text
stringlengths
5
10.5k
source
stringlengths
33
146
The new technology was introduced at the enterprises of the Republic of Belarus (Baranovichi Automobile Aggregate Plant, OJSC Belarusrezinotechnika, Babruysk), which resulted in creation of corrosion-resistant, inertial to the elastomer adhesion mold surface for manufacturing of rubber products. Tashlykov continued his research collaborations with scientists from Heidelberg University, the University of Jena, the University of Salford, and the Max Planck Institute for Nuclear Physics studying the modification of the surface of solids. === Work at Belarusian State Pedagogical University === Tashlykov was the Dean of the Faculty of Physics of (2003-2007), Head of the Department of General Physics (2007-2013), Professor of the Department of Physics and Methods of Teaching Physics (2013-2016) at Maxim Tank Belarusian State Pedagogical University (BPSU). After accepting the post of dean in 2003, Tashlykov worked to encourage research and teaching in the physics of functional coatings. In 2004, he started a research laboratory to study the surface of solids, equipped with an atomic force microscope, as well as a device of precise measurement of the contact angle of wetting). In the 2000s, Tashlykov collaborated with the research group of P. V. Zhukovsky at Lublin University of Technology which led to joint research which were reported at the international conferences: "New Electrical and Electronic Technologies and their Industrial Implementations" and "Ion Implantation and other Applications of Ions and Electrons". From 2012, Tashlykov worked on the creation of new types of cheap and environmentally friendly thin-film absorbing layers and current-carrying contacts for solar cells. In his research it was shown that application of "hot wall" technique for obtaining thin films of SnPbS system compounds with different elemental composition significantly changes the structural and the morphological characteristics of the films and improves their physical properties. In particular, a model of the surface wettability of nanosized films with distilled water
{"page_id": 58955266, "title": "Igor Serafimovich Tashlykov"}
involved, it makes a world of difference. ​ _Jacki Bardole can be contacted at editor@acfreepress.com._ **Even simple meals can be difficult** Don’s Drafts Don Groves Sunday at our house can be the most difficult day of the week. The difficulty comes not with Sunday school at 8:30 a.m. and worship right after­ward, it isn’t even four peo­ple trying to shower, shave and get ready for church in a single crowded bathroom. Instead the problem comes after church, that big question that is so difficult to answer as we head home again: What’s for lunch? Our Sunday dinner isn’t al­ways difficult. Many times Christy or I will have thought of something to make ahead of time, say chili in the crock­pot or something on the grill we’ve set out from the freezer the night before. A little preparation makes Sun­day meals a breeze. On the other hand, a busy Saturday can easily interfere with Sun­day meal planning. That was the case over the weekend when daughter Han­nah, a junior, had to referee some third- and fourth-grade basketball games while Christy and I worked conces­sions to help raise money for prom. With most of our day spent in a gymnasium we opted for a meal at a restau­rant instead of making a meal at home. While our decision to eat out simplified Saturday’s dinner it, our time spent in the gym and the cold weather had us wanting to just hunker down after church on Sunday. The problem was we hadn’t done any meal planning and really hadn’t been to the gro­cery store for anything other than milk since before the first of the year. A trip to Hy-Vee to pick up a few things for lunch wasn’t any big deal. Getting consen­sus on what to have for lunch, though, was an
{"source": 990, "title": "from dpo"}
an area of future work. An interesting question for practical Data Augmentation is how to determine post-augmented dataset size. There is no consensus as to which ratio of original to final dataset size will result in the best performing model. However, imagine using color augmentations exclusively. If the initial training dataset consists of 50 dogs and 50 cats, and each image is augmented with 100 color filters to produce 5000 dogs and 5000 cats, this dataset will be heavily biased towards the spatial characteristics of the original 50 dogs and 50 cats. This over-extensive color-augmented data will cause a deep model to overfit even worse than the original. From this anecdote, we can conceptualize the existence of an optimal size for post-augmented data. Additionally, there is no consensus about the best strategy for combining data warping and oversampling techniques. One important consideration is the intrinsic bias in the initial, limited dataset. There are no existing augmentation techniques that can correct a dataset that has very poor diversity with respect to the testing data. All these augmentation algorithms perform best under the assumption that the training data and testing data are both drawn from the same distribution. If this is not true, it is very unlikely that these methods will be useful. Future work ----------- Future work in Data Augmentation will be focused on many different areas such as establishing a taxonomy of augmentation techniques, improving the quality of GAN samples, learning new ways to combine meta-learning and Data Augmentation, discovering relationships between Data Augmentation and classifier architecture, and extending these principles to other data types. We are interested in seeing how the time-series component in video data impacts the use of static image augmentation techniques. Data Augmentation is not limited to the image domain and can be useful for text,
{"source": 2745, "title": "from dpo"}
how quickly a corporation can enact a new policy but I imagine they could be close)….all video interviewees will have to give consent for their video interview to be recorded. ▼ Collapse 5 replies Morticia* January 31, 2022 at 11:32 am That makes a lot of sense. Thank you for sharing all this with us. Momma Bear* January 31, 2022 at 12:04 pm I can see why! And apparently (per the comments) it’s not the only company to do so. HotSauce* January 31, 2022 at 12:36 pm That sounds like a very good idea and since I’ll soon be interviewing people myself I may do the same thing. Blinx* January 31, 2022 at 5:25 pm I was wondering about that! What about ID provided? My current job needed 2 photo IDs, SSN card, and a background check. I’m sure there’s ways to digitally fake them, but hoping that a background check would find anything fraudulent. HR* February 1, 2022 at 5:17 pm Good idea. Badasslady* January 31, 2022 at 11:19 am We record our Zoom interviews, mostly so we can review them later if needed, but that could also help with this issue. Essentially Cheesy* January 31, 2022 at 11:19 am They must be very nice as an employer. I’m pretty sure our HR/leadership would stop them at the door with a “what’s going on, you’re not the person we interviewed” stance. ▼ Collapse 6 replies starsaphire* January 31, 2022 at 11:34 am That isn’t necessarily possible, if the company’s a big one. The HR person who does “John’s” onboarding may not even be in the same department/building/time zone as the HR person who did the initial phone screen. This is so fascinating and I’m playing out dozens of scenarios in my head about how and why this happened, so
{"source": 4975, "title": "from dpo"}
in the expression for T, obtain values for T that you can compare with the graphical estimates you obtained in Problem 23. 30. A generalization of the damped pendulum equation discussed in the text, or a damped spring–mass system, is the Liénard 4 equation d2xdt 2 + c(x) dx dt + g(x) = 0. If c(x) is a constant and g(x) = kx , then this equation has the form of the linear pendu-lum equation [replace sin θ with θ in Eq. (12) of Section 9.2]; otherwise, the damping force c(x) dx /dt and the restoring force g(x) are nonlinear. Assume that c is continuously differentiable, g is twice continuously differentiable, and g(0) = 0. (a) Write the Liénard equation as a system of two first order equations by introducing the variable y = dx /dt . (b) Show that (0, 0 ) is a critical point and that the system is locally linear in the neighbor-hood of (0, 0 ).(c) Show that if c(0) > 0 and g′(0) > 0, then the critical point is asymptotically stable, and that if c(0) < 0 or g′(0) < 0, then the critical point is unstable. Hint: Use Taylor series to approximate c and g in the neighborhood of x = 0. # 9.4 Competing Species In this section and the next, we explore the application of phase plane analysis to some problems in population dynamics. These problems involve two interacting populations and are extensions of those discussed in Section 2.5, which dealt with a single population. Although the equations discussed here are extremely simple 4 Alfred-Marie Liénard (1869–1958), professor at l’École des Mines in Paris, worked in electricity, mechan-ics, and applied mathematics. The results of his investigation of this differential equation were published in 1928. 9.4 Competing Species 521 compared to
{"source": 6286, "title": "from dpo"}
=== === Invertebrates === Compared with vertebrates, insects and crustaceans possess a number of structurally unusual hormones such as the juvenile hormone, a sesquiterpenoid. === Plants === Examples include abscisic acid, auxin, cytokinin, ethylene, and gibberellin. == Receptors == Most hormones initiate a cellular response by initially binding to either cell surface receptors or intracellular receptors. A cell may have several different receptors that recognize the same hormone but activate different signal transduction pathways, or a cell may have several different receptors that recognize different hormones and activate the same biochemical pathway. Receptors for most peptide as well as many eicosanoid hormones are embedded in the cell membrane as cell surface receptors, and the majority of these belong to the G protein-coupled receptor (GPCR) class of seven alpha helix transmembrane proteins. The interaction of hormone and receptor typically triggers a cascade of secondary effects within the cytoplasm of the cell, described as signal transduction, often involving phosphorylation or dephosphorylation of various other cytoplasmic proteins, changes in ion channel permeability, or increased concentrations of intracellular molecules that may act as secondary messengers (e.g., cyclic AMP). Some protein hormones also interact with intracellular receptors located in the cytoplasm or nucleus by an intracrine mechanism. For steroid or thyroid hormones, their receptors are located inside the cell within the cytoplasm of the target cell. These receptors belong to the nuclear receptor family of ligand-activated transcription factors. To bind their receptors, these hormones must first cross the cell membrane. They can do so because they are lipid-soluble. The combined hormone-receptor complex then moves across the nuclear membrane into the nucleus of the cell, where it binds to specific DNA sequences, regulating the expression of certain genes, and thereby increasing the levels of the proteins encoded by these genes. However, it has been shown that
{"page_id": 13311, "title": "Hormone"}
more cheaply, making it economically viable. Companies within the energy, food, oil and chemical sectors, the Ministry of Agriculture, Nature & Food Quality, the Provincial Government of Gelderland, Oost NV and Wageningen UR are all working together in or contributing to the algae research centre AlgaePARC in order to answer that question. == See also == == External links == AlgaePARC [1] Algae at the WUR [2] == References ==
{"page_id": 28808092, "title": "AlgaePARC"}
varies with the age of the animal. The gastrointestinal tract and lymphatic system can be affected at any age, leading to vomiting, diarrhea and immunosuppression but cerebellar hypoplasia is only seen in cats that were infected in the womb or at less than two weeks of age, and disease of the myocardium is seen in puppies infected between the ages of three and eight weeks. == See also == Bat virome History of virology Social history of viruses Virus evolution == References ==
{"page_id": 13564754, "title": "Veterinary virology"}
expressive power). Codd's theorem also doesn't consider SQL nulls and the three-valued logic they entail; the logical treatment of nulls remains mired in controversy. Additionally, SQL has multiset semantics as allowing duplicate rows. Nevertheless, relational completeness constitutes an important yardstick by which the expressive power of query languages can be compared. == Notes == == References == Abiteboul, Serge; Hull, Richard B.; Vianu, Victor (1995). Foundations of Databases. Addison-Wesley. ISBN 0-201-53771-0. Codd, E. F. (1972). "Relational Completeness of Data Base Sublanguages". In Rustin, R. (ed.). Data Base Systems. Proceedings of 6th Courant Computer Science Symposium (May 24–25, 1971: New York, N.Y.). Prentice-Hall. pp. 65–98. ISBN 0-13-196741-X. == External links == Pichler, Reinhard (March 20, 2018). "Database Theory: 3. Codd's Theorem" (PDF). Institute of Logic and Computation, DBAI Group, TU Wien. Archived from the original (PDF) on August 22, 2020. Retrieved August 8, 2019.
{"page_id": 18900634, "title": "Codd's theorem"}
The Charles Hard Townes Award of Optica is a prize for quantum electronics, including laser physics. Awarded annually since 1981, it is named after the Nobel Prize-winning laser pioneer Charles H. Townes. Former winners include Nobel Prize laureates John L. Hall, Claude Cohen-Tannoudji, Serge Haroche, Arthur Ashkin, and Gérard Mourou. == Recipients == == See also == List of physics awards == References == == External links == Official website of the prize
{"page_id": 45669038, "title": "Charles Hard Townes Award"}
Mosaic variegated aneuploidy syndrome is a rare autosomal recessive genetic disorder that causes inappropriate chromosomal segregation in mitosis process and because of it, some cells are aneuploid (mosaic). It is caused by mutation BUB1, BUB1B, BUB3, CEP57 or TRIP13. Person with MVA can present with IUGR, microcephaly and a wide range of congenital abnormalities. == Symptoms == Signs of this disease are: Very frequent: Peritoneal fluid excess Cataracts Dandy-Walker malformation Epicanthus Glaucoma Small jaw increased nuchal translucency Short stature Enlargment of ventricles of the brain Frequent: Eye and vision abnormalities Global developmental delay Microcephaly Mental handicap Triangular facies Occasional: Anomalies of aortic morphology Anomalies of cardiovascular system morphology Lung lobation abnormality Abnormalities of skull Abnormality of immune system Anomalies of skin pigmentation Anomalies of the skeletal system Atypical genitalia Agenesis (or hypoplasia) of the cerebellum and the corpus callosum Sleep apnea Cleft palata 5th finger clinodactyly Tall forehead Hypothyroidism Wide nose Sloping forehead Some form of tumours, such as: Acute lymphoblastic leukemia, Nephroblastoma, Rhabdomyosarcoma, Wilms tumour etc. Downslanted palpebral fissures Depressed nasal ridge Down-slanting palpebral fissures IUGR (Intrauterine growth restriction) == Cause == This disorder is caused by defect of genes that are responsible for spindle checkpoint. Types include: Also those genes are associated with that disorder: BUB3 and BUB1. == Pathophysiology == BUB1, BUB1B and BUB3 participates in spindle checkpoint checkpoint process which is necessary for correct chromosome splitting process in mitosis, consequently mutation of those 3 genes causes incorrect splitting of chromosomes. CENATAC gene is responsible for minor (U12‐dependent) spliceosome, which is important for cell cycle regulation proteins and in MVA, this process is deregulated. CEP57 plays role in spindle pole integrity, which mutation can cause incorrect segregation during mitosis. SLF2 and SMC5 are necessary for proper chromosomal segregation through centromeric and sister chromatid cohesion, consequently this mechanism
{"page_id": 79519776, "title": "Mosaic variegated aneuploidy syndrome"}
The editors of the Mead Project website comment that Expression is among the most enduring contributions of 19th-century psychology and argue that although the book lays its foundation on an arguable interpretation of the nature of expression, its ideas continue to influence discussions on emotional experience. The editors cite John Dewey's comments on the book, writing that Darwin's arguments are "wrong but ... compelling". In 2003, the New York Academy of Sciences published Emotions Inside Out: 130 Years after Darwin's The Expression of the Emotions in Man and Animals, a collection of 37 papers (edited by Paul Ekman) with recent research on the subject. == Influence == === Psychology === George Romanes (1848–1894), an advocate of Darwin in comparative psychology, died prematurely, diminishing Darwin's impact on academic psychology. Darwin's impact was further compromised by Wilhelm Wundt's dimensional approach to emotions and the widespread influence of behaviourism during the 20th century. ==== Psychoanalysis ==== Sigmund Freud's early publications on the symptoms of hysteria (with his influential concept of unconscious emotional conflict) acknowledged debts to Darwin's work on emotional expression. All these sensations and innervations belong to the field of The Expression of the Emotions, which, as Darwin (1872) has taught us, consists of actions which originally had a meaning and served a purpose. These may now for the most part have become so much weakened that the expression of them in words seems to us to be only a figurative picture of them, whereas in all probability the description was once meant literally; and hysteria is right in restoring the original meaning of the words.... In 1905, Arthur Mitchell, a psychiatrist and former deputy to William A.F. Browne in the Scottish Lunacy Commission, published About Dreaming, Laughing and Blushing, linking some of Darwin's concerns with those of developing psychology. Psychiatrist John
{"page_id": 1704268, "title": "The Expression of the Emotions in Man and Animals"}
Learning nuggets is a standalone mini learning activity, usually less than 5 minutes in length, that would vary in size and scope that learners undertake in a particular context in order to attain specific learning outcomes A learning nugget task will take a prescribed length of time and may, or may not be assessed. Nuggets should be designed with a particular approach to learning and teaching in mind (Conole & Fill, 2005) Learning nuggets are the essential elements of the Subscription Learning approach. In this context, the learning happens through a stream of intermittent nuggets which involves a variety of learning-related events which include "content presentation, diagnostics, scenario-based questions, job aids, reflection questions, assignments, discussions, etc. The nuggets are delivered to the learner in many formats like email, text message, smart-phone notifications, or any other form of prompting. They are designed to be delivered on predetermined intervals to support learning. The series of learning nuggets are called learning threads. For utmost effective learning, sending a learning nugget could be dynamically triggered by many factors like learners' leaning need, results of a learning assessment or learners' performance. == Examples of Learning Nuggets == Fujitsu and MIT described some examples of Learning Nuggets as follows: Homework problem to be done online A video snippet Pop quiz for self-assessment of content knowledge An animation, possibly interactive A simulation A web-based lab experiment A short educational game A learning-based work experience builder A small section of textual material typically less than one page long. == See also == Microcontent Microformats Microlecture == References ==
{"page_id": 48050093, "title": "Learning nugget"}
a point light walker, then the similarities between these two stimuli may highlight critical features needed for biological motion recognition. Through psychophysical experiments, it was found that subjects could recognize biological motion using a CFS stimulus which contained opponent motion in the horizontal direction but randomly moving dots in the horizontal direction (Figure 2). Because of the movement of the dots, this stimulus could not be fit to a human skeleton model suggesting that biological motion recognition may not heavily rely on form as a critical feature. Also, the psychophysical experiments showed that subjects similarly recognize biological motion for both the CFS stimulus and SPS, a stimulus in which dots of the point light walker were reassigned to different positions within the human body shape for every nth frame thereby highlights the importance of form vs the motion (Fig.1.). The results of the following psychophysical experiments show that motion is a critical feature that could be used to recognize biological motion. The following statistical analysis and psychophysical experiments highlight the importance of dominant local motion patterns in biological motion recognition. Furthermore, due to the ability of subjects to recognize biological motion given the CFS stimulus, it is postulated that horizontal opponent motion and coarse positional information is important for recognition of biological motion. ==== Model ==== The following model contains detectors modeled from existing neurons that extracts motion features with increasing complexity. (Figure 4). Detectors of Local Motion These detectors detect different motion directions and are modeled from neurons in monkey V1/2 and area MT The output of the local motion detectors are the following: G p ( x ) = H ( v ( x ) , v 1 , v 2 ) ⋅ b ( θ , θ p ) {\displaystyle G_{p}(x)=H(v(x),v_{1},v_{2})\cdot b(\theta ,\theta _{p})} where x {\displaystyle
