text
stringlengths
5
10.5k
source
stringlengths
33
146
equilibrium, Mimas and Tethys have very low densities and it has been suggested that they may have non-negligible internal porosity, in which case they would not be satellite planets. The situation for Uranus's three smaller ellipsoidal moons (Umbriel, Ariel and Miranda) is unclear, as is that of Pluto's moon Charon. The TNO moons Eris I Dysnomia, Orcus I Vanth, and possibly Varda I Ilmarë are at least the size of Mimas, the smallest ellipsoidal moon of Saturn. However, trans-Neptunian objects appear to become solid bodies at a larger size (around 900–1000 km diameter) than the moons of Saturn and Uranus (around 400 km diameter). Both Dysnomia and Vanth are dark bodies smaller than 900–1000 km, and Dysnomia is known to be low-density, suggesting that it cannot be solid. Consequently, these bodies have been excluded. === List === – believed to be in equilibrium – confirmed not to be in equilibrium – uncertain evidence Methone, Pallene, and, with less certainty, Aegaeon are in hydrostatic equilibrium. However, as they are not planetary-mass objects, these are not included as planetary-mass moons. === Atmospheres === Titan has a denser atmosphere than Earth, with a surface pressure of 1.4 bar, while Triton has a relatively thinner atmosphere of 14 μbar; Titan and Triton are the only known moons to have atmospheres significant enough to drive weather and climate processes. Io (1.9 nbar) and Callisto (26 pbar) have very thin atmospheres, but still enough to have collisions between atmospheric molecules. Other planetary-mass moons only have exospheres at most. Exospheres have been detected around Earth's Moon, Europa, Ganymede, Enceladus, Dione, and Rhea. An exosphere around Titania is a possibility, though it has not been confirmed. == See also == List of gravitationally rounded objects of the Solar System List of Solar System objects by size == References
{"page_id": 27361858, "title": "Planetary-mass moon"}
where thin layers are used on small areas, e.g., fireable inks, or where the joint will be subjected to a permanent compression (e.g., by an external steel shell) offsetting the thermally introduced tensile stresses. Glass solder can be used as an intermediate layer when joining materials (glasses, ceramics) with significantly different coefficient of thermal expansion; such materials cannot be directly joined by diffusion welding. Evacuated glazing windows are made of glass panels soldered together. A glass solder is used, e.g., for joining together parts of cathode ray tubes and plasma display panels. Newer compositions lowered the usage temperature from 450 to 390 °C (840 to 730 °F) by reducing the lead(II) oxide content down from 70%, increasing the zinc oxide content, adding titanium dioxide and bismuth(III) oxide and some other components. The high thermal expansion of such glass can be reduced by a suitable ceramic filler. Lead-free solder glasses with soldering temperature of 450 °C (842 °F) were also developed. Phosphate glasses with low melting temperature were developed. One of such compositions is phosphorus pentoxide, lead(II) oxide, and zinc oxide, with addition of lithium and some other oxides. Electrically conductive glass solders can be also prepared. == Advantages == The following advantages result from using the glass frit bonding procedure: screen printing process applicable on thin, structured wafer no electrical potentials during bonding process necessary low tension due to low bonding temperature selective bonding based on structured intermediate glass layer bonding of rough wafer surfaces no outgassing after bonding, better chemical durability, higher strength compared to organic adhesives high reliability and stable hermetical sealing easier process compared to metallic or eutectic layer procedures == References ==
{"page_id": 31336130, "title": "Glass frit bonding"}
EPEAT status if an appropriate EPEAT category exists for those devices. The FAR was updated in 2015 to reflect EPEAT's addition of the Imaging Equipment and Television categories. In January 2010, Amazon.com began using EPEAT to identify greener electronic products on its website. Multiple international organizations provide EPEAT-registration services for manufacturers in North America, Europe, Asia, South America and Australia. These organizations, called Conformity Assurance Bodies, include Green Electronics Council's Conformity Assurance Body, Dekra, UL Environment, Intertek, TuV Rheinland, CQC, CESI and VDE. Each company has Auditors qualified to evaluate the conformance claims of electronics manufacturers and suppliers. In July 2014, the EPEAT system expanded to support product registrations in India. With the addition of India, EPEAT was available in 43 countries. == Apple's Retina MacBook Pro controversy == In 2012, Apple's Retina MacBook Pro debuted on EPEAT with a Gold rating after briefly deciding to remove all of its products from EPEAT. The laptop was accepted following a number of "clarifications" of the standard, for example specifying that the presence of USB ports was now considered sufficient to meet the upgradability requirement, and that tools to disassemble the laptop need only be available for purchase by the public. iFixit.org labelled the laptop as "the least repairable, least recyclable computer encountered in more than a decade of disassembling electronics" and joined Greenpeace in denouncing a suspected case of greenwashing. == References == == External links == Electronic Product Environmental Assessment Tool EPEAT at the United States Environmental Protection Agency
{"page_id": 28228644, "title": "Electronic Product Environmental Assessment Tool"}
lethality. For its calculation the points are accumulated, according to associated diseases, as well as the addition of a single point for each 10 years of age for patients of ages above forty years (in 50 years 1 point, 60 years 2 points etc.). The distinguishing feature and undisputed advantage of the Charlson Index is the capability of evaluating the patient's age and determination of the patient's mortality rate, which in the absence of comorbidity is 12%, at 1–2 points it is 26%; at 3–4 points it is 52% and with the accumulation of more than 5 points it is 85%. Regretfully this method has some deficiencies: Evaluating comorbidity severity of many diseases is not considered, as well as the absence of many important for prognosis disorders. Apart from that it is doubtful that possible prognosis for a patient with bronchial asthma and chronic leukemia is comparable to the prognosis for the patient ailing from myocardial infarction and cerebral infarction. In this case comorbidity of patient S, 73 years of age according to this method, is equivalent to mild state (9 out of 40 points). Modified Charlson Index: R. A. Deyo, D. C. Cherkin, and Marcia Ciol added chronic forms of ischemic cardiac disorder and the stages of chronic cardiac insufficiency to this index in 1992. Elixhauser Index: The Elixhauser comorbidity measure include 30 comorbidities, which are not simplified as an index. Elixhauser shows a better predictive performance for mortality risk especially beyond 30 days of hospitalization. Index of Co-Existent Disease (ICED): This Index was first developed in 1993 by S. Greenfield to evaluate comorbidity in patients with malignant neoplasms, later it also became useful for other categories of patients. This method helps in calculating the duration of a patient's stay at a hospital and the risks of repeated admittance
{"page_id": 217631, "title": "Comorbidity"}
journalists and science communicators that 'it is our obligation as scientists and citizens to speak up for science ... be a force for science. Schaal established both the Distinguished Teaching Award and the Faculty Leadership Award in 2014 as a way to recognize exceptional commitment to Arts & Sciences and its students. In 2023, Schaal was elected as a member of the American Philosophical Society. == References ==
{"page_id": 6024808, "title": "Barbara A. Schaal"}
SMTP service provided by AWS. **Answer:** B Amazon SES is an email platform that provides an easy, cost-effective way for you to send and receive email using your own email addresses and domains. For example, you can send marketing emails such as special offers, transactional emails such as order confirmations, and other types of correspondence such as newsletters. When you use Amazon SES to receive mail, you can develop software solutions such as email autoresponders, email unsubscribe systems and applications that generate customer support tickets from incoming emails. !Image 10 You have configured AWS S3 event notification to send a message to AWS Simple Queue Service whenever an object is deleted. You are performing a ReceiveMessage API operation on the AWS SQS queue to receive the S3 delete object message onto AWS EC2 instance. For any successful message operations, you are deleting them from the queue. For failed operations, you are not deleting the messages. You have developed a retry mechanism which reruns the application every 5 minutes for failed ReceiveMessage operations. However, you are not receiving the messages again during the rerun. What could have caused this?_** A. AWS SQS deletes the message after it has been read through ReceiveMessage API B. You are using Long Polling which does not guarantee message delivery. C. Failed ReceiveMessage queue messages are automatically sent to Dead Letter Queues. You need to ReceiveMessage from Dead Letter Queue for failed retries. D. Visibility Timeout on the SQS queue is set to 10 minutes. **Answer:** D When a consumer receives and processes a message from a queue, the message remains in the queue. Amazon SQS doesn’t automatically delete the message. Because Amazon SQS is a distributed system, there’s no guarantee that the consumer actually receives the message (for example,
{"source": 1736, "title": "from dpo"}
we highlight that ViTs, unlike conventional CNNs, exhibit distinct attention points in the frequency domain. Leveraging this insight, we delve into exploring frequency domain to further enhance the algorithm's transferability. Through extensive experimentation on various ViT variants and traditional CNN models, we substantiate that the new approach achieves state-of-the-art performance, with an average performance improvement of 33.54\% and 42.05\% on ViT and CNN models, respectively. Our code is available at: _Guanting Chen, Xiaocheng Li, Chunlin Sun, Hanzhao Wang_ **tl;dr:** This paper provides models and algorithms that analyze the optimal advice policy, taking into account the possibility that humans might distrust the advice. !Image 2178 systems play an increasingly prominent role in human decision-making, challenges surface in the realm of human-AI interactions. One challenge arises from the suboptimal AI policies due to the inadequate consideration of humans disregarding AI recommendations, as well as the need for AI to provide advice selectively when it is most pertinent. This paper presents a sequential decision-making model that (i) takes into account the human's adherence level (the probability that the human follows/rejects machine advice) and (ii) incorporates a defer option so that the machine can temporarily refrain from making advice. We provide learning algorithms that learn the optimal advice policy and make advice only at critical time stamps. Compared to problem-agnostic reinforcement learning algorithms, our specialized learning algorithms not only enjoy better theoretical convergence properties but also show strong empirical performance. _Chuheng Zhang, Xiangsen Wang, Wei Jiang, Xianliang Yang, Siwei Wang, Lei Song, Jiang Bian_ **tl;dr:** We propose a novel form of Whittle index that extend to a MARL setting suitable for practical inventory management. ![Image 2179]( Whittle index is a heuristic tool that leads to good performance for the restless bandits problem. In this paper, we extend Whittle index
{"source": 3883, "title": "from dpo"}
we outline an automated approach to segment neurons in a 20x expanded hippocampus slice expressing Brainbow fluorescent proteins. We first use a neural network as a mask to filter data, oversegment in color space to create supervoxels, and finally merge those supervoxels together to reconstruct the 3D volume for an individual neuron. The results demonstrate this approach shows promise to harness ExM data for 3D neural imaging. Our approach offers several insights that can guide future work. ### 130) Andrew Gritsevskiy, Towards Generative Drug Discovery: Metric Learning using Variational Autoencoders !Image 419 Kaan Dokmeci, Theorems on Field Extensions and Radical Denesting ![Image 420]( The problem of radical denesting is the problem that looks into given nested radical expressions and ways to denest them, or
{"source": 5874, "title": "from dpo"}
v ) . {\displaystyle {\begin{aligned}u^{2}(v,p)&=u_{0}^{2}+(p-p_{0})(v_{0}+v),\\[1.2ex]e(v,p)&=e_{0}+{\tfrac {1}{2}}(p+p_{0})(v_{0}-v).\end{aligned}}} The Hugoniot equation, coupled with the fundamental equation of state of the material: e = e ( v , p ) , {\displaystyle e=e(v,p),} describes in general in the pressure volume plane a curve passing by the conditions (v0, p0), i.e. the Hugoniot curve, whose shape strongly depends on the type of material considered. It is also customary to define a Hugoniot function: h ( v , s ) ≡ e ( v , s ) − e 0 + 1 2 ( p ( v , s ) + p 0 ) ( v − v 0 ) , {\displaystyle {\mathfrak {h}}(v,s)\equiv e(v,s)-e_{0}+{\tfrac {1}{2}}(p(v,s)+p_{0})(v-v_{0}),} allowing to quantify deviations from the Hugoniot equation, similarly to the previous definition of the hydraulic head, useful for the deviations from the Bernoulli equation. === Finite volume form === On the other hand, by integrating a generic conservation equation: ∂ y ∂ t + ∇ ⋅ F = s , {\displaystyle {\frac {\partial \mathbf {y} }{\partial t}}+\nabla \cdot \mathbf {F} =\mathbf {s} ,} on a fixed volume Vm, and then basing on the divergence theorem, it becomes: d d t ∫ V m y d V + ∮ ∂ V m F ⋅ n ^ d s = S . {\displaystyle {\frac {d}{dt}}\int _{V_{m}}\mathbf {y} dV+\oint _{\partial V_{m}}\mathbf {F} \cdot {\hat {n}}ds=\mathbf {S} .} By integrating this equation also over a time interval: ∫ V m y ( r , t n + 1 ) d V − ∫ V m y ( r , t n ) d V + ∫ t n t n + 1 ∮ ∂ V m F ⋅ n ^ d s d t = 0 . {\displaystyle \int _{V_{m}}\mathbf {y} (\mathbf {r} ,t_{n+1})\,dV-\int _{V_{m}}\mathbf {y} (\mathbf {r} ,t_{n})\,dV+\int _{t_{n}}^{t_{n+1}}\oint _{\partial V_{m}}\mathbf
{"page_id": 396022, "title": "Euler equations (fluid dynamics)"}
the spores of bacteria, yeasts, and fungi. They include some aquatic species, which live on dead plant parts submerged in ponds. Cellular slime molds are most numerous in the tropics, decreasing with latitude, but are cosmopolitan in distribution, occurring in soil even in the Arctic and the Antarctic. In the Alaskan tundra, the only slime molds are the dictyostelids D. mucoroides and D. sphaerocephalum. The species of Copromyxa are coprophilous, feeding on dung. Some myxogastrians have their spores dispersed by animals. The slime mold fly Epicypta testata lay its eggs within the spore mass of Enteridium lycoperdon, which the larvae feed on. These pupate, and the hatching adults carry and disperse spores that have stuck to them. While various insects consume slime molds, Sphindidae slime mold beetles, both larvae and adults, exclusively feed on them. == Life cycle == === Plasmodial slime molds === Plasmodial slime molds begin life as amoeba-like cells. These unicellular amoebae are commonly haploid and feed on small prey such as bacteria, yeast cells, and fungal spores by phagocytosis, engulfing them with its cell membrane. These amoebae can mate if they encounter the correct mating type and form zygotes that then grow into plasmodia. These contain many nuclei without cell membranes between them, and can grow to meters in size. The species Fuligo septica is often seen as a slimy yellow network in and on rotting logs. The amoebae and the plasmodia engulf microorganisms. The plasmodium grows into an interconnected network of protoplasmic strands. Within each protoplasmic strand, the cytoplasmic contents rapidly stream, periodically reversing direction. The streaming protoplasm within a plasmodial strand can reach speeds of up to 1.35 mm per second in Physarum polycephalum, the fastest for any microorganism. Slime molds are isogamous, which means that their gametes (reproductive cells) are all the same
{"page_id": 26725, "title": "Slime mold"}
concert with a third transcription factor, Eomes, these genes act to suppress pluripotency genes like Oct4 and Nanog in the outside cells. Thus, TE becomes specified and differentiates. Inside cells, however, do not turn on the Cdx2 gene, and express high levels of Oct4, Nanog, and Sox2. These genes suppress Cdx2 and the inside cells maintain pluripotency generate the ICM and eventually the rest of the embryo proper. Although this dichotomy of genetic interactions is clearly required to divide the blastomeres of the mouse embryo into both the ICM and TE identities, the initiation of these feedback loops remains under debate. Whether they are established stochastically or through an even earlier asymmetry is unclear, and current research seeks to identify earlier markers of asymmetry. For example, some research correlates the first two cleavages during embryogenesis with respect to the prospective animal and vegetal poles with ultimate specification. The asymmetric division of epigenetic information during these first two cleavages, and the orientation and order in which they occur, may contribute to a cell's position either inside or outside the morula. == Stem cells == Blastomeres isolated from the ICM of mammalian embryos and grown in culture are known as embryonic stem (ES) cells. These pluripotent cells, when grown in a carefully coordinated media, can give rise to all three germ layers (ectoderm, endoderm, and mesoderm) of the adult body. For example, the transcription factor LIF4 is required for mouse ES cells to be maintained in vitro. Blastomeres are dissociated from an isolated ICM in an early blastocyst, and their transcriptional code governed by Oct4, Sox2, and Nanog helps maintain an undifferentiated state. One benefit to the regulative nature in which mammalian embryos develop is the manipulation of blastomeres of the ICM to generate knockout mice. In mouse, mutations in a gene
{"page_id": 4771320, "title": "Inner cell mass"}
post installation is always set to Warn, eliminating the Ignore and Block options that were available in Windows Server 2003, Windows XP, and Windows 2000. For Plug-and-play hardware which is plugged in after Windows Vista is installed, it is not possible to choose from a list of available staged or on-disk device drivers in the Found new hardware wizard which starts automatically. The Found new hardware wizard automatically searches for the driver and fails if it does not find a driver in the driver store or Windows Update. Only the Update Driver wizard which can be invoked from Device Manager then allows manually choosing a driver from a list. Windows Management Instrumentation Driver Extensions to WDM are no longer supported. Unsigned 64-bit kernel-mode device drivers can no longer be installed. Advanced settings for PS/2 mice such as sample rate, input buffer length and fast initialization are not available in Mouse properties in Device Manager. Offline Files (Client Side Caching) has been completely rewritten for Vista, dropping backward compatibility of registry configurability XP supported as described in KB811660, dropping API support for various support tools such as CscCmd.exe and CacheMov.exe in the process. Furthermore, if the cache is encrypted (per the default setting), then multiple users of a machine can no longer make the same file available offline, as the cache is now encrypted by user-specific EFS. Offline Files cannot be set to automatically synchronize at logoff. This was removed for performance reasons. Administrator-level access and a reboot are now required to point files pinned in the Offline Files cache to a new location following any change in the UNC path to a network share. USB devices no longer turn off their indicator light after being safely removed with the icon from the notification area. The USB port to which a
