text
stringlengths 5
10.5k
| source
stringlengths 33
146
|
|---|---|
people that can be found on the project pathways. Each individual type of person may differ by age, gender, ethnicity, social status, or place of birth. These types of differences should be represented in the final sample. Researchers who have considered sample size issues suggest a range of 20-30 participants per site. ## Section 3. Observational Research Purpose: Observational Research is intended to be the first step in the research process and is carried out in order to observe the setting and the people who may meet the targeted population criteria at the sites that are being considered for surveillance and sampling. ## Section 3a. Observational Research Overview > Table 1: Observational research key points What Is It? Research Goals > •A first step in the qualitative research process > •Passive observation and field note taking of the structure and characteristics of the site and the people who inhabit it > •Informal conversations with ‘key informants’ > •Mapping of land and community > •Identify key informants > •Establish relationships with individuals from target populations and key informants > •Prepare for next stages of qualitative work (i.e. focus groups and ethnographic interviews) > •Write up field notes of observed environment and interactions > •Map the setting 338 ## Section 3b. Who is Involved in Observational Research The main individuals involved in observational research are the Observer , Key Informants and any other individuals interested in speaking with the Observer in an informal way. Observer: The Observer is the person conducting the observational research (e.g., can be country coordinator, head field worker, or any other PREDICT staff person). The Observer should let people know about the study and the things we would like to learn. This is an excellent opportunity to engage people and to spread the word about the PREDICT project.
|
{"source": 1196, "title": "from dpo"}
|
integer $n > m$, we have $$|\sin(n) - 1| = |\sin(n) - \sin(\pi/2)| = |2\cos((n+\pi/2)/2)\sin((n-\pi/2)/2)|$$ $$\leq 2|\sin((n-\pi/2)/2)| \leq 2|\sin(q - \pi/2)|$$ $$ 0$, there exists an integer $m$ such that $|\sin(n) - 1| m$. This means that $1$ is an upper bound of the set of all subsequential limits of $a_n$. Since $1$ is the least upper bound of the set of all subsequential limits of $a_n$, it follows that the limit superior of $a_n$ is $1$. How do I integrate $$\frac{4x}{x^3+x^2+x+1}$$ ?The denominator has roots $i$ , $-1$ and $-i$ so we can write it in the following way $$ \frac{4x}{(x-i)(x+1)(x+i)}$$ Now we can separate it into partial fractions and integrate each of them individually. $$\frac{4x}{(x-i)(x+1)(x+i)}=\frac{A}{x-i}+\frac{B}{x+1}+\frac{C}{x+i}$$ Multiplying both sides by the denominator, we get $$4x=A(x+1)(x+i)+B(x-i)(x+i)+C(x-i)(x+1)$$ Substituting the values of the roots, we get $$4i=A(2i)+B(0)+C(0)$$ $$-4=A(0)+B(2)+C(0)$$ $$4i=A(0)+B(0)+C(2i)$$ Solving these equations, we get $$A=2i$$ $$B=-2$$ $$C=2i$$ Therefore, $$\frac{4x}{(x-i)(x+1)(x+i)}=\frac{2i}{x-i}-\frac{2}{x+1}+\frac{2i}{x+i}$$ Integrating each term, we get $$\int \frac{4x}{(x-i)(x+1)(x+i)}dx=2i\ln(x-i)-2\ln(x+1)+2i\ln(x+i)+C$$ where C is the constant of integration. Given a countable or finite set $X$, a measure $u$ on $(X, \Sigma)$, and the set of atoms $A = \{A_1, A_2, ...\}$ of $(X, \Sigma)$, prove that for any measurable function $f: X \to \mathbb{R}$, $f$ is constant within each atom $A_i$, i.e., if $x, y \in A_i$, then $f(x) = f(y)$.To prove this, we'll proceed by contradiction. Assume that $f(x) \neq f(y)$ for some $x, y \in A_i$, where $A_i$ is an atom. This means there exists a real number $c$ such that $f(x) < c < f(y)$. Since $f$ is measurable, its inverse image of intervals is measurable. Specifically, $f^{-1}(-\infty, a] \in \Sigma$ for all $a \in \mathbb{R}$. Let's consider the set $B = f^{-1}(-\infty, c]$. Clearly, $x \in B$ and $y
|
{"source": 3384, "title": "from dpo"}
|
crimes such as the possession of illegal images, this is not possible. Hiding the data rather than destroying or altering it therefore becomes an important objective. Cryptography is the best known anti-forensic method to hide data from third parties. Due to its importance as a dual use technology with important roles for privacy and data security, and also because of the complex legal issues involved with cryptography, this is considered in the chapter on encrypted data. 9.128 Another well-known method of hiding data is steganography. Steganography is the method of hiding a message inside a digital object, which may be a graphic, a picture, a film or a sound clip. The sender is able to hide a message in a seemingly innocuous file, and the recipient can retrieve the message upon receipt. Other methods used to hide data include writing data to slack space or space that has not been allocated for use, hiding data on a hard drive in a secret partition, and the transmission of data under the cover of transmission protocols. Various types of commercial and free software are available to perform steganography on data. It can be relatively difficult to detect hidden data within a file, and the communication can be even more difficult to uncover if the message has been compressed and encrypted before being hidden in the carrier. 482 Electronic Evidence and Electronic Signatures At present, it is unlikely that many investigators will undertake a routine examination for hidden data. 1 > 1Brent T. McBride, Gilbert L. Peterson and Steven C. Gustafson, ‘A new blind method for detecting > novel steganography’ (2005) 2(1) Digital Investigation 50; a wide range of references on this topic > is provided in Gary C. Kessler, ‘An overview of steganography for the computer forensics examiner’ > (2004) 6(3) Forensic
|
{"source": 5648, "title": "from dpo"}
|
things like Prof. von Ahn’s ESP Game (now Google Image Labeler), which gets hundreds of thousands of images labeled by humans through an online game, can help. In our scenario of labeling emails as important or not, there are several things the company could try. First, it could try annoying the user somewhat by asking him or her to explicitly label a week’s worth of emails as important or not. Second, it could try to guess the answer ex post facto for a bunch of training emails by observing things like: i) whether the user clicked on the email first; ii) whether the user sent a response; iii) whether the user deleted the message; iv) whether the user spent a long time reading the message, etc. Conclusion: We allow the learner to obtaining training data 〈x1, f (x1)〉, . . . , 〈xm, f (xm)〉, with the xi’s being drawn independently from an unknown-to-the-learner probability distribution D.However, because getting good training labels is usually expensive, we strive to design algorithms that use as few training examples as possible. 2.4 Noise In reality, it is unlikely that in the training data we will perfectly have yi = f (xi) for every i;even careful humans will sometimes make mistakes in doing hand-labeling. Furthermore, as we discussed earlier, sometimes it doesn’t even make sense to assume that there is a target function f mapping each instance to a unique label. Perhaps some small fraction of instances don’t really have a “correct answer”. A more general and more realistic framework for learning is the following: Noisy data: We continue to assume that there is a relatively simple target function f : {0, 1}n →{0, 1}. However, we assume that some small fraction η of the training data is noisy ; i.e., has > 2The
|
{"source": 6644, "title": "from dpo"}
|
environmental variability (e.g., in soils, climate, topography, etc.), also a function of area. Environmental variability constrains the suite of species that can occupy a given area, and the two factors interact to create a mosaic of vegetation conditions across the landscape. Only in agricultural or horticultural systems does vegetation ever approach perfect uniformity. There is always heterogeneity in natural systems, although its scale and intensity will vary widely. == See also == Biocoenosis Biome Ecological succession Ecoregion Ecosystem Plant cover Tropical vegetation Vegetation and slope stability == References == == Further reading == Archibold, O. W. Ecology of World Vegetation. New York: Springer Publishing, 1994. Barbour, M. G. and W. D. Billings (editors). North American Terrestrial Vegetation. Cambridge: Cambridge University Press, 1999. Barbour, M.G, J.H. Burk, and W.D. Pitts. "Terrestrial Plant Ecology". Menlo Park: Benjamin Cummings, 1987. Box, E. O. 1981. Macroclimate and Plant Forms: An Introduction to Predictive Modeling in Phytogeography. Tasks for Vegetation Science, vol. 1. The Hague: Dr. W. Junk BV. 258 pp., Macroclimate and Plant Forms: An Introduction to Predictive Modeling in Phytogeography. Breckle, S-W. Walter's Vegetation of the Earth. New York: Springer Publishing, 2002. Burrows, C. J. Processes of Vegetation Change. Oxford: Routledge Press, 1990. Ellenberg, H. 1988. Vegetation ecology of central Europe. Cambridge University Press, Cambridge, Vegetation Ecology of Central Europe. Feldmeyer-Christie, E., N. E. Zimmerman, and S. Ghosh. Modern Approaches In Vegetation Monitoring. Budapest: Akademiai Kiado, 2005. Gleason, H.A. 1926. The individualistic concept of the plant association. Bulletin of the Torrey Botanical Club, 53:1-20. Grime, J.P. 1987. Plant strategies and vegetation processes. Wiley Interscience, New York NY. Kabat, P., et al. (editors). Vegetation, Water, Humans and the Climate: A New Perspective on an Interactive System. Heidelberg: Springer-Verlag 2004. MacArthur, R.H. and E. O. Wilson. The theory of Island Biogeography. Princeton: Princeton University Press.
|
{"page_id": 216226, "title": "Vegetation"}
|
the outermost electron shell. For transition metals the orbitals of the incomplete (n−1)d subshell are included, and for lanthanides and actinides incomplete (n−2)f and (n−1)d subshells. The orbitals involved can be in an inner electron shell and do not all correspond to the same electron shell or principal quantum number n in a given element, but they are all at similar energies. As a general rule, a main-group element (except hydrogen or helium) tends to react to form a s2p6 electron configuration. This tendency is called the octet rule, because each bonded atom has 8 valence electrons including shared electrons. Similarly, a transition metal tends to react to form a d10s2p6 electron configuration. This tendency is called the 18-electron rule, because each bonded atom has 18 valence electrons including shared electrons. The heavy group 2 elements calcium, strontium, and barium can use the (n−1)d subshell as well, giving them some similarities to transition metals. == Chemical reactions == The number of valence electrons in an atom governs its bonding behavior. Therefore, elements whose atoms have the same number of valence electrons are often grouped together in the periodic table of the elements, especially if they also have the same types of valence orbitals. The most reactive kind of metallic element is an alkali metal of group 1 (e.g., sodium or potassium); this is because such an atom has only a single valence electron. During the formation of an ionic bond, which provides the necessary ionization energy, this one valence electron is easily lost to form a positive ion (cation) with a closed shell (e.g., Na+ or K+). An alkaline earth metal of group 2 (e.g., magnesium) is somewhat less reactive, because each atom must lose two valence electrons to form a positive ion with a closed shell (e.g., Mg2+). Within
|
{"page_id": 568674, "title": "Valence electron"}
|
The Anne Bennett Prize and Senior Anne Bennett Prize are awards given by the London Mathematical Society. In every third year, the society offers the Senior Anne Bennett prize to a mathematician normally based in the United Kingdom for work in, influence on or service to mathematics, particularly in relation to advancing the careers of women in mathematics. In the two years out of three in which the Senior Anne Bennett Prize is not awarded, the society offers the Anne Bennett Prize to a mathematician within ten years of their doctorate for work in and influence on mathematics, particularly acting as an inspiration for women mathematicians. Both prizes are awarded in memory of Anne Bennett, an administrator for the London Mathematical Society who died in 2012. The Anne Bennett Prizes should be distinguished from the Anne Bennett Memorial Award for Distinguished Service of the Royal Society of Chemistry, for which Anne Bennett also worked. == Winners == The winners of the Anne Bennett Prize have been: 2015 Apala Majumdar, in recognition of her outstanding contributions to the mathematics of liquid crystals and to the liquid crystal community. 2016 Julia Wolf, in recognition of her outstanding contributions to additive number theory, combinatorics and harmonic analysis and to the mathematical community. 2018 Lotte Hollands, in recognition of her outstanding research at the interface between quantum theory and geometry and of her leadership in mathematical outreach activities. 2019 Eva-Maria Graefe, in recognition of her outstanding research in quantum theory and the inspirational role she has played among female students and early career researchers in mathematics and physics. 2021 Viveka Erlandsson, "for her outstanding achievements in geometry and topology and her inspirational active role in promoting women mathematicians". 2022 Asma Hassannezhad, "for her outstanding work in spectral geometry and her substantial contributions toward the
|
{"page_id": 61347778, "title": "Anne Bennett Prize"}
|
The Lazarus Effect (1983) is the third science fiction novel set in the Destination: Void universe by the American author Frank Herbert and poet Bill Ransom. It takes place some time after the events in The Jesus Incident (1979). == Plot summary == An indeterminate but several hundreds of years after The Jesus Incident the intelligent kelp has been almost totally destroyed, almost all land on Pandora has been submerged, and humanity has divided into two cultures: Islanders and Mermen. Islanders live on floating islands, the smallest of which houses at least 10,000 people, and which like much of Islander technology are living creatures. Islanders are genetically unstable due to the clone and genetic experiments of Jesus Lewis. Some are nearly like modern day humans, but diversity is wide and accepted. Islander children who have mutations that are considered dangerous are executed soon after birth. Mermen, who are genetically stable and are much like modern day humans apart from webbed hands and feet, live in underwater cities with better technology, better food, advanced medicine, and an all around higher quality of life than the Islanders. They perform experiments aimed at bringing back the intelligent kelp and rocketry to gain access to the hibernation tanks on Ship (the intelligent ship which humans created in Destination: Void and which originally brought the humans to Pandora). Without kelp acting to control currents, nearly teenage nearly-standard-human Islander Brett is lost overboard when the island he is on is struck by a rogue wave. He is rescued by Scudi Wang, a female Merman around his age, and taken to her home underwater. Due to being the heiress to a large Merman company controlling vital interests like food production and transport, Scudi has become the interest of GeLaar Gallow who wants to co-opt her resources into
|
{"page_id": 295393, "title": "The Lazarus Effect (novel)"}
|
to an attacker's machine. One method for mitigating this type of attack is to use the IP source guard feature available on many Ethernet switches. The IP guard initially blocks all traffic except DHCP packets. When a client receives a valid IP address from the DHCP server the IP address and switch port relationship are bound in an Access Control List (ACL). The ACL then restricts traffic only to those IP addresses configured in the binding. === Wireless networks === ==== Hidden node attack ==== In a wireless network many hosts or nodes are sharing a common medium. If nodes A and B are both wireless laptop computers communicating in an office environment their physical separation may require that they communicate through a wireless access point. But only one device can transmit at a time in order to avoid packet collisions. Prior to transmitting, Node A sends out a Ready to Send (RTS) signal. If it is not receiving any other traffic the access point will broadcast a Clear to Send (CTS) signal over the network. Node A will then begin transmitting while Node B knows to hold off transmitting its data for the time being. Even though it cannot directly communicate with Node A, i.e. Node A is hidden, it knows to wait based on its communication with the access point. An attacker can exploit this functionality by flooding the network with CTS messages. Then every node assumes there is a hidden node trying to transmit and will hold its own transmissions, resulting in a denial of service. Preventing hidden node attacks requires a network tool such as NetEqualizer. Such a tool monitors access point traffic and develops a baseline level of traffic. Any spikes in CTS/RTS signals are assumed to be the result of a hidden node attack
|
{"page_id": 38336626, "title": "Link layer security"}
|
Originally, the word computing was synonymous with counting and calculating, and the science and technology of mathematical calculations. Today, "computing" means using computers and other computing machines. It includes their operation and usage, the electrical processes carried out within the computing hardware itself, and the theoretical concepts governing them (computer science). See also: List of programmers, List of computing people, List of computer scientists, List of basic computer science topics, List of terms relating to algorithms and data structures. Topics on computing include: == 0–9 == 1.TR.6 – 100BaseVG – 100VG-AnyLAN – 10BASE-2 – 10BASE-5 – 10BASE-T – 120 reset – 1-bit computing – 16-bit computing – 16550 UART – 1NF – 1TBS – 20-GATE – 20-GATE – 2B1D – 2B1Q – 2D – 2NF – 3-tier (computing) – 32-bit application – 32-bit computing – 320xx microprocessor – 386BSD – 3Com Corporation – 3DO – 3D computer graphics – 3GL – 3NF – 3Station – 4.2BSD – 4-bit computing – 404 error – 431A – 473L system – 486SX – 4GL – 4NF – 51-FORTH – 56 kbit/s line – 5ESS switch – 5NF – 5th Glove – 6.001 – 64-bit computing – 680x0 – 6x86 – 8-bit clean – 8-bit computing – 8.3 filename – 80x86 – 82430FX – 82430HX – 82430MX – 82430VX – 8514 (display standard) – 8514-A – 88open – 8N1 – 8x86 – 90–90 rule – 9PAC == A == ABC ALGOL – ABLE – ABSET – ABSYS – Accent – Acceptance, Test Or Launch Language – Accessible Computing – Ada – Addressing mode – AIM alliance – AirPort – AIX – Algocracy – ALGOL – Algorithm – AltiVec – Amdahl's law – America Online – Amiga – AmigaE – Analysis of algorithms – AOL – APL – Apple Computer, Inc. – Apple II –
|
{"page_id": 99965, "title": "Index of computing articles"}
|
The development of gallium arsenide as a direct bandgap semiconductor in the 1960s ushered in the most important stage in the applications of gallium.: 221 In the late 1960s, the electronics industry started using gallium on a commercial scale to fabricate light emitting diodes, photovoltaics and semiconductors, while the metals industry used it to reduce the melting point of alloys. First blue gallium nitride LED were developed in 1971-1973, but they were feeble. Only in the early 1990s Shuji Nakamura managed to combine GaN with indium gallium nitride and develop the modern blue LED, now making the basis of ubiquitous white LEDs, which Nichia commercialized in 1993. He and two other Japanese scientists received a Nobel in Physics in 2014 for this work. Global gallium production slowly grew from several tens of t/year in the 1970s til ca. 2010, when it passed 100 t/yr and rapidly accelerated, by 2024 reaching about 450 t/yr. == Occurrence == Gallium does not exist as a free element in the Earth's crust, and the few high-content minerals, such as gallite (CuGaS2), are too rare to serve as a primary source. The abundance in the Earth's crust is approximately 16.9 ppm. It is the 34th most abundant element in the crust. This is comparable to the crustal abundances of lead, cobalt, and niobium. Yet unlike these elements, gallium does not form its own ore deposits with concentrations of > 0.1 wt.% in ore. Rather it occurs at trace concentrations similar to the crustal value in zinc ores, and at somewhat higher values (~ 50 ppm) in aluminium ores, from both of which it is extracted as a by-product. This lack of independent deposits is due to gallium's geochemical behaviour, showing no strong enrichment in the processes relevant to the formation of most ore deposits. The
|
{"page_id": 12241, "title": "Gallium"}
|
