source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/James%20Demmel | James Weldon Demmel Jr. (born October 19, 1955) is an American mathematician and computer scientist, the Dr. Richard Carl Dehmel Distinguished Professor of Mathematics and Computer Science at the University of California, Berkeley.
In 1999, Demmel was elected a member of the National Academy of Engineering for contributions to numerical linear algebra and scientific computing.
Biography
Born in Pittsburgh, Demmel did his undergraduate studies at the California Institute of Technology, graduating in 1975 with a B.S. in mathematics. He earned his Ph.D. in computer science in 1983 from UC Berkeley, under the supervision of William Kahan; his dissertation was entitled A Numerical Analyst's Jordan Canonical Form. After holding a faculty position at New York University for six years, he moved to Berkeley in 1990.
Academic works
Demmel is known for his work on LAPACK, a software library for numerical linear algebra and more generally for research in numerical algorithms combining mathematical rigor with high performance implementation. Prometheus, a parallel multigrid finite element solver written by Demmel, Mark Adams, and Robert Taylor, won the Carl Benz Award at Supercomputing 1999 and the Gordon Bell Prize for Adams and his coworkers at Supercomputing 2004.
Honors and awards
Demmel was elected as a member of the National Academy of Engineering in 1999, a fellow of the Association for Computing Machinery in 1999, a fellow of the IEEE in 2001, a fellow of SIAM in 2009, and a member of the United States National Academy of Sciences in 2011. Demmel was one of two scientists honored in 1986 with the Leslie Fox Prize for Numerical Analysis. In 1993, Demmel won the J.H. Wilkinson Prize in Numerical Analysis and Scientific Computing, and in 2010, he was the winner of the IEEE's Sidney Fernbach Award "for computational science leadership in creating adaptive, innovative, high-performance linear algebra software". In 2012 he became a fellow of the American Mathematical Society. He received the IEEE Computer Society Charles Babbage Award in 2013.
Personal life
Demmel is married to Katherine Yelick, who is also an ACM Fellow and professor of electrical engineering and computer science at UC Berkeley, and Associate Lab Director for Computing Sciences at Lawrence Berkeley National Laboratory.
References
External links
Home page at UC Berkeley
Living people
20th-century American mathematicians
21st-century American mathematicians
American computer scientists
Numerical analysts
California Institute of Technology alumni
University of California, Berkeley alumni
New York University faculty
Fellows of the Association for Computing Machinery
Fellows of the American Mathematical Society
Fellow Members of the IEEE
Members of the United States National Academy of Sciences
Members of the United States National Academy of Engineering
UC Berkeley College of Engineering faculty
1955 births
People from Pittsburgh |
https://en.wikipedia.org/wiki/MClone | MClone, or Clonal Mosaic, is a pattern formation algorithm proposed in 1998 used specially for simulating the visible patches of color in the fur of giraffes and members of the Felidae of the mammalians. It was primarily proposed as a 2D model and lately was extended to 3D. An important feature of the algorithm is that it is biologically plausible.
Since the algorithm was created in order to address some of the problems with texture mapping, its main goal is to produce, with the same set of parameters, a variable number of color patterns for a 2D or 3D object model. This way, for a relatively big amount of different entities represented by the same model, instead of using the same texture (and, doing so, each object would be equal to the others), one could use the different color patterns created by the MClone algorithm. Another useful feature of MClone is that it can be used to create patterns along with growing data of the object model.
The algorithm
The MClone algorithm, essentially, works as follows: given the 3D model of the object which we want to create a new pattern, we first randomly place n cells on the model's surface. Each cell has a type, which defines many cell's properties, including its color. This way, for instance, if we want to simulate a pattern that has only two colors, we should use just two types of cells.
Now that the model has the defined cells, and they are placed randomly, we want them to create a pattern. For this to happen, we make relaxations between all cells. We have two fundamental parameters in these relaxations: the mitosis rate of each cell type (which indicates the delay in days for the cell type multiplication) and the adhesion rate of each cell type to the others (and to itself too). This last one is a number smaller than 1 that subtracts from the resultant force of the relaxation (thus, keeping the cells together).
Each relaxation happens has a defined "day" in which it occurs (this is the way MClone calls the relaxation process). The number of relaxations per day is defined at the beginning of the algorithm. The mitosis rate is defined as a number that indicates in how many days a cell is going to reproduce "again". For example, if the mitosis rate of a given cell type is 4, the cells of that cell type are going to reproduce themselves in average every 4 days (i.e., for a cell born in the first day, it reproduces itself in the fifth day, and in the ninth day, and so on).
Passed a given number of days, we are going to have a well defined pattern, which can be, or not be what we were waiting for. Although it could not seem intuitive through the explanation above, an important feature of the algorithm is that it is easy to predict how it will become a pattern just after taking a look at the parameters passed to the algorithm.
References
External links
Computer graphics algorithms |
https://en.wikipedia.org/wiki/Scooby-Doo%21%20Legend%20of%20the%20Phantosaur | Scooby-Doo! Legend of the Phantosaur is a 2011 direct-to-video film based on Scooby-Doo. The film was released on September 6, 2011. It premiered on Cartoon Network on September 3, 2011.
Plot
Shaggy discovers he has a disorder which causes him to unhealthily overreact to anything frightening, putting an end to Mystery Inc. The gang takes him to a spa resort in the town of La Serena to calm his nerves. While the gang meets the resort owner, Mr. Hubley, Scooby-Doo has a run-in with a dinosaur and keeps it to himself to spare Shaggy's fears. The gang soon meets Professor Svankmajer and her student Winsor, the paleontologists in charge of an archaeological dig, before they see a large "ghost dinosaur". Scooby rescues Shaggy, paralyzed by fear, and is subsequently chased by the dinosaur until they are saved by Fred, who knocks the dinosaur off of a cliff while driving the Mystery Machine.
Mr. Hubley tells the legend of the "Phantosaur": a phantom dinosaur summoned by Native Americans to regain their land stolen by European colonists. Mr. Hubley hypnotizes Shaggy into being confident and fearless so long as he hears a keyword, the same word of which will return Shaggy to his original state of mind. However, no one, including Mr. Hubley and Shaggy, remembers what the keyword is.
At the dig site entrance, Daphne, Fred, and Velma notice dinosaur tracks and potential snake tracks. Meanwhile, at a buffet, Shaggy upsets a gang of bikers who threaten him but in doing so say the keyword, triggering the effects of his hypnotherapy. Shaggy defeats the biker gang in a brawl and agrees to a motorcycle race. However, Shaggy hears the keyword while parting ways with the bikers, returning him to his original state of mind.
As Velma plans a dinner date with Windsor, Daphne and Fred find a mining company van and witness company members meddling around the handcar Scooby escaped on and retrieving a dinosaur tooth. Shaggy learns from Daphne how to ride a motorcycle, and just before the race starts hears the keyword. Gang leader Tex almost falls off a cliff but is saved by Shaggy, who earns Tex's respect in the process. The race is later interrupted by the phantosaur.
Daphne, Fred, and Velma notice the same mining company van from earlier, which now has attached cables that leave tracks similar to the tracks that they saw at the entrance of the dig. They and the bikers flood the van, revealing that the phantosaurs are actually animatronics used to scare the paleontologists away so as to retrieve a vein of silver.
Mr. Hubley tells the gang that his equipment for hypnosis was stolen. The gang follows some velociraptors into town to encounter a seemingly different phantosaur before it disappears. The next day, they present Professor Svankmajer with photos and find out that her camp was attacked. She lies to them about having sent Winsor home and intends to leave herself.
The gang learns that the velociraptors are graduate students in costume, the new phantosaur is a |
https://en.wikipedia.org/wiki/Multicast%20encryption | Multicast is what enables a node on a network to address one unit of data to a specific group of receivers.
In interactive multicast at the data link or network layer, such as IP multicast, Ethernet multicast or MBMS service over cellular network, receivers may join and leave the group using an interaction channel. Only one copy of the data is sent from the source, and multiple copies are created and then sent to the desired recipient by the network infrastructure nodes. In for example IP multicast, a multicast group is identified by a class D IP address. A host enters or exits a group using IGMP (Internet Group Management Protocol). A message sent via multicast is sent to all nodes on the network, but only the intended nodes accept the multicast frames. Multicasting is useful in situations such as video conferencing and online gaming. Multicast was used originally in LANs, with Ethernet being the best example. A problem with multicast communication is that it is difficult to guarantee that only designated receivers receive the data being sent. This is largely because multicast groups are always changing; users come and go at any time. A solution to the problem of ensuring that only the chosen recipient obtains the data is known as multicast encryption.
ISO Standards
The ISO (International Organization for Standardization) states that confidentiality, integrity, authentication, access control, and non-repudiation should all be considered when creating any secure system.
Confidentiality: No unauthorized party can access appropriate messages.
Integrity: Messages cannot be changed during transit without being discovered.
Authentication: The message needs to be sent by the person/machine who claims to have sent it.
Access control: Only those users enabled can access the data.
Non-repudiation: The receiver can prove that the sender actually sent the message.
To be secure, members who are just being added to the group must be restricted from viewing past data. Also, members removed from a group may not access future data.
Theories
One theory for the creation of an encryption protocol explains that ideally, each member of a group should have a key which changes upon the entrance or exit of a member of the group. Another theory suggests a primary key subsidized by additional keys belonging to legitimate group members. One protocol called UFTP (encrypted UDP based FTP over multicast) was created in an attempt to solve this problem. The protocol is designed in three phases: announce/register, file transfer, and completion/confirmation. The latest version 5.0 was released on 4/22/2020 and the source code is available in the website.
Current alternatives
Today, one alternative in multicast encryption involves the use of symmetric key encryption where data is decoded by intended receivers using a traffic encryption key (TEK). The TEK is changed any time a member joins or leaves the group. This is not feasible for large groups. Users must be continuou |
https://en.wikipedia.org/wiki/Hudson%20Hall%20%28arts%20organization%29 | Hudson Hall at the historic Hudson Opera House is an arts organization and venue in downtown Hudson, New York. The organization presents and produces arts and cultural programming year-round, and is an important civic partner in the vitality of Hudson. The building, constructed in 1855 as Hudson's city hall, is New York's oldest surviving theater.
History
The building was designed by local architect Peter H. Avery and was constructed in 1855 at 327 Warren Street. It was built as Hudson's first city hall, including a public space with a proposed 400 seats and space for 2,000 overall.
As city hall it was home to a number of things, including the post office, Franklin Library, and the First National Bank of Hudson. It also was used as a lecture hall and an art gallery. Around 1880, many American town halls were changing their names to "Opera House" to follow the fashion of the recently constructed Paris Opera house. Due to the trend, the Hudson Opera House was given its name. It was large enough to continue its government duties while holding different events such as "traveling lecture presentations and musical and theatrical events to local functions like dances, cotillions, poultry shows and graduations".
The second floor of the opera house was a "common ground where white and black citizens could meet”.
In 1962, after the city hall had relocated up Warren Street, the Hudson Opera House became a local Moose Lodge and was later sold to an out-of-town developer. Afterward, the building was left abandoned and began to decay. A group of concerned citizens gathered together to renovate the historical building; in 1992 they formed Hudson Opera House, Inc., a non-profit organization set on bringing the Hudson Opera House back to full community use. In 1996, the organization began a campaign which "raised the money to open the first restored room in the building, the West Room, in December 1997" (Hudson Opera House). Since that time the group has raised enough money to restore five other rooms on the first floor which host various cultural events.
Restoration
In December 1997, the Hudson Opera House, Inc. completed restoration of the first-floor West Room, with new floors, a new ceiling, and a re-painting. It is "in frequent use for concerts, lectures and community gatherings". (Hudson Opera House).
In March 2001, the Center Hall Gallery re-opened with rebuilt stairs and restrooms; it is used for exhibitions, receptions, and workshops. That September, the Workshop Room re-opened, and in 2002 the Lower Façade and the East Room Steps were restored. The Lower Façade Restoration was set up as originally constructed, while the East Room Steps were removed and replaced.
The East Room Offices were restored in 2003, and the Center Door Restoration in 2004. In 2008 Hudson Opera House installed a new roof and restored the existing 1855 monumental cornice on all four façades.
In 2016, restoration began on the historic upstairs performance hall, the lar |
https://en.wikipedia.org/wiki/FCC%20Network%20Study%20Committee | On July 20, 1955, the Federal Communications Commission (FCC) established the FCC Network Study Committee. It was composed of George C. McConnaughey, chairman, and Commissioners Rosel H. Hyde, Robert T. Bartley. and John C. Doerfer. The goal of the committee was to pursue provisions similar to that of section 5(d) of the Communications Act of 1934, and carry on such study with the same powers and jurisdiction conferred by law upon the commission as provided by that act.
The Report of the FCC Network Study Staff
The study was made to determine whether the contemporary operation of television networks and their relationships with stations and other components of the industry tended to foster or impede the development of a nationwide, competitive broadcasting system. The information from the study can be found in the FCC report titled Network Broadcasting, Report of The Network Study Staff to The Network Study Committee. The report was submitted on October 3, 1957, to the Network Study Committee of Commissioners. Public hearings eventually arose from matters contained in the report starting on March 3, 1958.
No comprehensive study of television broadcasting, for purposes of determining the efficacy of the commission's rules in achieving legislative and commission policy, had been made. The Chain Broadcasting Rules resulting from a study on radio broadcasting from 1938 to 1941, were applied to television without any changes, although there were big differences between the two media. Radio employed sound alone, while television used sight, sound, and motion. The number of radio stations over television stations, the scarcity of television outlets, high cost of television programming, and the fact that television stations were more dependent on networks for programming than radio made a study of the new medium important.
The study was undertaken by a staff of professional personnel recruited from government, industry and universities. It was to accept the network system of broadcasting, supported by advertising; to determine whether and to what extent the existing practices under that system obstruct the effectuation of legislative and Commission policies; and to recommend the minimum changes necessary to attain optimal broadcasting performance in the public interest under the existing broadcasting system. The Committee found that the best way to find this information would be by the use of a "study" technique. The technique included the following steps: a series of conferences with each component of the industry, at which the component made a presentation before the entire staff, explaining its functions and the problems in the industry as seen from the point of view of agencies, national representatives of stations, independent program producers and distributors, and networks; a substantial spot-check of the networks' files; preparation and submission of extensive questionnaires to television networks, all commercial stations, 60 advertising agenc |
https://en.wikipedia.org/wiki/Women%20in%20Film%20and%20Television%20International | Women in Film & Television International (WIFTI) is a global network of non-profit membership chapters. Established in 1997, it is dedicated to advancing professional development and achievement for women working in all areas of film, video, and other screen-based media.
Aims
Enhance the international visibility of women in the entertainment industry.
Facilitate and encourage communication and cooperation internationally.
Develop bold international projects and initiatives.
Stimulate professional development and global networking opportunities for women.
Promote and support chapter development.
Celebrate the achievements of women in all areas of the industry.
Encourage diverse and positive representation of women in screen-based media worldwide.
History
Women in Film Los Angeles was founded in 1973 by Tichi Wilkerson Kassel. After several Women in Film organizations were established in a variety of cities around the globe, Women in Film and Television International WIFTI was organized in the mid-1990s.
1973–1997
WIFTI chapters
Main sources:
Notes
1. WIF Los Angeles — Official Website: WomenInFilm.org
— see also, Women in Film Crystal + Lucy Awards
... WIFV Washington D.C. — Women in Film & Video-DC Women of Vision Awards
— The founders include Ginny Durrin, Judy Herbert, Sharon Ferguson, Christine Brim, Jan Hatcher, Norma Davidoff, Pat McMurray, Catherine Anderson, Lauren Versel, Michal Carr, Elise Reeder, and Polly Krieger.
2. WFTV United Kingdom — Official Website: WFTV UK
— The founders include Lynda La Plante, Norma Heyman, Jenne Casarroto, Dawn French, Joan Collins and Janet Street-Porter.
3. WIFT NZ — Official Website: WIFT NZ
History of WIFT in NZ, researched and written by Helen Martin, traces the history of Women in Film and Television, from the establishment of WIF in Los Angeles in 1973, through the founding of WIFT Wellington in 1994, to the 10th anniversary of WIFT Auckland in 2005.
4. , WIFT VIC and WIFT WA were operating as individual organisations, while WIFT NSW was in the process of transitioning up into WIFT Australia.
Programs
Women in Film-LA presents annual awards at their Women in Film Crystal + Lucy Awards ceremonies. In 1988, they presented the Lillian Gish Award for excellence in episodic directing.
Women in Film Foundation's Film Finishing Fund supports films by, for or about women.
There are 22 affiliate organizations of WIFTI in the United States. The Washington D.C. affiliate, Women in Film & Video, has presented Women of Vision awards annually since 1994 to honor creative and technical achievements of women in media. Women in Film & Video has held a WIFV annual film festival.
Women In Film & Television Short Film Showcase, or WIFTI Short-Case, is a demonstration of WIFTI members' creativity, vision, and artistry.
WIFTI Summits have been held bi-annually.
See also
Women in Film Crystal + Lucy Awards
Women in Film & Video-DC Women of Vision Awards
New York Women in |
https://en.wikipedia.org/wiki/Extreme%20Paranormal | Extreme Paranormal is an American paranormal documentary TV special that premiered on Monday, October 26, 2009, on A&E Network at 10pm EST. It aired as a two-part 1 hour special for Halloween and followed the missions of three paranormal investigators that go to extremes in order to make contact with spirits during their investigations.
Premise
In Extreme Paranormal, paranormal investigators, Shaun, Nathan, and Jason explore local legends, seeking the truth by provoking spirits and recreating tragedies during their investigations. Unlike other paranormal groups, this extreme team puts themselves in harm's way with their aggressive tactics by taunting ghosts, summoning the dead, performing rituals, challenging curses, and daring demons to attack them.
Opening: (narrator: Shaun): "Every town has a legend, a haunting, its own portal to hell. We knock on the door and say, "What's up?" (Show Yourself.) "Can the devil come out and play?" We're not your typical paranormal investigators. We set up experiments to provoke spirits. And we won't back down until we make contact. You can't take the heat. Stay out of hell."
Warning: "The views on the occult and the supernatural documented in this show are those of the investigators. Portions of the rituals in this episode have been omitted for your protection. Do not try this at home!"
Team Members
The team's plan is the same as always: "find the center of paranormal activity and keep cranking up the pressure until the spirit shows himself." They're known for provoking spirits and recreating the scenes a person might have walked through before their death. They have 10 years of experience in hunting demons and ghosts across America. Every night at midnight, they recount their latest adventures on their popular radio show, Ghostman and Demon Hunter.
Shaun Burris - Lead Investigator. Narrator, researches history of haunted locations. Co-host of Ghost Man and Demon Hunter Radio Show.
Nathan Schoonover - Occult Specialist. Performs different types of rituals during investigations. Co-host of Ghost Man and Demon Hunter Radio Show. (Was also featured on an episode of Paranormal Challenge competing with his paranormal team, New Jersey Ghost Hunters Society.)
Jason Gowin - Tech Expert. Handles all the equipment and builds special devices for cases.
Tom Maat (additional member for specialized cases) - Empathic shaman. An empath who is able to focus his energies and help paranormal investigators find where the spirits are located. He can sense and feel things from people, spirits around them, and even from the energy in the walls of buildings. He pinpoints the locations of where the most activity is in a place.
Equipment:
Parabolic microphone, night-vision camera, EMF meter, K-2 meter, digital audio recorder, thermal camera, and walkie-talkies.
Episode List
Season One (2009)
References
External links
Paranormal television
2000s American television specials
2009 television specials |
https://en.wikipedia.org/wiki/International%20Society%20for%20Computer%20Aided%20Surgery | The International Society for Computer Aided Surgery (ISCAS) is an INGO, whose purpose to promote all scientific and clinical advance of computer-aided surgery and related medical procedures around the world.
Objectives
Promoting technological basic and clinical research in that area
Promote a multidisciplinary approach, information exchange and cooperation between members of the association, `
Contribution to the promotion of technology transfer by industries related to computer-aided surgery and related medical procedures,
Participation in certain educational scheme for scientists, engineers and healthcare professionals as well as for young researchers in that area
Activities
Congresses, symposia, seminars
To reach the purposes, regular meetings with contributions from specialists in medicine, engineers, physicists and computer scientists from universities, hospitals, research institutions and industry are organized e. g. during the CARS (Computer Assisted Radiology and Surgery), an annual and international scientific conference, initiated in 1983 by the Senate of Berlin
Journals
ISCAS is involved in the publication of:
International Journal of Computer Assisted Radiology and Surgery by Springer,
ISCAS accreditation
The objective of the accreditation procedure is the assessment, improvement and public recognition of programmes or funding bodies for research and training in Computer Assisted Surgery (CAS), to enhance the quality of teaching and learning as well as to improve research and professional practice.
Awards and Scholarships
The society grants the following awards and scholarships to support young scientists and to recognize outstanding scientific work:
ISCAS-CARS Best Student Poster Awards
Olympus ISCAS Best Paper Award
ISCAS student scholarships
Koh Young young investigator scholarship
Kikuchi frugal technology award
Members
Active Members
Each person in the professional areas, engineering, healthcare, from scientific and industrial areas related to computer-assisted surgery and related medical interventions can be an active member.
Associate Members
Each national or international association with similar objectives, as well as any educational institution, industry, company or organization that is active in the area may apply for associate membership and become an affiliated society.
Honorary Members
Persons who distinguished themselves by special performance or substantially contributed to the development of the society have to be appointed as honorary members (without any obligation to pay membership fees).
