source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/3D%20Content%20Retrieval | A 3D Content Retrieval system is a computer system for browsing, searching and retrieving three dimensional digital contents (e.g.: Computer-aided design, molecular biology models, and cultural heritage 3D scenes, etc.) from a large database of digital images. The most original way of doing 3D content retrieval uses methods to add description text to 3D content files such as the content file name, link text, and the web page title so that related 3D content can be found through text retrieval. Because of the inefficiency of manually annotating 3D files, researchers have investigated ways to automate the annotation process and provide a unified standard to create text descriptions for 3D contents. Moreover, the increase in 3D content has demanded and inspired more advanced ways to retrieve 3D information. Thus, shape matching methods for 3D content retrieval have become popular. Shape matching retrieval is based on techniques that compare and contrast similarities between 3D models.
3D retrieval methods
Derive a high level description (e.g.: a skeleton) and then find matching results
This method describes 3D models by using a skeleton. The skeleton encodes the geometric and topological information in the form of a skeletal graph and uses graph matching techniques to match the skeletons and compare them. However, this method requires a 2-manifold input model, and it is very sensitive to noise and details. Many of the existing 3D models are created for visualization purposes, while missing the input quality standard for the skeleton method. The skeleton 3D retrieval method needs more time and effort before it can be used widely.
Compute a feature vector based on statistics
Unlike Skeleton modeling, which requires a high quality standard for the input source, statistical methods do not put restriction on the validity of an input source. Shape histograms, feature vectors composed of global geo-metic properties such as circularity and eccentricity, and feature vectors created using frequency decomposition of spherical functions are common examples of using statistical methods to describe 3D information.
2D projection method
Some approaches use 2D projections of a 3D model, justified by the assumption that if two objects are similar in 3D, then they should have similar 2D projections in many directions. Prototypical Views and Light field description are good examples of 2D projection methods.
3D Engineering Search System
In Purdue University, researchers led by Professor Karthik Ramani at the Research and Education Center for Information created a 3D search engine called the 3D Engineering Search System (3DESS). It is designed to find computer-generated engineering parts.
The mechanism behind this search engine is that it starts from an algorithm which can transform query drawing to voxels, then extracts the most important shape information from the voxels by using another algorithm called thinning, and formulates a skeleton of the object’s ou |
https://en.wikipedia.org/wiki/MakerSquare | MakerSquare was a provider of software engineering bootcamp based in Austin, TX, with additional campus locations in San Francisco, CA, Los Angeles, CA and New York, NY. MakerSquare provided a career-focused program that includes job training and employer outreach within its curriculum. In January 2015, MakerSquare was purchased by software engineering bootcamp Hack Reactor, and in 2016, all MakerSquare campuses were rebranded to share the Hack Reactor name.
History
MakerSquare was founded in 2013 by Harsh Patel, Shaan Shah, Shehzan Devani, and Ravi Parikh. The four created the company with no investor funding and initially operated from Parikh's parent's home. MakerSquare was acquired by Hack Reactor in January 2015 for an undisclosed amount. Since the acquisition, MakerSquare has adopted the Hack Reactor curriculum, course structure and name.
Locations
MakerSquare was originally located on Congress Avenue in downtown Austin, TX; however, it was since relocated to the offices of Capital Factory, within the Omni Hotel, still in downtown Austin. MakerSquare opened a second campus in SoMa in San Francisco, CA in 2014 and subsequently two more campuses in Los Angeles (2015) and New York City (2016).
Programs
MakerSquare has adopted the Hack Reactor program which is a course where students spend 12-weeks learning software engineering for 60 to 80 hours a week. Cohorts usually consist of 15 to 30 students with a low student-to-teacher ratio. Students are expected to have an intermediate level understanding of JavaScript before entering. Following completion of the course, MakerSquare students are assisted in their job search by the MakerSquare Student Outcomes team, and connected to their hiring network of 300+ employers. The Student Outcomes staff also provide support for resume preparation, technical interview readiness, personal branding, online presence management, and personal portfolio creation. Immersive courses start every seven weeks. Currently, MakerSquare has achieved a 96% placement rate. Graduate salaries average $106,000 in San Francisco, $92,000 in Los Angeles, and $75,000 in Austin with a 96% success rate of graduates who were placed in a full-time programming job within 3 months of graduation.
MakerSquare offered a part-time course which allowed students to focus on a particular division of web development. MakerSquare's part-time courses were geared towards professionals seeking not to become developers, but to understand more technical aspects of their career. As of November 2014, these classes have been discontinued and have been replaced with MakerPrep, a part-time evenings class for aspiring programmers.
MakerSquare offered a K-12 web development program called Hatch After School in which younger students attend a weekly session to learn programming basics. Consisting of mostly middle school students, Hatch After School consists of three 8-week phase. As of 2015, Hatch After School has been retired.
Student intake and outr |
https://en.wikipedia.org/wiki/Computer%20lock | A computer lock is a physical lock on a computer with an accompanying key used for access control or as an anti-theft system.
History
In the 1980s and early 1990s, IBM Personal Computers and some PC compatibles included a tubular pin tumbler lock on the computer's casing performing a security function that varied by manufacturer. In some instances, the lock would prevent the case from being opened to inhibit the theft or modification of internal components. In other cases, the lock was used to forbid unauthorized access to the computer by disabling the power supply, hard drive, or keyboard. Other early personal computer locks include Maclocks, introduced by Compulocks in 1986.
Built-in computer locks for access control were phased out by computer manufacturers in the 1990s as operating systems and other software incorporated user profiles with passwords, but computer locks to prevent theft are still in use, more commonly in the form of Kensington locks that attach cables to laptops and small desktops in an effort to prevent them from being taken.
See also
Physical security
Computer access control
Data security
References
Computer lock |
https://en.wikipedia.org/wiki/Wouzee | wouzee is an interactive broadcast platform for streaming video that allows users to visualize and share play and stream video using different devices video camera or a computer through Internet. The user produces, shares and consumes information actively. In addition to the free support, Wouzee offers a premium service through livestreaming event production.
Wouzee became known nationally when one of their users decided to upload a video in which Infanta Cristina stated on the Noos Case. afterwards, was published by the Spanish newspaper El Mundo.
References
External links
Official site
Video |
https://en.wikipedia.org/wiki/Latvijas%20Radio%205 | Latvijas Radio 5 - Pieci.lv is part of Latvijas Radio public service broadcasting network based in Riga, Latvia. Pieci.lv is public service broadcasting for youth, combining subculture, different lifestyle and opinion leaders. Currently the network consists of nine internet only stations and a nationwide FM station.
On 15 March 2015, Pieci.lv competed in first European Radio Championship which was held in Milan. In the Championship the station was represented by Toms Grēviņš and Marta Līne.
History
Latvijas Radio 5 - Pieci.lv was launched at 10pm on 14 July 2013. The first station to be launched was Pieci Koncerti which played exclusive live recordings from the Positivus Festival in Salacgrīva.
Stations
Pieci.lv streams several stations, available both online and in mobile apps:
Pieci Latvieši - Latvian bands
Pieci Hiti - pop music
Pieci Rīti - replays of pieci.lv morning programmes
Pieci Rokeri - Latvian and foreign rock
Pieci Atklājumi - hits
Pieci Bīti - club music
Pieci Latgalieši - music in Latgalian
Pieci Koncerti - live concerts
Pieci Hip Hop - hip hop from around the world
Frequency
See also
Latvijas radio
References
External links
Latvijas Radio 5 - Pieci.lv homepage
Radio stations established in 2013
Radio stations in Latvia |
https://en.wikipedia.org/wiki/Proxmox%20Virtual%20Environment | Proxmox Virtual Environment (Proxmox VE or PVE) is a hyper-converged infrastructure open-source software. It is a hosted hypervisor that can run operating systems including Linux and Windows on x64 hardware. It is a Debian-based Linux distribution with a modified Ubuntu LTS kernel and allows deployment and management of virtual machines and containers. Two types of virtualization are supported: container-based with LXC (starting from version 4.0 replacing OpenVZ used in version up to 3.4, included), and full virtualization with KVM.
It includes a web-based management interface.
History
Development of Proxmox VE started when Dietmar Maurer and Martin Maurer, two Linux developers, found out OpenVZ had no backup tool and no management GUI. KVM was appearing at the same time in Linux, and was added shortly afterwards.
The first public release took place in April 2008. It supported container and full virtualization, managed with a web-based user interface similar to other commercial offerings.
Features
Proxmox VE is an open-source server virtualization platform to manage two virtualization technologies: Kernel-based Virtual Machine (KVM) for virtual machines and LXC for containers - with a single web-based interface.
It also integrates out-of-the-box-tools for configuring high availability between servers, software-defined storage, networking, and disaster recovery.
High-availability cluster
Proxmox VE (PVE) can be clustered across multiple server nodes.
Since version 2.0, Proxmox VE offers a high availability option for clusters based on the Corosync communication stack. Starting from the PVE v.6.0 Corosync v.3.x is in use (not compatible with the earlier PVE versions). Individual virtual servers can be configured for high availability, using the built-in ha-manager. If a Proxmox node becomes unavailable or fails, the virtual servers can be automatically moved to another node and restarted. The database and FUSE-based Proxmox Cluster filesystem (pmxcfs) makes it possible to perform the configuration of each cluster node via the Corosync communication stack with SQLite engine.
Virtual appliances
Proxmox VE has pre-packaged server software appliances which can be downloaded via the GUI.
See also
Comparison of platform virtualization software
Kernel-based Virtual Machine (KVM)
oVirt
References
External links
Hyper-converged infrastructures
2008 software
Debian-based distributions
Free software programmed in Perl
Free virtualization software
Linux distributions
Perl software
Software using the GNU AGPL license |
https://en.wikipedia.org/wiki/Microman%C3%ADa | Micromanía is a Spanish computer game magazine. It was founded by the publisher HobbyPress, currently a subsidiary of Axel Springer SE. It was created in May 1985 and is one of the first magazines in Europe exclusively devoted to video games. It was first published soon after MicroHobby, which had been created just a few months earlier by the same publisher. The magazine in its two first periods was a major outlet supporting of the golden era of Spanish software. Micromanía celebrated its 25th anniversary in 2010. In July 2012, Axel Springer sold Micromanía to other owner, focussing its video game coverage in its other magazine, Hobby Consolas. Micromanía team continues the printed magazine independently, published by BlueOcean Publishing.
History
The first issue of Micromanía was published in 1985, with new issues released monthly. The publication of the magazine has been divided into three periods, called in Spanish "Épocas". The first period lasted for three years, with 35 issues. The second period, starting in 1988, changed its physical size to adopt what became its iconic large newspaper size. The second period had 80 issues, the last one published in January 1995, the 11th year since the magazine's inception. In February 1995 the third "Época" started, which as of 2015 continues to be published. The magazine reshaped itself to a normal-sized magazine. The magazine celebrated its 20 years anniversary in 2005, and its 30 years anniversary in 2014. 35th anniversary was celebrated in 2019.
See also
Hobby Consolas
References
External links
Official website
Profile of magazine and database of all issues at Devuego.es
1985 establishments in Spain
Axel Springer SE
Magazines established in 1985
Magazines published in Madrid
Monthly magazines published in Spain
Spanish-language magazines
Video game magazines published in Spain |
https://en.wikipedia.org/wiki/Ceres%20Power | Ceres Power Holdings plc is a UK developer of solid oxide fuel cell technology for use in distributed power systems aimed at decarbonising cities, factories, data centres and electric vehicle charging. Founded in 2001, it is headquartered at Horsham in the UK. It is listed on the London Stock Exchange and is a constituent of the FTSE 250 Index. It is also classified by the LSE Green Economy Mark, which recognises listed companies that derive more than 50% of their activity from the green economy.
History
In 2001, Ceres Power spun-out from Imperial College London after more than 10 years of fundamental research led by Professor Brian Steele.
In November 2004, Ceres was first listed on the London Stock Exchange.
In September 2013, Phil Caldwell became the CEO of Ceres Power following investment from IP Group.
Technology
Ceres Steel Cell
The Ceres patented Steel Cell is a Solid oxide fuel cell (SOFC) that can operate on mains natural gas for distributed power generation.
The steel cell operates at 500-600 °C which allows the use of cerium gadolinium oxide (CGO) in the anode and electrolyte and the bulk of the fuel cell to be mostly made from ferritic steel.
The technology is reversible. In one direction it can generate electricity from multiple fuels; in the other, it can generate green hydrogen at low cost and high efficiencies.
Hydrogen
The UK Hydrogen Strategy cites UK companies including ITM Power, Johnson Matthey and Ceres as being at the forefront of hydrogen technology development worldwide.
Ceres is an Executive Member of the UK Hydrogen and Fuel Cell Association UK Hydrogen and Fuel Cell Association and a founding member of the Long Duration Energy Storage Council.
Business Model
Ceres operates a licensing business model and partners with global industry partners to develop clean energy systems and products. Partners included Bosch, Weichai, Doosan, Miura and Shell.
Awards
In July 2023, Ceres Power was awarded the 2023 MacRobert Award by the Royal Academy of Engineering.
This is the UK's most prestigious engineering prize.
In its award citation, the academy recognised Ceres for its "ground-breaking fuel cell technology that promises to make a major contribution to decarbonising the world at the scale and pace required to save the planet."
In 2021 Ceres was awarded the Queen’s Award for Enterprise 2021 in the category of International Trade.
References
External links
Official site
Official video featured in MacRobert Award citation from Royal Academy of Engineering
Engineering companies of the United Kingdom
Fuel cell manufacturers |
https://en.wikipedia.org/wiki/Voivodeship%20road%20113 | Voivodeship road 113 (, abbreviated DW 113) is a route in the Polish voivodeship roads network. The route runs through the Goleniów County. The route has 19 km in length.
Important settlements along the route
Żółwia Błoć
Żółwia
Mosty
Jarosławki
Maszewo
Route plan
References
113 |
https://en.wikipedia.org/wiki/GoIP | GoIP is a GSM-gateway[1] and SIM bank produced by the Hybertone and DBL technology companies. It enables connections between the GSM network and VoIP.
Usage concept
Sim-card is put into GSM-gateways (or SIM-bank connected to GSM-gateway) in order to register it with the GSM network, at the same time the gateway is associated with VoIP through program switch. Accordingly, the traffic can be converted in and out between GSM and VoIP channels. SIP and H.323 protocols are used for media traffic termination. GoIP equipment is compatible with all main IP PBX: Asterisk, Mera, Oktell, 3CX, etc.
Compared with PSTN, GSM-gateways provide a drastic economy by amending the infrastructure and lowering the expenditures on technical support.
GoIP includes integral support of SIP and H.323 protocols with flexible settings. Duplex authentification of password and trust-list backup will significantly decrease telecommunication expenditures while maintaining an adaptable system of call transfer. The GoIP gateway supports several devices' groups, with flexible settings of large GSM-gateways groups with different channels.
There are several models of GoIP GSM gateways
1 Port GSM VoIP Gateway,
4 Port GSM VoIP Gateway,
8 Port GSM VoIP Gateway,
16 Port GSM VoIP Gateway,
32-Port GSM VoIP Gateway.
64 Ports GSM VoIP Gateway,
Applications of GoIP gateways: They are vastly usable by system integrators, TCP, call centers, large and little companies, and domestic users of VoIP as well.
VoIP-GSM gateways produced on the GoIP platform help to accomplish the following:
Adding the mobile lines in the existing telephone system (GoIP provides a GSM network between telephone systems and IP PBX, and ensures a fast connection to PSTN where usual telephone lines are unavailable)
Organization of outbound call-centers
Call transfer from GSM into SIP and backward (inbound and outbound calls between GSM and VoIP)
Determination of SIM-bank
SIM-bank is a SIM-card controller that provides remote control over VoIP GSM gateways and allows to simplify and automatize many procedures likewise:
- fast connection of SIM cards to the gateway, rapid exchange of SIM-cards via the Internet, and their prearranged synchronous replacement.
The cooperative use of GoIP gateways and GoIP SIM-bank enables the management of unmanned devices and reduces the work pressure in SIM-cards operations, for example, SIM-cards replacement and replenishment.
The remote access advantages for SIM cards
Central management of SIM cards,
their dynamic allocation,
no need to change or reinsert the SIM card in the device,
rapid replacement of SIM cards with no breakdowns in service.
For instance, the remote GoIP gateway will no longer require the replacement of SIM cards in the device or their reinsertion. One can manage the group of GoIP gateways remotely, effectively, and with the minimal loss with the help of a SIM bank. The main advantages of SIM-bank appliances include 1) the replacement of SIM car |
https://en.wikipedia.org/wiki/Hacker%20Bible | The Hacker Bible is a publication of the German hacker organization Chaos Computer Club (CCC). It has been published in two editions to date, 1985 and 1988. Both were edited by Wau Holland and published on the Grüne Kraft press.
Information
The Hacker Bible is a compendium of documents and stories from the hacker scene, for example the instruction guide to the acoustic coupler named “Data-loo”(Germ.:Datenklo). Furthermore, it offers manuals and other technical explanations. The first edition appeared in 1985 with the subtitle “Cable salad is good for you" ("Kabelsalat ist gesund”) and had sold 25,000 copies by mid-1988. The second edition in 1988 was given the additional name “The New Testament”.
The comic images on the cover sleeve are a creation of German comic artists Mali Beinhorn and Werner Büsch from the comic workshop Büsch-Beinhorn. The production and distribution of the Hacker Bible was discontinued by 1990. Since 1999, the CCC has offered a scanned and full-text version online (in German) with further materials such as texts from Peter Glaser, a documentation on Karl Koch and works from Tron from the Chaos-CD.
Bibliography
.
.
References
External links
Hackerbibel Archive 1
Hackerbibel Archive 2
Hacking Technology
Ethical Hacking
German books
Hacker culture
Computer clubs
Hacker magazines
Computer security
Works about computer hacking
1985 books
1988 books |
https://en.wikipedia.org/wiki/Voivodeship%20road%20114 | Voivodeship road 114 (, abbreviated DW 114) is a route in the Polish voivodeship roads network. The route links Nowe Warpno with the Voivodeship Road 115 in Tanowo.
Route plan
References
114 |
https://en.wikipedia.org/wiki/Voivodeship%20road%20115 | Voivodeship Road 115 (, abbreviated DW 115) is a route in the Polish voivodeship roads network. On 5 June 2008 the route allowed access with Germany by the border crossing Dobieszczyn - Hintersee and the route was added 900 metres to be able to join with the border.
Important settlements along the route
Szczecin
Tanowo
Dobieszczyn
Route plan
References
115 |
https://en.wikipedia.org/wiki/Chessboard%20detection | Chessboards arise frequently in computer vision theory and practice because their highly structured geometry is well-suited for algorithmic detection and processing. The appearance of chessboards in computer vision can be divided into two main areas: camera calibration and feature extraction. This article provides a unified discussion of the role that chessboards play in the canonical methods from these two areas, including references to the seminal literature, examples, and pointers to software implementations.
Chessboard camera calibration
A classical problem in computer vision is three-dimensional (3D) reconstruction, where one seeks to infer 3D structure about a scene from two-dimensional (2D) images of it. Practical cameras are complex devices, and photogrammetry is needed to model the relationship between image sensor measurements and the 3D world. In the standard pinhole camera model, one models the relationship between world coordinates and image (pixel) coordinates via the perspective transformation
where is the projective space of dimension .
In this setting, camera calibration is the process of estimating the parameters of the matrix of the perspective model. Camera calibration is an important step in the computer vision pipeline because many subsequent algorithms require knowledge of camera parameters as input. Chessboards are often used during camera calibration because they are simple to construct, and their planar grid structure defines many natural interest points in an image. The following two methods are classic calibration techniques that often employ chessboards.
Direct linear transformation
Direct linear transformation (DLT) calibration uses correspondences between world points and camera image points to estimate camera parameters. In particular, DLT calibration exploits the fact that the perspective pinhole camera model defines a set of similarity relations that can be solved via the direct linear transformation algorithm. To employ this approach, one requires accurate coordinates of a non-degenerate set of points in 3D space. A common way to achieve this is to construct a camera calibration rig (example below) built from three mutually perpendicular chessboards. Since the corners of each square are equidistant, it is straightforward to compute the 3D coordinates of each corner given the width of each square. The advantage of DLT calibration is its simplicity; arbitrary cameras can be calibrated by solving a single homogeneous linear system. However, the practical use of DLT calibration is limited by the necessity of a 3D calibration rig and the fact that extremely accurate 3D coordinates are required to avoid numerical instability.
Multiplane calibration
Multiplane calibration is a variant of camera auto-calibration that allows one to compute the parameters of a camera from two or more views of a planar surface. The seminal work in multiplane calibration is due to Zhang. Zhang's method calibrates cameras by so |
https://en.wikipedia.org/wiki/Local%20pixel%20grouping | In image Noise reduction, local pixel grouping is the algorithm to remove noise from images using principal component analysis (PCA).
