text stringlengths 9 3.55k | source stringlengths 31 280 |
|---|---|
In modern candy cane production, the sticks are wrapped in cellophane before they are bent.Bobs Candies was sold to Farley's and Sathers in Spring 2005. Farley's and Sathers merged with the Ferrara Candy Company which continues to make candy canes under the Bobs name. | https://en.wikipedia.org/wiki/Keller_Machine |
In modern cars the four-wheel braking system is controlled by a pedal to the left of the accelerator pedal. There is usually also a parking brake which operates the rear brakes only (or less commonly, the front brakes only, as in the Saab 99 and in the Citroën Xantia). This has traditionally been operated by a lever between the front seats called a hand brake, but also appeared as a lever between the driver's seat and the door (as in the Porsche 911), a knob pulled away from the dash (as in the Volkswagen Transporter), a pedal in North American cars, and other less common arrangements. All of these controls pull on a spring-loaded cable and are held in place with a ratcheting mechanism until released. | https://en.wikipedia.org/wiki/Accelerator_pedal |
In the 2000s, direct-acting electronic parking brakes controlled by a switch (as in the Volkswagen eGolf) are becoming more common, replacing cable-actuated mechanical systems. In rallying there is often a hydraulic handbrake for the rear wheels, operated by a long, vertical lever extending to near the steering wheel. This is designed to facilitate handbrake turns rather than for parking, so lacks a ratcheting mechanism. | https://en.wikipedia.org/wiki/Accelerator_pedal |
In modern catch wrestling circles, the term "sleeper hold" refers to a variation of the rear naked choke in which the individual performing the hold snakes the leverage arm across the opponent's throat (in the same manner as the traditional rear naked choke) and grasps their opposite shoulder, rather than the biceps. The opposite hand is also placed against the base of the opponent's skull in the form of a closed Hammer Fist, or on top of the head. The attacking wrestler then squeezes their elbows together, pushes forward with the hammer fist (if used), and crunches forward with the abdominal muscles, producing an extremely tight and fast-acting choke. | https://en.wikipedia.org/wiki/Rear_naked_choke |
In modern chemistry, a chemical formula is a way of expressing information about the proportions of atoms that constitute a particular chemical compound, using a single line of chemical element symbols, numbers, and sometimes other symbols, such as parentheses, brackets, and plus (+) and minus (−) signs. For example, H2O is the chemical formula for water, specifying that each molecule consists of two hydrogen (H) atoms and one oxygen (O) atom. Similarly, O−3 denotes an ozone molecule consisting of three oxygen atoms and a net negative charge. A chemical formula identifies each constituent element by its chemical symbol, and indicates the proportionate number of atoms of each element. | https://en.wikipedia.org/wiki/Mathematical_formula |
In empirical formulas, these proportions begin with a key element and then assign numbers of atoms of the other elements in the compound—as ratios to the key element. For molecular compounds, these ratio numbers can always be expressed as whole numbers. For example, the empirical formula of ethanol may be written C2H6O, because the molecules of ethanol all contain two carbon atoms, six hydrogen atoms, and one oxygen atom. | https://en.wikipedia.org/wiki/Mathematical_formula |
Some types of ionic compounds, however, cannot be written as empirical formulas which contains only the whole numbers. An example is boron carbide, whose formula of CBn is a variable non-whole number ratio, with n ranging from over 4 to more than 6.5. When the chemical compound of the formula consists of simple molecules, chemical formulas often employ ways to suggest the structure of the molecule. | https://en.wikipedia.org/wiki/Mathematical_formula |
There are several types of these formulas, including molecular formulas and condensed formulas. A molecular formula enumerates the number of atoms to reflect those in the molecule, so that the molecular formula for glucose is C6H12O6 rather than the glucose empirical formula, which is CH2O. Except for the very simple substances, molecular chemical formulas generally lack needed structural information, and might even be ambiguous in occasions. A structural formula is a drawing that shows the location of each atom, and which atoms it binds to. | https://en.wikipedia.org/wiki/Mathematical_formula |
In modern chewing gum, if natural rubber such as chicle is used, it must pass several purity and cleanliness tests. However, most modern types of chewing gum use synthetic gum-based materials. These materials allow for longer lasting flavor, a softer texture, and a reduction in tackiness. | https://en.wikipedia.org/wiki/Bubble_gum |
In modern clothing, the region referred to as the waist is considerably below the waist as defined anatomically. With the advent of pants and skirts that do not require support from above, the clothing waist moved down to a position where the body starts to expand to form the buttocks and a support is therefore available. However, the waist region remains a highly important measurement and anthropometric landmark in garment construction.Jewellery, such as a belly chain, may be worn around either the clothing or anatomical waist. | https://en.wikipedia.org/wiki/Waist_circumference |
In modern colloquial Russian, given names and a small family of terms often take a special "shortened" form that some linguists consider to be a re-emerging vocative case. It is used only for given names and nouns that end in -a and -я, which are sometimes dropped in the vocative form: "Лен, где ты?" ("Lena, where are you?"). It is basically equivalent to "Лена, где ты?" | https://en.wikipedia.org/wiki/Vocative_case |
but suggests a positive personal and emotional bond between the speaker and the person being addressed. Names that end in -я then acquire a soft sign: "Оль!" = "Оля!" | https://en.wikipedia.org/wiki/Vocative_case |
("Olga!"). In addition to given names, the form is often used with words like "мама" (mom) and "папа" (dad), which would be respectively shortened to "мам" and "пап". The plural form is used with words such as "ребят", "девчат" (nom: "ребята", "девчата" guys, gals).Such usage differs from the historic vocative, which would be "Лено" and is not related. | https://en.wikipedia.org/wiki/Vocative_case |
