title
stringlengths
1
149
section
stringlengths
1
1.9k
text
stringlengths
13
73.5k
Interpersonal deception theory
Emotion
Emotion plays a central role in IDT as a motivation and result of deception. Emotion can motivate deception, with the sender relying on relevant knowledge (informational, relational and behavioral familiarity) to achieve goals such as self-gratification, avoiding a negative emotional outcome or creating a negative emotional outcome for the target of deception. Emotion can be a result of deception, since a physical response occurs in the sender (usually arousal and negative affect).
Interpersonal deception theory
Emotion
Leakage The concept of leakage predates the development of IDT and was developed by Miron Zuckerman, et al., who created a four-factor model to explain when and why leakage is apt to occur. Leakage in deception is manifested most overtly in nonverbal signals; studies indicate that over 90 percent of emotional meaning is communicated non-verbally. Humans are sensitive to body signals, and communication is often ambiguous; something is communicated verbally and its opposite non-verbally. Leakage occurs when nonverbal signals betray the true content of a contradictory verbal message. Facial expression is difficult to read, and the Facial Action Coding System (FACS) is a means of uncovering deception. Small facial movements, known as micro-expressions, can be detected in this system using action units.
Interpersonal deception theory
Emotion
Micro-expressions and action units Action units (AUs) can be examined frame by frame, since these micro-expressions are often rapid. Paul Ekman’s research in facial deception has found several constants in certain expressions, with the action units relating to lip-corner pulling (AU12) and cheek-raising (AU6) qualifiers for happiness in most people. Brow-lowering (AU4) and lip-stretching (AU20) are disqualifiers for happiness. According to Ekman, emotional leakage appears in these fleeting expressions.
Interpersonal deception theory
Emotion
Ekman's research has received much attention in the popular media, but it also has been heavily criticized on both experimental and theoretical grounds. His theory that micro-expressions are effective markers for detecting deception is no longer considered to be well-supported. One criticism is that the theory "confounds emotion and deception", like use of the polygraph in assuming that an innocent person and a guilty one will feel different emotions in a situation which has severe possible outcomes. Concerns with such emotionally-based theories have led later researchers to develop theories based on cognition and cognitive processes.
Interpersonal deception theory
Emotion
Facial expression Seven basic emotions are communicated through facial expression: anger, fear, sadness, joy, disgust, surprise and contempt. These emotions are recognized universally. These expressions are innate or develop through socialization. Cultures have a variety of rules governing the social use of facial expression; for example, the Japanese discourage the display of negative emotions. Individuals may find it difficult to control facial expression, and the face may "leak" information about how they feel. Gaze People use eye contact to indicate threat, intimacy and interest. Eye contact is used to regulate turn-taking in conversation, and indicates how interested the listener (receiver) is in what the speaker is saying. Receivers make eye contact about 70–75 percent of the time, with each contact averaging 7.8 seconds. Gesture Gestures are among the most culture-specific forms of nonverbal communication, and may lead to misinterpretation. Involuntary self-touching, such as touching the face, scratching, gripping the hands together or putting the hands in (or near) the mouth, occur when people experience intense emotions such as depression, elation or extreme anxiety. Ekman and Friesen demonstrated gesture leakage by showing films of a depressed woman to a group, which was asked to judge the woman's mood. Those shown only the woman's face thought she was happy and cheerful, while the group who saw only her body thought she was tense and disturbed.
Interpersonal deception theory
Emotion
Touch Touch can reassure and indicate understanding. Humans touch one another in sexual intimacy, affiliation and understanding; in greetings and farewells; as an act of aggression, and to demonstrate dominance. According to Argyle in 1996, there "appear to be definite rules which permit certain kinds of touch, between certain people, on certain occasions only. Bodily contact outside these narrow limits is unacceptable".
Interpersonal deception theory
Criticism
DePaulo, Ansfield and Bell questioned IDT: "We can find the 'why' question in Buller and Burgoon's synthesis. There is no intriguing riddle or puzzle that needs to be solved, and no central explanatory mechanism is ever described." Although they praised Buller and Burgoon's 18 propositions as a comprehensive description of the timeline of deceptive interactions, they said the propositions lacked the interconnectedness and predictive power of a unifying theory. DePaulo et al. criticized IDT for failing to distinguish between interactive communication (which emphasizes the situational and contextual aspects of communicative exchanges) from interpersonal communication, which emphasizes exchanges in which the sender and receiver make psychological predictions about the other's behavior based on specific prior knowledge; this conceptual ambiguity limited IDT's explanatory power. However, Buller and Burgoon responded to this type of critique, saying the theory "was not meant to advance a single explanatory mechanism but instead to fit a broad communicative perspective on the phenomenon and to include multiple causal mechanisms that fit a general interpersonal communication account of the process."Park and Levine (2015) provide additional commentary questioning IDT stating that "because both interactive and noninteractive experiments lead to the same conclusions about truth-bias and accuracy regardless of interactivity, interactivity is not the all-important consideration as IDT claims." In IDT, a crucial emphasis is placed in the aspect of interactivity to determine deception detection accuracy. However, Park and Levine do not see an empirical basis for this foundational claim of IDT.Park and Levine provide additional commentary questioning IDT stating that "because both interactive and noninteractive experiments lead to the same conclusions about truth-bias and accuracy regardless of interactivity, interactivity is not the all-important consideration as IDT claims." In IDT, a crucial emphasis is placed in the aspect of interactivity to determine deception detection accuracy. However, Park and Levine do not see an empirical basis for this foundational claim of IDT.
Interpersonal deception theory
Experiment
Buller and Burgoon asked participants to put themselves in the following situation: "You've been dating Pat for nearly three years and feel quite close in your relationship. Since Pat goes to a different school upstate, the two of you have agreed to date other people. Nevertheless, Pat is quite jealous and possessive. During the school year you see Pat only occasionally, but you call each other every Sunday and talk for over an hour. On Friday one of your friends invites you to a party on Saturday night, but the party is 'couples only' so you need a date. There's no way that Pat could come down for the weekend. You decide to ask someone from your class who you've been attracted to so that you can go to the party. The two of you go and have a great time. On Sunday afternoon, there's a knock on your door and it's Pat. Pat walks in and says, 'Decided to come down and surprise you, tried calling you all last night, but you weren't around. What were you doing?'" The researchers listed three possible responses: lying ("I was at the library getting ready for my theory exam"), telling part of the truth while omitting important details ("Went to a party at a friend's apartment") or being intentionally vague or evasive ("Went out for a while").
