Skip to main content

Ramsey Games, Markov games, Bayesian games

 

GLn/P

General linear group

GL(n, p)

Binomial theorem 

Newton Binomial Formulas in Schubert Calculus
Jorge CORDOVEZ , Letterio GATTO ,
and Ta ́ıse S ANTIAGO

Clique (graph theory)

Clique game

(Redirected from Ramsey game)

In game theory, a Markov strategy is one that depends only on state variables that summarize the history of the game in one way or another.[1] For instance, a state variable can be the current play in a repeated game, or it can be any interpretation of a recent sequence of play.

A profile of Markov strategies is a Markov perfect equilibrium if it is a Nash equilibrium in every state of the game. 

Quantum Markov chain

Theorem on friends and strangers


Friends and Strangers Theorem - Numberphile

Ramsey's theorem

In combinatorial mathematics, Ramsey's theorem, in one of its graph-theoretic forms, states that one will find monochromatic cliques in any edge labelling (with colours) of a sufficiently large complete graph. To demonstrate the theorem for two colours (say, blue and red), let r and s be any two positive integers.[1] Ramsey's theorem states that there exists a least positive integer R(r, s) for which every blue-red edge colouring of the complete graph on R(r, s) vertices contains a blue clique on r vertices or a red clique on s vertices. (Here R(r, s) signifies an integer that depends on both r and s.)
 
Ghosting and destiny: Implicit theories of relationships predict beliefs about ghosting

Ghosting is a relatively new colloquial dating term that refers to abruptly cutting off contact with someone without giving that person any warning or explanation for doing so. Even when the person being ghosted reaches out to re-initiate contact or gain closure, they're met with silence

Ghosting happens when someone cuts off all online communication with someone else, and without an explanation.
Ghosting
Behavior
Ghosting, also known as simmering or icing, is a colloquial term which describes the practice of ending all communication and contact with another person without any apparent warning or justification and subsequently ignoring any attempts to reach out or communication made by said person

Luke 12

From now on there will be five in one family divided against each other, three against two and two against three.
Social entropy is a sociological theory that evaluates social behaviours using a method based on the second law of thermodynamics. The equivalent of entropy in a social system is considered to be wealth or residence location. The theory was introduced by Kenneth D. Bailey in 1990.

Parable of the talents or minas

Healing is not linear means healing isn't a task, it's a practice

Non Linear Growth

Although you are likely somewhat familiar with exponential growth, any growth that causes the output Y to be larger than the input X, is known as non-linear growth. In general, the outputs of human activity grow in a non-linear fashion.

If healing is not linear, what is it?

Dynamical systems theory

Nonlinear system

The name "no-ghost theorem" stems from the fact that in the original statement of the theorem, the natural inner product induced on the output vector space is positive definite. Thus, there were no so-called ghosts (Pauli–Villars ghosts), or vectors of negative norm.
Casper?

White Noise (2005 film)

Ghost Dance

Little Ghost

Cant (language)

A cant is the jargon or language of a group, often employed to exclude or mislead people outside the group.[1] It may also be called a cryptolect, argot, pseudo-language, anti-language or secret language. Each term differs slightly in meaning; their use is inconsistent.

Social Disparity refers to disparities in other aspects of society such as the justice system, education, academe, business institutions, as well as politics

Parity (physics), a symmetry property of physical quantities or processes under spatial inversion

1 : lack or absence of symmetry: as. a : lack of proportion between the parts of a thing especially : want of bilateral symmetry asymmetry in the development of the two sides of the brain. b : lack of coordination of two parts acting in connection with one another asymmetry of convergence of the eyes.

Betrayal and Human Relationships

Asymmetric information theory suggests that sellers may possess more information than buyers, skewing the price of goods sold. The theory argues that low-quality and high-quality products can command the same price, given a lack of information on the buyer's side.

Theory of Asymmetric Information

Grid parity

Obfuscation

Social inequality exists in the society due to existing unequal rights and opportunities. These are the following reasons as to why Social Inequality exists: There are broadly two types of inequality, one being the inequalities amongst gender and the other being the inequality amongst people from different backgrounds

Doublespeak

Infidelity and Gaslighting: When Cheaters Flip the Script

27 Signs Your Parent Is Gaslighting You & What To Do About It

How to Stop Passing the Emotional Buck

Understanding parallel process can help you pay it forward the right way.

Clews continues: "'I'm sorry you feel that way' is also minimising. It's an instant shutdown that lacks empathy for how you may be feeling – a passive-aggressive way of saying, 'I don't have the energy, curiosity or responsibility to find out why my actions, behaviours or words have hurt you.

"I’m sorry you feel that way" may sound like an apology but dissect the semantics and you’ll find it’s quite the opposite. It’s actually the pinnacle of passive-aggressive buck-passing, an anti-apology, and it’s everywhere. Watch any reality TV show and it will crop up eventually (it’s ubiquitous in the Real Housewives franchises). On social media there are thousands of instances (most of them wholly genuine responses to "I feel sad/depressed/lonely" in which case it is, of course, perfectly acceptable) but it’s the insidious usage – the substitution of "sorry you feel that way" for a real apology – that is so pesky and problematic. I’m not alone in being triggered by it. Plenty of people online have started to call it out as insincere. 


These expressions are code for: “I'm baffled by why you misunderstood me.” “I'm annoyed that you're so upset over nothing.” “You took what I said the wrong way and that's not my fault.” Getting apologies right is important, because we all make mistakes and it's vital that we acknowledge when we do.

What Is Parallel Processing in Psychology?

Inattention is a general lack of focus on the task of driving. Inattention is generally caused by intense mental concentration on highly emotional issues, such as relationships, health problems, family events, and money issues. It is also associated with daydreaming when your mind just wanders away from driving onto another subject.

When these problems consume your thoughts, it's hard to focus on driving. If you are experiencing a highly emotional event in your life, assess your capability to remain focused behind the wheel. Clear your mind so you are able to react quickly

Inattention and distractions are dangerous because they take YOUR MIND off of driving. Inattention is a general lack of focus on the task of driving. Stay focused on the task of driving because in one split second an unexpected event can occur, and you have to be ready to see it and react quickly! Most distractions are outside of the vehicle, and you cannot control them, but you CAN control the urge to look and stare. Do not take your eyes off the road.

How To Apologize: "I'm sorry you feel that way" Is Not an Apology 

Paul Reubens-I'm sorry (I took the money) from Cheech & Chong's Nice Dreams 1981

 

Parallel computing 

What Is Asymmetric Information?

Asymmetric information, also known as "information failure," occurs when one party to an economic transaction possesses greater material knowledge than the other party. This typically manifests when the seller of a good or service possesses greater knowledge than the buyer; however, the reverse dynamic is also possible. Almost all economic transactions involve information asymmetries.

Texas ranks among worst in the nation for racial health disparities 

Parity (mathematics)

Social inequality is characterized by the existence of unequal opportunities and rewards for different social positions or statuses within a group or society. It contains structured and recurrent patterns of unequal distributions of goods, wealth, opportunities, rewards, and punishments.

The Sociology of Social Inequality

Social stratification 

Measurement as a geometry of chance and experience

Parity

Parity learning, a problem in machine learning
 
Disparity, a noticeable and usually significant difference or dissimilarity economic/income disparities. Income inequality is a problem because it puts power in the hands of the rich, resulting in little-to-no social or economic mobility for large portions of the population. It can result in a higher cost of living for many, increased hardship, and rises in crime, mental illness, and social unrest.  
STEFAN GESCHKE, MARTIN GOLDSTERN, AND MENACHEM KOJMAN
 
axiom of choice, sometimes called Zermelo's axiom of choice, statement in the language of set theory that makes it possible to form sets by choosing an element simultaneously from each member of an infinite collection of sets even when no algorithm exists for the selection.
Role of axiom of choice
The cardinality of any infinite ordinal number is an aleph number. Every aleph is the cardinality of some ordinal. The least of these is its initial ordinal. Any set whose cardinality is an aleph is equinumerous with an ordinal and is thus well-orderable.

Cantor space

Lipschitz continuity

Configuration space (mathematics)

In brief, set theory is about membership while category theory is about structure-preserving transformations – but only about the relationships between those transformations. Set theory is only about membership (i.e. being an element) and what can be expressed in terms of that (e.g. being a subset).

Multiclass and multioutput algorithms

Geometric Probability

A Polish space is a topological space that’s homeomorphic to a separable complete metric space. Every second countable locally compact Hausdorff space is a Polish space, among others.

Polish spaces provide a useful framework for doing measure theory. As with any topological space, we can take a Polish space and regard it as a measurable space with its sigma-algebra of Borel sets.

Embedding

Embedding Objects in a Class 

Class (set theory)

Equivalence class

Simple guide to confusion matrix terminology

One-Class Order Embedding for Dependency Relation Prediction

 

COHOMOLOGY OF SCHUBERT SUBVARIETIES OF GLn/P

E. AKYILDIZ, A. LASCOUX & P. PRAGACZ

Intersection theory

In mathematics, intersection theory is one of the main branches of algebraic geometry, where it gives information about the intersection of two subvarieties of a given variety.[1] The theory for varieties is older, with roots in Bézout's theorem on curves and elimination theory. On the other hand, the topological theory more quickly reached a definitive form.

There is yet an ongoing development of intersection theory. Currently the main focus is on: virtual fundamental cycles, quantum intersection rings, Gromov-Witten theory and the extension of intersection theory from schemes to stacks.[2]

Covariance intersection

COMPLETE QUADRICS: SCHUBERT CALCULUS FOR GAUSSIAN MODELS AND SEMIDEFINITE PROGRAMMING
LAURENT MANIVEL, MATEUSZ MICHALEK, LEONID MONIN, TIM SEYNNAEVE,
AND MARTIN VODI ˇCKA

Priestley space

Schubert polynomial

Grothendieck polynomials

Dyck language

Stirling polynomials

Bernoulli polynomials

Monk's formula gives the product of a linear Schubert polynomial and a Schubert polynomial.

Gray code

Quantum Monte Carlo

Gambler's fallacy

Monte Carlo fallacy

Randomness is Random - Numberphile

MontePython: Implementing Quantum Monte Carlo using Python
J.K. Nilsen1,2

 python-qinfer

Library for Bayesian inference via sequential Monte Carlo for quantum parameter estimation. 

Quantum Channel Marginal Problem

Chung-Yun Hsieh,1, Matteo Lostaglio,1, 2, 3 and Antonio Ac ́ın1, 4

Bayesian Markov Games with Explicit Finite-Level Types

Muthukumaran Chandrasekaran1 and Yingke Chen2 and Prashant Doshi3

PAC-Bayesian Generalization Bound on Confusion Matrix for Multi-Class Classification

Quantum Computing Quantum Monte Carlo
Yukun Zhang,1, 2, Yifei Huang,3, Jinzhao Sun,4, 5 Dingshun Lv,3 and Xiao Yuan1, 2,

Classification: ROC Curve and AUC

AUC stands for "Area under the ROC Curve." That is, AUC measures the entire two-dimensional area underneath the entire ROC curve

Receiver operating characteristic

or ROC curve

ROC Curves and Precision-Recall Curves for Imbalanced Classification

AUC-ROC, Gains Chart and Lift Curve explained with business implications

Entanglement marginal problems
Miguel Navascu ́es1, Flavio Baccari2 and Antonio Ac ́ın

computational complexity

Computer Science Proof Unveils Unexpected Form of Entanglement

Three computer scientists have posted a proof of the NLTS conjecture, showing that systems of entangled particles can remain difficult to analyze even away from extremes. 

Stochastic Games and Bayesian Games

Imaginary numbers are real

These odd values were long dismissed as bookkeeping. Now physicists are proving that they describe the hidden shape of nature

Net present value

The discount rate

What Is Net Present Value (NPV)?

Sensitivity and specificity

Sensitivity, Specificity, and Predictive Values: Foundations, Pliabilities, and Pitfalls in Research and Practice 

Calculating Sensitivity and Specificity in Python

Harmonic mean

F-score

Diagnostic testing

What is the F1-score? 

K-theory

F-test

F Statistic / F Value: Simple Definition and Interpretation 

Grassmannian

Ball (mathematics)

Schur class

n-sphere, or hypersphere Disk (mathematics)

Sphere, a similar geometric shape Neighbourhood (mathematics)

Weighted arithmetic mean

"Weighted average" redirects here. Not to be confused with Weighted median, Weighted geometric mean, or Weighted harmonic mean.
 

Q-function

Wigner quasiprobability distribution

The Wigner quasiprobability distribution is a quasiprobability distribution. It was introduced by Eugene Wigner in 1932 to study quantum corrections to classical statistical mechanics. The goal was to link the wavefunction that appears in Schrödinger's equation to a probability distribution in phase space.
  

Probability Distribution

The formula for the standard F1-score is the harmonic mean of the precision and recall. A perfect model has an F-score of 1 and worst at 0 (F1 will never be zero, but very near to zero for a bad classifier). Unlike accuracy, it does a better job of accounting for any imbalances in the distribution of texts among tags.

Statistical classification

Accuracy, Precision, Recall & F1-Score – Python Examples

Accuracy is a metric used in classification problems used to tell the percentage of accurate predictions. We calculate it by dividing the number of correct predictions by the total number of predictions. If your 'X' value is between 70% and 80%, you've got a good model. If your 'X' value is between 80% and 90%, you have an excellent model. If your 'X' value is between 90% and 100%, it's a probably an overfitting case. nything greater than 70% is a great model performance. In fact, an accuracy measure of anything between 70%-90% is not only ideal, it's realistic.

Metrics and scoring: quantifying the quality of predictions

All you need to know about the F1 score in machine learning. With an example applying the F1 score in Python.

Exploring the relations between machine learning metrics 

Wigner distribution function

Phase-space formulation

Resampling (statistics)

How to Calculate Precision, Recall, and F-Measure for Imbalanced Classification

Regression and Classification | Supervised Machine Learning

Class Imbalance

In this post, we discuss the problem of class imbalance and the techniques which might help to improve the performance of the model

Dependent and independent variables

Confounding

confound in British English

to curse or damn (usually as an expletive in the phrase confound it!)
 

Pearson correlation coefficient

Interpretation of the size of a correlation

Controlling for a variable

The advantages of the Matthews
correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation
 

Spurious relationship 

Gauss–Markov process

Gauss map

The Gauss map can be defined for hypersurfaces in Rn as a map from a hypersurface to the unit sphere Sn − 1  ⊆  Rn.

For a general oriented k-submanifold of Rn the Gauss map can also be defined, and its target space is the oriented Grassmannian... the notion of Gauss map can be generalized to an oriented submanifold X of dimension k in an oriented ambient Riemannian manifold M of dimension n. In that case, the Gauss map then goes from X to the set of tangent k-planes in the tangent bundle TM. The target space for the Gauss map N is a Grassmann bundle built on the tangent bundle TM.

Classical mechanics is deterministic in that the equations of motion and the initial conditions fully determine a particle's trajectory. Quantum physics is an inherently probabilistic theory in that only probabilities for measurement outcomes can be determined.

Statistical model validation

Copula (probability theory)

Trace operator

MINIMAX AND ADAPTIVE ESTIMATION OF THE WIGNER
FUNCTION IN QUANTUM HOMODYNE TOMOGRAPHY WITH
NOISY DATA

Trace (linear algebra)

Comonotonicity

Properties 

Random forest

RandomForestClassifier 

Joint probability distribution

Quantum state

Probability amplitude

Conditional dependence

Kalman filter 

Kalman and Bayesian Filters in Python
Roger R Labbe Jr

Many-body problem

The many-body problem is a general name for a vast category of physical problems pertaining to the properties of microscopic systems made of many interacting particles. Microscopic here implies that quantum mechanics has to be used to provide an accurate description of the system.

The Quantum Many-Body Problem: Methods and Analysis

Bootstrap percolation

Schubert calculus

Graph theory

In mathematics, graph theory is the study of graphs, which are mathematical structures used to model pairwise relations between objects. A graph in this context is made up of vertices (also called nodes or points) which are connected by edges (also called links or lines).

Mathematical object

In the usual language of mathematics, an object is anything that has been (or could be) formally defined, and with which one may do deductive reasoning and mathematical proofs. Typically, a mathematical object can be a value that can be assigned to a variable, and therefore can be involved in formulas.

In computer science, an object can be a variable, a data structure, a function, or a method. As regions of memory, they contain value and are referenced by identifiers.

The objects introduced by Schubert are the Schubert cells, which are locally closed sets in a Grassmannian defined by conditions of incidence of a linear subspace in projective space with a given flag. For details see Schubert variety.

The intersection theory of these cells, which can be seen as the product structure in the cohomology ring of the Grassmannian of associated cohomology classes, in principle allows the prediction of the cases where intersections of cells results in a finite set of points, which are potentially concrete answers to enumerative questions. A supporting theoretical result is that the Schubert cells (or rather, their classes) span the whole cohomology ring.

In detailed calculations the combinatorial aspects enter as soon as the cells have to be indexed. Lifted from the Grassmannian, which is a homogeneous space, to the general linear group that acts on it, similar questions are involved in the Bruhat decomposition and classification of parabolic subgroups (by block matrix).