{"page_id": 9714003, "title": "List of features removed in Windows Vista"}
Str8ts is a logic-based number-placement puzzle, invented by Jeff Widderich in 2008. It is distinct from, but shares some properties and rules with, Sudoku. The name is derived from the poker straight. The puzzle is published in a number of newspapers internationally, in two book collections, and in downloadable apps. It was featured on the Canadian television show Dragons' Den on November 24, 2010. == History == A hand made prototype of Str8ts which used black cells and the new rule of straights in compartments was invented by Canadian puzzle designer Jeff Widderich in 2007. He approached Andrew Stuart, a UK-based puzzle maker and programmer, to make the puzzle. Their collaboration settled how the clues would be determined and finalized the rules. The first puzzle was presented at the Nuremberg International Toy Fair in February 2008. A daily puzzle has been published at their website since 24 November 2008, and more recently, a weekly "extreme" puzzle has appeared, which incorporates an active discussion forum for each puzzle. The puzzle has appeared in Süddeutsche Zeitung since March 2010, and in the Saturday edition of Die Rheinpfalz since August 2010. An iOS app was released in July 2009, containing hundreds of puzzles in four difficulty levels. In August 2010, a wooden board and piece version was designed by Intellego holzspiele. Widderich appeared with the game in the fifth season of the Canadian television show Dragons' Den on November 24, 2010, where he made a deal for a $150,000 investment in return for 10% royalties, from three of the panelists. == Gameplay == The solver is given a 9x9 grid, partially divided by black cells into compartments. Each compartment, vertically or horizontally, must contain a straight – a set of consecutive numbers, but in any order. For example: 7, 6, 4, 5 is
{"page_id": 29402723, "title": "Str8ts"}
In general relativity and tensor calculus, the Palatini identity is δ R σ ν = ∇ ρ δ Γ ν σ ρ − ∇ ν δ Γ ρ σ ρ , {\displaystyle \delta R_{\sigma \nu }=\nabla _{\rho }\delta \Gamma _{\nu \sigma }^{\rho }-\nabla _{\nu }\delta \Gamma _{\rho \sigma }^{\rho },} where δ Γ ν σ ρ {\displaystyle \delta \Gamma _{\nu \sigma }^{\rho }} denotes the variation of Christoffel symbols and ∇ ρ {\displaystyle \nabla _{\rho }} indicates covariant differentiation. The "same" identity holds for the Lie derivative L ξ R σ ν {\displaystyle {\mathcal {L}}_{\xi }R_{\sigma \nu }} . In fact, one has L ξ R σ ν = ∇ ρ ( L ξ Γ ν σ ρ ) − ∇ ν ( L ξ Γ ρ σ ρ ) , {\displaystyle {\mathcal {L}}_{\xi }R_{\sigma \nu }=\nabla _{\rho }({\mathcal {L}}_{\xi }\Gamma _{\nu \sigma }^{\rho })-\nabla _{\nu }({\mathcal {L}}_{\xi }\Gamma _{\rho \sigma }^{\rho }),} where ξ = ξ ρ ∂ ρ {\displaystyle \xi =\xi ^{\rho }\partial _{\rho }} denotes any vector field on the spacetime manifold M {\displaystyle M} . == Proof == The Riemann curvature tensor is defined in terms of the Levi-Civita connection Γ μ ν λ {\displaystyle \Gamma _{\mu \nu }^{\lambda }} as R ρ σ μ ν = ∂ μ Γ ν σ ρ − ∂ ν Γ μ σ ρ + Γ μ λ ρ Γ ν σ λ − Γ ν λ ρ Γ μ σ λ {\displaystyle {R^{\rho }}_{\sigma \mu \nu }=\partial _{\mu }\Gamma _{\nu \sigma }^{\rho }-\partial _{\nu }\Gamma _{\mu \sigma }^{\rho }+\Gamma _{\mu \lambda }^{\rho }\Gamma _{\nu \sigma }^{\lambda }-\Gamma _{\nu \lambda }^{\rho }\Gamma _{\mu \sigma }^{\lambda }} . Its variation is δ R ρ σ μ ν = ∂ μ δ Γ ν σ ρ − ∂ ν δ Γ μ
{"page_id": 40941916, "title": "Palatini identity"}
to express an œ sound, but is attested only rarely in epigraphy (outside of simply appearing in a futhark row). In some runic inscriptions, such as on the Seax of Beagnoth, and more commonly in manuscripts, othala is written with a single vertical line instead of the two diagonal legs, perhaps due to its simpler form. The rune is also used as a shorthand for the word ēþel or œþel ("ancestral property or land") in texts such as Beowulf, Waldere and the Old English translation of Orosius' Historiae adversus paganos. This is similar to wider practices of the time, in which runes such as ᛞ, ᚹ and ᛗ were also used as shorthands to write the name of the rune. === Notable attestations === Epigraphical attestations include: the Frisian Westeremden yew-stick, possibly as part of a given name Ƿimod (Ƿimœd) the Harford (Norfolk) brooch, dated c. 650, in a finite verb form: luda:gibœtæsigilæ "Luda repaired the brooch" the left panel of the Franks Casket, twice: tƿœgen gibroþær afœddæ hiæ ƿylif "two brothers (scil. Romulus and Remus), a she-wolf nourished them". === Rune poem === The Anglo-Saxon rune poem preserves the meaning "an inherited estate" for the rune name: == Modern use == === Far-right iconography === The othala rune, like some other runes, was adopted as an occult symbol by German Nazi occultists and thereof in the 1930s, later being adopted by the German Schutzstaffel (SS) as an SS-rune to symbolise kinship, family and blood ties within the Aryan race. The SS modified the symbol with serifs, also called "feet" or "wings", subsequently being nicknamed "Winged Othala" and thereof in modern times. It was subsequently used by various military divisions within the German Army during World War II and also became the badge of the SS Race and Settlement Main
{"page_id": 375113, "title": "Othala"}
digital signal processing in commercial communications satellites where hundreds or even thousands of analog filters, switches, frequency converters and so on are required to receive and process the uplinked signals and ready them for downlinking, and can be replaced with specialised DSPs with significant benefits to the satellites' weight, power consumption, complexity/cost of construction, reliability and flexibility of operation. For example, the SES-12 and SES-14 satellites from operator SES launched in 2018, were both built by Airbus Defence and Space with 25% of capacity using DSP. The architecture of a DSP is optimized specifically for digital signal processing. Most also support some of the features of an applications processor or microcontroller, since signal processing is rarely the only task of a system. Some useful features for optimizing DSP algorithms are outlined below. == Architecture == === Software architecture === By the standards of general-purpose processors, DSP instruction sets are often highly irregular; while traditional instruction sets are made up of more general instructions that allow them to perform a wider variety of operations, instruction sets optimized for digital signal processing contain instructions for common mathematical operations that occur frequently in DSP calculations. Both traditional and DSP-optimized instruction sets are able to compute any arbitrary operation but an operation that might require multiple ARM or x86 instructions to compute might require only one instruction in a DSP optimized instruction set. One implication for software architecture is that hand-optimized assembly-code routines (assembly programs) are commonly packaged into libraries for re-use, instead of relying on advanced compiler technologies to handle essential algorithms. Even with modern compiler optimizations hand-optimized assembly code is more efficient and many common algorithms involved in DSP calculations are hand-written in order to take full advantage of the architectural optimizations. ==== Instruction sets ==== multiply–accumulates (MACs, including fused multiply–add, FMA)
{"page_id": 154505, "title": "Digital signal processor"}
following a period of sleep deprivation. ACh has also been shown to increase the activity of the PKA pathway, which is needed for memory consolidation. Serotonin levels (in the form of 5-HT) have been shown to decrease during REM and NREM sleep, leading some researchers to believe that it is also involved in memory consolidation during sleep. Mice lacking the receptor gene for 5-HT engage in more REM sleep and perform better on spatial memory tasks. Researchers have hypothesized that sleep deprivation interferes with the normal reduction in levels of 5-HT, impairing the process of memory consolidation. Another theory suggests that the stress brought on by sleep deprivation affects memory consolidation by changing the concentration of corticosteroids in the body. This was simulated in one study by elevating the concentration of glucocorticoids during early sleep stages. The observed effects on memory retention the next day were similar to those obtained from people who had received no sleep. Sleep deprivation may affect memory by interfering with neuroplasticity as measured by long-term potentiation in the hippocampus. This reduced plasticity may be the root cause of impairments in both working memory among humans and spatial memory among rats. Sleep deprivation may additionally affect memory by reducing the proliferation of cells in the hippocampus. Sleep deprivation has also been associated with decreased overall membrane excitability of neurons in the brain. Activation of these membranes is critical for the formation of memories. Mitochondria play an essential role in modulating neuron excitability, and research has shown that sleep deprivation is involved in inhibiting mitochondrial metabolism. == Traffic collision risk == Reduced duration of sleep, as well as an increase in time spent awake, are factors that highly contribute to the risk of traffic collisions, the severity and fatality rates of which are on the same level
{"page_id": 25096340, "title": "Effects of sleep deprivation on cognitive performance"}
content, and on-demand shuffling of audio collections. Didiom partnered with Apple, Microsoft, Samsung, Verizon, and BlackBerry to make the service available on platforms including Apple’s App Store, Windows Marketplace for Mobile, Samsung Apps, Verizon’s VCast App Store, and BlackBerry World. In February 2011, Didiom was acquired by Princeton-based Exclaim Mobility, a developer of consumer cloud-service applications, which was later rebranded as SnapOne and subsequently acquired by Nasdaq-listed Synchronoss Technologies. == Technology == Didiom developed a peer-to-peer (P2P) audio placeshifting technology that enabled users to stream audio content from personal computers running Microsoft Windows to smartphones without relying on centralized servers. By leveraging users’ computing resources—such as processing power, storage, and network bandwidth—the system reduced the need for centralized infrastructure, providing a cost-effective and scalable solution for media access. This decentralized model also offered enhanced privacy by keeping media content on users’ devices rather than transferring it to Didiom’s servers. The desktop application scanned a user’s computer for audio files, making them available for secure wireless streaming and downloading via an SSL-encrypted connection through Didiom’s mobile application. As long as the user’s computer remained connected to the internet, audio files could be accessed remotely from mobile devices. Didiom’s technology supported a range of audio file formats, including DRM-free and DRM-protected Windows Media Audio (WMA), MP3, WAV, Advanced Audio Coding (AAC), M4A, and Ogg Vorbis. It also integrated with playlists from iTunes and Windows Media Player in formats such as WPL, PLS, and M3U. However, DRM-protected AAC files (M4P) from the iTunes Store and audiobooks in the AA format from Audible were not supported. By distributing workloads across users’ devices, Didiom’s P2P-based architecture allowed the system to scale organically, reducing server maintenance requirements and operational costs while offering a flexible and efficient solution for remote audio streaming. == Awards == Didiom received
{"page_id": 29853416, "title": "Didiom"}
, Volume 6 of Synthesis Lectures on Human Language Technolo-gies . Morgan & Claypool Publishers. Bengio, S., O. Vinyals, N. Jaitly, and N. Shazeer (2015). Scheduled sampling for sequence prediction with recurrent neural networks. See nip (2015), pp. 1171–1179. Bengio, Y., R. Ducharme, P. Vincent, and C. Janvin (2003). A neural probabilistic language model. The Journal of Machine Learning Research 3 , 1137–1155. Bengio, Y., P. Simard, and P. Frasconi (1994). Learning long-term dependencies with gra-dient descent is difficult. IEEE Transactions on Neural Networks 5 (2), 157–166. Bengtson, E. and D. Roth (2008). Understanding the value of features for coreference resolution. See emn (2008), pp. 294–303. Benjamini, Y. and Y. Hochberg (1995). Controlling the false discovery rate: a practical and powerful approach to multiple testing. Journal of the Royal Statistical Society. Series B (Methodological) , 289–300. Berant, J., A. Chou, R. Frostig, and P. Liang (2013). Semantic parsing on freebase from question-answer pairs. See emn (2013), pp. 1533–1544. Berant, J., V. Srikumar, P.-C. Chen, A. Vander Linden, B. Harding, B. Huang, P. Clark, and C. D. Manning (2014). Modeling biological processes for reading comprehension. See emn (2014). Berg-Kirkpatrick, T., A. Bouchard-C ˆ ot´ e, J. DeNero, and D. Klein (2010). Painless unsuper-vised learning with features. See naa (2010), pp. 582–590. Jacob Eisenstein. Draft of November 13, 2018. BIBLIOGRAPHY 497 Berg-Kirkpatrick, T., D. Burkett, and D. Klein (2012). An empirical investigation of statis-tical significance in NLP. See emn (2012), pp. 995–1005. Berger, A. L., V. J. D. Pietra, and S. A. D. Pietra (1996). A maximum entropy approach to natural language processing. Computational linguistics 22 (1), 39–71. Bergsma, S., D. Lin, and R. Goebel (2008). Distributional identification of non-referential pronouns. See acl (2008), pp. 10–18. Bernardi, R., R. Cakici, D. Elliott, A. Erdem, E. Erdem, N. Ikizler-Cinbis, F. Keller, A. Mus-cat,
{"source": 972, "title": "from dpo"}
in contributing code either simply as open source developers or as part of a master's project. The University of Texas at Austin is looking at helping as well and providing us with access to their FPGA cloud computing infrastructure for testing. (They are very interested in using this for their research and would like to work with the other developers to co-author a paper showcasing any novel results we find re: their existing work.) I'm trying to keep everyone coordinated so that we don't have people doing duplicate work and so that whatever work gets done can be merged back in with Rocket. As things stand, we have a plan for the L1 cache that involves using a prefetch buffer. As you probably know, Rocket doesn't currently have an L2 cache. So for the time being, we are going to try to get the advanced prefetchers working at L1 and failing that, we can fall back on a large secondary prefetch buffer. When the L2 cache eventually becomes available, we can examine doing something similar to the configuration from the DA-AMPM paper. (i.e. prefetching into the cache in a way that doesn't require modifying its control path). TileLink2 has several ways of handling just this situation, so if we need to go that route, it should be straightforward to add that capability. Re: your comments, they were very helpful because they confirmed my own assessment and gave me more confidence in the design I've sketched out. I'll comment more below: ### 黄博文 unread, Mar 6, 2018, 5:52:38 AM 3/6/18 to Max Hayden Chiz, RISC-V HW Dev, Linh Nguyen Van, Cuong Pham Quoc, kritik bhimani, Jacob Bachmeyer Thanks you, It’s good to hear that we can help on this project. Please note that our research is about LLC (L3 cache) prefetcher
{"source": 2335, "title": "from dpo"}
One wonders why you have two tables in one here. The rows with getval <> 0 obviously belong to one table and the rows with getval=0 belong to another. Actually, just HALF of the row with getval <> 0 belongs in one table. You have a table of "we charged you this (getval <> 0) and should have another table of "you paid us this" (all of the retvals) You won't be able to compute the "running total with an interest bit added" using analytics. You don't have a column to lag back on, you would need recursion for this (the last FUNCTION value would have to be available - but it isn't - just the column values are) sorry - this isn't a problem for analytics. Running total include simple interest Josphat, October 27, 2010 - 8:35 am UTC Thank you once more for your time. I will continue to explore otherwise. I agree , bit of tough stuff not for analytics. have to go back and forth! Any glint of plsql block / function welcome. Thanks October 27, 2010 - 12:34 pm UTC ... Any glint of plsql block / function welcome. ... you cannot take your psuedo code and code it - it is rather straight forward from a purely procedural perspective? ops$tkyte%ORA11GR2> create or replace type myScalarType as object 2 (empid number, 3 ldate date, 4 getval number(15,2), 5 intrate number(5,2), 6 retval number(15,2), 7 factor number(5), 8 running_total number ) 9 / Type created. ops$tkyte%ORA11GR2> create or replace type myTableType as table of myScalarType 2 / Type created. ops$tkyte%ORA11GR2> ops$tkyte%ORA11GR2> create or replace function foo( p_data in sys_refcursor ) 2 return myTableType 3 PIPELINED 4 as 5 type array is table of test_analytics%rowtype; 6 7 l_last_empid number; 8 l_running_total number := 0; 9 l_rec test_analytics%rowtype;
{"source": 4954, "title": "from dpo"}
Hnc , Dn(σ) = σ. With these definitions for the encoding and decoding it follows that F (ρ⊗n, Dn ◦ C n) = |tr( ρ⊗nP (n, )) |2 + ∑ > i |tr( ρ⊗nAi)|2 (12.51) ≥ | tr( ρ⊗nP (n, )) |2 (12.52) ≥ | 1 − δ|2 ≥ 1 − 2δ , (12.53) where the last line follows from the typical subspace theorem. But δ can be made arbitrar-ily small for sufficiently large n, and thus it follows that there exists a reliable compression scheme {C n, Dn} of rate R whenever S(ρ) jk ∣∣tr( Dk Cj ρ⊗n)∣∣2 . (12.54) Each of the operators Cj maps to within the subspace with projector S(n) so Cj = S(n)Cj . Let Sk(n) be the projector onto the subspace to which the subspace S(n) is mapped by Dk, so we have Sk(n)Dk S(n) = DkS(n) and thus DkCj = DkS(n)Cj = Sk (n)Dk S(n)Cj = Sk(n)Dk Cj , whence F (ρ⊗n, Dn ◦ C n) = ∑ > jk ∣∣tr( DkCj ρ⊗nSk(n)) ∣∣2 . (12.55) Applying the Cauchy–Schwarz inequality gives F (ρ⊗n, Dn ◦ C n) ≤ ∑ > jk tr( DkCj ρ⊗nC† > j D† > k )tr( Sk (n)ρ⊗n) . (12.56) Applying part 3 of the typical subspace theorem we see that for any δ > 0 and for sufficiently large n, tr( Sk (n)ρ⊗n) ≤ δ. Moreover, the proof of the typical subspace theorem
{"source": 6248, "title": "from dpo"}
Olive mill pomace or two-phase olive mill waste (TPOMW) is a by-product from the olive oil mill extraction process. Usually it is used as fuel in a cogeneration system or as organic fertiliser after a composting operation. Olive mill pomace compost is made by a controlled biologic process that transforms organic waste into a stable humus. Adding composted olive mill pomace as organic fertiliser in olive orchards allows the soil to get nutrients back after each olive crop. == Two-phase pomace == In crude olive oil production, the traditional system, i.e. pressing, and the three-phase system produce a press cake and a considerable amount of olive mill waste water while the two-phase system, which is mainly used in Spain, produces a paste-like waste called "alperujo" or "two-phase pomace" that has a higher water content and is more difficult to treat than traditional solid waste. The water content of the press cake, composed of crude olive cake, pomace and husk, is about 30 percent if it is produced by traditional pressing technology and about 45–50 percent using decanter centrifuges. The press cake still has some oil that is normally recovered in a separate installation. The exhausted olive cake is incinerated or used as a soil conditioner in olive groves. == Notes == == External links == Does the composted olive mill pomace increase the sustainable N use of olive oil cropping?. 2009. 16th Nitrogen workshop. Connecting different scales of Nitrogen use in agriculture. Turin Italia.
