text
stringlengths 5
10.5k
| source
stringlengths 33
146
|
|---|---|
risk management system, the requirements of which are in alignment with ISO 14971, the ISO standard for the application of risk management to medical devices. The procedure set out in Annex XIII, which is comparable with MDD Annex VIII but with some enhanced requirements. Review and document experience gained in the post-production phase and report serious incidents and field safety corrective actions. Manufacturers outside the EU who are placing medical devices on the EU market are obligated to appoint a European Authorized Representative. Custom-made devices are not required to carry the CE marking. === United Kingdom === In the UK manufacturers of custom-made devices are required to register with the Medicines and Healthcare products Regulatory Agency. Until the UK left the European Union on 31 January 2020, custom-made devices were governed by the MDD, which was given effect in UK law by The Medical Devices Regulations 2002 (Statutory Instrument 2002/618 [UK MDR 2002]). Immediately after the UK's departure, the UK entered an 11-month implementation period (IP), during which EU law continued to apply. In preparation for the UK's departure from the EU, the EU MDR was essentially transposed into The Medical Devices (Amendment etc.) (EU Exit) Regulations 2019, (Statutory Instrument 2019/791 [UK MDR 2019]), an amendment of the UK MDR 2002) and was expected to be fully implemented on exit day. The UK MDR 2002 was further amended by The Medical Devices (Amendment etc.) (EU Exit) Regulations 2020 (Statutory Instrument 2020/1478 [UK MDR 2020]), which removed the provisions of the EU MDR and substituted 'exit day' for 'IP completion day'. In Great Britain medical devices can conform to either the UK MDR 2002 (as amended) or the EU MDR until 30 June 2023. Northern Ireland remains in line with EU law under the terms of the Protocol on Ireland/Northern Ireland.
|
{"page_id": 69829264, "title": "Custom-made medical device"}
|
argument debates if an ecological unit, despite having a name and loose definition, whether it is simply a measure for conceptual thought that helps in modeling, or whether it is definitive and seen as a concrete thing. == Summary == === Individual === The most basic ecological unit is at the individual level. At this level, singular organisms in a single species are the focus of reference. Studying individuals can help reinforce concepts in their physiology and behavior. Additionally, single individuals can be outliers in many ways, such as genetic variation, which can lead to questions about what triggered this change and to see whether it spreads to the remainder of the population. It can be argued that studying individuals is insignificant and no concrete conclusions can be drawn about entire populations based on one individual. Regardless of this remark, individuals can still provide valuable insights into the broader dynamics of a species, as they offer a starting point for understanding the underlying processes of adaptation, survival, and reproduction. === Population === The next level is populations—this refers to all individuals in a single species. Studying populations is crucial for understanding interactions within a species, between species, and with the surrounding environment. It can also reveal similarities and differences between the same species in the same location or in different locations, helping to identify key variables that influence these variations. Changes within populations can often be attributed to some sort of survival pressure that is urging an evolutionary adaptation in order for the species to maintain itself. These pressures may include competition for resources, predation, climate changes, or disease outbreaks. By examining population dynamics, scientists can gain insights into how species adapt over time, predict future changes, and make informed decisions about conservation efforts or managing ecosystems. === Community ===
|
{"page_id": 57731730, "title": "Ecological unit"}
|
throughout history. In the Science paper, Lieberman and his collaborators called the method of high-volume data analysis in digitalized texts "culturomics". == Usage == Commas delimit user-entered search terms, where each comma-separated term is searched in the database as an n-gram (for example, "nursery school" is a 2-gram or bigram). The Ngram Viewer then returns a plotted line chart. Note that due to limitations on the size of the Ngram database, only matches found in at least 40 books are indexed. == Limitations == The data sets of the Ngram Viewer have been criticized for their reliance upon inaccurate optical character recognition (OCR) and for including large numbers of incorrectly dated and categorized texts. Because of these errors, and because they are uncontrolled for bias (such as the increasing amount of scientific literature, which causes other terms to appear to decline in popularity), care must be taken in using the corpora to study language or test theories. Furthermore, the data sets may not reflect general linguistic or cultural change and can only hint at such an effect because they do not involve any metadata like date published, author, length, or genre, to avoid any potential copyright infringements. Systemic errors like the confusion of s and f in pre-19th century texts (due to the use of ſ, the long s, which is similar in appearance to f) can cause systemic bias. Although the Google Books team claims that the results are reliable from 1800 onwards, poor OCR and insufficient data mean that frequencies given for languages such as Chinese may only be accurate from 1970 onward, with earlier parts of the corpus showing no results at all for common terms, and data for some years containing more than 50% noise. Guidelines for doing research with data from Google Ngram have been
|
{"page_id": 35673556, "title": "Google Books Ngram Viewer"}
|
of another chemical property, such as specific chemical reactivity. Poisons are widely used in industry and agriculture, as chemical reagents, solvents or complexing reagents, e.g. carbon monoxide, methanol and sodium cyanide, respectively. They are less common in household use, with occasional exceptions such as ammonia and methanol. For instance, phosgene is a highly reactive nucleophile acceptor, which makes it an excellent reagent for polymerizing diols and diamines to produce polycarbonate and polyurethane plastics. For this use, millions of tons are produced annually. However, the same reactivity makes it also highly reactive towards proteins in human tissue and thus highly toxic. In fact, phosgene has been used as a chemical weapon. It can be contrasted with mustard gas, which has only been produced for chemical weapons uses, as it has no particular industrial use. Biocides need not be poisonous to humans, because they can target metabolic pathways absent in humans, leaving only incidental toxicity. For instance, the herbicide 2,4-dichlorophenoxyacetic acid is a mimic of a plant growth hormone, which causes uncontrollable growth leading to the death of the plant. Humans and animals, lacking this hormone and its receptor, are unaffected by this, and need to ingest relatively large doses before any toxicity appears. Human toxicity is, however, hard to avoid with pesticides targeting mammals, such as rodenticides. The risk from toxicity is also distinct from toxicity itself. For instance, the preservative thiomersal used in vaccines is toxic, but the quantity administered in a single shot is negligible. == History == Throughout human history, intentional application of poison has been used as a method of murder, pest-control, suicide, and execution. As a method of execution, poison has been ingested, as the ancient Athenians did (see Socrates), inhaled, as with carbon monoxide or hydrogen cyanide (see gas chamber), injected (see lethal injection), or
|
{"page_id": 51108, "title": "Poison"}
|
Mechanics. Dover. ISBN 978-0-486-66110-0. Feynman, Richard; Leighton, R.; Sands, M. (2005). "Chapter 11". The Feynman Lectures on Physics. Vol. I (2nd ed.). Addison Wesley. ISBN 978-0-8053-9046-9. == External links == "Vector", Encyclopedia of Mathematics, EMS Press, 2001 [1994] Online vector identities (PDF) Introducing Vectors A conceptual introduction (applied mathematics)
|
{"page_id": 32533, "title": "Euclidean vector"}
|
build a supercomputer running Linux using consumer off-the-shelf parts and a high-speed low-latency interconnection network. The prototype utilized an Alta Technologies "AltaCluster" of eight dual, 333 MHz, Intel Pentium II computers running a modified Linux kernel. Bader ported a significant amount of software to provide Linux support for necessary components as well as code from members of the National Computational Science Alliance (NCSA) to ensure interoperability, as none of it had been run on Linux previously. Using the successful prototype design, he led the development of "RoadRunner," the first Linux supercomputer for open use by the national science and engineering community via the National Science Foundation's National Technology Grid. RoadRunner was put into production use in April 1999. At the time of its deployment, it was considered one of the 100 fastest supercomputers in the world. Though Linux-based clusters using consumer-grade parts, such as Beowulf, existed before the development of Bader's prototype and RoadRunner, they lacked the scalability, bandwidth, and parallel computing capabilities to be considered "true" supercomputers. Today, supercomputers are still used by the governments of the world and educational institutions for computations such as simulations of natural disasters, genetic variant searches within a population relating to disease, and more. As of November 2024, the fastest supercomputer is El Capitan. == Navigation and astronomy == Starting with known special cases, the calculation of logarithms and trigonometric functions can be performed by looking up numbers in a mathematical table, and interpolating between known cases. For small enough differences, this linear operation was accurate enough for use in navigation and astronomy in the Age of Exploration. The uses of interpolation have thrived in the past 500 years: by the twentieth century Leslie Comrie and W.J. Eckert systematized the use of interpolation in tables of numbers for punch card calculation. == Weather
|
{"page_id": 386519, "title": "History of computing"}
|
original slab. Post-tensioning concrete has been developed for the runway surface. This permits the use of thinner pavements and should result in longer concrete pavement life. Because of the susceptibility of thinner pavements to frost heave, this process is generally applicable only where there is no appreciable frost action. === Pavement surface === Runway pavement surface is prepared and maintained to maximize friction for wheel braking. To minimize hydroplaning following heavy rain, the pavement surface is usually grooved so that the surface water film flows into the grooves and the peaks between grooves will still be in contact with the aircraft tyres. To maintain the macrotexturing built into the runway by the grooves, maintenance crews engage in airfield rubber removal or hydrocleaning in order to meet required FAA, or other aviation authority friction levels. === Pavement subsurface drainage and underdrains === Subsurface underdrains help provide extended life and excellent and reliable pavement performance. At the Hartsfield Atlanta, GA airport the underdrains usually consist of trenches 18 in (46 cm) wide and 48 in (120 cm) deep from the top of the pavement. A perforated plastic tube (5.9 in (15 cm) in diameter) is placed at the bottom of the ditch. The ditches are filled with gravel size crushed stone. Excessive moisture under a concrete pavement can cause pumping, cracking, and joint failure. === Surface type codes === In aviation charts, the surface type is usually abbreviated to a three-letter code. The most common hard surface types are asphalt and concrete. The most common soft surface types are grass and gravel. == Length == A runway of at least 1,800 m (5,900 ft) in length is usually adequate for aircraft weights below approximately 100,000 kg (220,000 lb). Larger aircraft including widebodies will usually require at least 2,400 m (7,900 ft) at
|
{"page_id": 165094, "title": "Runway"}
|
is limit computable if and only if the set is computable from 0 ′ {\displaystyle 0'} (the Turing jump of the empty set). The relativized limit lemma states that a set is limit computable in D {\displaystyle D} if and only if it is computable from D ′ {\displaystyle D'} . Moreover, the limit lemma (and its relativization) hold uniformly. Thus one can go from an index for the function r ^ ( x , s ) {\displaystyle {\hat {r}}(x,s)} to an index for r ^ ( x ) {\displaystyle {\hat {r}}(x)} relative to 0 ′ {\displaystyle 0'} . One can also go from an index for r ^ ( x ) {\displaystyle {\hat {r}}(x)} relative to 0 ′ {\displaystyle 0'} to an index for some r ^ ( x , s ) {\displaystyle {\hat {r}}(x,s)} that has limit r ^ ( x ) {\displaystyle {\hat {r}}(x)} . === Proof === As 0 ′ {\displaystyle 0'} is a [computably enumerable] set, it must be computable in the limit itself as the computable function can be defined r ^ ( x , s ) = { 1 if by stage s , x has been enumerated into 0 ′ 0 if not {\displaystyle \displaystyle {\hat {r}}(x,s)={\begin{cases}1&{\text{if by stage }}s,x{\text{ has been enumerated into }}0'\\0&{\text{if not}}\end{cases}}} whose limit r ( x ) {\displaystyle r(x)} as s {\displaystyle s} goes to infinity is the characteristic function of 0 ′ {\displaystyle 0'} . It therefore suffices to show that if limit computability is preserved by Turing reduction, as this will show that all sets computable from 0 ′ {\displaystyle 0'} are limit computable. Fix sets X , Y {\displaystyle X,Y} which are identified with their characteristic functions and a computable function X s {\displaystyle X_{s}} with limit X {\displaystyle X} . Suppose that Y
|
{"page_id": 3086963, "title": "Computation in the limit"}
|
a m b , Φ 20 := 1 2 R a b m ¯ a m ¯ b = Φ ¯ 02 , {\displaystyle \Phi _{02}:={\frac {1}{2}}R_{ab}m^{a}m^{b}\,,\quad \Phi _{20}:={\frac {1}{2}}R_{ab}{\bar {m}}^{a}{\bar {m}}^{b}={\overline {\Phi }}_{02}\,,} Φ 12 := 1 2 R a b m a n b , Φ 21 := 1 2 R a b m ¯ a n b = Φ ¯ 12 . {\displaystyle \Phi _{12}:={\frac {1}{2}}R_{ab}m^{a}n^{b}\,,\quad \;\Phi _{21}:={\frac {1}{2}}R_{ab}{\bar {m}}^{a}n^{b}={\overline {\Phi }}_{12}\,.} Remark I: In these definitions, R a b {\displaystyle R_{ab}} could be replaced by its trace-free part Q a b = R a b − 1 4 g a b R {\displaystyle Q_{ab}=R_{ab}-{\frac {1}{4}}g_{ab}R} or by the Einstein tensor G a b = R a b − 1 2 g a b R {\displaystyle G_{ab}=R_{ab}-{\frac {1}{2}}g_{ab}R} because of the normalization (i.e. inner product) relations that l a l a = n a n a = m a m a = m ¯ a m ¯ a = 0 , {\displaystyle l_{a}l^{a}=n_{a}n^{a}=m_{a}m^{a}={\bar {m}}_{a}{\bar {m}}^{a}=0\,,} l a m a = l a m ¯ a = n a m a = n a m ¯ a = 0 . {\displaystyle l_{a}m^{a}=l_{a}{\bar {m}}^{a}=n_{a}m^{a}=n_{a}{\bar {m}}^{a}=0\,.} Remark II: Specifically for electrovacuum, we have Λ = 0 {\displaystyle \Lambda =0} , thus 24 Λ = 0 = R a b g a b = R a b ( − 2 l a n b + 2 m a m ¯ b ) ⇒ R a b l a n b = R a b m a m ¯ b , {\displaystyle 24\Lambda \,=0=\,R_{ab}g^{ab}\,=\,R_{ab}{\Big (}-2l^{a}n^{b}+2m^{a}{\bar {m}}^{b}{\Big )}\;\Rightarrow \;R_{ab}l^{a}n^{b}\,=\,R_{ab}m^{a}{\bar {m}}^{b}\,,} and therefore Φ 11 {\displaystyle \Phi _{11}} is reduced to Φ 11 := 1 4 R a b ( l a n b + m a m ¯ b ) = 1 2
|
{"page_id": 36942251, "title": "Ricci scalars (Newman–Penrose formalism)"}
|
means when the gradient value is smaller, the current function value is getting closer to the optimal value. > > > (b) > > > follows from the (iii) by Cauchy-Schwartz inequality > > > (c) > > > Define a function $\phi_\mathbb x (\mathbb z) = f(\mathbb z) - \langle \nabla f(\mathbb x), \mathbb z \rangle$. FInd the minimizer of this function as > > > $\nabla \phi_\mathbb x(\mathbb z) = \nabla f(\mathbb z) - \nabla f(\mathbb x) = 0 \Longrightarrow \mathbb z^* = x$. Then, we can use the (a), have $\frac{1}{2 c}|\nabla f(\mathrm{y}) - \nabla f(\mathrm{x})|^{2} \geq f(\mathrm{y}) - \langle\nabla f(\mathbb x), \mathbb x - \mathbb y \rangle - f\left(\mathrm{x}\right)$ . > > > (d) > > > interchanging $\mathbb x$ and $\mathbb y$ in (c), we get > > $$ > > f(\mathrm{x}) \leq f(\mathrm{y})+\langle\nabla f(\mathrm{y}), \mathrm{x}-\mathrm{y}\rangle+\frac{1}{2 c}|\nabla f(\mathrm{x})-\nabla f(\mathrm{y})|^{2} > > $$ > > Combining the two inequalities, we can get (d). Q.E.D. []( "3.3 Unconstrained Programming")3.3 Unconstrained Programming ============================================================================================================================== []( "3.3.1 Unconstrained Convex Programming")3.3.1 Unconstrained Convex Programming --------------------------------------------------------------------------------------------------------------------------------------------------------- For a convex programming, a local minimizer is also a global minimizer. Suppose $\mathbb x^*$ is a stationary pointm i.e. $\nabla f(\mathbb x^*)=0$. For any $\mathbb y\in D$, we have $f(\mathbb y) \ge f(\mathbb x^*)+\nabla f(\mathbb x^*)^T(\mathbb y - \mathbb x^*) = f(\mathbb x^*)$. Hence, $\mathbb x^*$ us a global minimizer. []( "3.3.2 Unconstrained Convex Quadratic Programming")3.3.2 Unconstrained Convex Quadratic Programming --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Let $\mathbf Q$ be an $n\times n$ symmetric matrix and $\mathbf c \in \mathbb R^n$. The quadratic function $$ q(\mathbb{x})=\frac{1}{2} \mathbb{x}^T \mathbf{Q} \mathbb{x} + \mathbb{c}^T \mathbb{x} $$ is a convex function $\iff$ $\mathbf{Q}$ is positive semidefinite. ***global minimizer _\_\\_$\mathbb{x}^\\_$ $\iff$ $\mathbf{Q}\mathbb{x}^\_=-\mathbb{c}$. if $\mathbf{Q}^{-1}$ exists, $\mathbb{x}^_=-\mathbf{Q}^{-1}\mathbb{c}$. > ==Exercise:== How to prove it? > > > Show that > > $$ > > \inf_{\mathbb x\in \mathbb
|
{"source": 1167, "title": "from dpo"}
|
Rainone, Yang Yang, Harris Teague, Wonseok Jeon, Roberto Bondesan, Herke van Hoof, Christopher Lott, Weiliang Will Zeng, Piero Zappi_ !Image 1010 with focus on the memory minimization problem which arises in compilers. We propose an end-to-end machine learning based approach for topological ordering using an encoder-decoder framework. Our encoder is a novel attention based graph neural network architecture called \emph{Topoformer} which uses different topological transforms of a DAG for message passing. The node embeddings produced by the encoder are converted into node priorities which are used by the decoder to generate a probability distribution over topological orders. We train our model on a dataset of synthetically generated graphs called layered graphs. We show that our model outperforms, or is on-par, with several topological ordering baselines while being significantly faster on synthetic graphs with up to 2k nodes. We also train and test our model on a set of real-world computation graphs, showing performance improvements. _Peter Kocsis, Peter Súkeník, Guillem Braso, Matthias Nießner, Laura Leal-Taixé, Ismail Elezi_ **tl;dr:** Using final fully-connected layers helps the generalization of convolutional networks in low-data regimes.  working group is currently adding more features and functions to expand the usefulness of MCAPI for Version 2.x. The working group is working on interoperability and 'zero copy' functionality, including bidirectional interaction between 'application and application' using shared memory and bidirectional interaction between 'application and driver', which is being led by Sven Brehmer of PolyCore Software. The Virtualization working group will focus on defining and optimizing a set of paravirtualization information and functions to communicate with a Hypervisor. The working group will also focus on a system to categorize the various virtualization features and functionality including within multicore processors. This working group is chaired by Rajan Goyal of Cavium Networks and Surender Kumar of Nokia Networks. The Open Asymmetric Multi Processing (OpenAMP) working group will focus on standardizing the APIs, providing detailed documentation for the specification, and expanding the functionality of OpenAMP. This working group is chaired by Tomas Evensen of Xilinx. == OpenAMP == The OpenAMP Multicore Framework is an open source framework for developing asymmetric multi-processing (AMP) systems application software, similar to OpenMP for symmetric multi-processing systems. There are several implementations of OpenAMP Multicore Framework, each one intended to interoperate with all the other implementations over the OpenAMP API. One implementation of the Multicore Framework, originally developed for the Xilinx Zynq, has been open sourced under the OpenAMP open source project. Mentor Embedded Multicore Framework (MEMF) is a proprietary implementation of the OpenAMP standard. The OpenAMP API standard is managed under the umbrella
|
{"page_id": 18541342, "title": "Multicore Association"}
|