See also
The MICCAI Society
References
Surgical organizations based in the United States
Computer-assisted surgery
International medical and health organizations
Medical and health organizations based in California |
https://en.wikipedia.org/wiki/Sirens%20%281999%20film%29 | Sirens is a 1999 crime-drama TV film starring Dana Delany. It premiered on September 26, 1999, on Showtime Networks.
Plot
Sally Rawlings is a white woman who is making out with Vincent Morgan, her black ex-husband in a parked car when a group of policemen surround the car and murder Vincent. The officers then plant phony evidence at the scene of the crime that would point the blame away from them – Sally knows this is a sham and is determined to find out the truth and bring the cops to justice.
Cast
Dana Delany as Sally Rawlings
Keith Carradine as Officer Dan Wexler
Justin Theroux as Officer David Bontempo
Vondie Curtis-Hall as Vincent Morgan
Brian Dennehy as Lieutenant Denby
Richard Blackburn as Sam Conrad
Jonathan Whittaker as District Attorney
Sabrina Grdevich as Sheryl
Julie Khaner as Fox Hills
Diego Fuentes as Sylvio
Karen Glave as Tyus
James Downing as Waranaco
Matthew Bennett as Roy Dancer
Carole Mackereth as Virginia
Victor Saldivia as Denuncio
Gloria Slade as Franny
Bruce Clayton as Meyer
Lili Francks as Julia Morgan
Kevin Hare as Hicks
Michael Mitchell as Vinnie
Tyson McAuley as Dougy
Robert B. Kennedy as Fenwick
Michael Stevens as Freddy
Von Flores as Assistant Coroner
Layton Morrison as Transvestite
External links
1999 films
1999 television films
1999 crime drama films
American crime drama films
American television films
Films about interracial romance
Films scored by Brian Tyler
1990s American films |
https://en.wikipedia.org/wiki/List%20of%20Manchester%20Metrolink%20tram%20stops | Since opening in 1992, the Manchester Metrolink light-rail/tram system has grown to a network of 99 tram stops.
The system opened in April 1992 with 20 tram stops with routes radiating from Manchester Victoria to Bury and Manchester Piccadilly to Altrincham. Phase 2 extended the network to Eccles with 12 new tram stops and a new interchange at Cornbrook was built in 1999. Phase 3a involved the construction of 36 new stops and new lines to Rochdale via Oldham, Tameside and East Didsbury. The first stops as part of Phase 3a opened in 2011 and the final stop opened in 2014. A new line to Manchester Airport became operational in November 2014 – 12 months ahead of schedule.
The network consists of over of track, making it the largest tram system in the United Kingdom and second only to the London Underground in terms of an urban commuter network. As of 2020, upon the completion of the Trafford Park Line, the Metrolink system has 99 stops. Primary future proposals include tram-trains to Bolton and Wigan and an extension from East Didsbury to Stockport.
List of Metrolink stops
Current stops
Correct as of 22 March 2020
Former stops
Fictional stops
Map
Future
Proposed
The proposed Manchester Airport High Speed station for the High Speed 2 extension to Manchester is expected to be connected to Manchester Airport by a newly constructed Wythenshawe Loop.
Buckley Wells, Elton Reservoir and Sandhills have been proposed as additional stops on the Bury Line, as well as Cop Road on the Oldham and Rochdale Line.
Cancelled
Some stops were planned along new lines but were eventually dropped.
Platforms
Metrolink tram stops have between one and four platforms, though most (91) have two platforms. Some are island platforms allowing easier transfers between services.
See also
List of fictional rapid transit stations
References
Manchester Metrolink tram stops
England transport-related lists |
https://en.wikipedia.org/wiki/EviMed | evimed GmbH is a German information service provider in the field of health care. The company offers software for the management of medical patient data. The software provided by evimed supports and automates processes of patient recruitment and feasibility studies as well as monitoring and documentation of clinical trials.
History
evimed was founded in Cologne in August, 2009. The company aims to improve the processes of patient recruitment in order to support the processing of clinical studies. Patient data are being stored in a database-driven system and can be matched for application in given studies based on matching appropriate medical parameters.
In February 2010, the company launched the world's biggest cancer database for individual therapy to date.
In 2014, evimed relocated to Frankfurt am Main (Hesse).
Service
evimed offers software for patient data management for clinical studies. The computer-based management of patient data significantly reduces the complexity of data handling for clinical research centers and physicians, offering automated matching of patient data with defined parameters for any given clinical study.
The software is built upon modular structures, offering functionality for clinical feasibility studies, as well as documentation and monitoring. Automated data matching allows for an exact choice of patient-specific parameters, linking it to the specific requirements of given studies. The software thus heads way for personalized medical treatment.
References
External links
Website of evimed GmbH
Health care companies of Germany
Medical and health organisations based in Hesse |
https://en.wikipedia.org/wiki/Aura%3A%20Fate%20of%20the%20Ages | Aura: Fate of the Ages is an adventure-genre computer game created by Canadian studio Streko-Graphics Inc. and published by The Adventure Company. In 2007, Streko-Graphics Inc. released the second chapter, Aura II: The Sacred Rings, which continues the story of the first game. The final chapter of Aura trilogy, Aura III: Catharsis, was originally slated to be released in 2011, but this project was eventually cancelled.
Reception
The game received "mixed" reviews according to the review aggregation website Metacritic.
IGN said, "What little Aura does to advance the genre it does remarkably well. In an age when encountering logical puzzles is as rare as pooping out gold nuggets, Aura shines as a game that attempts to bring a little reason into the mix." However, GameSpy said, "The few good puzzles contained within aren't worth the time and risk that you might not even be able to complete it."
References
External links
Official website
2004 video games
Aura (video game series)
Embracer Group franchises
Windows games
Windows-only games
Adventure games
Steampunk video games
The Adventure Company games
Video games developed in Canada |
https://en.wikipedia.org/wiki/Aura%20II%3A%20The%20Sacred%20Rings | Aura II: The Sacred Rings is an adventure-genre computer game created by Canadian studio Streko-Graphics Inc. and published by The Adventure Company.
Critical reception
The game has a Metacritic rating of 44% based on 18 critic reviews.
References
External links
Aura II: The Sacred Rings official website
Aura II: The Sacred Rings publisher
Aura II: The Sacred Rings developer
Windows games
Windows-only games
2007 video games
Aura (video game series)
Video game sequels
Adventure games
Video games developed in Canada
The Adventure Company games
Single-player video games |
https://en.wikipedia.org/wiki/Parlog | Parlog is a logic programming language designed for efficient utilization of parallel computer architectures. Its semantics is based on first order predicate logic. It expresses concurrency, interprocess communication, indeterminacy and synchronization within the declarative language framework.
It was designed at Imperial College, London by Steve Gregory and Keith L. Clark, as a descendant of IC Prolog and Relational Language.
Further reading
Tom Conlon, "Programming in Parlog", Addison-Wesley
References
Logic programming languages
Concurrent programming languages
Academic programming languages
Dynamically typed programming languages |
https://en.wikipedia.org/wiki/AN%20codes | AN codes are error-correcting code that are used in arithmetic applications. Arithmetic codes were commonly used in computer processors to ensure the accuracy of its arithmetic operations when electronics were more unreliable. Arithmetic codes help the processor to detect when an error is made and correct it. Without these codes, processors would be unreliable since any errors would go undetected. AN codes are arithmetic codes that are named for the integers and that are used to encode and decode the codewords.
These codes differ from most other codes in that they use arithmetic weight to maximize the arithmetic distance between codewords as opposed to the hamming weight and hamming distance. The arithmetic distance between two words is a measure of the number of errors made while computing an arithmetic operation. Using the arithmetic distance is necessary since one error in an arithmetic operation can cause a large hamming distance between the received answer and the correct answer.
Arithmetic Weight and Distance
The arithmetic weight of an integer in base is defined by
where < , , and . The arithmetic distance of a word is upper bounded by its hamming weight since any integer can be represented by its standard polynomial form of where the are the digits in the integer. Removing all the terms where will simulate a equal to its hamming weight. The arithmetic weight will usually be less than the hamming weight since the are allowed to be negative. For example, the integer which is in binary has a hamming weight of . This is a quick upper bound on the arithmetic weight since . However, since the can be negative, we can write which makes the arithmetic weight equal to .
The arithmetic distance between two integers is defined by
This is one of the primary metrics used when analyzing arithmetic codes.
AN Codes
AN codes are defined by integers and and are used to encode integers from to such that
<
Each choice of will result in a different code, while serves as a limiting factor to ensure useful properties in the distance of the code. If is too large, it could let a codeword with a very small arithmetic weight into the code which will degrade the distance of the entire code. To utilize these codes, before an arithmetic operation is performed on two integers, each integer is multiplied by . Let the result of the operation on the codewords be . Note that must also be between to for proper decoding. To decode, simply divide . If is not a factor of , then at least one error has occurred and the most likely solution will be the codeword with the least arithmetic distance from . As with codes using hamming distance, AN codes can correct up to errors where is the distance of the code.
For example, an AN code with , the operation of adding and will start by encoding both operands. This results in the operation . Then, to find the solution we divide . As long as >, this will be a possible operat |
https://en.wikipedia.org/wiki/MySQL%20DataController | The MySQL Datacontroller storage engine for the MySQL relational database management system is a storage engine which allows a user to create a table that is a local representation of a foreign (remote) table.
The foreign table can be located into another storage engine like Oracle or Microsoft SQL Server (MSSQL).
It utilizes the MySQL client library API, Free-TDS and OCILIB as a data transport, treating the remote data source the same way other storage engines treat local data sources.
Each Federated table that is defined there is one .frm (data definition file containing information such as the URL of the data source). The actual data can exist on a local or remote Oracle, Microsoft SQL Server (MSSQL), or MySQL instance.
To create a Federated table, one has to specify a URL in the "CONNECTION" string:
create table foo (
id int,
bar varchar(255),
dt date)
ENGINE=DATACONTROLLER CONNECTION='oracle://username:password@hostname:1521/SID/foo'
The connection URL is in the format of:
scheme://user:pass@host:port/schema/tablename
and for MSSQL where schema is dbo
scheme://user:pass@host:port/DB/schema/tablename
Upon creation of a DataController table, the user must ensure that the remote data source does indeed exist or an error will be issued.
The DataController Storage engine was first based on the MySQL Federated Storage Engine was authored by Patrick Galbraith and Brian Aker and is currently being maintained by Patrick Galbraith and Antony Curtis.
It was introduced in 2005 with MySQL 5.0.
The DataController Storage engine was introduced in 2010 by Francis Lavalliere working with MySQL 5.1, in order to facilitate the access to other database engines. This plugin can also help in case of data migration, or migrating data to another database engine.
External links
MySQL Documentation on Federated Storage Engine
MySQL DataController Plugin
MySQL DataController Blog and Video demo
MySQL
fr:DataController
fr:Migration |
https://en.wikipedia.org/wiki/Find%20first%20set | In computer software and hardware, find first set (ffs) or find first one is a bit operation that, given an unsigned machine word, designates the index or position of the least significant bit set to one in the word counting from the least significant bit position. A nearly equivalent operation is count trailing zeros (ctz) or number of trailing zeros (ntz), which counts the number of zero bits following the least significant one bit. The complementary operation that finds the index or position of the most significant set bit is log base 2, so called because it computes the binary logarithm . This is closely related to count leading zeros (clz) or number of leading zeros (nlz), which counts the number of zero bits preceding the most significant one bit.
There are two common variants of find first set, the POSIX definition which starts indexing of bits at 1, herein labelled ffs, and the variant which starts indexing of bits at zero, which is equivalent to ctz and so will be called by that name.
Most modern CPU instruction set architectures provide one or more of these as hardware operators; software emulation is usually provided for any that aren't available, either as compiler intrinsics or in system libraries.
Examples
Given the following 32-bit word:
0000 0000 0000 0000 1000 0000 0000 1000
The count trailing zeros operation would return 3, while the count leading zeros operation returns 16. The count leading zeros operation depends on the word size: if this 32-bit word were truncated to a 16-bit word, count leading zeros would return zero. The find first set operation would return 4, indicating the 4th position from the right. The log base 2 is 15.
Similarly, given the following 32-bit word, the bitwise negation of the above word:
1111 1111 1111 1111 0111 1111 1111 0111
The count trailing ones operation would return 3, the count leading ones operation would return 16, and the find first zero operation ffz would return 4.
If the word is zero (no bits set), count leading zeros and count trailing zeros both return the number of bits in the word, while ffs returns zero. Both log base 2 and zero-based implementations of find first set generally return an undefined result for the zero word.
Hardware support
Many architectures include instructions to rapidly perform find first set and/or related operations, listed below. The most common operation is count leading zeros (clz), likely because all other operations can be implemented efficiently in terms of it (see Properties and relations).
On some Alpha platforms CTLZ and CTTZ are emulated in software.
Tool and library support
A number of compiler and library vendors supply compiler intrinsics or library functions to perform find first set and/or related operations, which are frequently implemented in terms of the hardware instructions above:
Properties and relations
If bits are labeled starting at 1 (which is the convention used in this article), then count trailing zeros and find firs |
https://en.wikipedia.org/wiki/Hardware%20Park%2C%20Hyderabad | Hardware Park is a Special Economic Zone located at Shamshabad in Hyderabad. The Industries in Hardware Park include Tata Teleservices, Centre for Development of Advanced Computing (C-DAC), HCL TalentCare Pvt Ltd, Zen Technologies, Sigma Microsystems Pvt Ltd etc. It is promoted by TSIIC. It has an area of 1700 acres.
References
Special Economic Zones of India
Economy of Telangana
Economy of Hyderabad, India
Business parks of India |
https://en.wikipedia.org/wiki/Claudia%20Donovan | Claudia Donovan, played by Allison Scagliotti, is a fictional character from the US television series Warehouse 13 (2009–14). She has been portrayed as a talented computer hacker and inventor. Her first appearance in season 1 was as an employee of warehouse 13. As Claudia gains experience, her warehouse duties and responsibilities expand to the point where, in the series finale, she becomes the new caretaker of Warehouse 13.
Character history
Claudia is very intelligent, resourceful, and technologically savvy, but has no college education. By the end of season one, she is known to be 19 years old, though she has her 21st birthday party in season four.
Claudia's parents died when she was very young, and for some years her brother Joshua raised her. When Joshua disappeared, presumed dead, Claudia had to fend for herself with no money until Joshua was found.
As revealed in the season 1 episode "Claudia", about twelve years prior to that episode's main timeline, Joshua had met Artie Nielsen while attending college. Posing as a professor, Artie attempted to dissuade Joshua from pursuing a dangerous experiment in teleportation. The experiment went badly wrong, with Joshua disappearing in a brilliant flash of light. Believing him dead, Claudia lost the only family she had left. About ten years later, and six months prior to the events of "Claudia", Claudia began to have visions of Joshua. Believing herself to be going insane from grief, she checked herself into a psychiatric care clinic. Eventually she came to realize that Joshua was, in fact, alive and trying to contact her from the immaterial prison of the inter-dimensional limbo that resulted from his experiment. After about four months in the psychiatric ward, Claudia checked herself out and began efforts to rescue her brother.
Blaming Artie for what happened to Joshua, Claudia first hacked the American power grid in order to identify pockets of large, unexplained, energy usage. Doing so, she located Warehouse 13 in the badlands of South Dakota, and hacked into its computer mainframe. Shortly after, in the main timeline of "Claudia", she arrives at the Warehouse and abducts Artie, taking him to the site of her brother's failed experiment. Once there, she forces Artie to help her recreate the conditions that led to Joshua's disappearance. When Artie realizes that Claudia is not insane, he willingly helps in her rescue attempt. They successfully enter the inter-dimensional space where Joshua is trapped, completing the instruction engraved on Rheticus' compass in order to bring them all back to the corporeal realm.
Upon Artie's return to the Warehouse, Mrs. Frederic tells him that Claudia could pose a threat to the Warehouse and that he must deal with her, telling him "You know the options." Given Claudia's technological aptitude and ingenuity, and some convincing from Leena, Artie opts to offer her a job at the Warehouse, which she readily accepts. Most of her initial work involves record-keepin |
https://en.wikipedia.org/wiki/William%20C.%20Carter%20Award | The William C. Carter Award is a technical award presented annually since 1997 to recognizing an individual who has made a significant contribution to the field of dependable and secure computing throughout his or her PhD dissertation. It is named after, and honors, the late William C. Carter, an important figure in the field. The award is sponsored by IEEE Technical Committee on Fault-Tolerant Computing (TC-FTC) and the IFIP Working Group on Dependable Computing and Fault Tolerance (WG 10.4).
Past recipients
See also
List of computer science awards
References
Awards established in 1997
Computer science awards
IEEE awards
Student awards |
https://en.wikipedia.org/wiki/Raspberry%20Pi | Raspberry Pi () is a series of small single-board computers (SBCs) developed in the United Kingdom by Raspberry Pi Ltd in association with Broadcom. The Raspberry Pi project originally leaned toward the promotion of teaching basic computer science in schools. The original model became more popular than anticipated, selling outside its target market for uses such as robotics. It is widely used in many areas, such as for weather monitoring, because of its low cost, modularity, and open design. It is typically used by computer and electronic hobbyists, due to its adoption of the HDMI and USB standards.
After the release of the second board type, the Raspberry Pi Foundation set up a new entity, named Raspberry Pi (Trading) Ltd, and installed Eben Upton as CEO, with the responsibility for developing their computers. The Foundation was rededicated as an educational charity for promoting the teaching of basic computer science in schools and developing countries. Most Raspberry Pis are made in a Sony factory in Pencoed, Wales, while others are made in China and Japan.
In 2015, the Raspberry Pi surpassed the ZX Spectrum in unit sales, becoming the best-selling British computer.
In 2021, Raspberry Pi (Trading) Ltd changed its name to Raspberry Pi Ltd.
Series and generations
There are three series of Raspberry Pi, and several generations of each have been released. Raspberry Pi SBCs feature a Broadcom system on a chip (SoC) with an integrated ARM-compatible central processing unit (CPU) and on-chip graphics processing unit (GPU), while Raspberry Pi Pico has a RP2040 system on chip with an integrated ARM-compatible central processing unit (CPU).
Raspberry Pi
The first-generation Raspberry Pi Model B was released in February 2012, followed by the simpler and cheaper Model A.
In 2014, Raspberry Pi released a board with an improved design, Raspberry Pi Model B+. These first-generation boards feature ARM11 processors, are approximately credit-card sized, and represent the standard mainline form factor. Improved A+ and B models were released within a year. A "Compute Module" was released in April 2014 for embedded applications.
The Raspberry Pi 2 was released in February 2015 and initially featured a 900 MHz 32-bit quad-core ARM Cortex-A7 processor with 1 GB RAM. Revision 1.2 featured a 900 MHz 64-bit quad-core ARM Cortex-A53 processor (the same as that in the Raspberry Pi 3 Model B, but underclocked to 900 MHz).
The Raspberry Pi 3 Model B was released in February 2016 with a 1.2 GHz 64-bit quad core ARM Cortex-A53 processor, on-board 802.11n Wi-Fi, Bluetooth and USB boot capabilities.
On Pi Day 2018, the Raspberry Pi 3 Model B+ was launched with a faster 1.4 GHz processor, a three-times faster Gigabit Ethernet (throughput limited to ca. 300 Mbit/s by the internal USB 2.0 connection), and 2.4 / 5 GHz dual-band 802.11ac Wi-Fi (100 Mbit/s). Other features are Power over Ethernet (PoE) (with the add-on PoE HAT), USB boot and network boot (an SD card is |
https://en.wikipedia.org/wiki/Health%20in%20Somalia | Somalia's health care system is significantly underdeveloped. The following information provides an overview of the state of health in Somalia, with data sourced from the CIA World Factbook.
Population: 12.3 million (2014 est.)
Age structure
0–14 years: 45.6% (male 2,881,283/female 2,740,209)
15–64 years: 52.5% (male 3,219,425/female 3,226,432)
65 years and over: 2% (male 144,056/female 105,407) (2014 est.)
Population growth rate: 3.8% (2014 est.)
Birth rate: 40.87 births/1,000 population (2014 est.)
Death rate: 13.91 deaths/1,000 population (2014 est.)
Sex ratio
at birth: 0.894 male(s)/female
under 15 years: 1 male(s)/female
15–64 years: 1.07 male(s)/female
65 years and over: 0.66 male(s)/female
total population: 1.028 male(s)/female (2014 est.)
Infant mortality rate
100.4 deaths/1,000 live births (2012 est.)
male: 108.89 deaths/1,000 live births
female: 92.12 deaths/1,000 live births (2014 est.)
Life expectancy at birth
total population: 51.8 years
male: 49.58 years
female: 53.65 years (2014 est.)
Total fertility rate
6.08 children born/woman (2014 est.)
HIV/AIDS
HIV/AIDS - adult prevalence rate:
0.5% (2009 est.)
HIV/AIDS - people living with HIV/AIDS:
31,200 (2009 est.)
HIV/AIDS - deaths:
2,500 (2009 est.)
Major infectious diseases
degree of risk: high
food or waterborne diseases: bacterial and protozoal diarrhea, hepatitis A and E, and typhoid fever
vectorborne diseases: dengue fever, malaria, and Rift Valley fever
water contact disease: schistosomiasis
animal contact disease: rabies (2009)
References |
https://en.wikipedia.org/wiki/Don%20Broco | Don Broco are a British rock band formed in Bedford, England, in 2008. The band consists of Rob Damiani (lead vocals), Simon Delaney (guitar), Tom Doyle (bass and programming) and Matt Donnelly (drums, lead and backing vocals). The band have released four studio albums, including Priorities (2012), Automatic (2015) and Technology (2018). Their most recent album Amazing Things (2021) was their first to reach No.1 in the UK Album Charts.
