source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Temporal%20Process%20Language
In theoretical computer science, Temporal Process Language (TPL) is a process calculus which extends Robin Milner's CCS with the notion of multi-party synchronization, which allows multiple process to synchronize on a global 'clock'. This clock measures time, though not concretely, but rather as an abstract signal which defines when the entire process can step onward. Informal definition TPL is a conservative extension of CCS, with the addition of a special action called σ representing the passage of time by a process - the ticking of an abstract clock. As in CCS, TPL features action prefix and it can be described as being patient, that is to say a process will idly accept the ticking of the clock, written as Key to the use of abstract time is the timeout operator, which presents two processes, one to behave as if the clock ticks, one to behave as if it can't, i.e. provided process E does not prevent the clock from ticking. provided E can perform action a to become E'. In TPL, there are two ways to prevent the clock from ticking. First is via the presence of the ω operator, for example in process the clock is prevented from ticking. It can be said that the action a is insistent, i.e. it insists on acting before the clock can tick again. The second way in which ticking can be prevented is via the concept of maximal-progress, which states that silent actions (i.e. τ actions) always take precedence over and thus suppress σ actions. Thus is two parallel processes are capable of synchronizing at a given instant, it is not possible for the clock to tick. Thus a simple way of viewing multi-party synchronization is that a group of composed processes will allow time to pass provided none of them prevent it, i.e. the system agrees that it is time to move on. Formal definition Syntax Let a be a non-silent action name, α be any action name (including τ, the silent action) and X be a process label used for recursion.
https://en.wikipedia.org/wiki/Mason%27s%20gain%20formula
Mason's gain formula (MGF) is a method for finding the transfer function of a linear signal-flow graph (SFG). The formula was derived by Samuel Jefferson Mason, whom it is also named after. MGF is an alternate method to finding the transfer function algebraically by labeling each signal, writing down the equation for how that signal depends on other signals, and then solving the multiple equations for the output signal in terms of the input signal. MGF provides a step by step method to obtain the transfer function from a SFG. Often, MGF can be determined by inspection of the SFG. The method can easily handle SFGs with many variables and loops including loops with inner loops. MGF comes up often in the context of control systems, microwave circuits and digital filters because these are often represented by SFGs. Formula The gain formula is as follows: where: Δ = the determinant of the graph. yin = input-node variable yout = output-node variable G = complete gain between yin and yout N = total number of forward paths between yin and yout Gk = path gain of the kth forward path between yin and yout Li = loop gain of each closed loop in the system LiLj = product of the loop gains of any two non-touching loops (no common nodes) LiLjLk = product of the loop gains of any three pairwise nontouching loops Δk = the cofactor value of Δ for the kth forward path, with the loops touching the kth forward path removed. Definitions Path: a continuous set of branches traversed in the direction that they indicate. Forward path: A path from an input node to an output node in which no node is touched more than once. Loop: A path that originates and ends on the same node in which no node is touched more than once. Path gain: the product of the gains of all the branches in the path. Loop gain: the product of the gains of all the branches in the loop. Procedure to find the solution Make a list of all forward paths, and their gains, and label these Gk. Make a list of all
https://en.wikipedia.org/wiki/Infraorbital%20groove
The infraorbital groove (or sulcus) is located in the middle of the posterior part of the orbital surface of the maxilla. Its function is to act as the passage of the infraorbital artery, the infraorbital vein, and the infraorbital nerve. Structure The infraorbital groove begins at the middle of the posterior border of the maxilla (with which it is continuous). This is near the upper edge of the infratemporal surface of the maxilla. It passes forward, and ends in a canal which subdivides into two branches. The infraorbital groove has an average length of 16.7 mm, with a small amount of variation between people. It is similar in men and women. Function The infraorbital groove creates space that allows for passage of the infraorbital artery, the infraorbital vein, and the infraorbital nerve. Clinical significance The infraorbital groove is an important surgical landmark for local anaesthesia of the infraorbital nerve. See also Infraorbital foramen Additional images
https://en.wikipedia.org/wiki/Innovations%20in%20Systems%20and%20Software%20Engineering
Innovations in Systems and Software Engineering: A NASA Journal is a peer-reviewed scientific journal of computer science covering systems and software engineering, including formal methods. It is published by Springer Science+Business Media on behalf of NASA. The editors-in-chief are Michael Hinchey (University of Limerick) and Shawn Bohner (Rose-Hulman Institute of Technology). Abstracting and indexing The journal is abstracted and indexed in:
https://en.wikipedia.org/wiki/High%20Resolution%20Microwave%20Survey
The High Resolution Microwave Survey (HRMS) was a NASA project that was to scan ten million frequencies using radio telescopes. A decade in the making, the objective was to find transmissions from alien intelligences. The primary point of observation for the project was the Arecibo Ionospheric Observatory in Puerto Rico. The project began in October 1992 with SETI researcher Jill Tarter on board. However, one year later, first-term Nevada Senator Richard Bryan was responsible for removing funding for the project.
https://en.wikipedia.org/wiki/Lacrimal%20groove
On the nasal surface of the body of the maxilla, in front of the opening of the sinus is a deep groove, the lacrimal groove (or lacrimal sulcus), which is converted into the nasolacrimal canal, by the lacrimal bone and inferior nasal concha; this canal opens into the inferior meatus of the nose and transmits the nasolacrimal duct. Additional images
https://en.wikipedia.org/wiki/Trochlear%20fovea
The trochlear fovea is a slight depression on the anteromedial orbital surface of the orbital plate of the frontal bone. Attached to the trochlear fovea is the trochlea of the superior oblique muscle.
https://en.wikipedia.org/wiki/Video%20feedback
Video feedback is the process that starts and continues when a video camera is pointed at its own playback video monitor. The loop delay from camera to display back to camera is at least one video frame time, due to the input and output scanning processes; it can be more if there is more processing in the loop. History First discovered shortly after Charlie Ginsburg invented the first video recorder for Ampex in 1956, video feedback was considered a nuisance and unwanted noise. Technicians and studio camera operators were chastised for allowing a video camera to see its own monitor as the overload of self-amplified video signal caused significant problems with the 1950s video pickup, often ruining the pickup. It could also cause screen burn-in on television screens and monitors of the time as well, by generating static brightly illuminated display patterns. In the 1960s early examples of video feedback art became introduced into the psychedelic art scene in New York City. Nam June Paik is often cited as the first video artist; he had clips of video feedback on display in New York City at the Greenwich Cafe in the mid 1960s. Early video feedback works were produced by media artist experimenters on the East and West Coasts of North America in the late 1960s and early 1970s. Video feedback artists Steina and Woody Vasulka, with Richard Lowenberg and others, formed The Kitchen, which was located in the kitchen of a broken-down hotel in lower Manhattan; while Skip Sweeney and others founded Video Free America in San Francisco, to nurture their video art and feedback experiments. David Sohn mentions video feedback in his 1970 book Film, the Creative Eye. This book was part of the base curriculum for Richard Lederer of St. Paul's School in Concord, New Hampshire, when he made video feedback part of an English curriculum in his 1970s course Creative Eye in Film. Several students in this class participated regularly in the making and recording of video feedback. Sony ha
https://en.wikipedia.org/wiki/Mugwort
Mugwort or biboz is a common name for several species of aromatic flowering plants in the genus Artemisia. In Europe, mugwort most often refers to the species Artemisia vulgaris, or common mugwort. In East Asia the species Artemisia argyi is often called "Chinese mugwort" in the context of traditional Chinese medicine, Ngai Chou in Cantonese or () in Mandarin. Artemisia princeps is a mugwort known in Korea as () and in Japan as (). While other species are sometimes referred to by more specific common names, they may be called simply "mugwort" in many contexts. Etymology The Anglo-Saxon Nine Herbs Charm mentions . A folk etymology, based on coincidental sounds, derives from the word "mug"; more certainly, it has been used in flavoring drinks at least since the early Iron Age. Other sources say mugwort is derived from the Old Norse (meaning "marsh") and German wuertz (wort in English, originally meaning "root"), which refers to its use since ancient times to repel insects, especially moths. The Old English word for mugwort is where , could be a variation of the Old English word for "midge": . Wort comes from the Old English (root/herb/plant), which is related to the Old High German (root) and the Old Norse (plant). Species Species in the genus Artemisia called mugwort include: Artemisia absinthium L. — wormwood, traditionally used in the production of Absinthe. Artemisia argyi H.Lév. & Vaniot — Chinese mugwort, used in traditional Chinese medicine Artemisia douglasiana Besser ex Besser — Douglas mugwort or California mugwort, native to western North America Artemisia glacialis L. — alpine mugwort Artemisia granatensis Boiss. - Sierra Nevadan chamomille, endemic to the Sierra Nevada mountain range in the Iberian Peninsula Artemisia indica Willd. — Oriental mugwort Artemisia japonica Thunb. — Japanese mugwort Artemisia lactiflora Wall. ex DC. — white mugwort Artemisia norvegica Fr. — Norwegian mugwort Artemisia princeps Pamp. — Korean mugwort (ssuk)
https://en.wikipedia.org/wiki/Ligamenta%20flava
The ligamenta flava (: ligamentum flavum, Latin for yellow ligament) are a series of ligaments that connect the ventral parts of the laminae of adjacent vertebrae. They help to preserve upright posture, preventing hyperflexion, and ensuring that the vertebral column straightens after flexion. Hypertrophy can cause spinal stenosis. They appear yellowish in colour due to their high elastic fibre content. Anatomy Each ligamentum flavum connects the laminae two adjacent vertebrae. They attach to the anterior portion of the upper lamina above, and the posterior portion of the lower lamina below. They begin with the junction of the axis and third cervical vertebra, continuing down to the junction of the 5th lumbar vertebra and the sacrum. In the neck region the ligaments are thin, but broad and long; they are thicker in the thoracic region, and thickest in the lumbar region. They are thinnest between the atlas bone (C1) and the axis bone (C2), and may be absent in some people. They become longer inferiorly in the cervical spine, as the distance between adjacent laminae increases. They are best seen from the interior of the vertebral canal. when looked at from the outer surface they appear short, being overlapped by the lamina of the vertebral arch. Structure Each ligament consists of two lateral portions which commence one on either side of the roots of the articular processes, and extend backward to the point where the laminae meet to form the spinous process; the posterior margins of the two portions are in contact and to a certain extent united, slight intervals being left for the passage of small vessels. Small veins that form anastomotic connections between the internal and external vertebral venous plexuses may bass between a pair of the ligaments. Function The ligamenta flava become stretched with flexion of the spine. The marked elasticity of the ligamenta flava serves to preserve upright posture, and to assist the vertebral column in resuming it after fl
https://en.wikipedia.org/wiki/Octatomic%20element
An octatomic element is a chemical element that, when standard conditions for temperature and pressure is stable, is in a configuration of eight atoms grouped together. The canonical example is sulfur, S8, but red selenium is also an octatomic element stable at room temperature. Octaoxygen is also known, but it is extremely unstable. See also Diatomic element
https://en.wikipedia.org/wiki/Sky%20brightness
Sky brightness refers to the visual perception of the sky and how it scatters and diffuses light. The fact that the sky is not completely dark at night is easily visible. If light sources (e.g. the Moon and light pollution) were removed from the night sky, only direct starlight would be visible. The sky's brightness varies greatly over the day, and the primary cause differs as well. During daytime, when the Sun is above the horizon, the direct scattering of sunlight is the overwhelmingly dominant source of light. During twilight (the duration after sunset or before sunrise until or since, respectively, the full darkness of night), the situation is more complicated, and a further differentiation is required. Twilight (both dusk and dawn) is divided into three 6° segments that mark the Sun's position below the horizon. At civil twilight, the center of the Sun's disk appears to be between 1/4° and 6° below the horizon. At nautical twilight, the Sun's altitude is between –6° and –12°. At astronomical twilight, the Sun is between –12° and –18°. When the Sun's depth is more than 18°, the sky generally attains its maximum darkness. Sources of the night sky's intrinsic brightness include airglow, indirect scattering of sunlight, scattering of starlight, and light pollution. Airglow When physicist Anders Ångström examined the spectrum of the aurora borealis, he discovered that even on nights when the aurora was absent, its characteristic green line was still present. It was not until the 1920s that scientists were beginning to identify and understand the emission lines in aurorae and of the sky itself, and what was causing them. The green line Angstrom observed is in fact an emission line with a wavelength of 557.7 nm, caused by the recombination of oxygen in the upper atmosphere. Airglow is the collective name of the various processes in the upper atmosphere that result in the emission of photons, with the driving force being primarily UV radiation from the Sun. Se
https://en.wikipedia.org/wiki/Speedeez
Speedeez was a micro-scale toy car brand produced by Playmates Toys from 2002 to 2005. It made little toy cars from all of the brands. Vehicles The majority of models is roughly 1.5 inches in length (scale 1:100). They consist of a plastic die-cast, hand-painted body and a plastic baseplate with a steel ball in the middle. The base plate is connected to the body via two rivets, philips screws or tri-angle screws (depending on the release type). Six vehicles were released as a glow-in-the-dark version. The steel ball adds weight to the car and makes it able to drift. Some of the released vehicles are licensed by their respective car brand, which is reflected on the blister backing cards. The most prominent makes are Chevrolet, Chrysler, Dodge, Ford and Jeep. Some featured models have never been released in micro scale before, including the Jeep Jeepster, the Chrysler PT Cruiser, the Audi TT, the BMW Z3, the BMW Mini or the Dodge SRT-4. Some vehicles use the same moulds as Charm Max and Tamfort (Turbo Ball Racers) or are heavily inspired by Micro Machines and Funrise Micro Magnifier models. Distribution Vehicles were distributed in various blister packs and included with playsets during the production run. The packaging was designed by Bill Ticineto of Go Dog Design Group, LLC. Playsets Speedeez also released playsets.
