source
stringlengths 31
227
| text
stringlengths 9
2k
|
---|---|
https://en.wikipedia.org/wiki/Madagascar%20Biodiversity%20Center
|
The Madagascar Biodiversity Center or Bibikely Biodiversity Center is Madagascar's first and only biodiversity research center, and is a joint project of the Bibikely Biodiversity Institute, and the California Academy of Sciences, in cooperation with the Malagasy government.
Introduction
The Bibikely Biodiversity Institute is an NGO founded and presently directed by Dr. Brian Fisher, preeminent field biologist, and the curator and chairman of the entomology department of the California Academy of Sciences.
The center began operations in rented facilities in 1996 and moved into its permanent facility in late 2004, which is leased at no cost from the Malagasy government until 2055.
Located within the Botanical and Zoological Garden of Tsimbazaza in Madagascar's capital city, Antananarivo, the new facility is adjacent to the Malagasy Academy of Sciences, the Academy Library, and the Academy Herbarium.
Goals
Conservation
The center was conceived in 2001 as a means to provide a safe and permanent home for the Bibikely Biodiversity Institute to continue its work of cataloging and understanding the rich biological endowment that is Madagascar's biodiversity.
Center's research will help to identify and protect more than three times the currently protected land in Madagascar.
Understanding
The center will enable the Bibikely Biodiversity Institute to expand its work in understanding the ecosystems of Madagascar, particularly as they relate to arthropods.
Education
The center will provide the facilities required to train a larger number of students, particularly those from Madagascar itself, in the science and practice of systematics, ecology, conservation and entomology.
Collection
The center will also provide space to house the Malagasy government's National Arthropod Collection, a repository of thousands of specimens of arthropods collected on Madagascar. The collection makes possible a large part of the needed research on arthropods of Madagascar.
See also
Ca
|
https://en.wikipedia.org/wiki/5-lipoxygenase-activating%20protein
|
Arachidonate 5-lipoxygenase-activating protein also known as 5-lipoxygenase activating protein, or FLAP, is a protein that in humans is encoded by the ALOX5AP gene.
Function
FLAP is necessary for the activation of 5-lipoxygenase and therefore for the production of leukotrienes, 5-hydroxyeicosatetraenoic acid, 5-oxo-eicosatetraenoic acid, and specialized pro-resolving mediators of the lipoxin and resolvin classes. It is an integral protein within the nuclear membrane. FLAP is necessary in synthesis of leukotriene, which are lipid mediators of inflammation that is involved in respiratory and cardiovascular diseases. FLAP functions as a membrane anchor for 5-lipooxygenase and as an amine acid-bind protein. How FLAP activates 5-lipooxygenase is not completely understood, but there is a physical interaction between the two. FLAP structure consists of 4 transmembrane alpha helices, but they are found in trimer forming a barrel. The barrel is about 60 Å high and 36 Å wide.
Clinical significance
Leukotrienes, which require the FLAP protein to be synthesized, have an established pathological role in allergic and respiratory diseases. Animal and human genetic evidence suggests they may also have an important role in atherosclerosis, myocardial infarction, and stroke. The structure of FLAP provides a tool for the development of novel therapies for respiratory and cardiovascular diseases and for the design of focused experiments to probe the cell biology of FLAP and its role in leukotriene biosynthesis.
Inhibitors
AM-679
MK-886
Veliflapon (BAY X1005)
|
https://en.wikipedia.org/wiki/Burning%20Ship%20fractal
|
The Burning Ship fractal, first described and created by Michael Michelitsch and Otto E. Rössler in 1992, is generated by iterating the function:
in the complex plane which will either escape or remain bounded. The difference between this calculation and that for the Mandelbrot set is that the real and imaginary components are set to their respective absolute values before squaring at each iteration. The mapping is non-analytic because its real and imaginary parts do not obey the Cauchy–Riemann equations.
Implementation
The below pseudocode implementation hardcodes the complex operations for Z. Consider implementing complex number operations to allow for more dynamic and reusable code. Note that the typical images of the Burning Ship fractal display the ship upright: the actual fractal, and that produced by the below pseudocode, is inverted along the x-axis.
for each pixel (x, y) on the screen, do:
x := scaled x coordinate of pixel (scaled to lie in the Mandelbrot X scale (-2.5, 1))
y := scaled y coordinate of pixel (scaled to lie in the Mandelbrot Y scale (-1, 1))
zx := x // zx represents the real part of z
zy := y // zy represents the imaginary part of z
iteration := 0
max_iteration := 100
while (zx*zx + zy*zy < 4 and iteration < max_iteration) do
xtemp := zx*zx - zy*zy + x
zy := abs(2*zx*zy) + y // abs returns the absolute value
zx := xtemp
iteration := iteration + 1
if iteration = max_iteration then // Belongs to the set
return insideColor
return (max_iteration / iteration) × color
|
https://en.wikipedia.org/wiki/Methylation%20specific%20oligonucleotide%20microarray
|
Methylation specific oligonucleotide microarray, also known as MSO microarray, was developed as a technique to map epigenetic methylation changes in DNA of cancer cells.
The general process starts with modification of DNA with bisulfite, specifically to convert unmethylated cytosine in CpG sites to uracil, while leaving methylated cytosines untouched. The modified DNA region of interest is amplified via PCR and during the process, uracils are converted to thymine. The amplicons are labelled with a fluorescent dye and hybridized to oligonucleotide probes that are fixed to a glass slide. The probes differentially bind to cytosine and thymine residues, which ultimately allows discrimination between methylated and unmethylated CpG sites, respectively.
A calibration curve is produced and compared with the microarray results of the amplified DNA samples. This allows a general quantification of the proportion of methylation present in the region of interest.
This microarray technique was developed by Tim Hui-Ming Huang and his laboratory and was officially published in 2002.
Implications for cancer research
Cancer cells often develop atypical methylation patterns, at CpG sites in promoters of tumour suppressor genes. High levels of methylation at a promoter leads to downregulation of the corresponding genes and is characteristic of carcinogenesis. It is one of the most consistent changes observed in early stage tumour cells. Methylation specific oligonucleotide microarray allows for the high resolution and high throughput detection of numerous methylation events on multiple gene promoters. Therefore, this technique can be used to detect aberrant methylation in tumour suppressor promoters at an early stage and has been used in gastric and colon cancers and multiple others. Because it allows one to detect presence of atypical methylations in cancer cells, it can also be used to reveal the major cause behind the malignancy, whether its main contributor is mutations on c
|
https://en.wikipedia.org/wiki/Ovoid%20%28projective%20geometry%29
|
In projective geometry an ovoid is a sphere like pointset (surface) in a projective space of dimension . Simple examples in a real projective space are hyperspheres (quadrics). The essential geometric properties of an ovoid are:
Any line intersects in at most 2 points,
The tangents at a point cover a hyperplane (and nothing more), and
contains no lines.
Property 2) excludes degenerated cases (cones,...). Property 3) excludes ruled surfaces (hyperboloids of one sheet, ...).
An ovoid is the spatial analog of an oval in a projective plane.
An ovoid is a special type of a quadratic set.
Ovoids play an essential role in constructing examples of Möbius planes and higher dimensional Möbius geometries.
Definition of an ovoid
In a projective space of dimension a set of points is called an ovoid, if
(1) Any line meets in at most 2 points.
In the case of , the line is called a passing (or exterior) line, if the line is a tangent line, and if the line is a secant line.
(2) At any point the tangent lines through cover a hyperplane, the tangent hyperplane, (i.e., a projective subspace of dimension ).
(3) contains no lines.
From the viewpoint of the hyperplane sections, an ovoid is a rather homogeneous object, because
For an ovoid and a hyperplane , which contains at least two points of , the subset is an ovoid (or an oval, if ) within the hyperplane .
For finite projective spaces of dimension (i.e., the point set is finite, the space is pappian), the following result is true:
If is an ovoid in a finite projective space of dimension , then .
(In the finite case, ovoids exist only in 3-dimensional spaces.)
In a finite projective space of order (i.e. any line contains exactly points) and dimension any pointset is an ovoid if and only if and no three points are collinear (on a common line).
Replacing the word projective in the definition of an ovoid by affine, gives the definition of an affine ovoid.
If for an (projective) ovoid there is a su
|
https://en.wikipedia.org/wiki/2-valued%20morphism
|
In mathematics, a 2-valued morphism is a homomorphism that sends a Boolean algebra B onto the two-element Boolean algebra 2 = {0,1}. It is essentially the same thing as an ultrafilter on B, and, in a different way, also the same things as a maximal ideal of B. 2-valued morphisms have also been proposed as a tool for unifying the language of physics.
2-valued morphisms, ultrafilters and maximal ideals
Suppose B is a Boolean algebra.
If s : B → 2 is a 2-valued morphism, then the set of elements of B that are sent to 1 is an ultrafilter on B, and the set of elements of B that are sent to 0 is a maximal ideal of B.
If U is an ultrafilter on B, then the complement of U is a maximal ideal of B, and there is exactly one 2-valued morphism s : B → 2 that sends the ultrafilter to 1 and the maximal ideal to 0.
If M is a maximal ideal of B, then the complement of M is an ultrafilter on B, and there is exactly one 2-valued morphism s : B → 2 that sends the ultrafilter to 1 and the maximal ideal to 0.
Physics
If the elements of B are viewed as "propositions about some object", then a 2-valued morphism on B can be interpreted as representing a particular "state of that object", namely the one where the propositions of B which are mapped to 1 are true, and the propositions mapped to 0 are false. Since the morphism conserves the Boolean operators (negation, conjunction, etc.), the set of true propositions will not be inconsistent but will correspond to a particular maximal conjunction of propositions, denoting the (atomic) state. (The true propositions form an ultrafilter, the false propositions form a maximal ideal, as mentioned above.)
The transition between two states s1 and s2 of B, represented by 2-valued morphisms, can then be represented by an automorphism f from B to B, such that s2 o f = s1.
The possible states of different objects defined in this way can be conceived as representing potential events. The set of events can then be structured in the same way as i
|
https://en.wikipedia.org/wiki/Kartlis%20Deda
|
Kartlis Deda (; Mother of Kartvel or Mother of Georgian) is a monument in Georgia's capital Tbilisi.
The statue was erected on the top of Sololaki hill in 1958, the year Tbilisi celebrated its 1500th anniversary. Prominent Georgian sculptor Elguja Amashukeli designed the twenty-metre aluminium figure of a woman in Georgian national dress.
Symbolism
She symbolizes the Georgian national character: in her left hand she holds a bowl of wine to greet those who come as friends, and in her right hand is a sword for those who come as enemies.
History
In 1966 Elguja Amashukeli was awarded the Shota Rustaveli State Prize for this sculpture. He called the statue "Capital", and it commonly became known as "Mother of Kartvel". The accessories of the sculpture, the cup with wine and sword, are an expression of the history of our city, Tbilisi, the endless battles with the enemies and the welcoming of friendly guests.
The original statue erected on Sololaki Hill in 1958 was a wooden allegorical statue that would temporarily decorate the capital. Later it was decided to become permanent and the wood texture was covered with aluminum in 1963 to limit environmental damage. In 1997, the old statue was replaced with a new one.
Gallery
See also
List of tallest statues
Mother Armenia
Mother Ukraine
|
https://en.wikipedia.org/wiki/Perinatal%20mortality
|
Perinatal mortality (PNM) is the death of a fetus or neonate and is the basis to calculate the perinatal mortality rate. Perinatal means "relating to the period starting a few weeks before birth and including the birth and a few weeks after birth."
Variations in the precise definition of the perinatal mortality exist, specifically concerning the issue of inclusion or exclusion of early fetal and late neonatal fatalities. The World Health Organization defines perinatal mortality as the "number of stillbirths and deaths in the first week of life per 1,000 total births, the perinatal period commences at 22 completed weeks (154 days) of gestation, and ends seven completed days after birth", but other definitions have been used.
The UK figure is about 8 per 1,000 and varies markedly by social class with the highest rates seen in Asian women. Globally, an estimated 2.6 million neonates died in 2013 before the first month of age down from 4.5 million in 1990.
Causes
Preterm birth is the most common cause of perinatal mortality, causing almost 30 percent of neonatal deaths. Infant respiratory distress syndrome, in turn, is the leading cause of death in preterm infants, affecting about 1% of newborn infants. Birth defects cause about 21 percent of neonatal death.
Fetal mortality
Fetal mortality refers to stillbirths or fetal death. It encompasses any death of a fetus after 20 weeks of gestation or 500 gm. In some definitions of the PNM early fetal mortality (week 20–27 gestation) is not included, and the PNM may only include late fetal death and neonatal death. Fetal death can also be divided into death prior to labor, antenatal (antepartum) death, and death during labor, intranatal (intrapartum) death.
Neonatal mortality
Neonatal mortality refers to death of a live-born baby within the first 28 days of life. Early neonatal mortality refers to the death of a live-born baby within the first seven days of life, while late neonatal mortality refers to death after 7 days u
|
https://en.wikipedia.org/wiki/Lebedev%20quadrature
|
In numerical analysis, Lebedev quadrature, named after Vyacheslav Ivanovich Lebedev, is an approximation to the surface integral of a function over a three-dimensional sphere. The grid is constructed so to have octahedral rotation and inversion symmetry. The number and location of the grid points together with a corresponding set of integration weights are determined by enforcing the exact integration of polynomials (or equivalently, spherical harmonics) up to a given order, leading to a sequence of increasingly dense grids analogous to the one-dimensional Gauss-Legendre scheme.
The Lebedev grid is often employed in the numerical evaluation of volume integrals in the spherical coordinate system, where it is combined with a one-dimensional integration scheme for the radial coordinate. Applications of the grid are found in fields such as computational chemistry and neutron transport.
Angular integrals
The surface integral of a function over the unit sphere,
is approximated in the Lebedev scheme as
where the particular grid points and grid weights are to be determined. The use of a single sum, rather than two one dimensional schemes from discretizing the θ and φ integrals individually, leads to more efficient procedure: fewer total grid points are required to obtain similar accuracy. A competing factor is the computational speedup available when using the direct product of two one-dimensional grids. Despite this, the Lebedev grid still outperforms product grids. However, the use of two one-dimensional integration better allows for fine tuning of the grids, and simplifies the use of any symmetry of the integrand to remove symmetry equivalent grid points.
Construction
The Lebedev grid points are constructed so as to lie on the surface of the three-dimensional unit sphere and to be invariant under the octahedral rotation group with inversion. For any point on the sphere, there are either five, seven, eleven, twenty-three, or forty-seven equivalent points with resp
|
https://en.wikipedia.org/wiki/Julius%20Wess
|
Julius Erich Wess (5 December 19348 August 2007) was an Austrian theoretical physicist noted as the co-inventor of the Wess–Zumino model and Wess–Zumino–Witten model in the field of supersymmetry and conformal field theory. He was also a recipient of the Max Planck medal, the Wigner medal, the Gottfried Wilhelm Leibniz Prize, the Heineman Prize, and of several honorary doctorates.
Life and work
Wess was born in Oberwölz Stadt, a small town in the Austrian state of Styria. He received his Ph.D. in Vienna, where he was a student of Hans Thirring. His Ph.D. examiner was acclaimed quantum mechanics physicist Erwin Schrödinger. After working at CERN in Switzerland and at the Courant Institute of New York University, United States, he became a professor at the University of Karlsruhe. In later life, Wess was professor at the Ludwig Maximilian University of Munich. After his retirement he worked at DESY in Hamburg.
His doctoral students include Hermann Nicolai.
Julius Wess died at the age of 72 in Hamburg, following a stroke.
Publications
Scientific articles authored by Julius Wess recorded in INSPIRE-HEP.
|
https://en.wikipedia.org/wiki/ATI%20Avivo
|
ATI Avivo is a set of hardware and low level software features present on the ATI Radeon R520 family of GPUs and all later ATI Radeon products. ATI Avivo was designed to offload video decoding, encoding, and post-processing from a computer's CPU to a compatible GPU. ATI Avivo compatible GPUs have lower CPU usage when a player and decoder software that support ATI Avivo is used. ATI Avivo has been long superseded by Unified Video Decoder (UVD) and Video Coding Engine (VCE).
Background
The GPU wars between ATI and NVIDIA have resulted in GPUs with ever-increasing processing power since early 2000s. To parallel this increase in speed and power, both GPU makers needed to increase video quality as well, in 3D graphics applications the focus in increasing quality has mainly fallen on anti-aliasing and anisotropic filtering. However it has dawned upon both companies that video quality on the PC would need improvement as well and the current APIs provided by both companies have not seen many improvements over a few generations of GPUs. Therefore, ATI decided to revamp its GPU's video processing capability with ATI Avivo, in order to compete with NVIDIA PureVideo API.
In the time of release of the latest generation Radeon HD series, the successor, the ATI Avivo HD was announced, and was presented on every Radeon HD 2600 and 2400 video cards to be available July, 2007 after NVIDIA announced similar hardware acceleration solution, PureVideo HD.
In 2011 Avivo is renamed to AMD Media Codec Package, an optional component of the AMD Catalyst software. The last version is released in August 2012. As of 2013, the package is no longer offered by AMD.
Features
ATI Avivo
During capturing, ATI Avivo amplifies the source, automatically adjust its brightness and contrast. ATI Avivo implements 12-bit transform to reduce data loss during conversion; it also utilizes motion adaptive 3D comb filter, automatic color control, automatic gain control, hardware noise reduction and edge enhan
|
https://en.wikipedia.org/wiki/Method%20of%20matched%20asymptotic%20expansions
|
In mathematics, the method of matched asymptotic expansions is a common approach to finding an accurate approximation to the solution to an equation, or system of equations. It is particularly used when solving singularly perturbed differential equations. It involves finding several different approximate solutions, each of which is valid (i.e. accurate) for part of the range of the independent variable, and then combining these different solutions together to give a single approximate solution that is valid for the whole range of values of the independent variable. In the Russian literature, these methods were known under the name of "intermediate asymptotics" and were introduced in the work of Yakov Zeldovich and Grigory Barenblatt.
Method overview
In a large class of singularly perturbed problems, the domain may be divided into two or more subdomains. In one of these, often the largest, the solution is accurately approximated by an asymptotic series found by treating the problem as a regular perturbation (i.e. by setting a relatively small parameter to zero). The other subdomains consist of one or more small areas in which that approximation is inaccurate, generally because the perturbation terms in the problem are not negligible there. These areas are referred to as transition layers, and as boundary or interior layers depending on whether they occur at the domain boundary (as is the usual case in applications) or inside the domain.
An approximation in the form of an asymptotic series is obtained in the transition layer(s) by treating that part of the domain as a separate perturbation problem. This approximation is called the "inner solution," and the other is the "outer solution," named for their relationship to the transition layer(s). The outer and inner solutions are then combined through a process called "matching" in such a way that an approximate solution for the whole domain is obtained.