native Norwegian, sled dog breeder, musher and competitive racer. He was named after Samuel Balto, a Sámi who was part of Fridtjof Nansen's exploration of Greenland in 1888, and whom Seppala admired. No birth records were kept for Balto or his litter as his body type did not align with other racing huskies that Seppala was breeding. The only evidence of Balto's birth year came from later interviews with Seppala. With a largely black fur coat, Balto had a small, stocky build, unique for a Siberian husky. Believing Balto to be "second rate" and not holding much potential, Seppala neutered him at six months of age. He considered him a "scrub dog", unable to run as fast as his other dogs, who were derisively called "Siberian rats" by mushers against whom Seppala competed. Seppala claimed in his memoir to have "given [Balto] every chance" to ride with his primary sled dog team "but could not qualify"; thus, Balto was relegated to haul freight and large cargo for short runs and was part of a team that pulled railcars with miners over a disused railroad. Gunnar Kaasen, another native Norwegian and a close family friend of Seppala with 21 years' dog sledding experience, came to know Balto through his work at Seppala's mining company. Kaasen believed Seppala misjudged Balto's potential and that the dog's short stature could allow him to be more strong and steady. === The serum run === In January 1925, doctors realized that a potentially deadly diphtheria epidemic was poised to sweep through the young people of Nome, Alaska, placing the city under quarantine. Dr. Curtis Welch, the primary physician in Nome, transmitted via Morse code that the town's existing serum, which was over six years old, was being depleted. Additional serum was made available in Anchorage, but
|
{"page_id": 673530, "title": "Balto"}
|
Moumita Dutta is an Indian Physicist working at the Space Applications Centre (SAC), Indian Space Research Organisation (ISRO) - Ahmedabad, as a scientist/engineer. She has expertise in the development and testing of the Optical and IR sensors/instruments/payloads (i.e. cameras and imaging spectrometers). She was part of the team Mars Orbiter Mission (MOM) to put a probe into orbit around Mars in 2014. She contributed significantly in the development of one of the five payloads of MOM. == Life, education and career == Dutta was raised in Kolkata. She read about the Chandrayaan mission as a student and became interested in joining the Indian Space Research Organisation (ISRO) in 2004. Dutta's interest in physics, started in the ninth grade, led to her career as an engineer. Dutta currently works as a Project Manager for the Mars Mission. Dutta obtained her M Tech degree in Applied Physics from the Rajabazar Science College, University of Calcutta. She joined the Space Applications Centre, Ahmedabad in 2006. Since then she has been involved in many prestigious projects like Oceansat, Resourcesat, HySAT, Chandrayan I and Mars Orbiter Mission. She was chosen to work as Project Manager for the Methane Sensor for Mars and was given the responsibility for the development of the complete optical system, optimisation and characterisation and calibration of the sensor. Presently she is also leading a team in the indigenous development of optical instruments (i.e. imaging spectrometers) and working towards the realisation of the ‘Make in India’ concept. Her research area includes miniaturisation of gas sensors which involves state-of-the-art technologies in the field of optics. == Awards == She is a recipient of the ISRO Team of Excellence Award for the Mangalyaan. == Interests == Besides being a space scientist, she is interested in literature, creative writing, recitation and music. == References ==
|
{"page_id": 56927906, "title": "Moumita Dutta"}
|
were shown to be able to walk. This tradition was closely tied with the strict nervous system localizationism advocated during that period; since stimulation of the frog spinal cord in different places produced different movements, it was thought that all motor impulses were localized in the spinal cord. However, fixed structure and localizationism were slowly broken down as the central dogma of neuroscience. It is now known that the primary motor cortex and premotor cortex at the highest level are responsible for most voluntary movements. Animal models, though, remain relevant in motor control and spinal cord reflexes and central pattern generators are still a topic of study. === Bernstein === Although Lashley (1933) first formulated the motor equivalence problem, it was Bernstein who articulated the DOF problem in its current form. In Bernstein's formulation, the problem results from infinite redundancy, yet flexibility between movements; thus, the nervous system apparently must choose a particular motor solution every time it acts. In Bernstein's formulation, a single muscle never acts in isolation. Rather, large numbers of "nervous centres" cooperate in order to make a whole movement possible. Nervous impulses from different parts of the CNS may converge on the periphery in combination to produce a movement; however, there is great difficulty for scientists in understanding and coordinating the facts linking impulses to a movement. Bernstein's rational understanding of movement and prediction of motor learning via what we now call "plasticity" was revolutionary for his time. In Bernstein's view, movements must always reflect what is contained in the "central impulse", in one way or another. However, he recognized that effectors (feed-forward) were not the only important component to movement; feedback was also necessary. Thus, Bernstein was one of the first to understand movement as a closed circle of interaction between the nervous system and
|
{"page_id": 33820872, "title": "Degrees of freedom problem"}
|
used but are costly to manufacture. Sample geometries are thus chosen for ease of machining and optimization of the stress state when loaded. In addition to manufactured composites such as glass fiber-reinforced polymers, interlaminar shear strength is an important property in natural materials such as wood. The long, thin shape of floorboards, for example, may promote deformation that leads to vibrations. ==== Asymmetric four-point bending ==== Asymmetric four-point bending (AFPB) may be chosen to measure interlaminar shear strength over other procedures for a variety of reasons, including specimen machinability, test reproducibility, and equipment availability. For example, short-beam shear samples are constrained to a specific length-thickness ratio to prevent bending failure, and the shear stress distribution across the specimen is non-uniform, both of which contribute to a lack of reproducibility. Rail shear testing also produces a non-homogeneous shear stress state, making it appropriate for determining shear modulus, but not shear strength. The Iosipescu test requires special equipment in addition to the roller setup already used for other three- and four-point flexural tests. ASTM C1469 outlines a standard for AFPB testing of advanced ceramic joints, and the method has been proposed to be adapted for use with continuous ceramic matrix composites. Rectangular samples can be used with or without notches machined at the center; the addition of notches helps to control the position of the failure along the length of the sample, but improper or nonsymmetrical machining can result in the addition of undesired normal stresses which reduce the measured strength. The sample is then loaded in compression in its test fixture, with loading applied directly to the sample from 4 loading pins arranged in a parallelogram-like configuration. The load applied from the test fixture is transferred unevenly to the top two pins; the ratio of the inner pin load P {\displaystyle
|
{"page_id": 2128410, "title": "Delamination"}
|
Paratransgenesis is a technique that attempts to eliminate a pathogen from vector populations through transgenesis of a symbiont of the vector. The goal of this technique is to control vector-borne diseases. The first step is to identify proteins that prevent the vector species from transmitting the pathogen. The genes coding for these proteins are then introduced into the symbiont, so that they can be expressed in the vector. The final step in the strategy is to introduce these transgenic symbionts into vector populations in the wild. One use of this technique is to prevent mortality for humans from insect-borne diseases. Preventive methods and current controls against vector-borne diseases depend on insecticides, even though some mosquito breeds may be resistant to them. There are other ways to fully eliminate them. “Paratransgenesis focuses on utilizing genetically modified insect symbionts to express molecules within the vector that are deleterious to pathogens they transmit.” The acidic bacteria Asaia symbionts are beneficial in the normal development of mosquito larvae; however, it is unknown what Asais symbionts do to adult mosquitoes. The first example of this technique used Rhodnius prolixus which is associated with the symbiont Rhodococcus rhodnii. R. prolixus is an important insect vector of Chagas disease that is caused by Trypanosoma cruzi. The strategy was to engineer R. rhodnii to express proteins such as Cecropin A that are toxic to T. cruzi or that block the transmission of T. cruzi. Attempts are also made in Tse-tse flies using bacteria and in malaria mosquitoes using fungi, viruses, or bacteria. == Uses == Although the use of paratransgenesis can serve many different purposes, one of the main purposes is “breaking the disease cycle”. This study focuses on the experiments with tsetse flies and trypanosomes, which cause sleeping sickness in Subsaharan Africa. The tsetse fly’s transmission biology
|
{"page_id": 6877090, "title": "Paratransgenesis"}
|
principal ways to pay for mobile telephony: the 'pay-as-you-go' model where conversation time is purchased and added to a phone unit via an Internet account or in shops or ATMs, or the contract model where bills are paid by regular intervals after the service has been consumed. It is increasingly common for a consumer to purchase a basic package and then bolt-on services and functionality to create a subscription customised to the users needs. Pay as you go (also known as "pre-pay" or "prepaid") accounts were invented simultaneously in Portugal and Italy and today form more than half of all mobile phone subscriptions. USA, Canada, Costa Rica, Japan, Israel and Finland are among the rare countries left where most phones are still contract-based. === Incoming call charges === In the early days of mobile telephony, the operators (carriers) charged for all air time consumed by the mobile phone user, which included both outbound and inbound telephone calls. As mobile phone adoption rates increased, competition between operators meant that some decided not to charge for incoming calls in some markets (also called "calling party pays"). The European market adopted a calling party pays model throughout the GSM environment and soon various other GSM markets also started to emulate this model. In Hong Kong, Singapore, Canada, and the United States, it is common for the party receiving the call to be charged per minute, although a few carriers are beginning to offer unlimited received phone calls. This is called the "Receiving Party Pays" model. In China, it was reported that both of its two operators were to adopt the caller-pays approach as early as January 2007. One disadvantage of the receiving party pays systems is that phone owners keep their phones turned off to avoid receiving unwanted calls, which results in the
|
{"page_id": 1145887, "title": "Mobile telephony"}
|
Sustainable refurbishment describes working on existing buildings to improve their environmental performance using sustainable methods and materials. A refurbishment or retrofit is defined as: "any work to a building over and above maintenance to change its capacity, function or performance' in other words, any intervention to adjust, reuse, or upgrade a building to suit new conditions or requirements". Refurbishment can be done to a part of a building, an entire building, or a campus. Sustainable refurbishment takes this a step further to modify the existing building to perform better in terms of its environmental impact and its occupants' environment. Most sustainable refubrishments are also green retrofits: any refurbishment of an existing building that aims to reduce the carbon emissions and environmental impact of the building. This can include improving the energy efficiency of the HVAC and other mechanical systems, increasing the quality of insulation in the building envelope, implementing sustainable energy generation, and aiming to improve occupant comfort and health. Green retrofits have become increasingly prominent with their inclusion in a number of building rating systems, such as the USGBC's LEED for Existing Buildings: Operations & Maintenance, Passive House EnerPHit, and Green Globes for Existing Buildings. Some governments offer funding towards green retrofits as existing buildings make up a majority of operational buildings and have been identified as a growing area of consideration in the fight against climate change. == Overview == Sustainable refurbishment is the equivalent of sustainable development which relates to new developments of cities, buildings or industries etc. Sustainable refurbishment includes insulation and related measures to reduce the energy consumption of buildings, installation of renewable energy sources such as solar water heating and photovoltaics, measures to reduce water consumption, and changes to reduce overheating, improve ventilation and improve internal comfort. The process of sustainable refurbishment includes minimizing
|
{"page_id": 35004503, "title": "Sustainable refurbishment"}
|
sure to let his fervent admirers down from time to time. But judging from what I saw of him this morning, Nate is a grounded guy who admits as much in his book. I was too tough on him and there's a 84.398264% chance I will be less dismissive of his good work in the future." Silver's nondisclosure of the details of his analytical model has resulted in some skepticism. Washington Post journalist Ezra Klein wrote: "There are good criticisms to make of Silver's model, not the least of which is that, while Silver is almost tediously detailed about what's going on in the model, he won't give out the code, and without the code, we can't say with certainty how the model works." Colby Cosh wrote that the model "is proprietary and irreproducible. That last feature makes it unwise to use Silver's model as a straw stand-in for 'science', as if the model had been fully specified in a peer-reviewed journal". == Post-FiveThirtyEight career: since 2023 == After departing FiveThirtyEight amid widespread layoffs at Disney/ABC News in May 2023, Silver began publishing on his personal blog, Silver Bulletin. Silver retained the IP of 538's election forecasting model as he left, and in June 2024, released his own election forecasting model at Silver Bulletin, using methodology similar to his model at 538. In June 2024, Silver joined the prediction market startup Polymarket as an advisor. In August of the same year, Silver published his book On the Edge: The Art of Risking Everything, exploring how calculated risks can yield benefits in diverse fields, from finance and poker to effective altruism. In November 2024, Silver said of his income from Silver Bulletin, "It’s very good money, and definitely more than I was making working for a network." At that time his
|
{"page_id": 6731266, "title": "Nate Silver"}
|
Annette Vissing-Jørgensen is a Danish financial economist who holds the Arno A. Rayner Chair in Finance and Management in the Haas School of Business at the University of California, Berkeley. Topics in her research include monetary policy, household economics, and entrepreneurial finance. She was director of the American Finance Association for 2010 and 2012, of the European Finance Association for 2013, and of the Western Finance Association for 2017. == Education and career == Vissing-Jørgensen earned a bachelor's degree in economics in 1993 from Aarhus University, and a master's degree in 1994 from the University of Warwick. She completed her Ph.D. in 1998 at the Massachusetts Institute of Technology, with a dissertation on Limited Stock Market Participation. On completing her Ph.D. she joined the University of Chicago as an assistant professor in 1998. She moved to Northwestern University in 2002, and was given the Rayner Chair at the University of California, Berkeley in 2013. She has also held affiliations with the National Bureau of Economic Research since 2001 and the Copenhagen Business School since 2011. She chairs the scientific advisory board of the Norwegian Finance Initiative, and is an advisor to the Sveriges Riksbank. == Recognition == Vissing-Jørgensen was elected as a Fellow of the Econometric Society in 2016. She won the Rigmor and Carl Holst-Knudsen Award for Scientific Research in 2018. == References == == External links == Home page
|
{"page_id": 60247163, "title": "Annette Vissing-Jørgensen"}
|
utility, and industrial automation have adopted the platform as the basis for their product and service offerings. Statistics as to the number of locations using the LonWorks technology are scarce, but products and applications built on top of the platform include such diverse functions as embedded machine control, municipal and highway/tunnel/street lighting, heating and air conditioning systems, intelligent electricity metering, subway train control, building lighting, stadium lighting and speaker control, security systems, fire detection and suppression, and newborn location monitoring and alarming, as well as remote power generation load control. == Technical details == Two physical-layer signaling technologies, twisted pair free topology and power-line carrier, are typically included in each of the standards created around the LonWorks technology. The two-wire layer operates at 78 kbit/s using differential Manchester encoding, while the power line achieves either 5.4 or 3.6 kbit/s, depending on frequency. Additionally, the LonWorks platform uses an affiliated IP tunneling standard—ISO/IEC 14908-4 (ANSI/CEA-852)—in use by a number of manufacturers to connect the devices on previously deployed and new LonWorks platform-based networks to IP-aware applications or remote network-management tools. Many LonWorks platform-based control applications are being implemented with some sort of IP integration, either at the UI/application level or in the controls infrastructure. This is accomplished with Web services or IP-routing products available in the market. An Echelon Corporation-designed IC consisting of several 8-bit processors, the Neuron chip was initially the only way to implement a LonTalk protocol node and is used in the large majority of LonWorks platform-based hardware. Since 1999, the protocol has been available for general-purpose processors: A port of the ANSI/CEA-709.1 standard to IP-based or 32-bit chips. == Acquisitions == As of 14 September, 2018, Echelon Corporation was acquired by Adesto Technologies Corporation. Adesto was then acquired by Dialog Semiconductor who were then acquired by Renesas
|
{"page_id": 518133, "title": "LonWorks"}
|
mobile app's navigation and the checkout process in parallel to ensure a holistic improvement in the shopping experience. * **Choice-3:**Conduct separate design sprints for the navigation and checkout process to address each issue independently for quicker results. * **Choice-4:**Ignore the feedback related to the checkout process, as it might be too complex to address within the current project timeline. * **Choice-5:**Create a new checkout process without addressing the navigation concerns, as it's essential to improve the shopping experience promptly. **Correct Answer:**Choice-2: Revise both the mobile app's navigation and the checkout process in parallel to ensure a holistic improvement in the shopping experience. **Question 120** Design Thinking emphasizes the importance of iterative prototyping and testing. Let's consider a scenario: You are part of a Design Thinking team working on a project to create an innovative smart home device. After creating an initial prototype, you conduct user testing with several participants. The feedback reveals that users find the device's interface confusing, and some essential features are missing. What is the most appropriate action for your team to take at this point? * **Choice-1:**Disregard the feedback and proceed with the existing prototype, assuming users will adapt to the interface over time. * **Choice-2:**Revise the device's interface and add missing features based on the user feedback, then create a new prototype for further testing. * **Choice-3:**Continue testing with additional users to gather more data and see if the issues are consistent or isolated cases. * **Choice-4:**Simplify the device's interface even further, assuming that simplicity will address the user concerns without significant changes. * **Choice-5:**Implement a completely different design for the smart home device, as the current prototype seems too problematic to fix. **Correct Answer:**Choice-2: Revise the device's interface and add missing features based on the user feedback, then create a new prototype for further
|
{"source": 1709, "title": "from dpo"}
|
