[go: up one dir, main page]
More Web Proxy on the site http://driver.im/Jump to content

User:Mesoderm/sandbox

From Wikipedia, the free encyclopedia


The current area of focus is:

Fertilization-->Gastrulation-->Neurulation-->Nervous system-->Neurotoxins
Peer-to-peer -- Wireless mesh networks -- Distributed computing
  • Spanish slavery of indigenous people?
  • Slavery was present in Alabama before it became a state (when the region was still part of the Alabama/Mississippi Territory)

Reconstruction and the Jim Crow era

[edit]
Sharecropper plowing. Montgomery County, Alabama (1944)

[1]

References

[edit]
  • "Slavery", Keith S. Herbert; Encylopedia of Alabama (Auburn University); August 5, 2009

Indigenous Alabama

[edit]
  • focus on several prominent examples of different p2p apps, but move most of them to a separate list page ("List of P2P applications" or something) ... select small # of apps (freenet, kademlia, napster, bittorrent, skype/voip, chord, etc.)
  • write blurb re: applications in article intro

After lead, and before basic definitions, we need an "introductory example" section

Introductory remarks

[edit]

A graph is a collection of objects called vertices (or nodes), along with a set of edges connecting pairs of these nodes to each other, based on some kind of relationship.

Graphs can be used to model a wide variety of problems across many domains - in particular, any domain where one is trying to study interactions between large, complex collections of discrete objects that are pairwise related or connected to each other.

We can mathematically represent networks like the food web above as graphs, where each part of the food web is a node, and the energy/nutrients transferred are represented by edges (arrows + weights)

Take for example the following problems:

All of these systems can be modeled as weighted, directed graphs (described below). In a graph representing the communications network the nodes might represent routers, and the edges would describe connections between routers and the speeds of these connections. On the other hand, in a graph modeling a cargo shipping network the nodes might represent individual cities, while the edges represent the costs of sending goods between two particular cities. But in both cases, we use essentially the same mathematical tools.

2
3
4
Graphs can be utilized across many problem domains. For instance, a logistics firm might represent the European railroad network as a graph, with individual cities as nodes and rail lines as edges. In computer network administration, graphs can be used to help optimize the flow of Internet traffic between routers.

Likewise, both the intelligence agent and the ecologist might utilize graph clustering methods to identify important groupings of nodes ...

use this as example of how food webs and online social networks could be represented as graph, clusters id'd, etc ... find an image of food web and one of online social graph

Refs

[edit]

prisons

[edit]

The social role of prisons

[edit]

Privatized / for-profit prisons

[edit]

Race, class, and mass incarceration

[edit]

Military prisons and internment/concentration camps

[edit]

... articles above need to be written from non-anthropocentric perspective (with exception of Menstrual cycle etc that are actually about human bio). Human reproductive biology should be in articles titled like "Ovulation in humans" ... and then WP:SUMMARYed in the article Ovulation in a section called "Humans" ... and so on

... a diagram or photo series is need for the "ovulation" article

...

Herbal

[edit]
  • Ethnobotanical data
  • Commonly used preparations, and their mode of operation-
  • Studies on effectiveness/safety/etc.
  • Modern pharmaceutical derivatives

Pharmaceutical industry

[edit]
  • Major manufacturers of common brands, usage stats, sales $$$, mechanism, health effects

Some refs

[edit]
  • Lead
  • Process
  • Context: Overview of blastula/cleavage/fertilization (in 1 paragraph)
  • Loss of symmetry
  • Amniotes --primitive streak (mammals, birds, reptiles)[3] [4]
  • Differences in gastrulation process in various species (definitely cover sponges, mice, humans)
  • Germ layers and role of each


