text
stringlengths
5
10.5k
source
stringlengths
33
146
The binding constant, or affinity constant/association constant, is a special case of the equilibrium constant K, and is the inverse of the dissociation constant. It is associated with the binding and unbinding reaction of receptor (R) and ligand (L) molecules, which is formalized as: R + L ⇌ RL The reaction is characterized by the on-rate constant kon and the off-rate constant koff, which have units of M−1 s−1 and s−1, respectively. In equilibrium, the forward binding transition R + L → RL should be balanced by the backward unbinding transition RL → R + L. That is, k o n [ R ] [ L ] = k o f f [ R L ] {\displaystyle k_{\rm {on}}\,[{\rm {R}}]\,[{\rm {L}}]=k_{\rm {off}}\,[{\rm {RL}}]} , where [R], [L] and [RL] represent the concentration of unbound free receptors, the concentration of unbound free ligand and the concentration of receptor-ligand complexes. The binding constant Ka is defined by K a = k o n k o f f = [ R L ] [ R ] [ L ] {\displaystyle K_{\rm {a}}={k_{\rm {on}} \over k_{\rm {off}}}={[{\rm {RL}}] \over {[{\rm {R}}]\,[{\rm {L}}]}}} . An often considered quantity is the dissociation constant Kd ≡ ⁠1/Ka⁠, which has the unit of concentration, despite the fact that strictly speaking, all association constants are unitless values. The inclusion of units arises from the simplification that such constants are calculated solely from concentrations, which is not the case. Once chemical activity is factored into the correct form of the equation, a dimensionless value is obtained. For the binding of receptor and ligand molecules in solution, the molar Gibbs free energy ΔG, or the binding affinity is related to the dissociation constant Kd via Δ G = R T ln ⁡ K d c ⊖ {\displaystyle \Delta G=RT\ln {K_{\rm {d}}
{"page_id": 6747488, "title": "Binding constant"}
In crystallography, polymorphism is the phenomenon where a compound or element can crystallize into more than one crystal structure. The preceding definition has evolved over many years and is still under discussion today. Discussion of the defining characteristics of polymorphism involves distinguishing among types of transitions and structural changes occurring in polymorphism versus those in other phenomena. == Overview == Phase transitions (phase changes) that help describe polymorphism include polymorphic transitions as well as melting and vaporization transitions. According to IUPAC, a polymorphic transition is "A reversible transition of a solid crystalline phase at a certain temperature and pressure (the inversion point) to another phase of the same chemical composition with a different crystal structure." Additionally, Walter McCrone described the phases in polymorphic matter as "different in crystal structure but identical in the liquid or vapor states." McCrone also defines a polymorph as "a crystalline phase of a given compound resulting from the possibility of at least two different arrangements of the molecules of that compound in the solid state." These defining facts imply that polymorphism involves changes in physical properties but cannot include chemical change. Some early definitions do not make this distinction. Eliminating chemical change from those changes permissible during a polymorphic transition delineates polymorphism. For example, isomerization can often lead to polymorphic transitions. However, tautomerism (dynamic isomerization) leads to chemical change, not polymorphism. As well, allotropy of elements and polymorphism have been linked historically. However, allotropes of an element are not always polymorphs. A common example is the allotropes of carbon, which include graphite, diamond, and londsdaleite. While all three forms are allotropes, graphite is not a polymorph of diamond and londsdaleite. Isomerization and allotropy are only two of the phenomena linked to polymorphism. For additional information about identifying polymorphism and distinguishing it from other phenomena, see
{"page_id": 3619345, "title": "Crystal polymorphism"}
A Cartesian explosion is an effect that occurs when applying the Cartesian product to multiple sets, which results in geometric growth in the number of outputted combinations. == In database querying == This problem most often occurs in the realm of database querying in languages such as SQL. If a join operator is applied to multiple tables without specifying a join condition (such as a foreign key reference), the resulting data set ends up growing multiplicatively, producing a result that has a row count equal to the product of the row count of all tables involved in the query. For example, if a Customers table has 5 rows and a Products table has 10 rows, running a naive SQL join query such as SELECT * FROM Customers, Products produces a result that has 5×10 (50) rows: every row in the first table is mapped to every row in the second table. If each table had thousands of rows, then doing this query would result in millions of rows of output, which may have severe performance impacts. If more than two tables are involved in the query, the impact is even more pronounced. == References ==
{"page_id": 79446122, "title": "Cartesian explosion"}
and polystyrene. This collector is very responsive - in the sun it heats up rapidly and the air inside starts to convect. If the collector were to be directly connected to the building using a hole near the floor and a hole near the ceiling an indirect solar gain system would be created. One problem with this that, like Trombe walls, the heat would radiate back out at night, and a convection current would chill the room during the night. Instead, the air movement can be stopped using automatic dampers, similar to those used for ventilating foundation spaces in cold climates, or plastic film dampers, which work by blocking air flow in one direction with a very lightweight flap of plastic. The addition of the damper makes the design an efficient isolated solar gain system. == Thermal store == To store the thermal energy from the collector, the Barra system suspends a "spancrete" slab of concrete as a ceiling to store heat. This is fairly expensive and requires strong support. An alternative is to use water, which can store 5 times as much heat for a given weight. A simple, cheap and effective way is to store the water in sealed 100 mm diameter PVC storm pipe with end caps. Whether water or concrete is used, the heat is transferred from the air in the collector into the storage material during the day, and released on demand using a ceiling fan into the room at night. Where "spancrete" slabs are used, the ceiling also heats the house by radiation. Some houses are fitted with louvers (similar to those used on satellites) to adjust the radiation transfer. Warm air travels through the slab tunnels from south to north, where it exits and travels back south through the bulk of the room
{"page_id": 6854110, "title": "Barra system"}
and the Dalai Lama about the relationship between modern science and Buddhism. The Institute continues today as a major nexus for such dialog as well as promoting and supporting multidisciplinary scientific investigation in mind sciences, contemplative scholarship and practice and related areas in the interface of science with meditation and other contemplative practices, especially Buddhist practices. Varela died in 2001 in Paris of Hepatitis C after having written an account of his 1998 liver transplant. Varela had four children, including the actress, environmental spokesperson, and model Leonor Varela. == Work and legacy == Varela was trained as a biologist, mathematician and philosopher through the influence of different teachers, Humberto Maturana and Torsten Wiesel. He wrote and edited a number of books and numerous journal articles in biology, neurology, cognitive science, mathematics, and philosophy. He founded, with others, the Integral Institute, a thinktank dedicated to the cross-fertilization of ideas and disciplines. Varela supported embodied philosophy, viewing human cognition and consciousness in terms of the enactive structures in which they arise. These comprise the body (as a biological system and as personally experienced) and the physical world which it enacts. Varela's work popularized within the field of neuroscience the concept of neurophenomenology. This concept combined the phenomenology of Edmund Husserl and of Maurice Merleau-Ponty, with "first-person science." Neurophenomenology requires observers to examine their own conscious experience using scientifically verifiable methods. In the 1996 popular book The Web of Life: A New Scientific Understanding of Living Systems, physicist Fritjof Capra makes extensive reference to Varela and Maturana's theory of autopoiesis as part of a new, systems-based scientific approach for describing the interrelationships and interdependence of psychological, biological, physical, social, and cultural phenomena. Written for a general audience, The Web of Life helped popularize the work of Varela and Maturana, as well as that
{"page_id": 76989, "title": "Francisco Varela"}
and hydrothermally altered tuffaceous rocks that are part of two distinct eruptive centers, which are interpreted to be the eroded remains of two maars. According to field mapping, aeromagnetic, and gravimetric data, the gabbroic rocks form two concentric ring dikes. The inner ring dike is about 30 metres (98 ft) in width, 3 kilometres (1.9 mi) from the center of the Richat Structure. The outer ring dike is about 70 metres (230 ft) in width, 8 kilometres (5.0 mi) from the center of the structure. Thirty-two carbonatite dikes and sills have been mapped within the structure. The dikes are generally about 300 metres (980 ft) long and typically 1 to 4 metres (3.3 to 13.1 ft) wide. They consist of massive carbonatites that are mostly devoid of vesicles. The carbonatite rocks have been dated as having cooled between 94 and 104 million years ago. A kimberlitic plug and several sills have been found within the northern part of the structure. The kimberlite plug has been dated to around 99 million years old. These intrusive igneous rocks are interpreted as indicating the presence of a large alkaline igneous intrusion that currently underlies the structure and was created by uplifting the overlying rock. Spectacular hydrothermal features are a part of the Richat Structure. They include the extensive hydrothermal alteration of rhyolites and gabbros and a central megabreccia created by hydrothermal dissolution and collapse. The siliceous megabreccia is at least 40 metres (130 ft) thick in its center to only a few meters thick along its edges. The breccia consists of fragments of white to dark gray cherty material, quartz-rich sandstone, diagenetic cherty nodules, and stromatolitic limestone and is intensively silicified. The hydrothermal alteration, which created this breccia, has been dated to have occurred about 98.2 ± 2.6 million years ago using the
{"page_id": 377815, "title": "Richat Structure"}
Messier 9 or M9 (also designated NGC 6333) is a globular cluster in the constellation of Ophiuchus. It is positioned in the southern part of the constellation to the southwest of Eta Ophiuchi, and lies atop a dark cloud of dust designated Barnard 64. The cluster was discovered by French astronomer Charles Messier on June 3, 1764, who described it as a "nebula without stars". In 1783, English astronomer William Herschel was able to use his reflector to resolve individual stars within the cluster. He estimated the cluster to be 7–8′ in diameter with stars densely packed near the center. M9 has an apparent magnitude of 7.9, an angular size of 9.3′, and can be viewed with a small telescope. It is one of the nearer globular clusters to the center of the galaxy as is around 5,500 light-years from the Galactic Center. Its distance from Earth is 25,800 light-years. The total luminosity of this cluster is around 120,000 times that of the Sun, the absolute magnitude being -8.04. The brightest individual stars in M9 are of apparent magnitude 13.5, making them visible in moderately sized telescopes. There have been 24 variable stars found in M9: 21 RR Lyrae variables, plus a long-period variable, Type II Cepheid, and an eclipsing binary. No blue stragglers or SX Phoenicis variables have been discovered. Based upon the periods of the RR Lyr variables, this cluster is classified as an Oosterhoff type II globular, which precludes an extra-galactic origin. At about 80' (1+1⁄3 degrees) to the northeast of M9 is the dimmer globular cluster NGC 6356, while about the same to the southeast is the globular NGC 6342. == Gallery == == See also == List of Messier objects == References == == External links == Messier 9, SEDS Messier pages M9, Galactic Globular
{"page_id": 943630, "title": "Messier 9"}
Upsampling Audio signal processing Audio noise reduction Speech processing Equalization (audio) Digital image processing Geometric transformation Color correction Computer vision Image noise reduction Edge detection Image editing Segmentation Data compression Lossless data compression Lossy data compression Filtering Analog filter Audio filter Digital filter Finite impulse response Infinite impulse response Electronic filter Analogue filter Filter (signal processing) Band-pass filter Band-stop filter Butterworth filter Chebyshev filter High-pass filter Kalman filter Low-pass filter Notch filter Sallen Key filter Wiener filter Transforms Advanced Z-transform Bilinear transform Continuous Fourier transform Discrete cosine transform Discrete Fourier transform, Fast Fourier transform (FFT) Discrete sine transform Fourier transform Hilbert transform Laplace transform, Two-sided Laplace transform Z-transform === Instrumentation === Actuator Electric motor Oscilloscope === Telecommunication === Telecommunication Telephone Pulse-code modulation (PCM) Main distribution frame (MDF) Carrier system Mobile phone Wireless network Optical fiber Modulation Carrier wave Communication channel Information theory Error correction and detection Digital television Digital audio broadcasting Satellite radio Satellite == Electrical engineering occupations == Occupations in electrical/electronics engineering Electrical Technologist == Electrical engineering organizations == International Electrotechnical Commission (IEC) == Electrical engineering publications == IEEE Spectrum IEEE series of journals Hawkins Electrical Guide Iterative Receiver Design Journal of Electrical Engineering [1] == Persons influential in electrical engineering == List of electrical engineers and their contributions List of Russian electrical engineers == See also == Index of electrical engineering articles Outline of engineering == References == == External links == International Electrotechnical Commission (IEC) MIT OpenCourseWare in-depth look at Electrical Engineering - online courses with video lectures. IEEE Global History Network A wiki-based site with many resources about the history of IEEE, its members, their professions and electrical and informational technologies and sciences.
{"page_id": 1506069, "title": "Outline of electrical engineering"}
Daniel Turner Britt is Pegasus Professor of Astronomy and Planetary Sciences at the University of Central Florida (UCF). He studies the composition and mineralogy of bodies within the Solar System including the Moon, Mars and the asteroids. He has worked on four NASA missions and has an asteroid named after him: 4395 Danbritt. In 2022, the American Society of Civil Engineers awarded him their Outstanding Technical Contribution Award for his work at the Exolith Lab at UCF which has produced tons of "space dirt" – synthetic regolith which reproduces the properties of the surface material on other worlds such as Mars. == References ==
{"page_id": 72061158, "title": "Dan Britt"}
error. Discussion: Validating the binding of the information reviewer identity to the information at transfer or release points prevents the unauthorized modification of information between review and the transfer or release. The validation of bindings can be achieved by using cryptographic checksums. Organizations determine if validations are in response to user requests or generated automatically. Related Controls: AC-4 , AC-16 . (5) NON - REPUDIATION | DIGITAL SIGNATURES [Withdrawn: Incorporated into SI-7 .] References: [ FIPS 140-3 ], [ FIPS 180-4 ], [ FIPS 186-4 ], [ FIPS 202 ], [ SP 800-177 ]. AU-11 AUDIT RECORD RETENTION Control: Retain audit records for [ Assignment: organization-defined time period consistent with records retention policy ] to provide support for after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirements. Discussion: Organizations retain audit records until it is determined that the records are no longer needed for administrative, legal, audit, or other operational purposes. This includes the retention and availability of audit records relative to Freedom of Information Act (FOIA) requests, subpoenas, and law enforcement actions. Organizations develop standard categories of audit records relative to such types of actions and standard response processes for each type of action. The National Archives and Records Administration (NARA) General Records Schedules provide federal policy on records retention. Related Controls: AU-2 , AU-4 , AU-5 , AU-6 , AU-9 , AU-14 , MP-6 , RA-5 , SI-12 . Control Enhancements: (1) AUDIT RECORD RETENTION | LONG - TERM RETRIEVAL CAPABILITY Employ [ Assignment: organization-defined measures ] to ensure that long-term audit records generated by the system can be retrieved. Discussion: Organizations need to access and read audit records requiring long-term storage (on the order of years). Measures employed to help facilitate the retrieval of audit records include converting records to newer formats, retaining
{"source": 985, "title": "from dpo"}
computers. Figure 6.2 shows the average job uses hundreds of servers. Other than a few highly tuned applications from high-performance computing, such MapReduce jobs are the most parallel applications today, whether measured in total CPU time or number of servers utilized. Here is a MapReduce program that calculates the number of occurrences of every English word in a large collection of documents. Following is a simplified version of that program, which shows just the inner loop and that assumes only one occurrence of all English words found in a document (Dean and Ghemawat, 2008): Month Number of MapReduce Jobs Average completion time (s) Average no. servers per job Avg. no. cores per server CPU core years Input data (PB) Intermediate data (PB) Output data (PB) Sep-16 95,775,891 331 130 2.4 311,691 11,553 4095 6982 Sep-15 115,375,750 231 120 2.7 272,322 8307 3980 5801 Sep-14 55,913,646 412 142 1.9 200,778 5989 2530 3951 Sep-13 28,328,775 469 137 1.4 81,992 2579 1193 1684 Sep-12 15,662,118 480 142 1.8 60,987 2171 818 874 Sep-11 7,961,481 499 147 2.2 40,993 1162 276 333 Sep-10 5,207,069 714 164 1.6 30,262 573 139 37 Sep-09 4,114,919 515 156 3.2 33,582 548 118 99 Sep-07 2,217,000 395 394 1.0 11,081 394 34 14 Mar-06 171,000 874 268 1.6 2002 51 7 3Aug-04 29,000 634 157 1.9 217 3.2 0.7 0.2 Figure 6.2 Monthly MapReduce usage at Google from 2004 to 2016. Over 12 years the number of MapReduce jobs increased by a factor of 3300. Figure 6.17 on page 461 estimates that running the September 2016 workload on Ama-zon ’s cloud computing service EC2 would cost $114 million. Updated from Dean, J., 2009. Designs, lessons and advice from building large distributed systems [keynote address]. In: Proceedings of 3rd ACM SIGOPS International Workshop on Large-Scale Distributed Systems and
{"source": 2300, "title": "from dpo"}
commander Joi force mastie component commaler Soin Feguoncy Managemeat Office Joi force package (ackazing) Joint Foci Release Board Joi nce requiremcas generator pin farce surgson Joi force spoil operations component commander Joint Federal wavel egulations ‘oie Facilites Utlizaton Boa Jointinspection Jeianegeatd ideas tem Jeiatinteragency tsk force (DOD) Jointinteragency taskforce Eas Joiatiaeragency tsk force - South Jointinteragency tsk farce - West Seiaafosstion bureau Jointineigene center Jeiaaforstion conus eater Jeiatauerace coool cer Toit ataligenee Cte, Paiie Jia atnogaio aa deiting center ein ateroperbilaycnginceringweysnization Appendix A As Amended Through 23 January 2002 uP us mE MP ier ins ntaces, nor ore nes pe nen. Tse me ce TUNCHREP: ors ure Iviss Twaars uo as nar Ic Ince nas cous, Me IMEMSo Mer Iver IMU atc cs IME MP ure ae wna Io. MOAN) Ine ra Jeiatincligence estimate fr planing Joint introperabilty evaluation system Jointinligeac aisen element Joint implement mss plan join india mobizaton planing pecess Jpintinfonnanon management sys, Join Interoperability of Tasca Command ad Coat Systems Joint intetae operational pcos Joinineriace operating rocednes-messag ext fomats Joint inteligence reparton ofthe atespace Joinimagery production comptes Joint iategrated priocized gest Join ineligence suppot lent 5oininteroperaiy test command Joint ihterage conto ener Join unc report Joint logics ove-the shore Joint logistics eadness center Joint modeling and simulation Join model afer action seview system Joint merry sisi; joint montuary fi ocer Joint manposeraumation system Joint maby assistance team Joint mtr command joint movemeat centr Joint Mailty Consol Group jin ane command information system Join mane communications systens Joint Munitions Eifectiveness Mana Join Muntons sfciveness Mana Special Operations Joint mission ese task Joint mission essential task st Jeintmetoolecal and eceanaprpic(METOC)foceast Joint Mitty tneigene Calle Joint Wodkide nteligonce Communications System (OWICS) mobile itegrted communications syst Joint marin infomation ment Join mtr inligene program Join Military nelligence Tesining Center Joint Materia
{"source": 4965, "title": "from dpo"}
attacks, as well as rotational and rotational-differential attacks. Besides, the notion of c-differentials on S-boxes can be analyzed as a special case within this framework. We discuss the relations between a general notion of commutative cryptanalysis, with A and B being arbitrary functions over a finite Abelian group, and differential cryptanalysis, both from the view of conducting an attack on a symmetric cryptographic primitive, as well as from the view of a theoretical study of cryptographic S-boxes. Similar content being viewed by others Survey on recent trends towards generalized differential and boomerang uniformities Article 03 December 2021 Differential attacks: using alternative operations Article 12 July 2018 Can a Differential Attack Work for an Arbitrarily Large Number of Rounds? Chapter © 2021 Explore related subjects Discover the latest articles and news from researchers in related subjects, suggested using machine learning. Commutative Rings and Algebras Cryptology Differential Geometry Discrete Mathematics Logical Analysis Linear Algebra 1 Introduction Symmetric cryptography is a crucial building block for protecting our everyday communication. The security of symmetric cryptographic primitives is measured by the absence of any discovered attack through years of public scrutiny by the scientific community and should be supported by arguments why known classes of attacks do not apply. One of the most promising and widely-studied attack vectors is differential cryptanalysis , a statistical attack that aims to break a cipher by tracing the propagation of pairs of inputs ( 𝑥 , 𝑥 + 𝛼 ) for a fixed input difference 𝛼 . In a nutshell, a family of permutations ( 𝐸 𝑘 ) 𝑘 is considered broken by differential cryptanalysis if there exists a non-zero input difference 𝛼 and an output difference 𝛽 for which the probability (originally taken over all keys k and inputs x) that 𝐸 𝑘 ( 𝑥 + 𝛼 )