Image denoising
Sensors such as CCD, CMOS or ultrasonic probe may encapsulate noise signal. Noise reduction is commonly used to improve quality of the image. However, techniques such as smoothing filters and many other algorithms may lose local structure of image while denoising the image. More over, efficiency is also taken into consideration.
Principal component analysis
PCA was invented in 1901 by Karl Pearson, to transform original dataset into linearly uncorrelated PCA domain. PCA works in the way that principal components with larger possible variance are preserved while discarding low variance components.
Image denoising by principal component analysis with local pixel grouping(LPG-PCA) was developed by Lei et. in 2010. It is based on the assumption that the energy of a signal will concentrate on a small subset of the PCA transformed dataset, while the energy of noise will evenly spread over the whole dataset.
Assume original image is denoted by and noise is denoted by , then the measured image will be . In order to denoising , first a train dataset must be constructed using local pixel group. Using this and apply PCA the noise in the image can be reduced.
Construct local pixel group
For each pixel in the image, select a window centered at denoted by
and a training window centered at . The training window is . Take the pixels in each possible block within the training block yields samples . If the distance between a sample and the center window is smaller than some threshold, then accept the sample. So the train dataset is acquired by put all the accepted sample together as column vectors into a matrix.
Denoising using local pixel group
First step of this part is centralize and is obtained. By computing the covariance matrix of denoted by , the PCA transformation matrix can be obtained. Apply to we have
The covariance matrix of can also be calculated by
Shrink the coefficient of by
and transform back to , the noise in that pixel is reduced. Apply this to all the pixels in the image and the denoised image can be obtained.
Experiments by Lei show that LGP-PCA can effectively preserve the image fine structures while smoothing noise. The solution is competitive compared with other algorithms such as Block-matching algorithm.
References
External links
Lei's homepage and matlab code of LPG-PCA
Computer-related introductions in 2010
Image noise reduction techniques |
https://en.wikipedia.org/wiki/Making%20Waves%20%28software%29 | Making Waves (MW) is computer software designed to produce professional quality audio from basic Windows multimedia PCs. This application was among the first of the 16-bit digital sequencers that evolved from the MS-DOS WAV trackers of the Eighties to become the digital audio workstation software available today including Steinberg Cubase, Pro Tools and ACID Pro. Making Waves enabled a small community of independent artists (originally including Daniel Bedingfield) to use existing hardware to record, sample, mix and render their own original work creating professional-quality audio with a modest investment of less than $100. This same dynamic user community played a significant role in the application's development, suggesting program revisions and performing extensive beta testing. These users were all organized and mentored by Stephen John Steele, the original programmer and developer of Making Waves as well as a founding director of Perceptive Solutions, Spacehead Systems and Making Waves Software Limited.
Overview
The application's interface integrates a sequencer, mixer, sampler and wave editor compatible with Musical Instrument Digital Interface (MIDI), Virtual Studio Technology (VST) and some DirectX plugins (only effects, not instruments), and the program's key feature is live mixing of MIDI input with VST (instruments and effects) and digital samples including Yamaha XG (EXtended General MIDI) sound libraries. Making Waves Studio renders mp3, wav and MIDI files or can be purchased as an inexpensive audio-only wav sequencer.
The early commercial success of this embryonic digital audio workstation (DAW) was relatively brief and seemed to build on two significant events, the release of a stable graphical user interface (GUI) version and the production of a "hit" record and album by an independent artist. First, with the release of the 32-bit Making Waves Studio version in April 1998, Perceptive Solutions had a product compatible with the Windows 95 GUI. The version provided a number of audio features never before or since consolidated at that price point. Next, Daniel Bedingfield's number one UK single was created with Making Waves and released in November 2001. His number two first album of the same name, Gotta Get Through This, soon followed. Making Waves began to gain sales and acceptance within the digital audio community as an affordable professional audio platform and VST host, a complete "recording studio-in-a-box"."
While still available for sale, Making Waves lacks a 64-bit version, is not approved for use on Windows 8 and is no longer being maintained following the death of the original developer in 2011.
References
External links
Sound on Sound, August 2002
Sound on Sound, July 2003
MIDI Connections 2003
Katharsis! REMASTERED!
Katharsis! on Soundcloud
Windows audio
Software synthesizers
Digital audio workstation software
Windows multimedia software |
https://en.wikipedia.org/wiki/The%20Drive%20%28TV%20series%29 | The Drive is a television documentary franchise on the Pac-12 Network. American football and men's basketball within the Pac-12 Conference are chronicled by The Drive: Pac-12 Football and The Drive: Pac-12 Basketball, respectively, in a series of weekly 30-minute episodes. The football series debuted in 2013, while its basketball counterpart began in 2015.
Football
In its inaugural season in 2013, The Drive: Pac-12 Football featured the Arizona State Sun Devils and the California Golden Bears. In its second season, The Drive followed the UCLA Bruins, while 2015 had Utah and Oregon State.
Starting in 2016, The Drive started to cover all 12 teams in the conference, just like its basketball counterpart, that started in 2015.
The show is patterned after Hard Knocks, an HBO series with behind-the-scenes access to National Football League training camps. Production of The Drive is led by Pac-12 Networks’ Senior Coordinating Producer Michael Tolajian, who won two Emmy Awards as producer for NBA Entertainment and HBO’s Real Sports with Bryant Gumbel. His production team includes Jim Jorden, who helped launch Hard Knocks and has won 16 Emmys.
Basketball
After two seasons of football coverage, The Drive expanded into men's basketball in 2015. Unlike the football series, The Drive: Pac-12 Basketball covers all 12 teams in the conference. Eight episodes were scheduled for 2015, with two teams featured in each of the six initial shows, followed by coverage of the Pac-12 tournament.
References
External links
2013 American television series debuts
2010s American documentary television series
2010s American reality television series
2020s American documentary television series
2020s American reality television series
Pac-12 Conference men's basketball
Pac-12 Conference football
English-language television shows
American sports television series |
https://en.wikipedia.org/wiki/Networking%20in%20Purgatory | Networking in Purgatory is the third album by Australian folk-rock band Ned Collette + Wirewalker, released in 2014.
Writing in The Quietus, reviewer Kate Hennessy praised the album as "very good, even exceptional". She described Collette's voice as "sibilant, astringent and at times vaguely waspish ... a voice that alchemises its flaws into powerful strengths, sitting neither above nor below the mix but slicing through it in both directions, reminiscent of the Brians (Eno and Ferry) and the Davids (Byrne and Bowie)". She noted of its lyrics that Collette's "bitterness runs cold and constant even beneath songs that, sonically, express a kind of genial largesse, a contradiction that is this record's most brilliant aspect". The Sydney Morning Herald described it as "a warm, lush record bursting (quietly) with a clutch of songs that dip and dive like springtime swallows, as intricate as they are robust ... It's a considered album, one for headphones with time on one's hands, and it rewards handsomely."
Track listing
(all songs by Ned Collette & Wirewalker)
"At the Piano" — 4:33
"Networking in Purgatory" — 0:46
"Bird" — 4:06
"Falls" — 3:35
"Vanitas Quack" — 4:32
"Opiate Eyes" — 2:26
"Across the Frozen Bridge" — 6:17
"Echoes Toes" — 4:35
"Helios" — 2:31
"A Lawyer or a Gimmick" — 4:00
"Meltemi " — 2:43
Personnel
Ned Collette — voice, guitars, bass, synths, mellotron, drum machine, percussion
Joe Talia — drums, percussion, synths, revox
James Rushford — backing vocals, viola, synths, ocarina, piano ("At the Piano", "Across the Frozen Bridge")
Ben Bourke — bassoon, bass ("At the Piano", "Across the Frozen Bridge")
Erkki Veltheim — violin ("Opiate Eyes")
References
Ned Collette albums
2014 albums
Dot Dash Recordings albums |
https://en.wikipedia.org/wiki/SBS9 | SBS9 is a Dutch commercial television channel owned by Talpa Network through Talpa TV. The channel was launched on 1 January 2015 at 12:00 CET with a movie marathon. The channel can be received via all television providers in the Netherlands. Other channels of the group in the Netherlands are SBS6, Net5 and Veronica.
History
SBS Broadcasting announced its plans for a launch of a fourth channel in the Netherlands already in 2009. On 22 August 2014, the company officially released its definite plans for a new channel targeting female viewers. The channel got its name SBS9 on 27 September 2014. The launch date was set in January 2015.
On 10 April 2017 Talpa Holding acquired a 67% stake from Sanoma Media Netherlands.
Programming
Mainly films and television series with every day of the week a different theme:
Mondays: Various
Tuesdays: Comedy
Wednesdays: Action
Thursdays: Drama
Fridays: Family
Saturdays: Thriller
Sundays: Romance
References
External links
Television channels in the Netherlands
Television channels and stations established in 2015
Mass media in Amsterdam
2015 establishments in the Netherlands
Talpa Network |
https://en.wikipedia.org/wiki/The%20Royals%20%28TV%20series%29 | The Royals is an American primetime television drama soap opera that premiered on E! on March 15, 2015. Created by Mark Schwahn and starring Elizabeth Hurley, it is the network's first scripted series. It began as a loose adaptation of the 2011 Michelle Ray novel Falling for Hamlet. E! renewed it for a second season two months before its debut, and picked up a third season on January 5, 2016. E! renewed it for a fourth season on February 16, 2017, which began airing on March 11, 2018. E! cancelled the series after four seasons in August 2018. Lionsgate Television was shopping the series to other networks with discussions for a pick-up by sister network Pop, but on September 24, Lionsgate failed to find a new home for the series and it was officially cancelled.
Hurley stars as Queen Helena, a fictional contemporary queen consort of England, along with William Moseley and Alexandra Park as her twin children, Prince Liam and Princess Eleanor; Jake Maskall as Helena's brother-in-law and nemesis, the new King Cyrus; Tom Austen as Eleanor's bodyguard and blackmailer, Jasper Frost; and Oliver Milburn as Ted Pryce, the Royal Family's head of security. Season 1 also starred Vincent Regan as Helena's husband, King Simon, and Merritt Patterson as Liam's love interest, Ophelia Pryce.
Plot summary
Helena is the matriarch of a fictional contemporary British royal family who must struggle with both common and atypical family dramas while in the public eye. Twins Prince Liam and Princess Eleanor enjoy the hedonistic pleasures available to them as royals, knowing that their older brother Robert bears the responsibility of being heir to the throne of England. But when Robert is killed, the family is thrown into disarray and a grieving King Simon fears for the future of the monarchy. Unexpectedly next in line for the throne, Liam must adjust to his new role while navigating his attraction to Ophelia, the American daughter of the royal head of security. His self-destructive sister Eleanor finds rock-bottom when her bodyguard turns out to be a conman. Trying to preserve the status quo and keep the royal family under her control, Queen Helena allies herself with Simon's brother Cyrus to preserve their way of life at any cost.
Cast
Main
Recurring
Production
Development
In April 2013, E! announced several scripted projects in development, including The Royals, "a contemporary family ensemble… steeped in all of the regal opulence of the British Monarchy and framed by Shakespeare's Hamlet." Deadline Hollywood reported in June 2013 that E! would produce pilots for The Royals and another series named Songbyrd, which would be its first scripted pilots to date. The Royals was picked up for series in March 2014, to be shot in the United Kingdom and scheduled to debut in 2015. Shooting for the first season began in London in June 2014. In August 2014, E! released its first promotional trailer. The first season consisted of ten episodes.
In December 2014, E! announced t |
https://en.wikipedia.org/wiki/Voivodeship%20road%20116 | Voivodeship road 116 (, abbreviated DW 116) is a route in the Polish voivodeship roads network. The route links Nojewo with the cross road of the Voivodeship Road 184 and Voivodeship Road 186 near Dobrojewo.
Route plan
References
115 |
https://en.wikipedia.org/wiki/Voivodeship%20road%20117 | Voivodeship road 117 (, abbreviated DW 117) is a route in the Polish voivodeship roads network. The route links DW 180 with Jędrzejewo and was formerly DW 309 before 2017.
Former route
DW 117 originally ran from Obrzycko to Ostroróg. This was downgraded to a powiat road on 23 December 2015.
Important settlements along the route
Górnica
Biernatowo
Średnica
Jędrzejewo
Route plan
References
117 |
https://en.wikipedia.org/wiki/List%20of%20countries%20by%20past%20military%20expenditure | This is a list of countries by past military expenditure, starting 1987.
Methodology
Figures for the tables below are provided by the Stockholm International Peace Research Institute (SIPRI) database. They are presented in millions of United States dollars in current prices, converted at the exchange rate for the given year. If there is no data for a particular year, a cell is left blank. Although the database includes statistics for over 150 countries, per SIPRI's Terms and Condition permission is needed to directly reproduce more than 10% of the database.
1987–1989
* indicates "Military of COUNTRY" links.
1990–1999
* indicates "Military of COUNTRY" links.
2000–2009
* indicates "Military of COUNTRY" links.
2010–2019
* indicates "Military of COUNTRY" links.
See also
Military budget
List of countries by military expenditures
List of countries by military expenditure per capita
References
Expenditures
Military
Military economics
Military budgets |
https://en.wikipedia.org/wiki/Voivodeship%20road%20118 | Voivodeship Road 118 (, abbreviated DW 118) is a route in the Polish voivodeship roads network. The route links Średnica with Nowe Dwory.
Important settlements along the route
Średnica
Zielonowo
Nowe Dwory
Route plan
References
118 |
https://en.wikipedia.org/wiki/Edimax | Edimax Technology Co., Ltd. () is a Taiwanese manufacturer of data networking products. It also operates in the telephone and telegraph apparatus sector. The company was founded in 1986 and has been listed at the Taiwan Stock Exchange since 2001.
See also
List of companies of Taiwan
References
External links
Open source software support
Manufacturing companies based in Taipei
Telecommunications companies of Taiwan
Networking hardware companies
Taiwanese companies established in 1986
Electronics companies of Taiwan
Companies listed on the Taiwan Stock Exchange
Taiwanese brands |
https://en.wikipedia.org/wiki/UXP/DS | UXP/DS is a discontinued Unix operating system developed by Fujitsu for its line of workstations and network servers. UXP/DS is based on AT&T System V Release 4 (SVR4), and targets Fujitsu's DS/90 7000 series of computers, as well as some GP7000 series computers.
History
In 1991, Fujitsu announced the DS/90 7000 series of workstations and servers, powered by SPARC processors, and running the UXP/DS operating system.
In 1998, Fujitsu's new GP7000 series (GRANPOWER 7000) was divided into three parts. Series "S" represented their previous systems running UXP/DS. Series "D" represented their new systems also running UXP/DS. Series "F" represented their new systems running Solaris operating system. GP7000F running Solaris became the basis for later lines of Fujitsu Unix servers.
In 1999, UXP/DS on the DS/90 7000 series was one of the reference platforms for the Common Desktop Environment (CDE).
In 2000, when Fujitsu released its new PRIMEPOWER line of Unix servers, only Solaris was available as an option for the operating system.
See also
EWS-UX
Sony NEWS
Fujitsu VP2000 optional running UXP/M for Mainframes as Vector and Parallel Processors
References
External links
IPSJ Computer Museum: FUJITSU DS/90 7000 Series
Fujitsu software
UNIX System V |
https://en.wikipedia.org/wiki/Malaysia%20Airlines%20Flight%20370%20satellite%20communications | The analysis of communications between Malaysia Airlines Flight 370 and Inmarsat's satellite telecommunication network provide the primary source of information about Flight 370's location and possible in-flight events after it disappeared from military radar coverage at 2:22 Malaysia Standard Time (MYT) on 8 March 2014 (17:22 UTC, 7 March), one hour after communication with air traffic control ended and the aircraft departed from its planned flight path while over the South China Sea.
Flight 370 was a scheduled commercial flight with 227 passengers and 12 crew which departed Kuala Lumpur, Malaysia at 0:41 and was scheduled to land in Beijing, China at 6:30 China Standard Time (6:30 MYT; 22:30 UTC, 7 March). Malaysia has worked in conjunction with the Australian Transport Safety Bureau to co-ordinate the analysis, which has also involved the UK's Air Accidents Investigation Branch, Inmarsat, and US National Transportation Safety Board. Other groups have also made efforts to analyse the satellite communications, albeit challenged by a lack of publicly available information for several months after the disappearance. On 29 July 2015, debris was discovered on Réunion Island which was later confirmed to have come from Flight 370; it is the first physical evidence that Flight 370 ended in the Indian Ocean.
During flight, the aircraft maintains a datalink with a satellite communication network for data and telephone calls. The datalink connects the aircraft and a ground station via satellite, which translates (changes) the signal's frequency and amplifies the signal; the ground station is connected to telecommunication networks which allows messages to be sent to and received from other locations, such as the airline's operations centre. Normal communications from Flight 370 were last made at 1:07 MYT. The datalink between the aircraft and satellite telecommunication network was lost at some point between 1:07 and 2:03, when the aircraft did not acknowledge a message sent from the ground station. Three minutes after the aircraft left the range of radar coverage—at 2:25—the aircraft's satellite data unit (SDU) transmitted a log-on message, which investigators believe occurred when the SDU restarted after a power interruption. Between the 2:25 message and 8:19, the SDU acknowledged two ground-to-aircraft telephone calls, which were not answered, and responded to automated, hourly requests from the ground station that were made to determine whether the SDU was still active. None of the communications from 2:25-8:19 contain information about the aircraft's location. The aircraft's final transmission at 8:19 was a log-on message; the aircraft did not respond to a message from the ground station at 9:15. Investigators believe the 8:19 log-on message was made when the SDU was restarting after the aircraft ran out of fuel and the aircraft's auxiliary power unit was started.
The search for Flight 370 was launched in Southeast Asia near the location of the l |
https://en.wikipedia.org/wiki/Centripetal%20%28disambiguation%29 | Centripetal usually refers to centripetal force, a force that keeps a body on a curved path.
It may also refer to:
Centripetal acceleration
Centripetal Catmull–Rom spline (computer graphics)
Centripetal harmony
Centripetal obesity
Centripetal Spring Armchair
Centripetal structure (theoretical linguistics) – see Lucien Tesnière
See also
Centrifugal (disambiguation)
History of centrifugal and centripetal forces |
https://en.wikipedia.org/wiki/Scottish%20Unemployed%20Workers%20Network | The Scottish Unemployed Workers Network (SUWN) is a left-leaning political organisation in Scotland which advocates on behalf of unemployed working-class people. It aims to be "a source of advice and information" as well as a vehicle for campaigning and organisation.
The organisation is based principally in Dundee and campaigns heavily on the issues of welfare sanctions and poverty. The organisation has highlighted the struggle of many people to find jobs and the challenges in living on benefits. In December 2014, the organisation published a detailed report claiming that Scottish welfare claimants are being hit by excessive and arbitrary sanctions as a result of UK Government welfare reforms.
References
Political organisations based in Scotland |
https://en.wikipedia.org/wiki/Voivodeship%20road%20119 | Voivodeship road 119 (, abbreviated DW 119) is a route in the Polish voivodeship roads network. The route links the village of Radziszewo with Gardno.
Important settlements along the route
Radziszewo
Chlebowo
Wysoka Gryfińska
Gardno
Route plan
References
119 |
https://en.wikipedia.org/wiki/Until%20the%20Ribbon%20Breaks | Until the Ribbon Breaks (often abbreviated to UTRB), is a British band consisting of the frontman Pete Lawrie-Winfield (lead vocals, keyboards, programming, percussion, brass, guitar) and Elliot Wall (drums, programming, backing vocals). The band was founded in Cardiff, Wales in 2012, initially as Lawrie-Winfield's solo project and "blends genres like electronic, pop, rock, and hip-hop, but it’s all done with a sharp alternative edge".
History
2012: Founding
The group began as the solo project of Pete Lawrie Winfield, from Cardiff, Wales. Both his parents were musicians, and Winfield grew up to listening to artists such as Marvin Gaye, Stevie Wonder, and Elton John. Winfield went to school to study film, but found he preferred music after he started making soundtracks for his own movies. He has stated, "Until The Ribbon Breaks started as a concept I had for one record. Ribbon being film or a cassette tape as the whole thing was based around this idea of the combination of music and film. At the time I made it I didn't know how far I was going to go with it."
2013: Early releases
Pitchfork Media stated on 20 June 2013, Until the Ribbon Breaks' early single "Pressure" "was written during a period when Winfield was sleeping on the floor of his studio with no concrete plan for his career". For the music video, Winfield combined scenes from David Lynch's 1997 thriller Lost Highway, stating; "Lost Highway seemed like the perfect match visually for the mood I was trying to convey...The film feels willfully claustrophobic and always on the verge of losing any sense of continuity."