{"page_id": 42938624, "title": "Biological motion perception"}
others at AMES. At the opening of the war, the entire AMES establishment was moved from Bawdsey to a pre-arranged location at Dundee. The choice of Dundee was largely due to the University being Watt's alma mater. He had made little effort to prepare the university for use by AMES and the rector was surprised when they arrived one day out of the blue. Almost no room was available as the students and professors had returned from summer holidays. The AI team was sent to a small airfield at Perth that was miles away and quite small. Both locations were totally unsuitable for the work and the teams constantly complained. In February 1940 Rowe began to organise a new AI team led by Herbert Skinner. Skinner had Bernard Lovell and Alan Lloyd Hodgkin begin considering the issue of antenna designs for microwave radars. On 5 March they were invited to the GEC labs to view their progress on a radar based on VT90 tubes, which had by this time been pushed to useful power levels at 50 cm wavelengths. Provided with a low power klystron as a microwave source, Lovell and Hodgkin began experimenting with horn antennas that would offer significantly higher angular accuracy than the Yagi antennas used on the Mk. IV. Instead of broadcasting the radar signal across the entire forward hemisphere of the aircraft and listening to echoes from everywhere in that volume, this system would allow the radar to be used like a flashlight, pointed in the direction of observation. This would also have the side-effect of allowing the radar to avoid ground reflections simply by pointing the antenna away from the ground. With a beamwidth of 10 degrees, a horizontal antenna would still create some downward-pointed signal, about 5 degrees in this case. If the
{"page_id": 43764346, "title": "AI Mark VIII radar"}
offline reinforcement learning settings, but quickly adapting to unseen novel tasks remains challenging. To address this challenge, we propose a new framework, called Hyper-Decision Transformer (HDT), that can generalize to novel tasks from a handful of demonstrations in a data- and parameter- efficient manner. 674, TITLE: Multimodal Analogical Reasoning over Knowledge Graphs AUTHORS: Ningyu Zhang, Lei Li, Xiang Chen, Xiaozhuan Liang, Shumin Deng, Huajun Chen HIGHLIGHT: To this end, we introduce the new task of multimodal analogical reasoning over a knowledge graph, which requires multimodal reasoning ability with the help of background knowledge.Specifically, we construct a Multimodal Analogical Reasoning dataSet (MARS) and a multimodal knowledge graph MarKG. 675, TITLE: Provable Memorization Capacity of Transformers AUTHORS: Junghwan Kim, Michelle Kim, Barzan Mozafari HIGHLIGHT: In this work, we present the first study of the memorization capacity of the Transformer architecture. 676, TITLE: Countinuous pseudo-labeling from the start AUTHORS: Dan Berrebbi, Ronan Collobert, Samy Bengio, Navdeep Jaitly, Tatiana Likhomanenko HIGHLIGHT: We believe this has the potential for over-fitting to the labeled dataset in low resource settings and that ST from the start of training should reduce over-fitting. In this paper we show how we can do this by dynamically controlling the evolution of PLs during the training process in ASR. 677, TITLE: Recursive Time Series Data Augmentation AUTHORS: Amine Mohamed Aboussalah, Minjae Kwon, Raj G Patel, Cheng Chi, Chi-Guhn Lee # 65 HIGHLIGHT: Training on available realizations, where data is limited, often induces severe over-fitting thereby preventing generalization. To address this issue, we introduce a general recursive framework for time series augmentation, which we call the Recursive Interpolation Method (RIM). 678, TITLE: InCoder: A Generative Model for Code Infilling and Synthesis AUTHORS: Daniel Fried, Armen Aghajanyan, Jessy Lin, Sida Wang, Eric Wallace, Freda Shi, Ruiqi Zhong, Scott
{"source": 1216, "title": "from dpo"}
symbol above or below the equation’s arrow. For example, a reaction carried out by heating may be indicated by the uppercase Greek letter delta (Δ) over the arrow. CaCO 3(s) ⟶ > Δ CaO( s) + CO 2(g) Other examples of these special conditions will be encountered in more depth in later chapters. # Equations for Ionic Reactions Given the abundance of water on earth, it stands to reason that a great many chemical reactions take place in aqueous media. When ions are involved in these reactions, the chemical equations may be written with various levels of detail appropriate to their intended use. To illustrate this, consider a reaction between ionic compounds taking place in an aqueous solution. When aqueous solutions of CaCl 2 and AgNO 3 are mixed, a reaction takes place producing aqueous Ca(NO 3)2 and solid AgCl: CaCl 2(aq ) + 2AgNO 3(aq ) ⟶ Ca(NO 3)2(aq ) + 2AgCl( s) This balanced equation, derived in the usual fashion, is called a molecular equation because it doesn’t explicitly represent the ionic species that are present in solution. When ionic compounds dissolve in water, they may dissociate into their constituent ions, which are subsequently dispersed homogenously throughout the resulting solution (a thorough discussion of this important process is provided in the chapter on solutions). Ionic compounds dissolved in water are, therefore, more realistically represented as dissociated ions, in this case: CaCl 2(aq ) ⟶ Ca 2+ (aq ) + 2Cl −(aq )2AgNO 3(aq ) ⟶ 2Ag +(aq ) + 2NO 3 −(aq )Ca(NO 3)2(aq ) ⟶ Ca 2+ (aq ) + 2NO 3 −(aq ) Unlike these three ionic compounds, AgCl does not dissolve in water to a significant extent, as signified by its physical state notation, s.Explicitly representing all dissolved ions results in a complete ionic equation
{"source": 3700, "title": "from dpo"}
around the beginning of July, Tur´ an asked me if I could give him my notes on the Dirichlet theorem so he could see it, he was going away soon, and probably would have left when I returned from Canada. I not only agreed to do this, but as I felt very much attached to Tur´ an I spent some days going through the proof with him. In this connection I mentioned the fundamental theorem to him. . . . However, I did not tell him the proof of the formula, nor about the consequences it might have and my ideas in this connection. . . . I then left for Canada and returned after 9 days just as Tur´ an was leaving. It turned out that Tur´ an had given a seminar on my proof of the Dirichlet theorem where Erd˝ os, Chowla, and Straus had been present, I had of course no objection to this, since it concerned something that was already finished from my side, though it was not pub-lished. In connection with this Tur´ an had also mentioned, at least to Erd˝ os, the fundamental formula . . . . In a letter to D. Goldfeld that is dated January 6, 1988, Selberg wrote: July 14, 1948 was a Wednesday, and on Thursday, July 15 I met Erd˝ os and heard that he was trying to prove pn+1 /p n → 1. . . . Friday evening or it may have been Saturday morning, Erd˝ os had his proof ready and told me about it. Sunday afternoon (July 18) I used his result (which was stronger than pn+1 /p n → 1, he had proved that between x and x(1 + δ)there are more that c(δ)x/ log x primes for x > x 0(δ), the weaker
{"source": 5734, "title": "from dpo"}
roast beef and cheddar cheese. 30. ‘Italian food’ means it ems like spaghetti, lasagna, and tortellini. Answers: 1. Too broad 16. Unclear (emotive) 2. Circular 17. Unclear (needlessly complex) 3. Negative 18. Unclear (figurative) 4. Merely extensional 19. Circular 5. Too narrow 20. Unclear (vague) 6. Unclear (grammar; a test is not a time) 21. Merely extensional 7. Merely extensional 22. Unclear (emotive) 8. Unclear (figurative) 23. Unclear (grammar; an argument is not a place) 9. Too broad 24. Too broad 10. Circular 25. Too narrow 11. Too broad 26. Negative 12. Merely extensional 27. Unclear (figurative) 13. Unclear (emotive) 28. Unclear (needlessly complex) 14. Negative 29. Too narrow 15. Too narrow 30. Merely extensional 199 # Chapter 14: Probability # Probability Theory Inductive arguments purport to show that a conclusion is probably true given the truth of the premises. Strength of inductive arguments —as students will recall —comes in degrees. Some inductive arguments are strong, some are really strong, and some are really really strong. Weakness comes in degrees, too. Probability theory attempts to quantify probability, since the difference between really strong and really really strong is shy of transparent. Probability theory thus attempts to make the degree of probability clearer and more precise. There is more than one way to understand probability, and different probabilistic claims will mean somewhat different things depending on what kind of probability is intended. You can even at this initial stage likely sense the difference between the following statements: * It is probable that a six-sided die rolled honestly will turn up with a number greater than one. * The probability of a 17-year-old male getting in an auto accident within ten years of driving is greater than that of a 17-year-old female. * It is probable that Dan and Sue will get
{"source": 6820, "title": "from dpo"}
Ian Enting (born 25 September 1948) is a mathematical physicist and the AMSI/MASCOS Professorial Fellow at the ARC Centre of Excellence for Mathematics and Statistics of Complex Systems (MASCOS) based at The University of Melbourne. Enting is the author of Twisted, The Distorted Mathematics of Greenhouse Denial in which he analyses the presentation and use of data by climate change deniers. More recently he has been addressing the claims made in Ian Plimer's book Heaven and Earth. He has published a critique, "Ian Plimer’s ‘Heaven + Earth’ — Checking the Claims", listing what Enting claims are numerous misrepresentations of the sources cited in the book. From 1980 to 2004 he worked in CSIRO Atmospheric Research, primarily on modelling the global carbon cycle. He was one of the lead authors of the chapter CO2 and the Carbon Cycle in the 1994 IPCC report on Radiative Forcing of Climate. Enting has published scientific papers, on mathematical physics and carbon cycle modelling, and a monograph on mathematical techniques for interpreting observations of carbon dioxide (CO2) and other trace gases. == References == == External links == Ian Enting's homepage
{"page_id": 13849747, "title": "Ian G. Enting"}
condensed matter. Equation 2 was further developed to find the relations for the parameters β {\displaystyle \beta } , γ {\displaystyle \gamma } , C {\displaystyle C} and D {\displaystyle D} for energies between 50 eV and 2 keV: γ = 0.191 ρ − 0.5 ( e V − 1 ) {\displaystyle \gamma =0.191\rho ^{-0.5}(\mathrm {eV^{-1}} )} C = 19.7 − 9.1 U ( n m − 1 ) {\displaystyle C=19.7-9.1U(\mathrm {nm^{-1}} )} D = 534 − 208 U ( e V n m − 1 ) {\displaystyle D=534-208U(\mathrm {eV} \mathrm {nm^{-1}} )} U = N ν ρ M = ( E p / 28.816 ) 2 {\displaystyle U={\frac {N_{\nu }\rho }{M}}=(E_{p}/28.816)^{2}} Here, the bandgap energy E g {\displaystyle E_{g}} is given in eV. Equation 2 an 3 are also known as the TTP-2M equations and are in general applicable for energies between 50 eV and 200 keV. Neglecting a few materials (diamond, graphite, Cs, cubic-BN and hexagonal BN) that are not following these equations (due to deviations in β {\displaystyle \beta } ), the TTP-2M equations show precise agreement with the measurements. Another approach based on Equation 2 to determine the IMFP is the S1 formula. This formula can be applied for energies between 100 eV and 10 keV: λ − 1 = ( 4 + 0.44 Z 0.5 + 0.104 E 0.872 ) a 1.7 Z 0.3 ( 1 − W ) {\displaystyle \lambda ^{-1}={\frac {(4+0.44Z^{0.5}+0.104E^{0.872})a^{1.7}}{Z^{0.3}(1-W)}}} with the atomic number Z {\displaystyle Z} (average atomic number for a compound), W = 0.06 H {\displaystyle W=0.06H} or W = 0.02 E g {\displaystyle W=0.02E_{g}} ( H {\displaystyle H} is the heat of formation of a compound in eV per atom) and the average atomic spacing a {\displaystyle a} : a 3 = 10 21 M ρ N A (
{"page_id": 2209432, "title": "Inelastic mean free path"}
or episodic transmission of malaria, to advocating it in areas of continuous, intense transmission. WHO reaffirmed its commitment to phasing out DDT, aiming "to achieve a 30% cut in the application of DDT world-wide by 2014 and its total phase-out by the early 2020s if not sooner" while simultaneously combating malaria. WHO plans to implement alternatives to DDT to achieve this goal. South Africa continues to use DDT under WHO guidelines. In 1996, the country switched to alternative insecticides and malaria incidence increased dramatically. Returning to DDT and introducing new drugs brought malaria back under control. Malaria cases increased in South America after countries in that continent stopped using DDT. Research data showed a strong negative relationship between DDT residual house sprayings and malaria. In a research from 1993 to 1995, Ecuador increased its use of DDT and achieved a 61% reduction in malaria rates, while each of the other countries that gradually decreased its DDT use had large increases. === Mosquito resistance === In some areas, resistance reduced DDT's effectiveness. WHO guidelines require that absence of resistance must be confirmed before using the chemical. Resistance is largely due to agricultural use, in much greater quantities than required for disease prevention. Resistance was noted early in spray campaigns. Paul Russell, former head of the Allied Anti-Malaria campaign, observed in 1956 that "resistance has appeared after six or seven years". Resistance has been detected in Sri Lanka, Pakistan, Turkey and Central America and it has largely been replaced by organophosphate or carbamate insecticides, e.g. malathion or bendiocarb. In many parts of India, DDT is ineffective. Agricultural uses were banned in 1989 and its anti-malarial use has been declining. Urban use ended. One study concluded that "DDT is still a viable insecticide in indoor residual spraying owing to its effectivity in well
{"page_id": 8494, "title": "DDT"}
technology can provide opportunities for students to collaborate and communicate with each other, which can enhance their social and communication skills. With technology, teachers can work on customizing learning for students. Also, it enables teachers to compare student performance in a quantified manner given tools such as student management systems have pre-built reports to track student performance, progress, and participation in classroom activities.Nov 25, 2022 == Curricula == === NSEC (1989–2002) === As of 1989, the New Secondary Education Curriculum (NSEC) was implemented under the 1989 Secondary Education Development Program (SEDP). Though its aim is to make it a technology-oriented curriculum, no basic computer technology courses are part of the general education yet. However, there were already technical schools, college and universities offering vocational and technical courses in computer technology—ranging from 5 months to 3 years. ==== Secondary education ==== Some of the common courses related to ICT include the following (as of 1991): ==== Vocational and technical courses ==== One-Year Computer Technology course Designed to train computer programmers and operators, this course concentrates on developing skills in programming and systems development. Open to high school graduates, this course focuses on providing hands-on learning experiences. Two-Year Computer Science and Technology A post-secondary program, this is designed to train programmers and systems analysts. Graduates are expected to use the languages of the computer; go through hands-on exercises and problem-solving exercises; and develop their own software. The course also includes general education courses trained to broaden the overall education of the graduate. Two-Year Business Data Processing course A post-secondary course targeted at developing skills in programming and the use of computer language in payrolls, inventories, and other similar business problems. It also includes planning tools such as PERT, CPM, Gantt charts, simulation and other techniques that are business related. Beyond the specialized
{"page_id": 53775977, "title": "Information Communications Technology education in the Philippines"}
{\displaystyle S'} is empty. Then S ′ {\displaystyle S'} has sum 0, and so must T ′ {\displaystyle T'} . But since T ′ {\displaystyle T'} can only contain positive integers, it must be empty too. To conclude: S ′ = T ′ = ∅ {\displaystyle S'=T'=\emptyset } which implies S = T {\displaystyle S=T} , proving that each Zeckendorf representation is unique. == Fibonacci multiplication == One can define the following operation a ∘ b {\displaystyle a\circ b} on natural numbers a, b: given the Zeckendorf representations a = ∑ i = 0 k F c i ( c i ≥ 2 ) {\displaystyle a=\sum _{i=0}^{k}F_{c_{i}}\;(c_{i}\geq 2)} and b = ∑ j = 0 l F d j ( d j ≥ 2 ) {\displaystyle b=\sum _{j=0}^{l}F_{d_{j}}\;(d_{j}\geq 2)} we define the Fibonacci product a ∘ b = ∑ i = 0 k ∑ j = 0 l F c i + d j . {\displaystyle a\circ b=\sum _{i=0}^{k}\sum _{j=0}^{l}F_{c_{i}+d_{j}}.} For example, the Zeckendorf representation of 2 is F 3 {\displaystyle F_{3}} , and the Zeckendorf representation of 4 is F 4 + F 2 {\displaystyle F_{4}+F_{2}} ( F 1 {\displaystyle F_{1}} is disallowed from representations), so 2 ∘ 4 = F 3 + 4 + F 3 + 2 = 13 + 5 = 18. {\displaystyle 2\circ 4=F_{3+4}+F_{3+2}=13+5=18.} (The product is not always in Zeckendorf form. For example, 4 ∘ 4 = ( F 4 + F 2 ) ∘ ( F 4 + F 2 ) = F 4 + 4 + 2 F 4 + 2 + F 2 + 2 = 21 + 2 ⋅ 8 + 3 = 40 = F 9 + F 5 + F 2 . {\displaystyle 4\circ 4=(F_{4}+F_{2})\circ (F_{4}+F_{2})=F_{4+4}+2F_{4+2}+F_{2+2}=21+2\cdot 8+3=40=F_{9}+F_{5}+F_{2}.} ) A simple rearrangement of sums shows that this is a
{"page_id": 1377405, "title": "Zeckendorf's theorem"}
NGC 286 is a lenticular galaxy in the constellation Cetus. It was discovered on October 2, 1886 by Francis Leavenworth. == References == == External links == Media related to NGC 286 at Wikimedia Commons
{"page_id": 52007956, "title": "NGC 286"}
and personalizing the content. == User interface (UI) improvements == Windows 11 updates several system dialog boxes such as the alert for when the battery is running low. The taskbar previews have been updated to reflect Windows 11's new visual design. The hidden icons flyout on the lower-right corner of the taskbar has also been redesigned to match Windows 11's visuals. == Multitasking == Snap Layouts: Users can now hover over a window's maximize button to view available snap layouts, and then click a zone to snap the window. They will then be guided to snap windows to the rest of the zones within the layout using a guided snap assist. There is a set of four available snap layouts on smaller screens. Snap Groups: Snap groups are a way to easily switch back to a set of snapped windows, which are stored in the grouped app's taskbar icons. Virtual Desktops: Users can now reorder and customize the background for each of their desktops. They can also hover over the Task View button on the Taskbar to quickly access their desktops or to create a new one. Docking: When the user undocks a laptop, the windows on the monitor will be minimized, and when the laptop is redocked to a monitor, Windows will put everything where it was before. == Input == Touch Keyboard: Windows 11 introduces thirteen new themes to customize the touch keyboard, including 3 hardware-matching themes that match the Surface keyboard colors. It also adds a new theme engine that allows the user to create a custom theme using background images. In addition, Windows 11 adds the ability to resize the touch keyboard. Voice Typing: Windows 11 includes a new voice typing launcher to easily start voice typing in a selected field. It is turned off by
{"page_id": 68040716, "title": "Features new to Windows 11"}
and digest the prey. They mainly eat insects, but some larger species are able to catch small fish. Females of the water spider Argyroneta aquatica build underwater "diving bell" webs which they fill with air and use for digesting prey, molting, mating and raising offspring. They live almost entirely within the bells, darting out to catch prey animals that touch the bell or the threads that anchor it. == Other species == Certain other animals also use surface waves to find prey. An incomplete list follows: Fish: Freshwater hatchetfish (Gasteropelecidae) Halfbeaks (Hemiramphidae) Non-fish: The genera of spiders Pirata and Dolomedes Clawed toad Xenopus laevis Whirligig beetle Gyrinus substriatus Water strider Gerris remigis Back swimmer Notonecta glauca == See also == Seismic communication == References ==
{"page_id": 34000456, "title": "Surface wave detection by animals"}
A response spectrum is a plot of the peak or steady-state response (displacement, velocity or acceleration) of a series of oscillators of varying natural frequency, that are forced into motion by the same base vibration or shock. The resulting plot can then be used to pick off the response of any linear system, given its natural frequency of oscillation. One such use is in assessing the peak response of buildings to earthquakes. The science of strong ground motion may use some values from the ground response spectrum (calculated from recordings of surface ground motion from seismographs) for correlation with seismic damage. If the input used in calculating a response spectrum is steady-state periodic, then the steady-state result is recorded. Damping must be present, or else the response will be infinite. For transient input (such as seismic ground motion), the peak response is reported. Some level of damping is generally assumed, but a value will be obtained even with no damping. Response spectra can also be used in assessing the response of linear systems with multiple modes of oscillation (multi-degree of freedom systems), although they are only accurate for low levels of damping. Modal analysis is performed to identify the modes, and the response in that mode can be picked from the response spectrum. These peak responses are then combined to estimate a total response. A typical combination method is the square root of the sum of the squares (SRSS) if the modal frequencies are not close. The result is typically different from that which would be calculated directly from an input, since phase information is lost in the process of generating the response spectrum. The main limitation of response spectra is that they are only universally applicable for linear systems. Response spectra can be generated for non-linear systems, but are