Interpersonal deception theory
Online dating
Research on the use of deception in online dating has shown that people are generally truthful about themselves with the exception of physical attributes to appear more attractive. Most online deception is subtle with slight exaggerations, representing people's attempts to portray themselves in the best possible light. Of all online contexts, online dating appears the most prone to deception. In general, no matter the setting, people are more likely to be deceptive when looking for a date than in other social situations.
Interpersonal deception theory
Online dating
Research suggests that while slight misrepresentations on online dating sites are quite common, major deceptions are actually rare. It seems that those who engage in online dating realize that while they want to make the best possible impression, if they want to pursue an offline relationship, they can't begin it with outright falsehoods that will quickly be revealed. One survey of over 5,000 users of online dating sites how likely they were to misrepresent themselves in areas such as appearance and job information. The average rating on these items was a 2 on a 10-point scale, indicating a relatively low level of deception overall.
Interpersonal deception theory
Online dating
Some people are more prone to deceptive behavior online than others, such as those with high sensation-seeking tendencies, and those who show addictive behavior toward the Internet. Conversely, those who are introverted or have high tendencies for social anxiety are especially likely to be honest about their personalities online, revealing hidden aspects of the self that they would not normally show to others offline.According to the Scientific American, "nine out of ten online daters will fib about their height, weight, or age" such that men were more likely to lie about height while women were more likely to lie about weight. In addition, those high in the trait of self-monitoring are more likely to be dishonest on dating websites. In all aspects of their social lives, self-monitors are concerned with outward appearance and adapt their behavior to match the social situation. Thus, they also tend to be more deceptive in their attempts to attract dates both offline and online.In a study conducted by Toma and Hancock, "less attractive people were found to be more likely to have chosen a profile picture in which they were significantly more attractive than they were in everyday life." Both genders used this strategy in online dating profiles, but women more so than men. Additionally, the researchers found that those deemed less attractive were more likely to express deception in the areas of physical attractiveness such as height and weight.
Interpersonal deception theory
Online dating
A qualitative study investigated deception in online dating. The study focused on four questions: (1) About what characteristics are online daters deceptive? (2) What motivation do online daters have for their deception of others in the online-dating environment? (3) What perceptions do online daters have about other daters' deceit towards them in the online-dating environment? (4) How does deception affect romantic relationships formed in the online-dating environment? In an online survey, data was collected from 15 open-ended questions. The study had 52 participants, ranging in age from 21 to 37, and found that most online daters consider themselves (and others) mostly honest in their online self-presentation. Online daters who used deception were motivated to do so by the desire to attract partners and project a positive self-image. Daters were willing to overlook deception in others if they viewed the dishonesty as a slight exaggeration or a characteristic of little value to the dater. Despite deception, participants believe that the online-dating environment can develop successful romantic relationships.
SOH-States of Humanity
SOH-States of Humanity
SOH is an abbreviation for States of Humanity and is an initiative of multimedia artist Alex Vermeulen, which led to an interdisciplinary Gesamtkunstwerk.
SOH-States of Humanity
the SOH concept
Since 1996 Alex Vermeulen has been developing ‘States of Humanity”; a total-concept art project which consists of distinct parts. SOH focuses on themes regarding the counterpoints where the individual meets society: religion, violence, individualism, reflectivity, spirituality, contemplativity, perceptivity and sexuality. Alex Vermeulen uses films, photographs, sculptures, installations, and inter-disciplinary collaborations to represent the essence of our current ‘zeitgeist’. He questions the mechanisms fundamental to its existence, its future direction, as well as the dilemmas we face today.
SOH-States of Humanity
the SOH concept
SOH is a comprehensive work of art to which every participant makes a subjective contribution, from their personal point of view and discipline. The various facets of the project come about because of this Gesamtkunstwerk.
SOH-States of Humanity
Results
So far, in collaboration with, among others, architect Greg Lynn, filmmaker Lodge Kerrigan, composer David Shea, performer Kate Strong, author Robert Greene etc. 29 SOH project have been produced such as books, installations, exhibitions, sculptures in the public space. an Opera, iBooks, video clips, a feature film etc.
SOH-States of Humanity
Most notable projects
SOH1 the Architectural Film (in collaboration with 55 New Yorkers) SOH10 the Opera (composer David Shea, performer Kate Strong) SOH19 States of Nature (in collaboration with the Technical University Eindhoven)
Solar eclipse of September 23, 2090
Solar eclipse of September 23, 2090
A total solar eclipse will occur on September 23, 2090. A solar eclipse occurs when the Moon passes between Earth and the Sun, thereby totally or partly obscuring the image of the Sun for a viewer on Earth. A total solar eclipse occurs when the Moon's apparent diameter is larger than the Sun's, blocking all direct sunlight, turning day into darkness. Totality occurs in a narrow path across Earth's surface, with the partial solar eclipse visible over a surrounding region thousands of kilometres wide.
Solar eclipse of September 23, 2090
Solar eclipse of September 23, 2090
This solar eclipse will be the first total solar eclipse visible from Great Britain since August 11, 1999, and the first visible from Ireland since May 22, 1724. The totality will be visible in southern Greenland, Valentia, West Cork, Poole, Newquay, Plymouth, Southampton, Isle of Wight, nothern France (including Paris and Rennes) and south Belgium and a partially eclipsed sun will be visible in Birmingham, London, Exeter, Cardiff, Belfast, Dublin, Weston Super Mare, Bristol and Oxford.
Solar eclipse of September 23, 2090
Related eclipses
Solar eclipses 2087–2090 This eclipse is a member of a semester series. An eclipse in a semester series of solar eclipses repeats approximately every 177 days and 4 hours (a semester) at alternating nodes of the Moon's orbit.
Solar eclipse of September 23, 2090
Related eclipses
Tritos series This eclipse is a part of a tritos cycle, repeating at alternating nodes every 135 synodic months (≈ 3986.63 days, or 11 years minus 1 month). Their appearance and longitude are irregular due to a lack of synchronization with the anomalistic month (period of perigee), but groupings of 3 tritos cycles (≈ 33 years minus 3 months) come close (≈ 434.044 anomalistic months), so eclipses are similar in these groupings.