https://en.wikipedia.org/wiki/Photoprotection
Photoprotection is the biochemical process that helps organisms cope with molecular damage caused by sunlight. Plants and other oxygenic phototrophs have developed a suite of photoprotective mechanisms to prevent photoinhibition and oxidative stress caused by excess or fluctuating light conditions. Humans and other animals have also developed photoprotective mechanisms to avoid UV photodamage to the skin, prevent DNA damage, and minimize the downstream effects of oxidative stress. In photosynthetic organisms In organisms that perform oxygenic photosynthesis, excess light may lead to photoinhibition, or photoinactivation of the reaction centers, a process that does not necessarily involve chemical damage. When photosynthetic antenna pigments such as chlorophyll are excited by light absorption, unproductive reactions may occur by charge transfer to molecules with unpaired electrons. Because oxygenic phototrophs generate O2 as a byproduct from the photocatalyzed splitting of water (H2O), photosynthetic organisms have a particular risk of forming reactive oxygen species. Therefore, a diverse suite of mechanisms has developed in photosynthetic organisms to mitigate these potential threats, which become exacerbated under high irradiance, fluctuating light conditions, in adverse environmental conditions such as cold or drought, and while experiencing nutrient deficiencies which cause an imbalance between energetic sinks and sources. In eukaryotic phototrophs, these mechanisms include non-photochemical quenching mechanisms such as the xanthophyll cycle, biochemical pathways which serve as "relief valves", structural rearrangements of the complexes in the photosynthetic apparatus, and use of antioxidant molecules. Higher plants sometimes employ strategies such as reorientation of leaf axes to minimize incident light striking the surface. Mechanisms may also act on a longer time-scale, such as up-regulation of stress response proteins or down-regulation of pigment
https://en.wikipedia.org/wiki/Offline%20reader
An offline reader (sometimes called an offline browser or offline navigator) is computer software that downloads e-mail, newsgroup posts or web pages, making them available when the computer is offline: not connected to a server. Offline readers are useful for portable computers and dial-up access. Variations Website-mirroring software Website mirroring software is software that allows for the download of a copy of an entire website to the local hard disk for offline browsing. In effect, the downloaded copy serves as a mirror of the original site. Web crawler software such as Wget can be used to generate a site mirror. Offline mail and news readers Offline mail readers are computer programs that allow users to read electronic mail or other messages (for example, those on bulletin board systems) with a minimum of connection time to the server storing the messages. BBS servers accomplished this by packaging up multiple messages into a compressed file, e.g., a QWK packet, for the user to download using, e.g., Xmodem, Ymodem, Zmodem, and then disconnect. The user reads and replies to the messages locally and packages up and uploads any replies or new messages back to the server upon the next connection. Internet mail servers using POP3 or IMAP4 send the messages uncompressed as part of the protocol, and outbound messages using SMTP are also uncompressed. Offline news readers using NNTP are similar, but the messages are organized into news groups. Most e-mail protocols, like the common POP3 and IMAP4 used for internet mail, need be on-line only during message transfer; the same applies to the NNTP protocol used by Usenet (Network news). Most end-user mailers, such as Outlook Express and AOL, can be used offline even if they are mainly intended to be used online, but some mailers such as Juno are mainly intended to be used offline. Off-line mail readers are generally considered to be those systems that did not originally offer such functionality, notably on bulle
https://en.wikipedia.org/wiki/Regius%20Professor%20of%20Botany%20%28Glasgow%29
The Regius Chair of Botany at the University of Glasgow is a Regius Professorship established in 1818. A lectureship in botany had been founded in 1704. From 1718 to 1818, the subject was combined with Anatomy. The chair was founded in 1818 by King George III. Regius Professors of Botany For 1718–1818, see: Regius Professor of Anatomy Robert Graham MD (1818) Sir William Jackson Hooker MA LLD DCL FRS (1820) John Hutton Balfour MA MD (1841) George Arnott Walker-Arnott MA LLD, Advocate (1845) Alexander Dickson MA MD (1868) Sir Isaac Bayley Balfour MA MD DSc FRS (1879) Frederick Orpen Bower MA ScD LLD FRS (1885) James Montague Frank Drummond MA (1925) John Walton MA DSc ScD D-es-Sc LLD (1930) Percy Wragg Brian BA PhD DPhil (1963) John Harrison Burnett MA DPhil (1968) Malcolm Barrett Wilkins PhD DSc FRSE (1970) Michael Robert Blatt BSc PhD FRSE (2001)
https://en.wikipedia.org/wiki/World%20Games%20%28video%20game%29
World Games is a sports video game developed by Epyx for the Commodore 64 in 1986. Versions for the Apple IIGS, Amstrad CPC, ZX Spectrum, Master System and other contemporary systems were also released. The NES version was released by Milton Bradley, and ported by Software Creations on behalf of producer Rare. The game is a continuation of the Epyx sports line that includes Summer Games and Winter Games. World Games was made available in Europe for the Wii virtual console on April 25, 2008. Events The events available vary slightly depending on the platform, and may include: Weightlifting (Soviet Union) Slalom skiing (France) Log rolling (Canada) Cliff diving (Mexico) Caber toss (Scotland) Bull riding (United States) Barrel jumping (Germany) Sumo Wrestling (Japan) The game allows the player to compete in all of the events sequentially, choose a few events, choose just one event, or practice an event. Reception Writing for Info, Benn Dunnington gave the Commodore 64 version of World Games three-plus stars out of five and described it as "my least favorite of the series". Stating that slalom skiing was the best event, he concluded that "Epyx does such a nice, consistent job of execution, tho, that it's hard to take off too many points even for such boring material". Computer Gaming Worlds Rick Teverbaugh criticized the slalom skiing and log rolling events' difficulty, but concluded that "World Games is still a must for the avid sports games". Charles Ardai called the game "an adequate sequel" to Epyx's previous Games, and praised the graphics. He criticized the mechanics "as bizarre little joystick patterns which have little to do with the events" but still recommended the game because of the log rolling event. Jame Trunzo praised the game's use of advanced graphics and sound, including humorous effects. Also noted was the variety in the included games, preventing the game from getting too repetitive. The game was reviewed in 1988 in Dragon #132 by Har
https://en.wikipedia.org/wiki/Ethernet%20over%20SDH
Ethernet Over SDH (EoS or EoSDH) or Ethernet over SONET refers to a set of protocols which allow Ethernet traffic to be carried over synchronous digital hierarchy networks in an efficient and flexible way. The same functions are available using SONET. Ethernet frames which are to be sent on the SDH link are sent through an "encapsulation" block (typically Generic Framing Procedure or GFP) to create a synchronous stream of data from the asynchronous Ethernet packets. The synchronous stream of encapsulated data is then passed through a mapping block which typically uses virtual concatenation (VCAT) to route the stream of bits over one or more SDH paths. As this is byte interleaved, it provides a better level of security compared to other mechanisms for Ethernet transport. After traversing SDH paths, the traffic is processed in the reverse fashion: virtual concatenation path processing to recreate the original synchronous byte stream, followed by decapsulation to converting the synchronous data stream to an asynchronous stream of Ethernet frames. The SDH paths may be VC-4, VC-3, VC-12 or VC-11 paths. Up to 64 VC-11 or VC-12 paths can be concatenated together to form a single larger virtually concatenated group. Up to 256 VC-3 or VC-4 paths can be concatenated together to form a single larger virtually concatenated group. The paths within a group are referred to as "members". A virtually concatenated group is typically referred to by the notation -v, where is VC-4, VC-3, VC-12 or VC-11 and X is the number of members in the group. A 10-Mbit/s Ethernet link is often transported over a VC-12-5v which allows the full bandwidth to be carried for all packet sizes. A 100-Mbit/s Ethernet link is often transported over a VC-3-2v which allows the full bandwidth to be carried when smaller packets are used (< 250 bytes) and Ethernet flow control restricts the rate of traffic for larger packets. But does only give ca. 97Mbit/s, not full 100Mb. A 1000-Mbit/s (or 1 GigE) Ether
https://en.wikipedia.org/wiki/Log%20wind%20profile
The log wind profile is a semi-empirical relationship commonly used to describe the vertical distribution of horizontal mean wind speeds within the lowest portion of the planetary boundary layer. The relationship is well described in the literature. The logarithmic profile of wind speeds is generally limited to the lowest 100 m of the atmosphere (i.e., the surface layer of the atmospheric boundary layer). The rest of the atmosphere is composed of the remaining part of the planetary boundary layer (up to around 1000 m) and the troposphere or free atmosphere. In the free atmosphere, geostrophic wind relationships should be used. Definition The equation to estimate the mean wind speed () at height (meters) above the ground is: where is the friction velocity (m s−1), is the Von Kármán constant (~0.41), is the zero plane displacement (in metres), is the surface roughness (in meters), and is a stability term where is the Obukhov length from Monin-Obukhov similarity theory. Under neutral stability conditions, and drops out and the equation is simplified to, Zero-plane displacement () is the height in meters above the ground at which zero mean wind speed is achieved as a result of flow obstacles such as trees or buildings. This displacement can be approximated as 2/3 to 3/4 of the average height of the obstacles. For example, if estimating winds over a forest canopy of height 30 m, the zero-plane displacement could be estimated as d = 20 m. Roughness length () is a corrective measure to account for the effect of the roughness of a surface on wind flow. That is, the value of the roughness length depends on the terrain. The exact value is subjective and references indicate a range of values, making it difficult to give definitive values. In most cases, references present a tabular format with the value of given for certain terrain descriptions. For example, for very flat terrain (snow, desert) the roughness length may be in the range 0.001 to 0.005 m. Si
https://en.wikipedia.org/wiki/Bromodomain
A bromodomain is an approximately 110 amino acid protein domain that recognizes acetylated lysine residues, such as those on the N-terminal tails of histones. Bromodomains, as the "readers" of lysine acetylation, are responsible in transducing the signal carried by acetylated lysine residues and translating it into various normal or abnormal phenotypes. Their affinity is higher for regions where multiple acetylation sites exist in proximity. This recognition is often a prerequisite for protein-histone association and chromatin remodeling. The domain itself adopts an all-α protein fold, a bundle of four alpha helices each separated by loop regions of variable lengths that form a hydrophobic pocket that recognizes the acetyl lysine. Discovery The bromodomain was identified as a novel structural motif by John W. Tamkun and colleagues studying the Drosophila gene Brahma/brm, and showed sequence similarity to genes involved in transcriptional activation. The name "bromodomain" is derived from the relationship of this domain with Brahma and is unrelated to the chemical element bromine. Bromodomain-containing proteins Bromodomain-containing proteins can have a wide variety of functions, ranging from histone acetyltransferase activity and chromatin remodeling to transcriptional mediation and co-activation. Of the 43 known in 2015, 11 had two bromodomains, and one protein had 6 bromodomains. Preparation, biochemical analysis, and structure determination of the bromodomain containing proteins have been described in detail. Bromo- and Extra-Terminal domain (BET) family A well-known example of a bromodomain family is the BET (Bromodomain and extraterminal domain) family. Members of this family include BRD2, BRD3, BRD4 and BRDT. Other However proteins such as ASH1L also contain a bromodomain. Dysfunction of BRD proteins has been linked to diseases such as human squamous cell carcinoma and other forms of cancer. Histone acetyltransferases, including EP300 and PCAF, have bro
https://en.wikipedia.org/wiki/Snake%20cube
The snake cube is a mechanical puzzle, a chain of 27 or 64 cubelets, connected by an elastic band running through them, creating a specific sequence of straight and bent connections. The cubelets can rotate freely. The aim of the puzzle is to arrange the chain in such a way that they will form a 3×3×3 or 4×4×4 cube. While all commercially available 3×3×3 cubes appear to be identical in terms of the sequence of straight and bent connections, and have only one solution (up to symmetry), at least two different 4×4×4 cubes are sold, both having four unique solutions. Variations A variation on the puzzle is a Kibble cube, which is also a string of cubes but has slots on the cubes. There are also many different styles of the cube. It can be made up of wood or plastic and can vary in colour, material and size.
https://en.wikipedia.org/wiki/Fractal%20curve
A fractal curve is, loosely, a mathematical curve whose shape retains the same general pattern of irregularity, regardless of how high it is magnified, that is, its graph takes the form of a fractal. In general, fractal curves are nowhere rectifiable curves — that is, they do not have finite length — and every subarc longer than a single point has infinite length. A famous example is the boundary of the Mandelbrot set. Fractal curves in nature Fractal curves and fractal patterns are widespread, in nature, found in such places as broccoli, snowflakes, feet of geckos, frost crystals, and lightning bolts. See also Romanesco broccoli, dendrite crystal, trees, fractals, Hofstadter's butterfly, Lichtenberg figure, and self-organized criticality. Dimensions of a fractal curve Most of us are used to mathematical curves having dimension one, but as a general rule, fractal curves have different dimensions, also see fractal dimension and list of fractals by Hausdorff dimension. Relationships of fractal curves to other fields Starting in the 1950s Benoit Mandelbrot and others have studied self-similarity of fractal curves, and have applied theory of fractals to modelling natural phenomena. Self-similarity occurs, and analysis of these patterns has found fractal curves in such diverse fields as economics, fluid mechanics, geomorphology human physiology, and, linguistics. As examples, "landscapes" revealed by microscopic views of surfaces in connection with Brownian motion, vascular networks, and shapes of polymer molecules all relate to fractal curves. Examples Blancmange curve Coastline paradox De Rham curve Dragon curve Fibonacci word fractal Koch snowflake Boundary of the Mandelbrot set Menger sponge Peano curve Sierpiński triangle Trees Natural fractals Weierstrass function See also The Beauty of Fractals Fractal antenna Fractal expressionism Fractal landscape Hexaflake Mosely snowflake Newton fractal Orbit trap Quasicircle The Frac
https://en.wikipedia.org/wiki/AP%20Biology
Advanced Placement (AP) Biology (also known as AP Bio) is an Advanced Placement biology course and exam offered by the College Board in the United States. For the 2012–2013 school year, the College Board unveiled a new curriculum with a greater focus on "scientific practices". This course is designed for students who wish to pursue an interest in the life sciences. The College Board recommends successful completion of high school biology and high school chemistry before commencing AP Biology, although the actual prerequisites vary from school to school and from state to state. This course, nevertheless, is considered very challenging and one of the most difficult AP classes, as shown with AP Finals grade distributions. Topic outline The exam covers the following 8 units. The percentage indicates the portion of the multiple-choice section of the exam focused on each content area: The course is based on and tests six skills, called scientific practices which include: In addition to the topics above, students are required to be familiar with general lab procedure. Students should know how to collect data, analyze data to form conclusions, and apply those conclusions. Exam Students are allowed to use a four-function, scientific, or graphing calculator. The exam has two sections: a 90 minute multiple choice section and a 90 minute free response section. There are 60 multiple choice questions and six free responses, two long and four short. Both sections are worth 50% of the score. Score distribution Commonly used textbooks Biology, AP Edition by Sylvia Mader (2012, hardcover ) Life: The Science of Biology (Sadava, Heller, Orians, Purves, and Hillis, ) Campbell Biology AP Ninth Edition (Reece, Urry, Cain, Wasserman, Minorsky, and Andrew Jackson ) See also Glossary of biology A.P Bio (TV Show)
https://en.wikipedia.org/wiki/LMHOSTS
The LMHOSTS (LAN Manager Hosts) file is used to enable Domain Name Resolution under Windows when other methods, such as WINS, fail. It is used in conjunction with workgroups and domains. If you are looking for a simple, general mechanism for the local specification of IP addresses for specific hostnames (server names), use the HOSTS file, not the LMHOSTS file. The file, if it exists, is read as the LMHOSTS setting file. A sample file () is provided. It contains documentation for manually configuring the file. File locations Windows 95, 98, Millennium Edition The file is located in , and a sample file () is installed here. Note that is an environment variable pointing to the Windows installation directory, usually . Windows NT 4.0, Windows 2000, Windows XP, Vista, 7, 8, 10, Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2016+ The file is located in , and a sample file () is installed here. Note that is an environment variable pointing to the Windows installation directory, usually . See also HOSTS file NetBIOS External links Domain Browsing with TCP/IP and LMHOSTS Files LMHOSTS File Information and Predefined Keywords Microsoft knowledgebase article Using LMHOSTS Files on Windows NT Windows communication and services Configuration files
https://en.wikipedia.org/wiki/AP%20Physics%20B
Advanced Placement (AP) Physics B was a physics course administered by the College Board as part of its Advanced Placement program. It was equivalent to a year-long introductory university course covering Newtonian mechanics, electromagnetism, fluid mechanics, thermal physics, waves, optics, and modern physics. The course was algebra-based and heavily computational; in 2015, it was replaced by the more concept-focused AP Physics 1 and AP Physics 2. Exam The exam consisted of a 70 MCQ section, followed by a 6-7 FRQ section. Each section was 90 minutes and was worth 50% of the final score. The MCQ section banned calculators, while the FRQ allowed calculators and a list of common formulas. Overall, the exam was configured to approximately cover a set percentage of each of the five target categories: Purpose According to the College Board web site, the Physics B course provided "a foundation in physics for students in the life sciences, a pre medical career path, and some applied sciences, as well as other fields not directly related to science." Discontinuation Starting in the 2014–2015 school year, AP Physics B was no longer offered, and AP Physics 1 and AP Physics 2 took its place. Like AP Physics B, both are algebra-based, and both are designed to be taught as year-long courses. Grade distribution The grade distributions for the Physics B scores from 2010 until its discontinuation in 2014 are as follows:
https://en.wikipedia.org/wiki/AP%20Statistics
Advanced Placement (AP) Statistics (also known as AP Stats) is a college-level high school statistics course offered in the United States through the College Board's Advanced Placement program. This course is equivalent to a one semester, non-calculus-based introductory college statistics course and is normally offered to sophomores, juniors and seniors in high school. One of the College Board's more recent additions, the AP Statistics exam was first administered in May 1996 to supplement the AP program's math offerings, which had previously consisted of only AP Calculus AB and BC. In the United States, enrollment in AP Statistics classes has increased at a higher rate than in any other AP class. Students may receive college credit or upper-level college course placement upon passing the three-hour exam ordinarily administered in May. The exam consists of a multiple-choice section and a free-response section that are both 90 minutes long. Each section is weighted equally in determining the students' composite scores. History The Advanced Placement program has offered students the opportunity to pursue college-level courses while in high school. Along with the Educational Testing Service, the College Board administered the first AP Statistics exam in May 1997. The course was first taught to students in the 1996-1997 academic year. Prior to that, the only mathematics courses offered in the AP program included AP Calculus AB and BC. Students who didn't have a strong background in college-level math, however, found the AP Calculus program inaccessible and sometimes declined to take a math course in their senior year. Since the number of students required to take statistics in college is almost as large as the number of students required to take calculus, the College Board decided to add an introductory statistics course to the AP program. Since the prerequisites for such a program doesn't require mathematical concepts beyond those typically taught in a second-year al
