source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/252nd%20Cyberspace%20Operations%20Group | The 252nd Cyberspace Operations Group is a unit of the Washington Air National Guard at Joint Base Lewis-McChord, Tacoma, Washington. It is assigned to the 194th Wing. The 252nd has squadrons at Camp Murray and Joint Base Lewis-McChord, and has two geographically separated units at Fairchild Air Force Base.
Mission
The 252d Cyberspace Operations Group provides highly trained and qualified cyberspace and intelligence professionals to combatant commanders. They ensure squadrons are trained and evaluated in order to be mission-ready to support cyber, intelligence and expeditionary communications missions. They also provide oversight for cyberspace and intelligence operational forces in direct support of Air Combat Command, Air Force Space Command, the Air Force Intelligence, Surveillance, and Reconnaissance Agency and United States Cyber Command. The 252d Cyberspace Operations Group provides citizen airmen to support domestic cyber operations, cyber intelligence support to federal and state law enforcement agencies, and provides cyber mission planning and command element in support of combatant commanders for worldwide contingency operations.
History
The 252nd Communications Group was activated at Geiger Field in Spokane, Washington, on 1 April 1953. It was redesignated as the 252nd Communications Group (Mobile) in October 1960. In March 1962, the 252nd relocated from Geiger Field to the Four Lakes Communications Station, a former Nike missile site near Cheney, Washington. In June 1971, the 252nd closed operations at Four Lakes and moved to Paine Air National Guard Base in Everett, Washington.
Lineage
Established as the 252nd Communications Group on 1 April 1953
Redesignated 252nd Communications Group (Mobile) on 1 October 1960
Redesignated 252nd Mobile Communications Group on 16 March 1968
Redesignated 252nd Combat Communications Group on 1 April 1976
Redesignated 252nd Combat Information Systems Group on 1 July 1985
Redesignated 252nd Combat Communications Group on 1 October 1986
Redesignated 252nd Cyberspace Operations Group c. April 2015
Assignments
Washington Air National Guard, 1 April 1953
194th Regional Support Wing (later 194th Wing), 30 August 2006 – present
Gaining command
Air Force Communications Service (later Air Force Communications Command, Air Force Information Systems Command, Air Force Communications Command), 1968-1990
Tactical Air Command, 1953-1068, 1990-1992
Air Combat Command, 1992-2009
Air Force Space Command, 2009-2018
Air Combat Command, 2018-present
Components
Squadrons
143rd Communications Squadron (later 143rd Mobile Communications Squadron, 143rd Combat Communications Squadron, 143rd Combat Informations Systems Squadron, 143rd Combat Communications Squadron, 143rd Information Operations Squadron), 16 March 1968 – present
194th Intelligence Squadron
214th Communications Construction Squadron, 1 April 1953 – 1954
215th Communications Construction Squadron (later 215th Electronics Installation Squa |
https://en.wikipedia.org/wiki/Entry%20visibility | Entry visibility is an aspect of supply chain visibility, allowing a company to manage the proper use of trade compliance data for the importation of goods from the time they leave a foreign supplier until the time those goods reach their destination. Entry visibility aims to ensure that all regulatory, compliance, and documentation requirements are met in a timely fashion along the way. When importing into the U.S., every individual transaction must be compliant with The Customs Modernization Act (Mod Act), and the Importer Security Filing (10+2). Under the Mod Act, importers are required to maintain and produce timely records at the time of entry. Furthermore, the Mod Act includes a "Reasonable Care" clause, which states that importers and brokers need a comprehensive audit process to ensure they have met all compliance requirements and provided the correct information on all entry filings.
An entry is a declaration of information prepared by a customs broker on an entry form and submitted to customs. The information on an entry includes, but is not limited to, the following data elements:
Harmonized Schedule Number
Country of origin
Description of goods
Quantity
CIF (Cost, Insurance, and Freight) value of the goods
Estimated amount of duty paid
Upon inspection by a customs officer, if the entry is verified as correct or "perfect entry," the goods are released upon payment of duty to the importer. If an entry has incorrect information, customs may hold the shipment if the importer does not "reconcile" the entry.
Main types of entry include:
Consumption entry: for goods to be offered for sale (consumption) in the importing country
Formal entry: that is required to be covered by an entry bond because its aggregate value exceeds a certain amount
Informal entry: that is not required to be covered under an entry bond because its value is less than a certain amount
In-transit entry: for the movement of goods from the port of unloading to the port of destination under a Customs bond
Mail entry: for goods entering through post office or courier service and below a certain value
Personal baggage entry: for goods brought imported as personal baggage
Transportation and exportation entry: for goods passing through a country en route to another country
Warehouse entry: for the goods stored in a bonded warehouse.
Entry Visibility Solution
Due to time and cost restrictions most importers cannot audit all of their entries on a regular basis, and therefore they are potentially losing money due to classification errors, inaccurate quantities or missed Free Trade Agreement eligibility. With an entry visibility solution, importers are provided with a global view of all entries filed, helping to increase trade compliance and ensuring that all available savings are realized when importing goods. An automated solution identifies common entry errors such as incorrect tariff numbers, product description, and country of origin. With a solution in p |
https://en.wikipedia.org/wiki/Adventures%20in%20Preservation | Adventures in Preservation, formerly named Heritage Conservation Network, is a non-profit organization dedicated to safeguarding the world’s architectural heritage. Its programs give volunteers from all walks of life the opportunity to be involved in preservation in a variety of hands-on ways.
Overview
Adventures in Preservation (AiP) is a non-profit organization revolving around “Heritage Travel with Purpose”. AiP connects people and preservation through hands-on programs that safeguard cultural heritage and foster community sustainability. AiP travelers have the opportunity to travel, experience their destination, and learn hands-on skills from experts while assisting communities in a meaningful way.
AiP organizes a series of hands-on building conservation workshops and volunteer vacations. Working in locations around the world, participants support community-based preservation projects, such as restoring houses to create affordable housing. The workshops are meaningful opportunities to give back while learning about preservation in general, as well as specific building conservation techniques.
Each workshop is led by a technical expert, who teaches and guides volunteers as they work. Participation is open to all, from teens to active retirees. Since its founding in 2001, Adventures in Preservation has worked in a half-dozen countries, including Albania, Slovenia, Mexico, Italy, Ghana, and the United States. Many other projects are in development. Requests for assistance come directly from people involved at the grass-roots level, and projects are put onto a wait list.
Global impact and recognition
Numerous examples have shown that AiP’s volunteer efforts are a major catalyst for conservation. AiP volunteers have played a key role in restoration projects at the Francis Mill in Waynesville, North Carolina; the Weisel Bridge, Quakertown, Pennsylvania; Manor House in Oplotnica, Slovenia; the gardens of the Bartow-Pell Mansion Museum, The Bronx, New York; and adobe residences in Mesilla, New Mexico.
They have also been involved in restoration efforts at the Jean (Jacob) Hasbrouck House, New Paltz, New York; the Monastery of , , Vittorio Veneto, Italy; a shotgun house in Cairo, Illinois; the Chief’s House in Ablekuma, Ghana; and missions in Chihuahua, Mexico. AiP also organized crews of volunteers in New Orleans, Louisiana, and Bay St. Louis, Mississippi, to help clean up in the aftermath of Hurricane Katrina.
AiP volunteers restore more than buildings. They restore people's lives, their communities, and their pride in their heritage. The workshops also contribute variously to heritage tourism, economic development, and job training initiatives.
The organization and its volunteers have received awards for their efforts at Bartow-Pell Mansion Museum and their emergency stabilization work at the James Brown House and Farm Ooltehwah, Tennessee.
view current projects at http://adventuresinpreservation.org/upcoming-adventures/
Workshops
AiP |
https://en.wikipedia.org/wiki/High-frequency%20trading | High-frequency trading (HFT) is a type of algorithmic trading in finance characterized by high speeds, high turnover rates, and high order-to-trade ratios that leverages high-frequency financial data and electronic trading tools. While there is no single definition of HFT, among its key attributes are highly sophisticated algorithms, co-location, and very short-term investment horizons in trading securities. HFT uses proprietary trading strategies carried out by computers to move in and out of positions in seconds or fractions of a second.
In 2016, HFT on average initiated 10–40% of trading volume in equities, and 10–15% of volume in foreign exchange and commodities. High-frequency traders move in and out of short-term positions at high volumes and high speeds aiming to capture sometimes a fraction of a cent in profit on every trade. HFT firms do not consume significant amounts of capital, accumulate positions or hold their portfolios overnight. As a result, HFT has a potential Sharpe ratio (a measure of reward to risk) tens of times higher than traditional buy-and-hold strategies. High-frequency traders typically compete against other HFTs, rather than long-term investors. HFT firms make up the low margins with incredibly high volumes of trades, frequently numbering in the millions.
A substantial body of research argues that HFT and electronic trading pose new types of challenges to the financial system. Algorithmic and high-frequency traders were both found to have contributed to volatility in the Flash Crash of May 6, 2010, when high-frequency liquidity providers rapidly withdrew from the market. Several European countries have proposed curtailing or banning HFT due to concerns about volatility. Other complaints against HFT include the argument that some HFT firms scrape profits from investors when index funds rebalance their portfolios.
History
The rapid-fire computer-based HFT developed gradually since 1983 after NASDAQ introduced a purely electronic form of trading. At the turn of the 21st century, HFT trades had an execution time of several seconds, whereas by 2010 this had decreased to milli- and even microseconds. Until recently, high-frequency trading was a little-known topic outside the financial sector, with an article published by the New York Times in July 2009 being one of the first to bring the subject to the public's attention.
On September 2, 2013, Italy became the world's first country to introduce a tax specifically targeted at HFT, charging a levy of 0.02% on equity transactions lasting less than 0.5 seconds.
Market growth
In the early 2000s, high-frequency trading still accounted for fewer than 10% of equity orders, but this proportion was soon to begin rapid growth. According to data from the NYSE, trading volume grew by about 164% between 2005 and 2009 for which high-frequency trading might be accounted. As of the first quarter in 2009, total assets under management for hedge funds with high-frequency trading strat |
https://en.wikipedia.org/wiki/Milw0rm | Milw0rm is a group of hacktivists best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Mumbai, the primary nuclear research facility of India, on June 3, 1998. The group conducted hacks for political reasons, including the largest mass hack up to that time, inserting an anti-nuclear weapons agenda and peace message on its hacked websites. The group's logo featured the slogan "Putting the power back in the hands of the people."
The BARC attack generated heated debate on the security of information in a world prevalent with countries developing nuclear weapons and the information necessary to do so, the ethics of "hacker activists" or "hacktivists," and the importance of advanced security measures in a modern world filled with people willing and able to break into insecure international websites.
The exploit site milw0rm.com and str0ke are unaffiliated with the milw0rm hacker group.
Members
Little is known about the members of milw0rm, which is typical of hacking groups, which often conceal members' identities to avoid prosecution. The international hacking team "united only by the Internet" was composed of teenagers who went by the aliases of JF, Keystroke, ExtreemUK, savec0re, and VeNoMouS. VeNoMouS, 18, hailed from New Zealand, ExtreemUK and JF, 18, from England, Keystroke, 16, from the US and Savec0re, 17, from the Netherlands.
JF went on to achieve a modicum of notoriety when MTV "hacked" its own website intentionally and graffitied the words "JF Was Here" across the page, at the same time that JF was under investigation for the milw0rm attacks by Scotland Yard. Hundreds of pages hosted on MTV.com sported the new JF logo, including one page that read, "JF was here, greets to milw0rm". MTV later confirmed that the alleged JF "hack" was a publicity stunt to promote the appearance of a commentator named Johnny Fame at the 1998 MTV Video Music Awards. Many were puzzled by the apparent hack committed by JF since the hacker was "known for relatively high ethical standards."
VeNoMouS claimed that he learned to crack into systems from Ehud Tenenbaum, an Israeli hacker known as The Analyzer.
BARC attack
Four days before the incident, the five permanent members of the United Nations Security Council, the US, Russia, United Kingdom, France and China, denounced both India and Pakistan for unilaterally declaring themselves nuclear weapons states. The day before the attack, Jacques Gansler, US Undersecretary of Defense for acquisition and technology, warned a military conference that teenage hackers posed "a real threat" to national security.
On the night of June 3, 1998, from their workstations on three continents, the group used a US military .mil machine to break into the LAN, or local area network, of BARC and gained root access. The center's website, connected to the LAN, and their firewall were not secured enough to prevent the group from entering and gaining access to confidential emails and documents. The em |
https://en.wikipedia.org/wiki/Socialist%20Workers%20Network | The Socialist Workers Network (SWN) is an Irish Trotskyist organisation.
It was founded in 1971 as the Socialist Workers Movement (SWM), before becoming the Socialist Workers Party (SWP) in 1995. The SWP was a founding member of People Before Profit and was a member of the European United Left-Nordic Green Left and International Socialist Tendency.
In 2018, the SWP changed its name to Socialist Workers Network.
Foundation and growth
The SWP was founded in 1971 as the Socialist Workers Movement by supporters of the International Socialists of Britain (now called the SWP) living in Ireland, who had previously been members of People's Democracy, the Waterford Socialist Movement and the Young Socialists. Many of the members had been active in the new Socialist Labour Alliance. The SWM subsequently affiliated to the SLA, but soon left, claiming that the Alliance was organised to debate, rather than to campaign.
Some of those who joined the SWM after its formation sympathised with a small tendency in Britain and later split away to form the Irish Workers Group, which later became Workers Power. Meanwhile, the SWM grew on a modest scale and published a paper called The Worker.
In 1975, the SWM narrowly rejected a proposal to merge into the Irish Republican Socialist Party. SWM members helped to organise and publicise public meetings which were addressed by IRSP founder Seamus Costello. In 1976 prior to the establishment of the Socialist Labour Party, and the SWN affiliation to it, they were in negotiations with the Independent Socialist Party (Ireland) a schism from the IRSP about a merger.
When the Socialist Labour Party was founded in 1977, the SWM joined as a 'tendency' (or subgroup). The Socialist Workers Tendency was noted in the SLP for producing a bulletin more professional than that of the party. They left in 1980 to reform the Socialist Workers Movement.
The SWM was long overshadowed on the Irish left by organisations such as the Workers' Party, but the fall of the Berlin Wall and the Warsaw Pact regimes after 1989 saw it grow. Unlike some Irish socialist groups, the SWM supported the revolutions of 1989 against what it saw as state capitalist dictatorships, contending that regimes such as the Soviet Union were not socialist but a form of state capitalism, directed not by corporations but by a Stalinist bureaucracy using the state.
Growing from a small agitation group of about fifty members, the SWM now began to build groups in major colleges such as Trinity College and University College Dublin. Its traditional workplace bastion, Waterford Glass, has faded in strength but the SWP has developed some limited support in the Dublin Bus unions and the education branch of SIPTU. The party campaigned vigorously in referendums for abortion choice and for divorce.
The SWM changed its name to the Socialist Workers Party at its conference in 1995, after delegates from Dublin Bus argued that it should now take itself seriously on the left, as it |
https://en.wikipedia.org/wiki/2009%20DDoS%20attacks%20against%20South%20Korea | The July 2009 cyberattacks were a series of coordinated cyberattacks against major government, news media, and financial websites in South Korea and the United States. The attacks involved the activation of a botnet—a large number of hijacked computers—that maliciously accessed targeted websites with the intention of causing their servers to overload due to the influx of traffic, known as a DDoS attack. Most of the hijacked computers were located in South Korea. The estimated number of the hijacked computers varies widely; around 20,000 according to the South Korean National Intelligence Service, around 50,000 according to Symantec's Security Technology Response group, and more than 166,000 according to a Vietnamese computer security researcher who analyzed the log files of the two servers the attackers controlled. An investigation revealed that at least 39 websites were targets in the attacks based on files stored on compromised systems.
The targeting and timing of the attacks—which started the same day as a North Korean short-range ballistic missile test—have led to suggestions that they may be from North Korea, although these suggestions have not been substantiated. Researchers would later find links between these cyberattacks, the DarkSeoul attacks in 2013, and other attacks attributed to the Lazarus Group. This attack is considered by some to be the beginning of a series of DDoS attacks carried about by Lazarus dubbed "Operation Troy."
Timeline of attacks
First wave
The first wave of attacks occurred on July 4, 2009 (Independence Day holiday in the United States), targeting both the United States and South Korea. Among the websites affected were those of the White House, The Pentagon, the New York Stock Exchange, the Washington Post, the NASDAQ, and Amazon.
Second wave
The second wave of attacks occurred on July 7, 2009, affecting South Korea. Among the websites targeted were the presidential Blue House, the Ministry of Defense, the Ministry of Public Administration and Security, the National Intelligence Service and the National Assembly. Security researcher Chris Kubecka presented evidence multiple European Union and United Kingdom companies unwittingly helped attack South Korea due to a W32.Dozer infections, malware used in part of the attack. Some of the companies used in the attack were partially owned by several governments, further complicating attribution.
Third wave
A third wave of attacks began on July 9, 2009, targeting several websites in South Korea, including the country's National Intelligence Service as well as one of its largest banks and a major news agency. The U.S. State Department said on July 9 that its website also came under attack. State Department spokesman Ian Kelly said: "I'm just going to speak about our website, the state government website. There's not a high volume of attacks. But we're still concerned about it. They are continuing." U.S. Department of Homeland Security spokesperson Amy Kudwa said tha |
https://en.wikipedia.org/wiki/Half-precision%20floating-point%20format | In computing, half precision (sometimes called FP16 or float16) is a binary floating-point computer number format that occupies 16 bits (two bytes in modern computers) in computer memory. It is intended for storage of floating-point values in applications where higher precision is not essential, in particular image processing and neural networks.
Almost all modern uses follow the IEEE 754-2008 standard, where the 16-bit base-2 format is referred to as binary16, and the exponent uses 5 bits. This can express values in the range ±65,504, with the minimum value above 1 being 1 + 1/1024.
Depending on the computer, half-precision can be over an order of magnitude faster than double precision, e.g. 550 PFLOPS for half-precision vs 37 PFLOPS for double precision on one cloud provider.
History
Several earlier 16-bit floating point formats have existed including that of Hitachi's HD61810 DSP of 1982 (a 4-bit exponent and a 12-bit mantissa), Thomas J. Scott's WIF of 1991 (5 exponent bits, 10 mantissa bits) and the 3dfx Voodoo Graphics processor of 1995 (same as Hitachi).
ILM was searching for an image format that could handle a wide dynamic range, but without the hard drive and memory cost of single or double precision floating point. The hardware-accelerated programmable shading group led by John Airey at SGI (Silicon Graphics) invented the s10e5 data type in 1997 as part of the 'bali' design effort. This is described in a SIGGRAPH 2000 paper (see section 4.3) and further documented in US patent 7518615. It was popularized by its use in the open-source OpenEXR image format.