In modern colloquial Russian, the expression sto pudov (сто пудов) – 'a hundred poods,' an intentional play on the foreign "hundred percent" – imparts the ponderative sense of overwhelming weight to the declarative sentence it is added to. The generic meaning of "very serious" or "absolutely sure" has almost supplanted its original meaning of "very heavy weight." The adjective stopudovy and the adverb stopudovo are also used to convey the same sense of certainty. The word is also used in Polish idiomatically or as a proverb (with the original/strict meaning commonly forgotten): nudy na pudy (Polish for 'unsupportable boredoms', literally 'boredoms in poods') | https://en.wikipedia.org/wiki/Pood |
In modern communication systems, bandlimited AWGN cannot be ignored. When modeling bandlimited AWGN in the phasor domain, statistical analysis reveals that the amplitudes of the real and imaginary contributions are independent variables which follow the Gaussian distribution model. When combined, the resultant phasor's magnitude is a Rayleigh-distributed random variable, while the phase is uniformly distributed from 0 to 2π. The graph to the right shows an example of how bandlimited AWGN can affect a coherent carrier signal. The instantaneous response of the noise vector cannot be precisely predicted, however, its time-averaged response can be statistically predicted. As shown in the graph, we confidently predict that the noise phasor will reside about 38% of the time inside the 1σ circle, about 86% of the time inside the 2σ circle, and about 98% of the time inside the 3σ circle. | https://en.wikipedia.org/wiki/Gaussian_channel |
In modern computational chemistry, pharmacophores are used to define the essential features of one or more molecules with the same biological activity. A database of diverse chemical compounds can then be searched for more molecules which share the same features arranged in the same relative orientation. Pharmacophores are also used as the starting point for developing 3D-QSAR models. Such tools and a related concept of "privileged structures", which are "defined as molecular frameworks which are able of providing useful ligands for more than one type of receptor or enzyme target by judicious structural modifications", aid in drug discovery. | https://en.wikipedia.org/wiki/Pharmacophore |
In modern computational chemistry, quantum chemical calculations are performed using a finite set of basis functions. When the finite basis is expanded towards an (infinite) complete set of functions, calculations using such a basis set are said to approach the complete basis set (CBS) limit. In this context, basis function and atomic orbital are sometimes used interchangeably, although the basis functions are usually not true atomic orbitals. Within the basis set, the wavefunction is represented as a vector, the components of which correspond to coefficients of the basis functions in the linear expansion. | https://en.wikipedia.org/wiki/Polarization_function |
In such a basis, one-electron operators correspond to matrices (a.k.a. rank two tensors), whereas two-electron operators are rank four tensors. | https://en.wikipedia.org/wiki/Polarization_function |
When molecular calculations are performed, it is common to use a basis composed of atomic orbitals, centered at each nucleus within the molecule (linear combination of atomic orbitals ansatz). The physically best motivated basis set are Slater-type orbitals (STOs), which are solutions to the Schrödinger equation of hydrogen-like atoms, and decay exponentially far away from the nucleus. It can be shown that the molecular orbitals of Hartree–Fock and density-functional theory also exhibit exponential decay. | https://en.wikipedia.org/wiki/Polarization_function |
Furthermore, S-type STOs also satisfy Kato's cusp condition at the nucleus, meaning that they are able to accurately describe electron density near the nucleus. However, hydrogen-like atoms lack many-electron interactions, thus the orbitals do not accurately describe electron state correlations. | https://en.wikipedia.org/wiki/Polarization_function |
Unfortunately, calculating integrals with STOs is computationally difficult and it was later realized by Frank Boys that STOs could be approximated as linear combinations of Gaussian-type orbitals (GTOs) instead. Because the product of two GTOs can be written as a linear combination of GTOs, integrals with Gaussian basis functions can be written in closed form, which leads to huge computational savings (see John Pople). Dozens of Gaussian-type orbital basis sets have been published in the literature. | https://en.wikipedia.org/wiki/Polarization_function |
Basis sets typically come in hierarchies of increasing size, giving a controlled way to obtain more accurate solutions, however at a higher cost. The smallest basis sets are called minimal basis sets. A minimal basis set is one in which, on each atom in the molecule, a single basis function is used for each orbital in a Hartree–Fock calculation on the free atom. | https://en.wikipedia.org/wiki/Polarization_function |
For atoms such as lithium, basis functions of p type are also added to the basis functions that correspond to the 1s and 2s orbitals of the free atom, because lithium also has a 1s2p bound state. For example, each atom in the second period of the periodic system (Li – Ne) would have a basis set of five functions (two s functions and three p functions). A minimal basis set may already be exact for the gas-phase atom at the self-consistent field level of theory. | https://en.wikipedia.org/wiki/Polarization_function |
In the next level, additional functions are added to describe polarization of the electron density of the atom in molecules. These are called polarization functions. For example, while the minimal basis set for hydrogen is one function approximating the 1s atomic orbital, a simple polarized basis set typically has two s- and one p-function (which consists of three basis functions: px, py and pz). | https://en.wikipedia.org/wiki/Polarization_function |
This adds flexibility to the basis set, effectively allowing molecular orbitals involving the hydrogen atom to be more asymmetric about the hydrogen nucleus. This is very important for modeling chemical bonding, because the bonds are often polarized. Similarly, d-type functions can be added to a basis set with valence p orbitals, and f-functions to a basis set with d-type orbitals, and so on. | https://en.wikipedia.org/wiki/Polarization_function |
Another common addition to basis sets is the addition of diffuse functions. These are extended Gaussian basis functions with a small exponent, which give flexibility to the "tail" portion of the atomic orbitals, far away from the nucleus. Diffuse basis functions are important for describing anions or dipole moments, but they can also be important for accurate modeling of intra- and inter-molecular bonding. | https://en.wikipedia.org/wiki/Polarization_function |