Solar eclipse of September 23, 2090
Related eclipses
Metonic series The metonic series repeats eclipses every 19 years (6939.69 days), lasting about 5 cycles. Eclipses occur in nearly the same calendar date. In addition, the octon subseries repeats 1/5 of that or every 3.8 years (1387.94 days). All eclipses in this table occur at the Moon's ascending node.
Continental shelf pump
Continental shelf pump
In oceanic biogeochemistry, the continental shelf pump is proposed to operate in the shallow waters of the continental shelves, acting as a mechanism to transport carbon (as either dissolved or particulate material) from surface waters to the interior of the adjacent deep ocean.
Continental shelf pump
Overview
Originally formulated by Tsunogai et al. (1999), the pump is believed to occur where the solubility and biological pumps interact with a local hydrography that feeds dense water from the shelf floor into sub-surface (at least subthermocline) waters in the neighbouring deep ocean. Tsunogai et al.'s (1999) original work focused on the East China Sea, and the observation that, averaged over the year, its surface waters represented a sink for carbon dioxide. This observation was combined with others of the distribution of dissolved carbonate and alkalinity and explained as follows : the shallowness of the continental shelf restricts convection of cooling water as a consequence, cooling is greater for continental shelf waters than for neighbouring open ocean waters this leads to the production of relatively cool and dense water on the shelf the cooler waters promote the solubility pump and lead to an increased storage of dissolved inorganic carbon this extra carbon storage is augmented by the increased biological production characteristic of shelves the dense, carbon-rich shelf waters sink to the shelf floor and enter the sub-surface layer of the open ocean via isopycnal mixing
Continental shelf pump
Significance
Based on their measurements of the CO2 flux over the East China Sea (35 g C m−2 y−1), Tsunogai et al. (1999) estimated that the continental shelf pump could be responsible for an air-to-sea flux of approximately 1 Gt C y−1 over the world's shelf areas. Given that observational and modelling of anthropogenic emissions of CO2 estimates suggest that the ocean is currently responsible for the uptake of approximately 2 Gt C y−1, and that these estimates are poor for the shelf regions, the continental shelf pump may play an important role in the ocean's carbon cycle.
Continental shelf pump
Significance
One caveat to this calculation is that the original work was concerned with the hydrography of the East China Sea, where cooling plays the dominant role in the formation of dense shelf water, and that this mechanism may not apply in other regions. However, it has been suggested that other processes may drive the pump under different climatic conditions. For instance, in polar regions, the formation of sea-ice results in the extrusion of salt that may increase seawater density. Similarly, in tropical regions, evaporation may increase local salinity and seawater density.
Continental shelf pump
Significance
The strong sink of CO2 at temperate latitudes reported by Tsunogai et al. (1999) was later confirmed in the Gulf of Biscay, the Middle Atlantic Bight and the North Sea. On the other hand, in the sub-tropical South Atlantic Bight reported a source of CO2 to the atmosphere.Recently, work has compiled and scaled available data on CO2 fluxes in coastal environments, and shown that globally marginal seas act as a significant CO2 sink (-1.6 mol C m−2 y−1; -0.45 Gt C y−1) in agreement with previous estimates. However, the global sink of CO2 in marginal seas could be almost fully compensated by the emission of CO2 (+11.1 mol C m−2 y−1; +0.40 Gt C y−1) from the ensemble of near-shore coastal ecosystems, mostly related to the emission of CO2 from estuaries (0.34 Gt C y−1).
Continental shelf pump
Significance
An interesting application of this work has been examining the impact of sea level rise over the last de-glacial transition on the global carbon cycle. During the last glacial maximum sea level was some 120 m (390 ft) lower than today. As sea level rose the surface area of the shelf seas grew and in consequence the strength of the shelf sea pump should increase.
Meizu M6 miniPlayer
Meizu M6 miniPlayer
The M6 miniPlayer, from Meizu, is a flash-based portable media player that plays audio files in MP3, WMA, WAV, FLAC, APE and Ogg and is also capable of AVI video playback (using the XVID codec) on a 2.4-inch QVGA screen. The Mini Player includes an FM tuner, voice recorder, calendar, stopwatch, calculator, a basic ebook reader for TXT files, and two games.
Meizu M6 miniPlayer
Background
The M6 is from Meizu's digital audio player productions. Accordingly, it is only emerging in certain parts of the world including the United States, Australia, France, Russia and more. Though the M6 supports many audio formats, the US release did not support MP3 format because of licensing issues. Apparently, there are workarounds to the issue with specific firmware upgrades. Dane-Elec formed a deal with Meizu to provide distribution of the M6, apparently ironing out MP3 licensing issues. Many European models distributed by Dane‐Elec had their FM tuner disabled because of EU import duties; this could also be remedied by a firmware update. The M6 has been touted as an “iPod killer” because of its capabilities with respect to its aesthetics. One characteristic regarding the Meizu M6 is its ability to function without proprietary file formats and procedures.
Meizu M6 miniPlayer
Specifications
The following are some of the more important specifications regarding the Meizu M6:
Meizu M6 miniPlayer
Software support
File transfer The M6 is connected to a computer via a USB 2.0 cable, upon which it is typically recognized as a mass storage device (starting with the 2.00x firmware series MTP is also supported). Transferring media files and firmware upgrades is accomplished by simply dragging and dropping. Thus, no proprietary software is needed, allowing it to be a true cross-platform media player. It is confirmed that the Linux 2.6 kernel driver for UMS devices works with the M6.
Meizu M6 miniPlayer
Software support
Video conversion For converting videos to the required Xvid format, Meizu provides a custom version of VirtualDub. There is also a Meizu profile available for another open source program, Iriverter and Batman Video Converter is available. Mac users can convert with MPEG Streamclip video converter.
