text
stringlengths
5
10.5k
source
stringlengths
33
146
column for each document. The word-context or term-term matrix has a row for each (target) word in BIBLIOGRAPHICAL AND HISTORICAL NOTES 29 the vocabulary and a column for each context term in the vocabulary. Two sparse weightings are common: the tf-idf weighting which weights each cell by its term frequency and inverse document frequency , and PPMI (point-wise positive mutual information), which is most common for word-context matrices. • Dense vector models have dimensionality 50–1000. Word2vec algorithms like skip-gram are a popular way to compute dense embeddings. Skip-gram trains a logistic regression classifier to compute the probability that two words are ‘likely to occur nearby in text’. This probability is computed from the dot product between the embeddings for the two words. • Skip-gram uses stochastic gradient descent to train the classifier, by learning embeddings that have a high dot product with embeddings of words that occur nearby and a low dot product with noise words. • Other important embedding algorithms include GloVe , a method based on ratios of word co-occurrence probabilities. • Whether using sparse or dense vectors, word and document similarities are computed by some function of the dot product between vectors. The cosine of two vectors—a normalized dot product—is the most popular such metric. # Bibliographical and Historical Notes The idea of vector semantics arose out of research in the 1950s in three distinct fields: linguistics, psychology, and computer science, each of which contributed a fundamental aspect of the model. The idea that meaning is related to the distribution of words in context was widespread in linguistic theory of the 1950s, among distributionalists like Zellig Harris, Martin Joos, and J. R. Firth, and semioticians like Thomas Sebeok. As Joos (1950) put it, > the linguist’s “meaning” of a morpheme. . . is by definition the set
{"source": 2721, "title": "from dpo"}
The primary participants were the graduates from the Multidisciplinary Studies (MDS) program , the General Studies offering, at the University of Texas at San Antonio (UTSA) from the last three years. A total population of 467 MDS graduates to potentially take the survey (B. Cordeau, stablish skills foundational > dictionary for competitive > entry level obs to determine > industry talent demands > reate Document > ollection of yllabi > uild the nitial orpus : > onvert D s to text > uild Training > Data et from > 200 records > kills > Dictionary > xtract skills topics > associated to skills > dictionary > ourse to kill lignment > erform analysis between > courses taken and skills to > determine likelihood of > meeting industry talent > demands > uild tudent ourse > Dfrom 3years of > student records > rovide uestionnaire to > eneral tudies graduates > ode the Data > ntrained Data > et 57 personal communication, September 24, 2021) . The second population for analysis was the syllabi for all undergraduate course s. The syllabi must be an undergraduate course, of fered at least once a year since 2018. The course must not require special permissions from an instructor to enroll, i.e., independent studies. The assumption is that a course - level outcome will not change regardless of the professor or section. The syllab i will be downloaded manually from the and stored locally. Sampling and Sampling Procedures Sampling is the process to select a predetermined number of observations from a population to estimate characteristics for a larger popu lation (Fink, 1995) . The sampling strategy consisted of all graduates from the last 3 years of the MDS program solicited to take the survey . The probability of return of the survey drove t
{"source": 4973, "title": "from dpo"}
dis-continuous. A simple example of this phenomenon is given in Problem 13. One way to show that φ is continuous is to show not only that the sequence {φn} converges, but also that it converges in a certain manner, known as uniform convergence. We do not take up 118 Chapter 2. First Order Differential Equations this question here but note only that the argument referred to in paragraph 2 is sufficient to establish the uniform convergence of the sequence {φn} and, hence, the continuity of the limit function φ in the interval |t| ≤ h.Now let us return to Eq. (7) φn+1(t) = ∫ t > 0 f [s, φn(s)] ds . Allowing n to approach ∞ on both sides, we obtain φ( t) = lim > n→∞ ∫ t > 0 f [s, φn(s)] ds . (26) We would like to interchange the operations of integrating and taking the limit on the right side of Eq. (26) so as to obtain φ( t) = ∫ t > 0 lim > n→∞ f [s, φn(s)] ds . (27) In general, such an interchange is not permissible (see Problem 14, for example), but once again, the fact that the sequence {φn(t)} converges uniformly is sufficient to allow us to take the limiting operation inside the integral sign. Next, we wish to take the limit inside the function f , which would give φ( t) = ∫ t > 0 f [s, lim > n→∞ φn(s)] ds (28) and hence φ( t) = ∫ t > 0 f [s, φ( s)] ds . (29) The statement that lim > n→∞ f [s, φn(s)] = f [s, lim > n→∞ φn(s)] is equivalent to the statement that f is continuous in its second variable, which is known by hypothesis. Hence Eq. (29) is
{"source": 6286, "title": "from dpo"}
strata they are found in and published his ideas in his 1816 book, "Strata identified by organized fossils." === Establishment of primary principles === Niels Stensen, more commonly known as Nicolas Steno (1638–1686), is credited with establishing four of the guiding principles of stratigraphy. In De solido intra solidum naturaliter contento dissertationis prodromus Steno states: When any given stratum was being formed, all the matter resting on it was fluid and, therefore, when the lowest stratum was being formed, none of the upper strata existed. ... strata which are either perpendicular to the horizon or inclined to it were at one time parallel to the horizon. When any given stratum was being formed, it was either encompassed at its edges by another solid substance or it covered the whole globe of the earth. Hence, it follows that wherever bared edges of strata are seen, either a continuation of the same strata must be looked for or another solid substance must be found that kept the material of the strata from being dispersed. If a body or discontinuity cuts across a stratum, it must have formed after that stratum. Respectively, these are the principles of superposition, original horizontality, lateral continuity, and cross-cutting relationships. From this Steno reasoned that strata were laid down in succession and inferred relative time (in Steno's belief, time from Creation). While Steno's principles were simple and attracted much attention, applying them proved challenging. These basic principles, albeit with improved and more nuanced interpretations, still form the foundational principles of determining the correlation of strata relative to geologic time. Over the course of the 18th-century geologists realised that: Sequences of strata often become eroded, distorted, tilted, or even inverted after deposition Strata laid down at the same time in different areas could have entirely different appearances The strata
{"page_id": 12967, "title": "Geologic time scale"}
Note the number of moles of gas on the left-hand side and the number of moles of gas on the right-hand side. When the volume of the system is changed, the partial pressures of the gases change. If we were to decrease pressure by increasing volume, the equilibrium of the above reaction will shift to the left, because the reactant side has a greater number of moles than does the product side. The system tries to counteract the decrease in partial pressure of gas molecules by shifting to the side that exerts greater pressure. Similarly, if we were to increase pressure by decreasing volume, the equilibrium shifts to the right, counteracting the pressure increase by shifting to the side with fewer moles of gas that exert less pressure. If the volume is increased because there are more moles of gas on the reactant side, this change is more significant in the denominator of the equilibrium constant expression, causing a shift in equilibrium. === Effect of adding an inert gas === An inert gas (or noble gas), such as helium, is one that does not react with other elements or compounds. Adding an inert gas into a gas-phase equilibrium at constant volume does not result in a shift. This is because the addition of a non-reactive gas does not change the equilibrium equation, as the inert gas appears on both sides of the chemical reaction equation. For example, if A and B react to form C and D, but X does not participate in the reaction: a A + b B + x X ↽ − − ⇀ c C + d D + x X {\displaystyle {\ce {{\mathit {a}}A{}+{\mathit {b}}B{}+{\mathit {x}}X<=>{\mathit {c}}C{}+{\mathit {d}}D{}+{\mathit {x}}X}}} . While it is true that the total pressure of the system increases, the total pressure
{"page_id": 37427, "title": "Le Chatelier's principle"}
and ceilings are sealed to allow easy cleaning and decontamination. Also, windows must be sealed, and a ventilation system installed which forces air to flow from the "clean" areas of the lab to the areas where infectious agents are handled. Air from the lab must be filtered before it can be recirculated. A 2015 study by USA Today journalists, identified more than 200 lab sites in the U.S. that were accredited biosafety levels 3 or 4. The Proceedings of a Workshop on "Developing Norms for the Provision of Biological Laboratories in Low-Resource Contexts" provides a list of BSL-3 laboratories in those countries. Biosafety level 3 is commonly used for research and diagnostic work involving various microbes which can be transmitted by aerosol and/or cause severe disease. These include Francisella tularensis, Mycobacterium tuberculosis, Chlamydia psittaci, Venezuelan equine encephalitis virus, Eastern equine encephalitis virus, SARS-CoV-1, MERS-CoV, Coxiella burnetii, Rift Valley fever virus, Rickettsia rickettsii, several species of Brucella, chikungunya, yellow fever virus, West Nile virus, and Yersinia pestis. === Biosafety level 4 === Biosafety level 4 (BSL-4) is the highest level of biosafety precautions, and is appropriate for work with agents that could easily be aerosol-transmitted within the laboratory and cause severe to fatal disease in humans for which there are no available vaccines or treatments. BSL-4 labs are generally set up to be either cabinet laboratories or protective-suit laboratories. In cabinet laboratories, all work must be done within a class III biosafety cabinet. Materials leaving the cabinet must be decontaminated by passing through an autoclave or a tank of disinfectant. The cabinets themselves are required to have seamless edges to allow easy cleaning. Also, the cabinet and all materials within must be free of sharp edges to reduce the risk of damage to the gloves. In a protective-suit lab, all work
{"page_id": 63942, "title": "Biosafety level"}
Black Sky: The Race For Space is a 2004 Discovery Channel documentary about Space Ship One, and how a small team backed by Paul Allen achieved human suborbital spaceflight and won the Ansari X Prize. It contains insights about how the rocketplane was built, the challenges they faced when they flew it, the vision of Burt Rutan about the future of this technology (tier two and three), and his thoughts about NASA and government. It won a Peabody Award in 2004. == See also == Orphans of Apollo, 2008 documentary on the tentative plan to privatize the space station Mir How to Make a Spaceship, 2016 book by Julian Guthrie about the Ansari X Prize == References == == External links == Black Sky: The Race for Space at IMDb Black Sky: The Race For Space at Vulcan Productions
{"page_id": 35284514, "title": "Black Sky: The Race for Space"}
In philosophy, an action is something an agent does. Actions contrast with events which merely happen to someone and are typically performed for a purpose and guided by an intention. The first question in the philosophy of action is to determine how actions differ from other forms of behavior, like involuntary reflexes. According to Ludwig Wittgenstein, it involves discovering "What is left over if I subtract the fact that my arm goes up from the fact that I raise my arm". A common response to this question focuses on the agent's intentions. So driving a car is an action since the agent intends to do so, but sneezing is a mere behavior since it happens independent of the agent's intention. The dominant theory of the relation between the intention and the behavior is causalism: driving the car is an action because it is caused by the agent's intention to do so. On this view, actions are distinguished from other events by their causal history. Causalist theories include Donald Davidson's account, which defines actions as bodily movements caused by intentions in the right way, and volitionalist theories, according to which volitions form a core aspect of actions. Non-causalist theories, on the other hand, often see intentions not as the action's cause but as a constituent of it. An important distinction among actions is between non-basic actions, which are done by doing something else, and basic actions, for which this is not the case. Most philosophical discussions of actions focus on physical actions in the form of bodily movements. But many philosophers consider mental actions to be a distinct type of action that has characteristics quite different from physical actions. Deliberations and decisions are processes that often precede and lead to actions. Actions can be rational or irrational depending on the reason
{"page_id": 317524, "title": "Action (philosophy)"}
The Gulf of California Rift Zone (GCRZ) is the northernmost extension of the East Pacific Rise which extends some 1,300 km (800 mi) from the mouth of the Gulf of California to the southern terminus of the San Andreas Fault at the Salton Sink. The GCRZ is an incipient rift zone akin to the Red Sea Rift. In the GCRZ continental crust originally associated with the North American plate has been pulled apart by tectonic forces and is being replaced by newly formed oceanic crust and seafloor spreading. The rifting has resulted in the transfer of the Baja California peninsula to the Pacific plate. == List of GCRZ transform faults == From north to south: Imperial Fault Zone Cerro Prieto Fault Ballenas Fault Partida Fault San Lorenzo Fault Guaymas Fault Carmen Fault Farallon Fault Atl Fault Pescadero Fault Tamayo Fault == List of GCRZ rift basins == From north to south: Brawley seismic zone Cerro Prieto Wagner Basin Consag Basin Adair-Tepoca Basin Tiburon Basin Delfin Basin San Pedro Martir Basin Guaymas Basin Carmen Basin Farallon Basin Pescadero Basin Alarcon Basin == References == Clayton, W.R. & Trampert, J. & Rebollar, C. & Ritsema, Jeroen & Persaud, Patricia & Paulssen, J.A.M. & Pérez-Campos, Xyoli & Wettum, A. & Perez-Vertti, A. & DiLuccio, F.. (2004). The NARS-Baja seismic array in the Gulf of California rift zone. MARGINS Newslett. 13.
{"page_id": 27090424, "title": "Gulf of California Rift Zone"}
KELT-3 is a star in the zodiac constellation Leo Minor. With an apparent magnitude of 9.82, it is too faint to be seen with the naked eye, but can be detected using a telescope. It is currently located around 681 light years away, based on parallax measurements. == Properties == KELT-3 is a late F-type main-sequence star with 27.7% more mass than the Sun, and is slightly larger than the latter. It is radiating 3 times the Sun's luminosity, and has a metallicity similar to the latter. It has an effective temperature of 6,304 K, which gives KELT-3 a yellow-white hue. It's also slightly younger than the Sun, with an age of 3 billion years. There is uncertainty about the star's age, it being an evolved star or not. Since 2015, the star is suspected to have a stellar companion, at angular separation of 3.762±0.009 arcseconds. == Planetary system == In 2013, KELT discovered an eccentric hot Jupiter transiting the star. In the research paper, it is stated as one of the brightest transiting hosts. The light curves of the star have been observed during transits. == See also == KELT == References ==
{"page_id": 67239625, "title": "KELT-3"}
Transfer constants are low-frequency gains (or in general ratios of the output to input variables) evaluated under different combinations of shorting and opening of reactive elements in the circuit (i.e., capacitors and inductors). They are used in general time- and transfer constant (TTC) analysis to determine the numerator terms and the zeros in the transfer function. The transfer constants are calculated under similar zero- and infinite-value conditions of reactive elements used in the Cochran-Grabel (CG) method to calculate time constants, but calculating the low-frequency transfer functions from a defined input source to the output terminal, instead of the resistance seen by the reactive elements. Transfer constants are shown as H i j k … {\textstyle H^{ijk\ldots }} , where the superscripts i j k … {\textstyle ijk\ldots } , are the indexes of the elements infinite valued (short-circuited capacitors and open-circuited inductors) in calculation of the transfer constant and the remains elements zero valued. The zeroth order transfer constant H 0 {\textstyle H^{0}} denotes the ratio of the output to input when all elements are zero-valued (hence the superscript of 0). H 0 {\textstyle H^{0}} often corresponds to the dc gain of the system. == References ==
{"page_id": 67541582, "title": "Transfer constant"}
benefit from these seismic gravities with the ultimate output of establishing the age-metallicity relation in this galaxy. Asteroseismology has crossed the doorstep of the structure and chemical evolution of this galaxy. Seismic signatures and extension of mixed zones during central hydrogen and helium burning: Increasing even further the scrutiny in analyzing the CoRoT and Kepler frequency spectra of red giants brought new important discoveries. Small and subtle differences in seismic signatures allow us to distinguish RGB from RC stars notwithstanding their similar luminosities. This is now theoretically confirmed thanks to elaborate red giant modeling. The period spacings of gravity-dominated modes are expected to be especially meaningful. Their detection for a large number of red giants could give us clues to establishing the extent of the extra-mixed region above the convective core during core hydrogen burning, but also the extent of the extra-mixed region during core helium burning, both mixing processes being a priori totally unrelated. ==== Massive stars ==== Massive variable main sequence stars have frequency spectra dominated by acoustic modes excited by the κ mechanism at work in layers where partial ionization of iron group elements produce a peak in opacity. In addition the most advanced of these stars present mixed modes i.e. modes with a g-character in deep layers and p-character in the envelope. Hydrogen burning takes place in a convective core surrounded by a region of varying chemical composition and an envelope mostly radiative except for tiny convective layers related to partial ionization of helium and/or iron group elements. As in lower mass stars the extent of the fully or partially mixed region located just above the convective core (extra-mixed zone) is one of the main uncertainties affecting theoretical modeling. β Cephei stars: Seismic analyses of β Cephei stars show that it is not obvious to derive
{"page_id": 208691, "title": "CoRoT"}
of the Meteoritical Society, 1984. Kuiper Prize of the American Astronomical Society, Division for Planetary Sciences, 1984. Leonard Medal of the Meteoritical Society, 1985. Distinguished Alumni Award of the California Institute of Technology, 1986. Rittenhouse Medal of the Rittenhouse Astronomical Society, co-recipient with C.S. Shoemaker, 1988. National Medal of Science, 1992. Whipple Award, American Geophysical Union, 1993. Fellow, American Academy of Arts and Sciences, 1993. AIAA Space Science Award, 1996. NASA Exceptional Scientific Achievement Medal, 1996. William Bowie Medal, American Geophysical Union, 1996. Special Award, American Association of Petroleum Geologists, 1997. Shoemaker Award, Texas Section of the American Institute of Professional Geologists, awarded posthumously, 1997. On July 24, 1997, a memorial for Shoemaker and Jurgen Rahe was presented in the U.S. House of Representatives by California representative George E. Brown Jr. The memorial was published in the Congressional Record. The memorial credited Shoemaker with being either the discoverer or co-discoverer of 820 asteroids and comets during his career. A ring-like topographic feature in Western Australia, an astrobleme previously named the "Teague ring" was renamed "Shoemaker Crater" in honor of Shoemaker. The Near Earth Asteroid Rendezvous space probe was renamed "NEAR Shoemaker" in his honor. It arrived at asteroid 433 Eros in February 2000, and landed on the asteroid after a year of orbital study. He was previously honored with the asteroid 2074 Shoemaker, discovered and named by his colleague, Eleanor F. Helin. In their 2020 album, Human. :II: Nature., Finnish metal band Nightwish paid tribute to Shoemaker in the song "Shoemaker". Composer Tuomas Holopainen says he was inspired by his biography, which moved the entire band to tears. == List of discovered minor planets == Shoemaker is credited by the Minor Planet Center with the co-discovery of 183 minor planets between 1977 and 1994. == Notes == == References ==