A simple example
Consider the boundary value problem
where is a
|
https://en.wikipedia.org/wiki/Key%20stretching
|
In cryptography, key stretching techniques are used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources (time and possibly space) it takes to test each possible key. Passwords or passphrases created by humans are often short or predictable enough to allow password cracking, and key stretching is intended to make such attacks more difficult by complicating a basic step of trying a single password candidate. Key stretching also improves security in some real-world applications where the key length has been constrained, by mimicking a longer key length from the perspective of a brute-force attacker.
There are several ways to perform key stretching. One way is to apply a cryptographic hash function or a block cipher repeatedly in a loop. For example, in applications where the key is used for a cipher, the key schedule in the cipher may be modified so that it takes a specific length of time to perform. Another way is to use cryptographic hash functions that have large memory requirements – these can be effective in frustrating attacks by memory-bound adversaries.
Process
Key stretching algorithms depend on an algorithm which receives an input key and then expends considerable effort to generate a stretched cipher (called an enhanced key) mimicking randomness and longer key length. The algorithm must have no known shortcut, so the most efficient way to relate the input and cipher is to repeat the key stretching algorithm itself. This compels brute-force attackers to expend the same effort for each attempt. If this added effort compares to a brute-force key search of all keys with a certain key length, then the input key may be described as stretched by that same length.
Key stretching leaves an attacker with two options:
Attempt possible combinations of the enhanced key, but this is infeasible if the enhanced key is sufficiently long and unpredictable ( i.e.,the algorithm mimics
|
https://en.wikipedia.org/wiki/Message%20Signaled%20Interrupts
|
Message Signaled Interrupts (MSI) are a method of signaling interrupts, using special in-band messages to replace traditional out-of-band signals on dedicated interrupt lines. While message signaled interrupts are more complex to implement in a device, they have some significant advantages over pin-based out-of-band interrupt signalling, such as improved interrupt handling performance. This is in contrast to traditional interrupt mechanisms, such as the legacy interrupt request (IRQ) system.
Message signaled interrupts are supported in PCI bus since its version 2.2, and in later available PCI Express bus. Some non-PCI architectures also use message signaled interrupts.
Overview
Traditionally, a device has an interrupt line (pin) which it asserts when it wants to signal an interrupt to the host processing environment. This traditional form of interrupt signalling is an out-of-band form of control signalling since it uses a dedicated path to send such control information, separately from the main data path. MSI replaces those dedicated interrupt lines with in-band signalling, by exchanging special messages that indicate interrupts through the main data path. In particular, MSI allows the device to write a small amount of interrupt-describing data to a special memory-mapped I/O address, and the chipset then delivers the corresponding interrupt to a processor.
A common misconception with MSI is that it allows the device to send data to a processor as part of the interrupt. The data that is sent as part of the memory write transaction is used by the chipset to determine which interrupt to trigger on which processor; that data is not available for the device to communicate additional information to the interrupt handler.
As an example, PCI Express does not have separate interrupt pins at all; instead, it uses special in-band messages to allow pin assertion or deassertion to be emulated. Some non-PCI architectures also use MSI; as another example, HP GSC devices do no
|
https://en.wikipedia.org/wiki/Parable%20of%20the%20Workers%20in%20the%20Vineyard
|
The Parable of the Workers in the Vineyard (also called the Parable of the Laborers in the Vineyard or the Parable of the Generous Employer) is a parable of Jesus which appears in chapter 20 of the Gospel of Matthew in the New Testament. It is not included in the other canonical gospels. It has been described as a difficult parable to interpret.
Text
Interpretations
The parable has often been interpreted to mean that even those who are converted late in life earn equal rewards along with those converted early, and also that people who convert early in life need not feel jealous of those later converts. An alternative interpretation identifies the early laborers as Jews, some of whom resent the late-comers (Gentiles) being welcomed as equals in God's Kingdom. Both of these interpretations are discussed in Matthew Henry's 1706 Commentary on the Bible.
An alternative interpretation is that all Christians can be identified with the eleventh-hour workers. Arland J. Hultgren writes: "While interpreting and applying this parable, the question inevitably arises: Who are the eleventh-hour workers in our day? We might want to name them, such as deathbed converts or persons who are typically despised by those who are longtime veterans and more fervent in their religious commitment. But it is best not to narrow the field too quickly. At a deeper level, we are all the eleventh-hour workers; to change the metaphor, we are all honored guests of God in the kingdom. It is not really necessary to decide who the eleventh-hour workers are. The point of the parable—both at the level of Jesus and the level of Matthew's Gospel—is that God saves by grace, not by our worthiness. That applies to all of us."
Some commentators have used the parable to justify the principle of a "living wage", though generally conceding that this is not the main point of the parable. An example is John Ruskin in the 19th century, who quoted the parable in the title of his book Unto This Last. Ruskin did
|
https://en.wikipedia.org/wiki/Balsam%20of%20Peru
|
Balsam of Peru or Peru balsam, also known and marketed by many other names, is a balsam derived from a tree known as Myroxylon balsamum var. pereirae; it is found in El Salvador, where it is an endemic species.
Balsam of Peru is used in food and drink for flavoring, in perfumes and toiletries for fragrance, and in medicine and pharmaceutical items for healing properties. It has a sweet scent. In some instances, balsam of Peru is listed on the ingredient label of a product by one of its various names, but it may not be required to be listed by its name by mandatory labeling conventions.
It can cause allergic reactions, with numerous large surveys identifying it as being in the "top five" allergens most commonly causing patch test reactions. It may cause inflammation, redness, swelling, soreness, itching, and blisters, including allergic contact dermatitis, stomatitis (inflammation and soreness of the mouth or tongue), cheilitis (inflammation, rash, or painful erosion of the lips, oropharyngeal mucosa, or angles of the mouth), pruritus, hand eczema, generalized or resistant plantar dermatitis, rhinitis, and conjunctivitis.
Harvesting and processing
Balsam of Peru is obtained by using rags to soak up the resin after strips of bark are removed from the trunk of Myroxylon balsamum var. pereirae, boiling the rags and letting the balsam sink in water. The balsam is an aromatic dark-brown oily fluid.
Composition
Balsam of Peru contains 25 or so different substances, including cinnamein, cinnamic acid, cinnamyl cinnamate, benzyl benzoate, benzoic acid, and vanillin. It also contains cinnamyl alcohol, cinnamaldehyde, farnesol, and nerolidol. A minority of it, approximately 30–40%, contains resins or esters of unknown composition.
Uses
Balsam of Peru is used in food and drink for flavoring, in perfumes and toiletries for fragrance, and in medicine and pharmaceutical items for healing properties.
In some cases, it is listed on the ingredient label of a product by one
|
https://en.wikipedia.org/wiki/Rydberg%20state
|
The Rydberg states of an atom or molecule are electronically excited states with energies that follow the Rydberg formula as they converge on an ionic state with an ionization energy. Although the Rydberg formula was developed to describe atomic energy levels, it has been used to describe many other systems that have electronic structure roughly similar to atomic hydrogen. In general, at sufficiently high principal quantum numbers, an excited electron-ionic core system will have the general character of a hydrogenic system and the energy levels will follow the Rydberg formula. Rydberg states have energies converging on the energy of the ion. The ionization energy threshold is the energy required to completely liberate an electron from the ionic core of an atom or molecule. In practice, a Rydberg wave packet is created by a laser pulse on a hydrogenic atom and thus populates a superposition of Rydberg states. Modern investigations using pump-probe experiments show molecular pathways – e.g. dissociation of (NO)2 – via these special states.
Rydberg series
Rydberg series describe the energy levels associated with partially removing an electron from the ionic core. Each Rydberg series converges on an ionization energy threshold associated with a particular ionic core configuration. These quantized Rydberg energy levels can be associated with the quasiclassical Bohr atomic picture. The closer you get to the ionization threshold energy, the higher the principal quantum number, and the smaller the energy difference between "near threshold Rydberg states." As the electron is promoted to higher energy levels, the spatial excursion of the electron from the ionic core increases and the system is more like the Bohr quasiclassical picture.
Energy of Rydberg states
The energy of Rydberg states can be refined by including a correction called the quantum defect in the Rydberg formula. The "quantum defect" correction is associated with the presence of a distributed ionic core. Eve
|
https://en.wikipedia.org/wiki/Resonance-enhanced%20multiphoton%20ionization
|
Resonance-enhanced multiphoton ionization (REMPI) is a technique applied to the spectroscopy of atoms and small molecules. In practice, a tunable laser can be used to access an excited intermediate state. The selection rules associated with a two-photon or other multiphoton photoabsorption are different from the selection rules for a single photon transition. The REMPI technique typically involves a resonant single or multiple photon absorption to an electronically excited intermediate state followed by another photon which ionizes the atom or molecule. The light intensity to achieve a typical multiphoton transition is generally significantly larger than the light intensity to achieve a single photon photoabsorption. Because of this, subsequent photoabsorption is often very likely. An ion and a free electron will result if the photons have imparted enough energy to exceed the ionization threshold energy of the system. In many cases, REMPI provides spectroscopic information that can be unavailable to single photon spectroscopic methods, for example rotational structure in molecules is easily seen with this technique.
REMPI is usually generated by a focused frequency tunable laser beam to form a small-volume plasma. In REMPI, first m photons are simultaneously absorbed by an atom or molecule in the sample to bring it to an excited state. Other n photons are absorbed afterwards to generate an electron and ion pair. The so-called m+n REMPI is a nonlinear optical process, which can only occur within the focus of the laser beam. A small-volume plasma is formed near the laser focal region. If the energy of m photons does not match any state, an off-resonant transition can occur with an energy defect ΔE, however, the electron is very unlikely to remain in that state. For large detuning, it resides there only during the time Δt. The uncertainty principle is satisfied for Δt, where ћ=h/2π and h is the Planck constant (6.6261×10^-34 J∙s). Such transition and states ar
|
https://en.wikipedia.org/wiki/Cardinal%20point%20%28optics%29
|
In Gaussian optics, the cardinal points consist of three pairs of points located on the optical axis of a rotationally symmetric, focal, optical system. These are the focal points, the principal points, and the nodal points; there are two of each. For ideal systems, the basic imaging properties such as image size, location, and orientation are completely determined by the locations of the cardinal points; in fact, only four points are necessary: the two focal points and either the principal points or the nodal points. The only ideal system that has been achieved in practice is a plane mirror, however the cardinal points are widely used to approximate the behavior of real optical systems. Cardinal points provide a way to analytically simplify an optical system with many components, allowing the imaging characteristics of the system to be approximately determined with simple calculations.
Explanation
The cardinal points lie on the optical axis of an optical system. Each point is defined by the effect the optical system has on rays that pass through that point, in the paraxial approximation. The paraxial approximation assumes that rays travel at shallow angles with respect to the optical axis, so that , , and . Aperture effects are ignored: rays that do not pass through the aperture stop of the system are not considered in the discussion below.
Focal points and planes
The front focal point of an optical system, by definition, has the property that any ray that passes through it will emerge from the system parallel to the optical axis. The rear (or back) focal point of the system has the reverse property: rays that enter the system parallel to the optical axis are focused such that they pass through the rear focal point.
The front and rear (or back) focal planes are defined as the planes, perpendicular to the optic axis, which pass through the front and rear focal points. An object infinitely far from the optical system forms an image at the rear focal plane. For a
|
https://en.wikipedia.org/wiki/Sand%20bath
|
A sand bath is a common piece of laboratory equipment made from a container filled with heated sand. It is used to evenly heat another container, most often during a chemical reaction.
A sand bath is most commonly used in conjunction with a hot plate or heating mantle. A beaker is filled with sand or metal pellets (called shot) and is placed on the plate or mantle. The reaction vessel is then partially covered by sand or pellets. The sand or shot then conducts the heat from the plate to all sides of the reaction vessel.
This technique allows a reaction vessel to be heated throughout with minimal stirring, as opposed to heating the bottom of the vessel and waiting for convection to heat the remainder, cutting down on both the duration of the reaction and the possibility of side reactions that may occur at higher temperatures.
A variation on this theme is the water bath in which the sand is replaced with water. It can be used to keep a reaction vessel at the temperature of boiling water until all water is evaporated (see Standard enthalpy change of vaporization).
Sand baths are one of the oldest known pieces of laboratory equipment, having been used by the alchemists. In Arabic alchemy, a sand bath was known as a qadr. In Latin alchemy, a sand bath was called balneum siccum, balneum cineritium, or balneum arenosum.
See also
Heat bath
Water bath
Oil bath
Notes
|
https://en.wikipedia.org/wiki/Bookmark%20manager
|
A bookmark manager is any software program or feature designed to store, organize, and display web bookmarks. The bookmarks feature included in each major web browser is a rudimentary bookmark manager. More capable bookmark managers are available online as web apps, mobile apps, or browser extensions, and may display bookmarks as text links or graphical tiles (often depicting icons). Social bookmarking websites are bookmark managers. Start page browser extensions, new tab page browser extensions, and some browser start pages, also have bookmark presentation and organization features, which are typically tile-based. Some more general programs, such as certain note taking apps, have bookmark management functionality built-in.
See also
Bookmark destinations
Deep links
Home pages
Types of bookmark management
Enterprise bookmarking
Comparison of enterprise bookmarking platforms
Social bookmarking
List of social bookmarking websites
Other weblink-based systems
Search engine
Comparison of search engines with social bookmarking systems
Search engine results page
Web directory
Lists of websites
|
https://en.wikipedia.org/wiki/List%20of%20flag%20names
|
This is an incomplete list of the names and nicknames of flags, organized in alphabetical order by flag name. Very few flags have any truly official names, but some unofficial names are so widely used that they are accepted as a flag's universal name.
A
("The Gold and Green"), Brazil
("The red"), Greenland
("Support flag"), Qatar
("My country's flag"), Kuwait
("Colourful flag"), Iraqi Kurdistan
("Red Flag"), Turkey
("Holy Red Standard"), Turkey
("Crescent Star"), Turkey
or La Celeste y Blanca ("The white and light blue one"), Argentina
("The Two Stars"), Syria
B
("Gold and green flag"), Brazil
("Flag of the quinas", the five blue shields of the Portuguese arms), Portugal
("Green-Red Flag"), Portugal
("Flag of Saint David"), Wales (unofficial flag)
("St. Piran's flag"), Cornwall
, California
("Red-White Flag"), Indonesia
, United States
("The Saffron Banner"), Flag of the Hindus and former flag of the Maratha Empire
("White-Red"), Poland
("White-Red-White"), former flag of Belarus
, Austria
, Jamaica
, Confederate States
("Flag of the Star and the Crescent"), Libya
Bonnie Blue Flag, official flag of the now-defunct Republic of West Florida, also used in some places as an unofficial banner of the Confederate States.
("Bosnian lily"), former flag of Bosnia and Herzegovina
("Saltire"), Scotland
, Barbados
("Federal Flag"), Germany, official designation
/Balgarski Trikolyor ("Bulgarian Three Colors"), Bulgaria
C
("The light blue one"), Uruguay
, Australia
("St. Andrew's Cross"), Scotland
("Red Flag and Yellow Star"), Vietnam
("Flag of Fatherland"), Vietnam
("Occitan cross"), Occitania
, European Union and the Council of Europe
, Jamaica
D
("Danish cloth"), Denmark
("My Nation/Land"), Kuwait
E
("Our flag"), Greenland
("The Lone Star"), Chile,
("The Lone Star"), Cuba
("Blue-Starred Flag"), Catalan separatism
, Australia
F
, Jain flag
("Fleur-de-lis-y"), Quebec, Canada
G
("Light blu
|
https://en.wikipedia.org/wiki/Eddie%20Kidd%20Jump%20Challenge
|
Eddie Kidd Jump Challenge is a stunt bike video game released for the Acorn Electron, BBC Micro, Commodore 64, MSX and ZX Spectrum first released in 1984, licensed by British stunt performer, Eddie Kidd.
Gameplay
The player takes the role of Eddie Kidd and must make a series of jumps. Like the real Kidd, the player must start by jumping a BMX over oil barrels and work up to jumping cars on a motorbike.
The player starts by riding away from the jump to get a big enough run up. They then must set the correct speed, correctly selecting gears, to hit the ramp with enough speed to clear the obstacles but not too much to miss the landing ramp. While in the air, the player can lean forward or back to land correctly.
Development and release
The game was first released in late 1984 for the ZX Spectrum published by Software Communications' Martech label. This version was ported to the MSX in 1985. A similar version was released for the BBC Micro and Acorn Electron and a modified version of the game (with a much more zoomed in camera angle and no on screen display) released for the Commodore 64, also in 1985.
The game cassette came with a sticker and numbered competition entry card which could be used to win prizes including BMX bikes, computers and TVs.
The game was reissued at a budget price as part of Mastertronic's Ricochet label in 1987.
Reception
Crash gave the game an overall score of 56% concluding it is "a good simulation, but as a game not over exciting and not particularly addictive". The difficulty curve was criticised with the early BMX-based levels, which can not be skipped, described as "a doddle" and once the skill has been mastered, the game holds no challenge. Clare Edgeley of Sinclair User agreed that having to replay the BMX section after failing the more advanced jumps "seems a waste of time" and gave a similar score of 6/10.
Computer and Video Games gave scores between 7/10 and 8/10, particularly praising the zoomed in graphics and improved sound
|
https://en.wikipedia.org/wiki/Dog
|
The dog (Canis familiaris or Canis lupus familiaris) is a domesticated descendant of the wolf. Also called the domestic dog, it is derived from extinct Pleistocene wolves, and the modern wolf is the dog's nearest living relative. The dog was the first species to be domesticated by humans. Hunter-gatherers did this, over 15,000 years ago, which was before the development of agriculture. Due to their long association with humans, dogs have expanded to a large number of domestic individuals and gained the ability to thrive on a starch-rich diet that would be inadequate for other canids.
The dog has been selectively bred over millennia for various behaviors, sensory capabilities, and physical attributes. Dog breeds vary widely in shape, size, and color. They perform many roles for humans, such as hunting, herding, pulling loads, protection, assisting police and the military, companionship, therapy, and aiding disabled people. Over the millennia, dogs became uniquely adapted to human behavior, and the human–canine bond has been a topic of frequent study. This influence on human society has given them the sobriquet of "man's best friend".
Taxonomy
In 1758, the Swedish botanist and zoologist Carl Linnaeus published in his Systema Naturae, the two-word naming of species (binomial nomenclature). Canis is the Latin word meaning "dog", and under this genus, he listed the domestic dog, the wolf, and the golden jackal. He classified the domestic dog as Canis familiaris and, on the next page, classified the grey wolf as Canis lupus. Linnaeus considered the dog to be a separate species from the wolf because of its upturning tail (cauda recurvata), which is not found in any other canid.