Putting Schubert's system on a rigorous footing is Hilbert's fifteenth problem.

Graph coloring

QUANTUM COHOMOLOGY OF GRASSMANNIANS
ANDERS SKOVSTED BUCH

Gaussian blur

This is what being near sighted is like mathematically speaking 

Normal distribution

Deviance (statistics)

In statistics, deviance is a goodness-of-fit statistic for a statistical model; it is often used for statistical hypothesis testing. It is a generalization of the idea of using the sum of squares of residuals (RSS) in ordinary least squares to cases where model-fitting is achieved by maximum likelihood.

Asymptotic analysis

Analysis of variance

Kalman-and-Bayesian-Filters-in-Python

Separable permutation 

Percolation theory 

PIN analysis


Pick 4's 10,000 permutations have 5,040 Singles, 4,320 Doubles, 360 Triples, 270 Double-Doubles, and 10 Quadruples. There are 24 combinations for each Single and 12 combinations for each Double. 'Box'ing the Singles yields only 210 combinations.  'Box'ing the Doubles yields 360 combinations. The 24 Straight formats for Singles and the 12 Straight formats for Doubles appear in the charts. 

Random matrix

Obi-Wan Genocchi number

Catalan number

Schröder–Hipparchus number

Schröder number

Sieve of Eratosthenes

Introduction to PyMC3: A Python package for probabilistic programming

QUANTUM COHOMOLOGY RINGS OF GRASSMANNIANS AND TOTAL POSITIVITY
KONSTANZE RIETSCH
Abstract. We give a proof of a result of D. Peterson’s identifying the quan-
tum cohomology ring of a Grassmannian with the reduced coordinate ring of a
certain subvariety of GLn. The totally positive part of this subvariety is then
constructed and we give closed formulas for the values of the Schubert basis
elements on the totally positive points.

Equi-Gaussian curvature folding
E M EL-KHOLY, EL-SAID R LASHIN∗∗ and
SALAMA N DAOUD 

A SHAPE THEORY WITH SINGULAR HOMOLOGY

Singular homology

Non-trivial solutions are a little more difficult to find than trivial ones. So basically, it is said that trivial solutions involve number 0 and non-zero solutions are said to be non-trivial.

Triviality (mathematics)

Bayesian inference in Python

Probabilistic-Programming-and-Bayesian-Methods-for-Hackers  

Bayesian game

Bayesian network

Bayesian probability

Bayesian programming

Bayesian Statistics in Python

BayesPy: Variational Bayesian Inference in Python
Jaakko Luttinen 


Bayes theorem, the geometry of changing beliefs 

An Introduction to Hidden Markov and Bayesian networks

Hidden Markov model 

J. DIFFERENTIAL GEOMETRY
3 (1969) 257-288
SINGULAR HOMOLOGY OVER Z ON
TOPOLOGICAL MANIFOLDS

Nash equilibrium

Nashpy: a python library for the computation of equilibria of 2 player strategic games. This library implements the following algorithms for Nash equilibria on 2 player games: Support enumeration. Best response polytope vertex enumeration. Lemke Howson algorithm.

Tutorial: building and finding the equilibrium for a game

Bloch sphere

Q-ball

Hairy ball theorem

Dyck Words of given length

Schwinger model

                Fock space

Emeric Deutsch*

End Behavior of a Function

Embeddings, Normal Invariants and Functor Calculus

This paper investigates the space of codimension zero embeddings of a Poincare duality space in a disk. One of our main results exhibits a tower that interpolates from the space of Poincare immersions to a certain space of "unlinked" Poincare embeddings. The layers of this tower are described in terms of the coefficient spectra of the identity appearing in Goodwillie's homotopy functor calculus. We also answer a question posed to us by Sylvain Cappell. The appendix proposes a conjectural relationship between our tower and the manifold calculus tower for the smooth embedding space.

Calculus of functors

Goodwillie calculus

Hippies (who may have had Slutsky identity End Behavior back in the 1960s) and octogenarians with the

California housing shortage

The U.S. Forest Service is taking emergency action to save sequoias from wildfires

Hotter weather also saps moisture from vegetation, turning it into dry fuel that helps fires to spread. “The hotter, drier conditions right now, it just makes [fires] far more dangerous,” Copernicus senior scientist Mark Parrington said.
 Lady Luck

Lippmann–Schwinger equation

Do not give me Lip... Man, about your Schwinger equation
... in the backseat...

Binomial proportion confidence interval

Twelvefold way

Balls and boxes[edit]

Traditionally many of the problems in the twelvefold way have been formulated in terms of placing balls in boxes (or some similar visualization) instead of defining functions. The set N can be identified with a set of balls, and X with a set of boxes; the function ƒ : N → X then describes a way to distribute the balls into the boxes, namely by putting each ball a into box ƒ(a). A function ascribes a unique image to each value in its domain; this property is reflected by the property that any ball can go into only one box (together with the requirement that no ball should remain outside of the boxes), whereas any box can accommodate (in principle) an arbitrary number of balls. Requiring in addition ƒ to be injective means forbidding to put more than one ball in any one box, while requiring ƒ to be surjective means insisting that every box contain at least one ball.

 

How prices for 5 major homebuilding materials have changed during COVID-19

Roy's identity

Who am I today?

Building Materials Prices Start 2022 with 8% Increase

Food prices continued their two-year-long upward trajectory

2 charts that show the sharp rise in food prices

Food Prices and Spending

Image (mathematics)

Counting modulo permutations of N or X is reflected by calling the balls or the boxes, respectively, "indistinguishable". This is an imprecise formulation, intended to indicate that different configurations are not to be counted separately if one can be transformed into the other by some interchange of balls or of boxes. This possibility of transformation is formalized by the action by permutations.

Logical intuition

Intuitive meaning of the chart using Balls and Boxes scenario

Dynamical systems theory

Nonlinear Schrödinger equation

Nonlinear system

With Palm calculus, we are able to relate the stationary distribution of the age to quantities that are computed for the Markov chain

Palm Calculus
Made Easy

The Importance of the Viewpoint

Moment (mathematics)

Method of moments (statistics)

Runtime (program lifecycle phase)

Runtime system

Ran space

chromatic number

Planar algebra

Hopf algebra

Hopf fibration Chaos Theory Total Order Free Action 

By David Vincent Bell Hirsch

Baire space (set theory)

Baire space

chromatic number

Standard probability space

Method of moments (probability theory)

Combinatorial map

Moment problem

Stationary Point Processes, Palm Probabilities, and Queues
Ravi R. Mazumdar

Point process

Poisson point process

Poisson percolation on the square lattice
Irina Cristali, Matthew Junge and Rick Durrett,

A straightforward walk-through of a useful statistical concept

Percolation theory

CLUSTERING AND PERCOLATION OF POINT PROCESSES
By Bartlomiej Blaszczyszyn

Cramer's rule

Campbell's theorem (probability)

Phi coefficient

Machine learning

/ CustomAnsibleModules  

A tutorial on Palm distributions for spatial point
processes

Jean-François Coeurjolly, Jesper Møller, Rasmus Waagepetersen

Palm Probabilities and
Rate Conservation Laws

Ravi R. Mazumdar

Palm duality random spider walk in the valley of stability

By David Vincent Bell Hirsch

PALM MEASURE DUALITY AND CONDITIONING IN
REGENERATIVE SETS

By Olav Kallenberg 

Carl Jung called the paradox one of our most valued spiritual possessions and a great witness to the truth. He wrote, “Only the paradox comes anywhere near to comprehending the fullness of life.”

Homer Simpson

Law of large numbers

The large numbers theorem states that if the same experiment or study is repeated independently a large number of times, the average of the results of the trials must be close to the expected value. The result becomes closer to the expected value as the number of trials is increased.

D'oh!

Simpson's rule Consumer Problem with Hicksian demand

By David Vincent Bell Hirsch

It is obtained from the derivative of the Hicksian demand with regards price.

Polynomial End Behavior

The end behavior of a polynomial function is the behavior of the graph of f(x) as x approaches positive infinity or negative infinity. The degree and the leading coefficient of a polynomial function determine the end behavior of the graph
 

Equivalence relation

Multinomial distribution

Polish–Turkish relations are foreign relations between Poland and Turkey. Both countries are full members of NATO and the Union for the Mediterranean. Poland and Turkey share many similarities in their cultural history and cuisine and generally relations are cordial.

Feynman–Kac formula

Kac’s moment formula and the Feynman–Kac formula
for additive functionals of a Markov process

P.J. Fitzsimmons, Jim Pitman ;

Poland–Turkey relations

Is Poland a good economy?


The well-diversified Polish economy has proven to be one of the most resilient in the European Union (EU), with employment growth in 2020 despite a relatively small contraction in GDP of 2.5 percent, the first output contraction since 1991.

WHAT ARE THE DIFFERENCES BETWEEN ONE-TAILED AND TWO-TAILED TESTS?

Chi-squared distribution

The Chi-Square Test of Independence

What a p-value tells you about statistical significance

Okay for Polish friends and family figuring the P-Values from Chi-Squared distribution,

AFFINE APPROACH TO QUANTUM SCHUBERT CALCULUS

Regression analysis

Two-Tailed Test

The smaller the p-value, the stronger the evidence that you should reject the null hypothesis.
  1. A p-value less than 0.05 (typically ≤ 0.05) is statistically significant. ...
  2. A p-value higher than 0.05 (> 0.05) is not statistically significant and indicates strong evidence for the null hypothesis.

What is p-hacking in machine learning?

A factor that can significantly affect a machine learning model's performance is P-hacking. In broad terms, it refers to the incorrect usage of data that produces misleading statistical results.

Curse of dimensionality

Combinatorial explosion

Data dredging

Data dredging (also known as data snooping or p-hacking)[1][a] is the misuse of data analysis to find patterns in data that can be presented as statistically significant, thus dramatically increasing and understating the risk of false positives. This is done by performing many statistical tests on the data and only reporting those that come back with significant results.[2]
 
Now David, isn't this a little, um...

The opposite of pathological is well-behaved... now what is Chaos Theory anyway?

In mathematicscombinatorial topology was an older name for algebraic topology, dating from the time when topological invariants of spaces (for example the Betti numbers) were regarded as derived from combinatorial decompositions of spaces, such as decomposition into simplicial complexes. After the proof of the simplicial approximation theorem this approach provided rigour.

The change of name reflected the move to organise topological classes such as cycles-modulo-boundaries explicitly into abelian groups. This point of view is often attributed to Emmy Noether,[1] and so the change of title may reflect her influence. The transition is also attributed to the work of Heinz Hopf,[2] who was influenced by Noether, and to Leopold Vietoris and Walther Mayer, who independently defined homology.[3]

A fairly precise date can be supplied in the internal notes of the Bourbaki group. While topology was still combinatorial in 1942, it had become algebraic by 1944.[4]

Azriel Rosenfeld (1973) proposed digital topology for a type of image processing that can be considered as a new development of combinatorial topology. The digital forms of the Euler characteristic theorem and the Gauss–Bonnet theorem were obtained by Li Chen and Yongwu Rong.[5][6] A 2D grid cell topology already appeared in the Alexandrov–Hopf book Topologie I (1935).

Recursion (computer science)

Show your proofs, otherwise:

'p-hacking'. It is a misuse of data analysis to find patterns in data that can be presented as statistically significant when in fact there is no real underlying effect. How do you account for:
 
Fishy fishy fishy fishy fishy fishy fishy...

The Poisson Distribution

The Poisson Distribution arises in a number of contexts as the distribution of a random number of points, for example the number of clicks of a Geiger counter in one second, the number of raisins in a box of raisin bran, the number of blades of grass in a randomly chosen square inch of lawn, and so forth.

The formula for the probability of observing k of whatever is being counted when the expected number is m is

p(k) = mk e− m ⁄ k !

where e is the base of the natural logarithms and k ! indicates the factorial function (use the ex key on a scientific calculator to calculate e− m and the x! key to calculate k !).

Theoretically any count between zero and infinity (including zero) is possible, but the probability of large counts falls off very rapidly.

In a lottery, the number of winners cannot have an exact Poisson distribution for two reasons.

  • The number of winners cannot be more than the number of tickets sold, whereas the Poisson distribution gives nonzero probability to arbitrarily large numbers of winners.
  • The choice of lottery numbers by the players is not completely random. If you choose a popular number, you will have to share with many other winners if you win. Conversely, if you can figure out a number no one else likes and play that, you are guaranteed not to have to share the jackpot if you win. The Poisson distribution assumes every player chooses lottery numbers completely at random.

The first issue is not a serious problem. The Poisson distribution would be an extremely good approximation if it were not for the other issue. The second is more serious. Many players (about 70%) buy quick picks which are completely random, but other players choose some number they think is lucky and that's not random. If every player choose a quick pick the Poisson distribution would be an almost perfect approximation. Since they don't, it is not quite right. However, we will assume the Poisson distribution is correct to keep things simple.

The reason why the unconditional distribution of the number of winners of the jackpot and the conditional distribution of the number of other winners given you win are the same has to do with the assumption of completely random choices of numbers by all the players, which is required for the correctness of the Poisson distribution. Then whether you you win or not doesn't change the probability of anyone else winning. Everyone has the same 1 in 146.1 million chance of winning, and their ticket choice had nothing to do with yours.

Type I and type II errors

Lecturer: Zhao Jianhua
Department of StatisticsYunnan University of Finance and Economic
A commodity pool is a shared private pool of money from multiple participants to speculate in futures, swaps, or options markets. The commodity pool operator (CPO) manages and solicits funds for the pool. Most CPOs must be registered members of the National Futures Association (NFA) to conduct business.

Jumping into a commodity pool is one of several ways you can trade in commodity futures markets.

A commodity pool is a shared private pool of money from multiple participants to speculate in futures, swaps, or options markets. The commodity pool operator (CPO) manages and solicits funds for the pool.

Most CPOs must be registered members of the National Futures Association (NFA) to conduct business. You can check the registration status and backgrounds of CPOs using the NFA’s Background Affiliation Status Information Center (BASIC) database.

Trading futures through a pool rather than through an individual trading account has its benefits. Your purchasing power increases significantly when you team up with a pool. You gain more leverage and diversification if you trade a $1 million account as opposed to a $10,000 account, for example. The pool’s participants share in the profits based on how much money they contribute. They also share in the losses.

Commodity Pool Operator (CPO)

How do you organize a lottery pool? 

How to organize an office lottery pool

  1. Create a contract. ...
  2. Designate a leader. ...
  3. Welcome everyone to participate. ...
  4. Collect money electronically. ...
  5. Confirm participants before purchasing tickets. ...
  6. Make a copy of every ticket. ...
  7. Secure the original ticket.
St. Cajetan
The St. Cajetan (Cayetano) is the patron saint of bankers, gamers, gamblers, job seekers, unemployed people, and workers.
In set theory and related branches of mathematics, a collection F of subsets of a given set S is called a family of subsets of S, or a family of sets over S. More generally, a collection of any sets whatsoever is called a family of setsset family, or a set system.

See also[edit]

Python | All possible N combination tuples

Tuple

In mathematics, a tuple is a finite ordered list (sequence) of elements. An n-tuple is a sequence (or ordered list) of n elements, where n is a non-negative integer. There is only one 0-tuple, referred to as the empty tuple. An n-tuple is defined inductively using the construction of an ordered pair.

Ramsey's theorem

Ramsey's theorem states that there exists a least positive integer R(r, s) for which every blue-red edge colouring of the complete graph on R(r, s) vertices contains a blue clique on r vertices or a red clique on s vertices.

What is a complete graph in graph theory?
In the mathematical field of graph theory, a complete graph is a simple undirected graph in which every pair of distinct vertices is connected by a unique edge. A complete digraph is a directed graph in which every pair of distinct vertices is connected by a pair of unique edges (one in each direction).

Complete graph

 
The graph K3,3 is non-planar. Proof: in K3,3 we have v = 6 and e = 9. If K3,3 were planar, from Euler's formula we would have f = 5. On the other hand, each region is bounded by at least four edges, so 4f ≤ 2e, i.e., 20 ≤ 18, which is a contradiction. 

Materials with a negative Poisson's ratio, also known as auxetic materials, exhibit unusual and counterintuitive mechanical behaviour—becoming fatter in cross-section when stretched.

Planar graph

See also[edit]

  • Combinatorial map a combinatorial object that can encode plane graphs
  • Planarization, a planar graph formed from a drawing with crossings by replacing each crossing point by a new vertex
  • Thickness (graph theory), the smallest number of planar graphs into which the edges of a given graph may be partitioned
  • Planarity, a puzzle computer game in which the objective is to embed a planar graph onto a plane
  • Sprouts (game), a pencil-and-paper game where a planar graph subject to certain constraints is constructed as part of the game play
  • Three utilities problem, a popular puzzle
Spherical Lottery Ball Shape
In statistics and probability analysis, the expected value is calculated by multiplying each of the possible outcomes by the likelihood each outcome will occur and then summing all of those values. By calculating expected values, investors can choose the scenario most likely to give the desired outcome.