In modern computational practice, the QR algorithm is performed in an implicit version which makes the use of multiple shifts easier to introduce. The matrix is first brought to upper Hessenberg form A 0 = Q A Q T {\displaystyle A_{0}=QAQ^{\mathsf {T}}} as in the explicit version; then, at each step, the first column of A k {\displaystyle A_{k}} is transformed via a small-size Householder similarity transformation to the first column of p ( A k ) {\displaystyle p(A_{k})} (or p ( A k ) e 1 {\displaystyle p(A_{k})e_{1}} ), where p ( A k ) {\displaystyle p(A_{k})} , of degree r {\displaystyle r} , is the polynomial that defines the shifting strategy (often p ( x ) = ( x − λ ) ( x − λ ¯ ) {\displaystyle p(x)=(x-\lambda )(x-{\bar {\lambda }})} , where λ {\displaystyle \lambda } and λ ¯ {\displaystyle {\bar {\lambda }}} are the two eigenvalues of the trailing 2 × 2 {\displaystyle 2\times 2} principal submatrix of A k {\displaystyle A_{k}} , the so-called implicit double-shift). Then successive Householder transformations of size r + 1 {\displaystyle r+1} are performed in order to return the working matrix A k {\displaystyle A_{k}} to upper Hessenberg form. This operation is known as bulge chasing, due to the peculiar shape of the non-zero entries of the matrix along the steps of the algorithm. As in the first version, deflation is performed as soon as one of the sub-diagonal entries of A k {\displaystyle A_{k}} is sufficiently small. | https://en.wikipedia.org/wiki/QR_algorithm |
In modern computer memory, a sense amplifier is one of the elements which make up the circuitry on a semiconductor memory chip (integrated circuit); the term itself dates back to the era of magnetic core memory. A sense amplifier is part of the read circuitry that is used when data is read from the memory; its role is to sense the low power signals from a bitline that represents a data bit (1 or 0) stored in a memory cell, and amplify the small voltage swing to recognizable logic levels so the data can be interpreted properly by logic outside the memory.Modern sense-amplifier circuits consist of two to six (usually four) transistors, while early sense amplifiers for core memory sometimes contained as many as 13 transistors. There is one sense amplifier for each column of memory cells, so there are usually hundreds or thousands of identical sense amplifiers on a modern memory chip. As such, sense amplifiers are one of the few remaining analog circuits in a computer's memory subsystem. | https://en.wikipedia.org/wiki/Sense_amplifier |
In modern computer systems, files are typically accessed using names (filenames). In some operating systems, the name is associated with the file itself. In others, the file is anonymous, and is pointed to by links that have names. In the latter case, a user can identify the name of the link with the file itself, but this is a false analogue, especially where there exists more than one link to the same file. | https://en.wikipedia.org/wiki/Digital_file |
Files (or links to files) can be located in directories. However, more generally, a directory can contain either a list of files or a list of links to files. Within this definition, it is of paramount importance that the term "file" includes directories. | https://en.wikipedia.org/wiki/Digital_file |
This permits the existence of directory hierarchies, i.e., directories containing sub-directories. A name that refers to a file within a directory must be typically unique. In other words, there must be no identical names within a directory. | https://en.wikipedia.org/wiki/Digital_file |
However, in some operating systems, a name may include a specification of type that means a directory can contain an identical name for more than one type of object such as a directory and a file. In environments in which a file is named, a file's name and the path to the file's directory must uniquely identify it among all other files in the computer system—no two files can have the same name and path. Where a file is anonymous, named references to it will exist within a namespace. | https://en.wikipedia.org/wiki/Digital_file |
In most cases, any name within the namespace will refer to exactly zero or one file. However, any file may be represented within any namespace by zero, one or more names. Any string of characters may be a well-formed name for a file or a link depending upon the context of application. | https://en.wikipedia.org/wiki/Digital_file |
Whether or not a name is well-formed depends on the type of computer system being used. Early computers permitted only a few letters or digits in the name of a file, but modern computers allow long names (some up to 255 characters) containing almost any combination of unicode letters or unicode digits, making it easier to understand the purpose of a file at a glance. Some computer systems allow file names to contain spaces; others do not. | https://en.wikipedia.org/wiki/Digital_file |
Case-sensitivity of file names is determined by the file system. Unix file systems are usually case sensitive and allow user-level applications to create files whose names differ only in the case of characters. Microsoft Windows supports multiple file systems, each with different policies regarding case-sensitivity. | https://en.wikipedia.org/wiki/Digital_file |
The common FAT file system can have multiple files whose names differ only in case if the user uses a disk editor to edit the file names in the directory entries. User applications, however, will usually not allow the user to create multiple files with the same name but differing in case. | https://en.wikipedia.org/wiki/Digital_file |
Most computers organize files into hierarchies using folders, directories, or catalogs. The concept is the same irrespective of the terminology used. | https://en.wikipedia.org/wiki/Digital_file |
Each folder can contain an arbitrary number of files, and it can also contain other folders. These other folders are referred to as subfolders. Subfolders can contain still more files and folders and so on, thus building a tree-like structure in which one "master folder" (or "root folder" — the name varies from one operating system to another) can contain any number of levels of other folders and files. | https://en.wikipedia.org/wiki/Digital_file |
Folders can be named just as files can (except for the root folder, which often does not have a name). The use of folders makes it easier to organize files in a logical way. When a computer allows the use of folders, each file and folder has not only a name of its own, but also a path, which identifies the folder or folders in which a file or folder resides. | https://en.wikipedia.org/wiki/Digital_file |
In the path, some sort of special character—such as a slash—is used to separate the file and folder names. For example, in the illustration shown in this article, the path /Payroll/Salaries/Managers uniquely identifies a file called Managers in a folder called Salaries, which in turn is contained in a folder called Payroll. The folder and file names are separated by slashes in this example; the topmost or root folder has no name, and so the path begins with a slash (if the root folder had a name, it would precede this first slash). | https://en.wikipedia.org/wiki/Digital_file |
