source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Hemopoietic%20growth%20factor
Hemopoietic growth factors regulate the differentiation and proliferation of particular progenitor cells. Made available through recombinant DNA technology, they hold tremendous potential for medical uses when a person's natural ability to form blood cells is diminished or defective. Recombinant erythropoietin (EPO) is very effective in treating the diminished red blood cell production that accompanies end-stage kidney disease. Erythropoietin is a sialoglycoprotein hormone produced by peritubular cells of kidney. Granulocyte-macrophage colony-stimulating factor and granulocyte CSF are given to stimulate white blood cell formation in cancer patients who are receiving chemotherapy, which tends to kill their red bone marrow cells as well as the cancer cells. Thrombopoietin shows great promise for preventing platelet depletion during chemotherapy. CSFs and thrombopoietin also improve the outcome of patients who receive bone marrow transplants. Types Erythropoietin is a glycoprotein hormone secreted by the interstitial fibroblast cells of the kidneys in response to low oxygen levels. It prompts the production of erythrocytes. Thrombopoietin, another glycoprotein hormone, is produced by the liver and kidneys. It triggers the development of megakaryocytes into platelets. Cytokines are glycoproteins secreted by a wide variety of cells, including red bone marrow, leukocytes, macrophages, fibroblasts, and endothelial cells. They act locally as autocrine or paracrine factors, stimulating the proliferation of progenitor cells and helping to stimulate both nonspecific and specific resistance to disease. There are two major subtypes of cytokines known as colony-stimulating factors and interleukins. Colony-stimulating factors are glycoproteins that act locally, as autocrine or paracrine factors. Some trigger the differentiation of myeloblasts into granular leukocytes, namely, neutrophils, eosinophils, and basophils. These are referred to as granulocyte CSFs. A differen
https://en.wikipedia.org/wiki/Society%20for%20Indecency%20to%20Naked%20Animals
The Society for Indecency to Naked Animals, or SINA [pronounced "sinna"], was a satirical hoax concocted by serial prankster Alan Abel. The group used the language and rhetoric of conservative moralists for the ostensible aim of clothing "indecent" naked animals, including domestic pets, barnyard animals, and large wildlife. The society and its aims were then largely presented in the public arena on news and talk shows by comedian/improviser Buck Henry (in the guise of SINA president "G. Clifford Prout") from 1959 through 1963. History In 1959, Alan Abel wrote a satirical story about an imaginary organization for The Saturday Evening Post but the editors rejected it. Abel then transformed his story into a series of press releases from the organization that garnered media attention. Looking to expand the range and impact of the hoax, Abel persuaded the actor Buck Henry to assume the role of the group president, G. Clifford Prout, Jr., in U.S. television news and talk show appearances. Henry, who had improv training, was able to play Prout with an intense deadpan sincerity, as well as to stay in character through unscripted interviews. During the interviews, Prout was often presented as an amusing eccentric, but was otherwise taken seriously by the broadcasters who interviewed him. Abel (seen far less frequently) played the group's executive vice-president Bruce Spencer. Over time, the history of SINA and some of its specific aims were codified into a coherent (if unlikely) backstory. The group had been founded some years before by G. Clifford Prout, Sr., and was being carried on by his son. An alleged debate within SINA was how large an animal had to be to require clothing; the official position quoted by Prout was "any dog, cat, horse or cow that stands higher than 4 inches or longer than 6 inches." Slogans such as "Decency today means morality tomorrow" and "A nude horse is a rude horse" were offered. The group received widespread American media cove
https://en.wikipedia.org/wiki/AT%26T%20CallVantage
AT&T CallVantage was a voice over Internet Protocol telephone service first offered in 2004 by AT&T Corp., upon the heels of its announcement that it would stop seeking traditional local and long-distance landline customers. Renaming After SBC Communications purchased AT&T Corp. in 2005 and renamed itself AT&T Inc., CallVantage was offered as an option with AT&T Yahoo! DSL service, formerly known as SBC Yahoo! DSL. Competition AT&T CallVantage competed with other VoIP providers, such as Vonage. When AT&T U-verse Voice was unveiled January 28, 2008, AT&T continued to market CallVantage to customers without U-verse, particularly customers outside AT&T's local phone service territory. However, AT&T suspended new business later in 2008 "to evaluate CallVantage service." In a letter dated April 17, 2009, AT&T notified all existing CallVantage subscribers that the service would be discontinued and no longer available later in 2009, which occurred October 20, 2009.
https://en.wikipedia.org/wiki/Run-on
In hydrology, run-on refers to surface runoff from an external area that flows on to an area of interest. A portion of run-on can infiltrate once it reaches the area of interest. Run-on is common in arid and semi-arid areas with patchy vegetation cover and short but intense thunderstorms. In these environments, surface runoff is usually generated by a failure of rainfall to infiltrate into the ground quickly enough (this runoff is termed infiltration excess overland flow). This is more likely to occur on bare soil, with low infiltration capacity. As runoff flows downslope, it may run-on to ground with higher infiltration capacity (such as beneath vegetation) and then infiltrate. Run-on is an important process in the hydrological and ecohydrological behaviour of semi-arid ecosystems. Tiger bush is an example of a vegetation community that develops a patterned structure in response to, in part, the generation of runoff and run-on. See also Stormwater
https://en.wikipedia.org/wiki/Macropore
In soil, macropores are defined as cavities that are larger than 75 μm. Functionally, pores of this size host preferential soil solution flow and rapid transport of solutes and colloids. Macropores increase the hydraulic conductivity of soil, allowing water to infiltrate and drain quickly, and shallow groundwater to move relatively rapidly via lateral flow. In soil, macropores are created by plant roots, soil cracks, soil fauna, and by aggregation of soil particles into peds. Macropores may be defined differently in other contexts. Within the context of porous solids (i.e., not porous aggregations such as soil), colloid and surface chemists define macropores as cavities that are larger than 50 nm. See also Characterisation of pore space in soil Nanoporous materials
https://en.wikipedia.org/wiki/Curcuma%20amada
Curcuma amada, or mango ginger is a plant of the ginger family Zingiberaceae and is closely related to turmeric (Curcuma longa). The rhizomes are very similar to common ginger but lack its pungency, and instead have a raw mango flavour. Taxonomy The taxonomy of the species is a subject of some confusion as some authorities have considered the name Curcuma mangga as identical while others describe it as a distinct species with C. mangga being found in southern India while C. amada is of east Indian origin. Uses Mango-ginger is a popular spice and vegetable due to its rich flavor, which is described as sweet with subtle earthy floral and pepper overtones and similar to that of raw mango. It is used as an addition to salads and stir fries, in South Asian and Southeast Asian as well as Far East Asian cuisines. Mango ginger are used in making pickles in south India and chutneys in north India. It is served as chutney in community feasts in Nepal's southern plains. Mango ginger and elephant foot yam pickle is popular in Nepal's southern plains.
https://en.wikipedia.org/wiki/Alternant%20matrix
In linear algebra, an alternant matrix is a matrix formed by applying a finite list of functions pointwise to a fixed column of inputs. An alternant determinant is the determinant of a square alternant matrix. Generally, if are functions from a set to a field , and , then the alternant matrix has size and is defined by or, more compactly, . (Some authors use the transpose of the above matrix.) Examples of alternant matrices include Vandermonde matrices, for which , and Moore matrices, for which . Properties The alternant can be used to check the linear independence of the functions in function space. For example, let and choose . Then the alternant is the matrix and the alternant determinant is Therefore M is invertible and the vectors form a basis for their spanning set: in particular, and are linearly independent. Linear dependence of the columns of an alternant does not imply that the functions are linearly dependent in function space. For example, let and choose . Then the alternant is and the alternant determinant is 0, but we have already seen that and are linearly independent. Despite this, the alternant can be used to find a linear dependence if it is already known that one exists. For example, we know from the theory of partial fractions that there are real numbers A and B for which Choosing and we obtain the alternant . Therefore, is in the nullspace of the matrix: that is, . Moving to the other side of the equation gives the partial fraction decomposition If and for any then the alternant determinant is zero (as a row is repeated). If and the functions are all polynomials, then divides the alternant determinant for all In particular, if V is a Vandermonde matrix, then divides such polynomial alternant determinants. The ratio is therefore a polynomial in called the bialternant. The Schur polynomial is classically defined as the bialternant of the polynomials . Applications Alternant matrices are used in c
https://en.wikipedia.org/wiki/Stifle%20joint
The stifle joint (often simply stifle) is a complex joint in the hind limbs of quadruped mammals such as the sheep, horse or dog. It is the equivalent of the human knee and is often the largest synovial joint in the animal's body. The stifle joint joins three bones: the femur, patella, and tibia. The joint consists of three smaller ones: the femoropatellar joint, medial joint, and lateral femorotibial joint. The stifle joint consists of the femorotibial articulation (femoral and tibial condyles), femoropatellar articulation (femoral trochlea and the patella), and the proximal articulation. The joint is stabilized by paired collateral ligaments which act to prevent abduction/adduction at the joint, as well as paired cruciate ligaments. The cranial cruciate ligament and the caudal cruciate ligament restrict cranial and caudal translation (respectively) of the tibia on the femur. The cranial cruciate also resists over-extension and inward rotation, and is the most commonly damaged stifle ligament in dogs. "Cushioning" of the joint is provided by two C-shaped pieces of cartilage called menisci which sit between the medial and lateral condyles of the distal femur and the tibial plateau. The main biomechanical function of the menisci is probably to divide the joint into two functional units—the "femoromeniscal joint" for flexion/extension movements and the "meniscotibial joint" for rotation—a function analogous to that of the disc dividing the temporomandibular (jaw) joint. The menisci also contain nerve endings which are used to assist in proprioception. The menisci are attached via a variety of ligaments: two ligaments for each meniscus, the from the lateral meniscus to the femur, the from the medial meniscus to the medial collateral ligament, and the transverse ligament (or ) which runs between the two menisci. There are between one and four sesamoid bones associated with the stifle joint in different species. These sesamoids assist with the smooth movement
https://en.wikipedia.org/wiki/V%C3%ADctor%20Neumann-Lara
Víctor Neumann-Lara (1933–2004) was a Mexican mathematician and a pioneer in the field of graph theory in Mexico. His work also covers general topology, game theory and combinatorics. Biography Born in the city of Huejutla de Reyes, Hidalgo, Mexico, he soon moved to Mexico City, where he received his bachelor's degree in mathematics from the School of Sciences, UNAM. His life was greatly devoted to teaching, giving over 100 courses in Mexico and around the world, and introducing new teaching methods. He carried color chalks with him all the time, and was prompt to give graphic explanations. Work Full Professor at Institute of Mathematics, UNAM, he directed over 15 theses and taught both in the Institute and in the Faculty of Sciences. Below is a selection of his multiple publications, which earned him over 120 citations from renowned mathematicians in the area of graph theory. In 1982 he introduced the notion of dichromatic number of a digraph, which will eventually be used in kernel theory and tournament theory. Selected publications Francisco Larrión, Víctor Neumann-Lara, Miguel A. Pizaña, Thomas Dale Porter "A hierarchy of self-clique graphs" Discrete Mathematics 282(1–3): 193–208 (2004) M. E. Frías-Armenta, Víctor Neumann-Lara, Miguel A. Pizaña "Dismantlings and iterated clique graphs" Discrete Mathematics 282(1–3): 263–265 (2004) Xueliang Li, Víctor Neumann-Lara, Eduardo Rivera-Campo "On a tree graph defined by a set of cycles" Discrete Mathematics 271(1–3): 303–310 (2003) Juan José Montellano-Ballesteros, Víctor Neumann-Lara "An Anti-Ramsey Theorem" Combinatorica 22(3): 445–449 (2002) Francisco Larrión, Víctor Neumann-Lara "On clique divergent graphs with linear growth" Discrete Mathematics 245(1–3): 139–153 (2002) Francisco Larrión, Víctor Neumann-Lara, Miguel A. Pizaña "Whitney triangulations, local girth and iterated clique graphs" Discrete Mathematics 258(1–3): 123–135 (2002) Francisco Larrión, Víctor Neumann-Lara, Miguel A. Pizaña "On the hom
https://en.wikipedia.org/wiki/Burusho%20people
The Burusho, or Brusho, also known as the Hunzukuch, are an ethnolinguistic group indigenous to the Yasin, Hunza, Nagar, and other valleys of Gilgit–Baltistan in northern Pakistan, with a tiny minority of around 350 Burusho people residing in Jammu and Kashmir, India. Their language, Burushaski, has been classified as a language isolate. History Although their origins are unknown, it is claimed that the Burusho people "were indigenous to northwestern India and were pushed higher into the mountains by the movements of the Indo-Aryans, who traveled southward sometime around 1800 B.C." Prior to the modern era, the area in which most Burusho now live was part of the princely state of Hunza under the British Raj, until becoming part of Pakistan. Culture The Burusho are known for their love of music and dance, along with their progressive views towards education and women. Longevity myth A widely repeated claim of remarkable longevity of the Hunza people has been refuted as a longevity myth, citing a life expectancy of 53 years for men and 52 for women, although with a high standard deviation. There is no evidence that Hunza life expectancy is significantly above the average of poor, isolated regions of Pakistan. Claims of health and long life were almost always based solely on the statements by the local mir (king). An author who had significant and sustained contact with Burusho people, John Clark, reported that they were overall unhealthy. Jammu and Kashmir A group of 350 Burusho people also reside in the Indian union territory of Jammu and Kashmir, being mainly concentrated in Batamalu, as well as in Botraj Mohalla, which is southeast of Hari Parbat. This Burusho community is descended from two former princes of the British Indian princely states of Hunza and Nagar, who with their families, migrated to this region in the 19th century A.D. They are known as the Botraj by other ethnic groups in the state, and practice Shiite Islam. Arranged marriages are custom
https://en.wikipedia.org/wiki/Capsa%20%28software%29
Capsa is the name for a family of packet analyzers developed by Colasoft for network administrators to monitor, troubleshoot and analyze wired & wireless networks. The company provides a free edition for individuals, but paid licenses are available for businesses and enterprises. The software includes Ethernet packet analysis, diagnostics and a security monitoring system.
https://en.wikipedia.org/wiki/Pintos
Pintos is computer software, a simple instructional operating system framework for the x86 instruction set architecture. It supports kernel threads, loading and running user programs, and a file system, but it implements all of these in a very simple way. Pintos is currently used by multiple institutions, including UT Austin, UC Berkeley and Imperial College London, as an academic aid in Operating Systems class curriculums. History It was created at Stanford University by Ben Pfaff in 2004. It originated as a replacement for Not Another Completely Heuristic Operating System (Nachos), a similar system originally developed at UC Berkeley by Thomas E. Anderson, and was designed along similar lines. Comparison to Nachos Like Nachos, Pintos is intended to introduce undergraduates to concepts in operating system design and implementation by requiring them to implement significant portions of a real operating system, including thread and memory management and file system access. Pintos also teaches students valuable debugging skills. Unlike Nachos, Pintos can run on actual x86 hardware, though it is often run atop an x86 emulator, such as Bochs or QEMU. Nachos, by contrast, runs as a user process on a host operating system, and targets the MIPS architecture (Nachos code must run atop a MIPS simulator). Pintos and its accompanying assignments are also written in the programming language C instead of C++ (used for original Nachos) or Java (used for Nachos 5.0j).
