title
stringlengths 1
149
⌀ | section
stringlengths 1
1.9k
⌀ | text
stringlengths 13
73.5k
|
---|---|---|
Warbits
|
Development
|
Warbits was developed by the 2-man indie team of programmer Joseph Borghetti and artist Reilly Stroope, who worked remotely and never met in person. They characterized it as a "dumb idea" due to the potential failure of a "niche strategy game" launching on only a single platform, saying that, while it targeted an under-served market, it was nonetheless a "gargantuan task" for first-time game developers. After being introduced to each other on a small community forum, they commenced development in 2012, seeking to make a mobile game.The inspiration behind the game was the fact that Advance Wars was not on a mobile platform. The developers assumed it would be finished in 6 months, but realized the large amount of depth and complexity in the Wars games would be more difficult to emulate than they believed. Keeping their day jobs, they developed the game as a hobby, spending the first two years learning how to develop a game from scratch, and the next two years completing the game. Much of the development time was spent simply learning how to program as opposed to creating the game itself. The game was ultimately developed in the Cocos2d engine using Objective-C.The developers spent about USD $11,000 hiring freelancers to provide assets such as sound effects, music and a trailer. About half the money was spent on a complex backend system and map editor that ultimately went unused. Additional money was spent purchasing an Apple developer license and Dropbox Pro. The developers regretted not starting with smaller games, noting that such a large game could have easily failed and never recouped the time or investment.Upon launch, the game was made the App Store's Editor's Choice for two weeks straight, attributed to launching during an Earth Day promotion that prevented larger developers from launching their apps. The game sold the majority of units within these two weeks, drastically decreasing afterwards. By late 2016, it had made lifetime sales of USD $173,000, earning the developers USD $116,000. Most of its reviews were from mobile gaming sites rather than more major outlets.
|
Warbits
|
Reception
|
The game was well-received by critics, with an aggregate score of 92/100 on Metacritic.Nadia Oxford of Gamezebo rated the game 4.5/5 stars, saying its gameplay was "deep" and that it should "appease starving Advance Wars fans", and commending the game's sense of humor. She criticized the fact that the player cannot preview enemy movement range, and that troops' strengths and weaknesses were "difficult to remember".Carter Dodson of TouchArcade also rated the game 4.5/5 stars, saying it "lacks originality", but is "slick and well-constructed". Harry Slater of Pocket Gamer UK rated the game 90/100, praising the game for not being "dumbed down" for a mobile audience, and calling it "wonderfully balanced", also saying that "fans of the genre have been screaming for" such a game.
|
Warbits
|
Legacy
|
In 2021, the game's developers announced that Warbits+, an updated version of the original, would receive a multi-platform release on iOS, Android and Windows. Warbits+ would include quality-of-life features, cross-platform play, and the ability to create community maps, among other additions. Its release date remains TBA.
|
Applications of cybernetics in economics
|
Applications of cybernetics in economics
|
Economics is one domain in which cybernetics has had application and influence.
|
Applications of cybernetics in economics
|
In the Soviet Union
|
The Great Soviet Encyclopaedia defines Economic cybernetics as a scientific field wherein cybernetic approaches are applied to economics. It facilitates a dialogue between microsystems and macrosystems.The design of self-regulating control systems for a real-time planned economy was explored by economist Oskar Lange, cyberneticist Viktor Glushkov, and other Soviet cyberneticists during the 1960s. By the time information technology was developed enough to enable feasible economic planning based on computers, the Soviet Union and eastern bloc countries began moving away from planning and eventually collapsed.
|
Applications of cybernetics in economics
|
Hayek
|
Friedrich Hayek attended the 1960 Symposium on Principles of Self-Organization, organised by Heinz von Foerster.
|
Applications of cybernetics in economics
|
Hayek
|
Hayek mentions cybernetics as a discipline that could help economists understand the "self-organizing or self-generating systems" called markets. Being "complex phenomena", the best way to examine market functions is by using the feedback mechanism, explained by cybernetic theorists. That way, economists could make "pattern predictions".Therefore, the market for Hayek is a "communication system", an "efficient mechanism for digesting dispersed information". The economist and a cyberneticist are like gardeners who are "providing the appropriate environment". Hayek's definition of information is idiosyncratic and precedes the information theory used in cybernetics and the natural sciences.
|
Applications of cybernetics in economics
|
Hayek
|
Finally, Hayek also considers Adam Smith's idea of the invisible hand as an anticipation of the operation of the feedback mechanism in cybernetics. In the same book, Law, Legislation and Liberty, Hayek mentions, along with cybernetics, that economists should rely on the scientific findings of Ludwig von Bertalanffy general systems theory, along with information and communication theory and semiotics.
|
Applications of cybernetics in economics
|
Towards a new socialism
|
A proposal for a "New Socialism" was outlined by the computer scientists Paul Cockshott and Allin Cottrell in 1995 (Towards a New Socialism), where computers determine and manage the flows and allocation of resources among socially owned enterprises.
|
Bachelor of Business Information Systems
|
Bachelor of Business Information Systems
|
Bachelor of Business Information Systems (BBIS) is an IT focused undergraduate program designed to better understand the needs of business and industry and be well equipped to meet those needs. It blends core concepts from a traditional business administration degree and a technology related degree.
|
Bachelor of Business Information Systems
|
International variations
|
Australia It is offered by Asia Pacific International College (APIC), Kent Institute Australia, Swinburne University of Technology, RMIT University, La Trobe University, Melbourne Institute of Technology, Monash University, Open Universities Australia, Sydney International School of Technology and Commerce and Torrens University Australia.
In Australia, it is a 3-years program.
Germany Furtwangen University of Applied Sciences in Germany offers International Business Information Systems a leading bachelor study program in Germany educating students in three fields of competence: Applied Computer Science, Digital Business Management and Data Science & Artificial Intelligence.
|
Bachelor of Business Information Systems
|
International variations
|
Pakistan The Bachelor of Business Information Systems (BBIS) degree is offered by several institutions in Pakistan, including the Institute of Business Administration (IBA) and the Shaheed Zulfikar Ali Bhutto Institute of Science and Technology (SZABIST), both located in Karachi. And in Lahore, the Lahore University of Management Sciences (LUMS), the Lahore School of Economics (LSE), the University of the Punjab, and the University of Management and Technology (UMT). In the capital city of Islamabad, students can pursue a BBIS degree at the NUST Business School (NBS), the COMSATS Institute of Information Technology, the Pakistan Institute of Engineering and Applied Sciences (PIEAS), and Quaid-i-Azam University. Other notable institutions offering the program include Sukkur IBA University in Sukkur, the Institute of Management Sciences (IMS) in Peshawar, the Karachi School for Business and Leadership (KSBL) in Karachi, the University of Karachi, and the University of Engineering and Technology (UET) in Lahore.
|
Bachelor of Business Information Systems
|
International variations
|
India In India, it is known as Bachelor of Science (Business Information System) which is offered by Hindustan Institute of Technology and Management and FTMS Global Academy India Private Limited.
|
Bachelor of Business Information Systems
|
International variations
|
Nepal BBIS program is offered by Kathmandu University under the Department of Management Informatics and Communication, School of Management and Little Angels College of Management (LACM). LACM is affiliated to Kathmandu University.It is a 4 years - 141 credit hours comprehensive bachelor degree program, designed by blending the domain knowledge of the information systems and information technology with that of business and management.
|
Bachelor of Business Information Systems
|
International variations
|
Singapore Murdoch University offers Bachelor of Science in Business Information Systems in Singapore.