{"source": 6279, "title": "from dpo"}
together by gravity. Clusters of galaxies are often dominated by a single giant elliptical galaxy, known as the brightest cluster galaxy, which, over time, tidally destroys its satellite galaxies and adds their mass to its own. Superclusters contain tens of thousands of galaxies, which are found in clusters, groups and sometimes individually. At the supercluster scale, galaxies are arranged into sheets and filaments surrounding vast empty voids. Above this scale, the universe appears to be the same in all directions (isotropic and homogeneous), though this notion has been challenged in recent years by numerous findings of large-scale structures that appear to be exceeding this scale. The Hercules–Corona Borealis Great Wall, currently the largest structure in the universe found so far, is 10 billion light-years (three gigaparsecs) in length. The Milky Way galaxy is a member of an association named the Local Group, a relatively small group of galaxies that has a diameter of approximately one megaparsec. The Milky Way and the Andromeda Galaxy are the two brightest galaxies within the group; many of the other member galaxies are dwarf companions of these two. The Local Group itself is a part of a cloud-like structure within the Virgo Supercluster, a large, extended structure of groups and clusters of galaxies centered on the Virgo Cluster. In turn, the Virgo Supercluster is a portion of the Laniakea Supercluster. == Magnetic fields == Galaxies have magnetic fields of their own. A galaxy's magnetic field influences its dynamics in multiple ways, including affecting the formation of spiral arms and transporting angular momentum in gas clouds. The latter effect is particularly important, as it is a necessary factor for the gravitational collapse of those clouds, and thus for star formation. The typical average equipartition strength for spiral galaxies is about 10 μG (microgauss) or 1 nT
{"page_id": 12558, "title": "Galaxy"}
not completely. For instance, if a Japanese maple (Acer palmatum) is given an "eternal summer" through exposure to additional daylight, it grows continuously for as long as two years. Eventually, however, a temperate-climate plant automatically goes dormant, no matter what environmental conditions it experiences. Deciduous plants lose their leaves; evergreens curtail all new growth. Going through an "eternal summer" and the resultant automatic dormancy is stressful to the plant and usually fatal. The fatality rate increases to 100% if the plant does not receive the necessary period of cold temperatures required to break the dormancy. Most plants require a certain number of hours of "chilling" at temperatures between about 0 °C and 10 °C to be able to break dormancy (Bewley, Black, K.D 1994). Short photoperiods induce dormancy and permit the formation of needle primordia. Primordia formation requires 8 to 10 weeks and must be followed by 6 weeks of chilling at 2 °C. Bud break occurs promptly if seedlings are then exposed to 16-hour photoperiods at the 25 °C/20 °C temperature regime. The free growth mode, a juvenile characteristic that is lost after 5 years or so, ceases in seedlings experiencing environmental stress. == Bacteria == Many bacteria can survive adverse conditions such as temperature, desiccation, and antibiotics by forming endospores, cysts, or general states of reduced metabolic activity lacking specialized cellular structures. Up to 80% of the bacteria in samples from the wild appear to be metabolically inactive—many of which can be resuscitated. Such dormancy is responsible for the high diversity levels of most natural ecosystems. Bacteria enter a state of reduced metabolic activity not only during stress, but also when a bacterial population has reached a stable state. Many bacteria are capable of producing proteins called hibernation factors which can bind to and inactivate their ribosomes, pausing
{"page_id": 233579, "title": "Dormancy"}
An amylase () is an enzyme that catalyses the hydrolysis of starch (Latin amylum) into sugars. Amylase is present in the saliva of humans and some other mammals, where it begins the chemical process of digestion. Foods that contain large amounts of starch but little sugar, such as rice and potatoes, may acquire a slightly sweet taste as they are chewed because amylase degrades some of their starch into sugar. The pancreas and salivary gland make amylase (alpha amylase) to hydrolyse dietary starch into disaccharides and trisaccharides which are converted by other enzymes to glucose to supply the body with energy. Plants and some bacteria also produce amylase. Specific amylase proteins are designated by different Greek letters. All amylases are glycoside hydrolases and act on α-1,4-glycosidic bonds. == Classification == === α-Amylase === The α-amylases (EC 3.2.1.1 ) (CAS 9014–71–5) (alternative names: 1,4-α-D-glucan glucanohydrolase; glycogenase) are calcium metalloenzymes. By acting at random locations along the starch chain, α-amylase breaks down long-chain saccharides, ultimately yielding either maltotriose and maltose from amylose, or maltose, glucose and "limit dextrin" from amylopectin. They belong to glycoside hydrolase family 13 (https://www.cazypedia.org/index.php/Glycoside_Hydrolase_Family_13). Because it can act anywhere on the substrate, α-amylase tends to be faster-acting than β-amylase. In animals, it is a major digestive enzyme, and its optimum pH is 6.7–7.0. In human physiology, both the salivary and pancreatic amylases are α-amylases. The α-amylase form is also found in plants, fungi (ascomycetes and basidiomycetes) and bacteria (Bacillus). === β-Amylase === Another form of amylase, β-amylase (EC 3.2.1.2 ) (alternative names: 1,4-α-D-glucan maltohydrolase; glycogenase; saccharogen amylase) is also synthesized by bacteria, fungi, and plants. Working from the non-reducing end, β-amylase catalyzes the hydrolysis of the second α-1,4 glycosidic bond, cleaving off two glucose units (maltose) at a time. During the ripening of fruit, β-amylase breaks starch into
{"page_id": 63552, "title": "Amylase"}
Cunife is an alloy of copper (Cu), nickel (Ni), iron (Fe), and in some cases cobalt (Co). The alloy has the same linear coefficient of expansion as certain types of glass, and thus makes an ideal material for the lead out wires in light bulbs and thermionic valves. Fernico exhibits a similar property. It is a magnetic alloy and can be used for making magnets. Cunife has a magnetic coercivity of several hundred oersteds. Unlike most high coercivity magnetic materials which are hard and brittle and need to be cast into shape, cunife can be drawn into thin wires. Wires as thin as five thou can be produced this way. Thicker rods of the material can be threaded which is also something that is not possible with the more commonly used magnetic materials. In the early 1970s, Fender Musical Instruments Corporation used Cunife magnets in their Wide Range humbucker pickups, however they discontinued use, due to Cunife being hard to source. Fender began producing cunife pickups again in 2020. == Typical compositions == Given in weight % == References == == External links == National Pollutant Inventory - Copper and compounds fact sheet
{"page_id": 549779, "title": "Cunife"}
measured quantities used in the calculation. For example, 1.234 × 2 = 2.468 ≈ 2 1.234 × 2.0 = 2.468 ≈ 2.5 0.01234 × 2 = 0.02468 ≈ 0.02 0.012345678 / 0.00234 = 5.2759 ≈ 5.28 with one, two, and one significant figures respectively. (2 here is assumed not an exact number.) For the first example, the first multiplication factor has four significant figures and the second has one significant figure. The factor with the fewest or least significant figures is the second one with only one, so the final calculated result should also have one significant figure. ==== Exception ==== For unit conversion, the implied uncertainty of the result can be unsatisfactorily higher than that in the previous unit if this rounding guideline is followed; For example, 8 inch has the implied uncertainty of ± 0.5 inch = ± 1.27 cm. If it is converted to the centimeter scale and the rounding guideline for multiplication and division is followed, then 20.32 cm ≈ 20 cm with the implied uncertainty of ± 5 cm. If this implied uncertainty is considered as too overestimated, then more proper significant digits in the unit conversion result may be 20.32 cm ≈ 20. cm with the implied uncertainty of ± 0.5 cm. Another exception of applying the above rounding guideline is to multiply a number by an integer, such as 1.234 × 9. If the above guideline is followed, then the result is rounded as 1.234 × 9.000.... = 11.106 ≈ 11.11. However, this multiplication is essentially adding 1.234 to itself 9 times such as 1.234 + 1.234 + … + 1.234 so the rounding guideline for addition and subtraction described below is more proper rounding approach. As a result, the final answer is 1.234 + 1.234 + … + 1.234 = 11.106 =
{"page_id": 317062, "title": "Significant figures"}
as the transmission medium in local and long-haul optical communication systems. === Mechanisms of attenuation === Attenuation in fiber optics, also known as transmission loss, is the reduction in intensity of the light beam (or signal) with respect to distance traveled through a transmission medium. It is an important factor limiting the transmission of a signal across large distances. Attenuation coefficients in fiber optics usually use units of dB/km through the medium due to the very high quality of transparency of modern optical transmission media. The medium is usually a fiber of silica glass that confines the incident light beam to the inside. In optical fibers, the main source of attenuation is scattering from molecular level irregularities, called Rayleigh scattering, due to structural disorder and compositional fluctuations of the glass structure. This same phenomenon is seen as one of the limiting factors in the transparency of infrared missile domes. Further attenuation is caused by light absorbed by residual materials, such as metals or water ions, within the fiber core and inner cladding. Light leakage due to bending, splices, connectors, or other outside forces are other factors resulting in attenuation. At high optical powers, scattering can also be caused by nonlinear optical processes in the fiber. == As camouflage == Many marine animals that float near the surface are highly transparent, giving them almost perfect camouflage. However, transparency is difficult for bodies made of materials that have different refractive indices from seawater. Some marine animals such as jellyfish have gelatinous bodies, composed mainly of water; their thick mesogloea is acellular and highly transparent. This conveniently makes them buoyant, but it also makes them large for their muscle mass, so they cannot swim fast, making this form of camouflage a costly trade-off with mobility. Gelatinous planktonic animals are between 50 and 90
{"page_id": 351077, "title": "Transparency and translucency"}
102 Herculis is a single star in the northern constellation of Hercules. It is visible to the naked eye as a faint, blue-white hued star with an apparent visual magnitude of 4.37. Based upon parallax measurements, it is located around 920 light years away from the Sun. The star is moving closer to the Earth with a heliocentric radial velocity of −15 km/s. The stellar classification of this object matches a massive, early B-type star with a luminosity class of IV or V, corresponding to a subgiant or main sequence star, respectively. It is 20 million years old with nearly ten times the mass of the Sun and is spinning with a projected rotational velocity of 41 km/s. The strength of the stellar magnetic field has been measured at (209.5±135.4)×10−4 T. The star is radiating 3,632 times the Sun's luminosity from its photosphere at an effective temperature of 22,420 K. == Etymology == In Chinese, 帛度 (Bó Dù), meaning Textile Ruler, refers to an asterism consisting of 102 Herculis and 95 Her.Consequently, 102 Herculis itself is known as 帛度二 (Bó Dù èr, English: the Second Star of Textile Ruler.) This star, together with 93 Her, 95 Her, and 109 Her, formed the now obsolete constellation of Cerberus. == References ==
{"page_id": 37092534, "title": "102 Herculis"}
HCUP-US website: https://www.hcup-us.ahrq.gov/tools_software.jsp. ==== Surgery Flags ==== Surgery Flag Software classifies procedures and encounters in ICD-9-CM or CPT-based inpatient and ambulatory surgery into two types of surgical categories: NARROW and BROAD. NARROW surgery is based on a narrow, targeted, and restrictive definition and includes invasive surgical procedures. An invasive therapeutic surgical procedure involves incision, excision, manipulation, or suturing of tissue that penetrates or breaks the skin; typically requires use of an operating room; and requires regional anesthesia, general anesthesia, or sedation to control pain. BROAD surgery includes procedures that fall under the NARROW category but adds less invasive therapeutic surgeries and diagnostic procedures often performed in surgical settings. Users must agree to a license agreement with the American Medical Association to use the Surgery Flags before accessing the software. The Surgery Flags are available for download from the HCUP-US website: https://www.hcup-us.ahrq.gov/tools_software.jsp. ==== AHRQ Quality Indicators (QIs) ==== The AHRQ Quality Indicators (QIs) (https://www.qualityindicators.ahrq.gov/) are standardized, evidence-based measures of healthcare quality that can be used with readily available hospital inpatient administrative data to measure and track clinical performance and outcomes. The AHRQ QIs consist of four modules measuring various aspects of quality: Prevention Quality Indicators (PQIs) identify issues of access to outpatient care, including appropriate followup care after hospital discharge. More specifically, the PQIs use data from hospital discharges to identify admissions that might have been avoided through access to high-quality outpatient care. The PQIs are population based and adjusted for covariates. Inpatient Quality Indicators (IQIs) provide a perspective on quality of care inside hospitals, including: Inpatient mortality for surgical procedures and medical conditions; Utilization of procedures for which there are questions of overuse, underuse, and misuse; and Volume of procedures for which hospital procedure volume is an important indicator of performance. Patient Safety Indicators (PSIs) provide information on potentially avoidable
{"page_id": 23762941, "title": "Healthcare Cost and Utilization Project"}
26.1 years. The predicted interbirth intervals would range from 6 to 8.4 years. Assuming some form or allomaternal care as early as A. afarensis, first age of reproduction comes down to 10.9 years and interbirth intervals are reduced to approximately 3.4 years. For Qafzeh H. sapiens, first age of reproduction is reduced to 22.6 years and interbirth intervals are around 4.7 years. Based on their study, Isler and van Shaik conclude that a change in lifestyle resulting in substantial increases in allomothering occurred early in the Homo genus. This implies that cooperative breeding has been an important part of human history for nearly two million years. Demographic reconstructions of hunter-gatherer populations in the Pleistocene attempt to analyze the probability of having allomothers in a community and rely on assumptions about residential patterns in early humans. Kurland and Sparks (pers. comm. In Hrdy, 2006) provide estimates of several relatives' presence assuming different mortality rates. Under low mortality rates, the chance of primipara, a woman giving birth to her first child, having her mother around is around 50% and under high mortality rates the chance drops to 25%. The chance of having an older sibling around is much higher, as are the chances of having cousins. While this indicates that a new mother would have a least some close kin nearby to help with childcare, residential patterns may change these likelihoods. If humans were majority patrilocal, where males remain in natal groups and females disperse, we would expect lower maternal kin available for allomaternal assistance. This suggesting that mothers would need to rely more on paternal kin and unrelated individuals as potential allomothers, or for at least some of the mother's kin to temporarily reside with the parents during periods of high need. However, we know that humans are ambilocal or bilocal,
{"page_id": 67578931, "title": "Allomothering in humans"}
genetics and to study gene–environment interactions. It is possible to accumulate extensive genetic and phenotype data for each member of a family of recombinant inbred strains under several different conditions (e.g., baseline environment versus stressful environment). Each strain has a single fixed genome and it is also possible to resample a given genotype multiple times in multiple environments to obtain highly accurate estimates of genetic and environmental effects and their interactions. == Genetics == Chromosomes of recombinant inbred strains typically consist of alternating haplotypes of highly variable length that are inherited intact from the parental strains. In the case of a typical mouse recombinant inbred strain made by crossing maternal strain BALB/cBy (C) with paternal strain C57BL/6By (B) called a CXB recombinant inbred strain, a chromosome will typically incorporate 2 to 5 alternating haplotype blocks with underlying genotypes such as BBBBBCCCCBBBCCCCCCCC, where each letter represents a single genotype (e.g. a SNP), where series of identical genotypes represent haplotypes, and where a transition between haplotypes represents a recombination event between the parental genomes. Both chromosomes (in any given chromosome pair) will have the same alternating pattern of haplotypes, and all markers will be homozygous. Each of the different chromosomes (Chr 1, Chr 2, etc.) will have a different pattern of haplotypes and recombinations. The only exception is that the Y chromosome and the mitochondrial genome, both of which are inherited intact from the paternal and maternal strain, respectively. For an RI strain to be useful for mapping purposes, the approximate position of recombinations along each chromosome need to be well defined either in terms of centimorgan or DNA basepair position. The precision with which these recombinations are mapped is a function of the number and position of the genotypes used to type the chromosomes – 20 in the example above. ==
{"page_id": 28820815, "title": "Recombinant inbred strain"}
A P LpRℓ ˆ V q.31 These isometric properties of π hold for several different norms in Rℓ ˆ V and LpRℓ ˆ V q with the corresponding norms in the space Rn of n-tuple of numbers and the space Rnˆn of n ˆ n matrices. It follows that > T ÿ > t“1 }Qf t}2 “ trace ˜ Tÿ > t“1 pftqp ftq1 ¸ , since }Qf t}2 “ } pftq}2 for t “ 1, . . . , T . > 31 Here we use as elsewhere in the paper the same generic notation } ¨ } to denote distinctive norms in various spaces. This convention is also adopted throughout the paper. 43 We may make the FR-squared as large as we want simply by increasing the truncation number m in any basis pvi`ℓqmi“1. However, this does not come at no cost. As m gets large, the variance of the estimator pA for the autoregressive operator A is expected to increase. It increases often very sharply in many practical applications, and therefore, we also need to examine how fast the variance of pA increases as m gets large. Here, we focus on the integrated variance of pAHH trace ” p pAHH ´ E pAHH q1p pAHH ´ E pAHH q ı conditional on all other components of pA introduced in Section 2.3, which can be consis-tently estimated by ” trace ppΣq ı »–trace ˜ Tÿ > t“1 pftqp ftq ¸´1fi fl . See Chang et al. (2021b) for more details. We let IVAR “ trace ˜ Tÿ > t“1 pftqp ftq ¸´1 in what follows. To show how important it is in practice to choose a basis, we obtain and compare the FR-squared’s and the IVARs based on our basis pv˚ > i`ℓ qmi“1 and other bases. As
{"source": 1206, "title": "from dpo"}
result we derived previously in Section 4.2.3. Therefore, if Q = [ qk], then [φTi A−1φi] = diag ( ΦA−1ΦT ) = > d ∑ > k=1 (qk)2, where ( qk)2 denotes the pointwise multiplication of qk with itself. Given that w is determined by a QR decomposition, the additional cost of LOO cross-validation is negligible. 188 10 Model Selection and Evaluation Chapter 11 # Dimensionality Reduction In many, if not most real-world machine learning problems, data cases are most naturally represented in terms of very high-dimensional vectors. Our canon-ical handwritten digits recognition problem is rather on the low end in this respect. High-resolution images have millions of pixels. In speech recognition, audio waveforms are represented by a large number of windowed Fourier trans-form features. Text documents are commonly represented as count vectors w.r.t. some dictionary, which for realistic corpora contains hundreds of thousands of words. If learning theory tells us one thing, it is that learning in such huge-dimensional spaces is impossible in general. A practical way out of this dilemma is to reduce the dimensionality of attributes by some form of feature mapping. In this chapter, we will learn to know some of the most widely used linear dimensionality reduction techniques. Principal components analysis is among the most fundamental of all techniques used in machine learning, and we will cover it in some detail. Linear dimensionality reduction techniques are typically based on the eigendecomposition of certain sample covariance matrices, and this foundation will be studied in detail. Other more advanced machine learn-ing techniques share the same mathematical foundations: spectral clustering, manifold learning, multi-dimensional scaling and metric embedding techniques for visualization. # 11.1 Principal Components Analysis In this section, we discuss the most important dimensionality reduction tech-nique in machine learning and statistics: principal components analysis (PCA). In Section 11.1.1,
{"source": 3662, "title": "from dpo"}
spread. By considering different random and non-random networks, we describe various properties of this new model (e.g., the critical probability of infection and the confidence threshold), and compare it to other types of bootstrap percolation from the literature, such as _U_-bootstrap percolation. Ultimately, we describe its implications when applied to rumor spread, fake news, and marketing strategies, along with potential future applications in modeling the spread of genetic diseases. ### 169) Stanley Wang, Connectedness of the Moduli Space of Genus 1 Planar Tropical Curves !Image 377 Aayush Karan, Generating Set for Nonzero Determinant Links Under Skein Relation, published in Topology and its Applications ![Image 378]( Traditionally introduced in terms of advanced topological constructions, many link invariants may also be defined in much simpler terms given their values on a few initial links and a recursive formula on a skein triangle. Then the crucial question to ask is how many initial values are necessary to completely determine such a link invariant. We focus on a specific class of invariants known as nonzero determinant link invariants, defined only for links which do not evaluate to zero on the link determinant.
