source
stringlengths 31
227
| text
stringlengths 9
2k
|
---|---|
https://en.wikipedia.org/wiki/Viral%20quasispecies
|
A viral quasispecies is a population structure of viruses with a large number of variant genomes (related by mutations). Quasispecies result from high mutation rates as mutants arise continually and change in relative frequency as viral replication and selection proceeds.
The theory predicts that a viral quasispecies at a low but evolutionarily neutral and highly connected (that is, flat) region in the fitness landscape will outcompete a quasispecies located at a higher but narrower fitness peak in which the surrounding mutants are unfit. This phenomenon has been called 'the quasispecies effect' or, more recently, the 'survival of the flattest'.
The term quasispecies was adopted from a theory of the origin of life in which primitive replicons consisted of mutant distributions, as found experimentally with present-day RNA viruses within their host. The theory provided a new definition of wild type when describing viruses, and a conceptual framework for a deeper understanding of the adaptive potential of RNA viruses than is offered by classical studies based on simplified consensus sequences.
The quasispecies model is most applicable when the genome size is limited and the mutation rate is high, and so is most relevant to RNA viruses (including important pathogens) because they have high mutation rates (approx one error per round of replication), though the concepts can apply to other biological entities such as reverse transcribing DNA viruses like hepatitis B. In such scenarios, complex distributions of closely related variant genomes are subjected to genetic variation, competition and selection, and may act as a unit of selection. Therefore, the evolutionary trajectory of the viral infection cannot be predicted solely from the characteristics of the fittest sequence. High mutation rates also place an upper limit compatible with inheritable information. Crossing such a limit leads to RNA virus extinction, a transition that is the basis of an antiviral design term
|
https://en.wikipedia.org/wiki/Apple%20TV
|
Apple TV is a digital media player and microconsole developed and marketed by Apple Inc. It is a small network appliance hardware that sends received media data such as video and audio to a television set or external display. Its media services include streaming media, TV Everywhere-based services, local media sources, and sports journalism and broadcasts.
Second-generation and later models function only when connected via HDMI to an enhanced-definition or high-definition widescreen television. Since the fourth-generation model, Apple TV runs tvOS with multiple pre-installed apps. In November 2019, Apple released Apple TV+ and Apple TV app a la carte.
Apple TV lacks integrated controls and can only be controlled remotely, either through an Apple Remote, Siri Remote, iOS device, or some third-party infrared remotes.
Background
In 1993, Apple released the Macintosh TV in an attempt to enter the home-entertainment industry. The device had a 14-inch CRT screen and a TV tuner card. It was not a commercial success, with only 10,000 sold before its discontinuation in 1994. That year, the company developed the Apple Interactive Television Box, a collaboration with BT Group and Proximus Group that was never released to the public. Apple's final major attempt before the Apple TV was the Apple Pippin in 1990s, a combination home game console and networked computer.
Models
First generation
At a September 2006 Apple special event, Apple announced the first-generation Apple TV. It was originally announced as "iTV" to fit into their "i"-based product naming convention, but was renamed "Apple TV" before launch due to a trademark dispute with British broadcasting network ITV, which threatened legal action against Apple. Pre-orders began in January 2007 and it was released in March 2007. It is based on a Pentium M processor and ran a variant of Mac OS X Tiger, and included a 40 GB hard disk for storing content. It supported output up to 720p on HDTVs via HDMI, and supported
|
https://en.wikipedia.org/wiki/Haploview
|
Haploview is a commonly used bioinformatics software which is designed to analyze and visualize patterns of linkage disequilibrium (LD) in genetic data. Haploview can also perform association studies, choosing tagSNPs and estimating haplotype frequencies. Haploview is developed and maintained by Dr. Mark Daly's lab at the MIT/Harvard Broad Institute.
Haploview currently supports the following functionalities:
LD & haplotype block analysis
Haplotype population frequency estimation
Single SNP and haplotype association tests
Permutation testing for association significance
Implementation of Paul de Bakker's Tagger tag SNP selection algorithm
Automatic download of phased genotype data from HapMap
Visualization and plotting of PLINK whole genome association results including advanced filtering options
|
https://en.wikipedia.org/wiki/Interaction%20information
|
The interaction information is a generalization of the mutual information for more than two variables.
There are many names for interaction information, including amount of information, information correlation, co-information, and simply mutual information. Interaction information expresses the amount of information (redundancy or synergy) bound up in a set of variables, beyond that which is present in any subset of those variables. Unlike the mutual information, the interaction information can be either positive or negative. These functions, their negativity and minima have a direct interpretation in algebraic topology.
Definition
The conditional mutual information can be used to inductively define the interaction information for any finite number of variables as follows:
where
Some authors define the interaction information differently, by swapping the two terms being subtracted in the preceding equation. This has the effect of reversing the sign for an odd number of variables.
For three variables , the interaction information is given by
where is the mutual information between variables and , and is the conditional mutual information between variables and given . The interaction information is symmetric, so it does not matter which variable is conditioned on. This is easy to see when the interaction information is written in terms of entropy and joint entropy, as follows:
In general, for the set of variables , the interaction information can be written in the following form (compare with Kirkwood approximation):
For three variables, the interaction information measures the influence of a variable on the amount of information shared between and . Because the term can be larger than , the interaction information can be negative as well as positive. This will happen, for example, when and are independent but not conditionally independent given . Positive interaction information indicates that variable inhibits (i.e., accounts for or explains so
|
https://en.wikipedia.org/wiki/Closed%20system%20%28control%20theory%29
|
The terms closed system and open system have long been defined in the widely (and long before any sort of amplifier was invented) established subject of thermodynamics, in terms that have nothing to do with the concepts of feedback and feedforward. The terms 'feedforward' and 'feedback' arose first in the 1920s in the theory of amplifier design, more recently than the thermodynamic terms. Negative feedback was eventually patented by H.S Black in 1934. In thermodynamics, an open system is one that can take in and give out ponderable matter. In thermodynamics, a closed system is one that cannot take in or give out ponderable matter, but may be able to take in or give out radiation and heat and work or any form of energy. In thermodynamics, a closed system can be further restricted, by being 'isolated': an isolated system cannot take in nor give out either ponderable matter or any form of energy. It does not make sense to try to use these well established terms to try to distinguish the presence or absence of feedback in a control system.
The theory of control systems leaves room for systems with both feedforward pathways and feedback elements or pathways. The terms 'feedforward' and 'feedback' refer to elements or paths within a system, not to a system as a whole. THE input to the system comes from outside it, as energy from the signal source by way of some possibly leaky or noisy path. Part of the output of a system can be compounded, with the intermediacy of a feedback path, in some way such as addition or subtraction, with a signal derived from the system input, to form a 'return balance signal' that is input to a PART of the system to form a feedback loop within the system. (It is not correct to say that part of the output of a system can be used as THE input to the system.)
There can be feedforward paths within the system in parallel with one or more of the feedback loops of the system so that the system output is a compound of the outputs of the feedback loops
|
https://en.wikipedia.org/wiki/Extended%20finite-state%20machine
|
In a conventional finite state machine, the transition is associated with a set of input Boolean conditions and a set of output Boolean functions. In an extended finite state machine (EFSM) model, the transition can be expressed by an “if statement” consisting of a set of trigger conditions. If trigger conditions are all satisfied, the transition is fired, bringing the machine from the current state to the next state and performing the specified data operations.
Definition
An EFSM is defined as a 7-tuple where
S is a set of symbolic states,
I is a set of input symbols,
O is a set of output symbols,
D is an n-dimensional linear space ,
F is a set of enabling functions ,
U is a set of update functions ,
T is a transition relation,
Structure
EFSM Architecture: An EFSM model consists of the following three major combinational blocks (and a few registers).
FSM-block: A conventional finite state machine realizing the state transition graphs of the EFSM model.
A-block: an arithmetic block for performing the data operation associated with each transition. The operation of this block is regulated by the output signals of the FSM block.
E-block: A block for evaluating the trigger conditions associated with each transition. The input signals to this block are the data variables, while the output is a set of binary signals taken for input by the FSM-block. Information about redundant computation is extracted by analyzing the interactions among the three basic blocks. Using this information, certain input operands of the arithmetic block and evaluation block can be frozen through input gating under specific run time conditions to reduce the unnecessary switching in the design. At the architecture level, if each trigger evaluation & data operation is regarded as an atomic action, then the EFSM implies an almost lowest-power implementation.
The cycle behavior of an EFSM can be divided into three steps:
In E-block, evaluate all trigger conditions.
In FSM-block,
|
https://en.wikipedia.org/wiki/Ignicoccus
|
Ignicoccus is a genus of hyperthermophillic Archaea living in marine hydrothermal vents. They were discovered in samples taken at the Kolbeinsey Ridge north of Iceland, as well as at the East Pacific Rise (at 9 degrees N, 104 degrees W) in 2000.
Systematics
According to the comparisons of 16S rRNA genes, Ignicoccus represents a new, deeply branching lineage within the family of the Desulfurococcaceae.
Three species are known: I. islandicus, I. pacificus and I. hospitalis strain KIN4I.
Cell structure
The archaea of the genus Ignicoccus have tiny coccoid cells with a diameter of about 2 µm, that exhibit a smooth surface, an outer membrane and no S-layer.
They have a previously unknown cell envelope structure—a cytoplasmic membrane, a periplasmic space (with a variable width of 20 to 400 nm, containing membrane-bound vesicles), and an outer membrane (approximately 10 nm wide, resembling the outer membrane of gram-negative bacteria). The latter contains numerous tightly, irregularly packed single particles (about 8 nm in diameter) and pores with a diameter of 24 nm, surrounded by tiny particles, arranged in a ring (with a diameter of 130 nm) and clusters of up to eight particles 12 nm in diameter each.
The two layers of membrane previously reported are actually a type of endomembrane system consisting of cytoplasmic protrusions. In I. hospitalis, these structures harbor the endosymbiotic archaeon Nanoarchaeum equitans.
Physiology
Ignicocci live in a temperature range of 70–98 °C (optimum around 90 °C). They gain energy by reduction of elemental sulfur to hydrogen sulfide using molecular hydrogen as the electron donor. A unique symbiosis with (or parasitism by) Nanoarchaeum equitans has also been reported.
Phylogeny
The currently accepted taxonomy is based on the List of Prokaryotic names with Standing in Nomenclature (LPSN) and National Center for Biotechnology Information (NCBI)
See also
List of Archaea genera
|
https://en.wikipedia.org/wiki/Arthur%20F.%20Griffith
|
Arthur Frederick Griffith (30 July 1880 – 25 December 1911) was a calculating prodigy born July 30, 1880, in Milford, Kosciusko County, Indiana. He could count to 40,000 by age five. An illness at age seven resulted in epilepsy and prevented him from attending school until age 10. At age 12, he began to develop calculating short cuts. He dropped out of school at age 17, but continued to study numbers and practice mental calculation on his own.
At age 19, he met Dr. Ernest Hiram Lindley, who invited Arthur to Indiana University to be studied in the psychology laboratory which had been established in 1892 by Dr. William Lowe Bryan. Bryan and Lindley took Arthur to the American Psychological Association meeting at Yale in December 1899, where he exhibited his skills and the I.U. professors presented a paper about their research of Arthur's case. William Lowe Bryan, in 1900, presented a similar paper at the meeting of the International Congress of Psychology in Paris.
Arthur Griffith left Indiana University after five months, wrote a book of his methods, entitled The Easy and Speedy Reckoner, and toured the vaudeville circuit until his death, allegedly of a stroke, in a Springfield, Massachusetts hotel room at age 31 on Christmas Day, 1911.
|
https://en.wikipedia.org/wiki/Hatch%20mark
|
Hatch marks (also called hash marks or tick marks) are a form of mathematical notation. They are used in three ways as:
Unit and value marks — as on a ruler or number line
Congruence notation in geometry — as on a geometric figure
Graphed points — as on a graph
Hatch marks are frequently used as an abbreviation of some common units of measurement. In regard to distance, a single hatch mark indicates feet, and two hatch marks indicate inches. In regard to time, a single hatch mark indicates minutes, and two hatch marks indicate seconds.
In geometry and trigonometry, such marks are used following an elevated circle to indicate degrees, minutes, and seconds —
Hatch marks can probably be traced to hatching in art works, where the pattern of the hatch marks represents a unique tone or hue. Different patterns indicate different tones.
Unit and value marks
Unit-and-value hatch marks are short vertical line segments which mark distances. They are seen on rulers and number lines. The marks are parallel to each other in an evenly-spaced manner.
The distance between adjacent marks is one unit. Longer line segments are used for integers and natural numbers. Shorter line segments are used for fractions.
Hatch marks provide a visual clue as to the value of specific points on the number line, even if some hatch marks are not labeled with a number.
Hatch marks are typically seen in number theory and geometry.
<----|----|----|----|----|----|----|----|----|----|----|----|----|----|---->
-3 -2 -1 0 1 2 3
Congruency notation
In geometry, hatch marks are used to denote equal measures of angles, arcs, line segments, or other elements.
Hatch marks for congruence notation are in the style of tally marks or of Roman numerals – with some qualifications. These marks are without serifs, and some patterns are not used. For example, the numbers I, II, III, V, and X are used, but IV and VI are not used, since a rotation of
|
https://en.wikipedia.org/wiki/Persillade
|
Persillade () is a sauce or seasoning mixture of parsley () chopped together with seasonings including garlic, herbs, oil, and vinegar.
In its simplest form, just parsley and garlic, it is a common ingredient in many dishes, part of a sauté cook's mise en place. If added early in cooking, it becomes mellow, but when it is added at the end of cooking or as a garnish, it provides a garlicky jolt. It is extensively used in French and French-influenced cuisines, as well as in Cajun, Louisiana Creole, and Québécois cuisines.
A classic French and Quebec bistro dish is pommes persillade, cubed potatoes fried in a small amount of oil, with persillade added at the end of the cooking, and can sometimes be combined with Quebec poutine to produce a hybrid dish called poutine persillade. Persillade is also popular in Louisiana; New Orleans chef Austin Leslie's signature dish was fried chicken with persillade.
Variations
There are many variations, either adding other ingredients or substituting other herbs, such as bay leaf, oregano, basil, or tarragon, for the parsley. Combined with bread crumbs, it is used as crust for roasted veal or lamb chops. The addition of lemon zest creates gremolata, a traditional garnish for braised lamb shanks. Anchovy is a common addition in Provençal cooking. A small amount of olive oil is often added to persillade to make it easier to use.
See also
Gremolata
Chimichurri
Green sauce
List of garlic dishes
Pesto
Pistou
|
https://en.wikipedia.org/wiki/Heinz%20mean
|
In mathematics, the Heinz mean (named after E. Heinz) of two non-negative real numbers A and B, was defined by Bhatia as:
with 0 ≤ x ≤ .
For different values of x, this Heinz mean interpolates between the arithmetic (x = 0) and geometric (x = 1/2) means such that for 0 < x < :
The Heinz means appear naturally when symmetrizing
-divergences.
It may also be defined in the same way for positive semidefinite matrices, and satisfies a similar interpolation formula.
See also
Mean
Muirhead's inequality
Inequality of arithmetic and geometric means
|
https://en.wikipedia.org/wiki/Royal%20Air%20Force%20roundels
|
The air forces of the United Kingdom – the Royal Navy's Fleet Air Arm, the Army's Army Air Corps and the Royal Air Force use a roundel, a circular identification mark, painted on aircraft to identify them to other aircraft and ground forces. In one form or another, it has been used on British military aircraft from 1915 to the present.
Background
When the First World War started in 1914 it was the habit of ground troops to fire on all aircraft, friend or foe, so that the need for some form of identification mark became evident. At first the Union Flag was painted under the wings and on the sides of the fuselage. It soon became obvious that at a distance the St George's Cross of the Union Flag was likely to be confused with the Iron Cross that was already being used to identify German aircraft. After the use of a Union Flag inside a shield was tried it was decided to follow the lead of the French who used a tricolour cockade (a roundel of red and white with a blue centre). The British reversed the colours and it became the standard marking on Royal Flying Corps aircraft from 11 December 1914, although it was well into 1915 before the new marking was used with complete consistency.
The official order stated:
The Royal Naval Air Service specified in A.I.D. SK. No. A78 a five-foot red ring with a white centre and a thin white outline on the lower surfaces of the lower wings at mid span, from October 1914 until it was decided to standardise on the RFC roundel for all British military aircraft in June 1915.
With the same roundel being carried by RFC and RNAS aircraft, the use of the Union Jack was discontinued. The Royal Flying Corps and its successor the Royal Air Force have employed numerous versions of the roundel since then.
By 1917, a thin white outline was usually added to the roundel, to make the blue of the outer circle easier to distinguish from the dark PC.10 and PC.12 protective doping. On squadrons operating at night there was not the same need to make th
|
https://en.wikipedia.org/wiki/Sybase%20iAnywhere
|
Sybase iAnywhere, is a subsidiary of Sybase specializing in mobile computing, management and security and enterprise database software. SQL Anywhere, formerly known as SQL Anywhere Studio or Adaptive Server Anywhere (ASA), is the company's flagship relational database management system (RDBMS). SQL Anywhere powers popular applications such as Intuit, Inc.'s QuickBooks, and the devices of 140,000 census workers during the 2010 United States Census. The product's customers include Brinks, Kodak, Pepsi Bottling Group (PBG), MICROS Systems, Inc. and the United States Navy. In August 2008.