Relational models theory (RMT) is a theory of interpersonal relationships, authored by anthropologist Alan Fiske and initially developed from his fieldwork in Burkina Faso.[1][2][3][4][5] RMT proposes that all human interactions can be described in terms of just four "relational models", or elementary forms of human relations: communal sharing, authority ranking, equality matching and market pricing (to these are added the limiting cases of asocial and null interactions, whereby people do not coordinate with reference to any shared principle).

RMT influenced Jonathan Haidt's moral foundations theory and Steven Pinker's theory of indirect speech.

Explanation for unequal probabilities of numbers drawn in a lottery

Expected value

In probability theory, the expected value (also called expectationexpectancymathematical expectationmeanaverage, or first moment) is a generalization of the weighted average. Informally, the expected value is the arithmetic mean of a large number of independently selected outcomes of a random variable.

The expected value of a random variable with a finite number of outcomes is a weighted average of all possible outcomes. In the case of a continuum of possible outcomes, the expectation is defined by integration. In the axiomatic foundation for probability provided by measure theory, the expectation is given by Lebesgue integration.

Binomial proportion confidence interval

 

Bernoulli trial


 
Fisher's exact test is a statistical significance test used in the analysis of contingency tables.[1][2][3] Although in practice it is employed when sample sizes are small, it is valid for all sample sizes. It is named after its inventor, Ronald Fisher, and is one of a class of exact tests, so called because the significance of the deviation from a null hypothesis (e.g., P-value) can be calculated exactly, rather than relying on an approximation that becomes exact in the limit as the sample size grows to infinity, as with many statistical tests.

Poisson means 'Fish' in French for Greek letter Alpha sake

Random walker algorithm

Noise (electronics)

In communication systems, noise is an error or undesired random disturbance of a useful information signal in a communication channel. The noise is a summation of unwanted or disturbing energy from natural and sometimes man-made sources. Noise is, however, typically distinguished from interference,[a] for example in the signal-to-noise ratio (SNR), signal-to-interference ratio (SIR) and signal-to-noise plus interference ratio (SNIR) measures.

Hebbian theory

Corticostriatal circuitry
Ribbon Crystals
twistronics
I'm a going to a invent me one of them
topological quantum computers

A Hebbian learning rule gives rise to mirror neurons and links them to control theoretic inverse models

This principle is known as the Hebbian learning rule (1): i.e., if interconnected neurons become active very close in time during a particular event, their connection strengthens and “a memory” of this event is formed (1). In other words, “neurons wire together, if they fire together” (2)


Dr. Price Bell, Judge James Bell, I am your great great and great grandson
 
CSV stands for Comma-Separated Values. It is a document design utilized to keep information in an accounting page or dataset

Reading a CSV file in Java using OpenCSV

1 in ten thousand chance of an exact match for Pick 4
Social contagion is the spread of an entity or influence between individuals in a population via interactions between agents. Examples are the spreading of fads, rumors and riots.
1 in one thousand chance of an exact match for Pick 3
You CAN predict lottery numbers

Mathematician claims probability CAN predict lottery numbers more likely to be drawn (but you may need a maths degree to work them out)

  •  Renato Gianella says it is possible to predict winning lottery numbers
  • Theory is based on patterns as predicted by Law of Large Numbers
  • Brazilian claims not all numbers have equal chance of being drawn
  • He's developed website to help people select more favorable combinations
  • But users may need more than basic maths to understand how it works
  • Study was based on 20 lotteries around the world

Pick 3™ Morning, Day, Evening and Night

Download Current and Past Winning Numbers

The comma separated value files you can download here contain current and past winning numbers from all Pick 3 MorningPick 3 DayPick 3 Evening or Pick 3 Nightdrawings. 
Lottery mathematics is used to calculate probabilities of winning or losing a lottery game. It is based primarily on combinatorics, particularly the twelvefold way and combinations without replacement.

Twelvefold way

In combinatorics, the twelvefold way is a systematic classification of 12 related enumerative problems concerning two finite sets, which include the classical problems of counting permutationscombinationsmultisets, and partitions either of a set or of a number.

"You've got to ask yourself one question: 'Do I feel lucky?' Well, do you, punk?" 
Clint Eastwood's most commonly quoted line from Dirty Harry

Math 432: Sequences - The Twelvefold Way (1 of 3)



Daily 4™ Morning, Day, Evening and Night

Download Current and Past Winning Numbers

The comma separated value files you can download here contain current and past winning numbers from all Daily 4 MorningDaily 4 DayDaily 4 Evening or Daily 4 Night drawings. The information in the files is organized in the following manner, one row for each drawing:

Game Name, Month, Day, Year, Num1, Num2, Num3, Num4, Sum It Up®

Daily 4 Morning: Download File
 
Daily 4 Day: Download File
 
Daily 4 Evening: Download File
 
Daily 4 Night: Download File

 3.4: Expected Value and Law of Large Numbers - Mathematics LibreTexts

Surjective function

Import csv into SQL server (with query OR without query using SSMS)

Dirichlet's box principle

Stars and bars (combinatorics)

Stars and Bars (and bagels) - Numberphile

What is K fold cross?
 
Cross-validation is a resampling procedure used to evaluate machine learning models on a limited data sample. The procedure has a single parameter called k that refers to the number of groups that a given data sample is to be split into

k-Fold Cross-Validation

What is tenfold cross validation?

10-fold cross validation would perform the fitting procedure a total of ten times, with each fit being performed on a training set consisting of 90% of the total training set selected at random, with the remaining 10% used as a hold out set for validation.

Cross Validation in Scikit Learn

 What is K-fold cross validation in KNN?
k-Fold Cross-Validation

Cross-validation is when the dataset is randomly split up into 'k' groups. One of the groups is used as the test set and the rest are used as the training set. The model is trained on the training set and scored on the test set.

Building a k-Nearest-Neighbors (k-NN) Model with Scikit-learn

k-nearest neighbors algorithm

In statistics, the k-nearest neighbors algorithm is a non-parametric supervised learning method first developed by Evelyn Fix and Joseph Hodges in 1951, and later expanded by Thomas Cover. It is used for classification and regression. In both cases, the input consists of the k closest training examples in a data set.

Social contagion

Social contagion involves behaviour, emotions, or conditions spreading spontaneously through a group or network. The phenomenon has been discussed by social scientists since the late 19th century, although much work on the subject was based on unclear or even contradictory conceptions of what social contagion is, so exact definitions vary. Some scholars include the unplanned spread of ideas through a population as social contagion, though others prefer to class that as memetics. Generally social contagion is understood to be separate from the collective behaviour which results from a direct attempt to exert social influence.

Spiritual intelligence

Spiritual intelligence is a term used by some philosopherspsychologists, and developmental theorists to indicate spiritual parallels with IQ (Intelligence Quotient) and EQ (Emotional Quotient).

See also[edit]

Clique

Ghosting (behavior)

Abnormality (behavior)

The Four Faces of Luck

Seeing meaning in the unexpected can help turn mistakes into opportunities, says researcher Dr Christian Busch

Luck

Building a k-Nearest-Neighbors (k-NN) Model with Scikit-learn

k-nearest neighbors algorithm

In statistics, the k-nearest neighbors algorithm is a non-parametric supervised learning method first developed by Evelyn Fix and Joseph Hodges in 1951, and later expanded by Thomas Cover. It is used for classification and regression. In both cases, the input consists of the k closest training examples in a data set.

Geek
Weirdo

Nerd

Name calling

Name-calling is a form of verbal abuse in which insulting or demeaning labels are directed at an individual or group.

As a cognitive bias in propaganda

Name-calling is a cognitive bias and a technique to promote propaganda. Propagandists use the name-calling technique to invoke fear in those exposed to the propaganda, resulting in the formation of a negative opinion about a person, group, or set of beliefs or ideas.[1]

Dysphemism

A dysphemism is an expression with connotations that are derogatory either about the subject matter or to the audience. 

Dysphemism may be motivated by fear, distaste, hatred, contempt, or humour.

Pejorative

pejorative or slur is a word or grammatical form expressing a negative or a disrespectful connotation, a low opinion, or a lack of respect toward someone or something.[1] It is also used to express criticism, hostility, or disregard. Sometimes, a term is regarded as pejorative in some social or ethnic groups but not in others, or may be originally pejorative but later adopt a non-pejorative sense (or vice versa) in some or all contexts.

See also[edit]

Dunbar's number is a suggested cognitive limit to the number of people with whom one can maintain stable social relationships—relationships in which an individual knows who each person is and how each person relates to every other person 

Dialectical behavior therapy is an evidence-based psychotherapy that began with efforts to treat personality disorders and interpersonal conflicts.

Emotional contagion

Emotional contagion is a form of social contagion that involves the spontaneous spread of emotions and related behaviors

Behavioral contagion

Collective effervescence (CE) is a sociological concept coined by Émile Durkheim. According to Durkheim, a community or society may at times come together and simultaneously communicate the same thought and participate in the same action.

Collective effervescence

The Golem and Passover

By Nissim Katz

Judgement of Solomon

1 Kings 3:16-28

Jewish revolt against Constantius Gallus

The Geometry of Dialogue, Conversation Design and rule of three with Design-Oriented Programming for Open problems

By David Vincent Bell Hirsch

Cognitive behavioral therapy

Cognitive behavioral therapy (CBT) is a psycho-social intervention[1][2] that aims to reduce symptoms of various mental health conditions, primarily depression and anxiety disorders.[3] CBT focuses on challenging and changing cognitive distortions (such as thoughts, beliefs, and attitudes) and their associated behaviors to improve emotional regulation[2][4] and develop personal coping strategies that target solving current problems. Though it was originally designed to treat depression, its uses have been expanded to include the treatment of many mental health conditions, including anxiety,[5][6] substance use disorders, marital problems, and eating disorders.[7][8][9] CBT includes a number of cognitive or behavioral psychotherapies that treat defined psychopathologies using evidence-based techniques and strategies.

Gardner's Theory of Multiple Intelligences

Numinous

Noumenon

Causal adequacy principle

Director circle

(also called the orthoptic circle or Fermat–Apollonius circle)

Nomogram

(from Greek nomos νόμος, "law" and grammē γραμμή, "line")

Nine-point conic

Nine-point circle

Nine significant points

In geometry, stellation is the process of extending a polygon in two dimensions, polyhedron in three dimensions, or, in general, a polytope in n dimensions to form a new figure.

Nonagon

or enneagon

Enneagram (geometry)

In geometry, an enneagram is a nine-pointed plane figure. It is sometimes called a nonagramnonangle, or enneagon.[1]

The word 'enneagram' combines the numeral prefix ennea- with the Greek suffix -gram. The gram suffix derives from γραμμῆς (grammēs) meaning a line.

What is a stellate in math?
Stellation of a polyhedron involves extending its faces and/or edges into space to form other polyhedra, often with a star-like appearance, which is where the words “stellation,” “stellate,” and “stellated” originate.

Be that change you want to see in the world:

In combinatorics, the twelvefold way is a systematic classification of 12 related enumerative problems concerning two finite sets, which include the classical problems of counting permutationscombinationsmultisets, and partitions either of a set or of a number.

In physics, the eightfold way is an organizational scheme for a class of subatomic particles known as hadrons that led to the development of the quark model.

Technion – Israel Institute of Technology

The Technion – Israel Institute of Technology (Hebrew: הטכניון – מכון טכנולוגי לישראל)
A scalar data type, or just scalar, is any non-composite value. Generally, all basic primitive data types are considered scalar: The boolean data type ( bool ) Numeric types ( int , the floating point types float and double )

Scalar Processor

What is scalar instruction?
A scalar processor acts on one piece of data at a time. A vector processor acts on several pieces of data with a single instruction. A superscalar processor issues several instructions at a time, each of which operates on one piece of data. Our ARM pipelined processor is a scalar processor.
Mathematics
A scalar is an element of a field which is used to define a vector space. A quantity described by multiple scalars, such as having both direction and magnitude, is called a
vector

MATHEMATICSPHYSICS

adjective
  1. (of a quantity) having only magnitude, not direction.

Vector (mathematics and physics)

Vector field

Eigenvalues and eigenvectors

In linear algebra, an eigenvector or characteristic vector of a linear transformation is a nonzero vector that changes at most by a scalar factor when that linear transformation is applied to it.  

Eigenvalues are a special set of scalars associated with a linear system of equations (i.e., a matrix equation) that are sometimes also known as characteristic roots, characteristic values

Scalar data type[edit]

A scalar data type, or just scalar, is any non-composite value.

Generally, all basic primitive data types are considered scalar:

See also[edit]

The Pentium has what is known as a “superscalar pipelined architecture.” Superscalar means that the CPU can execute two (or more) instructions per cycle. (To be more precise: The Pentium can generate the results of two instructions in a single clock cycle.)
 

First-class citizen

First-order logic—also known as predicate logicquantificational logic, and first-order predicate calculus

Entity–relationship model

An entity–relationship model (or ER model) describes interrelated things of interest in a specific domain of knowledge. A basic ER model is composed of entity types (which classify the things of interest) and specifies relationships that can exist between entities (instances of those entity types).

Web framework

Flask (web framework)

Flask’s documentation

Ruby on Rails

Ruby (programming language)

Ruby is...

A dynamic, open source programming language with a focus on simplicity and productivity. It has an elegant syntax that is natural to read and easy to write

CherryPy

In mathematics, a matrix is a rectangular array or table of numbers, symbols, or expressions, arranged in rows and columns, which is used to represent a mathematical object or a property of such an object.

Lambda calculus

Lambda calculus (also written as λ-calculus) is a formal system in mathematical logic for expressing computation based on function abstraction and application using variable binding and substitution. It is a universal model of computation that can be used to simulate any Turing machine.
 

Turing machine

Model theory

 

Mathematical object

In the usual language of mathematics, an object is anything that has been (or could be) formally defined, and with which one may do deductive reasoning and mathematical proofs. Typically, a mathematical object can be a value that can be assigned to a variable, and therefore can be involved in formulas.

In computer science, an object can be a variable, a data structure, a function, or a method. As regions of memory, they contain value and are referenced by identifiers.
In JavaScript, a primitive (primitive value, primitive data type) is data that is not an object and has no methods or properties. There are 7 primitive data types: string, number, bigint, boolean, undefined, symbol, and null.

Primitive data type


See also[edit]


Gradient descent (GD) is an iterative first-order optimisation algorithm used to find a local minimum/maximum of a given function. This method is commonly used in machine learning (ML) and deep learning(DL) to minimise a cost/loss function (e.g. in a linear regression).

The Gradient Descent method lays the foundation for machine learning and deep learning techniques. Let’s explore how does it work, when to use it and how does it behave for various functions.


In mathematics, gradient descent (also often called steepest descent) is a first-order iterative optimization algorithm for finding a local minimum of a differentiable function

Decision theory

Decision theory is the study of a person or agents' choices. The theory helps us understand the logic behind the choices professionals, consumers, or even voters make. The choices come with consequences and are usually discussed in two separate but distinct branches.

Using a knowledge graph for reasoning over data

A knowledge graph formally represents semantics by describing entities and their relationships.[17] Knowledge graphs may make use of ontologies as a schema layer. By doing this, they allow logical inference for retrieving implicit knowledge rather than only allowing queries requesting explicit knowledge.[18]

In order to allow the use of knowledge graphs in various machine learning tasks, several methods for deriving latent feature representations of entities and relations have been devised. These knowledge graph embeddings allow them to be connected to machine learning methods that require feature vectors like word embeddings. This can complement other estimates of conceptual similarity.

Knowledge economy

Purple economy

The purple economy is that part of the economy which contributes to sustainable development by promoting the cultural potential of goods and services.

“The purple economy refers to taking account of cultural aspects in economics. It designates an economy that adapts to the human diversity in globalization and that relies on the cultural dimension to give value to goods and services.”

Knowledge workers are workers whose main capital is knowledge. Examples include programmersphysicianspharmacistsarchitectsengineersscientistsdesign thinkers, public accountantslawyerseditors, and academics, whose job is to "think for a living".[1]

Know Nothing

The Know Nothings were a nativist political party and movement in the United States in the mid-1850s. The party was officially known as the "Native American Party" prior to 1855 and thereafter, it was simply known as the "American Party".


Schultz, constantly encountering evidence that the inmates of his stalag were planning mayhem, frequently feigned ignorance with the catchphrase, "I see nothing! I hear nothing! I know nothing!" (or, more commonly as the series went on, "I know nothing, nothing!").

Good parents are family managers.

Eleanor Roosevelt quote: Power corrupts. Knowledge is power. Study hard. Be evil.

Slacker actually tells the story of Austin and its one-time “slacker” culture

and a meandering philosopher may add the notion of an
The absence of good (Latin: privatio boni), also known as the privation theory of evil, is a theological and philosophical doctrine that evil, unlike good, is insubstantial, so that thinking of it as an entity is misleading. Instead, evil is rather the absence, or lack (“privation”), of good.