https://en.wikipedia.org/wiki/Histone%20H2A
Histone H2A is one of the five main histone proteins involved in the structure of chromatin in eukaryotic cells. The other histone proteins are: H1, H2B, H3 and H4. Background Histones are proteins that package DNA into nucleosomes. Histones are responsible for maintaining the shape and structure of a nucleosome. One chromatin molecule is composed of at least one of each core histones per 100 base pairs of DNA. There are five families of histones known to date; these histones are termed H1/H5, H2A, H2B, H3, and H4. H2A is considered a core histone, along with H2B, H3 and H4. Core formation first occurs through the interaction of two H2A molecules. Then, H2A forms a dimer with H2B; the core molecule is complete when H3-H4 also attaches to form a tetramer. Sequence variants Histone H2A is composed of non-allelic variants. The term "Histone H2A" is intentionally non-specific and refers to a variety of closely related proteins that vary often by only a few amino acids. Apart from the canonical form, notable variants include H2A.1, H2A.2, H2A.X, and H2A.Z. H2A variants can be explored using "HistoneDB with Variants" database Changes in variant composition occur in differentiating cells. This was observed in differentiating neurons during synthesis and turnover; changes in variant composition were seen among the H2A.1 histone. The only variant that remained constant in the neural differentiation was variant H2A.Z. H2A.Z is a variant that exchanges with conventional H2A core protein; this variant is important for gene silencing. Physically, there are small changes on the surface area of the nucleosome that make the histone differ from H2A. Recent research suggests that H2AZ is incorporated into the nucleosome using a Swr1, a Swi2/Snf2- related adenosine triphosphatase. Another H2A variant that has been identified is H2AX. This variant has a C-terminal extension that is utilized for DNA repair. The method of repair this variant employs is non-homologous end joinin
https://en.wikipedia.org/wiki/Histone%20H2B
Histone H2B is one of the 5 main histone proteins involved in the structure of chromatin in eukaryotic cells. Featuring a main globular domain and long N-terminal and C-terminal tails, H2B is involved with the structure of the nucleosomes. Structure Histone H2B is a lightweight structural protein made of 126 amino acids. Many of these amino acids have a positive charge at cellular pH, which allows them to interact with the negatively charged phosphate groups in DNA. Along with a central globular domain, histone H2B has two flexible histone tails that extend outwards – one at the N-terminal end and one at C-terminal end. These are highly involved in condensing chromatin from the beads-on-a-string conformation to a 30-nm fiber. Similar to other histone proteins, histone H2B has a distinct histone fold that is optimized for histone-histone as well as histone-DNA interactions. Two copies of histone H2B come together with two copies each of histone H2A, histone H3, and histone H4 to form the octamer core of the nucleosome to give structure to DNA. To facilitate this formation, histone H2B first binds to histone H2A to form a heterodimer. Two of these heterodimers then bind together with a heterotetramer made of histone H3 and histone H4, giving the nucleosome its characteristic disk shape. DNA is then wrapped around the entire nucleosome in groups of approximately 160 base pairs of DNA. The wrapping continues until all chromatin has been packaged with the nucleosomes. Function Histone H2B is a structural protein that helps organize eukaryotic DNA. It plays an important role in the biology of the nucleus where it is involved in the packaging and maintaining of chromosomes, regulation of transcription, and replication and repair of DNA. Histone H2B helps regulate chromatin structure and function through post-translational modifications and specialized histone variants. Acetylation and ubiquitination are examples of two post-translational modifications that affect
https://en.wikipedia.org/wiki/Chronic%20condition
A chronic condition (also known as chronic disease or chronic illness) is a health condition or disease that is persistent or otherwise long-lasting in its effects or a disease that comes with time. The term chronic is often applied when the course of the disease lasts for more than three months. Common chronic diseases include diabetes, functional gastrointestinal disorder, eczema, arthritis, asthma, chronic obstructive pulmonary disease, autoimmune diseases, genetic disorders and some viral diseases such as hepatitis C and acquired immunodeficiency syndrome. An illness which is lifelong because it ends in death is a terminal illness. It is possible and not unexpected for an illness to change in definition from terminal to chronic. Diabetes and HIV for example were once terminal yet are now considered chronic due to the availability of insulin for diabetics and daily drug treatment for individuals with HIV which allow these individuals to live while managing symptoms. In medicine, chronic conditions are distinguished from those that are acute. An acute condition typically affects one portion of the body and responds to treatment. A chronic condition, on the other hand, usually affects multiple areas of the body, is not fully responsive to treatment, and persists for an extended period of time. Chronic conditions may have periods of remission or relapse where the disease temporarily goes away, or subsequently reappears. Periods of remission and relapse are commonly discussed when referring to substance abuse disorders which some consider to fall under the category of chronic condition. Chronic conditions are often associated with non-communicable diseases which are distinguished by their non-infectious causes. Some chronic conditions though, are caused by transmissible infections such as HIV/AIDS. 63% of all deaths worldwide are from chronic conditions. Chronic diseases constitute a major cause of mortality, and the World Health Organization (WHO) attributes 38
https://en.wikipedia.org/wiki/Caloron
In mathematical physics, a caloron is the finite temperature generalization of an instanton. Finite temperature and instantons At zero temperature, instantons are the name given to solutions of the classical equations of motion of the Euclidean version of the theory under consideration, and which are furthermore localized in Euclidean spacetime. They describe tunneling between different topological vacuum states of the Minkowski theory. One important example of an instanton is the BPST instanton, discovered in 1975 by Belavin, Polyakov, Schwartz and Tyupkin. This is a topologically stable solution to the four-dimensional SU(2) Yang–Mills field equations in Euclidean spacetime (i.e. after Wick rotation). Finite temperatures in quantum field theories are modeled by compactifying the imaginary (Euclidean) time (see thermal quantum field theory). This changes the overall structure of spacetime, and thus also changes the form of the instanton solutions. According to the Matsubara formalism, at finite temperature, the Euclidean time dimension is periodic, which means that instanton solutions have to be periodic as well. In SU(2) Yang–Mills theory In SU(2) Yang–Mills theory at zero temperature, the instantons have the form of the BPST instanton. The generalization thereof to finite temperature has been found by Harrington and Shepard: where is the anti-'t Hooft symbol, r is the distance from the point x to the center of the caloron, ρ is the size of the caloron, is the Euclidean time and T is the temperature. This solution was found based on a periodic multi-instanton solution first suggested by 't Hooft and published by Witten.
https://en.wikipedia.org/wiki/Kurt%20Mahler
Kurt Mahler FRS (26 July 1903, Krefeld, Germany – 25 February 1988, Canberra, Australia) was a German mathematician who worked in the fields of transcendental number theory, diophantine approximation, p-adic analysis, and the geometry of numbers. Career Mahler was a student at the universities in Frankfurt and Göttingen, graduating with a Ph.D. from Johann Wolfgang Goethe University of Frankfurt am Main in 1927; his advisor was Carl Ludwig Siegel. He left Germany with the rise of Adolf Hitler and accepted an invitation by Louis Mordell to go to Manchester. However, at the start of World War II he was interned as an enemy alien in Central Camp in Douglas, Isle of Man, where he met Kurt Hirsch, although he was released after only three months. He became a British citizen in 1946. Mahler held the following positions: University of Groningen Assistant 1934–1936 University of Manchester Assistant Lecturer at 1937–1939, 1941–1944 Lecturer, 1944–1947; Senior Lecturer, 1948–1949; Reader, 1949–1952 Professor of Mathematical Analysis, 1952–1963 Professor of Mathematics, Institute of Advanced Studies, Australian National University, 1963–1968 and 1972–1975 Professor of Mathematics, Ohio State University, USA, 1968–1972 Professor Emeritus, Australian National University, from 1975. Research Mahler worked in a broad variety of mathematical disciplines, including transcendental number theory, diophantine approximation, p-adic analysis, and the geometry of numbers. Mahler proved that the Prouhet–Thue–Morse constant and the Champernowne constant 0.1234567891011121314151617181920... are transcendental numbers. Mahler was the first to give an irrationality measure for pi, in 1953. Although some have suggested the irrationality measure of pi is likely to be 2, the current best estimate is 7.103205334137…, due to Doron Zeilberger and Wadim Zudilin. Awards He was elected a member of the Royal Society in 1948 and a member of the Australian Academy of Science in 1965. He was
https://en.wikipedia.org/wiki/List%20of%20rail%20transport%20modelling%20scale%20standards
This page lists the most relevant model railway scale standards in the world. Most standards are regional, but some have followers in other parts of the world outside their native region, most notably NEM and NMRA. While the most significant standardised dimension of a model railway scale is the gauge, a typical scale standard covers many more aspects of model railways and defines scale-specific dimensions for items like catenary, rolling stock wheels, loading gauge, curve radii and grades for slopes, for instance. Scale standards NEM MOROP (the European federation of national model railway associations) is a European organisation which publishes NEM-standards. NEM-standards are used by model railway industry and hobbyists in Europe. The standards are published in French and German and both versions have an official status. Unofficial translations in English from third parties exist for certain NEM-standard sheets. Model railway scales and gauges are standardized in NEM 010, which covers several gauges for each scale. Narrow gauges are indicated by an additional letter added after the base scale as follows: no letter = standard gauge () m = metre gauge () e = narrow gauge () i = industrial () p = park railway () For instance, a metre-gauge model railway in H0-scale is designated H0m. In German text the letter "f" (for ) is sometimes used instead of "i". The letter "e" represents the French word for "narrow", . NEM gauges are arranged conveniently to use the normal gauge of smaller scales as narrow gauges for a certain scale. For instance, H0m gauge is the same as the TT-scale normal gauge, H0e same as the N-scale normal gauge and H0i same as the Z-scale normal gauge. For H0 and 0 scales, NEM uses the number zero, and NMRA uses letter "O" (HO instead of H0). NMRA The NMRA (National Model Railroad Association) standardized the first model railway scales in the 1940s. NMRA standards are used widely in North America and by certain special interest groups all
https://en.wikipedia.org/wiki/ZRTP
ZRTP (composed of Z and Real-time Transport Protocol) is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end points in a Voice over IP (VoIP) phone telephony call based on the Real-time Transport Protocol. It uses Diffie–Hellman key exchange and the Secure Real-time Transport Protocol (SRTP) for encryption. ZRTP was developed by Phil Zimmermann, with help from Bryce Wilcox-O'Hearn, Colin Plumb, Jon Callas and Alan Johnston and was submitted to the Internet Engineering Task Force (IETF) by Zimmermann, Callas and Johnston on March 5, 2006 and published on April 11, 2011 as . Overview ZRTP ("Z" is a reference to its inventor, Zimmermann; "RTP" stands for Real-time Transport Protocol) is described in the Internet Draft as a "key agreement protocol which performs Diffie–Hellman key exchange during call setup in-band in the Real-time Transport Protocol (RTP) media stream which has been established using some other signaling protocol such as Session Initiation Protocol (SIP). This generates a shared secret which is then used to generate keys and salt for a Secure RTP (SRTP) session." One of ZRTP's features is that it does not rely on SIP signaling for the key management, or on any servers at all. It supports opportunistic encryption by auto-sensing if the other VoIP client supports ZRTP. This protocol does not require prior shared secrets or rely on a Public key infrastructure (PKI) or on certification authorities, in fact ephemeral Diffie–Hellman keys are generated on each session establishment: this allows the complexity of creating and maintaining a trusted third-party to be bypassed. These keys contribute to the generation of the session secret, from which the session key and parameters for SRTP sessions are derived, along with previously shared secrets (if any): this gives protection against man-in-the-middle (MiTM) attacks, so long as the attacker was not present in the first session between the two endpoints. ZRTP can be u
https://en.wikipedia.org/wiki/Haldane%20effect
The Haldane effect is a property of hemoglobin first described by John Scott Haldane, within which oxygenation of blood in the lungs displaces carbon dioxide from hemoglobin, increasing the removal of carbon dioxide. Consequently, oxygenated blood has a reduced affinity for carbon dioxide. Thus, the Haldane effect describes the ability of hemoglobin to carry increased amounts of carbon dioxide (CO2) in the deoxygenated state as opposed to the oxygenated state. Vice versa, it is true that a high concentration of CO2 facilitates dissociation of oxyhemoglobin, though this is the result of two distinct processes (Bohr effect and Margaria-Green effect) and should be distinguished from Haldane effect. Carbaminohemoglobin Carbon dioxide travels through the blood in three different ways. One of these ways is by binding to amino groups, creating carbamino compounds. Amino groups are available for binding at the N-terminals and at side-chains of arginine and lysine residues in hemoglobin. When carbon dioxide binds to these residues carbaminohemoglobin is formed. This amount of carbaminohemoglobin formed is inversely proportional to the amount of oxygen attached to hemoglobin. Thus, at lower oxygen saturation, more carbaminohemoglobin is formed. These dynamics explain the relative difference in hemoglobin's affinity for carbon dioxide depending on oxygen levels known as the Haldane effect. Buffering Histidine residues in hemoglobin can accept protons and act as buffers. Deoxygenated hemoglobin is a better proton acceptor than the oxygenated form. In red blood cells, the enzyme carbonic anhydrase catalyzes the conversion of dissolved carbon dioxide to carbonic acid, which rapidly dissociates to bicarbonate and a free proton: CO2 + H2O → H2CO3 → H+ + HCO3− By Le Chatelier's principle, anything that stabilizes the proton produced will cause the reaction to shift to the right, thus the enhanced affinity of deoxyhemoglobin for protons enhances synthesis of bicarbonate and accord
https://en.wikipedia.org/wiki/Sum-product%20number
A sum-product number in a given number base is a natural number that is equal to the product of the sum of its digits and the product of its digits. There are a finite number of sum-product numbers in any given base . In base 10, there are exactly four numbers : 0, 1, 135, and 144. Definition Let be a natural number. We define the sum-product function for base , , to be the following: where is the number of digits in the number in base , and is the value of each digit of the number. A natural number is a number if it is a fixed point for , which occurs if . The natural numbers 0 and 1 are trivial numbers for all , and all other numbers are nontrivial numbers. For example, the number 144 in base 10 is a sum-product number, because , , and . A natural number is a sociable sum-product number if it is a periodic point for , where for a positive integer , and forms a cycle of period . A number is a sociable number with , and an amicable number is a sociable number with All natural numbers are preperiodic points for , regardless of the base. This is because for any given digit count , the minimum possible value of is and the maximum possible value of is The maximum possible digit sum is therefore and the maximum possible digit product is Thus, the function value is This suggests that or dividing both sides by , Since this means that there will be a maximum value where because of the exponential nature of and the linearity of Beyond this value , always. Thus, there are a finite number of numbers, and any natural number is guaranteed to reach a periodic point or a fixed point less than making it a preperiodic point. The number of iterations needed for to reach a fixed point is the function's persistence of , and undefined if it never reaches a fixed point. Any integer shown to be a sum-product number in a given base must, by definition, also be a Harshad number in that base. Sum-product numbers and cycles of Fb for specif
https://en.wikipedia.org/wiki/EKA1
EKA1 (EPOC Kernel Architecture 1) is the first-generation kernel for the operating system Symbian OS. EKA1 originated in the earlier operating system EPOC. It offers preemptive computer multitasking and memory protection, but no real-time computing guarantees, and a single-threaded device driver model. It was largely been superseded by EKA2. Much of EKA1 was developed by a single software engineer, Colly Myers, when he was working for Psion Software in the early 1990s. Myers went on to act as CEO for Symbian Ltd., when it was formed to license this kernel and associated operating system to mobile phone makers. He is now CEO of Issuebits Ltd. See also Psion (company) Operating system kernels Symbian OS Microkernels Computer-related introductions in 1989
https://en.wikipedia.org/wiki/EKA2
EKA2 (EPOC Kernel Architecture 2) is the second-generation Symbian platform real-time operating system kernel, which originated in the earlier operating system EPOC. EKA2 began with a proprietary software license. In October 2009, it was released as free and open-source software under an Eclipse Public License. In April 2011, it was reverted to a proprietary license. Like its predecessor, EKA1, it has preemptive multithreading and full memory protection. The main differences are: Real-time guarantees: each application programming interface (API) call is fast, but more importantly, time-bound Multiple threads inside the kernel, and outside Pluggable memory models, allowing better support for later generations of ARM instruction set architecture. A nanokernel which provides the most basic OS facilities upon which other personality layers can be built The user interface of EKA2 is almost fully compatible with EKA1. EKA1 was not used after Symbian OS version 8.1, and was superseded in 2005. The main advantage of EKA2 was its ability to run full telephone signalling protocol stacks. Previously, on Symbian phones, these had to run on a separate central processing unit (CPU). Such signalling stacks are very complex and rewriting them to work natively on Symbian OS is typically not an option. EKA2 thus allows personality layers to emulate the basic primitives of other operating systems, thus allowing existing signalling stacks to run largely unchanged. Real-time guarantees are a prerequisite of signalling stacks, and also help with multimedia tasks. However, as with any RTOS, a full analysis of all threads is needed before any real-time guarantees can be offered to anything except the highest-priority thread; because higher priority threads may prevent lower-priority threads from running. Any multimedia task is likely to involve graphics, storage and/or networking activity, all of which are more likely to disrupt the stream than the kernel is. Inside the kernel,
https://en.wikipedia.org/wiki/DES%20Challenges
The DES Challenges were a series of brute force attack contests created by RSA Security to highlight the lack of security provided by the Data Encryption Standard. The Contests The first challenge began in 1997 and was solved in 96 days by the DESCHALL Project. DES Challenge II-1 was solved by distributed.net in 39 days in early 1998. The plaintext message being solved for was "The secret message is: Many hands make light work." DES Challenge II-2 was solved in just 56 hours in July 1998, by the Electronic Frontier Foundation (EFF), with their purpose-built Deep Crack machine. EFF won $10,000 for their success, although their machine cost $250,000 to build. The contest demonstrated how quickly a rich corporation or government agency, having built a similar machine, could decrypt ciphertext encrypted with DES. The text was revealed to be "The secret message is: It's time for those 128-, 192-, and 256-bit keys." DES Challenge III was a joint effort between distributed.net and Deep Crack. The key was found in just 22 hours 15 minutes in January 1999, and the plaintext was "See you in Rome (second AES Conference, March 22-23, 1999)". Reaction After the DES had been shown to be breakable, FBI director Louis Freeh told Congress, "That is not going to make a difference in a kidnapping case. It is not going to make a difference in a national security case. We don't have the technology or the brute force capability to get to this information." It was not until special purpose hardware brought the time down below 24 hours that both industry and federal authorities had to admit that the DES was no longer viable. Although the National Institute of Standards and Technology started work on what became the Advanced Encryption Standard in 1997, they continued to endorse the DES as late as October 1999, with FIPS 46-3. However, Triple DES was preferred. See also RSA Factoring Challenge RSA Secret-Key Challenge
https://en.wikipedia.org/wiki/Ulas%20family
The Ulas family of 19 is from rural southern Turkey. Five of the family members (except for another, who has died) walk on all fours with their feet and the palms of their hands in what is called a "bear crawl". Their quadrupedal gait has never been reported in anatomically intact adult humans. The gait is different from the knuckle-walking quadrupedal gait of apes. In 2006, the family was the subject of a documentary: The Family That Walks On All Fours. The affected siblings have a form of non-progressive congenital cerebellar ataxia. The brain impairments include cerebellar hypoplasia, mild cerebral cortex atrophy and a reduced corpus callosum. They are also mildly intellectually disabled and have problems in balancing on two legs. However, they do not show the poor coordination of hands, speech, and eye movements often found in cerebellar ataxia. The four sisters can do needlework. They all share a recessive mutation on chromosome 17p. Sources Üner Tan of Çukurova University Medical School in Adana, Turkey, has said that they show characteristics of the primate ancestors of Homo sapiens, before the move to bipedalism. He calls the process "backward evolution" and he named the condition Uner Tan syndrome. However, Nicholas Humphrey, John Skoyles, and Roger Keynes have argued that their gait is due to two rare phenomena coming together. First, instead of initially crawling as infants on their knees, they started off learning to move around with a "bear crawl" on their feet. Second, due to their congenital brain impairment, they found balancing on two legs difficult. Because of this, their motor development was channeled into turning their bear crawl into a substitute for bipedality. Defne Aruoba is a Turkish psychologist who was involved with the care and research of the Ulas family. Because of her experience working with the Ulas family, she planned to establish the Ulas Foundation, which will bridge the gap between social inequalities and reach out to other
https://en.wikipedia.org/wiki/Agda%20%28programming%20language%29
