User:Mesoderm/sandbox

The current area of focus is:
- Fertilization-->Gastrulation-->Neurulation-->Nervous system-->Neurotoxins
- Peer-to-peer -- Wireless mesh networks -- Distributed computing
- Spanish slavery of indigenous people?
- Slavery was present in Alabama before it became a state (when the region was still part of the Alabama/Mississippi Territory)
Settlement and early slavery
Alabama was admitted as the 22nd state on December 14, 1819, with Congress selecting Huntsville as the site for the first Constitutional Convention. From July 5 to August 2, 1819, delegates met to prepare the new state constitution. Huntsville served as temporary capital from 1819 to 1820, when the seat of government moved to Cahaba in Dallas County.[1]
Cahaba, now a ghost town, was the first permanent state capital from 1820 to 1825.[2] The Alabama Fever land rush was underway when the state was admitted to the Union, with settlers and land speculators pouring into the state to take advantage of fertile land suitable for cotton cultivation.[3][4] Part of the frontier in the 1820s and 1830s, its constitution provided for universal suffrage for white men.[5]

Southeastern planters and traders from the Upper South brought slaves with them as the cotton plantations in Alabama expanded. The economy of the central Black Belt (named for its dark, productive soil) was built around large cotton plantations whose owners' wealth grew mainly from slave labor.[5] The area also drew many poor, disenfranchised people who became subsistence farmers. Alabama had an estimated population of under 10,000 people in 1810, but it increased to more than 300,000 people by 1830.[3] Most Native American tribes were completely removed from the state within a few years of the passage of the Indian Removal Act by Congress in 1830.[6]
References
- "Slavery", Keith S. Herbert; Encylopedia of Alabama (Auburn University); August 5, 2009
Indigenous Alabama
- focus on several prominent examples of different p2p apps, but move most of them to a separate list page ("List of P2P applications" or something) ... select small # of apps (freenet, kademlia, napster, bittorrent, skype/voip, chord, etc.)
- write blurb re: applications in article intro
After lead, and before basic definitions, we need an "introductory example" section
Introductory remarks
A graph is a collection of objects called vertices (or nodes), along with a set of edges connecting pairs of these nodes to each other, based on some kind of relationship.
Graphs can be used to model a wide variety of problems across many domains - in particular, any domain where one is trying to study interactions between large, complex collections of discrete objects that are pairwise related or connected to each other.

Take for example the following problems:
- A network administrator trying to efficiently direct traffic on a communications network
- Logistics personnel shipping cargo throughout a country by rail
- An intelligence agency performing social network analysis to map out hostile online communities and target influential individuals
- An ecologist mapping the flow of energy/nutrients through a complex food web[7]
All of these systems can be modeled as weighted, directed graphs (described below). In a graph representing the communications network the nodes might represent routers, and the edges would describe connections between routers and the speeds of these connections. On the other hand, in a graph modeling a cargo shipping network the nodes might represent individual cities, while the edges represent the costs of sending goods between two particular cities. But in both cases, we use essentially the same mathematical tools.
Likewise, both the intelligence agent and the ecologist might utilize graph clustering methods to identify important groupings of nodes ...

Refs
prisons
The social role of prisons
![]() | This section needs expansion. You can help by adding to it. |
Privatized / for-profit prisons
![]() | This section needs expansion. You can help by adding to it. |
Race, class, and mass incarceration
![]() | This section needs expansion. You can help by adding to it. |
Military prisons and internment/concentration camps
![]() | This section needs expansion. You can help by adding to it. |
- Menstrual cycle
- Estrogen
- Progesterone
- Luteinizing hormone
- Follicle-stimulating hormone
- Follicular phase
- Ovulation
- Luteal phase
... articles above need to be written from non-anthropocentric perspective (with exception of Menstrual cycle etc that are actually about human bio). Human reproductive biology should be in articles titled like "Ovulation in humans" ... and then WP:SUMMARYed in the article Ovulation in a section called "Humans" ... and so on
... a diagram or photo series is need for the "ovulation" article
...
Herbal
- Ethnobotanical data
- Commonly used preparations, and their mode of operation-
- Studies on effectiveness/safety/etc.
- Modern pharmaceutical derivatives
- Thujone (wormwood, yarrow, tansy, etc.)
- Dong quai
- Progesterone <---> Vitamin C ?
- Cotton root
- Blue cohosh
- Pennyroyal
Pharmaceutical industry
- Major manufacturers of common brands, usage stats, sales $$$, mechanism, health effects
- Embryo
- Embryogenesis -- start here, and break off into sub-articles as gets too long
- Blastula
- Chordamesoderm
- Mesoderm
- Somites / Somitogenesis
- Better images/diagrams (SVG) needed for many embryology articles ... it's learn Inkscape time
Some refs
- http://www.theodora.com/anatomy/embryology_index.html
- [1] -- good start for some ideas for graphics.
- Good diagram for everything up to glastulation is Figure 1.2 here
- [2] -- good stuff
- Lead
- Process
- Context: Overview of blastula/cleavage/fertilization (in 1 paragraph)
- Loss of symmetry
- Amniotes --primitive streak (mammals, birds, reptiles)[3] [4]
- Formation of primitive streak [5]
- "Primitive streak early avian gastrula"
- Ingression -- cells ingress into primitive streak/primitive node
- Evolutionary development (triploblasts, chordates)
- Differences in gastrulation process in various species (definitely cover sponges, mice, humans)
- Overview of place/role in Embryogenesis
- Germ layers and role of each
- [6] -- "dynamic process, that proceeds from anterior-to-posterior"
- [7]
- [8] -- This one's already cited in the article, but there is a lot more you can get from it (and a lot of overly-detailed stuff from it that should be tossed for the more essential parts)
- [9] -- anterior margin marks beginning of gastrulation ... etc.
- "Gastrulation movements"
- [10]
- [11] - "Early gastrulation"
- [12] "Covergence and extension movements"
- [13]
- [14] -- excellent comparative description of neurulation/induction in various species ...
- [15] -- mouse gastrulation
- [16] -- Wnt signaling
- [17] -- talks about chordates vs. other critters and how their early embryogenesis is diff.
- [18] -- "final result is similar in all species -- three layers"
- BMP signaling neurulation ectoderm ... [19][20]
- [21] -- sea urchin gastru ... great diagram on next page too


