal constructions within walls and domes created discontinuities in the concrete mass. Portions of the building could then shift slightly when there was movement of the earth to accommodate such stresses, enhancing the overall strength of the structure. It was in this sense that bricks and concrete were flexible. It may have been precisely for this reason that, although many buildings sustained serious cracking from a variety of causes, they continue to stand to this day.
Another technology used to improve the strength and stability of concrete was its gradation in domes. One example is the Pantheon, where the aggregate of the upper dome region consists of alternating layers of light tuff and pumice, giving the concrete a density of . The foundation of the structure used travertine as an aggregate, having a much higher density of .
Modern use
Scientific studies of Roman concrete since 2010 have attracted both media and industry attention. Because of its unusual durability, longevity, and lessened environmental footprint, corporations and municipalities are starting to explore the use of Roman-style concrete in North America. This involves replacing the volcanic ash with coal fly ash that has similar properties. Proponents say that concrete made with fly ash can cost up to 60% less, because it requires less cement. It also has a reduced environmental footprint, due to its lower cooking temperature and much longer lifespan. Usable examples of Roman concrete exposed to harsh marine environments have been found to be 2000 years old with little or no wear.
In 2013, the University of California Berkeley published an article that described for the first time the mechanism by which the suprastable calcium-aluminium-silicate-hydrate compound binds the material together. During its production, less carbon dioxide is released into the atmosphere than any modern concrete production process. It is no coincidence that the walls of Roman buildings are thicker than those of modern buildings. However, Roman concrete was still gaining its strength for several decades after construction had been completed.
See also
Literature
References
External links
Ancient Roman architecture
Concrete
Concrete buildings and structures
Building materials
Masonry
Pavements
Sculpture materials
Ancient inventions
Architecture in Italy
Architectural history
Ancient Roman construction techniques | Roman concrete | [
"Physics",
"Engineering"
] | 1,531 | [
"Structural engineering",
"Architectural history",
"Masonry",
"Building engineering",
"Architecture",
"Construction",
"Materials",
"Concrete",
"Matter",
"Building materials"
] |
13,222,629 | https://en.wikipedia.org/wiki/ADP-ribosylation | ADP-ribosylation is the addition of one or more ADP-ribose moieties to a protein. It is a reversible post-translational modification that is involved in many cellular processes, including cell signaling, DNA repair, gene regulation and apoptosis.
Improper ADP-ribosylation has been implicated in some forms of cancer. It is also the basis for the toxicity of bacterial compounds such as cholera toxin, diphtheria toxin, and others.
History
The first suggestion of ADP-ribosylation surfaced during the early 1960s. At this time, Pierre Chambon and coworkers observed the incorporation of ATP into hen liver nuclei extract. After extensive studies on the acid insoluble fraction, several different research laboratories were able to identify ADP-ribose, derived from NAD+, as the incorporated group. Several years later, the enzymes responsible for this incorporation were identified and given the name poly(ADP-ribose)polymerase. Originally, this group was thought to be a linear sequence of ADP-ribose units covalently bonded through a ribose glycosidic bond. It was later reported that branching can occur every 20 to 30 ADP residues.
The first appearance of mono(ADP-ribosyl)ation occurred a year later during a study of toxins: the diphtheria toxin of Corynebacterium diphtheriae was shown to be dependent on NAD+ in order for it to be completely effective, leading to the discovery of enzymatic conjugation of a single ADP-ribose group by mono(ADP-ribosyl)transferase.
It was initially thought that ADP-ribosylation was a post translational modification involved solely in gene regulation. However, as more enzymes with the ability to ADP-ribosylate proteins were discovered, the multifunctional nature of ADP-ribosylation became apparent. The first mammalian enzyme with poly(ADP-ribose)transferase activity was discovered during the late 1980s. For the next 15 years, it was thought to be the only enzyme capable of adding a chain of ADP-ribose in mammalian cells. During the late 1980s, ADP-ribosyl cyclases, which catalyze the addition of cyclic-ADP-ribose groups to proteins, were discovered. Finally, sirtuins, a family of enzymes that also possess NAD+-dependent deacylation activity, were discovered to also possess mono(ADP-ribosyl)transferase activity.
Catalytic mechanism
The source of ADP-ribose for most enzymes that perform this modification is the redox cofactor NAD+. In this transfer reaction, the N-glycosidic bond of NAD+ that bridges the ADP-ribose molecule and the nicotinamide group is cleaved, followed by nucleophilic attack by the target amino acid side chain. (ADP-ribosyl)transferases can perform two types of modifications: mono(ADP-ribosyl)ation and poly(ADP-ribosyl)ation.
Mono(ADP-ribosyl)ation
Mono(ADP-ribosyl)transferases commonly catalyze the addition of ADP-ribose to arginine side chains using a highly conserved R-S-EXE motif of the enzyme. The reaction proceeds by breaking the bond between nicotinamide and ribose to form an oxonium ion. Next, the arginine side chain of the target protein then acts a nucleophile, attacking the electrophilic carbon adjacent to the oxonium ion. In order for this step to occur, the arginine nucleophile is deprotonated by a glutamate residue on the catalyzing enzyme. Another conserved glutamate residue forms a hydrogen bond with one of the hydroxyl groups on the ribose chain to further facilitate this nucleophilic attack. As a result of the cleavage reaction, nicotinamide is released. The modification can be reversed by (ADP-ribosyl)hydrolases, which cleave the N-glycosidic bond between arginine and ribose to release ADP-ribose and unmodified protein; NAD+ is not restored by the reverse reaction.
Poly(ADP-ribosyl)ation
Poly(ADP-ribose)polymerases (PARPs) are found mostly in eukaryotes and catalyze the transfer of multiple ADP-ribose molecules to target proteins. As with mono(ADP-ribosyl)ation, the source of ADP-ribose is NAD+. PARPs use a catalytic triad of His-Tyr-Glu to facilitate binding of NAD+ and positioning of the end of the existing poly(ADP-ribose) chain on the target protein; the Glu facilitates catalysis and formation of a (1''→2') O-glycosidic linkage between two ribose molecules.
There are several other enzymes that recognize poly(ADP-ribose) chains, hydrolyse them or form branches; over 800 proteins have been annotated to contain the loosely defined poly(ADP-ribose) binding motif; therefore, in addition to this modification altering target protein conformation and structure, it may also be used as a tag to recruit other proteins or for regulation of the target protein.
Amino acid specificity
Many different amino acid side chains have been described as ADP-ribose acceptors. From a chemical perspective, this modification represents protein glycosylation: the transfer of ADP-ribose occurs onto amino acid side chains with a nucleophilic oxygen, nitrogen, or sulfur, resulting in N-, O-, or S-glycosidic linkage to the ribose of the ADP-ribose. Originally, acidic amino acids (glutamate and aspartate) were described as the main sites of ADP-ribosylation. However, many other ADP-ribose acceptor sites such as serine, arginine, cysteine, lysine, diphthamide, phosphoserine, and asparagine have been identified in subsequent works.