{"page_id": 247727, "title": "Eugene Merle Shoemaker"}
sequential interaction with the environment. Our method, Self-Predictive Representations (SPR), trains an agent to predict its own latent state representations multiple steps into the future. We compute target representations for future states using an encoder which is an exponential moving average of the agent’s parameters and we make predictions using a learned transition model. On its own, this future prediction objective outperforms prior methods for sample-efficient deep RL from pixels. We further improve performance by adding data augmentation to the future prediction loss, which forces the agent’s representations to be consistent across multiple views of an observation. Our full self-supervised objective, which combines future prediction and data augmentation, achieves a median human-normalized score of 0.415 on Atari in a setting limited to 100k steps of environment interaction, which represents a 55% relative improvement over the previous state-of-the-art. Notably, even in this limited data regime, SPR exceeds expert human scores on 7 out of 26 games. We’ve made the code associated with this work available at 233. When Optimizing $f$-Divergence is Robust with Label Noise Jiaheng Wei, Yang Liu rating : 6.75 - [7, 6, 7, 7] - Accept (Poster) tl;dr: We show when maximizing a properly defined $f$-divergence measure with respect to a classifier's predictions and the supervised labels is robust with label noise. We show when maximizing a properly defined $f$-divergence measure with respect to a classifier's predictions and the supervised labels is robust with label noise. Leveraging its variational form, we derive a nice decoupling property for a family of $f$-divergence measures when label noise presents, where the divergence is shown to be a linear combination of the variational difference defined on the clean distribution and a bias term introduced due to the noise. The above derivation helps us analyze the robustness of different $f$-divergence functions. With
{"source": 1216, "title": "from dpo"}
isn’t the power it possesses acquired as an influx dispensed from the sun? Yes entirely so. In which case the sun is not sight, however, being the cause of sight is it seen by sight itself? Quite so, he replied. Then you should realise that what I am describing is the offspring of the good which the good itself generated in a particular relation to itself: in so far as the good, in the realm of reason, relates to reason and whatever is known by reason, so does the sun, in the realm **508C**of sight, relate to sight and whatever is known by sight. In what way, he asked, tell me more? You know that whenever the eyes are no longer turned to objects whose colours receive the light of day but to objects in the dim light of the night, their keenness is blunted and they almost seem blind as though there is no clear vision in them. Very much so, he replied. And yet I believe, when they turn to objects on which the sun shines they see clearly and it appears that there is vision **508D**in those same eyes. Of course. Then you should also understand the condition of the soul in the same way. Whenever she rests on something upon which truth and ‘what is’ shine, she reasons and knows it and appears to possess reason. However, when directed to something compounded with darkness, which comes into being and is destroyed, she forms opinions, sees dimly, changes her opinions back and forth and in this situation, seems not to possess reason. Yes that is how it seems. Then you should declare that the form of the good bestows truth upon whatever is known **508E**and confers the power of knowing on the knower. Being the cause of
{"source": 3689, "title": "from dpo"}
in Z30 × Z45 × Z24 (c) (5 , 10 , 15) in Z25 × Z25 × Z25 (d) (8 , 8, 8) in Z10 × Z24 × Z80 17. Prove that D4 cannot be the internal direct product of two of its proper subgroups. 18. Prove that the subgroup of Q∗ consisting of elements of the form 2 m3n for m, n ∈ Z is an internal direct product isomorphic to Z × Z.19. Prove that S3 × Z2 is isomorphic to D6. Can you make a conjecture about D2n? Prove your conjecture. [ Hint: Draw the picture.] 20. Prove or disprove: Every abelian group of order divisible by 3 contains a subgroup of order 3. EXERCISES 153 21. Prove or disprove: Every nonabelian group of order divisible by 6 contains a subgroup of order 6. 22. Let G be a group of order 20. If G has subgroups H and K of orders 4 and 5 respectively such that hk = kh for all h ∈ H and k ∈ K, prove that G is the internal direct product of H and K.23. Prove or disprove the following assertion. Let G, H, and K be groups. If G × K ∼= H × K, then G ∼= H.24. Prove or disprove: There is a noncyclic abelian group of order 51. 25. Prove or disprove: There is a noncyclic abelian group of order 52. 26. Let φ : G1 → G2 be a group isomorphism. Show that φ(x) = e if and only if x = e.27. Let G ∼= H. Show that if G is cyclic, then so is H.28. Prove that any group G of order p, p prime, must be isomorphic to Zp.29. Show that Sn is isomorphic to a subgroup of An+2 .30. Prove that
{"source": 5734, "title": "from dpo"}
7 Since the argument has a counterexample, it is invalid. Since all and only valid arguments are provable in our system of deduction, the attempted derivation at 3.10.4 was indeed quixotic. To complete chapter 3, then, and our study of PL, use the tools from both chapters 2 and 3 on the exercises below, which give you arguments and propositions without telling you whether they are valid or invalid, logical truths or not. EXERCISES 3.10a Determine whether each of the following arguments is valid or invalid. If it is valid, provide a derivation of the conclusion. If it is invalid, provide a counterexample. 1. 1. A ≡ C 2. C ⊃ (D ∨ B) 3. D /A⊃B 2. 1. E 2. (E ∨ G) ⊃ H 3. H ⊃ F 4. (F ∙ E) ⊃ ∼G / ∼G 3. 1. L ⊃ I 2. I ⊃ (K ⊃ J) 3. K ⊃ L /J⊃L 4. 1. M ⊃ N 2. N ≡ ∼O 3. ∼N ⊃ (M ∙ O) / ∼N 5. 1. (Q ∨ R) ≡ ∼P 2. Q ∨ S 3. P /S∙R 6. 1. X ⊃ W 2. W ⊃ X 3. Y 4. (Z ∙ Y) ⊃ ∼X / ∼X 2 0 8 C h apter 3 Inference i n P ropos i t i onal L og i c 7. 1. (A ∙ B) ⊃ (C ∙ D) 2. ∼C 3. B 4. A ∨ (∼D ∙ ∼B) / ∼D 8. 1. E ∨ F 2. ∼F ∨ G 3. E ≡ G 4. F ⊃ (G ∨ E) /F 9. 1. P ⊃ Q 2. R ∨ S 3. ∼R 4. Q ⊃ S / ∼P 10. 1. Z ≡ ∼X 2. ∼X ∨ Y 3. W ∙ ∼Y /Z∙W 11. 1. A ≡
{"source": 6816, "title": "from dpo"}
{x=0}{\sum }}}{\overset {y<H}{\underset {y=0}{\sum }}}|input(x,y)-P[F](x,y)|} where i n p u t {\displaystyle input} is the input image, x {\displaystyle x} and y {\displaystyle y} are the pixel coordinates along the horizontal and vertical axis respectively, W {\displaystyle W} and H {\displaystyle H} are the image width and height in number of pixels respectively, F {\displaystyle F} is the fly population, and P {\displaystyle P} is a projection operator that creates an image from flies. This projection operator P {\displaystyle P} can take many forms. In her work, Z. Ali Aboodd uses OpenGL to generate different effects (e.g. mosaics, or spray paint). For speeding up the evaluation of the fitness functions, OpenCL is used too. The algorithm starts with a population F {\displaystyle F} that is randomly generated (see Line 3 in the algorithm above). F {\displaystyle F} is then assessed using the global fitness to compute G f i t n e s s ( F ) = ∑ x = 0 x < W ∑ y = 0 y < H | i n p u t ( x , y ) − P [ F ] ( x , y ) | {\displaystyle G_{fitness}(F)={\overset {x<W}{\underset {x=0}{\sum }}}{\overset {y<H}{\underset {y=0}{\sum }}}|input(x,y)-P[F](x,y)|} (see Line 10). G f i t n e s s {\displaystyle G_{fitness}} is the objective function that has to be minimized. == See also == Mathematical optimization Metaheuristic Search algorithm Stochastic optimization Evolutionary computation Evolutionary algorithm Genetic algorithm Mutation (genetic algorithm) Crossover (genetic algorithm) Selection (genetic algorithm) == References ==
{"page_id": 52188012, "title": "Fly algorithm"}
doing work on the system, or letting the system do work. As another example, to approximate the expansion in an internal combustion engine as reversible, we would be assuming that the temperature and pressure uniformly change throughout the volume after the spark. Obviously, this is not true and there is a flame front and sometimes even engine knocking. One of the reasons that Diesel engines are able to attain higher efficiency is that the combustion is much more uniform, so less energy is lost to dissipation and the process is closer to reversible. The phenomenon of irreversibility results from the fact that if a thermodynamic system, which is any system of sufficient complexity, of interacting molecules is brought from one thermodynamic state to another, the configuration or arrangement of the atoms and molecules in the system will change in a way that is not easily predictable. Some "transformation energy" will be used as the molecules of the "working body" do work on each other when they change from one state to another. During this transformation, there will be some heat energy loss or dissipation due to intermolecular friction and collisions. This energy will not be recoverable if the process is reversed. Many biological processes that were once thought to be reversible have been found to actually be a pairing of two irreversible processes. Whereas a single enzyme was once believed to catalyze both the forward and reverse chemical changes, research has found that two separate enzymes of similar structure are typically needed to perform what results in a pair of thermodynamically irreversible processes. == Absolute versus statistical reversibility == Thermodynamics defines the statistical behaviour of large numbers of entities, whose exact behavior is given by more specific laws. While the fundamental theoretical laws of physics are all time-reversible, experimentally the
{"page_id": 636094, "title": "Irreversible process"}
as V–R–B–I can be obtained from observations within a few minutes. == Appraisal == These classification schemes are expected to be refined and/or replaced as further research progresses. However, for now the spectral classification based on the two above coarse resolution spectroscopic surveys from the 1990s is still the standard. Scientists have been unable to agree on a better taxonomic system, largely due to the difficulty of obtaining detailed measurements consistently for a large sample of asteroids (e.g. finer resolution spectra, or non-spectral data such as densities would be very useful). == Correlation with meteorite types == Some groupings of asteroids have been correlated with meteorite types: C-type – Carbonaceous chondrite meteorites S-type – Stony meteorites M-type – Iron meteorites V-type – HED meteorites == See also == Asteroid mining == References == == External links == Asteroid spectrum classification using Bus-DeMeo taxonomy, Planetary Spectroscopy at MIT (2017)
{"page_id": 2701177, "title": "Asteroid spectral types"}
Our Final Invention: Artificial Intelligence and the End of the Human Era is a 2013 non-fiction book by the American author James Barrat. The book discusses the potential benefits and possible risks of human-level (AGI) or super-human (ASI) artificial intelligence. Those supposed risks include extermination of the human race. == Summary == James Barrat weaves together explanations of AI concepts, AI history, and interviews with prominent AI researchers including Eliezer Yudkowsky and Ray Kurzweil. The book starts with an account of how an artificial general intelligence could become an artificial super-intelligence through recursive self-improvement. In subsequent chapters, the book covers the history of AI, including an account of the work done by I. J. Good, up to the work and ideas of researchers in the field today. Throughout the book, Barrat takes a cautionary tone, focusing on the threats artificial super-intelligence poses to human existence. Barrat emphasizes how difficult it would be to control or even to predict the actions of something that may become orders of magnitude more intelligent than the most intelligent humans. == Reception == On 13 December 2013, journalist Matt Miller interviewed Barrat for his podcast, "This... is interesting". The interview and related matters to Barrat's book, Our Final Invention, were then captured in Miller's weekly opinion piece for The Washington Post. Seth Baum, executive director of the Global Catastrophic Risk Institute and one of the people cited by Barrat in his book, reviewed the book favorably on Scientific American's "invited guest" blog, calling it a welcome counterpoint to the vision articulated by Ray Kurzweil in his book The Singularity is Near. Gary Marcus questions Barrat's argument "that tendencies toward self-preservation and resource acquisition are inherent in any sufficiently complex, goal-driven system", noting that present-day AI does not have such drives, but Marcus concedes "that the
{"page_id": 40930229, "title": "Our Final Invention"}
Taurus Tomahawk is a two-stage sounding rocket, consisting of a Taurus first stage derived from MGR-1 Honest John rocket and a TE-416 Tomahawk upper stage. Taurus Tomahawks were used between 1978 and 1987. The rocket had a launch thrust of 82,000 lbf (360 kN), a launch weight of 1,657 kg (3,653 lb), a diameter of 58 cm (22.8 in) and an overall length of 9.72 m (31.9 ft). It could carry 27 kg (60 lb) of payload to an altitude of 590 km (370 mi). == References == == External links == Taurus Tomahawk
{"page_id": 1438271, "title": "Taurus Tomahawk"}
more reliable power amplification, a new COTS signal generator, and a longer, more functional littoral fiber optic tow cable (LFOTC) for operation in shallow water. The AN/SLQ-25D was a planned upgrade with a contract awarded in 2009. It was to feature an open architecture, allowing it to serve as a host to other systems and support their information gathering and threat detection. In 2012, the AN/SLQ-25D program became a part of the Surface Ship Torpedo Defense (SSTD) program, a US Navy effort to field a system that could detect and destroy incoming torpedoes. The AN/SLQ-25D was redesignated as the AN/SLQ-25X, and it was intended to be the tow point for the torpedo detection sensors. However, the Navy canceled the SSTD program and with it the AN/SLQ-25X in 2018. In place of the canceled AN/SLQ-25X, AN/SLQ-25E procurement began in 2022. The AN/SLQ-25E addresses obsolescence issues with previous AN/SLQ-25 variants by updating the hardware and software to a COTS-based, modular, and open architecture. The AN/SLQ-25E has improved capability against wake-homing, acoustic-homing, and wire-guided torpedoes. All existing AN/SLQ-25 units are being upgraded to the AN/SLQ-25E baseline. == Further development == Under a joint UK/US memorandum of understanding, the UK MoD and the US DoD are furthering torpedo survivability systems. The US is currently working on an Active Source program called the DCL Technology Demonstrator programme, and the UK has developed and entered into service the S2170 Surface Ship Torpedo Defence system. An improved torpedo countermeasure system called the AN/SLQ-61 Lightweight Tow (LWT) Torpedo Defense Mission Module (TDMM) is lighter than the AN/SLQ-25 and has a different tow profile, making it more suited for small combatant warships operating in littoral environments. The LWT is a modular, digitally controlled soft kill countermeasure decoy that can defend ships against wake-homing, acoustic-homing, and wire-guided torpedoes. == References
{"page_id": 1937819, "title": "AN/SLQ-25 Nixie"}
wrong due to reasons discussed above. In this model, the Lhasa tectonic block, equivalent to the southern Tibet, experienced initial uplift due to compressional force created when the Indian and Asian continent collided and the Tethys oceanic slab broke off (45—30 Ma). This is supported by the presence of Adakite in the Lhasa block. Adakite is an intermediate to felsic rock which is commonly related to oceanic subduction. Geochemical analysis of the Lhasa Adakite suggests that it is originated from magmatic activities triggered by slab breakoff. This further reinforces the hypothesis that Lhasa block is uplifted during the initial continental collision phase. Later, magmatic activity ceased as the continent collision occurred. Denser materials in the Indian and Asian continental crust sank to the bottom part of the crust, making the lower crust extremely dense and heavy. It thus broke off and sank into the mantle. The removal of the dense lower crust reduced gravitational pull on the Lhasa block and allowed it to rise (30—26 Ma). Together with the intense compressional force and thrusting it experienced amidst collision, intense crustal thickening occurred, resulting in the major phase of uplift in South Tibet. As the collision proceed (26—13 Ma), the Northern Tibet continental block experienced compression, thrusting and shortening as well. This interpretation is supported by the thermochronological data of apatite fission tracks from the North Tibetan Plateau, which indicate phases of rapid exhumation and compression from 20 Ma onwards. ==== Mesozoic uplift model ==== The Mesozoic model suggested that southern Tibet experienced intense crustal shortening and thickening as early as in Jurassic to Cretaceous time. It is widely accepted that the Indian plate began to approach the Eurasian plate during the Mesozoic times as a result of the break up of Gondwana supercontinent. In the Mesozoic time, there was an
{"page_id": 61748831, "title": "Paleogeography of the India–Asia collision system"}
for stereo sound; most systems have multi-channel surround sound power amplifier and six or more speakers (a 5.1 surround sound system has left and right front speakers, a centre speaker, left and right rear speakers and a low-frequency subwoofer speaker enclosure). Some users have 7.1 Surround Sound. It is possible to have up to 11 speakers with additional subwoofers. Video output: A large-screen display, typically an HDTV. Some users may have a 3D TV. As of 2015, flatscreen HDTVs are the norm. Options include Liquid crystal display television (LCD), plasma TV, and OLED. Home cinema users may also use a video projector and a movie screen. If a projector is used, a portable, temporary screen may be used,a screen may be permanently mounted or the image may be projected directly on a wall. Seating and atmosphere: Comfortable seating is often provided to improve the cinema feel. Some luxury home cinemas have movie theater-style padded chairs for guests. Higher-end home theaters commonly also have sound insulation to prevent noise from escaping the room and specialized wall treatment to balance the sound within the room. Wall color can be optimized. == Component systems vs. theater-in-a-box == Home cinemas can either be set up by purchasing individual components one by one (e.g., buying a multichannel amp from one manufacturer, a Blu-ray player from another manufacturer, speakers from another company, etc.) or a by purchasing a HTIB (Home Theater in a Box) package which includes all components from a single manufacturer, with the exception of a TV or projector. HTIB systems typically include a DVD or Blu-ray player, a surround sound amplifier, five surround speakers, a subwoofer cabinet, cables and a remote. The benefit of purchasing separate components one by one is that consumers can attain improved quality in video or audio and better
{"page_id": 183370, "title": "Home cinema"}
Computer Society, the IET and the Institute of Physics. His work focuses on developing metal-oxide Resistive Random-Access Memory technologies and related applications and is leading an interdisciplinary team comprising 30 researchers with expertise ranging from materials process development to electron devices and circuits and systems for embedded applications. == Regius Professors of Engineering in the University of Edinburgh == George Wilson MD FRSE (1855) - as the Regius Professor of Technology Henry Charles Fleeming Jenkin FRS (1868) George Frederick Armstrong FRSE FGS FRSSA (1885) Sir Thomas Hudson Beare DL FRSE FRSSA (1901) Ronald Nathan Arnold FRSE (1946) Leslie Gordon Jaeger CM FRSE FCAE FEIC, FCSCE (1964) James Lawrence King FIMA (1968) Joseph McGeough FREng FRSE (1983) Peter Mitchell Grant OBE FREng FRSE FIEEE (2007) Jason Meredith Reese FREng FRSE (2013) Themis Prodromakis FRSC FBCS FInstP FIET (2022) == References ==
{"page_id": 41116100, "title": "Regius Professor of Engineering (Edinburgh)"}
immutable sequences, typically used to store collections of heterogeneous data (such as the 2-tuples produced by the `enumerate()` built-in). Tuples are also used for cases where an immutable sequence of homogeneous data is needed (such as allowing storage in a `set` or `dict` instance). _class_ tuple([_iterable_])¶ Tuples may be constructed in a number of ways: * Using a pair of parentheses to denote the empty tuple: `()` * Using a trailing comma for a singleton tuple: `a,` or `(a,)` * Separating items with commas: `a, b, c` or `(a, b, c)` * Using the `tuple()` built-in: `tuple()` or `tuple(iterable)` The constructor builds a tuple whose items are the same and in the same order as _iterable_’s items. _iterable_ may be either a sequence, a container that supports iteration, or an iterator object. If _iterable_ is already a tuple, it is returned unchanged. For example, `tuple('abc')` returns `('a', 'b', 'c')` and `tuple( [1, 2, 3] )` returns `(1, 2, 3)`. If no argument is given, the constructor creates a new empty tuple, `()`. Note that it is actually the comma which makes a tuple, not the parentheses. The parentheses are optional, except in the empty tuple case, or when they are needed to avoid syntactic ambiguity. For example, `f(a, b, c)` is a function call with three arguments, while `f((a, b, c))` is a function call with a 3-tuple as the sole argument. Tuples implement all of the common`]( "collections.namedtuple") may be a more appropriate choice than a simple tuple object. ### Ranges¶ The `range` type represents an immutable sequence of numbers and is commonly used for looping a specific
