source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Embedded%20Supercomputing | Embedded Supercomputing (EmbSup) a relatively new solution which targets fine grain and coarse grain parallelism altogether. This combination thought to be a best way for exploiting fine and coarse grain parallelism by targeting fine grain parallelism towards FPGAs and coarse grained parallelism towards super computers or clusters.
Basically Embedded Supercomputing is a hybrid network of CPU and FPGA hardware, where FPGA acts as external co-processor to CPU. However, this programming model is still evolving and has many challenges.
Programming Model for EmbSup
References
Supercomputing |
https://en.wikipedia.org/wiki/Petar%20Majstorovi%C4%87 | Petar Majstorovic (born 5 February 1975), is a Swiss karateka and kickboxer. He was a two-time World Kickboxing Network (W.K.N.) World Champion and two times K-1 preliminary tournaments champion in Croatia and Germany.
He trained with Andy Hug from 1992 to 2000.
Majstorović's karate record is 45 wins and six losses out of 51 fights. His K-1 record is at 69 wins and 22 losses out of 90 fights. In 2009, he registered Petar Majstorovic K Gym as a private business in Bern.
Titles
1996 Switzerland Seidokarate Open champion
1998 WKA European Kickboxing Heavyweight champion
2000 WKN Intercontinental Thai boxing champion
2001 K-1 World Grand Prix Preliminary Germany champion
2001 W.K.N. World Kickboxing champion
2001 K-1 World Grand Prix Preliminary Germany Champion
2008 WPKC World Heavyweight champion +95 kg
2006 K-1 Fighting Network Prague Round '07 runner up
2003 K-1 Spain Grand Prix in Barcelona runner up
2002 K-1 World Grand Prix Preliminary Croatia champion
2008 World Full Contact Association (W.F.C.A.) World Super Heavyweight kickboxing champion
2013 Fight Night European Heavyweight kickboxing champion
2017 K-1 WGP Light Heavyweight Champion
Kickboxing record
|- bgcolor="#CCFFCC"
|2017-06-10||Win||align=left| Janosch Nietlispach||K1 Andy Hug Memorial 2017||Switzerland|| Ext. R. TKO||4||
|-
!style=background:white colspan=9|
|-
|- bgcolor="#CCFFCC"
|2016-06-18||Win||align=left| Stefan Leko||Swiss Las Vegas Fusion 2016||Switzerland||TKO||2||
|-
|- bgcolor="#CCFFCC"
|2013-11-02||Win||align=left| Ibo Efe||FIGHT NIGHT BERN 2013||Urtenen-Schönbühl, Switzerland||KO||3||
|-
|- bgcolor="#CCFFCC"
|2013-05-11||Win||align=left| Patrick Schmid||Fight for Glory||Zollikofen, Switzerland|| Decision || 3||3:00
|- bgcolor="#FFBBBB"
|2009-03-14||Loss||align=left| Rico Verhoeven||Oktagon presents: It's Showtime 2009||Milan, Italy||Decision||3||3:00
|- bgcolor="#CCFFCC"
|2008-11-15||Win||align=left| Frédéric Sinistra||||Liège, Belgium||TKO||12||2:00
|-
!style=background:white colspan=9|
|-
|- bgcolor="#FFBBBB"
|2008-11-08||Loss||align=left| Tomáš Hron||Janus Fight Night "The Legend"||Padova, Italy||Decision||3||3:00
|- bgcolor="#FFBBBB"
|2008-02-09||Loss||align=left| Xhavit Bajrami||||Switzerland||Decision (unanimous)||3||3:00
|- bgcolor="#CCFFCC"
|2007-11-27||Win||align=left| Ergin Solmaz||Night of Fighters 4||Bern, Switzerland||KO||2||2:15
|-
!style=background:white colspan=9|
|-
|- bgcolor="#FFBBBB"
|2007-09-07||Loss||align=left| Magomed Magomedov||Noc Bojovníkov||Bratislava, Slovakia|| Decision||3||3:00
|- bgcolor="#CCFFCC"
|2007-08-19||Win||align=left| Tibor Nagy||K-1 Fighting Network Hungary 2007||Debrecen, Hungary||Decision||3||3:00
|- bgcolor="#FFBBBB"
|2007-05-04||Loss||align=left| Errol Zimmerman||K-1 Fighting Network Romania 2007||Bucharest, Romania||Decision (Majority)||4||3:00
|- bgcolor="#CCFFCC"
|2007-03-10||Win||align=left| Michael McDonald||K-1 Fighting Network Croatia 2007||Split, Croatia||TKO||5||3:00
|- bgcolor="#CCFFCC"
|2007- |
https://en.wikipedia.org/wiki/Tanwei%20station | Tanwei Station (), formerly Datansha South Station () and Datansha Station () during planning, is an elevated station on Line 5 of the Guangzhou Metro and an underground station on Line 6. It is located at Zhongshuangqiao Park () on Datansha Island in the Liwan District. It opened on 28 December 2009. It became an interchange station between Line 5 and Line 6 on 28December 2013.
Gallery
Others
Another station in Line 6 on Datansha Island, Datansha North Station () was renamed as Hesha Station ().
References
Railway stations in China opened in 2009
Guangzhou Metro stations in Liwan District |
https://en.wikipedia.org/wiki/Guillermo%20Simari | Guillermo Ricardo Simari is an Argentine computer scientist born in the city of Buenos Aires. He has headed the Artificial Intelligence Research and Development Lab (LIDIA) at National University of the South since 1990.
Since December 2018, he is Professor Emeritus of Logic in Computer Science and Artificial Intelligence at National University of the South.
He is co-editor of the Journal of Argument & Computation, and co-editor of the Argumentation Corner of the Journal of Logic and Computation with Francesca Toni and Phan Minh Dung.
He earned his Ph.D. in 1989 at Washington University in St. Louis under the supervision of Ronald Loui.
References
External links
DBLP record of Publications http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/s/Simari:Guillermo_Ricardo.html
Google Scholar Guillermo R. Simari
Argumentation in Artificial Intelligence | SpringerLink (with Iyad Rahwan)
Trends in Belief Revision and Argumentation Dynamics (with Eduardo Fermé and Dov Gabbay)
College Publications - Logic and cognitive systems
Guillermo R. Simari personal web page
IJCAI-15 web page Home (Local Arrangements Chair)
Dagstuhl Seminars Schloss Dagstuhl : Seminar Homepage, Schloss Dagstuhl : Seminar Homepage
Argentine computer scientists
Living people
Academic staff of Universidad Nacional del Sur
Universidad Nacional del Sur alumni
Washington University in St. Louis alumni
1948 births |
https://en.wikipedia.org/wiki/Hercules%20InColor%20Card | The Hercules InColor Card (GB222) is an IBM PC compatible 8-bit ISA graphics controller card released in April 1987 by Hercules Computer Technology, Inc. It supported a fixed hardware palette of 64 colours, with the ability to display with 16 colours on an EGA monitor and software redefinable fonts.
After the success of the monochrome Hercules Graphics Card (HGC) and Hercules Graphics Card Plus (HGC+) which gained wide developer support, the market was changing with the release of new colour cards which were becoming increasingly affordable. So Hercules released the InColor to compete primarily with IBM's new high-end VGA card, and also with many existing EGA compatible cards on the market.
The card came with drivers for popular programs like Lotus 1-2-3, AutoCAD, WordPerfect 5.0 or Microsoft Windows. Some compatible games with the card included Karateka, Microsoft Flight Simulator 3.0 and 4, 3-D Helicopter Simulator, RAPCON: Military Air Traffic Control Simulator and Eco Adventures in the Oceans.
The InColor did not bring the success that Hercules had hoped for, and revenue slowly declined until Hercules was eventually acquired by Guillemot Corporation in October 1999 for $8.5m USD.
See also
Hercules Graphics Card
Hercules Graphics Card Plus
Hercules Network Card Plus
References
Graphics cards
Products introduced in 1987 |
https://en.wikipedia.org/wiki/Burn%20Notice%20%28season%203%29 | The third season of the American television spy drama Burn Notice premiered on June 4, 2009 on the cable television channel USA Network. Season three consists of sixteen episodes, split between a nine-episode summer season and a seven-episode winter season.
Season overview
Season 3 picks up with Westen, having lost the protection of "Management," now under surveillance by Miami Detective Paxson (Moon Bloodgood), who has been tasked with monitoring his activities. Michael can secure the arrest of a major Miami criminal Paxson has long been targeting, and he threatens to reveal the true circumstances of the arrest if Paxson does not stop following him. Paxson agrees to the deal. Michael is soon contacted by a man named Tom Strickler (Ben Shenkman), a "smooth-talking, gregarious freelance spy broker", who offers to unburn Michael in exchange for his help with a potentially lethal job. It is clear to Michael that Strickler has major, if shadowy, connections, but appears to be the first person he has met capable of getting him his old job back. At first, it seems to work, and Michael can confirm, through interactions with undercover CIA agent Diego Garza (Otto Sanchez), that movement is being made on his burn notice. In the midseason finale, however, Michael is forced to kill Strickler to save Fiona's life. The action has unforeseen consequences, including the murder of Agent Garza.
Following Strickler's death, Westen is contacted by an associate named Mason Gilroy (Chris Vance), who is responsible for the murder of Garza. Gilroy informs Michael that he wants Michael's help on an extremely lucrative operation. Believing Gilroy to be planning something dangerous, Michael plays along to uncover the plot to eventually foil it. After performing several errands for Gilroy, Michael learns that the job involves a maximum security prisoner being rendered from Chile to Poland. Gilroy's job is to divert the plane to Miami, but he is double-crossed and blown up. Before dying, he informs Michael that the man behind the operation is named Simon (Garret Dillahunt), a man who committed the crimes used to burn Michael. In the Season 3 finale, Michael solicits help from Management to stop Simon. Michael successfully captures Simon but is arrested himself, while Management states that Michael has a "big future." Michael is taken to a mysterious room, where he sits as the season ends.
Actor Michael Weston appeared in one episode as a schizophrenic MIT graduate who needs Michael to protect him from what he thinks are aliens selling the names of undercover spies. Also, Sharon Gless was nominated for the Primetime Emmy Award for Outstanding Supporting Actress in a Drama Series for her work in this season. Gless was also reunited with her former Cagney & Lacey co-star, Tyne Daly, for the episode "A Dark Road".
Cast
Jeffrey Donovan returned for the third season as series protagonist Michael Westen. Gabrielle Anwar also returned as Fiona Glenanne, while Bruce Campbell |
https://en.wikipedia.org/wiki/List%20of%20Canadian%20television%20personalities | This is a list of Canadian television personalities. It should only include people associated with non-fiction programming, not actors.
A
Steve Anthony, MuchMusic VJ and morning show host
Thalia Assuras, newscaster
Nahlah Ayed, journalist
B
Bryan Baeumler
Isabel Bassett, journalist
Ralph Benmergui, journalist and talk show host
Rod Black, sportscaster
Mike Bullard, talk show host
Arlene Bynon, talk show host
C
Elaine Callei, 1970s daytime talk show host and cohost of Canada AM
Rick Campanelli, entertainment reporter and MuchMusic VJ
Maggie Cassella, talk show host
Erin Cebula
Don Cherry, sportscaster
Catherine Clark, journalist
Tom Clark, newscaster
Adrienne Clarkson, arts journalist
Steven Cojocaru, fashion critic and correspondent for Entertainment Tonight
Ernie Coombs, children's entertainer known as "Mr. Dressup"
D
Sarah Daniels
Marilyn Denis, talk show host
Bernard Derome, newscaster
Alexandre Despatie
James Doohan
Dwight Drummond, newscaster
Francis D'Souza, journalist
Mario Dumont, talk show host
Philip DuMoulin
Darren Dutchyshen, sportscaster
E
Rosey Edeh
Tyrone Edwards, MuchMusic and eTalk
Erica Ehm, MuchMusic VJ
Mary Jo Eustace, cooking show host
F
Peter Fallico
Jebb Fink, talk show host
Dave Foley, Etobicoke comedian
Kevin Frankish
Dawna Friesen, newscaster
Liza Fromer
G
Vicki Gabereau, talk show host
Martine Gaillard, sportscaster
Chris Gailus, newscaster
Céline Galipeau, newscaster
Sean Gehon, entertainment reporter
Tom Gibney
Anne-France Goldwater, court show judge
Bill Good, newscaster
Richard Gizbert
Tom Green, Pembroke
Peter Gzowski, talk show host
H
Avery Haines, newscaster
Monty Hall, game show host
Adrian Harewood, newscaster
Phil Hartman, sketch comedian
Jane Hawtin, talk show host
Jennifer Hedger, sportscaster
Cheryl Hickey, entertainment reporter
Heather Hiscox, newscaster
Johnny Hockin
Mike Holmes, home renovation contractor
Bob Homme, children's entertainer known as "The Friendly Giant"
Tommy Hunter, variety show host
Helen Hutchinson, journalist
Chris Hyndman, HGTV designer and talk show host
I
Marci Ien, newscaster and talk show host
Orin Isaacs, talk show bandleader
J
Doug James, former CNN correspondent, former CBC reporter and host
Stu Jeffries, VJ
Peter Jennings, newscaster
Jenny Jones, London television host
K
Arthur Kent, journalist
Peter Kent, newscaster
Tanya Kim
Harvey Kirck, newscaster
Ken Kostick, cooking show host
Elvira Kurt
Keltie Knight, entertainment journalist
L
Lisa LaFlamme, newscaster
Amanda Lang, business newscaster
Ricardo Larrivée, chef
René Lecavalier
Philippe Létourneau, driving expert
Art Linkletter, talk show host
Elaine "Lainey" Lui, entertainment reporter and talk show host
M
Ron MacLean, sportscaster
Rita MacNeil, variety show host
Howie Mandel
Peter Mansbridge, newscaster
Jay Manuel
Pamela Martin, newscaster
Gord Martineau, newscaster
Shahir Massoud, chef and talk show host
Bob McAdorey, entertainment reporter
Mark McKinney, Ottawa comedian
Ann Medina, journalist and documen |
https://en.wikipedia.org/wiki/List%20of%20universities%20in%20Australia%20by%20enrollment | This is a comprehensive list of all universities in Australia by total university enrolment. The data is gathered from the Department of Education and Training Higher Education statistics from 2016. For accuracy of comparison, all data is measured in Equivalent Full-Time Student Load (EFTSL) except for "Total Students".
National universities
Australian Capital Territory
New South Wales
Northern Territory
Queensland
South Australia
Tasmania
Victoria
Western Australia
Largest universities
By all students
By EFTSL
By enrolments
By undergraduate students
By postgraduate students
References
External links
Australian University Rankings
Australia education-related lists
Australia |
https://en.wikipedia.org/wiki/Unwin%20Radar | The Unwin Radar is a scientific radar array at Awarua, near Invercargill, New Zealand .
Unwin is part of the Super Dual Auroral Radar Network (SuperDARN), an international radar network for studying the upper atmosphere and ionosphere that operates in the High Frequency (HF) bands between 8 and 22 MHz.
The radar and associated research provides greater understanding of atmospheric weather, to assist with weather prediction, prediction of telecommunication interference and provide a better understanding of the effects of atmospheric magnetic fields on power grid management.
The facility is operated by La Trobe University and was named after Bob Unwin, a pioneer in auroral radar research, who first proposed the concept behind the project in the 1960s
Operation
Bursts of shortwave radio pulses are transmitted from the radar in a southern arc that includes the South Magnetic Pole. The ensuing reflections from micrometeorites, the ionosphere, ocean and aurora are detected at the station and resolved there.
The TIGER-Unwin is a monostatic, pulsed radar that operates in the 8 MHz - 20 MHz range. The transmitting antenna consists of an array of 16 log periodic antennas.
These antennas form a narrow beam ~4 degrees (at 12 MHz) that is swept across the radar footprint in 16 steps (one step per antenna array).
In the vertical direction the beam is ~30 degrees with a maximum in the range of 15 degrees (at 20 MHz) to 35 degrees (at 8 MHz).
An additional four antennas placed some distance behind the transmitting array. These antennas are used to form an interferometer receiving array that measures the elevation angle of echoes. In the standard operation mode the radar uses frequency hopping where the transmission frequency changes to accommodate changing ionospheric conditions. This frequency hopping is done by ongoing scanning the frequency band to determine automatically which channels are free of interference and provide the best coverage.
The data from Unwin is transmitted back to La Trobe University where it is made available over the Internet to users. The Unwin Radar and its counterpart at Bruny Island in Tasmania form the Tasman International Geospace Environment Radar (TIGER).
The Southland region is regarded as an ideal location for such a facility because of the southerly aspect, low radio noise and unobstructed horizon.
References
Buildings and structures in Southland, New Zealand
Science and technology in New Zealand
La Trobe University
Radar |
https://en.wikipedia.org/wiki/Tourism%20in%20Bolivia | Tourism in Bolivia is one of the economic sectors of the country. According to data from the National Institute of Statistics of Bolivia (INE), there were over 1.24 million tourists that visited the country in 2020, making Bolivia the ninth most visited country in South America. the Bolivia is a country with great tourism potential, with many attractions, due to its diverse culture, geographic regions, rich history and food. In particular, the salt flats at Uyuni are a major attraction.
World Heritage Site
In the country there are six World Heritages declared by the UNESCO:
The ruins of the city of Tiwanaku, capital of the 6th-century empire that ruled the southern Andes
The city of Potosí, historic city known for its religious and civic monuments and Cerro Rico
The Amazon, a large rainforest and sanctuary for wildlife.
Noel Kempff Mercado National Park, representative place of the Amazon and its immense biodiversity, located on a large plateau, covered by vast forests and magnificent waterfalls.
Madidi National Park, the most diverse place in Bolivia, declared by National Geographic to be one of the 20 best places to visit in the world.
Toro Toro National Park, where found paleontological wealth (thousands of dinosaurs footprints), caves, waterfalls, rock paintings and other places of interest are.
The Jesuit Missions of Chiquitos, the only active missions of all of South America.
The Fort Samaipata, the big rock carved by the Incas in the foothills of the Andes as the limit of his empire.
The Carnival of Oruro,a festival in which Catholicism is mixed with paganism.
Destination
Lake Titicaca, the world's highest navigable lake.
The Isla del Sol, the sacred place of the Incas and birthplace of the founders of the Inca Empire, Manco Cápac and Mama Ocllo
The Isla de la Luna, another sacred place of the Incas near the Isla del Sol.
Copacabana, a small town on the shores of Titicaca, home to the Virgin of Copacabana, crowned queen of Bolivia.
The Andes, the longest mountain range in the world, spanning the entire continent, and has exceptionally attractive regions:
The ski slope containing the highest restaurant in the world, called Chacaltaya.
The highest mountain in the country: Nevado Sajama, with the highest forest in the world.
The salt flats of Uyuni and Coipasa, the largest salt flats in the world.
Bolivia also is the only country in the world in having the only hotel totally fabricated of salt, found in the Uyuni.
The lakes Green lake and Red Lagoon, the sanctuary of the Andean flamingos with one of the largest active volcanoes in the world, the Licancabur.
The historic cities of:
Potosí with its Cerro Rico, formerly the largest deposit of silver in the world.
Sucre, the constitutional capital city of Bolivia, and The City of Four Names, which is home to one of the oldest universities in the Americas.
Cal Orcko is a paleontological site, found in the quarry of a cement factory, in the Department of Chuquisaca.
Cas |
https://en.wikipedia.org/wiki/South%20West%20Main%20Line%20Route%20Utilisation%20Strategy | The South West Main Line Route Utilisation Strategy (SWML RUS) was the first Route Utilisation Strategy (RUS) to be produced under the new Network Rail regime. As such it did not completely adhere to the format that has subsequently become 'standard', and needs to be read in conjunction with the prior Draft for Consultation. It was published in May 2006 and was included in a map published by the Office of Rail Regulation as established in May 2007.
For this purpose the South West Main Line covers not only the whole of Network Rail's Route 3 - South West Main Line (with the exception of the Isle of Wight line), but also significant parts of Route 4 - Wessex, specifically Basingstoke to Exeter and routes west of Eastleigh and Redbridge (both near Southampton), as well as the Basingstoke to Reading West line of Route 13 - Great Western Main Line.
The major issue is overcrowding in the peak periods, but other issues are addressed.
Specific measures recommended
Measures to tackle overcrowding in the peaks
Short term
Short-term measures to improve mobility in the Waterloo concourse, at the expense of retail space
Selected peak services to be lengthened, consistent with platform lengths available at Waterloo and elsewhere
Medium term
Sophisticated ticketing and pricing systems to spread the demand during/outside the peaks
Progressive redevelopment of Waterloo, starting with adapting Waterloo International Terminal for domestic use, including accommodating first 10-car, eventually 12-car trains.