Nvidia and Microsoft defined the half datatype in the Cg language, released in early 2002, and implemented it in silicon in the GeForce FX, released in late 2002. Since then support for 16-bit floating point math in graphics cards has become very common.
The F16C extension in 2012 allows x86 processors to convert half-precision floats to and from single-precision floats with a machine instruction.
IEEE 754 half-precision binary floating-point format: binary16
The IEEE 754 standard specifies a binary16 as having the following format:
Sign bit: 1 bit
Exponent width: 5 bits
Significand precision: 11 bits (10 explicitly stored)
The format is laid out as follows:
The format is assumed to have an implicit lead bit with value 1 unless the exponent field is stored with all zeros. Thus, only 10 bits of the significand appear in the memory format but the total precision is 11 bits. In IEEE 754 parlance, there are 10 bits of significand, but there are 11 bits of significand precision (log10(211) ≈ 3.311 decimal digits, or 4 digits ± slightly less than 5 units in the last place).
Exponent encoding
The half-precision binary floating-point exponent is encoded using an offset-binary representation, with the zero offset being 15; also known as exponent bias in the IEEE 754 standard.
Emin = 000012 − 011112 = −14
Emax = 111102 − 011112 = 15
Exponent bias = 011112 = 15
Thus, as defin |
https://en.wikipedia.org/wiki/Quadruple-precision%20floating-point%20format | In computing, quadruple precision (or quad precision) is a binary floating-point–based computer number format that occupies 16 bytes (128 bits) with precision at least twice the 53-bit double precision.
This 128-bit quadruple precision is designed not only for applications requiring results in higher than double precision, but also, as a primary function, to allow the computation of double precision results more reliably and accurately by minimising overflow and round-off errors in intermediate calculations and scratch variables. William Kahan, primary architect of the original IEEE 754 floating-point standard noted, "For now the 10-byte Extended format is a tolerable compromise between the value of extra-precise arithmetic and the price of implementing it to run fast; very soon two more bytes of precision will become tolerable, and ultimately a 16-byte format ... That kind of gradual evolution towards wider precision was already in view when IEEE Standard 754 for Floating-Point Arithmetic was framed."
In IEEE 754-2008 the 128-bit base-2 format is officially referred to as binary128.
IEEE 754 quadruple-precision binary floating-point format: binary128
The IEEE 754 standard specifies a binary128 as having:
Sign bit: 1 bit
Exponent width: 15 bits
Significand precision: 113 bits (112 explicitly stored)
This gives from 33 to 36 significant decimal digits precision. If a decimal string with at most 33 significant digits is converted to the IEEE 754 quadruple-precision format, giving a normal number, and then converted back to a decimal string with the same number of digits, the final result should match the original string. If an IEEE 754 quadruple-precision number is converted to a decimal string with at least 36 significant digits, and then converted back to quadruple-precision representation, the final result must match the original number.
The format is written with an implicit lead bit with value 1 unless the exponent is stored with all zeros. Thus only 112 bits of the significand appear in the memory format, but the total precision is 113 bits (approximately 34 decimal digits: ). The bits are laid out as:
Exponent encoding
The quadruple-precision binary floating-point exponent is encoded using an offset binary representation, with the zero offset being 16383; this is also known as exponent bias in the IEEE 754 standard.
Emin = 000116 − 3FFF16 = −16382
Emax = 7FFE16 − 3FFF16 = 16383
Exponent bias = 3FFF16 = 16383
Thus, as defined by the offset binary representation, in order to get the true exponent, the offset of 16383 has to be subtracted from the stored exponent.
The stored exponents 000016 and 7FFF16 are interpreted specially.
The minimum strictly positive (subnormal) value is 2−16494 ≈ 10−4965 and has a precision of only one bit.
The minimum positive normal value is 2−16382 ≈ and has a precision of 113 bits, i.e. ±2−16494 as well. The maximum representable value is ≈ .
Quadruple precision examples
These examples are g |
https://en.wikipedia.org/wiki/Single-precision%20floating-point%20format | Single-precision floating-point format (sometimes called FP32 or float32) is a computer number format, usually occupying 32 bits in computer memory; it represents a wide dynamic range of numeric values by using a floating radix point.
A floating-point variable can represent a wider range of numbers than a fixed-point variable of the same bit width at the cost of precision. A signed 32-bit integer variable has a maximum value of 231 − 1 = 2,147,483,647, whereas an IEEE 754 32-bit base-2 floating-point variable has a maximum value of (2 − 2−23) × 2127 ≈ 3.4028235 × 1038. All integers with 7 or fewer decimal digits, and any 2n for a whole number −149 ≤ n ≤ 127, can be converted exactly into an IEEE 754 single-precision floating-point value.
In the IEEE 754-2008 standard, the 32-bit base-2 format is officially referred to as binary32; it was called single in IEEE 754-1985. IEEE 754 specifies additional floating-point types, such as 64-bit base-2 double precision and, more recently, base-10 representations.
One of the first programming languages to provide single- and double-precision floating-point data types was Fortran. Before the widespread adoption of IEEE 754-1985, the representation and properties of floating-point data types depended on the computer manufacturer and computer model, and upon decisions made by programming-language designers. E.g., GW-BASIC's single-precision data type was the 32-bit MBF floating-point format.
Single precision is termed REAL in Fortran, SINGLE-FLOAT in Common Lisp, float in C, C++, C#, Java, Float in Haskell and Swift, and Single in Object Pascal (Delphi), Visual Basic, and MATLAB. However, float in Python, Ruby, PHP, and OCaml and single in versions of Octave before 3.2 refer to double-precision numbers. In most implementations of PostScript, and some embedded systems, the only supported precision is single.
IEEE 754 standard: binary32
The IEEE 754 standard specifies a binary32 as having:
Sign bit: 1 bit
Exponent width: 8 bits
Significand precision: 24 bits (23 explicitly stored)
This gives from 6 to 9 significant decimal digits precision. If a decimal string with at most 6 significant digits is converted to the IEEE 754 single-precision format, giving a normal number, and then converted back to a decimal string with the same number of digits, the final result should match the original string. If an IEEE 754 single-precision number is converted to a decimal string with at least 9 significant digits, and then converted back to single-precision representation, the final result must match the original number.
The sign bit determines the sign of the number, which is the sign of the significand as well. The exponent is an 8-bit unsigned integer from 0 to 255, in biased form: an exponent value of 127 represents the actual zero. Exponents range from −126 to +127 because exponents of −127 (all 0s) and +128 (all 1s) are reserved for special numbers.
The true significand includes 23 fraction bits to the right o |
https://en.wikipedia.org/wiki/Steambot%20Chronicles%3A%20Battle%20Tournament | is an action-adventure game for the PlayStation Portable handheld that features a sandbox style of play. The game was developed by Irem Software Engineering in Japan and is published by Atlus in North America.
It is a spinoff of Steambot Chronicles, a 2005 PlayStation 2 title. A sequel to Steambot Chronicles, called Bumpy Trot 2, was announced and shown at the 2006 Tokyo Game Show, though it was officially cancelled in 2011. Blocks Club with Bumpy Trot is another spinoff title, originally released for the PlayStation 2 and later ported to the PlayStation Portable.
Reception
Battle Tournament received "mixed" reviews according to video game review aggregator Metacritic. In Japan, Famitsu gave it a score of all four sevens, for a total of 28 out of 40.
References
External links
Official website
2008 video games
Action-adventure games
Atlus games
Irem games
PlayStation Portable games
PlayStation Portable-only games
Video games developed in Japan
Video games with gender-selectable protagonists
Video games with cel-shaded animation
Multiplayer and single-player video games |
https://en.wikipedia.org/wiki/Tormented%20%282009%20Salvadorean%20film%29 | Tormented (Atormentada in Spanish) is a computer animated short film written and directed by Sergio Rosa. Produced by El Salvador-based Do Studio, it was projected in select theaters as part of the Film and TV Workshop by Escuela de Comunicaciones Mónica Herrera in November 2009. The short film is considered to be the first professional computer-animated ever produced in El Salvador, and part of the emerging salvadorean film industry.
Plot
The film opens with Mariana, a young lady in her early 20s. Mariana is coming home when her car breaks down, so she goes to a nearby to ask for help. A strange-looking lady opens the door and, not completely understanding what she is saying, lets her in. While they are inside, the woman acts completely cold and robotic, and asks Mariana to wait in a small living room till her husband arrives.
She waits there for a long time. The man finally arrives and while he is asking her about her problem they hear an argument between the woman and her daughter upstairs. He offers to go outside and see if they can find a solution for her problem, and when they are near the door he asks her to go ahead since he has to go get his tools first. As soon as Mariana grabs the door knob, she hears a strange noise, and the house starts to change. The lights go out, the walls burn down quickly and a lot of the furniture disappears. At the end, a big plank drops and hits Mariana in the face.
After she recovers, she tries to move the debris blocking the door but she cannot do it. She hears a little girl's laugh, and then that same voice asks her to go upstairs. Mariana has no choice but to go up, and as soon as she arrives she sees a figure running down the hall. Mariana follows it into a room, where she finds the woman, dressed in a big sleeping gown. Eliza, the little girl, comes from behind, and Mariana witnesses a small argument between the two. In that argument, it is hinted that the man is abusing the little girl, while the mother is willingly ignoring that situation. Both the woman and the little girl disappear, suggesting that they were in fact ghosts. A devilish-looking version of the little girl appears, and runs away while pushing Mariana to the side. Mariana again runs after her, going back downstairs. While she is downstairs she sees a light shining under one of the doors, and while she is checking it out the doorknob begins to shake. Then something starts hitting the door from the other side, so the scared Mariana runs away, hiding herself inside the kitchen.
In the kitchen, Mariana is trying to figure out a way to go out, since all exits are blocked. Suddenly, the man enters through the supposedly blocked back door. She asks him for help, and after a brief struggle he throws her onto the table and rapes her. The little girl appears and explains she wants her to go through the same pain her father would make her suffer. After that, the man throws Mariana to the floor and they both leave her there. The house falls ap |
https://en.wikipedia.org/wiki/Hooking%20%28disambiguation%29 | Hooking is a concept in computer programming dealing with control flow.
Hooking may also refer to:
Hooking (ice hockey), an ice hockey penalty
Hooking (sex trade), the act of engaging in sexual activity in exchange for money or goods
Rug hooking, a craft where rugs are made by pulling loops of yarn or fabric through a stiff woven base
See also
Bondage hook
Fish-hooking
Hook (disambiguation)
Hooked (disambiguation)
Hooker (disambiguation)
Hooks (disambiguation) |
https://en.wikipedia.org/wiki/Joseph%20Kitchin | Joseph Kitchin (1861–1932) was a British businessman and statistician. Analysing American and English interest rates and other data, Kitchin found evidence for a short business cycle of about 40 months. His publications led to other business cycle theories by later economists such as Nikolai Kondratieff, Simon Kuznets, and Joseph Schumpeter.
The Kitchin cycle is believed to be accounted for by time lags in information movements affecting the decision making of commercial firms. Firms react to the improvement of commercial situation through the increase in output through the full employment of the extent fixed capital assets. As a result, within a certain period of time (ranging between a few months and two years) the market gets ‘flooded’ with commodities whose quantity becomes gradually excessive. The demand declines, prices drop, the produced commodities get accumulated in inventories, which informs entrepreneurs of the necessity to reduce output.
However, this process takes some time. It takes some time for the information that the supply exceeds significantly the demand to get to the businessmen. Further, it takes entrepreneurs some time to check this information and to make the decision to reduce production, some time is also necessary to materialize this decision (these are the time lags that generate the Kitchin cycles). Another relevant time lag is the lag between the materialization of the above-mentioned decision (causing the capital assets to work well below the level of their full employment) and the decrease of the excessive amounts of commodities accumulated in inventories. Yet, after this decrease takes place one can observe the conditions for a new phase of growth of demand, prices, output, etc.
References
External links
1861 births
1932 deaths
English businesspeople |
https://en.wikipedia.org/wiki/Silk%20Stream | The Silk Stream is a brook just over long in the London Borough of Barnet. It is one of the major components of the Blue Ribbon Network.
The Silk Stream is a tributary of the River Brent, which it joins at Brent Reservoir. It has several tributaries including Burnt Oak Brook, Edgware Brook, the Edgwarebury Brook and Deans Brook. The Silk Stream runs north–south through Colindale and Hendon. It gives its name to Silkstream Road, near Burnt Oak station, and the Silk Bridge Retail Park beside where it passes under the A5.
Silk Stream and Burnt Oak Brook are a Site of Borough Importance for Nature Conservation, Grade II.
The name Silk is believed to derive from sulh or sulc, Old English words for plough or furrow.
See also
Nature reserves in Barnet
Further reading
References
Nature reserves in the London Borough of Barnet
Rivers of London
1Silk |
https://en.wikipedia.org/wiki/Lamentation%20%28Millennium%29 | "'Lamentation" is the eighteenth episode of the first season of the American crime-thriller television series Millennium. It premiered on the Fox network on April 18, 1997. The episode was written by series creator Chris Carter and directed by Winrich Kolbe. "Lamentation" featured guest appearances by Bill Smitrovich and Alex Diakun, and introduced Sarah-Jane Redmond as Lucy Butler.
Millennium Group consultant Frank Black (Lance Henriksen) searches for an escaped convict he had helped to catch, believing that the criminal's new wife Lucy Butler (Redmond) may be helping him. However, Butler may instead be a much greater threat to Black and his family than he had anticipated.
"Lamentation" marked the death of recurring character Bob Bletcher, played by Smitrovich. Smitrovich had appeared intermittently since "Pilot". The episode has been well-received critically, described as a "pivotal point" in the series. It was viewed by approximately 6.5 million households in its original broadcast.
Plot
Millennium Group consultant Frank Black (Lance Henriksen) and Seattle Police Department detective Bob Bletcher (Bill Smitrovich) are hiking across the North Cascades when Black receives an urgent page from the Federal Bureau of Investigation. Travelling to the Behavioral Sciences Unit, Black learns that serial killer Ephraim Fabricant (Alex Diakun) has escaped from a hospital while donating a kidney to his sister. Fabricant was arrested and convicted due to the profile constructed by Black; although he was spared execution when Black asked for leniency in order to allow Fabricant's mind to be studied.
Fellow Millennium Group member Peter Watts (Terry O'Quinn) informs Black that, before his escape, Fabricant had married a correspondent he met through a prison pen-pal service. Watts and Black interview the woman, Lucy Butler (Sarah-Jane Redmond), at her home. Butler is adamant she has not seen or heard from Fabricant since his escape. However, Black finds information on Butler's computer which he believes is linked to his own home address; and photographs of a judge who he recognizes as having been murdered.
Elsewhere, Fabricant is being operated on by a nurse whose face is hidden; she removes the staples from his surgical incision. Black and Watts return to Butler's home with a search warrant, having discovered that Butler's young son had been killed with cyanide, and she had been suspected of the murder; the judge had also been poisoned with the same substance.
Fabricant is found in a hospital emergency room, collapsing from his injuries. A doctor examines him and discovers his second kidney has been removed—without anaesthesia. Black's home telephone number is found on Fabricant's hospital bracelet. Back at Black's home, his wife Catherine (Megan Gallagher) finds a human kidney in her refrigerator. A strange man appears at the top of her staircase, and she runs to find her husband's gun, which is missing. Bletcher arrives, letting Catherine know that h |
https://en.wikipedia.org/wiki/Peer-to-peer%20web%20hosting | Peer-to-peer web hosting is using peer-to-peer networking to distribute access to webpages. This is differentiated from the client–server model which involves the distribution of web data between dedicated web servers and user-end client computers. Peer-to-peer web hosting may also take the form of P2P web caches and content delivery networks.
Comparison
See also
WebRTC - a web standard for peer-to-peer communication between web browsers
Freesite – a site on Freenet
Cloud computing
Decentralized computing
Notes
References
File sharing
Peer-to-peer computing
Web hosting |
https://en.wikipedia.org/wiki/SUCCESS%20Academy | SUCCESS Academy (Southern Utah Center for Computer, Engineering and Science Students) is an early college high school based in Cedar City, Utah, United States. SUCCESS Academy has three campuses, one located at Southern Utah University (SUU) in the Iron County School District, one at Utah Tech University in the Washington County School District.
History
The Southern Utah Center for Computer, Engineering and Science Students, commonly known as SUCCESS Academy, was founded in 2005. SUCCESS Academy is a charter school sponsored by the Iron County School District. SUCCESS Academy was selected by the Utah Partnership to participate in an Early College High School grant. The grant money was provided by the Bill and Melinda Gates Foundation.
SUCCESS Academy currently has two school locations. The first is located in Cedar City, Utah on the Southern Utah University campus. The second is in St. George on the Utah Tech University campus.
SUU SUCCESS Academy first opened their doors in August 2005. They were originally located in the SUU Science Building. They are currently located in the Multipurpose Building on SUU campus. SUU SUCCESS started with 9th and 10th grade students but is currently open to 9th-12th graders.
UT SUCCESS Academy opened in August 2006 and is currently open to 10th - 12th graders. They are currently located in the Technology building at UTU. UT SUCCESS Academy students may attend college classes besides within the Technology building in their 11th grade year with special permission. This is in addition to 12th grade on campus classes that the students may take. UT SUCCESS Academy students also participate in the SUU Regional Science fair and regularly sends students to the Intel International Science Fair (ISEF). Some of these students have gone one to be quite successful.
ACE Academy was a SUCCESS Academy school with a tech focus. This school is now joined with UT SUCCESS at the Technology Building, and there is a tech track offered at that location, as well as the standard classes UT SUCCESS offers.
Founding
The Utah Partnership was created under the direction of Governor Michael Leavitt. It was charged with the task to identify and create Early College High Schools. These were often referenced as High-Tech Highs. The founders of SUCCESS Academy are the Iron County School District, Southern Utah University and funding from the Bill and Melinda Gates Foundation.
Awards
SUCCESS Academy has been nationally recognized for several awards. Recent awards include being chosen by Newsweek as the top high school in America for Beating the Odds for college readiness, and for its students rising above financial obstacles and challenges. Another award is for SAGE test results. For the state of Utah, SUCCESS received the top Math scores in the state. In Language Arts, they received fourth place in the state. In 2019, SUCCESS Academy was named #2 Best School District in Utah, #2 Safest School District in Utah, and #4 for Utah School Dis |
https://en.wikipedia.org/wiki/Decimal32%20floating-point%20format | In computing, decimal32 is a decimal floating-point computer numbering format that occupies 4 bytes (32 bits) in computer memory.