In 1999, a study of mitochondrial DNA (mtDNA) indicated that the domestic dog may have originated from the grey wolf, with the dingo and New Guinea singing dog breeds having developed at a time when human communities were more isolated from each other. In the third edition of Mammal Species of
|
https://en.wikipedia.org/wiki/Stripline
|
In electronics, stripline is a transverse electromagnetic (TEM) transmission line medium invented by Robert M. Barrett of the Air Force Cambridge Research Centre in the 1950s. Stripline is the earliest form of planar transmission line.
Description
A stripline circuit uses a flat strip of metal which is sandwiched between two parallel ground planes. The insulating material of the substrate forms a dielectric. The width of the strip, the thickness of the substrate and the relative permittivity of the substrate determine the characteristic impedance of the strip which is a transmission line. As shown in the diagram, the central conductor need not be equally spaced between the ground planes. In the general case, the dielectric material may be different above and below the central conductor.
To prevent the propagation of unwanted modes, the two ground planes must be shorted together. This is commonly achieved by a row of vias running parallel to the strip on each side.
Like coaxial cable, stripline is non-dispersive, and has no cutoff frequency. Good isolation between adjacent traces can be achieved more easily than with microstrip.
Stripline provides for enhanced noise immunity against the propagation of radiated RF emissions, at the expense of slower propagation speeds when compared to microstrip lines. The effective permittivity of striplines equals the relative permittivity of the dielectric substrate because of wave propagation only in the substrate. Hence striplines have higher effective permittivity in comparison to microstrip lines, which in turn reduces wave propagation speed (see also velocity factor) according to
History
Stripline, now used as a generic term, was originally a proprietary brand of Airborne Instruments Laboratory Inc. (AIL). The version as produced by AIL was essentially air insulated (air stripline) with just a thin layer of dielectric material - just enough to support the conducting strip. The conductor was printed on both sides of t
|
https://en.wikipedia.org/wiki/Encapsulation%20%28networking%29
|
Encapsulation is the computer-networking process of concatenating layer-specific headers or trailers with a service data unit (i.e. a payload) for transmitting information over computer networks. Deencapsulation (or de-encapsulation) is the reverse computer-networking process for receiving information; it removes from the protocol data unit (PDU) a previously concatenated header or tailer that an underlying communications layer transmitted.
Encapsulation and deencapsulation allow the design of modular communication protocols so to logically separate the function of each communications layer, and abstract the structure of the communicated information over the other communications layers. These two processes are common features of the computer-networking models and protocol suites, like in the OSI model and internet protocol suite. However, encapsulation/deencapsulation processes can also serve as malicious features like in the tunneling protocols.
The physical layer is responsible for physical transmission of the data, link encapsulation allows local area networking, IP provides global addressing of individual computers, and TCP selects the process or application (i.e., the TCP or UDP port) that specifies the service such as a Web or TFTP server.
For example, in the IP suite, the contents of a web page are encapsulated with an HTTP header, then by a TCP header, an IP header, and, finally, by a frame header and trailer. The frame is forwarded to the destination node as a stream of bits, where it is decapsulated into the respective PDUs and interpreted at each layer by the receiving node.
The result of encapsulation is that each lower-layer provides a service to the layer or layers above it, while at the same time each layer communicates with its corresponding layer on the receiving node. These are known as adjacent-layer interaction and same-layer interaction, respectively.
In discussions of encapsulation, the more abstract layer is often called the upper-laye
|
https://en.wikipedia.org/wiki/Disappearing%20blonde%20gene
|
The disappearing blonde gene was a hoax claiming a scientific study had estimated that natural blonds would become extinct, repeated as fact in reputable media such as the BBC and The Sunday Times between 2002 and 2006. The hoax claimed that, because the allele for the genes for hair colour is recessive, blond hair would become less common as people with dominant non-blond hair alleles had offspring with people with the recessive alleles, even though such a pairing would retain one copy of the blond allele in the genome of the offspring. Claims that blond hair would disappear have been made since 1865.
Several reports erroneously claimed that the World Health Organization (WHO) had published a report claiming that people with blond hair "will become extinct by 2202". Neither the WHO nor any reputable expert had issued such a report, and the WHO asked those commenting on the alleged report to retract.
In the media
In 2002, BBC News reported that unnamed German experts concluded that blond hair would disappear within 200 years since the gene causing blond hair is recessive. According to the German experts, the recessive blond allele is rare in nations of mixed heritage (for example, the United States, Canada, Argentina, Brazil, New Zealand and Australia). In the BBC article Prof. Jonathan Rees of the University of Edinburgh cast doubt on the story—he was quoted as saying "The frequency of blondes may drop but they won't disappear."
In 2006 the hoax was mentioned by The Sunday Times when reporting on the publication of a hypothesis of the origins of blonde hair and La Repubblica: "According to the WHO study, the last natural blond is likely to be born in Finland during 2202." It once again traveled quickly across the World Wide Web. The hoax has also been featured on the "Threat-Down" segment of the satirical television show The Colbert Report on March 6, 2006, where Stephen Colbert suggested a selective breeding program to save blonds.
Scientific position
The e
|
https://en.wikipedia.org/wiki/Aleksei%20Pogorelov
|
Aleksei Vasil'evich Pogorelov (, ; March 2, 1919 – December 17, 2002), was a Soviet mathematician. Specialist in the field of convex and differential geometry, geometric PDEs and elastic shells theory, the author of the novel school textbook on geometry and university textbooks on analytical geometry, on differential geometry, and on foundations of geometry.
Pogorelov's uniqueness theorem and the Alexandrov–Pogorelov theorem are named after him.
Biography
Born March 3, 1919, in Korocha, Kursk Governorate (now Belgorod region) in a peasant family. In 1931, because of the collectivization, the parents of Pogorelov escaped from the village to Kharkiv, where his father become a worker at the construction of the Kharkiv tractor plant. In 1935, A.V. Pogorelov won the first prize at the Mathematical Olympiad in Kharkiv State University. After high school graduation in 1937, he entered the mathematical department of the Kharkiv State University. He was the best student at the department.
In 1941, after the involvement of the Soviet Union in the World War II, Aleksei Vasil'evich was sent for 11 months study to N.Y. Zhukovsky Air Force Engineering Academy. During his studies, the students periodically were sent for several months to the front as technicians for the airplane service. After the Red Army Victory over Nazi near Moscow, the training continued for a full term. After academy graduation, he worked at N.Y. Zhukovsky Central Aero-hydrodynamic Institute (TsAGI) as a design engineer.
The desire to complete university education and specialize in geometry professionally led A.V. Pogorelov to Moscow State University. By recommendation of I.G. Petrovsky (Dean of the Mechanics and Mathematics Department) and a well-known geometer V.F. Kagan, Aleksei Vasil'evich met A.D. Aleksandrov – the founder of the theory of non-smooth convex surfaces. There were many new questions concerning this theory. Aleksandr Danilovich proposed to give an answer to one of them to A.V. Pogore
|
https://en.wikipedia.org/wiki/Background%20radiation%20equivalent%20time
|
Background radiation equivalent time (BRET) or background equivalent radiation time (BERT) is a unit of measurement of ionizing radiation dosage amounting to one day worth of average human exposure to background radiation.
BRET units are used as a measure of low level radiation exposure. The health hazards of low doses of ionizing radiation are unknown and controversial, because the effects, mainly cancer and genetic damage, take many years to appear, and the incidence due to radiation exposure can't be statistically separated from the many other causes of these diseases. The purpose of the BRET measure is to allow a low level dose to be easily compared with a universal yardstick: the average dose of background radiation, mostly from natural sources, that every human unavoidably receives during daily life. Background radiation level is widely used in radiological health fields as a standard for setting exposure limits. Presumably, a dose of radiation which is equivalent to what a person would receive in a few days of ordinary life will not increase their rate of disease measurably.
Definition
The BRET is the creation of Professor J R Cameron. The BRET value corresponding to a dose of radiation is the number of days of average natural background dose it is equivalent to. It is calculated from the equivalent dose in sieverts by dividing by the average annual background radiation dose in Sv, and multiplying by 365:
The definition of the BRET unit is apparently unstandardized, and depends on what value is used for the average annual background radiation dose, which varies greatly across time and location. The 2000 UNSCEAR estimate for worldwide average natural background radiation dose is 2.4 mSv (240 mrem), with a range from 1 to 13 mSv. A small area in India as high as 30 mSv (3 rem). Using the 2.4 mSv value each BRET unit equals 6.6 μSv.
BRET values for diagnostic radiography procedures range from 2 BRET for a dental x-ray to around 400 for a barium enema study.
|
https://en.wikipedia.org/wiki/Handgun%20effectiveness
|
Handgun effectiveness is a measure of the stopping power of a handgun: its ability to incapacitate a hostile target as quickly and efficiently as possible.
Overview
Most handgun projectiles have significantly lower energy than centerfire rifles and shotguns. What they lack in power, they make up for in being small and lightweight, lending to concealability and practicality. Handgun power and the effectiveness of different cartridges are widely debated topics. Experimental research among civilians, law enforcement agencies, militaries, and ammunition companies is constantly ongoing. Factors that can influence handgun effectiveness include handgun design, bullet type, and bullet capabilities (e.g. wound mechanisms, penetration, velocity, and weight).
Factors
Cavitation
Most handgun projectiles wound primarily through the size of the hole they produce, known as a permanent cavity or simply a bullet hole. Rifles are capable of much higher velocities with similar cartridges and add Temporary cavitation for additional lethality. Many handgun bullets move too slowly to cause temporary cavitation, but it may occur if the bullet fragments, strikes inelastic tissue (liver, spleen, kidneys, CNS), or transfers at least of energy into the subject. This last instance usually requires a larger and/or higher velocity projectile than is commonly used with handguns.
Penetration
One factor used to measure a handgun's effectiveness is penetration. The FBI's requirement for all service rounds is penetration in calibrated ballistic gelatin. This generally ensures a bullet will reach the vital human organs from many angles and through many different layers and materials of clothing. Penetration is often argued as the most important factor in handgun cartridge wounding potential outside the skill of the shooter.
Ballistic Pressure Wave/Hydrostatic Shock
There is a significant body of evidence that Hydrostatic shock (more precisely known as the ballistic pressure wave) can contrib
|
https://en.wikipedia.org/wiki/Asimina%20triloba
|
Asimina triloba, the American papaw, pawpaw, paw paw, or paw-paw, among many regional names, is a small deciduous tree native to the eastern United States and Canada, producing a large, yellowish-green to brown fruit. Asimina is the only temperate genus in the tropical and subtropical flowering plant family Annonaceae, and Asimina triloba has the most northern range of all. Well-known tropical fruits of different genera in family Annonaceae include the custard-apple, cherimoya, sweetsop, ylang-ylang, and soursop.
The pawpaw is a patch-forming (clonal) understory tree of hardwood forests, which is found in well-drained, deep, fertile bottomland and also hilly upland habitat. It has large, simple leaves with drip tips, more characteristic of plants in tropical rainforests than within this species' temperate range. Pawpaw fruits are the largest edible fruit indigenous to the United States (not counting gourds, which are typically considered vegetables rather than fruit for culinary purposes, although in botany they are classified as fruit).
Pawpaw fruits are sweet, with a custard-like texture, and a flavor somewhat similar to banana, mango, and pineapple. They are commonly eaten raw, but are also used to make ice cream and baked desserts. However, the bark, leaves, fruit, and seeds contain the potent neurotoxin annonacin.
Names
This plant's scientific name is Asimina triloba. The genus name Asimina is adapted from the Native American (probably Miami-Illinois) name or combining the root terms rassi= “divided lengthwise into equal parts” and min= “seed, fruit, nut, berry, etc.” through the French colonial . The specific epithet triloba in the species' scientific name refers to the flowers' three-lobed calyx (green in photo at right) and doubly three-lobed corollas, the shape not unlike a tricorne hat.
The common name of this species is variously spelled pawpaw, paw paw, paw-paw, and papaw. It probably derives from the Spanish papaya, an American tropical and subtr
|
https://en.wikipedia.org/wiki/Interaction%20design%20pattern
|
Interaction design patterns are design patterns applied in the context human-computer interaction, describing common designs for graphical user interfaces.
A design pattern is a formal way of documenting a solution to a common design problem. The idea was introduced by the architect Christopher Alexander for use in urban planning and building architecture and has been adapted for various other disciplines, including teaching and pedagogy, development organization and process, and software architecture and design.
Thus, interaction design patterns are a way to describe solutions to common usability or accessibility problems in a specific context. They document interaction models that make it easier for users to understand an interface and accomplish their tasks.
History
Patterns originated as an architectural concept by Christopher Alexander. Patterns are ways to describe best practices, explain good designs, and capture experience so that other people can reuse these solutions.
Design patterns in computer science are used by software engineers during the actual design process and when communicating designs to others. Design patterns gained popularity in computer science after the book Design Patterns: Elements of Reusable Object-Oriented Software was published. Since then a pattern community has emerged that specifies patterns for problem domains including architectural styles and object-oriented frameworks. The Pattern Languages of Programming Conference (annual, 1994—) proceedings includes many examples of domain-specific patterns.
Applying a pattern language approach to interaction design was first suggested in Norman and Draper's book User Centered System Design (1986). The Apple Computer's Macintosh Human Interface Guidelines also quotes Christopher Alexander's works in its recommended reading.
Libraries
Alexander envisioned a pattern language as a structured system in which the semantic relationships between the patterns create a whole that is greater
|
https://en.wikipedia.org/wiki/Merlin%20%28protein%29
|
Merlin (also called Neurofibromin 2 or schwannomin) is a cytoskeletal protein. In humans, it is a tumor suppressor protein involved in neurofibromatosis type II. Sequence data reveal its similarity to the ERM protein family.
The name "merlin" is an acronym for "Moesin-Ezrin-Radixin-Like Protein".
Gene
Human merlin is coded by the gene NF2 in Chromosome 22. Mouse merlin gene is located on chromosome 11 and rat merlin gene on chromosome 17. Fruit fly merlin gene (symbol Mer) is located on chromosome 1 and shares 58% similarity to its human homologue.
Other merlin-like genes are known from a wide range of animals, and the derivation of merlin is thought to be in early metazoa. Merlin is a member of the ERM family of proteins including ezrin, moesin, and radixin, which are in the protein 4.1 superfamily of proteins. Merlin is also known as schwannomin, a name derived from the most common type of tumor in the NF2 patient phenotype, the schwannoma.
Structure
Vertebrate merlin is a 70 kDa protein. There are 10 known isoforms of human merlin molecule (the full molecule being 595 amino acids in length). The two most common of these are also found in the mouse and are called type 1 and type 2, differing by the absence or presence of exon 16 or 17, respectively). All the known varieties have a conserved N-terminal part, which contains a FERM domain (a domain found in most cytoskeletal-membrane organizing proteins). The FERM domain is followed by an alpha-helical domain and a hydrophilic tail. Merlin can dimerize with itself and heterodimerize with other ERM family proteins.
Function
Merlin is a membrane-cytoskeleton scaffolding protein, i.e. linking actin filaments to cell membrane or membrane glycoproteins. Human merlin is predominantly found in nervous tissue, but also in several other fetal tissues, and is mainly located in adherens junctions. Its tumor suppressor properties are probably associated with contact-mediated growth inhibition. Drosophila merlin is express
|
https://en.wikipedia.org/wiki/Latent%20tuberculosis
|
Latent tuberculosis (LTB), also called latent tuberculosis infection (LTBI) is when a person is infected with Mycobacterium tuberculosis, but does not have active tuberculosis (TB). Active tuberculosis can be contagious while latent tuberculosis is not, and it is therefore not possible to get TB from someone with latent tuberculosis. The main risk is that approximately 10% of these people (5% in the first two years after infection and 0.1% per year thereafter) will go on to develop active tuberculosis. This is particularly true, and there is added risk, in particular situations such as medication that suppresses the immune system or advancing age.
The identification and treatment of people with latent TB is an important part of controlling this disease. Various treatment regimens are in use for latent tuberculosis. They generally need to be taken for several months.
Transmission
Latent disease
TB Bacteria Are Spread Only from a Person with Active TB Disease ... In people who develop active TB of the lungs, also called pulmonary TB, the TB skin test will often be positive. In addition, they will show all the signs and symptoms of TB disease, and can pass the bacteria to others. So, if a person with TB of the lungs sneezes, coughs, talks, sings, or does anything that forces the bacteria into the air, other people nearby may breathe in TB bacteria. Statistics show that approximately one-third of people exposed to pulmonary TB become infected with the bacteria, but only one in ten of these infected people develops active TB disease during their lifetimes.However, exposure to tuberculosis is very unlikely to happen when one is exposed for a few minutes in a store or in a few minutes social contact. "It usually takes prolonged exposure to someone with active TB disease for someone to become infected.
After exposure, it usually takes 8 to 10 weeks before the TB test would show if someone had become infected."Depending on ventilation and other factors, these tiny drople
|
https://en.wikipedia.org/wiki/Hypodiastole
|
The hypodiastole (Greek: , , ), also known as a diastole, was an interpunct developed in late Ancient and Byzantine Greek texts before the separation of words by spaces was common. In the then used, a group of letters might have separate meanings as a single word or as a pair of words. The papyrological hyphen () showed a group of letters should be read together as a single word, and the hypodiastole showed that they should be taken separately. Compare "" ("whatever") to "" ("...that...").
The hypodiastole was similar in appearance to the comma and was eventually entirely conflated with it. In Modern Greek, () refers to the comma in its role as a decimal point, and words such as are written with standard commas. A separate Unicode point, ISO/IEC 10646 standard (U+2E12) (⸒), exists for the hypodiastole but is intended only to reproduce its historical occurrence in Greek texts.
|
https://en.wikipedia.org/wiki/Vertical%20handover
|
Vertical handover or vertical handoff refers to a network node changing the type of connectivity it uses to access a supporting infrastructure, usually to support node mobility. For example, a suitably equipped laptop might be able to use both high-speed wireless LAN and cellular technology for Internet access. Wireless LAN connections generally provide higher speeds, while cellular technologies generally provide more ubiquitous coverage. Thus the laptop user might want to use a wireless LAN connection whenever one is available and to revert to a cellular connection when the wireless LAN is unavailable. Vertical handovers refer to the automatic transition from one technology to another in order to maintain communication. This is different from a horizontal handover between different wireless access points that use the same technology.
Vertical handoffs between WLAN and UMTS (WCDMA) have attracted a great deal of attention in all the research areas of the 4G wireless network, due to the benefit of utilizing the higher bandwidth and lower cost of WLAN as well as better mobility support and larger coverage of UMTS. Vertical handovers among a range of wired and wireless access technologies including WiMAX can be achieved using Media independent handover which is standardized as IEEE 802.21.
Related issues
Dual mode card
To support vertical handover, a mobile terminal needs to have a dual mode card, for example one that can work under both WLAN and UMTS frequency bands and modulation schemes.
Interworking architecture
For the vertical handover between UMTS and WLAN, there are two main interworking architecture: tight coupling and loose coupling.