Measures to improve the use of existing track capacity
Short term
Revision of timetables to improve the balance of performance vs scheduled journey times
A revised platforming strategy at Portsmouth Harbour
Modification of service patterns mainly west of Southampton
Medium term
Development of improved station and intermodal interchange facilities.
Measures to develop freight capacity in the medium term
Upgrading the route for freight from Southampton Container Terminal to Reading West to W10 loading gauge, to handle 9' 6" high by 2.5 metre shipping containers; this was passed to the Freight RUS.
Measures to improve services between Salisbury and Exeter in the medium term
Redoubling of selected stretches of this single-track line to provide an hourly service between Exeter and Waterloo and one extra train per hour between Exeter and Axminster
References
Network Rail |
https://en.wikipedia.org/wiki/Kitonga | Kitonga is a town in eastern Tanzania near the coast.
Transport
It is served by a station on a cross-country line of the national railway network.
See also
Railway stations in Tanzania
References
Populated places in Pwani Region |
https://en.wikipedia.org/wiki/Smart.fm | Smart.fm (formerly iKnow!) was a social learning- and community website created by Cerego Japan, Inc. The website used spaced repetition algorithms (SRS) to assist users in committing facts to long term memory and increasing learning speed. Users could create, manage and share lists of facts to memorize; as well as learn a number of languages. The data was used to automatically plan a curriculum and learning strategy for the users.
In addition to the website base, Smart.fm also had a Facebook application.
History
Smart.fm was created by Japan-based company Cerego Japan, Inc., initially featuring language-learning and branded under the name iKnow! (iKnow.co.jp). The original platform focused on English learners in Japan. On November 24, 2008 the platform turned to world-wide audience when it added another 188 languages. The upgrade also included tools for users to create learning content; sample sentences and timed tests. Cerego had raised US$20 million in funding at the time and was staffed by 22 employees.
The site's name was changed to Smart.fm on March 5, 2009 when the platform introduced an upgrade which enabled users to add learning content of any kind. The re-branding was sudden, and users complained about the new interface and new name. About the new name, Cerego's Russell Moench explained in an official announcement: "we see ourselves more like your personal learning station than an online classroom or teacher or textbook."
Technology
Cerego's Smart.fm used spaced repetition techniques to assist users in organizing learning content, increase learning speed and improve recollection. The system was based on established methods of learning derived from cognitive- and neuroscience research; continuously analyzing performance, on a long- and short-term basis, making dynamic adjustments to learning exercises. The data was used to automatically plan a curriculum and learning strategy for the users.
Closure
On January 27, 2011, Cerego Japan, Inc. announced the planned closure of the Smart.fm free service for March 31, 2011. The Smart.fm service has since been replaced with Cerego's paid subscription-based language learning site, iKnow!
References
Spaced repetition software |
https://en.wikipedia.org/wiki/XML%20Literals | In the Microsoft .NET Framework, XML Literal allows a computer program to include XML directly in the code. It is currently only supported in VB.NET 9.0 and VB.NET 10.0. When a Visual Basic expression is embedded in an XML literal, the application creates a LINQ-to-XML object for each literal at run time.
See also
String literal
Character literal
ECMAScript for XML
JSX (JavaScript)
XHP
References
External links
Creating Complex XML Documents with XML Literals
XML Literals Overview (Visual Basic)
.NET terminology
XML |
https://en.wikipedia.org/wiki/Montefiore%20Institute | The Montefiore Institute is the department of Electrical Engineering and Computer Science of the Faculty of Applied Sciences of the University of Liège, Belgium.
It was founded in 1883 and is named after Georges Montefiore-Levi.
External links
Montefiore Institute website
University of Liège
Electrical and computer engineering departments |
https://en.wikipedia.org/wiki/Language%20for%20Instruction%20Set%20Architecture | LISA (Language for Instruction Set Architectures) is a language to describe the instruction set architecture of a processor. LISA captures the information required to generate software tools (compiler, assembler, instruction set simulator, ...) and implementation hardware (in VHDL or Verilog) of a given processor.
LISA has been used to re-implement the hardware of existing processor cores, keeping the binary compatibility with the legacy version, as all software tools did already exist and legacy compiled software images could be executed on the newly created hardware. Another application has been to generate the ISS (instruction set simulator) for RISC processors such the ARM architecture ISSes.
LISA' is not focused on the modeling of other on-chip components around the processor core itself, such as peripherals, hardware accelerators, buses and memories; Other languages such as SystemC can be used for these.
The language has not been yet standardised by IEEE or ISO and is currently owned by RWTH Aachen University, in Germany.
History
LISA was initially developed at Institute for Integrated Signal Processing Systems (ISS) Aachen, belonging to RWTH Aachen University, in Germany. The current official version from RWTH Aachen is LISA 2.0. The language is still in evolution to cover research on processors, including Reconfigurable computing (in LISA 3.0), multi-core, parallel programming.
One noticeable branch called LISA+ has been created for handling the modeling of peripherals such as interrupt controllers, timers, etc.
See also
Alphabetical list of programming languages
SystemC
Verilog
VHDL
References
Papers
V. Zivojnovic, S. Pees, Ch. Schläger, H. Meyr, LISA bridges gaps in high-tech languages, Electronic Engineering Times, Oct 7, 1996
V. Zivojnovic, S. Pees, H. Meyr, LISA – machine description language and generic machine model for HW/SW co-design, Proceedings of the IEEE Workshop on VLSI Signal Processing (San Francisco), Oct. 1996
A. Chattopadhyay, H. Meyr and R. Leupers: LISA: A Uniform ADL for Embedded Processor Modeling, Implementation and Software Toolsuite Generation appearing in P. Mishra, N. Dutt, Processor Description Languages, Volume 1, Morgan Kaufmann, 2008.
Books
A. Hoffmann, H. Meyr, R. Leupers: Architecture Exploration for Embedded Processors with LISA, Springer, 2010.
O. Wahlen: C Compiler Aided Design of Application-specific Instruction-set Processors Using the Machine Description Language LISA (Berichte Aus Der Electrotechnik), Shaker Verlag GmbH, Germany (August 13, 2004).
External links
LISA project page at RWTH Aachen, Germany
Processor Designer is a tool sold by Synopsys to create processors from LISA 2.0 descriptions
Specification languages |
https://en.wikipedia.org/wiki/List%20of%20solid-state%20drive%20manufacturers | This is the list of manufacturers of solid-state drives (SSDs) for computers and other electronic devices that require data storage. In the list those manufacturers that also produce hard disk drives or flash memory are identified. Additionally, the type of memory used in their solid-state drives is noted. This list does not include the manufacturers of specific components of SSDs, such as flash memory controllers.
See also
History of hard disk drives
List of computer hardware manufacturers
List of defunct hard disk manufacturers
References
Lists of computer hardware
Lists of consumer electronics manufacturers
Lists of manufacturers
Manufacturers |
https://en.wikipedia.org/wiki/PULSE%20%28computer%20system%29 | PULSE (Police Using Leading Systems Effectively) is a computer system used by the Garda Síochána, the police force of the Republic of Ireland. The system was introduced in November 1999.
The contract for the system was awarded to Andersen Consulting (now Accenture) and is managed by a directorate of three senior Gardaí and an Accenture consultant. The system is run by the PULSE Project teams of the IT section of the Garda Síochána.
The system cost €61.3 million originally and between 2001 and 2006 €12.88 million was spent on updating and maintaining it. The system is available in 519 of 565 Garda stations.
Under data protection legislation, it is possible to request personal data held on the system, unless that information would identify someone else or if disclosing the personal data is being held in order to prevent, investigate or detect crime or is being used for prosecuting or arresting offenders.
Insurance investigation
In 2007 between 40 and 50 Gardaí were questioned as part of an internal inquiry into allegations that Gardaí had supplied confidential information to insurance companies in order to settle road traffic claims. The PULSE system was included in the investigation.
Reliability
PULSE has been the subject of complaints by the Association of Garda Sergeants and Inspectors and the Garda Representative Association on grounds that it is unreliable and has caused backlogs in bringing cases to court. Kathleen O'Toole criticised the system for being difficult to use and not being user-friendly.
See also
Police National Computer, the equivalent system in the United Kingdom
Prawo Jazdy (alleged criminal)
References
Garda Síochána |
https://en.wikipedia.org/wiki/Osthannoversche%20Eisenbahnen | The Osthannoversche Eisenbahnen AG (OHE) is a Celle based transportation company with railway network in North-eastern Lower Saxony around the Lüneburg Heath area of over 250 km.
The OHE's main business is the transportation of freight through their own routes as well as the network of the Deutsche Bahn.
Historically the company also operated passenger trains, which completely ended in 1977 after previous partial closures. After the de-monopolisation of the German railways in the 1990s the company re-entered the rail passenger market through the company NiedersachsenBahn which has a large stake in the company metronom
In March 2007 the OHE became majority owned by Arriva Deutschland.
History
Formation
In 1944 the OHE arose from the merger of several companies from the northeast area of Lower Saxony, its creation was not purely for economic reasons, but also being politically favourable to the national socialist Gau Osthannover government.
The company was formed on 10 July 1944 from a number of small railways previously under the management of the Niedersächsisches Landeskleinbahnamt (LKA):
Celler Eisenbahnen AG - formed in March 1944 from the merger of two companies:
Eisenbahn Celle-Wittingen AG; before 1940 the Kleinbahn Celle-Wittingen (CW) (established 1904)
Eisenbahn Celle-Soltau, Celle–Munster; before 1940 known as the Kleinbahn Celle-Soltau-Munster GmbH (CSM) before 1910 known as the Kleinbahn Garßen-Bergen (first established 1902)
Winsener Eisenbahn GmbH - formed in 1933 from the merger of two companies:
Kleinbahn Winsen–Niedermarschacht
Kleinbahn Winsen–Evendorf–Hützel (WEH)
Lüneburg-Bleckeder Eisenbahn GmbH formed from the Bleckeder Kleinbahn GmbH (BI.KB) in September 1943.
Lüneburg-Soltauer Eisenbahn formed in 1943 from the Kleinbahn Lüneburg-Soltau GmbH (founded 1913)
Kleinbahn Soltau–Neuenkirchen (founded 1920)
Additionally the Kleinbahn Wittingen-Oebisfelde (KWOe) was also incorporated on the same day. The new company Osthannoverschen Railways AG 1944 had routes of 340 km total length: it was for decades the largest of the non-federal railways of Germany
At its founding in 1944 the main shareholders were the Prussian State and the Province of Hanover with 53% of the shares combined, the districts of Celle, Fallingbostel, Gifhorn, Harburg and Lüneburg also had owned shares.
By the end of 2006 the OHE was still state-owned with 40.2% held by the state of Lower Saxony and 33.8% by the German state
In July 2006 the German state, the state of Lower Saxony and DB Regio AG decided to sell their shares as part of a privatisation process. The successful bidder was Arriva-Bachstein GmbH; a consortium made up of Arriva (86%) and Verkehrsbetriebe Bach Stein GmbH (14%), with an offer of 30million Euros, and various supplementary promises, subject to regulatory and parliamentary approval.
Shareholders as of 2008 were: Arriva Bachstein GmbH - 85.118%, Celle council - 5.615%, Gifhorn council - 3.224%, Lüneburg council- 2.178%, Soltau- |
https://en.wikipedia.org/wiki/Stock%20assessment | Stock assessments provide fisheries managers with the information that is used in the regulation of a fish stock. Biological and fisheries data are collected in a stock assessment.
A wide array of biological data may be collected for an assessment. These include details on the age structure of the stock, age at first spawning, fecundity, ratio of males to females in the stock, natural mortality (M), fishing mortality (F), growth rate of the fish, spawning behavior, critical habitats, migratory habits, food preferences, and an estimate of either the total population or total biomass of the stock.
The following data regarding fisheries activities is collected: the kinds of fisherman in the fishery, commercial versus recreational, and the gear that is used (longline, rod and reel, nets, etc.), pounds of fish caught by each type of fisherman, the fishing effort each kind of fisherman expends, the age structure of the fish harvested by each group of fisherman, the ratio of males to females that are captured, how the fish are marketed, the value of the fish to the different fisherman groups, and the time and geographic location of the best catches. Also in the assessment, geographical boundaries of different stocks or populations are defined. From the combined biological and fisheries data, the current status and condition of the stock is defined and managers use this assessment to predict how in the future, stocks will respond to varying levels of fishing pressure. Ultimately managers want to reduce the level of overfishing that occurs and restore stocks that have been overfished.
Defining stock
In fisheries management, stock refers to a harvested or managed unit of a fish. Typically stocks are divided based on geographical location and not based on individual population. Spanish mackerel are distributed from Maine to the Yucatan Peninsula in Mexico. They are divided into two stocks, based on whether they migrate northward along the eastern United States coast or if they migrate into the Gulf of Mexico. Each stock of Spanish mackerel does not represent discrete populations. Stocks are not always composed of a single species. Stocks can be composed of multiple species due to their being harvested together or as a form of convenience for managers. An example of a multispecies stock is river herring. Alewives and blueback herring are labeled as river herring for management purposes due to their similar physical appearances and being harvested together. Individuals within a stock are subdivided into cohorts. A cohort is a group of fish born in the same year within a population or stock.
Gathering data
Data used in stock assessments can be classified as fishery-dependent data or fishery-independent data. Fishery-dependent data is collected from the fishery itself, using both commercial and recreational sources. There are a variety of methods for obtaining fishery-dependent data. The most common approach is to use recorded landings. |
https://en.wikipedia.org/wiki/Chewy | Chewy may refer to:
Chewy (company), pet food company based in the United States
Chewy: Esc from F5, a 1996 computer game and its title character
Andrew Lichtenberger (born 1987), American poker player
Daniel Mongrain (born 1976), member of the Canadian band Martyr
Luis Suárez, Uruguayan association footballer
Chewy the puppy, a character from the animation series Foster's Home for Imaginary Friends
Chewbacca, a fictional character, whose name is often shortened to "Chewy" or "Chewie"
An Australian abbreviation for chewing gum
A wine tasting descriptor
Chewy bar, a brand name granola bar made by the Quaker Oats Company
See also
"Chewy Chewy", a song by Ohio Express
Chewiness, used to describe any foodstuff that requires a lot of chewing
Chuy (disambiguation) |
https://en.wikipedia.org/wiki/Westgate%20Mall%20%28Pennsylvania%29 | Westgate Mall is a shopping mall located in Bethlehem, Pennsylvania. It is anchored by Harbor Freight Tools, Lehigh Valley Health Network, Oak Street Health, Sky Zone Trampoline Park, and Weis Markets.
History
The first buildings on the mall property were constructed in 1964 by Harold Campbell. George's IGA Foodliner opened in 1967 and Hess's was built on the site in 1971. Westgate Mall was built in 1973. On February 12, 1977 a three-alarm fire occurred at the Westgate Mall causing the loss of 18 stores and injuries to several firefighters. The fire only stopped due to a firewall and was ruled arson, but no suspect was ever found. Damage to the mall totaled $2,857,452. George's IGA was sold to King's IGA in 1992, with King's planning to make upgrades. Hess's interior was redesigned in 1993 and the store was purchased by The Bon-Ton in 1994. From 1999-2005, a legal dispute over the land that housed The Bon-Ton occurred, and it was eventually sold to PREIT for $500,000. Newberry's converted to a Dollar Zone before closing in April 2002.
The family of Harold Campbell attempted to take control of Westgate Mall on June 4, 2002, which resulted in legal action by the mall's two managers, who had power of attorney over it since 1997. The issue was later settled in 2002 with the managers retaining control of the mall. Starting in November 2011, The Market at Westgate farmers market opened at the mall on Wednesdays. City View Capital LLC purchased most of the mall in June 2013 for $2.3 million. PREIT, who owned the land that housed The Bon-Ton, later sold it to an affiliate of the mall's owners in December 2014 for $3.85 million. The owners of Westgate announced in mid-2015 that the mall would receive $5 million in changes, including a new facade. Sky Zone Trampoline Park was announced as a future addition to the mall in August 2015. The Bon-Ton chain liquidated starting in April 2018, with Westgate's store closing during the summer. Jack Williams Tire subleased space from The Bon-Ton.
Westgate Mall was sold to Onyx Equities LLC and PCCP LLC in October 2018 for $30 million. Weis Markets moved from its existing space at Westgate into part of the former Bon-Ton in May 2021. Lehigh Valley Health Network leased part of the former Bon-Ton for equipment storage in December 2021. Harbor Freight Tools opened in the mall 2022, using part of the space formerly occupied by Weis Markets. Redevelopment plans for Westgate Mall were announced in March 2022. The plans call for over 50,000 square feet of interior space to be demolished and replaced by new buildings, along with facade changes. In January 2023, several stores were asked to vacate in anticipation of the redevelopment, with some relocating to other locations in the Lehigh Valley. New restaurants and a bank will replace that portion of the mall. Oak Street Health opened in June 2023, using the former Rite Aid space.
Notes
References
External links
Onyx Equities Westgate Mall
Shopping malls established i |
https://en.wikipedia.org/wiki/EGX%2030 | EGX 30, previously named CASE 30 Index, is a stock market index for securities in Egypt, designed and calculated by EGX. EGX started disseminating its index on 2 February 2003 via data vendors, its publications, web site, newspapers etc. The start date of the index was on 2/1/1998 with a base value of 1000 points.
EGX 30 index value is calculated in local currency terms and denominated in US dollars since 1998. EGX started publishing its dollar denominated index on 1 March 2009. EGX 30 index includes the top 30 companies in terms of liquidity and activity. EGX 30 Index is weighted by market capitalization and adjusted by the free float. Adjusted Market capitalization of a listed company is the number of its listed shares multiplied by the closing price of that company multiplied by the percent of freely floated shares.
For a company to be included in EGX 30 index, it must have at least 15% free float. This ensures market participants that the index constituents truly represent actively traded companies and that the index is a good and reputable barometer for the Egyptian market.
Annual Returns
The following table shows the annual development of the EGX 30 since 1996.
Notes
External links
EGX 30 INDEX
African stock market indices
Finance in Egypt |
https://en.wikipedia.org/wiki/Love%20Story%20%281954%20TV%20series%29 | Love Story is an early American anthology series which was broadcast on the DuMont Television Network in 1954.
This show should not be confused with NBCs dramatic anthology series Love Story which aired during the 1973–1974 television season.
Broadcast history
The series, an anthology, ran from April to June of 1954. DuMont's Love Story is not to be confused with another dramatic anthology with the same name which ran on NBC in the 1970s, or a game show also titled Love Story which aired on CBS from 1955–1956.
Love Story aired live on Tuesday nights at 9 pm EST on most DuMont affiliates. The series was produced by David Lowe.
Criticism
This series was hampered by a small budget and starred mostly lesser-known actors. Latter-day critics, such as Castleman and Podrazik (1982), have cited Love Story, among other DuMont series, as one of the reasons fewer and fewer viewers tuned in to the ailing DuMont Network. They called the series "a simpering romance anthology" that, like several other DuMont programs during the 1953–1954 season was "doomed from the start by third-rate scripts and cheap production." The series did not last long, and the network itself began crumbling shortly thereafter.
See also
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
References
Bibliography
David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004)
Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980)
Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964)
External links
DuMont historical website
Love Story at CVTA with episode list
1954 American television series debuts
1954 American television series endings
1950s American anthology television series
Black-and-white American television shows
DuMont Television Network original programming
English-language television shows
American live television series |
https://en.wikipedia.org/wiki/Baresa%2C%20Eritrea | Baresa () is a small town in the Northern Red Sea region of Eritrea. It lies between Asmara and Massawa, near Ghinda.
Transport
Baresa is served by a station on the national Eritrean Railway network.
See also
Railway stations in Eritrea
References
Baresa
Populated places in Eritrea |
https://en.wikipedia.org/wiki/Biological%20network | A biological network is a method of representing systems as complex sets of binary interactions or relations between various biological entities. In general, networks or graphs are used to capture relationships between entities or objects. A typical graphing representation consists of a set of nodes connected by edges.
History of networks
As early as 1736 Leonhard Euler analyzed a real-world issue known as the Seven Bridges of Königsberg, which established the foundation of graph theory. From the 1930's-1950's the study of random graphs were developed. During the mid 1990's, it was discovered that many different types of "real" networks have structural properties quite different from random networks. In the late 2000's, scale-free and small-world networks began shaping the emergence of systems biology, network biology, and network medicine. In 2014, graph theoretical methods were used by Frank Emmert-Streib to analyze biological networks.