With the track "2025", released in June 2013, Pitchfork writes that Winfield "manages to paint a starkly provocative picture of emotional decay, exhaling his vocals with a painfully resigned rasp circled by lurching drum machines, deflating synths, and industrial clanging. '2025' is a beautiful dirge, a bleak track kept barely afloat by an aching, human sadness".
Winfield soon recruited James Gordon and Elliot Wall to join the band. To create their debut album, the band "buried themselves in a hidden studio space armed with just a film projector, a microphone, a drum machine, and a piano". The trio would project films without sound on the studio walls while working, with Winfield stating "I’d shut the sound off, watch the movies, and make music to them. It was everything from David Lynch to Terrence Malick”.
The band finished their first tour of North America in 2013, in support of Lorde, and also finished a five-date tour across the United States with Phantogram that year. Spin named the Until The Ribbon Breaks one of the Best 5 Artist of the Month for June 2013. As of 2013, they released remixes of The Weeknd's "Wicked Games," Sam Smith's "Nirvana," and Lorde's "Royals." UTRB was featured on Run the Jewels' "Job Well Done" in 2013.
2014–Present: Recent projects
In 2014, the band released a remix of "Sights" by London Grammar, in which an accompanying music video was |
https://en.wikipedia.org/wiki/National%20Cybersecurity%20Center%20of%20Excellence | The National Cybersecurity Center of Excellence (NCCoE) is a US government organization that builds and publicly shares solutions to cybersecurity problems faced by U.S. businesses. The center, located in Rockville, Maryland, was established in 2012 through a partnership with the National Institute of Standards and Technology (NIST), the state of Maryland, and Montgomery County. The center is partnered with nearly 20 market-leading IT companies, which contribute hardware, software and expertise.
The NCCoE asks industry sector members about their cybersecurity problems, and then selects issues that affect an entire sector or reach across sectors. The center forms a team of people from cybersecurity technology companies, other federal agencies and academia to address each problem. The teams work in the center's labs to build example solutions using commercially available, off-the-shelf products. For each example solution, the NCCoE publishes a practice guide, a collection of the materials and information needed to deploy the example solution, and makes it available to the general public. The center's goal is to "accelerate the deployment and use of secure technologies" that can help businesses improve their defenses against cyber attacks.
History
NIST
The NCCoE is part of NIST, a non-regulatory federal agency within the U.S. Department of Commerce that develops measurement standards and conducts research in measurement science. According to the NIST website, the Federal Information Security Management Act of 2002 (FISMA) "reaffirmed NIST's role of developing information security standards (Federal Information Processing Standards) and guidelines for non-national security federal information systems and assigned NIST some specific responsibilities, including the development of:
Standards to be used by Federal agencies to categorize information and information systems based on the objectives of providing appropriate levels of information security according to a range of risk levels;
Guidelines recommending the types of information and information systems to be included in each category; and
Minimum information security requirements (management, operational and technical security controls) for information and information systems in each category."
Many private sector organizations voluntarily adopt these standards, guidelines and security requirements. As a NIST center, the NCCoE is an applied space for the demonstration of standards-based approaches to cybersecurity.
Executive Order 13636, "Improving Critical Infrastructure Cybersecurity"
President Barack Obama issued Executive Order 13636, "Improving Critical Infrastructure Cybersecurity", in February 2013 tasking NIST to create a cybersecurity framework that helps organizations mitigate risks to the nation's essential systems such as power generation and distribution, the financial services sector, and transportation. NIST released the Framework for Improving Critical Infrastructure Cybersecur |
https://en.wikipedia.org/wiki/List%20of%20suicides%20attributed%20to%20bullying | The following is a list of suicides attributed to bullying — both in-person and via the Internet (aka cyberbullying).
For a list of people who died from suicide, regardless of reason, see List of suicides and List of suicides in the 21st century.
Victims
August Ames (1994–2017) (born Mercedes Grabowski), age 23, was a Canadian pornographic actor and model. On December 5, 2017, Ames was found dead after hanging herself. Her death was ruled a suicide by the Ventura County Medical Examiner's Office. Media outlets have insinuated Ames died by suicide following successive comments on Twitter, in which she defended her refusal to perform in a pornographic movie with a man who had previously worked in gay pornography, and sparking an "online firestorm". Ames wrote that the decision was out of concern for her health. Some members of the gay community suggested her comments were homophobic and ill-informed about STI testing in the adult industry. Friends said she suffered from depression, and Ames had previously discussed struggles with bipolar disorder and "multiple personality" disorder.
Jadin Bell (1997–2013), age 15, was an Oregon youth known for his suicide which raised the national profile on youth bullying and gay victimization in bullying. Bell, a gay teenager, was allegedly intensely bullied both in person and on the Internet because he was gay. He was a member of the La Grande High School cheerleading team in La Grande, Oregon, where he was a sophomore. On January 14, 2013, Bell went to a local elementary school and hanged himself from the play structure. He did not immediately die from the strangulation, and was rushed to the emergency room, where he was kept on life support. The Associated Press reported that a spokesman for the Oregon Health and Science University's Portland hospital announced that after being taken off life support Bell died on February 3, 2013. Bell's death was largely reported in the media, starting discussions about bullying, the effect it has on youth, and gay bullying. The Huffington Post, Salon, Oregon Public Broadcasting, GLAAD, PQ Monthly, PinkNews, and many other media outlets reported on Bell's death. The media reported his suicide stemmed from being bullied for being gay, which Bell's father fully believed, stating, "He was hurting so bad. Just the bullying at school. Yeah there were other issues, but ultimately it was all due to the bullying, for not being accepted for being gay."
Danny Chen (1992–2011), age 19, was an American U.S. Army soldier from New York City, who had served in the war in Afghanistan. Chen was found dead of a self-inflicted gunshot wound in his living quarters on October 3, 2011, in Kandahar, Afghanistan, after being relentlessly bullied, harassed, tortured, and hazed by his fellow soldiers on the basis of his racial heritage. His death resulted in a military investigation, which led to eight U.S. soldiers being charged for their involvement in Chen's suicide. Four of the eight soldi |
https://en.wikipedia.org/wiki/Social%20selling | Social selling is the process of developing relationships as part of the sales process. Today this often takes place via social networks such as LinkedIn, Twitter, Facebook, and Pinterest, but can take place either online or offline. Examples of social selling techniques include sharing relevant content, interacting directly with potential buyers and customers, personal branding, and social listening. Social Selling is gaining popularity in a variety of industries, though it is used primarily for B2B (business-to-business) selling or highly considered consumer purchases (e.g., financial advisory services, automotive, realty). C2C companies (often referred to as direct selling companies) have been using social selling techniques (i.e. relationship building) since far before the Internet existed. B2B and B2C companies are now adopting many of those techniques as they are translated to social media platforms.
While social selling is sometimes confused with social marketing, there are two key differences. First, social selling is focused on sales professionals, rather than marketing professionals. Second, social selling aims to cultivate one-on-one relationships, rather than broadcast one-to-many messages. social marketing is a powerhouse which can provide right info at right time, but potential consumer expects established relationship rather than just info, so a completely successful selling process requires both social selling and social marketing to act together.
Overview
The University of British Columbia first established the science of social selling during research. They found that where there are incidental similarities between a buyer and seller, it is more likely a purchase would take place. For example, if two people follow the same sports team, they are more likely to feel a connection. The use of social technology can be used to discover incidental similarities and thus creating a quicker bond with the potential client.
Whilst the University of British Columbia discovered the science, it was Nigel Edelshain who was first to put the science into practice and coined the term sales 2.0. The name came from the web 2.0 development in 2006. Edelshain suggested in an interview that he felt the biggest problem with selling was regarding the prospecting phase. The reason is many sales techniques during the 1990s and early 2000s often could only be put into practice once a salesman had contact or was in a meeting. Following the development of sales 2.0, the buzzword social selling emerged.
Social selling has become more popular since companies have looked to increase their return on investment of social media interaction. Sales teams within organizations frequently mine data from social media that may help them connect to customers in order to create a more genuine sales lead. The technique frequently focuses on approaching potential clients in a less direct way, meaning they don't interrupt their daily lives with cold calls and hard sells. K |
https://en.wikipedia.org/wiki/Voivodeship%20road%20120 | Voivodeship Road 120 (, abbreviated DW 120) is a route in the Polish voivodeship roads network. The route links with the border crossing with Germany in Gryfino–Mescherin at the Motaniec junction with the National Road 10. The route runs through Gryfino County and Stargard County. After the village of Gardno the route joins with the S10 Expressway junction Gryfino.
Route plan
References
120 |
https://en.wikipedia.org/wiki/Rolls-Royce%20Controls%20and%20Data%20Services | Rolls-Royce Controls and Data Services Limited provides safety critical controls and asset intelligence solutions for industrial power, marine, civil and military aerospace. It produces engine control software, electronic engine controls (EEC), fuel metering units (FMU), fuel pumps and engine actuators for a large number of common commercial and military aircraft. Together these parts comprise the control system for a jet engine, responsible for delivering the correct amount of fuel and maintaining engine safety.
History
The company was originally part of Lucas Industries, responsible for producing fuel systems for aircraft. From 1938 the company produced fueling systems for second world war aircraft. In August 1996 the company was merged, along with the rest of Lucas Industries, with the North American Varity Corporation to form LucasVarity. In 1999 LucasVarity was acquired by TRW for $6.6bn, which sold the Lucas Aerospace section of the company to Goodrich Corporation for $1.5bn in 2002.
In 2008 Rolls-Royce was the second largest producer of aircraft engines worldwide behind General Electric and ahead of Pratt & Whitney. As the focus for engine efficiency shifts towards sophisticated engine control techniques, Rolls-Royce found it could potentially fall behind its competitors as the only one of the three companies to outsource these key components. Rolls-Royce and the Goodrich Corporation saw an opportunity for partnership, combining the existing manufacturing capability of Goodrich with the expertise of Rolls-Royce.
The Rolls-Royce Goodrich engine controls joint venture was announced on 14 August 2008 and agreement between the two companies was made on 22 December 2008 to form 'Rolls-Royce Goodrich Engine Control Systems Limited' with the trading company name of Aero Engine Controls. In the formation of Aero Engine Controls both companies contributed over £14m in assets and cash to the joint venture, with Rolls-Royce making a cash payment to the Goodrich Corporation of $100m.
Following the acquisition of Goodrich by United Technologies Corporation in July 2012, Rolls-Royce announced it would purchase Goodrich's 50% share of Aero Engine Controls. The purchase was completed on 10 December 2012 and Aero Engine Controls became wholly owned by Rolls-Royce Plc and a part of the Rolls-Royce Group.
in 2014 Rolls-Royce announced the merger of two wholly owned subsidiaries, Aero Engine Controls (AEC) and Optimized Systems and Solutions (OSyS), to form a new business, Controls and Data Services (CDS) which would continue to operate as part of the Rolls-Royce Group. The new business would bring together equipment sensors, controls and monitoring systems with performance analysis and health management services, delivering greater asset intelligence at a faster pace.
Locations
Birmingham, UK
Controls and Data Services has one manufacturing and engineering site in Birmingham and employs ~1800 employees.
Derby, UK
This is a systems and software engi |
https://en.wikipedia.org/wiki/Donkey%20Kong%20Country%20%28TV%20series%29 | Donkey Kong Country is a Canadian computer-animated musical television series based on the video game Donkey Kong Country from Nintendo and Rare. Co-produced by Nelvana, Medialab Studio L.A. (Season 1) and Hong Guang Animation (Season 2), in association with WIC Entertainment, with the participation of Teletoon—for Season 1, it was produced in co-production with France 2, Canal+, in association with Valar 4.
The show was first introduced in France on September 4, 1996, on France 2, on a hybrid live action and motion capture animated block titled La Planète de Donkey Kong (The Planet of Donkey Kong). It later became a full series and broadcast from August 15, 1997 to July 7, 2000.
Donkey Kong Country is the first television series that has been primarily animated with motion capture technology. Several elements of the series, such as the Crystal Coconut, appeared in later Donkey Kong video games like Donkey Kong 64 (itself released three years after the show began airing on television). The second season was produced by Taiwanese CGI studio CGCG (which featured updated character models, silkier lighting and key framing), and was announced as early as May 1999.
Plot
Taking place on Kongo Bongo Island, the show focuses on Donkey Kong, the island's resident hero. Before the series' events, he was chosen as the island's future ruler by a magical artifact known as the Crystal Coconut, which is connected to a spirit known as Inka Dinka Doo. In the present, Donkey Kong must prove he deserves the role through his heroics and by simply guarding the coconut.
Alongside various allies such as his best friend and sidekick Diddy Kong and his mentor Cranky Kong, he must protect the Crystal Coconut from various threats, most notably the villainous King K. Rool and his army who long to steal it in order to rule Kongo Bongo. Oftentimes, Donkey Kong has to juggle his guardian duties with his social life, his relationship with Candy Kong, and his love of gorging on bananas.
Each episode features two songs performed by the show's various characters.
Characters
Game characters
Donkey Kong — the strong but slow-witted future ruler of Kongo Bongo Island, tasked with guarding the Crystal Coconut. A bit of a slacker, he loves to eat bananas, which are often his main motivation for solving problems. His catchphrase is, "Banana Slamma!"
Diddy Kong — DK's excitable sidekick and buddy, who loves to cause mischief and is a fan of movies and TV. He and DK often take turns acting as the voice of reason for one another.
Cranky Kong — DK and Diddy's wise, but ill-tempered mentor. He enjoys playing the organ and making potions to solve the heroes’ problems; the latter was soon carried over into Donkey Kong 64. The Crystal Coconut is stored in a globe inside his treehouse.
Funky Kong — an eccentric, laid-back friend of DK, who speaks in a Jamaican accent, believes in the spiritual, and is also fond of surfing. Much like in the games, he owns Funky's Flights and often flie |
https://en.wikipedia.org/wiki/Hard%20Knocks%20%281987%20TV%20series%29 | Hard Knocks is an American comedy-drama television series that aired on the Showtime Network. It featured Bill Maher and Tommy Hinkley as ideologically opposed private detectives looking to make money by solving the problems of their wealthy clients.
Synopsis
Gower Rhodes and Nick Bronco open a private detective agency in the back of a restaurant to make money by solving cases. However, nothing seems to go their way.
Cast
Main characters
Bill Maher as Gower Rhodes
Tommy Hinkley as Nick Bronco
Recurring and Guest Roles
Judith-Marie Bergan as Maggie
Babette Props as Terry
James Vallely as Silky
Gracie Harrison as Sheila Jesswalters
Episodes
Reception
Critical reception
John J. O'Connor of the New York Times called the show "something truly different." The show has also been reviewed in the Spartanburg Herald-Journal as "hard to watch," and in the Chicago Tribune as having woeful writing, unappealing characters, an infantile premise, and as "making programmers at the three networks look like charter members of Mensa."
Awards and nominations
Hard Knocks was nominated for a CableACE Award in 1988
Sources
Hard Knocks (1987) on TV.com
Hard Knocks (1987 TV series) on imdb.com
Hard Knocks- Series Overview on nytimes.com
TV Review; 'Hard Knocks,' Sitcom on nytimes.com
US Copyright Office on copyright.gov
References
English-language television shows
1980s American sitcoms
1987 American television series debuts
1987 American television series endings
Television shows set in Los Angeles
Showtime (TV network) original programming |
https://en.wikipedia.org/wiki/Verification-based%20message-passing%20algorithms%20in%20compressed%20sensing | Verification-based message-passing algorithms (VB-MPAs) in compressed sensing (CS), a branch of digital signal processing that deals with measuring sparse signals, are some methods to efficiently solve the recovery problem in compressed sensing. One of the main goal in compressed sensing is the recovery process. Generally speaking, recovery process in compressed sensing is a method by which the original signal is estimated using the knowledge of the compressed signal and the measurement matrix. Mathematically, the recovery process in Compressed Sensing is finding the sparsest possible solution of an under-determined system of linear equations. Based on the nature of the measurement matrix one can employ different reconstruction methods. If the measurement matrix is also sparse, one efficient way is to use Message Passing Algorithms for signal recovery. Although there are message passing approaches that deals with dense matrices, the nature of those algorithms are to some extent different from the algorithms working on sparse matrices.
Overview
The main problem in recovery process in CS is to find the sparsest possible solution to the following under-determined system of linear equations where is the measurement matrix, is the original signal to be recovered and is the compresses known signal. When the matrix is sparse, one can represent this matrix by a bipartite graph for better understanding.
is the set of variable nodes in which represents the set of elements of and also is the set of check nodes corresponding to the set of elements of . Besides, there is an edge between and if the corresponding elements in is non-zero, i.e. . Moreover, the weight of the edge . Here is an example of a binary sparse measurement matrix where the weights of the edges are either zero or one.
The basic idea behind message passing algorithms in CS is to transmit appropriate messages between variable nodes and check nodes in an iterative manner in order to efficiently find signal . These messages are different for variable nodes and check nodes. However, the basic nature of the messages for all variable node and check nodes are the same in all of the verification based message passing algorithms. The messages emanating from variable node contains the value of the check node and an indicator which shows if the variable node is verified or not. Moreover, the messages emanating from check node contains the value of the check node and the remaining degree of the check node in the graph.
In each iteration, every variable node and check node produce a new message to be transmitted to all of its neighbors based on the messages that they have received from their own neighbors. This local property of the message passing algorithms enables them to be implemented as parallel processing algorithms and makes the time complexity of these algorithm so efficient.
Message passing rules
The common rule between all verification based message passing algorithms i |
https://en.wikipedia.org/wiki/CNAP | CNAP may refer to:
Cnap Twt, a disused quarry that is a Site of Special Scientific Interest in the Vale of Glamorgan, south Wales
Calling Name Presentation (CNAP), functionality on phone networks to provide the name identification of the calling party.
Centre national des arts plastiques (CNAP), a French institution that supports the visual arts
Center for Non-Anthropocentric Play, is a Norwegian Biocentric research Laboratory in the line of the philosopher Arne Naess.
Clann na Poblachta (CnaP), a defunct Irish republican political party
Colorado Natural Areas Program, a statewide program to protect threatened and endangered species
Continuous noninvasive arterial pressure (CNAP), method of measuring arterial blood pressure in real-time |
https://en.wikipedia.org/wiki/AT%26T%20Cybersecurity | AT&T Cybersecurity is a managed security service provider for network security, extended detection and response, and endpoints. From traditional computing to edge computing, the company
focuses on providing strategic services to customers. AT&T Cybersecurity also offers consulting services that are product neutral.
Products
AT&T Cybersecurity offers a paid security platform, called Unified Security Management, that integrates threat detection, incident response, and compliance management into one application. Threat applications are offered via hardware, virtual machines, and as a cloud service. Other services that AT&T provides include network vulnerability scanning, vulnerability assessment, and vulnerability management. The Open Threat Exchange (OTX) allows security experts to research and collaborate on threats, compare data, and integrate threat information into their security systems. A big data platform, OTX uses natural language processing and machine learning.
Awards
Cybersecurity Excellent Awards awarded AT&T Cybersecurity as Gold Winner for AT&T Managed Threat Detection and Response; AT&T Managed Endpoint Security, AT&T SASE, and AT&T Managed Security Services in 2022.
Cyber Defense Awards awarded AT&T Cybersecurity as a Market Leader in 3 categories, including Endpoint Security, MSSP and Network Security Management in their Global InfoSec Awards in 2022.
Business Intelligence Group named AT&T Managed XDR as a product category winner in their Fortress Cybersecurity Awards in 2022.
References
AT&T subsidiaries
Companies based in San Mateo, California
Software companies of the United States
Software companies established in 2007
Computer security companies
Security compliance
2018 mergers and acquisitions |
https://en.wikipedia.org/wiki/Cloud%20robotics | Cloud robotics is a field of robotics that attempts to invoke cloud technologies such as cloud computing, cloud storage, and other Internet technologies centered on the benefits of converged infrastructure and shared services for robotics. When connected to the cloud, robots can benefit from the powerful computation, storage, and communication resources of modern data center in the cloud, which can process and share information from various robots or agent (other machines, smart objects, humans, etc.). Humans can also delegate tasks to robots remotely through networks. Cloud computing technologies enable robot systems to be endowed with powerful capability whilst reducing costs through cloud technologies. Thus, it is possible to build lightweight, low-cost, smarter robots with an intelligent "brain" in the cloud. The "brain" consists of data center, knowledge base, task planners, deep learning, information processing, environment models, communication support, etc.
Components
A cloud for robots potentially has at least six significant components:
Building a "cloud brain" for robots. It is the main object of cloud robotics.