Meizu M6 miniPlayer
Customization and variants
The miniPlayer allows the user to change a few display items such as the background image and font color. Unofficially, it is possible to modify the RESOURCE.BIN file to skin the player with different icons. A number of stick‐on covers are available which allow the front surface and thumb pad to be colored. Two versions of the miniPlayer were originally produced: The TP version has a Toshiba screen with better color reproduction at the cost of lower brightness. It is also 2 mm shallower. This model is no longer produced. The SP version has a brighter and slightly cheaper Samsung screen. This model is still in production.The two versions have different firmware and the screen does not work if the wrong one is loaded. The RESOURCE.BIN files are the same, however. There was also a special SP edition where the back metal plate would be black matte, instead of shiny metal. M6SL and M6SE A slimmer version of the miniPlayer, named Meizu M6SL (M6 “slim”), was released at the end of September 2007. The main difference from the original edition is the decreased thickness—7 mm (like the M3 Music Card) instead of 10 mm and new, better quality, Wolfson produced DACs.
GeneWeb
GeneWeb
GeneWeb is a free multi-platform genealogy software tool created and owned by Daniel de Rauglaudre of INRIA. GeneWeb is accessed by a Web browser, either off-line or as a server in a Web environment. It uses very efficient techniques of relationship and consanguinity computing, developed in collaboration with Didier Rémy, research director at INRIA. GeneWeb is used as the engine for several public genealogy websites, including Geneanet, a collection of inter-searchable genealogical databases currently containing references to more than 225 million persons.
GeneWeb
GeneWeb
Notable features of GeneWeb include: High capacity: GeneWeb can allow multiple wizards to manage the genealogical database. GeneWeb can manage large databases: for example, the Roglo database contains over 9 million entries, managed by more than 200 wizards. Web Server: When GeneWeb runs on a computer connected to the internet, it can accept HTTP requests from web clients, generating and serving HTML web pages and linked objects (images, etc.). GEDCOM: GeneWeb supports import and export of GEDCOM files. UTF-8: GeneWeb supports UTF-8.
Target lesion
Target lesion
In dermatology, a target lesion or bull's-eye lesion, named for its resemblance to the bull's-eye of a shooting target, is a rash with central clearing. It occurs in several diseases, as follows: Target lesions are the typical lesions of erythema multiforme, in which a vesicle is surrounded by an often hemorrhagic maculopapule. Erythema multiforme is often self-limited, of acute onset, resolves in three to six weeks, and has a cyclical pattern. Its lesions are multiform (polymorphous) and include macules, papules, vesicles, and bullae.
Target lesion
Target lesion
Target lesions are also typical of Lyme disease. In the context of Lyme disease, the target lesion is synonymous with erythema migrans (erythema chronicum migrans), although not everyone who gets Lyme disease will have a target-shaped rash, and some will have no rash at all.
Target lesion
Causes
Such lesions may be idiopathic or may follow infections, drug therapy, or immunodeficiency.
Target lesion
Morphology
Target lesion consists of three zones : Dark centre of small papule, vesicle, or bulla (iris) Pale intermediate zone Peripheral rim of erythema
Large Value Transfer System
Large Value Transfer System
The Large Value Transfer System, or LVTS, was the primary system in Canada for electronic wire transfers of large sums of money, and was operated by Payments Canada. It permitted the participating institutions and their clients to send large sums of money securely in real-time with complete certainty that the payment will settle. The system was replaced in September 2021 by a new high-value payment system called Lynx.Established in 1999, LVTS processed the majority of payments made every day in Canada, and was designed to work with funds in Canadian dollars (CAD). On a normal business day, it cleared and settled approximately CA$398 billion. Frequently, when settling the payments made through LVTS between each other, some banks found themselves with extra funds while others found themselves short; to come up with money, the banks were able borrow it from each other for a day, or "overnight". The rate at which they borrowed being called overnight rate, targets for which were set by the Bank of Canada as part of its monetary policy.LVTS was a real-time payment system: the recipient of the payment received it irrevocably in near real-time. As it settled on a deferred net basis at the end of each day, it was not a real-time gross settlement system.
Large Value Transfer System
Participating institutions
As of August 2021, there were 16 institutions, including the Bank of Canada, participating in LVTS:
Ectoplasmic specialisation
Ectoplasmic specialisation
Ectoplasmic specializations are actin-related cell–cell junctions present in the testicular seminiferous epithelium and occur during spermatogenesis. These junctions are located at the Sertoli–Sertoli cell interface and Sertoli-elongating spermatid interface, which occur during the seminiferous epithelial cycle of spermatogenesis. There must be vast reconstructing of the anchoring junctions such as the ectoplasmic specializations within the testies. The reconstruction of these junctions is important because it facilitates the migration of the developing germ cells across the seminiferous epithelium
Equid gammaherpesvirus 5
Equid gammaherpesvirus 5
Equid gammaherpesvirus 5 (EHV-5), formerly Equine herpesvirus 5, is a species of virus in the genus Percavirus, subfamily Gammaherpesvirinae, family Herpesviridae, and order Herpesvirales. It is thought to be the cause of a chronic lung disease of adult horses; equine multinodular pulmonary fibrosis.
Limit-experience
Limit-experience
Limit-experience (French: expérience limite) refers to actions which approach the limits of possible experience. This can be in terms of their intensity and seemingly impossible or paradoxical qualities. A limit-experience dissociates the subject from the experience that it exists in and identifies with, leading to a confrontation with the Real. The idea was proposed by Karl Jaspers and later, the French philosopher Georges Bataille, and subsequently became associated with French philosophers Maurice Blanchot and Michel Foucault.
Limit-experience
Interpretations
Georges Bataille Reaching back to Charles Baudelaire and his poetics of paradoxical experience, such as in the line "O filthy grandeur! O sublime disgrace!" in poem 25 of Baudelaire's Les Fleurs du mal, Bataille was struck by what he saw as "the fact that these two complete contrasts were identical—divine ecstasy and extreme horror". He went on to challenge the conventions laid down by the surrealists at the time with an anti-idealist philosophy conditioned on what he called "the impossible", defined by breaking "rules" until something beyond all rules was reached.In this way, he strove for the limit-experience, what Foucault would later summarize as "the point of life which lies as close as possible to the impossibility of living, which lies at the limit or the extreme". Bataille sought to identify experiences of this kind, and to establish a philosophy that would convey how to live at the edge of limits where the ability to comprehend experience breaks down.