decades. A comparative analysis of different network architectures is presented to highlight their performance in this context. We then delve into the application of RL algorithms to exceptionally demanding tasks, such as those posed by the Millennium Prize problems and the smooth Poincaré conjecture in four dimensions. Drawing on our experiences, we discuss the prerequisites for developing new RL algorithms and architectures that are tailored to these high-level challenges. (Received September 10, 2024) 1203-90-44718 Emma Rose Sandidge* , Van Minh Nguyen , Trupti Mahendrakar , Ryan T White . #122 Satellite Feature Identification Using 3D Gaussian Splatting-Based Object Detection Ensembles. As the numbers of spacecraft in orbit increase, tasks such as on-orbit servicing (OOS), active debris removal (ADR), and satellite inspections have gained interest in order to repair or remove non-cooperative resident space objects. These operations require precise characterization of the target geometry. Since manned missions exhibit safety concerns and ground-based control introduces lag times, the ability for autonomous operation is needed. This presentation shares a recent method for mapping satellite geometries and high-confidence detection of satellite components from an unknown, non-cooperative spacecraft. We learn a 3D representation of the target using 3D Gaussian splatting to render virtual views, which exhibits rendering capabilities of nearly two orders of magnitude faster than other NeRF-based methods. We ensemble the YOLOv5 object detection model over these virtual views, which results in accurate and precise detections of the major components of the target satellite. The entire pipeline is capable of training and running on-board a spacecraft to enable future progress for tasks related to autonomous navigation and inspection. (Received September 10, 2024) 1203-90-46440 Jessica Nyitrai* . #107 A Statistical Learning Model for Risk Management of Remote Work. The COVID-19 pandemic prompted a widespread shift to remote work for many companies, revealing significant gaps in
|
{"source": 3883, "title": "from dpo"}
|
for quantum cryptography.” Electronics Letters ,43 (9), L1217–L1219. C. Kurtsiefer, P. Zarda, M. Halder, H. Weinfurter, P.M. Gorman, P.R. Tapster, and J.G. Rarity (2002). “Quantum cryptography: A step towards global key distribution.” Nature , 419, 450. Lo, H.-K., and H.F. Chau (1997). “Is quan-tum bit commitment really possible?” Physical Review Letters , 78 (17), 3410–3413. Originally Lo, H.-K., and H.F. Chau (1998). “Why quantum bit commitment and ideal quantum coin tossing are impossible.” Physica D, 120, 177–187. Mayers, D. (1995). “The trouble with quan-tum bit commitment.” The author first discussed the result in Montr´ eal at a workshop on quantum informa-tion theory held in October 1995. Mayers, D. (1997). “Unconditionally secure quan-tum bit commitment is impossible.” Physical Re-view Letters , 78 (17), 3414–3417. Mayers, D. (2001). “Unconditional security in quantum cryptography.” J. ACM , 48 (3), 351–406. Ouellette, J. (2005). “Quantum key distribution.” The Industrial Physicist , 10 (6), 22–25. Rabin, M. (1981). “How to exchange secrets by oblivious transfer.” Technical Report TR-81, Harvard Aiken Computation Laboratory. Rarity, J.G., P.R. Tapster, P.M. Gorman, and P. Knight (2002). “Ground to satellite secure key exchange using quantum cryptography.” New Jour-nal of Physics , 4, 82.1–82.21. Shor, P.W., and J. Preskill (2000). “Simple proof of security of BB84 quantum key distribution proto-col.” Phys. Rev. Lett. , 85, 441–444. Stix, G. (2005). “Best-kept secrets—quantum cryp-tography has marched from theory to laboratory 500 Quantum cryptography to real products.” Scientific American , 280 (1), 78–83. Stucki, D., N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden (2002). “Quantum key distribution over 67 km with a plug & play system.” New Journal of Physics , 4, 41.1–41.8. Townsend, P., J. Rarity, and P. Tapster (1993). “Sin-gle photon interference in 10 km long
|
{"source": 5836, "title": "from dpo"}
|
retain some emphasis on the microbe since at some point this "question-driven" microbial population biology becomes instead population biology using microorganisms. Because the point of departure of these potentially disparate emphases can be somewhat arbitrary, there exist vague and not universally accepted delimits around what the discipline of microbial population biology does and does not constitute. == Microbial Population Biology Gordon conference == A Microbial Population Biology Gordon Research Conference is held every odd year, to date in New England (and usually in New Hampshire). The 2007 conference web page introduces the meetings as: Microbial Population Biology covers a diverse range of cutting edge issues in the microbial sciences and beyond. Firmly founded in evolutionary biology and with a strongly integrative approach, past meetings have covered topics ranging from the dynamics and genetics of adaptation to the evolution of mutation rate, community ecology, evolutionary genomics, altruism, and epidemiology. This meeting is never dull: some of the most significant and contentious issues in biology have been thrashed out here. A history of the meeting can be found here. The next Microbial Population Biology Gordon conference is scheduled for 2025. Information on past (and future) meetings is summarized as follows: == See also == Microbial cooperation Microbial consortium Microbial food web Microbial intelligence Microbial loop == External links == Microbial Population Biology Phage meetings Human microbiome project
|
{"page_id": 7538436, "title": "Microbial population biology"}
|
ILs (called an IL-Library) is the use of chromosome segments from Solanum pennellii (a wild species of tomato) that was introgressed into Solanum lycopersicum (the cultivated tomato). The lines of an IL-library usually cover the complete genome of the donor. Introgression lines allow the study of quantitative trait loci, but also the creation of new varieties by introducing exotic traits. == Lineage fusion == Lineage fusion is an extreme variant of introgression that results from the merging of two distinct species or populations. This eventually results in a single population that displaces or replaces the parental species in the region. Some lineage fusion occurs soon after two taxa diverge or speciate, especially if there are few reproductive barriers between lineages. It is not strictly necessary for the two lineages to be closely related, but rather have the ability to produce viable offspring. == See also == Chimera (genetics) Genetic engineering Genetic erosion Genetic pollution Transgene Transgenic plant == References == == Further reading == Arnold, M. L. (2007). Evolution through Genetic Exchange. New York: Oxford University Press. ISBN 978-0-19-922903-1. Anderson, E. (1949). Introgressive Hybridization. New York: Wiley. Décobert, O. (2017). Complément à l’inventaire des Carabini du Midi toulousain (Coleoptera, Carabidae) - Carnets natures, 2017, vol. 4 : 33–38 (ISSN 2427-6111) https://carnetsnatures.fr/volume4/carabidae-decobert.pdf Eyal Friedman; et al. (2004). "Zooming In on a Quantitative Trait for Tomato Yield Using Interspecific Introgressions". Science. 305 (5691): 1786–1798. Bibcode:2004Sci...305.1786F. doi:10.1126/science.1101666. PMID 15375271. S2CID 24142071. Rieseberg, L. H.; Wendel, J. F. (1993). "Introgression and its consequences in plants". In Harrison, R. G. (ed.). Hybrid Zones and Evolutionary Process. New York: Oxford University Press. pp. 70–109. ISBN 978-0-19-506917-4. Martinsen G. D.; Whitham R. J. Turek; Keim P. (2001). "Hybrid populations selectively filter gene introgression between species". Evolution. 55 (7): 1325–1335. doi:10.1554/0014-3820(2001)055[1325:hpsfgi]2.0.co;2. PMID 11525457. Whitney, K.D., Ahern J.R., Campbell
|
{"page_id": 3636055, "title": "Introgression"}
|
and in the opposite direction during exhalation. During each inhalation, at rest, approximately 500 ml of fresh air flows in through the nose. It is warmed and moistened as it flows through the nose and pharynx. By the time it reaches the trachea the inhaled air's temperature is 37 °C and it is saturated with water vapor. On arrival in the alveoli it is diluted and thoroughly mixed with the approximately 2.5–3.0 liters of air that remained in the alveoli after the last exhalation. This relatively large volume of air that is semi-permanently present in the alveoli throughout the breathing cycle is known as the functional residual capacity (FRC). At the beginning of inhalation the airways are filled with unchanged alveolar air, left over from the last exhalation. This is the dead space volume, which is usually about 150 ml. It is the first air to re-enter the alveoli during inhalation. Only after the dead space air has returned to the alveoli does the remainder of the tidal volume (500 ml - 150 ml = 350 ml) enter the alveoli. The entry of such a small volume of fresh air with each inhalation, ensures that the composition of the FRC hardly changes during the breathing cycle (Fig. 5). The alveolar partial pressure of oxygen remains very close to 13–14 kPa (100 mmHg), and the partial pressure of carbon dioxide varies minimally around 5.3 kPa (40 mmHg) throughout the breathing cycle (of inhalation and exhalation). The corresponding partial pressures of oxygen and carbon dioxide in the ambient (dry) air at sea level are 21 kPa (160 mmHg) and 0.04 kPa (0.3 mmHg) respectively. This alveolar air, which constitutes the FRC, completely surrounds the blood in the alveolar capillaries (Fig. 6). Gas exchange in mammals occurs between this alveolar air (which differs
|
{"page_id": 379303, "title": "Gas exchange"}
|
Apparent motion of the Sun === Before Hipparchus, Meton, Euctemon, and their pupils at Athens had made a solstice observation (i.e., timed the moment of the summer solstice) on 27 June 432 BC (proleptic Julian calendar). Aristarchus of Samos is said to have done so in 280 BC, and Hipparchus also had an observation by Archimedes. He observed the summer solstices in 146 and 135 BC both accurately to a few hours, but observations of the moment of equinox were simpler, and he made twenty during his lifetime. Ptolemy gives an extensive discussion of Hipparchus's work on the length of the year in the Almagest III.1, and quotes many observations that Hipparchus made or used, spanning 162–128 BC, including an equinox timing by Hipparchus (at 24 March 146 BC at dawn) that differs by 5 hours from the observation made on Alexandria's large public equatorial ring that same day (at 1 hour before noon). Ptolemy claims his solar observations were on a transit instrument set in the meridian. At the end of his career, Hipparchus wrote a book entitled Peri eniausíou megéthous ("On the Length of the Year") regarding his results. The established value for the tropical year, introduced by Callippus in or before 330 BC was 365+1⁄4 days. Speculating a Babylonian origin for the Callippic year is difficult to defend, since Babylon did not observe solstices thus the only extant System B year length was based on Greek solstices (see below). Hipparchus's equinox observations gave varying results, but he points out (quoted in Almagest III.1(H195)) that the observation errors by him and his predecessors may have been as large as 1⁄4 day. He used old solstice observations and determined a difference of approximately one day in approximately 300 years. So he set the length of the tropical year to
|
{"page_id": 13600, "title": "Hipparchus"}
|
Plastic bending is a nonlinear behavior particular to members made of ductile materials that frequently achieve much greater ultimate bending strength than indicated by a linear elastic bending analysis. In both the plastic and elastic bending analyses of a straight beam, it is assumed that the strain distribution is linear about the neutral axis (plane sections remain plane). In an elastic analysis this assumption leads to a linear stress distribution but in a plastic analysis the resulting stress distribution is nonlinear and is dependent on the beam's material. The limiting plastic bending strength M r {\displaystyle M_{r}} (see Plastic moment) can generally be thought of as an upper limit to a beam's load–carrying capability as it only represents the strength at a particular cross–section and not the load–carrying capability of the overall beam. A beam may fail due to global or local instability before M r {\displaystyle M_{r}} is reached at any point on its length. Therefore, beams should also be checked for local buckling, local crippling, and global lateral–torsional buckling modes of failure. Note that the deflections necessary to develop the stresses indicated in a plastic analysis are generally excessive, frequently to the point of incompatibility with the function of the structure. Therefore, separate analysis may be required to ensure design deflection limits are not exceeded. Also, since working materials into the plastic range can lead to permanent deformation of the structure, additional analyses may be required at limit load to ensure no detrimental permanent deformations occur. The large deflections and stiffness changes usually associated with plastic bending can significantly change the internal load distribution, particularly in statically indeterminate beams. The internal load distribution associated with the deformed shape and stiffness should be used for calculations. Plastic bending begins when an applied moment causes the outside fibers of a
|
{"page_id": 3973669, "title": "Plastic bending"}
|
Robert Shapley is an American neurophysiologist, the Natalie Clews Spencer Professor of the Sciences at New York University, a professor in the Center for Neural Science and an associate member of the Courant Institute of Mathematical Sciences. Shapley received an A.B. Degree from Harvard College (1965) and a Ph.D. from Rockefeller University (1970). With a Helen Hay Whitney Postdoctoral Fellowship, he went to Northwestern University and the University of Cambridge. He served on the US National Research Council's Committee on Vision. He graduated from Harvard University, and from Rockefeller University with a PhD in neurophysiology and biophysics. In 1986 he received a MacArthur Foundation Prize Fellowship from the MacArthur Fellows Program. == Academic work == Among Shapley's findings were his discoveries about the X and Y retinal ganglion cells in the cat retina. He discovered that the Y cell collected excitatory signals from many small spatial mechanisms called "nonlinear subunits" and that there was a contrast gain control, a nonlinear feedback within the retina that adjusted the signal-transfer properties of the retina contingent on the space-averaged stimulus contrast. He also worked with the visual system of macaque monkeys, and found: its parallel processing of visual signals; the nature of retinal computation of color; and that the orientation-selectivity of neurons in the primary visual cortex, or V1, of evolves with time. Other findings that have elucidated the workings of V1 include the following: V1 cells are tuned for color and for spatial pattern; fluctuations in the local field potential in V1 appear to be caused by noise and have no autocoherence or phase-memory over time; and there is not a single fixed cortical receptive field for each neuron. More recently, he has been studying how color is represented in the visual cortex, as a follow-up to his earlier work on parallel
|
{"page_id": 26811906, "title": "Robert Shapley"}
|
at Chile's La Silla Observatory. CORALIE provided radial velocity measurements that indicated that WASP-43 was being transited by a planet that was 1.8 times Jupiter's mass, now dubbed WASP-43b. Another follow-up using the TRAPPIST telescope further defined the light curve of the body transiting WASP-43. WASP-43b's discovery was reported on April 15, 2011 in the journal Astronomy and Astrophysics. == Characteristics == WASP-43 is a K-type star with a mass that is 0.72 times that of the Sun, and a radius that is 0.67 times that of the Sun. With an effective temperature of 4400 K, WASP-43 is cooler than the Sun. It also has slightly lower quantities of iron than the Sun, with a measured metallicity of [Fe/H] = -0.05 (89% of that measured in the Sun). However, in general, the star has a slightly larger quantity of metals than the Sun. A notable exception is lithium, which is not present in WASP-43's spectrum. However, the star's spectrum also indicates that WASP-43 is an active star. WASP-43 has been found to rotate quickly, although the exact mechanism that causes such speed in this rotation is uncertain, it may be possible that this is caused by tidal interactions between WASP-43 and its planet. With an apparent magnitude of 12.4, WASP-43 cannot be seen with the unaided eye. The star is located approximately 80 parsecs (260 light years) away from Earth. == Planetary system == WASP-43b is a Hot Jupiter with a mass that is 1.78 times the mass of Jupiter and a radius that is 0.93 times Jupiter's radius. WASP-43b orbits its host star every 0.813475 days (19.5234 hours) at a distance of 0.0142 AU, the closest orbit yet found at the time of WASP-43b's discovery. WASP-43's unusually low mass accounts for WASP-43b's small orbit. Because planets with orbits around
|
{"page_id": 31830485, "title": "WASP-43"}
|
patent, other manufacturers developed new hitching systems to try to fend off some of Ferguson's competitive advantage. For example, International Harvester's Farmall tractors gained a two-point "Fast Hitch", and John Deere had a power lift that was somewhat similar to the more flexible Ferguson invention. Once the patent protection expired on the three-point hitch, it became an industry standard. Almost every tractor today features Ferguson's three-point linkage or a derivative of it. This hitch allows for easy attachment and detachment of implements while allowing the implement to function as a part of the tractor, almost as if it were attached by a fixed mount. Previously, when the implement hit an obstacle, the towing link broke or the tractor flipped over. Ferguson's idea was to combine a connection via two lower and one upper lift arms that were connected to a hydraulic lifting ram. The ram was, in turn, connected to the upper of the three links so the increased drag (as when a plough hits a rock) caused the hydraulics to lift the implement until the obstacle was passed. Recently, Bobcat's patent on its front loader connection (inspired by these earlier systems) has expired, and compact tractors are now being outfitted with quick-connect attachments for their front-end loaders. === Power take-off systems and hydraulics === In addition to towing an implement or supplying tractive power through the wheels, most tractors have a means to transfer power to another machine such as a baler, swather, or mower. Unless it functions solely by pulling it through or over the ground, a towed implement needs its own power source (such as a baler or combine with a separate engine) or else a means of transmitting power from the tractor to the mechanical operations of the equipment. Early tractors used belts or cables wrapped
|
{"page_id": 152692, "title": "Tractor"}
|
than under-engineered and an oil filter was fitted), slightly de-tuned and given a version of the competition frame. For these reasons, these bikes can make very good buying, and are often used as the basis for competition machines. Several minor changes were made to the C15 in 7 years (with some variations on the theme - the "warmer" SS80 and SS90, plus competition versions). In 1967 the model underwent some revisions and a name change to B25. The model then continued with little variation until BSA collapsed in the early 1970s. The BSA unit single was an affordable introduction to motorcycling for many young men in the 1960s and 1970s. The simple design meant that inexperienced and under-equipped home mechanics could keep them running under most circumstances. The effects of such inexperienced maintenance led to a slightly undeserved reputation for unreliability - a well maintained and regularly serviced unit single will chug along for a very long time with no problems. The warmer versions (such as the much-loved Starfire) were generally less robust, but their light weight, enjoyable handling and peppy engines meant that many people considered the hours of necessary maintenance a worthwhile trade-off. Many BSA unit singles were built, meaning there are few 1960s motorcycles with such a large supply of readily available spares. The tunability and ready supply of these motors, combined with their compact and light(ish) construction has also made them a popular choice for modern "Classic" competition. The BSA design was based on the Triumph Tiger Cub, first produced in 1952. The continuation of the model until 1973 speaks well for the popularity and utility of this design, but also reflects badly on the forward-thinking and investment of the BSA management. By 1967 unit singles were looking slow and rattly and the "charm" of the
|
{"page_id": 5958446, "title": "Unit construction"}
|
be easier to manage. Tuning is simplified compared to a multi-stage TRF design, and only two stages need to track over the tuning range. The total amplification of the receiver is divided between three amplifiers at different frequencies; the RF, IF, and audio amplifier. This reduces problems with feedback and parasitic oscillations that are encountered in receivers where most of the amplifier stages operate at the same frequency, as in the TRF receiver. The most important advantage is that better selectivity can be achieved by doing the filtering at the lower intermediate frequency. One of the most important parameters of a receiver is its bandwidth, the band of frequencies it accepts. In order to reject nearby interfering stations or noise, a narrow bandwidth is required. In all known filtering techniques, the bandwidth of the filter increases in proportion with the frequency, so by performing the filtering at the lower f IF {\displaystyle f_{\text{IF}}} , rather than the frequency of the original radio signal f RF {\displaystyle f_{\text{RF}}} , a narrower bandwidth can be achieved. Modern FM and television broadcasting, cellphones and other communications services, with their narrow channel widths, would be impossible without the superheterodyne. == History == Television receive-only == See also == Batteryless radio Dielectric wireless receiver Digital Audio Broadcast (DAB) Direct conversion receiver Distortion List of radios – List of specific models of radios Minimum detectable signal Radio transmitter design Radio receiver design Radiogram (furniture) Receiver (information theory) Telecommunication Tuner (radio) == References == == Further reading == Communications Receivers, Third Edition, Ulrich L. Rohde, Jerry Whitaker, McGraw Hill, New York, 2001, ISBN 0-07-136121-9 Buga, N.; Falko A.; Chistyakov N.I. (1990). Chistyakov N.I. (ed.). Radio Receiver Theory. Translated from the Russian by Boris V. Kuznetsov. Moscow: Mir Publishers. ISBN 978-5-03-001321-3First published in Russian as «Радиоприёмные устройства»{{cite book}}:
