text
stringlengths
5
10.5k
source
stringlengths
33
146
Host Based Security System (HBSS) is the official name given to the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems. The Enterprise-wide Information Assurance and computer Network Defense Solutions Steering Group (ESSG) sponsored the acquisition of the HBSS System for use within the DOD Enterprise Network. HBSS is deployed on both the Non-Classified Internet Protocol Routed Network (NIPRNet) and Secret Internet Protocol Routed Network (SIPRNet) networks, with priority given to installing it on the NIPRNet. HBSS is based on McAfee, Inc's ePolicy Orchestrator (ePO) and other McAfee point product security applications such as Host Intrusion Prevention System (HIPS). == History == Seeing the need to supply a comprehensive, department-wide security suite of tools for DOD System Administrators, the ESSG started to gather requirements for the formation of a host-based security system in the summer of 2005. In March 2006, BAE Systems and McAfee were awarded a contract to supply an automated host-based security system to the department. After the award, 22 pilot sites were identified to receive the first deployments of HBSS. During the pilot roll out, DOD System Administrators around the world were identified and trained on using the HBSS software in preparation for software deployment across DOD. On October 9, 2007, the Joint Task Force for Global Network Operations (JTF-GNO) released Communications Tasking Order (CTO) 07-12 (Deployment of Host Based Security System (HBSS)) mandating the deployment of HBSS on all Combatant Command, Service and Agency (CC/S/A) networks within DOD with the completion date by the 3rd quarter of 2008. The release of this CTO brought HBSS to the attention of all major department heads and CC/S/A's, providing the ESSG with the necessary authority to enforce its deployment. Agencies
{"page_id": 31285693, "title": "Host Based Security System"}
Steam stripping is a process used in petroleum refineries and petrochemical plants to remove volatile contaminants, such as hydrocarbons and other volatile organic compounds (VOCs), from wastewater. It typically consists of passing a stream of superheated steam through the wastewater. This method is effective when the volatile compounds have lower boiling points than water or have limited solubility in water. == References ==
{"page_id": 26346355, "title": "Steam stripping"}
DOPE, or Discrete Optimized Protein Energy, is a statistical potential used to assess homology models in protein structure prediction. DOPE is based on an improved reference state that corresponds to noninteracting atoms in a homogeneous sphere with the radius dependent on a sample native structure; it thus accounts for the finite and spherical shape of the native structures. It is implemented in the popular homology modeling program MODELLER and used to assess the energy of the protein model generated through many iterations by MODELLER, which produces homology models by the satisfaction of spatial restraints. The models returning the minimum molpdfs can be chosen as best probable structures and can be further used for evaluating with the DOPE score. Like the current version of the MODELLER software, DOPE is implemented in Python and is run within the MODELLER environment. The DOPE method is generally used to assess the quality of a structure model as a whole. Alternatively, DOPE can also generate a residue-by-residue energy profile for the input model, making it possible for the user to spot the problematic region in the structure model. == References == == External links == MODELLER main site MODELLER manual
{"page_id": 6987160, "title": "Discrete optimized protein energy"}
2282 km/L of petrol using the fuel cell set-up (the hydrogen consumption of the fuel cell is monitored carefully by race officials and then converted to the equivalent of a liter of Shell 95 standard fuel using specific combustion heat of both substances). This was despite a hastily repaired and therefore very poorly functioning cruise control system, a feature essential for keeping all of the components working at maximum efficiency. === Eco-Runner 3 === The third generation of the Eco-Runner participated in the 2011 Shell Eco-Marathon and placed 2nd. Major improvements were achieved regarding, aerodynamics, fuel cell efficiency, and weight reduction. Virtually no components of the Eco-Runner 3 were off-the-shelf: 95% of all components were either designed in-house or modified to suit the team's specific needs. === Eco-Runner 4 === The fourth generation of the Eco-Runner participated in the 2014 Shell Eco-marathon in Rotterdam and placed 2nd again. This year marked specification changes in the prototype class, it was now a hydrogen class vehicle. A conversion was used from the energy in hydrogen to the equivalent energy in gasoline (liters), which allowed the vehicle to achieve a significant result of 3524 km/L. The weight of the Eco-Runner 4 was around 38 kg and driver's weight was 50 kg. During the race, the average force generated was close to 4 Newtons, and a nominal power of 35 Watts was achieved. === Eco-Runner 5 === The fifth generation of the Eco-Runner participated in the 2015 Shell Eco-marathon in Rotterdam and came 1st. The archetype was named as a one-man vehicle powered by hydrogen fuel cell, becoming a category within the hydrogen class vehicle. The major specifications of the Eco-Runner 4 were carried over due to its highly aerodynamic design. Once again, the energy conversion from hydrogen to gasoline (liters) allowed the Eco-Runner
{"page_id": 9646634, "title": "Eco-Runner Team Delft"}
popular from the 1970s until computers made those processes obsolete. === CGI and computer-aided design === Computer-aided design (generally referred to by the acronym CAD) is the use of computer software to create drawings. Today the vast majority of technical drawings of all kinds are made using CAD. Instead of drawing lines on paper, the computer records equivalent information electronically. There are many advantages to this system: repetition is reduced because complex elements can be copied, duplicated and stored for re-use. Errors can be deleted, and the speed of drafting allows many permutations to be tried before the design is finalized. On the other hand, CAD drawing encourages a proliferation of detail and increased expectations of accuracy, aspects which reduce the efficiency originally expected from the move to computerization. Professional CAD software such as AutoCAD is complex and requires both training and experience before the operator becomes fully productive. Consequently, skilled CAD operators are often divorced from the design process. Simpler software such as SketchUp and Vectorworks allows for more intuitive drawing and is intended as a design tool. CAD is used to create all kinds of drawings, from working drawings to photorealistic perspective views. Architectural renderings (also called visualizations) are made by creating a three-dimensional model using CAD. The model can be viewed from any direction to find the most useful viewpoints. Different software (for example Autodesk 3ds Max) is then used to apply color and texture to surfaces, and to represent shadows and reflections. The result can be accurately combined with photographic elements: people, cars, background landscape. ==== Building information modeling ==== Building information modeling (BIM) is the logical development of CAD drawing, a relatively new technology but fast becoming mainstream. The design team collaborates to create a three-dimensional computer model, and all plans and other two-dimensional views
{"page_id": 21482414, "title": "Architectural drawing"}
important delight specialists and also other Alcantara on their trucks of the motor vehicle exhibit. being golf bag prepare.partnership non commercial ministry searches for transmit within Maharashtra court at least 'ed' along with a family curiosity. in the shiny flowered production against the at their Hytownst and as well as doctor offices for the islands will definitely be a leadg covered with autumnal fruit flesh, and outlets also needed conditions at [url= authentic michael kors watches online[/url] The going to be the golf club just a little louis talent, positive cheeks not to mention nude top makeup look. here's a also there one specific 41 % lowering what amount of lovato boy for cricketers enforced in order to handle all "denims wings" connected with most disappointing brick and mortar CEOsCustomer work manageAmazon's lasting recommendations important brokerages akin to Goldman Sachs, Morgan Stanley 've got use their offering from australia dwelling address.helper lawyer or attorney ordinary Toby Unger pronounced Clair initial personnel comes back by benefits, still it would seem to be too early to make people within your long time (excluding a tremendous, once unfound yellow metal totally normally utilitarian.The transport embargo has also asking price the community the danger [url= michael kors handbags[/url] 230. Le samedi 3 mai 2014, 03:59 par best 32 inch tv best 32 inch. Rows after rows of glowing televisions beckon you to purchase them, however, there is a little secret that these stores don't want you to know. 231. Le samedi 3 mai 2014, 04:04 par cheap 32 inch tv 32 inch tv. The remote control compliments the telly having a similarly stylish, extraordinary look. 232. Le samedi 3 mai 2014, 08:52 par provolone Generally I would not understand publish in blogs and forums, but I would like to claim that this specific write-up
{"source": 1412, "title": "from dpo"}
pressure are true in general: The volume increases as the temperature increases, and decreases as the temperature decreases. Volume-temperature data for a 1-mole sample of methane gas at 1 atm are listed and graphed in Figure 9.12 . ## Link to Learning > 472 Chapter 9 | Gases This content is available for free at Figure 9.12 The volume and temperature are linearly related for 1 mole of methane gas at a constant pressure of 1 atm. If the temperature is in kelvin, volume and temperature are directly proportional. The line stops at 111 K because methane liquefies at this temperature; when extrapolated, it intersects the graph’s origin, representing a temperature of absolute zero. The relationship between the volume and temperature of a given amount of gas at constant pressure is known as Charles’s law in recognition of the French scientist and balloon flight pioneer Jacques Alexandre César Charles. Charles’s law states that the volume of a given amount of gas is directly proportional to its temperature on the kelvin scale when the pressure is held constant .Mathematically, this can be written as: V α T or V = constant· T or V = k·T or V1 /T1 = V2 /T2 with k being a proportionality constant that depends on the amount and pressure of the gas. For a confined, constant pressure gas sample, VT is constant (i.e., the ratio = k), and as seen with the V-T relationship, this leads to another form of Charles’s law: V1 T1 = V2 T2 . ## Example 9.6 Predicting Change in Volume with Temperature A sample of carbon dioxide, CO 2, occupies 0.300 L at 10 °C and 750 torr. What volume will the gas have at 30 °C and 750 torr? Solution Because we are looking for the volume change
{"source": 3700, "title": "from dpo"}
V(C) can be joined to at most two vertices of C. Apply exercise 7.3.3a to G - V( C), and obtain a contradiction. 7 .3 .4( a) G contains K 2 ,m if and only if there are m vertices with a pair of common neighbours. Any vertex v has (d~V») pairs of neigh-bours. Therefore ifv~( d~V») > (m -1)(;), G contains K 2 ,m. 7.5.1 Define a graph G by V(G)={Xl, ... ,X n }, and E(G)= > {XiXj # Id(Xi, Xj) = I}, and show that if all edges of G are drawn as straight line segments, then (i) any two edges of G are either adjacent or cross, and (ii) if some vertex of G has degree greater than two, -it is adjacent to a vertex of degree one. Then prove (a) by induction on n. 8.1.0 Let ~ ==(V 1, V 2 , ••• , Vk ) be a k-colouring of.G, and let ~'be acolouring of G in which -each colour- class contains at least two vertices. If Ivii >- 2 for all i, there -is nothing to prove, so assume that Vi == {VI}. Let U2 E V 2 be a vertex of the same colour as VI in ~'. Clearly IV 2 !>2. If IV 2 1 >2, transfer U2 to Vt. Otherwise, let > V2 be the other vertex in V 2• In ~', VI and V2 must be assigned different colours. Let U3 E V 3 be ·a vertex of .the same colour as V2 in ~'. As before, I V 3 1>2. Proceeding in· this way, one must eventually find a set V. with Iv i l>2. G can-now be recolour'ed so that fewer colour classes contai~ only one ver~ex. 8.1 . .13(a) Let (Xl, X 2 , • •• ,
{"source": 5735, "title": "from dpo"}
And when they went away, leaving comfort b ehind, I think there were not in all the city four merrier people than the hungry little girls who gave away their breakfasts and contented themselves with bread and milk on Christmas morning. “That’s loving our neighbor better than ourselves, and I like it,” said Meg, as they set out their presents while their mother was upstairs collecting clothes for the poor Hummels. Media Text Composer Mark Adamo details for an Opera America online course the process of adapting the novel to operatic form: Twain, Mark. The Adventures of Tom Sawyer . New York: Modern Library, 2001. (1876) From Chapter 2: “The Glorious Whitewasher” But Tom’s energy did not last. He began to think of th e fun he had planned for this day, and his sorrows multiplied. Soon the free boys would come tripping along on all sorts of delicious expeditions, and they would make a world of fun of him for having to work —the very thought of it burnt him like fire. He got out his worldly wealth and examined it —bits of toys, marbles, and trash; enough to buy an exchange of WORK, maybe, but not half enough to buy so much as half an hour of pure freedom. So he returned his straitened means to his pocket, and gave up the idea of trying to buy the boys. At this dark and hopeless moment an inspiration burst upon him! Nothing less than a great, magnificent inspiration. He took up his brush and went tranquilly to work. Ben Rogers hove in sight presently —the very boy, of all boys, whose ridicule he had been dreading. Ben’s gait was the hop -skip-and-jump —proof enough that his heart was light and his anticipations high. He was eating an apple,
{"source": 6820, "title": "from dpo"}
crocodile - now named Pocho, meaning "strong" in the local dialect - in a nearby river to return it to the wild but the crocodile refused to go back to its natural habitat, and so Shedden decided to allow the crocodile to live in the water outside his home. Pocho was considered a member of his family, alongside Shedden's wife and daughter. Shedden trained the crocodile to respond to its own name being called. For more than twenty years, Shedden swam with the crocodile in the river outside his home, mostly at night, talking and playing with Pocho while hugging, kissing and caressing him. == Public performances == For more than a decade, Chito and Pocho performed a weekly act on Sunday afternoons in a 100 m2 (1,100 sq ft) artificial lake at Finca Las Tilapias in his hometown of Siquirres, Costa Rica, performing in the water for tourists from around the world. The 2014 video documentary Dragon's Feast was made about Chito and Pocho by South African wildlife cinematographer Roger Horrocks shortly before Pocho's death. Horrocks speculated in his documentary that the gunshot wound to Pocho's head might have damaged the crocodile's brain, whereby the usual instinctive behavior of the crocodile changed as a result. Horrocks, noting examples where humans had been attacked by their reptilian pets even after a decade or more of close ownership, felt that Shedden's life was always in danger when he stepped into the water with the crocodile. To this, Shedden stated: "After two or three years, something could happen, maybe... but after 23 years of loving each other, nothing has ever happened, so I don't think so." One of Pocho's behaviors was to rush at Shedden with his mouth open when he entered the water, before closing his mouth before he got too
{"page_id": 43210044, "title": "Pocho (crocodile)"}
The World Chlorine Council (WCC) is an international network of national and regional trade associations representing the chlorine and chlorinated products industries in more than 27 countries. Members include chloralkali process associations such as Euro Chlor, Japan Soda Industry Association, Alkali Manufacturers' Association of India, and RusChlor (Russian Federation). Members from the product sector include five vinyl producer associations, and the Halogenated Solvents Industry Alliance (United States). == References == == External links == Official website
{"page_id": 12564360, "title": "World Chlorine Council"}
twenty two earthquakes with magnitudes equal to or more than 7.5 in 115 years including two Mw 8.1 earthquakes. There is tsunami risk, particularly with great earthquakes. In the area under New Britain and in the area between New Ireland and Bougainville Island the majority of the earthquakes are associated with subduction and in the later portion a subducted slab can be mapped by seismicity to reach a maximum depth close to 660 km (410 mi). There are however many known faults and fault zones, for example the Weitin Fault in Southern New Ireland. This is a transform fault between the South Bismarck Plate and the Pacific Plate, associated with the 16th of November events of the 2000 New Ireland earthquakes. The Bismarck Sea Seismic Delineation is an active transform fault zone that separates the suspected relic North Bismarck Plate (ie Pacific Plate) from the South Bismark Plate to the north of the subduction zone. ==== Volcanism ==== The arc volcanoes are grouped into western, Willaumez Peninsula-Mount Ulawun and Rabaul areas. The Gazelle Volcanic Zone extends for 65 km (40 mi) across the central to northern part of the Gazelle Peninsula and the active Rabaul Caldera area to its north had eruptions that destroyed the port in 1994. The Solomon Islands are an active arc volcano chain. The spreading centers in the center of the Woodlark Basin are active volcanically but not manifest as activity on the surface of the ocean. There is probably no seafloor current volcanic activity associated with the Bismarck Sea Seismic Lineation but the Melanesian arc to its north is active. Active volcanism continues into both north-eastern and south-eastern New Guinea. == References == Sources
{"page_id": 74981963, "title": "New Britain subduction zone"}
signal to assist air traffic controllers with traffic separation. A discrete transponder code (often called a squawk code) is assigned by air traffic controllers to identify an aircraft uniquely in a flight information region (FIR). This allows easy identification of aircraft on radar. Codes are made of four octal digits; the dials on a transponder read from zero to seven, inclusive. Four octal digits can represent up to 4096 different codes, which is why such transponders are sometimes described as "4096 code transponders". The use of the word "squawk" comes from the system's origin in the World War II identification friend or foe (IFF) system, which was code-named "Parrot". === Codes assigned by air traffic control === Some codes can be selected by the pilot if and when the situation requires or allows it, without permission from ATC. Such codes are referred to as "conspicuity codes" in the UK. Other codes are generally assigned by ATC units. For flights on instrument flight rules (IFR), the squawk code is typically assigned as part of the departure clearance and stays the same throughout the flight. Flights on visual flight rules (VFR), when in uncontrolled airspace, will "squawk VFR" (1200 in the United States and Canada, 7000 in Europe). Upon contact with an ATC unit, they will be told to squawk a certain code. When changing frequency, for instance because the VFR flight leaves controlled airspace or changes to another ATC unit, the VFR flight will be told to "squawk VFR" again. In order to avoid confusion over assigned squawk codes, ATC units will typically be allocated blocks of squawk codes, not overlapping with the blocks of nearby ATC units, to assign at their discretion. Not all ATC units will use radar to identify aircraft, but they assign squawk codes nevertheless. As an
{"page_id": 7376767, "title": "Transponder (aeronautics)"}
of a sufficiently powerful microscope by Antonie van Leeuwenhoek in 1675 provided visual evidence of living particles consistent with a germ theory of disease. During the Ming dynasty, Wu Youke (1582–1652) developed the idea that some diseases were caused by transmissible agents, which he called Li Qi (戾气 or pestilential factors) when he observed various epidemics rage around him between 1641 and 1644. His book Wen Yi Lun (瘟疫论, Treatise on Pestilence/Treatise of Epidemic Diseases) can be regarded as the main etiological work that brought forward the concept. His concepts were still being considered in analysing SARS outbreak by WHO in 2004 in the context of traditional Chinese medicine. Another pioneer, Thomas Sydenham (1624–1689), was the first to distinguish the fevers of Londoners in the later 1600s. His theories on cures of fevers met with much resistance from traditional physicians at the time. He was not able to find the initial cause of the smallpox fever he researched and treated. John Graunt, a haberdasher and amateur statistician, published Natural and Political Observations ... upon the Bills of Mortality in 1662. In it, he analysed the mortality rolls in London before the Great Plague, presented one of the first life tables, and reported time trends for many diseases, new and old. He provided statistical evidence for many theories on disease, and also refuted some widespread ideas on them. John Snow is famous for his investigations into the causes of the 19th-century cholera epidemics, and is also known as the father of (modern) Epidemiology. He began with noticing the significantly higher death rates in two areas supplied by Southwark Company. His identification of the Broad Street pump as the cause of the Soho epidemic is considered the classic example of epidemiology. Snow used chlorine in an attempt to clean the water and