{"source": 5874, "title": "from dpo"}
A.1.2.1 Get the Seed The following process or its equivalent shall be used to generate the seed for this method: Input: nlen The intended bit length of the modulus n. Output: status The status to be returned, where status is either SUCCESS or FAILURE .FIPS 186-5 D IGITAL SIGNATURE S TANDARD (DSS) 36 seed The seed. If status = FAILURE , a value of zero is returned as the seed . Process: 1. If nlen is not valid (see Section 5.1), then Return ( FAILURE , 0). 2. Let security_strength be the security strength associated with nlen as specified in SP 800-57, Part 1. 3. Obtain a string seed of at least (2 × security_strength ) bits from a DRBG that supports the security_strength . 4. Return ( SUCCESS , seed ). A.1.2.2 Construction of the Provable Primes p and q The following process or its equivalent shall be used to construct the random primes p and q (to be used as factors of the RSA modulus n) that are provably prime: Input: nlen The intended bit length of the modulus n. e The public verification exponent. seed The seed obtained using the method in Appendix A.1.2.1. Output: status The status of the generation process, where status is either SUCCESS or FAILURE . When FAILURE is returned, zero values shall be returned as the other parameters. p and q The private prime factors of n. Process: 1. If nlen < 2048, then return ( FAILURE , 0, 0). 2. If (( e ≤ 2 16 ) OR ( e ≥ 2256 ) OR ( e is not odd)), then return ( FAILURE , 0, 0). 3. Set the value of security_strength in accordance with the value of nlen as specified in SP 800-57, Part 1. 4. If ( len (seed
{"source": 6721, "title": "from dpo"}
pathologist's interpretation of a biopsy is critical to establishing the diagnosis of a benign or malignant tumor, and can differentiate between different types and grades of cancer, as well as determining the activity of specific molecular pathways in the tumor. Surgical resection specimens are obtained by the therapeutic surgical removal of an entire diseased area or organ (and occasionally multiple organs). These procedures are often intended as definitive surgical treatment of a disease in which the diagnosis is already known or strongly suspected, but pathological analysis of these specimens remains important in confirming the previous diagnosis. === Clinical pathology === Clinical pathology is a medical specialty that is concerned with the diagnosis of disease based on the laboratory analysis of bodily fluids such as blood and urine, as well as tissues, using the tools of chemistry, clinical microbiology, hematology and molecular pathology. Clinical pathologists work in close collaboration with medical technologists, hospital administrations, and referring physicians. Clinical pathologists learn to administer a number of visual and microscopic tests and an especially large variety of tests of the biophysical properties of tissue samples involving automated analysers and cultures. Sometimes the general term "laboratory medicine specialist" is used to refer to those working in clinical pathology, including medical doctors, Ph.D.s and doctors of pharmacology. Immunopathology, the study of an organism's immune response to infection, is sometimes considered to fall within the domain of clinical pathology. ==== Hematopathology ==== Hematopathology is the study of diseases of blood cells (including constituents such as white blood cells, red blood cells, and platelets) and the tissues, and organs comprising the hematopoietic system. The term hematopoietic system refers to tissues and organs that produce and/or primarily host hematopoietic cells and includes bone marrow, the lymph nodes, thymus, spleen, and other lymphoid tissues. In the United States, hematopathology
{"page_id": 48791, "title": "Pathology"}
(e.g. abrasives) than throw-action sieve shakers. === Wet === Most sieve analyses are carried out dry. But there are some applications which can only be carried out by wet sieving. This is the case when the sample which has to be analysed is e.g. a suspension which must not be dried; or when the sample is a very fine powder which tends to agglomerate (mostly < 45 μm) – in a dry sieving process this tendency would lead to a clogging of the sieve meshes and this would make a further sieving process impossible. A wet sieving process is set up like a dry process: the sieve stack is clamped onto the sieve shaker and the sample is placed on the top sieve. Above the top sieve a water-spray nozzle is placed which supports the sieving process additionally to the sieving motion. The rinsing is carried out until the liquid which is discharged through the receiver is clear. Sample residues on the sieves have to be dried and weighed. When it comes to wet sieving it is very important not to change the sample in its volume (no swelling, dissolving or reaction with the liquid). === Air Circular Jet === Air jet sieving machines are ideally suited for very fine powders which tend to agglomerate and cannot be separated by vibrational sieving. The reason for the effectiveness of this sieving method is based on two components: A rotating slotted nozzle inside the sieving chamber and a powerful industrial vacuum cleaner which is connected to the chamber. The vacuum cleaner generates a vacuum inside the sieving chamber and sucks in fresh air through the slotted nozzle. When passing the narrow slit of the nozzle the air stream is accelerated and blown against the sieve mesh, dispersing the particles. Above the mesh,
{"page_id": 7320365, "title": "Sieve analysis"}
disability. == Diagnosis == Questionnaires which address common listening problems can be used to identify individuals who may have auditory processing disorder, and can help in the decision to pursue clinical evaluation. One of the most common listening problems is speech recognition in the presence of background noise. According to the respondents who participated in a study by Neijenhuis, de Wit, and Luinge (2017), symptoms of APD which are characteristic in children with listening difficulties, and are typically problematic with adolescents and adults, include: Difficulty hearing in noisy environments Auditory attention problems Understanding speech more easily in one-on-one situations Difficulties in noise localization Difficulties in remembering oral information According to the New Zealand Guidelines on Auditory Processing Disorders (2017), the following checklist of key symptoms of APD or comorbidities can be used to identify individuals who should be referred for audiological and APD assessment: Difficulty following spoken directions unless they are brief and simple Difficulty attending to and remembering spoken information Slowness in processing spoken information Difficulty understanding in the presence of other sounds Overwhelmed by complex or "busy" auditory environments e.g. classrooms, shopping malls Poor listening skills Insensitivity to tone of voice or other nuances of speech Acquired brain injury History of frequent or persistent middle ear disease (otitis media, "glue ear"). Difficulty with language, reading, or spelling Suspicion or diagnosis of dyslexia Suspicion or diagnosis of language disorder or delay Finally, the New Zealand guidelines state that behavioral checklists and questionnaires should only be used to provide guidance for referrals, for information gathering (for example, prior to assessment or as outcome measures for interventions), and as measures to describe the functional impact of auditory processing disorder. They are not designed for the purpose of diagnosing auditory processing disorders. The New Zealand guidelines indicate that a number of questionnaires
{"page_id": 12328438, "title": "Auditory processing disorder"}
An event tree is an inductive analytical diagram in which an event is analyzed using Boolean logic to examine a chronological series of subsequent events or consequences. For example, event tree analysis is a major component of nuclear reactor safety engineering. An event tree displays sequence progression, sequence end states and sequence-specific dependencies across time. == Analytical tool == Event tree analysis is a logical evaluative process which works by tracing forward in time or forwards through a causal chain to model risk. It does not require the premise of a known hazard. An event tree is an inductive investigatory process. In contrast, the Fault tree analysis (FTA) evaluates risk by tracing backwards in time or backwards through a cause chain. The analysis takes as a premise a given hazard. FTA is a deductive investigatory process. == Applications == An event tree may start from a specific initiator such as loss of critical supply, or component failure. Some industries use both fault trees and event trees. Software has been created for fault tree analysis and event tree analysis and is licensed for use at the world's nuclear power plants for Probabilistic Safety Assessment. == See also == Event structure Root cause analysis Ishikawa diagram Why-Because analysis Failure mode and effects analysis (FMEA) == Notes == == References == National Research Council (US), Committee on Environmental Impacts Associated with Commercialization of Transgenic Plants, Board on Agriculture and Natural Resources, Division on Earth and Life Studies. (2002). Environmental Effects of Transgenic Plants: the Scope and Adequacy of Regulation. Washington, D.C.: National Academy Press. ISBN 9780309082631; OCLC 231950695 Wang, John X. and Marvin L. Roush. (2000). What Every Engineer Should Know About Risk Engineering and Management. London: CRC Press. ISBN 9781420026962; OCLC 5030452
{"page_id": 16812320, "title": "Event tree"}
part: a timing-belt tensioner. In April 2009, electronic circuit boards were produced automatically with a RepRap, using an automated control system and a swappable head system capable of printing both plastic and conductive solder. On 2 October 2009, the second generation design, called Mendel, printed its first part. Mendel's shape resembles a triangular prism rather than a cube. Mendel was completed in October 2009. On 27 January 2010, the Foresight Institute announced the "Kartik M. Gada Humanitarian Innovation Prize" for the design and construction of an improved RepRap. On 31 August 2010, the third generation design was named Huxley. It was a miniature of Mendel, with 30% of the original print volume. Within two years, RepRap and RepStrap building and use were widespread in the technology, gadget and engineering communities. In 2012, the first successful Delta design, Rostock, had a radically different design. The latest iterations used OpenBeams, wires (typically Dyneema or Spectra fishing lines) instead of belts, and so forth, which also represented some of the latest trends in RepRaps. In early January 2016, RepRapPro (short for "RepRap Professional", and one commercial arm of the RepRap project in the UK) announced that it would cease trading on 15 January 2016. The reason given was congestion of the market for low-cost 3D printers and the inability to expand in that market. RepRapPro China continues to operate. == Hardware == As the project was designed by Bowyer to encourage evolution, many variations have been created. As an open source project, designers are free to make modifications and substitutions, but they must allow any of their potential improvements to be reused by others. There are many RepRap printer designs including: Prusa i3 Hangprinter RepRap Fisher RepRap Snappy RepRap Morgan RepRap Ormerod RepRap Darwin RepRap Mendel == Software == RepRap was conceived as
{"page_id": 1993025, "title": "RepRap"}
Milky Way); signals from binary supermassive black holes in other galaxies; and extreme-mass-ratio inspirals and bursts produced by a stellar-mass compact object orbiting a supermassive black hole. There are also more speculative signals such as signals from cosmological phase transitions, cosmic strings and primordial gravitational waves generated during cosmological inflation. === Galactic compact binaries === LISA will be able to detect the nearly monochromatic gravitational waves emanating of close binaries consisting of two compact stellar objects (white dwarfs, neutron stars, and black holes) in the Milky Way. At low frequencies these are actually expected to be so numerous that they form a source of (foreground) noise for LISA data analysis. At higher frequencies LISA is expected to detect and resolve around 25,000 galactic compact binaries. Studying the distribution of the masses, periods, and locations of this population, will teach us about the formation and evolution of binary systems in the galaxy. Furthermore, LISA will be able to resolve 10 binaries currently known from electromagnetic observations (and find ≈500 more with electromagnetic counterparts within one square degree). Joint study of these systems will allow inference on other dissipation mechanisms in these systems, e.g. through tidal interactions. One of the currently known binaries that LISA will be able to resolve is the white dwarf binary ZTF J1539+5027 with a period of 6.91 minutes, the second shortest period binary white dwarf pair discovered to date. === Planets of compact binaries === LISA will also be able to detect the presence of large planets and brown dwarfs orbiting white dwarf binaries. The number of such detections in the Milky Way is estimated to range from 17 in a pessimistic scenario to more than 2000 in an optimistic scenario, and even extragalactic detections in the Magellanic Clouds might be possible, far beyond the current capabilities
{"page_id": 364369, "title": "Laser Interferometer Space Antenna"}
centre is located on the south side of the river Boyne, and the historical site is located on the north side of the river and is accessed via a shuttle with a tour guide. == Public transport access == Bus Éireann route 163 operates between Drogheda and the Brú na Bóinne Visitor Centre via Donore. The nearest railway station is Drogheda railway station approximately 9 kilometres distant. == Brú na Bóinne National Park == The site will form the basis of a national park. In September 2023 the state bought Dowth Hall and 552 acres of surrounding land. == See also == List of archaeoastronomical sites by country == References == == Further reading == Lewis-Williams, D. and Pearce, D., Inside the Neolithic Mind, Thames and Hudson, London, 2005, ISBN 0-500-05138-0 O'Kelly, M. J., Newgrange: archaeology, art, and legend, London: Thames and Hudson, Ltd., 1982. Stout, Geraldine, Newgrange and the Bend of the Boyne, 2002, Cork University Press, ISBN 1859183417, 9781859183410, google books == External links == UNESCO's World Heritage Site description Official website Newgrange.com Knowth.com Brú na Bóinne - Archaeological Ensemble of the Bend of the Boyne UNESCO Collection on Google Arts and Culture Brú na Bóinne in myth and folklore
{"page_id": 2241544, "title": "Brú na Bóinne"}
for Scientific Computing. Siam. ISBN 9780898713442. Alfonso Ferreira; José Rolim; Shang-Hua Teng; Horst Simon, eds. (1998). Solving Irregularly Structured Problems in Parallel. Lecture Notes in Computer Science. Vol. 1457. Conference proceedings info: IRREGULAR. doi:10.1007/BFb0018521. ISBN 978-3-540-64809-3. S2CID 26329599.{{cite book}}: CS1 maint: publisher location (link) Michael A. Heroux; Padma Raghavan; Horst D. Simon, eds. (2006). Parallel Processing for Scientific Computing. SIAM. ISBN 9780898718133. == Awards and nominations == 1998 — Gordon Bell Prize (jointly with group from Cray and Boeing) in recognition of his efforts in parallel processing research. 1995 — H. Julian Allen Award (jointly with the NAS Parallel Benchmarks Team) for notable scientific papers written by authors at NASA Ames Research Center, for the NAS Parallel Benchmarks. 2009 — Gordon Bell Prize (in collaboration with IBM researchers) for the second time for the development of innovative techniques that produce new levels of performance on a real application. 2012 — Gordon Bell Prize Finalist (jointly with group from Intel and LBNL) for development of best price performance application. 2015 — Test of Time Award (ACM), for the long term impact (citations) of the paper “NAS Parallel Benchmarks” (jointly with the NAS Parallel Benchmarks team). 2016 — Society for Industrial and Applied Mathematics - Supercomputing Career Award. == References == == External links == Horst Simon publications indexed by Google Scholar
{"page_id": 73805220, "title": "Horst D. Simon"}
A bleep censor is the replacement of profanity and classified information with a beep sound (usually a ), used in public television, radio and social media. == History == Bleeping has been used as a standard since 1998 as a means of censoring TV and radio programs to remove content not deemed suitable for "family", "daytime", "broadcasting", or "international" viewing, as well as sensitive classified information for security. The bleep censor is a software module, manually operated by a broadcast technician. A bleep is sometimes accompanied by a digital blur pixelization or box over the speaker's mouth in cases where the removed speech may still be easily understood by lip reading. In subtitles, bleeped words are usually represented by "[bleep]". Sometimes the phrases "[expletive]", "[beep]", "[censored]", and "[explicit]" are used, while it is also common (though less so) to see hyphens (e.g. abbreviations of the word "fuck" like f—k f---), a series of X's, or asterisks and other non-letter symbols (e.g. ****, f***, f**k, f*ck, f#@k or f#@%), remaining faithful to the audio track. The characters used to denote censorship in text are called grawlixes. Where open captions are used (generally in instances where the speaker is not easily understood) a blank is used where the word is bleeped. Occasionally, bleeping is not reflected in the captions, allowing the unedited dialogue to be seen. Sometimes, a "black bar" can be seen for a closed caption bleep. Bleeping is mostly used in unscripted programs such as documentaries, radio features, and panel games, since scripted productions are designed to suit the time of their broadcast. For example, on the Discovery Channel, bleeping is extremely common. In the case of scripted comedies, most bleeping may be used for humorous purposes, and other sound effects may be substituted for the bleep tone for comical
{"page_id": 483249, "title": "Bleep censor"}
that the quipus used a binary system which could record phonological or logographic data. According to Martti Pärssinen, quipucamayocs would learn specific oral texts, which in relation to the basic information contained in quipu, and pictorial representations, often painted on quiru vessels, similar to aztec pictograms, related simple "episodes". In 2011, a potential match between a Spanish colonial document and six colonial-era quipus from the same region was identified. Researchers believe this possible quipu-document match is the strongest Rosetta Stone-like connection currently known, which could offer key clues needed to unlock the full extent of the quipu code. Subsequent studies have built on the proposed quipu-document connection, suggesting that the binary manner by which cords can be attached to the main body of the six quipus may encode moiety affiliation, and, more recently, uncovering detailed Andean social structures encoded within the six quipus. The lack of a clear link between any indigenous Andean languages and the quipus has historically led to the supposition that quipus are not a glottographic writing system and have no phonetic referent. Frank Salomon, at the University of Wisconsin, has argued that quipus are actually a semasiographic language, a system of representative symbols – such as music notation or numerals – that relay information but are not directly related to the speech sounds of a particular language, like ideograms and proto-writing. Sabine Hyland claims to have made the first phonetic decipherment through her analysis of epistolary quipus from San Juan de Collata, Peru, challenging the assumption that quipus do not represent information phonetically. However, the quipus in question date to the colonial period and are believed to have been exchanged during an 18th-century rebellion against the Spanish government, suggesting that their encoding may have been influenced by the introduction of European writing systems. With the help
{"page_id": 261479, "title": "Quipu"}
higher amount of blocking and still meet their deadlines; this will depend on specific details of each task. 4.8.3 Assigning Groups to Slots Although Theorem 4.4 upper-bounds the acquisition delay each request may experience, it does not guide how to assign groups to slots. The following provides some intuition behind assignment decisions and a few possible approaches. In general, the benefit of adding a layer of hierarchy in Example 4.12 is that less blocking is incurred in the system as a whole: three requests may incur up to 200 time units of blocking and three up to 100 time units as opposed to all six incurring up to 155 time units each. Thus, a first approach would be to form an optimization process that minimizes the summed blocking. However, lowering total blocking across all requests ignores the periods of the tasks issuing these requests and each task’s capacity to incur higher blocking and still meet its deadlines. Thus, an approach that minimizes the summed blocking may ignore crucial features for schedulability. A second approach would be to pre-select tasks to belong to groups that share a slot with at least one other group (with the remaining tasks being assigned to groups that would not share a slot). The underlying motivation is that the slot-sharing groups should be comprised of tasks that are able to incur additional 121 blocking. Without knowing the resulting blocking ahead of time, these tasks could be selected by their low utilization or high period, both of which are properties that give additional flexibility for incurring higher blocking. Once the tasks are separated, the groups for each set could be determined ( e.g. , with the ILP in Section 4.7.2). Thus two distinct ILPs would be solved to yield two sets of groups. The groups could then
{"source": 2291, "title": "from dpo"}