Function
Apoptosis
During DNA damage or cellular stress PARPs are activated, leading to an increase in the amount of poly(ADP-ribose) and a decrease in the amount of NAD+. For over a decade it was thought that PARP1 was the only poly(ADP-ribose)polymerase in mammalian cells, therefore this enzyme has been the most studied. Caspases are a family of cysteine proteases that are known to play an essential role in programmed cell death. This protease cleaves PARP-1 into two fragments, leaving it completely inactive, to limit poly(ADP-ribose) production. One of its fragments migrates from the nucleus to the cytoplasm and is thought to become a target of autoimmunity.
During caspase-independent apoptosis, also called parthanatos, poly(ADP-ribose) accumulation can occur due to activation of PARPs or inactivation of poly(ADP-ribose)glycohydrolase, an enzyme that hydrolyses poly(ADP-ribose) to produce free ADP-ribose. Studies have shown poly(ADP-ribose) drives the translocation of the apoptosis inducing factor protein to the nucleus where it will mediate DNA fragmentation. It has been suggested that if a failure of caspase activation under stress conditions were to occur, necroptosis would take place. Overactivation of PARPs has led to a necrotic cell death regulated by the tumor necrosis factor protein. Though the mechanism is not yet understood, PARP inhibitors have been shown to affect necroptosis.
Gene regulation
ADP-ribosylation can affect gene expression at nearly every level of regulation, including chromatin organization, transcription factor recruitment and binding, and mRNA processing.
The organization of nucleosomes is key to regulation of gene expression: the spacing and organization of nucleosomes changes what regions of DNA are available for transcription machinery to bind and transcribe DNA. PARP1, a poly-ADP ribose polymerase, has been shown to affect chromatin structure and promote changes in the organization of nucleosomes through modification of histones.
PARPs have been shown to affect transcription factor structure and cause recruitment of many transcription factors to form complexes at DNA and elicit transcription. Mono(ADP-ribosyl)transferases are also shown to affect transcription factor binding at promoters. For example, PARP14, a mono (ADP-ribosyl)transferase, has been shown to affect STAT transcription factor binding.
Other (ADP-ribosyl)transferases have been shown to modify proteins that bind mRNA, which can cause silencing of that gene transcript.
DNA repair
Poly(ADP-ribose)polymerases (PARPs) can function in DNA repair of single strand breaks as well as double strand breaks. In single-strand break repair (base excision repair) the PARP can either facilitate removal of an oxidized sugar or strand cleavage. PARP1 binds the single-strand breaks and pulls any nearby base excision repair intermediates close. These intermediates include XRCC1 and APLF and they can be recruited directly or through the PBZ domain of the APLF. This leads to the synthesis of poly(ADP-ribose). The PBZ domain is present in many proteins involved in DNA repair and allows for the binding of the PARP and thus ADP-ribosylation which recruits repair factors to interact at the break site. PARP2 is a secondary responder to DNA damage but serves to provide functional redundancy in DNA repair.
There are many mechanisms for the repair of damaged double stranded DNA. PARP1 may function as a synapsis factor in alternative non-homologous end joining. Additionally, it has been proposed that PARP1 is required to slow replication forks following DNA damage and promotes homologous recombination at replication forks that may be dysfunctional. It is possible that PARP1 and PARP3 work together in repair of double-stranded DNA and it has been shown that PARP3 is critical for double-stranded break resolution. There are two hypotheses by which PARP1 and PARP3 coincide. The first hypothesis states that the two (ADP-ribosyl)transferases serve to function for each other's inactivity. If PARP3 is lost, this results in single-strand breaks, and thus the recruitment of PARP1. A second hypothesis suggests that the two enzyme work together; PARP3 catalyzes mono(ADP-ribosyl)ation and short poly(ADP-ribosyl)ation and serves to activate PARP1.
The PARPs have many protein targets at the site of DNA damage. KU protein and DNA-PKcs are both double-stranded break repair components with unknown sites of ADP-ribosylation. Histones are another protein target of the PARPs. All core histones and linker histone H1 are ADP-ribosylated following DNA damage. The function of these modifications is still unknown, but it has been proposed that ADP-ribosylation modulates higher-order chromatin structure in efforts to facilitate more accessible sites for repair factors to migrate to the DNA damage.
Protein degradation
The ubiquitin-proteasome system (UPS) figures prominently in protein degradation. The 26S proteasome consists of a catalytic subunit (the 20S core particle), and a regulatory subunit (the 19S cap). Poly-ubiquitin chains tag proteins for degradation by the proteasome, which causes hydrolysis of tagged proteins into smaller peptides.
Physiologically, PI31 attacks 20S catalytic domain of 26S Proteasome that results in decreased proteasome activity. (ADP-ribosyl)transferase Tankyrase (TNKS) causes ADP-ribosylation of PI31 which in turn increases the proteasome activity. Inhibition of TNKs further shows the reduced 26S Proteasome assembly. Therefore, ADP-ribosylation promotes 26S Proteasome activity in both Drosophila and human cells.
Enzyme regulation
The activity of some enzymes is regulated by ADP-ribosylation. For instance, the activity of Rodospirillum rubrum di-nitrogenase-reductase is turned off by ADP-ribosylation of an arginine residue, and reactivated by the removal of the ADP-ribosyl group.
Clinical significance
Cancer
PARP1 is involved in base excision repair (BER), single- and double-strand break repair, and chromosomal stability. It is also involved in transcriptional regulation through its facilitation of protein–protein interactions. PARP1 uses NAD+ in order to perform its function in apoptosis. If a PARP becomes overactive the cell will have decreased levels of NAD+ cofactor as well as decreased levels of ATP and thus will undergo necrosis. This is important in carcinogenesis because it could lead to the selection of PARP1 deficient cells (but not depleted) due to their survival advantage during cancer growth.
Susceptibility to carcinogenesis under PARP1 deficiency depends significantly on the type of DNA damage incurred. There are many implications that various PARPs are involved in preventing carcinogenesis. As stated previously, PARP1 and PARP2 are involved in BER and chromosomal stability. PARP3 is involved in centrosome regulation. Tankyrase is another (ADP-ribosyl)polymerase that is involved in telomere length regulation.
PARP1 inhibition has also been widely studied in anticancer therapeutics. The mechanism of action of a PARP1 inhibitor is to enhance the damage done by chemotherapy on the cancerous DNA by disallowing the reparative function of PARP1 in BRCA1/2 deficient individuals .