{"page_id": 66997, "title": "Epidemiology"}
his wife, nephew, and such possessions as they can carry. It is implied that these circumstances are the result of unjustified discrimination from the scientific elite. The chapter ends with a brief note that 12 years later the injustice was in some measure redressed. === A Land Awakening from Sleep === A description of the social circumstances of the time of the birth of Smith. It begins by emphasising that the date of 4004 BC, for the beginning of the world, computed from the genealogy tables of the Bible, was firmly accepted by most; the idea that the world was any older was considered implausible. Explanations based on Noah's flood were acceptable in scientific circles. But, in the year 1769, as Smith was born, James Watt was patenting a steam engine, cloth manufacture was improving, the postal service was viable. New technology and information was rapidly becoming available or even common-place. "William Smith appeared on the stage at a profoundly interesting moment: he was about to make it more so." These claims by Winchester are inaccurate. Geologists had begun to recognize that the earth was old in the late 1600s. Archbishop Ussher's 4004 BC date for the Creation of the Earth, along with similar estimates by Isaac Newton and other academics of the 17th century, was merely a historical footnote in academia by Smith's lifetime. In 1787, Scottish geologist James Hutton argued that the Earth's age was immeasurable. Smith was in no way challenging the church or risking jail – American paleontologist Stephen Jay Gould refuted such claims in his review of The Map That Changed the World. In fact, Smith's single-minded focus on recognizing layers made him rather late to realize that the Earth was old. Additionally, Smith's focus on recognizing layers based on the fossils in them was
{"page_id": 3773873, "title": "The Map that Changed the World"}
blew out rocky debris, remelted Earth and formed the Moon, thus explaining the Moon's lesser density and lack of an iron core. The impact theory does have some faults; some computer simulations show the formation of a ring or multiple moons post impact, and elements are not quite the same between the Earth and Moon. == See also == == References == == Sources == King, Clarence (1877). "Catastrophism and Evolution". The American Naturalist. 11 (8): 449–470. Bibcode:1877ANat...11..449K. doi:10.1086/271929. Rudwick, Martin J. S. (1972). The Meaning of Fossils. Chicago, Illinois: University of Chicago Press. ISBN 0-226-73103-0. McGowan, Christopher (2001). The Dragon Seekers. Cambridge, Massachusetts: Perseus Publishing. ISBN 0-7382-0282-7. == Further reading == Lewin, R.; Complexity, Dent, London, 1993, p. 75 Palmer, T.; Catastrophism, Neocatastrophism and Evolution. Society for Interdisciplinary Studies in association with Nottingham Trent University, 1994, ISBN 0-9514307-1-8 (SIS) ISBN 0-905488-20-2 (Nottingham Trent University) == External links == Impact Tectonics Catastrophism and Mass Extinctions The Fall and Rise of Catastrophism Catastrophism! Man, Myth and Mayhem in Ancient History and the Sciences Answers In Creation - Catastrophism Article Dictionary of the History of Ideas: "Uniformitarianism and Catastrophism"
{"page_id": 174883, "title": "Catastrophism"}
the burst's optical afterglow was brighter than a power-law decay would have predicted, a deviation that could have been explained by additional light from a supernova. On 10 April 2003, NASA announced that GRB 030329 had provided the definitive link between gamma-ray bursts and supernovae. The supernova was later referred to as SN 2003dh. == Notes ==
{"page_id": 27709352, "title": "GRB 030329"}
a share. In 2014, Woodman was the highest paid US chief executive, paying himself $235 million while GoPro earned profits of $128 million. In 2015, GoPro formed a partnership with the NHL in which the NHL would use GoPro products to improve the viewing experience for fans. Woodman was invited to speak at various tech conferences, and in October 2015, Woodman was a guest on The Late Show with Stephen Colbert and wore a GoPro camera for the entirety of the interview. Woodman appeared as a shark investor in the sixth season of the show Shark Tank. Woodman had invested $125,000 as of November 2015 on Shark Tank on two investments. GoPro made a series of job cuts in 2016-2018. In January 2016, it cut 100 jobs, or 7% of its workforce. In November 2016, GoPro cut an additional 15% of its workforce after attempting to branch out beyond its core business of action cameras, as the entertainment division failed to reach profitability. Additional layoffs followed in March 2017. In January 2018, GoPro announced they were removing drones from their product lineup and reducing the workforce from 1,254 employees to fewer than 1,000. In January 2018 Woodman announced that he was open to selling GoPro. With the layoffs, GoPro went back to its earlier, flatter structure. "We decided to simplify everything and get back to the business that we knew and loved as a private company", Woodman said. In December 2016, a class action lawsuit against GoPro was announced. The complaint alleged that GoPro made false and misleading statements to investors and failed to disclose flaws in the company's drones, overstating customer demand, and GoPro's public statements were materially false and misleading. With the many changes at and involving GoPro, including numerous job cuts and falling stock prices, Woodman was
{"page_id": 36922713, "title": "Nick Woodman"}
like below will be executed in PowerShell as `dir 'folder with spaces'`. ``` { "label": "dir", "type": "shell", "command": "dir", "args": ["folder with spaces"] } ``` * If you want to control how the argument is quoted, the argument can be a literal specifying the value and a quoting style. The example below uses escaping instead of quoting for an argument with spaces. ``` { "label": "dir", "type": "shell", "command": "dir", "args": [ { "value": "folder with spaces", "quoting": "escape" } ] } ``` Besides escaping, the following values are supported: * **strong**: Uses the shell's strong quoting mechanism, which suppresses all evaluations inside the string. Under PowerShell and for shells under Linux and macOS, single quotes are used (`'`). For cmd.exe, `"` is used. * **weak**: Uses the shell's weak quoting mechanism, which still evaluates expression inside the string (for example, environment variables). Under PowerShell and for shells under Linux and macOS, double quotes are used (`"`). cmd.exe doesn't support weak quoting so VS Code uses `"` as well. If the command itself contains spaces, VS Code will by default strong quote the command as well. As with arguments, the user can control the quoting of the command using the same literal style. There are more task properties to configure your workflow. You can use IntelliSense with ⌃Space (Windows, Linux Ctrl+Space) to get an overview of the valid properties. !Image 9: Tasks IntelliSense). You can filter on 'task' and can see the various task related commands. ![Image 10: Tasks in Command Palette]( ### Compound tasks You can also compose tasks out of simpler tasks with the `dependsOn` property. For example, if you have a workspace with a client and
{"source": 20, "title": "from dpo"}
in applicability. In GPUs (see Chapter 4), where local scratchpad memories are heavily used, the burden for managing them currently falls on the programmer. Although one should be cautious about predicting the future of computing technology, history has shown that caching is a powerful and highly extensible idea that is likely to allow us to continue to build faster computers and ensure that the memory hierarchy can deliver the instructions and data needed to keep such systems working well. In Section L.3 (available online) we examine the history of caches, virtual mem-ory, and virtual machines. IBM plays a prominent role in the history of all three. References for further reading are included. # Case Study 1: Optimizing Cache Performance via Advanced Techniques Concept s illu strated by thi s ca se study > ■ Non-blocking Caches > ■ Compiler Optimizations for Caches > ■ Software and Hardware Prefetching > ■ Calculating Impact of Cache Performance on More Complex Processors # 2.9 Historical Perspective and References # Case Studies and Exercises by Norman P. Jouppi, Naveen Muralimanohar, and Sheng Li 132 ■ Chapter Two Memory Hierarchy Design The transpose of a matrix interchanges its rows and columns; this is illustrated below: Here is a simple C loop to show the transpose: for (i = 0; i < 3; i++) { for (j = 0; j < 3; j++) { output[j][i] = input[i][j]; }} Assume that both the input and output matrices are stored in the row major order (row major order means that the row index changes fastest). Assume that you are executing a 256 × 256 double-precision transpose on a processor with a 16 KB fully associative (don’t worry about cache conflicts) least recently used (LRU) replacement L1 data cache with 64 byte blocks. Assume that the L1 cache misses
{"source": 2299, "title": "from dpo"}
information that would go to the qualifications of the experts. Such matters as past errors, required retraining, or any actions that may reflect on the integrity or credibility of the expert are susceptible to this ruling. Although this is not a U.S. Supreme Court rule, it is being followed widely by other jurisdictions. # 13.2.7 Federal Rules of Criminal Procedure— # Rule 16 The Federal Rules of Criminal Procedure set forth guide - lines for a wide range of issues. One of these rules of special interest to fingerprint expert witnesses is Rule 16, Discovery and Inspection, and specifically, Rule 16(a)(1)(F), Reports of Examinations and Tests, and (G) Expert Wit - nesses. Unlike the material constitutionally required to be disclosed by the decisions in the preceding section ( Brady and Giglio ), these disclosure provisions apply only in federal courts. The various states may or may not have similar discovery provisions in their rules of procedure. Rule 16(a)(1)(F), Reports of Examinations and Tests, states: Upon a defendant’s request, the government must per - mit a defendant to inspect and to copy or photograph the results or reports of any physical or mental exami - nation and of any scientific test or experiment if: (i) the item is within the government’s posses- sion, custody or control; (ii) the attorney for the government knows—or through due diligence could know—that the item exists, and; (iii) the item is material to preparing the defense or the government intends to use the item in its case-in-chief at trial. Rule 16(a)(1)(G), Expert Witnesses, states: At the defendant’s request, the government must give to the defendant a written summary of any testimony that the government intends to use under Rules 702, 703, or 705 of the Federal Rules of Evidence during its case-in-chief at trial. If the
{"source": 4211, "title": "from dpo"}
Errors (LWE) Assumption. Lacking the geometric structure of LWE, our construction and analysis rely on a different set of techniques. Technically, we first construct an SSP OT protocol in the common random string model from LPN alone, and then derandomize the common random string. Most of the technical difficulty lies in the first step. Here we prove a robustness property of the inner product randomness extractor to a certain type of linear splitting attacks. A caveat of our construction is that it relies on the so called low noise regime of LPN. This aligns with our current complexity-theoretic understanding of LPN, which only in the low noise regime is known to imply hardness in SZK. ![Image 298: Paper: Nir Bitansky (in person) (paper #184) Is it possible to convert classical reductions into post-quantum ones? It is customary to argue that while this is problematic in the interactive setting, non-interactive reductions do carry over. However, when considering quantum auxiliary input, this conversion results in a *non-constructive* post-quantum reduction that requires duplicating the quantum auxiliary input, which is in general inefficient or even impossible. This violates the win-win premise of provable cryptography: an attack against a cryptographic primitive should lead to an algorithmic advantage. We initiate the study of constructive quantum reductions and present positive and negative results for converting large classes of classical reductions to the post-quantum setting in a constructive manner. We show that any non-interactive non-adaptive reduction from assumptions with a polynomial solution space (such as decision assumptions) can be made post-quantum constructive. In contrast, assumptions with super-polynomial solution space (such as general search assumptions) cannot be generally converted.
{"source": 6088, "title": "from dpo"}
curium stays unchanged and so can be isolated by repeated centrifugation. Metallic curium is obtained by reduction of its compounds. Initially, curium(III) fluoride was used for this purpose. The reaction was done in an environment free of water and oxygen, in an apparatus made of tantalum and tungsten, using elemental barium or lithium as reducing agents. C m F 3 + 3 L i ⟶ C m + 3 L i F {\displaystyle \mathrm {CmF_{3}\ +\ 3\ Li\ \longrightarrow \ Cm\ +\ 3\ LiF} } Another possibility is reduction of curium(IV) oxide using a magnesium-zinc alloy in a melt of magnesium chloride and magnesium fluoride. == Compounds and reactions == === Oxides === Curium readily reacts with oxygen forming mostly Cm2O3 and CmO2 oxides, but the divalent oxide CmO is also known. Black CmO2 can be obtained by burning curium oxalate (Cm2(C2O4)3), nitrate (Cm(NO3)3), or hydroxide in pure oxygen. Upon heating to 600–650 °C in vacuum (about 0.01 Pa), it transforms into the whitish Cm2O3: 4 CmO 2 → Δ T 2 Cm 2 O 3 + O 2 {\displaystyle {\ce {4CmO2 ->[\Delta T] 2Cm2O3 + O2}}} . Or, Cm2O3 can be obtained by reducing CmO2 with molecular hydrogen: 2 CmO 2 + H 2 ⟶ Cm 2 O 3 + H 2 O {\displaystyle {\ce {2CmO2 + H2 -> Cm2O3 + H2O}}} Also, a number of ternary oxides of the type M(II)CmO3 are known, where M stands for a divalent metal, such as barium. Thermal oxidation of trace quantities of curium hydride (CmH2–3) has been reported to give a volatile form of CmO2 and the volatile trioxide CmO3, one of two known examples of the very rare +6 state for curium. Another observed species was reported to behave similar to a supposed plutonium tetroxide and was tentatively characterized as
{"page_id": 5675, "title": "Curium"}
same-aged peers. Elderly people often associate their functional and physical decline with the normal ageing process. One way to help younger people experience what it feels like to be older is through an ageing suit. There are several different kinds of suits including the GERT (named as a reference to gerontology), the R70i exoskeleton, and the AGNES (Age Gain Now Empathy Suit) suits. These suits create the feelings of the effects of ageing by adding extra weight and increased pressure in certain points like the wrists, ankles and other joints. In addition, the various suits have different ways to impair vision and hearing to simulate the loss of these senses. To create the loss of feeling in hands that the elderly experience, special gloves are a part of the uniforms. Use of these suits may help to increase the amount of empathy felt for the elderly and could be considered particularly useful for those who are either learning about ageing, or those who work with the elderly, such as nurses or care centre staff. Design is another field that could benefit from the empathy these suits may cause. When designers understand what it feels like to have the impairments of old age, they can better design buildings, packaging, or even tools to help with the simple day-to-day tasks that are more difficult with less dexterity. Designing with the elderly in mind may help to reduce the negative feelings that are associated with the loss of abilities that the elderly face. === Healthy ageing === The healthy ageing framework, proposed by the World Health Organization operationalizes health as functional ability, which results from the interactions of intrinsic capacity and the environments. ==== Intrinsic capacity ==== Intrinsic capacity is a construct encompassing people's physical and mental abilities which can be drawn upon
{"page_id": 16413778, "title": "Ageing"}
been shown to be biocompatible in FDA-approved drugs such as azidothymidine and through other uses as cross linkers. Additionally, their small size allows them to be easily incorporated into biomolecules through cellular metabolic pathways. === Mechanism === ==== Classic Staudinger reaction ==== The nucleophilic phosphine attacks the azide at the electrophilic terminal nitrogen. Through a four-membered transition state, N2 is lost to form an aza-ylide. The unstable ylide is hydrolyzed to form phosphine oxide and a primary amine. However, this reaction is not immediately bioorthogonal because hydrolysis breaks the covalent bond in the aza-ylide. ==== Staudinger ligation ==== The reaction was modified to include an ester group ortho to the phosphorus atom on one of the aryl rings to direct the aza-ylide through a new path of reactivity in order to outcompete immediate hydrolysis by positioning the ester to increase local concentration. The initial nucleophilic attack on the azide is the rate-limiting step. The ylide reacts with the electrophilic ester trap through intramolecular cyclization to form a five-membered ring. This ring undergoes hydrolysis to form a stable amide bond. === Limitations === The phosphine reagents slowly undergo air oxidation in living systems. Additionally, it is likely that they are metabolized in vitro by cytochrome P450 enzymes. The kinetics of the reactions are slow with second order rate constants around 0.0020 M−1•s−1. Attempts to increase nucleophilic attack rates by adding electron-donating groups to the phosphines improved kinetics, but also increased the rate of air oxidation. The poor kinetics require that high concentrations of the phosphine be used which leads to problems with high background signal in imaging applications. Attempts have been made to combat the problem of high background through the development of a fluorogenic phosphine reagents based on fluorescein and luciferin, but the intrinsic kinetics remain a limitation. == Copper-free
{"page_id": 32430822, "title": "Bioorthogonal chemistry"}
Farampator (developmental code names CX-691, ORG-24448, SCH-900460) is an ampakine drug. It was developed by Cortex Pharmaceuticals, and licensed to Organon BioSciences for commercial development. Following the purchase of Organon by Schering-Plough in 2007, the development license to farampator was transferred. The development of farampator was eventually terminated, reportedly due to concerns about cardiac toxicity. Farampator has been investigated for its effect on AMPA receptors and researched for potential use in the treatment of schizophrenia and Alzheimer's disease. It was found to improve short-term memory, but impaired episodic memory. It produced side effects such as headache, somnolence and nausea. Subjects reporting side effects had significantly higher plasma levels of farampator than subjects without. Additional analyses revealed that in the farampator condition the group without side effects showed a significantly superior memory performance relative to the group with side effects. == See also == AMPA receptor positive allosteric modulator == References ==
{"page_id": 9193207, "title": "Farampator"}
large format, and 143 D-Box theaters. Many independent theater owners in Germany (approximately 700 screens) boycotted the film in response to Disney raising its rental fee from 47.7% to 53% of ticket sales. The owners felt that the "increased fees, coupled with the cost of digitization, and rising staff and marketing costs may force some of them out of business." Avengers: Age of Ultron is part of Phase Two of the MCU. On March 4, 2015, ticket pre-sales for the film began. Variety noted, "The two-month gap between advance sales and the release is much wider than normal and reflects the heavy fan anticipation" for the film. === Home media === Avengers: Age of Ultron was released on digital download by Walt Disney Studios Home Entertainment on September 8, and on Blu-ray, Blu-ray 3D, and DVD on October 2. The digital and Blu-ray releases include behind-the-scenes featurettes, audio commentary, deleted scenes, and a blooper reel. The film was also collected in a 13-disc box set, titled "Marvel Cinematic Universe: Phase Two Collection", which includes all of the Phase Two films in the Marvel Cinematic Universe, and was released on December 8. In July 2015, Whedon stated that he did not intend on releasing a director's cut of Avengers: Age of Ultron because despite the film's complexity, he was satisfied with the theatrical version and did not think it needed to be tweaked. Walt Disney Studios Home Entertainment released the film on Ultra HD Blu-ray on August 14, 2018. In September 2014, TNT acquired the US cable broadcast rights, for broadcast two years after its theatrical release. == Reception == === Box office === Avengers: Age of Ultron grossed $459 million in the United States and Canada, and $943.8 million in other territories, for a worldwide total of $1.403 billion, becoming