{"source": 0, "title": "from dpo"}
node DRAM. The memory controllers implement a directory scheme to maintain > MSP SSP SSSuperscalar unit VVector unit VVSSP SVVSSP SVVSSP SVV0.5 MB Ecache 0.5 MB Ecache 0.5 MB Ecache 0.5 MB Ecache Figure G.11 Cray MSP module. (From Dunnigan et al. .) G-22 ■ Appendix G Vector Processors in More Depth coherency between the four Ecaches on a node. Accesses from remote nodes will obtain the most recent version of a location, and remote stores will invalidate local Ecaches before updating memory, but the remote node cannot cache these local locations. Vector loads and stores are particularly useful in the presence of long-latency cache misses and global communications, as relatively simple vector hardware can generate and track a large number of in-flight memory requests. Contemporary superscalar microprocessors support only 8 to 16 outstanding cache misses, whereas each MSP processor can have up to 2048 outstanding memory requests (512 per SSP). To compensate, superscalar microprocessors have been moving to larger cache line sizes (128 bytes and above) to bring in more data with each cache miss, but this leads to significant wasted bandwidth on non-unit stride accesses over large datasets. The X1 design uses short 32-byte lines throughout to reduce bandwidth waste and instead relies on supporting many independent cache misses to sustain memory bandwidth. This latency tolerance together with the huge memory bandwidth for non-unit strides explains why vector machines can provide large speedups over superscalar microprocessors for certain codes. # Multi-Streaming Processors The Multi-Streaming concept was first introduced by Cray in the SV1, but has been considerably enhanced in the X1. The four SSPs within an MSP share Ecache, and there is hardware support for barrier synchronization across the four SSPs within an MSP. Each X1 SSP has a two-lane vector unit with 32 vector registers each holding
{"source": 2300, "title": "from dpo"}
claim that random testing is not effective for this examples because the chances of hitting bugs are very low. Based on the SimpleCalc grammar, there are 80,910 valid strings of size four, 21 27,032 of size three, 62 of size two and 62 of size one. To calculate the number of valid input buffers, we take account of the string terminator. With an input of size one, the string terminator must be at input . The contents at input and input do not matter. Therefore, there is a total of 2 8 · 28 · 62 = 4,187,046 inputs representing valid strings of size one. Following the same calculation, we have 15,872 inputs representing valid strings of size two, 27,032 of size three and 80,910 of size four, totaling close to 4.2 million valid inputs. Therefore, every input has around a 0.1% chance of being a syntactically correct input and the majority of these inputs will be only of size one, thus unlikely to exercise any interesting paths. Generating an input that will show buggy behavior in this calculator is smaller. This implementation does not check for divide by zero errors, there-fore operations dividing by zero or modulo by zero result in runtime exceptions. Valid strings containing “/0” or “%0” result in this error. For valid inputs of size four or less, there are only 372 inputs that demonstrate the error. Thus, random testing has a 0.000009% chance of hitting bugs. In fact, even if SimpleCalc is tested with 8 million random inputs, there is only a 50% chance that a bug caus-ing string would have been generated. The problem, as is well-known, is that random testing is neither selective nor directed. 3.1.2 Constrained Exhaustive Enumeration Specification-based test generation improves the pitfalls of random testing by generating inputs
{"source": 4191, "title": "from dpo"}
k \prime )] 14 As observed by Zwick [Zwi04], we do not need to allow for unit cost subtractions in the model; when we wish to compare two quantities xyand abin the above, we simulate this by comparing > x+band a+y, as in Fredman's trick. Downloaded 07/21/22 to 18.9.61.111 . Redistribution subject to SIAM license or copyright; see Copyright © by SIAM. Unauthorized reproduction of this article is prohibited. 570 R. RYAN WILLIAMS In the expression P , there are at most d different ANDs over d comparisons. In order to get a ``short"" polynomial, we need to reduce the fan-in of the ANDs. Razborov and Smolensky proposed the following probabilistic construction: For an AND over d variables y1, . . . , y d, let e \geq 1 be an integer, choose independently and uniformly at random e\cdot d bits r1,1, . . . , r 1,d , r 2,1, . . . , r 2,d , . . . , . . . , r e, 1, . . . , r e,d \in \{ 0, 1\} ,and consider the expression E(y1, . . . , y d) = > e \bigwedge > i=1 \left( 1 + > d \bigoplus > j=1 ri,j \cdot (yj + 1) \right) , where + corresponds to addition modulo 2. Note that when the ri,j are fixed con-stants, E is an AND of e XORs of at most d + 1 variables yj possibly along with the constant 1. Claim
{"source": 6062, "title": "from dpo"}
α-Hexylcinnamaldehyde (hexyl cinnamal) is a common additive in the perfume and cosmetic industry as aroma substance. It is found naturally in the essential oil of chamomile. It is a pale yellow to yellow liquid to solid, which is nearly insoluble in water but soluble in oils. The commercial material often contains low levels of 2,6-di-tert-butyl-4-methoxyphenol as a stabilizer. It is a derivative of cinnamaldehyde with a hexyl substituent. One supplier reported that its hexyl cinnamaldehyde (or "hexyl cinnamic aldehyde") contained at least 90% trans isomer. == Synthesis == Hexyl cinnamaldehyde is typically produced via crossed-aldol condensation of octanal and benzaldehyde. == Safety == Hexyl cinnamaldehyde is known to cause contact allergies in some individuals but the rate of incidence is low, with patch tests indicating ~0.1% of people to be susceptible. == References ==
{"page_id": 12850234, "title": "Α-Hexylcinnamaldehyde"}
instruments, and healing or food-gathering implements. Food now replaces "DNA points" as the player's currency, and can be spent on structures and additional tribe members, or used to appease other tribes of different species. Tribe members also gain the option to wear clothes, the editing of which replaces the Creature Editor in the 'Tribal Outfitter'. Combat can be made more effective with weapons like stone axes, spears, and torches. For socializing, a player can obtain musical instruments: wooden horns, maracas and didgeridoos. Miscellaneous tools can be used for fishing and gathering food and for healing tribe members. All tools, however, require a specialized tool shack, which costs food to build. Tribe members can also gather food, an essential concept. Food can be stolen by wild creatures or by other tribes in the form of raids. The diet choice that the player made in prior stages, whether herbivore, omnivore, or carnivore, determines what food the tribe can gather and eat. Animals can be hunted for meat, and fish or seaweed can be speared for food. Fruit is gathered from trees and bushes, and players can also domesticate animals for eggs, which all diet types can eat. Any foreign animals in the player's pack in the Creature Stage are automatically added to the tribe as farm animals. Epic creatures may threaten nests or tribes. Allied tribes will occasionally bring the player gifts of food. Players can steal food from other tribes (though it angers them), and dead tribes may be pillaged for their food. There are five other tribes that appear along with the player's tribe. For every tribe befriended or destroyed, a piece of a totem pole is built, which may increase the population limit of the player's tribe or grant access to new tools and clothes. When all five tribes
{"page_id": 18248185, "title": "Spore (2008 video game)"}
use of O which was introduced by Polish physician Ludwik Hirszfeld and German physician Emil von Dungern in 1910. It was never clear whether it was meant for the figure 0, German null for zero or the upper case letter O for ohne, meaning without; Landsteiner chose the letter. In 1928 the Permanent Commission on Biological Standardization adopted Landsteiner's proposal and stated:The Commission learns with satisfaction that, on the initiative of the Health Organization of the League of Nations, the nomenclature proposed by von Dungern and Hirszfeld for the classification of blood groups has been generally accepted, and recommends that this nomenclature shall be adopted for international use as follows: 0 A B AB. To facilitate the change from the nomenclature hitherto employed the following is suggested: Jansky ....O(I) A(II) B(III) AB(IV) Moss ... O(IV) A(II) B(III) AB(I) This classification became widely accepted and after the early 1950s it was universally followed. Hirszfeld and Dungern discovered the inheritance of blood types as Mendelian genetics in 1910 and the existence of sub-types of A in 1911. In 1927, Landsteiner, with Philip Levine, discovered the MN blood group system, and the P system. Development of the Coombs test in 1945, the advent of transfusion medicine, and the understanding of ABO hemolytic disease of the newborn led to discovery of more blood groups. As of October 2024, the International Society of Blood Transfusion (ISBT) recognizes 47 blood groups. == Society and culture == A popular pseudoscientific belief in Eastern Asian countries (especially in Japan and South Korea) known as 血液型 ketsuekigata / hyeoraekhyeong is that a person's ABO blood type is predictive of their personality, character, and compatibility with others. Researchers have established no scientific basis exists for blood type personality categorization, and studies have found no "significant relationship between personality and blood
{"page_id": 55309, "title": "Blood type"}
the board of directors of the company and sold his shares. == God view and privacy concerns == In November 2014, then U.S. Senator Al Franken, Chairman of the United States Senate Judiciary Subcommittee on Privacy, Technology and the Law, expressed concerns regarding ride sharing privacy, specifically Uber's "God View", whereby the whereabouts of specific customers, including journalists and politicians, are able to be tracked by Uber insiders. In December 2014, in response to Franken, Uber implemented restrictions on that function. In 2012, an Uber employee tracked the frequency of probable one-night stands in six U.S. cities by day and neighborhood, by correlating late-night and next-day trips. The blog posting coined the term "ride of glory" for the Uber equivalent of a walk of shame. == Delayed disclosure of data breaches == On February 27, 2015, Uber admitted that it had suffered a data breach more than nine months prior. Names and license plate information from approximately 50,000 drivers were inadvertently disclosed. Uber discovered this leak in September 2014, but waited more than five months to notify the affected individuals. An announcement in November 2017 revealed that in 2016, a separate data breach had disclosed the personal information of 600,000 drivers and 57 million customers. This data included names, email addresses, phone numbers, and drivers' license information. Hackers used employees' usernames and passwords that had been compromised in previous breaches (a "credential stuffing" method) to gain access to a private GitHub repository used by Uber's developers. The hackers located credentials for the company's Amazon Web Services datastore in the repository files, and were able to obtain access to the account records of users and drivers, as well as other data contained in over 100 Amazon S3 buckets. Uber paid a $100,000 ransom to the hackers on the promise they would
{"page_id": 70708060, "title": "Controversies surrounding Uber"}
Joseph Yehuda Halpern (born May 29, 1953) is an Israeli-American professor of computer science at Cornell University. Most of his research is on reasoning about knowledge and uncertainty. == Biography == Halpern graduated in 1975 from University of Toronto with a B.S. in mathematics. He went on to earn a Ph.D. in mathematics from Harvard University in 1981 under the supervision of Albert R. Meyer and Gerald Sacks. He has written three books, Actual Causality, Reasoning about Uncertainty, and Reasoning About Knowledge and is a winner of the 1997 Gödel Prize in theoretical computer science and the 2009 Dijkstra Prize in distributed computing. From 1997 to 2003, he was editor-in-chief of the Journal of the ACM. In 2002, he was inducted as a Fellow of the Association for Computing Machinery and in 2012 he was selected as an IEEE Fellow. In 2011, he was awarded a Senior Fellowship of the Zukunftskolleg at the University of Konstanz. In 2019, Halpern was elected a member of the National Academy of Engineering for methods of reasoning about knowledge, belief, and uncertainty and their applications to distributed computing and multiagent systems. Halpern is also the administrator for the Computing Research Repository, the computer science branch of arXiv.org, and the moderator for the "general literature" and "other" subsections of the repository. His students include Nir Friedman, Daphne Koller, and Yoram Moses. == References == == External links == Joe Halpern's homepage Google scholar profile
{"page_id": 2929332, "title": "Joseph Halpern"}
with vanilla ice cream and chocolate syrup. Colonel: lemon sorbet with vodka. Plombières: almond extract, kirsch, and candied fruit. Vacherin glacé: a layer or two of meringue, topped with vanilla ice cream and raspberry sorbet and finished off with a Chantilly cream. Omelette norvégienne: sponge cake, ice cream and meringue, hot on the outside and iced on the inside. == Germany == One of the first well known Italian ice cream parlors (Eisdiele) was founded in Munich in 1879 and run by the Sarcletti family. This traditional family business was handed from generation to generation ever since. Since the 1920s, when a number of Italians immigrated and set up business, the traditional ice cream parlors became popular. A popular German ice cream dish is Spaghettieis, created by Dario Fontanella in the 1960s and made to look like a plate of spaghetti. About 80% percent of the ice cream sold in Germany is produced industrially, with the leading manufacturer being Unilever. About 17% is produced commercially and the remaining 3% is produced for the soft serve sector. In 2013, Germany had the largest market for ice cream in Europe at $2.7 billion revenue. == Ghana == In 1962, the Ghanaian treat FanIce was created by the Fan Milk Limited Company. FanIce comes in strawberry, chocolate, and vanilla. FanMilk also makes additional products, though FanIce is the closest to Western ice cream. Pouches of FanIce and other FanMilk products can be bought from men on bikes equipped with chill boxes in any moderately sized town, and in cities large enough for grocery stores. FanMilk can also be bought in tubs for eating at home. In 2006, FanMilk was voted best ice-cream in the world. == Great Britain == Lyons Maid, Walls are among the brand sold in Great Britain. == Greece ==
{"page_id": 30224834, "title": "List of ice cream varieties by country"}
drop across resistor (R1) decides the reference voltages i.e., upper threshold voltage (V+) and lower threshold voltages (V−) for the comparison with input signal applied. These voltages are fixed as the output voltage and resistor values are fixed. so by changing the drop across (R1) threshold voltages can be varied. By adding a bias voltage in series with resistor (R1) drop across it can be varied, which can change threshold voltages. Desired values of reference voltages can be obtained by varying bias voltage. The above equations can be modified as: V ± = ± V s R 1 R 1 + R 2 + V b R 2 R 1 + R 2 {\displaystyle V_{\pm }=\pm V_{s}{\frac {R_{1}}{R_{1}+R_{2}}}+V_{b}{\frac {R_{2}}{R_{1}+R_{2}}}} == Applications == Schmitt triggers are typically used in open loop configurations for noise immunity and closed loop configurations to implement function generators. Analog-to-digital conversion: The Schmitt trigger is effectively a one bit analog to digital converter. When the signal reaches a given level it switches from its low to high state. Level detection: The Schmitt trigger circuit is able to provide level detection. When undertaking this application, it is necessary that the hysteresis voltage is taken into account so that the circuit switches on the required voltage. Line reception: When running a data line that may have picked up noise into a logic gate it is necessary to ensure that a logic output level is only changed as the data changed and not as a result of spurious noise that may have been picked up. Using a Schmitt trigger broadly enables the peak to peak noise to reach the level of the hysteresis before spurious triggering may occur. === Noise immunity === One application of a Schmitt trigger is to increase the noise immunity in a circuit with only a
{"page_id": 379241, "title": "Schmitt trigger"}
on January 11, 2015. Zeller, Christian (1885). "Kalender-Formeln". Mathematisch-naturwissenschaftliche Mitteilungen des mathematisch-naturwissenschaftlichen Vereins in Württemberg (in German). 1 (1): 54–58. Archived from the original on January 11, 2015. Zeller, Christian (1886). "Kalender-Formeln". Acta Mathematica (in German). 9: 131–136. doi:10.1007/BF02406733. == External links == The Calendrical Works of Rektor Chr. Zeller: The Day-of-Week and Easter Formulae by J R Stockton, near London, UK. The site includes images and translations of the above four papers, and of Zeller's reference card "Das Ganze der Kalender-Rechnung". This article incorporates public domain material from Paul E. Black. "Zeller's congruence". Dictionary of Algorithms and Data Structures. NIST.
{"page_id": 1207119, "title": "Zeller's congruence"}
that of movie theater Front-projection televisions take up very little space because a projector screen is extremely slim, and even a suitably prepared wall can be used Display size can be extremely large, typically limited by room height. Disadvantages Front-projection more difficult to set up because projector is separate and must be placed in front of the screen, typically on the ceiling Lamp may need to be replaced after heavy usage Image brightness is an issue, may require darkened room. ==== Rear-projection television ==== Advantages Significantly cheaper than flat-panel counterparts Projectors that are not phosphor-based (LCD/DLP) are not susceptible to burn-in Rear-projection is not subject to glare Disadvantages Rear-projection televisions are much bulkier than flat-panel televisions Lamp may need to be replaced after heavy usage Rear-projection has smaller viewing angles than those of flat-panel displays == Comparison of different types of rear-projection televisions == === CRT projector === Advantages: Achieves excellent black level and contrast ratio Achieves excellent color reproduction CRTs have generally very long lifetimes Greater viewing angles than those of LCDs Disadvantages: Heavy and large, especially depth-wise If one CRT fails the other two should be replaced for optimal color and brightness balance Susceptible to burn-in because CRT is phosphor-based Needs to be "converged" (primary colors positioned so they overlay without color fringes) annually (or after set relocation) May display colour halos or lose focus === LCD projector === Advantages: Smaller than CRT projectors LCD chip can be easily repaired or replaced Is not susceptible to burn-in Disadvantages: The Screen-door effect: Individual pixels may be visible on the large screen, giving the appearance that the viewer is looking through a screen door. Possibility of defective pixels Poor black level: Some light passes through even when liquid crystals completely untwist, so the best black color that can be achieved
{"page_id": 10158337, "title": "Large-screen television technology"}
mortar, both with the veneer and to consolidate the core. This core and veneer technique was also used at other Ancestral Puebloans sites outside of Chaco Canyon. Later pueblos used mud bricks (adobe) for the veneer. === Mayan === In the Puuc region, and as far south as at least Tikal, the Mayans developed core-and-veneer walls to the point where, by the classic period, they were filled with concrete. == Problems == Traditional core-and-veneer walls suffered from moisture migration and thermal expansion and contraction. They had a low tensile strength, hence a poor resistance to twisting or stretching. Tensile strength was increased by increasing the width of the walls or by providing masonry "piers" (vertical columns or ribs), either inside the wall or as additional exterior support. == See also == Bungaroosh Cavity wall == Notes == == External links == "Figure 14. The large number of stones used, requires strong and stable scaffolding inside the building". Contribution to the medieval building technology based on the reconstruction of a rounded church. EXARC. Archived from the original on 2 May 2014. Retrieved 2 May 2014. shows construction and cross-section of core-and-veneer wall "Drystone Walls in England". Britain Express. Archived from the original on 10 August 2013. showing cross-section of a core-and-veneer wall.