Offering a global library of images, maps, and object data, often with geometry and mechanical properties, expert system, knowledge base (i.e. semantic web, data centres);
Massively-parallel computation on demand for sample-based statistical modelling and motion planning, task planning, multi-robot collaboration, scheduling and coordination of system;
Robot sharing of outcomes, trajectories, and dynamic control policies and robot learning support;
Human sharing of "open-source" code, data, and designs for programming, experimentation, and hardware construction;
On-demand human guidance and assistance for evaluation, learning, and error recovery;
Augmented human–robot interaction through various way (Semantics knowledge base, Apple SIRI like service etc.).
Applications
Autonomous mobile robots Google's self-driving cars are cloud robots. The cars use the network to access Google's enormous database of maps and satellite and environment model (like Streetview) and combines it with streaming data from GPS, cameras, and 3D sensors to monitor its own position within centimetres, and with past and current traffic patterns to avoid collisions. Each car can learn something about environments, roads, or driving, or conditions, and it sends the information to the Google cloud, where it can be used to improve the performance of other cars.
Cloud medical robots a medical cloud (also called a healthcare cluster) consists of various services such as a disease archive, electronic medical records, a patient health management system, practice services, analytics services, clinic solutions, expert systems, etc. A robot can connect to the cloud to provide clinical service to patients, as well as deliver assistance to doctors (e.g. a co-surgery robot). Moreover, it also provides a collaboration service by sharing information between doct |
https://en.wikipedia.org/wiki/Application%20Networks | Application Networks Inc. (AppNet) was a Palo Alto-based company, provider of JRisk, a packaged financial risk management software to use on-premises or as part of cloud computing environments. Its customers included global banks. Banks used JRisk for the risk management of their portfolio of securities, OTC contracts and financial derivative transactions.
Application Networks Inc. was acquired by Reuters in June 2006.
References
1998 establishments in California
Cloud computing providers
Companies based in Palo Alto, California
Companies established in 1998
Software companies based in the San Francisco Bay Area
Defunct software companies of the United States
1998 establishments in the United States
Software companies established in 1998 |
https://en.wikipedia.org/wiki/M-theory%20%28learning%20framework%29 | In machine learning and computer vision, M-theory is a learning framework inspired by feed-forward processing in the ventral stream of visual cortex and originally developed for recognition and classification of objects in visual scenes. M-theory was later applied to other areas, such as speech recognition. On certain image recognition tasks, algorithms based on a specific instantiation of M-theory, HMAX, achieved human-level performance.
The core principle of M-theory is extracting representations invariant under various transformations of images (translation, scale, 2D and 3D rotation and others). In contrast with other approaches using invariant representations, in M-theory they are not hardcoded into the algorithms, but learned. M-theory also shares some principles with compressed sensing. The theory proposes multilayered hierarchical learning architecture, similar to that of visual cortex.
Intuition
Invariant representations
A great challenge in visual recognition tasks is that the same object can be seen in a variety of conditions. It can be seen from different distances, different viewpoints, under different lighting, partially occluded, etc. In addition, for particular classes objects, such as faces, highly complex specific transformations may be relevant, such as changing facial expressions. For learning to recognize images, it is greatly beneficial to factor out these variations. It results in much simpler classification problem and, consequently, in great reduction of sample complexity of the model.
A simple computational experiment illustrates this idea. Two instances of a classifier were trained to distinguish images of planes from those of cars. For training and testing of the first instance, images with arbitrary viewpoints were used. Another instance received only images seen from a particular viewpoint, which was equivalent to training and testing the system on invariant representation of the images. One can see that the second classifier performed quite well even after receiving a single example from each category, while performance of the first classifier was close to random guess even after seeing 20 examples.
Invariant representations has been incorporated into several learning architectures, such as neocognitrons. Most of these architectures, however, provided invariance through custom-designed features or properties of architecture itself. While it helps to take into account some sorts of transformations, such as translations, it is very nontrivial to accommodate for other sorts of transformations, such as 3D rotations and changing facial expressions. M-theory provides a framework of how such transformations can be learned. In addition to higher flexibility, this theory also suggests how human brain may have similar capabilities.
Templates
Another core idea of M-theory is close in spirit to ideas from the field of compressed sensing. An implication from Johnson–Lindenstrauss lemma says that a particular number of im |
https://en.wikipedia.org/wiki/Symposium%20on%20Discrete%20Algorithms | The Annual ACM-SIAM Symposium on Discrete Algorithms (SODA) is an academic conference in the fields of algorithm design and discrete mathematics. It is considered to be one of the top conferences for research in algorithms. SODA has been organized annually since 1990, typically in January. SODA is jointly sponsored by the ACM Special Interest Group on Algorithms and Computation Theory (SIGACT) and the SIAM Activity Group on Discrete Mathematics, and in format is more similar to a theoretical computer science conference than to a mathematics conference.
History
The first Symposium on Discrete Algorithms was held in 1990 at San Francisco, organized by David Johnson.
In 2012, the ACM Special Interest Group on Algorithms and Computation Theory (ACM SIGACT) and SIAM Activity Group on Discrete Mathematics (SIAG/DM) jointly established SODA Steering Committee to work with SIAM and ACM on organizing SODA.
References
Theoretical computer science conferences
Association for Computing Machinery conferences |
https://en.wikipedia.org/wiki/Raymond%20Lau | Raymond Lau or Ray Lau may refer to:
Raymond Lau, a developer of StuffIt, a computer software
Raymond Lau, a character of The Unwritten Law (film), portrayed by Andy Lau
Lau Kong-wah, a Hong Kong politician, also called Ray Lau |
https://en.wikipedia.org/wiki/U.S.%20Naval%20Information%20Forces | The Naval Information Forces (NAVIFOR) is an Echelon III command under US Fleet Forces Command, (USFLTFORCOM). It is the Type Command (TYCOM) for meteorology and oceanography, cryptology/SIGINT, cyber, electronic warfare, information operations, intelligence, networks, and space disciplines. Like other TYCOMs, this is the manpower, training, modernization, and maintenance component for these disciplines. NAVIFOR's mission is to support operational commanders ashore and afloat by providing combat-ready information warfare forces, which are forward deployable, fully trained, properly crewed, capably equipped, always ready, well maintained and combat sustainable. The current commander of NAVIFOR is Vice Admiral Kelly Aeschbach.
On February 9, 2016, the command was renamed from Navy Information Dominance Forces (NAVIDFOR) to Naval Information Forces as part of the alignment of the Information Dominance Corps under its new name, the Information Warfare Community. In June 2018
Vice Admiral Brian B. Brown took command of NAVIFOR.
On May 7, 2021, Vice Admiral Brian B. Brown was relieved by Vice Admiral Kelly A. Aeschbach in a ceremony at a Department of Homeland Security complex in Suffolk, Virginia.
List of commanders
See also
Fleet Cyber Command/Tenth Fleet
U.S. Cyber Command
U.S. Navy Cyber Forces
References
External links
Naval Information Forces (NAVIFOR)
NAVIDFOR on IDC Self Synchronization
Commands of the United States Navy
Military units and formations established in 2014 |
https://en.wikipedia.org/wiki/Phoma%20narcissi | Phoma narcissi is a fungal plant pathogen of Narcissus, Hippeastrum and other Amaryllidaceae,
where it causes a leaf scorch, neck rot and red leaf spot disease
Taxonomy
The USDA's Fungal Database states that P. narcissi may be a synanamorph of Stagonosporopsis curtisii (Peyronellaea curtisii (Berk.) Aveskamp, Gruyter & Verkley).
References
External links
Species Fungorum
USDA ARS Fungal Database
Mycobank
Fungal plant pathogens and diseases
microspora
Fungi described in 1993 |
https://en.wikipedia.org/wiki/Australian%20National%20Bibliographic%20Database | The Australian National Bibliographic Database (ANBD), formerly part of the Australian Bibliographic Network (ABN) and for some years renamed Kinetica, is a national shared library cataloguing network, hosted by the National Library of Australia. It commenced in 1981 in Australia as the ABN, and after a series of rebrandings and added services, has since 2006 been available through Libraries Australia (the successor to the ABN). In mid-2019, Libraries Australia partnered with Trove, and as of June 2020 is set to be co-branded with Trove.
ANBD is Australia's largest single bibliographic resource, containing bibliographic records of published and unpublished sources that form part of an Australian collection, as well as catalogue records of items from the US Library of Congress and other institutions. It includes holdings data, name and subject authority records. It supplies records to Libraries Australia in various supported formats, in order to provide enriched data and support copy cataloguing, thus streamlining services for all libraries in Australia. It is a subscription-based service, via Libraries Australia, for librarians, used for reference, collection development, cataloguing and inter-library loans. It thus also serves as a kind of enhanced union catalogue.
History
The National Library of Australia (NLA) began investigating the potential for a national shared cataloguing network in the 1970s. The idea behind the network was that, instead of every library in Australia separately cataloguing every item in their collection, an item would be catalogued just once and stored on a single database. Librarians in other libraries could then copy the record, thus bringing about huge savings in efficiency and money. In August 1978, following a feasibility study, the NLA announced a pilot project.
The Australian Bibliographic Network (ABN) commenced operations on 2 November 1981, with six participating libraries, which all contributed cataloguing records. During those pre-Internet days, library catalogues were on cards or microfiche, so the use of the digital dabase was seen as revolutionary.
The database was known as the Australian National Bibliographic Database (ANBD), while the library network was the Australian Bibliographic Network. The ABN may be seen as the forerunner to Libraries Australia. The National Library established an advisory body, the ABN Network Committee (now Libraries Australia Advisory Committee, or LAAC) to advise the Library on the operation and development of the service.
Various state library systems joined the network within the next few years, such as State Library Victoria in 1982, and the first ABN conference was held in Melbourne in 1983. The ABN system was as a multi-sector network, including university, state, public and special libraries. Services to school libraries were provided under a separate national service, the Schools Catalogue Information Service (SCIS), first developed in 1984 as ASCIS.
National sta |
https://en.wikipedia.org/wiki/Amnon%20Shashua | Amnon Shashua (; born May 26, 1960) is an Israeli computer scientist and businessman. Shashua is the Sachs Professor of Computer Science at the Hebrew University of Jerusalem, the President and chief executive officer (CEO) of the autonomous driving and driver-assistance technology company Mobileye, Co-founder of the artificial vision devices company OrCam, Founder and Owner of digital bank and chairman of the artificial intelligence company AI21 Labs.
Biography
Amnon Shashua received his B.Sc. in mathematics and computer science from Tel-Aviv University in 1985 and his M.Sc. in computer science in 1989 from the Weizmann Institute of Science under the supervision of Shimon Ullman titled "Structural Saliency". His Ph.D. in brain and cognitive sciences was received from the Massachusetts Institute of Technology (MIT), while working at the Artificial Intelligence Laboratory, in 1993; and his postdoctoral training under Tomaso Poggio at the center for biological and computational learning at MIT.
Career
Academic
Shashua has been on the computer science faculty at the Hebrew University of Jerusalem since 1996. In 1999 he was appointed as an associate professor and in 2003 received full professorship. From 2002 to 2005 he was the head of the engineering and computer science school at the Hebrew University. Shashua has held the Sachs chair in computer science at the Hebrew University since 2007.
Shashua's work includes early visual processing of saliency and grouping mechanisms, visual recognition and learning, image synthesis for animation and graphics, theory of computer vision in the areas of multiple-view geometry and multi-view tensors, multilinear algebraic systems in vision and learning, primal/dual optimization for approximate inference in MRF and Graphical models, and (since 2014) deep layered networks.
Business
In 1995, Shashua founded CogniTens, which was sold to Hexagon AB in 2007. In 1999, Shashua co-founded Mobileye, a company that develops systems-on-chip and computer vision algorithms for driving assistance systems, as well as autonomous driving technology. On August 1, 2014, Mobileye launched its IPO on the NYSE which was the biggest Israeli IPO ever in the US raising approximately $1 billion at a market cap of $5.3 billion.
In 2010, Shashua co-founded OrCam, an Israeli company which launched an assistive device for the visually impaired based on computer vision capabilities.
In August 2017, Intel acquired Mobileye for approximately $15.3 billion. Shashua became a senior vice president at Intel, in addition to his title of President and CEO of Mobileye. In 2017, he also co-founded AI21 Labs.
In October 2022, Mobileye went public again, trading on the Nasdaq Stock Exchange with Shashua as its CEO.
Awards and recognition
Shashua received his first prize in the 2004 Kaye Innovation award, and the 2005 Mifal HaPayis Landau Prize for Science and Research in the area of Exact Sciences - Robotics.
On Israeli Independence Day 2017 |
https://en.wikipedia.org/wiki/Code%20Project | Code Project (formerly The Code Project) is a community for computer programmers with articles on different topics and programming languages such as web development, software development, C++, Java, and other topics. Once a visitor registers a user account on the site, they can gain reputation which allows users to unlock different privileges such as the ability to store personal files in the user's account area, have live hyperlinks in their profile biography, and more. Members can also write and upload their own articles and code for other visitors to view.
Articles can be related to general programming, GUI design, algorithms or collaboration. Most of the articles are uploaded by visitors and do not come from an external source. Nearly every article is accompanied with source code and examples which can be downloaded independently. Most articles and sources are released under the Code Project Open License (CPOL), although the license can be configured by the user. These articles either go through a moderation and editing phase or are immediately posted as unedited reader contributions.
Code Project employs a rating and comment system that helps to filter the good articles from the poor. It also has forums, and is a resource for resolving difficult software development issues.
Rather than being just a collection of samples, contributors are encouraged to explain concepts and ideas, and discuss design decisions. A separate format, "Tips and Tricks", was introduced in 2010 as a place to post short code snippets that don't fit the requirements for an article.
Code Project strives to be a wealth of information and a valuable resource. The site encourages users to share what source code or knowledge they can in order to give back to the community.
Code Project also conducts interviews with notable developers. Code Project also awards Code Project Members Choice Awards in various categories. These awards are based on the votes of Code Project members and editors, reflecting which companies and products application developers value most.
Users may also be awarded MVP status with Code Project, which is presented to a small handful of people. Code Project's Most Valuable Professional award is given to those members who have contributed the most to the community in both article submissions and in answering questions on the site. The award is given annually.
Community
There are non-programming forums, where members can discuss news and sporting events, or comment on the latest thread. There is a high volume of posts to these, mainly in 'The Lounge'. They hit the 10-million-member mark in August 2013.
Languages
Code Project contains articles and code pertaining to the following programming languages:
C/C++ (emphasis on Microsoft Foundation Classes, but many other domains are dealt with)
C#
VB.NET
ASP
JavaScript
Common Lisp
Ajax
SQL
Delphi
Java
Perl
Python
Topics
Code Project contains articles pertaining to the following topics:
Android
iOS
I |
https://en.wikipedia.org/wiki/Charles%20Hamya | Charles Hamya (born 1973) is a Ugandan businessman. He was the Managing Director of MultiChoice Uganda Limited, a digital communications network provider, until his resignation in January 2019. He is reported to be one of the country's wealthiest individuals. He also served as a member of the board of directors of Uganda Airlines from May 2019 to 2022 when the board was suspended amid reports of underperformance, abuse of office and financial mismanagement. He resigned from Uganda Airlines board in January 2022 after being cleared of any wrongdoing by the shareholders.
Background and education
He was born in Uganda in 1973. He attended the oldest school in Uganda, Mengo Senior School, established in 1895.
Career
He started out as the Chief Accountant at MultiChoice Uganda Limited, during the early 2000s. He rose to the rank of General Manager and later assumed the position of Managing Director and CEO. In 2015, his monthly salary, excluding allowances, was reported at over USh50.7 million (approximately US$14,000).
He is currently the Executive Director of HCH Financial Services and also remains a special advisor to MultiChoice Uganda. Has since been appointed and is the current Board Chairman of MultiChoice Uganda Limited.
See also
List of wealthiest people in Uganda
References
External links
Piracy Hampering Growth of Pay TV
Living people
Ugandan businesspeople
1970 births |
https://en.wikipedia.org/wiki/Multiple%20kernel%20learning | Multiple kernel learning refers to a set of machine learning methods that use a predefined set of kernels and learn an optimal linear or non-linear combination of kernels as part of the algorithm. Reasons to use multiple kernel learning include a) the ability to select for an optimal kernel and parameters from a larger set of kernels, reducing bias due to kernel selection while allowing for more automated machine learning methods, and b) combining data from different sources (e.g. sound and images from a video) that have different notions of similarity and thus require different kernels. Instead of creating a new kernel, multiple kernel algorithms can be used to combine kernels already established for each individual data source.
Multiple kernel learning approaches have been used in many applications, such as event recognition in video, object recognition in images, and biomedical data fusion.
Algorithms
Multiple kernel learning algorithms have been developed for supervised, semi-supervised, as well as unsupervised learning. Most work has been done on the supervised learning case with linear combinations of kernels, however, many algorithms have been developed. The basic idea behind multiple kernel learning algorithms is to add an extra parameter to the minimization problem of the learning algorithm. As an example, consider the case of supervised learning of a linear combination of a set of kernels . We introduce a new kernel , where is a vector of coefficients for each kernel. Because the kernels are additive (due to properties of reproducing kernel Hilbert spaces), this new function is still a kernel. For a set of data with labels , the minimization problem can then be written as
where is an error function and is a regularization term. is typically the square loss function (Tikhonov regularization) or the hinge loss function (for SVM algorithms), and is usually an norm or some combination of the norms (i.e. elastic net regularization). This optimization problem can then be solved by standard optimization methods. Adaptations of existing techniques such as the Sequential Minimal Optimization have also been developed for multiple kernel SVM-based methods.
Supervised learning
For supervised learning, there are many other algorithms that use different methods to learn the form of the kernel. The following categorization has been proposed by Gonen and Alpaydın (2011)
Fixed rules approaches
Fixed rules approaches such as the linear combination algorithm described above use rules to set the combination of the kernels. These do not require parameterization and use rules like summation and multiplication to combine the kernels. The weighting is learned in the algorithm. Other examples of fixed rules include pairwise kernels, which are of the form
.
These pairwise approaches have been used in predicting protein-protein interactions.
Heuristic approaches
These algorithms use a combination function that is parameterized. The parameters are |
https://en.wikipedia.org/wiki/Template%20generator | Template Generator or Template generating software is a tool used for developing website, email, and document templates without manually formatting or writing computer programming language code. Such tools provide a GUI (graphical user interface) for design purposes, and produce the source code or formatted structure for websites, emails, or documents.
Categories of Template Generators
There are two types of template generators: online and desktop.
Online template generators allow users to design templates without downloading a tool onto their personal computer. Users must be online and make an account to begin using an online template generator, and sign in each time they use the tool.
Desktop template generators or desktop-based template generators, unlike online, have to be downloaded onto the user's computer. However, this eliminates the need to make an account and sign in before using the tool.
CMS Theme Generators
CMS templates describe the web templates which are specifically made for use by websites built on content management systems. CMS templates can be categorized according to the number of CMSs available. On that basis, there are many generators which typically generate themes or templates for a particular CMS. The four major CMSs are:
WordPress: The web design templates developed for the websites based on WordPress are called WordPress themes.
Joomla: Templates developed for Joomla websites are called Joomla templates.
Magento : Templates developed for Magento websites are called Magento themes.
See also
References
Graphic design
Page layout |
https://en.wikipedia.org/wiki/High%20Bandwidth%20Memory | High Bandwidth Memory (HBM) is a computer memory interface for 3D-stacked synchronous dynamic random-access memory (SDRAM) initially from Samsung, AMD and SK Hynix. It is used in conjunction with high-performance graphics accelerators, network devices, high-performance datacenter AI ASICs, as on-package cache in CPUs and on-package RAM in upcoming CPUs, and FPGAs and in some supercomputers (such as the NEC SX-Aurora TSUBASA and Fujitsu A64FX). The first HBM memory chip was produced by SK Hynix in 2013, and the first devices to use HBM were the AMD Fiji GPUs in 2015.
High Bandwidth Memory was adopted by JEDEC as an industry standard in October 2013. The second generation, HBM2, was accepted by JEDEC in January 2016.
Technology
HBM achieves higher bandwidth while using less power in a substantially smaller form factor than DDR4 or GDDR5. This is achieved by stacking up to eight DRAM dies and an optional base die which can include buffer circuitry and test logic. The stack is often connected to the memory controller on a GPU or CPU through a substrate, such as a silicon interposer. Alternatively, the memory die could be stacked directly on the CPU or GPU chip. Within the stack the die are vertically interconnected by through-silicon vias (TSVs) and microbumps. The HBM technology is similar in principle but incompatible with the Hybrid Memory Cube (HMC) interface developed by Micron Technology.