It is intended for applications where it is necessary to emulate decimal rounding exactly, such as financial and tax computations. Like the binary16 format, it is intended for memory saving storage.
Decimal32 supports 7 decimal digits of significand and an exponent range of −95 to +96, i.e. to ±. (Equivalently, to .) Because the significand is not normalized (there is no implicit leading "1"), most values with less than 7 significant digits have multiple possible representations; , etc. Zero has 192 possible representations (384 when both signed zeros are included).
Decimal32 floating point is a relatively new decimal floating-point format, formally introduced in the 2008 version of IEEE 754 as well as with ISO/IEC/IEEE 60559:2011.
Representation of decimal32 values
IEEE 754 allows two alternative representation methods for decimal32 values.
The standard does not specify how to signify which representation is used,
for instance in a situation where decimal32 values are communicated between systems.
In one representation method, based on binary integer decimal (BID),
the significand is represented as binary coded positive integer.
The other, alternative, representation method is based on
densely packed decimal (DPD) for most of the
significand (except the most significant digit).
Both alternatives provide exactly the same range of representable numbers: 7 digits of significand and possible exponent values.
In both encodings, BID and DPD, the 2 most significant exponent bits, and the 4 most significant bits of the significand, are combined to 5 bits. The position of the 5 bits in the combination field varies, but otherwise the encoding is identical. 5 bits suffice instead of 6, because the 2 MSBs from the exponent only encode values from 0 to 2 (3 possible values), and the 4 MSBs of the significand represent a decimal digit between 0 and 9 (10 possible values). In total we have possible values when combined in one encoding, which is representable in 5 bits ().
For the BID encoding, the full binary significand is obtained by appending the bits from the trailing significand field to the significand's MSBs, as shown in the BID table above. The resulting significand is a positive binary integer of 24 bits, that has to be divided by 10 repeatedly, to obtain the individual decimal digits.
For the DPD encoding, the DPD table above shows how to obtain the significand's leading decimal digit from the significand's MSBs. To obtain the trailing significand decimal digits, the significant trailing field has to be decoded according to the DPD rules (see below). The full decimal significand is then obtained by concatenating the leading and trailing decimal digits.
For ±Infinity, besides the sign bit, all the remaining bits are ignored (i.e., both the exponent and significand fields have no effect).
For NaNs the sign b |
https://en.wikipedia.org/wiki/Decimal64%20floating-point%20format | In computing, decimal64 is a decimal floating-point computer numbering format that occupies 8 bytes (64 bits) in computer memory.
It is intended for applications where it is necessary to emulate decimal rounding exactly, such as financial and tax computations.
Decimal64 supports 16 decimal digits of significand and an exponent range of −383 to +384, i.e. to . (Equivalently, to .) In contrast, the corresponding binary format, which is the most commonly used type, has an approximate range of to . Because the significand is not normalized, most values with less than 16 significant digits have multiple possible representations; , etc. Zero has 768 possible representations (1536 if both signed zeros are included).
Decimal64 floating point is a relatively new decimal floating-point format, formally introduced in the 2008 version of IEEE 754 as well as with ISO/IEC/IEEE 60559:2011.
Representation of decimal64 values
IEEE 754 allows two alternative representation methods for decimal64 values. The standard does not specify how to signify which representation is used, for instance in a situation where decimal64 values are communicated between systems:
In the binary representation method, the 16-digit significand is represented as a binary coded positive integer, based on binary integer decimal (BID).
In the decimal representation method, the 16-digit significand is represented as a decimal coded positive integer, based on densely packed decimal (DPD) with 5 groups of 3 digits (except the most significant digit encoded specially) are each represented in declets (10-bit sequences). This is pretty efficient, because 210 = 1024, is only little more than needed to still contain all numbers from 0 to 999.
Both alternatives provide exactly the same range of representable numbers: 16 digits of significand and possible decimal exponent values. (All the possible decimal exponent values storable in a binary64 number are representable in decimal64, and most bits of the significand of a binary64 are stored keeping roughly the same number of decimal digits in the significand.)
In both cases, the most significant 4 bits of the significand (which actually only have 10 possible values) are combined with the most significant 2 bits of the exponent (3 possible values) to use 30 of the 32 possible values of a 5-bit field. The remaining combinations encode infinities and NaNs.
In the cases of Infinity and NaN, all other bits of the encoding are ignored. Thus, it is possible to initialize an array to Infinities or NaNs by filling it with a single byte value.
Binary integer significand field
This format uses a binary significand from 0 to
The encoding, completely stored on 64 bits, can represent binary significands up to but values larger than are illegal (and the standard requires implementations to treat them as 0, if encountered on input).
As described above, the encoding varies depending on whether the most significant of the significand are in the |
https://en.wikipedia.org/wiki/Decimal128%20floating-point%20format | decimal128 is a decimal floating-point computer number format that occupies 128 bits in computer memory. Formally introduced in IEEE 754-2008, it is intended for applications where it is necessary to emulate decimal rounding exactly, such as financial and tax computations.
decimal128 supports 34 decimal digits of significand and an exponent range of −6143 to +6144, i.e. to . Because the significand is not normalized, most values with less than 34 significant digits have multiple possible representations; , etc. Zero has 12288 possible representations (24576 including negative zero).
Representation of decimal128 values
IEEE 754 allows two alternative representation methods for decimal128 values. The standard does not specify how to signify which representation is used, for instance in a situation where decimal128 values are communicated between systems.
In one representation method, based on binary integer decimal (BID), the significand is represented as binary coded positive integer.
The other, alternative, representation method is based on densely packed decimal (DPD) for most of the significand (except the most significant digit).
Both alternatives provide exactly the same range of representable numbers: 34 digits of significand and possible exponent values.
In both cases, the most significant 4 bits of the significand (which actually only have 10 possible values) are combined with the most significant 2 bits of the exponent (3 possible values) to use 30 of the 32 possible values of 5 bits in the combination field. The remaining combinations encode infinities and NaNs.
In the case of Infinity and NaN, all other bits of the encoding are ignored. Thus, it is possible to initialize an array to Infinities or NaNs by filling it with a single byte value.
Binary integer significand field
This format uses a binary significand from 0 to = = 1ED09BEAD87C0378D8E63FFFFFFFF16 =
.
The encoding can represent binary significands up to = but values larger than are illegal (and the standard requires implementations to treat them as 0, if encountered on input).
As described above, the encoding varies depending on whether the most significant 4 bits of the significand are in the range 0 to 7 (00002 to 01112), or higher (10002 or 10012).
If the 2 bits after the sign bit are "00", "01", or "10", then the
exponent field consists of the 14 bits following the sign bit, and the
significand is the remaining 113 bits, with an implicit leading 0 bit:
s 00eeeeeeeeeeee (0)ttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt
s 01eeeeeeeeeeee (0)ttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt
s 10eeeeeeeeeeee (0)ttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt tttttttttt
This includes subnormal numbers where the leading signifi |
https://en.wikipedia.org/wiki/Interlis | INTERLIS is a standard for the modeling and integration of geodata into contemporary and future geographic information systems. The current version is INTERLIS version 2.3 (English), which is also listed as Swiss standard SN612031.
Overview
Unified, documented geodata provides many advantages, including:
standardized documentation
compatible data exchange
comprehensive integration of geodata e.g. from different data owners.
quality proofing
long term data storage
contract-proof security and the availability of the software
INTERLIS helps to fulfill the above-mentioned requirements. Consequently, the discussion of interfaces about fixed formats and open program interfaces (APIs) and interfaces leads to the question which type of geodata should be captured and maintained. INTERLIS is not only targeting the mass market of the casual geodata viewers but was specially designed as an answer to the needs of the users and producers (the doers) who are relying on explicitly described geodata structures. Additional properties of this language include being specially adapted to geographic information systems implementation, as well as considerable dedication to practicability and extensibility.
External links
GDAL Support to INTERLIS
INTERLIS home page
Geographic information systems |
https://en.wikipedia.org/wiki/Byrraju | Byrraju (Telugu: బైర్రాజు) is an Indian surname.
Byrraju Foundation, charitable organisation in India.
Byrraju Ramalinga Raju, former director of Satyam Computers.
Surnames of Indian origin |
https://en.wikipedia.org/wiki/Merritt%20Island%20Spaceflight%20Tracking%20and%20Data%20Network%20station | The Merritt Island Spaceflight Tracking and Data Network station, known in NASA parlance as MILA, was a radio communications and spacecraft tracking complex located on at the Kennedy Space Center (KSC) in Florida. The name MILA was an acronym for the "Merritt Island Launch Annex" to Cape Canaveral Air Force Station, which was how the site was referred to when spacecraft launches were primarily originating from the adjacent military installation. MILA's arrays of antennas provided various communications and data services between spacecraft and NASA centers, as well as tracked and ranged moving spacecraft. In its final years, it served as the primary voice and data link during the first 7½ minutes of Space Shuttle launches, and the final 13 minutes of shuttle landings at KSC. Though it occupied land at KSC, MILA was operated and managed by the Goddard Space Flight Center.
The station was decommissioned on July 28, 2011 following the end of the shuttle program. NASA eventually plans to build a new, state-of-the-art station, Kennedy Uplink Station, on the other side of the KSC Visitor Complex to support launches of a heavy-lift rocket planned for exploration missions.
History
The MILA tracking station was installed in 1966 as part of a worldwide network of 17 ground-based tracking stations to support the Apollo program. It was first used for a Saturn 1B test launch (AS-203) in July 1966. Training consoles were installed shortly thereafter to train engineers from the Johnson Space Center. During the 1970s, nearby tracking stations such as the Spacecraft Tracking and Data Acquisition Network station in Fort Myers, Florida, and the Deep Space Network Compatibility Station at Cape Canaveral were closed, and their facilities moved to MILA. MILA was upgraded in 1980 to allow interfacing with the Tracking and Data Relay Satellite System (TDRSS), the first satellite of which was launched in 1983.
PDL
In 1979, an adjunct tracking site was established north of MILA in New Smyrna Beach, Florida, on property owned by the US Coast Guard. This site was required to permit tracking of Space Shuttle launches from differing angles because the Solid Rocket Boosters (SRBs) used on the Shuttle vehicle produced large amounts of ammonium perchlorate in their exhaust plumes, which strongly attenuated the S-band signals transmitted to and from MILA. This adjunct site was designated the Ponce de León Inlet Tracking Annex (PDL), for the Ponce de León Inlet located nearby.
The PDL site handled the voice and data tracking functions during the time that MILA was blocked by the SRB exhaust plume, which occurred from one minute after launch until 2½ minutes after launch. PDL continued to track the shuttle during the times that MILA was the primary link. Microwave relay towers in Shiloh, Florida and Wilson, Florida linked the data from PDL back to MILA where it was compared to the MILA tracking data as a redundancy measure.
In 2011, support for shuttle landings from the Pon |
https://en.wikipedia.org/wiki/32nd%20Combat%20Communications%20Squadron | The 32d Combat Communications Squadron (32 CCS) was a United States Air Force combat communications squadron, located at Tinker AFB. They deploy quality communications-computer systems and air traffic services for military operations and emergency missions under hostile and base conditions anytime, anywhere.
Mission
Provide engineering team and expeditionary communications to support ADVON, initial reception of forces, and "reach forward" deployment of key personnel. Provide communications infrastructure to activate and robust two air expeditionary wings (AEW) with a maximum boots on ground of 3,000 persons each. Provide deployed base information infrastructure across the full spectrum of operations. Provide connectivity for base infrastructure and from base infrastructure to theatre information infrastructure. Provide power and environmental control where these services are not available from host or wing civil engineering. Provide theatre-level services including global broadcast system tactical receive suite, line of sight and intra-theatre information infrastructure. Provide air traffic control services to one AEW.
History
The 32nd Combat Communications Squadron was activated on 22 July 1988 under special order G-60 from Air Force Communications Command (AFCC). The 32nd Combat Communications Squadron has previously reported to the 552nd Air Control Wing stationed in Tinker Air Force Base, Oklahoma, the 602nd Air Control Wing stationed in Davis-Monthan Air Force Base in Tucson, Arizona, and the Tactical Communications Division headquartered at Langley Air Force Base, Virginia.
Assignments
Major Command
Air Combat Command (???- ???)
Wing/Group
3d Combat Communications Group (???-Present)
Previous designations
32d Combat Communications Squadron (???-Present)
Bases stationed
Tinker AFB, Oklahoma (???-Present)
Commanders
1988–1990 Major Alan Stemen
Decorations
Air Force Outstanding Unit Award
See also
3d Combat Communications Squadron
References
External links
Tinker AFB, Oklahoma
U.S. Air Force to Shut Down Award Winning Communications Unit at Tinker AFB news article
Combat Communications 0032
032 |
https://en.wikipedia.org/wiki/Project%20Runway%20%28season%206%29 | Project Runway Season 6, premiered on Lifetime on August 20, 2009, the first season to be aired on that network. The production of this season started in September 2008 and finished the pre-finale filming on October 17, 2008. It is the only season of Project Runway filmed at the Fashion Institute of Design and Merchandising in Los Angeles.
Returning as judges are supermodel Heidi Klum, fashion designer Michael Kors, and Marie Claire fashion director Nina Garcia. Tim Gunn returned as a mentor to the aspiring designers. This is the second season which consisted of all female finalists.
The winner of this season of Project Runway, Irina Shabayeva, received an editorial feature in an issue of Marie Claire magazine, a cash prize of $100,000 to start her own line, and an all-expenses-paid trip for two to Paris. Furthermore, the winning model of this season, Kalyn Hemphill, received a $25,000 cash prize from L’Oreal and took part in the winning designer's fashion spread in Marie Claire.
The premiere was preceded by a two-hour special episode of Project Runway: All-Star Challenge where eight past contestants (Daniel Vosovic, Santino Rice, Jeffrey Sebelia, Uli Herzner, Mychael Knight, Chris March, Sweet P, and Korto Momolu) competed in one challenge with a cash prize of $100,000. Vosovic won the challenge, while Momolu came in second place, Sweet P in third, and March in fourth.
In 2010, eight of the contestants in this season would appear in the video game adaptation of the series, which was released shortly after the season ended.
In 2012, Gordana Gehlhausen competed on Project Runway: All Stars where she finished 11th of 13.
Also in 2012, Althea Harper competed on Project Runway All Stars (season 2) placing 8th of 13.
In 2013, Irina Shabayeva competed in Project Runway All Stars (season 3), placing 6th of 11.
In 2019, Irina Shabayeva returned for a third time to compete on Project Runway All Stars (season 7) against worldwide Project Runway winners. Irina placed 3rd.
Contestants
Models
Challenges
: Heidi Klum cited Nicolas as "very lucky" repeatedly, stating had he not had immunity from the last challenge, he could have also been out.
: Tim Gunn announced that this would be the last challenge awarding immunity to the winner. Immunity will no longer be granted from episode 9 and onward until the competition ends.
: Logan made it farther than anyone else in the history of the competition without ever having a "HIGH" score.
: This is the first and only season where none of the finalists ever receives a "LOW" score
The designer won Project Runway Season 6.
The designer was advanced to Fashion Week.
The designer won the challenge
The designer came in second but did not win the challenge.
The designer had one of the highest scores for that challenge, but did not win.
The designer had one of the lowest scores for that challenge, but was not eliminated.
The designer was in the bottom two, but was not eliminated.
The designer lost and |
https://en.wikipedia.org/wiki/33rd%20Combat%20Communications%20Squadron | The 33d Combat Communications Squadron (33 CCS) was a United States Air Force combat communications squadron, located at Tinker AFB. They deployed quality communications-computer systems and air traffic services for military operations and emergency missions under hostile and base conditions anytime, anywhere. The 33d CCS was inactivated as part of the overall inactivation of the 3 CCG (Combat Communications Group) in May 2012. In January 2013 the 33d was unofficially merged with the 31st CCS as part of the inactivation proceedings. The unit is expecting to be completely inactivated no later than October 2013.
Mission
Provide engineering team and expeditionary communications to support advance, the initial reception of forces, and "reach forward" key personnel deployment. Provide communications infrastructure to activate and robust two air expeditionary wings (AEW) with maximum boots on the ground of 3,000 persons each. Provide deployed base information infrastructure across the full spectrum of operations. Provide connectivity for base infrastructure and from base infrastructure to theatre information infrastructure. Provide power and environmental control where these services are not available from host or wing civil engineering. Provide theatre-level services, including global broadcast system tactical receive suite, line of sight, and intra-theatre information infrastructure. Provide air traffic control services to one AEW.
History
The 33d has been a part of the 3d Combat Communications Group since its re-inception as a unit in 1988. The 33d has deployed in support of missions throughout both conflicts in the Mid East, including direct support of operations Iraqi Freedom and New Dawn. The 33d has provided reliable deployable communications and tactical airfield and air traffic control support for more than two decades.
In May 2012, the 33d and all of its sister squadrons and command group slated for inactivation in the fiscal year 2013.
Assignments
Major Command
Tactical Air Command/Air Combat Command (1990–2009)
Air Force Space Command (2009–2013)
Wing/Group
3d Combat Communications Group (1988–2013)
Previous designations
None
Bases stationed
Tinker AFB, Oklahoma (1988–2013)
Commanders
Maj Roy "Chip" Brown July (1988–1989)
Capt John Haven (1989–1992)
Lt Col James Cresta (1992–1994)
Lt Col Frank K. Brooks
Lt Col Kurt Klausner
Lt Col Beau Buder (1997–1998)
Lt Col Edward Keegan July (1998–2000)
Lt Col Mark Langenderfer
Lt Col Amy Dayton
Lt Col Paula Gregory July (2004–2006)
Maj. Terrence Adams (2006–2008)
Maj. Jennifer Hlavaty July (2008– )
Lt. Col Yashua Gustafson (2010–2012)
Capt. Matthew W. Meckes (2012–2013)
Decorations
Campaign Streamers. Southwest Asia: Defense of Saudi Arabia; Liberation and Defense of Kuwait.
Air Force Outstanding Unit Awards: 1 May 1990 – 30 Apr 1992; 1 Apr 1992 – 31 Mar 1994; 1 Apr – 31 Dec 1994; 1 Jan 1995 – 31 May 1996; 1 Jun 1996 – 31 May 1997; 1 Jun 1999 – 31 May |
https://en.wikipedia.org/wiki/Agri%20Broadcast%20Network | The Ohio Ag Net is a radio news network in the U.S. state of Ohio. Ohio Ag Net programming is heard on more than 70 radio stations statewide, including the major markets of Canton, Toledo, and Columbus. It is the direct successor to the original Agri Broadcasting Network (ABN.)