In the 1980s, researchers started viewing DNA or genomes as the dynamic storage of a language system with precise computable finite states represented as a finite state machine. Recent complex systems research has also suggested some far-reaching commonality in the organization of information in problems from biology, computer science, and physics.
Networks in biology
Protein–protein interaction networks
Protein-protein interaction networks (PINs) represent the physical relationship among proteins present in a cell, where proteins are nodes, and their interactions are undirected edges. Due to their undirected nature, it is difficult to identify all the proteins involved in an interaction. Protein–protein interactions (PPIs) are essential to the cellular processes and also the most intensely analyzed networks in biology. PPIs could be discovered by various experimental techniques, among which the yeast two-hybrid system is a commonly used technique for the study of binary interactions. Recently, high-throughput studies using mass spectrometry have identified large sets of protein interactions.
Many international efforts have resulted in databases that catalog experimentally determined protein-protein interactions. Some of them are the Human Protein Reference Database, Database of Interacting Proteins, the Molecular Interaction Database (MINT), IntAct, and BioGRID. At the same time, multiple computational approaches have been proposed to predict interactions. FunCoup and STRING are examples of such databases, where protein-protein interactions inferred from multiple evidences are gathered and made available for public usage.
Recent studies have indicated the conservation of molecular networks through deep evolutionary time. Moreover, it has been discovered that proteins with high degrees of connectedness are more likely to be essential for survival than proteins with lesser degrees. This observation suggests that the overall composition of the network (not simply interactions between protein pairs) is v |
https://en.wikipedia.org/wiki/Hamersley%20%26%20Robe%20River%20railway | The Hamersley & Robe River railway, majority-owned by Rio Tinto, and operated by its subsidiary Pilbara Iron, is a private rail network in the Pilbara region of Western Australia for the purpose of carrying iron ore. The network is larger than any other Australian heavy freight rail network in private ownership. The total length of its track is about .
There are four other iron ore rail lines in the Pilbara. BHP operate the Goldsworthy and Mount Newman railways, Fortescue Metals Group operate the Fortescue railway and Hancock Prospecting the Roy Hill railway.
History
Hamersley railway
The first part of the Pilbara Iron rail network to be constructed was a line known as the Hamersley railway, between a newly opened mine at Tom Price and a newly constructed port (now the port of Dampier) at King Bay.
The Hamersley railway project began in December 1964, when Japanese steel mills agreed to purchase iron ore from Hamersley Iron over 16 years beginning in August 1966. The railway's route was chosen after two aerial surveys and comparisons of numerous possible alternatives.
In April 1965, a joint venture of Morrison-Knudsen, Mannix Contractors of Canada and McDonald Constructions of Australia was appointed to build the line of 180 miles, for $15,680,000. Excavations commenced at Dampier on 16 June 1965. Until the completion of a service wharf at that location, cargo had to be brought ashore on lighters, or unloaded at Point Samson. On 6 September 1965, the freighter Katsura Maru became the first vessel to berth at the service wharf; its cargo included the railway's first four locomotives.
The original track for the Hamersley railway was rails manufactured in Japan, laid on sleepers of jarrah and wandoo timber from Western Australia with dog spike fastenings and ballasted with of crushed stone. For most of the construction period, track was laid at a rate of per day. On 23 June 1966, the first ore train ran from Tom Price to the coast, and on 1 July 1966 the line was officially opened by the Minister for Industrial Development, Charles Court.
In 1970, construction began on an extension of the Hamersley railway from Wombat Junction, just north of Tom Price, to a second mine, at Paraburdoo, about south west of Tom Price. Engineering design and construction management for the extension was undertaken by Minenco; the contractors were a joint venture known as Morrison-Knudsen-Mannix-Oman (MKMO). The Paraburdoo extension incorporated a number of design improvements. In particular, the track was made from heavier, rail sections, which were flashbutt and thermit welded into continuous rails, and attached by pandrol clips to timber sleepers. Construction was completed in March 1972, and the first official Paraburdoo train ran on 5 May 1972.
In 1972, a programme of rerailing the original railway began. In that year, of track and dog spikes were replaced with track and pandrol clips. The replacement programme continued until its completion in 1977 |
https://en.wikipedia.org/wiki/Packet%20aggregation | In a packet-based communications network, packet aggregation is the process of joining multiple packets together into a single transmission unit, in order to reduce the overhead associated with each transmission.
Packet aggregation is useful in situations where each transmission unit may have significant overhead (preambles, headers, cyclic redundancy check, etc.) or where the expected packet size is small compared to the maximum amount of information that can be transmitted.
In a communication system based on a layered OSI model, packet aggregation may be responsible for joining multiple MSDUs into a single MPDU that can be delivered to the physical layer as a single unit for transmission.
The ITU-T G.hn standard, which provides a way to create a high-speed (up to 1 Gigabit/s) Local area network using existing home wiring (power lines, phone lines and coaxial cables), is an example of a protocol that employs packet aggregation to increase efficiency.
See also
Packet segmentation
Frame aggregation
Packets (information technology) |
https://en.wikipedia.org/wiki/Packet%20segmentation | In data communications networks, packet segmentation is the process of dividing a data packet into smaller units for transmission over the network. Packet segmentation happens at layer four of the OSI model; the transport layer. Segmentation may be required when:
The data packet is larger than the maximum transmission unit supported by the network
The network is unreliable and it is desirable to divide the information into smaller segments to maximize the probability that each one of them can be delivered correctly to the destination
Protocols that perform packet segmentation at the source usually include a mechanism at the destination to reverse the process and reassemble the original packet from individual segments. This process may include automatic repeat-request (ARQ) mechanisms to detect missing segments and to request the source to re-transmit specific segments.
In a communication system based on a layered OSI model, packet segmentation may be responsible for splitting one MPDU into multiple physical layer service data units so that reliable transmission (and potential re-transmission via ARQ) of each one can be performed individually.
The ITU-T G.hn standard, which provides a way to create a high-speed (up to 1 gigabit/s) local area network using existing home wiring (power lines, phone lines and coaxial cables), is an example of a protocol that employs packet segmentation to increase reliability over noisy media.
See also
Fujitsu Ltd. v. Netgear Inc.
Packet aggregation
Segmentation and reassembly
References
Packets (information technology) |
https://en.wikipedia.org/wiki/IronScheme | IronScheme is an implementation of the Scheme programming language targeting the Microsoft .NET Framework. IronScheme is a complete rewrite of IronLisp, incorporating lessons learnt while developing IronLisp.
IronScheme was planning to build upon the Microsoft Dynamic Language Runtime, but decided to abandon this idea because the DLR branch the project used became out of sync with the trunk, and also because the DLR, according to the developers, could not support the majority of the Scheme's requirements. IronScheme eventually made a limited use of its own version of the Microsoft's DLR, but it had to patch it to be able to implement some required Scheme features like tail call elimination.
See also
Scheme (programming language)
References
External links
IronScheme on GitHub
.NET programming languages
Beta software
Scheme (programming language) implementations |
https://en.wikipedia.org/wiki/Maze-solving%20algorithm | A maze-solving algorithm is an automated method for solving a maze. The random mouse, wall follower, Pledge, and Trémaux's algorithms are designed to be used inside the maze by a traveler with no prior knowledge of the maze, whereas the dead-end filling and shortest path algorithms are designed to be used by a person or computer program that can see the whole maze at once.
Mazes containing no loops are known as "simply connected", or "perfect" mazes, and are equivalent to a tree in graph theory. Maze-solving algorithms are closely related to graph theory. Intuitively, if one pulled and stretched out the paths in the maze in the proper way, the result could be made to resemble a tree.
Random mouse algorithm
This is a trivial method that can be implemented by a very unintelligent robot or perhaps a mouse. It is simply to proceed following the current passage until a junction is reached, and then to make a random decision about the next direction to follow. Although such a method would always eventually find the right solution, this algorithm can be extremely slow.
Wall follower
One effective rule for traversing mazes is the wall follower, also known as either the left-hand rule or the right-hand rule. If the maze is simply connected, that is, all its walls are connected together or to the maze's outer boundary, then by keeping one hand in contact with one wall of the maze the solver is guaranteed not to get lost and will reach a different exit if there is one; otherwise, the algorithm will return to the entrance having traversed every corridor next to that connected section of walls at least once. The algorithm is a depth-first in-order tree traversal.
Another perspective into why wall following works is topological. If the walls are connected, then they may be deformed into a loop or circle. Then wall following reduces to walking around a circle from start to finish. To further this idea, notice that by grouping together connected components of the maze walls, the boundaries between these are precisely the solutions, even if there is more than one solution (see figures on the right).
If the maze is not simply-connected (i.e. if the start or endpoints are in the center of the structure surrounded by passage loops, or the pathways cross over and under each other and such parts of the solution path are surrounded by passage loops), this method will not necessarily reach the goal.
Another concern is that care should be taken to begin wall-following at the entrance to the maze. If the maze is not simply-connected and one begins wall-following at an arbitrary point inside the maze, one could find themselves trapped along a separate wall that loops around on itself and containing no entrances or exits. Should it be the case that wall-following begins late, attempt to mark the position in which wall-following began. Because wall-following will always lead you back to where you started, if you come across your starting point a second time, you |
https://en.wikipedia.org/wiki/Institute%20for%20Certification%20of%20Computing%20Professionals | The Institute for the Certification of Computing Professionals (ICCP) is a non-profit (501(c)(6)) institution for professional certification in the Computer engineering and Information technology industry. It was founded in 1973 by 8 professional computer societies to promote certification and professionalism in the industry, lower the cost of development and administration of certification for all of the societies and act as the central resource for job standards and performance criteria.
The initial certification administered by ICCP in 1973 was the Certified Data Processor (CDP) which was originally created by the Data Processing Management Association (DPMA) in 1965. The institute is a society of Professional Associations, and affiliates across the world with other like organizations with similar goals.
The institute awards a professional certification, Certified Computing Professional (CCP), to individuals who pass a written examination and have at least 48 months experience in computer based information systems. Post secondary education can be substituted for up to 24 months of this requirement. The ICCP created the Certified Business Intelligence Professional (CBIP) in 2003 and the Certified Data Management Professional (CDMP) in 2004. Today the ICCP administers the CDMP as the Certified Data Professional (CDP). ICCP also offers Certified Data Scientist (CDS), Certified Big Data Professional (CBDP) and recently added the Certified Blockchain Professional (CBP).
The institute was responsible for creating the Systems Security Exam (today known as the Cyber Security Examination) for the Information Systems Security (ISC) organization which then became the ISC2 organization offering the CISSP. ICCP has also assisted Network Professional Association (NPA) to create and develop its certification program - Certified Network Professional. ICCP also created the Certified Data Management Professional (CDMP) in 2004 on a request from one of its constituent societies DAMA International. In 2015 the ICCP renamed the CDMP to be the Certified Data Professional to make it inclusive of data science and the myriad of data specialty jobs that were emerging.
Creators and Developers of the CDMP program were: Kewal Dhariwal, Patricia Cupoli, Brett Champlain. The Data Management Body of Knowledge (DMBoK v1 and v2) are based on the ICCP Examinations for each of the 11 areas of the DMBoK Wheel. Editors of the DMBoK were Patricia Cupoli, Deborah Henderson and Susan Earley (all members of the ICCP Certification Council). Patricia Cupoli was the ICCP Director of Certification during this development as well as representing DAMA International on the ICCP Board of Directors. Deborah Henderson was the President of DAMA Education Foundation who then fostered the development and editing of the DMBoK publication.
ICCP examinations are used by the Canadian Information Processing Society (CIPS) towards the Canadian Information Systems Professional (I.S.P.) |
https://en.wikipedia.org/wiki/Coletti | Coletti is an Italian surname. Notable people with the surname include:
Alex Coletti, executive producer and director for MTV Networks
Alexandra Coletti (born 1983), Italian-born alpine skier for Monaco
Antonio Magini-Coletti (1855–1912), Italian operatic baritone
Edward "Ed" Coletti, American poet
Giovanni Giacomo Coleti or Coletti (1734–1827), Italian historian and philologist
Giambattista Coletti (born 1948), Italian, Olympic silver medal in fencing at Montreal 1976
Jean Coletti, French name for Ioannis Kolettis (died 1847), Prime Minister of Greece
John Coletti (born 1949), American automobile engineer
Joseph Coletti (1896–1973), American sculptor
Mattia Coletti (born 1984), Italian ski mountaineer
Nicola Coleti or Coletti (1680–1765), Italian Catholic priest and historian
Paul Coletti (born 1959), Scottish viola soloist and chamber musician
Peter Coletti (born 1968), Australian military aircraft historian, www.colettiscombataircraft.com
Stephen Colletti (born 1986), Italian-American actor and television personality
Fictional characters
Rick Coletti, a character on the American television series Desperate Housewives
Italian-language surnames
Patronymic surnames
Surnames from given names |
https://en.wikipedia.org/wiki/Jon%20Heyman | Jon Heyman (born February 7, 1961) is a baseball columnist for the New York Post, a baseball insider for MLB Network and WFAN Radio and co-host with Joel Sherman of the baseball podcast The Show.
Heyman has also appeared as a guest on numerous radio and TV programs, including Mike and the Mad Dog, The Michael Kay Show, Quite Frankly with Stephen A. Smith, Mike'd Up and Jim Rome is Burning.
Early years
Heyman was born in Santa Fe, New Mexico and grew up in Cedarhurst, New York. He is Jewish and had his bar mitzvah at Temple Sinai in Lawrence, New York in 1974. Heyman graduated from Lawrence High School in 1979. He went to Northwestern University's Medill School of Journalism and graduated in 1983.
Professional career
Heyman began his professional career as a sports writer with The Daily Dispatch in Moline, Illinois.
Heyman spent 16 years at Newsday, where he served as the New York Yankees beat writer, baseball columnist and general sports columnist. In 1999 and 2000, Heyman was a baseball columnist for The Sporting News.
Heyman joined Sports Illustrated in July 2006. At Sports Illustrated, Heyman generally reported on baseball news year-round and wrote a baseball notes column called The Daily Scoop for SI.com. The Daily Scoop ran most weekdays during the baseball season and twice a week during the offseason.
In 2009, Heyman joined the newly launched MLB Network as a baseball insider. In the Sports Illustrated magazine, Heyman frequently wrote an "Inside Baseball" column. In December 2011, Heyman left Sports Illustrated to cover baseball for CBS Sports following the 2011 MLB Winter Meetings. In 2016, Heyman left CBS Sports and joined the FanRag Sports Network as an MLB insider and senior writer for Today's Knuckleball.
In April 2022, Heyman joined the New York Post as a baseball columnist. He and fellow New York Post baseball columnist Joel Sherman soon after launched a podcast named The Show. In December 2022, Heyman tweeted "Arson (sic) Judge appears headed to the Giants." Minutes later, Heyman deleted the tweet and issued a follow-up tweet reading: "Giants say they have not heard on Aaron Judge, [my] apologies for jumping the gun."
References
External links
SI.com Jon Heyman Archive
1961 births
Living people
American male journalists
Major League Baseball broadcasters
Medill School of Journalism alumni
MLB Network personalities
Writers from Santa Fe, New Mexico
People from Cedarhurst, New York
Sportswriters from New York (state) |
https://en.wikipedia.org/wiki/Panjiva | Panjiva Inc. is a global trade data company based in New York City. It is a subscription-based website with import and export details on commercial shipments worldwide. Panjiva was founded in 2006 by Josh Green and James Psota and acquired by S&P Global in 2018.
Business
Panjiva organizes and indexes data provided by a number of different third-party sources, primarily Customs agencies, but also commercial information resources like Dun & Bradstreet, ZoomInfo, and Kompass. The Panjiva platform aggregates these different data sources to supply information on companies and other agents engaged in international trade.
At the time of its founding, Panjiva was the first online resource of its kind, designed to provide transparency to international trade. Leveraging its trade data, Panjiva is able to produce details of trends within sectors, and has tools on its website to facilitate the analysis and visualization of global trade flows. Information published by Panjiva has been used by news websites such as FT.com and CNNMoney.com.
Panjiva's customers use the data in a variety of different ways: to search for suppliers or manufacturers overseas, to find new customers for their products or services (such as logistic services), to track competitors' trade activity, and to gain insight into high-level global trade trends.
Jeff Silberman, Chair of the Department of Textile Development and Marketing at New York's Fashion Institute of Technology, has praised Panjiva as "not just innovative, but revolutionary."
Panjiva was acquired in February 2018 by S and P Global.
Data
Panjiva obtains data from several Customs agencies and data partners worldwide, with company-level shipment details for: The United States, China, Mexico, Brazil, Bolivia, Chile, Colombia, Ecuador, Panama, Paraguay, Peru, Uruguay, and Venezuela.
Data for the United States is obtained through the Freedom of Information Act. Data for all sources is obtained legally.
Founding
Panjiva was founded by Josh Green (CEO) and Jim Psota (CTO) in 2006. The idea for the company was born when Green was asked by his work to find a reliable international supplier of a tablet display. After doing some research, he was shocked at how fragmented data about international trade was, and how difficult it was to obtain reliable information on manufacturers or buyers. From there, Green and Psota - friends from graduate school - decided to launch a website that would make it easier to connect international buyers and suppliers.
Since its founding, Panjiva's objective has expanded from being a resource for buyers and suppliers to providing information to all parties engaged or interested in global trade flows.
Growth
Panjiva has grown quickly in the short time since its inception. In 2013, it was named one of America's fastest-growing private companies by Inc. Magazine. As of August 2015, Panjiva has customers in 89 countries and has offices in three cities worldwide.
Panjiva is headquartered in New |
https://en.wikipedia.org/wiki/Data%20merge | Data merge may refer to:
Mail merge
Data integration
Merge algorithm
See also
Merge (disambiguation) |
https://en.wikipedia.org/wiki/Peter%20Flinsch | Peter Flinsch (April 22, 1920 – March 30, 2010) was a German Canadian artist, who worked as a set designer and art director for television programming produced by Radio-Canada the French language service of the Canadian Broadcasting Corporation.
He was born in Leipzig, Germany, the grandson of German art historian Ulrich Thieme. Flinsch, like many young Germans during the Nazi era, was obliged to join the Hitler Youth. At the onset of the Second World War he decided to fulfill his military obligation and joined the anti-aircraft artillery of the Luftwaffe. In 1942, after a Christmas party, he was spotted kissing another man and was charged under section 175-1 of the Third Reich's criminal code. He was sentenced to a disciplinary minesweeping unit where being overworked, underfed, and mistreated by fellow convicts he developed malaria.
At the end of the war in 1945, Flinsch began working as a theatre designer in Leipzig and Berlin and later as a publicity designer for Air France in Munich.
He subsequently moved to Vancouver in 1953, reuniting with his friend and lover Heino Heiden who was then the artistic director and choreographer for the Vancouver Ballet Company. He finally settled in Montreal to work for Radio-Canada, where he worked for over 30 years and won an Anik Award for Best Television Design in 1981 for his work on L'Espion aux yeux verts. Following his retirement from Radio-Canada in 1985, he began to exhibit his own artwork in drawing, painting, and sculpture.
In 1992 during the rebranding of CBC, he appeared in the Day After Day/Jour Apres Jour video for sign on & sign offs for CBC affiliates which appeared on screens as early as 1996.
In 1998, one of his friends suggested that he display his art on the Internet. Initially he resisted the idea. With much persuasion, his web presence was born. Eventually he enjoyed being contacted from complete strangers who were interested in his work, or the story of his life.
His web site also brought him into contact with an old lover from Paris in the 1940s, and a distant relative (see: Flinsch Peak).
The Body in Question, a biography by Ross Higgins which includes 110 pages of Flinsch's artwork, was published in 2008 by Arsenal Pulp Press.
He died in Montreal, Quebec on March 30, 2010.
References
External links
The Art of Peter Flinsch
1920 births
2010 deaths
20th-century Canadian painters
Canadian male painters
21st-century Canadian painters
Canadian gay artists
German gay artists
Gay painters
Gay sculptors
Artists from Leipzig
German emigrants to Canada
Canadian scenic designers
Canadian LGBT painters
German LGBT painters
20th-century Canadian sculptors
Canadian male sculptors
Canadian LGBT sculptors
German LGBT sculptors
20th-century Canadian male artists
Hitler Youth members
Luftwaffe personnel of World War II
People convicted under Germany's Paragraph 175
21st-century Canadian male artists
21st-century Canadian LGBT people
20th-century Canadian LGBT people |
https://en.wikipedia.org/wiki/Stagecoach%20in%20Preston | Stagecoach in Preston was a network of bus routes running within the city of Preston, Lancashire and into the surrounding area. It was founded in 2009 after Stagecoach Group acquired Preston Bus that was founded in 1904. The company operated from the main depot on Deepdale Road and their other depot on Selbourne Street. In January 2011, the company was sold to Rotala, which now operates the services under the Preston Bus brand.