History
Formation (2008–2010)
The band's origins go back to before their university years during secondary school, attending Bedford Modern School, where they played their first gigs, but it was not until after studying at Nottingham University that they decided to become a band.
The band initially took on many different names, including "Summer fall" and "Club Sex". One of the group's ideas was "Don Loco", which was changed to Don Broco following guitarist Simon Delaney breaking his wrist in a football accident.
They first toured England in November 2008, playing gigs in places such as Leeds, Birmingham, Manchester, Swindon, Watford and County Durham amongst others.
They appeared at Camden Crawl and Download Festival in 2009, as well as supporting Enter Shikari on a short run of shows in May 2009.
Don Broco also played Underage Festival, at Victoria Park in London, UK, in both 2009 and 2010. They played Sonisphere festival 2010 on the Red Bull Bedroom Jam stage. The band then went on to support Enter Shikari at both their Christmas parties at Hatfield Forum in December 2010. In September 2010 Don Broco also played in a local festival called Amersham Summer Festival.
Big Fat Smile (2011)
In January 2011, they released the video to "Beautiful Morning", directed by Lawrence Hardy. The following month they released "Beautiful Morning" as a single. They released their EP Big Fat Smile on 14 February 2011. It was produced and engineered by Matt O'Grady and mixed by John Mitchell.
Don Broco, alongside Lower than Atlantis and Veara, supported We Are The Ocean on tour in April/May 2011. The band completed a third UK headline tour in May 2011 with support from Burn The Fleet. This run of shows included a show at the Alternative Escape Festival in Brighton, with Deaf Havana and at Hub Festival in Liverpool, as well as performances at Slam Dunk Festival North and South.
Over the summer 2011, Don Broco played a number of UK Festivals including Download Festival, Sonisphere Festival, Hevy Festival, Liverpool Sound City, Slam Dunk Festival, The Great Escape Festival. and at the Reading and Leeds festivals on the BBC Introducing stage which they were put forward for by the BBC Introducing programme which covers the Bedford area where the band is originally from.
An accompanying video to the band's B-Side "We Are On Holiday" off their "Dreamboy" single was released in August 2011. The single was made available to download on iTunes on 22 August 2011.
Priorities and Rayner and Playford's departure (2012–2013)
Don Broc |
https://en.wikipedia.org/wiki/TIBCO%20Hawk | TIBCO Hawk is a software product that allows monitoring and management of distributed computing applications. A very scalable product, it is notable for the number of these rule-based software agents deployed (organisations and in total) claimed by the vendor:
Details
TIBCO Hawk provides a distributed agent-based extensible system which allows the monitoring and control of system and application software components. There are 3 main components:
Hawk Agents, which embed MicroAgents that in turn communicate with application and system services and processes, or external interfaces
Hawk Display, which provides a user interface displaying the community of agents (and thereby systems)
Hawk Event Service, which provides the ability to store and retrieve events via a database.
Hawk Agents include a non-inferencing, event-driven rule engine to filter events and send alerts to Hawk Display(s). The rulebases for these can be updated and distributed from a Hawk Display while the agents are operating.
Hawk is designed to be customisable to suit specific enterprise requirements. For example, custom MicroAgents can be used to monitor custom applications though an Application Monitoring Interface (API) using C, C++, or Java. These allow for dynamic discovery on startup, application heartbeat testing, and so on.
Hawk Microagents and adapters are either included or available as options: they either turn system information or events into Hawk events, or turn Hawk events into system actions. These include:
Process MicroAgent: allows processes to be monitored (e.g. number of processes and resources used)
Filesystem MicroAgent: allows file systems to be monitored (e.g. space available)
System microagent: system resources to be monitored (e.g. CPU and memory utilization)
Logfile MicroAgent: allows system logs to be read
Custom MicroAgent: allows scripts to be executed on a system and return some values
Database MicroAgent: monitor the system tables of database engines via JDBC
JVM MicroAgent: monitors JVM resources (e.g. memory and thread information)
JMX MicroAgent: monitors JMX information
SNMP MicroAgent: communicates with SNMP services
External links
TIBCO Hawk (Official site)
TIBCommunity discussion site for Hawk
SL Corp RTView monitor for TIBCO Hawk
Xmarter Blog on "What is TIBCO Hawk"
References
System administration |
https://en.wikipedia.org/wiki/Comparison%20of%20video%20converters | Video converters are computer programs that can change the storage format of digital video. They may recompress the video to another format in a process called transcoding, or may simply change the container format without changing the video format. The disadvantages to transcoding are that there is quality loss when transcoding between lossy compression formats, and that the process is highly CPU intensive.
This article compares video converters that have their own article on Wikipedia.
Overview
Input
Output
Features
Help and support
See also
Container format
Comparison of video container formats
Comparison of video editing software
WikiCommons' Theora video conversion help page
Comparison of DVD ripper software
References
video converters |
https://en.wikipedia.org/wiki/Wish%20Upon%20A%20Hero | Wish Upon a Hero is a social helping network in the United States, which connects those in need with people who are willing to help.
History and organization background
Wish Upon A Hero was conceived by Dave Girgenti shortly after the September 11 attacks as a means to connect people in need after major disasters. After witnessing the aftermath of Hurricane Katrina, Girgenti worked to develop the Wish Upon a Hero web community. The website launched in September 2007. The social networking website is free and designed to help anyone in need. The website works by connecting wishers with wish grantors; people can post up to three wishes at a time to the website; grantors can grant whatever wishes they choose. These wishes can range from relatively small to large, such as words of encouragement or financial assistance. To date, more than 100,000 wishes have been granted through the site.
Wish Upon a Hero Foundation
The Wish Upon A Hero Foundation is a 501(c)(3) non-profit organization that supports the wish granting efforts of individuals and organizations. Established in June 2008 as a mechanism to raise money for larger wishes that were not being granted on the Wish Upon a Hero website, the Foundation accepts corporate donations and is eligible to receive government grants. In 2011, the Wish Upon a Hero Foundation sponsored Iraq War veteran in the "Hike for our Heroes" as he hiked across the U.S. to raise money for military families in need.
Foundation programs
Divine 9 golf fundraiser
The Divine 9 golf fundraiser is an annual celebrity pro-am golf championship benefiting people and families with blood cancer. Since 2004, Divine 9 has raised more than $1 million toward leukemia and lymphoma research. At the 2010 event, Divine 9 granted a 'wedding' wish to a leukemia patient who posted her wish for a dream wedding on the Wish Upon A Hero website.
Notes
External links
Wish Upon A Hero
Wish Upon A Hero Foundation
American social networking websites
Can someone confirm that the charity is actually still active? |
https://en.wikipedia.org/wiki/D.%20S.%20Malik | Davender S. Malik is an Indian American mathematician and professor of mathematics and computer science at Creighton University.
Education
Malik attended the University of Delhi in New Delhi, India, receiving his bachelor's and master's degrees in mathematics, where he won the Prof. Ram Behari Gold Medal in 1980 for his high marks. Then at the University of Waterloo in Ontario, Canada, he received a master's degree in pure mathematics. In the United States, Malik went to Ohio University, earning an M.S. in computer science, and a Ph.D. in mathematics in 1985, writing his dissertation on "A Study of Q-Hypercyclic Rings."
Career
In 1985, Malik joined the faculty of Creighton University, teaching in the mathematics department. In 2013 he became the first holder of the Frederick H. and Anna K. Scheerer Endowed Chair in Mathematics. His research has focused on ring theory, abstract algebra, information science, and fuzzy mathematics, including fuzzy automata theory, fuzzy logic, and applications of fuzzy set theory in other disciplines.
In the academic community, Malik has been a member of the American Mathematical Society and Phi Kappa Phi. Within his community, co-created a Creighton program in which faculty help area high school students pursue scientific research, to be published in their own student journal.
Malik has published more than 45 papers and 18 books. He has created a computer science line of textbooks that includes extensive and complete programming examples, exercises, and case studies throughout using programming languages such as C++ and Java.
Books
The books he has written include:
Programming
C++ Programming: From Problem Analysis to Program Design (1st ed., 2002; 8th ed. 2017)
C++ Programming: Program Design Including Data Structures (1st ed., 2002; 8th ed. 2017)
Data Structures Using C++ (1st ed., 2003; 2nd ed. 2010)
Data Structures Using Java (2003)
Java programming: From Problem Analysis to Program Design (1st ed., 2003; 5th ed. 2012)
Java programming: Program Design including Data structures (2006)
Java programming: Guided Learning With Early Objects (2009)
Introduction to C++ Programming, Brief Edition (2009)
Mathematics
Fundamentals of Abstract Algebra (1997)
Fuzzy Commutative Algebra (1998)
Fuzzy Discrete Structures (2000)
Fuzzy Mathematics in Medicine (2000)
Fuzzy Automata and Languages: Theory and Applications (2002)
Fuzzy Semigroups (2003)
Application of Fuzzy Logic to Social Choice Theory (2015)
References
External links
Faculty webpage at Creighton University
20th-century American mathematicians
21st-century American mathematicians
Algebraists
American textbook writers
American male writers of Indian descent
Creighton University faculty
Indian emigrants to the United States
20th-century Indian mathematicians
1958 births
Living people
Mathematics educators
Ohio University alumni
Science and technology studies scholars
Delhi University alumni
University of Waterloo alumni
American male non- |
https://en.wikipedia.org/wiki/International%20Journal%20of%20Computer%20Assisted%20Radiology%20and%20Surgery | The International Journal of Computer Assisted Radiology and Surgery (IJCARS) is a journal for cross-disciplinary research, development and applications of Computer Assisted Radiology and Surgery (CARS). The Journal promotes interdisciplinary research and development in an international environment with a focus on the development of digital imaging and computer-based diagnostic and therapeutic procedures as well enhance the skill levels of health care professionals.The International Society for Computer Aided Surgery (ISCAS) and The Medical Image Computing and Computer Assisted Interventions Society (MICCAI) are involved in the publication of the IJCARS.
References
External links
The Journal at the website of ISCAS
World Scientific academic journals
Computing in medical imaging
Computer science journals
Biomedical informatics journals
Surgery journals
English-language journals |
https://en.wikipedia.org/wiki/HitPredict | HitPredict is a database of high confidence protein-protein interactions.
See also
Protein-protein interaction
BioGRID
References
External links
http://hintdb.hgc.jp/htp/
Biological databases
Proteomics
Biophysics
Systems biology |
https://en.wikipedia.org/wiki/Dolphin%20Browser | The Dolphin Browser is a web browser for the Android and iOS operating systems developed by MoboTap Inc. It was one of the first alternative browsers for the Android platform that introduced support for multi-touch gestures. Dolphin Browser uses its native platform's default browser engine.
Features
Being a WebKit-based browser, Dolphin Browser supports most web standards.
It also supports tabbed browsing—the ability to open and switch between multiple web pages at the same time. Another main component of the user interface is voice controls and gestures. It can cache web content for offline use and synchronize data across devices.
Add-ons are applications that can be used to extend Dolphin Browser's capabilities and can be installed from within the browser.
Versions
Both iOS and Android versions are proprietary software and are distributed for free. There is an advanced version called Dolphin Browser for Android 2.0 or later. Dolphin Browser Beta was released in May 2012 with the in-house HTML5 engine Jet pack. In December 2013, Dolphin Zero, a privacy-focused version, was released.
Privacy concerns
In October 2011, privacy concerns were raised about Dolphin browser after it was discovered that all URLs loaded in Dolphin HD were being relayed as plain text to a remote server, a process described by Ars Technica as "an unambiguous breach of privacy". This breach was patched in the next update.
Reception
The Android and iOS versions have been lauded for their gesture-based functionality, speed and ease-of-use. Business Insider claims "Dolphin Browser blows Safari out of the water." As of December 2021, the browser holds an approval rate of 78% on rating aggregator site Rouvou.
In 2011, it was PC Magazines best free iPhone and iPad Apps of 2011, also mentioned in the CNET 100, a PC Magazine Editors Choice in 2012.
References
External links
Mobile web browsers
Android web browsers
iOS web browsers
Software based on WebKit
2011 software
Android (operating system) software |
https://en.wikipedia.org/wiki/Berlekamp%E2%80%93Welch%20algorithm | The Berlekamp–Welch algorithm, also known as the Welch–Berlekamp algorithm, is named for Elwyn R. Berlekamp and Lloyd R. Welch. This is a decoder algorithm that efficiently corrects errors in Reed–Solomon codes for an RS(n, k), code based on the Reed Solomon original view where a message is used as coefficients of a polynomial or used with Lagrange interpolation to generate the polynomial of degree < k for inputs and then is applied to to create an encoded codeword .
The goal of the decoder is to recover the original encoding polynomial , using the known inputs and received codeword with possible errors. It also computes an error polynomial where corresponding to errors in the received codeword.
The key equations
Defining e = number of errors, the key set of n equations is
Where E(ai) = 0 for the e cases when bi ≠ F(ai), and E(ai) ≠ 0 for the n - e non error cases where bi = F(ai) . These equations can't be solved directly, but by defining Q() as the product of E() and F():
and adding the constraint that the most significant coefficient of E(ai) = ee = 1, the result will lead to a set of equations that can be solved with linear algebra.
where q = n - e - 1. Since ee is constrained to be 1, the equations become:
resulting in a set of equations which can be solved using linear algebra, with time complexity .
The algorithm begins assuming the maximum number of errors e = ⌊(n-k)/2⌋. If the equations can not be solved (due to redundancy), e is reduced by 1 and the process repeated, until the equations can be solved or e is reduced to 0, indicating no errors. If Q()/E() has remainder = 0, then F() = Q()/E() and the code word values F(ai) are calculated for the locations where E(ai) = 0 to recover the original code word. If the remainder ≠ 0, then an uncorrectable error has been detected.
Example
Consider RS(7,3) (n = 7, k = 3) defined in with α = 3 and input values: ai = i-1 : {0,1,2,3,4,5,6}. The message to be systematically encoded is {1,6,3}. Using Lagrange interpolation, F(ai) = 3 x2 + 2 x + 1, and applying F(ai) for a4 = 3 to a7 = 6, results in the code word {1,6,3,6,1,2,2}. Assume errors occur at c2 and c5 resulting in the received code word {1,5,3,6,3,2,2}. Start off with e = 2 and solve the linear equations:
Starting from the bottom of the right matrix, and the constraint e2 = 1:
with remainder = 0.
E(ai) = 0 at a2 = 1 and a5 = 4
Calculate F(a2 = 1) = 6 and F(a5 = 4) = 1 to produce corrected code word {1,6,3,6,1,2,2}.
See also
Reed–Solomon error correction
External links
MIT Lecture Notes on Essential Coding Theory – Dr. Madhu Sudan
University at Buffalo Lecture Notes on Coding Theory – Dr. Atri Rudra
Algebraic Codes on Lines, Planes and Curves, An Engineering Approach – Richard E. Blahut
Welch Berlekamp Decoding of Reed–Solomon Codes – L. R. Welch
– The patent by Lloyd R. Welch and Elewyn R. Berlekamp
Finite fields
Coding theory
Information theory
Error detection and correction |
https://en.wikipedia.org/wiki/Homomorphic%20signatures%20for%20network%20coding | Network coding has been shown to optimally use bandwidth in a network, maximizing information flow but the scheme is very inherently vulnerable to pollution attacks by malicious nodes in the network. A node injecting garbage can quickly affect many receivers. The pollution of network packets spreads quickly since the output of (even an) honest node is corrupted if at least one of the incoming packets is corrupted.
An attacker can easily corrupt a packet even if it is encrypted by either forging the signature or by producing a collision under the hash function. This will give an attacker access to the packets and the ability to corrupt them. Denis Charles, Kamal Jain and Kristin Lauter designed a new homomorphic encryption signature scheme for use with network coding to prevent pollution attacks.
The homomorphic property of the signatures allows nodes to sign any linear combination of the incoming packets without contacting the signing authority. In this scheme it is computationally infeasible for a node to sign a linear combination of the packets without disclosing what linear combination was used in the generation of the packet. Furthermore, we can prove that the signature scheme is secure under well known cryptographic assumptions of the hardness of the discrete logarithm problem and the computational Elliptic curve Diffie–Hellman.
Network coding
Let be a directed graph where is a set, whose elements are called vertices or nodes, and is a set of ordered pairs of vertices, called arcs, directed edges, or arrows. A source wants to transmit a file to a set of the vertices. One chooses a vector space (say of dimension ), where is a prime, and views the data to be transmitted as a bunch of vectors . The source then creates the augmented vectors by setting where is the -th coordinate of the vector . There are zeros before the first '1' appears in . One can assume without loss of generality that the vectors are linearly independent. We denote the linear subspace (of ) spanned by these vectors by . Each outgoing edge computes a linear combination, , of the vectors entering the vertex where the edge originates, that is to say
where . We consider the source as having input edges carrying the vectors . By induction, one has that the vector on any edge is a linear combination and is a vector in . The k-dimensional vector is simply the first k coordinates of the vector . We call the matrix whose rows are the vectors , where are the incoming edges for a vertex , the global encoding matrix for and denote it as . In practice the encoding vectors are chosen at random so the matrix is invertible with high probability. Thus, any receiver, on receiving can find by solving
where the are the vectors formed by removing the first coordinates of the vector .
Decoding at the receiver
Each receiver, , gets vectors which are random linear combinations of the ’s.
In fact, if
then
Thus we can invert the linear transformati |
https://en.wikipedia.org/wiki/Walter%20Edwin%20Arnoldi | Walter Edwin Arnoldi (December 14, 1917 – October 5, 1995) was an American engineer mainly known for the Arnoldi iteration, an eigenvalue algorithm used in numerical linear algebra. His main research interests included modelling vibrations, acoustics, aerodynamics of aircraft propeller, and oxygen reclamation problems of space science. His 1951 paper The principle of minimized iterations in the solution of the eigenvalue problem is one of the most cited papers in numerical linear algebra.
Life and career
Born in New York City, Arnoldi earned a degree in mechanical engineering from the Stevens Institute of Technology in 1937 before achieving a Master of Science degree from Harvard University. He worked at the Hamilton Standard Division of the United Technologies Corporation from 1939 until his retirement in 1977; known as United Aircraft for much of his career. He was married to Flora (von Weiler) Arnoldi with whom he had two sons, Douglas and Carl. He lived in West Hartford, Connecticut since 1950. He died in West Hartford on October 5, 1995.
References
20th-century American mathematicians
Numerical linear algebra
1917 births
1995 deaths
American mechanical engineers
Engineers from New York (state)
Stevens Institute of Technology alumni
Harvard University alumni
20th-century American engineers
People from West Hartford, Connecticut |
https://en.wikipedia.org/wiki/CloudTran | In computing, CloudTran, a transaction management product, enables applications running in distributed computing and cloud computing architectures to embed logical business transactions that adhere to the properties of ACID transactions. Specifically, CloudTran coordinates ACID transactionality for data stored within in-memory data grids (e.g., Oracle Coherence, GigaSpaces, and Gemfire), as well as from the data grid to persistent storage systems (e.g., Oracle, MySQL, Microsoft SQL Server, MongoDB).
Distributed computing has traditionally relied on a technology called distributed transactions which is an algorithm used to coordinate the storing of a logically related set of data within more than one database or computer. CloudTran is aimed at addressing issues with this approach to improve on performance, scalability, and ease of implementation for application developers. In doing so, CloudTran enables a broad range of developers to implement highly scalable applications that run in cloud computing environments and distributed architectures. In addition, CloudTran is a manifestation of “Cloud Transaction Processing, or, “CloudTP”.
See also
Distributed computing
Distributed transaction processing
Extreme Transaction Processing
Grid computing
Transaction processing
References
External links
CloudTran Product page
Gartner Group research on CloudTP
Transaction processing
Storage software |
https://en.wikipedia.org/wiki/EMBARC | EMBARC (Electronic Mail Broadcast to A Roaming Computer) was a business enterprise of the Motorola company that provided wireless broadcast of e-mail and news to mobile subscribers. It was established in 1990 after Motorola purchased Contemporary Communications, a national carrier for pagers in the 900 MHz band. Unfortunately, alphanumeric pagers did not show rapid growth in the market, forming less than 5% of all pagers by 1991.
The EMBARC service could feed data at 1,200 bps from 3.5 kW ground transmitters. It could send messages up to 1,500 characters long to portable computers that were equipped to receive the messages. It was useful for sending a simultaneous message or memo to up to 500 mobile users. The most likely users of this service were thought to be sales people operating in the field, receivers of service requests, and the transportation industry. The deliveries were charged based on time until reception, with the charge being more cost effective for larger numbers of clients.
In 1996, Motorola attempted to use EMBARC to penetrate a different market: broadcasting current sports scores. However, the EMBARC enterprise failed in April, 1996 and Motorola sold their national paging license. They decided instead to focus on hardware manufacturing.
References
Radio paging |
https://en.wikipedia.org/wiki/European%20route%20E372 | European route E 372 is a B-type road part of the International E-road network. It begins in Warsaw, Poland and ends in Lviv, Ukraine. It is long. There are often hour-long delays at the Polish-Ukrainian border.