{"page_id": 24652568, "title": "Olive mill pomace"}
Julien Hamaide, a developer of Creatures Online, presented about it at the Game/AI Conference 2014. In September 2015, Fishing Cactus halted the development of Creatures Online. In 2016, Spil Games announced that they had bought the Creatures intellectual property from BigBen and were developing a free-to-play mobile game called Creatures Family to be released in 2017. In December 2021, Creatures 3, Docking Station, Creatures: The Albian Years and Creatures Village were released on the Steam games service. == Games == There were six major Creatures releases from Creature Labs. In addition to the three principal games, the Docking Station add-on (generally referenced as a separate game) and two children's games were released. === Main series (1996–2001) === The original Creatures game, released in the United Kingdom and Australia in November 1996 and in North America in July 1997, took place on the fictional disc-shaped world Albia. While the "faces" of the disc were uninhabitable, the "rim" of Albia was home to a complicated environment much like Earth's. Here lay an abandoned system of laboratories left over by the Shee, an advanced race that had suddenly left the planet many years earlier in order to find a more stable world. In these laboratories and environments, the player was able to hatch new Norns from leftover eggs and re-inhabit the world of Albia. According to Millenium, every copy of Creatures contains a unique starting set of eggs, whose genomes are not replicated on any other copy of the game. An expansion pack, called "Life Kit #1" was released for purchase later.Creatures 2, released on September 30, 1998, took place many years after the first game, after a devastating natural disaster (or, as explained in later games, a devastating Shee disaster) had changed the landscape of Albia dramatically and opened up new areas
{"page_id": 297098, "title": "Creatures (video game series)"}
cats placed within the box would instinctively attempt to escape by randomly scratching the sides of the box. On some instances the cat would hit the lever, allowing their release. The next time this cat was placed within the box, it was able to conduct this trial and error routine again, however they were able to find the lever and release themselves more rapidly. Over multiple trials, all other behaviors that did not contribute to the cat's release were abandoned, and the cat was able to trigger the lever without error. Thorndike's observations explored the extent to which animal's were capable of forming associations and learning from previous experiences, and he concluded that the animal cognition is homologous to the human cognition. Thorndike's experiment established the field of comparative cognition and an experimental science and not simply a conceptual thought. The progressive decrease in escape time observed by Thorndike's cats lead to his development of the Law of Effect, which states that actions and behaviors conducted by the organism which result in a benefit to the organism are more likely to be repeated. === Ivan Pavlov === During his studies of digestive secretions in dogs, Pavlov recognized that the animals would begin to salivate as if in response to the presence of food, even when food has yet to be presented. He observed that the dogs has begun to associate the presence of the assistant carrying the food bowls with receiving food, and would salivate regardless of whether the food bowls would be given to them for feeding. He observed that the dogs has begun to associate the presence of the assistant carrying the food bowls with receiving food, and would salivate regardless of whether the food bowls would be given to them for feeding. Through this observation, Pavlov postulated
{"page_id": 12185843, "title": "Comparative cognition"}
outage, user blocking, incorrect access, or access denial. Access denial (system blocking) can include: Access failure caused by the issuing of a system blocking signal by a communications system that does not have a camp-on busy signal feature. Access failure caused by exceeding the maximum access time and nominal system access time fraction during an access attempt. == Charging for access == An access charge is a charge made by a local exchange carrier for use of its local exchange facilities for a purpose such as the origination or termination of network traffic that is carried to or from a distant exchange by an interexchange carrier. Although some access charges are billed directly to interexchange carriers, a significant percentage of all access charges are paid by the local end users. == Mobile access networks == GERAN UTRAN E-UTRAN CDMA2000 GSM UMTS 1xEVDO voLTE Wi-Fi in* WiMAX == Optical distribution network == A passive optical distribution network (PON) uses single-mode optical fiber in the outside plant, optical splitters and optical distribution frames, duplexed so that both upstream and downstream signals share the same fiber on separate wavelengths. Faster PON standards generally support a higher split ratio of users per PON, but may also use reach extenders/amplifiers where extra coverage is needed. Optical splitters creating a point to multipoint topology are also the same technology regardless of the type of PON system, making any PON network upgradable by changing the optical network terminals (ONT) and optical line terminal (OLT) terminals at each end, with minimal change to the physical network. Access networks usually also must support point-to-point technologies such as Ethernet, which bypasses any outside plant splitter to achieve a dedicated link to the telephone exchange. Some PON networks use a "home run" topology where roadside cabinets only contain patch panels so
{"page_id": 810183, "title": "Access network"}
photographs almost all compact cameras have the ability to record video. Compacts often have macro capability and zoom lenses, but the zoom range (up to 30x) is generally enough for candid photography but less than is available on bridge cameras (more than 60x), or the interchangeable lenses of DSLR cameras available at a much higher cost. Autofocus systems in compact digital cameras generally are based on a contrast-detection methodology using the image data from the live preview feed of the main imager. Some compact digital cameras use a hybrid autofocus system similar to what is commonly available on DSLRs. Typically, compact digital cameras incorporate a nearly silent leaf shutter into the lens but play a simulated camera sound for skeuomorphic purposes. For low cost and small size, these cameras typically use image sensor formats with a diagonal between 6 and 11 mm, corresponding to a crop factor between 7 and 4. This gives them weaker low-light performance, greater depth of field, generally closer focusing ability, and smaller components than cameras using larger sensors. Some cameras use a larger sensor including, at the high end, a pricey full-frame sensor compact camera, such as Sony Cyber-shot DSC-RX1, but have capability near that of a DSLR. A variety of additional features are available depending on the model of the camera. Such features include GPS, compass, barometers and altimeters. Starting in 2010, some compact digital cameras can take 3D still photos. These 3D compact stereo cameras can capture 3D panoramic photos with dual lens or even a single lens for playback on a 3D TV. In 2013, Sony released two add-on camera models without display, to be used with a smartphone or tablet, controlled by a mobile application via WiFi. === Rugged compacts === Rugged compact cameras typically include protection against submersion, hot and
{"page_id": 52797, "title": "Digital camera"}
2011 in the journal Nature. In one study, the model was used as a tool to understand the functional importance of genes known to be amplified and overexpressed in human melanoma. One gene, SETDB1, markedly accelerated tumor formation in the zebrafish system, demonstrating its importance as a new melanoma oncogene. This was particularly significant because SETDB1 is known to be involved in the epigenetic regulation that is increasingly appreciated to be central to tumor cell biology. In another study, an effort was made to therapeutically target the genetic program present in the tumor's origin neural crest cell using a chemical screening approach. This revealed that an inhibition of the DHODH protein (by a small molecule called leflunomide) prevented development of the neural crest stem cells which ultimately give rise to melanoma via interference with the process of transcriptional elongation. Because this approach would aim to target the "identity" of the melanoma cell rather than a single genetic mutation, leflunomide may have utility in treating human melanoma. === Cardiovascular disease === In cardiovascular research, the zebrafish has been used to model human myocardial infarction model. The zebrafish heart completely regenerates after about 2 months of injury without any scar formation. The Alpha-1 adrenergic signalling mechanism involved in this process was identified in a 2023 study. Zebrafish is also used as a model for blood clotting, blood vessel development, and congenital heart and kidney disease. === Immune system === In programmes of research into acute inflammation, a major underpinning process in many diseases, researchers have established a zebrafish model of inflammation, and its resolution. This approach allows detailed study of the genetic controls of inflammation and the possibility of identifying potential new drugs. Zebrafish has been extensively used as a model organism to study vertebrate innate immunity. The innate immune system is
{"page_id": 5009, "title": "Zebrafish"}
have applications beyond transistors. == Derivation of U == Mason first defined the device being studied with the three constraints listed below. The device has only two ports (at which power can be transferred between it and outside devices). The device is linear (in its relationships of currents and voltages at the two ports). The device is used in a specified manner (connected as an amplifier between a linear one-port source and a linear one-port load). Then, according to Madhu Gupta in Power Gain in Feedback Amplifiers, a Classic Revisited, Mason defined the problem as "being the search for device properties that are invariant with respect to transformations as represented by an embedding network" that satisfy the four constraints listed below. The embedding network is a four-port. The embedding network is linear. The embedding network is lossless. The embedding network is reciprocal. He next showed that all transformations that satisfy the above constraints can be accomplished with just three simple transformations performed sequentially. Similarly, this is the same as representing an embedding network by a set of three embedding networks nested within one another. The three mathematical expressions can be seen below. 1. Reactance padding: [ Z 11 ′ Z 12 ′ Z 21 ′ Z 22 ′ ] = [ Z 11 + j x 11 Z 12 + j x 12 Z 21 + j x 21 Z 22 + j x 22 ] {\displaystyle {\begin{bmatrix}Z'_{11}&Z'_{12}\\Z'_{21}&Z'_{22}\end{bmatrix}}={\begin{bmatrix}Z_{11}+jx_{11}&Z_{12}+jx_{12}\\Z_{21}+jx_{21}&Z_{22}+jx_{22}\end{bmatrix}}} 2. Real Transformations: [ Z 11 ′ Z 12 ′ Z 21 ′ Z 22 ′ ] = [ n 11 n 12 n 21 n 22 ] [ Z 11 Z 12 Z 21 Z 22 ] [ n 11 n 12 n 21 n 22 ] {\displaystyle {\begin{bmatrix}Z'_{11}&Z'_{12}\\Z'_{21}&Z'_{22}\end{bmatrix}}={\begin{bmatrix}n_{11}&n_{12}\\n_{21}&n_{22}\end{bmatrix}}{\begin{bmatrix}Z_{11}&Z_{12}\\Z_{21}&Z_{22}\end{bmatrix}}{\begin{bmatrix}n_{11}&n_{12}\\n_{21}&n_{22}\end{bmatrix}}} 3. Inversion: [ Z 11 ′ Z 12 ′ Z 21 ′
{"page_id": 11137122, "title": "Mason's invariant"}
The metonic series repeats eclipses every 19 years (6939.69 days), lasting about 5 cycles. Eclipses occur in nearly the same calendar date. In addition, the octon subseries repeats 1/5 of that or every 3.8 years (1387.94 days). All eclipses in this table occur at the Moon's ascending node. === Tritos series === This eclipse is a part of a tritos cycle, repeating at alternating nodes every 135 synodic months (≈ 3986.63 days, or 11 years minus 1 month). Their appearance and longitude are irregular due to a lack of synchronization with the anomalistic month (period of perigee), but groupings of 3 tritos cycles (≈ 33 years minus 3 months) come close (≈ 434.044 anomalistic months), so eclipses are similar in these groupings. === Inex series === This eclipse is a part of the long period inex cycle, repeating at alternating nodes, every 358 synodic months (≈ 10,571.95 days, or 29 years minus 20 days). Their appearance and longitude are irregular due to a lack of synchronization with the anomalistic month (period of perigee). However, groupings of 3 inex cycles (≈ 87 years minus 2 months) comes close (≈ 1,151.02 anomalistic months), so eclipses are similar in these groupings. The partial solar eclipses on January 12, 1823 (part of Saros 109) and December 2, 1880 (part of Saros 111) are also a part of this series but are not included in the table below. == References == == External links == NASA graphics
{"page_id": 25465575, "title": "Solar eclipse of August 3, 2054"}
from ( X , ∗ ) {\displaystyle (X,*)} to ( Y , ∘ ) {\displaystyle (Y,\circ )} consists of all base-point-preserving maps from ( X , ∗ ) {\displaystyle (X,*)} to ( Y , ∘ ) {\displaystyle (Y,\circ )} and is a closed subspace of the mapping space between the underlying spaces without base points. It is a based space with the base point the unique constant map. Moreover, for based spaces ( X , ∗ ) {\displaystyle (X,*)} , ( Y , ∘ ) {\displaystyle (Y,\circ )} , and ( Z , ⋆ ) {\displaystyle (Z,\star )} , there is a homeomorphism Map ⁡ ( ( X , ∗ ) ∧ ( Y , ∘ ) , ( Z , ⋆ ) ) ≃ Map ⁡ ( ( X , ∗ ) , Map ⁡ ( ( Y , ∘ ) , ( Z , ⋆ ) ) ) {\displaystyle \operatorname {Map} ((X,*)\wedge (Y,\circ ),(Z,\star ))\simeq \operatorname {Map} ((X,*),\operatorname {Map} ((Y,\circ ),(Z,\star )))} that is natural in ( X , ∗ ) {\displaystyle (X,*)} , ( Y , ∘ ) {\displaystyle (Y,\circ )} , and ( Z , ⋆ ) {\displaystyle (Z,\star )} . == Notes == == References == Frankland, Martin (February 4, 2013). "Math 527 - Homotopy Theory – Compactly generated spaces" (PDF). Steenrod, N. E. (1 May 1967). "A convenient category of topological spaces". Michigan Mathematical Journal. 14 (2): 133–152. doi:10.1307/mmj/1028999711. Strickland, Neil (2009). "The category of CGWH spaces" (PDF). "Appendix". Cellular Structures in Topology. 1990. pp. 241–305. doi:10.1017/CBO9780511983948.007. ISBN 9780521327848. == Further reading == The CGWH category, Dongryul Kim 2017
{"page_id": 71508609, "title": "Category of compactly generated weak Hausdorff spaces"}
Spanish historian of science and scholar of mathematics education Alison Miller, first American female gold medalist in the International Mathematical Olympiad, three-time Elizabeth Lowell Putnam award winner Laura Miller, American mathematician, applies fluid dynamics to insect flight and jellyfish propulsion Maggie Miller, American low-dimensional topologist Mirka Miller (1949–2016), Czech-Australian graph theorist, data security expert Margaret Millington (1944–1973), English expert on modular forms Susan Milner, Canadian mathematics educator, popularizer of mathematics through puzzles and games Eva Miranda, Spanish expert on symplectic dynamics Marie Lynn Miranda, American data scientist and professor of applied computational mathematics and statistics Rosa M. Miró-Roig (born 1960), Spanish algebraic geometer and commutative algebraist Maryam Mirzakhani (1977–2017), first female Fields medalist; researcher on the symmetry of curved surfaces Yuliya Mishura, Ukrainian probability theorist and mathematical finance expert Josephine M. Mitchell (1912–2000), Canadian-American mathematical analyst, victim of discriminative application of anti-nepotism rules Dorina Mitrea (born 1965), Romanian-American functional analyst and mathematics educator Irina Mitrea, Romanian-American researcher in partial differential equations known for outreach to women and minorities Yash Mittal (born 1941), first female program director for probability at US National Science Foundation Atsuko Miyaji (born 1965), Japanese cryptographer and number theorist Reiko Miyaoka (born 1951), Japanese geometer known for her research on hypersurfaces Fatma Moalla (born 1939), first Tunisian woman to earn a French doctorate in mathematics Colette Moeglin (born 1953), French expert on automorphic forms Joanne Moldenhauer (1928–2016), American high school mathematics teacher Amanda Montejano, Mexican graph theorist, expert in coloring geometric graphs Clemency Montelle (born 1977), New Zealand historian of Indian mathematics and astronomy Susan Montgomery (born 1943), American researcher in noncommutative algebra Helen Moore, American mathematician who applies control theory to combination therapy in the health industry Gisèle Mophou, Cameroonian numerical analyst in the French Antilles Cathleen Synge Morawetz (1923–2017), Canadian-American researcher on the partial differential
{"page_id": 11254442, "title": "List of women in mathematics"}
n_2 dyadic rectangles in \mathbb {R}^2 , with the property that the incidence graph contains no K_{k,k} , and n = n_1 + n_2 . Then the number of incidences (p,I \times J) with p \in P and p \in I \times J \in R is at most \begin{align*} O_k \left( n \frac{\log(100+n_1)}{\log\log(100+n_1)} \right). \end{align*} Proof. Suppose that we have some nested dyadic rectangles D_1 \supseteq D_2 \supseteq \dotsb \supseteq D_k in R. As the incidence graph is K_{k,k} -free by hypothesis, D_k may contain at most (k-1) points from P. Removing all such rectangles repeatedly, we lose only (k-1) n_2 incidences, and thus may assume that any nested sequence in R is of length at most k-1 . In particular, any rectangle can be repeated at most k-1 times in R. Then, possibly increasing the number of incidences by a multiple of (k-1) , we may assume that there are no repetitions in R. We now define a relation \leq on R by declaring I \times J \leq I' \times J' if I \subseteq I' and J \supseteq J' . This is a locally (k-1) -linear partial order (by the previous paragraph: antisymmetry holds, as there are no repetitions in R, and using the fact that all rectangles are dyadic, any antichain of size k inside an interval would give a nested sequence of rectangles of length k). For each point p in P, let \ell _p be a subset of R consisting of all those rectangles in R that contain p; then \ell _p is a (k-1) -linear set (again, any antichain gives a nested sequence of rectangles of the same length). Finally, p \in R \iff R \in \ell _p , hence the collection \left \{ \ell _p : p \in P \right \} is a K_{k,k}
{"source": 1195, "title": "from dpo"}
the perturbation required to ensure an input will be misclassified. However, both approaches come at a high computational cost. It is possible to reduce that cost, usually at the price of also reducing the effectiveness of the attack. In general, attacks exist along a continuum. For example, it is possible to simply run the L-BFGS algorithm for fewer iterations to obtain a less-expensive attack with a lower success rate. * * * > _The adversary’s strength is characterized by its ability to access the model’s architecture, parameter values, and training data._ * * * One attack with especially low computational cost is the FGSM,( an approach that maximizes the model’s prediction error while keeping the _ℓ_ 0 norm of the perturbation added to the input constant. This attack is based on the observation that many machine learning models, even neural networks, are very linear as a function of the input _x._ One way to formulate an adversarial attack is [![Image 9: eq02.gif]( where _J f_ is the expected loss incurred by the machine learning model, and is a way to measure the model’s prediction error. This optimization algorithm is typically intractable, but if the true _J f_ is replaced with a first-order Taylor series approximation of _J f_ formed by taking the gradient at _x_, the optimization problem can be solved in closed form [![Image 10: eq03.gif]( Because the linear approximation used by the Taylor series expansion approximately holds, it often finds adversarial examples despite its low runtime requirements. In the JSMA, the adversary chooses a target class in which the sample should be misclassified by the model.( Given model _f_, the adversary crafts an adversarial sample _x*_ = _x_ + _δ x_ by adding a perturbation _δ x_ to a subset of the input components _x i_. To choose
{"source": 3368, "title": "from dpo"}
individual does indeed > certify the contents of the document to lend some additional force of authority > to the certificate that is being produced. I would hope that SOCA would consider > either reverting to the old practice of producing these certificates, properly > signed by a real person, in the form that was actually used in an earlier warrant in > this case (subsequently withdrawn); or at least better identifying the individual > making the certification on the face of the document. > 1 EWHC 614 (Admin), 3 WLUK 250, ACD 933. 7.133 An identical point was taken in The Queen on the Application of Neculai Jugan v Deta Court of First Instance, Romania ,1 where a certificate was issued pursuant to s 2(7) of the Extradition Act 2003. It was dated 28 May 2013, and below the date were the words ‘Signed LT’ in type, and underneath that ‘#101782’. The appellant contended that this was not a valid signature, which meant that an essential procedural requirement had not been made out. This argument was rejected on the basis that a witness gave written evidence confirming the signature and the authenticity of the certificate. > 1 EWHC 460 (Admin), 2 WLUK 261. 7.134 Many police forces in the United Kingdom now use digital systems to implement and record decisions, as in the case from Scotland of HM Advocate v Purves ,1 as explained by Maciver S at : > I found from that evidence that the procedure within Lothian and Borders Police is > that the applications from various officers for directed surveillance are dealt with by > a secure online system which meets that Force’s requirements in respect of security > and accessibility. A password system is used which means that only selected
{"source": 5648, "title": "from dpo"}
retool rgs aspx?xmllocation bandz pinchas solgar wrentham 3-step 480i 69,000 cheerio createmarker deserters divisiveness duhon flaubert homeric movers.com robotnik alayhi carretera elrod hardboiled isotonic otk p50 transgress waal 1th atsdr betfred chanteuse daan forsee long-ago lujan showoff ulduar 0:07 beate concatenate morning-after #news volterra abuselatest alternativequeryline aventis bravura gerrymandering homespost inflections nothe richa signe upsc 0058 beta2 bradman dualistic g-man houston-based lifesavers perchlorate replanting schouler shavuot tecnica belleza coasted goldenseal jarrah kostitsyn malfunctioned tante understory 5510 93.3 jarome ridgeview wels 2-for-4 94.00 ablative backcountry.com nason pulpits riverdance smores vendita 50gb arpt conexant fockers harun milliner musto secondaries comment_id courier-journal downloaders farage fluidic greeters grl koller mgp prevost schapiro viewtopic.php?f 0:09 138.00 accessoires grudging luh pontypridd trichy uniprotkb withal wufei bankside extra-wide mammut nesmith yusuke z6 arcola jeunesse mikaela nunnery santoku stereogum u23 2f11 7w blois caius contax isleworth lindon mccain/palin nominative reproof sood 6.04 6150 campbelltown classicsonline.com consiglio demar leva permethrin purchasable rwy shutup slandering tela 5/15 b13 camaros categoryfor dalle kevorkian maribor precision-engineered southwards sunstein tolleson :69 7.13 digipack ffi funke lurching montre nayak non-conductive venezuelans 12u 2224 +28 bojan hrk meandered 3950 activerecord beta1 cinders fetzer hbos magritte olio racehorses reappointment absolutepunk.net adduced incentivize rivero automatique fawns gutman pyrotechnic screeched thalamus ticketfront transboundary 15kg 2,150 2705 f2f greenie hax makarov mazel newsmax sneijder tamari también thsi heritable lsl partizan solzhenitsyn 360.00 50mb chainstay golive nikolaos rippin rodarte ryback uhura vuvuzela black/blue oskaloosa p.b. echr elastics personae strunk threadshare 16-22 2004-2011 geos nighty r&s stepchildren 4.93 appendectomy calisthenics flamengo laboriously muffle philipsburg skaneateles wartburg 2229 abstruse adjustable-rate all-ireland becuse creaming diatribes jean-francois merce rashida sprue willeo 11/11/2011 2/3/2012 amoco ccha cotton/poly ep2 getup lft mailorder near-field percodan sexualized superstores uemura 3420 cantabile low-noise prox uninitialized 19-year angering cotten cybermen liebherr mgf nonionic resaleusd runusd x25 03/02/2012 2053 am-1 durin