  • Create SVG rendition of Figure 8.4 here
  • Another good diagram at Fig. 2.1 here
  • [6] -- "dynamic process, that proceeds from anterior-to-posterior"
  • [7]
  • [8] -- This one's already cited in the article, but there is a lot more you can get from it (and a lot of overly-detailed stuff from it that should be tossed for the more essential parts)
  • [9] -- anterior margin marks beginning of gastrulation ... etc.
  • "Gastrulation movements"
  • [10]
  • [11] - "Early gastrulation"
  • [12] "Covergence and extension movements"
  • [13]
  • [14] -- excellent comparative description of neurulation/induction in various species ...
  • [15] -- mouse gastrulation
  • [16] -- Wnt signaling
  • [17] -- talks about chordates vs. other critters and how their early embryogenesis is diff.
  • [18] -- "final result is similar in all species -- three layers"
  • BMP signaling neurulation ectoderm ... [19][20]
  • [21] -- sea urchin gastru ... great diagram on next page too
Tight junctions connect epithelial cells in several locations, making epithelial tissue relatively impermeable
The image shows how keratin cytoskeletal filaments are concentrated around the edge of the cells and merge into the desmoplakin which is located at en:wikipedia:desmosomes of the surface membrane. The network of keratin to desmosome to keratin linking the cells of an epithelial sheet is what holds together tissues like skin.
  • In the general structure section, make sure that you cover the .... ummmm ... most general parts first. So don't start talking about simple vs. stratified, until you've covered what they've all got in common (basement layer, tight junctions, desmosomes, innervated/avascular, cytokeratin proteins, etc.)
  • Pseudostratified and transitional epithelium should be mentioned as special cases for simple and stratified epithelia respectively. However, squamous, cuboidal, and columnar should just be mentioned once (make drawings for each of these shape types -- simple, simple to do)
  • Also, make sure that each of the types of epithelia are linked to (e.g. simple squamous epithelium, etc. etc.)
  • Figure out how to get rid of the big table of "Locations". Maybe make an "Appendix" at Epithelium/Appendix? Is that legal? :)
  • You might as well integrate the "Functions" and "Types of epithelia" section into one -- since you're going to have to talk about different functions for each type anyway ...
Desmosome junctions

Ecology

[edit]


Modes of operation

[edit]

A block cipher by itself allows encryption only of a single data block of the cipher's block length. When targeting a variable-length message, the data must first be partitioned into separate cipher blocks. Typically, the last block must also be extended to match the cipher's block length using a suitable padding scheme. A mode of operation describes the process of encrypting each of these blocks, and generally uses randomization based on an additional input value, often called an initialization vector, to allow doing so safely.[3][4] We will now discuss 4 standard block cipher modes of operation -- ECB, CBC, CFB, and OFB -- and the strengths and weaknesses of each of them.[5]

Electronic codebook (ECB)

[edit]
In electronic code book (ECB) mode (the simplest block cipher mode of operation) the message is divided into blocks and each block is encrypted separately. The disadvantage of this method is that identical plaintext blocks are encrypted into identical ciphertext blocks; thus, if an attacker finds two ciphertext blocks that are equal, then they know that the blocks represent equal plaintext. This is a severe weakness, making ECB unsuitable for secure cryptosystems.

The simplest of the encryption modes is the electronic codebook (ECB) mode. The message is divided into blocks and each block is encrypted separately.

The disadvantage of this method is that identical plaintext blocks are encrypted into identical ciphertext blocks; thus, it does not hide data patterns well. In some senses, it doesn't provide serious message confidentiality, and it is not recommended for use in cryptographic protocols at all. A striking example of the degree to which ECB can leave plaintext data patterns in the ciphertext is shown below; a pixel-map version of the image on the left was encrypted with ECB mode to create the center image, versus a non-ECB mode for the right image.

Original Encrypted using ECB mode Modes other than ECB result in pseudo-randomness

The image on the right is how the image might appear encrypted with CBC, CTR or any of the other more secure modes—indistinguishable from random noise. Note that the random appearance of the image on the right does not ensure that the image has been securely encrypted; many kinds of insecure encryption have been developed which would produce output just as 'random-looking'.

Cipher-block chaining (CBC)

[edit]
In cipher-block chaining (CBC) mode, each block of plaintext is XORed with the previous ciphertext block before being encrypted. This way, each ciphertext block is dependent on all plaintext blocks processed up to that point. CBC has been the most commonly used mode of operation. Its main drawbacks are that encryption is sequential (i.e., it cannot be parallelized), and that the message must be padded to a multiple of the cipher block size. Note that a one-bit change in a plaintext or IV affects all following ciphertext blocks.

In the cipher-block chaining (CBC) mode of operation each block of plaintext is XORed with the previous ciphertext block before being encrypted. This way, each ciphertext block is dependent on all plaintext blocks processed up to that point.