Sybase iAnywhere mobility products include Sybase Unwired Platform. a platform for mobile enterprise application development. It combines tooling and integration with standard development environments. Afaria provides mobile device management and security capabilities to ensure that mobile data and devices are up-to-date, reliable and secure. Afaria is currently being used by Novartis and United Utilities among others. iAnywhere Mobile Office, formerly known as OneBridge, is specifically designed to securely extend email and business processes to wireless devices.
RFID Anywhere, is a software platform designed to simplify radio frequency identification (RFID) projects, including the development, deployment and management of highly distributed, multi-site networks. Through the 2006 acquisition of Extended Systems, Inc., Sybase iAnywhere is now providing wireless connectivity, device management and data synchronization software. Its software development kits (SDKs) for Bluetooth, IrDA, OMA (Open Mobile Alliance) Device Management and OMA Data Synchronization protocols are used by cellphone and automobile manufacturers worldwide in Original Equipment Manufacturer (OEM) and Original Design Manufacturer (ODM) applications. XTNDConnect PC, available for OEM/ODM applications, as well as for direct purchase, is a software application based on this technology that helps millions of consume
|
https://en.wikipedia.org/wiki/Small%20intensely%20fluorescent%20cell
|
Small intensely fluorescent cells (SIF cells) are the interneurons of the sympathetic ganglia (postganglionic neurons) of the Sympathetic division of the autonomic nervous system (ANS). The neurotransmitter for these cells is dopamine. They are a neural crest derivative and share a common sympathoadrenal precursor cell with sympathetic neurons and chromaffin cells (adrenal medulla).
Although an autonomic ganglion is the site where pregangllonlc fibers synapse on postganglionic neurons, the presence of small interneurons has been recognized. These cells exhibit catecholamine fluorescence and are referred to as small intensely fluorescent (SIF) cells. In some ganglia, these intemeurons receive preganglionic cholinergic fibers and may modulate ganglionic transmission. In other ganglia, they receive collateral branches and may serve some Integrative function. Many SIF cells contain dopamine, which Is thought to be their transmitter.
External links
https://shop.lww.com/Snell-s-Clinical-Neuroanatomy/p/9781496346759
Cell biology
Autonomic nervous system
|
https://en.wikipedia.org/wiki/High-dimensional%20model%20representation
|
High-dimensional model representation is a finite expansion for a given multivariable function. The expansion was first described by Ilya M. Sobol as
The method, used to determine the right hand side functions, is given in Sobol's paper. A review can be found here: High Dimensional Model Representation (HDMR): Concepts and Applications.
The underlying logic behind the HDMR is to express all variable interactions in a system in a hierarchical order. For instance represents the mean response of the model . It can be considered as measuring what is left from the model after stripping down all variable effects. The uni-variate functions , however represents the "individual" contributions of the variables. For instance, is the portion of the model that can be controlled only by the variable . For this reason, there can not be any constant in because all constants are expressed in . Going further into higher interactions,the next stop is bivariate functions which represents the cooperative effect of variables and together. Similar logic applies here: the bivariate functions do not contain univarite functions nor constants as it violates the construction logic of HDMR. As we go into higher interactions, the number of interactions are increasing and at last we reach the residual term representing the contribution only if all variable act together.
HDMR as an Approximation
The hierarchical representation model of HDMR brings an advantage if one needs to replace an existing model with a simpler one usually containing only univariate or bivariate terms. If the target model does not contain higher level of variable interactions, this approach can yield good approximations with the additional advantage of providing a clearer view of variable interactions.
See also
Variance-based sensitivity analysis
Volterra series
|
https://en.wikipedia.org/wiki/Phono%20input
|
Phono input is a set of input jacks, usually mini jacks or RCA connectors, located on the rear panel of a preamp, mixer or amplifier, especially on early radio sets, to which a phonograph or turntable is attached.
Modern phono cartridges give a very low level output signal of the order of a few millivolts which the circuitry amplifies and equalizes. Phonograph recordings are made with high frequencies boosted and the low frequencies attenuated: during playback the frequency response changes are reversed. This reduces background noise, including clicks or pops, and also conserves the amount of physical space needed for each groove, by reducing the size of the larger low-frequency undulations. This is accomplished in the amplifier with a phono input that incorporates standardized RIAA equalization circuitry.
Through at least the 1980s, the phono input was widely available on consumer stereo equipment—even some larger boomboxes had them. By the 2000s only very sophisticated and expensive stereo receivers retained the phono input, since most users were expected to use digital music formats such as CD or satellite radio. Some newer low-cost turntables include built-in amplifiers to produce line-level (one volt) outputs; devices are available that perform this conversion for use with computers; or older amplifiers or radio receivers can be used. Nearly all DJ mixers have two or more phono inputs, together with two or more one-volt line inputs that also use RCA connectors.
This "phono input" designed for the millivolt signal from an unamplified turntable should not be confused with the modern standard one-volt line input and output that also uses RCA connectors and is found on video cameras, recorders and similar modern equipment.
|
https://en.wikipedia.org/wiki/Autler%E2%80%93Townes%20effect
|
In spectroscopy, the Autler–Townes effect (also known as AC Stark effect), is a dynamical Stark effect corresponding to the case when an oscillating electric field (e.g., that of a laser) is tuned in resonance (or close) to the transition frequency of a given spectral line, and resulting in a change of the shape of the absorption/emission spectra of that spectral line. The AC Stark effect was discovered in 1955 by American physicists Stanley Autler and Charles Townes.
It is the AC equivalent of the static Stark effect which splits the spectral lines of atoms and molecules in a constant electric field. Compared to its DC counterpart, the AC Stark effect is computationally more complex.
While generally referring to atomic spectral shifts due to AC fields at any (single) frequency, the effect is more pronounced when the field frequency is close to that of a natural atomic or molecular dipole transition. In this case, the alternating field has the effect of splitting the two bare transition states into doublets or "dressed states" that are separated by the Rabi frequency. Alternatively, this can be described as a Rabi oscillation between the bare states which are no longer eigenstates of the atom–field Hamiltonian. The resulting fluorescence spectrum is known as a Mollow triplet.
The AC Stark splitting is integral to several phenomena in quantum optics, such as electromagnetically induced transparency and Sisyphus cooling. Vacuum Rabi oscillations have also been described as a manifestation of the AC Stark effect from atomic coupling to the vacuum field.
History
The AC Stark effect was discovered in 1955 by American physicists Stanley Autler and Charles Townes while at Columbia University and Lincoln Labs at the Massachusetts Institute of Technology. Before the availability of lasers, the AC Stark effect was observed with radio frequency sources. Autler and Townes' original observation of the effect used a radio frequency source tuned to 12.78 and 38.28 MHz, corr
|
https://en.wikipedia.org/wiki/Alphabet%20pasta
|
Alphabet pasta, also referred to as alfabeto and alphabetti spaghetti in the UK, is a pasta that has been mechanically cut or pressed into the letters of the alphabet. It is often served in an alphabet soup, sold in a can of condensed broth. Another variation, Alphagetti, consists of letter-shaped pasta in a marinara or spaghetti sauce.
It is not clear who invented alphabet soup, when or why. As early as 1877, Paris grocers sold "...small bits of macaroni, for use in soup, which are stamped with... the letters of the alphabet." and Paris restaurants served "...delicious soups made of macaroni or vermicelli cut up into the shape of letters of the alphabet..." In 1883, The Chicago Herald Cooking School cookbook provide a recipe for soup calling for a small pasta such as "alphabet pastes of the same material as macaroni stamped in letters". In January 1900 it was on the menu at New York City's Au Lion d'Or. In 1908, Wilbur Wright was served alphabet soup in Le Mans, France.
Also unclear is whether the soup or the linguistic term for an overabundance of acronyms or abbreviations came first; food historian Janet Clarkson notes that "the first reference I have found so far to the metaphorical alphabet soup also occurs in 1883, in a quotation by the originator of Life magazine, John Ames Mitchell, referring to teaching his son the alphabet soup (the ABCs) of business."
One common American brand of condensed-style alphabet soup is the Campbell's brand. This soup, like its competitors, is marketed towards parents for its educational value.
A similar product, Alphabetti Spaghetti, was sold by the H. J. Heinz Company for 60 years before being discontinued in 1990. Like Campbell's alphabet soup, it contains alphabet pasta canned in tomato sauce. It was later reintroduced by Heinz in 2005.
See also
Alpha-Bits
List of pasta
List of pasta dishes
SpaghettiOs
|
https://en.wikipedia.org/wiki/Shift%20register%20lookup%20table
|
A shift register lookup table, also shift register LUT or SRL, refers to a component in digital circuitry. It is essentially a shift register of variable length. The length of SRL is set by driving address pins high or low and can be changed dynamically, if necessary.
The SRL component is used in FPGA devices.
The SRL can be used as a programmable delay element.
See also
Lookup table
Shift register
|
https://en.wikipedia.org/wiki/Cascaded%20integrator%E2%80%93comb%20filter
|
In digital signal processing, a cascaded integrator–comb (CIC) is a computationally efficient class of low-pass finite impulse response (FIR) filter that chains N number of integrator and comb filter pairs (where N is the filter's order) to form a decimator or interpolator. In a decimating CIC, the input signal is first fed through N integrator stages, followed by a down-sampler, and then N comb stages. An interpolating CIC (e.g. Figure 1) has the reverse order of this architecture, but with the down-sampler replaced with a zero-stuffer (up-sampler).
Operation
CIC filters were invented by Eugene B. Hogenauer in 1979 (published in 1981), and are a class of FIR filters used in multi-rate digital signal processing.
Unlike most FIR filters, it has a down-sampler or up-sampler in the middle of the structure, which converts between the high sampling rate of used by the integrator stages and the low sampling rate of used by the comb stages.
Transfer function
At the high sampling rate of a CIC's transfer function in the z-domain is:
where:
is the decimation or interpolation ratio,
is the number of samples per stage (usually 1 but sometimes 2), and
is the order: the number of comb-integrator pairs.
The numerator comes from multiplying negative feedforward comb stages (each is simply multiplication by in the z-domain).
The denominator comes from multiplying integrator stages (each is simply multiplication by in the z-domain).
Integrator–comb is simple moving average
An integrator–comb filter is an efficient implementation of a simple 1-order moving-average FIR filter, with division by omitted. To see this, consider how a simple moving average filter can be implemented recursively by adding the newest sample to the previous result and subtracting the oldest sample
The second equality corresponds to a comb filter that gets integrated
Cascaded integrator–comb yields higher-order moving average
Higher-order CIC structures are obtained by cascading ide
|
https://en.wikipedia.org/wiki/Charge%20trap%20flash
|
Charge trap flash (CTF) is a semiconductor memory technology used in creating non-volatile NOR and NAND flash memory. It is a type of floating-gate MOSFET memory technology, but differs from the conventional floating-gate technology in that it uses a silicon nitride film to store electrons rather than the doped polycrystalline silicon typical of a floating-gate structure. This approach allows memory manufacturers to reduce manufacturing costs five ways:
Fewer process steps are required to form a charge storage node
Smaller process geometries can be used (therefore reducing chip size and cost)
Multiple bits can be stored on a single flash memory cell
Improved reliability
Higher yield since the charge trap is less susceptible to point defects in the tunnel oxide layer
While the charge-trapping concept was around earlier, it wasn't until 2002 that AMD and Fujitsu produced high-volume charge-trapping flash memory. They began the commercial production of charge-trapping flash memory with the introduction of the GL NOR flash memory family. The same business, now operating under the Spansion name, has produced charge trapping devices in high volume since that time. Charge trapping flash accounted for 30% of 2008's $2.5 billion NOR flash market. Saifun Semiconductors, who licensed a large charge trapping technology portfolio to several companies, was acquired by Spansion in March 2008. From the late 2000s, CTF became a core component of 3D V-NAND flash memory developed by Toshiba and Samsung Electronics.
Origins
The original MOSFET (metal–oxide–semiconductor field-effect transistor, or MOS transistor) was invented by Egyptian engineer Mohamed M. Atalla and Korean engineer Dawon Kahng at Bell Labs in 1959, and demonstrated in 1960. Kahng went on to invent the floating-gate MOSFET with Simon Min Sze at Bell Labs, and they proposed its use as a floating-gate (FG) memory cell, in 1967. This was the first form of non-volatile memory based on the injection and storage of
|
https://en.wikipedia.org/wiki/Application%20streaming
|
Application streaming is a form of on-demand software distribution. In these scenarios, only essential portions of an application's code need to be installed on the computer: while the end user performs actions in the application, the necessary code and files are delivered over the network as and when they are required.
Application streaming is a related concept to application virtualization, where applications are run directly from a virtual machine on a central server that is completely separate from the local system. By contrast, application streaming runs the program locally, but still involves the centralized storage of application code.
Stream server
An application is packaged and stored on a streaming server. Packaging or sequencing produces an image of the application in a way that orders delivery or predicatively optimizes delivery to the client.
Launch and streaming of application
The initial launch of an application would be important for the end user and the Packaging process might be optimized to achieve this. Once launched, common functions would be followed. As these functions are requested by the end user, these may be streamed in a similar manner. In this case the client is pulling the application from the stream server. Otherwise, the full application might be delivered from the server to the client in the background. In this case, the server pushes the application to the client.
Advantages
The concept of application streaming carries several major advantages over traditional software distribution: given the complexity of modern applications, many functions are never or seldom used, and pulling the application on demand is more efficient in terms of server, client and network usage; streaming also allows for applications to be cached on the local system and still run in a traditional manner; updates can also be deployed automatically to the cached application files.
Vendor-specific implementations
Android
2015 app streaming experiment
In 20
|
https://en.wikipedia.org/wiki/440%20%28number%29
|
440 (four hundred [and] forty) is the natural number following 439 and preceding 441.
In mathematics
440 has the factorization
440 is:
Even
The sum of the first 17 prime numbers
A harshad number
An abundant number
A happy number
|
https://en.wikipedia.org/wiki/Land%20cover
|
Land cover is the physical material at the surface of Earth. Land covers include grass, asphalt, trees, bare ground, water, etc. Earth cover is the expression used by ecologist Frederick Edward Clements that has its closest modern equivalent being vegetation. The expression continues to be used by the United States Bureau of Land Management.
There are two primary methods for capturing information on land cover: field survey, and analysis of remotely sensed imagery. Land change models can be built from these types of data to assess changes in land cover over time.
One of the major land cover issues (as with all natural resource inventories) is that every survey defines similarly named categories in different ways. For instance, there are many definitions of "forest"—sometimes within the same organisation—that may or may not incorporate a number of different forest features (e.g., stand height, canopy cover, strip width, inclusion of grasses, and rates of growth for timber production). Areas without trees may be classified as forest cover "if the intention is to re-plant" (UK and Ireland), while areas with many trees may not be labelled as forest "if the trees are not growing fast enough" (Norway and Finland).
Distinction from "land use"
"Land cover" is distinct from "land use", despite the two terms often being used interchangeably. Land use is a description of how people utilize the land and of socio-economic activity. Urban and agricultural land uses are two of the most commonly known land use classes. At any one point or place, there may be multiple and alternate land uses, the specification of which may have a political dimension. The origins of the "land cover/land use" couplet and the implications of their confusion are discussed in Fisher et al. (2005).
Types
Following table is Land Cover statistics by Food and Agriculture Organization (FAO) with 14 classes.
Mapping
Land cover change detection using remote sensing and geospatial data provides baselin
|
https://en.wikipedia.org/wiki/Incurred%20but%20not%20reported
|
In insurance, incurred but not reported (IBNR) claims is the amount owed by an insurer to all valid claimants who have had a covered loss but have not yet reported it. Since the insurer knows neither how many of these losses have occurred, nor the severity of each loss, IBNR is necessarily an estimate. The sum of IBNR losses plus reported losses yields an estimate of the total eventual liabilities the insurer will cover, known as ultimate losses.
IBNR and IBNER
The term "IBNR" is sometimes ambiguous, as it is not always clear whether it includes development on reported claims.
Pure IBNR refers to only unreported claims, not any development on reported claims.
Incurred but not enough reported (IBNER), in contrast, refers to development on reported claims. For example, when a claim is first reported, a $100 payment might be made, and a $900 case reserve might be established, for a total initial reported amount of $1000. However, the claim may later settle for a larger amount, resulting in $2000 of payments from the insurer to the claimant before the claim is closed. The estimated amount of this future development on reported claims is known as IBNER.
In some cases, the term "IBNR" refers only to pure IBNR; in other case, it is understood to be the sum of pure IBNR and IBNER.
Methods of estimation
Actuarial loss reserving methods including the chain-ladder method, Bornhuetter–Ferguson method, expected claims technique, and others are used to estimate IBNR and, hence, ultimate losses. Since the implementation of Solvency II, stochastic claims reserving methods have become more common.
See also
Loss reserving
Actuarial science
|
https://en.wikipedia.org/wiki/RAD%20Group
|
The RAD Group consists of a number of independent companies that develop, manufacture and market solutions for diverse segments of the networking and telecommunications industry. Each company operates independently, without a holding company, but is guided by the group founders under a collective strategic umbrella. Companies share technology, engage in joint marketing activities and benefit from a common management structure.