https://en.wikipedia.org/wiki/Xavras%20Wy%C5%BCryn
Xavras Wyżryn is an alternate history novel by the Polish science fiction writer Jacek Dukaj, published in 1997. Considered one of the best Polish alternate history novels, it discusses Polish martyrology, circling on the philosophical aspects of war, shows the thin line between terrorism and freedom fighters. It has lots of action, which makes it a member of a military science fiction genre. The story's divergence point is set during the Polish–Soviet War by ending in a decisive Soviet victory. The actual story takes place in the 1990s and is told from the point of view of an American reporter, who is an embedded journalist with the anti-Soviet Polish resistance. In 1996, a young American reporter, Ian Smith, is sent by his news network to the Soviet republic of Poland, to document guerrilla actions of Polish freedom fighters against the Soviet regime. His task includes interviewing the charimastic leader of Polish Freedom Army, Colonel Xavras Wyżryn. Smith does not realize that during his long trip from Ukrainian steppes to Moscow along with hardened veterans of Polish forces, he will experience the horror of war in which there is no good and evil side. He also expect to find himself in the midst of the most reckless of Wyżryn's campaigns in which the Polish forces capture a Soviet atomic bomb and start to smuggle it towards Moscow. Editions The story has had two editions. It was first published in 1997, in a book entitled Xavras Wyżryn, which contained the title story with a second one, "Zanim Noc" ("Before the Night"). In 2004, the story was reprinted in Xavras Wyżryn i inne fikcje narodowe (Xavras Wyżryn and Other National Fictions) and was this time accompanied by the following three short stories: "Sprawa Rudryka Z." ("The Case of Rudryk Z."), "Przyjaciel prawdy" ("Friend of the Truth") and "Gotyk" ("Gothic"). Summary Backstory After World War I, Poland managed to regain its freedom but not for long since the Polish–Soviet War was lost in 1920. Poland
https://en.wikipedia.org/wiki/Anemic%20domain%20model
The anemic domain model is described as a programming anti-pattern where the domain objects contain little or no business logic like validations, calculations, rules, and so forth. The business logic is thus baked into the architecture of the program itself, making refactoring and maintenance more difficult and time-consuming. Overview This anti-pattern was first described by Martin Fowler, who considers the practice an anti-pattern. He says: In an anemic domain design, business logic is typically implemented in separate classes which transform the state of the domain objects. Fowler calls such external classes transaction scripts. This pattern is a common approach in Java applications, possibly encouraged by technologies such as early versions of EJB's Entity Beans, as well as in .NET applications following the Three-Layered Services Application architecture where such objects fall into the category of "Business Entities" (although Business Entities can also contain behavior). Fowler describes the transaction script pattern thus: In his book "Patterns of Enterprise Application Architecture", Fowler noted that the transaction script pattern may be proper for many simple business applications, and obviates a complex OO-database mapping layer. An anemic domain model might occur in systems that are influenced from Service-Oriented Architectures, where behaviour does not or tends to not travel, such as messaging/pipeline architectures, or SOAP/REST APIs. Architectures like COM+ and Remoting allow behaviour, but increasingly the web has favoured disconnected and stateless architectures. Criticism There is some criticism as to whether this software design pattern should be considered an anti-pattern, since many see also benefits in it, for example: Clear separation between logic and data. Works well for simple applications. Results in stateless logic, which facilitates scaling out. Avoids the need for a complex OO-Database mapping layer. More compatibility wi
https://en.wikipedia.org/wiki/Temporal%20encroachment
Temporal encroachment is an action that affects the perception of time or that affects the ability to take action in the future. Temporal means related to the measurement or passing of time and encroachment is an intrusion, usually unwelcome, into the space of another. The space that temporal encroachment refers to is temporal space, the temporal "space" or "territory" upon which others attach significance. There are various kinds of temporal encroachment: Scheduling This is when one group or person delays another person. A good example is a vice president making a lower-ranked employee wait in his outer office while he conducts business. Another good example is a valued worker who always shows up late to work but this is allowed due to his abilities. This kind of encroachment is very common in the workplace. Various cultures look at this differently—the Japanese are very punctual, while most Latin and Baltic cultures would be more relaxed with time, instead looking at social parameters. Future 'space' This refers to actions taken that influence events 'down the line', narrowing possible choices and alternatives. It is worth noting that the most common use of this phrase is found in ecology, where there is a large amount of concern about the effects of human encroachment upon animals and other wildlife. Encroachment can be a good or bad factor in the lives of the animals, but most commonly, it is bad. It has been used by some Jewish thinkers to refer to changes in Zionism that have 'ripple effects' on Jews worldwide, and the effect this has had on global terrorism. It has also been used in the legal system, where some legal thinkers believe early correction of poverty and other socioeconomic ills can 'narrow' the likelihood of future criminality. Past 'space' It can also reflect a sense that modern events and interpretations of history alter and change our perceptions of history. For example, the involvement of the Papacy in the formation of the structure o
https://en.wikipedia.org/wiki/Germinated%20brown%20rice
Germinated brown rice (GBR; , ) is unpolished brown rice that has been allowed to germinate to improve the flavor and texture, and to increase levels of nutrients such as γ-aminobutyric acid (GABA). It has been found that germinated grains in general have nutritional advantages. The rice is used in Japanese and Korean cuisine. Cooked germinated brown rice is softer and less chewy than plain brown rice—it is more acceptable to children in particular—and has additional nutritional advantages. Germinated brown rice is produced by soaking for 4–20 hours in warm water (or longer at lower temperature), changing water a few times if some smell develops, and rinsing before cooking. This stimulates germination, which activates various enzymes in the rice. By this method, it is possible to obtain a more complete amino acid profile, including GABA. Although GBR is readily prepared at home, in Japan from 1995 it is sold ready-germinated at a higher price than ordinary rice. In 2004 about 15,000 tonnes were sold, to a value of about ¥15b. See also Germinated wheat
https://en.wikipedia.org/wiki/Flavored%20liquor
Flavored liquors (also called infused liquors) are liquors that have added flavoring and, in some cases, a small amount of added sugar. They are distinct from liqueurs in that liqueurs have a high sugar content and may also contain glycerine. Flavored liquors may have a base of vodka or white rum, both of which have little taste of their own, or they may have a tequila or brandy base. Typically, a fruit extract is added to the base spirit. Flavored rice wine, rum, tequila, vodka and whiskey Flavored rums and vodkas frequently have an alcohol content that is 5–10% ABV less than the corresponding unflavored spirit. Flavored rice wines—flavors include star anise-coffee, banana-cinnamon, coconut-pineapple, galangal-tamarind, ginger-red chili, green tea-orange, lemon-lemongrass and mango-green chili. Flavored rums in the West Indies originally consisted only of spiced rums such as Captain Morgan whereas in the Indian Ocean (Madagascar, Reunion Island and Mauritius) only of vanilla and fruits. Available flavors include cinnamon, lemon, lime, orange, vanilla, and raspberry, and extend to such exotic flavors as mango, coconut, pineapple, banana, passion fruit, and watermelon. Flavored tequilas—flavors include lime, orange, mango, coconut, watermelon, strawberry, pomegranate, chili pepper, cinnamon, jalapeño, cocoa and coffee. Flavored vodkas—flavors include lemon, lime, lemon-lime, orange, tangerine, grapefruit, raspberry, strawberry, blueberry, teaberry, vanilla, black currant, chili pepper, cherry, apple, green apple, coffee, chocolate, cranberry, peach, pear, passion fruit, pomegranate, plum, mango, white grape, banana, pineapple, coconut, mint, melon, rose, herbs, bacon, honey, cinnamon, kiwifruit, whipped cream, tea, root beer, caramel, marshmallow, and many more. Other flavored liquors Absinthe (wormwood, anise, fennel, and other herbs) Akvavit (caraway seeds, anise, dill, fennel, coriander, and grains of paradise) Anise liquors: A family of liquors native to
https://en.wikipedia.org/wiki/VLYNQ
VLYNQ is a proprietary interface developed by Texas Instruments and used for broadband products, such as WLAN and modems, VOIP processors and audio and digital media processor chips. The chip implements a full-duplex serial communications interface that enables the extension of an internal bus segment to one or more external physical devices. The external devices are mapped into local, physical address space and appear as if they are on the internal bus. Multiple VLYNQ devices are daisy-chained, communication is peer-to-peer, host/peripheral. Data transferred over the VLYNQ interface is 8B/10B encoded and packetized. VLYNQ is the name of a proprietary interface developed by Texas Instruments. It is used for TI's broadband products, such as modems and WLAN, voice broadband processors, digital media processors, and OMAP media processor chips. The ACX111 WLAN cards used in AR7 devices look like mini-PCI, but actually they are dual mode cards, that talk both, mini-PCI and VLYNQ. Details The VLYNQ bus signals include 1 clock signal [CLK], and 1 to 8 Transmit lines [TX0 and TX1 ...], and 1 to 8 Receive lines [RX0 and RX1.....]. All VLYNQ signals are dedicated and driven by only one device. The transmit pins of one device connect to the receive lines of the next device. The VLYNQ bus will operate at a maximum clock speed of 125 MHz. However the actual clock speed is dependent on the physical device with the VLYNQ. So a device may have a clock speed other than 125 MHz. For example, a device may have an internal 100 MHz [maximum] clock rate, or external 80 MHz [maximum] clock rate. When clocked at 125 MHz, a single T/R pair then delivers an effective data throughput of about 73 Mbit/s (for single, 32-bit word transfers), while a dual T/R pair implementation delivers 146 Mbit/s, and a maximum eight-channel version delivers 584 Mbit/s. In-band flow-control lets the interface independently throttle the transmit and receive data streams. If data packets contain four or 16 wo
https://en.wikipedia.org/wiki/Color%20quantization
In computer graphics, color quantization or color image quantization is quantization applied to color spaces; it is a process that reduces the number of distinct colors used in an image, usually with the intention that the new image should be as visually similar as possible to the original image. Computer algorithms to perform color quantization on bitmaps have been studied since the 1970s. Color quantization is critical for displaying images with many colors on devices that can only display a limited number of colors, usually due to memory limitations, and enables efficient compression of certain types of images. The name "color quantization" is primarily used in computer graphics research literature; in applications, terms such as optimized palette generation, optimal palette generation, or decreasing color depth are used. Some of these are misleading, as the palettes generated by standard algorithms are not necessarily the best possible. Algorithms Most standard techniques treat color quantization as a problem of clustering points in three-dimensional space, where the points represent colors found in the original image and the three axes represent the three color channels. Almost any three-dimensional clustering algorithm can be applied to color quantization, and vice versa. After the clusters are located, typically the points in each cluster are averaged to obtain the representative color that all colors in that cluster are mapped to. The three color channels are usually red, green, and blue, but another popular choice is the Lab color space, in which Euclidean distance is more consistent with perceptual difference. The most popular algorithm by far for color quantization, invented by Paul Heckbert in 1979, is the median cut algorithm. Many variations on this scheme are in use. Before this time, most color quantization was done using the population algorithm or population method, which essentially constructs a histogram of equal-sized ranges and assigns col
https://en.wikipedia.org/wiki/CLIWOC
The Climatological database for the world's oceans (CLIWOC) was a research project to convert ships' logbooks into a computerised database. It was funded by the European Union, and the bulk of the work was done between 2001 and 2003. The database draws on British, Dutch, French and Spanish ships' logbook records for the immediate pre-instrumental period, 1750 to 1850. Logbooks in review Logbooks from the eighteenth and early nineteenth century had previously been used in case studies of individual events of historic or climatic interest. CLIWOC established early ships' logbooks as another source for those seeking to understand climate change, to be used alongside proxy and instrument data. The observations were made at local noon every single day, and cover most of the world's oceans - only the Pacific Ocean lacks detailed coverage. This volume of data was not available by any other means. Interpreting the data In researching the data, CLIWOC staff found that the data need to be treated with caution, and subjected to careful scrutiny. The range of information - wind force terms and directions, and general weather descriptions - is consistent between the different national sources. The data was primarily based on observations made by experienced officers. Though each book used consistent terms to refer to wind speeds, these values were not always consistent between logbooks. The researchers chose to standardise the terms into their Beaufort scale equivalents. The vocabulary used also differed between the national sources - British mariners used a relatively narrow range of terms, while sailors from the Netherlands, Spain, and France used a wider set of descriptions. Researchers found that the majority of wind force entries were accounted for by twelve or so terms, allowing the group to prepare a dictionary defining most wind force terms in use. This multi-lingual dictionary has also been published. Data verification In order to establish the reliability of
https://en.wikipedia.org/wiki/Electronic%20serial%20number
Electronic serial numbers (ESNs) were created by the U.S. Federal Communications Commission (FCC) to uniquely identify mobile devices, from the days of AMPS in the United States starting in the early 1980s. The administrative role was taken over by the Telecommunications Industry Association in 1997 and is still maintained by them. ESNs are currently mainly used with CDMA phones (and were previously used by AMPS and TDMA phones), compared to International Mobile Equipment Identity (IMEI) numbers used by all GSM phones. The first eight bits of the ESN were originally the manufacturer code, leaving 24 bits for the manufacturer to assign up to 16,777,215 codes to mobiles. To allow more than 256 manufacturers to be identified, the manufacturer code was extended to 14 bits, leaving 18 bits for the manufacturer to assign up to 262,144 codes. Manufacturer code 0x80 is reserved from assignment and is used instead as an eight-bit prefix for pseudo-ESNs (pESN). The remaining 24 bits are the least significant bits of the SHA-1 hash of a mobile equipment identifier (MEID). Pseudo-ESNs are not guaranteed to be unique (the MEID is the unique identifier if the phone has a pseudo-ESN). ESNs are often represented as either 11-digit decimal numbers or 8-digit hexadecimal numbers. For the decimal format the first three digits are the decimal representation of the first eight bits (between 00 and 255 inclusive) and the next eight digits are derived from the remaining 24 bits and will be between 0000000 and 16777215 inclusive. The decimal format of pseudo ESNs will therefore begin with 128. The decimal format separately displays eight bit manufacturer codes in the first three digits, but 14 bit codes are not displayed as separate digits. The hexadecimal format displays an ESN as eight digits and also does not separately display 14 bit manufacturer codes which occupy 3.5 hexadecimal digits. As ESNs have essentially run out, a new serial number format, MEID, was created by 3GPP2 and
https://en.wikipedia.org/wiki/NOR%20logic
A NOR gate or a NOT OR gate is a logic gate which gives a positive output only when both inputs are negative. Like NAND gates, NOR gates are so-called "universal gates" that can be combined to form any other kind of logic gate. For example, the first embedded system, the Apollo Guidance Computer, was built exclusively from NOR gates, about 5,600 in total for the later versions. Today, integrated circuits are not constructed exclusively from a single type of gate. Instead, EDA tools are used to convert the description of a logical circuit to a netlist of complex gates (standard cells) or transistors (full custom approach). NOR A NOR gate is logically an inverted OR gate. It has the following truth table: Making other gates by using NOR gates A NOR gate is a universal gate, meaning that any other gate can be represented as a combination of NOR gates. NOT This is made by joining the inputs of a NOR gate. As a NOR gate is equivalent to an OR gate leading to NOT gate, joining the inputs makes the output of the "OR" part of the NOR gate the same as the input, eliminating it from consideration and leaving only the NOT part. OR An OR gate is made by inverting the output of a NOR gate. Note that we already know that a NOT gate is equivalent to a NOR gate with its inputs joined. AND An AND gate gives a 1 output when both inputs are 1. Therefore, an AND gate is made by inverting the inputs of a NOR gate. Again, note that a NOR gate is equivalent to a NOT with its inputs joined. NAND A NAND gate is made by inverting the output of an AND gate. The word NAND means that it is not AND. As the name suggests, it will give 0 when both the inputs are 1. XNOR An XNOR gate is made by connecting four NOR gates as shown below. This construction entails a propagation delay three times that of a single NOR gate. Alternatively, an XNOR gate is made by considering the conjunctive normal form , noting from de Morgan's Law that a NOR gate is an inverted-input AND gate. This constr
https://en.wikipedia.org/wiki/Callosity
A callosity is another name for callus, a piece of skin that has become thickened as a result of repeated contact and friction. Primates All Old World monkeys, gibbons, and some chimpanzees have pads on their rears known as ischial callosities. Ischial relates to the ischium: it forms the lower and back part of the hip bone. The pads enable the monkeys to sleep sitting upright on thin branches, beyond reach of predators, without falling. The ischial callosities are one of the most distinctive pelvic features which separates Old World monkeys from New World monkeys. Right whales In whales, the term callosity refers to the rough, calcified skin patches found on the heads of the three species of right whales. Callosities are a characteristic feature of the whale genus Eubalaena. Because they are found on the head of the whale and appear white against the dark background of the whale's skin, they make it very easy to identify individuals of the species. The callosities themselves are grey, but their white appearance is due to large colonies of whale lice, whale barnacles and parasitic worms which reside on them. Young whales and diseased individuals are often infested with a different species of cyamid, which gives the callosities on those whales an orange hue rather than white. Callosities arise naturally and are present even in late-term whale fetuses, although the work of lice digging into the surface of the skin may make them more jagged and hard over time. Callosities are found on the upper surface of the whale's head: above the eyes, on the jawline and chin, and surrounding the blowholes. Callosities form a unique pattern on every right whale and, although callosities which are overgrown break off, the patterns do not change over a lifetime. That makes them a very useful tool for the purposes of photo-identification and conservation. The evolutionary significance of callosities is unknown. Male right whales have a higher density of callosities than fema
