page_content
stringlengths 51
3.15k
|
---|
Randomized experiment Statistical interpretation Randomized_trial > Statistical interpretation The Rubin Causal Model provides a common way to describe a randomized experiment. While the Rubin Causal Model provides a framework for defining the causal parameters (i.e., the effects of a randomized treatment on an outcome), the analysis of experiments can take a number of forms. The model assumes that there are two potential outcomes for each unit in the study: the outcome if the unit receives the treatment and the outcome if the unit does not receive the treatment. The difference between these two potential outcomes is known as the treatment effect, which is the causal effect of the treatment on the outcome.
|
Passive survivability Passive Solar Passive_survivability > Passive Design Strategies > Passive Solar Proper glazing to thermal mass ratios should be used to prevent overheating and provide adequate heating. A Trombe wall or indirect gain system places the thermal mass right inside the glazing to collect heat during the day for night-time use due to time-lag of mass. This method is useful if daylighting is not required, or can be used in combination with direct-gain. A third technique is a sunspace or isolated gain system, which collects solar energy in a separate space attached to the building, and which can double as a living area for most of the year.
|
Satellite TV Beginning of the satellite TV industry, 1976–1980 Direct-broadcast_satellite > History > Beginning of the satellite TV industry, 1976–1980 These satellites used geostationary orbits. They were equipped with powerful on-board transponders, so the size of receiving parabolic antennas of downlink stations was reduced to 4 and 2.5 metres.
|
Trigonometric tables Summary Trigonometric_table Often, these libraries use pre-calculated tables internally, and compute the required value by using an appropriate interpolation method. Interpolation of simple look-up tables of trigonometric functions is still used in computer graphics, where only modest accuracy may be required and speed is often paramount. Another important application of trigonometric tables and generation schemes is for fast Fourier transform (FFT) algorithms, where the same trigonometric function values (called twiddle factors) must be evaluated many times in a given transform, especially in the common case where many transforms of the same size are computed.
|
Polystyrene Structure High-impact_polystyrene > Structure In chemical terms, polystyrene is a long chain hydrocarbon wherein alternating carbon centers are attached to phenyl groups (a derivative of benzene). Polystyrene's chemical formula is (C8H8)n; it contains the chemical elements carbon and hydrogen.The material's properties are determined by short-range van der Waals attractions between polymer chains. Since the molecules consist of thousands of atoms, the cumulative attractive force between the molecules is large. When heated (or deformed at a rapid rate, due to a combination of viscoelastic and thermal insulation properties), the chains can take on a higher degree of confirmation and slide past each other.
|
Philipp Lenard Photoelectric investigations Waterfall_effect > Contributions to physics > Photoelectric investigations He confirmed some of J. J. Thomson's work, which eventually arrived at the understanding that cathode rays were streams of negatively charged energetic particles. He called them quanta of electricity or for short quanta, after Helmholtz, while Thomson proposed the name corpuscles, but eventually electrons became the everyday term.
|
John Argyris Summary John_Argyris Johann Hadji Argyris FRS (Greek: Ιωάννης Χατζι Αργύρης; 19 August 1913 – 2 April 2004) was a Greek pioneer of computer applications in science and engineering, among the creators of the finite element method (FEM), and lately Professor at the University of Stuttgart and Director of the Institute of Structural Mechanics and Dynamics in Aerospace Engineering.
|
Restrictive cardiomyopathy Treatment Restrictive_cardiomyopathy > Treatment Treatment of restrictive cardiomyopathy should focus on management of causative conditions (for example, using corticosteroids if the cause is sarcoidosis), and slowing the progression of cardiomyopathy. Salt-restriction, diuretics, angiotensin-converting enzyme inhibitors, and anticoagulation may be indicated for managing restrictive cardiomyopathy.Calcium channel blockers are generally contraindicated due to their negative inotropic effect, particularly in cardiomyopathy caused by amyloidosis. Digoxin, calcium channel blocking drugs and beta-adrenergic blocking agents provide little benefit, except in the subgroup of restrictive cardiomyopathy with atrial fibrillation. Vasodilators are also typically ineffective because systolic function is usually preserved in cases of RCM.Heart failure resulting from restrictive cardiomyopathy will usually eventually have to be treated by cardiac transplantation or left ventricular assist device.
|
Three-phase power Transformer connections 3-phase_AC > Transformer connections In an "open delta" or "V" system, only two transformers are used. A closed delta made of three single-phase transformers can operate as an open delta if one of the transformers has failed or needs to be removed. In open delta, each transformer must carry current for its respective phases as well as current for the third phase, therefore capacity is reduced to 87%. With one of three transformers missing and the remaining two at 87% efficiency, the capacity is 58% (2⁄3 of 87%).Where a delta-fed system must be grounded for detection of stray current to ground or protection from surge voltages, a grounding transformer (usually a zigzag transformer) may be connected to allow ground fault currents to return from any phase to ground. Another variation is a "corner grounded" delta system, which is a closed delta that is grounded at one of the junctions of transformers.
|
Tree structure Nested parentheses Tree_structure > Representing trees > Nested parentheses A correspondence to nested parentheses was first noticed by Sir Arthur Cayley:
|
Translation management system Target markets and licensing Globalization_Management_System > Target markets and licensing However, a combined option of technology solution and language services in one package is bound to be more cost effective. Similarly, LSPs may prefer to contact technology vendors who are not part of the competition, offering also language services. Many LSPs got nervous when SDL bought Trados in 2005, becoming the biggest translation technology provider, while still having language services as part of their activities. As a result of this, competitive cloud translation management systems that combine TMS functionality with CAT tools and online translation editors, started making their way to the market.
|
Insulin signal transduction pathway and regulation of blood glucose Oscillatory behavior Insulin_signal_transduction_pathway > Oscillatory behavior Insulin is delivered to the liver and other tissues throughout the body (e.g., muscle, adipose). When the insulin is introduced to the liver, it connects to the insulin receptors already present, that is tyrosine kinase receptor. These receptors have two alpha subunits (extracellular) and two beta subunits (intercellular) which are connected through the cell membrane via disulfide bonds.
|
RNA activation Summary RNA_activation RNAa can be generally classified into two categories: exogenous and endogenous. Exogenous RNAa is triggered by artificially designed saRNAs which target non-coding sequences such as the promoter and the 3’ terminus of a gene and these saRNAs can be chemically synthesized or expressed as short hairpin RNA (shRNA). Whereas for endogenous RNAa, upregulation of gene expression is guided by naturally occurring endogenous small RNAs such as miRNA in mammalian cells and C. elegans, and 22G RNA in C. elegans.