United States Ashford University offers online course in Bachelor of Arts in Business Information Systems.
|
Bachelor of Business Information Systems
|
Scope and career prospects
|
A typical role for BBIS graduates is systems analyst, where the graduates can apply their expertise in analyzing business information system requirements and system deployment methods. This program prepares for the graduates to be the Information Systems professionals and they can work as a Database Administrator (DBA), Chief Information Officer (CIO) and other senior management positions with additional work experience and professional development.They can also work as Business Analyst, IT Project Manager, IT Consultant, IT Technical Support Officer, Programmer and Designer, Applications Developer, Network Administrator, Computer Engineer, Computer System Auditor, Computer System Engineer, Data Modeller, Database Designer and Administrator, Electronic Commerce Administrator, Hardware Technician, Business Process Analyst, Enterprise System Analyst, Information and Data Manager, Information Management Administrator, Information Manager, Management Consultant, Sales Representative, Specialist Consultant, System Designer, Training and Support Leader and Training Manager.
|
Peptide hormone
|
Peptide hormone
|
Peptide hormones are hormones whose molecules are peptides. Peptide hormones have shorter amino acid chain lengths than protein hormones. These hormones have an effect on the endocrine system of animals, including humans. Most hormones can be classified as either amino acid–based hormones (amine, peptide, or protein) or steroid hormones. The former are water-soluble and act on the surface of target cells via second messengers; the latter, being lipid-soluble, move through the plasma membranes of target cells (both cytoplasmic and nuclear) to act within their nuclei.
|
Peptide hormone
|
Peptide hormone
|
Like all peptides, peptide hormones are synthesized in cells from amino acids according to mRNA transcripts, which are synthesized from DNA templates inside the cell nucleus. Preprohormones, peptide hormone precursors, are then processed in several stages, typically in the endoplasmic reticulum, including removal of the N-terminal signal sequence and sometimes glycosylation, resulting in prohormones. The prohormones are then packaged into membrane-bound secretory vesicles, which can be secreted from the cell by exocytosis in response to specific stimuli (e.g. an increase in Ca2+ and cAMP concentration in cytoplasm).These prohormones often contain superfluous amino acid residues that were needed to direct folding of the hormone molecule into its active configuration but have no function once the hormone folds. Specific endopeptidases in the cell cleave the prohormone just before it is released into the bloodstream, generating the mature hormone form of the molecule. Mature peptide hormones then travel through the blood to all of the cells of the body, where they interact with specific receptors on the surfaces of their target cells.
|
Peptide hormone
|
Peptide hormone
|
Some neurotransmitters are secreted and released in a similar fashion to peptide hormones, and some "neuropeptides" may be used as neurotransmitters in the nervous system in addition to acting as hormones when released into the blood.
When a peptide hormone binds to a receptor on the surface of the cell, a second messenger appears in the cytoplasm, which triggers signal transduction leading to the cellular responses.Some peptides (angiotensin II, basic fibroblast growth factor-2, parathyroid hormone-related protein) also interact with intracellular receptors located in the cytoplasm or nucleus by an intracrine mechanism.
|
Peptide hormone
|
List of peptide hormones in humans
|
adrenocorticotropic hormone (ACTH) adropin amylin angiotensin atrial natriuretic peptide (ANP) calcitonin cholecystokinin (CCK) gastrin ghrelin glucagon growth hormone follicle-stimulating hormone (FSH) insulin leptin luteinizing hormone (LH) melanocyte-stimulating hormone (MSH) oxytocin parathyroid hormone (PTH) prolactin renin somatostatin thyroid-stimulating hormone (TSH) thyrotropin-releasing hormone (TRH) vasopressin, also called arginine vasopressin (AVP) or anti-diuretic hormone (ADH) vasoactive intestinal peptide (VIP)
|
Xdelta
|
Xdelta
|
xdelta is a command line program for delta encoding, which generates the difference between two files. This is similar to diff and patch, but it is targeted for binary files and does not generate human readable output.
It was first released in 1997. The developer of xdelta is Joshua MacDonald, who currently maintains the program. The algorithm of xdelta1 was based on the algorithm of rsync, developed by Andrew Tridgell, though it uses a smaller block size.
xdelta3 can generate standardized VCDIFF format, and it realized the compatibility among other delta encoding software which supports the VCDIFF format. It runs on Unix-like operating systems and Microsoft Windows. xdelta can handle up to 264 byte files, and it is suitable for large backups.
|
Cable-ready
|
Cable-ready
|
Cable-ready is a designation which indicates that a TV set or other television-receiving device (such as a VCR or DVR) is capable of receiving cable TV without a set-top box.The term originated with analog TV, which uses different frequencies for cable versus over-the-air. This gives more channels, and at lower frequencies, so that early systems did not have to be so broadband and were therefore less expensive to build. For North American cable television frequencies, the VHF channels 2 to 13 are the same, while an extra 51 cable channels exist between there and over-the-air UHF channel 14. Thus, over-the-air channel 14 can be seen on cable channel 65. Conversely, those 51 extra channels (plus an additional five inserted at 95 to 99) cannot be seen at all on a device which is not cable-ready. A "181-channel tuner" receives 125 on cable (1 to 125), plus 10 (126 to 135) more for digital cable ready TVs, plus the 56 (14 to 69) which are not identical in both (2 to 13). Other cable channels, 0, 00 and 1, which along with channels 136-158 are ill-defined and thus rarely used, and often not included in otherwise cable-ready tuners. Those "lowest numbered" channels often reside between VHF channels four and five on HRC (harmonically related carrier) and IRC (incrementally related carrier) systems where the normally four MHz gap is increased to six MHz, wide enough for one NTSC channel. Similar situations exist in the rest of the world as well.
|
Cable-ready
|
Cable-ready
|
Another use of a cable-ready tuner is for receiving amateur television (ATV) in North America, where the main ATV band appears on cable channels 56 to 59, 57 being the most popular. Most repeaters output on these channels, while input from amateur operators is often in another band.
|
Cable-ready
|
Digital cable
|
Digital cable-ready or DCR is a label used by manufacturers on new televisions which feature built-in technology that allows consumers to receive SDTV and HDTV digital cable programs. Usually this is a QAM tuner, since over-the-air broadcasts are either COFDM (DVB-T and ISDB-T) or 8VSB (ATSC-T). Some cable TV systems in North America use 16VSB instead of 256QAM, for which there are no cable-ready devices. Only channels that are left unencrypted can be received using this method, however encrypted channels can be viewed without a set-top-box using systems such as a CableCard or using a Downloadable Conditional Access System.
|
Cable-ready
|
Digital cable
|
Interactive digital cable ready or iDCR extends DCR. Unlike the DCR standard, iDCR supports interactive customer features such as electronic program guides, pay-per-view and video on demand. Consumer devices which support iDCR also support the new OpenCable Application Platform (OCAP) standard developed by CableLabs.
|
Cable-ready
|
Digital cable
|
In practice however, the rental of cable converter boxes (or since the late 2010s, the rent-to-own arrangement of digital media players with a provider's app if the customer prefers) has remained a lucrative business line for most cable providers, and they have preferred to phase out support of analog or digital cable-ready televisions which are not CableCard compliant and rent converter boxes out instead, with prevention of cable theft another reason for the arrangement.
|
BBCH-scale (root and stem vegetable)
|
BBCH-scale (root and stem vegetable)
|
The BBCH-scale for root and stem vegetables identifies the phenological development stages of the root and stem vegetables such as carrot, celeriac, kohlrabi, chicory, radish and swede, using the BBCH-scale.
|
DNA barcoding in diet assessment
|
DNA barcoding in diet assessment
|
DNA barcoding in diet assessment is the use of DNA barcoding to analyse the diet of organisms. and further detect and describe their trophic interactions. This approach is based on the identification of consumed species by characterization of DNA present in dietary samples, e.g. individual food remains, regurgitates, gut and fecal samples, homogenized body of the host organism, target of the diet study (for example with whole body of insects).
|
DNA barcoding in diet assessment
|
DNA barcoding in diet assessment
|
The DNA sequencing approach to be adopted depends on the diet breadth of the target consumer. For organisms feeding on one or only few species, traditional Sanger sequencing techniques can be used. For polyphagous species with diet items more difficult to identify, it is conceivable to determine all consumed species using NGS methodology.The barcode markers utilized for amplification will differ depending on the diet of the target organism. For herbivore diets, the standard DNA barcode loci will differ significantly depending on the plant taxonomic level. Therefore, for identifying plant tissue at the taxonomic family or genus level, the markers rbcL and trn-L-intron are used, which differ from the loci ITS2, matK, trnH-psbA (noncoding intergenic spacer) used to identify diet items to genus and species level. For animal prey, the most broadly used DNA barcode markers to identify diets are the mitochondrial cytochrome C oxydase (COI) and cytochrome b (cytb). When the diet is broad and diverse, DNA metabarcoding is used to identify most of the consumed items.