HBM memory bus is very wide in comparison to other DRAM memories such as DDR4 or GDDR5. An HBM stack of four DRAM dies (4Hi) has two 128bit channels per die for a total of 8 channels and a width of 1024 bits in total. A graphics card/GPU with four 4Hi HBM stacks would therefore have a memory bus with a width of 4096 bits. In comparison, the bus width of GDDR memories is 32 bits, with 16 channels for a graphics card with a 512bit memory interface. HBM supports up to 4 GB per package.
The larger number of connections to the memory, relative to DDR4 or GDDR5, required a new method of connecting the HBM memory to the GPU (or other processor). AMD and Nvidia have both used purpose-built silicon chips, called interposers, to connect the memory and GPU. This interposer has the added advantage of requiring the memory and processor to be physically close, decreasing memory paths. However, as semiconductor device fabrication is significantly more expensive than printed circuit board manufacture, this adds cost to the final product.
Interface
The HBM DRAM is tightly coupled to the host compute die with a distributed interface. The interface is divided into independent channels. The channels are completely independent of one another and are not necessarily synchronous to each other. The HBM DRAM uses a wide-interface architecture to achieve high-speed, low-power operation. The HBM DRAM uses a 500 MHz differential clock CK_t / CK_c (where the suffix "_t" denotes the "true", or "positive", component of the differential pair, and "_c" stands for the "complementary" on |
https://en.wikipedia.org/wiki/Constructive%20cooperative%20coevolution | The constructive cooperative coevolutionary algorithm (also called C3) is a global optimisation algorithm in artificial intelligence based on the multi-start architecture of the greedy randomized adaptive search procedure (GRASP). It incorporates the existing cooperative coevolutionary algorithm (CC). The considered problem is decomposed into subproblems. These subproblems are optimised separately while exchanging information in order to solve the complete problem. An optimisation algorithm, usually but not necessarily an evolutionary algorithm, is embedded in C3 for optimising those subproblems. The nature of the embedded optimisation algorithm determines whether C3's behaviour is deterministic or stochastic.
The C3 optimisation algorithm was originally designed for simulation-based optimisation but it can be used for global optimisation problems in general. Its strength over other optimisation algorithms, specifically cooperative coevolution, is that it is better able to handle non-separable optimisation problems.
An improved version was proposed later, called the Improved Constructive Cooperative Coevolutionary Differential Evolution (C3iDE), which removes several limitations with the previous version. A novel element of C3iDE is the advanced initialisation of the subpopulations. C3iDE initially optimises the subpopulations in a partially co-adaptive fashion. During the initial optimisation of a subpopulation, only a subset of the other subcomponents is considered for the co-adaptation. This subset increases stepwise until all subcomponents are considered. This makes C3iDE very effective on large-scale global optimisation problems (up to 1000 dimensions) compared to cooperative coevolutionary algorithm (CC) and Differential evolution.
The improved algorithm has then been adapted for multi-objective optimization.
Algorithm
As shown in the pseudo code below, an iteration of C3 exists of two phases. In Phase I, the constructive phase, a feasible solution for the entire problem is constructed in a stepwise manner. Considering a different subproblem in each step. After the final step, all subproblems are considered and a solution for the complete problem has been constructed. This constructed solution is then used as the initial solution in Phase II, the local improvement phase. The CC algorithm is employed to further optimise the constructed solution. A cycle of Phase II includes optimising the subproblems separately while keeping the parameters of the other subproblems fixed to a central blackboard solution. When this is done for each subproblem, the found solution are combined during a "collaboration" step, and the best one among the produced combinations becomes the blackboard solution for the next cycle. In the next cycle, the same is repeated. Phase II, and thereby the current iteration, are terminated when the search of the CC algorithm stagnates and no significantly better solutions are being found. Then, the next iteration is started. |
https://en.wikipedia.org/wiki/GOFAI | In the philosophy of artificial intelligence, GOFAI ("Good old fashioned artificial intelligence") is classical symbolic AI, as opposed to other approaches, such as neural networks, situated robotics, narrow symbolic AI or neuro-symbolic AI.
The term was coined by philosopher John Haugeland in his 1985 book Artificial Intelligence: The Very Idea.
Haugeland coined the term to address two questions:
Can GOFAI produce human level artificial intelligence in a machine?
Is GOFAI the primary method that brains use to display intelligence?
AI founder Herbert A. Simon speculated in 1963 that the answers to both these questions was "yes". His evidence was the performance of programs he had co-written, such as Logic Theorist and the General Problem Solver, and his psychological research on human problem solving.
AI research in the 1950s and 60s had an enormous influence on intellectual history: it inspired the cognitive revolution, led to the founding of the academic field of cognitive science, and was the essential example in the philosophical theories of computationalism, functionalism and cognitivism in ethics and the psychological theories of cognitivism and cognitive psychology. The specific aspect of AI research that led to this revolution was what Haugeland called "GOFAI".
Western rationalism
Haugeland places GOFAI within the rationalist tradition in western philosophy, which holds that abstract reason is the "highest" faculty, that it is what separates man from the animals, and that it is the most essential part of our intelligence. This assumption is present in Plato and Aristotle, in Shakespeare, Hobbes, Hume and Locke, it was central to the Enlightenment, to the logical positivists of the 1930s and to the computationalists and cognitivists of the 1960s. As Shakespeare wrote:
Symbolic AI in the 1960s was able to successfully simulate the process of high-level reasoning, including logical deduction, algebra, geometry, spatial reasoning and means-ends analysis, all of them in precise English sentences, just like the ones humans used when they reasoned. Many observers, including philosophers, psychologists and the AI researchers themselves became convinced that they had captured the essential features of intelligence. This was not just hubris or speculation -- this was entailed by rationalism. If it was not true, then it brings into question a large part of the entire Western philosophical tradition.
Continental philosophy, which included Nietzsche, Husserl, Heidegger and others, rejected rationalism and argued that our high-level reasoning was limited, prone to error, and that most of our abilities come from our intuitions, our culture, and from our instinctive feel for the situation. Philosophers who were familiar with this tradition were the first to criticize GOFAI and the assertion that it was sufficient for intelligence, such as Hubert Dreyfus and Haugeland.
Haugeland's GOFAI
Critics and supporters of Haugeland's position, fro |
https://en.wikipedia.org/wiki/SPARQL%20Query%20Results%20XML%20Format | A SPARQL Query Results XML(also sometimes called SPARQL Results Document) is a file stores data (value, uri and text) in XML.
This document is generally the response by default of a RDF database after a SPARQL query.
See also
SPARQL
SPARQL Query Results JSON Format
References
Data serialization formats
SPARQL |
https://en.wikipedia.org/wiki/TVB%20Star%20Awards%20Malaysia | The TVB Star Awards Malaysia () is an annual awards ceremony honoring Cantonese programming achievements in Malaysia. It is produced by TVB Entertainment News, with Astro and MY FM as media partners. The ceremony was previously known as the My Astro On Demand Favourites Awards (), which succeeded the Astro Wah Lai Toi Drama Awards ().
The Malaysian television channel Astro Wah Lai Toi, presented by Astro, airs Hong Kong television programmes produced by TVB. In 2005, Astro organised its first awards ceremony, the 2004 Astro Wah Lai Toi Drama Awards, presenting awards to Hong Kong actors and actresses for their acting achievements in TVB television dramas. TVB Entertainment News took over the production of the awards series in 2013, renaming it The TVB Star Awards. It has since become an annual event, and is regarded as a prelude to Hong Kong's TVB Anniversary Awards.
The nominations for the TVB Star Awards are jointly determined by Astro and TVB for TVB programmes shown on Astro Wah Lai Toi throughout the designated year. Winners are decided by the Malaysian public. Presently, voting is done through a mobile app produced by TVB and Astro.
Categories
Current categories
Current award categories include: My Favourite TVB Drama Series,...Actor and ...Actress in a Leading Role, ...Actor and ...Actress in a Supporting Role, ...Drama Characters, ...On Screen Couple, and ...Drama Theme Song. These categories have been awarded since 2004. In 2011, My Favourite Most Improved TVB Actor and Actress categories were added. In 2013, My Favourite TVB Host In a Variety Program, ...Variety Program, and ...Enrichment Program awards were added bringing the total to thirteen My Favourite TVB awards.
Discontinued or special categories
Discontinued or special categories include: Most Unforgettable Slap in 2004. In 2005, categories included: My Favourite Gunshot, My Favourite Beauty, My Favourite Father-figure, and My Favourite Mother-figure. Most Unforgettable Kiss category was awarded in 2004 and 2008. My Favourite Supporting Character and My Favourite Extreme Appearance were awarded between 2006 and 2008 inclusive. Most Unforgettable Scene was awarded for the years 2004–2008. Most Unforgettable Villain was awarded in 2004, 2008 and 2009. My Favourite Legendary Character and My Favourite Outstanding Popularity King were awarded in 2012. Rising TVB Star in Malaysia was awarded in 2014 and Astro MY FM’s Special Pick for TVB Drama Theme Song was awarded in 2015.
Honorary awards
The TVB Star Achievement Award was first awarded in 2014.
Years
Favourite TVB Drama Characters
References
Acting awards
Awards established in 2004
Astro Malaysia Holdings
Entertainment events in Malaysia
Mass media in Malaysia |
https://en.wikipedia.org/wiki/Center%20for%20Data-Driven%20Discovery | The Center for Data-Driven Discovery is a multi-division research group at the California Institute of Technology, focusing on the methodologies for handling and analysis of large and complex data sets, facilitating the data-to-discovery process. It supports all applications of data-driven computing in various scientific domains, such as biology, physics, astronomy, geophysics, etc. It also functions as a catalyst for new collaborations and projects between different scientific disciplines, and between the campus and JPL, with especial interest in the sharing and transfer of methodologies, where the solutions from one field can be reapplied in another one.
The Center for Data-Driven Discovery is a part of a joint initiative with the Center for Data Science and Technology at the Jet Propulsion Laboratory. It became operational in the fall of 2014.
Directors
Stanislav George Djorgovski (2014 – present)
References
Computational science
Jet Propulsion Laboratory
California Institute of Technology
2014 establishments in California |
https://en.wikipedia.org/wiki/Journal%20of%20Interactive%20Advertising | The Journal of Interactive Advertising (JIA) is a peer-reviewed international journal covering the field of interactive advertising, marketing and communication in the constantly expanding networked world. It publishes original research related to advertising using interactive means, including both online and offline, to promote mutual actions among consumers, messages and brands. It covers any aspects of interactive advertising: the roles of interactivity on advertising effectiveness, interactive advertising in global and multi-cultural settings, data analytics and methodological issues, along with more macro aspects such as economic and social impacts of interactive advertising. It is published by Routledge on behalf of the American Academy of Advertising.
History
The journal was established in Fall 2000 by John D. Leckenby (University of Texas at Austin) and Hairong Li (Michigan State University), who served as founding editors-in-chief. It was an official publication of the Department of Advertising, Public Relations, and Retailing at Michigan State University and the Department of Advertising at The University of Texas at Austin until December 31, 2007. The American Academy of Advertising became its publisher on January 1, 2008. It is currently published (since 2013) by Routledge on behalf of the American Academy of Advertising.
Editors-in-chief
The following persons have been editor-in-chief:
John D. Leckenby (2000-2007)
Hairong Li (2000-2011)
Steve Edwards (2012-2014)
Terry Daugherty (2015-2018)
Jooyoung Kim (2019-current)
Abstracting and indexing
The journal is abstracted and indexed in Scopus and EBSCOhost.
References
External links
American Academy of Advertising
Business and management journals
Academic journals established in 2000
Biannual journals
Taylor & Francis academic journals
English-language journals
Communication journals |
https://en.wikipedia.org/wiki/Drop%20%28company%29 | Drop (formerly Massdrop) is an American e-commerce company based in San Francisco, California. In 2023, Corsair acquired Drop, while retaining its original brand and staff.
Drop uses data and insights from community to develop and find products that feed their interests in audio products and mechanical keyboards. The Drop community can also learn, share, shop with others, and participate in product development through polls, discussions, and interest checks.
History
Drop founders Steve El-Hage and Nelson Wu met in Toronto, Canada, where El-Hage was studying economics at the University of Toronto. The two had grown up using online forums as a way to explore their hobbies, but believed these forums had many shortcomings, including disorganized meetups and unreliable group buys. They thought that by combining their forum experience with their interest in bulk buying, they could create a site that would better support enthusiast communities. The pair moved to Silicon Valley, where they met Will Bright and started Massdrop in 2012.
Drop changed its name from Massdrop in April 2019.
On July 17, 2023, Corsair announced it had acquired Drop.
Business model
Initially, Drop sold products exclusively from existing manufacturers. Intending to provide a collaborative environment, users were able to purchase as a group and influence the types of products sold, through participation in polls, community discussions, and posts.
The company has since introduced exclusive enthusiast targeted private label products under the Drop name.
Past Drop products
Past products include the Massdrop x Sennheiser HD 6XX headphones, Massdrop x Sennheiser HD 58X headphones, Massdrop CTRL Mechanical Keyboard, Massdrop x Sennheiser PC37X gaming headset, Massdrop x Koss ESP/95X, among others.
Funding
In September 2014, Drop raised $6.5 million in a Series A round led by Mayfield Fund with additional investment from previous backers Kleiner Perkins Caufield & Byers, First Round Capital, and Cowboy Ventures. In August 2015, the company secured $40 million in Series B funding led by August Capital with additional investment from Mayfield Fund, First Round Capital, and Cowboy Ventures.
References
External links
Drop on Facebook
Drop on Twitter
Online retailers of the United States |
https://en.wikipedia.org/wiki/Lo%20Nuestro%20Award%20for%20New%20Artist%20of%20the%20Year | The Lo Nuestro Award for New Artist of the Year is an honor presented annually by American network Univision. The Lo Nuestro Awards have been held since 1989 to recognize the most talented performers of Latin music. The nominees and winners were originally selected by a voting poll conducted among program directors of Spanish-language radio stations in the United States and also based on chart performance on Billboard Latin music charts, with the results tabulated and certified by the accounting firm Arthur Andersen. Starting from 2004, the winners are selected by the audience through an online survey. The trophy is shaped in the form of a treble clef.
The award was first presented in every field awarded on the Lo Nuestro Awards: Pop, Tropical, Regional Mexican and, for one time only, Rock/Alternative; however in 2013 the former categories for new artist were merged in a single one for Best New Artist in the General Field. Mexican band 3Ball MTY won the Lo Nuestro after earning the same recognition at the Latin Grammys; their record Inténtalo was the third-best selling Latin album of 2012 in the United States and received the Lo Nuestro for Regional Mexican Album. The following year two awards were created in the Pop and Tropical fields, with Mexican singer América Sierra winning for Pop New Artist, and Alex Matos earning the Tropical New Artist. In 2015, the nominees were included in only one category and featured solo artists, Aneeka and Johhny Sky, and ensembles, Kent y Tony and Proyecto X. Proyecto X received the award. In 2017, no nominees were announced for New Artist of the Year.
Winners and nominees
Listed below are the winners of the award for each year, as well as the other nominees for the majority of the years awarded.
See also
Grammy Award for Best New Artist
Latin Grammy Award for Best New Artist
References
New Artist of the Year
Music awards for breakthrough artist
Awards established in 2013 |
https://en.wikipedia.org/wiki/Lo%20Nuestro%20Award%20for%20Regional%20Mexican%20Female%20Artist%20of%20the%20Year | The Lo Nuestro Award for Regional Mexican Female Artist of the Year is an award presented annually by American network Univision.The accolade was established to recognize the most talented performers of Latin music. The nominees and winners were originally selected by a voting poll, conducted among program directors of Spanish-language radio stations in the United States and also based on chart performance on Billboard Latin music charts, with the results being tabulated and certified by the accounting firm Deloitte. At the present time, the winners are selected by the audience through an online survey. The trophy awarded is shaped in the form of a treble clef.
The award was first presented to Mexican singer Ana Gabriel in 1992. Mexican-American performer Jenni Rivera holds the record for the most awards with nine, out of ten nominations. Mexican singer Graciela Beltrán is the most nominated performer without a win, with ten unsuccessful nominations.
In 2017, the award was not included in the categories.
Winners and nominees
Listed below are the winners of the award for each year, as well as the other nominees for the majority of the years awarded.
See also
List of music awards honoring women
References
Regional Mexican Female Artist of the Year
Music awards honoring women
Regional Mexican musicians
Awards established in 1992 |
https://en.wikipedia.org/wiki/Approximation-preserving%20reduction | In computability theory and computational complexity theory, especially the study of approximation algorithms, an approximation-preserving reduction is an algorithm for transforming one optimization problem into another problem, such that the distance of solutions from optimal is preserved to some degree. Approximation-preserving reductions are a subset of more general reductions in complexity theory; the difference is that approximation-preserving reductions usually make statements on approximation problems or optimization problems, as opposed to decision problems.
Intuitively, problem A is reducible to problem B via an approximation-preserving reduction if, given an instance of problem A and a (possibly approximate) solver for problem B, one can convert the instance of problem A into an instance of problem B, apply the solver for problem B, and recover a solution for problem A that also has some guarantee of approximation.
Definition
Unlike reductions on decision problems, an approximation-preserving reduction must preserve more than the truth of the problem instances when reducing from one problem to another. It must also maintain some guarantee on the relationship between the cost of the solution to the cost of the optimum in both problems. To formalize:
Let and be optimization problems.
Let be an instance of problem , with optimal solution . Let denote the cost of a solution to an instance of problem . This is also the metric used to determine which solution is considered optimal.
An approximation-preserving reduction is a pair of functions (which often must be computable in polynomial time), such that:
maps an instance of to an instance of .
maps a solution of to a solution of .
preserves some guarantee of the solution's performance, or approximation ratio, defined as .
Types
There are many different types of approximation-preserving reductions, all of which have a different guarantee (the third point in the definition above). However, unlike with other reductions, approximation-preserving reductions often overlap in what properties they demonstrate on optimization problems (e.g. complexity class membership or completeness, or inapproximability). The different types of reductions are used instead as varying reduction techniques, in that the applicable reduction which is most easily adapted to the problem is used.
Not all types of approximation-preserving reductions can be used to show membership in all approximability complexity classes, the most notable of which are PTAS and APX. A reduction below preserves membership in a complexity class C if, given a problem A that reduces to problem B via the reduction scheme, and B is in C, then A is in C as well. Some reductions shown below only preserve membership in APX or PTAS, but not the other. Because of this, careful choice must be made when selecting an approximation-preserving reductions, especially for the purpose of proving completeness of a problem |
https://en.wikipedia.org/wiki/Gad%20Landau | Gad Menahem Landau (born 1954) is an Israeli computer scientist noted for his contributions to combinatorial pattern matching and string algorithms and is the founding department chair of the Computer Science Department at the University of Haifa.
He has coauthored over 100 peer-reviewed scientific papers.
Academic background
Landau received his Ph.D. in Computer Science from Tel Aviv University in 1987. From 1988 to the present he has held positions as Assistant, Associate, and Research Professor at Polytechnic University in New York (now called NYU Polytechnic School of Engineering, New York University). In 1995, Landau joined the faculty of the University of Haifa, where he founded the Department of Computer Science and was the first department head. In 2006, Landau was promoted to his current position of full Professor at the University of Haifa.
Research
Landau's research interests focus on string algorithms, data structures, computational biology, and parallel computation. He has made several profound contributions to these areas, even in the early days of his scientific career. His Ph.D. thesis, supervised by Prof. Uzi Vishkin, includes the fundamental text-book solution for the k-differences problem, solving one of the major open problems in the area at the time. His solution was the first to combine suffix trees and lowest common ancestor queries, and has since inspired many extensions of this technique to other problems.
The footprints of Landau's research can be found in almost every subarea of string algorithms, including his foundational work on dynamic programming algorithms for the edit distance problem, his numerous papers on modeling digitized images and 2D matching, incremental sequence alignment, and recently, his work on jumbled pattern matching and compressed text algorithms. He was instrumental in the application of pattern matching techniques to the area of computational biology, working on problems in several diverse areas such as DNA and RNA comparison, clustering, haplotype inference, protein secondary structure prediction, and tandem repeats.
Landau's research has been continually funded by the U.S. National Science Foundation, the Israel Science Foundation, and the U.S.-Israel Binational Science Foundation. He received the IBM Faculty award, and was awarded funding from the DFG and Yahoo!. Landau co-chaired the International Symposium on Combinatorial Pattern Matching in both 2001 and 2008. He serves on the editorial board of Journal of Discrete Algorithms, and served as a guest editor for TCS and Discrete Applied Mathematics. He has served on numerous program committees for international conferences, most recently, International Conference on Language and Automata Theory and Applications (LATA), International Symposium on String Processing and Information Retrieval (SPIRE), International Symposium on
Algorithms and Computation (ISAAC), Annual Symposium on Combinatorial Pattern Matching (CPM), Workshop on Algo |
https://en.wikipedia.org/wiki/Una%20mentira | Una mentira is a Mexican telenovela produced by Televisa for Telesistema Mexicano in 1967.