{"page_id": 1795103, "title": "Response spectrum"}
were too busy actually solving real business problems for people (including a few rare problems that involved detailed deep dives into novel or complex algorithmic solutions). We harass and haze people with bullshit trivia, then turn around and don’t even ask them what problems they have really, actually solved before, or invent reasons to rationalize that if they solved a lot of problems before, they’re just some sort of smooth talker and somehow the only proof is if they memorized Floyd’s cycle detection algorithm or some other ludicrous bullshit. What a deeply humanity-hostile industry it is! clanrebornwow on Jan 21, 2019 | prev | next [–] We just started hiring remotely. We've 1:4 ratio of local:remote. flavious on Jan 25, 2019 | parent | next [–] Define "We". auslander on Jan 23, 2019 | prev | next [–] Infrastructure. Not a single mention in this 700 thread. Thats where senior engineers are most required. impostersyndrom on Jan 22, 2019 | prev | next [–] i can't believe all of the replies to this thread. us nerds get a bit too myopic about the details and fail to see the forest for the trees. let's zoom back and look at the Earth from the Moon. what other industry has hiring rituals premised on assuming The Candidate is a shape shifting imposter and then testing The Candidate using various Gom Jabbars to verify The Candidate is a human who can code? do attorneys and doctors and professors device elaborate exams and gotcha questions to spring upon The Candidate because The Candidate might be a total fraud? to be honest, this implicit assumption that The Candidate is an outright liar and con-man and that we have to "catch" them in their lies before we let them into The Club has been an enormous
{"source": 10, "title": "from dpo"}
acquisition of factual information in cooperative learning settings: One good strategy deserves another. Applied Cognitive Psychology , 8, 465–478. Kang, S. H. K., McDaniel, M. A., & Pashler, H. (2011). Effects of testing on learning of functions. Psychonomic Bulletin & Review , 18 , 998–1005. Kang, S. H. K., & Pashler, H. (2012). Learning painting styles: Spac-ing is advantageous when it promotes discriminative contrast. Applied Cognitive Psychology , 26 , 97–103. Kang, S. H. K., Pashler, H., Cepeda, N. J., Rohrer, D., Carpenter, S. K., & Mozer, M. C. (2011). Does incorrect guessing impair fact learning? Journal of Educational Psychology , 103 , 48–59. Kardash, C. M., & Scholes, R. J. (1995). Effects of preexisting beliefs and repeated readings on belief change, comprehension, and recall of persuasive text. Contemporary Educational Psychology , 20 , 201–221. Karpicke, J. D., & Bauernschmidt, A. (2011). Spaced retrieval: Abso-lute spacing enhances learning regardless of relative spacing. Journal of Experimental Psychology: Learning, Memory, and Cognition , 37 , 1250–1257. Karpicke, J. D., & Blunt, J. R. (2011). Retrieval practice produces more learning than elaborative studying with concept mapping. Science , 331 , 772–775. Karpicke, J. D., Butler, A. C., & Roediger, H. L., III. (2009). Meta-cognitive strategies in student learning: Do students practice retrieval when they study on their own? Memory , 17 , 471–479. Karpicke, J. D., & Roediger, H. L., III. (2007a). Expanding retrieval practice promotes short-term retention, but equally spaced retrieval enhances long-term retention. Journal of Experimental Psychology: Learning, Memory, and Cognition , 33 , 704–719. Karpicke, J. D., & Roediger, H. L., III. (2007b). Repeated retrieval during learning is the key to long-term retention. Journal of Memory and Language , 57 , 151–162. Karpicke, J. D., & Roediger, H. L., III. (2008). The critical impor-tance of retrieval for learning. Science ,
{"source": 2295, "title": "from dpo"}
through the dermis (Hale, 1952), linking primary and secondary ridges and molding the upper portion of the dermis into papillae pegs. Papillae continue to change form even into late adulthood and become complex (Misumi and Akiyoshi, 1984). Although the shape of the epidermal–dermal bound - ary may change over time, the rate of skin cell produc - tion in the basal layer of skin does not become spatially incongruent. It is for this reason that changes in the shape of the basal layer “sheet” do not produce features that ap - pear significantly different on the surface (Figure 3–33). The consistent rate of basal skin cell proliferation in neighbor - ing areas of skin provides consistent unique detail to the surface of skin. The pattern increases many times over in size, but the sequence of ridges never changes throughout fetal and adult life, barring injury or disease that affects the basal layer of skin. # 3.10 Summary: Keys to Uniqueness and Pattern Formation # 3.10.1 Uniqueness As the skin progresses through the entire process of ridge formation (Figure 3–34), many factors contribute to the end result: complete structural uniqueness, from ridge path to ridge shape. Although genetics has been shown to play a role in pattern formation, it does not determine the arrange-ment of minutiae or ridge shapes within the pattern. The mor-phogenesis of these finer details is a product of the unique developmental noise that occurs in that area of skin during the critical period of friction ridge formation. # 3.10.2 Pattern Formation The fetal volar pads play a major role in influencing pattern formation (volar pad symmetry) and ridge count (volar pad size), but the volar pads do not directly cause ridge align - ment. Instead, the volar pads affect the topology of the surface and the overall
{"source": 4211, "title": "from dpo"}
stat that you are calculating could depend on the size of the sample (or the resample). To accurately estimate the distribution of the stat we must use resamples of the same size. The bootstrap has strong theoretic grantees, and is accepted by the scientific community. It breaks down when the underlying distribution has a ``long tail" or if the samples are not I.I.D. Example of p-value calculation We are trying to figure out if people are happier in Bhutan or in Nepal. We sample individuals in Bhutan and individuals in Nepal and ask them to rate their happiness on a scale from 1 to 10. We measure the sample means for the two samples and observe that people in Nepal are slightly happier--the difference between the Nepal sample mean and the Bhutan sample mean is 0.5 points on the happiness scale. If you want to make this claim scientific you should calculate a -value. A p-value is the probability that, when the null hypothesis is true, the statistic measured would be equal to, or more extreme than, than the value you are reporting. The null hypothesis is the hypothesis that there is no relationship between two measured phenomena or no difference between two groups. p pFnF n FFFP (X = k) k ^F F Var( S 2) S 2 > i iS 2 > i nn1 = 200 n2 = 300 p > This is a header 1 In the case of comparing Nepal to Bhutan, the null hypothesis is that there is no difference between the distribution of happiness in Bhutan and Nepal. The null hypothesis argument is: there is no difference in the distribution of happiness between Nepal and Bhutan. When you drew samples, Nepal had a mean that 0.5 points larger than Bhutan by chance. We can
{"source": 6077, "title": "from dpo"}
element. Special relativity explained how the mass defect is related to the energy produced or consumed in reactions. The branch of physics that studies transformations and the structure of nuclei is now called nuclear physics, contrasted to atomic physics that studies the structure and properties of atoms ignoring most nuclear aspects. The development in the nascent quantum physics, such as Bohr model, led to the understanding of chemistry in terms of the arrangement of electrons in the mostly empty volume of atoms. In 1918, Rutherford confirmed that the hydrogen nucleus was a particle with a positive charge, which he named the proton. By then, Frederick Soddy's researches of radioactive elements, and experiments of J. J. Thomson and F.W. Aston conclusively demonstrated existence of isotopes, whose nuclei have different masses in spite of identical atomic numbers. It prompted Rutherford to conjecture that all nuclei other than hydrogen contain chargeless particles, which he named the neutron. Evidences that atomic nuclei consist of some smaller particles (now called nucleons) grew; it became obvious that, while protons repulse each other electrostatically, nucleons attract each other by some new force (nuclear force). It culminated in proofs of nuclear fission in 1939 by Lise Meitner (based on experiments by Otto Hahn), and nuclear fusion by Hans Bethe in that same year. Those discoveries gave rise to an active industry of generating one atom from another, even rendering possible (although it will probably never be profitable) the transmutation of lead into gold; and, those same discoveries also led to the development of nuclear weapons. == Revelations of quantum mechanics == Further understanding of atomic and nuclear structures became impossible without improving the knowledge about the essence of particles. Experiments and improved theories (such as Erwin Schrödinger's "electron waves") gradually revealed that there is no fundamental difference between
{"page_id": 41555255, "title": "History of subatomic physics"}
can be derived only indirectly using involved multivariate statistics or experimental (screening, bioassay) results. All of those descriptors can for reasons of computational effort be stored along with the molecule's representation and usually are. == Similarity == There is no single definition of molecular similarity, however the concept may be defined according to the application and is often described as an inverse of a measure of distance in descriptor space. Two molecules might be considered more similar for instance if their difference in molecular weights is lower than when compared with others. A variety of other measures could be combined to produce a multi-variate distance measure. Distance measures are often classified into Euclidean measures and non-Euclidean measures depending on whether the triangle inequality holds. Maximum Common Subgraph (MCS) based substructure search (similarity or distance measure) is also very common. MCS is also used for screening drug like compounds by hitting molecules, which share common subgraph (substructure). Chemicals in the databases may be clustered into groups of 'similar' molecules based on similarities. Both hierarchical and non-hierarchical clustering approaches can be applied to chemical entities with multiple attributes. These attributes or molecular properties may either be determined empirically or computationally derived descriptors. One of the most popular clustering approaches is the Jarvis-Patrick algorithm. In pharmacologically oriented chemical repositories, similarity is usually defined in terms of the biological effects of compounds (ADME/tox) that can in turn be semiautomatically inferred from similar combinations of physico-chemical descriptors using QSAR methods. == Registration systems == Databases systems for maintaining unique records on chemical compounds are termed as Registration systems. These are often used for chemical indexing, patent systems and industrial databases. Registration systems usually enforce uniqueness of the chemical represented in the database through the use of unique representations. By applying rules of precedence for the
{"page_id": 553787, "title": "Chemical database"}
indexing involves grafting a symptomless plant that is suspected of carrying a virus onto an indicator plant that is very susceptible to the virus. Grafting can transfer chloroplasts (plant organelles that can conduct photosynthesis), mitochondrial DNA and the entire cell nucleus containing the genome to potentially make a new species making grafting a form of natural genetic engineering. == Examples == === White Spruce === White spruce can be grafted with consistent success by using 8–10 cm (3–4 in) scions of current growth on thrifty 4- to 5-year-old rootstock (Nienstaedt and Teich 1972). Before greenhouse grafting, rootstocks should be potted in late spring, allowed to make seasonal growth, then subjected to a period of chilling outdoors, or for about 8 weeks in a cool room at 2 °C (Nienstaedt 1966). A method of grafting white spruce of seed-bearing age during the time of seed harvest in the fall was developed by Nienstaedt et al. (1958). Scions of white spruce of 2 ages of wood from 30- to 60-year-old trees were collected in the fall and grafted by 3 methods on potted stock to which different day-length treatments had been applied prior to grafting. The grafted stock were given long-day and natural-day treatments. Survival was 70% to 100% and showed effects of rootstock and post-grafting treatments in only a few cases. Photoperiod and temperature treatments after grafting, however, had considerable effect on scion activity and total growth. The best post-grafting treatment was 4 weeks of long-day treatment followed by 2 weeks of short-day treatment, then 8 weeks of chilling, and finally long-day treatment. Since grafts of white spruce put on relatively little growth in the 2 years after grafting, techniques for accelerating the early growth were studied by Greenwood (1988) and others. The cultural regimes used to promote one additional growth
{"page_id": 14080493, "title": "Grafting"}
freezing point, but had not associated it with a new phenomenon. Reinitzer perceived that color changes in a derivative cholesteryl benzoate were not the most peculiar feature. He found that cholesteryl benzoate does not melt in the same manner as other compounds, but has two melting points. At 145.5 °C (293.9 °F) it melts into a cloudy liquid, and at 178.5 °C (353.3 °F) it melts again and the cloudy liquid becomes clear. The phenomenon is reversible. Seeking help from a physicist, on March 14, 1888, he wrote to Otto Lehmann, at that time a Privatdozent in Aachen. They exchanged letters and samples. Lehmann examined the intermediate cloudy fluid, and reported seeing crystallites. Reinitzer's Viennese colleague von Zepharovich also indicated that the intermediate "fluid" was crystalline. The exchange of letters with Lehmann ended on April 24, with many questions unanswered. Reinitzer presented his results, with credits to Lehmann and von Zepharovich, at a meeting of the Vienna Chemical Society on May 3, 1888. By that time, Reinitzer had discovered and described three important features of cholesteric liquid crystals (the name coined by Otto Lehmann in 1904): the existence of two melting points, the reflection of circularly polarized light, and the ability to rotate the polarization direction of light. After his accidental discovery, Reinitzer did not pursue studying liquid crystals further. The research was continued by Lehmann, who realized that he had encountered a new phenomenon and was in a position to investigate it: In his postdoctoral years he had acquired expertise in crystallography and microscopy. Lehmann started a systematic study, first of cholesteryl benzoate, and then of related compounds which exhibited the double-melting phenomenon. He was able to make observations in polarized light, and his microscope was equipped with a hot stage (sample holder equipped with a heater) enabling high
{"page_id": 17973, "title": "Liquid crystal"}
of porpoises. A dissection of three Burmeister's porpoises shows that they consume shrimp and euphausiids (krill). A dissection of a beached Vaquita showed remains of squid and grunts. Nothing is known about the diet of the spectacled porpoise. == Interactions with humans == === Research history === In Aristotle's time, the 4th century BCE, porpoises were regarded as fish due to their superficial similarity. Aristotle, however, could already see many physiological and anatomical similarities with the terrestrial vertebrates, such as blood (circulation), lungs, uterus and fin anatomy. His detailed descriptions were assimilated by the Romans, but mixed with a more accurate knowledge of the dolphins, as mentioned by Pliny the Elder in his "Natural history". In the art of this and subsequent periods, porpoises are portrayed with a long snout (typical of dolphins) and a high-arched head. The harbour porpoise was one of the most accessible species for early cetologists, because it could be seen very close to land, inhabiting shallow coastal areas of Europe. Much of the findings that apply to all cetaceans were first discovered in porpoises. One of the first anatomical descriptions of the airways of the whales on the basis of a harbor porpoise dates from 1671 by John Ray. It nevertheless referred to the porpoise as a fish, most likely not in the modern-day sense, where it refers to a zoological group, but the older reference as simply a creature of the sea (cf. for example star-fish, cuttle-fish, jelly-fish and whale-fish). === In captivity === Harbour porpoises have historically been kept in captivity, under the assumption that they would fare better than their dolphin counterparts due to their smaller size and shallow-water habitats. Up until the 1980s, they were consistently short-lived. Harbour porpoises have a very long captive history, with poorly documented attempts as early
{"page_id": 46037, "title": "Porpoise"}
diversifications of any group, probably fueled by the diversification of fruit-bearing trees and associated insects, and the modern bird groups had likely already diverged within four million years of the K–Pg extinction event. However, the fossil record of birds in the Paleocene is rather poor compared to other groups, limited globally to mainly waterbirds such as the early penguin Waimanu. The earliest arboreal crown group bird known is Tsidiiyazhi, a mousebird dating to around 62 mya. The fossil record also includes early owls such as the large Berruornis from France, and the smaller Ogygoptynx from the United States. Almost all archaic birds (any bird outside Neornithes) went extinct during the K–Pg extinction event, although the archaic Qinornis is recorded in the Paleocene. Their extinction may have led to the proliferation of neornithine birds in the Paleocene, and the only known Cretaceous neornithine bird is the waterbird Vegavis, and possibly also the waterbird Teviornis. In the Mesozoic, birds and pterosaurs exhibited size-related niche partitioning—no known Late Cretaceous flying bird had a wingspan greater than 2 m (6 ft 7 in) nor exceeded a weight of 5 kg (11 lb), whereas contemporary pterosaurs ranged from 2–10 m (6 ft 7 in – 32 ft 10 in), probably to avoid competition. Their extinction allowed flying birds to attain greater size, such as pelagornithids and pelecaniformes. The Paleocene pelagornithid Protodontopteryx was quite small compared to later members, with a wingspan of about 1 m (3.3 ft), comparable to a gull. On the archipelago-continent of Europe, the flightless bird Gastornis was the largest herbivore at 2 m (6 ft 7 in) tall for the largest species, possibly due to lack of competition from newly emerging large mammalian herbivores which were prevalent on the other continents. The carnivorous terror birds in South America have a contentious
{"page_id": 18953024, "title": "Paleocene"}
A clock generator is an electronic oscillator that produces a clock signal for use in synchronizing a circuit's operation. The output clock signal can range from a simple symmetrical square wave to more complex arrangements. The basic parts that all clock generators share are a resonant circuit and an amplifier. The resonant circuit is usually a quartz piezo-electric oscillator, although simpler tank circuits and even RC circuits may be used. The amplifier circuit usually inverts the signal from the oscillator and feeds a portion back into the oscillator to maintain oscillation. The generator may have additional sections to modify the basic signal. The 8088 for example, used a 2/3 duty cycle clock, which required the clock generator to incorporate logic to convert the 50/50 duty cycle which is typical of raw oscillators. Other such optional sections include frequency divider or clock multiplier sections. Programmable clock generators allow the number used in the divider or multiplier to be changed, allowing any of a wide variety of output frequencies to be selected without modifying the hardware. The clock generator in a motherboard is often changed by computer enthusiasts to control the speed of a CPU, FSB, GPU or RAM. Typically the programmable clock generator is set by the BIOS at boot time to the selected value; although some systems have dynamic frequency scaling, which frequently re-programs the clock generator. == Timing-signal generators (TSGs) == TSGs are clocks that are used throughout service-provider networks, frequently as the building integrated timing supply (BITS) for a central office. Digital switching systems and some transmission systems (e.g., SONET, RREX, LUBI) depend on reliable, high-quality synchronization (or timing) to prevent impairments. To provide this, most service providers use interoffice synchronization distribution networks based on the stratum hierarchy and implement the BITS concept to meet intraoffice synchronization needs.