|
DNA barcoding in diet assessment
|
Advantages
|
A major benefit of using DNA barcoding in diet assessment is the ability to provide high taxonomic resolution of consumed species. Indeed, when compared to traditional morphological analysis, DNA barcoding enables a more reliable separation of closely related taxa reducing the observed bias. Moreover, DNA barcoding enables to detect soft and highly digested items, not recognisable through morphological identification. For example, Arachnids feed on pre-digested bodies of insects or other small animals and their stomach content is too decomposed and morphologically unrecognizable using traditional methods such as microscopy.When investigating herbivores diet, DNA metabarcoding enables detection of highly digested plant items with a higher number of taxa identified compared to microhistology and macroscopic analysis. For instance, Nichols et al. (2016) highlighted the taxonomic precision of metabarcoding on rumen contents, with on average 90% of DNA-sequences being identified to genus or species level in comparison to 75% of plant fragments recognised with macroscopy. Morevoer, another empirically tested advantage of metabarcoding compared to traditional time-consuming methods, involves higher cost efficiency. Finally, with its fine resolution, DNA barcoding represents a crucial tool in wildlife management to identify the feeding habits of endangered species and animals that can cause feeding damages to the environment.
|
DNA barcoding in diet assessment
|
Challenges
|
With DNA barcoding it is not possible to retrieve information about sex or age of prey species, which can be crucial. This limitation can anyway be overcome with an additional step in the analysis by using microsatellite polymorphism and Y-chromosome amplification. Moreover, DNA provides detailed information of the most recent events (e.g. 24–48 hr) but it is not able to provide a longer dietary prospect unless a continuous sampling is conducted. Additionally, when using generic primers that amplify ‘barcode’ regions from a broad range of food species, the amplifiable host DNA may largely outnumber the presence of prey DNA, complicating prey detection. However, a strategy to prevent the host DNA amplification can be the addition of a predator-specific blocking primer. Indeed, blocking primers for suppressing amplification of predator DNA allows the amplification of the other vertebrate groups and produces amplicon mixes that are predominately food DNA.Despite the improvement of diet assessment via DNA barcoding, secondary consumption (prey of the prey, parasites, etc.) still represents a confounding factor. In fact, some secondary prey may result in the analysis as primary prey items, introducing a bias. However, due to a much lower total biomass and to a higher level of degradation, DNA of secondary prey might represent only a minor part of sequences recovered compared to primary prey.The quantitative interpretation of DNA barcoding results is not straightforward. There have been attempts to use the number of sequences recovered to estimate the abundance of prey species in diet contents (e.g. gut, faeces). For example, if the wolf ate more moose than wild boar, there should be more moose DNA in their gut, and thus, more moose sequences are recovered. Despite the evidence for general correlations between the sequence number and the biomass, actual evaluations of this method have been unsuccessful. This can be explained by the fact that tissues originally contain different densities of DNA and can be digested differently.
|
DNA barcoding in diet assessment
|
Examples
|
Mammals Mammals diet is widely studied using DNA barcoding and metabarcoding. Some differences in the methodology can be observed depending on the feeding strategy of the target mammal species, i.e. whether it is herbivore, carnivore, or omnivore.
|
DNA barcoding in diet assessment
|
Examples
|
For herbivore mammal species, DNA is usually extracted from faeces samples or rumen contents collected from road kills or animals killed during regular hunting. Within DNA barcoding, the trnL approach can be used to identify plant species by using a very short but informative fragment of chloroplast DNA (P6 loop of the chloroplast trnL (UAA) intron). Potentially, this application is applicable to all herbivorous species feeding on angiosperms and gymnosperms Alternatively to the trnL approach, the markers rbcL, ITS2, matK, trnH-psbA can be used to amplify plant species.
|
DNA barcoding in diet assessment
|
Examples
|
When studying small herbivores with a cryptic life style, such as voles and lemmings, DNA barcoding of ingested plants can be a crucial tool giving an accurate picture of food utilization. Additionally, the fine resolution in plant identification obtained with DNA barcoding allows researchers to understand change in diet composition over time and variability among individuals, as observed in the alpine chamois (Rupicapra rupicapra). Between October and November, by analyzing the faeces composition via DNA barcoding, the alpine chamois showed a shift in diet preferences. Also, different diet categories were observed amongst individuals within each month.
|
DNA barcoding in diet assessment
|
Examples
|
For carnivores, the use of non-invasive approaches is crucial especially when dealing with elusive and endangered species. Diet assessment through DNA barcoding of faeces can have a greater efficiency in prey species detection compared to traditional diet analysis, which mostly rely upon the morphological identification of undigested hard remains in the faeces. Estimating the vertebrate diet diversity of the leopard cat (Prionailurus bengalensis) in Pakistan, Shehzad et al. (2012) identified a total of 18 prey taxa using DNA barcoding on faeces. Eight distinct bird taxa were reported, while previous studies based on conventional methods did not identify any bird species in the leopard cat diet. Another example is the use of DNA barcoding to identify soft remains of prey in the stomach contents of predators e.g. grey seals (Halichoerus grypus) and harbour porpoises (Phocoena phocoena).DNA metabarcoding is a game changer for the study of complex diets, such as for omnivores predators, feeding on many different species with both plants and animal origin. This methodology does not require knowledge about the food consumed by animals in the habitat they occupy. In a study on brown bear (Ursus arctos) diet, DNA metabarcoding allowed accurate reconstruction of a wide range of taxonomically different items present in faecal samples collected in the field.
|
HathiTrust
|
HathiTrust
|
HathiTrust Digital Library is a large-scale collaborative repository of digital content from research libraries including content digitized via Google Books and the Internet Archive digitization initiatives, as well as content digitized locally by libraries.
|
HathiTrust
|
Etymology
|
Hathi (IPA: [hah-tee]), derived from the Sanskrit hastin, is the Hindi/Urdu word for 'elephant', an animal famed for its long-term memory.
|
HathiTrust
|
History
|
HathiTrust was founded in October 2008 by the twelve universities of the Committee on Institutional Cooperation and the eleven libraries of the University of California. The partnership includes over 60 research libraries across the United States, Canada, and Europe, and is based on a shared governance structure. Costs are shared by the participating libraries and library consortia. The repository is administered by the University of Michigan. The executive director of HathiTrust is Mike Furlough, who succeeded founding director John Wilkin after Wilkin stepped down in 2013. The HathiTrust Shared Print Program is a distributed collective collection whose participating libraries have committed to retaining almost 18 million monograph volumes for 25 years, representing three-quarters of HathiTrust digital book holdings.In September 2011, the Authors Guild sued HathiTrust (Authors Guild, Inc. v. HathiTrust), alleging massive copyright violation. A federal court ruled against the Authors Guild in October 2012, finding that HathiTrust's use of books scanned by Google was fair use under US law. The court's opinion relied on the transformativeness doctrine of federal copyright law, holding that the Trust had transformed the copyrighted works without infringing on the copyright holders' rights. That decision was largely affirmed by the Second Circuit on June 10, 2014, which found that providing search and accessibility for the visually impaired were grounds to consider the service transformative and fair use, and remanded to the lower court to reconsider whether the plaintiffs had standing to sue regarding HathiTrust's library preservation copies.In October 2015, HathiTrust comprised over 13.7 million volumes, including 5.3 million in the public domain in the United States. HathiTrust provides a number of discovery and access services, notably, full-text search across the entire repository. In 2016 over 6.17 million users located in the United States and in 236 other nations used HathiTrust in 10.92 million sessions.As of 2021, the copyright policy states that "many works in our collection are protected by copyright law, so we cannot ordinarily publicly display large portions of those protected works unless we have permission from the copyright holder", and thus "if we cannot determine the copyright or permission status of a work, we restrict access to that work until we can establish its status. Because of differences in international copyright laws, access is also restricted for users outside the United States to works published outside the United States after and including 1896."