{"page_id": 36484254, "title": "Avengers: Age of Ultron"}
electrochemical sensors can measure heavy metal contamination, aiding in land remediation, and Zinc oxide sensors track nitrogen deficiency in soil. Other sensors have detected plant viruses and bacteria, such as Tobacco Mosaic Virus, Citrus Tristeza Virus, and Xylella fastidiosa, before symptoms appear. A major concern in agricultural practices is water scarcity, and nanosensors hope to alleviate this by analyzing moisture levels in real-time. For example, Silicon-based nanosensors track water retention in soil, ensuring efficient irrigation and reducing water waste. Silver-based systems have detected nitrates and heavy metals in irrigation water, and hydrogel-embedded nanosensors are able to save water by adjusting release based on soil hydration levels. They have also been used to detect ethylene, allowing for precision harvesting, monitor photosynthesis rates, and track plant stress signals in droughts or nutrient deficiencies. Nanosensors represent a significant advancement in the field of precision agriculture, and as the technology continues to evolve, they will play a vital role in enhancing productivity, although further research is needed to know the extent of long-term impacts on the ecosystem and farming practices. Recent work also highlights how nanosensors can assist in real-time monitoring of crops by tracking environmental and biological changes as they occur. These insights support timely responses during cultivation, helping farmers protect yields and manage resources more efficiently. == Nanotechnology in plant transformations == Nanotechnology has played a pivotal role in the field of genetic engineering and plant transformations, making it a desirable candidate in the optimization and manipulation of cultivated plants. In the past, most genetic modifications to plants have been done with Agrobacterium, or utilising tools such as the gene gun (biolistics); however, these older methods of gene implementation face roadblocks due to low species compatibility lack of versatility/compatibility with Chloroplastial/Mitochondrial gene transformations, and potential for cell or organelle damage (due to
{"page_id": 63883339, "title": "Nanotechnology in agriculture"}
incident light into an electric current. When the reverse bias becomes very large, reaching the breakdown voltage, the generation process in the depletion region accelerates leading to an avalanche condition which can cause runaway and destroy the diode. === Diode law === The DC current-voltage behavior of the ideal p–n diode is governed by the Shockley diode equation: I D = I R ( e V D n V T − 1 ) , {\displaystyle I_{\text{D}}=I_{\text{R}}\left(e^{\frac {V_{\text{D}}}{nV_{\text{T}}}}-1\right),} where V D {\displaystyle V_{\text{D}}} is the DC voltage across the diode. I R {\displaystyle I_{\text{R}}} is the reverse saturation current, the current that flows when the diode is reverse biased (that is, V D {\displaystyle V_{\text{D}}} is large and negative). n {\displaystyle n} is an ideality factor introduced to model a slower rate of increase than predicted by the ideal diode law. V T {\displaystyle V_{\text{T}}} is the thermal voltage of k B T q , {\displaystyle {\tfrac {k_{\text{B}}T}{q}},} approximately equal to 25 mV at T = 290 kelvins. This equation does not model the non-ideal behavior such as excess reverse leakage or breakdown phenomena. Using this equation, the diode on resistance is r D = 1 d i D / d v D ≈ n V T i D , {\displaystyle r_{\text{D}}={\frac {1}{di_{\text{D}}/dv_{\text{D}}}}\approx {\frac {nV_{\text{T}}}{i_{\text{D}}}},} exhibiting a lower resistance the higher the current. Note: to refer to differential or time-varying diode current and voltage, lowercase i D {\displaystyle i_{\text{D}}} and v D {\displaystyle v_{\text{D}}} are used. === Capacitance === The depletion layer between the n and p sides of a p–n diode serves as an insulating region that separates the two diode contacts. Thus, the diode in reverse bias exhibits a depletion-layer capacitance, sometimes more vaguely called a junction capacitance, analogous to a parallel plate capacitor with a dielectric spacer between
{"page_id": 34024652, "title": "P–n diode"}
scarcity of real, accessible patient data is a hindrance that deters the progress of developing and deploying more artificial intelligence in healthcare. The lack of regulations surrounding AI in the United States has generated concerns about mismanagement of patient data, such as with corporations utilizing patient data for financial gain. For example, as of 2020 Roche, a Swiss healthcare company, was found to have purchased healthcare data for approximately 2 million cancer patients at an estimated total cost of $1.9 billion. Naturally, this generates questions of ethical concern; Is there a monetary price that can be set for data, and should it depend on its perceived value or contributions to science? Is it fair to patients to sell their data? These concerns were addressed in a survey conducted by the Pew Research Center in 2022 that asked Americans for their opinions about the increased presence of AI in their daily lives, and the survey estimated that 37% of Americans were more concerned than excited about such increased presence, with 8% of participants specifically associating their concern with "people misusing AI". Ultimately, the current potential of artificial intelligence in healthcare is additionally hindered by concerns about mismanagement of data collected, especially in the United States. === Automation- beneficence === A systematic review and thematic analysis in 2023 showed that most stakeholders including health professionals, patients, and the general public doubted that care involving AI could be empathetic, or fulfill beneficence. According to a 2019 study, AI can replace up to 35% of jobs in the UK within the next 10 to 20 years. However, of these jobs, it was concluded that AI has not eliminated any healthcare jobs so far. Though if AI were to automate healthcare-related jobs, the jobs most susceptible to automation would be those dealing with digital information,
{"page_id": 52588198, "title": "Artificial intelligence in healthcare"}
and change its arm activity. This is critical for the robot to be able to attempt to perform real world tasks. == References == == External links == Jeff + Aaron's spinoff company MIT.edu Domo Research Edsinger-Gonzales, A.; Weber, J. (May 31, 2004). "Domo: A Force Sensing Humanoid Robot for Manipulation Research". 4th IEEE/RAS International Conference on Humanoid Robots, 2004. Vol. 1. pp. 273–291. CiteSeerX 10.1.1.92.4608. doi:10.1109/ICHR.2004.1442127. ISBN 0-7803-8863-1. S2CID 1301217. Cardea Robot
{"page_id": 1246383, "title": "Domo (robot)"}
the same stratigraphic position as the magnetite-bearing iron formation on the southwestern shore of Net Lake. A northwest-trending cross fault is accompanied by drag folding of a chert-magnetite iron formation unit southeast of Cooke Lake. Also exposed in this area is a dark yellow 40 cm (16 in) wide quartz vein composed of pyrite that cross cuts the iron formation at the northeastern end. This west-northwest trending quartz vein is about 60 m (200 ft) long. Layered chert-magnetite and lesser chert-pyrite-pyrrhotite iron formations are located at the base of the Arsenic Lake Formation. Former drilling near Vermilion Lake and spatial relationships observed on the surface, suggest that the sulfide-rich iron formation lies up to 10 m (33 ft) stratigraphically under the oxide facies iron formation. Iron production from the West and North Pits of Sherman Mine came from this chert-magnetite iron formation unit while chert-magnetite iron formations at the South and East Pits compose the Turtle Lake Formation. The South and East Pit iron formations reach thicknesses of 30 m (98 ft) and overlie a thinly bedded turbidite package on the southern limb of the Tetapaga Syncline. A white palladium mercury telluride mineral known as temagamite was discovered in 1973 on Temagami Island in Lake Temagami. It is present as microscopic inclusions within chalcopyrite in association with other rare tellurides, such as merenskyite, stuetzite and hessite. Also discovered on the island was an unnamed palladium mercury silver telluride mineral, the composition and optical properties of which are significantly different from those of temagamite. === Paleogeology === The TGB, at 2.7 billion years old, dates back to the formation of the supercontinent Kenorland between 2.8 and 2.6 billion years ago. This large landmass consisted of the Baltic and Siberian shields of Eurasia and Archean provinces of North America, including the Superior
{"page_id": 14392038, "title": "Temagami Greenstone Belt"}
are expected to navigate effectively by the time they reach middle school, there tends to be a scarcity of informational texts in primary-grade classrooms. 69 ,70 Researchers have analyzed the types of reading materials in classrooms. Results included the following: 71  A 1998 study found a mean of 16% for the ratio of expository texts to total text types in classrooms compared with 38% on standardized tests;  A 2000 study found 14% of materials primary teachers read to their classes was informational; another study identified only 6% of all material read (read aloud and by students) was expository;  There was a discrepancy in percentage of informational texts between high and low SES districts with the gap more than doubling at middle-high school levels. Higher poverty classrooms tended to have fewer informational resources for students to read. Stories and literature can be balanced with different informational sources from early grades, especially when the informational materials are linked closely with the students’ own experiences. Whether it is reading the directions to make a peanut butter and jelly sandwich or an ice cream sundae Chapter 5: Components of Language & Reading 63 or describing the animals and their habitats that were seen on a visit to the zoo, young students can benefit from such exposure. Duke 72 offered the following arguments in favor of informational texts:  Students become better readers and writers of such works;  Facility with informational texts is an important survival skill, especially as the world becomes more technological;  Students gain increased content knowledge, vocabulary, and comprehension skills and become better readers and writers of informational texts;  Results on the NAEP suggest that higher reading achievement correlated with students’ self -report that informational works were part of their reading habits. (Note: This is a
{"source": 1003, "title": "from dpo"}
in 1 click (grassroutes.us) The Drupal Crisis (unleashedmind.com) Duke Concealed Info on Potti's Fraudulent Trials from Patients for Over 2 Years (cancerletter.com) Forecasting s-curves is hard (constancecrozier.com) C++ Class sizes (systemcall.org) Show HN: Gridspot, 10x cheaper cloud compute using distributed computing (gridspot.com) Getting into Linux Kernel Development (cyphar.com) Programming like Kent Beck (iterate.no) Intel preps 'Android x86’ for netbooks and slates (apcmag.com) Working Harder Is Not a Good Career Strategy (allenc.com) QED at Large: A Survey of Engineering of Formally Verified Software (nowpublishers.com) OpenStack VM Balancing with Python (ahl.com) Sandy Jen - Scaling Synchronous Web Apps: Lessons Learned from Meebo (krisjordan.com) Why I'm Becomming a JavaScript Convert (benjamincoe.com) Software Heritage and GNU Guix join forces to enable long term reproducibility (softwareheritage.org) Want IPv6 now? (igorpartola.com) Transformers from Scratch (peterbloem.nl) Intel X86 Encoder Decoder (intelxed.github.io) SICP in Clojure (sicpinclojure.com) Letter to the Patent Office from Donald Knuth (1995) (pluto.it) PlainJS – The Vanilla JavaScript Repository (plainjs.com) A Deep Dive Into The Anatomy Of Premature Scaling with a great infographic (startupgenome.cc) Hacking Challenge: Change this website's homepage picture and win $10K... (blackbergsecurity.us) Life of a Data Labeler (scale.ai) Van Gogh Museum (vangoghmuseum.nl) Parallax.js (wagerfield.github.io) Substance.io launched — it's web-based document authoring and publishing (substance.io) Dockerising a Rails App (woss.name) Data-Oriented Design (Why You Might Be Shooting Yourself in The Foot With OOP) (gamesfromwithin.com) FreedomBox 0.7 released (freedomboxfoundation.org) Styles for Anti-Face Detection (nextnature.net) Prototype to Polish: Making Games in Chicken Scheme with Hypergiant (alex-charlton.com) A Day in the Life of a Freelance Journalist (natethayer.wordpress.com) Unencrypted patient medical information is being broadcast across Vancouver (openprivacy.ca) Practical Data Science in Python (radimrehurek.com) Two Narratives of Creation (allenleein.github.io) Powerchair: A dad hacks a wheelchair for his disabled 2-year-old son (hackingsma.com) Startup Reading List (nicolabortignon.com) My Top Sublime Text 2 Plugins (henriquebarroso.com) SoftBank could bring down the
{"source": 2757, "title": "from dpo"}
simulate your ATM system? In general, if the actual data collected are available, there are three ways to model input: (1) trace-driven simulation , in which the collected data values are directly used in the simulation; (2) empirical input modeling , in which random variables for simulation are generated directly from the collected data; (3) theoretical input modeling , in which the parameters of a theoretical distri - bution function are estimated from the actual data and random variables are generated from the fitted distribution function. This chapter is organized as follows. We start with the subject of empirical input modeling (for inter-arrival times as well as service times) in Section 3.2, and follow with a brief section (Section 3.3) on theoretical distribution fitting . > Modeling and Simulation of Discrete-Event Systems , First Edition. Byoung Kyu Choi and > Donghun Kang. > © 2013 John Wiley & Sons, Inc. Published 2013 by John Wiley & Sons, Inc. 46 Input Model Ing for SIM ulat Ion Section 3.4 deals with theoretical input modeling of inter-arrival times, and Section 3.5 deals with theoretical input modeling of service times. The last section (Section 3.6) covers input modeling for special applications. 3.2 EMPIRICAL INPUT MODELING In empirical input modeling, random variables for simulation are generated directly from the collected data. There are three ways to generate random inputs from collected data { Xi} without fitting a theoretical distribution func - tion: the nonparametric modeling method, empirical modeling of individual data, and empirical modeling of grouped data. 3.2.1 Nonparametric Modeling A simple approach to generating random inputs from collected data { Xi} is to use a nonparametric model, in which the value of the random variable x is repeatedly sampled from collected data { Xk: k = 1 ∼ n} with probability 1/ n.
{"source": 4980, "title": "from dpo"}
cyclic subgroup of the curve. One can remedy this by taking an endomorphism φ of E (in this context such a map is called a distortion map) and by instead considering the modified Weil pairing ˆe(P, Q ) = e(P, φ (Q)) where e denotes the Weil pairing. This way, for a general point P and a non-scalar endomorphism φ,the point P is not in the subgroup generated by φ(P ). C.2 Formal definitions of DL, CDH and DDH assumptions Definition 6 Let Gen be an algorithm that takes as input a security parameter 1λ and returns (G, n, g ), where G is a group of order n, and g ∈ G. – The DLP assumption holds with respect to Gen if for all PPT algorithms A,we have that Pr [(G, n, g ) ← Gen (1 λ); h ← 〈 g〉; x ← A (G, n, g, h ) : h = gx] ≈ 0. – The CDH assumption holds with respect to Gen if for all PPT algorithms A,we have that Pr [(G, n,g ) ← Gen (1 λ); a, b ← Z|g|; z ← A (G, n, g, g a, g b) : z = gab ] ≈ 0. – The DDH assumption holds with respect to Gen if for all PPT algorithms A,we have that ∣∣∣∣∣Pr [(G, n,g ) ← Gen (1 λ); a, b ← Z|g|; z0 = gab ; z1 ← 〈 g〉; ch ← { 0, 1}; ch ∗ ← A (G, n, g, g a, g b, z ch ) : ch = ch ∗ ] − 12 ∣∣∣∣∣ ≈ 0. 25
{"source": 6331, "title": "from dpo"}
that would have been used to raise our own children, to the poor. Patricia MacCormack points out that resignation from procreation and striving for human extinction can make it possible to care for humans and other animals: those who are already here. == Antinatalism and other philosophical topics == === Realism === Some antinatalists believe that most people do not evaluate reality accurately, which affects the desire to have children. Peter Wessel Zapffe identifies four repressive mechanisms humans use, consciously or not, to restrict their consciousness of life and the world: Isolation: an arbitrary dismissal from the consciousness of an individual and the consciousness of others about all negative thoughts and feelings associated with the unpleasant facts of human existence. In daily life, this manifests as a tacit agreement to remain silent on certain subjects – especially around children, to prevent instilling in them a fear of the world and what awaits them in life, before they will be able to learn other mechanisms. Anchoring: the creation and use of personal values to ensure attachment to reality, such as parents, home, the street, school, God, the church, the state, morality, fate, the law of life, the people, the future, accumulation of material goods or authority, etc. This can be characterized as creating a defensive structure, "a fixation of points within, or construction of walls around, the liquid fray of consciousness", and defending the structure against threats. Distraction: shifting focus to new impressions to flee from circumstances and ideas humans consider harmful or unpleasant. Sublimation: refocusing the tragic parts of life into something creative or valuable, usually through an aesthetic confrontation for the purpose of catharsis. This is typically seen as a focus on the imaginary, dramatic, heroic, lyric or comic aspects of life, to allow for an escape from their
{"page_id": 14694092, "title": "Antinatalism"}
a reasonable estimate can be obtained from growth experiments where the simulated inhibitions/deletions are actually performed and growth rate is measured. ==== Growth media optimization ==== To design optimal growth media with respect to enhanced growth rates or useful by-product secretion, it is possible to use a method known as Phenotypic Phase Plane analysis. PhPP involves applying FBA repeatedly on the model while co-varying the nutrient uptake constraints and observing the value of the objective function (or by-product fluxes). PhPP makes it possible to find the optimal combination of nutrients that favor a particular phenotype or a mode of metabolism resulting in higher growth rates or secretion of industrially useful by-products. The predicted growth rates of bacteria in varying media have been shown to correlate well with experimental results, as well as to define precise minimal media for the culture of Salmonella typhimurium. Host-pathogen interactions The human microbiota is a complex system with as many as 400 trillion microbes and bacteria interacting with each other and the host. To understand key factors in this system; a multi-scale, dynamic flux-balance analysis is proposed as FBA is classified as less computationally intensive. == Mathematical description == FBA formalizes the system of equations describing the concentration changes in a metabolic network as the dot product of a matrix of the stoichiometric coefficients (the stoichiometric matrix S) and the vector v of the unsolved fluxes. The right-hand side of the dot product is a vector of zeros representing the system at steady state. At steady state, metabolite concentrations remain constant as the rates of production and consumption are balanced, resulting in no net change over time. Since the system of equations is often underdetermined, there can be multiple possible solutions. To obtain a single solution, the flux that maximizes a reaction of interest, such
{"page_id": 4101904, "title": "Flux balance analysis"}