History
The Agri Broadcasting Network (ABN) was founded in 1972 by the late Ed Johnson, President of Agri Communicators Inc., which included the Agri Broadcasting Network (ABN Radio), Ohio's Country Journal, a monthly farm newspaper, and the television program AgriCountry. Johnson, a well-known farm broadcaster formerly of WRFD in Columbus, Ohio, launched the network with a small number of radio stations, and delivered programming over the telephone from his farm in Ostrander, Ohio. His unmistakable enthusiasm, passion for agriculture, and unique broadcast style won a faithful following, and the network grew. The network, by the late 1970s finally leased a land line loop to affiliates which also fed programming from the Ohio News Network and Sports Ohio Network (later ONN Sports). By the mid-1980s, the ABN became a satellite operation.
Adding the television program to his efforts in 1982, Johnson's fame grew from that of a well-respected agricultural journalist to a household name in Ohio. In 1992, he launched the magazine Ohio's Country Journal. The size and scope of the ABN Radio network also grew, expanding to a footprint exceeding 72 radio stations in Ohio, Indiana, and West Virginia.
Following Johnson's death in 2001, the Johnson family sold the ABN to Clear Channel Communications, who moved network operations from Columbus and merged the network and programming into its Lima, Ohio cluster. In early 2007, Advance Broadcast & Communication Ltd, parent company of the Buckeye Ag Radio Network (aka: "the BARN") acquired the ABN, reintroduced Johnson's well-known preference for broadcasting "from the farm," and in early 2009, returned broadcast operations to Columbus.
In December 2010, Advance Broadcast and Communications ceased operations as mentioned on its website (now defunct and now redirects to AndyVance.com).
Lindsay Hill, associate farm director and co-founder of Buckeye Ag Radio Network "The Barn" (and wife of Vance) died in a two vehicle accident at the intersection of Ohio State Routes 235 and 41, just north of New Carlisle and west of North Hampton near Springfield, Ohio on Thursday morning May 19, 2011, while she was a new employee for AgDay, a television program produced by Farm Journal Magazine. Hill began her career as an ABN intern under Johnson's mentoring. Husband Andy Vance began his career at WRFD where Johnson started his.
Following the sale of ABN to Clear Channel, the Johnson family maintained the Country Journal, but Johnson's weekend television program, AgriCountry, which aired on 11 television stations across Ohio, was cancelled. The program aired over 1,000 episodes over its twenty-year run. The Johnson family business, Agri Commu |
https://en.wikipedia.org/wiki/2004%E2%80%9305%20Canadian%20network%20television%20schedule | The 2004–05 Canadian network television schedule indicates the fall prime time schedules for Canada's major English broadcast networks. For schedule changes after the fall launch, please consult each network's individual article.
Note: No NHL hockey aired on CBC for the whole television season because of the 2004–05 NHL lockout.
2004 official fall schedule
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Top weekly ratings
Note: English Canadian television only by viewers age 2 and up
Data sources: BBM Canada official website
References
External links
BBM Canada Top Weekly Television Ratings
2004 in Canadian television
2005 in Canadian television
Canadian television schedules |
https://en.wikipedia.org/wiki/Achron | Achron is a real-time strategy computer game. It is considered to be the first "meta-time strategy game" (Real-time strategy with time travel), notable for being the first game with free-form multiplayer time travel and its themes of concepts like the grandfather paradox. Achron was released on August 29, 2011.
Plot
Hundreds of years in the future, humans have begun colonizing other worlds, however they have been reliant on conventional propulsion systems that may take hundreds of years to reach their destination. This all changed when alien ruins were discovered in the Remnant system. Technology present in the ruins led to the development of instantaneous teleportation. Within a few decades, all colonies were linked by a network of gates, and new colonies could be constructed in significantly less time. However, humans never came across another intelligent race, until communications with a border colony suddenly stopped. Several other colonies followed, and an enormous alien fleet was found laying waste to one of the colonies. A huge fleet was called to the Remnant system to meet the invaders; however, they were outthought and outmaneuvered at every turn, despite the invader's inferior firepower. As discipline broke down, the data feed from the Remnant gate went dark. Being trapped on the other side of the gate and as one of the survivors, they must piece together what happened and unravel the mysteries of the alien invasion and the Remnant system itself.
Gameplay
The main aspect in Achron is the use of "chronoporters" that allow the equipment or troops to be transported to certain instances of time. Players can simultaneously play in the past, present, or future. Only a certain distance can be traveled in the past. After a while, the time-waves will occur, bringing along every change from the past into the present. Because the changes aren't instant, that gives the players a chance to react to the opponents' moves before they become irrevocable and directly linked to the present.
For instance, if the player is attacked at an unexpected spot, they can travel to the past and move their army towards the spot where they now know the attack will occur. Or if the player waged a battle which ended in defeat, they can jump to the past and prevent the battle from ever happening. That said, the opponent may alter the course of events as well in order to counter any changes in history the player made. Entire battles may take place in the speculative future as well, and players may take a look into the future to know what the results of their actions will be. Any opponent's unit can be "infected" with nanites, which allows the player to take control over it and see from its line of sight.
Additionally, apart from the player being able to view and command his forces in the past and the future, individual units may travel through time as well, with a process called "chronoporting". When it takes place, the player must be cautious to avoid "chronofraggin |
https://en.wikipedia.org/wiki/DD%20Bangla | DD Bangla is an Indian Bengali-language free-to-air state-owned television channel owned by state-owned broadcaster Doordarshan Network, Launched on 9 August 1975. It broadcasts from Kolkata, Shantiniketan and Jalpaiguri. The channel's programming consists of soap operas, infotainment series, news and current affairs, social programs and films in Bengali. Indian Super League (ISL) Season 10 is being broadcast on DD Bangla with Bangla commentary.
Programs broadcast by the channel include Bibaho Obhijan, Rongo Tamaasha, Eto sur ar eto gaan, Madhyamik classes among others.
See also
DD Direct Plus
List of programs broadcast by DD National
All India Radio
List of South Asian television channels by country
References
External links
Doordarshan Official Internet site
Doordarshan news site
An article at PFC
Bengali-language television channels in India
Foreign television channels broadcasting in the United Kingdom
Television stations in Kolkata
Television channels and stations established in 1975
Direct broadcast satellite services
Indian direct broadcast satellite services
Doordarshan
1975 establishments in West Bengal |
https://en.wikipedia.org/wiki/DD%20Sports | DD Sports is an Indian state-owned sports television channel telecasting from Central Production Centre in Delhi, India. It is a part of the Doordarshan family of networks, and is the main public sports broadcaster in India.
History
DD Sports was launched on 18 March 1998. In the beginning, it broadcast sports programmes for six hours a day, which was increased to 12 hours in 1999. From 1 June 2000, DD Sports became a "round-the-clock" satellite channel. It was an encrypted pay channel between 2000 and 2003, and on 15 July 2003, it became the only free-to-air sports channel in the country.
Besides showing live sporting events like cricket, football, and tennis, DD Sports showcases Indian sports including kabaddi and kho-kho. In addition to international sporting events, important national tournaments of hockey, football, athletics, cricket, swimming, tennis, badminton, archery, and wrestling are also telecast. The DD Sports channel also telecasts news-based programmes, sports quizzes, and personality-oriented shows.
DD Sports telecast all Test, ODI & Twenty20 International cricket matches played by India Men and women Cricket Team and this Live telecast "only" available on DD Free Dish DTH and on DD Terrestrial network, this live feed is not available on private dth and cable operator lines
See also
ATN DD Sports
List of programs broadcast by DD National
All India Radio
Ministry of Information and Broadcasting
DD Free Dish
List of South Asian television channels by country
References
External links
Article at PFC
Foreign television channels broadcasting in the United Kingdom
Television channels and stations established in 1998
Direct broadcast satellite services
Television stations in New Delhi
Indian direct broadcast satellite services
Sports television networks in India
Doordarshan |
https://en.wikipedia.org/wiki/Collaborative%20network | A collaborative network is a network consisting of a variety of entities (e.g. organizations and people) that are largely autonomous, geographically distributed, and heterogeneous in terms of their operating environment, culture, social capital and goals, but that collaborate to better achieve common or compatible goals, and whose interactions are supported by computer networks. The discipline of collaborative networks focuses on the structure, behavior, and evolving dynamics of networks of autonomous entities that collaborate to better achieve common or compatible goals.
There are several manifestations of collaborative networks, e.g.:
Virtual enterprise (VE)
Virtual Organization (VO)
Dynamic Virtual Organization
Extended Enterprise
VO Breeding environment (VBE)
Professional virtual community (PVC)
Business Ecosystem
Virtual manufacturing network
Decentralized Autonomous Organization (DAO)
Applications
Elements
The seven essential elements of collaborative networks:
Search: Allowing users to search for experts, data or content
Employee Driven: Approved users can add and share content in wiki fashion with low barriers to authorship
Data integration: Must allow enterprise data to be integrated into the system
Dashboards and Monitoring: Measure success, adoption, projects through dashboards and monitoring tools
User Follow: Ability to follow users and their content in the collaborative network
Content integration: Connects and links content dynamically
Governance: Controlled access to content and data
Reference models
A reference model for collaborative networks is a fundamental instrument for the smooth development of the area. An example of reference model is ARCON (A Reference model for COllaborative Networks).
An annual conference focused on Collaborative Networks is the Working Conference on Virtual Enterprises ('PRO-VE'). sponsored by the International Federation for Information Processing (IFIP) and Society of Collaborative Networks (SOCOLNET).
Challenges
If collaborative networks evolve and become increasingly popular with corporations and their extended networks, governance and security issues will need to be addressed. Of particular relevance is the study of behavioral aspects and reference models for collaborative networks.
See also
- - -
-
Notes
External links
"KarmeUp - Free Collaborative Network"
"The Future of Collaborative Networks" by Aaron Roe Fulkerson
"How Collaborative Networks will Replace Social Networks" by Mark Fidelman
"Collaborative Enterprise Network" by D. Corkill
"New Collaborative Networks more than Just a Wiki" Read Write Web
Social networks |
https://en.wikipedia.org/wiki/Skcin%20computer%20tan%20hoax | Computer tan hoax refers to a trick website set up by skin cancer charity Skcin in 2009 to spread awareness about skin cancer through the Internet. The fake company was promoted by leaflets, street marketing and online ads, which directed users to the website where they were directed to download software.
History
Launched on 3 February 2009, and originally planned to run for seven days, the site received more than 30,000 hits in the first 24 hours and over 1 million hits in the first two months. The premise of the hoax is that software downloaded from the website recalibrates the user's computer monitor or mobile phone to produce ultraviolet rays, after promising to give the user a skin analysis. Described as a "revolutionary new online tanning service" that promises an all-year tan, upon activating the "five-minute free tan trial", bars from a sunbed flash on the screen followed by the message "Don't be fooled, UV exposure can kill", and then by images depicting the victims of sun damage.
The advertisement was shown on 75 screens in 11 stations on the London Underground, where it was projected to be seen by up to 1.7 million commuters. It was also seeded online, where several bloggers joined in on the hoax. In response to the number of hits received by the website, a spokesperson for the charity described it as "an astonishing response [which] has undoubtedly helped raise awareness of the dangers of skin cancer".
Skcin was set up in memory of Karen Clifford, a resident of Nottingham, England, who died of skin cancer in 2005.
References
External links
Skcin (The Karen Clifford Skin Cancer Charity) - Official site
Internet hoaxes
2009 in England
Educational charities based in the United Kingdom
Health charities in the United Kingdom
Cancer awareness
Sun tanning
2009 hoaxes
Hoaxes in the United Kingdom |
https://en.wikipedia.org/wiki/Condictio | In Roman Civil Law, a Condictio (plural condictiones) referred to an "action" or "summons"; hence, compounds in legal Latin refer to various types of actions:
condictio causa data causa non secuta
condictio cautionis
condictio certae pecuniae
condictio certae rei
condictio certi
condictio ex causa furtiva
condictio ex injusta causa
condictio ex lege
condictio ex paenitentia
condictio furtiva
condictio incerti
condictio indebiti
condictio liberationis
condictio ob causam datorum
condictio ob injustam causam
condictio ob rem dati
condictio ob turpem causam
condictio possessionis
condictio sine causa
condictio triticaria
See also
Unjust enrichment
References
Roman law |
https://en.wikipedia.org/wiki/Antisec%20Movement | The Anti Security Movement (also written as antisec and anti-sec) is a movement opposed to the computer security industry. Antisec is against full disclosure of information relating to software vulnerabilities, exploits, exploitation techniques, hacking tools, attacking public outlets and distribution points of that information. The general thought behind this is that the computer security industry uses full disclosure to profit and develop scare-tactics to convince people into buying their firewalls, anti-virus software and auditing services.
Movement followers have identified as targets of their cause:
websites such as SecurityFocus, SecuriTeam, Packet Storm, and milw0rm,
mailing lists like "full-disclosure", "vuln-dev", "vendor-sec" and Bugtraq, and
public forums and IRC channels.
In 2009, attacks against security communities such as Astalavista and milw0rm, and the popular image-host ImageShack, have given the movement worldwide media attention.
History
The start of most public attacks in the name of the anti-security movement started around 1999. The "anti-security movement" as it is understood today was coined by the following document which was initially an index on the anti.security.is website.
~el8
~el8 was one of the first anti-security hacktivist groups. The group waged war on the security industry with their popular assault known as "pr0j3kt m4yh3m". pr0j3kt m4yh3m was announced in the second issue of ~el8. The idea of the project was to eliminate all public outlets of security news and exploits. Some of ~el8's more notable targets included Theo de Raadt, K2, Mixter, Ryan Russel (Blue Boar), Gotfault (also known as INSANITY), Chris McNab (so1o), jobe, , pm, aempirei, , lcamtuf, and OpenBSD's CVS repository.
The group published four electronic zines which are available on textfiles.com.
pHC
pHC is an acronym for "Phrack High Council". This group also waged war against the security industry and continued to update their website with news, missions, and hack logs.
Less recent history
Most of the original groups such as ~el8 have grown tired of the anti-security movement and left the scene. New groups started to emerge.
dikline
kept a website which had an index of websites and people attacked by the group or submitted to them. Some of the more notable targets were rave, rosiello, unl0ck, nocturnal, r0t0r, silent, gotfault, and skew/tal0n.
More recent history
giest
In August 2008, mails were sent through the full-disclosure mailing list from a person/group known as "giest".
Other targets include mwcollect.org in which the group released a tar.gz containing listens of their honeypot networks.
ZF0
ZF0 (Zer0 For Owned) performed numerous attacks in the name of pr0j3kt m4yh3m in 2009. They took targets such as Critical Security, Comodo and various others. They published 5 ezines in total. July 2009, Kevin Mitnick's website was targeted by ZF0, displaying gay pornography with the text "all a board the mantrain."
AntiSec Gro |
https://en.wikipedia.org/wiki/Democrats%20in%20Network | Democrats in Network (Democratici in Rete, DiR) were a social-democratic faction within the Democratic Party (PD), a political party in Italy.
After the departure of Veltroni from party leadership in February 2009, Veltroniani talked about organizing their faction, but finally there was a split between the staunch supporters of the new leader Dario Franceschini and those who soon started to criticize him. The latter, led by Goffredo Bettini and Michele Meta, who were mainly social democrats coming from the Italian Communist Party launched Democrats in Network.
In the 2009 Democratic Party leadership election the faction supported Ignazio Marino, whose campaign was coordinated by Meta, differently from Veltroni himself and most Veltroniani who supported Dario Franceschini. Some time after the election, the faction was disbanded. By 2011 Meta and others joined Change Italy, a new association led by Marino, while Bettini launched Beyond the Parties and became very close to Nicola Zingaretti instead.
References
External links
Official website
Democratic Party (Italy) factions |
https://en.wikipedia.org/wiki/Goldsworthy%20railway | The Goldsworthy railway, owned and operated by BHP, is a private rail network in the Pilbara region of Western Australia built to carry iron ore. It is one of two railway lines BHP operates in the Pilbara, the other being the Mount Newman railway.
In addition to the BHP network, there are three more independent iron ore rail lines in the Pilbara. One is operated by Rio Tinto, the Hamersley & Robe River railway, the Fortescue Metals Group operates the Fortescue railway and Hancock Prospecting the Roy Hill railway.
History
In May 1966, the 112 kilometre Goldsworthy railway opened to transport iron ore from Mount Goldsworthy mine to the port on Finucane Island. The line was extended to Shay Gap in 1972 and Yarrie mine in 1993.
On 1 March 1991, the Goldsworthy Mining and Mount Newman Mining were amalgamated under the BHP Iron Ore brand.
In June 2004, the National Competition Council of Australia received an application from the Fortescue Metals Group (FMG) to use part of the Mount Newman railway and also part of the Goldsworthy railway.
In June 2010, the Australian Competition Tribunal ruled that FMG be granted access to Rio Tinto's Robe River line and BHP Billiton's Goldsworthy line but not to the busier Hamersley and Mount Newman lines. Treasurer Wayne Swan suggested that several advantages would accrue from access to the rail lines by third parties. It would increase competition, reduce duplication of infrastructure, and reduce environmental damage.
Access to the rail networks by third parties is governed by the State Agreements Act.
Operation
The Goldsworthy railway is long, connecting the Yarrie mine to Finucane Island, near Port Hedland.
Unlike Mount Newman line trains, with up to 208 wagons per train, Goldsworthy line trains only have 90 wagons per train. Each wagon carries up to of ore.
Rolling stock
In December 1965, Mount Goldsworthy Mining Co took delivery of two English Electric, Rocklea locomotives (no 1 & 2) to the same design as the Western Australian Government Railways H class. Initially used on construction trains, they were later used on general freight trains and shunting duties. One was written off in an accident in 1968 with some parts incorporated into a new frame built by English Electric in 1970.
In 1966, the first of six English Electric, Rocklea built locomotives (no 3 to 8) to the same design as the Western Australian Government Railways K class. After one was damaged in 1968, a K class was purchased from the Western Australian Government Railways followed by another in July 1986. In November 1992 all were transferred to BHP's Port Kembla operation. By this stage, the infrastructure had been upgraded to allow GE Transportation 36-7 locomotives to take over the line.
In 1990, Clyde Engineering built GML10 was purchased. It was sold to Comalco in August 1994.
In March 2012, BHP Billiton placed an order for 80 Electro-Motive Diesel SD70ACe/LCi locomotives for use on its Western Australia mining railroads.
Refe |
https://en.wikipedia.org/wiki/WHDO-CD | WHDO-CD (channel 38) is a low-power, Class A television station in Orlando, Florida, United States, affiliated with the Spanish-language network Mega TV. The station is owned by Western Pacific Broadcast, LLC. Its transmitter is located near the SR-417 and Florida's Turnpike intersection, along with WATV-LD and WURF's FM translator W279DI. It previously broadcast programming from Tuff TV until that network ceased operations on August 26, 2018.