PARP14 is another ADP-ribosylating enzyme that has been well-studied in regards to cancer therapy targets; it is a signal transducer and activator of STAT6 transcription-interacting protein, and was shown to be associated with the aggressiveness of B-cell lymphomas.
Bacterial toxins
Bacterial ADP-ribosylating exotoxins (bAREs) covalently transfer an ADP-ribose moiety of NAD+ to target proteins of infected eukaryotes, to yield nicotinamide and a free hydrogen ion. bAREs are produced as enzyme precursors, consisting of a "A" and "B" domains: the "A" domain is responsible for ADP-ribosylation activity; and, the "B" domain for translocation of the enzyme across the membrane of the cell. These domains can exist in concert in three forms: first, as single polypeptide chains with A and B domains covalently linked; second, in multi-protein complexes with A and B domains bound by non-covalent interactions; and, third, in multi-protein complexes with A and B domains not directly interacting, prior to processing.
Upon activation, bAREs ADP-ribosylate any number of eukaryotic proteins; such mechanism is crucial to the instigation of the diseased states associated with ADP-ribosylation. GTP-binding proteins, in particular, are well-established in bAREs pathophysiology. For examples, cholera and heat-labile enterotoxin target the α-subunit of Gs of heterotrimeric GTP-binding proteins. As the α-subunit is ADP-ribosylated, it is permanently in an "active", GTP-bound state; subsequent activation of intracellular cyclic AMP stimulates the release of fluid and ions from intestinal epithelial cells. Furthermore, C. Botulinum C3 ADP-ribosylates GTP-binding proteins Rho and Ras, and Pertussis toxin ADP-ribosylates Gi, Go, and Gt. Diphtheria toxin ADP-ribosylates ribosomal elongation factor EF-2, which attenuates protein synthesis.
There are a variety of bacteria which employ bAREs in infection: CARDS toxin of Mycoplasma pneumoniae, cholera toxin of Vibrio cholerae; heat-labile enterotoxin of E. coli; exotoxin A of Pseudomonas aeruginosa; pertussis toxin of B. pertussis; C3 toxin of C. botulinum; and diphtheria toxin of Corynebacterium diphtheriae.
See also
Histone code
Cell signaling
PARP-1
Cholera toxin
NAD+ ADP-ribosyltransferase
Pertussis toxin
Post-translational modification
References
Further reading
Cell biology
Signal transduction
Post-translational modification | ADP-ribosylation | [
"Chemistry",
"Biology"
] | 3,628 | [
"Cell biology",
"Gene expression",
"Signal transduction",
"Biochemical reactions",
"Post-translational modification",
"Biochemistry",
"Neurochemistry"
] |
13,222,892 | https://en.wikipedia.org/wiki/IC%204703 | IC 4703 is the diffuse emission nebula or HII region associated with Messier 16, which is actually a cluster of stars. It is the nebulous region surrounding Messier 16. These two objects make up the Eagle Nebula. They are relatively bright and are located in the constellation Serpens Cauda. This region contains the picturesque Pillars of Creation. This is an active star forming region 7,000 light years away. It is approximately magnitude 8. The cluster was discovered by Jean-Philippe Loys de Cheseaux, but Charles Messier later rediscovered it and remarked on its apparent nebulous appearance. The cluster is estimated to be 5.5 million years old, and the nebula would be a bit older. The nebula is about 55 x 70 light years. The Eagle Nebula lies in the Sagittarius Arm of the Milky Way.
References
The Belt of Venus. M16 and IC 4703 - The Eagle Nebula. 9/12/07. The Belt of Venus
See also
Messier 16
Eagle Nebula
4703
H II regions
Carina–Sagittarius Arm
Serpens | IC 4703 | [
"Astronomy"
] | 224 | [
"Nebula stubs",
"Astronomy stubs",
"Constellations",
"Serpens"
] |
13,223,304 | https://en.wikipedia.org/wiki/Robert%20Bird%20Group | Robert Bird Group (RBG), established in 1982, is an Australian global consulting engineering firm. RBG became a member of the Surbana Jurong Group in late 2017.
Services
Robert Bird Group provides structural engineering, civil engineering, construction engineering (temporary works), geotechnical engineering (UK & Middle East), and virtual design and construction services.
Major projects
Australia
400 George Street
AAMI Stadium
Australia108
Crown Sydney
Salesforce Tower
Victoria One
Eq. Tower
Riparian Plaza
600 Collins Street
The Tower, One St George Wharf
Chapel Tower
The Oracle Beach Tower
One Central Park
35 Spring Street
United Kingdom
100 Bishopsgate
Spire London
The Tower, One St George Wharf
70 Gracechurch Street
Elizabeth House
One The Elephant
Trafalgar Place
Phoenix
Middle East & Northern Africa
ICD Brookfield Place
South-East Asia
Merdeka PNB118
References
Engineering consulting firms of Australia
International engineering consulting firms | Robert Bird Group | [
"Engineering"
] | 182 | [
"Engineering consulting firms",
"International engineering consulting firms"
] |
13,223,329 | https://en.wikipedia.org/wiki/NGC%207315 | NGC 7315 is a lenticular galaxy in the constellation of Pegasus. It was discovered on 11 September 1872 by Édouard Stephan. It was described as "very faint, extremely small, round, brighter middle" by John Louis Emil Dreyer, the compiler of the New General Catalogue.
One supernova has been observed in NGC 7315: SN 2007B (type Ia, mag. 16.7) was discovered on 5 January 2007 by Kōichi Itagaki.
See also
List of NGC objects (7001–7840)
References
Notes
External links
Lenticular galaxies
Pegasus (constellation)
7315
12097
069241
Astronomical objects discovered in 1872
Discoveries by Édouard Stephan | NGC 7315 | [
"Astronomy"
] | 138 | [
"Pegasus (constellation)",
"Constellations"
] |
966,583 | https://en.wikipedia.org/wiki/T-VIS | Toyota Variable Induction System, or T-VIS, is a variable intake system designed by Toyota to improve the low-end performance of multi-valve engines.
T-VIS is intended to improve the low-end torque of high-performance, four-stroke internal combustion engines - by changing the geometry of the intake manifold according to the engine rotation speed. The system uses two separate intake runners per cylinder, one being equipped with a butterfly valve that can either open or close the runner. All valves are attached to a common shaft which is rotated by a vacuum actuator outside the manifold. T-VIS does not actually keep one of the intake valves from opening or seal off the port for one valve.