The tight coupling scheme, which 3GPP adopted, introduces two more elements: WAG (Wireless Access Gateway) and PDG (Packet Data Gateway). So the data transfers from WLAN AP to a Corresponding Node on the internet must go through the Core Network of UMTS.
Loose coupling is more used when the WLAN is not operated by cellular o
|
https://en.wikipedia.org/wiki/Separation%20logic
|
In computer science, separation logic is an extension of Hoare logic, a way of reasoning about programs.
It was developed by John C. Reynolds, Peter O'Hearn, Samin Ishtiaq and Hongseok Yang, drawing upon early work by Rod Burstall. The assertion language of separation logic is a special case of the logic of bunched implications (BI). A CACM review article by O'Hearn charts developments in the subject to early 2019.
Overview
Separation logic facilitates reasoning about:
programs that manipulate pointer data structures—including information hiding in the presence of pointers;
"transfer of ownership" (avoidance of semantic frame axioms); and
virtual separation (modular reasoning) between concurrent modules.
Separation logic supports the developing field of research described by Peter O'Hearn and others as local reasoning, whereby specifications and proofs of a program component mention only the portion of memory used by the component, and not the entire global state of the system. Applications include automated program verification (where an algorithm checks the validity of another algorithm) and automated parallelization of software.
Assertions: operators and semantics
Separation logic assertions describe "states" consisting of a store and a heap, roughly corresponding to the state of local (or stack-allocated) variables and dynamically-allocated objects in common programming languages such as C and Java. A store is a function mapping variables to values. A heap is a partial function mapping memory addresses to values. Two heaps and are disjoint (denoted ) if their domains do not overlap (i.e., for every memory address , at least one of and is undefined).
The logic allows to prove judgements of the form , where is a store, is a heap, and is an assertion over the given store and heap. Separation logic assertions (denoted as , , ) contain the standard boolean connectives and, in addition, , , , and , where and are expressions.
The constant asserts t
|
https://en.wikipedia.org/wiki/Cystic%20hygroma
|
A cystic hygroma is an abnormal growth that usually appears on a baby's neck or head. It consists of one or more cysts and tends to grow larger over time. The disorder usually develops while the fetus is still in the uterus, but can also appear after birth.
Also known as cystic lymphangioma and macrocystic lymphatic malformation, the growth is often a congenital lymphatic lesion of many small cavities (multiloculated) that can arise anywhere, but is classically found in the left posterior triangle of the neck and armpits. The malformation contains large cyst-like cavities containing lymph, a watery fluid that circulates throughout the lymphatic system. Microscopically, cystic hygroma consists of multiple locules filled with lymph. Deep locules are quite big, but they decrease in size towards the surface.
Cystic hygromas are benign, but can be disfiguring. It is a condition which usually affects children; very rarely it can be present in adulthood.
Currently, the medical field prefers to use the term lymphatic malformation, because the term cystic hygroma means water tumor. Lymphatic malformation is more commonly used now because it is a sponge-like collection of abnormal growth that contains clear lymphatic fluid. The fluid collects within the cysts or channels, usually in the soft tissue. Cystic hygromas occur when the lymphatic vessels that make up the lymphatic system are not formed properly. The two types of lymphatic malformations are macrocystic (large cysts) and microcystic (small cysts) lymphatic malformations. A person may have only one kind of the malformation or can have a mixture of both macro- and microcysts.
Cystic hygroma can be associated with a nuchal lymphangioma or a fetal hydrops. Additionally, it can be associated with Down syndrome, Turner syndrome, or Noonan syndrome. If it is diagnosed in the third trimester, then chances of association with Down syndrome are increased, but if diagnosed in the second trimester, then it is associated with
|
https://en.wikipedia.org/wiki/Richard%20Bornat
|
Richard Bornat (born 1944), is a British author and researcher in the field of computer science. He is also professor of Computer programming at Middlesex University. Previously he was at Queen Mary, University of London.
Research
Bornat's research interests includes program proving in separation logic. His focus is on the proofs themselves; as opposed to any logical underpinnings. Much of the work involves discovering ways to state the properties of independent modules, in a manner that makes their composition into useful systems conducive.
Bornat (in conjunction with Bernard Sufrin of the Oxford University Computing Laboratory) developed Jape, a proof calculator; he is involved in research on the usability of this tool for exploration of novel proofs.
Richard Bornat's PhD students have included Samson Abramsky in the early 1980s.
In 2004, one of Bornat's students developed an aptitude test to "divide people up into programmers and non-programmers before they ever come into contact with programming." The test was first given to a group of students in 2005 during an experiment on the use of mental models in programming. In 2008 and 2014, Bornat partially retracted some of the claims, impugning its validity as a test for programming capability.
Publications
Bornat published a book entitled "Understanding and Writing Compilers: A Do It Yourself Guide", which is regarded as one of the most extensive resources on compiler development. Although it has been out of print for some time, he has now made it available as an online edition.
Other publications from Bornat include:
R. Bornat; 1987; Programming from First Principles; Prentice Hall International Series in Computer Science; .
Richard Bornat and Harold Thimbleby; 1989; The life and times of ded, display editor; in J.B. Long & A. Whitefield (eds); Cognitive Ergonomics and Human-Computer Interaction; Cambridge University Press; pp. 225–255.
Richard Bornat and Bernard Sufrin;1999; Animating Formal Proof at
|
https://en.wikipedia.org/wiki/Cupid%27s%20bow
|
The Cupid's bow is a facial feature where the double curve of a human upper lip is said to resemble the bow of Cupid, the Roman god of erotic love. The peaks of the bow coincide with the philtral columns giving a prominent bow appearance to the lip.
See also
Philtrum
White roll
|
https://en.wikipedia.org/wiki/PLOS%20Genetics
|
PLOS Genetics is a peer-reviewed open access scientific journal established in 2005 and published by the Public Library of Science. The founding editor-in-chief was Wayne N. Frankel (Columbia University Medical Center). The current editors-in-chief are Gregory S. Barsh (HudsonAlpha Institute of Biotechnology and Stanford University School of Medicine) and Gregory P. Copenhaver (The University of North Carolina at Chapel Hill). The journal covers research on all aspects of genetics and genomics.
Abstracting and indexing
The journal is abstracted and indexed in:
According to the Journal Citation Reports, the journal has a 2020 impact factor of 5.917.
Research Prize
Since its tenth year of publication, the journal annually awards the $5000 PLOS Genetics Research Prize for the best paper published in the previous year based on nominations from members of the genetics community.
|
https://en.wikipedia.org/wiki/Sleeping%20Beauty%20problem
|
The Sleeping Beauty problem is a puzzle in decision theory in which whenever an ideally rational epistemic agent is awoken from sleep, they have no memory of whether they have been awoken before. Upon being told that they have been woken once or twice according to the toss of a coin, once if heads and twice if tails, they are asked their degree of belief for the coin having come up heads.
History
The problem was originally formulated in unpublished work in the mid-1980s by Arnold Zuboff (the work was later published as "One Self: The Logic of Experience") followed by a paper by Adam Elga. A formal analysis of the problem of belief formation in decision problems with imperfect recall was provided first by Michele Piccione and Ariel Rubinstein in their paper: "On the Interpretation of Decision Problems with Imperfect Recall" where the "paradox of the absent minded driver" was first introduced and the Sleeping Beauty problem discussed as Example 5. The name "Sleeping Beauty" was given to the problem by Robert Stalnaker and was first used in extensive discussion in the Usenet newsgroup rec.puzzles in 1999.
The problem
As originally published by Elga, the problem was:
Some researchers are going to put you to sleep. During the two days that your sleep will last, they will briefly wake you up either once or twice, depending on the toss of a fair coin (Heads: once; Tails: twice). After each waking, they will put you to back to sleep with a drug that makes you forget that waking. When you are first awakened, to what degree ought you believe that the outcome of the coin toss is Heads?
The only significant difference from Zuboff's unpublished versions is the number of potential wakings; Zuboff used a large number. Elga created a schedule within which to implement his solution, and this has become the canonical form of the problem:
Sleeping Beauty volunteers to undergo the following experiment and is told all of the following details: On Sunday she will be put to sleep. O
|
https://en.wikipedia.org/wiki/Group%20with%20operators
|
In abstract algebra, a branch of mathematics, the algebraic structure group with operators or Ω-group can be viewed as a group with a set Ω that operates on the elements of the group in a special way.
Groups with operators were extensively studied by Emmy Noether and her school in the 1920s. She employed the concept in her original formulation of the three Noether isomorphism theorems.
Definition
A group with operators can be defined as a group together with an action of a set on :
that is distributive relative to the group law:
For each , the application is then an endomorphism of G. From this, it results that a Ω-group can also be viewed as a group G with an indexed family of endomorphisms of G.
is called the operator domain. The associate endomorphisms are called the homotheties of G.
Given two groups G, H with same operator domain , a homomorphism of groups with operators is a group homomorphism satisfying
for all and
A subgroup S of G is called a stable subgroup, -subgroup or -invariant subgroup if it respects the homotheties, that is
for all and
Category-theoretic remarks
In category theory, a group with operators can be defined as an object of a functor category GrpM where M is a monoid (i.e. a category with one object) and Grp denotes the category of groups. This definition is equivalent to the previous one, provided is a monoid (otherwise we may expand it to include the identity and all compositions).
A morphism in this category is a natural transformation between two functors (i.e., two groups with operators sharing same operator domain M). Again we recover the definition above of a homomorphism of groups with operators (with f the component of the natural transformation).
A group with operators is also a mapping
where is the set of group endomorphisms of G.
Examples
Given any group G, (G, ∅) is trivially a group with operators
Given a module M over a ring R, R acts by scalar multiplication on the underlying abelian g
|
https://en.wikipedia.org/wiki/Beaufort%20cipher
|
The Beaufort cipher, created by Sir Francis Beaufort, is a substitution cipher similar to the Vigenère cipher, with a slightly modified enciphering mechanism and tableau. Its most famous application was in a rotor-based cipher machine, the Hagelin M-209. The Beaufort cipher is based on the Beaufort square which is essentially the same as a Vigenère square but in reverse order starting with the letter "Z" in the first row, where the first row and the last column serve the same purpose.
Using the cipher
To encrypt, first choose the plaintext character from the top row of the tableau; call this column P. Secondly, travel down column P to the corresponding key letter K. Finally, move directly left from the key letter to the left edge of the tableau, the ciphertext encryption of plaintext P with key K will be there.
For example if encrypting plain text character "d" with key "m" the steps would be:
find the column with "d" on the top,
travel down that column to find key "m",
travel to the left edge of the tableau to find the ciphertext letter ("K" in this case).
To decrypt, the process is reversed. Unlike the otherwise very similar Vigenère cipher, the Beaufort cipher is a reciprocal cipher, that is, decryption and encryption algorithms are the same. This obviously reduces errors in handling the table which makes it useful for encrypting larger volumes of messages by hand, for example in the manual DIANA crypto system, used by U.S. Special Forces during the Vietnam War (compare DIANA-table in the image).
In the above example in the column with "m" on top one would find in the reciprocal "d" row the ciphertext "K". The same is true for decryption where ciphertext "K" combined with key "m" results in plaintext "d" as well as combining "K" with "d" results in "m". This results in "trigram" combinations where two parts suffice to identify the third. After eliminating the identical trigrams only 126 of the initial 676 combinations remain (see below) and could be memo
|
https://en.wikipedia.org/wiki/Wigner%E2%80%93Weyl%20transform
|
In quantum mechanics, the Wigner–Weyl transform or Weyl–Wigner transform (after Hermann Weyl and Eugene Wigner) is the invertible mapping between functions in the quantum phase space formulation and Hilbert space operators in the Schrödinger picture.
Often the mapping from functions on phase space to operators is called the Weyl transform or Weyl quantization, whereas the inverse mapping, from operators to functions on phase space, is called the Wigner transform. This mapping was originally devised by Hermann Weyl in 1927 in an attempt to map symmetrized classical phase space functions to operators, a procedure known as Weyl quantization. It is now understood that Weyl quantization does not satisfy all the properties one would require for consistent quantization and therefore sometimes yields unphysical answers. On the other hand, some of the nice properties described below suggest that if one seeks a single consistent procedure mapping functions on the classical phase space to operators, the Weyl quantization is the best option: a sort of normal coordinates of such maps. (Groenewold's theorem asserts that no such map can have all the ideal properties one would desire.)
Regardless, the Weyl–Wigner transform is a well-defined integral transform between the phase-space and operator representations, and yields insight into the workings of quantum mechanics. Most importantly, the Wigner quasi-probability distribution is the Wigner transform of the quantum density matrix, and, conversely, the density matrix is the Weyl transform of the Wigner function.
In contrast to Weyl's original intentions in seeking a consistent quantization scheme, this map merely amounts to a change of representation within quantum mechanics; it need not connect "classical" with "quantum" quantities. For example, the phase-space function may depend explicitly on Planck's constant ħ, as it does in some familiar cases involving angular momentum. This invertible representation change then all
|
https://en.wikipedia.org/wiki/Diple%20%28textual%20symbol%29
|
Diple (, meaning double, referring to the two lines in the mark ) was a mark used in the margins of ancient Greek manuscripts to draw attention to something in the text. It is sometimes also called antilambda because the sign resembles a Greek capital letter lambda () turned upon its side. In some ways its usage was similar to modern day quotation marks; guillemets (« »), used for quotations in French, are derived from it.
Isidore remarks in his Etymologiae (I.21.13) that the diple was used to mark quotations from the Bible. He also talks about diple peri strichon (or sticon), which was used to draw attention to separate concepts, and diple periestigmene used (like obelos) to mark dubious passages. Diple obolismene was used according to Isidore to separate sentences in comedies and tragedies, so its usage was similar to that of paragraphos.
See also
|
https://en.wikipedia.org/wiki/Milliken%E2%80%93Taylor%20theorem
|
In mathematics, the Milliken–Taylor theorem in combinatorics is a generalization of both Ramsey's theorem and Hindman's theorem. It is named after Keith Milliken and Alan D. Taylor.
Let denote the set of finite subsets of , and define a partial order on by α<β if and only if max α<min β. Given a sequence of integers and , let
Let denote the k-element subsets of a set S. The Milliken–Taylor theorem says that for any finite partition , there exist some and a sequence such that .
For each , call an MTk set. Then, alternatively, the Milliken–Taylor theorem asserts that the collection of MTk sets is partition regular for each k.
|
https://en.wikipedia.org/wiki/Schwartz%20space
|
In mathematics, Schwartz space is the function space of all functions whose derivatives are rapidly decreasing. This space has the important property that the Fourier transform is an automorphism on this space. This property enables one, by duality, to define the Fourier transform for elements in the dual space of , particulary, for tempered distributions. A function in the Schwartz space is sometimes called a Schwartz function.
Schwartz space is named after French mathematician Laurent Schwartz.
Definition
Let be the set of non-negative integers, and for any , let be the n-fold Cartesian product. The Schwartz space or space of rapidly decreasing functions on is the function spacewhere is the function space of smooth functions from into , and Here, denotes the supremum, and we used multi-index notation, i.e. and .
To put common language to this definition, one could consider a rapidly decreasing function as essentially a function such that , , , ... all exist everywhere on and go to zero as faster than any reciprocal power of . In particular, (, ) is a subspace of the function space (, ) of smooth functions from into .
Examples of functions in the Schwartz space
If α is a multi-index, and a is a positive real number, then
Any smooth function f with compact support is in S(Rn). This is clear since any derivative of f is continuous and supported in the support of f, so (xαDβ) f has a maximum in Rn by the extreme value theorem.
Because the Schwartz space is a vector space, any polynomial can by multiplied by a factor for a real constant, to give an element of the Schwartz space. In particular, there is an embedding of polynomials inside a Schwartz space.
Properties
Analytic properties
From Leibniz's rule, it follows that is also closed under pointwise multiplication:
If then the product .
The Fourier transform is a linear isomorphism .
If then is uniformly continuous on .
is a distinguished locally convex Fréchet Schwartz TVS ove
|
https://en.wikipedia.org/wiki/Monkey%20gland%20sauce
|
Monkey gland sauce is a dark coloured, thick, sweet and tangy sauce from South Africa. It is typically served as a topping for grilled steaks or burgers, but is also used as a marinade, a dipping sauce for onion rings and chips, or on roasted potatoes. It has been featured as a restaurant item since the 1930s, becoming a South African restaurant and fast food staple condiment.
Ingredients
The main components of monkey gland sauce are chutney and tomato sauce – which result in a sweet mixture. Then an addition of onions, vinegar, garlic and Worcestershire sauce, give it a savoury-sweet flavour.
Naming
Despite its name, the sauce does not contain any monkey glands.
There are various theories on the origins of the sauce but the most likely is that it originated with French chefs at the old Carlton Hotel in Johannesburg. South African diners added sauces such as chutney, tomato sauce, and Worcester sauce to the French dishes before eating it. Thus, the disgruntled chefs combined all the condiments to create a sauce which they named monkey gland sauce. There was speculation at the time that monkey glands could slow down ageing.
A more outlandish theory is that it was named after Russian-born French scientist, Dr Serge Abrahamovitch Voronoff, who was a regular visitor at the Savoy Hotel in London. One of his medical experiments involved grafting monkey testicle tissue onto impotent men as a cure. The hotel renamed his favourite steak dish the "monkey gland steak" when he became famous. Then an ex-Savoy waiter brought it over to South Africa in the 1930s.
See also
Monkey Gland – cocktail
List of dips
List of sauces
Notes
|
https://en.wikipedia.org/wiki/Supraorbital%20foramen
|
The supraorbital foramen, is a bony elongated opening located above the orbit (eye socket) and under the forehead. It is part of the frontal bone of the skull. The supraorbital foramen lies directly under the eyebrow. In some people this foramen is incomplete and is then known as the supraorbital notch.
Structure
The supraorbital foramen is a small groove at superior and medial margin of the orbit in the frontal bone. It is part of the frontal bone of the skull. It arches transversely below the superciliary arches and is the upper part of the brow ridge. It is thin and prominent in its lateral two-thirds, but rounded in its medial third. Between these two parts, the supraorbital nerve, the supraorbital artery, and the supraorbital vein pass. The supraorbital nerve divides into superficial and deep branches after it has left the supraorbital foramen.
Additional images
See also
Foramina of skull
Frontal bone
Supraorbital ridge
|
https://en.wikipedia.org/wiki/Quantum%20mysticism
|
Quantum mysticism, sometimes referred pejoratively to as quantum quackery or quantum woo, is a set of metaphysical beliefs and associated practices that seek to relate consciousness, intelligence, spirituality, or mystical worldviews to the ideas of quantum mechanics and its interpretations. Quantum mysticism is criticized by non-believers with expert knowledge of quantum mechanics to be pseudoscience or quackery.