{"page_id": 8885941, "title": "Core-and-veneer"}
enthusiastic and willing to help others, we need you. We will be running numerous one and two-day programs throughout the summer and need volunteers to set-up top-ropes, teach climbing skills, belay, and just be positive role models to the kids. We will be holding a volunteer training session soon, so please check out our web-site: climbingforlife.org, send us an email: info@climbingforlife.org , or give us a call at (303)278-0455 today. - Ben Mottinger Patrick Berhault Mon May 3 23:11:21 2004 Patrick Berhault died last week above Saas-Fee while in process of climbing the 82 4000m peaks in the Alps in 82 days with Philippe Magnin. Details are at planetmountain.com. Huge, sad loss. - Tom Painter Splitter Film Tue Apr 27 22:44:25 2004 If you haven't already--get some tickets for the premier of Splitter, this Thur at the Boulder Theater. Check it out! - Ben Mottinger McCrumm's Crack Wed Apr 21 20:44:51 2004 This is really cool. I got an e-mail a few days ago from the son of John McCrumm telling me about his father's first ascent in 1931 (of McCrumm's Crack). No kidding--that's great for this area. So then John actually e-mails me his own account of the climb (he's 92 now and using e-mail!). I decided to post it here since it's not often that you hear about these things first hand. Thanks, John. I am 92 now - an age when one looks back to long- gone days. On a misty, cold November afternoon in 1931, I walked along Baseline Rd. and up to the Amphitheater. In earlier scrambles, I had spotted the interior N.E. corner as a climb to be tried, all the way to the top of the north wall. Armed with my gym shoes and 120 feet of hemp rope from the local hardware
{"source": 990, "title": "from dpo"}
used with arbitrary distance functions or on non-numerical data. For these use cases, many other algorithms are superior. Example: In marketing, k-means clustering is frequently employed for market segmentation, where customers with similar characteristics or behaviors are grouped together. For instance, a retail company may use k-means clustering to segment its customer base into distinct groups based on factors such as purchasing behavior, demographics, and geographic location. These customer segments can then be targeted with tailored marketing strategies and product offerings to maximize sales and customer satisfaction. === Feature learning === k-means clustering has been used as a feature learning (or dictionary learning) step, in either (semi-)supervised learning or unsupervised learning. The basic approach is first to train a k-means clustering representation, using the input training data (which need not be labelled). Then, to project any input datum into the new feature space, an "encoding" function, such as the thresholded matrix-product of the datum with the centroid locations, computes the distance from the datum to each centroid, or simply an indicator function for the nearest centroid, or some smooth transformation of the distance. Alternatively, transforming the sample-cluster distance through a Gaussian RBF, obtains the hidden layer of a radial basis function network. This use of k-means has been successfully combined with simple, linear classifiers for semi-supervised learning in NLP (specifically for named-entity recognition) and in computer vision. On an object recognition task, it was found to exhibit comparable performance with more sophisticated feature learning approaches such as autoencoders and restricted Boltzmann machines. However, it generally requires more data, for equivalent performance, because each data point only contributes to one "feature". Example: In natural language processing (NLP), k-means clustering has been integrated with simple linear classifiers for semi-supervised learning tasks such as named-entity recognition (NER). By first clustering unlabeled text data
{"page_id": 1860407, "title": "K-means clustering"}
to succeed, a coordinated effort among all the functional areas of business is needed. In the case of planning, George wrote: We may conceptually separate planning for the purpose of theoretical discussion and analysis, but in practice, neither is it a distinct entity nor is it capable of being sepa-rated. The planning function is mixed with all other business functions and, like ink once mixed with water, it cannot be set apart. It is spread throughout and is a part of the whole of managing an organization. 396 PART 2 • STRATEGY FORMULATION # The Resource-Based V iew (RBV) Some researchers emphasize the importance of the internal audit part of the strategic-management process by comparing it to the external audit. Robert Grant concluded that the internal audit is more important, saying: In a world where customer preferences are volatile, the identity of customers is changing, and the technologies for serving customer requirements are continually evolving, an externally focused orientation does not provide a secure foundation for formulating long-term strategy. When the external environment is in a state of flux, the firm’s own resources and capabilities may be a much more stable basis on which to define its identity. Hence, a definition of a business in terms of what it is capable of doing may offer a more durable basis for strategy than a definition based upon the needs which the business seeks to satisfy. 4The Resource-Based View (RBV) approach to competitive advantage contends that inter-nal resources are more important for a firm than external factors in achieving and sustaining competitive advantage. In contrast to the I/O theory presented in the previous chapter, propo-nents of the RBV view contend that organizational performance will primarily be determined by internal resources that can be grouped into three all-encompassing categories: physical resources, human resources,
{"source": 4976, "title": "from dpo"}
dimension. Since T has the dimension of force, and ρ that of mass/length, it follows that the constant a has the dimension of velocity. It is possible to identify a as the velocity with which a small disturbance (wave) moves along the string. According to Eq. (6), the wave velocity a varies directly with the tension in the string, but inversely with the density of the string material. These facts are in agreement with experience. As in the case of the heat conduction equation, there are various generalizations of the wave equation (5). One important equation is known as the telegraph equation and has the form utt + cu t + ku = a2u xx + F(x, t), (7) where c and k are nonnegative constants. The terms cu t , ku , and F(x, t) arise from a viscous damping force, an elastic restoring force, and an external force, respectively. Appendix B 663 Note the similarity of Eq. (7), except for the term a2u xx , with the equation for the spring–mass system derived in Section 3.7; the additional term a2u xx arises from a consideration of internal elastic forces. The telegraph equation also governs the flow of voltage, or current, in a trans-mission line (hence its name); in this case the coefficients are related to electrical parameters in the line. For a vibrating system with more than one significant space coordinate, it may be necessary to consider the wave equation in two dimensions a2(u xx + u yy ) = utt , (8) or in three dimensions a2(u xx + u yy + u zz ) = utt . (9) REFERENCES The following books contain additional information on Fourier series: Buck, R. C., and Buck, E. F., Advanced Calculus (3rd ed.) (New York: McGraw-Hill, 1978). Carslaw, H. S.,
{"source": 6286, "title": "from dpo"}
The molecular formula C15H20O4 may refer to: Abscisic acid, a plant hormone DCW234, a synthetic nonsteroidal estrogen and a selective agonist of the ERβ Psilostachyin C Santonic acid, an organic compound containing both carboxylic acid and ketone functionality
{"page_id": 24065136, "title": "C15H20O4"}
are fully permeable to protein. Hepatic interstitial fluid within the Space of Diss has the same colloid osmotic pressure as plasma and so hepatocyte synthesis of albumin can be regulated. === Approximate values === Following are typical values for the variables in the Starling equation which regulate net J v {\displaystyle J_{v}} to about 0.1ml per second, 5-6 ml per minute or about 8 litres per day. == Specific organs == === Kidneys === Glomerular capillaries have a continuous glycocalyx layer in health and the total transendothelial filtration rate of solvent ( J v {\displaystyle J_{v}} ) to the renal tubules is normally around 125 ml/ min (about 180 litres/ day). Glomerular capillary J v {\displaystyle J_{v}} is more familiarly known as the glomerular filtration rate (GFR). === Lungs === The Starling equation can describe the movement of fluid from pulmonary capillaries to the alveolar air space. == Clinical significance == Woodcock and Woodcock showed in 2012 that the revised Starling equation (steady-state Starling principle) provides scientific explanations for clinical observations concerning intravenous fluid therapy. Traditional teaching of both filtration and absorption of fluid occurring in a single capillary has been superseded by the concept of a vital circulation of extracellular interstitial fluid running parallel to the circulation of blood. Infusing intravenous fluids that raise plasma colloid osmotic pressure (colloid therapy) has much less effect on plasma volume than originally expected, in part because the initially reduced filtration rate allows the concentration of proteins in the subglycocalx spaces to rise, returning the colloid osmotic pressure difference and trans endothelial solvent filtration rate to their steady state levels within an hour. Prevention and treatment of oedema (excess interstitial fluid) depends on normalisation of P c {\displaystyle P_{c}} and optimisation of the flow rate of lymph. == History == The Starling equation
{"page_id": 1020980, "title": "Starling equation"}
Fellgett's advantage or the multiplex advantage is an improvement in signal-to-noise ratio (SNR) that is gained when taking multiplexed measurements rather than direct measurements. The name is derived from P. B. Fellgett, who first made the observation as part of his PhD. When measuring a signal whose noise is dominated by detector noise, a multiplexed measurement such as the signal generated by a Fourier transform spectrometer can produce a relative improvement in SNR, compared to an equivalent scanning monochromator, of the order of the square root of m, where m is the number of sample points comprising the spectrum. == Exit slit == Sellar and Boreman have argued that this SNR improvement can be considered as a result of freedom from needing an exit slit inside the spectrometer, since an exit slit reduces the light collected by the detector by the same factor. == Emission == There is an additional multiplex advantage for emission lines of atomic and molecular spectra. At the peak of the emission line, a monochromator measurement will be noisy, since the noise is proportional to the square root of the signal. For the same reason, the measurement will be less noisy at the baseline of the spectrum. In a multiplexed measurement, however, the noise in a given measurement is spread more or less evenly across the spectrum, regardless of the local signal intensity. Thus, multiplexed measurements can achieve higher SNR at the emission line peaks. There is a corresponding multiplex disadvantage, however. When the signals of interest are absorption lines in the spectrum, then the same principle will produce increased noise at the valleys of the absorption lines relative to the noise of a scanning monochromator. == Shot noise == However, if the detector is shot noise dominated (which is typically the case for a photomultiplier
{"page_id": 14154752, "title": "Fellgett's advantage"}
his studies. He did however join the White Guard in the Finnish Civil War, but did not see active military action. In 1919, Nevanlinna presented his thesis, entitled Über beschränkte Funktionen die in gegebenen Punkten vorgeschriebene Werte annehmen ("On limited functions prescribed values at given points"), to Lindelöf, his doctoral advisor. The thesis, which was on complex analysis, was of high quality and Nevanlinna was awarded his Doctor of Philosophy on 2 June 1919. == Career == When Nevanlinna earned his doctorate in 1919, there were no university posts available so he became a school teacher. His brother, Frithiof, had received his doctorate in 1918 but likewise was unable to take up a post at a university, and instead began working as a mathematician for an insurance company. Frithiof recruited Rolf to the company, and Nevanlinna worked for the company and as a school teacher until he was appointed a Docent of Mathematics at the University of Helsinki in 1922. During this time, he had been contacted by Edmund Landau and requested to move to Germany to work at the University of Göttingen, but did not accept. After his appointment as Docent of Mathematics, he gave up his insurance job but did not resign his position as school teacher until he received a newly created full professorship at the university in 1926. Despite this heavy workload, it was between the years of 1922–25 that he developed what would become to be known as Nevanlinna theory. From 1947 Nevanlinna had a chair in the University of Zurich, which he held on a half-time basis after receiving in 1948 a permanent position as one of the 12 salaried Academicians in the newly created Academy of Finland. Rolf Nevanlinna's most important mathematical achievement is the value distribution theory of meromorphic functions. The roots
{"page_id": 26438, "title": "Rolf Nevanlinna"}
(2015) features a female protagonist with a spinal cord injury who regains mobility via advanced FES technology developed by a fictional biomedical startup. == See also == Electrical muscle stimulation Electrotherapy Cleveland FES Center Shannon Criteria == References == == Further reading == Chudler, Eric H. "Neuroscience For Kids - Cells of the Nervous System." UW Faculty Web Server. Eric H. Chudler, 1 June 2011. Web. 7 June 2011.<http://faculty.washington.edu/chudler/cells.html>. Cooper E.B., Scherder E.J.A., Cooper J.B (2005) "Electrical treatment of reduced consciousness: experience with coma and Alzheimer's disease," Neuropsyh Rehab (UK).Vol. 15,389-405. Cooper E.B, Cooper J.B. (2003). "Electrical treatment of coma via the median nerve". In Y. Katayama (ed.). Neurosurgical Re-Engineering of the Damaged Brain and Spinal Cord. Acta Neurochirurgica Supplements. Vol. 87. pp. 7–10. doi:10.1007/978-3-7091-6081-7_2. ISBN 978-3-7091-7223-0. PMID 14518514. "FEScenter.org » Cleveland FES Center." FEScenter.org » Home. Cleveland VA Medical Center, Case Western Reserve University, MetroHealth Medical Center, 3 June 2011. Web. 8 June 2011. <http://fescenter.org/index.php?option=com_content> Graupe D (2002). "An overview of the state of the art of noninvasive FES for independent ambulation by thoracic level paraplegics". Neurological Research. 24 (5): 431–442. doi:10.1179/016164102101200302. PMID 12117311. S2CID 29537770. Graupe D, Cerrel-Bazo H, Kern H, Carraro U (2008). "Walking Performance, Medical Outcomes and Patient Training in FES of Innervated Muscles for Ambulation by Thoracic-Level Complete Paraplegics". Neurol. Res. 31 (2): 123–130. doi:10.1179/174313208X281136. PMID 18397602. S2CID 34621751. Johnston, Laurance. "FES." Human Spinal Cord Injury: New & Emerging Therapies. Institute of Spinal Cord Injury, Iceland. Web. 7 June 2011. Web site. Lichy A., Libin A., Ljunberg I., Groach L., (2007) " Preserving bone health after acute spinal cord injury: Differential responses to a neuromuscular electrical stimulation intervention", Proc. 12th Annual Conf. of the International FES Soc., Philadelphia, PA, Session 2, Paper 205. Liu Yi-Liang, Ling Qi-Dan, Kang En-Tang, Neoh Koon-Gee, Liaw Der-Jang, Wang Kun-Li,
{"page_id": 842532, "title": "Functional electrical stimulation"}
nematode-trapping fungus shows lectin-mediated host–microorganism interaction". Nature. 281 (5731): 477–479. Bibcode:1979Natur.281..477N. doi:10.1038/281477a0. S2CID 4339747. Nordbring-Hertz, Birgit (August 2004). "Morphogenesis in the nematode-trapping fungus Arthrobotrys oligospora - an extensive plasticity of infection structures". Mycologist. 18 (3): 125–133. doi:10.1017/S0269915X04003052 (inactive 16 December 2024). ISSN 1474-0605.{{cite journal}}: CS1 maint: DOI inactive as of December 2024 (link) Nordbring-Hertz, Birgit; Jansson, Hans-Börje; Tunlid, Anders (2011). "Nematophagous Fungi". eLS. John Wiley & Sons. doi:10.1002/9780470015902.a0000374.pub3. ISBN 9780470016176. == Personal life == Nordbring-Hertz married in 1953 to a professor in electrical measurement technology, Hellmuth Hertz, and they had two sons, Thomas and Hans Hertz. == References ==
{"page_id": 64053573, "title": "Birgit Nordbring-Hertz"}
The human gene AGK encodes the enzyme mitochondrial acylglycerol kinase. The protein encoded by this gene is a mitochondrial membrane protein involved in lipid and glycerolipid metabolism. It catalyzes the formation of phosphatidic and lysophosphatidic acids. Defects in this gene have been associated with mitochondrial DNA depletion syndrome 10. Diseases associated with AGK include cataracts and cardiomyopathy. An important paralog of this gene is CERKL. == Structure == The AGK gene is located on the 7th chromosome, with its specific location being 7q34. The gene contains 18 exons. AGK encodes a 47.1 kDa protein that is composed of 422 amino acids; 32 peptides have been observed through mass spectrometry data. == Function == Acylglycerol kinase synthesizes phosphatidic and lysophosphatidic acids. The enzyme uses ATP to put a phosphate group on acyl glycerol and diacylglycerol. It catalyzes the following reactions: ATP + acylglycerol = ADP + acyl-sn-glycerol 3-phosphate. ATP + 1,2-diacyl-sn-glycerol = ADP + 1,2-diacyl-sn-glycerol 3-phosphate. The enzyme is involved in the more general pathway of fatty acid metabolism. AGK also has an implicated role in the assembly of the adenine nucleotide translocator in the inner mitochondrial membrane. == Clinical significance == Mutations in the AGK gene were the first to be implicated in isolated cataract development, although it is unclear whether these mutations cause a change in lipid composition of the lenses, or if signaling results in the defect. This gene has also been associated with Sengers syndrome. Two different phenotypes have been observed. One form of the disorder presented as vascular strokes, lactic acidosis, cardiomyopathy and cataracts, abnormal muscle cell histopathology and mitochondrial function. In those patients, there was also a markedly high rate of citrate synthase. The second phenotype presented with similar clinical symptoms, but no strokes. As phosphatidic acid is also involved in the synthesis of phospholipids,
{"page_id": 15073850, "title": "AGK (gene)"}
to design fiction is through live action role-playing games (larps). Malthe Stavning Erslev argues that the research larp Civilisation's Waiting Room, which explores a future society run by an AI, is a form of design fiction using what he calls a mimetic method that is "making the technology appear" in "deeply embodied, ephemeral encounters of enactment". In recent pop culture, design fiction might be bonded to the Black Mirror anticipation series, each episode portraying a disturbing alternative present or near future where characters have to deal with the unexpected consequences of emerging technologies. == Methodology and process == Design fiction is an open and evolving practice, demonstrating a variety of approaches from designers and studios. However it is possible to draw some common lines: "What if?" questions Design fictions often rely on a question: "What if?", creating a provocative framework for speculation from the start. This questioning format stimulates the exploration of tensions and sticking points, leading to the construction of the new fictional universe, in an alternative present or near future, which includes a new set of morals and values: "The New Normal". Diegetic prototypes The speculative scenario and the fictional world in which it takes place are made tangible thanks to design tools and methods, to conceive what David A. Kirby was the first to call "diegetic prototypes". The term diegetic stands for their narrative attribute, made to be self-explanatory of the world they come from. At the same time, they purposely leave narrative spaces for the viewer's imagination to fill in: they "tell worlds rather than stories". As explained by Julian Bleecker: "Design fiction objects are totems through which a larger story can be told, or imagined or expressed. They are like artifacts from someplace else, telling stories about other worlds". These prototypes are effective entry points
{"page_id": 46308607, "title": "Design fiction"}