Laplace's demon

Ahh, Satan, you great deceiver you, expressed in literature pertaining to German business as Faust!

Maxwell's demon

What the devil?
Drain the swamp is a phrase which has frequently been used by politicians since the 1980s

Winning can add some credibility and connections early in a career. It is true that winning a major songwriting contest can put you on the long-range radar of some industry professionals

Sure is getting hot this summer at the live music capital of the world songwriting camp contest as a thank you to my superhero parents for getting me a swamp cooler and to scout for innovative emerging market makers for the Department of Energy and the EPA from an Austin - Houston mayoral pitch:

As energy secretary, Rick Perry mixed money and politics in Ukraine. The deals could be worth billions.

When the then-energy secretary accidentally helped lead the president into impeachment, he was simultaneously trying to help his friends cash in on a big gas deal.
Generating energy that produces no greenhouse gas emissions from fossil fuels and reduces some types of air pollution.

The most common renewable power technologies include:

  • Solar (photovoltaic, solar thermal)
  • Wind
  • Biogas (e.g., landfill gas/wastewater treatment digester gas)
  • Geothermal
  • Biomass
  • Low-impact hydroelectricity
  • Emerging technologies - wave and tidal power

May 5,1890, was a memorable day in Austin. It was memorable for the reason that on that day the citizens of the City of the Violet Crown voted to build a granite dam across the Colorado River

Ever wonder why Austin is known as the Live Music Capital of the World®? The slogan became official in 1991 after it was discovered that Austin had more live music venues per capita than anywhere else in the nation.

Luke 22:36
Why did Jesus say to sell your cloak and buy a sword?
Formerly, when the Disciples had gone out, on mission, they had not lacked anything. Now they would need a purse, a bag and even a sword. The saying is heavily ironical, for Jesus knew that now He would have to face universal opposition and be put to death.

"Cloak and dagger" refers to situations involving intrigue, secrecyespionage, or mystery.

Overview

In "The Knight's Tale", published around 1400, English poet Geoffrey Chaucer referred to "The smiler with the knife under the cloak".[1]

Taken literally, the phrase could refer to using the cloak and dagger in historical European martial arts. The purpose of the cloak was to obscure the presence or movement of the dagger, to provide minor protection from slashes, to restrict the movement of the opponent's weapon, and to provide a distraction. Fencing master Achille Marozzo taught and wrote about this method of combat in his book, Opera Nova. Fighting this way was not necessarily seen as a first choice of weapons, but may have become a necessity in situations of self-defense if one were not carrying a sword, with the cloak being a common garment of the times that could be pressed into use as a defensive aid. Both Marozzo and other masters such as Di Grassi also taught the use of the cloak with the rapier.[2][3]

The metaphorical meaning of the phrase dates from the early 19th century. It is a translation from the French de cape et d'épée and Spanish de capa y espada ("of cloak and sword"). These phrases referred to a genre of swashbuckler drama in which the main characters wore these items. In 1840, Henry Wadsworth Longfellow wrote, "In the afternoon read La Dama Duende of Calderón – a very good comedy of 'cloak and sword'." Charles Dickens subsequently used the phrase "cloak and dagger" in his work Barnaby Rudge a year later as a sarcastic reference to this style of drama.[4] The imagery of these two items became associated with the archetypal spy or assassin: the cloak, worn to hide one's identity or remain hidden from view, and the dagger, a concealable and silent weapon.[citation needed]

In contemporary culture

The sword fight in Peter Martins' ballet of Romeo + Juliet culminates in Romeo stabbing Tybalt repeatedly in the back with a dagger, having flung his cloak over the latter's head.

Cloak and Dagger are also the names of two Marvel Comics characters debuting in 1982.

SEAL Team ONE's unit logo features a seal wrapped in a cloak, holding a dagger, referencing the nature of their clandestine missions.

Violet Crown Cinema

Locally owned cinema showing indie, documentary & foreign films, with reserved seating, bar & cafe.
Located in: 2nd Street District
Address: 434 W 2nd St, Austin, TX 78701

We may compose ourselves and mature reason as we dig deep within ourselves for the words to express our collective circumstances and how we may work together in a melting pot of Texas and our USA working our collective

Purple economy

The earliest mention the Austin History Center has found is from an article published in the Austin Daily Statesman on Wednesday, August 8, 1894. The article, "The Rest of the News," begins: "May 5,1890, was a memorable day in Austin. It was memorable for the reason that on that day the citizens of the City of the Violet Crown voted to build a granite dam across the Colorado River ..."

For a long time, it was believed that the first published use of the phrase is found in O. Henry's short story "Tictocq" in the Rolling Stones collection of O. Henry short stories. It was originally published in his local newspaper The Rolling Stone on October 27, 1894.

The phrase is used in Chapter Two: "The drawing-rooms of one of the most magnificent private residences in Austin are a blaze of lights.

Humanitarians, poets, philosophers, open forum calls by and for muscians with the church and the state may come together upon a party platform, to address political planks one by one with song verse in a Drain the swamp cooler camp songwriting contest as to keep cool with hot heads.

Establishment Clause (Separation of Church and State)

By Hana M. Ryman and J. Mark Alcorn

Texas, Our Texas! All hail the mighty State!
Texas, Our Texas! So wonderful, so great!
Boldest and grandest, withstanding ev'ry test
O Empire wide and glorious, you stand supremely blest.

God bless you Texas! And keep you brave and strong,
That you may grow in power and worth, throughout the ages long.

Texas, O Texas! Your freeborn single star,
Sends out its radiance to nations near and far,
Emblem of Freedom! It sets our hearts aglow,
With thoughts of San Jacinto and glorious Alamo.

God bless you Texas! And keep you brave and strong,
That you may grow in power and worth, throughout the ages long.

Texas, dear Texas! From tyrant grip now free
Shine forth in splendor your star of destiny
Mother of heroes, we come your children true.
Proclaiming our allegiance, our faith, our love for you.

God bless you Texas! And keep you brave and strong
That you may grow in power and worth, throughout the ages long.

Euro takes a breather after teetering on the brink of dollar parity

Turkey’s annual inflation soars to almost 79%, hitting highest level in 24 years

Quantum annealing

Competitive intelligence

Competitive intelligence (CI) is the process and forward-looking practices used in producing knowledge about the competitive environment to improve organizational performance.[1] It involves the systematic collection and analysis of information from multiple sources, and a coordinated CI program.[2] It is the action of defining, gathering, analyzing, and distributing intelligence about products, customers, competitors, and any aspect of the environment needed to support executives and managers in strategic decision making for an organization.

CI means understanding and learning what is happening in the world outside the business to increase one's competitiveness. It means learning as much as possible, as soon as possible, about one's external environment including one's industry in general and relevant competitors.[3]

Field (mathematics)

Group theory

Galois theory

Galois group

GALOIS GROUPS OF SCHUBERT PROBLEMS

ABRAHAM MARTIN DEL CAMPO SANCHEZ 

Levi

Levi (/ˈliːvaɪ/; Hebrew: לֵוִי‎, Modern: Levī, Tiberian: Lēwī) was, according to the Book of Genesis, the third of the six sons of Jacob and Leah (Jacob's third son), and the founder of the Israelite Tribe of Levi (the Levites, including the Kohanim) and the great-grandfather of Aaron, Moses and Miriam.

Levi decomposition

Mathematicism

Paul Zinn-Justin: "Schubert calculus and quantum integrability"


Schubert variety

In algebraic geometry, a Schubert variety is a certain subvariety of a Grassmannian, usually with singular points. Like a Grassmannian, it is a kind of moduli space, whose points correspond to certain kinds of subspaces V, specified using linear algebra, inside a fixed vector subspace W. Here W may be a vector space over an arbitrary field, though most commonly over the complex numbers.

Littlewood–Richardson rule

Spherical multiple flags
Piotr Achinger & Nicolas Perrin

Minkowski geometry may refer to:

Dirichlet's principle

Dirichlet's Box Principle

Dense graph

Mathematics[edit]

  • Aliquot part, a proper divisor of an integer
  • Aliquot sum, the sum of the aliquot parts of an integer
  • Aliquot sequence, a sequence of integers in which each number is the aliquot sum of the previous number

Music[edit]

  • Aliquot stringing, in stringed instruments, the use of strings which are not struck to make a note, but which resonate sympathetically with struck notes
  • Aliquot stop, an organ stop that adds harmonics or overtones instead of the primary pitch

Sciences[edit]

  • Aliquot of a sample, in chemistry or the other sciences, an exact portion of a sample or total amount of a liquid (e.g. exactly 25 mL of water taken from 250 ml)
  • Aliquot in pharmaceutics, a method of measuring ingredients below the sensitivity of a scale by proportional dilution with inactive known ingredients
  • Genome aliquoting, the problem of reconstructing an ancestral genome from the genomes of polyploid descendants  
  •  Hyperspace (also nulspacesubspaceoverspacejumpspace and similar)

    Tangent space

Chemical space

Chemical space is a concept in cheminformatics referring to the property space spanned by all possible molecules and chemical compounds adhering to a given set of construction principles and boundary conditions. It contains millions of compounds which are readily accessible and available to researchers.

Vector space

Quantum heat engines and refrigerators

What is an energy absorbing material?
Fiber composites, foams, magneto-rheological (MR) fluids, and porous materials are typical high energy absorbing materials. Fiber composites, like carbon fibers, have relative higher stiffness and strength and lightweight compared to their steel counterpart

Energy Absorption

Energy absorption is defined as the surface below the load-displacement curve.

 
Microgravity Effects on Combustion of
Polymers

David Hirsch
Jim Williams
Harold Beeson
NASA White Sands Test Facility
Las Cruces, New Mexico
USA
 
I am not the David Hirsch who wrote this research paper, I am another David Hirsch.
Research on “implicit bias” suggests that people can act on the basis of prejudice and stereotypes without intending to do so. While psychologists in the field of “implicit social cognition” study consumer products, self-esteem, food, alcohol, political values, and more, the most striking and well-known research has focused on implicit biases toward members of socially stigmatized groups, such as African-Americans, women, and the LGBTQ community.[1] For example, imagine Frank, who explicitly believes that women and men are equally suited for careers outside the home. Despite his explicitly egalitarian belief, Frank might nevertheless behave in any number of biased ways, from distrusting feedback from female co-workers to hiring equally qualified men over women. Part of the reason for Frank’s discriminatory behavior might be an implicit gender bias. Psychological research on implicit bias has grown steadily (§1), raising metaphysical (§2), epistemological (§3), and ethical questions (§4)

Self-actualization

Self-actualization, in Maslow's hierarchy of needs, is the highest level of psychological development, where personal potential is fully realized after basic bodily and ego needs have been fulfilled.

Self-actualization was coined by the organismic theorist Kurt Goldstein for the motive to realize one's full potential: "the tendency to actualize itself as fully as possible is the basic drive ... the drive of self-actualization."[1] Carl Rogers similarly wrote of "the curative force in psychotherapy – man's tendency to actualize himself, to become his potentialities ... to express and activate all the capacities of the organism."[2]

Implicit Bias

Making people aware of their implicit biases doesn’t usually change minds. But here’s what does work

Science Watch

The pain of social rejection

As far as the brain is concerned, a broken heart may not be so different from a broken arm

Belongingness

Belongingness is the human emotional need to be an accepted member of a group. Whether it is family, friends, co-workers, a religion, or something else, some people tend to have an 'inherent' desire to belong and be an important part of something greater than themselves. This implies a relationship that is greater than simple acquaintance or familiarity.

Belonging is a strong feeling that exists in human nature.[1] To belong or not to belong is a subjective experience that can be influenced by a number of factors within ourselves and our surrounding environment.[1]

Roy Baumeister and Mark Leary argue that belongingness is such a fundamental human motivation that we feel severe consequences for not belonging. Were it not so fundamental then lacking a sense of belonging would not have such dire consequences for us. This desire is so universal that the need to belong is found across all cultures and different types of people.[2]

Active listening can help create the feeling of belonging.

How Does Implicit Bias Influence Behavior?

Explanations and Impacts of Unconscious Bias

Please stop mistaking me with other people named David Hirsch.

Doppelgänger

See the Person

Even though it's, everyone longs to be seen, to be known.

We all have 'planks' in our eyes to some degree.
OMG, will you please stop mistaking me for that other David Hirsch? 

Magnetic flux quantum

phonons travel the opposite direction to electrons with the delivery of convection heat

Lattice Boltzmann modeling of the effective thermal conductivity for fibrous materials

Moran Wang †,1 , Jihuan He 2,3 , Jianyong Yu2 ,Ning Pan

Reinforcing Mechanisms of Coir Fibers in Light-Weight Aggregate Concrete

Lambda architecture

Lambda architecture is a data-processing architecture designed to handle massive quantities of data by taking advantage of both batch and stream-processing methods. This approach to architecture attempts to balance latency, throughput, and fault-tolerance by using batch processing to provide comprehensive and accurate views of batch data, while simultaneously using real-time stream processing to provide views of online data. The two view outputs may be joined before presentation. The rise of lambda architecture is correlated with the growth of big data, real-time analytics, and the drive to mitigate the latencies of map-reduce.[1]

Lambda architecture depends on a data model with an append-only, immutable data source that serves as a system of record.[2]: 32  It is intended for ingesting and processing timestamped events that are appended to existing events rather than overwriting them. State is determined from the natural time-based ordering of the data. 

Process calculus

In computer science, the process calculi (or process algebras) are a diverse family of related approaches for formally modelling concurrent systems. Process calculi provide a tool for the high-level description of interactions, communications, and synchronizations between a collection of independent agents or processes. They also provide algebraic laws that allow process descriptions to be manipulated and analyzed, and permit formal reasoning about equivalences between processes (e.g., using bisimulation). Leading examples of process calculi include CSP, CCS, ACP, and LOTOS.[1] More recent additions to the family include the π-calculus, the ambient calculus, PEPA, the fusion calculus and the join-calculus.

In theoretical computer science, the π-calculus (or pi-calculus) is a process calculus. The π-calculus allows channel names to be communicated along the channels themselves, and in this way it is able to describe concurrent computations whose network configuration may change during the computation.

The π-calculus has few terms and is a small, yet expressive language (see § Syntax). Functional programs can be encoded into the π-calculus, and the encoding emphasises the dialogue nature of computation, drawing connections with game semantics. Extensions of the π-calculus, such as the spi calculus and applied π, have been successful in reasoning about cryptographic protocols. Beside the original use in describing concurrent systems, the π-calculus has also been used to reason about business processes[1] and molecular biology.[2]

Lambda calculus (also written as λ-calculus) is a formal system in mathematical logic for expressing computation based on function abstraction and application using variable binding and substitution. It is a universal model of computation that can be used to simulate any Turing machine.

lambda process for the data

How to Use Python Lambda Functions

Function composition (computer science)

The company says that its quantum computer is the first to perform a
calculation that would be practically impossible for a classical machine.
 
magnetic fiber
fluxon
class
order
genus

Fluxon

Heat flux

Magnetic flux quantum

Hopf fibration

Composite Reinforcement by Magnetic Control of Fiber Density and Orientation

  • Omri Goldberg*
  • Israel Greenfeld
  • , and 
  • H. Daniel Wagner*

Austin Texas is the live music capital of the world,

Lab:

Arduino to Digital Audio Workstation

Introduction

This lab covers the process of taking MIDI messages sent from the Arduino and creating sound with them via a Digital Audio Workstation (DAW) such as Ableton LIVE, Logic or Garageband.

Calculations

Digital audio workstation

Who is ready to innovate?

Taking the guesswork out of twistronics

New model explores the design space of twisted 2D materials

Are you ready to play game theory and innovate?
Enjoy your 'ah-hah' magnetic moments with those

'phonons traveling opposite direction to electrons with the delivery of convection heat'

Magnetic alignment and patterning of cellulose fibers


Has anyone noticed the global heat waves and considered applying their education networking innovations?
In mathematics, specifically in algebraic geometry, the fiber product of schemes is a fundamental construction. It has many interpretations and special cases. For example, the fiber product describes how an algebraic variety over one field determines a variety over a bigger field, or the pullback of a family of varieties, or a fiber of a family of varieties.

DFT matrix

Quark and gluon fields and color charges

Divisor function

Klein–Gordon equation

Electromagnetic interaction

Heat does not come in different colours: entropy-enthalpy compensation, free energy windows, quantum confinement, pressure perturbation calorimetry, solvation and the multiple causes of heat capacity effects in biomolecular interactions

Geometry of color perception. Part 2: perceived colors from real quantum states and Hering’s rebit

Quantum thermodynamics of single particle systems

Boltzmann's entropy formula

I am applying my college education soliciting interstate teaming arrangement to serve our union of states U.S. and Global charters with Israel and to keep Austin weird.

Fiber (mathematics)

Fiber in algebraic geometry

Fibers in topology

...A function between topological spaces is (sometimes) called a proper map if every fiber is a compact subspace of its domain. However, many authors use other non-equivalent competing definitions of "proper map" so it is advisable to always check how a particular author defines this term. A continuous closed surjective function whose fibers are all compact is called a perfect map.