Cast
Silvia Derbez
Data to highlight
Of is soap opera does not have much information.
It was filmed in black and white, with a total of 20 chapters.
References
External links
1967 telenovelas
Televisa telenovelas
Spanish-language telenovelas
1967 Mexican television series debuts
1967 Mexican television series endings |
https://en.wikipedia.org/wiki/Digital%20Nations | The Digital Nations or DN (previously the Digital 5, Digital 7 and Digital 9) is a collaborative network of the world's leading digital governments with a common goal of harnessing digital technology to improve citizens' lives. Members share world-class digital practices, collaborate to solve common problems, identify improvements to digital services, and support and champion the group's growing digital economies. Through international cooperation, the Digital Nations aims to identify how digital government can provide the most benefit to citizens. The group embodies minilateral engagement, where small groups of states cooperate on specific topics with a global impact.
Members
Estonia, Israel, New Zealand, the Republic of Korea, and the United Kingdom are the founding members of the D5. In February 2018, Canada and Uruguay joined the group to form the D7. In November 2018, Mexico and Portugal joined to form the D9. Denmark joined as the tenth member of Digital Nations in November 2019.
The following government departments lead their country's engagement with the DN:
Treasury Board of Canada Secretariat
Agency for Digitisation, Danish Ministry of Finance
Ministry of Economic Affairs and Communications of the Republic of Estonia
National Digital Affairs Directorate in the Israeli Ministry of Economy in the Government of Israel
National Digital Strategy Coordination, President's Office of the Government of Mexico
Department of Internal Affairs of the Government of New Zealand
Ministry for Modernisation of the State and Public Administration of the Government of Portugal
Ministry of the Interior and Safety of the Government of the Republic of Korea
Department for Digital, Culture, Media and Sport of the Government of the United Kingdom
Agency for e-Government and Information Society at the President's Office of the Government of Uruguay
Charter
In 2014, the founding members signed a charter committing to share and improve upon the participant nations' practices in digital services and digital economies. Updated to reflect a growing membership, the DN Charter outlines a mutual commitment to digital development and leadership through nine core principles:
User needs – the design of public services for the citizen
Open standards – a commitment to credible royalty-free open standards to promote interoperability
Open source – future government systems, tradecraft, standards and manuals are created as open source and are shareable between members
Open markets – in government procurement, create true competition for companies regardless of size. Encourage and support a start-up culture and promote growth through open markets
Open government (transparency) – be a member of the Open Government Partnership and use open licenses to produce and consume open data
Connectivity – enable an online population through comprehensive and high-quality digital infrastructure
Digital skills and confidence – support children, young people and adults in |
https://en.wikipedia.org/wiki/Seabird%20Exploration | SeaBird Exploration () is a global provider of marine 2D and 3D seismic data and associated products and services to the oil and gas industry. The Company is listed on the Oslo Stock Exchange with headquarters in Cyprus. They also have regional offices in Houston, Texas and Oslo. The company operate a fleet of six seismic vessels, specialising in long offset 2D and shallow water 3D seismic data acquisition.
During autumn 2014 it became known that Seabird Exploration operated controversial seismic surveys off the coast of Western Sahara. Moroccan oil exploration has previously been considered illegal under international law according to the UN Office of Legal Affairs. The company later apologized for its operations in Western Sahara.
References
Oilfield services companies
Companies listed on the Oslo Stock Exchange
Technology companies of Cyprus |
https://en.wikipedia.org/wiki/Billboard%20Year-End%20Hot%20100%20singles%20of%202014 | The Billboard Hot 100 is a chart that ranks the best-performing singles of the United States. Its data, published by Billboard magazine and compiled by Nielsen SoundScan, is based collectively on each single's weekly physical and digital sales, as well as airplay and streaming. Throughout a year, Billboard will publish an annual list of the 100 most successful songs throughout that year on the Hot 100 chart based on the information. For 2014, the list was published on December 9, calculated with data from December 7, 2013 to November 29, 2014.
Katy Perry was the top Hot 100 artist of 2014, with "Dark Horse", ranked as the number-two song of the year and featuring Juicy J, the highest of her three placements on the list.
This was the first time in eight years that a male artist topped the chart with a non-collaboration.
List
See also
2014 in American music
List of Billboard Hot 100 number-one singles of 2014
List of Billboard Hot 100 top-ten singles in 2014
References
2014 record charts
Lists of Billboard Year-End Hot 100 singles |
https://en.wikipedia.org/wiki/Arria%20NLG | Arria NLG plc is a New Zealand-based company with headquarters in the US. Arria offers Artificial Intelligence technology in data analytics and information delivery. It is one of the pioneering companies in the space of automatic text generation, with a focus on Natural Language Generation (NLG). When it floated on London's Alternative Investment Market (AIM) in December 2013, it was valued at over £160 million. However, Arria was later delisted from the stock exchange. Subsequently, Arria has raised over US$100 million from private sources. Arria's technology is based on three decades of scientific research in the field of Natural Language Generation (NLG).
History
The company was founded in 2009 under the name Data2Text Limited by Professor Ehud Reiter, Senior Lecturer Dr Yaji Sripada, and post-doctoral researcher Dr Ross Turner from the NLG research group at the University of Aberdeen, and meteorologist/entrepreneur Ian Davy.
In May 2012, Data2Text joined forces with a specialist software development and marketing firm, Arria NLG (then a limited company), which took a 20% stake in Data2Text. In late 2013, Arria NLG acquired the remaining 80% of Data2Text, and in December 2013 Arria NLG converted to a public listed company and was floated on the AIM.
In September 2018, Arria shareholders approved a scheme of arrangement that placed a New Zealand holding company (Arria NLG Limited) over the original Arria UK company and its direct subsidiary, now known as Arria Data2Text Limited. In late 2018 Arria located its global headquarters in Morristown, New Jersey, and now maintains offices in New Zealand, Scotland, Australia, and British Columbia, Canada.
Technology/Science
Arria's technology analyzes large datasets to derive patterns, facts and insights, before structuring this information in the best possible manner to build a narrative expressed in written text or voice that is valuable, fluent and informative says Neil Burnett, CTO to Arria NLG. To reach this goal, the Arria NLG Engine, a cloud-based enterprise software platform, automatically recognises patterns in large volumes of complex data, which are then distilled into a narrative description of the most significant information. The NLG Engine consists of two components:
The analysis and interpretation component takes raw transactional or sensor data and turns it into information using rules based on the knowledge of a domain expert.
The NLG component communicates this information in natural language, based on general linguistic rules augmented with industry-specific terminology and usage.
Arria NLG's capabilities are rooted in the scientific research conducted since the 1980s by its founder and Chief Scientist, Professor Ehud Reiter, and former Chief Technology Officer Dr Robert Dale.
Arria has been awarded over 40 US patents in the NLG field.
Among Arria's founders are Professor Ehud Reiter and Dr Yaji Sripada, both currently teaching and researching in the Department of Computi |
https://en.wikipedia.org/wiki/Confederation%20of%20European%20Data%20Protection%20Organisations | The Confederation of European Data Protection Organisations (CEDPO) is a European umbrella organisation of data protection organisations.
Data protection umbrella organisation
CEDPO was founded in September 2011 by national data protection organisations as their European umbrella organisation, so far (2014) without any explicit legal form.
CEDPO pursues to promote the role of the Data Protection Officer and to provide advice on balanced, practicable, and effective data protection.
In addition, CEDPO aims to contribute to a better harmonisation of data protection law and practices in the European Union (EU) / European Economic Area (EEA).
Founder members
The four founder members of CEDPO are the Association française des correspondants à la protection des données à caractère personnel (AFCDP, France), the Asociación Profesional Española de Privacidad (APEP, Spain), the Gesellschaft für Datenschutz und Datensicherheit e.V. (GDD, Germany) and the Nederlands Genootschap van Functionarissen voor de Gegevensbescherming (NGFG, Netherlands).
Members
Present legal entities of CEDPO include:
Association of Data Protection Officers (ADPO), Ireland, http://www.dpo.ie/
Association Française des Correspondants à la Protection des Données à Caractère Personnel (AFCDP), France, http://www.afcdp.net/
Asociación Profesional Española de Privacidad (APEP), Spanien, http://www.apep.es/
, Austria, http://www.argedaten.at/
Association Data Protection Officer (ASSO DPO), Italy, https://www.assodpo.it/
, Germany, https://www.gdd.de/
Nederlands Genootschap van Functionarissen voor de Gegevensbescherming (NGFG), Netherlands, http://www.ngfg.nl/
Stowarzyszenie Administratorów Bezpieczeństwa Informacji (SABI), Poland, http://www.sabi.org.pl/
Associação de Encarregados de Proteção de Dados (AEPD), Portugal, https://www.aepd.pt/
Asociația Specialiștilor în Confidențialitate și Protecția Datelor (ASCPD), Romania, https://ascpd.ro/
References
External links
Data protection
2011 establishments in Europe
Organizations established in 2011 |
https://en.wikipedia.org/wiki/Zoomdata | Zoomdata is a business intelligence software company that specializes in real-time data visualization of big data, streaming data, and multisource analysis. The company's products are deployable on-prem, in the cloud, and embedded in other applications. SAP Data Visualization by Zoomdata is a SaaS version of Zoomdata for SAP customers. On June 10, 2019, Zoomdata was acquired by Logi Analytics for an undisclosed sum.
Product and Differentiators
Zoomdata sells a data visualization and analytics platform designed for people to explore and analyze vast quantities of data and near-real-time data.
The product is different from other offerings in the business intelligence industry in several ways. One distinction is due to a patent the company holds around "Data Sharpening" to visualize big data. The user's dashboard "sharpens" and becomes clearer as more data is processed, . Matt Asay of readwrite.com compared it to watching a streaming movie, where you see some results immediately, soon followed by the whole. The Zoomdata web software also includes a Data DVR with a "Live mode" feature so dashboard visualizations can be updated in near-real-time, paused, rewinded, and fast-forwarded at different speeds.
Zoomdata claims that their product is intended for business users to explore "modern" data on their own. They claim that unlike traditional business intelligence products that are designed to work with relational databases and are SQL-centric, Zoomdata "Smart Data Connectors" connect to a wide variety of modern data sources and can retrieve data using SQL, native APIs, or a combination of both SQL and native APIs. This allows users to work with data in such disparate systems as search-engine databases like Elasticsearch, big data Hadoop databases like Apache Impala, cloud data warehouses like Snowflake, and more. The company offers several methods of working with multiple databases at the same time, including a data blending feature they call Data Fusion.
Another distinction is that Zoomdata pushes down ad-hoc queries, filters, groupings (aggregations), and even calculations to existing high-performing databases. This is in contrast to solutions that take custody of data in a proprietary system, such as Power BI import and Tableau extract, and is also more open and flexible than Arcadia Data's bet on Hadoop with a tightly-coupled, converged BI platform. The company claims that its advanced support for pushdown processing takes advantage of investments in modern, high-performing data platforms, and since data does not need to be moved, extracted, or imported, Zoomdata claims it is more accessible for organizations with regulated, PII (personally identifiable information), proprietary, and other sensitive data that must be tightly monitored for security purposes in a single system.
Patents and Technology
Zoomdata has been granted a number of patents since 2014. Patent US8631325, Real-time data visualization of streaming data, has been cited in pat |
https://en.wikipedia.org/wiki/Lo%20Nuestro%20Award%20for%20Rock%20New%20Artist%20of%20the%20Year | The Lo Nuestro Award for New Rock Artist of the Year is an honor presented annually by American network Univision. The Lo Nuestro Awards have been held since 1989 to recognize the most talented performers of Latin music. The nominees and winners were originally selected by a voting poll conducted among program directors of Spanish-language radio stations in the United States and also based on chart performance on Billboard Latin music charts, with the results tabulated and certified by the accounting firm Arthur Andersen. Starting from 2004, the winners are selected by the audience through an online survey. The trophy is shaped in the form of a treble clef.
The award was first presented in every field awarded on the Lo Nuestro Awards: Pop, Tropical, Regional Mexican and, for one time only, Rock/Alternative; In 2004, the nominees included Puerto-Rican ensemble Circo, Mexican group Inspector, Spanish R&B trio Las Niñas, Argentinian band La Zurda, and Mexican solo singers Jorge Correa, Natalia Lafourcade, and Alessandra Rosaldo; with Rosaldo receiving the award.
Winners and nominees
Listed below are the winners of the award for each year, as well as the other nominees.
See also
Grammy Award for Best New Artist
Latin Grammy Award for Best New Artist
References
Music awards for breakthrough artist
Rock music awards
Latin rock albums
Rock New Artist of the Year
Awards established in 2004
Awards disestablished in 2004 |
https://en.wikipedia.org/wiki/Oh%2C%20No%21%20Not%20THEM%21 | Oh, No! Not THEM! was an untelevised 1990 television pilot for an American television series remake of the British television show The Young Ones, commissioned by the Fox network.
It starred Nigel Planer as Neil (reprising his Young Ones role) and Jackie Earle Haley, It was directed and produced by David Mirkin and featured an animated opening credit sequence set to "Tomorrow Never Knows" by The Beatles. Fox did not pick up the series.
Robert Llewellyn wrote in his book The Man in the Rubber Mask (1994):
Aside from the title sequence, no footage, images, or audio from the pilot have resurfaced in any form, and the majority of its elements remain a mystery.
References
External links
Television pilots not picked up as a series
Unaired television pilots
1990 American television episodes
1990 in American television
American television series based on British television series
The Young Ones (TV series) |
https://en.wikipedia.org/wiki/Joel%20Sherman%20%28sportswriter%29 | Joel Sherman is a sportswriter for the New York Post. He is also a baseball insider with MLB Network and co-hosts with Jon Heyman the baseball podcast The Show.
He was born and raised in Canarsie in Brooklyn, New York.
He graduated from NYU in 1985.
Sherman worked for both the in-house Washington Square News and the UPI while at NYU.
Sherman joined the New York Post in 1989, and served as a beat writer writing about the New York Yankees from 1989 to 1995. In 2013, Sherman joined MLB Network as an insider. Sherman has been a voter for the National Baseball Hall of Fame since 1998.
References
External links
MLB Network bio
NY Post archive
Living people
New York Post people
MLB Network personalities
People from Canarsie, Brooklyn
Sportswriters from New York (state)
Journalists from New York City
20th-century American journalists
American male journalists
21st-century American journalists
20th-century American male writers
21st-century American male writers
American male non-fiction writers
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/To%20Be%20or%20Not%20to%20Be%20%28TV%20series%29 | To Be or Not to Be (), formerly titled Hakka Women (, and released overseas under that name) is a 2014 television series produced by Hong Kong Television Network. The first episode premiered on December 12, 2014.
Cast
Maggie Cheung Ho-yee as Anson, Leung Mei-hang
Hill's ex-girlfriend, Cheung Tai-loi's girlfriend
Prudence Liew as Leung Mei-tin
Cheung Kwok-cheung's wife, Tam Jeun-fai's girlfriend
Poon Chan-leung as Hill, Au-yeung Shan
Anson's ex-boyfriend, Isabella's boyfriend
Zac Kao as Cheung Tai-loi
Savio Tsang as Cheung Kwok-cheung
Queena Chan as Isabella, Zhang Dan-feng
Lam Lei as Tam Jeun-fai
May Tse as Ma Yau-kam
Oscar Chan as Jacky Pang
Janice Ting as Lana Hui
Emily Wong as Lennon Ching
Mimi Kung as Siu Suk-wai
Wilson Tsui as Leung Chun-kong
Fung So-bor as Cheung Kwok-cheung's mother
Cheng Shu-fung as Cheung Kwok-cheung's father
Ng Wai-shan as Siu Lai
Amy Tsang as Susan Chan
Nadia Lun as Pancy
Carlos Koo as Roy
Jan Tse as Cindy
Danel Yu as Fiona
Simon Lo as Kin
Leung Kin-ping as Ken
Vivi Lee as Lam Siu-bing
Dexter Young as Anson's lawyer, episode 22 to 25
Candy Chu as kitchen staff, episode 25
External links
Official website
Hong Kong Television Network original programming
2014 Hong Kong television series debuts
2010s Hong Kong television series
Hakka culture in Hong Kong |
https://en.wikipedia.org/wiki/ARX%20%28company%29 | ARX (Algorithmic Research Ltd.) is a digital security company headquartered in San Francisco, CA, with offices in the UK, the Netherlands, Australia and Israel. It is the creator of CoSign by ARX, a digital signature technology, along with related digital signature security technology products. ARX was acquired by DocuSign in May 2015. The acquisition builds on a three-year business partnership between DocuSign and ARX, bringing together ARX's CoSign digital signature technology with DocuSign's Digital Transaction Management (DTM) platform and broadens The DocuSign Global Trust Network.
The ARX digital signature products are based on public key infrastructure (PKI) technology, with the digital signatures resulting from a cryptographic operation that creates a ‘fingerprint’ unique to both the signer and the content, so that they cannot be copied, forged or tampered with. This process provides proof of signer identity, data integrity and the non-repudiation of signed documents, all of which can be verified without the need for proprietary verification software.
The company's CoSign solution integrates into a large range of document management and workflow automation systems and is intended to streamline workflow processes requiring signatures. ARX partners with document management and workflow solution providers including SharePoint, OpenText, Oracle, Alfresco, Nintex and K2.
Industries of focus include life science (particularly research and clinical trials), engineering, legal and federal/local governments. ARX clients are based in North America, Africa, Europe and Asia-Pacific. In Italy, CoSign is used by the Ministry of Defence, RAI, Senate, Court of Accounts, State Police and Bank of Italy. It is also used by the European Court of Human Rights to digitize and streamline their application process.
ARX solutions have been validated for security standards such as NIST FIPS 140-2 level 3, FIPS 186 and ETSI TS 101 733. In 2013, CoSign was named “the strongest digital signature solution” in the 2013 report. In August 2014, CoSign received Common Criteria EAL4+ certification, thus becoming the first remote / server-side digital signature solution to be fully compliant with the EU's newly enacted Electronic Identification and Trust Services regulation for Electronic Transactions in the Internal Market (eIDAS). ARX solutions also comply with ESIGN, UETA, FDA 21 CFR Part 11, SOX, HIPAA, USDA, among many other signature-related country- and industry-specific laws and regulations.
History
ARX was founded in 1987 by Prof. Amos Fiat and Yossi Tulpan and focused on developing encryption-based products, which included an RSA-smartcard developed for Canal+ in 1989, a secure-PIN entry keyboard connected smartcard reader, cryptographic toolkits, a network-attached cryptographic server (HSM), and a VPN. In September 1997 ARX was acquired by Cylink Corp (NASDAQ:CYLK) from Sunnyvale, California.
In 2001 the company went through a management buy-out (MBO) init |
https://en.wikipedia.org/wiki/Rigid%20motion%20segmentation | In computer vision, rigid motion segmentation is the process of separating regions, features, or trajectories from a video sequence into coherent subsets of space and time. These subsets correspond to independent rigidly moving objects in the scene. The goal of this segmentation is to differentiate and extract the meaningful rigid motion from the background and analyze it. Image segmentation techniques labels the pixels to be a part of pixels with certain characteristics at a particular time. Here, the pixels are segmented depending on its relative movement over a period of time i.e. the time of the video sequence.
There are a number of methods that have been proposed to do so. There is no consistent way to classify motion segmentation due to its large variation in literature. Depending on the segmentation criterion used in the algorithm it can be broadly classified into the following categories: image difference, statistical methods, wavelets, layering, optical flow and factorization. Moreover, depending on the number of views required the algorithms can be two or multi view-based. Rigid motion segmentation has found an increase in its application over the recent past with rise in surveillance and video editing. These algorithms are discussed further.
Introduction to rigid motion
In general, motion can be considered to be a transformation of an object in space and time. If this transformation preserves size and shape of the object it is known as a Rigid Transformation. Rigid transform can be rotational, translational or reflective. We define rigid transformation mathematically as:
where F is a rigid transform if and only if it preserves isometry and space orientation.
In the sense of motion, rigid transform is the movement of a rigid object in space. As shown in Figure 1: this 3-D motion is the transformation from original co-ordinates (X,Y,Z) to transformed co-ordinates (X',Y',Z') which is a result of rotation and translation captured by rotational matrix R and translational vector T respectively. Hence the transform will be:
where,
has 9 unknowns which correspond to the rotational angle with each axis and has 3 unknowns () which account for translation in X,Y and Z directions respectively.