The engine control unit (ECU) allows vacuum into the actuator by powering a solenoid valve when the engine rotation speed is low. At higher engine speeds (e.g. 4,200 rpm), vacuum is cut off and a spring inside the actuator causes the butterfly valve to fully open. The idea behind the system is that in the lower engine speed band, the speed of the intake air will be increased because the intake runner cross section per cylinder is smaller. However, when engine speed increases, the second runner is opened, decreasing airflow speed, but increasing the airflow volume, better matching the engine's airflow needs at higher revolutions and improving top end power. With modified engines it may be desirable to have the T-VIS open earlier than stock, because modifications that improve an engine's power output may do so by increasing airflow per engine revolution, resulting in a high airflow at a lower rpm.
In addition to providing more air at higher engine speeds, the system also creates a swirl in the combustion chamber at lower rpms. The swirl makes for more efficient combustion, and is due to the asymmetric nature of the airflow with one intake runner closed.
Applications:
1982.08-1990 1G-GEU/1G-GE
1983-1989 4A-GE
1986-1989 3S-GE (Both Rev 1 and Rev 2 of the 1st Generation 3S-GE)
1986-1993/95 3S-GTE (through 1995 in US market, 1993 everywhere else; 1st & 2nd generation motors only)
1997-2000 7A-FE (lean burn models only)
References
See also
Acoustic Control Induction System
Variable length intake manifold
Engine technology
Toyota | T-VIS | [
"Technology"
] | 489 | [
"Engine technology",
"Engines"
] |
966,640 | https://en.wikipedia.org/wiki/Leafnode | Leafnode is a store-and-forward NNTP (or Usenet) proxy server designed for small sites with just a few active newsgroups, but very easy to set up and maintain, when compared to INN. Originally created by Arnt Gulbrandsen in 1995 while he was working at Trolltech, it is currently maintained by Matthias Andree and Ralf Wildenhues.
The term leaf node can also be used to describe a node on a binary tree (or any other sort of tree that has nodes) which has no sub-nodes.
References
External links
Official website
Leafnode at SourceForge.org
Installing and Configuring LeafNode
Usenet
Usenet servers | Leafnode | [
"Technology"
] | 145 | [
"Computing stubs",
"Computer network stubs"
] |
966,653 | https://en.wikipedia.org/wiki/Salting%20out | Salting out (also known as salt-induced precipitation, salt fractionation, anti-solvent crystallization, precipitation crystallization, or drowning out) is a purification technique that utilizes the reduced solubility of certain molecules in a solution of very high ionic strength. Salting out is typically used to precipitate large biomolecules, such as proteins or DNA. Because the salt concentration needed for a given protein to precipitate out of the solution differs from protein to protein, a specific salt concentration can be used to precipitate a target protein. This process is also used to concentrate dilute solutions of proteins. Dialysis can be used to remove the salt if needed.
Principle
Salt compounds dissociate in aqueous solutions. This property is exploited in the process of salting out. When the salt concentration is increased, some of the water molecules are attracted by the salt ions, which decreases the number of water molecules available to interact with the charged part of the protein.
There are hydrophobic amino acids and hydrophilic amino acids in protein molecules.
After protein folding in aqueous solution, hydrophobic amino acids usually form protected hydrophobic areas while hydrophilic amino acids interact with the molecules of solvation and allow proteins to form hydrogen bonds with the surrounding water molecules. If enough of the protein surface is hydrophilic, the protein can be dissolved in water.
When salt is added to the solution, there is more frequent interaction between solvent molecules and salt ions. As a result, the protein and salt ions compete to interact with the solvent molecules with the result that there are fewer solvent molecules available for interaction with the protein molecules than before. The protein–protein interactions thus become stronger than the solvent–solute interactions and the protein molecules associate by forming hydrophobic interactions with each other. After dissociation in a given solvent, the negatively charged atoms from a chosen salt begin to compete for interactions with positively charged molecules present in the solution. Similarly, the positively charged cations compete for interactions with the negatively charged molecules of the solvent. This process is known as salting out.
Soaps are easily precipitated by concentrated salt solution, the metal ion in the salt reacts with the fatty acids forming back the soap and glycerin (glycerol). To separate glycerin from the soap, the pasty boiling mass is treated with brine (NaCl solution). Contents of the kettle salt out (separate) into an upper layer that is a curdy mass of impure soap and a lower layer that consists of an aqueous salt solution with the glycerin dissolved in it. The slightly alkaline salt solution, termed spent lye, is extracted from the bottom of the pan or kettle and may be subsequently treated for glycerin recovery.
Application
As different proteins have different compositions of amino acids, different protein molecules precipitate at different concentrations of salt solution.
Unwanted proteins can be removed from a protein solution mixture by salting out as long as the solubility of the protein in various concentrations of salt solution is known.
After removing the precipitate by filtration or centrifugation, the desired protein can be precipitated by altering the salt concentration to the level at which the desired protein becomes insoluble.
One demerit of salting out in purification of proteins is that, in addition to precipitating a specific protein of interest, contaminants are also precipitated as well. Thus to obtain a purer protein of interest, additional purification methods such as ion exchange chromatography may be required.
See also
Ionic strength
Protein precipitation
Salting in
Ammonium sulfate precipitation
Hofmeister series
References
Further reading
External links
Make The Most of Antisolvent Crystallization
Salting out on UC Davis ChemWiki
Laboratory techniques
Separation processes | Salting out | [
"Chemistry"
] | 791 | [
"nan",
"Separation processes"
] |
966,654 | https://en.wikipedia.org/wiki/DNA-binding%20protein | DNA-binding proteins are proteins that have DNA-binding domains and thus have a specific or general affinity for single- or double-stranded DNA. Sequence-specific DNA-binding proteins generally interact with the major groove of B-DNA, because it exposes more functional groups that identify a base pair.
Examples
DNA-binding proteins include transcription factors which modulate the process of transcription, various polymerases, nucleases which cleave DNA molecules, and histones which are involved in chromosome packaging and transcription in the cell nucleus. DNA-binding proteins can incorporate such domains as the zinc finger, the helix-turn-helix, and the leucine zipper (among many others) that facilitate binding to nucleic acid. There are also more unusual examples such as transcription activator like effectors.
Non-specific DNA-protein interactions
Structural proteins that bind DNA are well-understood examples of non-specific DNA-protein interactions. Within chromosomes, DNA is held in complexes with structural proteins. These proteins organize the DNA into a compact structure called chromatin. In eukaryotes, this structure involves DNA binding to a complex of small basic proteins called histones. In prokaryotes, multiple types of proteins are involved. The histones form a disk-shaped complex called a nucleosome, which contains two complete turns of double-stranded DNA wrapped around its surface. These non-specific interactions are formed through basic residues in the histones making ionic bonds to the acidic sugar-phosphate backbone of the DNA, and are therefore largely independent of the base sequence. Chemical modifications of these basic amino acid residues include methylation, phosphorylation and acetylation. These chemical changes alter the strength of the interaction between the DNA and the histones, making the DNA more or less accessible to transcription factors and changing the rate of transcription. Other non-specific DNA-binding proteins in chromatin include the high-mobility group (HMG) proteins, which bind to bent or distorted DNA. Biophysical studies show that these architectural HMG proteins bind, bend and loop DNA to perform its biological functions. These proteins are important in bending arrays of nucleosomes and arranging them into the larger structures that form chromosomes. Recently FK506 binding protein 25 (FBP25) was also shown to non-specifically bind to DNA which helps in DNA repair.