|
{"page_id": 491851, "title": "Radio receiver"}
|
such that \((a, xz) \in I\). Then _ybzxa_ is a cyclic permutation of _w_ that is not reduced. On the free monoid \(\Gamma ^*\) we can define an involution \((\cdot )^{-1}\) by \((a_1 a_2 \cdots a_n)^{-1} = a_n^{-1} \cdots a_2^{-1} a_1^{-1}\), where \(a_i^{-1}\) is the inverse of \(a_i\) in the group \(G_{{{\,\textrm{alph}\,}}(a_i)}\). Note that \(u =_M v\) implies \(u^{-1} =_M v^{-1}\). Therefore, we obtain a well-defined involution \((\cdot )^{-1}\) on _M_. Moreover, \(u^{-1}\) indeed represents the inverse of _u_ in the group _G_. The counterpart of the rewriting system \(S_{\textrm{free}}\) for graph products is the trace rewriting system $$\begin{aligned} T= \{ a b \rightarrow [ab]~\big \vert ~a,b \in \Gamma , {{\,\textrm{alph}\,}}(a) = {{\,\textrm{alph}\,}}(b)\}. \end{aligned}$$ (2) Note that \(G = M / T\) and that \({{\,\textrm{IRR}\,}}(T)\) is the set of reduced traces. Moreover, _T_ is terminating and confluent; the latter is shown in [36, 307–340 (2006). "), Lemma 6.1]. The following lemma can be found in [28 automorphism groups. Internat. J. Algebra Comput. 22(08), 218–230 (2012). "), Lemma 24]. ### Lemma 13 Let \(u, v \in \Gamma ^*\). If \(u =_M v\), then also \( u =_G v\). Moreover, if _u_ and _v_ are reduced, then \(u =_M v \) if and only if \(u =_G v\). The following commutative diagram summarizes the mappings between the sets introduced in this section (\(\hookrightarrow \hspace{-8pt}\rightarrow \) indicates a bijection): !Image 6 The embedding \(M(\Gamma ,I)\hookrightarrow G(\Gamma ,I)\) is induced by the embedding \(M(\Gamma ,I)\hookrightarrow M(\Gamma \cup \overline{\Gamma },I)\) composed with the projection \(M(\Gamma \cup \overline{\Gamma },I) \twoheadrightarrow G(\Gamma ,I)\) from Section [2.6.4]( Note that, in the trace monoid
|
{"source": 961, "title": "from dpo"}
|
SGX enables hardware-enforced isolation and attestation of security-critical code in enclaves , embedded in the virtual address space of a conventional OS process. Legacy page tables are left under explicit control of the untrusted OS, but the processor’s Memory Management Unit ( MMU ) enforces that enclave-private memory can never be directly accessed from outside. Hardware-level cryptography furthermore allows the untrusted OS to initialize enclaves, and swap in/out protected pages to untrusted storage. Enclave code is restricted to user mode, and has access to all its protected pages, as well as to the unprotected part of the application’s address space. Dedicated CPU instructions switch the processor in or out of enclave mode . The eenter instruction transfers control from the unprotected application context to a predetermined location inside the enclave, and eexit can be used to exit an > 1 104 SGX-STEP: A PRACTICAL ATTACK FRAMEWORK FOR PRECISE ENCLAVE EXECUTION enclave programmatically. Alternatively, in case of a fault or external interrupt, the processor executes an Asynchronous Enclave Exit ( AEX ) procedure that saves the execution context securely in a preallocated State Save Area ( SSA )inside the enclave, and replaces the CPU registers with a synthetic state to avoid direct information leakage to the untrusted Interrupt Service Routine ( ISR ). The AEX procedure also takes care of pushing a predetermined Asynchronous Exit Pointer ( AEP ) on the unprotected call stack, so as to allow the OS interrupt handler to return transparently to unprotected trampoline code outside the enclave. From this point, an interrupted enclave can be continued by means of the eresume instruction. To aid enclave development, SGX differentiates between debug and production enclaves, where private memory of the former is accessible from outside via special ring-0 edbgrd and edbgwr instructions. Debug operations are ignored for production
|
{"source": 2328, "title": "from dpo"}
|
legal, responsible banking, investor relations, risk and other teams. → Implementing proactive measures to support companies’ green transition and decarbonization. → Continue driving cooperation between the reputational risk area and other teams to address reputational impact. → Conduct a materiality assessment to measure climate-related and environmental reputational risk. → Implement a methodology to quantify the reputational impact of climate and environmental risk. Strategic Short - → A failure to achieve our climate and medium - environmental targets, including those long term relating to our own and our customers’ operations, could affect our strategy. → Checking that ESG targets are embedded in the Group’s strategic planning. → Monitoring the Group’s strategic 'Climate change' project, including net zero KPIs. → Identifying emerging risks, which includes an ESG risk event and analysis of how low-probability stress scenarios might impact on the Group’s strategic targets to draw up suitable action plans. → Monitoring ESG initiatives presented at the corporate product governance forum (CGPF) and investors’ forum. → Reviewing ESG factors and KPIs in the business model. → Continue monitoring climate and environmental threats as part of emerging risk identification. → Revise ESG KPIs regularly so that they remain consistent with the Group’s strategy. → Continue reviewing ESG factors in relation to business model performance. 1. Though all climate drivers impact on risk factors, we have only included the key ones in this table. 2. Short term: up to one year. Medium term: up to three years. Long term: five years and beyond. 3. E&CC: environmental and climate change. Acute Chronic Market sentiment Policy action Technology 509 2023 Annual report Contents Business model and strategy > Responsible banking > Corporate governance > Economic and financial review > Risk ,compliance &conduct management # 10.2 ESG factors risk management As part of our climate and environmental risk
|
{"source": 4951, "title": "from dpo"}
|
the application appear in the linear algebra subproblem; hence the matrix represented can be of lower order than the first parameter, described as the "number of variables_ (NROW)". _The finite element variables are numbered from 1 to_ NROW, _but only the subset of variables that actually appear in the list of variables for the elements define the rows and columns of the matrix. The actual order of the square matrix cannot be determined until all of the indices are read._ The three character type field on line 3 describes the matrix type. The following table lists the permitted values for each of the three characters. As an example of the type field, RSA denotes that the matrix is real, symmetric, and assembled. **First Character:** R Real matrix C Complex matrix P Pattern only (no numerical values supplied) **Second Character:** S Symmetric U Unsymmetric H Hermitian Z Skew symmetric R Rectangular **Third Character:** A Assembled E Elemental matrices (unassembled) ### Example Fortran Code for Reading Harwell-Boeing Files To formalize the logical block structure of the data, we have included two pieces of sample FORTRAN code for reading a matrix in the format of the sparse matrix test collection. Both codes assume the data comes from input unit LUNIT. Neither is a complete code. Real code should include error checking to ensure that the target arrays into which the data are read are large enough. The design allows the arrays to be read by a separate subroutine that can avoid the use of possibly inefficient implicit DO-loops. * [First sample fortran code]( : the standard case, a sparse matrix in standard format with no right-hand sides. * [Second sample fortran code]( : illustrates the full generality of the representation. The code above outlines the structure of the data. The interpretation of the
|
{"source": 1472, "title": "from dpo"}
|
Karyogamy is the final step in the process of fusing together two haploid eukaryotic cells, and refers specifically to the fusion of the two nuclei. Before karyogamy, each haploid cell has one complete copy of the organism's genome. In order for karyogamy to occur, the cell membrane and cytoplasm of each cell must fuse with the other in a process known as plasmogamy. Once within the joined cell membrane, the nuclei are referred to as pronuclei. Once the cell membranes, cytoplasm, and pronuclei fuse, the resulting single cell is diploid, containing two copies of the genome. This diploid cell, called a zygote or zygospore can then enter meiosis (a process of chromosome duplication, recombination, and division, to produce four new haploid cells), or continue to divide by mitosis. Mammalian fertilization uses a comparable process to combine haploid sperm and egg cells (gametes) to create a diploid fertilized egg. The term karyogamy comes from the Greek karyo- (from κάρυον karyon) 'nut' and γάμος gamos 'marriage'. == Importance in haploid organisms == Haploid organisms such as fungi, yeast, and algae can have complex cell cycles, in which the choice between sexual or asexual reproduction is fluid, and often influenced by the environment. Some organisms, in addition to their usual haploid state, can also exist as diploid for a short time, allowing genetic recombination to occur. Karyogamy can occur within either mode of reproduction: during the sexual cycle or in somatic (non-reproductive) cells. Thus, karyogamy is the key step in bringing together two sets of different genetic material which can recombine during meiosis. In haploid organisms that lack sexual cycles, karyogamy can also be an important source of genetic variation during the process of forming somatic diploid cells. Formation of somatic diploids circumvents the process of gamete formation during the sexual reproduction cycle
|
{"page_id": 599709, "title": "Karyogamy"}
|
A gamma ray cross section is a measure of the probability that a gamma ray interacts with matter. The total cross section of gamma ray interactions is composed of several independent processes: photoelectric effect, Compton (incoherent) scattering, electron-positron pair production in the nucleus field and electron-positron pair production in the electron field (triplet production). The cross section for single process listed above is a part of the total gamma ray cross section. Other effects, like the photonuclear absorption, Thomson or Rayleigh (coherent) scattering can be omitted because of their nonsignificant contribution in the gamma ray range of energies. The detailed equations for cross sections (barn/atom) of all mentioned effects connected with gamma ray interaction with matter are listed below. == Photoelectric effect cross section == The photoelectric effect phenomenon describes the interaction of a gamma photon with an electron located in the atomic structure. This results in the ejection of that electron from the atom. The photoelectric effect is the dominant energy transfer mechanism for X-ray and gamma ray photons with energies below 50 keV. It is much less important at higher energies, but still needs to be taken into consideration. Usually, the cross section of the photoeffect can be approximated by the simplified equation of σ p h = 16 3 2 π r e 2 α 4 Z 5 k 3.5 ≈ 5 ⋅ 10 11 Z 5 E γ 3.5 b {\displaystyle \sigma _{ph}={\frac {16}{3}}{\sqrt {2}}\pi r_{e}^{2}\alpha ^{4}{\frac {Z^{5}}{k^{3.5}}}\approx 5\cdot 10^{11}{\frac {Z^{5}}{E_{\gamma }^{3.5}}}\,\mathrm {b} } where k = Eγ / Ee, and where Eγ = hν is the photon energy given in eV and Ee = me c2 ≈ 5,11∙105 eV is the electron rest mass energy, Z is an atomic number of the absorber's element, α = e2/(ħc) ≈ 1/137 is the fine structure constant, and
|
{"page_id": 66946224, "title": "Gamma ray cross section"}
|
Dennis Brown is a renal physiologist. He is Professor of Medicine at Harvard Medical School, director of the Program in Membrane Biology at the Massachusetts General Hospital (MGH), and Associate Director of the MGH Center for Systems Biology. He is a member of the MGH Executive Committee on Research (ECOR), the central body for research governance at MGH. == Early life and education == Brown was born in Grimsby, England and attended Wintringham Grammar School. He earned an undergraduate degree in biological sciences and PhD degree from the University of East Anglia. His dissertation supervisor was Michael Balls. == Career == Brown was awarded the Carl W. Gottschalk Distinguished Lectureship in 1999, and the Hugh Davson award for Cell Biology in 2011, both from the American Physiological Society. In 2017-2018, Brown served as the 90th President, and is the current Chief Scientific Officer, of the American Physiological Society. From 2002-2008, Brown served as editor-in-chief of the American Journal of Physiology. Cell Physiology. From 2009-2017, he served as editor-in-chief of Physiological Reviews. He was elected to the Academy of Europe in 2017. Brown was awarded the A. Clifford Barger Excellence in Mentoring award from Harvard University in 2005 and the Harvard Medical School Dean’s Award for the Advancement of Women in Science in 2012. == References == == External links == Dennis Brown publications indexed by Google Scholar
|
{"page_id": 21752964, "title": "Dennis Brown (academic)"}
|
N = 1,000 samples per symbol. If no guard interval was applied, this would result in a base band complex valued signal with a sample rate of 1 MHz, which would require a baseband bandwidth of 0.5 MHz according to Nyquist. However, the passband RF signal is produced by multiplying the baseband signal with a carrier waveform (i.e., double-sideband quadrature amplitude-modulation) resulting in a passband bandwidth of 1 MHz. A single-side band (SSB) or vestigial sideband (VSB) modulation scheme would achieve almost half that bandwidth for the same symbol rate (i.e., twice as high spectral efficiency for the same symbol alphabet length). It is however more sensitive to multipath interference. OFDM requires very accurate frequency synchronization between the receiver and the transmitter; with frequency deviation the subcarriers will no longer be orthogonal, causing inter-carrier interference (ICI) (i.e., cross-talk between the subcarriers). Frequency offsets are typically caused by mismatched transmitter and receiver oscillators, or by Doppler shift due to movement. While Doppler shift alone may be compensated for by the receiver, the situation is worsened when combined with multipath, as reflections will appear at various frequency offsets, which is much harder to correct. This effect typically worsens as speed increases, and is an important factor limiting the use of OFDM in high-speed vehicles. In order to mitigate ICI in such scenarios, one can shape each subcarrier in order to minimize the interference resulting in a non-orthogonal subcarriers overlapping. For example, a low-complexity scheme referred to as WCP-OFDM (Weighted Cyclic Prefix Orthogonal Frequency-Division Multiplexing) consists of using short filters at the transmitter output in order to perform a potentially non-rectangular pulse shaping and a near perfect reconstruction using a single-tap per subcarrier equalization. Other ICI suppression techniques usually drastically increase the receiver complexity. === Implementation using the FFT algorithm === The orthogonality
|
{"page_id": 22691, "title": "Orthogonal frequency-division multiplexing"}
|
number of siblings than heterosexual males, which the researchers suggested indicates that a maternal fecundity effect exists in Samoa. In 2009, Archives of Sexual Behavior published a study that examined the probands of 152 homosexual men and 98 heterosexual men that found a significant fecundity increase in mothers (including primiparous mothers) but no evidence of increased paternal fecundity, which the researchers concluded suggested the existence of a sexually antagonistic inheritance partly linked to the X-chromosome promoting fecundity in females and homosexual sexual orientation in males. In 2009, the Journal of Sexual Medicine published a study of 151 homosexual or bisexual men and 88 exclusively heterosexual men that found that significantly higher fecundity of female relatives of the maternal line (including mothers, maternal grandparents, and maternal aunts) for both bisexuals and homosexuals compared to the corresponding relatives of heterosexual subjects, which the researchers argued provided evidence for an association between X-chromosomal genetic factors with bisexuality in men and fecundity promotion in female carriers. In 2010, Archives of Sexual Behavior published a study comparing the pedigree sizes of 694 homosexual men and 894 heterosexual men sampled at pride parades that found that homosexual men had more relatives, especially paternal relatives, but no evidence that male sexual orientation is transmitted predominantly through the maternal line—which the researchers noted was contrary to previous research. In 2012, Archives of Sexual Behavior published a study that compared the probands of 4,784 firstborn homosexual men and 40,197 first-born heterosexual men across 6 datasets that found that the homosexual probands had significantly fewer siblings or a statistically insignificant difference in the number of siblings—which the researcher concluded was a direct contradiction of an antagonistic pleiotropy explanation of homosexuality, but also that such an explanation could not be tested solely by comparing the number of siblings of heterosexual and
|
{"page_id": 51614, "title": "Biology and sexual orientation"}
|
HD 106315, or K2-109, is a single star with a pair of close-orbiting exoplanets, located in the constellation of Virgo. Based on parallax measurements, this system lies at a distance of 356 light years from the Sun. At that range, the star is too faint to be seen with the naked eye, as it has an apparent visual magnitude of 8.95. But it is slowly drifting closer with a radial velocity of −3 km/s. As of 2020, multiplicity surveys have not detected any stellar companions to HD 106315. The spectrum of HD 106315 presents as an ordinary F-type main-sequence star with a stellar classification of F5V, indicating it is generating energy through hydrogen fusion at its core. It is estimated to be roughly four billion years old but is spinning quickly with a rotation period of 5 days. The star is relatively metal-poor, having 60% of solar concentration of iron. It has only a low level of magnetic activity in its chromosphere, showing a minimal level of star spot coverage. The star has 11% more mass and a 29% larger radius than the Sun. It is radiating 2.4 times the luminosity of the Sun from its photosphere at an effective temperature of 6,300 K. == Planetary system == Two planets were detected by the transit method in 2017, using data from the extended Kepler mission (K2). Their large planetary radii imply both planets have a massive steam atmosphere for planet b and hydrogen-helium atmosphere for planet c. The planetary system of HD 106315 is rather unstable and current planetary orbits are the outcome of violent dynamical history, strongly affected by relativistic effects. The orbits of planets are nearly coplanar, and orbit of c is well aligned with the equatorial plane of the star, misalignment been equal to -10+3.6−3.8°. Since 2017,
|
{"page_id": 71387813, "title": "HD 106315"}
|
For this purpose we could use the following algorithm: function PrintOptimalParenthesis(s, i, j) if i = j print "A"i else print "(" PrintOptimalParenthesis(s, i, s[i, j]) PrintOptimalParenthesis(s, s[i, j] + 1, j) print ")" Of course, this algorithm is not useful for actual multiplication. This algorithm is just a user-friendly way to see what the result looks like. To actually multiply the matrices using the proper splits, we need the following algorithm: == History of the name == The term dynamic programming was originally used in the 1940s by Richard Bellman to describe the process of solving problems where one needs to find the best decisions one after another. By 1953, he refined this to the modern meaning, referring specifically to nesting smaller decision problems inside larger decisions, and the field was thereafter recognized by the IEEE as a systems analysis and engineering topic. Bellman's contribution is remembered in the name of the Bellman equation, a central result of dynamic programming which restates an optimization problem in recursive form. Bellman explains the reasoning behind the term dynamic programming in his autobiography, Eye of the Hurricane: An Autobiography: I spent the Fall quarter (of 1950) at RAND. My first task was to find a name for multistage decision processes. An interesting question is, "Where did the name, dynamic programming, come from?" The 1950s were not good years for mathematical research. We had a very interesting gentleman in Washington named Wilson. He was Secretary of Defense, and he actually had a pathological fear and hatred of the word "research". I'm not using the term lightly; I'm using it precisely. His face would suffuse, he would turn red, and he would get violent if people used the term research in his presence. You can imagine how he felt, then, about the term mathematical.
