Random Articles (Page 19)

Have a deep view into what people are curious about.

πŸ”— Archimedes Palimpsest

πŸ”— History πŸ”— Mathematics πŸ”— Books πŸ”— Greece πŸ”— History of Science

The Archimedes Palimpsest is a parchment codex palimpsest, originally a Byzantine Greek copy of a compilation of Archimedes and other authors. It contains two works of Archimedes that were thought to have been lost (the Ostomachion and the Method of Mechanical Theorems) and the only surviving original Greek edition of his work On Floating Bodies. The first version of the compilation is believed to have been produced by Isidorus of Miletus, the architect of the geometrically complex Hagia Sophia cathedral in Constantinople, sometime around AD 530. The copy found in the palimpsest was created from this original, also in Constantinople, during the Macedonian Renaissance (c. AD 950), a time when mathematics in the capital was being revived by the former Greek Orthodox bishop of Thessaloniki Leo the Geometer, a cousin of the Patriarch.

Following the sack of Constantinople by Western crusaders in 1204, the manuscript was taken to an isolated Greek monastery in Palestine, possibly to protect it from occupying crusaders, who often equated Greek script with heresy against their Latin church and either burned or looted many such texts (including at least two other copies of Archimedes). The complex manuscript was not appreciated at this remote monastery and was soon overwritten (1229) with a religious text. In 1899, nine hundred years after it was written, the manuscript was still in the possession of the Greek church, and back in Istanbul, where it was catalogued by the Greek scholar Papadopoulos-Kerameus, attracting the attention of Johan Heiberg. Heiberg visited the church library and was allowed to make detailed photographs in 1906. Most of the original text was still visible, and Heiberg published it in 1915. In 1922 the manuscript went missing in the midst of the evacuation of the Greek Orthodox library in Istanbul, during a tumultuous period following the World War I. Concealed for over 70 years by a Western businessman, forged pictures were painted on top of some text to increase resale value. Unable to sell the book privately, in 1998 the businessman's daughter risked a public auction in New York contested by the Greek church; the U.S. court ruled for the auction, and the manuscript was purchased by an anonymous buyer (rumored to be Jeff Bezos). The texts under the forged pictures, and previously unreadable texts, were revealed by analyzing images produced by ultraviolet, infrared, visible and raking light, and X-ray.

All images and transcriptions are now freely available on the web at the Archimedes Digital Palimpsest under the Creative Commons License CC BY.

Discussed on

πŸ”— Alcohol Belts of Europe

πŸ”— Russia πŸ”— Europe πŸ”— Food and drink πŸ”— Wine πŸ”— Russia/demographics and ethnography of Russia

The alcohol belts of Europe divide Europe by their traditional alcoholic beverages: beer, wine, or spirits. They do not necessarily correspond with current drinking habits, as beer has become the most popular alcoholic drink world-wide. The definitions of these belts are not completely objective.

Discussed on

πŸ”— Gish Gallop

πŸ”— Skepticism πŸ”— Psychology πŸ”— Debating

The Gish gallop is a technique used during debating that focuses on overwhelming an opponent with as many arguments as possible, without regard for accuracy or strength of the arguments. The term was coined by Eugenie Scott and named after the creationist Duane Gish, who used the technique frequently against proponents of evolution.

Discussed on

πŸ”— Sexagesimal

πŸ”— Mathematics

Sexagesimal (also known as base 60 or sexagenary) is a numeral system with sixty as its base. It originated with the ancient Sumerians in the 3rd millennium BC, was passed down to the ancient Babylonians, and is still usedβ€”in a modified formβ€”for measuring time, angles, and geographic coordinates.

The number 60, a superior highly composite number, has twelve factors, namely 1, 2, 3, 4, 5, 6, 10, 12, 15, 20, 30, and 60, of which 2, 3, and 5 are prime numbers. With so many factors, many fractions involving sexagesimal numbers are simplified. For example, one hour can be divided evenly into sections of 30 minutes, 20 minutes, 15 minutes, 12 minutes, 10 minutes, 6 minutes, 5 minutes, 4 minutes, 3 minutes, 2 minutes, and 1 minute. 60 is the smallest number that is divisible by every number from 1 to 6; that is, it is the lowest common multiple of 1, 2, 3, 4, 5, and 6.

In this article, all sexagesimal digits are represented as decimal numbers, except where otherwise noted. For example, 10 means the number ten and 60 means the number sixty.

Discussed on

πŸ”— Deniable Encryption

πŸ”— Cryptography πŸ”— Cryptography/Computer science

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.

The users may convincingly deny that a given piece of data is encrypted, or that they are able to decrypt a given piece of encrypted data, or that some specific encrypted data exists. Such denials may or may not be genuine. For example, it may be impossible to prove that the data is encrypted without the cooperation of the users. If the data is encrypted, the users genuinely may not be able to decrypt it. Deniable encryption serves to undermine an attacker's confidence either that data is encrypted, or that the person in possession of it can decrypt it and provide the associated plaintext.