Validated Byzantine Agreement with optimal resilience and O(1) expected time but with O(n 3) expected word communication. Our work addresses an open question of Cachin et al. from 2001 and improves the expected word communication from O(n 3) to asymptotically optimal O(n 2). ### HotStuff: BFT Consensus with Linearity and Responsiveness * Maofan Yin * Dahlia Malkhi * Michael K. Reiter * Guy Golan Gueta * Ittai Abraham We present HotStuff, a leader-based Byzantine fault-tolerant replication protocol for the partially synchronous model. Once network communication becomes synchronous, HotStuff enables a correct leader to drive the protocol to consensus at the pace of actual (vs. maximum) network delay–a property called responsiveness—and with communication complexity that is linear in the number of replicas. To our knowledge, HotStuff is the first partially synchronous BFT replication protocol exhibiting these combined properties. Its simplicity enables it to be further pipelined and simplified into a practical, concise protocol for building large-scale replication services. ### Fault Tolerant Gradient Clock Synchronization * Johannes Bund * Christoph Lenzen * Will Rosenbaum Synchronizing clocks in distributed systems is well-understood, both in terms of fault-tolerance in fully connected systems, and the optimal achievable local skew in general fault-free networks. However, so far nothing non-trivial is known about the local skew that can be achieved in non-fully-connected topologies even under a single Byzantine fault. In this work, we show that asymptotically optimal local skew can be achieved in the presence of Byzantine faults. Our approach combines the Lynch-Welch algorithm for synchronizing a clique of n nodes with up to ƒ < n/3 Byzantine faults, and the gradient clock synchronization (GCS) algorithm by Lenzen et al. in order to render the latter resilient
{"source": 4187, "title": "from dpo"}
12 CFR 1026.52(a) During the first year after account opening, issuers are prohibited from requiring consumers to pay fees (other than fees for late payments, returned payments, and exceeding the credit limit) that in the aggregate exceed 25 percent of the initial credit limit in effect when the account is opened. An account is considered open no earlier than the date on which the account may first be used by the consumer to engage in transactions. With regard to a covered separate credit feature and an asset feature on a prepaid account that are both accessible by a hybrid prepaid-credit card, where the credit feature is a credit card account under an open-end (not home-secured) consumer credit plan, this restriction also applies to fees or charges imposed on the asset feature of the prepaid account that are charges imposed as part of the plan under 12 CFR 1026.6(b)(3) (Comments 6(b)(3)(iii)(D)-1 and 52(a)(2)-2). NOTE: The 25 percent limitation on fees does not apply to fees assessed prior to opening the account. Limitations on Penalty Fees – 12 CFR 1026.52(b) TILA requires that penalty fees imposed by card issuers be reasonable and proportional to the violation of the account terms. Among other things, the regulation prohibits credit card issuers from charging a penalty fee of more than $28 for paying late or otherwise violating the account’s terms for the first violation, $39 for an additional violation of the same type during the same billing cycle or one of the next six billing cycles, or 3 percent of the delinquent balance on the charge card account that requires payment of outstanding balances in full at the end of each billing cycle if payment has not been received for two or more consecutive billing cycles unless the issuer determines that a higher fee represents
{"source": 6034, "title": "from dpo"}
This timeline lists notable events in the history of research into senescence or biological aging, including the research and development of life extension methods, brain aging delay methods and rejuvenation. People have long been interested in making their lives longer and healthier. The most anсient Egyptian, Indian and Chinese books contain reasoning about aging. Ancient Egyptians used garlic in large quantities to extend their lifespan. Hippocrates (c. 460 – c. 370 BCE), in his Aphorisms, and Aristotle (384–322 BCE), in On youth and old age, expressed their opinions about reasons for old age and gave advice about lifestyle. Medieval Persian physician Ibn Sina (c. 980 – 1037), known in the West as Avicenna, summarized the achievements of earlier generations about this issue. == Background == Descriptions of rejuvenation and immortality remedies are often found in the writings of alchemists. But all those remedies did not allow even alchemists themselves to live longer than a hundred years. Though the average lifespan of people through the past millennia increased significantly, maximum lifespan almost did not change - even in ancient times there were fairly well and unbiasedly documented cases when some people lived for more than a hundred years (for example, Terentia who lived 103 or 104 years). While among the billions of people of the modern world, there is only one case of life over 120 years (Jeanne Calment, 122 years). The super-long lives of people that are mentioned in ancient books, apparently, are highly exaggerated, since archaeological data show that even the oldest of the ancient people lived no more than modern supercentenarians. In some cases the exaggeration, possibly, is not intentional but occurs due to errors in translation between languages and synchronization of chronological systems. The species limit of human life is estimated by scientists at 125–127 years, and
{"page_id": 67572411, "title": "Timeline of aging research"}
In condensed matter physics, the diffuson is a disorder-averaged electron-hole propagator, a mathematical object which often appears in the theory of disordered electronic systems. The poles of the propagator can be identified with diffusion modes. In a disordered system, the motion of an electron is not ballistic, but diffusive: i.e., the electron does not move along a straight line, but experiences a series of random scatterings off of impurities. This random motion (diffusion) is described by a differential equation, known as the diffusion equation. The diffuson is the Green's function of the diffusion equation. The diffuson plays an important role in the theory of electron transport in disordered systems, especially for phase coherent effects such as universal conductance fluctuations. == References ==
{"page_id": 5861496, "title": "Diffuson"}
Limostatin (from Limos, the Greek goddess of starvation) is a peptide hormone found in Drosophila melanogaster that suppresses the production and release of Insulin. The hormone is important in adaptation to starvation conditions, and represents a mechanism by which insulin is negatively regulated. == See also == Neuromedin U receptor 1 == References ==
{"page_id": 46192330, "title": "Limostatin"}
a binary star in 1907, based on spectroscopic observations at Lick Observatory; J. B. Cannon published an orbit in 1914, finding a period of 40.9 days. Later spectroscopic investigations by F. J. Neubauer at Lick, published in 1944, found a period of 10.5 years, with no evidence for the 41-day periodicity. Antoine Labeyrie and his coworkers resolved the pair by speckle interferometry in 1973 and found that the two stars were separated by about 0.25 arcseconds; this work was published in 1974. The pair was also observed visually by Coteau in 1973. A number of orbits were subsequently published using visual and speckle-interferometric observations, both alone and in conjunction with spectroscopic data. In 1999, Söderhjelm published an orbit using speckle-interferometric data together with Hipparcos observations. Neubauer's 1944 work found a small variation in the radial velocity of Beta Coronae Borealis with a periodicity of 320 days, suggesting the presence of a third, lighter, body in the system. A 1999 study of the system by long-baseline infrared interferometry performed at Palomar Observatory found no evidence for this, and showed that any tertiary companion with this period must have mass 10 Jupiter masses or below. This study also found very weak evidence for the presence of a companion with a shorter, 21-day, period, but the data was insufficient to draw a positive conclusion. The brighter component, Beta Coronae Borealis A, is a rapidly oscillating Ap star, with a period of 16.2 minutes. Of spectral type A5V with a surface temperature of around 7,980 K, it has around 2.09 times the mass of the Sun, 2.63 times its radius and 25.3 times its luminosity. The smaller star is a main sequence star with spectral type F2, a surface temperature of around 6,750 K, around 1.4 times the mass of the Sun, 1.56 times
{"page_id": 2376429, "title": "Beta Coronae Borealis"}
Omega Piscium (Omega Psc, ω Piscium, ω Psc) is a star approximately 106 light years away from Earth, in the constellation Pisces. It has a spectral type of F4IV, meaning it is a subgiant/dwarf star, and it has a temperature of 6,600 kelvins. It may or may not be a close binary star system. Variations in its spectrum were once interpreted as giving it an orbital period of 2.16 days, but this claim was later debunked as false. It is 20 times brighter than the Sun and is 1.8 times greater in mass, if it is a single star. It is part of the drawn asterism in classic and modern renderings as the start of the tail, east of the Circlet of Pisces, a near-circle which forms all but the tail (the head and body) of the western (fatter) "fish" in the constellation of two fishes. == Right ascension == Considering stars with Flamsteed numbers, Greek letters, and proper names, Omega Piscium at J2000 (namely in the year 2000) was the named star with the highest right ascension (akin to terrestrial longitude). Due to the 26,000-year movement of the Earth's axis tracing an imperfect circle (axial precession), it has since increased to just beyond 0 hours, which it reached in J2013. At the cusp of sunrise on the March Equinox in the present era the circlet appears just above the sunrise being the westernmost part of the asterism; the easternmost parts can be most easily seen after sunset, just above the Sun on a maximal horizon, such as the sea. A month later the progress of the Earth around the plane of the ecliptic (its orbit) by a mean 2 hours of Right Ascension (18° of orbit) means that the sun rises and sets in an outer part of Aries
{"page_id": 13513932, "title": "Omega Piscium"}
Islamic geometric patterns are one of the major forms of Islamic ornament, which tends to avoid using figurative images, as it is forbidden to create a representation of an important Islamic figure according to many holy scriptures. The geometric designs in Islamic art are often built on combinations of repeated squares and circles, which may be overlapped and interlaced, as can arabesques (with which they are often combined), to form intricate and complex patterns, including a wide variety of tessellations. These may constitute the entire decoration, may form a framework for floral or calligraphic embellishments, or may retreat into the background around other motifs. The complexity and variety of patterns used evolved from simple stars and lozenges in the ninth century, through a variety of 6- to 13-point patterns by the 13th century, and finally to include also 14- and 16-point stars in the sixteenth century. Geometric patterns occur in a variety of forms in Islamic art and architecture. These include kilim carpets, Persian girih and Moroccan zellij tilework, muqarnas decorative vaulting, jali pierced stone screens, ceramics, leather, stained glass, woodwork, and metalwork. Interest in Islamic geometric patterns is increasing in the West, both among craftsmen and artists like M. C. Escher in the twentieth century, and among mathematicians and physicists such as Peter J. Lu and Paul Steinhardt. == Background == === Islamic decoration === Islamic geometric patterns are derived from simpler designs used in earlier cultures: Greek, Roman, and Sasanian. They are one of three forms of Islamic decoration, the others being the arabesque based on curving and branching plant forms, and Islamic calligraphy; all three are frequently used together. From the 9th century onward, a range of sophisticated geometric patterns based on polygonal tessellation began to appear in Islamic art, eventually becoming dominant. Islamic art mostly avoids
{"page_id": 21573591, "title": "Islamic geometric patterns"}
computer, it ran in 54 seconds, while on the Z80 it was 239, and 516 on the Apple II. === Spread === Gilbreath, this time along with his brother Gary, revisited the code in the January 1983 edition of Byte. This version removed most of the less popular languages, leaving Pascal, C, FORTRAN IV, and COBOL, while adding Ada and Modula-2. Thanks to readers providing additional samples, the number of machines, operating systems and languages compared in the resulting tables was greatly expanded. Motorola 68000 (68k) assembly remained the fastest, almost three times the speed of the Intel 8086 running at the same 8 MHz clock. Using high-level languages the two were closer in performance, with the 8086 generally better than half the speed of the 68k and often much closer. A wider variety of minicomputers and mainframes was also included, with times that the 68k generally beat except for the very fastest machines like the IBM 3033 and high-end models of the VAX. Older machines like the Data General Nova, PDP-11 and HP-1000 were nowhere near as fast as the 68k. Gilbreath's second article appeared as the benchmark was becoming quite common as a way to compare the performance of various machines, let alone languages. In spite of his original warning not to do so, it soon began appearing in magazine advertisements as a way to compare performance against the competition, and as a general benchmark. Byte once again revisited the sieve later in August 1983 as part of a whole-magazine series of articles on the C language. In this case the use was more in keeping with the original intent, using a single source code and running it on a single machine to compare the performance of C compilers on the CP/M-86 operating system, on CP/M-80, and for
{"page_id": 60643089, "title": "Byte Sieve"}
Upsilon Piscium is a solitary, white-hued star in the zodiac constellation of Pisces. It is faintly visible to the naked eye, having an apparent visual magnitude of +4.75. Based upon an annual parallax shift of 10.59 mas as seen from Earth, it is located about 308 light years from the Sun. The star is drifting further away with a heliocentric radial velocity of +6 km/s. This is an ordinary A-type main sequence star with a stellar classification of A3 V. It is 461 million years old – about 98% of the way through its main sequence lifetime – and is spinning with a projected rotational velocity of 91 km/s. The star has 2.8 times the mass of the Sun, about 2.2 times the Sun's radius, and is radiating 117 times the Sun's luminosity from its photosphere at an effective temperature of 9183 K. == Naming == υ Piscium is the Bayer designation for this star, which is Latinized as Upsilon Piscium. It has the Flamsteed designation 90 Piscium. In Chinese, 奎宿 (Kuí Sù), meaning Legs (asterism), refers to an asterism composed of υ Piscium, η Andromedae, 65 Piscium, ζ Andromedae, ε Andromedae, δ Andromedae, π Andromedae, ν Andromedae, μ Andromedae, β Andromedae, σ Piscium, τ Piscium, 91 Piscium, φ Piscium, χ Piscium and ψ¹ Piscium. Consequently, the Chinese name for υ Piscium itself is 奎宿十三 (Kuí Sù shí sān, English: the Thirteenth Star of Legs.) == References ==
{"page_id": 13527273, "title": "Upsilon Piscium"}
At any given time, a Gauna consists of a nearly impenetrable core protected by a dense layer of malleable flesh known as "placenta" (胞衣, ena). Once the ena is shed away and the core is destroyed, the Gauna's body disintegrates. While Sidonia itself is heavily armed with an arsenal of high-output beam cannons and mass cannons including slow but powerful planet-destroying warheads, it is primarily defended by large mechanized weapons called Gardes (衛人, Morito) whose weaponry and mobility is powered by "Higgs particles" (ヘイグス粒子, Heigusu Ryūshi), armed with a high-output beam cannon for long range assaults and a special spear known as "Kabizashi" for close combat. The tip of the kabizashi is made of a rare and little-understood material which has the unique property of being able to destroy a Gauna's core. Later the Gardes are also equipped with firearms whose ammunition have the same material of the Kabizashi after a means to artificially mass-produce it is discovered. Most people in the surviving human population are screened and drafted as Garde pilots at a young age, if they are shown to be capable of piloting them. === Story === The story follows the adventures of Garde pilot Nagate Tanikaze, who lived in the underground layer of Sidonia since birth and was raised by his grandfather. Never having met anyone else, he trains himself in an old Guardian pilot simulator every day, eventually mastering it. After his grandfather's death, he emerges to the surface and is selected as a Garde pilot, just as Sidonia is once again threatened by the Gauna. == Media == === Manga === Knights of Sidonia, written and illustrated by Tsutomu Nihei, was serialized in Kodansha's seinen manga magazine Monthly Afternoon from April 25, 2009, to September 25, 2015. It was compiled in 15 tankōbon volumes. The
{"page_id": 31935183, "title": "Knights of Sidonia"}
into much more than just an adder—an ALU. == See also == Adder (electronics) Carry-lookahead adder Carry-save adder Adding machine Subtractor == References ==
{"page_id": 40695, "title": "Adder–subtractor"}
led to the beginning of XAI. It is followed by an approach aimed at making ML algorithms more interpretable. Finally, we put forward the different types of interpretability offered to achieve explainability. ### Black-Box Model A black-box model in XAI refers to a machine learning model that operates as an opaque system where the internal workings of the model are not easily accessible or interpretable. These models make predictions based on input data, but the decision-making process and reasoning behind the predictions are not transparent to the user [31. 2021;21(3):1–18.")]. This lack of transparency makes it strenuous for users to understand the model’s behavior, detect potential biases or errors, or hold the model accountable for its decisions. In XAI, the term “black box” is often used to contrast with “white box” or “transparent” models, where the internal workings and reasoning behind the predictions are easily accessible and interpretable. Overall, it helps users deeply understand and trust the decisions made by these systems. In general, highly successful prediction models, such as DNNs, have some inherited drawbacks in terms of transparency that need to be addressed to justify the use of these models in many scenarios. ### Interpretable Machine Learning The first thing that springs to mind whenever black-box models are brought up in a conversation is always a basic interpretation of these models. When ML models are utilised in a product, interpretable systems are frequently a decisive element. In machine learning, interpretability is a crucial component. Nevertheless, it is still unclear how to quantify it. Because of this ambiguity, academics frequently conflate the terms “interpretability” and “explainability.” Only when machine learning models are explicable
{"source": 989, "title": "from dpo"}
vehicle and a driver that looks in the direction of the pedestrian (forward). Shortly after the start of the encounter, the pedestrian pauses and looks in the direction of the driver while the driver decelerates. The encounter ends with the pedestrian walking, not looking at the driver, and the driver accelerates. In terms of communication, this resembles a sequence of U-I-V-K-accelerating, U-I-V-K-braking, Bi-moving, Bi-still, U-I-K-braking, U-I-V-K-accelerating. 4. Discussion and conclusions ----------------------------- This paper presents a Hidden Markov Model that provides insights into the communication dynamics between drivers and pedestrians in mixed traffic environments where the pedestrian was observed to cross in front of the driver. The model describes six underlying communication states that give rise to multiple observable pedestrian and vehicle cues such as driver waving and pedestrian pausing or walking. In addition, it details how communication changes throughout a typical encounter (transition probabilities) and how likely encounters are to start and end with a certain state (start and end probabilities). Using this model, we were able to show that encounters typically have several states, with most of the vehicle–pedestrian encounter time consisting of unidirectional communication. At times, encounters enter moments of intense bidirectional communication with several cues suggesting mutual awareness (e.g., pedestrian and driver gaze) at play simultaneously. These moments are more likely early on in encounters, while encounters are likely to end with unidirectional implicit communication with an accelerating or cruising vehicle. While unidirectional implicit communication with an accelerating vehicle may mean different types of communication at different times within the encounter, towards the end of the encounter this state is likely to represent no communication when the pedestrian has already made the decision to cross and the vehicle has started accelerating to continue its journey. Taken together, these observations add to the literature by providing a novel
{"source": 2730, "title": "from dpo"}
