New Articles (Page 256)

To stay up to date you can also follow on Mastodon.

πŸ”— ACT-R: A cognitive architecture

πŸ”— Cognitive science

ACT-R (pronounced /ˌækt ΛˆΙ‘r/; short for "Adaptive Control of Thoughtβ€”Rational") is a cognitive architecture mainly developed by John Robert Anderson and Christian Lebiere at Carnegie Mellon University. Like any cognitive architecture, ACT-R aims to define the basic and irreducible cognitive and perceptual operations that enable the human mind. In theory, each task that humans can perform should consist of a series of these discrete operations.

Most of the ACT-R's basic assumptions are also inspired by the progress of cognitive neuroscience, and ACT-R can be seen and described as a way of specifying how the brain itself is organized in a way that enables individual processing modules to produce cognition.

Discussed on

πŸ”— Schwartzian Transform

πŸ”— Computer science

In computer programming, the Schwartzian transform is a technique used to improve the efficiency of sorting a list of items. This idiom is appropriate for comparison-based sorting when the ordering is actually based on the ordering of a certain property (the key) of the elements, where computing that property is an intensive operation that should be performed a minimal number of times. The Schwartzian transform is notable in that it does not use named temporary arrays.

The Schwartzian transform is a version of a Lisp idiom known as decorate-sort-undecorate, which avoids recomputing the sort keys by temporarily associating them with the input items. This approach is similar to memoization, which avoids repeating the calculation of the key corresponding to a specific input value. By comparison, this idiom assures that each input item's key is calculated exactly once, which may still result in repeating some calculations if the input data contains duplicate items.

The idiom is named after Randal L. Schwartz, who first demonstrated it in Perl shortly after the release of Perl 5 in 1994. The term "Schwartzian transform" applied solely to Perl programming for a number of years, but it has later been adopted by some users of other languages, such as Python, to refer to similar idioms in those languages. However, the algorithm was already in use in other languages (under no specific name) before it was popularized among the Perl community in the form of that particular idiom by Schwartz. The term "Schwartzian transform" indicates a specific idiom, and not the algorithm in general.

For example, to sort the word list ("aaaa","a","aa") according to word length: first build the list (["aaaa",4],["a",1],["aa",2]), then sort it according to the numeric values getting (["a",1],["aa",2],["aaaa",4]), then strip off the numbers and you get ("a","aa","aaaa"). That was the algorithm in general, so it does not count as a transform. To make it a true Schwartzian transform, it would be done in Perl like this:

Discussed on

πŸ”— Green Flash

πŸ”— Physics

The green flash and green ray are meteorological optical phenomena that sometimes occur transiently around the moment of sunset or sunrise. When the conditions are right, a distinct green spot is briefly visible above the upper rim of the Sun's disk; the green appearance usually lasts for no more than two seconds. Rarely, the green flash can resemble a green ray shooting up from the sunset or sunrise point.

Green flashes occur because the earth's atmosphere can cause the light from the Sun to separate out into different colors. Green flashes are a group of similar phenomena that stem from slightly different causes, and therefore, some types of green flashes are more common than others.

Discussed on

πŸ”— Milwaukee Protocol

πŸ”— Medicine πŸ”— Viruses πŸ”— Dogs πŸ”— Cats πŸ”— Neuroscience πŸ”— Microbiology πŸ”— Medicine/Neurology πŸ”— Rodents πŸ”— Medicine/Translation πŸ”— Veterinary medicine πŸ”— Medicine/Dermatology

Rabies is a viral disease that causes inflammation of the brain in humans and other mammals. Early symptoms can include fever and tingling at the site of exposure. These symptoms are followed by one or more of the following symptoms: violent movements, uncontrolled excitement, fear of water, an inability to move parts of the body, confusion, and loss of consciousness. Once symptoms appear, the result is nearly always death. The time period between contracting the disease and the start of symptoms is usually one to three months, but can vary from less than one week to more than one year. The time depends on the distance the virus must travel along peripheral nerves to reach the central nervous system.

Rabies is caused by lyssaviruses, including the rabies virus and Australian bat lyssavirus. It is spread when an infected animal bites or scratches a human or other animal. Saliva from an infected animal can also transmit rabies if the saliva comes into contact with the eyes, mouth, or nose. Globally, dogs are the most common animal involved. In countries where dogs commonly have the disease, more than 99% of rabies cases are the direct result of dog bites. In the Americas, bat bites are the most common source of rabies infections in humans, and less than 5% of cases are from dogs. Rodents are very rarely infected with rabies. The disease can be diagnosed only after the start of symptoms.