|
{"page_id": 125297, "title": "Dynamic programming"}
|
lanes, with all charges now made either through the FasTrak electronic toll collection system or through invoices mailed through the USPS, based on the license plate of the car per Department of Motor Vehicle records. Metering signals are about 1,000 feet (300 m) west of the toll plaza. Two full-time bus-only lanes bypass the toll booths and metering lights around the right (north) side of the toll plaza; other high occupancy vehicles can use these lanes during weekday morning and afternoon commute periods. The two far-left toll lanes are high-occupancy vehicle lanes during weekday commute periods. Radio and television traffic reports will often refer to congestion at the toll plaza, metering lights, or a parking lot in the median of the road for bridge employees; the parking lot is about 1,900 feet (580 m) long, stretching from about 800 feet (240 m) east of the toll plaza to about 100 feet (30 m) west of the metering lights. During the morning commute hours, traffic congestion on the westbound approach from Oakland stretches back through the MacArthur Maze interchange at the east end of the bridge onto the three feeder highways, Interstate 580, Interstate 880, and I-80 toward Richmond. Since the number of lanes on the eastbound approach from San Francisco is structurally restricted, eastbound backups are also frequent during evening commute hours. The eastbound bottleneck is not the bridge itself, but the approach, which has just three lanes in each direction, in contrast to the bridge's five. The western section of the Bay Bridge is currently restricted to motorized freeway traffic. Pedestrians, bicycles, and other non-freeway vehicles are not allowed to cross this section. A project to add bicycle/pedestrian lanes to the western section has been proposed but is not finalized. A Caltrans bicycle shuttle operates between Oakland and San
|
{"page_id": 165926, "title": "San Francisco–Oakland Bay Bridge"}
|
Denver, CO, Nov 2008). Roger Bacon (English friar and polymath), Epistle on the secret Works of Art and Nullity of Magic, 13th century, possibly the first European work on cryptography since Classical times, written in Latin and not widely available then or now Johannes Trithemius, Steganographia ("Hidden Writing"), written ca. 1499; pub 1606, banned by the Catholic Church 1609 as alleged discussion of magic, see Polygraphiae (below). Johannes Trithemius, Polygraphiae Libri Sex ("Six Books on Polygraphy"), 1518, first printed book on cryptography (thought to really be about magic by some observers at the time) Giovan Battista Bellaso, La cifra del. Sig. Giovan Battista Bellaso, 1553, first pub of the cypher widely misattributed to Vigenère. Giambattista della Porta, De Furtivis Literarum Notis ("On concealed characters in writing"), 1563. Blaise de Vigenère, Traicte de Chiffres, 1585. Gustavus Selenus, Cryptomenytics, 1624, (modern era English trans by J W H Walden) John Wilkins, Mercury, 1647, earliest printed book in English about cryptography Johann Ludwig Klüber, Kryptographik Lehrbuch der Geheimschreibekunst ("Cryptology: Instruction Book on the Art of Secret Writing"), 1809. Friedrich Kasiski, Die Geheimschriften und die Dechiffrierkunst ("Secret writing and the Art of Deciphering"), pub 1863, contained the first public description of a technique for cryptanalyzing polyalphabetic cyphers. Etienne Bazeries, Les Chiffres secrets dévoilés ("Secret ciphers unveiled") about 1900. Émile Victor Théodore Myszkowski, Cryptographie indéchiffrable: basée sur de nouvelles combinaisons rationelles ("Unbreakable cryptography"), published 1902. William F. Friedman and others, the Riverbank Publications, a series of pamphlets written during and after World War I that are considered seminal to modern cryptanalysis, including no. 22 on the Index of Coincidence. === Fiction === Neal Stephenson – Cryptonomicon (1999) (ISBN 0-06-051280-6) The adventures of some World War II codebreakers and their modern-day progeny. Edgar Allan Poe – "The Gold-Bug" (1843) An eccentric man discovers an ancient parchment
|
{"page_id": 466203, "title": "Bibliography of cryptography"}
|
polar cap east of Abatos Planum are a sequence of irregularly-shaped dark spots, or maculae, surrounded by a "halo" of bright material. The two most prominent dark maculae are Akupara Macula and Zin Macula, which are roughly 100 km across and have halos extending a further 20 to 30 km from the edges of their dark centers.: 901 The dark material is most likely composed of organic materials in the form of tholins. === Cantaloupe terrain === Much of Triton's surface, mostly in Bubembe Regio, is dominated by a unique and unusually textured terrain informally called cantaloupe terrain, due to its resemblance to the skin of a North American cantaloupe melon. The cantaloupe terrain appears to be dominated by intersecting folds or faults, with ovoid depressions roughly 30–40 km in diameter. The formation of Triton's cantaloupe terrain may have been driven by diapirism, though other hypotheses invoke collapse or cryovolcanic resurfacing. In contrast to the bright, reflective terrain that covers most of Triton's surface, large portions of the cantaloupe terrain are darkened. The cantaloupe terrain is nearly devoid of craters, with only three probable impact craters identified within cantaloupe terrain regions. Depending on the source of cratering on Triton, this may indicate that the cantaloupe terrain is less than 10 million years old. However, the cantaloupe terrain is stratigraphically younger than other features on Triton, having been partially flooded by cryovolcanic flows. === Impact craters === Corresponding with Triton's high rates of geological activity and resurfacing, few impact craters have been identified on its surface. Unusually, Triton experiences an extreme dichotomy in crater distribution: almost all of Triton's craters are on its leading hemisphere. The cause of such asymmetry is unclear, but may come from geological activity, the source impactor population, or both. If cratering is primarily from heliocentric objects
|
{"page_id": 76526782, "title": "Geology of Triton"}
|
signs. Support: > 03 Continuity of destination names is also useful on expressways serving long-distance or intrastate travel. > 04 The determination of major destinations or control cities is important to the quality of service provided by the freeway. Control cities on freeway guide signs are selected by the States and are contained in the “Guidelines for the Selection of Supplemental Guide Signs for Traffic Generators Adjacent to Freeways, 4th Edition/Guide Signs, Part II: Guidelines for Airport Guide Signing/Guide Signs, Part III: List of Control Cities for Use in Guide Signs on Interstate Highways,” published by and available from the American Association of State and Highway Transportation Officials. Page 292 MUTCD 11th Edition Month 2023 December 2023 > Sect. 2E.07 Figure 2E-1. Designation of Destination for Interchanges in Opposing Directions of Travel > 242 # Charleston > Note: Interchange advance guide signs are not shown. OR > 241 # Avandale Danhurst > 243 # Barrington > 240 > 239 MUTCD 11th Edition Page 293 Month 2023 December 2023 > Sect. 2E.08 to 2E.12 SIGN DESIGN Section 2E.08 General Support: > 01 Effective signs are legible to road users approaching them, and are readable and comprehensible in the viewing time provided to permit proper responses. Desired design characteristics include: (a) long visibility distances; (b) large lettering, symbols, and arrows; and (c) short legends. Section 2E.09 Color of Guide Signs Standard: > 01 Guide signs on freeways and expressways, except as otherwise provided in this Manual, shall have white letters, symbols, arrows, and borders on a green background. Support: > 02 Color requirements for route signs and trailblazers; for signs with blank-out or changeable messages; for signs for services, rest areas, park and recreational areas; and for certain miscellaneous signs are provided in the individual Sections dealing with the particular sign or
|
{"source": 1185, "title": "from dpo"}
|
the visual posterior of inverse graphics, and both the particle states and the visual posterior are obtained from a learned neural renderer. The converged prior learner is embedded in our probabilistic physics engine, allowing us to perform novel simulations on unseen geometries, boundaries, and dynamics without knowledge of the true physical parameters. We validate our model in three ways: (i) novel scene simulation with the learned visual-world physics, (ii) future prediction of the observed fluid dynamics, and (iii) supervised particle simulation. Our model demonstrates strong performance in all three tasks. _William Yang, Byron Zhang, Olga Russakovsky_ **tl;dr:** We introduce a clean semantic shift detection dataset to demonstrate that modern out-of-distributions are overly sensitive to covariate shifts. !Image 944 detection is notoriously ill-defined. Earlier works focused on new-class detection, aiming to identify label-altering data distribution shifts, also known as "semantic shift." However, recent works argue for a focus on failure detection, expanding the OOD evaluation framework to account for label-preserving data distribution shifts, also known as "covariate shift.” Intriguingly, under this new framework, complex OOD detectors that were previously considered state-of-the-art now perform similarly to, or even worse than the simple maximum softmax probability baseline. This raises the question: what are the latest OOD detectors actually detecting? Deciphering the behavior of OOD detection algorithms requires evaluation datasets that decouples semantic shift and covariate shift. To aid our investigations, we present ImageNet-OOD, a clean semantic shift dataset that minimizes the interference of covariate shift. Through comprehensive experiments, we show that OOD detectors are more sensitive to covariate shift than to semantic shift, and the benefits of recent OOD detection algorithms on semantic shift detection is minimal. Our dataset and analyses provide important insights for guiding the design of future OOD detectors. _Pratyush Maini, Sachin Goyal, Zachary Chase
|
{"source": 3883, "title": "from dpo"}
|
then we have ver-ified that f is indeed a maximum flow. This relationship provides an example of duality: given a maximization problem, we define a related minimization problem such that the two problems have the same optimal objective values. Given a linear program in which the objective is to maximize, we shall describe how to formulate a dual linear program in which the objective is to minimize and 880 Chapter 29 Linear Programming whose optimal value is identical to that of the original linear program. When refer-ring to dual linear programs, we call the original linear program the primal .Given a primal linear program in standard form, as in (29.16)–(29.18), we define the dual linear program as minimize > m X > iD1 bi yi (29.83) subject to mX > iD1 aij yi cj for j D 1; 2; : : : ; n ; (29.84) yi 0 for i D 1; 2; : : : ; m : (29.85) To form the dual, we change the maximization to a minimization, exchange the roles of coefficients on the right-hand sides and the objective function, and replace each less-than-or-equal-to by a greater-than-or-equal-to. Each of the m constraints in the primal has an associated variable yi in the dual, and each of the n constraints in the dual has an associated variable xj in the primal. For example, consider the linear program given in (29.53)–(29.57). The dual of this linear program is minimize 30y 1 C 24y 2 C 36y 3 (29.86) subject to y1 C 2y 2 C 4y 3 3 (29.87) y1 C 2y 2 C y3 1 (29.88) 3y 1 C 5y 2 C 2y 3 2 (29.89) y1; y 2; y 3 0 : (29.90) We shall show in Theorem 29.10 that
|
{"source": 5230, "title": "from dpo"}
|
to inflict violence (see policy on violence above) or generally recording without the consent of all individuals present. #### Disposal of Sharp Objects Residents are prohibited from disposing sharp objects such as razor blades, broken glass, and needles (hypodermic, sewing, etc.) in a way that could cause harm to others. These items must be discarded in sharps containers that can be obtained from custodial staff due to potential for injury. If a resident needs assistance with disposing of sharp objects due to size or safety, Housing & Residence Life staff can provide assistance. #### Vandalism Residents are prohibited from causing damage, defacement, alteration, or destruction of property that belongs to another, including University property, state property, Housing & Residence Life property, or other residents’ or guests’ property. This includes non-permanent alterations, damage, or acts that cause staff to need to clean, close, repair, or otherwise address a space. Additionally, this includes electronic networks and infrastructure, and personal computers, tablets, smart phones, and electronic devices located within or surrounding Housing & Residence Life buildings. #### Gardening Residents are prohibited from planting vegetation of any kind in or around the exteriors of Housing & Residence Life property. Any vegetation in said locations may be subject to immediate removal. #### Surfaces, Roofs, and Sunshades Residents are prohibited from climbing interior or exterior surfaces or being present on rooftops or sunshades. Placing items on sunshades or climbing onto sunshades is also prohibited. Being present on rooftop and/or sunshade can result in termination of the resident housing contract. #### University Provided Furniture and Private Property in Common Spaces Residents are prohibited from removing University provided furniture from its designated location. Common area furniture may not be moved between common areas or to private residential spaces. Any furniture provided by Housing & Residence Life may not
|
{"source": 6608, "title": "from dpo"}
|
fish moves its tail up to 70 times per second. Several oceanic squid, such as the Pacific flying squid, leap out of the water to escape predators, an adaptation similar to that of flying fish. Smaller squids fly in shoals, and have been observed to cover distances as long as 50 m. Small fins towards the back of the mantle help stabilize the motion of flight. They exit the water by expelling water out of their funnel, indeed some squid have been observed to continue jetting water while airborne providing thrust even after leaving the water. This may make flying squid the only animals with jet-propelled aerial locomotion. The neon flying squid has been observed to glide for distances over 30 m (100 ft), at speeds of up to 11.2 m/s (37 ft/s; 25 mph). === Soaring === Soaring birds can maintain flight without wing flapping, using rising air currents. Many gliding birds are able to "lock" their extended wings by means of a specialized tendon. Soaring birds may alternate glides with periods of soaring in rising air. Five principal types of lift are used: thermals, ridge lift, lee waves, convergences and dynamic soaring. Examples of soaring flight by birds are the use of: Thermals and convergences by raptors such as vultures Ridge lift by gulls near cliffs Wave lift by migrating birds Dynamic effects near the surface of the sea by albatrosses === Ballooning === Ballooning is a method of locomotion used by spiders. Certain silk-producing arthropods, mostly small or young spiders, secrete a special light-weight gossamer silk for ballooning, sometimes traveling great distances at high altitude. == Terrestrial == Forms of locomotion on land include walking, running, hopping or jumping, dragging and crawling or slithering. Here friction and buoyancy are no longer an issue, but a strong skeletal
|
{"page_id": 1132756, "title": "Animal locomotion"}
|
High Price: A Neuroscientist's Journey of Self-Discovery That Challenges Everything You Know About Drugs and Society is a 2013 book by psychologist and neuroscientist Carl Hart, combining memoir, scientific assessment, and policy recommendation. Hart recounts his own experiences growing up in a poor African-American neighborhood in Miami, surrounded by violence and drug use, and views it through his research as a neuroscientist investigating the effects of drugs. He argues for an end to the punitive war on drugs that he finds to be based on race, class and misconceptions, in favor of evidence-based policies. == Reception == Writing in the New York Times, John Tierney found High Price to be "a fascinating combination of memoir and social science: wrenching scenes of deprivation and violence accompanied by calm analysis of historical data and laboratory results." In Scientific American, Anna Kuchment recommended High Price, writing, "Hart's account of rising from the projects to the ivory tower is as poignant as his call to change the way society thinks about race, drugs and poverty." Publishers Weekly wrote, "Combining memoir, popular science, and public policy, Hart’s study lambasts current drug laws as draconian and repressive, arguing that they’re based more on assumptions about race and class than on a real understanding of the physiological and societal effects of drugs. ... His is a provocative clarion call for students of sociology and policy-makers alike." High Price won the PEN/E. O. Wilson Literary Science Writing Award in 2014. == References ==
|
{"page_id": 77441193, "title": "High Price (book)"}
|
NGC 5314 is a spiral galaxy in the constellation of Ursa Minor. Its velocity with respect to the cosmic microwave background is 9636 ± 100 km/s, which corresponds to a Hubble distance of 142.13 ± 10.17 Mpc (~463 million light-years). It was discovered by American astronomer Lewis Swift on 8 April 1886. One supernova has been observed in NGC 5314: SN 2023eyz (type Ia, mag. 20.4) was discovered by the Zwicky Transient Facility on 8 April 2023. == See also == List of NGC objects (5001–6000) == References == == External links == NGC 5314 on WikiSky: DSS2, SDSS, GALEX, IRAS, Hydrogen α, X-Ray, Astrophoto, Sky Map, Articles and images
|
{"page_id": 77599492, "title": "NGC 5314"}
|
called just an "(ultra)filter on X {\displaystyle X} ". Given an arbitrary set X , {\displaystyle X,} an ultrafilter on P ( X ) {\displaystyle {\mathcal {P}}(X)} is a set U {\displaystyle {\mathcal {U}}} consisting of subsets of X {\displaystyle X} such that: The empty set is not an element of U {\displaystyle {\mathcal {U}}} . If A {\displaystyle A} is an element of U {\displaystyle {\mathcal {U}}} then so is every superset B ⊃ A {\displaystyle B\supset A} . If A {\displaystyle A} and B {\displaystyle B} are elements of U {\displaystyle {\mathcal {U}}} then so is the intersection A ∩ B {\displaystyle A\cap B} . If A {\displaystyle A} is a subset of X , {\displaystyle X,} then either A {\displaystyle A} or its complement X ∖ A {\displaystyle X\setminus A} is an element of U {\displaystyle {\mathcal {U}}} . Equivalently, a family U {\displaystyle {\mathcal {U}}} of subsets of X {\displaystyle X} is an ultrafilter if and only if for any finite collection F {\displaystyle {\mathcal {F}}} of subsets of X {\displaystyle X} , there is some x ∈ X {\displaystyle x\in X} such that U ∩ F = F x ∩ F {\displaystyle {\mathcal {U}}\cap {\mathcal {F}}=F_{x}\cap {\mathcal {F}}} where F x = { Y ⊆ X : x ∈ Y } {\displaystyle F_{x}=\{Y\subseteq X:x\in Y\}} is the principal ultrafilter seeded by x {\displaystyle x} . In other words, an ultrafilter may be seen as a family of sets which "locally" resembles a principal ultrafilter. An equivalent form of a given U {\displaystyle {\mathcal {U}}} is a 2-valued morphism, a function m {\displaystyle m} on P ( X ) {\displaystyle {\mathcal {P}}(X)} defined as m ( A ) = 1 {\displaystyle m(A)=1} if A {\displaystyle A} is an element of U {\displaystyle {\mathcal {U}}} and m
|
{"page_id": 31911, "title": "Ultrafilter"}
|
Turbo Byte Blic Dubna 48K – running at half the speed of the original Hobbit Pentagon Radon 'Z' Scorpion === Other === 5E** (5Э**) series – military computers 5E51 (5Э51) 5E53 (5Э53) 5E76 (5Э76) – IBM/360 clone, military version 5E92 (5Э92) 5E92b (5Э92б) A series — ES EVM-compatible military computers Argon — a series of military real-time computers AS-6 (АС-6) – multiprocessor computing complex, name is Russian abbreviation for "Connection Equipment – 6" Dnepr (Днепр) GVS-100 (ГВС-100, Гибридная Вичислителная Система) – Hybrid Computer System Irisha (Ириша) Juku (Юку) — Estonian school computer Kiev (Киев) Korvet (Корвет) Krista (Криста) Micro-80 (Микро-80) — experimental PC, based on 8080-compatible processor Microsha (Микроша) — modification of Radio-86RK MIR, МИР (uk:ЕОМ "МИР-1", uk:ЕОМ "МИР-2") Nairi (Наири) Orion-128 (Орион-128) Promin (Проминь) PS-2000, PS-3000 – multiprocessor supercomputers in the 1980s Razdan (Раздан) Radon — real-time computer, designed for anti-aircraft defense Radio-86RK — simplified and modified version of Micro-80 Sneg (Снег) Specialist (Специалист) SVS TsUM-1 (ЦУМ-1) TIA-MC-1 An arcade system UM (УМ) UT-88 Vesna and Sneg — early mainframes == List of operating systems == For Kronos Kronos For BESM D-68 (Д-68, Диспетчер-68, Dispatcher-68) DISPAK ("Диспетчер Пакетов," Dispatcher of the Packets) DUBNA ("ДУБНА") For ES EVM DOS/ES ("Disk Operation system for ES EVM") OS/ES ("Disk Operation system for ES EVM") For SM EVM RAFOS (РАФОС), FOBOS (ФОБОС) and FODOS (ФОДОС) — RT-11 clones OSRV (ОСРВ) — RSX-11M clone, one of the most popular Soviet multi-user systems DEMOS — BSD-based Unix-like; later was ported to x86 and some other architectures INMOS (ИНМОС, Инструментальная мобильная операционная система) For 8-bit microcomputers MicroDOS (МикроДОС) — CP/M 2.2 clone For ZX Spectrum clones iS-DOS, TASiS DNA-OS For different platforms MISS (Multipurpose Interactive timeSharing System) – ES EVM ES1010, ES EVM ES1045, D3-28M, PC-compatible, etc. MOS (operating system) – a Soviet clone of Unix
|
{"page_id": 586316, "title": "List of Soviet computer systems"}
|