History
Preston Bus was founded in 1904 as Preston District Travel and was bought from the local authority by its employees in 1993 as part of deregulation, becoming a limited company.
In 2006, Stagecoach North West set up various services using a fleet of new & old Optare Solos, Dennis Enviro 400s, and new & old Dennis Dart SLFs in order to compete with Preston Bus. They were branded as "Preston Citi". Competition grew into a bus war with Stagecoach offering lower fares on the busiest routes.
Both companies accused each other of unprofessional behaviour, with some Stagecoach drivers reported to have thrown eggs at Preston Buses.
On 10 June 2008, both companies were agreed to a code of practice by the traffic commissioner. Competition continued, with Stagecoach operating routes within Preston and Preston Bus operating a route between Preston and Penwortham.
On 30 December 2008, it was announced that Stagecoach had approached Preston Bus to negotiate a possible sale. This was agreed and on 23 January 2009 Stagecoach North West purchased Preston Bus for £10.4 million. From March 2009, the combined network of routes was rebranded as Stagecoach in Preston.
On 28 May 2009, the Office of Fair Trading announced that it was referring the purchase of Preston Bus by Stagecoach to the Competition Commission. Their provisional findings were that the purchase had reduced competition and may potentially harm the interests of passengers. Possible remedies involved the sale of part or all of the business and measures to encourage new entry by other operators, as well as controls on fares and requirements to maintain service levels. The final report was due by 12 November 2009.
On 12 November 2009, the Competition Commission submitted that Stagecoach would have to sell a "reconfigured" (i.e. profit making) Preston Bus. Stagecoach had some freedom over what it sells, although it had to be approved by the Competition Commission.
Stagecoach appealed to the Competition Appeal Tribunal, stating that the Competition Commission's decision was "perverse and irrational" and that the Commission had committed an error in law with its use of the counterfactual argument and handling of Stagecoach's responses.
When the Competition Appeal Tribunal announced their verdict, Stagecoach began actively looking for a buyer. The result was that Stagecoach retained route 11. Things reverted to how they were before the takeover, with services transferring between Stagecoach and Preston Bus. Service 7 was withdrawn, and service 4 revised among other chan |
https://en.wikipedia.org/wiki/GMA%20Saturday/Sunday%20Report | GMA Saturday/Sunday Report is a Philippine television news broadcasting show broadcast by GMA Network. It premiered on May 24, 1986. The show concluded on August 20, 1989.
Anchors
Bong Lapira
Jimmy Gil
Raffy Marcelo
Romy de Moro
Sharon Lacanilao
1986 Philippine television series debuts
1989 Philippine television series endings
English-language television shows
GMA Network news shows
Philippine television news shows |
https://en.wikipedia.org/wiki/Business%20Today%20%28Philippine%20TV%20program%29 | Business Today is a Philippine television public affairs show broadcast by GMA Network. Hosted by Karen Davila, Rico Hizon, Dong Puno and Mon Isberto, it premiered on October 1, 1990. The show concluded on March 29, 1996.
1990 Philippine television series debuts
1996 Philippine television series endings
English-language television shows
GMA Network original programming
GMA Integrated News and Public Affairs shows
Philippine television shows |
https://en.wikipedia.org/wiki/Cheche%20Lazaro%20Presents | Cheche Lazaro Presents is a Philippine television documentary series broadcast by GMA Network. Hosted by Cheche Lazaro, it premiered on February 14, 1999 and concluded on June 22, 2003. The show aired occasionally on ABS-CBN from 2010 to 2014.
References
1999 Philippine television series debuts
2014 Philippine television series endings
ABS-CBN News and Current Affairs shows
ABS-CBN original programming
Filipino-language television shows
GMA Network original programming
GMA Integrated News and Public Affairs shows
Philippine documentary television series |
https://en.wikipedia.org/wiki/Eye%20to%20Eye%20%28talk%20show%29 | Eye to Eye is a Philippine television talk show broadcast by GMA Network. Hosted by Inday Badiday, it premiered on January 11, 1988. In 1991, the show was expanded into one hour and it was reformatted to include a public service portion. The show concluded on August 9, 1996.
Hosts
Inday Badiday
Segment hosts
Nap Gutierrez
Alfie Lorenzo
Substitute hosts
Kris Aquino
Janice de Belen
Cristy Fermin
Sharon Cuneta
Segments
Eye Sore
Eye Witness Showbiz Balita
Eye Catcher
Eye Opener
Eye of the Week
Pandora's Box (co-hosted by Alfie Lorenzo)
Lahat Lahat Na
Mata ng Bayan
Mata ng Buhay (The PLDT Good News)
Sports Eye
Eye Phone
Showbiz na Showbiz
Mata sa Mata
Accolades
References
External links
1988 Philippine television series debuts
1996 Philippine television series endings
Filipino-language television shows
GMA Network original programming
GMA Integrated News and Public Affairs shows
Philippine television talk shows |
https://en.wikipedia.org/wiki/G.9970 | G.9970 (also known as G.hnta) is a Recommendation developed by ITU-T that describes the generic transport architecture for home networks and their interfaces to a provider's access network.
G.9970 was developed by Study Group 15, Question 1. G.9970 received Consent on December 12, 2008 and was Approved on January 13, 2009.
Relationship with G.hn
G.9970 (G.hnta) and G.9960 (G.hn) are two ITU-T Recommendations that address home networking in a complementary manner. While G.9970 addresses layer 3 (network layer) of the home network architecture, G.9960 addresses layers 1 (physical layer) and 2 (data link layer).
References
Networking standards
Network protocols
Open standards
International standards
Computer networks
Internet Standards
ITU-T recommendations
ITU-T G Series Recommendations |
https://en.wikipedia.org/wiki/DTACK%20Grounded | DTACK Grounded was a computer hobbyist newsletter published from July 1981 to September 1985 by Hal W. Hardenberg. Subtitled "The Journal of Simple 68000 Systems", the newsletter was dedicated to the proposition that the Motorola 68000 CPU could be used to build simple, fast computers. In 1981 this was a revolutionary idea. This was before 68000-based personal computers like the Sharp X68000, Macintosh, Amiga, and Atari ST had been created. In 1981 Motorola was marketing the 68000 solely as a CPU for Unix workstations. Hal believed that the 68000 could be used as a simple embedded microprocessor as well, and used the newsletter to explain how to do that.
Editor Hal W. Hardenberg
Hal was the editor of the newsletter and wrote almost all of its content. The ostensible purpose of the newsletter was to promote Hal's company's line of 68000-based hardware and software. However, Hal never let that get in the way of telling a good story or explaining how to design or build a fast computer. He was a hardware engineer and a businessman who also knew how to write software. His newsletter was full of amusing and educational stories about the way the personal computer hardware business worked, and strong opinions about the best way to design personal computer hardware and software.
Etymology
"DTACK" is the name of a pin on the Motorola 68000 CPU that informs the CPU that data is ready to be read from memory. It stands for "Data Transfer Acknowledge."
If a system has fast enough memory, this pin can be connected directly to the ground plane (or "grounded") to produce the fastest-possible memory read/write time. However, any complex system would almost certainly have several different types of devices (RAM, ROM, various peripherals) that would support different speeds of access, which in a large system would normally be accommodated by using the DTACK line to insert "wait states"—delays—into bus cycles. (The 68000 has no separate I/O address space, so all I/O devices must be memory-mapped.) The logic circuitry required to pulse DTACK high to add these delays could be fairly complex. Therefore, typically only relatively simple systems can use a design with "DTACK grounded" (i.e., DTACK always asserted). When many different peripherals with different maximum speed capabilities must be used in a small system, another solution to keep DTACK grounded is to slow down the clock rate of the CPU so that all memory and peripheral devices can transfer data at the (reduced) maximum speed of the CPU. In turn, using a lower CPU clock frequency enables a simpler, less expensive circuit board design, with fewer layers, to be used successfully. This, too, like limiting the system to a few peripherals of low diversity, is a design strategy that is typically applied to small or embedded systems but would not be appropriate for high-performance workstations.
Many other microprocessors, including the Intel 8086, 8088, 80286, 80386, 8080, 8085, Zilog Z80, and 6502 family, e |
https://en.wikipedia.org/wiki/How%20to%20Marry%20a%20Millionaire%20%28TV%20series%29 | How to Marry a Millionaire is an American sitcom that aired in syndication and on the
NTA Film Network from October 7, 1957 to August 20, 1959. The series is based on the 1953 film of the same name starring Marilyn Monroe, Betty Grable, and Lauren Bacall.
The series stars Lori Nelson, Merry Anders, and Barbara Eden. Lisa Gaye joined the cast in the second season after Lori Nelson left the series. How to Marry a Millionaire was one of the first television sitcoms based on a feature film, and was the first series that Barbara Eden was featured in as a regular cast member. Eden would go on to play one of her more notable roles, "Jeannie" in the NBC sitcom I Dream of Jeannie.
Synopsis
Season one
The series follows the adventures and mishaps of three 20-something women who are attempting to marry a rich man. The three women are Greta Hanson (Nelson), a sophisticated, college educated co-hostess of the quiz show Go For Broke; Michelle "Mike" McCall (Anders), an intelligent (and often scheming), wise cracking Wall Street secretary; and Loco Jones (Eden), a ditzy but good-hearted "Miss Magoo"-esque fashion model who, despite having very poor eyesight, refuses to wear her glasses in the presence of men. As in the film, the three women have concocted a scheme to land a rich husband by placing themselves in the same social scene as rich bachelors. The three rent a pricey penthouse apartment together at the Tower House on Park Avenue and vow to help each other land a rich husband. While their address may be ritzy, Greta, Mike and Loco struggle to make the rent, are constantly faced with the threat of eviction and barely make ends meet.
In the series' initial episodes, Dabbs Greer portrayed Mr. Blandish, the Tower House's building manager who frequently threatens the women with eviction due to their failure to pay the rent on time. Midway through the first season, Joseph Kearns was cast as the building manager, Augustus P. Tobey. Mr. Tobey is also regularly annoyed by Greta, Mike and Loco because of their inability to pay the rent on time and is constantly trying to get the women evicted. Also appearing in a recurring role is Jimmy Cross, the building's elevator operator Jesse Flouge who often helps, and sometimes hinders, the women in their millionaire husband landing schemes.
The original, unaired pilot episode was shot in Spring 1957. Lori Nelson appeared as Greta Lindquist (the character's last name was later changed to Hanson), Loco Jones was played by Charlotte Austin and Doe Avedon (ex-wife of photographer Richard Avedon) portrayed Mike McCall. Joseph Kearns, who was later cast in the series as the women's building manager, appeared in the pilot as Mike's co-worker Maurice. After all three major networks passed on the series, National Telefilm Associates and 20th Century-Fox Television (which owned part of the series) sold and distributed the series to 115 independent syndicated channels.
Millionaire was included in a package deal with two other |
https://en.wikipedia.org/wiki/Rachel%20Noerdlinger | Rachel Noerdlinger (born November 14, 1970) is an American publicist and longtime communications advisor to National Action Network and national civil rights leader Rev. Al Sharpton. She served as chief of staff to New York City First Lady Chirlane McCray. After leaving public service, Noerdlinger became a managing director at Mercury Public Affairs.
Education and family
Rachel Noerdlinger is the adopted daughter of Peter and Judy Noerdlinger. Noerdlinger is black, and her parents are white. In 1996, Noerdlinger wrote a Washington Post op-ed arguing that black adoptees should be placed with white families only "as a last resort". Noerdlinger later stated that after she became pregnant with her son, Khari, her views on transracial adoption changed. Noerdlinger is a graduate of Mills College, an all-women's college in Oakland, California.
Career
A publicist, Noerdlinger is the President of Noerdlinger Media. She interned at the Terrie Williams Agency, a preeminent African-American public relations firm. While interning at the Terrie Williams Agency, Noerdlinger worked with attorney Johnnie Cochran, whom she later served as a public relations advisor. She developed a strong relationship with one of Cochran's clients, Al Sharpton. Her PR firm worked on the Sean Bell case, the Jena Six case, and the Megan Williams case. She was Press Secretary for Sharpton's 2004 United States Democratic Presidential run. She has had a weekly segment on Sharpton's radio show. She has been called "the public relations force behind Rev. Al Sharpton and National Action Network"; she has advised Sharpton and the Network on communications since the late 1990s.
Noerdlinger Media's clients also include or have included The Cochran Firm; Paul B. Weitz and Associates; Lifflander and Reich, LLP; Rubenstein and Rynecki; and Sunshine Sachs Public Relations. Noerdlinger worked on many high-profile criminal justice reform cases including the case of Eric Garner in New York and Stephon Clark in Sacramento.
After serving as Chief of Staff to New York City First Lady Chirlane McCray, Noerdlinger became a Managing Director at Mercury Public Affairs.
Chief of Staff to Chirlane McCray
On January 20, 2014, New York City Mayor Bill de Blasio appointed Noerdlinger as Chief of Staff to New York City First Lady Chirlane McCray, a position that had not existed previously. Her annual salary was $170,000.
Noerdlinger's appointment led to controversy: Noerdlinger was criticized for not disclosing in a background questionnaire that she lived with her boyfriend, Hassaun McFarlane, who has an extensive criminal record that includes guilty pleas for manslaughter and drug trafficking. Noerdlinger was not disciplined for this omission, as the Department of Investigation "found no evidence of intent to deceive the Mayor or City Hall." Reports also indicated that Noerdlinger's home in Edgewater, New Jersey had a $28,190 federal tax lien placed on it in 2011. Noerdlinger had an outstanding E-ZPass |
https://en.wikipedia.org/wiki/PyRoom | PyRoom is a full-screen writing program, i.e. a full-screen text editor with the purpose of isolating the user from the operating system and other applications. Written using the GTK+ widget toolkit, PyRoom is a clone of the WriteRoom text editor and features "distraction-free writing". Because PyRoom takes up the whole screen, it is "without buttons, widgets, formatting options, menus and with only the minimum of required dialog windows". It is keyboard oriented and can be configured.
Pyroom supports the following keyboard commands:
- Show help in a new buffer
- Show buffer information
- Shows Preferences dialog
- Create a new buffer
- Open a file in a new buffer
- Quit
- Save current buffer
- Save current buffer as
- Close buffer and exit if it was the last buffer
- Redo last typing
- Undo last typing
- Switch to previous buffer
- Switch to next buffer
References
External links
CodeRoom, a syntax-highlighting editor inspired by PyRoom
Free text editors
Linux text editors
Text editors that use GTK
Software that uses PyGTK |
https://en.wikipedia.org/wiki/The%20Pipeline | The Pipeline was one of the earliest American Internet service providers. It was founded in December 1993 in New York City by the science and technology writer James Gleick and computer programmer Uday Ivatury, who had met at the Manhattan Bridge Club and shared an interest in online bridge. Both men believed that a graphical user interface would make the Internet more widely accessible than the command-line Unix commands that were then generally necessary.
When the Pipeline was established, the major online services of the day—America Online, CompuServe, and Prodigy—provided their users with no access or very limited access to the internet. Many users welcomed Pipeline as "AOL for the Internet". The software was distributed in the then-popular Book + CD format.
The Pipeline was noted for its point-and-click user interface, which made e-mail, chat, Usenet, the World Wide Web, FTP, and other Internet features easily accessible to users. Gleick and Ivatury licensed the Pipeline software through InterCon Systems Corporation to more than 15 other Internet service providers, including Ireland On-Line and Caltech.
The Pipeline was purchased in February 1995 by PSINet, which expanded Pipeline service nationwide. Another feature introduced by PSInet was flat pricing for unlimited Internet usage.
In July 1996, PSINet sold its consumer Internet operations, including the Pipeline, to MindSpring. MindSpring discontinued the use of the Pipeline brand, although former Pipeline customers could continue to use their e-mail addresses in the Pipeline domain. Three years later, MindSpring merged with EarthLink. Earthlink, too, allows former Pipeline customers to use their Pipeline e-mail addresses.
References
Defunct Internet service providers
1993 establishments in New York City
1996 disestablishments in the United States
EarthLink |
https://en.wikipedia.org/wiki/SPIKE%20algorithm | The SPIKE algorithm is a hybrid parallel solver for banded linear systems developed by Eric Polizzi and Ahmed Sameh
Overview
The SPIKE algorithm deals with a linear system , where is a banded matrix of bandwidth much less than , and is an matrix containing right-hand sides. It is divided into a preprocessing stage and a postprocessing stage.
Preprocessing stage
In the preprocessing stage, the linear system is partitioned into a block tridiagonal form
Assume, for the time being, that the diagonal blocks ( with ) are nonsingular. Define a block diagonal matrix
,
then is also nonsingular. Left-multiplying to both sides of the system gives
which is to be solved in the postprocessing stage. Left-multiplication by is equivalent to solving systems of the form
(omitting and for , and and for ), which can be carried out in parallel.
Due to the banded nature of , only a few leftmost columns of each and a few rightmost columns of each can be nonzero. These columns are called the spikes.
Postprocessing stage
Without loss of generality, assume that each spike contains exactly columns ( is much less than ) (pad the spike with columns of zeroes if necessary). Partition the spikes in all and into
and
where , , and are of dimensions . Partition similarly all and into
and
Notice that the system produced by the preprocessing stage can be reduced to a block pentadiagonal system of much smaller size (recall that is much less than )
which we call the reduced system and denote by .
Once all and are found, all can be recovered with perfect parallelism via
SPIKE as a polyalgorithmic banded linear system solver
Despite being logically divided into two stages, computationally, the SPIKE algorithm comprises three stages:
factorizing the diagonal blocks,
computing the spikes,
solving the reduced system.
Each of these stages can be accomplished in several ways, allowing a multitude of variants. Two notable variants are the recursive SPIKE algorithm for non-diagonally-dominant cases and the truncated SPIKE algorithm for diagonally-dominant cases. Depending on the variant, a system can be solved either exactly or approximately. In the latter case, SPIKE is used as a preconditioner for iterative schemes like Krylov subspace methods and iterative refinement.
Recursive SPIKE
Preprocessing stage
The first step of the preprocessing stage is to factorize the diagonal blocks . For numerical stability, one can use LAPACK's XGBTRF routines to LU factorize them with partial pivoting. Alternatively, one can also factorize them without partial pivoting but with a "diagonal boosting" strategy. The latter method tackles the issue of singular diagonal blocks.
In concrete terms, the diagonal boosting strategy is as follows. Let denote a configurable "machine zero". In each step of LU factorization, we require that the pivot satisfy the condition
.
If the pivot does not satisfy the condition, it is then boosted by
where is a positive para |
https://en.wikipedia.org/wiki/Chromium%20B.S.U. | Chromium B.S.U. is an arcade-style, top-scrolling space shooter available on Windows, iPhone, PSP, Mac, AmigaOS 4, Linux and numerous other UNIX-like operating systems. It is a free software distributed under the Clarified Artistic License. The original version of was designed in 2000 by Mark B. Allan and released under the Artistic License. Since then it has received many contributions from the community.
Plot
The storyline of consists of the player taking the role of a captain aboard a cargo ship. The name of the cargo ship is "Chromium B.S.U." The player is given the task of delivering cargo to troops on the front line. The cargo ship has a series of robotic fighter spaceships aboard. Your job is to make use of these ships to ensure that the cargo ship makes it to the front line.
Gameplay
is a 2D top-scrolling space shooter. Players must shoot enemy aircraft before they reach the bottom of the screen. For each aircraft that reaches the bottom of the screen, the player will lose a life. This particular rule makes unique amongst scrolling space shooters. Another aspect of the game's difficulty is its limited ammunition. Ammunition must be used efficiently to win.
When a player is having difficulty destroying foes, the player has two options. They can crash into enemy vessels and deal damage to the ship as well as themselves. The other alternative is to self-destruct, thereby destroying all the enemies on the screen.
In the first level of the game there are only three types of enemy ships. More enemy ships are introduced to the player as they advanced through levels. The game was designed to be played in short time intervals rather than long dedicated hours.
Technical information
The game is written in C++. Graphical support is provided by OpenGL. The game demands hardware acceleration in order to reliably maintain a steady frame rate. Therefore, software implementations of OpenGL are not suitable for playing the game. SDL is used for creating the window that the OpenGL context is attached to as well as handling input events (such as mouse, keyboard, joystick). Alternatively, a user may choose GLUT rather than SDL for these things.