Four RAD Group companies are traded on NASDAQ in the U.S.:
Ceragon Networks, Radware, RADCOM, and Silicom. The others are privately held by the Group's founders and several venture capital firms.
History
The RAD Group was founded by brothers Yehuda (born 1942) and Zohar (1949-2023) Zisapel, in Tel Aviv, Israel. Both brothers studied electrical engineering at the Technion – Israel Institute of Technology. Yehuda started his career in the 1960s working for Motorola Israel but in 1973 decided to start his own business importing and distributing computer networking equipment, a company called Bitcom. Later Yehuda parted company with his initial business partner and started a new company, Bynet. The company's main business was distributing Codex Corporation products, and the company soon became a market leader in Israel. In 1977 Codex Corporation was acquired by Motorola, but due to its success Bynet maintain the distribution rights for its products; however in 1981 Motorola decided not to renew the distribution agreement with Bynet, and Codex Corporation began to sell in Israel directly.
The experience of losing the distribution rights of Codex made Yehuda realize that his business should never rely on one product line, and in 1981 he asked his brother, Zohar, to join him at Bynet to start working on the development of their products. They started a new company in a corner of the Bynet offices and gave it the name RAD Data Communications, RAD being the acronym of Research And Development.
RAD's first successful product was a miniature (by 198
|
https://en.wikipedia.org/wiki/Systems%20Biology%20Ontology
|
The Systems Biology Ontology (SBO) is a set of controlled, relational vocabularies of terms commonly used in systems biology, and in particular in computational modeling.
Motivation
The rise of Systems Biology, seeking to comprehend biological processes as a whole, highlighted the need to not only develop corresponding quantitative models, but also to create standards allowing their exchange and integration. This concern drove the community to design common data formats, such as SBML and CellML. SBML is now largely accepted and used in the field. However, as important as the definition of a common syntax is, it is also necessary to make clear the semantics of models. SBO is an attempt to provide the means of annotating models with terms that indicate the intended semantics of an important subset of models in common use in computational systems biology. The development of SBO was first discussed at the 9th SBML Forum Meeting in Heidelberg Oct. 14–15, 2004. During the forum, Pedro Mendes mentioned that modellers possessed a lot of knowledge that was necessary to understand the model, and more importantly to simulate it, but this knowledge was not encoded in SBML. Nicolas Le Novère proposed to create a controlled vocabulary to store the content of Pedro Mendes' mind before he wandered out of the community. The development of the ontology was announced more officially in a message from Le Novère to Michael Hucka and Andrew Finney on October 19.
Structure
SBO is currently made up of seven different vocabularies:
systems description parameter (catalytic constant, thermodynamic temperature...)
participant role (substrate, product, catalyst...)
modelling framework (discrete, continuous...)
mathematical expression (mass-action rate law, Hill-type rate law...)
occurring entity representation (biochemical process, molecular or genetic interaction...)
physical entity representation (transporter, physical compartment, observable...)
metadata representation (annota
|
https://en.wikipedia.org/wiki/Saphenous%20nerve
|
The saphenous nerve (long or internal saphenous nerve) is the largest cutaneous branch of the femoral nerve. It is derived from the lumbar plexus (L3-L4). It is a strictly sensory nerve, and has no motor function. It commences in the proximal (upper) thigh and travels along the adductor canal. Upon exiting the adductor canal, the saphenous nerve terminates by splitting into two terminal branches: the sartorial nerve, and the infrapatellar nerve (which together innervate the medial, anteromedial, posteromedial aspects of the distal thigh). The saphenous nerve is responsible for providing sensory innervation to the skin of the anteromedial leg.
Structure
It is purely a sensory nerve.
Origin
The saphenous nerve is the largest and terminal branch of the femoral nerve. It is derived from the lumbar plexus (L3-L4).
Course
Shortly after the femoral nerve passes under the inguinal ligament, it splits into anterior and posterior divisions by the passage of the lateral femoral circumflex artery (a branch of the profunda femoris artery). The posterior division then gives off the saphenous nerve as it converges with the femoral artery where it passes beneath the sartorius muscle. The saphenous nerve lies in front of the femoral artery, behind the aponeurotic covering of the adductor canal, as far as the opening in the lower part of the adductor magnus muscle. There it diverges from the artery, and emerges from behind the lower edge of the aponeurotic covering of the canal. It descends vertically along the medial side of the knee behind the sartorius muscle, pierces the fascia lata, between the tendons of the sartorius muscle and gracilis muscle. It becomes subcutaneous around 10 cm above the medial epicondyle of the femur.
The nerve then passes along the tibial side of the leg, accompanied by the great saphenous vein. It descends behind the medial border of the tibia, and, at the lower third of the leg, divides into two branches:
one continues its course along the marg
|
https://en.wikipedia.org/wiki/Queuine
|
Queuine () (Q) is a hypermodified nucleobase found in the first (or wobble) position of the anticodon of tRNAs specific for Asn, Asp, His, and Tyr, in most eukaryotes and prokaryotes. Because it is utilized by all eukaryotes but produced exclusively by bacteria, it is a putative vitamin.
The nucleoside of queuine is queuosine. Queuine is not found in the tRNA of archaea; however, a related 7-deazaguanine derivative, the nucleoside of which is archaeosine, occurs in different tRNA position, the dihydrouridine loop, and in tRNAs with more specificities.
History and naming
In 1967, it was discovered that the four above-mentioned tRNAs contained an as-yet unknown nucleoside, which was designated "Nucleoside Q". This name remained in use throughout much of the work to characterize the compound, after which it was proposed that its common name should be based on the sound of the letter Q—thus producing "queuine" by analogy to guanine and other nucleobases, and "queuosine" by analogy to guanosine and other nucleosides.
Biosynthesis and function
The presence of queuine in certain tRNA is a nearly ubiquitous feature of eukaryotic life, meaning it is found in every healthy cell of the human body. It is also found in all other animals, plants, and fungi. The only known exception is brewer's yeast, Saccharomyces cerevisiae. However, queuosine can be produced only by bacteria; higher organisms must obtain queuine from the diet, or salvage it from symbiotic microbes: a process for which dedicated enzymatic machinery exists. Because queuine is necessary for healthy cellular function in animals, but is produced exclusively by microbes, it can be considered a vitamin, akin to the B vitamins—many which are also produced primarily or exclusively by bacteria.
The biosynthesis pathway for queuine shares a common enzymatic starting step with folate. Because queuosine in dietary or gut-bacterial RNA can be salvaged and converted to queuine by the human body, queuosine could be consid
|
https://en.wikipedia.org/wiki/CDC%20SCOPE
|
SCOPE (Supervisory Control of Program Execution) is a series of Control Data Corporation batch operating systems developed in the 1960s.
Variants
SCOPE for the CDC 3000 series
SCOPE for the CDC 6000 series
SCOPE and SCOPE-2 for the CDC 7600/Cyber-76
SCOPE for the CDC 3000 series
SCOPE for the CDC 6000 series
This operating system was based on the original Chippewa Operating System. In the early 1970s, it was renamed NOS/BE for the CDC Cyber machines. The SCOPE operating system is a file-oriented system using mass storage, random access devices. It was designed to make use of all capabilities of CDC 6000 computer systems and exploits fully the multiple-operating modes of all segments of the computer. Main tasks of SCOPE are controlling job execution, storage assignment, performing segment and overlay loading. Its features include comprehensive input/output functions and library maintenance routines. The operating system chronologically records all jobs run and any problems encountered. To aid debugging, dumps and memory maps are available.
Description
SCOPE is a multiprogramming operating system capable of running up to eight jobs, called control points, at one time. One control point is used for system functions. Later versions increased this limit to 15.
SCOPE runs on the 6x00's peripheral processors (PPs). "A central processor (CP)… is completely within the power of every PP at all times." One PP, identified as PP0 runs the Monitor Program (MTR) "that oversees or controls all other activities." PP9 is assigned to control the system console typewriter and displays. The other PPs perform input/output functions as directed by MTR.
A portion of the central processor's memory (called central memory, or CM) the Central Memory Resident (CMR) "is reserved for various system tables accessible by the PPs.” Part of this CMR is a communications area for each PP. Each communications area contains an "input register" and an "output register", followed by a message buf
|
https://en.wikipedia.org/wiki/Significant%20wave%20height
|
In physical oceanography, the significant wave height (SWH, HTSGW or Hs)
is defined traditionally as the mean wave height (trough to crest) of the highest third of the waves (H1/3). It is usually defined as four times the standard deviation of the surface elevation – or equivalently as four times the square root of the zeroth-order moment (area) of the wave spectrum. The symbol Hm0 is usually used for that latter definition. The significant wave height (Hs) may thus refer to Hm0 or H1/3; the difference in magnitude between the two definitions is only a few percent.
SWH is used to characterize sea state, including winds and swell.
Origin and definition
The original definition resulted from work by the oceanographer Walter Munk during World War II. The significant wave height was intended to mathematically express the height estimated by a "trained observer". It is commonly used as a measure of the height of ocean waves.
Time domain definition
Significant wave height H1/3, or Hs or Hsig, as determined in the time domain, directly from the time series of the surface elevation, is defined as the average height of that one-third of the N measured waves having the greatest heights: where Hm represents the individual wave heights, sorted into descending order of height as m increases from 1 to N. Only the highest one-third is used, since this corresponds best with visual observations of experienced mariners, whose vision apparently focuses on the higher waves.
Frequency domain definition
Significant wave height Hm0, defined in the frequency domain, is used both for measured and forecasted wave variance spectra. Most easily, it is defined in terms of the variance m0 or standard deviation ση of the surface elevation: where m0, the zeroth-moment of the variance spectrum, is obtained by integration of the variance spectrum. In case of a measurement, the standard deviation ση is the easiest and most accurate statistic to be used.
Another wave-height statistic in common u
|
https://en.wikipedia.org/wiki/Comparability%20graph
|
In graph theory, a comparability graph is an undirected graph that connects pairs of elements that are comparable to each other in a partial order. Comparability graphs have also been called transitively orientable graphs, partially orderable graphs, containment graphs, and divisor graphs.
An incomparability graph is an undirected graph that connects pairs of elements that are not comparable to each other in a partial order.
Definitions and characterization
For any strict partially ordered set , the comparability graph of is the graph of which the vertices are the elements of and the edges are those pairs of elements such that . That is, for a partially ordered set, take the directed acyclic graph, apply transitive closure, and remove orientation.
Equivalently, a comparability graph is a graph that has a transitive orientation, an assignment of directions to the edges of the graph (i.e. an orientation of the graph) such that the adjacency relation of the resulting directed graph is transitive: whenever there exist directed edges and , there must exist an edge .
One can represent any finite partial order as a family of sets, such that in the partial order whenever the set corresponding to is a subset of the set corresponding to . In this way, comparability graphs can be shown to be equivalent to containment graphs of set families; that is, a graph with a vertex for each set in the family and an edge between two sets whenever one is a subset of the other.
Alternatively, one can represent the partial order by a family of integers, such that whenever the integer corresponding to is a divisor of the integer corresponding to . Because of this construction, comparability graphs have also been called divisor graphs.
Comparability graphs can be characterized as the graphs such that, for every generalized cycle (see below) of odd length, one can find an edge connecting two vertices that are at distance two in the cycle. Such an edge is called a triangular chor
|
https://en.wikipedia.org/wiki/MSI%20Barcode
|
MSI (also known as Modified Plessey) is a barcode symbology developed by the MSI Data Corporation, based on the original Plessey Code symbology. It is a continuous symbology that is not self-checking. MSI is used primarily for inventory control, marking storage containers and shelves in warehouse environments.
Character set and binary lookup
The MSI bar code represents only digits 0–9; it does not support letters or symbols.
Each digit is converted to 4 binary-coded decimal bits. Then a 1 bit is prepended and two 0 bits are appended.
Finally, each bit is printed as a bar/space pair totalling three modules wide. A 0 bit is represented as 1/3 bar followed by 2/3 space, while a 1 bit is represented as 2/3 bar followed by 1/3 space.
Binary mapping
Each digit and guard character is represented by a binary number, as shown in the table below.
To produce a barcode image from this map, one simply must consider the digit 1 to be a black bar and the digit 0 to be a white bar and produce an image accordingly.
Check digit calculation
The MSI barcode uses one of five possible schemes for calculating a check digit:
No check digit (least common)
Mod 10 (most common)
Mod 11
Mod 1010
Mod 1110
Mod 10 Check Digit
When using the Mod 10 check digit algorithm, a string to be encoded 1234567 will be printed with a check digit of 4:
12345674
The Mod 10 check digit algorithm
uses the Luhn algorithm.
Mod 11 Check Digit
1. Reverse the string to be encoded (in this case 1234567).
Let S be the reverse of the string to be encoded
S = 7654321
2. The string is then "weighted" using a repeating weighting factor pattern. There are two modulo 11 algorithms which use different repeated weighting factor patterns: the IBM algorithm which uses (2,3,4,5,6,7), and the NCR algorithm which uses (2,3,4,5,6,7,8,9). Get the sum of the string by looping through each character and multiply it by a weight from 2 to 7 (IBM) or 2 to 9 (NCR) depending on its position. If the weight's value
|
https://en.wikipedia.org/wiki/Centro%20Brasileiro%20de%20Pesquisas%20F%C3%ADsicas
|
The Brazilian Center for Research in Physics (, CBPF) is a physics research center in the Urca neighborhood of Rio de Janeiro sponsored by the Brazilian National Council for Scientific and Technological Development (CNPq), linked to the Ministry of Science and Technology. CBPF was founded in 1949 from a joint effort of Cesar Lattes, José Leite Lopes, and Jayme Tiomno. Throughout its existence, CBPF became an internationally renowned research institution, organizing several international meetings and hosting many renowned physicists, like Richard Feynman and J. Robert Oppenheimer. It was also the starting point of important Brazilian institutions, like the National Institute for Pure and Applied Mathematics (IMPA), the National Laboratory for Scientific Computation (LNCC) and the National Laboratory of Synchrotron Light (LNLS). Since its creation, CBPF has been one of the most important Physics research institutions in Brazil, and its graduate program ranks among the best in the country.
See also
Maria Laura Moura Mouzinho Leite Lopes
External links
Official CBPF Homepage
Research institutes in Brazil
Physics research institutes
|
https://en.wikipedia.org/wiki/M.%20S.%20Narasimhan
|
Mudumbai Seshachalu Narasimhan (7 June 1932 – 15 May 2021) was an Indian mathematician. His focus areas included number theory, algebraic geometry, representation theory, and partial differential equations. He was a pioneer in the study of moduli spaces of holomorphic vector bundles on projective varieties. His work is considered the foundation for Kobayashi–Hitchin correspondence that links differential geometry and algebraic geometry of vector bundles over complex manifolds. He was also known for his collaboration with mathematician C. S. Seshadri, for their proof of the Narasimhan–Seshadri theorem which proved the necessary conditions for stable vector bundles on a Riemann surface.
He was a recipient of the Padma Bhushan, India's third highest civilian honor, in 1990, and the Ordre national du Mérite from France in 1989. He was an elected Fellow of the Royal Society, London. He was also the recipient of Shanti Swarup Bhatnagar Prize in 1975 and was the only Indian to receive the King Faisal International Prize in the field of science.
Early life
Narasimhan was born on 7 June 1932 into a rural family in Tandarai in present day Tamil Nadu, as the eldest among five children. His family hailed from the North Arcot district. After his early education in rural part of the country, he joined Loyola College in Madras for his undergraduate education. Here he studied under Father Charles Racine, a French Jesuit professor, who in turn had studied under the French mathematician and geometer Élie Cartan. He joined the Tata Institute of Fundamental Research (TIFR), Bombay, for his graduate studies in 1953. He obtained his Ph.D. from the University of Mumbai in 1960 where his advisor was the mathematician K. S. Chandrasekharan, who was known for his work on number theory.
Career
Narasimhan started his career in 1960 when he joined the faculty of the Tata Institute of Fundamental Research (TIFR); he later went on to become an honorary fellow. His areas of focus while at TI
|
https://en.wikipedia.org/wiki/Noxious%20weed
|
A noxious weed, harmful weed or injurious weed is a weed that has been designated by an agricultural or other governing authority as a plant that is injurious to agricultural or horticultural crops, natural habitats or ecosystems, or humans or livestock. Most noxious weeds have been introduced into an ecosystem by ignorance, mismanagement, or accident. Some noxious weeds are native. Typically they are plants that grow aggressively, multiply quickly without natural controls (native herbivores, soil chemistry, etc.), and display adverse effects through contact or ingestion. Noxious weeds are a large problem in many parts of the world, greatly affecting areas of agriculture, forest management, nature reserves, parks and other open space.
Many noxious weeds have come to new regions and countries through contaminated shipments of feed and crop seeds or were intentionally introduced as ornamental plants for horticultural use.
Some "noxious weeds", such as ragwort, produce copious amounts of nectar, valuable for the survival of bees and other pollinators, or other advantages like larval host foods and habitats. In the USA, wild parsnip Pastinaca sativa, for instance, provides large tubular stems that some bee species hibernate in, larval food for two different swallowtail butterflies, and other beneficial qualities.
