An art model is a model who poses for any visual artist as part of the creative process. The most common types of art works which use models are figure drawing, figure painting, sculpture and photography, but almost any medium may be used.
Art models are often paid professionals who pose or provide the human figure in a work of art. Though professional, art models are usually anonymous and unacknowledged subjects of the work. Models are most frequently employed for art classes or by informal groups of experienced artists that gather to share the expense of a model. Models are also employed privately by professional artists. Although commercial motives dominate over aesthetics in illustration, its artwork commonly employs models. For example, Norman Rockwell used his friends and neighbors as models for both his commercial and fine art work. An individual who is having their own portrait painted or sculpted is usually called a "sitter" rather than a model, since they are paying to have the work done rather than being paid to pose.
In evolutionary biology, mimicry is a similarity of one species to another that protects one or both. In the case of prey species, it is a class of antipredator adaptation. This similarity can be in appearance, behaviour, sound or scent. Mimics occur in the same areas as their models.
Mimicry occurs when a group of organisms, the mimics, evolve to share perceived characteristics with another group, the models. The evolution is driven by the selective action of a signal-receiver or dupe. Birds, for example, use sight to identify palatable insects (the mimics), whilst avoiding the noxious models.
The model is usually another species, except in cases of automimicry. The deceived signal-receiver is typically another organism, such as the common predator of two species. As an interaction, mimicry is in most cases advantageous to the mimic and harmful to the receiver, but may increase, reduce or have no effect on the fitness of the model depending on the situation. The model may be hard to identify: for example, eye spots may not resemble any specific organism's eyes, and camouflage often cannot be attributed to a particular model.
DES or Des may refer to:
Dessie (Amharic: ደሴ?) (also spelled Dese or Dessye), is a city and a woreda in north-central Ethiopia. Located in the Debub Wollo Zone of the Amhara Region, it sits at a latitude and longitude of 11°8′N 39°38′E / 11.133°N 39.633°E / 11.133; 39.633, with an elevation between 2,470 and 2,550 metres above sea level.
Dessie is located along Ethiopian Highway 1. It has postal service (a post office was established in the 1920s), and telephone service from at least as early as 1954. The city has had electrical power since at least 1963 when a new diesel-powered electric power station with a power line to Kombolcha was completed, at a cost of Eth$ 110,000. Intercity bus service is provided by the Selam Bus Line Share Company. Dessie shares Combolcha Airport (ICAO code HADC, IATA DSE) with neighbouring Kombolcha.
Dessie is home to a museum, in the former home of Dejazmach Yoseph Birru. It also has a zawiya of the Qadiriyya order of Islam, which was the first Sufi order to be introduced into north-east Africa.
The Data Encryption Standard (DES, /ˌdiːˌiːˈɛs/ or /ˈdɛz/) was once a predominant symmetric-key algorithm for the encryption of electronic data. It was highly influential in the advancement of modern cryptography in the academic world. Developed in the early 1970s at IBM and based on an earlier design by Horst Feistel, the algorithm was submitted to the National Bureau of Standards (NBS) following the agency's invitation to propose a candidate for the protection of sensitive, unclassified electronic government data. In 1976, after consultation with the National Security Agency (NSA), the NBS eventually selected a slightly modified version (strengthened against differential cryptanalysis, but weakened against brute force attacks), which was published as an official Federal Information Processing Standard (FIPS) for the United States in 1977. The publication of an NSA-approved encryption standard simultaneously resulted in its quick international adoption and widespread academic scrutiny. Controversies arose out of classified design elements, a relatively short key length of the symmetric-key block cipher design, and the involvement of the NSA, nourishing suspicions about a backdoor. The intense academic scrutiny the algorithm received over time led to the modern understanding of block ciphers and their cryptanalysis.