Random Articles (Page 233)

Have a deep view into what people are curious about.

๐Ÿ”— Black MIDI

๐Ÿ”— Music/Music genres

Black MIDI is a music genre consisting of compositions that use MIDI files to create a song or a remix containing a large number of notes, typically in the thousands, millions, billions, or even trillions. People who make black MIDIs are known as blackers. However, there are no specific criteria of what is considered "black"; as a result, pinpointing the exact origin of black MIDI is impossible.

Discussed on

๐Ÿ”— Ready Player One โ€“ what Oculus + FB will look like?

๐Ÿ”— Novels ๐Ÿ”— Novels/Science fiction

Ready Player One is a 2011 science fiction novel, and the debut novel of American author Ernest Cline. The story, set in a dystopia in 2045, follows protagonist Wade Watts on his search for an Easter egg in a worldwide virtual reality game, the discovery of which would lead him to inherit the game creator's fortune. Cline sold the rights to publish the novel in June 2010, in a bidding war to the Crown Publishing Group (a division of Random House). The book was published on August 16, 2011. An audiobook was released the same day; it was narrated by Wil Wheaton, who was mentioned briefly in one of the chapters.Ch. 20 In 2012, the book received an Alex Award from the Young Adult Library Services Association division of the American Library Association and won the 2012 Prometheus Award. A film adaptation, screenwritten by Cline and Zak Penn and directed by Steven Spielberg, was released on March 29, 2018.

Discussed on

๐Ÿ”— Olbers' paradox

๐Ÿ”— Physics ๐Ÿ”— Astronomy

In astrophysics and physical cosmology, Olbers' paradox, named after the German astronomer Heinrich Wilhelm Olbers (1758โ€“1840), also known as the "dark night sky paradox", is the argument that the darkness of the night sky conflicts with the assumption of an infinite and eternal static universe. In the hypothetical case that the universe is static, homogeneous at a large scale, and populated by an infinite number of stars, then any line of sight from Earth must end at the (very bright) surface of a star and hence the night sky should be completely illuminated and very bright. This contradicts the observed darkness and non-uniformity of the night.

The darkness of the night sky is one of the pieces of evidence for a dynamic universe, such as the Big Bang model. That model explains the observed non-uniformity of brightness by invoking spacetime's expansion, which lengthens the light originating from the Big Bang to microwave levels via a process known as redshift; this microwave radiation background has wavelengths much longer than those of visible light, so appears dark to the naked eye. Other explanations for the paradox have been offered, but none have wide acceptance in cosmology.

Discussed on

๐Ÿ”— Hallucinogenic Plants in Chinese Herbals

๐Ÿ”— Medicine ๐Ÿ”— China ๐Ÿ”— Plants ๐Ÿ”— Pharmacology ๐Ÿ”— Psychoactive and Recreational Drugs

For over two millennia, texts in Chinese herbology and traditional Chinese medicine have recorded medicinal plants that are also hallucinogens and psychedelics. Some are familiar psychoactive plants in Western herbal medicine (e.g., Chinese: ่Žจ่ช; pinyin: lร ngdร ng, i.e. Hyoscyamus niger), but several Chinese plants have not been noted as hallucinogens in modern works (e.g.,Chinese: ้›ฒๅฏฆ; pinyin: yรบnshรญ; lit. 'cloud seed', i.e. Caesalpinia decapetala). Chinese herbals are an important resource for the history of botany, for instance, Zhang Hua's c. 290 Bowuzhi is the earliest record of the psilocybin mushroom xiร ojรนn ็ฌ‘่Œ (lit. "laughing mushroom", i.e. Gymnopilus junonius).

Discussed on

๐Ÿ”— Post-quantum cryptography: just in case

๐Ÿ”— Computing ๐Ÿ”— Computing/Software ๐Ÿ”— Computing/Computer science ๐Ÿ”— Cryptography ๐Ÿ”— Cryptography/Computer science ๐Ÿ”— Computing/Computer Security

Post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. As of 2019, this is not true for the most popular public-key algorithms, which can be efficiently broken by a sufficiently strong quantum computer. The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently powerful quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers lack processing power to break any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several workshops on Quantum Safe Cryptography hosted by the European Telecommunications Standards Institute (ETSI) and the Institute for Quantum Computing.

In contrast to the threat quantum computing poses to current public-key algorithms, most current symmetric cryptographic algorithms and hash functions are considered to be relatively secure against attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See section on symmetric-key approach below.

Discussed on

๐Ÿ”— Goodsteins theorem

๐Ÿ”— Mathematics

In mathematical logic, Goodstein's theorem is a statement about the natural numbers, proved by Reuben Goodstein in 1944, which states that every Goodstein sequence eventually terminates at 0. Laurence Kirby and Jeff Paris showed that it is unprovable in Peano arithmetic (but it can be proven in stronger systems, such as second-order arithmetic). This was the third example of a true statement about natural numbers that is unprovable in Peano arithmetic, after the examples provided by Gรถdel's incompleteness theorem and Gerhard Gentzen's 1943 direct proof of the unprovability of ฮต0-induction in Peano arithmetic. The Parisโ€“Harrington theorem gave another example.