In semiconductor fabrication, a resist is a thin layer used to transfer a circuit pattern to the semiconductor substrate which it is deposited upon. A resist can be patterned via lithography to form a (sub)micrometer-scale, temporary mask that protects selected areas of the underlying substrate during subsequent processing steps. The material used to prepare said thin layer is typically a viscous solution. Resists are generally proprietary mixtures of a polymer or its precursor and other small molecules (e.g. photoacid generators) that have been specially formulated for a given lithography technology. Resists used during photolithography are called photoresists. == Background == Semiconductor devices (as of 2005) are built by depositing and patterning many thin layers. The patterning steps, or lithography, define the function of the device and the density of its components. For example, in the interconnect layers of a modern microprocessor, a conductive material (copper or aluminum) is inlaid in an electrically insulating matrix (typically fluorinated silicon dioxide or another low-k dielectric). The metal patterns define multiple electrical circuits that are used to connect the microchip's transistors to one another and ultimately to external devices via the chip's pins. The most common patterning method used by the semiconductor device industry is photolithography -- patterning using light. In this process, the substrate of interest is coated with photosensitive resist and irradiated with short-wavelength light projected through a photomask, which is a specially prepared stencil formed of opaque and transparent regions - usually a quartz substrate with a patterned chromium layer. The shadow of opaque regions in the photomask forms a submicrometer-scale pattern of dark and illuminated regions in the resist layer -- the areal image. Chemical and physical changes occur in the exposed areas of the resist layer. For example, chemical bonds may be formed or destroyed, inducing a change in
|
{"page_id": 2277564, "title": "Resist (semiconductor fabrication)"}
|
MOS (Magnetic Organization System) is an American brand of organizational tools that use magnetism to manage cables and other magnetic items. == History == The brand was formed through crowdfunding on Kickstarter in August 2012. MOS has launched every subsequent product through the Kickstarter platform since. === Growth and expansion === In January 2014 MOS released Spring, a line of phone and audio cables, as well as a miniaturized version of the original Magnetic Organization System called MOS Menos. Later in June 2014 MOS started another Kickstarter campaign for the Reach project which made its goal of $50,000 in the first day of the Kickstarter campaign. The Reach campaign was funded at 284 percent of the initial goal on July 26, 2014. MOS is a brand of Sewell Development Corp. == References == == External links == MOS Homepage Apartment Therapy Explains MOS MOS Review by Cult of Mac Design Milk coverage of MOS Reach Kickstarter Project Gizmodo coverage of MOS Reach Kickstarter Project
|
{"page_id": 43210266, "title": "MOS (brand)"}
|
The Philippine Sea plate or the Philippine plate is a tectonic plate comprising oceanic lithosphere that lies beneath the Philippine Sea, to the east of the Philippines. Most segments of the Philippines, including northern Luzon, are part of the Philippine Mobile Belt, which is geologically and tectonically separate from the Philippine Sea plate. The plate is bordered mostly by convergent boundaries: To the north, the Philippine Sea plate meets the Okhotsk microplate at the Nankai Trough. The Philippine Sea plate, the Amurian plate, and the Okhotsk plate meet near Mount Fuji in Japan. The thickened crust of the Izu–Bonin–Mariana arc colliding with Japan constitutes the Izu Collision Zone. The east of the plate includes the Izu–Ogasawara (Bonin) and the Mariana Islands, forming the Izu–Bonin–Mariana Arc system. There is also a divergent boundary between the Philippine Sea plate and the small Mariana plate which carries the Mariana Islands. To the east, the Pacific plate subducts beneath the Philippine Sea plate at the Izu–Ogasawara Trench. To the south, the Philippine Sea plate is bounded by the Caroline plate and Bird's Head plate. To the west, the Philippine Sea plate subducts under the Philippine Mobile Belt at the Philippine Trench and the East Luzon Trench. (The adjacent rendition of Prof. Peter Bird's map is inaccurate in this respect.) To the northwest, the Philippine Sea plate meets Taiwan and the Nansei islands on the Okinawa plate, and southern Japan on the Amurian plate. It also meets the Yangtze plate due northwest. == See also == List of earthquakes in Guam List of earthquakes in Japan List of earthquakes in the Philippines == References == Hall, Robert; Fuller, Michael; Ali, Jason R.; Anderson, Charles D. (1995), "The Philippine Sea Plate: Magnetism and reconstructions", Active Margins and Marginal Basins of the Western Pacific, Geophysical Monograph Series,
|
{"page_id": 521060, "title": "Philippine Sea plate"}
|
it's a lot easier to bring up a relatively simple (but scalable) infrastructure on AWS than deal with: colo location, buying servers, buying spares, replacing failing hardware, imaging, setting up backups, etc etc. Those typically become concerns once you're at big scale where the cost savings are significant. jacobsenscott on Dec 2, 2020 | root | parent | next [–] But for most companies it never "comes time to scale". Especially if you have 100% dedicated hardware and you can start out with a 64 core db server with 120GB of memory and a matching web server pretty much for free. You need to "scale" early in a cloud environment because you are allocated a fraction of the hardware and someone else on that same hardware is using all the resources. AWS/DO etc boost their margins by packing as many vps's onto one physical box as they can. That's why on a VPS your 95th percentile response time is 1000x your 50% response time. All you can do is "scale" and pray enough of your connections are hitting the boxes that nobody else is using right now. fomine3 on Dec 2, 2020 | root | parent | next [–] VPS packs but EC2? _f1dq on Dec 1, 2020 | root | parent | prev | next [–] For what it's worth; unlike OP, I'm not suggesting Co-Lo over cloud. Co-Lo still has its place but for most projects that I'm involved with, low-cost services like DigitalOcean, Linode, or LightSail is the best option. ldng on Dec 2, 2020 | root | parent | prev | next [–] I love how AWS fanboys make it a back-or-white issue. OVH,Hetzner and others are providing bare metal server that are provionnable by API. The choice is not between full-AWS vs full-On-Premises-By-Hand. 908B64B197 on
|
{"source": 1743, "title": "from dpo"}
|
you fly. A Square is a Kite? 3. • diagonals which alwaysmeet at right angles. Kite properties include (1) two pairs of consecutive, congruent sides, (2) congruent non-vertex angles and (3) perpendicular diagonals. Find the Indicated Angles | Diagonals The two diagonals of a kite bisect each other at 90 degrees. Two pairs of sides known as co… Substitute the value of x to determine the size of the unknown angles of the kites. The vertex angles of a kite are the angles formed by two congruent sides.. By definition, a kite is a polygon with four total sides (quadrilateral). You can drag any of the red vertices to change the size or shape of the kite. The longer and shorter diagonals divide the kite into two congruent and two isosceles triangles respectively. Browse through some of these worksheets for free! Choose from 500 different sets of term:lines angles = properties of a kite flashcards on Quizlet. Using these facts about the diagonals of a kite (such as how the diagonal bisects the vertex angles) and various properties of triangles, such as the triangle angle sum theorem or Corresponding Parts of Congruent Triangles are Congruent (CPCTC), it is possible … In contrast, a parallelogram also has two pairs of equal-length sides, but they are opposite to each other instead of being adjacent. Two disjoint pairs of consecutive sides are congruent by definition. $\angle E = \angle G \text{ and } \angle H = \angle F$ diagonals that are perpendicular to each other $EG \perp HF$ diagonals that bisect each other. The legs of the triangles are 10 inches and 17 inches, respectively. Yes! Stay Home , Stay Safe and keep learning!!! 00:05:28 – Use the properties of a trapezoid to find sides, angles, midsegments, or determine if the trapezoid is
|
{"source": 4160, "title": "from dpo"}
|
any super large feature dimension, we can reduce it down to the size nearly linear in length of sentence. * 2023-04-07Convex Minimization with Integer Minima in \widetilde O(n^4) Time calls to a separation oracle and O(n^4 \log n) time. The previous best polynomial time algorithm for this problem given in [Jiang, SODA 2021, JACM 2022] achieves O(n^2\log\log n/\log n) oracle complexity. However, the overall runtime of Jiang's algorithm is at least \widetilde{\Omega}(n^8), due to expensive sub-routines such as the Lenstra-Lenstra-Lov\'asz (LLL) algorithm [Lenstra, Lenstra, Lov\'asz, Math. Ann. 1982] and random walk based cutting plane method [Bertsimas, Vempala, JACM 2004]. Our significant speedup is obtained by a nontrivial combination of a faster version of the LLL algorithm due to [Neumaier, Stehl\'e, ISSAC 2016] that gives similar guarantees, the volumetric center cutting plane method (CPM) by [Vaidya, FOCS 1989] and its fast implementation given in [Jiang, Lee, Song, Wong, STOC 2020]. For the special case of submodular function minimization (SFM), our result implies a strongly polynomial time algorithm for this problem using O(n^3 \log n) calls to an evaluation oracle and O(n^4 \log n) additional arithmetic operations. Both the oracle complexity and the number of arithmetic operations of our more general algorithm are better than the previous best-known runtime algorithms for this specific problem given in [Lee, Sidford, Wong, FOCS 2015] and [Dadush, V\'egh, Zambelli, SODA 2018, MOR 2021]. * 2023-04-05[Query lower bounds for log-concave sampling]( Sinho Chewi, Jaume de Dios Pont, [Jerry Li]( Chen Lu, and Shyam Narayanan. **Summary:** Log-concave sampling has witnessed remarkable algorithmic advances in recent years, but the corresponding problem of proving
|
{"source": 5938, "title": "from dpo"}
|
of the fluorophores within the sample, with most common excitation wavelengths being in the 400–700 nm range for biological samples. In practice, a lightbox will generate a high intensity multichromatic laser, which will then be filtered to allow the desired wavelengths through to excite the sample. For objective-based TIRFM, the excitation beam and fluoresced emission beam will be captured via the same objective lens. Thus, to split the beams, a dichromatic mirror is used to reflect the incoming excitation beam towards the objective lens, and allow the emission beam to pass through into the detector. Additional filtering may be required to further separate emission and excitation wavelengths. === Emission beam === When excited with specific wavelengths of light, fluorophore dyes will reemit light at longer wavelengths (which contain less energy). In the context of TIRFM, only fluorophores close to the interface will be readily excited by the evanescent field, while those past ~100 nm will be highly attenuated. Light emitted by the fluorophores will be undirected, and thus will pass through the objective lens at varying locations with varying intensities. This signal will then pass through the dichromatic mirror and onward to the detector. === Cover slip and immersion oil === Glass cover slips typically have a reflective index around n = 1.52 {\displaystyle n=1.52} , while the immersion oil refractive index is a comparable n = 1.51 {\displaystyle n=1.51} . The medium of air, which has a refractive index of n = 1.00 {\displaystyle n=1.00} , would cause refraction of the excitation beam between the objective and the coverslip, thus the oil is used to buffer the region and prevent superfluous interface interactions before the beam reaches the interface between coverslip and sample. === Objective lens === The objective lens numerical aperture (NA) specifies the range of angles over
|
{"page_id": 1183118, "title": "Total internal reflection fluorescence microscope"}
|
A dynamic shear rheometer, commonly known as DSR, is used for research and development as well as for quality control in the manufacture of a wide range of materials. Dynamic shear rheometers have been used since 1993 when Superpave was used for characterising and understanding high temperature rheological properties of asphalt binders in both the molten and solid state and is fundamental in order formulate the chemistry and predict the end-use performance of these materials. This is done by deriving the complex modulus (G*) from the storage modulus (elastic response, G') and loss modulus (viscous behaviour, G") yielding G* as a function of stress over strain. It is used to characterize the viscoelastic behavior of asphalt binders at intermediate temperatures from 10 to 150 °C (50 to 302 °F). == References == "Dynamic Shear Rheometer — DSR". Cooper Technology. 2014-01-30. Archived from the original on 2014-03-23. US patent 5271266, "Dynamic shear rheometer and method" "Rheometer Bitumen, Dynamic Shear Rheometer". RHEOTEST Medingen - Lieferant Viskosimeter und Rheometer (in German). 2014-08-19. Archived from the original on 2014-08-19.
|
{"page_id": 43123622, "title": "Dynamic shear rheometer"}
|
An ecological cascade effect is a series of secondary extinctions that are triggered by the primary extinction of a key species in an ecosystem. Secondary extinctions are likely to occur when the threatened species are: dependent on a few specific food sources, mutualistic (dependent on the key species in some way), or forced to coexist with an invasive species that is introduced to the ecosystem. Species introductions to a foreign ecosystem can often devastate entire communities, and even entire ecosystems. These exotic species monopolize the ecosystem's resources, and since they have no natural predators to decrease their growth, they are able to increase indefinitely. Olsen et al. showed that exotic species have caused lake and estuary ecosystems to go through cascade effects due to loss of algae, crayfish, mollusks, fish, amphibians, and birds. However, the principal cause of cascade effects is the loss of top predators as the key species. As a result of this loss, a dramatic increase (ecological release) of prey species occurs. The prey is then able to overexploit its own food resources, until the population numbers decrease in abundance, which can lead to extinction. When the prey's food resources disappear, they starve and may go extinct as well. If the prey species is herbivorous, then their initial release and exploitation of the plants may result in a loss of plant biodiversity in the area. If other organisms in the ecosystem also depend upon these plants as food resources, then these species may go extinct as well. An example of the cascade effect caused by the loss of a top predator is apparent in tropical forests. When hunters cause local extinctions of top predators, the predators' prey's population numbers increase, causing an overexploitation of a food resource and a cascade effect of species loss. Recent studies have
|
{"page_id": 11128986, "title": "Cascade effect (ecology)"}
|
Princo Corp. v. ITC, 616 F.3d 1318 (Fed. Cir. 2010) was a 2010 decision of the United States Court of Appeals for the Federal Circuit, that sought to narrow the defense of patent misuse to claims for patent infringement. Princo held that a party asserting the defense of patent misuse, absent a case of so-called per se misuse, must prove both "leveraging" of the patent being enforced against it and a substantial anticompetitive effect outside the legitimate scope of that patent right. In so ruling, the court emphasized that the misuse alleged must involve the patent in suit, not another patent. The majority opinion substantially "entangle[d] patent misuse jurisprudence with antitrust concepts." The Supreme Court's subsequent opinion in Kimble v. Marvel Entertainment, LLC, however, points strongly in the opposite direction, rejecting the conflation of misuse and antitrust and insisting that they embody different policies. == Background == The US International Trade Commission (ITC) conducted an investigation of Princo's alleged infringement of U.S. Philips Corporation's patents by the importation of optical discs—recordable compact discs ("CD-Rs") and rewritable compact discs ("CD-RWs") (collectively "CD-R/RWs"). Those devices and related technology were developed in the 1980s and 1990s, principally by Philips and Sony, working in collaboration. These companies also developed technical standards to ensure that CD-R and CD-RW discs made by different manufacturers would be compatible and playable on new machines and also preexisting machines that were designed to read the earlier generation of compact discs ("CDs") and "read-only" compact discs ("CD-ROMs"). The standards for CD-Rs and CD-RWs were collected in a publication known as the "Orange Book." In developing the CD-R/RW standards, Sony and Philips engineers developed different solutions for the problem of how to encode position information in the disc so that a consumer's CD reader/writer could maintain proper positioning while writing data
|
{"page_id": 47987592, "title": "Princo Corp. v. ITC"}
|
for now. It's expandable, and if the marketing hype proves true, new abilities for the units should get added in by both expansion packs and downloadable patches. So if you're looking for something that doesn't mimic C&C to a fault but gives you a lot of realtime challenge and variation, this is the place to go." GamePro said it "stands out by providing a deep challenge and excellent replay value." Like Next Generation, they expressed excitement over the promised updates, also praising the line-of-sight features and soundtrack, though they found the unit A.I. demands close supervision from the player. Total Annihilation was a finalist for "PC Strategy Game of the Year" during the AIAS' inaugural Interactive Achievement Awards, which ultimately went to StarCraft and Age of Empires (in a tie). Total Annihilation was a runner-up for Computer Gaming World's 1997 "Strategy Game of the Year" award, which ultimately went to Myth: The Fallen Lords. In 1999, Next Generation listed Total Annihilation as number 49 on their "Top 50 Games of All Time", commenting that, "Unique innovations such as the field commander, unit waypoints, and true line of sight based on elevation enabled a new level of depth in an overcrowded genre, and made Total Annihilation a standout in the great glut of realtime strategies." === Awards === Total Annihilation has won several awards, including: The number one Real-Time Strategy Game of all time, GameSpy 2004 1997 Game of the Year, GameSpot Best Strategy Game of 1997, GameSpot Best Multiplayer Game 1997, GameSpot Best Music 1997, GameSpot Included in "The Greatest Games of All Time", GameSpot == Reviews == The Duelist #31 Backstab #6 == See also == Dark Reign: The Future of War, released around the same time Dark Colony == References == == External links == Official website (archived)
|
{"page_id": 305596, "title": "Total Annihilation"}
|
Time-of-flight diffraction (TOFD) method of ultrasonic testing is a sensitive and accurate method for the nondestructive testing of welds for defects. TOFD originated from tip diffraction techniques which were first published by Silk and Liddington in 1975 which paved the way for TOFD. Later works on this technique are given in a number of sources which include Harumi et al. (1989), Avioli et al. (1991), and Bray and Stanley (1997). Bray and Stanley (1997) summarized TOFD as tip-diffraction techniques which utilized the principle that the tips of a crack when struck by a wave will diffract the signals back to the other location on the surface. The depth of these tips can be determined from the diffracted energy. TOFD was invented in the UK in the 1970s initially as a research tool. The use of TOFD enabled crack sizes to be measured more accurately, so that expensive components could be kept in operation as long as possible with minimal risk of failure. == Principle of operation == Measuring the amplitude of reflected signal is a relatively unreliable method of sizing defects because the amplitude strongly depends on the orientation of the crack. Instead of amplitude, TOFD uses the time of flight of an ultrasonic pulse to determine the position and size of a reflector. In a TOFD system, a pair of ultrasonic probes sits on opposite sides of a weld. One of the probes, the transmitter, emits an ultrasonic pulse that is picked up by the probe on the other side, the receiver. In undamaged pipes, the signals picked up by the receiver probe are from two waves: one that travels along the surface and one that reflects off the far wall. When a crack is present, there is a diffraction of the ultrasonic wave from the tip(s) of the
|
{"page_id": 6104792, "title": "Time-of-flight diffraction ultrasonics"}
|
lines which is not realized in practice, so there is inevitably some residual spurious passband at this frequency. The hairpin filter is another structure that uses parallel-coupled lines. In this case, each pair of parallel-coupled lines is connected to the next pair by a short link. The "U" shapes so formed give rise to the name hairpin filter. In some designs the link can be longer, giving a wide hairpin with λ/4 impedance transformer action between sections. The angled bends seen in figure 10 are common to stripline designs and represent a compromise between a sharp right angle, which produces a large discontinuity, and a smooth bend, which takes up more board area which can be severely limited in some products. Such bends are often seen in long stubs where they could not otherwise be fitted into the space available. The lumped-element equivalent circuit of this kind of discontinuity is similar to a stepped-impedance discontinuity. Examples of such stubs can be seen on the bias inputs to several components in the photograph at the top of the article. === Interdigital filter === Interdigital filters are another form of coupled-line filter. Each section of line is about λ/4 in length and is terminated in a short-circuit at one end only, the other end being left open-circuit. The end which is short-circuited alternates on each line section. This topology is straightforward to implement in planar technologies, but also particularly lends itself to a mechanical assembly of lines fixed inside a metal case. The lines can be either circular rods or rectangular bars, and interfacing to a coaxial format line is easy. As with the parallel-coupled line filter, the advantage of a mechanical arrangement that does not require insulators for support is that dielectric losses are eliminated. The spacing requirement between lines is