Types
Some noxious weeds are harmful or poisonous to humans, domesticated grazing animals, and wildlife. Open fields and grazing pastures with disturbed soils and open sunlight are often more susceptible. Protecting grazing animals from toxic weeds in their primary feeding areas is therefore important.
Control
Some guidelines to prevent the spread of noxious weeds are:
Avoid driving through noxious weed-infested areas.
Avoid transporting or planting seeds and plants that one cannot identify.
For noxious weeds in flower or with seeds on plants, pulling 'gently' out and placing in a secure closable bag is recommended. Disposal such as hot composting or co
|
https://en.wikipedia.org/wiki/FastContact
|
FastContact is an algorithm for the rapid estimate of contact and binding free energies for protein–protein complex structures. It is based on a statistically determined desolvation contact potential and Coulomb electrostatics with a distance-dependent dielectric constant. The application also reports residue contact free energies that rapidly highlight the hotspots of the interaction.
The programme was written in Fortran 77 by Carlos J. Camacho and Chao Zhang at the Department of Computational Biology, University of Pittsburgh, PA. A web server for running FastContact online or downloading the binary was set up by P. Christoph Champ in July 2005.
|
https://en.wikipedia.org/wiki/Endangered%20species%20recovery%20plan
|
An endangered species recovery plan, also known as a species recovery plan, species action plan, species conservation action, or simply recovery plan, is a document describing the current status, threats and intended methods for increasing rare and endangered species population sizes. Recovery plans act as a foundation from which to build a conservation effort to preserve animals which are under threat of extinction. More than 320 species have died out and the world is continuing a rate of 1 species becoming extinct every two years. Climate change is also linked to several issues relating to extinct species and animals' quality of life.
History
The United States Congress said in 1973 that endangered species "are of aesthetic, ecological, educational, historical, recreational, and scientific value to the Nation and its people." They therefore set laws to protect endangered species. Section 4(f) of the United States Endangered Species Act from 1973 directs the Secretary of the Interior and the Secretary of Commerce to develop and implement recovery plans to promote the conservation of endangered and threatened species.
The Species Survival Commission's Specialist Groups of the International Union for Conservation of Nature (IUCN) has created Species Action Plans since at least the mid-1980s, which are used to outline the conservation strategies of species, normally between set dates.
In June 2021, the IUCN produced their Global Species Action Plan (GSAP) Briefing Paper, to prepare for the introduction of the GSAP at the IUCN World Conservation Congress in September 2021. This plan "brings together an outline of the species conservation actions required to implement the Post-2020 Global Biodiversity Framework, with supporting tools and guidelines", and aims to reach targets set for 2030.
Aims and functions
Recovery plans set out the research and management actions necessary to stop the decline of, and support the recovery of, listed threatened species or threaten
|
https://en.wikipedia.org/wiki/Switchover
|
Switchover is the manual switch from one system to a redundant or standby computer server, system, or network upon the failure or abnormal termination of the previously active server, system, or network, or to perform system maintenance, such as installing patches, and upgrading software or hardware.
Automatic switchover of a redundant system on an error condition, without human intervention, is called failover. Manual switchover on error would be used if automatic failover is not available, possibly because the overall system is too complex.
See also
Safety engineering
Data integrity
Fault-tolerance
HA Clusters
Business continuity planning
|
https://en.wikipedia.org/wiki/Adaptive%20mutation
|
Adaptive mutation, also called directed mutation or directed mutagenesis is a controversial evolutionary theory. It posits that mutations, or genetic changes, are much less random and more purposeful than traditional evolution, implying that organisms can respond to environmental stresses by directing mutations to certain genes or areas of the genome. There have been a wide variety of experiments trying to support (or disprove) the idea of adaptive mutation, at least in microorganisms.
Definition
The most widely accepted theory of evolution states that organisms are modified by natural selection where changes caused by mutations improve their chance of reproductive success. Adaptive mutation states that rather than mutations and evolution being random, they are in response to specific stresses. In other words, the mutations that occur are more beneficial and specific to the given stress, instead of random and not a response to anything in particular. The term stress refers to any change in the environment, such as temperature, nutrients, population size, etc. Tests with microorganisms have found that for adaptive mutation, more of the mutations observed after a given stress were more effective at dealing with the stress than chance alone would suggest is possible. This theory of adaptive mutation was first brought to academic attention in the 1980s by John Cairns.
Recent studies
Adaptive mutation is a controversial claim leading to a series of experiments designed to test the idea. Three major experiments are the SOS response, responses to starvation in Escherichia coli, and testing for revertants of a tryptophan auxotroph in Saccharomyces cerevisiae (yeast).
Lactose starvation
The E. coli strain FC40 has a high rate of mutation, and so is useful for studies, such as for adaptive mutation. Due to a frameshift mutation, a change in the sequence that causes the DNA to code for something different, FC40 is unable to process lactose. When placed in a lactose-ric
|
https://en.wikipedia.org/wiki/Perineal%20membrane
|
The perineal membrane is an anatomical term for a fibrous membrane in the perineum. The term "inferior fascia of urogenital diaphragm", used in older texts, is considered equivalent to the perineal membrane.
It is the superior border of the superficial perineal pouch, and the inferior border of the deep perineal pouch.
Structure
The perineal membrane is triangular in shape. It attaches to both ischiopubic rami of the pelvis. It also attaches to the perineal body. It is about 4 cm. in depth.
Its apex is directed forward, and is separated from the arcuate pubic ligament by an oval opening for the transmission of the deep dorsal vein of the penis or the deep dorsal vein of the clitoris.
Its lateral margins are attached on either side to the inferior rami of the pubis and ischium, above the crus penis.
Its base is directed toward the rectum, and connected to the central tendinous point of the perineum. The base is fused with both the pelvic fascia and Colle's fascia.
Relations
It is continuous with the deep layer of the superficial fascia behind the superficial transverse perineal muscle, and with the inferior layer of the diaphragmatic part of the pelvic fascia.
Perforations
In males, it is perforated, about 2.5 cm below the pubic symphysis, by the urethra, the aperture for which is circular and about 6 mm in diameter, by the arteries to the bulb, and the ducts of the bulbourethral glands close to the urethral orifice; by the deep arteries of the penis, one on either side close to the pubic arch, and about halfway along the attached margin of the fascia; by the dorsal arteries and nerves of the penis near the apex of the fascia. Its base is also perforated by the perineal vessels and nerves, while between its apex and the arcuate pubic ligament the deep dorsal vein of the penis passes upward into the pelvis.
Contents
If the inferior fascia of the urogenital diaphragm is detached on either side, the following structures will be seen between it and the superio
|
https://en.wikipedia.org/wiki/Meitner%E2%80%93Hupfeld%20effect
|
The Meitner–Hupfeld effect, named after Lise Meitner and Hans-Hermann Hupfeld, is an anomalously large scattering of gamma rays by heavy elements. The effect was later explained by a broad theory from which evolved the Standard Model, a theory for explaining the structure of the atomic nucleus. The anomalous gamma-ray behavior was eventually ascribed to electron–positron pair production and annihilation.
Although Professor Meitner was recognized for her work, Dr. Hupfeld is usually ignored, and little or no account of his life exists.
See also
Pair production
Electron-positron annihilation
|
https://en.wikipedia.org/wiki/Superficial%20perineal%20pouch
|
The superficial perineal pouch (also superficial perineal compartment/space/sac) is a compartment of the perineum.
Structure
The superficial perineal pouch is an open compartment, due to the fact that anteriorly, the space communicates freely with the potential space lying between the superficial fascia of the anterior abdominal wall and the anterior abdominal muscles:
its inferior border is the fascia of Colles, the deeper membranous layer of the superficial perineal fascia that covers the inferior border of the muscles of the superficial perineal pouch. (The fascia of perineum is a deep fascia that covers the superficial perineal muscles individually).
its superior border is the perineal membrane (inferior fascia of the urogenital diaphragm).
Contents
Muscles
Ischiocavernosus muscle
Bulbospongiosus muscle
Superficial transverse perineal muscle
Erectile bodies
Corpus cavernosum (of penis and of clitoris)
Corpus spongiosum (of penis)
Vessels
Posterior scrotal arteries (males)/Labial arteries (females)
Artery to bulb (males)/vestibule (females)
Urethral artery
Nerves
Posterior scrotal nerves (males)/Posterior Labial nerves(females)
Other
Crura of penis (males) / Crura of clitoris (females)
Bulb of penis (males) / Bulb of vestibule (females)
Bartholin's glands (female)
Spongy urethra contained in the corpus spongiosum
Additional images
See also
Deep perineal pouch
|
https://en.wikipedia.org/wiki/AgentSheets
|
AgentSheets was one of the first modern block-based programming language for children. The idea of AgentSheets was to overcome syntactic challenges found in common text-based programming languages by using drag-and-drop mechanisms conceptualizing commands such as conditions and actions as editable blocks that could be composed into programs. Ideas such as this are used in various other programming languages, such as Scratch though it does cost money to use most of the blocks. AgentSheets is used to create media-rich projects such as games and interactive simulations. The main building blocks of AgentSheets are agents which are interactive objects programmed through rules. Using conditions agents can sense the user input including mouse, keyboard and in some versions even speech recognition and web page content. Using actions agents can move, produce sounds, open web pages, and compute formulas.
History
AgentSheets was initially considered as a cyberlearning tool to teach students programming and related information technology skills through game design.
AgentSheets is supported by a middle and high school curriculum called Scalable Game Design aligned with the ISTE National Educational Technology Standards (NETS). The mission of this project is to reinvent computer science in public schools by motivating & educating all students (including women and underrepresented communities) to learn about computer science through game design starting at the middle school level. Through this curriculum students build increasingly sophisticated games and, as part of this process, learn about computational concepts at the level of computational thinking that are relevant to game design as well as to computational science. The curriculum is made available through the Scalable Game Design Wiki. Research investigating motivational aspects of computer science education in public schools is currently exploring the introduction of game design in representative regions of the U.S. incl
|
https://en.wikipedia.org/wiki/Process%20specification
|
Process Specification is a generic term for the specification of a process. It is not unique to business activity, but can be applied to any organizational activity.
Within some structured methods, the capitalized term Process Specification refers to a description of the procedure to be followed by an actor within an elementary level business activity, as represented on a process model such as a dataflow diagram or IDEF0 model. A common alias is minispec, short for miniature specification.
Use in systems development
The process specification defines what must be done to transform inputs into outputs. It is a detailed set of instructions outlining a business procedure that each elementary level business activity is expected to carry out. Process specifications are commonly included as integral components of requirements documents in systems development.
Techniques
A variety of approaches can be used to produce a process specification, including:
Decision tables
Structured English (favored technique of most systems analysts)
Pre/post conditions
Use cases, basic course or events/alternate paths in use cases
Flowcharts
Nassi–Shneiderman diagrams
UML Activity diagrams
No matter what approach is used, a specification must communicate to system development designers, implementers and support professionals, and be verifiable by stakeholders and end users.
See also
Specification (technical standard)
External links
Chapter 11 of the Structured Analysis Wiki, by Ed Yourdon
Business process management
Software development process
|
https://en.wikipedia.org/wiki/Heartland%20Payment%20Systems
|
Heartland Payment Systems, Inc. is a U.S.-based payment processing and technology provider. Founded in 1997, Heartland Payment Systems' last headquarters were in Princeton, New Jersey. An acquisition by Global Payments, expected to be worth $3.8 billion or $4.3 billion was finalized on April 25, 2016.
Heartland Payment Systems provides payment processing for more than 275,000 business locations in the United States and processes more than 11 million transactions a day and more than $80 billion in transactions a year, as of 2014. In 2014, the Nilson Report ranked Heartland the 6th largest payment processor in the country by transaction count, and the 8th largest by processed dollar volume.
Associated businesses
In addition to payment processing, Heartland has developed or acquired businesses in payroll processing, gift card and campus card, point of sale systems, school payments and nutrition, network management, mobile payments and ordering, eCommerce, billing, and lending services.
History
Heartland processed its first card transaction on July 15, 1997. In 2001 the company received a $40 million private equity investment from Greenhill Capital Partners, L.P. (New York, NY), LLR Partners, Inc. (Philadelphia, PA), and their affiliated investment funds. The company went public on the New York Stock Exchange on August 11, 2005. On May 17, 2010, Heartland announced its debut on the list of America’s largest companies at #954.
Security breach
On January 20, 2009 Heartland announced that it had been "the victim of a security breach within its processing system in 2008". The data stolen included the digital information encoded onto the magnetic stripe built into the backs of credit and debit cards; with that data, thieves can fashion counterfeit credit cards by imprinting the same stolen information onto fabricated cards. One estimate claimed 100 million cards and more than 650 financial services companies were compromised; at the time, it was characterized as the la
|
https://en.wikipedia.org/wiki/Seed%20predation
|
Seed predation, often referred to as granivory, is a type of plant-animal interaction in which granivores (seed predators) feed on the seeds of plants as a main or exclusive food source, in many cases leaving the seeds damaged and not viable. Granivores are found across many families of vertebrates (especially mammals and birds) as well as invertebrates (mainly insects); thus, seed predation occurs in virtually all terrestrial ecosystems. Seed predation is commonly divided into two distinctive temporal categories, pre-dispersal and post-dispersal predation, which affect the fitness of the parental plant and the dispersed offspring (the seed), respectively. Mitigating pre- and post-dispersal predation may involve different strategies. To counter seed predation, plants have evolved both physical defenses (e.g. shape and toughness of the seed coat) and chemical defenses (secondary compounds such as tannins and alkaloids). However, as plants have evolved seed defenses, seed predators have adapted to plant defenses (e.g., ability to detoxify chemical compounds). Thus, many interesting examples of coevolution arise from this dynamic relationship.
Seeds and their defenses
Plant seeds are important sources of nutrition for animals across most ecosystems. Seeds contain food storage organs (e.g., endosperm) that provide nutrients to the developing plant embryo (cotyledon). This makes seeds an attractive food source for animals because they are a highly concentrated and localized nutrient source in relation to other plant parts.
Seeds of many plants have evolved a variety of defenses to deter predation. Seeds are often contained inside protective structures or fruit pulp that encapsulate seeds until they are ripe. Other physical defenses include spines, hairs, fibrous seed coats and hard endosperm. Seeds, especially in arid areas, may have a mucilaginous seed coat that can glue soil to seed hiding it from granivores.
Some seeds have evolved strong anti-herbivore chemical
|
https://en.wikipedia.org/wiki/Apical%20ligament%20of%20dens
|
The ligament of apex dentis (or apical odontoid ligament) is a ligament that spans between the second cervical vertebra in the neck and the skull.
It lies as a fibrous cord in the triangular interval between the alar ligaments, which extends from the tip of the odontoid process on the axis to the anterior margin of the foramen magnum, being intimately blended with the deep portion of the anterior atlantooccipital membrane and superior crus of the transverse ligament of the atlas.
It is regarded as a rudimentary intervertebral fibrocartilage, and in it traces of the notochord may persist.
|
https://en.wikipedia.org/wiki/Femoral%20neck
|
The femoral neck (femur neck or neck of the femur) is a flattened pyramidal process of bone, connecting the femoral head with the femoral shaft, and forming with the latter a wide angle opening medialward.
Structure
The neck is flattened from before backward, contracted in the middle, and broader laterally than medially.
The vertical diameter of the lateral half is increased by the obliquity of the lower edge, which slopes downward to join the body at the level of the lesser trochanter, so that it measures one-third more than the antero-posterior diameter.
The medial half is smaller and of a more circular shape.
The anterior surface of the neck is perforated by numerous vascular foramina.
Along the upper part of the line of junction of the anterior surface with the head is a shallow groove, best marked in elderly subjects; this groove lodges the orbicular fibers of the capsule of the hip joint.
The posterior surface is smooth, and is broader and more concave than the anterior: the posterior part of the capsule of the hip-joint is attached to it about 1 cm above the intertrochanteric crest.
The superior border is short and thick, and ends laterally at the greater trochanter; its surface is perforated by large foramina.
The inferior border, long and narrow, curves a little backward, to end at the lesser trochanter.
Angle of inclination
The angle is widest in infancy, and becomes lessened during growth, so that at puberty it forms a gentle curve from the axis of the body of the bone. In the adult, the neck forms an angle of about 125° with the body, but this varies in inverse proportion to the development of the pelvis and the stature. The angle decreases during the period of growth, but after full growth has been attained it does not usually undergo any change, even in old age; it varies considerably in different persons of the same age. Coxa vara is a deformity of the hip, whereby the angle between the head and the shaft of the femur is reduced to less tha
|
https://en.wikipedia.org/wiki/Femoral%20head
|
The femoral head (femur head or head of the femur) is the highest part of the thigh bone (femur). It is supported by the femoral neck.
Structure
The head is globular and forms rather more than a hemisphere, is directed upward, medialward, and a little forward, the greater part of its convexity being above and in front.
The femoral head's surface is smooth. It is coated with cartilage in the fresh state, except over an ovoid depression, the fovea capitis, which is situated a little below and behind the center of the femoral head, and gives attachment to the ligament of head of femur.
The thickest region of the articular cartilage is at the centre of the femoral head, measuring up to 2.8 mm.