{"page_id": 379803, "title": "Clock generator"}
products. Remilk, based in Israel, is a startup attempting to create milk proteins from bioengineered yeast. In 2022 it had received FDA approval for its products. Wilk, based in Israel, is a startup attempting to produce human mother milk ingredients using cells from breast reduction surgeries, to supplement infant formulas. NewMoo, based in Israel, is a startup attempting to create casein protein within the seeds of genetically modified plants. Real Deal Milk, based in Spain, is a startup attempting to create milk proteins from bioengineered microbes. Opalia, based in Canada, is a startup attempting to produce milk from cows' mammary cells. De Novo Foodlabs, based in Raleigh, North Carolina and Cape Town, South-Africa, is a startup producing nature-identical milk ingredients, such as lactoferrin, using precision fermentation. Cultivated Biosciences, based in Switzerland, is a startup attempting to produce fats from non-GMO yeast to make plant based milk more creamy. Naturopy, based in France, is a startup attempting to create milk proteins from bioengineered yeast. === Eggs === The EVERY Company is a San Francisco-based startup that started as the New Harvest Egg Project and was incubated by IndieBio in 2015. The EVERY Company is making egg whites from yeast instead of eggs. === Gelatin === Geltor is a San Francisco-based startup that was incubated by IndieBio in 2015. Geltor is developing a proprietary protein production platform that uses bacteria and yeast to produce gelatin. === Coffee === In 2021, media outlets reported that the world's first synthetic coffee products have been created by two biotechnology companies, still awaiting regulatory approvals for near-term commercialization. Such products – which can be produced via cellular agriculture in bioreactors and for which multiple companies' R&D have acquired substantial funding – may have equal or highly similar effects, composition and taste as natural products but use
{"page_id": 51277173, "title": "Cellular agriculture"}
red nova. Archival Hubble and Spitzer images of NGC 3184 seem to show no progenitor for optical transient SN 2010dn. SN 2010dn is just like SN 2008S and NGC 300-OT. On day 2, SN 2010dn had an unfiltered magnitude of 17.1, corresponding to a peak absolute magnitude of roughly -13.3. == See also == Pinwheel Galaxy Bode's galaxy Cigar galaxy NGC 2787 Messier 83 == References == == External links == NASA Astronomy Picture of the Day: Spiral Galaxy NGC 3184 (20 September 2000) Spiral Galaxy NGC 3184 & Supernova 1999gi (20-inch F/8.1 Ritchey Chretien Cassegrain) Supernova 1999gi in NGC 3184 (supernovae.net) Discovery image of SN2010dn (2010-05-31 mag 17.5) / Wikisky DSS2 and SDSS zoom-in of the same region
{"page_id": 983873, "title": "NGC 3184"}
be: a tree a square grid, a bi-connected graph. Another set of variations consider the case in which some or all of the pebbles are unlabeled and interchangeable. Other versions of the problem seek not only to prove reachability but to find a (potentially optimal) sequence of moves (i.e. a plan) which performs the transformation. == Complexity == Finding the shortest solution sequence in the pebble motion on graphs problem (with labeled pebbles) is known to be NP-hard and APX-hard. The unlabeled problem can be solved in polynomial time when using the cost metric mentioned above (minimizing the total number of moves to adjacent vertices), but is NP-hard for other natural cost metrics. == References ==
{"page_id": 24615296, "title": "Pebble motion problems"}
References: ‣ 3 Operationalizing CRScore ‣ CRScore: Grounding Automated Evaluation of Code Review Comments in Code Claims and Smells"), and 3. We picked this model because it has the best performance, as of July 2024, on English STS on the MTEB benchmark Muennighoff et al. (2022 and review sentences (r-sents), excluding the stopwords and pooling the rest of the token embeddings to build representations for the whole sentence. Then we compute STS scores with these sentence embeddings via pair-wise cosine similarity s⁢()𝑠 s()italic_s ( ) between the p-refs (𝒫 𝒫\mathcal{P}caligraphic_P) and r-sents (ℛ ℛ\mathcal{R}caligraphic_R). The Conciseness (C⁢o⁢n 𝐶 𝑜 𝑛 Con italic_C italic_o italic_n) which is computed as: C⁢o⁢n=∑r∈ℛ I⁢[max p∈𝒫⁡s⁢(c,r)>τ]|ℛ|𝐶 𝑜 𝑛 subscript 𝑟 ℛ 𝐼 delimited-[]subscript 𝑝 𝒫 𝑠 𝑐 𝑟 𝜏 ℛ Con=\frac{\sum_{r\in\mathcal{R}}I[\max_{p\in\mathcal{P}}s(c,r)>\tau]}{|% \mathcal{R}|}italic_C italic_o italic_n = divide start_ARG ∑ start_POSTSUBSCRIPT italic_r ∈ caligraphic_R end_POSTSUBSCRIPT italic_I [ roman_max start_POSTSUBSCRIPT italic_p ∈ caligraphic_P end_POSTSUBSCRIPT italic_s ( italic_c , italic_r ) > italic_τ ] end_ARG start_ARG | caligraphic_R | end_ARG(1) represents the fraction of r-sents from the model-generated review with greater similarity to any p-ref above a threshold τ 𝜏\tau italic_τ. Here, I 𝐼 I italic_I is an indicator variable such that: I⁢[x]={1,if x is true 0,otherwise 𝐼 delimited-[]𝑥 cases 1 if x is true 0 otherwise I[x]=\begin{cases}1,&\text{if $x$ is true}\\ 0,&\text{otherwise}\end{cases}italic_I [ italic_x ] = { start_ROW start_CELL 1 , end_CELL start_CELL if italic_x is true end_CELL end_ROW start_ROW start_CELL 0 , end_CELL start_CELL otherwise end_CELL end_ROW C⁢o⁢n 𝐶 𝑜 𝑛 Con italic_C italic_o italic_n resembles precision as it captures the fraction of r-sents (candidate set)
{"source": 992, "title": "from dpo"}
the world we want to live in.","2" "Mybridge"," Science"",Programming,""Software Development"",""Web Development""}","206","2.69528301886792","Python Top 10 Articles (v.November)","In this observation, we ranked nearly 1,500 articles posted in October-November 2016 about Python and Data Science. (0.67% chance) Mybridge AI ranks the best articles for professionals. Hopefully this condensed reading list will help learn more productively in the area of Python. Data Mining in Python: A Guide Python cheatsheet Open-source home automation platform running on Python 3 [4710 stars on Github] How to Build Your Own Self Driving Toy Car with Python, Raspberry Pi OpenCV, TensorFlow. …….…….…….…….……..[Code on Github] NumPy Tutorial: Data analysis with Python The Comprehensive Introduction To Your Genome With the SciPy Stack. Introduction — Learn Python for Data Science #1. Image Processing with Numpy Become a pdb power-user: Python Debugging. Courtesy of Ashwini Chaudhary Web scraping and parsing with Beautiful Soup & Python Introduction p.1 StackOverflow Importer: Import code from Stack Overflow as Python modules [1147 stars on Github] Clairvoyant: Software designed to identify and monitor social/historical cues for short term stock movement [830 stars on Github] The Python Bible: Build 11 Projects and Go from Beginner to Pro with Python Programming [5778 recommends, 4.7/5 star] That’s it for Python Monthly Top 10. If you like this curation, read daily Top 10 articles based on your programming skills on our iOS app.","7" "akelleh"," Science"",Data,Statistics,Tech,Logic}","202","8.99150943396226","If Correlation Doesn’t Imply Causation, Then What Does?","We’ve all heard in school that “correlation does not imply causation,” but what does imply causation?! The gold standard for establishing cause and effect is a double-blind controlled trial (or the AB test equivalent). If you’re working with a system on which you can’t perform experiments, is all hope for scientific progress lost? Can we ever understand systems that we have limited or no control over? This would be a very bleak
{"source": 2757, "title": "from dpo"}
Overview > FY 2007–2008 FY 2006–2007 Goodwill Revenues Retail Stores $20,920,001 $20,048,814 Education, Training & Employment $ 211,796 $ 174,597 Salvage/Recycling $ 3,012,885 $ 2,579,886 Corporate Services $ 1,069,851 $ 472,864 Public Support $ 2,843,483 $ 3,094,790 Total Revenue $28,058,016 $26,370,951 > Goodwill Expenses Education, Training & Employment (includes collecting, processing, selling donated goods) $18,853,894 $17,415,497 Fundraising $ 26,419 $ 189,646 Operating Expenses $ 5,090,583 $ 3,439,955 Occupancy $ 3,909,105 $ 3,691,013 Investment in Plant & Facilities $ 1,078,884 $ 1,020,244 Total Expenses $28,958,885* $25,756,355 Surplus (Deficit) ($900,869) $ 614,596 > *87% of this figure equals direct services and 13% equals overhead. > Source: Company documents. Job Development and Placement Services The normal competitors for Goodwill programs were nonprofit and government-run workforce development programs. Goodwill has adopted a “coopetition” strategy, how-ever, in which it has reached out to former competitors to develop collaborations that can provide mutual and community benefits. Goodwill now partners with former competitors, such as Jewish Vocational Services and Rubicon, in the new city-sponsored One-Stop System to increase job training services and placements for San Francisco residents. The greatest threat to the job placement industry is a national economy in crisis. It is likely that many of the hotels, retail stores, and transport companies will be forced to reduce staffing levels during the recession. According to the Wall Street Journal (March 6, 2009), “U.S. nonfarm payrolls dropped 651,000 in February, almost right on expectations of a 652,000 loss. The unemployment rate rose to 8.1%, from 7.6% in January. The jobless rate is the highest since 1983. The economy has now shed 4.4 million jobs since the reces-sion began in December 2007, with almost half of those losses occurring in the last three months alone.” That high rate of increase has not been seen since World War II.
{"source": 4976, "title": "from dpo"}
of our experimental results, then we can repeat the experiment many times (corresponding to a large $n$), and then the sample average will have a small variance. \begin{eg} Let $X_i$ be iid $B(1, p)$, i.e.\ $\P(1) = p$ and $\P(0) = 1 - p$. Then $Y = X_1 + X_2 + \cdots + X_n \sim B(n, p)$. Since $\var(X_i) = \E[X_i^2] - (\E[X_i])^2 = p - p^2 = p(1 - p)$, we have $\var (Y) = np(1 - p)$. \end{eg} \begin{eg} Suppose we have two rods of unknown lengths $a, b$. We can measure the lengths, but is not accurate. Let $A$ and $B$ be the measured value. Suppose \[ \E[A] = a,\quad \var(A) = \sigma^2 \] \[ \E[B] = b, \quad \var(B) = \sigma^2. \] We can measure it more accurately by measuring $X = A + B$ and $Y = A - B$. Then we estimate $a$ and $b$ by \[ \hat{a} = \frac{X + Y}{2},\; \hat{b} = \frac{X - Y}{2}. \] Then $\E[\hat{a}] = a$ and $\E[\hat{b}] = b$, i.e.\ they are unbiased. Also \[ \var (\hat{a}) = \frac{1}{4}\var(X + Y) = \frac{1}{4}2\sigma^2 = \frac{1}{2}\sigma^2, \] and similarly for $b$. So we can measure it more accurately by measuring the sticks together instead of separately. \end{eg} \subsection{Inequalities} Here we prove a lot of different inequalities which may be useful for certain calculations. In particular, Chebyshev's inequality will allow us to prove the weak law of large numbers. \begin{defi}[Convex function] A function $f: (a, b) \to \R$ is \emph{convex} if for all $x_1, x_2\in (a, b)$ and $\lambda_1, \lambda_2 \geq 0$ such that $\lambda_1 + \lambda_2 = 1$,\[ \lambda_1f(x_1) + \lambda_2 f(x_2) \geq f(\lambda_1x_1 + \lambda_2 x_2). \] It is \emph{strictly convex} if the inequality above is strict (except when $x_1 = x_2$ or $\lambda_1$ or $\lambda_2 =
{"source": 6298, "title": "from dpo"}
Slip bands or stretcher-strain marks are localized bands of plastic deformation in metals experiencing stresses. Formation of slip bands indicates a concentrated unidirectional slip on certain planes causing a stress concentration. Typically, slip bands induce surface steps (e.g., roughness due persistent slip bands during fatigue) and a stress concentration which can be a crack nucleation site. Slip bands extend until impinged by a boundary, and the generated stress from dislocations pile-up against that boundary will either stop or transmit the operating slip depending on its (mis)orientation. Formation of slip bands under cyclic conditions is addressed as persistent slip bands (PSBs) where formation under monotonic condition is addressed as dislocation planar arrays (or simply slip-bands, see Slip bands in the absence of cyclic loading section). Slip-bands can be simply viewed as boundary sliding due to dislocation glide that lacks (the complexity of ) PSBs high plastic deformation localisation manifested by tongue- and ribbon-like extrusion. And, where PSBs normally studied with (effective) Burgers vector aligned with the extrusion plane because a PSB extends across the grain and exacerbates during fatigue; a monotonic slip-band has a Burger’s vector for propagation and another for plane extrusions both controlled by the conditions at the tip. == Persistent slip bands (PSBs) == Persistent slip-bands (PSBs) are associated with strain localisation due to fatigue in metals and cracking on the same plane. Transmission electron microscopy (TEM) and three-dimensional discrete dislocation dynamics (DDD) simulation were used to reveal and understand dislocations type and arrangement/patterns to relate it to the sub-surface structure. PSB – ladder structure – is formed mainly from low-density channels of mobile gliding screw dislocation segments and high-density walls of dipolar edge dislocation segments piled up with tangled bowing-out edge segment and different sizes of dipolar loops scattered between the walls and channels. One type of
{"page_id": 71906761, "title": "Slip bands in metals"}
or evil are: Disobedience (41), Vanity (44), Vulgarity (49), Theft (52), Lying (58), Drunkenness (62), Debt (69), Murder (73), Rage (84), Greed (92), Pride (95), and Lust (99). == Gameplay == Each player starts with a token on the starting square (usually the "1" grid square in the bottom left corner, or simply, at the edge of the board next to the "1" grid square). Players take turns rolling a single die to move their token by the number of squares indicated by the die rolled. Tokens follow a fixed route marked on the gameboard which usually follows a boustrophedon (ox-plow) track from the bottom to the top of the playing area, passing once through every square. If, on completion of a move, a player's token lands on the lower-numbered end of a "ladder", the player moves the token up to the ladder's higher-numbered square. If the player lands on the higher-numbered square of a "snake" (or chute), the player moves the token down to the snake's lower-numbered square. If a 6 is rolled, the player, after moving, immediately rolls again for another turn; otherwise play passes to the next player in turn. The player who is first to bring their token to the last square of the track is the winner. === Variations === Variants exists where a player must roll the exact number to reach the final square. Depending on the variation, if the die roll is too large, the token either remains in place or goes off the final square and back again. (For example, if a player requiring a 3 to win rolls a 5, the token moves forward three spaces, then back two spaces.) In certain circumstances (such as a player rolling a 5 when a 1 is required to win), a player can end
{"page_id": 38372, "title": "Snakes and ladders"}
Initial in vitro studies demonstrated bovine capillary endothelial cells will proliferate and show signs of tube structures upon stimulation by VEGF and bFGF, although the results were more pronounced with VEGF. Upregulation of VEGF is a major component of the physiological response to exercise and its role in angiogenesis is suspected to be a possible treatment in vascular injuries. In vitro studies clearly demonstrate that VEGF is a potent stimulator of angiogenesis because, in the presence of this growth factor, plated endothelial cells will proliferate and migrate, eventually forming tube structures resembling capillaries. VEGF causes a massive signaling cascade in endothelial cells. Binding to VEGF receptor-2 (VEGFR-2) starts a tyrosine kinase signaling cascade that stimulates the production of factors that variously stimulate vessel permeability (eNOS, producing NO), proliferation/survival (bFGF), migration (ICAMs/VCAMs/MMPs) and finally differentiation into mature blood vessels. Mechanically, VEGF is upregulated with muscle contractions as a result of increased blood flow to affected areas. The increased flow also causes a large increase in the mRNA production of VEGF receptors 1 and 2. The increase in receptor production means muscle contractions could cause upregulation of the signaling cascade relating to angiogenesis. As part of the angiogenic signaling cascade, NO is widely considered to be a major contributor to the angiogenic response because inhibition of NO significantly reduces the effects of angiogenic growth factors. However, inhibition of NO during exercise does not inhibit angiogenesis, indicating there are other factors involved in the angiogenic response. ==== Angiopoietins ==== The angiopoietins, Ang1 and Ang2, are required for the formation of mature blood vessels, as demonstrated by mouse knock out studies. Ang1 and Ang2 are protein growth factors which act by binding their receptors, Tie-1 and Tie-2; while this is somewhat controversial, it seems that cell signals are transmitted mostly by Tie-2; though some
{"page_id": 64972, "title": "Angiogenesis"}
mechanisms that cause particles to be heated and accelerated as solar wind. During its seven-year mission, the probe will make twenty-four orbits of the Sun, passing further into the corona with each orbit's perihelion, ultimately passing within 0.04 astronomical units of the Sun's surface. It is the first NASA spacecraft named for a living person, and Parker, at age 91, was on hand to observe the launch. == Acceleration mechanism == While early models of the solar wind relied primarily on thermal energy to accelerate the material, by the 1960s it was clear that thermal acceleration alone cannot account for the high speed of solar wind. An additional unknown acceleration mechanism is required and likely relates to magnetic fields in the solar atmosphere. The Sun's corona, or extended outer layer, is a region of plasma that is heated to over a megakelvin. As a result of thermal collisions, the particles within the inner corona have a range and distribution of speeds described by a Maxwellian distribution. The mean velocity of these particles is about 145 km/s, which is well below the solar escape velocity of 618 km/s. However, a few of the particles achieve energies sufficient to reach the terminal velocity of 400 km/s, which allows them to feed the solar wind. At the same temperature, electrons, due to their much smaller mass, reach escape velocity and build up an electric field that further accelerates ions away from the Sun. The total number of particles carried away from the Sun by the solar wind is about 1.3×1036 per second. Thus, the total mass loss each year is about (2–3)×10−14 solar masses, or about 1.3–1.9 million tonnes per second. This is equivalent to losing a mass equal to the Earth every 150 million years. However, since the Sun's formation, only about
{"page_id": 28538, "title": "Solar wind"}
Orion Co., Ltd. (オリオン電機株式会社, Orion Denki Kabushiki-gaisha) was a Japanese consumer electronics company that was established in 1958 in Osaka, Japan. Their devices were branded as "Orion". == History == Orion Co., Ltd. was founded as Orion Electric Co., Ltd. in 1958 in Osaka, Japan, by Shigemasa Otake. The company initially produced transistor radios, audiocassette recorders, and CB radio transceivers. Later audio products included 8-track players, car stereos, and home stereo systems.: 166 From 1984 to their acquisition, their headquarters were based in Echizen, Fukui, Japan. Before their acquisition, they were of the world's largest OEM television and video equipment manufacturers, primarily supplying major-brand OEM customers, with Toshiba being its major customer in the 2000s. Orion produced around six million televisions and twelve million DVD player and TV combo units each year until 2019. Most of their products were manufactured in Thailand. The Orion Group employed in excess of 9,000 workers. They had factories and offices in Japan, Thailand, Poland, the United Kingdom, and the United States. Orion's flagship factories in Thailand were one of Thailand's top exporters, and they were recognized with an award from the Thai Government for their contribution. Orion manufactured products primarily for Emerson, Memorex, Hitachi, JVC, and Sansui. In the North American market, Orion manufactured many televisions and VCRs for Emerson Radio during the 1980s and 1990s, but when Emerson Radio filed for bankruptcy in 2000, rights to the Emerson brand were sold to Orion's primary competitor, Funai, for use in home video equipment. During the 1990s, Orion and another of their brand names, World, were exclusively sold by Wal-Mart. The products sold consisted of discounted televisions, TV/VCR combos, and VHS players. In 2001, at its peak, Orion partnered with Toshiba and Sumitomo to manufacture smaller CRT and LCD televisions, combo televisions, and DVD/VCR combos
{"page_id": 3202164, "title": "Orion Electric"}
this by doing a texture lookup and bilinear filtering on the two closest mipmap levels (one higher and one lower quality), and then linearly interpolating the results. This results in a smooth degradation of texture quality as distance from the viewer increases, rather than a series of sudden drops. Of course, closer than Level 0 there is only one mipmap level available, and the algorithm reverts to bilinear filtering. === Anisotropic filtering === Anisotropic filtering is the highest quality filtering available in current consumer 3D graphics cards. Simpler, "isotropic" techniques use only square mipmaps which are then interpolated using bi– or trilinear filtering. (Isotropic means same in all directions, and hence is used to describe a system in which all the maps are squares rather than rectangles or other quadrilaterals.) When a surface is at a high angle relative to the camera, the fill area for a texture will not be approximately square. Consider the common case of a floor in a game: the fill area is far wider than it is tall. In this case, none of the square maps are a good fit. The result is blurriness and/or shimmering, depending on how the fit is chosen. Anisotropic filtering corrects this by sampling the texture as a non-square shape. The goal is to sample a texture to match the pixel footprint as projected into texture space, and such a footprint is not always axis aligned to the texture. Further, when dealing with sample theory a pixel is not a little square therefore its footprint would not be a projected square. Footprint assembly in texture space samples some approximation of the computed function of a projected pixel in texture space but the details are often approximate, highly proprietary and steeped in opinions about sample theory. Conceptually though the goal is