# Ticket: # 1229600 - Comcast pushing survey ads onto my computer without consent Date: 10/1/2016 12:03:32 AM City/State/Zip: Pinole, California 94564 Company Complaining About: Comcast _____________________________________________________________________________ # Description I was using my computer and all the sudden I saw two new tabs on my browser, there's a Comcast survey tab and an Comcast ad being opened. I've never consented for Comcast to gain access to my computer like this. I think it is wrong for them to access my system like this. _____________________________________________________________________________ # Ticket: # 1229790 - Unauthorized credit pull Date: 10/1/2016 11:43:56 AM City/State/Zip: Philadelphia, Pennsylvania 19107 Company Complaining About: Comcast _____________________________________________________________________________ # Description Hi, When I switched my internet and TV to obtain a new subscription from comcast. I went to the comcast Xfinity store and informed them that I would like to sign up for new service. I inquired if I could get the online price and that I would like to pay deposit to waive the credit check. I have explicitly told them that I want to pay the deposit to avoid the credit check. I DID NOT provide them with my social security number and paid 100$ deposit as directed in store before picking up my equipment. Six weeks later when I checked my credit report, I noticed a hard pull on my credit from Comcast. I called customer service in August and inquired how they pulled my credit with out my permission and how they obtained my ssn. The representative told me they don't have my ssn on file and informed me some one from billing department would call me by 8/28/2016 to address this. Also the customer care representative mentioned he opened a request to remove hard inquiry on my credit report as it was unauthorized. I am writing this complaint
{"source": 4974, "title": "from dpo"}
are u1(t) = − 2 cos √6 t and u2(t) = cos √6 t.(e) Observe that the solutions obtained in parts (c) and (d) describe two distinct modes of vibration. In the first, the frequency of the motion is 1, and the two masses move in phase, both moving up or down together; the second mass moves twice as far as the first. The second motion has frequency √6, and the masses move out of phase with each other, one moving down while the other is moving up, and vice versa. In this mode the first mass moves twice as far as the second. For other initial conditions, not proportional to either of Eqs. (iii) or (iv), the motion of the masses is a combination of these two modes. 40. In this problem we outline one way to show that if r1 , . . . , rn are all real and different, then e r1t , . . . , e rn t are linearly independent on −∞ < t < ∞. To do this, we consider the linear relation c1e r1t + · · · + cn e r n t = 0, −∞ < t < ∞ (i) and show that all the constants are zero. (a) Multiply Eq. (i) by e−r1t and differentiate with respect to t, thereby obtaining c2(r2 − r1)e(r2 −r1)t + · · · + cn(rn − r1)e(rn−r1)t = 0.234 Chapter 4. Higher Order Linear Equations (b) Multiply the result of part (a) by e−(r2 −r1)t and differentiate with respect to t to obtain c3(r3 − r2)( r3 − r1)e(r3−r2 )t + · · · + cn(rn − r2)( rn − r1)e(rn−r2 )t = 0. (c) Continue the procedure from parts (a) and (b), eventually obtaining cn(rn − r n−1) · · ·
{"source": 6286, "title": "from dpo"}
constantly converted into one another, but the sum remains constant in an isolated system (cf. table). In the classical picture of thermodynamics, kinetic energy vanishes at zero temperature and the internal energy is purely potential energy. However, quantum mechanics has demonstrated that even at zero temperature particles maintain a residual energy of motion, the zero point energy. A system at absolute zero is merely in its quantum-mechanical ground state, the lowest energy state available. At absolute zero a system of given composition has attained its minimum attainable entropy. The microscopic kinetic energy portion of the internal energy gives rise to the temperature of the system. Statistical mechanics relates the pseudo-random kinetic energy of individual particles to the mean kinetic energy of the entire ensemble of particles comprising a system. Furthermore, it relates the mean microscopic kinetic energy to the macroscopically observed empirical property that is expressed as temperature of the system. While temperature is an intensive measure, this energy expresses the concept as an extensive property of the system, often referred to as the thermal energy, The scaling property between temperature and thermal energy is the entropy change of the system. Statistical mechanics considers any system to be statistically distributed across an ensemble of N {\displaystyle N} microstates. In a system that is in thermodynamic contact equilibrium with a heat reservoir, each microstate has an energy E i {\displaystyle E_{i}} and is associated with a probability p i {\displaystyle p_{i}} . The internal energy is the mean value of the system's total energy, i.e., the sum of all microstate energies, each weighted by its probability of occurrence: U = ∑ i = 1 N p i E i . {\displaystyle U=\sum _{i=1}^{N}p_{i}\,E_{i}.} This is the statistical expression of the law of conservation of energy. === Internal energy changes === Thermodynamics
{"page_id": 340757, "title": "Internal energy"}
Progol is an implementation of inductive logic programming that combines inverse entailment with general-to-specific search through a refinement graph. == Features == Inverse entailment is used with mode declarations to derive the bottom clause, the most-specific clause within the mode language which subsume a given example. This clause is used to guide a refinement-graph search. Unlike the searches of Ehud Shapiro's model inference system (MIS) and J. Ross Quinlan's FOIL, Progol's search has a provable guarantee of returning a solution having the maximum compression in the search-space. To do so it performs an admissible A*-like search, guided by compression, over clauses which subsume the most specific clause. Progol deals with noisy data by using a compression measure to trade off the description of errors against the hypothesis description length. Progol allows arbitrary Prolog programs as background knowledge and arbitrary definite clauses as examples. == History == Progol was introduced by Stephen Muggleton in 1995. In 1996, it was used by Ashwin Srinivasan, Muggleton, Michael Sternberg and Ross King to predict the mutagenic activity in nitroaromatic compounds. This was considered a landmark application for inductive logic programming, as a general purpose inductive learner had discovered results that were both novel and meaningful to domain experts. Progol proved very influential in the field, and the widely-used inductive logic programming system Aleph builds directly on Progol. == References ==
{"page_id": 9605764, "title": "Progol"}
yield can be even higher. Cyanobacteria may possess the ability to produce substances that could one day serve as anti-inflammatory agents and combat bacterial infections in humans. Cyanobacteria's photosynthetic output of sugar and oxygen has been demonstrated to have therapeutic value in rats with heart attacks. While cyanobacteria can naturally produce various secondary metabolites, they can serve as advantageous hosts for plant-derived metabolites production owing to biotechnological advances in systems biology and synthetic biology. Spirulina's extracted blue color is used as a natural food coloring. Researchers from several space agencies argue that cyanobacteria could be used for producing goods for human consumption in future crewed outposts on Mars, by transforming materials available on this planet. === Human nutrition === Some cyanobacteria are sold as food, notably Arthrospira platensis (Spirulina), Aphanizomenon flos-aquae (Klamath Lake AFA), and others. Some microalgae contain substances of high biological value, such as polyunsaturated fatty acids, amino acids, proteins, pigments, antioxidants, vitamins, and minerals. Edible blue-green algae reduce the production of pro-inflammatory cytokines by inhibiting NF-κB pathway in macrophages and splenocytes. Sulfate polysaccharides exhibit immunomodulatory, antitumor, antithrombotic, anticoagulant, anti-mutagenic, anti-inflammatory, antimicrobial, and even antiviral activity against HIV, herpes, and hepatitis. === Health risks === Some cyanobacteria can produce neurotoxins, cytotoxins, endotoxins, and hepatotoxins (e.g., the microcystin-producing bacteria genus microcystis), which are collectively known as cyanotoxins. Specific toxins include anatoxin-a, guanitoxin, aplysiatoxin, cyanopeptolin, cylindrospermopsin, domoic acid, nodularin R (from Nodularia), neosaxitoxin, and saxitoxin. Cyanobacteria reproduce explosively under certain conditions. This results in algal blooms which can become harmful to other species and pose a danger to humans and animals if the cyanobacteria involved produce toxins. Several cases of human poisoning have been documented, but a lack of knowledge prevents an accurate assessment of the risks, and research by Linda Lawton, FRSE at Robert Gordon University, Aberdeen and collaborators
{"page_id": 129618, "title": "Cyanobacteria"}
less cleanup and reduce disposal costs. === Atomic clocks === Caesium-based atomic clocks use the electromagnetic transitions in the hyperfine structure of caesium-133 atoms as a reference point. The first accurate caesium clock was built by Louis Essen in 1955 at the National Physical Laboratory in the UK. Caesium clocks have improved over the past half-century and are regarded as "the most accurate realization of a unit that mankind has yet achieved." These clocks measure frequency with an error of 2 to 3 parts in 1014, which corresponds to an accuracy of 2 nanoseconds per day, or one second in 1.4 million years. The latest versions are more accurate than 1 part in 1015, about 1 second in 20 million years. The caesium standard is the primary standard for standards-compliant time and frequency measurements. Caesium clocks regulate the timing of cell phone networks and the Internet. ==== Definition of the second ==== The second, symbol s, is the SI unit of time. The BIPM restated its definition at its 26th conference in 2018: "[The second] is defined by taking the fixed numerical value of the caesium frequency ΔνCs, the unperturbed ground-state hyperfine transition frequency of the caesium-133 atom, to be 9192631770 when expressed in the unit Hz, which is equal to s−1." === Electric power and electronics === Caesium vapour thermionic generators are low-power devices that convert heat energy to electrical energy. In the two-electrode vacuum tube converter, caesium neutralizes the space charge near the cathode and enhances the current flow. Caesium is also important for its photoemissive properties, converting light to electron flow. It is used in photoelectric cells because caesium-based cathodes, such as the intermetallic compound K2CsSb, have a low threshold voltage for emission of electrons. The range of photoemissive devices using caesium include optical character recognition devices,
{"page_id": 5879, "title": "Caesium"}
the economics of intellectual property, the history of telecommunications, and the economics of innovation. His studies also covered disparate topics including nuclear power plants, migration, slavery, birth control, and government interventions in the economy. In 2006, Edward Elgar published a festschrift called New Frontiers in the Economics of Innovation and New Technology: Essays in Honour of Paul A. David. == Personal life and death == David was married to Sheila Ryan Johansson-David, a historian. The couple had two children. An earlier marriage to Janet M. Williamson in 1958 had ended in a divorce. He had two children from this earlier marriage. David died on January 23, 2023, at age 87. == Academic honors == Fellow of the International Econometrics Society (1975) Pitt Professor of American History and Institutions at the University of Cambridge Fellow of the American Academy of Arts and Sciences (1979) Vice-president and president of the Economic History Association (1988–1989) Marshall Lecturer at the University of Cambridge President of the Economic History Association == Publications == Reinterpreting Economic Growth: Parables and Realities, with Moses Abramovitz, American Economic Review, 1973 "Clio and the Economics of QWERTY", American Economic Review, 1985 Technical Choice, Innovation and Economic Growth (1975) The Economic Future in Historical Perspective (2003) == See also == QWERTY—About which David wrote == References == == External links == Biography at SIEPR LinkedIn profile In Memoriam by Luc Soete
{"page_id": 33609929, "title": "Paul A. David"}
An example of this is the trade-off between engine performance and fuel economy. While some customers are looking for maximum power from their engine, the automobile is still required to deliver an acceptable level of fuel economy. From the engine's perspective, these are opposing requirements. Engine performance is looking for maximum displacement (bigger, more power), while fuel economy is looking for a smaller displacement engine (ex: 1.4 L vs. 5.4 L). The engine size however, is not the only contributing factor to fuel economy and automobile performance. Different values come into play. Other attributes that involve trade-offs include: automobile weight, aerodynamic drag, transmission gearing, emission control devices, handling/roadholding, ride quality, and tires. The development engineer is also responsible for organizing automobile level testing, validation, and certification. Components and systems are designed and tested individually by the Product Engineer. The final evaluation is to be conducted at the automobile level to evaluate system to system interactions. As an example, the audio system (radio) needs to be evaluated at the automobile level. Interaction with other electronic components can cause interference. Heat dissipation of the system and ergonomic placement of the controls need to be evaluated. Sound quality in all seating positions needs to be provided at acceptable levels. === Manufacturing engineer === Manufacturing engineers are responsible for ensuring proper production of the automotive components or complete vehicles. While the development engineers are responsible for the function of the vehicle, manufacturing engineers are responsible for the safe and effective production of the vehicle. This group of engineers consist of process engineers, logistic coordinators, tooling engineers, robotics engineers, and assembly planners. In the automotive industry manufacturers are playing a larger role in the development stages of automotive components to ensure that the products are easy to manufacture. Design for manufacturability in the automotive world
{"page_id": 351882, "title": "Automotive engineering"}
assume that quantum turbulence in the low temperature limit does not decay as it would for higher temperatures, however experimental evidence showed that this was not the case: quantum turbulence decays even at very low temperatures. The Kelvin waves interact and create shorter Kelvin waves, until they are short enough that emission of sound (phonons), which results in the conversion of kinetic energy into heat, thus dissipation of energy. This process which shifts energy to smaller and smaller length scales at wavenumbers larger than k ℓ {\displaystyle k_{\ell }} is called the Kelvin wave cascade and proceeds on individual vortices. Low temperature quantum turbulence should thus consist of a double cascade: a Kolmogorov regime (a cascade of eddies) in the inertial range k D < k < k ℓ {\displaystyle k_{D}<k<k_{\ell }} , followed by a bottle-neck plateau, followed by the Kelvin wave cascade (a cascade of waves) that obeys the same k − 5 / 3 {\displaystyle k^{-5/3}} law but with different physical origin. This is at current consensus, but it must be stressed that it arises from theory and numerical simulations only: there is currently no direct experimental evidence for the Kelvin wave cascade due to the difficulty of observing and measuring at such small length scales. === Vinen turbulence === Vinen turbulence can be generated in a quantum fluid by the injection of vortex rings into the system, which has been observed both numerically and experimentally. It has been observed also in numerical simulations of turbulent Helium II driven by a small heat flux and in numerical simulations of trapped atomic Bose-Einstein condensates; it has been found even in numerical studies of superfluid models of the early universe. Unlike the Kolmogorov regime which appears to have a classical counterpart, Vinen turbulence has not been identified in classical
{"page_id": 393139, "title": "Quantum turbulence"}
more than 10,000 km3 or 2,400 cu mi for a VEI 8+ magnitude), and was possibly the most energetic event on Earth since the Chicxulub impact, which is thought by many paleontologists to have caused the extinction of the dinosaurs in the Cretaceous–Paleogene extinction event. The resulting explosive volcanism probably ejected large amounts of dust and debris into the stratosphere causing major cooling (see volcanic winter). Climatic effects could also have been caused by sulphur ejected into the stratosphere, which rapidly converts to sulphuric acid, an aerosol which cools the troposphere by blocking incoming solar radiation. Another possible cause of the cat gap could have been the Late Cenozoic Ice Age that began 33.9 million years ago. This ice age caused glaciation in Antarctica that eventually spread to Arctic regions of southern Alaska, Greenland, and Iceland. Glaciers on the North American continent, as well as the cooling trend, could have made the ecosystem uninhabitable for feliformia cat-like species, although habitable for cold-weather caniformia species such as canids (dog-like species), mustelids (weasel-like species), and ursids (bear-like species). There is also evidence that during the Miocene a sill surrounding the Arctic Ocean, known as the Greenland–Scotland Ridge, subsided, allowing more cold polar water to escape into the North Atlantic. As the salinity of the North Atlantic grew and as outflow of cold polar water increased, so the thermohaline circulation increased in vigour, providing the mild winter temperatures and large amounts of moisture to the North Atlantic, which are prerequisites to the build-up of the large continental ice caps on the adjacent cold continents. == Evolution of caniforms during the gap == It has been suggested by some that as a result of the cat gap caniforms (dog-like species including canids, bears, weasels, and other related taxa) evolved to fill more carnivorous and
{"page_id": 20355828, "title": "Cat gap"}
The hydrogen atoms of urea functional groups are ideally situated to form a hydrogen-bonding network because they are near an electron-withdrawing carbonyl group. This polymer network with embedded nickel particles demonstrates the possibility of using polymers as supramolecular hosts to develop self-healing conductive composites. Flexible and porous graphene foams that are interconnected in a 3D manner have also been shown to have self-healing properties. Thin film with poly(N,N-dimethylacrylamide)-poly(vinyl alcohol) (PDMAA) and reduced graphene oxide have shown high electrical conductivity and self-healing properties. The healing abilities of the hybrid composite are suspected to be due to the hydrogen bonds between the PDMAA chains, and the healing process is able to restore initial length and recover conductive properties. == Recyclable electronic skin == Zou et al. presents an interesting advance in the field of electronic skin that can be used in robotics, prosthetics, and many other applications in the form of a fully recyclable electronic skin material. The e-skin developed by the group consists of a network of covalently bound polymers that are thermoset, meaning cured at a specific temperature. However, the material is also recyclable and reusable. Because the polymer network is thermoset, it is chemically and thermally stable. However, at room temperature, the polyimine material, with or without silver nanoparticles, can be dissolved on the timescale of a few hours. The recycling process allows devices, which are damaged beyond self-healing capabilities, to be dissolved and formed into new devices (Figure 3). This advance opens the door for lower cost production and greener approaches to e-skin development. == Flexible and stretchy electronic skin == The ability of electronic skin to withstand mechanical deformation including stretching and flexing without losing functionality is crucial for its applications as prosthetics, artificial intelligence, soft robotics, health monitoring, biocompatibility, and communication devices. Flexible electronics are often
{"page_id": 40054681, "title": "Electronic skin"}
ET can be calculated. The most general and widely used equation for calculating reference ET is the Penman equation. The Penman–Monteith variation is recommended by the Food and Agriculture Organization and the American Society of Civil Engineers. The simpler Blaney–Criddle equation was popular in the Western United States for many years but it is not as accurate in wet regions with higher humidity. Other equations for estimating evapotranspiration from meteorological data include the Makkink equation, which is simple but must be calibrated to a specific location, and the Hargreaves equations. To convert the reference evapotranspiration to the actual crop evapotranspiration, a crop coefficient and a stress coefficient must be used. Crop coefficients, as used in many hydrological models, usually change over the year because crops are seasonal and, in general, plant behaviour varies over the year: perennial plants mature over multiple seasons, while annuals do not survive more than a few, so stress responses can significantly depend upon many aspects of plant type and condition. == Potential evapotranspiration == == List of remote sensing based evapotranspiration models == ALEXI BAITSSS METRIC Abtew Method SEBAL SEBS SSEBop PT-JPL ETMonitor ETLook ETWatch == See also == Eddy covariance flux (aka eddy correlation, eddy flux) Effects of climate change on the water cycle Hydrology (agriculture) Hydrologic Evaluation of Landfill Performance (HELP) Latent heat flux Water Evaluation And Planning system (WEAP) Soil plant atmosphere continuum Deficit irrigation Biotic pump == References == == Sources == Remote sensing determination of evapotranspiration. FAO. 2023. doi:10.4060/cc8150en. ISBN 978-92-5-138242-4. Goyal, Megh R.; Harmsen, Eric W., eds. (2013). Evapotranspiration. doi:10.1201/b15779. ISBN 978-0-429-16135-3. Intergovernmental Panel on Climate Change (2023a). "Glossary". Climate Change 2022 – Impacts, Adaptation and Vulnerability. pp. 2897–2930. doi:10.1017/9781009325844.029. ISBN 978-1-009-32584-4. Intergovernmental Panel on Climate Change (2023b). "Water Cycle Changes". Climate Change 2021 – the Physical Science Basis.