|
Rabin–Williams encryption Example Rabin_cryptosystem > Encryption Algorithm > Example As an example, take p = 7 {\displaystyle p=7} and q = 11 {\displaystyle q=11} , then n = 77 {\displaystyle n=77} . Take m = 20 {\displaystyle m=20} as our plaintext. The ciphertext is thus c = m 2 mod n = 400 mod 77 = 15 {\displaystyle c=m^{2}{\bmod {n}}=400{\bmod {77}}=15} .
|
Public Internet Summary Internet_performance The Internet has no single centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own policies. The overarching definitions of the two principal name spaces on the Internet, the Internet Protocol address (IP address) space and the Domain Name System (DNS), are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise. In November 2006, the Internet was included on USA Today's list of the New Seven Wonders.
|
Value object Implementation Value_object > Implementation Due to the nuances of various object-oriented programming languages, each has its own methods and patterns for implementing and using value objects.
|
Maximum Entropy Applications Entropy_maximization > Applications The principle of maximum entropy is commonly applied in two ways to inferential problems:
|
Casein kinase 2 Role in viral infection Casein_kinase_2 > Role in viral infection In SARS-CoV-2 (COVID-19) infected Caco-2 cells, the phosphorylase activity of CK2 is increased resulting in phosphorylation of several cytoskeletal proteins. These infected cells also display CK2-containing filopodia protrusions associated with budding viral particles. Hence the protrusions may assist the virus in infecting adjacent cells. In these same cells, the CK2 inhibitor silmitasertib displayed potent antiviral activity. Senhwa Biosciences and the US National Institutes of Health have announced that they will evaluate the efficacy of silmitasertib in treating COVID-19 infections.
|
Nuclear potential energy Derivation Nuclear_potential_energy > Potential energy for gravitational forces between two bodies > Derivation The gravitational force between two bodies of mass M and m separated by a distance r is given by Newton's law of universal gravitation where r ^ {\displaystyle \mathbf {\hat {r}} } is a vector of length 1 pointing from M to m and G is the gravitational constant. Let the mass m move at the velocity v then the work of gravity on this mass as it moves from position r(t1) to r(t2) is given by The position and velocity of the mass m are given by where er and et are the radial and tangential unit vectors directed relative to the vector from M to m. Use this to simplify the formula for work of gravity to, This calculation uses the fact that
|
Statohm Summary Statohm The statohm is nearly a trillion times larger than the ohm and is the largest unit of resistance ever used in any measurement system. The statohm as a practical unit is as unusably large as the abohm is unusably small. 1 statohm = 8.987551787x1011 ohms == References ==
|
Tarski's axioms Summary Tarski's_axioms Tarski's axioms, due to Alfred Tarski, are an axiom set for the substantial fragment of Euclidean geometry that is formulable in first-order logic with identity, and requiring no set theory (Tarski 1959) (i.e., that part of Euclidean geometry that is formulable as an elementary theory). Other modern axiomizations of Euclidean geometry are Hilbert's axioms and Birkhoff's axioms.
|
Radar angels Impacts Radar_angels > Impacts The Mid-Canada Line was a continuous wave radar (CW) that had no inherent timing to its signals. The effect was so overpowering that a significant feature of the similar AN/FPS-23 radars used on the DEW Line, then under construction, was the addition of Doppler filtering to remove objects traveling slower than 125 miles per hour (201 km/h) from the display.Although birds are the most widespread cause of these effects, any periodic structure in view of the radar can cause similar effects. This is particularly notable in sea-scanning radars in aircraft and satellites when the pattern of waves matches some multiple of the wavelength of the radar. This effect has been exploited in radars that measure the sea state offshore, or wind-measuring radars that create the required patterns using acoustic waves generated by large loudspeakers.
|
Meniscus (liquid) Summary Meniscus_(liquid) In physics (particularly fluid statics), the meniscus (PL: menisci, from Greek 'crescent') is the curve in the upper surface of a liquid close to the surface of the container or another object, produced by surface tension. A concave meniscus occurs when the attraction between the particles of the liquid and the container (adhesion) is more than half the attraction of the particles of the liquid to each other (cohesion), causing the liquid to climb the walls of the container (see surface tension#Causes). This occurs between water and glass. Water-based fluids like sap, honey, and milk also have a concave meniscus in glass or other wettable containers.
|
Riemann Hypothesis Attempted proofs Critical_line_(mathematics) > Attempted proofs Several mathematicians have addressed the Riemann hypothesis, but none of their attempts has yet been accepted as a proof. Watkins (2021) lists some incorrect solutions.
|
Symbol tables Implementation Symbol_tables > Implementation The symbol table must have some means of differentiating references to the different "p"s. A common data structure used to implement symbol tables is the hash table. The time for searching in hash tables is independent of the number of elements stored in the table, so it is efficient for a large number of elements. It also simplifies the classification of literals in tabular format by including the classification in calculation of the hash key.As the lexical analyser spends a great proportion of its time looking up the symbol table, this activity has a crucial effect on the overall speed of the compiler.
|
Motion planning Sampling-based algorithms Motion_planning > Algorithms > Sampling-based algorithms To find a path that connects S and G, they are added to the roadmap. If a path in the roadmap links S and G, the planner succeeds, and returns that path. If not, the reason is not definitive: either there is no path in Cfree, or the planner did not sample enough milestones.
|
Probability density estimation Summary Density_Estimation In statistics, probability density estimation or simply density estimation is the construction of an estimate, based on observed data, of an unobservable underlying probability density function. The unobservable density function is thought of as the density according to which a large population is distributed; the data are usually thought of as a random sample from that population. A variety of approaches to density estimation are used, including Parzen windows and a range of data clustering techniques, including vector quantization. The most basic form of density estimation is a rescaled histogram.
|
Nonsteroidal androgen Side effects Selective_androgen_receptor_modulators > Side effects SARMs have less effect on blood lipid profiles than testosterone replacement; it is not known whether androgen-induced HDL reductions increase cardiovascular risk; and SARMs increase insulin sensitivity and lower triglycerides.Unlike testosterone, SARMs cannot be aromatized to estrogen, which has led to the incorrect perception that they do not impact the hypothalamic–pituitary–gonadal axis (HPG axis). Although they are less suppressive than testosterone replacement, studies have found that gonadotropins, free and total testosterone, and SHBG are affected in a compound- and dose-dependent fashion in men from SARM usage. Of SARMs that have been investigated, ostarine is one of the least suppressive of gonadotropins, even in doses much higher than used in clinical trials. How the HPG axis is affected in women using SARMs is unknown.Although it is not known if SARMs cause a significant risk of hepatoxicity, several case reports have associated SARMs with drug-induced liver injury when used recreationally. One individual experienced myocarditis and another bilateral Achilles tendon rupture attributed to SARM usage.