Many computer systems use extensions in file names to help identify what they contain, also known as the file type. On Windows computers, extensions consist of a dot (period) at the end of a file name, followed by a few letters to identify the type of file. An extension of .txt identifies a text file; a .doc extension identifies any type of document or documentation, commonly in the Microsoft Word file format; and so on. Even when extensions are used in a computer system, the degree to which the computer system recognizes and heeds them can vary; in some systems, they are required, while in other systems, they are completely ignored if they are presented. | https://en.wikipedia.org/wiki/Digital_file |
In modern computers many processes run at once. Active processes are placed in an array called a run queue, or runqueue. The run queue may contain priority values for each process, which will be used by the scheduler to determine which process to run next. To ensure each program has a fair share of resources, each one is run for some time period (quantum) before it is paused and placed back into the run queue. | https://en.wikipedia.org/wiki/Run_queue |
When a program is stopped to let another run, the program with the highest priority in the run queue is then allowed to execute. Processes are also removed from the run queue when they ask to sleep, are waiting on a resource to become available, or have been terminated. In the Linux operating system (prior to kernel 2.6.23), each CPU in the system is given a run queue, which maintains both an active and expired array of processes. | https://en.wikipedia.org/wiki/Run_queue |
Each array contains 140 (one for each priority level) pointers to doubly linked lists, which in turn reference all processes with the given priority. The scheduler selects the next process from the active array with highest priority. When a process' quantum expires, it is placed into the expired array with some priority. | https://en.wikipedia.org/wiki/Run_queue |
When the active array contains no more processes, the scheduler swaps the active and expired arrays, hence the name O(1) scheduler. In UNIX or Linux, the sar command is used to check the run queue. The vmstat UNIX or Linux command can also be used to determine the number of processes that are queued to run or waiting to run. These appear in the 'r' column. Example: $ vmstat procs -----------memory---------- ---swap-- -----io---- -system-- ------cpu----- r b swpd free buff cache si so bi bo in cs us sy id wa st 2 0 0 4579152 324416 4619528 0 0 402 236 3357 15 20 2 78 0 0 There are two models for Run queues: one that assigns a Run Queue to each physical processor, and the other has only one Run Queue in the system | https://en.wikipedia.org/wiki/Run_queue |
In modern computers, binary data refers to any data represented in binary form rather than interpreted on a higher level or converted into some other form. At the lowest level, bits are stored in a bistable device such as a flip-flop. While most binary data has symbolic meaning (except for don't cares) not all binary data is numeric. | https://en.wikipedia.org/wiki/Binary_variable |
Some binary data corresponds to computer instructions, such as the data within processor registers decoded by the control unit along the fetch-decode-execute cycle. Computers rarely modify individual bits for performance reasons. Instead, data is aligned in groups of a fixed number of bits, usually 1 byte (8 bits). | https://en.wikipedia.org/wiki/Binary_variable |
Hence, "binary data" in computers are actually sequences of bytes. On a higher level, data is accessed in groups of 1 word (4 bytes) for 32-bit systems and 2 words for 64-bit systems. In applied computer science and in the information technology field, the term binary data is often specifically opposed to text-based data, referring to any sort of data that cannot be interpreted as text. | https://en.wikipedia.org/wiki/Binary_variable |
The "text" vs. "binary" distinction can sometimes refer to the semantic content of a file (e.g. a written document vs. a digital image). However, it often refers specifically to whether the individual bytes of a file are interpretable as text (see character encoding) or cannot so be interpreted. When this last meaning is intended, the more specific terms binary format and text(ual) format are sometimes used. | https://en.wikipedia.org/wiki/Binary_variable |
Semantically textual data can be represented in binary format (e.g. when compressed or in certain formats that intermix various sorts of formatting codes, as in the doc format used by Microsoft Word); contrarily, image data is sometimes represented in textual format (e.g. the X PixMap image format used in the X Window System). 1 and 0 are nothing but just two different voltage levels. You can make the computer understand 1 for higher voltage and 0 for lower voltage. | https://en.wikipedia.org/wiki/Binary_variable |
There are many different ways to store two voltage levels. If you have seen floppy, then you will find a magnetic tape that has a coating of ferromagnetic material, this is a type of paramagnetic material that has domains aligned in a particular direction to give a remnant magnetic field even after removal of currents through materials or magnetic field. During loading of data in the magnetic tape, the magnetic field is passed in one direction to call the saved orientation of the domain 1 and for the magnetic field is passed in another direction, then the saved orientation of the domain is 0. In this way, generally, 1 and 0 data are stored. | https://en.wikipedia.org/wiki/Binary_variable |
In modern computing practice, Unicode is the standard and default method for character encoding. However, Unicode itself and many legacy applications have echoes of earlier practices. Furthermore, the limited character set provided by computer keyboards has also required practical and pragmatic adjustments. These issues are detailed below. | https://en.wikipedia.org/wiki/Apostrophe_(punctuation) |
In modern computing terminology, a "kludge" (or often a "hack") is a solution to a problem, the performance of a task, or a system fix which is inefficient, inelegant ("hacky"), or even incomprehensible, but which somehow works. It is similar to a workaround, but quick and ugly. To "kludge around something" is to avoid a bug or difficulty by building a kludge, perhaps exploiting properties of the bug itself. A kludge is often used to modify a working system while avoiding fundamental changes, or to ensure backwards compatibility. | https://en.wikipedia.org/wiki/Kludge |