{"page_id": 78481, "title": "Evapotranspiration"}
language modeling and speech prediction tasks. Finally, through Hessian-based analysis we demonstrate that our Lipschitz recurrent unit is more robust with respect to input and parameter perturbations as compared to other continuous-time RNNs. 456. Meta-Learning of Structured Task Distributions in Humans and Machines Sreejan Kumar, Ishita Dasgupta, Jonathan Cohen, Nathaniel Daw, Thomas Griffiths rating : 6.5 - [6, 6, 7, 7] - Accept (Poster) tl;dr: We developed a novel meta-learning task with a structured task distribution and statistically equivalent "null" task distribution to show humans are more adept at the former whereas current meta-learning agents are more adept at the latter. In recent years, meta-learning, in which a model is trained on a family of tasks (i.e. a task distribution), has emerged as an approach to training neural networks to perform tasks that were previously assumed to require structured representations, making strides toward closing the gap between humans and machines. However, we argue that evaluating meta-learning remains a challenge, and can miss whether meta-learning actually uses the structure embedded within the tasks. These meta-learners might therefore still be significantly different from humans learners. To demonstrate this difference, we first define a new meta-reinforcement learning task in which a structured task distribution is generated using a compositional grammar. We then introduce a novel approach to constructing a "null task distribution" with the same statistical complexity as this structured task distribution but without the explicit rule-based structure used to generate the structured task. We train a standard meta-learning agent, a recurrent network trained with model-free reinforcement learning, and compare it with human performance across the two task distributions. We find a double dissociation in which humans do better in the structured task distribution whereas agents do better in the null task distribution -- despite comparable statistical complexity. This work highlights that multiple
{"source": 1216, "title": "from dpo"}
for instance, in the way in which print media has responded to the digital environment by emphasising the visual and conversational nature of news content, adding video, audio, links an d tweets to tell stories and engage audiences. Rather than stability, then, the suggestion is that adaptability is a significant emerging news value. When some argue for stability, and others for adaptability, we can see the competing forces acting on jour nalism. Over time, either stability or adaptability – or perhaps a hybrid of both – may well establish itself as a core journalistic value. In the meantime, another value already has established itself, and is perhaps driving journalism more than any other . That value is engagement . In fact, it denotes more than a value. It serves as a measure of success (of a story, whether hard or soft, text, video or audio; of a day; of an organisation), a guide by which to service and connect with journalism’s publics, and a way of using social media networks in the act of distribution. Sharing/engagement has created new newsroom practices and activities: comments, retweets, fans, friends, favourites and followers. They have also opened up a tool -driven approach that has enabled all sorts of websites, some that look like news sites, some that don’t, to enter the journalism space. The lines between social media, news media and social platform are increasingly blurring. As journalism scholar Barbie Zelizer notes, ‘social me dia sites as varied as Reddit, LinkedIn, Medium and traditional news media platforms all use what they know about their communities to feed on their information needs’ (2017, p. 24) . Most newsrooms employ social media editors whose job it is to take conten t produced by journalists, share it and monitor what is ‘going off’. These efforts may
{"source": 3692, "title": "from dpo"}
∨ a = a.(4) Let d = a ∧ b. Then a  a ∨ d. On the other hand, d = a ∧ b  a,and so a ∨ d  a. Therefore, a ∨ (a ∧ b) = a.  Given any arbitrary set L with operations ∨ and ∧, satisfying the con-ditions of the previous theorem, it is natural to ask whether or not this set comes from some lattice. The following theorem says that this is always the case. Theorem 19.3 Let L be a nonempty set with two binary operations ∨ and ∧ satisfying the commutative, associative, idempotent, and absorption laws. We can define a partial order on L by a  b if a ∨ b = b. Furthermore, L is a lattice with respect to  if for all a, b ∈ L, we define the least upper bound and greatest lower bound of a and b by a ∨ b and a ∧ b, respectively. Proof. We first show that L is a poset under . Since a ∨ a = a, a  a and  is reflexive. To show that  is antisymmetric, let a  b and b  a. Then a ∨ b = b and b ∨ a = a. By the commutative law, b = a ∨ b = b ∨ a = a.Finally, we must show that  is transitive. Let a  b and b  c. Then a ∨ b = b and b ∨ c = c. Thus, a ∨ c = a ∨ (b ∨ c) = ( a ∨ b) ∨ c = b ∨ c = c, 306 CHAPTER 19 LATTICES AND BOOLEAN ALGEBRAS or a  c.To show that L is a lattice, we must prove that a
{"source": 5734, "title": "from dpo"}
it's always a mistake to argue that a proposition is true because so-and-so says it is, but appeals to authority are more commonly used to show that we have good reason to believe the proposition, as opposed to being proof of its truth. Like all fallacies involving relevance, the problem with most appeals to authority is that they are invoking the authority in an irrelevant way. For example, in matters which really are subjective, such as which pizza or soft drink I should buy, invoking anyone else is irrelevant, since I may not have the same tastes. 3 In other cases, the error is in assuming that because a person is an authority about one thing, that person's expertise should carry the day in all areas. We see this in celebrity endorsements for products unrelated to that person's field. For example, Troy McClure endorsing Duff Beer would not constitute a valid appeal to authority, since being an actor doesn't make one an expert on beer. (And experience is not the same as expertise: Barney is not an expert on beer either.) In other cases, the appeal is fallacious on the grounds that some matters cannot be settled by appeal to experts, not because they are subjective, but because they are unknowable, for instance the future of scientific progress. The classic example here is Einstein's claim in 1932 that "there is not the slightest indication that [nuclear] energy will ever be obtainable." 4But after building up all this skepticism about appeals to authority, it's worth remembering that some people actually do know more about some things than other people, and in many cases, the fact that an authority on a subject tells us something really is a good reason to believe it. For example, since I have no first-hand knowledge of
{"source": 5205, "title": "from dpo"}
the allosteric site. Autophosphorylation has also been reported to have an effect on the cell's ability for endocytosis and proteolysis. == Process and structure == Kinases are either phosphorylated on serine and/or threonine residues, or solely on tyrosine residues. This serves as a means to classify them as either Ser/Thr- or Tyr-kinases. Several residues within the primary structure may be autophosphorylated simultaneously. The phosphoacceptors often reside within loops in the protein structure suitably termed 'activation loops'. The structures of some autophosphorylation complexes are known from crystals of protein kinases in which the phosphorylation site (Ser, Thr, or Tyr) of one monomer in the crystal is sitting in the active site of another monomer of the crystal in a manner similar to known peptide-substrate/kinase structures. The known structures include: Tyr phosphorylation sites in juxtamembrane regions: human cKIT, Tyr568 (PDB: 1PKG) human CSF1R, Tyr561 (PDB: 3LCD, homologous to cKIT site) human EPHA2, Tyr594 (PDB: 4PDO, two residues after the cKIT and CSF1R sites) Tyr phosphorylation sites in kinase insert regions: human FGFR1, Tyr583 (PDB: 3GQI) human FGFR3, Tyr577 (PDB: 4K33, homologous to the FGFR1 site, domain interface identical to FGFR1 structure) Tyr phosphorylation sites in activation loops: human IGF1R, Tyr1165 (PDB: 3D94) human IGF1R, Tyr1166 (PDB: 3LVP) human LCK, Tyr394 (PDB: 2PL0, homologous to the IGF1R Tyr1165 site) Ser/Thr phosphorylation sites in activation loops: human PAK1, Thr423 (PDB: 3Q4Z, 4O0R, 4O0T, 4P90, 4ZLO, 4ZY4, 4ZY5, 4ZY6, 5DEY; the 4ZY4 and 4ZY5 structures provide complete coordinates for the substrate activation loop) human IRAK4, Thr345 (PDB: 4U97, 4U9A) N or C terminal tails Ser/Thr phosphorylation sites: C. elegans CaMKII, C-terminal tail, Thr284 (PDB: 3KK8, 3KK9) human CaMKII, C-terminal tail, Thr287 (PDB: 2WEL, homologous to the C. elegans site) human CLK2, N-terminal tail, Ser142 (PDB: 3NR9) In general, the structures of the phosphorylation of internal
{"page_id": 33838036, "title": "Autophosphorylation"}
Boiler and Pressure Vessel Code in North America, the Pressure Equipment Directive of the EU (PED), Japanese Industrial Standard (JIS), CSA B51 in Canada, Australian Standards in Australia and other international standards like Lloyd's, Germanischer Lloyd, Det Norske Veritas, Société Générale de Surveillance (SGS S.A.), Lloyd's Register Energy Nederland (formerly known as Stoomwezen) etc. Note that where the pressure-volume product is part of a safety standard, any incompressible liquid in the vessel can be excluded as it does not contribute to the potential energy stored in the vessel, so only the volume of the compressible part such as gas is used. === List of standards === EN 13445: The current European Standard, harmonized with the Pressure Equipment Directive (Originally "97/23/EC", since 2014 "2014/68/EU"). Extensively used in Europe. ASME Boiler and Pressure Vessel Code Section VIII: Rules for Construction of Pressure Vessels. BS 5500: Former British Standard, replaced in the UK by BS EN 13445 but retained under the name PD 5500 for the design and construction of export equipment. AD Merkblätter: German standard, harmonized with the Pressure Equipment Directive. EN 286 (Parts 1 to 4): European standard for simple pressure vessels (air tanks), harmonized with Council Directive 87/404/EEC. BS 4994: Specification for design and construction of vessels and tanks in reinforced plastics. ASME PVHO: US standard for Pressure Vessels for Human Occupancy. CODAP: French Code for Construction of Unfired Pressure Vessel. AS/NZS 1200: Australian and New Zealand Standard for the requirements of Pressure equipment including Pressure Vessels, boilers and pressure piping. AS 1210: Australian Standard for the design and construction of Pressure Vessels AS/NZS 3788: Australian and New Zealand Standard for the inspection of pressure vessels API 510. ISO 11439: Compressed natural gas (CNG) cylinders IS 2825–1969 (RE1977)_code_unfired_Pressure_vessels. FRP tanks and vessels. AIAA S-080-1998: AIAA Standard for Space Systems –
{"page_id": 636219, "title": "Pressure vessel"}
protocols for secure web communication. Another focus is on a different scheme of encrypted communications called secret sharing. A sizable part of her work on these subjects is done in collaboration with Rosario Gennaro and Hugo Krawczyk. Rabin has been on the committees of many leading cryptography conferences, including TCC, Crypto, PKC and Eurocrypt. She was a council member of the Computing Community Consortium (2013–2016), a member of the executive committee of SIGACT (2012–2015), and a member of the editorial board of the Journal of Cryptology. She is a founder and organizer of the Women in Theory Workshop, a biennial event for graduate students in theoretical computer science. She is also involved in activities to make the field of encryption more accessible to the general public. In 2011, she took part in the World Science Festival, a popular science event held in New York City. In 2014, she took part in a similar event, the WNYC Science Fair. == Awards == 2014: One of the 22 most powerful women engineers in the world by Business Insider 2014: Woman of Vision for innovation by the Anita Borg Institute 2015: IACR Fellow (International Association for Cryptologic Research) 2016: Fellow of the American Academy of Arts and Sciences 2017: ACM Fellow 2018: One of America's Top 50 Women In Tech by Forbes 2019: The RSA Award for Excellence in Mathematics 2023: The Dijkstra Prize for work in secure multiparty computation (MPC) == References == == External links == Tal Rabin's homepage, on the IBM research website A blog post about Tal Rabin in the blog A Smarter Planet a TEDx talk given by Tal Rabin ABIE Women of Vision Award Acceptance Speech
{"page_id": 43516700, "title": "Tal Rabin"}
running a paper clip along the top edge of the screen. A worse problem happens if the reed switch fails. Sometimes the switches will fail in a closed position with the contacts sticking together. In that case the system will not switch on. There are several ways to check for this. First the laptop can be partially disassembled and the mouse assembly can be unplugged from the system board and the system switched on. If the system boots with the mouse unplugged then it is the switch. Another way to check for the problem is by running a magnet over the reed switch, there should be a faint click when the magnet triggers the switch. This does not require disassembly but the magnet must be in the correct position and be strong enough. Some people have modified the circuitry of the laptop by cutting the switch off of the assembly, with the downside being the system will no longer suspend if the lid is closed. === Vertical line LCD problem === Some 17" Inspiron 8600, 9200, 9300, 6000, 1750, and XPS Gen 2 notebook LCDs have a vertical line manufacturing defect. Symptoms range from individual lines to entire bars of the screen with inverted colors. Most problems showed after 2–4 years of usage. Dell has been very reluctant to replace these panels after guarantee, although there was a direct link to the defective parts from their suppliers. Even warranty customers have had difficulty getting replacements, and replaced screens often develop the defect after a short time. === LCD Hinge Detachment problem === In some Inspiron laptops an issue exists where a hinge holding the LCD screen may, as a result of the forces resulting from the large screen, rip its plastic standoffs holding it from the chassis. This issue seems
{"page_id": 57445461, "title": "Dell Inspiron laptops"}
out, ultimately filling the silt fence to the top of the structure; requiring another silt fence above or below it (creating a new ponding area), or for the silt fence to be removed, the sediment removed or spread out, and a new fence installed. The fence is not designed to concentrate or channel stormwater. The fence is installed on a site before soil disturbance begins, and is placed down-slope from the disturbance area. Sediment is captured by silt fences most often through ponding of water and settling, rather than filtration by the fabric. Sand and silt tends to clog the fabric, and then the sediments settle in the temporary pond.: p.6–9 : p.7–46 === Super silt fence === Some government jurisdictions in the United States recommend or require the use of a reinforced fence, sometimes called a "super" silt fence or an enhanced silt fence, on some construction sites. This design uses filter fabric reinforced by a wire mesh or chain link fence. The metal backing gives the fence increased strength to resist the weight of soil and water which may be trapped by the fence in a large drainage area, and discourages construction site operators from driving vehicles over the fence. However, an improper installation of a super silt fence can create an inadvertent sediment basin when the filter fabric becomes clogged. This typically causes flooding and increased downstream pollution. Most super silt fence specifications are outdated, requiring the trenching installation method, which has been shown to be highly susceptible to "washing out" under the fabric due to improper back-filling and inadequate compaction. === Static slicing installation === Some state agencies recommend an installation technique called "static slicing" as an improved method for ensuring effectiveness and longevity of a silt fence system on a construction site. The technique involves
{"page_id": 18416376, "title": "Silt fence"}
Eschaton has enforced the "or else" through drastic measures, such as inducing supernovae or impact events on the civilisation that attempted to create causality-violating technology. Earth and the colonies re-establish relations and trade. Some of the latter had regained the same, or higher, technological levels due in part to the "cornucopia machines", molecular assemblers that can recreate objects in predefined patterns or duplicate others, the Eschaton left them with. Transhumanist technologies that came into being before or during the Singularity, such as cybernetic implants, anti-aging and life extension treatments, are in wide use. Spaceships use antimatter, fusion and electron-sized black holes as propulsion. Some colonies, however, rejected or restricted use of advanced technology for social, cultural or political reasons, and instead of devolving into anarchism as Earth did, have replicated politically restrictive states from Earth's history. The novel takes place on two planets of one such polity, the New Republic. Its original settlers were predominantly from Eastern Europe, where many recalled the economic dislocation that followed the fall of communism there. The victorious side in an earlier civil war destroyed the sole remaining cornucopia machine, and imposed a socially and politically repressive feudalist regime that limits most technology to a level consistent with Europe at the end of the 19th century to guarantee everyone a place in society, with accompanying Victorian social mores. Despite this, there are still those who rebel and plan uprisings, along similar lines to those that happened in the historical Eastern Europe of that era. == Plot == The Festival, a civilisation of uploaded minds, arrives at Rochard's World, an outlying colony of the New Republic. It begins breaking down objects in the system to make technology for its stay. Then it begins making contact with the inhabitants of the planet by dropping cell phones, forbidden
{"page_id": 365182, "title": "Singularity Sky"}
} by setting Z ω = ∑ ∏ i ( ω z i ) n i . {\displaystyle Z_{\omega }=\sum \prod _{i}(\omega z_{i})^{n_{i}}.} In classical statistics the N {\displaystyle N} elements are (a) distinguishable and can be arranged with packets of n i {\displaystyle n_{i}} elements on level ε i {\displaystyle \varepsilon _{i}} whose number is N ! ∏ i n i ! , {\displaystyle {\frac {N!}{\prod _{i}n_{i}!}},} so that in this case Z ω = N ! ∑ n i ∏ i ( ω z i ) n i n i ! . {\displaystyle Z_{\omega }=N!\sum _{n_{i}}\prod _{i}{\frac {(\omega z_{i})^{n_{i}}}{n_{i}!}}.} Allowing for (b) the degeneracy g i {\displaystyle g_{i}} of level ε i {\displaystyle \varepsilon _{i}} this expression becomes Z ω = N ! ∏ i = 1 ∞ ( ∑ n i = 0 , 1 , 2 , … ( ω z i ) n i n i ! ) g i = N ! e ω ∑ i g i z i . {\displaystyle Z_{\omega }=N!\prod _{i=1}^{\infty }\left(\sum _{n_{i}=0,1,2,\ldots }{\frac {(\omega z_{i})^{n_{i}}}{n_{i}!}}\right)^{g_{i}}=N!e^{\omega \sum _{i}g_{i}z_{i}}.} The selector variable ω {\displaystyle \omega } allows one to pick out the coefficient of ω N {\displaystyle \omega ^{N}} which is Z {\displaystyle Z} . Thus Z = ( ∑ i g i z i ) N , {\displaystyle Z=\left(\sum _{i}g_{i}z_{i}\right)^{N},} and hence ( n j ) av = z j ∂ ∂ z j ln ⁡ Z = N g j e − ε j / k T ∑ i g i e − ε i / k T . {\displaystyle (n_{j})_{\text{av}}=z_{j}{\frac {\partial }{\partial z_{j}}}\ln Z=N{\frac {g_{j}e^{-\varepsilon _{j}/kT}}{\sum _{i}g_{i}e^{-\varepsilon _{i}/kT}}}.} This result which agrees with the most probable value obtained by maximization does not involve a single approximation and is therefore exact, and thus demonstrates the power of this Darwin–Fowler
{"page_id": 51188793, "title": "Darwin–Fowler method"}
"Investigations into logical deduction". In M. E. Szabo, ed. Collected Papers of Gerhard Gentzen. North-Holland. Translated by Szabo from "Untersuchungen über das logische Schliessen", Mathematisches Zeitschrift v. 39, pp. 176–210, 405 431. Girard, J.-Y.; Taylor, P.; Lafont, Y. (2003) [1989]. Proofs and Types (PDF). Cambridge University Press. ISBN 0521371813. Prawitz, Dag (1965). Natural Deduction: A Proof-Theoretic Study. Acta Universitatis Stockholmiensis; Stockholm Studies in Philosophy, 3. Stockholm, Göteborg, Uppsala: Almqvist & Wiksell. OCLC 912927896. Simpson, S. G. (2010). Subsystems of Second-order Arithmetic. Perspectives in logic (2 ed.). Cambridge University Press. ISBN 9780521150149. OCLC 528432422. A. S. Troelstra and H. Schwichtenberg (1996). Basic Proof Theory, Cambridge Tracts in Theoretical Computer Science, Cambridge University Press, ISBN 0-521-77911-1. Wang, Hao (1981). Popular Lectures on Mathematical Logic. Van Nostrand Reinhold Company. ISBN 9780442231095. OCLC 6087107. == External links == "Proof theory", Encyclopedia of Mathematics, EMS Press, 2001 [1994] J. von Plato (2008). The Development of Proof Theory. Stanford Encyclopedia of Philosophy.