|
Brittleness Effect of pressure Brittleness > Changing brittle materials > Effect of pressure Generally, the brittle strength of a material can be increased by pressure. This happens as an example in the brittle–ductile transition zone at an approximate depth of 10 kilometres (6.2 mi) in the Earth's crust, at which rock becomes less likely to fracture, and more likely to deform ductilely (see rheid).
|
A* search algorithm Complexity A*_algorithm > Complexity The time complexity is polynomial when the search space is a tree, there is a single goal state, and the heuristic function h meets the following condition: | h ( x ) − h ∗ ( x ) | = O ( log h ∗ ( x ) ) {\displaystyle |h(x)-h^{*}(x)|=O(\log h^{*}(x))} where h* is the optimal heuristic, the exact cost to get from x to the goal. In other words, the error of h will not grow faster than the logarithm of the "perfect heuristic" h* that returns the true distance from x to the goal.The space complexity of A* is roughly the same as that of all other graph search algorithms, as it keeps all generated nodes in memory. In practice, this turns out to be the biggest drawback of the A* search, leading to the development of memory-bounded heuristic searches, such as Iterative deepening A*, memory-bounded A*, and SMA*.
|
Sparse Fourier transform Summary Sparse_Fourier_transform The sparse Fourier transform (SFT) is a kind of discrete Fourier transform (DFT) for handling big data signals. Specifically, it is used in GPS synchronization, spectrum sensing and analog-to-digital converters. :The fast Fourier transform (FFT) plays an indispensable role on many scientific domains, especially on signal processing. It is one of the top-10 algorithms in the twentieth century. However, with the advent of big data era, the FFT still needs to be improved in order to save more computing power. Recently, the sparse Fourier transform (SFT) has gained a considerable amount of attention, for it performs well on analyzing the long sequence of data with few signal components.
|
Symmetry breaking of escaping ants Summary Symmetry_breaking_of_escaping_ants Symmetry breaking of escaping ants is a herd behavior phenomenon observed when ants are constrained to a cell with two equidistant exits and then sprayed with an insect repellent. The ants tend to crowd one door more while trying to escape (i.e., there is a symmetry breaking in their escape behavior), there by decreasing evacuation efficiency.
|
Model-centered instruction Theory summary Model-centered_instruction > Theory summary The theory of model-centered instruction is based on the assumption that the purpose of instruction is to help learners construct knowledge about objects and events in their environment. In the field of cognitive psychology, theorists assert that knowledge is represented and stored in human memory as dynamic, networked structures generally known as schema or mental models. This concept of mental models was incorporated by Gibbons into the theory of model-centered instruction. This theory is based on the assumption that learners construct mental models as they process information they have acquired through observations of or interactions with objects, events, and environments.
|
Set-theoretic Platonism Contemporary philosophy Full-blooded_platonism > History > Contemporary philosophy The Zermelo–Fraenkel axioms for set theory were formulated which provided a conceptual framework in which much mathematical discourse would be interpreted. In mathematics, as in physics, new and unexpected ideas had arisen and significant changes were coming. With Gödel numbering, propositions could be interpreted as referring to themselves or other propositions, enabling inquiry into the consistency of mathematical theories.
|
Job Control Language Complexity Job_Control_Language > Features common to DOS and OS JCL > Complexity In this era, programmers were much cheaper than computers. JCL was designed for batch processing.
|
Public-key encryption Description Key_pair > Description This can be used to ensure confidentiality of a message. Digital signatures, in which a message is signed with the sender's private key and can be verified by anyone who has access to the sender's public key. This verification proves that the sender had access to the private key, and therefore is very likely to be the person associated with the public key.
|
Excitation temperature Summary Excitation_temperature In statistical mechanics, the excitation temperature (Tex) is defined for a population of particles via the Boltzmann factor. It satisfies n u n l = g u g l exp ( − Δ E k T e x ) , {\displaystyle {\frac {n_{\rm {u}}}{n_{\rm {l}}}}={\frac {g_{\rm {u}}}{g_{\rm {l}}}}\exp {\left(-{\frac {\Delta E}{kT_{\rm {ex}}}}\right)},} where nu is the number of particles in an upper (e.g. excited) state; gu is the statistical weight of those upper-state particles; nl is the number of particles in a lower (e.g. ground) state; gl is the statistical weight of those lower-state particles; exp is the exponential function; k is the Boltzmann constant; ΔE is the difference in energy between the upper and lower states.Thus the excitation temperature is the temperature at which we would expect to find a system with this ratio of level populations. However it has no actual physical meaning except when in local thermodynamic equilibrium.
|
THD analyzer Working of a typical unit THD_analyzer > Fundamental suppression analyzer > Working of a typical unit The input is impedance-matched with the rejection circuit with the help of an attenuator and an impedance matcher. This signal is then pre-amplified to a desired level. The following section consists of a Wien bridge notch filter tuned to reject the fundamental frequency and balanced for minimum output by adjusting the bridge controls.
|
Modal window Summary Modal_window In user interface design for computer applications, a modal window is a graphical control element subordinate to an application's main window. A modal window creates a mode that disables user interaction with the main window but keeps it visible, with the modal window as a child window in front of it. Users must interact with the modal window before they can return to the parent window. This avoids interrupting the workflow on the main window.
|
Quantum digital signature Copying the public key Quantum_digital_signature > Quantum Digital Signature > Differences between classical and quantum one-way functions > Copying the public key In the classical case we create a classical public key out of a classical sign key, thus it is easy to provide every potential recipient with a copy of the public key. The public key can be freely distributed. This becomes more difficult in the quantum case, because copying a quantum state is forbidden by the no cloning theorem, as long as the state itself is unknown. So public keys can only be created and distributed by a person who knows the exact quantum state he wants to create, thus who knows the sign key (This can be the sender or in more general a trustful institution). Nevertheless, in contrast to the classical public key there is an upper bound for the number of public quantum keys T which can be created, without enabling one to guess the sign key and thus endangering the security of the scheme ( n − T m {\displaystyle n-Tm} has to be big)
|
Hepatocellular carcinoma Summary Hepatocellular_cancer Hepatocellular carcinoma (HCC) is the most common type of primary liver cancer in adults and is currently the most common cause of death in people with cirrhosis. HCC is the third leading cause of cancer-related deaths worldwide.The development of HCC is attributed to fibrosis and cirrhosis, which occur in the setting of chronic liver injury and inflammation. The latter being closely linked to chronic viral hepatitis infection (hepatitis B or C) or exposure to toxins such as alcohol, aflatoxin, or pyrrolizidine alkaloids. Certain diseases, such as hemochromatosis and alpha 1-antitrypsin deficiency, markedly increase the risk of developing HCC.