https://en.wikipedia.org/wiki/Gemalto
Gemalto was an international digital security company providing software applications, secure personal devices such as smart cards and tokens, e-wallets and managed services. It was formed in June 2006 by the merger of two companies, Axalto and Gemplus International. Gemalto N.V.'s revenue in 2018 was €2.969 billion. The company was purchased by Thales Group in April 2019 and is now operating as Thales DIS (Digital Identity and Security). Gemalto was until its acquisition the world's largest manufacturer of SIM cards. Thales DIS is headquartered in Amsterdam, The Netherlands, and has subsidiaries and group companies in several countries. It has approximately 15,000 employees in 110 offices along with 24 production sites, 47 personalization centers, and 35 R&D centers in 47 countries. History In June 2006, smart card providers Gemplus and Axalto merged to become Gemalto (a portmanteau of the original company names.) Axalto was a Schlumberger IPO spin-off in 2004. Between the merger and 2015, Gemalto completed a series of acquisitions: the Leigh Mardon's personalization center (Taiwan), Multos International, NamITech in South Africa, NXP mobile services business, the mobile software solution provider O3SIS, Trusted Logic (the secure software platform provider), Serverside (personalization of bank cards with digital images generated by end users), XIRING's banking activity, Netsize (a mobile communications service and commerce enabler), Valimo Wireless, a provider in mobile authentication, the internet banking security specialist Todos AB in Sweden, Cinterion the German specialist of machine-to-machine (M2M), SensorLogic (an M2M service delivery platform provider), Plastkart in Turkey, Ericsson’s mobile payment platform IPX, the information security company SafeNet and Buzzinbees, the automatic SIM activation expert. Axalto and Schlumberger Schlumberger began its chip card activities in February 1979 when it licensed and marketed certain chip card technologies d
https://en.wikipedia.org/wiki/Multimedia%20computer
A multimedia computer is a computer that is optimized for multimedia performance. Early home computers lacked the power and storage necessary for true multimedia. The games for these systems, along with the demo scene were able to achieve high sophistication and technical polish using only simple, blocky graphics and digitally generated sound. The Amiga 1000 from Commodore International has been called the first multimedia computer. Its groundbreaking animation, graphics and sound technologies enabled multimedia content to flourish. Famous demos such as the Boing Ball and Juggler showed off the Amiga's abilities. Later the Atari ST series and Apple Macintosh II extended the concept; the Atari integrated a MIDI port and was the first computer under US$1000 to have 1 megabyte of RAM which is a realistic minimum for multimedia content and the Macintosh was the first computer able to display true photorealistic graphics as well as integrating a CD-ROM drive, whose high capacity was essential for delivering multimedia content in the pre-Internet era. While the Commodore machines had the hardware to present multimedia of the kinds listed above, it lacked a way to create it easily. A computer system consists of hardware and software, so the earliest known system for creating and deploying multimedia content can be found the archives of the Smithsonian Institution and is called VirtualVideo. It consisted of a standard PC with a added digital imaging board, a added digital audio capture board (that was sold as a phone answering device), and the DOS authoring software, VirtualVideo Producer. The system stored content on a local hard drive, but could use networked computer storage as well. The name for the software was used because at the time, the mid 1980's, the term multimedia was used to describe slide shows with sound. This software was later sold as Tempra and in 1993, was included with Tay Vaugh's first edition of Multimedia: Making It Work. Multimedia capabiliti
https://en.wikipedia.org/wiki/Cytisine
Cytisine, also known as baptitoxine, cytisinicline, or sophorine, is an alkaloid that occurs naturally in several plant genera, such as Laburnum and Cytisus of the family Fabaceae. It has been used medically to help with smoking cessation. Although widely used for smoking cessation in Eastern Europe, cytisine remains relatively unknown beyond it. However, it has been found effective in several randomized clinical trials, including some in the United States and a large one in New Zealand, and is being investigated in additional trials in the United States (being conducted by Achieve Life Sciences) and a non-inferiority trial in Australia in which it is being compared head-to-head with the smoking cessation aid varenicline (sold in the United States as Chantix). It has also been used entheogenically via mescalbeans by some Native American groups, historically in the Rio Grande Valley predating even peyote. Sources Cytisine is extracted from the seeds of Cytisus laborinum L. (Golden Rain acacia), and is found in several genera of the subfamily Faboideae of the family Fabaceae, including Laburnum, Anagyris, Thermopsis, Cytisus, Genista, Retama and Sophora. Cytisine is also present in Gymnocladus of the subfamily Caesalpinioideae. Uses Smoking cessation Cytisine has been available in post-Soviet states for more than 40 years as an aid to smoking cessation under the brand name Tabex from the Bulgarian pharmaceutical company Sopharma AD. It was first marketed in Bulgaria in 1964 and then became widely available in the then-Soviet Union. In Poland, it is sold under the brand name Desmoxan, and it is also available in Canada under the brand name Cravv. Its molecular structure has some similarity to that of nicotine, and it has similar pharmacological effects. Like the smoking cessation aid varenicline, cytisine is a partial agonist of nicotinic acetylcholine receptors (nAChRs). Cytisine has a short half-life of 4.8 hours. As a result, the extract provides smokers wit
https://en.wikipedia.org/wiki/Iliopubic%20eminence
Medial to the anterior inferior iliac spine is a broad, shallow groove, over which the iliacus and psoas major muscles pass. This groove is bounded medially by an eminence, the iliopubic eminence (or iliopectineal eminence), which marks the point of union of the ilium and pubis. It constitutes a lateral border of the pelvic inlet. The iliopectineal line is the border of the eminence. The psoas minor, when present, inserts at the pectineal line of the eminence. Additional images See also Iliofemoral ligament
https://en.wikipedia.org/wiki/Box%20blur
A box blur (also known as a box linear filter) is a spatial domain linear filter in which each pixel in the resulting image has a value equal to the average value of its neighboring pixels in the input image. It is a form of low-pass ("blurring") filter. A 3 by 3 box blur ("radius 1") can be written as matrix Due to its property of using equal weights, it can be implemented using a much simpler accumulation algorithm, which is significantly faster than using a sliding-window algorithm. Box blurs are frequently used to approximate a Gaussian blur. By the central limit theorem, repeated application of a box blur will approximate a Gaussian blur. In the frequency domain, a box blur has zeros and negative components. That is, a sine wave with a period equal to the size of the box will be blurred away entirely, and wavelengths shorter than the size of the box may be phase-reversed, as seen when two bokeh circles touch to form a bright spot where there would be a dark spot between two bright spots in the original image. Extensions Gwosdek, et al. has extended Box blur to take a fractional radius: the edges of the 1-D filter are expanded with a fraction. It makes slightly better gaussian approximation possible due to the elimination of integer-rounding error. Mario Klingemann has a "stack blur" that tries to better emulate gaussian's look in one pass by stacking weights: The triangular impulse response it forms decomposes to two rounds of box blur. Stacked Integral Image by Bhatia et al. takes the weighted average of a few box blurs to fit the gaussian response curve. Implementation The following pseudocode implements a 3x3 box blur. Box blur (image) { set newImage to image; For x /*row*/, y/*column*/ on newImage do: { // Kernel would not fit! If x < 1 or y < 1 or x + 1 == width or y + 1 == height then: Continue; // Set P to the average of 9 pixels: X X X X P X X X X // C
https://en.wikipedia.org/wiki/Degen%27s%20eight-square%20identity
In mathematics, Degen's eight-square identity establishes that the product of two numbers, each of which is a sum of eight squares, is itself the sum of eight squares. Namely: First discovered by Carl Ferdinand Degen around 1818, the identity was independently rediscovered by John Thomas Graves (1843) and Arthur Cayley (1845). The latter two derived it while working on an extension of quaternions called octonions. In algebraic terms the identity means that the norm of product of two octonions equals the product of their norms: . Similar statements are true for quaternions (Euler's four-square identity), complex numbers (the Brahmagupta–Fibonacci two-square identity) and real numbers. In 1898 Adolf Hurwitz proved that there is no similar bilinear identity for 16 squares (sedenions) or any other number of squares except for 1,2,4, and 8. However, in the 1960s, H. Zassenhaus, W. Eichhorn, and A. Pfister (independently) showed there can be a non-bilinear identity for 16 squares. Note that each quadrant reduces to a version of Euler's four-square identity: and similarly for the other three quadrants. Comment: The proof of the eight-square identity is by algebraic evaluation. The eight-square identity can be written in the form of a product of two inner products of 8-dimensional vectors, yielding again an inner product of 8-dimensional vectors: . This defines the octonion multiplication rule , which reflects Degen's 8-square identity and the mathematics of octonions. By Pfister's theorem, a different sort of eight-square identity can be given where the , introduced below, are non-bilinear and merely rational functions of the . Thus, where, and, with, Incidentally, the obey the identity, See also Pfister's sixteen-square identity Cayley–Dickson construction Hypercomplex number Latin square External links Degen's eight-square identity on MathWorld The Degen–Graves–Cayley Eight-Square Identity Pfister's 16-Square Identity Analytic number theory Mathematical
https://en.wikipedia.org/wiki/Fermat%20%28computer%20algebra%20system%29
Fermat (named after Pierre de Fermat) is a program developed by Prof. Robert H. Lewis of Fordham University. It is a computer algebra system, in which items being computed can be integers (of arbitrary size), rational numbers, real numbers, complex numbers, modular numbers, finite field elements, multivariable polynomials, rational functions, or polynomials modulo other polynomials. The main areas of application are multivariate rational function arithmetic and matrix algebra over rings of multivariate polynomials or rational functions. Fermat does not do simplification of transcendental functions or symbolic integration. A session with Fermat usually starts by choosing rational or modular "mode" to establish the ground field (or ground ring) as or . On top of this may be attached any number of symbolic variables thereby creating the polynomial ring and its quotient field. Further, some polynomials involving some of the can be chosen to mod out with, creating the quotient ring Finally, it is possible to allow Laurent polynomials, those with negative as well as positive exponents. Once the computational ring is established in this way, all computations are of elements of this ring. The computational ring can be changed later in the session. The polynomial gcd procedures, which call each other in a highly recursive manner, are about 7000 lines of code. Fermat has extensive built-in primitives for array and matrix manipulations, such as submatrix, sparse matrix, determinant, normalize, column reduce, row echelon, Smith normal form, and matrix inverse. It is consistently faster than some well known computer algebra systems, especially in multivariate polynomial gcd. It is also space efficient. The basic data item in Fermat is a multivariate rational function or quolynomial. The numerator and denominator are polynomials with no common factor. Polynomials are implemented recursively as general linked lists, unlike some systems that implement polynomials as list
https://en.wikipedia.org/wiki/Modified%20Morlet%20wavelet
Modified Mexican hat, Modified Morlet and Dark soliton or Darklet wavelets are derived from hyperbolic (sech) (bright soliton) and hyperbolic tangent (tanh) (dark soliton) pulses. These functions are derived intuitively from the solutions of the nonlinear Schrödinger equation in the anomalous and normal dispersion regimes in a similar fashion to the way that the Morlet and the Mexican hat are derived. The modified Morlet is defined as: Wavelets
https://en.wikipedia.org/wiki/Catastrophic%20antiphospholipid%20syndrome
Catastrophic antiphospholipid syndrome (CAPS), also known as Asherson's syndrome, is a rare autoimmune disease in which widespread, intravascular clotting causes multi-organ failure. The syndrome is caused by antiphospholipid antibodies that target a group of proteins in the body that are associated with phospholipids. These antibodies activate endothelial cells, platelets, and immune cells, ultimately causing a large inflammatory immune response and widespread clotting. CAPS was first described by Ronald Asherson in 1992. The syndrome exhibits thrombotic microangiopathy, multiple organ thromboses, and in some cases tissue necrosis and is considered an extreme or catastrophic variant of the antiphospholipid syndrome. CAPS has a mortality rate of about 50%. With the establishment of a CAPS-Registry more has been learned about this syndrome, but its cause remains unknown. Infection, trauma, medication, and/or surgery can be identified in about half the cases as a "trigger". It is thought that cytokines are activated leading to a cytokine storm with the potentially fatal consequences of organ failure. A low platelet count is a common finding. Presentation Clinically, the syndrome affects at least three organs and may affect many organ systems. The syndrome usually occurs with small vessel thromboses affecting organ systems such as the gastrointestinal tract and manifestations of the acute respiratory distress syndrome (ARDS), a type of systemic inflammatory response syndrome (SIRS). Peripheral thrombosis may be encountered affecting veins and arteries. Intra-abdominal thrombosis may lead to pain. The body contains β2-GPI, a glycoprotein in the blood, which is considered a natural anticoagulant due to its inhibitory effects on certain aspects of platelet synthesis and function. Because the formation of anti-β2-GPI antibodies can occur after exposure to bacteria, the body favors a hypercoagulable state, which has been noted to activate toll-like receptor 4 resulting i
https://en.wikipedia.org/wiki/Japan%20Advanced%20Institute%20of%20Science%20and%20Technology
The is a postgraduate university in Nomi, Ishikawa, established in 1990. JAIST was established in the centre of Ishikawa Science Park (ISP). JAIST has programs of advanced research and development in science and technology. This university has several satellite campuses: Shinagawa Campus in Shinagawa, Tokyo (relocated from its earlier Tamachi Campus in Minato, Tokyo), open course in Information Technology and Management of Technology (MOT), and satellite lectures in Kanazawa City and Toyama City. In The 21st Century Center Of Excellence Program, JSPS granted two programs to JAIST. One program is the (2003), and the other program is (2004). History 1989 A committee was organized at Tokyo Institute of Technology for foundation of a research-intensive university in Ishikawa Prefecture (Hokuriku region). 1990 JAIST was founded in Japan as Japan's first postgraduate university without undergraduate faculty. Graduate School of Information Science was organized. The Institute Library was constructed. 1991 Graduate School of Materials Science was organized. The Center for Information Science was established. 1992 The Center for New Materials was established. 1993 The Center for Research and Investigation of Advanced Science and Technology was established. 1994 The Health Care Center was established. 1996 The Institute Library opens. Graduate School of Knowledge Science was organized. 1998 The Center for Knowledge Science was established. 2001 The Research Center for Remote Learning was established. The Internet Research Center was established. 2002 The Center for Nano Materials and Technology was established, as the result of reorganization of the Center for New Materials. The Venture Business Laboratory was established. 2003 The IP (Intellectual Property) Operation Center was established. The Center for Strategic Development of Science and Technology was established. 2004 JAIST was incorporated as a National University Corporation. The Research
https://en.wikipedia.org/wiki/Procynosuchus
Procynosuchus (Greek: "Before dog crocodile") is an extinct genus of cynodonts from the Late Permian. It is considered to be one of the earliest and most basal cynodonts. It was 60 cm (2 ft) long. Remains of Procynosuchus have been found in Russia, Germany, Zambia and South Africa. Paleobiology As one of the earliest cynodonts, Procynosuchus has many primitive features, but it also has features that distinguish it from all other early therapsids. Some of these features were interpreted by Kemp (1980) as adaptations for a semi-aquatic lifestyle. For example, the wide zygapophyses of the vertebrae allow for a high degree of lateral flexibility, and Procynosuchus may have used anguilliform locomotion, or eel-like undulation, to swim through the water. The tail of Procynosuchus is also unusually long for a cynodont. The long haemal arches would have given the tail a large lateral surface area for greater propulsion through the water. Relatively flat foot bones may also have been an adaptation toward swimming, as the feet may have been used like paddles. Ridges on the femur are an indication of strong flexor muscles that could have stabilized the leg during limb-driven swimming. When the thigh is pulled back in the water, the lower leg tends to bend forward. Strong flexor muscles would have pulled the lower leg back with the femur, providing the powerful backward thrust that is needed to swim. Discovery Procynosuchus was named by South African paleontologist Robert Broom in 1937. Broom also named the cynodont Cyrbasiodon in 1931. Another genus, Parathrinaxodon, was named by Parrington in 1936. These genera are now regarded as synonyms of Procynosuchus, as they represent the same animal. Under the International Code of Zoological Nomenclature (ICZN), these two names take precedence over Procynosuchus because they were erected earlier. The names Cyrbasiodon and Parathrinaxodon were rarely used after their erection, while the name Procynosuchus has since become widesp
https://en.wikipedia.org/wiki/Cauchy%E2%80%93Born%20rule
The Cauchy–Born rule or Cauchy–Born approximation is a basic hypothesis used in the mathematical formulation of solid mechanics which relates the movement of atoms in a crystal to the overall deformation of the bulk solid. It states that in a crystalline solid subject to a small strain, the positions of the atoms within the crystal lattice follow the overall strain of the medium. The currently accepted form is Max Born's refinement of Cauchy's original hypothesis which was used to derive the equations satisfied by the Cauchy stress tensor. The approximation generally holds for face-centered and body-centered cubic crystal systems. For complex lattices such as diamond, however, the rule has to be modified to allow for internal degrees of freedom between the sublattices. The approximation can then be used to obtain bulk properties of crystalline materials such as stress-strain relationship. For crystalline bodies of finite size, the effect of surface stress is also significant. However, the standard Cauchy–Born rule cannot deduce the surface properties. To overcome this limitation, Park et al. (2006) proposed a surface Cauchy–Born rule. Several modified forms of the Cauchy–Born rule have also been proposed to cater to crystalline bodies having special shapes. Arroyo & Belytschko (2002) proposed an exponential Cauchy Born rule for modeling of mono-layered crystalline sheets as two-dimensional continuum shells. Kumar et al. (2015) proposed a helical Cauchy–Born rule for modeling slender bodies (such as nano and continuum rods) as special Cosserat continuum rods.