Before the 1970s the term was usually used in reference to the von Neumann–Wigner interpretation, but was later more closely associated with the purportedly pseudoscientific views espoused by New Age thinkers such as Fritjof Capra and other members of the Fundamental Fysiks Group, who were influential in popularizing the modern form of quantum mysticism.
History
Physicists Werner Heisenberg and Erwin Schrödinger, two of the main pioneers of quantum mechanics, were interested in Eastern mysticism, but are not known to have directly associated one with the other. In fact, both endorsed the Copenhagen interpretation of quantum mechanics.
Olav Hammer said that "Schrödinger’s studies of Hindu mysticism never compelled him to pursue the same course as quantum metaphysicists such as David Bohm or Fritjof Capra." Schrödinger biographer, Walter J. Moore, said that Schrödinger's two interests of quantum physics and Hindu mysticism were "strangely dissociated".
Juan Miguel Marin argues that "consciousness [was] introduced hypothetically at the birth of quantum physics, [and] the term 'mystical' was also used by its founders, to argue in favor and against such an introduction."
Some of the first to argue that consciousness was a factor in quantum processes were Charles Seife and Eugene Wigner, who is thought to be the first to introduce the mind-body question.
These statements were later argued against by Albert Einstein. Einstein's theories have often been falsely believed to support mystical interpretations of quantum theory. Einstein said, with regard to
|
https://en.wikipedia.org/wiki/166%20%28number%29
|
166 (one hundred [and] sixty-six) is the natural number following 165 and preceding 167.
In mathematics
166 is an even number and a composite number. It is a centered triangular number.
Given 166, the Mertens function returns 0. 166 is a Smith number in base 10.
In astronomy
166 Rhodope is a dark main belt asteroid, in the Adeona family of asteroids
166P/NEAT is a periodic comet and centaur in the outer Solar System
HD 166 is the 6th magnitude star in the constellation Andromeda
In the military
166th Signal Photo Company was the official photo unit in the 89th Division of George Patton's Third Army in World War II
Convoy ON-166 was the 166th of the numbered ON series of merchant ship convoys outbound from the British Isles to North America departing February 11, 1943
Marine Medium Helicopter Squadron 166 is a United States Marine Corps helicopter
was a United States Coast Guard cutter during World War II
was a United States Navy yacht. She was the first American vessel lost in World War I
was a United States Navy during World War II
was a United States Navy during the World War I
was a United States Navy during World War II
was a United States Navy ship during World War II
USS Jamestown (AGTR-3/AG-166) was a United States Navy Oxford-class technical research ship following World War II
In sports
Sam Thompson’s 166 RBIs in 1887 stood as a Major League Baseball record until Babe Ruth broke the record in 1921
In transportation
British Rail Class 166
The now-defunct elevated IRT Third Avenue Line, 166th Street station in the Bronx, New York
London Buses route 166
Piaggio P.166 is a twin-engined push prop-driven utility aircraft developed by the Italian aircraft manufacturer Piaggio
Banat Air Flight 166 crashed on take-off en route from Romania on December 13, 1995
Alfa Romeo 166 and 166 2.4 JTD produced from 1998 to 2007
Ferrari 166 model cars produced from 1948 to 1953
Ferrari 166 Inter (1949) Coachbuilt street coupe and cabriolet
|
https://en.wikipedia.org/wiki/Correlation%20immunity
|
In mathematics, the correlation immunity of a Boolean function is a measure of the degree to which its outputs are uncorrelated with some subset of its inputs. Specifically, a Boolean function is said to be correlation-immune of order m if every subset of m or fewer variables in is statistically independent of the value of .
Definition
A function is -th order correlation immune if for any independent binary random variables , the random variable is independent from any random vector with .
Results in cryptography
When used in a stream cipher as a combining function for linear feedback shift registers, a Boolean function with low-order correlation-immunity is more susceptible to a correlation attack than a function with correlation immunity of high order.
Siegenthaler showed that the correlation immunity m of a Boolean function of algebraic degree d of n variables satisfies m + d ≤ n; for a given set of input variables, this means that a high algebraic degree will restrict the maximum possible correlation immunity. Furthermore, if the function is balanced then m + d ≤ n − 1.
|
https://en.wikipedia.org/wiki/Supratrochlear%20nerve
|
The supratrochlear nerve is a branch of the frontal nerve, itself a branch of the ophthalmic nerve (CN V1) from the trigeminal nerve (CN V). It provides sensory innervation to the skin of the forehead and the upper eyelid.
Structure
Origin
The supratrochlear nerve is the smaller of the two terminal branches of the frontal nerve (the other being the supraorbital nerve). It arises midway between the base and apex of the orbit where the frontal nerve splits into said terminal branches.
Course
The supratrochlear nerve passes medially above the trochlea of the superior oblique muscle. It then travels anteriorly above the levator palpebrae superioris muscle. It exits the orbit through the supraorbital notch or foramen. It then ascends onto the forehead beneath the corrugator supercilii muscle and frontalis muscle. It finally divides into sensory branches.
The supratrochlear nerve travels with the supratrochlear artery, a branch of the ophthalmic artery.
Branches
Before exiting the orbit, the supratrochlear nerve emits a descending branch to the infratrochlear nerve.
Function
The supratrochlear nerve provides sensory innervation to the skin and conjunctiva of the upper eyelid, and the skin of the inferomedial forehead. It may also provide sensory innervation to part of the periosteum of the frontal bone.
Clinical significance
The supratrochlear nerve may be anaesthetised for surgery of parts of the scalp. This can be used for small lesions of the scalp. It can also be used for more extensive injury to the scalp. It is often anaesthetised alongside the supraorbital artery.
Etymology
The supratrochlear nerve is named for its passage above the trochlea of the superior oblique muscle.
Additional images
|
https://en.wikipedia.org/wiki/Reich%20Technologies
|
Reich Technologies was one of the UML Partners, a consortium that was instrumental to the development of standards for the Unified Modeling Language (UML). The CEO for the company (Georges-Pierre Reich) represented Reich Technologies on the committee, and was involved in the development of the proposal. The proposal was submitted to the Object Management Group (OMG), which approved the proposal, circa late 1997.
Profile
Reich Technologies is an international group of companies, providing a coordinated suite of products and services to support object-oriented (OO) software development in large corporations. With a presence throughout Europe and North America, Reich Technologies occupies leading positions in the world markets for integrated OO CASE tools, fine-grained object repositories and OO team programming environments.
The Intelligent Software Factory (ISF) offers an integrated object-oriented CASE tool suite. It is built on the concept of model-driven development in which the work done at the beginning of a project creates an environment for configuration management and cost containment for software maintenance. ISF has been originally built by Franck Barbier, a French researcher on OO modeling.
The Intelligent Artifact Repository (IAR) provides an enterprise-wide resource for the management and reuse of Information System assets. This concept is so powerful that the development team uses ISF and IAR for production, making ISF the first CASE tool to be self-generated. Recognizing the impact of introducing tools, Reich Technologies offers success oriented services including training, consulting and tool customizations. Corporations combine tools, services and processes with their own organizations to implement a Corporate Software Ecology.
Reich Technologies worked with Alistair Cockburn (special advisor to the Central Bank of Norway) and Ralph Hodgson (founder of TopQuadrant) to flesh out the concept of Use Case and integrate it in the context of Responsibi
|
https://en.wikipedia.org/wiki/ANZAC%20A%20badge
|
The ANZAC "A" badge is a brass insignia authorised in November 1917 for members of the First Australian Imperial Force who had served as a member of the Australian and New Zealand Army Corps (ANZACs) during the Gallipoli campaign in 1915. In 1918, eligibility was extended to those who had served at Lemnos, Imbros and Tenedos and the transports and hospitals off Gallipoli as well as the communications line to Egypt.
History
The origins of the award are uncertain with John Monash, William Birdwood and John Gellibrand all being credited with the idea in various accounts. The most likely version is that the award was a result of several ideas proposed in early 1916 to commemorate the Anzacs. When Monash led his brigade in commemorating the first Anzac Day, men who had served at Gallipoli wore a blue ribbon on their right breast and those who had gone ashore as part of the first landing wore a red ribbon as well. Birdwood advised in August 1916 that he supported Australian veterans of the ANZAC campaign wearing an "A" badge on their colour patches.
The 1st and 2nd Divisions supported the idea enthuastically. The 3rd and 4th, both of which had fewer ANZAC veterans in their ranks, were less enthusiastic in their adoption of the badge. However, Monash, as commander of the 3rd Division, was able to claim by November 1916 that "'All who have a right to be called "Anzacs" among us are now wearing a metal "A" on the colour patches on the sleeves".
In early 1917, convalescent soldiers returned to Australia wearing the badge and its status was initially questioned. This led to its formal approval through AIF Order 937 issued in November 1917. Subsequent orders clarified the entitlement to the badge and made it compulsory. In January 1918, the order extended eligibility to people who had served behind the lines on the Greek islands of Lemnos, Imbros and Tenedos, on the communication lines and hospital ships offshore or on the islands or in the communications to Egypt. This inc
|
https://en.wikipedia.org/wiki/Chow%20group
|
In algebraic geometry, the Chow groups (named after Wei-Liang Chow by ) of an algebraic variety over any field are algebro-geometric analogs of the homology of a topological space. The elements of the Chow group are formed out of subvarieties (so-called algebraic cycles) in a similar way to how simplicial or cellular homology groups are formed out of subcomplexes. When the variety is smooth, the Chow groups can be interpreted as cohomology groups (compare Poincaré duality) and have a multiplication called the intersection product. The Chow groups carry rich information about an algebraic variety, and they are correspondingly hard to compute in general.
Rational equivalence and Chow groups
For what follows, define a variety over a field to be an integral scheme of finite type over . For any scheme of finite type over , an algebraic cycle on means a finite linear combination of subvarieties of with integer coefficients. (Here and below, subvarieties are understood to be closed in , unless stated otherwise.) For a natural number , the group of -dimensional cycles (or -cycles, for short) on is the free abelian group on the set of -dimensional subvarieties of .
For a variety of dimension and any rational function on which is not identically zero, the divisor of is the -cycle
where the sum runs over all -dimensional subvarieties of and the integer denotes the order of vanishing of along . (Thus is negative if has a pole along .) The definition of the order of vanishing requires some care for singular.
For a scheme of finite type over , the group of -cycles rationally equivalent to zero is the subgroup of generated by the cycles for all -dimensional subvarieties of and all nonzero rational functions on . The Chow group of -dimensional cycles on is the quotient group of by the subgroup of cycles rationally equivalent to zero. Sometimes one writes for the class of a subvariety in the Chow group, and if two subvarieties and have , then a
|
https://en.wikipedia.org/wiki/Leptomycin
|
Leptomycins are secondary metabolites produced by Streptomyces spp.
Leptomycin B (LMB) was originally discovered as a potent antifungal compound. Leptomycin B was found to cause cell elongation of the fission yeast Schizosaccharomyces pombe. Since then this elongation effect has been used for the bioassay of leptomycin. However, recent data shows that leptomycin causes G1 cell cycle arrest in mammalian cells and is a potent anti-tumor agent against murine experimental tumors in combination therapy.
Leptomycin B has been shown to be a potent and specific nuclear export inhibitor in humans and the fission yeast S. pombe. Leptomycin B alkylates and inhibits CRM1 (chromosomal region maintenance)/exportin 1 (), a protein required for nuclear export of proteins containing a nuclear export sequence (NES), by glycosylating a cysteine residue (cysteine 529 in S. pombe). In addition to antifungal and antibacterial activities, leptomycin B blocks the cell cycle and is a potent anti-tumor agent. At low nM concentrations, leptomycin B blocks the nuclear export of many proteins including HIV-1 Rev, MAPK/ERK, and NF-κB/IκB, and it inhibits the inactivation of p53. Leptomycin B also inhibits the export and translation of many RNAs, including COX-2 and c-Fos mRNAs, by inhibiting the export of ribonucleoproteins.
Leptomycin A (LPA) was discovered together with LMB. LMB is twice as potent as LPA.
See also
Selective inhibitor of nuclear export
|
https://en.wikipedia.org/wiki/SMPTE%20292
|
SMPTE 292 is a digital video transmission line standard published by the Society of Motion Picture and Television Engineers (SMPTE). This technical standard is usually referred to as HD-SDI; it is part of a family of standards that define a Serial Digital Interface based on a coaxial cable, intended to be used for transport of uncompressed digital video and audio in a television studio environment.
SMPTE 292 which expands upon SMPTE 259 and SMPTE 344 allowing for bit-rates of 1.485 Gbit/s, and 1.485/1.001 Gbit/s. These bit-rates are sufficient for and often used to transfer uncompressed high-definition video.
Nomenclature
The "M" designator was originally introduced to signify metric dimensions. It is no longer used in listings or filenames. Units of the International System of Units (SI) are the preferred units of measurement in all SMPTE Engineering Documents.
Technical details
The SMPTE 292 standard is a nominally 1.5 Gbit/s interface. Two exact bitrates are defined; 1.485 Gbit/s, and 1.485/1.001 Gbit/s. The factor of 1/1.001 is provided to allow SMPTE 292 to support video formats with frame rates of 59.94 Hz, 29.97 Hz, and 23.98 Hz, in order to be upwards compatible with existing NTSC systems. The 1.485 Gbit/s version of the standard supports other frame rates in widespread use, including 60 Hz, 50 Hz, 30 Hz, 25 Hz, and 24 Hz.
The standard also defines nominal bitrates of 3 Gbit/s, for 50/60 frame per second 1080P applications. This version of the interface is not used (and has not been commercially implemented); instead, either a dual-link extension of SMPTE 292M known as SMPTE 372 or a version running twice as fast known as SMPTE 424 is used for e.g. 1080p60 applications.
Electrical interface
Originally, both electrical and optical interfaces were defined by SMPTE, over concerns that an electrical interface at that bitrate would be expensive or unreliable, and that an optical interface would be necessary. Such fears have not been realized, and
|
https://en.wikipedia.org/wiki/Norman%20White
|
Norman White (born January 7, 1938, San Antonio Texas) Canadian New Media artist considered to be a pioneer in the use of electronic technology and robotics in art.
Life
White was born in San Antonio Texas in 1938. He grew up in and around Boston, Massachusetts, and obtained his B.A. in Biology from Harvard University in 1959. Originally planning to become a fisheries biologist, White changed his mind and decided to travel to places like New York City, San Francisco, London, and the Middle East during the 1960s.
While living in San Francisco, he worked as an electrician at Hunter's Point Naval Shipyard, and developed a fascination for electrical switching systems. In London England, 1965-1967, he began to experiment with electronics. He then moved to Toronto, Ontario, Canada, where he began creating a series of kinetic, digital logic driven light machines. His first artwork utilizing "RTL" integrated circuits was shown in the E.A.T. sponsored group exhibition entitled "Some More Beginnings", in 1969, at the Brooklyn Museum. From 1978 to 2003. White taught classes such as "Mechanics for Real Time Sculpture" as part of the Integrated Media Program of the Ontario College of Art & Design
A retrospective of his work and influence, called Norm’s Robots and Machine Life, with works by both White and several Canadian artists he has influenced, was shown at the Agnes Etherington Art Centre, Kingston, Ontario in 2004.
From 1992 to 2003, White was an essential force behind the OCAD Sumo Robot Challenge, an annual competition akin to an automaton Olympics.
From 2003 to 2016 , White taught in the Radio Television Arts Department of Ryerson University, Toronto, Ontario. He retired from teaching in 2016.
Work
Early light works
White's early electronic art consisted mostly of gridded installations of light bulbs controlled by contemporary-vintage digital logic circuits. Like most of his art, these displays were concerned more with communicating internal rules and behaviours
|
https://en.wikipedia.org/wiki/Algebraic%20expression
|
In mathematics, an algebraic expression is an expression built up from constant algebraic numbers, variables, and the algebraic operations (addition, subtraction, multiplication, division and exponentiation by an exponent that is a rational number). For example, is an algebraic expression. Since taking the square root is the same as raising to the power , the following is also an algebraic expression:
An algebraic equation is an equation involving only algebraic expressions.
By contrast, transcendental numbers like and are not algebraic, since they are not derived from integer constants and algebraic operations. Usually, is constructed as a geometric relationship, and the definition of requires an infinite number of algebraic operations.
A rational expression is an expression that may be rewritten to a rational fraction by using the properties of the arithmetic operations (commutative properties and associative properties of addition and multiplication, distributive property and rules for the operations on the fractions). In other words, a rational expression is an expression which may be constructed from the variables and the constants by using only the four operations of arithmetic. Thus,
is a rational expression, whereas
is not.
A rational equation is an equation in which two rational fractions (or rational expressions) of the form
are set equal to each other. These expressions obey the same rules as fractions. The equations can be solved by cross-multiplying. Division by zero is undefined, so that a solution causing formal division by zero is rejected.
Terminology
Algebra has its own terminology to describe parts of an expression:
1 – Exponent (power), 2 – coefficient, 3 – term, 4 – operator, 5 – constant, - variables
In roots of polynomials
The roots of a polynomial expression of degree n, or equivalently the solutions of a polynomial equation, can always be written as algebraic expressions if n < 5 (see quadratic formula, cubic function, an
|
https://en.wikipedia.org/wiki/Ultrarelativistic%20limit
|
In physics, a particle is called ultrarelativistic when its speed is very close to the speed of light .
The expression for the relativistic energy of a particle with rest mass and momentum is given by
The energy of an ultrarelativistic particle is almost completely due to its momentum (), and thus can be approximated by . This can result from holding the mass fixed and increasing to very large values (the usual case); or by holding the energy fixed and shrinking the mass to negligible values. The latter is used to derive orbits of massless particles such as the photon from those of massive particles (cf. Kepler problem in general relativity).
In general, the ultrarelativistic limit of an expression is the resulting simplified expression when is assumed. Or, similarly, in the limit where the Lorentz factor is very large ().
Expression including mass value
While it is possible to use the approximation , this neglects all information of the mass. In some cases, even with , the mass may not be ignored, as in the derivation of neutrino oscillation.
A simple way to retain this mass information is using a Taylor expansion rather than a simple limit.
The following derivation assumes (and the ultrarelativistic limit ).
Without loss of generality, the same can be shown including the appropriate terms.
The generic expression can be Taylor expanded, giving:
Using just the first two terms, this can be substituted into the above expression (with acting as ), as:
Ultrarelativistic approximations
Below are some ultrarelativistic approximations in units with . The rapidity is denoted :
Motion with constant proper acceleration: , where is the distance traveled, is proper acceleration (with ), is proper time, and travel starts at rest and without changing direction of acceleration (see proper acceleration for more details).
Fixed target collision with ultrarelativistic motion of the center of mass: where and are energies of the particle an
|
https://en.wikipedia.org/wiki/Featural%20writing%20system
|
In a featural writing system, the shapes of the symbols (such as letters) are not arbitrary but encode phonological features of the phonemes that they represent. The term featural was introduced by Geoffrey Sampson to describe the Korean alphabet and Pitman shorthand.