Agda is a dependently typed functional programming language originally developed by Ulf Norell at Chalmers University of Technology with implementation described in his PhD thesis. The original Agda system was developed at Chalmers by Catarina Coquand in 1999. The current version, originally known as Agda 2, is a full rewrite, which should be considered a new language that shares a name and tradition. Agda is also a proof assistant based on the propositions-as-types paradigm, but unlike Coq, has no separate tactics language, and proofs are written in a functional programming style. The language has ordinary programming constructs such as data types, pattern matching, records, let expressions and modules, and a Haskell-like syntax. The system has Emacs, Atom, and VS Code interfaces but can also be run in batch mode from the command line. Agda is based on Zhaohui Luo's unified theory of dependent types (UTT), a type theory similar to Martin-Löf type theory. Agda is named after the Swedish song "Hönan Agda", written by Cornelis Vreeswijk, which is about a hen named Agda. This alludes to the name of the theorem prover Coq, which was named after Thierry Coquand, Catarina Coquand's husband. Features Inductive types The main way of defining data types in Agda is via inductive data types which are similar to algebraic data types in non-dependently typed programming languages. Here is a definition of Peano numbers in Agda: data ℕ : Set where zero : ℕ suc : ℕ → ℕ Basically, it means that there are two ways to construct a value of type , representing a natural number. To begin, zero is a natural number, and if n is a natural number, then suc n, standing for the successor of n, is a natural number too. Here is a definition of the "less than or equal" relation between two natural numbers: data _≤_ : ℕ → ℕ → Set where z≤n : {n : ℕ} → zero ≤ n s≤s : {n m : ℕ} → n ≤ m → suc n ≤ suc m The first constructor, z≤n, corresponds to the axiom that zero is less than o
https://en.wikipedia.org/wiki/Gross%20%28unit%29
In English and related languages, several terms involving the words "great" or "gross" relate to numbers involving a multiple of exponents of twelve (dozen): A gross refers to a group of 144 items (a dozen dozen or a square dozen, 122). A great gross refers to a group of 1,728 items (a dozen gross or a cubic dozen, 123). A small gross or a great hundred refers to a group of 120 items (ten dozen, 10×12). The term can be abbreviated gr. or gro., and dates from the early 15th century. It derives from the Old French grosse douzaine, meaning "large dozen”. The continued use of these terms in measurement and counting represents the duodecimal number system. This has led groups such as the Dozenal Society of America to advocate for wider use of "gross" and related terms instead of the decimal system. See also Long hundred
https://en.wikipedia.org/wiki/Co-stimulation
Co-stimulation is a secondary signal which immune cells rely on to activate an immune response in the presence of an antigen-presenting cell. In the case of T cells, two stimuli are required to fully activate their immune response. During the activation of lymphocytes, co-stimulation is often crucial to the development of an effective immune response. Co-stimulation is required in addition to the antigen-specific signal from their antigen receptors. T cell co-stimulation T cells require two signals to become fully activated. A first signal, which is antigen-specific, is provided through the T cell receptor (TCR) which interacts with peptide-MHC molecules on the membrane of an antigen presenting cell (APC). A second signal, the co-stimulatory signal, is antigen nonspecific and is provided by the interaction between co-stimulatory molecules expressed on the membrane of the APC and the T cell. This interaction promotes and enhances the TCR signaling, but can also be bi-directional. The co-stimulatory signal is necessary for T cell proliferation, differentiation and survival. Activation of T cells without co-stimulation may lead to the unresponsiveness of the T cell (also called anergy), apoptosis or the acquisition of the immune tolerance. The counterpart of the co-stimulatory signal is a (co-)inhibitory signal, where inhibitory molecules interact with different signaling pathways in order to arrest T cell activation. Mostly known inhibitory molecules are CTLA4 and PD1, used in cancer immunotherapy. In T cell biology there are several co-stimulatory molecules from different protein families. Mostly studied are those belonging to Immunoglobulin super-family (IgSF) (such as CD28, B7, ICOS, CD226 or CRTAM) and TNF receptor super-family (TNFRSF) (such as 41-BB, OX40, CD27, GITR, HVEM, CD40, BAFFR, BAFF and others). Additionally, some co-stimulatory molecules belong to TIM family, CD2/SLAM family or BTN/BTN-like family. The surface expression of different co-stimulator
https://en.wikipedia.org/wiki/Soil%20consolidation
Soil consolidation refers to the mechanical process by which soil changes volume gradually in response to a change in pressure. This happens because soil is a two-phase material, comprising soil grains and pore fluid, usually groundwater. When soil saturated with water is subjected to an increase in pressure, the high volumetric stiffness of water compared to the soil matrix means that the water initially absorbs all the change in pressure without changing volume, creating excess pore water pressure. As water diffuses away from regions of high pressure due to seepage, the soil matrix gradually takes up the pressure change and shrinks in volume. The theoretical framework of consolidation is therefore closely related to the concept of effective stress, and hydraulic conductivity. The early theoretical modern models were proposed one century ago, according to two different approaches, by Karl Terzaghi and Paul Fillunger. The Terzaghi’s model is currently the most utilized in engineering practice and is based on the diffusion equation. In the narrow sense, "consolidation" refers strictly to this delayed volumetric response to pressure change due to gradual movement of water. Some publications also use "consolidation" in the broad sense, to refer to any process by which soil changes volume due to a change in applied pressure. This broader definition encompasses the overall concept of soil compaction, subsidence, and heave. Some types of soil, mainly those rich in organic matter, show significant creep, whereby the soil changes volume slowly at constant effective stress over a longer time-scale than consolidation due to the diffusion of water. To distinguish between the two mechanisms, "primary consolidation" refers to consolidation due to dissipation of excess water pressure, while "secondary consolidation" refers to the creep process. The effects of consolidation are most conspicuous where a building sits over a layer of soil with low stiffness and low permeability, s
https://en.wikipedia.org/wiki/1728%20%28number%29
1728 is the natural number following 1727 and preceding 1729. It is a dozen gross, or one great gross (or grand gross). It is also the number of cubic inches in a cubic foot. In mathematics 1728 is the cube of 12, and therefore equal to the product of the six divisors of 12 (1, 2, 3, 4, 6, 12). It is also the product of the first four composite numbers (4, 6, 8, and 9), which makes it a compositorial. As a cubic perfect power, it is also a highly powerful number that has a record value (18) between the product of the exponents (3 and 6) in its prime factorization. It is also a Jordan–Pólya number such that it is a product of factorials: 1728 has twenty-eight divisors, which is a perfect count (as with 12, with six divisors). It also has a Euler totient of 576 or 242, which divides 1728 thrice over. 1728 is an abundant and semiperfect number, as it is smaller than the sum of its proper divisors yet equal to the sum of a subset of its proper divisors. It is a practical number as each smaller number is the sum of distinct divisors of 1728, and an integer-perfect number where its divisors can be partitioned into two disjoint sets with equal sum. 1728 is 3-smooth, since its only distinct prime factors are 2 and 3. This also makes 1728 a regular number which are most useful in the context of powers of 60, the smallest number with twelve divisors: 1728 is also an untouchable number since there is no number whose sum of proper divisors is 1728. Many relevant calculations involving 1728 are computed in the duodecimal number system, in-which it is represented as "1000". Modular j-invariant 1728 occurs in the algebraic formula for the j-invariant of an elliptic curve, as a function over a complex variable on the upper half-plane , Inputting a value of for , where is the imaginary number, yields another cubic integer: In moonshine theory, the first few terms in the Fourier q-expansion of the normalized j-invariant exapand as, The Griess algebra (which contains
https://en.wikipedia.org/wiki/Tree%20shaping
Tree shaping (also known by several other alternative names) uses living trees and other woody plants as the medium to create structures and art. There are a few different methods used by the various artists to shape their trees, which share a common heritage with other artistic horticultural and agricultural practices, such as pleaching, bonsai, espalier, and topiary, and employing some similar techniques. Most artists use grafting to deliberately induce the inosculation of living trunks, branches, and roots, into artistic designs or functional structures. Tree shaping has been practiced for at least several hundred years, as demonstrated by the living root bridges built and maintained by the Khasi people of India. Early 20th-century practitioners and artisans included banker John Krubsack, Axel Erlandson with his famous circus trees, and landscape engineer Arthur Wiechula. Several contemporary designers also produce tree-shaping projects. History Some species of trees exhibit a botanical phenomenon known as inosculation (or self-grafting); whether among parts of a single tree or between two or more individual specimens of the same (or very similar) species. Trees exhibiting this behavior are called inosculate trees. The living root bridges of Cherrapunji, Laitkynsew, and Nongriat, in the present-day Meghalaya state of northeast India are examples of tree shaping. These suspension bridges are handmade from the aerial roots of living banyan fig trees, such as the rubber tree. The pliable tree roots are gradually shaped to grow across a gap, weaving in sticks, stones, and other inclusions, until they take root on the other side. This process can take up to fifteen years to complete. There are specimens spanning over 100 feet, some can hold up to the weight of 50 people. The useful lifespan of the bridges, once complete, is thought to be 500–600 years. They are naturally self-renewing and self-strengthening as the component roots grow thicker. Living trees were
https://en.wikipedia.org/wiki/Melvin%20Mooney
Melvin Mooney (1893–1968) was an American physicist and rheologist. Life Mooney was born in Kansas City, Missouri. He achieved an A.B. degree from the University of Missouri in 1917 and a PhD in physics from the University of Chicago in 1923. He worked for the United States Rubber Company. He developed the Mooney viscometer (used to measure viscosity of rubber compounds during curing) and other testing equipment used in the rubber industry. He also proposed the Mooney-Rivlin solid constitutive law describing the hyperelastic stress–strain behavior of rubber. He was the first recipient of the Bingham Medal from the Society of Rheology in 1948. He received the Charles Goodyear Medal in 1962. He is the namesake of the Melvin Mooney Distinguished Technology Award of the American Chemical Society Rubber Division.
https://en.wikipedia.org/wiki/Apple%20II%20peripheral%20cards
The Apple II line of computers supported a number of Apple II peripheral cards. In an era before plug and play USB or Bluetooth connections, these were expansion cards that plugged into slots on the motherboard. They added to and extended the functionality of the base motherboard when paired with specialized software that enabled the computer to read the input/output of the devices on the other side of the cable (the peripheral) or to take advantage of chips on the board - as was the case with memory expansion cards. All Apple II models except the Apple IIc had at least seven 50-pin expansion slots, labeled Slots 1 though 7. These slots could hold printed circuit board cards with double-sided edge connectors, 25 "fingers" on each side, with 100 mil (0.1 inch) spacing between centers. Slot 3 in an Apple IIe that has an 80-column card fitted (which is usually the case) and Slots 1 through 6 in a normally configured Apple IIgs are "virtually" filled with on-board devices which means that the physical slots cannot be used at all, or only with certain specific cards, unless the conflicting "virtual" device is disabled. In addition to the seven standard expansion slots, the following computers contained additional, largely special-purpose expansion slots: Apple II and Apple II Plus: Slot 0 (50-pin, for the firmware card or the 16 kB Apple II Language Card) Apple IIe: Auxiliary Slot (60-pin; primarily for 80-column display and memory expansion) Apple IIgs: Memory Expansion Slot (40-pin) Perhaps the most common cards found on early Apple II systems were the Disk II Controller Card, which allowed users of earlier Apple IIs to use the Apple Disk II, a 5¼ inch, 140 kB floppy disk drive; and the Apple 16K Language Card, which increased the base memory of late-model Apple II and standard Apple II Plus units from 48 kB to 64 kB. The Z-80 SoftCard, making the computer compatible with CP/M software, was also very popular. Both Apple and dozens of third-party vendors created
https://en.wikipedia.org/wiki/Sociocultural%20system
A sociocultural system is a "human population viewed (1) in its ecological context and (2) as one of the many subsystems of a larger ecological system". The term "sociocultural system" embraces three concepts: society, culture, and system. A society is a number of interdependent organisms of the same species. A culture is the learned behaviors that are shared by the members of a society, together with the material products of such behaviors. The words "society" and "culture" are fused together to form the word "sociocultural". A system is "a collection of parts which interact with each other to function as a whole". The term sociocultural system is most likely to be found in the writings of anthropologists who specialize in ecological anthropology. In 1979, Marvin Harris outlined a universal structure of sociocultural systems. He mentioned infrastructure (production and population), structure (which is behavioural, like corporations, political organizations, hierarchies, castes), and a superstructure (which is mental, like beliefs, values, norms). See also
https://en.wikipedia.org/wiki/Zest%20%28ingredient%29
Zest is a food ingredient that is prepared by scraping or cutting from the rind of unwaxed citrus fruits such as lemon, orange, citron, and lime. Zest is used to add flavor to foods. In terms of fruit anatomy, the zest is obtained from the flavedo (exocarp) which is also referred to as zest. The flavedo and white pith (albedo) of a citrus fruit together makes up its peel. The amounts of both flavedo and pith are variable among citrus fruits, and may be adjusted by the manner in which they are prepared. Citrus peel may be used fresh, dried, candied, or pickled in salt. Preparation For culinary use, a zester, grater, vegetable peeler, paring knife, or even a surform tool is used to scrape or cut zest from the fruit. Alternatively, the peel is sliced, then excess pith (if any) cut away. The white portion of the peel under the zest (pith, albedo or mesocarp) may be unpleasantly bitter and is generally avoided by limiting the peeling depth. Some citrus fruits have so little white mesocarp that their peel can be used whole. Variation between fruit The zest and mesocarp vary with the genetics of the fruit. Fruit with peels that are almost all flavedo are generally mandarines; relatives of pomelos and citrons tend to have thicker mesocarp. The mesocarp of pomelo relatives (grapefruit, orange, etc.) is generally more bitter; the mesocarp of citron relatives (Mexican and Persian limes, alemows etc.) is milder. The lemon is a hybrid of pummelo, citron, and mandarin. The mesocarp is also edible, and is used to make succade. Uses Zest is often used to add flavor to different pastries and sweets, such as pies (e.g., lemon meringue pie), cakes, cookies, biscuits, puddings, confectionery, candy and chocolate. Zest also is added to certain dishes (including ossobuco alla milanese), marmalades, sauces, sorbets and salads. Zest is a key ingredient in a variety of sweet and sour condiments, including lemon pickle, lime chutney, and marmalade. Lemon liqueurs and liquors such as
https://en.wikipedia.org/wiki/Open%20Source%20Tripwire
Open Source Tripwire is a free software security and data integrity tool for monitoring and alerting on specific file change(s) on a range of systems. The project is based on code originally contributed by Tripwire, Inc. in 2000. See also AIDE Host-based intrusion detection system comparison OSSEC Samhain
https://en.wikipedia.org/wiki/Tripwire%20%28company%29
Tripwire, Inc. is a software company based in Portland, Oregon, that focuses on security and compliance automation. It is a subsidiary of technology company Fortra. History Tripwire's intrusion detection software was created in the 1990s by Purdue University graduate student Gene Kim and his professor Gene Spafford. In 1997, Gene Kim co-founded Tripwire, Inc. with rights to the Tripwire name and technology, and produced a commercial version, Tripwire for Servers. In 2000, Tripwire released Open Source Tripwire. In 2005, the firm released Tripwire Enterprise, a product for configuration control by detecting, assessing, reporting and remediating file and configuration changes. In January 2010, it announced the release of Tripwire Log Center, a log and security information and event management (SIEM) software that stores, correlates and reports log and security event data. The two products can be integrated to enable correlation of change and event data. August 21, 2009, the firm acquired Activeworx technologies from CrossTec Corporation. Revenues grew to $74 million in 2009. In October 2009, the company had 261 employees; that number grew to 336 by June 2010. By May–June 2010, the company had over 5,500 customers and had announced that it had filed a registration statement with the Securities and Exchange Commission for a proposed initial public offering of its common stock. A year later, the company announced its sale to the private equity firm Thoma Bravo, ending its $86 million IPO plans. CEO Jim Johnson cited the firm's failure to reach the $100 million revenue milestone in 2010 as well as changing IPO market expectations as reasons for not going through with the IPO. The day following the acquisition, the company laid off about 50 of its 350 employees. Tripwire acquired nCircle, which focused on asset discovery and vulnerability management, in 2013. In December 2014, Belden announced plans to buy Tripwire for $710 million. The acquisition was completed
https://en.wikipedia.org/wiki/Theta%20representation
In mathematics, the theta representation is a particular representation of the Heisenberg group of quantum mechanics. It gains its name from the fact that the Jacobi theta function is invariant under the action of a discrete subgroup of the Heisenberg group. The representation was popularized by David Mumford. Construction The theta representation is a representation of the continuous Heisenberg group over the field of the real numbers. In this representation, the group elements act on a particular Hilbert space. The construction below proceeds first by defining operators that correspond to the Heisenberg group generators. Next, the Hilbert space on which these act is defined, followed by a demonstration of the isomorphism to the usual representations. Group generators Let f(z) be a holomorphic function, let a and b be real numbers, and let be fixed, but arbitrary complex number in the upper half-plane; that is, so that the imaginary part of is positive. Define the operators Sa and Tb such that they act on holomorphic functions as and It can be seen that each operator generates a one-parameter subgroup: and However, S and T do not commute: Thus we see that S and T together with a unitary phase form a nilpotent Lie group, the (continuous real) Heisenberg group, parametrizable as where U(1) is the unitary group. A general group element then acts on a holomorphic function f(z) as where is the center of H, the commutator subgroup . The parameter on serves only to remind that every different value of gives rise to a different representation of the action of the group. Hilbert space The action of the group elements is unitary and irreducible on a certain Hilbert space of functions. For a fixed value of τ, define a norm on entire functions of the complex plane as Here, is the imaginary part of and the domain of integration is the entire complex plane. Mumford sets the norm as , but in this way is not unitary. Let be the set of entire functions
https://en.wikipedia.org/wiki/Avant-corps
An avant-corps ( or , plural , , ), a French term literally meaning "fore-body", is a part of a building, such as a porch or pavilion, that juts out from the corps de logis, often taller than other parts of the building. It is common in façades in French Baroque architecture. Particularly in German architecture, a corner Risalit is where two wings meet at right-angles. Baroque three-winged constructions often incorporate a median Risalit in a main hall or a stairwell, such as in Weißenstein Palace and the . Terms By position to the building A central avant-corps stands in the middle of the facade. A side projection is positioned off-centre. Two wings (usually) running at right angles to each other flow into a corner avant-corps. By function Entrance risalit in which the entrance is located. Torrisalit, in which a gate or a gate passage is located. Terms from the environment The reserve is the facade of the main alignment line of the building, which is receding compared to the front of the risalit. It is also known as Arrierecorps (Arrière-corps, French arrière corps: "behind the structure"). The frontispiece is the gable triangle above a central risalit. Sources Much of the text of this article comes from the equivalent German-language Wikipedia article retrieved on 18 March 2006. Ornaments (architecture)
https://en.wikipedia.org/wiki/Stuart%20Schreiber
Stuart L. Schreiber (born 6 February 1956) is a scientist at Harvard University and co-founder of the Broad Institute. He has been active in chemical biology, especially the use of small molecules as probes of biology and medicine. Small molecules are the molecules of life most associated with dynamic information flow; these work in concert with the macromolecules (DNA, RNA, proteins) that are the basis for inherited information flow. Education and training Schreiber obtained a Bachelor of Science degree in chemistry from the University of Virginia in 1977, after which he entered Harvard University as a graduate student in chemistry. He joined the research group of Robert B. Woodward and after Woodward's death continued his studies under the supervision of Yoshito Kishi. In 1980, he joined the faculty of Yale University as an assistant professor in chemistry, and in 1988 he moved to Harvard University as the Morris Loeb Professor. Work in 1980s and 1990s Schreiber started his research work in organic synthesis, focusing on concepts such as the use of [2 + 2] photocycloadditions to establish stereochemistry in complex molecules, the fragmentation of hydroperoxides to produce macrolides, ancillary stereocontrol, group selectivity and two-directional synthesis. Notable accomplishments include the total syntheses of complex natural products such as talaromycin B, asteltoxin, avenaciolide, gloeosporone, hikizimicin, mycoticin A, epoxydictymene and the immunosuppressant FK-506. Following his work on the FK506-binding protein FKBP12 in 1988, Schreiber reported that the small molecules FK506 and cyclosporin inhibit the activity of the phosphatase calcineurin by forming the ternary complexes FKBP12-FK506-calcineurin and cyclophilin-ciclosporin-calcineurin. This work, together with work by Gerald Crabtree at Stanford University concerning the NFAT proteins, led to the elucidation of the calcium-calcineurin-NFAT signaling pathway. The Ras-Raf-MAPK pathway was not elucidate
https://en.wikipedia.org/wiki/Martingale%20difference%20sequence
In probability theory, a martingale difference sequence (MDS) is related to the concept of the martingale. A stochastic series X is an MDS if its expectation with respect to the past is zero. Formally, consider an adapted sequence on a probability space . is an MDS if it satisfies the following two conditions: , and , for all . By construction, this implies that if is a martingale, then will be an MDS—hence the name. The MDS is an extremely useful construct in modern probability theory because it implies much milder restrictions on the memory of the sequence than independence, yet most limit theorems that hold for an independent sequence will also hold for an MDS. A special case of MDS, denoted as {Xt,t}0 is known as innovative sequence of Sn; where Sn and are corresponding to random walk and filtration of the random processes . In probability theory innovation series is used to emphasize the generality of Doob representation. In signal processing the innovation series is used to introduce Kalman filter. The main differences of innovation terminologies are in the applications. The later application aims to introduce the nuance of samples to the model by random sampling.