|
{"page_id": 24231219, "title": "Distributed-element filter"}
|
base- k {\displaystyle k} representations are close to that of n {\displaystyle n} . Constant-recursive sequences can be thought of as 1 {\displaystyle 1} -regular sequences, where the base-1 representation of n {\displaystyle n} consists of n {\displaystyle n} copies of the digit 1 {\displaystyle 1} . == Notes == == References == == External links == "OEIS Index Rec". OEIS index to a few thousand examples of linear recurrences, sorted by order (number of terms) and signature (vector of values of the constant coefficients)
|
{"page_id": 49700795, "title": "Constant-recursive sequence"}
|
3C 438 is a Seyfert galaxy and Fanaroff and Riley class II radio galaxy located in the constellation Cygnus. The radio galaxy has two lobes and there is a radio jet leading to the south lobe, which also has a prominent double hot spot. There is age variation across the lobes. 3C 438 is a member of a galaxy cluster and three galaxies are located close to it, the closest one being 4 arcseconds to the northeast. The galaxy cluster has been found when observed by the Chandra X-ray Observatory to have hot intergalactic gas, with a temperature of about 11 KeV, which when discovered in 2007 was the highest ever found, slightly hotter than the Bullet Cluster. The high temperature is the result of the merger of two galaxy clusters, as the relative movement of one subcluster has created a bow shock in the hot gas. == References == == External links == 3CRR Atlas:3C 438: Main Page
|
{"page_id": 14873932, "title": "3C 438"}
|
evolutionary adaptations influence the psychology of rapists. Such theories are highly controversial, as traditional theories typically do not consider rape to be a behavioral adaptation. Some object to such theories on ethical, religious, political, as well as scientific grounds. Others argue that a correct knowledge of the causes of rape is necessary in order to develop effective preventive measures. The Cinderella effect is the alleged higher rate of stepchildren being abused by stepparents as compared to genetic parents, observed in some, but not all, studies. An explanation of this affect has been attempted by application of evolutionary psychology theories. There have also been various criticisms of these theories. Infanticide is one of the few forms of violence more often done by women than men. Cross-cultural research has found that this is more likely to occur when the child has deformities or illnesses as well as when there are lacking resources due to factors such as poverty, other children requiring resources, and no male support. Such a child may have a low chance of reproductive success, in which case it would decrease the mother's inclusive fitness to spend resources on the child, in particular since women generally have a greater parental investment than men. ==== Criminal justice ==== Punishment of exploitative behaviors harmful to the group was likely a recurring problem in the ancestral environment. As such humans are argued to have developed a range of psychological mechanisms for handling this. Punishment can be a deterrent to undesired behaviors but excessive punishment can also be harmful to the group. Thus, humans are argued to favor a proportional response based on how severe the offence is. Cross-cultural research have a found a high agreement regarding how relatively harmful different crimes are perceived to be. On the other hand, evolutionary novel factors that
|
{"page_id": 26708620, "title": "Biosocial criminology"}
|
be too trivial of a mechanism to take into account the **meaning** of segments within the document. If we use this type of mechanism, we can’t know if we’re combining segments that have anything to do with one another. Luckily, if you’re building an application with LLMs, you most likely already have the ability to create **embeddings -** and embeddings can be used to extract the semantic meaning present in your data. This semantic analysis can be used to create chunks that are made up sentences that talk about the same theme or topic. Here are the steps that make semantic chunking work: 1. Break up the document into sentences. 2. Create sentence groups: for each sentence, create a group containing some sentences before and after the given sentence. The group is essentially “anchored” by the sentence use to create it. You can decide the specific numbers before or after to include in each group - but all sentences in a group will be associated with **one** “anchor” sentence. 3. Generate embeddings for each sentence group and associate them with their “anchor” sentence. 4. Compare distances between each group sequentially: When you look at the sentences in the document sequentially, as long as the topic or theme is the same - the distance between the sentence group embedding for a given sentence and the sentence group preceding it will be **low**. On the other hand, **higher** semantic distance indicates that the theme or topic has changed. This can effectively delineate one chunk from the next. [LangChain]( has created a [semantic chunking splitter]( implemented based on Kamradt’s work. You can also try out [our notebook for advanced chunking methods for RAG]( Figuring out the best chunk size for your application ----------------------------------------------------- Here are some pointers to help you come up with
|
{"source": 980, "title": "from dpo"}
|
one with the largest difference as the sub-tree to prune. Continue this process, including those nodes where the reduction is zero, until further pruning would increase the mis-classification rate. This produces the smallest version of the most accurate tree with respect to the test set. There may be a number of sub-trees with the same (largest) difference. Quinlan does not specify which sub-tree to choose in this situation—for example, the largest or the smallest. Experiments show that the choice makes little difference in terms of classifica-tion accuracy; therefore, the largest is selected on the grounds that this reduces the number of iterations necessary to prune the tree completely. This approach generates a set of trees, ending with the smallest minimum-error tree on the test data. 2.2.5. Pessimistic Error Pruning (Pessim) This is another method due to Quinlan [1986b], which aims to avoid the necessity of a separate test data set. As has been seen, the mis-classification rates produced by a tree on its training data are overly optimistic and, if used 234 J. MINGERS for pruning, produce overly large trees. Quinlan suggests using the continuity correction for the binomial distribution to obtain a more realistic estimate of the mis-classification rate. If N(t) = number of training set examples at node t, and e(t) = number of examples mis-classified at node t, then is an estimate of the mis-classification rate. The rate with the continuity correction is For a sub-tree Tt the mis-classification rate will be where i covers the leaves of the sub-tree. Thus the corrected mis-classification rate will be where NT is the number of leaves. In (4) and (5), N(t) = EN(i) as they refer to the same set of examples; therefore, the rates can be simplified to numbers of misclassifications: for a node for a sub-tree.
|
{"source": 2657, "title": "from dpo"}
|
provide the number 2, then the x-step is twice the x-vector and the y-step is twice the y-vector set by the x= and y= options. Finally, if you provide a coordinate, then the x-part of this coordinate will be used as the x-step and the y-part will be used as the y-coordinate. > \begin{tikzpicture}[x=.5cm] \draw[thick] (0,0) grid [step=1] (3,2); \draw[red] (0,0) grid [step=.75cm] (3,2); \end{tikzpicture} \begin{tikzpicture} \draw (0,0) circle (1); \draw[blue] (0,0) grid [step=(45:1)] (3,2); \end{tikzpicture} A complication arises when the x- and/or y-vector do not point along the axes. Because of this, the actual rule for computing the x-step and the y-step is the following: As the 98 x- and y-steps we use the x- and y-components or the following two vectors: The first vec-tor is either (〈x-grid-step-number 〉, 0) or (〈x-grid-step-dimension 〉, 0pt), the second vector is (0 , 〈y-grid-step-number 〉) or (0pt , 〈x-grid-step-dimension 〉). • xstep= 〈dimension or number 〉 sets the stepping in the x-direction. > \tikz \draw (0,0) grid [xstep=.5,ystep=.75] (3,2); • ystep= 〈dimension or number 〉 sets the stepping in the y-direction. It is important to note that the grid is always “phased” such that it contains the point (0 , 0) if that point happens to be inside the rectangle. Thus, the grid does not always have an intersection at the corner points; this occurs only if the corner points are multiples of the stepping. Note that due to rounding errors, the “last” lines of a grid may be omitted. In this case, you have to add an epsilon to the corner points. The following style is useful for drawing grids: • style=help lines This style makes lines “subdued” by using thin gray lines for them. However, this style is not installed automatically and you have to say for example: > \tikz
|
{"source": 4960, "title": "from dpo"}
|
smaller than (or at most equal to) 1, pR 2 will be larger than (or at least equal to) sR 2 for any given set. It is easy enough to compute the pR 2. We have seen how, for example, the b area is found by [Eq. (5.4.8)]; the combined areas b + e constitute the Y variance not accounted for by set A, hence 1 - R2Y A. Substituting in Eq. (5.4.9), and, symmetrically, To illustrate the distinction between sR 2 and pR 2, we refer to the example of the hierarchy of sets of demographics (D), illness (/), and hospitals (//) in relationship to length of hospital stay (Y) of Section 5.3.2. R\ D = .20, and when / is added, Ry DI = .22. The increment was .02; hence, sR 2 = .02, that is, 2% of the total Y variance is uniquely (relative toD) accounted for by /. But if we ask "what proportion of the variance of Y not accounted for by D is uniquely accounted for by /?" our base is not the total Y variance, but only 1 — R2^ = 1 - .20 = .80 of it, and the answer is pRJ — .02/.80 = .025. Letting D = A and / = B, we have simply substituted in Eqs. (5.4.7) and (5.4.11). It was also found that the further addition of H resulted in RY.DIH = -33- Th us » H accounted for an additional .11 of the total Y variance, hence sRJj = .11. If we shift our base from total Y variance to Y variance not already accounted for by D and /, the relevant proportion is .11/(1 - .22) = .141 (i.e., pRfy. Now letting sets D + / = A, and H - B, we again have
|
{"source": 6256, "title": "from dpo"}
|
scanned. The calculation of rate constants or Ki requires three steps: Measurement of the arterial input function (AIF), which acts as the first input to the mathematical model of tracer distribution. Measurement of the time-activity curve (TAC) within the skeletal region of interest, which acts as the second input to the mathematical model of tracer distribution. Kinetic modelling of AIF and TAC using mathematical modelling to obtain net plasma clearance (Ki) to the bone mineral. === Spectral method === The method was first described by Cunningham & Jones in 1993 for the analysis of dynamic PET data obtained in the brain. It assumes that the tissue impulse response function (IRF) can be described as a combination of many exponentials. Since A tissue TAC can be expressed as a convolution of measured arterial input function with IRF, Cbone(t) can be expressed as: C b o n e ( t ) = ∑ k = 1 n α i . ( C p l a s m a ( t ) ⊗ e x p ( − β i . t ) ) {\displaystyle C_{bone}(t)=\sum _{k=1}^{n}\alpha _{i}.{\bigl (}C_{plasma}(t)\otimes exp(-\beta _{i}.t){\bigr )}} where, ⊗ {\displaystyle \otimes } is a convolution operator, Cbone(t) is the bone tissue activity concentration of tracer (in units: MBq/ml) over a period of time t, Cplasma(t) is the plasma concentration of tracer (in units: MBq/ml) over a period of time t, IRF(t) is equal to the sum of exponentials, β values are fixed between 0.0001 sec−1 and 0.1 sec−1 in intervals of 0.0001, n is the number of α components that resulted from the analysis and β1, β2,..., βn corresponds to the respective α1, α2,..., αn components from the resulted spectrum. The values of α are then estimated from the analysis by fitting multi-exponential to the IRF. The intercept
|
{"page_id": 63771247, "title": "PET for bone imaging"}
|
1:14" twist barrels, but this was increased to 1:12" twist in early military production to improve stability with 55-grain (3.6 g) M193 lead-core bullets in the early 5.56×45mm NATO cartridges. Twist was increased to 1:9" after combat experience demonstrated the advantages of longer 62-grain (4.0 g) M855 bullets with a portion of the lead core replaced by a less dense steel penetrator. Barrels with 1:7" twist have been used in 21st century 5.56×45mm NATO firearms and have replaced barrels of older United States military firearms to stabilize longer M856 tracer bullets and M855A1 green bullets of less dense materials. == See also == Shotgun shell § Lead free Shot (pellet) § Bird lead poisoning == References ==
|
{"page_id": 39095186, "title": "Green bullet"}
|
The Barton reaction, also known as the Barton nitrite ester reaction, is a photochemical reaction that involves the photolysis of an alkyl nitrite to form a δ-nitroso alcohol. Discovered in 1960, the reaction is named for its discoverer, Nobel laureate Sir Derek Barton. Barton's Nobel Prize in Chemistry in 1969 was awarded for his work on understanding conformations of organic molecules, work which was key to realizing the utility of the Barton Reaction. The Barton reaction involves a homolytic RO–NO cleavage, followed by δ-hydrogen abstraction, free radical recombination, and tautomerization to form an oxime. Selectivity for the δ-hydrogen is a result of the conformation of the 6-membered radical intermediate. Often, the site of hydrogen atom abstraction can be easily predicted. This allows the regio- and stereo-selective introduction of functionality into complicated molecules with high yield. Due to its unique property at the time to change otherwise inert substrates, Barton used this reaction extensively in the 1960s to create a number of unnatural steroid analogues. While the Barton reaction has not enjoyed the popularity or widespread use of many other organic reactions, together with the mechanistically similar Hofmann–Löffler reaction it represents one of the first examples of C-H activation chemistry, a field which is now the topic of much frontline research in industrial and academic chemistry circles. == Preparation of alkyl nitrites == The unusual alkyl nitrite starting material of the Barton reaction is prepared by attack of an alcohol on a nitrosylium cation generated in situ by dehydration of doubly protonated nitrous acid. This series of steps is mechanistically identical to the first half of the mechanism formation of the more well-known aryl and alkyl diazonium salts. While the synthesis of alkyl nitrites from nitrosyl chloride is known and oft-employed in the context of complex molecule synthesis, the reaction is
|
{"page_id": 10220553, "title": "Barton reaction"}
|
collection of drumlins in one area is referred to as a field or swarm and creates a landscape sometimes called a “basket of eggs topography”. The shape of a drumlin may vary but most often is oval in nature with a long axis parallel to the direction of ice flow. The steeper slope is typically up-ice whereas the shallower slow is down-ice. It is proposed that the width to length ratio of a drumlin can be used to determine the velocity at which a glacier was traveling. An elongated drumlin indicates a slower glacial velocity, whereas a shortened drumlin indicates a much faster glacial velocity. This is surmised due to the relationship between friction and surface area. Drumlins form as overlying ice moves across unconsolidated till or ground moraines. There are two main theories for the formation of drumlins. Although the exact origins of these landforms may vary circumstantially and is a topic of debate. The first, often called constructional, suggests that glacial till is deposited by meltwater streams and accumulated by the continual push of an overlying glacier. By this process the individual till particles in the drumlin align themselves in the direction of ice flow. Scientists can test this theory by studying the orientation of the sediment grains with the overall orientation of the drumlin. The second theory is that the erosion caused by the heavy overlying glacier scrapes material from an unconsolidated sediment bed and repositions it and deposits it at the drumlin. The drumlin is similarly shaped by the flow of ice as in the previously mentioned theory. The distinction being where the glacial till is derived from before being shaped. In all circumstances, because the subglacial region is not visible until after the glacier has retreated and because there is great variability in drumlin presentation,
|
{"page_id": 11034502, "title": "Fluvioglacial landform"}
|
Therefore, attempts to remove it can only be ideologically motivated – to whitewash Communism." Other Wikipedia editors and users on social media opposed the deletion of the article. The article's deletion nomination received considerable attention from conservative media. The Heritage Foundation, an American conservative think tank, called the arguments made in favor of deletion "absurd and ahistorical". On December 1, 2021, a panel of four administrators found that the discussion yielded no consensus, meaning that the status quo was retained, and the article was not deleted. The article's deletion discussion was the largest in Wikipedia's history. Hindutva proponents have accused Wikipedia of being anti-Hindu and anti-Indian. ==== National bias ==== In 2008, Tim Anderson, a senior lecturer in political economy at the University of Sydney, said Wikipedia administrators display an American-focused bias in their interactions with editors and their determinations of which sources are appropriate for use on the site. Anderson was outraged after several of the sources he used in his edits to the Hugo Chávez article, including Venezuela Analysis and Z Magazine, were disallowed as "unusable". Anderson also described Wikipedia's neutral point of view policy to ZDNet Australia as "a facade" and that Wikipedia "hides behind a reliance on corporate media editorials". ==== Racial bias ==== Wikipedia has been charged with having a systemic racial bias in its coverage, due to an underrepresentation of people of colour as editors. The President of Wikimedia D.C., James Hare, noted that "a lot of black history is left out" of Wikipedia, due to articles predominately being written by white editors. Articles that do exist on African topics are, according to some critics, largely edited by editors from Europe and North America and thus reflect their knowledge and consumption of media, which "tend to perpetuate a negative image" of Africa. Maira Liriano,
|
{"page_id": 5034470, "title": "Criticism of Wikipedia"}
|
from individuals who were afflicted with LHON and some were from individuals who were just carriers. The researchers found that cigarette smoke condensate lowered the amount of mitochondria in the cells, but that carrier individuals were better able to compensate than those from individuals with LHON. Though there is an additive environmental effect, there is more to learn about why certain homoplasmic individuals have the disease and others do not. === Cancer === Some research has shown that an inherited heteroplasmic mutation can cause cancer in older age as cells become homoplasmic. In one study, doctors found that a cancer patient's tumor consisted of only homoplasmic cells with mutant mtDNA and that healthy cells in his body were heteroplasmic for mutant mtDNA. Additionally, researchers found that the patient's siblings had the same heteroplasmic mutation. This indicates that the heteroplasmic mutation was inherited, and over time led to homoplasmic cells that caused cancer. == See also == Heteroplasmy Microheteroplasmy == Notes and references == == External links == Leber's Hereditary Optic Neuropathy
|
{"page_id": 1398048, "title": "Homoplasmy"}
|
is afforded the title paṇḍita. The five sciences are: the "science of language" (śabda vidyā; shēng-míng, 聲明); the "science of logic" (hetu vidyā; yīn-míng, 因明); the "science of medicine" (cikitsā vidyā; yào-míng, 藥明); the "science of fine arts and crafts" (śilpa-karma-sthāna vidyā; gōngqiǎo-míng, 工巧明); the "inner science" of spirituality (adhyātma vidyā; nèi-míng, 內明) which relates to the study of the Tripiṭaka. == See also == Jnana Mahavidya Prajñā (Buddhism) Prajna (Hinduism) Jatismara == References ==