editors: M. A. Cornu, Paris; N. C. Dunér, Upsala; William Huggins, London; P. Tacchini, Rome; H. C. Vogel, Potsdam, C. S. Hastings, Yale; A. A. Michelson, Chicago; E. C. Pickering, Harvard; H. A. Rowland, Johns Hopkins; and C. A. Young, Princeton. It was intended that the journal would fill the gap between journals in astronomy and physics, providing a venue for publication of articles on astronomical applications of the spectroscope; on laboratory research closely allied to astronomical physics, including wavelength determinations of metallic and gaseous spectra and experiments on radiation and absorption; on theories of the Sun, Moon, planets, comets, meteors, and nebulae; and on instrumentation for telescopes and laboratories. The further development of ApJ up to 1995 was outlined by Helmut Abt in an article entitled "Some Statistical Highlights of the Astrophysical Journal" in 1995. == Editors == The following persons have been editors-in-chief of the journal: George Hale (1895–1902) Edwin Brant Frost (1902–1932) Otto Struve (1932–1947) W.W. Morgan (1947–1952) Subrahmanyan Chandrasekhar (1952–1971) Helmut A. Abt (1971–1999) Robert Kennicutt (1999–2006) Ethan Vishniac (2006–present) == See also == The Astronomical Journal Astronomy and Astrophysics Monthly Notices of the Royal Astronomical Society Publications of the Astronomical Society of the Pacific Publications of the Astronomical Society of Australia == References == == External links == The Astrophysical Journal official website and journal issues from 1995–present The Astrophysical Journal Supplement Series official website The Astrophysical Journal Letters official website Digitized articles from 1895–1995 from The Astrophysical Journal via ADS Digitized issues from 1895–1928 of The Astrophysical Journal via HathiTrust
{"page_id": 209297, "title": "The Astrophysical Journal"}
length of the line C – capacitance of the line == Modelling of transmission lines == === Two port networks === A two-port network (a kind of four-terminal network or quadripole) is an electrical network (circuit) or device with two pairs of terminals to connect to external circuits. Two terminals constitute a port if the currents applied to them satisfy the essential requirement known as the port condition: the electric current entering one terminal must equal the current emerging from the other terminal on the same port. The ports constitute interfaces where the network connects to other networks, the points where signals are applied or outputs are taken. In a two-port network, often port 1 is considered the input port and port 2 is considered the output port. The two-port network model is used in mathematical circuit analysis techniques to isolate portions of larger circuits. A two-port network is regarded as a "black box" with its properties specified by a matrix of numbers. This allows the response of the network to signals applied to the ports to be calculated easily, without solving for all the internal voltages and currents in the network. It also allows similar circuits or devices to be compared easily. For example, transistors are often regarded as two-ports, characterized by their h-parameters (see below) which are listed by the manufacturer. Any linear circuit with four terminals can be regarded as a two-port network provided that it does not contain an independent source and satisfies the port conditions. === Transmission matrix and ABCD parameters === Oftentimes, we are only interested in the terminal characteristics of the transmission line, which are the voltage and current at the sending and receiving ends, for performance analysis of the line. The transmission line itself is then modelled as a "black box" and
{"page_id": 61328143, "title": "Performance and modelling of AC transmission"}
field models for disease mapping. _Scandinavian Journal of Statistics_, _29_(4), 597–614. Article. Assessing approximate inference for binary Gaussian process classification. _Journal of Machine Learning Research_, _6_, 1679–1704. MathSciNet. Bayesian methods for backpropagation networks. In E. Domany, J. L. van Hemmen, & K. Schulten (Eds.), _Models of neural networks III_ (pp. 211–254). Berlin: Springer. Chap.6. Google Scholar. Expectation propagation for approximate Bayesian inference. In _Proceedings of the 17th conference in uncertainty in artificial intelligence (UAI ’01)_, San Francisco, CA, USA (pp. 362–369). San Mateo: Morgan Kaufmann. Google Scholar. Log Gaussian Cox processes. _Scandinavian Journal of Statistics_, _25_(3), 451–482. Article. Slice sampling covariance hyperparameters of latent Gaussian models. In J. D. Lafferty, C. K. I. Williams, J. Shawe-Taylor, R. S. Zemel, & A. Culotta (Eds.), _NIPS_ (pp. 1732–1740). Red Hook: Curran Associates. Google Scholar. Elliptical slice sampling. _Journal of Machine Learning Research_, _9_, 541–548. Google Scholar. Slice sampling. _The Annals of Statistics_, _31_, 705–767. Article. _Probabilistic inference using Markov chain Monte Carlo methods_ (Technical Report CRG-TR-93-1). Dept. of Computer Science, University of Toronto. * Neal, R. M. (1996). _Lecture notes in statistics:_ _Bayesian learning for neural networks_. Berlin: Springer. Book. Regression and classification using Gaussian process priors (with discussion). _Bayesian Statistics_, _6_, 475–501. MathSciNet. Gaussian processes for classification: mean-field algorithms. _Neural Computation_, _12_(11), 2655–2684. Article. _Gaussian
{"source": 1223, "title": "from dpo"}
has remained constant. Ionization energy (the energy associated with forming a cation) decreases down a group and mostly increases across a period because it is easier to remove an electron from a larger, higher energy orbital. Electron affinity (the energy associated with forming an anion) is more favorable (exothermic) when electrons are placed into lower energy orbitals, closer to the nucleus. Therefore, electron affinity becomes increasingly negative as we move left to right across the periodic table and decreases as we move down a group. For both IE and electron affinity data, there are exceptions to the trends when dealing with completely filled or half-filled subshells. # Exercises 6.1 Electromagnetic Energy 1. The light produced by a red neon sign is due to the emission of light by excited neon atoms. Qualitatively describe the spectrum produced by passing light from a neon lamp through a prism. 2. An FM radio station found at 103.1 on the FM dial broadcasts at a frequency of 1.031 × 10 8 s−1 (103.1 MHz). What is the wavelength of these radio waves in meters? 3. FM-95, an FM radio station, broadcasts at a frequency of 9.51 × 10 7 s−1 (95.1 MHz). What is the wavelength of these radio waves in meters? 4. A bright violet line occurs at 435.8 nm in the emission spectrum of mercury vapor. What amount of energy, in joules, must be released by an electron in a mercury atom to produce a photon of this light? 5. Light with a wavelength of 614.5 nm looks orange. What is the energy, in joules, per photon of this orange light? What is the energy in eV (1 eV = 1.602 × 10 −19 J)? 6. Heated lithium atoms emit photons of light with an energy of 2.961 × 10 −19 J.
{"source": 3700, "title": "from dpo"}
= 2. > (a) Show that there exist subgraphs G t and G2 of G and non-adjacent pairs of vertices Ut, VI E V( G 1) and U2, V2 E V( G 2) such that G consists of the graphs G l and G 2 joined by a 'ladder' at the vertices Ul, Vl, U2 and V2. (b) Show that if G 1 + UIVt and G 2 + U2V2 both have Tait colourings, then so does G. (c) Deduce, using theorem 9.12, that the fou~-colour conjecture is equivalent to Tait's conjecture: every simple 3-regular 3-connected planar graph has a Tait colouring. 9.6.7 Give an example of > (a) a 3-regular planar graph- with no Tait colouring; (b) a 3-regular 2-connected graph with no Tait colouring. 9. 7 NONHAMILTONIAN PLANAR GRAPHS In his attempt to prove the four-colour conjecture, Tait (1880) observed that it would be enough to show that every 3-regular 3-connected planar graph has a Tait colouring (exercise 9.6.6). By mistakenly assuming that every such graph is hamiltonian, he .gavea 'proof' of the four-colour conjecture (see exercise 9.6.4). Over half a century later, Tutte (1946) showed Tait's proof to be invalid by const~ucting a nonhamiltonian 3-regular 3-connected planar graph; it is depicted in figure 9.25. Tutte proved. that his graph is nonhamiltonian by using ingenious ad hoc arguments (exercise 9.7.1), and for many years the Tutte graph was the only > krlow·n example of' a nonhamiltonian 3-regular 3-connected planar graph. However, Grinberg (1968) then discovered a necessary condition for a plane graph to be hamiltonian. His discovery has led to the construction of many nonhamiltonian planar graphs. Planar Graphs > Figure 9.25. The·Tutte graph 161 Theorem 9.13 Let G be a loopless plane graph with a Hamilton cycle C. Then > v # L (i - 2)([ -
{"source": 5735, "title": "from dpo"}
dust that can be found. But there is no such layer of dust. So the hypothesis must be false. Another example: The detective hypothesizes that Andy killed the man on the floor by picking up a knife and stabbing the man with it. One implication would be that Andy has the strength to use a knife. The detective goes to Andy to ask him some questions, and finds out that Andy has been in a coma for the past month, and could not have used the knife. The detective concludes that his hypothesis about Andy killing the man with a knife must be rejected. Hypothetical reasoning is thus pretty adept at disconfirming, falsifying, or ruling out bad hypotheses. That is, this line of reasoning is a powerful tool in showing that a theory or hypothesis should be rejected. Things are little different when we use it to confirm hypotheses or to show that they are true. Consider the following abstract scenario: If H, then I [we draw an implication from our hypothesis] I [the implication tests positively, that is, the implication comes out to be true] What can we conclude here? That the hypothesis is true? That would look like this: 175 If H, then I IThus, H But this is an example of the formal fallacy known as Affirming the Consequent. Any argument fitting this pattern will be invalid. The first two claims do not guarantee the conclusion; that is, it is possible for the first two claims to be true and the conclusion false. So —and here’s a subtle point about much of the science and police work based on hypothetical reasoning —hypothetical reasoning can disprove an hypothesis, but it can’t really prove an hy pothesis to be true. That said, hypothetical reasoning can give use good reason
{"source": 6820, "title": "from dpo"}
) {\displaystyle f(x,y(x))} . The partial derivative of f with respect to x does not give the true rate of change of f with respect to changing x because changing x necessarily changes y. However, the chain rule for the total derivative takes such dependencies into account. Write γ ( x ) = ( x , y ( x ) ) {\displaystyle \gamma (x)=(x,y(x))} . Then, the chain rule says d ( f ∘ γ ) x 0 = d f ( x 0 , y ( x 0 ) ) ⋅ d γ x 0 . {\displaystyle d(f\circ \gamma )_{x_{0}}=df_{(x_{0},y(x_{0}))}\cdot d\gamma _{x_{0}}.} By expressing the total derivative using Jacobian matrices, this becomes: d f ( x , y ( x ) ) d x ( x 0 ) = ∂ f ∂ x ( x 0 , y ( x 0 ) ) ⋅ d x d x ( x 0 ) + ∂ f ∂ y ( x 0 , y ( x 0 ) ) ⋅ d y d x ( x 0 ) . {\displaystyle {\frac {df(x,y(x))}{dx}}(x_{0})={\frac {\partial f}{\partial x}}(x_{0},y(x_{0}))\cdot {\frac {dx}{dx}}(x_{0})+{\frac {\partial f}{\partial y}}(x_{0},y(x_{0}))\cdot {\frac {dy}{dx}}(x_{0}).} Suppressing the evaluation at x 0 {\displaystyle x_{0}} for legibility, we may also write this as d f ( x , y ( x ) ) d x = ∂ f ∂ x d x d x + ∂ f ∂ y d y d x . {\displaystyle {\frac {df(x,y(x))}{dx}}={\frac {\partial f}{\partial x}}{\frac {dx}{dx}}+{\frac {\partial f}{\partial y}}{\frac {dy}{dx}}.} This gives a straightforward formula for the derivative of f ( x , y ( x ) ) {\displaystyle f(x,y(x))} in terms of the partial derivatives of f {\displaystyle f} and the derivative of y ( x ) {\displaystyle y(x)} . For example, suppose f ( x , y ) =
{"page_id": 1070326, "title": "Total derivative"}
1 immature teratoma that appears to be benign (e.g., because AFP is not elevated) has a much higher risk of malignancy, and requires adequate follow-up. This grade of teratoma also may be difficult to diagnose correctly. It can be confused with other small round cell neoplasms such as neuroblastoma, small cell carcinoma of hypercalcemic type, primitive neuroectodermal tumor, Wilm's tumor, desmoplastic small round cell tumor, and non-Hodgkin lymphoma. A teratoma with malignant transformation is a very rare form of teratoma that may contain elements of somatic malignant tumors such as leukemia, carcinoma, or sarcoma. Of 641 children with pure teratoma, nine developed TMT: five carcinoma, two glioma, and two embryonal carcinoma (here, these last are classified among germ cell tumors). In November 2024, the SCT-study consortium published the risk of malignancy at initial resection in sacrococcygeal teratoma increases with age reaching a plateau at 6 years of age. ==== Extraspinal ependymoma ==== Extraspinal ependymoma, usually considered to be a glioma (a type of nongerm cell tumor), may be an unusual form of mature teratoma. == Treatment == === Surgery === The treatment of choice is complete surgical removal (i.e., complete resection). Teratomas are normally well-encapsulated and noninvasive of surrounding tissues, hence they are relatively easy to resect from surrounding tissues. Exceptions include teratomas in the brain, and very large, complex teratomas that have pushed into and become interlaced with adjacent muscles and other structures. Prevention of recurrence does not require en bloc resection of surrounding tissues. === Chemotherapy === For malignant teratomas, usually, surgery is followed by chemotherapy. Teratomas that are in surgically inaccessible locations, or are very complex, or are likely to be malignant (due to late discovery and/or treatment) sometimes are treated first with chemotherapy. === Follow-up === Although often described as benign, a teratoma does have malignant
{"page_id": 284044, "title": "Teratoma"}
customers who equate larger numbers (such as the 2.4 and 5.8 in existing 2.4 GHz and 5.8 GHz cordless telephones) with later products. The term was coined by Rick Krupka, marketing director at Siemens and the DECT USA Working Group / Siemens ICM. In North America, DECT suffers from deficiencies in comparison to DECT elsewhere, since the UPCS band (1920–1930 MHz) is not free from heavy interference. Bandwidth is half as wide as that used in Europe (1880–1900 MHz), the 4 mW average transmission power reduces range compared to the 10 mW permitted in Europe, and the commonplace lack of GAP compatibility among US vendors binds customers to a single vendor. Before 1.9 GHz band was approved by the FCC in 2005, DECT could only operate in unlicensed 2.4 GHz and 900 MHz Region 2 ISM bands; some users of Uniden WDECT 2.4 GHz phones reported interoperability issues with Wi-Fi equipment. North-American DECT 6.0 products may not be used in Europe, Pakistan, Sri Lanka, and Africa, as they cause and suffer from interference with the local cellular networks. Use of such products is prohibited by European Telecommunications Authorities, PTA, Telecommunications Regulatory Commission of Sri Lanka and the Independent Communication Authority of South Africa. European DECT products may not be used in the United States and Canada, as they likewise cause and suffer from interference with American and Canadian cellular networks, and use is prohibited by the Federal Communications Commission and Innovation, Science and Economic Development Canada. DECT 8.0 HD is a marketing designation for North American DECT devices certified with CAT-iq 2.0 "Multi Line" profile. === NG-DECT/CAT-iq === Cordless Advanced Technology—internet and quality (CAT-iq) is a certification program maintained by the DECT Forum. It is based on New Generation DECT (NG-DECT) series of standards from ETSI. NG-DECT/CAT-iq contains features that
{"page_id": 8674, "title": "DECT"}
energy source. === Dominican Republic === In June 2021, the Girasol Solar Park was inaugurated as the largest solar PV farm in the country and the entire Antilles region. It has a total installed capacity of 120 megawatts and it is estimated that it will produce 240,000 MWh per year, enough to supply the electricity consumption of more than 100,000 Dominican homes. Girasol will avoid the emission into the atmosphere of 150,000 tons of CO2 annually and the import of 400,000 barrels of oil, which contributes to mitigate the effects of climate change and represents savings in foreign exchange, respectively. Before this, in the Dominican Republic, the Monte Plata Project was the largest operating solar plant in the Caribbean with an installed capacity of 69MW. === Jamaica === In 2014, a 1.6 MW photovoltaic rooftop system at a seaside resort, located near the parish capital, Lucea in the parish of Hanover, was inaugurated. It was developed by Sofos Jamaica, and is the largest in Jamaica until a 20 MW utility-scale solar PV plant is constructed in the Parish of Clarendon in 2015. No central database yet exists with information on installed capacity but, web searches reveal media articles, press releases and vendor web pages that share some details. Based on these sources up to the middle of 2015, there was over 3.7 MW connected to the grid but, a sizeable portion of that total, including the 1.6 MW rooftop system of a seaside resort and a commercial 500 kW-system in the country's capital, Kingston, do not feed power back to the grid despite being interconnected. === Mexico === Mexico was the greatest solar energy producer in Latin America before being overtaken by Brazil. Currently, it is the second largest Latin American producer, with an installed capacity of over 9 GW
{"page_id": 6328047, "title": "Solar power by country"}
Zimbardo, a Stanford psychologist, arranged an experiment testing the broken-window theory in 1969. Zimbardo arranged for an automobile with no license plates and the hood up to be parked idle in a Bronx neighbourhood and a second automobile, in the same condition, to be set up in Palo Alto, California. The car in the Bronx was attacked within minutes of its abandonment. Zimbardo noted that the first "vandals" to arrive were a family—a father, mother, and a young son—who removed the radiator and battery. Within twenty-four hours of its abandonment, everything of value had been stripped from the vehicle. After that, the car's windows were smashed in, parts torn, upholstery ripped, and children were using the car as a playground. At the same time, the vehicle sitting idle in Palo Alto sat untouched for more than a week until Zimbardo himself went up to the vehicle and deliberately smashed it with a sledgehammer. Soon after, people joined in for the destruction, although criticism has been levelled at this claim as the destruction occurred after the car was moved to the campus of Stanford university and Zimbardo's own students were the first to join him. Zimbardo observed that a majority of the adult "vandals" in both cases were primarily well dressed, Caucasian, clean-cut and seemingly respectable individuals. It is believed that, in a neighborhood such as the Bronx where the history of abandoned property and theft is more prevalent, vandalism occurs much more quickly, as the community generally seems apathetic. Similar events can occur in any civilized community when communal barriers—the sense of mutual regard and obligations of civility—are lowered by actions that suggest apathy. === New York City === In 1985, the New York City Transit Authority hired George L. Kelling, the author of Broken Windows, as a consultant. Kelling
{"page_id": 66836, "title": "Broken windows theory"}
or delay line filter, works by summing copies of the input after various time delays. This can be implemented with various technologies including analog delay lines, active circuitry, CCD delay lines, or entirely in the digital domain. === Digital filters === Digital signal processing allows the inexpensive construction of a wide variety of filters. The signal is sampled and an analog-to-digital converter turns the signal into a stream of numbers. A computer program running on a CPU or a specialized DSP (or less often running on a hardware implementation of the algorithm) calculates an output number stream. This output can be converted to a signal by passing it through a digital-to-analog converter. There are problems with noise introduced by the conversions, but these can be controlled and limited for many useful filters. Due to the sampling involved, the input signal must be of limited frequency content or aliasing will occur. === Quartz filters and piezoelectrics === In the late 1930s, engineers realized that small mechanical systems made of rigid materials such as quartz would acoustically resonate at radio frequencies, i.e. from audible frequencies (sound) up to several hundred megahertz. Some early resonators were made of steel, but quartz quickly became favored. The biggest advantage of quartz is that it is piezoelectric. This means that quartz resonators can directly convert their own mechanical motion into electrical signals. Quartz also has a very low coefficient of thermal expansion which means that quartz resonators can produce stable frequencies over a wide temperature range. Quartz crystal filters have much higher quality factors than LCR filters. When higher stabilities are required, the crystals and their driving circuits may be mounted in a "crystal oven" to control the temperature. For very narrow band filters, sometimes several crystals are operated in series. A large number of crystals