https://en.wikipedia.org/wiki/Gravitational%20shielding
The term gravitational shielding refers to a hypothetical process of shielding an object from the influence of a gravitational field. Such processes, if they existed, would have the effect of reducing the weight of an object. The shape of the shielded region would be similar to a shadow from the gravitational shield. For example, the shape of the shielded region above a disk would be conical. The height of the cone's apex above the disk would vary directly with the height of the shielding disk above the Earth. Experimental evidence to date indicates that no such effect exists. Gravitational shielding is considered to be a violation of the equivalence principle and therefore inconsistent with both Newtonian theory and general relativity. The concept of gravity shielding is a common concept in science fiction literature, especially for space travel. One of the first and best known examples is the fictional gravity shielding substance "Cavorite" that appears in H. G. Wells' classic 1901 novel The First Men in the Moon. Wells was promptly criticized for using it by Jules Verne. Tests of the equivalence principle , no experiment was successful in detecting positive shielding results. To quantify the amount of shielding, at the beginning of 20th century Quirino Majorana suggested an extinction coefficient h that modifies Newton's gravitational force law as follows: The best laboratory measurements have established an upper bound limit for shielding of 4.3×10−15 m²/kg. The best estimate based on the most accurate gravity anomaly data during the 1997 solar eclipse has provided a new constraint on the shielding parameter 6×10−19 m²/kg. However, astronomical observations impose much more stringent limits. Based on lunar observations available in 1908, Poincaré established that h can be no greater than 10−18 m²/kg. Subsequently, this bound has been greatly improved. Eckhardt showed that lunar ranging data implies an upper bound of 10−22 m²/kg, and Williams, et al., ha
https://en.wikipedia.org/wiki/Texas%20Biomedical%20Research%20Institute
Texas Biomedical Research Institute (Texas Biomed), located in San Antonio, Texas, is an independent, non-profit biomedical research institution, specializing in genetics and in virology and immunology. Texas Biomed is funded by government and corporate grants and contracts, and donations from the public. History Texas Biomed was founded in 1941 by Tom Slick as the Foundation of Applied Research. Its initial mission was to provide research and advanced education in agriculture, natural sciences and medicine. It became the Southwest Foundation for Research and Education in 1952. In the late 1950s, the Institute moved to its current location on Military Drive. In 1982, The Foundation was renamed Southwest Foundation for Biomedical Research (SFBR) and Texas Biomedical Research Institute on February 1, 2011. Tom Slick’s sister, Betty Moorman, helped establish a club whose members could make an annual contribution to support the Foundation’s research. In the 1950s, the Foundation purchased an historic 1854 mansion in San Antonio called The Argyle to serve as the headquarters. Members of the club continue to meet and support scientific research at Texas Biomed today with their time and resources. A group of women called the Texas Biomedical Forum raises money to support pilot grants for Texas Biomed scientists, science awards for outstanding teachers, and tours of the Institute for high school students. In 1988, the Founders Council formed. It includes supporters ages 25 to 46 who support the Institute are community advocates and financial supporters. The Founders Council also provides grants for equipment to Texas Biomed scientists. Structure Located on a campus on the northwest side of San Antonio, Texas Biomed employs over 60 doctoral level biomedical scientists, including 18 principal investigators and 360+ staff members. Focused on basic biomedical research, the Institute is divided into the Department of Genetics and the Department of Virology & Immunology. T
https://en.wikipedia.org/wiki/Apex%20%28radio%20band%29
Apex radio stations (also known as skyscraper and pinnacle) was the name commonly given to a short-lived group of United States broadcasting stations, which were used to evaluate transmitting on frequencies that were much higher than the ones used by standard amplitude modulation (AM) and shortwave stations. Their name came from the tall height of their transmitter antennas, which were needed because coverage was primarily limited to local line-of-sight distances. These stations were assigned to what at the time were described as "ultra-high shortwave" frequencies, between roughly 25 and 44 MHz. They employed amplitude modulation (AM) transmissions, although in most cases using a wider bandwidth than standard broadcast band AM stations, in order to provide high fidelity sound with less static and distortion. In 1937 the Federal Communications Commission (FCC) formally allocated an Apex station band, consisting of 75 transmitting frequencies running from 41.02 to 43.98 MHz. These stations were never given permission to operate commercially, although they were allowed to retransmit programming from standard AM stations. Most operated under experimental licenses, however this band was the first to include a formal "non-commercial educational" station classification. The FCC eventually concluded that frequency modulation (FM) transmissions were superior, and the Apex band was eliminated effective January 1, 1941, in order to make way for the creation of the original FM band, assigned to 42 to 50 MHz. Initial development During the 1920s and 1930s, radio engineers and government regulators investigated the characteristics of transmitting frequencies higher than those currently in use. In the United States, by 1930 the original AM broadcasting band consisted of 96 frequencies from 550 to 1500 kHz, with a 10 kHz spacing between adjacent assignments. On this band, a station's coverage during the daytime consisted exclusively of its groundwave signal, which for the most
https://en.wikipedia.org/wiki/Loop%20around
A loop line or loop around is a telephone company test circuit. The circuit has two associated phone numbers. When one side of the loop is called (side A), the caller receives a test tone of approximately 1000 Hz (milliwatt test). When the second number (side B) is called, it produces dead silence, but the party on side A hears the milliwatt test tone drop, and is connected to the person on side B. The purpose of the loop around test is to allow circuit testing to a distant central office without needing a person at the far end. The technician can send a tone down either line and measure the response tone on the second line to determine the path loss parameters. When a line is connected to side A, multiple telephone lines, within limits, may connect to side B and thus be connected into a conference with the person on side A. The function of the tone on side A was to alert those already connected, when somebody called the B side and connected. Teenagers discovered that the test facility could be used as so-called beep lines, in which they would dial up the primary number and wait for someone at random to call its mate. Phreaks would use the loop around in a similar manner, to exchange information that they had learned about the phone company. Loop lines are far less common today than they were in the 1960s, however they reportedly continued to exist past the start of the 21st century. One such loop line is certain to exist: it is a TPI-560P located at (416) 981-0001 owned by Telus. It also comes with an automatic number announcement circuit. Because of the potential for abuse, however, telephone companies seek to protect them. The most common protection techniques are: Filters that bandstop voice (these can be switched on or off) Recordings which make the line appear out of service Selective loop activation by operators Restrictions on which lines may call Using uncommon DTMF tones (A through D) in the telephone number Eventually, telephone companies desi
https://en.wikipedia.org/wiki/Mass%20transfer%20coefficient
In engineering, the mass transfer coefficient is a diffusion rate constant that relates the mass transfer rate, mass transfer area, and concentration change as driving force: Where: is the mass transfer coefficient [mol/(s·m2)/(mol/m3)], or m/s is the mass transfer rate [mol/s] is the effective mass transfer area [m2] is the driving force concentration difference [mol/m3]. This can be used to quantify the mass transfer between phases, immiscible and partially miscible fluid mixtures (or between a fluid and a porous solid). Quantifying mass transfer allows for design and manufacture of separation process equipment that can meet specified requirements, estimate what will happen in real life situations (chemical spill), etc. Mass transfer coefficients can be estimated from many different theoretical equations, correlations, and analogies that are functions of material properties, intensive properties and flow regime (laminar or turbulent flow). Selection of the most applicable model is dependent on the materials and the system, or environment, being studied. Mass transfer coefficient units (mol/s)/(m2·mol/m3) = m/s Note, the units will vary based upon which units the driving force is expressed in. The driving force shown here as '' is expressed in units of moles per unit of volume, but in some cases the driving force is represented by other measures of concentration with different units. For example, the driving force may be partial pressures when dealing with mass transfer in a gas phase and thus use units of pressure. See also Mass transfer Separation process Sieving coefficient
https://en.wikipedia.org/wiki/LabWindows/CVI
LabWindows/CVI (CVI is short for C for Virtual Instrumentation) is an ANSI C programming environment for test and measurement developed by National Instruments. The program was originally released as LabWindows for DOS in 1987, but was soon revisioned (and renamed) for the Microsoft Windows platform. The current version of LabWindows/CVI (commonly referred to as CVI) is 2020. LabWindows/CVI uses the same libraries and data-acquisition modules as the better known National Instrument product LabVIEW and is thus highly compatible with it. LabVIEW is targeted more at domain experts and scientists, and CVI more towards software engineers that are more comfortable with text-based linear languages such as C. Release history Starting with LabWindows/CVI 8.0, major versions are released around the first week of August, to coincide with the annual National Instruments conference NI Week, and followed by a bug-fix release the following February. In 2009, National Instruments started to name the releases after the year in which they are released. The bugfix is called a Service Pack (for instance, the 2009 Service Pack 1 release was published in February 2010). See also National Instruments
https://en.wikipedia.org/wiki/Grand%20Theft%20Auto%20clone
A Grand Theft Auto clone (often shortened to GTA clone) is a subgenre of open world action-adventure video games, characterized by their likeness to the Grand Theft Auto series in either gameplay, or overall design. In these types of open world games, players may find and use a variety of vehicles and weapons while roaming freely in an open world setting. The objective of Grand Theft Auto clones is to complete a sequence of core missions involving driving and shooting, but often side-missions and minigames are added to improve replay value. The storylines of games in this subgenre typically have strong themes of crime, violence and other controversial elements such as drugs and sexually explicit content. The subgenre has its origins in open world action adventure games popularized in Europe (and particularly the United Kingdom) throughout the 1980s and 1990s. The release of Grand Theft Auto (1997) marked a major commercial success for open-ended game design in North America, and featured a more marketable crime theme. But it was the popularity of its 3D sequel Grand Theft Auto III in 2001 that led to the widespread propagation of a more specific set of gameplay conventions consistent with a subgenre. The subgenre now includes many games from different developers all over the world where the player can control wide ranges of vehicles and weapons. The subgenre has evolved with greater levels of environmental detail and more realistic behaviors. As usage of the term "clone" often has a negative connotation and can be seen as controversial, reviewers have come up with other names for the subgenre. Similar terminology for other genres, such as "[[Platform game#Naming|Donkey Kong-type]]" and "Doom clone", has given way to more neutral language. Names such as "sandbox game," however, are applied to a wider range of games that do not share key features of the Grand Theft Auto series. Definition A Grand Theft Auto clone is a video game that falls within the genre populari
https://en.wikipedia.org/wiki/Parmanu
Parmanu is an Indian superhero published by Raj Comics His super powers include splitting into atoms and flying to travel from one place to other and to reduce or increase his own size. The character is inspired from Atom. Parmanu got killed in akhiri series by blasting himself in space to save earth. Fictional Character Background Vinay saw a group of criminals kill his classmate when he was in high school. He vowed to avenge her death. He found the murder weapon, a revolver, and discovered that the killer was the head of police himself. To protect himself from the law, the head of police attempted to recover the revolver and tried to kill Vinay to accomplish this. Vinay was rescued by his maternal Uncle, Prof. K.K. Verma, and was brought to his lab. The monster Bufalo attacked them there and Prof. K.K. Verma revealed to Vinay that he had made a costume that could give him superpowers. Vinay put on the costume and became the Wonderman Parmanu. After a long struggle, Vinay succeeded in killing Bufalo. Thereafter, he avenged his classmate by killing the head of police. Vinay's parents, along with most of his family, were killed during the hunt for the criminal. His brother, Vijay, and his uncle, Prof K.K. Verma, were the only surviving members of his family. The first comic of the series shows that Vijay helped the gangsters, and in this situation he had to kill his own brother. Allies Mamta Pathak (Pralayanka) Professor Kamal Kumar Verma Shipra Sheena Probot Inspector Dhanush Hawaldaar Baan Enemies Itihaas Diamond Killer General Kharonch Dr. No Dr. Madagascar Baluchi Madam Cold Ratan Daga Gunaakar Holika Vriksha Fandebaaz Hyena Typhoon BuddhiPalat Ghonga Angaar Cactus Neem Hakim ZeroG Nashketu Programmer Aakaa Principal Powers and Abilities Parmanu's costume gives him various superpowers. He can fly up to speed of sound with ease and can go beyond it. He can fire atomic bolts from his chest. His wrist gadgets can fire atomic bolts as well and reel out atomic r
https://en.wikipedia.org/wiki/Gillespie%20algorithm
In probability theory, the Gillespie algorithm (or the Doob–Gillespie algorithm or Stochastic Simulation Algorithm, the SSA) generates a statistically correct trajectory (possible solution) of a stochastic equation system for which the reaction rates are known. It was created by Joseph L. Doob and others (circa 1945), presented by Dan Gillespie in 1976, and popularized in 1977 in a paper where he uses it to simulate chemical or biochemical systems of reactions efficiently and accurately using limited computational power (see stochastic simulation). As computers have become faster, the algorithm has been used to simulate increasingly complex systems. The algorithm is particularly useful for simulating reactions within cells, where the number of reagents is low and keeping track of every single reaction is computationally feasible. Mathematically, it is a variant of a dynamic Monte Carlo method and similar to the kinetic Monte Carlo methods. It is used heavily in computational systems biology. History The process that led to the algorithm recognizes several important steps. In 1931, Andrei Kolmogorov introduced the differential equations corresponding to the time-evolution of stochastic processes that proceed by jumps, today known as Kolmogorov equations (Markov jump process) (a simplified version is known as master equation in the natural sciences). It was William Feller, in 1940, who found the conditions under which the Kolmogorov equations admitted (proper) probabilities as solutions. In his Theorem I (1940 work) he establishes that the time-to-the-next-jump was exponentially distributed and the probability of the next event is proportional to the rate. As such, he established the relation of Kolmogorov's equations with stochastic processes. Later, Doob (1942, 1945) extended Feller's solutions beyond the case of pure-jump processes. The method was implemented in computers by David George Kendall (1950) using the Manchester Mark 1 computer and later used by Maurice
https://en.wikipedia.org/wiki/War%20in%20Middle%20Earth
War in Middle Earth is a real-time strategy game released for the ZX Spectrum, MSX, Commodore 64, Amstrad CPC, MS-DOS, Amiga, Apple IIGS, and Atari ST in 1988 by Virgin Mastertronic on the Melbourne House label. The game combines both large scale army unit level and small scale character level. All the action happens simultaneously in game world and places could be seen from the map or at the ground level. Individual characters can also be seen in larger battles (in which they either survive or die). If the battle is less than 100 units, approximately, it can be watched on ground level. Otherwise it will be only displayed numerically. On ground level characters can acquire objects and talk with non-player characters (such as Radagast or Tom Bombadil). Reception The game was reviewed in 1989 in Dragon #147 by Hartley, Patricia, and Kirk Lesser in "The Role of Computers" column. The reviewers gave the game 3 out of 5 stars. Computer Gaming World gave the game a mixed review, noting that, although it faithfully recreates the events of the books, genuine strategy is lacking and the game plays very similarly on subsequent playthroughs. Compute!s review was more positive, only criticizing an anticlimactic ending to "an otherwise impressive game" that was "faithful to the Middle Earth story line". The Spanish magazine Microhobby valued the game with the following scores: Originality: 80% Graphics: 70% Motion: - Sound: 50% Difficulty: 100% Addiction: 80% Reviews Computer and Video Games (Mar, 1989) ACE (Advanced Computer Entertainment) (May, 1989) Commodore User (Apr, 1989) Your Sinclair (Apr, 1989) Info (Nov, 1989) Crash! (Mar, 1989) Zzap! (Apr, 1989) Power Play (Mar, 1989) The Games Machine (Apr, 1989) Amstrad Action (Mar, 1989) ASM (Aktueller Software Markt) (Feb, 1989) Jeux & Stratégie #58
https://en.wikipedia.org/wiki/World%20Down%20Syndrome%20Day
World Down Syndrome Day (WDSD) is marked each year on March 21, beginning in 2007. The 21st day of March (the 3rd month of the year) was selected to signify the uniqueness of the triplication (trisomy) of the 21st chromosome which causes Down syndrome. The General Assembly of the United Nations has decided to observe it each year since 2012. Every year on March 21, World Down Syndrome Day is observed to create awareness about Down syndrome. It is a condition in which a child is born with an extra 21st chromosome. Activities and commemorations A common activity is wearing colorful or mismatched socks, to show support for people with Down syndrome. Socks are shaped somewhat like chromosomes. An animated short, Freebird, was created to recognize World Down Syndrome Day in 2021. The film, written and directed by Michael Joseph McDonald, was set to the song, "Freedom" by Jordan Hart, and won the Chicago International Children's Film Festival in 2021.