|
Test statistic Summary Test_statistic A test statistic is a statistic (a quantity derived from the sample) used in statistical hypothesis testing. A hypothesis test is typically specified in terms of a test statistic, considered as a numerical summary of a data-set that reduces the data to one value that can be used to perform the hypothesis test. In general, a test statistic is selected or defined in such a way as to quantify, within observed data, behaviours that would distinguish the null from the alternative hypothesis, where such an alternative is prescribed, or that would characterize the null hypothesis if there is no explicitly stated alternative hypothesis. An important property of a test statistic is that its sampling distribution under the null hypothesis must be calculable, either exactly or approximately, which allows p-values to be calculated.
|
BioViva Research BioViva > Research BioViva's research interests are based on preclinical research of both the enzyme telomerase and inhibition of myostatin.Telomerase gene therapy utilizing an adeno-associated virus at the Spanish National Cancer Research Centre (CNIO), has demonstrated several beneficial effects and an increase in median lifespan of up to 24% in mice. Discussing her team's research, María Blasco stated in discussion with The Scientist, "We demonstrated that AAV9-Tert gene therapy was sufficient to delay age-related pathologies and extend both median and maximum longevity in mice. Many pathologies were delayed, including cancer. Translating these results to human diseases (telomere syndromes or certain age-related diseases without effective treatments) may be of interest in the context of clinical trials approved by the corresponding regulatory agencies." However, some experts draw attention that the results of studies in mice cannot always be directly transferred to humans.
|
JVM languages Summary JVM_languages This list of JVM Languages comprises notable computer programming languages that are used to produce computer software that runs on the Java virtual machine (JVM). Some of these languages are interpreted by a Java program, and some are compiled to Java bytecode and just-in-time (JIT) compiled during execution as regular Java programs to improve performance. The JVM was initially designed to support only the language Java. However, over time, ever more languages were adapted or designed to run on the Java platform.
|
Abstract entity In philosophy Abstract_objects > In philosophy To the extent that philosophy is independent of empirical research, and to the extent that empirical questions do not inform questions about abstracta, philosophy would seem especially suited to answering these latter questions. In modern philosophy, the distinction between abstract and concrete was explored by Immanuel Kant and G. W. F. Hegel.Gottlob Frege said that abstract objects, such as numbers, were members of a third realm, different from the external world or from internal consciousness. (See Popper's three worlds.)
|
Internet Of Things History Internet_Of_Things > History The field gained momentum when Bill Joy envisioned device-to-device communication as a part of his "Six Webs" framework, presented at the World Economic Forum at Davos in 1999.The concept of the "Internet of things" and the term itself, first appeared in a speech by Peter T. Lewis, to the Congressional Black Caucus Foundation 15th Annual Legislative Weekend in Washington, D.C., published in September 1985. According to Lewis, "The Internet of Things, or IoT, is the integration of people, processes and technology with connectable devices and sensors to enable remote monitoring, status, manipulation and evaluation of trends of such devices. "The term "Internet of things" was coined independently by Kevin Ashton of Procter & Gamble, later of MIT's Auto-ID Center, in 1999, though he prefers the phrase "Internet for things".
|
Gene Transcription Gene > Gene expression > Transcription Transcription produces a single-stranded RNA molecule known as messenger RNA, whose nucleotide sequence is complementary to the DNA from which it was transcribed. : 6.1 The mRNA acts as an intermediate between the DNA gene and its final protein product. The gene's DNA is used as a template to generate a complementary mRNA. The mRNA matches the sequence of the gene's DNA coding strand because it is synthesised as the complement of the template strand.
|
History of compiler construction Parser generators History_of_compiler_construction > Parser generators The name "compiler-compiler" was far more appropriate for Brooker's system than it is for most modern compiler-compilers, which are more accurately described as parser generators. It is almost certain that the "Compiler-Compiler" name has entered common use due to Yacc rather than Brooker's work being remembered.In the early 1960s, Robert McClure at Texas Instruments invented a compiler-compiler called TMG, the name taken from "transmogrification".
|
Cloud software Security and privacy Cloud_Computing > Security and privacy Cloud computing poses privacy concerns because the service provider can access the data that is in the cloud at any time. It could accidentally or deliberately alter or delete information. Many cloud providers can share information with third parties if necessary for purposes of law and order without a warrant. That is permitted in their privacy policies, which users must agree to before they start using cloud services.
|
ProActive Active objects ProActive > Active objects Active objects can be created on any of the hosts involved in the computation. Once an active object is created, its activity (the fact that it runs with its own thread) and its location (local or remote) are perfectly transparent. Any active object can be manipulated as if it were a passive instance of the same class.
|
Bernoulli polynomial Generating functions Euler_polynomials > Representations > Generating functions The generating function for the Bernoulli polynomials is t e x t e t − 1 = ∑ n = 0 ∞ B n ( x ) t n n ! . {\displaystyle {\frac {te^{xt}}{e^{t}-1}}=\sum _{n=0}^{\infty }B_{n}(x){\frac {t^{n}}{n!}}.}
|
Affilin Structure Affilin > Structure Two proteins, gamma-B crystallin and ubiquitin, have been described as scaffolds for Affilin proteins. Certain amino acids in these proteins can be substituted by others without losing structural integrity, a process creating regions capable of binding different antigens, depending on which amino acids are exchanged. In both types, the binding region is typically located in a beta sheet structure, whereas the binding regions of antibodies, called complementarity-determining regions, are flexible loops.
|
Ohmic heating (food processing) Limitations Ohmic_heating_(food_processing) > Limitations Ohmic heating is limited by viscosity, electrical conductivity, and fouling deposits. The density of particles within the suspension liquid can limit the degree of processing. A higher viscosity fluid will provide more resistance to heating, allowing the mixture to heat up quicker than low viscosity products.A food product’s electrical conductivity is a function of temperature, frequency, and product composition. This may be increased by adding ionic compounds, or decreased by adding non-polar constituents. Changes in electrical conductivity limit ohmic heating as it is difficult to model the thermal process when temperature increases in multi-component foods.
|
Neutron Summary Neutronium-1 Protons and neutrons are not elementary particles; each is composed of three quarks. The chemical properties of an atom are mostly determined by the configuration of electrons that orbit the atom's heavy nucleus. The electron configuration is determined by the charge of the nucleus, which is determined by the number of protons, or atomic number.