https://en.wikipedia.org/wiki/Forensic%20biology
Forensic biology is the use of biological principles and techniques in the context of law enforcement investigations. Forensic biology mainly focuses on DNA sequencing of biological matter found at crime scenes. This assists investigators in identifying potential suspects or unidentified bodies. Forensic biology has many sub-branches, such as forensic anthropology, forensic entomology, forensic odontology, forensic pathology, and forensic toxicology. Disciplines History The first known briefings of forensic procedures still used today are recorded as far back as the 7th century through the concept of utilizing fingerprints as a means of identification. By the 7th century, forensic procedures were used to account criminals of guilt charges among other things. Nowadays, the practice of autopsies and forensic investigations has seen a significant surge in both public interest and technological advancements. One of the early pioneers in employing these methods, which would later evolve into the field of forensics, was Alphonse Bertillon, who is also known as the "father of criminal identification". In 1879, he introduced a scientific approach to personal identification by developing the science of anthropometry. This method involved a series of body measurements for distinguishing one human individual from another. Karl Landsteiner later made further significant discoveries in forensics. In 1901, he found out that blood could be categorized into different groups: A, B, AB, and O, and thus blood typing was introduced to the world of crime-solving. This development led to further studies and eventually, a whole new spectrum of criminology was added in the fields of medicine and forensics. Dr Leone Lattes, a professor at the Institute of Forensic Medicine in Turin, Italy, has made significant additions into forensics as well. In 1915, he discovered a method to determine the blood group of dried bloodstains, which marked a significant advancement from prior techn
https://en.wikipedia.org/wiki/Critical%20control%20point
Critical Control Point (CCP) is the point where the failure of Standard Operation Procedure (SOP) could cause harm to customers and to the business, or even loss of the business itself. It is a point, step or procedure at which controls can be applied and a food safety hazard can be prevented, eliminated or reduced to acceptable (critical) levels. The most common CCP is cooking, where food safety managers designate critical limits. CCP identification is also an important step in risk and reliability analysis for water treatment processes. Food in cooking In the United States, the Food and Drug Administration (FDA) establishes minimum internal temperatures for cooked foods. These values can be superseded by state or local health code requirements, but they cannot be below the FDA limits. Temperatures should be measured with a probe thermometer in the thickest part of meats, or the center of other dishes, avoiding bones and container sides. Minimum internal temperatures are set as follows: 165 °F (74 °C) for 15 seconds Poultry (such as whole or ground chicken, turkey, or duck) Stuffed meats, fish, poultry, and pasta Any previously cooked foods that are reheated from a temperature below 135 °F (57 °C), provided they have been refrigerated or warm less than 2 hours Any potentially hazardous foods cooked in a microwave, such as poultry, meat, fish, or eggs 155 °F (68 °C) for 15 seconds Ground meats (such as beef or pork) Injected meats (such as flavor-injected roasts or brined hams) Ground or minced fish Eggs that will be held for a length of time before eaten 145 °F (63 °C) for 15 seconds Steaks and chops such as beef, pork, veal, and lamb Fish Eggs cooked for immediate service 145 °F (63 °C) for 4 minutes Roasts (can be cooked to lower temperatures for increased lengths of time) 135 °F (57 °C) for 15 seconds Cooked fruits or vegetables that will be held for a length of time before eaten Any commercially processed, ready-to-eat foods that will be
https://en.wikipedia.org/wiki/Hammett%20equation
In organic chemistry, the Hammett equation describes a linear free-energy relationship relating reaction rates and equilibrium constants for many reactions involving benzoic acid derivatives with meta- and para-substituents to each other with just two parameters: a substituent constant and a reaction constant. This equation was developed and published by Louis Plack Hammett in 1937 as a follow-up to qualitative observations in his 1935 publication. The basic idea is that for any two reactions with two aromatic reactants only differing in the type of substituent, the change in free energy of activation is proportional to the change in Gibbs free energy. This notion does not follow from elemental thermochemistry or chemical kinetics and was introduced by Hammett intuitively. The basic equation is: where = Reference constant = Substituent constant = Reaction rate constant relating the equilibrium constant, , for a given equilibrium reaction with substituent R and the reference constant when R is a hydrogen atom to the substituent constant which depends only on the specific substituent R and the reaction rate constant ρ which depends only on the type of reaction but not on the substituent used. The equation also holds for reaction rates k of a series of reactions with substituted benzene derivatives: In this equation is the reference reaction rate of the unsubstituted reactant, and k that of a substituted reactant. A plot of for a given equilibrium versus for a given reaction rate with many differently substituted reactants will give a straight line. Substituent constants The starting point for the collection of the substituent constants is a chemical equilibrium for which the substituent constant is arbitrarily set to 0 and the reaction constant is set to 1: the deprotonation of benzoic acid or benzene carboxylic acid (R and R' both H) in water at 25 °C. Having obtained a value for K0, a series of equilibrium constants (K) are now determined based on t
https://en.wikipedia.org/wiki/Sequential%20pattern%20mining
Sequential pattern mining is a topic of data mining concerned with finding statistically relevant patterns between data examples where the values are delivered in a sequence. It is usually presumed that the values are discrete, and thus time series mining is closely related, but usually considered a different activity. Sequential pattern mining is a special case of structured data mining. There are several key traditional computational problems addressed within this field. These include building efficient databases and indexes for sequence information, extracting the frequently occurring patterns, comparing sequences for similarity, and recovering missing sequence members. In general, sequence mining problems can be classified as string mining which is typically based on string processing algorithms and itemset mining which is typically based on association rule learning. Local process models extend sequential pattern mining to more complex patterns that can include (exclusive) choices, loops, and concurrency constructs in addition to the sequential ordering construct. String mining String mining typically deals with a limited alphabet for items that appear in a sequence, but the sequence itself may be typically very long. Examples of an alphabet can be those in the ASCII character set used in natural language text, nucleotide bases 'A', 'G', 'C' and 'T' in DNA sequences, or amino acids for protein sequences. In biology applications analysis of the arrangement of the alphabet in strings can be used to examine gene and protein sequences to determine their properties. Knowing the sequence of letters of a DNA or a protein is not an ultimate goal in itself. Rather, the major task is to understand the sequence, in terms of its structure and biological function. This is typically achieved first by identifying individual regions or structural units within each sequence and then assigning a function to each structural unit. In many cases this requires comparing a giv
https://en.wikipedia.org/wiki/Announcement%20%28computing%29
An announcement (ANN) is a Usenet, mailing list or e-mail message sent to notify subscribers that a software project has made a new release version. Newsgroup announcement recipients often have a name like "comp.somegroup.announce". Mailing list announcement recipients often have a name like "toolname-announce". In an announcement, the subject line commonly contains the abbreviated prefix ANN: or [ANN]. The contents of an announcement usually contain a title line which contains the tool name, version, release name, and date. Additional contents often fall into the following message sections: About: a short paragraph summary of the tool's purpose Changes: a list of the highest impact changes since the last release (should be brief since the changelog comprises the definitive list) Resources: links to project pages of interest, such as homepage, where to download, bug tracking system, etc. Some additional, optional fields might include "Highlights", "Author(s)", "License", "Requirements", and "Release History". Announcement messages are usually sent in plain text form. Example Example announcement message subject line: ANN: fooutils 0.9.42 beta released Example announcement message contents: ============================================== Fooutils 0.9.42 Beta Released -- 2006 Feb 16 ============================================== ANNOUNCING Fooutils v0.2.12beta, the first beta release. About Fooutils -------------- Fooutils are a set of utilities that... Changes ------- Improved the searching facility by including... Fixed bugs: #123, #456, ... Resources --------- Homepage: http://fooutils.org Documentation: http://fooutils.org/docs Download: http://fooutils.org/download Bug Tracker: http://fooutils.org/newticket Mailing Lists: http://lists.fooutils.org/ See also List of e-mail subject abbreviations Further reading Free software culture and documents Technical communication Usenet
https://en.wikipedia.org/wiki/Shadow%20biosphere
A shadow biosphere is a hypothetical microbial biosphere of Earth that would use radically different biochemical and molecular processes from that of currently known life. Although life on Earth is relatively well studied, if a shadow biosphere exists it may still remain unnoticed, because the exploration of the microbial world targets primarily the biochemistry of the macro-organisms. The hypothesis It has been proposed that the early Earth hosted multiple origins of life, some of which produced chemical variations on life as we know it. Some argue that these alternative life forms could have become extinct, either by being out-competed by other forms of life, or they might have become one with the present day life via mechanisms like lateral gene transfer. Others, however, argue that this other form of life might still exist to this day. Steven A. Benner, Alonso Ricardo, and Matthew A. Carrigan, biochemists at the University of Florida, argued that if organisms based on RNA once existed, they might still be alive today, unnoticed because they do not contain ribosomes, which are usually used to detect living microorganisms. They suggest searching for them in environments that are low in sulfur, environments that are spatially constrained (for example, minerals with pores smaller than one micrometre), or environments that cycle between extreme hot and cold. Other proposed candidates for a shadow biosphere include organisms using different suites of amino acids in their proteins or different molecular units (e.g., bases or sugars) in their nucleic acids, having a chirality opposite of ours, using some of the nonstandard amino acids, or using arsenic instead of phosphorus, having a different genetic code, or even another kind of chemical for its genetic material that are not nucleic acids (DNA nor RNA) chains or biopolymers. Carol Cleland, a philosopher of science at the University of Colorado (Boulder), argues that desert varnish, whose status as biological or non
https://en.wikipedia.org/wiki/Emery%27s%20rule
In 1909, the entomologist Carlo Emery noted that social parasites among insects (e.g., kleptoparasites) tend to be parasites of species or genera to which they are closely related. Over time, this pattern has been recognized in many additional cases, and generalized to what is now known as Emery's rule. The pattern is best known for various taxa of Hymenoptera. For example, the social wasp Dolichovespula adulterina parasitizes other members of its genus such as Dolichovespula norwegica and Dolichovespula arenaria. Emery's rule is also applicable to members of other kingdoms such as fungi, red algae, and mistletoe. The significance and general relevance of this pattern are still a matter of some debate, as a great many exceptions exist, though a common explanation for the phenomenon when it occurs is that the parasites may have started as facultative parasites within the host species itself (such forms of intraspecific parasitism are well-known, even in some species of bees), but later became reproductively isolated and split off from the ancestral species, a form of sympatric speciation. When a parasitic species is a sister taxon to its host in a phylogenetic sense, the relationship is considered to be in "strict" adherence to Emery's rule. When the parasite is a close relative of the host but not its sister species, the relationship is in "loose" adherence to the rule.
https://en.wikipedia.org/wiki/Tempered%20glass
Tempered or toughened glass is a type of safety glass processed by controlled thermal or chemical treatments to increase its strength compared with normal glass. Tempering puts the outer surfaces into compression and the interior into tension. Such stresses cause the glass, when broken, to shatter into small granular chunks instead of splintering into jagged shards as ordinary annealed glass does. The granular chunks are less likely to cause injury. Tempered glass is used for its safety and strength in a variety of applications, including passenger vehicle windows (apart from windshield), shower doors, aquariums, architectural glass doors and tables, refrigerator trays, mobile phone screen protectors, bulletproof glass components, diving masks, and plates and cookware. Properties Tempered glass is about four times stronger than annealed glass. The more rapid contraction of the outer layer during manufacturing induces compressive stresses in the surface of the glass balanced by tensile stresses in the body of the glass. Fully tempered 6-mm thick glass must have either a minimum surface compression of 69 MPa (10 000 psi) or an edge compression of not less than 67 MPa (9 700 psi). For it to be considered safety glass, the surface compressive stress should exceed . As a result of the increased surface stress, when broken the glass breaks into small rounded chunks as opposed to sharp jagged shards. Compressive surface stresses give tempered glass increased strength. Annealed glass has almost no internal stress and usually forms microscopic cracks on its surface. Tension applied to the glass can drive crack propagation which, once begun, concentrates tension at the tip of the crack driving crack propagation at the speed of sound through the glass. Consequently, annealed glass is fragile and breaks into irregular and sharp pieces. The compressive stresses on the surface of tempered glass contain flaws, preventing their propagation or expansion. Any cutting or grindi
https://en.wikipedia.org/wiki/Pakistan%20Institute%20of%20Nuclear%20Science%20%26%20Technology
The Pakistan Institute of Nuclear Science & Technology (PINSTECH) () is a federally funded multiprogram science and technology research institute managed for the Ministry of Energy by the Pakistan Institute of Engineering and Applied Sciences (PIEAS). The laboratory site in Nilore was designed by the American architect Edward Durell Stone, and its construction was completed in 1965. It has been described as "[maybe] the most architecturally stunning physics complex in the world". In response to the war with India in 1971, the lab was repurposed as a primary weapons laboratory from its original civilian mission. Since the 1990s, the lab has been focused increasingly on civilian mission and it maintains a broad portfolio in providing research opportunities in supercomputing, renewable energy, physical sciences, philosophy, materials science, medicine, environmental science, and mathematics. Researchers and scholars are invited from universities throughout Pakistan. Overview Research scope The PINSTECH is regarded as the one of the most advanced and premium research facility in Pakistan. As of 2016, PINSTECH's major research focus is on: Conducting scientific research and publications in nuclear field at the international level. Technological development on nuclear sciences for peaceful usage. Producing radioisotopes and radio pharmaceuticals for catering to the needs of nuclear medical centers, industry and research establishments. Promoting applications of radiation and isotope technology in various scientific and technological disciplines to support national programs. Undertaking limited production of sophisticated equipment and special nuclear materials. Working on important non-nuclear fields which are crucial for the development of science and technology in the country. The PAEC Chair Dr. I. H. Usmani wanted a premium nuclear facility whose operations are roughly based on the American facilities such as ORNL, ANL, LLNL, and SNL. Many scientists educated
https://en.wikipedia.org/wiki/Bidirectional%20scattering%20distribution%20function
The definition of the BSDF (bidirectional scattering distribution function) is not well standardized. The term was probably introduced in 1980 by Bartell, Dereniak, and Wolfe. Most often it is used to name the general mathematical function which describes the way in which the light is scattered by a surface. However, in practice, this phenomenon is usually split into the reflected and transmitted components, which are then treated separately as BRDF (bidirectional reflectance distribution function) and BTDF (bidirectional transmittance distribution function). BSDF is a superset and the generalization of the BRDF and BTDF. The concept behind all BxDF functions could be described as a black box with the inputs being any two angles, one for incoming (incident) ray and the second one for the outgoing (reflected or transmitted) ray at a given point of the surface. The output of this black box is the value defining the ratio between the incoming and the outgoing light energy for the given couple of angles. The content of the black box may be a mathematical formula which more or less accurately tries to model and approximate the actual surface behavior or an algorithm which produces the output based on discrete samples of measured data. This implies that the function is 4(+1)-dimensional (4 values for 2 3D angles + 1 optional for wavelength of the light), which means that it cannot be simply represented by 2D and not even by a 3D graph. Each 2D or 3D graph, sometimes seen in the literature, shows only a slice of the function. Some tend to use the term BSDF simply as a category name covering the whole family of BxDF functions. The term BSDF is sometimes used in a slightly different context, for the function describing the amount of the scatter (not scattered light), simply as a function of the incident light angle. An example to illustrate this context: for perfectly lambertian surface the BSDF (angle)=const. This approach is used for instance to verify the output quali
https://en.wikipedia.org/wiki/Noise-equivalent%20temperature
Noise-equivalent temperature (NET) is a measure of the sensitivity of a detector of thermal radiation in the infrared, terahertz or microwave portions of the electromagnetic spectrum. It is the amount of incident signal temperature that would be needed to match the internal noise of the detector such that the signal-to-noise ratio is equal to one. Often the spectrum of the NET is reported as a temperature per root bandwidth. A detector that measures power is often interested in the analogous noise-equivalent power (NEP). If a relation between intensity and temperature is well defined over the passband, as in the case of a blackbody, then the NET simply scales with the NEP. If a detector is limited by either shot noise or Johnson noise then the NET can be decreased by using an increased integration time. The NET of flicker noise limited detectors can not be reduced by increased integration time. Typically uncooled bolometric detectors have NET figures of 30-200 mK. Cooled photon detecting infrared detectors using materials such as HgCdTe (LWIR or MWIR) or InSb (MWIR) can approach a NET figure of 10 mK. In the microwave radiation region NET values are typically several hundred millikelvins to several kelvins. For a particular mean signal temperature there is a fundamental limit to NET given by the natural thermodynamic fluctuations of the photon flux from the source under investigation. See also Noise-equivalent power Specific detectivity Minimum resolvable temperature difference External links Expanding the Vision of Sensor Materials (1995) National Materials Advisory Board (NMAB) Infrared imaging Equivalent units
https://en.wikipedia.org/wiki/Take-grant%20protection%20model
The take-grant protection model is a formal model used in the field of computer security to establish or disprove the safety of a given computer system that follows specific rules. It shows that even though the question of safety is in general undecidable, for specific systems it is decidable in linear time. The model represents a system as directed graph, where vertices are either subjects or objects. The edges between them are labeled, and the label indicates the rights that the source of the edge has over the destination. Two rights occur in every instance of the model: take and grant. They play a special role in the graph rewriting rules describing admissible changes of the graph. There are a total of four such rules: take rule allows a subject to take rights of another object (add an edge originating at the subject) grant rule allows a subject to grant own rights to another object (add an edge terminating at the subject) create rule allows a subject to create new objects (add a vertex and an edge from the subject to the new vertex) remove rule allows a subject to remove rights it has over on another object (remove an edge originating at the subject) Preconditions for : subject s has the right Take for o. object o has the right r on p. Preconditions for : subject s has the right Grant for o. s has the right r on p. Using the rules of the take-grant protection model, one can reproduce in which states a system can change, with respect to the distribution of rights. Therefore, one can show if rights can leak with respect to a given safety model.