https://en.wikipedia.org/wiki/Of%20Man%20and%20Manta
Of Man and Manta is a trilogy of science fiction novels written by Piers Anthony. It consists of the three books: Omnivore (1968), Orn (1970), and (1975). Omnivore has as its frame the investigation of the deaths of eighteen travelers from Earth to the distant planet Nacre. Nacre is seen through the eyes of three surviving scientist-explorers: Cal, Veg, and Aquilon. The planet Nacre's dominant species are fungi, including the intelligent mantas. The mantas are soft-bodied creatures capable of high speeds and flight, superficially resembling manta rays. They are carnivores who farm the one extant herbivore species by protecting them from the voracious omnivore species. The planet is notable for its thick atmosphere, which allows flight to be performed with less energy, and permits the existence of air-borne phytoplankton. The herbivores eat the plankton, and the omnivores eat anything they can. The human characters' diets play an important role in their interaction with the native species. Aquilon eats a normal human diet—she is an omnivore. Veg is a vegetarian. Cal is forced to drink blood to survive, due to a medical condition. Orn involves travel by the scientists and mantas into a parallel dimension they dub Paleo, resembling the distant past of Earth, where they encounter dinosaur species and an intelligent flightless bird called Orn. Orn has the ability of genetic memory, able to remember anything that happened to an ancestor prior to the time of their reproduction. Much of the plot conflict stems from the love triangle between the protagonists and the mysterious motives of a cybernetically-augmented government agent sent along to monitor their progress. involves the three scientists attempting to return to Earth from another dimension inhabited by hostile machines. Interlopers from other realities (using technology similar to that of the scientists' government) guide and hamper the explorers. A secondary story tells of a multidimensional cellular aut
https://en.wikipedia.org/wiki/Kaymak
Kaymak, sarshir, or qashta/ashta ( ; or ; ), is a creamy dairy food similar to clotted cream, made from the milk of water buffalo, cows, sheep, or goats in Central Asia, some Balkan countries, some Caucasus countries, the countries of the Levant, Turkic regions, Iran and Iraq. In Poland, the name refers to a confection similar to dulce de leche instead. The traditional method of making kaymak is to boil the raw milk slowly, then simmer it for two hours over a very low heat. After the heat source is shut off, the cream is skimmed and left to chill (and mildly ferment) for several hours or days. Kaymak has a high percentage of milk fat, typically about 60%. It has a thick, creamy consistency (not entirely compact, because of milk protein fibers) and a rich taste. Etymology The word kaymak has Central Asian Turkic origins, possibly formed from the verb , which means 'melt' and 'molding of metal' in Turkic. The first written records of the word kaymak is in the well-known book of Mahmud al-Kashgari, . The word remains as in Mongolian, which refers to a fried clotted cream, and with small variations in Turkic languages as in Azerbaijani, in Uzbek, in Kazakh and Shor, in Kyrgyz, in Turkish, in Turkmen, () in Georgian, () in Greek, and кајмак (kajmak) in Serbo-Croatian, caimac in Romanian. This dairy food is called sarshir in Iran. This word means 'top of the milk'. They use this name because after boiling milk, a layer of fat stands on the top of the boiled milk. Turkey Shops in Turkey have been devoted to kaymak production and consumption for centuries. Kaymak is mainly consumed today for breakfast along with the traditional Turkish breakfast. One type of kaymak is found in the Afyonkarahisar region where the water buffalo are fed from the residue of poppy seeds pressed for oil. Kaymak is traditionally eaten with baklava and other Turkish desserts, fruit preserve and honey or as a filling in pancakes. Balkans Known as , it is almost always made at home
https://en.wikipedia.org/wiki/Paradox%20of%20enrichment
The paradox of enrichment is a term from population ecology coined by Michael Rosenzweig in 1971. He described an effect in six predator–prey models where increasing the food available to the prey caused the predator's population to destabilize. A common example is that if the food supply of a prey such as a rabbit is overabundant, its population will grow unbounded and cause the predator population (such as a lynx) to grow unsustainably large. That may result in a crash in the population of the predators and possibly lead to local eradication or even species extinction. The term 'paradox' has been used since then to describe this effect in slightly conflicting ways. The original sense was one of irony; by attempting to increase the carrying capacity in an ecosystem, one could fatally imbalance it. Since then, some authors have used the word to describe the difference between modelled and real predator–prey interactions. Rosenzweig used ordinary differential equation models to describe changes in prey populations. Enrichment was taken to be increasing the prey carrying capacity and showing that the prey population destabilized, usually into a limit cycle. The cycling behavior after destabilization was more thoroughly explored in a subsequent paper (May 1972) and discussion (Gilpin and Rosenzweig 1972). Support and possible solutions to the paradox Many studies have been done on the paradox of enrichment since Rosenzweig. There is empirical support for the paradox of enrichment, mainly from small scale laboratory experiments, but limited support from field observations. as summarised by Roy and Chattopadhyay , such as these exceptions: Inedible prey: if there are multiple prey species and not all are edible, some may absorb nutrients and stabilise cyclicity. Invulnerable prey: even with a single prey species, if there is a degree of temporal or spatial refuge (the prey can hide from the predator), destabilisation may not happen. Unpalatable prey: if prey do n
https://en.wikipedia.org/wiki/Histone%20methylation
Histone methylation is a process by which methyl groups are transferred to amino acids of histone proteins that make up nucleosomes, which the DNA double helix wraps around to form chromosomes. Methylation of histones can either increase or decrease transcription of genes, depending on which amino acids in the histones are methylated, and how many methyl groups are attached. Methylation events that weaken chemical attractions between histone tails and DNA increase transcription because they enable the DNA to uncoil from nucleosomes so that transcription factor proteins and RNA polymerase can access the DNA. This process is critical for the regulation of gene expression that allows different cells to express different genes. Function Histone methylation, as a mechanism for modifying chromatin structure is associated with stimulation of neural pathways known to be important for formation of long-term memories and learning. Histone methylation is crucial for almost all phases of animal embryonic development. Animal models have shown methylation and other epigenetic regulation mechanisms to be associated with conditions of aging, neurodegenerative diseases, and intellectual disability (Rubinstein–Taybi syndrome, X-linked intellectual disability). Misregulation of H3K4, H3K27, and H4K20 are associated with cancers. This modification alters the properties of the nucleosome and affects its interactions with other proteins, particularly in regards to gene transcription processes. Histone methylation can be associated with either transcriptional repression or activation. For example, trimethylation of histone H3 at lysine 4 (H3K4me3) is an active mark for transcription and is upregulated in hippocampus one hour after contextual fear conditioning in rats. However, dimethylation of histone H3 at lysine 9 (H3K9me2), a signal for transcriptional silencing, is increased after exposure to either the fear conditioning or a novel environment alone. Methylation of some lysine
https://en.wikipedia.org/wiki/Fructification
Fructification () are the generative parts of the plant (flower and fruit) (as opposed to its vegetative parts: trunk, roots and leaves). Sometimes it is applied more broadly to the generative parts of gymnosperms, ferns, horsetails, and lycophytes, though they produce neither fruit nor flower. Since the works of Andrea Caesalpino (1519–1603) the characters of fructification have been extensively used as a basis for the scientific classification of plants. Carl Linnaeus (1707–1778) raised the description of the parts of fructification to an unprecedented level of precision. He insisted that genera and the higher groups of plants must be characterised in terms of the fructification alone without using vegetative parts (which can be used only to characterise the species within genera). At that time it was believed that all plants have flowers and fruits. It was not until the nineteenth century that the important difference between seeds and spores was recognised and the use of terms flower and fruit was restricted to the flowering plants (angiosperms). Later plant taxonomists used a more balanced approach and re-introduced the use of the vegetative parts of the plant as a basis for characters at different levels of taxonomic hierarchy. See also Scientific classification Plant morphology
https://en.wikipedia.org/wiki/Beam%20parameter%20product
In laser science, the beam parameter product (BPP) is the product of a laser beam's divergence angle (half-angle) and the radius of the beam at its narrowest point (the beam waist). The BPP quantifies the quality of a laser beam, and how well it can be focused to a small spot. A Gaussian beam has the lowest possible BPP, , where is the wavelength of the light. The ratio of the BPP of an actual beam to that of an ideal Gaussian beam at the same wavelength is denoted M2 ("M squared"). This parameter is a wavelength-independent measure of beam quality. The quality of a beam is important for many applications. In fiber-optic communications beams with an M2 close to 1 are required for coupling to single-mode optical fiber. Laser machine shops care a lot about the M2 parameter of their lasers because the beams will focus to an area that is M4 times larger than that of a Gaussian beam with the same wavelength and D4σ waist width; in other words, the fluence scales as 1/M4. The rule of thumb is that M2 increases as the laser power increases. It is difficult to obtain excellent beam quality and high average power (100 W to kWs) due to thermal lensing in the laser gain medium. Measurement There are several ways to define the width of a beam. When measuring the beam parameter product and M2, one uses the D4σ or "second moment" width of the beam to determine both the radius of the beam's waist and the divergence in the far field. The BPP can be easily measured by placing an array detector or scanning-slit profiler at multiple positions within the beam after focusing it with a lens of high optical quality and known focal length. To properly obtain the BPP and M2 the following steps must be followed: Measure the D4σ widths at 5 axial positions near the beam waist (the location where the beam is narrowest). Measure the D4σ widths at 5 axial positions at least one Rayleigh length away from the waist. Fit the 10 measured data points to , where and is the second moment o
https://en.wikipedia.org/wiki/Vignette%20%28graphic%20design%29
A vignette, in graphic design, is a French loanword meaning a unique form for a frame to an image, either illustration or photograph. Rather than the image's edges being rectilinear, it is overlaid with decorative artwork featuring a unique outline. This is similar to the use of the word in photography, where the edges of an image that has been vignetted are non-linear or sometimes softened with a mask – often a darkroom process of introducing a screen. An oval vignette is probably the most common example. Originally a vignette was a design of vine-leaves and tendrils (vignette = small vine in French). The term was also used for a small embellishment without border, in what otherwise would have been a blank space, such as that found on a title-page, a headpiece or tailpiece. The use in modern graphic design is derived from book publishing techniques dating back to the Middle Ages Analytical Bibliography (ca. 1450 to 1800) when a vignette referred to an engraved design printed using a copper-plate press, on a page that has already been printed on using a letter press (Printing press). Vignettes are sometimes distinguished from other in-text illustrations printed on a copper-plate press by the fact that they do not have a border; such designs usually appear on title-pages only. Woodcuts, which are printed on a letterpress and are also used to separate sections or chapters are identified as a headpiece, tailpiece or printer's ornament, depending on shape and position. See also Calligraphy, another conjunction of text and decoration Curlicues, flourishes in the arts usually composed of concentric circles, often used in calligraphy Scrollwork, general name for scrolling abstract decoration used in many areas of the visual arts Graphic design Illustration Visual motifs
https://en.wikipedia.org/wiki/Curlicue
A curlicue, or alternatively curlycue, in the visual arts, is a fancy twist, or curl, composed usually from a series of concentric circles. It is a recurring motif in architecture (as decoration to the lintel or architrave above a door), in calligraphy and in general scrollwork. The word can also refer to a specific kind of origami, made out of a single strip of paper that can be transformed in many geometric shapes. Examples See also Scrollwork Arabesque (European art) Swash (typography) Calligraphy, in which curlicues are a frequent adornment of lavish text Sinhala script, the script used to write the Sinhala language, composed almost entirely of curlicues Visual motifs Ornaments
https://en.wikipedia.org/wiki/Peter%20Sarnak
Peter Clive Sarnak (born 18 December 1953) is a South African-born mathematician with dual South-African and American nationalities. Sarnak has been a member of the permanent faculty of the School of Mathematics at the Institute for Advanced Study since 2007. He is also Eugene Higgins Professor of Mathematics at Princeton University since 2002, succeeding Sir Andrew Wiles, and is an editor of the Annals of Mathematics. He is known for his work in analytic number theory. He also sits on the Board of Adjudicators and the selection committee for the Mathematics award, given under the auspices of the Shaw Prize. Education Sarnak is the grandson of one of Johannesburg's leading rabbis and lived in Israel for three years as a child. He graduated from the University of the Witwatersrand (BSc 1975, BSc(Hons) 1976) and Stanford University (PhD 1980), under the direction of Paul Cohen. Sarnak's highly cited work (with A. Lubotzky and R. Phillips) applied deep results in number theory to Ramanujan graphs, with connections to combinatorics and computer science. Career and research Sarnak has made major contributions to analysis and number theory. He is widely recognised internationally as one of the leading analytic number theorists of his generation. His early work on the existence of cusp forms led to the disproof of a conjecture of Atle Selberg. He has obtained the strongest known bounds towards the Ramanujan–Petersson conjectures for sparse graphs, and he was one of the first to exploit connections between certain questions of theoretical physics and analytic number theory. There are fundamental contributions to arithmetical quantum chaos, a term which he introduced, and to the relationship between random matrix theory and the zeros of L-functions. His work on subconvexity for Rankin–Selberg L-functions led to the resolution of Hilbert's eleventh problem. During his career he has held numerous appointments including: Assistant Professor, 1980–83; Associate Professor, 198
https://en.wikipedia.org/wiki/Marbled%20meat
Marbled meat is meat, especially red meat, that contains various amounts of intramuscular fat, giving it an appearance similar to marble. Important terms defined Beef quality grades - A quality grade is a composite evaluation of factors that affect palatability of meat (tenderness, juiciness, and flavor). These factors include carcass maturity, firmness, texture, and color of lean, and the amount and distribution of marbling within the lean. Beef carcass quality grading is based on (1) degree of marbling and (2) degree of maturity. Marbling - (intramuscular fat) is the intermingling or dispersion of fat within the lean. Graders evaluate the amount and distribution of marbling in the ribeye muscle at the cut surface after the carcass has been ribbed between the 12th and 13th ribs. Degree of marbling is the primary determination of quality grade. Maturity refers to the physiological age of the animal rather than the chronological age. Because the chronological age is virtually never known, physiological maturity is used; the indicators are bone characteristics, ossification of cartilage, and the color and texture of ribeye muscle. Cartilage becomes bone, lean color darkens and texture becomes coarser with increasing age. Cartilage and bone maturity receives more emphasis because lean color and texture can be affected by other postmortem factors. Beef yield grades - In beef, yield grades estimate the amount of boneless, closely trimmed retail cuts from the high-value parts of the carcass–the round, loin, rib, and chuck. However, they also show differences in the total yield of retail cuts. We expect a YG 1 carcass to have the highest percentage of boneless, closely trimmed retail cuts, or higher cutability, while a YG 5 carcass would have the lowest percentage of boneless, closely trimmed retail cuts, or the lowest cutability. The USDA Yield Grades are rated numerically and are 1, 2, 3, 4, and 5. Yield Grade 1 denotes the highest yielding carcass and Yield Grade 5
https://en.wikipedia.org/wiki/Dip-coating
Dip coating is an industrial coating process which is used, for example, to manufacture bulk products such as coated fabrics and condoms and specialised coatings for example in the biomedical field. Dip coating is also commonly used in academic research, where many chemical and nano material engineering research projects use the dip coating technique to create thin-film coatings. The earliest dip-coated products may have been candles. For flexible laminar substrates such as fabrics, dip coating may be performed as a continuous roll-to-roll process. For coating a 3D object, it may simply be inserted and removed from the bath of coating. For condom-making, a former is dipped into the coating. For some products, such as early methods of making candles, the process is repeated many times, allowing a series of thin films to bulk up to a relatively thick final object. The final product may incorporate the substrate and the coating, or the coating may be peeled off to form an object which consists solely of the dried or solidified coating, as in the case of a condom. As a popular alternative to Spin coating, dip-coating methods are frequently employed to produce thin films from sol-gel precursors for research purposes, where it is generally used for applying films onto flat or cylindrical substrates. Process The dip-coating process can be separated into five stages: Immersion: The substrate is immersed in the solution of the coating material at a constant speed (preferably jitter-free). Start-up: The substrate has remained inside the solution for a while and is starting to be pulled up. Deposition: The thin layer deposits itself on the substrate while it is pulled up. The withdrawing is carried out at a constant speed to avoid any jitters. The speed determines the thickness of the coating (faster withdrawal gives thicker coating material). Drainage: Excess liquid will drain from the surface. Evaporation: The solvent evaporates from the liquid, forming the thin lay
https://en.wikipedia.org/wiki/Circumflex%20scapular%20artery
The circumflex scapular artery (scapular circumflex artery, dorsalis scapulae artery) is a branch of the subscapular artery and part of the scapular anastomoses. It curves around the axillary border of the scapula, traveling through the anatomical "Triangular space" made up of the Teres minor superiorly, the Teres major inferiorly, and the long head of the Triceps laterally. It enters the infraspinatous fossa under cover of the Teres minor, and anastomoses with the transverse scapular artery (suprascapular) and the descending branch of the transverse cervical (a.k.a. dorsal scapular artery). Branches In its course it gives off two branches: one (infrascapular) enters the subscapular fossa beneath the Subscapularis, which it supplies, anastomosing with the transverse scapular artery and the descending branch of the transverse cervical. the other is continued along the axillary border of the scapula, between the Teres major and minor, and at the dorsal surface of the inferior angle anastomosis with the descending branch of the transverse cervical (dorsal scapular). In addition to these, small branches are distributed to the back part of the Deltoid and the long head of the Triceps brachii, anastomosing with an ascending branch of the deep artery of arm.