{"page_id": 877342, "title": "Texture filtering"}
of the bright star Canopus. It traditionally marked the sounding line of the ship Argo Navis, before the constellation was split. The star has an apparent visual magnitude of 3.861, so is visible to the naked eye under good conditions, though light pollution may result in stars dimmer than magnitude 3 being too dim to see. It is the second brightest in its constellation, exceeded only by Alpha Pictoris, which has an apparent magnitude of 3.30. The distance to Beta Pictoris and many other stars was measured by the Hipparcos satellite. This was done by measuring its trigonometric parallax: the slight displacement in its position observed as the Earth moves around the Sun. Beta Pictoris was found to exhibit a parallax of 51.87 milliarcseconds, a value which was later revised to 51.44 milliarcseconds when the data was reanalyzed taking systematic errors more carefully into account. The distance to Beta Pictoris is therefore 63.4 light years, with an uncertainty of 0.1 light years. The Hipparcos satellite also measured the proper motion of Beta Pictoris: it is traveling eastwards at a rate of 4.65 milliarcseconds per year, and northwards at a rate of 83.10 milliarcseconds per year. Measurements of the Doppler shift of the star's spectrum reveals it is moving away from Earth at a rate of 20 km/s. Several other stars share the same motion through space as Beta Pictoris and likely formed from the same gas cloud at roughly the same time: these comprise the Beta Pictoris moving group. == Physical properties == === Spectrum, luminosity and variability === According to measurements made as part of the Nearby Stars Project, Beta Pictoris has a spectral type of A6V and has an effective temperature of 8,052 K (7,779 °C; 14,034 °F), which is hotter than the Sun's 5,778 K (5,505 °C;
{"page_id": 656713, "title": "Beta Pictoris"}
Discovery Investigations – A series of scientific cruises and shore-based investigations into the biology of whales in the Southern Ocean European Consortium for Ocean Research Drilling – A consortium of 14 European countries and Canada that was formed in 2003 to join the Integrated Ocean Drilling Program European Multidisciplinary Seafloor and water column Observatory – A large-scale European distributed Research Infrastructure for ocean observation Expocode – A unique alphanumeric identifier for cruise labels of research vessels to avoid confusion in oceanographic data management. FESOM – A multi-resolution ocean general circulation model that solves the equations of motion describing the ocean and sea ice using finite-element and finite-volume methods on unstructured computational grids Finite Volume Community Ocean Model – A prognostic, unstructured-grid, free-surface, 3-D primitive equation coastal ocean circulation model General Bathymetric Chart of the Oceans – A publicly available bathymetric chart of the world's oceans General circulation model – A type of climate model that uses the Navier–Stokes equations on a rotating sphere with thermodynamic terms for various energy sources Geochemical Ocean Sections Study – A global survey of the three-dimensional distributions of chemical, isotopic, and radiochemical tracers in the ocean Geotraces – International research programme to improve understanding of biogeochemical cycles in the oceans Glacio-geological databases – Data on glacially associated sedimentary deposits and erosion activity from former and current ice-sheets Global Drifter Program – Collecting measurements of surface ocean currents, sea surface temperature and sea-level atmospheric pressure using drifters Global Historical Climatology Network – A database of temperature, precipitation and pressure records Global Ocean Data Analysis Project – A synthesis project bringing together oceanographic data Global Ocean Ecosystem Dynamics – A core project for understanding how global change will affect the abundance, diversity and productivity of marine populations Global Ocean Observing System – A global system for sustained
{"page_id": 16686748, "title": "Outline of oceanography"}
ISOGG (International Society of Genetic Genealogy) for genetic genealogy companies. == Notes and references == Kayser et al. (2004), A Comprehensive Survey of Human Y-Chromosomal Microsatellites Am. J. Hum. Genet., 74 1183–1197. NB online only data file Krahn, Thomas. "Y-STR fingerprint - Panels" (PDF). Price List DNA-Fingerprint - Genealogy Testing Services. Archived from the original (PDF) on 27 March 2023. Retrieved 11 August 2012. Butler, John M. (9 January 2012). "Y-Chromosome STRs". Short Tandem Repeat DNA. NIST Standard Reference Database SRD 130. Archived from the original on 5 Feb 2023. Retrieved 11 August 2012. Butler, John; Kline, Decker (2009-06-29). "Summary List of Y Chromosome STR Loci and Available Fact Sheets". NIST Standard Reference Database SRD 130. Archived from the original on 9 June 2019. Retrieved 11 August 2012. == See also == List of Y-DNA single-nucleotide polymorphisms List of X-STR markers == External links == Y STR fact sheet Y-DNA Testing Company STR Marker Comparison Chart SMGF Y Marker Details
{"page_id": 2307089, "title": "List of Y-STR markers"}
Signal, March 2015, Yavapai Amateur Radio Club, W7YRC; ARCI NEWS, Vol. 27, Issue 6, December 2007, Antique Radio Club of Illinois; Contester's Rate Sheet, a publication of the American Radio Relay League; The Keynote, the journal of the International Morse Preservation Society (FISTS); Carbonear Heritage Society, Carbonear, Newfoundland. In April 2013 the staff of the K9YA Telegraph released their fully revised fifth edition of the book, The Art & Skill of Radio-Telegraphy (ISBN 978-1-300-60870-7) by William Pierpont, NØHFF. K9YA Telegraph motto: The Good News About Amateur Radio == External links == Official Website: K9YA Telegraph Index Back Issues Don Keith Website FISTS - The International Morse Preservation Society QTH.NET - Amateur radio e-mail reflectors on various topics Radio Society Great Britain (RSGB) - Publisher of RadCom The Role of Radio in Rescuing the Survivors of the Airship Italia; Harvey M. Solomon & Philip Cala-Lazar; Polar Research, Volume 27, Issue 1, 2008. Pages: 73–74
{"page_id": 8375608, "title": "K9YA Telegraph"}
effectiveness of the proposed similarity measures was compared to the state-of-the-art sentence level embeddings (_Sentence-BERT_) and sentence-level similarity measure (_BERTScore_). The results show that the proposed similarity measures outperform these methods in the ontology lexicalization task. In this study, the _M−ATOLL_ framework has been used as a case study. However, any other ontology lexicalization frameworks can be used in conjunction with the proposed solution as it is orthogonal to all of them. The remainder of the paper is structured as follows. Some related studies about ontology lexicalization are presented in Section 2. The architecture of the proposed solution is described in Section 3. In Section 4, the effectiveness of the proposed approach is evaluated. Finally, conclusions and future work are presented in Section 5. Access through your organization -------------------------------- Check access to the full text by signing in through your organization. Access through **your organization** of a triple is considered as the true positive candidate for the predicate of that triple. These approaches differ in the way of constructing patterns between the entity pair of the extracted sentences. These patterns can be divided into three categories: textual, The proposed approach --------------------- In order to present the proposed approach better, the _M−ATOLL_ framework is used as a case study, which is one of the most widely used ontology lexicalization frameworks (Walter et al., 2014). In the following, preliminary concepts and definitions are presented first. Next, an overview of _M−ATOLL_ is shown. Finally, the proposed solution is presented. Experiments and results ----------------------- In order to demonstrate the positive effects of the
{"source": 1422, "title": "from dpo"}
in the buffer reacts with the added acid (or base). 14.7 Acid-Base Titrations A titration curve is a graph that relates the change in pH of an acidic or basic solution to the volume of added titrant. The characteristics of the titration curve are dependent on the specific solutions being titrated. The pH of the solution at the equivalence point may be greater than, equal to, or less than 7.00. The choice of an indicator for a given titration depends on the expected pH at the equivalence point of the titration, and the range of the color change of the indicator. # Exercises 14.1 Brønsted-Lowry Acids and Bases 1. Write equations that show NH 3 as both a conjugate acid and a conjugate base. 2. Write equations that show H2 PO 4 − acting both as an acid and as a base. 3. Show by suitable net ionic equations that each of the following species can act as a Brønsted-Lowry acid: (a) H3 O+ (b) HCl (c) NH 3 (d) CH 3CO 2H(e) NH 4 + (f) HSO 4 − 4. Show by suitable net ionic equations that each of the following species can act as a Brønsted-Lowry acid: (a) HNO 3 (b) PH 4 + (c) H 2S(d) CH 3CH 2COOH (e) H2 PO 4 − (f) HS − 5. Show by suitable net ionic equations that each of the following species can act as a Brønsted-Lowry base: (a) H 2O(b) OH − (c) NH 3 (d) CN − (e) S 2− (f) H2 PO 4 − > 842 Chapter 14 | Acid-Base Equilibria This content is available for free at 6. Show by suitable net ionic equations that each of the following species can act as a Brønsted-Lowry base: (a) HS − (b) PO 4 3− (c)
{"source": 3700, "title": "from dpo"}
of at least 2048 bits with no upper limit. Question/Problem Several NIST standards and the CMVP Guidance imply various restrictions on the sizes of the RSA moduli approved for use in the RSA signature generation and the RSA signature verification algorithms. FIPS 186-4 approves the use of three modulus sizes: 1024, 2048, and 3072 bits. There is also an older standard, FIPS 186-2, which defers to an ANSI standard X9.31 . The latter standard permits the use of the RSA modulus sizes that can be represented as 1024 + 256* s bits, where s is a non-negative integer. The algorithm transition standard SP 800-131Arev2 approves, for signature generation, all RSA modulus sizes of at least 2048 bits. Finally, FIPS 186-5 permits an RSA signature generation and/or verification modulus bit size to be any integer no smaller than 2048. In view of these restrictions placed into different documents, which modulus sizes can be used in the approved mode (a) when generating the RSA signatures and (b) when verifying the RSA signatures? What sizes of the RSA auxiliary primes defined in Appendix A.1.1 of FIPS 186-5 are acceptable for a given size of the RSA primes whose product produces an RSA modulus? What is the minimum number of the Miller-Rabin tests used when performing the probabilistic primality testing? Shall the method of Appendix C of FIPS 186-5 for computing this number be followed? Resolution Signature and key generation. When performing an RSA signature generation in compliance with FIPS 186-5 , a module may use any modulus size greater than or equal to 2048 bits. At least one of the RSA modulus lengths supported by the module for RSA signature generation shall be 2048, 3072, or 4096 bits. This guarantees that CAVP testing can be performed with at least one implemented RSA modulus
{"source": 5751, "title": "from dpo"}
zero. Therefore, we must have r1 − s1 = 0, r2 − s2 = 0 , . . . , r n − sn = 0, or equivalently that r1 = s1, r 2 = s2, . . . , r n = sn. Therefore, the linear combinations r1v1 + r2v2 + · · · + rnvn = x s1v1 + s2v2 + · · · + snvn = x are actually the same. Therefore, each x ∈ span {v1, v2, . . . , vn} can be written uniquely in terms of {v1, v2, . . . , vn}, and thus {v1, v2, . . . , vn} is a linearly independent set. Because of Theorem 6.3 , an alternative definition of linear independence of a set of vectors {v1, v2, . . . , vn} is that the vector equation x1v1 + x2v2 + · · · + xnvn = 0 has only the trivial solution, i.e., the solution x1 = x2 = · · · = xn = 0. Thus, if {v1, v2, . . . , vn} is linearly dependent, then there exist scalars x1, x 2, . . . , x n not all zero such that x1v1 + x2v2 + · · · + xnvn = 0. Hence, if we suppose for instance that xn 6 = 0 then we can write vn in terms of the vectors v1, . . . , vn−1 as follows: vn = − x1 > xn v1 − x2 > xn v2 − · · · − xn−1 > xn vn−1. In other words, vn ∈ span {v1, v2, . . . , vn−1}.According to Theorem 6.3 , the set of vectors {v1, v2, . . . , vn} is linearly independent if the equation x1v1 + x2v2
{"source": 6828, "title": "from dpo"}
The Long Path laser was an early high energy infrared laser at the Lawrence Livermore National Laboratory used to study inertial confinement fusion. Long path was completed in 1972 and was the first ICF laser ever to use neodymium doped glass as the lasing medium. It was capable of delivering about 50 joules of light at 1,062 nm onto a target in ~10 ns pulses. It did not use spatial filters to smooth the beam after amplification stages and thus had a fairly poor beam quality. Long path was mostly used to investigate laser energy absorption in deuterated plastic targets. == See also == Laser Lawrence Livermore National Laboratory List of laser articles List of laser types == External links == "Empowering Light--Historic Accomplishments in Laser Research: 50 Years of Science". Science & Technology Review. Lawrence Livermore National Laboratory. July 8, 2003. Archived from the original on 2004-11-09.
{"page_id": 7362109, "title": "Long path laser"}
of molecules, including porphyrins, carotenoids, and anthocyanins. All biological pigments selectively absorb certain wavelengths of light while reflecting others. The light that is absorbed may be used by the plant to power chemical reactions, while the reflected wavelengths of light determine the color the pigment appears to the eye. Chlorophyll is the primary pigment in plants; it is a porphyrin that absorbs red and blue wavelengths of light while reflecting green. It is the presence and relative abundance of chlorophyll that gives plants their green color. All land plants and green algae possess two forms of this pigment: chlorophyll a and chlorophyll b. Kelps, diatoms, and other photosynthetic heterokonts contain chlorophyll c instead of b, red algae possess chlorophyll a. All chlorophylls serve as the primary means plants use to intercept light to fuel photosynthesis. Carotenoids are red, orange, or yellow tetraterpenoids. They function as accessory pigments in plants, helping to fuel photosynthesis by gathering wavelengths of light not readily absorbed by chlorophyll. The most familiar carotenoids are carotene (an orange pigment found in carrots), lutein (a yellow pigment found in fruits and vegetables), and lycopene (the red pigment responsible for the color of tomatoes). Carotenoids have been shown to act as antioxidants and to promote healthy eyesight in humans. Anthocyanins (literally "flower blue") are water-soluble flavonoid pigments that appear red to blue, according to pH. They occur in all tissues of higher plants, providing color in leaves, stems, roots, flowers, and fruits, though not always in sufficient quantities to be noticeable. Anthocyanins are most visible in the petals of flowers, where they may make up as much as 30% of the dry weight of the tissue. They are also responsible for the purple color seen on the underside of tropical shade plants such as Tradescantia zebrina. In these plants,
{"page_id": 637102, "title": "Plant physiology"}
that always outputs "0". However, if the attacker has access to any obfuscated implementations C α , β ′ , D α , β ′ {\displaystyle C'_{\alpha ,\beta },D'_{\alpha ,\beta }} of C α , β , D α , β {\displaystyle C_{\alpha ,\beta },D_{\alpha ,\beta }} , then the attacker will find D α , β ′ ( C α , β ′ ) = 1 {\displaystyle D'_{\alpha ,\beta }(C'_{\alpha ,\beta })=1} with probability 1, whereas the attacker will always find D α , β ′ ( Z ) = 0 {\displaystyle D'_{\alpha ,\beta }(Z)=0} unless β = 0 {\displaystyle \beta =0} (which should happen with negligible probability). This means that the attacker can always distinguish the pair ( C α , β ′ , D α , β ′ ) {\displaystyle (C'_{\alpha ,\beta },D'_{\alpha ,\beta })} from the pair ( Z , D α , β ′ ) {\displaystyle (Z,D'_{\alpha ,\beta })} with obfuscated code access, but not black-box access. Since no obfuscator can prevent this attack, Barak et al. conclude that no black-box obfuscator for pairs of programs exists. To conclude the argument, Barak et al. define a third program to implement the functionality of the two previous: F α , β ( b , x ) := { C α , β ( x ) if b = 0 D α , β ( x ) if b = 1 . {\displaystyle F_{\alpha ,\beta }(b,x):={\begin{cases}C_{\alpha ,\beta }(x)&{\text{if }}b=0\\D_{\alpha ,\beta }(x)&{\text{if }}b=1\\\end{cases}}.} Since equivalently efficient implementations of C α , β , D α , β {\displaystyle C_{\alpha ,\beta },D_{\alpha ,\beta }} can be recovered from one of F α , β {\displaystyle F_{\alpha ,\beta }} by hardwiring the value of b {\displaystyle b} , Barak et al. conclude that F α , β {\displaystyle F_{\alpha ,\beta
{"page_id": 65807245, "title": "Black-box obfuscation"}
Cahto speakers were also bilingual in Northern Pomo. ===== Creation story ===== One version of the Raven creation story is that of the Cahto in California. In one variant, Raven is taught by his father, Kit-ka'ositiyi-qa, to be a creator, but Raven is unsatisfied with the result. He creates the world but is unable to give it light or water. On hearing that light could be found hidden in a far-off land, Raven decides to travel there and steal it. In the house of light, he finds a young woman living with her father and plays the first of many tricks. He turns himself into a speck of dirt, slips into her drinking water, and is swallowed. The daughter becomes pregnant and she gave birth to an unusual and fussy child who cries constantly and demands to touch one of the bundles which has been stored hanging from the walls. The child is given one of the bags to quiet him, but when he tires of playing with it, he lets it go, and it floats away from him and disappears through the smoke hole. Once it reaches the sky the bundle comes undone and scatters stars across the sky. When the child cries to have it back again he is given the second bundle to play with and lets it float away through the hole in the ceiling, thus releasing the moon. It all happens again with the third and last bundle, which flies away and becomes sunlight. After bringing light to the whole world, Raven too flies out through the smoke hole.: 30 ==== Tahltan ==== Locally among the Tahltan people, their customs and livelihoods varied widely as they were often widely separated and would have to endure varying conditions depending on their locality. In Tahltan culture it
{"page_id": 2396489, "title": "Ravens in Native American mythology"}
\sum \ln \left(1+2p_{1}\right)=\dots +{\frac {1}{k-2}}+{\frac {1}{k-1}}+{\frac {1}{k}}} with only the terms that correspond to large values of u written down. When k increases this sum increases as ln k. But the probability for an appearance of an era of a large length k decreases as 1/k2 according to eq. 76; hence the mean value of the sum above is finite. Consequently, the systematic variation of the quantity ln Λ over a large number of eras will be proportional to this number. But it is seen in eq. 85 that with t → 0 the number s increases merely as ln |ln t|. Thus in the asymptotic limit of arbitrarily small t the term ln Λ can indeed be neglected as compared to ln t. In this approximation where Ω denotes the "logarithmic time" and the process of epoch transitions can be regarded as a series of brief time flashes. The magnitudes of maxima of the oscillating scale functions are also subject to a systematic variation. From eq. 39 for u ≫ 1 it follows that a max ′ − a max ≈ − 1 / 2 u {\displaystyle a_{\max }^{\prime }-a_{\max }\approx -1/2u} . In the same way as it was done above for the quantity ln Λ, one can hence deduce that the mean decrease in the height of the maxima during an era is finite and the total decrease over a large number of eras increases with t → 0 merely as ln Ω. At the same time the lowering of the minima, and by the same token the increase of the amplitude of the oscillations, proceed (eq. 77) proportional to Ω. In correspondence with the adopted approximation the lowering of the maxima is neglected in comparison with the increase of the amplitudes so αmax = 0, βmax
{"page_id": 6620973, "title": "BKL singularity"}
sky. This is especially true for helicopters with teetering rotors, such as the two-blade design seen on Robinson helicopters. This effect was first discovered when many accidents with Bell UH-1 and AH-1 helicopters occurred. These particular helicopters simply crashed without any obvious cause. Later, it was found that these accidents usually happened during low terrain flight after passing a ridge and initiating a dive from the previous climb. Articulated and rigid rotor systems do not lose controlling forces up to 0 g, but may encounter this depending on their flapping hinge offset from the mast. Dangerous situations can occur in helicopters in low-g conditions, especially teetering rotors designs. In the late 1960s the US Army discovered the danger of a main rotor striking a helicopter's own tail, in certain aerodynamic conditions particularly Low-g conditions. During low-g conditions the weight of the helicopter is unloaded from the main rotor and inputs to the controls can create a dangerous situation at that time. Helicopters with teetering rotors—for must not be subjected to a low-g condition, because such rotor systems do not control the fuselage attitude. This can result in the fuselage assuming an attitude controlled by momentum and tail rotor thrust that causes the tail boom to intersect the main rotor tip-path plane or result in the blade roots contacting the main rotor drive shaft, causing the blades to separate from the hub (mast bumping). In the 2020s Robinson developed a new tail empennage for the R66 to reduce the chance of this type of accident. Two university studies of the Robinson main rotor, one by Georgia Tech and the other the University of Maryland, did not find the rotor design to be more susceptible in low-g conditions than other teetering designs, and this fit with Robinson's ongoing study of its design.