Audio is an option that is configurable by the user at compile time. The user may choose between OpenAL and SDL_Mixer for audio playback support. They both have their own advantages and disadvantages. A key feature of the audio system in Chromium B.S.U. is that it supports both user-defined playlists and CDROM playback. The user may choose between FTGL and QuesoGLC for font rendering.
From a library point of view is customizable.
Critical reception
was selected on Christmas 2008 as "HotPick" by Linux Format. Ubuntu Magazine praised for its graphics, music, shooting action, easy mouse controls and challenging gameplay. Linux Planet highlighted several elements that they considered unique to a space shooter: that escaping enemies cause the player to lose a life; that the damage leeway allows the player |
https://en.wikipedia.org/wiki/Compressed%20pattern%20matching | In computer science, compressed pattern matching (abbreviated as CPM) is the process of searching for patterns in compressed data with little or no decompression. Searching in a compressed string is faster than searching an uncompressed string and requires less space.
Compressed matching problem
If the compressed file uses a variable width encoding it could be present a problem: for example, let “100” be the codeword for a and let “110100” be the codeword for b. If we are looking for an occurrence of a in the text we could obtain as result also an occurrence that is within the codeword of b: we call this event false match. So we have to verify if the occurrence detected is effectively aligned on a codeword boundary. However we could always decode the entire text and then apply a classic string matching algorithm, but this usually requires more space and time and often is not possible, for example if the compressed file is hosted online. This problem of verifying the match returned by the compressed pattern matching algorithm is a true or a false match together with the impossibility of decoding an entire text is called the compressed matching problem.
Strategies
Many strategies exist for finding the boundaries of codewords and avoiding full decompression of the text, for example:
List of the indices of first bit of each codeword, where we can apply a binary search;
List of the indices of first bit of each codeword with differential coding, so we can take less space within the file;
Mask of bit, where bit 1 marks the starting bit of each codeword;
Subdivision in blocks, for a partial and aimed decompression.
There were introduced algorithms that provide running time that grows logarithmically with the increase of string and pattern length.
References
Shmuel T. Klein and Dana Shapira PATTERN MATCHING IN HUFFMAN ENCODED TEXTS (2003)
Marek Karpinski, Wojciech Rytter and Ayumi Shinohara. AN EFFICIENT PATTERN-MATCHING ALGORITHM FOR STRINGS WITH SHORT DESCRIPTIONS. Nordic Journal of Computing 4(2): pp.172-168 (1997).
External links
Data compression
Pattern matching
Computer data |
https://en.wikipedia.org/wiki/Railways%20on%20the%20Isle%20of%20Wight | There once existed a network of railway lines on the Isle of Wight, which operated both as a self-contained railway network, and as links to ferry services between the island and the South coast of Great Britain. The routes were opened by several companies between 1862 and 1901 and modernised after The Grouping in the 1920s. Most of them were permanently closed between 1952 and 1966, whilst the Island Line was temporarily closed in 1966 and rebuilt for electric train services, introduced in 1967. Replacement trains were introduced in 1990, and again in 2021 along with a major renewal of the line. A further have reopened as a heritage line known as the Isle of Wight Steam Railway and there have been several proposals to expand the network further since the 1960s, either with conventional heavy rail or by conversion to light rail.
Early beginnings
The first railway to be built on the island ran for a distance of . It was opened in 1833 on the Nash Estate near Yarmouth. Its usage is presumed to have been for transporting brickmaking materials to and from a jetty on the Solent, and it is not thought to have used mechanical traction. The line is now abandoned.
The independent companies
The first conventional railway line to open on the island was that from Cowes to Newport. The Cowes & Newport Railway Company began construction of the line in 1859 after an enabling Act of Parliament was passed earlier that year. The line opened to passengers in June 1862.
Shortly after this, the Isle of Wight Railway (IWR) company built its initial line from Ryde to Shanklin, opening in 1864. Also in 1864, horse-drawn trams began running along Ryde Pier, connecting ferry services to the town. The IWR opened an extension of its main line to reach Ventnor in 1866. In 1871, the Ryde tramway was extended to meet the railway line at Ryde St John's Road.
The Ryde & Newport Railway opened in December 1875, with operations controlled by the Cowes & Newport company.
In 1875, the Isle of Wight (Newport Junction) Railway opened the main part of its 10-mile Sandown to Newport line, planned in 1868. It would have opened sooner, but failed official inspections. In February 1875, the line was opened between Shide, a suburb of Newport, and the IWR station at Sandown. Eight months later the line was extended a further half-mile to reach Pan Lane. However, the final half-mile from there to Newport station did not open until 1879. Four years of poor connections in Newport meant not enough passengers or freight had been attracted to the line, and the company passed into receivership in 1880. At this point, it was bought by the Cowes & Newport/Ryde & Newport company, who were legally renamed as the Isle of Wight Central Railway (IWCR).
In 1877 the London, Brighton and South Coast Railway and London and South Western Railway were granted an Act of Parliament to extend Ryde Pier, building a railway line from the pier head to St John's Road. This was completed in 1880, and at this |
https://en.wikipedia.org/wiki/Flight%20to%20Rhythm | Flight to Rhythm, also known as The Delora Bueno Show, was an early American television program which aired on the DuMont Television Network, and was produced by Bob Loewi (1911–1981), son of DuMont executive Mortimer Loewi (1888–1967) .
Broadcast history
The series ran from March to September 1949, and was a musical program hosted by Brazilian vocalist and musician Delora Bueno (1925–2012). The program, produced and distributed by DuMont, was originally titled The Delora Bueno Show, and aired Thursday nights at 7pm ET on most DuMont affiliates.
In May, the series was retitled Flight to Rhythm and was expanded to thirty minutes. The revamped production was set in a fictional Brazilian nightclub called "Club Rio" with Nick the Bartender (Ralph Statley) hosting each episode. In addition to Bueno, Flight featured Larry Carr and the Miguelito Valdés Orchestra. The program aired on Sunday nights at 6:30pm ET during the summer, and moved to Thursday at 8pm ET in August.
Episode status
Two episodes, the March 10 premiere and the May 15, 1949 episode, are in the Paley Center for Media collection.
See also
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
References
Bibliography
David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004)
Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980)
Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964)
External links
DuMont historical website
DuMont Television Network original programming
1949 American television series debuts
1949 American television series endings
American music television series
Black-and-white American television shows |
https://en.wikipedia.org/wiki/Major%20Dell%20Conway%20of%20the%20Flying%20Tigers | Major Dell Conway of the Flying Tigers was an early American television program broadcast on the now defunct DuMont Television Network. The series ran from April 7, 1951, to March 2, 1952.
Broadcast history
The show was an action-adventure series originally starring B-movie actor Eric Fleming as Major Dell Conway. Fleming was replaced in July 1951 by Ed Peck. Other actors included Fran Lee (as Ma Wong), Luis Van Rooten, David Anderson, Joe Graham, Harry Kingston, and Bern Hoffman as Caribou Jones. According to Brooks and Marsh (2007), the roles some of these actors portrayed has been lost to time.
Episode titles included "Murder in Paris", "Hostage in Havana", "Port Said", "The Sacred Jewel of Calcutta" and "Mission to Korea".
Major Dell Conway was loosely based on a true story about a pilot who flew with the Flying Tigers in World War II China. The series has been called "an extremely low-budget production". The program was produced by J. Gen Genovese, who had served as a pilot during the war. The program aired on Saturday at 6:30 pm EST on most DuMont affiliates. In May 1951, the series went on hiatus, returning to the air on Sunday afternoons from July 1951 to March 1952. The final episode aired on March 2, 1952.
Episode status
UCLA Film & Television Archive holds 20 episodes of this series.
See also
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
References
Bibliography
David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004)
Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980)
Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964)
External links
DuMont historical website
DuMont Television Network original programming
1951 American television series debuts
1952 American television series endings
Aviation television series
Black-and-white American television shows
Flying Tigers in fiction |
https://en.wikipedia.org/wiki/No%20temas%20al%20amor | No temas al amor (English title: Don't be afraid of love) is a telenovela made by Mexican TV network Televisa. This telenovela was broadcast in 1980. This soap opera was televised on weekends only.
Plot
Alejandra (Daniela Romo) is a photographer who is afraid of the love from Raul Contreras (Enrique Novi), an orthopedist, because she is already engaged to Ernesto Millan, an incapacitated racing-driver. Marcos Dario (Armando Silvestre), the father of Alejandra, has a secret affair with Cristina (Chela Castro), the mother of Raul. Marcos Dario caused the financial ruin and suicide of Raul's father. Then Alejandra gets married and divorces Ernesto because he is rude and jealous. Cristina wants to take revenge on Marcos Dario for what happened on the past. Raul and Alejandra gets together, but he dies in a car accident and Alejandra will remain alone with their son.
Cast
Daniela Romo as Alejandra
Enrique Novi as Raul
Armando Silvestre as Marcos Dario
Chela Castro as Cristina
Antonio Valencia as Gerardo
Félix Santaella as Raymundo
Ana Laura as Socky
Ernesto Marin as Carlos
Carmen Delgado as Marcela
Ana Silvia Garza as Martha
Dolores Marti as Marga
Graciela Lara as Gabriela
Maribel Fernández as Alicia
Alfonso Kafitti as Alfonso
Alejandro Ciangherotti Jr. as Jacinto
References
External links
1980 telenovelas
Spanish-language telenovelas
Televisa telenovelas
1980 Mexican television series debuts
1980 Mexican television series endings |
https://en.wikipedia.org/wiki/El%20Enemigo%20%281979%20TV%20series%29 | El Enemigo (English The Enemy) is a telenovela made by Mexican TV network Televisa, directed and produced by Ernesto Alonso. It was broadcast in 1979, on weekends only. It was a remake of the 1961 telenovela of the same name.
Cast
Daniela Romo
Jorge Vargas
Lorena Velázquez
Alfonzo Meza
Freddy Fernández
Oscar Servín
José Baviera
Guillermo Zarur
Alicia Montoya
References
External links
1979 telenovelas
Televisa telenovelas
Spanish-language telenovelas
1979 Mexican television series debuts
1979 Mexican television series endings |
https://en.wikipedia.org/wiki/Scary%20Godmother%3A%20The%20Revenge%20of%20Jimmy | Scary Godmother: The Revenge of Jimmy is a 2005 computer-animated comedy film and the sequel to Scary Godmother: Halloween Spooktakular (2003). It is based on Jill Thompson's second book in her Scary Godmother series, also named The Revenge of Jimmy. Britt McKillip, Tabitha St. Germain, Brittney Irvin, Garry Chalk, and Scott McNeil reprise their roles, while Richard Warke, Dexter Bell, and Nathan Tipple replace voice actors of characters from the first special.
Despite taking place after the events of Halloween Spooktacular, the character of Jimmy sounds younger than in the first special, due to Alexander Ludwig voicing him in place of Alex Doduk.
Plot
Many Halloweens ago, Hannah's cousin, Jimmy, loved dressing up like a monster until last Halloween when he discovered that monsters are real and fears they will get him again this year; he plans to end Halloween to protect himself, while his friends, Daryl, Bert, and Katie, decide to go trick-or-treating with Hannah while distancing themselves from Jimmy due to his monster paranoia.
On the Fright Side, the Scary Godmother and her assortment of friends (Harry, Mr. Skully Pettibone, Bug-A-Boo, the vampire family of Max, Ruby, and Orson) are planning another annual Halloween party; however, the Fright Side is being affected by Jimmy's actions to end the holiday, such as smashing pumpkins in the pumpkin patch, sneaking into stores to contaminate candy and make costumes flammable, and vandalizing the abandoned spook house Hannah met the Godmother last time with toilet paper, and as this is happening he is slowly turning into an actual devil such as growing pointed ears, a unibrow, a scrunched-up nose, a wide grin and sharp teeth. Hannah successfully gets around these hurdles by making the smashed pumpkin holes serve as mouth, making new treats not involving candy, and imagining the toilet paper on the house as a set of ghost, putting the Fright Side universe back together and stable. Hannah takes Daryl, Bert and Katie to the house, introducing them to the friendly monsters and having them be taken to the party on the Fright Side.
Jimmy has one more plan to spoil the holiday, by stealing the party's Best Costume prize. He is initially successful, stealing the prize while all the guests are dancing. However, Jimmy bursts out loud the pumpkin consists of candy, which is noticed by a food-addicted Harry; a fight between the werewolf and Jimmy ensues, before Bug-A-Boo arrives and scares Jimmy, while Jimmy also makes Bug-A-Boo scream. After Jimmy's fright, Bug-a-Boo explains that he looked really scary, so Scary Godmother announces that Jimmy has won the contest. Jimmy is back to his old self again, and the party continues.
Production
Scary Godmother: The Revenge of Jimmy is based on the second book in Jill Thompson's Scary Godmother series of the same name, which was released in 1998. It was produced in three months by a team of 14 animators using the same keyframe technique as the original special. F |
https://en.wikipedia.org/wiki/Nicholas%20Mark%20Harding | Nicholas Mark Harding (born 1964 in London) is an author and British screenwriter who has written for film, television, magazines, newspapers and computer games. He is also a published poet and short story writer. He is the author of the cult classic and critically acclaimed How to Start Your Own Secret Society. He has appeared on ITV’s This Morning, has been a contributor to TV documentaries on secret societies including one for Channel 4 and has made over fifty appearances for both local and national BBC radio. He co-wrote The Notebooks of Cornelius Crow, shown in Cannes in 2004, and Folie a Deux, premièred at the Maine International Film Festival in 2012, with director Sean Martin. He is active in the Mendip Caving scene and was a co-discoverer of the Lost Cave of Loxton made famous by Alexander Catcott, Axbridge Hill Cavern and Upper Canada Cave in Hutton near Weston super Mare. He is a member of the Axbridge Caving Group. He is an atheist, skeptic and a registered Bright. He was one of the interviewees on BBC Radio 4's Weston's New Pier presented by Chris Ledgard. His novel Sunsphere, a tongue in cheek historical conspiracy, was published in 2011. He was co-writer of The Way Out, winner of a 2020 Royal Television Society award, starring Omid Jalili and Blaithin Mac Gabhann, directed by Suri Krishnamma, for BBC4, The Arts Council and Battersea Arts Centre. He is currently developing film and television projects and is represented by Olav Wyper at SMA Talent in London.
Books
"Urban Legends" 2004 ()
"Secret Societies" 2005 ()
"How to Start Your Own Secret Society" 2006 Paperback () Hardback 2007 ()
"How To Be A Good Atheist" 2007 ()
"How To Be A Good Atheist" Audio Version 2009 ()
"Sunsphere" 2011 ()
Journalism
"Here's the Whisper on Secret Societies" - The Daily Express December 2006
"Secret Societies" ICE Magazine no: 48 2005
"Tunnel Vision" ICE Magazine no: 53 2006
Computer Games
"Crime Life - Gang Wars" Konami 2005
Filmography as screenwriter
"Meeting a Bullet" (2004) A New York crime drama
"25%" (2005) A Los Angeles crime drama
"The Notebooks of Cornelius Crow" (2005), a psychological thriller set in London
"Reality Horror Night" (2008) Comedy Horror set in a hotel.
"Brazen Bull" (2009)
"Folie a Deux" (2012) A story about an online date with a secret.
"Isolated" (2020)
"The Way Out" (2020)
External links
1964 births
Living people
English short story writers
English screenwriters
English male screenwriters
English sceptics
English male short story writers
English male poets
Writers about religion and science |
https://en.wikipedia.org/wiki/Embedded%20System%20Module | Embedded System Module, or ESM, is a compact computer-on-module (COM) standard. An ESM module typically includes a CPU processor, memory, module-specific I/O interfaces and a number of basic front I/O connectors. They can be plugged on a carrier board or be used as a stand-alone processor card.
If the ESM module is plugged on a carrier, it relies on the standard PCI bus as a board-to-board interface. In this case two connectors create a link to the carrier. While the "J1" connector provides a specified PCI connection, the "J2" connector brings I/O signals from the ESM module to the carrier, which then includes all necessary connectors. The signal assignment of J2 is not fixed but can be completely customized, although there are reserved pins for a 64-bit PCI bus interface. A third connector, "J3", is used for additional I/O signals if the ESM module has no front I/O. The signal assignment of this connector is fixed to support a special set of I/O functions.
A large part of the I/O functions on ESMs are often controlled by an onboard FPGA component (field-programmable gate array) so that every module can easily be tailored to a specialized application through user-defined functions. Such functions are loaded into the FPGA as IP cores. Using FPGAs also reduces dependence on special controller chips which may become obsolete, thus extending the card's availability.
ESMs are typically used on boards for CompactPCI and VMEbus as well as single-board computers for embedded applications. A company standard by MEN Micro, a manufacturer of embedded computers, specifies the ESM concept and the different types of modules. The ESM specification defines one form factor for the printed circuit board: .
Depending on the processor type, most ESM modules have heat sinks and can be operated in wide temperature ranges up to -40 to +85 °C.
A mechanical specialty of ESM modules is that their connectors are compatible with the PCI-104 module standard. These modules can be "stacked" onto ESM modules, e. g., for additional peripheral interfaces.
See also
Computer-on-module
Embedded system
References
Schmitz, M. (2005). ESM Embedded System Modules Specification, MEN Mikro Elektronik GmbH. Retrieved on 2015-09-21.
Motherboard form factors |
https://en.wikipedia.org/wiki/PAPOP | The PAPOP (PolyArme POlyProjectiles, "multi-projectile multi-weapon") was a French project to construct a computerized infantry weapon for the FÉLIN system, capable of hitting hidden or protected targets. It would have combined a 35 mm grenade launcher with a 5.56×45mm NATO assault rifle, both in a bullpup configuration, complete with targeting aids and an unorthodox sight.
History
Development of the PAPOP began in July 1995. The project aimed to provide a replacement for the FAMAS then in service with the French Army by the year 2010. It was envisioned as a versatile weapon capable of engaging enemy infantry, even protected, with a range of up to 600 metres.
An industrial partnership was set up to answer the request, GIAT being the main contractor. The subsystems were designed by FN Herstal (for the assault rifle), Sfim ODS (targeting system), Euroimpact and (grenades).
Phase 1
A first prototype was proposed with 3 grenades in an internal tubular magazine. The prototype was deemed too heavy (8 kg) and bulky to be acceptable, which led to the design of a second prototype.
Phase 2
The second prototype aimed at correcting the issues of the first one, reducing the weight to 6 kg and making the whole system more compact. A particular emphasis was put on usability in urban warfare.
The PAPOP-2 carries 25 5.56 mm cartridges and only two grenades, though a platoon-level configuration allows carrying 5 grenades, at the expense of the weight which then rises to 10 kg.
Systems
Sub-calibre 5.56mm rifle
The rifle fires sub-calibre ammunition with a 5.56 NATO round, which has a muzzle velocity of 1600 metres per second, along with the capability of shooting up to range of 600m. The new ammunition offers an enhanced range, and increases the penetrability enough to defeat individual armour of the PASGT type even at great distance.
Grenade launcher
The second tube is a semi-automatic 35 mm grenade launcher with programmable airburst shells. A large selector switches from rifle to grenade.
Three grenades are carried in a tubular magazine. They can be programmed to explode near the target, with two selectable yields; pre-cut fragments can be projected either towards the front, the side or the rear of the projectile, depending on how the charge is activated, which are lethal in a 5-metre radius. The 35 mm calibre was selected as to offer capabilities to penetrate flak vests.
Electronic systems
A camera is fitted in the nose of the weapon, under the rifle muzzle. Batteries and the on-board computer are located in the stock. A rotating LCD screen on the top of the weapon displays information, allowing aiming the PAPOP from behind cover and around corners.
The targeting system includes night vision, a laser telemeter, and an IFF and a targeting computer which also programmes the grenades prior to launch.
The FÉLIN concept requires that data from the weapon could be shared with the other electronic component of the soldier, and transmitted across the battl |
https://en.wikipedia.org/wiki/Boljoo | Boljoo, or Boljoo Chat, is a popular freeware Mongolian script instant messaging computer program among Mongols. It is based on a simple Mongolian input-method.
Boljoo IME
There is also a standalone Mongolian input method made by Boljoo, called Boljoo IME. Boljoo IME supports Menksoft and Saiyin codes.
Unlike Menksoft Mongolian IME, Boljoo IME has an English installation interface and is installed as English by default. However, it's a standalone program in the system tray, so you can not find it in ctfmon. And the IME must be enabled before use.
Designed for the Inner Mongolian who cannot speak Chinese, Boljoo IME has a pure Mongolian script installation and using guide.