HDO-CD
HDO |
https://en.wikipedia.org/wiki/Computers%20in%20Biology%20and%20Medicine | Computers in Biology and Medicine is a monthly peer-reviewed scientific journal established in 1970. It covers the intersection of biomedical engineering, computational biology, bioinformatics, and computer science. The journal publishes research articles, reviews, tutorials, editorials, and letters. According to the Journal Citation Reports, the journal has a 2022 impact factor of 7.7.
References
External links
Academic journals established in 1970
Elsevier academic journals
Bioinformatics and computational biology journals
Monthly journals
English-language journals |
https://en.wikipedia.org/wiki/RealNetworks | RealNetworks, Inc. is a provider of artificial intelligence and computer vision based products. RealNetworks was a pioneer in Internet streaming software and services. They are based in Seattle, Washington, United States. The company also provides subscription-based online entertainment services and mobile entertainment and messaging services.
History
RealNetworks (then known as Progressive Networks) was founded in 1994 by Rob Glaser, an ex-Microsoft executive, and a management team including Phil Barrett, Andy Sharpless, and Stephen Buerkle. The original goal of the company was to provide a distribution channel for politically progressive content. It evolved into a technology venture to leverage the Internet as an alternative distribution medium for audio broadcasts. Progressive Networks became RealNetworks in September 1997, in advance of the company's initial public offering (IPO) in October 1997 when shares of the company started trading on Nasdaq as "RNWK".
RealNetworks were pioneers in the streaming media markets and broadcast one of the earlier audio events over the Internet, a baseball game between the New York Yankees and Seattle Mariners on September 5, 1995. They announced streaming video technology in 1997. According to some accounts, by 2000 more than 85% of streaming content on the Internet was in the Real format.
Despite this success, problems arose because RealNetworks's primary business model depended upon the sale of streaming media server software, and Microsoft and Apple were giving those products away. As servers from Microsoft and Apple became more capable, Real's server sales inevitably eroded.
In RealNetworks, Inc. v. Streambox, Inc. in January 2000, RealNetworks filed an injunction against Streambox, Inc. regarding that company's product designed to convert Real Audio (.rm) formatted files to other formats. On December 4, 2001, the company was to launch the first coordinated effort to sell and deliver music from major record labels over the Internet, part of a broader initiative by the company to develop subscription Internet services aimed at Web users with fast Internet connections. In 2002, a strategic alliance was formed between RealNetworks and Sony Corporation to expand collaboration.
In October 2005, Microsoft agreed to pay RealNetworks $460 million to settle an antitrust lawsuit.
In August 2003, RealNetworks acquired Listen.com's Rhapsody music service, and renamed it RealRhapsody. It offered streaming music downloads for a monthly fee. In January 2004, RealNetworks announced the RealPlayer Music Store, featuring digital rights management (DRM) restricted music in the AAC file format. After some initial tries to push their own DRM scheme (named Helix DRM) onto all device manufacturers with the Creative Zen Xtra and the Sansa e200r as the only existing compliant devices, they sparked controversy by introducing a technology called Harmony that allowed their music to play on iPods as well as Microsoft Windows |
https://en.wikipedia.org/wiki/Trusted%20Computer%20System%20Evaluation%20Criteria | Trusted Computer System Evaluation Criteria (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify, and select computer systems being considered for the processing, storage, and retrieval of sensitive or classified information.
The TCSEC, frequently referred to as the Orange Book, is the centerpiece of the DoD Rainbow Series publications. Initially issued in 1983 by the National Computer Security Center (NCSC), an arm of the National Security Agency, and then updated in 1985, TCSEC was eventually replaced by the Common Criteria international standard, originally published in 2005.
History
Work on the Orange book began in 1979. In May 1982, an early version of the Orange Book known as the Blue Book was released to the public. In August 1983, the Orange Book was published.
In 1999, the Orange book was replaced by the International Common Criteria for Information Technology Security Evaluation.
On 24 October 2002, The Orange Book (aka DoDD 5200.28-STD) was canceled by DoDD 8500.1, which was later reissued as DoDI 8500.02, on 14 March 2014.
Fundamental objectives and requirements
Policy
The security policy must be explicit, well-defined, and enforced by the computer system. Three basic security policies are specified:
Mandatory Security Policy – Enforces access control rules based directly on an individual's clearance, authorization for the information and the confidentiality level of the information being sought. Other indirect factors are physical and environmental. This policy must also accurately reflect the laws, general policies and other relevant guidance from which the rules are derived.
Marking – Systems designed to enforce a mandatory security policy must store and preserve the integrity of access control labels and retain the labels if the object is exported.
Discretionary Security Policy – Enforces a consistent set of rules for controlling and limiting access based on identified individuals who have been determined to have a need-to-know for the information.
Accountability
Individual accountability regardless of policy must be enforced. A secure means must exist to ensure the access of an authorized and competent agent that can then evaluate the accountability information within a reasonable amount of time and without undue difficulty. The accountability objective includes three requirements:
Identification – The process used to recognize an individual user.
Authentication – The verification of an individual user's authorization to specific categories of information.
Auditing – Audit information must be selectively kept and protected so that actions affecting security can be traced to the authenticated individual.
Assurance
The computer system must contain hardware/software mechanisms that can be independently evaluated to provide sufficient ass |
https://en.wikipedia.org/wiki/Computer-aided%20inspection | Computer-aided inspection (CAI) is the use of software tools to assess manufactured objects. It is closely related to computer-aided design (CAD) and computer-aided manufacturing (CAM). Its primary purpose is to allow engineers to more quickly and precisely assess the physical properties of manufactured objects. These properties can include dimensions, material consistency, roughness and roundness.
Uses
CAI has applications in industries ranging from food production to aerospace, commonly being used in the quality assurance step of the manufacturing process. It involves comparing manufactured objects with a CAD model, technical drawing or data sheet to ensure that the finished product is within specification and meets design intent.
Technologies
CAI machines can use a variety of technologies depending on the material of the product to be inspected, the properties to be measured, and the precision required.
Digital Cameras
Digital cameras are frequently used in situations where the shape or colour of an object needs to be analysed. Using machine vision, the CAI program can make decisions about objects by comparing them to a master photo or data array.
Laser Scanning
Laser scanning CAI machines use point clouds to generate a 3D model which is compared to the required specification. Laser scanners are generally used to check the external geometry of parts with low reflectivity and translucence.
Structured Light Scanning
Structured light scanners use projected light patterns and digital cameras to analyse the geometry of an object. As with laser scanning, objects with high reflectivity and translucence can cause problems but temporary coatings can be applied to prevent this.
CT Scanning
Industrial CT scanners use X-rays to image an object from many angles, building up a 3D image to compare to a specification. CT scans can be used to analyse the internal geometry of parts because the X-rays penetrate the object being scanned. Higher resolution CT scans can also check for cavities, cracks, and other undesirable features inside parts.
See also
Computer-aided design
Computer-aided manufacturing
Coordinate-measuring machine
References
Computer-aided design
Metrology |
https://en.wikipedia.org/wiki/Eurocarbdb | EuroCarbDB was an EU-funded initiative for the creation of software and standards for the systematic collection of carbohydrate structures and their experimental data, which was discontinued in 2010 due to lack of funding. The project included a database of known carbohydrate structures and experimental data, specifically mass spectrometry, HPLC and NMR data, accessed via a web interface that provides for browsing, searching and contribution of structures and data to the database. The project also produces a number of associated bioinformatics tools for carbohydrate researchers:
GlycanBuilder, a Java applet for drawing glycan structures
GlycoWorkbench, a standalone Java application for semi-automated analysis and annotation of glycan mass spectra
GlycoPeakfinder, a webapp for calculating glycan compositions from mass data
The canonical online version of EuroCarbDB was hosted by the European Bioinformatics Institute at www.ebi.ac.uk up to 2012, and then relax.organ.su.se.
EuroCarb code has since been incorporated into and extended by UniCarb-DB, which also includes the work of the defunct GlycoSuite database.
References
External links
an online version of EuroCarbDB
Eurocarbdb googlecode project
initial publication of the EuroCarb project
Official site for eurocarbdb reports and recommendations (no longer active)
Bioinformatics software
Biological databases
Carbohydrates
Science and technology in Cambridgeshire
South Cambridgeshire District |
https://en.wikipedia.org/wiki/White%20Tomb | White Tomb is the debut album by Irish ambient black metal band Altar of Plagues. It was recorded at Data Studios, Kerry.
Track listing
Personnel
Altar of Plagues
James Kelly – vocals, guitars, keyboards
Jeremiah Spillane – guitars
Dave Condon – bass, vocals
S. MacAnri – drums
Guest musicians
Stephen Lordan - guest vocals on "Gentian Truth"
Nathan Misterek - guest vocals on "Earth: As a Furnace" and "Gentian Truth"
Production and recording
Ross O'Donovan - recording and mixing
Jason Carroll - assistant engineering
Colin Marston - mastering
References
2009 albums
Altar of Plagues albums
Profound Lore Records albums |
https://en.wikipedia.org/wiki/Alexis%20Perrey | Alexis Perrey (1807–1882) was a historical French seismologist and compiler of earthquake catalogs. He is considered a pioneer in this area, having published a paper on earthquakes in Algeria as early as 1848, in the journal Mémoires de l'Académie des Sciences, Arts et Belles-Lettres de Dijon. He continued to post annual observations on Algerian earthquakes until 1871.
He suspected a correlation between the Moon and seismic activity on Earth, and developed his theory with the use of statistics. He found that Earth tremors occurred most frequently during full and new moons, when the Earth is between the Sun and Moon, when the Moon is between the Earth and Sun, and when the Moon is closest in its orbit to the Earth. He also found indications in some cases that the Moon had crossed the meridian of affected locales at the time of the earthquake.
References
Further reading
Seismologists
French geologists
1807 births
1882 deaths |
https://en.wikipedia.org/wiki/S33%20%28ZVV%29 | The S33 is a regional railway line of the S-Bahn Zürich on the Zürcher Verkehrsverbund (ZVV), Zürich transportation network, and is one of the network's lines connecting the cantons of Zürich and Schaffhausen.
Route
The line runs from the northwest of the canton of Zürich from Winterthur and heads for Schaffhausen. At both terminal stations, connections to InterCity and InterRegio trains as well as other S-Bahn services exist.
Stations
Winterthur
Hettlingen
Henggart
Andelfingen
Marthalen
Dachsen
Schloss Laufen am Rheinfall
Neuhausen
Schaffhausen
Rolling stock
S33 services are operated by RABe 511 units, except for weekday services to Schaffhausen which are run by Re 450 class locomotives pushing or pulling double-deck passenger carriages.
Until 2018, the S33 services were operated by THURBO rolling stock (Stadler GTW units).
Scheduling
The train frequency is usually hourly and the trip takes 33 minutes. The S33 runs hourly, but offers half-hourly services at all stations in combination with the S12 (reduced services on weekends and evenings).
See also
Rail transport in Switzerland
Trams in Zürich
References
ZVV official website: Routes & zones
Zürich S-Bahn lines
Canton of Schaffhausen
Transport in the canton of Zürich |
https://en.wikipedia.org/wiki/Channel%20drift | Channel drift or network decay is the gradual shift of a television network away from its original programming, to either target a newer and more profitable audience, or to broaden its viewership by including less niche programming. Often, this results in a shift from informative or artistic quality programming aimed at cultured and educated viewers toward sensational, ratings-based or reality-formatted programming designed solely for the entertainment of a mass audience. Channel drift frequently features the incorporation of infotainment, reality television and heavy advertising into the channel's lineup.
Overview
United States
Cable
Networks primarily focused on a particular topic, such as History Channel, tend to add shows that the channel's management feel that a larger audience wants to see, thus leading to additional profits. By producing irrelevant or low-quality programming they can increase their ratings to a target audience, increase viewership and increase revenues. The degree of channel drift can vary: some of the nonconforming programming may retain some degree of association with the channel's original purpose (such as in the case of the History Channel, Pawn Stars, American Pickers, and Top Shot), while other programming may have no association whatsoever (such as Ax Men and Ice Road Truckers).
Channel drift can also result from the acquisition of sports rights or reruns of popular television series that would otherwise not fit the channel's format; Outdoor Life Network, for instance, acquired the rights to the National Hockey League in 2005, so the network began transitioning toward a general sports network known today as NBCSN. Conversely, WGN America abandoned its expensive sports packages in 2014 as part of its drift from a Chicago-centric superstation into a nationally oriented general entertainment channel; WGN America eventually started a gradual transition away from entertainment programming, structured as such due to contractual commitments to existing syndicated programming, to adopt a cable news format as NewsNation in March 2021.
A channel may rebrand itself to more accurately reflect its new content. Sci-Fi Channel changed its name to Syfy for both trademark reasons and to allow a stretching of the network's definition of appropriate programming to include content such as Law & Order: Special Victims Unit reruns and WWE professional wrestling. (WWE moved to USA Network in 2016.) Another example is the conversion of Court TV to truTV, which allowed it to show more reality-based programming (though initially retaining a law enforcement focus, such as repeats of World's Wildest Police Videos) and slowly phase out their advertiser-repelling legal system and courtroom programming. This process ended in October 2009 when the remaining courtroom analysis programs transitioned to CNN.com's legal news section and occasional court coverage from CNN Center on the mainline channel. TruTV then aired competitions, hidden camera |
https://en.wikipedia.org/wiki/Theater%20Television%20Network | The Theater Television Network was an early American television network founded in 1951. The network was not a traditional 1950s television network: unlike the other TV networks that operated at that time, Theater Network programs were not broadcast into homes; instead, they aired at participating movie theaters.
The Theater Television Network, like many current theaters do for major events, broadcast mostly sporting events: NCAA basketball games, boxing matches, entertainment events. TTN however also broadcast public affairs programming. The network broadcast Harry Truman's 1951 State of the Union address.
Theater Television required special equipment to be installed at the Theater. After this initial cost the content could be transmitted over the air or through telephone cables. There were drawbacks to both systems. Theater owners pressed the FCC for bandwidth in the UHF spectrum but this was either resisted or given in short-term periods. The alternative was to use AT&T cable which was both expensive and limited the quality of the output.
In the period 1948-52 the FCC imposed a ban on issuing licences for new TV stations. This was the window of opportunity for Theater Television. However, once the freeze was over many new TV stations were established and the public preferred "free" TV in their own living rooms. The last Theater Television operation finished in 1953.
References
Defunct television networks in the United States
Television channels and stations established in 1951
1953 disestablishments in the United States
Television channels and stations disestablished in 1953
1951 establishments in the United States |
https://en.wikipedia.org/wiki/Neurosecurity | Neurosecurity has been defined as "a version of computer science security principles and methods applied to neural engineering", or more fully, as "the protection of the confidentiality, integrity, and availability of neural devices from malicious parties with the goal of preserving the safety of a person’s neural mechanisms, neural computation, and free will". Simply put, Neurosecurity is, at least in principle, an antivirus and firewall for the mind. Neurosecurity also refers to the application of neuroscience to behavioral information security to better understand and improve users' security behaviors. Neurosecurity is a distinct concept from neuroethics; neurosecurity is effectively a way of enforcing a set of neuroethical principles for a neural device. Neurosecurity is also distinct from the application of neuroscience to national security, a topic that is addressed in Mind Wars: Brain Research and National Defense by Jonathan D. Moreno.
The Center for Neurotechnology Studies of the Potomac Institute for Policy Studies, in Arlington, VA, USA works with a number of university and governmental partners on issues, problems and protocols for neurosecurity. James Giordano, Director of the Center, defines neurosecurity as "concepts, practices, guidelines and policies dedicated to identifying threats to, and preserving the integrity of neuro-psychiatric information about persons, groups and populations obtained in neuroscientific research and/or through the use of neurotechnologies (such as neuroimaging, neurofeedback, neurogenetics, and neuro-computational data banks) in medicine, the social sphere, and national intelligence and defense".
Popular culture
The anime series Ghost in the Shell: Stand Alone Complex (2002–2003) prominently features hackers manipulating neural implants. One example is the Laughing Man's use of hacking to interfere with the reports of eyewitnesses. In another example, Major Kusanagi makes a point by taking control of some of Batou's implants and forcing him to punch himself.
Neal Stephenson's book The Diamond Age (1995) briefly refers to corporations hacking neural implants in order to superimpose advertisements onto a user's field of vision.
The world in video game Remember Me is set in the world where memory manipulation is commonplace.
See also
Brain implant
Brain-reading
Cyberware
Hacker (computer security)
Neuroprosthetics
References
Computational neuroscience
Security |
https://en.wikipedia.org/wiki/High-speed%20rail%20in%20the%20Netherlands | High-speed rail service in the Netherlands started at 13 December 2009 with the dedicated HSL-Zuid line that connects the Randstad via Brussels to the European high-speed rail network. In later years improved traditional rail sections were added to the high-speed network. Proposals for more dedicated high-speed lines were deemed too costly; plans for the HSL-Oost to Germany were mothballed and instead of the Zuiderzeelijn the less ambitious Hanzelijn was built to enable future high-speed service between the northern provinces and the Randstad.
As per 2020 three high-speed train services are operative in the Netherlands: Thalys, InterCityExpress (ICE), and Eurostar; the short-lived Fyra service was cancelled in 2013 after severe reliability issues.
History
As early as 1973, the Den Uyl cabinet discussed a high-speed railway line in the Netherlands. It was not until 1988 that the Nederlandse Spoorwegen (NS) started three HSL projects, namely HSL-Zuid, HSL-Oost, and HSL-Noord (Zuiderzeelijn). The overall plan, called Rail 21, was approved in 1989, coinciding with the 150th anniversary of the first railway in the Netherlands (1839). HSL-Zuid was constructed between 2000 and 2006, and began operating in 2009. HSL-Oost was cancelled in 2001, HSL-Noord was cancelled in 2007. The Hanzelijn (constructed 2006–2012) partially took over HSL-Noord's role in connecting the west and north of the country through Lelystad and Zwolle, and has been built to be eventually upgraded to , but so far trains on this track are not running at high speeds yet. New plans for a HSL-Noord, now dubbed 'Lelylijn' instead of 'Zuiderzeelijn', were unveiled in 2019; a feasibility study, with the support of all national political parties, is underway and expected to be finished in late 2020.