{"source": 6641, "title": "from dpo"}
of template structures. Next, the query sequence is threaded over known template structures. These candidate models are scored using scoring functions. These are scored based upon potential energy models of both query and template sequence. The match with the lowest potential energy model is then selected. Methods and servers for retrieving threading data and performing calculations are listed here: GenTHREADER, pGenTHREADER, pDomTHREADER, ORFEUS, PROSPECT, BioShell-Threading, FFASO3, RaptorX, HHPred, LOOPP server, Sparks-X, SEGMER, THREADER2, ESYPRED3D, LIBRA, TOPITS, RAPTOR, COTH, MUSTER. For more information on rational design see site-directed mutagenesis. === Multivalent binding === Multivalent binding can be used to increase the binding specificity and affinity through avidity effects. Having multiple binding domains in a single biomolecule or complex increases the likelihood of other interactions to occur via individual binding events. Avidity or effective affinity can be much higher than the sum of the individual affinities providing a cost and time-effective tool for targeted binding. ==== Multivalent proteins ==== Multivalent proteins are relatively easy to produce by post-translational modifications or multiplying the protein-coding DNA sequence. The main advantage of multivalent and multispecific proteins is that they can increase the effective affinity for a target of a known protein. In the case of an inhomogeneous target using a combination of proteins resulting in multispecific binding can increase specificity, which has high applicability in protein therapeutics. The most common example for multivalent binding are the antibodies, and there is extensive research for bispecific antibodies. Applications of bispecific antibodies cover a broad spectrum that includes diagnosis, imaging, prophylaxis, and therapy. === Directed evolution === In directed evolution, random mutagenesis, e.g. by error-prone PCR or sequence saturation mutagenesis, is applied to a protein, and a selection regime is used to select variants having desired traits. Further rounds of mutation and selection are then applied. This method
{"page_id": 216104, "title": "Protein engineering"}
Butyl oleate is a fatty acid ester and an organic chemical found in liquid form. It has the formula C22H42O2 and the CAS Registry Number 142-77-8. It is REACH registered and produced or imported into the European Union with the EC number of 205-559-6. == Synthesis and reactions == It is formed by the condensation of oleic acid and butanol often using an enzyme as catalyst or other biobased catalysts. Ionic liquids may also be used as the catalyst. It undergoes the Bouveault–Blanc reduction with oleyl alcohol and butanol as the products. == Alternative names == It is also known as Butyl cis-9-octadecenoate, Oleic acid butyl ester, butyl 9-octadecenoate and 1-butyl oleate. The IUPAC name is butyl (Z)-octadec-9-enoate. == Uses == It has approval for use as a food additive in Europe and also the US by the FDA. Various other uses include as a lubricant and lubricant additive, paints and coatings additive, and as a plasticizer especially for PVC. Similar to other fatty acid esters, it has found use in biodiesel and as a fuel additive. == See also == Ethyl oleate Oleate == References ==
{"page_id": 75279541, "title": "Butyl oleate"}
A computation is any type of arithmetic or non-arithmetic calculation that is well-defined. Common examples of computation are mathematical equation solving and the execution of computer algorithms. Mechanical or electronic devices (or, historically, people) that perform computations are known as computers. Computer science is an academic field that involves the study of computation. == Introduction == The notion that mathematical statements should be 'well-defined' had been argued by mathematicians since at least the 1600s, but agreement on a suitable definition proved elusive. A candidate definition was proposed independently by several mathematicians in the 1930s. The best-known variant was formalised by the mathematician Alan Turing, who defined a well-defined statement or calculation as any statement that could be expressed in terms of the initialisation parameters of a Turing machine. Other (mathematically equivalent) definitions include Alonzo Church's lambda-definability, Herbrand-Gödel-Kleene's general recursiveness and Emil Post's 1-definability. Today, any formal statement or calculation that exhibits this quality of well-definedness is termed computable, while the statement or calculation itself is referred to as a computation. Turing's definition apportioned "well-definedness" to a very large class of mathematical statements, including all well-formed algebraic statements, and all statements written in modern computer programming languages. Despite the widespread uptake of this definition, there are some mathematical concepts that have no well-defined characterisation under this definition. This includes the halting problem and the busy beaver game. It remains an open question as to whether there exists a more powerful definition of 'well-defined' that is able to capture both computable and 'non-computable' statements. Some examples of mathematical statements that are computable include: All statements characterised in modern programming languages, including C++, Python, and Java. All calculations carried by an electronic computer, calculator or abacus. All calculations carried out on an analytical engine. All calculations carried out on a Turing Machine. The
{"page_id": 5926, "title": "Computation"}
1 Cancri is a single star in the zodiac constellation of Cancer, positioned near the border with Gemini at a distance of around 467 light years from the Sun. It is barely visible to the naked eye as a dim, orange-hued star with an apparent visual magnitude of 5.97. The object is moving further from the Earth with a heliocentric radial velocity of +14 km/s. This is an evolved giant star with a stellar classification of K3− III, having exhausted the hydrogen at its core and expanded. It is specified as a spectral standard for that type. The angular diameter of the star measured from a lunar occultation is 2.1±0.6 mas, which, at its estimated distance, equates to a physical radius of about 19 times the radius of the Sun. It is radiating 199 times the Sun's luminosity from its enlarged photosphere at an effective temperature of 4,231 K. == References ==
{"page_id": 2916587, "title": "1 Cancri"}
1978 by the United States Congress as part of the National Energy Act that is meant to promote greater use of renewable energy. In 2009, the US Congress considered Federal level RPS requirements. The American Clean Energy and Security Act reported out of committee in July by the Senate Committee on Energy & Natural Resources includes a Renewable Electricity Standard that calls for 3% of U.S. electrical generation to come from non-hydro renewables by 2011–2013. However, the proposed Support Renewable Energy Act died in the 111th Congress. In 2007, the Edison Electric Institute, a trade association for America's investor-owned utilities, reiterated their continuing opposition to a nationwide RPS; among the reasons included were that it conflicts with and preempts existing RES programs passed in many states, it does not adequately consider the uneven distribution of renewable resources across the country, and it creates inequities among utility customers, by specifically exempting all rural electric cooperatives, and government-owned utilities from the RES mandate. The American Legislative Exchange Council (ALEC) drafted the model bill Electricity Freedom Act, which ALEC affiliate representatives are attempted to roll out in various states and which "would end requirements for states to derive a specific percentage of their electricity needs from renewable energy sources." As a result, of being unable to stop the approval of this model legislation, the American Wind Energy Association and the Solar Energy Industry Association allowed their ALEC membership lapse after one year as members. Different state RPS programs issue a different number of Renewable Energy Credits depending on the generation technology; for example, solar generation counts for twice as much as other renewable sources in Michigan and Virginia. ==== State ==== General citation: States with active RPSes that have not yet been met are in bold. Georgia, Indiana, Kansas, North Dakota, Oklahoma, South
{"page_id": 9238407, "title": "Renewable portfolio standards in the United States"}
tape was multitrack recording, in which the tape is divided into multiple tracks parallel with each other. Because they are carried on the same medium, the tracks stay in perfect synchronization. The first development in multitracking was stereo sound, which divided the recording head into two tracks. First developed by German audio engineers ca. 1943, two-track recording was rapidly adopted for modern music in the 1950s because it enabled signals from two or more microphones to be recorded separately at the same time (while the use of several microphones to record on the same track had been common since the emergence of the electrical era in the 1920s), enabling stereophonic recordings to be made and edited conveniently. (The first stereo recordings, on disks, had been made in the 1930s, but were never issued commercially.) Stereo (either true, two-microphone stereo or multi mixed) quickly became the norm for commercial classical recordings and radio broadcasts, although many pop music and jazz recordings continued to be issued in monophonic sound until the mid-1960s. Much of the credit for the development of multitrack recording goes to guitarist, composer and technician Les Paul, who also helped design the famous electric guitar that bears his name. His experiments with tapes and recorders in the early 1950s led him to order the first custom-built eight-track recorder from Ampex, and his pioneering recordings with his then-wife, singer Mary Ford, were the first to make use of the technique of multitracking to record separate elements of a musical piece asynchronously — that is, separate elements could be recorded at different times. Paul's technique enabled him to listen to the tracks he had already taped and record new parts in time alongside them. Multitrack recording was immediately taken up in a limited way by Ampex, who soon produced a commercial
{"page_id": 4556078, "title": "History of sound recording"}
try things and test them, without wasting time looking for more elegant or general solutions. == Origin in the 1970s == The distinction between neat and scruffy originated in the mid-1970s, by Roger Schank. Schank used the terms to characterize the difference between his work on natural language processing (which represented commonsense knowledge in the form of large amorphous semantic networks) from the work of John McCarthy, Allen Newell, Herbert A. Simon, Robert Kowalski and others whose work was based on logic and formal extensions of logic. Schank described himself as an AI scruffy. He made this distinction in linguistics, arguing strongly against Chomsky's view of language. The distinction was also partly geographical and cultural: "scruffy" attributes were exemplified by AI research at MIT under Marvin Minsky in the 1970s. The laboratory was famously "freewheeling" and researchers often developed AI programs by spending long hours fine-tuning programs until they showed the required behavior. Important and influential "scruffy" programs developed at MIT included Joseph Weizenbaum's ELIZA, which behaved as if it spoke English, without any formal knowledge at all, and Terry Winograd's SHRDLU, which could successfully answer queries and carry out actions in a simplified world consisting of blocks and a robot arm. SHRDLU, while successful, could not be scaled up into a useful natural language processing system, because it lacked a structured design. Maintaining a larger version of the program proved to be impossible, i.e. it was too scruffy to be extended. Other AI laboratories (of which the largest were Stanford, Carnegie Mellon University and the University of Edinburgh) focused on logic and formal problem solving as a basis for AI. These institutions supported the work of John McCarthy, Herbert Simon, Allen Newell, Donald Michie, Robert Kowalski, and other "neats". The contrast between MIT's approach and other laboratories was also
{"page_id": 404037, "title": "Neats and scruffies"}
the strengths of multipotentialites are not always appreciated in post-industrial capitalist societies, there have been times throughout history when being well-versed in multiple disciplines was considered the ideal. And, of course, multipotentiality is highly valued in certain spaces, contexts and cultures today. When multipotentialites are supported and encouraged to embrace their diverse skills and experiences, they're able to tap into their super powers: idea synthesis, rapid learning, adaptability, big picture thinking, relating to and translating between different types of people, "languages", and modes of thought. The ability to draw from and integrate a range of diverse ideas makes multipotentialites particularly well-suited to solving complex, multifactorial problems. And, their unconventional backgrounds help them develop unique voices and contribute fresh perspectives wherever they go. === Relevant terminology === While the term "multipotentialite" is often used interchangeably with polymath or Renaissance Person, the terms are not identical. One need not be an expert in any particular field to be a multipotentialite. Indeed, Isis Jade makes a clear distinction between multipotentiality and polymaths. Multipotentiality refers simply to one's potential in multiple fields owing to his/her diverse interests and attempts. Polymaths, on the other hand, are distinguished by their mastery and expertise in several fields. In this sense, multipotentialites can be viewed as potential polymaths. Other terms used to refer to multipotentialites are "scanners", "slashers", "generalist", "multipassionate", "RP2", and "multipods", among others. === Context === With the advent of the industrial age, cultural norms have shifted in favor of specialization. Indeed, in the modern day, the more narrow the specialization, the higher the pay and respect accorded, for example: PhD graduates, and specialized lawyers, doctors, and engineers. The aphorism Jack of all trades, master of none emphasizes this. Older emphasis towards generalism and multiple potentials such as Renaissance humanism and the Renaissance man were replaced.
{"page_id": 6980512, "title": "Multipotentiality"}
gaps are represented as dashes(-) on a protein/DNA sequence alignment. Unix diff function - computes the minimal difference between two files similarly to plagiarism detection. Spell checking - Gap penalties can help find correctly spelled words with the shortest edit distance to a misspelled word. Gaps can indicate a missing letter in the incorrectly spelled word. Plagiarism detection - Gap penalties allow algorithms to detect where sections of a document are plagiarized by placing gaps in original sections and matching what is identical. The gap penalty for a certain document quantifies how much of a given document is probably original or plagiarized. == Bioinformatics applications == === Global alignment === A global alignment performs an end-to-end alignment of the query sequence with the reference sequence. Ideally, this alignment technique is most suitable for closely related sequences of similar lengths. The Needleman-Wunsch algorithm is a dynamic programming technique used to conduct global alignment. Essentially, the algorithm divides the problem into a set of sub-problems, then uses the results of the sub-problems to reconstruct a solution to the original query. === Semi-global alignment === The use of semi-global alignment exists to find a particular match within a large sequence. An example includes seeking promoters within a DNA sequence. Unlike global alignment, it compromises of no end gaps in one or both sequences. If the end gaps are penalized in one sequence 1 but not in sequence 2, it produces an alignment that contains sequence 2 within sequence 1. === Local alignment === A local sequence alignment matches a contiguous sub-section of one sequence with a contiguous sub-section of another. The Smith-Waterman algorithm is motivated by giving scores for matches and mismatches. Matches increase the overall score of an alignment whereas mismatches decrease the score. A good alignment then has a positive score
{"page_id": 1004764, "title": "Gap penalty"}
proximity, they become more vulnerable to collateral damage if an adjacent structure is destroyed. Furthermore, most resource generation structures can cause chain reactions when destroyed (especially Tier III structures, which produce large amounts of resources but often have large detonations that can wipe out a nearby army). === Warfare === Supreme Commander uses a "strategic zoom" system that allows the player to seamlessly zoom from a detailed close up view of an individual unit all the way out to a view of the entire map, at which point it resembles a fullscreen version of the minimap denoting individual units with icons. The camera also has a free movement mode and can be slaved to track a selected unit and there is a split screen mode which also supports multiple monitors. This system allows Supreme Commander to use vast maps up to 80 km x 80 km, with players potentially controlling a thousand units each. Units in Supreme Commander are built to scale as they would be in the real world. For example, battleships dwarf submarines. Late into the game, the larger "experimental" units, such as the Cybran Monkeylord, an enormous spider-shaped assault unit, can actually crush smaller enemy units by stepping on them. Because of the wide range of planets colonized by humanity in the setting, the theatres of war range from desert to arctic, and all battlespaces are employed. Technologies emerging in modern warfare are frequently employed in Supreme Commander. For example, stealth technology and both tactical and strategic missile and missile defense systems can be used. Supreme Commander introduced several innovations designed to reduce the amount of micromanagement inherent in many RTS games. Engineers units have the command "assist", that will help follow other engineers and help them finish their orders or improve production rate of factories. In
{"page_id": 28832249, "title": "Supreme Commander (video game)"}
A N G E R 1. This is not his real name. 2. The anthropologist Jeffrey Tobin (2000) has considered working-class Argentine soccer fans’ pleasures and their risky interface with the homoerotic; Sharon Mazer (1990, 1998) offers a close look at the visceral pleasures of WCW wrestling and its fans’ delight in its gendered, racialized morality plays. 3. The interviews with Harriet Mizuno-Moyer and Taylor Moyer and with Beverly Mu - rata took place at Sozenji Buddhist Temple in Montebello, California, on June 19, 2001. 4. Hill Collins (1998, 85) observes, “Those victimized by hate speech often choose not to fight back. . . . Although fear, rage, and shock may characterize the victim’s reaction, she or he may not think of an appropriate response until much later. Moreover, the effect of de - humanizing language is often flight rather than fight.” Hill Collins thus argues that fighting words are more likely to prompt silence than to incite a violent response. 5. Many thanks to Yayoi Uno Everett for giving me the poster. It can be seen in Bender 2012, 160. I was amused to learn years later that Ahlgren (2011, 199) also had a Honō Daiko poster on her wall. 6. My thanks to George Lipsitz for this point. Notes 221 7. Most all-women taiko groups were formed in response to gender inequity in exist - ing taiko groups or as proactive efforts to explore alternative kinds of kumi-daiko. Sawagi Taiko in Vancouver is one such group, described on its website ( ) as follows: “Sawagi Taiko is the first all-women’s taiko group in Canada, formed in 1990. In Sawagi Taiko, we pool our common and unique experiences as East Asian women living in Canada and focus our creative energy and ideas into a powerful expression that is
{"source": 1742, "title": "from dpo"}
Lomonosov Moscow State University Abstract Spectral Graph Theory (MS - ID 46) Combinatorics and Discrete Mathematics PDF Systems of equiangular lines, Seidel matrices and adjacency matrices Dr. Jack Koolen, University of Science and Technology of China Abstract PDF The local spectra of a graph and some of their applications Prof. Miquel Àngel Fiol Mora, Universitat Politècnica de Catalunya Abstract PDF Almost mixed Moore graphs and their spectra Dr. NACHO (IGNACIO) LOPEZ LORENZO, Universitat de Lleida Abstract PDF Optimal Grid Drawings of Complete Multipartite Graphs and an Integer Variant of the Algebraic Connectivity Mr. Clemens Huemer, Universitat Politècnica de Catalunya Abstract PDF Characterizing identifying codes from the spectrum of a graph or digraph Ms. Berenice Martínez Barona, Universitat Politècnica de Catalunya Abstract PDF Spectra and eigenspaces from regular partitions of Cayley (di)graphs of permutation groups Dr. Cristina Dalfo, Universitat de Lleida Abstract PDF On the rank of pseudo walk matrices Dr. Alexander Farrugia, G.F. Abela Junior College, University of Malta Abstract PDF On symmetric association schemes and associated quotient-polynomial graphs Dr. Safet Penjić, University of Primorska Abstract PDF Eigenvalues and [ 𝑎 , 𝑏 ] [a,b]-factors in regular graphs Prof. Suil O, SUNY Korea Abstract PDF Complementary prisms and their spectra Prof. Paula Carvalho, University of Aveiro Abstract PDF On some classes of signed graphs with small second largest eigenvalue Dr. Bojana Mihailovic, University of Belgrade - School of Electrical Engineering Abstract PDF Playing with quaternions unit gain graphs Prof. Maurizio Brunetti, Università di Napoli "Federico II" Abstract PDF Isospectral magnetic graphs Prof. Fernando Lledó, University Carlos III, Madrid and Insitute for Mathematical Sciencies (ICMAT), Madrid Abstract PDF Maximal cliques in strongly regular graphs Dr. Gary Greaves, Nanyang Technological University Abstract PDF Strongly regular signed graphs and association schemes Dr. Ivana Jovović, School of Electrical Engineering, University of Belgrade Abstract PDF
{"source": 4158, "title": "from dpo"}
the high risk of certain respondents are called high-risk variables . Examples of continuous high-risk variables are income and age for demographic microdata files and value of shipments for establishment microdata files. As stated previously, if an agency published these variables on a microdata file with no top-coding, there would probably be a disclosure of confidential information. For example, intruders could probably correctly identify respondents who are over the age of 100 or who have incomes of over one million dollars. Appropriate top-codes (and/or bottom-codes in some cases) should be set for all of the continuous high-risk variables on a microdata file. Top-coded records should then only show a representative value for the upper tail of the distribution, such as the cut-off value for the tail or the mean or median value for the tail, depending on user preference. Angle (2003) developed a methodology for estimating the distribution of top coded values using a distribution more general than the traditional Pareto, and illustrates it using annual wage and salary income. The model’s estimate of the right tail truncated by top-coding has been shown to have many of the dynamics of the right tails of empirical annual wage and salary income distributions. This methodology uses a probability density function model for generating the right tail of an income distribution that has been truncated by top-coding. The model’s parameters are estimated in the fit of the model to data below the cutoff for top-coding. The model’s right tail is used in the estimation of statistics of the whole distribution. The model is able to generate the distribution of top coded values even after lowering the threshold level for minimum top-codeable annual wage and salary income well below the 99 th percentile. (Angle, 2003). C.4. Precautions for Certain Types of Microdata There are