{"page_id": 3512082, "title": "Low-g condition"}
in promoting an Indian electronics brand capable of competing with international majors. During a period when most consumer electronics were imported, Nambiar sought to establish locally manufactured, high-quality products accessible to Indian consumers. His contributions helped BPL become a familiar name in the 1980s and 1990s, especially for products like televisions, audio systems, and VCRs, which became popular in Indian households. Nambiar also invested in local manufacturing and training, which contributed to job creation and supported India's electronics ecosystem. His work set a foundation for future advancements in the electronics and technology sectors. == References ==
{"page_id": 78264995, "title": "T. P. G. Nambiar"}
horsepower, and enable the 600 pound (without a driver) car to travel at most 80 miles per hour. During races, however, the car's top speed was limited to 45 miles per hour in order to keep it running efficiently. The 2010 car raced in three American Solar Challenge road races, and five Formula Sun Grand Prix races. === 2015–2019 === During the Fall 2014 semester, the team began working on the next generation Sunseeker solar car.(Code named Farasi) The car incorporates four wheels, with the two rear wheels being powered. The aeroshell is made of light-weight carbon fiber, while the chassis is made of carbon fiber and chromoly steel. This car was meant to be raced in the 2016 American Solar Challenge but didn't get to compete until the 2017 Formula Sun Grand Prix at Circuit of the Americas in Austin, TX. In 2018 Farasi completed 163 laps at Motorsports Park Hastings for the Formula Sun Grand Prix and ran 52 miles of the American Solar Challenge under a conditional qualification. === 2020–Present === The current solar car was started in Fall 2018 when the students began the design process. During Spring 2019, the team began their build cycle, though COVID-19 posed issues for the team in 2020 and into 2021. In the spring and summer of 2021, the team completed the new car, dubbed Aethon, and competed in the 2021 Formula Sun Grand Prix, though they did not qualify for the 2021 American Solar Challenge. Aethon is powered by a custom-built silicon-based solar array and propelled by a single Marand high-efficiency electric motor. It is the team's first asymmetric style car, also known as a catamaran, where the driver sits in-line with the wheels on one side of the car, as opposed to all of the team's previous cars
{"page_id": 21156220, "title": "Sunseeker (solar vehicle)"}
charge–state data provided by ACE are used to: Isolate the dominant coronal formation processes by comparing a broad range of coronal and photospheric abundances; Study plasma conditions at the source of solar wind and solar energetic particles by measuring and comparing the charge states of these two populations; Study solar wind acceleration processes and any charge or mass-dependent fractionation in various types of solar wind flows. === Particle acceleration and transport in nature === Particle acceleration is ubiquitous in nature and understanding its nature is one of the fundamental problems of space plasma astrophysics. The unique data set obtained by ACE measurements has been used to: Make direct measurements of charge and/or mass-dependent fractionation during solar energetic particle and interplanetary acceleration events; Constrain solar flare, coronal shock, and interplanetary shock acceleration models with charge, mass, and spectral data spanning up to five decades in energy; Test theoretical models for 3He–rich solar flares and solar γ–ray events. == Instruments == === Cosmic-Ray Isotope Spectrometer (CRIS) === The Cosmic-Ray Isotope Spectrometer covers the highest range of the Advanced Composition Explorer's energy coverage, from 50 to 500 MeV/nucleon, with an isotopic resolution for elements from Z ≈ 2 to 30. The nuclei detected in this energy interval are predominantly cosmic rays originating in our Galaxy. This sample of galactic matter investigates the nucleosynthesis of the parent material, as well as fractionation, acceleration, and transport processes that these particles undergo in the Galaxy and in the interplanetary medium. Charge and mass identification with CRIS is based on multiple measurements of dE/dx and total energy in stacks of silicon detectors, and trajectory measurements in a scintillating optical fiber trajectory (SOFT) hodoscope. The instrument has a geometrical factor of 250 cm2 (39 sq in)-sr for isotope measurements. === Electron, Proton, and Alpha-particle Monitor (EPAM) === The
{"page_id": 1009525, "title": "Advanced Composition Explorer"}
resources for crashing activities. The total energy emitted by renewable and non-renewable resources for both non-crashable and crashable tasks is minimized by the third objective function (OF). Finally, job opportunities are maximized by the fourth OF. (1) Min 𝑍 1 = 𝐹 𝑁 + 1 (2) Min 𝑍 2 = ∑ 𝑡 = 1 𝑇 ( ( ∑ 𝑟 = 1 𝑅 ∑ 𝑖 = 1 𝑁 ∑ 𝑚 = 1 𝑚 𝐶 ˜ 𝑟 . 𝜙 𝑖 𝑚 𝑟 𝑡 + ∑ 𝑟 = 1 𝑅 ∑ 𝑖 = 1 𝑁 ∑ 𝑚 = 1 𝑚 𝐶 ′ ˜ 𝑟 . 𝜓 𝑖 𝑚 𝑟 𝑡 ) + ( ∑ 𝑛 = 1 𝑁 𝑅 ∑ 𝑖 = 1 𝑁 ∑ 𝑚 = 1 𝑚 𝐶 ″ ˜ 𝑛 . 𝑛 𝑜 𝑛 𝑖 𝑚 𝑛 . 𝑥 𝑖 𝑚 𝑡 + ∑ 𝑛 = 1 𝑁 𝑅 ∑ 𝑗 = 1 𝑁 ∑ 𝑚 = 1 𝑚 𝐶 ‴ ˜ 𝑛 . 𝑛 𝑜 𝑛 ′ 𝑖 𝑚 𝑛 . 𝑧 𝑖 𝑚 ) ) + 𝑇 𝐺 𝑟 𝑒 𝑒 𝑛 . 𝛼 − 𝐸 𝐺 𝑟 𝑒 𝑒 𝑛 . 𝛽 (3) Min 𝑍 3 = ∑ 𝑡 = 1 𝑇 ( ( ∑ 𝑟 = 1 𝑅 ∑ 𝑖 = 1 𝑁 ∑ 𝑚 = 1 𝑚 𝐺 𝑟 . 𝜙 𝑖 𝑚 𝑟 𝑡 + ∑ 𝑟 = 1 𝑅 ∑ 𝑖 = 1 𝑁 ∑ 𝑚 = 1 𝑚 𝐺 𝑟 ′ . 𝜓 𝑖 𝑚 𝑟 𝑡 ) + ( ∑ 𝑛 = 1 𝑁 𝑅 ∑ 𝑖 = 1 𝑁 ∑ 𝑚 = 1 𝑚 𝐺 ″ 𝑛 . 𝑛 𝑜 𝑛 𝑖 𝑚 𝑛 . 𝑥 𝑖 𝑚 𝑡 + ∑ 𝑛 = 1 𝑁 𝑅 ∑ 𝑗 = 1
{"source": 44, "title": "from dpo"}
have a great deal of hardware and software heterogeneity to serve their varied customers inside an organization. WSC programmers customize third-party software or build their own, and WSCs have much more homogeneous hardware; the WSC goal is to make the hardware/software in the warehouse act like a single computer that typically runs a variety of applications. Often the largest cost in a conventional datacenter is the people to maintain it, whereas, as we shall see in Section 6.4, in a well-designed WSC the server hardware is the greatest cost, and people costs shift from the topmost to nearly irrelevant. Conventional datacenters also don’t have the scale of a WSC, so they don’t get the economic benefits of scale mentioned above. Hence, while you might consider a WSC as an extreme datacenter, in that computers are housed separately in a space with special electri-cal and cooling infrastructure, typical datacenters share little with the challenges and opportunities of a WSC, either architecturally or operationally. Since few architects understand the software that runs in a WSC, we start with the workload and programming model of a WSC. If a probl em ha s no solu tio n, i t may not be a probl em, bu t a fa ct —not to b esolv ed, bu t to b e cop ed wi th ov er tim e. > Shimon Peres # 6.2 Programming Models and Workloads for Warehouse-Scale Computers 6.2 Programming Models and Workloads for Warehouse-Scale Computers ■ 437 In addition to the public-facing Internet services such as search, video sharing, and social networking that make them famous, WSCs also run batch applications, such as converting videos into new formats or creating search indexes from Web crawls. Today, the most popular framework for batch processing in a WSC is Map-Reduce [Dean and
{"source": 2299, "title": "from dpo"}
175-186. [KnTaWo2004] A. Knutson, T. Tao, C. Woodward, The honeycomb model of GL n(C) tensor products. II. Puzzles determine facets of the Littlewood-Richardson cone , J. Amer. Math. Soc. 17 (2004), no. 1, 19-48. [Ko1967] J. Koml´ os, On the determinant of (0,1) matrices , Studia Sci. Math. Hungar 2 (1967), 7-21. [KuNi2006] L. Kuipers; H. Niederreiter, Uniform Distribution of Se-quences, Dover Publishing, 2006. [La2005] R. Latala, Some estimates of norms of random matrices , Proc. Amer. Math. Soc. 133 (2005), no. 5, 1273-1282. [Le2001] M. Ledoux, The concentration of measure phenomenon, Mathe-matical Surveys and Monographs, 89. American Mathematical Society, Providence, RI, 2001. [Le1995] M. Ledoux, On Talagrand’s deviation inequalities for product measures , ESAIM Probab. Statist. 1 (1995/97), 63-87. [Li1922] J.W. Lindeberg, Eine neue Herleitung des Exponentialgesetzes in der Wahscheinlichkeitsrechnung , Math. Zeit. 15 (1922), pp. 211225. [LiPaRuTo2005] A. E. Litvak, A. Pajor, M. Rudelson, N. Tomczak-Jaegermann, Smallest singular value of random matrices and geometry of random polytopes , Adv. Math. 195 (2005), no. 2, 491-523. [Me2004] M. Meckes, Concentration of norms and eigenvalues of random matrices , J. Funct. Anal. 211 (2004), no. 2, 508-524. [Me2004] M. Mehta, Random matrices. Third edition. Pure and Applied Mathematics (Amsterdam), 142. Elsevier/Academic Press, Amster-dam, 2004. [MeGa1960] M. L. Mehta, M. Gaudin, On the density of eigenvalues of a random matrix , Nuclear Phys. 18 (1960) 420-427. [Ol2008] G. Olshanski, Difference operators and determinantal point pro-cesses , preprint. [PaZh2010] G. Pan, W. Zhou, Circular law, extreme singular values and potential theory , J. Multivariate Anal. 101 (2010), no. 3, 645-656. Bibliography 325 [Pe2006] S. P´ ech´ e, The largest eigenvalue of small rank perturbations of Hermitian random matrices , Probab. Theory Related Fields 134 (2006), no. 1, 127-173. [Pe2009] S. P´ ech´ e, Universality results for the largest eigenvalues of some sample
{"source": 5648, "title": "from dpo"}
the operation of any halo/Hawthorne effect explaining the positive effect sizes. In sum, these findings led the Panel to conclude with much confidence that phonemic awareness training is more effective than alternative forms of training or no training in helping children acquire phonemic awareness and in facilitating transfer of PA skills to reading and spelling. PA training improves children’s reading performance in various types of tasks, including word reading, pseudoword reading, and reading comprehension. Benefits are evident on standardized tests as well as experimenter-designed tests of reading and spelling. Improvement in reading and spelling is not short-lived but lasts beyond the immediate training period. PA training improves reading performance in preschoolers and elementary students, and in normally progressing children, as well as in older disabled readers and younger children at risk for reading difficulties. PA training improves spelling performance in kindergartners, 1st graders, and at-risk students, but not in older disabled readers. PA training boosts reading and spelling in both English and non-English languages, and among low SES as well as middle-to-high SES children. Many types of PA training programs are effective for improving reading and spelling, including those that teach one or multiple types of phonemic awareness, those that incorporate letters into training, and those that limit phoneme manipulation to speech. Not only researchers but also classroom teachers and computers can deliver PA instruction effectively. Instruction can be conducted successfully with individuals as well as small groups and whole classrooms. Training does not have to be lengthy to be effective. Were Effect Sizes Homogeneous? In addition to determining whether mean effect sizes were significant, the Panel also tested whether the set of effect sizes was sufficiently homogeneous to render the mean effect size representative of that set. A homogeneity analysis calculates how probable it is that the variance exhibited
{"source": 6100, "title": "from dpo"}
structure". This was a theme he developed in his orchid book. == Botany as recreation == After On the Origin of Species was published, Darwin became involved in producing revised editions as well as working on Variation of Animals and Plants Under Domestication as the first part of his planned "Big Book". By the spring of 1860 he had tired of the grind of writing, and needed something fresh and interesting to study. During a family visit to relatives at Hartfield, he was searching for orchids when he noticed a sundew. He collected it and tried to feed it insects, thus beginning a long-term study of insectivorous plants. He investigated other botanical questions raised by his ideas of natural selection, including the advantages of sexual dimorphism in primulas, and the adaptive mechanisms that ensure cross-pollination in orchids. As an enthusiastic practical scientist, such investigations gave him a strong sense of personal enjoyment. He relished pitting his wits against nature, and following lucky hunches. His theory was a way of looking at the world, enabling him to find creative solutions to problems that traditional approaches could not solve. He later wrote, "I am like a gambler, & love a wild experiment." Around the end of April 1860, Darwin discussed insect pollination with his friend Joseph Dalton Hooker, and mentioned the bee orchid. Darwin corresponded with Hooker's assistant Daniel Oliver, the senior curator at Kew Gardens, who became a follower of Darwin's ideas. At the start of June, Darwin wrote to The Gardeners' Chronicle asking for readers' observations on how bee or fly orchids were fertilised. His letter described the mechanisms for insect fertilisation he had discovered in common British orchids, and reported his experimental observations that pollen masses were removed from Orchis morio and Orchis mascula plants in the open, but
{"page_id": 21436165, "title": "Fertilisation of Orchids"}
SB buffer is a buffer solution used in agarose and polyacrylamide gel electrophoresis for the separation of nucleic acids such as DNA and RNA. "SB" is a commercial trademark of Faster Better Media LLC for their sodium boric acid-based conductive medium (US Patent # 7811437), which is based on the publications of Brody and Kern. It is made up of sodium borate, usually 1–10 mM at pH 8.0. It has a lower conductivity, produces sharper bands, and can be run at higher speeds than can gels made from TBE buffer or TAE buffer (5–35 V/cm as compared to 5–10 V/cm). At a given voltage, heat will be generated and thus the gel will be heated. However, SB buffer has lower conductivity than TBE and TAE, and thus the gel temperature is much lower than with TBE or TAE buffers. Therefore, the voltage can be increased to speed up electrophoresis so that a gel run takes only a fraction of the usual time. Downstream applications, such as isolation of DNA from a gel slice or southern blot analysis, work as expected with sodium borate gels. LB buffer containing lithium borate is similar to sodium borate and has all of its advantages, but permits use of even higher voltages due to the lower conductivity of lithium ions as compared to sodium ions. However, lithium borate is somewhat more expensive. == See also == TBE buffer LB buffer == References == == External links == Sodium borate as an electrophoresis buffer Cost-effective media for the rapid and high resolution of small DNA fragments using polyacrylamide-based electrophoresis Analysis of oligonucleotide annealing by electrophoresis in agarose gels using sodium borate conductive medium
{"page_id": 14841127, "title": "SB buffer"}
Protonolysis is the cleavage of a chemical bond by acids. Many examples are found in organometallic chemistry since the reaction requires polar Mδ+-Rδ- bonds, where δ+ and δ- signify partial positive and negative charges associated with the bonding atoms. When compounds containing these bonds are treated with acid (HX), these bonds cleave: M-R + HX → M-X + H-R Hydrolysis (X− = OH−) is a special case of protonolysis. Compounds susceptible to hydrolysis often undergo protonolysis. == Hydrides == The borohydride anion is susceptible to reaction with even weak acids, resulting protonolysis of one or more B-H bonds. Protonolysis of sodium borohydride with acetic acid gives triacetoxyborohydride: NaBH4 + 3 HO2CCH3 → NaBH(O2CCH3)3 + 3 H2 Related reactions occur for hydrides of other electropositive elements, e.g. lithium aluminium hydride. == Alkyls == The alkyl derivatives of many metals undergo protonolysis. For the alkyls of very electropositive metals (zinc, magnesium, and lithium), water is sufficiently acidic, in which case the reaction is called hydrolysis. Protonolysis with mineral acids is sometimes used to remove organic ligands from a metal center. == Nitrides, phosphides, silicides and related species == Inorganic materials with highly charged anions are often susceptible to protonolysis. Derivatives of nitride (N3−), phosphides (P3−), and silicides (Si4−) hydrolyze to give ammonia, phosphine, and silane. Analogous reactions occur with molecular compounds with M-NR2, M-PR2, and M-SiR3 bonds. == References ==
{"page_id": 46390321, "title": "Protonolysis"}
they cannot be determined by means of the microscope. Some of these rocks show perlitic or spherulitic structure, and such rocks were probably originally glassy (obsidians or pitchstones), but by lapse of time and processes of alteration have slowly passed into very finely crystal-line state. This change is called devitrification; it is common in glasses, as these are essentially unstable. A large number of the finer quartz-porphyries are also in some degree silicified of impregnated by quartz, chalcedony and opal, derived from the silica set free by decomposition (kaolinization) of the original feldspar. This re-deposited silica forms veins and patches of indefinite shape or may bodily replace a considerable area of the rock by metasomatic substitution. The opal is amorphous, the chalcedony finely crystalline and often arranged in spherulitic growths that yield an excellent black cross in polarized light. The microcrystalline ground-masses are those that can be resolved into their component minerals in thin slices by use of the microscope. They prove to consist essentially of quartz and feldspars, which are often in grains of quite irregular shape (microgranitic). In other cases these two minerals are in graphic intergrowth, often forming radiate growths of spherulites consisting of fibers of extreme tenuity; this type is known as granophyric. There is another group in which the matrix contains small rounded or shapeless patches of quartz in which many rectangular feldspars are embedded; this structure is called micropoikilitic, and though often primary is sometimes developed by secondary changes that involve the deposit of new quartz in the ground-mass. As a whole those quartz-porphyries that have microcrystalline ground-masses are rocks of intrusive origin. Elvan is a name given locally to the quartz-porphyries that occur as dikes in Cornwall. In many of them the matrix contains scales of colorless muscovite or minute needles of blue
{"page_id": 3164073, "title": "Quartz-porphyry"}
D(n) = floor(n/2). The set of Legendre polynomials {Pn(x)} form an orthogonal set on the interval [−1,1]: ∫ − 1 1 P n ( x ) P m ( x ) d x = 2 2 n + 1 δ n m {\displaystyle \int _{-1}^{1}P_{n}(x)P_{m}(x)\,dx={\frac {2}{2n+1}}\delta _{nm}} A recurrence relation can be used to compute the Legendre polynomial: ( n + 1 ) P n + 1 ( x ) − ( 2 n + 1 ) x P n ( x ) + n P n − 1 ( x ) = 0 {\displaystyle (n+1)P_{n+1}(x)-(2n+1)xP_{n}(x)+nP_{n-1}(x)=0} f(x,y) can be written as an infinite series expansion in terms of Legendre polynomials [−1 ≤ x,y ≤ 1.]: f ( x , y ) = ∑ m = 0 ∞ ∑ n = 0 ∞ λ m n P m ( x ) P n ( y ) {\displaystyle f(x,y)=\sum _{m=0}^{\infty }\sum _{n=0}^{\infty }\lambda _{mn}P_{m}(x)P_{n}(y)} == See also == == References ==
{"page_id": 57193995, "title": "Legendre moment"}
sample code. Bit Twiddling Hacks Several algorithms with code for counting bits set. Necessary and Sufficient Archived 2017-09-23 at the Wayback Machine - by Damien Wintour - Has code in C# for various Hamming Weight implementations. Best algorithm to count the number of set bits in a 32-bit integer? - Stackoverflow
{"page_id": 1127884, "title": "Hamming weight"}