Kirby and Paris introduced a graph-theoretic hydra game with behavior similar to that of Goodstein sequences: the "Hydra" (named for the mythological multi-headed Hydra of Lerna) is a rooted tree, and a move consists of cutting off one of its "heads" (a branch of the tree), to which the hydra responds by growing a finite number of new heads according to certain rules. Kirby and Paris proved that the Hydra will eventually be killed, regardless of the strategy that Hercules uses to chop off its heads, though this may take a very long time. Just like for Goodstein sequences, Kirby and Paris showed that it cannot be proven in Peano arithmetic alone.

Discussed on

๐Ÿ”— Sesame Credit

๐Ÿ”— Finance & Investment ๐Ÿ”— China ๐Ÿ”— Economics

Zhima Credit (Chinese: ่Š้บปไฟก็”จ; pinyin: Zhฤซma Xรฌnyรฒng), also known as Sesame Credit, is a private credit scoring and loyalty program system developed by Ant Financial Services Group (AFSG), an affiliate of the Chinese Alibaba Group. It uses data from Alibaba's services to compile its score. Customers receive a score based on a variety of factors based on social media interactions and purchases carried out on Alibaba Group websites or paid for using its affiliate Ant Financial's Alipay mobile wallet. The rewards of having a high score include easier access to loans from Ant Financial and having a more trustworthy profile on e-commerce sites within the Alibaba Group.

Discussed on

๐Ÿ”— Guanxi

๐Ÿ”— China ๐Ÿ”— Psychology

Guanxi (simplified Chinese: ๅ…ณ็ณป; traditional Chinese: ้—œไฟ‚; pinyin: guฤnxi) defines the fundamental dynamic in personalized social networks of power, and is a crucial system of beliefs in Chinese culture. In Western media, the pinyin romanization of this Chinese word is becoming more widely used instead of the two common translations of itโ€”"connections" and "relationships"โ€”as neither of those terms sufficiently reflects the wide cultural implications that guanxi describes.

Guanxi plays a fundamental role within the Confucian doctrine, which sees the individual as part of a community and a set of family, hierarchical and friendly relationships. In particular, there is a focus on tacit mutual commitments, reciprocity, and trust, which are the grounds of guanxi and guanxi networks.

Guanxi also has a major influence on the management of businesses based in Mainland China, and businesses owned by Overseas Chinese in Southeast Asia (the latter is known as the bamboo network).

Closely related concepts include that of ganqing, a measure which reflects the depth of feeling within an interpersonal relationship, renqing (ไบบๆƒ… rรฉnqรญng/jen-ch'ing), the moral obligation to maintain a relationship, and the idea of "face" (้ขๅญ, miร nzi/mien-tzu), which refers to social status, propriety, prestige, or a combination of all three. Other related concepts include wu-lune, which supports the idea of a long term, developing relationship between a business and its client, and yi-ren and ren, which respectively support reciprocity and empathy.

Discussed on

๐Ÿ”— Indian Ocean garbage patch

๐Ÿ”— Oceans ๐Ÿ”— Polymers

The Indian Ocean garbage patch, discovered in 2010, is a gyre of marine litter suspended in the upper water column of the central Indian Ocean, specifically the Indian Ocean Gyre, one of the five major oceanic gyres. The patch does not appear as a continuous debris field. As with other patches in each of the five oceanic gyres, the plastics in it break down to ever smaller particles, and to constituent polymers. As with the other patches, the field constitutes an elevated level of pelagic plastics, chemical sludge, and other debris; primarily particles that are invisible to the naked eye. The concentration of particle debris has been estimated to be approximately 10,000 particles per square kilometer.

A similar patch of floating plastic debris in the Pacific Ocean, the Great Pacific garbage patch, was predicted in 1985, and discovered in 1997 by Charles J. Moore as he passed through the North Pacific Gyre on his return from the Transpacific Yacht Race. The North Atlantic garbage patch was discovered in 2010.

Discussed on

๐Ÿ”— Gravitation water vortex power plant

๐Ÿ”— Energy

The gravitation water vortex power plant is a type of micro hydro vortex turbine system which is capable of converting energy in a moving fluid to rotational energy using a low hydraulic head of 0.7โ€“3 metres (2ย ft 4ย inโ€“9ย ft 10ย in). The technology is based on a round basin with a central drain. Above the drain the water forms a stable line vortex which drives a water turbine.

It was first patented by Greek-Australian Lawyer & Inventor Paul Kouris in 1996, who was searching for a way to harness the power inherent in a vortex.

Later, Austrian Inventor Franz Zotlรถterer created a similar turbine while attempting to find a way to aerate water without an external power source.

Discussed on