Route
: Zakręt – Majdan ()
: Majdan () – Garwolin – Ryki – Kurów
: Kurów – Lublin ()
: Lublin ()
: Lublin () – Piaski ()
: Piaski – Krasnystaw – Zamość – Tomaszów Lubelski – Hrebenne
: Rava-Ruska – Lviv
References
External links
UN Economic Commission for Europe: Overall Map of E-road Network (2007)
372
European routes in Ukraine
E372 |
https://en.wikipedia.org/wiki/The%20Million%20Dollar%20Drop | The Million Dollar Drop is a game show which airs on Nine Network in Australia and is based on the UK series The Million Pound Drop Live. However, unlike the original UK version, it is not broadcast live, and there are several changes to the format. The show premiered on 21 March 2011 and is hosted by Eddie McGuire.
Game format
A team of two people with a pre-existing relationship is presented with in $20 notes, banded in bundles of $20,000 (50 bundles = $1,000,000). The team must risk the entire amount on each of eight multiple-choice questions.
For each question, the contestants choose one of two categories, then indicate which answer(s) they wish to risk their money on by moving the bundles of cash onto a row of trap doors, termed "drops," each of which corresponds to one answer. However, they must always keep at least one drop "clear" with no money on it. In addition, seven of the eight questions have a time limit; any money that is not placed on an answer when time runs out will be lost.
Once the money is in place, the trap doors for the incorrect answers are opened, and the cash on them falls out of sight and is lost. The contestants then continue the game using the cash they had placed on the correct answer. They get to keep whatever money is left after the eighth question; if they lose everything before reaching this point, the game ends immediately and they leave with nothing.
International versions
See also
The Million Pound Drop Live
Million Dollar Money Drop
References
Nine Network original programming
2011 Australian television series debuts
2011 Australian television series endings
2010s Australian game shows
English-language television shows |
https://en.wikipedia.org/wiki/1980%20in%20Australian%20television | This article is a summary of 1980 in Australian television.
Events
20 January - The 0/10 Network became known as Network Ten to reflect ATV moving from Channel 0 to channel 10.
30 January - Australian sitcom Kingswood Country (a spinoff of the Australian comedy sketch series The Naked Vicar Show) starring Ross Higgins premieres on Seven Network.
10 May - Seven Network airs the final episode of the Australian comedy series Doctor Down Under.
27 May - British comedy drama series Minder premieres on ABC.
14 July - A remake of the 1970s Australian game show Great Temptation called Sale of the Century premieres on Nine Network and becomes the biggest hit of the year. Tony Barber who has previously hosted Great Temptation will return to host this remake along with new co-host Victoria Nicolls.
August - TV Times and TV Guide magazines are amalgamated into TV Week.
11 August - Canadian sceptic James Randi was interviewed by Don Lane which ended with a fight about elderly psychic Doris Stokes. As he went to a commercial break he fired Randi from the show, telling him to p**s off.
4 September - Australian drama miniseries The Timeless Land debuts on ABC.
September - The Australian Broadcasting Tribunal refuses the takeover of ATV10 by Rupert Murdoch's News Limited.
24 October - Special Broadcasting Service was launched as Channel 0/28.
12 November - In the 1980 season finale for Prisoner, Meg Jackson and Bob Morris marry, the Christmas performance and the mineshaft disaster.
The 1980 Moscow Olympics are televised on Seven Network via satellite.
Television
24 October - Channel 0/28
Debuts
New International Programming
1 January - The Duke (Seven Network)
2 January - / Zoom the White Dolphin (ABC TV)
13 January - Quark (ABC TV)
27 January - 240 Robert (Network Ten)
3 February - Rebecca (ABC TV)
5 February - The Omega Factor (ABC TV)
7 February - Telford's Change (ABC TV)
11 February - The All-New Popeye Show (Seven Network)
21 February - Captain Caveman and the Teen Angels (Seven Network)
21 February - The Dukes of Hazzard (Network Ten)
3 March - Grange Hill (ABC TV)
4 April - A Connecticut Rabbit in King Arthur's Court (Network Ten - Sydney)
22 April - Beggarman, Thief (Seven Network)
26 May - Fangface (Network Ten)
27 May - Minder (ABC TV)
31 May - California Fever (Network Ten)
4 June - Jason of Star Command (Nine Network)
22 June - Scooby and Scrappy-Doo (Nine Network)
2 July – The Paper Lads (Nine Network)
5 July - Godzilla (Seven Network)
16 July - Hagen (Nine Network)
2 August - Space Sentinels (Network Ten)
4 August - Thunder (Network Ten)
25 August - Ballet Shoes (Nine Network)
9 September - The Moon Stallion (ABC TV)
25 September - Hawkmoor (ABC TV)
20 October - Huntingtower (ABC TV)
3 November - Pinocchio (ABC TV)
16 November - A New Kind of Family (Seven Network)
17 November - Beyond Westworld (Seven Network)
18 November - Big Shamus, Little Shamus (Seven Network)
19 |
https://en.wikipedia.org/wiki/1977%20in%20Australian%20television | This is a list of Australian television-related events in 1977.
Events
21 January – Golden West Network is launched in Geraldton as GTW-11 and begins broadcasting. This completes the roll-out of regional commercial television across Australia .
April – The ABC's long-running music program Countdown celebrates its 100th episode.
April – The Seven Network successfully bids for exclusive Australian rights to televise the 1980 Olympic Games from Moscow. The network paid $1 million in the deal, outbidding rival offers from ABC and Nine Network.
1 April – British sitcom Fawlty Towers debuts on ABC.
26 May – Australian satirical radio and television sketch show The Naked Vicar Show premieres on Seven Network.
October - Nine Network's wartime period soap opera, The Sullivans, premieres on British television when the ITV network begin showing it during daytime. It eventually becomes a regional programme, with each ITV contractor showing it as and when they wished. The most common timeslot used, however, was 12:30-13:00pm on Tuesday and Thursday. The series marks the first of several Australian soap operas to be broadcast by ITV, which continued until the early 00s.
5 December – The final episode of the Australian music series Flashez airs on ABC at 5:30pm.
6 December – The 0-10 Network screens Australian soap opera The Restless Years.
23 December – ABC televises the final episode of its Australian soap opera Bellbird.
Seven Network televises the VFL Grand Final live to Melbourne for the first time.
The Federal Government investigates a proposal to establish a domestic satellite system, enabling instant transmission of television and other communications across Australia and in particular to remote areas.
Australian music series Flashez returns for a new series on ABC now airing at 5:30pm right after Sesame Street for most of the year.
Gus the Snail (a character who was based on an executive producer who wanted to take over the ABC) makes his very first appearance on the long running Australian children's television series Mr. Squiggle and Friends.
Debuts
New International Programming
25 January – Alice (The 0-10 Network)
27 January – Serpico (Seven Network)
31 January – Charlie's Angels (Nine Network)
2 February/23 June – The Gemini Man (2 February: Nine Network - Melbourne, 23 June: Nine Network - Sydney)
3 February – The Good Life (1975) (ABC)
4 February – Executive Suite (Seven Network)
5 February – Baa Baa Black Sheep (Nine Network)
8 February – George and Mildred (ABC)
16 February – The New Avengers (ABC)
18 February – Poldark (The 0-10 Network)
12 March – Holmes & Yoyo (Seven Network)
1 April – Fawlty Towers (ABC)
8 April – Jabberjaw (Nine Network)
15 May – Simon in the Land of Chalk Drawings (ABC)
28 May – Code R (The 0-10 Network)
17 July – Tofffsy (ABC)
20 July – Roobarb (ABC)
29 July – / The Muppet Show (Seven Network)
6 August – One Day at a Time (Seven Network)
15 August – Seventh Avenue (Seven Network)
18 September – Wh |
https://en.wikipedia.org/wiki/10%20Sport | 10 Sport (known as Ten's World of Sport from 1992 until 1996) is the brand that all sporting events broadcast on Network 10, an Australian free-to-air commercial television network. Sports streamed on Paramount+ in Australia since August 2021 are also broadcast under the 10 Sport banner.
All sport events were broadcast under the One HD banner from 26 March 2009 until it ceased being a sole sports channel in early 2011.
History
Australian rules
In 2002, Ten combined with the Nine Network to acquire free-to-air broadcast rights for the AFL, the elite Australian rules competition, displacing the Seven Network which had held the rights for more than 40 years. Ten broadcast Saturday afternoon and Saturday night games and had exclusive rights for all finals games, the network also alternated in showing the pre-season Grand Final and Brownlow Medal count with Nine (Ten telecasted the events in 2002, 2004 and 2006) while they showed each local state team's games that were played by WA, SA, QLD and NSW teams that were played on a Saturday.
Along with the Seven Network, Ten placed a successful $780 million bid to jointly broadcast the game from 2007 to 2011. Under this deal, Ten continued to broadcast the Saturday component of the competition. However, unlike the previous deal, Ten did not hold the exclusive rights to the finals series. Instead, the networks shared the broadcasting of the finals series and alternated the broadcast of the grand final. In the years when Ten did not televise the Grand Final (2008 and 2010), it telecast the Brownlow Medal presentation and the Nab Cup Grand Final. Ten ended AFL broadcasting at the conclusion of the 2011 season. At the end of 2011, Network Ten lost the rights to the AFL with Seven taking over the free-to-air TV Saturday games. Ten Sport won a Logie Award for "Most Popular Sport Program" at the 2012 TV Week Logie Awards for its telecast of the 2011 AFL Grand Final which was the last to be broadcast.
Basketball
In 1992, Network 10 also used to air the National Basketball League (NBL) during the middle of the basketball boom in Australia from 1992 to 1997, but after delegating games to extremely late night time slots the network eventually ended its broadcasting. In March 2010 however, it was announced that Network 10 and digital channel One would show NBL games for the next 5 years. Starting with 2 games per week, and raising to 5 per week in the 2014/15 season. The network also screened Boomers and Opals games. On the 19 August 2021, The NBL and Channel 10 announced a broadcast deal that would involve 10 Peach showing two games every Sunday, Starting with the 2021/22 Season.
Cricket
In 2013, Ten paid $100 million for exclusive rights to broadcast the Big Bash League from 2013 to 2018, marking the channel's first foray in elite domestic cricket coverage. Ten previously held the broadcast rights to the Indian Premier League.
Horse racing
Network 10 broadcast the Melbourne Cup between 1978 and 2001, and again |
https://en.wikipedia.org/wiki/Exponential%20family%20random%20graph%20models | Exponential Random Graph Models (ERGMs) are a family of statistical models for analyzing data from social and other networks. Examples of networks examined using ERGM include knowledge networks, organizational networks, colleague networks, social media networks, networks of scientific development, and others.
Background
Many metrics exist to describe the structural features of an observed network such as the density, centrality, or assortativity. However, these metrics describe the observed network which is only one instance of a large number of possible alternative networks. This set of alternative networks may have similar or dissimilar structural features. To support statistical inference on the processes influencing the formation of network structure, a statistical model should consider the set of all possible alternative networks weighted on their similarity to an observed network. However because network data is inherently relational, it violates the assumptions of independence and identical distribution of standard statistical models like linear regression. Alternative statistical models should reflect the uncertainty associated with a given observation, permit inference about the relative frequency about network substructures of theoretical interest, disambiguating the influence of confounding processes, efficiently representing complex structures, and linking local-level processes to global-level properties. Degree-preserving randomization, for example, is a specific way in which an observed network could be considered in terms of multiple alternative networks.
Definition
The Exponential family is a broad family of models for covering many types of data, not just networks. An ERGM is a model from this family which describes networks.
Formally a random graph consists of a set of nodes and a collection of tie variables , indexed by pairs of nodes , where if the nodes are connected by an edge and otherwise. A pair of nodes is called a dyad and a dyad is an edge if .
The basic assumption of these models is that the structure in an observed graph can be explained by a given vector of sufficient statistics which are a function of the observed network and, in some cases, nodal attributes. This way, it is possible to describe any kind of dependence between the undyadic variables:
where is a vector of model parameters associated with and is a normalising constant.
These models represent a probability distribution on each possible network on nodes. However, the size of the set of possible networks for an undirected network (simple graph) of size is . Because the number of possible networks in the set vastly outnumbers the number of parameters which can constrain the model, the ideal probability distribution is the one which maximizes the Gibbs entropy.
Example
Let be a set of three nodes and let be the set of all undirected, loopless graphs on . Loopless implies that for all it is and undirected implies that for all it is |
https://en.wikipedia.org/wiki/SBS%20Sport | SBS Sport is the name given to the Special Broadcasting Service's sport's programming broadcast on SBS Television and SBS Radio.
Television & Streaming
SBS currently holds the broadcast rights to a range of sports, which are broadcast on SBS, SBS Viceland and NITV.
Current
Past
Sports News Programs
On The Ball
The World Game
Toyota World Sport
The Woggabaliri Footy Show
SBS Speedweek
Cycling Central
Awards
Sports coverage and programs made by SBS Sport have been won and been nominated for several awards at the Logie Awards. They include:
1998: Won the Most Outstanding Sports Coverage for the Australia v Iran World Cup Qualifier
1999: Nominated in the Most Outstanding Sports Coverage for the FIFA World Cup
1999 Logies: Nominated for the Most Outstanding Sportscaster (to: Les Murray)
See also
ABC Sport
Seven Sport
Nine's Wide World of Sports
10 Sport
List of Australian television series
List of longest running Australian television series
Sports broadcasting contracts in Australia
References
External links
Official Site
Special Broadcasting Service
1980 establishments in Australia
Sports television in Australia
Sports divisions of TV channels |
https://en.wikipedia.org/wiki/Bounce%20TV | Bounce TV is an American digital multicast television network owned by Katz Broadcasting, a subsidiary of E. W. Scripps Company. Promoted as "the first 24/7 digital multicast broadcast network created to target African Americans", the channel features a mix of original and acquired programming geared toward African Americans between 25 and 54 years of age. The network is network affiliate with terrestrial television and television station in many media markets through digital subchannel. It is also available on the digital cable tiers of select cable providers at the discretion of local affiliates, as well as on Dish Network and DirecTV.
History
The network was founded on April 5, 2011. The founding group and initial ownership team included Martin Luther King III; former mayor of Atlanta, Georgia and ambassador of the United States to the United Nations Andrew Young and his son Andrew "Bo" Young III; and Rob Hardy and Will Packer, co-founders of Rainforest Films, a top African-American production company. Spearheading the network's creation were former Turner Broadcasting System executives Jonathan Katz and Ryan Glover with the pair having previously worked together with Tyler Perry to produce a number of high-order African-American sitcoms for TBS. Currently, Glover is president of Bounce TV and Katz is Chief Operating Officer. The "Bounce TV" name was chosen as a branding avenue to signify that the network is "going somewhere with energy".
The network formally launched on September 26, 2011 at 12:00 p.m. Eastern Time Zone, with the 1978 musical film The Wiz as its inaugural broadcast followed by A Raisin in the Sun with Do the Right Thing in primetime. The movie in primetime on the second day was Spike Lee's School Daze. This would be followed two days later with its first sports telecast, Central Intercollegiate Athletic Association football.
The network added its first acquired sitcoms in January 2015, when it acquired the rights to four series. On Friday, January 29, 2016, Bounce broadcast the 24th Annual Trumpet Awards, which honored history-making individuals. The network started producing its first primetime news magazine, Ed Gordon, in late June 2016 for a Tuesday, September 13, 2016 premiere.
On October 2, 2017, E. W. Scripps Company purchased Bounce TV along with Katz Broadcasting's three other networks. A list of 2019 Nielsen Media Research ratings published by Variety indicated that Bounce averaged 275,000 viewers in prime time, down 1% from the 2018 average.
Bounce and sister channel Grit TV were added to DirecTV on Sept 1st, 2022.
Programming
Bounce TV features programming geared toward an African-American audience that skews older than the demographic that its cable competitor BET primarily targets (adults between the ages of 25 and 54, compared to BET's target demographic of youths and adults ages 12 to 34). Bounce TV's programming primarily features a mix of acquired series and feature films. The network added its first |
https://en.wikipedia.org/wiki/BC%20%28video%20game%29 | B.C. was an action-adventure video game in development by Intrepid Computer Entertainment, a satellite of Lionhead Studios, which was to be published by Microsoft Game Studios for the Xbox. It was cancelled in 2004 for unknown reasons but Peter Molyneux revealed in an interview with IGN that the cancellation could have been due to the fact that Fable was further along in development than B.C. was. B.C. was going to take place during a prehistoric time period on a single continent which contained five levels. The player controls a tribe who has to evolve and migrate to become the best species in the game. Tribe members can be of different classes and each can level up different ways to evolve. The main enemies in the game are an ape-like creature called the "simians"; however, the world is also inhabited with many types of dinosaurs as well as other creatures, including the dodo. In 2015, game preservation group PtoPOnline revealed gameplay footage of B.C. from throughout the game's development.
Features
Brutal prehistoric combat: Players experience savage battles in an uncivilized, merciless era. Heads and limbs get torn off, and pools of blood congeal after brutal conflicts in a violent, dangerous world—where only the strong survive.
The world as a weapon: Gamers will discover and create a multitude of deadly weapons, using naturally occurring materials. Enemies can be poisoned with native plants. An avalanche can be triggered to kill predatory opponents. Interactive environments allow for multiple solutions. Any object can be picked up or used as a tool or weapon, and wild animals have the potential to be predator or prey.
A massive prehistoric world: Players must lead their tribe through the nascent earth's deadly, but beautiful environments. From ancient rainforests to underwater settings, from scathing desert heat to fierce mountain blizzards, gamers must weather the elements.
Deadly adversaries: The tribe becomes the hunted when deadly creatures, ranging from saber-toothed tigers to velociraptors, stalk tribe members for food or viciously defend their young when they perceive danger.
Evolution or extinction: Players could choose which type of people to be included in their tribe. Some examples included: hunters, mystics, and fighters. Each type benefits the tribe in its own specific way.
Early images at E3 showed extreme clarity and self shading but early reviews called the artificial intelligence the most impressive game aspect. According to GameSpot.com's information on BC, the game would have had a foodchain, like Peter Jackson's King Kong: The Official Game of the Movie, in which each part would have been subject to being eaten by something higher on the foodchain. In addition, the dinosaurs and other creatures would have been intelligent, interacting with each other, thus acting independently of the player. It would have been possible to affect the game world as a whole, leading some people to comment on the driving of certain |
https://en.wikipedia.org/wiki/Execute%20Direct%20Access%20Program | In IBM mainframe operating systems, Execute Direct Access Program (XDAP) is a pseudo access method for accessing direct access datasets on a block by block basis. XDAP is more specifically described in the OS System Programmer's Guide.
Existing blocks
Existing blocks may be read or updated. The dataset may not be created nor extended using XDAP; for that purpose a true access method is required. XDAP may coexist with BSAM or BPAM, and several OS components are implemented in this way.
DASD address computation
The programmer is responsible for computing the full direct access block identifier, MBBCCHHR. System algorithms are available for calculating the MBBCCHHR from a TTRN. System data, in the form of "track capacity tables", are available for calculating the TTRN from a block number, for any direct access device type. Later versions of the OS facilitate accessing very large capacity devices by using the TRKADDR macro.
List and Execute Forms
List and Execute forms of XDAP are supported, whereby a prototype form, called the List Form, is expanded as data, and a functional form, called the Execute Form, is expanded as instructions. XDAP is also supported conventionally, in which case the two forms are combined and is expanded as inline data and instructions. The use of List and Execute Forms facilitates the development of re-enterable programs.
XDAP implicitly invokes EXCP
XDAP results in the EXCP supervisor call being executed, hence Execute Channel Program (EXCP) is implicitly embedded within XDAP. The IOB, which is the sole parameter to EXCP, is included as a data structure within the XDAP macro expansion as are the channel command words.
OPENing an XDAP dataset
XDAP must reference an OPENed DCB and a full direct access identifier. The DCB may be OPENed for input, for output or for input and output ("INOUT"), but all outputs must be update writes of existing blocks as XDAP does not support format writes. BSAM and BPAM are available for executing format writes (writes which add new blocks to the dataset, i.e. the initial or an additional block, and, particularly, the final block).
IOBSPSVC flag for XDAP and SAM and PAM coexistence
The IOBSPSVC flag (logically, the IOB's SAM and PAM SVC flag) is available, and which causes Sequential Access Methods appendages to be bypassed. This enhancement, which was first implemented with SVS, but was not retrofitted to previous versions of the OS, significantly facilitated processing a dataset already OPENed for BSAM or BPAM, while using XDAP.
Otherwise, certain pre-SVS SAM and PAM appendages could cause random supervisor storage overlays when presented with certain XDAP channel programs. As IBM did not guarantee system security and data integrity on pre-SVS systems, an obvious circumvention was to utilize only those XDAP channel programs which did not also utilize RPS as it was the RPS-type XDAP channel programs which were confusing the SAM and PAM appendages, thereby leading to random supervisor stor |
https://en.wikipedia.org/wiki/RSGC1 | RSGC1 (Red Supergiant Cluster 1) is a young massive open cluster in the Milky Way galaxy. It was discovered in 2006 in the data generated by several infrared surveys, named for the unprecedented number of red supergiant members. The cluster is located in the constellation Scutum at the distance of about 6.6 kpc from the Sun. It is likely situated at the intersection of the northern end of the Long Bar of the Milky Way and the inner portion of the Scutum–Centaurus Arm—one of its two major spiral arms.
The age of RSGC1 is estimated at 10–14 million years. The cluster is heavily obscured and has not been detected in visible light. It lies close to other groupings of red supergiants known as Stephenson 2, RSGC3, Alicante 7, Alicante 8, and Alicante 10. The mass of RSGC1 is estimated at 30 thousand solar masses, which makes it one of the most massive open clusters in the Galaxy.
The observed red supergiants with the mass of about 16–20 solar masses are type II supernova progenitors. Over 200 main sequence stars have been detected with masses over , which allows the distance to be determined from main sequence fitting. Fourteen red supergiant members have been identified.