This motion (3-D) in time when captured by a camera (2-D) corresponds to change of pixels in the subsequent frames of the video sequence. This transformation is also known as 2-D rigid body motion or the 2-D Euclidean transformation. It can be written as:
where,
X→ original pixel co-ordinate.
X'→ transformed pixel co-ordinate.
R→ orthonormal rotation matrix with R ⋅ RT = I and |R| = 1.
t→ translational vector but in the 2D image space.
To visualize this consider an example of a video sequence of a traffic surveillance camera. It will have moving cars and this movement does not change their shape and size.
Moreover, the movement is a combination of rotation and transformation of the car in 3D which is reflected in its subsequent video frames. |
https://en.wikipedia.org/wiki/European%20Urban%20Knowledge%20Network | The EUKN is an independent network of national governments that deals with sustainable urban development through policy development, research and practice.
The EUKN secretariat is based in The Hague and EUKN member countries are Belgium, Czechia, France, Germany, the Netherlands, Poland, Slovenia and Spain. The EUKN provides strategic knowledge and expertise to these national ministries as they develop their National Urban Policies, including via the facilitation of tailored knowledge sharing events. The EUKN also provides support to countries holding the rotating Presidency of the Council of the European Union and has contributed to various milestones in European urban policy including the Leipzig Charter, New Leipzig Charter and Ljubljana agreement.
The EUKN also works to promote sustainable urban development with a broad range of other stakeholders including policymakers at all levels of government, academic experts and practitioners. It collaborates with partners on agenda-setting research in urban development. The EUKN fosters collaboration between its network and all stakeholders to create just, green, productive and digitalised cities.
The EUKN holds legal status as a European Grouping for Territorial Cooperation (EGTC) allowing it engage directly in cross-border cooperation and activities.
References
www.eukn.eu
External links
eukn.eu official webpage
International organizations based in Europe
Organizations established in 2004
Organisations based in The Hague |
https://en.wikipedia.org/wiki/The%20New%20Fly%20Fisher | The New Fly Fisher is a popular fly fishing show in North America on the World Fishing Network and Public Television PBS. Created in March 2001, the show is hosted primarily by Colin McKeown and Bill Spicer and teaches fly fishing, marine biology, and fishing destinations.
History
The idea for The New Fly Fisher was first conceived by Colin McKeown in 1999. During the 1990s when Colin was attempting to learn how to fly fish, he was frustrated with the poor quality of information provided by popular television fishing shows. Most series were focused on promoting products and show hosts. He felt many were nothing but glorified “infomercials”. At the time, Colin was an officer in the Royal Canadian Navy and was getting ready to retire. Creating a quality fly fishing show that taught people about fly fishing, biology, destinations and much more seemed like a great concept. Of importance, Colin wanted to create a series that was of top quality in every aspect of production. To achieve this Colin attended several college courses that taught him about television production and producing. In May 2000, Colin pitched the concept of his fly fishing series to the VP of Programming at the Outdoor Life Network in Canada. It was accepted in late June and principal photography of the first 13 episodes commenced in July. First broadcast was slated for March 2001. Throughout the past fifteen years the concept has remained essentially the same. To provide viewers with a television series that teaches by bringing on every episode subject matter experts that taught the hosts methods of fly fishing for differing species in locations throughout North America. Whether the SME’s are guides, authors or fly fishing celebrities – all help the series hosts learn. Hence the series name, The New Fly Fisher. The New Fly Fisher Inc. is owned by JenCor Entertainment Inc. the principle production company created by Colin McKeown.
Early years
Right from the start of broadcast on OLN Canada, the series was a hit with anglers. Both conventional tackle and fly fishing enthusiasts loved the series because of the blend of detailed information, nature and biology combined with fishing. Though the series was a hit with anglers, the first three years of production were very tough. Learning the craft of television production in often challenging environments was stressful. In addition, securing funding for the series was a constant concern because the series was relatively unknown outside of Canada. However, two events in 2003 had a dramatic and positive impact on the eventual success of the series. The first was the addition of a new and large series commissioned by OLN Canada. This series was called Truth Duty Valour and the theme was the training the Canadian Army, Navy and Air Force conducted in support of peacekeeping and peacemaking operation around the world. The series was composed of 13 one-hour episodes featuring the best of training in the military Truth Duty Valour and it w |
https://en.wikipedia.org/wiki/SubOS | In computing, a SubOS may mean several related concepts:
A process-specific protection mechanism allowing potentially dangerous applications to run in a restricted environment. It worked by setting a sub-user id which was user id of the owner of the file rather than the person running the file.
A substitute-operating system, which simulated a full operating system. These were mainly developed by the GameMaker community.
An interface (graphical or terminal based) that provides additional functions or command for a specific audience target.
It can also make processes easier and add details to the main operating system.
See also
Virtual machine
Sandbox (computer security)
Computing terminology
Operating system security
Virtualization software |
https://en.wikipedia.org/wiki/Kevin%20Wilson%20%28game%20designer%29 | Kevin Wilson is a game designer who has worked primarily on board games and role-playing games.
Early life and education
Wilson received a B.A. in Cognitive Science (Artificial Intelligence) from U.C. Berkeley in 1997, and was active in the interactive fiction community at the time. He wrote several works of interactive fiction — including Once and Future and The Lesson of the Tortoise — and founded the annual Interactive Fiction Competition and the Internet magazine SPAG.
Career
Kevin Wilson has been a game designer since the late 1990s. Wilson co-designed Alderac Entertainment Group's second role-playing game, 7th Sea (1998), with Jennifer Wick and John Wick. Wilson wrote the adventure Wonders Out of Time (2001), the sequel to Akrasia: Thief of Time (2001) from Eden Studios's "Eden Odyssey" series of adventures. Wilson is the co-designer of the Spycraft roleplaying game. As Fantasy Flight Games's d20 System success grew, they hired Wilson to oversee a retooling of the Legends & Lairs line, and he split it into a number of smaller sublines filled with smaller sourcebooks. The wargame, A Game of Thrones (2003) by Christian T. Petersen and Wilson, was one of several games published by Fantasy Flight in the American style while the company had been republishing eurogames. Wilson is the author of the RPG book Spellslinger. Petersen and Wilson created a gaming system for Doom: The Boardgame (2004), which was later revised and used in Descent: Journeys in the Dark (2006). Wilson also designed World of Warcraft: The Board Game (2005), as well as Arkham Horror second edition (with Richard Launius). He also designed Sid Meier's Civilization: The Board Game (2010).
Wilson lives near the Twin Cities.
References
External links
Home page
Kevin Wilson :: Pen & Paper RPG Database archive
Board game designers
Living people
Role-playing game designers
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Jack%20Emmert | Jack Emmert is an American game designer who has worked primarily on role-playing games and computer games.
Career
Jack Emmert had been playing Champions since it came out in 1981. Emmert spent his teenage years reading comic books and playing AD&D. During his student years, Emmert wrote several pen and paper RPG supplements to make ends meet. After a lengthy stint in academia, Emmert co-founded Cryptic Studios. He designed the MMORPGs City of Heroes and City of Villains. Emmert was the chief creative officer and directed the design of all games from Cryptic Studios, and was involved in the development of Marvel Universe Online. Emmert and the rest of Cryptic later decided that Champions would be a great replacement for the Marvel Comics IP they had lost, thus Cryptic purchased the Champions game and the Champions universe from Hero Games in 2008. Emmert was the online producer for Star Trek Online.
In March 2010, Bill Roper was promoted to chief creative officer, succeeding Emmert (who became the chief operations officer). In March 2011, Emmert was promoted to chief executive officer when John Needham left to pursue other opportunities in the gaming industry.
On June 8, 2016, Jack Emmert was made CEO of Daybreak Game Company Austin's Texas-based studio, as the head of the Daybreak Games studio responsible for the Action Combat MMORPG DC Universe Online (DCUO), Emmert will oversee all development in Austin and will report into Daybreak headquarters in San Diego.
In May 2022, Emmert was put in charge of NetEase's new US-based studio, Jackalope Games.
References
External links
Jack Emmert :: Pen & Paper RPG Database archive
Living people
Place of birth missing (living people)
Role-playing game designers
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Naruto%20Shippuden%3A%20Ultimate%20Ninja%20Storm%204 | Naruto Shippuden: Ultimate Ninja Storm 4, known in Japan as , is a fighting game developed by CyberConnect2 and published by Bandai Namco Entertainment for PlayStation 4, Xbox One, and Windows (through Steam) in February 2016. It is the sixth installment and the final main installment in the Naruto: Ultimate Ninja Storm series inspired by Masashi Kishimoto's manga Naruto, and the sequel to the 2013 game Naruto Shippuden: Ultimate Ninja Storm 3 Full Burst.
The narrative follows the young ninjas Naruto Uzumaki and Sasuke Uchiha as they participate in a world war between shinobithe Fourth Shinobi World Waragainst the terrorist organization Akatsuki and unite to defeat it. Similar to Storm 3, the game uses regular fighting systems; however, players can switch among a team of three fighters who can assist each other. Other returning elements involve boss fights, where quick time events are required to reach hidden scenes and hack and slash areas. The expansion version is entitled Naruto Shippuden: Ultimate Ninja Storm 4 - Road to Boruto; this version, under development, was compiled with three other series titles as Naruto Shippuden: Ultimate Ninja Storm Legacy and released on in August 2017. It adds new characters from the 2015 film, Boruto: Naruto the Movie, and adult versions of the younger fighters.
The game was developed for PlayStation 4 and Xbox One over a two-year period. CyberConnect2 took advantage of the hardware's potential to incorporate more fighting mechanics and add new fighters. The game received generally-positive reviews, according to Metacritic; its narrative and graphics were praised, but critics were also divided about the length of the story and the depth of the controls. A Nintendo Switch port of Naruto Shippuden: Ultimate Ninja Storm 4 - Road to Boruto was released in April 2020. Including Road to Boruto, the game had sold 11.88 million copies by December 2022, making it one of the best-selling fighting games of all time.
Gameplay
Ultimate Ninja Storm 4 gameplay is similar to that of previous games in the series, in which players battle each other in 3D arenas. A returning feature, omitted since the original Ultimate Ninja Storm, is the ability to wall-run; players can battle on the sides (walls) of each arena. A major change to the feature is the ability to have one character on the wall and the other on the field; the second player was originally also moved to the wall to keep the battle flowing and the system in check. The game has the largest number of fighters in series history. Its roster includes 106 fighters from the Naruto universe, including duplicates of the same characters, such as Naruto (Part 1) and Naruto (Six Paths Sage Mode). The game also includes characters from the films The Last: Naruto the Movie (2014) and Boruto: Naruto the Movie (2015). There is total of over a hundred characters in the game.
The option to select one of three fighting types was removed; it was introduced in Naruto Shippuden: Ulti |
https://en.wikipedia.org/wiki/Security%20type%20system | In computer science, a type system can be described as a syntactic framework which contains a set of rules that are used to assign a type property (int, boolean, char etc.) to various components of a computer program, such as variables or functions. A security type system works in a similar way, only with a main focus on the security of the computer program, through information flow control. Thus, the various components of the program are assigned security types, or labels. The aim of a such system is to ultimately be able to verify that a given program conforms to the type system rules and satisfies non-interference. Security type systems is one of many security techniques used in the field of language-based security, and is tightly connected to information flow and information flow policies.
In simple terms, a security type system can be used to detect if there exists any kind of violation of confidentiality or integrity in a program, i.e. the programmer wants to detect if the program is in line with the information flow policy or not.
A simple information flow policy
Suppose there are two users, A and B. In a program, the following security classes (SC) are introduced:
SC = {∅, {A}, {B}, {A,B}}, where ∅ is the empty set.
The information flow policy should define the direction that information is allowed to flow, which is dependent on whether the policy allows read or write operations. This example considers read operations (confidentiality). The following flows are allowed:
→ = {({A}, {A}), ({B}, {B}), ({A,B}, {A,B}), ({A,B}, {A}), ({A,B}, {B}), ({A}, ∅), ({B}, ∅), ({A,B}, ∅)}
This can also be described as a superset (⊇). In words: information is allowed to flow towards stricter levels of confidentiality. The combination operator (⊕) can express how security classes can perform read operations with respect to other security classes. For example:
{A} ⊕ {A,B} = {A} — the only security class that can read from both {A} and {A,B} is {A}.
{A} ⊕ {B} = ∅ — neither {A} nor {B} are allowed to read from both {A} and {B}.
This can also be described as an intersection (∩) between security classes.
An information flow policy can be illustrated as a Hasse diagram. The policy should also be a lattice, that is, it has a greatest lower-bound and least upper-bound (there always exists a combination between security classes). In the case of integrity, information will flow in the opposite direction, thus the policy will be inverted.
Information flow policy in security type systems
Once the policy is in place, the software developer can apply the security classes to the program components. Use of a security type system is usually combined with a compiler that can perform the verification of the information flow according to the type system rules. For the sake of simplicity, a very simple computer program, together with the information flow policy as described in the previous section, can be used as a demonstration. The simple program is given in th |
https://en.wikipedia.org/wiki/Janice%20Lourie | Janice Richmond "Jan" Lourie (born July 9, 1930) is an American computer scientist and graphic artist. In the late 1960s she was a pioneer in CAD/CAM (computer-aided design/computer-aided manufacture) for the textile industry. She is best known for inventing a set of software tools that facilitate the textile production stream from artist to manufacturer. For the Graphical Design Of Textiles process she was granted IBM's first software patent. Other projects, in differing disciplines, share the focus on graphic representation. She returns throughout an ongoing career to the stacked two-dimensional tabular arrays of textiles and computer graphics, and the topological structures of interrelated data.
Education
Lourie studied music theory and history at the Longy School of Music in Cambridge Massachusetts. Rosario Mazzeo was her clarinet teacher. She performed in chamber music concerts in the tapestry gallery series at the Boston Museum of Fine Arts and with amateur orchestras and chamber music groups in the Boston area. In 1954 she became a founding member of the Camerata of the Museum of Fine Arts. Her instruments were the tenor shawm and psaltery from the museum collection, and contemporary Dolmetsch recorders.
When she received her AB degree in philosophy from Tufts University she was employed as a technical editor at Parke Mathematical Laboratories in Concord, Mass. Her interest in the material she edited led to work at the MIT Whirlwind computer which she combined with basic mathematics courses. She returned to school and received a master's degree in mathematics from Boston University.
IBM
In 1957 Lourie began working at IBM. At that time IBM was recruiting musicians to train as programmers. Her first assignment was to assist Dr. John (Giampiero) Rossoni who was in charge of the IBM part of the Operation Moonwatch Project then being conducted at the Smithsonian Astrophysical Observatory.
Operations research
Lourie's next assignment was in operations research, also known as management science. Her first major project was to implement the stepping stone algorithm of Abraham Charnes to solve the machine loading problem, a generalization of the classic linear transportation problem. In 1958 a software solution to the transportation problem was a staple operations research tool. The solution determines the pattern of delivery of one type of goods from multiple sources to multiple destinations satisfying all requirements at a minimum cost.
The generalized problem, expressed as machine loading, states that all the products may be different and may be produced on different machines. The variability of sources and destinations in this model has a drastic effect on the topological structure underlying the solution. The topology of each stage of an iterative solution in the transportation problem is a tree structure. In the generalized transportation problem the topological structure of the evolving iterative solution is a set of disconnected |
https://en.wikipedia.org/wiki/DoubleDOS | DoubleDOS was a computer program that extended the IBM PC DOS operating system with limited multitasking capabilities. The program partitioned the computer's memory in two, running an instance of DOS in both, and allowed users to switch between the two.
DoubleDOS was announced in 1984 by a firm called Softlogic Solutions, and sold for USD299. In a 1987 ad, the company offered the software for USD49.99, pitting it against competitors TopView and Windows. A review in 1986's Business Software found programs running under DoubleDOS ran considerably slower, "even when nothing is running in the other partition".
See also
DESQview
PC-MOS/386
References
DOS extenders |
https://en.wikipedia.org/wiki/Shandong%20Television | Shandong Television (SDTV; ) is a television network covering the Jinan city and Shandong province area. It was founded and started to broadcast on October 1, 1960. SDTV currently broadcasts in Chinese.
External links
Official Website
Official Video Website
1960 establishments in China
Television networks in China
Government-owned companies of China
Mass media in Shandong
Organizations based in Jinan
Television channels and stations established in 1960
Mass media in Jinan |
https://en.wikipedia.org/wiki/Criticism%20of%20TV%20Globo | Criticism of TV Globo (formerly Rede Globo until 2021) refers to the extensive history of controversies involving the Brazilian television network monopoly, which has an unparalleled ability to influence Brazil's culture and shape the country's public opinion. The owners of Rede Globo had enriched themselves with government favors to become billionaires. The Globo Grupo are remanagment the branding in the internet for self-promote since 2010's decade.
The main historical controversy surrounding the television network, as well as the remainder of Grupo Globo (formerly known as Globo Organizations) media empire, is centered on the news broadcasts' support for the Brazilian military government and its censorship of pro-democracy developments. According to critics of the broadcaster, the military regime provided government concessions to Rede Globo, which had very poor coverage of the 1984 Diretas Já protests. In 2013, pressured by protests in Brazil, Rede Globo admitted in the Jornal Nacional that its support given to the 1964 Brazilian coup d'état and the subsequent regime was "a mistake".
In the late 1980s, Grupo Globo was targeted by critics due to edits made to the pre-recorded television debates between the presidential candidates in the 1989 election. The edits to the final debate favored candidate Fernando Collor de Mello, who won the election. Towards the end of the 1990s, Grupo Globo faced severe financial problems and was bailed out by the government, despite being a strictly private company. During this period, the conglomerate utilized its influence in the political arena and changed an article in the Constitution of Brazil to allow 30% of foreign capital investment in the country's media sector.
In 2002, the federal government offered R$280million in assistance to the Globocabo cable TV company, part of Grupo Globo, by financing through the Brazilian Development Bank.
Rede Globo was again criticized for its biased coverage of the 2006 and 2010 elections.
Accusations of political influence
Support of military regime
TV Globo was founded in 1965 as Rede Globo, one year after the 1964 Brazilian coup d'état, and it became the largest television network in Brazil during the 1970s. During this period, Brazil's military government implemented a policy to modernize Brazil's telecommunications infrastructure. In 1965, the government created Embratel at the same time that Brazil was joining Intelsat. In 1968, the Ministry of Communications was created, the first FM radio stations appeared, and the AERP (Assessoria Especial de Relações Públicas) was created, reinforcing the need to propagate patriotic ideas and nationalism. Brazil integrated with the global system of satellite communications in 1969. The military government intended to oppose the left, which was culturally dominant at the time. One of the government's weapons would have been television, with the regime turning a blind eye to the partnership between the former Chairman of G |
https://en.wikipedia.org/wiki/REFInd | rEFInd is a boot manager for UEFI and EFI-based machines. It can be used to boot multiple operating systems that are installed on a single non-volatile device. It also provides a way to launch UEFI applications.
It was forked from discontinued rEFIt in 2012, with 0.2.0 as its first release.
rEFind supports x86, x86-64, and AArch64 architecture.
Features
rEFInd has several features:
Automatic operating systems detection.
Customisable OS launch options.
Graphical or text mode. Theme is customisable.
Mac-specific features, including spoofing booting process to enable secondary video chipsets on some Mac.
Linux-specific features, including autodetecting EFI stub loader to boot Linux kernel directly and using fstab in lieu of rEFInd configuration file for boot order.
Support for Secure Boot.
Adoption
rEFInd is the default Unified Extensible Firmware Interface (UEFI) boot manager for TrueOS.
rEFInd is included in official repositories of major Linux distributions.
Development
GNU-EFI and TianoCore are supported as main development platforms for writing binary UEFI applications in C to launch right from the rEFInd GUI menu. Typical purposes of an EFI application are fixing boot problems and programmatically modifying settings within UEFI environment, which would otherwise be performed from within the BIOS of a personal computer (PC) without UEFI.
rEFInd can be built with either GNU-EFI or TianoCore EDK2/UDK.
Fork
RefindPlus is a fork of rEFInd that add several features and improvements for Mac devices, specifically MacPro3,1 and MacPro5,1, and equivalent Xserve.
See also
GNU GRUB - Another boot loader for Unix-like systems
Comparison of boot loaders
References
Free boot loaders
Free system software
Macintosh firmware
Software using the BSD license
Software forks |
https://en.wikipedia.org/wiki/Yoonil%20Auh | Yoon-il Auh (born March 3, 1961) is a Korean–American educator, violinist and composer.