Limit-experience
Interpretations
Michel Foucault Foucault remarked that "the idea of a limit-experience that wrenches the subject from itself is what was important to me in my reading of Nietzsche, Bataille, and Blanchot". In his manner, the systems of philosophy and psychology and their conceptions of reality and the unified subject could be challenged and exposed in favor of what their systems and structures refused and excluded, viewing them from a standpoint informed by the potentials of limit-experience.How far Foucault's fascination with intense experiences goes in his entire body of work is the subject of debate, with the concept arguably being absent from his later and more well known work on sexuality and discipline, as well as strongly associated with the cult of the mad artist in Madness and Civilization.
Limit-experience
Interpretations
Jacques Lacan Influenced by Bataille, from whom he drew the idea of impossibility, Lacan explored the role of limit-experiences, such as "desire, boredom, confinement, revolt, prayer, sleeplessness ... and panic" in the formation of the Other. He also adopted some of Bataille's views on love, seeing it as predicated on man having previously "experienced the limit within which, like desire, he is bound". He saw masochism in particular as a limit-experience, an aspect which fed into his article "Kant avec Sade".
Dynamical simulation
Dynamical simulation
Dynamical simulation, in computational physics, is the simulation of systems of objects that are free to move, usually in three dimensions according to Newton's laws of dynamics, or approximations thereof. Dynamical simulation is used in computer animation to assist animators to produce realistic motion, in industrial design (for example to simulate crashes as an early step in crash testing), and in video games. Body movement is calculated using time integration methods.
Dynamical simulation
Physics engines
In computer science, a program called a physics engine is used to model the behaviors of objects in space. These engines allow simulation of the way bodies of many types are affected by a variety of physical stimuli. They are also used to create Dynamical simulations without having to know anything about physics. Physics engines are used throughout the video game and movie industry, but not all physics engines are alike. They are generally broken into real-time and the high precision, but these are not the only options. Most real-time physics engines are inaccurate and yield only the barest approximation of the real world, whereas most high-precision engines are far too slow for use in everyday applications.
Dynamical simulation
Physics engines
To understand how these Physics engines are built, a basic understanding of physics is required. Physics engines are based on the actual behaviors of the world as described by classical mechanics. Engines do not typically account for Modern Mechanics (see Theory of relativity and quantum mechanics) because most visualization deals with large bodies moving relatively slowly, but the most complicated engines perform calculations for Modern Mechanics as well as Classical. The models used in Dynamical simulations determine how accurate these simulations are.
Dynamical simulation
Particle model
The first model which may be used in physics engines governs the motion of infinitesimal objects with finite mass called “particles.” This equation, called Newton’s Second law (see Newton's laws) or the definition of force, is the fundamental behavior governing all motion: F→=ma→ This equation will allow us to fully model the behavior of particles, but this is not sufficient for most simulations because it does not account for the rotational motion of rigid bodies. This is the simplest model that can be used in a physics engine and was used extensively in early video games.
Dynamical simulation
Inertial model
Bodies in the real world deform as forces are applied to them, so we call them “soft,” but often the deformation is negligibly small compared to the motion, and it is very complicated to model, so most physics engines ignore deformation. A body that is assumed to be non-deformable is called a rigid body. Rigid body dynamics deals with the motion of objects that cannot change shape, size, or mass but can change orientation and position.
Dynamical simulation
Inertial model
To account for rotational energy and momentum, we must describe how force is applied to the object using a moment, and account for the mass distribution of the object using an inertia tensor. We describe these complex interactions with an equation somewhat similar to the definition of force above: d(Iω)dt=∑j=1Nτj where I is the central inertia tensor, ω→ is the angular velocity vector, and τj is the moment of the jth external force about the mass center.
Dynamical simulation
Inertial model
The inertia tensor describes the location of each particle of mass in a given object in relation to the object's center of mass. This allows us to determine how an object will rotate dependent on the forces applied to it. This angular motion is quantified by the angular velocity vector. As long as we stay below relativistic speeds (see Relativistic dynamics), this model will accurately simulate all relevant behavior. This method requires the Physics engine to solve six ordinary differential equations at every instant we want to render, which is a simple task for modern computers.
Dynamical simulation
Euler model
The inertial model is much more complex than we typically need but it is the most simple to use. In this model, we do not need to change our forces or constrain our system. However, if we make a few intelligent changes to our system, simulation will become much easier, and our calculation time will decrease. The first constraint will be to put each torque in terms of the principal axes. This makes each torque much more difficult to program, but it simplifies our equations significantly. When we apply this constraint, we diagonalize the moment of inertia tensor, which simplifies our three equations into a special set of equations called Euler's equations. These equations describe all rotational momentum in terms of the principal axes: I1ω˙1+(I3−I2)ω2ω3=N1I2ω˙2+(I1−I3)ω3ω1=N2I3ω˙3+(I2−I1)ω1ω2=N3 The N terms are applied torques about the principal axes The I terms are the principal moments of inertia The ω terms are angular velocities about the principal axesThe drawback to this model is that all the computation is on the front end, so it is still slower than we would like. The real usefulness is not apparent because it still relies on a system of non-linear differential equations. To alleviate this problem, we have to find a method that can remove the second term from the equation. This will allow us to integrate much more easily. The easiest way to do this is to assume a certain amount of symmetry.
Dynamical simulation
Symmetric/torque model
The two types of symmetric objects that will simplify Euler's equations are “symmetric tops” and “symmetric spheres.” The first assumes one degree of symmetry, this makes two of the I terms equal. These objects, like cylinders and tops, can be expressed with one very simple equation and two slightly simpler equations. This does not do us much good, because with one more symmetry we can get a large jump in speed with almost no change in appearance. The symmetric sphere makes all of the I terms equal (the Moment of inertia scalar), which makes all of these equations simple: Iω˙1=N1Iω˙2=N2Iω˙3=N3 The N terms are applied torques about the principal axes The ω terms are angular velocities about the principal axes The I term is the scalar Moment of inertia: I=def∫Vl2(m)dm=∭Vl2(v)ρ(v)dv=∭Vl2(x,y,z)ρ(x,y,z)dxdydz whereV is the volume region of the object, r is the distance from the axis of rotation, m is mass, v is volume, ρ is the pointwise density function of the object, x, y, z are the Cartesian coordinates.These equations allow us to simulate the behavior of an object that can spin in a way very close to the method simulate motion without spin. This is a simple model but it is accurate enough to produce realistic output in real-time Dynamical simulations. It also allows a Physics engine to focus on the changing forces and torques rather than varying inertia.