Following numerous problems with the V250 multiple units the Fyra service on HSL-Zuid was cancelled in January 2013 after less than two months in full service. A week later Thalys and Eurostar trains replaced the Fyra to a less frequent and slower timetable. The Intercity Nieuwe Generatie (ICNG) is scheduled to be introduced on Dutch high-speed rails (HSL-Zuid and the Hanzelijn) in 2023.
Lines
HSL-Zuid
HSL-Zuid (, ) is a high-speed railway line in the Netherlands. Using existing tracks from Amsterdam Centraal to Schiphol Airport, the dedicated high-speed line begins here and continues to Rotterdam Centraal and to the Belgian border. Here, it connects to the HSL 4, terminating at Antwerpen-Centraal. Den Haag Centraal (The Hague) and Breda are connected to the high-speed line by conventional railway lines. Services running at on the HSL-Zuid began on 7 September 2009 between Amsterdam and Rotterdam. From December 2009, Thalys trains from Amsterdam to Brussels and Paris have run on HSL-Zuid. From December 2012 to January 2013 (40 days in total) the Fyra V250 trains ran on HSL-Zuid between Amsterdam and Brussels, only to have service suspended because of the poor quality (and safety risks) |
https://en.wikipedia.org/wiki/Sergey%20Aleynikov | Sergey Aleynikov (born 1970) is a former Goldman Sachs computer programmer. Between 2009 and 2016, he was prosecuted by NY Federal and State jurisdictions for the same conduct of allegedly copying proprietary computer source code from his employer, Goldman Sachs, before joining a competing firm. His first prosecution in federal court in New York ultimately resulted in acquittal by the United States Court of Appeals for the Second Circuit. The outcome of his second prosecution and trial in New York state court was a split verdict dismissed by court, which acquitted him on all counts. One count in that order of dismissal was later overturned by New York Court of Appeals, which took a very broad interpretation of the statute, and on recommendation of prosecutors he was sentenced to time served without punishment. The same New York Court of Appeals denied his petition to appeal on double jeopardy grounds. His story inspired Michael Lewis's bestseller Flash Boys.
Career
Around 1990, Sergey Aleynikov emigrated from the Soviet Union to the United States. From 1998 to 2007, he worked at IDT Corporation, writing software to better handle high volumes of phone calls.
He authored a telecommunications patent and contributed to a number of open-source Erlang and C++ projects. He also published several Perl modules on CPAN.
Aleynikov was employed for two years, from May 2007 to June 2009, at Goldman at an ultimate salary of $400,000. He left to join Misha Malyshev's Teza Technologies, a competing high-frequency trading firm which offered to triple his pay.
In May 2010, Aleynikov founded Omnibius, LLC, a consulting services firm for financial clients.
Federal prosecution and acquittal
On July 3, 2009, he was arrested by FBI agents at Newark Liberty International Airport after Goldman raised the alarm over a suspected policy violation reported by Goldman on July 1, 2009, two days prior to his arrest. He was accused by the FBI of improperly copying computer source code that performs "sophisticated, high-speed and high-volume trades on various stock and commodity markets", as described by Goldman. The events leading to his arrest are covered by Michael Lewis in his 2014 book Flash Boys. According to Assistant United States Attorney Joseph Facciponti, "the bank has raised the possibility that there is a danger that somebody who knew how to use this program could use it to manipulate markets in unfair ways.". Facciponti's words in the courtroom contradicted to what David Viniar, Goldman's CFO, said a few days later on the earnings call that the sustained losses would be "very, very immaterial". Aleynikov acknowledged downloading some source code, but maintained that his intent was to collect exclusively open-source software that is not proprietary to his then-employer.
On February 10, 2010, a 3-count indictment was handed down by a federal grand jury in Manhattan. The counts included theft of trade secrets (count 1), transportation of stolen goods (count 2), |
https://en.wikipedia.org/wiki/Hanyang%20Cyber%20University | Hanyang Cyber University is a virtual university in South Korea, founded in 2002.
External links
Korean website
English website
Universities and colleges in Seoul
Distance education institutions based in South Korea |
https://en.wikipedia.org/wiki/Imre%20Simon | Imre Simon (August 14, 1943 – August 13, 2009) was a Hungarian-born Brazilian mathematician and computer scientist.
His research mainly focused on theoretical computer science, automata theory, and tropical mathematics, a subject he founded, and which was so named because he lived in Brazil. He was a professor of mathematics at the University of São Paulo in Brazil. He was also actively interested in questions of intellectual property and collaborative work, and was an enthusiastic advocate for open collaborative information systems, of which Wikipedia is an example.
Simon came to Brazil with his parents after the Hungarian Revolution of 1956. He studied electrical engineering in Sao Paulo (with Tomasz Kowaltowski), received his diploma in 1970, and his Ph.D. at the University of Waterloo in 1972, under Janusz Brzozowski with the thesis: Hierarchies of Events with Dot-Depth One.
He died of lung cancer in São Paulo, Brazil on August 13, 2009, aged 65 just a day short of his 66th birthday.
References
External links
Personal home page
Brazilian computer scientists
Hungarian emigrants to Brazil
20th-century Brazilian mathematicians
2009 deaths
1943 births
Deaths from lung cancer
Recipients of the Great Cross of the National Order of Scientific Merit (Brazil)
Academic staff of the University of São Paulo |
https://en.wikipedia.org/wiki/Business%20and%20Computing | A Business and Computing is a dual degree program offered jointly by some computing and business schools. The program generally lasts four-five years instead of seven-eight years to complete separate the two degrees and results in the candidate earning both a Bachelor of Business degree and a Bachelor of Computing degree. Graduating Business and Computing students may choose to work on computing/technical matter, or enter the business world, or even enjoy the gray area between business and computing fields such as IT security officer, IT consultant, etc. Even though a majority of Business and Computing graduate from a single university, there are people who earn these degrees from different universities.
Degree Overview
A course which allows you to develop both technical skills and business knowledge. Learning and understanding technical computer skills in the systems analysis and software engineering, alongside gaining experience in finance, simulation and project management.
Covering computing subjects such as algorithms, software engineering, social implications of computing, data structure, operating systems and fundamental mathematics, with business subjects such as accounting, human resource management, business policy/communication, law, finance, marketing and organizational behaviour.
Earning you both a Bachelor of Computer Science degree and a Bachelor of Business Administration degree.
Core Computing modules
Managing Information – Understanding the management techniques that are used to collect information to communicate it within and outside an organization, helping enable managers to make quicker and better decisions.
Information System – Understanding a set of integrated components which collect, store and process data, that can also deliver information, knowledge and digital products.
Software Engineering – Understanding the application that covers the technical aspects of building software systems, and also maintains management issues, including budgeting and directing programming teams.
Database Principles and Applications – Understanding the core technology and base of information system, that provides basic knowledge to help develop information systems which lays a good foundation for scientific research and subsequent professional courses.
Multimedia and Human Computer Interaction – Understanding the inter-disciplinary field which brings together physiology and computer science to understand people’s human’s interaction with technology.
Communications and Networking – Understanding the several type of networking, such as intranet, extranet and internet and how computers or devices connected to one another can exchange data.
Core Business Modules
Managing organisations – Investigating organisational behaviour and human resource management.
Management and Information Technology – Gaining knowledge in understanding the concepts, debates and issues in areas of change management, project management, and information tec |
https://en.wikipedia.org/wiki/Andrea%20Mazzucchi | Andrea Mazzucchi (born March 19, 1966) is an Italian American entrepreneur, network architect, and computer specialist
He played a significant role in the early development of Internet in Italy and other countries in Eastern Europe, such as Croatia.
Being interested in the regulatory side as well as the technical, he also played a key role in the Internet governance of Italy since 1985. He co-founded in 1998 the ccTLD ".it" policy board (Naming Authority), where he eventually became Chair of the Board of Directors. In 2004, once the Naming Authority evolved into the Rules Committee, he was one of the appointed members.
Focused since the very beginning toward the Open Source, in 1992 he co-founded Nexus, the first ISP in Italy based exclusively on Linux and open technologies.
In 1993, Mazzucchi co-founded Gedi, one of the first companies in Italy for distance learning.
In 1995, he founded Istria On Line, the first ISP in Croatia, and worked on Internet pilot projects in Bulgaria and Hungary, mostly establishing TCP/IP over X.25 Internet connections for international businesses.
He is an active member of the Internet community, being co-founder, with Giancarlo Livraghi, of ALCEI, initially conceived as the Italian branch of EFF.
He is also co-founder of the Italian chapter of ISOC, where he served on the Board of Directors
References
Living people
1966 births
Businesspeople from Rome
Italian computer scientists
Scientists from Rome
External links
Naming Authority
Rules Committee
ALCEI
ISOC it |
https://en.wikipedia.org/wiki/Radio%20Solar%20Telescope%20Network | The Radio Solar Telescope Network (RSTN) is a network of solar observatories maintained and operated by the 557th Weather Wing, ACC. The RSTN consists of ground-based observatories in Australia, Italy, Massachusetts, and Hawaii.
History
It became apparent in the early 1960s that certain space weather events might interfere with the stated U.S. objective of a crewed mission to the moon. In particular, the sun emits continuous electromagnetic energy and electrically charged particles, which can cause disturbances in the near-Earth environment and disrupt satellite communications.
Foremost among these concerns was the possibility of a geomagnetic storm of solar origin. Metric Type II radio bursts, signatures of coronal shock waves or coronal mass ejections, were known to be commonly associated with solar flares. The United States Air Force Research Laboratory (AFRL) was thus assigned the task of developing and validating a network of ground-based solar observatories. AFRL established a worldwide network of sweep frequency recorders from which estimates of the shock speed in the corona could be made. This network, called the Radio Solar Telescope Network (RSTN), uses a bandwidth from 25 MHz to 85 MHz.
The prototype was assembled and operated at the Sagamore Hill Solar Radio Observatory during the early 1960s. The Sagamore Hill Solar Radio Observatory began operating solar patrols in 1966. The Air Force Geophysics Laboratory (AFGL, currently Phillips Lab) transferred operation of the observatory to Detachment 2 of the 2nd Weather Group of the Air Force Weather Agency in October 1978. However, Phillips Lab continues to work in an advisory capacity to the observatory.
Mission
The mission of the solar observatories of the RSTN is to monitor solar flares, noise storms and other releases of energy from the sun, and when necessary, notify military and civilian personnel concerned with space, weather, power and communications in countries throughout the world.
Operations
The radio and optical observatories are operated by detachments of the 2nd Weather Group, as follows:
Det. 1, Learmonth Solar Observatory, RAAF Learmonth, WA, Australia
Det. 2, Sagamore Hill Solar Observatory, Hamilton, Massachusetts, USA
Det. 4, Holloman AFB, New Mexico, USA
Det. 5, Kaena Point Solar Observatory, Kaena Point, Hawaii, USA
San Vito Solar Observatory, San Vito dei Normanni, Italy
The RSTN is complemented in its real-time capability by a radio telescope operated from 25 MHz (the ionospheric cutoff) to 1,800 MHz by the Ionospheric Prediction Service at the Paul Wild Observatory in Culgoora, New South Wales, Australia.
Weather Agency
Meteorological organizations
Solar observatories |
https://en.wikipedia.org/wiki/Crow%20River%20%28Michigan%29 | The Crow River is a river on the Upper Peninsula of Michigan in the United States, flowing to Lake Michigan.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Tributaries of Lake Michigan |
https://en.wikipedia.org/wiki/Gratiot%20River | The Gratiot River is a river on the north side of the Keweenaw Peninsula in Michigan. It is a tributary of Lake Superior.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Tributaries of Lake Superior |
https://en.wikipedia.org/wiki/Little%20Fox%20River | The Little Fox River is an tributary of the Fox River on the Upper Peninsula of Michigan in the United States.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Tributaries of Lake Michigan |
https://en.wikipedia.org/wiki/Little%20Muskegon%20River | The Little Muskegon River is a tributary of the Muskegon River in western Michigan in the United States.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Rivers of Newaygo County, Michigan
Tributaries of Lake Michigan |
https://en.wikipedia.org/wiki/Little%20River%20Raisin | The Little River Raisin is a tributary of the River Raisin in southeastern Michigan in the United States.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Tributaries of Lake Erie |
https://en.wikipedia.org/wiki/Little%20Siskiwit%20River | The Little Siskiwit River is a river on Isle Royale in Lake Superior, in the U.S. state of Michigan.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Rivers of Keweenaw County, Michigan
Tributaries of Lake Superior
Isle Royale |
https://en.wikipedia.org/wiki/Little%20Trout%20River%20%28Michigan%29 | The Little Trout River is a river in Presque Isle County, Michigan, in the United States. It is a tributary of Lake Huron.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Rivers of Presque Isle County, Michigan
Tributaries of Lake Huron |
https://en.wikipedia.org/wiki/Middle%20Branch%20River | The Middle Branch River is a tributary of the Muskegon River in Osceola County, Michigan, in the United States.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Rivers of Osceola County, Michigan
Tributaries of Lake Michigan |
https://en.wikipedia.org/wiki/Quanicassee%20River | The Quanicassee River is a river in Michigan, United States.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan |
https://en.wikipedia.org/wiki/Rock%20River%20%28Lake%20Michigan%29 | The Rock River is a river on the Upper Peninsula of Michigan in the United States, flowing to Lake Michigan.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Tributaries of Lake Michigan |
https://en.wikipedia.org/wiki/Sage%20River | The Sage River is a tributary of the Tahquamenon River on the Upper Peninsula of Michigan in the United States.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Tributaries of Lake Superior |
https://en.wikipedia.org/wiki/Sebewaing%20River | The Sebewaing River is a river in Michigan that flows through Sebewaing Township, Michigan and empties into Saginaw Bay.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan |
https://en.wikipedia.org/wiki/Second%20River%20%28Michigan%29 | The Second River is a tributary of the Middle Branch Escanaba River in Michigan.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Tributaries of Lake Michigan |
https://en.wikipedia.org/wiki/Tioga%20River%20%28Michigan%29 | The Tioga River is a tributary of the Sturgeon River in Baraga County, Michigan, United States.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Rivers of Baraga County, Michigan
Tributaries of Lake Superior |
https://en.wikipedia.org/wiki/White%20River%20%28Huron%20County%2C%20Michigan%29 | The White River is a river in southern Huron County, Michigan. It is a tributary of Lake Huron.
See also
List of rivers of Michigan
References
Michigan Streamflow Data from the USGS
Rivers of Michigan
Rivers of Huron County, Michigan
Tributaries of Lake Huron |
https://en.wikipedia.org/wiki/Randall%20C.%20O%27Reilly | Randall Charles O'Reilly (born March 1, 1967) is a professor of psychology and computer science at the Center for Neuroscience at the University of California, Davis. His lab moved to UC Davis from the University of Colorado at Boulder in 2019.
Education
Randall O'Reilly obtained his B.A. at Harvard University and his M.S. at Carnegie Mellon University. He went on to get a Ph.D. in Psychology also at Carnegie Mellon University in 1996, under the supervision of James McClelland. He did postdoctoral work at Massachusetts Institute of Technology in the Brain and Cognitive Sciences department.
Research
O'Reilly's research is aimed at developing detailed computational models of the biological basis of cognition. He is most famous for developing of the Leabra recirculating algorithm for learning in neural networks. He has developed a number of successful models of declarative memory, the visual system, and the basal ganglia circuit.
He is one of the main developers of the Emergent neural network simulation software.
References
External links
http://grey.colorado.edu/CompCogNeuro/index.php/CCNLab/oreilly_cv,Curriculum VitaeRandall C. O'Reilly
Randall C. O'Reilly, Personal home page.
1967 births
Living people
Computational psychologists
American cognitive neuroscientists
Memory researchers
Carnegie Mellon University alumni
Harvard University alumni |
https://en.wikipedia.org/wiki/Buffalo%20River%20%28Georgia%29 | The Buffalo River is a tidal river northwest of Brunswick, Georgia. It is part of the Brunswick River network of tidal channels along the Atlantic coast of the U.S. state of Georgia.
The stream begins at the confluence of the Little Buffalo Creek with Buffalo Creek southeast of Anguilla at . The stream flows through the swampy area west of Oak Grove Island to its confluence with the Turtle River at .
See also
List of rivers of Georgia
References
USGS Hydrologic Unit Map - State of Georgia (1974)
Rivers of Georgia (U.S. state)
Rivers of Glynn County, Georgia |
https://en.wikipedia.org/wiki/The%20Resistance%20%28WildStorm%29 | The Resistance was a post-apocalyptic cyberpunk comic book limited series written and created by Justin Gray and Jimmy Palmiotti with art by Juan Santacruz. Totaling 8 issues, the series was published by Wildstorm, with issue #1 being cover dated November 2002. It is unrelated to and should not be confused with the later similarly named Wildstorm series Resistance. The collected edition was published by IDW in APRIL 2009 collecting all 8 issues that were first published in 2002.
Setting
The setting is a dystopic New York City in the year 2280. A chemical known as "Toxin 5" has ruined the world's ecosystem, bringing civilization close to collapse.
The Global Control Commission (GCC) has brought order to the chaos and anarchy, but it is also corrupt and oppressive to the point of totalitarianism. It is also very inegalitarian: all people over age 65 are denied medical treatment), and the government, in an effort to maintain the delicate balance between a growing population and dwindling food supplies, regulates childbirth rates in the few remaining cities. People born without authorization are known as "Strayz" and are given no civil rights by the GCC; they may be hunted down and killed by corporate-sponsored machines.
Characters
The protagonist is a young genius hacker Stray named Brian Sturm who joins "the Resistance," a group of mostly Strayz who have rebelled against the GCC. The Resistance is led by a man named Surge.
References
External links
Review of The Resistance #1-#4 on Comics Bulletin
Interview with writer Justin Gray on Comic Book Resources |
https://en.wikipedia.org/wiki/261st%20Cyber%20Operations%20Squadron | The United States Air Force's 261st Combat Communications Squadron (261 CBCS) is an Air National Guard combat communications unit located in California.
Mission
History
The 261st Combat Communications Squadron traces its beginnings to the 96th Signal Company, Service Group. Activated at Reno Army Air Base, Nevada on 1 January 1943. The unit moved shortly thereafter to the Army Air Base at Muroc, CA.
Redesignated as the 1096th Signal Company, the unit moved to Great Falls Montana prior to being activated on 17 October 1943. The unit received battle credits during World War II for the New Guinea Campaign, the Southern Philippines Campaign and the Luzon Campaign. Additionally, the unit served in Machinato, Okinawa and Tachikawa Japan where it officially became the 611th Signal Light Company just prior to its inactivation on 25 March 1946.
The 611th Signal Light Company was reorganized on 15 August 1948 at the National Guard Center, Alameda California and received federal recognition on 27 September 1948. At the time of recognition, the unit had two officers and ten enlisted members assigned.