https://en.wikipedia.org/wiki/Genocchi%20number
In mathematics, the Genocchi numbers Gn, named after Angelo Genocchi, are a sequence of integers that satisfy the relation The first few Genocchi numbers are 0, −1, −1, 0, 1, 0, −3, 0, 17 , see . Properties The generating function definition of the Genocchi numbers implies that they are rational numbers. In fact, G2n+1 = 0 for n ≥ 1 and (−1)nG2n is an odd positive integer. Genocchi numbers Gn are related to Bernoulli numbers Bn by the formula Combinatorial interpretations The exponential generating function for the signed even Genocchi numbers (−1)nG2n is They enumerate the following objects: Permutations in S2n−1 with descents after the even numbers and ascents after the odd numbers. Permutations π in S2n−2 with 1 ≤ π(2i−1) ≤ 2n−2i and 2n−2i ≤ π(2i) ≤ 2n−2. Pairs (a1,…,an−1) and (b1,…,bn−1) such that ai and bi are between 1 and i and every k between 1 and n−1 occurs at least once among the ai's and bi's. Reverse alternating permutations a1 < a2 > a3 < a4 >…>a2n−1 of [2n−1] whose inversion table has only even entries. See also Euler number
https://en.wikipedia.org/wiki/Intrusive%20thought
An intrusive thought is an unwelcome, involuntary thought, image, or unpleasant idea that may become an obsession, is upsetting or distressing, and can feel difficult to manage or eliminate. When such thoughts are associated with obsessive-compulsive disorder (OCD), Tourette's syndrome (TS), depression, body dysmorphic disorder (BDD), and sometimes attention-deficit hyperactivity disorder (ADHD), the thoughts may become paralyzing, anxiety-provoking, or persistent. Intrusive thoughts may also be associated with episodic memory, unwanted worries or memories from OCD, post-traumatic stress disorder, other anxiety disorders, eating disorders, or psychosis. Intrusive thoughts, urges, and images are of inappropriate things at inappropriate times, and generally have aggressive, sexual, or blasphemous themes. Description General Many people experience the type of negative and uncomfortable thoughts that people with more intrusive thoughts experience, but most people can dismiss these thoughts. For most people, intrusive thoughts are a "fleeting annoyance". Psychologist Stanley Rachman presented a questionnaire to healthy college students and found that virtually all said they had these thoughts from time to time, including thoughts of sexual violence, sexual punishment, "unnatural" sex acts, painful sexual practices, blasphemous or obscene images, thoughts of harming elderly people or someone close to them, violence against animals or towards children, and impulsive or abusive outbursts or utterances. Such thoughts are universal among humans, and have "almost certainly always been a part of the human condition". When intrusive thoughts occur with obsessive-compulsive disorder (OCD), patients are less able to ignore the unpleasant thoughts and may pay undue attention to them, causing the thoughts to become more frequent and distressing. Attempting to suppress intrusive thoughts often cause these same thoughts to become more intense and persistent. The thoughts may bec
https://en.wikipedia.org/wiki/Game%20Oriented%20Assembly%20Lisp
Game Oriented Assembly Lisp (GOAL, also known as Game Object Assembly Lisp) is a programming language, a dialect of the language Lisp, made for video games developed by Andy Gavin and the Jak and Daxter team at the company Naughty Dog. It was written using Allegro Common Lisp and used in the development of the entire Jak and Daxter series of games. Design GOAL's syntax resembles the Lisp dialect Scheme, though with many idiosyncratic object-oriented programming features such as classes, inheritance, and virtual functions. GOAL encourages an imperative programming style: programs tend to consist of a sequence of events to be executed rather than the functional programming style of functions to be evaluated recursively. This is a diversion from Scheme, which allows such side effects but does not encourage imperative style. GOAL does not run in an interpreter, but instead is compiled directly into PlayStation 2 machine code to execute. It offers limited facilities for garbage collection, relying extensively on runtime support. It offers dynamic memory allocation primitives designed to make it well-suited to running in constant memory on a video game console. GOAL has extensive support for inlined assembly language code using a special rlet form, allowing programs to freely mix assembly and higher-level constructs within one function. The GOAL compiler is implemented in Allegro Common Lisp. It supports a long term compiling listener session which gives the compiler knowledge about the state of the compiled and thus running program, including the symbol table. This, in addition to dynamic linking, allows a function to be edited, recompiled, uploaded, and inserted into a running game without having to restart. The process is similar to the edit and continue feature offered by some C++ compilers, but allows programs to replace arbitrary amounts of code (even up to entire object files), and does not interrupt the running game with the debugger. This feature was used t
https://en.wikipedia.org/wiki/Semidefinite%20programming
Semidefinite programming (SDP) is a subfield of convex optimization concerned with the optimization of a linear objective function (a user-specified function that the user wants to minimize or maximize) over the intersection of the cone of positive semidefinite matrices with an affine space, i.e., a spectrahedron. Semidefinite programming is a relatively new field of optimization which is of growing interest for several reasons. Many practical problems in operations research and combinatorial optimization can be modeled or approximated as semidefinite programming problems. In automatic control theory, SDPs are used in the context of linear matrix inequalities. SDPs are in fact a special case of cone programming and can be efficiently solved by interior point methods. All linear programs and (convex) quadratic programs can be expressed as SDPs, and via hierarchies of SDPs the solutions of polynomial optimization problems can be approximated. Semidefinite programming has been used in the optimization of complex systems. In recent years, some quantum query complexity problems have been formulated in terms of semidefinite programs. Motivation and definition Initial motivation A linear programming problem is one in which we wish to maximize or minimize a linear objective function of real variables over a polytope. In semidefinite programming, we instead use real-valued vectors and are allowed to take the dot product of vectors; nonnegativity constraints on real variables in LP (linear programming) are replaced by semidefiniteness constraints on matrix variables in SDP (semidefinite programming). Specifically, a general semidefinite programming problem can be defined as any mathematical programming problem of the form where the , and the are real numbers and is the dot product of and . Equivalent formulations An matrix is said to be positive semidefinite if it is the Gram matrix of some vectors (i.e. if there exist vectors such that for all ). If this
https://en.wikipedia.org/wiki/NIST%20%28metric%29
NIST is a method for evaluating the quality of text which has been translated using machine translation. Its name comes from the US National Institute of Standards and Technology. It is based on the BLEU metric, but with some alterations. Where BLEU simply calculates n-gram precision adding equal weight to each one, NIST also calculates how informative a particular n-gram is. That is to say when a correct n-gram is found, the rarer that n-gram is, the more weight it will be given. For example, if the bigram "on the" is correctly matched, it will receive lower weight than the correct matching of bigram "interesting calculations", as this is less likely to occur. NIST also differs from BLEU in its calculation of the brevity penalty insofar as small variations in translation length do not impact the overall score as much. See also BLEU F-Measure METEOR Noun-phrase chunking ROUGE (metric) Word error rate (WER)
https://en.wikipedia.org/wiki/Posterior%20fontanelle
The posterior fontanelle (lambdoid fontanelle, occipital fontanelle) is a gap between bones in the human skull (known as fontanelle), triangular in form and situated at the junction of the sagittal suture and lambdoidal suture. It generally closes in 6–8 weeks from birth. The cranial point in adults corresponding the fontanelle is called lambda. A delay in closure is associated with congenital hypothyroidism.
https://en.wikipedia.org/wiki/Privacy%20Act%20%28Canada%29
The Privacy Act () is the federal information-privacy legislation of Canada that came into effect on July 1, 1983. Administered by the Privacy Commissioner of Canada, the Act sets out rules for how institutions of the Government of Canada collect, use, disclose, retain, and dispose of personal information of individuals. The Act does not apply to political parties, political representatives (i.e., members of Parliament and senators), courts, and private sector organizations. All provinces and territories have their own laws governing their public sectors. Overview Some salient provisions of the legislation are as follows: A government institution may not collect personal information unless it relates directly to an operating program or activity of the institution (section 4). With some exceptions, when a government institution collects an individual's personal information from the individual, it must inform the individual of the purpose for which the information is being collected (section 5(2)). With some exceptions, personal information under the control of a government institution may be used only for the purpose for which the information was obtained or for a use consistent with that purpose, unless the individual consents (section 7). With some exceptions, personal information under the control of a government institution may not be disclosed, unless the individual consents (section 8). Every Canadian citizen or permanent resident has the right to be given access to personal information about the individual under the control of a government institution that is reasonably retrievable by the government institution, and request correction if the information is inaccurate (section 12). A government institution can refuse requests for access to personal information in four cases: The request interferes with the responsibilities of the government, such as national defence and law enforcement investigations (sections 19-25) The request contains the persona
https://en.wikipedia.org/wiki/Moment%20matrix
In mathematics, a moment matrix is a special symmetric square matrix whose rows and columns are indexed by monomials. The entries of the matrix depend on the product of the indexing monomials only (cf. Hankel matrices.) Moment matrices play an important role in polynomial fitting, polynomial optimization (since positive semidefinite moment matrices correspond to polynomials which are sums of squares) and econometrics. Application in regression A multiple linear regression model can be written as where is the explained variable, are the explanatory variables, is the error, and are unknown coefficients to be estimated. Given observations , we have a system of linear equations that can be expressed in matrix notation. or where and are each a vector of dimension , is the design matrix of order , and is a vector of dimension . Under the Gauss–Markov assumptions, the best linear unbiased estimator of is the linear least squares estimator , involving the two moment matrices and defined as and where is a square normal matrix of dimension , and is a vector of dimension . See also Design matrix Gramian matrix Projection matrix
https://en.wikipedia.org/wiki/Daniel%20Santbech
Daniel Santbech (fl. 1561) was a Dutch mathematician and astronomer. He adopted the Latinized name of Noviomagus, possibly suggesting that he came from the town of Nijmegen, called Ulpia Noviomagus Batavorum by the Romans. In 1561, Santbech compiled a collected edition of the works of Regiomontanus (1436–1476), De triangulis planis et sphaericis libri quinque (first published in 1533) and Compositio tabularum sinum recto, as well as Santbech's own Problematum astronomicorum et geometricorum sectiones septem. It was published in Basel by Henrich Petri and Petrus Perna. Santbech's work consisted of studies on astronomy, sundials, surveying, and levelling for water courses. It also includes descriptions of astronomical instruments, information for navigators and geographers, and general information about astronomy in the first years after Nicolaus Copernicus. Santbech also studied the subject of gunnery and ballistics as a theoretic discourse as well as for the practical application of war, and utilized the foundations of geometry, with ample references to Euclid and Ptolemy, in order to do so. Santbech seem not to have been aware of similar studies by Niccolò Fontana Tartaglia. Santbech's text included theoretical illustrations of trajectories. These were depicted with abruptly acute angles and straight lines, allowing him to create a right-angled triangle from which ranges were computed with the help of a table of sines. Santbech was of course fully aware that a cannonball's true trajectory would not consist of a straight line and a sudden drop, but these depictions were meant to assist with mathematical calculations. In 1651, Riccioli gave Santbech's name to the crater Santbech on the Moon.