Professional background
Yoon-il is a professor at Kyung Hee Cyber University in Seoul Korea, Department of Computer Information Communications Engineering. He is recognized as the lead designer of a project MOOC 2.0 and South Korea's Military MOOC (M-MOOC)
Yoon-il Auh served as the vice president of Kyung Hee Cyber University and prior to an academic position in Korea, he was the vice president of the National Labor College of the AFL–CIO (2005-2012). He also served as a director at Central Michigan University, where he was responsible for distance and distributed education from 2001 to 2005. Auh served as Director of Research at the Music for One Foundation (INGO) at the Research Institute for Humanities Performing Arts since 2011. From 2013 ~ 2015, Auh was a Visiting Professor at Global Education Cooperation Program, Interdisciplinary Studies, College of Education at Seoul National University and served as Vice Chair of the South Korean Ministry of Education's Special Committee of the Future of Korean Education in 2015.
Auh received a Doctor of Education (Ed.D.) in instructional technology from Teachers College, Columbia University. His doctoral dissertation, "Designing and Creating an Interdisciplinary Learning Environment Using Cognitive Flexibility Theory", received the College President's Doctoral Dissertation Award in 2000. Prior to that, Auh received his MA in Cognition, Computing and Education and an Ed.M. in Music Education and Cognition from Columbia University and an MM and B.A from the Juilliard School. He is also an American Council on Education-certified curriculum reviewer.
Music background
In addition to his academic career, Auh has been an active violinist, conductor, composer and author of music books. He received musical training from the Juilliard School under Dorothy DeLay for fourteen years. As a concert violinist, he has performed at American concert venues including Avery Fisher Hall, Alice Tully Hall in the Lincoln Center, and Carnegie Hall, where he gave his New York debut at the age of sixteen. He is also the founder of the International Web Concert Hall (IWCH) competition, which was launched in 1998 and continued until 2012. IWCH was the first of its kind in classical music to hold such events at a global level. The IWCH was reviewed in The New York Times He is actively involved in promoting community development via performing arts education at both a local and global level. At the global level, he has presented on the topics of performing arts education, community development through arts, lifelong learning, and online learning Paraguay apunta a mejorar la educación con ayuda de la tecnología. He is also an author of Harmony Nation Education System sponsored by Kyobo Life and Music for One Foundation. The Harmony Nation program and related activity has been sponsored by KOICA since 2013 and has been utilized for promo |
https://en.wikipedia.org/wiki/Digimon%20Story%3A%20Cyber%20Sleuth | is a role-playing video game developed by Media.Vision and published by Bandai Namco Entertainment that was released in Japan on March 12, 2015 for PlayStation Vita and PlayStation 4. Part of the Digimon franchise, the game is the fifth installment in the Digimon Story series, following 2011's Super Xros Wars, and the first to be released on home consoles. The game would be released in North America on February 2, 2016, becoming the first installment of the Digimon Story series to be released in North America since 2007's Digimon World Dawn and Dusk, and the first to be released under its original title.
A sequel, titled Digimon Story: Cyber Sleuth – Hacker's Memory, was released in Japan in 2017 and in Western territories in 2018. In July 2019, a port of the game and its sequel for Nintendo Switch and Windows, was announced for release on October 18, 2019, as Digimon Story Cyber Sleuth: Complete Edition, although the PC version was released a day early.
Gameplay
Digimon Story: Cyber Sleuth is a role-playing game, played from a third-person perspective where players control a human character with the ability to command Digimon, digital creatures with their own unique abilities who do battle against other Digimon. Players can choose between either Palmon, Terriermon or Hagurumon as their starting partner at the beginning of the game, with more able to be obtained as they make their way into new areas. A total of 249 unique Digimon are featured, including seven that were available as DLC throughout the life of the game, and two which were exclusive to the Western release. The title features a New Game Plus mode where players retain all of their Digimon, non-key items, money, memory, sleuth rank, scan percentages, and Digifarm progress.
The Complete Edition includes the 92 new Digimon from Hacker's Memory, for a total of 341 Digimon.
Plot
Players assume the role of Takumi Aiba (male) or Ami Aiba (female), a young Japanese student living in Tokyo while their mother is working abroad. After receiving a message from a hacker, Aiba investigates the physical-interaction cyberspace network EDEN, where they meet Nokia Shiramine and Arata Sanada. The hacker gives them "Digimon Capture" programs and locks them in EDEN. While searching for an exit, Aiba meets Yuugo, leader of the hacker team "Zaxon"; Yuugo teaches Aiba how to use their Digimon Capture and tells them that Arata is a skilled hacker himself. Aiba meets up with Nokia and Arata, who unlocks a way out, but the three are then attacked by a mysterious creature that grabs Aiba and corrupts their logout process.
Aiba emerges in the real world as a half-digitized entity and is rescued by detective Kyoko Kuremi, head of the Kuremi Detective Agency, which specializes in cyber-crimes. Aiba manifests an ability, Connect Jump, which allows them to travel into and through networks. Recognizing their utility, Kyoko helps Aiba stabilize their digital body and recruits them as her assistant. They investi |
https://en.wikipedia.org/wiki/Language-based%20security | In computer science, language-based security (LBS) is a set of techniques that may be used to strengthen the security of applications on a high level by using the properties of programming languages.
LBS is considered to enforce computer security on an application-level, making it possible to prevent vulnerabilities which traditional operating system security is unable to handle.
Software applications are typically specified and implemented in certain programming languages, and in order to protect against attacks, flaws and bugs an application's source code might be vulnerable to, there is a need for application-level security; security evaluating the applications behavior with respect to the programming language. This area is generally known as language-based security.
Motivation
The use of large software systems, such as SCADA, is taking place all around the world and computer systems constitute the core of many infrastructures. The society relies greatly on infrastructure such as water, energy, communication and transportation, which again all rely on fully functionally working computer systems. There are several well known examples of when critical systems fail due to bugs or errors in software, such as when shortage of computer memory caused LAX computers to crash and hundreds of flights to be delayed (April 30, 2014).
Traditionally, the mechanisms used to control the correct behavior of software are implemented at the operating system level. The operating system handles several possible security violations such as memory access violations, stack overflow violations, access control violations, and many others. This is a crucial part of security in computer systems, however by securing the behavior of software on a more specific level, even stronger security can be achieved. Since a lot of properties and behavior of the software is lost in compilation, it is significantly more difficult to detect vulnerabilities in machine code. By evaluating the source code, before the compilation, the theory and implementation of the programming language can also be considered, and more vulnerabilities can be uncovered.
"So why do developers keep making the same mistakes? Instead of relying on programmers' memories, we should strive to produce tools that codify what is known about common security vulnerabilities and integrate it directly into the development process."
— D. Evans and D. Larochelle, 2002
Objective of Language-based security
By using LBS, the security of software can be increased in several areas, depending on the techniques used. Common programming errors such as allowing buffer overflows and illegal information flows to occur, can be detected and disallowed in the software used by the consumer. It is also desirable to provide some proof to the consumer about the security properties of the software, making the consumer able to trust the software without having to receive the source code and self checking it for errors.
A compiler, ta |
https://en.wikipedia.org/wiki/Francis%20F.%20Lee | Francis Fan Lee (李凡, born January 28, 1927) is an inventor, entrepreneur, and professor emeritus of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology (MIT). Lee is the founder of Lexicon (company) (originally American Data Sciences). He is best known for three inventions: the Digital Cardiac Monitor (1969), the Digital Audio Signal Processor (1971), and the Digital Time Compression System (1972). In 1984, Lexicon won an Emmy Award for Engineering Excellence for the Model 1200 Audio Time Compressor and Expander, widely used in the television industry.
Education
Lee was born January 28, 1927, in Nanjing, China. In September 1948, during the Chinese Civil War, Lee left Shanghai aboard the USS General W.H. Gordon to complete his undergraduate education at the Massachusetts Institute of Technology. He studied Electrical Engineering and earned his Bachelor of Science in 1950 and Master of Science in 1951. In Fall 1952, Lee entered the PhD program at MIT. He withdrew in 1954 to pursue his career, becoming a naturalized US citizen on November 15, 1954. He returned to academia in 1964, and completed his PhD in Electrical Engineering in 1965.
Early career
In 1954, Lee took a full-time position as Research Engineer with the Servomechanism Laboratory. He was part of a team working on the first Digitally Controlled Milling Machine In 1955, Lee joined the Bizmac Computer Division of RCA. He left a year later to join the UNIVAC super-computer division of Remington Rand.
Project MAC
In 1963, Lee accepted a one-year appointment to work on Project MAC, a time-sharing Multiple Access Computer being developed at MIT under the direction of Robert Fano. Fano launched Project MAC with a 6-week summer session that drew 57 people (including Lee) from universities, industry, and government for brainstorming and collaboration. At the end of the session, Lee described his work on speeding up computer memory in "Lookaside Memory Implementation" (1963). Six years later, Lee presented "Study of Look-Aside Memory," at the IEEE (Institute of Electrical and Electronics Engineers) conference: Transactions on Computers, held in June 1969. Lee's paper was published in IEEE Transactions on Computers. Look-Aside Memory is a forerunner of cache memory.
Reading Machine Project
At the end of his Project MAC appointment, Lee resumed his graduate studies at MIT and joined Dr. Samuel Jefferson Mason's Cognitive Information Processing Group in the Research Laboratory of Electronics at MIT Lee's group worked on a reading machine for the blind, the first system that would scan text and produce continuous speech. For his Ph.D. thesis, Lee developed a method for converting printed words into phoneme-based spoken language. Lee presented and published two papers on this work.
Later professional life and inventions
In 1965, Lee joined the MIT faculty as an Associate Professor of Electrical Engineering and Computer Science. He was promoted to full profess |
https://en.wikipedia.org/wiki/NA31%20experiment | NA31 is a CERN experiment which was proposed in 1982 as a "Measurement of |η00 /η+-|2 by the CERN-Edinburgh-Mainz-Pisa-Siegen collaboration. It took data between 1986 and 1989, using a proton beam from the SPS through the K4 neutral beam-line. Its aim was to experimentally prove direct CP-violation.
CP violation
While charge symmetry and parity symmetry are both violated for any transformation under the weak interaction, the CP violation is known only to appear in particular phenomena - kaon and B-meson decays - under the weak interaction.
CP-violation was first theoretically developed for the Standard Model by Kobayashi and Maskawa in 1973 when they introduced a third generation of quark (bottom and top) and thus extended the Cabibbo matrix to the 3x3 CKM matrix, parameterizing the couplings between quark-mass eigenstates and the charge weak gauge bosons. CP violation then appears through the presence of complex parameters in this matrix.
Determined from the relative decay rates of short- and long-lived neutral kaons into two neutral and charged pions, respectively, the so-called ε'/ε ratio which expresses the relative strength of direct CP-violation was known to be small but expected to be different from zero in the Standard Model. The measurement of this small deviation from zero was the aim of NA31 in order to prove the existence of direct CP-violation in kaon decays under weak interaction.
Evolution of the experiment
NA31 found the first evidence for direct CP violation in 1988 with a ratio deviating about three standards form zero. However, shortly after, another experiment – E731 at Fermilab – reported a measurement consistent with zero. A better precision was needed by both NA31 and Fermilab to find consistent results and thus to allow a final conclusion. A new generation of detectors were thus built, both at CERN (for what became the NA48 experiment) and at Fermilab (KTeV). Finally, in 1999, the two new experiments confirmed both direct CP violation in the decay of neutral kaons (CERN Courier September 1999 p32), a discovery which was later recognized by honours, as one of the most important discoveries made at CERN. In particular the 2005 European Physics Society High Energy and Particle Physics Prize was awarded jointly to the NA31 Collaboration and its spokesman Heinrich Wahl.
The detector
The detector was compounded by wire chambers combined with calorimetry in order to determine K0 parameters (e.g. energy, decay vertex). A great precision on these parameters is required to define well the phase space for all the decay modes which are to be compared. It consists of :
an evacuated decay region.
proportional wires chambers to measure the charged pion direction.
liquid argon calorimeter with a good energy and position resolution to measure the photons from the pion decay.
a hadron calorimeter to measure the energy of the charged pions.
a plane of scintillation counters serving as muon identifiers.
See also
Li |
https://en.wikipedia.org/wiki/%C3%8Ele-de-France%20tramway%20Line%206 | Île-de-France tramway Line 6 (usually called simply T6) is part of the modern tram network of the Île-de-France region of France. Line T6 connects Châtillon – Montrouge Paris Métro station and Viroflay-Rive-Droite station, south-west of Paris. Line T6 is one of the Île-de-France's two rubber-tyred tramway lines based on the Translohr system. The line has a length of and 21 stations. It opened to the public on 13 December 2014. The line was extended by (including a tunnel of ) and two stations in May 2016.
Line T6 is operated by the Régie autonome des transports parisiens (RATP) under the authority of Île-de-France Mobilités.
Route
See also
List of rubber-tyred tram systems
Notes and references
Tram lines in Île-de-France
Ile-de-France tramway Line 6
2014 establishments in France |
https://en.wikipedia.org/wiki/Margaret%20K.%20Butler | Margaret Kampschaefer Butler (March 27, 1924 – March 8, 2013) was a mathematician who participated in creating and updating computer software. During the early 1950s, Butler contributed to the development of early computers. Butler was the first female fellow at the American Nuclear Society and director of the National Energy Software Center at Argonne. Butler held leadership positions within multiple scientific organizations and women's groups. She was the creator and director of the National Energy Software Center. Here, Butler operated an exchange for the editing of computer programs in regards to nuclear power and developed early principles for computer technology.
Early life and education
Butler was born on March 27, 1924, in Evansville, Indiana. She studied statistics and differential calculus at Indiana University Bloomington and graduated in 1944.
Career
Butler began her career in 1944 working as a statistician at the Bureau of Labor Statistics. While she worked there, she also taught math at the United States Department of Agriculture Graduate School and took graduate courses related to sampling theory. About a year later, she joined the United States Army Air Forces and worked as a civilian in Germany. She returned to the United States after two years and began working in the Naval Reactors Division of Argonne National Laboratory as a junior mathematician. While working at Argonne, Butler made calculations for physicists creating a prototype for a submarine reactor and attended atomic physics and reactor design classes. In 1949, she worked at the Bureau of Labor Statistics in Minnesota but returned to Argonne National Laboratory in 1951. Following her return to Argonne, Butler became an assistant mathematician in the Reactor Engineering Division and worked on AVIDAC, an early computer. In the 1950s she wrote software, reactor applications, mathematical subroutines, and utilities for three other Argonne computers, the ORACLE, GEORGE, and UNIVAC.
Butler led Argonne's Applied Mathematics Division's Application Programming from 1959 to 1965. While working in this department, she developed teams to fix program problems in reactors, biology, chemistry, physics, management, and high energy physics applications. In 1960, she worked with others to establish the Argonne Code Center, which later became the National Energy Software Center (NESC). Butler would later become director of the NESC from 1972–1991. She became the first woman to be named fellow of the American Nuclear Society in 1972, following her nomination a year earlier. She was also a consultant to the European Nuclear Energy Agency during the time it was establishing its computer program.
In 1980, Butler was promoted to Senior Computer Scientist at Argonne. She officially retired in 1991, but continued to work at Argonne from 1993 to 2006 as a "special term appointee".
Impact
During her time in Argonne, Butler was very supportive of her female coworkers. Women working at Argonne |
https://en.wikipedia.org/wiki/Flyovers%20in%20Chennai | Chennai is home to the second largest vehicular population in India, behind New Delhi. The total road network in the city's metropolitan area is 2,780 km. With Chennai's vehicular population having experienced a surge in the late 1990s, several flyovers were built to reduce the traffic congestion in the city. Of about 15,600 million invested by the state government between 2005 and 2016, Chennai cornered a major chunk of the investment. As of 2016, there were 42 functional flyovers in the city and about 30 bridges, catering to the city's vehicular population of about 12 million, including about 600,000 cars. In addition, more than 36 flyovers are in the pipeline.
Beginnings
The city's first flyover is the Anna Flyover at the Gemini Circle built in 1973, which was the third in India, after the ones at Kemps Corner and Marine Drive in Mumbai. It was also the longest flyover in the country when it was built. No major flyovers were built in the following 20 years or so. The number of flyovers in the city began to rise in the late 1990s when a string of nine flyovers were built across the city during the tenure of the then Mayor of the city, M. K. Stalin.
Road space
As of 1 April 2013, the total vehicle population of Chennai is 3,881,850, including 3,053,233 two wheelers.
The flyover construction in the city has resulted in the addition of a mere 12.4 km of extra road capacity between 2005 and 2014. As of 2014, the total length of operational flyovers in the city was 13.5 km.
List of flyovers
Anna Flyover
MIT Flyover
Alwarpet Flyover
IIT Madras Flyover
Doveton Flyover
Perambur Flyover
Madhuravoyal grade separator
Padi grade separator
Koyambedu grade separator
Kathipara grade separator
Tambaram flyover
Peters Road flyover
Conran Smith Road flyover
Dr. Radhakrishnan Road flyover
Music Academy flyover
Panagal Park flyover
TTK Road flyover
Mahalingapuram flyover
Pantheon Road flyover
Thirumangalam flyover
Moolakkadai flyover
Madhavaram Roundtana Byepass Flyover
Vandalur flyover
Airport flyover
Pallavaram Flyover
Pallavaram Railway Station Flyover
Pallavaram New Unidirectional Flyover
Vyasarpadi flyover
Mint flyover
G N Chetty Road flyover
Velachery Taramani Road - Kamakshi Hospital Junction flyover
Medavakkam Junction flyover
Keelkattalai flyover
Tambaram Sanitorium (Bharatha Matha Street) flyover
Kilkattalai - Pallavaram Radial Road Junction flyover
Velachery Junction flyover
Vadapalani Junction flyover
Porur flyover
Anna Arch flyover - Arumbakkam
Anna Arch flyover Aminjikarai
Koyambedu CMBT flyover
Retteri Flyover
Pallikaranai Flyover
Criticism
Between 2005 and 2014, the state government has spent over 15,590 million erecting flyovers and grade separators, of which 11,440 million (88%) was invested in Chennai. The city hosts all 21 elevated urban corridors open to traffic in the state in 2014.
In the late 1990s, a Traffic Action Plan was prepared for the city. It is said the brain behind the traffic action plan was the Society of Indian Automobi |
https://en.wikipedia.org/wiki/Michel%20Raynal | Michel Raynal (born 1949) is a French informatics scientist, professor at IRISA, University of Rennes, France. He is known for his contributions in the fields of algorithms, computability, and fault-tolerance in the context of concurrent and distributed systems. Michel Raynal is also Distinguished Chair professor at the Hong Kong Polytechnic University and editor of the “Synthesis Lectures on Distributed Computing Theory” published by Morgan & Claypool. He is a senior member of Institut Universitaire de France and a member of Academia Europaea.
Michel Raynal co-authored numerous research papers on concurrent and distributed computing, and has written 12 books. His last three books constitute an introduction to fault-free and fault-tolerant concurrent and distributed computing.
In his publications Michel Raynal strives to promote simplicity as a “first-class citizen” in the scientific approach.
Michel Raynal (and his co-authors) won several best paper awards in prestigious conferences such as IEEE ICDCS 1999, 2000 and 2001, SSS 2009 and 2011, Europar 2010, DISC 2010, and ACM PODC 2014.
When Michel Raynal became Emeritus professor (2017), INRIA, IRISA and the University of Rennes organized a Workshop in his honor featuring various speakers, including Turing Award recipient (Leslie Lamport) and Dijkstra Prize recipients (Leslie Lamport, Maurice Herlihy, Yoram Moses), and professor at Collège de France (Rachid Guerraoui).
Education and career
Michel Raynal obtained bachelor degrees (French “Baccalauréat”) both in literature and science. He received his PhD from University of Rennes in 1975, and his “Doctorat d’état” in 1981. During the period 1981-1984 he was a professor in a telecommunications engineer school (ENST de Bretagne) where he created and managed the informatics department. In 1984 he moved to the university of Rennes, and in 1985 he founded a research group entirely devoted to Distributed Algorithms (at that time, one of the first groups on this research topic in the world).
Michel Raynal has been an associate member of the editorial board of international journals, including the Journal of Parallel and Distributed Computing (JPDC), IEEE Transactions on Computers (TC), and IEEE Transactions of parallel and Distributed Systems (TPDS), among others.
Research areas and scientific interests
Michel Raynal’s research contributions concern mainly concurrent and distributed computing, and more specifically: causality, distributed synchronization, fault-tolerance, distributed agreement (consensus) and distributed computability. His first book
(on mutual exclusion algorithms in both shared memory and message-passing systems) is recognized as one of the first books entirely devoted to distributed algorithms.
On the synchronization side, with Jean-Michel Hélary and Achour Mostéfaoui, Michel Raynal designed a very simple generic message-passing mutual exclusion algorithm from which can be derived plenty of token and tree-based mut |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.