Perspective control
Perspective control
Perspective control is a procedure for composing or editing photographs to better conform with the commonly accepted distortions in constructed perspective. The control would: make all lines that are vertical in reality vertical in the image. This includes columns, vertical edges of walls and lampposts. This is a commonly accepted distortion in constructed perspective; perspective is based on the notion that more distant objects are represented as smaller on the page; however, even though the top of the cathedral tower is in reality further from the viewer than base of the tower (due to the vertical distance), constructed perspective considers only the horizontal distance and considers the top and bottom to be the same distance away; make all parallel lines (such as four horizontal edges of a cubic room) cross in one point.Perspective distortion occurs in photographs when the film plane is not parallel to lines that are required to be parallel in the photo. A common case is when a photo is taken of a tall building from ground level by tilting the camera backwards: the building appears to fall away from the camera.
Perspective control
Perspective control
The popularity of amateur photography has made distorted photos made with cheap cameras so familiar that many people do not immediately realise the distortion. This "distortion" is relative only to the accepted norm of constructed perspective (where vertical lines in reality do not converge in the constructed image), which in itself is distorted from a true perspective representation (where lines that are vertical in reality would begin to converge above and below the horizon as they become more distant from the viewer).
Perspective control
At exposure
Professional cameras where perspective control is important control the perspective at exposure by raising the lens parallel to the film. There is more information on this in the view camera article.
Perspective control
At exposure
Most large format (4x5 and up) cameras have this feature, as well as plane of focus control built into the camera body in the form of flexible bellows and moveable front (lens) and rear (film holder) elements. Thus any focal length lens mounted on a view camera or field camera, and many press cameras can be used with perspective control.
Perspective control
At exposure
Some interchangeable lens medium format, 35 mm film SLR, and Digital SLR camera systems have PC, shift, or tilt/shift lens options which allow perspective control and, in the case of a tilt/shift lens, plane of focus control, but only at a specific focal length.
Perspective control
In the darkroom
A darkroom technician can correct perspective distortion in the printing process. It is usually done by exposing the paper at an angle to the film, with the paper raised toward the part of the image that is larger, therefore not allowing the light from the enlarger to spread as much as the other side of the exposure.
Perspective control
In the darkroom
The process is known as rectification printing, and is done using a rectifying printer (transforming printer), which involves rotating the negative and/or easel. Restoring parallelism to verticals (for instance) is easily done by tilting one plane, but if the focal length of the enlarger is not suitably chosen, the resulting image will have vertical distortion (compression or stretching). For correct perspective correction, the proper focal length (specifically, angle of view) must be chosen so that the enlargement replicates the perspective of the camera.
Perspective control
During digital post-processing
Digital post-processing software provides means to correct converging verticals and other distortions introduced at image capture.
Perspective control
During digital post-processing
Adobe Photoshop and GIMP have several "transform" options to achieve, with care, the desired control without any significant degradation in the overall image quality. Photoshop CS2 and subsequent releases includes perspective correction as part of its Lens Distortion Correction Filter; DxO Optics Pro from DxO Labs includes perspective correction; while GIMP (as of 2.6) does not include a specialized tool for correcting perspective, though a plug-in, EZ Perspective, is available. RawTherapee, a free and open-source raw converter, includes horizontal and vertical perspective correction tools too. Note that because the mathematics of projective transforms depends on the angle of view, perspective tools require that the angle of view or 35 mm equivalent focal length be entered, though this can often be determined from Exif metadata.It is commonly suggested to correct perspective using a general projective transformation tool, correcting vertical tilt (converging verticals) by stretching out the top; this is the "Distort Transform" in Photoshop, and the "perspective tool" in GIMP. However, this introduces vertical distortion – objects appear squat (vertically compressed, horizontally extended) – unless the vertical dimension is also stretched. This effect is minor for small angles, and can be corrected by hand, manually stretching the vertical dimension until the proportions look right, but is automatically done by specialized perspective transform tools.
Perspective control
During digital post-processing
An alternative interface, found in Photoshop (CS and subsequent releases) is the "perspective crop", which enables the user to perform perspective control with the cropping tool, setting each side of the crop to independently determined angles, which can be more intuitive and direct.Other software with mathematical models on how lenses and different types of optical distortions affect the image can correct this by being able to calculate the different characteristics of a lens and re-projecting the image in a number of ways (including non-rectilinear projections). An example of this kind of software is the panorama creation suite Hugin.However these techniques do not enable the recovery of lost spatial resolution in the more distant areas of the subject, or the recovery of lost depth of field due to the angle of the film/sensor plane to the subject. These transforms involve interpolation, as in image scaling, which degrades the image quality, in particular blurring high-frequency detail. How significant this is depends on the original image resolution, degree of manipulation, print/display size, and viewing distance, and perspective correction must be traded off against preserving high-frequency detail.
Perspective control
In virtual environments
Architectural images are commonly "rendered" from 3D computer models, for use in promotional material. These have virtual cameras within to create the images, which normally have modifiers capable of correcting (or distorting) the perspective to the artist's taste. See 3D projection for details.
N-tert-Butylbenzenesulfinimidoyl chloride
N-tert-Butylbenzenesulfinimidoyl chloride
N-tert-Butylbenzenesulfinimidoyl chloride is a useful oxidant for organic synthesis reactions. It is a good electrophile, and the sulfimide S=N bond can be attacked by nucleophiles, such as alkoxides, enolates, and amide ions. The nitrogen atom in the resulting intermediate is basic, and can abstract an α-hydrogen to create a new double bond.
N-tert-Butylbenzenesulfinimidoyl chloride
Preparation
This reagent can be synthesized quickly and in near-quantitative yield by reacting phenyl thioacetate with tert-butyldichloroamine in hot benzene. After the reaction is complete, the product can be isolated as a yellow, moisture-sensitive solid by vacuum distillation.