Joe Martin introduced the term featural notation to describe writing systems that include symbols to represent individual features rather than phonemes. He asserts that "alphabets have no symbols for anything smaller than a phoneme".
A featural script represents finer detail than an alphabet. Here, symbols do not represent whole phonemes, but rather the elements (features) that make up the phonemes, such as voicing or its place of articulation. In the Korean alphabet, the featural symbols are combined into alphabetic letters, and these letters are in turn joined into syllabic blocks, so the system combines three levels of phonological representation.
Some scholars (e.g. John DeFrancis) reject this class or at least labeling the Korean alphabet as such. Others include stenographies and constructed scripts of hobbyists and fiction writers (such as Tengwar), many of which feature advanced graphic designs corresponding to phonologic properties. The basic unit of writing in these systems can map to anything from phonemes to words. It has been shown that even the Latin script has sub-character "features".
Examples of featural systems
This is a small list of examples of featural writing systems by date of creation. The languages for which each system was developed are also shown.
15th century
Hangul Korean
19th century
Canadian Aboriginal syllabics several Algonquian, Eskimo-Aleut and Athabaskan languages
Gregg shorthand many languages from different families
Duployan shorthand originally French, later English, German, Spanish, Romanian, Chinook Jargon and others
Visible Speech (a phonetic script) no specific language. Developed to aid the deaf and teach them to speak properly
20th century
Shavian a
|
https://en.wikipedia.org/wiki/Millrind
|
A millrind or simply rind is an iron support, usually four-armed or cross-shaped, for the upper ("runner") stone in a pair of millstones.
The rind is affixed to the top of the square-section main shaft or spindle and supports the entire weight of the runner stone, which can be as much as several tons. The face of a runner stone usually has a carved depression, called the "Spanish cross", to accommodate the millrind. The rind is necessary because the grain is fed through the runner stone's central hole, so the spindle cannot be inserted through it like a cartwheel on an axle.
Mechanism
A later refinement, replacing the cross, was to mount a mace onto the spindle, which fitted into a gimbal let into the runner stone. The device allowed the runner stone to move in two planes and thus follow the nether (stationary) stone more closely, but great care had to be taken to ensure that its weight was properly balanced. The separation of the nether stone from the runner, controlling the fineness of the grind, was adjusted by the tenter mechanism: a screw jack to raise or lower the bearing carrying the base of spindle.
In heraldry
The millrind occasionally appears as a charge in heraldry, in which it is often known by the French name fer-de-moline ("iron of a mill"). Like real millrinds, the fer-de-moline is highly variable in form. The 16th century writer Bossewell characterized it as a symbol fit for judges and magistrates, who keep men on a straight course just as a millrind does with a runner stone. However it is more often found in canting arms of families with names such as Miller, Milne and Mills and Turner, Turnor and Turnour.
Another charge based on the millrind is the cross moline, which takes the form of a cross with bifurcated ends (sometimes with a pierced centre and sometimes without). In early blazons the term fer-de-moline often refers to the cross moline.
Gallery
|
https://en.wikipedia.org/wiki/Hydrometeorology
|
Hydrometeorology is a branch of meteorology and hydrology that studies the transfer of water and energy between the land surface and the lower atmosphere. Hydrologists often use data provided by meteorologists. As an example, a meteorologist might forecast of rain in a specific area, and a hydrologist might then forecast what the specific impact of that rain would be on the local terrain.
UNESCO has several programs and activities in place that deal with the study of natural hazards of hydrometeorological origin and the mitigation of their effects. Among these hazards are the results of natural processes and atmospheric, hydrological, or oceanographic phenomena such as floods, tropical cyclones, drought, and desertification. Many countries have established an operational hydrometeorological capability to assist with forecasting, warning, and informing the public of these developing hazards.
Hydrometeorological forecasting
One of the more significant aspects of hydrometeorology involves predictions about and attempts to mitigate the effects of high precipitation events. There are three primary ways to model meteorological phenomena in weather forecasting, including nowcasting, numerical weather prediction, and statistical techniques. Nowcasting is good for predicting events a few hours out, utilizing observations and live radar data to combine them with numerical weather prediction models. The primary technique used to forecast weather, numerical weather prediction uses mathematical models to account for the atmosphere, ocean, and many other variables when producing forecasts. These forecasts are generally used to predict events days or weeks out. Finally, statistical techniques use regressions and other statistical methods to create long-term projections that go out weeks and months at a time. These models allow scientists to visualize how a multitude of different variables interact with one another, and they illustrate one grand picture of how the Earth's clim
|
https://en.wikipedia.org/wiki/List%20of%20scale%20model%20sizes
|
This is a list of scale model sizes, listing a variety of size ratios for scale models.
Model scales
|
https://en.wikipedia.org/wiki/Maximum%20common%20induced%20subgraph
|
In graph theory and theoretical computer science, a maximum common induced subgraph of two graphs G and H is a graph that is an induced subgraph of both G and H,
and that has as many vertices as possible.
Finding this graph is NP-hard.
In the associated decision problem, the input is two graphs G and H and a number k. The problem is to decide whether G and H have a common induced subgraph with at least k vertices. This problem is NP-complete. It is a generalization of the induced subgraph isomorphism problem, which arises when k equals the number of vertices in the smaller of G and H, so that this entire graph must appear as an induced subgraph of the other graph.
Based on hardness of approximation results for the maximum independent set problem, the maximum common induced subgraph problem is also hard to approximate. This implies that, unless P = NP, there is no approximation algorithm that, in polynomial time on -vertex graphs, always finds a solution within a factor of of optimal, for any .
One possible solution for this problem is to build a modular product graph of G and H.
In this graph, the largest clique corresponds to a maximum common induced subgraph of G and H. Therefore, algorithms for finding maximum cliques can be used to find the maximum common induced subgraph. Moreover, a modified maximum-clique algorithm can be used to find a maximum common connected subgraph.
The McSplit algorithm (along with its McSplit↓ variant) is a forward checking algorithm that does not use the clique encoding, but uses a compact data structure to keep track of the vertices in graph H to which each vertex in graph G may be mapped. Both versions of the McSplit algorithm outperform the clique encoding for many graph classes.A more efficient implementation of McSplit is McSplitDAL+PR, which combines a Reinforcement Learning agent with some heuristic scores computed with the PageRank algorithm.
Maximum common induced subgraph algorithms have a long tradition in cheminforma
|
https://en.wikipedia.org/wiki/Dynamic%20logic%20%28digital%20electronics%29
|
In integrated circuit design, dynamic logic (or sometimes clocked logic) is a design methodology in combinational logic circuits, particularly those implemented in metal–oxide–semiconductor (MOS) technology. It is distinguished from the so-called static logic by exploiting temporary storage of information in stray and gate capacitances. It was popular in the 1970s and has seen a recent resurgence in the design of high-speed digital electronics, particularly central processing units (CPUs). Dynamic logic circuits are usually faster than static counterparts and require less surface area, but are more difficult to design. Dynamic logic has a higher average rate of voltage transitions than static logic, but the capacitive loads being transitioned are smaller so the overall power consumption of dynamic logic may be higher or lower depending on various tradeoffs. When referring to a particular logic family, the dynamic adjective usually suffices to distinguish the design methodology, e.g. dynamic CMOS or dynamic SOI design.
Besides its use of dynamic state storage via voltages on capacitances, dynamic logic is distinguished from so-called static logic in that dynamic logic uses a clock signal in its implementation of combinational logic. The usual use of a clock signal is to synchronize transitions in sequential logic circuits. For most implementations of combinational logic, a clock signal is not even needed. The static/dynamic terminology used to refer to combinatorial circuits is related to the use of the same adjectives used to distinguish memory devices, e.g. static RAM from dynamic RAM, in that dynamic RAM stores state dynamically as voltages on capacitances, which must be periodically refreshed. But there are also differences in usage; the clock can be stopped in the appropriate phase in a system with dynamic logic and static storage.
Static versus dynamic logic
The largest difference between static and dynamic logic is that in dynamic logic, a clock signa
|
https://en.wikipedia.org/wiki/Biconjugate%20gradient%20method
|
In mathematics, more specifically in numerical linear algebra, the biconjugate gradient method is an algorithm to solve systems of linear equations
Unlike the conjugate gradient method, this algorithm does not require the matrix to be self-adjoint, but instead one needs to perform multiplications by the conjugate transpose .
The Algorithm
Choose initial guess , two other vectors and and a preconditioner
for do
In the above formulation, the computed and satisfy
and thus are the respective residuals corresponding to and , as approximate solutions to the systems
is the adjoint, and is the complex conjugate.
Unpreconditioned version of the algorithm
Choose initial guess ,
for do
Discussion
The biconjugate gradient method is numerically unstable (compare to the biconjugate gradient stabilized method), but very important from a theoretical point of view. Define the iteration steps by
where using the related projection
with
These related projections may be iterated themselves as
A relation to Quasi-Newton methods is given by and , where
The new directions
are then orthogonal to the residuals:
which themselves satisfy
where .
The biconjugate gradient method now makes a special choice and uses the setting
With this particular choice, explicit evaluations of and are avoided, and the algorithm takes the form stated above.
Properties
If is self-adjoint, and , then , , and the conjugate gradient method produces the same sequence at half the computational cost.
The sequences produced by the algorithm are biorthogonal, i.e., for .
if is a polynomial with , then . The algorithm thus produces projections onto the Krylov subspace.
if is a polynomial with , then .
See also
Biconjugate gradient stabilized method (BiCG-Stab)
Conjugate gradient method (CG)
Conjugate gradient squared method (CGS)
|
https://en.wikipedia.org/wiki/Cardiodon
|
Cardiodon (meaning "heart tooth", in reference to the shape) was a herbivorous genus of sauropod dinosaur, based on a tooth from the late Bathonian-age Middle Jurassic Forest Marble Formation of Wiltshire, England. Historically, it is very obscure and usually referred to Cetiosaurus, but recent analyses suggest that it is a distinct genus, and possibly related to Turiasaurus. Cardiodon was the first sauropod genus named.
History and taxonomy
Richard Owen named the genus for a now-lost tooth, part of the collection of naturalist Joseph Chaning Pearce, found near Bradford-on-Avon, but did not assign it a specific name at the time. The generic name is derived from Greek καρδία, kardia, "heart", and ὀδών, odon, "tooth", in reference to its heart-shaped profile. A few years later, in 1844, he added the specific name rugulosus, meaning "wrinkled" in Latin. Cardiodon was the first sauropod given a formal name to, though Owen was at the time completely unaware of the sauropod nature of the find.
Within a few decades, he and others were viewing Cardiodon as a possible synonym of his most well-known sauropod genus, Cetiosaurus. Richard Lydekker formalized this view in a roundabout way in 1890, by assigning Cetiosaurus oxoniensis to Cardiodon on the basis of teeth from Oxfordshire associated with a skeleton of C. oxoniensis. He also added a second tooth (BMNH R1527) from the Great Oolite near Cirencester, Gloucestershire. More typically, Cardiodon has been assigned to Cetiosaurus, sometimes as a separate species Cetiosaurus rugulosus, in spite of its priority.
In 2003, Paul Upchurch and John Martin, reviewing Cetiosaurus, found that there is little evidence to assign the C. oxoniensis teeth to the skeleton, and the "C. oxoniensis" teeth differ from the Cardiodon teeth (Cardiodon teeth are convex facing the tongue); therefore, they supported Cardiodon being retained as its own genus. Upchurch et al. (2004) repeated this assessment, and found that though the teeth have n
|
https://en.wikipedia.org/wiki/HHV%20Infected%20Cell%20Polypeptide%200
|
Human Herpes Virus (HHV) Infected Cell Polypeptide 0 (ICP0) is a protein, encoded by the DNA of herpes viruses. It is produced by herpes viruses during the earliest stage of infection, when the virus has recently entered the host cell; this stage is known as the immediate-early or α ("alpha") phase of viral gene expression. During these early stages of infection, ICP0 protein is synthesized and transported to the nucleus of the infected host cell. Here, ICP0 promotes transcription from viral genes, disrupts structures in the nucleus known as nuclear dots or promyelocytic leukemia (PML) nuclear bodies, and alters the expression of host and viral genes in combination with a neuron specific protein. At later stages of cellular infection, ICP0 relocates to the cell cytoplasm to be incorporated into new virion particles.
History and background
ICP0 was identified as an immediate-early polypeptide product of Herpes simplex virus-1 (HSV-1) infection in 1976. The gene, in HSV-1, from which ICP0 is produced is known as HSV-1 α0 ("alpha zero"), Immediate Early (IE) gene 1, or simply as the HSV-1 ICP0 gene. The HSV-1 ICP0 gene was characterized and sequenced in 1986. This sequence predicted a 775 amino acid sequence with a molecular weight of 78.5 KDa. At the time of gene isolation, ICP0 was known as IE110 as gel electrophoresis experiments performed prior to obtaining the gene sequence indicated the ICP0 protein weighed 110 kDa. Post-translational modifications, such as phosphorylation or sumoylation, were presumed to account for the actual protein size appearing 30 kDa larger than that of the predicted amino acid sequence.
Functions
Dismantle microtubule networks
ICP0 co-localizes with α-tubulin, and dismantles host cell microtubule networks once it translocates to the cytoplasm.
Transcription
In HSV-1 infected cells, ICP0 activates the transcription of many viral and cellular genes. It acts synergistically with HSV-1 immediate early (IE) protein, ICP4, and is es
|
https://en.wikipedia.org/wiki/Lie%20bialgebra
|
In mathematics, a Lie bialgebra is the Lie-theoretic case of a bialgebra: it is a set with a Lie algebra and a Lie coalgebra structure which are compatible.
It is a bialgebra where the multiplication is skew-symmetric and satisfies a dual Jacobi identity, so that the dual vector space is a Lie algebra, whereas the comultiplication is a 1-cocycle, so that the multiplication and comultiplication are compatible. The cocycle condition implies that, in practice, one studies only classes of bialgebras that are cohomologous to a Lie bialgebra on a coboundary.
They are also called Poisson-Hopf algebras, and are the Lie algebra of a Poisson–Lie group.
Lie bialgebras occur naturally in the study of the Yang–Baxter equations.
Definition
A vector space is a Lie bialgebra if it is a Lie algebra,
and there is the structure of Lie algebra also on the dual vector space which is compatible.
More precisely the Lie algebra structure on is given
by a Lie bracket
and the Lie algebra structure on is given by a Lie
bracket .
Then the map dual to is called the cocommutator,
and the compatibility condition is the following cocycle relation:
where is the adjoint.
Note that this definition is symmetric and is also a Lie bialgebra, the dual Lie bialgebra.
Example
Let be any semisimple Lie algebra.
To specify a Lie bialgebra structure we thus need to specify a compatible Lie algebra structure on the dual vector space.
Choose a Cartan subalgebra and a choice of positive roots.
Let be the corresponding opposite Borel subalgebras, so that and there is a natural projection .
Then define a Lie algebra
which is a subalgebra of the product , and has the same dimension as .
Now identify with dual of via the pairing
where and is the Killing form.
This defines a Lie bialgebra structure on , and is the "standard" example: it underlies the Drinfeld-Jimbo quantum group.
Note that is solvable, whereas is semisimple.
Relation to Poisson–Lie groups
The Lie algebra of a P
|
https://en.wikipedia.org/wiki/Red%20rain%20in%20Kerala
|
The Kerala red rain phenomenon was a blood rain event that occurred in Wayanad district region of Malabar on Monday, 15 July 1957 and the colour subsequently turned yellow and also 25 July to 23 September 2001, when heavy downpours of red-coloured rain fell sporadically on the southern Indian state of Kerala, staining clothes pink. Yellow, green and black rain was also reported. Coloured rain was also reported in Kerala in 1896 and several times since, most recently in June 2012, and from 15 November 2012 to 27 December 2012 in eastern and north-central provinces of Sri Lanka.
Following a light-microscopy examination in 2001, it was initially thought that the rains were coloured by fallout from a hypothetical meteor burst, but a study commissioned by the Government of India concluded that the rains had been coloured by airborne spores from a locally prolific terrestrial green algae from the genus Trentepohlia.
Occurrence
The coloured rain of Kerala began falling on 25 July 2001, in the districts of Kottayam and Idukki in the southern part of the state. Yellow, green, and black rain was also reported. Many more occurrences of the red rain were reported over the following ten days, and then with diminishing frequency until late September. According to locals, the first coloured rain was preceded by a loud thunderclap and flash of light, and followed by groves of trees shedding shrivelled grey "burnt" leaves. Shriveled leaves and the disappearance and sudden formation of wells were also reported around the same time in the area. It typically fell over small areas, no more than a few square kilometres in size, and was sometimes so localised that normal rain could be falling just a few meters away from the red rain. Red rainfalls typically lasted less than 20 minutes. Each millilitre of rain water contained about 9 million red particles. Extrapolating these figures to the total amount of red rain estimated to have fallen, it was estimated that of red particles had fa
|
https://en.wikipedia.org/wiki/Omeisaurus
|
Omeisaurus (meaning "Omei lizard") is a genus of sauropod dinosaur from the Middle Jurassic Period (Bathonian-Callovian stage) of what is now China. Its name comes from Mount Emei, where it was discovered in the lower Shaximiao Formation of Sichuan Province.
Like most sauropods, Omeisaurus was herbivorous and large. The largest species, O. tianfuensis, measured long, and weighed . Other species were much smaller, as the type species O. junghsiensis reached a size of in length and in body mass, and O. maoianus reached a size of and .
Discovery and species
Initial discovery and O. changshouensis
The initial discovery of Omeisaurus was in 1936 when Charles Lewis Camp and Yang Zhongjian collected a partial skeleton from strata of the Shaximiao Formation in Sichuan, China. The material was taken to and prepared in what is now the Institute of Vertebrate Paleontology and Paleoanthropology in Beijing. The skeleton was named Omeisaurus junghsiensis in 1939 by Yang Zhongjian, the skeleton consisting of a partial postcranial skeleton that included four cervical (neck) vertebrae. It was named after the sacred mountain Omeishan, which is near where O. junghsiensis was found, and the species name after the locality. The skeleton of O. junghsiensis was lost during WWII. In 1955, Xuanmin Li and colleagues collected several Sauropod remains from the same strata as O. junghsiensis in Changshou during construction of a reservoir. The IVPP sent Youling Su to conduct the excavation in Changshou, the crew finding eleven vertebrae and several appendicular elements (IVPP V930). The specimen was described later in 1958, also by Yang Zhongjian, as a new species, O. changshouensis.
Discoveries at Wujiaba
During the construction of the Wujiaba Dam in Zigong during the mid-to-late 1970s, crews discovered many large Sauropod remains from strata of the Upper Shaximiao Formation. The amount of material was vast and was collected by the Chongqing Museum of Natural History over five year
|
https://en.wikipedia.org/wiki/Mario%20Szegedy
|
Mario Szegedy (born October 23, 1960) is a Hungarian-American computer scientist, professor of computer science at Rutgers University. He received his Ph.D. in computer science in 1989 from the University of Chicago. He held a Lady Davis Postdoctoral Fellowship at the Hebrew University of Jerusalem (1989–90), a postdoc at the University of Chicago, 1991–92, and a postdoc at Bell Laboratories (1992).