{"page_id": 183478, "title": "Proof theory"}
Audio analysis refers to the extraction of information and meaning from audio signals for analysis, classification, storage, retrieval, synthesis, etc. The observation mediums and interpretation methods vary, as audio analysis can refer to the human ear and how people interpret the audible sound source, or it could refer to using technology such as an audio analyzer to evaluate other qualities of a sound source such as amplitude, distortion, frequency response. Once an audio source's information has been observed, the information revealed can then be processed for the logical, emotional, descriptive, or otherwise relevant interpretation by the user. == Natural Analysis == The most prevalent form of audio analysis is derived from the sense of hearing. A type of sensory perception that occurs in much of the planet's fauna, audio analysis is a fundamental process of many living beings. Sounds made by the surrounding environment or other living beings provides input to the hearing mechanism, for which the listener's brain can interpret the sound and how it should respond. Examples of functions include speech, startle response, music listening, and more. An inherent ability of humans, hearing is fundamental in communication across the globe, and the process of assigning meaning and value to speech is a complex but necessary function of the human body. The study of the auditory system has been greatly centered using mathematics and the analysis of sinusoidal vibrations and sounds. The Fourier transform has been an essential theorem in understanding how the human ear processes moving air and turns it into the audible frequency range, about 20 to 20,000 Hz. The ear is able to take one complex waveform and process it into varying frequency ranges thanks to differences in the structures of the ear canal that are tuned to specific frequency ranges. The initial sensory input is
{"page_id": 483924, "title": "Audio analysis"}
= (8, 4) is equidistant from A and B. Find at least two more points that are equidistant from A and B. Describe all such points. 5. (II.3.7) A lattice point is a point whose coordinates are integers. Find two lattice points that are exactly 13 units apart. Is i t possible to fi nd lattice points that are 15 units apart? Is it possible to form a square whose area is 18 by connecting four lattice points? Explain. 6. (II.5.8) Given that 2 3 17 x y− = and 4 3 7x y+ = , and without using paper, pencil, or calculator, fi nd the value of x. 7. (II.5.9) A slope can be considered to be a rate . Explain this interpretation. 8. (II.6.1) Three squares are placed next t o each other as shown. The vertices A, B, and C are collinear. Find the dimension n. When geometric figures have the same shape and corresponding lengths are in proportion they are called similar . 9. (II.5.2) Consider the linear equation # ( )3.62 1.35 2.74. y x= − + (a) What is the slope of this line? (b) What is the value of y when x =1.35? (c) This equation is written in point -slope form. Explain the terminology. (d) Use your calculator to graph this line. (e) Find an equation for the line through ( 4.23, −2.58) that is parallel to this line. 10. (II.6.3) A fi ve -foot freshman casts a shadow that is 40 feet long while standing 200 feet from a streetlight. How high above the ground is the lamp? 11. (II.6.4) (Continuation) How far from the streetligh t should the freshman stand, in order to cast a shadow that is exactly as long as the freshman is tall? Problem -Based Mathematics I
{"source": 4, "title": "from dpo"}
range. Figure 6-26. Example Hex Placements. Mountain Leader’s Guide to Mountain Warfare Operations ________________________________________________ 6-27 >  Units with a flexible stem instead of a rigid one for horizontal placements. >  Units with a different trigger design that is spe-cialized for flaring placements, for softer rock, and to fit in very tiny to very large cracks. Each manufacturer produces a line of cams in a wide size range. All modern camming devices have a presewn sling threaded through the stem to clip a carabiner through it. See figure 6-27. SLCD Placement . Flexible-stem cams can be placed in both vertical and horizontal cracks, even if this placement causes the stem to be loaded against an edge. The stem of a rigid-stem cam should NEVER be loaded against an edge because the load could bend or break the unit. Marines should also— >  Look for parallel-sided cracks, pockets, and cavities, since they make the best placements. Place cams in flared cracks, if appropriate. >  Avoid bottoming cracks; they can make removal difficult. >  Check surrounding rock for relative hardness and stability. Cams placed in soft rock, such as sandstone or limestone, can be pulled out by a hard fall even if properly placed. On remote virgin routes, Marines may have to clear dirt, moss, lichen, or grass from the crack before placing protection. Debris in the crack will adversely affect the camming action of the unit by reducing the friction between the lobes and the rock. Like hexes and nuts, climbers should select the cam that best fits the crack and always look for the cam that will best fit the placement, not for the placement that will best match the cam. Most manufacturers color-code their cams by size to facilitate selection. The following are some addi-tional
{"source": 2294, "title": "from dpo"}
■ Now we are ready to lower-bound Ray ( 𝐹 ) ⁠. Proof of Theorem 5.1. We may assume that 𝜇 ∗ ( 𝛿 ) > 0 ⁠, that is, 𝛿 ≥ 𝜆 2 ⁠, since otherwise the inequality is trivial. By property (2) of Lemma 5.2, the balls are disjoint. Therefore, ∑ 𝑖 = 1 𝑚 | 𝐵 𝑖 | ≤ 𝑛 ⁠. Hence Lemma 3.14 yields 𝛿 ≥ 𝑅 𝑎 𝑦 ( 𝐹 ) = ∑ 𝑥 ∼ 𝑦 ‖ 𝐹 𝑥 − 𝐹 𝑦 ‖ 𝑤 2 ∑ 𝑦 ‖ 𝐹 𝑦 ‖ 𝑤 2 𝑤 ( 𝑦 ) ≥ 1 2 𝑛 𝜇 ∗ ( 𝛿 ) ∑ 𝑖 = 1 𝑚 𝐸 𝐹 ( 𝐵 𝑖 ) > 1 2 𝑛 𝜇 ∗ ( 𝛿 ) ∑ 𝑖 = 1 𝑚 𝜇 ∗ ( 𝛿 ) 250 | 𝐵 𝑖 | 2 ≥ 𝑚 3 500 𝑛 3 ≥ 𝜇 ∗ ( 𝛿 ) 3 4000 , where the second inequality follows by Lemma 3.11 and the fact that each edge is counted in at most two balls, the fourth inequality follows by convexity of the function 𝑠 ↦ 1 / 𝑠 2 ⁠, and the last inequality holds by the fact that 𝑚 ≥ 𝑛 𝜇 ∗ ( 𝛿 ) / 2 ⁠. This completes the proof of Theorem 5.1. ■ As a corollary of the above theorem, we can upper bound the average return probability of lazy simple random walk on every finite connected graph. This can also be expressed in terms of a version of mixing, since ∑ 𝑥 ∈ 𝑉 𝑝 2 𝑡 ( 𝑥 , 𝑥 ) − 1 = ∑ 𝑥 ∈ 𝑉 𝜋 ( 𝑥 ) ∑ 𝑦 ∈ 𝑉 | 𝑝 𝑡 ( 𝑥 , 𝑦 )
{"source": 4199, "title": "from dpo"}
do not lie in a periodic Syracuse orbit, or more precisely that \begin{align*}\mathbb{P}( {\operatorname{Syr}}^n(\mathbf{N}_y) = \mathbf{N}_y \text{ for some } n \in \mathbb{N}+1 ) \ll x^{-c}.\end{align*} Indeed, the above arguments show that outside of an event of probability x^{-c} , one has {\operatorname {Syr}}^{\mathbf {m}}(\mathbf {N}_y) \leq x for some \mathbf {m} \leq n_0 , which we can assume to be minimal amongst all such \mathbf {m} . If {\operatorname {Syr}}^n(\mathbf {N}_y) = \mathbf {N}_y for some n, we then have (5.6) \begin{align} \mathbf{N}_y = {\operatorname{Syr}}^{n(\mathbf{M})-\mathbf{m}}(\mathbf{M}) \end{align} for \mathbf {M} := {\operatorname {Syr}}^{\mathbf {m}}(\mathbf {N}_y) \in [1,x] that generates a periodic Syracuse orbit with period n(\mathbf {M}) . (This period n(\mathbf {M}) could be extremely large, and the periodic orbit could attain values much larger than x or y, but we will not need any upper bounds on the period in our arguments, other than that it is finite.) The number of possible pairs (\mathbf {M},\mathbf {m}) obtained in this fashion is O(xn_0) . By equation (5.6), the pair (\mathbf {M},\mathbf {m}) uniquely determines \mathbf {N}_y . Thus, outside of the aforementioned event, a periodic orbit is only possible for at most O(xn_0) possible values of \mathbf {N}_y ; as this is much smaller than y, we thus see that a periodic orbit is only attained with probability O(x^{-c}) , giving the claim. It is then a routine matter to then deduce that almost all positive integers do not lie in a periodic Collatz orbit; we leave the details to the interested reader. Now we establish equation (1.20). By equation (1.10), it suffices to show that for E \subset 2\mathbb {N}+1 \cap [1,x] , that (5.7) \begin{align} \mathbb{P}( {\operatorname{Pass}}_x( \mathbf{N}_y ) \in E ) = \left(1 + O( \log^{-c} x )\right) Q + O( \log^{-c} x ) \end{align} for some
{"source": 6064, "title": "from dpo"}
have to evaluate 3(2ℓ′+ 1)(2ℓ+ 1) matrix elements, for example, 3×3×5 = 45 in a 3d → 2p transition. This is actually an exaggeration, as we shall see, because many of the matrix elements vanish, but there are still many non-vanishing matrix elements to be calculated. A great simplification can be achieved by expressing the components of r, not with respect to the Cartesian basis, but with respect to the spherical basis. First we define, r q = e ^ q ⋅ r {\displaystyle r_{q}={\hat {\mathbf {e} }}_{q}\cdot \mathbf {r} } Next, by inspecting a table of the Yℓm′s, we find that for ℓ = 1 we have, r Y 11 ( θ , ϕ ) = − r 3 8 π sin ⁡ ( θ ) e i ϕ = 3 4 π ( − x + i y 2 ) r Y 10 ( θ , ϕ ) = r 3 4 π cos ⁡ ( θ ) = 3 4 π z r Y 1 − 1 ( θ , ϕ ) = r 3 8 π sin ⁡ ( θ ) e − i ϕ = 3 4 π ( x − i y 2 ) {\displaystyle {\begin{aligned}rY_{11}(\theta ,\phi )&=&&-r{\sqrt {\frac {3}{8\pi }}}\sin(\theta )e^{i\phi }&=&{\sqrt {\frac {3}{4\pi }}}\left(-{\frac {x+iy}{\sqrt {2}}}\right)\\rY_{10}(\theta ,\phi )&=&&r{\sqrt {\frac {3}{4\pi }}}\cos(\theta )&=&{\sqrt {\frac {3}{4\pi }}}z\\rY_{1-1}(\theta ,\phi )&=&&r{\sqrt {\frac {3}{8\pi }}}\sin(\theta )e^{-i\phi }&=&{\sqrt {\frac {3}{4\pi }}}\left({\frac {x-iy}{\sqrt {2}}}\right)\end{aligned}}} where, we have multiplied each Y1m by the radius r. On the right hand side we see the spherical components rq of the position vector r. The results can be summarized by, r Y 1 q ( θ , ϕ ) = 3 4 π r q {\displaystyle rY_{1q}(\theta ,\phi )={\sqrt {\frac {3}{4\pi }}}r_{q}} for q = 1, 0, −1, where q appears explicitly as
{"page_id": 39654522, "title": "Tensor operator"}
k B T = − ln ⁡ ( p i = on ) + ln ⁡ ( p i = off ) = ln ⁡ ( 1 − p i = on p i = on ) = ln ⁡ ( p i = on − 1 − 1 ) , {\displaystyle -{\frac {\Delta E_{i}}{k_{B}T}}=-\ln(p_{i={\text{on}}})+\ln(p_{i={\text{off}}})=\ln {\Big (}{\frac {1-p_{i={\text{on}}}}{p_{i={\text{on}}}}}{\Big )}=\ln(p_{i={\text{on}}}^{-1}-1),} whence the probability that the i {\displaystyle i} -th unit is given by p i = on = 1 1 + exp ⁡ ( − Δ E i k B T ) , {\displaystyle p_{i={\text{on}}}={\frac {1}{1+\exp {\Big (}-{\frac {\Delta E_{i}}{k_{B}T}}{\Big )}}},} where the scalar T {\displaystyle T} is referred to as the temperature of the system. This relation is the source of the logistic function found in probability expressions in variants of the Boltzmann machine. == Equilibrium state == The network runs by repeatedly choosing a unit and resetting its state. After running for long enough at a certain temperature, the probability of a global state of the network depends only upon that global state's energy, according to a Boltzmann distribution, and not on the initial state from which the process was started. This means that log-probabilities of global states become linear in their energies. This relationship is true when the machine is "at thermal equilibrium", meaning that the probability distribution of global states has converged. Running the network beginning from a high temperature, its temperature gradually decreases until reaching a thermal equilibrium at a lower temperature. It then may converge to a distribution where the energy level fluctuates around the global minimum. This process is called simulated annealing. To train the network so that the chance it will converge to a global state according to an external distribution over these states, the weights must be set so that the global
{"page_id": 1166059, "title": "Boltzmann machine"}
V A {\displaystyle V_{\mathrm {A} }} was calculated above. N {\displaystyle N} is the number of small spheres and Λ {\displaystyle \Lambda } is the de Broglie wavelength. Substituting Q {\displaystyle Q} into the statistical definition, the Helmholtz free energy now reads A = − k B T ln ⁡ ( V A N N ! Λ 3 N ) {\displaystyle A=-k_{\mathrm {B} }T\ln {\bigg (}{\frac {V_{\mathrm {A} }^{N}}{N!\Lambda ^{3N}}}{\bigg )}} The magnitude of the depletion force, F {\displaystyle {\mathcal {F}}} is equal to the change in Helmholtz free energy with distance between two large spheres and is given by F = − ( ∂ A ∂ h ) T {\displaystyle {\mathcal {F}}=-{\bigg (}{\frac {\partial A}{\partial h}}{\bigg )}_{T}} The entropic nature of depletion forces was proven experimentally in some cases. For example, some polymeric crowders induce entropic depletion forces that stabilize proteins in their native state. Other examples include many systems with hard-core only interactions. === Osmotic pressure === The depletion force is an effect of increased osmotic pressure in the surrounding solution. When colloids get sufficiently close, that is when their excluded volumes overlap, depletants are expelled from the interparticle region. This region between colloids then becomes a phase of pure solvent. When this occurs, there is a higher depletant concentration in the surrounding solution than in the interparticle region. The resulting density gradient gives rise to an osmotic pressure that is anisotropic in nature, acting on the outer sides of the colloids and promoting flocculation. If the hard-sphere approximation is employed, the osmotic pressure is: p 0 = ρ k B T {\displaystyle p_{0}=\rho k_{\mathrm {B} }T} where p 0 {\displaystyle p_{0}} is osmotic pressure and ρ {\displaystyle \rho } is number density of small spheres and k B {\displaystyle k_{\mathrm {B} }} is the Boltzmann constant. ==
{"page_id": 39639151, "title": "Depletion force"}
of the ethanol solution whose droplets were absorbed in the allotted 10 seconds. Classifying soil water repellency from this test can be done by using a MED index where a non-water repellent soil has an index of less than or equal to 1 and a severely water repellent soil has an index of greater than or equal to 2.2. The MED index, 90º surface tension, ethanol molarity, and volume percentage correlate and can be converted into one another. In this test, the liquid-air surface tension value of the ethanol solution that is absorbed within this timeframe is used as the ninety-degree surface tension of the soil. The water entry pressure associated with the tested soil is another indicator of infiltration rates as it is associated with the degree of water repellency along with soil pore size. == Effect on agriculture and ecosystems == Hydrophobic soils and their aversion to water have consequences on plant water availability, plant-available nutrients, hydrology, and geomorphology of the affected area. By reducing the infiltration rate, runoff generation time is reduced and leads to an increase in the land flow of water during precipitation or irrigation events. Greater runoff increases erosion, causes uneven wetting patterns in soil, accelerates nutrient leaching reducing soil fertility, develops different flow paths in the region, and increases the risk of contamination in soils. Drainage of nutrients occurs in weaker areas of repellency in hydrophobic soil where water preferentially drains into the soil. Because the water cannot drain into the stronger areas of hydrophobicity, the water finds pathways of preferential flow where it can infiltrate deeper into the soil profile. If irrigation or precipitation events are large, the water could potentially flow below the root zone, making it unavailable to any plant life and oftentimes taking fertilizers and nutrients with it. This
{"page_id": 4211997, "title": "Hydrophobic soil"}
systems have a maximum theoretical efficiency that is 2.9 dB greater than that of the closed-box system. Subwoofers are typically constructed by mounting one or more woofers in a cabinet of medium-density fibreboard (MDF), oriented strand board (OSB), plywood, fiberglass, aluminum or other stiff materials. Because of the high air pressure that they produce in the cabinet, subwoofer enclosures often require internal bracing to distribute the resulting forces. Subwoofers have been designed using a number of enclosure approaches: bass reflex (with a port or vent), using a subwoofer and one or more passive radiator speakers in the enclosure, acoustic suspension (sealed enclosure), infinite baffle, horn-loaded, tapped horn, transmission line and bandpass. Each enclosure type has advantages and disadvantages in terms of efficiency increase, bass extension, cabinet size, distortion, and cost. Multiple enclosure types may even be combined in a single design, such as in computer audio with the subwoofer design of the Labtec LCS-2424 (later acquired by Logitech and used for their Z340/Z540/Z640/Z3/Z4), which is a (primitive) passive radiator bandpass enclosure with a bass reflex dividing chamber. While not necessarily an enclosure type, isobaric (such as push-pull) coupled loading of two drivers has sometimes been used in subwoofer products of computer, home cinema and sound reinforcement class, and also DIY versions in automotive applications, to provide relatively deep bass for their size. Self-contained "isobaric-like" driver assemblies have been manufactured since the 2010s. The smallest subwoofers are typically those designed for desktop multimedia systems. The largest common subwoofer enclosures are those used for concert sound reinforcement systems or dance club sound systems. An example of a large concert subwoofer enclosure is the 1980s-era Electro-Voice MT-4 "Bass Cube" system, which used four 18-inch (45 cm) drivers. An example of a subwoofer that uses a bass horn is the Bassmaxx B-Two, which loads
{"page_id": 45810, "title": "Subwoofer"}
as 15 mg/m3 total exposure and 5 mg/m3 respiratory exposure over an 8-hour workday. The National Institute for Occupational Safety and Health (NIOSH) has set a recommended exposure limit (REL) of 10 mg/m3 total exposure and 5 mg/m3 respiratory exposure over an 8-hour workday. Dust, debris and temperature fluctuations from working marble can endanger the eye health of employees. For the staff involved in marble processing, it is necessary to provide eye protection equipment, and it is recommended to improve the education of all workers on occupational health risks and strengthen preventive measures. == Cultural associations == As the favorite medium for Greek and Roman sculptors and architects (see classical sculpture), marble has become a cultural symbol of tradition and refined taste. Its extremely varied and colorful patterns make it a favorite decorative material. Places named after the stone include Marblehead, Massachusetts; Marblehead, Ohio; Marble Arch, London; the Sea of Marmara; India's Marble Rocks; and the towns of Marble, Minnesota; Marble, Colorado; Marble Falls, Texas, and Marble Hill, Manhattan, New York. The Elgin Marbles are marble sculptures from the Parthenon in Athens that are on display in the British Museum. == Impact on the environment == Total world quarrying production in 2019 was approximately 316 million tonnes; however, quarrying waste accounted for 53% of this total production. In the process of marble mining and processing, around half of the excavated material will be waste, this is often then used as chips for flooring or wall finish, and uses for which high-calcium limestone is suitable. == Sustainability == Marble sludge waste can be used as a mineral filler in water-based paints. Using ground calcium carbonate as a filler in paint production can improve the brightness, hiding power and application performance of paint, and can also replace expensive pigments such as titanium
{"page_id": 19054, "title": "Marble"}