https://en.wikipedia.org/wiki/Genomic%20library
A genomic library is a collection of overlapping DNA fragments that together make up the total genomic DNA of a single organism. The DNA is stored in a population of identical vectors, each containing a different insert of DNA. In order to construct a genomic library, the organism's DNA is extracted from cells and then digested with a restriction enzyme to cut the DNA into fragments of a specific size. The fragments are then inserted into the vector using DNA ligase. Next, the vector DNA can be taken up by a host organism - commonly a population of Escherichia coli or yeast - with each cell containing only one vector molecule. Using a host cell to carry the vector allows for easy amplification and retrieval of specific clones from the library for analysis. There are several kinds of vectors available with various insert capacities. Generally, libraries made from organisms with larger genomes require vectors featuring larger inserts, thereby fewer vector molecules are needed to make the library. Researchers can choose a vector also considering the ideal insert size to find the desired number of clones necessary for full genome coverage. Genomic libraries are commonly used for sequencing applications. They have played an important role in the whole genome sequencing of several organisms, including the human genome and several model organisms. History The first DNA-based genome ever fully sequenced was achieved by two-time Nobel Prize winner, Frederick Sanger, in 1977. Sanger and his team of scientists created a library of the bacteriophage, phi X 174, for use in DNA sequencing. The importance of this success contributed to the ever-increasing demand for sequencing genomes to research gene therapy. Teams are now able to catalog polymorphisms in genomes and investigate those candidate genes contributing to maladies such as Parkinson's disease, Alzheimer's disease, multiple sclerosis, rheumatoid arthritis, and Type 1 diabetes. These are due to the advance of genome-
https://en.wikipedia.org/wiki/List%20of%20knapsack%20problems
The knapsack problem is one of the most studied problems in combinatorial optimization, with many real-life applications. For this reason, many special cases and generalizations have been examined. Common to all versions are a set of n items, with each item having an associated profit pj and weight wj. The binary decision variable xj is used to select the item. The objective is to pick some of the items, with maximal total profit, while obeying that the maximum total weight of the chosen items must not exceed W. Generally, these coefficients are scaled to become integers, and they are almost always assumed to be positive. The knapsack problem in its most basic form: Direct generalizations One common variant is that each item can be chosen multiple times. The bounded knapsack problem specifies, for each item j, an upper bound uj (which may be a positive integer, or infinity) on the number of times item j can be selected: The unbounded knapsack problem (sometimes called the integer knapsack problem) does not put any upper bounds on the number of times an item may be selected: The unbounded variant was shown to be NP-complete in 1975 by Lueker. Both the bounded and unbounded variants admit an FPTAS (essentially the same as the one used in the 0-1 knapsack problem). If the items are subdivided into k classes denoted , and exactly one item must be taken from each class, we get the multiple-choice knapsack problem: If for each item the profit and weight are equal, we get the subset sum problem (often the corresponding decision problem is given instead): If we have n items and m knapsacks with capacities , we get the multiple knapsack problem: As a special case of the multiple knapsack problem, when the profits are equal to weights and all bins have the same capacity, we can have multiple subset sum problem. Quadratic knapsack problem: Set-Union Knapsack Problem: SUKP is defined by Kellerer et al (on page 423) as follows: Given a set of items and a set of
https://en.wikipedia.org/wiki/Ideal%20point
In hyperbolic geometry, an ideal point, omega point or point at infinity is a well-defined point outside the hyperbolic plane or space. Given a line l and a point P not on l, right- and left-limiting parallels to l through P converge to l at ideal points. Unlike the projective case, ideal points form a boundary, not a submanifold. So, these lines do not intersect at an ideal point and such points, although well-defined, do not belong to the hyperbolic space itself. The ideal points together form the Cayley absolute or boundary of a hyperbolic geometry. For instance, the unit circle forms the Cayley absolute of the Poincaré disk model and the Klein disk model. While the real line forms the Cayley absolute of the Poincaré half-plane model . Pasch's axiom and the exterior angle theorem still hold for an omega triangle, defined by two points in hyperbolic space and an omega point. Properties The hyperbolic distance between an ideal point and any other point or ideal point is infinite. The centres of horocycles and horoballs are ideal points; two horocycles are concentric when they have the same centre. Polygons with ideal vertices Ideal triangles if all vertices of a triangle are ideal points the triangle is an ideal triangle. Some properties of ideal triangles include: All ideal triangles are congruent. The interior angles of an ideal triangle are all zero. Any ideal triangle has an infinite perimeter. Any ideal triangle has area where K is the (always negative) curvature of the plane. Ideal quadrilaterals if all vertices of a quadrilateral are ideal points, the quadrilateral is an ideal quadrilateral. While all ideal triangles are congruent, not all quadrilaterals are; the diagonals can make different angles with each other resulting in noncongruent quadrilaterals. Having said this: The interior angles of an ideal quadrilateral are all zero. Any ideal quadrilateral has an infinite perimeter. Any ideal (convex non intersecting) quadrilateral h
https://en.wikipedia.org/wiki/Data%20domain
In data management and database analysis, a data domain is the collection of values that a data element may contain. The rule for determining the domain boundary may be as simple as a data type with an enumerated list of values. For example, a database table that has information about people, with one record per person, might have a "marital status" column. This column might be declared as a string data type, and allowed to have one of two known code values: "M" for married, "S" for single, and NULL for records where marital status is unknown or not applicable. The data domain for the marital status column is: "M", "S". In a normalized data model, the reference domain is typically specified in a reference table. Following the previous example, a Marital Status reference table would have exactly two records, one per allowed value—excluding NULL. Reference tables are formally related to other tables in a database by the use of foreign keys. Less simple domain boundary rules, if database-enforced, may be implemented through a check constraint or, in more complex cases, in a database trigger. For example, a column requiring positive numeric values may have a check constraint declaring that the values must be greater than zero. This definition combines the concepts of domain as an area over which control is exercised and the mathematical idea of a set of values of an independent variable for which a function is defined, as in Domain of a function. See also Data modeling Reference data Master data management Database normalization
https://en.wikipedia.org/wiki/Viola%20epipsila
Viola epipsila, the dwarf marsh violet, is a species of perennial forb in the genus Viola. It is found in Alaska, Finland, Russia, Poland, and other countries in Europe. Since the 1980s, it has spread to the eastern United States.
https://en.wikipedia.org/wiki/Human%20milk%20banking%20in%20North%20America
A human milk bank is "a service which collects, screens, processes, and dispenses by prescription human milk donated by nursing mothers who are not biologically related to the recipient infant". As of November 2019, there are 28 milk banks in North America that are members of the Human Milk Banking Association of North America (HMBANA). They are usually housed in hospitals, although some are free standing. Members of HMBANA follow the annually revised "Guidelines for the Establishment and Operation of a Donor Human Milk Bank" which include protocols for soliciting donors and collecting, processing, and distributing the milk. In addition, some states have required standards for donor human milk banks. However, the Food and Drug Administration (FDA), states that "the FDA has not been involved in establishing these voluntary guidelines or state standards." Some of these protocols are described below. According to a joint statement by the World Health Organization (WHO) and United Nations Children's Fund (UNICEF): "The best food for a baby who cannot be breastfed is milk expressed from the mother's breast or from another healthy mother. The best food for any baby whose own mother's milk is not available is the breastmilk of another healthy mother" (UNICEF, p. 48). "Where it is not possible for the biological mother to breast feed, the first alternative, if available, should be the use of human milk from other sources. Human milk banks should be made available in appropriate situations" (Wight, 2001). History The Canadian Nurse described in 1939 how nurses at the Royal Victoria Montreal Maternity Hospital travelled to Boston to learn from the successful programme at the Directory for Mother's Milk, Inc., set up by Dr Fritz Talbot. It was "a miniature dairy with all modern appliances". The quick freezing of fractions of an ounce of breastmilk had been perfected earlier that decade by researchers at Borden Labs. The women recruited were paid by the ounce, and visit
https://en.wikipedia.org/wiki/Libellula
Libellula is a genus of dragonflies, commonly called skimmers, in the family Libellulidae, distributed throughout the temperate zone of the Northern Hemisphere. Most species are found in the United States, where they are the best-known large dragonflies, often seen flying over freshwater ponds in summer. Many have showy wing patterns. Overview The taxa Ladona (corporals) and Plathemis (whitetails) have been considered as synonyms of Libellula, subgenera, or separate genera by different authorities. Recent phylogenetic analysis has supported their status as either subgenera or full genera. Species List of species. Extant species Ladona Plathemis Fossils Libellula brodieri† Libellula calypso† Libellula doris † Libellula eusebioi† Libellula kieseli† Libellula martini† Libellula melobasis† Libellula pannewitziana† Libellula perse† Libellula sieboldiana† Libellula thetis† Libellula thoe† Libellula ukrainensis†
https://en.wikipedia.org/wiki/Radicidation
Radicidation is a specific case of food irradiation where the dose of ionizing radiation applied to the food is sufficient to reduce the number of viable specific non-spore-forming pathogenic bacteria to such a level that none are detectable when the treated food is examined by any recognized method. The required dose is in the range of 2 – 8 kGy. The term may also be applied to the destruction of parasites such as tapeworm and trichina in meat, in which case the required dose is in the range of 0.1 – 1 kGy. When the process is used specifically for destroying enteropathogenic and enterotoxinogenic organisms belonging to the genus Salmonella, it is referred to as Salmonella radicidation. The term Radicidation is derived from radiation and 'caedere' (Latin for fell, cut, kill). See also Radappertization Radurization
https://en.wikipedia.org/wiki/Radappertization
Radappertization is a form of food irradiation which applies a dose of ionizing radiation sufficient to reduce the number and activity of viable microorganisms to such an extent that very few, if any, are detectable in the treated food by any recognized method (viruses being excepted). No microbial spoilage or toxicity should become detectable in a food so treated, regardless of the conditions under which it is stored, provided the packaging remains undamaged. The required dose is usually in the range of 25-45 kiloGrays. The shelf life of radappertized foods correctly packaged will mainly depend on the service life of the packaging material and its barrier properties. Radappertization is derived from the combination of radiation and Appert, the name of the French scientist and engineer who invented sterilized food for the troops of Napoleon. See also Radicidation Radurization
https://en.wikipedia.org/wiki/ILoo
The iLoo (short for Internet loo) was a cancelled Microsoft project to develop a Wi-Fi Internet-enabled portable toilet. The iLoo, which was to debut at British summer festivals, was described as being a portable toilet with wireless broadband Internet, an adjustable plasma screen, a membrane wireless keyboard, a six-channel speaker system, and toilet paper embossed with popular web site addresses. The iLoo was also to have an extra screen and keyboard on the outside, and was to be guarded. It was intended as the next in a series of successful initiatives by MSN UK which sought to introduce the internet in unusual locations, including MSN Street, MSN Park Bench and MSN Deckchair. The project was announced by MSN UK on April 30, 2003, and was widely ridiculed before being declared a hoax by Microsoft on May 12. On May 13, another Microsoft press release stated that although the project had not been a hoax, it had been cancelled because it would do little to promote the MSN brand. There has since been speculation as to whether the project was cancelled for fear of being sued by Andrew Cubitt, who had invented the similarly named product "i-Loo". The iLoo was described as a public relations "debacle" by Online Journalism Review. Comparable to the iLoo, the Chaos Computer Club's so-called "Datenklo" (German, in English "data loo") uses mobile toilet stalls as network distribution centers at Chaos Communication Camps. However, the use as a toilet is not intended. Description The iLoo was supposedly designed to be a Wi-Fi Internet-enabled portable toilet that would allow users to surf the internet while using the loo. Internally, the facility would have a broadband connection via wireless 802.11b, a wireless waterproof keyboard, a swivel plasma screen running Windows XP Professional, a 6-channel surround-sound system beneath the sink, toilet paper embossed with popular URLs, and a suction toilet. Externally, the facility would feature an MSN logo and have a "Hotmail st
https://en.wikipedia.org/wiki/Cantor%20cube
In mathematics, a Cantor cube is a topological group of the form {0, 1}A for some index set A. Its algebraic and topological structures are the group direct product and product topology over the cyclic group of order 2 (which is itself given the discrete topology). If A is a countably infinite set, the corresponding Cantor cube is a Cantor space. Cantor cubes are special among compact groups because every compact group is a continuous image of one, although usually not a homomorphic image. (The literature can be unclear, so for safety, assume all spaces are Hausdorff.) Topologically, any Cantor cube is: homogeneous; compact; zero-dimensional; AE(0), an absolute extensor for compact zero-dimensional spaces. (Every map from a closed subset of such a space into a Cantor cube extends to the whole space.) By a theorem of Schepin, these four properties characterize Cantor cubes; any space satisfying the properties is homeomorphic to a Cantor cube. In fact, every AE(0) space is the continuous image of a Cantor cube, and with some effort one can prove that every compact group is AE(0). It follows that every zero-dimensional compact group is homeomorphic to a Cantor cube, and every compact group is a continuous image of a Cantor cube.
https://en.wikipedia.org/wiki/Iliac%20crest
The crest of the ilium (or iliac crest) is the superior border of the wing of ilium and the superiolateral margin of the greater pelvis. Structure The iliac crest stretches posteriorly from the anterior superior iliac spine (ASIS) to the posterior superior iliac spine (PSIS). Behind the ASIS, it divides into an outer and inner lip separated by the intermediate zone. The outer lip bulges laterally into the iliac tubercle. Palpable in its entire length, the crest is convex superiorly but is sinuously curved, being concave inward in front, concave outward behind. It is thinner at the center than at the extremities. Development The iliac crest is derived from endochondral bone. Function To the external lip are attached the Tensor fasciae latae, Obliquus externus abdominis, and Latissimus dorsi, and along its whole length the fascia lata; to the intermediate line, the Obliquus internus abdominis. To the internal lip, the iliac fascia, the Transversus abdominis, Quadratus lumborum, Sacrospinalis, and Iliacus. Abdominal external oblique muscle Abdominal internal oblique muscle Transversus abdominis muscle Quadratus lumborum muscle Erector spinae Iliocostalis pars lumborum Longissimus pars thoracis Latissimus dorsi Tensor fasciae latae Iliacus muscle Fascia lata Iliac fascia Transverse fascia Clinical significance The iliac crest has a large amount of red bone marrow, and thus it is the site of bone marrow harvests (from both sides) to collect the stem cells used in bone marrow transplantation. The iliac crest is also considered the most ideal donor site for bone grafting when a large quantity of bone is needed. For example, oral and maxillofacial surgeons will often use iliac crest bone to fill in large osseous defects of the oral cavity caused by severe periodontal disease, excess bone resorption following tooth loss, trauma, or congenital defects including alveolar clefts. The top of the iliac crests also marks the level of the fourth lumbar ver
https://en.wikipedia.org/wiki/Tijdeman%27s%20theorem
In number theory, Tijdeman's theorem states that there are at most a finite number of consecutive powers. Stated another way, the set of solutions in integers x, y, n, m of the exponential diophantine equation for exponents n and m greater than one, is finite. History The theorem was proven by Dutch number theorist Robert Tijdeman in 1976, making use of Baker's method in transcendental number theory to give an effective upper bound for x,y,m,n. Michel Langevin computed a value of exp exp exp exp 730 for the bound. Tijdeman's theorem provided a strong impetus towards the eventual proof of Catalan's conjecture by Preda Mihăilescu. Mihăilescu's theorem states that there is only one member to the set of consecutive power pairs, namely 9=8+1. Generalized Tijdeman problem That the powers are consecutive is essential to Tijdeman's proof; if we replace the difference of 1 by any other difference k and ask for the number of solutions of with n and m greater than one we have an unsolved problem, called the generalized Tijdeman problem. It is conjectured that this set also will be finite. This would follow from a yet stronger conjecture of Subbayya Sivasankaranarayana Pillai (1931), see Catalan's conjecture, stating that the equation only has a finite number of solutions. The truth of Pillai's conjecture, in turn, would follow from the truth of the abc conjecture.
https://en.wikipedia.org/wiki/Petrosquamous%20sinus
The petrosquamous sinus is a fetal vein that generally disappears by birth and, when present, runs backward along the junction of the squama and petrous portion of the temporal, and opens into the transverse sinus.
https://en.wikipedia.org/wiki/Superior%20cerebral%20veins
The superior cerebral veins are several cerebral veins that drain the superolateral and superomedial surfaces of the cerebral hemispheres into the superior sagittal sinus. There are 8-12 cerebral veins. They are predominantly found in the sulci between the gyri, but can also be found running across the gyri. Anatomy Fate The superior cerebral veins drain into the superior sagittal sinus individually. The anterior veins run at near right angles to the sinus while the posterior and larger veins are directed at oblique angles, opening into the sinus in a direction opposed to the current (anterior to posterior) of the blood contained within it. Additional images
https://en.wikipedia.org/wiki/Internal%20auditory%20veins
The veins of the vestibule and semicircular canals accompany the arteries, and, receiving those of the cochlea at the base of the modiolus, unite to form the internal auditory veins (or veins of labyrinth) which end in the posterior part of the superior petrosal sinus or in the transverse sinus.