|
HathiTrust
|
PageTurner
|
PageTurner is the web application on the HathiTrust website for viewing publications. From PageTurner readers can navigate through a publication, download a PDF version of it, and view pages in different ways, such as one page at a time, scrolling, flipping, or thumbnail views.
|
HathiTrust
|
Emergency Temporary Access Service
|
The Emergency Temporary Access Service (ETAS) is a service provided by HathiTrust that makes it possible in certain special situations, such as closure of a library for a public health emergency, for users of HathiTrust member libraries to obtain lawful access to copyright digital materials in place of the corresponding physical books held by the same library through the controlled digital lending model.
|
Rain sensor
|
Rain sensor
|
A rain sensor or rain switch is a switching device activated by rainfall. There are two main applications for rain sensors. The first is a water conservation device connected to an automatic irrigation system that causes the system to shut down in the event of rainfall. The second is a device used to protect the interior of an automobile from rain and to support the automatic mode of windscreen wipers.
|
Rain sensor
|
How Does a Rain Sensor Work?
|
Operation The rain sensor works on the principle of total internal reflection. An infrared light beams at a 45-degree angle on a clear area of the windshield is reflected and it is sensed by the sensor-inside the car. When it rains, the wet glass causes the light to scatter and lesser amount of light gets reflected back to the sensor An additional application in professional satellite communications antennas is to trigger a rain blower on the aperture of the antenna feed, to remove water droplets from the mylar cover that keeps pressurized and dry air inside the wave-guides.
|
Rain sensor
|
Irrigation sensors
|
Rain sensors for irrigation systems are available in both wireless and hard-wired versions, most employing hygroscopic disks that swell in the presence of rain and shrink back down again as they dry out — an electrical switch is in turn depressed or released by the hygroscopic disk stack, and the rate of drying is typically adjusted by controlling the ventilation reaching the stack. However, some electrical type sensors are also marketed that use tipping bucket or conductance type probes to measure rainfall. Wireless and wired versions both use similar mechanisms to temporarily suspend watering by the irrigation controller specifically they are connected to the irrigation controller's sensor terminals, or are installed in series with the solenoid valve common circuit such that they prevent the opening of any valves when rain has been sensed.
|
Rain sensor
|
Irrigation sensors
|
Some irrigation rain sensors also contain a freeze sensor to keep the system from operating in freezing temperatures, particularly where irrigation systems are still used over the winter.
Some type of sensor is required on new lawn sprinkler systems in Florida, New Jersey, Minnesota, Connecticut and most parts of Texas.
|
Rain sensor
|
Automotive sensors
|
In 1958, the Cadillac Motor Car Division of General Motors experimented with a water-sensitive switch that triggered various electric motors to close the convertible top and raise the open windows of a specially-built Eldorado Biarritz model, in case of rain. The first such device appears to have been used for that same purpose in a concept vehicle designated Le Sabre and built around 1950–51.
|
Rain sensor
|
Automotive sensors
|
General Motors' automatic rain sensor for convertible tops was available as a dealer-installed option during the 1950s for vehicles such as the Chevrolet Bel Air.For the 1996 Model Year, Cadillac once again equipped cars with an automatic rain sensor; this time to automatically trigger the windshield wipers and adjust their speed to conditions as necessary.In December 2017 Tesla started rolling out an OTA update (2017.52.3) enabling their AP2.x cars to utilize the onboard cameras to passively detect rain without the use of a dedicated sensor.
|
Rain sensor
|
Automotive sensors
|
Most vehicles with this feature have an "AUTO" position on the control column.
|
Rain sensor
|
Physics of rain sensor
|
The most common modern rain sensors are based on the principle of total internal reflection. At all times, an infrared light is beamed at a 45-degree angle into the windshield from the interior. If the glass is dry, the critical angle for total internal refraction is around 42°. This value is obtained with the total internal refraction formula sin (θc)=n1n2 where n1=1 is the approximate value on air's refraction index for infrared and 1.5 is the approximate value of the glass refraction index, also for infrared. In that case, since the incident angle of light is 45°, all the light is reflected and the detector receives maximum intensity.
|
Rain sensor
|
Physics of rain sensor
|
If the glass is wet, the critical angle changes to around 60° because the refraction index of water is higher than air ( 1.3 ). In that case, because the incident angle is 45°, total internal reflection is not obtained. Part of the light beam is transmitted through the glass and the intensity measured for reflection is lower : the system detects water and the wipers turn on.
|
Nios II
|
Nios II
|
Nios II is a 32-bit embedded processor architecture designed specifically for the Altera family of field-programmable gate array (FPGA) integrated circuits. Nios II incorporates many enhancements over the original Nios architecture, making it more suitable for a wider range of embedded computing applications, from digital signal processing (DSP) to system-control.
Nios II is a successor to Altera's first configurable 16-bit embedded processor Nios, introduced in 2000.
|
Nios II
|
Key features
|
Like the original Nios, the Nios II architecture is a RISC soft-core architecture which is implemented entirely in the programmable logic and memory blocks of Altera FPGAs. Unlike its predecessor it is a full 32-bit design: 32 general-purpose 32-bit registers, Full 32-bit instruction set, data path, and address space, Single-instruction 32 × 32 multiply and divide producing a 32-bit result.The soft-core nature of the Nios II processor lets the system designer specify and generate a custom Nios II core, tailored for his or her specific application requirements. System designers can extend the Nios II's basic functionality by, for example, adding a predefined memory management unit, or defining custom instructions and custom peripherals.
|
Nios II
|
Key features
|
Custom instructions Similar to native Nios II instructions, user-defined instructions accept values from up to two 32-bit source registers and optionally write back a result to a 32-bit destination register. By using custom instructions, the system designers can fine-tune the system hardware to meet performance goals and also the designer can easily handle the instruction as a macro in C.
|
Nios II
|
Key features
|
Custom peripherals For performance-critical systems that spend most CPU cycles executing a specific section of code, a user-defined peripheral can potentially offload part or all of the execution of a software-algorithm to user-defined hardware logic, improving power-efficiency or application throughput.
Memory Management Unit Introduced with Quartus 8.0, the optional MMU enables Nios II to run operating systems which require hardware-based paging and protection, such as the Linux kernel. Without an MMU, Nios is restricted to operating systems which use a simplified protection and virtual memory-model: e.g., µClinux and FreeRTOS.
Memory Protection Unit Introduced with Quartus 8.0, the optional MPU provides memory protection similar to that provided by an MMU but with a simpler programming model and without the performance overhead associated with an MMU.
|
Nios II
|
Nios II CPU family
|
Nios II classic is offered in 3 different configurations: Nios II/f (fast), Nios II/s (standard), and Nios II/e (economy).
Nios II gen2 is offered in 2 different configurations: Nios II/f (fast), and Nios II/e (economy).
|
Nios II
|
Nios II CPU family
|
Nios II/f The Nios II/f core is designed for maximum performance at the expense of core size. Features of Nios II/f include: Separate instruction and data caches (512 B to 64 KB) Optional MMU or MPU Access to up to 2 GB of external address space Optional tightly coupled memory for instructions and data Six-stage pipeline to achieve maximum DMIPS/MHz Single-cycle hardware multiply and barrel shifter Optional hardware divide option Dynamic branch prediction Up to 256 custom instructions and unlimited hardware accelerators JTAG debug module Optional JTAG debug module enhancements, including hardware breakpoints, data triggers, and real-time trace Nios II/s Nios II/s core is designed to maintain a balance between performance and cost. This core implementation is not longer supported for Altera Quartus II v.17 and newer. Features of Nios II/s include: Instruction cache Up to 2 GB of external address space Optional tightly coupled memory for instructions Five-stage pipeline Static branch prediction Hardware multiply, divide, and shift options Up to 256 custom instructions JTAG debug module Optional JTAG debug module enhancements, including hardware breakpoints, data triggers, and real-time trace Nios II/e The Nios II/e core is designed for smallest possible logic utilization of FPGAs. This is especially efficient for low-cost Cyclone II FPGA applications. Features of Nios II/e include: Up to 2 GB of external address space JTAG debug module Complete systems in fewer than 700 LEs Optional debug enhancements Up to 256 custom instructions Free, no license required
|
Nios II
|
Avalon switch fabric interface
|
Nios II uses the Avalon switch fabric as the interface to its embedded peripherals. Compared to a traditional bus in a processor-based system, which lets only one bus master access the bus at a time, the Avalon switch fabric, using a slave-side arbitration scheme, lets multiple masters operate simultaneously.