|
Myocardial bridge Diagnosis Myocardial_bridge > Diagnosis Multiple studies have shown that ischemia from MBs is indicated by the appearance "septal buckling" in the stress echocardiogram, as the septum gives out under stress., which a 2013 paper by Lin et al. describes as "a transient focal buckling in the end-systolic to early-diastolic motion of the septum with apical sparing which correlates prospectively with the presence of LAD MB. "As much of the science of testing for MBs is relatively new, patients frequently go undiagnosed. Stanford's center for myocardial bridges has offered second opinion services from a distance for some ten years, including to numerous international patients.Notably, EKG is not a reliable or conclusive diagnostic tool for diagnosing MBs.
|
2D geometry System of measurement and arithmetic Euclidean_geometry_of_the_plane > System of measurement and arithmetic Euclidean geometry has two fundamental types of measurements: angle and distance. The angle scale is absolute, and Euclid uses the right angle as his basic unit, so that, for example, a 45-degree angle would be referred to as half of a right angle. The distance scale is relative; one arbitrarily picks a line segment with a certain nonzero length as the unit, and other distances are expressed in relation to it. Addition of distances is represented by a construction in which one line segment is copied onto the end of another line segment to extend its length, and similarly for subtraction.
|
Kinetochore Spindle checkpoint activation Kinetochore > Function > Spindle checkpoint activation When Shugoshin levels are reduced by RNAi in HeLa cells, cohesin cannot remain on the centromeres during mitosis, and consequently sister chromatids separate synchronically before anaphase initiates, which triggers a long mitotic arrest. On the other hand, Dasso and collaborators have found that proteins involved in the Ran cycle can be detected on kinetochores during mitosis: RanGAP1 (a GTPase activating protein which stimulates the conversion of Ran-GTP in Ran-GDP) and the Ran binding protein called RanBP2/Nup358. During interphase, these proteins are located at the nuclear pores and participate in the nucleo-cytoplasmic transport.
|
De Casteljau's algorithm JavaScript De_Casteljau's_algorithm > Implementations > JavaScript The following function applies De Casteljau's algorithm to an array of points, resolving the final midpoint with the additional properties in and out (for the midpoint's "in" and "out" tangents, respectively). The following example calls this function with the green points below, exactly halfway along the curve. The resulting coordinates should equal ( 192 , 32 ) {\displaystyle (192,32)} , or the position of the centremost red point.
|
Active EMI reduction Working principle Active_EMI_reduction > Working principle Analog devices, e.g. OpAmps and InAmps in different configurations or transistors, are used. For conducted emission frequencies, high gain and wide bandwidth can be achieved with many available devices. This electronic block requires an external power supply.
|
Virtual memory T cell Function of virtual memory T-lymphocytes Virtual_memory_T_cell > Function of virtual memory T-lymphocytes However, the reaction is slower than true memory cells. These properties suggest that virtual memory T cells may participate in both innate and adaptive immune responses during the immune response.Another indispensable feature is the suppression of potential states. This occurs already in the development of virtual memory cells from autoreactive T cell clones. For this reason, some scientists thought that TVM could be used in the fight against autoimmunity, but so far no evidence has been found.The physiological role of virtual memory T lymphocytes has yet to be investigated, but research suggests that they have a unique type of response to pathogens and contribute to the functional diversity of the T cell immune system, which is required for effective immune defense.
|
Sun burn Ozone depletion Sun_burn > Causes > Ozone depletion In recent decades, the incidence and severity of sunburn have increased worldwide, partly because of chemical damage to the atmosphere's ozone layer. Between the 1970s and the 2000s, average stratospheric ozone decreased by approximately 4%, contributing an approximate 4% increase to the average UV intensity at the earth's surface. Ozone depletion and the seasonal "ozone hole" have led to much larger changes in some locations, especially in the southern hemisphere.
|
Image (mathematics) Inverse image Image_of_a_function > Inverse image The set of all the fibers over the elements of Y {\displaystyle Y} is a family of sets indexed by Y . {\displaystyle Y.} For example, for the function f ( x ) = x 2 , {\displaystyle f(x)=x^{2},} the inverse image of { 4 } {\displaystyle \{4\}} would be { − 2 , 2 } .
|
Convergence pattern Size of pattern Gun_harmonisation > Size of pattern Gray recommended the guns be converged at 750 ft. South African ace Adolph "Sailor" Malan agreed so strongly with Gray that he went ahead and set his own guns to converge in a point at 750 ft, subsequently telling fellow airmen how much better it worked.
|
Heap pollution Summary Heap_pollution In the Java programming language, heap pollution is a situation that arises when a variable of a parameterized type refers to an object that is not of that parameterized type. This situation is normally detected during compilation and indicated with an unchecked warning. Later, during runtime heap pollution will often cause a ClassCastException.Heap pollution in Java can occur when type arguments and variables are not reified at run-time.
|
Continuous (topology) Definition in terms of neighborhoods Continuous_maps > Real functions > Definition > Definition in terms of neighborhoods A neighborhood of a point c is a set that contains, at least, all points within some fixed distance of c. Intuitively, a function is continuous at a point c if the range of f over the neighborhood of c shrinks to a single point f ( c ) {\displaystyle f(c)} as the width of the neighborhood around c shrinks to zero. More precisely, a function f is continuous at a point c of its domain if, for any neighborhood N 1 ( f ( c ) ) {\displaystyle N_{1}(f(c))} there is a neighborhood N 2 ( c ) {\displaystyle N_{2}(c)} in its domain such that f ( x ) ∈ N 1 ( f ( c ) ) {\displaystyle f(x)\in N_{1}(f(c))} whenever x ∈ N 2 ( c ) . {\displaystyle x\in N_{2}(c).}
|
Mach principle Mach's principle in general relativity Mach's_Principle > Mach's principle in general relativity Because intuitive notions of distance and time no longer apply, what exactly is meant by "Mach's principle" in general relativity is even less clear than in Newtonian physics and at least 21 formulations of Mach's principle are possible, some being considered more strongly Machian than others. : 530 A relatively weak formulation is the assertion that the motion of matter in one place should affect which frames are inertial in another. Einstein, before completing his development of the general theory of relativity, found an effect which he interpreted as being evidence of Mach's principle. We assume a fixed background for conceptual simplicity, construct a large spherical shell of mass, and set it spinning in that background.