https://en.wikipedia.org/wiki/Leycesteria%20formosa
Leycesteria formosa, the pheasant berry, is a deciduous shrub in the family Caprifoliaceae, native to the Himalayas and southwestern China. It is considered a noxious invasive species in Australia, New Zealand, the neighbouring islands of Micronesia, and some other places. In its native Himalaya the shrub is frequently used in the traditional medicine of the various countries and peoples encompassed within the region. Names The genus name Leycesteria was coined by Nathaniel Wallich (one time director of Royal Botanic Garden, Calcutta) in honour of his friend William Leycester, Chief justice and noted amateur horticulturist, in Bengal in about 1820; while the Latin specific name formosa (feminine form of formosus) signifies 'beautiful' or 'handsome' (literally: 'shapely') - in reference to the curious, pendent inflorescences with their richly wine-coloured bracts. There is a popular misconception, however, that the specific name derives from the place name 'Formosa', which is an abbreviation of the original Portuguese name for the island of Taiwan: Ilha Formosa "beautiful island". Portuguese is a romance language (i.e. derived from Latin) and the adjective formosa has passed into it unchanged in spelling and meaning from the original Latin. Leycesteria formosa is so named in recognition of its beauty, not in acknowledgment of an origin on the island now known as Taiwan. The Latin specific names of certain plants, given to indicate that they were native to Taiwan at a time when it was known as Formosa take such forms as formosae, formosana and formosensis, not the Latin adjective/Portuguese adjective-used-as-a-proper-noun formosa. Other common names include Himalayan honeysuckle, pheasant-eye, Elisha's tears, flowering nutmeg, spiderwort, Cape fuchsia, whistle stick, Himalaya nutmeg, granny's curls,partridge berry, chocolate berry, shrimp plant/flower and treacle tree/berry It is also recorded as Symphoricarpos rivularis Suksdorf. Contrary to the impression gi
https://en.wikipedia.org/wiki/Evil%20number
In number theory, an evil number is a non-negative integer that has an even number of 1s in its binary expansion. These numbers give the positions of the zero values in the Thue–Morse sequence, and for this reason they have also been called the Thue–Morse set. Non-negative integers that are not evil are called odious numbers. Examples The first evil numbers are: 0, 3, 5, 6, 9, 10, 12, 15, 17, 18, 20, 23, 24, 27, 29, 30, 33, 34, 36, 39 ... Equal sums The partition of the non-negative integers into the odious and evil numbers is the unique partition of these numbers into two sets that have equal multisets of pairwise sums. As 19th-century mathematician Eugène Prouhet showed, the partition into evil and odious numbers of the numbers from to , for any , provides a solution to the Prouhet–Tarry–Escott problem of finding sets of numbers whose sums of powers are equal up to the th power. In computer science In computer science, an evil number is said to have even parity.
https://en.wikipedia.org/wiki/Animal%20repellent
An animal repellent consists of any object or method made with the intention of keeping animals away from personal items as well as food, plants or yourself. Plants and other living organisms naturally possess a special ability to emit chemicals known as semiochemicals as a way to defend themselves from predators. Humans purposely make use of some of those and create a way to repel animals through various forms of protection. Overview Repellents generally work by taking advantage of an animal's natural aversion to something, and often the thing chosen is something that the animal has learned to avoid (or instinctively avoids) in its natural environment. Chemical repellents fall into two main categories, odor and taste. The former work better in the warm season and the latter, which ward off an animal only after it eats, in the cold season. (For example, the smell of the lawn fertilizer Milorganite is claimed to make it an effective repellent.) Such repellents mimic natural substances that deter animals and/or are designed to be so irritating to a specific animal or type of animal that it will avoid the protected object or area. Contact plant-origin repellents such as pepper, peppermint, tarragon, garlic, various essential oils, and castor oil, as well as diatomaceous earth and putrescent egg solids, are examples. Further, some repellents function by inducing fear in the target animal. Such a repellent may contain animal urine, dried blood, or hair. Some animals will avoid anything that has the odor of the urine of their predators. Tiger urine is thus very effective at keeping away animals. Coyote urine has gained currency as a deer repellent. Fox urine is used to repel rabbits, groundhogs, woodchucks, squirrels and chipmunks. Bobcat urine repels moles, mice, voles and other rodents. Wolf urine is used to repel moose. Used cat litter is also effective. Domestic dogs can be repelled by vinegar. Other repellents are not chemical. A simple electrified or barbed-wi
https://en.wikipedia.org/wiki/Iliocostalis
Iliocostalis muscle is the muscle immediately lateral to the longissimus that is the nearest to the furrow that separates the epaxial muscles from the hypaxial. It lies very deep to the fleshy portion of the serratus posterior muscle. It laterally flexes the vertebral column to the same side. Structure Iliocostalis muscle has a common origin from the iliac crest, the sacrum, the thoracolumbar fascia, and the spinous processes of the vertebrae from T11 to L5. Iliocostalis cervicis (cervicalis ascendens) arises from the angles of the third, fourth, fifth, and sixth ribs, and is inserted into the posterior tubercles of the transverse processes of the fourth, fifth, and sixth cervical vertebrae. Iliocostalis thoracis (musculus accessorius; iliocostalis thoracis) arises by flattened tendons from the upper borders of the angles of the lower six ribs medial to the tendons of insertion of the iliocostalis lumborum; these become muscular, and are inserted into the upper borders of the angles of the upper six ribs and into the back of the transverse process of the seventh cervical vertebra. Iliocostalis lumborum (iliocostalis muscle; sacrolumbalis muscle) is inserted, by flattened tendons, into the inferior borders of the angles of the lower six to nine ribs. Nerve supply Iliocostalis muscle is supplied by the dorsal rami of spinal nerves. Function Iliocostalis muscle laterally flexes the vertebral column to the same side. It bilaterally extends the vertebral column. See also Erector spinae muscles Longissimus muscles Semispinalis muscles Spinalis muscle
https://en.wikipedia.org/wiki/Spinalis
The spinalis is a portion of the erector spinae, a bundle of muscles and tendons, located nearest to the spine. It is divided into three parts: Spinalis dorsi, spinalis cervicis, and spinalis capitis. Spinalis dorsi Spinalis dorsi, the medial continuation of the sacrospinalis, is scarcely separable as a distinct muscle. It is situated at the medial side of the longissimus dorsi, and is intimately blended with it; it arises by three or four tendons from the spinous processes of the first two lumbar and the last two thoracic vertebrae: these, uniting, form a small muscle which is inserted by separate tendons into the spinous processes of the upper thoracic vertebrae, the number varying from four to eight. It is intimately united with the semispinalis dorsi, situated beneath it. Spinalis cervicis Spinalis cervicis, or spinalis colli, is an inconstant muscle, which arises from the lower part of the nuchal ligament, the spinous process of the seventh cervical, and sometimes from the spinous processes of the first and second thoracic vertebrae, and is inserted into the spinous process of the axis, and occasionally into the spinous processes of the two cervical vertebrae below it. Spinalis capitis Spinalis capitis (biventer cervicis) is usually inseparably connected with the semispinalis capitis. Spinalis capitis is not well characterized in modern anatomy textbooks and atlases, and is often omitted from anatomical illustration. However, it can be identified as fibers that extend from the spinous processes of TV1 and CV7 to the cranium, often blending with semispinalis capitis See also Iliocostalis Longissimus Semispinalis muscle
https://en.wikipedia.org/wiki/Longissimus
The longissimus () is the muscle lateral to the semispinalis muscles. It is the longest subdivision of the erector spinae muscles that extends forward into the transverse processes of the posterior cervical vertebrae. Structure Longissimus thoracis et lumborum The longissimus thoracis et lumborum is the intermediate and largest of the continuations of the erector spinae. In the lumbar region (longissimus lumborum), where it is as yet blended with the iliocostalis, some of its fibers are attached to the whole length of the posterior surfaces of the transverse processes and the accessory processes of the lumbar vertebrae, and to the anterior layer of the lumbodorsal fascia. In the thoracic region (longissimus thoracis), it is inserted, by rounded tendons, into the tips of the transverse processes of all the thoracic vertebrae, and by fleshy processes into the lower nine or ten ribs between their tubercles and angles. Longissimus cervicis The longissimus cervicis (transversalis cervicis), situated medial to the longissimus thoracis, arises by long, thin tendons from the summits of the transverse processes of thoracic vertebræ 1–5, and is inserted by similar tendons into the posterior tubercles of the transverse processes of cervical vertebrae 2–6. Longissimus capitis The longissimus capitis (trachelomastoid muscle) lies medial to the longissimus cervicis, between it and the semispinalis capitis. It arises by tendons from the transverse processes of the upper four or five thoracic vertebrae, and the articular processes of the lower three or four cervical vertebrae, and is inserted into the posterior margin of the mastoid process, beneath the splenius capitis and sternocleidomastoid. It is almost always crossed by a tendinous intersection near its insertion. See also Spinalis
https://en.wikipedia.org/wiki/Canadian%20Association%20of%20Physicists
Canadian Association of Physicists (CAP), or in French Association canadienne des physiciens et physiciennes (ACP) is a Canadian professional society that focuses on creating awareness among Canadians and Canadian legislators of physics issues, sponsoring physics related events, physics outreach, and publishes Physics in Canada. It was founded in July 1945. The organization has over 1,600 members and is bilingual, functioning in English and French. P. Phys. professional certification The CAP can appoint an official designation called the P. Phys. which stands for Professional Physicist, similar to the designation of P. Eng. which stands for Professional Engineer. This designation was unveiled at the CAP congress in 1999 and more than 200 people carry this distinction. Physics contests The Canadian Association of Physics hosts several CAP physics contests across Canada each year, aimed at different levels of physics students. The CAP High School Prize exam is offered across Canada once a year, usually in early April, and aims to challenge physics students on their physics knowledge. It is a national exam and the top participants are invited to try out for the Canadian Physics Olympiad international team trained by volunteers from the University of British Columbia. The CAP Lloyd G. Elliott Prize exam, also known as the "University Prize Exam", is offered once a year, usually in early February, to Canadian university undergraduate physics students. The CAP Best Student Presentation Competition is held during the CAP's annual congress. The CAP awards prizes to the physics students who make the three best oral presentations and the three physics students who make the three best poster presentations. CAP Congress The CAP holds an annual congress each year to discuss internal matters, hold elections, hold oral and poster sessions, give formation workshops to high school physics teachers, and hold the Herzberg Public Memorial lecture. The 2023 Congress will be held at
https://en.wikipedia.org/wiki/Nuclear%20run-on
A nuclear run-on assay is conducted to identify the genes that are being transcribed at a certain time point. Approximately one million cell nuclei are isolated and incubated with labeled nucleotides, and genes in the process of being transcribed are detected by hybridization of extracted RNA to gene specific probes on a blot. Garcia-Martinez et al. (2004) developed a protocol for the yeast S. cerevisiae (Genomic run-on, GRO) that allows for the calculation of transcription rates (TRs) for all yeast genes to estimate mRNA stabilities for all yeast mRNAs. Alternative microarray methods have recently been developed, mainly PolII RIP-chip: RNA immunoprecipitation of RNA polymerase II with phosphorylated C-terminal domain directed antibodies and hybridization on a microarray slide or chip (the word chip in the name stems from "ChIP-chip" where a special Affymetrix GeneChip was required). A comparison of methods based on run-on and ChIP-chip has been made in yeast (Pelechano et al., 2009). A general correspondence of both methods has been detected but GRO is more sensitive and quantitative. It has to be considered that run-on only detects elongating RNA polymerases whereas ChIP-chip detects all present RNA polymerases, including backtracked ones. Attachment of new RNA polymerase to genes is prevented by inclusion of sarkosyl. Therefore only genes that already have an RNA polymerase will produce labeled transcripts. RNA transcripts that were synthesized before the addition of the label will not be detected as they will lack the label. These run on transcripts can also be detected by purifying labeled transcripts by using antibodies that detect the label and hybridizing these isolated transcripts with gene expression arrays or by next generation sequencing (GRO-Seq). Run on assays have been largely supplanted with Global Run on assays that use next generation DNA sequencing as a readout platform. These assays are known as GRO-Seq and provide an incredibly detailed view
https://en.wikipedia.org/wiki/Homoiconicity
In computer programming, homoiconicity (from the Greek words homo- meaning "the same" and icon meaning "representation") is a property of some programming languages. A language is homoiconic if a program written in it can be manipulated as data using the language, and thus the program's internal representation can be inferred just by reading the program itself. This property is often summarized by saying that the language treats code as data. In a homoiconic language, the primary representation of programs is also a data structure in a primitive type of the language itself. This makes metaprogramming easier than in a language without this property: reflection in the language (examining the program's entities at runtime) depends on a single, homogeneous structure, and it does not have to handle several different structures that would appear in a complex syntax. Homoiconic languages typically include full support of syntactic macros, allowing the programmer to express transformations of programs in a concise way. A commonly cited example is Lisp, which was created to allow for easy list manipulations and where the structure is given by S-expressions that take the form of nested lists, and can be manipulated by other Lisp code. Other examples are the programming languages Clojure (a contemporary dialect of Lisp), Rebol (also its successor Red), Refal, Prolog, and possibly Julia (see the section “Implementation methods” for more details). History The term first appeared in connection with the TRAC programming language, developed by Calvin Mooers: The last sentence above is annotated with footnote 4, which gives credit for the origin of the term: The researchers implicated in this quote might be neurophysiologist and cybernetician Warren Sturgis McCulloch (note the difference in the surname from the note) and philosopher, logician and mathematician Charles Sanders Peirce. Pierce indeed used the term "icon" in his Semiotic Theory. According to Peirce, there are th
https://en.wikipedia.org/wiki/Laccaria%20laccata
Laccaria laccata, commonly known as the deceiver, lackluster laccaria, or waxy laccaria, is a white-spored species of small edible mushroom found throughout North America and Europe. It is a highly variable mushroom (hence 'deceiver'), and can look quite washed out, colorless and drab, but when younger it often assumes red, pinkish brown, and orange tones. The species is often considered by mushroom collectors to be a 'mushroom weed' because of its abundance and plain stature. Taxonomy The deceiver was first described by Tyrolian naturalist Giovanni Antonio Scopoli in 1772 as Agaricus laccatus, before being given its current binomial name by Mordecai Cubitt Cooke in 1884. The specific epithet is derived from the Latin adjective laccatus 'varnished' or 'shining'. Clitocybe laccata is an old alternative name. Var. pallidifolia, described by Charles Horton Peck, is the most common variety found in North America. It is the type species of the cosmopolitan mushroom genus Laccaria; where their relations lie among the gilled mushrooms is unclear, but they are currently classified in the family Hydnangiaceae. The deceiver gets its common name from its variable appearance. Other names include lacklustre laccaria, and, by the Zapotec people, Beshia ladhi biinii (also the name of other members of Laccaria). Description The deceiver is a small mushroom with a cap measuring in diameter, convex when young and later flattening or even depressed in the center. It can be various shades of salmon pink, brick-red, or shades of orange or brown when moist or young, and duller and paler when dry. The fibrous stipe is high and wide. The irregular gills are widely spaced and decurrent or adnexed, and of similar color to the cap, though whiten with spores as the mushroom matures. The spore print is white, and the round spiny spores are 7–10 μm in diameter. The flesh is thin and has little taste. Formerly considered a subspecies by French mycologist René Maire, the close deceiver (
https://en.wikipedia.org/wiki/Thromboplastin