In programming and software design, a binding is an application programming interface (API) that provides glue code specifically made to allow a programming language to use a foreign library or operating system service (one that is not native to that language). == Characteristics == Binding generally refers to a mapping of one thing to another. In the context of software libraries, bindings are wrapper libraries that bridge two programming languages, so that a library written for one language can be used in another language. Many software libraries are written in system programming languages such as C or C++. To use such libraries from another language, usually of higher-level, such as Java, Common Lisp, Scheme, Python, or Lua, a binding to the library must be created in that language, possibly requiring recompiling the language's code, depending on the amount of modification needed. However, most languages offer a foreign function interface, such as Python's and OCaml's ctypes, and Embeddable Common Lisp's cffi and uffi. For example, Python bindings are used when an extant C library, written for some purpose, is to be used from Python. Another example is libsvn which is written in C to provide an API to access the Subversion software repository. To access Subversion from within Java code, libsvnjavahl can be used, which depends on libsvn being installed and acts as a bridge between the language Java and libsvn, thus providing an API that invokes functions from libsvn to do the work. Major motives to create library bindings include software reuse, to reduce reimplementing a library in several languages, and the difficulty of implementing some algorithms efficiently in some high-level languages. == Runtime environment == === Object models === Common Object Request Broker Architecture (CORBA) – cross-platform-language model Component Object Model (COM) – Microsoft Windows only cross-language model Distributed
{"page_id": 3002110, "title": "Language binding"}
due to maternal antibodies. Boosting with live vaccines also seems to enhance the beneficial effects. == High-income countries == The non-specific effects were primarily observed in low-income countries with high infectious disease burdens, but they may not be limited to these areas. Recent Danish register-based studies have shown that the live attenuated measles-mumps-rubella vaccine (MMR) protects against hospital admissions with infectious diseases and specifically getting ill by respiratory syncytial virus. == Immunological mechanisms == The findings from the epidemiological studies on the non-specific effects of vaccines pose a challenge to the current understanding of vaccines, and how they affect the immune system, and also question whether boys and girls have identical immune systems and should receive the same treatment. The mechanisms for these effects are unclear. It is not known how vaccination induces rapid beneficial or harmful changes in the general susceptibility to infectious diseases, but the following mechanisms are likely to be involved. === Heterologous T-cell immunity === It is well known from animal studies that infections, apart from inducing pathogen-specific T-cells, also induce cross-reactive T-cells through epitope sharing, so-called heterologous immunity. Heterologous T-cell immunity can lead to improved clearance of a subsequent cross-reactive challenge, but it may also lead to increased morbidity. This mechanism may explain why DTP could have negative effects. It would, however, not explain effects occurring shortly after vaccination, as for instance the rapidly occurring beneficial effects of BCG vaccine, as the heterologous effect would only be expected to be present after some weeks, as the adaptive immune response need time to develop. Also, it is difficult to explain why the effect would vanish once a child receives a new vaccine. === Trained innate immunity === The concept that not only plants and insects, but also humans have innate immune memory may provide new clues
{"page_id": 46559303, "title": "Non-specific effect of vaccines"}
electrical actions, such as the raising of open windows and the closing of open convertible tops. A rain sensor can also take in the frequency of rain droplets to automatically trigger windshield wipers with an accurate speed for the corresponding rainfall. Traction control system (TCS) helps prevent traction loss in vehicles and prevent vehicle turnover on sharp curves and turns. By limiting tire slip, or when the force on a tire exceeds the tire's traction, this limits power delivery and helps the driver accelerate the car without losing control. These systems use the same wheel-speed sensors as the antilock braking systems. Individual wheel braking systems are deployed through TCS to control when one tire spins faster than the others. === Visual and environmental monitoring === Automotive head-up display (auto-HUD) safely displays essential system information to a driver at a vantage point that does not require the driver to look down or away from the road. Currently, the majority of the auto-HUD systems on the market display system information on a windshield using LCDs. Automotive navigation system uses digital mapping tools, such as the global positioning system (GPS) and traffic message channel (TMC), to provide drivers with up-to-date traffic and navigation information. Through an embedded receiver, an automotive navigation system can send and receive data signals transmitted from satellites regarding the current position of the vehicle in relation to its surroundings. Automotive night vision systems enable the vehicle to detect obstacles, including pedestrians, in a nighttime setting or heavy weather situation when the driver has low visibility. These systems can use various technologies, including infrared sensors, GPS, Lidar, and Radar, to detect pedestrians and non-human obstacles. Backup camera provides real-time video information regarding the location of your vehicle and its surroundings. This camera offers driver's aid when backing up by providing
{"page_id": 984718, "title": "Advanced driver-assistance system"}
In biology, polymorphism is the occurrence of two or more clearly different morphs or forms, also referred to as alternative phenotypes, in the population of a species. To be classified as such, morphs must occupy the same habitat at the same time and belong to a panmictic population (one with random mating). Put simply, polymorphism is when there are two or more possibilities of a trait on a gene. For example, there is more than one possible trait in terms of a jaguar's skin colouring; they can be light morph or dark morph. Due to having more than one possible variation for this gene, it is termed 'polymorphism'. However, if the jaguar has only one possible trait for that gene, it would be termed "monomorphic". For example, if there was only one possible skin colour that a jaguar could have, it would be termed monomorphic. The term polyphenism can be used to clarify that the different forms arise from the same genotype. Genetic polymorphism is a term used somewhat differently by geneticists and molecular biologists to describe certain mutations in the genotype, such as single nucleotide polymorphisms that may not always correspond to a phenotype, but always corresponds to a branch in the genetic tree. See below. Polymorphism is common in nature; it is related to biodiversity, genetic variation, and adaptation. Polymorphism usually functions to retain a variety of forms in a population living in a varied environment.: 126 The most common example is sexual dimorphism, which occurs in many organisms. Other examples are mimetic forms of butterflies (see mimicry), and human hemoglobin and blood types. According to the theory of evolution, polymorphism results from evolutionary processes, as does any aspect of a species. It is heritable and is modified by natural selection. In polyphenism, an individual's genetic makeup allows
{"page_id": 498831, "title": "Polymorphism (biology)"}
1(a)(iv)(C)). Section 2 of E.O. 13846 authorizes correspondent and payable-through account sanctions on foreign financial institutions (FFIs) determined to have knowingly conducted or facilitated any significant financial transaction: i. On or after August 7, 2018, for the sale, supply, or transfer to Iran of significant goods or services used in connection with Iran’s automotive sector (subsection 2(a)(i)); ii. On or after November 5, 2018, on behalf of an Iranian person on SDN List (other than an Iranian depository institution whose property and interests in property are blocked solely pursuant to E.O. 13599) or any other person on the SDN List whose property is blocked pursuant to subsection 1(a) of E.O. 13846 or E.O. 13599 (other than an Iranian depository institution whose property and interests in property are blocked solely pursuant to E.O. 13599) (subsection 2(a)(ii)); iii. On or after November 5, 2018, with NIOC or NICO, except for the sale or provision to NIOC or NICO of the products described in section 5(a)(3)(A)(i) of ISA provided that the fair market value of such products is lower than the applicable dollar threshold specified in that provision (subsection 2(a)(iii)); iv. On or after November 5, 2018, for the purchase, acquisition, sale, transport, or marketing of petroleum or petroleum products from Iran (subsection 2(a)(iv)); and v. On or after November 5, 2018, for the purchase, acquisition, sale, transport, or marketing of petrochemical products from Iran (subsection 2(a)(v)). Section 3 of E.O. 13846 authorizes menu-based sanctions on persons determined to: i. Have knowingly engaged, on or after August 7, 2018, in a significant transaction for the sale, supply, or transfer to Iran of significant goods or services used in connection with Iran’s automotive sector (subsection 3(a)(i)); ii. Have knowingly engaged, on or after November 5, 2018, in a significant transaction for the purchase, acquisition,
{"source": 1016, "title": "from dpo"}
(theselyricsdonotexist.com) Show HN: Portal – Personal Cloud Servers (portalplatform.net) Show HN: I've launched my iPhone journal app I've worked on for almost 2 years. (hey.co) Open Libra: An open platform for financial inclusion (openlibra.io) Ev News? Did I just see a test, Hacker News was titled Ev News for a second. (dougaitken.tumblr.com) JavaScript Circuit Simulator (lushprojects.com) Is Blockchain Really the Killer App? (joecoin.com) Scilab – Open source software for numerical computation (scilab.org) Neil Gaiman Commencement Speech: Make Great Things. Learn From Failure. (uarts.edu) Scribd.com Comes to the Dark Side (evilreads.com) Discovering private APIs with Charles.app (timrogers.uk) Semi-hosting on ARM with Rust (embed.rs) Show HN: I made my Raspberry Pi a secret phone homing server (tunnelsup.com) Language Servers and IDEs (perplexinglyemma.blogspot.com) Post-SESTA/FOSTA Self-Censoring for Twitter, Reddit, and Other Social Media (titsandsass.com) iOS 5 has garbage collection. Here comes MacRuby/iOS? (pogodan.com) Blippy And Credit Card Numbers - Official Blippy Blog (blippy.posterous.com) Use Google Analytics on your blog? Check your bounce rate (drawingablank.me) Enhance your next presentation with HTML5 (jster.net) C# 8: Switch expressions (alexatnet.com) Building and using a 29-year-old compiler on a modern system (miyuki.github.io) Before brogramming, table flipping, and beyond (technowoman.blogspot.com) Be careful what you put in an email (om.wordpress.com) Designing a new funding structure for bootstrappers (earnestcapital.co) Icono – Pure CSS icons with only one element (saeedalipoor.github.io) WebOS OSE 2.1 (webosose.org) If you're using Node.js, you're doing life wrong (codeslinger.posterous.com) Tackling Webdev as a Bioinformatician: why is it so hard? (jessimekirk.com) New JIT optimizer in the Zing JVM (stuff-gil-says.blogspot.com) Renminbi set to replace US dollar for trade in Asia Pacific (risk.net) Frequency Counting Algorithms Over Data Streams (micvog.com) Demons: A short film about depression and suicide (demonsfilm.net) Online ambient atmosphere generator for roleplay games (defonic.ovh) Survey of Encryption Tripwire Techniques (annihilatormodule.com) Nix the Tricks: Math tricks defeat understanding (nixthetricks.com) Understanding
{"source": 2757, "title": "from dpo"}
is the use of deep learning in neuroimaging studies. DL’s ability to process and learn from raw data through complex, nonlinear transformations makes it well suited for identifying the subtle and diffuse alterations characteristic of many neurological and psychiatric disorders. Research in this domain has shown that DL can be a powerful tool in the ongoing search for biomarkers of such conditions, offering potential breakthroughs in understanding and diagnosing brain-based disorders [40, the most common cause of dementia, deep learning has shown promise in enhancing diagnosis accuracy. Utilizing Convolutional Neural Networks (CNNs), researchers have developed frameworks for detecting AD characteristics from Magnetic Resonance Imaging (MRI) data [42 further validates their effectiveness in predicting AD classes. 5. Key insights: These case studies highlight AI’s significant role in advancing disease detection across multiple medical disciplines, offering accurate and timely diagnoses, often through non-invasive methods. However, as AI technology continues to evolve, there is a critical need for addressing challenges such as data privacy, algorithmic transparency, and ensuring equitable access to these technologies. Future developments should focus on creating more robust AI systems that can handle diverse datasets, thereby reducing potential biases in
{"source": 4981, "title": "from dpo"}
(The list created by conslist will be garbage-collected.) Alternatively, using the datalist function, even more economically: ```pop11 lvars ar = {2 4 3 1 2}; consvector(destlist(sort(datalist(ar)))) -> ar; ``` or in Forth-like pop11 postfix syntax: ```pop11 lvars ar = {2 4 3 1 2}; ar.datalist.sort.destlist.consvector -> ar; ``` ## Potion ```potion (7, 5, 1, 2, 3, 8, 9) sort join(", ") print ``` ## PowerBASIC PowerBASIC has several options available for sorting. At its simplest, an array (of any type) is sorted using `ARRAY SORT`: ```powerbasic ARRAY SORT x() ``` Options are available to limit sorting to only part of the array, collate string arrays, sort multiple arrays together, etc. (Details [ here].) ## PowerShell ```powershell 34,12,23,56,1,129,4,2,73 | Sort-Object ``` ## Prolog ```txt ?- msort([10,5,13,3, 85,3,1], L). L = [1,3,3,5,10,13,85]. ``` Note that [ sort/2] removes duplicates. ## PureBasic ```PureBasic Dim numbers(20) For i = 0 To 20 numbers(i) = Random(1000) Next SortArray(numbers(), #PB_Sort_Ascending) ``` ## Python {{works with|Python|2.3}} ```python nums = [2,4,3,1,2] nums.sort() ``` '''Note:''' The array nums is sorted in place. '''Interpreter:''' [[Python]] 2.4 (and above) You could also use the built-in sorted() function ```python nums = sorted([2,4,3,1,2]) ``` ## R ```r nums (sort '(1 9 2 8 3 7 4 6 5) rascal import List; ok rascal>a = [1, 4, 2, 3, 5]; list[int]: [1,4,2,3,5] rascal>sort(a) list[int]: [1,2,3,4,5] rascal>sort(a, bool(int a, int b){return a >= b;}) list[int]: [5,4,3,2,1] ``` ## Raven Sort list in place: ```raven [ 2 4 3 1 2 ] sort ``` ## REBOL
{"source": 6352, "title": "from dpo"}
an individual based on their past behavior and current preferences. These systems will occasionally use clustering algorithms to predict a user's unknown preferences by analyzing the preferences and activities of other users within the same cluster. Cluster analysis is not the only approach for recommendation systems, for example there are systems that leverage graph theory. Recommendation algorithms that utilize cluster analysis often fall into one of the three main categories: Collaborative filtering, Content-Based filtering, and a hybrid of the collaborative and content-based. Collaborative Filtering Recommendation Algorithm Collaborative filtering works by analyzing large amounts of data on user behavior, preferences, and activities to predict what a user might like based on similarities with others. It detects patterns in how users rate items and groups similar users or items into distinct “neighborhoods.” Recommendations are then generated by leveraging the ratings of content from others within the same neighborhood. The algorithm can focus on either user-based or item-based grouping depending on the context. Content-Based Filtering Recommendation Algorithm Content-based filtering uses item descriptions and a user's preference profile to recommend items with similar characteristics to those the user previously liked. It evaluates the distance between feature vectors of item clusters, or “neighborhoods.” The user's past interactions are represented as a weighted feature vector, which is compared to these clusters. Recommendations are generated by identifying the cluster evaluated be the closest in distance with the user's preferences. Hybrid Recommendation Algorithms Hybrid recommendation algorithms combine collaborative and content-based filtering to better meet the requirements of specific use cases. In certain cases this approach leads to more effective recommendations. Common strategies include: (1) running collaborative and content-based filtering separately and combining the results, (2) adding onto one approach with specific features of the other, and (3) integrating both hybrid methods into one model. Markov chain Monte Carlo
{"page_id": 669675, "title": "Cluster analysis"}
=== The use of viral material to deliver a gene starts with the engineering of the viral vector. Though the molecular mechanism of the viral vector differ from vector to vector, there are some general principles that are considered. In diseases that are secondary to a genetic mutation that causes the lack of a gene, the gene is added back in. In diseases that are due to the overexpression of a gene, viral genetic engineering may be introduced to turn off the gene. Viral gene therapy may be done in vivo or ex vivo. In the former, the viral vector is delivered directly to the organ or the tissue of the patient. In the later, the desired tissue is first retrieved, genetically modified, and then transferred back to the patient. The molecular mechanisms of gene delivery and/or integration into cells vary based on the viral vector that is used. Rather than delivery of drugs that require multiple and continuous treatments. Delivery of a gene has the potential to create a long lasting cell that can continuously produce gene product. === Clinical development === There has been a few successful clinical use of viral gene therapy since the 2000s, specifically with adeno-associated virus vectors and chimeric antigen receptor T-cell therapy. ==== Approved for clinical use ==== ===== Adeno-associated virus ===== Vectors made from Adeno-associated virus are one of the most established products used in clinical trials today. It was initially attractive for the use of gene therapy due to it not being known to cause any disease along with several other features. It has also been engineered so that it does not replicate after the delivery of the gene. In 2017, the FDA approved Spark Therapeutics' Luxturna, an AAV vector-based gene therapy product for the treatment of RPE65 mutation-associated retinal dystrophy
{"page_id": 1873971, "title": "Virotherapy"}
Chromosome 18 is one of the 23 pairs of chromosomes in humans. People normally have two copies of this chromosome. Chromosome 18 spans about 80 million base pairs (the building material of DNA) and represents about 2.5 percent of the total DNA in cells. == Genes == === Number of genes === The following are some of the gene count estimates of human chromosome 18. Because researchers use different approaches to genome annotation their predictions of the number of genes on each chromosome varies (for technical details, see gene prediction). Among various projects, the collaborative consensus coding sequence project (CCDS) takes an extremely conservative strategy. So CCDS's gene number prediction represents a lower bound on the total number of human protein-coding genes. === Gene list === The following is a partial list of genes on human chromosome 18. For complete list, see the link in the infobox on the right. == Diseases and disorders == The following diseases are some of those related to genes on chromosome 18: Erythropoietic protoporphyria Hereditary hemorrhagic telangiectasia Niemann–Pick disease type C Porphyria Selective mutism Edwards syndrome (trisomy 18) Tetrasomy 18p Monosomy 18p Pitt–Hopkins syndrome 18q21 Distal 18q- (distal deletion) Proximal 18q- (proximal deletion) == Cytogenetic band == == References == == External links == Chromosome18.org Chromosome18 Registry And Research Society in Europe. National Institutes of Health. "Chromosome 18". Genetics Home Reference. Archived from the original on August 3, 2004. Retrieved 2017-05-06. "Chromosome 18". Human Genome Project Information Archive 1990–2003. Retrieved 2017-05-06.