Kernel (linear algebra)

Decompositions related to solving systems of linear equations

Linear and nonlinear equations

A PDE is called linear if it is linear in the unknown and its derivatives.

Some results involving geodesic curvature

Heat equation

In mathematics and physics, the heat equation is a certain partial differential equation. Solutions of the heat equation are sometimes known as caloric functions. The theory of the heat equation was first developed by Joseph Fourier in 1822 for the purpose of modeling how a quantity such as heat diffuses through a given region.

As the prototypical parabolic partial differential equation, the heat equation is among the most widely studied topics in pure mathematics, and its analysis is regarded as fundamental to the broader field of partial differential equations. The heat equation can also be considered on Riemannian manifolds, leading to many geometric applications. Following work of Subbaramiah Minakshisundaram and Åke Pleijel, the heat equation is closely related with spectral geometry. A seminal nonlinear variant of the heat equation was introduced to differential geometry by James Eells and Joseph Sampson in 1964, inspiring the introduction of the Ricci flow by Richard Hamilton in 1982 and culminating in the proof of the Poincaré conjecture by Grigori Perelman in 2003. Certain solutions of the heat equation known as heat kernels provide subtle information about the region on which they are defined, as exemplified through their application to the Atiyah–Singer index theorem.[1]

The heat equation, along with variants thereof, is also important in many fields of science and applied mathematics. In probability theory, the heat equation is connected with the study of random walks and Brownian motion via the Fokker–Planck equation. The Black–Scholes equation of financial mathematics is a small variant of the heat equation, and the Schrödinger equation of quantum mechanics can be regarded as a heat equation in imaginary time. In image analysis, the heat equation is sometimes used to resolve pixelation and to identify edges. Following Robert Richtmyer and John von Neumann's introduction of "artificial viscosity" methods, solutions of heat equations have been useful in the mathematical formulation of hydrodynamical shocks. Solutions of the heat equation have also been given much attention in the numerical analysis literature, beginning in the 1950s with work of Jim Douglas, D.W. Peaceman, and Henry Rachford Jr.

Mimicking the way the Sun produces energy by Understanding the fabric of protein crystals, SBIR Arizona - Texas Contractor Team Arrangements

Uri Itai advised an EDA process of material database to develop a feasibility study. 

The Materials Project

Harnessing the power of supercomputing and state-of-the-art methods, the Materials Project provides open web-based access to computed information on known and predicted materials as well as powerful analysis tools to inspire and design novel materials.

The 2020 Quantum Materials Roadmap

The 2021 quantum materials roadmap

2022 Roadmap for Materials for QuantumTechnologies

Quantum wire 

Various heat transfer mechanisms exist, including convection, conduction, thermal radiation, and evaporative cooling.
Exploratory Data Analysis refers to the critical process of performing initial investigations on data so as to discover patterns,to spot anomalies,to test hypothesis and to check assumptions with the help of summary statistics and graphical representations.

What is Exploratory Data Analysis?

Spectral decomposition is any of several things:

Heat transfer physics

Heat transfer physics describes the kinetics of energy storage, transport, and energy transformation by principal energy carriers: phonons (lattice vibration waves), electrons, fluid particles, and photons.
the movement caused within a fluid by the tendency of hotter and therefore less dense material to rise, and colder, denser material to sink under the influence of gravity, which consequently results in transfer of heat.

Thermal conduction

The objects introduced by Schubert are the Schubert cells, which are locally closed sets in a Grassmannian defined by conditions of incidence of a linear subspace in projective space with a given flag. For details see Schubert variety.

Geothermal heat pipe can be a good alternative to replace ground-loop heat exchanger for heating purpose. The energy saving potential using heat pipe as ground heat exchanger was investigated by comparing the energy consumption and COP of three types ground source heat pump.

Decompositions related to solving systems of linear equations

In conduction and convection, heat is transferred by movement of electrons, vibrational energy, and collisions of molecules and atoms, not by photons. In heat transfer by radiation, photons do carry the energy

Photon energy upconversion through thermal radiation with the power efficiency reaching 16%

When you're hot, you're hot. The heat equation is among the most widely studied topics in pure mathematics!

When the matter is heated does the photon absorbed by electrons of atoms or by atoms themself?

Reciprocal lattice

Heat flux

Householder transformation

In linear algebra, a Householder transformation (also known as a Householder reflection or elementary reflector) is a linear transformation that describes a reflection about a plane or hyperplane containing the origin. The Householder transformation was used in a 1958 paper by Alston Scott Householder.[1]

Its analogue over general inner product spaces is the Householder operator.

The quantum refrigerator

Date:
July 29, 2021
Source:
Vienna University of Technology
Summary:
By combining quantum theory and thermodynamics, it is possible to design a new kind of atomic refrigerator, which can cool down extremely cold Bose-Einstein-condensates even further.

Lattice energy and lattice enthalpy

Peltier effect, the cooling of one junction and the heating of the other when electric current is maintained in a circuit of material consisting of two dissimilar conductors; the effect is even stronger in circuits containing dissimilar semiconductors.

Thermoelectric effect

Air conditioning systems are the ones that account for almost 20% of the electricity that is used in Texas.

Quantum engineering

According to the Second Law of Thermodynamics, heat will always flow spontaneously from hot to cold, and never the other way around. A refrigerator causes heat to flow from cold to hot by inputting work, which cools the space inside the refrigerator

Thermoelectric cooling

Innovations in refrigeration may be manufactured for building materials for Net Zero buildings.

A superlattice is a periodic structure of layers of two (or more) materials. Typically, the thickness of one layer is several nanometers. It can also refer to a lower-dimensional structure such as an array of quantum dots or quantum wires.

Houstonians spend 27 percent of family energy budget on air conditioning

Household Energy Use in Texas
A closer look at residential energy consumption

The second laws of quantum thermodynamics
The second law of thermodynamics tells us which state transformations are so statistically unlikely that they are effectively forbidden. Its original formulation, due to Clausius, states that "Heat can never pass from a colder to a warmer body without some other change, connected therewith, occurring at the same time".

applied critical thinking

Heat transfer physics

Half-metal

It is conventional to refer to the majority spin as "spin up" while the minority spin is "spin down."


Because most transport properties depend on the density of states near the Fermi level, the spin asymmetry in the density of states allows ferromagnets to generate, manipulate, and detect spin.
A.J.H. MCGAUGHEY1and M. KAVIANY

Magnetic flow meter

 Magnetohydrodynamics

Magnetic hysteresis

Magnetic reconnection

Understanding and Designing the Spin-Driven Thermoelectrics* Md Mobarak Hossain Polash,1,2 Duncan Moseley,3 Junjie Zhang,3, Raphaël P. Hermann,3 Daryoosh
Vashaee1,2

Classes of Magnetic Materials

What are the 4 magnetic materials? Some of the metals that are magnetic include iron, cobalt, nickel and some alloys of rare-earth metals. These magnetic materials will come under three categories namely permanent magnets, electromagnets and neodymium magnets. When we talk about magnets, it is mostly about permanent magnets
Good thermoelectric materials are heavily doped semiconductors with a Seebeck coefficient in the range 150–250 µV K-1. Empirically, the electrical resistivity tends to be in the range 0.5–3 mO cm at suitable values of the carrier concentration

Thermoelectric Properties of Single Crystal EuBiSe3 Fiber

Aluminum is cheaper

Fabrication of aluminum alloy functionally graded material using directional solidification under an axial static magnetic field

Econophysics

What are the best thermoelectric materials?

Bismuth telluride alloys are the best room-temperature thermoelectric materials known today but they are costly because of the large amounts of expensive tellurium they contain

Inexpensive thermoelectric material works at room temperature

Windows may be designed to generate electricity. Along with Roof tiles and bricks that are designed with thermoelectricity

Transparent Power-Generating Windows Based on Solar-Thermal-Electric Conversion

In building design, thermal mass is a property of the mass of a building which enables it to store heat, providing "inertia" against temperature fluctuations. It is sometimes known as the thermal flywheel effect.[1] For example, when outside temperatures are fluctuating throughout the day, a large thermal mass within the insulated portion of a house can serve to "flatten out" the daily temperature fluctuations, since the thermal mass will absorb thermal energy when the surroundings are higher in temperature than the mass, and give thermal energy back when the surroundings are cooler, without reaching thermal equilibrium. This is distinct from a material's insulative value, which reduces a building's thermal conductivity, allowing it to be heated or cooled relatively separately from the outside, or even just retain the occupants' thermal energy longer.

Scientifically, thermal mass is equivalent to thermal capacitance or heat capacity, the ability of a body to store thermal energy. It is typically referred to by the symbol Cth, and its SI unit is J/°C or J/K (which are equivalent). Thermal mass may also be used for bodies of water, machines or machine parts, living things, or any other structure or body in engineering or biology. In those contexts, the term "heat capacity" is typically used instead.

See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/257830702
Heat moves naturally by any of three means.

The processes are known as conduction, convection and radiation.
Convection Heat travels in the opposite direction as electrons in a random or drunkard walk through a material channel source to the drain.

Matter wave

de Broglie relations

According to wave-particle duality, the De Broglie wavelength is a wavelength manifested in all the objects in quantum mechanics which determines the probability density of finding the object at a given point of the configuration space. The de Broglie wavelength of a particle is inversely proportional to its momentum. 

Dramatically Improved Thermoelectric Properties by Defect Engineering in Cement-Based Composites

Woven nanotube fibers turn heat into power

Tessellation

A tessellation or tiling is the covering of a surface, often a plane, using one or more geometric shapes, called tiles, with no overlaps and no gaps. In mathematics, tessellation can be generalized to higher dimensions and a variety of geometries.

A periodic tiling has a repeating pattern. Some special kinds include regular tilings with regular polygonal tiles all of the same shape, and semiregular tilings with regular tiles of more than one shape and with every corner identically arranged. The patterns formed by periodic tilings can be categorized into 17 wallpaper groups. A tiling that lacks a repeating pattern is called "non-periodic". An aperiodic tiling uses a small set of tile shapes that cannot form a repeating pattern. A tessellation of space, also known as a space filling or honeycomb, can be defined in the geometry of higher dimensions.

A real physical tessellation is a tiling made of materials such as cemented ceramic squares or hexagons. Such tilings may be decorative patterns, or may have functions such as providing durable and water-resistant pavement, floor or wall coverings. Historically, tessellations were used in Ancient Rome and in Islamic art such as in the Moroccan architecture and decorative geometric tiling of the Alhambra palace. In the twentieth century, the work of M. C. Escher often made use of tessellations, both in ordinary Euclidean geometry and in hyperbolic geometry, for artistic effect. Tessellations are sometimes employed for decorative effect in quilting. Tessellations form a class of patterns in nature, for example in the arrays of hexagonal cells found in honeycombs.

Serenity Sells Thermoelectric roof tile theories with mathematical tile conjectures:
 

Hajós's theorem

Thermoelectricity means the direct conversion of heat into electric energy, or vice versa. The term is generally restricted to the irreversible conversion of electricity into heat described by the English physicist James P.

Laplace's demon


Mappings between total spaces of fiber bundles that "commute" with the projection maps are known as bundle maps, and the class of fiber bundles forms a category with respect to such mappings.

Geometrical frustration

An argument is a set of statements (called premises) that work together to support another statement (the conclusion). 

Argument Clinic - Monty Python - The Secret Policeman's Balls

 
Marijuana is still listed as a Schedule I drug under the federal Controlled Substances Act, which means it is deemed to have a high potential for abuse and no medical value. The MORE Act would deschedule marijuana, remove criminal sanctions and provide some relief for past convictions.

House Passes Cannabis Law as Support for Legalization Grows


Griner has been detained in Russia since February after customs allegedly found vape cartridges containing hashish oil (marijuana concentrate) in her luggage. She is currently in the middle of trial and has pled guilty to drug charges.


In February, she was arrested at Sheremetyevo International Airport near Moscow after arriving from New York. Russian officials claimed she had vape cartridges containing hashish oil in her luggage, a charge that can come with up to 10 years in prison.

1943: Albert Hofmann accidentally discovers the psychedelic properties of LSD.

Also in 1943, the Manhattan Project, and the atomic bomb itself were discovered/innovated.

Spotlight effect

Ketamine is a legal alternative in Texas for immediate relief of depression.

'A Really Good Day' Recaps A Month-Long Adventure Of Microdosing LSD

Microdosing A Really Good Day: Ayelet Waldman

However, former patients have publicly testified that ECT can result in a very significant (>30 point) permanent decrement in IQ score (Food and Drug Administration, 1982; Andre, 2001; Cott, 2005: p. 5) and have documented the claims by extensive neuropsychological evaluation.

Memory and cognitive effects of ECT: informing and assessing patients

Houston Ketamine Center - Depression Infusion Treatment

4543 Post Oak Pl Dr UNIT 123, Houston, TX 77027

Douglas Carl Engelbart (January 30, 1925 – July 2, 2013) was an engineer and inventor, and an early computer and Internet pioneer. He is best known for his work on founding the field of human–computer interaction, particularly while at his Augmentation Research Center Lab in SRI International, which resulted in creation of the computer mouse, and the development of hypertext, networked computers, and precursors to graphical user interfaces. These were demonstrated at The Mother of All Demos in 1968. Engelbart's law, the observation that the intrinsic rate of human performance is exponential, is named after him.

NLS, the "oN-Line System," developed by the Augmentation Research Center under Engelbart's guidance with funding primarily from ARPA (as DARPA was then known), demonstrated numerous technologies, most of which are now in widespread use; it included the computer mouse, bitmapped screens, hypertext; all of which were displayed at "The Mother of All Demos" in 1968. The lab was transferred from SRI to Tymshare in the late 1970s, which was acquired by McDonnell Douglas in 1984, and NLS was renamed Augment (now the Doug Engelbart Institute).[6] At both Tymshare and McDonnell Douglas, Engelbart was limited by a lack of interest in his ideas and funding to pursue them, and retired in 1986.

In 1988, Engelbart and his daughter Christina launched the Bootstrap Institute – later known as The Doug Engelbart Institute – to promote his vision, especially at Stanford University; this effort did result in some DARPA funding to modernize the user interface of Augment. In December 2000, United States President Bill Clinton awarded Engelbart the National Medal of Technology, the U.S.'s highest technology award. In December 2008, Engelbart was honored by SRI at the 40th anniversary of the "Mother of All Demos".

LSD, Mind Control, and the Internet: A Chronology

From Counterculture to Cyberculture

Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism

Fred Turner

Programming on LSD

Might Microdosing Psychedelics Be Safe and Beneficial? An Initial Exploration

The Remarkable Results of Microdosing: James Fadiman

Twenty percent better with 20 micrograms? A qualitative study of psychedelic microdosing self-rapports and discussions on YouTube

Microdosing
Improving performance enhancement in intelligence analysis
by Maj Emre Albayrak

Attention (machine learning)

In neural networks, attention is a technique that mimics cognitive attention. The effect enhances some parts of the input data while diminishing other parts — the motivation being that the network should devote more focus to the small, but important, parts of the data. Learning which part of the data is more important than another depends on the context, and this is trained by gradient descent.

Attention-like mechanisms were introduced in the 1990s under names like multiplicative modules, sigma pi units, and hypernetworks.[1] Its flexibility comes from its role as "soft weights" that can change during runtime, in contrast to standard weights that must remain fixed at runtime. Uses of attention include memory in neural Turing machines, reasoning tasks in differentiable neural computers,[2] language processing in transformers, and multi-sensory data processing (sound, images, video, and text) in perceivers.[3][4][5][6]

It takes up to 27 seconds to regain full attention after issuing voice commands, University of Utah researchers found in a pair of new studies for the AAA Foundation for Traffic Safety.
 

There have been many cases of breakthrough innovations with microdosing.

LSD Micro-Doses Unleash Creativity, Problem-Solving For Bay Area Professionals

  With Freedom comes Responsibility, Intention counts with Set and Setting.
We may design a knowledge-graph based approach for data discovery, extraction, and integration in materials science

Harmonic map

Spectral geometry is a field in mathematics which concerns relationships between geometric structures of manifolds and spectra of canonically defined differential operators. The case of the Laplace–Beltrami operator on a closed Riemannian manifold has been most intensively studied, although other Laplace operators in differential geometry have also been examined. The field concerns itself with two kinds of questions: direct problems and inverse problems.

Inverse problems seek to identify features of the geometry from information about the eigenvalues of the Laplacian. One of the earliest results of this kind was due to Hermann Weyl who used David Hilbert's theory of integral equation in 1911 to show that the volume of a bounded domain in Euclidean space can be determined from the asymptotic behavior of the eigenvalues for the Dirichlet boundary value problem of the Laplace operator. This question is usually expressed as "Can one hear the shape of a drum?", the popular phrase due to Mark Kac. A refinement of Weyl's asymptotic formula obtained by Pleijel and Minakshisundaram produces a series of local spectral invariants involving covariant differentiations of the curvature tensor, which can be used to establish spectral rigidity for a special class of manifolds. However as the example given by John Milnor tells us, the information of eigenvalues is not enough to determine the isometry class of a manifold (see isospectral). A general and systematic method due to Toshikazu Sunada gave rise to a veritable cottage industry of such examples which clarifies the phenomenon of isospectral manifolds.