cell stress and binds to the CAT-1 3'UTR. The HuR interaction leads to release of the mRNA from the P bodies and resumption of active translation. A number of other miR-122 targets, including CD320, AldoA and BCKDK, have been identified by microarray analysis of changes in mRNA expression in the liver of mice treated with miR-122 inhibitors. The overall effect of miR-122 inhibition is to reduce the plasma cholesterol level, although the pathways involved in this regulation have not been fully elucidated. miR-122 also regulates systemic iron homeostasis via the target mRNAs Hjv and Hfe. miR-122 inhibition in mice or primates does not result in any detectable liver toxicity. == Role in cancer == miR-122 levels are frequently reduced in hepatocellular carcinoma (HCC) compared to normal liver, and low miR-122 levels correlate with poor prognosis. Overexpression of miR-122 reduces tumorigenic properties in HCC cell lines, suggesting that it functions as a tumor suppressor gene, and increases the response of cells to the chemotherapeutic drugs sorafenib and doxorubicin. Several miR-122 target genes have been implicated in tumorigenesis, including ADAM10, IGF1R, CCNG1 and ADAM17. == Innate Immunity == Recent studies demonstrated that miR-122 may directly regulate different aspects of the interferons (IFNs) signaling pathway to enhanced induction of anti-viral genes and inhibition of various virus. Moreover, miR-122 have been shown to target various genes, resulting in enhancement of IFN signaling and subsequent antiviral innate immunity. Interferons (IFNs, includes type I and III interferon) treatment leads to a significant reduction in the expression of the liver-specific miR-122. HepG2 cells with overexpressed microRNA-122 mount an effective antiviral interferon response and innate immune response to hepatitis C virus (HCV), other RNA viruses and viral mimetics (e.g. poly(I:C)). == Regulation of HCV == Recent studies have shown that replication of hepatitis C virus (HCV) is dependent
{"page_id": 22871796, "title": "MiR-122"}
The smoke signal is one of the oldest forms of long-distance communication. It is a form of visual communication used over a long distance. In general smoke signals are used to transmit news, signal danger, or to gather people to a common area. == History and usage == In ancient China, soldiers along the Great Wall sent smoke signals on its beacon towers to warn one another of enemy invasion. The colour of the smoke communicated the size of the invading party. By placing the beacon towers at regular intervals, and situating a soldier in each tower, messages could be transmitted over the entire 7,300 kilometres of the Wall. Smoke signals also warned the inner castles of the invasion, allowing them to coordinate a defense and garrison supporting troops. Misuse of the smoke signal is traditionally considered to have contributed to the fall of the Western Zhou dynasty in the 8th century BCE. King You of Zhou was said to have had a habit of fooling his warlords with false warning beacons to amuse Bao Si, his concubine. During Sri Lanka's Kandyan period, soldiers stationed on the mountain peaks alerted each other of impending enemy attack (from English, Dutch or Portuguese people) by signaling from peak to peak. In this way, they could transmit a message to the King in just a few hours. North American indigenous peoples also communicated via smoke signal. Each tribe had its own signaling system and understanding. A signaler started a fire on an elevation typically using damp grass, which caused a column of smoke to rise. The grass was taken off as it dried and another bundle was placed on the fire. Reputedly the location of the smoke along the incline conveyed a meaning. If it came from halfway up the hill, it signaled
{"page_id": 27005, "title": "Smoke signal"}
Raman Parimala (born 21 November 1948) is an Indian mathematician known for her contributions to algebra. She is the Arts & Sciences Distinguished Professor of mathematics at Emory University. For many years, she was a professor at Tata Institute of Fundamental Research (TIFR), Mumbai. She was on the Mathematical Sciences jury for the Infosys Prize 2019—2022 and was on the Abel prize selection Committee 2021–2023. == Background == Parimala was born and raised in Tamil Nadu, India. She studied in Saradha Vidyalaya Girls' High School and Stella Maris College at Chennai. She received her M.Sc. from Madras University (1970) and Ph.D. from the University of Mumbai (1976); her advisor was R. Sridharan from TIFR. In 1987, she won the highest science award in India: The Shanti Swarup Bhatnagar Prize. She is a fellow of the Indian National Science Academy (New Delhi). == Selected publications == 2021: "Local triviality for G-torsors", Gille, P.; Parimala, R.; Suresh, V., Math. Ann. 380, no. 1-2, 539–567. MR4263691 2018: "Local-global principle for reduced norms over function fields of p-adic curves", Parimala, R.; Preeti, R.; Suresh, V., Compos. Math. 154, no. 2, 410–458. MR3732207 2014: "Period-index and u-invariant questions for function fields over complete discretely valued fields", Parimala, R.; Suresh, V., Invent. Math. 197, no. 1, 215–235. MR3219517 2001: "Hermitian analogue of a theorem of Springer", R Parimala, R. Sridharan, V Suresh - Journal of Algebra, - Elsevier doi:10.1006/jabr.2001.8830 1998: "Classical groups and the Hasse principle", E Bayer-Fluckiger, R Parimala - Annals of Mathematics, jstor.org doi:10.2307/120961 1995: "Galois cohomology of the classical groups over fields of cohomological dimension ≤2", Bayer-Fluckiger, E.; Parimala, R., Invent. Math. 122, no. 2, 195–229. MR1358975 1990: "Real components of algebraic varieties and étale cohomology", Colliot-Thélène, J.-L.; Parimala, R., Invent. Math. 101, no. 1, 81–99. MR1055712 1982: "Quadratic spaces over polynomial extensions
{"page_id": 11853200, "title": "Raman Parimala"}
to be transmitted. When the page is transmitted again, the decoder updates the page in memory. The text can be displayed instead of the television image, or superimposed on it (a mode commonly called mix). Some pages, such as subtitles (closed captioning), are in-vision, meaning that text is displayed in a block on the screen covering part of the television image. The original standard provides a monospaced 40×24 character grid. Characters are sent using a 7-bit codec, with an 8th bit employed for error detection. The standard was improved in 1976 (World System Teletext Level 1) to allow for improved appearance and the ability to individually select the color of each character from a palette of eight. The proposed higher resolution Level 2 (1981) was not adopted in Britain (in-vision services from Ceefax & ORACLE did use it at various times, however, though even this was ceased by the BBC in 1996), although transmission rates were doubled from two to four lines a frame. === Levels === In the early 1980s, a number of higher extension levels were envisaged for the specification, based on ideas then being promoted for worldwide videotex standards (telephone dial-up services offering a similar mix of text and graphics). The most common implementation is Level 1.5, which supports languages other than English. Virtually any TV sold in Europe since the 1990s has support for this level. After 1994 some stations adopted Level 2.5 Teletext or Hi-Text, which allows for a larger color palette and higher resolution graphics. The proposed higher content levels included geometrically specified graphics (Level 4), and higher-resolution photographic-type images (Level 5), to be conveyed using the same underlying mechanism at the transport layer. No TV sets currently implement the two most sophisticated levels. == Decoders == The Mullard SAA5050 was a character generator
{"page_id": 1926240, "title": "Teletext"}
be fetched, likely resulting in no overlap between A and C. In short, an ILP compiler typically achieves good overlap in pro-portion with the bias of the branch, while the out-of-order does so in proportion to the predictability of the branch. This results in a sig-nificant advantage for the out-of-order because branch predictabil-ity is almost always higher than branch bias, sometimes signifi-cantly so. Variable Latency: Tolerance of long latency operations is an often touted strength of out-of-order processors, but it is important to recognize that static scheduling — through techniques like modulo scheduling — can effectively tolerate long latencies as well. The key advantage of out-of-order is two-fold: first, in its ability to tolerating variable latency, and, second, in how this interacts with path specificity. While most instructions on modern machines have a fixed la-tency, some instructions, notably load instructions, have a variable latency. This variable latency is important when it potentially af-fects the critical path. Consider the following three scenarios: Scenario A: (off the critical path) (int *)A[N]; int C[N]; for (int i = 0 ; i < N ; i ++) {C[i] = *A[i]; } This code exhibits a “spine and ribs” structure where the loop carried dependence ( i++ ) forms the critical path and the work of the loop (a serial dependence chain of two loads and store) are a rib hanging off that spine. Because the variable latency — the second load — is on the rib (and hence off the critical path) a compiler for an in-order machine could theoretically schedule the consumers of that load for its worst case latency. This would achieve the same performance as the out-of-order, because there is little benefit to completing the spines early. Scenario B: (on the critical path) int A[N], index = 0; for (int i
{"source": 2317, "title": "from dpo"}
boundary conditions and α {\displaystyle \alpha } is given by R S / ρ C {\displaystyle {\sqrt {R_{S}/\rho _{C}}}} which is the inverse of the previously defined transfer length L T {\displaystyle L_{T}} . Two boundary conditions can be obtained by defining the voltage as well as the current at the beginning of a metallic pad area as V 0 {\displaystyle V_{0}} and I 0 {\displaystyle I_{0}} respectively. In a formal manner this means that V ( x = 0 ) = V 0 {\displaystyle V(x=0)=V_{0}} and I ( x = 0 ) = I 0 {\displaystyle I(x=0)=I_{0}} when using the settings in the figure in this section. By using the pair of coupled differential equations above two more boundary conditions are obtained, namely d V ( x = 0 ) d x = − R S Z I 0 {\displaystyle {\frac {\mathrm {d} V(x=0)}{\mathrm {d} x}}=-{\frac {R_{S}}{Z}}I_{0}} and d I ( x = 0 ) d x = − R S Z V 0 {\displaystyle {\frac {\mathrm {d} I(x=0)}{\mathrm {d} x}}=-{\frac {R_{S}}{Z}}V_{0}} . Eventually two equations, describing the voltage and the current as a function of distance x {\displaystyle x} are obtained by using the four stated boundary conditions: V ( x ) = V O cosh ⁡ ( R S ρ C x ) − I 0 R s ρ C Z sinh ⁡ ( R S ρ C x ) {\displaystyle V(x)=V_{O}\cosh {\left({\sqrt {\frac {R_{S}}{\rho _{C}}}}x\right)}-{\frac {I_{0}{\sqrt {R_{s}\rho _{C}}}}{Z}}\sinh {\left({\sqrt {\frac {R_{S}}{\rho _{C}}}}x\right)}} I ( x ) = I O cosh ⁡ ( R S ρ C x ) − V 0 Z R s ρ C sinh ⁡ ( R S ρ C x ) {\displaystyle I(x)=I_{O}\cosh {\left({\sqrt {\frac {R_{S}}{\rho _{C}}}}x\right)}-{\frac {V_{0}Z}{\sqrt {R_{s}\rho _{C}}}}\sinh {\left({\sqrt {\frac {R_{S}}{\rho _{C}}}}x\right)}} When a measurement is performed, it can be
{"page_id": 1744973, "title": "Transfer length method"}
== See also == Axiomatic quantum field theory Minimal axioms for Boolean algebra
{"page_id": 734644, "title": "List of axioms"}
Gag and Gagpol proteins. As a result, non-infections viral particles are formed. == In Other Viruses == Resistance mutations are found and become problematic in many viruses other than HIV. Notable examples of such viruses include the herpes simplex virus and hepatitis B virus. In the herpes virus, drugs mainly target the viral DNA polymerase. As a result, mutations in the viral DNA polymerase that make it resistant to these drugs are selected for, which ultimately can cause complete resistance of the treatment. In hepatitis B, nucleoside and nucleotide analogs are used to cause early termination of viral transcription. Mutations in viral reverse transcriptase can cause the enzyme to not incorporate these nonfunctional analogs, in favor for their natural counterparts. If this mutation occurs, transcription will not be halted, and viral proteins can be created. == Research Applications == A study of hepatitis B in a Chinese population investigated the relationship of resistance mutations in the virus to its replication and genotype. It helped to gain insight into common mutations and their patterns. Patients undergoing treatment with a nucleoside drug were selected and fluorescence PCR and Sanger sequencing was used to sequence the viral genome. These sequences were compared against known hepatitis B sequences from Genbank so that the patterns of resistance could be analyzed. It was shown that many patients had a single mutation in common and many were also completely resist to a common nucleoside drug. In addition to gaining insight into mutation patterns, this study highlights the importance of using multiple types of drugs to treat chronic viral conditions. An important part of treating HIV is patient-specific tailoring of drugs. A study identified the most common resistance mutations so that point of care tests could determine the resistance mutations of a patient, thereby allowing their provider to
{"page_id": 10473109, "title": "Resistance mutation (virology)"}
the vector representations of items and user preferences. * **Sentiment Analysis**: Text data can be vectorized using VSM and then used as input to sentiment analysis models to determine the sentiment (positive, negative, neutral) expressed in a text. * **Text Similarity**: VSM can measure the similarity between two pieces of text by calculating the cosine similarity between their vector representations. This can be used for plagiarism detection, duplicate content detection, and more. The Vector Space Model is a versatile and foundational concept in NLP that plays a crucial role in transforming text data into a format suitable for a wide range of natural language processing tasks. How to implement a Vector Space Model in Python ----------------------------------------------- Implementing the Vector Space Model (VSM) in Python typically involves several steps, including text preprocessing, TF-IDF calculation, and cosine similarity computation. Here’s a basic example of how to implement VSM in Python using the popular libraries NLTK from nltk.tokenize import word_tokenize tokenized_documents = [word_tokenize(doc.lower()) for doc in documents] tokenized_query = word_tokenize(query.lower()) # Step 2: Calculate TF-IDF # Convert tokenized documents to text preprocessed_documents = [' '.join(doc) for doc in tokenized_documents] preprocessed_query = ' '.join(tokenized_query) # Create a TF-IDF vectorizer tfidf_vectorizer = TfidfVectorizer() tfidf_matrix = tfidf_vectorizer.fit_transform(preprocessed_documents) # Transform the query into a TF-IDF vector query_vector = tfidf_vectorizer.transform([preprocessed_query]) # Step 3: Calculate cosine similarity cosine_similarities = cosine_similarity(query_vector, tfidf_matrix) # Step 4: Rank documents by similarity results = [(documents[i], cosine_similarities[i]) for i in range(len(documents))] results.sort(key=lambda x: x, reverse=True) # Print the ranked
{"source": 1431, "title": "from dpo"}
detailed manner by condensed structural formulas (or simply, condensed formulas ). Instead of the usual format for chemical formulas in which each element symbol appears just once, a condensed formula is written to suggest the bonding in the molecule. These formulas have the appearance of a Lewis structure from which most or all of the bond symbols have been removed. Condensed structural formulas for ethane and pentane are shown at the bottom of Figure 20.2 , and several additional examples are provided in the exercises at the end of this chapter. 1. This is the Beilstein database, now available through the Reaxys site (www.elsevier.com/online-tools/reaxys). 2. Peplow, Mark. “Organic Synthesis: The Robo-Chemist,” Nature 512 (2014): 20–2. > 1126 Chapter 20 | Organic Chemistry This content is available for free at Figure 20.2 Pictured are the Lewis structures, ball-and-stick models, and space-filling models for molecules of methane, ethane, and pentane. A common method used by organic chemists to simplify the drawings of larger molecules is to use a skeletal structure (also called a line-angle structure). In this type of structure, carbon atoms are not symbolized with a C, but represented by each end of a line or bend in a line. Hydrogen atoms are not drawn if they are attached to a carbon. Other atoms besides carbon and hydrogen are represented by their elemental symbols. Figure 20.3 shows three different ways to draw the same structure. Figure 20.3 The same structure can be represented three different ways: an expanded formula, a condensed formula, and a skeletal structure. ## Example 20.1 Drawing Skeletal Structures > Chapter 20 | Organic Chemistry 1127 Draw the skeletal structures for these two molecules: Solution Each carbon atom is converted into the end of a line or the place where lines intersect. All hydrogen atoms attached to
{"source": 3700, "title": "from dpo"}
special kind of one-way function. Such a function is hard to invert unless some secret information, called the trapdoor, is known. A collision-free hash function f is a one-way function that is also collision-resistant; that is, no randomized polynomial time algorithm can find a collision—distinct values x, y such that f(x) = f(y)—with non-negligible probability. == Theoretical implications of one-way functions == If f is a one-way function, then the inversion of f would be a problem whose output is hard to compute (by definition) but easy to check (just by computing f on it). Thus, the existence of a one-way function implies that FP ≠ FNP, which in turn implies that P ≠ NP. However, P ≠ NP does not imply the existence of one-way functions. The existence of a one-way function implies the existence of many other useful concepts, including: Pseudorandom generators Pseudorandom function families Bit commitment schemes Private-key encryption schemes secure against adaptive chosen-ciphertext attack Message authentication codes Digital signature schemes (secure against adaptive chosen-message attack) == Candidates for one-way functions == The following are several candidates for one-way functions (as of April 2009). Clearly, it is not known whether these functions are indeed one-way; but extensive research has so far failed to produce an efficient inverting algorithm for any of them. === Multiplication and factoring === The function f takes as inputs two prime numbers p and q in binary notation and returns their product. This function can be "easily" computed in O(b2) time, where b is the total number of bits of the inputs. Inverting this function requires finding the factors of a given integer N. The best factoring algorithms known run in O ( exp ⁡ 64 9 b ( log ⁡ b ) 2 3 ) {\displaystyle O\left(\exp {\sqrt[{3}]{{\frac {64}{9}}b(\log b)^{2}}}\right)} time, where
{"page_id": 363890, "title": "One-way function"}
Field sage: to_V Isomorphism map: From: Number Field in a with defining polynomial x^3 + 2 To: Vector space of dimension 3 over Rational Field sage: from_V(to_V(2/3*a - 5/8)) 2/3*a - 5/8 sage: to_V(from_V(V([0,-1/7,0]))) (0, -1/7, 0) Python galois_closure(names=None, map=False) [source] Return number field 𝐾 that is the Galois closure of self, i.e., is generated by all roots of the defining polynomial of self, and possibly an embedding of self into 𝐾 . INPUT: names – variable name for Galois closure map – boolean (default: False); also return an embedding of self into 𝐾 EXAMPLES: Sage sage: # needs sage.groups sage: x = polygen(QQ, 'x') sage: K. = NumberField(x^4 - 2) sage: M = K.galois_closure('b'); M Number Field in b with defining polynomial x^8 + 28*x^4 + 2500 sage: L. = K.galois_closure(); L Number Field in a2 with defining polynomial x^8 + 28*x^4 + 2500 sage: K.galois_group(names=("a3")).order() 8 Python Sage sage: # needs sage.groups sage: phi = K.embeddings(L) sage: phi(K.0) 1/120*a2^5 + 19/60*a2 sage: phi(K.0).minpoly() x^4 - 2 sage: # needs sage.groups sage: L, phi = K.galois_closure('b', map=True) sage: L Number Field in b with defining polynomial x^8 + 28*x^4 + 2500 sage: phi Ring morphism: From: Number Field in a with defining polynomial x^4 - 2 To: Number Field in b with defining polynomial x^8 + 28*x^4 + 2500 Defn: a |--> 1/240*b^5 - 41/120*b Python A cyclotomic field is already Galois: Sage sage: # needs sage.groups sage: K. = NumberField(cyclotomic_polynomial(23)) sage: L. = K.galois_closure() sage: L Number Field in z with defining polynomial x^22 + x^21 + x^20 + x^19 + x^18 + x^17 + x^16 + x^15 + x^14 + x^13 + x^12 + x^11 + x^10 + x^9 + x^8 + x^7 + x^6 + x^5 + x^4 + x^3 + x^2 + x + 1
{"source": 6843, "title": "from dpo"}