added to the problem, as at the end of the fifteenth century the north-west transept collapsed. A great sloping mass of masonry was built to buttress the remaining walls, which remain in their broken-off state on the north side of the tower. === Galilee Porch === The Galilee Porch is now the principal entrance into the cathedral for visitors. Its original liturgical functions are unclear, but its location at the west end meant it may have been used as a chapel for penitents, a place where liturgical processions could gather, or somewhere the monks could hold business meetings with women, who were not permitted into the abbey. It also has a structural role in buttressing the west tower. The walls stretch over two storeys, but the upper storey now has no roof, it having been removed early in the nineteenth century. Its construction dating is also uncertain. Records suggest it was initiated by Bishop Eustace (1197–1215), and it is a notable example of Early English Gothic style. But there are doubts about just how early, especially as Eustace had taken refuge in France in 1208, and had no access to his funds for the next 3 years. George Gilbert Scott argued that details of its decoration, particularly the 'syncopated arches' and the use of Purbeck marble shafts, bear comparison with St Hugh's Choir, Lincoln Cathedral, and the west porch at St Albans, which both predate Eustace, whereas the foliage carvings and other details offer a date after 1220, suggesting it could be a project taken up, or re-worked by Bishop Hugh of Northwold. === Presbytery and East end === The first major reworking of an element of the Norman building was undertaken by Hugh of Northwold (bishop 1229–54). The eastern arm had been only four bays, running from the choir
|
{"page_id": 884375, "title": "Ely Cathedral"}
|
data. In 2023, University of Washington researchers demonstrated a fourth class of 3D underwater positioning for these smart devices that does not require infrastructure support like buoys. Instead they use distributed localization techniques by computing the pairwise distances between a network of diver devices to determine the shape of the resulting network topology. Combining this with depth sensor data from these devices, the lead diver can then compute the relative 3D positions of all the other diver devices. == References == == External links == Safran Electronics & Defense Naval solutions IXBLUE Subsea navigation and positioning Underwater GPS at ACSA Underwater GPS
|
{"page_id": 21898118, "title": "Underwater acoustic positioning system"}
|
weaponeering (92 Sqn). Operations Division is responsible for the development of Air Command and Control capability through workshop, study and experimentation. In addition, it provides Tactical Leadership and Combined Qualified Weapons Instructor training, and it co-ordinates the activities of the Command and Battlespace Management (Air) Working Group. Within Operations Division, the Information Operations Group is responsible for Operational Security (OPSEC) training and the integration of kinetic and non-kinetic effects within collective training exercises. == Integrated Mission Support == The Integrated Mission Support (IMS) cell was formally opened on 1 July 2013 by the AWC Commandant. The purpose of the IMS Cell is to support the AWC activity by enabling collaborative working, assuring output, and gathering feedback from the war-fighter to refine the future process through a continuous improvement ethos. The Integrated Mission Support process combines subject matter expertise across the ASWC to deliver timely, impartial and authoritative advice to meet the needs of the Customer. RAF personnel in the cell are drawn from several backgrounds. The purpose of the IMS Cell is to support the AWC activity by enabling collaborative working, assuring output, and gathering feedback from the war-fighter to refine the future process through a continuous improvement ethos. The Integrated Mission Support process combines subject matter expertise across the ASWC to deliver timely, impartial and authoritative advice to meet the needs of the Customer. The IMS Cell is the center cog in a much larger machine. IMS has "Champions" throughout the ASWC. When an IMS task comes in the IMS Cell ratifies the enquiry, then distributes it to the "Champions". The "Champions" then return their input to a final product, whether that is a Document, PowerPoint or Brief, IMS then assure the product to ensure the original enquiry has been answered. The final product is then distributed to the
|
{"page_id": 17479947, "title": "Air and Space Warfare Centre"}
|
or correction codes (Hamming), redundant logic for fault detection and fault tolerance (duplicate / triplicate) and protocol checks (interface parity, address alignment, beat count) Functional safety verification, running of a fault campaign, including insertion of faults into the design and verification that the safety mechanism reacts in an appropriate manner for the faults that are deemed covered. == Companies == === Current === Market capitalization and company name as of March 2023: $57.87 billion – Synopsys $56.68 billion – Cadence Design Systems $24.98 billion – Ansys AU$4.88 billion – Altium ¥77.25 billion – Zuken === Defunct === Market capitalization and company name as of December 2011: $2.33 billion – Mentor Graphics; Siemens acquired Mentor in 2017 and renamed as Siemens EDA in 2021 $507 million – Magma Design Automation; Synopsys acquired Magma in February 2012 NT$6.44 billion – SpringSoft; Synopsys acquired SpringSoft in August 2012 === Acquisitions === Many EDA companies acquire small companies with software or other technology that can be adapted to their core business. Most of the market leaders are amalgamations of many smaller companies and this trend is helped by the tendency of software companies to design tools as accessories that fit naturally into a larger vendor's suite of programs on digital circuitry; many new tools incorporate analog design and mixed systems. This is happening due to a trend to place entire electronic systems on a single chip. == Technical conferences == Design Automation Conference International Conference on Computer-Aided Design Design Automation and Test in Europe Asia and South Pacific Design Automation Conference Symposia on VLSI Technology and Circuits == See also == Computer-aided design (CAD) Circuit design EDA database Foundations and Trends in Electronic Design Automation Signoff (electronic design automation) Comparison of EDA software Platform-based design Silicon compiler == References == Notes
|
{"page_id": 216881, "title": "Electronic design automation"}
|
3,4-DCAA had a complete kill on pigweed at 2 lbs. per acre of application, just as 3,4-DCPA did. . . . Monsanto, by the Husted affidavit, attempted to show that closely related compounds do not possess unique herbicidal properties. The facts not stated were, therefore material." The district court held the patent invalid and Monsanto appealed top the Third Circuit. == Decision of Third Circuit == The Third Circuit affirmed the district court's judgment of fraud (2-1) in an opinion by Circuit Judge Aldisert. === Majority opinion === The court looked at the Husted Affidavit in light of its place in the three successive Monsanto patent applications: In view of Huffman's previously unsuccessful attempts to obtain a patent, it is reasonable to conclude that his success with his 1968 application, originally rejected by the examiner, and later accepted after presentation of the Husted Report, was attributed to his emphasis that the compound possessed properties of 'surprising . . . herbicidal efficiency' not possessed by related compounds. Whether 3,4-DCPA really was surprisingly superior to related compounds as a herbicide was therefore critical to the patent prosecution and to whether Monsanto had committed fraud on the Patent Office. The court rejected Monsanto's argument that in the affidavit it was merely putting its best foot forward: The Husted affidavit to the Patent Office did not nearly reflect the total Husted test as transmitted to Huffman. Indeed, an examination of the report permits, if not compels, the misleading inference that it constituted a complete and accurate analysis of all the testing instead of an edited version thereof. Concealment and nondisclosure may be evidence of and equivalent to a false representation, because the concealment or suppression is, in effect, a representation that what is disclosed is the whole truth. Looking at this pattern of conduct,
|
{"page_id": 47704844, "title": "Monsanto Co. v. Rohm and Haas Co."}
|
established user community, AND a competent engineering organization, there is no reason to have technical debt in 2018. !Image 201 developers, came up with a solution, and fixed it quickly. As long as you don't have high turnover, technical debt is fine. You have a team who is aware of all the quirks of the codebase(s) and knows how to deal with it. !Image 202 and knows how to deal with it._ But that's not a good thing. If your technical debt adds an hour to a dev's day, every day, you're running at ~85% capacity. If you have tests that need to be babysat, or code that takes a long time to add new features to (or fix bugs in) because of tech debt, you're losing valuable time. Even if it's not necessarily the sort of thing that brings a codebase to its knees, or the kind of thing that sinks a business, but it is the equivalent of refusing to tie your shoes and tripping and
|
{"source": 1722, "title": "from dpo"}
|
can be susceptible to dimensional collapse, where the learned representation subspace is of extremely low dimensionality and thus fails to represent the full data distribution and modalities. Dimensional collapse ––– also known as the "underfilling" phenomenon ––– is one of the major causes of degraded performance on downstream tasks. Previous work has investigated the dimensional collapse problem of SSL at a global level. In this paper, we demonstrate that representations can span over high dimensional space globally, but collapse locally. To address this, we propose a method called *local dimensionality regularization (LDReg)*. Our formulation is based on the derivation of the Fisher-Rao metric to compare and optimize local distance distributions at an asymptotically small radius for each data point. By increasing the local intrinsic dimensionality, we demonstrate through a range of experiments that LDReg improves the representation quality of SSL. The results also show that LDReg can regularize dimensionality at both local and global levels. _Keivan Rezaei, Mehrdad Saberi, Mazda Moayeri, Soheil Feizi_ **tl;dr:** We propose a new method to detect and explain failure mode of trained models in human-understandable terms. !Image 1416 of incorrectly classified samples in a latent space and then aiming to provide human-understandable text descriptions for them. We observe that in some cases, describing text does not match well with identified failure modes, partially owing to the fact that shared interpretable attributes of failure modes may not be captured using clustering in the feature space. To improve on these shortcomings, we propose a novel approach that prioritizes interpretability in this problem: we start by obtaining human-understandable concepts (tags) of images in the dataset and then analyze
|
{"source": 3883, "title": "from dpo"}
|
regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit [Reprints and permissions multiplicative inverse. _EPJ Quantum Technol._**9**, 24 (2022). [Download citation]( * Received: 10 February 2022 * Accepted: 21 September 2022 * Published: 07 October 2022 * DOI: ### Keywords
|
{"source": 5821, "title": "from dpo"}
|
2020, with 1 in 5 reporting “extreme financial stress." Given as we know that the majority of abuse cases in the aged are caused by family members, these statistics are not too comforting caregivers. Therefore, we can see that the future economic situation is going to be a catalyst for further abuse of the elderly and unsafe living conditions. A decreased access to care for senior citizens is also a reason for an increased rate of abuse. Many care facilities are also struggling to stay open. The Centers for Medicare and Medicaid Services says that 81% of them would need to hire additional workers to meet nursing staff requirements. If they don't, they will likely have to close. According to the American Health Care Association, 46 percent of nursing homes are limiting their new admissions, and 57 percent of nursing homes have a waiting list. This means that those who need assisted living right away might be left waiting even though they have nowhere else to go. Since 2020, there has been a drastic decrease in nursing home beds as well as a closure of units or floors or wings of nursing homes in 20% of facilities due to labor shortages. These closures alone in recent years have displaced 28,421 residents. As we know, with an increase in elderly population there is more need for placement than ever. Unfortunately, it is also true that with underpaid or overworked staff, abuse will increase, as it is reported that 13% of cases are from medical caregivers. We can assume with less nursing care facilities much of the care will be handed to family members, who may be inadequately trained to care for aging family members and their medical needs. For this reason, neglect, negligence, and elder cruelty will likely increase as we
|
{"page_id": 526616, "title": "Elder abuse"}
|
== Physical origins == Redshifts are differences between two wavelength measurements and wavelengths are a property of both the photons and the measuring equipment. Thus redshifts characterize differences between two measurement locations. These differences are commonly organized in three groups, attributed to relative motion between the source and the observer, to the expansion of the universe, and to gravity. The following sections explain these groups. === Doppler effect === If a source of the light is moving away from an observer, then redshift (z > 0) occurs; if the source moves towards the observer, then blueshift (z < 0) occurs. This is true for all electromagnetic waves and is explained by the Doppler effect. Consequently, this type of redshift is called the Doppler redshift. If the source moves away from the observer with velocity v, which is much less than the speed of light (v ≪ c), the redshift is given by z ≈ v c {\displaystyle z\approx {\frac {v}{c}}} (since γ ≈ 1 {\displaystyle \gamma \approx 1} ) where c is the speed of light. In the classical Doppler effect, the frequency of the source is not modified, but the recessional motion causes the illusion of a lower frequency. A more complete treatment of the Doppler redshift requires considering relativistic effects associated with motion of sources close to the speed of light. A complete derivation of the effect can be found in the article on the relativistic Doppler effect. In brief, objects moving close to the speed of light will experience deviations from the above formula due to the time dilation of special relativity which can be corrected for by introducing the Lorentz factor γ into the classical Doppler formula as follows (for motion solely in the line of sight): 1 + z = ( 1 + v c
|
{"page_id": 26262, "title": "Redshift"}
|
UCSC Genome Browser Database [26:D876–82.")] and the Ensembl release 63 annotations [27:D800–6.")]. The genome versions used for the RefSeq annotations of human and mouse were build 36.1 (UCSC hg18) and build 37 (UCSC mm9), respectively. For the Ensembl human annotation, build 37 (UCSC hg19) was used instead. Both the RefSeq and Ensembl annotations were filtered to remove non-coding genes and genes located on non-standard chromosomes (e.g., chr1_random and chr5_h2_hap1). In addition, we identified a small fraction of RefSeq genes that were located at multiple, non-overlapping positions and renamed them so that each gene originated from a unique locus. ### Simulation The generative statistical model used by RSEM is easily used to simulate RNA-Seq data. In addition to the primary parameters of
|
{"source": 4922, "title": "from dpo"}
|
still be used with it. === The Privacy Solutions project === The Privacy Solutions project, a new organization that develops and maintains I2P software, launched several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology. These efforts include: The Abscond browser bundle. i2pd, an alternate implementation of I2P, written in C++ (rather than Java). The "BigBrother" I2P network monitoring project. The code repository and download sections for the i2pd and Abscond project is available for the public to review and download. Effective January, 2015 i2pd is operating under PurpleI2P. === Android === Release builds of an I2P Router application for Android can be found on the Google Play store under The Privacy Solutions Project's Google Play account or on an F-Droid repository hosted by the developers. Nightweb is an Android application that utilizes I2P and Bittorrent to share blog posts, photos, and other similar content. It can also be run as a desktop application. It is no longer in development. === Cryptocurrency === Some cryptocurrencies that support I2P are listed below. Bitcoin Monero Verge == Terminology == Eepsite Eepsites are websites that are hosted anonymously within the I2P network. Eepsite names end in .i2p, such as ugha.i2p or forum.i2p. EepProxy can locate these sites through the cryptographic identifier keys stored in the hosts.txt file found within the I2P program directory. Typically, I2P is required to access these eepsites. .i2p 'I2p' is a pseudo-top-level domain which is only valid within the I2P overlay network scope. .i2p names are resolved by browsers by submitting requests to EepProxy which will resolve names to an I2P peer key and will handle data transfers over the I2P network while remaining transparent to the browser. EepProxy The EepProxy program handles all communication between the browser and
|
{"page_id": 538434, "title": "I2P"}
|
to search for the legendary city of La Ciudad Blanca or "City of the Monkey God" in the La Mosquitia region of the Honduran jungle. During a seven-day mapping period, evidence was found of man-made structures. In June 2013, the rediscovery of the city of Mahendraparvata was announced. In southern New England, lidar was used to reveal stone walls, building foundations, abandoned roads, and other landscape features obscured in aerial photography by the region's dense forest canopy. In Cambodia, lidar data was used by Damian Evans and Roland Fletcher to reveal anthropogenic changes to Angkor landscape. In 2012, lidar revealed that the Purépecha settlement of Angamuco in Michoacán, Mexico had about as many buildings as today's Manhattan; while in 2016, its use in mapping ancient Maya causeways in northern Guatemala, revealed 17 elevated roads linking the ancient city of El Mirador to other sites. In 2018, archaeologists using lidar discovered more than 60,000 man-made structures in the Maya Biosphere Reserve, a "major breakthrough" that showed the Maya civilization was much larger than previously thought. In 2024, archaeologists using lidar discovered the Upano Valley sites. === Autonomous vehicles === Autonomous vehicles may use lidar for obstacle detection and avoidance to navigate safely through environments. The introduction of lidar was a pivotal occurrence that was the key enabler behind Stanley, the first autonomous vehicle to successfully complete the DARPA Grand Challenge. Point cloud output from the lidar sensor provides the necessary data for robot software to determine where potential obstacles exist in the environment and where the robot is in relation to those potential obstacles. Singapore's Singapore-MIT Alliance for Research and Technology (SMART) is actively developing technologies for autonomous lidar vehicles. The very first generations of automotive adaptive cruise control systems used only lidar sensors. In transportation systems, to ensure vehicle and
|
{"page_id": 41958, "title": "Lidar"}
|
the bright spots were massive and were flattened by a rotating motion; they are in fact galaxies. == Contents == Kant proposes the nebular hypothesis, in which solar systems are the result of nebulae (interstellar clouds of dust) coalescing into accretion disks and then forming suns and their planets. He also discusses comets, and postulates that the Milky Way is only one of many galaxies. In a speculative proposal, Kant argues that the Earth could have once had a ring around it like the rings of Saturn. He correctly theorizes that the latter are made up of individual particles, likely made of ice. He cites the hypothetical ring as a possible explanation for "the water upon the firmament" described in the Genesis creation narrative as well as a source of water for its flood narrative. Kant's book ends with an almost mystical expression of appreciation for nature: "In the universal silence of nature and in the calm of the senses the immortal spirit's hidden faculty of knowledge speaks an ineffable language and gives [us] undeveloped concepts, which are indeed felt, but do not let themselves be described." == Translations == The first English translation of the work was done by the Scottish theologian William Hastie, in 1900. Other English translations include those by Stanley Jaki and Ian Johnston. == Criticism == In his introduction to the English translation of Kant's book, Stanley Jaki criticises Kant for being a poor mathematician and downplays the relevance of his contribution to science. However, Stephen Palmquist argued that Jaki's criticisms are biased and "[a]ll he has shown ... is that the Allgemeine Naturgeschichte does not meet the rigorous standards of the twentieth-century historian of science." == References == Footnotes Citations == External links == "Online version of the text". Vancouver Island University (in German).