- Good diagram ... should have multiple cells shown though ... many more here
- In the general structure section, make sure that you cover the .... ummmm ... most general parts first. So don't start talking about simple vs. stratified, until you've covered what they've all got in common (basement layer, tight junctions, desmosomes, innervated/avascular, cytokeratin proteins, etc.)
- Take Table of simple epithelium types content back into articles and delete template.
- Pseudostratified and transitional epithelium should be mentioned as special cases for simple and stratified epithelia respectively. However, squamous, cuboidal, and columnar should just be mentioned once (make drawings for each of these shape types -- simple, simple to do)
- Also, make sure that each of the types of epithelia are linked to (e.g. simple squamous epithelium, etc. etc.)
- Figure out how to get rid of the big table of "Locations". Maybe make an "Appendix" at Epithelium/Appendix? Is that legal? :)
- Create article List of epithelial tissues consisting of an intro and the table
- You might as well integrate the "Functions" and "Types of epithelia" section into one -- since you're going to have to talk about different functions for each type anyway ...

Ecology
Modes of operation
A block cipher by itself allows encryption only of a single data block of the cipher's block length. When targeting a variable-length message, the data must first be partitioned into separate cipher blocks. Typically, the last block must also be extended to match the cipher's block length using a suitable padding scheme. A mode of operation describes the process of encrypting each of these blocks, and generally uses randomization based on an additional input value, often called an initialization vector, to allow doing so safely.[8][9] We will now discuss 4 standard block cipher modes of operation -- ECB, CBC, CFB, and OFB -- and the strengths and weaknesses of each of them.[10]
Electronic codebook (ECB)

The simplest of the encryption modes is the electronic codebook (ECB) mode. The message is divided into blocks and each block is encrypted separately.
The disadvantage of this method is that identical plaintext blocks are encrypted into identical ciphertext blocks; thus, it does not hide data patterns well. In some senses, it doesn't provide serious message confidentiality, and it is not recommended for use in cryptographic protocols at all. A striking example of the degree to which ECB can leave plaintext data patterns in the ciphertext is shown below; a pixel-map version of the image on the left was encrypted with ECB mode to create the center image, versus a non-ECB mode for the right image.
![]() |
![]() |
![]() |
Original | Encrypted using ECB mode | Modes other than ECB result in pseudo-randomness |
The image on the right is how the image might appear encrypted with CBC, CTR or any of the other more secure modes—indistinguishable from random noise. Note that the random appearance of the image on the right does not ensure that the image has been securely encrypted; many kinds of insecure encryption have been developed which would produce output just as 'random-looking'.
Cipher-block chaining (CBC)