Proteins that specifically bind single-stranded DNA
A distinct group of DNA-binding proteins are the DNA-binding proteins that specifically bind single-stranded DNA. In humans, replication protein A is the best-understood member of this family and is used in processes where the double helix is separated, including DNA replication, recombination and DNA repair. These binding proteins seem to stabilize single-stranded DNA and protect it from forming stem-loops or being degraded by nucleases.
Binding to specific DNA sequences
In contrast, other proteins have evolved to bind to specific DNA sequences. The most intensively studied of these are the various transcription factors, which are proteins that regulate transcription. Each transcription factor binds to one specific set of DNA sequences and activates or inhibits the transcription of genes that have these sequences near their promoters. The transcription factors do this in two ways. Firstly, they can bind the RNA polymerase responsible for transcription, either directly or through other mediator proteins; this locates the polymerase at the promoter and allows it to begin transcription. Alternatively, transcription factors can bind enzymes that modify the histones at the promoter. This alters the accessibility of the DNA template to the polymerase.
These DNA targets can occur throughout an organism's genome. Thus, changes in the activity of one type of transcription factor can affect thousands of genes. Thus, these proteins are often the targets of the signal transduction processes that control responses to environmental changes or cellular differentiation and development. The specificity of these transcription factors' interactions with DNA come from the proteins making multiple contacts to the edges of the DNA bases, allowing them to read the DNA sequence. Most of these base-interactions are made in the major groove, where the bases are most accessible. Mathematical descriptions of protein-DNA binding taking into account sequence-specificity, and competitive and cooperative binding of proteins of different types are usually performed with the help of the lattice models. Computational methods to identify the DNA binding sequence specificity have been proposed to make a good use of the abundant sequence data in the post-genomic era. In addition, progress has happened on structure-based prediction of binding specificity across protein families using deep learning.
Protein–DNA interactions
Protein–DNA interactions occur when a protein binds a molecule of DNA, often to regulate the biological function of DNA, usually the expression of a gene. Among the proteins that bind to DNA are transcription factors that activate or repress gene expression by binding to DNA motifs and histones that form part of the structure of DNA and bind to it less specifically. Also proteins that repair DNA such as uracil-DNA glycosylase interact closely with it.
In general, proteins bind to DNA in the major groove; however, there are exceptions. Protein–DNA interaction are of mainly two types, either specific interaction, or non-specific interaction. Recent single-molecule experiments showed that DNA binding proteins undergo of rapid rebinding in order to bind in correct orientation for recognizing the target site.
Design
Designing DNA-binding proteins that have a specified DNA-binding site has been an important goal for biotechnology. Zinc finger proteins have been designed to bind to specific DNA sequences and this is the basis of zinc finger nucleases. Recently transcription activator-like effector nucleases (TALENs) have been created which are based on natural proteins secreted by Xanthomonas bacteria via their type III secretion system when they infect various plant species.
Detection methods
There are many in vitro and in vivo techniques which are useful in detecting DNA-Protein Interactions. The following lists some methods currently in use: Electrophoretic mobility shift assay (EMSA) is a widespread qualitative technique to study protein–DNA interactions of known DNA binding proteins. DNA-Protein-Interaction - Enzyme-Linked ImmunoSorbant Assay (DPI-ELISA) allows the qualitative and quantitative analysis of DNA-binding preferences of known proteins in vitro. This technique allows the analysis of protein complexes that bind to DNA (DPI-Recruitment-ELISA) or is suited for automated screening of several nucleotide probes due to its standard ELISA plate formate. DNase footprinting assay can be used to identify the specific sites of binding of a protein to DNA at basepair resolution. Chromatin immunoprecipitation is used to identify the in vivo DNA target regions of a known transcription factor. This technique when combined with high throughput sequencing is known as ChIP-Seq and when combined with microarrays it is known as ChIP-chip. Yeast one-hybrid System (Y1H) is used to identify which protein binds to a particular DNA fragment. Bacterial one-hybrid system (B1H) is used to identify which protein binds to a particular DNA fragment. Structure determination using X-ray crystallography has been used to give a highly detailed atomic view of protein–DNA interactions.
Besides these methods, other techniques such as SELEX, PBM (protein binding microarrays), DNA microarray screens, DamID, FAIRE or more recently DAP-seq are used in the laboratory to investigate DNA-protein interaction in vivo and in vitro.
Manipulating the interactions
The protein–DNA interactions can be modulated using stimuli like ionic strength of the buffer, macromolecular crowding, temperature, pH and electric field. This can lead to reversible dissociation/association of the protein–DNA complex.
See also
bZIP domain
ChIP-exo
Comparison of nucleic acid simulation software
DNA-binding domain
Helix-loop-helix
Helix-turn-helix
HMG-box
Leucine zipper
Lexitropsin (a semi-synthetic DNA-binding ligand)
Deoxyribonucleoprotein
Protein–DNA interaction site prediction software
RNA-binding protein
Single-strand binding protein
Zinc finger
References
External links
Protein-DNA binding: data, tools & models (annotated list, constantly updated)
Abalone tool for modeling DNA-ligand interactions.
DBD database of predicted transcription factors Uses a curated set of DNA-binding domains to predict transcription factors in all completely sequenced genomes
DNA-binding proteins
Molecular genetics
DNA replication
Transcription factors
Biophysics | DNA-binding protein | [
"Physics",
"Chemistry",
"Biology"
] | 1,747 | [
"Genetics techniques",
"Applied and interdisciplinary physics",
"Gene expression",
"Signal transduction",
"DNA replication",
"Molecular genetics",
"Biophysics",
"Induced stem cells",
"Molecular biology",
"Transcription factors"
] |
966,794 | https://en.wikipedia.org/wiki/Isoelectric%20focusing | Isoelectric focusing (IEF), also known as electrofocusing, is a technique for separating different molecules by differences in their isoelectric point (pI). It is a type of zone electrophoresis usually performed on proteins in a gel that takes advantage of the fact that overall charge on the molecule of interest is a function of the pH of its surroundings.
Procedure
IEF involves adding an ampholyte solution into immobilized pH gradient (IPG) gels. IPGs are the acrylamide gel matrix co-polymerized with the pH gradient, which result in completely stable gradients except the most alkaline (>12) pH values. The immobilized pH gradient is obtained by the continuous change in the ratio of immobilines. An immobiline is a weak acid or base defined by its pK value.