|
{"page_id": 43382131, "title": "Vidya (philosophy)"}
|
Costas M. Soukoulis (Greek: Κώστας Μ. Σούκουλης; 15 January 1951 – 14 March 2024) was a Greek physicist, who was a senior scientist in the Ames Laboratory and a Distinguished Professor of Physics Emeritus at Iowa State University. He received his B.Sc. from University of Athens in 1974. He obtained his Ph.D. in Physics from the University of Chicago in 1978, under the supervision of Kathryn Liebermann Levin. From 1978 to 1981 he was at the Physics Department at University of Virginia. He spent three years (1981–1984) at Exxon Research and Engineering Co. and from 1984 was at Iowa State University (ISU) and Ames Laboratory. He was part-time Professor at the Department of Materials Science and Technology of the University of Crete (2001–2011) and an associated member of IESL-FORTH at Heraklion, Crete, Greece, since 1984. He died on 14 March 2024, at the age of 73. == Research == Soukoulis and his collaborators at Ames Lab/ISU in 1990 and 1994, suggested photonic crystal designs (lattice diamond and the woodpile structure, respectively), which gave the largest omnidirectional photonic band gaps. Many experimental groups all over the world still use his woodpile structure to fabricate photonic crystals at optical wavelengths, enhance the spontaneous emission and produce nanolasers with low threshold limit. Soukoulis and Wegener demonstrate magnetic responses and negative index of refraction at optical frequencies in metamaterials, which do not exist in natural materials. His other researches includes light and Anderson localization, random lasers, graphene and plasmonics. == Awards and honours == He was a Fellow of the American Physical Society (1991), Optical Society (2003), American Association for the Advancement of Science (2002), and National Academy of Inventors (2018). He was a recipient of Senior Humboldt Research Award (2002), and the first Frances M. Craig endowed chair in Physics Department at ISU
|
{"page_id": 42111464, "title": "Costas Soukoulis"}
|
show on the screen. In order to watch Level 2.5 teletext, a rather recent television set with a special decoder chip is required. If not, Level 1.5 text will be shown. === Level 3 === New features: Dynamically Redefined Character Set (DRCS) allowing the display of non-Roman characters (e.g. Arabic and Chinese) Pictorial graphic characters can also be defined (Level 3 was replaced by level 3.5) ==== Level 3.5 (1997) ==== Level 3.5 extends the number of re-definable characters and their complexity and introduces different font styles and proportional spacing. New features: Dynamically Redefined Character Set (DRCS) allowing the display of non-Roman characters (e.g. Arabic and Chinese) Pictorial graphic characters can also be defined Different font styles Proportional spacing. === Level 4 (1981) === Level 4 was proposed in 1981 and tested by IBA. No TV set implements this level. Vector graphics in resolutions of 320×256 Needs computing power to generate the display from a sequence of drawing instructions 250,000 colours palette === Level 5 === Level 5 allows full-definition still pictures with better quality than video cameras. No TV set implements this level. Modulated onto a carrier No noise added to the picture during transmission Image compression used == See also == Antiope - French teletext standard (CCIR Teletext System A) NABTS – North American Teletext Specification (CCIR Teletext System C) JTES - Japanese Teletext Specification (CCIR Teletext System D) NAPLPS – North American Presentation Level Protocol Syntax Mullard SAA5050 a popular teletext decoder chip List of teletext services Teletext character set T.51/ISO/IEC_6937 Text semigraphics == Further reading == World System Teletext Technical Specification, UK Department of Trade and Industry, 1985. Also retitled as World System Teletext and Data Broadcasting System Technical Specification, various revisions until 1989. CCIR 653 (now ITU-R BT.653) set of four standards for teletext systems
|
{"page_id": 3614305, "title": "World System Teletext"}
|
from the minerals finance the bloodiest conflict since the second world war; the war has lasted nearly 20 years and has recently flared up again. For the last 15 years, the Democratic Republic of the Congo has been a major source of natural resources for the mobile phone industry." The company Fairphone has worked to develop a mobile phone that does not contain conflict minerals. === Kosher phones === Due to concerns by the Orthodox Jewish rabbinate in Britain that texting by youths could waste time and lead to "immodest" communication, the rabbinate recommended that phones with text-messaging capability not be used by children; to address this, they gave their official approval to a brand of "Kosher" phones with no texting capabilities. Although these phones are intended to prevent immodesty, some vendors report good sales to adults who prefer the simplicity of the devices; other Orthodox Jews question the need for them. In Israel, similar phones to kosher phones with restricted features exist to observe the sabbath; under Orthodox Judaism, the use of any electrical device is generally prohibited during this time, other than to save lives, or reduce the risk of death or similar needs. Such phones are approved for use by essential workers, such as health, security, and public service workers. === Restrictions === Restrictions on the use of mobile phones are applied in a number of different contexts, often with the goal of health, safety, security or proper functioning of an establishment, or as a matter of etiquette. Such contexts include: ==== While driving ==== Mobile phone use while driving, including talking on the phone, texting, or operating other phone features, is common but controversial. It is widely considered dangerous due to distracted driving. Being distracted while operating a motor vehicle has been shown to increase the
|
{"page_id": 19644137, "title": "Mobile phone"}
|
things (e.g., objects, events, presented in a structured data set) into segments (or natural groupings) whose members share simi-lar characteristics. Unlike in classification, in clustering, the class labels are unknown. As the selected algorithm goes through the data set, identifying the commonalities of things based on their characteristics, the clusters are established. Because the clusters are de-termined using a heuristic-type algorithm and because different algorithms could end up with different sets of clusters for the same data set, before the results of clustering tech-niques are put to actual use, it could be necessary for an expert to interpret, and poten-tially modify, the suggested clusters. After reasonable clusters have been identified, they can be used to classify and interpret new data. Not surprisingly, clustering techniques include optimization. The goal of clustering is to create groups so that the members within each group have maximum similarity and the members across groups have minimum similarity. The most commonly used cluster-ing techniques include k-means (from statistics) and self-organizing maps (from machine learning), which is a unique neural network architecture developed by Kohonen (1982). Firms often effectively use their data mining systems to perform market segmenta-tion with cluster analysis. Cluster analysis is a means of identifying classes of items so that items in a cluster have more in common with each other than with items in other clusters. Cluster analysis can be used in segmenting customers and directing appropriate market-ing products to the segments at the right time in the right format at the right price. Cluster analysis is also used to identify natural groupings of events or objects so that a common set of characteristics of these groups can be identified to describe them. > ASSOCIATIONS Associations , or association rule learning in data mining , is a popular and well-researched technique for discovering
|
{"source": 1196, "title": "from dpo"}
|
order for the _invoice_ to be a _proper invoice_, the Contractor _shall_ have submitted correct EFT banking information in accordance with the applicable _solicitation_ provision, _contract clause_ (_e.g.,_52.232-33, Payment by _Electronic Funds Transfer_-_System for Award Management_, or 52.232-34, Payment by _Electronic Funds Transfer_-Other Than _System for Award Management_), or applicable agency procedures. (C) EFT banking information is not required if the Government waived the requirement to pay by EFT. (2)_Invoices_ will be handled in accordance with the Prompt Payment Act ( 31 U.S.C. 3903) and Office of Management and Budget (OMB) prompt payment regulations at 5 CFR Part 1315. (h)_Patent indemnity_. The Contractor _shall_ indemnify the Government and its officers, employees and agents against liability, including costs, for actual or alleged direct or contributory infringement of, or inducement to infringe, any _United States_ or foreign patent, trademark or copyright, arising out of the performance of this contract, provided the Contractor is reasonably notified of such _claims_ and proceedings. (i) Payment.- (1)_Items accepted_. Payment _shall_ be made for items accepted by the Government that have been delivered to the delivery destinations set forth in this contract. (2)_Prompt payment_. The Government will make payment in accordance with the Prompt Payment Act ( 31 U.S.C. 3903) and prompt payment regulations at 5 CFR Part 1315. (3)_\_Electronic Funds Transfer (EFT\_)_. If the Government makes payment by EFT, see 52.212-5(b) for the appropriate EFT clause. (4)_Discount_. In connection with any discount offered for early payment, time _shall_ be computed from the date of the _invoice_. For the purpose of computing the discount earned, payment _shall_ be considered to have been made on the date which appears on the payment check or the specified payment date if an _electronic funds transfer_ payment is made. (5)_Overpayments_. If the
|
{"source": 3644, "title": "from dpo"}
|
for examples. Suppose also that E[T] 0. Show that r is 1 or 0 according as log+IX1I has finite mean or not. 22.11. Suppose that X 0 , X 1 ,... are independent and each is uniformly distributed over (0,273-1. Show that with probability 1 the series E"e` X.z" has the unit circle as its natural boundary. 22.12. Prove (what is essentially Kolmogorov's zero-one law) that if A is independent of a Tr-system .9 and A E o-(9), then P(A) is either 0 or 1. 296 RANDOM VARIABLES AND EXPECTED VALUES 22.13. Suppose that d is a semiring containing OE (a) Show that if P(A n B) < bP(B) for all B E d, and if b <1 and A E a(d), then P(A) = 0. (b) Show that if P(A n B) _< P(A)P(B) for all B E d, and if A E a(d),
|
{"source": 5649, "title": "from dpo"}
|
has nine fixed bits; the first bit is 0 and the last eight bits form a "trailer field", the octet 0xbc. In the original scheme, only the first bit is fixed. The rationale for the trailer field is for compatibility with the Rabin-Williams IFSP-RW signature primitive in IEEE Std 1363-2000 [26 outside the module that computes the rest of the signature operation, so that mHash rather than the message M itself is input to the module. In other words, the security proof for RSASSA-PSS still holds even if an opponent can control the value of mHash. This is convenient if the module has limited I/O bandwidth, e.g., a smart card. Note that previous versions of PSS did not have this property. Of course, it may be desirable for other security reasons to have the module process the full message. For instance, the module may need to "see" what it is signing if it does not trust the component that computes the hash value. 4. Typical salt lengths in octets are hLen (the length of the output of the hash function Hash) and 0. In both cases the security of RSASSA-PSS can be closely related to the hardness of inverting RSAVP1. Bellare and Rogaway give a tight lower bound for the
|
{"source": 6666, "title": "from dpo"}
|
Elisabeth Anne Lloyd (born September 3, 1956) is an American philosopher of science specialising in the philosophy of biology. She is currently Distinguished Professor of History and Philosophy of Science and Medicine - as well as Adjunct Professor of biology - at Indiana University, Bloomington, affiliated faculty scholar at the Kinsey Institute and Adjunct Faculty at the Center for the Integrative Study of Animal Behavior. == Education and career == Lloyd was born in Morristown, New Jersey, and earned her BA in science and political theory from University of Colorado, Boulder in 1980, summa cum laude. Lloyd studied under Bas van Fraassen at Princeton University for a PhD in philosophy 1980 – 1984. While a student at Princeton, she spent a year (1983) studying with Richard C. Lewontin at Harvard's Museum of Comparative Zoology. She worked as an assistant professor in the Department of Philosophy at University of California, San Diego, 1985–88; and then was assistant professor, then associate professor, then full professor in the Department of Philosophy at the University of California, Berkeley from 1988 to 1999, before moving to Indiana University. In 2022, she was elected a Fellow of the American Academy of Arts & Sciences. == Philosophical work == Her 2005 book, The Case of the Female Orgasm, was widely discussed in the scholarly and popular press, including Isis, Nature and The New York Times. The book criticizes what it portrays as anti-scientific biases infecting the many proposed adaptive explanations of female orgasm. Lloyd goes on to argue that the available evidence, such as from sexology studies, is far more supportive of a neutral "byproduct" explanation put forward by Donald Symons, under which female orgasm is the result of orgasm developing as a species trait due to its critical role in males for procreation (akin to explanations
|
{"page_id": 8539701, "title": "Elisabeth Lloyd"}
|
A Matter of Faith is a 2014 American Christian drama film directed by Rich Christiano and starring Harry Anderson (in his final role), Jordan Trovillion, Jay Pickett, and Clarence Gilyard. The film was shot in the summer of 2013 in Michigan, and was released into theaters on October 17, 2014, by Five & Two Pictures. The fictional story follows a Christian student (played by Trovillion) and her father (Pickett) who are challenged by a biology professor (Anderson) who teaches evolution. == Plot == In 2013 Michigan, Rachel Whitaker, who has been raised as an evangelical Christian, celebrates a going-away party with her friends and family, as she is all set to go to college. There, her atheist biology professor, Dr. Kaman, teaches the theory of evolution, rather than the biblical concept of creationism. She begins to question her own faith. Rachel's father Stephen is concerned by the change in her personality and beliefs, and confronts the professor, finding himself challenged to a debate on religion much to the embarrassment of his daughter. While preparing, Stephen is approached by Evan, a student who tells him to go see Portland, a biology professor who was fired years before at Kaman's behest for teaching creationism and for arguing to his students that the theory of evolution was untrue. Portland initially refuses efforts to "get him back in the game" and tells Stephen to leave him alone. Rachel is in the campus library studying evolution, when another student approaches and tells her that Stephen is an idiot for attempting to debunk the theory of evolution. Evan shows up, insults the student, and says that evolution is not possible because the student's parents and grandparents do not look like apes. Evan says that all humans only "evolved" from other humans, and that they all come
|
{"page_id": 45002574, "title": "A Matter of Faith"}
|
the receiver), and transactional receives of messages from a remote queue. ==== WF ==== Windows Workflow Foundation is a Microsoft technology for defining, executing and managing workflows. This technology is part of .NET Framework 3.0 and therefore targeted primarily for the Windows Vista operating system. The Windows Workflow Foundation runtime components provide common facilities for running and managing the workflows and can be hosted in any CLR application domain. Workflows comprise 'activities'. Developers can write their own domain-specific activities and then use them in workflows. Windows Workflow Foundation also provides a set of general-purpose 'activities' that cover several control flow constructs. It also includes a visual workflow designer. The workflow designer can be used within Visual Studio 2005, including integration with the Visual Studio project system and debugger. ==== Windows CardSpace ==== Windows CardSpace (codenamed InfoCard), a part of .NET Framework 3.0, is an implementation of Identity Metasystem, which centralizes acquiring, usage and management of digital identity. A digital identity is represented as logical Security Tokens, that each consist of one or more Claims, which provide information about different aspects of the identity, such as name, address etc. Any identity system centers around three entities — the User who is to be identified, an Identity Provider who provides identifying information regarding the User, and Relying Party who uses the identity to authenticate the user. An Identity Provider may be a service like Active Directory, or even the user who provides an authentication password, or biometric authentication data. A Relying Party issues a request to an application for an identity, by means of a Policy that states what Claims it needs and what will be the physical representation of the security token. The application then passes on the request to Windows CardSpace, which then contacts a suitable Identity Provider and retrieves
|
{"page_id": 9705828, "title": "Technical features new to Windows Vista"}
|
(receiver or sender). When a buffered channel has been filled to its capacity (sending is "capacity" number of outputs ahead of receiving inputs), the default behavior of the channel is to become synchronous, and the sender will block on the next sending. Observe that there is no common message buffer shared between channels. Increasing complexity, as compared to using a channel as unidirectional and point to point, it is possible to share channels between multiple receivers or multiple senders, and to merge independent data-streams into a single shared channel. From this follows that a single channel may also be used for bidirectional communication. === Control flow constructs === There are three control flow constructs in PROMELA. They are the case selection, the repetition and the unconditional jump. ==== Case selection ==== The simplest construct is the selection structure. Using the relative values of two variables a and b, for example, one can write: The selection structure contains two execution sequences, each preceded by a double colon. One sequence from the list will be executed. A sequence can be selected only if its first statement is executable. The first statement of a control sequence is called a guard. In the example above, the guards are mutually exclusive, but they need not be. If more than one guard is executable, one of the corresponding sequences is selected non-deterministically. If all guards are unexecutable, the process will block until one of them can be selected. (Opposite, the occam programming language would stop or not be able to proceed on no executable guards.) The consequence of the non-deterministic choice is that, in the example above, if A is true, both choices may be taken. In "traditional" programming, one would understand an if – if – else structure sequentially. Here, the if – double colon
|
{"page_id": 9733137, "title": "Promela"}
|
1751 until 1772, there was a flurry of interest in turnpike trusts and a further 390 were established. By 1825, over 1,000 trusts controlled 25,000 miles (40,000 km) of road in England and Wales. The rise of railway transport largely halted the improving schemes of the turnpike trusts. Unable to earn sufficient revenue from tolls alone the trusts took to requiring taxes from the local parishes. The system was never properly reformed but from the 1870s Parliament stopped renewing the acts and roads began to revert to local authorities, the last trust vanishing in 1895. The Local Government Act 1888 created county councils and gave them responsibility for maintaining the major roads. There are still a small number of toll bridges left including Swinford toll bridge near Oxford. Most UK roads today are maintained from general taxation, some of which is raised from motoring taxes including fuel duty and vehicle excise duty. Today, there are few tolls on roads in the United Kingdom - mainly toll bridges and tunnels. Until recently there were only two toll roads to which there is a public right of way (Rye Road in Stanstead Abbotts and College Road in Dulwich) together with another five or so private toll-roads. The M6 Toll motorway to the north of Birmingham levies a usage charge. == North and South America == === Bolivia === In November 2006, the Ministry of Public Works, Services and Housing of Bolivia created Vías Bolivia, a public entity with the purpose of pricing, managing and maintaining the toll roads across the country. As of 2021, there are currently 141 operating toll roads in Bolivia as well as 13 weigh stations for commercial vehicles and trucks. === Brazil === In Brazil, toll roads are a recent institution, and were adopted mostly in non-federal highways.