{"page_id": 23434533, "title": "Filter (signal processing)"}
In human resources, a hush trip refers to the practice of remote workers working from a location they have not informed their employers about. These trips epitomize freedom for remote workers who are digital nomads. == Details == Workers may disguise their location through a virtual private network (VPN) and book meetings around their schedule to decrease detection. Hush trips introduce cybersecurity, tax, privacy, productivity, and legal issues depending on the location of the employee at the time work is performed. Hush trips may be taken as part of bleisure travel or to bypass lengthy corporate approvals. Hush trips may help address occupational burnout by improving workers mental and physical health, boosting morale that leads to productivity gains. The term was popularized following the Great Resignation and the rise of remote work. == References ==
{"page_id": 77215954, "title": "Hush trip"}
bacteria, phytoplankton, and algae exponentially grow and multiply, the more submerged aquatic vegetation die, because they do not have access to sunlight due to eutrophication. Once this snowball-like course of action is in full motion, a dead zone has been created. As a result of the excess nutrient enrichment in the Mississippi River, dead zones appear in the Gulf of Mexico, created from the process of eutrophication. The dead zones in the gulf are mainly created by the nitrogen and phosphorus enrichment of the Lower Mississippi River. === Spawning fatalities === Some species of fish exhibit mass simultaneous mortality as part of their natural life cycle. Fish kill due to spawning fatalities can occur when fish are exhausted from spawning activities such as courtship, nest building, and the release of eggs or milt (sperm). Fish are generally weaker after spawning and are less resilient than usual to smaller changes in the environment. Examples include the Atlantic salmon and the Sockeye salmon where many of the females routinely die immediately after spawning. === Water temperature === A fish kill can occur with rapid fluctuations in temperature or sustained high temperatures. Generally, cooler water has the potential to hold more oxygen, so a period of sustained high temperatures can lead to decreased dissolved oxygen in a body of water. An August 2010 fish kill in Delaware Bay was attributed to low oxygen as a result of high temperatures. A massive (hundreds of thousands) fish kill at the mouth of the Mississippi River in Louisiana, September, 2010, was attributed to a combination of high temperatures and low tide. Such kills are known to happen in this region in late summer and early fall, but this one was unusually large. A short period of hot weather can increase temperatures in the surface layer of
{"page_id": 10669865, "title": "Fish kill"}
Abrasion Testing ASTM G171 Standard Test Method for Scratch Hardness of Materials Using a Diamond Stylus ASTM G174 Standard Test Method for Measuring Abrasion Resistance of Materials by Abrasive Loop Contact === DIN === DIN 53516 Testing of Rubber and Elastomers; Determination of Abrasion Resistance === ISO === ISO 4649 Rubber, vulcanized or thermoplastic -- Determination of abrasion resistance using a rotating cylindrical drum device ISO 9352 Plastics -- Determination of resistance to wear by abrasive wheels ISO 28080 Hardmetals -- Abrasion tests for hardmetals ISO 23794 Rubber, vulcanized or thermoplastic -- Abrasion testing -- Guidance ISO 21988:2006 Abrasion-resistant cast irons. Classification ISO 28080:2011 Hardmetals. Abrasion tests for hardmetals ISO 16282:2008 Methods of test for dense shaped refractory products. Determination of resistance to abrasion at ambient temperature === JSA === JIS A 1121 Method of test for resistance to abrasion of coarse aggregate by use of the Los Angeles machine JIS A 1452 Method of abrasion test for building materials and part of building construction (falling sand method) JIS A 1453 Method of abrasion test for building materials and part of building construction (abrasive-paper method) JIS A 1509-5 Test methods for ceramic tiles -- Part 5: Determination of resistance to deep abrasion for unglazed floor tiles JIS A 1509-6 Test methods for ceramic tiles -- Part 6: Determination of resistance to surface abrasion for glazed floor tiles JIS C 60068-2 Environmental testing -- Part 2: Tests -- Test Xb: Abrasion of markings and letterings caused by rubbing of fingers and hands JIS H 8682-1 Test methods for abrasion resistance of anodic oxide coatings on aluminium and aluminium alloys -- Part 1: Wheel wear test JIS H 8682-2 Test methods for abrasion resistance of anodic oxide coatings on aluminium and aluminium alloys -- Part 2: Abrasive jet test JIS H 8682-3
{"page_id": 25388263, "title": "Abrasion (mechanical)"}
by safety standards that mean they must be bug-free and fully predictable when made commercially available. So while we can enjoy the rush of box-office films with humanoid, sentient robots, we won’t be seeing them in factories, warehouses and hospitals anytime soon. Picture © Shutterstock ![Image 102]( About the author ### Gudrun Litzenberger #### IFR General Secretary / Director IFR Statistical Department Author of the annual World Robotics - Industrial Robots edition ‘In the present chapter, I shall enter into some enquiry respecting the influence of machinery on the interests of the different classes of society, a subject of great importance’ wrote economist David Ricardo in 1817 1. In the two centuries that followed, the machinery changed – from the weaving machines and horses of Ricardo’s treatise, to the tractor, the ATM and now robots and artificial intelligence. But the question remains the same. What is the impact of automation on jobs? Given machines are intended to replace human labour, the intuitive response is that automation’s impact on employment will be negative. Yet a large body of research concludes the opposite – overall, automation has a positive effect on labour demand. Yes, technology does replace jobs in specific industries over time. At the turn of the 20th century, there were around 12 million people employed in agriculture in the United States. One hundred years later, that number had plummeted to 2 million. But consistently over past two centuries, more jobs have been created overall than destroyed 2. Why is this? First, new technologies create new jobs types – think web designer or mechatronic. Second, automation creates new industry sectors and these may provide more jobs than are lost in sectors that decline as a result. Ecommerce has created sixteen times more jobs in the UK since 2010 than have been
{"source": 10, "title": "from dpo"}
the rate of improvement has continued to slow over the editions of this book, as Figure 1.8 shows. There is even con-cern as whether the growth rate will stop in the middle of this decade due to the increasing difficulty of efficiently manufacturing even smaller DRAM cells [Kim 2005]. Chapter 2 mentions several other technologies that may replace DRAM if it hits a capacity wall. > CA:AQA Edition Year DRAM growth rate Characterization of impact on DRAM capacity > 11990 60%/year Quadrupling every 3 years 21996 60%/year Quadrupling every 3 years 32003 40%–60%/year Quadrupling every 3 to 4 years 42007 40%/year Doubling every 2 years 52011 25%–40%/year Doubling every 2 to 3 years > Figure 1.8 Change in rate of improvement in DRAM capacity over time. Th efir st two > edi tio ns even call edthi sra te theDRAM Grow th Rul eof Thumb, sinceithad b een sodepen dabl esince1977 wi ththe16-kilobi tDRAM through 1996 wi ththe64-m egabi t > DRAM. Today, som equ est io nwh et her DRAM capaci ty ca nimprov eatall i n5to 7 year s, du eto difficul ties inma nufac turi ng a nincr easingly thr ee -dim ens io nal DRAM cell [Kim 2005]. # 1.4 Trends in Technology 18 ■ Chapter One Fundamentals of Quantitative Design and Analysis > ■ Semiconductor Flash (electrically erasable programmable read-only mem-ory)—This nonvolatile semiconductor memory is the standard storage device in PMDs, and its rapidly increasing popularity has fueled its rapid growth rate in capacity. Capacity per Flash chip has increased by about 50% to 60% per year recently, doubling roughly every two years. In 2011, Flash memory is 15 to 20 times cheaper per bit than DRAM. Chapter 2 describes Flash memory. > ■ Magnetic disk technology —Prior to 1990, density increased by about 30%
{"source": 2299, "title": "from dpo"}
silver chloride from the chloride ions in the latent print, and the last step converts this to black silver sulfide. Later in 1998, Price and Stow (1998, pp 107–110) recommended dipping the specimens in a “stopping solution” consisting of an aqueous solution of 40% methanol, 20% acetic acid, and 2% glycerol to suppress the further development of the background. 7.13.1.3 Enhancement. According to Lennard and Margot (1988, pp 197–210), weakly developed prints could be enhanced by treating the specimens with a diluted silver physical developer solution. The dilution factor is 1:10. Goode and Morris (1983) discuss a radioactive enhanc - ing method that converts a silver print to a radioactive, β-emitting silver sulfide print, which is then imaged using radiographic film (this image-recording process is some - times called autoradiography or β-radiography). If the original silver nitrate treatment did not significantly stain the background with silver, then this method will bring out only the developed prints with little or no interfering background. The process, described by Goode and Morris (1983) and reviewed by Cantu (2001, pp 29–64), involves converting the silver in the silver image to silver bromide (AgBr), using brominating (bleaching) methods, and then treating this with either sodium sulfide or thiourea (where the sulfur is radioactive 35 S) to convert AgBr to Ag 2 > 35 S. The process is called radioactive toning. If the MSN procedure is used, which yields a silver sulfide print, then radioactive thiourea is used to form Ag 2 > 35 S. 7–43 Latent Print Development C H A P T E R 7 7.13.1.4 Limitation. The major drawback of the silver nitrate method is that the chloride ions in the latent print residue diffuse over time, and humidity accelerates this diffusion. This will affect the resolution (ridge detail) of the developed print.
{"source": 4211, "title": "from dpo"}
Japan (2013). ."), 28 EUROCRYPT 2013. LNCS, vol. 7881, pp. 626–645. Springer, Athens, Greece (2013). ."), 44. ")] and leading to recent Blockchain-optimized proof systems. In VOLE-based ZK, similar properties may be interesting although non-interactivity is less important. Having a verifier with sublinear (in |_C_|) computation while keeping a concretely efficient, linear prover has to the best of our knowledge not yet been achieved. For the special case of disjunctions one could achieve an asymptotic solution by extending the techniques of [32")], but concrete efficiency is unclear. 3. 3. **Sublinear communication, also in the input length.**A recent work [50 ACM CCS 2022, pp. 2901–2914. ACM Press, Los Angeles, CA, USA (2022). .")], which extends VOLE-based ZK, enables communication sublinear to |_C_|. Their protocol relies on vector oblivious polynomial evaluation (VOPE), an extension of VOLE. At the same time, it requires the proof to be of size at least |_w_| (i.e. the circuit input) for knowledge extraction. It would be interesting to explore if VOLE-based protocols can be both sublinear in |_C_| and |_w_| by introducing a knowledge assumption or using a random oracle, while keeping the concrete efficiency of [( "Weng C., Yang
{"source": 6237, "title": "from dpo"}
of the hemoglobin in the blood, rendering it unable to transport oxygen. ==== Problems associated with incomplete combustion ==== ===== Environmental problems ===== These oxides combine with water and oxygen in the atmosphere, creating nitric acid and sulfuric acids, which return to Earth's surface as acid deposition, or "acid rain." Acid deposition harms aquatic organisms and kills trees. Due to its formation of certain nutrients that are less available to plants such as calcium and phosphorus, it reduces the productivity of the ecosystem and farms. An additional problem associated with nitrogen oxides is that they, along with hydrocarbon pollutants, contribute to the formation of ground level ozone, a major component of smog. ===== Human health problems ===== Breathing carbon monoxide causes headache, dizziness, vomiting, and nausea. If carbon monoxide levels are high enough, humans become unconscious or die. Exposure to moderate and high levels of carbon monoxide over long periods is positively correlated with the risk of heart disease. People who survive severe carbon monoxide poisoning may suffer long-term health problems. Carbon monoxide from the air is absorbed in the lungs which then binds with hemoglobin in human's red blood cells. This reduces the capacity of red blood cells that carry oxygen throughout the body. === Smoldering === Smoldering is the slow, low-temperature, flameless form of combustion, sustained by the heat evolved when oxygen directly attacks the surface of a condensed-phase fuel. It is a typically incomplete combustion reaction. Solid materials that can sustain a smoldering reaction include coal, cellulose, wood, cotton, tobacco, peat, duff, humus, synthetic foams, charring polymers (including polyurethane foam) and dust. Common examples of smoldering phenomena are the initiation of residential fires on upholstered furniture by weak heat sources (e.g., a cigarette, a short-circuited wire) and the persistent combustion of biomass behind the flaming fronts of
{"page_id": 5638, "title": "Combustion"}
tubes. == Passive designs == Passive ground-coupled heat exchange is a common traditional technique. It drives circulation using pressure differences caused by wind, rain, and buoyancy-driven convection (from selectively engineering areas of solar heating and evaporative, radiative, or conductive cooling). == Design == Earth-air heat exchangers can be analyzed for performance with several software applications using weather gage data. These software applications include GAEA, AWADUKT Thermo, EnergyPlus, L-EWTSim, WKM, and others. However, numerous earth-air heat exchanger systems have been designed and constructed improperly, and failed to meet design expectations. Earth-air heat exchangers appear best suited for air pretreatment rather than for full heating or cooling. Pretreatment of air for an air source heat pump or ground-source heat pump often provides the best economic return on investment, with simple payback often achieved within one year after installation. Most systems are usually constructed from 100 to 600 mm (3.9 to 23.6 in) diameter, smooth-walled (so they do not easily trap condensation moisture and mold), rigid or semi-rigid plastic, plastic-coated metal pipes or plastic pipes coated with inner antimicrobial layers, buried 1.5 to 3 m (4.9 to 9.8 ft) underground where the ambient earth temperature is typically 10 to 23 °C (50 to 73 °F) all year round in the temperate latitudes where most humans live. Ground temperature becomes more stable with depth. Smaller diameter tubes require more energy to move the air and have less earth contact surface area. Larger tubes permit a slower airflow, which also yields more efficient energy transfer and permits much higher volumes to be transferred, permitting more air exchanges in a shorter time period, when, for example, you want to clear the building of objectionable odors or smoke but suffer from poorer heat transfer from the pipe wall to the air due to increased distances. Some consider
{"page_id": 4813788, "title": "Ground-coupled heat exchanger"}
a "guest" of another species. Brown discovered the holotype female from an M. vindex nest on 23 March 1955 northwest from Wagin at Badjanning Rocks, Western Australia. The specimen is currently housed in the Western Australian Museum in Perth. Two dealated paratype females were also collected with the holotype, looking very similar to each other except for the mandibles and colouration. The mandibular dentition varies among the three, and one of the paratypes is darker than the holotype. In 1991, a published journal reviewing the species groups assigned M. inquilina to the M. cephalotes species group. However, entomologists placed it in the M. gulosa species group one month after placing it in the M. cephalotes species group. == Description == Myrmecia inquilina is a large species, though it is smaller than its host. The body length of the ant is 21.4 millimetres (0.84 in), the head including the clypeus is 2.9 millimetres (0.11 in), the antennal scape 3.5 millimetres (0.14 in) and the diameter of the eyes are 1.25 millimetres (0.05 in). The mandibles are slender with four to five acutely shaped teeth. The antennae are morphologically similar to M. vindex, but it is smaller in comparison; the petiole node is also longer and wider. The postpetiole is subtriangular and more narrow than those seen on M. vindex queens. The clypeus, legs and antennae are covered in punctulates (spots), and the postpetiole and gaster have less punctulates. M. inquilina can be distinguished from other ants due to its lack of pilose (long soft hairs); only small erect setae are mostly found on the mandibles and gastric apex, but short hair can be found on the legs, and on the dorsum, thorax and cervix. The ant has pubescence (soft short hair) finer and more abundant than M. vindex. The pubescence is
{"page_id": 12704391, "title": "Myrmecia inquilina"}
Researchers and journalists have found a higher gender disparity and lower racial and ethnic diversity in the open-source-software movement than in the field of computing overall, though a higher proportion of sexual minorities and transgender people than in the general United States population. Despite growing an increasingly diverse user base since its emergence in the 1990s, the field of open-source software development has remained homogeneous, with young men constituting the vast majority of developers. == Background == Open source software is a model of software development where source code is created by a number of volunteers and can be modified by other members of the community. The number of developers working on an open-source project can range from few to thousands, but in many projects only developers deemed trustworthy by the project maintainers will have the privilege of making additions to the main repository. The software developed as open-source is usually freely available to use, with the number of users varying from few to many millions. Since its inception in the 1990s, as open-source software has continued to grow and offer new solutions to everyday problems, an increasingly diverse user base began to emerge. In contrast, the community of developers has remained homogeneous, dominated by young men. == Research on possible causes == In 2017, GitHub conducted a survey named the Open Source Survey, collecting responses from 5,500 GitHub users. Among the respondents, 18% personally experienced a negative interaction while working on open-source projects, but 50% of them have witnessed such interactions between other people. Dismissive responses, conflict, and unwelcoming language were respectively the third, fourth, and sixth most cited problems encountered in open-source. Another study from 2017 examined 3 million pull requests from 334,578 GitHub users, identifying 312,909 of them as men and 21,510 as women from the mandatory
{"page_id": 54281870, "title": "Diversity in open-source software"}
Juberg–Hayward syndrome is a rare genetic syndrome characterised by cleft lip and cleft palate, microcephaly, ptosis, short stature, hypoplasia or aplasia of thumbs, dislocation of radial head and fusion of humerus and radius. The abnormalities in the arm lead to restriction of movement in the elbow. == Presentation == These include Growth retardation Microcephaly Cleft lip and palate Minor vertebral and rib anomalies Horseshoe kidneys Thumb anomalies Triphalangeal thumb Radial ray anomalies == Genetics == This syndrome is caused by mutations in the establishment of cohesion 1 homolog 2 (ESCO2) gene. This gene is located on the short arm of chromosome 8 (8p21.1). Mutations in this gene also cause Roberts/SC phocomelia syndrome. Juberg–Hayward syndrome is inherited in both an autosomal recessive and autosomal dominant fashion. == Diagnosis == == History == This condition was first described in 1969 by Juberg and Hayward. == References == == External links ==