Hack can also be used with a positive connotation, for a quick solution to a frustrating problem.A kludge is often used to fix an unanticipated problem in an earlier kludge; this is essentially a kind of cruft. A solution might be a kludge if it fails in corner cases. An intimate knowledge of the problem domain and execution environment is typically required to build a corner-case kludge. | https://en.wikipedia.org/wiki/Kludge |
More commonly, a kludge is a heuristic which was expected to work almost always, but ends up failing often. A 1960s Soviet anecdote tells of a computer part which needed a slightly delayed signal to work. Rather than setting up a timing system, the kludge was to connect long coils of internal wires to slow the electrical signal. | https://en.wikipedia.org/wiki/Kludge |
Another type of kludge is the evasion of an unknown problem or bug in a computer program. Rather than continue to struggle to diagnose and fix the bug, the programmer may write additional code to compensate. For example, if a variable keeps ending up doubled, a kludge may be to add later code that divides by two rather than to search for the original incorrect computation. In computer networking, use of NAT (Network Address Translation) (RFC 1918) or PAT (Port Address Translation) to cope with the shortage of IPv4 addresses is an example of a kludge. In FidoNet terminology, kludge refers to a piece of control data embedded inside a message. | https://en.wikipedia.org/wiki/Kludge |
In modern conditions, this method has a very small impact on the length on the service intervals of the vehicle and the longevity of individual components. Modern ignition systems do not have breaker points, which have been almost entirely replaced by electronic systems. Modern ignition coils outlast most other components of the vehicle and modern spark plugs have excellent service life, though there is a slight-difference between the two plugs as to erosion suffered at the center electrode. Because the spark jumps in opposite directions on the companion plugs, one bank will erode the center electrode more, and the opposite bank will erode the ground electrode more. Spark plugs used in wasted spark systems should have precious metals, such as platinum and/or iridium, on both the central and ground electrodes in order to increase the average service interval time before replacement is needed. | https://en.wikipedia.org/wiki/Wasted_spark |
In modern connectionism cognitive neuroarchitectures are developed (e.g. “Oscillatory Networks”, “Integrated Connectionist/Symbolic (ICS) Cognitive Architecture”, “Holographic Reduced Representations (HRRs)”, “Neural Engineering Framework (NEF)”) that solve the binding problem by means of integrative synchronization mechanisms (e.g. the (phase-)synchronized “Binding-by-synchrony (BBS)” mechanism) (1) in perceptual cognition ("low-level cognition"): This is the neurocognitive performance of how an object or event that is perceived (e.g., a visual object) is dynamically "bound together" from its properties (e.g., shape, contour, texture, color, direction of motion) as a mental representation, i.e., can be experienced in the mind as a unified "Gestalt" in terms of Gestalt psychology ("feature binding", feature linking"), (2) and in language cognition ("high-level cognition"): This is the neurocognitive performance of how a linguistic unit (e.g. a sentence) is generated by relating semantic concepts and syntactic roles to each other in a dynamic way so that one can generate systematic and compositional symbol structures and propositions that are experienced as complex mental representations in the mind ("variable binding"). | https://en.wikipedia.org/wiki/Unity_of_consciousness |
In modern contract theory, "adverse selection" characterizes principal-agent models in which an agent has private information before a contract is written. For example, a worker may know his effort costs (or a buyer may know his willingness-to-pay) before an employer (or a seller) makes a contract offer. In contrast, "moral hazard" characterizes principal-agent models where there is symmetric information at the time of contracting. The agent may become privately informed after the contract is written. | https://en.wikipedia.org/wiki/Adverse_selection |
According to Hart and Holmström (1987), moral hazard models are further subdivided into hidden action and hidden information models, depending on whether the agent becomes privately informed due to an unobservable action that he himself chooses or due to a random move by nature. Hence, the difference between an adverse selection model and a hidden information (sometimes called hidden knowledge) model is simply the timing. In the former case, the agent is informed at the outset. | https://en.wikipedia.org/wiki/Adverse_selection |
In the latter case, he becomes privately informed after the contract has been signed. In most adverse selection models, it is assumed that the agent's private information is "soft" (i.e., the information cannot be certified). Yet, there are also some adverse selection models with "hard" information (i.e., the agent may have evidence to prove that claims he makes about his type are true).Adverse selection models can be further categorized into models with private values and models with interdependent or common values. | https://en.wikipedia.org/wiki/Adverse_selection |
In models with private values, the agent's type has a direct influence on his own preferences. For example, he has knowledge over his effort costs or his willingness-to-pay. Alternatively, models with interdependent or common values occur when the agent's type has a direct influence on the principal's preferences. | https://en.wikipedia.org/wiki/Adverse_selection |
For instance, the agent may be a seller who privately knows the quality of a car. Seminal contributions to private value models have been made by Roger Myerson and Eric Maskin, while interdependent or common value models have first been studied by George Akerlof. | https://en.wikipedia.org/wiki/Adverse_selection |
Adverse selection models with private values can also be further categorized by distinguishing between models with one-sided private information and two-sided private information. The most prominent result in the latter case is the Myerson-Satterthwaite theorem. More recently, contract-theoretic adverse selection models have been tested both in laboratory experiments and in the field. | https://en.wikipedia.org/wiki/Adverse_selection |
In modern contract theory, the “theory of the firm” is often identified with the “property rights approach” that was developed by Sanford J. Grossman, Oliver D. Hart, and John H. Moore. The property rights approach to the theory of the firm is also known as the “Grossman–Hart–Moore theory”. In their seminal work, Grossman and Hart (1986), Hart and Moore (1990) and Hart (1995) developed the incomplete contracting paradigm. They argue that if contracts cannot specify what is to be done given every possible contingency, then property rights (and hence firm boundaries) matter. | https://en.wikipedia.org/wiki/Theory_of_the_Firm |
