Jump to content

User:Mesoderm/sandbox

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Mesoderm (talk | contribs) at 23:40, 13 October 2022 (References). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.


The current area of focus is:

Fertilization-->Gastrulation-->Neurulation-->Nervous system-->Neurotoxins
Peer-to-peer -- Wireless mesh networks -- Distributed computing
  • Spanish slavery of indigenous people?
  • Slavery was present in Alabama before it became a state (when the region was still part of the Alabama/Mississippi Territory)

Settlement and early slavery

Alabama was admitted as the 22nd state on December 14, 1819, with Congress selecting Huntsville as the site for the first Constitutional Convention. From July 5 to August 2, 1819, delegates met to prepare the new state constitution. Huntsville served as temporary capital from 1819 to 1820, when the seat of government moved to Cahaba in Dallas County.[1]

Cahaba, now a ghost town, was the first permanent state capital from 1820 to 1825.[2] The Alabama Fever land rush was underway when the state was admitted to the Union, with settlers and land speculators pouring into the state to take advantage of fertile land suitable for cotton cultivation.[3][4] Part of the frontier in the 1820s and 1830s, its constitution provided for universal suffrage for white men.[5]

The main house, built in 1833, at Thornhill in Greene County. It is a former Black Belt plantation.

Southeastern planters and traders from the Upper South brought slaves with them as the cotton plantations in Alabama expanded. The economy of the central Black Belt (named for its dark, productive soil) was built around large cotton plantations whose owners' wealth grew mainly from slave labor.[5] The area also drew many poor, disenfranchised people who became subsistence farmers. Alabama had an estimated population of under 10,000 people in 1810, but it increased to more than 300,000 people by 1830.[3] Most Native American tribes were completely removed from the state within a few years of the passage of the Indian Removal Act by Congress in 1830.[6]

References

  • "Slavery", Keith S. Herbert; Encylopedia of Alabama (Auburn University); August 5, 2009

Indigenous Alabama

  • focus on several prominent examples of different p2p apps, but move most of them to a separate list page ("List of P2P applications" or something) ... select small # of apps (freenet, kademlia, napster, bittorrent, skype/voip, chord, etc.)
  • write blurb re: applications in article intro

After lead, and before basic definitions, we need an "introductory example" section

Introductory remarks

A graph is a collection of objects called vertices (or nodes), along with a set of edges connecting pairs of these nodes to each other, based on some kind of relationship.

Graphs can be used to model a wide variety of problems across many domains - in particular, any domain where one is trying to study interactions between large, complex collections of discrete objects that are pairwise related or connected to each other.

We can mathematically represent networks like the food web above as graphs, where each part of the food web is a node, and the energy/nutrients transferred are represented by edges (arrows + weights)

Take for example the following problems:

All of these systems can be modeled as weighted, directed graphs (described below). In a graph representing the communications network the nodes might represent routers, and the edges would describe connections between routers and the speeds of these connections. On the other hand, in a graph modeling a cargo shipping network the nodes might represent individual cities, while the edges represent the costs of sending goods between two particular cities. But in both cases, we use essentially the same mathematical tools.

2
3
4
Graphs can be utilized across many problem domains. For instance, a logistics firm might represent the European railroad network as a graph, with individual cities as nodes and rail lines as edges. In computer network administration, graphs can be used to help optimize the flow of Internet traffic between routers.

Likewise, both the intelligence agent and the ecologist might utilize graph clustering methods to identify important groupings of nodes ...

use this as example of how food webs and online social networks could be represented as graph, clusters id'd, etc ... find an image of food web and one of online social graph

Refs

prisons

The social role of prisons

Privatized / for-profit prisons

Race, class, and mass incarceration

Military prisons and internment/concentration camps

... articles above need to be written from non-anthropocentric perspective (with exception of Menstrual cycle etc that are actually about human bio). Human reproductive biology should be in articles titled like "Ovulation in humans" ... and then WP:SUMMARYed in the article Ovulation in a section called "Humans" ... and so on

... a diagram or photo series is need for the "ovulation" article

...

Herbal

  • Ethnobotanical data
  • Commonly used preparations, and their mode of operation-
  • Studies on effectiveness/safety/etc.
  • Modern pharmaceutical derivatives

Pharmaceutical industry

  • Major manufacturers of common brands, usage stats, sales $$$, mechanism, health effects

Some refs

  • Lead
  • Process
  • Context: Overview of blastula/cleavage/fertilization (in 1 paragraph)
  • Loss of symmetry
  • Amniotes --primitive streak (mammals, birds, reptiles)[3] [4]
  • Differences in gastrulation process in various species (definitely cover sponges, mice, humans)
  • Germ layers and role of each