{"page_id": 63600553, "title": "Juberg–Hayward syndrome"}
Pale Blue Dot: A Vision of the Human Future in Space is a 1994 book by the astronomer Carl Sagan. It is the sequel to Sagan's 1980 book Cosmos and was inspired by the famous 1990 Pale Blue Dot photograph, for which Sagan provides a poignant description. In the book, Sagan mixes philosophy about the human place in the universe with a description of the current knowledge about the Solar System. He also details a human vision for the future. In 2023, the audiobook of Pale Blue Dot, read by Sagan, was selected by the Library of Congress for preservation in the United States National Recording Registry as being "culturally, historically, or aesthetically significant." == Summary == The first part of the book examines the claims made throughout history that Earth and the human species are unique. Sagan proposes two reasons for the persistence of the idea of a geocentric, or Earth-centered universe: human pride in our existence, and the threat of torturing those who dissented from it, particularly during the time of the Roman Inquisition. However, he also admits that the scientific tools to prove the Earth orbited the Sun were (until the last few hundred years) not accurate enough to measure effects such as parallax, making it difficult for astronomers to prove that the geocentric theory was false. After saying that we have gained humility from understanding that we are not literally the center of the universe, Sagan embarks on an exploration of the entire Solar System. He begins with an account of the Voyager program, in which he was a participating scientist. He describes the difficulty of working with the low light levels at distant planets, and the mechanical and computer problems which beset the twin spacecraft as they aged, and which could not always be diagnosed
{"page_id": 13710321, "title": "Pale Blue Dot (book)"}
to regenerate the chroma subcarrier, which in turn is utilized to demodulate the color difference signals. High frequency external interference caused by poor reception conditions causes colored confetti interference overlaying the picture. == Equation == In NTSC and PAL transmissions, the color TV signal can be represented as: E ( t ) = E y ( t ) + a 1 ⋅ ( E b ( t ) − E y ( t ) ) ⋅ sin ⁡ ( ω t ) + a 2 ⋅ ( E r ( t ) − E y ( t ) ) ⋅ cos ⁡ ( ω t ) {\displaystyle E(t)=E_{y}(t)+a_{1}\cdot (E_{b}(t)-E_{y}(t))\cdot \sin(\omega t)+a_{2}\cdot (E_{r}(t)-E_{y}(t))\cdot \cos(\omega t)} In this equation a 1 {\displaystyle a_{1}} and a 2 {\displaystyle a_{2}} are attenuation factors, E y {\displaystyle E_{y}} is the luminance signal, ( E b − E y ) {\displaystyle (E_{b}-E_{y})} and ( E r − E y ) {\displaystyle (E_{r}-E_{y})} are the so-called color difference signals and ω {\displaystyle \omega } is the angular frequency of the color carrier. ω {\displaystyle \omega } is within the luminance bandwidth. == Color eraser (Mehikon) == In the 1970s, the Israeli government considered the import of color televisions as frivolous and a luxury which would increase social gaps. Therefore, the government ordered the Israel Broadcasting Authority to cease broadcasting in color. As it was impractical to remove the chrominance signal from programs previously recorded in color, this was accomplished by simply omitting the burst phase signal from the broadcast. The "damaged" signal triggered the "color killer" mechanism in color television sets which prevented the appearance of color pictures. This method was named Mehikon (Hebrew: מחיקון "eraser"). Shortly after the introduction of the "Color eraser", special TV sets equipped with Anti-Mehikon (Hebrew: אנטי-מחיקון "anti-eraser") devices were offered. This
{"page_id": 27380847, "title": "Color killer"}
over all such π {\displaystyle \pi } with marginals P {\displaystyle P} and Q {\displaystyle Q} , respectively. == See also == Total variation Kolmogorov–Smirnov test Wasserstein metric == References ==
{"page_id": 683570, "title": "Total variation distance of probability measures"}
to a receiver on the end. Another proposed method is to use spinning electrodynamic tethers instead of hanging tethers. The gyroscopic effect provides passive stabilisation, avoiding the instability. === Surges === As mentioned earlier, conductive tethers have failed from unexpected current surges. Unexpected electrostatic discharges have cut tethers (e.g. see Tethered Satellite System Reflight (TSS‑1R) on STS‑75), damaged electronics, and welded tether handling machinery. It may be that the Earth's magnetic field is not as homogeneous as some engineers have believed. === Vibrations === Computer models frequently show tethers can snap due to vibration. Mechanical tether-handling equipment is often surprisingly heavy, with complex controls to damp vibrations. The one ton climber proposed by Brad Edwards for his Space Elevator may detect and suppress most vibrations by changing speed and direction. The climber can also repair or augment a tether by spinning more strands. The vibration modes that may be a problem include skipping rope, transverse, longitudinal, and pendulum. Tethers are nearly always tapered, and this can greatly amplify the movement at the thinnest tip in whip-like ways. === Other issues === A tether is not a spherical object, and has significant extent. This means that as an extended object, it is not directly modelable as a point source, and this means that the center of mass and center of gravity are not usually colocated. Thus the inverse square law does not apply except at large distances, to the overall behaviour of a tether. Hence the orbits are not completely Keplerian, and in some cases they are actually chaotic. With bolus designs, rotation of the cable interacting with the non-linear gravity fields found in elliptical orbits can cause exchange of orbital angular momentum and rotation angular momentum. This can make prediction and modelling extremely complex. == See also == STARS-II Spacecraft
{"page_id": 31392778, "title": "Space tether"}
typically unable to act against the collective will without first being disconnected from the group consciousness, as was the case with Douglock. Phalanx, like the Technarchy, can infect other organisms with the transmode virus with any physical contact - the only known exception being Earth mutants who possess a degree of immunity to the transmode virus. This seems to be a limitation of the Phalanx which their Technarchy progenitors do not have, as Warlock had no problems infecting his future teammate Magik (accidentally) when they first met and repeatedly infecting Cypher to form the Douglock entity on multiple occasions. In Cypher's case the effect was reversed without apparent incident, though Warlock was constantly worried that a time would come when the reversal would not take. Any organism infected by the Phalanx is automatically inducted into the group mind. Certain individuals with exceptional powers and/or abilities retain their identity. Phalanx possess the Technarchs' abilities to shapeshift and teleport, but cannot grow in size and mass without absorbing external matter. Over time, they can adapt to attacks used against them. == Other versions == === Cable === In yet another alternate reality, the Phalanx has overrun Earth, assimilating every lifeform. The mutant Cable serves as its central consciousness. === Exiles === In the Exiles series, the dimension-hopping team visited a world infested by a mutated version of the Phalanx. On this world, Cypher fell ill with the Legacy Virus and in an act of desperation Warlock infected him with the transmode virus to try and save his life. Unfortunately the two diseases combined and mutated into something far worse. Within the year, almost all of the world's population were transformed into Phalanx drones, calling themselves the Vi-Locks. The group was led by Forge whose innate understanding of machinery made him a prime
{"page_id": 1519495, "title": "Phalanx (comics)"}
what is to be done, what must be done, but at the same time- by that very token- they confirm that it must be done in fact. They conform to a particular requirement and in so doing they themselves perpetuate that requirement. Metaphysically speaking, without the greengrocer’s slogan the office worker’s slogan could not exist, and vice versa. Each proposes to the other that something be repeated and each accepts the other’s proposal. Their mutual indifference to each other’s slogans is only an illusion: in reality, by exhibiting their slogans, each compels the other to accept the rules of the game and to confirm thereby the power that requires the slogans in the first place. Quite simply, each helps the other to be obedient. Both are objects in a system of control, but at the same time they are its subjects as well. They are both victims of the system and its instruments. If an entire district town is plastered with slogans that no one reads, it is on the one hand a message from the district secretary to the regional secretary, but it is also something more: a small example of the principle of social auto-totality at work. Part of the essence of the post-totalitarian system is that it draws everyone into its sphere of power, not so they may realize themselves as human beings, but so they may surrender their human identity in favor of the identity of the system, that is, so they may become agents of the system’s general automatism and servants of its self-determined goals, so they may participate in the common responsibility for it, so they may be pulled into and ensnared by it, like Faust by Mephistopheles. More than this: so they may create through their involvement a general norm and, thus, bring
{"source": 1000, "title": "from dpo"}
of conditioning is called “selection bias”. The situation is worse: bias is introduced even if we’re conditioning on effects of being hired, like job title or department (e.g. by surveying everyone within a department). Conditioning on downstream effects can introduce bias too! From these examples, you might conclude that conditioning is a terrible thing! Unfortunately, there are also cases where conditioning actually corrects bias that you’d have without conditioning! Wait, what? It turns out that the picture is the key. Before, we were considering bias due to conditioning on common effects (variables where arrows collide). Now, we’ll switch the arrows around, and talk about bias due to not conditioning on common causes (variables from which arrows diverge). Consider the (simplified) disaster example from last time, in fig. 3. In this picture, a disaster might cause traffic. It also might cause my alarm clock to fail to go off (by causing a power failure). Traffic and my alarm going off are otherwise independent of each other. If I were to check whether traffic was correlated with my alarm going off, I’d find that it was, even though there’s no causal relationship between the two! If there is a disaster, there will be bad traffic, and my alarm will fail to go off. Unplugging my alarm clock doesn’t cause traffic outside, and neither does traffic (say, from sporting events) cause my alarm clock to fail to go off. The correlation is spurious, and is due entirely to the common cause, the disaster, effecting both the alarm and the traffic. If you want to remove this spurious relationship, how can you do it? It turns out that conditioning is the answer! If I look at data where there is no disaster, then I’ll find that whether my alarm goes off and whether there
{"source": 2757, "title": "from dpo"}
anus; there is no rectal bleeding. The remainder of the examination shows no abnormalities. Which of t he following is the most likely cause of this patient's physical findings? (A) Constipation (B) Cystic fibrosis (C) Hirschsprung disease (D) Hookworm infestation (E) Intussusception 43. A 25 -year -old woman comes to the office because of a 3 -day history of fever, chills, severe headache, weakness, muscle pain, loss of appetite, vomiting, diarrhea, and moderate abdominal pain. She is in nursing school and returned from a medical missions trip in West Africa 10 days ago. Her symptoms began abruptly while she was shopping in a super market after her return. Temperature is 39.0°C (102.2°F), pulse is 100/min, respirations are 22/min, and blood pressure is 110/70 mm Hg. The patient appears ill and in mild respiratory distress. Physical examination discloses poor skin turgor and hyperacti ve bowel sounds. Muscle strength is 4/5 throughout. Laboratory studies show leukopenia and thrombocytopenia. Which of the following is the most sensitive and specific test for detection of the suspected viral genome in this patient? (A) Microarray analysis (B) Northern blot (C) Reverse transcription -polymerase chain reaction test (D) Southern blot (E) Western blot 22 44. A 56 -year -old man comes to the office because of a 1 -month history of pain and tingling of his hands and a 6 -month history of paresthesia of his feet. As part of the workup, a nerve biopsy specimen is obtained and analyzed at the electron microscopic level . The biopsy specimen shows marked loss of structures labeled by the X's in the photomicrograph of a normal biopsy specimen shown. The loss of these structures is most likely to cause which of the following neurologic findings in this patient? (A) Decreased sensitivity of the deep tendon reflex (B) Impaired stereognosis
{"source": 4979, "title": "from dpo"}
the transcript has not been altered or that another party performing the same actions hasn’t diverged from the same sequence. That’s a pretty abstract concept, so let’s use the example of ensuring that two users are actually the same. We initialize a duplex, absorb the pieces of data which identify the user, and finally squeeze a cryptographic identifier: Init ( ) Absorb ( user.email ) Absorb ( user.name ) Absorb ( user.phone_number ) 𝐼 ← Squeeze ( 𝑛 ) Init() Absorb(user.email) Absorb(user.name) Absorb(user.phone_number) I←Squeeze(n) ​ This is similar to using a hash function 𝐻 ( 𝐸 ∣ ∣ 𝑁 ∣ ∣ 𝑃 ) H(E∣∣N∣∣P), but because the duplex pads its inputs, it preserves each pieces of data as independent inputs. We can even add semantic information to ensure domain separation: Absorb ( "phone_number"+user.phone_number ) Absorb("phone_number"+user.phone_number) ​ This might be a little heavy-handed for user identifiers, but the ability to create a transcript of operations with cryptographic assurance of their semantic integrity turns out to be incredibly useful. Digital Signatures By combining our duplex with a well-defined elliptic curve like ristretto255, we can turn a cryptographic transcript into a sophisticated digital signature. For example, let’s create an EdDSA-style Schnorr signature of a message 𝑚 m given the signer’s key pair ( 𝑑 , 𝑄 ) (d, Q). Moon Math Primer But first, we need to talk about elliptic curves. Elliptic curves are awesome but don’t make a lot of intuitive sense to folks who are familiar with other cryptographic things like hash functions and encryption algorithms, so here’s a quick primer on what’s in play. A scalar is a like a regular integer in that you can do arbitrary arithmetic with them. Scalars are usually notated using lowercase variables like 𝑑 d and 𝑘 k. You can turn an arbitrary string
{"source": 6317, "title": "from dpo"}
Van Krevelen diagrams are graphical plots developed by Dirk Willem van Krevelen (chemist and professor of fuel technology at the TU Delft) and used to assess the origin and maturity of kerogen and petroleum. The diagram cross-plots the hydrogen:carbon atomic ratio as a function of the oxygen:carbon atomic ratio. Beginning around 2003, the diagrams are often used to visualize data from mass spectrometry analysis, used for mixtures other than kerogen and petroleum. For example, the diagrams have been used in one analysis of the components in Scotch whiskey. == Types of kerogen == Different types of kerogen have differing potentials to produce oil during maturation. These various types of kerogen can be distinguished on a van Krevelen diagram. == See also == Petroleum geology Maturity (geology) == References == van Krevelen, D.W. (1950). "Graphical-statistical method for the study of structure and reaction processes of coal", Fuel, 29, 269–84. van Krevelen, D.W. and Schuyer, J. (1957) Coal science. Elsevier publishing company. The chemistry and technology of petroleum
{"page_id": 19281502, "title": "Van Krevelen diagram"}
mirror planes between the horizontal rotation axes, not through them. As a result, the vertical axis is a 2n-fold rotoreflection axis. Dnh is the symmetry group for a regular n-sided prism and also for a regular n-sided bipyramid. Dnd is the symmetry group for a regular n-sided antiprism, and also for a regular n-sided trapezohedron. Dn is the symmetry group of a partially rotated prism. n = 1 is not included because the three symmetries are equal to other ones: D1 and C2: group of order 2 with a single 180° rotation. D1h and C2v: group of order 4 with a reflection in a plane and a 180° rotation about a line in that plane. D1d and C2h: group of order 4 with a reflection in a plane and a 180° rotation about a line perpendicular to that plane. For n = 2 there is not one main axis and two additional axes, but there are three equivalent ones. D2, [2,2]+, (222) of order 4 is one of the three symmetry group types with the Klein four-group as abstract group. It has three perpendicular 2-fold rotation axes. It is the symmetry group of a cuboid with an S written on two opposite faces, in the same orientation. D2h, [2,2], (*222) of order 8 is the symmetry group of a cuboid. D2d, [4,2+], (2*2) of order 8 is the symmetry group of e.g.: A square cuboid with a diagonal drawn on one square face, and a perpendicular diagonal on the other one. A regular tetrahedron scaled in the direction of a line connecting the midpoints of two opposite edges (D2d is a subgroup of Td; by scaling, we reduce the symmetry). == Subgroups == For Dnh, [n,2], (*22n), order 4n Cnh, [n+,2], (n*), order 2n Cnv, [n,1], (*nn), order 2n Dn,
{"page_id": 2922089, "title": "Dihedral symmetry in three dimensions"}
may comprise either the TAT or CGC nucleotide triads. The others could be described as long inverted repeats having the tendency to produce hairpins and cruciform, and finally direct tandem repeats, which commonly exist in structures described as slipped-loop, cruciform and left-handed Z-DNA. === Common in different organisms === Past studies suggest that repeats are a common feature of eukaryotes unlike the prokaryotes and archaea. Other reports suggest that irrespective of the comparative shortage of repeat elements in prokaryotic genomes, they nevertheless contain hundreds or even thousands of large repeats. Current genomic analysis seem to suggest the existence of a large excess of perfect inverted repeats in many prokaryotic genomes as compared to eukaryotic genomes. For quantification and comparison of inverted repeats between several species, namely on archaea, see === Inverted repeats in pseudoknots === Pseudoknots are common structural motifs found in RNA. They are formed by two nested stem-loops such that the stem of one structure is formed from the loop of the other. There are multiple folding topologies among pseudoknots and great variation in loop lengths, making them a structurally diverse group. Inverted repeats are a key component of pseudoknots as can be seen in the illustration of a naturally occurring pseudoknot found in the human telomerase RNA component. Four different sets of inverted repeats are involved in this structure. Sets 1 and 2 are the stem of stem-loop A and are part of the loop for stem-loop B. Similarly, sets 3 and 4 are the stem for stem-loop B and are part of the loop for stem-loop A. Pseudoknots play a number of different roles in biology. The telomerase pseudoknot in the illustration is critical to that enzyme's activity. The ribozyme for the hepatitis delta virus (HDV) folds into a double-pseudoknot structure and self-cleaves its circular genome
{"page_id": 65132, "title": "Inverted repeat"}
Systems biology is a biological study field that focuses on the systematic study of complex interactions in biological systems, thus using a new perspective (integration instead of reduction) to study them. Particularly from year 2000 onwards, the term is used widely in the biosciences. The field has generated interest among scientists, resulting in regular and one-time conferences and meetings. Below is a partial list.