Direct problems attempt to infer the behavior of the eigenvalues of a Riemannian manifold from knowledge of the geometry. The solutions to direct problems are typified by the Cheeger inequality which gives a relation between the first positive eigenvalue and an isoperimetric constant (the Cheeger constant). Many versions of the inequality have been established since Cheeger's work (by R. Brooks and P. Buser for instance).

Fibered manifold

See also

Bloch's theorem

So the weird Austin idea is a thermoelctric brick that converts heat to energy and to build a home out of it for a net zero building.

Electronic band structure

Crystalline symmetry and wavevectors


Machine learning

Computational Materials Science

Computational Materials Modeling Database

Computational Materials Modeling Database

FiPy is an object oriented, partial differential equation solver, written in Python based on a standard finite volume approach. https://www.ctcms.nist.gov/fipy/index.html

the prototypical parabolic partial differential equation, the heat equation is among the most widely studied topics in pure mathematics, and its analysis is regarded as fundamental to the broader field of partial differential equations. The heat equation can also be considered on Riemannian manifolds, leading to many geometric applications. Following work of Subbaramiah Minakshisundaram and Åke Pleijel, the heat equation is closely related with spectral geometry. A seminal nonlinear variant of the heat equation was introduced to differential geometry by James Eells and Joseph Sampson in 1964, inspiring the introduction of the Ricci flow by Richard Hamilton in 1982 and culminating in the proof of the Poincaré conjecture by Grigori Perelman in 2003. Certain solutions of the heat equation known as heat kernels provide subtle information about the region on which they are defined, as exemplified through their application to the Atiyah–Singer index theorem.[1]

The heat equation, along with variants thereof, is also important in many fields of science and applied mathematics. In probability theory, the heat equation is connected with the study of random walks and Brownian motion via the Fokker–Planck equation. The Black–Scholes equation of financial mathematics is a small variant of the heat equation, and the Schrödinger equation of quantum mechanics can be regarded as a heat equation in imaginary time. In image analysis, the heat equation is sometimes used to resolve pixelation and to identify edges. Following Robert Richtmyer and John von Neumann's introduction of "artificial viscosity" methods, solutions of heat equations have been useful in the mathematical formulation of hydrodynamical shocks. Solutions of the heat equation have also been given much attention in the numerical analysis literature, beginning in the 1950s with work of Jim Douglas, D.W. Peaceman, and Henry Rachford Jr.

Materials Data Curation System provides a means for capturing, sharing, and transforming materials data into a structured format that is XML-based and amenable to transformation to other formats. https://github.com/usnistgov/MDCS ; https://github.com/MDCS-community

Thermoelectric generator

A thermoelectric generator (TEG), also called a Seebeck generator, is a solid state device that converts heat flux (temperature differences) directly into electrical energy through a phenomenon called the Seebeck effect[1] (a form of thermoelectric effect). Thermoelectric generators function like heat engines, but are less bulky and have no moving parts. However, TEGs are typically more expensive and less efficient.[2]

Thermoelectric generators could be used in power plants to convert waste heat into additional electrical power and in automobiles as automotive thermoelectric generators (ATGs) to increase fuel efficiency. Radioisotope thermoelectric generators use radioisotopes to generate the required temperature difference to power space probes.[2]

Photon upconversion

Optical fiber

Power transmission

In building design, thermal mass is a property of the mass of a building which enables it to store heat, providing "inertia" against temperature fluctuations. It is sometimes known as the thermal flywheel effect.[1] For example, when outside temperatures are fluctuating throughout the day, a large thermal mass within the insulated portion of a house can serve to "flatten out" the daily temperature fluctuations, since the thermal mass will absorb thermal energy when the surroundings are higher in temperature than the mass, and give thermal energy back when the surroundings are cooler, without reaching thermal equilibrium. This is distinct from a material's insulative value, which reduces a building's thermal conductivity, allowing it to be heated or cooled relatively separately from the outside, or even just retain the occupants' thermal energy longer.

Scientifically, thermal mass is equivalent to thermal capacitance or heat capacity, the ability of a body to store thermal energy. It is typically referred to by the symbol Cth, and its SI unit is J/°C or J/K (which are equivalent). Thermal mass may also be used for bodies of water, machines or machine parts, living things, or any other structure or body in engineering or biology. In those contexts, the term "heat capacity" is typically used instead.
Quasicrystal Tilings in Three Dimensions and Their Empires
Dugan Hammock * , Fang Fang and Klee Irwin
Quantum Gravity Research, Los Angeles, CA 90290, USA; Fang@quantumgravityresearch.org (F.F.);
Klee@quantumgravityresearch.org (K.I.)

Quantum acoustics

In physics, quantum acoustics is the study of sound under conditions such that quantum mechanical effects are relevant. For most applications, classical mechanics are sufficient to accurately describe the physics of sound. However very high frequency sounds, or sounds made at very low temperatures may be subject to quantum effects.

Quantum acoustics [1] can also refer to attempts within the scientific community to couple superconducting qubits to acoustic waves.[2] One particularly successful method involves coupling a superconducting qubit with a Surface Acoustic Wave (SAW) Resonator and placing these components on different substrates to achieve a higher signal to noise ratio as well as controlling the coupling strength of the components. This allows quantum experiments to verify that the phonons within the SAW Resonator are in quantum fock states by using Quantum tomography.[3] Similar attempts have been made by using bulk acoustic resonators.[4] One consequence of these developments is that it is possible to explore the properties of atoms with a much larger size than found conventionally by modelling them using a superconducting qubit coupled with a SAW Resonator.[5]

Austin is known as the Live Music Capital of the World

Serenity Sells DBA SBIR Innovating Energy Manufacturing

Whittle likelihood

SBIR/STTR Firm Details

Omega Optics, Inc.

Firm Information
Name: Omega Optics, Inc.
Address: 8500 Shoal Creek Boulevard, Building 4, Suite 200
City/State/Zip: Austin, Texas, 78757
Phone: (512) 996-8833
Official Name: Gloria Chen
https://www.lua.org/community.html

Open-source software development

IBM

Quantum computing and cybersecurity: How to capitalize on opportunities and sidestep risks

Large-scale quantum computers will create new opportunities for improving cybersecurity but can also create exposures. Organizations can start preparing today.

Quantum computing brings new security risks: How to protect yourself

Qiskit

Qiskit is an open-source software development kit (SDK) for working with quantum computers at the level of circuits, pulses, and algorithms. It provides tools for creating and manipulating quantum programs and running them on prototype quantum devices on IBM Quantum Experience or on simulators on a local computer. It follows the circuit model for universal quantum computation, and can be used for any quantum hardware (currently supports superconducting qubits and trapped ions[4]) that follows this model.

Qiskit was founded by IBM Research to allow software development for their cloud quantum computing service, IBM Quantum Experience.[5][6] Contributions are also made by external supporters, typically from academic institutions.[7][8]

The primary version of Qiskit uses the Python programming language. Versions for Swift[9] and JavaScript[10] were initially explored, though the development for these versions have halted. Instead, a minimal re-implementation of basic features is available as MicroQiskit,[11] which is made to be easy to port to alternative platforms.

A range of Jupyter notebooks are provided with examples of quantum computing being used.[12] Examples include the source code behind scientific studies that use Qiskit,[13] as well as a set of exercises to help people to learn the basics of quantum programming. An open source textbook based on Qiskit is available as a university-level quantum algorithms or quantum computation course supplement.[14]

Installing Qiskit

A Marketer's Guide To Competitive Intelligence

Written by Martina Bretous

Qubit

How Quantum Computers Work

By: Kevin Bonsor & Jonathan Strickland

Microsoft Azure

It's the fundamental unit of information in quantum computing

Using Python skills to learn Quantum Computing!

A Quantum Circuit Simulator in 27 Lines of Python ·

Grover's algorithm

Grover’s Algorithm — In Python!

Shor's algorithm

IBM Shor’s algorithm

Quantum Threat to Blockchains: Shor’s and Grover’s Algorithms

Here are 74 public repositories matching this topic...

Classical NOT logic gates with quantum circuit using Qiskit in Python

Microsoft Azure

Tutorial: Write and simulate qubit-level programs in Q#

Google

An open source framework for programming quantum computers

QuTiP

Quantum Toolbox in Python

Code walkthrough on a classical and quantum computer.

Brave Robot is a brand of vegan ice cream made using Perfect Day's synthesized milk proteins.[2][3] It has no lactose, but does include synthetic molecules reproducing those found in milk. The ice cream comes in 8 flavors: Raspberry White Truffle, Blueberry Pie, A Lot of Chocolate, Peanut Butter 'n Fudge, Hazelnut Chocolate Chunk, Buttery Pecan, Vanilla 'n Cookies, and Vanilla.[4]

Spherical cow

The spherical cow is a humorous metaphor for highly simplified scientific models of complex phenomena.[1][2] Originating in theoretical physics, the metaphor refers to physicists' tendency to reduce a problem to the simplest form imaginable in order to make calculations more feasible, even if the simplification hinders the model's application to reality.

The metaphor and variants have subsequently been used in other disciplines

Segmented filamentous bacteria

Holy!.


Steely Dan - Black Cow - (Aja, 1977)

number theory

Graduate Student’s Side Project Proves Prime Number Conjecture

Jared Duker Lichtman, 26, has proved a longstanding conjecture relating prime numbers to a broad class of “primitive” sets. To his adviser, it came as a “complete shock.”

5 planets are lining up in the night sky this month

DoD Open Source Software

Hey Diddle Diddle

"The Cow Jumped Over the Moon"

Give cows a break

There's a better 'whey' to make dairy.

 

The profitable business of war

Three new books about allegations that the president's grandfather helped the Nazis and a related $40 billion legal action by two Holocaust survivors raise uncomfortable issues for the Bush campaign.

By Duncan Campbell - Ben Aris

Published September 27, 2004

War Is A Racket
By Major General Smedley Butler

Venona project

In 1919 Bush was introduced by W. Averell Harriman to his business partner, George Herbert Walker. Later that year, Bush was introduced to Walker's daughter, Dorothy. The couple married in August, 1921. Bush and his new wife moved to Columbus, Ohio, and went to work for his father's family business.

In 1926, Bush's father-in-law, appointed him vice-president of W. A. Harriman & Company. This company had made considerable investments in Germany. At the end of the war, the commercial steamships of Hamburg-Amerika were confiscated by the United States government. As the authors of George Bush: The Unauthorized Biography have pointed out: "These ships had then become the property of the Harriman enterprise, by some arrangements with the U.S. authorities that were never made public." In doing so, Harriman created the world's largest private shipping line.

Samuel Pryor, the chairman of Remington Arms, and George Herbert Walker, both became directors of the American Ship and Commerce Company, Harriman's shipping front organization. Walker and Harriman set up their European headquarters in Berlin. With the help of the Warburg Bank, W. A. Harriman began to invest heavily in German industry.

In 1926 Prescott Bush became vice president of W. A. Harriman & Company. Soon afterwards the company expanded into the Soviet Union. After negotiations with Leon Trotsky and Felix Dzerzhinsky, Harriman obtained a contract to mine manganese. In 1927 the company was criticized for its support of totalitarian governments in Italy and the Soviet Union. George Herbert Walker wrote to W. Averell Harriman pointing out that "the suggestion... that we withdraw from Russia smacks some what of the impertinent.. I think that we have drawn our line and should hew to it" (11th August, 1927).

W. Averell Harriman also formed a partnership with the German industrialist, Fritz Thyssen. In 1926 Harriman and Clarence Dillon of Dillon Read Company helped Thyssen and Friedrich Flick to establish the German Steel Trust. According to Anton Chaitkin: "The Flick-Harriman partnership was directly supervised by Prescott Bush". Dillon Read provided two representatives to the board of the German Steel Trust and took responsibility for its corporate banking.

In 1928 Thyssen formed United Steelworks, a company that controlled more that 75 per cent of Germany's ore reserves and employed 200,000 people. Thyssen started a joint-venture with Harriman called the Union Banking Corporation. This was used to transfer funds between the United States and Germany. In 1931 W.A. Harriman & Company merged with the British-American banking house Brown Brothers. Prescott Bush, along with W. Averell HarrimanE. Roland Harriman and George Herbert Walker, became managing partners in the new company, Brown Brothers Harriman. This was to develop into the most important private banking house in America.

Prescott Bush was appointed as a director of the Harriman Fifteen Corporation. This in turn controlled the Consolidated Silesian Steel Corporation, that owned one-third of a complex of steel-making, coal-mining and zinc-mining activities in Germany and Poland. Friedrich Flick owned the other two-thirds of the operation. Flick was a leading financial supporter of the Nazi Party and in the 1930s donated over seven million marks to the party. A close friend of Heinrich Himmler, Flick also gave the Schutz Staffeinel (SS) 10,000 marks a year.

Fritz Thyssen was also one of the leading backers of the Nazi Party. In 1931 he recruited Hjalmar Schacht to the cause and in November, 1932, the two men joined with other industrialists in signing the letter that urged Paul von Hindenburg to appoint Adolf Hitler as chancellor. This was successful and on 20th February, 1933, they arranged a meeting of the Association of German Industrialists that raised 3 million marks for the Nazi Party in the forthcoming election.

On 27th February, 1933, someone set fire to the Reichstag. Several people were arrested including a leading, Georgi Dimitrov, general secretary of the Comintern, the international communist organization. Dimitrov was eventually acquitted but a young man from the Netherlands, Marianus van der Lubbe, was eventually executed for the crime. As a teenager Lubbe had been a communist and Hermann Goering used this information to claim that the Reichstag Fire was part of a KPD plot to overthrow the government.

Hitler gave orders that all leaders of the German Communist Party should "be hanged that very night." Paul von Hindenburg vetoed this decision but did agree that Hitler should take "dictatorial powers". KPD candidates in the election were arrested and Hermann Goering announced that the Nazi Party planned "to exterminate" German communists. Thousands of members of the Social Democrat Party and Communist Party were arrested and sent to recently opened to concentration camps.

Left-wing election meetings were broken up by the Sturm Abteilung (SA) and several candidates were murdered. Newspapers that supported these political parties were closed down during the 1933 General Election. Although it was extremely difficult for the opposition parties to campaign properly, Hitler and the Nazi party still failed to win an overall victory in the election on 5th March, 1933. The NSDAP received 43.9% of the vote and only 288 seats out of the available 647. The increase in the Nazi vote had mainly come from the Catholic rural areas who feared the possibility of an atheistic Communist government.

After the 1933 General Election Hitler proposed an Enabling Bill that would give him dictatorial powers. Such an act needed three-quarters of the members of the Reichstag to vote in its favour. All the active members of the Communist Party, were in concentration camps, in hiding, or had left the country (an estimated 60,000 people left Germany during the first few weeks after the election). This was also true of most of the leaders of the other left-wing party, Social Democrat Party (SDP). However, Hitler still needed the support of the Catholic Centre Party (BVP) to pass this legislation. Hitler therefore offered the BVP a deal: vote for the bill and the Nazi government would guarantee the rights of the Catholic Church. The BVP agreed and when the vote was taken, only 94 members of the SDP voted against the Enabling Bill.

Soviet Spies: Did They Make a Difference
By Tim Weiner

Fox v. Rothschild 21 Century banking

By David Vincent Bell Hirsch

Thomas H. McKittrick

By David Vincent Bell Hirsch 
The icon of the Theotokos, Multiplier of Wheat, was painted in 1890 in Kaluga, Russia. It was created with the blessing of Saint Ambrose of Optina, who also gave the icon its name. The Theotokos is portrayed as the protectress of farmers. Its feast day is celebrated on the 15th of October

Coat of arms of Russia

1918–93: Soviet and post-Soviet Russia

The coat of arms of the Russian Soviet Federative Socialist Republic (RSFSR) was adopted on 10 July 1918 by the government of the Russian Soviet Federative Socialist Republic (Soviet Union), and modified several times afterwards. It shows wheat as the symbol of agriculture, a rising sun for the future of the Russian nation, the red star (the RSFSR was the last Soviet Republic to include the star in its state emblem, in 1978) as well as the hammer and sickle for the victory of Communism and the "world-wide socialist community of states".

National emblem of Belarus

Talking to my black neighbor about his work out in the fields of Texas sorting wheat

Freekeh

separate wheat from chaff bible
The wheat when first thrashed lies in one heap with chaff and straw, and is after winnowed to separate it; so the faithful are mixed up in one Church with the unfaithful; but persecution comes as a wind, that, tossed by Christ's fan, they whose hearts were separate before, may be also now separated in place.

Matthew 3:12

Rick Perry once wanted to abolish the Energy Department. Trump picked him to run it.

Social Engineering: Low Tech, High Threat

Russia offers foreign debt payment system similar to gas one

Classical Muslim commerce. The systems of contract relied upon by merchants was very effective. Merchants would buy and sell on commission, with money loaned to them by wealthy investors, or a joint investment of several merchants, who were often Muslim, Christian and Jewish.