Members
RSGC1-F13
RSGC1-F13 is a peculiar red supergiant which is unusually red compared to the other stars. It is notable for having the highest mass-loss rate in the cluster at /yr. The star also has detected masers of SiO, H2O, and OH. ALMA detects CO emission in F13 along with four other supergiants in the cluster extending hundreds of stellar radii away from the stars. The CO mass loss rate is estimated to be /yr, which is an order of magnitude larger than the predicted value for the other red supergiants in the study. F13 is compared with VY Canis Majoris as a similarly extreme red supergiant, both displaying stronger and possibly eruptive mass-loss.
References
Open clusters
Scutum (constellation)
Scutum–Centaurus Arm |
https://en.wikipedia.org/wiki/Generalized%20minimum-distance%20decoding | In coding theory, generalized minimum-distance (GMD) decoding provides an efficient algorithm for decoding concatenated codes, which is based on using an errors-and-erasures decoder for the outer code.
A naive decoding algorithm for concatenated codes can not be an optimal way of decoding because it does not take into account the information that maximum likelihood decoding (MLD) gives. In other words, in the naive algorithm, inner received codewords are treated the same regardless of the difference between their hamming distances. Intuitively, the outer decoder should place higher confidence in symbols whose inner encodings are close to the received word. David Forney in 1966 devised a better algorithm called generalized minimum distance (GMD) decoding which makes use of those information better. This method is achieved by measuring confidence of each received codeword, and erasing symbols whose confidence is below a desired value. And GMD decoding algorithm was one of the first examples of soft-decision decoders. We will present three versions of the GMD decoding algorithm. The first two will be randomized algorithms while the last one will be a deterministic algorithm.
Setup
Hamming distance : Given two vectors the Hamming distance between and , denoted by , is defined to be the number of positions in which and differ.
Minimum distance: Let be a code. The minimum distance of code is defined to be where
Code concatenation: Given , consider two codes which we call outer code and inner code
and their distances are and . A concatenated code can be achieved by where Finally we will take to be RS code, which has an errors and erasure decoder, and , which in turn implies that MLD on the inner code will be polynomial in time.
Maximum likelihood decoding (MLD): MLD is a decoding method for error correcting codes, which outputs the codeword closest to the received word in Hamming distance. The MLD function denoted by is defined as follows. For every .
Probability density function : A probability distribution on a sample space is a mapping from events of to real numbers such that for any event , and for any two mutually exclusive events and
Expected value: The expected value of a discrete random variable is
Randomized algorithm
Consider the received word which was corrupted by a noisy channel. The following is the algorithm description for the general case. In this algorithm, we can decode y by just declaring an erasure at every bad position and running the errors and erasure decoding algorithm for on the resulting vector.
Randomized_Decoder
Given : .
For every , compute .
Set .
For every , repeat : With probability , set otherwise set .
Run errors and erasure algorithm for on .
Theorem 1. Let y be a received word such that there exists a codeword such that . Then the deterministic GMD algorithm outputs .
Note that a naive decoding algorithm for concatenated codes can correct up to errors.
Lemma 1. Let the a |
https://en.wikipedia.org/wiki/Widom | Widom may refer to:
Benjamin Widom (born 1927), chemist
Harold Widom (born 1932–2021), mathematician, brother of Benjamin
Jennifer Widom, computer scientist
Todd Widom (born 1983), tennis player
See also
Tracy–Widom distribution, in statistics
Widom insertion method, in thermodynamics
Widom scaling, hypothesis in statistical mechanics |
https://en.wikipedia.org/wiki/City%20of%20London%20Pedway%20Scheme | The City of London Pedway Scheme is a largely elevated pedway network that evolved out of a plan to transform traffic flows in the City of London by separating pedestrians from street level traffic using elevated walkways. First devised as part of the post World War II reconstruction plans for London, it was put into effect mainly from the mid-1950s to the mid-1960s, and had been largely mothballed by the 1980s. The scheme was partially revived in 2017 when a new section of walkway was added as part of a development in London Wall.
History
Versions of the plan had been under consideration since the 19th century, and given shape by the German Bauhaus movement, but the scheme was only given impetus in London after World War II, during which London had suffered severe bomb damage. Enthusiasts for the scheme saw an opportunity to put it into practice through the post-war reconstruction programme, and in 1947 architect Charles Holden and planner William Holford developed a blueprint that envisaged a network of first-floor walkways that would connect buildings across the City.
By the mid-1960s, the City of London Corporation had incorporated the scheme into its development plan. Although no coherent network was ever defined, designers of new developments were required to incorporate first-floor access to the Pedway network as a condition of being granted planning consent. As most of the network had not been built, this meant that many developments incorporated unused "dead space" at first-floor level and partial walkways that led to dead ends. In consequence, the scheme was unpopular with many architects.
Buildings that were required to incorporate links to the Pedway included the National Westminster Tower, which incorporated a pedestrian bridge across Bishopsgate that was never used and is now demolished; the Commercial Union building, the Barbican, and Draper's Gardens.
By the mid-1980s, the scheme had effectively been discontinued. The reason for its ultimate demise were escalating costs and the increase in influence of the conservation lobby, which opposed the extensive redevelopment of the historic areas of the City. The Pedway scheme only succeeded in establishing itself in areas that required extensive post-war reconstruction. The most extensive part of the network to be completed was in the Barbican Estate and surrounding streets; the main entrance to the Museum of London is, to this day, at first-floor level. Other significant stretches of the Pedway network were built in Lower Thames Street, Cannon Street and around the former Stock Exchange building.
In 2017, the pedway scheme was revisited when section of walkway was added as part of a new development on London Wall.
List of City of London Pedways
The list below shows routes of pedways on OpenStreetMap
The Barbican Highwalks(including the new London Wall walkways)
Blackfriars / Baynard House pedway
Peter's Hill pedway (all at ground level)
Fyefoot Lane pedway
Suffolk Lane pedway
Swa |
https://en.wikipedia.org/wiki/AllMovie | AllMovie (previously All Movie Guide) is an online database with information about films, television programs, television series, and screen actors. , AllMovie.com and the AllMovie consumer brand are owned by RhythmOne.
History
AllMovie was founded by popular-culture archivist Michael Erlewine, who also founded AllMusic and AllGame.
The AllMovie database was licensed to tens of thousands of distributors and retailers for point-of-sale systems, websites and kiosks. The AllMovie database is comprehensive, including basic product information, cast and production credits, plot synopsis, professional reviews, biographies, relational links and more.
AllMovie data was accessed on the web at the AllMovie website. It was also available via the AMG LASSO media recognition service, which can automatically recognize DVDs.
In late 2007, TiVo Corporation acquired AMG for a reported $72 million.
The AMG consumer facing web properties AllMusic.com, AllMovie.com and AllGame.com were sold by Rovi in August 2013 to All Media Network, LLC. The buyers also include the original founders of SideReel and Ackrell Capital investor Mike Ackrell.
RhythmOne offices are located in San Francisco, California, and Ann Arbor, Michigan, United States.
See also
AllMusic
AllGame
SideReel
All Media Network
IMDb
References
External links
– official website
Online film databases
American film review websites
Entertainment companies based in California
Internet properties established in 1998
Mass media companies established in 1998
1998 establishments in California |
https://en.wikipedia.org/wiki/PBJ%20%28TV%20network%29 | PBJ was an American digital broadcast children's television network originally a joint venture between Luken Communications (now Get After It Media) and DreamWorks Classics. PBJ is now owned by NBCUniversal. PBJ began programming in late summer 2011, and had 19 broadcast affiliates before they ceased operations in March 2016 due to NBCUniversal's acquisition.
Programming
PBJ aired programs from the DreamWorks Classics library including The Archie Show, Mr. Magoo, Sabrina the Teenage Witch, The Lone Ranger, Gumby, The Harveytoons Show, The Secrets of Isis, The New Adventures of Zorro, Shazam!, and Lassie.
PBJ also aired automotive programming from Tuff TV in non-prime midday and late night timeslots, along with paid programming.
Final programming
These were the shows aired on PBJ at the time the channel closed down.
3-2-1 Penguins!
The Archie Show
The Barkleys
BraveStarr
The Charlie Horse Music Pizza
Ethelbert the Tiger
Fabulous Funnies
Filmation's Ghostbusters
Gagsters
Get Reel Music Mix
Godzilla
Good Dog!
Groovie Goolies
Grassroots Racing TV
Guess with Jess
The Harveytoons Show
He-Man and the Masters of the Universe
Hero High
The Houndcats
Kid Fitness
Kid Power
Lamb Chop's Play-Along
Lassie
Mr. Magoo
My Life Me
My Parents Are Aliens
Pet Friends
Postman Pat
Ride Guide
Sabrina the Teenage Witch
The Secrets of Isis
Sergeant Preston of the Yukon
She-Ra: Princess of Power
Skippy the Bush Kangaroo
Space Academy
Theodore Tugboat
Tiny Toon Adventures
The Tomfoolery Show
VeggieTales
E/I
9th Period
Biz Kid$
Distant Roads
Eco Company
Mustard Pancakes
Real Life 101
Former programming
The Adventures of Black Beauty (Fall 2011)
Aqua Kids Adventures
Ariel, Zoey and Eli Too
Beta Records
Dog & Cat Training
Drop In
Fat Albert and the Cosby Kids (2011-2015)
The Lone Ranger (2011-Summer 2012)
Mountain Bike Show
Passport to Explore
Rocket Robin Hood (Winter-Spring 2012)
References
External links
Luken Communications website
DreamWorks Classics website
RabbitEars Website
Television channels and stations established in 2011
Television channels and stations disestablished in 2016
Former joint ventures
Defunct television networks in the United States
DreamWorks Classics |
https://en.wikipedia.org/wiki/LG%20Optimus%20Pad | The LG Optimus Pad is a tablet computer developed by LG Electronics for its own line-up and for specific mobile carriers in selected countries. Mobile carries include NTT DoCoMo and T-Mobile which unlike its domestic rival, Samsung offering the same tablet model for specific carriers, LG does not alter the specs of those they release to these carriers and the only alteration is on the addition of the mobile carriers logo on it. The LG Optimus Pad was first released in South Korea in April 2011 and then in the US in March 2011 which is also known as the T-Mobile G-Slate. It is LG's first device running Android 3.0 ("Honeycomb") and appeared at the Mobile World Congress in February 2011.
Features
The LG Optimus Pad has a 2MP front-facing camera and a 5MP rear-facing camera. It features an 8.9-inch touchscreen that includes Wi-Fi 802.11b/g/n and Bluetooth 2.1 and is powered by a 6400 mAh Li-Ion which runs on a 1 GHz Nvidia Tegra 2 processor and Android 3.0 Honeycomb with Optimus UI.
Critics
The tablet has been criticised for the lack of updates provided by LG and for locking the bootloader with the first update it got without notifying users. Neither LG or T-Mobile were helpful with any of the issues usually playing dead.
While its competitors like Motorola Xoom were usually updated at least to Android 4.0.3 Ice Cream Sandwich and mostly even to Android 4.1 Jelly Bean, LG only gave its G-Slate 2 minor updates and wasn't even able to release an important version 3.2 Honeycomb which should be theoretically simple for LG to make and would improve compatibility with apps, stability and extend functionality.
Because of this and closed drivers the Android community was not able to make a fully functional ICS or Jelly Bean ROM - most importantly camera can't be used with those builds.
Latest official ROM was released in March 2012 and unofficial ROM was officially abandoned in January 2013.
See also
LG Optimus Pad LTE The first successor to the LG Optimus Pad
LG G Pad 8.3 The second successor to the LG Optimus Pad
References
Optimus Pad
Tablet computers
Android (operating system) devices
Tablet computers introduced in 2011 |
https://en.wikipedia.org/wiki/In%20Their%20Footsteps | In Their Footsteps is a ten-part documentary depicting Australian families and war. The first episode aired in Australia on 8 May 2011 on the Nine Network. In each episode an Australian will retrace the steps of a close ancestor's wartime experience.
Series One (2011)
External links
Official website
The Age
Australian History Research
Nine Network original programming
2010s Australian documentary television series
2011 Australian television series debuts
2011 Australian television series endings
English-language television shows |
https://en.wikipedia.org/wiki/List%20of%20sitcoms%20broadcast%20in%20first-run%20syndication | Throughout the mid-to-late 1980s into the early 1990s, sitcoms continued to enter first-run syndication after being canceled by the networks, the most successful of which were Mama's Family and Charles In Charge. Other sitcoms during this time to enter first-run syndication after network cancellation included Silver Spoons, Punky Brewster, Webster, It's a Living, Too Close for Comfort, 9 to 5, What's Happening!! (retitled as What's Happening Now!!), and WKRP in Cincinnati (as The New WKRP in Cincinnati). Many of these sitcoms produced new shows in syndication mainly to have enough episodes for a profitable run in rerun syndication. Other sitcoms, such as Small Wonder, Out of This World, The Munsters Today, and Harry and the Hendersons (as well as more action-adventure oriented series including Superboy and My Secret Identity) enjoyed success in syndication throughout the entire run.
0–9
9 to 5 – After ABC cancelled it five episodes into the 1983–84 season, new episodes of 9 to 5 resurfaced in first-run syndication in late 1986. Valerie Curtin was back as Judy Bernly as was Rachel Dennison as Doralee Rhodes. Assuming the starring role, in place of the unavailable Rita Moreno (Violet Newstead), was Sally Struthers as slightly naive single mother Marsha McMurray Shrimpton, who added fresh perspective to the group. For the second time in the TV series, the company that the lead characters worked for changed again, this time to Barkley Foods International. In the syndicated version, Franklin Hart was history; the girls' superiors were ladies' man Russ Merman (Peter Evans), Bud Coleman (Edward Winter), and Marsha's boss in the 1986–87 season, Charmin Cunningham (Dorian Lopinto). The following season, Vice President of Sales E. Nelson Felb (Fred Applegate) became Marsha's boss. The series enjoyed a revival in popularity, and with its additional seasons in first-run syndication, 9 to 5 became eligible for rerun syndication.
A
The Abbott and Costello Show – The show was not a network program when first introduced but was sold into syndication by MCA Inc. to about 40 local stations across the country. As a result, it was broadcast on different days and at different times in different cities. In New York, it first appeared on the CBS affiliate, WCBS, on December 5, 1952 but was not carried nationally on that network. (The 1953–54 season was telecast locally on WNBT, as NBC's New York flagship station was then known). However, first season episodes were repeated as part of CBS' Saturday morning schedule during the 1954–55 season.
All That Glitters – All That Glitters debuted the week of April 18, 1977 on about 40 stations in late-night syndication. After initially capturing 20% of viewers in major markets in its opening weeks, All That Glitters eventually lost about half of that audience mid-way through its run. The series was cancelled after 13 weeks, last airing on July 15, 1977.
B
The Baxters – Unlike most other sitcoms, each episode was open-ended |
https://en.wikipedia.org/wiki/Philipp%20Koehn | Philipp Koehn (born 1 August 1971 in Erlangen, West Germany) is a computer scientist and researcher in the field of machine translation. His primary research interest is statistical machine translation and he is one of the inventors of a method called phrase based machine translation. This is a sub-field of statistical translation methods that employs sequences of words (or so-called "phrases") as the basis of translation, expanding the previous word based approaches. A 2003 paper which he authored with Franz Josef Och and Daniel Marcu called Statistical phrase-based translation has attracted wide attention in Machine translation community and has been cited over a thousand times. Phrase based methods are widely used in machine translation applications in industry.
Philipp Koehn received his PhD in computer science in 2003 from the University of Southern California, where he worked at the Information Sciences Institute advised by Kevin Knight. After a year as a postdoctoral fellow under Michael Collins at the Massachusetts Institute of Technology, he joined the University of Edinburgh as a lecturer in the School of Informatics in 2005. He was appointed reader in 2010 and professor in 2012. In 2014, he was appointed professor at the computer science department of The Johns Hopkins University, where he is affiliated with the Center for Language and Speech Processing.
Moses statistical machine translation decoder
The Moses machine translation decoder is an open source project that was created by and is maintained under the guidance of Philipp Koehn. The Moses decoder is a platform for developing Statistical machine translation systems given a parallel corpus for any language pair.
The decoder was mainly developed by Hieu Hoang and Philipp Koehn at the University of Edinburgh and extended during a Johns Hopkins University Summer Workshop and further developed under Euromatrix and GALE project funding. The decoder (which is part of a complete statistical machine translation toolkit) is the de facto benchmark for research in the field.
Although Koehn continues to play a major role in the development of Moses, the Moses decoder was supported by the European Framework 6 projects Euromatrix, TC-Star, the European Framework 7 projects EuroMatrixPlus, Let's MT, META-NET and MosesCore and the DARPA GALE project, as well as several universities such as the University of Edinburgh, the University of Maryland, ITC-irst, Massachusetts Institute of Technology, and others. Substantial additional contributors to the Moses decoder include Hieu Hoang, Chris Dyer, Josh Schroeder, Marcello Federico, Richard Zens, and Wade Shen.
Europarl corpus
The Europarl corpus is a set of documents that consists of the proceedings of the European Parliament from 1996 to the present. The corpus has been compiled and expanded by a group of researchers led by Philipp Koehn at University of Edinburgh. The data that makes up the corpus was extracted from the website of the Europ |
https://en.wikipedia.org/wiki/Sheldon%20Brown%20%28artist%29 | Sheldon Brown (born July 13, 1962) is an American artist and former Professor of Computer Art at the University of California, San Diego where he held the John D. and Catherine T. MacArthur Foundation Endowed Chair of Digital Media and Learning. He was the founding director of the Arthur C. Clarke Center for Human Imagination at UCSD, a co-founder of the California Institute of Information Technologies and Telecommunications, where he was Artist-in-Residence, and he was the site director of the Center for Hybrid Multicore Productivity Research at UCSD. He has been a Visiting Arts Professor at NYU Shanghai, an Honorary Professor at Shanghai University and Professor and Research Leader at the Creative Computing Institute, University of the Arts London. His work examines the relationships between mediated and physical experiences.
Works
Brown's projects concerns the overlapping and reconfiguration of private and public spaces and how new forms of mediation are proliferating. Examples include "In the Event" at the KeyArena in Seattle, where nine computers choreographed multiple video streams across 28 monitors in a real-time constructive engagement with the spectator's act of envisioning the events of the arena. In "The Video Wind Chimes", an outdoor video installation/street lighting project, the electromagnetic spectrum used for television broadcast was transformed into the passive illumination of a nocturnal lighting system, articulated by the wind. "Smoke and Mirrors" and "Mi Casa es tu Casa" use the contextual apparatus of museums with adjacent mission scopes to the artworld, for bringing avant-garde strategies to engage social issues to venues that use more pedantic forms of discourse.
His later projects include "The Scalable City", with exhibitions at Ars Electronica, Shanghai MOCA, India International Center in New Delhi, SIGGRAPH 2007 and the National Academy of Sciences; and Istoria, which explores the intersection of the virtual and physical worlds, created with computer-controlled processes, and several interactive environments that use a cross-fertilization of virtual reality and game technologies.
Media and talks
Scalable City was featured on the Souvenirs from Earth television show in both Germany and France. The project was also the subject of ACM publications including Accelerating the Scalable City. Brown has given talks around the world, including TEDxDelMar
Game Theorist Noah-Wardrip Fruin wrote of Brown's Scalable City project that it "may not seem like gameplay at all" and provides the player little structure or agency, but still creates a pleasurable experience of destruction.
References
External links
Sheldon Brown's Website
Arthur C. Clarke Center for Human Imagination
Calit2 Artist-in-Residence
Experimental Game Lab
Scalable City Project
American artists
1962 births
Living people
University of California, San Diego faculty |
https://en.wikipedia.org/wiki/Subject%3A%20I%20Love%20You | Subject: I Love You is a 2011 American drama romance film based on the "I Love You" computer virus of 2000. The film stars Jericho Rosales and Briana Evigan.
Plot
Inspired by the "I love u" computer virus, the film tells the story of a young man, Victor, who will do anything to reconnect with Butterfly, the only woman he has ever loved- even if it means entangling himself in an international criminal investigation.
Cast
Briana Evigan as Butterfly
Jericho Rosales as Victor
Dean Cain as James Trapp
Dante Basco as Nicky
Kristin Bauer as Sarah Drake
Lauren Bittner as Renna
Gary Valenciano as Choy
Apl.de.Ap as Calessa Driver
Andrew Leeds as Chris
Luisse Belle Pressman as Lucy
Tirso Cruz III as Frankie
Munda Razooki as Goon
Ermie Concepcion as Adela
Joel Torre as Marlon
See also
Blood Ransom
References
External links
2011 romantic drama films
2011 films
American romantic drama films
Films shot in Metro Manila
Films set in Metro Manila
Films about interracial romance
Films shot in the Philippines
2010s American films |
https://en.wikipedia.org/wiki/Umot%C3%ADna%20language | Umotína or Umutína is a recently extinct language of Brazil.
Phonology
It is one of the few languages in the world to have a linguolabial consonant; in unpublished data, Floyd Lounsbury reported it has the voiceless linguolabial plosive: //.
References
Bororoan languages
Indigenous languages of South America
Languages of Brazil
Mato Grosso
Extinct languages of South America |
https://en.wikipedia.org/wiki/Sequence%20Read%20Archive | The Sequence Read Archive (SRA, previously known as the Short Read Archive) is a bioinformatics database that provides a public repository for DNA sequencing data, especially the "short reads" generated by high-throughput sequencing, which are typically less than 1,000 base pairs in length. The archive is part of the International Nucleotide Sequence Database Collaboration (INSDC), and run as a collaboration between the NCBI, the European Bioinformatics Institute (EBI), and the DNA Data Bank of Japan (DDBJ).