|
Nios II
|
Development processes
|
Development for Nios II consists of two separate steps: hardware generation and software creation.
|
Nios II
|
Development processes
|
Development is hosted inside an Altera application called the Embedded Design Suite (EDS). The EDS contains a complete integrated development environment to manage both hardware and software in two separate steps: Hardware generation process Nios II hardware designers use the Qsys system integration tool, a component of the Quartus-II package, to configure and generate a Nios system. The configuration graphical user interface (GUI) allows users to choose the Nios-II's feature-set, and to add peripheral and I/O-blocks (timers, memory-controllers, serial interface, etc.) to the embedded system. When the hardware specification is complete, Quartus-II performs the synthesis, place & route to implement the entire system on the selected FPGA target.
|
Nios II
|
Development processes
|
Qsys is replacing the older SOPC (System-on-a-Programmable-Chip) Builder, which could also be used to build a Nios II system, and is being recommended for new projects.
Software creation process A separate package, called the Embedded Design Suite (EDS), manages the software development. Based on the Eclipse IDE, the EDS includes a C/C++ compiler (based on the GNU toolchain), debugger, and an instruction-set simulator. EDS allows programmers to test their application in simulation, or download and run their compiled application on the actual FPGA host.
Because the C/C++ development-chain is based on GCC, the vast majority of open source software for Linux compiles and runs with minimal or no modification. Third-party operating-systems have also been ported to Nios II. These include Micrium MicroC/OS-II, eCos, Segger Microcontroller embOS, ChibiOS/RT, μCLinux and FreeRTOS.
Licensing Nios II is comparable to MicroBlaze, a competing softcore CPU for the Xilinx family of FPGA. Unlike MicroBlaze, Nios II is licensable for standard-cell ASICs through a third-party IP provider, Synopsys Designware. Through the Designware license, designers can port Nios-based designs from an FPGA-platform to a mass production ASIC-device.
|
Equid alphaherpesvirus 4
|
Equid alphaherpesvirus 4
|
Equid alphaherpesvirus 4, formerly Equine herpesvirus 4 (EHV-4) is a virus of the family Herpesviridae that cause rhinopneumonitis in horses. It is the most important viral cause of respiratory infection in foals. Like other herpes viruses, EHV-4 causes a lifelong latent infection in affected animals. These horses are usually the source for new infection for foals over two months old, weanlings, and yearlings. Symptoms include fever, loss of appetite, and discharge from the nose. Most infected animals recover in one to three weeks, but death can occur in environments with overcrowding and other stress factors. There are several vaccines available (ATCvet codes: QI05AA03 (WHO) inactivated, QI05AD01 (WHO) live, plus various combinations).
|
Equid alphaherpesvirus 4
|
Description
|
EHV-4 is an upper respiratory disease restricted to the infection of the respiratory tract epithelium and its associated lymph nodes. EHV 4 and its close relative EHV 1 are clinically and pathologically indistinguishable and are the primary pathogens that cause respiratory tract disease in young horses from weanling to 2 years of age. Incubation period of Equine Herpiesvirus is 2–10 days. Symptoms include fever (38.9–41.7 °C), loss of appetite, and a nasal discharge giving it the nickname "snots". Without antibiotic treatment, the damage to the respiratory mucosal barrier predisposes infected horses to secondary infections and the involvement of the lower airways (ex. bronchiolitis or pneumonia); Increasing the duration, severity and the mortality of the disease. EHV-4 rarely causes abortion in infected pregnant mares unlike its EHV-1 counterpart. Although there is no specific treatment for the disease once a horse is infected, vaccination against EHV-1 and EHV-4 is recommended as part of preventative herd health for those at high risk of infection. Multiple vaccines are available (Duvaxyn EHV1,4, EquiGuard, EquiVac EHV-1/4, etc.), most in an inactivated virus form.The Equine Herpesvirus occupies the horse in such a way that allows post infection viral persistency over the lifetime of an animal. These carrier horses may comprise up to half of a given horse population. Therefore, management practices are recommended for controlling and managing EHV include isolating incoming horses for 3–4 weeks before co-mingling with resident horses and pregnant mares, reducing stress to prevent the reappearance of a latent virus and if there is an appearance of EHV affected horses should be isolated, and disinfection of the contaminated premise should commence. (The EHV has a large genome (150 kb) which is enclosed in a relatively fragile capsule. This limits their survival in the external environment and makes them highly susceptible to common disinfectants.) After an outbreak no horse should leave the premise for three weeks after the final clinical case recovers. Effective prevention measures, quick diagnosis, therapeutic intervention and the ability to control the spread in the case of an outbreak all allow for the management of EHV.
|
Hayashi rearrangement
|
Hayashi rearrangement
|
The Hayashi rearrangement is the chemical reaction of ortho-benzoylbenzoic acids catalyzed by sulfuric acid or phosphorus pentoxide.
This reaction proceeds through electrophilic acylium ion attack with a spiro intermediate.
|
.ve
|
.ve
|
.ve is the Internet country code top-level domain (ccTLD) for Venezuela.
On 3 March 2009 the ISO 3166-1 code for Venezuela changed to reflect the VE used for the ccTLD.
|
.ve
|
.ve
|
Registrations are allowed without restrictions, only at the third level: .arts.ve - artistic and cultural institution .co.ve - a website originally ".com" ported to Venezuelan Spanish .com.ve - Venezuelan commercial entity .info.ve - informational sites .net.ve - network service providers .org.ve - non-profit organizations .radio.ve - radio stations .web.ve - individualsThe following second-level domains allow restricted third-level domain registrations: .gob.ve / .gov.ve - government-related websites .edu.ve - Venezuela based educational institutions .int.ve - International institutions .mil.ve - Venezuelan military institution .tec.ve - University of TechnologyInternationalized domain names are available using the following Spanish characteres: á, é, í, ó, ú, ü, and ñ.A number of second-level domain names are in place, i.e., cha.ve, internet.ve, ipv6.ve, nic.ve
|
Triethylammonium acetate
|
Triethylammonium acetate
|
Triethylammonium acetate is a volatile salt, which is often used as an ion-pairing reagent in high-performance liquid chromatography separations of oligonucleotides. Since unadjusted triethylammonium acetate salt solutions contain neither conjugate acid nor conjugate base, they are not buffers.
|
Earth battery
|
Earth battery
|
An earth battery is a pair of electrodes made of two dissimilar metals, such as iron and copper, which are buried in the soil or immersed in the sea. Earth batteries act as water-activated batteries. If the plates are sufficiently far apart, they can tap telluric currents . Earth batteries are sometimes referred to as telluric power sources and telluric generators.
|
Earth battery
|
History
|
One of the earliest examples of an earth battery was built by Alexander Bain in 1841 in order to drive a prime mover—a device that transforms the flow or changes in pressure of a fluid into mechanical energy. Bain buried plates of zinc and copper in the ground about one meter apart and used the resulting voltage, of about one volt, to operate a clock. Carl Friedrich Gauss, who had researched Earth's magnetic field, and Carl August von Steinheil, who built one of the first electric clocks and developed the idea of an "Earth return" (or "ground return"), had previously investigated such devices.