Szegedy's research areas include computational complexity theory and quantum computing.
He was awarded the Gödel Prize twice, in 2001 and 2005, for his work on probabilistically checkable proofs and on the space complexity of approximating the frequency moments in streamed data. His work on streaming was also recognized by the 2019 Paris Kanellakis Theory and Practice Award.
He is married and has two daughters.
|
https://en.wikipedia.org/wiki/Gopher%20wood
|
Gopher wood or gopherwood is a term used once in the Bible for the material used to construct Noah's ark. states that Noah was instructed to build the Ark of (), commonly transliterated as wood, a word not otherwise used in the Bible or the Hebrew language in general. Although some English Bibles attempt a translation, older English translations such as the King James Version (17th century) leave it untranslated. The word is unrelated to the North American animal known as the gopher.
Identity
The Greek Septuagint (3rd–1st centuries BC) translated the phrase mentioning gopher wood as (), 'out of squared timber', translating gofer as squared. Similarly, the Latin Vulgate (5th century AD) rendered it as (, in the spelling of the Clementine Vulgate), 'of timber planks'.
The Jewish Encyclopedia states that it was most likely a translation of the Babylonian , 'cedar beams', or the Assyrian , 'reeds'. The Aramaic Targum Onkelos, considered by many Jews to be an authoritative translation of the Hebrew scripture, renders this word as , 'cedar'. The Syriac Peshitta translates this word as , 'box'.
Many modern English translations favor cypress (otherwise referred to in Biblical Hebrew as ). This was espoused (among others) by Adam Clarke, a Methodist theologian famous for his commentary on the Bible: Clarke cited a resemblance between the Greek word for cypress, , and the Hebrew word . Likewise, the (20th century) has it as ('out of cypress wood').
Others, noting the visual similarity between the Hebrew letters g (gimel ) and k (kaf ), suggest that the word may actually be , the Hebrew word meaning 'pitch'; thus wood would be 'pitched wood'. Recent suggestions have included a lamination process (to strengthen the Ark), or a now-lost type of tree, but there is no consensus.
|
https://en.wikipedia.org/wiki/Ancillary%20data
|
Ancillary data is data that has been added to given data and uses the same form of transport. Common examples are cover art images for media files or streams, or digital data added to radio or television broadcasts.
Television
Ancillary data (commonly abbreviated as ANC data), in the context of television systems, refers to a means which by non-video information (such as audio, other forms of essence, and metadata) may be embedded within the serial digital interface. Ancillary data is standardized by SMPTE as SMPTE 291M: Ancillary Data Packet and Space Formatting.
Ancillary data can be located in non-picture portions of horizontal scan lines. This is known as horizontal ancillary data (HANC). Ancillary data can also be located in non-picture regions of the frame, This is known as vertical ancillary data (VANC).
Technical details
Location
Ancillary data packets may be located anywhere within a serial digital data stream, with the following exceptions:
They should not be located in the lines identified as a switch point (which may be lost when switching sources).
They should not be located in the active picture area.
They may not cross the TRS (timing reference signal) packets.
Ancillary data packets are commonly divided into two types, depending on where they are located—specific packet types are often constrained to be in one location or another.
Ancillary packets located in the horizontal blanking region (after EAV but before SAV), regardless of line, are known as horizontal ancillary data, or HANC. HANC is commonly used for higher-bandwidth data, and/or for things that need to be synchronized to a particular line; the most common type of HANC is embedded audio.
Ancillary packets located in the vertical blanking region, and after SAV but before EAV, are known as vertical ancillary data, or VANC. VANC is commonly used for low-bandwidth data, or for things that only need be updated on a per-field or per-frame rate. Closed caption data and VPID are ge
|
https://en.wikipedia.org/wiki/Alphabet%20%28formal%20languages%29
|
In formal language theory, an alphabet, sometimes called a vocabulary, is a non-empty set of indivisible symbols/glyphs, typically thought of as representing letters, characters, digits, phonemes, or even words. Alphabets in this technical sense of a set are used in a diverse range of fields including logic, mathematics, computer science, and linguistics. An alphabet may have any cardinality ("size") and depending on its purpose maybe be finite (e.g., the alphabet of letters "a" through "z"), countable (e.g., ), or even uncountable (e.g., ).
Strings, also known as "words" or "sentences", over an alphabet are defined as a sequence of the symbols from the alphabet set. For example, the alphabet of lowercase letters "a" through "z" can be used to form English words like "iceberg" while the alphabet of both upper and lower case letters can also be used to form proper names like "Wikipedia". A common alphabet is {0,1}, the binary alphabet, and a "00101111" is an example of a binary string. Infinite sequence of symbols may be considered as well (see Omega language).
It is often necessary for practical purposes to restrict the symbols in an alphabet so that they are unambiguous when interpreted. For instance, if the two-member alphabet is {00,0}, a string written on paper as "000" is ambiguous because it is unclear if it is a sequence of three "0" symbols, a "00" followed by a "0", or a "0" followed by a "00".
Notation
If L is a formal language, i.e. a (possibly infinite) set of finite-length strings, the alphabet of L is the set of all symbols that may occur in any string in L.
For example, if L is the set of all variable identifiers in the programming language C, Ls alphabet is the set { a, b, c, ..., x, y, z, A, B, C, ..., X, Y, Z, 0, 1, 2, ..., 7, 8, 9, _ }.
Given an alphabet , the set of all strings of length over the alphabet is indicated by . The set of all finite strings (regardless of their length) is indicated by the Kleene star operator as , and is also
|
https://en.wikipedia.org/wiki/Quantum%20singularity
|
The term quantum singularity is used to refer to many different phenomena in fiction. They often only approximate a gravitational singularity in the scientific sense in that they are massive, localized distortions of space and time. The name invokes one of the most fundamental problems remaining in modern physics: the difficulty in uniting Einstein's theory of relativity, which includes singularities within its models of black holes, and quantum mechanics. In fact, since according to relativity, singularities, by definition, are infinitely small, and expected to be quantum mechanical by nature, a theory of quantum gravity would be required to describe their behavior. No such theory has yet been formulated.
Star Trek
A Star Trek quantum singularity is a phenomenon of multiple varieties. One such variety appears in the Star Trek: Voyager episode "Parallax" which creates a mirror image along with a temporal distortion. Voyager flies into the singularity after seeing an image of itself inside, and becomes trapped. To escape, the crew uses a shuttle to fire a tachyon beam at the entry. In the Voyager episode "Hunters", the crew discover a Hirogen relay station almost 100,000 years old, powered by a quantum singularity, also referred to by Tom Paris as a black hole. The word "tiny" being used to describe a quantum singularity, about "a centimeter" in diameter, making it relatively large, although it is more likely that the stated diameter instead refers to the singularity's event horizon. In the episode "Scorpion", Species 8472 and the Borg, make use of quantum singularities to travel to and from fluidic space.
Artificial quantum singularities are also used to power Romulan Warbirds as first described in the Star Trek: The Next Generation episode "Face of the Enemy". Additionally, in the Star Trek: Deep Space Nine episode "Visionary", the side effects from quantum singularities cause Miles O'Brien to shift through time.
Futurama
In the Futurama episode "Love and Rocket
|
https://en.wikipedia.org/wiki/Hollow%20Man%202
|
Hollow Man 2 is a 2006 American science fiction horror film directed by Claudio Fäh and starring Peter Facinelli, Laura Regan and Christian Slater. In the film, a government experiment goes wrong, leaving soldier Michael Griffin (Slater) permanently invisible. When his health starts to deteriorate, he goes after the scientists who ruined his life. It is the stand-alone sequel to the 2000 film Hollow Man, released direct-to-video on May 23, 2006.
Plot
At a cocktail party at the Reisner Institute, a Washington think tank, an invisible force drags a scientist named Devin into a nearby bathroom, where the force (implied to be a person) brutally throws Devin around for information. Devin mentions another scientist, Maggie Dalton, who knows the "formula" the invisible person is looking for. Apparently accepting this, the man releases him, warning him not to divulge information about this incident to anybody. As soon as the invisible man leaves (or rather, pretends to leave), Devin attempts to call someone on his cell phone, but the invisible man smashes the phone and slashes Devin's throat. The police arrive at the laboratory to conduct a murder investigation, but the laboratory's military supervisor, Colonel Gavin Bishop, insists it is an internal military incident and the police have no jurisdiction. Fearing attacks on the remaining scientists, the lab's owner, Dr. William Reisner, employs Frank Turner and his partner, Detective Lisa Martinez, to protect Maggie, but refuses to divulge any information on the nature of his work.
The two detectives stand guard outside Maggie's house. When Lisa opens the door to let the cat in, the invisible man sneaks past her into the house. Just as he reaches the study where Maggie is, Lisa tracks him down, and he strangles her with a lamp's power cord. Suddenly, armed military commandos appear and storm the house, using thermal goggles to target and corner the invisible man. Outside, Turner confronts Bishop, realizing that they used
|
https://en.wikipedia.org/wiki/Pleckstrin%20homology%20domain
|
Pleckstrin homology domain (PH domain) or (PHIP) is a protein domain of approximately 120 amino acids that occurs in a wide range of proteins involved in intracellular signaling or as constituents of the cytoskeleton.
This domain can bind phosphatidylinositol lipids within biological membranes (such as phosphatidylinositol (3,4,5)-trisphosphate and phosphatidylinositol (4,5)-bisphosphate), and proteins such as the βγ-subunits of heterotrimeric G proteins, and protein kinase C. Through these interactions, PH domains play a role in recruiting proteins to different membranes, thus targeting them to appropriate cellular compartments or enabling them to interact with other components of the signal transduction pathways.
Lipid binding specificity
Individual PH domains possess specificities for phosphoinositides phosphorylated at different sites within the inositol ring, e.g., some bind phosphatidylinositol (4,5)-bisphosphate but not phosphatidylinositol (3,4,5)-trisphosphate or phosphatidylinositol (3,4)-bisphosphate, while others may possess the requisite affinity. This is important because it makes the recruitment of different PH domain containing proteins sensitive to the activities of enzymes that either phosphorylate or dephosphorylate these sites on the inositol ring, such as phosphoinositide 3-kinase or PTEN, respectively. Thus, such enzymes exert a part of their effect on cell function by modulating the localization of downstream signaling proteins that possess PH domains that are capable of binding their phospholipid products.
Structure
The 3D structure of several PH domains has been determined. All known cases have a common structure consisting of two perpendicular anti-parallel beta sheets, followed by a C-terminal amphipathic helix. The loops connecting the beta-strands differ greatly in length, making the PH domain relatively difficult to detect while providing the source of the domain's specificity. The only conserved residue among PH domains is a singl
|
https://en.wikipedia.org/wiki/MedCalc
|
MedCalc is a statistical software package designed for the biomedical sciences. It has an integrated spreadsheet for data input and can import files in several formats (Excel, SPSS, CSV, ...).
MedCalc includes basic parametric and non-parametric statistical procedures and graphs such as descriptive statistics, ANOVA, Mann–Whitney test, Wilcoxon test, χ2 test, correlation, linear as well as non-linear regression, logistic regression, and multivariate statistics.
Survival analysis includes Cox regression (Proportional hazards model) and Kaplan–Meier survival analysis.
Procedures for method evaluation and method comparison include ROC curve analysis, Bland–Altman plot, as well as Deming and Passing–Bablok regression.
The software also includes reference interval estimation, meta-analysis and sample size calculations.
The first DOS version of MedCalc was released in April 1993 and the first version for Windows was available in November 1996.
Version 15.2 introduced a user-interface in English, Chinese (simplified and traditional), French, German, Italian, Japanese, Korean, Polish, Portuguese (Brazilian), Russian and Spanish.
Reviews
Stephan C, Wesseling S, Schink T, Jung K. “Comparison of eight computer programs for receiver-operating characteristic analysis.” Clinical Chemistry 2003;49:433-439.
Lukic IK. “MedCalc Version 7.0.0.2. Software Review.” Croatian Medical Journal 2003;44:120-121.
Garber C. “MedCalc Software for Statistics in Medicine. Software review.” Clinical Chemistry, 1998;44:1370.
Petrovecki M. “MedCalc for Windows. Software Review.” Croatian Medical Journal, 1997;38:178.
See also
List of statistical packages
Comparison of statistical packages
|
https://en.wikipedia.org/wiki/HelenOS
|
HelenOS is an operating system based on a multiserver microkernel design. The source code of HelenOS is written in C and published under the BSD-3-Clause license.
The system is described as a “research development open-source operating system”.
Technical overview
The microkernel handles multitasking, memory management and inter-process communication. It also provides kernel-based threads and supports symmetric multiprocessing.
Typical to microkernel design, file systems, networking, device drivers and graphical user interface are isolated from each other into a collection of user space components that communicate via a message bus.
Each process (called task) can contain several threads (preemptively scheduled by the kernel) which, in turn, can contain several fibers scheduled cooperatively in user space. Device and file-system drivers, as well as other system services, are implemented by a collection of user-space tasks (servers), creating thus the multiserver nature of HelenOS.
Tasks communicate via HelenOS IPC, which is connection oriented and asynchronous. It can be used to send small fixed-size messages, blocks of bytes or to negotiate sharing of memory. Messages can be forwarded without copying bulk data or mapping memory to the address space of middle-men tasks.
Development
HelenOS development is community-driven. The developer community consists of a small core team, mainly staff and former and contemporary students of the Faculty of Mathematics and Physics at Charles University in Prague, and a number of contributors around the world. In 2011, 2012 and 2014, HelenOS participated in the Google Summer of Code as a mentoring organization. In 2013, the project was a mentoring organization in the ESA Summer of Code in Space 2013 program.
The source code of HelenOS is published under the BSD-3-Clause license, while some third-party components are available under the GNU General Public License. Both of these licences are free software licenses, making Hele
|
https://en.wikipedia.org/wiki/Animal%20model%20of%20stroke
|
Animal models of stroke are procedures undertaken in animals (including non-human primates) intending to provoke pathophysiological states that are similar to those of human stroke to study basic processes or potential therapeutic interventions in this disease. Aim is the extension of the knowledge on and/or the improvement of medical treatment of human stroke.
Classification by cause
The term stroke subsumes cerebrovascular disorders of different etiologies, featuring diverse pathophysiological processes. Thus, for each stroke etiology one or more animal models have been developed:
Animal models of ischemic stroke
Animal models of intracerebral hemorrhage
Animal models of subarachnoid hemorrhage and cerebral vasospasm
Animal models of sinus vein thrombosis
Transferability of animal results to human stroke
Although multiple therapies have proven to be effective in animals, only very few have done so in human patients. Reasons for this are (Dirnagl 1999):
Side effects: Many highly potent neuroprotective drugs display side effects which inhibit the application of effective doses in patients (e.g. MK-801)
Delay: Whereas in animal studies the time of incidence onset is known and therapy can be started early, patients often present with delay and unclear time of symptom onset
“Age and associated illnesses: Most experimental studies are conducted on healthy, young animals under rigorously controlled laboratory conditions. However, the typical stroke patient is elderly with numerous risk factors and complicating diseases (for example, diabetes, hypertension and heart diseases)” (Dirnagl 1999)
Morphological and functional differences between the brain of humans and animals: Although the basic mechanisms of stroke are identical between humans and other mammals, there are differences.
Evaluation of efficacy: In animals, treatment effects are mostly measured as a reduction of lesion volume, whereas in human studies functional evaluation (which reflects the severity of disabi
|
https://en.wikipedia.org/wiki/Link%20%28simplicial%20complex%29
|
The link in a simplicial complex is a generalization of the neighborhood of a vertex in a graph. The link of a vertex encodes information about the local structure of the complex at the vertex.
Link of a vertex
Given an abstract simplicial complex and a vertex in , its link is a set containing every face such that and is a face of .
In the special case in which is a 1-dimensional complex (that is: a graph), contains all vertices such that is an edge in the graph; that is, the neighborhood of in the graph.
Given a geometric simplicial complex and , its link is a set containing every face such that and there is a simplex in that has as a vertex and as a face. Equivalently, the join is a face in .
As an example, suppose v is the top vertex of the tetrahedron at the left. Then the link of v is the triangle at the base of the tetrahedron. This is because, for each edge of that triangle, the join of v with the edge is a triangle (one of the three triangles at the sides of the tetrahedron); and the join of v with the triangle itself is the entire tetrahedron.
An alternative definition is: the link of a vertex is the graph constructed as follows. The vertices of are the edges of incident to . Two such edges are adjacent in iff they are incident to a common 2-cell at .
The graph is often given the topology of a ball of small radius centred at ; it is an analog to a sphere centered at a point.
Link of a face
The definition of a link can be extended from a single vertex to any face.
Given an abstract simplicial complex and any face of , its link is a set containing every face such that are disjoint and is a face of : .
Given a geometric simplicial complex and any face , its link is a set containing every face such that are disjoint and there is a simplex in that has both and as faces.
Examples
The link of a vertex of a tetrahedron is a triangle – the three vertices of the link corresponds to the three edges incident to
|
https://en.wikipedia.org/wiki/Object-oriented%20modeling
|
Object-oriented modeling (OOM) is an approach to modeling an application that is used at the beginning of the software life cycle when using an object-oriented approach to software development.
The software life cycle is typically divided up into stages going from abstract descriptions of the problem to designs then to code and testing and finally to deployment. Modeling is done at the beginning of the process. The reasons to model a system before writing the code are:
Communication. Users typically cannot understand programming language or code. Model diagrams can be more understandable and can allow users to give developers feedback on the appropriate structure of the system. A key goal of the Object-Oriented approach is to decrease the "semantic gap" between the system and the real world by using terminology that is the same as the functions that users perform. Modeling is an essential tool to facilitate achieving this goal .
Abstraction. A goal of most software methodologies is to first address "what" questions and then address "how" questions. I.e., first determine the functionality the system is to provide without consideration of implementation constraints and then consider how to take this abstract description and refine it into an implementable design and code given constraints such as technology and budget. Modeling enables this by allowing abstract descriptions of processes and objects that define their essential structure and behavior.
Object-oriented modeling is typically done via use cases and abstract definitions of the most important objects. The most common language used to do object-oriented modeling is the Object Management Group's Unified Modeling Language (UML).
See also
Object-oriented analysis and design
|
https://en.wikipedia.org/wiki/2-Phenylphenol
|
2-Phenylphenol, or o-phenylphenol, is an organic compound. In terms of structure, it is one of the monohydroxylated isomers of biphenyl. It is a white solid. It is a biocide used as a preservative with E number E231 and under the trade names Dowicide, Torsite, Fungal, Preventol, Nipacide and many others.