In the cipher-block chaining (CBC) mode of operation each block of plaintext is XORed with the previous ciphertext block before being encrypted. This way, each ciphertext block is dependent on all plaintext blocks processed up to that point.
Also, to make each message unique, an initialization vector (IV) must be used in the first block. An IV is a block of bits that is used by several modes to randomize the encryption and hence to produce distinct ciphertexts even if the same plaintext is encrypted multiple times, without the need for a slower re-keying process. An IV has different security requirements than a key, so the IV usually does not need to be secret. However, in most cases, it is important that an IV is never reused under the same key. For CBC and CFB, reusing an IV leaks some information about the first block of plaintext, and about any common prefix shared by the two messages.[11]
If the first block has index 1, the mathematical formula for CBC encryption is
while the mathematical formula for CBC decryption is
CBC has been the most commonly used mode of operation. Its main drawbacks are that encryption is sequential (i.e., it cannot be parallelized), and that the message must be padded to a multiple of the cipher block size. One way to handle this last issue is through the method known as ciphertext stealing. Note that a one-bit change in a plaintext or IV affects all following ciphertext blocks.
Cipher feedback (CFB)

The cipher feedback (CFB) mode, a close relative of CBC, makes a block cipher into a self-synchronizing stream cipher. Operation is very similar; in particular, CFB decryption is almost identical to CBC encryption performed in reverse:
CFB, OFB and CTR modes do not require any special measures to handle messages whose lengths are not multiples of the block size, since the modes work by XORing the plaintext with the output of the block cipher. The last partial block of plaintext is XORed with the first few bytes of the last keystream block, producing a final ciphertext block that is the same size as the final partial plaintext block. This characteristic of stream ciphers makes them suitable for applications that require the encrypted ciphertext data to be the same size as the original plaintext data, and for applications that transmit data in streaming form where it is inconvenient to add padding bytes.
Output feedback (OFB)

Like CFB output feedback (OFB) mode makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext. Just as with other stream ciphers, flipping a bit in the ciphertext produces a flipped bit in the plaintext at the same location. This property allows many error correcting codes to function normally even when applied before encryption.
Because of the symmetry of the XOR operation, encryption and decryption are exactly the same:
Each output feedback block cipher operation depends on all previous ones, and so cannot be performed in parallel. However, because the plaintext or ciphertext is only used for the final XOR, the block cipher operations may be performed in advance, allowing the final step to be performed in parallel once the plaintext or ciphertext is available.
Multiple watchlists
- Issues w/ current situation
- If you've got a very large watchlist, it makes it very difficult to catch interesting changes amidst all the noise.
- Makes it less likely that will watch some pages, even if I probably should, because I don't want to clutter my watchlist
- What would mult. lists let us do
- Could create temporary watchlists for pages that you've recently fixed vandalism on, etc, but don't want to watch forever.
- Could organize watchlists by topic, so only have to watch articles in subject you're currently interested in
- Place high priority items in one watch-list, and low priority in another
- Could create separate lists for User/Template/Project from Article namespace.
- Could have public/private watchlists
- Problems with implementation
- Here it says that the problem has to do with the way the DB tables are set up ... 31 million rows, hard to alter.
- Major past discussions
- Technical
Other articles that need work
- Amplification
- Oil and gas production
- Malaria
- Gel electrophoresis
- Genetic engineering
- Polymerase chain reaction
- Recombinant DNA
- Sickle cell anemia
Footnotes
- ^ "Huntsville". The Encyclopedia of Alabama. Alabama Humanities Foundation. Archived from the original on January 22, 2013. Retrieved January 22, 2013.
- ^ "Old Cahawba, Alabama's first state capital, 1820 to 1826". Old Cahawba: A Cahawba Advisory Committee Project. Archived from the original on August 21, 2012. Retrieved September 22, 2012.
- ^ a b LeeAnna Keith (October 13, 2011). "Alabama Fever". Encyclopedia of Alabama. Auburn University. Archived from the original on January 17, 2013. Retrieved September 22, 2012.
- ^ "Alabama Fever". Alabama Department of Archives and History. State of Alabama. Archived from the original on January 17, 2013. Retrieved September 22, 2012.
- ^ a b Tullos, Allen (April 19, 2004). "The Black Belt". Southern Spaces. Emory University. doi:10.18737/M70K6P. Archived from the original on January 11, 2011. Retrieved September 23, 2006.
- ^ Wayne Flynt (July 9, 2008). "Alabama". Encyclopedia of Alabama. Auburn University. Archived from the original on September 6, 2012. Retrieved September 22, 2012.
- ^ "Ecological subsystems via graph theory: the role of strongly connected components". Oikos. 110 (1): 164–176. July 2005.
{{cite journal}}
: Unknown parameter|authors=
ignored (help) - ^ Handbook of Applied Cryptography. CRC Press. 1996. ISBN 0-8493-8523-7.
{{cite book}}
: Unknown parameter|authors=
ignored (help) - ^ "Block Cipher Modes". NIST Computer Security Resource Center.
- ^ The Block Cipher Companion. Springer. 2011. p. 65. ISBN 9783642173417.
{{cite book}}
: Unknown parameter|authors=
ignored (help) - ^ B. Moeller (May 20, 2004), Security of CBC Ciphersuites in SSL/TLS: Problems and Countermeasures