|
Earth battery
|
History
|
Daniel Drawbaugh received U.S. Patent 211,322 for an Earth battery for electric clocks (with several improvements in the art of Earth batteries). Another early patent was obtained by Emil Jahr U.S. Patent 690,151 Method of utilizing electrical Earth currents). In 1875, James C. Bryan received U.S. Patent 160,152 for his Earth Battery. In 1885, George Dieckmann, received US patent U.S. Patent 329,724 for his Electric Earth battery. In 1898, Nathan Stubblefield received U.S. Patent 600,457 for his electrolytic coil battery, which was a combination of an earth battery and a solenoid. (For more information see US patents 155209, 182802, 495582, 728381, 3278335, 3288648, 4153757 and 4457988.) The Earth battery, in general, generated power for early telegraph transmissions and formed part of a tuned circuit that amplified the signalling voltage over long distances.
|
Earth battery
|
Operation and use
|
The simplest earth batteries consist of conductive plates from different metals of the electropotential series, buried in the ground so that the soil acts as the electrolyte in a voltaic cell. As such, the device acts as a primary cell. When operated only as electrolytic devices, the devices were not continuously reliable, owing to drought condition. These devices were used by early experimenters as energy sources for telegraphy. However, in the process of installing long telegraph wires, engineers discovered that there were electrical potential differences between most pairs of telegraph stations, resulting from natural electrical currents (called telluric currents) flowing through the ground. Some early experimenters did recognize that these currents were, in fact, partly responsible for extending the earth batteries' high outputs and long lifetimes. Later, experimenters would utilize these currents alone and, in these systems, the plates became polarized.
|
Earth battery
|
Operation and use
|
It had been long known that continuous electric currents flowed through the solid and liquid portions of the Earth, and the collection of current from an electrically conductive medium in the absence of electrochemical changes (and in the absence of a thermoelectric junction) was established by Lord Kelvin. Lord Kelvin's "sea battery" was not a chemical battery. Lord Kelvin observed that such variables as placement of the electrodes in the magnetic field and the direction of the medium's flow affected the current output of his device. Such variables do not affect battery operation. When metal plates are immersed in a liquid medium, energy can be obtained and generated, including (but not limited to) methods known via magneto-hydrodynamic generators. In the various experiments by Lord Kelvin, metal plates were symmetrically perpendicular to the direction of the medium's flow and were carefully placed with respect to a magnetic field, which differentially deflected electrons from the flowing stream. The electrodes can be asymmetrically oriented with respect to the source of energy, though.
|
Earth battery
|
Operation and use
|
To obtain the natural electricity, experimenters would thrust two metal plates into the ground at a certain distance from each other in the direction of a magnetic meridian, or astronomical meridian. The stronger currents flow from south to north. This phenomenon possesses a considerable uniformity of current strength and voltage. As the Earth currents flow from south to north, electrodes are positioned, beginning in the south and ending in the north, to increase the voltage at as large a distance as possible. In many early implementations, the cost was prohibitive because of an over-reliance on extreme spacing between electrodes.
|
Earth battery
|
Operation and use
|
It has been found that all the common metals behave relatively similarly. The two spaced electrodes, having a load in an external circuit connected between them, are disposed in an electrical medium, and energy is imparted to the medium in such manner that "free electrons" in the medium are excited. The free electrons then flow into one electrode to a greater degree than in the other electrode, thereby causing electric current to flow in the external circuit through the load. The current flows from that plate whose position in the electropotential series is near the negative end (such as palladium). The current produced is highest when the two metals are most widely separated from each other in the electropotential series, and when the material nearer the positive end is to the north, while that at the negative end is towards the south. The plates, one copper and another iron or carbon, are connected above ground by means of a wire with as little resistance as possible. In such an arrangement, the electrodes are not appreciably chemically corroded, even when they are in earth saturated with water, and are connected together by a wire for a long time.It had been found that to strengthen the current, it was most advantageous to drive the northerly electropositive electrode deeper into the medium than the southerly electrode. The greatest currents and voltages were obtained when the difference in depth was such that a line joining the two electrodes was in the direction of the magnetic dip, or magnetic inclination. When the previous methods were combined, the current was tapped and utilized in any well-known manner.In some cases, a pair of plates with differing electrical properties, and with suitable protective coatings, were buried below the ground. A protective or other coating covered each entire plate. A copper plate could be coated with powdered coke, a processed carbonaceous material. To a zinc plate, a layer of felt could be applied. To use the natural electricity, earth batteries fed electromagnets, the load, that were part of a motor mechanism.
|
Earth battery
|
References and articles
|
General information Park Benjamin and Melvin L. Severy, The Voltaic Cell: Its Construction and Its Capacity. Wiley, 1893. 562 pages. pp. 317–319.
George Milton Hopkins, Experimental Science: Elementary, Practical and Experimental Physics. Munn & Co., 1902. pp. 437–451.
Frederick Collier Bakewell, Electric science, its history, phenomena and applications. 1853. pp. 182–184.
James Napier, A manual of electro-metallurgy. 1876. pp. 48–49.
William Edward Armytage Axon, The Mechanic's Friend. Trübner, 1875. 339 pages. pp. 303–304.
Adolph A. Fesquet, Oliver Byrne, and John Percy, The Practical Metal-worker's Assistant. H.C. Baird & Co., 1878. 683 pages. pp. 529–530.
Eugenii Katz, "Alexander Bain". The history of electrochemistry, electricity and electronics; Biosensors & Bioelectronics.
Vassilatos, Gerry, "An Introduction to the Mysteries of Ground Radio".
Burns, R. W., "Alexander Bain, a most ingenious and meritorious inventor". Engineering Science and Education Journal, Volume 2, Issue 2, Apr 1993. pp. 85–93. ISSN 0963-7346 R. J. Edwards G4FGQ, Measurement of Soil Resistivity & Calculation of Earth Electrode Resistance. 15 February 1998 The Gentleman's magazine. (1731). London: [s.n.]. p. 587.
Spencer W. Richardson, "The Flow of Electricity through Dielectrics". Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character, Vol. 92, No. 635 (Nov. 1, 1915), pp. 101–107.
John Patterson Abernethy, The Modern Service of Commercial and Railway Telegraphy. 1887. 423 pages. p. 72.
William Dwight, Whitney Dictionary: An Encyclopedic Lexicon of the English Language. p. 1405.
Thomas Dixon Lockwood, Electricity, Magnetism, and Electric Telegraphy. D. Van Nostrand Co., 1883. 375 pages. p. 42.
Eliot, Samuel (1911). "'Thomas Dixon Lockwood' (and 'John Davis Long', 'Henry Cabot Lodge')". Biographical Massachusetts; Biographies and Autobiographies of the Leading Men in the State, Volume 1. Boston: Massachusetts Biographical Society. OCLC 8185704.
Edwin James Houston, A Dictionary of Electrical Words, Terms and Phrases. P.F. Collier & Son, 1903. p. 756.
Henry Minchin, Student's Text-book of Electricity. Lockwood, 1867. 519 pages. pp. 477–485. (Alternative copy) Vassilatos, G. (2000). Lost science. Kempton, Ill: Adventures Unlimited.
"Telluric Currents: The Natural Environment and Interactions with Man-made Systems". The Earth's Electrical Environment (1986), Commission on Physical Sciences, Mathematics, and Applications.
Prescott, G. B. (1860). History, theory, and practice of the electric telegram. Boston: Ticknor and Fields. 468 pages.
Citations and notes Patents A. Bain, "U.S. Patent 5,957 Copying surfaces by electricity".
A. Bain, "U.S. Patent 6,328 Improvements in electric telegraphs".
W. P. Piggot, "U.S. Patent 050,314 Telegraph cable".
W. D. Snow, "U.S. Patent 155,209 Earth-batteries for generating electricity".
J. Cerpaux, "U.S. Patent 182,802 Electric piles".
Daniel Drawbaugh, "U.S. Patent 211,322 Earth battery for electric clocks".
M. Emme, "U.S. Patent 495,582 Ground generator of electricity".
M. Emme, "U.S. Patent 728,381 Storage Battery".
Jahr, Emil, "U.S. Patent 690,151 Method of utilizing electrical earth currents".
Bryan, James C., "U.S. Patent 160,151 Improvements in lightning rods".
Bryan, James C., "U.S. Patent 160,152 Earth Battery". February 23, 1875.
Bryan, James C., "U.S. Patent 160,154 Improvements in lightning rods".