|
{"page_id": 7142213, "title": "Geography of toll roads"}
|
inertness after final cure iii) their good barrier properties and the possibility to scale up manufacturing using industrial reaction injection molding. Both stiff and rubbery versions of the OSTE+ polymers have been demonstrated, showing their potential in microsystems for valving and pumping similar to PDMS components, but with the benefit of withstanding higher pressures. The commercial version of the OSTE+ polymer, OSTEMER 322, has been shown to be compatible with many cell lines. == Fabrication == === OSTE polymers === The OSTE resins can be cast and cured in a structured silicone molds or coated permanent photoresist. OSTE polymers have also shown excellent photostructuring capability using photomasks, enabling for example powerful and flexible capillary pumps. === OSTE+ polymers === The OSTE+ resins are first UV-cured in the same way as the OSTE-polymers but are later thermally cured to stiffen and bond to a substrate. == Applications == === Lab-on-a-chip === OSTE+ allows for soft lithography microstructuring, strong biocompatible dry bonding to almost any substrate during Lab-on-a-chip (LoC) manufacturing, while simultaneously mimicking the mechanical properties found in thermoplastic polymers, hence allowing for true prototyping of commercial LoC. The commonly used materials for microfluidics suffer from unwieldy steps and often ineffective bonding processes, especially when packaging biofunctionalized surfaces, which makes LoC assembly difficult and costly OSTE+ polymer which effectively bonds to nine dissimilar types of substrates, requires no surface treatment prior to the bonding at room temperature, features high Tg, and achieves good bonding strength to at least 100 °C. Moreover, it has been demonstrated that excellent results can be obtained using photolithography on OSTE polymer, opening wider potential applications. === Bio packaging === Biosensors are used for a range of biological measurements. OSTE packaging for biosensing has been demonstrated for QCM, and photonic ring resonator sensors. === Wafer bonding === Adhesive
|
{"page_id": 42043791, "title": "Off-stoichiometry thiol-ene polymer"}
|
current awareness can determine what one pays attention to next and how one interprets the information perceived. === Mental models === Accurate mental models are one of the prerequisites for achieving SA. A mental model can be described as a set of well-defined, highly organized yet dynamic knowledge structures developed over time from experience. The volume of available data inherent in complex operational environments can overwhelm the capability of novice decision makers to attend, process, and integrate this information efficiently, resulting in information overload and negatively impacting their SA. In contrast, experienced decision makers assess and interpret the current situation (Level 1 and 2 SA) and select an appropriate action based on conceptual patterns stored in their long-term memory as "mental models". Cues in the environment activate these mental models, which in turn guide their decision making process. === Sensemaking === Klein, Moon, and Hoffman distinguish between situation awareness and sensemaking as follows: ...situation awareness is about the knowledge state that's achieved—either knowledge of current data elements, or inferences drawn from these data, or predictions that can be made using these inferences. In contrast, sensemaking is about the process of achieving these kinds of outcomes, the strategies, and the barriers encountered. In brief, sensemaking is viewed more as "a motivated, continuous effort to understand connections (which can be among people, places, and events) in order to anticipate their trajectories and act effectively", rather than the state of knowledge underlying situation awareness. Endsley points out that as an effortful process, sensemaking is actually considering a subset of the processes used to maintain situation awareness. In the vast majority of the cases, SA is instantaneous and effortless, proceeding from pattern recognition of key factors in the environment—"The speed of operations in activities such as sports, driving, flying and air traffic control practically
|
{"page_id": 3026543, "title": "Situation awareness"}
|
End Games line (as well as "Fifth Edition"). In order to distance the new edition from the less commercially and critically successful aspects of the West End Game line, and to discourage new players from wasting time and money on what he considered to be inferior products, Varney additionally used the designer's notes to declare many West End products, including the "Fifth Edition" and everything published for the 2nd Edition after The People's Glorious Revolutionary Adventure, to be "unproducts" — no longer part of the game's continuity, and not recommended for use with the new edition. An upshot of this is that much of the poorly received metaplot established late in the West End Games line, from the Secret Society Wars to the Reboot and beyond, was disposed of. Varney has explained that this is due mainly to his distaste for the direction the metaplot took the game line in, a distaste he asserts is shared by the game's fan community. He has also stated that he personally has little affection for the "Zap" style, and therefore may have given it short shrift in the main rulebook, although later supplements for Paranoia XP did provide more support for Zap play. Long-time Paranoia artist Jim Holloway, called "the master of the fun-filled illustration", drew the cover art and much of the internal art for the game until 1986. His art for the series generally portrays comedic scenarios that capture the essential "deathtrap" feeling of Alpha Complex. Paranoia XP marked his return to the line as well; he designed every cover of the XP edition, and many books contain both his classic and new Paranoia art. While Paranoia XP kept Communists as the big bad scapegoat in spite of the Cold War being long over, the updated edition integrates several 21st-century themes
|
{"page_id": 181203, "title": "Paranoia (role-playing game)"}
|
increase dissatisfaction with the decision and regret. Individual personality plays a significant role in how individuals deal with large choice set sizes. Psychologists have developed a personality test that determines where an individual lies on the satisfier spectrum. A maximizer is one who always seeks the very best option from a choice set, and may anguish after the choice is made as to whether it was indeed the best. Satisfiers may set high standards but are content with a good choice, and place less priority on making the best choice. Due to this different approach to decision-making, maximizers are more likely to avoid making a choice when the choice set size is large, probably to avoid the anguish associated with not knowing whether their choice was optimal. One study looked at whether the differences in choice satisfaction between the two are partially due to a difference in willingness to commit to one's choices. It found that maximizers reported a stronger preference for retaining the ability to revise choices. Additionally, after making a choice to buy a poster, satisfiers offered higher ratings of their chosen poster and lower ratings of the rejected alternatives. Maximizers, however, were less likely to change their impressions of the posters after making their choice which left them less satisfied with their decision. Maximizers are less happy in life, perhaps due to their obsession with making optimal choices in a society where people are frequently confronted with choice. One study found that maximizers reported significantly less life satisfaction, happiness, optimism, and self-esteem, and significantly more regret and depression, than did satisfiers. In regards to buying products, maximizers were less satisfied with consumer decisions and were more regretful. They were also more likely to engage in social comparison, where they analyze their relative social standing among their peers,
|
{"page_id": 690278, "title": "Choice"}
|
responding to pain are activated while experiencing pain, observing someone else experience pain, and observing someone else who would experience pain at a later point. The insula, which is activated after a person experiences disgust, is also activated when observing faces expressing disgust, and the intensity of the interaction is directly proportional to the level of disgust on the observed face. Finally, the inability to experience emotions leads to impairment of the ability to recognize the same emotions in others. Patients with brain injuries preventing them from experiencing disgust couldn't recognize disgust in the faces of others. == References == == Further reading == Joel Salinas (2018). Mirror Touch: A Memoir of Synesthesia and the Secret Life of the Brain. HarperOne. ISBN 978-0062458612.
|
{"page_id": 40629843, "title": "Mirror-touch synesthesia"}
|
product is fetched with its price and Buy link, and the end result is sorted from lowest price to highest price. Estimation of reserves by Tatyana Babushkina forecast resources Bitcoin Spread Anlysis by Scott Scrase Compares the difference between the buy and sell prices of Bitcoin Crypto watcher by Arian Dinyaryan The user enters and saves the desired cryptos and the program creates a current price table of the Cryptocurrencies. and user can modify the program with -m flag GIF ASCII art by Kevin Menon This project converts a GIF image to an ASCII animation on the standard output file Quick PV energy estimator by Alberto Nicolotti Ever wondered how much energy would you have save dwith solar panels?? Tic Tac Toe game by Roberto Perez A Python program that allows two players to play a game of Tic-Tac-Toe. Here's a summary of how it works: The program initializes an empty 3x3 Tic-Tac-Toe board and sets the initial turn to 'X'. It displays a welcome message and instructions for the game, explaining the rules and how to make moves. It prompts the players to enter their names. The game then enters a loop where players take turns making moves. The print_board function is used to display the current state of the board. The get_move function is used to get the player's move, ensuring that it's a valid move (within the board boundaries and not already occupied). The player's move is then recorded on the board. After each move, the program checks for a winner using the check_winner function, which examines rows, columns, and diagonals for three matching marks in a row (either 'X' or 'O'). If a winner is found, the program displays the final board and announces the winner. If the board is full and there is no winner,
|
{"source": 1749, "title": "from dpo"}
|
over non-convex cones - provided we have an efficient projection oracle PC. So have we really made progress? If projecting onto the non-convex set turns out to be an NP-hard problem, our overall algorithm is not efficient because it relies on a projection in every iteration. Hence it is important to understand the complexity of projecting onto our constraint sets of interest. Recall that we started with the following type of optimization problem (again instantiated for the least squares loss): argmaxly - X6||. (2.1) > OeC PGD allows us to solve this problem via a sequence of projections. If we denote our current iterate (before the projection) with 0i", computing PC(6 2 ") means solving a problem of the form: arg max||Qi" - 0 . (2.2) oec Note the main difference between Equations 2.1 and 2.2: we have removed the data matrix X from the optimization problem. While this certainly simplifies the situation, we are still left with a non-convex problem because C is a non-convex set. 26 For some constraint sets, the projection problem (2.2) is indeed much easier. For instance, we can project onto the set of sparse vectors with a simple thresholding operation in linear time (in contrast, recall that solving sparse least squares is NP-hard). Similarly, we can project onto the set of low-rank matrices via a singular value decomposition (SVD). However, for more complex constraint sets, the computational hardness often associated with non-convex sets quickly strikes back. A concrete example is graph sparsity [118, 122]. In addition to the "vanilla" sparsity constraint, we now also require that our estimate obeys a graph connectivity constraint. For a given graph defined on our features, such a constraint enforces that the selected features form a connected component in the underlying graph. A concrete example of such a graph
|
{"source": 4169, "title": "from dpo"}
|
{ my $word = $key_words[$word_index]; my @keyword_in_ints; foreach my $i (0..3) { push @keyword_in_ints, int( $word->get_slice([$i*8..($i+1)*8]) )}if ($word_index % 4 == 0) { print "\n"; }print "word $word_index: @keyword_in_ints\n"; push @key_schedule, "@keyword_in_ints"; }my $num_rounds; if ($keysize == 128) { $num_rounds = 10; } if ($keysize == 192) { $num_rounds = 12; } if ($keysize == 256) { $num_rounds = 14; } my @round_keys = (undef) x ($num_rounds+1); foreach my $i (0..$num_rounds) { $round_keys[$i] = ($key_words[$i*4] + $key_words[$i*4+1] + $key_words[$i*4+2] + $key_words[$i*4+3])->get_bitvector_in_hex(); }print("\n\nRound keys in hex (first key for input block):\n\n"); foreach my $round_key (@round_keys) { print "$round_key\n"; } 53 Computer and Network Security by Avi Kak Lecture 8 ## This is the g() function you see in Figure 4 of Lecture 8. sub gee { my ($keyword, $round_constant, $byte_sub_table) = @_; my $rotated_word = $keyword->deep_copy(); $rotated_word = $rotated_word new(size => 0); foreach my $i (0..3) { $newword += Algorithm::BitVector->new(intVal => $byte_sub_table->[int($rotated_word->get_slice([8*$i..8*($i+1)]))], size => 8); }$newword->set_slice([0..8], $newword->get_slice([0..8]) ^ $round_constant); $round_constant = $round_constant->gf_multiply_modular(Algorithm::BitVector->new(intVal => 0x02), $AES_modulus, 8); return $newword, $round_constant; }sub gen_key_schedule_128 { my $key_bv = shift; my $byte_sub_table = gen_subbytes_table(); # We need 44 keywords in the key schedule for 128 bit AES. Each keyword is 32-bits # wide. The 128-bit AES uses the first four keywords to xor the input block with. # Subsequently, each of the 10 rounds uses 4 keywords from the key schedule. We will # store all 44 keywords in the list key_words in this function. my @key_words = (undef) x 44; my $round_constant = Algorithm::BitVector->new(intVal => 0x01, size => 8); ($key_words,$key_words,$key_words,$key_words) =map $key_bv->get_slice([$_*32..($_+1)*32]), 0..3; foreach my $i (4..43) { if ($i%4 == 0) { my $kwd; ($kwd, $round_constant) = gee($key_words[$i-1], $round_constant, $byte_sub_table); $key_words[$i] = $key_words[$i-4] ^ $kwd; } else { $key_words[$i] = $key_words[$i-4] ^ $key_words[$i-1]; }}return @key_words; }sub gen_key_schedule_192 {
|
{"source": 5963, "title": "from dpo"}
|
parallels with oogenesis and spermatogenesis in mammals and other chordates. Many of his papers in this area were concerned with genetic recombination, with the rearrangement of genes on paired chromosomes that occurs during reproduction, a phenomenon known as crossing over. Perkins developed techniques for mapping genes and centromeres on chromosomes based on the occasional errors, such as duplications and translocations, that occur in recombination. He trained many scientists to work with Neurospora crassa, and wrote several papers on working with, caring for, and maintaining Neurospora under laboratory conditions. He was instrumental in establishing and supporting the Fungal Genetics Stock Center. In 1968, he began a project to obtain wild type Neurospora at tropical and subtropical sites throughout the world. Perkins and his associates surveyed and collected more than 5,000 specimens of Neurospora and other fungi growing in the wild. Later, he initiated work on what would eventually become a worldwide resource for geneticists, The Neurospora Compendium: Chromosomal Loci. Published most recently in 2001, it serves as a reference for mutations and their loci in the Neurospora genome. == References == Perkins, D; Davis, R (Dec 2000), "Evidence for Safety of Neurospora Species for Academic and Commercial Uses", Applied and Environmental Microbiology, vol. 66, no. 12, pp. 5107–9, Bibcode:2000ApEnM..66.5107P, doi:10.1128/aem.66.12.5107-5109.2000, PMC 92429, PMID 11097875 The Perkins Lab — Neurospora genetics and biology Archived 2012-10-09 at the Wayback Machine David D. Perkins, Alan Radford, Matthew S. Sachs. The Neurospora Compendium: Chromosomal Loci. Academic Press: 1st edition (January 15, 2001). ISBN 0-12-550751-8. Rowland H. Davis: Neurospora. Contributions of a Model Organism. Oxford University Press, Oxford, 2000. ISBN 0-19-512236-4. == External links == David Perkins (geneticist) — Biographical Memoirs of the National Academy of Sciences
|
{"page_id": 8851297, "title": "David Perkins (geneticist)"}
|
LS-coupling Magnetic and Electric dipole transitions. Term symbols in LS-Coupling describe the total orbital angular momentum ( L {\displaystyle L} ), total spin ( S {\displaystyle S} ), and total angular momentum ( J = S + L {\displaystyle J=S+L} ). π {\displaystyle \pi } is the parity of an electronic configuration. === Example: Europium (III) === For example let us apply these selection rules to triply ionized Europium (Eu3+). Eu3+ has an electronic configuration of [Xe]4f6. The ground term symbol for this configuration (according to Hund's Rules) is 7F0. Applying the above selection rules, transitions from this state to 5D2, 5D4, and 5D6 are allowed, but not to 5D1, 5D0, or 5L7 (violating the restrictions on J {\displaystyle J} ). == History == The theory was introduced independently in 1962 by Brian R. Judd of the University of California, Berkeley, and PhD candidate George S. Ofelt at Johns Hopkins University. Their work was published in Physical Review and the Journal of Chemical Physics, respectively. Judd and Ofelt did not meet until 2003 at a workshop in Lądek-Zdrój, Poland. Judd-Ofelt Theory has become a standard tool in the field of lanthanide spectroscopy, providing insights into the optical properties of rare earth-doped materials and aiding in the design of materials for color display systems, fluorescent lamps, and lasers. Their work was cited approximately 2000 times between 1962 and 2004. Brian M. Walsh of NASA Langley places Judd and Ofelt's theory at the "forefront" of a 1960s revolution in spectroscopic research on rare-earth ions. == Analysis software == Judd–Ofelt intensity parameters can be calculated from absorption spectrum of any lanthanide by the RELIC analysis software. The intensity parameters and derived quantities (oscillator strengths, radiative transition probabilities, luminescence branching ratios, excited state radiative lifetimes, and estimates of quantum efficiencies) of Eu3+ doped compounds,
|
{"page_id": 48590147, "title": "Judd–Ofelt theory"}
|
Vascularity, in bodybuilding, is the condition of having many highly visible, prominent, and often extensively-ramified superficial veins. The skin appears "thin"—sometimes virtually transparent—due to an extreme reduction of subcutaneous fat, allowing for maximum muscle definition. Vascularity is enhanced by extremely low body fat (usually below 10%) and low retained water, as well as the muscle engorgement ("pump") and venous distension accentuated by the vigorous flexing and potentially hazardous Valsalva effect which characterize competitive posing. Genetics and androgenic hormones will affect vascularity, as will ambient temperature. Additionally, although some bodybuilders develop arterial hypertension from performance-enhancing substances and practices, "high" venous pressure—being an order of magnitude lower than that of arteries— neither causes nor is caused by vascularity. Some bodybuilders use topical vasodilators to increase blood flow to the skin as well. Although historically controversial, vascularity is a highly-sought-after aesthetic for many male bodybuilders, but less so for female bodybuilders, where the target aesthetic is relatively more towards aesthetic symmetry than extreme development. Bodybuilders or athletes sometimes dehydrate themselves a few days before a competition or show to achieve this so-called "ripped," vascular look. Self-dehydration is not recommended by medical professionals, as the negative and sometimes-fatal effects of the resultant water-electrolyte imbalances are well documented. == References ==
|
{"page_id": 2855272, "title": "Vascularity"}
|
Paramount among his intellectual interests were elements of mythology, mathematics, theology, integrating these through literature, sometimes playfully, sometimes with great seriousness. Borges composed poetry throughout his life. As his eyesight waned (it came and went, with a struggle between advancing age and advances in eye surgery), he increasingly focused on writing poetry, since he could memorize an entire work in progress. His poems embrace the same wide range of interests as his fiction, along with issues that emerge in his critical works and translations, and from more personal musings. For example, his interest in idealism runs through his work, reflected in the fictional world of Tlön in "Tlön, Uqbar, Orbis Tertius" and in his essay "A New Refutation of Time". === Translations by Borges === Borges was a notable translator. He translated works of literature in English, French, German, Old English, and Old Norse into Spanish. His first publication, for a Buenos Aires newspaper, was a translation of Oscar Wilde's story "The Happy Prince" into Spanish when he was ten. At the end of his life he produced a Spanish-language version of a part of Snorri Sturluson's Prose Edda. He also translated (while simultaneously subtly transforming) the works of, among others, Ambrose Bierce, William Faulkner, André Gide, Hermann Hesse, Franz Kafka, Rudyard Kipling, Edgar Allan Poe, Walt Whitman, and Virginia Woolf. Borges wrote and lectured extensively on the art of translation, holding that a translation may improve upon the original, may even be unfaithful to it, and that alternative and potentially contradictory renderings of the same work can be equally valid. Borges employed the devices of literary forgery and the review of an imaginary work, both forms of modern pseudo-epigrapha. === Discography === Borges’ recorded work includes readings of his poems, a collaboration with Argentine composer Astor Piazzolla, and a