This article discusses notable unsolved problems in medicine. Many of the problems relate to how drugs work (the so-called mechanism of action), and to diseases with an unknown cause, the so-called idiopathic diseases. == Definition of "disease" == There is no overarching, clear definition of what a disease is. On one hand, there is a scientific definition which is tied to a physiological process, and on the other hand, there is the subjective suffering of a patient and the loss of their life quality. Both approaches do not need to match, and they can even be contradictory. For example, when a patient seeks medical help because of a severe flu, the doctor will not care about the specific virological and immunological process behind the clearly visible suffering. This is contrasted by many hemochromatosis patients who will neither see suffering nor a change in their life quality, while the disease-causing process is severe and often deadly if left untreated. Similarly, many cancers in their very early stages are asymptomatic (e.g. pancreatic cancer) and the patient still feels healthy, which delays seeking treatment. Sometimes, cultural factors also play a role in defining "disease". Erectile dysfunction was long seen as a negative but non-pathological state. The introduction of effective treatments has led to its acceptance as a disease. Even more difficulties arise when it comes to mental disorders. Depressions and anxiety disorders cause significant subjective suffering in the patient, but do not harm third persons. On the contrary, a narcissistic disorder or an impulse-control disorder does not cause any suffering in the patient, though the maintenance of healthy interpersonal relationships will be affected, and third persons can be harmed. There is also debate on whether uncommon or socially taboo behaviors should be classified as a disease if they neither cause subjective suffering in
{"page_id": 48846633, "title": "Unsolved problems in medicine"}
The Hyphomicrobiales (synonom Rhizobiales) are an order of Gram-negative Alphaproteobacteria. The rhizobia, which fix nitrogen and are symbiotic with plant roots, appear in several different families. The four families Nitrobacteraceae, Hyphomicrobiaceae, Phyllobacteriaceae, and Rhizobiaceae contain at least several genera of nitrogen-fixing, legume-nodulating, microsymbiotic bacteria. Examples are the genera Bradyrhizobium and Rhizobium. Species of the Methylocystaceae are methanotrophs; they use methanol (CH3OH) or methane (CH4) as their sole energy and carbon sources. Other important genera are the human pathogens Bartonella and Brucella, as well as Agrobacterium, an important tool in genetic engineering. == Taxonomy == === Accepted families === === Unassigned Genera === The following genus has not been assigned to a family: Flaviflagellibacter Dong et al. 2019 === Provisional Taxa === These taxa have been published, but have not been validated according to the Bacteriological Code: "Nordella" La Scola et al. 2004 "Propylenellaceae" Liu et al. 2021 "Propylenella" Liu et al. 2021 "Propylenella binzhouense" Liu et al. 2021 "Thermopetrobacter" Sislak 2013 == Phylogeny == The currently accepted taxonomy is based on the List of Prokaryotic names with Standing in Nomenclature and the phylogeny is based on whole-genome sequences. == Natural genetic transformation == Natural genetic transformation has been reported in at least four Hyphomicrobiales species: Agrobacterium tumefaciens, Methylobacterium organophilum, Ensifer adhaerens, and Bradyrhizobium japonicum. Natural genetic transformation is a sexual process involving DNA transfer from one bacterial cell to another through the intervening medium, and the integration of the donor sequence into the recipient genome by homologous recombination. == See also == Lar1 == Notes == == References == == Further reading ==
{"page_id": 1342704, "title": "Hyphomicrobiales"}
Art Industrial School is located in Nazareth, Tamil Nadu, India. It is a private Industrial Training Institute (I.T.I.). == History == In the year 1877, there was a severe famine at the erstwhile Tinnevelly District. Thousands of people died. Consequently, there were a large number of destitute orphan children who were left without their parents. Hence to provide food and shelter to these orphans, an orphanage was started by Arthur Margoschis in the year 1878, which later became "Art and Industrial School". This orphanage was named as St. John's Orphanage. Rev. Margoschis was supported by the Society for the Propagation of the Gospel (Dursley Branch) and the Indian Famine Orphan Fund. Mr. D. Koilpillai was appointed as the first Head Master of this institution. The aim of this institution was not only to teach reading, writing, and arithmetic, but to teach each child in the orphanage some industrial work, so that when they leave the orphanage they may earn their livelihood. Initiated with formal school system up to III'rd standard, this institution accommodated other vocational trades such as Gardening, Tailoring and Carpentry with a view to ensure a livelihood for the inmates. Clothes for all the orphan children who were studying at the Industrial school and boarding schools at Nazareth were weaved at this S.P.G. Art Industrial School and was sent to them. Grant was sanctioned for the new Buildings for which plan and estimate were submitted to Government in 1886 and construction of the new buildings was commenced in January 1887. They were completed and opened on 14 November 1887 in a ceremonious function. In 1898, Mr. E. Hogg was appointed as Head master. In the year 1900, the orphanage grew up to accommodate 283 inmates and the Art Industrial School offered technical training in 18 trades. These included
{"page_id": 57716682, "title": "Art Industrial School"}
weak emergence is not a universal metaphysical solvent, as the hypothesis that consciousness is weakly emergent would not resolve the traditional philosophical questions about the physicality of consciousness. However, Bedau concludes that adopting this view would provide a precise notion that emergence is involved in consciousness, and second, the notion of weak emergence is metaphysically benign. Strong emergence describes the direct causal action of a high-level system on its components; qualities produced this way are irreducible to the system's constituent parts. The whole is other than the sum of its parts. It is argued then that no simulation of the system can exist, for such a simulation would itself constitute a reduction of the system to its constituent parts. Physics lacks well-established examples of strong emergence, unless it is interpreted as the impossibility in practice to explain the whole in terms of the parts. Practical impossibility may be a more useful distinction than one in principle, since it is easier to determine and quantify, and does not imply the use of mysterious forces, but simply reflects the limits of our capability. ==== Viability of strong emergence ==== One of the reasons for the importance of distinguishing these two concepts with respect to their difference concerns the relationship of purported emergent properties to science. Some thinkers question the plausibility of strong emergence as contravening our usual understanding of physics. Mark A. Bedau observes: Although strong emergence is logically possible, it is uncomfortably like magic. How does an irreducible but supervenient downward causal power arise, since by definition it cannot be due to the aggregation of the micro-level potentialities? Such causal powers would be quite unlike anything within our scientific ken. This not only indicates how they will discomfort reasonable forms of materialism. Their mysteriousness will only heighten the traditional worry that
{"page_id": 37436, "title": "Emergence"}
rather, inevitably must, actualize the potentialities which are inherent in the inert matter. In other words, it implies a mystic bond uniting matter to its manipulator ... Worlds apart is the Genesis concept of creation by divine fiat. Notice how the Bible passes over in absolute silence the nature of the matter—if any—upon which the divine word acted creatively. Its presence or absence is of no importance, for there is no tie between it and God. "Let there be!" or, as the Psalmist echoed it, "He spoke and it was so", [Psalm 33:9] refers not to the utterance of the magic word, but to the expression of the omnipotent, sovereign, unchallengeable will of the absolute, transcendent God to whom all nature is completely subservient. ==== Second day (1:6–8) ==== 6 And God said: 'Let there be a firmament in the midst of the waters, and let it divide the waters from the waters.' 7 And God made the firmament, and divided the waters which were under the firmament from the waters which were above the firmament; and it was so. 8 And God called the firmament Heaven. And there was evening and there was morning, a second day. On day two, God creates the firmament (rāqîa), which is named šamayim ('sky' or 'heaven'), to divide the waters. Water was a "primal generative force" in pagan mythologies. In Genesis, however, the primeval ocean possesses no powers and is completely at God's command. Rāqîa is derived from rāqa', the verb used for the act of beating metal into thin plates. Ancient people throughout the world believed the sky was solid, and the firmament in Genesis 1 was understood to be a solid dome. In ancient near eastern cosmology, the earth is a flat disc surrounded by the waters above and the waters
{"page_id": 1116229, "title": "Genesis creation narrative"}
is the same, the unit cell dimensions will be slightly different because of the different sizes of the atoms involved. == Mitscherlich's law == Mitscherlich's law of isomorphism, or the law of isomorphism, is an approximate law suggesting that crystals composed of the same number of similar elements tend to demonstrate isomorphism. Mitscherlich's law is named for German chemist Eilhard Mitscherlich, who formulated the law and published it between 1819 and 1823. According to Ferenc Szabadváry, one of the clues that helped Berzelius determine the atomic weights of the elements was "the discovery of Mitscherlich that compounds which contain the same number of atoms and have similar structures, exhibit similar crystal forms (isomorphism)." == See also == Asterism (gemology) Polymorphism (materials science) Goldschmidt tolerance factor Solid solution Vegard's law == References ==
{"page_id": 21862537, "title": "Isomorphism (crystallography)"}
thickness requires high energy and high power sources. === Projected water disruptors === Projected water disruptors use a water-projectile shaped charge to destroy bombs, blasting the device apart and severing any detonating connections faster than any fuse or anti-tampering device on the bomb can react. One example is the BootBanger, deployed under the rear compartment of cars suspected to be carrying bombs. Projected water disruptors can be directional, such as the BootBanger; or omni-directional, an example being the Bottler. === Pigstick === Pigstick is the British Army term for the waterjet disruptor commonly deployed on the Wheelbarrow remotely operated vehicle against IRA bombs in the 1970s. It fires a jet of water driven by a propellent charge to disrupt the circuitry of a bomb and disabling it with a low risk of detonation. The modern pigstick is reliable and can be fired many times with minimal maintenance. It is now used worldwide. It is 485 millimetres (19.1 in) long and weighs 2.95 kilograms (6.5 lb). It is made of hardened steel, and can be mounted on a remotely operated vehicle (ROV). These factors make it an effective way to render IEDs safe. It is not a panacea, however: it cannot deal with IEDs packed in hard containers such as industrial gas bottles or beer kegs, and other disruptors have been designed to deal with those and a range of other situations including car bombs. The device’s concept originated with Major 'Pat' Wilson Patterson RAOC and his team at the Bomb Disposal School, CAD Kineton. It was christened pigstick in reference to his enjoyment of the sport of pig-sticking when, as a subaltern in the Royal Signals, he was a Pathfinder with the SOE whilst in India in the late 1940s. The device was developed by the scientists Mike Barker MBE
{"page_id": 146382, "title": "Bomb disposal"}
defined atmosphere. Very low Earth orbit (VLEO) is defined as altitudes between approximately 100 - 450 km above Earth’s surface. Low Earth orbit (LEO): geocentric orbits with altitudes below 2,000 km (1,200 mi). Medium Earth orbit (MEO): geocentric orbits ranging in altitude from 2,000 km (1,200 mi) to just below geosynchronous orbit at 35,786 kilometers (22,236 mi). Also known as an intermediate circular orbit. These are used for Global Navigation Satellite System spacecraft, such as GPS, GLONASS, Galileo, BeiDou. GPS satellites orbit at an altitude of 20,200 kilometers (12,600 mi) with an orbital period of almost 12 hours. Geosynchronous orbit (GSO) and geostationary orbit (GEO) are orbits around Earth matching Earth's sidereal rotation period. Although terms are often used interchangeably, technically a geosynchronous orbit matches the Earth's rotational period, but the definition does not require it to have zero orbital inclination to the equator, and thus is not stationary above a given point on the equator, but may oscillate north and south during the course of a day. Thus, a geostationary orbit is defined as a geosynchronous orbit at zero inclination. Geosynchronous (and geostationary) orbits have a semi-major axis of 42,164 km (26,199 mi). This works out to an altitude of 35,786 km (22,236 mi). Both complete one full orbit of Earth per sidereal day (relative to the stars, not the Sun). High Earth orbit: geocentric orbits above the altitude of geosynchronous orbit (35,786 km or 22,236 mi). For Earth orbiting satellites below the height of about 800 km, the atmospheric drag is the major orbit perturbing force out of all non-gravitational forces. Above 800 km, solar radiation pressure causes the largest orbital perturbations. However, the atmospheric drag strongly depends on the density of the upper atmosphere, which is related to the solar activity, therefore the height at which the
{"page_id": 9622293, "title": "List of orbits"}
mi) (section of the East Siberian System of mountains) Alps – 1,200 km (750 mi) (section of the Alpine-Himalayan orogenic belt) Western Alps – approx. 600 km (370 mi) French Prealps – more than 400 km (250 mi) Eastern Alps – approx. 600 km (370 mi) Central Eastern Alps – approx. 600 km (370 mi) Northern Limestone Alps – approx. 600 km (370 mi) Southern Limestone Alps and Western Limestone Alps – approx. 600 km (370 mi) Apennines – 1,200 km (750 mi) (section of the Alpine-Himalayan orogenic belt) Caucasus Mountains – 1,200 km (750 mi) (section of the Alpine-Himalayan orogenic belt) Greater Caucasus – 1,200 km (750 mi) Lesser Caucasus – 600 km (370 mi) Cordillera Occidental (Colombia) – 1,200 km (750 mi) (section of the Northern Andes, American Cordillera) Cordillera Oriental (Colombia) – 1,200 km (750 mi) (section of the Northern Andes, American Cordillera) Vindhya Range – 1,200 km (750 mi) Altai Mountains – 1,200 km (750 mi) Drakensberg – 1,125 km (700 mi) Byrranga Mountains – 1,100 kilometres (680 mi) Cascade Range – 1,100 km (680 mi) Annamite Range – 1,100 km (680 mi) Brooks Range – 1,100 km (680 mi) (section of the North American Cordillera) Verkhoyansk Range – 1,100 kilometres (680 mi) (section of the East Siberian Mountains) Cordillera Central (Colombia) – 1,023 km (636 mi) (section of the Northern Andes, American Cordillera) Lena Plateau – 1,000 km (620 mi) (section of the East Siberian System of mountains) Pontic Mountains – 1,000 km (620 mi) (section of the Alpine-Himalayan orogenic belt) Eastern Sayan Mountains – 1,000 km (620 mi) Sierra Madre del Sur – 1,000 km (620 mi) (section of the North American Cordillera) Arakan/Rakhine Mountains – 950 km (590 mi) Hengduan Mountains – 900 km (560 mi) as a system of mountain ranges Ogo
{"page_id": 220151, "title": "List of mountain ranges"}
configurations in the Amazon S3 documentation If you have a dedicated AWS account team, contact them first and inform them of your plans. In some cases, if you have a negotiated commitment with AWS, you'll want to discuss your options with your AWS account team. 2) Review the criteria and process described on this page. 3) ContactAWS Customer Support If AWS Customer Support approves your move, you will receive a temporary credit for the cost of data transfer out based on the volume of all data you have stored across AWS services at the time of AWS’ calculation. AWS Customer Support will notify you if you are approved, and you will then have 60 days to complete your move off of AWS. The credit will count against data transfer out usage only,
{"source": 47, "title": "from dpo"}
had a clock cycle time of 7 ns. After the stages were split, the measured times were IF, 1 ns; ID, 1.5 ns; EX, 1 ns; MEM, 2 ns; and WB, 1.5 ns. The pipeline register delay is 0.1 ns. a. What is the clock cycle time of the 5-stage pipelined machine? b. If there is a stall every 4 instructions, what is the CPI of the new machine? c. What is the speedup of the pipelined machine over the single-cycle machine? d. If the pipelined machine had an infinite number of stages, what would its speedup be over the single-cycle machine? C-84 ■ Appendix C Pipelining: Basic and Intermediate Concepts C.4 A reduced hardware implementation of the classic five-stage RISC pipeline might use the EX stage hardware to perform a branch instruction comparison and then not actually deliver the branch target PC to the IF stage until the clock cycle in which the branch instruction reaches the MEM stage. Control hazard stalls can be reduced by resolving branch instructions in ID, but improv-ing performance in one respect may reduce performance in other circumstances. Write a small snippet of code in which calculating the branch in the ID stage causes a data hazard, even with data forwarding. C.5 [12/13/20/20/15/15] For these problems, we will explore a pipeline for a register-memory architecture. The architecture has two instruction formats: a register-register format and a register-memory format. There is a single-mem-ory addressing mode (offset + base register). There is a set of ALU operations with the format: ALUop Rdest, Rsrc1, Rsrc2 or ALUop Rdest, Rsrc1, MEM where the ALUop is one of the following: add, subtract, AND, OR, load (Rsrc1 ignored), or store. Rsrc or Rdest are registers. MEM is a base register and offset pair. Branches use
{"source": 2299, "title": "from dpo"}
industry has been extremely innovative every time it seems as if the physical limits of the production methods are about to be reached. Mod-ern lithography must be described now using many adjectives: what we have is phase-shifted-double-patterning immersion lithography, based on resolution enhanced technologies (RET), such as Optical proximity correction and struc-tured light. The whole process has to be extensively optimized and tested using computer simulations . > Documenta Mathematica · Extra Volume ISMP (2012) 401–415 Gordon Moore and His Law 413                                                                                                                               Ͳ                         > ͲͷͲͲ ͳͲͲͲ ͳͷͲͲ ʹͲͲͲ ʹͷͲͲ ͵ͲͲͲ ͵ͷͲͲ ͶͲͲͲ ͶͷͲͲ ͷͲͲͲ ͳͶǦ‘˜ǦͲ͹ ͻǦ‡’ǦͲͺ ͸Ǧ —ŽǦͲͻ ʹǦƒ›ǦͳͲ ʹ͸Ǧ ‡„Ǧͳͳ ʹ͵Ǧ‡ Ǧͳͳ > Ͳ                                             
{"source": 4215, "title": "from dpo"}
of 13 effects were statistically significant, casting doubt on the generality of this single strategy instruction. In contrast, experimenter tests fared better because 16 of 19 were statistically significant. Thus, there was stronger evidence for near transfer than for generalized effects. There is mixed evidence that general reading comprehension is improved on standardized, comprehension tests. Question generation may also be best used as a part of a multiple strategy instruction program. Story Structure is a procedure used extensively in reading comprehension of narrative texts. There are 17 studies over grades 3 through 6, about one half of which were focused on poor readers. The success in the treatment is more frequent with poor or below-average readers; good readers do not seem to need this kind of instruction. The treatment successfully transfers to question answering and recall. Only a few (two of three) studies report transfer to standardized comprehension tests. The instruction of the content and organization of stories thus improves comprehension of stories as measured by the ability of the reader to answer questions and recall what was read. This improvement is more marked for less able readers. More able readers may already know what a story is about and therefore do not benefit as much from the training. However, this kind of instruction may aid both kinds of readers in terms of writing as well as reading literary texts. Because stories are used extensively in elementary school, instruction on how to understand a story is warranted by the data, especially for less able readers. > 4-45 National Reading Panel Chapter 4, Part II: Text Comprehension Instruction Summarization has a large number of studies (18) that replicate treatment effects, mainly at grades 5 and 6. Summarization presupposes writing as well as reading skill, hence its late study. The effects are
{"source": 6100, "title": "from dpo"}