{"page_id": 3407906, "title": "Chromosome 18"}
(1981), Vimal Kumar Reddy(1984) etc. A rootless mass of sheared sandstone found near Bandewara temple in the crater indicates a fall back material. Crawford, after discovering shatter coned colluvium in the middle of the crater, was first to suggest that this was an impact crater. Auden suggested that the crater in upper Vindhya Range might be kimberlite intrusion similar to Majhgawan kimberlite intrusion. In 1960, Geological Society of London recognised it as an impact crater. In addition, the Ramgarh crater is already among the confirmed/proven list of impact craters based on three-step confidence level criteria of Anna Mikheeva of Russian Academy of Sciences (1 for probable, 2 for potential, 3 for questionable), applied to the impact sites that have appeared several times in the literature and/or have been endorsed by the Impact Field Studies Group (IFSG) and/or Expert Database on Earth Impact Structures (EDEIS). The Earth Impact Database (EID), at the University of New Brunswick in Canada, is used as the most authoritative for confirming the impact craters. The confirmation of Ramgarh being impact crater from EID is pending. In January 2018 Professor Vinod Agrawal and Geologists Pushpendra Singh Ranawat and Mr. Jitendra Kumar Sharma (convenor INTACH Baran chapter), members of team composed of GSI, INTACH and Mohanlal Sukhadia University, which visited the crater to collect samples for the scientific study of the genesis of the crater, said the several types of evidence at crater meets the established criteria for the meteorite impact and that is a very rare site in India of multi-faceted significance including geological heritage. Team stated that the ample research on the site has been conducted to gather geochemical and other evidence published in peer-reviewed journals, hence once the evidence is accepted by the national and global approving entities in India and Canada respectively the crater
{"page_id": 22047353, "title": "Ramgarh crater"}
was easily perturbed by galactic tides and passing stars. Before entering the planetary region (epoch 1950), C/2013 US10 had an orbital period of several million years. After leaving the planetary region (epoch 2050), it will be on an ejection trajectory. The Sun's escape velocity at 200 AU is 2.98 km/s and the comet will be going 3.0 km/s at 200 AU from the Sun. == Gallery == == References == == External links == C/2013 US10 at the JPL Small-Body Database C/2013 US10 (Catalina) at CometBase Forbes - Comet Catalina To Pass By Earth For The Final Time Archived 11 February 2017 at the Wayback Machine NASA Astronomy Picture of the Day: Announcing Comet Catalina (18 August 2015)
{"page_id": 43835083, "title": "C/2013 US10 (Catalina)"}
amounts of cytokines (platelet-derived growth factor; transforming growth factor beta 1) which stimulate tissue stromal cells to become fiber-secreting fibroblasts. ML-DS (Myeloid leukemia in Down syndrome) features mutations in the cohesin complex, including RAD21, STAG1, SMC3, SMC1A, and the associated factor NIPBL in over half of cases, whereas these mutations are rare in TAM (transient abnormal myelopoiesis). Notably, cohesin mutations alter chromatin accessibility at ERG, RUNX1, and GATA transcription factor motifs. == Diagnosis == Fetuses and newborns with Down syndrome without GATA1 inactivating mutations have numerous hematological abnormalities some of which are similar to those in TMD including increased numbers of circulating blasts, decreased numbers of circulating platelets and red blood cells, and increased numbers of circulating white blood cells. Also like TMD, these Down syndrome (no GATA1 mutation) individuals exhibit hepatomegaly, abnormal liver function tests, and jaundice. However, these abnormalities are usually more frequent and/or severe in TMD. Furthermore, enlarged spleen, fluid accumulations in body cavities, and leukemia cutis (i.e. a rash due to the infiltration of platelet precursor cells into the skin) occur in ~30, 9, and 5%, respectively, of TMD cases but are rarely observed in individuals with Down syndrome (no GATA1 mutation). The blood of individuals with TMD may contain grossly malformed blast cells, giant platelets, and fragments of megakaryocytes which are rarely seen in individuals with Down syndrome (no GATA1 mutation). Bone marrow examination reveals increases in blast cells in essentially all cases of TMED, increased fibrosis in a small but significant percentage of cases, defective maturation of platelet precursors in ~75% of cases, and defective maturation of red blood cell precursors in 25% of cases. These abnormalities are generally more extreme that those seen in Down syndrome (no GATA1 mutation). The overall constellation of abnormalities found in TMD often suggest its diagnosis. In all
{"page_id": 68511227, "title": "Transient myeloproliferative disease"}
works with other observatories, such as VERITAS, HESS, MAGIC, IceCube and later, CTA, so they can make overlapping multi-wavelength and multi-messenger observations, and to maximize coincident observations with the Fermi Gamma-ray Space Telescope (Fermi). HAWC has the ability to detect a large ensemble of gamma-ray sources, measuring their spectra and variability to characterize TeV scale acceleration mechanisms. In a one-year survey, HAWC can perform a deep, unbiased survey of the TeV gamma-ray with a 50 mCrab sensitivity at 5σ. HAWC will observe hard-spectrum (high photon energies) Galactic sources in the TeV with a sensitivity similar to that of Fermi in the GeV, detect diffuse emission from regions of the Galactic plane, have sensitivity to see known TeV active galactic nuclei and the brightest known GeV gamma-ray bursts, and represents a large enough step in sensitivity to likely discover new phenomena. Because HAWC has a 2 steradian instantaneous field of view, it will observe diffuse gamma-ray emission from the plane of the galaxy over a broad range of galactic longitudes reaching to the Galactic Center. In September 2015, a Laboratory Directed Research and Development grant was awarded to Brenda Dingus of Los Alamos National Laboratory to improve HAWC's effective area and sensitivity by adding an array of outrigger tanks, surrounding the larger central tanks. Due to the greater size of particle showers created by high energy cosmic rays, increasing the area of the detector will increase the sensitivity of the detector. The outriggers were predicted to increase the sensitivity and effective area of HAWC by 2 to 4 times for particles with energies above 10 TeV. The outrigger array was completed in early 2018, a year later than expected. == Principle of operation == HAWC detects electromagnetic radiation from air showers produced by high energy cosmic rays which hit the Earth's
{"page_id": 41814278, "title": "High Altitude Water Cherenkov Experiment"}
In crystallography, a periodic graph or crystal net is a three-dimensional periodic graph, i.e., a three-dimensional Euclidean graph whose vertices or nodes are points in three-dimensional Euclidean space, and whose edges (or bonds or spacers) are line segments connecting pairs of vertices, periodic in three linearly independent axial directions. There is usually an implicit assumption that the set of vertices are uniformly discrete, i.e., that there is a fixed minimum distance between any two vertices. The vertices may represent positions of atoms or complexes or clusters of atoms such as single-metal ions, molecular building blocks, or secondary building units, while each edge represents a chemical bond or a polymeric ligand. Although the notion of a periodic graph or crystal net is ultimately mathematical (actually a crystal net is nothing but a periodic realization of an abelian covering graph over a finite graph ), and is closely related to that of a Tessellation of space (or honeycomb) in the theory of polytopes and similar areas, much of the contemporary effort in the area is motivated by crystal engineering and prediction (design), including metal-organic frameworks (MOFs) and zeolites. == History == A crystal net is an infinite molecular model of a crystal. Similar models existed in Antiquity, notably the atomic theory associated with Democritus, which was criticized by Aristotle because such a theory entails a vacuum, which Aristotle believed nature abhors. Modern atomic theory traces back to Johannes Kepler and his work on geometric packing problems. Until the twentieth century, graph-like models of crystals focused on the positions of the (atomic) components, and these pre-20th century models were the focus of two controversies in chemistry and materials science. The two controversies were (1) the controversy over Robert Boyle’s corpuscular theory of matter, which held that all material substances were composed of particles,
{"page_id": 29008381, "title": "Periodic graph (crystallography)"}
at all times. Research universities often use HMDs to conduct studies related to vision, balance, cognition and neuroscience. As of 2010, the use of predictive visual tracking measurement to identify mild traumatic brain injury was being studied. In visual tracking tests, a HMD unit with eye tracking ability shows an object moving in a regular pattern. People without brain injury are able to track the moving object with smooth pursuit eye movements and correct trajectory. === Gaming and video === Low-cost HMD devices are available for use with 3D games and entertainment applications. One of the first commercially available HMDs was the Forte VFX1 which was announced at Consumer Electronics Show (CES) in 1994. The VFX-1 had stereoscopic displays, 3-axis head-tracking, and stereo headphones. Another pioneer in this field was Sony, which released the Glasstron in 1997. It had as an optional accessory a positional sensor which permitted the user to view the surroundings, with the perspective moving as the head moved, providing a deep sense of immersion. One novel application of this technology was in the game MechWarrior 2, which permitted users of the Sony Glasstron or Virtual I/O's iGlasses to adopt a new visual perspective from inside the cockpit of the craft, using their own eyes as visual and seeing the battlefield through their craft's own cockpit. Many brands of video glasses can be connected to modern video and DSLR cameras, making them applicable as a new age monitor. As a result of the glasses ability to block out ambient light, filmmakers and photographers are able to see clearer presentations of their live images. The Oculus Rift is a virtual reality (VR) head-mounted display created by Palmer Luckey that the company Oculus VR developed for virtual reality simulations and video games. The HTC Vive is a virtual reality
{"page_id": 1259296, "title": "Head-mounted display"}
Presentation is a Windows software application for conducting psychological and neurobehavioral experiments, developed by Neurobehavioral Systems Inc. and first released in 2003. It supports auditory and visual stimuli creation and delivery, records responses from nearly any input device and allows control of parallel port, serial port, TCP/IP and Ni-DAQ for communication to and from fMRI devices, response devices, eye trackers and brain imaging equipment. It also supports Microsoft Kinect for Windows. It is temporally accurate to less than a millisecond. Presentation has over 10,000 users worldwide. Presentation supports Unicode via the utf-8 specification. == Users == Presentation is used in universities and their experiments all over the world, such as Centre for Cognitive Neuroimaging Perception, memory and aesthetics of indeterminate art Common ground for spatial cognition? A behavioral and fMRI study of sex differences in mental rotation and spatial working memory Contagious yawning and the brain Stereoscopic Depth and the Occlusion Illusion Neural mechanisms underlying auditory feedback control of speech An Interdisciplinary Study of Visual Indeterminacy == Programming == Presentation uses two proprietary scripting languages to describe and control experiments. It also has a Python module allowing the use of Python to control experiments. === SDL (Scenario Description Language) === SDL is a simple language used to describe the stimuli and trials which make up an experiment. Compile-time logic can be used to generate and/or randomize stimuli. === PCL (Program Control Language) === PCL is a fully functioning scripting language based loosely on C and Basic. It uses strong type checking to ensure that the intention of the programmer is explicit. Loops, "if" statements and subroutines are supported. It can be used in conjunction with the objects created in SDL, or used alone to create, manipulate and present stimuli. The editor supports code completion. === Python === Presentation has a
{"page_id": 24891442, "title": "Presentation (software)"}
history as a janitor and the date his employment began are all improbable, and there's no obvious reason for them to be. There is something incredibly fucky about all this. > Due to the lack of consistency and reliability within the above presented documents, further analysis of SCP-8426's documentation has been deemed pointless. The second half of that sentence is in blue, aka ‘probable’. But I don’t buy it, and my suspicions are growing. What comes next is… interesting. See, it _looks_ like someone’s trying to fool us, but there’s another explanation, and I’ll get to that shortly. They start by saying that they switched to two new methods of investigation: physical and ontological analysis. The first bit of physical analysis says that 8426 is Foundation-made (well, duh); and the second one got thrown out for giving contradictory evidence. The best we can glean is that 8426 is _really fucking big_ and throws out a lot of heat. They then tried to analyse the components; there’s a few that they’re not sure about, and some that they are sure about: Industrial capacitor(s), computer interface(s), magnetic field generator(s), quantum resistor(s), and material insertion chamber(s). So, it sounds like you put something in this thing and it throws it somewhere really hard. Other than that, we get this: > Based on the remaining components, it is clear that SCP-8426 is a device requiring and involving significant quantities of energy, in addition to requiring an additional material for operation, as indicated by the presence of the loading chamber(s). Now we get the ontological analysis. Basically, they applied various concepts to ‘8426’, and here’s the output: > The following concepts are presented, based on their ontological overlap with SCP-8426: > Innovation: -20% > Weapon: 0% > Machine: 98.5% > Appliance: 76% > Ferrite: 43%
{"source": 1441, "title": "from dpo"}
rotary wing assets and the total integration of available firepower, maneuver under the control of a ground or air maneuver commander to engage enemy forces or to seize and hold key terrain. (JP 3-18) See FM 3-96, FM 3-99. airborne assault – (DOD) The use of airborne forces to parachute into an objective area to attack and eliminate armed resistance and secure designated objectives. (JP 3-18) See FM 3-0, FM 3-96, FM 3-99. airborne mission coordinator – (DOD) The designated individual that serves as an airborne extension of the component commander or supported commander responsible for the personnel recovery mission. Also called AMC. (JP 3-50) See ATP 3-55.6. airborne operation – (DOD) An operation involving the air movement into an objective area of combat forces and their logistic support for execution of a tactical, operational, or strategic mission. (JP 3-18) See FM 3-96, FM 3-99. air defense – (DOD) Defensive measures designed to destroy attacking enemy aircraft or missiles in the atmosphere, or to nullify or reduce the effectiveness of such attack. Also called AD. (JP 3-01) See ATP 3-01.18, ATP 3-01.48. air defense artillery – (DOD) Weapons and equipment for actively combating air targets from the ground. Also called ADA. (JP 3-01) See ATP 3-01.48, ATP 3-01.81.(Army) The defensive measures designated to destroy attacking enemy aircraft or missiles in the atmosphere, or to nullify or reduce the effectiveness of such attack either through surveillance actions or active engagements of aerial threat. (ADRP 3-09) Military Terms > 14 August 2018 ADP 1-02 1-3 air defense warning condition – (DOD) An air defense warning given in the form of a color code corresponding to the degree of air raid probability with yellow standing for when an attack by hostile aircraft or missiles is probable; red for when an attack by hostile
{"source": 3710, "title": "from dpo"}
differentially private mechanisms pro-vide the same degree of privacy as do (ε, ν (κ)) -differentially private algorithms. In general there is no hope of getting rid of the ν(κ) term; for example, when encryption is involved there is always some (neglibly small) chance of guessing the decryption key. Once we assume the adversary is restricted to polynomial time, we can use the powerful techniques of secure multiparty computation to provide distributed online query release algorithms, replacing the trusted server with a distributed protocoal that simulates a trusted curator. Thus, for example, a set of hospitals, each holding the data of many patients, can collaboratively carry out statistical analyses of the union of their patients, while ensuring differential privacy for each patient. A more radical implication is that individuals can maintain their own data, opting in or out of each specific statistical query or study, all the while ensuring differential privacy of their own data. We have already seen one distributed solution, at least for the prob-lem of computing a sum of n bits: randomized response. This solution requires no computational assumptions, and has an expected error of Θ( √n). In contrast, the use of cryptographic assumptions permits much more accurate and extensive analyses, since by simulating the curator it can run a distributed implementation of the Laplace mechanism, which has constant expected error. This leads to the natural question of whether there is some other approach, not relying on cryptographic assumptions, that yields better accuracy in the distributed setting than does randomized response. Or more generally, is there a separation between what can be accomplished with computational differential privacy and what can be achieved with “traditional” differential privacy? That is, does cryptography provably buy us something? In the multiparty setting the answer is yes. Still confining our atten-tion to summing
{"source": 5783, "title": "from dpo"}