A protein that is in a pH region below its isoelectric point (pI) will be positively charged and so will migrate toward the cathode (negatively charged electrode). As it migrates through a gradient of increasing pH, however, the protein's overall charge will decrease until the protein reaches the pH region that corresponds to its pI. At this point it has no net charge and so migration ceases (as there is no electrical attraction toward either electrode). As a result, the proteins become focused into sharp stationary bands with each protein positioned at a point in the pH gradient corresponding to its pI. The technique is capable of extremely high resolution with proteins differing by a single charge being fractionated into separate bands.
Molecules to be focused are distributed over a medium that has a pH gradient (usually created by aliphatic ampholytes). An electric current is passed through the medium, creating a "positive" anode and "negative" cathode end. Negatively charged molecules migrate through the pH gradient in the medium toward the "positive" end while positively charged molecules move toward the "negative" end. As a particle moves toward the pole opposite of its charge it moves through the changing pH gradient until it reaches a point in which the pH of that molecule's isoelectric point is reached. At this point the molecule no longer has a net electric charge (due to the protonation or deprotonation of the associated functional groups) and as such will not proceed any further within the gel. The gradient is established before adding the particles of interest by first subjecting a solution of small molecules such as polyampholytes with varying pI values to electrophoresis.
The method is applied particularly often in the study of proteins, which separate based on their relative content of acidic and basic residues, whose value is represented by the pI. Proteins are introduced into an immobilized pH gradient gel composed of polyacrylamide, starch, or agarose where a pH gradient has been established. Gels with large pores are usually used in this process to eliminate any "sieving" effects, or artifacts in the pI caused by differing migration rates for proteins of differing sizes. Isoelectric focusing can resolve proteins that differ in pI value by as little as 0.01. Isoelectric focusing is the first step in two-dimensional gel electrophoresis, in which proteins are first separated by their pI value and then further separated by molecular weight through SDS-PAGE. Isoelectric focusing, on the other hand, is the only step in preparative native PAGE at constant pH.
Living cells
According to some opinions, living eukaryotic cells perform isoelectric focusing of proteins in their interior to overcome a limitation of the rate of metabolic reaction by diffusion of enzymes and their reactants, and to regulate the rate of particular biochemical processes. By concentrating the enzymes of particular metabolic pathways into distinct and small regions of its interior, the cell can increase the rate of particular biochemical pathways by several orders of magnitude. By modification of the isoelectric point (pI) of molecules of an enzyme by, e.g., phosphorylation or dephosphorylation, the cell can transfer molecules of the enzyme between different parts of its interior, to switch on or switch off particular biochemical processes.
Microfluidic chip based
Microchip based electrophoresis is a promising alternative to capillary electrophoresis since it has the potential to provide rapid protein analysis, straightforward integration with other microfluidic unit operations, whole channel detection, nitrocellulose films, smaller sample sizes and lower fabrication costs.
Multi-junction
The increased demand for faster and easy-to-use protein separation tools has accelerated the evolution of IEF towards in-solution separations. In this context, a multi-junction IEF system was developed to perform fast and gel-free IEF separations. The multi-junction IEF system utilizes a series of vessels with a capillary passing through each vessel. Part of the capillary in each vessel is replaced by a semipermeable membrane. The vessels contain buffer solutions with different pH values, so that a pH gradient is effectively established inside the capillary. The buffer solution in each vessel has an electrical contact with a voltage divider connected to a high-voltage power supply, which establishes an electrical field along the capillary. When a sample (a mixture of peptides or proteins) is injected in the capillary, the presence of the electrical field and the pH gradient separates these molecules according to their isoelectric points. The multi-junction IEF system has been used to separate tryptic peptide mixtures for two-dimensional proteomics and blood plasma proteins from Alzheimer's disease patients for biomarker discovery.
References
Electrophoresis
Industrial processes
Protein methods
Molecular biology techniques | Isoelectric focusing | [
"Chemistry",
"Biology"
] | 1,180 | [
"Biochemistry methods",
"Instrumental analysis",
"Protein methods",
"Protein biochemistry",
"Biochemical separation processes",
"Molecular biology techniques",
"Molecular biology",
"Electrophoresis"
] |
966,847 | https://en.wikipedia.org/wiki/Mayall%20II | Mayall II, also known as NGC-224-G1, SKHB 1, GSC 2788:2139, HBK 0-1, M31GC J003247+393440 or Andromeda's Cluster, is a globular cluster orbiting M31, the Andromeda Galaxy.
It is located from the Andromeda Galaxy's galactic core, and is the brightest (by absolute magnitude) globular cluster in the Local Group, with an absolute visual magnitude of −10.94 and the luminosity of 2 million Suns. It has an apparent magnitude of 13.81 in V band. Mayall II is considered to have twice the mass of Omega Centauri, and may contain a central, intermediate-mass (~ 2 M⊙) black hole.
It was first identified as a possible globular cluster by American astronomers Nicholas Mayall and Olin J. Eggen in 1953 using a Palomar Schmidt plate exposed in 1948.
Because of the widespread distribution of metallicity, indicating multiple star generations and a large stellar creation period, many contend that it is not a true globular cluster, but is actually the galactic core that remains of a dwarf galaxy consumed by Andromeda.
Origin of names
Mayall II is named after Nicholas U. Mayall, who, with Olin J. Eggen, discovered it in 1953.
SKHB 1 is named for Wallace L. W. Sargent, Charles T. Kowal, F. D. A. Hartwick and Sidney van den Bergh. They also named it G1 in 1977.
HBK 0-1 is named for John Huchra, J. P. Brodie and S. M. Kent in 1991.
See also
Messier 54
Omega Centauri
Mayall's Object
References
External links
Astrophysical Journal, Vol. 370, p. 495–504
Publications of the Astronomical Society of the Pacific, Vol. 65, No. 382, p. 24–29
Astronomical Journal, vol. 82, p. 947–953
NightSkyInfo.com: Mayall II
Andromeda Galaxy
Globular clusters
Andromeda (constellation) | Mayall II | [
"Astronomy"
] | 450 | [
"Andromeda (constellation)",
"Constellations"
] |
966,856 | https://en.wikipedia.org/wiki/Valuation%20ring | In abstract algebra, a valuation ring is an integral domain D such that for every non-zero element x of its field of fractions F, at least one of x or x−1 belongs to D.