Thromboplastin (TPL) is derived from cell membranes and is a mixture of both phospholipids and tissue factor, neither of which are enzymes. Thromboplastin acts on and accelerates the activity of Factor Xa, also known as thrombokinase, aiding blood coagulation through catalyzing the conversion of prothrombin to thrombin. Thromboplastin is found in brain, lung, and other tissues and especially in blood platelets. Thromboplastin is sometimes used as a synonym for the protein tissue factor (with its official name "Coagulation factor III [thromboplastin, tissue factor]"). Historically, thromboplastin was a lab reagent, usually derived from placental sources, used to assay prothrombin times (PT). When manipulated in the laboratory, a derivative could be created called partial thromboplastin. Partial thromboplastin was used to measure the intrinsic pathway. This test is called the aPTT, or activated partial thromboplastin time. It was not until much later that the subcomponents of thromboplastin and partial thromboplastin were identified. Thromboplastin is the combination of both phospholipids and tissue factor, both of which are needed in the activation of the extrinsic pathway. However, partial thromboplastin is just phospholipids, and not tissue factor. Therefore, although the coagulation cascade can be triggered in vitro through the intrinsic pathway only, in vivo coagulation is triggered by the extrinsic pathway. However, the model better describing how coagulation works is the so-called cell-based model, a more integrated picture of the whole process, in which phospholipid surfaces, such as those provided by platelets, are a key component. Currently, recombinant tissue factor is available and used in some PT assays. Placental derivatives are still available and are used in some laboratories. Phospholipid is available as an independent reagent or in combination with tissue factor as thromboplastin. Complete thromboplastin consists of tissue factor, phospholipid
https://en.wikipedia.org/wiki/Viral%20transformation
Viral transformation is the change in growth, phenotype, or indefinite reproduction of cells caused by the introduction of inheritable material. Through this process, a virus causes harmful transformations of an in vivo cell or cell culture. The term can also be understood as DNA transfection using a viral vector. Viral transformation can occur both naturally and medically. Natural transformations can include viral cancers, such as human papillomavirus (HPV) and T-cell Leukemia virus type I. Hepatitis B and C are also the result of natural viral transformation of the host cells. Viral transformation can also be induced for use in medical treatments. Cells that have been virally transformed can be differentiated from untransformed cells through a variety of growth, surface, and intracellular observations. The growth of transformed cells can be impacted by a loss of growth limitation caused by cell contact, less oriented growth, and high saturation density. Transformed cells can lose their tight junctions, increase their rate of nutrient transfer, and increase their protease secretion. Transformation can also affect the cytoskeleton and change in the quantity of signal molecules. Type There are three types of viral infections that can be considered under the topic of viral transformation. These are cytocidal, persistent, and transforming infections. Cytocidal infections can cause fusion of adjacent cells, disruption of transport pathways including ions and other cell signals, disruption of DNA, RNA and protein synthesis, and nearly always leads to cell death. Persistent infections involve viral material that lays dormant within a cell until activated by some stimulus. This type of infection usually causes few obvious changes within the cell but can lead to long chronic diseases. Transforming infections are also referred to as malignant transformation. This infection causes a host cell to become malignant and can be either cytocidal (usually in the c
https://en.wikipedia.org/wiki/DSSP%20%28imaging%29
DSSP stands for digital shape sampling and processing. It is an alternative and often preferred way of describing "reverse engineering" software and hardware. The term originated in a 2005 Society of Manufacturing Engineers' "Blue Book" on the topic, which referenced numerous suppliers of both scanning hardware and processing software. DSSP employs various 3D scanning methods, including laser scanners, to acquire thousands to millions of points on the surface of a form and then software from a variety of suppliers to convert the resulting "point cloud" into forms useful for inspection, computer-aided design, visualization and other applications. It may also employ volumetric methods of scanning, such as digital tomography. Some common applications include CAI (computer-aided inspection), creation of 3D CAD models from scanned data, medical applications, 3D imaging for Web 2.0 applications, and the restoration of culturally significant artifacts; as well as conventional reverse engineering for creating replacement parts. The term 'reverse engineering' itself has acquired some notoriety when the technology has been used to copy others' designs. The term 'laser scanning' has also been used somewhat interchangeably for DSSP. However, there are two problems with the term as a broad description of the field. First, it is only one of many alternative scanning technologies. Second, it misses the essential role of processing software in converting point cloud data into useful forms. In some ways, DSSP is a 3D analog to DSP (digital signal processing) in that the software attempts to extract a clear and accurate 3D image from point data that may include noise. The notion of 'shape sampling' embedded in the term also acknowledges that, as in many measurement processes, the accuracy of the 3D data will depend upon the number and accuracy of points sampled. The speed and accuracy of both scanners to acquire data and software algorithms to extract useful data has dramatical
https://en.wikipedia.org/wiki/Vibration%20isolation
Vibration isolation is the prevention of transmission of vibration from one component of a system to others parts of the same system, as in buildings or mechanical systems. Vibration is undesirable in many domains, primarily engineered systems and habitable spaces, and methods have been developed to prevent the transfer of vibration to such systems. Vibrations propagate via mechanical waves and certain mechanical linkages conduct vibrations more efficiently than others. Passive vibration isolation makes use of materials and mechanical linkages that absorb and damp these mechanical waves. Active vibration isolation involves sensors and actuators that produce disruptive interference that cancels-out incoming vibration. Passive isolation "Passive vibration isolation" refers to vibration isolation or mitigation of vibrations by passive techniques such as rubber pads or mechanical springs, as opposed to "active vibration isolation" or "electronic force cancellation" employing electric power, sensors, actuators, and control systems. Passive vibration isolation is a vast subject, since there are many types of passive vibration isolators used for many different applications. A few of these applications are for industrial equipment such as pumps, motors, HVAC systems, or washing machines; isolation of civil engineering structures from earthquakes (base isolation), sensitive laboratory equipment, valuable statuary, and high-end audio. A basic understanding of how passive isolation works, the more common types of passive isolators, and the main factors that influence the selection of passive isolators: Common passive isolation systems Pneumatic or air isolators These are bladders or canisters of compressed air. A source of compressed air is required to maintain them. Air springs are rubber bladders which provide damping as well as isolation and are used in large trucks. Some pneumatic isolators can attain low resonant frequencies and are used for isolating large industr
https://en.wikipedia.org/wiki/Quasi-solid
Quasi-solid, Falsely-solid, or semisolid is the physical term for something whose state lies between a solid and a liquid. While similar to solids in some respects, such as having the ability to support their own weight and hold their shapes, a quasi-solid also shares some properties of liquids, such as conforming in shape to something applying pressure to it and the ability to flow under pressure. The words quasi-solid, semisolid, and semiliquid may be used interchangeably. Quasi-solids and semisolids are sometimes described as amorphous because at the microscopic scale they have a disordered structure unlike the more common crystalline solids. They should not be confused with amorphous solids as they are not solids and exhibit properties such as flow which bulk solids do not. Examples Pharmaceutical and cosmetic creams, gels, and ointments, e.g. petroleum jelly, toothpaste, hand sanitizer Foods, e.g. pudding, guacamole, salsa, mayonnaise, whipping cream, peanut butter, jelly, jam See also Plasticity (physics) Viscosity Premelting
https://en.wikipedia.org/wiki/Vitellogenin
Vitellogenin (VTG or less popularly known as VG) (from Latin vitellus, yolk, and genero, I produce) is a precursor of egg yolk that transports protein and some lipid from the liver through the blood to the growing oocytes where it becomes part of the yolk. Normally, it is only found in the blood or hemolymph of females, and can therefore be used as a biomarker in vertebrates of exposure to environmental estrogens which stimulate elevated levels in males as well as females. "Vitellogenin" is a synonymous term for the gene and the expressed protein. The protein product is classified as a glycolipoprotein, having properties of a sugar, fat and protein. It belongs to a family of several lipid transport proteins. Vitellogenin is an egg yolk precursor found in the females of nearly all oviparous species including fish, amphibians, reptiles, birds, most invertebrates, and monotremes. Vitellogenin is the precursor of the lipoproteins and phosphoproteins that make up most of the protein content of yolk. In the presence of estrogenic endocrine disruptive chemicals (EDCs), male fish can express the gene in a dose dependent manner. This gene expression in male fish can be used as a molecular marker of exposure to estrogenic EDCs. Function Vitellogenin provides the major egg yolk protein that is a source of nutrients during early development of egg-laying (oviparous) vertebrates and invertebrates. Although vitellogenin also carries some lipid for deposition in the yolk, the primary mechanism for deposition of yolk lipid is instead via VLDLs, at least in birds and reptiles. Vitellogenin precursors are multi-domain apolipoproteins (proteins that bind to lipids to form lipoproteins), that are cleaved into distinct yolk proteins. Different vitellogenin proteins exist, which are composed of variable combinations of yolk protein components; however, the cleavage sites are conserved. Components In vertebrates, a complete vitellogenin is composed of: an N-terminal signal peptid
https://en.wikipedia.org/wiki/Personal%20communicator
The term personal communicator has been used with several meanings. Around 1990 the next generation digital mobile phones were called digital personal communicators. Another definition, coined in 1991, is for a category of handheld devices that provide personal information manager functions and packet switched wireless data communications capabilities over wireless wide area networks such as cellular networks. These devices are now commonly referred to as smartphones. See also AT&T EO Personal Communicator, 1993 IBM Simon Personal Communicator, 1994 Nokia Communicator Wireless PDA Smartphone External links Concept genesis, Aug 1991 The Executive Computer; 'Mother of All Markets' or a 'Pipe Dream Driven by Greed'? NYT, July 1992 EO Inc. Describes 'Personal Communicator' Devices, New York Times,1992 Motorola expands family of personal communicator products, Mobile Phone News,1993 Bellsouth, IBM unveil personal communicator phone, Mobile Phone News,1993 The EO 440 And EO 880 Paradigms For Personal Communicators, Mobile Computing,1993 The Return of the PDA, Marketing Computers,1995 Personal digital assistants Mobile computers
https://en.wikipedia.org/wiki/SLIP%20%28programming%20language%29
SLIP is a list processing computer programming language, invented by Joseph Weizenbaum in the 1960s. The name SLIP stands for Symmetric LIst Processor. It was first implemented as an extension to the Fortran programming language, and later embedded into MAD and ALGOL. The best known program written in the language is ELIZA, an early natural language processing computer program created by Weizenbaum at the MIT Artificial Intelligence Laboratory. General overview In a nutshell, SLIP consisted of a set of FORTRAN "accessor" functions which operated on circular doubly linked lists with fixed-size data fields. The "accessor" functions had direct and indirect addressing variants. List representation The list representation had four types of cell: a reader, a header, a sublist indicator, and a payload cell. The header included a reference count field for garbage collection purposes. The sublist indicator allowed it to be able to represent nested lists, such as (A, B, C, (1, 2, 3), D, E, F) where (1, 2, 3) is a sublist indicated by a cell in the '*' position in the list (A, B, C, *, D, E, F). The reader was essentially a state history stack—a good example of a memento pattern—where each cell pointed to the header of the list being read, the current position within the list being read, and the level or depth of the history stack.
https://en.wikipedia.org/wiki/EOS%20memory
EOS memory (for ECC on SIMMs) is an error-correcting memory system built into SIMMs, used to upgrade server-class computers without built-in ECC memory support. The EOS SIMM itself does the error checking, with reduced need for ECC memory modules and support. The technology was introduced by IBM in the mid-1990s.
https://en.wikipedia.org/wiki/Hyperbolic%20Dehn%20surgery
In mathematics, hyperbolic Dehn surgery is an operation by which one can obtain further hyperbolic 3-manifolds from a given cusped hyperbolic 3-manifold. Hyperbolic Dehn surgery exists only in dimension three and is one which distinguishes hyperbolic geometry in three dimensions from other dimensions. Such an operation is often also called hyperbolic Dehn filling, as Dehn surgery proper refers to a "drill and fill" operation on a link which consists of drilling out a neighborhood of the link and then filling back in with solid tori. Hyperbolic Dehn surgery actually only involves "filling". We will generally assume that a hyperbolic 3-manifold is complete. Suppose M is a cusped hyperbolic 3-manifold with n cusps. M can be thought of, topologically, as the interior of a compact manifold with toral boundary. Suppose we have chosen a meridian and longitude for each boundary torus, i.e. simple closed curves that are generators for the fundamental group of the torus. Let denote the manifold obtained from M by filling in the i-th boundary torus with a solid torus using the slope where each pair and are coprime integers. We allow a to be which means we do not fill in that cusp, i.e. do the "empty" Dehn filling. So M = . We equip the space H of finite volume hyperbolic 3-manifolds with the geometric topology. Thurston's hyperbolic Dehn surgery theorem states: is hyperbolic as long as a finite set of exceptional slopes is avoided for the i-th cusp for each i. In addition, converges to M in H as all for all corresponding to non-empty Dehn fillings . This theorem is due to William Thurston and fundamental to the theory of hyperbolic 3-manifolds. It shows that nontrivial limits exist in H. Troels Jorgensen's study of the geometric topology further shows that all nontrivial limits arise by Dehn filling as in the theorem. Another important result by Thurston is that volume decreases under hyperbolic Dehn filling. In fact, the theorem states t
https://en.wikipedia.org/wiki/Gastrique
Gastrique is caramelized sugar, deglazed with vinegar or other sour liquids, used as a sweet and sour flavoring for sauces. The gastrique is generally added to a fond, reduced stock or brown sauce. It is also used to flavor sauces such as tomato sauce, savory fruit sauces, and others, such as the orange sauce for duck à l'orange. The term is often broadened to mean any sweet and sour sauce, e.g., citrus gastrique or mango gastrique. An agrodolce is a similar sauce found in Italian cuisine. It is different from the Belgian sauce base of the same name, which consists of vinegar, white wine, shallots, tarragon stems, bouquet garni, and peppercorns. The gastrique with this composition was already used by Auguste Escoffier, but at the end of the 19th century, Louis Védy from Brussels turned it into a plant extract that ensures a constant level of acidity when making béarnaise sauce. History Caramel dissolved in vinegar is used by Escoffier in 1903, with no special name, just described as "sucre cuit au caramel blond, dissous avec 1 décilitre de vinaigre" in his recipes for Sauce Romaine and Carpe à la Polonaise; similarly, Prosper Montagné in 1922 just says "caramel au vinaigre", and the Répertoire de la Cuisine says "caramel blond dissous au vinaigre". The name gastrique appears to have come in with nouvelle cuisine by the 1980s, defined as an "indispensable preparation used in making sauces to accompany hot creations including fruits, such as duck à l'orange."
https://en.wikipedia.org/wiki/Mathematical%20Olympiads%20for%20Elementary%20and%20Middle%20Schools
Mathematical Olympiads for Elementary and Middle Schools (MOEMS) is a worldwide math competition, organized by a not for profit foundation with the same name. It is held yearly from November through March with one test administered each month. Tests are given at individual schools and results are sent to MOEMS for scoring. Schools, home schools and institutions may participate in the contest. Two dozen other nations also participate in the competition. There are two divisions, Elementary and Middle School. Elementary level problems are for grades 4-6 and Middle School level problems are for grades 7-8, though 4-6 graders may participate in Middle School problems. Hundreds of thousands of students participate annually in MOEMS events. MOEMS plans soon to develop an online teacher training program. History First set up in 1977 by founder George Lenchner (1917–2006), MOEMS became a public competition in 1979. Lenchner, who died after decades in service to the math education community, wrote several books on elementary problem solving used by many MOEMS teachers and students. His obituary was featured in the Sunday New York Times on May 14, 2006. The current MOEMS Director is Richard Kalman who also worked with the American Regions Mathematics League for many years.