|
Fourier uncertainty principle Eigenfunctions Fourier_transformations > Properties of the Fourier transform > Eigenfunctions Assuming uniqueness of the solutions, every solution ψ ( x ) {\displaystyle \psi (x)} must therefore be an eigenfunction of the Fourier transform. The form of the equation remains unchanged under Fourier transform if U ( x ) {\displaystyle U(x)} can be expanded in a power series in which for all terms the same factor of either one of ± 1 , ± i {\displaystyle \pm 1,\pm i} arises from the factors i n {\displaystyle i^{n}} introduced by the differentiation rules upon Fourier transforming the homogeneous differential equation because this factor may then be cancelled. The simplest allowable U ( x ) = x {\displaystyle U(x)=x} leads to the standard normal distribution.More generally, a set of eigenfunctions is also found by noting that the differentiation rules imply that the ordinary differential equation ψ ( x ) = C ψ ( x ) {\displaystyle \left\psi (x)=C\psi (x)} with C {\displaystyle C} constant and W ( x ) {\displaystyle W(x)} being a non-constant even function remains invariant in form when applying the Fourier transform F {\displaystyle {\mathcal {F}}} to both sides of the equation.
|
PID loop Fundamental operation PI_controller > Fundamental operation In steady state process conditions an equilibrium is reached, with a steady SP-PV "offset". Term I accounts for past values of the SP − PV error and integrates them over time to produce the I term. For example, if there is a residual SP − PV error after the application of proportional control, the integral term seeks to eliminate the residual error by adding a control effect due to the historic cumulative value of the error.
|
Philosophy of mind Computer science Philosopher_of_mind > Philosophy of mind and science > Computer science As an answer to the question "Can computers think? ", he formulated the famous Turing test. Turing believed that a computer could be said to "think" when, if placed in a room by itself next to another room that contained a human being and with the same questions being asked of both the computer and the human being by a third party human being, the computer's responses turned out to be indistinguishable from those of the human.
|
Algebraic graph theory Summary Algebraic_graph_theory Algebraic graph theory is a branch of mathematics in which algebraic methods are applied to problems about graphs. This is in contrast to geometric, combinatoric, or algorithmic approaches. There are three main branches of algebraic graph theory, involving the use of linear algebra, the use of group theory, and the study of graph invariants.
|
Outline of genetics Summary Outline_of_genetics The following outline is provided as an overview of and topical guide to genetics: Genetics – science of genes, heredity, and variation in living organisms. Genetics deals with the molecular structure and function of genes, and gene behavior in context of a cell or organism (e.g. dominance and epigenetics), patterns of inheritance from parent to offspring, and gene distribution, variation and change in populations.
|
AC/DC motor Rail traction Series_wound_motor > Applications > Rail traction Universal motors also formed the basis of the traditional railway traction motor in electric railways. In this application, the use of AC to power a motor originally designed to run on DC would lead to efficiency losses due to eddy current heating of their magnetic components, particularly the motor field pole-pieces that, for DC, would have used solid (un-laminated) iron. Although the heating effects are reduced by using laminated pole-pieces, as used for the cores of transformers and by the use of laminations of high-permeability electrical steel, one solution available at the start of the 20th century was for the motors to be operated from very-low-frequency AC supplies, with 25 Hz and 16+2⁄3 Hz operation being common.
|
Intersection cohomology Perversities Intersection_cohomology > Goresky–MacPherson approach > Perversities Intersection homology groups I p H i ( X ) {\displaystyle I^{\mathbf {p} }H_{i}(X)} depend on a choice of perversity p {\displaystyle \mathbf {p} } , which measures how far cycles are allowed to deviate from transversality. (The origin of the name "perversity" was explained by Goresky (2010).) A perversity p {\displaystyle \mathbf {p} } is a function p: Z ≥ 2 → Z {\displaystyle \mathbf {p} \colon \mathbb {Z} _{\geq 2}\to \mathbb {Z} } from integers ≥ 2 {\displaystyle \geq 2} to the integers such that p ( 2 ) = 0 {\displaystyle \mathbf {p} (2)=0} . p ( k + 1 ) − p ( k ) ∈ { 0 , 1 } {\displaystyle \mathbf {p} (k+1)-\mathbf {p} (k)\in \{0,1\}} .The second condition is used to show invariance of intersection homology groups under change of stratification. The complementary perversity q {\displaystyle \mathbf {q} } of p {\displaystyle \mathbf {p} } is the one with p ( k ) + q ( k ) = k − 2 {\displaystyle \mathbf {p} (k)+\mathbf {q} (k)=k-2} .Intersection homology groups of complementary dimension and complementary perversity are dually paired.
|
Filter feeder Bivalves Filter_feeder > Bivalves For example, the average harvested mussel contains: 0.8–1.2% nitrogen and 0.06–0.08% phosphorus Removal of enhanced biomass can not only combat eutrophication and also support the local economy by providing product for animal feed or compost. In Sweden, environmental agencies utilize mussel farming as a management tool in improving water quality conditions, where mussel bioextraction efforts have been evaluated and shown to be a highly effective source of fertilizer and animal feed In the U.S., researchers are investigating potential to model the use of shellfish and seaweed for nutrient mitigation in certain areas of Long Island Sound.Bivalves are also largely used as bioindicators to monitor the health of an aquatic environment, either fresh- or seawater. Their population status or structure, physiology, behaviour, or their content of certain elements or compounds can reveal the contamination status of any aquatic ecosystem. They are useful as they are sessile, which means they are closely representative of the environment where they are sampled or placed (caging), and they breathe water all the time, exposing their gills and internal tissues: bioaccumulation. One of the most famous projects in that field is the Mussel Watch Programme in America.
|
Database normalization Satisfying DKNF Database_normalization > Example of a step-by-step normalization > Satisfying DKNF Let's have a look at the Book table from previous examples and see if it satisfies the domain-key normal form: Logically, Thickness is determined by number of pages. That means it depends on Pages which is not a key. Let's set an example convention saying a book up to 350 pages is considered "slim" and a book over 350 pages is considered "thick". This convention is technically a constraint but it is neither a domain constraint nor a key constraint; therefore we cannot rely on domain constraints and key constraints to keep the data integrity. In other words – nothing prevents us from putting, for example, "Thick" for a book with only 50 pages – and this makes the table violate DKNF. To solve this, a table holding enumeration that defines the Thickness is created, and that column is removed from the original table: That way, the domain integrity violation has been eliminated, and the table is in DKNF.
|
Mixing paradox Setup Mixing_paradox > Non-extensive entropy of two ideal gases and how to fix it > Setup For our purposes, this is enough, because this is where the Gibbs paradox shows up and where it must be resolved. The neglected terms play a role when the number of particles is not very large, such as in computer simulation and nanotechnology.