History of Islamic economics

Hawala

Luther rendered Luke 11:4 as “Forgive us our sins (Suenden) as we forgive all who are indebted (schulden) to us.” Schulden means to “owe” monetarily as well as non-monetarily, continuing the dual senses of forgiveness.
 
Forgive us our debts as we forgive our debtors

Misplaced Blame: Islam, Terrorism and the Origins of Hawala

Edwina A. Thompson 
 
John 10:10
10 The thief comes only to steal and kill and destroy; I have come that they may have life, and have it to the full.

In God We Trust

Perturbation theory 

Linux refers to the kernel of the GNU/Linux operating system. More generally, it refers to the family of derived distributions. Unix refers to the original operating system developed by AT&T. More generally, it refers to family of derived operating systems. Original code developed by Linus and the GNU Foundation.
Job scheduling is the process of allocating system resources to many different tasks by an operating system (OS). The system handles prioritized job queues that are awaiting CPU time and it should determine which job to be taken from which queue and the amount of time to be allocated for the job.

List of Unix commands

 
What are Linux daemons?
In Unix and Linux, a daemon is a program that runs in the background without requiring any user interaction. The file name of a software daemon usually ends in the letter d.Why is it 

Laplace's demon


Why is it called a daemon?
According to Wikipedia: The term was coined by the programmers of MIT's Project MAC. They took the name from Maxwell's demon, an imaginary being from a thought experiment that constantly works in the background, sorting molecules. Unix systems inherited this terminology.

Major Breakthrough Puts Dream of Unlimited, Clean Nuclear Fusion Energy Within Reach

1Oracle ORAchk and Oracle EXAchk Command-Line Options.8 

The Oracle® Autonomous Health Framework (AHF) includes ORAchk, which enables you to audit and validate your Oracle Database Appliance (ODA)

Learning to be an Oracle Database Administrator (DBA)

In a recent forum discussion I wrote down a rough outline of the approach I think people should take to become a competent DBA. This article represents my thoughts on that matter. Remember, this is only an opinion.

Oracle Tutorial

My favorite courses to learn Oracle Database and PL/SQL for beginners from Udemy, Coursera, Educative, and other online portals.

Install the SQL Server command-line tools sqlcmd and bcp on Linux

mssql-cli command-line query tool for SQL Server (Preview)



Entity–relationship model

Description

PostgreSQL, also known as Postgres, is a free and open-source relational database management system emphasizing extensibility and SQL compliance 
----MySQL

Python Data Types

 

Machine Learning

Getting StartedMean Median ModeStandard DeviationPercentileData DistributionNormal Data DistributionScatter PlotLinear RegressionPolynomial RegressionMultiple RegressionScaleTrain/TestDecision TreeConfusion MatrixHierarchical ClusteringLogistic RegressionGrid SearchCategorical DataK-meansBootstrap AggregationCross ValidationAUC - ROC Curve

Command-line interface

cmd


The vertical bar|, is a glyph with various uses in mathematicscomputing, and typography. It has many names, often related to particular meanings: Sheffer stroke (in logic), pipebaror (literally the word "or"), vbar, and others.[1]

SQL Operators

SQL Keywords Reference

The travelling salesman problem asks the following question: "Given a list of cities and the distances between each pair of cities, what is the shortest possible route that visits each city exactly once and returns to the origin city?

Knapsack problem

Ion trap

Silicon photonics

Majorana Qubits1
Fabian Hassler
Institute for Quantum Information
RWTH Aachen University

Band gap

MOSFET

Quantum graphs

Two-dimensional electron gas

Quantum well

Quantized Energy States

An Introduction to the Transmon Qubit for Electromagnetic Engineers
Thomas E. Roth Member, IEEE, Ruichao Ma, and Weng C. Chew Life Fellow, IEEE

LC circuit

Quantum Wells

Structures called quantum wells are formed by sandwiching a very thin layer of a small-band-gap material between two layers of a wide-band-gap material.

Optimizing quantum control pulses with complex constraints and few variablesthrough Tensorflow
Yao Song,1 Junning Li,2 Yong-Ju Hai,1, 3 Qihao Guo,1 and Xiu-Hao Deng

Qutip

Quantum Optimal Control

Introduction

Quantum logic gate

Ising coupling gates

Electron Phonon Interactions

Length contraction

List of quantum processors

This is a comprehensive catalog of quantum algorithms. If you notice any errors or omissions, please email me at stephen.jordan@microsoft.com. (Alternatively, you may submit a pull request to the repository on github.) Your help is appreciated and will be acknowledged.

Algebraic and Number Theoretic Algorithms

Apache ZooKeeper

Welcome to Apache ZooKeeper™

Apache CouchDB

Apache CouchDB™ lets you access your data where you need it.

Representational state transfer (REST)

Architectural concepts

Apache Spark

Apache Spark is a lightning-fast unified analytics engine for big data and machine learning. It was originally developed at UC Berkeley in 2009.

Wednesday
March 2

Texas Independence Day 2022

Spark Day on Google Open Source Live

Wednesday
March 3

Apache Hadoop

Apache Hadoop is a collection of open-source software utilities that facilitates using a network of many computers to solve problems involving massive amounts of data and computation. It provides a software framework for distributed storage and processing of big data using the MapReduce programming model.

Apache Hadoop YARN – Concepts and Applications

Advancements in YARN Resource
Manager

Konstantinos Karanasos, Arun Suresh, and
Chris Douglas
Microsoft, Washington, DC, USA

Monday
March 14
 
Pi Day 2022 in United States

European Soccer Database 

La Crosse

City in Wisconsin

Lacrosse was an integral part of Native Americans' culture,” says Joe Finn, archivist at the National Lacrosse Hall of Fame and Museum. “It was played to prepare them for war, and it was also a social event where tribes would get together for trade and sport. It was sometimes used to settle disputes."

ABOUT NATIVE AMERICAN GAMES

What Does Actionable Insight Mean?

A Crash Course in Soccer Analytics 

IBM Analytics Engine

What is data analytics engine?

IBM Analytics Engine is a cloud-based service that enables data scientists to rapidly provision, manage, run and retire Apache Hadoop and Apache Spark clusters. The solution is designed to solve the key pain points that organizations currently experience as they try to build up their big data analytics capabilities.  

SOAP terminology

Jakarta SOAP with Attachments (SAAJ; formerly SOAP with Attachments API for Java), as part of Jakarta XML Web Services (JAX-WS), provides a standard way to send XML documents over the Internet from the Jakarta EE platform.

SAAJ enables developers to produce and consume messages conforming to the SOAP 1.1 and 1.2 specifications and SOAP with Attachments note. It can be used as an alternative to JAX-RPC or JAX-WS.

JSON (JavaScript Object Notation)

Data types

Jackson (API)

Datasets

Explore, analyze, and share quality data.

opendatasets 0.1.20 

World Wide Web Consortium (W3C)

Read CSV data quickly into Pandas DataFrames with read_csv

XML

RSS

Web service (WS)

NoSQL

IO tools (text, CSV, HDF5, …)

Software
Requests is a HTTP library for the Python programming language. The goal of the project is to make HTTP requests simpler and more human-friendly. The current version is 2.26.0. Requests is released under the Apache License 2.0. Requests is one of the most popular Python libraries that is not included with Python
Repository
Written inPython
LicenseApache License 2.0
Websiterequests.readthedocs.io Edit this at Wikidata
 
Apache Spark Day

How to get data from local files, databases, APIs and data access libraries into your Python environment

MongoDB

What is MongDB?

IEX Cloud is a platform that makes financial data and services accessible to everyone.

Apache Kafka

Apache Flume

Apache Solr

Apache Impala

Apache Pig

Welcome to Apache Pig!

Office of the Director of National Intelligence

Economic Espionage

Concerning Economic warfare and

ODNI Careers

Career transition from SSI:

WIOA may be interested in how SSI encoders work.

Work Incentives Planning and Assistance (WIPA) Program Evaluation Reports

context

It From Bit: What Did John Archibald Wheeler Get Right—and Wrong?

In a chapter in a forthcoming book, William Dembski explores the strengths and weaknesses of Wheeler’s perspective that the universe is, at bottom, information

It from bit?

Conda (package manager)

conda-forge / packages

Managing packages

The Open Web Application Security Project (OWASP) is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.[4][5]The Open Web Application Security Project (OWASP) provides free and open resources. It is led by a non-profit called The OWASP Foundation. The OWASP Top 10 - 2021 is the published result of recent research based on comprehensive data compiled from over 40 partner organizations.

k-d tree

In computer science, a k-d tree (short for k-dimensional tree) is a space-partitioning data structure for organizing points in a k-dimensional spacek-d trees are a useful data structure for several applications, such as searches involving a multidimensional search key (e.g. range searches and nearest neighbor searches) and creating point cloudsk-d trees are a special case of binary space partitioning trees.

How to Become a Market Disruptor

Coloured Markets in the Soviet Union

Code injection

Code injection is the exploitation of a computer bug that is caused by processing invalid data. The injection is used by an attacker to introduce (or "inject") code into a vulnerable computer program and change the course of execution. The result of successful code injection can be disastrous, for example, by allowing computer viruses or computer worms to propagate.

Code injection vulnerabilities occur when an application sends untrusted data to an interpreter. Injection flaws are most often found in SQLLDAPXPathNoSQL queries, OS commands, XML parsersSMTP headers, program arguments, etc. Injection flaws tend to be easier to discover when examining source code than via testing.[1] Scanners and fuzzers can help find injection flaws.[2]

Injection can result in data loss or corruption, lack of accountability, or denial of access. Injection can sometimes lead to complete host takeover.

Certain types of code injection are errors in interpretation, giving special meaning to user input. Similar interpretation errors exist outside the world of computer science such as the comedy routine Who's on First?. In the routine, there is a failure to distinguish proper names from regular words. Likewise, in some types of code injection, there is a failure to distinguish user input from system commands.

Using package managers

SUBJECT:      Transparency and Open Government

Open government

Just the basics. What is Conda? Why should you use Conda? How do you install Conda?

Open Government:beyond static measures
A paper produced by Involve for the OECD
You can Hack IT Marvin the Paranoid Android!

Understanding and Improving Conda's performance

https://conda-forge.org/
National and Federal Laboratories and Research Centers
ONL provides a coordinated, enduring core of productive science, technology and engineering laboratories, organizations and institutions, which can provide knowledge and technology to secure the nation.
Paul Zielinski, Executive Director of the Federal Laboratory Consortium for Technology Transfer (FLC), where he leads high quality support to over 300 federal agencies, laboratories and research centers to accomplish their joint mission to foster commercialization best practices and accelerate federal technologies out of the labs and into the marketplace.

Mitigation

Kernel DMA Protection (Memory Access Protection) for OEMs

Managing environments

HA! Your problem child resume with closing deal solution set in

Security Assertion Markup Language

Ransomware

An enhanced EAB algorithm to reduce RACH congestion due to IoT traffic in LTE-A networks

Armchair researchers and ordinary citizens are changing the rules of spycraft. Expert Amy Zegart explains how U.S. agencies must adapt.

Aug 17, 2021

conda.api.Solver

Why IT leaders need to be aware of deepfake security risks

While IT security leaders are not yet the target of deepfake attacks, with the increased use of AI, it's important they consider how it can be of harm to the enterprise.

Man-in-the-middle attack

Business Email Compromise Attack Uses a “Man-in-the-Middle” Email Attack to Steal $1M

conda clean

Creating a robust and deterministic machine learning environment with conda and pip-tools

Corporate espionage is entering a new era

Companies need to take it more seriously

spy v. spy
for example
Tuesday, April 23, 2019

Former GE Engineer and Chinese Businessman Charged with Economic Espionage and Theft of GE’s Trade Secrets

Economic Espionage

FBI Launches Nationwide Awareness Campaign

Little green people from outer space
Rick Perry v.

Ernest J. Moniz

Cecil and Ida Green Professor of Physics and Engineering Systems, Post-Tenure
Special Advisor to the MIT President
Current research interests are centered on energy, science and technology, and national security policy.

Ernest Jeffrey MonizGCIH[1] (/mnz/;[2] born December 22, 1944) is an American nuclear physicist and former government official. From May 2013 to January 2017, he served as the 13th United States Secretary of Energy in the Obama Administration. Prior to this, Moniz served as Associate Director for Science in the Office of Science and Technology Policy in the Executive Office of the President of the United States from 1995 to 1997 and Under Secretary of Energy from 1997 to 2001 during the Clinton Administration. He is currently the co-chair and CEO of the Nuclear Threat Initiative (NTI),[3] as well as president and CEO of the Energy Futures Initiative (EFI), a nonprofit organization working on climate and energy technology issues, which he co-founded in 2017.[4]

Moniz, who is one of the founding members of The Cyprus Institute, has served at Massachusetts Institute of Technology (MIT) as the Cecil and Ida Green Professor of Physics and Engineering Systems, Director of the Energy Initiative and Director of the Laboratory for Energy and the Environment.[5] Before his appointment as Secretary of Energy, he served in a variety of advisory capacities, including at BP,[6] General Electric[7] and the King Abdullah Petroleum Studies and Research Center in RiyadhSaudi Arabia.[6]

June 6, 2022 Energy & Environment

Trump picks Rick Perry to lead Energy Department

by Timothy Cama - 12/13/16

Dr. Ernest Moniz

Former Secretary of Energy

The Grid Modernization Initiative (GMI) works across the U.S. Department of Energy (DOE) to create the modern grid of the future. Our extensive, reliable power grid has fueled the nation’s growth since the early 1900s; however, the grid we have today does not have the attributes necessary to meet the demands of the 21st century and beyond.

Grid Modernization

Grid modernization is BPA’s sole key strategic initiative.

The Bonneville Power Administration is a nonprofit federal power marketing administration based in the Pacific Northwest. Although BPA is part of the U.S. Department of Energy, it is self-funding and covers its costs by selling its products and services. BPA markets wholesale electrical power from 31 federal hydroelectric projects in the Northwest, one nonfederal nuclear plant and several small nonfederal power plants. The dams are operated by the U.S. Army Corps of Engineers and the Bureau of Reclamation. The nonfederal nuclear plant, Columbia Generating Station, is owned and operated by Energy Northwest, a joint operating agency of the state of Washington. BPA provides about 28 percent of the electric power used in the Northwest and its resources — primarily hydroelectric — make BPA power nearly carbon free

Grid modernization is BPA’s sole key strategic initiative. This work is essential for the agency to remain the region’s wholesale power provider of choice amidst the changing electric utility landscape. The grid modernization portfolio includes 35 projects designed to increase automation, improve accuracy and enhance visibility into how the federal power and transmission systems are functioning in real time, to ultimately enhance the optimization and reliability of the grid. These projects will enable BPA to leverage new technologies to improve workplace efficiencies and keep pace with the evolving Western electricity market, allowing us and the region to seek new opportunities for marketing power and transmission products and services well into the future.
 
How are grid modernization projects integrated into everyday business at BPA?
 
Through a portfolio framework called Identify, Define, Integrate and Deliver (IDID), project teams are required to identify how the will integrate into existing processes or how they will be launched, and which organizations will be impacted if the project creates new processes or organizations.  

Smart Grid

What is smart grid and what benefits can it bring?

Scrutiny of Rick Perry’s role in Ukraine scandal builds

Photo of James Osborne
James Osborne, Staff writer
Oct. 7, 2019

In 2020, the industrial sector accounted for 36% of total U.S. end-use energy consumption and 33% of total U.S. energy consumption.

Energy use in industry

Solver 

  / conda

Brahmagupta's formula

Durbin h-statistic

Whittle likelihood

SBIR/STTR Firm Details

Vortex engine

Vortex ring

stellarator is a plasma device that relies primarily on external magnets... and  generally looks like a twisted ribbon.

Twist (mathematics)

Twistronics

Ribbon (mathematics)

  • Link is the integer number of turns of the ribbon around its axis;
  • Twist is the rate of rotation of the ribbon around its axis;
  • Writhe is a measure of non-planarity of the ribbon's axis curve.

Moiré pattern

Geometrical approach

Straintronics (from strain and electronics) is the study of how folds and mechanically induced stresses in a layer of two-dimensional materials can change their electrical properties. It is distinct from twistronics in that the latter involves changes in the angle between two layers of 2D material. It is also distinct from, but similar to, the piezoelectric effects which are created by bending, twisting, or squeezing of certain material. 

Ah, pappy, I have strained my tronics artificially cognizing energy manufacturing innovations. Let your wife know it was a labor of love. I call my research 'Stellarator Ribbon knot Bow shock Pi day recipe 2022'. I have designed it with Military Sticker Shock Price Gauge Theory because, you used to work at NASA dad and have you seen the size of the military budget in the U.S.?

Glial cells may take on big jobs in unexpected parts of the body

Integration with BioConda

What Are Python Wheels and Why Should You Care?