{"source": 5919, "title": "from dpo"}
rocky beaches. These three species would have been well suited to refugia during the LGM as the continental shelf was exposed and some mountain peaks stuck out from the top of the ice sheet. === Cypress Hills === The Cypress Hills in Southeastern Alberta and Southwestern Saskatchewan, are a collection of hills that rise above the surrounding prairies. During the Laurentide Glaciation the Cypress Hills were left ice free. The Cypress Hills Glacial Refugia was home a diversity of flora and fauna. === Europe === During the LGM, many of the species of Europe retreated south, out of reach of the ice sheet and the colder climate. These southern refugia have been shown in looking at the pathways of the common European meadow grasshopper. Through analysis of the grasshoppers’ genome it was found that they had been divided into 5 different geographical regions: Turkey, Greece, Italy, Spain, and the Balkans. Despite significant differences in the ecology of species, some general colonization patterns are observed which are often common to several species groups. These colonization entailed successive bottlenecks phenomena that led to a loss of genetic diversity in northern populations. Therefore, based on the data of numerous phylogeographic research, the high genetic diversity of populations of southern regions can often be an indication for positioning a Pleistocene refugium, while the geographical distributions of the northern populations are dictated by the colonization patterns of the refugia populations. While these southern refugia have been found for many other species of flora and fauna, there may have been high altitude refugia on the coast of northern Norway. One proposed refugium is on the island of Andøya in Norway. Pollen and chloroplast DNA of spruce and pine, found in the sedimentary deposits on this island, were dated to about 22,000 years BP for the spruce
{"page_id": 41052267, "title": "Examples of ice age refugia"}
copies of themselves dates back at least several hundred years. An early reference is an anecdote regarding the philosopher René Descartes, who suggested to Queen Christina of Sweden that the human body could be regarded as a machine; she responded by pointing to a clock and ordering "see to it that it reproduces offspring." Several other variations on this anecdotal response also exist. Samuel Butler proposed in his 1872 novel Erewhon that machines were already capable of reproducing themselves but it was man who made them do so, and added that "machines which reproduce machinery do not reproduce machines after their own kind". In George Eliot's 1879 book Impressions of Theophrastus Such, a series of essays that she wrote in the character of a fictional scholar named Theophrastus, the essay "Shadows of the Coming Race" speculated about self-replicating machines, with Theophrastus asking "how do I know that they may not be ultimately made to carry, or may not in themselves evolve, conditions of self-supply, self-repair, and reproduction". In 1802 William Paley formulated the first known teleological argument depicting machines producing other machines, suggesting that the question of who originally made a watch was rendered moot if it were demonstrated that the watch was able to manufacture a copy of itself. Scientific study of self-reproducing machines was anticipated by John Bernal as early as 1929 and by mathematicians such as Stephen Kleene who began developing recursion theory in the 1930s. Much of this latter work was motivated by interest in information processing and algorithms rather than physical implementation of such a system, however. In the course of the 1950s, suggestions of several increasingly simple mechanical systems capable of self-reproduction were made — notably by Lionel Penrose. === Von Neumann's kinematic model === A detailed conceptual proposal for a self-replicating machine was
{"page_id": 1600053, "title": "Self-replicating machine"}
in mindset within finance and economics that moves the field towards methods of natural science. Perhaps finance needs to be thought of more as an observational science where markets are observed in the same way as the observable universe in cosmology, or the observable ecosystems in the environmental sciences. Here local principles can be uncovered by local experiments but meaningful global experiments are difficult to envision as feasible without reproducing the system being observed. The required science becomes that based largely on pluralism (see scientific pluralism the view that some phenomena observed in science require multiple explanations to account for their nature), as in most sciences that deal with complexity, rather than a singled unified mathematical framework that is to be verified by experiment. == See also == Complexity Econophysics Financial econometrics Mathematical finance Modeling and analysis of financial markets Statistical physics Time series analysis == References == == Bibliography == See Econophysics bibliography and text books Jean-Philippe Bouchaud, Marc Potters, Theory of Financial Risk and Derivative Pricing, Cambridge University Press (2003) Rosario N. Mantegna, H. Eugene Stanley, An Introduction to Econophysics: Correlations and Complexity in Finance, Cambridge University Press (1999) Neil F. Johnson, Paul Jefferies and Pak Ming Hui, Financial Market Complexity: What Physics Can Tell Us About Market Behaviour, Oxford University Press (2003) Mantegna, Rosario N.; Kertesz, Janos (2010). "Focus on Statistical Physics Modelling in Economics and Finance". New Journal of Physics. == External links == Statistical Finance at arXiv.org
{"page_id": 7458786, "title": "Statistical finance"}
absorption of radio signals passing through the region. In fact, absorption levels can increase by many tens of dB during intense events, which is enough to absorb most (if not all) transpolar HF radio signal transmissions. Such events typically last less than 24 to 48 hours. === E layer === The E layer is the middle layer, 90 to 150 km (56 to 93 mi) above the surface of the Earth. Ionization is due to soft X-ray (1–10 nm) and far ultraviolet (UV) solar radiation ionization of molecular oxygen (O2). Normally, at oblique incidence, this layer can only reflect radio waves having frequencies lower than about 10 MHz and may contribute a bit to absorption on frequencies above. However, during intense sporadic E events, the Es layer can reflect frequencies up to 50 MHz and higher. The vertical structure of the E layer is primarily determined by the competing effects of ionization and recombination. At night the E layer weakens because the primary source of ionization is no longer present. After sunset an increase in the height of the E layer maximum increases the range to which radio waves can travel by reflection from the layer. This region is also known as the Kennelly–Heaviside layer or simply the Heaviside layer. Its existence was predicted in 1902 independently and almost simultaneously by the American electrical engineer Arthur Edwin Kennelly (1861–1939) and the British physicist Oliver Heaviside (1850–1925). In 1924 its existence was detected by Edward V. Appleton and Miles Barnett. === Es layer === The Es layer (sporadic E-layer) is characterized by small, thin clouds of intense ionization, which can support reflection of radio waves, frequently up to 50 MHz and rarely up to 450 MHz. Sporadic-E events may last for just a few minutes to many hours. Sporadic E propagation
{"page_id": 15097, "title": "Ionosphere"}
'Where are you going?' asked the wolf. The fox, pointing to the cheese-like reflection of the moon, replied: 'Here is plenty of meat and cheese; get into the other bucket and come down at once.' The wolf did so, and as he descended, the fox was drawn up. 'And how am I to get out?' demanded the wolf. 'Ah' said the fox 'the righteous is delivered out of trouble and the wicked cometh in his stead. Is it not written, Just balances, just weights'? Rashi as the first literary reference may reflect the well-known beast fable tradition of French folklore, or a more obscure such tradition in Jewish folklore as it appears in Mishlè Shu'alim. The near-contemporary Iraqi rabbi Hai Gaon also reconstructed this Rabbi Meir tale, sharing some elements of Rashi's story, but with a lion caught in a trapping pit rather than a wolf in a well. However, Rashi may have actively "adapted contemporary [French] folklore to the [T]almudic passage", as was homiletically practiced in different Jewish communities. Though the tale itself is probably of non-Jewish European origin, Rashi's form and elements are likely closer to the original in oral folklore than the somewhat later variation recorded featuring Reynard. Rashi's version already includes the fox, the wolf, the well and the Moon that are seen in later versions. Petrus Alphonsi, a Spanish Jewish convert to Christianity, popularized this tale in Europe in his collection Disciplina Clericalis. The variation featuring Reynard the Fox appeared soon after Petrus Alphonsi in the French classic Le Roman de Renart (as "Renart et Ysengrin dans le puits" in Branch IV); the Moon/cheese element is absent (it is replaced by a promise of Paradise at the bottom of the well), but such a version is alluded to in another part of the collection. This
{"page_id": 22849760, "title": "The Moon is made of green cheese"}
†Plectronoceratia (formerly Plectronoceratoidea) Order †Plectronoceratida Order †Yanheceratida Order †Protactinoceratida Subclass †Multiceratia (formerly Multiceratoidea) Order †Ellesmeroceratida Order †Cyrtocerinida Order †Bisonoceratida Order †Oncoceratida Order †Discosorida Subclass †Tarphyceratia Order †Tarphyceratida Order †Ascoceratida Subclass Nautilia (formerly Nautiloidea sensu stricto) Order Nautilida Subclass †Orthoceratia (formerly Orthoceratoidea) Order †Rioceratida Order †Dissidoceratida Order †Orthoceratida Order †Pseudorthoceratida Order †Actinoceratida Order †Astroviida (suborders †Lituitina and †Pallioceratina) Order †Endoceratida Traditional nautiloid classification schemes emphasize certain character traits over others, potentially involving personal bias as to which traits are worth emphasizing according to different authors. This issue may be resolved by sampling all morphological traits equally through bayesian phylogenetic inference. The first cephalopod-focused paper to use this technique was published by Pohle et al. (2022). They recovered several previously hypothesized groups, though many orders were determined to be paraphyletic. The study was focused on early cephalopod diversification in the Late Cambrian and Ordovician, and did not discuss in detail the origin of post-Ordovician groups. The following is a simplified version of their cladogram, showing early cephalopod relationships to the order level (although various isolated families also originated during this diversification event): == Gallery == == See also == Ammonoidea Belemnoidea Lituites == References == == Further reading == == External links == Nautiloids: The First Cephalopods (TONMO.com) Palaeos CephBase: Nautiloidea "Lophotrochozoa : Mollusca".
{"page_id": 861683, "title": "Nautiloid"}
NGC 163 is an elliptical galaxy in the constellation Cetus. It was discovered by William Herschel in 1890. Seen through an optical telescope it ranges up to 13th magnitude. == Notes == == References == == External links == Media related to NGC 163 at Wikimedia Commons
{"page_id": 51493917, "title": "NGC 163"}
An unditching beam is a device that is used to aid in the recovery of armoured fighting vehicles when they become bogged or "ditched". The device is a beam that is attached to the continuous tracks that provides additional traction for the vehicle to extricate itself from a ditch or from boggy conditions. The unditching beam was first introduced into service during the First World War with the British Mark IV tank. It is believed the device was designed by Philip Johnson who was serving as an engineering officer at the British Army's depot at Érin; originally the device weighed one-half long ton (0.51 t) and was constructed of a solid beam of oak with two large steel plates bolted to two sides to provide protection. When not in use it was stowed on two rails mounted on the roof of the tank that ran the entire length of the vehicle, and when employed the beam was chained to the tank's tracks, giving the vehicle something firm to drive over. Unditching beams remain a commonly carried standard ancillary on a number of Russian produced armoured fighting vehicles. == See also == Unditching roller == References == === Citations === === Bibliography === Fletcher, David (2016). British Battle Tanks: World War I to 1939. London: Osprey Publishing. ISBN 9781472817570. Foss, Christopher F., ed. (2002). The encyclopedia of tanks & armoured fighting vehicles. London: Amber Books. ISBN 978-1905704-44-6. Janes, Land Warfare Platforms: Armoured Fighting Vehicles, Coulsdon, Surrey: Jane's Group UK Limited. Moore, Craig (2017). Tank Hunter: World War I. Stroud: The History Press. ISBN 9780750986595.
{"page_id": 70409969, "title": "Unditching beam"}
Kyiv Planetarium (previously Republican Planetarium; Ukrainian: Київський планетарій) in Kyiv, Ukraine is one of the largest planetaria in former Soviet states. Opened on January 1, 1952, by the initiative of the scientist-astronomer Serhiy Vsekhsviatskiy (1905–1984), the planetarium has a dome of 23.5 meters in diameter, and seats 320 people. In 1987, Kyiv Planetarium moved to new premises on the street. Red Army, 57 /3, (now Velyka Vasylkivska Street 57/3) where it remains to this day. The new building was equipped with an optomechanical projector "Large Zeiss IV», allowing to demonstrate the 6500 stars of the Northern and Southern hemispheres. The planetarium offers lectures on astronomy, geography, natural history. When the children's planetarium astronomical school for students 6–11 years of age and art studio. Kyiv Planetarium is a division of the Society "Knowledge" of Ukraine. == Atmasfera 360 == In December 2011 an entertainment center ATMASFERA 360 was founded on the basis of the planetarium. Specifications of the dome: diameter — 23 meters, the height of the dome — 11.5 meters. It is equipped with a modern 4k digital projection system supplied by a Ukrainian company Front Pictures. The system uses 15 projectors which work on a single Screenberry media server. Due to digital autocalibration system, the calibration process takes up to 15 minutes and includes all 5 stages: Geometric alignment Edge blending Brightness uniformity Gamma matching Black level compensation Atmasfera 360 is equipped with a software, Event Horizon. Event Horizon is a real-time 3D fulldome environment that visualizes and simulates the known Universe according to accurate, up-to-date scientific data. The software is based on the latest Unreal Engine technology and provides up to 4K resolution graphics which, combined with a beautiful soundtrack, gives a revolutionary viewing experience. == Kyiv Planetarium == The planetarium underwent a rebranding and technological upgrade in
{"page_id": 4912107, "title": "Kyiv Planetarium"}
so that compilers are free to define subsequent syntax and associated behavior. For instance, a pragma is often used to allow suppression of error messages, manage heap and stack debugging and so on. C99 introduced a few standard pragmas, taking the form #pragma STDC ..., which are used to control the floating-point implementation. The alternative, macro-like form _Pragma(...) was also added. One of the most popular uses of the #pragma directive is #pragma once, which behaves the same way an #include guard would, condensed into a single directive placed at the top of the file. Despite being non-standard, it is supported by most compilers. === Trigraphs === Many implementations do not support trigraphs or do not replace them by default. === Assertion === Some Unix preprocessors provided an assertion feature – which has little similarity to standard library assertions. === Include next === GCC provides #include_next for chaining headers of the same name. === Import === Unlike C and C++, Objective-C includes an #import directive that is like #include but results in a file being included only once – eliminating the need for include guards and #pragma once. In Microsoft Visual C++ (MSVC), there also exists an #import preprocessor directive, used to import type libraries. It is a nonstandard directive. The Objective-C directive should not be confused with the C++ keyword import, which is used to import C++ modules (since C++20), and is not a preprocessor directive. === Nullable === The #nullable directive in C# is used to enable and disable nullable reference types. To enable them, use #nullable enable, and #nullable disable to disable them. This directive does not exist in C/C++. === Region === The #region and #endregion directives in C# are used to expand/collapse sections of code in IDEs, and has no effect on actual compilation of
{"page_id": 231835, "title": "C preprocessor"}
IoU threshold in object detection tasks. In the image below, the cat on the left has _**0.3 IoU ( IoU Threshold)**_ w.r.t ground truth. !Image 5: Calculating IoU threshold out of all predictions(TP+FN). !Image 6: Recall formula for each class and then average over a number of classes. !Image 7: Mean Average Precision Formula and false negatives (FN). This property makes mAP a suitable metric for most detection applications. > Pro tip: Have a look at [27+ Most Popular Computer Vision Applications]( and Use Cases [Precision-Recall Curve breakdown]( ---------------------------------------------------------------------------------------------------------------------- _**Precision-Recall curve**_ is obtained by
{"source": 4970, "title": "from dpo"}
is too high, the wastewater can erupt at the ground surface. Layout of the drip distribution network must be considered carefully. Two important consequences of the network layout are the impacts on dose pump sizing necessary to achieve adequate flushing flows and the extent of localized overloading due to internal dripline drainage. Flushing flow rates are a function of the number of manifold/dripline connections: More connections create a need for greater flushing flows, which require a larger pump. To minimize the flushing flow rate, the length of each dripline should be made as long as possible in accordance with the manufacturer’s recommendations. To fit the landscape, the dripline can be looped between the supply and return manifolds (figure 4-19). Consideration should also be given to dividing the network into more than one cell to reduce the number of connections in an individual network. A computer program has been developed to evaluate and optimize the hydraulic design for adequate flushing flows of dripline networks that use pressure-compensating emitters (Berkowitz and Harman, 1994). Internal drainage that occurs following each dose or when the soils around the dripline are saturated USEPA Onsite Wastewater Treatment Systems Manual 4-31 Chapter 4: Treatment Processes and Systems can cause significant hydraulic overloading to lower portions of the SWIS. Following a dose cycle, the dripline drains through the emitters. On sloping sites, the upper driplines drain to the lower driplines, where hydraulic overloading can occur. Any free water around the dripline can enter through an emitter and drain to the lowest eleva-tion. Each of these events needs to be avoided as much as possible through design. The designer can minimize internal drainage problems by isolating the driplines from each other in a cell, by aligning the supply and return manifolds with the site’s contours. A further safeguard is
{"source": 2649, "title": "from dpo"}
te speech detection on facebook,” in First Italian Conference on Cybersecurity, 2017. > M. Bouazizi and T. Ohtsuki, “Multi -class sentiment analysis on twitter: Classification performance and challenges,” Big Data Mining and Analytics, vol. 2, no. 3, pp. 181 –194, Sep. 2019. > G. Jalaja and C. Kavitha, Sentiment Analysis for Text Extracted from Twitter. Singapore: Springer Singapore, 2019, pp. 693 –700. > S. Sharma and A. Jain, “Cyber social media analytics and issues: A pragmatic approach for twitter sentiment analysis,” in Advances in Computer Communication and Computational Sciences, S. K. Bhatia, S. Tiwari, K. K. Mishra, and M. C. Trivedi, Eds. Singapore: Springer Singapore, 2019, pp. 473 –484. > M. Zampieri, S. Malmasi, P. Nakov, S. Rosenthal, N. Fa rra, and R. Kumar, “Identifying and categorizing youtube comments in social media (offenseval),” arXiv preprint arXiv:1903.08983, 2019. > J. Devlin, M.-W. Chang, K. Lee, and K. Toutanova, “Bert: Pretraining of deep bidirectional transformers for language understanding,” arXiv preprint arXiv:1810.04805, 2018.p. 263 – 270. > P. Liu, W. Li, and L. Zou, “Transfer learning for youtube comments detection using bidirectional transformers,” in Proceedings of the 13th International Workshop on Semantic Evaluation, 2019, pp. 87 –91. > J. Han, S. Wu, and X. Liu, “Identifying and categorizing youtube comments in social media,” in International Research Journal of Innovations in Engineering and Technology (IRJIET) > ISSN (online): 2581-3048 > Volume 9, Special Issue INSPIRE’25 , pp 134-140, April-2025 > > International Conference on Sustainable Practices and Innovations in Research and Engineering (INSPIRE'25) © 2025 IRJIET All Rights Reserved www.irjiet.com 139 Proceedings of the 13th International Workshop on Semantic Evaluation, 2019, pp. 652 –656. > A. Nikolov and V. Radivchev, “Offensive twee t classification with bert and ensembles,” in Proceedings of the 13th International Workshop
{"source": 4959, "title": "from dpo"}
density estimator: L2 theory. Zeitschrift f¨ ur Wahrscheinlichkeitstheorie und verwandte Gebiete 57 , 453–476. Friedman, J. H. (1984) SMART user’s guide. Technical Report 1, Laboratory for Compu-tational Statistics, Department of Statistics, Stanford University. Friedman, J. H. (1987) Exploratory projection pursuit. Journal of the American Statistical Association 82 , 249–266. Friedman, J. H. (1991) Multivariate adaptive regression splines (with discussion). Annals of Statistics 19 , 1–141. Friedman, J. H. and Silverman, B. W. (1989) Flexible parsimonious smoothing and additive modeling (with discussion). Technometrics 31 , 3–39. Friedman, J. H. and Stuetzle, W. (1981) Projection pursuit regression. Journal of the American Statistical Association 76 , 817–823. Friendly, M. (1994) Mosaic displays for multi-way contingency tables. Journal of the American Statistical Association 89 , 190–200. Friendly, M. (2000) Visualizing Categorical Data . Cary, NC: SAS Institute. Fuller, W. A. (1987) Measurement Error Models . New York: John Wiley and Sons. Funahashi, K. (1989) On the approximate realization of continuous mappings by neural networks. Neural Networks 2, 183–192. References 471 Gabriel, K. R. (1971) The biplot graphical display of matrices with application to principal component analysis. Biometrika 58 , 453–467. [311, 312] Gallant, A. R. (1987) Nonlinear Statistical Models . New York: John Wiley and Sons. Gamerman, D. (1997a) Markov Chain Monte Carlo: stochastic simulation for Bayesian inference . London: Chapman & Hall. Gamerman, D. (1997b) Sampling from the posterior distribution in generalized linear mixed models. Statistics and Computing 7, 57–68. Gehan, E. A. (1965) A generalized Wilcoxon test for comparing arbitrarily singly-censored samples. Biometrika 52 , 203–223. Geisser, S. (1993) Predictive Inference: An Introduction . New York: Chapman & Hall. Gentle, J. E. (1998) Numerical Linear Algebra for Applications in Statistics . New York: Springer-Verlag. Gill, P.