The diameter of the femoral head is usually larger in men than in women.
Fovea capitis
The fovea capitis is a small, concave depression within the head of the femur that serves as an attachment point for the ligamentum teres (Saladin). It is slightly ovoid in shape and is oriented "superior-to-posteroinferior. (Cerezal)" This orientation might be favorable for the tensed fibers of the ligamentum teres. The fovea capitis is located "slightly posterior and inferior to the center of the articular surface of the femoral head (Cerezal)" Unlike the head of the femur, the fovea capitis lacks any hyaline cartilage. The fovea capitis may contain vascular canals in two-thirds of individuals, but "their contribution to femoral head vascularity varies. (Cerezal)"
Clinical significance
If there is a fracture of the neck of the femur, the blood supply through the ligament becomes crucial. The head of the femur is relevant to orthopedic surgery because it can undergo avascular necrosis and consequent osteochondritis dissecans. The femoral head is removed in total hip replacement surgery.
Additional images
|
https://en.wikipedia.org/wiki/Quadrate%20line
|
A slight ridge is sometimes seen commencing about the middle of the intertrochanteric crest, and reaching vertically downward for about 5 cm. along the back part of the body: it is called the linea quadrata (or quadrate line), and gives attachment to the Quadratus femoris and a few fibers of the Adductor magnus.
|
https://en.wikipedia.org/wiki/Triangular%20fibrocartilage
|
The triangular fibrocartilage complex (TFCC) is formed by the triangular fibrocartilage discus (TFC), the radioulnar ligaments (RULs) and the ulnocarpal ligaments (UCLs).
Structure
Triangular fibrocartilage disc
The triangular fibrocartilage disc (TFC) is an articular discus that lies on the pole of the distal ulna. It has a triangular shape and a biconcave body; the periphery is thicker than its center. The central portion of the TFC is thin and consists of chondroid fibrocartilage; this type of tissue is often seen in structures that can bear compressive loads. This central area is often so thin that it is translucent and in some cases it is even absent. The peripheral portion of the TFC is well vascularized, while the central portion has no blood supply.
This discus is attached by thick tissue to the base of the ulnar styloid and by thinner tissue to the edge of the radius just proximal to the radiocarpal articular surface.
Radioulnar ligaments
The radioulnar ligaments (RULs) are the principal stabilizers of the distal radioulnar joint (DRUJ). There are two RULs: the palmar and dorsal radioulnar ligaments.
These ligaments arise from the distal radius medial border and insert on the ulna at two separate and distinct sites: the ulna styloid and the fovea (a groove that separates the ulnar styloid from the ulnar head). Each ligament consists of a superficial component and a deep component. The superficial components insert directly onto the ulna styloid. The deep components insert more anterior, into the fovea adjacent to the articular surface of the dome of the distal ulna.
The ligaments are composed of longitudinally oriented lamellar collagen to resist tensile loads and have a rich vascular supply to allow healing.
Ulnocarpal ligaments
The ulnocarpal ligaments (UCLs) consist of the ulnolunate and the ulnotriquetral ligaments. They originate from the ulnar styloid and insert into the carpal bones of the wrist: the ulnolunate ligament inserts into the lunate
|
https://en.wikipedia.org/wiki/Deltoid%20ligament
|
The deltoid ligament (or medial ligament of talocrural joint) is a strong, flat, triangular band, attached, above, to the apex and anterior and posterior borders of the medial malleolus. The deltoid ligament supports the ankle joint and also resists excessive eversion of the foot.
The deltoid ligament is composed of 4 fibers:
Anterior tibiotalar ligament
Tibiocalcaneal ligament
Posterior tibiotalar ligament
Tibionavicular ligament.
It consists of two sets of fibers, superficial and deep.
Superficial fibres
Of the superficial fibres,
tibionavicular pass forward to be inserted into the tuberosity of the navicular bone, and immediately behind this they blend with the medial margin of the plantar calcaneonavicular ligament;
tibiocalcaneal descend almost perpendicularly to be inserted into the whole length of the sustentaculum tali of the calcaneus;
posterior tibiotalar from the posterior colliculus of the medial malleolus to the posteromedial surface of the talus
Deep fibres
The deep fibres (anterior tibiotalar) are attached from the anterior colliculus of the medial malleolus to the medial talus and medial tubercle
Coverings
The deltoid ligament is covered by the tendons of the tibialis posterior and flexor digitorum longus which are supplied by the tibial nerve (L4, L5, S1, S2, and S3).
Additional Images
|
https://en.wikipedia.org/wiki/Lateral%20collateral%20ligament%20of%20ankle%20joint
|
The lateral collateral ligament of ankle joint (or external lateral ligament of the ankle-joint) are ligaments of the ankle which attach to the fibula.
Structure
Its components are:
anterior talofibular ligament
The anterior talofibular ligament attaches the anterior margin of the lateral malleolus to the adjacent region of the talus bone. The most common ligament involved in ankle sprain is the anterior talofibular ligament.
posterior talofibular ligament
The posterior talofibular ligament runs horizontally between the neck of the talus and the medial side of lateral malleolus
calcaneofibular ligament
The calcaneofibular ligament is attached on the posteromedial side of lateral malleolus and descends posteroinferiorly below to a lateral side of the calcaneus.
|
https://en.wikipedia.org/wiki/Nanovid%20microscopy
|
Nanovid microscopy, from "nanometer video-enhanced microscopy", is a microscopic technique aimed at visualizing colloidal gold particles of 20–40 nm diameter (nanogold, immunogold) as dynamic markers at the light-microscopic level. The nanogold particles as such are smaller than the diffraction limit of light, but can be visualized by using video-enhanced differential interference contrast (VEDIC). The technique is based on the use of contrast enhancement by video techniques and digital image processing. Nanovid microscopy, by combining small colloidal gold probes with video-enhanced quantitative microscopy, allows studying the intracellular dynamics of specific proteins in living cells.
See also
Microscopy
Single-particle tracking
Differential interference contrast microscopy
Microtubule
|
https://en.wikipedia.org/wiki/Arithmetic%20and%20geometric%20Frobenius
|
In mathematics, the Frobenius endomorphism is defined in any commutative ring R that has characteristic p, where p is a prime number. Namely, the mapping φ that takes r in R to rp is a ring endomorphism of R.
The image of φ is then Rp, the subring of R consisting of p-th powers. In some important cases, for example finite fields, φ is surjective. Otherwise φ is an endomorphism but not a ring automorphism.
The terminology of geometric Frobenius arises by applying the spectrum of a ring construction to φ. This gives a mapping
φ*: Spec(Rp) → Spec(R)
of affine schemes. Even in cases where Rp = R this is not the identity, unless R is the prime field.
Mappings created by fibre product with φ*, i.e. base changes, tend in scheme theory to be called geometric Frobenius. The reason for a careful terminology is that the Frobenius automorphism in Galois groups, or defined by transport of structure, is often the inverse mapping of the geometric Frobenius. As in the case of a cyclic group in which a generator is also the inverse of a generator, there are in many situations two possible definitions of Frobenius, and without a consistent convention some problem of a minus sign may appear.
|
https://en.wikipedia.org/wiki/Cryptographic%20nonce
|
In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic communication. It is often a random or pseudo-random number issued in an authentication protocol to ensure that old communications cannot be reused in replay attacks. They can also be useful as initialization vectors and in cryptographic hash functions.
Definition
A nonce is an arbitrary number used only once in a cryptographic communication, in the spirit of a nonce word. They are often random or pseudo-random numbers. Many nonces also include a timestamp to ensure exact timeliness, though this requires clock synchronisation between organisations. The addition of a client nonce ("cnonce") helps to improve the security in some ways as implemented in digest access authentication. To ensure that a nonce is used only once, it should be time-variant (including a suitably fine-grained timestamp in its value), or generated with enough random bits to ensure a insignificantly low chance of repeating a previously generated value. Some authors define pseudo-randomness (or unpredictability) as a requirement for a nonce.
Nonce is a word dating back to Middle English for something only used once or temporarily (often with the construction "for the nonce"). It descends from the construction "then anes" ("the one [purpose]"). A false etymology claiming it to mean "number used once" is incorrect. In Britain the term may be avoided as "nonce" in modern British English means a paedophile.
Usage
Authentication
Authentication protocols may use nonces to ensure that old communications cannot be reused in replay attacks. For instance, nonces are used in HTTP digest access authentication to calculate an MD5 digest of the password. The nonces are different each time the 401 authentication challenge response code is presented, thus making replay attacks virtually impossible. The scenario of ordering products over the Internet can provide an example of the usefulness of nonces in replay attac
|
https://en.wikipedia.org/wiki/Unicursal%20hexagram
|
The unicursal hexagram is a hexagram or six-pointed star that can be traced or drawn unicursally, in one continuous line rather than by two overlaid triangles. The hexagram can also be depicted inside a circle with the points touching it. It is often depicted in an interlaced form with the lines of the hexagram passing over and under one another to form a knot. It is a specific instance of the far more general shape discussed in Blaise Pascal's 1639 Hexagrammum Mysticum.
Giordano Bruno
In his work titled Essays upon the Mathematics of Mordente: One Hundred and Sixty Articles against the Mathematicians and Philosophers of this Age (Prague: 1588), Italian philosopher, cosmological theorist, and Hermetic occultist Giordano Bruno used the unicursal hexagram symbol to represent Figura Amoris ("figure of love") part of the Hermetic Trinity in his mathesis.
Thelema
In Aleister Crowley's Thelema, the hexagram is usually depicted with a five-petalled flower in the centre which symbolises the pentagram. The hexagram represents the heavenly macrocosmic or planetary forces and is a symbol equivalent to the Rosicrucian Rose Cross or ancient Egyptian ankh. The five petals of the flower represent the microcosmic forces of 5 elements of the magical formula YHShVH and is a symbol equivalent to the pentagram or pentacle. The two symbols together represent the interweaving of the planetary and elemental forces.
See also
74 knot
Hexagram
|
https://en.wikipedia.org/wiki/Directed%20percolation
|
In statistical physics, directed percolation (DP) refers to a class of models that mimic filtering of fluids through porous materials along a given direction, due to the effect of gravity. Varying the microscopic connectivity of the pores, these models display a phase transition from a macroscopically permeable (percolating) to an impermeable (non-percolating) state. Directed percolation is also used as a simple model for epidemic spreading with a transition between survival and extinction of the disease depending on the infection rate.
More generally, the term directed percolation stands for a universality class of continuous phase transitions which are characterized by the same type of collective behavior on large scales. Directed percolation is probably the simplest universality class of transitions out of thermal equilibrium.
Lattice models
One of the simplest realizations of DP is bond directed percolation. This model is a directed variant of ordinary (isotropic) percolation and can be introduced as follows. The figure shows a tilted square lattice with bonds connecting neighboring sites. The bonds are permeable (open) with probability and impermeable (closed) otherwise. The sites and bonds may be interpreted as holes and randomly distributed channels of a porous medium.
The difference between ordinary and directed percolation is illustrated to the right. In isotropic percolation a spreading agent (e.g. water) introduced at a particular site percolates along open bonds, generating a cluster of wet sites. Contrarily, in directed percolation the spreading agent can pass open bonds only along a preferred direction in space, as indicated by the arrow. The resulting red cluster is directed in space.
As a dynamical process
Interpreting the preferred direction as a temporal degree of freedom, directed percolation can be regarded as a stochastic process that evolves in time. In the case of bond DP the time parameter is discrete and all sites are updated in par
|
https://en.wikipedia.org/wiki/Defense%20physiology
|
Defense physiology is a term used to refer to the symphony of body function (physiology) changes which occur in response to a stress or threat.
When the body executes the "fight-or-flight" reaction or stress response, the nervous system initiates, coordinates and directs specific changes in how the body is functioning, preparing the body to deal with the threat. (See also General adaptation syndrome.)
Definitions
Stress : As it pertains to the term defense physiology, the term stress refers to a perceived threat to the continued functioning of the body / life according to its current state.
Threat: A threat may be consciously recognized or not. A physical event (a loud noise or car collision or a coming attack), a chemical or a biological agent which alters (or has the possibility to alter) body function (physiology) away from optimum or healthy functioning (or away from its current state of functioning) may be perceived as a threat (also called a stressor).
Life circumstances, though posing no immediate physical danger, could be perceived as a threat. Anything that could change the continuing of the person’s life as they are currently experiencing it could be perceived as a threat.
Physiological reactions to threat (or perceived threat)
A threat may be either empirical (an outside observer may agree that the event or circumstance poses a threat) or a priori (an outside observer would not agree that the event or circumstance poses a threat). What is important to the individual, in terms of the body’s response, is that a threat is perceived.
The perception of a threat may also trigger an associated ‘feeling of distress’.
Physiological reactions triggered by mind cannot differentiate both the physical or mental threat separately, Hence the "fight-or-flight" response of mind for the both reactions will be same.
Duration of threat and its different physiological effects on the nervous system.
Acute Stress Reaction - The body executes the “fight-or-flight”
|
https://en.wikipedia.org/wiki/Esophageal%20plexus
|
The esophageal plexus (oesophageal plexus in British-English) is formed by nerve fibers from two sources, branches of the vagus nerve, and visceral branches of the sympathetic trunk. The esophageal plexus and the cardiac plexus contain the same types of fibers and are both considered thoracic autonomic plexus.
Parasympathetic fibers
The vagus nerve delivers two fiber types to the esophageal plexus:
Parasympathetic preganglionic fibers - These fibers have their cell bodies located in the dorsal motor nucleus of the vagus and they will synapse on the terminal ganglia in the walls of the esophagus.
Afferent fibers - These fibers are primarily concerned with autonomic reflexes and they have their cell bodies in the inferior ganglion of the vagus.
These vagal fibers in the esophageal plexus reform to make the anterior vagal trunk (left vagus) and the posterior vagal trunk (right vagus). Anterior and posterior being terms in relation to the esophagus, a mnemonic for which is 'LARP': Left becomes Anterior, Right becomes Posterior.
Sympathetic fibers
The visceral branches of the sympathetic trunk also deliver two fiber types to the esophageal plexus:
Sympathetic postganglionic fibers - The cell bodies of these fibers are located in the sympathetic chain ganglia . The cell bodies of the preganglionic fibers, the first neuron of this two neuron chain, are located in the intermediolateral cell column (IMLCC) of the thoracic spinal cord.
Afferent fibers - These fibers are primarily concerned with pain and have cell bodies located in the dorsal root ganglion.
Additional images
See also
Esophagus
Cardiac plexus
Thoracic autonomic plexus
|
https://en.wikipedia.org/wiki/Cruciform%20eminence
|
The cruciform eminence (or cruciate eminence) divides the deeply concave internal surface of the occipital bone into four fossae:
The upper two fossae are called the cerebral fossae, are triangular and lodge the occipital lobes of the cerebrum.
The lower two are called the cerebellar fossae, are quadrilateral and accommodate the hemispheres of the cerebellum.
The upper fossae are separated from the lower fossae by a groove for the transverse sinuses. At the point of intersection between all four fossae is the internal occipital protuberance.
Additional images
|
https://en.wikipedia.org/wiki/Economics%20and%20Human%20Biology
|
Economics and Human Biology is a quarterly peer-reviewed academic journal published by Elsevier since 2003. It is an interdisciplinary periodical covering research on biological economics — economics in the context of human biology and health. The current editors-in-chief are Susan Averett, Joerg Baten and Pinka Chatterji.
According to the Journal Citation Reports, the journal has a 2020 impact factor of 2.184.
See also
Anthropometry
Antebellum Puzzle
Body mass index
History of anthropometry
Human height
Human body weight
|
https://en.wikipedia.org/wiki/Premovement%20neuronal%20activity
|
Premovement neuronal activity in neurophysiological literature refers to neuronal modulations that alter the rate at which neurons fire before a subject produces movement. Through experimentation with multiple animals, predominantly monkeys, it has been shown that several regions of the brain are particularly active and involved in initiation and preparation of movement. Two specific membrane potentials, the bereitschaftspotential, or the BP, and contingent negative variation, or the CNV, play a pivotal role in premovement neuronal activity. Both have been shown to be directly involved in planning and initiating movement. Multiple factors are involved with premovement neuronal activity including motor preparation, inhibition of motor response, programming of the target of movement, closed-looped and open-looped tasks, instructed delay periods, short-lead and long-lead changes, and mirror motor neurons.
Two types of movement
Research of pre-movement neuronal activity generally involves studying two different kinds of movement, movement in natural settings versus movement triggered by a sensory stimulus. These two types of movements are referred to with different nomenclature throughout different studies and literature on the topic of premovement neuronal activity. Voluntary movements are also known as self-timed, self-initiated, self-paced, and non-triggered movements. This type of movement is what generally occurs in natural settings, carried out independently of a sensory cue or external signal which would trigger or cause the movement to be performed. In contrast, movements that are carried out as a result of a sensory cue or stimulus, or reflex-reactions to external conditions or changes are called reactive movements, but also known as cued movements, stimulated movements, and externally triggered movements depending on the choice of a particular study. In one such study by Lee and Assad (2003), rhesus monkeys were trained to execute arm movement in respons
|
https://en.wikipedia.org/wiki/Coordinated%20vulnerability%20disclosure
|
In computer security, coordinated vulnerability disclosure (CVD, formerly known as responsible disclosure) is a vulnerability disclosure model in which a vulnerability or an issue is disclosed to the public only after the responsible parties have been allowed sufficient time to patch or remedy the vulnerability or issue. This coordination distinguishes the CVD model from the "full disclosure" model.