Specifically, consider a seller of an intermediate good and a buyer. Should the seller own the physical assets that are necessary to produce the good (non-integration) or should the buyer be the owner (integration)? After relationship-specific investments have been made, the seller and the buyer bargain. | https://en.wikipedia.org/wiki/Theory_of_the_Firm |
When they are symmetrically informed, they will always agree to collaborate. Yet, the division of the ex post surplus depends on the parties’ disagreement payoffs (the payoffs they would get if no ex post agreement were reached), which in turn depend on the ownership structure. Thus, the ownership structure has an influence on the incentives to invest. | https://en.wikipedia.org/wiki/Theory_of_the_Firm |
A central insight of the theory is that the party with the more important investment decision should be the owner. Another prominent conclusion is that joint asset ownership is suboptimal if investments are in human capital. The Grossman–Hart–Moore model has been successfully applied in many contexts, e.g. with regard to privatization. | https://en.wikipedia.org/wiki/Theory_of_the_Firm |
Chiu (1998) and DeMeza and Lockwood (1998) have extended the model by considering different bargaining games that the parties may play ex post (which can explain ownership by the less important investor). Oliver Williamson (2002) has criticized the Grossman–Hart–Moore model because it is focused on ex ante investment incentives, while it neglects ex post inefficiencies. Schmitz (2006) has studied a variant of the Grossman–Hart–Moore model in which a party may have or acquire private information about its disagreement payoff, which can explain ex post inefficiencies and ownership by the less important investor. Several variants of the Grossman–Hart–Moore model such as the one with private information can also explain joint ownership. | https://en.wikipedia.org/wiki/Theory_of_the_Firm |
In modern convention a seed phrase is now utilised which is a random 12 to 24 (or even greater) list of dictionary words which is an unencrypted form of the private key. (Words are easier to memorize than numerals). When online, exchange and hardware wallets are generated using random numbers, and the user is asked to supply a seed phrase. If the wallet is misplaced, damaged or compromised, the seed phrase can be used to re-access the wallet and associated keys and cryptocurrency in toto. | https://en.wikipedia.org/wiki/Cryptocurrency_wallet |
In modern cosmological theory, diffusion damping, also called photon diffusion damping, is a physical process which reduced density inequalities (anisotropies) in the early universe, making the universe itself and the cosmic microwave background radiation (CMB) more uniform. Around 300,000 years after the Big Bang, during the epoch of recombination, diffusing photons travelled from hot regions of space to cold ones, equalising the temperatures of these regions. This effect is responsible, along with baryon acoustic oscillations, the Doppler effect, and the effects of gravity on electromagnetic radiation, for the eventual formation of galaxies and galaxy clusters, these being the dominant large scale structures which are observed in the universe. It is a damping by diffusion, not of diffusion.The strength of diffusion damping is calculated by a mathematical expression for the damping factor, which figures into the Boltzmann equation, an equation which describes the amplitude of perturbations in the CMB. | https://en.wikipedia.org/wiki/Diffusion_damping |
The strength of the diffusion damping is chiefly governed by the distance photons travel before being scattered (diffusion length). The primary effects on the diffusion length are from the properties of the plasma in question: different sorts of plasma may experience different sorts of diffusion damping. The evolution of a plasma may also affect the damping process. The scale on which diffusion damping works is called the Silk scale and its value corresponds to the size of galaxies of the present day. The mass contained within the Silk scale is called the Silk mass and it corresponds to the mass of the galaxies. | https://en.wikipedia.org/wiki/Diffusion_damping |
In modern cotton production, cotton arrives at industrial cotton gins either in trailers, in compressed rectangular "modules" weighing up to 10 metric tons each or in polyethylene wrapped round modules similar to a bale of hay produced during the picking process by the most recent generation of cotton pickers. Trailer cotton (i.e. cotton not compressed into modules) arriving at the gin is sucked in via a pipe, approximately 16 inches (41 cm) in diameter, that is swung over the cotton. This pipe is usually manually operated, but is increasingly automated in modern cotton plants. The need for trailers to haul the product to the gin has been drastically reduced since the introduction of modules. | https://en.wikipedia.org/wiki/Cotton_ginning |
If the cotton is shipped in modules, the module feeder breaks the modules apart using spiked rollers and extracts the largest pieces of foreign material from the cotton. The module feeder's loose cotton is then sucked into the same starting point as the trailer cotton. The cotton then enters a dryer, which removes excess moisture. | https://en.wikipedia.org/wiki/Cotton_ginning |
The cylinder cleaner uses six or seven rotating, spiked cylinders to break up large clumps of cotton. Finer foreign material, such as soil and leaves, passes through rods or screens for removal. The stick machine uses centrifugal force to remove larger foreign matter, such as sticks and burrs, while the cotton is held by rapidly rotating saw cylinders. | https://en.wikipedia.org/wiki/Cotton_ginning |
The gin stand uses the teeth of rotating saws to pull the cotton through a series of "ginning ribs", which pull the fibers from the seeds which are too large to pass through the ribs. The cleaned seed is then removed from the gin via an auger conveyor system. The seed is reused for planting or is sent to an oil mill to be further processed into cottonseed oil and cottonseed meal. | https://en.wikipedia.org/wiki/Cotton_ginning |