Animal control and vaccination programs have decreased the risk of rabies from dogs in a number of regions of the world. Immunizing people before they are exposed is recommended for those at high risk, including those who work with bats or who spend prolonged periods in areas of the world where rabies is common. In people who have been exposed to rabies, the rabies vaccine and sometimes rabies immunoglobulin are effective in preventing the disease if the person receives the treatment before the start of rabies symptoms. Washing bites and scratches for 15 minutes with soap and water, povidone-iodine, or detergent may reduce the number of viral particles and may be somewhat effective at preventing transmission. As of 2016, only fourteen people had survived a rabies infection after showing symptoms.

Rabies caused about 17,400 human deaths worldwide in 2015. More than 95% of human deaths from rabies occur in Africa and Asia. About 40% of deaths occur in children under the age of 15. Rabies is present in more than 150 countries and on all continents but Antarctica. More than 3 billion people live in regions of the world where rabies occurs. A number of countries, including Australia and Japan, as well as much of Western Europe, do not have rabies among dogs. Many Pacific islands do not have rabies at all. It is classified as a neglected tropical disease.

Discussed on

πŸ”— Mechanical television

πŸ”— Television

Mechanical television or mechanical scan television is a television system that relies on a mechanical scanning device, such as a rotating disk with holes in it or a rotating mirror, to scan the scene and generate the video signal, and a similar mechanical device at the receiver to display the picture. This contrasts with modern television technology, which uses electronic scanning methods, for example electron beams in cathode ray tube (CRT) televisions, and liquid-crystal displays (LCD), to create and display the picture.

Mechanical-scanning methods were used in the earliest experimental television systems in the 1920s and 1930s. One of the first experimental wireless television transmissions was by John Logie Baird on November 25, 1925, in London. By 1928 many radio stations were broadcasting experimental television programs using mechanical systems. However the technology never produced images of sufficient quality to become popular with the public. Mechanical-scan systems were largely superseded by electronic-scan technology in the mid-1930s, which was used in the first commercially successful television broadcasts which began in the late 1930s in Great Britain.

A mechanical television receiver is also called a televisor in some countries.

Discussed on

πŸ”— Van Eck Phreaking

πŸ”— Espionage πŸ”— Internet πŸ”— Telecommunications πŸ”— Computer Security πŸ”— Computer Security/Computing

Van Eck phreaking (also known as Van Eck Radiation) is a form of eavesdropping in which special equipment is used to pick up side-band electromagnetic emissions from electronic devices that correlate to hidden signals or data for the purpose of recreating these signals or data in order to spy on the electronic device. Side-band electromagnetic radiation emissions are present in (and with the proper equipment, can be captured from) keyboards, computer displays, printers, and other electronic devices.

In 1985, Wim van Eck published the first unclassified technical analysis of the security risks of emanations from computer monitors. This paper caused some consternation in the security community, which had previously believed that such monitoring was a highly sophisticated attack available only to governments; van Eck successfully eavesdropped on a real system, at a range of hundreds of metres, using just $15 worth of equipment plus a television set.

As a consequence of this research, such emanations are sometimes called "van Eck radiation", and the eavesdropping technique van Eck phreaking. Government researchers were already aware of the danger, as Bell Labs had noted this vulnerability to secure teleprinter communications during World War II and was able to produce 75% of the plaintext being processed in a secure facility from a distance of 80 feet (24 metres). Additionally the NSA published Tempest Fundamentals, NSA-82-89, NACSIM 5000, National Security Agency (Classified) on February 1, 1982. In addition, the van Eck technique was successfully demonstrated to non-TEMPEST personnel in Korea during the Korean War in the 1950s.

While Phreaking is the process of exploiting telephone networks, it is used here because of its connection to eavesdropping. Van Eck phreaking of CRT displays is the process of eavesdropping on the contents of a CRT by detecting its electromagnetic emissions.