Developers of hardware and software often require time and resources to repair their mistakes. Often, it is ethical hackers who find these vulnerabilities. Hackers and computer security scientists have the opinion that it is their social responsibility to make the public aware of vulnerabilities. Hiding problems could cause a feeling of false security. To avoid this, the involved parties coordinate and negotiate a reasonable period of time for repairing the vulnerability. Depending on the potential impact of the vulnerability, the expected time needed for an emergency fix or workaround to be developed and applied and other factors, this period may vary between a few days and several months.
Coordinated vulnerability disclosure may fail to satisfy security researchers who expect to be financially compensated. At the same time, reporting vulnerabilities with the expectation of compensation is viewed by some as extortion. While a market for vulnerabilities has developed, vulnerability commercialization (or "bug bounties") remains a hotly debated topic. Today, the two primary players in the commercial vulnerability market are iDefense, which started their vulnerability contributor program (VCP) in 2003, and TippingPoint, with their zero-day initiative (ZDI) started in 2005. These organizations follow the coordinated vulnerability disclosure process with the material bought. Between March 2003 and December 2007 an average 7.5% of the vulnerabilities affecting Microsoft and Apple were processed by either VCP or ZDI. Independent firms financially supporting coordinated vulner
|
https://en.wikipedia.org/wiki/Vision%20for%20perception%20and%20vision%20for%20action
|
Vision for perception and vision for action in neuroscience literature refers to two types of visual processing in the brain: visual processing to obtain information about the features of objects such as color, size, shape (vision for perception) versus processing needed to guide movements such as catching a baseball (vision for action). An idea is currently debated that these types of processing are done by anatomically different brain networks. Ventral visual stream subserves vision for perception, whereas dorsal visual stream subserves vision for action. This idea finds support in clinical research and animal experiments.
Visual Processing in the Brain
Visual stimuli have been known to process through the brain via two streams: the dorsal stream and the ventral stream. The dorsal pathway is commonly referred to as the ‘where’ system; this allows the processing of location, distance, position, and motion. This pathway spreads from the primary visual cortex dorsally to the parietal lobe. Information then feeds into the motor cortex of the frontal lobe. The second pathway, the ventral stream, processes information relating to shape, size, objects, orientation, and text. This is commonly known as the ‘what’ system. Visual stimuli in this system process ventrally from the primary visual cortex to the medial temporal lobe. In childhood development, vision for action and vision for perception develop at different rates, supporting the hypothesis of two distinct, linear streams for visual processing.
The above hypothesis has recently been challenged by a new and more parsimonious hypothesis with regard to evolution. The two streams must work hand-in-hand while processing visual information. Neuroanatomical and function neuroimaging studies have proven multiple visual maps that exist in the posterior brain, regarding at least 40 distinct regions. A single part of the outside world controls visual processing, and then particular areas are recognized in which sing
|
https://en.wikipedia.org/wiki/MPLS%20local%20protection
|
MPLS Fast Reroute (also called MPLS local restoration or MPLS local protection) is a local restoration network resiliency mechanism. It is actually a feature of resource reservation protocol (RSVP) traffic engineering (RSVP-TE). In MPLS local protection each label-switched path (LSP) passing through a facility is protected by a backup path which originates at the node immediately upstream to that facility.
This node which redirects the traffic onto the preset backup path is called the Point of Local Repair (PLR), and the node where a backup LSP merges with the primary LSP is called Merge Point (MP). This mechanism (local protection) provides faster recovery because the decision of recovery is strictly local. For comparison, when recovery mechanisms are employed at the IP layer, restoration may take several seconds which is unacceptable for real-time applications (such as VoIP). In contrast, MPLS local protection meets the requirements of real-time applications with recovery times comparable to those of shortest path bridging networks or SONET rings (< 50 ms).
Local protection approaches
There are two distinct approaches to local protection: (1) one-to-one local protection (detour) (2) many-to-one local protection (facility backup).
One-to-one local protection
In one-to-one backup approach, the PLRs maintain separate backup paths for each LSP passing through a facility. The backup path terminates by merging back with the primary path at a node called the Merge Point (MP). In one-to-one backup approach, the MP can be any node downstream from the protected facility. Maintaining state information for backup paths protecting individual LSPs, as in the one-to-one approach, is a significant resource burden for the PLR. Moreover, periodic refresh messages sent by the PLR, in order to maintain each backup path, may become a network bottleneck.
Many-to-one local protection
In many-to-one approach, a PLR maintains a single backup path to protect a set of primary LSPs t
|
https://en.wikipedia.org/wiki/Audio-visual%20speech%20recognition
|
Audio visual speech recognition (AVSR) is a technique that uses image processing capabilities in lip reading to aid speech recognition systems in recognizing undeterministic phones or giving preponderance among near probability decisions.
Each system of lip reading and speech recognition works separately, then their results are mixed at the stage of feature fusion. As the name suggests, it has two parts. First one is the audio part and second one is the visual part. In audio part we use features like log mel spectrogram, mfcc etc. from the raw audio samples and we build a model to get feature vector out of it . For visual part generally we use some variant of convolutional neural network to compress the image to a feature vector after that we concatenate these two vectors (audio and visual ) and try to predict the target object.
External links
IBM Research - Audio Visual Speech Technologies
Looking to listen at cocktail party
Google AI blog
Computational linguistics
Speech recognition
Applications of computer vision
Multimodal interaction
|
https://en.wikipedia.org/wiki/No-observed-adverse-effect%20level
|
The no-observed-adverse-effect level (NOAEL) denotes the level of exposure of an organism, found by experiment or observation, at which there is no biologically or statistically significant increase in the frequency or severity of any adverse effects of the tested protocol. In drug development, the NOAEL of a new drug is assessed in laboratory animals, such as mice, prior to initiation of human trials in order to establish a safe clinical starting dose in humans. The OECD publishes guidelines for Preclinical Safety Assessments, in order to help scientists discover the NOAEL.
Synopsis
Some adverse effects in the exposed population when compared to its appropriate control might include alteration of morphology, functional capacity, growth, development or life span. The NOAEL is determined or proposed by qualified personnel, often a pharmacologist or a toxicologist.
The NOAEL could be defined as "the highest experimental point that is without adverse effect," meaning that under laboratory conditions, it is the level where there are no side-effects. It either does not provide the effects of drug with respect to duration and dose, or it does not address the interpretation of risk based on toxicologically relevant effects.
In toxicology it is specifically the highest tested dose or concentration of a substance (i.e. a drug or chemical) or agent (e.g. radiation), at which no such adverse effect is found in exposed test organisms where higher doses or concentrations resulted in an adverse effect.
The NOAEL level may be used in the process of establishing a dose-response relationship, a fundamental step in most risk assessment methodologies.
Synonyms
The NOAEL is also known as NOEL (no-observed-effect level) as well as NEC (no-effect concentration) and NOEC (no-observed-effect concentration).
US EPA definition
The United States Environmental Protection Agency defines NOAEL as 'an exposure level at which there are no statistically or biologically significant increase
|
https://en.wikipedia.org/wiki/Ammonium%20sulfamate
|
Ammonium sulfamate (or ammonium sulphamate) is a white crystalline solid, readily soluble in water. It is commonly used as a broad spectrum herbicide, with additional uses as a compost accelerator, flame retardant and in industrial processes.
Manufacture and distribution
It is a salt formed from ammonia and sulfamic acid.
Ammonium sulfamate is distributed under the following tradenames, which are principally herbicidal product names: Amicide, Amidosulfate, Ammate, Amcide, Ammate X-NI, AMS, Fyran 206k, Ikurin, Sulfamate, AMS and Root-Out.
Uses
Herbicide
Ammonium sulfamate is considered to be particularly useful in controlling tough woody weeds, tree stumps and brambles.
Ammonium sulfamate has been successfully used in several major UK projects by organisations like the British Trust for Conservation Volunteers, English Heritage, the National Trust, and various railway, canal and waterways authorities.
Several years ago the Henry Doubleday Research Association (HDRA) (known as Garden Organic), published an article on ammonium sulfamate after a successful set of herbicide trials. Though not approved for use by organic growers it does provide an option when alternatives have failed.
The following problem weeds / plants can be controlled:
Japanese Knotweed (Reynoutria japonica, syn. Fallopia japonica),
Marestail / Horsetail (Equisetum),
Ground-elder (Aegopodium podagraria),
Rhododendron ponticum,
Brambles,
Brushwood,
Ivy (Hedera species),
Senecio/Ragwort,
Honey fungus (Armillaria), and
felled tree stumps and most other tough woody specimens.
Compost accelerator
Ammonium sulfamate is used as a composting accelerator in horticultural settings. It is especially effective in breaking down the tougher and woodier weeds put onto the compost heap.
Flame retardant
Ammonium sulfamate (like other ammonium salts, e.g. Ammonium dihydrogen phosphate, Ammonium sulfate) is a useful flame retardant. These salt based flame retardants offer advantages over other metal/mineral-ba
|
https://en.wikipedia.org/wiki/Superman%20logo
|
Superman shield, also known as the Superman logo or the Superman symbol, is the iconic emblem for the fictional DC Comics superhero Superman. As a representation of one of the first superheroes, it served as a template for character design decades after Superman's first appearance. The tradition of wearing a representative symbol on the chest was followed by many subsequent superheroes, including Batman, Green Lantern, the Flash, Wonder Woman, Hawkman, and many others.
In earlier Superman stories, the logo was simply an initial for "Superman", but in the 1978 film, it became the family crest of the House of El, the family of Superman.
Evolution of the symbol
In its original inception in Action Comics #1, Superman's symbol was a letter S with red and blue on a yellow police badge symbol that resembled a shield. The symbol was first changed a few issues later in Action Comics #7. The shield varied over the first few years of the comics, and many times was nothing more than an inverted triangle with an S inside of it.
The shield first became a diamond in the Fleischer cartoon serial Superman. It was black with a red S outlined with white (or occasionally with yellow). The S has varied in size and shape and the diamond shape containing it has also changed size and shape. Extreme examples of this would be the very large logo on the Dean Cain costume from the television series Lois & Clark: The New Adventures of Superman and the comparatively small version of the shield as depicted in the 2006 film Superman Returns. It has, in most incarnations, retained its original color, while changing shape here and there. The classic logo is the basis for virtually all other interpretations of the logo.
In the mid-1990s, when Superman's costume and powers changed briefly, during the "Superman Red/Superman Blue" comic book storylines, the shield changed colors and slightly changed shape, in accordance with the changes in the costume. In 1992's 75th edition of Vol 2, the logo is
|
https://en.wikipedia.org/wiki/Switched%20communication%20network
|
In computer networking and telecommunications, a switched communication network is a communication network which uses switching for connection of two non-adjacent nodes.
Switched communication networks are divided into circuit switched networks, message switched networks, and packet switched networks.
See also
Broadcast communication network
Fully connected network
Network architecture
|
https://en.wikipedia.org/wiki/Ordered%20Bell%20number
|
In number theory and enumerative combinatorics, the ordered Bell numbers or Fubini numbers count the number of weak orderings on a set of elements. Weak orderings arrange their elements into a sequence allowing ties, such as might arise as the outcome of a horse race). Starting from , these numbers are
The ordered Bell numbers may be computed via a summation formula involving binomial coefficients, or by using a recurrence relation. Along with the weak orderings, they count several other types of combinatorial objects that have a bijective correspondence to the weak orderings, such as the ordered multiplicative partitions of a squarefree number or the faces of all dimensions of a permutohedron.
History
The ordered Bell numbers appear in the work of , who used them to count certain plane trees with totally ordered leaves. In the trees considered by Cayley, each root-to-leaf path has the same length, and the number of nodes at distance from the root must be strictly smaller than the number of nodes at distance , until reaching the leaves. In such a tree, there are pairs of adjacent leaves, that may be weakly ordered by the height of their lowest common ancestor; this weak ordering determines the tree. call the trees of this type "Cayley trees", and they call the sequences that may be used to label their gaps (sequences of positive integers that include at least one copy of each positive integer between one and the maximum value in the sequence) "Cayley permutations".
traces the problem of counting weak orderings, which has the same sequence as its solution, to the work of . These numbers were called Fubini numbers by Louis Comtet, because they count the number of different ways to rearrange the ordering of sums or integrals in Fubini's theorem, which in turn is named after Guido Fubini. The Bell numbers, named after Eric Temple Bell, count the number of partitions of a set, and the weak orderings that are counted by the ordered Bell numbers may be interpret
|
https://en.wikipedia.org/wiki/Analog%20delay%20line
|
An analog delay line is a network of electrical components connected in cascade, where each individual element creates a time difference between its input and output. It operates on analog signals whose amplitude varies continuously. In the case of a periodic signal, the time difference can be described in terms of a change in the phase of the signal. One example of an analog delay line is a bucket-brigade device.
Other types of delay line include acoustic (usually ultrasonic), magnetostrictive, and surface acoustic wave devices. A series of resistor–capacitor circuits (RC circuits) can be cascaded to form a delay. A long transmission line can also provide a delay element. The delay time of an analog delay line may be only a few nanoseconds or several milliseconds, limited by the practical size of the physical medium used to delay the signal and the propagation speed of impulses in the medium.
Analog delay lines are applied in many types of signal processing circuits; for example the PAL television standard uses an analog delay line to store an entire video scanline. Acoustic and electromechanical delay lines are used to provide a "reverberation" effect in musical instrument amplifiers, or to simulate an echo. High-speed oscilloscopes used an analog delay line to allow observation of waveforms just before some triggering event.
With the growing use of digital signal processing techniques, digital forms of delay are practical and eliminate some of the problems with dissipation and noise in analog systems.
History
Inductor–capacitor ladder networks were used as analog delay lines in the 1920s. For example, Francis Hubbard's sonar direction finder patent filed in 1921. Hubbard referred to this as an Artificial transmission line. In 1941, Gerald Tawney of Sperry Gyroscope Company filed for a patent on a compact packaging of an inductor–capacitor ladder network that he explicitly referred to as a time delay line.
In 1924, Robert Mathes of Bell Telephone Laborator
|
https://en.wikipedia.org/wiki/Autoimmune%20pancreatitis
|
Autoimmune Pancreatitis (AIP) is an increasingly recognized type of chronic pancreatitis that can be difficult to distinguish from pancreatic carcinoma but which responds to treatment with corticosteroids, particularly prednisone. Although autoimmune pancreatitis is quite rare, it constitutes an important clinical problem for both patients and their clinicians: the disease commonly presents itself as a tumorous mass which is diagnostically indistinguishable from pancreatic cancer, a disease that is much more common in addition to being very dangerous. Hence, some patients undergo pancreatic surgery, which is associated to substantial mortality and morbidity, out of the fear by patients and clinicians to undertreat a malignancy. However, surgery is not a good treatment for this condition as AIP responds well to immunosuppressive treatment. There are two categories of AIP: Type 1 and Type 2, each with distinct clinical profiles.
Type 1 AIP is now regarded as a manifestation of IgG4-related disease, and those affected have tended to be older and to have a high relapse rate. Type 1 pancreatitis, is as such as manifestation of IgG4 disease, which may also affect bile ducts in the liver, salivary glands, kidneys and lymph nodes. Type 2 AIP seems to affect only the pancreas, although about one-third of people with type 2 AIP have associated inflammatory bowel disease. AIP occurring in association with an autoimmune disorder has been referred to as "secondary" or "syndromic" AIP. AIP does not affect long-term survival.
Signs and symptoms
Autoimmune pancreatitis may cause a variety of symptoms and signs, which include pancreatic and biliary (bile duct) manifestations, as well as systemic effects of the disease. Two-thirds of patients present with either painless jaundice due to bile duct obstruction or a "mass" in the head of the pancreas, mimicking carcinoma. As such, a thorough evaluation to rule out cancer is important in cases of suspected AIP.
Type 1 AIP typically
|
https://en.wikipedia.org/wiki/Transporter%20associated%20with%20antigen%20processing
|
Transporter associated with antigen processing (TAP) protein complex belongs to the ATP-binding-cassette transporter family. It delivers cytosolic peptides into the endoplasmic reticulum (ER), where they bind to nascent MHC class I molecules.
The TAP structure is formed of two proteins: TAP-1 and TAP-2, which have one hydrophobic region and one ATP-binding region each. They assemble into a heterodimer, which results in a four-domain transporter.
Function
The TAP transporter is found in the ER lumen associated with the peptide-loading complex (PLC). This complex of β2 microglobulin, calreticulin, ERp57, TAP, tapasin, and MHC class I acts to keep hold of MHC molecules until they have been fully loaded with peptides.
Peptide transport
TAP-mediated peptide transport is a multistep process. The peptide-binding pocket is formed by TAP-1 and TAP-2. Association with TAP is an ATP-independent event, ‘in a fast bimolecular association step, peptide binds to TAP, followed by a slow isomerisation of the TAP complex’. It is suggested that the conformational change in structure triggers ATP hydrolysis and so initiates peptide transport.