The lint cleaners again use saws and grid bars, this time to separate immature seeds and any remaining foreign matter from the fibers. The bale press then compresses the cotton into bales for storage and shipping. Modern gins can process up to 15 tonnes (33,000 lb) of cotton per hour.Modern cotton gins create a substantial amount of cotton gin residue (CGR) consisting of sticks, leaves, dirt, immature bolls, and cottonseed. Research is currently under way to investigate the use of this waste in producing ethanol. Due to fluctuations in the chemical composition in processing, there is difficulty in creating a consistent ethanol process, but there is potential to further maximize the utilization of waste in the cotton production. | https://en.wikipedia.org/wiki/Cotton_ginning |
In modern cricket, the two lines usually aimed for by fast bowlers is the so-called corridor of uncertainty, the area just outside the batter's off stump, or actually on the stumps. It is difficult for the batter to tell whether or not such a ball is likely to strike their wicket, and thus to know whether to attack, defend or leave the ball. This technique was historically known as off theory (contrast leg theory), but it is now so routine that it is rarely given a name at all, or forgotten about completely. | https://en.wikipedia.org/wiki/Pace_bowling |
Variation in line is also important and deliveries aimed at the leg stump can also serve a purpose. Precise mastery of the line of the ball is best used when a batter is known to have a weakness hitting a particular shot, because a bowler with an effective line can place the ball in the weak spot time after time. Failing to overcome a persistent inability to hit balls on a certain line has been enough to end the careers of innumerable batters once they had been found out by skilled line bowlers. | https://en.wikipedia.org/wiki/Pace_bowling |
In modern cryptography, null encryption (or selecting null cipher or NONE cipher) is choosing not to use encryption in a system where various encryption options are offered. When this option is used, the text is the same before and after encryption, which can be practical for testing/debugging, or authentication-only communication. In mathematics such a function is known as the identity function. Examples of this are the "eNULL" and "aNULL" cipher suite in OpenSSL, and the "NULL Encryption Algorithm" in IPSec. | https://en.wikipedia.org/wiki/Null_encryption |
In modern culture, snow globes often symbolize childhood, innocence, or so-called "happy days". However, they are also sometimes used, with dark humor, to evoke more gruesome scenes. | https://en.wikipedia.org/wiki/Snow_globes |
In modern day biology, the depth of understanding deep homology has evolved into focusing on the molecular and genetic mechanisms and functions rather than simple morphology. Cancer stem cells (CSCs) are a population of cells within a tumor that have the ability to self-renew and differentiate into different cell types, similar to normal stem cells. The stem cell theory of cancer suggests that there is a subpopulation of cells, referred to as cancer stem cells, that have certain characteristics that make them unique among other types of cells within a cancer. The traits that are included in CSCs are that they multiply indefinitely, are resistant to chemotherapy, and are proposed to be responsible for relapse after therapy. | https://en.wikipedia.org/wiki/Deep_homology |
In modern days, ceremonial parts of the etiquettes are ignored. Commonly with a group of friends or family, the host would initiate with "Cheers for...!" (为...干杯! | https://en.wikipedia.org/wiki/Baijiu |
), and then guests would finish their cups after clinking the glasses. Tasting is also appreciated. Modern bar culture has grown in popularity in China, so has a craving for a twist on the traditional baijiu. | https://en.wikipedia.org/wiki/Baijiu |
In 2007, a report in Time magazine mentioned integrating baijiu into cocktails, and in the years since several bars around the world have added baijiu to their cocktail programs. Peking Tavern in downtown Los Angeles opened its doors in 2013 as one of the first in the US to serve a variety of baijiu cocktails. Owners Andrew Chiu and Andrew Wong felt that it's an important part of Chinese dining culture. Their goal is for America to develop an appreciation through cocktails first and gradually transition to enjoying the liquor on its own. | https://en.wikipedia.org/wiki/Baijiu |
In modern days, sandpainting is most often practised during Dia de los Muertos (Day of the Dead) in Mexico and the United States. Streets are decorated with sand paintings that are later swept away, symbolising the fleeting nature of life. Of note are the sandpaintings done during the Seattle Dia De Muertos Festival, but the most exciting development has been the Performance Art of Sand Animation which has created a new wave of younger artists and also revived interest in all types of sand painting. A number of contemporary artists use sand in ways that depart from specific cultural traditions exploring techniques by raking sand, pouring it, carving it, creating unique designs. | https://en.wikipedia.org/wiki/Sand_painting |
The works are ephemeral and are primarily shared through documentation or part of a live performance. Many of these artists were included in an exhibit at the Museum of Arts and Design in New York City titled "Swept Away: Dust, Ashes, and Dirt in Contemporary Art and Design" which was featured in the galleries in 2012. Curator David Revere McFadden described his reasoning for curating the exhibit as wanting to spotlight the work of contemporary artists who specialise in what he described as "unorthodox, unusual, or unexpected materials. | https://en.wikipedia.org/wiki/Sand_painting |
"Artist included in the exhibit that use sand and techniques related to sand painting were: Elvira Wersche, who collects sands from all over the world to create geometric patterned paintings, only to be destroyed as part of a performance. Andy Goldsworthy is known for his ephemeral works using nature, and began sand painting in 1986, documented the deterioration of a giant ball of sand on the beach packed with bones for the exhibit. Jim Denevan known for his massive raked sand paintings also shared documentation of his process on California beaches. | https://en.wikipedia.org/wiki/Sand_painting |
Igor Eskinja used dust to paint an architectural floor plan in the galleries. Cui Fei produces calligraphic works in sand using tradition chak-pur and brushes. Vik Muniz uses dust, chocolate syrup, grains of sand, sugar, caviar, magazines and industrial garbage in a way that reflects sand painting. | https://en.wikipedia.org/wiki/Sand_painting |