N-tert-Butylbenzenesulfinimidoyl chloride
Mechanism
The first two steps in an oxidation reaction involving N-tert-butylbenzenesulfinimidoyl chloride are similar to a nucleophilic acyl substitution reaction. A nucleophile, such as an alkoxide (1), attacks the S=N bond in 2. The resulting intermediate (3) collapses and ejects chloride ion, which is a good leaving group. The resulting sulfimide has two resonance forms - 4a and 4b. Because of this, the nitrogen is basic, and via a five-membered ring transition state, it can abstract the hydrogen adjacent to the oxygen. This forms a new C=O bond and ejects a neutral sulfenamide (5), giving ketone 6 as the product. N-tert-Butylbenzenesulfinimidoyl chloride reacts with enolates, amides, and primary alkoxides by the same general mechanism.
N-tert-Butylbenzenesulfinimidoyl chloride
Mechanism
The Swern oxidation, which converts primary and secondary alcohols to aldehydes and ketones, respectively, also uses a sulfur-containing compound (DMSO) as the oxidant and proceeds by a similar mechanism. In the Swern oxidation, elimination also occurs via a five-membered ring transition state, but the basic species is a sulfur ylide instead of a negatively charged nitrogen. Several other oxidation reactions also make use of DMSO as the oxidant and pass through a similar transition state (see #See also).
N-tert-Butylbenzenesulfinimidoyl chloride
Reactions
Reacting an aldehyde with a Grignard reagent or organolithium and treating the resulting secondary alkoxide with N-tert-butylbenzenesulfinimidoyl chloride is a convenient one-pot reaction for converting aldehydes to ketones. While Grignards can be used for this reaction, organolithium compounds give higher yields, due to the higher reactivity of a lithium alkoxide compared to the corresponding magnesium salt. In some cases, an equivalent of DMPU, a Lewis base, will increase yields. For example, treating benzaldehyde with n-butyllithium and N-tert-butylbenzenesulfinimidoyl chloride in THF gives 1-phenyl-1-pentanone in good yield.
N-tert-Butylbenzenesulfinimidoyl chloride
Reactions
N-tert-Butylbenzenesulfinimidoyl chloride can also be used to synthesize imines from amines. Imines synthesized in this fashion have been shown to undergo a one-pot Mannich reaction with 1,3-dicarbonyl compounds, such as malonate esters and 1,3-diketones. In this example, Cbz-protected benzylamine is deprotonated using n-butyllithium, then treated with N-tert-butylbenzenesulfinimidoyl chloride to form the protected imine. Dimethyl malonate acts as the nucleophile and reacts with the imine to give the final product, a Mannich base.
Lumiliximab
Lumiliximab
Lumiliximab is an IgG1k monoclonal antibody that targets CD23. It acts as an immunomodulator and was awarded orphan drug status and fast track designation by the FDA.It was investigated in Phase II/III clinical trials for the treatment of chronic lymphocytic leukemia. It has also been studied for use in allergic asthma. The drug is a chimeric antibody from Macaca irus and Homo sapiens.Lumiliximab was developed by IDEC Pharmaceuticals, which was acquired by Biogen.
Lumiliximab
Lumiliximab
Clinical trials for CLL were terminated in 2010, and for allergic asthma in 2007. Results published from the CLL clinical trial failed to meet primary endpoints.
Parbelos
Parbelos
The parbelos is a figure similar to the arbelos but instead of three half circles it uses three parabola segments. More precisely the parbelos consists of three parabola segments, that have a height that is one fourth of the width at their bases. The two smaller parabola segments are placed next to each other with their bases on a common line and the largest parabola is placed over the two smaller ones such that its width is the sum of the widths of the smaller ones (see graphic).
Parbelos
Parbelos
The parbelos has a number of properties which are somewhat similar or even identical to the some of the properties of the Arbelos. For instance the following two properties are identical to those of the arbelos: The arc length of the outer parabola is equal to the sum of the arc lengths of the inner parabolas.
Parbelos
Parbelos
In a nested arbelos construction with the inner parabola segments being arbeloses themselves the two innermost parabola segments being adjacent to the cusp of the outer arbelos are congruent, that is of equal size.The quadrilateral BM2MM1 formed by the inner cusp B and the midpoints M,M1,M2 of the three parabola arcs is a parallelogram the area of which relates to the area of the parbelos as follows: parallelogram parbelos The four tangents at the three cusps of the parabola intersect in four points, which form a rectangle being called the tangent rectangle. The circumcircle of the tangent rectangle intersects the base side of the outer parabola segment in its midpoint, which is the focus of the outer parabola. One diagonal of the tangent rectangle lies on a tangent to the outer parabola and its common point with it is identical to its point of intersection with perpendicular to the base at the inner cusp. For the area of the tangent rectangle the following equation holds: rectangle parbelos
Malay units of measurement
Malay units of measurement
Units of measurement used in Malaysia and neighbouring countries include the kati, a unit of mass, and the gantang, a unit of volume.
Malay units of measurement
Mass
For mass, the catty equals 0.6 kg. Another unit is picul which equals 60 kg.
Malay units of measurement
Volume
The gantang is equivalent to an imperial gallon, or 4.54609 cubic decimetres.
Water salute
Water salute
A water salute is an occasional occurrence used for a ceremonial purpose. It typically consists of a vehicle which travels under plumes of water expelled by one or more fire-fighting vehicles, as a mark of respect or appreciation.
Water salute
Water salute
At an airport, typically an even number of airport crash tender fire-fighting vehicles will arrange themselves perpendicularly along the sides of a taxiway or apron; they will emit coordinated plumes of water will form an arch (or series of arches) as an aircraft passes. Symbolically, the procession looks similar to a bridal party walking under a wedding arch or the saber arch at a military wedding.
Water salute
Water salute
Water salutes have been used to mark the retirement of a senior pilot or air traffic controller, the first or last flight of an airline to an airport, the first or last flight of a specific type of aircraft, as a token of respect for the remains of soldiers killed in action, or other notable events. When Concorde flew its last flight in 2003 from John F. Kennedy International Airport, red, white and blue coloured plumes were used.Water salutes are also used for ships and other watercraft, with water being delivered by fireboats. This is often done for the first or last visit or retirement of a senior captain, the first or last cruise of a ship, the visit of a warship, or other ceremonial occasions. A notable example was the water salute to HMS Hermes (R12) as she returned to Southampton following her part in the victory of the Falklands War.