{"page_id": 22770838, "title": "List of systems biology conferences"}
Karst topography is a geological formation shaped by the dissolution of a layer or layers of soluble bedrock, usually carbonate rock such as limestone or dolomite, but also in gypsum. It has also been documented for weathering-resistant rocks, such as quartzite, given the right conditions. This is an incomplete list of the major karst landscape areas of the world. == Africa == === Madagascar === Anjajavy Forest, western Madagascar Ankarana Reserve, Madagascar Madagascar dry deciduous forests, western Madagascar Tsingy de Bemaraha Strict Nature Reserve, Madagascar === South Africa === Oudtshoorn, Western Cape Province, KwaZulu Natal. West Rand, Gauteng and North West Province, KwaZulu Natal. == Asia == === China === Area around Guilin and Yangshuo Zhijin Cave, Guizhou (UNESCO World Heritage Site) Jiuzhaigou Valley and Huanglong Scenic and Historic Interest Area, (UNESCO World Heritage Site) Shaanxi tiankeng cluster, discovered in 2016, it is one of the largest in the world comprising forty-nine sinkholes and more than fifty funnels ranging from 50–100 metres in diameter. South China Karst, World Heritage Site Stone Forest Xiaozhai Tiankeng, also known as the Heavenly Pit, is the world's largest sinkhole. Zhangjiajie National Forest park, forming part of the Wulingyuan scenic area, World Heritage Site Wulong Karst, Wulong County, Chongqing Municipality === Georgia === Arabika Massif (including Voronya Cave – the world's second deepest cave), Abkhazia, Georgia === India === Borra Cave or Bora Guhalu in Andhra Pradesh. Patal Bhuvaneshwar in Uttarakhand. Yana Caves -Karnatka (Uttar Kanada District) === Indonesia === Ajamaru Plateau, West Papua, Indonesia Gombong Selatan, Central Java, Indonesia Gunung Sewu, Indonesia Rammang-Rammang, in the Bantimurung - Bulusaraung National Park in (Maros Regency) Indonesia, known as The Spectacular Tower Karst Area Sangkulirang-Mangkalihat, East Kalimantan Sijunjung, West Sumatra, Indonesia Menui Island, Southest Sulawesi, Indonesia === Israel === Avshalom Cave, also known as "Soreq Cave" or
{"page_id": 32038148, "title": "List of karst areas"}
have come up with algorithms using camera-only data that achieve the performance that rival those of lidar. On the other hand, camera-only data sometimes draw inaccurate bounding boxes, and thus lead to poor predictions. This is due to the nature of superficial information that stereo cameras provide, whereas incorporating lidar gives autonomous vehicles precise distance to each point on the vehicle. === Technical challenges === Software Integration: Because of the large number of sensors and safety processes required by autonomous vehicles, software integration remains a challenging task. A robust autonomous vehicle should ensure that the integration of hardware and software can recover from component failures. Prediction and trust among autonomous vehicles: Fully autonomous cars should be able to anticipate the actions of other cars like humans do. Human drivers are great at predicting other drivers' behaviors, even with a small amount of data such as eye contact or hand gestures. In the first place, the cars should agree on traffic rules, whose turn it is to drive in an intersection, and so on. This scales into a larger issue when there exists both human-operated cars and self-driving cars due to more uncertainties. A robust autonomous vehicle is expected to improve on understanding the environment better to address this issue. Scaling up: The coverage of autonomous vehicles testing could not be accurate enough. In cases where heavy traffic and obstruction exist, it requires faster response time or better tracking algorithms from the autonomous vehicles. In cases where unseen objects are encountered, it is important that the algorithms are able to track these objects and avoid collisions. These features require numerous sensors, many of which rely on micro-electro-mechanical systems (MEMS) to maintain a small size, high efficiency, and low cost. Foremost among MEMS sensors in vehicles are accelerometers and gyroscopes to measure
{"page_id": 5071866, "title": "Vehicular automation"}
Dirk Krüger is a German economist and currently Walter H. and Leonore C. Annenberg Professor in the Social Sciences and Professor of Economics at the University of Pennsylvania. He holds a secondary appointment in the finance department at the Wharton School, and is außerplanmäßiger Professor at the Universität Bielefeld, Germany. His research focuses on macroeconomic risk, public finance and labor economics. == Education == Krüger studied for his diploma in economics at Bielefeld University as a scholar of the Friedrich Ebert Foundation. After graduating in 1995, he went on to further study at the University of Minnesota and received his Ph.D. in 1999. == Career == Stanford University hired him as an assistant professor of economics in 1999. He was a Hoover Fellow at the Stanford-based Hoover Institution from 2002 to 2003. He left Stanford for an assistant professorship at the University of Pennsylvania in 2003. He then worked as a full professor at the Goethe University Frankfurt from 2004 to 2006, when he returned to the University of Pennsylvania as an associate professor. He was promoted to full professorship in 2008 and to a chaired professorship in 2018. Krüger has worked for a range of academic journals in an editorial capacity, such as the Review of Economic Studies, the American Economic Review, the Journal of the European Economic Association and is currently the editor of the International Economic Review. The Econometric Society elected him fellow in 2020. He is also a fellow of the European Economic Association and the Society for the Advancement of Economic Theory (SAET). == Selected works == Krueger, Dirk; Perri, Fabrizio (2006). "Does Income Inequality Lead to Consumption Inequality? Evidence and Theory1". Review of Economic Studies. 73: 163–193. doi:10.1111/j.1467-937X.2006.00373.x. hdl:10419/25457. Fernández-Villaverde, Jesús; Krueger, Dirk (2007). "Consumption over the Life Cycle: Facts from Consumer Expenditure Survey
{"page_id": 66455122, "title": "Dirk Krüger"}
Studerus et al. (2010) show that the self-reported values and beliefs of psychedelic drug users indicate a higher concern for the environment than both non-users and users of other illegal drugs. It is unclear from the research whether the concern for the environment preceded the psychedelic experience or came about as a result of it. Conversely, Lester Grinspoon reports that ecological awareness may result in psychedelic drug users forgoing the drug and non-users staying away from it entirely to remain "pure". In other words, ecological awareness may not precipitate psychedelic drug use, but may actually discourage it. == History == It is likely that humans have consumed psychoactive plants in the ritual context of shamanism for thousands of years prior to the advent of Western civilization and the supplanting of indigenous cultural values. Anthropological archaeologist Gerardo Reichel-Dolmatoff studied the shamanic rituals of the indigenous Tucano people of South America and found that their shamanic practices primarily served to maintain ecological balance in the rainforest habitat. Experts speculate that the ecological values of shamanism are an attribute of the psychedelic experience. Those who ingest psychoactive drugs often report similar experiences of ecological awareness. Swiss chemist Albert Hofmann, Norwegian philosopher Arne Næss, British religious studies scholar Graham Harvey, and American mycologist Paul Stamets have all written about the shared ecological message of the psychedelic experience. The back-to-the-land movement and the creation of rural intentional communities by the hippie counterculture of the 1960s was in part due to the wide use of psychedelic drugs which people felt helped them get in touch with nature. Utopian novels of the 1960s and 1970s illustrated this interrelationship between psychedelic drugs and ecological values. Aldous Huxley's novel Island (1962) portrayed a utopian society that used psychedelic mushrooms while espousing ecological beliefs. The inhabitants believed that if they
{"page_id": 44276500, "title": "Psychedelics and ecology"}
A cognitive vulnerability in cognitive psychology is an erroneous belief, cognitive bias, or pattern of thought that predisposes an individual to psychological problems. The vulnerability exists before the symptoms of a psychological disorder appear. After the individual encounters a stressful experience, the cognitive vulnerability shapes a maladaptive response that increases the likelihood of a psychological disorder. In psychopathology, there are several perspectives from which the origins of cognitive vulnerabilities can be examined, It is the path way of including cognitive schema models, hopelessness models, and attachment theory. Attentional bias is one mechanism leading to faulty cognitive bias that leads to cognitive vulnerability. Allocating a danger level to a threat depends on the urgency or intensity of the threshold. Anxiety is not associated with selective orientation. == Theories == === Cognitive theory === Preliminary or "distal" causes contribute to the formation of a cognitive vulnerability that ultimately, via immediate or proximal causes, leads to the individual manifesting symptoms of the disorder. Immediate cognitive and emotional responses trigger imagery and assumptions formed in the past leading to offsetting, defensive behavior and in turn reinforcing mistaken beliefs or other cognitive vulnerabilities. === Attachment theory === The contact made with caretakers determines a certain attachment process. When secure attachment is disrupted and starts to become insecure, abnormal patterns begin, increasing risk for depression. Working models build perceptions of relationships with others. Cognitive vulnerability is created with maladaptive cognitive processing when building relationships and attachments. == The diathesis-stress relationship == Diathesis contributes to vulnerability. The diathesis refers to the inclination to illness. In the diathesis-stress relationship, hidden vulnerability is activated through events that the individual perceives as stressful. Vulnerability in psychological terms is implied as an increased probability of emotional pain and some type of psychopathology. Vulnerability can be a combination and interaction of genetic
{"page_id": 36648158, "title": "Cognitive vulnerability"}
star possibly having formed in the Gaia Enceladus, which are galactic remains of a former galaxy, the star and its planets might be extragalactic in origin. == Refuted extragalactic planets == === HIP 13044 b === A planet with a mass of at least 1.25 times that of Jupiter had been potentially discovered by the European Southern Observatory (ESO) orbiting a star of extragalactic origin, even though the star currently has been absorbed by our own galaxy. HIP 13044 is a star about 2,000 light years away in the southern constellation of Fornax, part of the Helmi stream of stars, a leftover remnant of a small galaxy that collided with and was absorbed by the Milky Way over 6 billion years ago. However, subsequent analysis of the data revealed problems with the potential planetary detection: for example an erroneous barycentric correction had been applied (the same error had also led to claims of planets around HIP 11952 that were subsequently refuted). After applying the corrections, there is no evidence for a planet orbiting the star. If it had been real, the Jupiter-like planet would have been particularly interesting, orbiting a star nearing the end of its life and seemingly about to be engulfed by it, potentially providing an observational model for the fate of our own planetary system in the distant future (cf. Future of Earth). == See also == Exoplanet – Planet outside the Solar System Solar System planets Extragalactic astronomy – the study of any objects outside the Milky Way including the extragalactic planets == References == == External links == Extragalactic planet candidate around high-mass X-ray binary M51-ULS-1 from Staringup in September 2020.
{"page_id": 24104446, "title": "Extragalactic planet"}
universal precautions outlined by the Centers for Disease Control (CDC) when handling blood, vomit, or other bodily fluids that may contain blood including: (1) Using disposable, nonporous gloves [Medium -High] ; (2) Placing gloves contaminated with blood in a tied, sealed, or otherwise closed plastic bag and discarding them immediately [Medium -High] ; (3) Discarding all other gloves immediately after one use [Medium -High] ; and (4) Washing hands after using and disposing of the gloves. [Medium -High] Technical Assistance Although human milk is a body fluid, it is not necessary to wear gloves when feeding or handling human milk. Revised: April 2025 201 # §746.3427. Must I use a licensed exterminator to treat my child - # care center for insects, rodents, and other pests? Subchapter R, Health Practices Division 1, Environmental Health December 2010 You may treat your center for pests only if you are certified as a noncommercial applicator by the Texas Department of Agriculture. Otherwise, you must use a pest control operator licensed by the Department of Agriculture to prevent, control, or eliminate pest infestations at your child -care center, including the use of over -the -counter products designed for controlling insects, rodents, and other pests. [Medium -High] Technical Assistance Refer to the Structural Pest Control Act and related regulation for further information on pest control before treating your child -care center. # §746.3429. Are there general precautions I must take when my # child -care center is being treated for insects, rodents, and other # pests? Subchapter R, Health Practices Division 1, Environmental Health September 2003 (a) Children must not be allowed in areas where there is pesticide residue that may be harmful to them. Follow written instructions from the licensed pest control operator or label directions in order to determine whether the residue may
{"source": 1426, "title": "from dpo"}
volatile than sodium and can be distilled for collection. The removal of the metal vapor leads to a shift in the > Chapter 18 | Representative Metals, Metalloids, and Nonmetals 1001 equilibrium to produce more metal (see how reactions can be driven in the discussions of Le Châtelier’s principle in the chapter on fundamental equilibrium concepts). The production of magnesium, zinc, and tin provide additional examples of chemical reduction. The Preparation of Magnesium The Pidgeon process involves the reaction of magnesium oxide with elemental silicon at high temperatures to form pure magnesium: Si( s) + 2MgO( s) →⎯⎯ > Δ SiO 2(s) + 2Mg( g) Although this reaction is unfavorable in terms of thermodynamics, the removal of the magnesium vapor produced takes advantage of Le Châtelier’s principle to continue the forward progress of the reaction. Over 75% of the world’s production of magnesium, primarily in China, comes from this process. The Preparation of Zinc Zinc ores usually contain zinc sulfide, zinc oxide, or zinc carbonate. After separation of these compounds from the ores, heating in air converts the ore to zinc oxide by one of the following reactions: 2ZnS( s) + 3O 2(g) →⎯⎯ > Δ 2ZnO( s) + 2SO 2(g) ZnCO 3(s) →⎯⎯ > Δ ZnO( s) + Co 2(g) Carbon, in the form of coal, reduces the zinc oxide to form zinc vapor: ZnO( s) + C( s) ⟶ Zn( g) + CO( g) The zinc can be distilled (boiling point 907 °C) and condensed. This zinc contains impurities of cadmium (767 °C), iron (2862 °C), lead (1750 °C), and arsenic (613 °C). Careful redistillation produces pure zinc. Arsenic and cadmium are distilled from the zinc because they have lower boiling points. At higher temperatures, the zinc is distilled from the other impurities, mainly lead and iron. The
{"source": 3700, "title": "from dpo"}
that AT ≡q 0, that is, a basis of Λ⊥ > q (A). Let the Gaussian function be ρc,s (x) = exp( −π∥x − c∥2/s 2) where c, xv ∈ R n, and s ∈ R , s > 0. The discrete Gaussian distribution over a lattice Λ with center c ∈ R n and parameter s ∈ R , s > 0 is defined as DΛ, c,s (y) = ρc,s (y)/ρ c,s (Λ) for and y ∈ Λ, where ρs, c(Λ) = P > x∈Λ ρc,s (x). For convenience, ρ0,s and DΛ, 0,s are abbreviated as ρs and DΛ,s . Lemma 18 (). For any lattice Λ of integer dimension m with basis B, any c ∈ R m and Gaussian parameter s ≥ ˜B · ω(√log m), we have Pr[ ∥x − c∥ > s √m : x $ ←− D Λ, c,s ] ≤ negl (m) . We now recall some preliminary algorithms regarding trapdoor sampling and preimage sampling over lattices. Lemma 19 ([46, Thm 5.1]). There is a PPT algorithm TrapGen that takes as input integers n ≥ 1, q ≥ 2 and a sufficiently large m = O(n log q), outputs a matrix A ∈ Zn×mq and a trapdoor matrix TA ∈ Zm×m,such that AT A = 0 mod q, the distribution of A is statistically close to the uniform distribution over Zn×mq and ˜TA = O
{"source": 5751, "title": "from dpo"}
\( x + i = 2 m_i n_i \), and \( y_i = m_i^2 - n_i^2 \). However, since all the \( k \) must be the same, but the parameters \( m_i \) and \( n_i \) can vary for each \( i \). But if we need all these triples to share the same hypotenuse \( k \), then \( k \) must be expressible as \( m_i^2 + n_i^2 \) in multiple ways. So, the number of such representations relates to the number of ways \( k \) can be written as a sum of two squares. The more representations, the higher the number of possible legs \( x + i \). Therefore, \( k \) must be a number that can be expressed as a sum of two squares in at least \( n \) different ways (considering different pairs \( (m_i, n_i) \)), but with the additional constraint that the legs \( x + i \) form a sequence of consecutive integers. That seems quite restrictive. Alternatively, perhaps we can find a specific \( k \) which allows several consecutive integers as legs. Let me look for examples. Let me start with small \( n \). Let's see if \( n = 1 \): trivial, just one equation. For \( n = 2 \), we need two consecutive integers as legs. Let's see. Suppose \( x + 1 \) and \( x + 2 \) are both legs of a Pythagorean triple with hypotenuse \( k \). So: \( (x + 1)^2 + y_1^2 = k^2 \) \( (x + 2)^2 + y_2^2 = k^2 \) Subtracting the two equations: \( (x + 2)^2 - (x + 1)^2 + y_2^2 - y_1^2 = 0 \) Which simplifies to: \( (2x + 3) + (y_2^2 -
{"source": 6842, "title": "from dpo"}
below. Mass spectrometry indicates the molecular weight of a compound and, from the fragmentation patterns, its structure. High-resolution mass spectrometry can usually identify the exact formula of a compound and is used in place of elemental analysis. In former times, mass spectrometry was restricted to neutral molecules exhibiting some volatility, but advanced ionization techniques allow one to obtain the "mass spec" of virtually any organic compound. Crystallography can be useful for determining molecular geometry when a single crystal of the material is available. Highly efficient hardware and software allows a structure to be determined within hours of obtaining a suitable crystal. Traditional spectroscopic methods such as infrared spectroscopy, optical rotation, and UV/VIS spectroscopy provide relatively nonspecific structural information but remain in use for specific applications. Refractive index and density can also be important for substance identification. == Properties == The physical properties of organic compounds typically of interest include both quantitative and qualitative features. Quantitative information includes a melting point, boiling point, solubility, and index of refraction. Qualitative properties include odor, consistency, and color. == Melting and boiling properties == Organic compounds typically melt and many boil. In contrast, while inorganic materials generally can be melted, many do not boil, and instead tend to degrade. In earlier times, the melting point (m.p.) and boiling point (b.p.) provided crucial information on the purity and identity of organic compounds. The melting and boiling points correlate with the polarity of the molecules and their molecular weight. Some organic compounds, especially symmetrical ones, sublime. A well-known example of a sublimable organic compound is para-dichlorobenzene, the odiferous constituent of modern mothballs. Organic compounds are usually not very stable at temperatures above 300 °C, although some exceptions exist. === Solubility === Neutral organic compounds tend to be hydrophobic; that is, they are less soluble in water
{"page_id": 22208, "title": "Organic chemistry"}