|
{"page_id": 4006255, "title": "Universal Natural History and Theory of the Heavens"}
|
designed by William Zisman of the United States Naval Research Laboratory in Washington, D.C. and manufactured by ramé-hart (now ramé-hart instrument company), New Jersey, USA. The original manual contact angle goniometer used an eyepiece with a microscope. Today's contact angle goniometer uses a camera and software to capture and analyze the drop shape, and is better suited for dynamic and advanced studies. ==== Surface tension ==== Contact angle goniometers can also determine the surface tension for any liquid in gas or the interfacial tension between any two liquids. If the difference in densities between the two fluids is known, the surface tension or interfacial tension can be calculated by the pendant drop method. An advanced instrument often called a goniometer / tensiometer includes software tools that measure surface tension and interfacial tension using the pendant drop, inverted pendant drop, and sessile drop methods, in addition to contact angle. A centrifugal adhesion balance relates the contact angles to the adhesion of the drop to the surface. A gonioreflectometer measures the reflectivity of a surface at a number of angles. === Positioning === A positioning goniometer or goniometric stage is a device that rotates an object precisely about a fixed axis in space. It is similar to a linear stage—however, rather than move linearly relative to its base, the stage platform rotates partially about a fixed axis above the mounting surface of the platform. Positioning goniometers typically use a worm drive with a partial worm wheel fixed to the underside of the stage platform meshing with a worm in the base. The worm gear may be rotated manually, or by a motor in automated positioning systems. === Knife and blade cutting edge angle measurement === The included cutting angles of all kinds of sharp edge blades are measured using a laser reflecting
|
{"page_id": 898572, "title": "Goniometer"}
|
some intricate processes of human cognition like perception or learning. The then perceived impossibility (since refuted ) of implementing emotion in AI, was seen to be a stumbling block on the path to achieving human-like cognition with computers. Researchers began to take a “sub-symbolic” approach to create intelligence without specifically representing that knowledge. This movement led to the emerging discipline of computational modeling, connectionism, and computational intelligence. == Computational modeling == As it contributes more to the understanding of human cognition than artificial intelligence, computational cognitive modeling emerged from the need to define various cognition functionalities (like motivation, emotion, or perception) by representing them in computational models of mechanisms and processes. Computational models study complex systems through the use of algorithms of many variables and extensive computational resources to produce computer simulation. Simulation is achieved by adjusting the variables, changing one alone or even combining them together, to observe the effect on the outcomes. The results help experimenters make predictions about what would happen in the real system if those similar changes were to occur. When computational models attempt to mimic human cognitive functioning, all the details of the function must be known for them to transfer and display properly through the models, allowing researchers to thoroughly understand and test an existing theory because no variables are vague and all variables are modifiable. Consider a model of memory built by Atkinson and Shiffrin in 1968, it showed how rehearsal leads to long-term memory, where the information being rehearsed would be stored. Despite the advancement it made in revealing the function of memory, this model fails to provide answers to crucial questions like: how much information can be rehearsed at a time? How long does it take for information to transfer from rehearsal to long-term memory? Similarly, other computational models raise
|
{"page_id": 1988689, "title": "Computational cognition"}
|
Inc. ISBN 9780596802769. Winkler, Vic (2011). Securing the Cloud: Cloud Computer Security Techniques and Tactics. Elsevier. ISBN 9781597495929. Ottenheimer, Davi (2012). Securing the Virtual Environment: How to Defend the Enterprise Against Attack. Wiley. ISBN 9781118155486. BS ISO/IEC 27017: "Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services." (2015) BS ISO/IEC 27018: "Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors." (2014) BS ISO/IEC 27036-4: "Information technology. Security techniques. Information security for supplier relationships. Guidelines for security of cloud services" (2016) == External links == Cloud Security Alliance Check Point Cloud Security Cloud Security Solutions Why cloud security requires multiple layers The Beginner's Guide to Cloud Security DoD Cloud Computing Security Requirements Guide (CC SRG) === Archive === Archived 2018-10-21 at the Wayback Machine
|
{"page_id": 25619904, "title": "Cloud computing security"}
|
switching with inductors are limited to designs which use only a few inductors. Quasi-adiabatic stepwise charging avoids inductors entirely by storing recovered energy in capacitors. Stepwise charging (SWC) can use on-chip capacitors.: 26 Asynchrobatic logic, introduced in 2004,: 51 is a CMOS logic family design style using internal stepwise charging that attempts to combine the low-power benefits of the seemingly contradictory ideas of "clock-powered logic" (adiabatic circuits) and "circuits without clocks" (asynchronous circuits).: 3 == CMOS adiabatic circuits == There are some classical approaches to reduce the dynamic power such as reducing supply voltage, decreasing physical capacitance and reducing switching activity. These techniques are not fit enough to meet today's power requirement. However, most research has focused on building adiabatic logic, which is a promising design for low power applications. Adiabatic logic works with the concept of switching activities which reduces the power by giving stored energy back to the supply. Thus, the term adiabatic logic is used in low-power VLSI circuits which implements reversible logic. In this, the main design changes are focused in power clock which plays the vital role in the principle of operation. Each phase of the power clock gives user to achieve the two major design rules for the adiabatic circuit design. Never turn on a transistor if there is a voltage across it (VDS > 0) Never turn off a transistor if there is a current through it (IDS ≠ 0) Never pass current through a diode If these conditions with regard to the inputs, in all the four phases of power clock, recovery phase will restore the energy to the power clock, resulting considerable energy saving. Yet some complexities in adiabatic logic design perpetuate. Two such complexities, for instance, are circuit implementation for time-varying power sources needs to be done and computational implementation
|
{"page_id": 18056178, "title": "Adiabatic circuit"}
|
defining data exchange models that are applicable to the incident response domain. In addition to selecting the data exchange models for sharing incident information, an organization must also work with its partner organizations to agree on the technical transport mechanisms for enabling the information exchange to occur in an automated fashion. These transport mechanisms include, at a minimum, the transport protocol for exchanging the information, the architectural model for communicating with an information resource, and the applicable ports and domain names for accessing an information resource in a particular organization. For example, a group of partner organizations may decide to exchange incident information using a Representational State Transfer (REST) architecture to exchange IODEF/Real-Time Inter-Network Defense (RID) data over Hypertext Transfer Protocol Secure (HTTPS) on port 4590 of a specifi c domain name within each organization’s DMZ. 4.2.3 Security Considerations There are several security considerations that incident response teams should consider when planning their information sharing. One is being able to designate who can see which pieces of incident information (e.g., protection of sensitive information). It may also be necessary to perform data sanitization or scrubbing to remove sensitive pieces of data from the incident information without disturbing the information on precursors, indicators, and other technical information. See Section 4.3 for more information on granular information sharing. The incident response team should also ensure that the necessary measures are taken to protect information shared with the team by other organizations. There are also many legal issues to consider regarding data sharing. See Section 4.1.2 for additional information. 4.3 Granular Information Sharing Organizations need to balance the benefits of information sharing with the drawbacks of sharing sensitive information, ideally sharing the necessary information and only the necessary information with the appropriate parties. Organizations can think of their incident information as being comprised
|
{"source": 968, "title": "from dpo"}
|
in bytes of each GPU thread. The CUDA driver automatically increases the per-thread stack size for each kernel launch as needed. This size isn’t reset back to the original value after each launch. To set the per-thread stack size to a different value, cudaDeviceSetLimit() can be called to set this limit. The stack will be immediately resized, and if necessary, the device will block until all preceding requested tasks are complete. cudaDeviceGetLimit() can be called to get the current per-thread stack size. 11.4.3.1.4. Memory Allocation and Lifetime cudaMalloc() and cudaFree() have distinct semantics between the host and device environments. When invoked from the host, cudaMalloc() allocates a new region from unused device memory. When invoked from the device runtime these functions map to device-side malloc() and free(). This implies that within the device environment the total allocatable memory is limited to the device malloc() heap size, which may be smaller than the available unused device memory. Also, it is an error to invoke cudaFree() from the host program on a pointer which was allocated by cudaMalloc() on the device or vice-versa. cudaMalloc() on Host cudaMalloc() on Device cudaFree() on Host Supported Not Supported cudaFree() on Device Not Supported Supported Allocation limit Free device memory cudaLimitMallocHeapSize 11.4.3.1.5. SM Id and Warp Id Note that in PTX %smid and %warpid are defined as volatile values. The device runtime may reschedule thread blocks onto different SMs in order to more efficiently manage resources. As such, it is unsafe to rely upon %smid or %warpid remaining unchanged across the lifetime of a thread or thread block. 11.4.3.1.6. ECC Errors No notification of ECC errors is available to code within a CUDA kernel. ECC errors are reported at the host side once the entire launch tree has completed. Any ECC errors which arise during execution
|
{"source": 2332, "title": "from dpo"}
|
financial investments. In the dynamic management of this risk, Grupo Santander aims to limit the impact of FX rate movements on the core capital ratio. In 2023, the hedged of the different currencies that have an impact on our core capital ratio was close to 100%. In December 2023, our permanent exposures (with potential impact on shareholders’ equity) were, from largest to smallest, in US dollars, Brazilian reais, British pounds sterling, Mexican pesos, Chilean pesos and Polish złoty. Grupo Santander uses FX derivatives to hedge part of those permanent positions. The Finance division manages FX risk and hedging for the expected profits and dividends of subsidiaries whose base currency is not the euro. Structural equity risk Grupo Santander holds equity positions in its banking and trading books. They are either equity instruments or stock, depending on the share of ownership or control. At the end of December 2023, the equities and shareholdings in the banking book were diversified among Spain, China, Morocco, Poland and other countries. Most of them invest in the financial and insurance sectors. Grupo Santander has minor equity exposure to property and other sectors. Structural equity positions are exposed to market risk. The Group calculates its VaR with a set of market prices and proxies. At the end of the year 2023, VaR at a 99% confidence level over a one-day horizon was EUR 171 million (EUR 195 million and EUR 309 million in 2022 and 2021, respectively. > 773 3.2. Methodologies Structural interest rate risk Grupo Santander measures the potential impact of interest rate movements on EVE and NII. Because changing rates may generate impacts, Grupo Santander must manage and control many subtypes of interest rate risk, such as repricing risk, curve risk, basis risk and option risk (e.g. behavioural or automatic). Interest rate risk in
|
{"source": 4951, "title": "from dpo"}
|
testing must be performed with real physical systems; however, quantum computers may enable a much larger range of potential designs to be explored and evaluated en route to a better final design. It is interesting to note that such ab initio calculations to aid in the design of new molecules have been attempted on classical computers; however, they have met with limited success due to the enormous computational resources needed to simulate quantum mechanics on a classical computer. Quantum computers should be able to do much better in the relatively near future. What of large-scale applications? Aside from scaling up applications like quantum simulation and quantum cryptography, relatively few large-scale applications are known: the factoring of large numbers, taking discrete logarithms, and quantum searching. In-terest in the first two of these derives mainly from the negative effect they would have of limiting the viability of existing public key cryptographic systems. (They might also be of substantial practical interest to mathematicians interested in these problems sim-ply for their own sake.) So it does not seem likely that factoring and discrete logarithm Experimental quantum information processing 49 will be all that important as applications for the long run. Quantum searching may be of tremendous use because of the wide utility of the search heuristic, and we discuss some possible applications in Chapter 6. What would really be superb are many more large-scale applications of quantum information processing. This is a great goal for the future! Given a path of potential applications for quantum information processing, how can it be achieved in real physical systems? At the small scale of a few qubits there are already several working proposals for quantum information processing devices. Perhaps the easiest to realize are based upon optical techniques, that is, electromagnetic radiation. Simple devices like mirrors and
|
{"source": 6248, "title": "from dpo"}
|
Fenn and Koichi Tanaka) for his work with protein FT NMR in solution. === Solid-state NMR spectroscopy === This technique complements X-ray crystallography in that it is frequently applicable to molecules in an amorphous or liquid-crystalline state, whereas crystallography, as the name implies, is performed on molecules in a crystalline phase. In electronically conductive materials, the Knight shift of the resonance frequency can provide information on the mobile charge carriers. Though nuclear magnetic resonance is used to study the structure of solids, extensive atomic-level structural detail is more challenging to obtain in the solid state. Due to broadening by chemical shift anisotropy (CSA) and dipolar couplings to other nuclear spins, without special techniques such as MAS or dipolar decoupling by RF pulses, the observed spectrum is often only a broad Gaussian band for non-quadrupolar spins in a solid. Professor Raymond Andrew at the University of Nottingham in the UK pioneered the development of high-resolution solid-state nuclear magnetic resonance. He was the first to report the introduction of the MAS (magic angle sample spinning; MASS) technique that allowed him to achieve spectral resolution in solids sufficient to distinguish between chemical groups with either different chemical shifts or distinct Knight shifts. In MASS, the sample is spun at several kilohertz around an axis that makes the so-called magic angle θm (which is ~54.74°, where 3cos2θm-1 = 0) with respect to the direction of the static magnetic field B0; as a result of such magic angle sample spinning, the broad chemical shift anisotropy bands are averaged to their corresponding average (isotropic) chemical shift values. Correct alignment of the sample rotation axis as close as possible to θm is essential for cancelling out the chemical-shift anisotropy broadening. There are different angles for the sample spinning relative to the applied field for the averaging of
|
{"page_id": 25110709, "title": "Nuclear magnetic resonance"}
|
short times to common ancestry. Furthermore, the distinction between modern Mexican and South American P. infestans proved less discrete, suggesting gene flow between populations over time. Admixture analysis indicated a complex relationship among these populations, hinting at potential gene flow across these regions. Historic P. infestans, collected from 1845-1889 from herbarium collections, were the first to diverge from all other P. infestans populations. Modern South American populations diverged next followed by Mexican populations which showed later ancestry. Both populations were derived from historic P. infestans. Based on the time of divergence of P. infestans from its closest relatives, P. andina and P. betacei in the Andean region, the data support the Andes as the center of origin of P. infestans, with modern globalization contributing to admixture between P. infestans populations today from Mexico, the Andes and Europe [26]. Migrations from Mexico to North America or Europe have occurred several times throughout history, probably linked to the movement of tubers. Until the 1970s, the A2 mating type was restricted to Mexico, but now in many regions of the world both A1 and A2 isolates can be found in the same region. The co-occurrence of the two mating types is significant due to the possibility of sexual recombination and formation of oospores, which can survive the winter. Only in Mexico and Scandinavia, however, is oospore formation thought to play a role in overwintering. In other parts of Europe, increasing genetic diversity has been observed as a consequence of sexual reproduction. This is notable since different forms of P. infestans vary in their aggressiveness on potato or tomato, in sporulation rate, and sensitivity to fungicides. Variation in such traits also occurs in North America, however importation of new genotypes from Mexico appears to be the predominant cause of genetic diversity, as opposed to
|
{"page_id": 165450, "title": "Phytophthora infestans"}
|
duct power the load. Each other electrode is shorted to an electrode on the opposite side of the duct. These shorts of the Faraday current induce a powerful magnetic field within the fluid, but in a chord of a circle at right angles to the Faraday current. This secondary, induced field makes the current flow in a rainbow shape between the first and last electrodes. Losses are less than in a Faraday generator, and voltages are higher because there is less shorting of the final induced current. However, this design has problems because the speed of the material flow requires the middle electrodes to be offset to "catch" the Faraday currents. As the load varies, the fluid flow speed varies, misaligning the Faraday current with its intended electrodes, and making the generator's efficiency very sensitive to its load. === Disc generator === The third and, currently, the most efficient design is the Hall effect disc generator. This design currently holds the efficiency and energy density records for MHD generation. A disc generator has fluid flowing between the center of a disc, and a duct wrapped around the edge. (The ducts are not shown.) The magnetic excitation field is made by a pair of circular Helmholtz coils above and below the disk. (The coils are not shown.) The Faraday currents flow in a perfect dead short around the periphery of the disk. The Hall effect currents flow between ring electrodes near the center duct and ring electrodes near the periphery duct. The wide flat gas flow reduced the distance, hence the resistance of the moving fluid. This increases efficiency. Another significant advantage of this design is that the magnets are more efficient. First, they cause simple parallel field lines. Second, because the fluid is processed in a disk, the magnet can
|
{"page_id": 1502835, "title": "Magnetohydrodynamic generator"}
|
were still present in Australia. The amphibian order Allocaudata became extinct. === Bivalves === In the Western Atlantic, assemblages of bivalves exhibited remarkable stasis with regards to their basal metabolic rates throughout the various climatic changes of the Pliocene. === Corals === The Pliocene was a high water mark for species diversity among Caribbean corals. From 5 to 2 Ma, coral species origination rates were relatively high in the Caribbean, although a noticeable extinction event and drop in diversity occurred at the end of this interval. == Oceans == Oceans continued to be relatively warm during the Pliocene, though they continued cooling. The Arctic ice cap formed, drying the climate and increasing cool shallow currents in the North Atlantic. Deep cold currents flowed from the Antarctic. The formation of the Isthmus of Panama about 3.5 million years ago cut off the final remnant of what was once essentially a circum-equatorial current that had existed since the Cretaceous and the early Cenozoic. This may have contributed to further cooling of the oceans worldwide. The Pliocene seas were alive with sea cows, seals, sea lions, sharks and whales. == See also == List of fossil sites (with link directory) == Notes == == References == == Further reading == Comins, Niel F.; William J. Kaufmann III (2005). Discovering the Universe (7th ed.). New York, NY: Susan Finnemore Brennan. ISBN 978-0-7167-7584-3. Gradstein, F.M.; Ogg, J.G. & Smith, A.G.; 2004: A Geologic Time Scale 2004, Cambridge University Press. Ogg, Jim (June 2004). "Overview of Global Boundary Stratotype Sections and Points (GSSP's)". Archived from the original on 23 April 2006. Retrieved 30 April 2006. Van Andel, Tjeerd H. (1994). New Views on an Old Planet: a History of Global Change (2nd ed.). Cambridge: Cambridge University Press. ISBN 978-0-521-44243-5. == External links == Mid-Pliocene Global Warming:
|
{"page_id": 23291, "title": "Pliocene"}
|
Other important examples are based on semiconductors such as InP, Si, GaN, etc., dielectrics (e.g. SiO2,TiO2), or metals (e.g. Ni, Pt). There are many applications where nanowires may become important in electronic, opto-electronic and nanoelectromechanical devices, as additives in advanced composites, for metallic interconnects in nanoscale quantum devices, as field-emitters and as leads for biomolecular nanosensors. == Synthesis == There are two basic approaches to synthesizing nanowires: top-down and bottom-up. A top-down approach reduces a large piece of material to small pieces, by various means such as lithography, milling or thermal oxidation. A bottom-up approach synthesizes the nanowire by combining constituent adatoms. Most synthesis techniques use a bottom-up approach. Initial synthesis via either method may often be followed by a nanowire thermal treatment step, often involving a form of self-limiting oxidation, to fine tune the size and aspect ratio of the structures. After the bottom-up synthesis, nanowires can be integrated using pick-and-place techniques. Nanowire production uses several common laboratory techniques, including suspension, electrochemical deposition, vapor deposition, and VLS growth. Ion track technology enables growing homogeneous and segmented nanowires down to 8 nm diameter. As nanowire oxidation rate is controlled by diameter, thermal oxidation steps are often applied to tune their morphology. === Suspension === A suspended nanowire is a wire produced in a high-vacuum chamber held at the longitudinal extremities. Suspended nanowires can be produced by: The chemical etching of a larger wire The bombardment of a larger wire, typically with highly energetic ions Indenting the tip of a STM in the surface of a metal near its melting point, and then retracting it === VLS growth === A common technique for creating a nanowire is vapor–liquid–solid method (VLS), which was first reported by Wagner and Ellis in 1964 for silicon whiskers with diameters ranging from hundreds of nm to