|
{"page_id": 15781, "title": "Jorge Luis Borges"}
|
The eclipse of Thales was a solar eclipse in the early 6th century BC that was, according to the ancient Greek historian Herodotus (writing about 150 years later), accurately predicted by the Greek philosopher Thales of Miletus. If Herodotus' account is accurate, this eclipse is the earliest recorded as being known in advance of its occurrence. The only solar eclipse matching the presumed place, era, and conditions of visibility necessary to explain the historical event is the eclipse of 28 May 585 BC. How exactly Thales could have predicted a solar eclipse remains uncertain, and modern scholars are skeptical of the story's veracity. Some have argued for different dates, or for other interpretations of Herodotus's account. According to Herodotus, the change of day into night was interpreted as an omen, and interrupted a battle (sometimes called the "Battle of the Eclipse") in a long-standing war between the Medes and the Lydians in Anatolia (present-day Turkey). American writer Isaac Asimov described this battle as the earliest historical event whose date is known with precision to the day, and called the prediction "the birth of science". == Ancient accounts == Herodotus writes that in the sixth year of the war, the Lydians and the Medes were engaged in an indecisive battle when suddenly day turned into night, leading to both parties halting the fighting and negotiating a peace agreement. Herodotus also mentions that the loss of daylight had been predicted by Thales of Miletus. He does not, however, mention the location of the battle. Afterwards, on the refusal of Alyattes to give up his suppliants when Cyaxares sent to demand them of him, war broke out between the Lydians and the Medes, and continued for five years, with various success. In the course of it the Medes gained many victories over the
|
{"page_id": 6814377, "title": "Eclipse of Thales"}
|
"went out on a limb to defend his people". Slayton wrote to Winick, stating that the spacecraft had carried covers, but NASA could not confirm these particular envelopes had been taken; he did not tell Winick unauthorized covers had been flown. He sent a copy of his response to the general counsel's office at NASA Headquarters in Washington, which took no action. Slayton did not inform Administrator Fletcher, Deputy Administrator George M. Low or his own superior, Christopher C. Kraft of the postage stamp incident or of the disciplinary action he had taken. In early June 1972, Low heard from a member of his staff of the possibility covers flown on Apollo 15 might have been sold in Europe. He asked Associate Administrator Dale D. Myers to enquire through NASA management channels for information. Low kept Fletcher informed of the situation as it developed. Myers made an interim report to Low on the 16th. Before he could make his final report on the 26th, the story broke with an article in The Washington Sunday Star on June 18. Kraft interviewed Scott on the 23rd. Low ordered a full investigation by NASA's Inspections Division on June 29. According to Low in his personal notes, during the investigation, Scott, who had to that point maintained that the astronauts had never intended to profit from the Sieger covers, disclosed the information about the German bank accounts. Once the facts had been developed, Low consulted with Fletcher, Kraft, Slayton and others regarding whether to expel the three men from the Astronaut Corps and return them to the Air Force, to reprimand them and retain them within NASA outside the corps, or to reprimand them but allow them to remain astronauts. Low accepted Kraft's recommendation to reprimand the astronauts, and to state that their actions
|
{"page_id": 5319068, "title": "Apollo 15 postal covers incident"}
|
used as a form of risk management, to explicitly identify uncertain task/time relationships, i.e., work that may easily extend past its deadline. Time constraints are often a primary driver in planning and should not be changed without considering project or sub-project critical paths. That is, it's usually important to meet deadlines. Risk factors for missed deadlines can include complications upstream of the project, planning errors within the project, team-related issues, or faulty execution of the plan. Upstream issues might include changes in project mission or backing/support from management. A common planning error is inadequate task breakdown, which can lead to underestimation of the time required to perform the work. Team-related issues can include trouble with inter-team communication; lack of experience or required cross-functionality; lack of commitment/drive/motivation (i.e. poor team building and management). To stay on deadline, the following actions against the triple constraints are commonly evaluated: Reduce scope: drop requirements of lower impact (the ones that will not be directly missed by the user) Time is the fixed constraint here Increase cost: e.g., add overtime or resources === Adoption in software development === Many successful software development projects use timeboxing, especially smaller ones. Adopting timeboxing more than tripled developer productivity at DuPont in the '80s. In some cases, applications were completely delivered within the time estimated to complete just a specification. However, Steve McConnell argues that not every product is suitable and that timeboxing should only be used after the customer agrees to cut features, not quality. There is little evidence for strong adoption amongst the largest class of projects. Timeboxing has been adopted by some notable software development methodologies: Dynamic systems development method (DSDM). In lean software development, pull scheduling with Kanban provides short term time management. When developing a large and complex system, where long term planning is
|
{"page_id": 1673722, "title": "Timeboxing"}
|
Alertness is a state of active attention characterized by high sensory awareness. Someone who is alert is vigilant and promptly meets danger or emergency, or is quick to perceive and act. Alertness is a psychological and physiological state. Lack of alertness is a symptom of a number of conditions, including narcolepsy, attention deficit hyperactivity disorder, chronic fatigue syndrome, depression, Addison's disease, and sleep deprivation. Pronounced lack of alertness is an altered level of consciousness. States with low levels of alertness include drowsiness. The word is formed from "alert", which comes from the Italian all'erta (on the watch, literally: on the height; 1618). Wakefulness refers mainly to differences between the sleep and waking states; vigilance refers to sustained alertness and concentration. Both terms are sometimes used synonymously with alertness. == Importance and difficulty == People who have to be alert during their jobs, such as air traffic controllers or pilots, often face challenges maintaining their alertness. Research shows that for people "...engaged in attention-intensive and monotonous tasks, retaining a constant level of alertness is rare if not impossible." If people employed in safety-related or transportation jobs have lapses in alertness, this "may lead to severe consequences in occupations ranging from air traffic control to monitoring of nuclear power plants." == Neurobiological pathways == Neurotransmitters that can initiate, promote, or enhance wakefulness or alertness include serotonin, (nor)epinephrine, dopamine (e.g. blockade of dopamine reuptake), glutamate, histamine, and acetylcholine. Neuromodulators that can do so include the neuropeptide orexin. Similarly inhibition or reduction of mechanisms causing sleepiness, or drowsiness such as certain cytokines and adenosine (as with caffeine) may also increase perceived wakefulness and thus alertness. Wakefulness depends on the coordinated effort of multiple brain areas. These are affected by neurotransmitters and other factors. Many Neurotransmitters are in effect to experience wakefulness to include GABA,
|
{"page_id": 8807237, "title": "Alertness"}
|
The Kerr metric or Kerr geometry describes the geometry of empty spacetime around a rotating uncharged axially symmetric black hole with a quasispherical event horizon. The Kerr metric is an exact solution of the Einstein field equations of general relativity; these equations are highly non-linear, which makes exact solutions very difficult to find. == Overview == The Kerr metric is a generalization to a rotating body of the Schwarzschild metric, discovered by Karl Schwarzschild in 1915, which described the geometry of spacetime around an uncharged, spherically symmetric, and non-rotating body. The corresponding solution for a charged, spherical, non-rotating body, the Reissner–Nordström metric, was discovered soon afterwards (1916–1918). However, the exact solution for an uncharged, rotating black hole, the Kerr metric, remained unsolved until 1963, when it was discovered by Roy Kerr.: 69–81 The natural extension to a charged, rotating black hole, the Kerr–Newman metric, was discovered shortly thereafter in 1965. These four related solutions may be summarized by the following table, where Q represents the body's electric charge and J represents its spin angular momentum: According to the Kerr metric, a rotating body should exhibit frame-dragging (also known as Lense–Thirring precession), a distinctive prediction of general relativity. The first measurement of this frame dragging effect was done in 2011 by the Gravity Probe B experiment. Roughly speaking, this effect predicts that objects coming close to a rotating mass will be entrained to participate in its rotation, not because of any applied force or torque that can be felt, but rather because of the swirling curvature of spacetime itself associated with rotating bodies. In the case of a rotating black hole, at close enough distances, all objects – even light – must rotate with the black hole; the region where this holds is called the ergosphere. The light from distant sources
|
{"page_id": 456715, "title": "Kerr metric"}
|
y=y_{1}+s(y_{2}-y_{1}).} Let the circle be defined by its center at p2=(xc, yc), with radius r = | p 1 − p 2 | {\displaystyle r=\left|p_{1}-p_{2}\right|} . Then the circle can be expressed as: ( x − x c ) 2 + ( y − y c ) 2 = r 2 . {\displaystyle (x-x_{c})^{2}+(y-y_{c})^{2}=r^{2}.} In order to determine the points of intersection of the line with the circle, we substitute the x and y components of the equations for the line into the equation for the circle, giving: ( x 1 + s ( x 2 − x 1 ) − x c ) 2 + ( y 1 + s ( y 2 − y 1 ) − y c ) 2 = r 2 . {\displaystyle (x_{1}+s(x_{2}-x_{1})-x_{c})^{2}+(y_{1}+s(y_{2}-y_{1})-y_{c})^{2}=r^{2}.} Or, simplified: a s 2 + b s + c = 0 {\displaystyle as^{2}+bs+c=0} where: a = ( x 2 − x 1 ) 2 + ( y 2 − y 1 ) 2 {\displaystyle a=(x_{2}-x_{1})^{2}+(y_{2}-y_{1})^{2}} b = 2 ( x 2 − x 1 ) ( x 1 − x c ) + 2 ( y 2 − y 1 ) ( y 1 − y c ) {\displaystyle b=2(x_{2}-x_{1})(x_{1}-x_{c})+2(y_{2}-y_{1})(y_{1}-y_{c})} c = x c 2 + y c 2 + x 1 2 + y 1 2 − 2 ( x c x 1 + y c y 1 ) − r 2 . {\displaystyle c=x_{c}^{2}+y_{c}^{2}+x_{1}^{2}+y_{1}^{2}-2(x_{c}x_{1}+y_{c}y_{1})-r^{2}.} Then we simply solve the quadratic equation: − b ± b 2 − 4 a c 2 a . {\displaystyle {\frac {-b\pm {\sqrt {b^{2}-4ac}}}{2a}}.} If the discriminant b2 − 4ac < 0, there are no solutions. The circle does not intersect or touch the line. If the discriminant is equal to 0, then there is a single solution, where the line is tangent to
|
{"page_id": 232844, "title": "Huzita–Hatori axioms"}
|
"weight' to be clause-final where possible. The heaviest 'weight' is associated with the most or the newest information, or with the longest utterance. When the pronominal is stressed it can be ordered postnominally: # 3 You looked up THEM?! Those were the wrong ones to look up! In this way, the ordering of particles with respect to pronominal objects is related to Heavy NP Shift, which is known to be a stylistic rule. The syntactic generalization that the particle may appear on either side of the object holds true, where the effect of stylistic or discourse conditions is controlled for. The degree of idiomaticization of a verb-particle -38-combinatioi. influences the separability of the verb and the particle. Highly idiomaticized combinations are less likely to be separable from the verb: 4a may be interpreted in the literal or the figurative se.nse, but 4b may only be interpreted in the literal sense. # 4 a. Don't throw up your lunch. b. *Don't throw your lunch up. The data above show that there is a class of particles which may occur on either side of a direct object noun phrase, and which preserve a somewhat literal sense. These particles also have a particular semantic property; they impart a resultative sense to the sentence or verb phrase. In Bolinger's words, "the particle must contain two features, one of motion-through-location, the other of terminus or result." 2Bolinger notes that manner and time adverbials are excluded by this account, as are place and stance adverbials (which may contain result without motion), and directional adverbials (motion without result). These are illustrated in Sa, 5b and 5c respectively: # 5 > a. *He built well the fire. *She stitched carefully the rip. *I bought yesterday the stocks. 2. Bolinger (1971) p. 85 # - 39 # -b. *We
|
{"source": 982, "title": "from dpo"}
|
Training, Competing The 7 × 5 term-by-document matrix with unit columns: G = 0.5000 0.7071 0.7071 0.5774 0.7071 0.5000 0 0 0 00.5000 0 0 0 00.5000 0 0.7071 0 0.7071 0 0 0 0.5774 00 0 0 0.5774 00 0.7071 0 0 0 Cosines of angles between term vectors: C = 1.0000 0.3464 0.3464 0.7746 0.4000 0.4000 0.4899 1.0000 1.0000 0.4472 0 0 01.0000 0.4472 0 0 01.0000 0 0 01.0000 1.0000 01.0000 01.0000 > Fig. 7.1 Identifying polysemy via term comparison. in place of the columns of Ak for query matching. In the same way, the rows of Vk are a basis for the row space of Ak and so can replace the rows of Ak in (7.1). Thus, in a reduced-rank approximation, the cosine becomes cos ωij = (eTi UkΣkV Tk )( VkΣkU Tk ej ) ‖ VkΣkU Tk ei ‖2‖ VkΣkU Tk ej ‖2 = (eTi UkΣk)(Σ kU Tk ej ) ‖ ΣkU Tk ei ‖2‖ ΣkU Tk ej ‖2Downloaded 12/07/17 to 132.198.129.164. Redistribution subject to SIAM license or copyright; see 354 M. W. BERRY, Z. DRMA ˇ C, AND E. R. JESSUP for i = 1 , . . . , t and j = 1 , . . . , d . Defining bj = Σ kU Tk ej , we have cos ωij = bTi bj ‖ bi ‖2‖ bj ‖2 for i = 1 , . . . , t and j = 1 , . . . , d .In addition to the geometric measure of similarity used in Figure 7.1, techniques based on graph-theoretic concepts (e.g., links, cliques, connected components) are sometimes used to produce approximate clusters directly from the term frequencies stored in the original term-by-document matrix. Clusters formed by any method may be
|
{"source": 2683, "title": "from dpo"}
|
See figure ix. At least one point (I) has arrows to all points. All points have arrows to themselves. And to falsify the conclusion, there are two points not connected by any arrow. (k) 0 = {1, 2}; I(R) = {(1, 2), (2, I)}; l(A) = 0. See figure x. According to the second premise, l(A) holds for exactly the points with arrows to themselves. (I) 0 = {1, 2, 3}; I(R) = {(1, I), (2, 2), (3, 3), (1, 2), (2, 3), (3, 1)}. See figure xi. According to the second premise, between each two (not necessarily distinct) points there is at least one arrow; this also applies to a point and itself: each point has an arrow to itself. Thus the first premise is verified too. To falsify the conclusion we must ensure that the relation is not transitive. In the picture this has worked out properly: I has an arrow to 2, and 2 has an arrow to 3, but I has no arrow to 3. (m) For this argument schema there is no countermodel with a finite domain. If one tries for that, one will see that there are problems when circles appear; see figure xii. In order to make "such a circle transitive, one must make all the points have arrows to themselves. On the other hand, to fal-sify the conclusion, such 'reflexive' elements are not allowed to occur. An infinite counterexample is the following: 0 = {1, 2, 3, ... }; l(R) = {(i, j) E 0 2 [ i (n) 0 = {I}; l(R) = 0. Because the premises are universally quantified implications, they can be made true by introducing no arrows at all. If
|
{"source": 6818, "title": "from dpo"}
|
entered variables whenever determinants are provided. APPENDIX 2 # Determination of the Inverse Matrix and Applications Thereof A2.1 HAND CALCULATION OF THE MULTIPLE REGRESSION/CORRELATION PROBLEM Although most practitioners of MRC analysis are likely to turn over the necessary work to a computer program, it is quite possible to perform these operations with a hand calculator. The major problems in doing so are the many opportunities for error and the amount of time required, both of which increase rapidly as a function of n and k. Several methods for determining the MRC solution are available, of which the best known is the Doolittle solution. We prefer the method that is presented here because it produces the inverse of the correlation matrix among IVs whose elements provide results that are of analytic interest. Using the correlations among IVs given in Table 3.5.1, we shall illustrate the computation of this inverse matrix, and of the various multiple and partial coefficients that its elements yield, and then give the substantive interpretation of the entire set of results. The method presented here may be generalized to more than, or fewer than, the illustrated four IVs. A mathematical understanding of the purpose of the various operations is not neces-sary for correct determination of the solution. It is, however, useful to have ways of controlling the error that may creep in. One of these is provided by carrying a sufficient number of decimal places for each of the original correlation coefficients and the subsequent operations. In this example we have used five; with more variables more decimal places would be appropriate. A check against human error is provided by the last column, which, at the points indicated by check marks, should equal the sum of the other numbers in the row, within at most three units in
|
{"source": 6256, "title": "from dpo"}
|
such as volume, molar chemical constitution, or electric polarisation. Examples of state variables that are not extensive deformation or other such variables are temperature T and entropy S, as for example in the expression U = U(S, V, {Nj}). Changes of such variables are not actually physically measureable by use of a single simple adiabatic thermodynamic process; they are processes that occur neither by thermodynamic work nor by transfer of matter, and therefore are said occur by heat transfer. The quantity of thermodynamic work is defined as work done by the system on its surroundings. According to the second law of thermodynamics, such work is irreversible. To get an actual and precise physical measurement of a quantity of thermodynamic work, it is necessary to take account of the irreversibility by restoring the system to its initial condition by running a cycle, for example a Carnot cycle, that includes the target work as a step. The work done by the system on its surroundings is calculated from the quantities that constitute the whole cycle. A different cycle would be needed to actually measure the work done by the surroundings on the system. This is a reminder that rubbing the surface of a system appears to the rubbing agent in the surroundings as mechanical, though not thermodynamic, work done on the system, not as heat, but appears to the system as heat transferred to the system, not as thermodynamic work. The production of heat by rubbing is irreversible; historically, it was a piece of evidence for the rejection of the caloric theory of heat as a conserved substance. The irreversible process known as Joule heating also occurs through a change of a non-deformation extensive state variable. Accordingly, in the opinion of Lavenda, work is not as primitive concept as is heat, which
|
{"page_id": 3616613, "title": "Work (thermodynamics)"}
|
international university, laboratory, or institute. The purpose of the fellowship is to encourage scientific collaboration between theorists in Canada and those abroad, and also to enhance the career prospects of the junior researcher. === IPP high school teacher awards === The Institute of Particle Physics has supported Canadian high school teachers attending the CERN high school teacher program. === IPP summer student program === The Institute of Particle Physics supports Canadian undergraduate students participating in the CERN summer student program. == References == == External links == Official website
|
{"page_id": 69832190, "title": "Institute of Particle Physics"}
|