{"source": 6256, "title": "from dpo"}
Paleophycology (also once known as paleoalgology) is the subdiscipline of paleobotany that deals with the study and identification of fossil algae and their evolutionary relationships and ecology. The field is very important in the science of paleolimnology as the algae leave many indicators of fossil ecosystems. Primary and most familiar are both fossil shells from diatoms and biogeochemical traces of algal pigments in lake sediments. These fossils are clues to changes in nutrient availability and ecology of lakes. Some paleophycologists: John P. Smol, a Canadian paleolimnologist Stanley Awramik, an American Precambrian paleontologist Bruno R. C. Granier, a French stratigrapher and micropaleontologist Robert Riding, a British geologist and expert on calcareous algae and stromatolites == References ==
{"page_id": 48966904, "title": "Paleophycology"}
In a crystalline material, a dislocation is capable of traveling throughout the lattice when relatively small stresses are applied. This movement of dislocations results in the material plastically deforming. Pinning points in the material act to halt a dislocation's movement, requiring a greater amount of force to be applied to overcome the barrier. This results in an overall strengthening of materials. == Types of pinning points == === Point defects === Point defects (as well as stationary dislocations, jogs, and kinks) present in a material create stress fields within a material that disallow traveling dislocations to come into direct contact. Much like two particles of the same electric charge feel a repulsion to one another when brought together, the dislocation is pushed away from the already present stress field. === Alloying elements === The introduction of atom1 into a crystal of atom2 creates a pinning point for multiple reasons. An alloying atom is by nature a point defect, thus it must create a stress field when placed into a foreign crystallographic position, which could block the passage of a dislocation. However, it is possible that the alloying material is approximately the same size as the atom that is replaced, and thus its presence would not stress the lattice (as occurs in cobalt alloyed nickel). The different atom would, though, have a different elastic modulus, which would create a different terrain for the moving dislocation. A higher modulus would look like an energy barrier, and a lower like an energy trough – both of which would stop its movement. === Second phase precipitates === The precipitation of a second phase within the lattice of a material creates physical blockades through which a dislocation cannot pass. The result is that the dislocation must bend (which requires greater energy, or a greater stress
{"page_id": 14453424, "title": "Pinning points"}
Ignoring pressure, one may write: α A = 1 A d A d T {\displaystyle \alpha _{A}={\frac {1}{A}}\,{\frac {\mathrm {d} A}{\mathrm {d} T}}} where A {\displaystyle A} is some area of interest on the object, and d A / d T {\displaystyle dA/dT} is the rate of change of that area per unit change in temperature. The change in the area can be estimated as: Δ A A = α A Δ T {\displaystyle {\frac {\Delta A}{A}}=\alpha _{A}\Delta T} This equation works well as long as the area expansion coefficient does not change much over the change in temperature Δ T {\displaystyle \Delta T} , and the fractional change in area is small Δ A / A ≪ 1 {\displaystyle \Delta A/A\ll 1} . If either of these conditions does not hold, the equation must be integrated. === Volume === For a solid, one can ignore the effects of pressure on the material, and the volumetric (or cubical) thermal expansion coefficient can be written: α V = 1 V d V d T {\displaystyle \alpha _{V}={\frac {1}{V}}\,{\frac {\mathrm {d} V}{\mathrm {d} T}}} where V {\displaystyle V} is the volume of the material, and d V / d T {\displaystyle \mathrm {d} V/\mathrm {d} T} is the rate of change of that volume with temperature. This means that the volume of a material changes by some fixed fractional amount. For example, a steel block with a volume of 1 cubic meter might expand to 1.002 cubic meters when the temperature is raised by 50 K. This is an expansion of 0.2%. If a block of steel has a volume of 2 cubic meters, then under the same conditions, it would expand to 2.004 cubic meters, again an expansion of 0.2%. The volumetric expansion coefficient would be 0.2% for 50 K, or
{"page_id": 1569600, "title": "Thermal expansion"}
South America—extend for thousands of kilometres. The longest rivers are the river Nile in Africa (6,695 kilometres or 4,160 miles) and the Amazon river in South America (6,437 kilometres or 4,000 miles). Deserts cover about 20% of the total land area. The largest is the Sahara, which covers nearly one-third of Africa. The elevation of the land surface of the Earth varies from the low point of −418 m (−1,371 ft) at the Dead Sea, to a 2005-estimated maximum altitude of 8,848 m (29,028 ft) at the top of Mount Everest. The mean height of land above sea level is 686 m (2,250 ft). The geological history of Earth can be broadly classified into two periods namely: Precambrian: extends for approximately 90% of geologic time, from 4.6 billion years ago to the beginning of the Cambrian Period (539 Ma). It is generally believed that small proto-continents existed prior to 3000 Ma, and that most of the Earth's landmasses collected into a single supercontinent around 1000 Ma. Phanerozoic: the current eon in the geologic timescale. It covers 539 million years. During this time, continents drifted about, eventually collected into a single landmass known as Pangea and then split up into the current continental landmasses. === Mars === The surface of Mars is thought to be primarily composed of basalt, based upon the observed lava flows from volcanos, the Martian meteorite collection, and data from landers and orbital observations. The lava flows from Martian volcanos show that lava has a very low viscosity, typical of basalt. Analysis of the soil samples collected by the Viking landers in 1976 indicate iron-rich clays consistent with weathering of basaltic rocks. There is some evidence that some portion of the Martian surface might be more silica-rich than typical basalt, perhaps similar to andesitic rocks on Earth,
{"page_id": 12607134, "title": "Geology of solar terrestrial planets"}
to regulate the growth of expected fungal presence. In a coevolutionary response, arbuscular fungal communities breed quickly and evolutionarily selected for the development of specific gene clusters to detoxify and metabolize a wide variety of organic antifungal chemicals. This exchange of evolutionary pressures has given a variety of plant species better immune systems, while simultaneously giving mutualist fungal communities new sources of plant energy at the genomic level. == Insects == Interactions between fungi and insects are incredibly common and most of these relationships are either commensal or pathogenic. === Commensal === The commensal relationships typically benefit the insect by allowing them to digest tough materials such as wood. For example, wood-ingesting passalid beetle guts are populated with bacteria, yeasts, and other eukaryotic organisms that aid in digestion and nutrient absorption. Without the help of the yeasts to break down xylose from plant cells, these beetles would be unable to efficiently digest this tough material. === Pathogenic === Insect pathogenic fungi slowly kill their hosts while replicating rapidly inside the infected insect. They typically attach to the external surface of the insect as spores before germinating, perforating the cuticle, and colonizing the internal cavity. The insect is typically killed and new spores are dispersed from the reproductive structures in the body of the insect. A prominent example of an entomopathogenic fungus is Ophiocordyceps unilateralis, nicknamed the “zombie-ant” fungus. The fungus infects ants and alters their natural behavioral patterns causing the ant to leave their usual environment in the trees in favor of the forest floor – a more suitable environment for fungal growth. The insects will then attach themselves to the underside of a leaf until it dies. Fungal spores then sprout out of the dead ant's head and are dispersed. One of the first descriptions of insect pathogenic fungi
{"page_id": 49336567, "title": "Mycobiome"}
This is a list of scientific journals published in the field of statistics. == Introductory and outreach == The American Statistician Significance == General theory and methodology == Annals of the Institute of Statistical Mathematics Annals of Statistics AStA Wirtschafts- und Sozialstatistisches Archiv Biometrika The Canadian Journal of Statistics Communications in Statistics International Statistical Review Journal of the American Statistical Association Journal of Multivariate Analysis Journal of the Royal Statistical Society Probability and Mathematical Statistics Sankhyā: The Indian Journal of Statistics Scandinavian Journal of Statistics Statistica Neerlandica Statistica Sinica Statistical Science Stochastic Processes and their Applications == Applications == Annals of Applied Statistics Journal of Applied Statistics Journal of the Royal Statistical Society, Series C: Applied Statistics Journal of Statistical Software Statistical Modelling Statistics and its Interface The R Journal The Stata Journal The Journal of Risk Model Validation == Statistics education == Journal of Statistics and Data Science Education == Specialized journals in various areas of statistics == === Biostatistics === Biometrical Journal Biometrics Biometrika Biostatistics The International Journal of Biostatistics Pharmaceutical Statistics Statistical Applications in Genetics and Molecular Biology Statistical Methods in Medical Research Statistics in Medicine (journal) === Computational statistics === Communications in Statistics - Simulation and Computation Computational Statistics Computational Statistics & Data Analysis Journal of Computational and Graphical Statistics Journal of Statistical Computation and Simulation Statistics and Computing === Econometrics === Applied Econometrics and International Development Econometric Reviews Econometric Theory Econometrica Journal of Applied Econometrics Journal of Business & Economic Statistics Journal of Econometrics The Review of Economics and Statistics === Environmental and ecological sciences === Atmospheric Environment Journal of Agricultural, Biological, and Environmental Statistics === Physical sciences, technology, and quality === Chemometrics and Intelligent Laboratory Systems Journal of Chemometrics Journal of Statistical Mechanics: Theory and Experiment Journal of Statistical Physics Physica A: Statistical mechanics
{"page_id": 19972962, "title": "List of statistics journals"}
steering input, and driver assistance feature status. Tesla vehicles permanently record this data as "gateway log" files onto a microSD card in the Media Control Unit, at a rate of approximately 5 times per second (hertz or Hz). Gateway log files are uploaded to Tesla when the vehicle connects to a Wi-Fi network. The Autopilot computer stores images (for all vehicles) and video (for model year 2016 and later vehicles) along with driving data similar to that captured in gateway log files at a higher temporal resolution (up to 50 Hz) and uploads these to Tesla periodically. These "snapshots" are deleted locally after being uploaded. Tesla has been silent about its data retention policies. Snapshot data are always captured when the vehicle crashes (defined as deploying the airbags) and are uploaded via a 4G cellular network. Snapshots sometimes also are captured for other events defined by Tesla. Even when Autopilot is not actively providing steering, throttle, and brake controls, 2016 and later model year Teslas operate Autopilot in "Shadow Mode". When the control inputs generated by the shadow mode Autopilot do not match those of the human driver, the vehicle may record a snapshot to assist in training the system, after which the data may be reviewed by the Autopilot team. As explained by Karpathy, Tesla can deploy additional software "detectors" triggered by specific situations identified by snapshot data, which then upload camera and other data to Tesla when similar situations are detected. These data are used to revise the existing detectors. For Teslas built after mid-2017, the Autopilot computer also records "trail" data, including the car's route as determined by GPS "breadcrumbs" for the entire trip. A trip starts when the vehicle shifts from Park to Drive, and ends when shifted back to Park. Trail data also includes vehicle
{"page_id": 50984053, "title": "Tesla Autopilot"}
native inheritance. Piaget's theory has been criticized on the grounds that the age of appearance of a new model of the world, such as object permanence, is dependent on how the testing is done (see the article on object permanence). More generally, the theory may be very difficult to test empirically because of the difficulty of proving or disproving that a mental model is the explanation for the results of the testing. Neo-Piagetian theories of cognitive development expand Piaget's theory in various ways such as also considering psychometric-like factors such as processing speed and working memory, "hypercognitive" factors like self-monitoring, more stages, and more consideration on how progress may vary in different domains such as spatial or social. === Parieto-frontal integration theory of intelligence === Based on a review of 37 neuroimaging studies, Jung and Haier proposed that the biological basis of intelligence stems from how well the frontal and parietal regions of the brain communicate and exchange information with each other. Subsequent neuroimaging and lesion studies report general consensus with the theory. A review of the neuroscience and intelligence literature concludes that the parieto-frontal integration theory is the best available explanation for human intelligence differences. === Investment theory === Based on the Cattell–Horn–Carroll theory, the tests of intelligence most often used in the relevant studies include measures of fluid ability (gf) and crystallized ability (gc); that differ in their trajectory of development in people. The "investment theory" by Cattell states that the individual differences observed in the procurement of skills and knowledge (gc) are partially attributed to the "investment" of gf, thus suggesting the involvement of fluid intelligence in every aspect of the learning process. The investment theory suggests that personality traits affect "actual" ability, and not scores on an IQ test. Hebb's theory of intelligence suggested a bifurcation
{"page_id": 168191, "title": "Human intelligence"}
company should allocate 5% free equity shares apart from 8% royalties and 35% income tax. The initial validity of the lease is for 25 years extendable for further ten-year period. Though the country is rich in mining resources its exploration and extraction has contributed only about 1% of its GDP with an investment of 14 billion birr. To give a boost to the five-year Growth and Transformation Plan (GTP) for the mining sector launched by the government, incentives are proposed to be offered in terms of tax reduction from the present level of 35% to 25%. During 2013, a draft document has been placed before the House of Peoples’ Representatives for approval so that the sector becomes more competitive vis-à-vis those offered by neighboring countries. == Production == Production and sale of gold had touched a level of US$23.8 million (as of 2005) and that of tantalum is US$2.3 million. The mining stakes in Ethiopia are held by: The Ethiopian Mineral Development Share Company, a Government organization (EMDSC) (an amalgamation of earlier four Government enterprises) established in 2000 is engaged in all mining activities in the country; the Ezana Mining Development, functioning since 1993, a privately owned Ethiopian enterprise in consulting in all aspects related to mining including all types of explorations; the Midrock Gold, a subsidiary of Midrock Gold Group, in operation at Shakisso town in southern Ethiopia, is involved in gold mining (production of 3500 kg of gold per year extracting 50,000 tons of rock per month); and the National Mining Corporation (set up in 1993), a private company involved in all facets of mineral and petroleum product production including byproducts. Potash mining has generated lot of interest in recent years. Allana Potash, a Canadian mining company is poised to start mining for potash in the Afar Regional
{"page_id": 16459063, "title": "Mining in Ethiopia"}
Germany to develop a similar vehicle for the purpose of carrying a minimum of 50 kg (110 lb) of explosives. The result was the SdKfz. 302 (Sonderkraftfahrzeug, transl. 'special-purpose vehicle'), called the Leichter Ladungsträger (transl. 'light charge carrier'), or Goliath, which carried 60 kg (130 lb) of explosives. The vehicle was steered remotely via a joystick control box. The control box was connected to the Goliath by a 650-metre (2,130 ft), triple-strand cable. The cable was stored on a cable drum in the rear compartment of the Goliath. The cable was used for steering the vehicle left/right, forwards and reverse (reverse on the electric driven 302 version only) and to ignite the explosive charge. Each Goliath was disposable, being intended to be blown up with its target. Early model Goliaths used two electric motors but, as these were costly to make (3,000 Reichsmarks) and difficult to maintain and recharge in a combat environment, later models (known as the SdKfz. 303) used a cheaper two-stroke petrol engine. == Service == Goliaths were used on all fronts where the Wehrmacht fought, beginning in early 1942. They were used principally by specialized Panzer and combat engineer units. Goliaths were used in Italy at Anzio in April 1944, and against the Polish resistance during the Warsaw Uprising in 1944. A few Goliaths were also seen on the beaches of Normandy during D-Day, though most were rendered inoperative after artillery blasts severed their command cables. Allied troops encountered a small number of Goliaths in the Maritime Alps following the landings in southern France in August 1944, with at least one being used successfully against a vehicle of the 509th Parachute Infantry Battalion. Although a total of 7,564 Goliaths were produced, the single-use weapon was not considered a success due to high unit cost, low speed
{"page_id": 5750271, "title": "Goliath tracked mine"}
side of Figure 1.2 is based on Simon’s (1977) idea that decision-making processes fall along a continuum that ranges from highly struc-tured (sometimes called programmed ) to highly unstructured (i.e., non-programmed )decisions. Structured processes are routine and typically repetitive problems for which standard solution methods exist. Unstructured processes are fuzzy, complex problems for which there are no cut-and-dried solution methods. An unstructured problem is one where the articulation of the problem or the solu-tion approach may be unstructured in itself. In a structured problem , the procedures for obtaining the best (or at least a good enough) solution are known. Whether the problem involves finding an appropriate inventory level or choosing an optimal investment strat-egy, the objectives are clearly defined. Common objectives are cost minimization and profit maximization. Semistructured problems fall between structured and unstructured problems, hav-ing some structured elements and some unstructured elements. Keen and Scott-Morton (1978) mentioned trading bonds, setting marketing budgets for consumer products, and performing capital acquisition analysis as semistructured problems. > TYPES OF CONTROL The second half of the Gorry and Scott-Morton (1971) framework (refer to Figure 1.2) is based on Anthony’s (1965) taxonomy, which defines three broad categories that encompass all managerial activities: strategic planning , which involves defining long-range goals and policies for resource allocation; management control , the Chapter 1 • Overview of Business Intelligence, Analytics, Data Science, and Artificial Intelligence 51 acquisition and efficient use of resources in the accomplishment of organizational goals; and operational control , the efficient and effective execution of specific tasks. THE DECISION SUPPORT MATRIX Anthony’s (1965) and Simon’s (1977) taxonomies are combined in the nine-cell decision support matrix shown in Figure 1.2. The initial pur-pose of this matrix was to suggest different types of computerized support to differ-ent cells in the matrix. Gorry and Scott-Morton (1971)
{"source": 1196, "title": "from dpo"}
result list (high precision). Since retrieval systems searching the same database tend to find similar relevant documents, but not in the same rank positions, data fusion methods benefit from comparing all the documents found by the different retrieval systems. However, a major source of noise is introduced in the fusion process as documents further down in the result lists are considered, since a document's probability of being relevant decreases significantly. Using TREC 3, 6, 7, 8, 12 and 13 data, this paper examined how “gradual skimming”, where the number of documents examined in the result lists is gradually increased, can help to ensure that more relevant documents stay and/or raise to the top in the fused list as steadily more documents are examined. The selected ad hoc, robust and web TREC tracks made it possible to investigate the benefits of “skimming” in diverse and difficult settings. First, empirical data was presented about a document's probability of being relevant as a function of the list depth level used, the number of systems that have found it and its average rank position in the lists containing it. Second, this data was used compute a document's “maximum” relevance probability, which is equal to the maximum of its probability estimates as the list depth is gradually increased. This way the information gained for documents that are contained in the top of the lists and found by many systems is not “diluted and lost” as the list depth is increased and an increasing number of non-relevant documents are found by many systems. Third, the difference between the “maximum” relevance estimates (inferred if the list depths of the top 10, 20, 30, 40, 50, 100, 200, …, 1000 documents are gradually compared) and the “ALL 1000” relevance estimates (equal to the percentage of the top 1000