|
{"page_id": 52206, "title": "Nanowire"}
|
features are called "turtlebacks" due to their turtle shell-like appearance. == Volcanism and valley-fill sedimentation == Igneous activity associated with the extension occurred from 12 to 4 Ma. Both intrusive (plutonic/solidified underground) and extrusive (volcanic/solidified above ground) igneous rocks were produced. Basaltic magma followed fault lines to the surface and erupted as cinder cones and lava flows. Some volcanic rocks were re-worked by hydrothermal systems to form colorful rocks and concentrated mineral formations, such as boron-rich minerals like borax; a Pliocene-aged example is the 4,000-foot (1,200 m)-thick Artist Drive Formation. Gold and silver ores were also concentrated by mineralizing fluids from igneous intrusions. Other times, heat from magma migrating close to the surface would superheat overlaying groundwater until it exploded, not unlike an exploding pressure-cooker, forming blowout craters and tuff rings. One example of such a feature is the roughly 2000-year-old and 800 feet (240 m) deep Ubehebe Crater (photo) in the northern part of the park; nearby smaller craters may be less than 200 to 300 years old. Sediment filled the subsiding Furnace Creek Basin as the area was pulled apart by Basin and Range extension. The resulting 7,000-foot (2,100 m)-thick Furnace Creek Formation is made of lakebed sediments that consist of saline muds, gravels from nearby mountains and ash from the then-active Black Mountain volcanic field. Boron, which is abundant in this formation, is dissolved by ground water and flows out onto the northern end of the Death Valley playa. Today this formation is most-prominently exposed in the badlands at Zabriskie Point. Additional subsidence of the Furnace Creek Basin was filled by the four-million-year-old Funeral Formation, which consists of 2,000 feet (610 m) of conglomerates, sand, mud and volcanic material. Another smaller basin to the south was filled by the Copper Canyon Formation around the same time. Footprints
|
{"page_id": 1134149, "title": "Geology of the Death Valley area"}
|
Rubí Elena Rodríguez Moreno is a Chilean mathematician in the department of mathematics and statistics at the University of La Frontera, a founder of the Iberoamerican Congress on Geometry, and former president of the Chilean Mathematical Society. Her research specialties include complex geometry, Fuchsian groups, Riemann surfaces, and abelian varieties. == Education == Rodríguez earned a master's degree in mathematics at the Universidad Técnica del Estado in 1975. She completed her Ph.D. in 1981 at Columbia University; her dissertation, On Schottky-Type Groups with Applications to Riemann Surfaces with Nodes, was supervised by Lipman Bers. == Career == Rodríguez worked for the University of Santiago, Chile, but was dismissed in 1985, during the regime of Augusto Pinochet, for unstated but likely-political reasons. After many colleagues appealed the decision, she was hired by the Federico Santa María Technical University. She was president of the Chilean Mathematical Society from 2006 to 2010. == Books == Rodríguez is the co-author of the book Complex Analysis: In the Spirit of Lipman Bers (Graduate Texts in Mathematics, 2007, 2nd ed., 2013), with Irwin Kra and Jane Piore Gilman. She is the co-editor of Lipman Bers, a Life in Mathematics (American Mathematical Society, 2015), with Linda Keen and Irwin Kra. == References ==
|
{"page_id": 61729963, "title": "Rubí Rodríguez"}
|
after being stimulated. This method primarily observes the movement of U, Th, Rb and K as ionizing radiation. The product of stimulating these elements is a reliable date on the sediment. == See also == Brunhes–Matuyama reversal Eltanin impact of 2.51 ± 0.07 million years ago Jaramillo reversal Electromagnetic field Field (physics) Electric charge == References ==
|
{"page_id": 6982510, "title": "Gauss–Matuyama reversal"}
|
transmittance of 1 2 ( 1 + a x 2 + a z 2 ) {\displaystyle {\frac {1}{2}}(1+{\sqrt {a_{x}^{2}+a_{z}^{2}}})} at θ 0 = 1 2 arctan ( a x / a z ) {\displaystyle \theta _{0}={\frac {1}{2}}\arctan {(a_{x}/a_{z})}} if a z > 0 {\displaystyle a_{z}>0} , or at θ 0 = 1 2 arctan ( a x / a z ) + π 2 {\displaystyle \theta _{0}={\frac {1}{2}}\arctan {(a_{x}/a_{z})}+{\frac {\pi }{2}}} if a z < 0 {\displaystyle a_{z}<0} ; the minimum transmittance of 1 2 ( 1 − a x 2 + a z 2 ) {\displaystyle {\frac {1}{2}}(1-{\sqrt {a_{x}^{2}+a_{z}^{2}}})} is reached at the perpendicular to the maximum transmittance direction. Here, the ratio of maximum transmittance to minimum transmittance is defined as the extinction ratio E R = ( 1 + D O L P ) / ( 1 − D O L P ) {\displaystyle ER=(1+DOLP)/(1-DOLP)} , where the degree of linear polarization is D O L P = a x 2 + a z 2 {\displaystyle DOLP={\sqrt {a_{x}^{2}+a_{z}^{2}}}} . Equivalently, the formula for the transmittance can be rewritten as A cos 2 ( θ − θ 0 ) + B {\displaystyle A\cos ^{2}{(\theta -\theta _{0})}+B} , which is an extended form of Malus's law; here, A , B {\displaystyle A,B} are both non-negative, and is related to the extinction ratio by E R = ( A + B ) / B {\displaystyle ER=(A+B)/B} . Two of the normalized Stokes parameters can also be calculated by a x = D O L P sin 2 θ 0 , a z = D O L P cos 2 θ 0 , D O L P = ( E R − 1 ) / ( E R + 1 ) {\displaystyle a_{x}=DOLP\sin {2\theta _{0}},\,a_{z}=DOLP\cos {2\theta _{0}},\,DOLP=(ER-1)/(ER+1)}
|
{"page_id": 1515472, "title": "Stokes parameters"}
|
their standardization. This would prevent protocol standards with overlapping functionality and would allow clear definition of the responsibilities of a protocol at the different levels (layers). This gave rise to the Open Systems Interconnection model (OSI model), which is used as a framework for the design of standard protocols and services conforming to the various layer specifications. In the OSI model, communicating systems are assumed to be connected by an underlying physical medium providing a basic transmission mechanism. The layers above it are numbered. Each layer provides service to the layer above it using the services of the layer immediately below it. The top layer provides services to the application process. The layers communicate with each other by means of an interface, called a service access point. Corresponding layers at each system are called peer entities. To communicate, two peer entities at a given layer use a protocol specific to that layer which is implemented by using services of the layer below. For each layer, there are two types of standards: protocol standards defining how peer entities at a given layer communicate, and service standards defining how a given layer communicates with the layer above it. In the OSI model, the layers and their functionality are (from highest to lowest layer): The Application layer may provide the following services to the application processes: identification of the intended communication partners, establishment of the necessary authority to communicate, determination of availability and authentication of the partners, agreement on privacy mechanisms for the communication, agreement on responsibility for error recovery and procedures for ensuring data integrity, synchronization between cooperating application processes, identification of any constraints on syntax (e.g. character sets and data structures), determination of cost and acceptable quality of service, selection of the dialogue discipline, including required logon and logoff procedures. The
|
{"page_id": 28030850, "title": "Communication protocol"}
|
shared-use path and roadway users, B. Relative volumes of shared-use path and roadway traffic, and C. Relative importance of shared-use path and roadway. > 07 Speed should not be the sole factor used to determine priority, as it is sometimes appropriate to give priority to a high-volume shared-use path that crosses a low-volume street, or to a regional shared-use path that crosses a minor collector street. > 08 When priority is assigned (see Sections 2B.06 and 2B.08), the least-restrictive control that is appropriate should be placed on the lower-priority approaches. STOP signs should not be used where YIELD signs would provide adequate control. Section 9B.02 EXCEPT BICYCLES Regulatory Plaque (R3-7bP) Support: > 01 There are circumstances where it might be appropriate to exempt bicyclists from regulatory restrictions applied to other traffic. Guidance: > 02 Where an engineering study or engineering judgment demonstrates that it is appropriate to exempt bicyclists from the provisions of a regulatory sign, the EXCEPT BICYCLES (R3-7bP) regulatory plaque (see Figure 9B-1) should be used. Support: > 03 Figure 9B-2 shows examples of how the EXCEPT BICYCLES (W16-20P) regulatory plaque can be applied. > 04 Section 9C.05 contains information regarding the EXCEPT BICYCLES warning plaque when applicable to a warning sign. Figure 9B-2. Examples of Applications of EXCEPT BICYCLES Regulatory Plaques > R3-7bP > R3-7bP > R3-7bP > R3-2 > R3-1 > R3-8 > (modified) > R5-1 > R3-8 > (modified) > R3-7bP > Legend > Direction of travel > R3-7bP Page 1 054 MUTCD 11th Edition Decembe r 2023 Sect. 9B.02 to 9B.04 Standard: > 05 The EXCEPT BICYCLES regulatory plaque shall not be used to exempt bicyclists from the legal requirement of a STOP or YIELD sign, Yield Here to Pedestrians Signs, Stop Here for Pedestrians Signs, or a traffic signal indication. > 06 Where
|
{"source": 1185, "title": "from dpo"}
|
vol 2. IEEE, pp 655–662 Chapter 13 Combining Deep Learning and Structured Prediction for Segmenting Masses in Mammograms Neeraj Dhungel, Gustavo Carneiro and Andrew P. Bradley Abstract The segmentation of masses from mammogram is a challenging problem because of their variability in terms of shape, appearance and size, and the low signal-to-noise ratio of their appearance. We address this problem with structured output prediction models that use potential functions based on deep convolution neural network (CNN) and deep belief network (DBN). The two types of structured output prediction models that we study in this work are the conditional random field (CRF) and structured support vector machines (SSVM). The label inference for CRF is based on tree re-weighted belief propagation (TRW) and training is achieved with the truncated fitting algorithm; whilst for the SSVM model, inference is based upon graph cuts and training depends on a max-margin optimization. We compare the results produced by our proposed models using the publicly available mammogram datasets DDSM-BCRP and INbreast, where the main conclusion is that both models produce results of similar accuracy, but the CRF model shows faster training and inference. Finally, when compared to the current state of the art in both datasets, the proposed CRF and SSVM models show superior segmentation accuracy. ## 13.1 Introduction Statistical findings published by World Health Organization (WHO) reveal that 23% of all diagnosed cancers and 14% of all cancer related deaths among women are due to breast cancer. These numbers show that breast cancer is one of the major N. Dhungel ( B) · G. Carneiro Australian Centre for Visual Technologies, The University of Adelaide, Adelaide, SA, Australia e-mail: neeraj.dhungel@adelaide.edu.au G. Carneiro e-mail: gustavo.carneiro@adelaide.edu.au A.P. Bradley School of Information Technology and Electrical Engineering, The University of Queensland, St Lucia, QLD, Australia e-mail: a.bradley@itee.uq.edu.au © Springer
|
{"source": 3344, "title": "from dpo"}
|
often implemented using varying programming languages and involve diverse frameworks and configuration files. To address this issue, this paper presents Microscope, a language-agnostic change impact analysis that uniformly represents the code, configuration files, frameworks, and code changes by relational Datalog rules. Microscope then benefits from an efficient Datalog solver to identify impacted interfaces. Experiments based on the use of Microscope in a leading software company demonstrate that Microscope is both effective and fast as it successfully identifies interfaces impacted by 112 code commits, with moderate time overhead, and could reduce 97% of interfaces to test and save 73% of testing time after code changes. Tags: "Analysis", "Prog Comprehension/Reeng/Maint" ##### Robert Thompson, Nuno Saavedra, Pedro Carrott, Kevin Fisher, Alex Sanchez-Stern, Yuriy Brun, João F. Ferreira, Sorin Lerner, Emily First, "Rango: Adaptive Retrieval-Augmented Proving for Automated Software Verification" **Abstract:** Formal verification using proof assistants, such as Coq, allows for high-quality software. However, the verification process is expensive, requiring significant expertise and manual effort to write proofs. Recent work has explored automating proof synthesis using machine learning, and even more recently, large language models (LLMs), showing that retrieving relevant premises (such as lemmas and definitions) is helpful for these models. We present Rango, a fully automated proof synthesis tool for Coq that uses, not only relevant premises but also similar proofs from the current project. Rango uses retrieval augmentation at every step of the proof to automatically determine which proofs and premises to include in the context of its fine-tuned LLM. In this way, Rango adapts to the project _and_ to the evolving state of the proof. We create a new dataset, CoqStoq, of 2,205 open-source Coq projects from GitHub, which includes both training data and a curated evaluation benchmark of well-maintained projects. On this benchmark, Rango synthesizes 27.7% of the proofs, which
|
{"source": 5646, "title": "from dpo"}
|
, , , , i32 ) declare @llvm.vp.fshr.v256i64 ( , , , , i32 ) Overview: Predicated fshr of three vectors of integers. Arguments: The first three arguments and the result have the same vector of integer type. The fourth argument is the vector mask and has the same number of elements as the result vector type. The fifth argument is the explicit vector length of the operation. Semantics: The ‘llvm.vp.fshr’ intrinsic performs fshr (fshr) of the first, second, and third vector argument on each enabled lane. The result on disabled lanes is a poison value. Examples: %r = call @llvm.vp.fshr.v4i32( %a, %b, %c, %mask, i32 %evl) ;; For all lanes below %evl, %r is lane-wise equivalent to %also.r %t = call @llvm.fshr.v4i32( %a, %b, %c) %also.r = select %mask, %t, poison ‘llvm.vp.is.fpclass.*’ Intrinsics Syntax: This is an overloaded intrinsic. declare @llvm.vp.is.fpclass.nxv2f32( , i32 , , i32 ) declare @llvm.vp.is.fpclass.v2f16( , i32 , , i32 ) Overview: Predicated llvm.is.fpclass llvm.is.fpclass Arguments: The first argument is a floating-point vector, the result type is a vector of boolean with the same number of elements as the first argument. The second argument specifies, which tests to perform llvm.is.fpclass. The third argument is the vector mask and has the same number of elements as the result vector type. The fourth argument is the explicit vector length of the operation. Semantics: The ‘llvm.vp.is.fpclass’ intrinsic performs llvm.is.fpclass (llvm.is.fpclass). Examples: %r = call @llvm.vp.is.fpclass.v2f16( %x, i32
|
{"source": 6618, "title": "from dpo"}
|
the neurological consequences are not as marked as in cases of congenital cofactor deficiency. A congenital molybdenum cofactor deficiency disease, seen in infants, is an inability to synthesize molybdenum cofactor, the heterocyclic molecule discussed above that binds molybdenum at the active site in all known human enzymes that use molybdenum. The resulting deficiency results in high levels of sulfite and urate, and neurological damage. === Excretion === Most molybdenum is excreted from the human body as molybdate in the urine. Furthermore, urinary excretion of molybdenum increases as dietary molybdenum intake increases. Small amounts of molybdenum are excreted from the body in the feces by way of the bile; small amounts also can be lost in sweat and in hair. === Excess and copper antagonism === High levels of molybdenum can interfere with the body's uptake of copper, producing copper deficiency. Molybdenum prevents plasma proteins from binding to copper, and it also increases the amount of copper that is excreted in urine. Ruminants that consume high levels of molybdenum suffer from diarrhea, stunted growth, anemia, and achromotrichia (loss of fur pigment). These symptoms can be alleviated by copper supplements, either dietary and injection. The effective copper deficiency can be aggravated by excess sulfur. Copper reduction or deficiency can also be deliberately induced for therapeutic purposes by the compound ammonium tetrathiomolybdate, in which the bright red anion tetrathiomolybdate is the copper-chelating agent. Tetrathiomolybdate was first used therapeutically in the treatment of copper toxicosis in animals. It was then introduced as a treatment in Wilson's disease, a hereditary copper metabolism disorder in humans; it acts both by competing with copper absorption in the bowel and by increasing excretion. It has also been found to have an inhibitory effect on angiogenesis, potentially by inhibiting the membrane translocation process that is dependent on copper ions.
|
{"page_id": 19052, "title": "Molybdenum"}
|
) x i = ( 1 Γ ( α ) β α ) n ( ∏ i = 1 n x i ) α − 1 e − 1 β ∑ i = 1 n x i . {\displaystyle {\begin{aligned}f_{X_{1}^{n}}(x_{1}^{n})&=\prod _{i=1}^{n}\left({1 \over \Gamma (\alpha )\beta ^{\alpha }}\right)x_{i}^{\alpha -1}e^{(-1/\beta )x_{i}}\\[5pt]&=\left({1 \over \Gamma (\alpha )\beta ^{\alpha }}\right)^{n}\left(\prod _{i=1}^{n}x_{i}\right)^{\alpha -1}e^{{-1 \over \beta }\sum _{i=1}^{n}x_{i}}.\end{aligned}}} The joint density of the sample takes the form required by the Fisher–Neyman factorization theorem, by letting h ( x 1 n ) = 1 , g ( α , β ) ( x 1 n ) = ( 1 Γ ( α ) β α ) n ( ∏ i = 1 n x i ) α − 1 e − 1 β ∑ i = 1 n x i . {\displaystyle {\begin{aligned}h(x_{1}^{n})=1,\,\,\,g_{(\alpha \,,\,\beta )}(x_{1}^{n})=\left({1 \over \Gamma (\alpha )\beta ^{\alpha }}\right)^{n}\left(\prod _{i=1}^{n}x_{i}\right)^{\alpha -1}e^{{-1 \over \beta }\sum _{i=1}^{n}x_{i}}.\end{aligned}}} Since h ( x 1 n ) {\displaystyle h(x_{1}^{n})} does not depend on the parameter ( α , β ) {\displaystyle (\alpha \,,\,\beta )} and g ( α , β ) ( x 1 n ) {\displaystyle g_{(\alpha \,,\,\beta )}(x_{1}^{n})} depends only on x 1 n {\displaystyle x_{1}^{n}} through the function T ( x 1 n ) = ( ∏ i = 1 n x i , ∑ i = 1 n x i ) , {\displaystyle T(x_{1}^{n})=\left(\prod _{i=1}^{n}x_{i},\sum _{i=1}^{n}x_{i}\right),} the Fisher–Neyman factorization theorem implies T ( X 1 n ) = ( ∏ i = 1 n X i , ∑ i = 1 n X i ) {\displaystyle T(X_{1}^{n})=\left(\prod _{i=1}^{n}X_{i},\sum _{i=1}^{n}X_{i}\right)} is a sufficient statistic for ( α , β ) . {\displaystyle (\alpha \,,\,\beta ).} == Rao–Blackwell theorem == Sufficiency finds a useful application in the Rao–Blackwell theorem, which states that if g(X) is any kind of estimator
|
{"page_id": 140841, "title": "Sufficient statistic"}
|
their dominance to stop during the Mesozoic. Sauropsids (reptiles, and also, later, birds) also diversified but remained small until the Mesozoic, during which they dominated the land, as well as the water and sky, only for their dominance to stop during the Cenozoic. Reptiles underwent a major evolutionary radiation in response to the drier climate that preceded the rainforest collapse. By the end of the Carboniferous amniotes had already diversified into a number of groups, including several families of synapsid pelycosaurs, protorothyridids, captorhinids, saurians and araeoscelids. === Fungi === As plants and animals were growing in size and abundance in this time, land fungi diversified further. Marine fungi still occupied the oceans. All modern classes of fungi were present in the late Carboniferous. == Extinction events == === Romer's gap === The first 15 million years of the Carboniferous had very limited terrestrial fossils. While it has long been debated whether the gap is a result of fossilisation or relates to an actual event, recent work indicates there was a drop in atmospheric oxygen levels, indicating some sort of ecological collapse. The gap saw the demise of the Devonian fish-like ichthyostegalian labyrinthodonts and the rise of the more advanced temnospondylian and reptiliomorphan amphibians that so typify the Carboniferous terrestrial vertebrate fauna. === Carboniferous rainforest collapse === Before the end of the Carboniferous, an extinction event occurred. On land this event is referred to as the Carboniferous rainforest collapse. Vast tropical rainforests collapsed suddenly as the climate changed from hot and humid to cool and arid. This was likely caused by intense glaciation and a drop in sea levels. The new climatic conditions were not favorable to the growth of rainforest and the animals within them. Rainforests shrank into isolated islands, surrounded by seasonally dry habitats. Towering lycopsid forests with a
|
{"page_id": 5401, "title": "Carboniferous"}
|
a five-year agreement with Kacific Broadband Satellites for the supply of provide high speed bandwidth to the islands of Tuvalu. From 2017 the service was provided by the Kacific-1 satellite - Ka band High-throughput satellite (HTS) provided by Kacific Broadband Satellites which provided TTC with increased levels of capacity over the period. In July 2020, the Government of Tuvalu signed a five-year agreement with Kacific for 400 Mbps to 600 Mbps of satellite capacity. the agreement provides a comprehensive turnkey service including sixty 1.2 metre VSAT terminals (satellite dishes) for schools, medical clinics, government agencies and small businesses, forty outdoor WiFi access points to support community connectivity with WiFi hotspots, three maritime antennae to connect ferry services, and one Ka-band antennae to provide trunking and backhaul services for the mobile phone network. As of February 2022, the delivered satellite capacity into Tuvalu was a combined capacity of 510 mbps split between Agility Beyond Space (ABS) (Ku Band) and Kacific (Ka band). The average download of data per device is about 9 GB/user/month, with 95% of devices in use being 4G/ LTE capable. Also, Tuvalu has 5,915 active broadband users (the largest base of users is on Funafuti), with dedicated satellite and hotspot users on the outer islands, each of which has 3 to 5 hotspots. == Tuvalu Telecommunications and ICT Development Project == In January 2019 the World Bank approved a US$29 million grant for the Tuvalu Telecommunications and ICT Development Project which is intended to boost internet connectivity in Tuvalu, including to the country's outer islands. The project will also support investments in an international optical fiber submarine cable to provide faster, lower-cost internet bandwidth. The project will include reforms of the Tuvalu Telecommunications Corporation (TCC) to redevelop the government-run entity as a public-private partnership (PPP) in cooperation with
|
{"page_id": 30233, "title": "Telecommunications in Tuvalu"}
|
Reducing the particle size The Zener pinning pressure is orientation dependent, which means that the exact pinning pressure depends on the amount of coherence at the grain boundaries. [1] == Computer Simulation == Particle pinning has been studied extensively with computer simulations, such as Monte Carlo and phase field methods. These methods can capture interfaces with complex shapes and provide better approximations for the pinning force. == Notes == According to Current issues in recrystallization: a review, R.D. Doherty et al., Materials Science and Engineering A238 (1997), p 219-274 For information on zener pinning modeling see: - "Contribution à l'étude de la dynamique du Zener pinning: simulations numériques par éléments finis", Thesis in French (2003). by G. Couturier. - "3D finite element simulation of the inhibition of normal grain growth by particles". Acta Materialia, 53, pp. 977–989, (2005). by G. Couturier, R. Doherty, Cl. Maurice, R. Fortunier. - "3D finite element simulation of Zener pinning dynamics". Philosophical Magazine, vol 83, n° 30, pp. 3387–3405, (2003). by G. Couturier, Cl. Maurice, R. Fortunier.
|
{"page_id": 3470540, "title": "Zener pinning"}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.