See also
Comparison of cross-platform instant messaging clients
Comparison of instant messaging protocols
Comparison of Internet Relay Chat clients
Comparison of LAN messengers
Comparison of VoIP software
List of SIP software
List of video telecommunication services and product brands
Mongolian script
References
http://www.boljoo.com/index.php?m=content&c=index&a=show&catid=2&id=10
External links
Boljoo
Boljoo IME, written in Mongolian script
Instant messaging clients
Mongolian-language computing
Inner Mongolia |
https://en.wikipedia.org/wiki/Heart%20Exeter%20and%20Heart%20Torbay | Heart Exeter and Torbay were part of the Heart Network of commercial local radio stations operated by Global Radio in the United Kingdom. The stations were launched on 23 March 2009, and replaced Gemini FM, which was the previous commercial radio station for the Exeter and Torbay areas in Devon.
Heart Torbay transmitted from Beacon Hill, near Torbay on 96.4 MHz FM. Heart Exeter transmitted from Exeter St Thomas on 97.0 FM, and Stockland Hill, near Honiton on 103.0 FM. They were also available on DAB digital radio and online via their respective websites. Both stations were replaced by Heart Devon, broadcast from Exeter, on Friday 27 August 2010.
History
DevonAir Radio
The first commercial local radio station for the Exeter and Torbay areas was DevonAir Radio, which was launched in November 1980. The station broadcast from studios in St. David's Hill, Exeter, and overlooking the harbour in Torquay. DevonAir was initially successful, but financial problems resulted in a takeover by Capital Radio in 1987. In October 1993 the station lost its franchise and closed on 31 December 1994, leading to the creation of Gemini FM.
Gemini FM
Launched on 1 January 1995, Gemini Radio was owned by the Orchard Media Group. The station was later bought by the GWR Group, which became part of GCap Media in May 2005. Gemini FM continued to broadcast from studios in Exeter and Torquay, although as with DevonAir, most of the programming was sourced from the studio in Exeter.
Heart rebranding
In September 2008, it was announced that Gemini FM was to become Heart as part of a national rebranding exercise by new owners Global Radio. Broadcasts from the Torquay harbourside studio ceased, and the programmes for both stations were produced at the studio in Exeter.
Network restructuring
On 21 June 2010, Global Radio announced that Heart Exeter and Torbay would be merged with Heart Plymouth, Heart North Devon and Heart South Devon as part of plans to reduce the Heart network of stations from 33 to 16. The new station, Heart South West, began broadcasting from Exeter on 27 August 2010.
See also
BBC Radio Devon
Heart Plymouth
Palm 105.5
References
External links
Beacon Hill mast
Exeter St Thomas mast
Stockland Hill mast
News item about launch of Heart Exeter and Torbay
Companies based in Devon
Radio stations established in 1995
Radio stations in Devon
Exeter
Defunct radio stations in the United Kingdom
Radio stations disestablished in 2010
Mass media in Exeter
Torbay |
https://en.wikipedia.org/wiki/GTunnel | GTunnel is a Windows application developed by Garden Networks which sets up a local HTTP or SOCKS proxy server which tunnels traffic through their server farm before it reaches its intended destination.
Features
GTunnel protects Internet users' privacy and freedom of speech in these ways:
User's IP address is hidden and user's Internet privacy protected. The destination servers see GTunnel server addresses instead.
Traffic content is encrypted with industry-strength algorithms between the user's PC and GTunnel servers so the local filtering/censorship systems will not see the content in clear-text format.
GTunnel version 1.1 provides a standard mode, which is the main working mode and provides the best data transfer performance by connecting to the back-end servers directly, a Skype mode, and a Tor mode that go through computers in these P2P network. GTunnel also has an improved user interface which features real-time traffic graphs.
GTunnel replaces the earlier Garden and G2 client software and becomes the main client software of Garden Networks.
GTunnel works on Linux through Wine support.
A Diagram of GTunnel's Working Modes
See also
Garden Networks
Freegate
Ultrasurf
References
External links
http://gardennetworks.org/download
Download latest version of GTunnel from TechSpot.com
Internet censorship in China
Proxy servers
Anonymity networks
Internet privacy software
Windows Internet software |
https://en.wikipedia.org/wiki/Oversampling%20and%20undersampling%20in%20data%20analysis | Within statistics, oversampling and undersampling in data analysis are techniques used to adjust the class distribution of a data set (i.e. the ratio between the different classes/categories represented). These terms are used both in statistical sampling, survey design methodology and in machine learning.
Oversampling and undersampling are opposite and roughly equivalent techniques.
There are also more complex oversampling techniques, including the creation of artificial data points with algorithms like Synthetic minority oversampling technique.
Motivation for oversampling and undersampling
Both oversampling and undersampling involve introducing a bias to select more samples from one class than from another, to compensate for an imbalance that is either already present in the data, or likely to develop if a purely random sample were taken. Data Imbalance can be of the following types:
Under-representation of a class in one or more important predictor variables. Suppose, to address the question of gender discrimination, we have survey data on salaries within a particular field, e.g., computer software. It is known women are under-represented considerably in a random sample of software engineers, which would be important when adjusting for other variables such as years employed and current level of seniority. Suppose only 20% of software engineers are women, i.e., males are 4 times as frequent as females. If we were designing a survey to gather data, we would survey 4 times as many females as males, so that in the final sample, both genders will be represented equally. (See also Stratified Sampling.)
Under-representation of one class in the outcome (dependent) variable. Suppose we want to predict, from a large clinical dataset, which patients are likely to develop a particular disease (e.g., diabetes). Assume, however, that only 10% of patients go on to develop the disease. Suppose we have a large existing dataset. We can then pick 9 times the number of patients who did not go on to develop the disease for every one patient who did.
Oversampling is generally employed more frequently than undersampling, especially when the detailed data has yet to be collected by survey, interview or otherwise. Undersampling is employed much less frequently. Overabundance of already collected data became an issue only in the "Big Data" era, and the reasons to use undersampling are mainly practical and related to resource costs. Specifically, while one needs a suitably large sample size to draw valid statistical conclusions, the data must be cleaned before it can be used. Cleansing typically involves a significant human component, and is typically specific to the dataset and the analytical problem, and therefore takes time and money. For example:
Domain experts will suggest dataset-specific means of validation involving not only intra-variable checks (permissible values, maximum and minimum possible valid values, etc.), but also inter-variable checks. For e |
https://en.wikipedia.org/wiki/TopSky | The TopSky (formerly EUROCAT) system is a computerised air traffic control and management solution developed by Thales Air Systems (formerly Thomson CSF). It utilises a distributed computing architecture and is capable of integrating geographically dispersed air traffic control units within a Flight Information Region (e.g. control towers at different airports and en route control centres) into a single coherent system.
During 2012, the Thales marketing name has been changed from Eurocat to TopSky.
Features
TopSky handles a large variety of different functions required for the smooth operation of air traffic control and management. A non-exhaustive list includes:
Surveillance data processing and track correlation (radar, ADS-B, ADS-C etc.)
Flight plan processing
Communication (CPDLC etc.)
Aeronautical information data processing (NOTAMs, QNH, wind aloft etc.)
Flow control and sequencing
Human-machine interfacing (e.g. correlating data to generate controller's display)
Data recording
Controller situational awareness and alerts generation
Squawk Emergency (EMG), Radio Failure (RAD), Hijack (HIJ)
Short Term Conflict Alert (STCA), Minimum Safe Altitude Warning (MSAW), Danger Area Infringement Warning (DAIW) etc.
Non-Transgression Zone (NTZ) alert, DUPE Alerts, FPCF Alerts.
Countries
The software is used in many countries, including:
Algeria
Australia
Austria
Belgium
Brunei
Croatia
Czech Republic
Denmark
Dominican Republic
Egypt
Finland
France
Greece
Hungary
Ireland
Jamaica
Kenya
Portugal
Philippines
Saudi Arabia
Singapore
South Africa
Sweden
United Kingdom
Thailand
Tanzania
References
Air traffic control in Europe
Air traffic control systems |
https://en.wikipedia.org/wiki/DySPAN | The Dynamic Spectrum Access Networks Standards Committee (DySPAN-SC), formerly Standards Coordinating Committee 41 (SCC41), and even earlier the IEEE P1900 Standards Committee, is sponsored by the Institute of Electrical and Electronics Engineers (IEEE). The group develops standards for radio and spectrum management. Its working groups and resulting standards, numbered in the 1900 range, are sometimes referred to as IEEE 1900.X.
Background
The IEEE P1900 Standards Committee was established in March 2005 jointly by the IEEE Communications Society (ComSoc) and the IEEE Electromagnetic Compatibility Society (EMC). The effort developed supporting standards for radio and dynamic spectrum management.
On March 22, 2007 the IEEE Standards Board approved its reorganization as Standards Coordinating Committee 41 (SCC41), Dynamic Spectrum Access Networks (DySPAN). The IEEE ComSoc and EMC sponsored this effort, as they did for IEEE 1900.
The IEEE 1900 Committee ceased to exist at the inaugural meeting of SCC41 in April 2007. The work of the IEEE 1900.x Working Groups continued under SCC41.
SCC41 voted to be directly answerable to ComSoc in December 2010, and was renamed as IEEE DySPAN-SC. At its December 2010 Meeting, the IEEE Standards Association Standards Board (SASB) approved the transfer of projects to the Communications Society Standards Board.
Overview
DySPAN-SC focuses on Dynamic Spectrum Access and associated technologies. Due to the strong inter-relationships between such topics, it also touches on other areas such as Cognitive Radio.
Working groups
IEEE DySPAN-SC currently oversees the following standards development working groups:
1900.1 Working Group on Terminology and Concepts for Next Generation Radio Systems and Spectrum Management
1900.2 Working Group on Recommended Practice for Interference and Coexistence Analysis
1900.3 Working Group on Recommended Practice for Conformance Evaluation of Software Defined Radio (SDR) Software Modules
1900.4 Working Group on Architectural Building Blocks Enabling Network-Device Distributed Decision Making for Optimized Radio Resource Usage in Heterogeneous Wireless Access Networks
1900.5 Working Group on Policy Language and Policy Architectures for Managing Cognitive Radio for Dynamic Spectrum Access Applications
1900.6 Working Group on Spectrum Sensing Interfaces and Data Structures for Dynamic Spectrum Access and other Advanced Radio Communication Systems
P1900.7 Working Group on Radio Interface for White Space Dynamic Spectrum Access Radio Systems Supporting Fixed and Mobile Operation
Proposed standards have "P" prepended to the name until they are ratified. The first to be published was 1900.2 in July 2008.
Next was 1900.1 on September 26, 2008.
Then 1900.4 was published on February 27, 2009.
Work then began on amendment P1900.4.1a for dynamic spectrum access networks in white space frequency bands, and P1900.4.1 for interoperability between components of the IEEE 1900.4 system.
The 1900 |
https://en.wikipedia.org/wiki/Magnenat | Magnenat is a surname. Notable people with the surname include:
Gabrielle Gachet, née Gabrielle Magnenat (born 1980), Swiss ski mountaineer
Nadia Magnenat Thalmann, Swiss-Canadian computer graphics scientist and robotician
Roland Magnenat (born 1922), Swiss weightlifter
Sergio Trujillo Magnenat (1911–1999), Colombian painter, illustrator and sculptor |
https://en.wikipedia.org/wiki/The%20Path%20%28video%20game%29 | The Path is a psychological horror art game developed by Tale of Tales originally released for the Microsoft Windows operating system on March 18, 2009, in English and Dutch, and later ported to Mac OS X by TransGaming Technologies.
It is inspired by several versions of the fairy tale Little Red Riding Hood, and by folklore tropes and conventions in general, but set in contemporary times. The player can choose to control one of six different sisters, who are sent one-by-one on errands by their mother to see their sick grandmother. The player can choose whether to stay on the path or to wander, where wolves are lying in wait.
Gameplay
According to the developer, the game is not meant to be played in the traditional sense, in that there is no winning strategy. In fact, much of the gameplay requires the player to choose the losing path for the sisters to run into encounters which they (and the player) are meant to experience. Even the story narratives are not typical for a game, as explained by the developer, "We are not story-tellers in the traditional sense of the word. In the sense that we know a story and we want to share it with you. Our work is more about exploring the narrative potential of a situation. We create only the situation. And the actual story emerges from playing, partially in the game, partially in the player’s mind."
Plot
The game begins in an apartment. The player is shown six sisters to choose from and is given no information about them other than a name. When the player selects a girl, the journey begins.
The player is given control of the girl, and is instructed: "Go to Grandmother's house and stay on the path."
As the player explores, they find various items scattered around. For a girl to pick up or examine an object, the player needs to either click on the interaction button or move her close enough for a superimposed image of the object to appear on the screen, then let go of the controls. The character will interact and an image will appear on the screen, indicating what has been unlocked; every item a girl encounters in the forest shows in some shape or form in Grandmother's house, and some objects open up whole new rooms. Small text will also appear, a thought from the current character. Some items can only be picked up once and do not appear in subsequent runs. However, each character will say something different about an object, so the player has the option to access a "basket" to see what they have collected.
The Wolf is the antagonist in the game and takes on a different form for each girl. The forms represent tribulations that are associated with the stages of childhood and adolescence. It is not required to find the Wolf. In this game, there are no requirements but the ending at Grandmother's house does change dramatically after the wolf encounter. The girl encounters the Wolf, there is a brief cut scene, and the screen goes black. Afterward, the girl is lying on the path in front of Grandmother's house. |
https://en.wikipedia.org/wiki/AEBN | AEBN, short for Adult Entertainment Broadcast Network, is an Internet pornography company that specializes in delivering material through streaming video in a video on demand format. Subsidiaries include PornoTube.
History
AEBN was formed in 1999. At the time, video-streaming technology was still in its infancy. AEBN developed and launched an adult Video-on-Demand service that now serves as a widely recognized model of content delivery for the adult industry. AEBN's pay-per-minute model is a standard in online pornography. In 2004, AEBN began offering its theater templates in languages other than English.
Headquartered in Charlotte, North Carolina, AEBN offers more than 100,000 titles and includes material from at least 1,500 different studios with 10 million subscribers worldwide, as of 2011.
Studio and other acquisitions
In January 2007, AEBN announced a merger with NakedSword.com, one of the largest gay Internet pornography companies on the Web. The merger gave AEBN a windfall of gay content from studios such as COLT and Falcon, as well as a strong brand name in the gay market. NakedSword retained its separate headquarters in San Francisco, California, giving AEBN offices on both the east and west coasts.
In 2009, AEBN merged with another gay adult company, Raging Stallion Studios, and its sister label, Pistol Media. The merger also included Pistol Media's Gunzblazing affiliate program. Raging Stallion Studios is also based in San Francisco and is one of the world's largest producers of gay adult films.
On December 19, 2010, AEBN purchased Falcon Studios for an undisclosed sum.
AEBN merged Falcon Studios and Raging Stallion, although the company said that both brands would remain distinct and AEBN's output would remain constant at 60 DVD titles per year, with 40 originating from Raging Stallion. Falcon CEO James Hansen would remain with the company as the chief financial officer of Falcon Studios.
Other ventures
AEBN launched Xobile in April 2005. Xobile made adult material available on mobile devices. Xobile was known for its "PornMyPortable" campaign, which offered adult material specifically made to work with mobile entertainment devices like the iPod and Sony's PSP. On March 5, 2010, AEBN announced the relaunch of its Xobile mobile porn platform that included a "massive redesign."
AEBN announced plans to host the first annual VOD Awards in 2005. The awards' winners are chosen based on the viewing habits of the sites' users and on per-minute sales in theaters during the preceding calendar year.
Early in 2006, AEBN started xPeeps.com, an x-rated dating site that garnered 300,000 users in its first eight months. In 2007, AEBN created a dating site similar to xPeeps but specifically for the fetish community called SocialKink.com.
In 2008 AEBN debuted a product called RealTouch, a sleeve fitted with "belts, jets, heating elements and other gadgetry" that fits over the penis and synchronizes sensations to a specially produced online |
https://en.wikipedia.org/wiki/Galadra | Galadra is a monotypic moth genus of the family Crambidae described by Francis Walker in 1865. It contains only one species, Galadra rhomboidata, described by the same author in the same year, which is found in New Guinea.
References
Acentropinae
Monotypic moth genera
Moths of New Guinea
Crambidae genera
Taxa named by Francis Walker (entomologist) |
https://en.wikipedia.org/wiki/Human%20Security%20Gateway | The Human Security Gateway is a database of research and information related to human security. Additions to the database are made daily, and it contains over 27,000 English and French-language resources related to conflict and human security. It is run by the Human Security Report Project.
Overview
The Gateway "focuses attention on threats stemming from violence to individuals and to societies at risk". It uses an approach to gathering and categorizing information that is complementary to the "broad" conception of human security; this is the same definition of human security that the United Nations Development Programme (UNDP) used in its 1994 Human Development Report.
Content
The Gateway offers users catalogued resources including reports, journal articles, and fact sheets. Its coverage ranges from the global to national (and sub-national) levels. Information is available in English and French, and via presentation formats such as:
Regional Gateways focusing on regions,
National Gateways,
Topical Gateways,
Customizable Updates.
The Gateway can be searched by keyword, geographic region, or subject heading, and an abstract can be viewed before downloading the full-text of the article or report. Subscribers can be notified of additions to the database, filtered by topic, region, language, or format, with feeds provided by email and RSS news feed.
Topics include: child soldiers; climate change; conflict prevention; criminal violence; gender; governance; health; human rights; humanitarian intervention; international law; landmines; natural resources; peacekeeping; post-conflict peacebuilding; small arms; refugees; and terrorism.
See also
Human Security Report 2005
International Relations and Security Network
References
External links
Human Security Report Project
International Relations and Security Network (ISN)
Political research institutes
Peace and conflict studies
Simon Fraser University
Terrorism databases
Databases in Canada |
https://en.wikipedia.org/wiki/Caudatoscelis%20caudata | Caudatoscelis caudata is a species of mantis in the family Amorphoscelidae.
See also
List of mantis genera and species
References
Caudatoscelis
Insects described in 1914 |
https://en.wikipedia.org/wiki/Chaeteessa%20caudata | Chaeteessa caudata is a species of praying mantis in the family Chaeteessidae.
References
Mantodea
Articles created by Qbugbot
Insects described in 1871 |
https://en.wikipedia.org/wiki/Catt%20Sadler | Catt Sadler (born August 24, 1974) is an entertainment reporter who is best known for her work in E! News, E! News Weekend and Daily Pop. She previously co-hosted the network's The Daily 10 before its cancellation.
Early life
Sadler was born in Martinsville, Indiana.
Career
Before finishing college, Sadler was hired by WXIN, the Fox affiliate in Indianapolis to host the weekly segment "Youth Matters". She then hosted a short lived house music dance show called "The Groove" on WXIN. After working in local news for about a year, she moved to California to advance her career.
After appearing as an extra in a few VH1 spoofs in Hollywood, Sadler got her first broadcasting job as an entertainment reporter in San Francisco in 1997 at KBWB/KNTV in San Jose, California, for their entertainment news segments. For four years she hosted a nightly lifestyle segment called "The Bay Beat" and traveled frequently to Los Angeles and New York to conduct celebrity interviews.
In 2001, she moved back to Indiana where she returned to WXIN to co-anchor the station's morning newscast. She also hosted the Hoosier Lottery's Hoosier Millionaire show, which became the longest-running syndicated lottery game show in the country. During this time, she also served as the official emcee for the NBA's Indiana Pacers for the 2003–04 season. In 2005, Sadler gave birth to her second son. Sadler and her family returned to Los Angeles in 2006 when she was named host of The Daily 10 on E! alongside Sal Masekela and Debbie Matenopoulos.
Sadler continued acting in L.A. She played herself in Judd Apatow's Knocked Up, and appeared on General Hospital and Night Shift. She also starred in the Red Jumpsuit Apparatus music video, "You Better Pray", playing the dancing librarian.
In 2010, Sadler joined the extended hour-long E! News with Ryan Seacrest and Giuliana Rancic. She also serves as host of several E! Live from the Red Carpet events, covering the Academy Awards, Golden Globes, Emmys, and more.
In May 2017, E! News launched a new daytime talk show called Daily Pop, with Sadler as one of three hosts.
In December 2017, Sadler left E! News after learning that her co-host Jason Kennedy was earning "double" her salary.
Catt now owns her own production company, Love Bug Entertainment. She hosts the popular weekly podcast "It Sure is a Beautiful Day" in association with Dear Media. Guests have included Scarlett Johansson, Katie Couric, Molly Shannon, Rebecca Minkoff and many other notable women.
Catt also regularly hosts the Vanity Fair Oscars Red Carpet Show. She held this position in 2018,2019, 2020 and 2022.