ADaMSoft
ADaMSoft
ADaMSoft is a free and open-source statistical software developed in Java and can run on any platform supporting Java.
ADaMSoft
History
ADaMSoft was initially started by Marco Scarnò as a simple prototype of the statistical software developed by UNESCO and called WinIDAMS. Later it resulted useful for several activities of the CASPUR statistical group (ADaMS group). The software was further developed until it became an interesting package which was tested and, finally, opened to the web community.
ADaMSoft
Features
Statistical methods ADaMSoft can perform a wide range of analytical methods: Neural Networks MLP Graphs Data Mining Linear regression Logistic regression Methods for Statistical classification Record linkage methods Contains algorithms for Decision trees Cluster analysis Data Editing and imputation Principal component analysis Correspondence analysis Data sources It can read/write statistical data values from various/to sources including: Text Files Excel Spreadsheets ODBC data sources MySQL Postgresql Oracle Web Application Server By using the ADaMSoft Web Application Server it is possible to use all the software facilities through the web; in other words to let that internet users can access to the ADaMSoft procedures without having it installed.
Epithemia
Epithemia
Epithemia is a genus of diatoms belonging to the family Rhopalodiaceae.The genus has cosmopolitan distribution.They have recently been linked to nitrogen fixation and can be a possible indicator of eutrophication. This is because levels of epithemia “containing cyanobacteria endosymbionts, decreased with increased ambient inorganic N concentrations” (Stancheva 2013). Concentrations of members of the epithemia genus existing with cyanobacteria endosymbionts would mean that there is more fixed nitrogen in the ecosystem. It could act as an early indicator of nutrient overload.
Epithemia
Species
Species: Epithemia alpestris Kützing, 1844 Epithemia alpestris W.Smith, 1853 Epithemia anasthasiae Pantocsek, 1902
Root (linguistics)
Root (linguistics)
A root (or root word) is the core of a word that is irreducible into more meaningful elements. In morphology, a root is a morphologically simple unit which can be left bare or to which a prefix or a suffix can attach. The root word is the primary lexical unit of a word, and of a word family (this root is then called the base word), which carries aspects of semantic content and cannot be reduced into smaller constituents.
Root (linguistics)
Root (linguistics)
Content words in nearly all languages contain, and may consist only of, root morphemes. However, sometimes the term "root" is also used to describe the word without its inflectional endings, but with its lexical endings in place. For example, chatters has the inflectional root or lemma chatter, but the lexical root chat. Inflectional roots are often called stems, and a root in the stricter sense, a root morpheme, may be thought of as a monomorphemic stem.
Root (linguistics)
Root (linguistics)
The traditional definition allows roots to be either free morphemes or bound morphemes. Root morphemes are the building blocks for affixation and compounds. However, in polysynthetic languages with very high levels of inflectional morphology, the term "root" is generally synonymous with "free morpheme". Many such languages have a very restricted number of morphemes that can stand alone as a word: Yup'ik, for instance, has no more than two thousand.
Root (linguistics)
Root (linguistics)
The root is conventionally indicated using the mathematical symbol √; for instance, the Sanskrit root "√bhū-" means the root "bhū-".
Root (linguistics)
Examples
The root of a word is a unit of meaning (morpheme) and, as such, it is an abstraction, though it can usually be represented alphabetically as a word. For example, it can be said that the root of the English verb form running is run, or the root of the Spanish superlative adjective amplísimo is ampli-, since those words are derived from the root forms by simple suffixes that do not alter the roots in any way. In particular, English has very little inflection and a tendency to have words that are identical to their roots. But more complicated inflection, as well as other processes, can obscure the root; for example, the root of mice is mouse (still a valid word), and the root of interrupt is, arguably, rupt, which is not a word in English and only appears in derivational forms (such as disrupt, corrupt, rupture, etc.). The root rupt can be written as if it were a word, but it is not.
Root (linguistics)
Examples
This distinction between the word as a unit of speech and the root as a unit of meaning is even more important in the case of languages where roots have many different forms when used in actual words, as is the case in Semitic languages. In these, roots (semitic roots) are formed by consonants alone, and speakers elaborate different words (belonging potentially to different parts of speech) from the root by inserting different vowels. For example, in Hebrew, the root ג-ד-ל g-d-l represents the idea of largeness, and from it we have gadol and gdola (masculine and feminine forms of the adjective "big"), gadal "he grew", higdil "he magnified" and magdelet "magnifier", along with many other words such as godel "size" and migdal "tower".
Root (linguistics)
Examples
Roots and reconstructed roots can become the tools of etymology.
Root (linguistics)
Secondary roots
Secondary roots are roots with changes in them, producing a new word with a slightly different meaning. In English, a rough equivalent would be to see conductor as a secondary root formed from the root to conduct. In abjad languages, the most familiar of which are Arabic and Hebrew, in which families of secondary roots are fundamental to the language, secondary roots are created by changes in the roots' vowels, by adding or removing the long vowels a, i, u, e and o. (Notice that Arabic does not have the vowels e and o.) In addition, secondary roots can be created by prefixing (m−, t−), infixing (−t−), or suffixing (−i, and several others). There is no rule in these languages on how many secondary roots can be derived from a single root; some roots have few, but other roots have many, not all of which are necessarily in current use.
Root (linguistics)
Secondary roots
Consider the Arabic language: مركز [mrkz] or [markaza] meaning ‘centralized (masculine, singular)’, from [markaz] ‘centre’, from [rakaza] ‘plant into the earth, stick up (a lance)’ ( ر-ك-ز | r-k-z). This in turn has derived words مركزي [markaziy], meaning 'central', مركزية [markaziy:ah], meaning 'centralism' or 'centralization', and لامركزية, [la:markaziy:ah] 'decentralization' أرجح [rjh] or [ta'arjaħa] meaning ‘oscillated (masculine, singular)’, from ['urju:ħa] ‘swing (n)’, from [rajaħa] ‘weighed down, preponderated (masculine, singular)’ ( ر-ج-ح | r-j-ħ).
Root (linguistics)
Secondary roots
محور [mhwr] or [tamaħwara] meaning ‘centred, focused (masculine, singular)’, from [mihwar] meaning ‘axis’, from [ħa:ra] ‘turned (masculine, singular)’ (ح-و-ر | h-w-r).