Discussed on

πŸ”— Capability Based Security

πŸ”— Computing πŸ”— Computer Security πŸ”— Computer Security/Computing

Capability-based security is a concept in the design of secure computing systems, one of the existing security models. A capability (known in some systems as a key) is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights. A user program on a capability-based operating system must use a capability to access an object. Capability-based security refers to the principle of designing user programs such that they directly share capabilities with each other according to the principle of least privilege, and to the operating system infrastructure necessary to make such transactions efficient and secure. Capability-based security is to be contrasted with an approach that uses hierarchical protection domains.

Although most operating systems implement a facility which resembles capabilities, they typically do not provide enough support to allow for the exchange of capabilities among possibly mutually untrusting entities to be the primary means of granting and distributing access rights throughout the system. A capability-based system, in contrast, is designed with that goal in mind.

Capabilities as discussed in this article should not be confused with POSIX 1e/2c "Capabilities". The latter are coarse-grained privileges that cannot be transferred between processes.

Discussed on

πŸ”— Atari Punk Console

πŸ”— Electronic music

The Atari Punk Console (commonly shortened to APC) is a popular circuit that utilizes two 555 timer ICs or a single 556 dual timer IC. The original circuit, called a "Sound Synthesizer", was published in a Radio Shack booklet: "Engineer's Notebook: Integrated Circuit Applications" in 1980 and later called "Stepped Tone Generator" in "Engineer's Mini-Notebook - 555 Circuits" by its designer, Forrest M. Mims III (Siliconcepts, 1984). It was named "Atari Punk Console" (APC) by Kaustic Machines crew because its "low-fi" sounds resemble classic Atari console games from the 1980s, with a square wave output similar to the Atari 2600. Kaustic Machines added a -4db line level output with volume control to the circuit which was originally designed to drive a small 8-ohm speaker.

The Atari Punk console is an astable square wave oscillator driving a monostable oscillator that creates a single (square) pulse. There are two controls, one for the frequency of the oscillator and one to control the pulse width. The controls are usually potentiometers but the circuit can also be controlled by light, temperature, pressure etc. by replacing a potentiometer with a suitable sensor (e.g., photoresistor for light sensitivity). Most of the time there is also a power switch (often a toggle switch) and a volume knob.

The circuit is a simple DIY noisemaker circuit that is relatively inexpensive and easy to build, easily adaptable and is configurable in many ways. It has been built into a wide variety of cases. Its flexibility has led to wide scale popularity among electronics enthusiasts. It is often suggested as a good circuit to build for beginners.

Discussed on

πŸ”— Casting out nines

πŸ”— Mathematics

The expression "casting out nines" may refer to any one of three arithmetical procedures:

  • Adding the decimal digits of a positive whole number, while optionally ignoring any 9s or digits which sum to a multiple of 9. The result of this procedure is a number which is smaller than the original whenever the original has more than one digit, leaves the same remainder as the original after division by nine, and may be obtained from the original by subtracting a multiple of 9 from it. The name of the procedure derives from this latter property.
  • Repeated application of this procedure to the results obtained from previous applications until a single-digit number is obtained. This single-digit number is called the "digital root" of the original. If a number is divisible by 9, its digital root is 9. Otherwise, its digital root is the remainder it leaves after being divided by 9.
  • A sanity test in which the above-mentioned procedures are used to check for errors in arithmetical calculations. The test is carried out by applying the same sequence of arithmetical operations to the digital roots of the operands as are applied to the operands themselves. If no mistakes are made in the calculations, the digital roots of the two resultants should be the same. If they are different, therefore, one or more mistakes must have been made in the calculations.

Discussed on

πŸ”— Chicago Tunnel and Reservoir Plan

πŸ”— Environment πŸ”— Urban studies and planning πŸ”— Chicago πŸ”— Illinois

The Tunnel and Reservoir Plan (abbreviated TARP and more commonly known as the Deep Tunnel Project or the Chicago Deep Tunnel) is a large civil engineering project that aims to reduce flooding in the metropolitan Chicago area, and to reduce the harmful effects of flushing raw sewage into Lake Michigan by diverting storm water and sewage into temporary holding reservoirs. The megaproject is one of the largest civil engineering projects ever undertaken in terms of scope, cost and timeframe. Commissioned in the mid-1970s, the project is managed by the Metropolitan Water Reclamation District of Greater Chicago. Completion of the system is not anticipated until 2029, but substantial portions of the system have already opened and are currently operational. Across 30 years of construction, over $3 billion has been spent on the project.

Discussed on