The archive was established by the National Center for Biotechnology Information (NCBI) in 2007 in order to provide a repository for data produced by RNA-Seq and ChIP-Seq studies as well as large-scale studies including the Human Microbiome Project and the 1000 Genomes Project. Originally called the Short Read Archive, the name was changed in anticipation of future sequencing technologies being able to produce longer sequence reads.
The volume of data deposited in the Sequence Read Archive has grown rapidly. As of September 2010, 65% of the SRA was human genomic sequence, with another 16% relating to human metagenome sequence reads. Much of this data was deposited through the 1000 Genomes Project. In June 2011, the data contained within the SRA passed 100 Terabases of DNA in volume.
The preferred data format for files submitted to the SRA is the BAM format, which is capable of storing both aligned and unaligned reads. Internally the SRA relies on the NCBI SRA Toolkit, used at all three INSDC member databases, to provide flexible data compression, API access and conversion to other formats such as FASTQ.
NCBI announced their plan to close the NCBI SRA in February 2011 due to funding reduction. However, EBI and DDBJ announced that they would continue to support the SRA. In October 2011, NCBI announced continuation of funding for the SRA.
Deposition of data in the SRA is mandated by most funding agencies and open access journals. Nature Publishing Group journals require that DNA and RNA sequencing data is made available through the SRA.
See also
List of biological databases
References
External links
European Nucleotide Archive, page for searches in SRA
SRA homepage at NCBI.
ERA submissions at EBI.
DRA homepage at DDBJ.
Genetics databases
Genetics in the United Kingdom
Science and technology in Cambridgeshire
South Cambridgeshire District |
https://en.wikipedia.org/wiki/Arich%20Anpin | Arich Anpin or Arikh Anpin (Aramaic: אריך אנפין meaning "Long Face/Extended Countenance" (also implying "The Infinitely Patient One", called Macroprosopus in the Kabbala Denudata) is an aspect of Divine emanation in Kabbalah, identified with the sephirah attribute of Keter, the Divine Will.
The Zohar's imagery expounds its role in Creation, where it is the macroscopic equivalent of Zeir Anpin (Microprosopus) in the sephirotic tree of life. In 16th-century Lurianic doctrine, it becomes systemised as one of the six Primary Partzufim Divine Personae, as part of the cosmic process of Tikkun Rectification. The Lurianic scheme recasts the linear Medieval-Kabbalistic hierarchy of lifeforce in Creation into dynamic processes of interinclusion, analogous to the enclothement of a soul into a lower body. In this way, the Partzuf Arich Anpin is said to descend immanently through all levels of Creation as their concealed substratum Divine intention, though in progressively more concealed mode.
Its inner dimension is identified as the related, but transcendent Partzuf Atik Yomin ("Ancient of Days"), synonymous with inner Divine Delight, the "Will of Wills/Primary Will", the most pristine cause for Creation.
Two Partzufim-Configurations and three Reishin-Heads in Keter-Crown
The sefirah of Keter (above-conscious Divine "Crown") develops into two Partzufim (Configurations): Arich Anpin, its outer extending Ratzon (Will), and Atik Yomin ("Ancient of Days"), its inner motivating Divine Taanug (Delight). As man is seen as "made in the Divine image", Divinity is perceived through psychological awareness of the Divine Kochos HaNefesh (Human Soul Powers) articulated in Hasidic thought.
In Kabbalah the functional role of the sephirot and partzufim in enacting Creation is explored. The 7 lower emotional sefirot of Zeir Anpin enclothe within Arich Anpin, as God's essential delight motivates the Will to Create. The 3 upper intellectual sefirot of Atik Yomin, transcending Arich Anpin, are the Divine source of Emunah (Faith) through essential unity with the essence of the soul. Together, three levels, arising from the overlapping of the two Partzufim of Keter, form the three Reishin (Heads) of Keter. The Lurianic Tikun rectification process of the world of Atzilut begins with its Keter-"Crown". The crown of a world is its essential "head" of which the Zohar says analogously, "When the head/leader of the people is rectified, the entire people is rectified". The three heads of Keter in Atzilut:
Reisha d'lo Ityada, acronym RADL"A, (the "Unknowable Head"), Unity source of essential faith
Reisha d'Ayin (the "Head of Nothingness"-Ayin), source of the inner motivation of unconscious Delight
Reisha d'Arich (the "Extended/Infinite Head"), leading Arich Anpin, the outer descending extension of Will
The consciousness of the World of Atziluth-Emanation, highest of the Four Worlds, is still completely nullified within its Divine source, perceiving no self existence. Only in the |
https://en.wikipedia.org/wiki/PCRPi-DB | Presaging Critical Residues in Protein Interfaces Database (PCRPi-DB) is a database of annotated hot spots in protein complexes for which the 3D structure is known.
See also
Protein structure
References
External links
http://www.bioinsilico.org/PCRPIDB.
Biological databases
Proteomics |
https://en.wikipedia.org/wiki/Kenya%20Health%20Work%20Force%20Project | The Kenya Health Work Force Project is a project to move health informatics in Kenya from a paper system to a computer-based database. They are being assisted by the Georgia Tech Research Institute and the Lillian Carter Center for International Nursing. It is being led by Martha Rogers.
References
Health informatics
Healthcare in Kenya |
https://en.wikipedia.org/wiki/Kinetic%20scheme | In physics, chemistry and related fields, a kinetic scheme is a network of states and connections between them representing the scheme of a dynamical process. Usually a kinetic scheme represents a Markovian process, while for non-Markovian processes generalized kinetic schemes are used. Figure 1 shows an illustration of a kinetic scheme.
A Markovian kinetic scheme
Mathematical description
A kinetic scheme is a network (a directed graph) of distinct states (although repetition of states may occur and this depends on the system), where each pair of states i and j are associated with directional rates, (and ). It is described with a master equation: a first-order differential equation for the probability of a system to occupy each one its states at time t (element i represents state i). Written in a matrix form, this states: , where is the matrix of connections (rates) .
In a Markovian kinetic scheme the connections are constant with respect to time (and any jumping time probability density function for state i is an exponential, with a rate equal the value of all the exiting connections).
When detailed balance exists in a system, the relation holds for every connected states i and j. The result represents the fact that any closed loop in a Markovian network in equilibrium does not have a net flow.
Matrix can also represent birth and death, meaning that probability is injected (birth) or taken from (death) the system, where then, the process is not in equilibrium. These terms are different than a birth–death process, where there is simply a linear kinetic scheme.
Specific Markovian kinetic schemes
A birth–death process is a linear one-dimensional Markovian kinetic scheme.
Michaelis–Menten kinetics are a type of a Markovian kinetic scheme when solved with the steady state assumption for the creation of intermediates in the reaction pathway.
Generalizations of Markovian kinetic schemes
A kinetic scheme with time dependent rates: When the connections depend on the actual time (i.e. matrix depends on the time, ), the process is not Markovian, and the master equation obeys, . The reason for a time dependent rates is, for example, a time dependent external field applied on a Markovian kinetic scheme (thus making the process a not Markovian one).
A semi-Markovian kinetic scheme: When the connections represent multi exponential jumping time probability density functions, the process is semi-Markovian, and the equation of motion is an integro-differential equation termed the generalized master equation: .
An example for such a process is a reduced dimensions form.
The Fokker Planck equation: when expanding the master equation of the kinetic scheme in a continuous space coordinate, one finds the Fokker Planck equation.
See also
Markov process
Continuous-time Markov process
Master equation
Detailed balance
Graph theory
Semi-Markov process
References
Biophysics
Physical chemistry
Theoretical physics
Statistical mechanics
Stochasti |
https://en.wikipedia.org/wiki/Analyst%27s%20Notebook | i2 Analyst's Notebook is a software product from i2 Group for data analysis. Based on ELP (entity-link-property) methodology, it reveals relationships between data entities to discover patterns and provide insight into data. It is commonly used by digital analysts at law enforcement, military and other government intelligence agencies, and by fraud departments. It is a part of the Human Terrain System, a United States Army program which embeds social scientists with combat brigades. Several investigations, including an investigation into fraud in the U.S. Army, are reported to have used it. It is also used by Swedish police to analyse social contacts and social networks.
IBM acquired i2 Analyst's Notebook when it bought the i2 Group.
See also
List of concept- and mind-mapping software
References
External links
.
i2accelerate. "World Leading Intelligence Analysis – Analyst's Notebook 8.5", YouTube, 25 September 2010. Retrieved 10 November 2013.
Data analysis software
Mind-mapping software |
https://en.wikipedia.org/wiki/ProtCID | The Protein Common Interface Database (ProtCID) is a database of similar protein-protein interfaces in crystal structures of homologous proteins.
Its main goal is to identify and cluster homodimeric and heterodimeric interfaces observed in multiple crystal forms of homologous proteins. Such interfaces, especially of non-identical proteins or protein complexes, have been associated with biologically relevant interactions.
A common interface in ProtCID indicates chain-chain or domain-domain interactions that occur in different crystal forms. All protein sequences of known structure in the Protein Data Bank (PDB) are assigned a ”Pfam chain architecture”, which denotes the ordered Pfam assignments for that sequence, e.g. (Pkinase) or (Cyclin_N)_(Cyclin_C). Homodimeric interfaces in all crystals that contain particular domain or chain architectures are compared, regardless of whether there are other protein types in the crystals. All interfaces between two different Pfam domains or Pfam architectures in all PDB entries that contain them are also compared (e.g., (Pkinase) and (Cyclin_N)_(Cyclin_C) ). For both homodimers and heterodimers, the interfaces are clustered into common interfaces based on a similarity score.
ProtCID reports the number of crystal forms that contain a common interface, the number of PDB entries, the number of PDB and PISA biological assembly annotations that contain the same interface, the average surface area, and the minimum sequence identity of proteins that contain the interface. ProtCID provides an independent check on publicly available annotations of biological interactions for PDB entries.
ProtCID also contains interface clusters between protein domains and peptides, nucleic acids, and ligands.
See also
Protein-protein interaction
References
External links
http://dunbrack2.fccc.edu/protcid
Protein Interfaces, Surfaces and Assemblies (PISA)
http://www.rcsb.org
Biological databases
Systems biology
Crystallographic databases
Protein structure |
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%201145 | Uppland Runic Inscription 1145, or U 1145 in the Rundata catalog, is a Viking Age memorial runestone that is located near the town of Tierp in Uppland, Sweden.
Description
U 1145, which consists of a serpent that circles a cross, is classified as being carved in either runestone style Pr2 or Pr3. The text states that Ríkr and Gunnthrúðr raised the stone in memory of Fasti. The text ends in a prayer which uses the Norse word salu for soul, which was borrowed from English and was first used in another inscription during the tenth century. The runes in the prayer follow the rule that double letters are represented with only a single rune, even if one of the two letters are at the end of one word and the second is at the beginning of the next word. In U 1145 this rule applies to four consecutive words in the prayer, which are written as honsalukuþs on the stone. The transliteration of the runic text for these words in the prayer, hons| |salu| |uk| |kuþs, shown below shows word divisions and a separate s, u, and k rune for each of the words.
Inscription
Transliteration of the runes into Latin characters
: r(i)kr ' lit raisa stain þino ' abtiʀ fasta faþur sin auk þauh kunþruþr ' k[uþ hial]bi hons| |salu| |uk| |kuþs muþiʀ
Transcription into Old Norse
Rikʀ let ræisa stæin þenna æftiʀ Fasta, faður sinn, ok þau Gunnþruðr. Guð hialpi hans salu ok Guðs moðiʀ.
Translation in English
Ríkr had this stone raised in memory of Fasti, his father, and Gunnthrúðr (also raised). May God and God's mother help his soul.
References
Runestones in Uppland |
https://en.wikipedia.org/wiki/DXCK | DXCK (91.9 FM), broadcasting as 91.9 iFM News, is a radio station owned and operated by the Radio Mindanao Network. The station's studio and transmitter is located at the RMN Broadcast Center, Bulaong National Highway, Brgy. Dadiangas North, General Santos.
References
Radio stations in General Santos
Radio stations established in 1994 |
https://en.wikipedia.org/wiki/Transport%20in%20Cuddalore | Cuddalore is connected to other parts of Tamil Nadu through rail and road networks. Frequent buses run to nearby towns.
Roads
National Highway NH 32 (Chennai - Tindivanam - Pondicherry - Cuddalore - Chidambaram - Nagapattinam - Velankanni - Thondi - Ramanathapuram - Sayalkudi - Thoothukudi Highway) passes through Cuddalore.
Three state highways connect Cuddalore with other parts of Tamil Nadu. The state highways originating from Cuddalore are
SH-9, (the Cuddalore–Nellikuppam–Melpattampakkam–Panruti–Madapattu–Thirukovilur–Tiruvannamalai–Polur–Vellore–Katpadi–Chittoor road)
NH-532, (the Cuddalore-Vadalur-Neyveli-Vriddhachalam-Veppur-Salem Road)
SH-68, (the Cuddalore-Thiruvanthipuram-Palur-Panruti-Arasur-Thirukovilur-Sankarapuram Road)
References
Cuddalore district
Cuddalore
Cuddalore |
https://en.wikipedia.org/wiki/Bara%20Br%C3%B6st | Bara Bröst network (, literally "Just Breasts", "Only Breasts" or "Bare Breasts") is a cultural movement of Swedish feminists campaigning for the right of women to swim topless and to bare their breasts at beaches and in public pools.
The incident that led to the creation of the Bara Bröst took place in September 2007 at a swimming pool in Uppsala. A lifeguard on duty ordered two topless women to come out of the water and cover up their breasts. When they refused, they were forced to leave the premises. The incident drew national public attention. Outraged by what they saw as gender discrimination, Bara Bröst organized a show of solidarity with their own topless swimming actions at public pools in Malmö and in Lund. "We want our breasts to be as 'normal' and desexualized as men's, so that we too can pull off our shirts at football matches," spokeswomen Astrid Hellroth and Liv Ambjörnsson told the Ottar magazine published by the Swedish Association for Sexuality Education (RFSU).
The legal wrangle
Topless women at pools who were asked to vacate the premises demanded a full refund. Meanwhile, Inger Grotteblad of the leisure complex in Uppsala told the local newspaper that women are not permitted to bathe topless there. "Swimming pools generally require men to wear swimming trunks and women to wear either bikinis or one-piece swimsuits" she said. However, due to continuous pressure by the feminists from the Bara Bröst network, in 2009 the Malmö Sports and Recreation Committee in their final decision voted against a motion requiring women to wear "a top piece" with a two-piece swimsuit. The city officials considered a vote to be necessary; its results were unanimous. As a result, there is no requirement for women to cover their breasts at the city’s indoor pools at Lindängen, Oxievångsbadet and Aq-va-kul (pictured) if no one complains (including families with children). Bengt Forsberg, chair of the Sports and Recreation Committee said in an interview: "We don't define what bathing suits men should wear so it doesn't make much sense to do it for women. Also, it's not unusual for men to have large breasts that resemble women's breasts."
Notably, the new ruling by the city administration at Malmö did not result in any significant difference in the way female swimmers and sunbathers behaved that year at local pools, either indoors or outdoors. Zakrea El-Falou of the swimming pool in the centre of the city said: "My colleagues and I have not seen any women who have made use of the possibility to swim topless – not while we have been on duty anyway." Robert Nilsson, a city staffer at an open-air pool, noticed the same thing: "I haven't seen a single woman bathing topless during any of my shifts", he said.
See also
Topfreedom
Notes and references
External links
Official website (in Swedish)
Feminism in Sweden |
https://en.wikipedia.org/wiki/RISCOS%20Ltd | RISCOS Ltd. (also referred to as ROL) was a limited company engaged in computer software and IT consulting. It licensed the rights to continue the development of and to distribute it for desktop machines (as an upgrade or for new machines) from Element 14 and subsequently Pace Micro Technology. Company founders include developers who formerly worked within Acorn's dealership network. It was established as a nonprofit company. On or before 4 March 2013 3QD Developments acquired RISCOS Ltd's flavour of RISC OS. RISCOS Ltd was dissolved on 14 May 2013.
History
RISCOS Ltd was formed to continue end-user-focused development of RISC OS after the de-listing of Acorn Computers, following its purchase by Morgan Stanley Dean Witter in order to benefit from the shareholding that Acorn held in ARM Ltd. In March 1999, RISCOS Ltd obtained exclusive rights to develop and sell RISC OS 4 for the desktop market from Element 14. A few weeks later Pace purchased Acorn's Cambridge headquarters and staff for £200,000 and then continued to develop its own, in-house version of RISC OS, primarily for set-top boxes and other embedded devices.
At the time of the company's formation, it was noted that having access to the source code could facilitate removal of the OS's dependence on Acorn's proprietary chips. This simplifies entry to the hardware market by new companies.
On 29 January and 14 May 2013 RISCOS Ltd was listed in the London Gazette: on 14 May 2013 it was struck from the register of companies and dissolved. The rights to all versions of RISC OS previously developed and marketed by RISCOS Ltd were purchased by 3QD Developments Ltd, the maker of VirtualAcorn.
Products
RISC OS 4
RISCOS Ltd completed work on RISC OS 4 and in July 1999 it was released as an upgrade for existing machines, priced at £120. Improvements include support for long filenames, larger disk sizes and partitions, along with a new desktop look.
Work then continued on a system of soft-loaded updated versions of the OS, released under an annual subscription release scheme named RISC OS Select in 2002.
In 2004, the company replaced its baseline RISC OS 4.02 product with an updated version of the OS named RISC OS Adjust. This version of RISC OS was based on version 4.39, or Select Edition 3 Issue 4, of the company's Select scheme. In the same year, RISCOS Ltd agreed to produce a fully 32-bit-compatible version of RISC OS Adjust for Advantage Six's A9home product. The A9home was released in May 2006 after a 12-month beta-testing process, although the build of Adjust 32, namely RISC OS 4.42, is not feature-complete.
RISC OS Six
In October 2006, a beta-version of RISC OS Six was made available for download by subscribers to the Select scheme. RISC OS Six represents the next generation of RISCOS Ltd's stream of the operating system. Significant portability, stability and internal structure improvements, including full 26/32-bit neutrality, have laid the foundations for the company's futu |
https://en.wikipedia.org/wiki/Woo%E2%80%93Lam | In cryptography, Woo–Lam refers to various computer network authentication protocols designed by Simon S. Lam and Thomas Woo. The protocols enable two communicating parties to authenticate each other's identity and to exchange session keys, and involve the use of a trusted key distribution center (KDC) to negotiate between the parties. Both symmetric-key and public-key variants have been described. However, the protocols suffer from various security flaws, and in part have been described as being inefficient compared to alternative authentication protocols.
Public-key protocol
Notation
The following notation is used to describe the algorithm:
- network nodes.
- public key of node .
- private key of .
- nonce chosen by .
- unique identifier of .
- public-key encryption using key .
- digital signature using key .
- random session key chosen by the KDC.
- concatenation.
It is assumed that all parties know the KDC's public key.
Message exchange
The original version of the protocol had the identifier omitted from lines 5 and 6, which did not account for the fact that is unique only among nonces generated by A and not by other parties. The protocol was revised after the authors themselves spotted a flaw in the algorithm.
See also
Kerberos
Needham–Schroeder protocol
Otway–Rees protocol
References
Computer network security
Authentication methods |
https://en.wikipedia.org/wiki/Anatomy%20of%20a%20Disaster | Anatomy of a Disaster is a Philippine documentary television show broadcast by GMA Network. Hosted by Richard Gutierrez, it premiered on August 22, 2010. The show concluded on November 6, 2011.
Overview
Considered to be a more comprehensive version of Richard's former infotainment show Full Force Nature, Anatomy of a Disaster features different stories of tragedy, survival, and heroism based on the GRB Entertainment-produced documentary series Earth's Fury (also known as Anatomy of Disaster). Each of the 13 episodes provides an account of various natural disasters such as volcanic eruption, flood, hurricane, earthquake, and climate change, among others, in both local and international contexts.
Episodes
Anatomy of a Disaster (August 22, 2010)
Anatomy of a Disaster: Ragasa ng Panganib (September 26, 2010)
Anatomy of a Disaster: Bagsik ng Magma (October 31, 2010)
Anatomy of a Disaster: Urban Inferno (November 14, 2010)
Anatomy of a Disaster: Himagsik Ng Kalikasan (January 23, 2011)
Anatomy of a Disaster: Lagalag Ng Kalikasan (February 20, 2011)
Anatomy of a Disaster: Week Long Special (March 21, 2011)
Anatomy of a Disaster: Nag-aapoy Na Unos (April 24, 2011)
Anatomy of a Disaster: Ang Puot ng Karagatan (May 22, 2011)
Ratings
According to AGB Nielsen Philippines' Mega Manila People/Individual television ratings, the pilot episode of Anatomy of a Disaster earned a 6.6% rating.