In their pivotal 1996 paper, Ran Canetti, Cynthia Dwork, Moni Naor, and Rafail Ostrovsky introduced the concept of deniable encryption, a cryptographic breakthrough that ensures privacy even under coercion. This concept allows encrypted communication participants to plausibly deny the true content of their messages. Their work lays the foundational principles of deniable encryption, illustrating its critical role in protecting privacy against forced disclosures. This research has become a cornerstone for future advancements in cryptography, emphasizing the importance of deniable encryption in maintaining communication security. The notion of deniable encryption was used by Julian Assange and Ralf Weinmann in the Rubberhose filesystem.

πŸ”— Dancing Plague of 1518

πŸ”— History πŸ”— France πŸ”— Medicine πŸ”— Dance

The Dancing Plague of 1518, or Dance Epidemic of 1518, was a case of dancing mania that occurred in Strasbourg, Alsace (modern-day France), in the Holy Roman Empire from July 1518 to September 1518. Somewhere between 50 and 400 people took to dancing for weeks.

Discussed on

πŸ”— A*

πŸ”— Computing πŸ”— Computer science πŸ”— Mathematics

A* (pronounced "A-star") is a graph traversal and path search algorithm, which is often used in computer science due to its completeness, optimality, and optimal efficiency. One major practical drawback is its O ( b d ) {\displaystyle O(b^{d})} space complexity, as it stores all generated nodes in memory. Thus, in practical travel-routing systems, it is generally outperformed by algorithms which can pre-process the graph to attain better performance, as well as memory-bounded approaches; however, A* is still the best solution in many cases.

Peter Hart, Nils Nilsson and Bertram Raphael of Stanford Research Institute (now SRI International) first published the algorithm in 1968. It can be seen as an extension of Edsger Dijkstra's 1959 algorithm. A* achieves better performance by using heuristics to guide its search.

Discussed on

  • "A*" | 2019-08-10 | 50 Upvotes 6 Comments

πŸ”— Kakistocracy

πŸ”— Politics

A kakistocracy [kΓ¦kΙͺ'stΙ‘krΙ™si] is a system of government that is run by the worst, least qualified, and/or most unscrupulous citizens. The word was coined as early as the seventeenth century, but gained significant use in the first decades of the 20th century to criticize populist governments emerging in different democracies around the world.

Discussed on

πŸ”— Mars will have a 420 day since it has a 668 days a year

πŸ”— Time πŸ”— Solar System/Mars πŸ”— Solar System

Various schemes have been used or proposed for timekeeping on the planet Mars independently of Earth time and calendars.

Mars has an axial tilt and a rotation period similar to those of Earth. Thus, it experiences seasons of spring, summer, autumn and winter much like Earth. Coincidentally, the duration of a Martian day is within a few percent of that of an Earth day, which has led to the use of analogous time units. A Mars year is almost twice as long as Earth's, and its orbital eccentricity is considerably larger, which means that the lengths of various Martian seasons differ considerably, and sundial time can diverge from clock time more than on Earth.

πŸ”— Aspect-Oriented Programming

πŸ”— Computer science

In computing, aspect-oriented programming (AOP) is a programming paradigm that aims to increase modularity by allowing the separation of cross-cutting concerns. It does so by adding behavior to existing code (an advice) without modifying the code itself, instead separately specifying which code is modified via a "pointcut" specification, such as "log all function calls when the function's name begins with 'set'". This allows behaviors that are not central to the business logic (such as logging) to be added to a program without cluttering the code core to the functionality.

AOP includes programming methods and tools that support the modularization of concerns at the level of the source code, while aspect-oriented software development refers to a whole engineering discipline.

Aspect-oriented programming entails breaking down program logic into distinct parts (so-called concerns, cohesive areas of functionality). Nearly all programming paradigms support some level of grouping and encapsulation of concerns into separate, independent entities by providing abstractions (e.g., functions, procedures, modules, classes, methods) that can be used for implementing, abstracting and composing these concerns. Some concerns "cut across" multiple abstractions in a program, and defy these forms of implementation. These concerns are called cross-cutting concerns or horizontal concerns.

Logging exemplifies a crosscutting concern because a logging strategy necessarily affects every logged part of the system. Logging thereby crosscuts all logged classes and methods.

All AOP implementations have some crosscutting expressions that encapsulate each concern in one place. The difference between implementations lies in the power, safety, and usability of the constructs provided. For example, interceptors that specify the methods to express a limited form of crosscutting, without much support for type-safety or debugging. AspectJ has a number of such expressions and encapsulates them in a special class, an aspect. For example, an aspect can alter the behavior of the base code (the non-aspect part of a program) by applying advice (additional behavior) at various join points (points in a program) specified in a quantification or query called a pointcut (that detects whether a given join point matches). An aspect can also make binary-compatible structural changes to other classes, like adding members or parents.

Discussed on