Both nucleotide-binding domains (NBDs) are required for peptide translocation, as each NBD cannot hydrolyse ATP alone. The exact mechanism of transport is not known; however, findings indicate that ATP binding to TAP-1 is the initial step in the transport process, and that ATP bound to TAP-1 induces ATP binding in TAP-2. It has also been shown that undocking of the loaded MHC class I is linked to the transport cycle of TAP caused by signals from the TAP-1 subunit.
Transport of mRNA out of the nucleus
Yeast protein Mex67p and human NXF1, also-called TAP, are the two best-characterized NXFs (nuclear transport factors). TAPs mediate the interaction of the messenger ribonucleoprotein particle (mRNP) and the nuclear pore complex (NPC).NXFs bear no resemblance to prototypical nuclear transport receptors of the importin – exportin (karyopherin)
|
https://en.wikipedia.org/wiki/Immersion%20%28mathematics%29
|
In mathematics, an immersion is a differentiable function between differentiable manifolds whose differential pushforward is everywhere injective. Explicitly, is an immersion if
is an injective function at every point of (where denotes the tangent space of a manifold at a point in ). Equivalently, is an immersion if its derivative has constant rank equal to the dimension of :
The function itself need not be injective, only its derivative must be.
A related concept is that of an embedding. A smooth embedding is an injective immersion that is also a topological embedding, so that is diffeomorphic to its image in . An immersion is precisely a local embedding – that is, for any point there is a neighbourhood, , of such that is an embedding, and conversely a local embedding is an immersion. For infinite dimensional manifolds, this is sometimes taken to be the definition of an immersion.
If is compact, an injective immersion is an embedding, but if is not compact then injective immersions need not be embeddings; compare to continuous bijections versus homeomorphisms.
Regular homotopy
A regular homotopy between two immersions and from a manifold to a manifold is defined to be a differentiable function such that for all in the function defined by for all is an immersion, with , . A regular homotopy is thus a homotopy through immersions.
Classification
Hassler Whitney initiated the systematic study of immersions and regular homotopies in the 1940s, proving that for every map of an -dimensional manifold to an -dimensional manifold is homotopic to an immersion, and in fact to an embedding for ; these are the Whitney immersion theorem and Whitney embedding theorem.
Stephen Smale expressed the regular homotopy classes of immersions as the homotopy groups of a certain Stiefel manifold. The sphere eversion was a particularly striking consequence.
Morris Hirsch generalized Smale's expression to a homotopy theory description of the regular homot
|
https://en.wikipedia.org/wiki/Picoplankton
|
Picoplankton is the fraction of plankton composed by cells between 0.2 and 2 μm that can be either prokaryotic and eukaryotic phototrophs and heterotrophs:
photosynthetic
heterotrophic
They are prevalent amongst microbial plankton communities of both freshwater and marine ecosystems. They have an important role in making up a significant portion of the total biomass of phytoplankton communities.
Classification
In general, plankton can be categorized on the basis of physiological, taxonomic, or dimensional characteristics. Subsequently, a generic classification of a plankton includes:
Bacterioplankton
Phytoplankton
Zooplankton
However, there is a simpler scheme that categorizes plankton based on a logarithmic size scale:
Macroplankton (200–2000 μm)
Micro-plankton (20–200 μm)
Nanoplankton (2–20 μm)
This was even further expanded to include picoplankton (0.2–2 μm) and fem-toplankton (0.02–0.2 μm), as well as net plankton, ultraplankton. Now that picoplankton have been characterized, they have their own further subdivisions such as prokaryotic and eukaryotic phototrophs and heterotrophs that are spread throughout the world in various types of lakes and tropic states.
In order to differentiate between autotrophic picoplankton and heterotrophic picoplankton, the autotrophs could have photosynthetic pigments and the ability to show autofluorescence, which would allow for their enumeration under epifluorescence microscopy. This is how minute eukaryotes first became known.
Overall, picoplankton play an essential role in oligotrophic dimicitc lakes because they are able to produce and then accordingly recycle dissolved organic matter (DOM) in a very efficient manner under circumstance when competition of other phytoplankters is disturbed by factors such as limiting nutrients and predators. Picoplankton are responsible for the most primary productivity in oligotrophic gyres, and are distinguished from nanoplankton and microplankton. Because they are small, t
|
https://en.wikipedia.org/wiki/Median%20arcuate%20ligament
|
The median arcuate ligament is a ligament under the diaphragm that connects the right and left crura of diaphragm.
Structure
The median arcuate ligament is formed by the right and left crura of the diaphragm. The crura connect to form an arch, behind which is the aortic hiatus, through which pass the aorta, the azygos vein, and the thoracic duct.
Variation
In between 10% and 24% of people, the median arcuate ligament occurs very low.
Clinical significance
Compression of celiac artery and celiac ganglia by the median arcuate ligament can lead to the median arcuate ligament syndrome, which is characterized by abdominal pain, weight loss, and an epigastric bruit.
See also
Medial arcuate ligament
Lateral arcuate ligament
|
https://en.wikipedia.org/wiki/Eugene%20Nalimov
|
Eugene Nalimov (born Евгений Викторович Нали́мов (Yevgeny Viktorovich Nalimov) in 1965 in Novosibirsk, U.S.S.R.) is a chess programmer and former Microsoft employee, currently working for Context Relevant.
Starting in 1998, he wrote a tablebase generator which included many different endgames. He received a ChessBase award at the ChessBase meeting in Maastricht in 2002 for his work.
Nalimov has an M.Sc. from Novosibirsk State University. He started a Ph.D. dissertation, but did not finish it.
See also
Nalimov tablebase
|
https://en.wikipedia.org/wiki/Dark%20therapy
|
Dark therapy is the practice of keeping people in complete darkness for extended periods of time in an attempt to treat psychological conditions. The human body produces the melatonin hormone, which is responsible for supporting the circadian rhythms. Darkness seems to help keep these circadian rhythms stable.
Dark therapy was said to be founded by a German anthropologist by the name of Holger Kalweit. A form of dark therapy is to block blue wavelength lights to stop the disintegration of melatonin.
This dark therapy concept was originated back in 1998 from a research which suggested that systematic exposure to darkness might alter people's mood. Original studies enforced 14 hours of darkness to bipolar patients for three nights straight. This study showed a decrease of manic episodes in the patients. Participation in this study became unrealistic, as patients did not want to participate in treatment of total darkness from 6 p.m. to 8 a.m. More recently, with the discovery of intrinsically photosensitive retinal ganglion cells, it has been hypothesized that similar results could be achieved by blocking blue light, as a potential treatment for bipolar disorder. Moreover, researchers exploring blue-blocking glasses have so far considered dark therapy only as an add-on treatment to be used together with psychotherapy, rather than a replacement for other therapies.
Another study consisting of healthy females and males suggested that a single exposure to blue light after being kept in a dim setting could reduce sleepiness. Contrary to the original claim that decreasing the amount of blue light could help with insomnia, this study suggested improvement with blue light exposure.
See also
Clinical depression
Light therapy
Seasonal affective disorder
Sleep hygiene
|
https://en.wikipedia.org/wiki/Engineering%20technician
|
An engineering technician is a professional trained in skills and techniques related to a specific branch of technology, with a practical understanding of the relevant engineering concepts. Engineering technicians often assist in projects relating to research and development, or focus on post-development activities like implementation or operation.
The Dublin Accord was signed in 2002 as an international agreement recognizing engineering technician qualifications. The Dublin Accord is analogous to the Washington Accord for engineers and the Sydney Accord for engineering technologists.
Nature of work
Engineering technicians help solve technical problems in many ways. They build or set up equipment, conduct experiments, collect data, and calculate results. They might also help to make a model of new equipment. Some technicians work in quality control, checking products, tests, and collecting data. In manufacturing, they help to design and develop products. They also find ways to produce things efficiently. There are multiple fields in this job such as; software design, repair, etc.
They may also be people who produce technical drawings or engineering drawings.
Engineering technicians are responsible for using the theories and principles of science, engineering, and mathematics to solve problems and come up with solutions in the research, design, development, manufacturing, sales, construction, inspection, and maintenance of systems and products. Engineering technicians help engineers and scientists in researching and developing, while some other engineering technicians may be responsible for inspections, quality control, and processes which may include conducting tests and data collection.
Education
Engineering technician diplomas and two-year degrees are generally offered by technical schools and non-university higher education institutions like colleges of further education, vocational schools, and community colleges. Many four-year colleges and universities off
|
https://en.wikipedia.org/wiki/Cys-loop%20receptor
|
The Cys-loop ligand-gated ion channel superfamily is composed of nicotinic acetylcholine, GABAA, GABAA-ρ, glycine, 5-HT3, and zinc-activated (ZAC) receptors. These receptors are composed of five protein subunits which form a pentameric arrangement around a central pore. There are usually 2 alpha subunits and 3 other beta, gamma, or delta subunits (some consist of 5 alpha subunits).
The name of the family refers to a characteristic loop formed by 13 highly conserved amino acids between two cysteine (Cys) residues, which form a disulfide bond near the N-terminal extracellular domain.
Cys-loop receptors are known only in eukaryotes, but are part of a larger family of pentameric ligand-gated ion channels. Only the Cys-loop clade includes the pair of bridging cysteine residues. The larger superfamily includes bacterial (e.g. GLIC) as well as non-Cys-loop eukaryotic receptors, and is referred to as "pentameric ligand-gated ion channels", or "Pro-loop receptors".
All subunits consist of a large conserved extracellular N-terminal domain, three highly conserved transmembrane domains, a cytoplasmic loop of variable size and amino acid sequence, and a fourth transmembrane region with a relatively short and variable extracellular C-terminal domain.
Neurotransmitters bind at the interface between subunits in the extracellular domain.
Each subunit contains four membrane-spanning alpha helices (M1, M2, M3, M4). The pore is formed primarily by the M2 helices. The M3-M4 linker is the intracellular domain that binds the cytoskeleton.
Binding
Most knowledge about cys-loop receptors comes from inferences made while studying various members of the family. Research on the structures of acetylcholine binding proteins (AChBP) determined that the binding sites consist of six loops, with the first three forming the principal face and the next three forming the complementary face. The last loop on the principal face wraps over the ligand in the active receptor. This site is also abu
|
https://en.wikipedia.org/wiki/Terminal%20restriction%20fragment%20length%20polymorphism
|
Terminal restriction fragment length polymorphism (TRFLP or sometimes T-RFLP) is a molecular biology technique for profiling of microbial communities based on the position of a restriction site closest to a labelled end of an amplified gene. The method is based on digesting a mixture of PCR amplified variants of a single gene using one or more restriction enzymes and detecting the size of each of the individual resulting terminal fragments using a DNA sequencer. The result is a graph image where the x-axis represents the sizes of the fragment and the y-axis represents their fluorescence intensity.
Background
TRFLP is one of several molecular methods aimed to generate a fingerprint of an unknown microbial community. Other similar methods include DGGE, TGGE, ARISA, ARDRA, PLFA, etc.
These relatively high throughput methods were developed in order to reduce the cost and effort in analyzing microbial communities using a clone library. The method was first described by Avaniss-Aghajani et al in 1994 and later by Liu in 1997 which employed the amplification of the 16S rDNA target gene from the DNA of several isolated bacteria as well as environmental samples.
Since then the method has been applied for the use of other marker genes such as the functional marker gene pmoA to analyze methanotrophic communities.
Method
Like most other community analysis methods, TRFLP is also based on PCR amplification of a target gene. In the case of TRFLP, the amplification is performed with one or both the primers having their 5’ end labeled with a fluorescent molecule. In case both primers are labeled, different fluorescent dyes are required. While several common fluorescent dyes can be used for the purpose of tagging such as 6-carboxyfluorescein (6-FAM), ROX, carboxytetramethylrhodamine (TAMRA, a rhodamine-based dye), and hexachlorofluorescein (HEX), the most widely used dye is 6-FAM. The mixture of amplicons is then subjected to a restriction reaction, normally using a four-cutter re
|
https://en.wikipedia.org/wiki/Gastrocolic%20reflex
|
The gastrocolic reflex or gastrocolic response is a physiological reflex that controls the motility, or peristalsis, of the gastrointestinal tract following a meal. It involves an increase in motility of the colon consisting primarily of giant migrating contractions, or migrating motor complexes, in response to stretch in the stomach following ingestion and byproducts of digestion entering the small intestine. Thus, this reflex is responsible for the urge to defecate following a meal. The small intestine also shows a similar motility response. The gastrocolic reflex's function in driving existing intestinal contents through the digestive system helps make way for ingested food.
The reflex was demonstrated by myoelectric recordings in the colons of animals and humans, which showed an increase in electrical activity within as little as 15 minutes after eating. The recordings also demonstrated that the gastrocolic reflex is uneven in its distribution throughout the colon. The sigmoid colon is more greatly affected than the rest of the colon in terms of a phasic response, recurring periods of contraction followed by relaxation, in order to propel food distally into the rectum; however, the tonic response across the colon is uncertain. These contractions are generated by the muscularis externa stimulated by the myenteric plexus. When pressure within the rectum becomes increased, the gastrocolic reflex acts as a stimulus for defecation. A number of neuropeptides have been proposed as mediators of the gastrocolic reflex. These include serotonin, neurotensin, cholecystokinin, prostaglandin E1, and gastrin.
Coffee can induce a significant response, with 29% of subjects in a study reporting an urge to defecate after ingestion, and manometry showing a reaction typically between 4 and 30 minutes after consumption and potentially lasting for more than 30 minutes. Decaffeinated coffee is also capable of generating a similar effect, albeit slightly weaker. Essentially, this m
|
https://en.wikipedia.org/wiki/Polypyrimidine%20tract
|
The polypyrimidine tract is a region of pre-messenger RNA (mRNA) that promotes the assembly of the spliceosome, the protein complex specialized for carrying out RNA splicing during the process of post-transcriptional modification. The region is rich with pyrimidine nucleotides, especially uracil, and is usually 15–20 base pairs long, located about 5–40 base pairs before the 3' end of the intron to be spliced.
A number of protein factors bind to or associate with the polypyrimidine tract, including the spliceosome component U2AF and the polypyrimidine tract-binding protein (PTB), which plays a regulatory role in alternative splicing. PTB's primary function is in exon silencing, by which a particular exon region normally spliced into the mature mRNA is instead left out, resulting in the expression of an isoform of the protein for which the mRNA codes. Because PTB is ubiquitously expressed in many higher eukaryotes, it is thought to suppress the inclusion of "weak" exons with poorly defined splice sites. However, PTB binding is not sufficient to suppress "robust" exons.
The suppression or selection of exons is critical to the proper expression of tissue-specific isoforms. For example, smooth muscle and skeletal muscle express alternate isoforms distinguished by mutually exclusive exon selection in alpha-tropomyosin.
|
https://en.wikipedia.org/wiki/Langton%27s%20loops
|
Langton's loops are a particular "species" of artificial life in a cellular automaton created in 1984 by Christopher Langton. They consist of a loop of cells containing genetic information, which flows continuously around the loop and out along an "arm" (or pseudopod), which will become the daughter loop. The "genes" instruct it to make three left turns, completing the loop, which then disconnects from its parent.
History
In 1952 John von Neumann created the first cellular automaton (CA) with the goal of creating a self-replicating machine. This automaton was necessarily very complex due to its computation- and construction-universality. In 1968 Edgar F. Codd reduced the number of states from 29 in von Neumann's CA to 8 in his. When Christopher Langton did away with the universality condition, he was able to significantly reduce the automaton's complexity. Its self-replicating loops are based on one of the simplest elements in Codd's automaton, the periodic emitter.
Specification
Langton's Loops run in a CA that has 8 states, and uses the von Neumann neighborhood with rotational symmetry. The transition table can be found here: .
As with Codd's CA, Langton's Loops consist of sheathed wires. The signals travel passively along the wires until they reach the open ends, when the command they carry is executed.
Colonies
Because of a particular property of the loops' "pseudopodia", they are unable to reproduce into the space occupied by another loop. Thus, once a loop is surrounded, it is incapable of reproducing, resulting in a coral-like colony with a thin layer of reproducing organisms surrounding a core of inactive "dead" organisms. Unless provided unbounded space, the colony's size will be limited. The maximum population will be asymptotic to , where A is the total area of the space in cells.
Encoding of the genome
The loops' genetic code is stored as a series of nonzero-zero state pairs. The standard loop's genome is illustrated in the picture at the to
|
https://en.wikipedia.org/wiki/Uterus%20didelphys
|
Uterus didelphys (sometimes also uterus didelphis) represents a uterine malformation where the uterus is present as a paired organ when the embryogenetic fusion of the Müllerian ducts fails to occur. As a result, there is a double uterus with two separate cervices, and possibly a double vagina as well. Each uterus has a single horn linked to the ipsilateral fallopian tube that faces its ovary.
Most non-human mammals do not have a single uterus with no separation of horns. Marsupials and rodents have a double uterus (uterus duplex). In other animals (e.g. nematodes), the term 'didelphic' refers to a double genital tract, as opposed to monodelphic, with a single tract.