Accolades
References
External links
2010 Philippine television series debuts
2011 Philippine television series endings
Filipino-language television shows
GMA Network original programming
Philippine documentary television series
Philippine television series based on American television series
Disaster television series
Documentary films about natural disasters |
https://en.wikipedia.org/wiki/Baby%20for%20Sale | Baby for Sale is a 2004 television film that was premiered on the Lifetime Network on 12 July 2004. It stars Dana Delany and was directed by Peter Svatek. The filming took place in Montreal, Quebec, Canada. The story is based on true life events
Cast
Dana Delany as Nathalie Johnson
Hart Bochner as Steve Johnson
Bruce Ramsay as Gabor Szabo
Romano Orzari as Joey Perrotta
Elizabeth Marleau as Janka
Ellen David as Kathy Williamson
Claudia Besso as Laura Jackson
Reception
Andy Webb from "The Movie Scene" gave the film three out of five stars and wrote: "What this all boils down to is that "Baby for Sale" typically has an interesting true story but just as typically for a Lifetime movie comes up short on realism and subtlety making it very much a movie for a certain type of audience who don't require gritty realism to be entertained." Robert Pardi from TV Guide gave it two out of four stars.
References
External links
Baby for Sale at MyLifetime.com
Baby for Sale at The New York Times
2004 television films
2004 films
Canadian drama television films
English-language Canadian films
Lifetime (TV network) films
Films directed by Peter Svatek
American drama television films
2000s American films
2000s Canadian films |
https://en.wikipedia.org/wiki/NextIO | NextIO, Inc was an information technology company based in Austin, Texas, providing solutions for PCIe expansion and I/O virtualization for traditional data centers and HPC environments. NextIO was considered one of the original founding contributors to the creation of the IOV space.
History
NextIO was founded in 2003 by Brooks Ivey, K.C. Murphy, Gordon Burk, Jim Everett and Chris Pettey, however only Murphy, Ivey and Everett remained. The privately held company's initial funding was by Adams Capital Management, JK&B Capital, VentureTech Alliance, and Dell, Inc. Subsequent investment round participants included Crescendo Ventures. K. C. Murphy served as the company's president and chief executive officer, as well as its chairman of the board. According to their website, NextIO ceased operations on August 19, 2013.
References
External links
archive.org: NextIO.com 4 May 2012
Networking companies of the United States
Companies based in Austin, Texas |
https://en.wikipedia.org/wiki/List%20of%20LTE%20networks | This is a list of commercial Long-Term Evolution (LTE) networks around the world, grouped by their frequency bands.
Some operators use multiple bands and are therefore listed multiple times in respective sections.
General information
For technical details on LTE and a list of its designated operating frequencies, bands, and roaming possibilities, see LTE frequency bands.
Bands 33 to 53 are assigned to TDD-LTE.
Note: This list of network deployments does not imply any widespread deployment or national coverage.
Africa
See List of LTE networks in Africa.
Americas
Caribbean
French Overseas Territories (CEPT band plan)
Central and South America (APT band plan)
Belize, Bolivia, Canada (FCC band plan)
Canada: Bell Network Availability within Tier 3 License Areas
United States and US Territories (FCC band plan)
Apart from their main spectrum holdings across large regions in the country (listed below) the major US carriers (AT&T, Sprint, T-Mobile & Verizon) also hold various Cellular Market Area (CMA) and/or Economic Area (EA) licenses for the AWS 1700 band, as well as Major Trading Area (MTA) and/or Basic Trading Area (BTA) licenses for the PCS 1900 band. In several small regional areas the named operators combine these with their major spectrum holdings to increase the bandwidth for their LTE deployments. Due to the large amount of these "single" licenses they are not listed here.
Third-party users of U.S. LTE networks and spectrum sublessees
Asia
See List of LTE networks in Asia.
Europe
See List of LTE networks in Europe.
Oceania
See also
LTE
LTE frequency bands
List of planned LTE networks
List of 5G NR networks
List of UMTS networks
List of CDMA2000 networks
List of mobile network operators
References
Lists by country
LTE (telecommunication)
Telecommunications lists |
https://en.wikipedia.org/wiki/CollegeNET | College NET, Inc. is an American developer of web technologies for higher education and non-profit institutions based in Portland, Oregon.
History
Founded as Universal Algorithms, Inc., the company introduced the first automated classroom scheduling program for higher education. The company continued to expand the scheduling program to include event scheduling and resource management and calendar publishing. The company also introduced web-based graphical analysis tools for campus space planning. In 1995, the company began offering Software as a Service (SaaS) to institutions with the Apply Web® system, which included online admission application processing and evaluation for colleges and universities, as well as recruitment and communication management tools.
The company changed its name to College NET in May 1999. In recent years, College NET has expanded its products to include online course evaluation surveys, asynchronous video interviewing, international academic recruitment, and career services for students.
Products and Services
Admissions
Prospect – Recruitment and communication management system
Admit – Admissions application evaluation management system
Apply Web – Application processing system
Scheduling and Space Management
25Live – Web-based event scheduling and publishing
Schedule25 – Automated bulk course scheduling
X25 – Graphical reporting and master planning
Career Services
Stand Out – Video recruitment network for employers, students, and campus career centers
Course Evaluation and Surveys
What Do You Think? – Online course evaluations and surveys
International Student Services
US Academy – Online resource for gaining a better understanding of US culture
Video Interview – Web technology for international college admissions
CertiFile – Academic document authentication and delivery services
Universities using CollegeNet
Stanford University, Princeton University, University of Michigan, Elon University, University of Nebraska–Lincoln, University of Oregon, University of Washington and Oregon State University use College NET's services.
College Scholarships
College NET operates the Mach 25 scholarship search engine.
Social mobility index
College Net produces the Social Mobility Index (SMI) which measures the degree that individual colleges and universities contribute to social mobility.
See also
List of companies based in Oregon
References
Software companies established in 1977
Companies based in Portland, Oregon
1977 establishments in Oregon |
https://en.wikipedia.org/wiki/Santa%20Fe%20Trail%20problem | The Santa Fe Trail problem is a genetic programming exercise in which artificial ants search for food pellets according to a programmed set of instructions. The layout of food pellets in the Santa Fe Trail problem has become a standard for comparing different genetic programming algorithms and solutions.
One method for programming and testing algorithms on the Santa Fe Trail problem is by using the NetLogo application. There is at least one case of a student creating a Lego robotic ant to solve the problem.
See also
Genetic programming
Agent-based model
Java Grammatical Evolution
References
External links
Genetic-programming.org
Grammatical-evolution.org
Teamwork in genetic programming
java Grammatical Evolution
Genetic algorithms
Genetic programming |
https://en.wikipedia.org/wiki/Neogene%20of%20the%20Old%20World | Neogene of the Old World is a database containing information about Eurasian Miocene to Pleistocene land mammal taxa and localities, with emphasis on the European Miocene and Pliocene.
NOW began as a clone of the ETE ("Evolution of Terrestrial Ecosystems") database originally developed by John Damuth and the ETE Consortium, and most species and locality data fields follow the definitions described in the ETE manual. NOW is limited in scope to Cenozoic land mammals, so naturally uses only part of the complex possibilities embodied in the ETE design. Some fields have been added to suit the purposes of the NOW database, and some existing fields have been adapted.
As a guideline NOW uses the taxonomy of McKenna & Bell's Classification of Mammals Above the Species Level, except for Muridae for which we use McKenna & Bell's classification with the modifications suggested by Hans de Bruijn.
The NOW database is maintained and coordinated at the University of Helsinki by Mikael Fortelius in collaboration with an international advisory board.
External links
NOW database
Neogene |
https://en.wikipedia.org/wiki/OpenGL%20SC | OpenGL for Safety Critical applications (OpenGL SC) is a subset of the OpenGL 3D graphics application programming interface (API) designed to meet the needs of the Safety Critical market for avionics, industrial, military, medical and automotive applications including FAA DO-178C/ED-12C Level A certification. OpenGL SC is managed by the not-for-profit technology consortium, the Khronos Group, Inc.
OpenGL SC 2.0 is based on OpenGL ES 2.0, adding GLSL shader programmability to OpenGL SC 1.0.
OpenGL SC 1.0 is based on, and roughly equivalent to, OpenGL 1.3. Equivalence is not strictly maintained, and features not in the original API specification were added, such as display lists.
References
External links
OpenGL SC Registry
Public bug tracking
OpenGL SC Conformant products
Public forums
OpenGL |
https://en.wikipedia.org/wiki/PS-algol | PS-algol is an orthogonally persistent programming language.
PS-algol was an extension of the language S-algol implemented by the University of St Andrews and the University of Edinburgh, Scotland. S-algol was designed by Ron Morrison and extended by Pete Bailey, Fred Brown, Paul Cockshott, Ken Chisholm, and Al Dearle. These extensions were additional standard functions that provide a persistent heap that survives termination of PS-algol programs.
PS-algol was the world's first fully implemented persistent programming language, and had many users both in academia and, notably, in International Computers Limited (ICL) research labs.
History
PS-algol was conceived by chance, when Ron Morrison was on sabbatical at the University of Edinburgh and met Malcolm Atkinson. Atkinson had been experimenting with persistent programming languages and was struggling to find a coherent model for a persistent Pascal variant. Morrison, whose interest in general-purpose programming had led to the development of S-algol, a general purpose teaching language, realised that S-algol's type system would more easily allow adding orthogonal persistence.
See also
Flex machine
References
Algol programming language family |
https://en.wikipedia.org/wiki/The%20Cleveland%20Show%20%28season%204%29 | The fourth and final season of The Cleveland Show aired on the Fox network from October 7, 2012, to May 19, 2013. On May 9, 2011, Fox announced that the series had been renewed for a fourth season. Guest stars for the season included George Clinton, Nick Offerman, Dale Earnhardt Jr., Shorty Rossi, Kasey Kahne and Tony Stewart. On May 13, 2013, Fox announced that they would not be renewing The Cleveland Show for another season, making this one the final season. The series ended with the episode "Wheel! Of! Family!" on May 19, 2013. In August 2013, series creator Seth MacFarlane announced that Cleveland would be moving back to Quahog along with the Tubbs family to rejoin the Family Guy cast.
Cast and characters
Mike Henry as Cleveland Brown and Rallo Tubbs
Sanaa Lathan as Donna Tubbs Brown
Reagan Gomez-Preston as Roberta Tubbs
Kevin Michael Richardson as Cleveland Brown Jr.
Episode list
Home media
References
External links
The Cleveland Show Renewed For Season 4
2012 American television seasons
2013 American television seasons
4 |
https://en.wikipedia.org/wiki/South%20Asian%20TV | South Asian TV is a TV station operating in the Houston, Texas area. This is the only broadcast channel in the Houston area to deliver South Asian programming all day long.
They concentrate on bringing a variety of programming of interest to the expatriate communities from Pakistan, India, and Bangladesh. This includes news, Bollywood films, documentaries, TV Dramas (a.k.a. "Soap operas"),and a broad variety of entertainment.
This channel broadcasts from KHLM-LD 43.5. Their offices are at 9950 Westpark Drive #200, Houston TX 77063. It began broadcasting in October 2010. It has a live internet feed through satv435.com.
References
External links
www.satv435.com Homepage
www.satv435.com/live.html Live internet feed
Asian-American culture in Houston
Bangladeshi-American culture
Indian-American culture in Texas
Pakistani-American culture in Texas
South Asian American culture
Television stations in Houston |
https://en.wikipedia.org/wiki/DXBB-AM | DXBB (1107 AM) was a radio station owned and operated by Soccsksargen Broadcasting Network. The station's studio was located along Yumang St., Brgy. San Isidro, General Santos.
Profile
The station was established by GMA Network on May 18, 1996, along with DXCJ. It went off the air in the early 2000s due to resource problems.
In March 2011, DXBB was acquired by Soccsksargen Broadcasting Network, a company owned by some of Manny Pacquiao's friends, and was relaunched as Radyo Alerto. It also served as an affiliate of GMA's DZBB in Manila. It went off the air sometime in 2019.
In 2021, parts of the station's programming were revived in Barangay FM 102.3 under Super Radyo banner.
References
Radio stations in General Santos
Radio stations established in 1996
Radio stations disestablished in 2019
News and talk radio stations in the Philippines
Defunct radio stations in the Philippines |
https://en.wikipedia.org/wiki/Textual%20case-based%20reasoning | Textual case-based reasoning (TCBR) is a subtopic of case-based reasoning, in short CBR, a popular area in artificial intelligence. CBR suggests the ways to use past experiences to solve future similar problems, requiring that past experiences be structured in a form similar to attribute-value pairs. This leads to the investigation of textual descriptions for knowledge exploration whose output will be, in turn, used to solve similar problems.
Subareas
Textual case-base reasoning research has focused on:
measuring similarity between textual cases
mapping texts into structured case representations
adapting textual cases for reuse
automatically generating representations.
References
External links
Fourth Workshop on Textual Case-Based Reasoning: Beyond Retrieval
Textual Case-Based Reasoning Wiki
Classification algorithms
Inductive reasoning
Natural language processing |
https://en.wikipedia.org/wiki/Beat%20Bobby%20Flay | Beat Bobby Flay is an American cooking competition show on the Food Network. It features various chefs competing against Bobby Flay. The show is taped in front of a live audience.
Format
In the first round, two guests, often a celebrity chef and a friend of Flay, introduce two contestants who cook for 20 minutes against each other using an ingredient chosen by Flay. The guests then determine who cooked the better dish and will face Flay in the second round. The winning contestant then chooses a dish for both the contestant and Flay to cook in the second round which lasts for 45 minutes. The winner of the second round is determined by three judges in a blind taste test. Through 435 competitions, Bobby Flay's win–loss record is 270–165 (a 62.1% win percentage).
The presentation of Beat Bobby Flay borrows from boxing matches, with a bell rung to indicate the start of rounds and mild or humorous trash talking by Flay, competing chefs and guest judges. During both rounds, the celebrity judges will periodically walk into the cooking area to talk to each chef about their strategy; in the second round, they will also make light-hearted attempts to distract Flay. At the end of each episode, if the contestant wins, then they get to tell everyone that they Beat Bobby Flay. If Bobby wins, he makes a felicitous joke as he runs off the set.
Episodes
Season 1
Season 2
Season 3
Season 4
Season 5
Season 6
Season 7
Season 8
Season 9
Season 10
Season 11
Season 12
Season 13
Season 14
Season 15
Season 16
Season 17
Season 18
Season 19
Season 20
Season 21
Season 22
Season 23
Season 24
Season 25
Season 26
Season 27
Season 28
Season 29
Season 30
Season 31
Season 32
Season 33
References
External links
2013 American television series debuts
2010s American cooking television series
Food Network original programming |
https://en.wikipedia.org/wiki/Analytical%20base%20table | In database theory, the analytical base table (ABT) is a flat table that is used for building analytical models and scoring (predicting) the future behavior of a subject.
A single record in this table represents the subject of the prediction (e.g. a customer) and stores all data (variables) describing this subject.
Basically, there are two categories of data: who is the subject (describing subject characteristics related to the organization, such as socio-demographic-geographic data, events, etc.), and what does the subject do (describing characteristics of subject behavior, product purchase, product usage, payment behavior, relationship instances, etc.).
Analytical base tables may be developed as a more general instance applicable to solving general business problems, but more often it is developed for solving very specific business problems.
Database theory |
https://en.wikipedia.org/wiki/Findstr | In computing, is a command in the command-line interpreters (shells) of Microsoft Windows and ReactOS. It is used to search for a specific text string in computer files.
Overview
The command sends the specified lines to the standard output device.
It is similar to the find command. However, while the find command supports UTF-16, findstr does not. On the other hand, findstr supports regular expressions, which find does not.
The findstr program was first released as part of the Windows 2000 Resource Kit under the name qgrep.
findstr cannot search for null bytes commonly found in Unicode computer files.
Syntax
FINDSTR flags strings [drive:][path]filename[...]
Arguments:
flags This can be any combination of flags described below.
strings Text to be searched for.
[drive:][path]filename Specifies a file or files to search.
Flags:
/B Matches pattern if at the beginning of a line.
/E Matches pattern if at the end of a line.
/L Uses search strings literally.
/R Uses search strings as regular expressions.
/S Searches for matching files in the current directory and all subdirectories.
/I Specifies that the search is not to be case-sensitive.
/X Prints lines that match exactly.
/V Prints only lines that do not contain a match.
/N Prints the line number before each line that matches.
/M Prints only the filename if a file contains a match.
/O Prints character offset before each matching line.
/P Skip files with non-printable characters.
/OFF[LINE] Do not skip files with offline attribute set.
/A:attr Specifies color attribute with two hex digits. See "color /?"
/F:file Reads file list from the specified file(/ stands for console).
/C:string Uses specified string as a literal search string.
/G:file Gets search strings from the specified file(/ stands for console).
/D:dir Search a semicolon delimited list of directories
Note:
Following command displays the detailed help about this command:
FINDSTR /?
Example
Save your running services into file _services.txt and search in this file for lines containing word "network" - case insensitive:
@echo off
set searchstr=network
net start>_services.txt
FINDSTR /I "%searchstr%" _services.txt
pause
output would be:
Network Connections
Network List Service
Network Location Awareness
Network Store Interface Service
Windows Media Player Network Sharing Service
Press any key to continue . . .
See also
Regular expression
Wildcard character
List of DOS commands
find
grep
References
Further reading
External links
findstr | Microsoft Docs
Microcomputer software
Windows administration
Pattern matching |
https://en.wikipedia.org/wiki/Data-centric%20programming%20language | Data-centric programming language defines a category of programming languages where the primary function is the management and manipulation of data. A data-centric programming language includes built-in processing primitives for accessing data stored in sets, tables, lists, and other data structures and databases, and for specific manipulation and transformation of data required by a programming application. Data-centric programming languages are typically declarative and often dataflow-oriented, and define the processing result desired; the specific processing steps required to perform the processing are left to the language compiler. The SQL relational database language is an example of a declarative, data-centric language. Declarative, data-centric programming languages are ideal for data-intensive computing applications.
Background
The rapid growth of the Internet and World Wide Web has led to huge amounts of information available online and the need for Big Data processing capabilities. Business and government organizations create large amounts of both structured and unstructured information which needs to be processed, analyzed, and linked. The storing, managing, accessing, and processing of this vast amount of data represents a fundamental need and an immense challenge in order to satisfy needs to search, analyze, mine, and visualize this data as information. Declarative, data-centric languages are increasingly addressing these problems, because focusing on the data makes these problems much simpler to express.
Computer system architectures such as Hadoop and HPCC which can support data-parallel applications are a potential solution to the terabyte and petabyte scale data processing requirements of data-intensive computing. Clusters of commodity hardware are commonly being used to address Big Data problems. The fundamental challenges for Big Data applications and data-intensive computing are managing and processing exponentially growing data volumes, significantly reducing associated data analysis cycles to support practical, timely applications, and developing new algorithms which can scale to search and process massive amounts of data. The National Science Foundation has identified key issues related to data-intensive computing problems such as the programming abstractions including models, languages, and algorithms which allow a natural expression of parallel processing of data. Declarative, data-centric programming languages are well-suited to this class of problems.
Data-centric programming languages provide a processing approach in which applications are expressed in terms of high-level operations on data, and the runtime system transparently controls the scheduling, execution, load balancing, communications, and movement of programs and data across the computing cluster. The programming abstraction and language tools allow the processing to be expressed in terms of data flows and transformations incorporating shared libra |
https://en.wikipedia.org/wiki/The%20Planetworkshops | The Planetworkshops are a think tank with the goal of promoting sustainable development and "initiating transformations of society models." The Planetworkshops were created in 2006 by Eric Bazin (founder of Satelight) and George J. Gendelman (former Director of the New York Times and of the International Herald Tribune).
The Founders
Eric Bazin is a French journalist and founder of Satelight, a consulting and photographic production company. He regularly collaborates with European press trusts, such as Paris-Match, GEO, Sunday Times, National Geographic, Airone, and is actively involved in the organisation of photography exhibitions with UNESCO.
George J. Gendelman, American, is the former manager of the international operations of the New York Times Syndication Sales and former circulation director of the International Herald Tribune; he founded and still manages the International Press Syndicate in 1990, a consulting agency dedicated to media strategy and copyright management for international media groups.
Activities
Production of ideas and content
Working Commissions
The Planetworkshops initiate multi-actors and trans-disciplinary working commissions.
Since 2011, six working commissions were undertaken by the Planetworkshops:
- "Internationalizing the social entrepreneurship model";
- "Social and environmental responsibility: transforming businesses governance";
- "Mediation as a Solution to Environmental Dispute"s, in partnership with ESSEC-IRENE;
- "How to reinvent the model of international negotiations on climate change?", exclusively composed from students issued from school and universities world-wide;
- "Crossed views on genetic biodiversity resources and their equal sharing", in partnership with Orée;
- "What conditions for the emergence of a "Blue Society"?", in partnership with Green Cross France and Territories
Studies and publications
"The Words of co-construction", conducted by the Médiascopie Institute for The Planetworkshops in 2012;
"The Words and the Actors of a more Sustainable World", conducted by the Médiascopie Institute for The Planetworkshops in 2011;
"The Annual Sustainable Mobility Barometer", conducted by Harris Interactive, SNCF, Mobivia Group for The Planetworkshops;
"The French and biodiversity", in partnership with Natureparif;
"The levers of sustainable mobility in France", in partnership with Mobivia Group;
"The business of climate change", in partnership with Kurt Salmon (anciently INEUM Consulting);
"The ecological impact of production of industrial enterprises", in partnership with Greenext;
"The 100 words of Copenhagen and climate change", conducted for the PlanetWorkshops and presented to the MEEDDM;
"Crisis: Risk or Opportunity?" in partnership with Harris Interactive, SNCF, Mobivia Groupe for The Planetworkshops.
"La Revue de la Terre"
« La Revue de la Terre » is a French geopolitical publication on environmental issues, sustainable development and mutation of societies. This French pub |
https://en.wikipedia.org/wiki/Energy%20in%20Poland | The Polish energy sector is the sixth largest in Europe. The scale of energy consumption in 1996–2015 increased from 139,593 GWh to 161,438 GWh. According to the data of Polskie Sieci Elektroenergetyczne (PSE), electricity production in October 2020 amounted to 13,553 GWh; domestic consumption amounted to 14,798 GWh.