James M. Dices, "U.S. Patent 2,806,895 Immersion type battery".
Dieckmann, George F., "U.S. Patent 329,724 Electric Earth Battery". November 3, 1885.
Stubblefield, Nathan, "U.S. Patent 600,457 Electric battery". May 8, 1898.
William T. Clark, "U.S. Patent 4,153,757 Method and apparatus for generating electricity".
Ryeczek, "U.S. Patent 4,457,988 Earth battery". July 3, 1984.
Further reading Lamont, J. V., Der Erdstrom und der Zusammen desselben mit dem Erdmagnetismus. Leopold-Voss-Verlag, Leipzig und Muenchen, 1862. (Tr., Telluric currents and their relationship to geomagnetism) Weinstein, Electrotechnische Zeitshrift. 1898, pg., 794. (Tr., Electrotechnic magazine) John Timbs, The Year-book of Facts in Science and Art. 1868. p. 130.
Journal of the Telegraph. Western Union Telegraph, Co., 1914.
|
Flag of Chicago
|
Flag of Chicago
|
The flag of Chicago consists of two light blue horizontal bars, or stripes, on a field of white, each bar one-sixth the height of the full flag, and placed slightly less than one-sixth of the way from the top and bottom. Four bright red stars, with six sharp points each, are set side by side, close together, in the middle third of the flag's surface.Chicago is a city in Illinois, United States. Its flag was adopted in 1917 after the design by Wallace Rice won a City Council sponsored competition. It initially had two stars until 1933, when a third was added. The four-star version has existed since 1939. The three sections of the white field and the two bars represent geographical features of the city, the stars symbolize historical events, and the points of the stars represent important virtues or concepts. The historic events represented by the stars are the establishment of Fort Dearborn, Great Chicago Fire of 1871, World's Columbian Exposition of 1893, and Century of Progress Exposition of 1933–34.
|
Flag of Chicago
|
Flag of Chicago
|
In a review by the North American Vexillological Association of 150 American city flags, the Chicago city flag was ranked second-best with a rating of 9.03 out of 10, behind only the flag of Washington, D.C.
|
Flag of Chicago
|
Symbolism
|
Bars The three white background areas of the flag represent, from top to bottom, the North, West, and South sides of the city. The top blue bar represents Lake Michigan and the North Branch of the Chicago River. The bottom blue bar represents the South Branch of the river and the "Great Canal", over the Chicago Portage. The light blue of the flag's two bars is variously called sky blue or pale blue; in a 1917 article of a speech by designer Wallace Rice, it was called "the color of water".
|
Flag of Chicago
|
Symbolism
|
Stars There are four red six-pointed stars on the center white bar. Six-pointed stars are used because five-pointed stars represent sovereign states and because the star as designed was found on no other known flags as of 1917. From the hoist outwards, the stars represent: Added in 1939: Commemorates Fort Dearborn, and its six points stand for political entities the Chicago region has belonged to and the flags that have flown over the area: France, 1693; Great Britain, 1763; Virginia, 1778; the Northwest Territory, 1789; Indiana Territory, 1802; and Illinois (territory, 1809, and state, since 1818).
|
Flag of Chicago
|
Symbolism
|
Original to the 1917 flag: This star stands for the Great Chicago Fire of 1871. Its six points represent the virtues of religion, education, aesthetics, justice, beneficence, and civic pride.
Original to the 1917 flag: This star symbolizes the World's Columbian Exposition of 1893. Its six points symbolize transportation, labor, commerce, finance, populousness, and salubrity (health).
|
Flag of Chicago
|
Symbolism
|
Added in 1933: This star represents the Century of Progress Exposition (1933–34). Its points refer to: Chicago's status as the United States' second largest city at the time of the star's addition (Chicago became third largest in a 1990 census when passed by Los Angeles); Chicago's Latin motto, Urbs in horto ("City in a garden"); Chicago's "I Will" motto; the Great Central Marketplace; Wonder City; and Convention City.Additional stars have been proposed, with varying degrees of seriousness. The following reasons have been suggested for possible additions of a fifth star: A fifth star could represent Chicago's contribution to the nuclear age (see Metallurgical Laboratory), an idea first suggested in a 1940s letter published by the Chicago Tribune and later championed by Mayor Richard J. Daley in the 1960s.
|
Flag of Chicago
|
Symbolism
|
In the 1980s, a star was proposed in honor of Harold Washington, the first African-American mayor of Chicago.
The 1992 Chicago flood was suggested as an additional natural disaster deserving of a star, in line with the existing star for the 1871 Great Chicago Fire. Another fifth star was in the works from a group of Chicago real estate professionals to represent Chicago's entrepreneurial spirit in the early 1990s.
When Chicago was bidding to host the 2016 Summer Olympics, the Bid Committee proposed that a fifth star be added to the flag in commemoration, but the bid was won instead by Rio de Janeiro, Brazil.
Anne Burke, Tim Shriver, and others have proposed adding a fifth star to commemorate the Special Olympics, which were founded in Chicago.
Other sports-related suggestions include recognizing the Chicago Bulls' dominance of the National Basketball Association in the 1990s and a proposal for a fifth star if the Chicago Cubs should ever win the World Series, which did not happen between their long drought of series wins in 1908, up to 2016.
The Chicago History Museum has an ongoing exhibition where the public is encouraged to vote for a potential fifth star.
Chicago Mayor Lori Lightfoot suggested that Chicago's response to the COVID-19 pandemic could warrant adding a fifth star to Chicago's flag.
|
Flag of Chicago
|
Unlawful private use
|
Per the Municipal Code of Chicago, it is unlawful to use the flag, or any imitation or design thereof, except for the usual and customary purposes of decoration or display. Causing to be displayed on the flag, any letter, word, legend, or device not provided for in the Code is also prohibited. Violators are subject to fines between $5.00 and $25.00 for each offense. However, the First Amendment to the United States Constitution prohibits this section from being enforced (U.S. v. Eichman).
|
Flag of Chicago
|
History
|
In 1915, Mayor William Hale Thompson appointed a municipal flag commission chaired by Alderman James A. Kearnes. Among the commission members were wealthy industrialist Charles Deering and impressionist painter Lawton S. Parker. Parker asked lecturer and poet Wallace Rice to develop the rules for an open public competition for the best flag design. Over a thousand entries were received. The 318th Cavalry Regiment incorporated the flag into their insignia.
|
Whipping knot
|
Whipping knot
|
A whipping knot or whipping is a binding of marline twine or whipcord around the end of a rope to prevent its natural tendency to fray. Some whippings are finished cleanly, as by drawing the bitter end of the cordage beneath the whipping itself. Others are tied off or have the end(s) of the twine sewn through the rope. According to The Ashley Book of Knots, "The purpose of a whipping is to prevent the end of a rope from fraying ... A whipping should be, in width, about equal to the diameter of the rope on which it is put ... [Two sailmaker's whippings], a short distance apart, are put in the ends of every reef point, where the constant "whipping" against the sail makes the wear excessive; this is said to be the source of the name whipping." The other type of stopping knot is a seizing knot.
|
Whipping knot
|
Whipping knot
|
Whipping is suitable for synthetic and natural stranded and braided lines, including 3-strand rope, 4-strand cable and 8-strand multiplait, as well as concentric and braided constructions.
|
Whipping knot
|
Tying
|
Multiple turns of twine (sometimes called small stuff for smaller lines) or heavier whipcord (for large diameter cables and ropes) are tightly wrapped around a rope's cut end to prevent its fibers from unlaying.
|
Whipping knot
|
Tying
|
Usually one end of the whipping cord is looped along the rope to be whipped, and the remaining cord wound tightly over the loop. Finally the loose end of the wound whipping is passed through the loop so that both ends may be drawn securely inside the winding.Whippings may also be applied by hand or using a palm and needle, and either simply tied off or made neat and permanent by reeving the twine's cut ends into or behind the whipping, sewing them to adjacent strands, or through the rope itself.
|
Whipping knot
|
Tying
|
In applications where a lot of flexing is expected, the whipping may be impregnated with dilute spar varnish or superglue.
|
Whipping knot
|
Types
|
French whipping French whipping is merely a series of half hitches. Start with a running eye and finish up with the end tucked back under the last few hitches. The ridge of the hitches should follow the lay of the rope.