The rotating exhibit "Swept Away Projects" featured Linda Florence and Joe Mangrum whose works were added to the galleries after removal of previous works. Linda Florence used chalk to stencil patterns onto the floor and often uses various materials like sugar to create installations. Joe Mangrum poured coloured sand from his hand for two consecutive days on 8–9 May 2012 he titled "Asynchronous Syntropy" and an outdoor project that acted as a circumambulation of the museum itself. Mangrum worked a total of 24 hours over the span of two days, spontaneously improvising his sand painting design, only to have it quickly disappear under the bustle of Columbus Circle foot traffic.Other contemporary artists who work with sand include Andrew van der Merwe, based in Cape Town, who carves calligraphic imagery into the sand on beaches; Andres Amador, an American artist who rakes designs into beaches; Ahmad Nadalian, an Iranian artist who uses natural ground pigments to paint with sand; and Motoi Yamamoto, who makes paintings reflecting typhoons and natural phenomena using salt. | https://en.wikipedia.org/wiki/Sand_painting |
In modern developments the pole barns of the 1930s have become pole buildings for use as housing, commercial use, churches, picnic shelters or storage buildings. In the process more often than not, the poles have become posts of squared-off, pressure-treated timbers. These structures have the potential to replicate the functionality of other buildings, but they may be more affordable and require less time to construct. The most common use for pole buildings is storage buildings as it was on the farms, but today they may be for the storage of automobiles, boats, and RVs along with many other household items that would normally be found in a residential garage, or commercially as the surroundings for a light industry or small corporate offices with attached shops. | https://en.wikipedia.org/wiki/Pole_building_framing |
In modern digital communications, Gray codes play an important role in error correction. For example, in a digital modulation scheme such as QAM where data is typically transmitted in symbols of 4 bits or more, the signal's constellation diagram is arranged so that the bit patterns conveyed by adjacent constellation points differ by only one bit. By combining this with forward error correction capable of correcting single-bit errors, it is possible for a receiver to correct any transmission errors that cause a constellation point to deviate into the area of an adjacent point. This makes the transmission system less susceptible to noise. | https://en.wikipedia.org/wiki/Gray_code_addressing |
In modern digital imaging systems and high-definition televisions, especially those that comply with SMPTE standards and practices, only square pixels are used for broadcast and display. However, some formats (ex., HDV, DVCPRO HD) use non-square pixels internally for image storage, as a way to reduce the amount of data that must be processed, thus limiting the necessary transfer rates and maintaining compatibility with existing interfaces. | https://en.wikipedia.org/wiki/Square_pixel |
In modern discourse, the paradox was articulated by John M. Dutton and William H. Starbuck: "As a model of a complex system becomes more complete, it becomes less understandable. Alternatively, as a model grows more realistic, it also becomes just as difficult to understand as the real-world processes it represents. "This paradox may be used by researchers to explain why complete models of the human brain and thinking processes have not been created and will undoubtedly remain difficult for years to come. | https://en.wikipedia.org/wiki/Bonini's_paradox |
This same paradox was observed earlier from a quote by philosopher-poet Paul Valéry (1871–1945): "Ce qui est simple est toujours faux. Ce qui ne l’est pas est inutilisable". ("If it's simple, it's always false. If it's not, it's unusable.") Also, the same topic has been discussed by Richard Levins in his classic essay "The Strategy of Model Building in Population Biology", in stating that complex models have 'too many parameters to measure, leading to analytically insoluble equations that would exceed the capacity of our computers, but the results would have no meaning for us even if they could be solved. | https://en.wikipedia.org/wiki/Bonini's_paradox |
In modern displays, the LOPT, voltage multiplier, and rectifier are often integrated into a single package on the main circuit board. There is usually a thickly insulated wire from the LOPT to the anode terminal (covered by a rubber cap) on the side of the picture tube. One advantage of operating the transformer at the flyback frequency is that it can be much smaller and lighter than a comparable transformer operating at mains (line) frequency. Another advantage is that it provides a failsafe mechanism — should the horizontal deflection circuitry fail, the flyback transformer will cease operating and shut down the rest of the display, preventing the screen burn-in that would otherwise result from a stationary electron beam. | https://en.wikipedia.org/wiki/Flyback_transformer |
In modern domestic architecture, hip roofs are commonly seen in bungalows and cottages, and have been integral to styles such as the American Foursquare. However, they have been used in many styles of architecture and in a wide array of structures. | https://en.wikipedia.org/wiki/Hip_roof |
In modern double-clad fibers for high power fiber amplifiers and lasers, the inner cladding has a higher refractive index than the outer cladding. This enables the inner cladding to guide light by total internal reflection in the same way the core does, but for a different range of wavelengths. This allows diode lasers, which have high power but low radiance, to be used as the optical pump source. The pump light can be easily coupled into the large inner cladding, and propagates through the inner cladding while the signal propagates in the smaller core. | https://en.wikipedia.org/wiki/Double_clad_fiber |
The doped core gradually absorbs the cladding light as it propagates, driving the amplification process. This pumping scheme is often called cladding pumping, which is an alternative to the conventional core pumping, in which the pump light is coupled into the small core. The invention of cladding pumping by a Polaroid fiber research team (H. Po, et al.) revolutionized the design of fiber amplifiers and lasers. | https://en.wikipedia.org/wiki/Double_clad_fiber |
Using this method, modern fiber lasers can produce continuous power up to several kilowatts, while the signal light in the core maintains near diffraction-limited beam quality.The shape of the cladding is very important, especially when the core diameter is small compared to the size of the inner cladding. Circular symmetry in a double-clad fiber seems to be the worst solution for a fiber laser; in this case, many modes of the light in the cladding miss the core and hence cannot be used to pump it. In the language of geometrical optics, most of the rays of the pump light do not pass through the core, and hence cannot pump it. Ray tracing, simulations of the paraxial propagation and mode analysis give similar results. | https://en.wikipedia.org/wiki/Double_clad_fiber |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.