The Polish energy mix in 2021 is dominated by hard coal (approx. 48%) and lignite (24%). When it comes to green energy, wind installations had the highest contribution of 9%. Other renewable energy sources played a minor role of only 1%, but they are the ones that show the greatest growth dynamics. The future plan is to generate at least 50% of electricity from renewable sources by 2040, by which time coal will cease to generate electricity.
Poland's 2040 energy plan
PEP2040 is a government plan for the Polish fuel and energy sector, which aims for 50% zero-emissions by 2040. It envisions building offshore wind farms and commissioning a nuclear power plant. The draft was presented in September 2020, aiming to tackle climate change, energy security, and a just transition. Poland is considering 6–9 GW of nuclear power, to be operational by 2040.
Energy statistics
Fossil fuels
Coal
In 2009 Poland produced 78 megatonnes (Mt) of hard coal and 57 Mt of brown coal. As of 2020, extraction is becoming increasingly difficult and expensive, and has become uncompetitive so reliant on government subsidies. In September 2020, the government and mining unions agreed a plan to phase out coal by 2049 which coincides with 100th anniversary of Karol Wojtyła being assigned to st. Florian's parish in Kraków, with coal used in power generation falling to negligible levels in 2032.
Coal and the environment
Coal mining has far-reaching effects on local water resources. Coal mining requires large amounts of water. Mining activities have dropped the water level of Lake Ostrowskie by almost two meters in the Kuyavia–Pomerania and the lakes in the Powidz Landscape Park. According to Poznań's University of Agriculture, the water drainage in the Kleczew brown coal mining areas has formed craters in the area. Statistics from Eurostat shows that Poland accounts for 30% of the European Union's annual consumption of coal.
Ten coal power stations in Poland and Germany account for 13 per cent of the EU’s total emissions and 25% of all emissions from the power sector in 2022.
Coal and the public
In April 2008, five thousand people demonstrated in Kruszwica to protect cultural heritage and the nature reserve at Lake Gopło. This was the first protest of its kind in the country's history. Gopło Millennium Park (Nadgoplański Park Tysiąclecia) is protected by the European Union's Natura 2000 program and includes a major bird sanctuary. The Tomisławice opencast mine (less than 10 kilometers away from the Kruszwica mine) was due to open in 2009.
In 2021 demonstrations took place with coal workers protesting against the EU plans to close coal as an energy source and |
https://en.wikipedia.org/wiki/Libav | Libav is an abandoned free software project, forked from FFmpeg in 2011, that contains libraries and programs for handling multimedia data.
History
Fork from FFmpeg
The Libav project was a fork of the FFmpeg project. It was announced on March 13, 2011 by a group of FFmpeg developers. The event was related to an issue in project management and different goals: FFmpeg supporters wanted to keep development velocity in favour of more features, while Libav supporters and developers wanted to improve the state of the code and take the time to design better APIs.
The maintainer of the FFmpeg packages for Debian and Ubuntu, being one of the group of developers who forked FFmpeg, switched the packages to this fork in 2011. Hence, most software on these systems that depended on FFmpeg automatically switched to Libav. On July 8, 2015, Debian announced it would return to FFmpeg for various, technical reasons. Several arguments justified this step. Firstly, FFmpeg had a better record of responding to vulnerabilities than Libav. Secondly, Mateusz "j00ru" Jurczyk, a security-oriented developer at Google, argued that all issues he found in FFmpeg were fixed in a timely manner, while Libav was still affected by various bugs. Finally, FFmpeg supported a far wider variety of codecs and containers than Libav.
Libav is an abandoned software project, with Libav developers either returning to FFmpeg, moving to other multimedia projects like the AV1 video codec, or leaving the multimedia field entirely.
Confusion
At the beginning of this fork, Libav and FFmpeg separately developed their own versions of the ffmpeg command. Libav then renamed their ffmpeg to avconv to distance themselves from the FFmpeg project. During the transition period, when a Libav user typed ffmpeg, there was a message telling the user that the ffmpeg command was deprecated and avconv has to be used instead. This confused some users into thinking that FFmpeg (the project) was dead.
This message was removed upstream when ffmpeg was finally removed from the Libav sources. In June 2012, on Ubuntu 12.04, the message was re-worded, but that new "deprecated" message caused even more user confusion. Starting with Ubuntu 15.04 "Vivid", FFmpeg's ffmpeg is back in the repositories again.
To further complicate matters, Libav chose a name that was used by FFmpeg to refer to its libraries (libavcodec, libavformat, etc.). For example, the libav-user mailing list, for questions and discussions about using the FFmpeg libraries, is unrelated to the Libav project.
Software using Libav instead of FFmpeg
Debian followed Libav when it was announced, and announced it would return to FFmpeg for Debian Stretch (9.0).
MPlayer2, a defunct fork of MPlayer, used Libav exclusively, but could be used with GStreamer with its public API. The MPV media player no longer supports Libav due to missing API changes.
Legal aspects
Codecs
Libav contains more than 100 codecs. Many codecs that compress information have be |
https://en.wikipedia.org/wiki/List%20of%20Australian%20Football%20League%20television%20shows | This is a list of AFL shows which have aired on Australian television, as of 2011.
AFL Game Day
Channel: Seven Network
Years: 2008–2020
Airs: Sunday @ 10:00am
Duration: 60 minutes
Current Cast
Hamish McLachlan (Host, 2008–present)
Tom Harley (Panellist, 2010—present)
Matthew Richardson (Panellist, 2010—present)
Mark Robinson (Panellist, ?–Present)
AFL Game Day: Primetime
Seven Network
Hosted by Hamish McLachlan, with Tom Harley, Matthew Richardson, Ben Cousins and Jason Akermanis
AFL Lovematch
Fox Footy Channel
AFL Squadron
Seven Network
Hosted by Garry Lyon
AFL Teams
Fox Sports Australia
AFL Today
Seven Network, early 1990s
Hosted by Bruce McAvaney, with Scott Palmer
Any Given Sunday
Channel: Nine Network
Years: 2005–2006
Aired: Sunday @ 1:00pm
Duration: 60 minutes
Season 1 Cast
Garry Lyon (co-host, 2005)
James Brayshaw (co-host, 2005)
Sam Newman (co-host, 2005)
Season 2 Cast
Mick Molloy (co-host, 2006)
Nicole Livingstone (co-host, 2006)
Dermott Brereton (co-host, 2006)
Before the Bounce
(Fox Sports Australia)
Before the Game
Originally named After the Game in 2003
Channel: Network Ten
Years: 2003–2013
Airs: Thursday @ 8:30pm (Originally Saturday @ 6.30pm and 11:30pm)
Duration: 60 minutes / 30 minutes
Current Cast
Dave Hughes (Panellist, 2003—2013)
Samantha Lane (Panellist, 2003—2012)
Andrew Maher (Host, 2005–2013)
Lehmo (Panellist, 2005—2013)
Mick Molloy (Panellist, 2008–2013)
Ryan Fitzgerald (Live reporter, ?—2012)
Former Cast
Peter Helliar (Host/Panellist, 2003–2007)
Damian Callinan (Panellist, 2003–2004)
Eloise Southby (Panellist, 2003)
Anthony Hudson (Host, 2004)
Current Segments
Tool of the Week
Player of the Day
Newspaper Headlines
Inside 60
Former Segments
Diary of a Footballer
Jumping in Hot Water
"Strauchanie"
Lehmo's Footy Clinic
Make a Wish Foundation
Beyond the Boundary
(Network Ten)
Hosted by Christi Malthouse
The Big League
Hosted by Peter Landy
The Bounce
(Seven Network)
The Business End
Herald Sun web series
Years: 2011–present
Airs: Saturday @ 7:00pm
Duration: 21 minutes (3 × 7 minutes)
Current Cast
Sam Edmund (Host, 2011—present)
Paul Roos (Panellist, 2011—present)
Mike Sheahan (Panellist, 2011–present)
Mark Robinson (Panellist, 2011—present)
Classic Quarters
(Fox Footy Channel)
The Club
(Seven Network, 2001)
Hosted by Craig Hutchison, with David Rhys-Jones (as the coach)
The Collectors
(Fox Footy Channel)
Cometti Live
Nine Network, 2002
Hosted by Dennis Cometti, with Ben Allan and Brad Hardie
The Crows Show
Seven Network
Featuring James Brayshaw and Nikki Visser
The Fifth Quarter
Network Ten, 2004–2011
The Final Siren
Channel: One
Years: 2011
Airs: Sunday @ 6:00pm
Duration: 60 minutes / 30 minutes
Cast
Michael Christian (Host, 2011)
Chris Grant (Panellist, 2011)
Jon Ralph (News reporter, 2011)
Segments
Cross to Herald Sun office (With Jon Ralph)
Top Ten Plays of the Week
Performer of the Round (P |
https://en.wikipedia.org/wiki/FARC%20files | The FARC files are computer files which according to the Colombian government were retrieved from a Revolutionary Armed Forces of Colombia (FARC) camp in Ecuador, during a Colombian raid into Ecuador which sparked the 2008 Andean diplomatic crisis. In May 2011 the Supreme Court of Colombia ruled the FARC files inadmissible as evidence due to their acquisition from abroad by the military (rather than by the Judicial Police), and in addition stated that the validity of the content could not be verified.
Provenance and authenticity
The cross-border raid on the camp took place in the early hours of 1 March 2008. On the afternoon of 2 March 2008, in a short press release, General Óscar Naranjo, director of the Colombian National Police, as spokesperson of the Colombian government, announced that during the military operation on the Colombia-Ecuador border, several documents and three laptops had been retrieved along with the bodies of Raúl Reyes and one of his lieutenants. Copies of 13 documents were provided by General Naranjo to reporters on March 4. Eight electronic data sources (three laptops, two external hard drives, and three USB memory sticks) were later handed to Interpol on 10 March. During Interpol's press conference on 15 May, the Secretary General said: "The eight seized computer exhibits contained more than 600 gigabytes of data, including 37,872 written documents, 452 spreadsheets, 210,888 images, 22,481 web pages, 7,989 email addresses, 10,537 multimedia files (sound and video) and 983 encrypted files. In non-technical terms, this volume of data would correspond to 39.5 million filled pages in Microsoft Word and, if all of the seized data were in Word format, it would take more than 1,000 years to read at a rate of 100 pages per day."
Interpol
The Colombian Administrative Department of Security (DAS) reported that it had asked for Interpol's technical support in order to decipher the seized FARC computers. According to the DAS, Interpol accepted the request and sent several experts to Colombia.
The final report was presented on May 15. Interpol's report said that it found no evidence that the Colombian Government had manipulated the laptops, although the initial Colombian security force access to the data sources (between 1 and 3 March) did not conform to international standards. The laptops had been booted and hard drives or USB sticks were viewed. President Hugo Chávez dismissed Interpol's findings as "A show of clowns, ridiculous" given by a "gringo, aggressive, corrupt and vagabond policeman," about which "spending time on is not worthwhile." and threatened to revise (again) both its economic and diplomatic relations with Colombia.
On June 15, 2008 Interpol issued a new press release in response to a statement by Ecuador's Foreign Ministry that Interpol considered to be incorrect. The press release stated that "[Ecuador] inaccurately suggests that Interpol had not established whether the eight seized exhibits forensically exami |
https://en.wikipedia.org/wiki/IBM%20Administrative%20Terminal%20System | The IBM Administrative Terminal System, also known as ATS/360, provided text- and data-management tools for working with documents to users of IBM System/360 systems.
An earlier version ran on an IBM 1440 or IBM 1460 Data Processing System and the IBM Service Bureau Corporation offered a proprietary version, Call/ATS, which ran on IBM 1440 systems or on IBM System/360 DOS systems.
Text and data management
ATS/360 provided comprehensive text- and data-management tools including entry, temporary storage, permanent storage, formatting, printing, archiving and retrieving. Utilizing ATS/360, a large business could maintain all its end-user documents, revising and printing new versions of these as required. Also using ATS/360, a large law practice could maintain its client files, including witness statements and depositions, and several landmark legal decisions were significantly assisted using ATS/360.
Device support
Initially, ATS/360 supported only IBM 2741 typewriter terminals. Later, support was added by user groups for 2741 terminals with the "break feature" and for IBM 1050 terminals (that implicitly incorporated the "break feature"). The Magnetic Card Selectric Typewriter (MC/ST), which could emulate a 2741, was also supported.
ATS/360 was designed exclusively for IBM 2311 and IBM 2314 direct access storage facilities, for on-line "Working storage" and "Permanent storage" and for IBM 2400/3400 tape drives, for off-line "Rollout/Rollin" (Permanent storage backup/restore) and "Format and print" tapes.
An IBM hardware RPQ provided the IBM 1403 Model N1 printer's TN print train with characters which simulated the IBM Selectric typewriter Courier 72 type ball characters identically, thereby allowing machine printed documents to be manually corrected, or for manually inserted text, as required.
An IBM program RPQ added support for the IBM 3330 direct access storage facility, and this PRPQ was applied by most users of ATS/360 that had migrated to early IBM System/370 systems. Essentially, this PRPQ appended to selected instances of the canonical Load Halfword (LH) instruction—which implicitly featured "sign extension" from the source halfword's high-order bit, conceptually bit 15, to the remaining 16 bits of the destination general purpose register, conceptually bits 31 to 16—with a logical And (N) instruction, that specified a "mask" of 0x0000FFFF, and that eliminated the effect of the sign extension. This, then, allowed for 16-bit disk block addresses, that could later be converted to the expected and required CCHHR format. This PRPQ was also applicable to IBM 3350 direct access storage facilities that were operated in 3330 compatibility mode, and that sacrificed 117 MB of a native 3350's 317 MB total capacity in order to implement compatibility mode—two 100 MB 3330-equivalent drives on one 3350 drive).
Operating system support
Support beyond OS/VS/2 Release 1 (SVS) was not offered by IBM, but Peter Haas, formerly with Litton Systems Inc, and |
https://en.wikipedia.org/wiki/Journal%20on%20Chain%20and%20Network%20Science | "The Journal on Chain and Network Science was a peer-reviewed academic journal published between 2001 and 2016. It aimed to promote theory and practice in the field of innovation in business chains and networks". It was published by Wageningen Academic Publishers.
References
External links
Business and management journals
English-language journals |
https://en.wikipedia.org/wiki/Hulasganj | Hulasganj is a block in Jehanabad district of Bihar state, India. The block is situated 20 km east from the district Jehanabad. The place is well connected with Gaya and Patna through road network. This place is famous for its Sanskrit College all over India. Students from all over India come here to get Sanskrit education. The Sanskrit College is operated by Human Resource Department, Govt. of India. Food and lodging is absolutely free for all students. Students of all castes and religion get here Sanskrit education and get placed in Govt. jobs. They are also working as "Purohit" and perform worship for their clients all over India. Students of this 'Sanskrit Vidyalaya' are high in demand as they are known for their fluency in Sanskrit. Hulasganj is rich agricultural producer. In recent time, some renowned educational institutes have come up in existence. Some of them are:'
''
Swami Prankushacharya Adarsh Sanskrit Mahavidyalya (up to Post Graduation)
Late Kamta Prasad B. Ed. College, Hulasganj
Hulasganj Inter College, Hulasganj
Saraswati Shishu Mandir
10+2 High school Hulasganj
Hulasganj Private ITI
Manas International School
Hulasganj is a famous pilgrimage place for Hindus, especially Vaishnav Communities. There are lot of temples established by Swami Ji (Shree Swami Parankushacharya). The Credit for developing Hulasganj goes to Hulasganj Ashram, an educational and research hub for Sanskrit.
References
Community development blocks in Bihar |
https://en.wikipedia.org/wiki/HBO%20Go | HBO Go is a partly-inactive authenticated video on demand of the pay television service HBO. The service allowed subscribers to HBO via television providers to access its programming on-demand via the HBO website, mobile apps, and digital media players among other devices.
The service began to be phased out in the United States in 2020 following the launch of HBO Max (now known as Max in the United States), a new subscription streaming service featuring content from both HBO and parent company WarnerMedia. HBO Max would be made available at no additional charge to HBO subscribers on participating providers, but would also be available on a direct-to-consumer basis.
The "HBO Go" brand is also used in international markets for TV Everywhere and over-the-top services offering HBO programming. For example, HBO Canada previously operated an HBO Go service, but this was discontinued in 2018 when its parent service The Movie Network rebranded as Crave and merged with a previously-separate streaming service that held rights to HBO library programming.
Overview
HBO Go was the successor to HBO on Broadband, which was originally launched in January 2008 to Time Warner Cable customers in the Green Bay and Milwaukee, Wisconsin, areas. Programming content available on the service consisted of 400 hours of feature and HBO original television films (including 130 movie titles that rotated monthly), specials and original series that could be downloaded to computers, at no extra charge for HBO subscribers; in order to access HBO on Broadband content, users had to be a digital cable customer that had a subscription to HBO, and used Time Warner Cable's Roadrunner cable modem service.
The service launched nationally as HBO Go on February 18, 2010, initially available through Verizon FiOS. Over the following years, the service expanded to other providers including AT&T U-verse, Comcast, Cox Communications, Time Warner Cable, DirecTV, Dish Network, Suddenlink Communications, and Charter Communications in some states, as well as through vMVPD services AT&T TV Now, AT&T TV and Hulu. The service can be accessed through a web browser or through apps for select smart TV sets, Amazon Fire, iOS, Android, Chromecast, Roku, PlayStation 4 and Xbox One.
At launch, the service was accessible only on personal computers via the HBO website. Applications for iOS and Android devices were released on April 29, 2011, making the service available on smartphones and tablet computers. The app had over one million downloads in its first week, and was downloaded over three million times by the end of June 2011.
In October 2011, Roku streaming players became the first television-connected devices to support the service, and availability was later rolled out to the Apple TV, Chromecast, PlayStation consoles, Samsung Smart TVs, and Xbox consoles. Availability on set-top boxes and gaming consoles is determined by individual cable providers in the United States with some omissions. Currentl |
https://en.wikipedia.org/wiki/Sverigeleden | Sverigeleden (in English, the "Sweden route") is a connected network of 15 main long-distance cycling routes across Sweden and a further 24 branches. Together this network forms the national cycling route network of Sweden. The Sverigeleden was largely established to promote bicycle tourism.
The main routes of the Sverigeleden extend from Helsingborg in the south to Karesuando in the north and measure . The remaining sections form alternate branch routes which measure an additional . The routes are signposted with green signs by the Svenska Cykelsällskapet (Swedish Cycling Association) in co-operation with local roadworks authorities. The routes are mainly on lightly trafficked, paved roads in scenic areas.
See also
EuroVelo
References
External links
Sverigeleden, Svenska Cykelsällskapet (Swedish Cycling Association)
Mapping project for Sverigeleden at OpenStreetMap
Cycling in Sweden
Cycleways in Sweden
National cycling route networks |
https://en.wikipedia.org/wiki/SHIWA%20project | The SHIWA project (Sharing Interoperable Workflows for large-scale scientific simulations on Available DCIs) within grid computing was a project led by the LPDS (Laboratory of Parallel and Distributed Systems) of MTA Computer and Automation Research Institute. The project coordinator was Prof. Dr. Peter Kacsuk. It started on 1 July 2010 and lasted two years. SHIWA (project number 261585) was supported by a grant from the European Commission's FP7 INFRASTRUCTURES-2010-2 call under grant agreement n°261585.
The SHIWA project developed and deployed the SHIWA Simulation Platform (SSP) to enable infrastructure and workflow interoperability at two levels:
coarse-grained interoperability, referring to the nesting of different workflow systems in order to achieve execution frameworks interoperability; and
fine-grained interoperability, referring to the transformation workflow representations in order to achieve workflows migration from one system to another.
After the project ended the SHIWA Technology was overtaken by the ER-flow support action project to provide sustainability and to extend the user community base.
Background and motivations
Scientists of all disciplines have invested tremendous effort in the exploitation of Distributed Computing Infrastructures (DCIs) for their ability to support compute-intensive in-silico experiments and virtual organisations. Many DCIs with large user communities have emerged during the last decade, such as the Distributed European Infrastructure for Supercomputing Applications (DEISA) [Niederberger and Mextorf 2005], EGEE Grid (Enabling Grids for e-Science) [EGEE n.d.], the German D-Grid initiative (D-Grid) [Gentzsch 2006], UK National Grid Service (NGS) [NGS n.d.] and the North American TeraGrid (TG) [TeraGrid n.d.]. They are based on different middleware stacks that provide an abstraction layer between computer resources and applications. For example, NGS and TeraGrid are built on the Globus Toolkit [Foster 2006], EGEE on gLite [gLite n.d.], DEISA relies on both the Globus Toolkit and Unicore [Erwin and Snelling 2002], while D-Grid is executed under gLite, the Globus Toolkit and Unicore. In Europe, this momentum is climaxing in 2010 with the emergence of the European Grid Initiative (EGI) that will federate all major European organisations related to distributed-computing and National Grid Initiatives (NGIs). In its effort to create the next generation of pan-Europe DCI, EGI will face unprecedented challenges related to the heterogeneity of national grid infrastructures, resources and operating middleware. Production DCIs are commonly built on a large number of components, such as data resources, metadata catalogues, authentication and authorisation methods, and software repositories. Managing the execution of applications on DCIs is consequently a complex task. Moreover, solutions developed for one particular Grid are difficult to port to other infrastructures. In order to shield this complexity from re |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.