{"source": 3626, "title": "from dpo"}
Nu - N, k , and so (Theorem 20. 2) (N, i , N, 2 , ..., N, k ) is independent of Nu - No, . If J is the set of points (x,, ... , x k , y) in R k+ ' such that x k + y E H, where H EM I ,, and if v is the distribution of Nu - Nk , then (33.12) is P[(x,, ... , x k , Nu - N, k ) E J ] = P[ x k + N„ — N, E H] = v(H — x k ). Therefore, (33.13) gives P[N u EHII N,^.... , N, k ] = v(H — N, k ). This holds also if k = 1, and hence P[N„ EHII N, i , ..., N4') = P[N„ E HII No, ]. The Poisson process thus has the Markov property (33.18); this is a consequence solely of the independence of the increments. The extended Markov property (33.20) follows. r Properties of Conditional Probability Theorem 33.2. With probability 1, P[0I,9] = 0, P[flUI,i] = 1; and (33.21) 0 nn with probability 1. > PROOF. For each version of the conditional probability, JG P[ A ll A dP = P(A n G) > — 0 for each G in .#; since P[ All #] is measurable ,1, it must be nonnegative except on a set of P-measure 0. The other inequality in (33.21) is proved the same way. If the A n are disjoint and if G lies in #, it follows (Theorem 16.6) that f(LP[Allv1)dP= E
{"source": 5649, "title": "from dpo"}
with DC at a few Pico-amps but up to 300,000 or even 500,000 volts. Often the rule-of-2 applies where possible. The rule-of-2 says that if any device (circuit breaker, capacitor, meter, inductor, etc.) is to be operated safely and without breakdown at a voltage X, then it should be stressed, under test, up to AT LEAST a voltage 2X (or even as high as 4X according to some engineers). The rule of 2 is NOT an official scientific principle like Ohm ’s Law. Rather, design engineers often use 2X as the test to prove the reliability of a product under a stress X. A quick check of the internet under the topic “reliability ” verifies the rule of 2 (and the rule of 3 and even the rule of 4). In electronics design and particularly in the design of power electronics, the test stress is more likely 2X. See for instance the electronics books and ; see also, the spec sheets for various Fluke multimeters, which are pertinent to Case #3 discussed in this paper; these show a maximum voltage for most meters of 1000 and an overvoltage of an additional 1000 volts. Back-emf (or back-electromotive force) refers to a voltage generated “backwards ” from the direction that the processing normally proceeds in. This often involves a motor or other mechanical moving object that can act as a generator. In the forward direction, electricity converts to mechanical motion or mechanical work. In the backward direction, a voltage is fed from the motor back into the power source. Throughout the rest of this article, we will be talking about real-life cases analyzed by us. To protect a person ’s right to anonymity, we will not give the real identity of any of the people and companies discussed. Case #1: A
{"source": 1463, "title": "from dpo"}
at the wrong moment a digital circuit which employs feedback (even a simple circuit such as a flip-flop) can enter a metastable state and take an unbounded length of time to finally settle into a fully stable digital state. == Computational neuroscience == Metastability in the brain is a phenomenon studied in computational neuroscience to elucidate how the human brain recognizes patterns. Here, the term metastability is used rather loosely. There is no lower-energy state, but there are semi-transient signals in the brain that persist for a while and are different than the usual equilibrium state. == In philosophy == Gilbert Simondon invokes a notion of metastability for his understanding of systems that rather than resolve their tensions and potentials for transformation into a single final state rather, 'conserves the tensions in the equilibrium of metastability instead of nullifying them in the equilibrium of stability' as a critique of cybernetic notions of homeostasis. == See also == False vacuum Hysteresis Metastate == References ==
{"page_id": 19833, "title": "Metastability"}
to speed up the process of making flour. Aluminum sulfate is useful for increasing the viscosity of the flour. Sulfur dioxide is used to separate the starch from other unwanted substances as well as acting as a bleaching agent, and regulating microbial and enzymatic reactions. Chlorine (use is banned in many countries) helps to create a higher quality flour and also has disinfecting and bleaching properties. The tables below list permitted additives in tapioca pearl products regulated under different regions. === Additives permitted as domestic or imported food === ==== Philippines ==== ==== Singapore ==== ==== Taiwan ==== === Environmental issues === Tapioca is not a natural product, as it is processed from cassava. See Manufacturing. There is an issue with tapioca because a large amount of water is needed in order to produce it. One factory reports that it uses around 60 m3 for one ton of tapioca starch just in the first step of processing. With this much water being used, properly disposing of the wastewater is a priority. Tapioca contains cyanide, and depending on whether the tapioca is made for human consumption or industrial purposes there will be less or more cyanide. The wastewater used to process the tapioca contains this cyanide and if the wastewater is leaked into bodies of water containing aquatic life, due to the contaminated water's low pH, there is a direct effect on fish and possibly other animals that live on the shores of the polluted water. Water pollution from tapioca manufacturing has been a problem in many countries in Southeast Asia. === Controversy === German researchers from University Hospital Aachen tested the tapioca pearls from an unnamed Taiwanese chain. According to the New York Daily News, the report showed that carcinogenic chemicals were found in the samples. Chemicals found included styrene,
{"page_id": 49065540, "title": "Tapioca pearl"}
number of finite slips occur on the inner shape. Eventually, he concludes "the line traversed by the larger circle consists then of an infinite number of points which completely fill it; while that which is traced by the smaller circle consists of an infinite number of points which leave empty spaces and only partly fill the line," which would not be considered satisfactory now. == Reactions by commentators == So great a contribution to physics was Two New Sciences that scholars have long maintained that the book anticipated Isaac Newton's laws of motion. Galileo ... is the father of modern physics—indeed of modern science Part of Two New Sciences was pure mathematics, as has been pointed out by the mathematician Alfréd Rényi, who said that it was the most significant book on mathematics in over 2000 years: Greek mathematics did not deal with motion, and so they never formulated mathematical laws of motion, even though Archimedes developed differentiation and integration. Two New Sciences opened the way to treating physics mathematically by treating motion mathematically for the first time. The Greek mathematician Zeno had designed his paradoxes to prove that motion could not be treated mathematically, and that any attempt to do so would lead to paradoxes. (He regarded this as an inevitable limitation of mathematics.) Aristotle reinforced this belief, saying that mathematic could only deal with abstract objects that were immutable. Galileo used the very methods of the Greeks to show that motion could indeed be treated mathematically. His idea was to separate out the paradoxes of the infinite from Zeno's paradoxes. He did this in several steps. First, he showed that the infinite sequence S of the squares 1, 4, 9, 16, ...contained as many elements as the sequence N of all positive integers (infinity); this is now referred
{"page_id": 268475, "title": "Two New Sciences"}
during the same period as the actual test samples. Unexpected matches (or variations) in several control-samples indicates a high probability of contamination for the actual test samples. In a relationship test, the full DNA profiles should differ (except for twins), to prove that a person was not matched as being related to their own DNA in another sample. In biomedical research, STR profiles are used to authenticate cell lines. Self-generated STR profiles can be compared with databases such as CLASTR (https://www.cellosaurus.org/cellosaurus-str-search/) or STRBase (https://strbase.nist.gov/). In addition, self-generated primary murine cell lines cultured before the first passaging can be matched with later passages, thus ensuring the identity of the cell line. == See also == STR multiplex system Snpstr Y-STR List of Y-STR markers List of X-STR markers Earth Human STR Allele Frequencies Database == References ==
{"page_id": 6325086, "title": "STR analysis"}
use of rooms that they designed. Additionally, some hotels have noted that guests prefer to stay in certain rooms since they receive a stronger Wi-Fi signal. == Health concerns == The World Health Organization (WHO) says, "no health effects are expected from exposure to RF fields from base stations and wireless networks", but notes that they promote research into effects from other RF sources. (a category used when "a causal association is considered credible, but when chance, bias or confounding cannot be ruled out with reasonable confidence"), this classification was based on risks associated with wireless phone use rather than Wi-Fi networks. The United Kingdom's Health Protection Agency reported in 2007 that exposure to Wi-Fi for a year results in the "same amount of radiation from a 20-minute mobile phone call". A review of studies involving 725 people who claimed electromagnetic hypersensitivity, "...suggests that 'electromagnetic hypersensitivity' is unrelated to the presence of an EMF, although more research into this phenomenon is required." == Alternatives == Several other wireless technologies provide alternatives to Wi-Fi for different use cases: Bluetooth Low Energy, a low-power variant of Bluetooth Bluetooth, a short-distance network Cellular networks, used by smartphones LoRa, for long range wireless with low data rate NearLink, a short-range wireless technology standard WiMAX, for providing long range wireless internet connectivity Zigbee, a low-power, low data rate, short-distance communication protocol Some alternatives are "no new wires", re-using existing cable: G.hn, which uses existing home wiring, such as phone and power lines Several wired technologies for computer networking, which provide viable alternatives to Wi-Fi: Ethernet over twisted pair == See also == == Explanatory notes == == References == == Further reading == The WNDW Authors (2013). Butler, Jane (ed.). Wireless Networking in the Developing World (Third ed.). CreateSpace Independent Publishing Platform. ISBN 978-1-4840-3935-9.
{"page_id": 63973, "title": "Wi-Fi"}
WR 104 is a triple star system located about 2,580 parsecs (8,400 ly) from Earth. The primary star is a Wolf–Rayet star (abbreviated as WR), which has a B0.5 main sequence star in close orbit and another more distant fainter companion. The WR star is surrounded by a distinctive spiral Wolf–Rayet nebula, often referred to as a pinwheel nebula. The rotational axis of the binary system, and likely of the two closest stars, is directed approximately towards Earth. Within the next few hundred thousand years, the Wolf–Rayet star is predicted to experience a core-collapse supernova with a small chance of producing a long-duration gamma-ray burst. The possibility of a supernova explosion from WR 104 having destructive consequences for life on Earth stirred interest in the mass media, and several popular science articles have been issued in the press since 2008. Some articles decide to reject the catastrophic scenario, while others leave it as an open question. == System == The Wolf–Rayet star that produces the characteristic emission line spectrum of WR 104 has a resolved companion and an unresolved spectroscopic companion, forming a triple system. The spectroscopic pair consists of the Wolf–Rayet star and a B0.5 main sequence star. The WR star is visually 0.3 magnitudes fainter than the main sequence star, although the WR star is typically considered the primary, as it dominates the appearance of the spectrum and is more luminous. The two are in a nearly circular orbit separated by about 2 AU, which would be about one milli-arcsecond at the assumed distance. The two stars orbit every 241.5 days with a small inclination (i.e. nearly face-on). The visually resolved companion is 1.5 magnitudes fainter than the combined spectroscopic pair and almost one arc-second away. It is thought to be physically associated, although orbital motion has not
{"page_id": 16091266, "title": "WR 104"}
to do the same. All the world leaders activate the self-destruct for their nuclear arsenals, removing the justification for the retaliation strikes and goads to save the Earth. Zartan proclaims this a nuclear free world and unveils Project Zeus, orbital kinetic bombardment weapons he designed for Cobra. To prove his superiority, he destroys Central London and activates the remaining weapons, offering to disarm them if the leaders submit to Cobra. Storm Shadow betrays Cobra Commander and starts a fight, acknowledging Cobra's deception to the world leaders. Colton kills Zandar and rescues the real President with Lady Jaye, while Storm Shadow kills Zartan. While Snake Eyes, Jinx, and Flint fight Cobra's soldiers, Cobra Commander instructs Firefly to protect the launch device, and escapes by helicopter. Roadblock overpowers Firefly and destroys the orbital weapons. Storm Shadow leaves after avenging his uncle. At the White House ceremony, the real President addresses the nation and commemorates the Joes, who were awarded by Colton: Roadblock, Snake Eyes, Jinx, Flint, and Lady Jaye. Colton presents Roadblock with an M1911 pistol that belonged to General George S. Patton, to be used when they find Cobra Commander. Roadblock proudly raises the weapon and fires a single shot in honor of his fallen comrades, vowing to avenge them. == Cast == Dwayne Johnson as Marvin F. Hinton / Roadblock:A heavy machine gunner of the G.I. Joe. Bruce Willis as General Joe Colton:A retired General and the founder and leader of the G.I. Joe. Channing Tatum as Conrad S. Hauser / Duke:An intelligence and infantry specialist of the G.I. Joe. Arnold Vosloo as Zartan:A disguise expert of Cobra who kidnaps and replaces the President in the last film. Jonathan Pryce as President of the United States Lee Byung-hun as Thomas Arashikage / Storm Shadow:A member of Cobra and Snake Eyes's
{"page_id": 32910742, "title": "G.I. Joe: Retaliation"}
Emon Shakoor (Arabic: إيمان عبد الشكور) is a neuroscience researcher turned a technology entrepreneur. == Education == Prior to her career in entrepreneurship and acceleration, Emon obtained her bachelor's degree in cognitive science from the University of California, San Diego (UCSD), and was a neuroscience researcher at UCSD investigating the role of mirror neurons in social cognition. == Career == Emon Shakoor is the sole founder &. CEO. of Blossom Accelerator, Saudi Arabia's first tech-inclusion and female focused accelerator. The company provides founders access to community, network, educational resources as well as curating investment opportunities. Emon also serves as an Advisory Board Member at OQAL Angel Investment Network. == Non-profit == Emon Shakoor is a Jeddah Hub, Global Shaper, and was appointed as the delegate of 30 Under 30 group at the Annual Meeting of the World Economic Forum in Davos, Switzerland. Emon co-founded a local non-profit startup event and initiative called the Techpreneurship Sprint in 2017. The event was in partnership with Prince Mohammad Bin Salman College of Business and Entrepreneurship. (MBSC). At this event the Saudi youth were challenged to build tech startups and think entrepreneurial. == Awards and recognition == She was recognized as Saudi Arabia's youngest founder & CEO to be invited at the Annual Meeting of the World Economic Forum in Davos, Switzerland. She was recognized as a leading woman in About Her's 20 Under 30 List. Emon Shakoor's scientific research on mirror neurons was honored for its excellence at UCSD. == References ==
{"page_id": 64193128, "title": "Emon Shakoor"}
untouched, old-growth forests and supporting a disproportionately high biodiversity including flora of Gondwanan and New Guinean origin, the rainforests are of high conservation significance. The largest contiguous rainforest area on the peninsula occurs in the McIllwraith Range–Iron Range area. The Gondwanan flora of this area includes Araucariaceae and Podocarpaceae conifers and Arthrochilus, Corybas, and Calochilus orchids. In all, this rainforest contains at least 1000 different plants, including 100 rare or threatened species, and 16% of Australia's orchid species. On poor, dry soils tropical heathlands can be found. Northeast Cape York Peninsula supports Australia's largest areas of this highly diverse ecosystem. The extensive wetlands on Cape York Peninsula are "among the largest, richest and most diverse in Australia". 19 wetlands of national significance have been identified, mostly on the large floodplains and in coastal areas. Important wetlands include the Apudthama Complex, Rinyirru systems and the estuaries of the great rivers of the western plains. Many of these wetlands come into existence only during the wet season and support rare or uncommon plant communities. The peninsula's coastal areas and river estuaries are lined with mangrove forests of kwila and other trees. Australia's largest mangrove forest can be found at Newcastle Bay. === Fauna === The peninsula harbours an extraordinary biodiversity, with more than 700 vertebrate land animal species of which 40 are endemic. As a result, from its geological history, "the flora and fauna of Cape York Peninsula are a complex mixture of Gondwanan relics, Australian isolationists and Asian or New Guinean invaders" (p. 41). Birds of the peninsula include buff-breasted buttonquail (Turnix olivii), golden-shouldered parrot (Psephotus chrysopterygius), lovely fairywren (Malurus amabilis), white-streaked honeyeater (Trichodere cockerelli), and yellow-spotted honeyeater (Meliphaga notata) while some such as pied oystercatcher are found in other parts of Australia but have important populations on the peninsula. The
{"page_id": 481294, "title": "Cape York Peninsula"}
age and treating the boys for longer may delay progression of the disease. This corresponds with the earlier Phase III trials (DEMAND III) data that shows a potentially clinically meaningful difference in a subgroup of patients age 7 or younger. == History == The Phase III trials were sponsored by GlaxoSmithKline but GSK terminated the collaboration agreement between GSK and Prosensa and Prosensa has regained all rights from GSK to drisapersen. Prosensa was then acquired by BioMarin Pharmaceutical, which continued the development of drisapersen and was concurrently working with similar exon skipping therapies for other exons. Both drisapersen and the similar drug eteplirsen have filed a New Drug Application (NDA) for review with the US Food and Drug Administration (FDA). In January 2016, the FDA rejected drisapersen (Kyndrisa) after it concluded that the standard of substantial evidence of effectiveness had not been met, effectively shifting focus to rival Sarepta's eteplirsen. The Prescription Drug User Fee Act (PDUFA) goal dates for these are December 27, 2015 for drisapersen and February 26, 2016 for eteplirsen. == Current status == In May 2016, BioMarin announced they intended to discontinue clinical and regulatory development of drisapersen as well as related first generation compounds currently in Phase 2 studies for distinct forms of Duchenne muscular dystrophy. The company claim they will continue to look into DMD and the next generation oligonucleotides. == References ==
{"page_id": 37483743, "title": "Drisapersen"}
of this training told me that the technical person did not bother to show up for his training, while another recipient of this training told me that ICSA instead sent _two_ sales people and _no_ technical people to his training. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Let's look at what ICSA says about change in the "digital world" of firewalls: "The digital world moves far too quickly to certify only a particular version of a product or a particular incarnation of a system. Therefore, ICSA certification criteria and processes are designed so that once a product or system is certified, all future versions of the product (or updates of the system) are inherently certified." What does this mean to you? It means that ICSA is certifying firewalls running code that they have never seen. It means that if you purchase a firewall that has been ICSA certified -- you have no way of knowing if the version of the firewall product that is protecting your organization has ever been certified. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Let's look at how ICSA defends itself from such allegations? ISCA has three ready made defenses: "First, the ICSA gains a contractual commitment from the product vendor or the organization that owns or runs the certified system that the product or system will be maintained at the current, published ICSA certification standards. " So that's how ICSA certification works, the firewall vendors promise to write good code and ICSA gives them a sticker. This works fine with little children in Sunday school, but I wouldn't trust the security of my business to such a plan. "Secondly, ICSA or it's authorized partners normally perform random spot checking of the current product (or system) against current ICSA criteria for that certification category. " Except, of course, that an unnamed source within ICSA itself admitted that these