  • Create SVG rendition of Figure 8.4 here
  • Another good diagram at Fig. 2.1 here
  • [6] -- "dynamic process, that proceeds from anterior-to-posterior"
  • [7]
  • [8] -- This one's already cited in the article, but there is a lot more you can get from it (and a lot of overly-detailed stuff from it that should be tossed for the more essential parts)
  • [9] -- anterior margin marks beginning of gastrulation ... etc.
  • "Gastrulation movements"
  • [10]
  • [11] - "Early gastrulation"
  • [12] "Covergence and extension movements"
  • [13]
  • [14] -- excellent comparative description of neurulation/induction in various species ...
  • [15] -- mouse gastrulation
  • [16] -- Wnt signaling
  • [17] -- talks about chordates vs. other critters and how their early embryogenesis is diff.
  • [18] -- "final result is similar in all species -- three layers"
  • BMP signaling neurulation ectoderm ... [19][20]
  • [21] -- sea urchin gastru ... great diagram on next page too
Tight junctions connect epithelial cells in several locations, making epithelial tissue relatively impermeable
The image shows how keratin cytoskeletal filaments are concentrated around the edge of the cells and merge into the desmoplakin which is located at en:wikipedia:desmosomes of the surface membrane. The network of keratin to desmosome to keratin linking the cells of an epithelial sheet is what holds together tissues like skin.
  • In the general structure section, make sure that you cover the .... ummmm ... most general parts first. So don't start talking about simple vs. stratified, until you've covered what they've all got in common (basement layer, tight junctions, desmosomes, innervated/avascular, cytokeratin proteins, etc.)
  • Pseudostratified and transitional epithelium should be mentioned as special cases for simple and stratified epithelia respectively. However, squamous, cuboidal, and columnar should just be mentioned once (make drawings for each of these shape types -- simple, simple to do)
  • Also, make sure that each of the types of epithelia are linked to (e.g. simple squamous epithelium, etc. etc.)
  • Figure out how to get rid of the big table of "Locations". Maybe make an "Appendix" at Epithelium/Appendix? Is that legal? :)
  • You might as well integrate the "Functions" and "Types of epithelia" section into one -- since you're going to have to talk about different functions for each type anyway ...
Desmosome junctions

Ecology


Modes of operation

A block cipher by itself allows encryption only of a single data block of the cipher's block length. When targeting a variable-length message, the data must first be partitioned into separate cipher blocks. Typically, the last block must also be extended to match the cipher's block length using a suitable padding scheme. A mode of operation describes the process of encrypting each of these blocks, and generally uses randomization based on an additional input value, often called an initialization vector, to allow doing so safely.[8][9] We will now discuss 4 standard block cipher modes of operation -- ECB, CBC, CFB, and OFB -- and the strengths and weaknesses of each of them.[10]

Electronic codebook (ECB)

In electronic code book (ECB) mode (the simplest block cipher mode of operation) the message is divided into blocks and each block is encrypted separately. The disadvantage of this method is that identical plaintext blocks are encrypted into identical ciphertext blocks; thus, if an attacker finds two ciphertext blocks that are equal, then they know that the blocks represent equal plaintext. This is a severe weakness, making ECB unsuitable for secure cryptosystems.

The simplest of the encryption modes is the electronic codebook (ECB) mode. The message is divided into blocks and each block is encrypted separately.

The disadvantage of this method is that identical plaintext blocks are encrypted into identical ciphertext blocks; thus, it does not hide data patterns well. In some senses, it doesn't provide serious message confidentiality, and it is not recommended for use in cryptographic protocols at all. A striking example of the degree to which ECB can leave plaintext data patterns in the ciphertext is shown below; a pixel-map version of the image on the left was encrypted with ECB mode to create the center image, versus a non-ECB mode for the right image.

Original Encrypted using ECB mode Modes other than ECB result in pseudo-randomness

The image on the right is how the image might appear encrypted with CBC, CTR or any of the other more secure modes—indistinguishable from random noise. Note that the random appearance of the image on the right does not ensure that the image has been securely encrypted; many kinds of insecure encryption have been developed which would produce output just as 'random-looking'.

Cipher-block chaining (CBC)

In cipher-block chaining (CBC) mode, each block of plaintext is XORed with the previous ciphertext block before being encrypted. This way, each ciphertext block is dependent on all plaintext blocks processed up to that point. CBC has been the most commonly used mode of operation. Its main drawbacks are that encryption is sequential (i.e., it cannot be parallelized), and that the message must be padded to a multiple of the cipher block size. Note that a one-bit change in a plaintext or IV affects all following ciphertext blocks.

In the cipher-block chaining (CBC) mode of operation each block of plaintext is XORed with the previous ciphertext block before being encrypted. This way, each ciphertext block is dependent on all plaintext blocks processed up to that point.