Also, to make each message unique, an initialization vector (IV) must be used in the first block. An IV is a block of bits that is used by several modes to randomize the encryption and hence to produce distinct ciphertexts even if the same plaintext is encrypted multiple times, without the need for a slower re-keying process. An IV has different security requirements than a key, so the IV usually does not need to be secret. However, in most cases, it is important that an IV is never reused under the same key. For CBC and CFB, reusing an IV leaks some information about the first block of plaintext, and about any common prefix shared by the two messages.[6]

If the first block has index 1, the mathematical formula for CBC encryption is

while the mathematical formula for CBC decryption is

CBC has been the most commonly used mode of operation. Its main drawbacks are that encryption is sequential (i.e., it cannot be parallelized), and that the message must be padded to a multiple of the cipher block size. One way to handle this last issue is through the method known as ciphertext stealing. Note that a one-bit change in a plaintext or IV affects all following ciphertext blocks.

Cipher feedback (CFB)

[edit]
Cipher feedback (CFB) mode is one method of turning a block cipher into a stream cipher.

The cipher feedback (CFB) mode, a close relative of CBC, makes a block cipher into a self-synchronizing stream cipher. Operation is very similar; in particular, CFB decryption is almost identical to CBC encryption performed in reverse:

CFB, OFB and CTR modes do not require any special measures to handle messages whose lengths are not multiples of the block size, since the modes work by XORing the plaintext with the output of the block cipher. The last partial block of plaintext is XORed with the first few bytes of the last keystream block, producing a final ciphertext block that is the same size as the final partial plaintext block. This characteristic of stream ciphers makes them suitable for applications that require the encrypted ciphertext data to be the same size as the original plaintext data, and for applications that transmit data in streaming form where it is inconvenient to add padding bytes.

Output feedback (OFB)

[edit]
Output feedback mode makes a block cipher into a synchronous stream cipher

Like CFB output feedback (OFB) mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext. Just as with other stream ciphers, flipping a bit in the ciphertext produces a flipped bit in the plaintext at the same location. This property allows many error correcting codes to function normally even when applied before encryption.

Because of the symmetry of the XOR operation, encryption and decryption are exactly the same:

Each output feedback block cipher operation depends on all previous ones, and so cannot be performed in parallel. However, because the plaintext or ciphertext is only used for the final XOR, the block cipher operations may be performed in advance, allowing the final step to be performed in parallel once the plaintext or ciphertext is available.

Multiple watchlists

[edit]
Issues w/ current situation
  • If you've got a very large watchlist, it makes it very difficult to catch interesting changes amidst all the noise.
  • Makes it less likely that will watch some pages, even if I probably should, because I don't want to clutter my watchlist
What would mult. lists let us do
  • Could create temporary watchlists for pages that you've recently fixed vandalism on, etc, but don't want to watch forever.
  • Could organize watchlists by topic, so only have to watch articles in subject you're currently interested in
  • Place high priority items in one watch-list, and low priority in another
  • Could create separate lists for User/Template/Project from Article namespace.
  • Could have public/private watchlists
Problems with implementation
  • Here it says that the problem has to do with the way the DB tables are set up ... 31 million rows, hard to alter.
Major past discussions
Technical

Other articles that need work

[edit]

Footnotes

[edit]
  1. ^ Martin, David (1993). "The Birth of Jim Crow in Alabama 1865-1896" (PDF). National Black Law Journal. 13 (1): 184–197.
  2. ^ "Ecological subsystems via graph theory: the role of strongly connected components". Oikos. 110 (1): 164–176. July 2005. {{cite journal}}: Unknown parameter |authors= ignored (help)
  3. ^ Handbook of Applied Cryptography. CRC Press. 1996. ISBN 0-8493-8523-7. {{cite book}}: Unknown parameter |authors= ignored (help)
  4. ^ "Block Cipher Modes". NIST Computer Security Resource Center.
  5. ^ The Block Cipher Companion. Springer. 2011. p. 65. ISBN 9783642173417. {{cite book}}: Unknown parameter |authors= ignored (help)
  6. ^ B. Moeller (May 20, 2004), Security of CBC Ciphersuites in SSL/TLS: Problems and Countermeasures