|
Reconfigurable control Reconfiguration goals Control_reconfiguration > Reconfiguration problem > Reconfiguration goals The goal of reconfiguration is to keep the reconfigured control-loop performance sufficient for preventing plant shutdown. The following goals are distinguished: Stabilization Equilibrium recovery Output trajectory recovery State trajectory recovery Transient time response recoveryInternal stability of the reconfigured closed loop is usually the minimum requirement. The equilibrium recovery goal (also referred to as weak goal) refers to the steady-state output equilibrium which the reconfigured loop reaches after a given constant input. This equilibrium must equal the nominal equilibrium under the same input (as time tends to infinity).
|
Single-point energy Mathematical definition and computation Potential_energy_surface > Mathematical definition and computation An example is the London-Eyring-Polanyi-Sato potential for the system H + H2 as a function of the three H-H distances. For more complicated systems, calculation of the energy of a particular arrangement of atoms is often too computationally expensive for large scale representations of the surface to be feasible. For these systems a possible approach is to calculate only a reduced set of points on the PES and then use a computationally cheaper interpolation method, for example Shepard interpolation, to fill in the gaps.
|
Geometric space Manifolds Geometry > Main concepts > Objects > Manifolds A manifold is a generalization of the concepts of curve and surface. In topology, a manifold is a topological space where every point has a neighborhood that is homeomorphic to Euclidean space. In differential geometry, a differentiable manifold is a space where each neighborhood is diffeomorphic to Euclidean space.Manifolds are used extensively in physics, including in general relativity and string theory.
|
Electric column Electromotive force Volta_cell > Electromotive force The strength of the pile is expressed in terms of its electromotive force, or emf, given in volts. Alessandro Volta's theory of contact tension considered that the emf, which drives the electric current through a circuit containing a voltaic cell, occurs at the contact between the two metals. Volta did not consider the electrolyte, which was typically brine in his experiments, to be significant. However, chemists soon realized that water in the electrolyte was involved in the pile's chemical reactions, and led to the evolution of hydrogen gas from the copper or silver electrode.The modern, atomistic understanding of a cell with zinc and copper electrodes separated by an electrolyte is the following.
|
Metabolic myopathy Treatment Metabolic_myopathy > Treatment As of 2022, another study on a ketogenic diet and McArdle disease (GSD-V) is underway.For McArdle disease (GSD-V), regular aerobic exercise utilizing "second wind" to enable the muscles to become aerobically conditioned, as well as anaerobic exercise that follows the activity adaptations so as not to cause muscle injury, helps to improve exercise intolerance symptoms and maintain overall health. Studies have shown that regular low-moderate aerobic exercise increases peak power output, increases peak oxygen uptake (VO2peak), lowers heart rate, and lowers serum CK in individuals with McArdle disease.Regardless of whether the patient experiences symptoms of muscle pain, muscle fatigue, or cramping, the phenomenon of second wind having been achieved is demonstrable by the sign of an increased heart rate dropping while maintaining the same speed on the treadmill. Inactive patients experienced second wind, demonstrated through relief of typical symptoms and the sign of an increased heart rate dropping, while performing low-moderate aerobic exercise (walking or brisk walking). Conversely, patients that were regularly active did not experience the typical symptoms during low-moderate aerobic exercise (walking or brisk walking), but still demonstrated second wind by the sign of an increased heart rate dropping. For the regularly active patients, it took more strenuous exercise (very brisk walking/jogging or bicycling) for them to experience both the typical symptoms and relief thereof, along with the sign of an increased heart rate dropping, demonstrating second wind.
|
Viral entry Entry via membrane fusion Viral_entry > Reducing cellular proximity > Entry via membrane fusion Inhibition of SARS-2 infection targets the spike proteins that harbor the capacity for membrane fusion. Vaccinations are based on the inhibition of spike (S) glycoprotein mediating the fusion of the virus and its host cell membranes. The fusion mechanism is also studied as a potential target for antiviral development.
|
Polyamide Polymerization chemistry Polyamide > Polymerization chemistry As an example of condensation reactions, consider that in living organisms, Amino acids are condensed with one another by an enzyme to form amide linkages (known as peptides). The resulting polyamides are known as proteins or polypeptides. In the diagram below, consider the amino-acids as single aliphatic monomers reacting with identical molecules to form a polyamide, focusing on solely the amine and acid groups.
|
Quadratic programming Lagrangian duality Quadratic_programming > Lagrangian duality The Lagrangian dual of a quadratic programming problem is also a quadratic programming problem. To see this let us focus on the case where c = 0 and Q is positive definite. We write the Lagrangian function as L ( x , λ ) = 1 2 x ⊤ Q x + λ ⊤ ( A x − b ) . {\displaystyle L(x,\lambda )={\tfrac {1}{2}}x^{\top }Qx+\lambda ^{\top }(Ax-b).}
|
Genetic divergence Founder effect Genetic_divergence > Causes > Founder effect One possible cause of genetic divergence is the founder effect, which is when a few individuals become isolated from their original population. Those individuals might overrepresent a certain genetic pattern, which means that certain biological characteristics are overrepresented. These individuals can form a new population with different gene pools from the original population. For example, 10% of the original population has blue eyes and 90% has brown eyes.
|
Engineering Drawing Showing dimensions Engineering_drawings > Common features > Showing dimensions Distances along the x- and y-axes to other features are specified using other extension lines, with the distances indicated numerically at their ends.Sizes of circular features are indicated using either diametral or radial dimensions. Radial dimensions use an "R" followed by the value for the radius; Diametral dimensions use a circle with forward-leaning diagonal line through it, called the diameter symbol, followed by the value for the diameter.
|
Health information management Methods to ensure Data Quality Health_information_management > Elements > Practices > Methods to ensure Data Quality The accuracy of data depends on the manual or computer information system design for collecting, recording, storing, processing, accessing and displaying data as well as the ability and follow- through of the people involved in each phase of these activities. Everyone involved with documenting or using health information is responsible for its quality. According to AHIMA's Data Quality Management Model, there are four key processes for data: Application: the purpose for which the data are collected. Collection: the processes by which data elements are accumulated.
|
Bitboard Direct hashing Bitboard > Chess bitboards > Auxiliary bitboard representations > Direct hashing The rank and file attack vectors of rooks and the diagonal and anti-diagonal attack vectors of bishops can be separately masked and used as indices into a hash table of precomputed attack vectors depending on occupancy, 8-bits each for rooks and 2-8 bits each for bishops. The full attack vector of a piece is obtained as the union of each of the two unidirectional vectors indexed from the hash table. The number of entries in the hash table is modest, on the order of 8*2^8 or 2K bytes, but two hash function computations and two lookups per piece are required., see the hashing scheme employed.