Given a field F, if D is a subring of F such that either x or x−1 belongs to
D for every nonzero x in F, then D is said to be a valuation ring for the field F or a place of F. Since F in this case is indeed the field of fractions of D, a valuation ring for a field is a valuation ring. Another way to characterize the valuation rings of a field F is that valuation rings D of F have F as their field of fractions, and their ideals are totally ordered by inclusion; or equivalently their principal ideals are totally ordered by inclusion. In particular, every valuation ring is a local ring.
The valuation rings of a field are the maximal elements of the set of the local subrings in the field partially ordered by dominance or refinement, where
dominates if and .
Every local ring in a field K is dominated by some valuation ring of K.
An integral domain whose localization at any prime ideal is a valuation ring is called a Prüfer domain.
Definitions
There are several equivalent definitions of valuation ring (see below for the characterization in terms of dominance). For an integral domain D and its field of fractions K, the following are equivalent:
For every non-zero x in K, at least one of x or x−1 is in D.
The ideals of D are totally ordered by inclusion.
The principal ideals of D are totally ordered by inclusion (i.e. the elements in D are, up to units, totally ordered by divisibility.)
There is a totally ordered abelian group Γ (called the value group) and a valuation ν: K → Γ ∪ {∞} with D = { x ∈ K | ν(x) ≥ 0 }.
The equivalence of the first three definitions follows easily. A theorem of states that any ring satisfying the first three conditions satisfies the fourth: take Γ to be the quotient K×/D× of the unit group of K by the unit group of D, and take ν to be the natural projection. We can turn Γ into a totally ordered group by declaring the residue classes of elements of D as "positive".
Even further, given any totally ordered abelian group Γ, there is a valuation ring D with value group Γ (see Hahn series).
From the fact that the ideals of a valuation ring are totally ordered, one can conclude that a valuation ring is a local domain, and that every finitely generated ideal of a valuation ring is principal (i.e., a valuation ring is a Bézout domain). In fact, it is a theorem of Krull that an integral domain is a valuation ring if and only if it is a local Bézout domain. It also follows from this that a valuation ring is Noetherian if and only if it is a principal ideal domain. In this case, it is either a field or it has exactly one non-zero prime ideal; in the latter case it is called a discrete valuation ring. (By convention, a field is not a discrete valuation ring.)
A value group is called discrete if it is isomorphic to the additive group of the integers, and a valuation ring has a discrete valuation group if and only if it is a discrete valuation ring.
Very rarely, valuation ring may refer to a ring that satisfies the second or third condition but is not necessarily a domain. A more common term for this type of ring is uniserial ring.
Examples
Any field is a valuation ring. For example, the field of rational functions on an algebraic variety .
A simple non-example is the integral domain since the inverse of a generic is .
The field of power series:
has the valuation . The subring is a valuation ring as well.
the localization of the integers at the prime ideal (p), consisting of ratios where the numerator is any integer and the denominator is not divisible by p. The field of fractions is the field of rational numbers
The ring of meromorphic functions on the entire complex plane which have a Maclaurin series (Taylor series expansion at zero) is a valuation ring. The field of fractions are the functions meromorphic on the whole plane. If f does not have a Maclaurin series then 1/f does.
Any ring of p-adic integers for a given prime p is a local ring, with field of fractions the p-adic numbers . The integral closure of the p-adic integers is also a local ring, with field of fractions (the algebraic closure of the p-adic numbers). Both and are valuation rings.
Let k be an ordered field. An element of k is called finite if it lies between two integers n < x < m; otherwise it is called infinite. The set D of finite elements of k is a valuation ring. The set of elements x such that x ∈ D and x−1 ∉ D is the set of infinitesimal elements; and an element x such that x ∉ D and x−1 ∈ D is called infinite.
The ring F of finite elements of a hyperreal field *R (an ordered field containing the real numbers) is a valuation ring of *R. F consists of all hyperreal numbers differing from a standard real by an infinitesimal amount, which is equivalent to saying a hyperreal number x such that −n < x < n for some standard integer n. The residue field, finite hyperreal numbers modulo the ideal of infinitesimal hyperreal numbers, is isomorphic to the real numbers.
A common geometric example comes from algebraic plane curves. Consider the polynomial ring and an irreducible polynomial in that ring. Then the ring is the ring of polynomial functions on the curve . Choose a point such that and it is a regular point on the curve; i.e., the local ring R at the point is a regular local ring of Krull dimension one or a discrete valuation ring.
For example, consider the inclusion . These are all subrings in the field of bounded-below power series .
Dominance and integral closure
The units, or invertible elements, of a valuation ring are the elements x in D such that x −1 is also a member of D. The other elements of D – called nonunits – do not have an inverse in D, and they form an ideal M. This ideal is maximal among the (totally ordered) ideals of D. Since M is a maximal ideal, the quotient ring D/M is a field, called the residue field of D.
In general, we say a local ring dominates a local ring if and ; in other words, the inclusion is a local ring homomorphism. Every local ring in a field K is dominated by some valuation ring of K. Indeed, the set consisting of all subrings R of K containing A and is nonempty and is inductive; thus, has a maximal element by Zorn's lemma. We claim R is a valuation ring. R is a local ring with maximal ideal containing by maximality. Again by maximality it is also integrally closed. Now, if , then, by maximality, and thus we can write:
.
Since is a unit element, this implies that is integral over R; thus is in R. This proves R is a valuation ring. (R dominates A since its maximal ideal contains by construction.)
A local ring R in a field K is a valuation ring if and only if it is a maximal element of the set of all local rings contained in K partially ordered by dominance. This easily follows from the above.
Let A be a subring of a field K and a ring homomorphism into an algebraically closed field k. Then f extends to a ring homomorphism , D some valuation ring of K containing A. (Proof: Let be a maximal extension, which clearly exists by Zorn's lemma. By maximality, R is a local ring with maximal ideal containing the kernel of f. If S is a local ring dominating R, then S is algebraic over R; if not, contains a polynomial ring to which g extends, a contradiction to maximality. It follows is an algebraic field extension of . Thus, extends g; hence, S = R.)
If a subring R of a field K contains a valuation ring D of K, then, by checking Definition 1, R is also a valuation ring of K. In particular, R is local and its maximal ideal contracts to some prime ideal of D, say, . Then since dominates , which is a valuation ring since the ideals are totally ordered. This observation is subsumed to the following: there is a bijective correspondence the set of all subrings of K containing D. In particular, D is integrally closed, and the Krull dimension of D is the number of proper subrings of K containing D.
In fact, the integral closure of an integral domain A in the field of fractions K of A is the intersection of all valuation rings of K containing A. Indeed, the integral closure is contained in the intersection since the valuation rings are integrally closed. Conversely, let x be in K but not integral over A. Since the ideal is not , it is contained in a maximal ideal . Then there is a valuation ring R that dominates the localization of at . Since , .
The dominance is used in algebraic geometry. Let X be an algebraic variety over a field k. Then we say a valuation ring R in has "center x on X" if dominates the local ring of the structure sheaf at x.