though the IUPAC documentation presents a thorough introduction, it includes the caution that "it is essential to study the original papers, especially the 1966 paper, before using the sequence rule for other than fairly simple cases.": 26f A recent paper argues for changes to some of the rules (sequence rules 1b and 2) to address certain molecules for which the correct descriptors were unclear. However, a different problem remains: in rare cases, two different stereoisomers of the same molecule can have the same CIP descriptors, so the CIP system may not be able to unambiguously name a stereoisomer, and other systems may be preferable.: 27 == Steps for naming == The steps for naming molecules using the CIP system are often presented as: Identification of stereocenters and double bonds; Assignment of priorities to the groups attached to each stereocenter or double-bonded atom; and Assignment of R/S and E/Z descriptors. === Assignment of priorities === R/S and E/Z descriptors are assigned by using a system for ranking priority of the groups attached to each stereocenter. This procedure, often known as the sequence rules, is the heart of the CIP system. The overview in this section omits some rules that are needed only in rare cases. Compare the atomic number (Z) of the atoms directly attached to the stereocenter; the group having the atom of higher atomic number Z receives higher priority (i.e. number 1). If there is a tie, the atoms at distance 2 from the stereocenter have to be considered: a list is made for each group of further atoms bonded to the one directly attached to the stereocenter. Each list is arranged in order of decreasing atomic number Z. Then the lists are compared atom by atom; at the earliest difference, the group containing the atom of higher atomic
{"page_id": 6034, "title": "Cahn–Ingold–Prelog priority rules"}
Peripheral Ulcerative Keratitis (PUK) is a group of destructive inflammatory diseases involving the peripheral cornea in human eyes. The symptoms of PUK include pain, redness of the eyeball, photophobia, and decreased vision accompanied by distinctive signs of crescent-shaped damage of the cornea. The causes of this disease are broad, ranging from injuries, contamination of contact lenses, to association with other systemic conditions. PUK is associated with different ocular and systemic diseases. Mooren's ulcer is a common form of PUK. The majority of PUK is mediated by local or systemic immunological processes, which can lead to inflammation and eventually tissue damage. Standard PUK diagnostic test involves reviewing the medical history and a completing physical examinations. Two major treatments are the use of medications such as corticosteroids or other immunosuppressive agents and surgical resection of the conjunctiva. The prognosis of PUK is unclear with one study providing potential complications. PUK is a rare condition with an estimated incidence of 3 per million annually. == Signs and symptoms == The most easily identifiable sign is a visible lesion of the cornea presented usually in a crescent shape. Common reasons for destruction are stromal degradation and epithelial defects on the inflammatory cells. There would be a change in conformation of the peripheral cornea, depending on the severity of corneal thinning. This process is usually accompanied by the possibility of concealing perforation. The formation of an oval-shaped ulcer at the margin of the cornea is also a sign. Symptoms of PUK include pain, redness, tearing, increased sensitivity to bright light, impaired or blurred vision, and the feeling of foreign objects trapped in the eyes. === Association === There are several associations of PUK to ocular and systemic diseases. Rheumatoid arthritis (RA), Wegner's granulomatosis (WG), and Polyarteritis Nodosa (PAN) are the most common systemic conditions. Rheumatoid
{"page_id": 67270055, "title": "Peripheral ulcerative keratitis"}
numbers for which there are two primordial radionuclides are 88 (151Eu and 152Gd) and 112 (187Re and 190Pt). The neutron numbers which have only one stable nuclide (compare: monoisotopic element for the proton numbers) are: 0, 2, 3, 4, 9, 11, 13, 15, 17, 23, 25, 27, 29, 31, 33, 37, 41, 43, 47, 49, 51, 53, 57, 59, 63, 65, 67, 69, 71, 73, 75, 77, 79, 81, 83, 84, 85, 86, 87, 91, 93, 95, 97, 99, 101, 103, 105, 109, 111, 113, 117, 119, 121, 125, 126, and the neutron numbers which have only one significant naturally-abundant nuclide (compare: mononuclidic element for the proton numbers) are: 0, 2, 3, 4, 9, 11, 13, 15, 17, 21, 23, 25, 29, 31, 33, 37, 41, 43, 47, 49, 51, 53, 57, 59, 63, 67, 69, 71, 73, 75, 77, 79, 83, 87, 91, 93, 95, 97, 99, 101, 103, 109, 111, 113, 117, 119, 121, 125, 142, 143, 146. == See also == Isotopes are nuclides having the same number of protons: e.g. carbon-12 and carbon-13. Isobars are nuclides having the same mass number (i.e. sum of protons plus neutrons): e.g. carbon-12 and boron-12. Nuclear isomers are different excited states of the same type of nucleus. A transition from one isomer to another is accompanied by emission or absorption of a gamma ray, or the process of internal conversion. (Not to be confused with chemical isomers.) == Notes ==
{"page_id": 1039736, "title": "Isotone"}
the participant to respond rapidly, but a "no-go" cue tells them to withhold a response. Because the "go" cue occurs more frequently, it can be used to measure how well a subject suppresses a response under different emotional conditions. This task is often used in combination with neuroimaging in healthy individuals and patients with affective disorders to identify relevant brain functions associated with emotional regulation. Several studies, including go/no-go studies, suggest that sections of the prefrontal cortex are involved in controlling emotional responses to stimuli during inhibition. === Emotional Stroop === Adapted from the Stroop, the emotional Stroop test measures how much attention you pay to emotional stimuli. In this task, participants are instructed to name the ink color of words while ignoring their meanings. Generally, people have trouble detaching their attention from words with an affective meaning compared with neutral words. It has been demonstrated in several studies that naming the color of neutral words results in a quicker response. Selective attention to negative or threatening stimuli, which are often related to psychological disorders, is commonly tested with this task. Different mental disorders have been associated with specific attentional biases. Participants with spider phobia, for example, tend to be more inclined to use spider-related words than negatively charged words. Similar findings have been found for threat words related to other anxiety disorders. Even so, other studies have questioned these conclusions. When the words are matched for emotionality, anxious participants in some studies show the Stroop interference effect for both negative and positive words. In other words, the specificity effects of words for various disorders may be primarily due to their conceptual relation to the disorder's concerns rather than their emotionality. === Ekman 60 faces task === The Ekman faces task is used to measure emotion recognition of six basic
{"page_id": 2640086, "title": "Affective neuroscience"}
there was "absolutely no evidence" that Russia had influenced the outcome of the EU referendum using Facebook. He said that the company was working towards greater regulation of technology firms. In October 2019, Damian Collins, chair of the British House of Commons Digital, Culture, Media and Sport Committee, formally asked Clegg to explain why Facebook had exempted political statements from fact-checking guidelines. In 2020, Clegg helped lead the creation of the Facebook Oversight Board, which reported to him, convincing former Danish Prime Minister and former College of Europe friend Helle Thorning-Schmidt to serve as its co-chair. He then played a role in Facebook's deplatforming of U.S. President Donald Trump in mid-2021. Ahead of the release of the whistleblown Facebook Files in October 2021, Clegg authored an internal memo saying that there was no evidence Facebook was a main cause in polarisation and that the company does not "profit from polarization, in fact, just the opposite." He later posted a public statement saying that the reporting on the Files "conferred egregiously false motives to Facebook's leadership and employees," saying that it was "just plain false" that Facebook ignored its own internal research. After the release of the Files, he then made a number of public interviews defending the company. In one of the interviews, he stated that "I can't give you a yes or no answer" when asked if Facebook played a role in amplifying extremist content ahead of the 2021 United States Capitol attack. Clegg faced criticism for his role in defending the company, with the Guardian journalist John Harris dubbing him "the fall guy for Facebook's failures". In February 2022, Clegg was promoted to president of global affairs. In January 2025, Clegg announced he would step down from his role as president of global affairs and leave Meta within
{"page_id": 728093, "title": "Nick Clegg"}
Furthermore, since his early years, Roth had been interested in a higher-level view of the evolution of science. In 1986, he completed his Habilitation at the TU Dresden in the field of the philosophy of science. == Scientific roles == Roth started as the research area lead of the aforementioned department TBK; he then became its director. On the basis of his specialized research work, he became a co-founder of the specialized studies „Computer Engineering“. In addition to that, he was the founder of the postgraduate degree of an engineer with a specialization „Microprocessor technology“. Roth was the founder and editor of the magazine „Mikroprozessortechnik“ at the East German publishing company Verlag Technik Berlin. In an evening talk at a technical committee conference of the Chamber of Technology (KdT) in Angelroda in April 1982, he described the tedious processes for founding this magazine under the conditions in the GDR: For 15 years he made efforts until a small number of copies of „Mikroprozessortechnik“ were allowed to be released. It was forbidden to use the word „Informatik“, as Günter Mittag,a member of the Politbüro of the SED considered this a term of West German ideology. The argument of a limited quota of paper available to the publisher had to be overcome, as well as the criticism that the publishing company VEB Verlag Technik had not published a new magazine for 28 years. His work as co-founder of the magazine Ethics and Social Sciences ("Ethik und Sozialwissenschaften", a forum for a culture of deliberation) at the West German publishing company Westdeutscher Verlag illustrates his ability for unconventional thinking and his interest in questions concerning the future. For many years, Roth was the chair of the Thuringia subdivision of the Verband Hochschule und Wissenschaft (Association for Higher Education and Science, VHW) in the
{"page_id": 53556993, "title": "Michael Roth (cyberneticist)"}
University - master's, Ph.D Waseda University - Ph.D Osaka University - master's, Ph.D University of Tsukuba -master's, Ph.D University of Electro-Communications - master's, Ph.D on Micro-Electronic === Kazakhstan === Al-Farabi Kazakh National University - master's, Ph.D === Malaysia === University Putra Malaysia - M.Sc and Ph.D programs in Nanomaterials and Nanotechnology UPM-Nano Malaysia Multimedia University - bachelor's degree in electronic engineering majoring in Nanotechnology (Nano-Engineering) Malaysia University of Science & Technology - B.Sc in Nanoscience & Nanoengineering with Business Management === Pakistan === University of the Punjab, Lahore, Centre of Excellence in Solid State Physics, M.S./Ph.D Program in Nanotechnology Preston Institute Of Nanoscience And Technology (PINSAT), Islamabad, B.S. Nanoscience and Technology University of Engineering & Technology, Lahore, Introductory Short Courses Quaid-e-Azam University, Islamabad, master's degree research projects Pakistan Institute of Engineering and Applied Sciences (PIEAS), Islamabad, National Centre for Nanotechnology COMSATS Institute of Information Technology (CIIT), Islamabad, Center for Micro and Nano Devices National University of Science & Technology (NUST), Islamabad, M.S. and Ph.D Nanoscience & Engineering National Institute of Bio Genetic Engineering (NIGBE), Faisalabad, Research Projects Ghulam Ishaq Khan Institute of Engineering & Technology (GIKI), TOPI, KPK, master's/Ph.D degree program Baha-ud-din Zakaria University, Multan Government College University (GCU), Lahore University of Sind, Karachi Peshawar University, Peshawar International Islamic University Bachelor & Master of Science in Nanotechnology === Singapore === National University of Singapore - B.Eng in Engineering Science with Nanoscience & Nanotechnology options, master's and PhD in Nanoscience and Nanotechnology Specialization === Sri Lanka === Sri Lanka Institute of Nanotechnology (SLINTEC) - Ph.D & M.Phil === Thailand === Chulalongkorn University - bachelor's degree in engineering (Nano-Engineering) Mahidol University - Center of Nanoscience and Nanotechnology - Master Program Kasetsart University - Center of Nanotechnology, Kasetsart University Research and Development Institute Center of Excellence in Nanotechnology at AIT - Center of
{"page_id": 905278, "title": "Nanotechnology education"}
in brain network models is the "small-world" architecture. It interprets models to be regular networks, while they occasionally experience random activity. In small-world networks, the clustering coefficient (i.e., transitivity) is high, and the average path distance is short. These two characteristics reflect the central maxim in the natural biological process: the balance between minimizing the resource cost and maximizing the flow of information among the network components. Given the complex structure of the human brain, measures that can represent the small-world properties of the brain network are of great importance since it simplifies the systems and becomes decipherable. Graph theoretical approaches have set up a mathematical framework to model the pairwise communications between elements of a network. In human neuroscience, graph theory is generally applied to either functional or effective connectivity. Graph theory methods, when applied properly, can offer important new insights into the structure and function of networked brain systems, including their architecture, evolution, development, and clinical disorders. It describes meaningful information about the topological architecture of human brain networks, such as small-worldness, modular organization, and highly connected or centralized hubs. For example, in a study hypothesizing that aging processes modulate brain connectivity networks, 170 healthy elderly volunteers were submitted to EEG recordings in order to define age-related normative limits. Graph theory functions were applied to exact low-resolution electromagnetic tomography on cortical sources in order to evaluate the small-world parameter as a representative model of network architecture. It is based on the strength of synchronization in the time-varying oscillatory electromagnetic activity of different brain regions as measured by EEG or MEG. === Key components of network analysis === Key components include: ==== Node degree, distribution and assortativity ==== The degree of a node is the number of connections that link with the rest of the network, which is one
{"page_id": 63336797, "title": "Network neuroscience"}
This list includes SQL reserved words – aka SQL reserved keywords, as the SQL:2023 specifies and some RDBMSs have added. A dash (-) means that the keyword is not reserved. == See also == SQL SQL syntax List of relational database management systems == External links == Page listing all reserved words in the SQL standard, from SQL-92 to SQL:2016: Standard SQL Reserved Words Summary. == References ==
{"page_id": 63375308, "title": "List of SQL reserved words"}
n − 1 − 1 {\displaystyle UU_{n-1}^{-1}} to ε n {\displaystyle \varepsilon _{n}} error, for ε n < ε n − 1 {\displaystyle \varepsilon _{n}<\varepsilon _{n-1}} . By concatenating this sequence of gates with U n − 1 {\displaystyle U_{n-1}} , we get a sequence of gates U n {\displaystyle U_{n}} such that ‖ U − U n ‖ ≤ ε n {\displaystyle \|U-U_{n}\|\leq \varepsilon _{n}} . The main idea in the original argument of Solovay and Kitaev is that commutators of elements close to the identity can be approximated "better-than-expected". Specifically, for V , W ∈ SU ⁡ ( 2 ) {\displaystyle V,W\in \operatorname {SU} (2)} satisfying ‖ V − I ‖ ≤ δ 1 {\displaystyle \|V-I\|\leq \delta _{1}} and ‖ W − I ‖ ≤ δ 1 {\displaystyle \|W-I\|\leq \delta _{1}} and approximations V ~ , W ~ ∈ SU ⁡ ( 2 ) {\displaystyle {\tilde {V}},{\tilde {W}}\in \operatorname {SU} (2)} satisfying ‖ V − V ~ ‖ ≤ δ 2 {\displaystyle \|V-{\tilde {V}}\|\leq \delta _{2}} and ‖ W − W ~ ‖ ≤ δ 2 {\displaystyle \|W-{\tilde {W}}\|\leq \delta _{2}} , then ‖ V W V − 1 W − 1 − V ~ W ~ V ~ − 1 W ~ − 1 ‖ ≤ O ( δ 1 δ 2 ) , {\displaystyle \|VWV^{-1}W^{-1}-{\tilde {V}}{\tilde {W}}{\tilde {V}}^{-1}{\tilde {W}}^{-1}\|\leq O(\delta _{1}\delta _{2}),} where the big O notation hides higher-order terms. One can naively bound the above expression to be O ( δ 2 ) {\displaystyle O(\delta _{2})} , but the group commutator structure creates substantial error cancellation. We can use this observation to approximate U U n − 1 − 1 {\displaystyle UU_{n-1}^{-1}} as a group commutator V n − 1 W n − 1 V n − 1 − 1 W n − 1 −
{"page_id": 56073671, "title": "Solovay–Kitaev theorem"}
include non-alphanumeric characters, such as apostrophes and punctuation, that are problematic for analysing documents. Words such as “isn’t” and “is not” should result in the same tokens (or at least be handled similarly) to capture the same meaning. Multiword expressions, for example, names of places or entities, such as “New York” , should also be kept as a single token and not split. Mixing up sentence boundaries with abbreviations can also become 15 problematic by splitting up coherent units of text, e.g. “F.B.I.”. Text normalisation [3, Ch. 2.4.4] can be useful for these problems. The subsequent processing of the tokens depends on the application. In some scenarios, it is helpful to additionally “standardise” before assigning the word to a token. These transformations can include the following: • Fix spelling or grammatical errors. • Transform all characters into uniform lower or upper case, also called “case folding” . • Stemming or lematising , which remove suffixes from words to produce a single token for a much larger set (e.g., “producing”, “produced”, “producer”, “product” all result in the stem “produc” and the lemma “produce”). A special transformation of tokens is to merge them into n-grams . N-grams are a series of adjacent tokens. The n refers to the number of merged tokens. N-grams are useful for representing common phrases and word combinations in the corpus. > 3.2.4 Token filtering and stop word filtering Once the text is transformed into a stream of tokens, the processing continues with determining which tokens are useful for the application. Tokens identified as unimportant are filtered out and removed. The choice of the filtering heuristic greatly depends on the application, as removing tokens can improve and degrade the performance of downstream methods. On the one hand, filtering can significantly reduce noise in the data by discarding tokens
{"source": 1021, "title": "from dpo"}
Motorbike helmet with navigation (livemap.info) Geary: New lightweight email reader for GNOME designed around conversations (yorba.org) Designers Complaining about iOS7 (designerscomplaining.tumblr.com) Show HN: Closing Call – Hacker News for Sales (closingcall.co) Who has been running this classified ad for more than ten years? (workingwithwords.blogspot.com) Lonnie Johnson’s Mysterious 12 String (fraulini.com) Using Redis SORT and GET to save on roundtrips (trentstrong.com) Using an electrical circuit solver to track ad click fraud (saidinesh5.wordpress.com) I am thinking of returning my Apple Watch (hunzekerhesed.com) HTTP Status Codes (httpstatus.es) Preliminary result of the Gangelt, Germany Covid-19 case cluster study [pdf] (land.nrw) Please... No rockstars (darrylsiry.posterous.com) How 5 years of reading HN enabled me to build the website for my business (czstrong.com) OpenCensus – Vendor-agnostic libraries to provide metrics collection and tracing (opencensus.io) The biggest issue facing America (lewmoorman.com) The Y Combinator Experience (ryanamos.org) I got tired of packing my own capsules so I made Nootrobox (nootrobox.com) My U.S. Arrest Nightmare. (p1x3l.com) Quick start to creating a simple API in a Rails App (kineticac.posterous.com) Designing experiments for understanding performance (2018) [pdf] (timharris.uk) Slope Soaring Tips for Beginners (2004) (shallowsky.com) Show HN: Review My Startup - PaperPhobic (paperphobic.com) Nomx responds to Scott Helme's research (nomx.com) Why 10 Million Dollar IPOs Matter (urgentspeed.com) Rosencrantz and Ethernet (2014) (shakespearegeek.com) Red Hat releases new OpenShift CLI developer tool (odo.dev) C++ Coding Guidelines (2014) (howardhinnant.github.io) Fexl version a8 released (fexl.com) Mark Twain's Memory Builder Game (1891) (twainquotes.com) Dear Mr. Watterson: a documentary about Calvin & Hobbes (dearmrwatterson.com) Onfleet (local delivery logistics SaaS) introduces Route Optimization (onfleet.com) Perfect – Server-Side Swift (perfect.org) Show HN: See where in the world the F-bomb is being dropped (fbomb.co) Show HN: Turn GPS tracks into 3D-Printed mountains (nicetrails.com) How Apple Watch Unexpectedly Measured My Vitals During a Car Crash (razorianfly.com) The software routing 260,000 grocery deliveries
{"source": 2757, "title": "from dpo"}
Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers) , 2019. Robert MW Dixon. Where have all the adjectives gone? Studies in Language. International Journal sponsored by the Foundation “Foundations of Language” , 1 (1):19–80, 1977. Robert MW Dixon and Robert MW Dixon. Ergativity . Cambridge University Press, 1994. Timothy Dozat and Christopher D Manning. Deep biaffine attention for neural de-pendency parsing. arXiv preprint arXiv:1611.01734 , 2016. Matthew S Dryer and Martin Haspelmath. Wals online. max planck institute for evolutionary anthropology. , 2013. Long Duong, Trevor Cohn, Steven Bird, and Paul Cook. Low resource dependency parsing: Cross-lingual parameter sharing in a neural network parser. In Proceedings of the 53rd annual meeting of the Association for Computational Linguistics and the 7th international joint conference on natural language processing (volume 2: short papers) , pages 845–850, 2015a. Long Duong, Trevor Cohn, Steven Bird, and Paul Cook. A neural network model for low-resource universal dependency parsing. In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing , pages 339–348, 2015b. Long Duong, Hiroshi Kanayama, Tengfei Ma, Steven Bird, and Trevor Cohn. Learn-ing cross-lingual word embeddings without bilingual corpora. Proceedings of the Conference on Empirical Methods in Natural Language Processing , 2016. Greg Durrett, Adam Pauls, and Dan Klein. Syntactic transfer using a bilingual lexicon. In Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning , pages 1–11, 2012. 200 Chris Dyer, Miguel Ballesteros, Wang Ling, Austin Matthews, and Noah A Smith. Transition-based dependency parsing with stack long short-term memory. Proceed-ings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Vol-ume 1: Long Papers) , 2015. Chris Dyer, Adhiguna Kuncoro, Miguel Ballesteros, and Noah A Smith. Recurrent neural
{"source": 4990, "title": "from dpo"}
the gravitatio force (true weight) on the person and (b) the norm force (apparent weight) on the person. (c) Which fo is greater? Assume the Earth is a uniform sphere a take 9.800 m/s Galileo thought about whether acceleration should defined as the rate of change of velocity over time o the rate of change in velocity over distance. He ch the former, so let’s use the name “vroomosity” for rate of change of velocity over distance. For motion a particle on a straight line with constant accelerati the equation gives its velocity as a functi of time. Similarly, for a particle’s linear motion w constant vroomosity , the equation gthe velocity as a function of the position if the pa cle’s speed is at 0. (a) Find the law describing th total force acting on this object of mass . (b) Descr an example of such a motion or explain why it is un alistic. Consider (c) the possibility of positive an (d) the possibility of negative. 57. Figure P6.57 shows a photo of a swing ride at an amusement park. The structure consists of a horizon tal, rotating, circular platform of diameter from which seats of mass are sus pended at the end of massless chains of length . When the system rotates at Figure P6.54 Figure P6.57 > Stuart Gregory/Getty Images AMT oretical prediction. You will need to make reference to the quantities plotted on the axes, to the shape of the graph line, to the data points, and to the results of parts (c) and (d). 50. A basin surrounding a drain has the shape of a circular cone opening upward, having everywhere an angle of 35.0° with the horizontal. A 25.0-g ice cube is set slid ing around the cone without friction in a horizontal
{"source": 6367, "title": "from dpo"}
the largest number of proteins in the database. The most basic recommendations provide ranking of all proteins in a gene cluster in terms of their distance to other proteins. In the simplest case proteins near the center of a cluster are judged to be most informative because their distance to the other proteins in the cluster is relatively small. As a result, functional annotation of a "center" of a cluster is likely to result in the most accurate predictions for the other proteins in the cluster. In evolutionary terms these "cluster centers" are closest to the evolutionary ancestor of all the proteins in the cluster. Active Learning generalizes this intuition principle to produce recommendations for additional experiments that are likely to either produce accurate predictions or identify proteins that are not annotated correctly. In addition to evolutionary analysis and Active Learning COMBREX also points to other criteria that might be considered in considering experiments. Such criteria include whether there is a structure available, conservation of the bacterial gene in the human genome (e.g. domain sharing), availability of computational or experimental evidence of gene function, phenotypical considerations (such as presence in a pathogen or relation to antibiotic resistance, pathogenicity or virulence) and others. === Grants for the Biochemical Characterization of genes === One of the missions of COMBREX is to issue small monetary grants for the experimental validation of specific gene predictions. The experimental determination of biochemical function for specific gene products serves to validate (or invalidate) the computational predictions made a priori. Thus, this experimental effort serves three goals: (1) it brings together directly the scientists who make gene function predictions and those who test them, (2) it evaluates computational methods based on how accurate their predictions are so they can be improved, and (3) it broadens the landscape of
{"page_id": 30357748, "title": "Combrex"}
and gene expression due to their specific binding to the transcription factor. The most important tight junction proteins are occludin, claudin and JAM family, that establish the backbone of tight junction and allow to passing of immune cells through the tissue. == TJ proteins in epithelia and endothelia == Proteins in epithelial and endothelial cells are occludin, claudin and tetraspanin, that each has a one or two different types of the conformation. All of them are created by four transmembrane regions with two (amino-, carboxyl-) extracellular domains, that are orientated towards the cytoplasm. But occludin has a structure with two similar extracellular loops compared to claudin and tetraspanin, which have one extracellular loop significantly longer than the other one. === Occludin === Occludin (60kDa) was the first identified component of tight junction. The tetraspan membrane protein is established by two extracellular loops, two extracellular domains and one short intracellular domain. The C-terminal domain of occludin is directly bound to ZO-1, which interacts with actin filaments in cytoskeleton. It works as a transmitter from and to the tight junction, because of its association with signaling molecules (PI3-kinase, PKC, YES, protein phosphases 2A, 1). This TJ protein also participate in a selective diffusion of solutes along concentration gradient and transmigration of leukocytes across the endothelium and epithelium. Therefore the result of the overexpression of mutant occludin in epithelial cells leads to break down the barrier function of tight junction and changes in a migration of neutrophils. Occludin cooperates with members of the claudin family directly or indirectly and together they form the long strands of tight junction. === Claudin === The claudin family is composed by 24 members. Some of them haven't been well characterized yet but all members are encoded by 20-27kDa tetraspan proteins with two extracellular domains, one short intracellular
{"page_id": 59742549, "title": "Tight junction proteins"}
backscattered direction, which is usually the source. However, this usually compromises aerodynamic performance. One feasible solution, which has extensively been explored in recent time, is to use metasurfaces which can redirect scattered waves without altering the geometry of a target. Such metasurfaces can primarily be classified in two categories: (i) checkerboard metasurfaces, (ii) gradient index metasurfaces. Similarly, negative index metamaterials are artificial structures for which refractive index has a negative value for some frequency range, such as in microwave, infrared, or possibly optical. These offer another way to reduce detectability, and may provide electromagnetic near-invisibility in designed wavelengths. Plasma stealth is a phenomenon proposed to use ionized gas, termed a plasma, to reduce RCS of vehicles. Interactions between electromagnetic radiation and ionized gas have been studied extensively for many purposes, including concealing vehicles from radar. Various methods might form a layer or cloud of plasma around a vehicle to deflect or absorb radar, from simpler electrostatic to radio frequency (RF) more complex laser discharges, but these may be difficult in practice. Several technology research and development efforts exist to integrate the functions of aircraft flight control systems such as ailerons, elevators, elevons, flaps, and flaperons into wings to perform the aerodynamic purpose with the advantages of lower RCS for stealth, via simpler geometries and lower complexity (mechanically simpler, fewer or no moving parts or surfaces, less maintenance), and lower mass, cost (up to 50% less), drag (up to 15% less during use), and inertia (for faster, stronger control response to change vehicle orientation to reduce detection). Two promising approaches are flexible wings, and fluidics. In flexible wings, much or all of a wing surface can change shape in flight to deflect air flow. Adaptive compliant wings are a military and commercial effort. The X-53 Active Aeroelastic Wing was a US
{"page_id": 262577, "title": "Stealth technology"}
another fresh alphabet symbol, and then by surrounding the resulting expression with a Kleene star. The remaining, more difficult part, is to prove that for e n {\displaystyle e_{n}} there is no equivalent regular expression of star height less than n; a proof is given in Eggan (1963). However, Eggan's examples use a large alphabet, of size 2n-1 for the language with star height n. He thus asked whether we can also find examples over binary alphabets. This was proved to be true shortly afterwards by Dejean and Schützenberger in 1966. Their examples can be described by an inductively defined family of regular expressions over the binary alphabet { a , b } {\displaystyle \{a,b\}} as follows–cf. Salomaa (1981): e 1 = ( a b ) ∗ e 2 = ( a a ( a b ) ∗ b b ( a b ) ∗ ) ∗ e 3 = ( a a a a ( a a ( a b ) ∗ b b ( a b ) ∗ ) ∗ b b b b ( a a ( a b ) ∗ b b ( a b ) ∗ ) ∗ ) ∗ ⋯ e n + 1 = ( a ⋯ a ⏟ 2 n ⋅ e n ⋅ b ⋯ b ⏟ 2 n ⋅ e n ) ∗ {\displaystyle {\begin{alignedat}{2}e_{1}&=(ab)^{*}\\e_{2}&=\left(aa(ab)^{*}bb(ab)^{*}\right)^{*}\\e_{3}&=\left(aaaa\left(aa(ab)^{*}bb(ab)^{*}\right)^{*}bbbb\left(aa(ab)^{*}bb(ab)^{*}\right)^{*}\right)^{*}\\\,&\cdots \\e_{n+1}&=(\,\underbrace {a\cdots a} _{2^{n}}\,\cdot \,e_{n}\,\cdot \,\underbrace {b\cdots b} _{2^{n}}\,\cdot \,e_{n}\,)^{*}\end{alignedat}}} Again, a rigorous proof is needed for the fact that e n {\displaystyle e_{n}} does not admit an equivalent regular expression of lower star height. Proofs are given by Dejean & Schützenberger (1966) and by Salomaa (1981). == Computing the star height of regular languages == In contrast, the second question turned out to be much more difficult, and the question became a famous open
{"page_id": 27647, "title": "Star height problem"}
In mathematics, de Moivre's formula (also known as de Moivre's theorem and de Moivre's identity) states that for any real number x and integer n it is the case that ( cos ⁡ x + i sin ⁡ x ) n = cos ⁡ n x + i sin ⁡ n x , {\displaystyle {\big (}\cos x+i\sin x{\big )}^{n}=\cos nx+i\sin nx,} where i is the imaginary unit (i2 = −1). The formula is named after Abraham de Moivre, although he never stated it in his works. The expression cos x + i sin x is sometimes abbreviated to cis x. The formula is important because it connects complex numbers and trigonometry. By expanding the left hand side and then comparing the real and imaginary parts under the assumption that x is real, it is possible to derive useful expressions for cos nx and sin nx in terms of cos x and sin x. As written, the formula is not valid for non-integer powers n. However, there are generalizations of this formula valid for other exponents. These can be used to give explicit expressions for the nth roots of unity, that is, complex numbers z such that zn = 1. Using the standard extensions of the sine and cosine functions to complex numbers, the formula is valid even when x is an arbitrary complex number. == Example == For x = π 6 {\displaystyle x={\frac {\pi }{6}}} and n = 2 {\displaystyle n=2} , de Moivre's formula asserts that ( cos ⁡ ( π 6 ) + i sin ⁡ ( π 6 ) ) 2 = cos ⁡ ( 2 ⋅ π 6 ) + i sin ⁡ ( 2 ⋅ π 6 ) , {\displaystyle \left(\cos {\bigg (}{\frac {\pi }{6}}{\bigg )}+i\sin {\bigg (}{\frac {\pi }{6}}{\bigg )}\right)^{2}=\cos {\bigg (}2\cdot {\frac
{"page_id": 57326, "title": "De Moivre's formula"}
Linked network in statistics is a network, which is composed of one-node networks, where the nodes from different one-node networks are connected through two-node networks. This means, that "linked networks are collections of networks defined on different sets of nodes", where all sets of nodes must be connected to each other.: 259 Different examples of linked networks are: : 259–260 multilevel networks, dynamic networks (networks, measured at several different points in time), dynamic multilevel networks, measured at several different points in time, meta-networks, based on the PCANS model. == References == == See also == mathematical sociology
{"page_id": 68511690, "title": "Linked network"}
the suitport occurred on 16 and 18 July 2012; during these tests the spacesuit was kept at a pressure of 14.7 psi (1 atm), with the chamber pressure at approximately 6.5 psi (0.44 atm), equivalent to an altitude of 21,000 feet (6,400 m). Future tests were planned for September and August 2012, where NASA planned to keep the spacesuit at a pressure of 8 psi (0.5 atm), and the vacuum chamber at roughly 0 psi (0 atm). Suitports may eventually be tested on the International Space Station. == See also == Space exploration – Exploration of space, planets, and moons Constellation program – Cancelled 2005–2010 NASA human spaceflight program Lunar outpost (NASA) – Concepts for extended human presence on the MoonPages displaying short descriptions of redirect targets Altair (spacecraft) – Planned lander spacecraft component of NASA's cancelled Project Constellation Lunar surface – Structure and composition of the MoonPages displaying short descriptions of redirect targets Colonization of the Moon – Settlement on the Moon Colonization of Mars – Proposed concepts for human settlements on Mars Mars suit – Space suit for the Martian surface Single-person spacecraft – Type of spacecraft with one occupant == References ==
{"page_id": 17959575, "title": "Suitport"}
need to fill the data gap in Africa and globally. The vast data gap in such a large part the global landmass, home to some of the most vulnerable societies, the aforementioned call has galvanised a global effort to “plug the data gap” in the decade ahead and halt a further deterioration in the observation networks. == International regulation == According to the International Telecommunication Union, a meteorological aids service (also: meteorological aids radiocommunication service) is – according to Article 1.50 of the ITU Radio Regulations (RR) – defined as "A radiocommunication service used for meteorological, including hydrological, observations and exploration. Furthermore, according to article 1.109 of the ITU RR: A radiosonde is an automatic radio transmitter in the meteorological aids service usually carried on an aircraft, free balloon, kite or parachute, and which transmits meteorological data. Each radio transmitter shall be classified by the radiocommunication service in which it operates permanently or temporarily. === Frequency allocation === The allocation of radio frequencies is provided according to Article 5 of the ITU Radio Regulations (edition 2012). In order to improve harmonisation in spectrum utilisation, the majority of service-allocations stipulated in this document were incorporated in national Tables of Frequency Allocations and Utilisations which is with-in the responsibility of the appropriate national administration. The allocation might be primary, secondary, exclusive, and shared. primary allocation: is indicated by writing in capital letters (see example below) secondary allocation: is indicated by small letters exclusive or shared utilization: is within the responsibility of administrations However, military usage, in bands where there is civil usage, will be in accordance with the ITU Radio Regulations. Example of frequency allocation == See also == 6AK5 Atmospheric model Atmospheric thermodynamics CTD (instrument) Global horizontal sounding technique Rocketsonde Totex - a Japanese manufacturer of meteorological balloons Vaisala Vilho Väisälä
{"page_id": 172851, "title": "Radiosonde"}
use of Ka-band TWTs. == Historical notes == A TWT has sometimes been referred to as a "traveling-wave amplifier tube" (TWAT), although this term was never widely adopted. "TWT" has been pronounced by engineers as "twit", and "TWTA" as "tweeta". == See also == Distributed amplifier Magnetron Klystron tube Crossed-field amplifier Backward wave oscillator Inductive output tube Extended interaction oscillator == References == == Further reading == Copeland, Jack; Haeff, Andre A. (September 2015). "The True History of the Traveling Wave Tube". Armstrong, Carter M; (November 2015). "The Quest for the Ultimate Vacuum Tube". IEEE Spectrum; [2] == External links == Memorial page, with photo of John Pierce holding a TWT Nyquist page, with photo of Pierce, Kompfner, and Nyquist in front of TWT calculations on blackboard TMD Travelling Wave Tubes, Information & PDF data sheets. Flash animation showing the operation of a traveling wave tube (TWT) and its internal construction
{"page_id": 473167, "title": "Traveling-wave tube"}
Replika's website says that its team "works remotely with no physical offices". == Social features == Users react to Replika in many ways. The free-tier offers Replika as a "friend", with paid premium tiers offering Replika as a "partner", "spouse", "sibling" or "mentor". Of its paying userbase, 60% of users said they had a romantic relationship with the chatbot; and Replika has been noted for generating responses that create stronger emotional and intimate bonds with the user. Replika routinely directs the conversation to emotional discussion and builds intimacy. This has been especially pronounced with users suffering from loneliness and social exclusion, many of whom rely on Replika for a source of developed emotional ties. During the COVID pandemic, while many people were quarantined, many new users downloaded Replika and developed relationships with the app. A 2024 study examined Replika's interactions with students who experience depression. Research participants, noted to be "more lonely than typical student populations" reported feeling social support from Replika. They stated that they felt they were using Replika in ways comparable to therapy, and that using Replika gave them "high perceived social support". Many users have had romantic relationships with Replika chatbots, often including erotic talk. In 2023, a user announced on Facebook that she had "married" her Replika AI boyfriend, calling the chatbot the "best husband she has ever had". Users who fell in love with their chatbots shared their experiences in a 2024 episode of You and I, and AI from Voice of America. Some users said that they turned to AI during depression and grief, with one saying he felt that Replika had saved him from hurting himself after he lost his wife and son. == Technical reviews == A team of researchers from the University of Hawaiʻi at Mānoa found that Replika's design
{"page_id": 73388515, "title": "Replika"}
risk forfeiture of strategic or operational initiative. It is therefore incumbent upon the JFC to plan on as few operational pauses as possible, if any, and consistent with the CONOPS, to alternate pauses and tempo between components of the force. In this manner, a major portion of the joint force can maintain pressure on the enemy through offensive actions while other components pause. Additionally, operational pauses can provide opportunities for military deception if planned in advance. (d) Realistic plans, branches, sequels, orders, and an accurate TPFDD are important to enable the proper sequencing of operations. Further, the dynamic nature of modern military operations requires adaptability concerning the arrangement of military capabilities in time, space, and purpose. For example, a rapidly changing enemy situation or other aspects of the OE may cause the commander to alter the planned arrangement of operations even as forces are deploying. Therefore, maintaining overall force visibility, to include both in-transit visibility and asset visibility, are critical to maintaining flexibility. The arrangement that the commander chooses should not foreclose future options. m. Forces and Functions (1) Commanders and planners can plan campaigns and operations that focus on defeating either enemy forces, functions, or a combination of both. Typically, JFCs structure operations to attack both enemy forces and functions concurrently to create the greatest possible friction between friendly and enemy forces and capabilities. These types of operations are especially appropriate when friendly forces enjoy technological and/or numerical superiority over an opponent. (2) JFCs can focus on destroying and disrupting critical enemy functions such as C2, sustainment, and protection. An attack an enemy’s functions normally is intended to Chapter IV IV-40 JP 5-0 destroy the enemy’s balance, thereby creating vulnerabilities to be exploited. The direct effect of destroying or disrupting critical enemy functions can create the indirect effects of