Charity work
Sadler is the international spokesperson for the Women Like Us Foundation, an organization her mother co-created after writing a book of the same name. In 2010, Sadler founded a local chapter – Women Like Us Hollywood.
Personal life
Sadler married her college sweetheart, fashion executive Kyle Boyd, in 2001. They have two sons, Austin (2001) and Arion (2005 |
https://en.wikipedia.org/wiki/Web%20intelligence | Web intelligence is the area of scientific research and development that explores the roles and makes use of artificial intelligence and information technology for new products, services and frameworks that are empowered by the World Wide Web.
The term was coined in a paper written by Ning Zhong, Jiming Liu Yao and Y.Y. Ohsuga in the Computer Software and Applications Conference in 2000.
Research
The research about the web intelligence covers many fields – including data mining (in particular web mining), information retrieval, pattern recognition, predictive analytics, the semantic web, web data warehousing – typically with a focus on web personalization and adaptive websites.
References
External links
Web Intelligence Journal Page
Web Intelligence Consortium, an international, non-profit organization dedicated to advancing worldwide scientific research and industrial development in the field of Web Intelligence
Web intelligence Research Group at University of Chile
Further reading
Artificial intelligence
Crowdsourcing
Big data
Data mining
Collective intelligence
Social information processing |
https://en.wikipedia.org/wiki/Ebus | Ebus, EBUS, or E-bus may refer to:
Ebus, an intercity bus service in Canada owned by Pacific Western Transportation
EBUS (serial buses), a data-bus communication interface
Electric bus, several types of buses which uses electric power
Battery electric bus, the most common type of electric bus
Endobronchial ultrasound, a diagnostic procedure used in Medicine
Eastern Boundary Upwelling Systems |
https://en.wikipedia.org/wiki/BIRCH | BIRCH (balanced iterative reducing and clustering using hierarchies) is an unsupervised data mining algorithm used to perform hierarchical clustering over particularly large data-sets. With modifications it can also be used to accelerate k-means clustering and Gaussian mixture modeling with the expectation–maximization algorithm. An advantage of BIRCH is its ability to incrementally and dynamically cluster incoming, multi-dimensional metric data points in an attempt to produce the best quality clustering for a given set of resources (memory and time constraints). In most cases, BIRCH only requires a single scan of the database.
Its inventors claim BIRCH to be the "first clustering algorithm proposed in the database area to handle 'noise' (data points that are not part of the underlying pattern) effectively", beating DBSCAN by two months. The BIRCH algorithm received the SIGMOD 10 year test of time award in 2006.
Problem with previous methods
Previous clustering algorithms performed less effectively over very large databases and did not adequately consider the case wherein a data-set was too large to fit in main memory. As a result, there was a lot of overhead maintaining high clustering quality while minimizing the cost of additional IO (input/output) operations. Furthermore, most of BIRCH's predecessors inspect all data points (or all currently existing clusters) equally for each 'clustering decision' and do not perform heuristic weighting based on the distance between these data points.
Advantages with BIRCH
It is local in that each clustering decision is made without scanning all data points and currently existing clusters.
It exploits the observation that the data space is not usually uniformly occupied and not every data point is equally important.
It makes full use of available memory to derive the finest possible sub-clusters while minimizing I/O costs.
It is also an incremental method that does not require the whole data set in advance.
Algorithm
The BIRCH algorithm takes as input a set of data points, represented as real-valued vectors, and a desired number of clusters . It operates in four phases, the second of which is optional.
The first phase builds a clustering feature () tree out of the data points, a height-balanced tree data structure, defined as follows:
Given a set of N d-dimensional data points, the clustering feature of the set is defined as the triple , where
is the linear sum.
is the square sum of data points.
Clustering features are organized in a CF tree, a height-balanced tree with two parameters: branching factor and threshold . Each non-leaf node contains at most entries of the form , where is a pointer to its th child node and the clustering feature representing the associated subcluster. A leaf node contains at most entries each of the form . It also has two pointers prev and next which are used to chain all leaf nodes together. The tree size depends on the parameter . A node is required to fit i |
https://en.wikipedia.org/wiki/In-network%20management | With current network management technologies, management functions typically reside outside the network in management stations and servers, which interact with network elements and devices via network protocols for management, in order to execute management tasks, including fault, configuration, accounting, performance, and security management, or, short (FCAPS). Most of these tasks are performed on a per-device basis. During network operation, for instance, a management station periodically polls individual devices in its domain for the values of local variables, such as devices counters or performance parameters. These variables are then processed on the management station to compute an estimate of a network-wide state, which is analyzed and acted upon by management applications. This paradigm of interaction between the management system and managed system underlies traditional management frameworks and protocols, including SNMP, TMN and OSI-SM.
In the view of Future Internet activities in the research communities around the globe, the network management of a Future Internet is of major concern in the view of requiring more self-management, more automation of the management, and easier use of management tools. In-network management has been developed and discussed in a larger community gathered around project partners involved in the EU FP7 project 4WARD, EU project AutoI and EU project UniverSELF.
The in-network (In-bound) management vision
In-network management (INM) supports management operations by the means of a highly distributed architecture. The main objective is the design of management functions that are located in- or close to the network elements and services to be managed, in most of the cases co-located on the same nodes; as target approach, they would be co-designed with the network elements and services. The vision of the INM paradigm of embedding management capabilities in the network. The benefit of the resulting distributed in-bound network management architecture - is the inherent support for self-management features, integral automation and autonomicity capabilities, easier use of management tools and empowering the network with inbuilt cognition and intelligence. Additional benefits include reduction and optimisation in the amount of external management interactions, which is key to the minimization of manual interaction and the sustaining of manageability of large networked systems and moving from a managed object paradigm to one of management by objective.
The design space of INM is spanned along seven axes:
Along the degree of embedding: Management processes and functions can be implemented as external, separated, integrated, or inherent management capabilities of the network or services. Integrated is weaker than inherent in that instead of indistinguishable management functionality, it designates visible and modular management capabilities, but which are still closely related to and integrated with specific se |
https://en.wikipedia.org/wiki/HOCR | hOCR is an open standard of data representation for formatted text obtained from optical character recognition (OCR). The definition encodes text, style, layout information, recognition confidence metrics and other information using Extensible Markup Language (XML) in the form of Hypertext Markup Language (HTML) or XHTML.
Software
The following OCR software can output the recognition result as hOCR file:
OCRopus
Tesseract
Cuneiform
HebOCR
gcv2hocr
Example
The following example is an extract of an hOCR file:
...
<p class='ocr_par' lang='deu' title="bbox930">
<span class='ocr_line' title="bbox 348 797 1482 838; baseline -0.009 -6">
<span class='ocrx_word' title='bbox 348 805 402 832; x_wconf 93'>Die</span>
<span class='ocrx_word' title='bbox 421 804 697 832; x_wconf 90'>Darlehenssumme</span>
<span class='ocrx_word' title='bbox 717 803 755 831; x_wconf 96'>ist</span>
<span class='ocrx_word' title='bbox 773 803 802 831; x_wconf 96'>in</span>
<span class='ocrx_word' title='bbox 821 803 917 830; x_wconf 96'>ihrem</span>
<span class='ocrx_word' title='bbox 935 799 1180 838; x_wconf 95'>ursprünglichen</span>
<span class='ocrx_word' title='bbox 1199 797 1343 832; x_wconf 95'>Umfange</span>
<span class='ocrx_word' title='bbox 1362 805 1399 823; x_wconf 95'>zu</span>
<span class='ocrx_word' title='bbox 1417 x_wconf 96'>ver-</span>
</span>
...
The recognized text is stored in normal text nodes of the HTML file.
The distribution into separate lines and words is here given by the
surrounding span tags. Moreover, the usual HTML entities are used,
for example the p tag for a paragraph. Additional information is
given in the properties such as:
different layout elements such as "ocr_par", "ocr_line", "ocrx_word"
geometric information for each element with a bounding box "bbox"
language information "lang"
some confidence values "x_wconf"
hOCR Docs
Visit the hOCR Specification to view in depth about hOCR.
bbox
General
The Layout of the Bounding Box Object or bbox Object is Grammar.
property-name = "bbox"
property-value = uint uint uint uint
Example
bbox 0 0 100 200
The bbox - short for "bounding box" - of an element is a rectangular box around this element, which is defined by the upper-left corner (x0, y0) and the lower-right corner (x1, y1).
the values are with reference to the top-left corner of the document image and measured in pixels
the order of the values are x0 y0 x1 y1 = "left top right bottom"
Usage
Use x_bboxes below for character bounding boxes
Do not use bbox unless the bounding box of the layout component is, in fact, rectangular, some non-rectangular layout components may have rectangular bounding boxes if the non-rectangularity is caused by floating elements around which text flows.
<span class='ocr_line' id='line_1'
title="bbox 10 20 160 30">...</span>
The bounding box bbox of this line is shown in blue and it is span by the upper-left corner (10, 20) and the |
https://en.wikipedia.org/wiki/Winifred%20Asprey | Winifred "Tim" Alice Asprey (April 8, 1917 – October 19, 2007) was an American mathematician and computer scientist. She was one of only around 200 women to earn PhDs in mathematics from American universities during the 1940s, a period of women's underrepresentation in mathematics at this level.
She was involved in developing the close contact between Vassar College and IBM that led to the establishment of the first computer science lab at Vassar.
Family
Asprey was born in Sioux City, Iowa; her parents were Gladys Brown Asprey, Vassar class of 1905, and Peter Asprey Jr. She had two brothers, actinide and fluorine chemist Larned B. Asprey (1919–2005), a signer of the Szilárd petition, and military historian and writer Robert B. Asprey (1923–2009) who dedicated several of his books to his sister Winifred.
Education and work
Asprey attended Vassar College in Poughkeepsie, New York, where she earned her undergraduate degree in 1938. As a student there, Asprey met Grace Hopper, the "First Lady of Computing," who taught mathematics at the time. After graduating, Asprey taught at several private schools in New York City and Chicago before going on to earn her MS and PhD degrees from the University of Iowa in 1942 and 1945, respectively. Her doctoral advisor was the topologist Edward Wilson Chittenden.
Asprey returned to Vassar College as a professor. By then, Grace Hopper had moved to Philadelphia to work on UNIVAC (Universal Automatic Computer) project. Asprey became interested in computing and visited Hopper to learn about the foundations of computer architecture. Asprey believed that computers would be an essential part of a liberal arts education.
At Vassar, Asprey taught mathematics and computer science for 38 years and was the chair of the mathematics department from 1957 until her retirement in 1982.
She created the first Computer Science courses at Vassar, the first being taught in 1963, and secured funds for the college's first computer, making Vassar the second college in the nation to acquire an IBM System/360 computer in 1967.
Asprey connected with researchers at IBM and other research centers and lobbied for computer science at Vassar. In 1989, due to her contributions, the computer center she started was renamed the Asprey Advanced Computation Laboratory.
References
External links
Profile at Vassar College Innovators Gallery
Winifred Asprey Papers at Vassar College Archives and Special Collections Library
Vassar College alumni
University of Iowa alumni
Vassar College faculty
American women computer scientists
20th-century American women scientists
American women mathematicians
Computer science educators
1917 births
2007 deaths
20th-century American mathematicians
Mathematicians from Iowa
20th-century women mathematicians
20th-century American scientists
American computer scientists
21st-century American women |
https://en.wikipedia.org/wiki/Richard%20E.%20Sprague | Richard E. Sprague (August 27, 1921 – January 27, 1996) was an American computer technician, researcher and author. According to American journalist Richard Russell, who dedicated seventeen years to the investigation of John Kennedy assassination, Sprague was "the leading gatherer of photographic evidence about the Kennedy assassination". Sprague published his investigation in 1976-1985 as three editions of The Taking of America, 1-2-3.
Career
Born in Philadelphia on August 27, 1921, Richard E. Sprague graduated from Purdue University in 1942. During World War II, he served with the U.S. Navy, finishing with the rank of Lieutenant (Junior Grade). After the war, he was employed as an engineer at Northrup Aircraft. By 1950, he had left Northrup to help co-found the Computer Research Corporation located in Hawthorne, California. By 1960, he had moved on to become the Director of Computer Systems Consulting for Touche, Ross, Bailey And Smart which would later be simply known as Touche Ross until 1989.
Appeared as a contestant on the Groucho Marx radio quiz program "You Bet Your Life" on May 21, 1952.
After the assassination of John F. Kennedy took place on November 22, 1963, Sprague began investigating the deed on his own in 1966 upon seeing the Abraham Zapruder produced Zapruder film.
Sprague served a year as photographic expert in the 1966-1969 investigations conducted by New Orleans District Attorney Jim Garrison.
In 1968 he co-founded the Committee to Investigate Assassinations with Bernard Fensterwald. That same year, he also set up Sprague Research And Consulting.
Sprague later worked as a full-time consultant to Battelle Memorial Institute of Frankfurt, Germany.
Richard E. Sprague died on January 27, 1996, with his last known address in Virginia. He was interred at Washington Park East Cemetery in Indianapolis, Indiana.
Research on the Kennedy assassination
In the May 1970 issue of Computers And Automation, Sprague said that he used computer analysis of still photographs and movie film from Dealey Plaza to determine that at least four gunmen and fifty conspirators were involved in Kennedy's assassination. Sprague stated that the evidence indicated six shots were fired at John F. Kennedy. According to Sprague, President Kennedy was hit by four shots, Connally was hit by another, and one missed. Five years later in September 1975, Sprague and L. Fletcher Prouty stated that their study of still photographs and film of the assassination revealed that no shots were fired from the Texas School Book Depository's sixth floor window and that Lee Harvey Oswald was framed by planted and altered evidence.
Much of Sprague's information and conclusions had already been published in the magazines Computers And Automation and People and The Pursuit of Truth before Sprague wrote The Taking of America, 1-2-3.
According to Sprague's research, because of the location of the great oak tree with dense crown that crossed the trajectory of the shot from th |
https://en.wikipedia.org/wiki/Silhouette%20%28clustering%29 | Silhouette refers to a method of interpretation and validation of consistency within clusters of data. The technique provides a succinct graphical representation of how well each object has been classified. It was proposed by Belgian statistician Peter Rousseeuw in 1987.
The silhouette value is a measure of how similar an object is to its own cluster (cohesion) compared to other clusters (separation). The silhouette ranges from −1 to +1, where a high value indicates that the object is well matched to its own cluster and poorly matched to neighboring clusters. If most objects have a high value, then the clustering configuration is appropriate. If many points have a low or negative value, then the clustering configuration may have too many or too few clusters.
The silhouette can be calculated with any distance metric, such as the Euclidean distance or the Manhattan distance.
Definition
Assume the data have been clustered via any technique, such as k-medoids or k-means, into clusters.
For data point (data point in the cluster ), let
be the mean distance between and all other data points in the same cluster, where is the number of points belonging to cluster , and is the distance between data points and in the cluster (we divide by because we do not include the distance in the sum). We can interpret as a measure of how well is assigned to its cluster (the smaller the value, the better the assignment).
We then define the mean dissimilarity of point to some cluster as the mean of the distance from to all points in (where ).
For each data point , we now define
to be the smallest (hence the operator in the formula) mean distance of to all points in any other cluster (i.e., in any cluster of which is not a member). The cluster with this smallest mean dissimilarity is said to be the "neighboring cluster" of because it is the next best fit cluster for point .
We now define a silhouette (value) of one data point
, if
and
, if
Which can be also written as:
From the above definition it is clear that
Note that is not clearly defined for clusters with size = 1, in which case we set . This choice is arbitrary, but neutral in the sense that it is at the midpoint of the bounds, -1 and 1.
For to be close to 1 we require . As is a measure of how dissimilar is to its own cluster, a small value means it is well matched. Furthermore, a large implies that is badly matched to its neighbouring cluster. Thus an close to 1 means that the data is appropriately clustered. If is close to -1, then by the same logic we see that would be more appropriate if it was clustered in its neighbouring cluster. An near zero means that the datum is on the border of two natural clusters.
The mean over all points of a cluster is a measure of how tightly grouped all the points in the cluster are. Thus the mean over all data of the entire dataset is a measure of how appropriately the data have been clustered. If there are too many or too |
https://en.wikipedia.org/wiki/Scotland%20Route%20Utilisation%20Strategy | The Scotland Route Utilisation Strategy is a Route Utilisation Strategy, published by Network Rail in March 2007, the third RUS to be published. The railways in Scotland are divided into three strategic routes, namely Route 24 (East of Scotland), Route 25 (Highlands) and Route 26 (Strathclyde and South West Scotland) together with parts of Route 8 (East Coast Main Line, ECML) and Route 18 (West Coast Main Line, WCML). The three strategic routes form the scope of Network Rail's Scotland Route Utilisation Strategy. Separate RUSs for the ECML (published February 2008) and WCML (scheduled for publication late in 2009) encompass the relevant parts of routes 8 and 18. The Edinburgh Crossrail service, which provides a direct route between Stirling, Dunblane and Bathgate in the west to Newcraighall in the east, operates over part of the ECML east of Edinburgh Waverley to Portobello Junction.
The recommendations are grouped into each strategic route, and, as has become customary with RUSs, provide short-term (to end of CP3, March 2009), medium-term (CP4, 2014) and some long-term (thereafter) solutions. Essentially there are few major recommendations for the lightly used Route 25, but there are various and diverse recommendation for the other two, heavily used, routes. There are urgent issues to do with overcrowding in the peaks and with the capacity of individual lines and station, especially in the light of significant predicted growth in traffic (passenger and also freight).
Scotland, with its devolved government and Parliament responsible for transport in the nation, has been very active in pursuing the possible development of the rail infrastructure. At the time of the study and its publication there were a number of contingent projects at various stages, but mostly with capital funding already identified. These include:
remodelling the western approach to Edinburgh Waverley station, and new platforms (subsequently completed February 2008 )
reopening the Stirling-Alloa-Kincardine line (subsequently completed May 2008 )
Stirling remodelling
reopening the Airdrie–Bathgate rail link through route, including reinstating the Drumgelloch to Bathgate section
a new Glasgow Airport Rail Link (GARL) branching off an enhanced line through Paisley
the Borders Railway, a plan to reopen extensive sections of track south-east of Edinburgh
the Edinburgh Airport link, a short new section of track branching off the Edinburgh to Glasgow line, with other connections
Specific measures recommended
Route 24 - East of Scotland
Short term
lengthening of some trains in the Stirling-Glasgow corridor to 6-car, with appropriate platform extensions
partial remodelling and resignalling in the Stirling-Larbert corridor, partially consequent on the reopening to Alloa/Kincardine
timetabling recast between Edinburgh and Aberdeen via Fife to deliver faster trains and services more responsive to demand
a new fuelling and cleaning depot, probably at Perth
initiatives co |
https://en.wikipedia.org/wiki/Trams%20in%20Dresden | The Dresden tramway network () is a network of tramways forming the backbone of the public transport system in Dresden, a city in the federal state of Saxony, Germany. Opened in 1872, it has been operated since 1993 by Dresdner Verkehrsbetriebe (DVB), and is integrated in the Verkehrsverbund Oberelbe (VVO).
, the network comprised 12 tram lines, with a total line length of approximately and a total route length of . There was of track, which translated into of actual tram line, serving 154 tram stops.
History
The origins of the Dresden tramway network can be traced back to the year 1872, when the first horse-drawn line opened between the city centre and the former village of Blasewitz, now a borough of Dresden.
Lines
The Dresden tramway network is a mixed system of traditional street running, especially in the inner city boroughs close to the city centre, and modern light rail. The network uses the unique gauge of , which is just wider than . This gauge is sometimes called the Dresden Gauge.
In recent years, street running has been replaced by independent right-of-way arrangements wherever possible, and new extensions created in the same form. In November 2008, a extension of line 7 was opened from Gorbitz to Pennrich, in Dresden's south eastern suburbs. In May 2011, a extension of line 10 opened from Friedrichstrasse to the city's Messe or exhibition centre, involving construction of a long, wide and high bridge across the floodplain of the River Elbe. In July 2019, routes 9 and 13 were realigned along a section to provide better connections with regional trains at Dresden-Strehlen station.
Unlike various other German cities of comparable size, no stadtbahn style tunnel sections or high platform stops have been created. Many tram stops have been rebuilt so as to be fully accessible to physically disabled persons, and to allow level boarding to the newer low floor trams that now operate most services.