https://en.wikipedia.org/wiki/Transcranial%20direct-current%20stimulation
Transcranial direct current stimulation (tDCS) is a form of neuromodulation that uses constant, low direct current delivered via electrodes on the head. It was originally developed to help patients with brain injuries or neuropsychiatric conditions such as major depressive disorder. It can be contrasted with cranial electrotherapy stimulation, which generally uses alternating current the same way, as well as transcranial magnetic stimulation. Research shows increasing evidence for tDCS as a treatment for depression. There is mixed evidence about whether tDCS is useful for cognitive enhancement in healthy people. There is no strong evidence that tDCS is useful for memory deficits in Parkinson's disease and Alzheimer's disease, non-neuropathic pain, nor for improving arm or leg functioning and muscle strength in people recovering from a stroke. There is emerging supportive evidence for tDCS in the management of schizophreniaespecially for negative symptoms. Efficacy Depression In 2015, the British National Institute for Health and Care Excellence (NICE) found tDCS to be a safe and effective treatment modality for depression, though further investigation was needed. Since then, several studies and meta-analyses have demonstrated tDCS to be a safe and effective treatment for depression. A meta-analysis published in 2020 found moderate- to high-quality evidence for tDCS as a treatment for depression with only low to moderate clinical efficacy. Active tDCS was significantly superior to sham for response (30.9% vs. 18.9% respectively), remission (19.9% vs. 11.7%) and depression improvement. According to a 2016 meta analysis published in the British Journal of Psychiatry, 34% of tDCS-treated patients showed at least 50% symptom reduction (compared to 19% placebo) across 6 randomised controlled trials. Other medical use Recent research on tDCS has shown promising results in treating other mental health conditions such as anxiety and PTSD. More research is required on
https://en.wikipedia.org/wiki/Subcostal%20nerve
The subcostal nerve (anterior division of the twelfth thoracic nerve) is a mixed motor and sensory nerve contributing to the lumbar plexus. It runs along the lower border of the twelfth rib, often gives a communicating branch to the first lumbar nerve, and passes under the lateral lumbocostal arch. It then runs in front of the quadratus lumborum, innervates the transversus, and passes forward between it and the abdominal internal oblique to be distributed in the same manner as the lower intercostal nerves. It communicates with the iliohypogastric nerve and the ilioinguinal nerve of the lumbar plexus, and gives a branch to the pyramidalis muscle and the quadratus lumborum muscle. It also gives off a lateral cutaneous branch that supplies sensory innervation to the skin over the hip. Additional images See also Subcostal artery Subcostal vein
https://en.wikipedia.org/wiki/Subcostal%20arteries
The subcostal arteries, so named because they lie below the last ribs, constitute the lowest pair of branches derived from the thoracic aorta, and are in series with the intercostal arteries. Anatomy Course and relations Each intercostal artery is accompanied by the corresponding (i.e. ipsilateral) subcostal vein and nerve. Each passes along the lower border of the 12th rib. Before entering the anterior abdominal wall, each runs laterally upon the anterior surface of the lumbar fascia (and thus also anterior to the underlying quadratus lumborum muscle which the lumbar fascia envelops) posterior to the ipsilateral kidney. It then pierces the posterior aponeurosis of the transversus abdominis, thus entering the anterior abdominal wall to course in between the abdominal internal oblique muscle and transverse abdominal muscle (the neurovascular plane of the anterior abdominal wall). Branches Each subcostal artery gives off a posterior branch which has a similar distribution to the posterior ramus of an intercostal artery. Anastomoses It anastomoses with the superior epigastric, lower intercostal, and lumbar arteries.
https://en.wikipedia.org/wiki/%27t%20Hooft%20symbol
The t Hooft symbol is a collection of numbers which allows one to express the generators of the SU(2) Lie algebra in terms of the generators of Lorentz algebra. The symbol is a blend between the Kronecker delta and the Levi-Civita symbol. It was introduced by Gerard 't Hooft. It is used in the construction of the BPST instanton. Definition is the 't Hooft symbol: Where and are instances of the Kronecker delta, and is the Levi-Civita symbol. In other words, they are defined by () where the latter are the anti-self-dual 't Hooft symbols. Matrix Form In matrix form, the 't Hooft symbols are and their anti-self-duals are the following: Properties They satisfy the self-duality and the anti-self-duality properties: Some other properties are The same holds for except for and Obviously due to different duality properties. Many properties of these are tabulated in the appendix of 't Hooft's paper and also in the article by Belitsky et al. See also Instanton 't Hooft anomaly 't Hooft–Polyakov monopole 't Hooft loop
https://en.wikipedia.org/wiki/Lateral%20arcuate%20ligament
The lateral arcuate ligament (also lateral lumbocostal arch and external arcuate ligament) is a ligament under the diaphragm that arches across the upper part of the quadratus lumborum muscle. It is traversed by the subcostal nerve, artery and vein. Structure The lateral arcuate ligament runs from the front of the transverse process of the first lumbar vertebra, and, laterally, to the tip and lower margin of the twelfth rib. It forms an arch over the quadratus lumborum muscle. Variations The lateral arcuate ligament is commonly described in anatomy textbooks as attaching at the first lumbar vertebra (L1). However, other instances have been found in cadaver studies with attachments at either the second (L2) or third (L3) lumbar vertebra. In around 5% of people, inferolateral extensions of the lateral arcuate ligaments, such as thickened nodular areas, are found adjacent to the lateral diaphragmatic surface which can be visualized with computed tomography (CT) scans. History The lateral arcuate ligaments were described by Galen, as early as AD 177. This was found in his animal dissections performed as part of his Rome lectures, collected in De Anatomicus Administrationibus. See also Medial arcuate ligament Median arcuate ligament
https://en.wikipedia.org/wiki/Medial%20arcuate%20ligament
The medial arcuate ligament (also medial lumbocostal arch and internal arcuate ligament) is a tendinous fascia that arches over the psoas major muscle as it passes posterior the diaphragm. Structure The medial arcuate ligament is an arch in the fascia covering the upper part of the psoas major. It is attached to the side of the body of the first or second lumbar vertebra, laterally, it is fixed to the front of the transverse process of the first and, sometimes also, to that of the second lumbar vertebra. It lies between the lateral arcuate ligament and the midline median arcuate ligament. The sympathetic chain enters the abdomen by passing deep into this ligament of the diaphragm. This is in contrast to the parasympathetic Vagus nerve which passes through the esophageal hiatus. See also Lateral arcuate ligament Median arcuate ligament
https://en.wikipedia.org/wiki/BPST%20instanton
In theoretical physics, the BPST instanton is the instanton with winding number 1 found by Alexander Belavin, Alexander Polyakov, Albert Schwarz and Yu. S. Tyupkin. It is a classical solution to the equations of motion of SU(2) Yang–Mills theory in Euclidean space-time (i.e. after Wick rotation), meaning it describes a transition between two different topological vacua of the theory. It was originally hoped to open the path to solving the problem of confinement, especially since Polyakov had proven in 1987 that instantons are the cause of confinement in three-dimensional compact-QED. This hope was not realized, however. Description The instanton The BPST instanton is an essentially non-perturbative classical solution of the Yang–Mills field equations. It is found when minimizing the Yang–Mills SU(2) Lagrangian density: with Fμνa = ∂μAνa – ∂νAμa + gεabcAμbAνc the field strength. The instanton is a solution with finite action, so that Fμν must go to zero at space-time infinity, meaning that Aμ goes to a pure gauge configuration. Space-time infinity of our four-dimensional world is S3. The gauge group SU(2) has exactly the same structure, so the solutions with Aμ pure gauge at infinity are mappings from S3 onto itself. These mappings can be labelled by an integer number q, the Pontryagin index (or winding number). Instantons have q = 1 and thus correspond (at infinity) to gauge transformations which cannot be continuously deformed to unity. The BPST solution is thus topologically stable. It can be shown that self-dual configurations obeying the relation Fμνa = ± ½ εμναβ Fαβa minimize the action. Solutions with a plus sign are called instantons, those with the minus sign are anti-instantons. Instantons and anti-instantons can be shown to minimise the action locally as follows: , where . The first term is minimised by self-dual or anti-self-dual configurations, whereas the last term is a total derivative and therefore depends only on the boundary (i.e. ) of the so
https://en.wikipedia.org/wiki/Pubic%20crest
Medial to the pubic tubercle is the pubic crest, which extends from this process to the medial end of the pubic bone. It gives attachment to the conjoint tendon, the rectus abdominis, the abdominal external oblique muscle, and the pyramidalis muscle. The point of junction of the crest with the medial border of the bone is called the angle to it, as well as to the symphysis, the superior crus of the subcutaneous inguinal ring is attached.
https://en.wikipedia.org/wiki/Gottesman%E2%80%93Knill%20theorem
In quantum computing, the Gottesman–Knill theorem is a theoretical result by Daniel Gottesman and Emanuel Knill that states that stabilizer circuits, circuits that only consist of gates from the normalizer of the qubit Pauli group, also called Clifford group, can be perfectly simulated in polynomial time on a probabilistic classical computer. The Clifford group can be generated solely by using CNOT, Hadamard, and phase gate S; and therefore stabilizer circuits can be constructed using only these gates. The reason for the speed up of quantum computers is not yet fully understood. The theorem proves that, for all quantum algorithms with a speed up that relies on entanglement which can be achieved with a CNOT and a Hadamard gate to produce entangled states, this kind of entanglement alone does not give any computing advantage. There exists a more efficient simulation of stabilizer circuits than the construction of the original publication with an implementation. The Gottesman–Knill theorem was published in a single author paper by Gottesman in which he credits Knill with the result through private communication. Formal statement Theorem: A quantum circuit using only the following elements can be simulated efficiently on a classical computer: Preparation of qubits in computational basis states, Clifford gates (Hadamard gates, controlled NOT gates, phase gate S ), and Measurements in the computational basis. The Gottesman–Knill theorem shows that even some highly entangled states can be simulated efficiently. Several important types of quantum algorithms use only Clifford gates, most importantly the standard algorithms for entanglement distillation and for quantum error correction. From a practical point of view, stabilizer circuits have been simulated in time using the graph state formalism. See also Magic state distillation
https://en.wikipedia.org/wiki/Fascia%20of%20Scarpa
The fascia of Scarpa is the deep membranous layer (stratum membranosum) of the superficial fascia of the abdomen. It is a layer of the anterior abdominal wall. It is found deep to the fascia of Camper and superficial to the external oblique muscle. Structure It is thinner and more membranous in character than the superficial fascia of Camper, and contains a considerable quantity of orange elastic fibers. It is loosely connected by areolar tissue to the aponeurosis of the external oblique muscle, but in the midline it is more intimately adherent to the linea alba and the pubic symphysis, and is prolonged on to the dorsum of the penis, forming the fundiform ligament; above, it is continuous with the superficial fascia over the rest of the trunk; inferiorly, it is continuous with the fascia of Colles of the perineum; however, it does not extend into the thigh as it just attaches to its fascia, which is known as fascia lata; medially and below, it is continued over the penis and spermatic cord to the scrotum, where it helps to form the dartos. From the scrotum it may be traced backward into continuity with the deep layer of the superficial fascia of the perineum (superficial perineal fascia or fascia of Colles). In the female, it is continued into the labia majora and from there to the fascia of Colles. History It is named for Italian anatomist Antonio Scarpa. His description of the membranous superficial fascia is vague in his 1809 hernia monograph. Life-size illustrations included by Scarpa do not identify the layer even though some show all the other anatomical layers of the abdominal wall in the inguinal region. A probable description of the fascia is in the text which discusses femoral (called crural) hernia in the male. Scarpa describes that "below the skin" we find "a layer of condensed substance forming the second covering of the hernia" which adheres to "the aponeurosis of the fascia lata". A little later he describes this layer as being membranous and he
https://en.wikipedia.org/wiki/Fascia%20of%20Camper
The fascia of Camper is a thick superficial layer of the anterior abdominal wall. It is areolar in texture, and contains in its meshes a varying quantity of adipose tissue. It is found superficial to the fascia of Scarpa. Structure Superficial fascia is composed of two layers: the fatty outer layer, known as Camper's fascia, and the more membranous inner layer, called Scarpa's fascia. These parts of the superficial fascia are most prominent in the lower aspect of the abdominal wall below the level of the umbilicus. Camper's fascia is continuous inferiorly with the superficial fascia of the thigh. Medial and inferior to the pubic tubercle, in the male, Scarpa's fascia changes as it continues over the scrotum and forms Dartos tunic. This layer is highly infiltrated by elastic and smooth muscle fibers and contains a minimal amount of fat. Scarpa's fascia ends inferior to the inguinal ligament fusing with the fascia lata of the thigh. In the midline, just superior to the penis, Scarpa's fascia contributes to formation of the fundiform ligament of the penis. As Scarpa's fascia continues posteriorly onto the perineum, it is called Colles' fascia. . History The structure was named after Dutch physician and anatomist Petrus Camper.
https://en.wikipedia.org/wiki/Hopf%20conjecture
In mathematics, Hopf conjecture may refer to one of several conjectural statements from differential geometry and topology attributed to Heinz Hopf. Positively or negatively curved Riemannian manifolds The Hopf conjecture is an open problem in global Riemannian geometry. It goes back to questions of Heinz Hopf from 1931. A modern formulation is: A compact, even-dimensional Riemannian manifold with positive sectional curvature has positive Euler characteristic. A compact, (2d)-dimensional Riemannian manifold with negative sectional curvature has Euler characteristic of sign . For surfaces, these statements follow from the Gauss–Bonnet theorem. For four-dimensional manifolds, this follows from the finiteness of the fundamental group and Poincaré duality and Euler–Poincaré formula equating for 4-manifolds the Euler characteristic with and Synge's theorem, assuring that the orientation cover is simply connected, so that the Betti numbers vanish . For 4-manifolds, the statement also follows from the Chern–Gauss–Bonnet theorem as noticed by John Milnor in 1955 (written down by Shiing-Shen Chern in 1955.). For manifolds of dimension 6 or higher the conjecture is open. An example of Robert Geroch had shown that the Chern–Gauss–Bonnet integrand can become negative for . The positive curvature case is known to hold however for hypersurfaces in (Hopf) or codimension two surfaces embedded in . For sufficiently pinched positive curvature manifolds, the Hopf conjecture (in the positive curvature case) follows from the sphere theorem, a theorem which had also been conjectured first by Hopf. One of the lines of attacks is by looking for manifolds with more symmetry. It is particular for example that all known manifolds of positive sectional curvature allow for an isometric circle action. The corresponding vector field is called a killing vector field. The conjecture (for the positive curvature case) has also been proved for manifolds of dimension or admitting an isometr
https://en.wikipedia.org/wiki/Care-of%20address
A care-of address (usually referred to as CoA) is a temporary IP address for a mobile device used in Internet routing. This allows a home agent to forward messages to the mobile device. A separate address is required because the IP address of the device that is used as host identification is topologically incorrect—it does not match the network of attachment. The care-of address splits the dual nature of an IP address, that is, its use is to identify the host and the location within the global IP network. Address assignment The care-of address can be acquired by the mobile node in two different ways: Foreign agent care-of address (FACoA): The mobile node receives the same CoA as the foreign agent. All mobile nodes in the foreign network are given the same CoA. Co-located care-of address: Each mobile node in the foreign network is assigned its own CoA, usually by a DHCP server. This might happen in a network where the foreign agent has not been deployed yet. Given the imminent IPv4 address exhaustion, the first solution is more frequently chosen, because it does not waste a public IP address for every mobile node when changing network location, as the collocated CoA does. The care-of address has to be a valid IP address within the foreign network, so that it allows the mobile node to receive and make connections with any host in the outside. To send outgoing packets, the mobile node may as well use its home address but, since it is not a connected IP address for the current network attachment, some routers in the way might prevent the packets from reaching the destination. That is why, in IPv4, the outgoing information is transported to the home agent (which is in the home network) by means of an IP tunnel. From the Home Network, the packets of the Mobile Node can be sent using its original Home Address, without any routing problem. The Correspondent Node will send its information again to the Home Network. Thus, it has to be sent on through the tunnel to the
https://en.wikipedia.org/wiki/Oppenheim%20conjecture
In Diophantine approximation, the Oppenheim conjecture concerns representations of numbers by real quadratic forms in several variables. It was formulated in 1929 by Alexander Oppenheim and later the conjectured property was further strengthened by Harold Davenport and Oppenheim. Initial research on this problem took the number n of variables to be large, and applied a version of the Hardy-Littlewood circle method. The definitive work of Margulis, settling the conjecture in the affirmative, used methods arising from ergodic theory and the study of discrete subgroups of semisimple Lie groups. Overview Meyer's theorem states that an indefinite integral quadratic form Q in n variables, n ≥ 5, nontrivially represents zero, i.e. there exists a non-zero vector x with integer components such that Q(x) = 0. The Oppenheim conjecture can be viewed as an analogue of this statement for forms Q that are not multiples of a rational form. It states that in this case, the set of values of Q on integer vectors is a dense subset of the real line. History Several versions of the conjecture were formulated by Oppenheim and Harold Davenport. Let Q be a real nondegenerate indefinite quadratic form in n variables. Suppose that n ≥ 3 and Q is not a multiple of a form with rational coefficients. Then for any ε > 0 there exists a non-zero vector x with integer components such that |Q(x)| < ε. For n ≥ 5 this was conjectured by Oppenheim in 1929; the stronger version is due to Davenport in 1946. Let Q and n have the same meaning as before. Then for any ε > 0 there exists a non-zero vector x with integer components such that 0 < |Q(x, x)| < ε. This was conjectured by Oppenheim in 1953 and proved by Birch, Davenport, and Ridout for n at least 21, and by Davenport and Heilbronn for diagonal forms in five variables. Other partial results are due to Oppenheim (for forms in four variables, but under the strong restriction that the form represents zero over Z), Watson, Iwaniec, Baker–Schli