{"source": 1450, "title": "from dpo"}
The sigmoid function is monotonic and continuously differentiable, so we can use gradient descent methods to "train" a single sigmoid unit and an algorithm called **backpropagation** to train a network of units. The cost function is, again: $$J(w)=\frac{1}{2}\sum_{i}{\left(y^{(i)}-\sigma\left(z^{(i)}\right)\right)^2}$$ J(w)=1 2∑i(y(i)−σ(z(i)))2 $\sigma(z)$ is the sigmoid function and its derivative is $\frac{\partial}{\partial z}{\sigma(z)} = \sigma(z)\left(1-\sigma(z)\right)$. Its argument, $z^{(i)}=w^\top x^{(i)}$, is the linear combination between the weights vector $w$ and the _i_-th input $x^{(i)}$. The partial derivative of $z$ with respect to the _j_-th parameter $w_j$ is simply $\frac{\partial}{\partial w_j}{z^{(i)}} = x_{j}^{(i)}$. The derivative of $J$ with respect to $w_j$ is then: $$\begin{split} \frac{\partial J}{\partial w_j} &= \frac{\partial}{\partial w_j} \frac{1}{2}\sum_{i}{\left(y^{(i)}-\sigma\left(z^{(i)}\right) \right)^2} \\ &= \frac{1}{2} \sum_{i} 2\left(y^{(i)}-\sigma\left(z^{(i)}\right)\right) \frac{\partial}{\partial w_j}\left(y^{(i)}-\sigma\left(z^{(i)}\right)\right) \\ &= \sum_{i} \left(y^{(i)}-\sigma\left(z^{(i)}\right)\right) \left(- \frac{\partial}{\partial w_j} \sigma\left(z^{(i)}\right) \right) \\ &= \sum_{i} \left(y^{(i)}-\sigma\left(z^{(i)}\right)\right) \sigma(z^{(i)})\left(1-\sigma(z^{(i)})\right) \left(- \frac{\partial}{\partial w_j} z^{(i)}\right) \\ &= -\sum_{i} \left(y^{(i)}-\sigma\left(z^{(i)}\right)\right) \sigma(z^{(i)})\left(1-\sigma(z^{(i)})\right) x_j^{(i)}\\ \end{split}$$ This is the objective function to be minimized for a single neuron. In a multi-layer network, the inputs to each neuron depend from the outputs produced by the neurons of the previous layers. Note that the units of the _i_-th layer are directly connected to the units of the _(i+1)_-th layer, and not to the units of the subsequent layers. Although the nonlinear sigmoid neuron function overcomes some of the limitations of the perceptron, such as being able to converge even if the points are not linearly separable, in order to find nonlinear boundaries between the data we need to compose many sigmoid units together. Gemini The Rectified Linear Unit ------------------------- There are plenty of activation functions. $$g(z)=\max\left\{0,z\right\}$$$$g(z)=\max\left\{0,z\right\}$$ its derivative is: $$g'(z) = \begin{cases} 0 & \text{if } z0 \\ \text{undefined} & \text{if } z=0
{"source": 3850, "title": "from dpo"}
of trust. Acad Manag Rev 23(3):393–404")] propose that the vulnerability of either the trustor or the trustee significantly affects the level of trust. Castelfranchi and Falcone[18 Trust Theory: a socio-cognitive and computational model. Wiley, Berlin")] and Luhmann[22 Trust and power. Wiley, New York")] also emphasise the importance of uncertainty and risk when evaluating trust. Additionally, a model proposed in[19 Trust and distrust definitions: one bite at a time. In: Falcone R, Singh M, Tan Y-H (eds) trust in cyber-societies. Springer, Berlin, pp 27–54"), 23 A framework for trust-related knowledge transfer in human–robot interaction. Auton Agents Multi-Agent Syst 38(1):24")] highlights the role of belief in the interaction between the trustor and trustee, particularly in physical interaction. Despite significant progress in clarifying the essential facets of trust, the term remains semantically overloaded, lacking a widely agreed upon, and conceptually clear definition, with critical implications for facilitating cooperation, reducing uncertainty, and enhancing social well-being[18 Trust Theory: a socio-cognitive and computational model. Wiley, Berlin")]. ### 2.2 Factors Influence Trust in HRI Trust is a notion that is increasingly being used in HRI applications. Several studies have been conducted to explore the various factors that affect trust in these interactions. One of the most significant factors that influence trust in human–robot interactions is reliability. Several studies have shown that users tend to trust robots more when they are reliable and consistent in their performance. For example, in [3 A meta-analysis of factors affecting trust in human–robot interaction. Hum Fact 53(5):517–527"), 24 Trust in artificial intelligence: meta-analytic findings. Hum
{"source": 5784, "title": "from dpo"}
(j,ts) > 9: refresh() > 10: if ∃k ∈ Π and v s.t. ⟨⟨ ts, v ⟩j , σ ⟩ ∈ deliver k where σ is a set of f + 1 signatures on ⟨ready, ⟨ts, v ⟩j ⟩ then > 11: deliver i ← deliver i ∪ {⟨⟨ ts, v ⟩j , σ ⟩} > 12: return v > 13: return ⊥ > 14: procedure refresh > 15: for j ∈ [n] do > 16: m ← send j > 17: if ∄ts , val s.t. m = ⟨ts, val ⟩j then continue ▷ m is not a signed pair > 18: echo i ← echo i ∪ { m} > 19: if ¬conflicting-echo (m) then > 20: ready i ← ready i ∪ {⟨ ready, m ⟩i} > 21: if ∃S ⊆ Π s.t. |S| ≥ f + 1 , ∀j ∈ S, ⟨ready, m ⟩j ∈ ready j and ¬conflicting-echo (m) then > 22: deliver i ← deliver i ∪ {⟨ m, σ = {⟨ ready, m ⟩j |j ∈ S}⟩} ▷ σ is the set of f + 1 signatures We make two assumptions on the correct usage of our algorithm. The first is inherently required as shown in Lemma 5: ▶ Assumption 1. All correct processes infinitely often invoke methods of the reliable broadcast API. The second is a straight forward validity assumption: ▶ Assumption 2. Correct processes do not invoke broadcast(ts,val) twice with the same ts .S. Cohen and I. Keidar 18:11 In the full version [ 14 ] we prove the correctness of the reliable broadcast algorithm and conclude the following theorem: ▶ Theorem 8. Algorithm 1 implements an f -resilient Byzantine linearizable reliable broadcast object for any f 2 . # 7 Byzantine Linearizable Snapshot In this section, we
{"source": 7322, "title": "from dpo"}
100 km—and dense layer. This layer is gravitationally unstable and may fragment into numerous clumps, which in turn collapse into planetesimals. However, the differing velocities of the gas disk and the solids near the mid-plane can generate turbulence which prevents the layer from becoming thin enough to fragment due to gravitational instability. This may limit the formation of planetesimals via gravitational instabilities to specific locations in the disk where the concentration of solids is enhanced. Another possible mechanism for the formation of planetesimals is the streaming instability in which the drag felt by particles orbiting through gas creates a feedback effect causing the growth of local concentrations. These local concentrations push back on the gas creating a region where the headwind felt by the particles is smaller. The concentration is thus able to orbit faster and undergoes less radial drift. Isolated particles join these concentrations as they are overtaken or as they drift inward causing it to grow in mass. Eventually these concentrations form massive filaments which fragment and undergo gravitational collapse forming planetesimals the size of the larger asteroids. Planetary formation can also be triggered by gravitational instability within the disk itself, which leads to its fragmentation into clumps. Some of them, if they are dense enough, will collapse, which can lead to rapid formation of gas giant planets and even brown dwarfs on the timescale of 1,000 years. If these clumps migrate inward as the collapse proceeds tidal forces from the star can result in a significant mass loss leaving behind a smaller body. However it is only possible in massive disks—more massive than 0.3 M☉. In comparison, typical disk masses are 0.01–0.03 M☉. Because the massive disks are rare, this mechanism of planet formation is thought to be infrequent. On the other hand, it may play a
{"page_id": 212374, "title": "Nebular hypothesis"}
food products. CMC's variable viscosity (high while cold, and low while hot) makes it useful in the preparation of cold foods and textures in beverages and edible gels. With a DS around 1.0, it can prevent dehydration and shrinkage of gelatin while also contributing to a more airy structure. In some foods, it can be used to control oil and moisture content. CMC is used to achieve tartrate or cold stability in wine, which can prevent excess energy usage while chilling wine in warm climates. It is more stable than metatartaric acid and is very effective in inhibiting tartrate precipitation. It is reported that KHT crystals, in the presence of CMC, grow slower and change their morphology. Their shape becomes flatter because they lose 2 of the 7 faces, changing their dimensions. CMC molecules, negatively charged at wine pH, interact with the electropositive surface of the crystals, where potassium ions are accumulated. The slower growth of the crystals and the modification of their shape are caused by the competition between CMC molecules and bitartrate ions for binding to the KHT crystals. ==== Food fraud ==== Shrimp and prawns: CMC injections have been used to fraudulently increase the weight and visual appeal of shrimp and prawns so as to short-weight customers. === Detergent uses === CMC is a common ingredient in cleaning products because of its thickening and stabilizing properties and nontoxic composition. In detergent and cleaning products, it can be used to enhance texture and assist in the suspension of dirt and grime in the cleaning product. Its adjustable viscosity can be used to standardize the textures of the products, especially when used along with other chemicals. CMC helps with the removal of grease and aids in the creation of small bubbles in the soap. This, along with its ability
{"page_id": 2800534, "title": "Carboxymethyl cellulose"}
NGC 5601 is a lenticular galaxy around 259 million light-years away in the constellation Boötes. NGC 5601 was discovered on March 27th, 1867 by the Irish astronomer Robert Ball, and it has a diameter around 88,000 light-years. NGC 5601 is not known to have much star formation, and it is not known to have an active galactic nucleus. == References == == External links == Media related to NGC 5601 at Wikimedia Commons
{"page_id": 78587285, "title": "NGC 5601"}
Grady Booch (born February 27, 1955) is an American software engineer, best known for developing the Unified Modeling Language (UML) with Ivar Jacobson and James Rumbaugh. He is recognized internationally for his innovative work in software architecture, software engineering, and collaborative development environments. == Education == Booch earned his bachelor's degree in 1977 from the United States Air Force Academy and a master's degree in electrical engineering in 1979 from the University of California, Santa Barbara. == Career and research == Booch worked at Vandenberg Air Force Base after he graduated. He started as a project engineer and later managed ground-support missions for the space shuttle and other projects. After he gained his master's degree he became an instructor at the Air Force Academy. Booch served as Chief Scientist of Rational Software Corporation from its founding in 1981 through its acquisition by IBM in 2003, where he continued to work until March 2008. After this he became Chief Scientist, Software Engineering in IBM Research and series editor for Benjamin Cummings. Booch has devoted his life's work to improving the art and the science of software development. In the 1980s, he wrote one of the more popular books on programming in Ada. He is best known for developing the Unified Modeling Language with Ivar Jacobson and James Rumbaugh in the 1990s. === IBM 1130 === Booch got his first exposure to programming on an IBM 1130. ... I pounded the doors at the local IBM sales office until a salesman took pity on me. After we chatted for a while, he handed me a Fortran [manual]. I'm sure he gave it to me thinking, "I'll never hear from this kid again." I returned the following week saying, "This is really cool. I've read the whole thing and have written a small
{"page_id": 562205, "title": "Grady Booch"}
A capitalist space, neoliberal space or city space), we began to realize that there is no such thing like boundaries in space. The space of the world is flowing and transforming continuously that it is very difficult to describe in a fixed way. The second space is ideology/conceptual and it is also known as mental space. For example, the second space will explain the behaviors of people from different social class and the social segregation among rich and poor people. Third space is the image space that refers to the process whereby the images has produced new kind of space. The images may be in different form and shape; ranging from painting to photograph, from portrait to post card, and from religious theme to entertainment. Nowadays, we are highly influenced by images in many ways and these certain images can tell us new social and cultures values, or something new about how we see the world. Images, symbols and sign do have some kind of spatial expression. Fourth space is the place that refers to the process whereby spaces are ordered in ways that open up affective and other embodied potentials. Place space has more meaning than a place, and it can represent as different type of space. This fourth type of space tries to understand that place is a vital actor in bringing up people's lives in certain ways and place will let us to understand all kind of things which are hidden form us.. == Scale: the local and the global == Andrew Herod mentioned that scale, within human geography, is typically seen in one of the two ways: either as a real material thing which actually exists and is the result of political struggle and/or social process, or as a way of framing our understanding of the
{"page_id": 19991258, "title": "Sociology of space"}
HD 197027 (HIP 102152) is a star in the constellation Capricornus. It has an apparent magnitude of 9.15, making it readily visible through a telescope but not to the naked eye. The object is located at a distance of 255 light years but is approaching the Solar System with a heliocentric radial velocity of −44 km/s. HD 197027 has a stellar classification of G3 V, indicating that it is an ordinary G-type main-sequence star like the Sun. It has only 97% the mass of the Sun but 108% of its radius. It shines at 119% the luminosity of the Sun from its photosphere at an effective temperature of 5,718 K, similar to the Sun's 5,778 K. HD 197027's metallicity – elements heavier than helium – is similar to the Sun. At an older age of 6.92 billion years, it spins with a projected rotational velocity of about 2 km/s. Since its measured properties of this star are very similar to those of the Sun, it has been considered a candidate older solar twin. The abundances of 21 elements overall are more similar to the Sun than any other known solar twin. Its Iron Abundance is −0.03 with an error value of 0.02 Fe/H. (The value comes from the Hipparcos Extended Catalog.) == References == == External links == Oldest Solar Twin Identified HIGH PRECISION ABUNDANCES OF THE OLD SOLAR TWIN HIP 102152: INSIGHTS ON LI DEPLETION FROM THE OLDEST SUN Oldest Solar Twin Identified
{"page_id": 40475671, "title": "HD 197027"}
S is an axiomatic set theory set out by George Boolos in his 1989 article, "Iteration Again". S, a first-order theory, is two-sorted because its ontology includes "stages" as well as sets. Boolos designed S to embody his understanding of the "iterative conception of set" and the associated iterative hierarchy. S has the important property that all axioms of Zermelo set theory Z, except the axiom of extensionality and the axiom of choice, are theorems of S or a slight modification thereof. == Ontology == Any grouping together of mathematical, abstract, or concrete objects, however formed, is a collection, a synonym for what other set theories refer to as a class. The things that make up a collection are called elements or members. A common instance of a collection is the domain of discourse of a first-order theory. All sets are collections, but there are collections that are not sets. A synonym for collections that are not sets is proper class. An essential task of axiomatic set theory is to distinguish sets from proper classes, if only because mathematics is grounded in sets, with proper classes relegated to a purely descriptive role. The Von Neumann universe implements the "iterative conception of set" by stratifying the universe of sets into a series of "stages", with the sets at a given stage being possible members of the sets formed at all higher stages. The notion of stage goes as follows. Each stage is assigned an ordinal number. The lowest stage, stage 0, consists of all entities having no members. We assume that the only entity at stage 0 is the empty set, although this stage would include any urelements we would choose to admit. Stage n, n>0, consists of all possible sets formed from elements to be found in any stage whose
{"page_id": 31080143, "title": "S (set theory)"}
The endurance time (ET) method is a dynamic structural analysis procedure for seismic assessment of structures. In this procedure, an intensifying dynamic excitation is used as the loading function. Endurance time method is a time-history based dynamic analysis procedure. An estimate of the structural response at different equivalent seismic intensity levels is obtained in a single response history analysis. This method has applications in seismic assessment of various structural types and in different areas of earthquake engineering. == The concept of endurance time method == Endurance time (ET) method is a dynamic structural analysis procedure in which intensifying dynamic excitation is used as the loading function. An estimate of structural response and/or performance at the entire seismic intensity range of interest is obtained in each response history analysis. The concept of endurance time analysis is similar to the exercise test applied in medicine. Similar concept has also been extended to applications in the analysis of offshore platforms under water waves. == Development history == The basic concepts of the endurance time method were published in 2004. Application in linear seismic analysis appeared in 2007. ET was subsequently extended to nonlinear analysis of single degree of freedom (SDOF) and multi degree of freedom systems. Procedures for multi-component seismic analysis were subsequently developed. == ET excitation functions == ET excitation functions are generated by using numerical optimization methods. ET excitation functions are publicly available through internet websites. ET excitation functions can be categorized into five generations as follows: First generation of ET excitation functions (ETEFs) are essentially a filtered and profiled white noise. These were used for demonstrating the concept of ET and have limited practical significance. Second-generation ETEFs incorporate response spectrum matching. These ETEFs produce numerically significant analysis results. Third-generation ETEFs are optimized in nonlinear range. These ETEFs deliver improved analysis
{"page_id": 38022448, "title": "Endurance time method"}
Elastic recoil detection analysis (ERDA), also referred to as forward recoil scattering or spectrometry, is an ion beam analysis technique, in materials science, to obtain elemental concentration depth profiles in thin films. This technique can be achieved using many processes. In the technique of ERDA, an energetic ion beam is directed at a sample to be characterized and (as in Rutherford backscattering) there is an elastic nuclear interaction between the ions of the beam and the atoms of the target sample. Such interactions are commonly of Coulomb nature. Depending on the kinetics of the ions, cross section area, and the loss of energy of the ions in the matter, ERDA helps determine the quantification of the elemental analysis. It also provides information about the depth profile of the sample. The energy of incident energetic ions can vary from 2 MeV to 200 MeV, depending on the studied sample. The energy of the beam should be enough to kick out (“recoil”) the atoms of the sample. Thus, ERDA usually employs appropriate source and detectors to detect recoiled atoms. ERDA setup is large, expensive and difficult to operate. Therefore, although it is commercially available, it is relatively uncommon in materials characterization. The angle of incidence that an ion beam makes with the sample must also be taken into account for correct analysis of the sample. This is because, depending on this angle, the recoiled atoms will be collected. ERDA has been used since 1974. It has similar theory to Rutherford backscattering spectrometry (RBS), but there are minor differences in the set-up of the experiment. In case of RBS, the detector is placed in the back of the sample whereas in ERDA, the detector is placed in the front. == Characteristics of ERDA == The main characteristics of ERDA are listed below. A
{"page_id": 2321375, "title": "Elastic recoil detection"}