Using wheel files with conda

Python Wheels

German–Turkish Treaty of Friendship

Allied Relations and Negotiations With Turkey
A. Turkey’s Neutrality in World War II

Economic warfare

Victory Garden variety of father and son talks

How World War I transformed economic warfare

Today’s sanctions regimes are a central legacy of the Great War

A broken global economy is jacking up prices around the world. Experts say we’ve seen this before: World War I 

Understanding Conda and Pip


Unlike Veterans Day, Memorial Day honors all military members who have died in while serving in U.S. forces.

The holiday was renamed Memorial Day after World War I, and its purpose became to honor all Americans who have died fighting the nation's wars. Since 1971, Memorial Day has been celebrated on the last Monday in May.

Trade war

What Is a Trade War?

Economic Conditions That Helped Cause World War II

John 10:10

TensorFlow

Installation

https://jqplay.org/

Comparison to graphical user interfaces

How to Work With JSON On the Command Line

Java API for JSON Processing

Use containers to Build, Share and Run your applications

U.S. Department of Homeland Security (DHS)


SBA Unveils $3 Million Cybersecurity Pilot Program, as Fraudsters Increasingly Target Smaller Shops

The program will go to just three lucky states, with the promise of more to come.

Standardized, portable packaging for your applications. In physics, a quantum is the minimum amount of any physical entity involved in an interaction. The fundamental notion that a physical property can be "quantized" is referred to as "the hypothesis of quantization".

How to build Conda packages?

Contributing packages

Department of Energy

DOE Announces $12 Million to Enhance Cybersecurity of America's Energy Systems

April 21, 2022

Issue Triage


Analysis-Russia's 'political' debt default sets emerging market precedent

Need to Know

Definition

triage

Triage is the procedure of assigning levels of priority to tasks or individuals to determine the most effective order in which to deal with them.

War, inflation, and a default have dealt emerging market bonds an especially hard blow, and souring sentiment on emerging markets

EXCESSIVE SPECULATIONIN THE WHEAT MARKET
MAJORITY AND MINORITY
STAFF REPORT
The State Emblem of the Russian Soviet Federative Socialist Republic is an image of a sickle and a hammer on a red background in the sun and framed with ears of wheat with the inscription: "RSFSR" and "Proletarians of all countries, unite!" At the top of the emblem is a five-pointed star.

Default risk, commodity shocks and other things investors need to remember as Ukraine war enters new phase

The 'Big Three' of cash management are 'accounts receivable', 'accounts payable' and 'inventory'.

Oil turns negative as OPEC eyes Russia suspension from output deal

Russian Oil, Wheat manufacturing request to India,

There will be a wave of emerging-market defaults, says the investor who seized one of Argentina’s ships

Cash flow hedge

Cash-and-Carry-Arbitrage

Arbitrage breakdown in WTI crude oil futures: An analysis of the events on April 20, 2020
Christopher B. Burns
1, Stephen Kane
Commodity Futures Trading Commission, 1155 21st Street NW, Washington, D.C. 20581

Russia's Gazprom cuts off natural-gas supply to the Netherlands after the Dutch refused to pay in rubles. Denmark could be next.

How to Use an Arbitrage Strategy in Forex Trading?

How Are Futures Used to Hedge a Position?

Oil climbs above $121 a barrel as China eases restrictions, EU meets

PREDICTION OF CURRENCY PAIRS
Statistical relations between
futures and forward contracts

Anna Aronsson and Elsa Kjellén

Bid-Ask Spreads in the Foreign Currency Exchange Market

India asked to supply more than 1.5 mln tonnes wheat

Factbox: Who is buying Russian crude oil and who has stopped

Trade-weighted effective exchange rate index

Bell test

About foreign exchange statistics

The BIS publishes three sets of statistics on foreign exchange markets: US dollar exchange rates, effective exchange rate indices, and spot and derivatives trading.

Quantum Marginal Problems
Economic warfare or economic war is an economic strategy utilized by belligerent nations with the goal of weakening the economy of other states. This is primarily achieved by the use of economic blockades. Ravaging the crops of the enemy is a classic method, used for thousands of years.

Let's talk Turkey Grants for Thanksgiving 2022 with the office of the director of National Intelligence

Turkey’s inflation soars to 73%, a 23-year high, as food and energy costs skyrocket

Istanbul (Not Constantinople)

Northern Trust owns ABA, IRS and Serco owns USPTO

How much the case matters is a question Texas Republicans have, arguably, already answered. Paxton was reelected in 2018 when the felony charges were still making front pages. He is now in reach of winning the nomination again Tuesday in a runoff against Texas Land Commissioner George P.May 23, 2022

SR 11-7:

Guidance on Model Risk Management

What Is Model Risk?

Getting Started with Gym

Gym is a toolkit for developing and comparing reinforcement learning algorithms. It makes no assumptions about the structure of your agent, and is compatible with any numerical computation library, such as TensorFlow or Theano.

Compatibility with openAI gym

Q-learning

The Need for Model Risk Management

Intelligent agent

Office Hours

and why you should care…

SBA faces fraud risks and IT security woes, IG says

Shinzo Abe's assassin used a handmade firearm

P2, Japanese Wako marauders Yamaguchi and Watanabe

 By David Vincent Bell Hirsch

The word omics refers to a field of study in biological sciences that ends with -omics, such as genomics, transcriptomics, proteomics, or metabolomics.
 
Boys typically have one X chromosome and one Y chromosome, or XY, but boys with XXY syndrome have an extra X chromosome, or XXY
I'm a friend of your chromosomes

Adam and the Ants Friends
 
In humans, each cell normally contains 23 pairs of chromosomes, for a total of 46. Twenty-two of these pairs, called autosomes, look the same in both males and females. The 23rd pair, the sex chromosomes, differ between males and females.
Jacobs syndrome is a rare genetic abnormality in which a male receives an extra Y chromosome from his father

What is a bubble boy disease?
Severe combined immunodeficiency (SCID) is very rare, genetic disorder, affecting between 50 and 100 children born in the U.S. every year. SCID is often called “bubble boy disease,” made known by the 1976 movie “The Boy in the Plastic Bubble.”
What causes bubble boy disease?
SCID is caused by a mutation in the interleukin-2 receptor subunit gamma (IL2RG) gene that produces a protein essential for normal immune function. Currently, the best treatment for SCID-X1 is bone marrow transplantation with a tissue-matched sibling donor.

Myasthenia Gravis (MG)

What is myasthenia gravis? Myasthenia gravis (MG) is an autoimmune disease — a disease that occurs when the immune system attacks the body's own tissues.
Researchers have discovered that a rare muscle disease causes resistance to HIV-1 infection in patients, providing insight into potential therapies. A new study has found that a type of muscular dystrophy which affects the limbs protects against HIV-1.

CRISPR Correction of Duchenne Muscular Dystrophy


Prevention of muscular dystrophy inmice by CRISPR/Cas9–mediatedediting of germline DNA
Chengzu Long,1* John R. McAnally,1 * John M. Shelton,2 Alex A. Mireault, 1 Rhonda
Bassel-Duby,1 Eric N. Olson1

Every three nucleotides form a Codon that corresponds to a distinct amino acid

Nanoindenter

Nanostructure

Nanozymes can be used to detect ions, molecules and organic compounds both qualitatively and quantitatively. They have also been applied for destruction multi-drug resistant bacteria and the degradation of various organic pollutants.

Nanozymes: A New Disease Imaging Strategy

The nucleotide triplet that encodes an amino acid is called a codon. Each group of three nucleotides encodes one amino acid. Since there are 64 combinations of 4 nucleotides taken three at a time and only 20 amino acids, the code is degenerate (more than one codon per amino acid, in most cases).

Deoxyribozymes, also called DNA enzymes, DNAzymes, or catalytic DNA, are DNA oligonucleotides that are capable of performing a specific chemical reaction, often but not always catalytic. This is similar to the action of other biological enzymes, such as proteins or ribozymes (enzymes composed of RNA).

The Information in DNA Determines Cellular Function via Translation

The Fisher information matrix is used to calculate the covariance matrices associated with maximum-likelihood estimates.

Fisher information

Viral matrix protein

Symmetry of virus

Symmetry refers to the way in which capsomere units are arranged in viral capsid. Two kinds of symmetry are recognized in the viruses which corresponds to two primary shape ie. Rod and spherical shape of virus.

Capsomere

The capsomere is a subunit of the capsid, an outer covering of protein that protects the genetic material of a virus. Capsomeres self-assemble to form the capsid.

CRISPR

Induced pluripotent stem cell

(also known as iPS cells or iPSCs)

Genome editing

Strategies for the expansion of humaninduced pluripotent stem cells asaggregates in single-use Vertical-Wheel™bioreactors
Diogo E. S. Nogueira 1,2 , Carlos A. V. Rodrigues 1,2* , Marta S. Carvalho 1,2 , Cláudia C. Miranda 1,2 , Yas Hashimura 3 ,
Sunghoon Jung 3 , Brian Lee3 and Joaquim M. S. Cabra

Histology

Collection of tissues

Epimysium

Peristalsis

Sarcomere

What is IM/IH?

Integrative Medicine (IM) is healing-oriented medicine that takes account of the whole person, including all aspects of lifestyle. It emphasizes the therapeutic relationship between practitioner and patient, is informed by evidence, and makes use of all appropriate therapies.

IB/OEB

Thinking of concentrating in Integrative Bio?

Post-transcriptional modification

I am the great grandson of Dr. Price Bell, one of the first western doctors in Indian Territory. My grandmother told me he earned his medical degree through a correspondence school as common practice of their era. His father was Judge James Bell of Missouri.

Myogenin

Knowledge graph

The role of HuR in muscle development, function and muscle-related diseases
Brenda Janice Sánchez Sánchez, Department of Biochemistry, Faculty of
Medicine McGill University, Montreal

June 2021

Causes/Inheritance

Inheritance in DMD
DMD is inherited in an X-linked pattern because the gene that can carry a DMD-causing mutation is on the X chromosome. Every boy inherits an X chromosome from his mother and a Y chromosome from his father, which is what makes him male. Girls get two X chromosomes, one from each parent. DMD is caused by changes (mutations) of the DMD gene on the X chromosome.

There are 34,000 amino acids in muscle

Titin

Titin is the largest protein chain in your body, with more than 34,000 amino acids. This titanic protein acts like a big rubber band in our muscles.

Myc

c-Myc is a multifunctional transcription factor which drives the multiple synthetic functions necessary for rapid cell division while at the same time inhibiting expression of genes with antiproliferative functions. Because of its propensity to induce apoptosis, its expression is tightly regulated

Zinc finger

Every three nucleotides from a Codon that corresponds to a distinct amino acid.


The nucleotide triplet that encodes an amino acid is called a codon. Each group of three nucleotides encodes one amino acid. Since there are 64 combinations of 4 nucleotides taken three at a time and only 20 amino acids, the code is degenerate (more than one codon per amino acid, in most cases).

Loss of male sex chromosome may lead to earlier death for men – study

The loss of the Y chromosome causes the heart muscle to scar and can lead to deadly heart failure, the research found.

Spliceosomal introns, which have been found in most eukaryotic genes, are non-coding sequences excised from pre-mRNAs by a special complex called spliceosome during mRNA splicing. Introns occur in both protein- and RNA-coding genes and can be found in coding and untranslated gene regions.
Here are some common X-linked traits and disorders: Red-green color blindness is a recessive trait linked to the X chromosome. People who have it can see normally, but can't distinguish shades of red and green. Among those with Northern European ancestry, it occurs in about 1 in 12 males but only 1 in 200 females.
The 23rd pair of chromosomes are called the sex chromosomes, and those chromosomes are called either X or Y. Males have one X sex chromosome and one Y sex chromosome, while females have two X sex chromosomes. The genes on the X chromosomes are important for how the body grows and functions
In genetics, an operon is a functioning unit of DNA containing a cluster of genes under the control of a single promoter.[1] 
 
Troponin T is a protein found in heart muscle. Measuring troponin T using a high-sensitivity troponin T test helps health care providers diagnose a heart attack and determine the risk of heart disease. An increased level of troponin T has been linked with a higher risk of heart disease in people who have no symptoms.
An exon is any part of a gene that will form a part of the final mature RNA produced by that gene after introns have been removed by RNA splicing. The term exon refers to both the DNA sequence within a gene and to the corresponding sequence in RNA transcripts. In RNA splicing, introns are removed and exons are covalently joined to one another as part of generating the mature RNA. Just as the entire set of genes for a species constitutes the genome, the entire set of exons constitutes the exome.

Early Signs of Heart Disease Appear in the Eyes

5' to 3' Polarity refers to the carbon numbers of the sugars ribose and deoxyribose which contain hydroxyl groups to which incoming nucleotides are attached during polymerization, with addition specifically to the 3' hydroxyl group, resulting in increases in length at the 3' end, in polymerization in the 5' to 3' ...

Major Molecular Events of DNA Replication

DNA is always synthesized in the 5'-to-3' direction, meaning that nucleotides are added only to the 3' end of the growing strand. As shown in Figure 2, the 5'-phosphate group of the new nucleotide binds to the 3'-OH group of the last nucleotide of the growing strand
An outron is a nucleotide sequence at the 5' end of the primary transcript of a gene that is removed by a special form of RNA splicing during maturation of the final RNA product.
One of the steps in this processing, called RNA splicing, involves the removal or "splicing out" of certain sequences referred to as intervening sequences, or introns. The final mRNA thus consists of the remaining sequences, called exons, which are connected to one another through the splicing process.
They act as spools around which DNA winds to create structural units called nucleosomes. A histone is a protein that provides structural support for a chromosome. Each chromosome contains a long molecule of DNA, which must fit into the cell nucleus. To do that, the DNA wraps around complexes of histone proteins, giving the chromosome a more compact shape.
In molecular biology, a twintron is an intron-within-intron excised by sequential splicing reactions. A twintron is presumably formed by the insertion of a mobile intron into an existing intron.
In genetics, a promoter is a sequence of DNA to which proteins bind to initiate transcription of a single RNA transcript from the DNA downstream of the promoter. The RNA transcript may encode a protein, or can have a function in and of itself, such as tRNA or rRNA
Gibson assembly is a molecular cloning method which allows for the joining of multiple DNA fragments in a single, isothermal reaction. It is named after its creator, Daniel G. Gibson, who is the chief technology officer and co-founder of the synthetic biology company Codex DNA.
 

Comments

Popular posts from this blog

Wild Turkey Calls to not be attached to inaction with Turkey bowling in the Dark Store Theory

Inclusive considerations for Constitutional Freedom of Religion as a convention of our society in the United States has many tangents of consideration: Shahid and Shaheed (Arabic: شهيد ‎ šahīd , plural: شُهَدَاء šuhadāʾ  ; female: šahīda ) originates from the Quranic Arabic word meaning "witness" and is also used to denote a martyr.  The word shahid in Arabic means "witness". Its development closely parallels that of Greek martys (Greek: μάρτυς - "witness", in the New Testament also "martyr"), the origin of the term martyr. Shaheed Singh Martyrs of Sikh History History of Martyrdom in Sikhism During the 1700s And concerning Ram Dass , an American spiritual teacher, former academic and clinical psychologist, and the author of the seminal 1971 book Be Here Now: Cultivating the Witness In philosophy, normative statements make claims about how things should or ought to be, how to value them, which

Wisdom of Solomon Chapter 13 Playing with Pyroelectricity Fermi Surface lattice dynamics doping nanopore semiconductors

  Serenity inside Sells ventures, lease options and charters from Texas By David Vincent Bell Hirsch Frank Zappa - Valley Girl Valleytronics (from valley and electronics) is an experimental area in semiconductors that exploits local minima ("valleys") in the electronic band structure . Certain semiconductors have multiple "valleys" in the electronic band structure of the first Brillouin zone , and are known as multivalley semiconductors. [1] [2] Valleytronics is the technology of control over the valley degree of freedom, a local maximum/minimum on the valence / conduction band , of such multivalley semiconductors. The term was coined in analogy to spintronics . While in spintronics the internal degree of freedom of spin is harnessed to store, manipulate and read out bits of information, the proposal for valleytronics is to perform similar tasks using the multiple extrema of the band structure, so that the information of 0s and 1s would be stored as diff

Thomas Sunday Texas disparity reply follow up with the Latin America Roosevelt Corollary and Roosevelt's quarantine speech, including Frida Kahlo and Saint Hubert Iconography for considerations

Self-portrait on the borderline between Mexico and the United States (1932) Coronavirus: Sick Americans face Kafkaesque nightmare in search of testing Innovation, Anyon ?   Год крысы   God krysy    With Heartful Mind upon moral and etiquette ... cut your cloth (idiom) If you cut your cloth according to your situation, you limit what you do to take account of the resources you have. Ford would be forced to cut its cloth according to the demands of the market. Bless Me, Ultima   What is the meaning of the idiom Cut your coat according to your cloth? cut your coat according to your cloth . UK. said to emphasize that someone should do as well as possible with the limited money they have. Copper Anti-microbial Clothing & Fabrics What is the origin and meaning of the idiom cut from the same cloth? The term cut from the same cloth refers to individuals that are similar in specific ways. The origin of this phras