around the star. They exhibit broad emission line spectra with helium, nitrogen, carbon and oxygen lines. Variations in some stars appear to be stochastic while others show multiple periods. ==== Gamma Cassiopeiae variables ==== Gamma Cassiopeiae (γ Cas) variables are non-supergiant fast-rotating B class emission line-type stars that fluctuate irregularly by up to 1.5 magnitudes (4 fold change in luminosity) due to the ejection of matter at their equatorial regions caused by the rapid rotational velocity. ==== Flare stars ==== In main-sequence stars major eruptive variability is exceptional. It is common only among the flare stars, also known as the UV Ceti variables, very faint main-sequence stars which undergo regular flares. They increase in brightness by up to two magnitudes (six times brighter) in just a few seconds, and then fade back to normal brightness in half an hour or less. Several nearby red dwarfs are flare stars, including Proxima Centauri and Wolf 359. ==== RS Canum Venaticorum variables ==== These are close binary systems with highly active chromospheres, including huge sunspots and flares, believed to be enhanced by the close companion. Variability scales ranges from days, close to the orbital period and sometimes also with eclipses, to years as sunspot activity varies. === Cataclysmic or explosive variable stars === ==== Supernovae ==== Supernovae are the most dramatic type of cataclysmic variable, being some of the most energetic events in the universe. A supernova can briefly emit as much energy as an entire galaxy, brightening by more than 20 magnitudes (over one hundred million times brighter). The supernova explosion is caused by a white dwarf or a star core reaching a certain mass/density limit, the Chandrasekhar limit, causing the object to collapse in a fraction of a second. This collapse "bounces" and causes the star to explode and emit this
|
{"page_id": 63025, "title": "Variable star"}
|
to pay Toll-by-mail rates. When the Triborough Bridge opened, it had a combined 22 tollbooths spread across two toll plazas. Motorists were first able to pay with E‑ZPass in lanes for automatic coin machines at the toll plazas on August 21, 1996; in contrast to other MTA Bridges & Tunnels facilities where E-ZPass lanes were interspersed with cash only lanes, all of the E-ZPass lanes at either of the Triborough Bridge's toll plazas were grouped together. The implementation of E-ZPass allowed each toll lane to accommodate 900 vehicles an hour, compared with the 250 to 400 vehicles that the old toll lanes could accommodate. Open-road cashless tolling began on June 15, 2017. The tollbooths were dismantled, and drivers are no longer able to pay cash at the bridge. Instead, there are cameras mounted onto new overhead gantries manufactured by TransCore near where the booths were formerly located. A vehicle without an E-ZPass has a picture taken of its license plate and a bill for the toll is mailed to its owner. For E-ZPass users, sensors detect their transponders wirelessly. === Historical tolls === == See also == List of bridges documented by the Historic American Engineering Record in New York List of reference routes in New York == References == Notes Citations Bibliography Caro, Robert (1974). The Power Broker: Robert Moses and the Fall of New York. New York: Knopf. ISBN 978-0-394-48076-3. OCLC 834874. Rastorfer, Darl (2000). "Chapter 4: The Triborough Bridge". Six Bridges: The Legacy of Othmar H. Ammann. Yale University Press. ISBN 978-0-300-08047-6. Retrieved September 18, 2018. == External links == Official website Triborough Bridge historic overview at nycroads.com Historic American Engineering Record (HAER) No. NY-301, "Triborough Bridge, Passing through Queens, Manhattan & the Bronx, Queens, Queens County, NY", 28 photos, 3 photo caption pages Triborough Bridge at
|
{"page_id": 287125, "title": "Robert F. Kennedy Bridge"}
|
The ARC fusion reactor (affordable, robust, compact) is a design for a compact fusion reactor developed by the Massachusetts Institute of Technology (MIT) Plasma Science and Fusion Center (PSFC). ARC aims to achieve an engineering breakeven of three (to produce three times the electricity required to operate the machine). The key technical innovation is to use high-temperature superconducting magnets in place of ITER's low-temperature superconducting magnets. The proposed device would be about half the diameter of the ITER reactor and cheaper to build. The ARC has a conventional advanced tokamak layout. ARC uses rare-earth barium copper oxide (REBCO) high-temperature superconductor magnets in place of copper wiring or conventional low-temperature superconductors. These magnets can be run at much higher field strengths, 23 T, roughly doubling the magnetic field on the plasma axis. The confinement time for a particle in plasma varies with the square of the linear size, and power density varies with the fourth power of the magnetic field, so doubling the magnetic field offers the performance of a machine 4 times larger. The smaller size reduces construction costs, although this is offset to some degree by the expense of the REBCO magnets. The use of REBCO may allow the magnet windings to be flexible when the machine is not operational. This would allow them to be "folded open" to allow access to the interior of the machine. This would greatly lower maintenance costs, eliminating the need to perform maintenance through small access ports using remote manipulators. If realized, this could improve the reactor's capacity factor, an important metric in power generation costs. The first machine planned to come from the project is a scaled-down demonstrator named SPARC (as Soon as Possible ARC). It is to be built by Commonwealth Fusion Systems, with backing led by Eni, Breakthrough Energy Ventures,
|
{"page_id": 47502345, "title": "ARC fusion reactor"}
|
doi:10.1109/AERO.2008.4526266. ISBN 978-1-4244-1487-1. Basilio, Ralph R.; Bennett, Matthew W.; Eldering, Annmarie; Lawson, Peter R.; Rosenberg, Robert A. (2019). "Orbiting Carbon Observatory-3 (OCO-3), remote sensing from the International Space Station (ISS)". In Neeck, Steven P.; Kimura, Toshiyoshi; Martimort, Philippe (eds.). Sensors, Systems, and Next-Generation Satellites XXIII. p. 8. doi:10.1117/12.2534996. ISBN 978-1-5106-3005-5. Eldering, A.; Wennberg, P. O.; Crisp, D.; Schimel, D. S.; Gunson, M. R.; Chatterjee, A.; Liu, J.; Schwandner, F. M.; Sun, Y.; O’Dell, C. W.; Frankenberg, C.; Taylor, T.; Fisher, B.; Osterman, G. B.; Wunch, D.; Hakkarainen, J.; Tamminen, J.; Weir, B. (13 October 2017). "The Orbiting Carbon Observatory-2 early science investigations of regional carbon dioxide fluxes". Science. 358 (6360). Bibcode:2017Sci...358.5745E. doi:10.1126/science.aam5745. PMC 5668686. Basilio, Ralph R.; Pollock, H. Randy; Hunyadi-Lay, Sarah L. (2014). "OCO-2 (Orbiting Carbon Observatory-2) mission operations planning and initial operations experiences". In Meynart, Roland; Neeck, Steven P.; Shimoda, Haruhisa (eds.). Sensors, Systems, and Next-Generation Satellites XVIII. Vol. 9241. doi:10.1117/12.2074164. == External links == NASA/JPL Orbiting Carbon Observatory website JPL Science Division OCO page UStream video on OCO mission
|
{"page_id": 4682253, "title": "Orbiting Carbon Observatory"}
|
is a list of detected impact events with a crater size of >15 meters, which excludes most meteoroid impacts (<1 meter asteroids). 10-15 meter craters discovered before 2010 are also included, before the rate of discovering such craters became dozens per year. == Notes == == See also == Impact event Impact events on Jupiter Marsquake == References ==
|
{"page_id": 72153523, "title": "Impact events on Mars"}
|
Kingdom and Greece 1998. Population: source IRTAD except for Ireland, Luxembourg, Slovakia, Sweden, Iceland and Norway: source INED. == Deaths == === Deaths per passenger-kilometer === The 28 EU-28 countries, for the 28 members, computed an indicator named "per 10 billion pkm". Pkm is an indicator of traffic volume which is used for not having consistent vehicle-kilometre data. Are counted cars and estimated motorised two-wheelers. In 2016, this indicator ranges from 23 for Sweden to 192 for Romania, with a value of 52 for the EU-28. In Germany, France, the UK and Italy, this score is respectively 33, 46, 28, 44. === Deaths in Europe === In 2019, the 27 members states of the European Union had 51 road deaths per million inhabitants. Because the UK had less fatalities than the average EU and due to Brexit; this rate raised to 51. Including the UK, the rate of the 28 would have been 48. The safest of those 28 nations was Sweden (22 deaths/million inhabitants) while Romania reported the highest fatality rates of the EU in 2019. (96/million). === Deaths in the United States of America === In 2022, the NHTSA counted 42,795 fatalities in motor vehicle traffic crashes; that is 13.5 fatalities per billion vehicle miles traveled (21.6 fatalities per billion vehicle kilometers). == See also == Road-traffic safety Management systems for road safety Smeed's law Nations: List of motor vehicle deaths in Australia by year List of motor vehicle deaths in Japan by year List of motor vehicle deaths in Thailand by year List of motor vehicle deaths in U.S. by year and Transportation safety in the United States == Notes == == References ==
|
{"page_id": 24810782, "title": "Epidemiology of motor vehicle collisions"}
|
The Ottawa-Bonnechere Graben (also known as the Ottawa Graben) is a geological structure that coincides with a 55 km (34 mi) wide topographic depression extending from near Montréal through Ottawa. It is part of the Saint Lawrence rift system that also includes the seismically active Saguenay graben. This rift valley was formed when the Earth's crust moved downward about a kilometre between two major fault zones known as the Mattawa and Petawawa faults. == Geography == The Ottawa-Bonnechere Graben measures about 700 km (435 mi), running from the Montreal area on the east to near Sudbury and Lake Nipissing on the west. On the east, it joins the Saint Lawrence rift system, a half-graben which extends more than 1000 km along the Saint Lawrence River valley and links the Ottawa and Saguenay Graben. The 200 km (124 mi) segment of the Ottawa-Bonnechere Graben west of Ottawa was the first to be recognized as a graben. Since then, it has been traced west to Lake Nipissing, and northwestwards from the confluence of the Mattawa and Ottawa Rivers up the valley of the latter stream to Lake Timiskaming and the Montreal River valley. This latter branch is the Timiskaming Graben. At the rifts' western termini, the main faults split into divergent smaller faults. The graben has been interpreted as a Late Proterozoic to Early Paleozoic failed arm of the Iapetus Ocean, the precursor to the Atlantic Ocean. The main Ottawa-Bonnechere Graben is associated with collapse of the regional carbonate platform and formation of deep water shale basins by ~452 mya (million years ago); similar events formed the Temiskaming Graben ~449–451 mya. These grabens were reactivated during the breakup of supercontinent Pangaea some 150 mya. == Geology == Since the Late Proterozoic to Early Paleozoic, erosion has removed the volcanic peaks, exposing a
|
{"page_id": 14625100, "title": "Ottawa-Bonnechere Graben"}
|
NGC 130 is an unbarred lenticular galaxy. It was discovered on November 4, 1850 by Bindon Stoney, the very same day he discovered NGC 126 and NGC 127. This galaxy belongs in the NGC 128 group of galaxies. == References == == External links == Media related to NGC 130 at Wikimedia Commons
|
{"page_id": 49529339, "title": "NGC 130"}
|
bike share, check a book out of the library, and pay for your bus ride home. In New York, a guerrilla group of citizen-scientists installed sensors in local sewers to alert you when storm water runoff overwhelms the system, dumping waste into local waterways.” According to a prediction made by Editors (2015), smart cities would use 1.6 billion connected things in 2016. Finally, smart cities can have several smart entities such as universities and factories (see Lacey, 2016). For more on smart cities, see Schwartz (2015). In addition, watch the video “Cisco Bets Big on ‘Smart Cities’” at money.cnn. com/video/technology/2016/03/21/cisco-ceo-smart-cities.cnnmoney . Another video to watch is “Smart Cities of the Future” (3:56 min.) at youtube.com/ watch?v=mQR8hxMP6SY . A more detailed video on San Diego (44:06 minutes) is at youtube.com/watch?v=LAjznAJe5uQ .744 Part IV • Robotics, Social Networks, AI and IoT In over seven years, the city of Amsterdam (The Netherlands) was transformed into a smart city using information technologies. This case describes the steps the city took from 2009 to 2016 to become a smart city, as reported by MIT Sloan School of Management. The city initiative included projects in the following catego-ries: mobility, quality of living, transportation, security, health, and economy as well as infrastructure, big and open source data, and experimental living labs. The major findings of the MIT team regarding Amsterdam’s transformation were: • Private-sector data are critical for changing policy . The major categories of the project in-volved nongovernmental entities (e.g., using a GPS provider to manage traffic). For example, the private sector was involved in a project to change traffic situations (reduction of 25 percent in the number of cars and an increase of 100 percent in the number of scooters, in five years). • It is necessary to have chief technology officers in smart cities
|
{"source": 1196, "title": "from dpo"}
|
findings in Ref. . Intuitively, one would imagine that a stronger modularity (smaller μ) increases diffusion speed in C1 since nodes in C1 are exposed to more seeds, while a weaker modu-larity (larger μ) increases diffusion speed in C2 because more bridges connect nodes in C2 to the seeds. This observation raises the following question: is there an ideal network modu-larity at which the global cascade reaches the highest average diffusion speed? Let us first analyze the behavior of our system when only local diffusion is possible. Figure 1 indicates that, when the network modularity is too strong (very small μ), information spreads only among nodes in C1 due to the lack of bridges between two communities, thus decreasing modularity (in-creasing μ) decreases the average diffusion speed because it takes longer for spreading in C1 and the cascade size stays the same. When a global cascade is achieved, however, there is a quadratic relationship between the average diffusion speed and network modularity: decreasing modularity first increases the average diffusion speed, but only up to a critical point, after which a further reduction in modularity slows down the overall diffusion dynamics. The global cascade thus reaches its highest average speed at the optimal network modularity (μ = 0.17). The analytical predictions show excellent agree-ment with the simulations (Fig. 1). > FIG. 2. Cross sections of three different μvalues in Fig. 1 that enable global cascades. (a, d) μ=0.13; (b, e) μ=0.17; (c, f) μ= > 0.21. (a–c) The diffusion speed v(i) > tin C1and C2as a function of time step t. (d–f) Same as (a)–(c), but for the cumulative cascade size ρ(i) > t. The theoretical predictions of Eq. (4) (lines) show excellent agreement with the numerical simulations (dots), averaged over 100 runs. The optimal μ=0.17 achieves the shortest total diffusion
|
{"source": 3646, "title": "from dpo"}
|
play; computation of algebraic norms more expensive; still claims a share of the total computation cost that is way too large (10%). > CSE291-14: The Number Field Sieve; Collecting relations in NFS: two further topics 487/902 ## Norm initialization in Cado-NFS (II) More recent improvements in the norm computation (version 2.1, improved in 2.3): Unify algebraic and rational norm initialization by computing piecewise linear approximations of polynomials that are accurate up to a multiplicative factor. Neighbouring cells often have the same value. We compute the value changes instead (easy for a linear polynomial). > CSE291-14: The Number Field Sieve; Collecting relations in NFS: two further topics 488/902 ## Piecewise linear approximations Input : a polynomial ˜f (x ) with real coefficients. ˜f (x ) is such that ˜F (i, j) = jdeg ˜ f ˜f (i/j) = Res( a − bx , f (x )) . The q-lattice defines a homography that yields ˜F from F : ˜F (i, j) = F (ia 0 + ja 1, ib 0 + jb 1). an inaccuracy tolerance τ ; a range of interest [−2I−1, 2I−1] × [1, J]. output : a list of linear functions u0, . . . , uk−1 and consecutive intervals R0, . . . , Rk−1 such that ∪s Rs = [ −2I−1, 2I−1] and ∀s, ∀i ∈ Rs , e−τ |˜F (i, 1)| ≤ us (i) ≤ eτ |˜F (i, 1)| > CSE291-14: The Number Field Sieve; Collecting relations in NFS: two further topics 489/902 ## Piecewise linear approximations: example -6x10 17 -4x10 17 -2x10 17 02x10 17 4x10 17 6x10 17 8x10 17 1x10 18 0 200 400 600 800 1000 1200 f(x) CSE291-14: The Number Field Sieve; Collecting relations in NFS: two further topics 490/902 Piecewise linear approximations: example -6x10 17 -4x10 17 -2x10 17
|
{"source": 5676, "title": "from dpo"}
|
guide explains some features of X Y-pic that are relevant to typesetting of “matrix-like diagrams” as used in, for example, category theory; please refer to the reference manual for complete information on the described constructions. The guide assumes that you have some experience in using T EX for typeset- ting mathematics, e.g., have studied [2, ch. 16–19], [3, sec. 3.3], or , and that X Y-pic is installed on your TEX system as described in the INSTALL file accom- panying the distribution. The first section describes what you need to get started, in particular all that is needed to typeset the diagram in the abstract. Section 2 and 3 explain advanced use of arrows and entries, respectively. Fi- nally, section 4 explains where and under what condi- tions X Y-pic is available, gives the relation of version 3.7 to previous versions, and lists further sources of information. Throughout we give exercises that you should be able to solve as you go along; all exercises are an- swered at the end just prior to the references and index. # 1 Basics This section explains the X Y-diagram construction concepts needed to get started with typesetting matrix-like diagrams. # 1.1 Loading The X Y-pic setup used in this guide is loaded by in- serting the lines \input xy \xyoption{all} in the definitions part of your document. 1 If you wish to load only the features you use, or you wish to use non-standard facilities like the v2 backwards compat- ibility mode 2 or the ps PostScript 3 backend then this is also possible as described in the reference man- ual . # 1.2 Entries A diagram is created by the command \xymatrix{ . . . } where the “. . . ” should be replaced by entries to be aligned in
|
{"source": 6696, "title": "from dpo"}
|
the exchange of molecular oxygen from blood to tissue cells and for carbon dioxide, CO2, produced in cell mitochondria, back to the blood. Since carbon dioxide is about 20 times more soluble in water than oxygen, it can relatively easily diffuse in the aqueous fluid between cells and blood. However, hydrophobic molecular oxygen has very poor water solubility and prefers hydrophobic lipid crystalline structures. As a result of this, plasma lipoproteins can carry significantly more O2 than in the surrounding aqueous medium. If hemoglobin in erythrocytes is the main transporter of oxygen in the blood, plasma lipoproteins may be its only carrier in the ECF. The oxygen-carrying capacity of lipoproteins, reduces in ageing and inflammation. This results in changes of ECF functions, reduction of tissue O2 supply and contributes to development of tissue hypoxia. These changes in lipoproteins are caused by oxidative or inflammatory damage. == Regulation == The internal environment is stabilised in the process of homeostasis. Complex homeostatic mechanisms operate to regulate and keep the composition of the ECF stable. Individual cells can also regulate their internal composition by various mechanisms. There is a significant difference between the concentrations of sodium and potassium ions inside and outside the cell. The concentration of sodium ions is considerably higher in the extracellular fluid than in the intracellular fluid. The converse is true of the potassium ion concentrations inside and outside the cell. These differences cause all cell membranes to be electrically charged, with the positive charge on the outside of the cells and the negative charge on the inside. In a resting neuron (not conducting an impulse) the membrane potential is known as the resting potential, and between the two sides of the membrane is about −70 mV. This potential is created by sodium–potassium pumps in the cell membrane, which
|
{"page_id": 479385, "title": "Extracellular fluid"}
|
production of bio-materials, while bio-residues and wastes coming from either the agro-industrial and forestry sectors are gaining interest. Moreover, manufacturing processes needed for the production of competitive bio-alternatives to fossil-based products might lead to higher energy consumptions or to "linear", non-circular, products. Therefore, it is recommended to maintain a critical mindset based on Life Cycle Assessment analysis, as some bio-products could require either extra material or processing to ensure the same quality, resulting necessarily in more energy consumption. == See also == Bio-based building materials == References ==
|
{"page_id": 307552, "title": "Bio-based material"}
|