On 1 July 1952, the 611th Signal Light Company was redesignated the 261st Combat Communications Squadron, (Operations) and on 26 January 1953, became part of the California Air National Guard with its move to Hayward Air National Guard Base, California.
On 1 July 1953, the 261st Combat Communications Squadron (Operations) was reassigned to the 146th Fighter-Bomber Wing at Van Nuys Air National Guard Base, California where it remained until its final move to Sepulveda Air National Guard Station on 1 August 1973.
During the 34 years that the unit has been located at Sepulveda Air National Guard Station, members have participated in numerous Joint Forces Exercises and Operations. Personnel assigned to the 261st have served in Korea, Thailand, Japan and Hawaii as well as in Europe, Bosnia, and Southeast and Southwest Asia.
Lineage
Constituted as the 96th Signal Company, Service Group on 28 December 1942
Activated on 1 January 1943
Redesignated 1096th Signal Company, Service Group on 27 October 1943
Inactivated on 25 March 1946
Redesignated 111th Signal Light Construction Company and allotted to the National Guard on 24 May 1946
Designation revoked and changed to 611th Signal Light Construction Company
Activated on 15 August 1948
Federal recognition extended on 27 September 1948
Redesignated 261st Communications Squadron, Operations on 1 July 1952
Redesignated 261st Radio Relay Squadron on 23 September 1960
Redesignated 261st Mobile Communications Squadron on 15 March 1968
Redesignated 261st Combat Communications Squadron on 24 March 1976
Redesignated 261st Combat Information Systems Squadron on 15 October 1984
Redesignated 261st Combat Communications Squadron on 1 October 1986
Redesignated 261st Information Systems Squadron unknown
Redesignated 261st Network Operations Squadron c. 2014
Redesignated 261st Cyber Operations Squadron on 1 September |
https://en.wikipedia.org/wiki/Alder%20River | The Alder River is a river in Maine. A tributary of the Androscoggin River, the Alder flows west from Locke Mills () to Bethel.
See also
List of rivers of Maine
References
Maine Streamflow Data from the USGS
Maine Watershed Data From Environmental Protection Agency
Tributaries of the Kennebec River
Rivers of Oxford County, Maine
Bethel, Maine |
https://en.wikipedia.org/wiki/Back%20River%20%28Medomak%20River%20tributary%29 | The Back River is a river in Friendship, Maine, which empties into the estuary of the Medomak River.
See also
List of rivers of Maine
References
Maine Streamflow Data from the USGS
Maine Watershed Data From Environmental Protection Agency
Rivers of Lincoln County, Maine
Rivers of Maine |
https://en.wikipedia.org/wiki/Goose%20River%20%28Medomak%20River%20tributary%29 | The Goose River is a tributary of the Medomak River in the U.S. state of Maine.
See also
List of rivers of Maine
References
Maine Streamflow Data from the USGS
Maine Watershed Data From Environmental Protection Agency
Rivers of Maine |
https://en.wikipedia.org/wiki/Harrington%20River | The Harrington River is a river in Washington County, Maine. It empties into Harrington Bay in Harrington, Maine.
See also
List of rivers of Maine
References
Maine Streamflow Data from the USGS
Maine Watershed Data From Environmental Protection Agency
Rivers of Washington County, Maine
Rivers of Maine |
https://en.wikipedia.org/wiki/Muddy%20River%20%28Merrymeeting%20Bay%29 | The Muddy River is a river in Topsham, Maine, which empties into Merrymeeting Bay. The river is known to be very muddy.
See also
List of rivers of Maine
References
Maine Streamflow Data from the USGS
Maine Watershed Data From Environmental Protection Agency
Tributaries of the Kennebec River
Rivers of Sagadahoc County, Maine
Topsham, Maine
Rivers of Maine |
https://en.wikipedia.org/wiki/Muddy%20River%20%28Sebago%20Lake%29 | The Muddy River is a tributary of Sebago Lake in the U.S. state of Maine.
See also
List of rivers of Maine
References
Maine Streamflow Data from the USGS
Maine Watershed Data From Environmental Protection Agency
Rivers of Cumberland County, Maine
Rivers of Maine |
https://en.wikipedia.org/wiki/Northwest%20River%20%28Maine%29 | The Northwest River is an tributary of Sebago Lake in Maine.
See also
List of rivers of Maine
References
Maine Streamflow Data from the USGS
Maine Watershed Data From Environmental Protection Agency
Rivers of Cumberland County, Maine
Rivers of Maine |
https://en.wikipedia.org/wiki/Ogunquit%20River | The Ogunquit River is a tidal river in southern Maine. It flows to the Atlantic Ocean at the town of Ogunquit.
Images
See also
List of rivers of Maine
References
Maine Streamflow Data from the USGS
Maine Watershed Data From Environmental Protection Agency
Rivers of York County, Maine
Ogunquit, Maine
Rivers of Maine |
https://en.wikipedia.org/wiki/223rd%20Cyberspace%20Operations%20Squadron | The United States Air Force's 223rd Cyberspace Operations Squadron (223 COS) is an Air National Guard Cyberspace Operations unit located at Little Rock Air Force Base, Arkansas.
Mission
The Mission of the 223rd Cyberspace Operations Squadron is to maintain an operational mindset led by members who use agile cyberwarfare instruction to provide qualification training, exercises, and assessments for total force utilizing a diverse ensemble of qualified cyberwarfare operators and cyberspace ranges for the purpose of evolving persistent cyber defense capabilities.
History
The 223rd began as the 8201st Air Base Squadron on 1 May 1952. The 8201st was discontinued on 30 November 1952 and became the 223rd radio Relay Squadron on 1 December 1952. With an authorized strength of four officers and 95 airmen, the 223rd had a mission to install and operate five radio relay stations and three radio terminals under field conditions. First Lt. Joe A. Holbrook became the Commanding Officer of the newly formed unit and held that position until March 1955. The unit was assigned to the Continental Air Command (CONAC), located at Selfridge AFB, Michigan.
Under Lt. Holbrook's command, recruiting took priority and the unit quadrupled in size within months. The unit's first exercise began on 5 July 1953, setting up a base station at the Garland County Municipal Airport and a second site at the Fairgrounds. There call signs were Zekeamoto Alpha and Zekeamoto Extra.
Captain George C. Bolton replaced Lt. Holbrook as commanding officer on 13 March 1955 and would hold that position until 1971. Lt. Holbrook's career with the 223rd was far from over. Through the years he was promoted to the rank of lieutenant colonel, but would later accept a demotion to the enlisted ranks with a rank of master sergeant so that he could remain in the unit. The respect that Joe Holbrook earned in his decades with the unit would earn him the nickname "Sergeant Colonel Holbrook", and his men would proudly admit they continued to call him "Sir" even after joining the enlisted ranks.
The 223rd was federally activated by President Dwight D. Eisenhower on 24 September 1957 to assist in the Little Rock Integration Crisis. During this time, a new building was under construction; the same building they would call home until the unit's closure in 2006. By 1960, the 223rd had gained recognition as a premier Radio Relay Squadron. The unit's manning increased to ten officers and 181 airmen, and they gained Food Services and Medical Services. The ongoing joke at the time was that introduction of both services at the same time was necessary, as you could not have a chow hall without having a medic.
In 1968, the unit's name changed to the 223rd Mobile Communications squadron, as they received Troposcatter radios, High Frequency (HF) radios, a Tactical Communications Center, Technical Control facilities, Tactical Switchboards and Cryptographic functions. Four months after receiving this equipment, virtually |
https://en.wikipedia.org/wiki/Base%20period%20price | A base period price is the average price for an item in a specified time period used as a base
for an index, such as 1910–14, 1957–59, 1967, 1977, or 1982. Time series of data are often
deflated to a base period price. Such deflated time series are referred to as constant dollar
values (versus nominal dollar values).
References
Pricing |
https://en.wikipedia.org/wiki/Double%20Take%20%28Australian%20TV%20series%29 | Double Take is an Australian sketch comedy series which premiered on the Seven Network on 23 July 2009. The series ended just over two months later on 24 September 2009.
It featured a number of sketches (notably, the song "9 to 9" (parodying Dolly Parton's "9 to 5") that became highly popular viral internet items, and led to the appearance of two of the programme's stars, Amanda Bishop and Paul McCarthy, in the ABC1 sitcom At Home With Julia (2011) co-written and produced by one of the show's co-creators, Rick Kalowski.
Cast
Hollie Andrew
Amanda Bishop
Helen Dallimore
Guy Edmonds
Robin Goldsworthy
Paul McCarthy
Darren Weller
Format
Double Take involves the presentation of a variety of skits, parodying famous people and television shows. Instead of fewer, longer sketches, episodes are usually structured to include many skits with longer sketches broken up into segments often concluding after a second or third run.
Impersonations
Notable programs
Double Take features original skits, parodies of other television programmes and films.
There are parodies of community television's Channel 31 or many TV shows on other networks (such as Channel 7, 9, 10, SBS and the ABC). As well as various sport coverage or news bulletins, and Australian films to classic movies.
Reception
The debut episode of Double Take rated reasonably well, attracting an audience of 1.08 million people and winning the night among the coveted 25- to 54-year-old viewers' demographic. Subsequent ratings varied wildly between as many as 1,000,000 and as few as 400,000 viewers, although the show remained very popular among younger viewers throughout its run.
Surprisingly, for a sketch comedy show (typically regarded by critics as a 'low art'), Double Take was well received by reviewers writing for Australia's major broadsheet newspapers The Sydney Morning Herald, The Age and The Australian, while earning negative criticism only from the more tabloid Daily Telegraph.
External links
Australian television sketch shows
2009 Australian television series debuts
2009 Australian television series endings
Television series by Fremantle (company)
Television shows set in Australia
Seven Network original programming |
https://en.wikipedia.org/wiki/Rail%20transport%20in%20Belarus | Rail transport in Belarus is owned by the national rail company BŽD / BČ (be: Bielaruskaja Čyhunka / ru: Belorusskaja Železnaja Doroga). The railway network consists of 5,512 km, its gauge is (Russian broad gauge) and 874 km are electrified.
History
The first line crossing the country was the Saint Petersburg–Warsaw Railway, which started operating in late 1862. This included section and railway station in Hrodna. During the mid-1860s, railway line was built also from Daugavpils to Polatsk and further to Vitebsk. Line Warsaw-Brest, opened in 1866, completed to Moscow in 1871.
Network
Belarus is crossed, from Brest to Orsha through Minsk, by an international rail line connecting Berlin and Warsaw to Moscow. Other important lines are the Minsk-Gomel (to Kyiv), the Orsha-Vitebsk (to Saint Petersburg), the Minsk-Vilnius and others. Some international trains serving Belarus are the Pribaltika Riga-Odesa, the Minsk-Irkutsk and the Sibirjak Berlin-Novosibirsk (and other Russian destinations).
The national network has no high-speed lines and is not served by high-speed trains.
Urban railways
Minsk is the only city with a subway system, the Minsk Metro. The network consists of three lines: Awtazavodskaya, Maskoŭskaja and Zelenaluzhskaya.
The only cities with tramway systems are Minsk, Vitebsk, Mazyr and Novopolotsk.
Rail links to adjacent countries
(Poland) – yes – break-of-gauge /
(Lithuania) – yes
(Latvia) – yes
(Russia) – yes
(Ukraine) – yes (closed)
See also
Transport in Belarus
List of town tramway systems in Belarus
Children's Railroad of Minsk
Rail transport in the Soviet Union
References
External links
BŽD official website
Railway network map of Belarus
Belarus |
https://en.wikipedia.org/wiki/Technical%20informatics | Technical informatics is a European computer engineering equivalent, which includes, among others, digital logic and computational circuits, processor design, logic synthesis, computer architecture and organisation, low-level programming, firmware design, digital signal processing, embedded systems and physical computing.
This discipline is usually taught at vocational universities up to a master's degree level.
Literature
References
See also
alternative computing
computer architecture
Computer science education |
https://en.wikipedia.org/wiki/C11%20%28C%20standard%20revision%29 | C11 (formerly C1X) is an informal name for ISO/IEC 9899:2011, a past standard for the C programming language. It replaced C99 (standard ISO/IEC 9899:1999) and has been superseded by C17 (standard ISO/IEC 9899:2018). C11 mainly standardizes features already supported by common contemporary compilers, and includes a detailed memory model to better support multiple threads of execution. Due to delayed availability of conforming C99 implementations, C11 makes certain features optional, to make it easier to comply with the core language standard.
The final draft, N1570, was published in April 2011. The new standard passed its final draft review on October 10, 2011 and was officially ratified by ISO and published as ISO/IEC 9899:2011 on December 8, 2011, with no comments requiring resolution by participating national bodies.
A standard macro __STDC_VERSION__ is defined with value 201112L to indicate that C11 support is available.
Changes from C99
The standard includes several changes to the C99 language and library specifications, such as
Alignment specification (_Alignas specifier, _Alignof operator, aligned_alloc function, <stdalign.h> header)
The _Noreturn function specifier and the <stdnoreturn.h> header
Type-generic expressions using the _Generic keyword. For example, the following macro cbrt(x) translates to cbrtl(x), cbrt(x) or cbrtf(x) depending on the type of x:
#define cbrt(x) _Generic((x), long double: cbrtl, \
default: cbrt, \
float: cbrtf)(x)
Multi-threading support (_Thread_local storage-class specifier, <threads.h> header including thread creation/management functions, mutex, condition variable and thread-specific storage functionality, as well as <stdatomic.h> for atomic operations supporting the C11 memory model).
Improved Unicode support based on the C Unicode Technical Report ISO/IEC TR 19769:2004 (char16_t and char32_t types for storing UTF-16/UTF-32 encoded data, including conversion functions in <uchar.h> and the corresponding u and U string literal prefixes, as well as the u8 prefix for UTF-8 encoded literals).
Removal of the gets function (in favor of safer fgets), which was deprecated in the previous C language standard revision, ISO/IEC 9899:1999/Cor.3:2007(E).
Bounds-checking interfaces (Annex K).
Analyzability features (Annex L).
More macros for querying the characteristics of floating-point types, concerning subnormal floating-point numbers and the number of decimal digits the type is able to store.
Anonymous structures and unions, useful when unions and structures are nested, e.g. in .
Static assertions, which are evaluated during translation at a later phase than #if and #error, when types are understood by the translator.
An exclusive create-and-open mode ("…x" suffix) for fopen. This behaves like O_CREAT|O_EXCL in POSIX, which is commonly used for lock files.
The quick_exit function as a third way to terminate a program, intended to do at lea |
https://en.wikipedia.org/wiki/List%20of%20minor%20planets%3A%20199001%E2%80%93200000 |
199001–199100
|-bgcolor=#fefefe
| 199001 || || — || November 25, 2005 || Kitt Peak || Spacewatch || — || align=right data-sort-value="0.89" | 890 m ||
|-id=002 bgcolor=#fefefe
| 199002 || || — || November 28, 2005 || Junk Bond || D. Healy || — || align=right | 1.2 km ||
|-id=003 bgcolor=#FFC2E0
| 199003 || || — || November 29, 2005 || Socorro || LINEAR || ATE +1kmPHA || align=right data-sort-value="0.84" | 840 m ||
|-id=004 bgcolor=#fefefe
| 199004 || || — || November 22, 2005 || Kitt Peak || Spacewatch || — || align=right | 1.0 km ||
|-id=005 bgcolor=#fefefe
| 199005 || || — || November 22, 2005 || Kitt Peak || Spacewatch || CLA || align=right | 2.5 km ||
|-id=006 bgcolor=#fefefe
| 199006 || || — || November 25, 2005 || Mount Lemmon || Mount Lemmon Survey || FLO || align=right data-sort-value="0.79" | 790 m ||
|-id=007 bgcolor=#fefefe
| 199007 || || — || November 26, 2005 || Mount Lemmon || Mount Lemmon Survey || MAS || align=right | 1.00 km ||
|-id=008 bgcolor=#fefefe
| 199008 || || — || November 25, 2005 || Kitt Peak || Spacewatch || FLO || align=right data-sort-value="0.98" | 980 m ||
|-id=009 bgcolor=#fefefe
| 199009 || || — || November 26, 2005 || Mount Lemmon || Mount Lemmon Survey || — || align=right data-sort-value="0.93" | 930 m ||
|-id=010 bgcolor=#fefefe
| 199010 || || — || November 25, 2005 || Mount Lemmon || Mount Lemmon Survey || — || align=right | 1.1 km ||
|-id=011 bgcolor=#fefefe
| 199011 || || — || November 28, 2005 || Mount Lemmon || Mount Lemmon Survey || MAS || align=right | 1.1 km ||
|-id=012 bgcolor=#fefefe
| 199012 || || — || November 28, 2005 || Mount Lemmon || Mount Lemmon Survey || — || align=right | 1.1 km ||
|-id=013 bgcolor=#fefefe
| 199013 || || — || November 25, 2005 || Mount Lemmon || Mount Lemmon Survey || FLO || align=right | 1.1 km ||
|-id=014 bgcolor=#fefefe
| 199014 || || — || November 26, 2005 || Catalina || CSS || — || align=right | 1.1 km ||
|-id=015 bgcolor=#fefefe
| 199015 || || — || November 28, 2005 || Catalina || CSS || — || align=right | 2.8 km ||
|-id=016 bgcolor=#fefefe
| 199016 || || — || November 25, 2005 || Mount Lemmon || Mount Lemmon Survey || FLO || align=right | 1.1 km ||
|-id=017 bgcolor=#fefefe
| 199017 || || — || November 25, 2005 || Mount Lemmon || Mount Lemmon Survey || — || align=right | 1.7 km ||
|-id=018 bgcolor=#fefefe
| 199018 || || — || November 26, 2005 || Kitt Peak || Spacewatch || — || align=right data-sort-value="0.69" | 690 m ||
|-id=019 bgcolor=#fefefe
| 199019 || || — || November 26, 2005 || Kitt Peak || Spacewatch || — || align=right | 1.3 km ||
|-id=020 bgcolor=#fefefe
| 199020 || || — || November 26, 2005 || Kitt Peak || Spacewatch || NYS || align=right | 1.0 km ||
|-id=021 bgcolor=#fefefe
| 199021 || || — || November 26, 2005 || Kitt Peak || Spacewatch || V || align=right | 1.0 km ||
|-id=022 bgcolor=#fefefe
| 199022 || || — || November 28, 2005 || Mount Lemmon || Mount Lemmon Survey || V || align=right data-sort-value="0. |
https://en.wikipedia.org/wiki/Grigore%20Moisil%20National%20College%20of%20Computer%20Science%20%28Bra%C8%99ov%29 | Grigore Moisil National College of Computer Science is a high school in Brașov, Romania, that carries the name of academician Grigore Moisil, the "founder" of Romanian computer sciences.