Adoption studies typically compare pairs of persons, e.g., adopted child and adoptive mother or adopted child and biological mother, to assess genetic and environmental influences on behavior. These studies are one of the classic research methods of behavioral genetics. The method is used alongside twin studies to identify the roles of genetics and environmental variables that impact intelligence, and behavioral disorders. Adoption studies differ from twin studies in that adoption studies do not necessarily need to use twins; instead, they compare the traits of children to their parents, whether those are the adoptive parents or biological parents. == Study designs and methods == There are two standard ways in which adoption studies are carried out; the adoptee's study method and the adoptee's family method. The adoptee's study method compares adoptee's similarity to their biological and adoptive parents. Similarity with the biological parent is expected to be due to genetics, while similarity with the adoptive parent is due to home-environment, which is referred as the shared environmental effect. The adoptee's family method compares non-biological siblings who are reared in the same household. Similarity to non-biological siblings raised in the same household is attributed to shared environmental effect, as the siblings are genetically unrelated but share the home environment.Variation that cannot be accounted for by either genetics or home-environment is typically described as a non-shared environment. == Examples == === Mental disorders === The first adoption study on schizophrenia published in 1966 by Leonard Heston demonstrated that the biological children of parents with schizophrenia were just as likely to develop schizophrenia whether they were reared by their parents or adopted and was essential in establishing schizophrenia as being largely genetic instead of being a result of child rearing methods. Analogous studies that followed have shown that mental disorders such as alcoholism, antisocial
{"page_id": 47565306, "title": "Adoption study"}
Helen M. Bronte-Stewart is a neurologist and John E Cahill Family Professor in the department of neurology and neurological Sciences at Stanford University School of Medicine. She is also the former director of the Stanford Movement Disorders Center. == Education and career == She studied mathematics and physics at the University of York before earning a master's degree in bioengineering from the University of Pennsylvania. She then obtained a medical degree from the Perelman School of Medicine. She was promoted to an associate professorship in December 2006. Bronte-Stewart later held the John E. Cahill Family Professorship, first held by William C. Mobley. Her research focuses on the pathophysiology of Parkinson's Disease and other movement disorders. == Personal life == Bronte-Stewart is a former professional dancer. == References == == External links == Helen Bronte-Stewart publications indexed by Google Scholar
{"page_id": 70151128, "title": "Helen Bronte-Stewart"}
NGC 752 (also known as Caldwell 28) is an open cluster in the constellation Andromeda. The cluster was discovered by Caroline Herschel in 1783 and cataloged by her brother William Herschel in 1786, although an object that may have been NGC 752 was described by Giovanni Batista Hodierna before 1654. The large cluster lies 1,400 light-years away from the Earth and is easily seen through binoculars, although it may approach naked eye visibility under good observing conditions. A telescope reveals about 60 stars no brighter than 9th magnitude within NGC 752. == Components == The most up-to-date research lists 302 stars as members of NGC 752. Since the age of the cluster is 1.34±0.06 Gyr, they are mainly low mass stars on the main sequence or red giants, with a main sequence turnoff at about F0. A blue straggler star is also present, along with some spectroscopic binaries and variable stars. The detached eclipsing binary DS Andromedae is a member of this cluster. == Images == === Notable stars === == References == == External links == SEDS – NGC 752 perseus.gr – NGC 752 in a hires LRGB CCD image NGC 752 on WikiSky: DSS2, SDSS, GALEX, IRAS, Hydrogen α, X-Ray, Astrophoto, Sky Map, Articles and images
{"page_id": 983444, "title": "NGC 752"}
L = { ℓ 1 , ℓ 2 , … } {\displaystyle {\mathcal {L}}=\{\ell _{1},\ell _{2},\ldots \}} written in non-increasing order. We allow Ω {\displaystyle \Omega } to consist of finitely many open intervals, in which case L {\displaystyle {\mathcal {L}}} consists of finitely many lengths. We refer to L {\displaystyle {\mathcal {L}}} as a fractal string. === Example === The middle third's Cantor set is constructed by removing the middle third from the unit interval ( 0 , 1 ) {\displaystyle (0,1)} , then removing the middle thirds of the subsequent intervals, ad infinitum. The deleted intervals Ω = { ( 1 3 , 2 3 ) , ( 1 9 , 2 9 ) , ( 7 9 , 8 9 ) , … } {\displaystyle \Omega =\left\{\left({\frac {1}{3}},{\frac {2}{3}}\right),\left({\frac {1}{9}},{\frac {2}{9}}\right),\left({\frac {7}{9}},{\frac {8}{9}}\right),\ldots \right\}} have corresponding lengths L = { 1 3 , 1 9 , 1 9 , … } {\displaystyle {\mathcal {L}}=\left\{{\frac {1}{3}},{\frac {1}{9}},{\frac {1}{9}},\ldots \right\}} . Inductively, we can show that there are 2 n − 1 {\displaystyle 2^{n-1}} intervals corresponding to each length of 3 − n {\displaystyle 3^{-n}} . Thus, we say that the multiplicity of the length 3 − n {\displaystyle 3^{-n}} is 2 n − 1 {\displaystyle 2^{n-1}} . The fractal string of the Cantor set is called the Cantor string. === Heuristic === The geometric information of the Cantor set in the example above is contained in the ordinary fractal string L {\displaystyle {\mathcal {L}}} . From this information, we can compute the box-counting dimension of the Cantor set. This notion of fractal dimension can be generalized to that of complex dimension, which may be used to deduce geometrical information regarding the local oscillations in the geometry of the fractal. For example, the complex dimensions of a fractal string
{"page_id": 48994134, "title": "Fractal string"}
when an eagle is spotted nearby. These signals are fixed in terms of their reference and cannot be manipulated. What might count as evidence of productivity in the mon-key’s communication system would be an utterance of something like CHUTT-RRAUP when a flying creature that looked like a snake came by. Despite a lot of research involving snakes suddenly appearing in the air above them (among other unusual and terrifying experiences), the vervet monkeys didn’t produce a new danger signal. The human, given similar circumstances, is quite capable of creating a “new” signal, after initial surprise perhaps, by saying something never said before, as in Hey! Watch out for that flying snake! # Cultural transmission While we may inherit physical features such as brown eyes and dark hair from our parents, we do not inherit their language. We acquire a language in a culture with other speakers and not from parental genes. An infant born to Korean parents in Korea, but adopted and brought up from birth by English speakers in the United States, will have physical characteristics inherited from his or her natural parents, but will inevitably speak English. A kitten, given comparable early experiences, will produce meow regardless. This process whereby a language is passed on from one generation to the next is described as cultural transmission . It is clear that humans are born with some kind of predisposition to acquire language in a general sense. However, we are not born with the ability to produce utterances in a specific language such as English. We acquire our first language as children in a culture. The general pattern in animal communication is that creatures are born with a set of specific signals that are produced instinctively. There is some evidence from studies of birds as they develop their songs
{"source": 991, "title": "from dpo"}
predict the entire training set. Justify your answer. ⋆ SOLUTION: One solution follows from the observation that the decision boundary for N1 could be x1 = 3 .7. In fact, N1 can be removed entirely from the model. This yields a similar decision boundary for N3 except that V 1 = x1 ranges from 0 to 6. 14 Other possible solutions are to change the input feature space (e.g., by adding x21 as an input to a single neuron along with x1, x 2). 15 6 [14 Points] The Effect of Irrelevant Features 1. (a) [3 points] Provide a 2D dataset where 1-nearest neighbor (1-NN) has lower leave-one-out cross validation error (LOO error) than SVMs. > 12345678910 11 12 > 0 > 2 > 4 > 6 > 8 > 10 > 12 Figure 5: Dataset where 1-NN will do better than SVM in LOOCV. (b) [3 points] Provide a 2D dataset where 1-NN has higher LOO error than SVMs. > 12345678910 11 12 > 0 > 2 > 4 > 6 > 8 > 10 > 12 Figure 6: Dataset where SVM will do better than 1-NN in LOOCV. 2. [8 points] You will now generate a dataset to illustrate SVMs’ robustness to irrelevant features. In particular, create a 2D dataset with features X1 and X2, here X2 will be the irrelevant feature, such that: • If you only use X1, 1-NN will have lower LOO error than SVMs, • but if you use both X1 and X2, the SVM LOO error will remain the same, but LOO error for 1-NN will increase significantly. 16 1 2 3 4 5 6 7 8 9 10 11 12 13 14 > 0 > 2 > 4 > 6 > 8 > 10 > 12 > 14 Figure 7: Here the
{"source": 2754, "title": "from dpo"}
1A that you already may have determined McDonald’s exter-nal opportunities/threats and internal strengths/weaknesses. This information could be used to complete this exercise. Follow the steps outlined as follows: Step 1 On a separate sheet of paper, construct a large nine-cell diagram that will represent your SWOT Matrix. Appropriately label the cells. Step 2 Appropriately record McDonald’s opportunities/threats and strengths/weaknesses in your diagram. Step 3 Match external and internal factors to generate feasible alternative strategies for McDonald’s. Record SO, WO, ST, and WT strategies in the appropriate cells of the SWOT Matrix. Use the proper notation to indicate the rationale for the strategies. You do not necessarily have to have strategies in all four strategy cells. Step 4 Compare your SWOT Matrix to another student’s SWOT Matrix. Discuss any major differences. ## Assurance of Learning Exercise 6B Developing a SPACE Matrix for McDonald’s Purpose Should McDonald’s pursue aggressive, conservative, competitive, or defensive strategies? Develop a SPACE Matrix for McDonald’s to answer this question. Elaborate on the strategic implications of your directional vector. Be specific in terms of strategies that could benefit McDonald’s. Instructions Step 1 Join with two other people in class and develop a joint SPACE Matrix for McDonald’s. Step 2 Diagram your SPACE Matrix on the board. Compare your matrix with other team’s matrices. Step 3 Discuss the implications of your SPACE Matrix. ## Assurance of Learning Exercise 6C Developing a BCG Matrix for McDonald’s Purpose Portfolio matrices are widely used by multidivisional organizations to help identify and select strategies to pursue. A BCG analysis identifies particular divisions that should receive fewer resources than others. It may identify some divisions that need to be divested. This exercise can give you practice developing a BCG Matrix. 206 PART 2 • STRATEGY FORMULATION Instructions Step 1 Place the following five column
{"source": 4976, "title": "from dpo"}
crestdsl for the detailed model creation. We are currently in the process of evaluating the requirements to such an interactive graphical development environment and evaluating likely development workflows to find out which tasks can be more efficiently executed in which syntax. This analysis should also help us answer the question for which phases the user will switch between languages. A point of concern is that a translation from CREST diagrams to crestdsl necessitates the parsing of transition guards, update functions, etc, whose syntax is currently not limited by CREST. Thus, a graphical-to-textual translation mandates a limitation of the supported syntax, which could for instance be Python for integration with crestdsl or some dedicated, embedded DSL. Though the benefits of this extension appear evident, we consider a thorough evaluation of the complete, required feature scope (e.g. a graphical editor, parser, etc) and the analysis of development and maintenance costs for the (interactive) bidirectional translation as future work. User feedback Since our project aims at the use by non-expert modellers, throughout the project we sought the input of people from outside the modeling research domain. Given our academic background, we therefore asked our students (Bachelor’s and Master’s level) to use CREST and crestdsl, in order to gather feedback and improve the usability. The conclusions drawn from these evaluations are largely positive and show that both, the CREST formalism as well as the crestdsl implementation can be easily learned. Even though the users neither had a background in modeling nor any training in CPS design, they rapidly acquired the necessary knowledge to model our case study systems and were even able to create object libraries. These experience reports provide us with valuable feedback and confirm that our method is promising, although we admit the necessity of a more formal evaluation. Thus, we are
{"source": 6286, "title": "from dpo"}
families after the end of Nicolae Ceauşescu's regime. The English and Romanian Adoptees Study Team, led by Michael Rutter, has followed some of the children into their teens, attempting to unravel the effects of poor attachment, adoption and new relationships, and the physical and medical problems associated with their early lives. Studies on the Romanian adoptees, whose initial conditions were shocking, have in fact yielded reason for optimism. Many of the children have developed quite well, and the researchers have noted that separation from familiar people is only one of many factors that help to determine the quality of development. Neuroscientific studies are examining the physiological underpinnings of observable attachment style, such as vagal tone which influences capacities for intimacy, stress response which influences threat reactivity (Lupien, McEwan, Gunnar & Heim, 2009), as well as neuroendocrinology such as oxytocin. These types of studies underscore the fact that attachment is an embodied capacity not only a cognitive one. === Effects of changing times and approaches === Some authors have noted the connection of attachment theory with Western family and child care patterns characteristic of Bowlby's time. The implication of this connection is that attachment-related experiences (and perhaps attachment itself) may alter as young children's experience of care change historically. For example, changes in attitudes toward female sexuality have greatly increased the numbers of children living with their never-married mothers and being cared for outside the home while the mothers work. This social change, in addition to increasing abortion rates, has also made it more difficult for childless people to adopt infants in their own countries, and has increased the number of older-child adoptions and adoptions from third-world sources. Adoptions and births to same-sex couples have increased in number and even gained some legal protection, compared to their status in Bowlby's time.
{"page_id": 18756845, "title": "History of attachment theory"}
plan at a larger scale, modifying it. The work on the Severan map posed interpretative problems. Bigot rarely cites ancient or contemporary sources, even though he "truly drew from all the archaeological and historical literature" present at the French School in Rome, unlike other submissions that provided lists of sources. He was aided by his peers and by Duchesne, the director of the school. He also kept up with current events, which allowed him to make subsequent modifications to his model, though he likely did not leave archives. His colleagues at the French School assisted him, including Albert Grenier, Jérôme Carcopino, Eugène Albertini, and André Piganiol. His bibliography seems to date from the period 1904–1911, as well as the changes linked to the refurbishments of the 1930s. Balty considers that the work "reveals documentation that is already somewhat outdated." His analysis allowed him to modify certain attributions of fragments of the Severan marble. Even though Bigot closely followed Lanciani's conclusions for his study of the Forma Urbis, he also appealed to the hypotheses of Hülsen and Gatti. Bigot followed ongoing archaeological debates and unsolved questions, adhering to certain hypotheses, such as the location of the Actian Apollo temple. After conducting research and discussions with scholars like Jérôme Carcopino and Italo Gismondi, Bigot revised his proposals on his model. His work was, therefore, the product of an "intellectual ferment" and was not a mere "three-dimensional translation of monuments reconstructed by others." ===== At the heart of Bigot’s project: the Circus Maximus ===== The Circus Maximus (or Great Circus) fascinated him "for its historical and social significance," from Romulus to Constantine II, and it was his "beloved child" that dominated the model, acting as a "kind of guiding thread." The circus is seen as "the true center of the relief" and a
{"page_id": 79140030, "title": "Plan of Rome (Bigot)"}
TB9Cs1H1 is a member of the H/ACA-like class of non-coding RNA (ncRNA) molecule that guide the sites of modification of uridines to pseudouridines of substrate RNAs. It is known as a small nucleolar RNA (snoRNA) thus named because of its cellular localization in the nucleolus of the eukaryotic cell. TB9Cs1H1 is predicted to guide the pseudouridylation of LSU3 ribosomal RNA (rRNA) at residue Ψ1273 and SSU ribosomal RNA (rRNA) at residue Ψ1088. == References ==
{"page_id": 21560425, "title": "TB9Cs1H1 snoRNA"}
"America will have to address all the aspects of black experience that are disadvantageous, beginning with the regeneration of inner city neighborhoods and their schools." Especially in developing nations, society has been urged to take on the prevention of cognitive impairment in children as a high priority. Possible preventable causes include malnutrition, infectious diseases such as meningitis, parasites, cerebral malaria, in utero drug and alcohol exposure, newborn asphyxia, low birth weight, head injuries, lead poisoning and endocrine disorders. == See also == Behavioral epigenetics Melanin theory Model minority Nations and IQ Outline of human intelligence == References == === Notes === === Citations === === Bibliography ===
{"page_id": 26494, "title": "Race and intelligence"}
A limnological tower is a structure constructed in a body of water to facilitate the study of aquatic ecosystems (limnology). They play an important role in drinking water infrastructure by allowing the prediction of algal blooms which can block filters and affect the taste of the water. == Purpose == Limnological towers provide a fixed structure to which sensors and sampling devices can be affixed. The depth of the structure below water level allows for study of the various layers of water in the lake or reservoir. The management of limnological conditions can be important in reservoirs used to supply drinking water treatment plants. In certain conditions algal blooms can occur which can block filters, change the pH of the water and cause taste and odour problems. If the sensors extend to the bed level the tower can also be used to monitor the hypolimnion (lowest layer of water) which in some conditions can become anoxic (of low oxygen content) which may affect the lake ecology. Limnological towers have been constructed in reservoirs used to supply drinking water in the United Kingdom since algal blooms began causing problems with water quality. By providing data on water conditions and algae levels the towers can predict the behaviour of the algae and allow managers to make decisions to alter conditions to prevent algal blooms. These decisions may include altering water inflows (particularly where nutrient-rich intakes are considered), activating water jets to promote the mixing of different layers of water and altering the depth from which water is abstracted. These decisions can affect the behaviour of the reservoir over a period from a few hours to a few years. == Examples == === North America === Six combined limnological and meteorological observation towers were established in the Great Lakes on the US-Canadian border
{"page_id": 62184291, "title": "Limnological tower"}