|
Multiple System Atrophy Pathophysiology Multiple_System_Atrophy > Pathophysiology Multiple system atrophy can be explained as cell loss and gliosis or a proliferation of astrocytes in damaged areas of the central nervous system. This damage forms a scar which is then termed a glial scar. The presence of inclusion bodies known as Papp–Lantos bodies, in the movement, balance, and autonomic-control centres of the brain are the defining histopathologic hallmark of MSA.The major filamentous component of Papp-Lantos bodies, glial and neuronal cytoplasmic inclusions, is alpha-synuclein.
|
Code reuse Higher-order function Code_reuse > Examples > Higher-order function In functional programming higher-order functions can be used in many cases where design patterns or frameworks were formerly used.
|
Antiarrhythmic agents Class II agents Antiarrhythmic_agents > Vaughan Williams classification > Class II agents Class II agents are conventional beta blockers. They act by blocking the effects of catecholamines at the β1-adrenergic receptors, thereby decreasing sympathetic activity on the heart, which reduces intracellular cAMP levels and hence reduces Ca2+ influx. These agents are particularly useful in the treatment of supraventricular tachycardias. They decrease conduction through the AV node. Class II agents include atenolol, esmolol, propranolol, and metoprolol.
|
244 (number) Summary 244_(number) a Harshad number in bases 3, 9, 11, 61, 62, 81, 121, 122, 123 and 184. the second anti-perfect number, meaning that reversing the digits of the proper divisors of 244 and adding the results gives 244 back again. part of the sequence 1, 2, 4, 8, 61, 221, 244, ... in which each number is formed by reversing the digits of the double of the previous number. the number of non-isomorphic set-systems of weight 8 == References ==
|
Onium compounds Group 18 (noble gas) onium cations Enium_ion > Simple onium cations (hydrides with no substitutions) > Group 18 (noble gas) onium cations hydrohelium or helonium, better known as helium hydride ion, HeH+ (protonated helium) neonium, NeH+ (protonated neon) argonium, ArH+ (protonated argon) kryptonium, KrH+ (protonated krypton) xenonium, XeH+ (protonated xenon) radonium, RnH+ (protonated radon)
|
Thermal Energy Storage MOST Thermal_storage > Categories > Thermo-chemical heat storage > MOST Eventually, this system could reach a quantum yield of photoconversion up 94% per NBD unit. A quantum yield is a measure of the efficiency of photon emission. With this system the measured energy densities reached up to 559 kJ/kg (exceeding the target of 300 kJ/kg). So, the potential of the molecular photo switches is enormous—not only for solar thermal energy storage but for other applications as well.In 2022, researchers reported combining the MOST with a chip-sized thermoelectric generator to generate electricity from it. The system can reportedly store solar energy for up to 18 years and may be an option for renewable energy storage.
|
Digital circuit Terminology Digital_circuit > Formal definition > Terminology The gates of in-degree 0 are called inputs or leaves. The gates of out-degree 0 are called outputs. If there is an edge from gate g {\displaystyle g} to gate h {\displaystyle h} in the graph G {\displaystyle G} then h {\displaystyle h} is called a child of g {\displaystyle g} . We suppose there is an order on the vertices of the graph, so we can speak of the k {\displaystyle k} th child of a gate when k {\displaystyle k} is less than the out-degree of the gate.
|
Tissue hypoxia By cause Tissue_hypoxia > Classification > By cause This can happen in interstitial lung diseases such as pulmonary fibrosis, sarcoidosis, hypersensitivity pneumonitis, and connective tissue disorders. Circulatory hypoxia, also known as ischemic hypoxia or stagnant hypoxia is caused by abnormally low blood flow to the lungs, which can occur during shock, cardiac arrest, severe congestive heart failure, or abdominal compartment syndrome, where the main dysfunction is in the cardiovascular system, causing a major reduction in perfusion. Arterial gas is adequately oygenated in the lungs, and the tissues are able to accept the oxygen available, but the flow rate to the tissues is insufficient.
|
Monte-Carlo simulation Monte Carlo simulation versus "what if" scenarios Monte_Carlo_Simulation > Definitions > Monte Carlo simulation versus "what if" scenarios For example, a comparison of a spreadsheet cost construction model run using traditional "what if" scenarios, and then running the comparison again with Monte Carlo simulation and triangular probability distributions shows that the Monte Carlo analysis has a narrower range than the "what if" analysis. This is because the "what if" analysis gives equal weight to all scenarios (see quantifying uncertainty in corporate finance), while the Monte Carlo method hardly samples in the very low probability regions. The samples in such regions are called "rare events".
|
Aquatic feeding mechanisms Filter versus suspension feeding Lunge_feeding > Filter versus suspension feeding These are contrasting methods for the removal of food particles from a water flow: for example, by the gill rakers of fish, the baleen of whales, or the ostia of sponges.
|
Effort heuristic Experiment 2 Effort_heuristic > The Kruger study > Experiment 2 In the second experiment, non-experts and self-identified experts individually evaluated the quality of two paintings by Deborah Kleven: 12 Lines and Big Abstract. Half of the participants were told that the former took 4 hours to paint and the latter 26 hours, and the other half were told the opposite. After rating each painting separately, participants then compared the two paintings directly. The results revealed that participants preferred 12 Lines over Big Abstract when they thought 12 Lines took longer to paint, but the opposite tended to be true when they thought that Big Abstract took longer to paint.
|
Web of Trust WOT assisting solutions Web_of_Trust > WOT assisting solutions When a public-key is obtained (from original developer's own web-server) via more than one TTPA (trusted third party authority) based secured, verified and encrypted connection, then it is more trustworthy. When original public-keys/signed-codes are shown in original dev's or author's own web server or key server, over encrypted connection or encrypted webpage, then any other files, data or content can be transferred over any type of non-encrypted connection, like: HTTP/FTP etc from any sub-domain server or from any mirror or from any shared cloud/hosting servers, because, non-encrypted connection based downloaded items/data/files can be authenticated later, by using the original public-keys/signed-codes, which were obtained from the original author's/developer's own server over secured, encrypted, and trusted (aka, verified) connection/channels. Using encrypted connection to transfer keys or signed/signature code/files, allow software users to delegate their trust with a PKI TTPA (trusted third party authority), like public CA (Certificate Authority), to help in providing trusted connection in between the original developer/author's web server, and millions of worldwide users' computers, at any time.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.