History
The history of the high school dates to 1938.
Since the first part of the building was constructed in 1938, it has been the home of five institutions: Primary Schools 3 and 11, and later on, Secondary Schools 2, 6, and 4.
Along with the construction of the second building in 1960, the name was changed to "General Culture High School number 4".
The school year 1972 sees the introduction of a new profile, top notch at the time, and a new name for the school: "High School for Automatic Data Processing", which concerned computer science.
During 1973–1977 and 1990–2002, the institution's name was "Computer Science High School" (Romanian: "Liceul de Informatică"), while between 1977–1990 it was called "Mathematics – Physics High School number 1" (Romanian: "Liceul de Matematică – Fizică nr. 1").
In 2002, it took the name of "Grigore Moisil Computer Science National College".
Classes
Since 1990, the school has had, for each year
4 classes of intensive – computer science profile
1 class of intensive – English profile
There are a total of 20 classes (15 computer sciences + 5 English)
There are 28 students per class. That means 140 per year and a total of 700.
After admission, the top 28 that opt for the English class are sent to class 9A, and the rest are assigned, randomly and in equal proportions to classes 9B to 9E.
The high school only has day program.
Class hours are usually held Monday to Friday, from 8:00 AM to 3:00 PM.
Notable graduates
Notable graduates of the high school include:
Dumitru Prunariu (b. 1952) – first Romanian cosmonaut; currently, division general with 2 stars, in reserve
(b. 1956) – Romanian politician, member of PNL, former mayor of Brașov (1996–2004), currently deputy for PNL
Victor Socaciu (b. 1953) – Romanian folk musicians; in the jury of the Golden Stag
(b. 1943) – academician, director of the Romanian Institute of Geography
Daniel Capatos (b. 1973) – reality show host
Mihai Dobrovolski (b. 1974) – radio host, founder of Radio Guerilla
Raluca Arvat (b. 1975) – journalist, sport news section host for Pro TV
Ernest Takacs (b. 1980) – TV presenter
References
External links
Official site
Moisil
National Colleges in Romania
1938 establishments in Romania
Educational institutions established in 1938 |
https://en.wikipedia.org/wiki/The%20100%20Mile%20Challenge | The 100 Mile Challenge is a Canadian reality television series produced by Paperny Entertainment and aired on Food Network Canada. The series follows the lives and eating habits of six families living in Mission, British Columbia, who, for a period of 100 days, agreed to only consume food and drink that has been grown, raised and produced within a 100-mile (160 kilometre) radius from Mission. The series is based on the concept of local food consumption as described in the book The 100-Mile Diet authored by J.B. MacKinnon and Alisa Smith where the two authors describe their experience of eating locally for one full year. To coincide with the premiere of the series, FoodTV.ca launched a companion website that Canwest described as "the largest, most innovative and interactive companion website to a series to date".
After the series' initial run was concluded, it was announced that the global distribution rights to both the format and the program were acquired by the British company Passion Distribution after which Discovery Communications' Planet Green acquired the rights to broadcast the series in the United States.
The success of the series has also inspired other communities in Canada to organize similar challenges.
Episodes
Episode 1 — Day 1: The Purge
J.B. MacKinnon (James) and Alisa Smith hold an information and recruitment session at a community hall in Mission, British Columbia. Their goal is to educate people on the distance that their food travels from the point of origin to their table as well as to find volunteers willing to take on a challenge where they will only consume food and drink that's been grown and produced within a 100-mile (160 kilometre) radius of their homes. Many people sign up and James and Alisa focus on six families whose progress the series will follow: Clark-Vernon, Hawes, McIntosh, Peters, St. Cyr and Weremchuk-Williams.
All of the families are allowed to have one final meal of their favourite foods regardless of that food's origin. The next day, James and Alisa remove from each family's home all food, drinks, spices and condiments that are non-local — meaning anything grown or produced outside of the prescribed 100-mile radius. The six families, who were previously unaware that the vast majority of the food in their home was grown and produced well over 100 miles away, are now left with mostly empty cupboards and pantries. Items removed from homes included such staples as bread, milk, eggs, potatoes, rice, pasta, oil, coffee, sugar and salt. The families are left facing their first challenge when trying to prepare breakfast the next morning.
One of the participants in the challenge is Steve Peters who owns a local grocery store. Steve dedicates a section of his store to food that strictly conforms to the guidelines of the challenge in order to help out the other families.
Episode 2 — Days 4 to 22: Back to Basics
On the very first day of the diet, the McIntosh family drops out of the challenge. Kyle McIntosh, |
https://en.wikipedia.org/wiki/Mung | Mung may refer to:
Mung (computer term), the act of making several incremental changes to an item that combine to destroy it
Mung bean, a bean native to Bangladesh, India, and Pakistan
Rafael Cabrera Airport (ICAO code MUNG)
A fouling material (a disgusting substance)
The common name of the brown algae Pylaiella
A transliteration of the Korean word 멍멍, an onomatopoeia for bark (dog)
MUNG, acronym of Military University Nueva Granada
Mung Chiang, computer scientist and academic
Le Mung, commune in southwestern France
Mung, a dialect or related language of the Phunoi language of Laos
Malevolent spirits in Mun (religion) of the Lepcha people of Sikkim
In fiction:
Mung, Lord of all Deaths, a god in Lord Dunsany's short story collection The Gods of Pegāna
Mung Daal, a character in the cartoon series Chowder
Mung the Inconceivable, a member of the Warbound, appearing in Hulk comics
Mung, Lord Dregg's second-in-command in the cartoon series Teenage Mutant Ninja Turtles
See also
Hmong people |
https://en.wikipedia.org/wiki/16-bit%20computing | 16-bit microcomputers are microcomputers that use 16-bit microprocessors.
A 16-bit register can store 216 different values. The range of integer values that can be stored in 16 bits depends on the integer representation used. With the two most common representations, the range is 0 through 65,535 (216 − 1) for representation as an (unsigned) binary number, and −32,768 (−1 × 215) through 32,767 (215 − 1) for representation as two's complement. Since 216 is 65,536, a processor with 16-bit memory addresses can directly access 64 KB (65,536 bytes) of byte-addressable memory. If a system uses segmentation with 16-bit segment offsets, more can be accessed.
16-bit architecture
The MIT Whirlwind ( 1951) was quite possibly the first-ever 16-bit computer. It was an unusual word size for the era; most systems used six-bit character code and used a word length of some multiple of 6-bits. This changed with the effort to introduce ASCII, which used a 7-bit code and naturally led to the use of an 8-bit multiple which could store a single ASCII character or two binary coded decimal digits.
The 16-bit word length thus became more common in the 1960s, especially on minicomputer systems. Early 16-bit computers ( 1965–70) include the IBM 1130, the HP 2100, the Data General Nova, and the DEC PDP-11. Early 16-bit microprocessors, often modeled on one of the mini platforms, began to appear in the 1970s. Examples ( 1973–76) include the five-chip National Semiconductor IMP-16 (1973), the two-chip NEC μCOM-16 (1974), the three-chip Western Digital MCP-1600 (1975), and the five-chip Toshiba T-3412 (1976).
Early single-chip 16-bit microprocessors ( 1975–76) include the Panafacom MN1610 (1975), National Semiconductor PACE (1975), General Instrument CP1600 (1975), Texas Instruments TMS9900 (1976), Ferranti F100-L, and the HP BPC. Other notable 16-bit processors include the Intel 8086, the Intel 80286, the WDC 65C816, and the Zilog Z8000. The Intel 8088 was binary compatible with the Intel 8086, and was 16-bit in that its registers were 16 bits wide, and arithmetic instructions could operate on 16-bit quantities, even though its external bus was 8 bits wide.
16-bit processors have been almost entirely supplanted in the personal computer industry, and are used less than 32-bit (or 8-bit) CPUs in embedded applications.
16/32-bit Motorola 68000 and Intel 386SX
The Motorola 68000 is sometimes called 16-bit because of the way it handles basic arithmetic. The instruction set was based on 32-bit numbers and the internal registers were 32 bits wide, so by common definitions, the 68000 is a 32-bit design. Internally, 32-bit arithmetic is performed using two 16-bit operations, and this leads to some descriptions of the system as 16-bit, or "16/32".
Such solutions have a long history in the computer field, with various designs performing math even 1-bit at a time, known as "serial arithmetic", while most designs by the 1970s processed at least a few bits at a time. A common examp |
https://en.wikipedia.org/wiki/10%20Gigabit%20Ethernet | 10 Gigabit Ethernet (abbreviated 10GE, 10GbE, or 10 GigE) is a group of computer networking technologies for transmitting Ethernet frames at a rate of 10 gigabits per second. It was first defined by the IEEE 802.3ae-2002 standard. Unlike previous Ethernet standards, 10GbE defines only full-duplex point-to-point links which are generally connected by network switches; shared-medium CSMA/CD operation has not been carried over from the previous generations of Ethernet standards so half-duplex operation and repeater hubs do not exist in 10GbE. The first standard for faster 100 Gigabit Ethernet links was approved in 2010.
The 10GbE standard encompasses a number of different physical layer (PHY) standards. A networking device, such as a switch or a network interface controller may have different PHY types through pluggable PHY modules, such as those based on SFP+. Like previous versions of Ethernet, 10GbE can use either copper or fiber cabling. Maximum distance over copper cable is 100 meters but because of its bandwidth requirements, higher-grade cables are required.
The adoption of 10GbE has been more gradual than previous revisions of Ethernet: in 2007, one million 10GbE ports were shipped, in 2009 two million ports were shipped, and in 2010 over three million ports were shipped, with an estimated nine million ports in 2011. , although the price per gigabit of bandwidth for 10GbE was about one-third compared to Gigabit Ethernet, the price per port of 10GbE still hindered more widespread adoption.
By 2022, the price per port of 10GBase-T had dropped to $50 - $100 depending on scale. In 2023, Wi-Fi 7 routers began appearing with 10GbE WAN ports as standard.
Standards
Over the years the Institute of Electrical and Electronics Engineers (IEEE) 802.3 working group has published several standards relating to 10GbE.
Physical layer modules
To implement different 10GbE physical layer standards, many interfaces consist of a standard socket into which different physical (PHY) layer modules may be plugged. PHY modules are not specified in an official standards body but by multi-source agreements (MSAs) that can be negotiated more quickly. Relevant MSAs for 10GbE include XENPAK (and related X2 and XPAK), XFP and SFP+. When choosing a PHY module, a designer considers cost, reach, media type, power consumption, and size (form factor). A single point-to-point link can have different MSA pluggable formats on either end (e.g. XPAK and SFP+) as long as the 10GbE optical or copper port type (e.g. 10GBASE-SR) supported by the pluggable is identical.
XENPAK was the first MSA for 10GE and had the largest form factor. X2 and XPAK were later competing standards with smaller form factors. X2 and XPAK have not been as successful in the market as XENPAK. XFP came after X2 and XPAK and it is also smaller.
The newest module standard is the enhanced small form-factor pluggable transceiver, generally called SFP+. Based on the small form-factor pluggable transceiver (SFP) |
https://en.wikipedia.org/wiki/Jonathan%20Lee%20%28satirist%29 | Jonathan Lee (born 10 June) is a Creative Director at the advertising network Havas. He is best known, however, for his work as a writer, satirist and humorist. He is best known for his satirical work and in particular his spoof diary accounts of cricket captains Andrew Strauss and Ricky Ponting. He is also the co-founder of the British humour website 7 Reasons. He currently authors the successful blog series 'Responsibilities of an adman' and lives in Fulham, London.
Work
Satire
Lee is perhaps best known for his work as the author of the spoof diaries of cricket captains Andrew Strauss and Ricky Ponting. The diaries entitled 'Strauss v Ponting: The Captain's Ashes Diaries' were first written during the 2009 Ashes in England. In November 2010, the second set of diaries were started in-line with the 2010/11 Ashes in Australia. After the 2009 Ashes, Lee created the spin-off character Sir Straussy. Based on Andrew Strauss, Sir Straussy writes about his time as England Cricket Captain. In October 2010, Sir Straussy was selected as the second funniest spoof account on Twitter by GQ Australia. In the past Lee has also spoofed Grace Kelly in ShortList magazine and the television and radio presenter Richard Bacon. Lee's spoofing of Bacon became a regular part of the host's BBC Radio 5 Live show in 2009.
7 Reasons
In October 2009, Lee started the topical humour site 7 Reasons with fellow humorist and writer Marc Fearns. The two met through Richard Bacon having both proved popular guests on Bacon's Radio 5 Live show. 7 Reasons aims to provide users with seven reasons each day for a particular topic. In December 2009 the site was selected as The Best Thing To Read by The Guardian newspaper. In late 2010 the idea was being turned into a column for the UK edition of the men's magazine Esquire.
Is This You?
Is This You? is Lee's account of his three-year quest to find his best friend's look-alike. It came about after he took a photo in Sydney in 2006 that featured what Lee believed to be his best friend. His work came to light when he started doing flash-mob book readings. The book was due for release in 2010, but has been postponed while Lee concentrates on other projects.
US iPod Challenge
When Lee appeared on Denmark's TV2 in August 2009, he said his next project was to travel across America 25 times in order to find out whether a claim made by iPod manufacturer Apple is correct. The claim states that it is possible to travel between New York and San Francisco 25 times without hearing the same song twice on an 80GB iPod.
Responsibilities of an adman
Lee's most recent body of work is a blog concerning the advertising industry and responsibilities of its members. It is published on the professional networking site LinkedIn and although less satirical than his usual output has been generally well received. The first edition, named 'Chapter A', reached up to 11 likes. His second post however has been less popular so far, containing the word 'nipples' and |
https://en.wikipedia.org/wiki/Kunihiko%20Fukushima | Kunihiko Fukushima (Japanese: 福島 邦彦, born 16 March 1936) is a Japanese computer scientist, most noted for his work on artificial neural networks and deep learning. He is currently working part-time as a senior research scientist at the Fuzzy Logic Systems Institute in Fukuoka, Japan.
Notable scientific achievements
In 1980, Fukushima published the neocognitron,
the original deep convolutional neural network (CNN) architecture. Fukushima proposed several supervised and unsupervised learning algorithms to train the parameters of a deep neocognitron such that it could learn internal representations of incoming data. Today, however, the CNN architecture is usually trained through backpropagation. This approach is now heavily used in computer vision.
In 1969 Fukushima introduced the ReLU (Rectifier Linear Unit) activation function in the context of visual feature extraction in hierarchical neural networks. It was later argued that it has strong biological motivations and mathematical justifications. In 2011 it was found to enable better training of deeper networks, compared to the widely used activation functions prior to 2011, e.g., the logistic sigmoid (which is inspired by probability theory; see logistic regression) and its more practical counterpart, the hyperbolic tangent. The rectifier is, , the most popular activation function for deep neural networks.
Education and Career
In 1958, Fukushima received his Bachelor of Engineering in electronics from Kyoto University. He became a senior research scientist at the NHK Science & Technology Research Laboratories. In 1989, he joined the faculty of Osaka University. In 1999, he joined the faculty of the University of Electro-Communications. In 2001, he joined the faculty of Tokyo University of Technology. From 2006 to 2010, he was a visiting professor at Kansai University.
Fukushima acted as founding president of the Japanese Neural Network Society (JNNS). He also was a founding member on the board of governors of the International Neural Network Society (INNS), and president of the Asia-Pacific Neural Network Assembly (APNNA).
He was one of the board of governors of the International Neural Network Society (INNIS) in 2003.
Awards
In 2020 Fukushima received the Bower Award and Prize for Achievement in Science. He also received the IEICE Achievement Award and Excellent Paper Awards, the IEEE Neural Networks Pioneer Award, the APNNA Outstanding Achievement Award, the JNNS Excellent Paper Award and the INNS Helmholtz Award.
External links
ResearchMap profile
References
Artificial intelligence researchers
Japanese computer scientists
Living people
Machine learning researchers
Year of birth missing (living people)
Benjamin Franklin Medal (Franklin Institute) laureates |
https://en.wikipedia.org/wiki/Time%20delay%20neural%20network | Time delay neural network (TDNN) is a multilayer artificial neural network architecture whose purpose is to 1) classify patterns with shift-invariance, and 2) model context at each layer of the network.
Shift-invariant classification means that the classifier does not require explicit segmentation prior to classification. For the classification of a temporal pattern (such as speech), the TDNN thus avoids having to determine the beginning and end points of sounds before classifying them.
For contextual modelling in a TDNN, each neural unit at each layer receives input not only from activations/features at the layer below, but from a pattern of unit output and its context. For time signals each unit receives as input the activation patterns over time from units below. Applied to two-dimensional classification (images, time-frequency patterns), the TDNN can be trained with shift-invariance in the coordinate space and avoids precise segmentation in the coordinate space.
History
The TDNN was introduced in the late 1980s and applied to a task of phoneme classification for automatic speech recognition in speech signals where the automatic determination of precise segments or feature boundaries was difficult or impossible. Because the TDNN recognizes phonemes and their underlying acoustic/phonetic features, independent of position in time, it improved performance over static classification. It was also applied to two-dimensional signals (time-frequency patterns in speech, and coordinate space pattern in OCR).
Max pooling
In 1990, Yamaguchi et al. introduced the concept of max pooling. They did so by combining TDNNs with max pooling in order to realize a speaker independent isolated word recognition system.
Overview
The Time Delay Neural Network, like other neural networks, operates with multiple interconnected layers of perceptrons, and is implemented as a feedforward neural network. All neurons (at each layer) of a TDNN receive inputs from the outputs of neurons at the layer below but with two differences:
Unlike regular Multi-Layer perceptrons, all units in a TDNN, at each layer, obtain inputs from a contextual window of outputs from the layer below. For time varying signals (e.g. speech), each unit has connections to the output from units below but also to the time-delayed (past) outputs from these same units. This models the units' temporal pattern/trajectory. For two-dimensional signals (e.g. time-frequency patterns or images), a 2-D context window is observed at each layer. Higher layers have inputs from wider context windows than lower layers and thus generally model coarser levels of abstraction.
Shift-invariance is achieved by explicitly removing position dependence during backpropagation training. This is done by making time-shifted copies of a network across the dimension of invariance (here: time). The error gradient is then computed by backpropagation through all these networks from an overall target vector, but before perf |
https://en.wikipedia.org/wiki/Jinyeong%20station | Jinyeong Station is a railway station in South Korea. It is on the Gyeongjeon Line.
External links
Cyber station information from Korail
Railway stations in North Gyeongsang Province
Gimhae
Korea Train Express stations
Railway stations in South Korea opened in 1905 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.