Ideals in valuation rings
We may describe the ideals in the valuation ring by means of its value group.
Let Γ be a totally ordered abelian group. A subset Δ of Γ is called a segment if it is nonempty and, for any α in Δ, any element between −α and α is also in Δ (end points included). A subgroup of Γ is called an isolated subgroup if it is a segment and is a proper subgroup.
Let D be a valuation ring with valuation v and value group Γ. For any subset A of D, we let be the complement of the union of and in . If I is a proper ideal, then is a segment of . In fact, the mapping defines an inclusion-reversing bijection between the set of proper ideals of D and the set of segments of . Under this correspondence, the nonzero prime ideals of D correspond bijectively to the isolated subgroups of Γ.
Example: The ring of p-adic integers is a valuation ring with value group . The zero subgroup of corresponds to the unique maximal ideal and the whole group to the zero ideal. The maximal ideal is the only isolated subgroup of .
The set of isolated subgroups is totally ordered by inclusion. The height or rank r(Γ) of Γ is defined to be the cardinality of the set of isolated subgroups of Γ. Since the nonzero prime ideals are totally ordered and they correspond to isolated subgroups of Γ, the height of Γ is equal to the Krull dimension of the valuation ring D associated with Γ.
The most important special case is height one, which is equivalent to Γ being a subgroup of the real numbers under addition (or equivalently, of the positive real numbers under multiplication.) A valuation ring with a valuation of height one has a corresponding absolute value defining an ultrametric place. A special case of this are the discrete valuation rings mentioned earlier.
The rational rank rr(Γ) is defined as the rank of the value group as an abelian group,
Places
General definition
A place of a field K is a ring homomorphism p from a valuation ring D of K to some field such that, for any , . The image of a place is a field called the residue field of p. For example, the canonical map is a place.
Example
Let A be a Dedekind domain and a prime ideal. Then the canonical map is a place.
Specialization of places
We say a place p specializes to a place , denoted by , if the valuation ring of p contains the valuation ring of p. In algebraic geometry, we say a prime ideal specializes to if . The two notions coincide: if and only if a prime ideal corresponding to p specializes to a prime ideal corresponding to in some valuation ring (recall that if are valuation rings of the same field, then D corresponds to a prime ideal of .)
Example
For example, in the function field of some algebraic variety every prime ideal contained in a maximal ideal gives a specialization .
Remarks
It can be shown: if , then for some place q of the residue field of p. (Observe is a valuation ring of and let q be the corresponding place; the rest is mechanical.) If D is a valuation ring of p, then its Krull dimension is the cardinarity of the specializations other than p to p. Thus, for any place p with valuation ring D of a field K over a field k, we have:
.
If p is a place and A is a subring of the valuation ring of p, then is called the center of p in A.
Places at infinity
For the function field on an affine variety there are valuations which are not associated to any of the primes of . These valuations are called the places at infinity. For example, the affine line has function field . The place associated to the localization of
at the maximal ideal
is a place at infinity.
Notes
Citations
Sources
Commutative algebra
Field (mathematics)
Localization (mathematics)
Ring theory | Valuation ring | [
"Mathematics"
] | 2,814 | [
"Fields of abstract algebra",
"Commutative algebra",
"Ring theory"
] |
966,859 | https://en.wikipedia.org/wiki/Total%20Ozone%20Mapping%20Spectrometer | The Total Ozone Mapping Spectrometer (TOMS) was a NASA satellite instrument, specifically a spectrometer, for measuring the ozone layer. Of the five TOMS instruments which were built, four entered successful orbit. The satellites carrying TOMS instruments were:
Nimbus 7; launched October 24, 1978. Operated until 1 August 1994. Carried TOMS instrument number 1.
Meteor-3-5; launched 15 August 1991. Operated until December 1994. Was the first and last Soviet satellite to carry a USA made instrument. Carried TOMS instrument number 2.
ADEOS I; launched 17 August 1996. Operated until 30 June 1997. Mission was cut short by a spacecraft failure.
TOMS-Earth Probe; launched on July 2, 1996. Operated until 2 December 2006. Carried TOMS instrument number 3.
QuikTOMS; launched 21 September 2001. Suffered launch failure and did not enter orbit.
Nimbus 7 and Meteor-3-5 provided global measurements of total column ozone on a daily basis and together provided a complete data set of daily ozone from November 1978 to December 1994. After an eighteen-month period when the program had no on-orbit capability, TOMS-Earth Probe launched on 2 July 1996, followed by . ADEOS I was launched on August 17, 1996, and the TOMS-instrument onboard provided data until the satellite which housed it lost power on June 30, 1997.
TOMS-Earth Probe (Total Ozone Mapping Spectrometer - Earth Probe, TOMS-EP, originally just TOMS, COSPAR 1996-037A) was launched on July 2, 1996, from Vandenberg AFB by a Pegasus XL rocket. The satellite project was originally known as TOMS, back in 1989 when it was selected as a SMEX mission in the Explorer program. However, it found no funding as an Explorer mission and transferred to NASA's Earth Probe program, getting funding and becoming TOMS-EP. The small, 295 kg satellite was built for NASA by TRW; the single instrument was the TOMS 3 spectrometer. The satellite had a two-year planned life. TOMS-EP suffered a two-year delay to its launch due to launch failures of the first two Pegasus XL rockets. The launch delays led to alternations in the mission; the satellite was placed in a lower than originally planned orbit to achieve higher resolution and to enable more thorough study of UV-absorbing aerosols in the troposphere. The lower orbit was meant to complement measurements from ADEOS I enabling TOMS-EP to provide supplemental measurements. After ADEOS I failed in orbit, TOMS-EP was boosted to a higher orbit to replace ADEOS I. The transmitter for TOMS-Earth Probe failed on December 2, 2006.
The only total failure in the series was QuikTOMS, which was launched on September 21, 2001, on a Taurus rocket from Vandenberg AFB, but did not achieve orbit.
Since January 1, 2006, data from the Aura Ozone Monitoring Instrument (OMI) has replaced data from TOMS-Earth Probe. The Ozone Mapping and Profiler Suite on Suomi NPP and NOAA-20 have further continued the data record.
Gallery
References
External links
TOMS home page
TOMS Volcanic Emissions Group
Further reading
Scientific instruments
Satellite meteorology
Spacecraft instruments
Spectrometers
Ozone depletion
Earth observation satellite sensors | Total Ozone Mapping Spectrometer | [
"Physics",
"Chemistry",
"Technology",
"Engineering"
] | 690 | [
"Spectrum (physical sciences)",
"Scientific instruments",
"Measuring instruments",
"Spectrometers",
"Spectroscopy"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.