https://en.wikipedia.org/wiki/Viral%20envelope
A viral envelope is the outermost layer of many types of viruses. It protects the genetic material in their life cycle when traveling between host cells. Not all viruses have envelopes. A viral envelope protein or E protein is a protein in the envelope, which may be acquired by the capsid from an infected host cell. Numerous human pathogenic viruses in circulation are encased in lipid bilayers, and they infect their target cells by causing the viral envelope and cell membrane to fuse. Although there are effective vaccines against some of these viruses, there is no preventative or curative medicine for the majority of them. In most cases, the known vaccines operate by inducing antibodies that prevent the pathogen from entering cells. This happens in the case of enveloped viruses when the antibodies bind to the viral envelope proteins. The membrane fusion event that triggers viral entrance is caused by the viral fusion protein. Many enveloped viruses only have one protein visible on the surface of the particle, which is required for both mediating adhesion to the cell surface and for the subsequent membrane fusion process. To create potentially protective vaccines for human pathogenic enveloped viruses for which there is currently no vaccine, it is essential to comprehend how antibodies interact with viral envelope proteins, particularly with the fusion protein, and how antibodies neutralize viruses. Enveloped viruses enter cells by joining a cellular membrane to their lipid bilayer membrane. Priming by proteolytic processing, either of the fusion protein or of a companion protein, is necessary for the majority of viral fusion proteins. The priming stage then gets the fusion protein ready for triggering by the processes that go along with attachment and uptake, which frequently happens during transport of the fusion protein to the cell surface but may also happen extracellularly. So far, structural studies have revealed two kinds of viral fusion proteins. These pro
https://en.wikipedia.org/wiki/Minimum%20energy%20control
In control theory, the minimum energy control is the control that will bring a linear time invariant system to a desired state with a minimum expenditure of energy. Let the linear time invariant (LTI) system be with initial state . One seeks an input so that the system will be in the state at time , and for any other input , which also drives the system from to at time , the energy expenditure would be larger, i.e., To choose this input, first compute the controllability Gramian Assuming is nonsingular (if and only if the system is controllable), the minimum energy control is then Substitution into the solution verifies the achievement of state at . See also LTI system theory Control engineering State space (controls) Variational Calculus Control theory
https://en.wikipedia.org/wiki/Imposex
Imposex is a disorder in sea snails caused by the toxic effects of certain marine pollutants. These pollutants cause female sea snails (marine gastropod molluscs) to develop male sex organs such as a penis and a vas deferens. Imposex inducing substances It was believed that the only inducer of imposex was tributyltin (TBT), which can be active in extremely low concentrations, but recent studies reported other substances as inducers, such as triphenyltin and ethanol. Tributyltin is used as an anti-fouling agent for boats which affects females of the species Nucella lapillus (dog whelk), Voluta ebraea (the Hebrew volute), Olivancillaria vesica, Stramonita haemastoma (red-mouthed rock shell) and more than 200 other marine gastropods. Abnormalities In the dog whelk, the growth of a penis in imposex females gradually blocks the oviduct, although ovule production continues. An imposex female dog whelk passes through several stages of penis growth before it becomes unable to maintain a constant production of ovules. Later stages of imposex lead to sterility and the premature death of the females of reproductive age, which can adversely affect the entire population. In 1993, Scientists from the Plymouth Marine Laboratory found a thriving dog-whelk population in the Dumpton Gap, near Ramsgate in the UK despite high levels of TBT in the water. In the Dumpton Gap population, only 25% of females showed any significant signs of imposex, while 10% of males were characterized by the absence of a penis or an undersized penis, with incomplete development of the vas deferens and prostate. After further experiments, scientists concluded that "Dumpton Syndrome" was a genetic selection caused by high TBT levels. TBT-resistance was improved at the cost of lower reproductive fitness. Biomonitoring The imposex stages of female dog whelks and other molluscs (including Nucella lima) are used in the United Kingdom and worldwide to monitor levels of tributyltin. The RPSI (Relative Penis
https://en.wikipedia.org/wiki/Health%20effects%20from%20noise
Noise health effects are the physical and psychological health consequences of regular exposure to consistent elevated sound levels. Noise from traffic, in particular, is considered by the World Health Organization to be one of the worst environmental stressors for humans, second only to air pollution. Elevated workplace or environmental noise can cause hearing impairment, tinnitus, hypertension, ischemic heart disease, annoyance, and sleep disturbance. Changes in the immune system and birth defects have been also attributed to noise exposure. Although age-related health effects (presbycusis) occur naturally with age, in many countries the cumulative impact of noise is sufficient to impair the hearing of a large fraction of the population over the course of a lifetime. Noise exposure has been known to induce noise-induced hearing loss, tinnitus, hypertension, vasoconstriction, and other cardiovascular adverse effects. Chronic noise exposure has been associated with sleep disturbances and increased incidence of diabetes. Adverse cardiovascular effects occur from chronic exposure to noise due to the sympathetic nervous system's inability to habituate. The sympathetic nervous system maintains lighter stages of sleep when the body is exposed to noise, which does not allow blood pressure to follow the normal rise and fall cycle of an undisturbed circadian rhythm. Stress from time spent around elevated noise levels has been linked with increased workplace accident rates, aggression, and other anti-social behaviors. The most significant sources are vehicles, aircraft, prolonged exposure to loud music, and industrial noise. Prolonged exposure to noise at home has been linked to decreased mental health. There are approximately 10,000 deaths per year as a result of noise in the European Union. Noise induced hearing loss Noise-induced hearing loss is a permanent shift in pure-tone thresholds, resulting in sensorineural hearing loss. The severity of a threshold shift is de
https://en.wikipedia.org/wiki/Australian%20Wine%20Research%20Institute
The Australian Wine Research Institute (AWRI) is a research institute with a focus on Australian wine, based in Adelaide, South Australia. Location It is based at the Wine Innovation Cluster, situated in the Waite Research Precinct, in the Adelaide suburb of Urrbrae, South Australia. History The institute was established in 1955 at the Waite campus of the University of Adelaide. It is funded by grape growers and wineries. Its first scientific chief was John Fornachon. An early researcher was Bryce Rankine, who later taught at the Roseworthy College, an oenology institution. The primary aim of the institute in the 1950s was to create good Australian table wines as opposed to traditional fortified wines. Research done by the institute has looked at "oxidation, hazes and deposits caused by trace amounts of iron and copper, and the need for better yeast strains, more effective use of sulphur dioxide, and pH control" as well as "research into new grape varieties". See also Australian and New Zealand Wine Industry Journal Australian Society of Viticulture and Oenology National Wine Centre of Australia Australian Grape and Wine Authority
https://en.wikipedia.org/wiki/Maximum%20throughput%20scheduling
Maximum throughput scheduling is a procedure for scheduling data packets in a packet-switched best-effort network, typically a wireless network, in view to maximize the total throughput of the network, or the system spectral efficiency in a wireless network. This is achieved by giving scheduling priority to the least "expensive" data flows in terms of consumed network resources per transferred amount of information. In advanced packet radio systems, for example the HSDPA 3.5G cellular system, channel-dependent scheduling is used instead of FIFO queuing to take advantage of favourable channel conditions to make best use of available radio conditions. Maximum throughput scheduling may be tempting in this context, especially in simulations where throughput of various schemes are compared. However, maximum throughput scheduling is normally not desirable, and channel-dependent scheduling should be used with care, as we will see below. Cost function in wireless packet radio systems Example 1: Link adaptation In a wireless network with link adaptation, and without co-channel interference from nearby wireless networks, the bit rate depends heavily on the carrier to noise ratio (CNR), which depends on the attenuation on the link between the transmitter and receiver, i.e. the path loss. For maximum throughput scheduling, links that are affected by low attenuation should be considered as inexpensive, and should be given scheduling priority. Example 2: Spread spectrum In the uplink of a spread spectrum cellular system, the carrier-to-interference ratio (CIR) is held constant by the power control for all users. For a user that suffers from high path loss, the power control will cause high interference level to signals from other users. This will prevent other more efficient data flows, since there is a maximum allowed interference level in the cell, and reduce the throughput. Consequently, for maximum throughput scheduling, data flows that suffer from high path loss should
https://en.wikipedia.org/wiki/Won%20sign
The won sign , is a currency symbol. It represents the South Korean won, the North Korean won and, unofficially, the old Korean won. Appearance Its appearance is "W" (the first letter of "Won") with a horizontal strike going through the center. Some fonts display the won sign with two horizontal lines, and others with only one horizontal line. Both forms are used when handwritten. Encoding The Unicode code point is : this is valid for either appearance. Additionally, there is a full width character at . Microsoft Windows In Microsoft Windows code page 949, the position (backslash) is also used for the won sign. In Korean versions of Windows, many fonts (including system fonts) display the backslash character as the won sign. This also applies to the directory separator character (for example, ) and the escape character(₩n). Most Korean keyboards input when the won sign key is pressed, so the Unicode letters are rarely used. The same issue (of dual use of a code point) occurs with the yen sign in Japanese versions of Windows. MacOS In macOS, the won sign key inputs only when in Hangul input mode. Fictional use In fiction, it is used for the woolong, a fictional currency in anime by Shinichirō Watanabe (Cowboy Bebop, Space Dandy and Carole & Tuesday), and for "Kinzcash", the currency of the online game Webkinz.
https://en.wikipedia.org/wiki/%E2%88%82
The character ∂ (Unicode: U+2202) is a stylized cursive d mainly used as a mathematical symbol, usually to denote a partial derivative such as (read as "the partial derivative of z with respect to x"). It is also used for boundary of a set, the boundary operator in a chain complex, and the conjugate of the Dolbeault operator on smooth differential forms over a complex manifold. It should be distinguished from other similar-looking symbols such as lowercase Greek letter delta (δ) or the lowercase Latin letter eth (ð). History The symbol was originally introduced in 1770 by Nicolas de Condorcet, who used it for a partial differential, and adopted for the partial derivative by Adrien-Marie Legendre in 1786. It represents a specialized cursive type of the letter d, just as the integral sign originates as a specialized type of a long s (first used in print by Leibniz in 1686). Use of the symbol was discontinued by Legendre, but it was taken up again by Carl Gustav Jacob Jacobi in 1841, whose usage became widely adopted. Names and coding The symbol is variously referred to as "partial", "curly d", "funky d", "rounded d", "curved d", "dabba", "number 6 mirrored", or "Jacobi's delta", or as "del" (but this name is also used for the "nabla" symbol ∇). It may also be pronounced simply "dee", "partial dee", "doh", or "die". The Unicode character is accessed by HTML entities ∂ or ∂, and the equivalent LaTeX symbol (Computer Modern glyph: ) is accessed by \partial. Uses ∂ is also used to denote the following: The Jacobian . The boundary of a set in topology. The boundary operator on a chain complex in homological algebra. The boundary operator of a differential graded algebra. The conjugate of the Dolbeault operator on complex differential forms. The boundary ∂(S) of a set of vertices S in a graph is the set of edges leaving S, which defines a cut. See also d'Alembert operator Differentiable programming List of mathematical symbols Notation for diff
https://en.wikipedia.org/wiki/Database%20tuning
Database tuning describes a group of activities used to optimize and homogenize the performance of a database. It usually overlaps with query tuning, but refers to design of the database files, selection of the database management system (DBMS) application, and configuration of the database's environment (operating system, CPU, etc.). Database tuning aims to maximize use of system resources to perform work as efficiently and rapidly as possible. Most systems are designed to manage their use of system resources, but there is still much room to improve their efficiency by customizing their settings and configuration for the database and the DBMS. I/O tuning Hardware and software configuration of disk subsystems are examined: RAID levels and configuration, block and stripe size allocation, and the configuration of disks, controller cards, storage cabinets, and external storage systems such as SANs. Transaction logs and temporary spaces are heavy consumers of I/O, and affect performance for all users of the database. Placing them appropriately is crucial. Frequently joined tables and indexes are placed so that as they are requested from file storage, they can be retrieved in parallel from separate disks simultaneously. Frequently accessed tables and indexes are placed on separate disks to balance I/O and prevent read queuing. DBMS tuning DBMS users and DBA experts DBMS tuning refers to tuning of the DBMS and the configuration of the memory and processing resources of the computer running the DBMS. This is typically done through configuring the DBMS, but the resources involved are shared with the host system. Tuning the DBMS can involve setting the recovery interval (time needed to restore the state of data to a particular point in time), assigning parallelism (the breaking up of work from a single query into tasks assigned to different processing resources), and network protocols used to communicate with database consumers. Memory is allocated for data, executio
https://en.wikipedia.org/wiki/Transfer%20cell
Transfer cells are specialized parenchyma cells that have an increased surface area, due to infoldings of the plasma membrane. They facilitate the transport of sugars from a sugar source, mainly mature leaves, to a sugar sink, often developing leaves or fruits. They are found in nectaries of flowers and some carnivorous plants. Transfer cells are specially found in plants in the region of absorption or secretion of nutrients. The term transfer cell was coined by Brian Gunning and John Stewart Pate. Their presence is generally correlated with the existence of extensive solute influxes across the plasma membrane.
https://en.wikipedia.org/wiki/Chromomycin%20A3
Chromomycin A3 (CMA3) or Toyomycin is an anthraquinone antibiotic glycoside produced by the fermentation of a certain strain of Streptomyces griseus (No. 7). Fluorescence properties In the presence of Mg2+ ions, Chromomycin A3 binds reversibly to DNA, preferentially to contiguous G/C base pairs. When bound to DNA, Chromomycin A3 has a maximum excitation wavelength of 445 nm (blue), and a maximum emission wavelength of 575 nm (yellow). Uses in-vitro membrane-impermeant G/C-specific fluorescent DNA-binding dye. in-vitro antibiotic of gram-positive bacteria, through inhibition of the incorporation of Pi in the RNA. in-vitro anticancer drug that inhibits RNA synthesis. Evaluation of male fertility: Chromomycin A3 and protamines compete for the same binding sites in the DNA, so CMA3 positivity in spermatozoa reflects protamine deficiency (affecting sperm morphology and decreasing fertility).
https://en.wikipedia.org/wiki/Lateral%20inhibition
In neurobiology, lateral inhibition is the capacity of an excited neuron to reduce the activity of its neighbors. Lateral inhibition disables the spreading of action potentials from excited neurons to neighboring neurons in the lateral direction. This creates a contrast in stimulation that allows increased sensory perception. It is also referred to as lateral antagonism and occurs primarily in visual processes, but also in tactile, auditory, and even olfactory processing. Cells that utilize lateral inhibition appear primarily in the cerebral cortex and thalamus and make up lateral inhibitory networks (LINs). Artificial lateral inhibition has been incorporated into artificial sensory systems, such as vision chips, hearing systems, and optical mice. An often under-appreciated point is that although lateral inhibition is visualised in a spatial sense, it is also thought to exist in what is known as "lateral inhibition across abstract dimensions." This refers to lateral inhibition between neurons that are not adjacent in a spatial sense, but in terms of modality of stimulus. This phenomenon is thought to aid in colour discrimination. History The concept of neural inhibition (in motor systems) was well known to Descartes and his contemporaries. Sensory inhibition in vision was inferred by Ernst Mach in 1865 as depicted in his mach band. Inhibition in single sensory neurons was discovered and investigated starting in 1949 by Haldan K. Hartline when he used logarithms to express the effect of Ganglion receptive fields. His algorithms also help explain the experiment conducted by David H. Hubel and Torsten Wiesel that expressed a variation of sensory processing, including lateral inhibition, within different species. In 1956, Hartline revisited this concept of lateral inhibition in horseshoe crab (Limulus polyphemus) eyes, during an experiment conducted with the aid of Henry G Wagner and Floyd Ratliff. Hartline explored the anatomy of ommatidia in the horseshoe crab
https://en.wikipedia.org/wiki/Social%20caterpillars
The collective behaviors of social caterpillars falls into five general categories: collective and cooperative foraging, group defense against predators and parasitoids, shelter building, thermoregulation and substrate silking to enhance steadfastness. The most behaviorally sophisticated of the insect societies are found among the ants, termites, bees, and wasps. While these insects are technically classified as eusocial insects they are commonly referred to simply as the social insects. In this scheme of classification, other non-eusocial, gregarious species of insects are referred to as presocial, subsocial, quasisocial, or in some other manner that has the unfortunate consequence of suggesting that are not quite social. Yet a significant number of insect species that do not possess the defining criteria of eusociality are by any other standard of classification clearly social and it is in this sense of the term, that employed by zoologists in general, that larval aggregates of moths, butterflies and sawflies are considered social insects. The sibling societies of caterpillars exhibit collective behaviors that vary from simple interactions to more complex forms of cooperation. Collective and cooperative foraging Social caterpillars exhibit three basic foraging patterns. Patch-restricted foragers obtain all of the food required during the social phase of their larval development from the leaves found in a single contiguous patch or from several such closely spaced patches. The foraging arena is typically well defined by a protective silk envelope or by leaves bound together. On large trees, patches usually consist of the leaves found on a part of a branch, an entire branch, or on several closely situated branches. But on small trees and herbaceous plants the entire host may eventually be enveloped. Although there have been no surveys to determine the proportion of social caterpillars that exhibit each of these foraging patterns, patch-restricted foraging is pro
https://en.wikipedia.org/wiki/TARIC%20code
The TARIC code (TARif Intégré Communautaire; Integrated Tariff of the European Communities) is designed to show the various rules applying to specific products when imported into the EU. This includes the provisions of the harmonised system and the combined nomenclature but also additional provisions specified in Community legislation such as tariff suspensions, tariff quotas and tariff preferences, which exist for the majority of the Community’s trading partners. In trade with third countries, the 10-digit Taric code must be used in customs and statistical declarations. Challenges in classification for companies A proper classification can save huge amount of money for the company, which is why nowadays importers and exporters strive to find a perfect way to solve those problems: Variety of products Companies who do import and export meet challenges of how to classify products with the growing varieties of products. Classification and restrictions, to some extent, has a bad effect on free trading and growing of business. Risk of loss caused by difference in classification Firstly, the proper classification of your item is essential to determine any licensing requirements under the Export Administration Regulations (EAR), EU Dual Use Regulation 428/2009. And subsequently exporters and importers need to be aware of how to classify the products accordingly and which category should be classified to. And finally they may be required to obtain a license. A slight difference in classification can mean a huge difference in the duties that are paid. Overview TARIC builds upon the international harmonised system See also Combined Nomenclature Customs tariff Harmonized System