Signs and symptoms
Persons with the condition may be asymptomatic and unaware of having a double uterus. However, a study by Heinonen showed that certain conditions are more common. In his study of 26 women with a double uterus gynecological complaints included dysmenorrhea and dyspareunia. All patients displayed a double vagina. The fetal survival rate in 18 patients who delivered was 67.5%. Premature delivery occurred in 21% of the pregnancies. Breech presentation occurred in 43% of women and cesarean section was performed in 82% of the cases.
Cause
The uterus is formed during embryogenesis by the fusion of the two paramesonephric ducts (also called Müllerian ducts). This process usually fuses the two Müllerian ducts into a single uterine body but fails to take place in these affected women who maintain their double Müllerian systems. A didelphic uterus will have a double cervix and is usually associated with a double vagina. The cause of the fusion failure is not known. Associated defects may affect the vagina, the renal system and, less commonly, the skeleton.
The condition is less common than these other uterine malformations: arcuate uterus, septate uterus, and bicornuate uterus. It has been estimated to occur in 1/3,000 women.
Syndrome
A specific association of uterus didelphys (double ute
|
https://en.wikipedia.org/wiki/Geriatric%20care%20management
|
Geriatric care management is the process of planning and coordinating care of the elderly and others with physical and/or mental impairments to meet their long term care needs, improve their quality of life, and maintain their independence for as long as possible. It entails working with persons of old age and their families in managing, rendering and referring various types of health and social care services. Geriatric care managers accomplish this by combining a working knowledge of health and psychology, human development, family dynamics, public and private resources as well as funding sources, while advocating for their clients throughout the continuum of care. For example, they may assist families of older adults and others with chronic needs such as those suffering from Alzheimer's disease or other dementia.
Overview
Geriatric care management integrates health care and psychological care with other needed services such as: housing, home care services, nutritional services, assistance with activities of daily living, socialization programs, as well as financial and legal planning (e.g. banking, trusts). A care plan tailored for specific circumstances is prepared after a comprehensive assessment has taken place, and is continuously monitored and modified as needed. A comprehensive geriatric care assessment is thorough and can take anywhere from two to five hours in length, this of course is broken down into two or three assessment visits with the patient/family members. The comprehensive assessment is really a compilation of smaller individual assessments with the first one being a primary intake assessment which includes demographic type data as well as a health history, social history, and legal/financial history. From there, a medication profile assessment is included, as well as an assessment of ADLs (activities of daily living) and IADLs (instrumental activities of daily living). In addition other assessments may include; falls risk assessment, home safe
|
https://en.wikipedia.org/wiki/List%20of%20chemical%20process%20simulators
|
This is a list of software used to simulate the material and energy balances of chemical process plants. Applications for this include design studies, engineering studies, design audits, debottlenecking studies, control system check-out, process simulation, dynamic simulation, operator training simulators, pipeline management systems, production management systems, digital twins.
See also
Chemical engineering
Process simulation
Process engineering
|
https://en.wikipedia.org/wiki/Rastrum
|
A rastrum () or raster is a five-pointed writing implement used in music manuscripts to draw parallel staff lines when drawn horizontally across a blank piece of sheet music. The word "raster" is derived from the Latin for "rake". Rastra were used to draw lines on paper that had not been pre-ruled, and were widely used in Europe until printed staff paper became cheap and common in the nineteenth century. Some rastra are able to draw more than one staff at a time. Rastrology, the study of the use of the rastrum, is a branch of music manuscript studies that uses information about the rastrum to help find the date and provenance of musical materials.
Modern variants
In recent years, rastra made of five ballpoint pens have been marketed to students and composers.
It was common in primary and secondary schools to use rastra that use chalk on a chalk board for music education. They may be called staff liners. An alternative is to use a chalk board with staff lines etched in or taped on.
Some rastra hold markers for use on whiteboards.
Another variant is the so-called "Stravigor", a wheeled instrument that Stravinsky attempted to patent around 1911. He used them extensively in his compositional sketchbooks.
|
https://en.wikipedia.org/wiki/Piove%20%28Ciao%2C%20ciao%20bambina%29
|
"Piove (Ciao, ciao bambina)" ("It's raining [Bye, bye baby]") is an Italian song written by Domenico Modugno (music) and Eduardo Verde (lyrics). It won first prize at the 1959 Sanremo Music Festival, where it was performed twice, once by Modugno and once by Johnny Dorelli.
Dalida recorded a song in French as "Ciao ciao bambina", which became a big hit in France and Canada and a pop standard in the francophone world. It was used in Ralph Lauren commercial for their fall 2021 collection.
Background
The song is a dramatic ballad, with Modugno telling his lover that he knows their relationship is about to come to a close. He asks her for one more kiss and then tells her not to turn back as she walks away from him, because he still has feelings for her.
Eurovision
The song was chosen as the Italian entry in the Eurovision Song Contest 1959 and Modugno was chosen to perform it. The song was performed third on the night, following 's Birthe Wilke with "Uh, jeg ville ønske jeg var dig" and preceding 's Jacques Pills with "Mon ami Pierrot". At the close of voting, it had received 9 points, placing 6th in a field of 11.
It was succeeded as Italian representative at the 1960 contest by Renato Rascel with "Romantica".
Charts
Modugno's version
Dalida's version
Other recordings
Dalida covered it in Italian and was the first one to record a French version. The Italian version remained unreleased until a posthoumus album Italia mia in 1991. The French version was first issued on EP in 1959 and was the leading track of her album Le disque d'or de Dalida the same year.
In 1959 the song entered the Hong Kong Hit Parade after being recorded by a local group – The Yee Tin Tong Mandolin Band – and released by Diamond Records (B-side: "Oh Marie").
Also in 1959, French bandleader Jacky Noguez, along with his Musuette Orchestra, recorded an instrumental version which peaked at #24 on the US Hot 100.
In 1961, this song was covered by Hong Kong female singer Kong Ling () on her LP albu
|
https://en.wikipedia.org/wiki/Jesse%20Reklaw
|
Jesse Reklaw (born 1971) is an American cartoonist and painter, author of the syndicated dream-based comic strip Slow Wave.
Biography
Reklaw was born in Berkeley, California and grew up in Sacramento, studied at UC Santa Cruz, and completed a master's degree in computer science at Yale University. In 1995, while pursuing a Ph.D. in artificial intelligence, he began self-publishing comics in his dream-themed series Concave Up. At the same time, he developed the weekly strip Slow Wave; when he began to have some success in syndicating it, he dropped out of Yale to work as a cartoonist. He lives in Portland, Oregon, with his cat, Littles, who appears in many of his strips and zines.
Slow Wave
Slow Wave is "a collective dream diary authored by people from around the world." Readers email their dreams to Reklaw, who illustrates them in a classic four panel cartoon which credits the dreamer as co-author. Reklaw pares down each dream he selects to a few sentences. Reklaw has said he likes dreams because they have "their own logic and a natural dada-like humor." Examples of Slow Wave stories include one in which "a man is pursued by an all-knowing ham"; one in which "the Royal Hole in the Earth Society discusses an award for the best hole filled with water"; and "one about a man who rode a unicorn to distant mountaintops in search of the world's only bathroom".
Slow Wave has been published in alternative newspapers and on the web since 1995. An anthology of Slow Wave strips was published in the book Dreamtoons. Slow Wave has also been published in Dream Time, the newsletter of the Association of the Study of Dreams, and two Slow Wave strips appeared in the textbook Introduction to Psychology, 5E by James Kalat, published by Brooks/Cole.
Other works
Reklaw's work has frequently appeared in small-press anthologies and self-published minicomics, many of which are available through the small-press comics distributor Global Hobo, which he co-operates. He is also the design
|
https://en.wikipedia.org/wiki/The%20Last%20Dragon%20%282004%20film%29
|
The Last Dragon, known as Dragons: A Fantasy Made Real in the United States, and also known as Dragon's World in other countries, is a 2004 British docufiction made by Darlow Smithson Productions for Channel Four and broadcast on both Channel Four and Animal Planet.
It posits a speculative evolution of dragons from the Cretaceous period up to the 15th century, and suppositions about what dragon life and behaviour might have been like if they had existed and evolved. It uses the premise that the ubiquity of dragons in world mythology suggests that dragons could have existed. They are depicted as a scientifically feasible species of reptile that could have evolved, somewhat similar to the depiction of dragons in the Dragonology series of books. The dragons featured in the show were designed by John Sibbick.
The programme switches between two stories. The first uses CGI to show the dragons in their natural habitat throughout history. The second shows the story of a modern-day scientist at a museum, Dr. Tanner, who believes in dragons. When the frozen remains of an unknown creature are discovered in the Carpathian Mountains, Tanner, and two colleagues from the museum, undertake the task of examining the specimen to try to save his reputation. Once there, they discover that the creature is a dragon. Tanner and his colleagues set about working out how it lived and died.
Plot summary
The docufiction features two interwoven stories. Jack Tanner, an American paleontologist working for the Natural History Museum in London, suggests the theory that a carbonised Tyrannosaurus rex skeleton on display was killed by a prehistoric dragon, causing him to believe that the legends were more than myth. This ruins Tanner's reputation. As viewed in a flashback, Tanner's theory is proven true, as said Tyrannosaurus battles a female dragon in the Cretaceous but is mortally wounded. The female, with two legs and two wings, dies from her wounds, forcing her son to survive on his own, esc
|
https://en.wikipedia.org/wiki/Nomarski%20prism
|
A Nomarski prism is a modification of the Wollaston prism that is used in differential interference contrast microscopy. It is named after its inventor, Polish and naturalized-French physicist Georges Nomarski. Like the Wollaston prism, the Nomarski prism consists of two birefringent crystal wedges (e.g. quartz or calcite) cemented together at the hypotenuse (e.g. with Canada balsam). One of the wedges is identical to a conventional Wollaston wedge and has the optical axis oriented parallel to the surface of the prism. The second wedge of the prism is modified by cutting the crystal so that the optical axis is oriented obliquely with respect to the flat surface of the prism. The Nomarski modification causes the light rays to come to a focal point outside the body of the prism, and allows greater flexibility so that when setting up the microscope the prism can be actively focused.
See also
Glan–Foucault prism
Glan–Thompson prism
Nicol prism
Prism (optics)
Rochon prism
Sénarmont prism
|
https://en.wikipedia.org/wiki/Netgear%20DG834%20%28series%29
|
The DG834 series are popular ADSL modem router products from Netgear. The devices can be directly connected to the phone line and establish an ADSL broadband Internet connection to the ISP and share it among several computers via 802.3 Ethernet and (on many models) 802.11b/g wireless data links.
These devices are popular among ISPs as they provide an all in one solution (ADSL modem/router/firewall/switch), which is ideal for home broadband users. The Netgear UK website claims the DG834G is the most popular wireless router in the UK and lists five awards that it has received.
The DG834G is perhaps the most popular product of the series, and has been produced in five versions. All versions have Wi-Fi.
The DG834 (without the G suffix) is the same product but without Wi-Fi. Wi-Fi can be added later by plugging in a wireless access point although this then occupies one of the RJ45 ports.
The DG834GT is a similar product - it looks like a DG834G v2 or v3, but has a Broadcom chipset like a DG834G v4 and supports Atheros Super G which can achieve a 108 Mbit/s signaling rate (double that of standard 802.11g). In the United Kingdom, many DG834GT routers were supplied by Sky Broadband and are branded with a Sky logo. Sky later supplied a DG934G router, which is a DG834G v3 router in a black case.
The DG834GB is similar to DG834GT, have Broadcom chipset, but support only 54Mbit/s wifi. It has modifications to support Annex-B ADSL.
The DG834PN model has Wi-Fi but no external antenna. It has six internal antennas, and is easily recognised by the blue dome on the top of its case.
The DG834GSP model is locked to a particular ISP.
Firmware
Netgear's stock firmware on all products in the series runs Linux. This has led to popularity among computer enthusiasts as it provides a cheaper alternative to a Linux router. Much of the Netgear firmware is built from open-source software, and Netgear provide this source code and the build system to enable users to reassemble a
|
https://en.wikipedia.org/wiki/Impedance%20of%20free%20space
|
In electromagnetism, the impedance of free space, , is a physical constant relating the magnitudes of the electric and magnetic fields of electromagnetic radiation travelling through free space. That is,
where is the electric field strength and is the magnetic field strength. Its presently accepted value is
.
Where Ω is the ohm, the SI unit of electrical resistance. The impedance of free space (that is the wave impedance of a plane wave in free space) is equal to the product of the vacuum permeability and the speed of light in vacuum . Before 2019, the values of both these constants were taken to be exact (they were given in the definitions of the ampere and the metre respectively), and the value of the impedance of free space was therefore likewise taken to be exact. However, with the redefinition of the SI base units that came into force on 20 May 2019, the impedance of free space is subject to experimental measurement because only the speed of light in vacuum retains an exactly defined value.
Terminology
The analogous quantity for a plane wave travelling through a dielectric medium is called the intrinsic impedance of the medium, and designated (eta). Hence is sometimes referred to as the intrinsic impedance of free space, and given the symbol . It has numerous other synonyms, including:
wave impedance of free space,
the vacuum impedance,
intrinsic impedance of vacuum,
characteristic impedance of vacuum,
wave resistance of free space.
Relation to other constants
From the above definition, and the plane wave solution to Maxwell's equations,
where
is the magnetic constant, also known as the permeability of free space ≈ Henries/meter,
is the electric constant, also known as the permittivity of free space ≈ Farads/meter,
is the speed of light in free space.
is the elementary charge,
is the fine structure constant, and
is Planck's constant.
The reciprocal of is sometimes referred to as the admittance of free space and represented by th
|
https://en.wikipedia.org/wiki/Claudia%20Mitchell
|
Claudia Mitchell (born 1980) is a former US Marine whose left arm was amputated near the shoulder following a motorcycle crash in 2004. She became the first woman to be outfitted with a bionic arm. The arm is controlled through muscles in her chest and side, which in turn are controlled by the nerves that had previously controlled her real arm. The nerves were rerouted to these muscles in a process of targeted reinnervation.
Her prosthesis, a prototype developed by the Rehabilitation Institute of Chicago was one of the most advanced prosthetic arms developed to date.
|
https://en.wikipedia.org/wiki/Embedded%20SQL
|
Embedded SQL is a method of combining the computing power of a programming language and the database manipulation capabilities of SQL. Embedded SQL statements are SQL statements written inline with the program source code, of the host language. The embedded SQL statements are parsed by an embedded SQL preprocessor and replaced by host-language calls to a code library. The output from the preprocessor is then compiled by the host compiler. This allows programmers to embed SQL statements in programs written in any number of languages such as C/C++, COBOL and Fortran. This differs from SQL-derived programming languages that don't go through discrete preprocessors, such as PL/SQL and T-SQL.
The SQL standards committee defined the embedded SQL standard in two steps: a formalism called Module Language was defined, then the embedded SQL standard was derived from Module Language. The SQL standard defines embedding of SQL as embedded SQL and the language in which SQL queries are embedded is referred to as the host language. A popular host language is C. Host language C and embedded SQL, for example, is called Pro*C in Oracle and Sybase database management systems, ESQL/C in Informix, and ECPG in the PostgreSQL database management system.
SQL may also be embedded in languages like PHP etc.
The SQL standard SQL:2023 is available through purchase and contains chapter 21 Embedded SQL and its syntax rules.
Database systems that support embedded SQL
Altibase
C/C++
APRE is an embedded SQL precompiler provided by Altibase Corp. for its DBMS server.
IBM Db2
IBM Db2 for Linux, UNIX and Windows supports embedded SQL for C, C++, Java, COBOL, FORTRAN and REXX although support for FORTRAN and REXX has been deprecated.
IBM Informix
IBM Informix version 14.10 for Linux, Unix, and Windows supports embedded SQL for C. }
Microsoft SQL Server
C/C++
Embedded SQL for C has been deprecated as of Microsoft SQL Server 2008 although earlier versions of the product support it.
Mimer SQ
|
https://en.wikipedia.org/wiki/Klotz%20Digital
|
Klotz Digital AG was a manufacturer of audio media products based in Munich, Germany; founded in 1990 and acquired in 2009. The company was active in the two business segments Public Address and Radio & TV Broadcast. Its products include systems for radio broadcast, television broadcast, live sound, public address, and commercial sound.
History
Klotz Digital was founded in 1990 by Thomas Klotz.
The company's products were first used in live sound installations and later in the 90s found their way into broadcast facilities. In 2002 the company entered into the public address market with a digital public address product line named Varizone. The live sound, broadcast, and public address markets were the main markets for the company.
At the end of 2009, Klotz Digital AG was acquired by United Screens Media AG. Thomas Klotz resigned from his position, and Dr. Andreas Gruettner, known as CEO of United Screens Media AG, was appointed Klotz Digital’s new CEO.
The company was then renamed to QPhonics AG and finally after its insolvency in 2013 turned into a company named Qphonics GmbH which went into insolvency in 2015.
Klotz Communications GmbH, the new company from Thomas Klotz and his partner Andre Sauer, has purchased the assets of the former Qphonics GmbH from the company's insolvency lawyers. Klotz Communications is now the sole owner of all intellectual property, including hardware and software, and controls all licensing, maintenance and upgrades.
Products
The broadcast products range from stand-alone on-air mixing consoles for radio and TV stations to a suite of products to enable efficient workflows in large broadcast facilities and production studios.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.