Also, to make each message unique, an initialization vector (IV) must be used in the first block. An IV is a block of bits that is used by several modes to randomize the encryption and hence to produce distinct ciphertexts even if the same plaintext is encrypted multiple times, without the need for a slower re-keying process. An IV has different security requirements than a key, so the IV usually does not need to be secret. However, in most cases, it is important that an IV is never reused under the same key. For CBC and CFB, reusing an IV leaks some information about the first block of plaintext, and about any common prefix shared by the two messages.[11]

If the first block has index 1, the mathematical formula for CBC encryption is

while the mathematical formula for CBC decryption is

CBC has been the most commonly used mode of operation. Its main drawbacks are that encryption is sequential (i.e., it cannot be parallelized), and that the message must be padded to a multiple of the cipher block size. One way to handle this last issue is through the method known as ciphertext stealing. Note that a one-bit change in a plaintext or IV affects all following ciphertext blocks.

Cipher feedback (CFB)

Cipher feedback (CFB) mode is one method of turning a block cipher into a stream cipher.

The cipher feedback (CFB) mode, a close relative of CBC, makes a block cipher into a self-synchronizing stream cipher. Operation is very similar; in particular, CFB decryption is almost identical to CBC encryption performed in reverse:

CFB, OFB and CTR modes do not require any special measures to handle messages whose lengths are not multiples of the block size, since the modes work by XORing the plaintext with the output of the block cipher. The last partial block of plaintext is XORed with the first few bytes of the last keystream block, producing a final ciphertext block that is the same size as the final partial plaintext block. This characteristic of stream ciphers makes them suitable for applications that require the encrypted ciphertext data to be the same size as the original plaintext data, and for applications that transmit data in streaming form where it is inconvenient to add padding bytes.

Output feedback (OFB)

Output feedback mode makes a block cipher into a synchronous stream cipher

Like CFB output feedback (OFB) mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext. Just as with other stream ciphers, flipping a bit in the ciphertext produces a flipped bit in the plaintext at the same location. This property allows many error correcting codes to function normally even when applied before encryption.

Because of the symmetry of the XOR operation, encryption and decryption are exactly the same:

Each output feedback block cipher operation depends on all previous ones, and so cannot be performed in parallel. However, because the plaintext or ciphertext is only used for the final XOR, the block cipher operations may be performed in advance, allowing the final step to be performed in parallel once the plaintext or ciphertext is available.

Multiple watchlists

Issues w/ current situation
  • If you've got a very large watchlist, it makes it very difficult to catch interesting changes amidst all the noise.
  • Makes it less likely that will watch some pages, even if I probably should, because I don't want to clutter my watchlist
What would mult. lists let us do
  • Could create temporary watchlists for pages that you've recently fixed vandalism on, etc, but don't want to watch forever.
  • Could organize watchlists by topic, so only have to watch articles in subject you're currently interested in
  • Place high priority items in one watch-list, and low priority in another
  • Could create separate lists for User/Template/Project from Article namespace.
  • Could have public/private watchlists
Problems with implementation
  • Here it says that the problem has to do with the way the DB tables are set up ... 31 million rows, hard to alter.
Major past discussions
Technical

Other articles that need work

Footnotes

  1. ^ "Huntsville". The Encyclopedia of Alabama. Alabama Humanities Foundation. Archived from the original on January 22, 2013. Retrieved January 22, 2013.
  2. ^ "Old Cahawba, Alabama's first state capital, 1820 to 1826". Old Cahawba: A Cahawba Advisory Committee Project. Archived from the original on August 21, 2012. Retrieved September 22, 2012.
  3. ^ a b LeeAnna Keith (October 13, 2011). "Alabama Fever". Encyclopedia of Alabama. Auburn University. Archived from the original on January 17, 2013. Retrieved September 22, 2012.
  4. ^ "Alabama Fever". Alabama Department of Archives and History. State of Alabama. Archived from the original on January 17, 2013. Retrieved September 22, 2012.
  5. ^ a b Tullos, Allen (April 19, 2004). "The Black Belt". Southern Spaces. Emory University. doi:10.18737/M70K6P. Archived from the original on January 11, 2011. Retrieved September 23, 2006.
  6. ^ Wayne Flynt (July 9, 2008). "Alabama". Encyclopedia of Alabama. Auburn University. Archived from the original on September 6, 2012. Retrieved September 22, 2012.
  7. ^ "Ecological subsystems via graph theory: the role of strongly connected components". Oikos. 110 (1): 164–176. July 2005. {{cite journal}}: Unknown parameter |authors= ignored (help)
  8. ^ Handbook of Applied Cryptography. CRC Press. 1996. ISBN 0-8493-8523-7. {{cite book}}: Unknown parameter |authors= ignored (help)
  9. ^ "Block Cipher Modes". NIST Computer Security Resource Center.
  10. ^ The Block Cipher Companion. Springer. 2011. p. 65. ISBN 9783642173417. {{cite book}}: Unknown parameter |authors= ignored (help)
  11. ^ B. Moeller (May 20, 2004), Security of CBC Ciphersuites in SSL/TLS: Problems and Countermeasures