represent a natural object that exists in the real world like a tree, an animal, a stone, etc. It may also name an artificial (man-made) object like a chair, computer, house, etc. Abstract ideas and knowledge domains such as freedom, equality, science, happiness, etc., are also symbolized by concepts. A concept is merely a symbol, a representation of the abstraction. The word is not to be mistaken for the thing. For example, the word "moon" (a concept) is not the large, bright, shape-changing object up in the sky, but only represents that celestial object. Concepts are created (named) to describe, explain and capture reality as it is known and understood. ==== A priori concepts and a posteriori concepts ==== Kant maintained the view that human minds possess not only empirical or a posteriori concepts, but also pure or a priori concepts. Instead of being abstracted from individual perceptions, like empirical concepts, they originate in the mind itself. He called these concepts categories, in the sense of the word that means predicate, attribute, characteristic, or quality. But these pure categories are predicates of things in general, not of a particular thing. According to Kant, there are twelve categories that constitute the understanding of phenomenal objects. Each category is that one predicate which is common to multiple empirical concepts. In order to explain how an a priori concept can relate to individual phenomena, in a manner analogous to an a posteriori concept, Kant employed the technical concept of the schema. He held that the account of the concept as an abstraction of experience is only partly correct. He called those concepts that result from abstraction "a posteriori concepts" (meaning concepts that arise out of experience). An empirical or an a posteriori concept is a general representation (Vorstellung) or non-specific thought of that
|
{"page_id": 6978, "title": "Concept"}
|
in the centre of the universe, believed to have been the first to detect the identity of Hesperus, the evening-star, and Phosphorus, the morning-star (Venus), and by some, the first to claim that moonlight is a reflection of sunlight. c. 450 BCE – Anaxagoras shows that the Moon shines by reflected sunlight: the phases of the Moon are caused by the illumination of its sphere by the Sun in different angles along the lunar month. He was also the first to give a correct explanation of eclipses, by asserting that the Moon is rocky, thus opaque, and closer to the Earth than the Sun. c. 400 BCE – Philolaus and other Pythagoreans propose a model in which the Earth and the Sun revolve around an invisible "Central Fire" (not the Sun), and the Moon and the planets orbit the Earth. Due to philosophical concerns about the number 10, they also added a tenth "hidden body" or Counter-Earth (Antichthon), always in the opposite side of the invisible Central Fire and therefore also invisible from Earth. c. 360 BCE – Plato claims in his Timaeus that circles and spheres are the preferred shape of the universe and that the Earth is at the centre. These circles are the orbits of the heavenly bodies, varying in size for every of them. He arranged these celestial orbs, in increasing order from the Earth: Moon, Sun, Venus, Mercury, Mars, Jupiter, Saturn, and the fixed stars located on the celestial sphere forming the outermost shell. c. 360 BCE – Eudoxus of Cnidus proposes for first time a purely geometric-mathematical, geocentric model of the planetary movements, including that of the Sun and the Moon. c. 350 BCE – Aristotle argues for a spherical Earth using lunar eclipses and other observations. Also, he asserts his conception of the
|
{"page_id": 58930, "title": "Timeline of Solar System astronomy"}
|
1 + i β sin ( Ω t ) ) , {\displaystyle Ae^{i\omega t}\left(1+i\beta \sin(\Omega t)\right),} to which we apply a simple identity for sine, A e i ω t ( 1 + β 2 ( e i Ω t − e − i Ω t ) ) = A ( e i ω t + β 2 e i ( ω + Ω ) t − β 2 e i ( ω − Ω ) t ) . {\displaystyle Ae^{i\omega t}\left(1+{\frac {\beta }{2}}\left(e^{i\Omega t}-e^{-i\Omega t}\right)\right)=A\left(e^{i\omega t}+{\frac {\beta }{2}}e^{i(\omega +\Omega )t}-{\frac {\beta }{2}}e^{i(\omega -\Omega )t}\right).} This expression we interpret to mean that we have the original carrier signal plus two small sidebands, one at ω + Ω {\displaystyle \omega +\Omega } and another at ω − Ω {\displaystyle \omega -\Omega } . Notice however that we only used the first term in the Taylor expansion – in truth there are an infinite number of sidebands. There is a useful identity involving Bessel functions called the Jacobi–Anger expansion which can be used to derive A e i ω t + i β sin ( Ω t ) = A e i ω t ( J 0 ( β ) + ∑ k = 1 ∞ J k ( β ) e i k Ω t + ∑ k = 1 ∞ ( − 1 ) k J k ( β ) e − i k Ω t ) , {\displaystyle Ae^{i\omega t+i\beta \sin(\Omega t)}=Ae^{i\omega t}\left(J_{0}(\beta )+\sum _{k=1}^{\infty }J_{k}(\beta )e^{ik\Omega t}+\sum _{k=1}^{\infty }(-1)^{k}J_{k}(\beta )e^{-ik\Omega t}\right),} which gives the amplitudes of all the sidebands. Notice that if one modulates the amplitude instead of the phase, one gets only the first set of sidebands, ( 1 + β sin ( Ω t ) ) A e i ω t = A
|
{"page_id": 41104, "title": "Electro-optic modulator"}
|
Cerence Inc. is an American multinational software company that develops artificial intelligence (AI) assistant technology primarily for automobiles. == History == Cerence was founded in October 2019, after Nuance Communications decided to turn its automotive division into an independent company. Nuance had provided voice recognition technology to car manufacturers for twenty years prior to the spin-off, and its technology was built into half of the new cars shipped globally in the first six months of 2019. Cerence's first official trading day on the Nasdaq exchange was October 2, 2019. The company assumed control of previously Nuance-held contracts with approximately 60 automakers including BMW, Ford, and Toyota. Since becoming its own entity, Cerence signed new deals to install voice recognition and assistance technology in Fiat Chrysler and Mercedes-Benz vehicles. In January 2020, LG announced that it would start integrating Cerence's voice assistant into its in-car infotainment systems. On 30 September 2021, VinFast reported that Cerence software will be used for its electric vehicles as an intelligence voice assistant. As of August 2021, Cerence's AI assistant technology had been installed on over 400 million cars worldwide. Cerence received an Automotive News PACE Award in September 2021 for Cerence Pay, a technology that allows drivers to pay for fuel via voice commands. == Products == Cerence develops automotive AI products, primarily focusing on voice assistant technology. Its voice assistant technology is not device-specific, and is white-labeled for auto manufacturers. The company's products integrate into a car's operating system and allow drivers to use speech for a variety of actions, for example to control their GPS, entertainment system, and climate settings rather than using manual controls. Cerence's technology also incorporates facial recognition and customized responses to individual drivers. As of 2021, Cerence's speech recognition software recognizes 70 different languages and dialects. The technology can
|
{"page_id": 69569706, "title": "Cerence"}
|
Student Switch Off is a campaign that aims to encourage students to save energy when living in University halls of residence. It is run by the Students Organising for Sustainability UK, a student-led education charity focusing on sustainability. As of March 2022, the campaign currently runs at 18 universities across the UK. In the 2021/22 academic year it engaged over 1,500 student through online competitions, campus visits and training. In 2021, the activities resulted in over 250 tonnes of CO2 saved. The scheme concentrates on behavioural change and social marketing to bring about carbon reduction. == History == The campaign was set up by Dr Neil Jennings as a pilot project at the University of East Anglia in 2006. In the pilot year, the campaign helped to reduce energy usage by an average of over 10% in halls of residence, saving around 90 tonnes of CO2 and over £19,000 in energy expenditure. Jennings received significant support in developing the campaign from the Ben & Jerry's Climate Change College and secured sponsorship of the campaign from E.ON, Odeon Cinemas, The Independent and FirstGroup. The campaign expanded to seven universities in 2007/08 and 11 in 2008/09 until in 2009 the Student Switch Off partnered with the National Union of Students as part of the Defra funded Degrees Cooler project, increasing the number of universities hosting the campaign by 22. Other partners included People & Planet, London Sustainability Exchange, Green Impact and Student Force for Sustainability. In 2009, the Student Switch Off was chosen by Carbon Leapfrog as one of the projects it would support with pro-bono legal and accountancy support. In May 2012, the campaign won an Ashden Award (described as the Oscars of the energy-saving world) and in March 2011 won the "Best Energy Saving Idea" award at the inaugural People
|
{"page_id": 29538735, "title": "Student Switch Off"}
|
a gene tree. This type of approach is best for analyzing recent mutations. Recently, Albers and McVean (2018) proposed a non-parametric method to estimate the age of an allele, using probabilistic, coalescent-based models of mutation and recombination. Specifically, their method infers the time to the most recent common ancestor (TMRCA) between hundreds or thousands of chromosomal sequence (haplotype) pairs. This information is then combined using a composite likelihood approach to obtain an estimate of the time of mutation at a single locus. This methodology was applied to more than 16 million variants in the human genome, using data from the 1000 Genomes Project and the Simons Genome Diversity Project, to generate the atlas of variant age. == History == Population geneticists, Motoo Kimura and Tomoko Ohta, were the first to analyze the association between an allele’s frequency and its age in the 1970s. They showed that the age of a neutral allele can be estimated (assuming a large, randomly mating population) by E ( t 1 ) = ( − 2 p ) / ( 1 − p ) ln ( p ) {\displaystyle E(t_{1})=(-2p)/(1-p)\ln(p)} Where p {\displaystyle p} represents the allele frequency and t 1 {\displaystyle t_{1}} is the expected age, measured in units of 2N generations. More recent studies, however, have focused on the analysis of intra-allelic variation. In 1990, Jean-Louis Serre and his team were the first to assess allele age by analyzing intra-allelic variation. Using a sample of 240 French families, they surveyed two restriction fragment length polymorphisms (RFLP) sites (E1 and E2) that are closely linked to an allele (ΔF508) at the cystic fibrosis locus (CFTR). Recombination theory allows for the calculation of x(t), the expected frequency of E2 in association with the allele ΔF508 in generation t, and y, the frequency of E2
|
{"page_id": 56018730, "title": "Allele age"}
|
Displays ==== Some Sony VAIO models come with Sony's proprietary XBRITE (known as ClearBright in Japan and the Asia-Pacific region) displays. The first model to introduce this feature was the Vaio TR series, which was also the first consumer product to utilize such technology. It is a combination of smooth screen, anti-reflection (AR) coating and high-efficiency lens sheet. Sony claims that the smooth finish provides a sharper screen display, the AR coating prevents external light from scattering when it hits the screen, and the high-efficiency lens sheet provides 1.5 times the brightness improvement over traditional LCD designs. Battery life is also extended through reduced usage of the LCD backlight. The technology was pioneered by Sony engineer Masaaki Nakagawa, who is in charge of the Vaio TR development. The TX series, introduced in September 2005, was the first notebook to implement a LED back-lit screen, which provides lower power consumption and greater color reproduction. This technology has since been widely adopted by many other notebook manufacturers. The TX series was also the first to use a 16:9 aspect ratio screen with 1366x768 resolution. The successor to the TX series was the TZ series in May 2007. This new design featured an optional 32 or 64GB Solid State Drive (SSD) for rapid boot-up times, quicker application launches and greater durability. If selected, a 250 GB Hard Drive could also have been included in place of the built-in CD/DVD drive to provide room for additional storage. For security, this model included a biometric fingerprint sensor and Trusted Platform Module. The TZ offered a built-in highly miniaturized Motion Eye camera built into the LCD panel for video conferencing. Additional features included the XBRITE LCD, integrated Wireless Wide Area Network (WWAN) technology and Bluetooth technology. ==== Switchable graphics ==== The SZ series was the first
|
{"page_id": 220355, "title": "Vaio"}
|
An integrator in measurement and control applications is an element whose output signal is the time integral of its input signal. It accumulates the input quantity over a defined time to produce a representative output. Integration is an important part of many engineering and scientific applications. Mechanical integrators are the oldest type and are still used for metering water flow or electrical power. Electronic analogue integrators, which have generally displaced mechanical integrators, are the basis of analog computers and charge amplifiers. Integration can also be performed by algorithms in digital computers. == Mechanical integrators == One simple kind of mechanical integrator is the disk-and-wheel integrator. This functions by placing a wheel on and perpendicular to a spinning disk, held there by means of a freely spinning shaft parallel to the disk. Because the speed at which a part of the disk turns is proportional to its distance from the center, the rate at which the wheel turns is proportional to its distance from the center of the disk. Therefore, the number of turns made by the integrating wheel is equal to the definite integral of the integrating wheel's distance from the center, which is in turn controlled by the motion of the shaft relative to the disk. == In signal processing circuits == A current integrator is an electronic device performing a time integration of an electric current, thus measuring a total electric charge. In combination with time it can be used to determine the average current during an experiment. Feeding current into a capacitor (initialized with zero volts) and monitoring the capacitor's voltage has been used in nuclear physics experiments before 1953 to measure the number of ions received. Such a simple circuit works because the capacitor's current–voltage relation when written in integral form mathematically states that a capacitor's
|
{"page_id": 1047173, "title": "Integrator"}
|
the destination object are deleted, and replaced by clones of the objects in the source object. When the owned object is a subclass of cOwnedObject that keeps track of its owner, the code generated for the container class invokes the take() and drop() methods at the appropriate times to manage the ownership. Example: cPacket *payload @owned; The generated methods: const cPacket *getPayload() const; cPacket *getPayloadForUpdate(); void setPayload(cPacket *payload); cPacket *removePayload(); The getter and mutable getter return the stored pointer (or nullptr if there is none). The remover method releases the ownership of the stored object, sets the field to nullptr, and returns the object. The setter method behavior depends on the presence of the @allowReplace property. By default (when @allowReplace is absent), the setter does not allow replacing the object. That is, when the setter is invoked on a field that already contains an object (the pointer is non-null), an error is raised: "A value is already set, remove it first with removePayload()". One must call removePayload() before setting a new object. When @allowReplace is specified for the field, there is no need to call the remover method before setting a new value because the setter method deletes the old object before storing the new one. cPacket *payload @owned @allowReplace; // allow setter to delete the old object If the field is marked const, then the getForUpdate() method is not generated, and the setter takes a const pointer. const cPacket *payload @owned; The generated methods: const cPacket *getPayload() const; void setPayload(const cPacket *payload); cPacket *removePayload(); The name of the remover method (which is the only extra method compared to non-pointer fields) can be customized using the @remover property. 6.8 Literal C++ Blocks It is possible to inject C++ code fragments directly into the generated code. This is done using the
|
{"source": 1766, "title": "from dpo"}
|
edge of weight w corresponds to wk multiedges. This scales the value of the minimum cut without changing its structure. Suppose we give each multiedge a score chosen uniformly at random from the continuous interval [0, k]. The probability distribution for the minimum score X among wk edges is then Pr @X . t# 5 S1 2 tkDwk .If we now let k become arbitrarily large, the distribution converges to one in which an edge of weight w receives a score chosen from the exponential distribution Pr @X . t# 5 exp ~ 2wt !.Thus, assuming we can generate an exponential random variable in O(1) time, then we can generate a permutation in O(m) time. As in the unweighted case, we do not actually have to sort based on the scores: once scores are assigned we can use median finding to split the edge list as needed by Compact in O(m)time. If all we have is coin flips, it is possible to use them to sample from an approximately exponential distribution in polylogarithmic time and introduce a negligible error in the computation. As we shall be describing a better method later, we only sketch the details of this approach. Perhaps the simplest way to generate a variable X with probability density function exp( 2wt ) is to generate a variable U uniformly distributed in the [0, 1] interval, and then to set X 52(ln U)/ w. Two obstacles arise in practice. One is that we cannot sample uniformly from [0, 1]. Instead, we choose an integer M 5 n O(1) , select uniformly from the integers in [1, M] using O(log n) random bits, and then divide by M.This gives us an approximation U9 to the uniform distribution. Another obstacle is that we cannot exactly compute logarithms. Instead, given U9,
|
{"source": 4178, "title": "from dpo"}
|
a linear function with non-negligible probability. If the given function is correlated with a linear function then this property clearly holds. Furthermore, the property ... more >>>, and apply it to draw new consequences in average-case complexity and proof complexity. Specifically, we show the following: ?*Demi-bit stretch*: Super-bits and demi-bits are variants of cryptographic pseudorandom generators which are ... more >>>. In a recent work, Gryaznov, Pudl\'{a}k, and Talebanfard (CCC' 22) introduced ... [more >>>]( **TR23-061 | 2nd May 2023** Abhimanyu Choudhury, Meena Mahajan [#### Dependency schemes in CDCL-based QBF solving: a proof-theoretic study]( We formalize the notion of proof systems obtained by adding normal dependency schemes into the QCDCL proof system underlying algorithms for solving Quantified Boolean Formulas, by exploring the addition of the dependency schemes via two approaches: one as a preprocessing tool, and second in propagation and learnings in the QCDCL ... [more >>>]( **TR23-062 | 2nd May 2023** Benny Applebaum, Eliran Kachlon [#### Conflict Checkable and Decodable Codes and Their Applications]( Let C be an error-correcting code over a large alphabet q of block length n, and assume that, a possibly corrupted, codeword c is distributively stored among n servers where the i th entry is being held by the
|
{"source": 6000, "title": "from dpo"}
|
variance possible under the constraint that it is orthogonal to the preceding components. The resulting vectors (each being a linear combination of the variables and containing n observations) are an uncorrelated orthogonal basis set. PCA is sensitive to the relative scaling of the original variables. principle of rationality Also rationality principle. A principle coined by Karl R. Popper in his Harvard Lecture of 1963, and published in his book Myth of Framework. It is related to what he called the 'logic of the situation' in an Economica article of 1944/1945, published later in his book The Poverty of Historicism. According to Popper's rationality principle, agents act in the most adequate way according to the objective situation. It is an idealized conception of human behavior which he used to drive his model of situational logic. probabilistic programming (PP) A programming paradigm in which probabilistic models are specified and inference for these models is performed automatically. It represents an attempt to unify probabilistic modeling and traditional general-purpose programming in order to make the former easier and more widely applicable. It can be used to create systems that help make decisions in the face of uncertainty. Programming languages used for probabilistic programming are referred to as "Probabilistic programming languages" (PPLs). production system A computer program typically used to provide some form of AI, which consists primarily of a set of rules about behavior, but also includes the mechanism necessary to follow those rules as the system responds to states of the world. programming language A formal language, which comprises a set of instructions that produce various kinds of output. Programming languages are used in computer programming to implement algorithms. Prolog A logic programming language associated with artificial intelligence and computational linguistics. Prolog has its roots in first-order logic, a formal logic, and unlike
|
{"page_id": 50336055, "title": "Glossary of artificial intelligence"}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.