Different lines can be identified by a line number and a colour code. the lines are:
Future plans, as part of the Stadtbahnprogramm 2020, include of new tram line, with work starting in 2014. Some would be on reserved track, and the new lines would replace bus lines 61 and 62, some of the city's busiest, with an estimated cost of 223 million euros. The new lines comprise:
Prager Str to Plauen Bhf via Budapester Str and Chemnitzer Str
Großer Garten to Löbtau via Technische Universität
City Center to Fetscherplatz via Pillnitzer Str and Striesener Str
Sachsenallee to Max-Planck-Institute via Johannstadt
Bühlau to Weißig
On all tram lines except lines 4 and 11, a general 10-minute headway is offered on weekdays, extending to 15 minutes on Saturday, Sunday and in the evening. On the main routes through the inner city, where different lines intertwine, vehicles run up to every two minutes. Line 4, which extends a considerable distance beyond the city boundary to the towns of Radebeul, Coswig and Weinböhla, operates the stan |
https://en.wikipedia.org/wiki/SOFA%20%28component%20system%29 | SOFA 2 is a component system developed by Distributed Systems Research Group at Charles University in Prague. It provides many advanced features: ADL-based design, behavior specification and verification based on behavior protocols, software connectors supporting different communication styles and providing transparent distribution of applications. SOFA 2 can be used not only for modeling component-based applications but also as a complete framework supporting all the stages of an application lifecycle from development to execution.
SOFA 2 basis
The SOFA 2 system includes a component model, repository of components, runtime environment and tool support.
Component Model
SOFA 2 component model is defined by means of its meta-model which captures core concepts and states relation among them.
Repository
SOFA 2 provides a repository of a components which is automatically generated from the meta-model.
Runtime environment
Tool support
Cushion - is a text-based tool which allows development of SOFA 2 applications and manipulation with a repository
SOFA IDE - is a graphical tool (plugin for Eclipse)
MConsole - is a plugin for Eclipse (as well as a standalone application) monitoring and maintaining SOFA 2 runtime environment
SOFA application lifecycle
application design
component development, adaptation
application assembly
application deployment
application execution - monitoring, maintaining
See also
Component-based software engineering
References
A complete list of SOFA related papers can be found at the DSRG site.
External links
SOFA 2 home page
Distributed Systems Research Group
SOFA 2 at Objectweb
SOFA IDE update site
Integrated development environments |
https://en.wikipedia.org/wiki/Baseline%20StudioSystems | Studio System by Gracenote, formerly known as Baseline StudioSystems, is an American e-commerce company. It was founded in 1982 and licenses its commercial entertainment database, known as Studio System. It is owned by Gracenote, a subsidiary of Nielsen Holdings.
History
James Monaco founded Baseline in 1982. Their primary product, an entertainment database, was launched in 1985. Monaco left Baseline in 1992, and Paul Kagan Associates purchased it the following year. Big Entertainment purchased the database in 1999 and subsequently renamed themselves to Hollywood.com. The same year, Creative Planet purchased The Studio System, a rival database founded in 1987, from Brookfield Communications. In 2004, Hollywood.com's parent company, Hollywood Media, purchased The Studio System and merged the two databases. Two years later, The New York Times Company purchased the now-renamed Baseline StudioSystems and integrated it into NYTimes.com, only to sell it back to Hollywood.com in 2011. Gracenote, a subsidiary of Tribune Media, purchased Baseline in 2014, citing a desire to better compete against competitor Rovi. Tribune sold the Gracenote subsidiary to Nielsen Holdings in 2017, including the Studio System.
Database
Before its 2004 merge with the Studio System, the database was called Baseline. The combined database, now marketed under the Studio System name, includes information on films, television shows, filmographies, and box office data. After being purchased by Gracenote, it now includes their metadata from the former Tribune Media Services. It is subscription-based. Its data goes back to 1896 and includes works currently in production.
See also
AllMovie
Internet Movie Database
References
External links
Companies established in 1982
Online film databases
American film websites |
https://en.wikipedia.org/wiki/Dana%20S.%20Nau | Dana S. Nau is a Professor of Computer Science and Systems Research at the University of Maryland Department of Computer Science in College Park, where he has done research in automated planning and scheduling, game theory, cognitive science, and computer-aided engineering. He has many PHD students, including Qiang Yang who graduated in 1989. He has more than 300 publications and several best-paper awards. Some of his accomplishments include the discovery of game tree pathology, the development of the SHOP and SHOP2 HTN planning systems, and the book Automated Planning: Theory and Practice (). He is a Fellow of the AAAI and in 2022 he was elected as a Fellow of the AAAS.
Honors
1996 – Fellow, AAAI
2013 – Fellow of the Association for Computing Machinery
2022 – Fellow, AAAS
References
External links
Dana Nau's home page
Living people
University of Maryland, College Park faculty
Artificial intelligence researchers
American computer scientists
Duke University alumni
Missouri University of Science and Technology alumni
Fellows of the Association for the Advancement of Artificial Intelligence
Fellows of the Association for Computing Machinery
1951 births |
https://en.wikipedia.org/wiki/Radio%20IP%20Software | Radio IP Software is a privately held software company specializing in mobile data connectivity and mobile virtual private network (Mobile VPN) solutions. Established in 1998, Radio IP Software is headquartered in Montreal, Quebec, Canada and has offices in Florida, USA and London, England.
In 2009, Radio IP Software completed the acquisition of ipUnplugged AB, a Stockholm, Sweden based developer of the ipUnplugged Mobile VPN software, which was designed using the Mobile IP standard communications protocol and including the IPSec security standards.
Users
Radio IP Software's users are primarily in the public safety, utility, mobile government, and enterprise sectors.
References
Networking companies
Companies based in Montreal |
https://en.wikipedia.org/wiki/The%20Secret%20Life%20of%20the%20American%20Teenager%20%28season%202%29 | The second season of The Secret Life of the American Teenager, an American television series created by Brenda Hampton, debuted on the ABC Family television network on Monday, June 22, 2009 at 8:00PM. Season two regular cast members include Shailene Woodley, India Eisley, Daren Kagasoff, Francia Raisa, Kenny Baumann, Molly Ringwald, Mark Derwin, Megan Park, and Greg Finley II. Following the first season, Jorge Pallo and Luke Zimmerman were demoted to recurring guest stars. Jorge returned for a select number of episodes to wrap up his character's storyline and eventually departed the series after its January return.
Following the success of its first season, ABC Family announced on January 31, 2009, plans to renew Secret Life, following the cancellation of its hit sci-fi TV show, Kyle XY. The official press release was released on February 9 with ABC Family ordering 24 episodes for season two. Season 2 began with 12 episodes broadcast starting June 22, 2009. Though marketed as the season finale, the mid season finale aired on September 7, 2009, with the second half of the season returning on January 4, 2010. The second 12 episodes finished their run on March 22, 2010.
The season premiere of Secret Life brought in the largest audience for the show so far, with a record-breaking 4.68 million viewers. It brought in the second largest audience in adults 18-34 with 1.40 million viewers, behind season one's mid-season finale. 2.10 million adults 18-49 watched "The Big One" along with 1.60 million females between the ages 18–34. The season premiere remains the number one scripted original premiere of Summer 2009 in Adults 18-34. Furthermore, the mid-season premiere became ABC Family's most watched telecast of all time with viewers ages 12–34 with more than three million viewers watching. The mid-season premiere also brought in the show's second largest audience in total viewers, with more than 4.55 million people watching.
This season, Amy Juergens must deal with juggling motherhood and high school, while her family and friends experience relationship challenges of their own.
Main cast
Shailene Woodley as Amy Juergens
Kenny Baumann as Ben Boykewich
Mark Derwin as George Juergens
India Eisley as Ashley Juergens
Greg Finley as Jack Pappas
Daren Kagasoff as Ricky Underwood
Megan Park as Grace Bowman
Francia Raisa as Adrian Lee
Molly Ringwald as Anne Juergens
Episodes
Development
Writing
Though it came as a surprise, writers of Secret Life were faced with a challenge when writing began for the second season. In January 2009, Molly Ringwald announced that she was expecting twins of her own. She told People Magazine that Brenda Hampton was working on writing her character's pregnancy into the storyline of the show.
Kenny Baumann, the actor who plays Ben Boykewich, confirmed that someone would die in the second season of Secret Life. The character would be a "significant male character" and the death would be a terrible tragedy. It was later |
https://en.wikipedia.org/wiki/Microsoft%20Update%20Catalog | The Microsoft Update Catalog is a website that offers updates for computers running Windows 2000 SP3, Windows XP, and Windows Server 2003 and later operating systems including Windows 11.
Scope
Created by Microsoft, the service provides a list of updates for corporations to distribute over a network. Security updates are released once a month on the website, except in special circumstances; for instance, in the event of a widespread computer virus or worm, Microsoft releases a corresponding update as soon as possible.
Gordon Mangione, Microsoft's Security Business & Technology Unit vice president (from 2004-03 to 2005-11), remarked: "Because the new services and technologies draw information and updates from a single source—the Microsoft Update catalog—and use a common polling engine (provided by the new Windows Update Agent), our customers will have a much more integrated and reliable update management process."
Usage
The latest iteration of the site was launched in August 2007, and at the time, only worked in the web browser Internet Explorer, version 6 and version 7. Before using the catalog, the user must install an ActiveX control so that they can search the updates available on the website. Searches can be saved as an RSS feed so that it can be monitored for new updates. On the Microsoft Update Catalog, downloads are accelerated with Microsoft's Background Intelligent Transfer Service, which downloads updates from the website asynchronously while attempting to use as little bandwidth as possible.
In addition, the service integrates with Windows Server Update Services and System Center Configuration Manager 2007 so that network administrators can deploy updates downloaded from the website remotely across a network.
Resurgence
As of late 2015, and the release of Windows 10, Microsoft has been making updates available exclusively through Microsoft Update Catalog. The website no longer requires an ActiveX control and can be used from any modern browser rather than being exclusive to Internet Explorer. This allows users on other platforms to download updates for archive or distribution.
See also
Windows Server Update Services (WSUS)
Windows Update
Microsoft
References
External links
Microsoft websites |
https://en.wikipedia.org/wiki/Topology%20control | Topology control is a technique used in distributed computing to alter the underlying network (modeled as a graph) to reduce the cost of distributed algorithms if run over the resulting graphs. It is a basic technique in distributed algorithms. For instance, a (minimum) spanning tree is used as a backbone to reduce the cost of broadcast from O(m) to O(n), where m and n are the number of edges and vertices in the graph, respectively.
The term "topology control" is used mostly by the wireless ad hoc and sensor networks research community. The main aim of topology control in this domain is to save energy, reduce interference between nodes and extend lifetime of the network. However, recently the term has also been gaining traction with regards to control of the network structure of electric power systems.
Topology construction and maintenance
Lately, topology control algorithms have been divided into two subproblems: topology construction, in charge of the initial reduction, and topology maintenance, in charge of the maintenance of the reduced topology so that characteristics like connectivity and coverage are preserved.
This is the first stage of a topology control protocol. Once the initial topology is deployed, specially when the location of the nodes is random, the administrator has no control over the design of the network; for example, some areas may be very dense, showing a high number of redundant nodes, which will increase the number of message collisions and will provide several copies of the same information from similarly located nodes. However, the administrator has control over some parameters of the network: transmission power of the nodes, state of the nodes (active or sleeping), role of the nodes (Clusterhead, gateway, regular), etc. By modifying these parameters, the topology of the network can change.
Upon the same time a topology is reduced and the network starts serving its purpose, the selected nodes start spending energy: Reduced topology starts losing its "optimality as soon as full network activity evolves.
After some time being active, some nodes will start to run out of energy. Especially in wireless sensor networks with multihopping, intensive packet forwarding causes nodes that are closer to the sink to spend higher amounts of energy than nodes that are farther away.
Topology control has to be executed periodically in order to preserve the desired properties such as connectivity, coverage, density.
Topology construction algorithms
There are many ways to perform topology construction:
Optimizing the node locations during the deployment phase
Change the transmission range of the nodes
Turn off nodes from the network
Create a communication backbone
Clustering
Adding new nodes to the network to preserve connectivity (Federated Wireless sensor networks)
Some examples of topology construction algorithms are:
Tx range-based
Geometry-based: Gabriel graph (GG), Relative neighborhood graph (RNG), Voronoi diagram
|
https://en.wikipedia.org/wiki/Predictable%20serial%20number%20attack | A predictable serial number attack is a form of security exploit in which the algorithm for generating serial numbers for a particular purpose is guessed, discovered, or reverse engineered, a new serial number is predicted using the algorithm, and the newly generated serial number is then used for a fraudulent purpose, either to obtain an undeserved benefit or to deny service to the legitimate holder of the serial number.
Example
Suppose there is a phone card available for sale that offers telephone service by entering the serial number printed on the card. Alice legitimately purchases a phone card in order to call Bob, and her card has the serial number 0003. The attacker, Mallory, also purchases two phone cards, and notices that the serial numbers printed on her phone cards are 0001 and 0002. After consuming the value on cards 0001 and 0002, Mallory guesses the algorithm used for generating these serial numbers is a simple sequence and predicts that 0003 is a valid serial number, enters 0003 when prompted, and gets additional phone service. When Alice tries to use her card she discovers the value has been stolen from it and it is now worthless.
Countermeasures
A common approach to prevent predictable serial number attacks is to use a cryptographic hash function such as SHA-2 to generate the actual serial numbers. Internally, the issuing organization creates a (pseudo-)random nonce as a salt for generating the serial numbers, and keeps it secret. The issuer increments their internal serial number and appends it to the salt, and the computed message digest is used to create the actual serial number. The issuer does have to take care to prevent collisions between existing values so as not to wrongly issue two identical serial numbers.
Known attacks
Predictable serial numbers were used as a part of the counterfeit MD5 certificate attack.
An iPod repairman guessed valid serial numbers and used them to perpetrate a fraud against Apple.
See also
Denial of service
Hash collision
: Dutch and German passport numbers, which functions as part of biometric passport decryption keys, were made no longer sequential to increase the difficulty of wirelessly reading the passport holder's information without permission.
References
Computer security exploits
Serial numbers |
https://en.wikipedia.org/wiki/Olyra%20collettii | Olyra collettii is a species of longtail catfish. This species grows to in standard length. This species is possibly a junior synonym of Olyra longicaudata.
References
Bagridae
Fish of Asia
Fish described in 1881 |
https://en.wikipedia.org/wiki/Olyra%20longicaudata | Olyra longicaudata is a species of longtail catfish native to India where it occurs in Darjelling Himalaya in Assam, and Myanmar, where it occurs in Tenassarim. This species grows to a length of in standard length.
References
Bagridae
Fish of India
Fish of Myanmar
Taxa named by John McClelland (doctor)
Fish described in 1842 |
https://en.wikipedia.org/wiki/December%201900 | The following events occurred in December 1900:
December 1, 1900 (Saturday)
A census of the German Empire was taken. Data released on February 26, 1901, showed a population of 56,345,014 "of which number 27,731,067 were males". The growth rate of 7.70% in five years was the highest increase in 30 years.
The President of Switzerland resolved a boundary dispute between French Guiana and Brazil, awarding most of the territory to Brazil.
In Washington, D.C., the United States and Nicaragua signed a treaty, subject to approval, giving the U.S. exclusive rights to construct and operate the Nicaragua Canal (never built), and to use the San Juan River and Lake Managua, in return for five million dollars.
December 2, 1900 (Sunday)
2,200 Filipino rebels took an oath of allegiance to the United States at Vigan; they were the largest group to do so to that time.
John Hossack, a farmer near Indianola, Iowa, was killed with an axe while he slept in bed. His wife Margaret was charged with the murder and convicted on April 11, 1901, but the verdict was overturned and a second trial ended with a hung jury. Susan Glaspell, who covered the case for the Des Moines Daily News, later fictionalized it in her 1916 one-act play Trifles and a 1917 short story, "A Jury of Her Peers".
December 3, 1900 (Monday)
The U.S. Supreme Court released its decision in Chesapeake & Ohio Railway Company v. Kentucky. By an 8–1 margin, the Court upheld a state law requiring racial segregation even on interstate transportation. Since Kentucky's law provided that non-white passengers had to move to cars separate from white passengers after a train entered the state, the ruling effectively made separate cars a requirement on all trains.
The census was taken in Norway, at that time a part of a union with Sweden. Its population in 1900 was 2,221,477.
Oscar L. Booz, 21, a first-year cadet at the U.S. Military Academy, died from internal injuries sustained four days earlier during hazing. Booz refused to name his tormentors, and the public outcry over his death resulted in a U.S. Congressional investigation that ultimately led to the cadets pledging to discontinue the long-time practice of hazing of newly admitted cadets.
Born:
Ulrich Inderbinen, Swiss mountain guide; in Zermatt, canton of Valais (d. 2004)
Richard Kuhn, Austrian chemist, recipient of the Nobel Prize in Chemistry in 1938; in Vienna (d. 1967)
December 4, 1900 (Tuesday)
General Auguste Mercier, formerly Minister of War for France, warned the French Senate about "the possibility of war with Great Britain" and his strategy for an invasion, adding that "a landing in England is not beyond realization". Mercier suggested that his invasion plan "could be held over the head of England, like the sword of Damocles".
Born: John Axon, British train driver, celebrated in song for his heroism in a fatal 1957 accident; in Stockport, Cheshire (d. 1957)
December 5, 1900 (Wednesday)
Germany, Austria-Hungary and Italy signed a |
https://en.wikipedia.org/wiki/WBWP-LD | WBWP-LD (channel 19) is a low-power television station in West Palm Beach, Florida, United States, which primarily airs paid programming. The station is owned by SagamoreHill Broadcasting. WBWP-LD's transmitter is located on Old Dixie Highway in Lake Park, Florida.
History
The station was founded in 2000; however, it did not begin broadcasting until August 15, 2004.
Subchannels
The station's digital signal is multiplexed:
References
Television channels and stations established in 2000
2000 establishments in Florida
BWP-LD
Independent television stations in the United States
Catchy Comedy affiliates
Movies! affiliates
Heroes & Icons affiliates
BWP
SagamoreHill Broadcasting |
https://en.wikipedia.org/wiki/Amazonian%20red-sided%20opossum | The Amazonian red-sided opossum (Monodelphis glirina) is a South American opossum species of the family Didelphidae, formerly viewed as part of M. brevicaudata. It is found in Bolivia, Brazil and Peru, where it inhabits the Amazon rainforest. It is omnivorous, nocturnal, and primarily nonarboreal.
References
Opossums
Marsupials of South America
Fauna of the Amazon
Mammals of Brazil
Mammals of Peru
Mammals of Bolivia
Mammals described in 1842 |
https://en.wikipedia.org/wiki/Hooded%20red-sided%20opossum | The hooded red-sided opossum (Monodelphis palliolata) is a South American opossum species of the family Didelphidae. Until recently, it was viewed as a subspecies of M. brevicaudata. It is found in Colombia and Venezuela at altitudes from sea level to 2250 m. It is a primarily nonarboreal resident of tropical rainforest, but has also been seen in areas under cultivation.
References
Hooded red-sided opossum
Marsupials of South America
Mammals of Colombia
Mammals of Venezuela
Hooded red-sided opossum |
https://en.wikipedia.org/wiki/Pepsi%20Live | The Pepsi Chart (later known as Pepsi Live) was a music show on Network Ten that consisted of live performances both from Sydney, Australia and London, United Kingdom. Each show would end up with a look at the top 10 singles in Australia.
Originally it was hosted by Tory Mussett and afterwards Dylan Lewis took over presenting duties.
See also
List of Australian music television shows
Network 10 original programming
Australian music television series
2000 Australian television series debuts
2003 Australian television series endings |
https://en.wikipedia.org/wiki/KWIL | KWIL (790 AM, "KWIL For Christ") is a radio station licensed to serve Albany, Oregon, United States. The station is owned by Extra Mile Media, Inc.
Programming
KWIL broadcasts a religious radio format to the greater Corvallis, Oregon, area. KWIL programming includes Christian ministry, religious education, and Bible teaching programs.
History
KWIL began broadcasting January 14, 1941, with 250 watts of power on a frequency of . The station, the first licensed by the FCC to serve Albany, was owned and operated by the Central Willamette Broadcasting Company. In 1953, KWIL changed frequencies to and increased the power of its signal to 1,000 watts, albeit in a directional array with different daytime and nighttime coverage patterns.
KWIL was acquired by Larry Gordon's Albany Radio Corporation on July 1, 1957. Christian broadcaster Integrity Media acquired KWIL and KHPE, its FM sister station, in 1980. Integrity Media changed its name to Extra Mile Media, Inc., in 2005.
Previous logo
(KWIL's logo under previous "The Word" branding)
References
External links
FCC History Cards for KWIL
KWIL official website
Radio stations established in 1941
Albany, Oregon
1941 establishments in Oregon
WIL |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.