Uses
The primary use of 2-phenylphenol is as an agricultural fungicide. It is generally applied post-harvest. It is a fungicide used for waxing citrus fruits. It is no longer a permitted food additive in the European Union, but is still allowed as a post-harvest treatment in 4 EU countries.
It is also used for disinfection of seed boxes. It is a general surface disinfectant, used in households, hospitals, nursing homes, farms, laundries, barber shops, and food processing plants. It can be used on fibers and other materials. It is used to disinfect hospital and veterinary equipment. Other uses are in rubber industry and as a laboratory reagent. It is also used in the manufacture of other fungicides, dye stuffs, resins and rubber chemicals.
2-Phenylphenol is found in low concentrations in some household products such as spray disinfectants and aerosol or spray underarm deodorants.
The sodium salt of orthophenyl phenol, sodium orthophenyl phenol, is a preservative, used to treat the surface of citrus fruits.
Orthophenyl phenol is also used as a fungicide in food packaging and may migrate into the contents.
Preparation
It is prepared by condensation of cyclohexanone to give cyclohexenylcyclohexanone. The latter undergoes dehydrogenation to give 2-phenylphenol.
Safety
LD50 (rats) is 2700 to 3000 mg/kg.
|
https://en.wikipedia.org/wiki/Ghon%20focus
|
A Ghon focus is a primary lesion usually subpleural, often in the mid to lower zones, caused by Mycobacterium bacilli (tuberculosis) developed in the lung of a nonimmune host (usually a child). It is named for Anton Ghon (1866–1936), an Austrian pathologist.
It is a small area of granulomatous inflammation, only detectable by chest X-ray if it calcifies or grows substantially (see tuberculosis radiology). Typically these will heal, but in some cases, especially in immunosuppressed patients, it will progress to miliary tuberculosis (so named due to the granulomas resembling millet seeds on a chest X-ray).
The classical location for primary infection is surrounding the lobar fissures, either in the upper part of the lower lobe or lower part of the upper lobe.
If the Ghon focus also involves infection of adjacent lymphatics and hilar lymph nodes, it is known as the Ghon's complex or primary complex. When a Ghon's complex undergoes fibrosis and calcification it is called a Ranke complex.
|
https://en.wikipedia.org/wiki/One-electron%20universe
|
The one-electron universe postulate, proposed by theoretical physicist John Wheeler in a telephone call to Richard Feynman in the spring of 1940, is the hypothesis that all electrons and positrons are actually manifestations of a single entity moving backwards and forwards in time. According to Feynman:
A similar "zigzag world line description of pair annihilation" has been independently devised by E. C. G. Stueckelberg at the same time.
Overview
The idea is based on the world lines traced out across spacetime by every electron. Rather than have myriad such lines, Wheeler suggested that they could all be parts of one single line like a huge tangled knot, traced out by the one electron. Any given moment in time is represented by a slice across spacetime, and would meet the knotted line a great many times. Each such meeting point represents a real electron at that moment.
At those points, half the lines will be directed forward in time and half will have looped round and be directed backwards. Wheeler suggested that these backwards sections appeared as the antiparticle to the electron, the positron.
Many more electrons have been observed than positrons, and electrons are thought to comfortably outnumber them. According to Feynman he raised this issue with Wheeler, who speculated that the missing positrons might be hidden within protons.
Feynman was struck by Wheeler's insight that antiparticles could be represented by reversed world lines, and credits this to Wheeler, saying in his Nobel speech:
Feynman later proposed this interpretation of the positron as an electron moving backward in time in his 1949 paper "The Theory of Positrons". Yoichiro Nambu later applied it to all production and annihilation of particle-antiparticle pairs, stating that "the eventual creation and annihilation of pairs that may occur now and then, is no creation nor annihilation, but only a change of directions of moving particles, from past to future, or from future to past."
See also
|
https://en.wikipedia.org/wiki/Charles%20Read%20%28mathematician%29
|
Charles John Read (16 February 1958 – 14 August 2015) was a British mathematician known for his work in functional analysis. In operator theory, he is best known for his work in the 1980s on the invariant subspace problem, where he constructed operators with only trivial invariant subspaces on particular Banach spaces, especially on . He won the 1985 Junior Berwick Prize for his work on the invariant subspace problem.
Read has also published on Banach algebras and hypercyclicity; in particular, he constructed the first example of an amenable, commutative, radical Banach algebra.
Education and career
Read won a scholarship to study mathematics at Trinity College, Cambridge in October 1975, and was awarded a first-class degree in Mathematics in 1978. He completed his PhD thesis entitled Some Problems in the Geometry of Banach Spaces at the University of Cambridge under the supervision of Béla Bollobás. He spent the year 1981–82 at Louisiana State University. From 2000 until his death, he was a Professor of Pure Mathematics at the University of Leeds after having been a fellow of Trinity College for several years.
Personal life
Christianity
On his personal website, formerly hosted on a server at the University of Leeds, Read described himself first and foremost as a Born-Again Christian. Some biographical details could be found in what he described as his "Christian Testimony" on that site, where he described his conversion process.
He described losing his father to cancer in 1970 when he was 11 years old, and that this loss prompted him to ask questions about whether, and in what form, we might continue to live after we die - and that consciousness may be independent of the body. He came to the conclusion that the conscious mind must survive after death. This also led him to believe that since we are "immortal beings" that we must always try to "do the right thing".
Some time later the article described an incident where he had pushed a smaller boy out of the
|
https://en.wikipedia.org/wiki/Perilla%20oil
|
Perilla oil ( Deulgireum) is an edible vegetable oil derived from perilla seeds. Having a distinct nutty aroma and taste, the oil pressed from the toasted perilla seeds is used as a flavor enhancer, condiment, and cooking oil in Korean cuisine. The oil pressed from untoasted perilla seeds is used for non-culinary purposes.
Production
Perilla oil is obtained by pressing the seeds of perilla, which contains 38-45% lipids.
Nutrition
Perilla oil is considered a rich source of fatty acids, and contains both saturated and unsaturated fatty acids. Saturated fatty acids in perilla oil are mainly palmitic (5-7%) and stearic (1-3%). Monounsaturated fatty acids in perilla oil are oleic (12-22%), while polyunsaturated fatty acids in perilla oil are linoleic (13-20%), gamma-linolenic (0-1%), alpha-linolenic (54-64%), and arachidic (0-1%).
In comparison to other plant oils, perilla oil exhibits one of the highest proportion of omega-3 fatty acids, which is between 54 and 64%. The omega-6 fatty acid component is usually around 14%.
Use
Culinary
In Korean cuisine, perilla oil and sesame oil are the two chief oils used in flavoring, sauces, and dips. Usually made from toasted perilla seeds, the oil is used as a flavor enhancer, condiment, and cooking oil. Either sesame or perilla oil can be used for flavoring namul (vegetable side dishes) and other sides, pan-frying jeon (pan-fried dishes), coating gim (laver) before roasting it, and forming the flavor base for dipping sauce. Specifically, perilla oil is more common in the southern part of Korea as perilla is cultivated more easily in the warmer areas. Nowadays, perilla oil is used in Korean-style western food as well. A Michelin-starred restaurant in Seoul serves nutty vanilla ice cream which has perilla oil as its "secret ingredient."
Industrial
Perilla oil made from untoasted seeds can be used for non-culinary purposes, including in paint, varnish, printing ink and linoleum. As a drying oil similar to tung oil or lins
|
https://en.wikipedia.org/wiki/Perillaldehyde
|
Perillaldehyde, perillic aldehyde or perilla aldehyde, is a natural organic compound found most abundantly in the annual herb perilla, but also in a wide variety of other plants and essential oils. It is a monoterpenoid containing an aldehyde functional group.
Perillaldehyde, or volatile oils from perilla that are rich in perillaldehyde, are used as food additives for flavoring and in perfumery to add spiciness. Perillaldehyde can be readily converted to perilla alcohol, which is also used in perfumery. It has a mint-like, cinnamon odor and is primarily responsible for the flavor of perilla.
The oxime of perillaldehyde is known as perillartine or perilla sugar and is about 2000 times sweeter than sucrose and is used in Japan as a sweetener. It is presented in lower concentrations in the body odor of persons suffering from Parkinson's disease.
See also
Icosane
|
https://en.wikipedia.org/wiki/COGO
|
COGO is a suite of programs used in civil engineering for modelling horizontal and vertical alignments and solving coordinate geometry problems. Cogo alignments are used as controls for the geometric design of roads, railways, and stream relocations or restorations.
COGO was originally a subsystem of MIT's Integrated Civil Engineering System (ICES), developed in the 1960s. Other ICES subsystems included STRUDL, BRIDGE, LEASE, PROJECT, ROADS and TRANSET, and the internal languages ICETRAN and CDL. Evolved versions of COGO are still widely used.
Some basic types of elements of COGO are points, Euler spirals, lines and horizontal curves (circular arcs).
More complex elements can be developed such as alignments or chains which are made up of a combination of points, curves or spirals.
See also
Civil engineering software
|
https://en.wikipedia.org/wiki/Completeness%20%28cryptography%29
|
In cryptography, a boolean function is said to be complete if the value of each output bit depends on all input bits.
This is a desirable property to have in an encryption cipher, so that if one bit of the input (plaintext) is changed, every bit of the output (ciphertext) has an average of 50% probability of changing. The easiest way to show why this is good is the following: consider that if we changed our 8-byte plaintext's last byte, it would only have any effect on the 8th byte of the ciphertext. This would mean that if the attacker guessed 256 different plaintext-ciphertext pairs, he would always know the last byte of every 8byte sequence we send (effectively 12.5% of all our data). Finding out 256 plaintext-ciphertext pairs is not hard at all in the internet world, given that standard protocols are used, and standard protocols have standard headers and commands (e.g. "get", "put", "mail from:", etc.) which the attacker can safely guess. On the other hand, if our cipher has this property (and is generally secure in other ways, too), the attacker would need to collect 264 (~1020) plaintext-ciphertext pairs to crack the cipher in this way.
See also
Correlation immunity
Cryptography
|
https://en.wikipedia.org/wiki/Audio%20noise%20measurement
|
Audio noise measurement is a process carried out to assess the quality of audio equipment, such as the kind used in recording studios, broadcast engineering, and in-home high fidelity.
In audio equipment noise is a low-level hiss or buzz that intrudes on audio output. Every piece of equipment which the recorded signal subsequently passes through will add a certain amount of electronic noise the process of removing this and other noises is called noise reduction.
Origins of noise – the need for weighting
Microphones, amplifiers and recording systems all add some electronic noise to the signals passing through them, generally described as hum, buzz or hiss. All buildings have low-level magnetic and electrostatic fields in and around them emanating from mains supply wiring, and these can induce hum into signal paths, typically 50 Hz or 60 Hz (depending on the country's electrical supply standard) and lower harmonics. Shielded cables help to prevent this, and on professional equipment where longer interconnections are common, balanced signal connections (most often with XLR or phone connectors) are usually employed. Hiss is the result of random signals, often arising from the random motion of electrons in transistors and other electronic components, or the random distribution of oxide particles on analog magnetic tape. It is predominantly heard at high frequencies, sounding like steam or compressed air.
Attempts to measure noise in audio equipment as RMS voltage, using a simple level meter or voltmeter, do not produce useful results; a special noise-measuring instrument is required. This is because noise contains energy spread over a wide range of frequencies and levels, and different sources of noise have different spectral content. For measurements to allow fair comparison of different systems they must be made using a measuring instrument that responds in a way that corresponds to how we hear sounds. From this, three requirements follow. Firstly, it is important
|
https://en.wikipedia.org/wiki/Rasterscan
|
Rasterscan is a video game published in 1987 by Mastertronic for the ZX Spectrum, Commodore 64, Amstrad CPC, and MSX. It was written by Binary Design based in Parsonage Gardens, Manchester with the C64 version programmed by Phillip Allsopp.
Plot
The Rasterscan, a large damaged spacecraft, is drifting uncontrollably towards a nearby star. The Rasterscan can still be controlled and piloted to safety but only by a droid called MSB. Unfortunately, MSB is also damaged and (without help) can only repair toasters. The player needs to control MSB and, hopefully, use it to save the unfortunate spacecraft.
Gameplay
The player controls MSB, a spherical droid who can float through the interior of the ship in all directions. MSB can interact with the craft's machinery and instruments, which all serve a purpose. It also needs to solve logic-puzzles in order to open doors (different puzzles for each door) to allow it access to more parts of the spacecraft.
External links
Rasterscan at CPC WIKI
1987 video games
Amstrad CPC games
Binary Design games
Commodore 64 games
Mastertronic games
MSX games
Puzzle video games
Single-player video games
Video games developed in the United Kingdom
ZX Spectrum games
|
https://en.wikipedia.org/wiki/Lindisfarne%20Association
|
The Lindisfarne Association (1972–2012) was a nonprofit foundation and diverse group of intellectuals organized by cultural historian William Irwin Thompson for the "study and realization of a new planetary culture".
It was inspired by the philosophy of Alfred North Whitehead's idea of an integral philosophy of organism, and by Teilhard de Chardin's idea of planetization.
History
Thompson conceived the idea for the Lindisfarne association while touring spiritual sites and experimental communities around the world. The Lindisfarne Association is named for Lindisfarne Priory—a monastery, known for the Lindisfarne Gospels, founded on the British island of Lindisfarne in the 7th century.
Advertising executive Gene Fairly had just left his position at Interpublic Group of Companies and begun studying Zen Buddhism when he read a review of Thompson's At the Edge of History in the New York Times. Fairly visited Thompson at York University in Toronto to discuss forming a group for the promotion of planetary culture. Upon returning to New York he raised $150,000 from such donors as Nancy Wilson Ross and Sydney and Jean Lanier. Support from these donors served as an entrée to the Rockefeller Brothers Fund.
Incorporation and first years in New York
Lindisfarne was incorporated as a non-profit educational foundation in December 1972. It began operations at a refitted summer camp in Southampton, New York on August 31, 1973.
From 1974–1977 Lindisfarne held an annual conference "to explore the new planetary culture" with the following themes:
Planetary Culture and the New Image of Humanity, 1974
Conscious Evolution and the Evolution of Consciousness, 1975
A Light Governance for America: the Cultures and Strategies of Decentralization, 1976
Mind in Nature, 1977
Earth's answer : explorations of planetary culture at the Lindisfarne conferences (1977) reprints some of the lectures given at the 1974 and 1975 conferences.
The Lindisfarne Association was first based in South
|
https://en.wikipedia.org/wiki/Nuchal%20lines
|
The nuchal lines are four curved lines on the external surface of the occipital bone:
The upper, often faintly marked, is named the highest nuchal line, but is sometimes referred to as the Mempin line or linea suprema, and it attaches to the epicranial aponeurosis.
Below the highest nuchal line is the superior nuchal line. To it is attached, the splenius capitis muscle, the trapezius muscle, and the occipitalis.
From the external occipital protuberance a ridge or crest, the external occipital crest also called the median nuchal line, often faintly marked, descends to the foramen magnum, and affords attachment to the nuchal ligament.
Running from the middle of this line is the inferior nuchal line. Attached are the obliquus capitis superior muscle, rectus capitis posterior major muscle, and rectus capitis posterior minor muscle.
Additional images
|
https://en.wikipedia.org/wiki/Respiratory%20quotient
|
The respiratory quotient (RQ or respiratory coefficient) is a dimensionless number used in calculations of basal metabolic rate (BMR) when estimated from carbon dioxide production. It is calculated from the ratio of carbon dioxide produced by the body to oxygen consumed by the body. Such measurements, like measurements of oxygen uptake, are forms of indirect calorimetry. It is measured using a respirometer. The respiratory quotient value indicates which macronutrients are being metabolized, as different energy pathways are used for fats, carbohydrates, and proteins. If metabolism consists solely of lipids, the respiratory quotient is approximately 0.7, for proteins it is approximately 0.8, and for carbohydrates it is 1.0. Most of the time, however, energy consumption is composed of both fats and carbohydrates. The approximate respiratory quotient of a mixed diet is 0.8. Some of the other factors that may affect the respiratory quotient are energy balance, circulating insulin, and insulin sensitivity.
It can be used in the alveolar gas equation.
Calculation
The respiratory quotient (RQ) is the ratio:
RQ = CO2 eliminated / O2 consumed
where the term "eliminated" refers to carbon dioxide (CO2) removed from the body.
In this calculation, the CO2 and O2 must be given in the same units, and in quantities proportional to the number of molecules. Acceptable inputs would be either moles, or else volumes of gas at standard temperature and pressure.
Many metabolized substances are compounds containing only the elements carbon, hydrogen, and oxygen. Examples include fatty acids, glycerol, carbohydrates, deamination products, and ethanol. For complete oxidation of such compounds, the chemical equation is
CxHyOz + (x + y/4 - z/2) O2
→ x CO2 + (y/2) H2O
and thus metabolism of this compound gives an RQ of x/(x + y/4 - z/2).
For glucose, with the molecular formula, C6H12O6, the complete oxidation equation is C6H12O6 + 6 O2
→ 6 CO2 + 6 H2O. Thus, the RQ= 6 CO2/ 6 O2=1.
Fo
|
https://en.wikipedia.org/wiki/Superior%20thyroid%20artery
|
The superior thyroid artery arises from the external carotid artery just below the level of the greater cornu of the hyoid bone and ends in the thyroid gland.
Structure
From its origin under the anterior border of the sternocleidomastoid the superior thyroid artery runs upward and forward for a short distance in the carotid triangle, where it is covered by the skin, platysma, and fascia; it then arches downward beneath the omohyoid, sternohyoid, and sternothyroid muscles.
To its medial side are the inferior pharyngeal constrictor muscle and the external branch of the superior laryngeal nerve.
Branches
It distributes twigs to the adjacent muscles, and numerous branches to the thyroid gland, connecting with its fellow of the opposite side, and with the inferior thyroid arteries. The branches to the gland are generally two in number. One, the larger, supplies principally the anterior surface; on the isthmus of the gland it connects with the corresponding artery of the opposite side. A second branch descends on the posterior surface of the gland and anastomoses with the inferior thyroid artery.
Besides the arteries distributed to the muscles and to the thyroid gland, the branches of the superior thyroid are:
The infrahyoid branch (or hyoid artery): a small artery that runs along the lower border of the hyoid bone beneath the thyrohyoid muscle. This artery connects with the infrahyoid branch of the opposite side. The infrahyoid branch is a derivative of the second aortic arch.
The sternocleidomastoid branch runs downward and laterally across the sheath of the common carotid artery, and supplies the sternocleidomastoideus muscle and neighboring muscles and skin; it frequently arises as a separate branch from the external carotid artery.
The superior laryngeal artery accompanies the internal laryngeal branch of the superior laryngeal nerve, beneath the thyrohyoid muscle. This artery branches from the superior thyroid artery near its bifurcation from the external caro
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.