French whipping is a whipping knot that consists of a series of half hitches. It is used to stop unraveling of rope ends as well as to provide a grip over railings.
Portuguese whipping Portuguese whipping is the quickest of all to apply; the ends are merely reef knotted together. It is given by Esparteiro in his Dicionario de Marinharia (Lisboa, 1936).
The Portuguese whipping is a type of whipping knot. To make it you take the small diameter string and lay one end against the rope. Wrap backwards up the rope until you have both ends side by side, finish by tying a reef knot. This is the quickest of the seizings, but is not as secure as some.
|
Whipping knot
|
Alternatives
|
Constrictor knot A constrictor knot can be used temporarily to hold the fibres of a cut line until a final whipping can be applied.
Tape Several turns of self-adhesive plastic tape may form a temporary or emergency substitute for whipping.
|
Whipping knot
|
Alternatives
|
Fusion The ends of some man-made fibers such as Dacron, Nylon, polyethylene, polyester, and polypropylene (but not aramid fibers) may be melted to fuse their fibers to prevent fraying. However, the rope and knotting expert Geoffrey Budworth warns against this practice for boat operators thus: Sealing rope ends this way is lazy and dangerous. A tugboat operator once sliced the palm of his hand open down to the sinews after the hardened (and obviously sharp) end of a rope that had been heat-sealed pulled through his grasp. There is no substitute for a properly made whipping.
|
Whipping knot
|
Alternatives
|
Among the methods of fusing are using an electrically heated rope cutter, heating the blade of a knife, or melting cut ends in a flame. The cool (transparent) part of a butane lighter flame works best.
It is helpful to wrap the end of a line to be fused with several turns of plastic tape first. The finished end will be neater and narrower if a cut is made through the tape.
Back splice Back splicing uses a stranded rope's own fibres to prevent fraying. A back splice adds extra thickness to the rope end, preventing it from running through blocks and sheaves. It can also be of benefit when a user needs to feel the end of the rope, as on a bucket lanyard.
Liquid Liquid whipping is a semi-permanent rubbery coating applied by dipping the cut end of a line into a container of the product. When the coating sets it is flexible but solid enough to keep the rope together. Liquid whipping can be used on both natural and synthetic fibers.
Aglet An aglet is a permanent ending applied mechanically to bind the end of the rope. A typical example is the plastic aglet at the end of a shoelace. Metal aglets may be crimped onto ropes or cables. Aglets may also be made by melting a softer metal to cap the end of the cable.
|
Chain Bridge
|
Chain Bridge
|
Chain bridges are suspension bridges built with chains. Some chain bridges built using this design have retained the name Chain Bridge. Thus as a proper noun, it may refer to: In Hungary: Chain Bridge (Budapest), a bridge over the Danube in Budapest, Hungary (completed 1849)In Germany: Chain Bridge (Nuremberg), a pedestrian bridge over the river Pegnitz in Nuremberg, Bavaria (opened 1924)In the United Kingdom: Union Bridge (Tweed), a bridge over the River Tweed between England and Scotland (opened 1820) Chain Bridge, a bridge over the River Usk in Monmouthshire, Wales (opened 1829) Chain Bridge (Berwyn), a bridge over the River Dee at Berwyn, Llangollen, Denbighshire, North Wales (completed 1818)In the United States: Chain Bridge (Easton, Pennsylvania), a historic change bridge spanning the Lehigh River (completed 1857) Chain Bridge (Potomac River) a bridge at the Little Falls of the Potomac River in Washington, D.C. (completed 1808) Chain Bridge (Massachusetts), a bridge which crosses the Merrimack River, connecting Amesbury and Newburyport, Massachusetts (completed 1810)
|
Mod n cryptanalysis
|
Mod n cryptanalysis
|
In cryptography, mod n cryptanalysis is an attack applicable to block and stream ciphers. It is a form of partitioning cryptanalysis that exploits unevenness in how the cipher operates over equivalence classes (congruence classes) modulo n. The method was first suggested in 1999 by John Kelsey, Bruce Schneier, and David Wagner and applied to RC5P (a variant of RC5) and M6 (a family of block ciphers used in the FireWire standard). These attacks used the properties of binary addition and bit rotation modulo a Fermat prime.
|
Mod n cryptanalysis
|
Mod 3 analysis of RC5P
|
For RC5P, analysis was conducted modulo 3. It was observed that the operations in the cipher (rotation and addition, both on 32-bit words) were somewhat biased over congruence classes mod 3. To illustrate the approach, consider left rotation by a single bit: if 31 32 if 31 Then, because 32 mod 3), it follows that mod 3).
|
Mod n cryptanalysis
|
Mod 3 analysis of RC5P
|
Thus left rotation by a single bit has a simple description modulo 3. Analysis of other operations (data dependent rotation and modular addition) reveals similar, notable biases. Although there are some theoretical problems analysing the operations in combination, the bias can be detected experimentally for the entire cipher. In (Kelsey et al., 1999), experiments were conducted up to seven rounds, and based on this they conjecture that as many as 19 or 20 rounds of RC5P can be distinguished from random using this attack. There is also a corresponding method for recovering the secret key.
|
Mod n cryptanalysis
|
Mod 3 analysis of RC5P
|
Against M6 there are attacks mod 5 and mod 257 that are even more effective.
|
Heinz Billing Prize
|
Heinz Billing Prize
|
In 1993, the Heinz Billing Prize for the advancement of scientific computation was presented for the first time. The aim of this award is to honour the achievements of those who have spent time and effort developing the hardware and software crucial for scientific advances. It is the purpose of the award to honour outstanding scientific contributions in all areas of computational science, specifically: Modelling and computer simulation Design of user interfaces based on new scientific findings Data handling and data analysis procedures Scientific visualization of data and processes
|
Heinz Billing Prize
|
Previous Winners
|
1993 Dr. Hans Thomas Janka, Dr. Ewald Müller, Dr. Maximilian Ruffert 1994 Dr. Rainer Goebel 1995 Dr. Ralf Giering 1996 Dr. Klaus Heumann 1997 Dr. Florian Mueller 1998 Prof. Dr. Edward Seidel 1999 Dr. Alexander Pukhov 2000 Dr. Oliver Kohlbacher 2001 Dr. Jörg Haber 2002 Dipl. Ing. Daan Broeder, Dr. Hennie Brugman and Dipl. Ing. Reiner Dirksmeyer 2003 Dipl. Phys. Roland Chrobok, Dr. Sigurður F. Hafstein and Dipl. Phys. Andreas Pottmeier 2004 Dr. Markus Rampp and Dr. Thomas Soddemann 2005 Dr. Patrick Jöckel and Dr. Rolf Sander 2006 Rafal Mantiuk 2007 Axel Fingerle and Klaus Röller/ Hannah Bast and Stefan Funke 2011 Peter Wittenburg 2013 Thomas Hrabe 2015 Andreas Brandmeier 2017 Dr. Christian Schulz 2019 Tim Dietrich 2021 Adam Runions
|
Adjusted Peak Performance
|
Adjusted Peak Performance
|
Adjusted Peak Performance (APP) is a metric introduced by the U.S. Department of Commerce's Bureau of Industry and Security (BIS) to more accurately predict the suitability of a computing system to complex computational problems, specifically those used in simulating nuclear weapons. This is used to determine the export limitations placed on certain computer systems under the Export Administration Regulations 15 CFR.
|
Adjusted Peak Performance
|
Adjusted Peak Performance
|
Further details can be found in the document "Practitioner's Guide To Adjusted Peak Performance".The (simplified) algorithm used to calculate APP consists of the following steps: Determine how many 64 bit (or better) floating point operations every processor in the system can perform per clock cycle (best case). This is FPO(i).
Determine the clock frequency of every processor. This is F(i).
Choose the weighting factor for each processor: 0.9 for vector processors and 0.3 for non-vector processors. This is W(i).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.