{"source": 1747, "title": "from dpo"}
at openupresources.org and used under the CC BY 4.0 license. 35 G6M3 LESSON 3 > ZEARN MATH TEACHER LESSON MATERIALS YOUR NOTES: 5. a) About 20 teaspoons for 100 milliliters of salt Milliliters Teaspoons 20 4 40 8 50 10 100 20 ÷ 5 ÷ 5 ÷ 5 ÷ 5 ۘф ۘ ф ۘс ۘ с b) About 75 milliliters for 15 teaspoons of salt c) About 5 milliliters per teaspoon d) About 1 > 5 teaspoons per milliliter DISCUSSION GUIDANCE Though much of the discussion will take place within groups, spend a few minutes ensuring /# / 1 -4*) 0) /.- ) . #/ .)2 -.*/ #/ 1ޔ.)*$/. 0,ѵ* )* '0  #/ /$1$/4Ѷ$)1$/  students to share anything that surprised them from the measuring work. ANTICIPATED MISCONCEPTIONS At Station 1, students may count the number of base-10 centimeter rods rather than the number of centimeter cubes. Remind them that the question prompts for the number of cubes. At Station 2, students may need reminders about measuring objects at the zero marking on /# -0' - )  *0/& +$)"/# -0' -"*$)"./- $"#/Ѷ */#*!2#$ #2$'' Ȃ //#  ).2 -ѵ#*2 /# (/# 4 )( .0-  '*)"/#  " *!/# * % //*( & .0- /# -0' -$.)*/1 -$)"*Ȃ$) one direction or another. At Station 4, students may be unclear about how to change the output unit on the scale for each object. Consider showing the class ahead of time. Students who are able to distinguish between weight and mass might say they cannot accurately compare their measurements. Clarify that we are talking only about the weight of the objects on the Earth’s surface. // /$*)фѶ (*./.0 ./) ( 4 '/) /.$.)*40. 0) - Ҋ ''ޔ -*)0*-  / .)**+.!*. /'Ѷ.* their data will not reveal the 5 :
{"source": 4165, "title": "from dpo"}
retired hardware no longer contains PII and that proper sanitization techniques are applied. 20 2.2 Examples of PII Data The following list contains examples of information that may be considered PII.  Name, such as full name, maiden name, mother‘s maiden name, or alias  Personal identification number, such as social security number (SSN) , passport number, driver‘s license number, taxpayer identification number, patient identification number, and financial account or credit card number 21  Address information, such as street address or email address  Asset information, such as Internet Protocol (IP) or Media Access Control (MAC) address or other host-specific persistent static identifier that consistently links to a particular person or small, well-defined group of people  Telephone numbers, including mobile, business, and personal numbers  Personal characteristics, including photographic image (especially of face or other distinguishing characteristic), x-rays, fingerprints, or other biometric image or template data (e.g., retina scan, voice signature, facial geometry)  Information identifying personally owned property, such as vehicle registration number or title number and related information  Information about an individual that is linked or linkable to one of the above (e.g., date of birth, place of birth, race, religion, weight, activities, geographical indicators, employment information, medical information, education information, financial information). > 19 Some organizations have similar processes in place and do not call them PTA or IPA. For example PTA/IPA templates, see > or > . > 20 For more information on media sanitization, see NIST SP 800-88, Guidelines for Media Sanitization , > . > 21 Partial identifiers, such as the first few digits or the last few digits of SSNs, are also often considered PII because they are still nearly unique identifiers and are linked or linkable to a specific individual. GUIDE TO PROTECTING THE CONFIDENTIALITY OF
{"source": 5958, "title": "from dpo"}
Berkelium is a synthetic chemical element; it has symbol Bk and atomic number 97. It is a member of the actinide and transuranium element series. It is named after the city of Berkeley, California, the location of the Lawrence Berkeley National Laboratory (then the University of California Radiation Laboratory) where it was discovered in December 1949. Berkelium was the fifth transuranium element discovered after neptunium, plutonium, curium and americium. The major isotope of berkelium, 249Bk, is synthesized in minute quantities in dedicated high-flux nuclear reactors, mainly at the Oak Ridge National Laboratory in Tennessee, United States, and at the Research Institute of Atomic Reactors in Dimitrovgrad, Russia. The longest-lived and second-most important isotope, 247Bk, can be synthesized via irradiation of 244Cm with high-energy alpha particles. Just over one gram of berkelium has been produced in the United States since 1967. There is no practical application of berkelium outside scientific research which is mostly directed at the synthesis of heavier transuranium elements and superheavy elements. A 22-milligram batch of berkelium-249 was prepared during a 250-day irradiation period and then purified for a further 90 days at Oak Ridge in 2009. This sample was used to synthesize the new element tennessine for the first time in 2009 at the Joint Institute for Nuclear Research, Russia, after it was bombarded with calcium-48 ions for 150 days. This was the culmination of the Russia–US collaboration on the synthesis of the heaviest elements on the periodic table. Berkelium is a soft, silvery-white, radioactive metal. The berkelium-249 isotope emits low-energy electrons and thus is relatively safe to handle. It decays with a half-life of 330 days to californium-249, which is a strong emitter of ionizing alpha particles. This gradual transformation is an important consideration when studying the properties of elemental berkelium and its chemical compounds, since
{"page_id": 3758, "title": "Berkelium"}
is prevented from methylating intron 2 of PRR9, a frameshift resulting in premature truncation occurs. PRR7 and PRR9 also play a role in the entrainment of A. thaliana to a temperature cycle. Double-mutant plants with inactivated PRR7 and PRR9 exhibit extreme period lengthening at high temperatures but show no change in period at low temperatures. However, the inactivation of CCA1 and LHY in the PRR7/PRR9 loss-of-function mutants shows no change in period at high temperatures—this suggests that PRR7 and PRR9 are acting by overcompensation. == Interactions Within Arabidopsis == In A. thaliana, the main feedback loop is proposed to involve a transcriptional regulation between several proteins. The three main components of this loop are TOC1 (also known as PRR1), CCA1 and LHY. Each individual component peaks in transcriptions at different times of day. PRR 9, 7 and 5 each significantly reduce the transcription levels of CCA1 and LHY. In the opposite manner, PRR 9 and 7 slightly increase the transcription levels of TOC1. The Constans (CO) is also indirectly regulated by the PRR proteins as well by setting up the molecular mechanism to dictate the photosensitive period in the afternoon. PRRs are also known to stabilize CO at certain times of day to mediate its accumulation. This results in the regulation of early flowering in shorter photoperiods, making light sensitivity and control of flowering time important functions of the PRR class. == Homologs == === Paralogs === PPR3, PRR5, PRR7, and PRR9 are all paralogs of each other. They have similar structure, and all repress the transcription of CCA1 and LHY. Additionally, they are all characterized by their lack of a phospho-accepting aspartate site. These genes are also paralogs to TOC1, which is alternatively called PRR1. === Orthologs === Several pseudo-response regulators have been found in Selaginella, but their function
{"page_id": 53767303, "title": "Pseudo-response regulator"}
floors. Schools were the preferred fallout shelters according to the Office of Civil Defense. Schools, not including universities, contained around one-quarter of the population of the United States when they were in session at that time. The distribution of schools across the nation reflected the population density, and they were often the most suitable building in a community to act as a fallout shelter. Schools also already had organization with leaders in place. The Office of Civil Defense recommended altering current schools and the construction of future schools to include thicker walls and roofs, better-protected electrical systems, a purifying ventilation system, and a protected water pump. The Office of Civil Defense determined that around 10 square feet of net area per person were necessary in schools that were to function as a fallout shelter. A normal classroom could provide 180 people with area to sleep. If an attack were to happen, all the unnecessary furniture was to be moved out of the classrooms to make more room for people. It was recommended to keep one or two tables in the room if possible to use as a food-serving station. The Office of Civil Defense conducted four case studies to find the cost of turning four standing schools into fallout shelters and what their capacity would be. The cost of the schools per occupant in the 1960s were $66.00, $127.00, $50.00, and $180.00. The capacity of people these schools could house as shelters were 735, 511, 484, and 460 respectively. The US Department of Homeland Security and the Federal Emergency Management Agency in coordination with other agencies concerned with public protection in the aftermath of a nuclear detonation have developed more recent guidance documents that build on the older Civil Defense frameworks. Planning Guidance for Response to a Nuclear Detonation was
{"page_id": 53683, "title": "Nuclear fallout"}
Suwa, G.; Howell, F.C. (2003). "Pleistocene Homo sapiens from Middle Awash, Ethiopia". Nature. 423 (6941): 742–747. Bibcode:2003Natur.423..742W. doi:10.1038/nature01669. PMID 12802332. S2CID 4432091. White, T.D. (2003). "Early hominids—Diversity or distortion". Science. 299 (5615): 1994–1996. doi:10.1126/science.1078294. PMID 12663903. S2CID 83973951. Lovejoy, C.O.; Meindl, R.S.; Ohman, J.C.; Heiple, K.G.; White, T.D. (2002). "The Maka femur and its bearing on the antiquity of human walking: Applying contemporary concepts of morphogenesis to the human fossil record". American Journal of Physical Anthropology. 119 (2): 97–133. doi:10.1002/ajpa.10111. PMID 12237933. Asfaw, B.; Gilbert, W.H.; Beyene, Y.; Hart, W.K.; Renne, P.R.; WoldeGabriel, G.; Vrba, E.S.; White, T.D. (2002). "Remains of Homo erectus from Bouri, Middle Awash, Ethiopia". Nature. 416 (6878): 317–320. Bibcode:2002Natur.416..317A. doi:10.1038/416317a. PMID 11907576. S2CID 4432263. WoldeGabriel, G.; Haile-Selassie, Y.; Renne, P.R.; Hart, W.K.; Ambrose, S.H.; Asfaw, B.; Heiken, G.; White, T.D. (2001). "Geology and palaeontology of the Late Miocene Middle Awash valley, Afar rift, Ethiopia". Nature. 412 (6843): 175–178. Bibcode:2001Natur.412..175W. doi:10.1038/35084058. PMID 11449271. S2CID 7017992. White, T.D. (2000). "A view on the science: Physical anthropology at the millennium". American Journal of Physical Anthropology. 113 (3): 287–292. doi:10.1002/1096-8644(200011)113:3<287::AID-AJPA1>3.0.CO;2-8. PMID 11042532. Defleur, A.; White, T.D.; Valensi, P.; Slimak, L.; Crégut-Bonnoure, E (1999). "Neanderthal cannibalism at Moula-Guercy, Ardèche, France". Science. 286 (5437): 128–131. doi:10.1126/science.286.5437.128. PMID 10506562. Asfaw, B.; White, T.D.; Lovejoy, C.O.; Latimer, B.; Simpson, S.; Suwa, G. (1999). "Australopithecus garhi: A new species of early hominid from Ethiopia". Science. 284 (5414): 629–635. Bibcode:1999Sci...284..629A. doi:10.1126/science.284.5414.629. PMID 10213683. == See also == List of fossil sites (with link directory) List of hominina (hominid) fossils (with images) == References == == External links == Webpage on Dr.White "Conversations with History: On the Trail of our Human Ancestors" on YouTube Conversation with Tim White Tim White's research profile UCB HERC Director - Director of Human Evolution Research Center at UC Berkeley Project Leader
{"page_id": 3423456, "title": "Tim D. White"}
San Francisco Estuary. This is mainly because of increased habitat availability, food supply, larval transport, and reduced predation. === Agriculture === The floodplains of the Yolo Bypass are a surprisingly good farming ground for multiple seasonal crops. The California Department of Fish and Wildlife leases land to farmers through the Dixon Resource Conservation District. The most widely-grown crops include rice, safflower, processing tomatoes, corn, sunflower, and irrigated pasture. Half of the rice grown in the Yolo Bypass is wild due to its tolerance to colder weather. Farming is mainly done in late spring and summer when flooding does not usually occur, but farming can be halted or delayed depending on the water level in the Bypass. Agricultural crops in Yolo County amount to about $300 million a year. Leftover crop residue is beneficial to animal habitat. The already-harvested land creates foraging area, and food opportunities, such as seeds for mourning dove and the non-native ring-necked pheasants. === Recreation and education === The Yolo Bypass provides a multitude of recreational uses and educational as well. The Yolo Bypass Wildlife Headquarters provides summer educational programs for children in kindergarten through high school. These programs include hands on activities on plants, animals, and wetlands, using the Yolo Bypass Wildlife Area as a classroom. They have summer camps, classes, and are open to schools wanting to coordinate field trips as well. The Bypass is also open for guided tours for all ages of the public every month. The Yolo Bypass is often used for bird watching, hunting, and hiking. Game species include waterfowl (when the bypass is flooded), ring-necked pheasant, and mourning dove. There are also assorted trails that loop around the wetlands in the Yolo Bypass that may be accessed by the public. == Future == Recent modeling shows that increasing flow to
{"page_id": 1878950, "title": "Yolo Bypass"}
This is a list of extinction events, both mass and minor: == Timeline == == References ==
{"page_id": 46475391, "title": "List of extinction events"}
Bosnia in 2013. In 2012, TSA founded Traction Systems Inc. in Somerville, New Jersey, supporting light rail projects in Phoenix, Seattle, and Silicon Valley. In 2019, Traction Systems was founded in Shanghai to manage procurement from China. === Recent developments === In 2020, Voith and the Swiss investment company PCS Holding acquired a majority stake in the company. In the same year, TSA invested around €1 million in optimizing rotor production, resulting in a reduction of lead times by over 50%. Between 2021 and 2024, TSA received orders for the delivery of motors for the Berlin subway, the Swiss Federal Railways, and for the production of traction generators for Plasser & Theurer. Additionally, TSA equipped the light rail system in Sydney with electric motors. In 2024, the headquarters was expanded with a logistics and assembly hall. This expansion is part of the development of a TSA City in Wiener Neudorf. == Corporate structure == Traktionssysteme Austria GmbH is owned by the Swiss PCS Holding (48%), Voith (37%), and managing director Robert Tencl (15%). TSA employs around 1,000 people, with 690 within the TSA group and the remainder in the joint venture in India. The company's revenue for the fiscal year 2023 amounted to nearly €120 million. === Locations and subsidiaries === TSA has locations in Austria, Bosnia and Herzegovina, the US, China, and India. Its technologies are utilized in nearly 70 countries. TSA has the following subsidiaries: Medha Traction Equipment Pvt. Ltd. in Hyderabad, India (Joint Venture) Traktionssysteme Bosnia d.o.o. in Tuzla, Bosnia and Herzegovina Traction Systems Inc. in Somerville, New Jersey Traction Systems China in Shanghai, China == Products and services == TSA produces traction motors, gearboxes, and drives for rail transport, including trams, subways, locomotives, and multiple units. Additionally, the company manufactures traction gearboxes and asynchronous motors commonly
{"page_id": 78233422, "title": "Traktionssysteme Austria"}
those of CosmoQuest and Fraser Cain, while the edited podcast is uploaded soon after. == Audience == The listeners of Astronomy Cast vary widely in demographics, but the vast majority is between the ages of 18 and 53 according to a conducted survey. It is believed that the lack of young listeners is caused by the fact that Astronomy Cast may prove slightly too advanced for a younger audience and that the shortage of older listeners is due to the generation's relative unfamiliarity with technology and portable devices. Moreover, although Astronomy Cast is aimed at both the male and female audiences, only about 9% of the listeners are female. == Milestones == Astronomy Cast was nominated for the Technology/Science section of the 2008 People's Choice Podcast Awards. As of September 2024, Astronomy Cast has produced over 700 podcasts. In 2017, the hosts of Astronomy Cast were invited to a week-long celebration hosted by Twitch (service) in honor of Science Week. Fraser Cain and Dr. Pamela L. Gay were two of many prominent personalities in the space and science field to be interviewed for the event. In July 2018, Astronomy Cast was mentioned in an article written by Mental Floss. The magazine included Astronomy Cast in a list they called, "15 Podcasts That Will Make You Feel Smarter." In September 2018, Astronomy Cast recorded its 500th episode in front of a live audience, in addition to the usual YouTube live stream. The event was part of the AC:500 celebration, an event which was primarily organized & executed by the fans & supporters of the series, and in association with the Weekly Space Hangout, which also recorded & streamed a live episode during the event. The event was held in Edwardsville, IL, from September 14–16, 2018, and included a live recording of
{"page_id": 17719766, "title": "Astronomy Cast"}
relative to platforms that do not use AI,: 17 and information privacy concerns about collected data may pose a hazard to workers. === Psychosocial === Psychosocial hazards are those that arise from the way work is designed, organized, and managed, or its economic and social contexts, rather than arising from a physical substance or object. They cause not only psychiatric and psychological outcomes such as occupational burnout, anxiety disorders, and depression, but they can also cause physical injury or illness such as cardiovascular disease or musculoskeletal injury. Many hazards of AI are psychosocial in nature due to its potential to cause changes in work organization, in terms of increasing complexity and interaction between different organizational factors. However, psychosocial risks are often overlooked by designers of advanced manufacturing systems. ==== Changes in work practices ==== AI is expected to lead to changes in the skills required of workers, requiring training of existing workers, flexibility, and openness to change. The requirement for combining conventional expertise with computer skills may be challenging for existing workers. Over-reliance on AI tools may lead to deskilling of some professions. Increased monitoring may lead to micromanagement and thus to stress and anxiety. A perception of surveillance may also lead to stress. Controls for these include consultation with worker groups, extensive testing, and attention to introduced bias. Wearable sensors, activity trackers, and augmented reality may also lead to stress from micromanagement, both for assembly line workers and gig workers. Gig workers also lack the legal protections and rights of formal workers.: 2–10 There is also the risk of people being forced to work at a robot's pace, or to monitor robot performance at nonstandard hours.: 5–7 ==== Bias ==== Algorithms trained on past decisions may mimic undesirable human biases, for example, past discriminatory hiring and firing practices. Information
{"page_id": 64681740, "title": "Workplace impact of artificial intelligence"}
a convex set in the Euclidean plane. Convex polytope - an n-dimensional polytope which is also a convex set in the Euclidean n-dimensional space. Convex set - a set in Euclidean space in which contains every segment between every two of its points. Convexity (finance) - refers to non-linearities in a financial model. When the price of an underlying variable changes, the price of an output does not change linearly, but depends on the higher-order derivatives of the modeling function. Geometrically, the model is no longer flat but curved, and the degree of curvature is called the convexity. Duality (optimization) Epigraph (mathematics) - for a function f : Rn→R, the set of points lying on or above its graph Extreme point - for a convex set S in a real vector space, a point in S which does not lie in any open line segment joining two points of S. Fenchel conjugate Fenchel's inequality Fixed-point theorems in infinite-dimensional spaces, generalise the Brouwer fixed-point theorem. They have applications, for example, to the proof of existence theorems for partial differential equations Four vertex theorem - every convex curve has at least 4 vertices. Gift wrapping algorithm - an algorithm for computing the convex hull of a given set of points Graham scan - a method of finding the convex hull of a finite set of points in the plane with time complexity O(n log n) Hadwiger conjecture (combinatorial geometry) - any convex body in n-dimensional Euclidean space can be covered by 2n or fewer smaller bodies homothetic with the original body. Hadwiger's theorem - a theorem that characterizes the valuations on convex bodies in Rn. Helly's theorem Hyperplane - a subspace whose dimension is one less than that of its ambient space Indifference curve Infimal convolute Interval (mathematics) - a set of
{"page_id": 1018951, "title": "List of convexity topics"}